text
stringlengths
8
5.77M
Can never forget Sardar Patel's role in uniting India: Modi New Delhi: The country can never forget Sardar Vallabhbhai Patel's contribution in uniting the country, Prime Minister Narendra Modi said here Friday. "The British wanted India to break into pieces but Sardar Patel unified the 550 provinces into one country," Modi said while addressing the nation on the birth anniversary of Sardar Patel being observed as 'Rashtriya Ekta Diwas'. "Through his skill, vision and patriotism Sardar Patel integrated the nation. We can never forget his contribution in uniting free India," Modi added. A 'Run for Unity' and pledge taking at Vijay Chowk marked India's first home minister's birth anniversary Oct 31.
Monday, February 25, 2019 at 9:03AM This is a guest post by Benjamin Manes, who did engineery things for Google and is now doing engineery things as CTO of Vector. The previous article described the caching algorithms used by Caffeine, in particular the eviction and concurrency models. Since then we’ve made improvements to the eviction algorithm and explored a new approach towards expiration. Eviction Policy Window TinyLFU (W-TinyLFU) splits the policy into three parts: an admission window, a frequency filter, and the main region. By using a compact popularity sketch, the historic frequencies are cheap to retain and lookup. This allows for quickly discarding new arrivals that are unlikely to be used again, guarding the main region from cache pollution. The admission window provides a small region for recency bursts to avoid consecutive misses when an item is building up its popularity. This structure works surprisingly well for many important workloads like database, search, and analytics. These cases are frequency-biased where a small admission window is desirable to filter aggressively. However, a small window is detrimental in recency-biased workloads, like job queues and event streams. In some systems the access pattern changes over time so that no static configuration is optimal, such as a cache serving user activity during the day and batch jobs at night. The hit rate curves show both the challenge of a heuristical setting and hint towards a solution. By using an optimization technique known as hill climbing, an adaptive cache can walk the curve to its peak. This is done by sampling the hit rate and choosing a direction to step towards. When the previous direction led to an increased hit rate then it continues to climb, otherwise it turns around. Eventually, the cache will oscillate around the best configuration, so gradually decaying the step size leads to converging to the optimal value. This process restarts whenever the hit rate shifts by a large percentage, indicating that the underlying workload changed. We can see this in action by chaining recency and frequency skewed traces (blockchain mining and an analytical loop). The cache starts in a frequency configuration with a window size of 1%. The recency trace causes the window size to ramp up and match LRU’s hit rate. When the frequency trace takes over, the hit rate crashes and the cache reacts by shrinking the admission window to zero. Eventually the recency trace begins, once again triggering an adaption. This results in an overall hit rate of 39.6%, just shy of the optimal 40.3%. All other policies tested were 20% or lower, including ARC, LIRS, and static W-TinyLFU. Expiration Policy Previously, expiration was only briefly mentioned due to more advanced support being in development. The typical approach is to either use an O(lg n) priority queue to maintain sorted order or to pollute the cache with dead entries and rely on the maximum size policy to eventually evict them. Caffeine uses only amortized O(1) algorithms, starting with a simpler fixed policy and adding a variable policy afterwards. A fixed expiration policy is when every entry is treated identically, such as a ten-minute time-to-live setting. In this case, we can use a time-bounded LRU list, where the head is the oldest item and the tail is the youngest. When the item’s expiration time is reset then the entry is moved to the tail, which can be performed efficiently by embedding the list pointers onto it. When evicting we rely on the fact that everything after the head is younger, so items are polled as needed. This supports access and write order policies, but only if the duration is fixed. A variable expiration policy is more challenging because every entry is evaluated differently. This usually occurs when the expiration policy is external to the cache, such as from http expiration headers for a third-party resource. This requires sorting, but thanks to the ingenuity of hierarchical timing wheels it can be done using hashing instead of by comparison. A timing wheel is an array of doubly-linked lists, each representing a coarse time span. This way items are hashed to the corresponding bucket, putting it in a roughly sorted order. By using multiple wheels, a hierarchy can represent larger time frames such as days, hours, minutes, and seconds. When an upper-level wheel turns, the next bucket is flushed to the lower wheels and those items are rehashed and placed accordingly. When the lowest level wheel turns, the items in the previous bucket are evicted. Thanks to hashing and cascading, this policy is implemented in amortized O(1) time and offers great performance. Conclusion Caffeine is an open-source Java caching library. The techniques discussed here and previously can be applied to any language and are surprisingly straightforward to implement. In addition to those thanked in our last article, I’d like to highlight the thoughtful contributions by the following people, Ohad Eytan, Julian Vassev, Viktor Szathmáry, Charles Allen, William Burns, Christian Sailer, Rick Parker, Branimir Lambov, Benedict Smith, Martin Grajcar, Kurt Kluever, Johno Crawford, Ken Dombeck, and James Baker
These photographs show 18 monks in the moments after taking off their masks after performing spiritual dances in WangdiPhodrang monastery in Bhutan. I wanted to capture the changes in the anatomy of their faces as they de-mask. My aim was to observe the visceral effects of the performance, the emanation of energy of the deity they had represented and the momentsbefore the dancer’s own, psychological mask would reappear on their features. I want to hold a moment of masklessness,after the deity had fully departed, and before the monk had fully reappeared. Each picture is named after the deity represented by the mask they wore or the dance they performed. Classical dances in Bhutan are reflected in the religious mask pageants and ritual dances. With the introduction of Buddhismin the 8th century AD by Guru Padmasambhava from Tibet, ritual and mask dances gained roots in the Bhutanese systemas part of the Mahayana Buddhist tradition. With the birth of the great Terton (treasure revealer) Pema Lingpa in the 15thcentury, the mask dances in Bhutan took firm roots and gained an impetus as part of the Bhutanese cultural life. The TerCham (treasure dances) and Pe Ling Ging Sum were the most famous of the dances that still continues to this day. In the17th century with the arrival of Zhabdrung Ngawang Namgyal from Tibet, the mask dances further gained importance.Many new dances were introduced. The Puna Domchoe was introduced in Punakha Dzong as accompaniment to the prayersto the protector deity Pel yeshey Gonpo (Mahakala). Je Kuenga Gyeltshen, the reincarnation of Jampel Dorji also introduceda dance in honour of Pelden Lhamo (mahakali) in Trashichhodzong. Some of the celebrated dances are Zhana cham or theBlack Hat dance, the Degyed cham or the Spirit dance, the Durdag cham or the Dance of Shamashan Lord and the GuruTshengyed or the Dance of the Eight manifestations of Guru Padmasambhava.The religious dances are symbolic and have a common theme to destroy or trample the evil spirits. The swords of the dancerssymbolize cutting through ignorance while the drums drive away all malevolent evils and demons. Witnessing the dancesis believed to remove sins and take one closer towards attaining nirvana or enlightenment.Dances are performed annually in all important Dzongs, temples and in monasteries and usually lasts for three to five days.The occasion is known as Tshechu and all the village people get together and take part in the ceremonies dressed in theirfinest clothes.
The Dark Side of the ValleyIn techdom's win-at-all-costs culture, hardball tactics and dirty tricks are just part of doing business Oracle Corp. (ORCL) CEO Larry Ellison was mentor and friend to Marc Benioff during his 13-year career at Oracle. So last summer, when Benioff left to launch a Web service for corporate salespeople called Salesforce.com, it was only natural that Ellison would try to support the effort with a $2 million investment and that Benioff would reciprocate with a seat on the startup's board. What might not seem so natural was that Oracle soon began working on a competing service itself. But clearly, this would be the conclusion of someone not living in Silicon Valley. In that land of honey and stock options, some say such cutthroat practices are becoming standard operating procedure. Ellison declined comment, but according to Benioff, he harbors ''no hard feelings'' toward Ellison, although he did ask him to resign his seat on the board. ''Larry just thought it was a business he wanted to be in, and I understand that,'' says the young chief executive. ''We are still friends.'' With friends like that, it's also no wonder that Benioff--and many Valley execs--expressed little surprise over Ellison's recent admission that he had hired detectives to snoop on supporters of Microsoft Corp. (MSFT) and even rummage through their garbage. After all, shrugs Benioff, ''They were the enemy.'' Sure, Silicon Valley has sunshine, jobs, and lots of money. You can skateboard on your break, or take your dogs and parrots to work. But the same hypercompetitive petri dish that spawned the technological creativity and innovation behind the New Economy has produced a win-at-all-cost mentality with increasingly dark implications for the Valleyite's professional and personal life. Now, a backlash against that mentality--from companies who would rather not locate there to burnt-out executives anxious to flee the Valley--is growing. ''There should be a backlash,'' says high-tech guru Geoffrey Moore. ''Even most people involved in it have to throw up at some point.'' Fueling both the good, and the bad side of Silicon Valley's culture, of course, is a heady mix of ambition, competitiveness, money--and greed. Mix that with a frat-boy mentality that encourages the chest-thumping that makes everyone totally absorbed in comparisons of the size of his house, his car, and his stock portfolio. ''Silicon Valley culture is a male adolescent culture with all that it implies,'' says Jeffrey Pfeffer, a professor of organizational behavior at the Stanford University Business School. ''It's all about excess.'' In this pressure cooker, there are long hours and plenty of job-hopping. ''There's always room to pour more of yourself into your career,'' says Cory Smith, a 35-year-old who quit his general manager's job at multimedia company StarMedia Network Inc. (STRM) last month. ''I've never had an opportunity to add those other things to my life that create a balance.'' Says Stephen Goldbart, a clinical psychologist who runs the Money, Meaning and Choices Institute in San Francisco: ''Work becomes their family. They lose track of everything else.'' GLEEFUL COMBAT. In Silicon Valley, companies throttle and plot against each other--with remorseless glee. In May, a Santa Clara County judge found Broadcom Corp. (BRCM) used job interviews to try to get Intel Corp. (INTC) employees to divulge trade secrets. Under the judge's order, Broadcom must set up a training program to ensure that employees recruited from rivals do not disclose private information of those competitors. The ruling sent a shiver through high techdom, because such tactics are common. And as for the genteel world of non-compete clauses and keeping a measured distance from a rivals' employees--forget it. In the Valley, and tech in general, employees are bought and sold like commodities. If you have trouble with the competition, simply raid its talent. Just last fall, German software maker SAP (SAP) sued Siebel Systems Inc. (SEBL) after more than a dozen executives jumped ship for its Silicon Valley rival. SAP dropped the suit two months ago after reaching an undisclosed settlement. Three years ago, Oracle was struggling to keep pace with a new type of database from rival Informix Corp. (IFMX). In a matter of weeks, Oracle hired most of the engineering team that created that database. Oracle denied the charges, claiming the employees left because they were unhappy. Reputation isn't the only thing slipping in Silicon Valley. Quality of life is taking a hit. Highways in and out of the valley fall into gridlock with the smallest of fender-benders. The median Bay Area home price right now? It's $370,000, up 25% from just a year ago, according to a June report from DataQuick Information Systems. It's gotten so bad that San Francisco politicos are considering building subsidized housing for teachers because a teacher's salary is no longer enough to rent a decent apartment in the area. Managers at staid industrial companies like Procter & Gamble Co. (PG) are quick to point out the scary cost of living to young employees who may be lured by the distant whiff of Silicon Valley fortunes. ''At least most people here can afford to buy a house,'' says Dan Gerbus, a middle manager for information technology at Cincinnati-based P&G. It's enough to make the Valley's most valued import, smart people, think twice before heading west. Jason Krantz, 27, graduated from Harvard Business School last month and thought he would move his Internet startup, Infinata Inc., to Silicon Valley. He thought again. Employee retention, he thought, would be a big problem. His office in quiet Arlington, Mass., may not be in the center of Net culture, but he won't have to worry about intellectual property doing a turnstile through the front door. ''If you're going to build a sustainable business, you really need the knowledge to stay in your company,'' says Krantz. It's also enough to make some companies think twice about putting all their resources in the Valley. ''The startups just suck people out of your company,'' says Christopher Klaus, founder of Internet Security Systems Inc. in Atlanta. Klaus says ISS has very little turnover, 1% to 2% annually. Turnover in the Valley averages roughly 25%, according to Stanford's Pfeffer. The blame, critics say, falls on a money-crazed culture that has worsened with the Internet gold rush. Winning in Silicon Valley is winning big. Some estimates claim that 5,000 millionaires were created every month in Silicon Valley last year. Says Craig Conway, CEO of PeopleSoft Inc. (PSFT) and a former executive at Oracle: ''I think the opportunity to make so much money so quickly is taking its toll.'' As the dot-com meltdown of the last two months worsens, the hypercompetition is going to get a lot feistier. ''When times get tough, people are going to get a lot, lot more anxious,'' says Pfeffer. CLOSING WINDOW. But the highly combustible combo of Internet money and high-tech machismo in Silicon Valley is gradually making the piranha tank at the aquarium look like a peaceful ecosystem. ''This business feels like it's run by 28-year-olds--it certainly acts that way. People in other cultures think we're way out of balance, and I agree,'' says Moore, author of high-tech marketing guide Crossing the Chasm. ''Silicon Valley has gotten out of whack.'' Older executives carp about young people who received too much too fast without paying dues. ''Young people can't seem to see a reason why they shouldn't be the CEO by the time they're 30,'' says Jim Gingery, a marketing executive at Shop2gether.com. ''In our rush for resources, we've created arrogant young resources.'' The window for youthful hubris is closing. In the last two months, most dot-com stocks have lost at least half their value. Some people, like Cory Smith, got lucky. He sold his company last year and no longer has to worry about working. He found the other side of his rainbow, at least financially. For others, with the stock market increasingly ignoring startups, the wealth-creation engine in Silicon Valley may be running out of gas. If the thousands still chasing that rainbow are denied their chance, it could get downright ugly. By Jim Kerstetter, with Peter Burrows in San Mateo, Calif., Jay Greene in Seattle, Geoff Smith in Boston, and Michelle Conlin in New York
[Crossed cerebellar atrophy following cerebrovascular lesions]. A neuroradiological study of crossed cerebellar atrophy (CCA) was performed using X-ray CT in 103 patients suffering from unilateral supratentorial cerebrovascular diseases. CCA was demonstrated in 9 (8.7%) of 103 patients. No difference between the occurrence of CCA in cerebral hemorrhage and that in cerebral infarction was found. CCA was seen in the chronic stage of cerebrovascular disease more than 3 years since stroke occurrence, and was found to be present more frequently and to a greater extent 7 years later. No correlation between the site of bleeding and the occurrence of CCA was found. Trans-synaptic degeneration of the corticopontocerebellar tract was considered in CCA following putaminal and combined hemorrhage involving an internal capsule lesion. However, in thalamic hemorrhage, retrograde degeneration within the cerebellorubrothalamic tract was presumed. CCA following cerebral infarction was seen in patients with massive lesions in the territory of the middle cerebral artery. Multivariate analysis showed that lesions of the parietal and frontal lobes appeared to greatly contribute to the development of CCA. As the degeneration and atrophy in the thalamus on the side of the lesion appeared early and frequently, it was suggested that retrograde degeneration of the cerebellorubrothalamic tract participated, in addition to anterograde corticopontocerebellar tract degeneration, in CCA following middle cerebral artery infarction. It is likely that CCA is caused by both transsynaptic degeneration of the corticopontocerebellar tract and the cerebellorubrothalamic tract.
99Tcm-MAG3 for quantitation of differential renal function. We studied two different methods for the evaluation of differential renal function in a group of 100 patients with various kidney disorders whose effective renal plasma flow (ERPF) had been calculated previously by single 125I-orthoiodohippurate (OIH) injection and multiple blood sampling. Patients were divided into three groups according to their ERPF:ERPF is greater than or equal to 250 ml min-1; ERPF less than or equal to 100 ml min-1; and ERPF greater than 100 ml min-1 and less than 250 ml min-1. The two methods used to assess differential renal function were: first, relative 99Tcm-dimercaptosuccinic acid (DMSA) uptake calculated by normalized background and attenuation corrected cumulative counts in each kidney 24 h p.i.; and second, relative 99Tcm-mercaptoacetyl-triglycine (MAG3) uptake within 1 and 2 min p.i. calculated by normalized background and attenuation corrected counts on each renal area. The results obtained with each method correlated strongly with high significance (p less than 0.0001). In the right kidney, mean values obtained with 99Tcm-MAG3 tend to be higher than mean values obtained with 99Tcm-DMSA.
Rough & Ready Lumber, the last sawmill in Josephine County, set to close View the Slideshow >> (Gallery by The Associated Press) CAVE JUNCTION – Here lies . The last sawmill in Josephine County closes next week, a grim milestone in the persistent stalemate over logging that's peculiar to this unique corner of Oregon. In much of western Oregon, the 1990s timber wars have given way to a shaky détente, with a focus on thinning and light-touch restoration in federal forests. In southwest Oregon, the battle still runs hot. High unemployment raises the stakes here. So does a storied timber history and a heavy reliance on dwindling logging revenues from federal forests to fund county government. Three Oregon Congressmen want to more than double logging in the region's O&C Lands, forests shifted to the feds after an early 20th Century railroad deal went sour. But the consequences are uniquely high for environmentalists, too, who said no to big increases in logging when Gov. convened an O&C Lands task force last year to . Josephine County and its neighbors sit in the Klamath-Siskiyou eco-region, one of the most biologically diverse places on the planet. The landscape, warmer than Douglas fir strongholds to the north, supports 36 species of conifers alone and some of Oregon's top runs of salmon and steelhead. Meanwhile, Josephine County voters decide today whether to i to partially plug the gap left by logging reductions. "Everybody views this as black and white, and it's just not that way," says Tom Tuchman, Kitzhaber's forestry adviser. "Finding a balance is an incredibly difficult thing to do." Mill moments Jennifer Phillippi's grandfather opened Rough & Ready 90 years ago, a safe bet in a county that's two-thirds federal forests. At the mill, the snowcapped Siskiyou Mountains hang on the horizon, and the smell of sawdust still lingers. But the mill stopped sawing last month, with Phillippi and her husband, Link, citing a lack of reliable log supply from public lands. Federal timber production and jobs at Oregon mills have fallen dramatically since 1990, when the . Bigger, more efficient mills and the huge housing construction drop in the recent recession contributed as well. Rough & Ready was among 22 sawmills in Josephine and Jackson counties in 1975, the Phillippis said, down to none now. The mill was small, running one shift with 85 jobs. And the recession stung. But the problem wasn't demand, said Jennifer Phillippi, one of three co-owners. "We have customers who are dying for it," she said. "The only thing we don't have is the logs." In 2002, Rough & Ready shut down its small-log mill running three shifts. It needed millions in investment to compete in commodity timber, said Link Phillippi, the mill's president. Nearby lumber, needed to keep costs low, wasn't steady enough, he said. Instead, they upgraded a large-log mill and built a niche in appearance-grade lumber for exposed beams and high-quality windows and doors. For that, they needed the clear, knot-free pine and fir that runs toward the outside of larger logs. The ideal: 80- to 100-year-old second-growth logs -- not old growth, the Phillippis stress -- 22 to 24 inches wide. The mill put out "one of the best products in the sawmill business," says John Dunkin president of , one of the largest U.S. manufacturers. These days, his company buys wood from Canada. Forest politics The Phillippis say environmental groups helped stifle timber sales, protesting five of the last six sales with Rough & Ready as the winning bidder. BLM handles most of the O&C Lands. An industry group protested the sixth sale for lack of log supply, but withdrew it after Rough & Ready won the bid. BLM also removed two large sales in 2006 after protests, Link Phillippi said. "Rarely do we buy a federal timber sale that we can operate right away. It usually takes a year or two. Sometimes they get eliminated." Oregon Timber JOBS 1990: 63,700 2010: 25,300 SAWMILLS 1988: 165 2008: 116 2012: 69 O&C LANDS Annual growth: 1.2 billion board feet Industry favored cut: 500 million Current cut: less than 200 million SOURCES: U.S. Forest Service; Oregon Forest Resources Institute; Bureau of Land Management. Oregon Democratic Reps. and , and Republican are pitching a deal in the U.S. House to more than double logging on O&C land. Their proposal, supported by industry, would put 1.5 million acres of previously logged forests in a trust run for timber production and managed under more lenient state laws for private forests -- a shift designed to limit environmental appeals. The would manage the remaining 1.1 million acres with a focus on retaining old growth. The would get 56,000 more acres. The plan could fly in the Republican-controlled House. It stands little chance in the Democrat-controlled Senate, Oregon Sen. has warned. DeFazio's approach is the "only hope for federal timber in our region," Link Phillippi said. But after decades of battling, the Phillippis said, the prospects are too dim for Rough & Ready to bank on. Biggest and best Eighteen miles down the Redwood Highway from the mill, Orville and Mary Camp manage their own 180 acres of forest with light-touch logging to improve forest health. Threatened coastal coho salmon teem in their pond. DeFazio's proposal, which would apply Oregon's private logging rules to public forests, scares them, the Camps said. Their property is surrounded by a mix of private and O&C forests, typical in southwest Oregon. In 2008, Rough & Ready's timberland arm clear-cut 67 acres next door to the Camps, spraying herbicides afterward. That approach is allowed under Oregon's , and would extend to lands placed in the trust, the Camps fear. The proposal "should terrify people across the nation," Mary Camp said. Endangered Species Act rules on the trust lands would also be far less stringent. Many cuts would be in potential spotted owl habitat. And streamside protection would drop from putting nearly 40 percent of harvestable acres off limits to about 5 percent. In cooler, wetter northwest Oregon, BLM has focused on thinning projects. That tends to go over well in thick, second-growth Douglas fir stands clear-cut and replanted decades ago. Mills set up for small logs can process them into commodity lumber and other products. Thinning is tougher to execute profitably and ecologically in southwest Oregon. Ecologists here focus on keeping larger pines and clearing smaller trees crowding them. That's the rub for Rough & Ready: Larger trees like its mill needs, particularly pines, aren't left to grow on private lands, where more profitable 30- to 60-year rotations are the norm. The has led many timber sale appeals. George Sexton, the group's conservation director, says he offered to back off a lawsuit over a recent Rough & Ready sale, Rio Rumble, if BLM put trees less than 30 inches wide off limits. The agency declined, saying older trees needed to be cut to prevent harmful mistletoe spread along the trees' crowns. Rough & Ready and at least seven Oregon mills are relying on larger diameter trees from public lands, environmental groups estimate. Rough & Ready's mistake was banking on bigger trees, particularly large pines, said Steve Pedery, 's conservation director. New regulations have cut harvests because past volumes were unsustainable, he said, harming streams, salmon and wildlife. "It's not a good business model to depend on eliminating 20 years of conservation standards." 300 million feet apart The governor hoped his O&C committee would compromise. It didn't. The environmental representatives could swallow just over 200 million board feet a year, tapping an "ecological forestry" model with limited clear-cuts. Industry and county representatives stuck to 500 million, enough to meet county revenue goals. A said meeting the revenue goals and abiding by environmental laws as interpreted now "appear to be mutually exclusive." It also said thinning projects would run out in 10 to 25 years. Wyden has promised a strategy later this month to address the deadlock. The two sides could reconcile in conference committee. The could use more streamside protection, DeFazio agreed. But it would pay for private forest streamside buffers, manage half the trust lands in at least 100-year rotations and add wilderness and some old-growth protections. Industry has filed lawsuits for bigger cuts, arguing that O&C law sets aside the lands for "sustainable yield." If the lawsuits succeed, "the environmentalists would be here in a second saying, 'We want old-growth protection and wilderness,'" DeFazio said. "At that point, I might not be able to get it." Back at Rough & Ready, 19-year millwright Larry Mason is hoping for a solution. Josephine County's unemployment rate tops 11 percent. At last count, a quarter of its residents were on food stamps. Mason figures his chances of getting a local job are close to zero. It could make you cry every night, Mason said. "In this valley, there's no jobs. The kids my daughter went to school with, none of them have jobs. It's tough, man." -- Scott Learn
As I mentioned, I'm out in Vegas attending the Tech Policy Summit at CES today and tomorrow and trying to blog about some of what's going on. Here's my summary of panel#1 on broadband policy and panel #2 on spectrum policy. The third panel was on the future of copyright and content creation. The session was moderated by Declan McCullagh, Sr. Correspondent, CBSNews.com and Contributor, CNET News. The panelists included: Jim Griffin - Nobody in music industry has given up on any business model - Advertising often ill-suited to a digital world - Music is inherently anarchistic; we need to find a way to monetize it instead of stop it - Bono's "unfortunate" approach wouldn't help get people paid - But we do need to find ways to get artists fairly compensated - This is all about making it faster and easier to pay - Price of music is subjective; hard to determine - Chorus model goal is to create flat-fee for unlimited use of music - Will have to let the collection agencies figure out the payout formula Fred von Lohman - Does subscription model work for digital model? - $5 Per-month, on-demand model (Mog or Spotify?) - Chorus model of trying to monetize P2P is where we need to go; collective licensing is the future - A surveillance system for copyright wouldn't work well for piracy and would be used by others for other things (indecency, gambling, etc) - Recording industry has given up on lawsuit strategy Hank Shocklee - Compensation on many different levels & new ways (touring is up) - Price of music today is too high - In future, no more rich artists; lots of little niche artists all making less - Crumbling of record labels is "a great thing" Michael Roberston - Most new business models won't work; some just recycle old models that failed - Cost of music licenses from record labels are too expensive Dave Allen - Disconnect between old models and new technological realities; old "containers" for music no longer hold it in or help monetize itNeed totally new model for music and labels - Artists are going to have to let go of the old models and dream
Disney shut down LucasArts in April. This move surprised the videogame industry and gamers too. The first consequence of this movement was that all the games in development were cancelled too. Now, we know that one of the cancelled games was the remake of the classic Day of the Tentacle. Although the project was never oficially greenlit, the game was being developed by LucasArts Singapore and it was near to be finished (according to the sources completed at 80%). The game would be treated like the Monkey Island remakes appeared in 2009 and 2010. This means that it would be pseudo 3D perspective with remade background art and cut-scenes redone. All running at 30 frames per second. Thanks, Kotaku
Q: Using setNdefPushMessage in loop in Android Can I send multiple NDEF messages using setNdefPushMessageCallback or setNdefPushMessage like in a loop from one activity in Android? A: You can use those methods wherever and as often as you want within your activity's code. However, only the last message set before any peer-to-peer (Beam) communication will be transfered by Android. Messages that you previously set will simply be dropped. So you can only send one NDEF message over a peer-to-peer connection.
COSTA MESA, Calif. -- Here’s how Los Angeles Chargers quarterback Philip Rivers summed up rookie receiver Mike Williams’ first year in the NFL. “He never seemed fully, fully comfortable, and I don’t know that it ever just had flow to it, you know, for him,” Rivers said. “I still think there’s a little bit of thinking that’s going on. It never felt like he was playing free.” This offseason will be a big one for receiver Mike Williams, who had to deal with an injury-filled rookie season. Kyle Terada/USA Today Sports Williams missed all of offseason work and training camp with a lower back disc herniation he suffered on the first day of rookie minicamp in May. He returned to the field during the regular season and appeared in his first game action in Week 6 against the Oakland Raiders. However, as Rivers said, Williams never looked fully comfortable in the offense. Williams also suffered a knee injury against the Dallas Cowboys on Thanksgiving Day that forced him to miss a game. The Clemson product’s disappointing rookie season wasn’t for a lack of effort. “He worked at it now,” Rivers said. “But you can’t as a rookie receiver in this offense where there are a lot of things with multiple formations: ‘Now you’re the F, no actually you’re the X, oh Keenan [Allen] come back over here, play the Z,’ -- and we’re moving and we’re checking. “It’s tough when you miss I don’t know, what, a third of training camp and practice and walkthroughs -- all those live reps, being in the huddle and all those things. We did the best we could of him being right there, kind of shadowing in the walkthroughs, and he was in meetings with Kellen [Clemens] and Nick [wide receivers coach Nick Sirianni] spent a lot of time with him. You just can’t really duplicate that.” Williams finished his rookie season with 11 catches for 95 yards, including two drops. His lackluster effort was part of an uninspiring performance by the receivers taken in the first round of the 2017 draft. Selected No. 5 overall by the Tennessee Titans, Corey Davis was slowed by a nagging hamstring injury, finishing with 34 receptions for 375 receiving yards and no touchdowns in 11 regular-season games. John Ross, selected No. 9 overall by the Cincinnati Bengals, finished the season on the injured reserve with a shoulder injury and has yet to make his first NFL catch, playing in just three games his rookie season. It’s not uncommon for receivers to struggle in their first season in the NFL due to the thick, complicated playbooks and complex coverage schemes they have to learn during their transition to professional football. Selected No. 22 overall in the 2016 draft, TCU’s Josh Doctson played just two games his rookie season due to a lingering Achilles injury. But in his second year Doctson was more productive, finishing with 35 receptions for 502 receiving yards and six touchdowns. Selected in the second round of the 2010 draft out of Notre Dame by the Seattle Seahawks, Golden Tate was a healthy scratch his first five NFL games before finally picking up the offense enough to make his way onto the field. A winner of the Fred Biletnikoff Award, given to the best college receiver in the nation, Tate finished with 21 receptions for 227 receiving yards his rookie season. Tate eventually developed into a Pro Bowl-caliber receiver, with three, 1,000 receiving-yards season to his credit. “Receiver is a tough position to come in this league and play right away,” Chargers GM Tom Telesco said. “It’s even harder when you miss OTAs and all of training camp, so we gradually got him in there. He did learn a good amount this year. “It’s going to take this offseason of working with Philip, working with the quarterbacks. He knows the offense, but there’s a difference between knowing the offense in a book and actually applying it on the field, getting used to the timing and reps with the quarterback, and that all will come this offseason. So at least we got him back on the field. He got some work but we’re expecting more next year.” Rivers echoed Telesco’s comments. “This offseason will be huge for him,” Rivers said. “I’m excited about Mike. I think he’ll add a lot and bring a great impact to our offense. But this offseason will be huge for him, to get him healthy, all those OTAs, a full offseason program, weight room and running. Mike can add another dimension to our offense.”
Molecular and immunologic aspects of the nonclassical HLA class I antigen HLA-G: evidence for an important role in the maternal tolerance of the fetal allograft. Human leukocyte antigen (HLA)-G is a major histocompatibility complex class I antigen, which is referred to as nonclassical because it displays a tissue-restricted distribution in the placenta, a reduced cytoplasmic domain, a limited polymorphism, and several isoforms. The HLA-G antigen is thought to play an essential role during pregnancy by protecting the semi-allogeneic fetus from recognition and destruction by maternal immune cells. Alternative splicing of HLA-G mRNA was analyzed by Southern blot of reverse transcriptase-polymerase chain reaction products from trophoblasts of the first trimester of gestation and term placenta. The regulation of HLA-G gene expression was investigated by electrophoretic mobility shift assays using nuclear extracts from cells expressing different levels of HLA-G gene activity. Using polymerase chain reaction-single strand conformational polymorphism and sequencing, we studied HLA-G gene polymorphism in families from the Centre d'Etude du Polymorphisme Humain in Paris. To understand the function of the HLA-G molecule, cytotoxicity assays were carried out with peripheral blood mononuclear cells or polyclonal natural killer effectors cells from 30 different donors against HLA-G1 and HLA-G2 transfectants. Four main aspects have been elucidated: 1) The primary transcript of the HLA-G gene is alternatively spliced into five main mRNA forms: HLA-G1 (full length), HLA-G2 (minus exon 3), which encodes a membrane-bound isoform associated with beta-2 microglobulin, HLA-G3 (minus exons 3 and 4), HLA-G4 (minus exon 4), and HLA-G5 (plus intron 4), which encodes a soluble form of the HLA-G antigen; 2) specific nuclear factors bind to an important regulatory element located more than 1.2 kb from the HLA-G gene. Three specific complexes are observed in cells that show HLA-G transcriptional activity and an additional factor that could correlate with the repression of HLA-G gene expression that is detected in natural killer cells; 3) we observed an important genomic polymorphism in exon 3 but a very low polymorphism at the protein level; 4) HLA-G1 and HLA-G2 transfectants clearly demonstrated that both HLA-G isoforms are capable of inhibiting natural killer lytic activity. These results suggest that HLA-G acts as the public ligand for natural killer inhibitory receptors, thus protecting the fetus against maternal rejection.
@model TwoFactorAuthenticationViewModel @{ ViewData.SetActivePageAndTitle(ManageNavPages.TwoFactorAuthentication, "Two-factor authentication"); } @if(Model.Is2faEnabled) { if(Model.RecoveryCodesLeft == 0) { <div class="alert alert-danger"> <h4 class="alert-heading mb-3"> <span class="fa fa-warning"></span> You have no recovery codes left. </h4> <p class="mb-0">You must <a asp-action="GenerateRecoveryCodes" class="alert-link">generate a new set of recovery codes</a> before you can log in with a recovery code.</p> </div> } else if(Model.RecoveryCodesLeft == 1) { <div class="alert alert-danger"> <h4 class="alert-heading mb-3"> <span class="fa fa-warning"></span> You only have 1 recovery code left. </h4> <p class="mb-0">You can <a asp-action="GenerateRecoveryCodes" class="alert-link">generate a new set of recovery codes</a>.</p> </div> } else if(Model.RecoveryCodesLeft <= 3) { <div class="alert alert-warning"> <h4 class="alert-heading mb-3"> <span class="fa fa-warning"></span> You only have @Model.RecoveryCodesLeft recovery codes left. </h4> <p class="mb-0">You should <a asp-action="GenerateRecoveryCodes" class="alert-link">generate a new set of recovery codes</a>.</p> </div> } } <div class="list-group"> @if (Model.Is2faEnabled) { <a asp-action="Disable2faWarning" class="list-group-item d-flex justify-content-between align-items-center list-group-item-action py-3"> <div> <h5 >Disable 2FA</h5> <p class="mb-0 mr-3">Disable two-factor authentication. Re-enabling will not require you to reconfigure your Authenticator app. </p> </div> <i class="fa fa-chevron-right"></i> </a> <a asp-action="GenerateRecoveryCodes" class="list-group-item d-flex justify-content-between align-items-center list-group-item-action py-3"> <div> <h5 >Reset recovery codes</h5> <p class="mb-0 mr-3">Regenerate your two-factor recovery codes.</p> </div> <i class="fa fa-chevron-right"></i> </a> <a asp-action="EnableAuthenticator" class="list-group-item d-flex justify-content-between align-items-center list-group-item-action py-3"> <div> <h5 >Configure Authenticator app</h5> <p class="mb-0 mr-3">Display the key or QR code to configure an authenticator app with your current setup.</p> </div> <i class="fa fa-chevron-right"></i> </a> <a asp-action="ResetAuthenticatorWarning" class="list-group-item d-flex justify-content-between align-items-center list-group-item-action py-3"> <div> <h5 >Reset Authenticator app</h5> <p class="mb-0 mr-3">Invalidates the current authenticator configuration. Useful if you believe your authenticator settings were compromised.</p> </div> <i class="fa fa-chevron-right"></i> </a> } else { <a asp-action="EnableAuthenticator" class="list-group-item d-flex justify-content-between align-items-center list-group-item-action py-3"> <div> <h5 >Enable 2FA</h5> <p class="mb-0 mr-3">Enable two-factor authentication using TOTP with apps such as Google Authenticator.</p> </div> <i class="fa fa-chevron-right"></i> </a> } </div> @section Scripts { @await Html.PartialAsync("_ValidationScriptsPartial") }
apiversion: kustomize.config.k8s.io/v1beta1 kind: Kustomization namespace: sample bases: - ../../base patchesStrategicMerge: - greeting.yaml resources: - greeting-deployment.yaml
Democrat presidential hopeful Pete Buttigieg apparently felt the sting of Rush Limbaugh’s recent comments about his masculinity and lashed out at the radio icon and Trump supporters in an interview with Ellen DeGeneres. Buttigieg responded to recent remarks by Rush Limbaugh, who said that President Donald Trump’s would clearly look more masculine on a political stage next to Buttigieg, should he win his party’s nomination. “Look, I guess he just has a different idea of what makes a man than I do,” Buttigieg said of Limbaugh, who had questioned his masculinity when compared to Trump. “I’m not going to take lectures on family values from the likes of Rush Limbaugh or anybody who supports Donald Trump, frankly. You know, when I was packing my bags for Afghanistan, Donald Trump was working on season seven of Celebrity Apprentice.” “And since when is strength about the chest-pounding and the loud-mouthed guy at the end of the bar?” he continued. The Rush Limbaugh Show host asked his viewers whether Trump would “have fun” in competing against a 37-year-old “gay guy [who] loves kissing his husband on debate stages.” “And they got to be looking at that, and they’ve got to be saying, that despite all the great progress and despite all the great wokeness, and despite all the great ground that’s been covered, America’s still not ready to elect a gay guy kissing his husband on the debate stage president,” Limbaugh said. “They have to be saying this, don’t they?” “Now, there may be some Democrats who think that is the ticket,” Limbaugh added. “There may be some Democrats who think that’s exactly what we need to do, Rush. Get a gay guy kissing his husband on stage, ram it down Trump’s throat, and beat him in the general election. Really. Having fun envisioning that.” Limbaugh, who was awarded with the Presidential Medal of Freedom earlier this month following his diagnosis with advanced lung cancer, also revealed that Trump reached out to him to tell him to stand by his statements. “Hell, the president even called me about this,” Limbaugh later said. “Trump said: ‘Rush, I just got to tell you something. Never apologize. Don’t ever apologize.'” Follow Ben Kew on Facebook, Twitter at @ben_kew, or email him at bkew@breitbart.com.
77 F.3d 593 64 USLW 2529 In re Subpoena of Roger GIMBEL by FDIC as Receiver for FirstNew York Bank for Business.Roger GIMBEL, Petitioner-Appellant,v.FEDERAL DEPOSIT INSURANCE CORPORATION, Respondent-Appellee. No. 866, Docket 95-6187. United States Court of Appeals,Second Circuit. Argued Oct. 18, 1995.Decided Feb. 21, 1996. Arthur M. Handler, New York City (Robert S. Goodman, Eileen P. McCarthy, Burns Handler & Burns LLP, New York City, of counsel), for Appellant. Lawrence H. Richmond, Federal Deposit Insurance Corporation, Washington, D.C. (Ann S. DuRoss, Assistant General Counsel, Colleen B. Bombardier, Senior Counsel, Federal Deposit Insurance Corporation, Washington, D.C., of counsel), for Appellee. Before: MESKILL, MAHONEY and WALKER, Circuit Judges. MESKILL, Circuit Judge: 1 This is an appeal from a final order of the United States District Court for the Southern District of New York, Martin, J., denying Roger Gimbel's motion to quash a Federal Deposit Insurance Corporation (FDIC) administrative subpoena of Gimbel's personal financial records and granting the FDIC's cross-motion to enforce its subpoena. BACKGROUND 2 Roger Gimbel was a director of the First New York Bank for BusinessYBB from 1986 until 1992 when the bank failed. The FDIC took over as receiver for the failed bank and through an administrative subpoena duces tecum seeks to determine the potential liability of Gimbel to FNYBB/FDIC and his ability to pay any judgment obtained. Gimbel argues that the FDIC subpoena must be quashed because it lacks the requisite articulation of suspicion of liability required by the Fourth Amendment, and because it seeks information irrelevant to the stated purposes of the FDIC investigation of him and thus is outside the FDIC's statutory authority. The district court found that the FDIC made an "adequate showing" to support its subpoena. We have jurisdiction pursuant to 28 U.S.C. § 1291. 3 The FDIC subpoena of Gimbel's personal records instructed Gimbel to provide the FDIC the following: 4 1. Your current financial statement and all financial statements listing your assets and liabilities, (alone or with others). 5 2. All credit applications submitted by you, alone or with others, to any depository institution or any other person or entity. 6 3. All records prepared, generated, or received on or after June 8, 1995, referring or relating to any account in any depository institution maintained by you or any member of your immediate family, or over which you or they have exercised control, or as to which you or they are or were a signatory, or in which you or they had or have a financial interest, including but not limited to: (a) checking and savings account statements; (b) records of loans made or received; (c) records of certificates of deposit and other time deposit items purchased or redeemed; (d) records of safe deposit boxes; (e) cancelled checks. 7 4. All records prepared, generated, or received on or after June 8, 1995, referring or relating to the source and amount of any income received by you or on your behalf, including but not limited to all wages, salary, commissions, bonuses, interest and dividend payments, and any other form of income received by you. 8 5. All Federal, state and local tax returns filed by you either individually or jointly with another, along with all forms and schedules filed with such returns. 9 6. All records prepared, generated, or received on or after June 8, 1995, referring or relating to stocks, bonds, securities or other investments currently owned by you individually or with others, including but not limited to any statements showing their value. 10 7. All documents that reflect, refer or relate to any financial, real or personal property transactions in which you, or anyone acting on your behalf, or under your control or influence, have been involved, (except as the attorney, employee or agent of another party on transactions in which you had no personal interest), having a value of $5,000 or more, per person or organization per year, including, but not limited to, the following: 11 a. all real and personal property purchases, sales or transfers, with or without consideration; 12 b. all trust participations; 13 c. mortgages, trusts or other liens on security interests obtained or supplied on any third party; 14 d. lawsuits; and 15 e. repossessions and returns. 16 8. All documents referring or relating to any transfer of assets exceeding $5,000 to any entity, account, place or person located outside the United States of America. 17 9. All records referring or relating to any interest you hold in any real[,] personal or other type of property exceeding $5,000 in value not described above. 18 10. All policies which insure you against liability, unless the policy expressly excludes all coverage for directors and officers. Examples of policies which may be required to be produced include D & O insurance of a failed institution, insurance covering you as a director or officer of a corporation other than the failed institution, comprehensive general liability (CGL) policies, homeowner's policies, personal umbrella policies.DISCUSSION 19 As we noted in In re McVane, 44 F.3d 1127 (2d Cir.1995), the statute that empowers the FDIC to issue subpoenas "places few restrictions on that power." Id. at 1134. The statute provides that: 20 The Corporation may, as conservator, receiver, or exclusive manager and for purposes of carrying out any power, authority, or duty with respect to an insured depository institution (including determining any claim against the institution and determining and realizing upon any asset of any person in the course of collecting money due the institution), exercise any power established under section 1818(n) of this title. 21 12 U.S.C. § 1821(d)(2)(I)(i). Section 1818(n) provides that the FDIC shall have the power to, among other things, issue, revoke, and quash subpoenas duces tecum. 12 U.S.C. § 1818(n). The only statutory limit on the subpoena power of the FDIC is that the subpoenas be issued " 'for purposes of carrying out any power, authority, or duty with respect to an insured depository institution.' " McVane, 44 F.3d at 1134 (quoting § 1821(d)(2)(I)(i)). 22 Limitations on the FDIC's sweeping power to subpoena the personal financial records of the former directors and officers of failed savings and loans1 come from two sources. First, courts have interpreted the FDIC's seemingly unlimited grant of authority to issue subpoenas as requiring a preliminary showing of suspicion of liability of the subpoena respondent for certain inquiries. For instance, in RTC v. Walde, 18 F.3d 943 (D.C.Cir.1994), the District of Columbia Circuit held that Congress did not authorize the FDIC to subpoena personal financial records of directors for the purpose of determining the cost-effectiveness of litigation, unless the FDIC could articulate a suspicion of liability. Id. at 949; McVane, 44 F.3d at 1140. A second limitation on the FDIC's subpoena power is, of course, the Fourth Amendment's prohibition of unreasonable searches. In McVane, we held that the Fourth Amendment would be offended by the enforcement of a FDIC subpoena for the personal financial records of family members of the directors of a failed bank unless the FDIC could show a need for those records beyond their mere relevance to the FDIC investigation. McVane, 44 F.3d at 1138. 23 Absent one of these limitations, the FDIC need only satisfy the statutory standard for the enforcement of administrative subpoenas. Accordingly, the FDIC must show that its investigation is being conducted pursuant to a legitimate purpose, that the inquiry is relevant to that purpose, that the information is not already within the FDIC's possession and that the proper procedures have been followed. United States v. Powell, 379 U.S. 48, 57-58, 85 S.Ct. 248, 254-55, 13 L.Ed.2d 112 (1964). A. The Fourth Amendment Claim 24 While the Fourth Amendment's prohibition against unreasonable searches applies to administrative subpoenas, the Supreme Court has held that such subpoenas are, at best, "constructive searches." Oklahoma Press Pub. Co. v. Walling, 327 U.S. 186, 202-08, 66 S.Ct. 494, 502-05, 90 L.Ed. 614 (1946). As such, administrative subpoenas do not require full probable cause for enforcement. United States v. Morton Salt Co., 338 U.S. 632, 70 S.Ct. 357, 94 L.Ed. 401 (1950). The Morton Salt Court held that as long as subpoenaed information was "reasonably relevant to the agency investigation," "not too indefinite" and "within the authority of the agency," the Fourth Amendment was not offended. Id. at 652, 70 S.Ct. at 368-69. 25 Gimbel argues that because Morton Salt involved an administrative subpoena for corporate records, its "reasonable relevance" standard cannot be the Fourth Amendment standard applicable to the FDIC's subpoena of his personal records. Gimbel relies on language in Morton Salt itself. The Supreme Court stated, in the context of a challenge to a Federal Trade Commission order requiring the Morton Salt Company to file reports with it, that although corporations have certain privacy interests, they "can claim no equality with individuals in the enjoyment of a right to privacy." Id. at 652, 70 S.Ct. at 368. Thus, the argument goes, if a subpoena for corporate records requires a showing of reasonable relevance, then a subpoena for an individual's personal financial records must require some higher showing. This argument was recently accepted by a divided panel in Parks v. FDIC, No. 94-2262, 1995 WL 529629 (1st Cir. Sept. 13, 1995), but that opinion was subsequently vacated and rehearing in banc granted. Order of Court, Nov. 20, 1995. Appellant had never relied on Parks as binding authority on this appeal, but rather argued that the holding in Parks is consistent with our decision in McVane. Although Parks was vacated, we will address the panel and dissenting opinions therein in analyzing Gimbel's claims. The Parks majority stated that for enforcement of an administrative subpoena for privately held personal financial records, the Fourth Amendment requires that the agency "articulate an individualized suspicion of wrongdoing by the petitioner." Parks, 1995 WL 529629, at * 8. 26 We addressed that same question in McVane, 44 F.3d 1127, and recognized and interposed both statutory and constitutional limitations on the FDIC's power to subpoena personal financial records. McVane involved an FDIC subpoena for financial records of directors of a failed bank and the records of the directors' families. Much of our discussion focused on the portions of the subpoena relating to the financial records of the directors' family members. Id. at 1137-39. In connection with that discussion, we recognized, as the Supreme Court did in Morton Salt, that the Fourth Amendment generally affords more protection to individuals than corporations, and we held that persons who are not targets of investigations are generally accorded even greater protection from administrative subpoenas. Id. at 1137. Thus we held that those portions of the subpoena relating to the personal financial records of the family members of directors required "some showing of need for the material sought beyond its mere relevance to a proper investigation." Id. at 1138 (quoting Federal Election Comm'n v. Larouche Campaign, 817 F.2d 233, 234 (2d Cir.1987) (per curiam)). We rejected the directors' contention, however, that all of the FDIC's requests were subject to this "intermediate level of scrutiny." Id. at 1138 n. 3. Rather, we noted that "[i]t is well settled that, absent countervailing considerations, the standard to be applied to administrative subpoenas duces tecum is that set out in Morton Salt and its progeny." Id. 27 Appellant argues that this last proclamation in McVane is dictum, and thus there is an open question in this Circuit as to whether the "reasonable relevance" standard of Morton Salt applies to administrative subpoenas for the privately held personal financial records of actual targets. Gimbel claims that McVane 's holding is limited to the issue of subpoenas for family members' information. The FDIC claims that McVane footnote 3 is a holding and thus controlling. 28 The subpoena at issue in McVane requested the financial records of the actual directors as well as those of their families, so the issue of the enforceability of the FDIC subpoena of the directors' records was properly and squarely before the McVane panel. Our joining the D.C. Circuit in adopting a stricter standard when evaluating FDIC subpoenas seeking directors' financial records solely for the purposes of determining which of the directors are worth suing, id. at 1139-40 (citing Walde, 18 F.3d at 949), does not mean that we did not consider the propriety of the other FDIC purposes and the appropriate showing required. We held in McVane that to enforce subpoena provisions intended only to determine the cost-effectiveness of bringing suit, the FDIC must "articulate specific grounds for its suspicion of liability," and we held that the FDIC had met that standard. McVane, 44 F.3d at 1140. 29 We also affirmed the enforcement of the director-related provisions. Id. at 1141. Thus, we necessarily found the director-related portions of the subpoena to be sufficient under the Fourth Amendment. In other words, in holding that only the portions of the subpoena that sought the records of family members and the portions that sought only cost-effectiveness information would be held to a higher standard than Morton Salt, we implicitly applied Morton Salt 's "reasonable relevance" standard to the remaining portions of the subpoena. Thus footnote 3 of McVane, indicating that Morton Salt applies to subpoenas for directors' personal financial records, is not dictum and is controlling on this issue. 30 Even if we believed that McVane did not control this case, we are not persuaded by the majority's reasoning in Parks that Morton Salt 's reasonable relevance standard cannot apply to administrative subpoenas for directors' personal financial records. Parks, 1995 WL 529629, at * 5. The Parks majority claimed to exercise simple logic and suggested that we missed the boat in McVane by relying on Walde, 18 F.3d 943, and, like the Walde Court, by failing to distinguish between subpoenas for the financial records of individuals and those of corporations. Parks, 1995 WL 529629, at * 5. The Parks majority reasoned that if corporations are protected by Morton Salt 's reasonable relevance standard, and if individuals are entitled to greater protection than are corporations, then there must be a Fourth Amendment standard stricter than reasonable relevance where personal financial records are subpoenaed. Parks, 1995 WL 529629, at * 8. 31 Although this argument has surface appeal, it does not withstand careful scrutiny. We agree with dissenting Judge Selya that the Parks majority relied too heavily on the distinction between corporate and personal financial affairs. Parks, 1995 WL 529629, at * 10 (Selya, J., dissenting). Our holding in McVane recognized the Supreme Court's teachings that corporations are not entitled to the same level of Fourth Amendment protection that is afforded individuals, but also recognized that courts have continued to apply the reasonable relevance test to administrative subpoenas for personal financial records. See McVane, 44 F.3d at 1137; see also Walde, 18 F.3d at 946-48; SEC v. Kaplan, 397 F.Supp. 564, 567, 570 (E.D.N.Y.1975). 32 Although the Parks majority claimed that the Supreme Court had never applied the Morton Salt standard to a subpoena for the financial records of an individual, Parks, 1995 WL 529629, at * 5, Judge Selya correctly noted that the Supreme Court did just that in Ryan v. United States, 379 U.S. 61, 85 S.Ct. 232, 13 L.Ed.2d 122 (1964). In Ryan, the Court enforced an IRS subpoena of a taxpayer's personal financial records for the reasons stated in United States v. Powell, 379 U.S. 48, 85 S.Ct. 248, 13 L.Ed.2d 112 (1964), decided the same day. Ryan, 379 U.S. at 62, 85 S.Ct. at 233. Powell held that Morton Salt 's reasonable relevance standard, not probable cause, was the proper standard under which to review an IRS subpoena of corporate tax records. Thus, the Ryan Court, by enforcing the IRS subpoena for the reasons stated in Powell, held that the Morton Salt standard was also proper in the personal records context. 33 We also agree with Judge Selya that the language in Morton Salt and Oklahoma Press, indicating that corporations enjoy less protection than do individuals under the Fourth Amendment is, at least in the context of administrative subpoenas, representative of an era that was still coming to terms with the modern regulatory state. Parks, 1995 WL 529629, at * 10 (Selya, J., dissenting). The decisions of the Supreme Court in Morton Salt and Oklahoma Press reveal a Court struggling to reconcile the Fourth Amendment and the emerging, post-war regulatory state, and finding some additional support for its decision in the fact that the party invoking the Fourth Amendment was a corporation. The Powell- Ryan line of cases removed many of the chains that bound agency investigations. See, e.g., United States v. McAnlis, 721 F.2d 334, 336 (11th Cir.1983) (applying Powell standard to IRS summons for personal tax records), cert. denied, 467 U.S. 1227, 104 S.Ct. 2681, 81 L.Ed.2d 877 (1984); United States v. Roundtree, 420 F.2d 845, 851 (5th Cir.1969) (holding that "we are satisfied that the Commissioner meets the standard of probable cause when he meets the requirements of Powell "). 34 The Court's decisions in Powell and Ryan evince a more modern view of the regulatory state, and one that recognizes that Congress may authorize administrative agencies, such as the IRS and Federal Trade Commission and, as in this case, the FDIC, to investigate suspected wrongdoing in their respective fields of expertise. These agencies, when authorized by Congress, may utilize their subpoena power to obtain information that is relevant to a legitimate area of inquiry. Obviously, this does not mean that the FDIC's congressional authorization to investigate bank failures and issue subpoenas in furtherance of its investigation insulates it from Fourth Amendment scrutiny. We recognize, however, that the Supreme Court, in Oklahoma Press, held that the Fourth Amendment standard in the context of agency subpoenas is ultimately one of reasonableness, Oklahoma Press, 327 U.S. at 208, 66 S.Ct. at 505, and that the Court, through its decisions in Powell and Ryan, has held that, as Judge Selya put it, "administrative subpoenas seeking [financial] records are per se reasonable as long as they are lawfully authorized, relevant, sufficiently specific, and procedurally unblemished." Parks, 1995 WL 529629, at * 11 (Selya, J., dissenting); Powell, 379 U.S. 48, 85 S.Ct. 248, 13 L.Ed.2d 112; Ryan, 379 U.S. 61, 85 S.Ct. 232, 13 L.Ed.2d 122. We agree with Judge Selya that there is no reason to categorically restrict this standard to corporate financial records. Parks, 1995 WL 529629, at * 11. 35 The underlying rationale in affording corporations a lesser degree of Fourth Amendment protection than normally accorded to individuals is that a corporation, as a creature of the state, born of the law of the state, and whose very existence is defined by the state, has limited grounds for a "reasonable expectation of privacy," Katz v. United States, 389 U.S. 347, 360, 88 S.Ct. 507, 516, 19 L.Ed.2d 576 (1967) (Harlan, J., concurring), in its corporate financial records. Morton Salt, 338 U.S. at 651-52, 70 S.Ct. at 368-69. Similarly, individuals, by the nature of their chosen profession, might not hold a "reasonable expectation of privacy" in certain areas of their personal affairs.2 36 As we stated in McVane, "absent countervailing considerations, the standard to be applied to administrative subpoenas duces tecum is that set out in Morton Salt and its progeny." McVane, 44 F.3d at 1138 n. 3. The countervailing considerations we referred to in McVane are those that arise where, based on the surrounding circumstances, a subpoena respondent maintains a reasonable expectation of privacy in the materials sought by the subpoena. Unless a reasonable expectation of privacy of a greater magnitude than at least that held by an individual taxpayer in his or her personal financial records is demonstrated, Ryan, 379 U.S. 61, 85 S.Ct. 232, 13 L.Ed.2d 122 (enforcing subpoena for taxpayer's personal financial records on showing of relevance), the Fourth Amendment does not require any showing beyond the reasonable relevance of the materials sought. 37 Such a situation arose where the FDIC subpoenaed the personal financial records of the family members of the directors of a failed bank in McVane. We found that the subpoena respondents retained a reasonable expectation of privacy that merited a more stringent standard than reasonable relevance. McVane, 44 F.3d at 1137-38. 38 In analyzing the reasonableness of the family members' expectations of privacy, we stated that non-parties will generally be accorded more protection from sweeping administrative subpoenas under the rationale that "[i]ndividuals ... who do not participate in corporate matters that might reasonably become the subject of government inquiry have a greater 'reasonable expectation of privacy' in their personal financial affairs than do those individuals who do participate in such matters." McVane, 44 F.3d at 1137 (citations omitted) (quoting Katz, 389 U.S. at 360, 88 S.Ct. at 516 (Harlan, J., concurring)). The family members in McVane had no business relations with the director to whom they were related. Id. at 1138. To the contrary, the relationships were purely personal. We stated that "[a] person does not involve him or herself in matters forseeably the object of agency inquiry simply by being a member of another's family." Id. Thus we held that "[c]onjugal or familial association with a corporate participant does not, by itself, strip an individual of his or her expectation of privacy," id., and we required the FDIC to make a showing of need for the materials beyond their mere relevance. Id. 39 We find no comparable "reasonable expectation of privacy" here. In fact, the appellant in this case is the type of person, by nature of his profession, who should least expect his personal financial records to remain private. Indeed the Supreme Court has noted that "adults ... who choose to participate in a 'closely regulated industry' ... have reason to expect intrusions upon normal rights and privileges, including privacy." Vernonia School Dist. 47J v. Acton, --- U.S. ----, ----, 115 S.Ct. 2386, 2393, 132 L.Ed.2d 564 (1995). 40 As every bank director should reasonably be aware, federal and state regulation of the banking industry is intense. Like an ordinary public corporation, the government regulates the relations between the directors and the shareholders. Unlike many other industries, though, in banking, there is additional and extensive governmental regulation of the relationship between banks and their depositors, including government insurance of the funds deposited. In fact, the history of the industry, since its collapse in the 1930s and subsequent regulation,3 should indicate to any persons assuming the responsibilities of directorship that they will constantly be dealing with the government and with government inquiries. These conditions indicate that Gimbel, as a person who was involved in "matters that were likely to be the object of governmental inquiry," McVane, 44 F.3d at 1137 (quoting United States v. Arthur Young & Co., 677 F.2d 211, 216 (2d Cir.1982), aff'd in part and rev'd in part on other grounds, 465 U.S. 805, 104 S.Ct. 1495, 79 L.Ed.2d 826 (1984)), may not now claim that he holds an expectation of privacy of a level demanding a standard more demanding than the Morton Salt standard. 41 Absent circumstances not present in this case, the Fourth Amendment requires no showing beyond the standard articulated in Morton Salt where the FDIC seeks the personal financial records of a director of a failed bank. McVane, 44 F.3d at 1138 n. 3. Provided that the investigation by the FDIC of the former directors of the failed First New York Bank for Business is within its statutory authority, the FDIC need not articulate an individualized suspicion of wrongdoing to obtain enforcement of its administrative subpoena duces tecum as suggested by Gimbel. Rather the FDIC need only make a showing that the materials sought are, in its view, "reasonably relevant" to its investigation. Morton Salt, 338 U.S. at 652, 70 S.Ct. at 369. B. Application 42 We now turn to the question of whether the materials sought by the FDIC subpoena satisfy the Morton Salt standard as interpreted by us in McVane. Applying McVane, we must determine only if "the inquiry is within the authority of the [FDIC], the demand is not too indefinite and the information sought is reasonably relevant." McVane, 44 F.3d at 1135 (quoting Morton Salt, 338 U.S. at 652, 70 S.Ct. at 369) (emphasis omitted). In McVane, after instituting an intermediate level of review for the records of the family members of the target, we applied the Morton Salt reasonable relevance inquiry with one further deviation. For records sought solely to determine a director's net worth for the purpose of determining the cost-effectiveness of bringing suit, the FDIC must set forth "at least an articulable suspicion that [the director] is liable to the failed institution." Id. at 1139 (quoting Walde, 18 F.3d at 949) (emphasis omitted). This requirement is not grounded in the Fourth Amendment, but rather in the grant of statutory authority to the FDIC to issue subpoenas. Id. 44 F.3d at 1140 ("Congress ... did not thereby 'intend[ ] to authorize the [FDIC] to browse among the private papers of citizens whose only sin had been to serve as officers or directors of defunct S & Ls.' ") (quoting Walde, 18 F.3d at 949). 43 The initial determination of what information is reasonably relevant is left to the investigating agency. The district court must enforce the subpoena unless the agency's determination of relevancy is "obviously wrong," McVane, 44 F.3d at 1135 (quoting Walde, 18 F.3d at 946), and we must accept any determinations made by the district court that are not clearly erroneous. Id. Thus wide latitude is given to the FDIC in determining relevancy. Gimbel challenges the relevancy of the subpoenaed materials as it applies to the four stated purposes of the Order of Investigation. 44 The FDIC Order of Investigation stated four purposes of its investigation. The stated purposes were to determine (1) whether the former FNYBB directors may be liable as a result of their actions and/or failures to act, (2) whether pursuit of litigation against the directors would be cost-effective in light of the directors' ability to pay any judgment obtained, (3) whether the FDIC should seek to avoid any asset transfers by the directors, and (4) whether the FDIC should attach the directors' assets. If each provision of the subpoena seeks information reasonably relevant to purposes one, three or four, we need not reach the question of the propriety of information as it relates to purpose two. As we stated in McVane, "[e]ven if the Directors can show that one purpose underlying the subpoenas is improper, enforcement of the subpoenas is called for nonetheless so long as other, proper purposes exist." Id. at 1139. 45 The showing made by the FDIC in support of its subpoena duces tecum consisted of an affidavit offered by an FDIC investigator, David A. Leahy. The affidavit stated, in pertinent part: 46 8. I have reviewed certain losses sustained by the Bank resulting from insider loans approved and/or ratified by certain directors of the F[NY]BB, including Mr. Gimbel. The insider loans have resulted in losses of approximately 40 million dollars to the Bank. These loans were originated, approved and/or ratified by the directors after the Bank had received regulatory warnings regarding its loan practices. 47 9. The extent and nature of the losses sustained by the Bank on the insider loan transactions suggest that the directors, including Mr. Gimbel, were grossly negligent and violated their fiduciary duty of loyalty to the Bank by approving and/or ratifying the insider loans. 48 .... 49 11. The records sought by the subpoena duces tecum, largely current financial documents, are relevant to the investigation directed by the Order of Investigation, and are not already in the possession of the FDIC. The FDIC's receipt and examination of these documents is necessary to allow the FDIC to determine whether Mr. Gimbel may be liable as a result of his actions or inaction; whether Mr. Gimbel may have transferred assets under circumstances in which the FDIC should attempt to avoid the transfers; whether the FDIC should seek to attach any assets of Mr. Gimbel and; whether any litigation initiated by the FDIC against Mr. Gimbel would be cost-effective. 50 We address Gimbel's challenges to the showings made by the FDIC regarding the relevance of his personal financial records to each of the FDIC's stated purposes in turn. 1. Determining Gimbel's Liability 51 Gimbel claims that because he never received any personal loans from FNYBB, his personal financial records can have no relevance to the FDIC's investigation of improper insider loans. FDIC correctly points out that there are many ways a director can benefit from approving improper loans, not all of which involve direct loans to the director. For instance, a kickback scheme could be uncovered based on payments to Gimbel from those who may have received improper loans. Under the McVane standard, no individualized suspicion need be advanced by the FDIC, rather the agency may request the information merely to assure themselves the law has not been broken. McVane, 44 F.3d at 1135 (analogizing the agency subpoena power to that of grand juries). The FDIC's desire to assure itself that Gimbel was engaged in no wrongdoing is sufficient under McVane and Morton Salt. This sweeping power is what led the Parks majority to demand an "articulable and individualized suspicion" of wrongdoing before enforcing the subpoena. While we understand the Parks majority's concerns regarding the vesting of such broad power in the FDIC, Congress has given it to the FDIC, and its proper exercise is not unreasonable under the Fourth Amendment. 2. Whether to Avoid Asset Transfers 52 Appellant claims that the FDIC's authority to seek his records for purposes of determining whether to avoid certain asset transfers is limited to obtaining information regarding assets wrongfully obtained from FNYBB on the grounds that the FDIC's statutory power to avoid asset transfers is limited to those transfers involving assets "wrongfully obtained" from FNYBB. The District of Columbia Circuit rejected this argument in Linde Thomson Langworthy Kohn & Van Dyke v. RTC, 5 F.3d 1508 (D.C.Cir.1993), based on the plain language of the authorizing statute, 12 U.S.C. § 1821(d)(17)(A). The statute reads, in pertinent part: 53 The [FDIC] ... may avoid a transfer of any interest of an institution-affiliated party ... that was made within 5 years of the date on which the [FDIC] was appointed ... receiver if such party ... made such transfer ... with the intent to hinder, delay, or defraud the [FDIC]. 54 12 U.S.C. § 1821(d)(17)(A). The statute clearly authorizes the FDIC to avoid any transfer made by Gimbel with the intent to defraud the FDIC. Thus, the FDIC's investigative powers extend to any transfer. Linde Thomson, 5 F.3d at 1517. Gimbel's reliance on the statements of Congressman Schumer to the effect that the statute is intended to allow the FDIC to freeze assets "wrongfully obtained," 136 Cong.Rec. E3684-02 (1990) (remarks by Representative Schumer), does not justify a departure from the plain language of the statute, which authorizes the avoidance of any asset transfer intended to hinder the FDIC's investigation. 3. Whether to Attach Assets 55 Gimbel argues that because the FDIC has no authority to freeze his assets before proving to a court that there is a likelihood of the FDIC's success on the merits, that FDIC has no right to investigate whether to freeze his assets until a preliminary finding of liability has been made. The District of Columbia Circuit in Walde considered the propriety of the FDIC's stated purpose of making a determination whether to freeze McVane's assets and held that it was proper for the FDIC to investigate the possibility of a freeze even though no specific allegation of wrongdoing had been made. Walde, 18 F.3d at 947. The Walde Court stated that "[t]o require the RTC to make such a preliminary determination of liability before subpoenaing documents ... would seriously hamper the agency's ability to locate and save a failed institution's assets." Id.; RTC v. Greif, 906 F.Supp. 1446, 1454 (D.Kan.1995). Gimbel's records are reasonably relevant to the FDIC's proper stated purpose of determining whether to freeze his assets. The FDIC's authorizing statute gives it the power to attach assets, and the FDIC included such purpose in its Order of Investigation. Clearly, the asset information sought is directly related to the decision whether to attach assets. Linde Thomson, 5 F.3d at 1517. 4. Cost-Effectiveness of Bringing Suit 56 McVane set a higher standard that the FDIC must meet in justifying subpoenas issued solely to determine the cost-effectiveness of litigation against a target. McVane held that the agency must "articulate specific grounds for its suspicion of liability." McVane, 44 F.3d at 1140. In McVane, an FDIC inspector submitted an affidavit declaring that the Bank in question lost $9 million due to improper insider loans that were originated and approved by the directors after they had been warned by regulatory agencies about their practices. The inspector further declared that another director (not McVane) had transferred millions of dollars worth of real estate to family members after the Bank failed. Id. We held that this was "more than sufficient to support the FDIC's request for information concerning [all] the Directors' net worth." Id. 57 The facts in this case are similar to those presented in McVane. Inspector Leahy declared many of the same grounds for suspicion in this case, namely, that the board of directors originated and approved improper insider loans that resulted in losses of $40 million, that these loans were approved after warnings against such practices were received from regulatory agencies, and that the nature of the losses suggest that the directors were grossly negligent in their actions and/or failures to act. The lack of an allegation in this case that a director transferred large amounts of real estate to a family member does not distinguish McVane in any meaningful way. It might be argued that one director's transfer of millions of dollars in real estate to family members suggesting the possibility of widespread director misconduct distinguishes McVane from the case at hand. This argument is not persuasive. The allegations of improper approval of loans by FNYBB directors are sufficient to cast suspicion of impropriety on all of the directors even without the asset transfer alleged in McVane. The lack of the additional allegation of wrongdoing present in McVane is not enough to remove this case from McVane 's authority. That standard was met here. CONCLUSION 58 For the reasons stated above, the judgment of the district court is affirmed. 1 For a discussion of the course of a typical FDIC investigation, see James T. Pitts, et al., FDIC/RTC Suits Against Bank and Thrift Officers and Directors--Why Now, What's Left?, 63 Fordham L.Rev. 2087, 2094-95 (1995) 2 See Vernonia School Dist. 47J v. Acton, --- U.S. ----, ----, 115 S.Ct. 2386, 2393, 132 L.Ed.2d 564 (1995) ("Somewhat like adults who choose to participate in a 'closely regulated industry,' students who voluntarily participate in school athletics have reason to expect intrusions upon normal rights and privileges, including privacy.") (citing Skinner v. Railway Labor Executives Ass'n, 489 U.S. 602, 627, 109 S.Ct. 1402, 1418-19, 103 L.Ed.2d 639 (1989) (holding constitutional a statute making railroad workers subject to urinalysis without warrant or individualized suspicion), and United States v. Biswell, 406 U.S. 311, 316, 92 S.Ct. 1593, 1596, 32 L.Ed.2d 87 (1972) (upholding statutorily authorized search of pawn shop licensed to sell firearms made without warrant or individualized suspicion)) 3 See Michael P. Battin, Note, Bank Director Liability Under FIRREA, 63 Fordham L.Rev. 2347, 2370-77 (1995) (tracing the beginnings and development of government regulation of the banking industry from the 1930s to the present)
Q: Does Starfleet have the ability to let men carry babies? In Star Trek Voyager “Friendship One” (season 7, episode 21), a heavily pregnant Torres and Paris are arguing about her going down to an irradiated planet. Paris does not want her to go because she is 6 months pregnant, the atmosphere was toxic and that she was “breathing for two”. She agrees not to go on the condition that the next time they are pregnant, that Paris carry it and she can go on away missions. Is this something that is possible in the Star Trek universe? A: We don't know Certainly, it's possible science has advanced far enough to allow men to carry children although I suspect the mechanics would be complex. We know that the first recorded male pregnancy (in Star Trek) was that of Charles "Trip" Tucker in Star Trek: Enterprise in the episode Unexpected but even that wasn't a human/human pregnancy. Tucker meets Ah'len, the Xyrillian engineer. They become ever more friendly while repairing the ship. Ah'len takes him to a holodeck to show him Thera, the Xyrillian homeworld. During the tour, Ah'len engages in a seemingly innocent game that allows them to share their thoughts and desires. When the repairs are completed and Tucker returns, he notices a strange growth on his wrist. He visits Phlox, who tells him that he is pregnant (though Phlox also states no genetic material is taken from the male involved). T'Pol later reminds Tucker that his was "the first recorded instance of a human male pregnancy". Wikipedia It seems unlikely, at least to me, that medicine would advance that quickly between Enterprise and Voyager but it's possible. However, I suspect that B'Elanna's comment to Tom was intended more as a "You owe me one" comment rather than to be taken literally.
/* * Copyright (C) 2008 Apple Inc. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of Apple Inc. ("Apple") nor the names of * its contributors may be used to endorse or promote products derived * from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #pragma once #include "Label.h" namespace JSC { class Identifier; class LabelScope { WTF_MAKE_NONCOPYABLE(LabelScope); public: enum Type { Loop, Switch, NamedLabel }; LabelScope(Type type, const Identifier* name, int scopeDepth, Ref<Label>&& breakTarget, RefPtr<Label>&& continueTarget) : m_refCount(0) , m_type(type) , m_name(name) , m_scopeDepth(scopeDepth) , m_breakTarget(WTFMove(breakTarget)) , m_continueTarget(WTFMove(continueTarget)) { } Label& breakTarget() const { return m_breakTarget.get(); } Label* continueTarget() const { return m_continueTarget.get(); } Type type() const { return m_type; } const Identifier* name() const { return m_name; } int scopeDepth() const { return m_scopeDepth; } void ref() { ++m_refCount; } void deref() { --m_refCount; ASSERT(m_refCount >= 0); } int refCount() const { return m_refCount; } bool hasOneRef() const { return m_refCount == 1; } bool breakTargetMayBeBound() const { if (!hasOneRef()) return true; if (!m_breakTarget->hasOneRef()) return true; return m_breakTarget->isBound(); } private: int m_refCount; Type m_type; const Identifier* m_name; int m_scopeDepth; Ref<Label> m_breakTarget; RefPtr<Label> m_continueTarget; }; } // namespace JSC
Pulmonary development in the fetal one-humped camel: morphometry. The structural development of the fetal camel lung is described and quantified morphometrically in this report. During fetal development the lung weight and volume increased polynomially with body length. The correlation coefficient between lung weight and body length is +0.991, and between lung volume and body length is +0.995. Volume density of the future bronchial tree showed a progressive increment with gestational age and is relatively higher in male than female fetuses, and the differences are statistically significant at 340-420 mm CRL. The proportion of lung tissue occupied by saccular airspaces increased enormously during the canalicular and alveolar stage, and the differences between both sexes are statistically significant at the former stage. The number of alveoli per unit area correlates closely with body length (r = +0.928) and the correlation coefficient between alveolar diameter and body length is +0.991. On the other hand, the correlation coefficient between the number of alveolar ducts per unit area and body length is -0.993, and is about +0.977 between the diameter of alveolar ducts and body length.
Induction and Isolation of Auxotrophic Mutants in Somatic Cell Cultures of Nicotiana tabacum. A method for the selection of auxotrophic mutants from somatic cell cultures of Nicotiana tabacum depends upon the incorporation of 5-bromodeoxyuridine into the DNA of wild-type cells and upon its lack of incorporation into the DNA of auxotrophic cells. There may be more than one functional copy of essential genes in the haploid genome of Nicotiana tabacum.
Alina Shukh Alina Anatolyivna Shukh () (born 12 February 1999) is a Ukrainian heptathlete. She competed in the women's heptathlon at the 2017 World Championships in Athletics. References External links Category:1999 births Category:Living people Category:Ukrainian heptathletes Category:World Athletics Championships athletes for Ukraine Category:Place of birth missing (living people) Category:Ukrainian female javelin throwers
Proteasome inhibitors abolish cell death downstream of caspase activation during anti-microtubule drug-induced apoptosis in leukemia cells. Anti-microtubule drugs and proteasome inhibitors are currently among the most intensively studied anti-tumor agents, however little is known about their pharmacological interactions at the cellular level. The human promyelocytic leukemia cell line, HL-60, was exposed to nocodazole or etoposide in combination with proteasome or caspase inhibitors. Apoptotic cell death was detected by flow cytometry as sub-G1 population. Caspase and proteasome activities were monitored by the fluorogenic substrates Ac-DEVD-AMC and Suc-LLVY-AMC, respectively, in cell lysate. Heat shock protein 70 (HSP70) expression was determined by Western blotting. Nocodazole, a microtubule inhibitor, induced caspase-dependent apoptosis in the HL-60 cell line. At sub-cytotoxic concentrations, proteasome inhibitors, including MG-132 or clasto-beta-lactone, decreased nocodazole-induced apoptotic DNA fragmentation without affecting the induction of caspase-3 activity. In contrast, MG-132 decreased both DNA fragmentation and caspase activation induced by etoposide, a topoisomerase-II inhibitor. HSP70 had previously been found to inhibit apoptosis independently from caspase activation. In this study, MG-132 up-regulated HSP70 protein expression, both in the presence or absence of nocodazole. Proteasome inhibitors decreased anti-microtubule agent-induced apoptotic DNA fragmentation downstream of caspase-3 activation, possibly due to increased HSP70 expression. The results indicate that combination treatment with these novel anti-tumor agents in leukemia requires careful evaluation of their molecular interaction at the level of apoptosis induction.
Improve Your Golfing Swing With These Suggestions! Improve Your Golfing Swing With These Suggestions! When you are looking for a new exercise to enjoy the outdoor, the match of golf provides a entertaining and thrilling recreation. You can appreciate new air, pleasant opposition, and a comforting activity when it will come to golf. Enjoying golf provides your physique a training, but also problems your mind, as nicely. Utilize these beneficial hints to your golfing game, and you are certain to discover a new really like for the match. A beneficial suggestion when it will come to golfing is that it is good to know that there will often be any individual much better than Cheap Jerseys 90 . This is NBA Basketball Jerseys because you do not want to be dealt a crushing mental blow if you are competing and uncover by yourself outmatched. Golfing is a psychological recreation that calls for significantly planning. A useful idea when it will come to golf is to make sure that you usually hold an eye on your golfing golf equipment although at the course. This is essential due to the fact owing to the benefit of several golfing golf equipment, someone else most likely presently has their eye on them and might just take them at their initial possibility. To inspect your foot placement when planning for a golf swing, permit your club fall naturally to touch your toes. The alignment of the club when it drops will present you in which the ball is heading to go if your swing has great kind. Hold the two toes in line with NFL Jerseys Authentic , to make your toes perform towards correct hitting. A very good way to preserve continual enhancement in your golf recreation is to concentrate on attempting new items instead of obsessing over tactics you have troubles with. Not each golfer can grasp every single subtlety of the match. Alternatively of ramming into a wall more than and over, hold your head up and appear out for alternative paths around the impediment. A valuable idea when it will come to golfing is to consider playing a golfing video clip game if you are unfamiliar with golfing. This is a excellent understanding tool to assist you understand the rules, club choice, and overall really feel for the game. Of system this will do tiny to no support with your genuine functionality but it is a great introduction to the game. Always remain targeted on the next shot. Don't permit other players' or even your personal very good or bad shots result the up coming one particular you consider. When you do make a error, just consider observe of what you did mistaken. From there make the adjustments needed to be successful you don't want to permit them consume you. Throughout your back again swing, try out imagining your proper hand in a hitchhiker situation. To examine this, look at your proper hand when the club is at waist top- you must see your thumb pointing upward. One more tip is to envision your hand in a handshake place, with the palm perpendicular to the ground. The again swing of a golf swing is just as critical as the front swing- it need to be gradual and controlled. Amateurs will are likely to bring the club again quickly and jerkily with the wrists, which compromises the complete swing. Deliver it back in a controlled style with the arms to commence your swing off appropriate. Now that you have read through via some helpful suggestions about golfing, you are prepared to strike the training course! Remember that learning to golfing requires time, so be patient with yourself and employ the info in this report and you will be well on your way to golfing like Tiger Woods.
Recurrence after a first untreated seizure in the Hong Kong Chinese population. There is wide variation in the reported prognosis after a first unprovoked generalized tonic-clonic convulsion and in the risk factors that are associated with recurrence. Estimates for the risk of recurrence range from 26 to 71%. We investigated the likelihood of a second attack in Hong Kong Chinese patients. One hundred thirty-two patients with a first convulsion that was unexplained by acute neurological or medical causes were retrospectively ascertained. Patients' demographic details, potential risk factors for recurrence, and current seizure status were recorded. Survival analysis was performed using the Kaplan-Meier procedure. The cumulative probability of a second attack at 1, 2, 3, and 4 years was 30, 37, 42, and 47%, respectively. Seizures in patients with abnormal computer tomography scans of the brain were associated with an increased risk of recurrence on multivariate analysis. Thirty percent of the sample population experienced a second seizure after 1 year. An additional 17% continue to be at risk of a second convulsion during the next 3 years.
/* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */ #ifndef __SHELL_EMBEDDED_WINDOW_H__ #define __SHELL_EMBEDDED_WINDOW_H__ #include <gtk/gtk.h> #include <clutter/clutter.h> #define SHELL_TYPE_EMBEDDED_WINDOW (shell_embedded_window_get_type ()) G_DECLARE_DERIVABLE_TYPE (ShellEmbeddedWindow, shell_embedded_window, SHELL, EMBEDDED_WINDOW, GtkWindow) struct _ShellEmbeddedWindowClass { GtkWindowClass parent_class; }; GtkWidget *shell_embedded_window_new (void); #endif /* __SHELL_EMBEDDED_WINDOW_H__ */
The IMT (International Marxist Tendency) is a British based orthodox Trotskyist party. They have a branch in the US called the WIL, or Workers’ International League. This US branch has a branch here in Saint Louis. To their credit, the overwhelming majority of their members (I think they have like 6 or 7), are fairly decent personally, which is more than can be said for most Trotskyists, anyway. They show up to events, sell their papers, chant, and go home. Harmless enough, at least better than the other Trotskyist group here. That being said, personability doesn’t make up for horrible politics and positions. I came across a particularly atrocious “historical piece” from their website last week, titled China’s Long March to Capitalism. Now, I’m used to Trotskyist historical revisionism and hysterics whenever a revolution led by a party that doesn’t believe that Stalin was the most horrible man ever that singlehandedly oppressed and ate 30 million people down to the marrow comes to a successful conclusion, but this is some extra shit even for Trotskyists. Let’s take a look. The article starts off by, grudgingly, stating that the Chinese Revolution was the second most important event in history, and goes on to state that it led to the abolition of landlordism and capitalism and with it the abolition of imperialist domination in a huge area of the globe. It’s fundamentally downhill from there. It goes on to state: However, whereas the Russian revolution led to the setting up of a relatively healthy workers’ state established by the working class under the leadership of the Bolshevik party ‑ a revolutionary party with an internationalist outlook ‑ the 1949 Chinese Revolution led to the immediate setting up of a Stalinist deformed workers’ state. Why did the Russian Revolution lead to the setting up of a relatively healthy workers’ state established by the working class, but the Chinese Revolution led to the immediate setting up of a “Stalinist deformed workers’ state?” Simple, because Trotsky was involved in the first and wasn’t in the second. The IMT asserts and arrogates for Trotsky a key and gamechanging role in the October Revolution, second only to Lenin. Trotskyists have a habit of defining “pure” socialism as anything that Trotsky had an even marginal role in, while denigrating anything that “Stalinists” played a leading role in. To do so they engage in remarkable mental and written gymnastics, outright manufacture of lies, and historical revisionism. The article goes on to boldly proclaim: The most elemental conditions of workers’ democracy were lacking right from the very beginning. There were neither Soviets, nor workers’ control, nor real labour unions independent of the State, nor an authentic Marxist leadership. This was because the revolution was carried out under the leadership of the Stalinists at the head of a peasant army and was not based on the working class in the cities. This is another boldfaced falsehood. What is “authentic Marxist leadership”? Apparently, to Trotskyists, not endangering one’s revolution, putting the lives of millions of people at risk, and adapting to conditions to ensure the success and victory of the revolution makes one not an “authentic Marxist”. This is part of why Trotskyism had no standing in the Black liberation struggle that waxed in the 1960s and early 1970s. Stale dogma that is to be mechanically applied and swallowed whole, negating or playing down actually existing conditions simply didn’t and doesn’t hold up in regards to the liberatory mission of the Black masses in the United States. Those who take Marxism as a guide to action for liberation, not a dogma or a blueprint, and are creative in application, are the authentic Marxists. The Trotskyist line on the military aspects of the Chinese Revolution, represented by Chen Duxiu, a founder of the Chinese Communist party, which is reprinted here in the call for basing the revolution on the working class in the cities and struggling within the Kuomintang to take over the leadership, was thoroughly shown as baseless and incorrect, and almost resulted in the destruction of the Communist Party when put into practice. This is another Trotskyist trademark, continuing to push failed lines and tactics despite their being defeated time and again. Mao Zedong and the Chinese Stalinists formed a state in China in the image of Stalinist Russia – a monstrous bureaucratic caricature of a workers’ state and therefore the Chinese Revolution of 1949 began where the Russian Revolution ended. We have to remember that the Chinese revolution abolished capitalism in China in spite of the perspectives of the leadership of the Chinese Communist Party. Mao’s original perspective was that of one hundred years of capitalism. He had the Stalinist two-stages theory that stated that in a backward underdeveloped country socialist revolution was not possible and therefore the first stage would be “democratic”, i.e. bourgeois. Only after capitalism had developed would the struggle for socialism become possible. This theory was to be disproved by what happened once the Chinese Communists came to power. Mao simply never said that there would be “one hundred years of capitalism”. What he did say, however, in On New Democracy (1940) was that: This new-democratic republic will be different from the old European-American form of capitalist republic under bourgeois dictatorship, which is the old democratic form and already out of date. On the other hand, it will also be different from the socialist republic of the Soviet type under the dictatorship of the proletariat which is already flourishing in the U.S.S.R., and which, moreover, will be established in all the capitalist countries and will undoubtedly become the dominant form of state and governmental structure in all the industrially advanced countries. However, for a certain historical period, this form is not suitable for the revolutions in the colonial and semi-colonial countries. During this period, therefore, a third form of state must be adopted in the revolutions of all colonial and semi-colonial countries, namely, the new-democratic republic. This form suits a certain historical period and is therefore transitional; nevertheless, it is a form which is necessary and cannot be dispensed with… Communism is at once a complete system of proletarian ideology and a new social system. It is different from any other ideology or social system, and is the most complete, progressive, revolutionary and rational system in human history. The ideological and social system of feudalism has a place only in the museum of history. The ideological and social system of capitalism has also become a museum piece in one part of the world (in the Soviet Union), while in other countries it resembles “a dying person who is sinking fast, like the sun setting beyond the western hills”, and will soon be relegated to the museum. The communist ideological and social system alone is full of youth and vitality, sweeping the world with the momentum of an avalanche and the force of a thunderbolt. The introduction of scientific communism into China has opened new vistas for people and has changed the face of the Chinese revolution. Without communism to guide it, China’s democratic revolution cannot possibly succeed, let alone move on to the next stage. This is the reason why the bourgeois die-hards are so loudly demanding that communism be “folded up”. But it must not be “folded up”, for once communism is “folded up”, China will be doomed. The whole world today depends on communism for its salvation, and China is no exception. Everybody knows that the Communist Party has an immediate and a future programme, a minimum and a maximum programme, with regard to the social system it advocates. For the present period, New Democracy, and for the future, socialism; these are two parts of an organic whole, guided by one and the same communist ideology. Is it not, therefore, in the highest degree absurd to clamour for communism to be “folded up” on the ground that the Communist Party’s minimum programme is in basic agreement with the political tenets of the Three People’s Principles? It is precisely because of this basic agreement between the two that we Communists find it possible to recognize “the Three People’s Principles as the political basis for the anti-Japanese united front” and to acknowledge that “the Three People’s Principles being what China needs today, our Party is ready to fight for their complete realization”; otherwise no such possibility would exist. Here we have a united front between communism and the Three People’s Principles in the stage of the democratic revolution, the kind of united front Dr. Sun Yat-sen had in mind when he said: “communism is the good friend of the Three People’s Principles.” To reject communism is in fact to reject the united front. The die-hards have concocted absurd arguments for the rejection of communism. Just because they want to reject the united front and practice their one-party doctrine. New Democracy is a specific, anti-imperialist, transitional stage for semi-colonial and colonial countries, not “100 years of capitalism”. It’s explicitly a break with the old bourgeois-democratic revolution, the era of which ended with WWI. There was never any withdrawal or “folding up” of communism. Nor did he have any phony illusions about the fact that China was to be a socialist country, and certainly didn’t embrace a line that stated that capitalism must first develop fully in China before socialism could exist. The principles of New Democracy are developed to loose colonial/semi-colonial countries from the shackles of imperialism, and are derived from the actual experience of making revolution in a country of that type. The Trotskyists’ Eurocentered dogma, divorced from reality and conditions, simply doesn’t hold good for making revolution in countries like China and Vietnam, where the primary contradiction was between the imperialists and their comprador lackies and the masses of freedom loving people who sought to destroy imperialism.The New Democratic Revolution is a part of the world proletarian socialist revolution, an ally and fighting comrade of the proletariat in capitalist countries. The IMT can’t fathom the New Democratic Revolution because they’re wrenched from the reality of the masses of people in the world who struggle in semi-feudal, semi-colonial conditions and instead choose to center themselves squarely in Europe. To them, all worthwhile development of theory or practice (which is notoriously scanty) ended with the death of Trotsky in 1940. The article goes on to say: However, the bureaucracy had many shortcomings. In particular it had a narrow nationalist outlook which was characteristic of all the Stalinist regimes. Had China and Russia been genuine workers’ states they would have come together in a Socialist Federation with the countries of Eastern Europe and developed an international plan of production using in a combined and rational manner the human and material resources of all these countries. Instead ‑ as the Marxists had predicted ‑ the national outlook of both the Chinese and Soviet bureaucracies eventually brought about a conflict. This led to the Sino-Soviet split in 1960. The Soviet bureaucracy had attempted to bring China within its “sphere of influence”. This the Chinese bureaucracy could not tolerate and as Mao had not come to power on the basis of an advancing Russian army (as in most East European countries) he had his own independent base similar to that of Tito. The Marxists in fact pointed out at the time that Stalin would have another Tito on his hands. As the conflict erupted, the Russian Stalinists withdrew all their aid, experts and so on, dealing a serious blow at Chinese development at the time. It was after this that the Chinese bureaucracy embarked on the utterly reactionary road of autarchy, isolating China from the rest of the world economy and thus from the international division of labour. Where’s the narrow nationalist outlook? Every honest Communist knows that the People’s Republic of China in the Socialist era offered material assistance and support out of the spirit of proletarian internationalism to liberation movements and newly liberated countries around the world, from Vietnam to Cuba. It was also a firm friend of the Black liberation struggle waged in the United States. Socialism can exist in one country, this is what meshes with the facts regardless of the Trotskyists’ hysterical yammerings to the contrary. Class struggle continues under socialism and antagonistic classes continue to exist, those who would restore capitalism must be struggled against, bourgeois rights (discrepancies between mental and manual labor, etc.) must be combated and restricted, and communist relations must be consciously enacted through relying on and using the enthusiasm of the masses of workers and peasants for socialism. This is what the Chinese experience of socialist construction teaches us. Socialism can exist, and must be defended against capitalist restoration from newly engendered capitalist elements.The Trotskyite article also, annoyingly and arrogantly, continues to call the Trotskyists of this time “the Marxists”, and calls the Chinese path to socialist development and self sufficiency “autarky”. Perhaps if the PRC should have relied on the Trotskyists’ exports of arrogant bluster and bombast and newspapers! This article also simplifies the Sino-Soviet split, the worsening of relations due to the two-line struggle between the Soviet revisionists under Nikita Khrushchev and Leonid Brezhnev, portraying it simply as a conflict between two stagnant, Stalinist deformed workers’ states. No mention of the capture of state power in the USSR by the bourgeoisie represented by Khrushchev and the attack on Stalin’s legacy in 1956 is made, nor is the Chinese Communist Party’s response and subsequent back and forth struggle between revisionism and actual genuine Marxism-Leninism seriously engaged with or discussed. What there is plenty of, however, is hollow and baseless dogmatic blustering and arrogance that is rooted in nothing material or real. This is especially obvious once the section “dealing” with the Great Leap Forward and the Cultural Revolution is read. Between 1949 and 1957 average annual growth rate of the Chinese economy was 11%, and in the period from 1957 to 1970, industrial production continued to grow at 9%, far higher than in the capitalist world (in the same period India’s growth rate was less than half that of China’s.) In 1952 China was still only producing 1000 tractors per year, an indication that agriculture was still very primitive. By 1976 China was producing 190,000 tractors per year. All this was achieved in spite of the disruption of adventures such as the Great Leap Forward in 1958 and the Cultural Revolution in 1966. The Great leap Forward was responsible for a serious drop in agricultural production, leading to a famine that took the lives of 15 million Chinese and between 1967 and 1968 there was a fall of 15% in industrial production, producing a sharp fall in the living standards of the masses. After these two major disruptions in economic development, the economy recovered thanks to the state plan. Apparently, attempts to rectify that which the Trotskyists criticize “Stalinism” for are simply disruptive adventures. Deng Xiaoping, Liu Shaoqi, Peng Dehuai, and Lin Piao agree, as does Confucius. The Eurocentric and dogmatist Trotskyists can’t fathom the construction of socialism outside of their hard nosed and shamefully Eurocentric (which the IMT has a fig leaf for in the form of a relatively active branch in Pakistan) dogma. The Great Leap Forward had errors, like all new things. The general line was to shift emphasis away from overfocus on heavy industry to promote development of agriculture and light industry, which would provide a base for the building of heavy industry (this was a rectification of a major error of Stalin’s), reduce the gap between town and countryside, and between the people, particularly between worker and peasant. Essentially, it was a revolution not just in economics, but in technology, politics, society and culture to fundamentally transform both town and countryside. This movement resulted in the organization of millions of people into communes, which undertook projects ranging from manufacture of tractors to forestry projects. Left deviations, the “communist wind”, such as efforts to collectivize small articles of peasant property, such as chickens and pigs, levelling off of “poor” and “rich” production brigades (which caused resentment among the latter, and excessive demand for labor without compensation/capital accumulation to the detriment of the peasants in regards to shares were the three major errors. These errors were corrected, and the Great Leap Forward was a major advance in revolutionizing the face of China. This was no adventure, this was revolution. The Cultural Revolution was the furthest advance of socialism to date, with the masses of Chinese workers and peasants taking active roles in advancing communist relations, criticizing and actively struggling against capitalist restoration in the country, and revolutionizing the structure of society, with workers managing factories and cadres engaging in production, students revolutionizing schools, and the mass movements unfolding massive criticism of revisionists within the party and within society. Obstinate party bureaucrats, the bane of the Trotskyists, were overthrown, and millions of people made revolution in all aspects of society. But, it was an adventure that stymied China, so say the Trotskyists! This shows, again, the limitations and stubbornness of their dogma, and they unite with revisionists and capitalist reactionaries the world over in portraying the Cultural Revolution as a mass purge of bureaucrats personally commanded by Mao himself, who is constantly called a Bonapartist dictator. Although the planned economy allowed the Soviet Union to make tremendous progress in the development of the means of production, it still lagged far behind the advanced capitalist countries. But so long as the bureaucracy was developing the productive forces a relative stability was guaranteed to the Stalinist regime. Indeed in the 1930s not only were the productive forces being developed, they were developing at a much faster rate than in the capitalist world. This explains the resilience of the Stalinist regime in that period and also why the pro-capitalist tendencies within the bureaucracy could not yet crystallize into a viable force. Trotsky, however, also explained that at a certain stage in its development the bureaucracy, from being a relative fetter, would become an absolute fetter on the development of the means of production. The rate of growth would slow down and this would reopen the possibility of capitalist restoration. This is what happened in the 1960s and 1970s. Economic growth in the Soviet Union first slowed to a level comparable to that of the capitalist West and then ground to a halt. The Trotskyists here unite with Deng Xiaoping style revisionists and capitalist roaders, who also embraced the economistic “theory of productive forces” and didn’t grasp the necessity of relying on the masses of people, making revolution in the superstructure, and grasping revolution to promote production, instead putting experts and development of the productive forces in command. This was a major criticism of Stalin (who initially obtained this bad line, and others, in the first place from Trotsky himself), expressed by Mao: “For a long time Stalin refused to recognize that under the socialist system contradictions between the relations of production and the forces of production and contradictions between the superstructure and the economic base continue to exist. It was only when he wrote Economic Problems of Socialism in the USSR one year before his death that he hesitantly discussed the contradictions between the relations of production and the forces of production under the socialist system and said that if policies were incorrect or improperly regulated, problems would arise. Even so, he still did not present [the problem of] contradictions under a socialist system between the relations and the forces of production and between the superstructure and the economic base as an issue of overall significance, he still did not recognize that these contradictions are the basic contradictions that propel socialist society forward. He thought that his state was secure. We mustn’t think that the state is secure; it is secure and, at the same time, insecure.” Essentially, this long screed is an example of the dead ended, Eurocentric, and frozen in time nature of Trotskyism as an ideology. While the Chinese Revolution and the socialist construction experience from 1949-1976 produced several new and universal military, philosophical and theoretical contributions to the arsenal of the world proletariat in the long march to the worldwide victory of Communism, Trotskyism as represented by the International Marxist Tendency is, fundamentally, a relic that has nothing of note or of import to offer the liberation project. It is rooted historically and theoretically in the Europe of the early 20th century, and, instead of adapting to changing conditions and developments, chooses instead to stubbornly remain rooted in the mind of a defeated man who undoubtedly participated with some distinction in the revolutionary project in Russia, but who held horribly incorrect lines and turned around theories, and was wrong more often than not the results of which were, ironically, shown to be flawed in practice when tested on that field by Stalin. This article and others where the IMT tries to tackle the Chinese Revolution are marked by dishonesty, divorce from reality, and an obvious lack of investigation free from dogmato-sectarian cherrypicking, and oftentimes delves into ludicrous fantasy, exemplified in the closing to another article. On the basis of experience, the Chinese workers, peasants, students and intellectuals will rediscover the great revolutionary traditions of the past. The new generation will embrace the ideas of Marx, Engels, Lenin, Trotsky and Chen Duxiu, the founder of Chinese Communism and its true heir. Napoleon once said of China: “When this giant awakens, the world will tremble.” We echo these words, with an amendment: the giant that is destined to shake the world is none other than the mighty Chinese proletariat. We look forward with impatience to the hour of that awakening. Indeed.
In many known vacuum cleaners a motor powered either by a mains electricity supply or a battery pack, which may be rechargeable, rotatingly drives a fan. The fan generates an airflow within which particles of dust and debris to be collected by the vacuum cleaner become entrained. The airflow generally enters the vacuum cleaner via an inlet nozzle and passes through a filter so that particles of dust and debris entrained in the airflow are removed from the airflow by the filter and are collected in a collecting chamber. A problem with this type of vacuum cleaner is that after some use the pores of the filter can become blocked by particles of dust and debris which tend to bind together to form relatively large conglomerations. Once the filter becomes blocked the airflow through it is reduced and the suction power of the vacuum cleaner is reduced. In its simplest form the filter can be a piece of woven polyester material supported in a frame and located between a collecting chamber and the fan. Such a simple filter will filter out the majority of particles of dust and debris from the airflow drawn into the fan, some of which particles then drop into the collecting chamber. However, such simple filters do tend to become blocked relatively quickly and can be ineffective to filter out smaller particles of dust and debris from the airflow. Improved filters are known in which the filter comprises an accordian-like or “concertina” of filter material, in order to increase the surface area of the filter while not taking up too much space within the vacuum cleaner. However, these can also become blocked through use and the folds in the concertina of filter material provide crevices in which conglomerations of particles of dust and debris can accumulate. In such filters the filter material has to be made of materials which maintain their shape once folded, which can increase the expense of the filter material used, particularly if a fine filter is required. It is important that the filter arrangement used in the vacuum cleaner is effectively sealed within the housing of the vacuum cleaner so that none of the airflow within which dust and debris is entrained leaks around the sides of the filter. It is desirable that all the airflow through the fan passes through the filter so that all the particles of dust and debris entrained in the airflow are filtered out and collected in a collecting chamber. Such a seal for a filter will have to be effective throughout the lifetime of the vacuum cleaner and may have to withstand regular disassembly of the parts of the vacuum cleaner surrounding it in order that the collecting chamber can be emptied, and possibly so that the filter itself can be cleaned. In some vacuum cleaners the filter is regularly removed from the housing of the vacuum cleaner so that it can be cleaned. In such vacuum cleaners it is desirable to be able to remove and replace the filter easily and without reducing the strength of any seal between the filter and components of the vacuum cleaner surrounding it. However, the need for the user to physically handle the filter element to clean same is a drawback. A first aspect of the present invention seeks to overcome some of the problems discussed above by providing a filter arrangement for a vacuum cleaner which is less vulnerable to blocking by particles of dust and debris. A second aspect of the present invention seeks to overcome some of the disadvantages discussed above by providing a high surface area and low volume filter in which relatively inexpensive, flexible, fine filter material can be used. A third aspect of the present invention seeks to overcome some of the problems discussed above by providing a filter arrangement with improved sealing to adjacent components. A fourth aspect of the present invention seeks to overcome some of the disadvantages discussed above by providing a releasable fixing arrangement for a filter arrangement within a vacuum cleaner which is easy to operate and maintains a good seal around the filter arrangement when the arrangement is fixed within the vacuum cleaner.
I see their problems first as related to poor communications skills, and secondly a generation issue. Mental models of GenY´s and GenXes are not necessarily vastly dissimilar, especially if compared to the dinosaurs from the Baby Boomer generation. Nonetheless Sarah and Josh are encoded with quite different value systems, leading them to see and expect different things. Sarah, as the leader, is ultimately responsible for dealing with the situation establishing functioning lines of communication. Modern leadership emphasizes the importance of identity; how people view themselves. Merely managing the interactions between people is insufficient. Attending to own and subordinates identity construction is a vital leadership task. “…Perhaps the future has more influence and imposes more obligations on us than the past, the unknown more than the already known, the as-yet-untried more than the tried and rejected, the still-to-come more than the what has already happened, the possible more than what has already been” (Javier Marías, Your Face Tomorrow‬, 2002)‬‬‬‬‬‬‬ “…Perhaps the future has more influence and imposes more obligations on us than the past, the unknown more than the already known, the as-yet-untried more than the tried and rejected, the still-to-come more than the what has already happened, the possible more than what has already been” (Javier Marías, Your Face Tomorrow‬, 2002)‬‬‬‬‬‬‬ Leadership is a contextual exercise and Sarah needs to accept and adjust to the situation. Sarah´s self-image is somewhat distorted image out of touch with the organizational reality. She clings to the identity as “creative” while she in reality mainly is what she tries to repel “… an established suite”. Her role in the hierarchy is as she describes it herself to “…manage the people…”, that... You May Also Find These Documents Helpful ...Generation Y: They've arrived at work with a new attitude By Stephanie Armour, USA TODAY They're young, smart, brash. They may wear flip-flops to the office or listen to iPods at their desk. They want to work, but they don't want work to be their life. Jennifer Lewis, 22, finds it awkward that older employees report expenses to her. By Eileen Blass, USA TODAY This is Generation Y, a force of as many as 70 million, and the first wave is just now embarking on their careers — taking their place in an increasingly multigenerational workplace. Get ready, because this generation — whose members have not yet hit 30 — is different from any that have come before, according to researchers and authors such as Bruce Tulgan, a founder of New Haven, Conn.-based RainmakerThinking, which studies the lives of young people. Who is GenY? There is no consensus over the exact birth dates that define GenY, also known by some as echo boomers and millennials. But the broadest definition generally includes the more than 70 million Americans born 1977 to 2002. Generation X was born roughly 1965 to 1976. Narrower definitions put Gen Yers as those ages 16 to 27, born from 1978 to 1989. This narrower view is based on the thinking that as the pace of change in society accelerates, the time frame of a generation gets shorter. Effect on workforce Under the... ...Millennials generation – How a firm can adapt itself to fulfill the GenY demands? Called Generation Y, sometimes echo boomers or Millennials, this new wave of workers numbering more than 70 million, are far different from their parents. Raised in the late 1980, the Generation Y in a confident group and its members are entering the workforce with high expectations for themselves and their employers. How can firm satisfy their demands in order to attract the best potentials graduates? I. Millennials generation expectation in their daily life The Millennials generation is having great expectation. They are ambitious, strongly motivated, expect rapid progress and advancement in their work life: more than half * of the graduates’ expect to be in a managerial role within the three years. Moreover, the three top priorities in the workplace for graduate are challenging work (33%), high salary (32%), and career advancement (24%), which are under their expectations for 45% of the persons. Furthermore, genY needs a great level of freedom and autonomy in order to carry out their work. With a manager to hands-on on the management style, he risks a demotivation. Indeed, if 43% of graduates respect their manager, 32 % feel the performance of their boss below their expectations. However, the genY is seeking for a great relationship with their manager,... ...generations have different values and beliefs regarding family, career, work-life balance, training and development, loyalty, gender roles, the work environment and expectations of leaders. Demographers have named the different generations around today as Veterans, Baby Boomers, Generation X, Generation Y and Generation Z.Here I’ve tried to analyze Gen X & GenY. GEN X The moniker Generation X was coined by Douglas Coupland, who chose the unknown variable “X” to describe a generation that defies definition.Members of Generation X are largely in their 30’s and early 40’s. On the whole, they are more ethnically diverse and better educated than the Baby Boomers. The term “Baby Boomer” is used for people who were born during the demographic post World War II baby boom i.e. between 1946-1964. Generation X commonly abbreviated to “Gen X” is the generation born after the “baby boom” ended i.e. between 1965-1981 Below are a few common characteristics of Generation X. Individualistic: Generation X came of age in an era of two-income families, rising divorce rates and a faltering economy. Women were joining the workforce in large numbers, spawning an age of “latch-key” children. As a result, Generation X is independent, resourceful and self-sufficient. In the workplace, Generation X values freedom and... ...rP os t www.hbr.org HBR CASE STUDY GenY in the Workforce op yo How ca n Sarah and Josh work together m ore effectively? by Tamara J. Erickson Do No tC • Reprint R0902X This document is authorized for use only by sharmila mohapatra until January 2012. Copying or posting is an infringement of copyright. Permissions@hbsp.harvard.edu or 617.783.7860. HBR CASE STUDY rP os t How I learned to love millennials (and stop worrying about what they were doing with their iPhones). op yo GenY in the Workforce tC “RU BRD?”1 The text message from Ashok stood out in bold block letters on the small screen of Josh Lewis’s iPhone. Am I ever, Josh thought, stuffing the device back into his pocket and emphatically rolling his chair away from his PC and the backlit spreadsheets and formulas that had made his eyes bloodshot and his mood sour. He stood up, stretched, and took a minute to consider his plight: For the past three days, he’d been crunching U.S. and international film sales, attendance, and merchandising figures nonstop for his boss, Sarah Bennett, the marketing chief of the movie division of Rising Entertainment. Bennett and her team were in the midst of prepping the promotions, advertising, and branding plan for the next Fire Force Five film; her presentation to the company’s CEO, its head of distribution, and other unit... ... CASE ANALYSIS ON GENY IN THE WORK FORCE After reading the case of “GenY in the Workforce” it can be understood that Generation Y in the workforce is interested to not just sticking to the regular schedule but also going beyond and thinking out of the box. In the case Josh had some new and fresh ideas to promote the Triple-F movie, which was appreciated by the CEO. As talked about the Generation Y, the Millennial are tech-savvy, smart and wants faster results and recognition. All these qualities can be very well seen in Josh with several instances like; he is always busy with his Iphone, his ideas regarding promoting the movies and the way he wants faster results from his work and recognition for which he went to the CEO directly with his idea. Whereas Generation X in the workforce believes in step-by-step work, and achievement of results. They believe in following the protocol and are workaholics. They have a little traditional view and are struggling hard to cope up with the fast moving GenY. All these features are very well visible in Sarah. She believes in hierarchy and her role in the hierarchy. She understands the system of the workplace and follows it very religiously, works till late night keeping her personal life at bay. Clashes are bound to happen when these two... ...WORKPLACE TRANSFORMATION FOR GENERATION – Y It is time we bid good-bye to the old meeting rooms and welcome new social spaces as the organizations across the whole world are going to witness a huge generation shift in their workforce. The Generation Y, also referred to as the “Millenials”, born between 1977 and 1990, are set to dominate and change the style of work in the next 10 years. These are four recognized generations as follows: 1. Radio Babies (Born between 1930-45) 2. Baby Boomers (Born between 1946-64) 3. Generation X (Born Between 1965-75) 4. Generation Y or the Millenials (Born between 1977-90) This makes it very necessary to rethink the workspace and the different aspects of office surroundings as the Baby Boomers and the Generation X get replaced by the Millenials. As per the BPW Foundation study, the Generation Y in 2011 is predicted to occupy almost 75% the workforce by 2025. Before we look into how these workplaces have to adjust themselves so as to attract the new generation, let us focus on a few striking differences between the two broad categories of generations I.e. Generation Y and Baby Boomerx. Generation Y | Baby Boomers | * Highest priority : Engaging workforce * Lowest Priority : Meeting rooms Quality * Prefer quick, casual and socially-tingled meetings with technology usage * Prefer a... ...Question: To what extent is it possible to say that members of Generation Y in different countries are alike? Name: TAN Ruishen Student ID: 20089985 Course code: LANG1002 T21 Instructor: MEGAN Melissa Jane Recourse of the citation: Wall Street Journal Journal of American Academy of Business Introduction Generation Y is a complicated generation with unique characteristics. Born between 1982 and 2000, this generation fortunately grew up with the rapid development of Internet technology, which has brought them a more innovative mind as well as ambitious attitude towards their life. This report aims at judging whether GenY across different countries are similar or different. Despite the fact that GenY share similar life attitude and a pursuit of freedom, we can still discover the variation of this controversial generation through a brief comparison between Gen Yers in China and the USA, especially their attitude towards career as well as financial management. General life attitude GenY in the USA has been somehow defined as a rebellious generation, since the endless pursuit of a free lifestyle is one of their prior concerns. They refuse to spend their life under the pressure of mortgage and loans like the previous generation, while long hours of tedious work in the office also becomes an undesirable option for them. They dream for a... ...THE "IT" CAR FOR GENY? Addressing the target market with regard to positioning After choosing a strategy for reaching a target market, marketers must then decide how best to position the product (Boone & Kurtz, 2001, p.257). The concept of positioning seeks to place a product in a certain "position" in the minds of prospective buyers (Boone & Kurtz, 2001, p.257). It is the act of designing the company's offering and image to occupy a distinctive place in the mind of the target market (Kotler, 2003, p.308). Marketers use a positioning strategy to distinguish their firm's offerings from those of competitors and to create promotions that communicate the desired position (Boone & Kurtz, 2001, p.257). How is Scion addressing its target market with regard to positioning and the product itself? Toyota's approach with Scion's marketing has been very unique. Rather than blanketing the country with lots of television and magazine ads, its focus is on smaller, much targeted campaigns (Crouch, 2005). GenY consumers are unique (Autoweek.com). They are information rich, time poor, and technology savvy (Autoweek.com). The psychographics of the target market include: intelligent, innovative, and influential (Autoweek.com). The demographics of the target market include: predominantly male; age—twenties to early thirties; urban diversity; college educated, and above average income (Autoweek.com). In...
Wednesday, May 6, 2009 OK so last Sunday was one of the happiest days of my life – I reverted to being totally girlie and romantic and shit. So I won’t post the details of my weakness. I will just say it was a great night and leave it at that. However with this new development comes emotional issues that I will have to deal with but I will be taking that one day at a time. On a side note I am wearing my cute yellow high heel shoes today so I feel fabulously adorable. Tuesday, May 5, 2009 OMG! Seriously first our day started off by me being out of bed before 10 AM which is unheard of for a Saturday. Then we went and helped move a house for four hours then we all went over to Lexie and Todd’s for a BBQ. We were having a great time drinking and sitting in the sun. Well my Cabana Boy got really drunk really fast like in a two hour span of time and passed out on the couch and then woke up two hours later needing to pee. He then proceeded to go down stairs (we assume that he was trying to get outside) but before he could make it he let lose in the hallway. Needless to say since I invited him I was upset and of course blamed myself. Everything worked out alright in the end but Cabana Boy is grounded for the time being. Not that he ready to face anyone at this moment he couldn’t even look at me directly. Can’t says I blame him that would be so embarrassing. However if this had been me that this happened too I think the first thing that would have went through Alexis’s mind is “Awesome ammo for the rest of her life” it just goes to show you that your true friends will always love you no matter what. Besides they could never get rid of me I’m way too cute. OK so I actually did it I went home and did some gardening. I got some new soil and planted seeds (Although I really think the seed companies totally jip you in the amount of the seeds that come in each pack) I mean really do they come with a money back guarantee that if they don’t bloom you can call them up and they will replace the seeds or at least refund your money. Sorry I digress. Anyway so right now I have a pretty little patch of fresh dirt. I’m so excited but I am keeping my hopes low about them actually blooming because I have a bad history with plants in the past. Friday, May 1, 2009 OK so here is the plan for today. Get off work then go to Home Depot and get some gardening stuff and do some gardening. Yeah that’s right and those of you that know me – know that for me to “Get Dirty” is the first sign of the apocalypse – so hopefully I will make it through this with out anything ICKY happening but I have to get out in the sun because it’s driving me crazy and I have ants in my pants with the thought of sitting here waiting to be out in it.
Q: CheckAndDownloadUpdateAsync doesn't work Can you guys tell me how it should be done? I have out of browser app with a button. The Button does this: Application.Current.CheckAndDownloadUpdateCompleted += (object sender, CheckAndDownloadUpdateCompletedEventArgs e) => MessageBox.Show(e.UpdateAvailable.ToString()); Application.Current.CheckAndDownloadUpdateAsync(); I run the app, add something, rebuild the app, click on the button - it says false. What could be wrong with that? UPD: BTW... it's OOB App UPD2: I tested with Fiddler. It get's the xap, but still doesn't update A: There is an Error member on the EventArgs, maybe you should check it? For instance: if (e.Error != null) { if (e.Error is PlatformNotSupportedException) { // Require a Silverlight plugin update } else if (e.Error is SecurityException) { // Require an elevation } }
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy. Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details. 9. c<br />Is for<br />Corn snake<br />Corn snakes are 6 feet and are slender. They eat lizards, birds, and small mammals. They are actually rat snakes and got there name from the pattern on there belly. <br />By Jacob and Einstein the snake on the left <br /> 12. F IS FOR FRILLED LIZARD<br />The frilled Lizard has a frill on its neck. It lives in northern Australia. It likes to eat mice and large insects. It also is a carnivore. The neck frill has long spines. When it is going to attack it opens its yellow mouth and uncurls its frill too. <br />Ashlen <br /> 13. G is for Gecko<br />They are short and flat and have bumpy scales. They live in warm climates throughout the world. Geckos eat insects and arachnids. They even have little bristles on their toes that can stick to many surfaces. <br />By Chris <br /> 14. H is for Herpetologist<br />A Herpetologist study reptiles. They have to go to collage and learn about reptiles. <br />Facts: <br />They work with reptiles, They learn about reptiles. They are cool because they have reptiles. They find new reptiles. They have cool gear.<br /> 16. J<br />To get a territory they half to push each other the furthest.<br />Is for<br />Jackson’s Chameleon<br />The tongue has a sticky tip to help them get their prey.<br />The Jackson’s Chameleon lives in Central Africa.<br /> 17. K<br />Is for<br />King Cobra<br />King cobras live in forest areas of Asia and India.<br />The king cobra is a snake-eater. They hunt during the day.<br />King cobras lay from two to four dozen eggs in the spring.<br />The king cobra measures about 13 feet long. There fangs are about one inch.<br />By: Alex<br /> 18. L<br />Is for<br />It’s a creamy yellow color, with black spots like a leopard.<br />Leopard Gecko<br />Their habitat is a rocky, dry, grassland.<br />They live in the desert of Pakistan, Northern India, Afghanistan, and parts of Iran.<br />They have eyelids, but most reptiles don’t.<br />It eats crickets, mealworms, grasshoppers, and some insects.<br />By: Kendra<br /> 19. M<br />They feed only in the water. They eat snails and clams. They also lay in the sun. <br />Is for<br />Map turtle<br />Brandi<br /> 20. N<br />is for Nieves, David <br /><ul><li>David became an author, because of his strong commitment to the misunderstood, an often feared group of animals. (snakes and other reptiles) 21. David lives near Kansas City, Missouri. His hometown is Bellevue, Nebraska. 24. David became a herpetologist, because at the age of eight he brought home a garter snake, that his brother caught, and has been fascinated with them ever since. </li></ul>By; Morgan<br /> 25. O<br />Is for <br />Oriental Fire-Bellied Toad<br />.<br />It lives in Siberia, China, and Korea.<br />They eat houseflies, bluebottles, assorted moth larvae, earthworms , meal worms, zoo phobias, crickets, and guppies. They change colors, going though the cycles of bright green to dark olive green. Its hard to tell if it is a male or a female. The toads have brightly colored bellies which are used as warning that they are poisons.<br />Jaymiee<br /> 26. P<br />Is for Poison Dart Frog<br />Poison dart frogs live in the tropical forests of Costa Rica to Brazil. They are carnivores. They eat spiders, ants, termites, and small insects. The two-inch-long golden poison dart frog has enough venom to kill 10 grown-men! There are more than 100 species of poison dart frogs.<br /> 28. R<br />Is for Rattlesnake , It lives in North Central America. <br />It’s colors are red and white its long and big.<br />Rattlesnakes eat mice, rats, small birds and other small animals .<br />Rattlesnakes are not deaf in fact the structure of their inner ears is very much like that of humans. They do, however, lack external ears. <br /> 29. s<br />is for<br />Sheltopusik!<br />facts<br /> The Sheltopusik looks like a snake but is really a lizard with no legs and is 4 ft. long. It lives in the forests of Europe. It eats insects, snails, small rodents, and small reptiles. The Sheltopusik has holes for ears. They are the largest species of legless lizards in the world. <br />Katie<br /> 30. T<br />IS FOR<br />Tuatara!<br />FACTS<br /> The Tuatara looks like a lizard but it is not really a lizard. The Tuatara lives near New Zealand. It eats giant crickets. There are only two species left of the Tuatara. <br /> 31. U<br />The reason it got its name is because it has little spikes around its head and when it gets scared slimmy stuff comes out.<br />is for…<br />Ugly Salamander<br />The Ugly Salamander is green. They like small places. They are almost gone. The pollution in the water kills them.<br />They can be 23 centimeters long. Some people keep them as pets.<br />It lives in Mexico City. It eats bugs.<br />Rachelle<br /> 35. W is for Warty Newt<br />It lives at the Black Sea. They are carnivores. They eat tadpoles and worms. They live for 25 years. They are the largest newt and can be found in Europe. <br />Their skin is covered with small bumps that have a milky acid smelly substance that helps keep predators away.<br /> 37. Y<br />Is For<br />Yellow mud turtle<br />The Yellow Mud Turtle is small, It is olive or brownish gray-colored It has yellow areas on it’s throat, head, and neck. The bottom shell is yellow, too. The Yellow Mud Turtle lives in Central United States. It eats worms, crayfish, frogs, snails, fish, fairy shrimp, slugs, leeches, and tadpoles. The Yellow Mud Turtle can live up to 15 years old. Skunks, raccoons, and small rodents eat the Yellow Mud Turtle. When hibernating, they eat earthworms that move in front of it.<br />Mackenzie <br /> 38. Z<br />Is For<br />Zebra-Tailed Lizard<br />Facts<br />The Zebra-Tailed Lizard is 2.5 to 4 inches long , gray or a sandy brown color. It lives in open deserts. It eats moths, ants, and bees. In the summer, the females lay 2 to 8 eggs. The eggs hatch in July to November. More than 1 clutch can be laid in a season.<br /> Mackenzie<br />
Jeanette Vizguerra, a Colorado immigration activist whose fight to stay in this country has drawn national attention, is once again taking sanctuary in a Denver church after suing U.S. Immigration and Customs Enforcement in an effort to stave off deportation. As her nearly two-year stay of deportation expired Friday, Vizguerra, 47, and her lawyers announced from inside the First Unitarian Society of Denver church that she will again be confined to living inside a house of faith to avoid being sent back to Mexico. In 2017, Vizguerra spent 86 days living inside the same church before being granted the stay of deportation. “I’m tired of hearing from people that I should go back and take my children back to Mexico,” Vizguerra said. “My roots are on this continent. If you think I should go back, you should pack up and go back to yours. … We pay taxes. We work hard. … I’m a mother just like any other mother who will do what is best for her children every time.” Vizguerra speaking. Her young daughter looks on above her as her mother breaks down. pic.twitter.com/V9o09IyZRZ — Elizabeth Hernandez (@ehernandez) March 15, 2019 Vizguerra’s attorneys on Thursday filed a lawsuit in U.S. District Court in Denver alleging ICE “carried out a years-long campaign” against the activist in the interest of deporting her to Mexico without “valid justification” for doing so and failure to follow due process of the law. “This case challenges an executive agency’s unlawful, arbitrary actions against a woman who has fought for decades for her children, her community and the rights of all Americans, no matter their citizenship status,” attorneys Aaron Elinoff and Danielle C. Jefferis wrote in their lawsuit on behalf of Vizguerra. “The U.S. Constitution guarantees Ms. Vizguerra’s right to due process, and to that end, the law allows for a process by which Ms. Vizguerra may present a case to justify her right to remain in the United States. Defendant ICE has not permitted Ms. Vizguerra to do so. But Defendant ICE is not above the law; the agency must be ordered to stop its baseless campaign against Ms. Vizguerra.” In an emailed statement, ICE central region spokesman Carl Rusnok said that as a matter of policy, the agency does not comment on pending litigation. “However, lack of comment should not be construed as agreement with or stipulation to any of the allegations,” Rusnok said. “As part of the Department of Homeland Security’s homeland security mission, our trained law enforcement professionals adhere to the department’s mission and values, and uphold our laws while continuing to provide the nation with safety and security.” During Friday’s news conference, Vizguerra’s attorney Bryce Downer said there is a strong case that ICE is illegally trying to deport Vizguerra. “Jeanette does not have a removal order, and they are acting as if she did,” Downer said. Vizguerra choked back sobs as she spoke about the fear of having to leave her children and grandchildren. Her young daughter — seated on the shoulder of one of several supporters standing behind Vizguerra holding protest signs — looked down at Vizguerra and eventually climbed down to wrap her arms around her crying mother. Vizguerra, who has lived illegally in the United States for more than two decades, faces deportation and separation from her four children and three grandchildren. She was granted a stay of deportation in May 2017 after taking sanctuary at Denver’s First Unitarian Society of Denver and First Baptist Church. The activist’s public fight to stay in the U.S. earned her support from several Colorado politicians including U.S. Sen. Michael Bennet, U.S. Rep. Diana DeGette and Gov. Jared Polis, who was a congressman at the time. Vizguerra applied for a U visa for victims of certain crimes about six years ago, but the application remains pending “due to significant backlogs in the processing of U visa applications,” according to a news release about her situation. Vizguerra was one of the first undocumented people to take sanctuary under the Trump administration, according to a news release. The activist was named one of Time magazine’s most influential people in 2017 as her story gained nationwide attention. According to her lawsuit, Vizguerra and her family fled abuse and violence in Mexico in 1997 and settled in Denver, where the activist began work as a janitor and later an organizer with the Service Employees International Union, fighting for workers’ rights. Jeanette: “I am ready to be here as long as it takes. I want this government to understand that I will never give up.” pic.twitter.com/9mTIwGohSO — Elizabeth Hernandez (@ehernandez) March 15, 2019 Vizguerra’s arrest and removal proceedings were born out of a 2009 traffic stop. She was pulled over for driving with an expired inspection sticker, the lawsuit says. When the police officer asked whether Vizguerra was in the U.S. legally, she refused to answer and was arrested, according to the lawsuit. During a search of Vizguerra’s bag, police found documents containing a false Social Security number linked to Vizguerra that the lawsuit said was needed so she could apply for a third job. “She thought the Social Security number was fake,” the lawyers wrote in the lawsuit. “She did not know it actually belonged to a real person. … Ms.Vizguerra never intended to defraud anyone or cause any person harm. She simply wanted to work hard and put food on the table for her children.” Vizguerra was charged with misdemeanor identity theft and criminal possession of a forged instrument. She pleaded guilty to one misdemeanor count, served 21 days in jail and was placed in removal proceedings upon her release. Mike Morran, senior minister at First Unitarian Society of Denver, said during Friday’s news conference that the church would be there for Vizguerra as “senseless forces” sought to separate “a loving family.” Vizguerra will be living in a room downstairs in the church. Morran said Vizguerra’s family, the community and the church all make sure Vizguerra is fed. The last time the church housed Vizguerra, Morran described facing “security issues” at the building including bomb threats. The minister said the Denver Police Department was responsive and handled the situations well. “I don’t know how long I’m going to be here, but I won’t give up,” Vizguerra said. “I don’t know how many months, but I am ready. I will keep fighting. I won’t give up.”
More questions than answers with lockout We know hockey’s coming back. We know the NHL rinks will soon be lit up again, but there’s still lots of questions. Like: *Will all 30 teams play on Jan. 19 when the league will likely start up, with camps opening this upcoming weekend? Makes sense to me. Sources in Los Angeles say the Kings would have an afternoon start at the Steples Center to raise their Stanley Cup banner because there’s an NBA game that night at Staples. The Cup champs should get special dispensation, a game alone from the rest. *The Oilers are under the impression they’ll still be playing games against Toronto, Montreal and Ottawa even though they’re based in the East and the new schedule will almost surely be Western Conference teams vs Western Conference teams. The ongoing Habs for Oilers, Leafs vs Flames games is news to the NHL home office. All the Western Canadian clubs have a huge Maple Leafs and Canadiens’ following with folks dragging out their Darryl Sittler and Guy Lafleur sweaters but maybe that’ll be put on the back-burner this season. *When will the NHL season end? As it stands now, it’s supposed to end April 13, but if starts Jan. 19 and it’s 48 games, that’s 48 games in only 85 days. No way that’ll happen. Some think it’ll run about three more weeks until Sunday May 5. That would be 48 games in 107 days. Much better, even if the NHL decides on 50 games, not 48. Of course, that pushes the playoffs back, too. What would be the conference breakdown in a 48-game season? I’ve heard seven games vs Northwest division foes for Oilers (28 games) and two vs other 10 teams, but also heard five games vs two of the Northwest rivals and four games vs the other two (that’s 18) and three games vs the other 10 games for 48 total. *Which teams could have goalie concerns in the early going? Marty Brodeur, 41 in May,, never played during the lockout. Neither did workhorse Miikka Kiprusoff in Calgary or Jimmy Howard in Detroit or Marc-Andre Fleury in Pittsburgh or Mike Smith in Phoenix. Neither did Jonathan Quick in LA. He’s coming off August surgery to repair a disc fragment in his back, and the defending Cup champs need his brilliance right off the hopper. Devan Dubnyk here, Cory Schneider (Vancouver), Ilya Bryzgalov (Philly), Jonathan Bernier (LA), Pekka Rinne (Nashville), Henrik Lundqvist (Rangers), Ondrej Pavelec (Winnipeg) and Sergei Bobvrovsky (Columbus) did. *Will the NHL decide on rivals meeting the first day of games to cut down on travel? The Oilers have Jan. 19 blocked off for a home date with Anaheim Ducks, but it might make more sense to have the Ducks in LA for that afternoon Stanley Cup banner raising on Jan. 19, and Calgary coming up to play the Oilers here that night on Hockey Night in Canada. Same in the East if the Rangers play the Islanders, Philly and Pittsburgh meets and Toronto and Montreal or Toronto and Ottawa and the Habs and the rival Bruins. “All I’ll say is we have the 19th blocked off. We have dates blocked off (in the current schedule) but who we play is up to the NHL,” said Oilers’ team president Patrick LaForge. *The Oilers have to vacate Rexall Place from late February through March 10 because the Brier’s in there, and they have an eight-game road trip planned, but will they really play eight of what could be 24 road games on a revised schedule on one trip or will that change a little? They’ll have to change it. As it stands now, the Oilers are in Nashville, Carolina, Columbus, Minnesota, Detroit, New Jersey, New York (Rangers) and St. Louis. They won’t be playing Carolina, the Devils or Rangers this season (only Western conference teams vs Western conference teams), so they’ll have to insert some Western Conf teams in the Hurricanes, Jersey, Rangers’ spot. Plus, the Oilers are supposed to play in Montreal on Jan. 29th, Ottawa Jan. 31 and Toronto on Feb. 2. What if they don’t have those normal games against Canadian foes like they do most years (home and away)? Again, they’ll have to find three Western Conf. games for those dates. After the eight-game Brier road trip, the Oilers have eight in a row at Rexall. That’s overkill. *Agree with the Vancouver Sun’s estimable scribe Iain MacIntyre who wonders how the lockout could last so long, yet the league wants to wait another 13 days (from Sunday) to start the season (Jan.19), further dragging out the playoffs. Comments We encourage all readers to share their views on our articles and blog posts. We are committed to maintaining a lively but civil forum for discussion, so we ask you to avoid personal attacks, and please keep your comments relevant and respectful. If you encounter a comment that is abusive, click the "X" in the upper right corner of the comment box to report spam or abuse. We are using Facebook commenting. Visit our FAQ page for more information. Almost Done! Postmedia wants to improve your reading experience as well as share the best deals and promotions from our advertisers with you. The information below will be used to optimize the content and make ads across the network more relevant to you. You can always change the information you share with us by editing your profile. By clicking "Create Account", I hearby grant permission to Market to use my account information to create my account. I also accept and agree to be bound by Postmedia's Terms and Conditions with respect to my use of the Site and I have read and understand Postmedia's Privacy Statement. I consent to the collection, use, maintenance, and disclosure of my information in accordance with the Postmedia's Privacy Policy. Postmedia wants to improve your reading experience as well as share the best deals and promotions from our advertisers with you. The information below will be used to optimize the content and make ads across the network more relevant to you. You can always change the information you share with us by editing your profile. By clicking "Create Account", I hearby grant permission to Postmedia to use my account information to create my account. I also accept and agree to be bound by Postmedia's Terms and Conditions with respect to my use of the Site and I have read and understand Postmedia's Privacy Statement. I consent to the collection, use, maintenance, and disclosure of my information in accordance with the Postmedia's Privacy Policy.
Clayton Street project rolls forward Government and business reporter The $7.1 million project, funded through voter-approved special-purpose local option sales tax, is scheduled for a mayor and commission vote Nov. 5. The vote would only be to approve a concept for the work, with concrete plans yet to come. Most of the work would still be more than a year after the November vote, but some retailers are readying a deep breath before the plunge into construction. “Nobody’s excited about the prospect of having the disturbance and disruption, but it’s been 30 years since they’ve done anything with Clayton Street,” said Irvin Alhadeff, owner of Masada Leather and Outdoor. Alhadeff’s Clayton Street business is ground zero for the work, which will run from Lumpkin Street to Thomas Street. Jackson Street from Broad Street to Washington Street and Wall Street from Broad to Clayton are also slated for work. Alhadeff is hopeful that disruptions will be minimal, but also emphasized the need for the work. “Just look around,” he said, walking outside and pointing up and down the street. The proposed work includes storm drain improvements to better handle runoff — and hopefully eliminate odor and standing water — new sidewalks with brick pavers, new trees and more. In open meetings, officials have stressed setting the schedule in such a way as to minimize disruptions to downtown businesses, chiefly by scheduling work in the late winter through summer, starting next year and running through August 2015. In other words, it would avoid the football and holiday shopping seasons. But it didn’t eliminate concerns among shopkeepers. Jane Scott, owner of Native America on Clayton Street, was worried about disruptions, especially after hearing horror stories about westside downtown work about 15 years ago. “We’re open all year,” she said. “While Christmas is important, and we’re really busy, January through August is a pretty big window.” She was particularly concerned about utility work scheduled for January for which she hadn’t heard specific plans. Derek Doster, the SPLOST project administrator, said a firmer schedule for the utility work is being hashed out now. It would be done on a block-by-block basis, without the entire road being torn up. He said individual utility outages would be “very, very limited.” Anne Shepherd, owner of Chick Music in downtown Athens, said she’s hopeful the project will be better than when her West Clayton Street business was rattled by a corridor project about 15 years ago. She said the contractor then was “not the best” and what should have taken a few months took more than a year. Customers needed to park a block from the entrance to shop there, and a piece of plywood became a bridge because “there was a just a hole” where the walkway was, Shepherd said. She remembers then-Mayor Doc Eldridge giving her a mock Purple Heart for surviving the project. But with those harsh lessons, she’s hopeful others won’t go through what she did. “I think it will go a lot smoother up that way,” Shepherd said. “I hope it is, because I wouldn’t want that on my worst enemy.” She said the street ended up looking much better and she was, in the end, glad the work was done. Commissioner Jerry NeSmith drummed encouragement this week for Internet providers to take the time to install fiber optic cable in the utility corridors while the downtown work is proceeding. In public meetings, he’s referred to it as being as important as other utilities for its economic impact. “If we don’t bury fiber when we have that street open, it’s a huge mistake,” he said at a recent Athens Downtown Development Authority meeting. Officials from various Internet providers in town at that meeting were excited about the opportunity, but didn’t make any guarantees of loading fiber optic cable into the trenches when they’re open. One noted, however, that not taking advantage of the existing opening would likely drive costs up tenfold for the project. The ADDA staff is also eyeing the opportunity of work on the corridor: part of the 2014 work plan adopted last week was to find a way to replace the often-derided pay-and-display meters in the downtown core. OnlineAthens.com aims to foster constructive, respectful civic conversation. With your help, we will provide a friendly, safe, easy to use place on the Web for everyone in the area to share not only opinions but also information of community interest. Racist, harassing, abusive and libelous comments will not be tolerated.
/* * Copyright (C) 2015 Apple Inc. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF * THE POSSIBILITY OF SUCH DAMAGE. */ #import <WebKit/WKFoundation.h> #if TARGET_OS_IPHONE #import <Foundation/Foundation.h> NS_ASSUME_NONNULL_BEGIN WK_CLASS_DEPRECATED_WITH_REPLACEMENT("WKContextMenuElementInfo", ios(10.0, 13.0)) @interface WKPreviewElementInfo : NSObject <NSCopying> @property (nonatomic, readonly, nullable) NSURL *linkURL; @end NS_ASSUME_NONNULL_END #endif
This copy is for your personal non-commercial use only. To order presentation-ready copies of Toronto Star content for distribution to colleagues, clients or customers, or inquire about permissions/licensing, please go to: www.TorontoStarReprints.com VANCOUVER—The Canada Revenue Agency has found nearly $600 million in unpaid taxes in Ontario and British Columbia’s real estate sector over the past three years. It has levied $47 million in penalties for the same period. In B.C. alone, $169 million in unpaid taxes were related to real estate transactions and income tax, the agency found. In Ontario, whose population is three times greater than B.C.’s, that number was $423 million. “I am delighted,” said Richard Kurland, a Vancouver immigration lawyer who for years has lobbied for more scrutiny of real estate transactions, as well as several immigration programs that were directed toward wealthy investors. “It’s a reasonable representation,” he said of the amount of unpaid taxes, “but I don’t think it tells the whole picture at all.” The federal agency began examining real estate transactions more closely starting in 2015, and says there continue to be “compliance risks” in real estate transactions in the heated Vancouver and Toronto markets. In British Columbia, CRA auditors found that 54 per cent of the unpaid taxes came from not paying GST, while 45 per cent was from income tax. In Ontario, 90 per cent of the unpaid taxes were related to homebuyers not paying the GST, which is required on all newly built homes in Canada, as well as GST on other real estate transactions. In a statement, CRA staff said a number of factors increase the risk of tax evasion in the country’s two hottest real estate markets, including a questionable source of funds to buy properties, property flipping, unreported GST, unreported capital gains and unreported worldwide income. YOU MIGHT BE INTERESTED IN... A mismatch between reported income and lifestyle (such as owning a multimillion-dollar home) can trigger a closer look from CRA auditors to discover whether income is not being reported or being earned illegally. Kurland said he believes a new tax information-sharing agreement that will come into effect in September between Canada and 60 other countries will reveal more tax evasion. That’s because even though residents of Canada (who may or may not be citizens) must report their worldwide income to the CRA, the system was not well enforced, resulting in something of an “honour system,” he said. YOU MIGHT BE INTERESTED IN... “It’s what I call the show-me game,” Kurland said of the new agreement between countries. “You show me what this person declared to you ... as global income and property, and we will show you what this person declared to us as global income and property holdings. “It puts people who have not exactly been open with their property transactions in a quandary.” While in Vancouver much of the scrutiny has been on the impact that buyers from Mainland China may have on the market, Kurland emphasized: “It is not a one-stop China shop at all. This issue cuts across all jurisdictions internationally.” China is one of the 60 countries included in the new agreement. The information-sharing agreement is part of an effort led by the Organisation for Economic Co-operation and Development to tackle global tax evasion, including secretive offshore banking. “Lack of transparency in the land registry means it is not clear who owns nearly half of Vancouver’s more expensive properties. This is wrong,” the provincial budget document stated. “The concealment of beneficial ownership can be part of international webs used to facilitate tax evasion, money laundering, corruption and other criminal activities.” It added, “Having a registry means we’ll know who owns what.” With files from Marco Chown Oved and Robert Cribb Jen St. Denis is a Vancouver-based reporter covering affordability and city hall. Follow her on Twitter: @jenstden More Vancouver Top Stories More from The Star & Partners Copyright owned or licensed by Toronto Star Newspapers Limited. All rights reserved. Republication or distribution of this content is expressly prohibited without the prior written consent of Toronto Star Newspapers Limited and/or its licensors. To order copies of Toronto Star articles, please go to: www.TorontoStarReprints.com
Bags on Board Scented Refill Bags Manufactured by: Bags on Board To refill our dispenser with a new roll of bags, remove the lid, then remove the used bag cartridge and refill it with a new bag cartridge. Replace the lid and you're ready to go! The refill bags are not only biodegradeable, they are also leak proof with double-sealed construction Pet owners who purchased this item also purchased... Bags on Board Cat Cleanup Scoop from: $3.99 Bags on Board Retractable Leash with Built in Bag Dispenser from: $15.59 Bags on Board Refill Bags from: $5.79 Bags on Board Dispensers from: $4.99 Bags on Board Scented Refill Bags from: $11.99 Excellent product Thursday, November 03, 2011I have a Seeing Eye dog and wanted a scented bag that also wasn't too long or too small. These scented bags do a pretty good job of masking the smell. In summer, our outdoor trash-can gets pretty smelly, but these bags toned it down quite a bit. I definitly recommend them to anyone who wants to cut down on the odor. MHarris from Charlotte, NC Excellent product Thursday, November 03, 2011I have a Seeing Eye dog and wanted a scented bag that also wasn't too long or too small. These scented bags do a pretty good job of masking the smell. In summer, our outdoor trash-can gets pretty smelly, but these bags toned it down quite a bit. I definitly recommend them to anyone who wants to cut down on the odor. KBelt from Berwyn, IL Bags on Board Tuesday, March 22, 2011These are the best poop bags on the planet.The scent is strong enough to mask the odor of my dogs poop and that's saying a lot.
Telkom / to cancel my account with telkom I am trying to close my account with telkom. I done everything they require in NOV or 2018. I phone the just to extend it for me another month and closed it end of Dec which did not happen. I phone them a couple of time to do this. Then they say to me they cannot close it because I wanted to keep my mail need to phone another department, they need to split it. when I phone them they told it need 1st to be closed. So I went from one department to another department every time. Then the other department Account department said I must just tell them to closed it. They do not know what they are talking about This is the department to close your account Which I did This is already February month Still is not happening. They also said someone will phone when they escalate it Nobody ever phone me. I am so fed up with them. Then they overcharge me with my monthly bill payment This I am struckel with since August 2018 also not sorted out. I do not know what is going on there in that company Hope you people can do something for me. I am a pensioner and cannot afford to keep phoning and paying the bill. Thank you
{ "cells": [ { "cell_type": "markdown", "metadata": {}, "source": [ "Title: Chi-Squared For Feature Selection \n", "Slug: chi-squared_for_feature_selection \n", "Summary: How to remove irrelevant features using chi-squared for machine learning in Python. \n", "Date: 2017-09-14 12:00 \n", "Category: Machine Learning \n", "Tags: Feature Selection\n", "Authors: Chris Albon" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "<a alt=\"chi-squared_for_feature_selection\" href=\"https://machinelearningflashcards.com\">\n", " <img src=\"chi-squared_for_feature_selection/Chi-Squared_For_Feature_Selection_print.png\" class=\"flashcard center-block\">\n", "</a>" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "## Preliminaries" ] }, { "cell_type": "code", "execution_count": 7, "metadata": { "collapsed": true }, "outputs": [], "source": [ "# Load libraries\n", "from sklearn.datasets import load_iris\n", "from sklearn.feature_selection import SelectKBest\n", "from sklearn.feature_selection import chi2" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "## Load Data" ] }, { "cell_type": "code", "execution_count": 8, "metadata": {}, "outputs": [], "source": [ "# Load iris data\n", "iris = load_iris()\n", "\n", "# Create features and target\n", "X = iris.data\n", "y = iris.target\n", "\n", "# Convert to categorical data by converting data to integers\n", "X = X.astype(int)" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "## Compare Chi-Squared Statistics" ] }, { "cell_type": "code", "execution_count": 9, "metadata": {}, "outputs": [], "source": [ "# Select two features with highest chi-squared statistics\n", "chi2_selector = SelectKBest(chi2, k=2)\n", "X_kbest = chi2_selector.fit_transform(X, y)" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "## View Results" ] }, { "cell_type": "code", "execution_count": 10, "metadata": {}, "outputs": [ { "name": "stdout", "output_type": "stream", "text": [ "Original number of features: 4\n", "Reduced number of features: 2\n" ] } ], "source": [ "# Show results\n", "print('Original number of features:', X.shape[1])\n", "print('Reduced number of features:', X_kbest.shape[1])" ] } ], "metadata": { "anaconda-cloud": {}, "kernelspec": { "display_name": "Python [default]", "language": "python", "name": "python3" }, "language_info": { "codemirror_mode": { "name": "ipython", "version": 3 }, "file_extension": ".py", "mimetype": "text/x-python", "name": "python", "nbconvert_exporter": "python", "pygments_lexer": "ipython3", "version": "3.5.3" } }, "nbformat": 4, "nbformat_minor": 1 }
Metastasis to neck from unknown primary tumor. The records of 54 consecutive patients who were irradiated for metastatic disease in the neck from an unknown primary tumor were reviewed. The overall survival results are comparable to those of other reported series. Patients with high or posterior cervical lymph node involvement were irradiated with fields including the nasopharynx and oropharynx. Patients with high neck nodes had a better survival rate than those with low neck nodes. The size of the neck tumors and the local control after treatment also have prognostic significance.
North Korea's New Nuclear Threats; Answers From the Wreckage of Air France Flight 447 Aired June 9, 2009 - 22:00 ET THIS IS A RUSH TRANSCRIPT. THIS COPY MAY NOT BE IN ITS FINAL FORM AND MAY BE UPDATED. ANDERSON COOPER, CNN ANCHOR: Tonight, North Korea makes a never- before-heard nuclear threat to the world, dangerous talk, as the fate of two captured American reporters hangs in the balance. What happened when Laura Ling and Euna Lee were seized on the border? Today, we take you to that border, a rare and remarkable look at what happens there, North Korean guards crossing over, sometimes seizing people trying to escape. Also, a 360 exclusive interview tonight -- Scott Roeder, the man charged with murdering a doctor who performed abortions, what he says about the deadly anti-abortion violence he's accused of committing and why he predicting more to come. And, later, they haven't found the black boxes yet from Air France 447, but you will state how answers to the crash are already coming from the wreckage. We begin, though, tonight tensions dangerously between the U.S. and North Korea, in fact, between the world and North Korea. For the first time, the North Korean government has threatened offensive use of nuclear weapons, the language surprising and alarming -- quote -- "Our nuclear deterrent will be a strong defensive means," they said, "as well as a merciless offensive means to deal a just retaliatory strike to those who touch the country's dignity and sovereignty even a bit." They're talking about a merciless nuclear offensive -- late word tonight from the U.N. secretary-general he expects China, one of North Korea's only friends, to back tougher sanctions on the North for its nuclear testing and missile launches. North Korea has already said they will consider sanctions a declaration of war. Meantime, little is known about the whereabouts of these two, reporters Laura Ling and Euna Lee, convicted yesterday, sentenced to 12 years of hard labor. They were captured on China's border with North Korea, accused of trying to sneak into the country. But exactly what happened on that border, what happened around their capture is still unknown. Tonight, we take you as close as anyone can get. We will introduce you to two people who have lived, worked along the border and reveal to -- they reveal to us just how poorly defined that border is and how routinely it is violated by North Korean guards who cross in search of victims to grab. Filmmaker Jim Butterworth has been there filming the documentary "Seoul Train." He joins us now. Jim, you spent two months along the Chinese/North Korean border in the same area where we believe these two women were arrested. What is it like there? Well, it's incredibly bleak. JIM BUTTERWORTH, DIRECTOR/PRODUCER, "SEOUL TRAIN": I mean, you -- you're standing on the Chinese side, which has farmers and an economy going. And you look across the river, you don't see a border. It's just a river. And on the other side, you see hilly, deforested North Korea. And it's -- you know what is happening there. It is a depressing place. And it's agonizing... (CROSSTALK) COOPER: Is it clear where the border is? BUTTERWORTH: Oh, no, no. I mean, there are a couple of defined border crossings, where bridges go from China to North Korea. And in the middle of that bridge will be a big red stripe that says: "Do not cross this. You are going into North Korea." But the rest of the border is ill-defined. There is no definition to it at all. COOPER: For the film you were working on, you had, at one point, to hide in the bushes, as -- as a North Korean patrol actually came out. And I think we have some video that you shot. What -- what happened? BUTTERWORTH: Well, we were -- we were in north of the -- the northern area of Chinese/North Korean border, along the... (CROSSTALK) COOPER: Those are the border guards right there, North Korean guards, right? BUTTERWORTH: Yes, I can't see them. But... (CROSSTALK) COOPER: OK. Yes, they're smoking. BUTTERWORTH: And -- and -- so, we were crossing out over the Tumen River, within the North Korean boundary, probably. And along came a North Korean patrol, six to eight soldiers. And it was a pretty exhilarating experience. We kept filming. And they took a cigarette break and stopped just meters from us, and, fortunately, didn't see us. COOPER: You were there to do a documentary on North Korean refugees, which is actually the same story that -- that Euna Lee and Laura Ling were there to report on, went to the same area as you had gone to. And the story is about how difficult it is for them to escape, but even more difficult, it seems, is for them to get help once they're in China. There are reportedly tens of thousands of North Koreans in China right now either hiding or working at farms. Some of them are sold into the sex trade. And I want to show our viewers a clip from your film "Seoul Train" which shows how the underground railroad there essentially tries to help smuggle people out of North Korea and get them asylum. And here -- in this scene, we're going to show you a North Korean family is being helped by an activist. They are trained how to run into the Japanese Consulate in China to try to get help, to try to get sanctuary. We had them disguised as an ordinary South Korean family wearing bright-colored clothes. We had Han-mi carry a ball as if she were... (SPEAKING FOREIGN LANGUAGE) (through translator): Han-mi's father and uncle were instructed... (SPEAKING FOREIGN LANGUAGE) (through translator): ... push away the police officers near the entrance, so the women and the child could go in... (SPEAKING FOREIGN LANGUAGE) (through translator): When they reached the entrance, the men just ran in, not pushing away the police officers. They were probably very nervous. As a result, the child and woman were left outside. (END VIDEO CLIP) COOPER: So, what we are seeing here is -- is -- these are North Koreans who have -- who have gotten all the way to China, and they are trying to get into the Japanese Embassy. And they are being stopped. How hard is it for them to get any kind of asylum? What happens to these people once they are apprehended by the Chinese authorities? BUTTERWORTH: Well, almost universally, the Chinese authorities will forcibly repatriate these North Koreans back to North Korea. It is a capital offense to defect from North Korea. So, when you are sent back, it's -- it is bad news for the North Koreans. And that is what established them -- establishes their case as refugees. COOPER: Jim, stay with us. We are going to have more with you coming up after this break. We're also -- also going to be joined by Mike Kim, who lived on the border not far from where Euna are Laura are believed to have been captured. We're going to talk to him about his work actually helping people cross over. Let us know what you think about their situation. Join the live chat right now at AC360.com. Also tonight, a 360 exclusive -- the alleged killer of Dr. George Tiller speaking out, as Dr. Tiller's clinic announces whether the murder will means it closes for good. We will tell you for what they have decided. Also tonight, new clues to the crash of an airliner rising from the Atlantic -- the latest on Air France 447 when we continue. (COMMERCIAL BREAK) COOPER: Well, more than a day since North Korea's highest court sentenced Laura Ling and Euna Lee to a dozen years hard labor, since then, we have heard nothing from them, very little about the diplomatic effort to free them, no official comment tonight, no progress report, nothing. They were arrested along a winding stretch of river marking North Korea's northern border. But it is a boundary that is neither well- delineated, nor well-observed by North Korean guards, who often operate on the other side of it. Mike Kim spent years on North Korea's border with China helping North Koreans escape, ministering to them when they do, experiencing the arrest of a Chinese colleague inside North Korea. He has written a book about his experiences. It's called "Escaping North Korea." And Jim Butterworth, who you just made earlier, is a documentary filmmaker who made the movie "Seoul Train." Mike, you have helped hundreds of North Korean refugees, heard their horror stories about being sent to prison camps. And this is the same story that -- that Euna Lee and Laura Ling were working on for Current TV. You don't think that the -- that Ling and Lee will be put into a prison camp with others. Why? MIKE KIM, AUTHOR, "ESCAPING NORTH KOREA": I can only speak from our experience. We had one Chinese staff that was actually detained in North Korea as a result of a refugee informant that had turned him in when he was visiting North Korea. We negotiated his release. They -- you know, North Korea used him as a bargaining chip. They -- they offered actually to release him if he would help with drug trafficking between the China-North Korea border, and eventually gave a huge ransom amount and negotiated it down to a much lower amount and then paid for his release. So, I think they're -- they are really wanting to negotiate in these circumstances. COOPER: You -- you have talked to a lot of people who have been to these prison camps. What -- what is life like in these camps? KIM: Yes, I have interviewed a lot of people. In my -- in chapter six of my book, I have a chapter on gulags in "Escaping North Korea." And there is a section, a small section, I have titled "Forced Labor." And they -- they do work them hard. They get up at 6:00 a.m. They work to 10:00, 11:00 p.m. with very little food. And there's -- I have heard stories of sawing, construction, of cutting wood, mining, these types of things, but also meaningless labor, where they will have -- similar to stories I have heard during the Holocaust, the Nazi regime, where they are having people move rocks to one end of the compound, and telling them to move back -- move it back over and over again. COOPER: Jim, for the refugees who are -- who are trying to escape, I mean, they are risking their -- their entire lives to do this. BUTTERWORTH: Well, they're risking their lives and their family lives -- family's lives. If they make it across and if their capture gets publicized, then their entire family back home is at risk, too. COOPER: And the people, Mike, do they know much about what the -- the world outside North Korea is like? KIM: It is really unbelievable. When they come out, they have such little knowledge of the outside world. We -- one of the first things we do is set them up with Chinese TV, South Korean cable, so they begin to learn about the world. I interviewed one woman who was working for the military near the DMZ on the North Korea side. And her job was to pick up pro-democracy literature being flown in on balloons. And she told me in this interview that she used sticks to pick them up. And I asked her, "Why did you use a stick?" And her answer was, "Because they told if I picked -- if I touch anything from South Korea, my hands will rot." And I asked her, "You believed that at the time?" And she said, "Yes, I did." COOPER: Jim, this border crossing where -- where you -- we're -- the video we're looking at right now from the movie "Seoul Train" -- do the North Korean guards respect the border or do they -- I mean, I have heard stories they cross over into China and make arrests there. BUTTERWORTH: They will do that. They have been known to do that. In fact, when we were, there were -- it was commonly believed that there were hundreds of North Korean agents that actually had infiltrated the Chinese side of the -- the population there, which is almost entirely ethnic Korean. COOPER: Why would they do that? BUTTERWORTH: To capture not only refugees that had escaped into China, but also the activists that caught them. In fact, there is a bounty paid to Chinese citizens that would turn in North Korean refugees. But the bounty is actually 10 times that if they would turn in the activists that would help them or anyone that would assist them. COOPER: And, Mike, that is what happened to your Chinese colleague; a North Korean agent infiltrated this sort of underground railroad? KIM: That's right. It is a big problem. North Korea will send refugees -- spies posing as refugees to infiltrate networks. And, as a result, there have been people assassinated, abducted. And it really threatens to sabotage the work of NGOs there. COOPER: We have got to leave it there. Mike Kim, Jim Butterworth risked an awful lot to work along the border. We appreciate you telling us what you know. You can see more of Michael Kim's story at AC360.com. You will find a selection from his book detailing the food shortages, the beatings, the torture inside North Korean prisons -- more online as well from Jim Butterworth's award-winning documentary. So, the latest up next on a major terrorist attack at a five-star luxury hotel. Also, Scott Roeder speaking out only to CNN about his alleged crime and the impact it's having on the women's health clinic a murdered doctor ran. And what did David Letterman say for Sarah Palin to call him pathetic? What did she do for him to compare her to a -- well, a slutty flight attendant? Details of their war of words -- ahead on 360. (COMMERCIAL BREAK) COOPER: Still ahead: piecing together the wreckage of Air France Flight 447 and revealing new clues about its final moments, though, first, Erica Hill joins with a 360 news and business bulletin -- Erica. ERICA HILL, CNN CORRESPONDENT: Anderson, at least seven people are dead, more than 40 are injured after a suicide bombing near a five-star hotel Peshawar, Pakistan. Officials say three attackers shot their way into the grounds of the hotel and set off a car bomb. That blast damaged also the building and destroyed dozens of cars. In Raleigh, North Carolina, two workers are dead, one is still missing after an explosion at a Slim Jim plant. Dozens of people, including several firefighters, were injured. The Supreme Court giving the green light for Chrysler to sell off most of its assets to Italian automaker Fiat. Now, the court turned down a last-ditch bid, you may recall, to stop the sale. That came from opponents, including consumer groups and three Indiana pension plans. Ten of the nation's largest banks will repay $68 billion in government bailout money. They got the OK today. Experts say allowing these bank to return the money shows some stability has returned to the system, but caution the crisis is not over. And a judge in the South American -- in South America, in the country of Suriname, acquitting a Toni Braxton impersonator. You see her there on the left. She was acquitted of defrauding customers by pretending she is the Grammy winner. The woman spent three months in jail after angry fans belted her with beer cans and booed her offstage during a concert. Some of these people paid up to $53 a ticket, thinking they were going to see the real Toni Braxton. Now, this woman apparently claims that she was hired by some promoters to play at a private party. COOPER: Bizarre. HILL: Very bizarre. COOPER: Yes, very bizarre. Just ahead: The man charged with killing an abortion doctor speaks out to CNN. In an exclusive jailhouse interview, Scott Roeder says he is not mentally ill and he is glad the doctor's clinic is now closed. Also, combing the wreckage of Air France Flight 447 -- does the tail section continue some key clues that caused the crash? And comedian Stephen Colbert good at creating buzz, but convincing him to get a buzz cut, not so easy, apparently. We will show you what it took. That is tonight's "Shot." (COMMERCIAL BREAK) COOPER: "Uncovering America" tonight. The family of slain abortion provider Dr. George Tiller said today they are closing his Wichita, Kansas, clinic for good, effective immediately. It is one of only a handful of clinics in the entire country that provided third-term -- third-trimester abortions. The man charged with Dr. Tiller's murder, Scott Roeder, today called the closing of the clinic a victory. He made that comment in an exclusive jailhouse interview with our Ted Rowlands. Ted joins me now -- Ted. TED ROWLANDS, CNN CORRESPONDENT: Anderson, we had 30 minutes with Scott Roeder, no recording devices. It was just myself, Roeder, a pad of -- and pad a pencil. At one point, Roeder said that he felt good because he was getting letters of encouragement from across the country. He also talked about the death of Dr. George Tiller. (BEGIN VIDEOTAPE) ROWLANDS (voice-over): Dressed in the same type of maroon inmate outfit he wore here at his first court appearance, Roeder said he didn't want to incriminate himself and didn't answer specific questions about Tiller's murder. But he did say, if, in the end, he was convicted -- quote -- "The entire motive was the defense of the unborn." When asked what he thought of the fact that Dr. Tiller is dead, Roeder said -- quote -- "The fact that Tiller's clinic is closed is a victory for all the unborn children -- no more slicing and dicing of the unborn child in the mother's womb, no more needles of poison into the baby's heart." Roeder said, reports from his ex-wife and others that he was mentally ill, suffering from schizophrenia, were -- quote -- "completely false." He refused to comment on what, if anything, he said to Dr. Tiller that day in Wichita, and said he feared the possibility that he may face federal charges, in addition to the murder charge he's already facing in Kansas. Afterward, we asked Tiller family attorney Dan Monnat for reaction. DAN MONNAT, TILLER FAMILY SPOKESMAN AND ATTORNEY: Personally, I'm reluctant to, in any way, legitimize Mr. Roeder or anything he stands for by directly responding to his statements. Actually, I'm content to let law enforcement determine whether this defendant merits any attention. (END VIDEOTAPE) COOPER: Ted joins us now. What -- did he express any remorse about Dr. Tiller's murder? I mean, he clearly is -- is not saying -- he's not implicating himself. But did he express remorse or reluctance about it? ROWLANDS: No, not at all. In fact, when I asked him about Dr. Tiller's death, he was quick with his answer, and saying that it was great for the children, the unborn children. And another thing he never said was: "I'm innocent. You know, get me out of here. I didn't do this." That never came up. He was careful with the things he did say, but quick with his answer about Dr. Tiller's death. COOPER: What is he like? I mean, just sitting across from him, how different is he than the guy we saw in that -- in that court video? ROWLANDS: Well, you know, it is -- it's -- it's odd. He -- he had a kind of a sort of laid-back attitude. He -- he was cautious about the questions I was answering -- asking him, saying "No comment" a lot of times, but then would elaborate. And he would nod a lot of times. In fact, one time, I said: "Listen, there's a lot of evidence against you. People saw you with a gun shoot this man and point it at other people." And he was nodding and looking at me and kind of sheepishly. But -- but he was careful. He said his attorney didn't want him to talk. And he kept saying, "Oh, boy, my lawyer is going to be mad now." But it was an odd conversation. And you get the feeling that he wanted his side out there, he wanted people to hear what he had to say about this, and that he wasn't content just to listen to his attorney and sit in jail. COOPER: But he is receiving positive letters from people? ROWLANDS: Yes. That's what he claims. We tried to verify it with the jail. And we have not gotten a response and whether or not they will verify especially the contents of these letters. But he said -- at one point, I said, "How you feeling?" because he had been complaining about the conditions there -- here. And he said, "Oh, I -- I feel pretty good because I'm getting all of these positive letters from people around the country." And I said, "People you don't know?" And he said, "Yes, people I don't know." And, then when I asked for -- him to elaborate, he said, "No comment." COOPER: Interesting. Ted Rowlands, appreciate it. Thank you. According. Dr. Leroy Carhart is an abortion provider in Nebraska who counted himself as a close friend of Dr. Tiller's. They worked together for the past decade. He joins me now live. Dr. Carhart, your reaction to -- to the decision to -- first of all, to close Dr. Tiller's clinic by his family? DR. LEROY CARHART, FRIEND OF DR. GEORGE TILLER: Well, this did not come as a surprise to me. I have known the Tiller family for 20 years. And nobody, no family in this movement, in the -- in the pro-choice movement, has committed or given more than the Tillers have. Jeanne has -- gave the last 20 years of her life, basically, to make this possible, and her children. And they have lost their father. They have lost their grandfather. They have -- she has lost her husband. The fact that she wants out, I think that is a rational decision. And I have absolutely no bad feelings about that. COOPER: You probably heard from Ted Rowlands' piece some of the things that this man, Scott Roeder, has said. He -- he says -- he called the -- the closing of the clinic -- quote -- "a victory for unborn children." How do you respond? CARHART: Well, I think, you know, the closing of the clinic, Mrs. Tiller said she is going to close the clinic. But the fact is that we are going to do everything in our power to ensure that women still have an option for late-, second- and the early-third-trimester abortions that are medically indicated. COOPER: But, as -- as you well know, the number of -- of doctors who actually do this procedure, I think you said there's about 10 of them in the entire country. Are you concerned that, increasingly, they are going to choose not to do this procedure? I mean, how committed are those 10 doctors? CARHART: I know how committed four of us are. And I know that we already have a new person that is interested to come in and join the three of us that already have been with Dr. Tiller. We're ready to start a practice tomorrow if -- if we come across the -- the building and the equipment to do that. COOPER: And can you -- to -- to those people who abhor this procedure, or disagree with it, or maybe don't understand it, what do you say? I mean, why would you choose to do this procedure, when -- when, I mean, you are one of, as you say, only a handful? CARHART: Well, first of all, to the people that abhor, I would suggest that they don't have it done. I think the women that need it certainly are the women -- the women that I'm worried about. You know, we hear -- we see protesters that number in the tens, twenties and maybe 1,000 some time. Dr. Tiller and I see thousands of patients every year. We have a very vocal, terroristic minority of people that are anti-choice. And they have chosen to take the law in their own hands, vigilantism. They have murdered Dr. Tiller. They have murdered four providers before him. I think the question is, how long is the country going to allow this terrorism to continue, before they crack down and before we have the right to perform a perfectly legal procedure? COOPER: I want to ask you about a quote that you gave to "The Washington Times" that has raised some eyebrows. You said Dr. Tiller's murder is -- quote -- "the equivalent of Martin Luther King being assassinated." I think you were talking about its effect upon those who -- who support abortion rights. One of Dr. King's nieces who is affiliated with the group Priests For Life responded saying -- and I quote -- "For Leroy Carhart to mention the murder of Dr. Martin Luther King Jr., who worked through peaceful and nonviolent means, in the same breath with that of George Tiller, whose work ended peace and brought violence to babies in the womb, is offensive beyond belief." CARHART: Well, as -- as you said, she is on the other side. So, I don't expect anything different. The entire comment that I made, however, was not to compare Dr. Tiller to Dr. King. I said that the sinking of the Lusitania, the bombing of Pearl Harbor, and the murder of Martin Luther King were turning points in a movement. And this was our turning point. The murder of Dr. Tiller was the turning point for our movement. COOPER: You believe this really is a turning point, in that it's going to bring more people to -- to continue this practice? CARHART: Yes, Mr. Roeder mentions the letters he has gotten, which may or may not be true. I have -- we have gotten -- my e-mail has gone over the limits every day since the Tiller murder, with people asking how they can help, how they can continue -- or what they can contribute to make this practice continue. And the outpouring has been phenomenal. It -- it's a shame, but Dr. Tiller will be a martyr, unfortunately, for his family. But he has -- he has -- became a martyr for our cause. And I -- I think that the terrorism will stop in this country. COOPER: Dr. Leroy Carhart, we appreciate your time. Thank you. CARHART: Thank you, sir. COOPER: For a look inside one of the few clinics that perform late-term abortions, go the AC360.com right now. So, what is your take on Scott Roeder and the fan mail that he says he's getting or on Dr. Carhart's comments? You can join the live chat happening now at AC360.com. Still ahead: solving the mystery of Air France Flight 447, piecing together possible clues in the wreckage. We're going to show you what investigators have found so far, a lot we still don't know. But they are slowly piecing some stuff together. Also tonight, Mexico's drug war takes another chilling turn. If you think it couldn't get any worse? Now a popular tourist destination turns deadly -- details and the death toll ahead. And Sarah Palin's new feud, this time with David Letterman -- the question is, who fired the first shot? When 360 continues. (COMMERCIAL BREAK) COOPER: There's news tonight about those air speed sensors we've been reporting on, the crash of Air France Flight 447. A pilot's union says that Air France has agreed to replace the critical part, called a Pitot Tube on all of its Airbus A-330s and A-340 planes within days. Investigators are looking into whether the sensor played a role in the catastrophic crash over the Atlantic. Meantime, Brazilian searchers today began bringing ashore bodies and wreckage from the crash. Today four more bodies were recovered. Four more people, bringing the total to 28 people found so far. The remains of passengers could yield some important clues about the crash, of course. So, too, could the plane's actual wreckage. Tom Foreman takes us up close. (BEGIN VIDEOTAPE) TOM FOREMAN, CNN CORRESPONDENT: Anderson, this is what the jet looked like when it hit that storm. And these are the major pieces that have been found so far that we know of. They're all clues in the mystery of this crash. Start with this tail fin back here. Aviation analysts are looking at it closely. Because they say if this had been attached to the plane when it hit the water, it would have crumpled. Instead, it is largely intact, like this other tail fin from another crash in New York about eight years ago. That was an A-300, not an A-330. The National Transportation Safety Board determined this tail fin broke off in flight during emergency maneuvers, causing the crash when the plane was responding to turbulence. Peter Goelz is a former NTSB official. PETER GOELZ, AVIATION ANALYST: The pilot hit rough air. The rudder snapped full to the left. He then compensated, snapped back. He overcompensated. It snapped back. It snapped back again and then snapped off. FOREMAN: That's one possibility in this crash, too. Other clues have also been found. Let's take a look at them. Cabin seats and personal effects that belonged to many of the passengers there. If the seats and these items are from the back of the plane, for example, and they show less crushing damage than those up front, that might suggest they also fell out of the plane as it dropped, meaning maybe that whole section broke up in flight. Then there's wiring, bits of mechanical parts of the plane. All sorts of things that really have to be looked at closely, looking for signs of, say, fire. GOELZ: Was there an explosion? Was there anything that gives investigators a hint of what was going on? FOREMAN: The real key here is still the flight data recorder, believed to be two miles or more down on the bottom of the ocean, amid all these underwater mountains and troughs here. It's supposed to be emitting a locater signal out in all directions like this. But even though they have a submarine in the water and ships up on top listening for it, they haven't been able to pick it out yet through all of this clutter. And the clock is ticking. This beacon works for 30 days, and already about a third of that time is gone -- Anderson. (END VIDEOTAPE) COOPER: Tom, thanks very much. While we wait for answers in the Air France investigation, we're learning new details about the so-called "Miracle on the Hudson." We all remember the pictures, of course. U.S. Airways Flight 1549, forced to ditch in New York's Hudson River after a bird strike back in January. Amazingly, everyone on board survived, and the pilot, Captain Chesley Sullenberger, was celebrated as a hero. Rightfully so. Well, today, the National Transportation Safety Board opened three days of hearings on Flight 1549. It was a close call. Captain Sullenberger testified, and so did Billy Campbell, a passenger who was in seat 25-A, the second-to-last row of the plane. And he was the last passenger out the door. His testimony today was simply riveting. Here's Billy Campbell in his own words. (BEGIN VIDEOTAPE) BILLY CAMPBELL, PASSENGER ON FLIGHT 1549: Those of us in the rear took the impact first. I almost felt like I was on a cruise ship, because as I looked out the window, the plane submerged, and it felt like I was looking out a porthole, as we were underwater. When we finally came to a stop, sort of feeling the miracle of, wow, survived this crash, immediately water was rushing in through my window. I guess my biggest concern, along with everyone's back there, was how do we get out? I decided the only shot that I had was actually to go to the right side and to start climbing over the seats. And so I went to row 26 and started to climb over the seats. And I'd like to consider myself a little athletic and in a dry vac (ph) I would have been hurdling those seats. But the water was up to about -- about here on the seat backs, and so we couldn't get much traction. I was able to pull myself over each seat and then kind of fall into the water and then regroup and grab the top and sort of pull myself back over. Did that all the way until I got up to, I think, row 14 or 12 or wherever the wing is. And the first time that I felt like maybe I might make it. (END VIDEOTAPE) COOPER: Imagine that. Investigators have released the transcript of the conversation between Sullenberger and his co-pilot and air traffic controller before their landing. We posted it on our Web site, AC360.com. Coming up next, the drug war in Mexico, erupting at a popular Mexican resort, leaving dozens dead. Is anywhere in the country safe if this place isn't? We'll have the latest from the war next door. And the first Gitmo detainee arrived in America today. His charges and what his transfer means for other Gitmo detainees, coming up. Also tonight, meet the newest Internet sensation. His name is Darren, and he has a lot of fans. (COMMERCIAL BREAK) COOPER: Popular tourist destination with celebrities including John Wayne, Elizabeth Taylor used to vacation is now the front lines of Mexico's escalating drug war. Gunmen killed three police officers in Acapulco early yesterday morning in attacks on two police stations. The murders came just two days after a four-hour gun battle between soldiers and suspected drug traffickers left 17 people dead. So who's behind the violence? It's tonight's "Crime & Punishment" report. Here's Ed Lavandera. (BEGIN VIDEOTAPE) ED LAVANDERA, CNN CORRESPONDENT (voice-over): Bursts of gunfire echo through the darkness of Mexico's streets. It's the sound of a drug war, but this time it's different. RUSTY FLEMING, AUTHOR, "DRUG WARS": You are seeing a new level of the war on drugs in Mexico. And now, of course, you've got an administration that is taking the war directly to these guys. You're going to start seeing them in places that we never thought they existed. LAVANDERA: but it seems no place is immune. This gun battle took place in the tourist Mecca of Acapulco, a place largely untouched by drug violence until now. The battle started over the weekend when Mexican troops raided a suspected safe house of the Beltran-Levy drug cartel. When the smoke cleared, more than 3,000 shots had been fired, 50 grenades exploded, and 17 people killed, including two soldiers and two innocent bystanders. Terrified tourists fled from the area. Inside the gated house where the gunmen were holed up, soldiers found four handcuffed shirtless men, who claimed to be kidnapped state police officers. And then yesterday, another rampage of gunfire and explosions. Two police stations were riddled with bullets and pounded with grenades in a coordinated, near simultaneous attack. Three policemen were killed and one wounded. Reports say state officials were investigating whether it was a retaliatory attack, while Mexican soldiers in trucks and in helicopters kept watch over a nervous resort town. Some 2,300 people have been killed just this year in Mexico's drug violence, the latest of nearly 11,000 victims since the nation's president unleashed military forces against drug traffickers in December of 2006. The U.S. State Department has a travel alert warning Americans of the increased levels of violence. The Mexican government says its resort towns are safe, but Fleming disagrees and says open warfare in places like Acapulco is only just beginning. FLEMING: All of those drugs have to come in, in shipping lanes. And those are shipping ports. So of course, they've got a presence there. And of course, you're going to see as, you know, these guys, their operations become uncovered by the military and the military gets to pursue them, you're going to see more of this kind of violence. LAVANDERA: A new front in the war on drugs, another town gripped with fear. Ed Lavandera, CNN, Mexico City. (END VIDEOTAPE) COOPER: Make no mistake about it: this is a war being waged right next door. Let's dig deeper with Fred Burton. He's vice president of counterterrorism and corporate security for Stratfor Global Intelligence Company and author of "Ghost: Confessions of a Counterterrorism Agent." Fred, thanks for being with us. What does it mean that these drug wars have now spilled over into Acapulco, a popular resort city? FRED BURTON, VICE PRESIDENT OF COUNTERTERRORISM AND CORPORATE SECURITY, STRATFOR GLOBAL INTELLIGENCE COMPANY: This is a significant twist, Anderson, in that how much more can the Mexican economy take? We've had the horrific cartel wars. We've had the swine flu. Now we've had this gun battle, the likes of which that you'll see in Afghanistan or Somalia, on the streets of Acapulco. And in essence, we had tourists fleeing in taxis. COOPER: Yes, I mean, the Mexican government, I was down there for "60 Minutes" and for CNN. The Mexican government is trying to rebuild the federal police force, bringing them into the modern age with new equipment, trying to get better officers, better training. And they're relying on the Mexican military. They've deployed Mexican military, 45,000 personnel deployed throughout the country. Is the military simply tapped out? I mean, can they actually handle the cartels? BURTON: I think the military's bandwidth is stretched extremely thin. If you think about the various fronts that they're fighting, from Juarez to Nueva Laredo to now Acapulco. And there's just these flare-ups all over the city. COOPER: I don't think a lot of people in the United States realize the impact this has on the United States already. I mean, according to the Justice Department, Mexican drug cartels, this is the biggest organized crime threat to the United States. Do you see it as a national security issue for America? BURTON: I certainly do. We've been saying that at Stratfor for quite some time, Anderson. If you look at just the impact on the United States, not to mention just the human toll of the drug violence. But their interface with the criminal gangs on the streets of America, there's no city that's not touched by the cartels in Mexico. They are the downstream supply chain of drugs to America. And in essence we need to get a handle on the cartel violence. COOPER: You talk about the hit on tourism in Mexico. Would you go to Mexico as a tourist? I mean, I went down there a couple weekends ago to Baja, to Cabo and had a nice weekend. It was a guarded compound. You know, one of these development resort. But there's a lot of people wondering about whether they should travel to Mexico. What do you tell them? BURTON: I think you have to be very selective. You have to have a high-degree of situation awareness. You've got to use your head. You've got to be careful where you're going and get as much information before you travel. The problem is, is you could see with Acapulco, is you could be at the wrong place at the wrong time when the cartels decide to move in or the Mexican military tries to move in and capture a high-value target. COOPER: When I interviewed the Mexican attorney general a couple months ago, he said, "Look, we're making progress." They seem optimistic. Is that just putting on a brave face, or do you think they're making progress against these cartels? Can they destroy these cartels. BURTON: I think if you look at the body-count alone, we're trending at the same level of cartel-related homicides as we did last year. We really don't see any change in the security threat inside of Mexico. And if you look at some of these flare-ups like this, like what we had in Juarez when you were there and we last spoke. And then you look at Acapulco, this is a deteriorating situation. And this could happen any place inside the country. That's their span of control. COOPER: We've been working on a story that, frankly, boggles the mind. It's about a guy who said he was a war vet, who simply wasn't who he claimed to be. That and the people, important people he fooled. Joe Johns did the reporting. Here's a quick preview. (BEGIN VIDEOTAPE) JOE JOHNS, CNN CORRESPONDENT (voice-over): This man was seemingly the perfect political weapon: a veteran at the Pentagon when it was struck on 9/11. He said he did three tours of duty in Iraq, where he said he was wounded by a roadside bomb. Back home he said his mission was to help homeless veterans speak out for an end for the war and to campaign, mainly for Democrats. UNIDENTIFIED MALE: Each one of those people that were lost, that's someone mother, someone's father, someone's brother, someone's sister. There's a family that has a void. And clearly, the mission is not accomplished. JOHNS: A compelling story everyone believed until the day authorities said he was an impostor. UNIDENTIFIED MALE: We all were kind of stunned by this. Because it seemed like such a fundamental betrayal. (END VIDEOTAPE) JOHNS: Anderson, this is a tricky story to report, because so many people believed him at first. And now many people feel betrayed as well as embarrassed they didn't catch on. COOPER: Unbelievable this guy got away from it for so long. Joe, we're going to have the full story tomorrow on "360." Join us for that. Coming up tonight, though, pictures rarely seen on the border of North Korea and China. Could be the very spot where Laura Ling and Euna Lee were arrested. We'll try to figure out what it tells us. Back here at home, caught on tape. A cop tasers a great grandmother, 72 years old. The video has people talking. Did the police go too far? Were they right in doing this. You can try to decide for yourself. And why Sarah Palin is calling David Letterman pathetic when 360 continues. (COMMERCIAL BREAK) COOPER: Coming up, we've seen Stephen Colbert's buzz cut. Who ordered the trim and what -- well, what it ended up looking like. It's tonight's "Shot." But first Erica Hill joins us with the "360 Bulletin" -- Erica. ERICA HILL, CNN ANCHOR: President Obama wants Congress to take a pay as you go approach to spending, proposing a law that will require lawmakers cover the cost of federal programs by either raising taxes or cutting the budget. In the 1990s, a similar mandate helped erase the federal budget deficit. The first Guantanamo Bay detainee to be brought to the U.S. for trial is in a New York jail tonight. Ahmad Ghailani pleaded not guilty today to charges he participating in the bombings of two U.S. embassies in Africa in 1998. Those attacks killed 224 people, including 12 Americans. A 72-year-old great grandmother in Austin, Texas, is demanding to know why a police officer pushed her and tasered her during a traffic stop. Watch this. HILL: The woman was stopped for speeding police. And say she had refused to sign the ticket and began screaming. And then when she got out of the car, officials say the officer pushed her so she wouldn't be hit by traffic. Police also say the officer gave her five warnings that she would get tasered if she did not stop screaming. She is charged with resisting arrest. Former vice presidential candidate Sarah Palin isn't laughing at David Letterman's top ten list last night. In fact, she call him pathetic on a radio show today. Here's why she's upset. And meet the new Internet sensation. Just a lighter note here to wrap it up. This is Darren, the waving goat. The waving goat. Watch this. Oh, look. Hey, Darren. Nice to see you, too. Hey, Anderson cooper. It's Darren. He lives on a farm in England where school kids love to see his moves, not to mention people sitting in a newsroom all the way across the ocean in New York. COOPER: Wow. HILL: Yes. COOPER: He's soon to have his own series, probably. HILL: It's only a matter of time. Maybe he's going to be on the next "Britain's Got Talent." COOPER: Maybe so. So Erica, last night was kind of a stroll down memory lane, you and I. We talked about our first concert experiences. I'm still not sure if mine was Grandmaster Flash and the Furious Five or Elvis Costello. HILL: No, I knew I went to Janet Jackson, Rhythm Nation 1814, which I won the tickets to while baby sitting. But I had forgotten that Stevie and I went to see Peter, Paul and Mary. COOPER: Stephen? HILL: My dad, Stevie. COOPER: You call your dad Stephen? HILL: When I talk about him I do. I called him "Dad." Anyway. COOPER: So we asked our viewers to -- and people online to tell us about their first concert experience on the blog. An overwhelming response. Here's some of our favorite reactions. Tim Gibson said, "Sweet Jesus, my first concert way back in the day, the '70s, was an outdoor three-day, two-night event. It featured Cheap Trick, Ted Nugent and all the good-old-boy rock band of the day. HILL: That's good stuff. How about this one: That's old school, but not Mandy, who wrote, "New Kids on the Block?" NKOTB, Davie. "Was my first show. I was 11 I was 11. Made my mom buy me my first bra just in case I ran into Jordan knight. When I got home, still in my NKOTB days, I realized the aforementioned bra was fitting nicely around my waist." COOPER: Here is Theresa B.'s post: "My first concert was Rick Springfield when I was 14. My mother thought I was going to see Bruce Springsteen, who was too wild, so I had to play 'Jesse's Girl' and explain who he was." HILL: It's fantastic. He just came out with an album of lullabies and children's tunes. COOPER: Really? HILL: It's true. COOPER: Wow. HILL: Had them on my other show a few weeks ago. And finally, Sue wrote, "I had two first concerts. The real first was Leif Garrett." COOPER: Wow. HILL: "Rock on, when I was 12. My first grown-up concert was Van Halen in 1982. Rock on!" COOPER: Yes. Wow. I love it. HILL: These posts were fantastic. COOPER: Feel free, AC360.com. I'll have the live blog. You can weight in. We're still got a couple more minutes. So weigh in. Let us know what your first concert was. And we'll keep this thing going. "The Shot" is coming up next. Stephen Colbert's new do and why it almost didn't happen. We'll be right back. (COMMERCIAL BREAK) COOPER: Erica, time for tonight's "Shot." Last night we showed you Stephen Colbert's hair cut. At first glance, it looked like a bold tribute to our troops. Now we know the real story. Turns out Colbert needed a little persuading from the highest levels of the military. Watch. (BEGIN VIDEO CLIP) COLBERT: It's going to take more to get me to cut my hair. BARACK OBAMA, PRESIDENT OF THE UNITED STATES: I say if Stephen Colbert wants to play soldier, it's time to cut that man's hair. COLBERT: Wait a second. Wait a second. OBAMA: General, as the commander in chief, I hereby order you to shave that man's head. COLBERT: We'll be right back. (END VIDEO CLIP) HILL: Good time. COOPER: Nice job the general did. You've got to love the snazzy camouflage outfit, as well. HILL: That suit is fantastic. COOPER: It's very cool. HILL: I bet you they're going to be getting a lot of orders for that. COOPER: They probably will. You can see all the most recent "Shots" at our Web site, AC360.com. A lot more news ahead. Coming up at the top of the hour, some very tough talk. Serious stuff. North Korea issuing a nuclear threat. We dig deep into the fate of two American Journalists, facing prison there. We'll be right back.
[The methodological problems of the correlation of biochemistry and physiology in current research]. An attempt to treat critically the key methodological positions of modern biochemistry, primarily, the medical biochemistry with reference to the physiologic, pathophysiologic and clinical tasks is made. The author puts forward questions: 1) if it is possible to apply traditional approaches (principles) of biochemical investigation developed on purified systems to the whole organism systems in situ and etc.; 2) if it coincides the methodical approaches of biochemistry on the one hand and physiology (pathophysiology)--on the other one, considering the mechanisms of disease development and correspondingly the assessment and choice of therapeutic methods; 3) if there exists a necessity to create a unite methodology of biochemical and physiologic knowledge as a basis of modern medical science as a whole. Some examples showing the possible ways of new methodic consideration of traditional conceptions of in vitro biochemistry are given.
company insurance allstate insurance company of canada national american insurance company of california Health insurance company colorado home insurance company pierce national life insurance company online travel insurance company louisiana farm bureau insurance company national foundation life insurance company medical malpractice insurance company cheap travel insurance company erie insurance company of ny company fidelity insurance life national health insurance company in missouri american medical and life insurance company company insurance life national republic compare health insurance company met life investor insurance company american equity life insurance company allied company insurance canadian company health insurance new jersey car insurance company. Company insurance life midland national company health insurance marketing united state farm mutual automobile insurance company combined company insurance life company family heritage insurance life golden rule health insurance company company hartford insurance midwest company insurance life midwest national the medical protective insurance company care company health insurance american modern home insurance company best health insurance company capital cincinnati company equity insurance southwestern life insurance company alberta car company insurance sterling investor life insurance company broker cincinnati company insurance cincinnati company critical illness insurance insurance medical insurance company ohio. Non standard auto insurance company company in insurance travel uk health insurance company in southern california medical malpractice insurance company midwest best insurance company mobile home insurance company home owner insurance company in california reliance standard life insurance company company golden health insurance rule 21st century insurance company american company insurance progressive georgia farm bureau mutual insurance company cincinnati company corporate imaging insurance company financial insurance life transamerica company hancock insurance john life variable care company insurance life mutual northwestern company fidelity insurance national title top health insurance company company florida health insurance. Car company diego insurance san united american insurance company company insurance life lincoln national dairyland county mutual insurance company of texas liberty life insurance company car company insurance massachusetts company credit insurance rating company insurance life zurich company insurance reliance standard consumer rating insurance company find insurance company northwest mutual life insurance company san diego car insurance company florida medical insurance company company health insurance ny auto company geico ins insurance auto best company insurance medical liability mutual insurance company erie auto insurance company. Casualty cincinnati company insurance travel auto company geico insurance allstate floridian insurance company company infinity insurance settlement company insurance life rated top health and medical insurance company company dental insurance liability professional company insurance medical uk company find insurance company insurance life national trust hartford underwriter insurance company north carolina farm bureau mutual insurance company automobile car company insurance insurance small company health insurance standard life insurance company of indiana car insurance company in new york financial american life insurance company hartford insurance company company dental insurance. Company health insurance michigan auto company home insurance national western life insurance company car insurance company in georgia canada car company insurance uk medical insurance company company home insurance joliet,joliet company home insurance rockford,rockford company insurance medical texas company insurance life national ohio bc company health insurance life health insurance company in illinois company insurance lloyds texas traveler best car company insurance combined company insurance life new york new york life insurance company texas medical insurance company louisiana farm bureau casualty insurance company car company find insurance. California automobile insurance company primerica life insurance company anderson,anderson company home insurance best rated insurance company company insurance life national reserve madison national life insurance company republic mortgage insurance company axa equitable life insurance company company insurance life mutual physician company insurance mortgage republic company health insurance international investor title insurance company california company dental insurance cincinnati company emergency insurance insurance medical health insurance company allstate life insurance company company insurance life national pierce american capital company insurance life guardian dental insurance company. Com company insurance usaa company insurance mortgage pmi philadelphia american life insurance company car company insurance ireland travel insurance company uk america company ct hartford insurance life reassure health insurance company list car company driver insurance motor usaa insurance company claim mortgage protection insurance company company indiana insurance life standard sterling life insurance company company insurance life rate term uk california company insurance medical health insurance company ohio mutual life insurance company aaa life insurance company company income insurance life national phoenix mutual life insurance company. Car cincinnati company financial insurance company health insurance name canada car company insurance ontario florida medical malpractice insurance company cincinnati life insurance company home warranty insurance company american medical security life insurance company canada company equitable insurance life car insurance finance company american fidelity life insurance company sample insurance company business plan united family life insurance company american mayflower life insurance company commerce west insurance company health insurance company in north carolina oxford health insurance company life insurance company of india business company insurance medical small colonial life accident insurance company. Us health and life insurance company travel insurance from uk company california company home in insurance owner liberty mutual fire insurance company affordable care company health insurance small company india insurance life old republic title insurance company top term life insurance company cincinnati insurance company sierra health and life insurance company company insurance medical ohio casualty cincinnati company home insurance rate insurance company health missouri cincinnati company indemnity insurance 10 company health insurance top top 10 health insurance company company insurance insured scottsdale company dental insurance malpractice pa cincinnati company insurance. great west life annuity insurance company company insurance life ten top Auto insurance company 21st century insurance company company insurance medical ohio health insurance company colorado company insurance life ten top canada company geico insurance auto cincinnati company company indemnity insurance company insurance liability malpractice medical coventry health and life insurance company insurance company business plan canada company health in insurance california company consumer health insurance review company forge insurance life valley company hancock insurance john life american standard insurance company of wisconsin nationwide insurance company health insurance company in pennsylvania care company health insurance madison national life insurance company. Best insurance company rating top health insurance company medical life insurance company american public life insurance company care cincinnati company insurance insurance long term company health humana insurance cincinnati company home insurance insurance rate combined insurance company of america bc company home insurance victoria canadian car company insurance automobile casualty cincinnati company insurance combined company insurance life new york auto company ins insurance usaa top 100 life insurance company automobile california company in insurance company insurance mortgage protection company insurance life metropolitan tower life insurance company of north america life insurance company in new york. Annuity company ing insurance life life insurance company in india cincinnati company debt insurance management annuity company genworth insurance life 10 company health insurance top company compare health insurance top 10 health insurance company auto casualty cincinnati company insurance cincinnati company insurance insurance litigation auto company insurance traveler am best rating of insurance company allstate company insurance life product united american insurance company complaint car cincinnati company insurance insurance nationwide mutual fire insurance company company home insurance orlando,orlando american income life insurance company and scam colorado car insurance company small business medical insurance company. Car company insurance seattle aetna health insurance company of new york standard and poors insurance company rating american amicable life insurance company company dental insurance jose san north american life insurance company car insurance company in calgary cheapest company car insurance company insurance malpractice medical virginia scottsdale insurance company guarantee trust life insurance company farm bureau mutual insurance company of kansas aig auto insurance company best meridian insurance company company company cost health insurance insurance low health insurance company in southern california standard security life insurance company midland national life insurance company company conseco health insurance senior. Adrian agent company insurance title company insurance life national union company farmer insurance mutual union texas health insurance company annuity cincinnati company insurance auto cincinnati company insurance texas farm bureau insurance company company insurance life national vermont american company insurance life philadelphia company insurance life quote rate term usaa insurance company web site car company in insurance new york allstate car car cheapest company insurance cincinnati company indemnity insurance american general life insurance company company cost health insurance low non profit cincinnati company insurance insurance rv company erie insurance ny erie insurance company of ny. Jefferson national life insurance company aflac insurance company cincinnati company complaint insurance insurance allstate floridian insurance company auto car company free insurance insurance online quote company fire insurance liberty mutual insurance company financial rating company compensation hartford insurance insurance worker philadelphia indemnity insurance company california car company in insurance rating combined life insurance company of new york car company insurance list mutual savings life insurance company cincinnati life insurance company company insurance investor life met usa company insurance life mortgage health insurance company in missouri company florida home in insurance mobile state car company insurance top. Company gainesville,gainesville home insurance combined life insurance company company cost health insurance low health insurance company in texas florida medical insurance company auto company health insurance insurance life mega quote rate company hartford insurance underwriter florida title insurance company company insurance malpractice medical michigan auto company home insurance unitrin connecticut attorney title insurance company company health in insurance nj progressive west insurance company car car company finance insurance rate usaa life insurance company cincinnati company disability income insurance insurance title insurance company pa best company health insurance life aarp affordable company health insurance. Casualty cincinnati company health insurance casualty cincinnati company insurance travel cincinnati insurance company auto insurance national title insurance company allstate new jersey insurance company business company insurance medical small canada company equitable insurance life best rated life insurance company loyal american life insurance company national benefit life insurance company business company insurance small irish travel insurance company company offer pet health insurance alliance business company insurance combined insurance company best company insurance meridian car company finance insurance personal health insurance company rating title insurance company regulation. Health insurance company in illinois transamerica life insurance and annuity company principal mutual life insurance company company health in insurance pennsylvania republic national life insurance company car cheap company finance insurance allianz allianz america company insurance life life north company insurance insured scottsdale prudential property casualty insurance company texas medical insurance company company golden health insurance rule golden american life insurance company company health insurance major medical supplemental health insurance company cincinnati insurance company company home insurance joliet,joliet company home insurance life united car company insurance woman fortis dental insurance company. Equitable life insurance company american state life insurance company kentucky farm bureau insurance company allianz bajaj company insurance life auto and home insurance company allianz life insurance company home and car insurance company auto car company direct insurance insurance banking cincinnati company insurance private company insurance life national security car company insurance rental hartford fire insurance company america company health insurance mutual of america life insurance company car company houston insurance the equitable life insurance company of canada country life insurance company company insurance long stay travel uk american company home insurance western. Auto insurance company medical liability insurance company car company insurance seattle financial american life insurance company care cincinnati company insurance insurance long term company health insurance national texas violation company health insurance major top life insurance company company family heritage insurance life company grande insurance life national rio allstate floridian insurance company blue shield of california life and health insurance company health insurance company in georgia equitable life insurance company auto company health insurance insurance life mega quote rate new jersey car insurance company united health care insurance company medical malpractice insurance company in texas farm bureau life insurance company. Auto company insurance traveler automobile insurance company provident life and accident insurance company florida home insurance company company insurance malpractice medical radian mortgage insurance company business company health insurance small pacific mutual life insurance company company insurance mortgage private company health insurance national texas cheap uk car insurance company company income insurance life national american amicable life insurance company of texas best rated insurance company kentucky farm bureau insurance company company in india insurance life north carolina farm bureau mutual insurance company company group health insurance life insurance company new york. Company connecticut insurance life mutual national benefit life insurance company new york cincinnati commission company insurance cincinnati auto insurance company company insurance multi travel trip us company directory health insurance home beneficial life insurance company texas medical malpractice insurance company company insurance life term am best rating of insurance company company insurance limit malpractice medical pay connecticut attorney title insurance company cheap car insurance company company health in insurance pennsylvania golden state mutual life insurance company company insurance life phoenix rating of long term care insurance company title insurance company agent supreme liberty life insurance company. Health insurance company in virginia canada company health insurance address for aetna health insurance company erie insurance company auto casualty cincinnati company insurance name of car insurance company stewart title insurance company american mayflower life insurance company allstate company insurance life new york cincinnati company critical illness insurance insurance american enterprise life insurance company principal mutual life insurance company cincinnati company family individual insurance whole life insurance company standard security life insurance company traveler auto insurance company care company health insurance plan united northwest mutual life insurance company am best company insurance life. Aig annuity insurance company company in insurance medical geico automobile insurance company car company ct insurance car insurance company in calgary rate home owner insurance company first health insurance company ct car insurance company farmer mutual insurance company of nebraska california company health in insurance rated top company health insurance international student travel guardian life insurance company american national life insurance company business company insurance plan sample medical malpractice captive insurance company adrian agent company insurance title canada home insurance company cincinnati company funds insurance company insurance life mutual new york. Physician mutual life insurance company business company insurance small company dental fortis insurance allstate company insurance product securities company insurance life london protective company insurance pet rating car insurance company in texas company insurance medical ohio shenandoah life insurance company ing life insurance and annuity company company hartford insurance life insurance company rating service company home insurance owner quote rate company health illinois in insurance company insurance life old standard standard fire insurance company company insurance life manhattan national company insurance life term uk car company in insurance ny. Cincinnati company education insurance savings benefit company insurance life national new york allstate company division insurance life workplace american united life insurance company accident company in insurance life provident american company country insurance west coast life insurance company car company georgia insurance long term health care insurance company home insurance company cincinnati florida medical insurance company company financial insurance rating health net life insurance company hartford life and accident insurance company company health insurance top nc health insurance company company insurance life national security louisiana health insurance company american medical and life insurance company. American california company insurance national company health in insurance infinity auto insurance company company fund insurance investment nationwide health insurance company in new york international health insurance company company insurance liability medical professional health insurance company in nj company home insurance joliet,joliet car company in insurance nj company insurance medical mutual country company insurance cincinnati company compensation insurance worker allstate insurance company of canada health net insurance company cincinnati company home insurance insurance owner annuity company genworth insurance life america company home insurance owner california care company health insurance. Health insurance company new york cincinnati company equitable insurance company health insurance national top 10 health insurance company medical savings insurance company foremost insurance company commonwealth title insurance company american founder life insurance company company insurance mortgage allstate insurance company product life cincinnati company company home indemnity insurance company from home insurance work company health insurance missouri company dental insurance hartford life insurance company car company insurance nj manhattan national life insurance company health insurance company southern california beneficial company home insurance life. Company insurance life zurich traveler insurance company company insurance jefferson life standard progressive group of insurance company company health insurance travel american income life insurance company rio grande national life insurance company affordable company health insurance car company insurance traveler bureau company farm insurance kentucky mutual national foundation life insurance company assurant company health insurance company health insurance nc auto company geico ins insurance health insurance company north carolina america company health insurance midwest national life insurance company company insurance life rate term uk transamerica life insurance and annuity company. company insurance life national washington john alden life insurance company Small business insurance company american company insurance zurich business company florida home insurance care casualty cincinnati company insurance long term health insurance company company insurance life national vermont continental american life insurance company company insurance life zurich sample insurance company business plan national health insurance company texas aig insurance company indiana health insurance company auto insurance company mutual savings life insurance company company health in insurance virginia cincinnati company compensation insurance worker usaa insurance company web site company insurance medical protective allied casualty company insurance property. Company insurance jackson life national best auto insurance company madison national life insurance company company insurance liberty life national new york title insurance company company health in insurance texas company home insurance springfield,springfield car company in insurance toronto standard life insurance company of indiana cincinnati property casualty insurance company cincinnati indemnity insurance company texas farm bureau insurance company prudential insurance company of america car insurance company usaa company insurance malpractice medical mutual pie illinois mutual life insurance company low cost health insurance with a copay life insurance company top rated car insurance company. Mortgage protection insurance company company home insurance orlando,orlando national fire insurance company of hartford liberty life insurance company health insurance company in oregon casuality company company insurance insurance usaa cincinnati company home insurance insurance owner annuity company ing insurance life company insurance mortgage radian affordable company health insurance auto company home insurance american company health insurance life motor insurance for company car driver car company illinois insurance american modern home insurance company national foundation life insurance company car company insurance ontario allied company insurance north carolina mutual life insurance company. Company farmer indiana insurance mutual company insurance mortgage pmi company health insurance life unicare company insurance multitrip travel cincinnati company insurance plan retirement company insurance life national pierce phoenix mutual life insurance company name of car insurance company company first insurance mercury bureau company farm insurance kentucky mutual erie auto insurance company casualty cincinnati company insurance life term 10 company insurance life top liberty life insurance company greenville sc america company home insurance owner company genworth health insurance life company insurance life national ozark mercury insurance company of florida united home life insurance company. Reliable life insurance company casualty cincinnati company house insurance banking cincinnati company insurance private mutual life insurance company american guaranty life insurance company company insurance life rate term country company car insurance company insurance integrity life national american enterprise life insurance company agent car company home insurance life quote rate american medical security life insurance company american commerce insurance company car company driver insurance motor american partner life insurance company company insurance paul st traveler company insurance malpractice medical ohio company health in insurance michigan chesapeake life insurance company virginia medical malpractice insurance company. Car company finance insurance company health insurance ohio philadelphia contributionship insurance company allstate company division insurance life workplace care company health insurance universal cincinnati casualty insurance company auto cincinnati company insurance insurance security mutual life insurance company of new york company in insurance malpractice medical texas delta dental insurance company company hancock insurance john life car company finance insurance personal unum life insurance company of america mercury insurance company auto company country insurance company health in insurance pa annual by company insurance travel uk foremost signature insurance company automobile california company in insurance. Company insurance malpractice medical virginia car company insurance ma discount car insurance company progressive northern insurance company america company health insurance life farmer insurance company of arizona nationwide life insurance company company insurance life old standard car company compare insurance online car insurance company quote company insurance life reliance standard classic car insurance company american mayflower life insurance company provident american life health insurance company florida medical malpractice insurance company canada car company insurance ontario company county insurance liberty mutual casualty cincinnati company insurance life car insurance company in canada. Banker national life insurance company american family life insurance company commerce insurance company fidelity national title insurance company company insurance online travel uk health insurance company ohio georgia farm bureau insurance company company connecticut insurance life mutual kentucky farm bureau insurance company company hancock insurance john life new york individual dental insurance company ing life insurance and annuity company car company insurance progresive car company insurance progressiv cincinnati company indemnity insurance life national teacher associate life insurance company equitable life insurance company of iowa equitable variable life insurance company medical insurance company in canada. Texas medical malpractice insurance company american western home insurance company company grande insurance life national rio american income life insurance company pa home owner insurance company usaa life insurance company national income life insurance company company health insurance private uk company health insurance small company insurance travel uk company health in insurance pennsylvania rbc travel insurance company company health insurance private company country insurance company in insurance medical canada company in insurance medical business alliance insurance company car company discount insurance icici prudential life insurance company. Beneficial company insurance life standard care company health inc insurance universal cincinnati company insurance insurance rv minnesota mutual life insurance company home security life insurance company hartford casualty insurance company florida health insurance company rating car company insurance list health insurance company in michigan american life and accident insurance company standard security life insurance company best meridian insurance company connecticut mutual life insurance company nationwide auto insurance company car casualty cincinnati company insurance allstate company insurance life west virginia health insurance company rate home owner insurance company home insurance company in florida. auto casualty cincinnati company company insurance car collector company insurance Company health insurance michigan met life life insurance company company health insurance life net casualty cincinnati company insurance property alliance health and life insurance company name of car insurance company irish car insurance company accident cincinnati company flight insurance insurance aarp affordable company health insurance health insurance company maryland carolina company health insurance north texas farmer insurance company company guardian insurance life national company health in insurance virginia illinois health insurance company whole life insurance company company health insurance private uk car company insurance uk car company e home insurance owner. Auto car company insurance company infinity insurance settlement uk medical insurance company discount car insurance company equitable life insurance company of iowa free insurance company rating accident cincinnati company insurance insurance travel national life insurance company of vermont casualty cincinnati company home insurance rate farm bureau mutual insurance company cincinnati casualty insurance company company insurance life national pierce company insurance life national vermont company connecticut insurance life met allied insurance company liberty county mutual insurance company gerber life insurance company company genworth insurance life medical malpractice captive insurance company. Banner company insurance life health insurance company in north carolina regence life and health insurance company car company insurance michigan cincinnati company insurance insurance litigation farmer new world life insurance company aetna company health insurance new york company home insurance joliet,joliet american standard insurance company america company health insurance state automobile mutual insurance company best auto insurance company capital cinfin company home insurance management associate company insurance life national teacher california company health insurance conseco senior health insurance company company fire insurance liberty mutual mutual of omaha life insurance company company insurance lawyer title. Auto company geico ins insurance private medical insurance company american company insurance life medical top health insurance company company health insurance insurance life mega student connecticut home owner insurance company john hancock life insurance company top 10 health insurance company mutual trust life insurance company stonebridge life insurance company am best life insurance company top term life insurance company farmer insurance company of arizona home security life insurance company best company health insurance life cincinnati company insurance insurance life company dental insurance car cheapest company insurance uk cincinnati company home insurance. Insurance company major health insurance company health insurance company in pennsylvania allstate car car cheapest company insurance great american life insurance company best home insurance company american company insurance life pioneer company independent insurance medical home insurance company cincinnati company insurance life manhattan national company florida insurance malpractice medical car casualty cincinnati company company insurance company in insurance medical bureau company farm insurance kentucky mutual company insurance life national standard mercury auto insurance company florida health insurance company rating company private health insurance allied casualty company insurance property. Health net insurance company company country group insurance company find insurance market stock midwest national life insurance company of tennessee aflac insurance company oregon health insurance company car insurance company canada car cincinnati company insurance insurance quote canada car company insurance ontario company health insurance nj metropolitan tower life insurance company national foundation life insurance company company insurance liability malpractice medical cincinnati company insurance insurance quote erie insurance company company insurance mortgage republic auto car cheap company insurance insurance rate insurance company business insurance health insurance company directory. Company offer pet health insurance state farm insurance company car company dubai in insurance care company insurance life mutual northwestern health insurance company new york foremost insurance company california health insurance company company dental insurance malpractice how to start a title insurance company best car insurance company hartford life insurance company first colony life insurance company auto company home insurance canadian company insurance malpractice medical medical life insurance company cincinnati company insurance provident life and accident insurance company auto cincinnati company insurance insurance delta dental insurance company. Auto car company insurance insurance auto cincinnati company free insurance insurance quote company golden health insurance rule combined insurance company equitable variable life insurance company mega life and health insurance company rating cincinnati company insurance planning retirement small business medical insurance company care company health insurance company hancock insurance john life variable health insurance company in nj agent cincinnati company insurance insurance company best practice car company insurance line health insurance company north carolina lincoln national life insurance company company county home insurance mutual state casualty company insurance property traveler car cincinnati company financial insurance. American partner life insurance company life insurance company of india car company insurance usaa colorado company health in insurance home insurance company rating progressive insurance company axa equitable life insurance company sierra health and life insurance company company hartford insurance midwest health insurance company in louisiana national teacher associate life insurance company health insurance company in texas cincinnati company indemnity insurance property car company insurance online united home life insurance company philadelphia contributionship insurance company best company insurance meridian auto company home insurance unitrin cincinnati indemnity insurance company. Group health insurance company california cincinnati equitable insurance company best insurance company to work for car company compare insurance national fire insurance company of hartford car cheap cincinnati company insurance insurance company connecticut insurance medical standard life insurance company national home life insurance company company health insurance travel company insurance life national union georgia farm bureau insurance company rating of long term care insurance company accident company in insurance life provident mega life and health insurance company student insurance company health illinois insurance guardian life insurance company american income life insurance company car cheap company insurance quote.
Lawmakers are scrambling to find money for programs. Lawmakers go after tax scofflaws Owe back taxes? Lawmakers want to cancel your passport. They want to give the IRS more power to investigate you. And enlist private debt collectors to help track down your old debts. If you’re a doctor, they want to seize your Medicare payments. They’d also like a bit more information about the mortgage interest tax deduction you’re claiming. Congress may be deadlocked over tax increases, but lawmakers are finding lots of agreement on another way to raise revenue: throwing the book at tax dodgers. ( Also on POLITICO: Poll: Obama worst president since WWII) “Making cheaters pay their taxes is way more attractive than making honest taxpayers pay more,” said Len Burman, head of the nonpartisan Tax Policy Center. What’s prompting the quiet outbreak of bipartisanship? They need money. Lawmakers are scrambling to find almost $10 billion just to keep a roads maintenance program running through the end of this year, and another $3 billion for new tax cuts promised to start-up companies and other small businesses, bike-sharing programs and theatrical productions, among others. ( Also on POLITICO: Obama's immigration pivot) Going after tax scofflaws also allows both parties to claim victory. Democrats can say they’re raising revenue, heading off more cuts in funding for government programs, while Republicans can say they held the line on tax increases. Though the proposals increase tax revenues, Republicans say they’re hardly tax hikes. “We’re not anarchists,” said Ryan Ellis, tax policy director at antitax advocate Grover Norquist’s Americans for Tax Reform. “We do believe that if the law imposes a tax liability on somebody, until you can change the law, it’s your responsibility to pay it.” He said, “that’s not a tax increase just because it results in extra money coming in because the extra money should have been coming in all along.” At least one of the proposals is nevertheless drawing protests. ( Also on POLITICO: Earnest: W.H. isn't 'perfect example' on pay equity) National Taxpayer Advocate Nina Olson, an IRS watchdog, warns that one proposal, to tap private debt collectors, means the public will face much more aggressive efforts to recover unpaid taxes. “Outsourcing the collection of federal tax debts is a bad idea,” she said in a 21-page letter to lawmakers urging them to drop the idea. The push to empower the tax man comes even as House Republicans continue to complain about an overly zealous IRS harassing tea party groups, and as House appropriators slash the agency’s annual budget — making it harder to recover unpaid taxes. A highway budget bill now before the Senate Finance Committee includes almost a half-dozen compliance measures, including one ordering the State Department to deny passports to people owing more than $50,000 in back taxes. ( Also on POLITICO: NBC team under fire in Jerusalem) It demands more information about taxpayers’ mortgages, including how much is still left on their loans and whether they’ve refinanced. Currently, only the interest paid is required to be reported. The additional information would make it easier for the IRS to determine when people no longer qualify for the hugely popular mortgage interest deduction, which is limited to interest paid on $1.1 million in mortgage and home equity debt. That’s likely to be no small thing in places like the East and West coasts where mortgages topping $1 million are increasingly commonplace. Another provision would give the IRS, which generally has three years to assess taxes before statutes of limitations kick in, more time to investigate people low-balling how much they made selling property and stock. Under the measure, the IRS would get twice as long — six years — to examine such cases. One would slap $500 fines on tax preparers who don’t take certain steps to ensure their clients aren’t wrongly claiming the American Opportunity Tax Credit, which subsidizes college expenses. All of that is in addition to tax compliance provisions included in a tax “extender” measure approved in April by the Finance panel. That bill revives a raft of expired tax breaks Congress routinely renews, and lawmakers are not paying for those with tax cuts. But the legislation also includes several new tax breaks, such as one that will allow start-up companies to claim a corporate research credit even if they are unprofitable and therefore don’t pay income taxes, that lawmakers would have to offset. They mostly want to do it though a proposal by Sens. Chuck Schumer (D-N.Y.) and Pat Roberts (R-Kan.) to have the IRS farm out uncollected debts to private collectors, which the Joint Committee on Taxation say would raise more than $2 billion. “This program would create hundreds of jobs in two of the poorest areas of New York, all while increasing federal revenues and not costing a single government job,” said Schumer. Olson complains that many of those who don’t pay their taxes can’t, pointing to statistics showing the IRS had 1.8 million cases in March where debts were not considered collectable because of the financial hardship that would impose. The IRS has the power to cut people slack when they can’t afford to pay, said Olson, something private collectors needing to earn a profit are less likely to grant. Other provisions would allow the IRS to seize 100 percent of doctors’ Medicare payments, up from the current 15 percent — a move that comes after the Government Accountability Office reported Medicare providers owed $2 billion in unpaid taxes. The bill would also impose similar $500 fines on tax preparers who don’t attempt to ferret out fraudulent child tax credit claims and index all tax penalties for inflation. Lawmakers have taken many of the ideas from House Ways and Means Committee Chairman Dave Camp and former Senate Finance Committee Chairman Max Baucus, who proposed them as part of their calls to overhaul the Tax Code. Each of the proposals is aimed at reducing the roughly $400 billion in taxes that go uncollected annually. While that may look like a fat target for savings, there are practical limits as to how much can actually be recovered. That’s because it’s hard to crack down on scofflaws without inconveniencing everyone else with more burdensome tax rules, said Floyd Williams, a former director of legislative affairs at the IRS. “Do you want an IRS agent in every house?” he said. “Sure, you could get to 100 percent compliance, but do you want to live in a society” where the agency is that intrusive? In 2011, Congress was forced to repeal provisions in the Affordable Care Act aimed at preventing businesses from under-reporting their incomes. The expanded reporting requirements were widely criticized by business groups as too burdensome. Democrats such as Sen. Ben Cardin (Md.), meanwhile, are pushing to kill the private debt collector plan. But if anything, more such proposals are likely to be in the offing. Lawmakers still need more savings, some of Camp’s and Baucus’ compliance proposals haven’t been tapped and new Senate Finance Chairman Ron Wyden says he wants uncontroversial payfors. And Republicans who typically take a hard line on tax increases are sounding a conciliatory note when it comes to these sorts of revenue raisers. “We should all realize that finding a bipartisan agreement is going to take compromise on both sides,” Sen. John Thune (R-S.D.) said last week at a hearing on the highway measure. “It’s unlikely that it’s going to be a package of 100 percent revenues, as the chairman’s proposed, or 100 percent spending reforms as some of us on the Republican side have proposed.” One way to do that? “Smart tax compliance measures,” said Thune. This article tagged under: Taxes Politics Money
PODCAST April 19th, 2016 Danielle’s husband is a very disciplined person. His resolve is like a light switch–a big heavy light switch that takes a lot of effort to turn off or on. Once he has thought through something and made up his mind about it, the switch is flipped. A few years back, he flipped the switch on his health. They had recently become parents when he decided that he owed it to himself and his daughter to be healthy so that he could be around longer. Something else, at about the same time, had a profound impact on him: his father had just undergone heart surgery and was not only recovering well, but making a lot of changes in his life. He was walking every day, eating well, and taking care of himself. Soon her husband started to do the same. This isn’t just a story about a father’s good example for his son. It’s also a story about a son’s response to that example. My husband honored his father by his actions in seeking to follow his good example, and it has benefited not only them, but the rest of the family as well.
The Centers for Disease Control and Prevention (CDC) has developed an agreement that forms a “contract” between newly minted teen drivers and their parents. When a teen gets their driver’s license, it is a stressful and dangerous time for the teen and their parents. Even though the teen has taken the best driver’s education available and worked diligently with their parent to drive the required number of practice hours, driving alone is a very different experience. The winter season brings more than pumpkin pie and Christmas trees — as the temperatures cool and precipitation increases, drivers have to deal with the rain, snow, sleet and ice that are typical this time of year. Most teenagers get their drivers license as soon as it is legal for them to do so. With parents who worry about their children driving, they must realize that it is not a ‘requirement’ but a privilege to allow them the honor of driving. Most teens do not understand this and honestly, there are a lot of parents who don’t either. The University of Maryland reports that more than three million emergency room visits in the U.S. are made due to back pain. For those who spend extended hours behind the wheel, such as truck drivers, bus drivers and long-distance commuters, the following tips can help keep back pain at bay. igottadrive.com now offers a collection of the best free driving games from around the web. We have picked the most interesting driving games available and have brought them to you on igottadrive.com. And the best part is that all of these games are free to play. Play 18-wheeler and try your hand at parking an large 18-wheeler truck before the clock runs out. Or how about taking an off road challenge with Canyon Valley Rally. The 3D graphics make this game loads of fun to play and a great challenge. Please check out our latest infographic, Teen Driving Safety. This infographic was created by Miller Law Services and has become part of our infographic collection. The issue of teen driving safety has been with us for a very long time and this infographic points out some of the statistics related to teen driving. In a bid to curb the high risk incidents related to distracted driving, "Texting Zones" was introduced months ago. In the same manner that rest stops give road-weary, long-distance drivers a rest from the road, these zones encourage heavy mobile users to pull over at the spots to do their smartphone business. From this, does the idea have the potential to serve its purpose? Can the neighboring countries and other continents abide with the trend? Everybody knows seat belts save lives. Despite this, a quarter of parents surveyed by the General Motors Foundation this year admitted to driving without properly buckling up their kids. Buckling up your kids is just one way to be safe on the road. Some vehicles are designed with safety in mind and are better-suited for families. Here are our top picks based on ratings from the insurance and vehicle safety industries:
Another image from the book Cryptozoologicon by me, C.M. Kosemen and Darren Naish. Do 60-metre megalodons roam the oceans? Well, almost certainly not, but it's nice to dream.
“Our life is frittered away by detail … simplify, simplify.” – Henry David Thoreau Post written by Leo Babauta. Follow me on Twitter. A lot of people seem to connect with my message of simplicity, and yearn to find a simpler life in this world of ever-increasing complexity, of overwhelming technology. We want to take the good things in our lives, the benefits of technology, but simplify things, get rid of the complexities. And while I’ve written dozens of articles on simplifying (and an entire book on it), I’d like to offer a simple method. Something you can do today, without being overwhelmed. A 12-step method, perhaps, simplified into just 6 steps. 1. Write down your top priorities. We all have a long list of things we want to do, to try, to learn, to accomplish. Just pick 4-5. You can do that right now — make a short list of the things that are most important to you. My list: spending time with my family, writing, reading and running. These are the things you’ll build your life around, for now. You can always change this list later, as your priorities change. 2. Reduce one commitment. What is something you do every day or week that’s not on your short list? Is there any way you can get out of it? Make a phone call or send an email right now that will get you out of that commitment. It might mean disappointing one or many people — but you are going to create the simple life you want, not the complicated life others demand of you. By reducing this one commitment, you are simplifying your life, creating more time and space for the important stuff. Make the choice to put your priorities first, to find the time for them, by reducing your commitments. 3. Simplify your to-do list. Same concept, but at a smaller level — what’s on your to-do list that doesn’t need to be there? Something you’ve been dreading that you don’t absolutely have to do? Can you tell someone you’re just too busy to work on this? Can you give it to someone else, or automate it? See if you can pare your to-do list to just the most important things. Alternatively, just pick 1-3 things to do each day, and don’t worry about the rest. 4. Set aside some disconnected time. If you’re connected all the time, this step is essential. Don’t skip it! Pick one hour to be disconnected — no Internet, no email, no IM, no phones. You can use your computer, but just for desktop computing, like writing in a word processor or text file, or working in Photoshop, or what have you. Use this time to really focus, to pour yourself into important tasks that you love to do. Or you can use this disconnected time to relax. 5. Create your perfect day. You’ve blocked aside some disconnected time, but let’s take that a step further: what would your ideal day look like? What would you do when you woke up, what would your work day look like (hint: it doesn’t have to be the work you’re doing now, but it could be), would you have time for exercise or sports or taking a walk or relaxing or reading or doing a hobby, would you have time for loved ones, time to clean or do errands, time for checking email, etc.? List the things you’d do, ideally, then simplify to the most important ones. Then lay them out in a schedule. You don’t have to stick to this schedule exactly, but knowing what’s ideal gives you something to work toward. In some cases, you can simply start living this day, tomorrow, but in others you’ll have to make gradual changes to allow this ideal day to happen. The key: taking control and responsibility for making the perfect day a reality. 6. Declutter. You want a nice, decluttered, serene space to surround you in your new simplified life. So you’re going to create it. Two ways to go here: if you don’t have much time, just do 10-15 minutes for now, and continue to do small increments until you get to where you’d like to be. Here’s how. Second method is if you have an entire day or weekend — set aside a big block of time and just overhaul your workspace or one or two rooms in your home. Here’s a good method. Next Steps Once you get to this stage, things should be a bit more simplified. But you’re probably interested in going beyond that. Here’s what you can do next — but please, please, don’t try to do these all at once. Pick one at a time, and do it slowly, over time. Simplifying isn’t a race — it’s a life. Declutter some more. Read. Letting go of wanting to buy more. Read. Reducing more commitments. Read. Transitioning to doing only work you love. Read. Creating time for solitude, quiet and relaxation. Read. Slowing down in everything you do. Read. Being present more often. Read. Single-tasking. Read. And most importantly: enjoy the process! The important thing isn’t a destination — a perfect, simple life — but the journey along the way. Manifest plainness, Embrace simplicity, Reduce selfishness, Have few desires. – Lao-tzu — If you liked this article, please share it on del.icio.us, StumbleUpon or Twitter. I’d appreciate it. :)
Main menu Tag Archives: lactation consultant One of the most common questions I was asked throughout my pregnancy was “are you going to breastfeed?”. My response remained the same throughout – I’ll do my best. I wasn’t born yesterday, I am fully aware of the benefits of breastfeeding, especially in those first crucial few days. I am also fully aware of the issues that many of my girlfriends have had on their journeys through motherhood and that breastfeeding is not always as easy as hoped. I knew that I definitely wanted to try to breastfeed for at least the first couple of months. I was prepared for the late nights feeding my son when my boob was his only option. I was prepared and excited about the bonding that comes with feeding. I was prepared for the benefits of a massive cleavage and the inevitable weight loss that goes along with exclusive breastfeeding. I was not prepared for the issues that I encountered. I was less prepared for the emotional turmoil that comes along with feeling like I failed my son. I was totally unprepared for the abuse I received when after just 6 days, I had to start giving my son formula. The long and short of my story is that due to a tongue tie that my son was born with and an inability to latch on correctly, my nipples were so badly damaged in the initial few days that my body went into shut down, my milk dried up and formula became a staple in our home. That makes it sound so simple and matter of fact. It wasn’t. It was traumatic, both physically and mentally. The physical part I could handle. The emotional impact was tougher. Breastfeeding was impacting my ability to bond with my son and nothing is worth that. Thankfully N saw what was happening and held my hand through the tears as I realized that my boobs were betraying my baby and I. We have an amazing Child Health Nurse who also recognized that the best thing for Archer and I was finding an alternative. So my family, partner and direct career all agree that breastfeeding, although a fabulous option for most new mums and bubs, was not working for my son and I. Why is it then that certain lactation consultants within the community have found it suitable and necessary to inform me of the error of my ways? Telling me that “breast really is best”, “you should push through” “just hold your baby differently” “here, let me show you”. NO! It’s not working for us. My baby isn’t happy! I’m not happy! You are not in my home at half past three in the morning to see our struggle. Don’t tell me what is best for my son when you don’t know either of us. The lack of support and self-righteousness of these women has been something I was totally unprepared for. I’ve had phone calls from a lactation consultant telling me that she knows better than our pediatrician how to treat my sons tongue-tie – stopping short of telling me I was a bad mother for listening to the doctors. I’ve had another practically wrestle my poor son by the neck to try to get him to latch on differently. I could go on for hours about the ways in which I have been insulted and offended by this certain breed of lactation ladies who lack empathy, manners and decency. I know that not all lactation consultants are the same. There are some who are warm, kind and supportive – regardless of whether you breastfeed or not. Unfortunately, the ones like those I encountered, damage the industry as a whole and leave a bad taste in the mouths of new mums that take a long time to fade. Speaking with other women about their breastfeeding journeys, I find that my story is not unique. Many have had encounters with lactation consultants that have left them traumatized, teary and questioning their decisions and ability as a new mum. How is this helpful? An occupation which is designed to encourage breastfeeding and provide support to women at an emotionally and physically fragile time is doing the opposite – instilling negative emotions, fear and feelings of failure. So to the lactation consultant community – I beg you…. Calm the fuck down. Stop for a moment and listen to your patients. Open your eyes to each individual mothers situation and help to guide her to a solution for her and her baby. I know it will pain you to hear it but breast is NOT always best. Some of us are betrayed by our boobies. It doesn’t make us failures. It doesn’t make us bad mums. Please don’t make us feel like it does.
#!/bin/sh set -e; set -o xtrace source_dir="$PROJECT_DIR/$TARGET_NAME" cmake_dir="$TARGET_TEMP_DIR/CMake" install_dir="$TARGET_TEMP_DIR/Install" [ -d "$install_dir" ] && [ ! -f "$install_dir/.incomplete" ] && exit 0 mkdir -p "$install_dir" touch "$install_dir/.incomplete" args=() export MAKEFLAGS="-j $(sysctl -n hw.ncpu)" export CC=clang export CXX=clang cd "$cmake_dir" make "${args[@]}" make install rsync "$cmake_dir/bin/libopenjp2.a" "$install_dir/lib/" # somehow the lib isn't copied by make-install rsync "$source_dir/src/bin/common/format_defs.h" "$install_dir/include/OpenJPEG/" # we need this header find "$install_dir/lib" -name 'libopenjp2*.dylib' -delete # in Grok, dylib is always built (argh), and on linking process XCode prefers the dylib. TODO: check if there is a flag to prioritize .a rm -f "$install_dir/.incomplete" exit 0
Analysis: Kurdish-Led Peace Conference Is Best Hope for Syria Joris Leverink is a writer and political analyst based in Istanbul. He is an editor for ROAR Magazine and a columnist for TeleSUR English, where he frequently reports on Turkish and regional politics. ISTANBUL, Turkey, Dec 16 2015 (IPS) - While the war in Syria continues to draw in more outside forces, the work towards finding a political solution to this five-year old conflict carries on. In the past week, no less than three separate conferences were organized by different clusters of opposition groups. Conferences were held in three places: Damascus, Dêrîk – a city in the Kurdish-controlled northern part of Syria – and Riyadh, the Saudi capital, respectively. With the Damascus conference widely regarded as a sham, organized with the permission and under the firm control of the Assad regime, and the conference in Dêrîk being all-but ignored by the international media, the eyes of the world were fixed on the proceedings in Riyadh. The conference in the Saudi capital was sponsored by a number of international allies to the various warring factions inside Syria. The intended outcome was to unite the Syrian opposition so that it could present a common front in upcoming negotiations with the regime, as determined by the Vienna talks held in November. Remarkably, little attention was paid to the conference in Dêrîk – called the “Democratic Syria Congress” – organized by Syrian Kurdish groups and their allies. This conference brought together more than a hundred delegates representing religious and ethnic groups from all over Syria, with an important role reserved for women and youth organizations. It was the first peace conference of its kind organized in opposition-controlled territory inside Syria – a fact that goes a long way in pointing out the significance of this particular event. Contrary to the one in Riyadh, this was a conference by Syrians, and for Syrians, not controlled by the agendas of powerful international allies nor obstructed by the dogmatic views of some of its participants. The Riyadh conference was attended by political bodies such as the National Coalition for Syrian Revolutionary and Opposition Forces and the National Co-ordination Committee for Democratic Change, as well as rebel factions like Jaysh al-Islam, the Southern Front and Ahrar al-Sham, a salafist group fighting in alliance with the Al Qaeda-linked Al Nusra Front. Tellingly, the New York Times reported that in the final statement of the Riyadh conference the word “democracy” was left out because of objections by Islamist delegates, and replaced with “democratic mechanism” instead. In contrast, the final resolution presented at the Democratic Syria Congress in Dêrîk underlined the delegates’ commitment to democracy, social pluralism, and national unity. It confirmed the participants’ determination “to form a democratic constitution to enable solutions to the Syrian crisis through democratic, peaceful discussion, dialogue and talks; … to hold free and democratic elections required by the current process in Syria; [and] to secure the faith, culture and identities of all Syrian people.” The Dêrîk conference also saw the establishment of the Democratic Syrian Assembly, which will serve as the political representation of the newly formed Syrian Democratic Forces (SDF). The SDF is a Kurdish-dominated coalition of rebel factions, including Arab, Syriac, Turkmen and Yezidi forces. In recent months, the SDF has proved to be ISIS’ most formidable enemy, and the international coalition’s most reliable ally in the fight against the terrorist organization. It might come as a surprise, then, that neither the SDF nor any other Kurdish organizations were invited to the Riyadh conference. As a faction that controls an area many times the size of that under control of the National Coalition – or any other rebel group for that matter – and which has been able to claim a string of victories against ISIS, it naturally ought to play a role in any post-Assad, post-ISIS future plan for Syria. The Kurds’ absence in Riyadh has everything to do with Turkey’s position in the Syrian conflict. From the Turkish perspective, the Kurds in Syria pose a bigger threat to its national security than ISIS. Turkey fears that the establishment of the autonomous regions, or “cantons,” in the Kurdish parts of northern Syria might inspire its domestic Kurdish population to pursue a similar goal. The fact that the Democratic Union Party (PYD), which is the most powerful political body in the region, is a sister organization to the Kurdistan Workers’ Party (PKK), which has been waging a 35-year insurgency against the Turkish state, only adds insult to injury. Commenting on the Riyadh conference, PYD co-chair Saleh Moslem stated that “it doesn’t pay regard to the current political and military reality in Syria and the region, as the most active and dynamic actors and representatives of the actual Syrian opposition haven’t been invited. In the circumstances, such meetings will have no seriousness.” Before it even started, the precarious alliance formed in Riyadh was already on the verge of collapse. Ahrar al-Sham threatened to pull out of the talks, condemning the presence of “pro-Assad forces” and deeming the final statement “not Islamic enough.” The goal to bring all the different opposition factions to the table, to explore common ground and to form a united front against the Assad regime is a noble one. Unfortunately it is doomed to fail when the alliance neglects to reflect the reality on the ground as well as the will of the Syrian people. When it is merely the outcome of external parties pushing their agendas for personal benefits – whether it is to strengthen the position of local allies on the ground, to obstruct the efforts of the Kurdish autonomous administration or to explore options for negotiations with Assad in order to be able to focus all energy on destroying ISIS – any alliance will be too weak to withstand the test of time, let alone the test of war. In this regard, despite the lack of international attention, the conference in Dêrîk might actually supersede the one in Riyadh in terms of importance. Despite the increasing involvement of outside forces, diplomatically, politically and, most important, militarily, any real solution to the crisis in Syria must be initiated by the Syrian people, not any outside power. The Democratic Syria Congress in Dêrîk has shown that there is not only a will to work towards peace, but that there is also an infrastructure in place, a platform, where the first, cautious steps towards a peaceful future and an “alternative democratic system aiming at change” have been made. (End)
// Copyright (c) 1981-86 Robert A. Koeneke // Copyright (c) 1987-94 James E. Wilson // // This work is free software released under the GNU General Public License // version 2.0, and comes with ABSOLUTELY NO WARRANTY. // // See LICENSE and AUTHORS for more information. // Magical treasure #include "headers.h" // Should the object be enchanted -RAK- static bool magicShouldBeEnchanted(int chance) { return randomNumber(100) <= chance; } // Enchant a bonus based on degree desired -RAK- static int magicEnchantmentBonus(int base, int max_standard, int level) { int stand_deviation = (config::treasure::LEVEL_STD_OBJECT_ADJUST * level / 100) + config::treasure::LEVEL_MIN_OBJECT_STD; // Check for level > max_standard since that may have generated an overflow. if (stand_deviation > max_standard || level > max_standard) { stand_deviation = max_standard; } // abs may be a macro, don't call it with randomNumberNormalDistribution() as a parameter auto abs_distribution = (int) std::abs((std::intmax_t) randomNumberNormalDistribution(0, stand_deviation)); int bonus = (abs_distribution / 10) + base; if (bonus < base) { return base; } return bonus; } static void magicalArmor(Inventory_t &item, int special, int level) { item.to_ac += magicEnchantmentBonus(1, 30, level); if (!magicShouldBeEnchanted(special)) { return; } switch (randomNumber(9)) { case 1: item.flags |= (config::treasure::flags::TR_RES_LIGHT | config::treasure::flags::TR_RES_COLD | config::treasure::flags::TR_RES_ACID | config::treasure::flags::TR_RES_FIRE); item.special_name_id = SpecialNameIds::SN_R; item.to_ac += 5; item.cost += 2500; break; case 2: // Resist Acid item.flags |= config::treasure::flags::TR_RES_ACID; item.special_name_id = SpecialNameIds::SN_RA; item.cost += 1000; break; case 3: case 4: // Resist Fire item.flags |= config::treasure::flags::TR_RES_FIRE; item.special_name_id = SpecialNameIds::SN_RF; item.cost += 600; break; case 5: case 6: // Resist Cold item.flags |= config::treasure::flags::TR_RES_COLD; item.special_name_id = SpecialNameIds::SN_RC; item.cost += 600; break; case 7: case 8: case 9: // Resist Lightning item.flags |= config::treasure::flags::TR_RES_LIGHT; item.special_name_id = SpecialNameIds::SN_RL; item.cost += 500; break; default: // Do not apply any special magic break; } } static void cursedArmor(Inventory_t &item, int level) { item.to_ac -= magicEnchantmentBonus(1, 40, level); item.cost = 0; item.flags |= config::treasure::flags::TR_CURSED; } static void magicalSword(Inventory_t &item, int special, int level) { item.to_hit += magicEnchantmentBonus(0, 40, level); // Magical damage bonus now proportional to weapon base damage int damage_bonus = maxDiceRoll(item.damage); item.to_damage += magicEnchantmentBonus(0, 4 * damage_bonus, damage_bonus * level / 10); // the 3*special/2 is needed because weapons are not as common as // before change to treasure distribution, this helps keep same // number of ego weapons same as before, see also missiles if (magicShouldBeEnchanted(3 * special / 2)) { switch (randomNumber(16)) { case 1: // Holy Avenger item.flags |= (config::treasure::flags::TR_SEE_INVIS | config::treasure::flags::TR_SUST_STAT | config::treasure::flags::TR_SLAY_UNDEAD | config::treasure::flags::TR_SLAY_EVIL | config::treasure::flags::TR_STR); item.to_hit += 5; item.to_damage += 5; item.to_ac += randomNumber(4); // the value in `misc_use` is used for strength increase // `misc_use` is also used for sustain stat item.misc_use = (int16_t) randomNumber(4); item.special_name_id = SpecialNameIds::SN_HA; item.cost += item.misc_use * 500; item.cost += 10000; break; case 2: // Defender item.flags |= (config::treasure::flags::TR_FFALL | config::treasure::flags::TR_RES_LIGHT | config::treasure::flags::TR_SEE_INVIS | config::treasure::flags::TR_FREE_ACT | config::treasure::flags::TR_RES_COLD | config::treasure::flags::TR_RES_ACID | config::treasure::flags::TR_RES_FIRE | config::treasure::flags::TR_REGEN | config::treasure::flags::TR_STEALTH); item.to_hit += 3; item.to_damage += 3; item.to_ac += 5 + randomNumber(5); item.special_name_id = SpecialNameIds::SN_DF; // the value in `misc_use` is used for stealth item.misc_use = (int16_t) randomNumber(3); item.cost += item.misc_use * 500; item.cost += 7500; break; case 3: case 4: // Slay Animal item.flags |= config::treasure::flags::TR_SLAY_ANIMAL; item.to_hit += 2; item.to_damage += 2; item.special_name_id = SpecialNameIds::SN_SA; item.cost += 3000; break; case 5: case 6: // Slay Dragon item.flags |= config::treasure::flags::TR_SLAY_DRAGON; item.to_hit += 3; item.to_damage += 3; item.special_name_id = SpecialNameIds::SN_SD; item.cost += 4000; break; case 7: case 8: // Slay Evil item.flags |= config::treasure::flags::TR_SLAY_EVIL; item.to_hit += 3; item.to_damage += 3; item.special_name_id = SpecialNameIds::SN_SE; item.cost += 4000; break; case 9: case 10: // Slay Undead item.flags |= (config::treasure::flags::TR_SEE_INVIS | config::treasure::flags::TR_SLAY_UNDEAD); item.to_hit += 3; item.to_damage += 3; item.special_name_id = SpecialNameIds::SN_SU; item.cost += 5000; break; case 11: case 12: case 13: // Flame Tongue item.flags |= config::treasure::flags::TR_FLAME_TONGUE; item.to_hit++; item.to_damage += 3; item.special_name_id = SpecialNameIds::SN_FT; item.cost += 2000; break; case 14: case 15: case 16: // Frost Brand item.flags |= config::treasure::flags::TR_FROST_BRAND; item.to_hit++; item.to_damage++; item.special_name_id = SpecialNameIds::SN_FB; item.cost += 1200; break; default: break; } } } static void cursedSword(Inventory_t &item, int level) { item.to_hit -= magicEnchantmentBonus(1, 55, level); // Magical damage bonus now proportional to weapon base damage int damage_bonus = maxDiceRoll(item.damage); item.to_damage -= magicEnchantmentBonus(1, 11 * damage_bonus / 2, damage_bonus * level / 10); item.flags |= config::treasure::flags::TR_CURSED; item.cost = 0; } static void magicalBow(Inventory_t &item, int level) { item.to_hit += magicEnchantmentBonus(1, 30, level); // add damage. -CJS- item.to_damage += magicEnchantmentBonus(1, 20, level); } static void cursedBow(Inventory_t &item, int level) { item.to_hit -= magicEnchantmentBonus(1, 50, level); // add damage. -CJS- item.to_damage -= magicEnchantmentBonus(1, 30, level); item.flags |= config::treasure::flags::TR_CURSED; item.cost = 0; } static void magicalDiggingTool(Inventory_t &item, int level) { item.misc_use += magicEnchantmentBonus(0, 25, level); } static void cursedDiggingTool(Inventory_t &item, int level) { item.misc_use = (int16_t) -magicEnchantmentBonus(1, 30, level); item.cost = 0; item.flags |= config::treasure::flags::TR_CURSED; } static void magicalGloves(Inventory_t &item, int special, int level) { item.to_ac += magicEnchantmentBonus(1, 20, level); if (!magicShouldBeEnchanted(special)) { return; } if (randomNumber(2) == 1) { item.flags |= config::treasure::flags::TR_FREE_ACT; item.special_name_id = SpecialNameIds::SN_FREE_ACTION; item.cost += 1000; } else { item.identification |= config::identification::ID_SHOW_HIT_DAM; item.to_hit += 1 + randomNumber(3); item.to_damage += 1 + randomNumber(3); item.special_name_id = SpecialNameIds::SN_SLAYING; item.cost += (item.to_hit + item.to_damage) * 250; } } static void cursedGloves(Inventory_t &item, int special, int level) { if (magicShouldBeEnchanted(special)) { if (randomNumber(2) == 1) { item.flags |= config::treasure::flags::TR_DEX; item.special_name_id = SpecialNameIds::SN_CLUMSINESS; } else { item.flags |= config::treasure::flags::TR_STR; item.special_name_id = SpecialNameIds::SN_WEAKNESS; } item.identification |= config::identification::ID_SHOW_P1; item.misc_use = (int16_t) -magicEnchantmentBonus(1, 10, level); } item.to_ac -= magicEnchantmentBonus(1, 40, level); item.flags |= config::treasure::flags::TR_CURSED; item.cost = 0; } static void magicalBoots(Inventory_t &item, int special, int level) { item.to_ac += magicEnchantmentBonus(1, 20, level); if (!magicShouldBeEnchanted(special)) { return; } int magic_type = randomNumber(12); if (magic_type > 5) { item.flags |= config::treasure::flags::TR_FFALL; item.special_name_id = SpecialNameIds::SN_SLOW_DESCENT; item.cost += 250; } else if (magic_type == 1) { item.flags |= config::treasure::flags::TR_SPEED; item.special_name_id = SpecialNameIds::SN_SPEED; item.identification |= config::identification::ID_SHOW_P1; item.misc_use = 1; item.cost += 5000; } else { // 2 - 5 item.flags |= config::treasure::flags::TR_STEALTH; item.identification |= config::identification::ID_SHOW_P1; item.misc_use = (int16_t) randomNumber(3); item.special_name_id = SpecialNameIds::SN_STEALTH; item.cost += 500; } } static void cursedBoots(Inventory_t &item, int level) { int magic_type = randomNumber(3); switch (magic_type) { case 1: item.flags |= config::treasure::flags::TR_SPEED; item.special_name_id = SpecialNameIds::SN_SLOWNESS; item.identification |= config::identification::ID_SHOW_P1; item.misc_use = -1; break; case 2: item.flags |= config::treasure::flags::TR_AGGRAVATE; item.special_name_id = SpecialNameIds::SN_NOISE; break; default: item.special_name_id = SpecialNameIds::SN_GREAT_MASS; item.weight = (uint16_t)(item.weight * 5); break; } item.cost = 0; item.to_ac -= magicEnchantmentBonus(2, 45, level); item.flags |= config::treasure::flags::TR_CURSED; } static void magicalHelms(Inventory_t &item, int special, int level) { item.to_ac += magicEnchantmentBonus(1, 20, level); if (!magicShouldBeEnchanted(special)) { return; } if (item.sub_category_id < 6) { item.identification |= config::identification::ID_SHOW_P1; int magic_type = randomNumber(3); switch (magic_type) { case 1: item.misc_use = (int16_t) randomNumber(2); item.flags |= config::treasure::flags::TR_INT; item.special_name_id = SpecialNameIds::SN_INTELLIGENCE; item.cost += item.misc_use * 500; break; case 2: item.misc_use = (int16_t) randomNumber(2); item.flags |= config::treasure::flags::TR_WIS; item.special_name_id = SpecialNameIds::SN_WISDOM; item.cost += item.misc_use * 500; break; default: item.misc_use = (int16_t)(1 + randomNumber(4)); item.flags |= config::treasure::flags::TR_INFRA; item.special_name_id = SpecialNameIds::SN_INFRAVISION; item.cost += item.misc_use * 250; } return; } switch (randomNumber(6)) { case 1: item.identification |= config::identification::ID_SHOW_P1; item.misc_use = (int16_t) randomNumber(3); item.flags |= (config::treasure::flags::TR_FREE_ACT | config::treasure::flags::TR_CON | config::treasure::flags::TR_DEX | config::treasure::flags::TR_STR); item.special_name_id = SpecialNameIds::SN_MIGHT; item.cost += 1000 + item.misc_use * 500; break; case 2: item.identification |= config::identification::ID_SHOW_P1; item.misc_use = (int16_t) randomNumber(3); item.flags |= (config::treasure::flags::TR_CHR | config::treasure::flags::TR_WIS); item.special_name_id = SpecialNameIds::SN_LORDLINESS; item.cost += 1000 + item.misc_use * 500; break; case 3: item.identification |= config::identification::ID_SHOW_P1; item.misc_use = (int16_t) randomNumber(3); item.flags |= (config::treasure::flags::TR_RES_LIGHT | config::treasure::flags::TR_RES_COLD | config::treasure::flags::TR_RES_ACID | config::treasure::flags::TR_RES_FIRE | config::treasure::flags::TR_INT); item.special_name_id = SpecialNameIds::SN_MAGI; item.cost += 3000 + item.misc_use * 500; break; case 4: item.identification |= config::identification::ID_SHOW_P1; item.misc_use = (int16_t) randomNumber(3); item.flags |= config::treasure::flags::TR_CHR; item.special_name_id = SpecialNameIds::SN_BEAUTY; item.cost += 750; break; case 5: item.identification |= config::identification::ID_SHOW_P1; item.misc_use = (int16_t)(5 * (1 + randomNumber(4))); item.flags |= (config::treasure::flags::TR_SEE_INVIS | config::treasure::flags::TR_SEARCH); item.special_name_id = SpecialNameIds::SN_SEEING; item.cost += 1000 + item.misc_use * 100; break; case 6: item.flags |= config::treasure::flags::TR_REGEN; item.special_name_id = SpecialNameIds::SN_REGENERATION; item.cost += 1500; break; default: break; } } static void cursedHelms(Inventory_t &item, int special, int level) { item.to_ac -= magicEnchantmentBonus(1, 45, level); item.flags |= config::treasure::flags::TR_CURSED; item.cost = 0; if (!magicShouldBeEnchanted(special)) { return; } switch (randomNumber(7)) { case 1: item.identification |= config::identification::ID_SHOW_P1; item.misc_use = (int16_t) -randomNumber(5); item.flags |= config::treasure::flags::TR_INT; item.special_name_id = SpecialNameIds::SN_STUPIDITY; break; case 2: item.identification |= config::identification::ID_SHOW_P1; item.misc_use = (int16_t) -randomNumber(5); item.flags |= config::treasure::flags::TR_WIS; item.special_name_id = SpecialNameIds::SN_DULLNESS; break; case 3: item.flags |= config::treasure::flags::TR_BLIND; item.special_name_id = SpecialNameIds::SN_BLINDNESS; break; case 4: item.flags |= config::treasure::flags::TR_TIMID; item.special_name_id = SpecialNameIds::SN_TIMIDNESS; break; case 5: item.identification |= config::identification::ID_SHOW_P1; item.misc_use = (int16_t) -randomNumber(5); item.flags |= config::treasure::flags::TR_STR; item.special_name_id = SpecialNameIds::SN_WEAKNESS; break; case 6: item.flags |= config::treasure::flags::TR_TELEPORT; item.special_name_id = SpecialNameIds::SN_TELEPORTATION; break; case 7: item.identification |= config::identification::ID_SHOW_P1; item.misc_use = (int16_t) -randomNumber(5); item.flags |= config::treasure::flags::TR_CHR; item.special_name_id = SpecialNameIds::SN_UGLINESS; break; default: return; } } static void processRings(Inventory_t &item, int level, int cursed) { switch (item.sub_category_id) { case 0: case 1: case 2: case 3: if (magicShouldBeEnchanted(cursed)) { item.misc_use = (int16_t) -magicEnchantmentBonus(1, 20, level); item.flags |= config::treasure::flags::TR_CURSED; item.cost = -item.cost; } else { item.misc_use = (int16_t) magicEnchantmentBonus(1, 10, level); item.cost += item.misc_use * 100; } break; case 4: if (magicShouldBeEnchanted(cursed)) { item.misc_use = (int16_t) -randomNumber(3); item.flags |= config::treasure::flags::TR_CURSED; item.cost = -item.cost; } else { item.misc_use = 1; } break; case 5: item.misc_use = (int16_t)(5 * magicEnchantmentBonus(1, 20, level)); item.cost += item.misc_use * 50; if (magicShouldBeEnchanted(cursed)) { item.misc_use = -item.misc_use; item.flags |= config::treasure::flags::TR_CURSED; item.cost = -item.cost; } break; case 19: // Increase damage item.to_damage += magicEnchantmentBonus(1, 20, level); item.cost += item.to_damage * 100; if (magicShouldBeEnchanted(cursed)) { item.to_damage = -item.to_damage; item.flags |= config::treasure::flags::TR_CURSED; item.cost = -item.cost; } break; case 20: // Increase To-Hit item.to_hit += magicEnchantmentBonus(1, 20, level); item.cost += item.to_hit * 100; if (magicShouldBeEnchanted(cursed)) { item.to_hit = -item.to_hit; item.flags |= config::treasure::flags::TR_CURSED; item.cost = -item.cost; } break; case 21: // Protection item.to_ac += magicEnchantmentBonus(1, 20, level); item.cost += item.to_ac * 100; if (magicShouldBeEnchanted(cursed)) { item.to_ac = -item.to_ac; item.flags |= config::treasure::flags::TR_CURSED; item.cost = -item.cost; } break; case 24: case 25: case 26: case 27: case 28: case 29: item.identification |= config::identification::ID_NO_SHOW_P1; break; case 30: // Slaying item.identification |= config::identification::ID_SHOW_HIT_DAM; item.to_damage += magicEnchantmentBonus(1, 25, level); item.to_hit += magicEnchantmentBonus(1, 25, level); item.cost += (item.to_hit + item.to_damage) * 100; if (magicShouldBeEnchanted(cursed)) { item.to_hit = -item.to_hit; item.to_damage = -item.to_damage; item.flags |= config::treasure::flags::TR_CURSED; item.cost = -item.cost; } break; default: break; } } static void processAmulets(Inventory_t &item, int level, int cursed) { if (item.sub_category_id < 2) { if (magicShouldBeEnchanted(cursed)) { item.misc_use = (int16_t) -magicEnchantmentBonus(1, 20, level); item.flags |= config::treasure::flags::TR_CURSED; item.cost = -item.cost; } else { item.misc_use = (int16_t) magicEnchantmentBonus(1, 10, level); item.cost += item.misc_use * 100; } } else if (item.sub_category_id == 2) { item.misc_use = (int16_t)(5 * magicEnchantmentBonus(1, 25, level)); if (magicShouldBeEnchanted(cursed)) { item.misc_use = -item.misc_use; item.cost = -item.cost; item.flags |= config::treasure::flags::TR_CURSED; } else { item.cost += 50 * item.misc_use; } } else if (item.sub_category_id == 8) { // amulet of the magi is never cursed item.misc_use = (int16_t)(5 * magicEnchantmentBonus(1, 25, level)); item.cost += 20 * item.misc_use; } } static int wandMagic(uint8_t id) { switch (id) { case 0: return randomNumber(10) + 6; case 1: return randomNumber(8) + 6; case 2: return randomNumber(5) + 6; case 3: return randomNumber(8) + 6; case 4: return randomNumber(4) + 3; case 5: return randomNumber(8) + 6; case 6: case 7: return randomNumber(20) + 12; case 8: return randomNumber(10) + 6; case 9: return randomNumber(12) + 6; case 10: return randomNumber(10) + 12; case 11: return randomNumber(3) + 3; case 12: return randomNumber(8) + 6; case 13: return randomNumber(10) + 6; case 14: case 15: return randomNumber(5) + 3; case 16: return randomNumber(5) + 6; case 17: return randomNumber(5) + 4; case 18: return randomNumber(8) + 4; case 19: return randomNumber(6) + 2; case 20: return randomNumber(4) + 2; case 21: return randomNumber(8) + 6; case 22: return randomNumber(5) + 2; case 23: return randomNumber(12) + 12; default: return -1; } } static int staffMagic(uint8_t id) { switch (id) { case 0: return randomNumber(20) + 12; case 1: return randomNumber(8) + 6; case 2: return randomNumber(5) + 6; case 3: return randomNumber(20) + 12; case 4: return randomNumber(15) + 6; case 5: return randomNumber(4) + 5; case 6: return randomNumber(5) + 3; case 7: case 8: return randomNumber(3) + 1; case 9: return randomNumber(5) + 6; case 10: return randomNumber(10) + 12; case 11: case 12: case 13: return randomNumber(5) + 6; case 14: return randomNumber(10) + 12; case 15: return randomNumber(3) + 4; case 16: case 17: return randomNumber(5) + 6; case 18: return randomNumber(3) + 4; case 19: return randomNumber(10) + 12; case 20: case 21: return randomNumber(3) + 4; case 22: return randomNumber(10) + 6; default: return -1; } } static void magicalCloak(Inventory_t &item, int special, int level) { if (!magicShouldBeEnchanted(special)) { item.to_ac += magicEnchantmentBonus(1, 20, level); return; } if (randomNumber(2) == 1) { item.special_name_id = SpecialNameIds::SN_PROTECTION; item.to_ac += magicEnchantmentBonus(2, 40, level); item.cost += 250; return; } item.to_ac += magicEnchantmentBonus(1, 20, level); item.identification |= config::identification::ID_SHOW_P1; item.misc_use = (int16_t) randomNumber(3); item.flags |= config::treasure::flags::TR_STEALTH; item.special_name_id = SpecialNameIds::SN_STEALTH; item.cost += 500; } static void cursedCloak(Inventory_t &item, int level) { int magic_type = randomNumber(3); switch (magic_type) { case 1: item.flags |= config::treasure::flags::TR_AGGRAVATE; item.special_name_id = SpecialNameIds::SN_IRRITATION; item.to_ac -= magicEnchantmentBonus(1, 10, level); item.identification |= config::identification::ID_SHOW_HIT_DAM; item.to_hit -= magicEnchantmentBonus(1, 10, level); item.to_damage -= magicEnchantmentBonus(1, 10, level); item.cost = 0; break; case 2: item.special_name_id = SpecialNameIds::SN_VULNERABILITY; item.to_ac -= magicEnchantmentBonus(10, 100, level + 50); item.cost = 0; break; default: item.special_name_id = SpecialNameIds::SN_ENVELOPING; item.to_ac -= magicEnchantmentBonus(1, 10, level); item.identification |= config::identification::ID_SHOW_HIT_DAM; item.to_hit -= magicEnchantmentBonus(2, 40, level + 10); item.to_damage -= magicEnchantmentBonus(2, 40, level + 10); item.cost = 0; break; } item.flags |= config::treasure::flags::TR_CURSED; } static void magicalChests(Inventory_t &item, int level) { int magic_type = randomNumber(level + 4); switch (magic_type) { case 1: item.flags = 0; item.special_name_id = SpecialNameIds::SN_EMPTY; break; case 2: item.flags |= config::treasure::chests::CH_LOCKED; item.special_name_id = SpecialNameIds::SN_LOCKED; break; case 3: case 4: item.flags |= (config::treasure::chests::CH_LOSE_STR | config::treasure::chests::CH_LOCKED); item.special_name_id = SpecialNameIds::SN_POISON_NEEDLE; break; case 5: case 6: item.flags |= (config::treasure::chests::CH_POISON | config::treasure::chests::CH_LOCKED); item.special_name_id = SpecialNameIds::SN_POISON_NEEDLE; break; case 7: case 8: case 9: item.flags |= (config::treasure::chests::CH_PARALYSED | config::treasure::chests::CH_LOCKED); item.special_name_id = SpecialNameIds::SN_GAS_TRAP; break; case 10: case 11: item.flags |= (config::treasure::chests::CH_EXPLODE | config::treasure::chests::CH_LOCKED); item.special_name_id = SpecialNameIds::SN_EXPLOSION_DEVICE; break; case 12: case 13: case 14: item.flags |= (config::treasure::chests::CH_SUMMON | config::treasure::chests::CH_LOCKED); item.special_name_id = SpecialNameIds::SN_SUMMONING_RUNES; break; case 15: case 16: case 17: item.flags |= (config::treasure::chests::CH_PARALYSED | config::treasure::chests::CH_POISON | config::treasure::chests::CH_LOSE_STR | config::treasure::chests::CH_LOCKED); item.special_name_id = SpecialNameIds::SN_MULTIPLE_TRAPS; break; default: item.flags |= (config::treasure::chests::CH_SUMMON | config::treasure::chests::CH_EXPLODE | config::treasure::chests::CH_LOCKED); item.special_name_id = SpecialNameIds::SN_MULTIPLE_TRAPS; break; } } static void magicalProjectileAdjustment(Inventory_t &item, int special, int level) { item.to_hit += magicEnchantmentBonus(1, 35, level); item.to_damage += magicEnchantmentBonus(1, 35, level); // see comment for weapons if (magicShouldBeEnchanted(3 * special / 2)) { switch (randomNumber(10)) { case 1: case 2: case 3: item.special_name_id = SpecialNameIds::SN_SLAYING; item.to_hit += 5; item.to_damage += 5; item.cost += 20; break; case 4: case 5: item.flags |= config::treasure::flags::TR_FLAME_TONGUE; item.to_hit += 2; item.to_damage += 4; item.special_name_id = SpecialNameIds::SN_FIRE; item.cost += 25; break; case 6: case 7: item.flags |= config::treasure::flags::TR_SLAY_EVIL; item.to_hit += 3; item.to_damage += 3; item.special_name_id = SpecialNameIds::SN_SLAY_EVIL; item.cost += 25; break; case 8: case 9: item.flags |= config::treasure::flags::TR_SLAY_ANIMAL; item.to_hit += 2; item.to_damage += 2; item.special_name_id = SpecialNameIds::SN_SLAY_ANIMAL; item.cost += 30; break; case 10: item.flags |= config::treasure::flags::TR_SLAY_DRAGON; item.to_hit += 3; item.to_damage += 3; item.special_name_id = SpecialNameIds::SN_DRAGON_SLAYING; item.cost += 35; break; default: break; } } } static void cursedProjectileAdjustment(Inventory_t &item, int level) { item.to_hit -= magicEnchantmentBonus(5, 55, level); item.to_damage -= magicEnchantmentBonus(5, 55, level); item.flags |= config::treasure::flags::TR_CURSED; item.cost = 0; } // Counter for missiles // Note: converted to uint16_t when saving the game. int16_t missiles_counter = 0; static void magicalProjectile(Inventory_t &item, int special, int level, int chance, int cursed) { if (item.category_id == TV_SLING_AMMO || item.category_id == TV_BOLT || item.category_id == TV_ARROW) { // always show to_hit/to_damage values if identified item.identification |= config::identification::ID_SHOW_HIT_DAM; if (magicShouldBeEnchanted(chance)) { magicalProjectileAdjustment(item, special, level); } else if (magicShouldBeEnchanted(cursed)) { cursedProjectileAdjustment(item, level); } } item.items_count = 0; for (int i = 0; i < 7; i++) { item.items_count += randomNumber(6); } if (missiles_counter == SHRT_MAX) { missiles_counter = -SHRT_MAX - 1; } else { missiles_counter++; } item.misc_use = missiles_counter; } // Chance of treasure having magic abilities -RAK- // Chance increases with each dungeon level void magicTreasureMagicalAbility(int item_id, int level) { int chance = config::treasure::OBJECT_BASE_MAGIC + level; if (chance > config::treasure::OBJECT_MAX_BASE_MAGIC) { chance = config::treasure::OBJECT_MAX_BASE_MAGIC; } int special = chance / config::treasure::OBJECT_CHANCE_SPECIAL; int cursed = (10 * chance) / config::treasure::OBJECT_CHANCE_CURSED; int magic_amount; Inventory_t &item = game.treasure.list[item_id]; // some objects appear multiple times in the game_objects with different // levels, this is to make the object occur more often, however, for // consistency, must set the level of these duplicates to be the same // as the object with the lowest level // Depending on treasure type, it can have certain magical properties switch (item.category_id) { case TV_SHIELD: case TV_HARD_ARMOR: case TV_SOFT_ARMOR: if (magicShouldBeEnchanted(chance)) { magicalArmor(item, special, level); } else if (magicShouldBeEnchanted(cursed)) { cursedArmor(item, level); } break; case TV_HAFTED: case TV_POLEARM: case TV_SWORD: // always show to_hit/to_damage values if identified item.identification |= config::identification::ID_SHOW_HIT_DAM; if (magicShouldBeEnchanted(chance)) { magicalSword(item, special, level); } else if (magicShouldBeEnchanted(cursed)) { cursedSword(item, level); } break; case TV_BOW: // always show to_hit/to_damage values if identified item.identification |= config::identification::ID_SHOW_HIT_DAM; if (magicShouldBeEnchanted(chance)) { magicalBow(item, level); } else if (magicShouldBeEnchanted(cursed)) { cursedBow(item, level); } break; case TV_DIGGING: // always show to_hit/to_damage values if identified item.identification |= config::identification::ID_SHOW_HIT_DAM; if (magicShouldBeEnchanted(chance)) { if (randomNumber(3) < 3) { magicalDiggingTool(item, level); } else { cursedDiggingTool(item, level); } } break; case TV_GLOVES: if (magicShouldBeEnchanted(chance)) { magicalGloves(item, special, level); } else if (magicShouldBeEnchanted(cursed)) { cursedGloves(item, special, level); } break; case TV_BOOTS: if (magicShouldBeEnchanted(chance)) { magicalBoots(item, special, level); } else if (magicShouldBeEnchanted(cursed)) { cursedBoots(item, level); } break; case TV_HELM: // give crowns a higher chance for magic if (item.sub_category_id >= 6 && item.sub_category_id <= 8) { chance += (int) (item.cost / 100); special += special; } if (magicShouldBeEnchanted(chance)) { magicalHelms(item, special, level); } else if (magicShouldBeEnchanted(cursed)) { cursedHelms(item, special, level); } break; case TV_RING: processRings(item, level, cursed); break; case TV_AMULET: processAmulets(item, level, cursed); break; case TV_LIGHT: // `sub_category_id` should be even for store, odd for dungeon // Dungeon found ones will be partially charged if ((item.sub_category_id % 2) == 1) { item.misc_use = (int16_t) randomNumber(item.misc_use); item.sub_category_id -= 1; } break; case TV_WAND: magic_amount = wandMagic(item.sub_category_id); if (magic_amount != -1) { item.misc_use = (uint16_t) magic_amount; } break; case TV_STAFF: magic_amount = staffMagic(item.sub_category_id); if (magic_amount != -1) { item.misc_use = (uint16_t) magic_amount; } // Change the level the items was first found on value if (item.sub_category_id == 7) { item.depth_first_found = 10; } else if (item.sub_category_id == 22) { item.depth_first_found = 5; } break; case TV_CLOAK: if (magicShouldBeEnchanted(chance)) { magicalCloak(item, special, level); } else if (magicShouldBeEnchanted(cursed)) { cursedCloak(item, level); } break; case TV_CHEST: magicalChests(item, level); break; case TV_SLING_AMMO: case TV_SPIKE: case TV_BOLT: case TV_ARROW: magicalProjectile(item, special, level, chance, cursed); break; case TV_FOOD: // make sure all food rations have the same level if (item.sub_category_id == 90) { item.depth_first_found = 0; } // give all Elvish waybread the same level if (item.sub_category_id == 92) { item.depth_first_found = 6; } break; case TV_SCROLL1: if (item.sub_category_id == 67) { // give all identify scrolls the same level item.depth_first_found = 1; } else if (item.sub_category_id == 69) { // scroll of light item.depth_first_found = 0; } else if (item.sub_category_id == 80) { // scroll of trap detection item.depth_first_found = 5; } else if (item.sub_category_id == 81) { // scroll of door/stair location item.depth_first_found = 5; } break; case TV_POTION1: // cure light if (item.sub_category_id == 76) { item.depth_first_found = 0; } break; default: break; } }
1 Introduction ============== Probabilistic models of sequence evolution are among the earliest areas of research in bioinformatics. These models aim to quantify the probability of specific types of mutations such as substitutions ([@btaa447-B37]; [@btaa447-B38]) and small indels ([@btaa447-B62]) in an evolving sequence. They provide the necessary probabilistic framework that allows formulating meaningful biological questions such as sequence alignment and phylogenetic inference. They also enable the realistic simulation of sequence evolution, and increasingly accurate tools have been introduced for this purpose over the years, including Rose ([@btaa447-B59]), INDELible ([@btaa447-B26]) and Evolver ([@btaa447-B23]). By enabling the simulation of fake but evolutionarily related sequences, these approaches enable benchmarking and validating bioinformatics tools for problems such as multiple sequence alignment ([@btaa447-B21]; [@btaa447-B22]; [@btaa447-B40]; [@btaa447-B51]; [@btaa447-B53]), ancestral genome reconstruction ([@btaa447-B13]) and phylogenetic inference ([@btaa447-B52]). Mutation probabilities have long been known to be dependent on sequence context: the probability of a mutation happening at a certain site does not only depend on the type of mutation (e.g. transition versus transversion), but also on the nucleotides around it ([@btaa447-B5]). In some cases, this dependency is intrinsic to the mutational process itself. For example, perhaps the strongest type of context dependencies is the elevated C-to-T substitution rate in the context of a CpG dinucleotide, caused by the deamination of a methylated cytosine, transforming it to a thymine ([@btaa447-B11]; [@btaa447-B24]). In other cases, it is the result of context-dependent DNA repair. [@btaa447-B61] found that the transcription-coupled repair machinery shows high localization on gene rich regions of the human genome, and [@btaa447-B25] found that transcription-coupled repair of cyclobutane pyrimidine dimers in Chinese hamster genome is context-dependent. Finally, it may be the result of context-dependent selective pressure. For example, coding sequence evolution is best captured by a 3-nucleotide codon model that accounts for the consequences of a nucleotide change on the amino acid encoded ([@btaa447-B28]). There is also a rich literature on co-evolution models in DNA ([@btaa447-B42]), RNA ([@btaa447-B33]) and proteins ([@btaa447-B55]). Insertions and deletion rates also exhibit strong context dependencies, often linked to DNA polymerase slippage in locally repetitive sequences ([@btaa447-B43]). Several types of models have been introduced to capture mutational context dependencies. [@btaa447-B36] proposed a Markov chain Monte Carlo method to calculate the substitution rate dependent on its two flanking bases inside a protein-coding DNA region. Later, a maximum likelihood analysis to infer nucleotide or dinucleotide mutation frequencies in non-coding regions of the genome was proposed ([@btaa447-B7]). [@btaa447-B57] introduced a context-dependent substitution model that has been developed to reflect context dependencies in both coding and non-coding regions of the genome, and a parameter-rich Bayesian network substitution model with parameters defined from flanking base contexts for genome-wide ancestral reconstruction were developed ([@btaa447-B14]). However, these methods often limit the context effect to one flanking nucleotide/amino acid on each side due to the computational cost and sample size requirements growing exponentially with context size. The extent of longer-range dependencies in mutation rates is thus poorly understood, although sparse Bayesian models ([@btaa447-B41]) have recently been introduced for that purpose and applied to viral evolution to determine the significance of certain configurations of nucleotide around mutation sites by inferring the mutation rate of 5-mers. [@btaa447-B2] proposed a statistical model that takes parameters from observed frequency of mutations within 5-mer or 7-mer, while [@btaa447-B66] introduced a log-linear model for mutation frequency analysis that also considers up to 5-mers. It has also been found that variability of mutation in human genome between different populations of human genome are dependent on context beyond the immediate flanking bases ([@btaa447-B3]). To overcome the limitations of these probabilistic context-dependent substitution models, we propose an evolutionary model that harnesses recent developments in machine learning. In recent years, recurrent neural networks (RNNs) have enabled models to learn in the context of time series data much more efficiently than previously possible. In particular, the long short-term memory (LSTM) model architecture ([@btaa447-B27]) made it possible for the deep neural network in the area of natural language modeling to overcome the vanishing gradient problem of standard RNN ([@btaa447-B60]). More recently, RNN-encoder--decoder ([@btaa447-B15]) architectures, which separate the network into an RNN-encoder and RNN-decoder to better capture the context of the input sequence, were introduced, with applications to automated language translation. With a similar idea, sequence-to-sequence models (Sutskever *et al.*, 2014) have shown that using LSTM networks in the encoder--decoder architecture can further improve the capacity to capture the context of the input in neural machine translation. In this paper, we introduce EvoLSTM, a sequence-to-sequence LSTM model of sequence evolution inspired by the aforementioned recent work in language modeling. We trained EvoLSTM from entire whole-genome primate alignments and show that it is able to capture context dependencies that are longer in range than what had been previous reported, for both substitutions and short indels. EvoLSTM's RNN evolutionary model paves the way for a variety of applications that rely on realistic modeling of sequence evolution. 2 Materials and methods ======================= EvoLSTM is a machine-learning based probabilistic model of context-dependent sequence evolution. In its simplest form, it takes as input a sequence *S* of length *K* and outputs a randomly generated descendant sequence *T* that may either be identical to *S* or may differ from it through one or more substitutions or indels. In this section, we explain EvoLSTM's architecture, its training and evaluation. 2.1 Training data ----------------- EvoLSTM is trained from a set of pairs of aligned ancestral/descendant sequences. We used a 100-way alignment of whole vertebrate genomes ([@btaa447-B12]; [@btaa447-B45]) and applied the Ancestors1.0 program ([@btaa447-B13]; [@btaa447-B20]) to infer maximum likelihood ancestral sequences genome-wide based on a simple context-independent substitution model. The approach has previously been shown to be highly accurate for most ancestors and, in particular, for primates ([@btaa447-B13]). We then extracted induced pairwise alignments between the human genome and various primate ancestors: the old-world monkey ancestor (catarrhini; 0.03 expected substitution per site), and the simian ancestor (simiiformes; 0.05 exp. subst./site). Since our analyses did not reveal significant differences between using one or the other as training data, which proceeded to use the old-world monkey ancestor, which has the benefit of being the close enough to human to limit the risks of double mutations at the same site, while providing us with sufficiently many mutations to learn from. Each pairwise alignment was then processed as follows ([Fig. 1](#btaa447-F1){ref-type="fig"}). First, gaps present in both sequences were removed. Second, each portion of 1 or 2 nucleotides in the descendant sequence that is aligned to consecutive gaps in the ancestors (hence the results of a 1 or 2 bp insertion) were combined with the previous descendant nucleotide and represented as a single character from an extended alphabet of size 86 (4 normal nucleotides + 16 dinucleotides for 1 bp insertions + 64 trinucleotides for 2 bp insertions + gap + dummy character). This allows treating insertions of size 1 or 2 as a substitution, which means that we do not need to assume we know ahead of time the position and size of an insertion. Since our focus is on short indels, we did not consider regions with larger indels, due to the exponential blow up in extended alphabet size that would be required. ![Data preprocessing pipeline. An ancestor/descendant alignment is converted to a set of overlapping *K*-mer pairs from an extended alphabet of meta-nucleotides and gaps. Those *K*-mer pairs are used to train EvoLSTM](btaa447f1){#btaa447-F1} These modified ancestor-descendant alignments are sliced into *K*-mer pairs (for *K* ranging from 1 to 39). Those aligned *K*-mer pairs constitute the data from which EvoLSTM is trained. We selected the first 10 000 000 *K*-mer pairs from human chromosome 2 as the training set and the next 2 000 000 as validation set. Our test set consists of 149 860 432 *K*-mer pairs selected from all chromosomes except human chromosome 2, hence ensuring that the test set is entirely disjoint from the training and validation sets. This very large test set enables us to accurately estimate the accuracy of the trained models. 2.2 EvoLSTM's LSTM architecture ------------------------------- EvoLSTM is an RNN that takes as input a *K*-mer and outputs the probability of each of the nucleotides (and meta-nucleotides) in a hypothetical descendant sequence ([Fig. 2](#btaa447-F2){ref-type="fig"}). It is based on the LSTM architecture for RNNs, which was introduced to address the vanishing gradient problem of classical RNNs ([@btaa447-B60]). The LSTM cell corresponding to position *t* in the *K*-mer takes in an input value $x_{(t)}$ (the one-hot encoded version of meta-nucleotide at position *t*), as well as two types of recurrent states: the hidden state $h_{(t)}$ and the cell state $c_{(t)}$, which are vectors of predetermined dimensions. Following [@btaa447-B27], these states are combined with the input and are regulated by trainable input (*W~Inuc~* and *W~Ih~*), output (*W~Onuc~* and *W~Oh~*) and forget gates (*W~Fnuc~* and *W~Fh~*) weight vectors. Each LSTM cell remembers values of the hidden state and cell state over time intervals and the three gates modify the information received from the previous time step ([@btaa447-B60]). ![EvoLSTM is a sequence-to-sequence bidirectional LSTM model made of an encoder (left portion, shown in red) and a decoder (right portion, shown in blue box). An ancestral sequences (here, ACT) are given as input to the encoder. Each cell recurrently receives information from the previously cell, in the form of a hidden state vector (blue arrows) and cell state vector (red arrows), and combines it with the one-hot encoded ancestral nucleotide to update those two vectors. The output of the encoder is the concatenation of the hidden and cell state vectors produced by the forward and reverse directions. Those vectors are an encoding of the sequence context, optimized so as to be maximally informative for the decoder. In the decoder, each cell receives as input (i) the one-hot encoded ancestral nucleotide and the previous descendant nucleotide generated by the model, as well as the state and cell vectors from the previous cell. It updates those two vectors and passes them to the next cell, but also feeds the hidden state vector to an MLP, which output a probability distribution over descendant characters (nucleotides or gap) at that position. A character is randomly drawn from that distribution, emitted and passed onto the next LSTM decoder cell](btaa447f2){#btaa447-F2} Specifically, we have $$\begin{matrix} {f_{(t)} = \sigma(W_{\mathit{Fnuc}} \cdot x_{(t)} + W_{Fh} \cdot h_{(t - 1)} + b_{F})} \\ {i_{(t)} = \sigma(W_{\mathit{Inuc}} \cdot x_{(t)} + W_{Ih} \cdot h_{(t - 1)} + b_{I})} \\ {o_{(t)} = \sigma(W_{\mathit{Onuc}} \cdot x_{(t)} + W_{Oh} \cdot h_{(t - 1)} + b_{O}).} \\ \end{matrix}$$ Finally, the outputs of each gate are combined to update the hidden state and the cell state of the current cell: $$\begin{matrix} {c_{(t)} = f_{(t)} \odot c_{(t - 1)} + i_{(t)} \odot \tanh(W_{\mathit{Cnuc}} \cdot x_{(t)} + W_{Ch} \cdot h_{(t - 1)} + b_{c})} \\ {h_{(t)} = o_{(t)} \odot \tanh(c_{(t)}),} \\ \end{matrix}$$where $\odot$ denotes the element-wise product. 2.3 Sequence-to-sequence model ------------------------------ Borrowing the idea from sequence-to-sequence learning (Sutskever *et al.*, 2014), EvoLSTM is composed of connected LSTM-based encoder and decoder networks ([Fig. 2](#btaa447-F2){ref-type="fig"}). The encoder is made of two LSTM looking at the same input *K*-mer but in opposite directions. Their last output hidden states *h~K~* and cell states *c~K~* are concatenated and passed to the decoder network, which uses it, along with the ancestral *K*-mer itself, to generate a descendant sequence. *h~K~* and *c~K~* capture the context information that will be used to inform the decoder. The decoder consists of an LSTM similar to the encoder, coupled with a fully connected neural network. Each cell receives the cell and hidden states from the previous cell, except for the first cell, which obtains those from the encoder (*h~K~* and *c~K~*). Cell *t* from the decoder is used to predict a probability distribution over meta-nucleotides at position *t* of the descendant sequence. The hidden state is fed to a fully connected multi-layer perceptron (MLP) with 86 outputs, to which a softmax function is applied to obtain a normalized probability distribution. Also, in addition to receiving meta-nucleotide *x~t~* as input, cell *t* (for *t* \> 1) receives the observed (during training) or sampled (when using the network as a generative model) descendant nucleotide from position *t* − 1, providing it with information about the evolutionary event that took place at the previous position. This is particularly critical to enable indels spanning more than one nucleotide. 2.4 Training EvoLSTM -------------------- We trained our model using the cross-entropy (CE) (negative log-likelihood) as the loss function to minimize. In short, we aim to minimize $$\left. - \sum\limits_{(A,D) \in \text{Training}~\text{set}}{\,\text{log}\,}p(D \middle| A), \right.$$where *A* is an input ancestral *K*-mer and *D* is its descendant *K*-mer. Trainable weights include the input, output, forget, cell state and hidden state weight matrices and bias terms for both the encoder and decoder, as well as the weights of the MLP in the decoder. Training is carried out using the Adam optimizer ([@btaa447-B39]) with a learning rate of 0.0001. We used batch learning with batch size 1024. To reduce overfitting, we used early stopping, ending training when the validation loss did not decrease for five consecutive epochs. To investigate the effect of context size, models were trained with six different values of *K*: 1, 5, 11, 15, 21 and 39. Hyper-parameters of the model were set based on a compromise between training time and accuracy on the validation set. The size of the hidden and cell state vectors was set to 512. The MLP consists of 1 hidden layer of 86 neurons with ReLU (rectified linear activation unit) ([@btaa447-B48]) activation function and the output layer of 86 neurons. 2.5 Using EvoLSTM as an evolution simulator ------------------------------------------- To use a trained EvoLSTM model to simulate the evolution of a given ancestral *K*-mer sequence *A*, the model is used as described previously, with a few small modifications. At each position *t*, a meta-nucleotide is sampled from the distribution generated by the model at that position. It is that nucleotide (rather than the true descendant nucleotide, as was done during training phase) that is passed as input to the next cell. In contrast, in the context machine translation (Sutskever *et al.*, 2014), the goal is generally not to sample from a distribution over translations, but instead to identify the maximum-likelihood translation, which is achieved via a greedy or beam search algorithm ([@btaa447-B50]). In order to use EvoLSTM to simulate the evolution of ancestral sequences longer than *K*, we proceed as follows. EvoLSTM breaks down the ancestral genome sequence of interest into *K*-mers similarly to the data preprocessing step described in [Figure 1](#btaa447-F1){ref-type="fig"} but without overlap between each *K*-mer. Denote those ancestral *K*-mers as $S_{a} = \lbrack k_{1},k_{2}\ldots k_{n - 1},k_{n}\rbrack$. Each *K*-mer is given as input to EvoLSTM, in the order in which they appear in the sequence. To sample descendant *K*-mer $d_{i}(i > 1)$, EvoLSTM uses the cell and hidden state vectors obtained from passing *K*-mer *k~i~* to the encoder network together with the last simulated nucleotide obtained from $d_{i - 1}$ to be passed down to the decoder network. Once all descendant *K*-mers are obtained, they are concatenated to yield the complete descendant sequence. The simulation processed described until now only allows mimicking sequence evolution over a branch of the same length as that corresponding to the pair of ancestor/descendant genomes used for training. Let us call that branch length the *unit* branch length. To simulate the evolution of branches of non-unit length, we proceed as follows. Suppose the target branch length is *λ* units long. Decompose *λ* into its integer and factional portions: $\lambda = \mathit{Int}(\lambda) + \mathit{Frac}(\lambda)$. We apply EvoLSTM $\mathit{Int}(\lambda)$ times, each time using it to re-evolve the sequence produced from the previous iteration. The resulting *K*-mer (which would be the ancestral *K*-mer if $\lambda < 1$) is then fed one last time through EvoLSTM, but this time rejecting a proposed mutation with probability $\mathit{Frac}(\lambda)$. [Supplementary Figure S1](#sup1){ref-type="supplementary-material"} shows that this iterative process captures well context dependencies of evolutionary events over longer branches. 2.6 Evaluation -------------- ### 2.6.1 Baseline approaches Past studies on evolution models have mainly focused on immediate neighbor context-dependent substitutions and are thus not directly comparable to the EvoLSTM. Instead, we implemented two baseline models. Our *table-based* approach is perhaps the most natural context-dependent evolutionary model: It simply approximates and saves $\left. \Pr\lbrack D \middle| A\rbrack \right.$ as $N(A,D)/N(A)$, where *N*(*A*, *D*) and *N*(*A*) are the observed frequencies of (*D*, *A*) and $(D,*)$ alignments in the training set. As *K* increases, *N*(*A*) can become too small to provide a meaningful probability estimate. If $N(D,A) = 0$, we symmetrically trim the context sequences (by one nucleotide at each end), until we get $N(D,A) > 0$. This approach enables this algorithm to use large context sizes when sufficient data exist, but to returns to smaller context sizes when it does not. We also implemented a second machine-learning approach using a standard bidirectional LSTM network ([Fig. 3](#btaa447-F3){ref-type="fig"}) coupled to a 1-hidden layer MLP (ReLU activation), with an output layer of 86 neurons. Unlike our EvoLSTM model, this model does not consider the prediction made in the previous time step and can make predictions based only on the bidirectional input context. The learning rate, hidden and cell state weight size, optimizer, initial learning rate, batch size and all other training details are identical to the sequence-to-sequence EvoLSTM. ![Baseline bidirectional LSTM model structure. The two hidden states emitted from both directions are concatenated and passed down to an MLP](btaa447f3){#btaa447-F3} 2.7 Implementation ------------------ EvoLSTM was implemented using tf.keras ([@btaa447-B16]) LSTM layers in Tensorflow 2.0 ([@btaa447-B1]). Biopython ([@btaa447-B17]) was used for reading the MAF file and preprocessing genome sequences. All relevant code is available at <https://github.com/DongjoonLim/EvoLSTM>. EvoLSTM is easy to train from whole-genome alignments and inferred ancestral sequences. It comes with code for interpretation and visualization of the models learned. It is also able to use a trained model to randomly evolve a given input sequence using substitutions and short indels. As such, it will easily integrate into more general genome evolution simulators such as Evolver ([@btaa447-B23]). 3 Results ========= This section begins with the assessment of the accuracy of EvoLSTM and baseline models, followed by an empirical analysis of context-dependent mutation probabilities learned by EvoLSTM. 3.1 Model performance --------------------- We first evaluated the ability of different approaches to properly estimate mutation probability in a context-dependent manner ([Fig. 4](#btaa447-F4){ref-type="fig"}). The models investigated (see Section 2) included our biLSTM and EvoLSTM seq2seq models, as well as a simpler adaptive frequency-based approach, each with context sizes $K \in \left\{ 1,5,11,15,21,39 \right\}$. Each model was trained on 10 000 000 aligned *K*-mer pairs extracted from the whole-genome alignment of the computationally reconstructed old-world monkey genome to the human genome (from human chromosomes 2), and evaluated on a similar but much larger test set obtained from chromosomes 1 and 3--22, containing \>149 million *K*-mer pairs. This atypical imbalance between the size of the training and test sets is intentional; having a very large test set allows us to accurately estimate context-dependent mutation probabilities using the simple frequency-based approach, to then be able to assess how the different approaches proposed can learn context dependencies from a relatively smaller training set. ![CE loss (lower is better) of the test set (\>149 million *K*-mers, corresponding to alignments of portions of the old-world monkeys' ancestral genome against the human genome), with different context sizes *K*. The models compared are two baseline models (adaptive frequency table and biLSTM) as well as two versions of EvoLSTM, with one or two biLSTM layers](btaa447f4){#btaa447-F4} We assessed the ability of a model to accurately capture context-dependent mutation probabilities using the CE of the test data, which are equivalent to the negative log-likelihood of the data given the model. CE values that are reached using no context at all (*K* = 1) are much worse than those obtained with larger values of *K*, confirming that context dependencies are strong. The adaptive frequency table-based approach is limited in capturing long-range dependencies because of the exponential amount of data it would require in order to do so. In contrast, EvoLSTM (1 layer) is able to fully take advantage of large context sizes, reaching a minimal CE at *K* = 15. Larger values of *K* result in worse CE values, possibly because as the LSTM network becomes larger, gradients become unstable ([@btaa447-B29]). However, this does not mean that context sizes larger than *K* = 15 do not have an incidence on mutation probabilities. Overall, the difference in CE values obtained \[0.18 for EvoLSTM (*K* = 15) versus 0.195 for table-based (*K* = 21)\] is notable and reliably reproduced over different restarts. Note that the reason the performance of the adaptive table-based approach remains stable for large values of *K* is that this approach adaptively trims each *K*-mer until its count in the training set is sufficiently large to make accurate probability estimations; in practice, for $K \geq 15$, most *K*-mers get trimmed to 15-mers or shorter. We also tested whether it may be beneficial to add a second LSTM layer to EvoLSTM, which is an approach that has been shown to be beneficial in language modeling (Sutskever *et al.*, 2014). However, this did not improve the performance, and was much longer to train. We also observe that the effect of capturing contexts by separating the encoder from the decoder in the sequence-to-sequence model used in EvoLSTM is important since the CE of EvoLSTM is much lower than that of the baseline biLSTM, across all context sizes. This suggests that relatively long-range context dependencies exist, and that EvoLSTM is able to capture many. 3.2 Flanking context strongly impacts mutation probability ---------------------------------------------------------- We next aimed to characterize the impact of long-range context on mutation probability, and better understand the ability of EvoLSTM to take this context into consideration. We used a trained EvoLSTM (*K* = 15) to simulate the evolution of a set of 149 860 432 *K*-mers from an ancestral old-world monkey sequence. We then tabulated the frequency of simulated mutations in each of the 256 different contexts of the form wxNyz, i.e. including two flanking bases on each side of the mutating base, and contrasted those frequencies to those observed in actual alignments of the same regions. [Figure 5](#btaa447-F5){ref-type="fig"} shows the results for a subset of the 16 possible substitutions, 4 possible deletions and 4 possible insertions. See also [Supplementary Tables S1--S4](#sup1){ref-type="supplementary-material"} for full results. Several observations emerge. First, EvoLSTM efficiently captures and simulates context dependencies of that size, with correlation coefficients ranging from 0.83 to 0.99 for substitutions. In particular, it clearly and accurately captures the well-known CpG to TpG mutation of methylated C's ([@btaa447-B34]), or the equivalent CpG to CpA from the reverse strand, assigning significantly higher mutation probability (0.1--0.25) to these mutations when in the right dinucleotide context versus in other contexts (\<0.05). Notably, even within the CpG dinucleotide context, the probability of C-to-T mutation is strongly dependent on the broader context. For example, CGCGz contexts are two times less mutagenic than AT-rich contexts. This may be explained by the presence of CpG islands in the genome, which is generally unmethylated and hence both CpG rich and substitution poor. Non-CpG contexts also exhibit strong context dependencies. For example, A-to-G transitions show a greater than 10-fold increase in the probability in the contexts of CAATw versus xAAAw. ![Comparison of the observed and EvoLSTM-predicted mutation probabilities for context size *K* = 5. Each graph shows the results for a given mutation occurring at the center of the *K*-mer. Each plot has 256 points, corresponding to the 256 possible contexts for that mutation. Some of the contexts are labeled. The Pearson correlation coefficient *r* is given for each case](btaa447f5){#btaa447-F5} [Figure 6](#btaa447-F6){ref-type="fig"} illustrates this phenomenon in more details in the case of CpG dinucleotide (left) and nucleotide deletion (right). The massive difference in CpG versus non-CpG C-to-T substitution probabilities is only the beginning of a dive into further and further refinements of context dependencies. The ACG context is 70% more mutagenic than the TCG context. There is then a 35% difference in C-to-T mutagenicity between different xACGy contexts, and a 2-fold difference between high and low mutagenic xGACGGy contexts. Throughout, the correspondence between the predicted and observed mutation probabilities remains quite high, until the context size considered becomes less relevant to mutation probability (e.g. for xACCTTy). Deletions (right panel) exhibit these long-range dependencies even more strikingly, with a 20-fold difference in A-deletion probabilities between highly mutagenic AAAAAAA context and conservative context TCCAGCG. ![EvoLSTM-predicted mutation probability and observed mutation probability in increasingly large contexts. Each dot represents one of the 16 possible context extensions. Out of those flanking base configurations, the top row shows the effect of adding the most mutagenic flanking bases, the second row shows the effect of adding the median mutagenic flanking bases and the bottom row shows the effect of the least mutagenic flanking bases](btaa447f6){#btaa447-F6} Transversions generally show a slightly weaker context-dependency (5-fold variation between most and least mutagenic contexts). Because they are also rarer in general, prediction accuracy is slightly worse due to the relatively small number of training examples. [Figure 5](#btaa447-F5){ref-type="fig"} (bottom row) also shows the context-dependency of 1-nucleotide insertions and deletions. Those also display a very strong context-dependency. For example deletions of a T are roughly 8--12 times more likely in T-rich contexts than in GC-rich contexts such as zCTGz or zGTCz contexts. Insertions show a similar pattern of elevated probabilities for insertions of nucleotides in a context that resembles them, which is consistent with the well-known DNA polymerase slippage model ([@btaa447-B43]). To study the impact of the broader context, we investigated how the probabilities of specific substitutions and indels vary as we look at increasingly large context sizes ([Supplementary Fig. S7](#sup1){ref-type="supplementary-material"}). Consider mutation $\left. M\rightarrow N \right.$, where *M* and *N* are nucleotides or gaps, which is taking place in the context $\left. \mathit{xMy}\rightarrow\mathit{xNy} \right.$, where *x* and *y* are context nucleotides sequences of length greater or equal to zero (hence context size $\left. K = \middle| x \middle| + \middle| y \middle| + 1 \right.$). A meaningful assessment of the degree to which considering an extra context nucleotide at each end (i.e. $\left. \mathit{axMyb}\rightarrow\mathit{axNyb} \right.$) affects the predicted mutation probability is the log-odds ratio of the long context model to the short context model: $$\begin{matrix} \left. LOR(M\rightarrow N;\mathit{axMyb};\mathit{xMy}) \right. \\ \left. = \,\text{log}(\Pr\lbrack\mathit{axNyb} \middle| \mathit{axMyb}\rbrack/\Pr\lbrack\mathit{xNy} \middle| \mathit{xMy}\rbrack). \right. \\ \end{matrix}$$ ![Increasing context size allows capturing strong dependencies not captured at lower context sizes. For each type of mutations (substitutions, deletions, insertions) and each context size *K* = 3, 5, 7, we show the log-odds ratio of a mutation/context pair in a model with context *K* versus one with context size *K* − 2. Each dot corresponds to a mutation/context pair, with *x*-coordinate being the log-odds ratio of the mutation in those two context sizes (*K* versus *K* − 2) and the *y*-axis being the same measure, but for the reverse complement of that mutation/context pair. Since most context-dependencies would be expected to be strand-independent, one would expect a strong correlation between those two values](btaa447f7){#btaa447-F7} If the mutation $\left. M\rightarrow N \right.$ does not depend on distant context nucleotides *a* and *b*, we get $\mathit{LOR} \approx 0$. However, if the presence of *a* and *b* significantly increases (resp. decreases) the odds of mutation, *LOR* takes on a positive (resp. negative) values. When *K* is relatively large (*K* \> 5), verifying EvoLSTM's predictions about the frequencies of mutations in specific contexts become difficult, because our test data does not have sufficiently many examples of each mutation/context pairs for accurate estimation. Here, we take advantage of the fact that most mutational processes are agnostic of strandedness, which should result in context-dependencies to be invariant to reverse complementation: $$\left. \mathit{LOR}(M\rightarrow N;\mathit{axMyb};\mathit{xMy}) \approx \mathit{LOR}(M\prime\rightarrow N\prime;b\prime y\prime Mx\prime a\prime;y\prime M\prime x\prime), \right.$$where prime indicates reverse complement. This provides us with a way to verify the internal consistency of the model, without the need for a test set. This serves as a proxy for evaluating the tool's accuracy, because high correlations would be unlikely to arise by chance. [Figure 7](#btaa447-F7){ref-type="fig"} shows how LOR values for mutation/context pairs relate to the LOR values for their reverse complement. For $K \leq 5$, LOR values are highly consistent between a mutation/context pair and its reverse complement. For example, $\left. \mathit{LOR}(T\rightarrow A;\mathit{TTTAA};\mathit{TTA}) = 0.55 \right.$, suggesting that a T-to-A substitution is approximately $10^{0.55} = 3.5$ times more likely in the context TTTAA than in the shorter context TTA. The reverse-complement mutation/context pair displays a similarly strong bias, with $\left. \mathit{LOR}(A\rightarrow T;\mathit{TTAAA};\mathit{TAA}) = 0.44 \right.$. With context size *K* = 7, the correspondence between reverse complements becomes less strong, suggesting that EvoLSTM's estimations may be less accurate. Nonetheless, several results are striking and reproducible across reverse complements. Surprisingly, a C-to-A substitution in the context CCCCCCC is 3 times more likely than in the shorter CCCCC context. A-to-T substitutions are 5 times less likely in the context of ATTAAAG than in the context of TTAAA. These results show that long-range context dependencies are strong for certain mutations, and that EvoLSTM is able to capture many of them, although the task becomes increasingly difficult as *K* increases. Similar results are observed for deletions, but long-range context-dependencies for insertions appear to be less reliably captured, probably because of their rarity in our training set. 3.3 Context-dependencies in other mammals and in plants ------------------------------------------------------- To demonstrate the applicability of EvoLSTM outside of primates, we used it to learn mutation context-dependencies in other species. First, we trained a model on bats sequences (training set: 10 million *K*-mers; test set: 158 million *K*-mers), using the branch from the most recent common ancestor David's Myotis bat (*Myotis davidii*) and Microbat (*Myotis lucifugus*) to descendant Microbat. [Supplementary Figure S9](#sup1){ref-type="supplementary-material"} shows that EvoLSTM is able to capture the same type of dependencies as in primates, although the correlations observed are weaker. We attribute those differences to the fact that the number of mutated sites available for training is substantially lower in bats, despite the branch lengths being similar to those used primates. This is likely an artifact of the way the multiple genome alignment used for ancestral genome reconstruction was built, using human as a reference, which results in highly diverged bat sequences to sometimes be missing from the alignment. Nevertheless, the predicted context dependencies learned in primates and bats are quite similar ([Supplementary Fig. S3](#sup1){ref-type="supplementary-material"}). We then repeated the analysis on plants (*Brassicaceae*), using a whole-genome alignment produced by [@btaa447-B30]. Here, we used as ancestral sequence the most recent ancestor of *Arabidopsis thaliana* and *Arabidopsis lyrata*, reconstructed using *Capsella rubella* as an outgroup, and studied its evolution toward the *A.lyrata* genome. We excluded coding regions, resulting in 10 million examples being used for training, but only 6 million for testing. Again, EvoLSTM is able to detect strong context dependencies, especially for insertions and deletions. The correlation coefficients of predicted and observed (in the test set) mutation frequencies are lower than in human, which we attribute in part to the fact that the test set used to estimate observed mutation frequencies is \>20 times smaller than in mammals. Notably, we observe an absence of CpG to TpG elevated substitution rate, due to the fact that DNA methylation is rare in plants, outside of transposable elements ([@btaa447-B65]). 3.4 Running time ---------------- EvoLSTM was trained on an Intel(R) Xeon(R) Silver 4210 CPU @ 2.20 GHz CPU and NVIDIA GeForce RTX 2080Ti GPU. Training on a set of 10 000 000 15-mer examples took on average 1374 s per epoch with the batch size of 1024 and the hidden state size of 512. The training was stopped after 132 epochs. 4 Discussion and conclusion =========================== Context-dependent mutation rates have been known and documented for a long time, starting with the elevated CpG to TpG substitution rate ([@btaa447-B11]; [@btaa447-B24]), and more recently in many other cases ([@btaa447-B6]; [@btaa447-B8]; [@btaa447-B43]; [@btaa447-B47]; [@btaa447-B57]). While several computational models have been proposed to characterize these dependencies \[e.g. hidden Markov models ([@btaa447-B57]) or Bayesian networks ([@btaa447-B14]; [@btaa447-B18])\], those are generally unable to capture complex long-range dependencies. The EvoLSTM model introduced here builds on prior work in deep learning and natural language processing to learn and reveal such dependencies. The ability to efficiently learn and model context-dependent mutation rates is of high importance for several tasks. First, substitution models are at the core of sequence alignment tasks. Most commonly used alignment algorithms use context-independent models \[e.g. Needleman-Wunsch algorithm ([@btaa447-B49]), Blast ([@btaa447-B4]) and their variations ([@btaa447-B56]; [@btaa447-B58])\] or consider limited context for codon-based alignment ([@btaa447-B54]). This is partly due to the algorithmic challenge linked to computing maximum likelihood alignments under context-dependent substitution or indel models ([@btaa447-B32]). Yet many scoring-scheme agnostic pairwise and multiple alignment heuristics have been proposed recently, e.g. using reinforcement learning ([@btaa447-B35]; [@btaa447-B46]; [@btaa447-B53]). This paves the way for the possible adoption of complex mutation models such as EvoLSTM. Using accurate substitution and indel models is particularly important when aligning highly diverged sequences, where using the right model enables both more accurate alignment computation and higher remote homology detection, both of which are of high importance for whole-genome alignment ([@btaa447-B12]) and ancient transposable element detection (RepeatMasker; Smit *et al.*<http://www.repeatmasker.org>). Accurate modeling of context dependencies is also important to obtain improved sequence evolution simulators \[such as Evolver ([@btaa447-B23])\], which are instrumental in benchmarking a variety of bioinformatics tools such as whole-genome aligners ([@btaa447-B21]). These models are also relevant to phylogenetic inference, where the choice of mutation models has been shown to have a high impact on the accuracy of the trees inferred, especially for highly divergent species ([@btaa447-B19]). Finally, a more detailed study of the models learned by EvoLSTM is likely to reveal valuable information about mutagenesis and DNA repair. In particular, different types of cancer have been shown to be associated with different mutational signatures ([@btaa447-B31]); a detailed analysis of EvoLSTM models trained on such cancer mutations may help reveal the mechanisms at play. Many potentially fruitful directions may be explored to improve EvoLSTM's accuracy and scalability. Attention mechanisms have shown promising results in neural machine translation ([@btaa447-B9]) for capturing larger sentence contexts and could be beneficial in our context. Other directions may include using transformers ([@btaa447-B63]), which have recently revolutionized the field of natural language processing, as well as word embedding ([@btaa447-B44]). Code optimization should also enable EvoLSTM to be trained on larger datasets; memory requirements currently limit us to using at most 10 million training examples. Several new biological applications would also be of interest. First, one may consider training an ensemble of models, to capture different types of genomic contexts (methylated versus non-methylated, or transcribed versus non-transcribed, protein-coding versus non-coding regions, etc.), which are believed to have different mutational signatures either due to different mutational or DNA repair processes, or to natural selection. Extending EvoLSTM to other types of mutational events such as transposable element insertions \[which have been shown to be highly context-dependent ([@btaa447-B10]; [@btaa447-B64])\] and tandem or segmental duplication would also be worthwhile. Applying EvoLSTM to the study of the mutational processes at play outside of primates would also be valuable. One challenge in that direction is data availability. To train EvoLSTM, one needs the possibility of accurately reconstructing an ancestral sequence, which is only feasible if at least two relatively closely related species and a close outgroup are available. These genomes need to be sufficiently closely related that they can be accurately aligned to each other, but diverged enough that the number of mutational events available for training is sufficient. As such, it works best for large genomes with a densely populated phylogenetic tree. In conclusion, machine-learning advances have only begun to impact evolutionary biology and genomics, but this represents an application area of potentially high impact, due to the complexity of the mechanisms at play and a large amount of genomic data available to train sophisticated models. EvoLSTM represents the first step in that direction, enabling a detailed study of context-dependent mutational mechanisms and their integration in sequence evolution simulations, with applications in genomics, evolution, phylogenetics and potentially human health. Supplementary Material ====================== ###### Click here for additional data file. We thank Sean McRae, Zichao Yan and Elliot Layne for useful suggestions on the manuscript. Funding ======= This work was funded in part by a Genome Canada Large-Scale Applied Research Project (LSARP) grant and by a Discovery grant from the National Science and Engineering Research Council of Canada. We thank Calcul Quebec and Compute Canada for computing resources. *Conflict of Interest*: none declared.
Q: sqlite column constraints both unique and foreign Does sqlite allow a column to be both unique and a foreign key at the same time? How does the definition look like? CREATE TABLE table1 ( id INTEGER PRIMARY KEY, fkey INTEGER NOT NULL UNIQUE REFERENCES table2(id) ) CREATE TABLE table2 ( id INTEGER PRIMARY KEY ) A: Sure CREATE TABLE table1 ( id INTEGER PRIMARY KEY, fkey INTEGER NOT NULL UNIQUE, FOREIGN KEY(fkey) REFERENCES table2(id) ) result. Query executed successfully: CREATE TABLE table1 ( id INTEGER PRIMARY KEY, fkey INTEGER NOT NULL UNIQUE, FOREIGN KEY(fkey) REFERENCES table2(id) ) (took 0ms) REMEMBER. As of version 3.6.19, SQLite supports foreign key constraints. But enforcement of foreign key constraints is turned off by default (for backwards compatibility). To enable foreign key constraint enforcement, run PRAGMA foreign_keys=ON, from http://sqlite.org/faq.html
4 11.3 million children younger than the age of 5 are enrolled in some form of child care 21.8 percent of households have a child with a special health care need Approximately 10.2 million children younger than the age of 18 have a special health care need Who and How Many Children Are We Talking About? 4 Sources: Fertility & Family Statistics Branch, Housing and Household Economic Statistics Division, U.S. Census Bureau. (2008). Who’s minding the kids? Child care arrangements: Spring 2005: Detailed tables. Retrieved March 9, 2009, from Maternal and Child Heath Bureau, Health Resource and Services Administration, U.S. Department of Health and Human Services. (2008). The national survey of children with special health care needs, Chartbook 2005–2006. Retrieved March 9, 2009, from 5 Who and How Many Children Are We Talking About (con.)? A recent study found that approximately 13 percent of children in its sample had developmental delays, thus eligible for Individuals with Disabilities Education Act (IDEA) Part C services For purposes of comparison, in 2002, Part C served 2.2 percent of children younger than 3 5 Source: Rosenberg, S. A., Zhang, D., & Robinson, C. C. (2008, June). Prevalence of developmental delays and participation in early intervention services for young children. Pediatrics, 121(6). Retrieved March 9, 2009, from 6 Who and How Many Children Are We Talking About (con.)? Head Start (HS), requires that at least 10 percent of children served be those with disabilities Data show that in 2009, 12 percent of enrolled children had a disability, with 50 percent diagnosed before entering HS and 50 percent diagnosed during the program year 6 Source: Center For Law and Social Policy. (2010, July). Head Start participants, programs, families, and staff in Retrieved May 10, 2011, from 8 Background 8 History of discrimination Attitudes toward people with disabilities Law both leads and follows Recognizing benefits of inclusion; yet in all these laws no definition or term “inclusion” See new joint statement on inclusion issued by NAEYC and DEC 9 Distinguishing Types of Laws 9 Enactment of laws to protect civil rights  Concern with discrimination by public accommodations  Concern with discrimination by publicly funded entities Enactment of laws to provide services by entitlement 13 ADA Definition of Disability A physical or mental impairment that substantially limits one or more major life activities When determining whether a disability is present, mitigating or corrective measures are not taken into account (e.g., medicine or prosthesis) 13 14 Major Life Activities Federal law defines major life activities to include the following:  Walking  Seeing  Hearing  Learning  Taking care of oneself 14 15 ADA Protects Several Groups Individuals with disabilities as defined by ADA Individuals with a record of having disabilities Individuals who are regarded as having disabilities Individuals or entities associated with people with disabilities 15 16 Direct Threat: A Narrow Exception Rarely, people with disabilities who pose a significant risk to others may be excluded if risk cannot be eliminated by modifications  Exclusion due to risk is an exceptional case; this is not the typical child who bites! 16 17 Public Accommodations No public funding required; simply must be open to the public Programs operated by religious organizations are exempt Child care centers and family child care homes are covered U.S. Territories must comply; Tribes cannot be sued by individuals, but can be sued by the Federal Government 17 18 When Programs Are Required to Admit a Child With a Disability Scenario: A parent requests to enroll his/her child with a disability in a child care program The program should evaluate the individual needs of the child with a disability The program should follow the evaluation process to determine the child’s/program’s rights and responsibilities 18 19 19 Does the child’s condition pose a direct threat? Renovated area and new facilities (after 1/26/96) must be fully compliant with ADA Accessibility Guideline regulations Is this a new facility or are major renovations being made? Identify ways to reasonably accommodate the needs of the child. This child cannot be reasonably accommodated at this point. Reassess when the direct threat can be eliminated Can the direct threat be eliminated through reasonable modifications? YesNo Do you need to reasonably modify policies, practices, and procedures to accommodate the child? Do you need to remove any architectural barriers from an already existing facility to accommodate the child? Will providing this impose an undue burden or fundamentally alter the nature of your program? Will changing policies and practices fundamentally alter the nature of your program? Will removing barriers be readily achievable? The child can be reasonably accommodated. Admit the child into your program. This child does not need to be accepted by your program now. If reasonably possible, set long-term goals to enable your program to meet similar needs in the future. No Yes No Yes No Yes No Yes No Yes No Does the child need auxiliary aids and services to ensure effective communication? Are there any reasonable alternatives to accommodate the child? Yes No 20 What Must Providers Do? Develop eligibility/admissions criteria that do not screen out or tend to screen out persons with disabilities Make reasonable modifications to policies, practices, and procedures Provide for equally effective communication Comply with physical access requirements 20 21 Overarching Notion of Reasonable Accommodations Examine program resources, tax credits and deductions (IRS Code Sections 44 and 190), and any available community resources Provide individualized assessment What is reasonable is based on conditions at a particular point in time, and this can change! 21 22 Eligibility/Admissions Must eliminate all eligibility criteria that explicitly state children with disabilities cannot be included Must eliminate admissions criteria such as “toilet trained,” unless it is clear that this does not apply to children with disabilities May impose legitimate safety requirements if necessary for safe operation 22 23 Eligibility: Charges Providers may not impose a surcharge on a person with a disability to cover the costs of measures that are required under ADA States are not precluded from paying more under ADA (in other words, there may be a special needs subsidy rate) 23 24 Modification of Policies, Practices, and Procedures Providers are required to make reasonable modifications to policies, practices, and procedures unless the changes would fundamentally alter the nature of the program If a modification would fundamentally alter the program, providers must determine if a reasonable alternative exists 24 25 Examples Changing snack time or nap time Eliminating a no-medication policy Doing blood-prick testing Providing visual cues of transitions Assisting with the positioning of a leg brace Allowing specialists to work with a child during program hours 25 What examples do you have? 26 Fundamental Alteration Very limited exception Requires more than discomfort or inconvenience Must “turn the program upside down” Insulin injection may be a fundamental alteration 26 28 Effective Communication Ensure the provision of effective communication  Provide auxiliary aids and services  Not required if it would result in a fundamental alteration or undue burden (i.e., a significant difficulty or expense) 28 31 Existing Facilities Buildings built or renovated before 1993 undertake “readily achievable” architectural modifications Readily achievable means easily accomplishable and able to be carried out without much difficulty or expense 31 33 Alterations Alterations means changes that affect usability (i.e., remodeling and renovation) If made after 1992, the facility shall be made to ensure that, to maximum extent feasible, altered portions are readily accessible and usable; effectively follow ADA accessibility guidelines, with some distinctions 33 34 New Construction Child care facilities built or major renovations made after January 26, 1993, must comply with the ADA Accessibility Guidelines Guidelines for children’s environments and play areas have been developed under the authority of the Access Board; just recently adopted by the Department of Justice as regulations! 34 35 Access Guidelines Extensive information about access guidelines is available at Information includes play area guide and FAQs See also: 35 36 Enforcement Law is enforced via private lawsuits or by the U.S. DOJ DOJ can seek imposition of civil penalties up to $55,000 for the first violation DOJ has regularly enforced in child care; a recent settlement occurred against Nobel Learning Communities for failing to enroll and/or provide reasonable accommodations to preschool children with autism spectrum disorder and a brain shunt. 36 37 Title II(a) Provisions Nondiscrimination in governmental/public body services, programs, and activities Includes school district programs, park and recreation, etc. 37 38 Distinctive Provisions “Qualified” individual with a disability: Must meet essential eligibility requirements for receipt of services Someone who poses a direct threat is not qualified A public entity may offer separate or special programs, but individuals with disabilities cannot be denied access to standard programs 38 39 Distinctive Provisions, con. Must provide “program accessibility” unless to do so would create a fundamental alteration or undue financial or administrative burden; consider possible alternatives Determination should be made by head of agency (with written findings) 39 40 Distinctive Provisions, con. 40 Must provide equally effective communication unless to do so would create a fundamental alteration or undue financial or administrative burden 41 Title II: Administration Requirements Develop a grievance procedure Designate a compliance officer Conduct a self-evaluation Provide information about Title II requirements to the public 41 Enforced through the U.S. DOJ, Office of Civil Rights, Department of Health and Human Services, the U.S. Department of Education, or through Federal district court 42 Section 504 Covers Federal Government executive agencies Applies only to entities receiving Federal funds (the Child and Adult Care Food Program, the Child Care and Development Fund, HS, Title I pre-k, Part B Section 619, etc.) Similar protections to Title II of ADA No religious exemption States have no immunity from suit 42 43 State Law Equivalents Determine if your state law parallels or provides greater protection than ADA or Section 44 IDEA Federal entitlement to services These are responsibilities of the states/school districts, not private programs Part B deals with children 3 to 21 years of age  Section 619 of Part B deals with children 3 to 5 years of age Part C deals with infants and toddlers, birth to age 3 44 45 Part B Children ages 3 to 5 who meet eligibility requirements are guaranteed a free appropriate public education (FAPE) Services must be provided in the least restrictive environment (LRE), which includes child care settings 45 48 Least Restrictive Environment (LRE) Public agencies must ensure that to the maximum extent appropriate, children with disabilities... are educated with children who are nondisabled Settings other than general education can only be used if the nature or severity of the disability is such that regular classes with the use of supplementary aids and services cannot be achieved satisfactorily 48 49 Individualized Education Program (IEP) Children found eligible under Part B are entitled to have an IEP developed by a team including parents and professionals This specifies the child’s special education, related services, supplementary aids and services, etc. 49 50 Individualized Education Program Services will be provided to enable the child to participate with nondisabled children An IEP must include an explanation of the extent, if any, to which the child will not participate with nondisabled children In situations in which there is no public preschool, courts may find that the LRE is in a private preschool setting, especially where the IEP spells out a need for interaction with typically developing peers. 50 51 Part C Eligibility includes the following:  Children with developmental delays  Has a diagnosed physical or mental condition that has a high probability of resulting in developmental delay;  At state option, children at risk of having substantial developmental delays 51 52 Natural Environments To the maximum extent appropriate to the needs of the child, early intervention services must be provided in natural environments Includes a child’s home “Community settings in which children without disabilities participate,” such as child care Natural environments means settings that are natural or normal for the child’s age peers who have no disabilities 52 53 Natural Environments (con.) Settings other than natural environments can only be used if early intervention cannot be achieved satisfactorily for the infant or toddler It is presumed that services will be offered in natural environments because if they are not, a justification must be provided. 53 54 Individualized Family Services Plan (IFSP) Children eligible under Part C are entitled to an IFSP developed by the IFSP team which includes parents and professionals Early intervention services necessary to meet the outcomes are detailed Each IFSP must include a statement of the natural environments in which the services will be provided and a justification of the extent, if any, to which the services will not be provided in a natural environment 54 55 Resources Access Board, ADA homepage, U.S. DOJ, tm tm 55 56 Resources, con. Center on the Social and Emotional Foundations for Early Learning, Child Care Plus+: The Center on Inclusion in Early Childhood, Center for Inclusive Child Care, Education Law Center, National Early Childhood Technical Assistance Center, Special Quest, 56
Usefulness of a clinician rating scale in identifying preschool children with ADHD. To ascertain the psychometric properties and clinical utility of the Behavioral Rating Inventory for Children (BRIC), a novel clinician inventory for preschoolers. Completion of the BRIC for 214 preschoolers follows 2 evaluation sessions, generally separated by less than 2 weeks. Items are submitted to a Principal Components Analysis (PCA) with Varimax rotation. Test-retest reliability and validity relative to other measures are assessed. PCA yields a 2-factor solution representing a "Symptom Triad" and a "Mood/Sociability Factor." Test-retest reliability of the triad and factor are .78 (p <.001) and .55 (p < .001), respectively. Correlations between parent and teacher ratings of ADHD-related behaviors and the Symptom Triad range from .39-.47 (all p <.001); similar correlations are found with laboratory measures of activity level (r = .35-.49, all p <.001). The Symptom Triad of the BRIC appears to be a reliable and valid tool that may assist researchers and clinicians in studying and diagnosing ADHD in preschoolers, particularly in cases where teacher ratings are unavailable. J. of Att. Dis. 2010; 13(5) 479-488.
Maitreya's Star sign - latest update December 4th, 2016 (with over 250 photographs and reports to date) New entry, added December 4th, 2016 New entry, added November 14th, 2016 Samnanger, Norway – On 11 January 2016, at 9.45am, T.W. photographed a “star-like object shining brightly in the south-east” sky. (Benjamin Creme’s Master confirms that the object was Maitreya’s ‘star’.) New entry, added October 16th, 2016 Photographs of Maitreya’s ‘star’ taken between 23 March and 14 April 2016 over Rotterdam, the Netherlands. Photographed and sent by L.S. (Benjamin Creme’s Master confirms that the object is Maitreya’s ‘star’.) New entry, added March 24th, 2016 Surrey B.C., Canada – Filmed on 29 November 2015 at 11.30pm, this colourful UFO moved and changed colour. (Source: ufosightingsdaily.com) (Benjamin Creme’s Master confirms that the object was Maitreya’s ‘star’.) Broadway, North Carolina, USA – A pulsating UFO that changed shape and colour, and moved across the sky, was filmed over Broadway on 4 January 2016. (Source: ufosightingsdaily.com; YouTube: FindingUFO) (Benjamin Creme’s Master confirms that the object was Maitreya’s ‘star’.) New entry, added February 13th, 2016 Dear Editor, We live on an island in the Indian Ocean. On 26 December 2015, around 00.42hrs, we thought we saw Maitreya’s star. We wanted to film it but, unfortunately, my husband’s portable phone battery was flat. We were able to observe the star carefully as it was moving slowly. It was quite bright, different from the other stars. Its colour was a brilliant yellow. We made a search on Google in hope to find out what it could be, and found the articles about Maitreya. We immediately understood that this was the star we’d seen. We were surprised. We have a strong belief in Jesus Christ and are wondering why the star appeared to us. D.and C., Baya, Mauritius Island. (Benjamin Creme’s Master confirms that the object was Maitreya’s ‘star’.) New entry, added October 9th, 2015 Auckland, New Zealand A bright ‘star’ was filmed in the night sky on 10 July 2015 and was seen to rapidly change colour and shape. “Under no circumstances is this a natural star,” is one of the comments made during the video. (Source: YouTube: cdbfort) (Benjamin Creme’s Master confirms that it was Maitreya’s ‘star’.) New entries, added July 15th, 2015 Photographs of a bright object changing colour were taken by M.Z. on 19 April 2015 above Amsterdam, looking in the direction of the Great Bear (the Plough). (Benjamin Creme’s Master confirms that the object was Maitreya’s ‘star’.) Photograph sent by T.W., who explains: “This extremely bright object hangs like a lamp in the sky and cannot possibly be located far out in space. This video using a teleconverter lens 2.6x was taken on 2 May 2015, at 9pm, in Samnanger, Norway.” (Benjamin Creme’s Master confirms that the object was Maitreya’s ‘star’.) A new entry, added June 7th, 2015 'Star' sighting published in Share International magazine May 2015 issue A video showing a bright object, rapidly changing colour and moving, was filmed over Samnanger, Norway, on 14 March 2015 at 7.45pm, by T.W., who sent these still photographs. Benjamin Creme’s Master confirms that the bright object was Maitreya’s ‘star’.) A new entry set, added October 5th, 2014 'Star' sighting published in Share International magazine up to September 2014 issue Maitreya's 'star' filmed on 2 December 2012, at Tiruvannamalai, Tamil Nadu, India (the location of Ramana Maharshi's Ashram), by K.S., Nara-shi, Japan. (Source: YouTube) Dear Editor, On 6 April 2014 at about 22.30, watching from my balcony, I once again saw a star that seemed to be pulsating light in an abnormal way. I had previously tried to film it with my video camera but to no avail. On that night I had the sudden impression that I should give it another try. I made some recordings on 10 and 11 April and also took a few snapshots. The different colours, shapes and moves that can be seen on the video and the photos seem to indicate that it might be something special. I had the strange impression that there was some kind of intervention between the observer and the observed. Each time the sky was clear, that star was still visible. Could it be a UFO or Maitreya's 'star'? J.C.L., Rittershoffen, Alsace, France. A new entry set, added May 11th, 2014 'Star' sighting published in Share International magazine April 2014 issue A bright, colourful object was filmed in the sky on 1 April 2013 over Windsor, Ontario, Canada. (Source: YouTube: kayakless Ontario) (Benjamin Creme’s Master confirms that the colourful object was Maitreya’s ‘star’.) A new entry set, added April 1st, 2014 'Star' sightings published in Share International magazine January to March 2014 ‘Maitreya’s ‘star’ on video Nevada, USA – Video taken on 28 December 2013 in the foothills of the Sierra Nevada mountains shows a pulsating UFO that continually changes colour. The filmmaker also shot similar footage in the same location on 12 and 31 December 2013 and 3 January 2014. (YouTube: AngelOfThyNight) (Benjamin Creme’s Master confirms that the object was Maitreya’s ‘star’.) [Source: January / February 2014] Maitreya’s ‘star’ letter Dear Editor, On 27 November 2013, in the evening, after Transmission Meditation, we opened the window and looked at the sky. It was misty and the stars well hidden. Only planet Jupiter could be seen. All of a sudden another large star appeared next to Jupiter and was moving towards it – as if they intended to blend together. It was very impressive to see these two giants so close together. In Indian astrology, planet Jupiter is called Guru (the Master). A few weeks later, on 17 December at about 5pm, I was just crossing a bridge when the planet Venus drew my attention. The sky was cloudless and in the twilight only Venus could be seen. I always feel a deep joy when I see Venus. So I decided to rest for a while and watch. After some seconds in the distance another star appeared, moving from east to west in direction of Venus. The nearer it came the more brilliant became its light. For a moment planet Venus and the moving star were close together, so I had the opportunity to compare the two different lights. Then the two energies fused together (in my consciousness) before the star continued its way into the sunset. A truly uplifting experience! Was it Maitreya’s star on both occasions? J.A., Regensburg, Germany. (Benjamin Creme’s Master confirms that both sightings were of Maitreya’s ‘star’.) [Source: SI January / February 2014] A new entry, added January 2nd, 2014 "Star" sightings ‘Maitreya’s ‘star’ California, USA – A bright light that changed colours was seen in the sky over Bakersfield, California, on the nights of 28 and 29 October 2013. According to a local television news report: “17 News received numerous calls from viewers about a mysterious bright light shining in the sky for the second straight night…. It was too bright to be a star, too still to be an aircraft.” Amateur astronomer Daron Nunn, who looked at the UFO through a telescope, said the object “split” and “changed shapes”. (Source: YouTube: Isaac Wilee)(Benjamin Creme’s Master confirms that this was Maitreya’s ‘star’.) [Source: SI December 2013] ‘Maitreya’s ‘star’ Florida, USA – A pulsating object that changed colours was seen by Gregg Prescott over Sarasota, Florida, on 16 and 17 October 2013. He also filmed it from Siesta Key, Florida, 3 November 2013, from 7.40 to about 8.40 pm. “It would grow larger when I asked it to,” he writes, adding: “the location of this UFO has moved significantly north, which gives everybody the opportunity to see it for an extended period of time. It’s as if the ET’s want to give everyone an opportunity to see that we are not alone in this universe.” One witness said: “That object is so bright sometimes it can be seen though clouds.” Initially sightings began around 9 October; many reports came from all over the United States as well as Brazil, Japan and New Zealand. (Source: in5d.com; YouTube: in5d)(Benjamin Creme’s Master confirms that this was Maitreya’s ‘star’.) [Source: SI December 2013] *** Dear Editor, On 15 August 2013, near Dieppe, I saw a bright orange star in the sky around 11.15pm. The star seemed very low in altitude. At the beginning, it seemed not to be moving, but after a few minutes it began to move slowly to the left and disappeared behind trees. It was so beautiful and I was very excited. I’m almost sure that it was a UFO. Could you please tell me what this object was? If it was a UFO, where did it come from? (Benjamin Creme’s Master confirms that the bright orange light was Maitreya’s ‘star’.) [Source: SI December 2013] A new entry, added November 4th, 2013 "Star" sightings ‘Maitreya’s ‘star’ Dear Editor, On 26 July 2013 I saw a star that appeared to be changing colour, and so I grabbed my camera and took a number of images of the star. A number of exposures were taken over 15 minutes or so. The shape and colour of the star are exactly as photographed. Was it Maitreya's star? K.M., Claremont, Ontario, Canada. (Benjamin Creme's Master confirms that it was Maitreya's 'star'.) [Source: SI October 2013] Two new entries, added October 3rd, 2013 "Star" sightings ‘Maitreya’s ‘star’ [photo below] West Harrison, Indiana, USA – Video of a large, bright object rapidly changing colour and moving quickly, was uploaded onto YouTube on 12 May 2013. (Source: YouTube: tuffprep1)) (Benjamin Creme’s Master confirms that the colourful object was Maitreya’s ‘star’.)[Source: SI July/August 2013] *** Dear Editor, On the night of 6 July 2013, in the city of Camanducaia, Minas Gerais, Brazil, looking to the northwest I saw a very brilliant golden star. First, I thought that it could be Jupiter, and then I tried to see it better using a telescope. I didn’t see the moons of Jupiter that normally appear when you are using the telescope, and I realized that the strange object was emitting light of its own, and not reflecting the light of the sun as a planet does. I enlarged the image several times using the telescope, and I realized that the object, although very bright, was rather small. The next day, using the Stellarium computer program, I realized that there was no object showing in the location that I saw last night. It was a very mysterious thing! And also, on that same night, I saw an object passing near that strange star, in a route that I’m sure is not an airplane route. Could you tell me what was that golden star and the object that passed near it? T.S.A., Camanducaia, Brazil. (Benjamin Creme’s Master confirms the star was Maitreya’s ‘star’ (one of four). The object near it was a spaceship from Mars servicing the ‘star’.) [Source: SI September 2013] Two new entries, added May 2nd, 2013 "Star" sightings ‘Maitreya’s ‘star’ [photo below] Sweden – These comments were posted on YouTube regarding a UFO sighting on 1 March 2013: “This odd looking ‘star’ was recorded last night around 17.30 to 18.30 pm by me and my girlfriend in Göteborg (Sweden). The object moved extremely slowly and it appeared several hours earlier than other stars. It kept pulsating in various colours at an extremely fast pace. I am not convinced that this is either a star or a planet. It might be that off-course but I am not convinced yet. Some people think this might be Sirius, Nibiru or even a UFO-mothership. What do you think?” (Source: YouTube: UFO-Skywatcher Sävedalen) (Benjamin Creme’s Master confirms that it was Maitreya’s ‘star’.) *** Dear Editor, On 11 February 2013, I was coming back from Transmission Meditation in Valencia. From my car I saw in the sky, above a hill known as Monte Picayo, a red light, hovering over it without movement. At first I thought it was a plane, but then I realized that it was not moving and as I continued driving, the light remained there. When I got home, the light was still above the hill. I would like to know if that light was Maitreya’s ‘star’ or a spaceship? Name withheld, Valencia, Spain. (Benjamin Creme’s Master confirms that the light was Maitreya’s ‘star’.) New photograph, added September 9th 2012 "Star" photograph from Russia ‘Maitreya’s ‘star’ Moscow, Russia – Multi-coloured, moving object seen over Moscow on 29 July 2012 is Maitreya's 'star'. (Source: YouTube: olegen77), SI September 2012 New photographs & accounts of sightings, added July 23rd 2012 "Star" photographs and accounts of sightings Constanta, Romania – 19 April 2012. “I saw a star in the sky, or at least that’s what I thought. What caught my attention was the intense multicolor flickering. Got my camera and started recording.” (Source: YouTube: ForsakenCTpk) (Benjamin Creme’s Master confirms that the object is Maitreya’s ‘star’.), SI June 2012 Amsterdam, the Netherlands, late March 2012 – Series of photos of a bright star rapidly changing colour every few seconds. Taken in a south-westerly direction at about 30 degrees above the horizon. Sent by Corné Quartel, Amsterdam. (Benjamin Creme’s Master confirms that the object is Maitreya’s ‘star’.), SI June 2012 New photographs & accounts of sightings, added June 17th 2012 "Star" photographs and accounts of sightings France – Four UFOs over Volvic, 19 March 2012. Two flickering lights moving in tandem in the sky split into a rectangular shape of four lights, which continued to move rapidly together. (Source: gather.com; YouTube: kadiethedogg) (Benjamin Creme’s Master confirms that the four ‘stars’ make up Maitreya’s ‘star’.), SI May 2012 France – Toulouse, 31 March 2012 at 22.30pm. A bright darting sphere was filmed over Toulouse, France, on 30 and 31 March 2012, flickering rapidly through different colours around a bright central point of light. (Source: YouTube: pascal2503) (Benjamin Creme’s Master confirms that the sphere was Maitreya’s ‘star’.), SI May 2012 Q&A from SI April 2012 Q. A number of video “experts”, along with the largest UFO investigation group in the US, have declared the videos of the appearance of Maitreya’s ‘star’ over Jerusalem in January 2011 a hoax, without bothering to locate or interview other eyewitnesses. Would your Master kindly tell us how many people actually saw the ‘star’ over the Temple Mount that night? A. Several thousand. Q. You have said the four ‘star’ UFOs are the size of five football fields, but the photo of the ‘star’ over the Temple Mount published in Share International shows it appearing significantly smaller. Do the Space Brothers manipulate the size of the ‘star’ UFOs along with their shape and colour? A. Yes. New photograph & account of sighting, added May 6th 2012 "Star" photographs and accounts of a sightings Sweden – UFOs seen over Uppsala, Sweden, 15 January 2012. Comments from YouTube: “I had been skiing all day and on my way home I saw bright lights in the sky. I picked up my cellphone and managed to capture almost 2 minutes.” (Source: YouTube: UFOindependent) (Benjamin Creme’s Master confirms that the lights were Maitreya’s ‘star’.), SI March 2012 Russia – A well-known photographer Halit Safin took a video of a UFO over the city of Ufa (capital of the Republic of Bashkortostan) on the evening of 23 January 2012. His video, 2 minutes and 15 seconds in length, shows a ring-shaped object rapidly changing colour to varying combinations of green, blue, yellow and red. (Source: YouTube: myunhauzen74) (Benjamin Creme’s Master confirms that the multi-coloured object was Maitreya’s ‘star’.), SI March 2012 Maitreya’s ‘star’ Dear Editor, At some stage, on any clear night we get, I usually have a little ‘look’ for the ‘star’. On Wednesday night 12 August 2011 at about midnight I noticed ‘something’ in the sky – it wasn’t Jupiter and I don’t think it was a plane because it took about an hour from when I first saw it until it went out of sight on the horizon (a plane would take about 5 minutes). It was almost overhead when I first noticed it – it wasn’t very high in the sky and moved steadily in an east to west direction. It seemed to be flashing different colours – green, red – there was always some colour visible, but not like a plane where the lights flash on and off intermittently. I don’t have any photo but would like to know if I have seen the ‘star’. B.D., Gorey, Co Wexford, Ireland. (Benjamin Creme’s Master confirms it was indeed Maitreya’s ‘star’.), SI March 2012 'Star' photographed on January 15th in The Netherlands, SI January / February 2012 Light connection Dear Editor, On Monday 16 January 2012, at 5.45pm, I was at Alexandra Palace in north London. Getting out of the car I saw an orange light to the west of the Palace, moving across the sky. There was also an extremely bright star in the sky and the orange object passed just underneath it and then simply vanished. When I looked into the sky 45 minutes later, the bright star had just simply vanished too, even though it was a clear night and all the other stars were still clearly visible. Can you tell me what the “bright star” and the orange light were? S.S., London, UK. (Benjamin Creme’s Master confirms that the ‘bright star’ was Maitreya’s ‘star’, and the orange light was Maitreya’s Lightship.) . SI January / February 2012 New photographs, added December 6th 2011 "Star" photographs from around the globe 'Star' photographed in Pescara, Italy, SI November 2011 ‘Maitreya’s ‘star’ witnessed across four US states A bright “mystery object” seen across California, Colorado, Nevada and Arizona on the night of 14 September 2011 has been widely reported by local US television news stations. California’s KCAL9 reported that their newsroom had been flooded with emails from people who had watched a mystery object “streaking across the night sky”. The brilliant light lit up the southern California night sky, and was seen by people over a huge area, from San Diego on the coast, right across the mountains, the desert, and as far inland as Las Vegas and Phoenix. The station played a video of the object passing over Glendora, California. According to News At Ten presenter Dave Bryan, people had described it as a bright light, or like a falling star, or like a red comet with a green light around it. A resident of San Clemente, California – who was able to capture the object in High Definition – described the object as “a red comet with a green glow around it”. Kim Curto was filming at her brother’s football game in Phoenix, Arizona, when she saw “a big, like, circular light move across the sky” and managed to capture it on video. SI November 2011 'Star' photographed over Santarém, Portugal, SI November 2011 New photograph, added July 26th 2011 "Star" photograph, added July 2011 A bright, flickering light filmed over El Granada, California, USA, on 4 April 2011 at 11.30pm was actually Maitreya's "star", SI June 2011 New photographs, added June 2nd 2011 "Star" photographs from around the globe, added June 2011 On 13 to 14 March 2011 Maitreya’s ‘star’ was filmed over Dunedin, New Zealand, SI May 2011 Maitreya’s ‘star’ filmed over Samnanger, Norway, on 19 February 201, SI May 2011 Maitreya’s ‘star’ filmed over Melbourne, Australia, on 26 February 2011, SI May 2011 New photographs, added April 25th 2011 "Star" photographs from around the globe 'Star' as seen over the Mount in Jerusalem, Israel Click here to read related News release! 'Star' photographed in Pescara, Italy, SI April 2011 New photographs, added March 9th 2011 "Star" photographs from around the globe If you wish to read more about these "star" sightings, please visit the March 2011 Share International magazine page, please click here. 'Star' televised in Mexico, SI March 2011 'Star' photographed in Beverungen, Germany, SI March 2011 Please visit this page again! New photographs, added February 18th 2011 Yet more "star" photographs from around the globe If you wish to read more about these "star" sightings, please visit the January / February 2011 Share International magazine page, please click here. 'Star' photographed in Brighton, UK, SI Jan/Feb 2011 'Star' photographed in Accra, Ghana, SI Jan/Feb 2011 Please visit this page again! 'Star' photographed in Maui, USA, SI Jan/Feb 2011 'Star' photographed in Hamilton, Ontario, Canada, SI Jan/Feb 2011 'Star' photographed in Cambridge, New Zealand, SI Jan/Feb 2011 'Star' photographed in Nova Scotia, Canada, SI Jan/Feb 2011 'Star' photographed in Nebraska, USA, SI Jan/Feb 2011 'Star' photographed in Merced, California, USA, SI Jan/Feb 2011 'Star' photographed in Samnanger, Norway, SI December 2010 (image I) 'Star' photographed in Samnanger, Norway, SI December 2010 (image II) 'Star' photographed in Samnanger, Norway, SI December 2010 (image III) 'Star' photographed in the USA, SI December 2010 'Star' photographed in Silverdale, SI December 2010 'Star' photographed in Germany, SI December 2010 New photographs, added November 22nd 2010 Numerous "star" photographs from around the globe 'Star' photographed in Amsterdam, the Netherlands, SI November 2010 'Star' photographed in Grand Mesa, USA, SI November 2010 'Star' photographed in Kerkrade, the Netherlands, SI November 2010 These photographs of the 'star' taken in Edmonton, Canada, SI November 2010. 'Star' photographed in London, UK, SI November 2010 'Star' photographed in Spelonga, Italy, SI November 2010 'Star' photographed in Auckland, New Zealand, SI December 2010 New photographs, added October 20th 2010 Numerous "star" photographs from around the globe 'Star' photographed in Cucuta, Colombia, SI October 2010 'Star' photographed in Dubai, the UAE, SI October 2010 'Star' on television in Jinhua Zhejiang, China, SI October 2010 These photographs, sent by O. S., show the rapid colour changes of Maitreya’s ‘star’ seen over Berlin, Germany on 9 March 2010. 'Star' photographed in New York, USA, SI October 2010 'Star' photographed in Stansted, UK, SI October 2010 'Star' photographed in Whitby, Canada, SI October 2010 New photographs, added September 2010 More "star" photographs from around the globe 'Star' photographed in Berkeley, SI May 2010 'Star' photographed in Hullbridge, SI May 2010 'Star' photographed in Boston (1), SI June 2010 'Star' photographed in Hullbridge, SI July 2010 'Star' photographed in Kadina, SI July 2010 Maitreya's lightship and 'star' in Hullbridge, SI July 2010 'Star' photographed in Rome, SI July 2010 'Star' spiral photographed in Australia, SI July 2010 'Star' photographed in Norway, SI September 2010 'Star' photographed in Brazil, SI September 2010 'Star' photographed in the UK, SI September 2010 This selection of photographs is from the May, June, July and September issues of Share International magazine. 'Star' photographed in Boston (2), SI June 2010 'Star' photographed in Paris, SI July 2010 New photographs, added April 2010 Two "star" photographs from around the globe Samnanger, Norway, 19 February 2010. Photograph taken by T. W. between 6.30 and 7pm, in an easterly direction. Brooklyn, New York, USA, 11 February 2010: “Filmed right before sunset … it would be more accurate to think of it as looking like a ball of light.” (YouTube: tderamus) New photographs, added March 2010 Spiral light over Norway – the ‘star’ that heralds Maitreya’s emergence The enormous, spiral light with its glowing centre, seen over Norway on 9 December 2009, has excited and baffled thousands of Norwegians including astronomical experts. What does it mean? On 12 December 2008 Share International Foundation announced that a large, bright ‘star’-like object would soon be seen in the sky. It is a sign heralding the imminent appearance of Maitreya, the World Teacher, on His first television interview, which will take place in the USA. The ‘star’ is really one of four enormous spacecraft placed around the world. Since December 2008 numerous sightings of the ‘star’ have been reported on YouTube and television news programmes. Share International magazine has received hundreds of photographs showing the ‘star’ in a variety of stunning colours and shapes. The huge spiral manifestation over Norway is an extension of the work of these spacecraft and is irrefutable evidence of their reality. Our information is that further such manifestations are planned for the near future. New pictures of Norwegian spiral light added on 22 December 2009 & 1 January 2010 ABOVE: This photo by kind permission of Dagfinn Rapp. ABOVE: This photo by kind permission of Elisabeth Anne Roberts Bjørndalen shows a nice perspective of the 'star' in the distance. ABOVE: This photo by kind permission of Hege Bergfald Jacobsen, shows the sky after the spiral action has ended. ABOVE: This photo by kind permission of Steinar Karlstrøm. ABOVE: This photo by kind permission of Jan Erik Steine. LEFT: This photo by kind permission of Finn Eirik Rasch. Please read also Foxnews story on the spiral, click here. Please read more on The Sun website, click here. The ‘Star’ Sign – new Share International video, now on YouTube Share International has produced a 10 minute film called The ‘Star’ Sign, which is now available on YouTube website, presenting the extraordinary phenomenon of the ‘star’ heralding Maitreya’s emergence. Since Benjamin Creme’s first announcement in December 2008, Share International has received hundreds of photographs of the ‘star’ from all over the world, and witnesses have independently posted on YouTube dozens of videos of the ‘star’ from different countries with much debate as to its meaning and purpose. The new film contains vivid photographs, video footage and media reports from Brazil, Colombia, Sky News, and a clip from a Benjamin Creme lecture. Viewers can see how the ‘star’ moves, changes shape and emits rays of brilliant colours. It is, of course, according to Benjamin Creme’s Master, not a star per se, but one of four gigantic spacecraft, positioned so that one is visible from any part of the globe, an awesome sign to the world that an extraordinary event is about to happen – the emergence of Maitreya into public view. Take part in this extraordinary event by looking for the ‘star’. If you photograph or film it, please report it to the media or Share International magazine and help create an open media debate about its meaning and purpose. See ‘The ‘Star’ Sign’ at: www.youtube.com/watch?v=yuuMOvy1KNE The star that heralds Maitreya’s emergence “In the very near future, people everywhere will have the opportunity to witness an extraordinary and significant sign, the like of which has been manifested only once before, at the birth of Jesus. Then, according to Christian teaching, a star appeared in the heavens and led three wise men from the East to the birthplace of Jesus. Soon, once again, a star-like luminary of brilliant power will be seen around the world.” (Benjamin Creme’s Master, ‘Maitreya’s first interview’, SI Jan/Feb 2009) On 12 December 2008 Share International distributed a news release announcing that in the very near future a large, bright star would appear in the sky visible throughout the world, night and day, heralding the imminent appearance of Maitreya in His first interview on a major US television programme. Since early January 2009 sightings of the star have been reported all over the world and hundreds of sightings have been sent to Share International. We include a selection of the latest reports from the media, Share International readers, and sightings from YouTube. All are genuine sightings confirmed by Benjamin Creme’s Master to be the ‘star’. How to spot the ‘star’ “It behaves in a way no other celestial object does.” — Benjamin Creme The ‘star’ • resides in our Earth’s atmosphere • can move, spin, pulsate and blink • can change size and shape (eg round, diamond, hexagonal) • can change position in the sky • can get closer, and recede, at speed • is very bright and sometimes the only star visible • can radiate bright colours, often in quick succession • has been sighted day and night • can respond to thought: has been known to appear and move when asked • several witnesses have even seen all four ‘stars’ together • is seen all over the world. Note: Benjamin Creme explains that the ‘star’ regularly recharges its energy from the sun and is not always visible. Also note that in cities high-rise buildings can obscure sightings of the ‘star’, so keep watching. Photographs sent to Share International The photographs below from around the world have been confirmed by Benjamin Creme's Master to be the star. Click on any photograph to view a larger version. Photographs sent to Share International Updated 10 November 2009 The Netherlands, Tilburg, 25 July 2009. E. H. writes: “About midnight the star was positioned low in the sky, east-southeast, and moved unusually fast southward. In the foreground the funfair can be seen.” Germany: Taken on 2 August 2009 at 4.41am, in Nuremberg, by K. M. Norway: Photograph taken on 10 October 2009 between 6 and 7am in the southeast, at Samnanger, 40 km from Bergen, Norway. Sent in a video link by T.W. who asked: “On the videos the ‘star’ seems to take on shapes resembling the Christian cross and maybe also the Buddha?” (Benjamin Creme’s Master confirms it was the ‘star’, in the shape of a cross. The earlier images were not related to the Buddha, but were of the cross being formed.) Spain: two photographs taken in Barcelona, on 1 October 2009, sent by H.L. and C.F. France: Two photographs taken between 5 and 7am on 24 September 2009 in Menton, south of France, at a 40 degree angle from the eastern horizon. Sent by M.S. The Netherlands, Photographed on 26 September at 8pm during the annual Transmission Meditation Conference in Kerkrade, the Netherlands. More than 100 participants witnessed the large star in the evening in a south-east direction. Sent by C.Q., Amsterdam, Holland. China: Taken on 22 August 2009, Beijing, by T.W. Updated 23.9.2009 Germany, Berlin, 27 June 2009, photographed from the balcony of his flat. Sent by T.W. The Netherlands, On 6 July, at 4.30am, I hoped to see the ‘star’ in a northeast direction, after reading the latest Share International magazine. I looked out of my bedroom window and – yes there it was – shining brightly in the still dark sky, the only star left to see. The sky was brightening quickly and the star faded away until 5.30am when it was gone. There isn’t any doubt for me that all the stories in Share International are true, but you can see this with your very own eyes! So wonderful, I have to share this. M.Z., Amsterdam. Spain, Photograph sent by G.L., Barcelona, who explains: “The star rises in the sky at about 11pm from the east-southeast and seen from the north moves west, rising in altitude. It moves quite quickly. This photo was taken in Vilassar de Mar, in Barcelona province, Spain … camcorder footage shows ‘pulsations’, changes of size and flashing of the star when the zoom was fixed in the same position.” U.K., Taken in Hullbridge, Essex, by C.E. at 3.30am on 17 July 2009. Updated 11 September 2009 France, Photograph taken by J-C. L. on 23 April 2009, at home in Rittershoffen, Alsace. China, Beijing . Photographs taken 20 minutes apart in February 2009, sent by T.W. Photo 2, please see left, sent by T.W. England, Slough, 2 June 2009. Sent by P.C. New Zealand: Taken by W.C.P. on 17 February 2009 in the upper North Island, New Zealand. Norway: Taken by M.F. in Oslo, Norway, on 9 February 2009 at 6pm. USA: Taken by J.C. in Orlando, Florida, USA, on 7 February 2009 at 7.30pm. Japan: Taken in Sakura city, Chiba-ken, Japan, between 7.43 pm and 7.53pm on 2 March 2009. During this short time it was changing colour and sinking gradually. (1/2) Please see left, 2/2. Please see right, 1/3 Please see below, 2/3. Japan: Taken by M.H. in Komaki-shi, Aichi-ken, Japan, on 31 January 2009. Japan: Taken by M.N. on 12 March 2009 at 16.40 in Kotoh-ku, Tokyo, Japan. In a series of three photographs the star moved quickly from the right to the left and above the sun, in just over one minute. (3/3) UK: Taken by C.E. in Hullbridge, Essex, UK, on 11 March 2009. UK: Please see left. UK: Taken by T.W. on 10 March 2009 around 7.15 pm in Crewe, Cheshire, UK. Holland: Taken by R.A.S. in Deventer, Holland, at 8.50pm on 8 March 2009. Egypt: Taken by A.K. from a cruise ship at Alexandria, Egypt, on 2 February 2009. Germany: T.W. took this from his apartment window at 6pm on 27 February 2009 in Berlin, Germany. Japan: Taken by S.K. in Oiso, Kanagawa, on 2 March 2009, around noon. France: Taken by V.M. on 11 February 2009 in Normandy, near Caen. The Netherlands: Taken in Venlo-Blerick, Limburg, by A.W. at 7.20pm on 3 March 2009. Switzerland: Swiss local newspapers Ticino News and Corriere del Tucino reported a mystery ‘UFO’ seen over Cornaredo, Lugano, on 25 February 2009 at 9.15pm. It was described as “a luminous red colour sphere”. The Swiss Italian Centre of Ufology (CUSI) received many videos, photographs and reports of the sighting, which was confirmed to be the star. S.L. took and sent this photograph. Germany: Two photographs taken in Tübingen by G.P. on 28 February 2009 at 7.20pm. Germany: Please, see note on left Canada: Taken in Mochelle, Nova Scotia, by L.MG. on 8 February 2009 Germany: Taken on 5 February 2009 around 8pm on the outskirts of Nürnberg by H.A., using a Panasonic TZ5 with maximum enlargement. USA: Taken by D.E.M. on 8 February 2009 in the Southwest Corridor Park, South End, Boston, USA. USA: Taken also by D.E.M. on 8 February 2009 in the Southwest Corridor Park, South End, Boston, USA. Spain: Taken between 21 and 28 January 2009 in Montras village, Cataluña, by J.L.M. France: Taken in Brumath by R.K. on 2 January 2009. D.E.M. from South End, Boston, MA, USA, sent Share International a series of photographs taken from 28 December 2008 to 26 January 2009. Taken also by D.E.M. at dusk, around 5.15pm, 26 January 2009, in the Southwest Corridor Park, South End, Boston, MA. Oslo, Norway M.F. sent Share International this photograph of the star taken in Oslo, Norway, on 27 January 2009 at 8 pm. Langley, Berkshire, UK 3 February 2009. Sent by P.C., who writes: "The bright star has appeared again…. The colours change in each picture, green, pink, yellow and white. Marvellous!!" France: Taken in Bruges by R.K. on 27 December 2008. Japan: Taken by M.S. at the bank of Kiso river in Inuyama-shi around 11.40am on 8 February 2009. Please see letter to editor for further details on this photograph. France: Taken in Etampes by R.M. on 15 February 2009. France: Also taken in Etampes by R.M. on 15 February 2009. Germany: Taken in Munich by M.H. on 15 February 2009. Germany: Taken in Munich also by M.H. on 15 February 2009. Belgium: Taken in Ath on 18 January 2009 at around 6.30pm. Please note: these images can be clicked for a larger view of the photograph. More are received weekly so this page is being updated frequently. The newest addition will be first in each listing. Newspaper & media reports Added 11 November 2009 A ‘mysterious luminary object in the summer sky’ was recently reported on nationwide Japanese television station. On 17 July 2009, Japanese Fuji Television during its evening Super News programme reported the story of a bright, moving, star-like object and showed a video taken by a viewer, Mr Tokumitu Yanagisawa. The witness Mrs Yanagisawa said that she and her husband saw from their window a ‘mysterious luminary object’ in the western sky above the trees. ‘It was emitting light, shining brightly, changing colours, green, yellow, red and so on. It was moving vertically, up and down, while spinning.’ (Benjamin Creme’s Master confirms the ‘mysterious luminous object’ was the ‘star’.) Heavenly herald As we go to press, reports are coming in of a large, very bright “fireball”, a “shining bullet”, or a “glowing heavenly body” as German media described it. The object was seen in the early evening of 13 October in clear skies above Germany, the Netherlands and Belgium. Over the Netherlands there are reports that the object broke the sound barrier with the accompanying sonic boom. (Source: Zeit-online, Bild.de, NDR Online, Germany; de Volkskrant, the Netherlands) (Benjamin Creme’s Master confirms that the “heavenly body” is the ‘star’ heralding Maitreya’s first interview.) Previous additions The ‘star’ reported on television RCN Colombia News, Colombia Boca Raton, Florida, USA, 6 July 2009. According to one witness: “ There was a green light in the sky, but it was too close to be a star. It was moving side-to-side and hovering, like nothing I have ever seen before … it was a green glowing diamond shaped object, about 100 feet above us, floating”. WPTV, a local television station, reported the story and showed a video. ( YouTube Television news channel RCN Colombia reported an incident which took place on 15 April 2009 in Pereira, capital city of the state of Risarald. Announcing that a “journalist films a UFO in Pereira, the spaceship flew over several buildings”, it told how television journalist Liliana López saw a gigantic, bright light in the sky from her eighth-floor balcony at 9.20pm. She captured the diamond-shaped object on her video camera and reported that it emitted a multi-coloured light. It drifted across the sky for several minutes and then mysteriously disappeared. UFO experts are investigating the extraordinary footage. López recalls: “ I saw a very big, resplendent light in the sky, certainly not normal at all. It was easy to see it was not a star or a plane and taking advantage of the fact that I had a video camera with good resolution I tried to get some close-up footage. You can see quite clearly what a strange object it is. There is a moment when it’s already going away – it starts turning around, around, around, around and then finally moves away – it’s perfectly evident that it’s a [space]ship”. (Source: RCN Colombia; YouTube) Sky Television, UK On 22 March 2009 Sky Television News interviewed thirteen-year-old Harriet Rogers who filmed what she thought was a UFO hovering above Shrewsbury, England. On 21 February 2009, after a call from her grandmother about a bright light in the sky, Harriet and her father went upstairs to have a look and saw a brilliant ball of light pulsing and changing colours. Harriet explained: “To the human eye, it just looked like a bright light but, on the video camera we could see it pulsing, then suddenly changing colours. They decided to go out and follow the light to try to get a bit closer and they started to notice it was going down beyond the horizon. She added: “This is when you could see with your own eyes that it was pulsing and changing colours. We stopped in a lay-by and rested the camcorder on a gatepost where we got the best shots. We could see how it was getting much brighter than before.” Asked by a Sky reporter if she thought it was a UFO Harriet said: “Yes. It’s come back, it’s definitely come back, literally every starry night.” There have been many unexplained lights in the sky reported over Shropshire recently. The Shropshire Star newspaper reported: “There have been up to 30 sightings of mysterious light objects logged by UFO experts in the last two months [February and March 2009] with at least eight recorded in the last fortnight.” (Source: Sky News; The Shropshire UK) The Sun, UK On 16 February 2009 The Sun newspaper included a report from Scott Shepperd of a bright light or “craft” spotted over Colchester, Essex. A video of his sighting was placed on the newspaper’s website. Shepperd had been to the cinema with a friend before he captured the dazzling light in the sky. He said: “As I was about to get in the car to go home, a golden ball of light no higher than 100ft above me caught my attention. I said to my mate to look, he ignored me and said its probably just a plane. I asked him to check anyway and, just as he did, it started moving over the top of us. It was very bright orange and moved very quietly: it had no flashing light which made me question if it was a plane. Quick as I could, I got out my mobile phone to video it but by the time I had got it out and set it up it had moved pretty far away." (Source: The Sun, UK) Chester Chronicle, UK “Orange UFO spotted above Chester skies” is the headline in the Chester Chronicle on 30 April 2009. Marty Wilbur was standing on his balcony using his mobile phone when he saw a “pulsating orange light” rising up in front of him at 9.02 pm on 26 April 2009. He filmed the mysterious orange glow as it tracked northwards and disappeared. “I could see this orange ball rising up, at a 90-degree angle, straight up, then it just sat there, sat still for a few seconds. To my amazement it started moving sideways. Right away I recognized it wasn’t something normal that I had ever seen before. There was no sound at all. All you can hear are birds chirping on the video.” (Source: chesterchronicle.co.uk) Gazeta Alerta, Brazil On 8 February 2009, during the live television programme Gazeta Alerta in Rio Branco City, Brazil, the film crew spotted an object in the sky changing colour from white, to red, to blue. The live coverage continued as they filmed the object for more than two hours, with more than 25 people witnessing the event. The object moved from east to south and then from south to west. (Source: YouTube) Milliyet Kemer News, Turkey On 25 April 2009 at 3.30am a group of security guards outside a hotel in the coastal town of Kemer, Turkey, saw an unusual object hovering over the ocean and photographed it. Security guard Erman Bulut was at the front of the hotel when he saw the hexagonal object doing impossible manoeuvres above the sea and changing shape and colour. He recalls: “At first I couldn’t understand what I was witnessing. I saw this large object rising from the sea. It definitely wasn’t a plane or balloon. It was leaving a trail and it was glowing. My hands were shaking from the excitement. As it descended towards the sea I ran to the beach but then it began to rapidly rise eventually merging with the stars. It was hexagonal, orange and fluorescent. As far as I am concerned it was definitely a UFO. One does not get the chance to see such things often and I feel lucky to have witnessed this. When one takes into account the size of the universe and the number of stars, UFOs and aliens become a certainty.” Erman's co-workers Mehemet Aydin and Sezgin Cesur also saw the object and described it. “It was hexagonal but at times it's shape changed. It descended and then rose, disappearing into the sky. “I didn't sleep all night from excitement” concluded Mr Cesur. (Source: Milliyet Kemer News, Turkey) All News Web According to All News Web, formations of UFOs have been seen above cities throughout the world in the first few months of 2009. In China, reports the website, a UFO was filmed by a Beijing tourist on 18 February 2009 in Kashgar in Xinjiang Uyghur Autonomous region along the ancient Silk Road. “Me and my father were walking through a park near the Science and Technology Complex returning to our hotel when I noticed a very bright and clear object in the sky that appeared too close and too bright to be a star,” said Lee Kwan Hing. “I used a Panasonic High Definition camcorder to take the film. As I zoomed in on the object I noticed that it had the form of a yo-yo and I could make out geometric patterns on the object. Is it a UFO, a satellite or a star?” he asks. “Perhaps an All News Web reader can help Hing solve this mystery,” suggests Michael Cohen of All News Web. (Source: allnewsweb.com) Cuatro TV, Spain The ‘star’ seen over Los Arenales, Cordoba, Spain Spanish television reports on the ‘star’ On 5 April 2009 the popular programme Cuarto Milenio (Fourth Millennium) on Spanish television channel Cuatro, reported on the ‘star’ sign. Footage was shown of a film taken in Los Arenales, Cordoba province, by ecologist Bartolome Olivares who had been walking in the mountains when he saw a big, orange light on the horizon. Journalist Iker Jimenez told the viewers: “Important. Please pay attention to this, my friends who are watchful, looking at the skies. In the last days of March we have received many sightings, videos and photos. What is happening? Let’s look at this – a kind of orange object, circular, spherical, that comes close and moves away, that seems to pulsate.” (Source: Cuatro TV, Spain) (Benjamin Creme’s Master confirms the report to be an authentic sighting of the ‘star’.) Times of Malta, Malta “What’s that mysterious light in the night sky?” asked the Times of Malta on 23 March 2009. “For more than a month, a bright light in the sky has been astounding those who see it, making them wonder what it is,” says Times reporter, Cynthia Busuttil. “Almost every evening, soon after sunset, the bright light appears over the Floriana church, moving to Lija and then onto Ta’ Qali. An hour later, it just disappears into thin air…. But what is this light? A star, a planet ... or an unidentified flying object? And does this sighting have the potential of turning Malta into the Mediterranean’s Roswell? According to eyewitnesses, the light is brighter than anything else in the sky and appears to hover lower than passing planes.” The Astronomical Society of Malta, however, blamed atmospheric turbulence when Venus is low in the sky, which can cause it to change colour dramatically. But noted one observant commentator: “At first I thought that it is something about Venus or Saturn … but soon after I realised that at times the light shines even though it’s cloudy.” (Source: timesofmalta.com) (Benjamin Creme’s Master confirms the report to be an authentic sighting of the ‘star’.) Fremover, Narvik, Norway Two photographs taken by Fritz Hansen for Norwegian newspaper Fremover in Narvik, published on 4 March 2009. Photo: Fritz Hansen, Fremover Photo: Fritz Hansen, Fremover Brønnøysunds Avis, Norway Brønnøysunds Avis newspaper, in northern Norway, published an article asking: “What is it that lights up the sky above the church?” It reported that on the evening of Sunday 18 January several people witnessed a ball-shaped object above a church called Sømna. A report and photograph of the same sighting was also featured in Norwegian newspaper Harstad Tidende. Photo: Viktor Stein, Brønnøysunds Avis Bergens Tidende, Norway A bright object seen in the skies above Norway was featured in an article entitled 'Venus causes a stir', in the Norwegian newspaper, Bergens Tidende, 30 January 2009. The scientist who was interviewed said it was Venus, but Benjamin Creme’s Master confirms that it is the star. Photo: Fred Ivar Utsi Kelmetsen, Bergens Tidende Photographs of the star from YouTube videos YouTube Named “the Fiery Sphere”, Moscow, Russia, 6.17am, 29 August 2009 (You Tube: olegen77) Updated 10 November 2009 Halifax, Nova Scotia, 13 August 2009. “This might be a star, however it rose very fast in comparison to the stars I have seen…. My initial thought it might be the star, (UFO SHIP) mentioned by Benjamin Creme of Share International…. This footage was taken 5.42am start 5.52am end… The object started at 90 degrees and ended up 10 minutes later at 145 degrees. This is actual footage as it rose, and has not been manipulated.” (YouTube: soulplayorb) Italy, 8 July 2009 (YouTube: FaberBarber) USA, 13 July 2009, 5.00am.”I woke up and went to the window to find this bright white light blinking on and off (almost dismissed it as a helicopter) until it started dimming and then brightening again, eventually stopping, resting at its brightest.” (YouTube: ASEYEIS) “Ufo spotted in Southall, London, UK [22.8.09] …. multiple Ufos nearby. At one point in the film it seems to be ejecting another ufo from itself. I don’t know what this is? I wanna know what’s going on, and wanna know right now!” (YouTube: jrajput) The ‘star’ over Quebec, Canada, July 2009 (YouTube: UFOFootageArchive) Finland, 22 August 2009 (TouTube: sismaria37) Moscow, Russia, 31 March 2009 (YouTube: insideruk) California, USA, 26 January 2009: “On 26 January around 8pm … It was a starry night and my boyfriend began looking at this so-called star (disc-like shape) that started spinning and turning weird colors. He ran in the house and got his digital camera. Took a video of this surprising star that was very entertaining. Spinning up and down and side to side and turning colors. Then it disappeared. Just dropped out of the sky. Anyone know what this is?” (Source: YouTube: ledz4cars) Moscow, Russia, 7 October 2009 (Source: YouTube: olegen77) Montreal, Quebec, Canada, 3 February 2009. (YouTube) Whinmoor, Leeds, UK, April 2009 (YouTube: columbiantony) Brentwood, California, USA, 11 October 2009: “I’d heard from my friends that there was a UFO that would appear over my cousin’s house at night, but I finally got to witness what they were talking about. The brightness along with the rapidly pulsating various colors just boggles my mind!” (Source: YouTube: caliskate04) Northern Kentucky, USA, 6 June 2009: “At first glance, it looked like an abnormally large star, but very bright. When you actually looked close you could see some kind of pulsating lights on the top of it. Like a strobe light with red blue and green flashes,” says the witness. (YouTube: TriangleinTheSky) Updated 23 September 2009 U.K., All four ‘stars’ seen over Leyland, Lancashire, on 7 February 2009, filmed by M.G. He reports seeing: “4 extremely bright UFOs approaching and going over the houses in my street. They were at an low altitude and flying in a staggered formation under definite intelligent control and definitely not Chinese lanterns”. (YouTube: ufohomebase) (See letter by D.D. in Share International, July/August 2009, who also saw all four ‘stars’ together.) Slough, UK, 9 August 2009 (YouTube: paulchi69) On 2 July 2009 at 8.30pm thousands of people in Chengdu witnessed a UFO and according to the government news agency Xinhua, ran out, even in pyjamas, to see the craft, which was described as being a luminous blue that changed to red from time to time. Zhang Yang, head of the Chengdu Buddhist Association, pronounced it a “Heavenly Body” and said it could not have been a Chinese lantern, weather balloon or kite. “There seems to be a mass of UFO sightings all over China at the moment,” according to disclose.tv, which reported that the same UFO had stunned thousands of residents of Xi’an city the night before, resulting in jammed news hot lines. (Source: allnewsweb.com; YouTube) Italy,Two of the four ‘star-like luminaries’ seen together, June 2009. (YouTube: daisenpuQustom) Germany, Four stills from a video of Maitreya’s ‘star’ over Berlin, 5 August 2009, taken a few seconds apart and showing the constantly changing colours. (YouTube: Danicanto1) Updated 11 September 2009 Please note: these images can be clicked for a separate view of the photograph. More are received weekly so this page is being updated frequently. The newest addition will be first in each listing. Please note: these YouTube video photo captures are also linked to their larger source photo. Please click on the YouTube user name to see the original video instead. W.P. from Hamilton, New Zealand, said: “Some of the footage is quite long but none of it is zoomed while shooting (ie it is shot at the same zoom setting). Watch how the size changes and how it pulsates periodically, and for the colour shift. It seems to just appear in the sky around 3.30am then stays until the sun gets too bright.” (YouTube: Sophia4Peace) “Not sure what the white thing is but if anyone has any idea, please let us know. Until then we are considering it a UFO … It’s unidentified and its hovering. At the beginning of the video it’s clearly way up over the building’s roof. When we turned the cam back toward it, it had dropped a bit and was much closer to the roof top.” (YouTube: Fire24Ice13) “At about 9pm I spotted an orange glowing object in my back yard. I took these pictures. The object made no sound and seemed to hover for a long time in one place, then it rapidly ascended into the sky.” (YouTube: brollar) USA: Massachusetts, 15 December 2008 (YouTube: UFOFootageArchive) Russia: Moscow, 12 May 2009 (YouTube: olegen77) LEFT: Footage taken on 17 March 2009 from the international space station NASA mission STS-119, shows a large, luminous object near the craft. Benjamin Creme’s Master confirms that the object was the ‘star’. (Source: YouTube) UK: Edinburgh, Scotland, 10 February UK: These photographs have all been taken from a YouTube video called “the star last night”. Shot on 5 March 2009 in the UK, between 7.45 to 8.15pm, the film shows the ‘star’ changing colour repeatedly. (YouTube: kiuhy7) “We have been seeing this object for the past two weeks (March 2009). It usually appears between 7 to 9pm and was filmed NW over the Catskill Mountains. If you listen carefully, in the video you will hear me say I am not using the zoom button, and at that time, it morphs itself. Quite spectacular to see.” (YouTube: PolarEight) Ukraine: Filmed in Senelnikovo, in the Dnepropetrovsk region of Ukraine, in February 2009. (YouTube: remanuelli) Japan: The star over Nishi Tokyo City England:Filmed in Newcastle upon Tyne, England, in January 2009. (YouTube: hopicondor) Israel: Tel Aviv, February 2009. Two photographs of the Star changing colour within a minute. (YouTube) Israel: Tel Aviv photograph two, please see left. UK:London, UK, 31 December 2008 (YouTube) UK: Twickenham, London, UK, January 2009: “Another film of the star thing seen over Twickenham. On the camera playback it’s quite spectacular with brilliant colours. It was filmed at 22x power with the camera held steady. Anyone know what it is?” (YouTube: edotoole) Holland: 26 December 2008 (YouTube) UK:London, 31 December 2008: “Unusual glowing blob spotted in the sky over London. It slowly moved towards us and then disappeared – weird!” (YouTube: paulsmythe) USA: New Jersey 4 March 2009 USA:Ohio, 22 January 2009: “Was recorded in Southern Ohio. More signs from the Heavens. Looks like Jesus is coming sooner than we think.” (YouTube: andrewk181) USA: Ozarks, Arkansas 3 March 2009 USA: Lexington, Kentucky 4 March 2009 USA: Phoenix, Arizona 22 February 2009 USA: Albuquerque, New Mexico February 2009 USA: San Antonio, Texas 20 February 2009 Italy: Palermo 21 February 2009 Italy: Venice 15 February 2009 USA: Cleveland, Ohio 16 February 2009 USA: Miami, Florida 14 February 2009 Mexico: 14 February 2009 USA: Atlanta, Georgia 10 February 2009 Italy: Lombardy 6 February 2009 Greece, 3-4 February 2009 South Korea, 31 January 2009 in daylight. G.D. says: "We are videotaping what – we don't know exactly – so it’s classified as a UFO. Anyway, what we have so far is that it keeps flickering but it’s not going away. All the stars in the sky are gone and this is the only other light that is left other than the moon." Galway, Ireland, 1 February 2009. Photograph taken through a window. Colorado, USA, 20 January 2009 Lancashire, UK, 18 January 2009 Ontario, Canada, 20 January 2009 Rosario, Argentina, 30 January 2009 Zürich, Switzerland, 4 January 2009 Pasadena, California, USA, 8 January 2009 Miami, Florida, USA, 11 January 2009 Karachi, Pakistan, 11 January 2009 Greece, 26 January 2009 Manhattan, New York, USA, 22 January 2009 Close-up of the star over New York, USA, 22 January 2009 Stockton, California, USA, posted on 18 January 2009 Costa Rica, 3 January 2009 Montreal, Quebec, Canada, 3 February 2009 Wyoming, USA, 4 February 2009 Letters sent to Share International Please find below letters sent to Share International and additional photographs from around the world confirmed by Benjamin Creme's Master to be the star sign. Please click on any of the photographs to view the original. Added 11 November 2009 Dear Editor, When I was back in Austria during the summer [2009] I always sat on my terrace and regularly saw very bright stars. Sometimes only one, and sometimes two at the same time, and they were moving around quite fast. I was sure that either they were the ‘stars’ Share International reported or spaceships. I was very moved by the sight and started to pray. Please can you confirm if I saw the ‘star’ or spaceships or both? R.I., Rankweil, Vorarlberg, Austria. (Benjamin Creme’s Master confirms the sightings were of two of the four ‘stars’. The ‘star’ is, of course, a spaceship.) Dear Editor, On the night of 26/27 September 2009 just after midnight some of the participants of the Transmission Meditation Conference in the Netherlands were outside on the terrace at the back of the main building of Rolduc looking at a star in the sky that behaved in such a way that it could be the ‘star’. Suddenly we saw a flash of light across the sky and we all cried out: “Wow, a shooting star!” Once home I was not so sure it was a shooting star. The flash was spectacular and of an extremely beautiful golden-yellow-reddish colour. The star was east to northeast. (1) Was it the ‘star’ we were watching? (2) Did we see a shooting star or a flash of light connected with the ‘star’ or a UFO? M.L., The Netherlands. (Benjamin Creme’s Master confirms that (1) it was the ‘star’, and (2) it was a shooting star.) Dear Editor, Every day around 9pm from my living room I see many planes going to and from Amsterdam-Schiphol airport. On the evening of 26 September 2009 I also saw a very special star. It was a beautiful orange colour and was as big as the moon or the sun and had small pointed ends from where sparks emitted. Full of admiration I followed this impressive, magnificent star and watched it until it became smaller and disappeared to a dot. This ‘star’ went from west to east. It lasted all in all about three minutes. It made a profound impression on me and I felt tinglings and goose bumps all over. Was this the ‘star’ that heralds the emergence of Maitreya, the World Teacher? J.B., De Goorn, The Netherlands. (Benjamin Creme’s Master confirms it was the ‘star’.) Dear Editor, On Tuesday 4 August 2009 the moon had a star alongside its left. Then, two nights later, on the right-hand side. Was this the ‘star’ or was this the satellite I heard had just been launched on 4 and 6 August? J.J., Hemel Hempstead, Hertfordshire, UK. (Benjamin Creme’s Master confirms it was the ‘star’.) Dear Editor, I have seen beautiful stars several times but sometimes I believe they are not stars but UFOs. One in particular caught my attention on the morning of 1 August 2009 at 5.30 am in Madison, Virginia, in the United States. In reality there were two stars, they say one of them is Venus (I have my doubts about it), the other one on the other side of the sky looked like an identical twin. I saw another one in front of my window in January 2009, it was different since it had many colours and there were two more on the other side of the sky. I would like to know if I have seen Maitreya’s ‘star’. A.A., Groveland, Florida, United States. (Benjamin Creme’s Master confirms that the sighting on 1 August was the ‘star’ alongside a spacecraft. The January sighting was also the ‘star’.) Dear Editor, (1) On the night of 9 August 2009, I saw a strange object in the sky. It looked like a little star, but it was moving slowly, similar to the speed of an airplane. It was strange, because the object emitted little light, but twice it began to brighten with a very strong light. For some time here in São Paulo we have seen a very bright star in the east. It looks like Venus, but I think this planet should not be appearing in the sky this time of the year. Was it the ‘star’? (2) On the night of 16 August 2009 I was observing the sky when I saw a red light going upwards in the far distance. It had a particular brightness and for some time it moved up in the sky, and then began to go towards the east, and after that to the north. Was this the ‘star’ of Maitreya or a UFO? (3) On that same night, I saw another strange object in the sky. It was big and had some lights on it, similar to those of a plane (they were red and blue), but the form was different from a plane, and the strangest thing was that it was moving but didn’t make any noise. It just moved across the sky from east to north, at a low altitude. What was it? (4)Also on 16 August 2009, late in the night, I saw another strange object in the sky. This time, the oval object was bigger and it changed direction when it moved. Was this another sign of the Space Brothers? T.S.A., São Paulo, Brazil. (Benjamin Creme’s Master confirms (1) It was the ‘star’. (2) It was Maitreya’s own Lightship. (3) It was a spacecraft. (4) Yes.) Dear Editor, One evening I was reading The Emergence newspaper about the ‘star’ and found it really interesting so I went onto the website to have a look at the photos from all over the world. That evening between 9.30-10pm, I was walking down the stairs to my car when I saw this really bright star shining. It kept changing colours from red to green in the western sky. It made me stop in my path and I sat on the stairs for a while thinking it was a plane but it wasn’t moving. I kept looking out the window for it for a few days but didn’t see anything. Then a week or so later when driving home from work I saw it again but this time, northwest and left of One Tree Hill, flickering red and green, between 5-6.30pm. Another time while driving, I saw a flickering red and green star in the southwest between 5-7pm. Could you tell me whether these were the ‘star’ or a plane or another planet? J.T., Aukland, New Zealand. (Benjamin Creme’s Master confirms that each time it was the ‘star’) Dear Editor, On 4 August 2009, during the closing minutes of the evening programme on Radio 10 AM 710, Buenos Aires, Argentina, someone raised the issue about a sighting of a strange light in the sky. Several listeners called confirming that they too had seen it. Was this light the ‘star’ heralding Maitreya’s emergence? S. M., Buenos Aires, Argentina. (Benjamin Creme’s Master confirms that the light was the ‘star’) Dear Editor, On Thursday 16 July 2009 at 11.30pm I was looking up at the sky around my house and noticed a very bright twinkly star low in the sky. In my mind I asked the star: “If you move a tiny bit I will be more certain that you are really that star-like luminary body”. To my great surprise the star started to move very quickly from the south-west to the east, from the front to the back yard of my house. To my even greater amazement the star – looking brighter and bigger – turned back to the front at a high speed and disappeared behind the clouds. There was no noise or jetstream as with a plane. This event took a few minutes. Was it a spacecraft? K. J., Schoten, Belgium. (Benjamin Creme’s Master confirms it was the ‘star’.) Dear Editor, On Sunday 30 August 2009in La Grande Motte sur Mer, south of France, between 9.30pm and 10.30pm we saw what looked like the ‘star’ above the sea to the right of the moon in a south-westerly direction. Between 11.15pm and 1.15am the star was to be seen left of the moon in a south-easterly direction. It pulsated really clearly, moved and changed colour (all sorts of colours, in fact). Was this the ‘star’? M.V., The Netherlands. (Benjamin Creme’s Master confirms it was the ‘star’.) Dear Editor, I have been following your website for 12 years now and I value it tremendously. Sometimes we hear something that speaks from the heart and our souls know it is the truth. That’s how I feel about the coming of Maitreya and the information you put out. So thank you! There is a question I would like to ask. Around 4am on 4 July 2009 in Delaware, USA, I thought I saw the ‘star’. It was the only star up in the sky and it was extremely bright and appeared to be larger than normal. When I looked through binoculars it appeared to be a lot of white circles and the whole thing moved on its side and then on its back and then it kept changing. (But I did not see colours, just white circled lights.) Was this a UFO? B. O., Wilmington, Delaware, USA. (Benjamin Creme’s Master confirms it was the ‘star’.) Dear Editor, On 24 June 2009 after Transmission Meditation I was cycling home. It was all cloudy. When I went over the Stone Bridge I noticed a big, bright star below the clouds, moving slowly from north to south. It pulsated and looked like a fireball. The whole thing lasted about five minutes. When I arrived home I telephoned a group member living in Berlin and told him what I had seen. Five minutes later he phoned back and told me that right after our talk he went on his balcony with his wife and son and they all noticed the same thing in the sky: a bright star, moving, and looking like a fireball. Was it the ‘star’? J.A., Regensburg, Germany. (Benjamin Creme’s Master confirms it was the ‘star’.) Dear Editor, On Saturday 20 June 2009 a friend and I left the Art Cinema in Hilversum, the Netherlands, around 11.30pm and drove along the motorway towards Blaricum when we saw a very strange spectacle in the sky in the direction of Almere: on the left in the sky we saw a very bright star and to its right a kind of ‘cloud’ of at least 15, but maybe even 20, lights. After we left the highway we stopped the car, but then we only saw the bright star that was moving away from us, slowly, and eventually disappeared. We both thought it could be a UFO mothership surrounded by a number of UFOs. We are very interested to know what we saw? E. B., the Netherlands. (Benjamin Creme’s Master confirms that the “bright star” was indeed the ‘star’. The other objects were spacecraft from the planet Mars.) Dear Editor, It was 28 July 2009, at 12.19am, that I saw a star from my home in Maastricht, the Netherlands, that made me wonder; it was south-south-east of Maastricht. And at 4.48am there was another star in the east over Margraten, but this ‘star’ was higher up in the sky. (1) The star at 12.19am was spherical with a clear diameter and an enormous luminosity. (2) The star of 4.48am looked kind of butterfly-like. It was shaped like a triangle with indentations of light in it, that made me think of a butterfly, and the points sparkled brightly. (3) I saw also a star at 12.19am on the west side. It was smaller in diameter and was sparkling less brightly than the ones I described above, but was still remarkable compared to the other visible luminaries. Did I see the ‘star’? M. J., the Netherlands. (Benjamin Creme’s Master confirms that (1) and (2) were sightings of the ‘star’; (3) was a spacecraft from Venus.) Dear Editor, On 27 July 2009, my girlfriend and I were again looking at the sky at the three stars which are always there, always shining, always first to appear at the evening sky and shining more than all the other stars – one directly above, one to the south-west, and one to the south, just above the horizon. This last one is constantly changing colour to red, so everyone can see it. Yesterday, my girlfriend was sitting outside, looking at the star right above and searching to see if the fourth star would appear. This fourth star is a bit tricky, because it is always on the move. As strange as it sounds, this is what happened: she called for me to come outside, and we sat there, looking together. Out of nowhere, this fourth star appeared, travelling across the sky, in a northerly direction. It didn’t travel from the opposite direction (from the south), it just appeared in the centre of the sky, travelling north. We saw the star and wondered if this was the ‘star’, because it was shining the same as all the other stars. I myself was thinking if that is all, then its nothing special. My girlfriend was thinking: “Get bigger, and brighter.” Then suddenly, the star blinked, just like a lighthouse at the sea at night. We were stunned, we just couldn’t believe it, but the star, as if hearing our thoughts, blinked again, and again, and again, five times in a row. What is really interesting is this wasn’t a one-off event. We had seen it before. We usually walk the dog every evening around 8pm, and I go running every second day for an hour. I saw this fourth star for the first time when I was running – it was travelling from west to the east, in the northern part of the sky. The next time we saw it together, it was travelling in the same direction, but just above. The third time my girlfriend saw it, again travelling across the sky. On the fourth time, we went for a walk with the dog, as usual. All the time I somehow knew that we would see it again. We were walking for an hour and we were almost back at home, so I thought to myself, better luck next time. But despite this, I looked again at the star shining just above, thinking to myself: “Light up, Light up! Light up!” And then it appeared out of nowhere, in the vicinity of this star just above. My girlfriend started shouting and then it blinked. As I had wished. It was there for 5 seconds and then it was gone. Are these the four stars? M. Z., Majsperk, Slovenia. (Benjamin Creme’s Master confirms, yes they were the four ‘stars’.) Added 23.9.2009 Dear Editor, A few nights ago I noticed an incredibly bright object hovering in the sky, not far from the moon. It didn’t dawn on me until later that I might be witnessing the ‘star’. For the past three nights, I have seen the same object in the sky, and I have taken pictures and filmed it. After reviewing my photos, I realize now that the object has moved a fair amount since the first time I saw it. Interestingly, about a week ago, I heard that a friend had ‘called the star’ and had then seen it. So, with my mind I politely invited the ‘star’ to visit. Is it the ‘star’ that I’m seeing? E.G., Cotati, California, USA. (Benjamin Creme’s Master confirms that it was the ‘star’.) Dear Editor, As we left the cinema in Breda at 0.30 on Sunday morning 9 August 2009, we walked in a north-westerly direction. At that moment we saw a bright shining star in the far distance. That night it was perfectly clear. The other stars were very bright, but they were not flickering. This pulsating star changed colours rapidly. We saw it turning from red to green, purple, blue and white. The rhythm of pulsation also changed. Sometimes it pulsated, the next minute not that much and then suddenly again it flashed. It also moved slowly away from us. At first it was quite a big star but at around 1.10 it was nothing more than a pulsating point in the far distance. Was this just an ordinary star flickering due to atmospheric pollution or was it the star heralding the public emergence of Maitreya the World Teacher? M.V., Breda, The Netherlands. (Benjamin Creme’s Master confirms that it was ‘the star’ heralding Maitreya’s emergence) Dear Editor, During a recent trip to Italy, at the Pedra e Cupa campsite in Budoni, Sardinia, at 5am on Saturday 4 July a bright star was clearly seen in the western region of the sky and was the only star visible in the sky at this time. Was it the ‘star’? A.S. and C.P., Edinburgh, Scotland. (Benjamin Creme’s Master confirms it was the ‘star’.) Dear Editor, I live in Wemb, a German village near the Dutch border. In the early morning hours of 7 August 2009 at about 5 am I opened a skylight in my bedroom and saw a single big, bright yellow star in an easterly direction, and wondered if it could be the ‘star’. After a while, it began to move up and down and sideways. I was completely stunned and overwhelmed. Inwardly I repeatedly asked the star to move again, which it did, but not immediately. I have no camera but with my binoculars I saw a fuzzy round shape with glittering points. There is an airport close by, but it definitively was no plane or ordinary star. I observed the star for about an hour, then it became smaller, but was still moving. Did I really see ‘the star’ or was it just my imagination? H.H., Wemb, Germany. (Benjamin Creme’s Master confirms it was the ‘star’ heralding Maitreya’s emergence.) Dear Editor, On the morning of 10 July 2009, between 3.30 and 4am, I happened to look out of my bedroom window, and saw a huge star shining brilliantly in the dawn light. The star must have been about six times as large as an ‘average’ star. I was so amazed that I called a friend to witness the phenomenon. Was this the ‘star’ or was it actually Venus? A.L., Goudhurst, Kent, UK. (Benjamin Creme’s Master confirms that it was the ‘star’) Dear Editor, On 2 May 2009, in the small hours, I saw a shining object very high in the sky. It was the only object shining in the sky, all the stars having disappeared. It was white coloured and round like a ball. At a certain point, its luminosity decreased as if to disappear and then it regained its size and brilliance. Then clouds obscured my view, but once the clouds had dissipated, I saw the object had disappeared, but after a while, I saw it again in another place, lower in the sky, and then it disappeared again in the clouds. Was this a UFO or the ‘star’ announcing the arrival of Maitreya? A.Y., Abidjan, Ivory Coast, West Africa. (Benjamin Creme’s Master confirms that it was the ‘star’.) Dear Editor, Myself and a workmate were travelling to Mackay in Queensland, Australia, and as the sun was coming up on a long road miles from nowhere we saw what looked exactly like the ‘star’ in Share International so we pulled over and viewed it with a cheap telescope we had in the vehicle. That star thing can move from one end of the sky to the other in a blink of an eye, it’s amazing. Also, in my mind it has no real or definite size; it’s all very abstract to the usual way we think of things. It challenged me; in fact it sent me a little nutty for a while. It looks as if it cools off or something and it turns an earthy-red clay-type colour and the fiery-looking interior of it settles. As the sunlight moved in, it disappeared. It’s crazy – absolutely mind blowing to see it as we did. A.S., Brisbane, Australia. (Benjamin Creme’s Master confirms it was the ‘star’.) Dear Editor, Last week I was awakened at 4am and needed to go out to my car to retrieve a bite of candy for a low blood sugar episode. Over my shoulder I thought there was a really bright light, then I did not see it. After the low blood sugar was dealt with, I walked back out to have another look and lo and behold a tremendous, beautiful, sparkling, twinkling – let’s just call it a luminary because star does not quite fit – way too huge and colorful – up in the east, very high. I have been up now most nights and have begun a dawn vigil with the beautiful ‘star’. I awaken most mornings at 4.30 to go and have a look and meditate with this star – it feels like family! I often stay with it until it is high in the sky, well into the new day and still very visible! I started seeing the ‘star’ back in late December 2008 and then it suddenly was gone by the spring solstice. I sure hope this is its return? G.C., Alabama, United States. (Benjamin Creme’s Master confirms it was the ‘star’.) Q&A regarding the 'star' Added 11 November 2009 Q. Some people who have seen the ‘star’ report that they seem to experience an energy emanating from it. Does this really happen? A. Yes. The ‘star’ (all four of them) does indeed radiate energy, the quality which we would usually associate with love, which is why some people say that they actually love the ‘star’ and hold it in awe as something sacred. Q. I don’t think I have seen the ‘star’ but would like to very much. If someone strongly desires to see it, is it possible that it would show itself in response? A. Yes. Several people have reported this phenomenon. What we have to remember is that the ‘star’ is a Spaceship with people inside it and it is They who pick up the desire and respond. Q. I saw the ‘star’ on 2 March 2009, which was confirmed in Share International magazine. (1) Do sightings of the ‘star’ happen according to a person’s karma, responsibility to inform or other reason? (2) What would be the most effective way to inform people, and therefore accelerate the first interview of Maitreya and eventually the Day of Declaration? A. (1) No. Anyone can see the ‘star’. (2) Contact media with what you have seen and ask them to ask questions about this unusual phenomenon. Q. A short while ago I sent an e-mail to Share International to ask if the ‘star’ had appeared over Glasgow yet and received an e-mail from I assume Mr Creme himself whereby he stated he would try and arrange for the ‘star’ to make an appearance over my area and commented ‘jovially’ that he had very fond memories of Glasgow since of course this is his birthplace. I was absolutely delighted that he had returned my e-mail, it wasn’t expected. I was wondering if the ‘star’ has already appeared over Glasgow recently because I fear I may have missed it, as I was on holiday recently. It’s not that I am that desperate to see it, it’s just that I told my children that it would be appearing soon and I would hate to disappoint them. I wish to put no pressure on anybody, least of all those who are flying the ‘crafts’. I thank you for your patience and understanding and wish all who work for Share International well. Keep up the good work. A. Keep your eyes on the skies. Q. (1) Apart from the Observatory of Malta, are there other scientific institutions aware of the presence of the ‘star’? (2) Which is the best way of accelerating the public awareness of the ‘star’ and its significance? (3) Are any countries more aware of the ‘star’ than others? Many UFO groups detect large spaceships but are not aware of their meaning. A. (1) I cannot believe that serious workers in the world’s observatories have not seen the ‘star’ — they must have taken note of it, but not understanding its significance, they probably dismissed it. Whenever someone unacquainted with astronomy contacts such a professional body they are fobbed off with remarks like, it was probably Jupiter or Venus, or some other planet in our system. They dismiss, a priori, the possibility of finding something new, like Maitreya’s ‘star’. Ordinary people are upstaged by this response and believe the astronomers. This of course is true of media as well, who need some professional person in astronomy to admit the existence of the ‘star’. However, there was good footage of the ‘star’ on Japanese Fuji Television [17 July 2009] for 1 minute 47 seconds of the ‘star’ doing its ‘tricks’ twirling round, moving, changing colour and size. (2) a: Talk about it. b: Photograph it if possible and send the photographs to local media and/or Share International. (3) No. Q. I am confused about the connection between Maitreya and beings from other planets, e.g. the large spaceships that are appearing as the ‘star’. What is the connection between Maitreya and these Beings? Why would they be involved in His coming? A. We are all part of one unitary solar system. The public may not generally know about, or believe in, the reality of life on other planets of our system but the Hierarchies of all the planets are in contact. There is indeed a kind of Interplanetary Parliament representing all the planets. The Space Brothers are here to help the people of Earth to overcome the difficulties which our own ignorance has brought about and to work with Maitreya, and our Spiritual Hierarchy as a whole, in the work of salvage. It is a spiritual mission. Added 23 September 2009 Q. When will Maitreya first appear on television? Is it related to more people seeing the ‘star’ and/or to the further collapse of our financial systems? A. It does not entail a further collapse of our systems and it is not really related to more people seeing the ‘star’. My information is that Maitreya’s first interview is taking place very, very soon – sooner than you think possible. But obviously, if more people saw the ‘star’ and reported the sightings we could start a worldwide media debate about what the ‘stars’ are. People needn’t necessarily agree with what I believe them to be – gigantic spaceships: one from Mars, one from Jupiter, one from Venus and one from a planet whose name has not been given. They are spacecraft (not ordinary UFOs doing their ordinary work, which is extraordinary) which do this special work vis-à-vis the ‘star’. I have been told the four ‘stars’ will be in place until the Day of Declaration, in the North, South, East and West, so that wherever you are in the world your area will be covered by a ‘star’. All you have to do is keep looking for them; they don’t appear all the time. People imagine you just look up and suddenly see them. It is not that simple. They are gigantic but they do not fill the sky. They are larger than planets and stars and they move. Each ‘star’ is about the size of five football fields put together. They don’t appear all the time because they have to recharge their batteries. So they move as close to the sun as possible to recharge their batteries that way. That takes time and then they return to position and move around. That is the thing about the ‘star’ – it moves around. Sometimes, they move about if asked: when you see one you can ask it to move; they have been known to respond to human thought. In fact, we recently published a letter in Share International in which the writer saw the star and asked: “If you are the star can I see another one?” And almost immediately another appeared next to the first, and then another and the fourth. They lined up next to one another. Q. How can Maitreya emerge if the mainstream media continues to suppress reports about the ‘star’? A. If the media were to continue indefinitely to suppress reports about the ‘star’ Maitreya would just come forward. Maitreya has had these craft from our own solar system placed in position around the Earth as a sign heralding His emergence. It replicates what happened in the Middle East when Jesus was born. The Star of Bethlehem guiding the wise men was a spacecraft. This is a repetition of that event. But now there are four and they can be seen sometimes during the day and, of course, at night. They can be seen if you are assiduous and you look often. If you go out star-hunting take a camera with a good zoom. We have photographs of the star which look more like spacecraft than stars. Look at YouTube [website] and you will see dozens of videos or photographs of the ‘star’. Q. Are the ‘stars’ life forms? A. The ‘stars’ are not life forms, they are craft made on Mars, Venus, Jupiter and the other unnamed planet. Two were made on Mars which is the spacecraft ‘factory’ for our solar system; it makes about 90 per cent of all the spacecraft. They are made by thought and are not of dense physical matter. If you went to Mars you would see nothing, but there are more Martians on Mars than there are people on Earth. Q. Are the ‘star’ visitors guided by Maitreya? A. No. I am sure that this has all been well thought out between Maitreya and the Space Brothers. I am sure He would leave it up to them to carry out the required mission. Q. The ‘star’, which you announced in December 2008, is not constantly visible throughout the whole world, but now and then in some places. If the ‘star’ were to be visible constantly, the acceptance by the public would be much easier. Is the appearance of the ‘star’ bound by certain laws? A. Yes. They can only show their light for a given number of hours per day before needing to be recharged from the sun. Q. Is there any reason to hope that the Emergence will take place anytime soon? At Christmas you gave many people who trusted you reason to set their hopes very high, but it all seems to have ‘petered’ out. What was billed as a “very bright star visible to everyone both day and night” seems to have panned out to be a tiny fraction of what we were led to hope for. That has caused some people to back away from Share International. (1) Is it possible that Maitreya’s emergence may take place a number of years from now, or (2) that He may have changed His mind about working openly on the world stage? A. (1) No. (2) No. Of course, everyone hopes to see Maitreya soon but they are so impatient, unaware as they are of the tremendous opposition that exists, cosmic and planetary, to Maitreya’s emergence. The question to ask oneself is, I think, what have I done to speed His emergence? Is it enough or am I just waiting on the sidelines for Maitreya to act? Added 11.9.2009 Q. (1) Is the new ‘star’ the return of the star of Bethlehem or the “sign of the Son of Man” as prophesized by Jesus? (2) Are all the things that have been happening in the recent past, signs of Him appearing soon? (3) How do you explain the Bible’s prophecy in Matthew 24:29-31, where Jesus says He will come “on the clouds of heaven with power and great glory”? And the scripture that says: “And the Lord, whom you seek, will suddenly come to His temple, even the Messenger of the covenant, in whom you delight. Behold, He is coming”, says the Lord of Hosts.” (Malachi 3:1) This is plainly talking about a real temple in Israel (to me, at least). The problem is that the Jewish people have not rebuilt the ancient temple of Solomon. This prophecy is yet to be fulfilled. (4) How do you see this happening? A. (1) The ‘star’ is, symbolically, the sign of the Son of Man and heralds the first appearance of Maitreya, the World Teacher, on US television, interviewed not as Maitreya, but as an ordinary man. (2) Yes. (3) Maitreya descended from His retreat in the high Himalaya on 8 July 1977, stayed some days in Pakistan, then came from Karachi to London, UK, on 19 July 1977, thus “coming in the clouds” which today all can do by aeroplane. (4) The ‘temple’ referred to in this symbolic text is not a building but means humanity, to which the Son of Man returns as the oldest and highest of men. Q. Fear still sells better than hope. This is one reason for media inhibition of the ‘star’. Fear also governs their editors. I had an experience with a nationwide paper whose editor in chief refused to publish an advert for the ‘star’. He didn’t state any reason for declining, but I guess it had been fear of something strange, peculiar and controversial. Most people would rather go on in old self-destructive ways and media as a whole are the last ones who would A. I totally agree. ---------- previous additions ---------- Q. I was at your London lecture on 23 April 2009 and you spoke very urgently about the need to get the existence of the ‘star’ into media outlets (radio, television, the internet, etc), so that there is an open public discussion/debate about its meaning. A. As Maitreya says: “Nothing happens by itself. Man must act and implement his will.” Maitreya desires as much public discussion as possible otherwise the function of the ‘star’ in heralding His approach, Q. I have been following the news about the ‘star’. I am very much hoping that what people are seeing is the miracle star. But I am wondering whether any unusual sightings have been reported by people who spend their days looking at the stars through giant telescopes, etc. Were the scientific community to observe something new I would be reassured that it is not simply Venus being mistaken for something more unusual. Has this happened yet? A. The response from professional stargazers has been a deafening silence. Why the silence? Are they following governmental orders to keep quiet about any unusual sightings (like UFOs)? On the other hand, reports of sightings have been flooding in from all over the world – from Norway to New Zealand and the USA to Japan. YouTube is full of reports, many of the ‘star’ although the reporter usually has no idea what, in fact, he is seeing. Some earlier reports were indeed about Venus, but since 28 March Venus has gone beyond our sight. So now there is no confusion. The ‘star’ is brighter even than Venus, changes colour frequently and moves position. So obviously it is not a real star. There are, in fact, four such “star-like luminaries” covering the world. They are gigantic spacecraft (each one about the size of five football grounds put together). They all come from planets of our own solar system. They are a sign, heralds of the first public appearance on American television of Maitreya, the World Teacher. Q. Thanks for all of the great work that you have done so gracefully for so many years. I have one question that has been gnawing at my mind for several weeks: why have you been calling the light in the sky ‘the star’, while some of your regular readers know it is one or more UFOs? It seems that many people would quickly become very confused by your references to ‘the star’, especially after they look at the photographs (and accompanying text) on the Share International website that clearly indicates that it appears and disappears in a wide variety of different locations, colours, and forms, and that it moves around randomly (unlike any other star) like a spacecraft might. To my mind calling it a‘star’, makes it all too tempting for the public (including all those who are open to UFOs), to dismiss the story as baloney. So, why not cut out the pretence and call it a UFO? A. There is no pretence. Knowing the nature of the ‘star’, as four gigantic spaceships from several planets of our System, I had great difficulty in deciding just how to present it to the general public and media. I decided to follow my Master’s example. He had called it a “star-like luminary of brilliant power”, and related it to the ‘star’ which led the ‘three wise men’ to the birthplace of Jesus. Some of us know that that ‘star’ was a spacecraft too, but is accepted by millions as a miracle star. It was just before Christmas so I called it a ‘Christmas star’, sure that that would be more interesting and magnetic than a prediction about a UFO. In Britain at least, people are much more sceptical of UFOs than in the USA, for example. Of course, at each lecture I make it clear that what looks like a star is, in fact, one of four huge spacecraft. In a lecture, one has time and opportunity to enlarge on the subject and the meaning and purpose of the phenomenon. In a press release or advertisement one is limited by space and the need to be succinct. The result from the public has been encouraging – eager and excited and amazed by the sheer beauty of the spectacle. The response of the media has been almost nil, as if there was an embargo on mentioning something so important as the herald of the Christ. However, it could be that media interest is starting now. Thank you for your kind words. Q. Many people in foreign countries have had the pleasure of seeing the ‘star’, but I don’t think it has been over England very much. I live in the south-east, and I haven’t heard of anyone seeing it here in my area. So often the skies are cloudy, but I look every day and night for it. Is it likely to come here again? I have downloaded the photograph of it over Oslo, and given it out to many people in the hope of spreading the news of Maitreya. God bless you all at Share International. I love the magazine. A. We have some excellent photographs sent in to Share International by people in these islands, but our cloudy skies are certainly a hindrance. However, keep looking and, if possible, take pictures. Thank you for your comments on Share International magazine. Q. I have noticed that Benjamin Creme’s lectures are running throughout 2009. Why would we need more lectures? After we all see the ‘star’ won’t Maitreya be the main speaker or is the star going to run its show for another year before the appearance of Maitreya? I have been an amateur astronomer for 25 years. Stars are suns, they don’t move in orbital cycles. Would you care to enlighten me on a star that moves? Maybe it’s another object that has a projected orbit? A. Lectures are given to inform new people of our information. That means about 6 billion people who still have not heard what is happening in our world. The ‘star’ has a limited period as a sign of Maitreya’s presence and first public interview. Stars, as you say, do not move. Nor, I think, do they change colour constantly and disappear at high speed. There are four “star-like luminaries” which are now seen by many people around the world. They are huge spacecraft from different planets of our solar system. Their presence among us is further proof of the reality of UFOs and intelligent and harmless life in our own solar system. Q. (1) In what way can you recognise the ‘star’ sign and not get it mixed up with celestial bodies? (2) I know it is seen in the west. Does it move in any way? I’m looking for it in my vicinity but don’t think I have spotted it yet. Is there a chance it would make a wee cheeky appearance over Scotland anytime in the future? A. (1) For a start, it is very bright, brighter than Venus, changes colour and moves. (2) I don’t think we have had reports from Scotland but we have from Canada and New Zealand where many ex-Scots live, as you know. I will see if I can do anything for a magnificent sighting over Glasgow, my dear old birthplace! Q. When I was staying in a house in the Brazilian state of Minas Gerais, in March 2009, I noticed a handprint mark on my bedroom window. Back at my home in São Paulo, I realized that there were also some fingerprints on my own bathroom mirror. (1) Were these handprints manifested by Maitreya? (If yes, it’s becoming a frequent phenomenon in my house!) (2) Is this a sign that Maitreya’s appearance is near? (3) On 14 April, at 21.30, I was coming home in São Paulo, when I saw a strange star that was changing colours very quickly, and then disappeared. (3) Was it the ‘star’ and did anyone else realize it was there? (4) Also, on 6 April 2009, outside my home, I noticed an object in the distant sky outside my home. It was emitting a light at times and I remembered that some people who had seen the ‘star’ had asked it to become brighter. I decided to do the same: when I did it really became brighter even when the object was behind the clouds, and was brighter only at the times that I asked. It was a great moment and was like a confirmation. Was it the star? A. (1) Yes, it is a Sign of His Presence. They are appearing in many parts of the world. (2) YES, very near. (3) Yes, the ‘star’ and many others saw it. (4) It was the ‘star’. Q. I saw the photograph of the ‘star’ on your website, taken from New Zealand. If something unusual is spotted in our skies, it is normally all over radio talkback programmes and the media, immediately. Not a squeak so far! If this ‘star’ has been seen from so many countries, it amazes me that astronomers haven’t been speaking out and discussing it, by now! The fact that they are not, seems illogical. I have been searching in vain for comment from the local astronomy community. The deafening silence does not inspire confidence! I hope with all my heart that there is such a ‘star’ but for now I’m finding it hard to accept! A. I agree. It is quite extraordinary, this media and professional silence. The ‘star’ is seen all over the world, sometimes even in broad daylight, yet the media and astronomers alike refuse to speak about it. It begins to look as though they are following instructions from somewhere. Q. I have been reading about the ‘star’ sign on your website. I asked my uncle about the new star but he was unable to find anything more about it, even though he has some fairly advanced telescopes and photography equipment. He cannot find the star in the sky (he lives in Toronto, Canada). Is there any way you can release some astronomical information on this ‘star’ so we can get a better look at it? I know you already have some photographs on your website though they do not seem to contain enough context to determine where the ‘star’ is. A. Look for a star-like brilliant light which changes colour, moves and sometimes just disappears. It is not a real astronomical ‘star’ but a spaceship. Q. I saw what I thought was the ‘star’ about 8.45pm on 14 April 2009 when coming out of a Transmission Meditation session in Ladbroke Grove, London. It was in the western sky quite low down, very bright like Venus has been recently. I travelled by underground to my home, which took about an hour, and could still see it. Was it the ‘star’? A. It was indeed the ‘star’. 'Star' sightings from around the globe Added 11.9.2009 Dear Editor, While I was on vacation at the beach in Pawleys Island, South Carolina, I felt inspired to go outside and check the night sky. It was 27 May 2009 around 9.45pm EST [Eastern Standard Time], a beautiful clear night, and the stars were too numerous to count. As I walked toward the ocean, I asked the Space Brothers if they were in the vicinity to please make visible the ‘star’ heralding Maitreya’s first interview on television. Within seconds of making my request, two stars of brilliant yellow/orange appeared like spotlights in the eastern sky directly in front of me. The stars, one larger than the other, were not perfectly round, and brilliant rays of light extended from each star in all directions. They were visible for about 30-60 seconds. When they disappeared, I called my wife Ann to come outside. When she arrived, the stars reappeared with the same brilliance. After they disappeared once again, she called to her sisters to come outside. This time I looked to the southern sky, and the stars appeared again side-by-side but higher up. We watched the luminaries with joy and excitement. After the stars disappeared, we waited with great anticipation. The stars appeared again in the eastern sky for about 30 seconds. This time when they disappeared, we witnessed the most spectacular display of smaller white blinking stars for perhaps 10 minutes. It seemed as if there were a hundred blinking stars all around the constellation Orion. After the amazing display of blinking lights, one of the original yellow/orange stars appeared again in the eastern sky, then a second one, and a third, and finally a fourth, all side by side. Brilliant rays of golden light extended from each star and appeared for another 30-60 seconds. The four stars then disappeared. Were these stars heralding Maitreya’s first interview? D. D., Marietta, Georgia, USA. (Benjamin Creme’s Master confirms these to be the four “luminaries”, giant spacecraft, heralding Maitreya’s emergence. See Share International May 2009.) Dear Editor, I awoke as if it was the morning (in very good shape) at 3am on Monday 30 March 2009. I felt drawn to the kitchen window and looked out at the sky. It was splendid! I saw a star which looked like a coloured sun, dancing. I felt merry and happy. I went to lie down but I couldn’t sleep again, although I usually sleep very well. Was that the ‘star’? N. D., Marmoutier, France. (Benjamin Creme’s Master confirms that it was the ‘star’.) Dear Editor, I often look at the stars over my village of Santiago de Mora. Some weeks ago, there was a very bright star in the north, not normally there. My friends also saw it over Valladolid, Murcia, Valencia and Alicante and confirmed to me they also saw it move. Another night, at 10.30pm, talking with a neighbour, we saw passing above us a very bright light, at an altitude of about 300 meters, from west to east. It became sharper as it was above us and focused on us with a very potent light beam, not flickering. It moved very differently from a plane and there was no noise coming from it. I have seen it for five nights, almost at the same time, always passing in the same direction, but at different altitudes. Could you comment on these please? B. G. R., Santiago de Mora, Spain. (Benjamin Creme’s Master confirms that the “bright star” was indeed the ‘star’. The passing light was a spacecraft.) De
Zwipe Banks $5M To Get Its Biometric Payment Cards To Market In Early 2016 14.10.2015 Norwegian startup Zwipe, which is taking aim at payment card PIN codes and passwords with an embedded fingerprint reader technology to authenticate card payments, has closed a $5 million Series B funding round. Read More
1. Field of the Invention The present invention relates to bone fusion devices, and, more particularly, to bone fusion devices for fusing phalanges together. 2. Description of the Related Art Digital deformities of the fingers and toes are some of the most common conditions encountered by orthopedists and podiatrists. Patients with digital deformities often experience significant pain from structural abnormalities. Some of these abnormalities are acquired, caused by traumatic injuries, neuromuscular pathologies, systemic diseases, or mechanical problems secondary to extrinsic pressures. The deformities are popularly known as either mallet finger, jersey finger, coach's finger, hammertoe, as well as a host of others indicative of several different pathologies. Hammertoe deformity, the most common deformity of the lesser toes, is a flexion deformity of the proximal interphalangeal (PIP) joint of the toe, with hyperextension of the metatarsophalangeal (MTP) and distal interphalangeal (DIP) joints. Progressive PIP joint flexion deformity typically leads to compensatory hyperextension of the MTP and DIP joints. This makes the PIP joint prominent dorsally. Pain occurs due to rubbing of the prominence against the patient's shoe. The deformity is flexible at first but usually becomes fixed over time. When the deformity is flexible, various procedures can be utilized that involve manipulation of the involved tendons (such as orthotics). However, when the deformity is fixed, PIP fusion or joint replacement is often required. In order to prevent recurrence of the deformity and ensure the success of the surgical procedure, a PIP joint arthrodesis is typically performed. The “end-to-end” or “peg-in-hole” techniques are the most commonly used procedures. The PIP joint is aligned with the rest of the toe in a corrected anatomical position and maintained in place by the use of a Kirschner wire (K-wire) of a selected, diameter which is driven through the joint. Another type of PIP joint fusion technique utilizes a fusion pin rather than a K-wire driven through the PIP joint. Referring to U.S. Pat. No. 7,041,106 (Carver et al.), which is assigned to the assignee of the present invention, an interphalangeal fusion pin may be used at a PIP joint of a human foot. The fusion pin may have an anatomically correct angle for the PIP joint (FIG. 4 of the '106 patent; e.g., 172.5°), and may be formed from a bioresorbable material.
13, 7853 What are the prime factors of 4392807? 3, 1464269 What are the prime factors of 19073656? 2, 7, 340601 What are the prime factors of 123097? 13, 17, 557 List the prime factors of 681987. 3, 281, 809 List the prime factors of 46555. 5, 9311 What are the prime factors of 40590610? 2, 5, 47, 67, 1289 List the prime factors of 1060609. 11, 96419 What are the prime factors of 264261? 3, 59, 1493 What are the prime factors of 438725? 5, 7, 23, 109 What are the prime factors of 92218? 2, 7, 941 List the prime factors of 138718. 2, 43, 1613 What are the prime factors of 512419? 512419 List the prime factors of 7210684. 2, 13, 23, 6029 List the prime factors of 6433544. 2, 13, 61861 What are the prime factors of 13052047? 3463, 3769 What are the prime factors of 11186319? 3, 31, 120283 What are the prime factors of 10394030? 2, 5, 59, 79, 223 List the prime factors of 81083. 81083 List the prime factors of 6620383. 7, 11, 127, 677 List the prime factors of 171483. 3, 13, 4397 List the prime factors of 232472. 2, 29059 What are the prime factors of 138974? 2, 11, 6317 What are the prime factors of 199297? 7, 71, 401 List the prime factors of 12732. 2, 3, 1061 List the prime factors of 3009280. 2, 5, 2351 What are the prime factors of 1005146? 2, 23, 21851 What are the prime factors of 59266? 2, 29633 List the prime factors of 9158718. 2, 3, 53, 83, 347 What are the prime factors of 10651682? 2, 5325841 List the prime factors of 221068. 2, 17, 3251 What are the prime factors of 1145840? 2, 5, 14323 What are the prime factors of 5027503? 13, 386731 What are the prime factors of 938491? 938491 What are the prime factors of 925469? 925469 List the prime factors of 18643856. 2, 7, 11, 37, 409 List the prime factors of 6965495. 5, 17, 19, 227 What are the prime factors of 3341069? 3341069 What are the prime factors of 128827? 47, 2741 List the prime factors of 237695. 5, 137, 347 List the prime factors of 5671891. 211, 26881 What are the prime factors of 25085? 5, 29, 173 List the prime factors of 2876153. 7, 79, 743 What are the prime factors of 73596? 2, 3, 6133 List the prime factors of 8150602. 2, 23, 167, 1061 What are the prime factors of 1931813? 13, 181, 821 List the prime factors of 2974370. 2, 5, 7, 42491 List the prime factors of 475034. 2, 7, 33931 What are the prime factors of 119050? 2, 5, 2381 List the prime factors of 171456. 2, 3, 19, 47 What are the prime factors of 8720493? 3, 37, 251, 313 What are the prime factors of 130442? 2, 13, 29, 173 What are the prime factors of 583551? 3, 21613 List the prime factors of 706031. 23, 30697 List the prime factors of 8186352. 2, 3, 29, 5881 List the prime factors of 3061907. 19, 29, 5557 List the prime factors of 1535717. 1535717 List the prime factors of 7724388. 2, 3, 7, 91957 What are the prime factors of 30690? 2, 3, 5, 11, 31 List the prime factors of 476540. 2, 5, 23827 What are the prime factors of 6004632? 2, 3, 79, 3167 What are the prime factors of 324019? 223, 1453 What are the prime factors of 934645? 5, 107, 1747 What are the prime factors of 211279? 59, 3581 What are the prime factors of 4969193? 4969193 List the prime factors of 2441069. 101, 24169 What are the prime factors of 1280289? 3, 426763 List the prime factors of 1167440. 2, 5, 14593 What are the prime factors of 1381929? 3, 460643 What are the prime factors of 306837? 3, 103, 331 What are the prime factors of 2649695? 5, 529939 List the prime factors of 793881. 3, 11 List the prime factors of 8751118. 2, 47, 93097 What are the prime factors of 3019699? 113, 26723 What are the prime factors of 630459? 3, 70051 What are the prime factors of 99868? 2, 24967 What are the prime factors of 32161031? 7, 4594433 List the prime factors of 872545. 5, 109, 1601 What are the prime factors of 9474890? 2, 5, 919, 1031 List the prime factors of 2243539. 19, 118081 What are the prime factors of 5193116? 2, 1298279 List the prime factors of 2607498. 2, 3, 109, 443 List the prime factors of 12435787. 7, 13, 136657 List the prime factors of 2293648. 2, 7, 20479 What are the prime factors of 4050080? 2, 5, 17, 1489 What are the prime factors of 18726424? 2, 2340803 What are the prime factors of 32291? 7, 659 What are the prime factors of 1643416? 2, 205427 List the prime factors of 827904. 2, 3, 7, 11 List the prime factors of 1181408. 2, 36919 List the prime factors of 229125. 3, 5, 13, 47 List the prime factors of 12493905. 3, 5, 832927 What are the prime factors of 71637? 3, 23879 What are the prime factors of 1816289? 79, 83, 277 List the prime factors of 52182. 2, 3, 13, 223 What are the prime factors of 4546923? 3, 53, 28597 List the prime factors of 154037. 13, 17, 41 What are the prime factors of 771045? 3, 5, 11, 4673 What are the prime factors of 42530? 2, 5, 4253 What are the prime factors of 628004? 2, 13, 929 List the prime factors of 287238. 2, 3, 7, 977 What are the prime factors of 2830077? 3, 314453 What are the prime factors of 5548542? 2, 3, 924757 What are the prime factors of 390787? 593, 659 List the prime factors of 176951. 176951 What are the prime factors of 2880394? 2, 11, 130927 What are the prime factors of 481536? 2, 3, 11, 19 List the prime factors of 10318717. 10318717 List the prime factors of 407705. 5, 73, 1117 What are the prime factors of 194523? 3, 7, 59, 157 List the prime factors of 7478461. 2693, 2777 What are the prime factors of 4527546? 2, 3, 617, 1223 What are the prime factors of 3302656? 2, 7, 19, 97 What are the prime factors of 556196? 2, 211, 659 List the prime factors of 7267118. 2, 3633559 What are the prime factors of 10772797? 7, 109, 2017 List the prime factors of 5366858. 2, 7, 383347 List the prime factors of 662079. 3, 11, 20063 List the prime factors of 14261481. 3, 13, 41, 991 What are the prime factors of 782912? 2, 13, 941 List the prime factors of 6884251. 11, 19, 32939 What are the prime factors of 5915827? 241, 24547 List the prime factors of 114055. 5, 22811 What are the prime factors of 1203755? 5, 7, 163, 211 List the prime factors of 4038192. 2, 3, 29, 967 What are the prime factors of 4380042? 2, 3, 59, 12373 List the prime factors of 146731. 13, 11287 List the prime factors of 3287907. 3, 7, 52189 List the prime factors of 95613. 3, 7, 29, 157 What are the prime factors of 643089? 3, 214363 What are the prime factors of 7277522? 2, 7, 23, 97, 233 What are the prime factors of 8016? 2, 3, 167 What are the prime factors of 11282770? 2, 5, 19, 43, 1381 List the prime factors of 4111634. 2, 53, 79, 491 List the prime factors of 16321242. 2, 3, 7, 79, 4919 List the prime factors of 7147240. 2, 5, 178681 What are the prime factors of 26694521? 7, 3813503 What are the prime factors of 317361? 3, 11, 59, 163 List the prime factors of 816819. 3, 31, 8783 What are the prime factors of 106155? 3, 5, 7, 337 What are the prime factors of 115425? 3, 5, 19 List the prime factors of 376219. 19, 19801 List the prime factors of 3348074. 2, 409, 4093 List the prime factors of 291391. 211, 1381 What are the prime factors of 821747? 821747 What are the prime factors of 239303? 61, 3923 List the prime factors of 487330. 2, 5, 48733 List the prime factors of 479246. 2, 239623 List the prime factors of 3387904. 2, 13, 509 What are the prime factors of 284159? 284159 What are the prime factors of 8516131? 13, 655087 List the prime factors of 21799083. 3, 17, 427433 List the prime factors of 851158. 2, 7, 11, 5527 List the prime factors of 10830725. 5, 433229 What are the prime factors of 24009530? 2, 5, 53, 89, 509 What are the prime factors of 134508? 2, 3, 11, 1019 What are the prime factors of 318956? 2, 11, 659 List the prime factors of 347488. 2, 10859 What are the prime factors of 12015631? 31, 331, 1171 List the prime factors of 207866. 2, 37, 53 List the prime factors of 2383821. 3, 11, 199 List the prime factors of 2547636. 2, 3, 7, 13, 2333 List the prime factors of 2456680. 2, 5, 61417 List the prime factors of 5821904. 2, 11, 19, 1741 What are the prime factors of 6557467? 7, 131, 7151 List the prime factors of 567737. 567737 List the prime factors of 3686195. 5, 17, 2551 What are the prime factors of 7529? 7529 What are the prime factors of 6472093? 109, 59377 List the prime
Ahmed Essop Ahmed Essop (1 September 1931 – 9 June 2019) was an Indian-born South African author. Biography He attended the University of South Africa where he obtained a BA in 1956 and later an honours degree. Employed as a teacher until 1986, Essop gave up teaching to pursue writing full-time. Much of his work focuses on Indians and their roles in South African society, and include racial themes of apartheid. Ahmed Essop passed away on the 9th of June 2019 Writings The Dark Goddess (1959) (as Ahmed Yousuf) The Visitation (1979) The Emperor (1984) The Hajji and Other Stories (1988) Noorjehan and Other Stories (1990) The King of Hearts and Other Stories (1997) The Third Prophecy (2004) History and Satire in Salman Rushdie's The Satanic Verses (2009) The Universe and Other Essays (2010) Exile and Other Poems (2010) The Moors in the Plays of Shakespeare (2011) The Garden of Shahrazad and Other Poems (2011) Charles Dickens and Salman Rushdie: A Comparative Discourse (2014) Essop was awarded the Olive Schreiner Prize in 1979 by the English Academy of Southern Africa for The Hajji and Other Stories (1988) and the Literary Lifetime Achievement Award by the South African Ministry of Arts and Culture. References Category:1931 births Category:2019 deaths Category:South African writers Category:University of South Africa alumni
Q: get farthest vertice on a specified direction of a 3D model - Unity I need to get the position of the farthest vertice fo a model given the direction vector and the model. Eg obj has the following vertices: vertice a = (0,0,1) vertice b = (0,1,0) vertice c = (1,0,0) vertice d = (0,0,0) so GetPoint(obj, Vector3.up); will return vertice b thanks in advance A: The below code will give the farthest point but only for meshes with no submeshes you can change the code a little to do it for submeshes.. Vector3 GetFarPoint (Transform obj, Vector3 direction) { Vector3[] vertices; Vector3 farthestPoint; float farDistance; vertices = obj.GetComponent<MeshFilter>().mesh.vertices; farDistance=0f; foreach(Vector3 vert in vertices) { float temp = Vector3.Dot(direction,vert); if(temp>farDistance) { farDistance = temp; farthestPoint = vert; } } return farthestPoint; }
/* * Copyright (C) 2012 Platoniq y Fundación Goteo (see README for details) * This file is part of Goteo. * * Goteo is free software: you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * Goteo is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License * along with Goteo. If not, see <http://www.gnu.org/licenses/agpl.txt>. * */ /* Form navigator (*steps*) */ body.project-edit div#main #project-steps { padding: 30px 0 45px; text-align: center; font-size: 0; clear: both; } body.project-edit div#main #project-steps fieldset { border: 0; padding: 0; margin: 0; } body.project-edit div#main #project-steps fieldset legend { display: none; } body.project-edit div#main #project-steps div.steps { display: inline-block; } body.project-edit div#main #project-steps span.step { display: inline-block; padding: 0 1em; height: 100%; background: #e7e7e7 no-repeat bottom center; position: relative; } /* Lines */ body.project-edit div#main #project-steps span.step.first-off { background-image: url('steps/line-first-off.png'); } body.project-edit div#main #project-steps span.step.first-on { background-image: url('steps/line-first-on.png'); } body.project-edit div#main #project-steps span.step.on-on { background-image: url('steps/line-on-on.png'); } body.project-edit div#main #project-steps span.step.on-off { background-image: url('steps/line-on-off.png'); } body.project-edit div#main #project-steps span.step.on-last { background-image: url('steps/line-on-off.png'); } body.project-edit div#main #project-steps span.step.off-off { background-image: url('steps/line-off-off.png'); } body.project-edit div#main #project-steps span.step.off-on { background-image: url('steps/line-off-on.png'); } body.project-edit div#main #project-steps span.step.off-last { background-image: url('steps/line-off-last.png'); } /* Balloons */ body.project-edit div#main #project-steps span.step > button { font-size: 12px; font-weight: normal; height: 100%; margin: 10px 15px 0; padding: 0 0 10px; border: none; background: none; color: #20b2b1; padding-bottom: 50px; background: url('steps/balloon-on.png') no-repeat bottom center; min-width: 46px; max-width: 10em; } body.project-edit div#main #project-steps span.step.off > button { background-image: url('steps/balloon-off.png'); color: #b2b2b2; } body.project-edit div#main #project-steps span.step.active > button { background-image: url('steps/balloon-on-active.png'); } body.project-edit div#main #project-steps span.step.off.active > button { background-image: url('steps/balloon-off-active.png'); } body.project-edit div#main #project-steps span.step.error > button { background-image: url('steps/balloon-error.png'); } body.project-edit div#main #project-steps span.step.error.active > button { background-image: url('steps/balloon-error-active.png'); } /* Errors badge */ body.project-edit div#main #project-steps span.step > button > strong.number { width: 100%; height: 45px; line-height: 45px; position: absolute; bottom: 0; left: 0; font-size: 10px; color: white; font-style: normal; text-align: center; } body.project-edit div#main #project-steps span.step.active > button > strong.number { font-size: 18px; font-weight: bold; } /* Project fieldset */ body.project-edit div#main #project-steps fieldset fieldset { border: 1px solid #e13028; border-top: none; padding-bottom: 8px; position: relative; } body.project-edit div#main #project-steps fieldset fieldset span.step { margin-left: -1px; } body.project-edit div#main #project-steps fieldset fieldset span.step + span.step { margin-right: -1px; } body.project-edit div#main #project-steps fieldset fieldset > legend { top: 100%; color: #e13028; display: block; font-size: 10px; margin-top: 1.4em; left: 0; position: absolute; text-transform: uppercase; width: 100%; }
I take that to mean a private Party sale, since when you buy from a dealer they own the car. Okay, the answer is yes, but the bank/finance company will want to inspect the car first to make sure they money they forward is not going towards a POS car that you might default on if it blows up 10 minutes after you drive away. It ALL hinges on your credit score. If it is 700 or better, no problem. Related Questions How can a company like yours make up a "real" number on values of vehicles when there is no way for any one to actually get used car retail pricing. Registrations only show the amount that tax was pa... Search Shopping & Pricing Questions Shopping & Pricing Experts Content submitted by Users is not endorsed by CarGurus, does not express the opinions of CarGurus, and should not be considered reviewed, screened, or approved by CarGurus. Please refer to CarGurus Terms of Use.
The Cantonment Board Clifton (CBC) has decided to impose a ban on the use of polythene bags in its jurisdiction. As part of this campaign, residents will be persuaded to use paper or cloth bags instead of polythene ones. Shopkeepers selling household groceries and other items have also been directed to stop the commercial use of polythene bags.A special campaign will run for 15 days to raise awareness among residents and visitors to Sea View, which also falls under the CBC jurisdiction. After the 15-day campaign ending on April 4, the CBC will fine those found violating the ban.The Sindh government has already banned the sale and use of plastic bags and products. Section 14(3) of the Sindh Environment Protection Act 2014 states that "no person shall import, manufacture, stockpile, trade, supply, distribute or sell any scheduled plastic product which is non-degradable". At several times during the last couple of years, the Sindh government has made announcements to this effect. The last such move came in November last year, when the Sindh Cabinet decided to impose a phase-wise ban on the use of polythene and plastic bags in the province, with Sukkur being the first district. The ban would be enforced in Karachi in the next phase, the Cabinet had announced. However, it was hardly ever enforced.According to the CBC administration, the decision to ban polythene bags has been taken due to their various negative effects on the environment. Over the last few years, the CBC has launched various drives such as plantation campaigns and other activities to improve the environment.However, all these activities have been overshadowed by the unrestricted use of polythene bags, which have been found to be the single largest contributor to solid waste pollution. These polythene bags do not only increase the garbage spread in the streets but also affect the sewerage system when they get stuck in the drainage lines.According to CBC representatives, between 320 and 350 metric tons of garbage is lifted from their jurisdiction on a daily basis. In the absence of a recycling mechanism, the plastic waste is disposed of in landfill sites in Surjani and Hub.Polythene bags have also become a major threat to marine life. In turn, they are also dangerous for humans, who consume the same marine life that inadvertently swallows these plastics. Experts have warned that when these polythene bags find their way into the sea, they are broken down into micro plastic particles and are then consumed by marine life. This poison is included in human food through fish, prawns and other sea food.Meanwhile, shopkeepers and vendors within the CBC's jurisdiction have been instructed to stop the use of polythene bags. These instructions would be announced repeatedly on mega-phones and in the form of written notices by CBC teams during the 15-day movement. Action against violators would then be initiated after April 5. Heavy penalties will be imposed on shopkeepers found violating the ban.The CBC is also considering distributing paper or cloth bags among residents and shoppers to encourage the use of these alternative materials.In response to a question regarding how the ban would be enforced on picnickers coming to Sea View, a spokesperson said that they had already placed garbage bins at short intervals along the promenade from McDonald's to Village Restaurant."People are unaware of the damage caused by polythene bags and so they don't throw the garbage in the bins although they are placed after every few steps," said the spokesperson.The restriction would be imposed on the citizens coming for picnic as well as vendors running the stalls at Sea View, said the CBC spokesperson. Besides, banners are being put up at different locations to raise awareness among residents of Clifton and those coming for picnic.Published in The Express Tribune, March 20, 2019.
Increased apoptotic efficacy of lonidamine plus arsenic trioxide combination in human leukemia cells. Reactive oxygen species generation and defensive protein kinase (MEK/ERK, Akt/mTOR) modulation. Lonidamine is a safe, clinically useful anti-tumor drug, but its efficacy is generally low when used in monotherapy. We here demonstrate that lonidamine efficaciously cooperates with the anti-leukemic agent arsenic trioxide (ATO, Trisenox) to induce apoptosis in HL-60 and other human leukemia cell lines, with low toxicity in non-tumor peripheral blood lymphocytes. Apoptosis induction by lonidamine/ATO involves mitochondrial dysfunction, as indicated by early mitochondrial permeability transition pore opening and late mitochondrial transmembrane potential dissipation, as well as activation of the intrinsic apoptotic pathway, as indicated by Bcl-X(L) and Mcl-1 down-regulation, Bax translocation to mitochondria, cytochrome c and Omi/HtrA2 release to the cytosol, XIAP down-regulation, and caspase-9 and -3 cleavage/activation, with secondary (Bcl-2-inhibitable) activation of the caspase-8/Bid axis. Lonidamine stimulates reactive oxygen species production, and lonidamine/ATO toxicity is attenuated by antioxidants. Lonidamine/ATO stimulates JNK phosphorylation/activation, and apoptosis is attenuated by the JNK inhibitor SP600125. In addition, lonidamine elicits ERK and Akt/mTOR pathway activation, as indicated by increased ERK, Akt, p70S6K and rpS6 phosphorylation, and these effects are reduced by co-treatment with ATO. Importantly, co-treatment with MEK/ERK inhibitor (U0126) and PI3K/Akt (LY294002) or mTOR (rapamycin) inhibitors, instead of ATO, also potentiates lonidamine-provoked apoptosis. These results indicate that: (i) lonidamine efficacy is restrained by drug-provoked activation of MEK/ERK and Akt/mTOR defensive pathways, which therefore represent potential therapeutic targets. (ii) Co-treatment with ATO efficaciously potentiates lonidamine toxicity via defensive pathway inhibition and JNK activation. And (iii) conversely, the pro-oxidant action of lonidamine potentiates the apoptotic efficacy of ATO as an anti-leukemic agent.
In a heavy pot, heat the oil over medium heat.Add the onions and sauté them until they begin to soften (about 5 minutes).Add the garlic, mint and pepper and sauté for a couple of minutes more.Add the spinach, lemon juice, and rice. Rinse the frozen peas in a colander under running water to thaw them.Add them to the pot. Add the dill.Stir to mix everything well. Lower the heat and cover the pot. Cook for a few more minutes, stirring occasionally, until the spinach is limp and the pilaf is hot. Transfer to a serving bowl, immediately sprinkle with the feta, and serve. Substitutions Use freshly squeezed lemon juice instead of bottled. Ideas for making this recipe your own Experiment with different dark leafy greens in place of the spinach. How about Swiss chard, or kale? Tips Cook the rice ahead of time. I highly recommend using a rice cooker! The rice comes out perfectly, every time. If you don't happen to have dried mint, cut open a couple of peppermint tea bags! (Be sure to read the box, though, to make sure that the tea doesn't include unsuitable ingredients.)
Sauerkraut soup Ingredients: 500 g pork 400 g sauerkraut 2 potatoes 1 carrot 50 g salted pork fat 50 g rice 1 bay leaf salt – to taste 10 corns of black pepper 50 g sour cream 50 g parsley / dill Cooking Pour pork with cold water and bring it to boil. Skim the soup, add bay leaf and salt. Boil the meat for 2 – 2.5 hours. Wring out the sauerkraut and stew it with salted pork fat slightly. Add dill or parsley. Cube potato and put it in the broth. Wash the rice thoroughly and boil it 15 minutes with soup. Add grated carrot, cut bulb onion and stewed sauerkraut to the soup. Cook the ingredients for 15 minutes more. Put the salted pork fat into the soup. Then add salt and pepper. Boil the soup.
<?xml version="1.0" encoding="utf-8"?> <Project DefaultTargets="Build" ToolsVersion="12.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003"> <ItemGroup Label="ProjectConfigurations"> <ProjectConfiguration Include="Debug|Win32"> <Configuration>Debug</Configuration> <Platform>Win32</Platform> </ProjectConfiguration> <ProjectConfiguration Include="Release|Win32"> <Configuration>Release</Configuration> <Platform>Win32</Platform> </ProjectConfiguration> <ProjectConfiguration Include="Debug|x64"> <Configuration>Debug</Configuration> <Platform>x64</Platform> </ProjectConfiguration> <ProjectConfiguration Include="Release|x64"> <Configuration>Release</Configuration> <Platform>x64</Platform> </ProjectConfiguration> </ItemGroup> <PropertyGroup Label="Globals"> <ProjectGuid>{869C08D1-A32F-49C7-9831-2ADB52F241B6}</ProjectGuid> <RootNamespace>$(MSBuildProjectName)</RootNamespace> <Configuration Condition="'$(Configuration)' == ''">Debug</Configuration> <Platform Condition="'$(Platform)' == ''">Win32</Platform> <SampleGuid>{FCD66B78-4C9B-4619-8C39-EFB1AE426386}</SampleGuid> </PropertyGroup> <Import Project="$(VCTargetsPath)\Microsoft.Cpp.Default.props" /> <PropertyGroup Label="Configuration" Condition="'$(Configuration)|$(Platform)'=='Release|x64'"> <TargetVersion>Windows10</TargetVersion> <UseDebugLibraries>False</UseDebugLibraries> <DriverTargetPlatform>Desktop</DriverTargetPlatform> <DriverType /> <PlatformToolset>WindowsApplicationForDrivers10.0</PlatformToolset> <ConfigurationType>Application</ConfigurationType> </PropertyGroup> <PropertyGroup Label="Configuration" Condition="'$(Configuration)|$(Platform)'=='Debug|x64'"> <TargetVersion>Windows10</TargetVersion> <UseDebugLibraries>True</UseDebugLibraries> <DriverTargetPlatform>Desktop</DriverTargetPlatform> <DriverType /> <PlatformToolset>WindowsApplicationForDrivers10.0</PlatformToolset> <ConfigurationType>Application</ConfigurationType> </PropertyGroup> <PropertyGroup Label="Configuration" Condition="'$(Configuration)|$(Platform)'=='Release|Win32'"> <TargetVersion>Windows10</TargetVersion> <UseDebugLibraries>False</UseDebugLibraries> <DriverTargetPlatform>Desktop</DriverTargetPlatform> <DriverType /> <PlatformToolset>WindowsApplicationForDrivers10.0</PlatformToolset> <ConfigurationType>Application</ConfigurationType> </PropertyGroup> <PropertyGroup Label="Configuration" Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'"> <TargetVersion>Windows10</TargetVersion> <UseDebugLibraries>True</UseDebugLibraries> <DriverTargetPlatform>Desktop</DriverTargetPlatform> <DriverType /> <PlatformToolset>WindowsApplicationForDrivers10.0</PlatformToolset> <ConfigurationType>Application</ConfigurationType> </PropertyGroup> <Import Project="$(VCTargetsPath)\Microsoft.Cpp.props" /> <PropertyGroup> <OutDir>$(IntDir)</OutDir> </PropertyGroup> <ImportGroup Label="PropertySheets" Condition="'$(Configuration)|$(Platform)'=='Release|x64'"> <Import Project="$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props" Condition="exists('$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props')" /> </ImportGroup> <ImportGroup Label="PropertySheets" Condition="'$(Configuration)|$(Platform)'=='Debug|x64'"> <Import Project="$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props" Condition="exists('$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props')" /> </ImportGroup> <ImportGroup Label="PropertySheets" Condition="'$(Configuration)|$(Platform)'=='Release|Win32'"> <Import Project="$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props" Condition="exists('$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props')" /> </ImportGroup> <ImportGroup Label="PropertySheets" Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'"> <Import Project="$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props" Condition="exists('$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props')" /> </ImportGroup> <ItemGroup Label="WrappedTaskItems" /> <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|x64'"> <TargetName>WmiToast</TargetName> </PropertyGroup> <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|x64'"> <TargetName>WmiToast</TargetName> </PropertyGroup> <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|Win32'"> <TargetName>WmiToast</TargetName> </PropertyGroup> <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'"> <TargetName>WmiToast</TargetName> </PropertyGroup> <ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Release|x64'"> <Link> <AdditionalDependencies>%(AdditionalDependencies);$(SDK_LIB_PATH)\vccomsup.lib</AdditionalDependencies> <AdditionalDependencies>%(AdditionalDependencies);ole32.lib;oleaut32.lib;uuid.lib;wbemuuid.lib</AdditionalDependencies> </Link> <ClCompile> <PreprocessorDefinitions>%(PreprocessorDefinitions);_UNICODE;UNICODE</PreprocessorDefinitions> <ExceptionHandling> </ExceptionHandling> </ClCompile> <Midl> <PreprocessorDefinitions>%(PreprocessorDefinitions);_UNICODE;UNICODE</PreprocessorDefinitions> </Midl> <ResourceCompile> <PreprocessorDefinitions>%(PreprocessorDefinitions);_UNICODE;UNICODE</PreprocessorDefinitions> </ResourceCompile> </ItemDefinitionGroup> <ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Debug|x64'"> <Link> <AdditionalDependencies>%(AdditionalDependencies);$(SDK_LIB_PATH)\vccomsup.lib</AdditionalDependencies> <AdditionalDependencies>%(AdditionalDependencies);ole32.lib;oleaut32.lib;uuid.lib;wbemuuid.lib</AdditionalDependencies> </Link> <ClCompile> <PreprocessorDefinitions>%(PreprocessorDefinitions);_UNICODE;UNICODE</PreprocessorDefinitions> <ExceptionHandling> </ExceptionHandling> </ClCompile> <Midl> <PreprocessorDefinitions>%(PreprocessorDefinitions);_UNICODE;UNICODE</PreprocessorDefinitions> </Midl> <ResourceCompile> <PreprocessorDefinitions>%(PreprocessorDefinitions);_UNICODE;UNICODE</PreprocessorDefinitions> </ResourceCompile> </ItemDefinitionGroup> <ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Release|Win32'"> <Link> <AdditionalDependencies>%(AdditionalDependencies);$(SDK_LIB_PATH)\vccomsup.lib</AdditionalDependencies> <AdditionalDependencies>%(AdditionalDependencies);ole32.lib;oleaut32.lib;uuid.lib;wbemuuid.lib</AdditionalDependencies> </Link> <ClCompile> <PreprocessorDefinitions>%(PreprocessorDefinitions);_UNICODE;UNICODE</PreprocessorDefinitions> <ExceptionHandling> </ExceptionHandling> </ClCompile> <Midl> <PreprocessorDefinitions>%(PreprocessorDefinitions);_UNICODE;UNICODE</PreprocessorDefinitions> </Midl> <ResourceCompile> <PreprocessorDefinitions>%(PreprocessorDefinitions);_UNICODE;UNICODE</PreprocessorDefinitions> </ResourceCompile> </ItemDefinitionGroup> <ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'"> <Link> <AdditionalDependencies>%(AdditionalDependencies);$(SDK_LIB_PATH)\vccomsup.lib</AdditionalDependencies> <AdditionalDependencies>%(AdditionalDependencies);ole32.lib;oleaut32.lib;uuid.lib;wbemuuid.lib</AdditionalDependencies> </Link> <ClCompile> <PreprocessorDefinitions>%(PreprocessorDefinitions);_UNICODE;UNICODE</PreprocessorDefinitions> <ExceptionHandling> </ExceptionHandling> </ClCompile> <Midl> <PreprocessorDefinitions>%(PreprocessorDefinitions);_UNICODE;UNICODE</PreprocessorDefinitions> </Midl> <ResourceCompile> <PreprocessorDefinitions>%(PreprocessorDefinitions);_UNICODE;UNICODE</PreprocessorDefinitions> </ResourceCompile> </ItemDefinitionGroup> <ItemGroup> <ClCompile Include="WmiExecute.cpp" /> <ClCompile Include="WmiGetSet.cpp" /> <ClCompile Include="WmiToast.cpp" /> </ItemGroup> <ItemGroup> <Inf Exclude="@(Inf)" Include="*.inf" /> <FilesToPackage Include="$(TargetPath)" Condition="'$(ConfigurationType)'=='Driver' or '$(ConfigurationType)'=='DynamicLibrary'" /> </ItemGroup> <ItemGroup> <None Exclude="@(None)" Include="*.txt;*.htm;*.html" /> <None Exclude="@(None)" Include="*.ico;*.cur;*.bmp;*.dlg;*.rct;*.gif;*.jpg;*.jpeg;*.wav;*.jpe;*.tiff;*.tif;*.png;*.rc2" /> <None Exclude="@(None)" Include="*.def;*.bat;*.hpj;*.asmx" /> </ItemGroup> <ItemGroup> <ClInclude Exclude="@(ClInclude)" Include="*.h;*.hpp;*.hxx;*.hm;*.inl;*.xsd" /> </ItemGroup> <Import Project="$(VCTargetsPath)\Microsoft.Cpp.targets" /> </Project>
Q: Where is the DVWP in Sharepoint 2010? Salvete! Where can I find the Data View Web Part in Sharepoint Enterprise 2010? I can't see anywhere to enable it as a feature, and it doesn't show up in any of the web-part lists. I understand it is also called XSLT List View. A: plases follow these instructions to get it ;) Open your SharePoint Page and in Site Actions select ->Edit in SharePoint Designer. Now select a zone on teh Page where you want to add your Dataview weboart. Next, click on Insert tab -> click on Data View. In the drop-down of Data view menu click on “Empty Data view” . This will now insert an Empty Data view in your selected zone. Next click on “click here to select datasource” to select the datasource or list. Select the list\library you want to display the data from. Next drag and drop the columns in the dataview webpart from the right hand column list (for the list\library you selected). http://www.learningsharepoint.com/2010/10/16/create-dataview-webpart-in-sharepoint-2010-tutorial/ another step by step guide with images: http://www.bybugday.com/Lists/Posts/Post.aspx?ID=30 You need sharepoint designer or do it from code ;) hope it helps :)
Today we have a special episode with my good friend and bestselling Paleo author and Crossfit beast, George Bryant. He’s a former marine who struggled with weight and an eating disorder for twelve years before turning to the kitchen for salvation. Nicolas Cole went from a scrawny, unhealthy, 100-pound teen struggling with Celiac disease to a jacked 170-lbs physique model. Nicolas has been on the show before, and he’s back answering your questions about the ever elusive subject: how to gain muscle mass eating clean, Paleo, and Wild foods. We are excited to announce the upcoming release of the ​Wild Kitchen App for iPhone and iPad! If you are tired of the same old dinner every single night then you’re ready to shake up your taste buds with a delicious fat-burning feast from the Wild Kitchen! Coffee has been given a bad rap, but the science proves that good coffee—and I’ll explain what I mean by that—can be an awesome biohack for increased energy and focus as well as a powerful fat-burning aid. Here are my 3 favorite fatty coffee recipes… To celebrate the release of the brand new Wellness Mama App that we created with Katie from Wellnessmama.com, I wanted to share two of my favorite recipes from the App. These are both delicious, and so easy to prepare! Coming soon: The Wellness Mama App will be discounted to just $1.99 for the first 24 hours only! Then the price rises to $3.99. So be sure to get it early and enjoy Katie’s (wellnessmama.com) favorite healthy family recipes right on all your iOS devices.
88 Ariz. 380 (1960) 357 P.2d 130 John W. GARRETT, Appellant, v. Sarah FOLSOM as Yavapai County School Superintendent and Jack L. Ogg, as Yavapai County Attorney, Appellees. No. 6747. Supreme Court of Arizona. November 30, 1960. *382 Scott, Cavness & Yankee, Phoenix, for appellant. Jack L. Ogg, former County Atty. of Yavapai County, Prescott, for appellees. UDALL, Justice. Appellant (petitioner below) questions by mandamus the attempt to form a union high school district embracing the same territory as that included in the two existing high school districts in Yavapai county. The appellees (respondents below) are the Yavapai County Superintendent of Schools and the then County Attorney of Yavapai County. A.R.S. § 15-501 authorizes two or more adjoining school districts having an average daily attendance of not less than 200 pupils, or an assessed valuation of not less than $1,500,000 to form a union high school district. Section 15-502 prescribes the manner in which said formation may be accomplished. On November 25, 1957, a petition was filed with the Superintendent requesting that pursuant to A.R.S. § 15-502, she call a special election to determine whether the school districts, Verde Common School District No. 3 (coextensive with Verde High School District) and Cottonwood-Oak Creek Common School District No. 6 (coextensive with Cottonwood-Oak Creek High School District) should join to form a union high school district. This petition was signed by 15% or more of the resident property taxpayers of each of the existing districts. The combined assessed valuation of the two districts, which included the general area around Clarkdale and Cottonwood, respectively, was more than $1,500,000. In compliance with A.R.S. § 15-502 the Superintendent called a special election to be held December 6, 1957. Although the minimum notices required to be posted in each of the existing districts is only three, the Superintendent posted five notices in each district. The election was duly held on December 6, 1957, and a majority of the qualified electors of the common school districts casting ballots in the election voted to approve the establishment of the proposed union high school district. Thereafter the Superintendent appointed members to its board of education and filed a transcript of the boundaries of the proposed new district with the board of supervisors and the assessor of Yavapai county in compliance with A.R.S. § 15-402. The territory included in the new district is identical with that of the prior districts combined. *383 On December 18, 1957, after the union district was formed, an election was held pursuant to A.R.S. § 15-503, to choose a site for the new union high school. Clarkdale was chosen and thereafter all the high school students of the former districts attended the union high school at Clarkdale, which has subsequently been the only high school operating and serving the high school students living in the area which formerly comprised the two districts. Apparently dissatisfied with the change of districts, appellant demanded that the Superintendent file a transcript setting forth the boundaries of the old Verde and Cottonwood-Oak Creek districts. The Superintendent refused to so file. Thereafter, on February 20, 1958, under authority of A.R.S. § 12-2042, appellant filed a verified complaint with appellee County Attorney demanding that an action in quo warranto be filed to annul the union high school district's purported franchise and to oust the members of its board of education. The County Attorney refused to comply with said demand and this action in mandamus was instituted. The Superior Court of Yavapai County denied the petition for writ of mandamus. The appellant assigns as error the action of the trial court in denying his petition for a writ of mandamus on the ground that the attempt to form a union high school district in this instance was void. In support of this assignment of error the appellant asserts that legally established high school districts cannot be dissolved except where the power of dissolution is granted by legislative authority; that no constitutional or legislative authority was invoked in the instant case to dissolve the two existing high school districts; and that two or more school districts of the same class or category cannot occupy the same territory at the same time. It is our view that the contention of appellant is without merit. A.R.S. § 15-501 specifically grants legislative authority for the creation of a union high school district. There is no limitation placed on this statutory authority to prevent the residents of an area already served by two or more high school districts from uniting and forming one union high school district. This authority is blanket subject only to three limitations: (1) that the formation be authorized by a majority vote of the qualified electors of the common school districts to be included in the new union high school district, (2) that the common school districts proposing the formation meet a minimum requirement of either assessed valuation or average daily student attendance, and (3) that they do not leave out a fractional part of an existing union high school district which is not contiguous and which does not of itself meet the minimum valuation or attendance requirements as set forth in the statute. *384 In this case all three limitations were satisfied. The union high school district was authorized by a majority of the qualified electors of the Cottonwood-Oak Creek and Verde common school districts whose boundaries are coextensive with those of the new union high school district. The two common school districts met the minimum valuation and attendance requirements. Finally, in the formation process, these electors did not exclude from the new district any fractional part of an existing high school district. The principal contention of the appellant, that a high school district can only be dissolved by legislative authority, ignores the statutory provision of A.R.S. § 15-501 which authorizes two or more adjoining districts to unite as a union high school district. In particular it ignores the following language: "When a new district is formed from territory already included in a union high school district, such territory shall no longer be included in the original high school district." This language clearly shows the legislature's intent that a new high school district can include territory of an existing high school district and that when any territory of an old high school district is taken into a new union district the old authority automatically dissolves as to the annexed territory. A fortiori, when the old district in its entirety is absorbed by a new district the old authority in its entirety automatically dissolves. It is therefore the law of this State that when a union high school district is formed pursuant to A.R.S. §§ 15-501 and 15-502, the formerly existing high school districts are dissolved and they are automatically incorporated into the new union high school district. Appellant questions the validity of the election held pursuant to A.R.S. § 15-502 because one of the five notices of election posted in one of the old districts stated that the election would be held on December 6, 1959 rather than the correct date of December 6, 1957. The evidence is not in dispute. Four valid notices were posted in the district even though only three would have satisfied the requirements of the statute. Appellant does not assert nor did he offer any evidence to prove that the erroneous date on the surplus notice deceived any qualified elector or that any electors refrained from voting because of said faulty notice. The mistake of this one surplus notice was harmless and does not invalidate the election. None of the authority cited by appellant supports a contrary result. In view of our conclusions it was not mandatory upon the school superintendent to file a transcript of the boundaries of the two old high school districts on or before April 1, 1958. *385 There was no abuse of discretion on the part of the county attorney in this case. It is therefore ordered that the judgment of the lower court denying the writ of mandamus be affirmed. STRUCKMEYER, C.J., and PHELPS, BERNSTEIN and LESHER, JJ., concur.
./ANNOUNCE ./AUTHORS ./Ada95/Makefile.in ./Ada95/README ./Ada95/TODO ./Ada95/aclocal.m4 ./Ada95/configure ./Ada95/configure.in ./Ada95/doc/Makefile.in ./Ada95/gen/Makefile.in ./Ada95/gen/adacurses-config.in ./Ada95/gen/gen.c ./Ada95/gen/html.m4 ./Ada95/gen/normal.m4 ./Ada95/gen/table.m4 ./Ada95/gen/terminal_interface-curses-aux.ads.m4 ./Ada95/gen/terminal_interface-curses-forms-field_types.ads.m4 ./Ada95/gen/terminal_interface-curses-forms-field_user_data.ads.m4 ./Ada95/gen/terminal_interface-curses-forms-form_user_data.ads.m4 ./Ada95/gen/terminal_interface-curses-forms.ads.m4 ./Ada95/gen/terminal_interface-curses-menus-item_user_data.ads.m4 ./Ada95/gen/terminal_interface-curses-menus-menu_user_data.ads.m4 ./Ada95/gen/terminal_interface-curses-menus.ads.m4 ./Ada95/gen/terminal_interface-curses-mouse.ads.m4 ./Ada95/gen/terminal_interface-curses-panels-user_data.ads.m4 ./Ada95/gen/terminal_interface-curses-panels.ads.m4 ./Ada95/gen/terminal_interface-curses-trace.ads.m4 ./Ada95/gen/terminal_interface-curses.adb.m4 ./Ada95/gen/terminal_interface-curses.ads.m4 ./Ada95/include/MKncurses_def.sh ./Ada95/include/Makefile.in ./Ada95/include/ncurses_cfg.hin ./Ada95/include/ncurses_defs ./Ada95/make-tar.sh ./Ada95/mk-1st.awk ./Ada95/package/AdaCurses-doc.spec ./Ada95/package/AdaCurses.spec ./Ada95/package/debian/compat ./Ada95/package/debian/control ./Ada95/package/debian/copyright ./Ada95/package/debian/docs ./Ada95/package/debian/rules ./Ada95/package/debian/source/format ./Ada95/package/debian/watch ./Ada95/samples/Makefile.in ./Ada95/samples/README ./Ada95/samples/explain.txt ./Ada95/samples/ncurses.adb ./Ada95/samples/ncurses2-acs_and_scroll.adb ./Ada95/samples/ncurses2-acs_and_scroll.ads ./Ada95/samples/ncurses2-acs_display.adb ./Ada95/samples/ncurses2-acs_display.ads ./Ada95/samples/ncurses2-attr_test.adb ./Ada95/samples/ncurses2-attr_test.ads ./Ada95/samples/ncurses2-color_edit.adb ./Ada95/samples/ncurses2-color_edit.ads ./Ada95/samples/ncurses2-color_test.adb ./Ada95/samples/ncurses2-color_test.ads ./Ada95/samples/ncurses2-demo_forms.adb ./Ada95/samples/ncurses2-demo_forms.ads ./Ada95/samples/ncurses2-demo_pad.adb ./Ada95/samples/ncurses2-demo_pad.ads ./Ada95/samples/ncurses2-demo_panels.adb ./Ada95/samples/ncurses2-demo_panels.ads ./Ada95/samples/ncurses2-flushinp_test.adb ./Ada95/samples/ncurses2-flushinp_test.ads ./Ada95/samples/ncurses2-genericputs.adb ./Ada95/samples/ncurses2-genericputs.ads ./Ada95/samples/ncurses2-getch.ads ./Ada95/samples/ncurses2-getch_test.adb ./Ada95/samples/ncurses2-getch_test.ads ./Ada95/samples/ncurses2-getopt.adb ./Ada95/samples/ncurses2-getopt.ads ./Ada95/samples/ncurses2-m.adb ./Ada95/samples/ncurses2-m.ads ./Ada95/samples/ncurses2-menu_test.adb ./Ada95/samples/ncurses2-menu_test.ads ./Ada95/samples/ncurses2-overlap_test.adb ./Ada95/samples/ncurses2-overlap_test.ads ./Ada95/samples/ncurses2-slk_test.adb ./Ada95/samples/ncurses2-slk_test.ads ./Ada95/samples/ncurses2-test_sgr_attributes.adb ./Ada95/samples/ncurses2-test_sgr_attributes.ads ./Ada95/samples/ncurses2-trace_set.adb ./Ada95/samples/ncurses2-trace_set.ads ./Ada95/samples/ncurses2-util.adb ./Ada95/samples/ncurses2-util.ads ./Ada95/samples/ncurses2.ads ./Ada95/samples/rain.adb ./Ada95/samples/rain.ads ./Ada95/samples/sample-curses_demo-attributes.adb ./Ada95/samples/sample-curses_demo-attributes.ads ./Ada95/samples/sample-curses_demo-mouse.adb ./Ada95/samples/sample-curses_demo-mouse.ads ./Ada95/samples/sample-curses_demo.adb ./Ada95/samples/sample-curses_demo.ads ./Ada95/samples/sample-explanation.adb ./Ada95/samples/sample-explanation.ads ./Ada95/samples/sample-form_demo-aux.adb ./Ada95/samples/sample-form_demo-aux.ads ./Ada95/samples/sample-form_demo-handler.adb ./Ada95/samples/sample-form_demo-handler.ads ./Ada95/samples/sample-form_demo.adb ./Ada95/samples/sample-form_demo.ads ./Ada95/samples/sample-function_key_setting.adb ./Ada95/samples/sample-function_key_setting.ads ./Ada95/samples/sample-header_handler.adb ./Ada95/samples/sample-header_handler.ads ./Ada95/samples/sample-helpers.adb ./Ada95/samples/sample-helpers.ads ./Ada95/samples/sample-keyboard_handler.adb ./Ada95/samples/sample-keyboard_handler.ads ./Ada95/samples/sample-manifest.ads ./Ada95/samples/sample-menu_demo-aux.adb ./Ada95/samples/sample-menu_demo-aux.ads ./Ada95/samples/sample-menu_demo-handler.adb ./Ada95/samples/sample-menu_demo-handler.ads ./Ada95/samples/sample-menu_demo.adb ./Ada95/samples/sample-menu_demo.ads ./Ada95/samples/sample-my_field_type.adb ./Ada95/samples/sample-my_field_type.ads ./Ada95/samples/sample-text_io_demo.adb ./Ada95/samples/sample-text_io_demo.ads ./Ada95/samples/sample.adb ./Ada95/samples/sample.ads ./Ada95/samples/status.adb ./Ada95/samples/status.ads ./Ada95/samples/tour.adb ./Ada95/samples/tour.ads ./Ada95/src/Makefile.in ./Ada95/src/c_threaded_variables.c ./Ada95/src/c_threaded_variables.h ./Ada95/src/c_varargs_to_ada.c ./Ada95/src/c_varargs_to_ada.h ./Ada95/src/library.gpr ./Ada95/src/modules ./Ada95/src/ncurses_compat.c ./Ada95/src/terminal_interface-curses-aux.adb ./Ada95/src/terminal_interface-curses-forms-field_types-alpha.adb ./Ada95/src/terminal_interface-curses-forms-field_types-alpha.ads ./Ada95/src/terminal_interface-curses-forms-field_types-alphanumeric.adb ./Ada95/src/terminal_interface-curses-forms-field_types-alphanumeric.ads ./Ada95/src/terminal_interface-curses-forms-field_types-enumeration-ada.adb ./Ada95/src/terminal_interface-curses-forms-field_types-enumeration-ada.ads ./Ada95/src/terminal_interface-curses-forms-field_types-enumeration.adb ./Ada95/src/terminal_interface-curses-forms-field_types-enumeration.ads ./Ada95/src/terminal_interface-curses-forms-field_types-intfield.adb ./Ada95/src/terminal_interface-curses-forms-field_types-intfield.ads ./Ada95/src/terminal_interface-curses-forms-field_types-ipv4_address.adb ./Ada95/src/terminal_interface-curses-forms-field_types-ipv4_address.ads ./Ada95/src/terminal_interface-curses-forms-field_types-numeric.adb ./Ada95/src/terminal_interface-curses-forms-field_types-numeric.ads ./Ada95/src/terminal_interface-curses-forms-field_types-regexp.adb ./Ada95/src/terminal_interface-curses-forms-field_types-regexp.ads ./Ada95/src/terminal_interface-curses-forms-field_types-user-choice.adb ./Ada95/src/terminal_interface-curses-forms-field_types-user-choice.ads ./Ada95/src/terminal_interface-curses-forms-field_types-user.adb ./Ada95/src/terminal_interface-curses-forms-field_types-user.ads ./Ada95/src/terminal_interface-curses-forms-field_types.adb ./Ada95/src/terminal_interface-curses-forms-field_user_data.adb ./Ada95/src/terminal_interface-curses-forms-form_user_data.adb ./Ada95/src/terminal_interface-curses-forms.adb ./Ada95/src/terminal_interface-curses-menus-item_user_data.adb ./Ada95/src/terminal_interface-curses-menus-menu_user_data.adb ./Ada95/src/terminal_interface-curses-menus.adb ./Ada95/src/terminal_interface-curses-mouse.adb ./Ada95/src/terminal_interface-curses-panels-user_data.adb ./Ada95/src/terminal_interface-curses-panels.adb ./Ada95/src/terminal_interface-curses-putwin.adb ./Ada95/src/terminal_interface-curses-putwin.ads ./Ada95/src/terminal_interface-curses-termcap.adb ./Ada95/src/terminal_interface-curses-termcap.ads ./Ada95/src/terminal_interface-curses-terminfo.adb ./Ada95/src/terminal_interface-curses-terminfo.ads ./Ada95/src/terminal_interface-curses-text_io-aux.adb ./Ada95/src/terminal_interface-curses-text_io-aux.ads ./Ada95/src/terminal_interface-curses-text_io-complex_io.adb ./Ada95/src/terminal_interface-curses-text_io-complex_io.ads ./Ada95/src/terminal_interface-curses-text_io-decimal_io.adb ./Ada95/src/terminal_interface-curses-text_io-decimal_io.ads ./Ada95/src/terminal_interface-curses-text_io-enumeration_io.adb ./Ada95/src/terminal_interface-curses-text_io-enumeration_io.ads ./Ada95/src/terminal_interface-curses-text_io-fixed_io.adb ./Ada95/src/terminal_interface-curses-text_io-fixed_io.ads ./Ada95/src/terminal_interface-curses-text_io-float_io.adb ./Ada95/src/terminal_interface-curses-text_io-float_io.ads ./Ada95/src/terminal_interface-curses-text_io-integer_io.adb ./Ada95/src/terminal_interface-curses-text_io-integer_io.ads ./Ada95/src/terminal_interface-curses-text_io-modular_io.adb ./Ada95/src/terminal_interface-curses-text_io-modular_io.ads ./Ada95/src/terminal_interface-curses-text_io.adb ./Ada95/src/terminal_interface-curses-text_io.ads ./Ada95/src/terminal_interface-curses-trace.adb_p ./Ada95/src/terminal_interface.ads ./COPYING ./INSTALL ./MANIFEST ./Makefile.in ./Makefile.os2 ./NEWS ./README ./README.MinGW ./README.emx ./TO-DO ./VERSION ./aclocal.m4 ./announce.html.in ./c++/Makefile.in ./c++/NEWS ./c++/PROBLEMS ./c++/README-first ./c++/cursesapp.cc ./c++/cursesapp.h ./c++/cursesf.cc ./c++/cursesf.h ./c++/cursesm.cc ./c++/cursesm.h ./c++/cursesmain.cc ./c++/cursesp.cc ./c++/cursesp.h ./c++/cursespad.cc ./c++/cursesw.cc ./c++/cursesw.h ./c++/cursslk.cc ./c++/cursslk.h ./c++/demo.cc ./c++/edit_cfg.sh ./c++/etip.h.in ./c++/headers ./c++/internal.h ./c++/modules ./config.guess ./config.sub ./configure ./configure.in ./convert_configure.pl ./dist.mk ./doc/hackguide.doc ./doc/html/Ada95.html ./doc/html/NCURSES-Programming-HOWTO.html ./doc/html/ada/files.htm ./doc/html/ada/files/T.htm ./doc/html/ada/funcs.htm ./doc/html/ada/funcs/A.htm ./doc/html/ada/funcs/B.htm ./doc/html/ada/funcs/C.htm ./doc/html/ada/funcs/D.htm ./doc/html/ada/funcs/E.htm ./doc/html/ada/funcs/F.htm ./doc/html/ada/funcs/G.htm ./doc/html/ada/funcs/H.htm ./doc/html/ada/funcs/I.htm ./doc/html/ada/funcs/K.htm ./doc/html/ada/funcs/L.htm ./doc/html/ada/funcs/M.htm ./doc/html/ada/funcs/N.htm ./doc/html/ada/funcs/O.htm ./doc/html/ada/funcs/P.htm ./doc/html/ada/funcs/Q.htm ./doc/html/ada/funcs/R.htm ./doc/html/ada/funcs/S.htm ./doc/html/ada/funcs/T.htm ./doc/html/ada/funcs/U.htm ./doc/html/ada/funcs/V.htm ./doc/html/ada/funcs/W.htm ./doc/html/ada/index.htm ./doc/html/ada/main.htm ./doc/html/ada/table.html ./doc/html/ada/terminal_interface-curses-aux__adb.htm ./doc/html/ada/terminal_interface-curses-aux__ads.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-alpha__adb.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-alpha__ads.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-alphanumeric__adb.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-alphanumeric__ads.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-enumeration-ada__adb.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-enumeration-ada__ads.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-enumeration__adb.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-enumeration__ads.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-intfield__adb.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-intfield__ads.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-ipv4_address__adb.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-ipv4_address__ads.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-numeric__adb.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-numeric__ads.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-regexp__adb.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-regexp__ads.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-user-choice__adb.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-user-choice__ads.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-user__adb.htm ./doc/html/ada/terminal_interface-curses-forms-field_types-user__ads.htm ./doc/html/ada/terminal_interface-curses-forms-field_types__adb.htm ./doc/html/ada/terminal_interface-curses-forms-field_types__ads.htm ./doc/html/ada/terminal_interface-curses-forms-field_user_data__adb.htm ./doc/html/ada/terminal_interface-curses-forms-field_user_data__ads.htm ./doc/html/ada/terminal_interface-curses-forms-form_user_data__adb.htm ./doc/html/ada/terminal_interface-curses-forms-form_user_data__ads.htm ./doc/html/ada/terminal_interface-curses-forms__adb.htm ./doc/html/ada/terminal_interface-curses-forms__ads.htm ./doc/html/ada/terminal_interface-curses-menus-item_user_data__adb.htm ./doc/html/ada/terminal_interface-curses-menus-item_user_data__ads.htm ./doc/html/ada/terminal_interface-curses-menus-menu_user_data__adb.htm ./doc/html/ada/terminal_interface-curses-menus-menu_user_data__ads.htm ./doc/html/ada/terminal_interface-curses-menus__adb.htm ./doc/html/ada/terminal_interface-curses-menus__ads.htm ./doc/html/ada/terminal_interface-curses-mouse__adb.htm ./doc/html/ada/terminal_interface-curses-mouse__ads.htm ./doc/html/ada/terminal_interface-curses-panels-user_data__adb.htm ./doc/html/ada/terminal_interface-curses-panels-user_data__ads.htm ./doc/html/ada/terminal_interface-curses-panels__adb.htm ./doc/html/ada/terminal_interface-curses-panels__ads.htm ./doc/html/ada/terminal_interface-curses-putwin__adb.htm ./doc/html/ada/terminal_interface-curses-putwin__ads.htm ./doc/html/ada/terminal_interface-curses-termcap__adb.htm ./doc/html/ada/terminal_interface-curses-termcap__ads.htm ./doc/html/ada/terminal_interface-curses-terminfo__adb.htm ./doc/html/ada/terminal_interface-curses-terminfo__ads.htm ./doc/html/ada/terminal_interface-curses-text_io-aux__adb.htm ./doc/html/ada/terminal_interface-curses-text_io-aux__ads.htm ./doc/html/ada/terminal_interface-curses-text_io-complex_io__adb.htm ./doc/html/ada/terminal_interface-curses-text_io-complex_io__ads.htm ./doc/html/ada/terminal_interface-curses-text_io-decimal_io__adb.htm ./doc/html/ada/terminal_interface-curses-text_io-decimal_io__ads.htm ./doc/html/ada/terminal_interface-curses-text_io-enumeration_io__adb.htm ./doc/html/ada/terminal_interface-curses-text_io-enumeration_io__ads.htm ./doc/html/ada/terminal_interface-curses-text_io-fixed_io__adb.htm ./doc/html/ada/terminal_interface-curses-text_io-fixed_io__ads.htm ./doc/html/ada/terminal_interface-curses-text_io-float_io__adb.htm ./doc/html/ada/terminal_interface-curses-text_io-float_io__ads.htm ./doc/html/ada/terminal_interface-curses-text_io-integer_io__adb.htm ./doc/html/ada/terminal_interface-curses-text_io-integer_io__ads.htm ./doc/html/ada/terminal_interface-curses-text_io-modular_io__adb.htm ./doc/html/ada/terminal_interface-curses-text_io-modular_io__ads.htm ./doc/html/ada/terminal_interface-curses-text_io__adb.htm ./doc/html/ada/terminal_interface-curses-text_io__ads.htm ./doc/html/ada/terminal_interface-curses-trace__adb.htm ./doc/html/ada/terminal_interface-curses-trace__ads.htm ./doc/html/ada/terminal_interface-curses__adb.htm ./doc/html/ada/terminal_interface-curses__ads.htm ./doc/html/ada/terminal_interface-curses_constants__ads.htm ./doc/html/ada/terminal_interface__ads.htm ./doc/html/announce.html ./doc/html/hackguide.html ./doc/html/index.html ./doc/html/man/adacurses-config.1.html ./doc/html/man/captoinfo.1m.html ./doc/html/man/clear.1.html ./doc/html/man/curs_add_wch.3x.html ./doc/html/man/curs_add_wchstr.3x.html ./doc/html/man/curs_addch.3x.html ./doc/html/man/curs_addchstr.3x.html ./doc/html/man/curs_addstr.3x.html ./doc/html/man/curs_addwstr.3x.html ./doc/html/man/curs_attr.3x.html ./doc/html/man/curs_beep.3x.html ./doc/html/man/curs_bkgd.3x.html ./doc/html/man/curs_bkgrnd.3x.html ./doc/html/man/curs_border.3x.html ./doc/html/man/curs_border_set.3x.html ./doc/html/man/curs_clear.3x.html ./doc/html/man/curs_color.3x.html ./doc/html/man/curs_delch.3x.html ./doc/html/man/curs_deleteln.3x.html ./doc/html/man/curs_extend.3x.html ./doc/html/man/curs_get_wch.3x.html ./doc/html/man/curs_get_wstr.3x.html ./doc/html/man/curs_getcchar.3x.html ./doc/html/man/curs_getch.3x.html ./doc/html/man/curs_getstr.3x.html ./doc/html/man/curs_getyx.3x.html ./doc/html/man/curs_in_wch.3x.html ./doc/html/man/curs_in_wchstr.3x.html ./doc/html/man/curs_inch.3x.html ./doc/html/man/curs_inchstr.3x.html ./doc/html/man/curs_initscr.3x.html ./doc/html/man/curs_inopts.3x.html ./doc/html/man/curs_ins_wch.3x.html ./doc/html/man/curs_ins_wstr.3x.html ./doc/html/man/curs_insch.3x.html ./doc/html/man/curs_insstr.3x.html ./doc/html/man/curs_instr.3x.html ./doc/html/man/curs_inwstr.3x.html ./doc/html/man/curs_kernel.3x.html ./doc/html/man/curs_legacy.3x.html ./doc/html/man/curs_memleaks.3x.html ./doc/html/man/curs_mouse.3x.html ./doc/html/man/curs_move.3x.html ./doc/html/man/curs_opaque.3x.html ./doc/html/man/curs_outopts.3x.html ./doc/html/man/curs_overlay.3x.html ./doc/html/man/curs_pad.3x.html ./doc/html/man/curs_print.3x.html ./doc/html/man/curs_printw.3x.html ./doc/html/man/curs_refresh.3x.html ./doc/html/man/curs_scanw.3x.html ./doc/html/man/curs_scr_dump.3x.html ./doc/html/man/curs_scroll.3x.html ./doc/html/man/curs_slk.3x.html ./doc/html/man/curs_sp_funcs.3x.html ./doc/html/man/curs_termattrs.3x.html ./doc/html/man/curs_termcap.3x.html ./doc/html/man/curs_terminfo.3x.html ./doc/html/man/curs_threads.3x.html ./doc/html/man/curs_touch.3x.html ./doc/html/man/curs_trace.3x.html ./doc/html/man/curs_util.3x.html ./doc/html/man/curs_variables.3x.html ./doc/html/man/curs_window.3x.html ./doc/html/man/default_colors.3x.html ./doc/html/man/define_key.3x.html ./doc/html/man/form.3x.html ./doc/html/man/form_cursor.3x.html ./doc/html/man/form_data.3x.html ./doc/html/man/form_driver.3x.html ./doc/html/man/form_field.3x.html ./doc/html/man/form_field_attributes.3x.html ./doc/html/man/form_field_buffer.3x.html ./doc/html/man/form_field_info.3x.html ./doc/html/man/form_field_just.3x.html ./doc/html/man/form_field_new.3x.html ./doc/html/man/form_field_opts.3x.html ./doc/html/man/form_field_userptr.3x.html ./doc/html/man/form_field_validation.3x.html ./doc/html/man/form_fieldtype.3x.html ./doc/html/man/form_hook.3x.html ./doc/html/man/form_new.3x.html ./doc/html/man/form_new_page.3x.html ./doc/html/man/form_opts.3x.html ./doc/html/man/form_page.3x.html ./doc/html/man/form_post.3x.html ./doc/html/man/form_requestname.3x.html ./doc/html/man/form_userptr.3x.html ./doc/html/man/form_variables.3x.html ./doc/html/man/form_win.3x.html ./doc/html/man/index.html ./doc/html/man/infocmp.1m.html ./doc/html/man/infotocap.1m.html ./doc/html/man/key_defined.3x.html ./doc/html/man/keybound.3x.html ./doc/html/man/keyok.3x.html ./doc/html/man/legacy_coding.3x.html ./doc/html/man/menu.3x.html ./doc/html/man/menu_attributes.3x.html ./doc/html/man/menu_cursor.3x.html ./doc/html/man/menu_driver.3x.html ./doc/html/man/menu_format.3x.html ./doc/html/man/menu_hook.3x.html ./doc/html/man/menu_items.3x.html ./doc/html/man/menu_mark.3x.html ./doc/html/man/menu_new.3x.html ./doc/html/man/menu_opts.3x.html ./doc/html/man/menu_pattern.3x.html ./doc/html/man/menu_post.3x.html ./doc/html/man/menu_requestname.3x.html ./doc/html/man/menu_spacing.3x.html ./doc/html/man/menu_userptr.3x.html ./doc/html/man/menu_win.3x.html ./doc/html/man/mitem_current.3x.html ./doc/html/man/mitem_name.3x.html ./doc/html/man/mitem_new.3x.html ./doc/html/man/mitem_opts.3x.html ./doc/html/man/mitem_userptr.3x.html ./doc/html/man/mitem_value.3x.html ./doc/html/man/mitem_visible.3x.html ./doc/html/man/ncurses.3x.html ./doc/html/man/ncurses5-config.1.html ./doc/html/man/panel.3x.html ./doc/html/man/resizeterm.3x.html ./doc/html/man/tabs.1.html ./doc/html/man/term.5.html ./doc/html/man/term.7.html ./doc/html/man/term_variables.3x.html ./doc/html/man/terminfo.5.html ./doc/html/man/tic.1m.html ./doc/html/man/toe.1m.html ./doc/html/man/tput.1.html ./doc/html/man/tset.1.html ./doc/html/man/wresize.3x.html ./doc/html/ncurses-intro.html ./doc/ncurses-intro.doc ./form/Makefile.in ./form/READ.ME ./form/f_trace.c ./form/fld_arg.c ./form/fld_attr.c ./form/fld_current.c ./form/fld_def.c ./form/fld_dup.c ./form/fld_ftchoice.c ./form/fld_ftlink.c ./form/fld_info.c ./form/fld_just.c ./form/fld_link.c ./form/fld_max.c ./form/fld_move.c ./form/fld_newftyp.c ./form/fld_opts.c ./form/fld_pad.c ./form/fld_page.c ./form/fld_stat.c ./form/fld_type.c ./form/fld_user.c ./form/form.h ./form/form.priv.h ./form/frm_cursor.c ./form/frm_data.c ./form/frm_def.c ./form/frm_driver.c ./form/frm_hook.c ./form/frm_opts.c ./form/frm_page.c ./form/frm_post.c ./form/frm_req_name.c ./form/frm_scale.c ./form/frm_sub.c ./form/frm_user.c ./form/frm_win.c ./form/fty_alnum.c ./form/fty_alpha.c ./form/fty_enum.c ./form/fty_generic.c ./form/fty_int.c ./form/fty_ipv4.c ./form/fty_num.c ./form/fty_regex.c ./form/headers ./form/llib-lform ./form/llib-lformt ./form/llib-lformtw ./form/llib-lformw ./form/modules ./include/Caps ./include/Caps.aix4 ./include/Caps.hpux11 ./include/Caps.keys ./include/Caps.osf1r5 ./include/Caps.uwin ./include/MKhashsize.sh ./include/MKkey_defs.sh ./include/MKncurses_def.sh ./include/MKparametrized.sh ./include/MKterm.h.awk.in ./include/Makefile.in ./include/capdefaults.c ./include/curses.h.in ./include/curses.tail ./include/curses.wide ./include/edit_cfg.sh ./include/hashed_db.h ./include/headers ./include/nc_alloc.h ./include/nc_mingw.h ./include/nc_panel.h ./include/nc_string.h ./include/nc_termios.h ./include/nc_tparm.h ./include/ncurses_cfg.hin ./include/ncurses_defs ./include/ncurses_dll.h.in ./include/ncurses_mingw.h ./include/term_entry.h ./include/termcap.h.in ./include/tic.h ./include/unctrl.h.in ./install-sh ./man/MKada_config.in ./man/MKncu_config.in ./man/MKterminfo.sh ./man/Makefile.in ./man/captoinfo.1m ./man/clear.1 ./man/curs_add_wch.3x ./man/curs_add_wchstr.3x ./man/curs_addch.3x ./man/curs_addchstr.3x ./man/curs_addstr.3x ./man/curs_addwstr.3x ./man/curs_attr.3x ./man/curs_beep.3x ./man/curs_bkgd.3x ./man/curs_bkgrnd.3x ./man/curs_border.3x ./man/curs_border_set.3x ./man/curs_clear.3x ./man/curs_color.3x ./man/curs_delch.3x ./man/curs_deleteln.3x ./man/curs_extend.3x ./man/curs_get_wch.3x ./man/curs_get_wstr.3x ./man/curs_getcchar.3x ./man/curs_getch.3x ./man/curs_getstr.3x ./man/curs_getyx.3x ./man/curs_in_wch.3x ./man/curs_in_wchstr.3x ./man/curs_inch.3x ./man/curs_inchstr.3x ./man/curs_initscr.3x ./man/curs_inopts.3x ./man/curs_ins_wch.3x ./man/curs_ins_wstr.3x ./man/curs_insch.3x ./man/curs_insstr.3x ./man/curs_instr.3x ./man/curs_inwstr.3x ./man/curs_kernel.3x ./man/curs_legacy.3x ./man/curs_memleaks.3x ./man/curs_mouse.3x ./man/curs_move.3x ./man/curs_opaque.3x ./man/curs_outopts.3x ./man/curs_overlay.3x ./man/curs_pad.3x ./man/curs_print.3x ./man/curs_printw.3x ./man/curs_refresh.3x ./man/curs_scanw.3x ./man/curs_scr_dump.3x ./man/curs_scroll.3x ./man/curs_slk.3x ./man/curs_sp_funcs.3x ./man/curs_termattrs.3x ./man/curs_termcap.3x ./man/curs_terminfo.3x ./man/curs_threads.3x ./man/curs_touch.3x ./man/curs_trace.3x ./man/curs_util.3x ./man/curs_variables.3x ./man/curs_window.3x ./man/default_colors.3x ./man/define_key.3x ./man/form.3x ./man/form_cursor.3x ./man/form_data.3x ./man/form_driver.3x ./man/form_field.3x ./man/form_field_attributes.3x ./man/form_field_buffer.3x ./man/form_field_info.3x ./man/form_field_just.3x ./man/form_field_new.3x ./man/form_field_opts.3x ./man/form_field_userptr.3x ./man/form_field_validation.3x ./man/form_fieldtype.3x ./man/form_hook.3x ./man/form_new.3x ./man/form_new_page.3x ./man/form_opts.3x ./man/form_page.3x ./man/form_post.3x ./man/form_requestname.3x ./man/form_userptr.3x ./man/form_variables.3x ./man/form_win.3x ./man/infocmp.1m ./man/infotocap.1m ./man/key_defined.3x ./man/keybound.3x ./man/keyok.3x ./man/legacy_coding.3x ./man/make_sed.sh ./man/man_db.renames ./man/manhtml.aliases ./man/manhtml.externs ./man/manlinks.sed ./man/menu.3x ./man/menu_attributes.3x ./man/menu_cursor.3x ./man/menu_driver.3x ./man/menu_format.3x ./man/menu_hook.3x ./man/menu_items.3x ./man/menu_mark.3x ./man/menu_new.3x ./man/menu_opts.3x ./man/menu_pattern.3x ./man/menu_post.3x ./man/menu_requestname.3x ./man/menu_spacing.3x ./man/menu_userptr.3x ./man/menu_win.3x ./man/mitem_current.3x ./man/mitem_name.3x ./man/mitem_new.3x ./man/mitem_opts.3x ./man/mitem_userptr.3x ./man/mitem_value.3x ./man/mitem_visible.3x ./man/ncurses.3x ./man/panel.3x ./man/resizeterm.3x ./man/tabs.1 ./man/term.5 ./man/term.7 ./man/term_variables.3x ./man/terminfo.head ./man/terminfo.tail ./man/tic.1m ./man/toe.1m ./man/tput.1 ./man/tset.1 ./man/wresize.3x ./menu/Makefile.in ./menu/READ.ME ./menu/eti.h ./menu/headers ./menu/llib-lmenu ./menu/llib-lmenut ./menu/llib-lmenutw ./menu/llib-lmenuw ./menu/m_attribs.c ./menu/m_cursor.c ./menu/m_driver.c ./menu/m_format.c ./menu/m_global.c ./menu/m_hook.c ./menu/m_item_cur.c ./menu/m_item_nam.c ./menu/m_item_new.c ./menu/m_item_opt.c ./menu/m_item_top.c ./menu/m_item_use.c ./menu/m_item_val.c ./menu/m_item_vis.c ./menu/m_items.c ./menu/m_new.c ./menu/m_opts.c ./menu/m_pad.c ./menu/m_pattern.c ./menu/m_post.c ./menu/m_req_name.c ./menu/m_scale.c ./menu/m_spacing.c ./menu/m_sub.c ./menu/m_trace.c ./menu/m_userptr.c ./menu/m_win.c ./menu/menu.h ./menu/menu.priv.h ./menu/mf_common.h ./menu/modules ./misc/Makefile.in ./misc/chkdef.cmd ./misc/cleantic.cmd ./misc/cmpdef.cmd ./misc/csort ./misc/emx.src ./misc/form.def ./misc/form.ref ./misc/gen-pkgconfig.in ./misc/gen_edit.sh ./misc/magic ./misc/makedef.cmd ./misc/makellib ./misc/menu.def ./misc/menu.ref ./misc/ncurses-config.in ./misc/ncurses.def ./misc/ncurses.ref ./misc/ncurses.supp ./misc/panel.def ./misc/panel.ref ./misc/run_tic.in ./misc/shlib ./misc/tabset/std ./misc/tabset/stdcrt ./misc/tabset/vt100 ./misc/tabset/vt300 ./misc/tdlint ./misc/terminfo.src ./mk-0th.awk ./mk-1st.awk ./mk-2nd.awk ./mk-hdr.awk ./ncurses/Makefile.in ./ncurses/README ./ncurses/README.IZ ./ncurses/SigAction.h ./ncurses/base/MKkeyname.awk ./ncurses/base/MKlib_gen.sh ./ncurses/base/MKunctrl.awk ./ncurses/base/README ./ncurses/base/define_key.c ./ncurses/base/key_defined.c ./ncurses/base/keybound.c ./ncurses/base/keyok.c ./ncurses/base/legacy_coding.c ./ncurses/base/lib_addch.c ./ncurses/base/lib_addstr.c ./ncurses/base/lib_beep.c ./ncurses/base/lib_bkgd.c ./ncurses/base/lib_box.c ./ncurses/base/lib_chgat.c ./ncurses/base/lib_clear.c ./ncurses/base/lib_clearok.c ./ncurses/base/lib_clrbot.c ./ncurses/base/lib_clreol.c ./ncurses/base/lib_color.c ./ncurses/base/lib_colorset.c ./ncurses/base/lib_delch.c ./ncurses/base/lib_delwin.c ./ncurses/base/lib_dft_fgbg.c ./ncurses/base/lib_driver.c ./ncurses/base/lib_echo.c ./ncurses/base/lib_endwin.c ./ncurses/base/lib_erase.c ./ncurses/base/lib_flash.c ./ncurses/base/lib_freeall.c ./ncurses/base/lib_getch.c ./ncurses/base/lib_getstr.c ./ncurses/base/lib_hline.c ./ncurses/base/lib_immedok.c ./ncurses/base/lib_inchstr.c ./ncurses/base/lib_initscr.c ./ncurses/base/lib_insch.c ./ncurses/base/lib_insdel.c ./ncurses/base/lib_insnstr.c ./ncurses/base/lib_instr.c ./ncurses/base/lib_isendwin.c ./ncurses/base/lib_leaveok.c ./ncurses/base/lib_mouse.c ./ncurses/base/lib_move.c ./ncurses/base/lib_mvwin.c ./ncurses/base/lib_newterm.c ./ncurses/base/lib_newwin.c ./ncurses/base/lib_nl.c ./ncurses/base/lib_overlay.c ./ncurses/base/lib_pad.c ./ncurses/base/lib_printw.c ./ncurses/base/lib_redrawln.c ./ncurses/base/lib_refresh.c ./ncurses/base/lib_restart.c ./ncurses/base/lib_scanw.c ./ncurses/base/lib_screen.c ./ncurses/base/lib_scroll.c ./ncurses/base/lib_scrollok.c ./ncurses/base/lib_scrreg.c ./ncurses/base/lib_set_term.c ./ncurses/base/lib_slk.c ./ncurses/base/lib_slkatr_set.c ./ncurses/base/lib_slkatrof.c ./ncurses/base/lib_slkatron.c ./ncurses/base/lib_slkatrset.c ./ncurses/base/lib_slkattr.c ./ncurses/base/lib_slkclear.c ./ncurses/base/lib_slkcolor.c ./ncurses/base/lib_slkinit.c ./ncurses/base/lib_slklab.c ./ncurses/base/lib_slkrefr.c ./ncurses/base/lib_slkset.c ./ncurses/base/lib_slktouch.c ./ncurses/base/lib_touch.c ./ncurses/base/lib_ungetch.c ./ncurses/base/lib_vline.c ./ncurses/base/lib_wattroff.c ./ncurses/base/lib_wattron.c ./ncurses/base/lib_winch.c ./ncurses/base/lib_window.c ./ncurses/base/nc_panel.c ./ncurses/base/resizeterm.c ./ncurses/base/safe_sprintf.c ./ncurses/base/sigaction.c ./ncurses/base/tries.c ./ncurses/base/use_window.c ./ncurses/base/version.c ./ncurses/base/vsscanf.c ./ncurses/base/wresize.c ./ncurses/build.priv.h ./ncurses/curses.priv.h ./ncurses/fifo_defs.h ./ncurses/llib-lncurses ./ncurses/llib-lncursest ./ncurses/llib-lncursestw ./ncurses/llib-lncursesw ./ncurses/llib-ltic ./ncurses/llib-ltict ./ncurses/llib-ltictw ./ncurses/llib-lticw ./ncurses/llib-ltinfo ./ncurses/llib-ltinfot ./ncurses/llib-ltinfotw ./ncurses/llib-ltinfow ./ncurses/modules ./ncurses/tinfo/MKcaptab.awk ./ncurses/tinfo/MKcaptab.sh ./ncurses/tinfo/MKcodes.awk ./ncurses/tinfo/MKfallback.sh ./ncurses/tinfo/MKkeys_list.sh ./ncurses/tinfo/MKnames.awk ./ncurses/tinfo/README ./ncurses/tinfo/access.c ./ncurses/tinfo/add_tries.c ./ncurses/tinfo/alloc_entry.c ./ncurses/tinfo/alloc_ttype.c ./ncurses/tinfo/captoinfo.c ./ncurses/tinfo/comp_error.c ./ncurses/tinfo/comp_expand.c ./ncurses/tinfo/comp_hash.c ./ncurses/tinfo/comp_parse.c ./ncurses/tinfo/comp_scan.c ./ncurses/tinfo/db_iterator.c ./ncurses/tinfo/doalloc.c ./ncurses/tinfo/entries.c ./ncurses/tinfo/free_ttype.c ./ncurses/tinfo/getenv_num.c ./ncurses/tinfo/hashed_db.c ./ncurses/tinfo/home_terminfo.c ./ncurses/tinfo/init_keytry.c ./ncurses/tinfo/lib_acs.c ./ncurses/tinfo/lib_baudrate.c ./ncurses/tinfo/lib_cur_term.c ./ncurses/tinfo/lib_data.c ./ncurses/tinfo/lib_has_cap.c ./ncurses/tinfo/lib_kernel.c ./ncurses/tinfo/lib_longname.c ./ncurses/tinfo/lib_napms.c ./ncurses/tinfo/lib_options.c ./ncurses/tinfo/lib_print.c ./ncurses/tinfo/lib_raw.c ./ncurses/tinfo/lib_setup.c ./ncurses/tinfo/lib_termcap.c ./ncurses/tinfo/lib_termname.c ./ncurses/tinfo/lib_tgoto.c ./ncurses/tinfo/lib_ti.c ./ncurses/tinfo/lib_tparm.c ./ncurses/tinfo/lib_tputs.c ./ncurses/tinfo/lib_ttyflags.c ./ncurses/tinfo/make_hash.c ./ncurses/tinfo/make_keys.c ./ncurses/tinfo/name_match.c ./ncurses/tinfo/obsolete.c ./ncurses/tinfo/parse_entry.c ./ncurses/tinfo/read_entry.c ./ncurses/tinfo/read_termcap.c ./ncurses/tinfo/strings.c ./ncurses/tinfo/tinfo_driver.c ./ncurses/tinfo/trim_sgr0.c ./ncurses/tinfo/use_screen.c ./ncurses/tinfo/write_entry.c ./ncurses/trace/README ./ncurses/trace/lib_trace.c ./ncurses/trace/lib_traceatr.c ./ncurses/trace/lib_tracebits.c ./ncurses/trace/lib_tracechr.c ./ncurses/trace/lib_tracedmp.c ./ncurses/trace/lib_tracemse.c ./ncurses/trace/trace_buf.c ./ncurses/trace/trace_tries.c ./ncurses/trace/trace_xnames.c ./ncurses/trace/varargs.c ./ncurses/trace/visbuf.c ./ncurses/tty/MKexpanded.sh ./ncurses/tty/hardscroll.c ./ncurses/tty/hashmap.c ./ncurses/tty/lib_mvcur.c ./ncurses/tty/lib_tstp.c ./ncurses/tty/lib_twait.c ./ncurses/tty/lib_vidattr.c ./ncurses/tty/tty_update.c ./ncurses/wcwidth.h ./ncurses/widechar/charable.c ./ncurses/widechar/lib_add_wch.c ./ncurses/widechar/lib_box_set.c ./ncurses/widechar/lib_cchar.c ./ncurses/widechar/lib_erasewchar.c ./ncurses/widechar/lib_get_wch.c ./ncurses/widechar/lib_get_wstr.c ./ncurses/widechar/lib_hline_set.c ./ncurses/widechar/lib_in_wch.c ./ncurses/widechar/lib_in_wchnstr.c ./ncurses/widechar/lib_ins_wch.c ./ncurses/widechar/lib_inwstr.c ./ncurses/widechar/lib_key_name.c ./ncurses/widechar/lib_pecho_wchar.c ./ncurses/widechar/lib_slk_wset.c ./ncurses/widechar/lib_unget_wch.c ./ncurses/widechar/lib_vid_attr.c ./ncurses/widechar/lib_vline_set.c ./ncurses/widechar/lib_wacs.c ./ncurses/widechar/lib_wunctrl.c ./ncurses/widechar/widechars.c ./ncurses/win32con/gettimeofday.c ./ncurses/win32con/wcwidth.c ./ncurses/win32con/win_driver.c ./package/debian-mingw/changelog ./package/debian-mingw/compat ./package/debian-mingw/control ./package/debian-mingw/copyright ./package/debian-mingw/rules ./package/debian-mingw/source/format ./package/debian-mingw/watch ./package/debian-mingw64/changelog ./package/debian-mingw64/compat ./package/debian-mingw64/control ./package/debian-mingw64/copyright ./package/debian-mingw64/rules ./package/debian-mingw64/source/format ./package/debian-mingw64/watch ./package/debian/changelog ./package/debian/compat ./package/debian/control ./package/debian/copyright ./package/debian/rules ./package/debian/source/format ./package/debian/watch ./package/mingw-ncurses.nsi ./package/mingw-ncurses.spec ./package/ncurses.map ./package/ncurses.spec ./package/ncurses.sym ./package/ncursest.map ./package/ncursest.sym ./package/ncursestw.map ./package/ncursestw.sym ./package/ncursesw.map ./package/ncursesw.sym ./panel/Makefile.in ./panel/headers ./panel/llib-lpanel ./panel/llib-lpanelt ./panel/llib-lpaneltw ./panel/llib-lpanelw ./panel/modules ./panel/p_above.c ./panel/p_below.c ./panel/p_bottom.c ./panel/p_delete.c ./panel/p_hidden.c ./panel/p_hide.c ./panel/p_move.c ./panel/p_new.c ./panel/p_replace.c ./panel/p_show.c ./panel/p_top.c ./panel/p_update.c ./panel/p_user.c ./panel/p_win.c ./panel/panel.c ./panel/panel.h ./panel/panel.priv.h ./progs/MKtermsort.sh ./progs/Makefile.in ./progs/capconvert ./progs/clear.c ./progs/clear.sh ./progs/dump_entry.c ./progs/dump_entry.h ./progs/infocmp.c ./progs/modules ./progs/progs.priv.h ./progs/tabs.c ./progs/tic.c ./progs/toe.c ./progs/tparm_type.c ./progs/tparm_type.h ./progs/tput.c ./progs/transform.c ./progs/tset.c ./test/Makefile.in ./test/README ./test/aclocal.m4 ./test/background.c ./test/blue.c ./test/bs.6 ./test/bs.c ./test/bulgarian-utf8.txt ./test/cardfile.c ./test/cardfile.dat ./test/chgat.c ./test/clip_printw.c ./test/color_name.h ./test/color_set.c ./test/configure ./test/configure.in ./test/demo_altkeys.c ./test/demo_defkey.c ./test/demo_forms.c ./test/demo_forms.txt ./test/demo_keyok.c ./test/demo_menus.c ./test/demo_panels.c ./test/demo_termcap.c ./test/demo_terminfo.c ./test/ditto.c ./test/dots.c ./test/dots_curses.c ./test/dots_mvcur.c ./test/dots_termcap.c ./test/echochar.c ./test/edit_field.c ./test/edit_field.h ./test/filter.c ./test/firework.c ./test/firstlast.c ./test/foldkeys.c ./test/form_driver_w.c ./test/gdc.6 ./test/gdc.c ./test/hanoi.c ./test/hashtest.c ./test/inch_wide.c ./test/inchs.c ./test/ins_wide.c ./test/insdelln.c ./test/inserts.c ./test/key_names.c ./test/keynames.c ./test/knight.c ./test/linedata.h ./test/linux-color.dat ./test/listused.sh ./test/lrtest.c ./test/make-tar.sh ./test/mk-test.awk ./test/modules ./test/movewindow.c ./test/ncurses.c ./test/ncurses_tst.hin ./test/newdemo.c ./test/package/debian-mingw/compat ./test/package/debian-mingw/control ./test/package/debian-mingw/copyright ./test/package/debian-mingw/docs ./test/package/debian-mingw/rules ./test/package/debian-mingw/source/format ./test/package/debian-mingw/watch ./test/package/debian-mingw64/compat ./test/package/debian-mingw64/control ./test/package/debian-mingw64/copyright ./test/package/debian-mingw64/docs ./test/package/debian-mingw64/rules ./test/package/debian-mingw64/source/format ./test/package/debian-mingw64/watch ./test/package/debian/compat ./test/package/debian/control ./test/package/debian/copyright ./test/package/debian/docs ./test/package/debian/rules ./test/package/debian/source/format ./test/package/debian/watch ./test/package/mingw-ncurses-examples.spec ./test/package/ncurses-examples.spec ./test/programs ./test/railroad.c ./test/rain.c ./test/redraw.c ./test/savescreen.c ./test/savescreen.sh ./test/tclock.c ./test/test.priv.h ./test/test_add_wchstr.c ./test/test_addchstr.c ./test/test_addstr.c ./test/test_addwstr.c ./test/test_arrays.c ./test/test_get_wstr.c ./test/test_getstr.c ./test/test_instr.c ./test/test_inwstr.c ./test/test_opaque.c ./test/test_setupterm.c ./test/test_vid_puts.c ./test/test_vidputs.c ./test/testaddch.c ./test/testcurs.c ./test/testscanw.c ./test/tracemunch ./test/view.c ./test/widechars-utf8.txt ./test/widechars.h ./test/worm.c ./test/xmas.c ./test/xterm-16color.dat ./test/xterm-256color.dat ./test/xterm-88color.dat
@availability @availability_group Feature: availability_group In order to control student access to activities As a teacher I need to set group conditions which prevent student access Background: Given the following "courses" exist: | fullname | shortname | format | enablecompletion | | Course 1 | C1 | topics | 1 | And the following "users" exist: | username | | teacher1 | | student1 | And the following "course enrolments" exist: | user | course | role | | teacher1 | C1 | editingteacher | | student1 | C1 | student | @javascript Scenario: Test condition # Basic setup. Given I log in as "teacher1" And I am on "Course 1" course homepage with editing mode on # Start to add a Page. If there aren't any groups, there's no Group option. And I add a "Page" to section "1" And I expand all fieldsets And I click on "Add restriction..." "button" Then "Group" "button" should not exist in the "Add restriction..." "dialogue" And I click on "Cancel" "button" in the "Add restriction..." "dialogue" # Back to course page but add groups. Given the following "groups" exist: | name | course | idnumber | | G1 | C1 | GI1 | | G2 | C1 | GI2 | # This step used to be 'And I follow "C1"', but Chrome thinks the breadcrumb # is not clickable, so we'll go via the home page instead. And I am on "Course 1" course homepage And I add a "Page" to section "1" And I expand all fieldsets And I click on "Add restriction..." "button" Then "Group" "button" should exist in the "Add restriction..." "dialogue" # Page P1 any group. Given I click on "Group" "button" in the "Add restriction..." "dialogue" And I set the field "Group" to "(Any group)" And I click on ".availability-item .availability-eye img" "css_element" And I set the following fields to these values: | Name | P1 | | Description | x | | Page content | x | And I click on "Save and return to course" "button" # Page P2 with group G1. And I add a "Page" to section "2" And I set the following fields to these values: | Name | P2 | | Description | x | | Page content | x | And I expand all fieldsets And I click on "Add restriction..." "button" And I click on "Group" "button" in the "Add restriction..." "dialogue" And I set the field "Group" to "G1" And I click on ".availability-item .availability-eye img" "css_element" And I click on "Save and return to course" "button" # Page P3 with group G2 And I add a "Page" to section "3" And I set the following fields to these values: | Name | P3 | | Description | x | | Page content | x | And I expand all fieldsets And I click on "Add restriction..." "button" And I click on "Group" "button" in the "Add restriction..." "dialogue" And I set the field "Group" to "G2" And I click on ".availability-item .availability-eye img" "css_element" And I click on "Save and return to course" "button" # Log back in as student. When I log out And I log in as "student1" And I am on "Course 1" course homepage # No pages should appear yet. Then I should not see "P1" in the "region-main" "region" And I should not see "P2" in the "region-main" "region" And I should not see "P3" in the "region-main" "region" # Add to groups and log out/in again. Given the following "group members" exist: | user | group | | student1 | GI1 | And I log out And I log in as "student1" And I am on "Course 1" course homepage # P1 (any groups) and P2 should show but not P3. Then I should see "P1" in the "region-main" "region" And I should see "P2" in the "region-main" "region" And I should not see "P3" in the "region-main" "region"
Q: Context Output into CSV file I need to search 10-15 strings into the entire application codes(more than 10000 programs) so I have inserted the strings that i need to search in a text file "strings.text". I also need to know the previous and next line of the matched string line so I am using "Context 1" in the below script. However, the below script is giving output as only Matched String line. $content = Get-Content strings.txt ForEach ($Word in $content){ Get-ChildItem -recurse | Select-String -pattern $Word -Context 1 | Select- path,line,linenumber,filename | Export-csv -Path "\result_$word.csv" } Output: Path Line LineNumber FileName desktop\prog1.txt Server(xyz) 3 prog1.txt desktop\prog2.txt Server(xyz) 6 prog2.txt What I really want is: Path Line LineNumber FileName Connect 2 prog1.txt desktop\prog1.txt Server(xyz) 3 prog1.txt stop 4 prog1.txt Connect 8 prog2.txt desktop\prog2.txt Server(xyz) 9 prog2.txt stop 10 prog2.txt Can anyone please help how can I get this output? Please suggest if there is any other way to get the required output. A: If you want to export to a CSV you need to create separate objects for each CSV line. Try something like this: foreach ($Word in $content){ Get-ChildItem -Recurse | Select-String -Pattern $Word -Context 1 | ForEach-Object { New-Object -Type PSCustomObject -Property @{ Path = '' Line = $_.Context.PreContext[-1] LineNumber = $_.LineNumber - 1 Filename = $_.FileName } New-Object -Type PSCustomObject -Property @{ Path = $_.Path Line = $_.Line LineNumber = $_.LineNumber Filename = $_.FileName } New-Object -Type PSCustomObject -Property @{ Path = '' Line = $_.Context.PostContext[0] LineNumber = $_.LineNumber + 1 Filename = $_.FileName } } | Export-Csv -Path "\result_$word.csv" -NoType } $_.Context.PreContext[-1] is the last line of the pre-context, $_.Context.PostContext[0] is the first line of the post-context.
[Liver cirrhosis mortality in Mexico. I. Relevant epidemiological characteristics]. Previous studies have emphasized the impact of alcoholism on public health, especially on the incidence of liver cirrhosis, which ranks among one of the main causes of death in Mexico. Accordingly, the epidemiologic features of liver cirrhosis mortality (LCM) are examined, highlighting its historical trends, its geographical distribution and other risk factors like age and sex. The data show a consistently high LCM rate over time, male rates moving slightly up and female rates down. Proportional mortality has been increasing. The significant risk increment with age has determined LCM to be the leading cause of death for both sexes in the 30-64 years age group. A particularly interesting finding relates to the continuous excess of LCM seen in Mexico City and four surrounding states; on the contrary, in the northern states, LCM is considerably low. This difference is valid for women too. Comparing all states, a gradient of LCM rates from high to low mortality areas is observed. The social and health implications of LCM regional distribution demand the conduction of epidemiological studies to identify possible explanatory variables related to the pattern of alcohol consumption or other risk factors. Nonetheless, these data alone justify the implementation of an effective action plan in the high-risk areas to deal with this health problem, inherently associated with individual and social behaviors.
Q: Solve for a variable using expression involving sum of quantities I am trying to solve for h1 using function solve as in below code, Expression in solve equates sum of two expression. Both left hand and right hand side of expression is the sum of four quantities defined by n = 1 to 4. Can any body help in solving the following expression. Solve[ Sum[50*0.25*n*0.97*Exp[-h1*0.25*n], {n, 1, 4}] == Sum[0.5*0.25*n*0.97*(Exp[-h1*0.25*(n - 1)] - Exp[-h1*0.25*n]), {n, 1, 4}], h1] I am getting the error Solve::ratnz: Solve was unable to solve the system with inexact coefficients.The answer was obtained by solving a corresponding exact system and numericizing the result. >> A: As you mentioned in comments, you solved the equation using Excel, which to me indicates that you are looking for the real solution(s) to your equation. You can restrict the domain over which Solve looks for solutions to the reals (notice the third argument to Solve): Solve[ Sum[50*0.25*n*0.97*Exp[-h1*0.25*n], {n, 1, 4}] == Sum[0.5*0.25*n*0.97*(Exp[-h1*0.25*(n - 1)] - Exp[-h1*0.25*n]), {n, 1, 4}], h1, Reals ] (* Out: {{h1 -> 18.4605}} *) If you use exact numbers in your Solve expression, you can get an exact result, as well as avoid the warning you mentioned: Solve[ Sum[50*1/4*n*97/100*Exp[-h1*1/4*n], {n, 1, 4}] == Sum[1/2*1/4*n*97/100*(Exp[-h1*1/4*(n - 1)] - Exp[-h1*1/4*n]), {n, 1, 4}], h1, Reals ] (* Out: {{h1 -> 4 Log[101]}} *)
import {SVGObject, SVGStrokable} from "../svg/Interfaces"; import {SVGColor} from "../svg/Color"; import {Environment} from "../Env"; /** * Created by Josh on 2/22/17. * File for the Line svg object */ export namespace LineObj { //function for Lib export let initLine = (env:Environment.Env, args:any[]) => { return new Line(env.callLib(env, args[0].node, args[0].args), env.callLib(env, args[1].node, args[1].args), env.callLib(env, args[2].node, args[2].args), env.callLib(env, args[3].node, args[3].args) ); }; //two point, basic line export class Line implements SVGObject, SVGStrokable { public x1:number; public y1:number; public x2:number; public y2:number; public style:Object; public id?:string; constructor(x1:number, y1:number, x2:number, y2:number){ this.x1 = x1; this.y1 = y1; this.x2 = x2; this.y2 = y2; this.style = {stroke:"black", 'stroke-width':1}; } private styleStrFormat():string { let str = ''; for(let key in this.style){ str += `${key}="${this.style[key]}" `; } return str; } strFormat(): string { return `<line x1="${this.x1}" x2="${this.x2}" y1="${this.y1}" y2="${this.y2}" ${this.styleStrFormat()}/>`; } type(): string { return "Line"; } setStrokeWidth(width: number): void { this.style['stroke-width'] = width; } getStrokeWidth(): number { return this.style['stroke-width']; } setStrokeColor(color: SVGColor): void { this.style['stroke'] = color.strValue(); } getStrokeColor(): SVGColor { return this.style['stroke']; } } }
//(*InternalHeaders(MIDIAssociateDialog) #include <wx/intl.h> #include <wx/string.h> //*) #include "MIDIAssociateDialog.h" #include "MIDIListener.h" #include "Settings.h" //(*IdInit(MIDIAssociateDialog) const long MIDIAssociateDialog::ID_STATICTEXT5 = wxNewId(); const long MIDIAssociateDialog::ID_CHOICE4 = wxNewId(); const long MIDIAssociateDialog::ID_STATICTEXT4 = wxNewId(); const long MIDIAssociateDialog::ID_TEXTCTRL1 = wxNewId(); const long MIDIAssociateDialog::ID_STATICTEXT1 = wxNewId(); const long MIDIAssociateDialog::ID_CHOICE1 = wxNewId(); const long MIDIAssociateDialog::ID_STATICTEXT2 = wxNewId(); const long MIDIAssociateDialog::ID_CHOICE2 = wxNewId(); const long MIDIAssociateDialog::ID_STATICTEXT3 = wxNewId(); const long MIDIAssociateDialog::ID_CHOICE3 = wxNewId(); const long MIDIAssociateDialog::ID_STATICTEXT6 = wxNewId(); const long MIDIAssociateDialog::ID_CHOICE5 = wxNewId(); const long MIDIAssociateDialog::ID_BUTTON3 = wxNewId(); const long MIDIAssociateDialog::ID_BUTTON1 = wxNewId(); const long MIDIAssociateDialog::ID_BUTTON2 = wxNewId(); //*) BEGIN_EVENT_TABLE(MIDIAssociateDialog,wxDialog) //(*EventTable(MIDIAssociateDialog) //*) EVT_COMMAND(wxID_ANY, EVT_MIDI, MIDIAssociateDialog::OnMIDIEvent) END_EVENT_TABLE() MIDIAssociateDialog::MIDIAssociateDialog(wxWindow* parent, std::list<MIDIListener*>& midiListeners, std::string controlName, int status, int channel, int data1, int data2, const std::string& midiDevice, wxWindowID id, const wxPoint& pos, const wxSize& size) : _midiListeners(midiListeners) { //(*Initialize(MIDIAssociateDialog) wxFlexGridSizer* FlexGridSizer1; wxFlexGridSizer* FlexGridSizer2; wxFlexGridSizer* FlexGridSizer3; Create(parent, id, _("Map MIDI"), wxDefaultPosition, wxDefaultSize, wxCAPTION|wxRESIZE_BORDER|wxMAXIMIZE_BOX, _T("id")); SetClientSize(wxDefaultSize); Move(wxDefaultPosition); FlexGridSizer1 = new wxFlexGridSizer(0, 1, 0, 0); FlexGridSizer1->AddGrowableCol(0); FlexGridSizer3 = new wxFlexGridSizer(0, 2, 0, 0); FlexGridSizer3->AddGrowableCol(1); StaticText5 = new wxStaticText(this, ID_STATICTEXT5, _("Midi Device:"), wxDefaultPosition, wxDefaultSize, 0, _T("ID_STATICTEXT5")); FlexGridSizer3->Add(StaticText5, 1, wxALL|wxALIGN_LEFT|wxALIGN_CENTER_VERTICAL, 5); Choice_MIDIDevice = new wxChoice(this, ID_CHOICE4, wxDefaultPosition, wxDefaultSize, 0, 0, 0, wxDefaultValidator, _T("ID_CHOICE4")); FlexGridSizer3->Add(Choice_MIDIDevice, 1, wxALL|wxEXPAND, 5); StaticText4 = new wxStaticText(this, ID_STATICTEXT4, _("Key Code:"), wxDefaultPosition, wxDefaultSize, 0, _T("ID_STATICTEXT4")); FlexGridSizer3->Add(StaticText4, 1, wxALL|wxALIGN_LEFT|wxALIGN_CENTER_VERTICAL, 5); TextCtrl_KeyCode = new wxTextCtrl(this, ID_TEXTCTRL1, wxEmptyString, wxDefaultPosition, wxDefaultSize, wxTE_READONLY, wxDefaultValidator, _T("ID_TEXTCTRL1")); FlexGridSizer3->Add(TextCtrl_KeyCode, 1, wxALL|wxEXPAND, 5); StaticText1 = new wxStaticText(this, ID_STATICTEXT1, _("Status:"), wxDefaultPosition, wxDefaultSize, 0, _T("ID_STATICTEXT1")); FlexGridSizer3->Add(StaticText1, 1, wxALL|wxALIGN_LEFT|wxALIGN_CENTER_VERTICAL, 5); Choice_Status = new wxChoice(this, ID_CHOICE1, wxDefaultPosition, wxDefaultSize, 0, 0, 0, wxDefaultValidator, _T("ID_CHOICE1")); FlexGridSizer3->Add(Choice_Status, 1, wxALL|wxEXPAND, 5); StaticText2 = new wxStaticText(this, ID_STATICTEXT2, _("Channel:"), wxDefaultPosition, wxDefaultSize, 0, _T("ID_STATICTEXT2")); FlexGridSizer3->Add(StaticText2, 1, wxALL|wxALIGN_LEFT|wxALIGN_CENTER_VERTICAL, 5); Choice_Channel = new wxChoice(this, ID_CHOICE2, wxDefaultPosition, wxDefaultSize, 0, 0, 0, wxDefaultValidator, _T("ID_CHOICE2")); FlexGridSizer3->Add(Choice_Channel, 1, wxALL|wxEXPAND, 5); StaticText3 = new wxStaticText(this, ID_STATICTEXT3, _("Data1:"), wxDefaultPosition, wxDefaultSize, 0, _T("ID_STATICTEXT3")); FlexGridSizer3->Add(StaticText3, 1, wxALL|wxALIGN_LEFT|wxALIGN_CENTER_VERTICAL, 5); Choice_Data1 = new wxChoice(this, ID_CHOICE3, wxDefaultPosition, wxDefaultSize, 0, 0, 0, wxDefaultValidator, _T("ID_CHOICE3")); FlexGridSizer3->Add(Choice_Data1, 1, wxALL|wxEXPAND, 5); StaticText6 = new wxStaticText(this, ID_STATICTEXT6, _("Data2:"), wxDefaultPosition, wxDefaultSize, 0, _T("ID_STATICTEXT6")); FlexGridSizer3->Add(StaticText6, 1, wxALL|wxALIGN_LEFT|wxALIGN_CENTER_VERTICAL, 5); Choice_Data2 = new wxChoice(this, ID_CHOICE5, wxDefaultPosition, wxDefaultSize, 0, 0, 0, wxDefaultValidator, _T("ID_CHOICE5")); FlexGridSizer3->Add(Choice_Data2, 1, wxALL|wxEXPAND, 5); FlexGridSizer3->Add(-1,-1,1, wxALL|wxALIGN_CENTER_HORIZONTAL|wxALIGN_CENTER_VERTICAL, 5); Button_Scan = new wxButton(this, ID_BUTTON3, _("Scan"), wxDefaultPosition, wxDefaultSize, 0, wxDefaultValidator, _T("ID_BUTTON3")); FlexGridSizer3->Add(Button_Scan, 1, wxALL|wxALIGN_CENTER_HORIZONTAL|wxALIGN_CENTER_VERTICAL, 5); FlexGridSizer1->Add(FlexGridSizer3, 1, wxALL|wxEXPAND, 5); FlexGridSizer2 = new wxFlexGridSizer(0, 3, 0, 0); Button_Ok = new wxButton(this, ID_BUTTON1, _("Ok"), wxDefaultPosition, wxDefaultSize, 0, wxDefaultValidator, _T("ID_BUTTON1")); FlexGridSizer2->Add(Button_Ok, 1, wxALL|wxALIGN_CENTER_HORIZONTAL|wxALIGN_CENTER_VERTICAL, 5); Button_Cancel = new wxButton(this, ID_BUTTON2, _("Cancel"), wxDefaultPosition, wxDefaultSize, 0, wxDefaultValidator, _T("ID_BUTTON2")); FlexGridSizer2->Add(Button_Cancel, 1, wxALL|wxALIGN_CENTER_HORIZONTAL|wxALIGN_CENTER_VERTICAL, 5); FlexGridSizer1->Add(FlexGridSizer2, 1, wxALL|wxALIGN_CENTER_HORIZONTAL|wxALIGN_CENTER_VERTICAL, 5); SetSizer(FlexGridSizer1); FlexGridSizer1->Fit(this); FlexGridSizer1->SetSizeHints(this); Connect(ID_BUTTON3,wxEVT_COMMAND_BUTTON_CLICKED,(wxObjectEventFunction)&MIDIAssociateDialog::OnButton_ScanClick); Connect(ID_BUTTON1,wxEVT_COMMAND_BUTTON_CLICKED,(wxObjectEventFunction)&MIDIAssociateDialog::OnButton_OkClick); Connect(ID_BUTTON2,wxEVT_COMMAND_BUTTON_CLICKED,(wxObjectEventFunction)&MIDIAssociateDialog::OnButton_CancelClick); //*) TextCtrl_KeyCode->SetValue(controlName); Choice_Status->Append("0x8n - Note Off"); Choice_Status->Append("0x9n - Note On"); Choice_Status->Append("0xAn - Polyphonic Key Pressure"); Choice_Status->Append("0xBn - Control Change"); Choice_Status->Append("0xCn - Program Change"); Choice_Status->Append("0xDn - Channel Pressure"); Choice_Status->Append("0xEn - Pitch Bend"); Choice_Status->SetSelection(1); for (int i = 0; i < 16; i++) { Choice_Channel->Append(wxString::Format("0x0%X", i)); } Choice_Channel->Append("ANY"); Choice_Channel->SetSelection(0); for (int i = 0; i < 256; i++) { Choice_Data1->Append(wxString::Format("0x%02X", i)); Choice_Data2->Append(wxString::Format("0x%02X", i)); } Choice_Data1->Append("ANY"); Choice_Data1->Append("Not 0x00"); Choice_Data1->SetSelection(0); Choice_Data2->Append("ANY"); Choice_Data2->Append("Not 0x00"); Choice_Data2->SetSelection(0); Choice_Status->SetSelection((status >> 4) - 8); Choice_Channel->SetSelection(channel); Choice_Data1->SetSelection(data1); Choice_Data2->SetSelection(data2); for (auto device : Settings::GetMIDIDevices()) { Choice_MIDIDevice->Append(device); } Choice_MIDIDevice->SetSelection(0); if (midiDevice != "") { Choice_MIDIDevice->SetStringSelection(midiDevice); } for (auto it : Settings::GetMIDIDevices()) { int d = Settings::GetMIDIDeviceId(it); bool found = false; for (auto it1 : _midiListeners) { if (it1->GetDeviceId() == d) { found = true; break; } } if (!found) { // Temporarily add listers so we can scan any device _midiListeners.push_back(new MIDIListener(d, GetParent())); } } } MIDIAssociateDialog::~MIDIAssociateDialog() { //(*Destroy(MIDIAssociateDialog) //*) } void MIDIAssociateDialog::OnButton_CancelClick(wxCommandEvent& event) { if (!Button_Scan->IsEnabled()) { SetTempWindow(nullptr); } EndDialog(wxID_CANCEL); } void MIDIAssociateDialog::OnButton_OkClick(wxCommandEvent& event) { if (!Button_Scan->IsEnabled()) { SetTempWindow(nullptr); } EndDialog(wxID_OK); } void MIDIAssociateDialog::OnButton_ScanClick(wxCommandEvent& event) { SetTempWindow(this); Button_Scan->Disable(); } void MIDIAssociateDialog::SetTempWindow(wxWindow* window) { for (auto it : _midiListeners) { if (window == nullptr) { it->ClearTempWindow(); } else { it->SetTempWindow(this); } } } void MIDIAssociateDialog::OnMIDIEvent(wxCommandEvent& event) { if (Button_Scan->IsEnabled()) return; Button_Scan->Enable(); SetTempWindow(nullptr); uint8_t status = (event.GetInt() >> 24) & 0xFF; uint8_t channel = (event.GetInt() >> 16) & 0xFF; uint8_t data1 = (event.GetInt() >> 8) & 0xFF; uint8_t data2 = event.GetInt() & 0xFF; Choice_Status->SetSelection(((status & 0xF0) >> 4) - 8); Choice_Channel->SetSelection(channel); Choice_Data1->SetSelection(data1); Choice_Data2->SetSelection(256); }
Utility of the mild brain injury atypical symptoms scale as a screening measure for symptom over-reporting in operation enduring freedom/operation iraqi freedom service members with post-concussive complaints. Evaluation of post-deployment conditions such as post-concussive syndrome (PCS) and posttraumatic stress disorder (PTSD) frequently relies upon brief, self-report checklists which are face valid and highly susceptible to potential symptom validity issues such as symptom exaggeration. We investigated the psychometric prope1rties of a 5-item measure of symptom exaggeration (mild brain injury atypical symptoms [mBIAS] scale) embedded in commonly used PCS and PTSD screening instruments in a sample of 403 patients seen in a brain injury clinic at a large military medical center. Exploratory factor analysis, examining measures of posttraumatic stress, post-concussive symptoms, and symptom over-reporting revealed a 6-factor model with the mBIAS scale items representing a unique factor. Analysis of psychometric properties demonstrated that a score of 8 on the mBIAS was optimal for the detection of symptom over-reporting (sensitivity = 0.94, specificity = 0.92) and appears to be the most favorable cut score for interpretive use. The findings provide a strong initial support for the use of the mBIAS in post-deployment populations.
Monday, March 3, 2008 I DID NOT GO SEE THIS MOVIE. Yet I am still compelled to write about it basically beacause I feel I have seen enough of it in previews. Basically, this movie is about a chick cursed to be born with a pig's nose. She is hideious and any guy that sees her runs. Until she meets the sensitive musician. Her parent try to by her love but at the end of the day all she needed to do was show her personallity. In the movie America falls in love with her and she becomes an icon. Children emulate her and dress as pigs for Halloween. She is the greatest thing since sliced bread. Well basically the pig's nose thing disgusts me and I don't want to watch a movie with that thing in my face the whole time. Second I had acne in High School and I was ridiculed for that imagine if I had a pig's nose. America wouldn't love me they would laugh really hard at my expense. This movie is basically fairy tale utopian garbage. This is going to give kids a false since of hope and they will be beaten twice as badly because of this movie. For the love of you children don't go see this movie. If you are the fan of the movie and are complaining about a review from someone who didn't even see the movie, take your fake picture off of the Internet and show everyone your ugly mug. And yes I know that was a run on sentence.
Q: Returning id from Ajax generated DOM elements I know there is a duplicate (jQuery: How to get ID of dynamically generated element?) but I tried the solution and I couldn't fix my problem. An ajax/jquery query has returned a table which when inspected returns a properly formed table: <table border="1"> <tbody> <tr><td>Example</td><td class="del" id="1">Delete</td></tr> <tr><td>Example2</td><td class="del" id="2">Delete</td></tr> </tbody> </table> The jquery code is: $('.del').click(function(){ var id = $(this).attr("id"); alert(id); }); If I put the table directly in the HTML it works fine however when it it generated from the ajax it doesn't even generate an alert (and chrome doesn't return an error). NB I appologise in advance if it is something stupid like a misnamed id but I have been trying to figure this out for 3/4 hour and am stuck! Edit: The ajax call is: $.ajax({type : 'POST', url : 'response.php'}).done(function(response){ $('#result').html(response); }); A: Rewrite your javascript as follows $(document).on("click", ".del", function(){ var id = $(this).attr("id"); alert(id); }); // jQuery 1.7+ Please refer to following article for detail http://api.jquery.com/on/
Stephen Lang Stephen Lang is an actor and a playwright. His extensive Broadway credits include his Tony-nominated performance in The Speed of Darkness, Happy Loman opposite Dustin Hoffman in Death of a Salesman, A Few Good Men, and Wait Until Dark. Onscreen Stephen is perhaps best known for his roles in Avatar and Gods and Generals; he has also appeared in such films and television shows as Last Exit to Brooklyn, Tombstone, Gettysburg, Public Enemies, and The Men Who Stare at Goats. His one-man show, Beyond Glory, which he wrote, has been performed in Virginia, Chicago, and New York, as well as on a USO tour to military bases and battleships. In the fall of 2010, Stephen received the Patriot Award from the Medal of Honor Society in honor of his theatrical and charitable works for the United States military. Stephen lives in New York and is married to costume designer Kristina Watson. In his own words: “Your primary tools, as an actor, are observation and imagination. You can pretty much get everything you need from that, and you do.” To buy this writer’s work from our bookselling partner, Bookshop, click below. Doing so will also generate income for House of SpeakEasy Foundation – another way we’re connecting you, and underserved communities of New York City, with the best writing of today. BUY NOW Click below for more: https://www.houseofspeakeasy.org/stephen-lang-an-actor-prepares/
Role of central nervous system neurotransmitters in mediating the effects of morphine on growth hormone- and prolactin-secretion in the rat. Unanesthetized adult male rats with indwelling right atrial cannulae were used in the majority of experiments. Morphine (MOR, 3.0 mg/kg) caused a large but transient increase in both GH and PRL levels, which could be prevented with naloxone. Disruption of central noradrenergic function with diethyldithiocarbamate (400 mg/kg) or phenoxybenzamine (15 mg/kg) abolished the GH-releasing effect of MOR, without interfering with the PRL secretory response. Depletion of brain serotonin stores with p-chlorophenylalanine (300 mg/kg) or 5,7-dihydroxytryptamine or administration of serotonin receptor blocker, cyproheptadine (2.5 mg/kg), did not diminish the GH respnse to MOR but it inhibited, or in the case of 5,7-DHT treatment abolished the activation of PRL secretion. Additionally, metergoline (0.1 and 1.0 mg/kg), another serotonin receptor blocker, caused an inhibition of the GH-releasing action of MOR; however, this inhibition was reversed by pretreatment with spiroperidol (0.1 mg/kg). Metergoline also markedly diminished the MOR-induced elevation of PRL. Inhibition of catecholamine synthesis with alpha-methyl-p-tyrosine (alpha-MT, 250 mg/kg) blunted the effect of MOR on GH; however, dopamine receptor blockers, spiroperidol (0.01 and 0.1 mg/kg) or (+)butaclamol (0.3 and 1.3 mg/kg), were without any influence. alpha-MT or spiroperidol did not alter the effect of MOR on PRL secretion, but the higher dose of (+)butaclamol suppressed it. It is concluded that the GH-releasing action of MOR requires unimpaired functioning of the central noradrenergic system, while the serotonergic and dopaminergic systems appear to play no significant role in it. In contrast, serotonergic systems seem to be essential for the activation of PRL secretion, whereas the noradrenergic system is not involved. It remains uncertain whether morphine activtes PRL secretion also through inhibition of dopaminergic activity. We favor the view that the dopaminergic component participates in the PRL activation by MOR, but that its contribution to the overall effect is rather small.
is the nearest to w? (a) q (b) 1 (c) -4 b Let n = 2185 - 45883/21. Let r = 1 + -4. Which is the closest to n? (a) -1 (b) 1 (c) r b Let m = -5944 - -5944.2. Which is the nearest to 2/7? (a) m (b) 1 (c) 0.5 (d) -94 a Let z be ((-3)/6)/(1/(-1)). Let c = -1.708 + 0.238. Let k = -0.53 + c. What is the closest to z in k, -1, -0.1? -0.1 Let n = -2151 - -1977.3. Let i = -174 - n. Let x = -0.4 - -0.8. What is the nearest to 0.2 in -5, x, i? x Let o = -180749/3 + 60247. Let l = -17/435 + 5/29. What is the nearest to o in 0, l, 0.02? 0 Let i = 971/10710 + 17/630. What is the closest to 1 in 0.3, -14, i? 0.3 Let q = -1700/17409 - -2/829. Let c = 10 - 10.03. Let a = -0.13 - c. What is the closest to 2/3 in -1/8, a, q? q Let p = 137.1 + -10.1. Let u = 126 - p. What is the nearest to u in -5, 5, 0.07? 0.07 Let u = 15237 + -15242. Let b = 5 + -7. What is the closest to u in 1/3, b, -3? -3 Let p = 3 + 20. Let z = p - 23.014. Let c = -0.046 + z. What is the nearest to 0 in c, -0.4, 2/9? c Let t be (-24)/105 + 1/(-5). Let u be -5*(-6)/9*42/(-28). What is the closest to 0.8 in t, -3, u? t Let a = -0.172 - -4.172. Let k = 67.05 + -0.05. Let r = k + -72. What is the closest to r in 2/7, a, -2/11? -2/11 Let q = -7 - -37. Let s = -29.9 + q. Let z = -96.4 + 96. Which is the nearest to -2? (a) 0.3 (b) z (c) s b Let d = -7.95 + 8.05. Let a = -0.4 - -3.4. Suppose -4*x = -4 - 4. What is the nearest to d in a, x, -4/7? -4/7 Let m = 46.22 - 44. Let k = m + -0.02. Let j = 2.1 - k. What is the nearest to j in 2, -4, 0? 0 Let v be (1 - 2) + (4 - (-59)/(-19)). Let t = -316/5 - -63. Which is the closest to 1/3? (a) 0.3 (b) t (c) v a Let w = -33 + 32.886. Let r = -0.072 - w. Let v = r - -0.158. Which is the nearest to 2/87? (a) -4 (b) -3/4 (c) v c Let o = -527/8 - -66. Let j = 8263 + -8263. Which is the closest to -3/8? (a) o (b) -1/3 (c) j (d) 3 b Suppose -2*w = -6*w + 12. Let l be (w/(-14))/((-9)/12). Let d = -1263/28 + 314/7. Which is the nearest to -0.1? (a) -1 (b) l (c) d c Suppose 71*x - 76*x + 3*o = 4, -2*x = 3*o - 11. Let t = -30 - -25. What is the nearest to -0.23 in -0.3, x, t? -0.3 Let y be (-1)/((-1534)/118 + (-144)/(-11)). Which is the nearest to -5? (a) y (b) 2/11 (c) -1/5 c Let f = -3 + 10/3. Let q = 53352 - 53356. What is the nearest to 1 in f, q, -3, 0? f Let p = -10.414 - -0.114. Let i = -56.3 - p. Let s = -46.6 - i. Which is the closest to -1? (a) 0 (b) s (c) 0.5 b Let q = 0.211 + 139.789. Let l = -140 + q. Which is the nearest to l? (a) 1/4 (b) 2 (c) 4 a Let v be (-252)/30 - 3/5. Let p be (-12)/(-8)*(-2)/v. Let r be ((-36)/144)/((-4)/(-2)). Which is the nearest to -3/4? (a) p (b) -0.3 (c) r b Let t = -0.4191 - -2.4191. Which is the nearest to -0.2? (a) t (b) 1.8 (c) -2/3 c Let p = 2004 - 2003.9. Suppose -4*i = 5*n - 3 + 4, 5*i + 5*n = 0. What is the nearest to 0 in i, p, -11? p Let m = 55 + -33. Suppose 7 - m = 5*f. Let k = 19093 - 19088. Which is the nearest to -2/5? (a) k (b) 10 (c) f c Suppose 3*o + o = 0. Suppose 3*r = -s - 2 + 42, 120 = 5*s - r. Let n = 96232 + -96237. Which is the closest to o? (a) s (b) 0.1 (c) n b Let x = -3553 + 3551. Which is the nearest to x? (a) -4 (b) 0.13 (c) -0.2 c Let j = -11752.05 + 11752. What is the closest to 0 in j, -1, -3/2? j Let s be -17 - -15 - 112/(-70). Which is the closest to -365? (a) 2/7 (b) -5 (c) s b Let u = 732 - 736. Suppose 357 = 5*g - k + 33, -g = -k - 68. Let f be -2 - (0 - g/36). Which is the closest to u? (a) 0.3 (b) 4 (c) f c Suppose -23 = -88*m + 83*m + z, 4*z = m + 3. Suppose m*n - 88 = -78. Let f = -3/2 + 13/6. Which is the closest to f? (a) -0.3 (b) n (c) 5/4 c Let t = 4026 - 4027.5. Which is the closest to -2/5? (a) 0.02 (b) 4/5 (c) t a Let m = -0.08 - 0.92. Let u = -267/2 + 134. Let j be 1/1 - (-2)/6. What is the nearest to u in m, -3, j? j Let j(t) = -t**3 - 5*t**2 + 6*t + 1. Suppose 3*l = 2*l - 6. Let g be j(l). Let v = 0.2056 - 0.2056. Which is the closest to -0.2? (a) v (b) 0.3 (c) g a Let i = -15768 - -15767. What is the nearest to i in 51.5, 0.1, -3, 2/5? 0.1 Let t = -291.74 - -287. Let s = 1.74 + t. Which is the nearest to 2/7? (a) s (b) -2/9 (c) 1/7 (d) -1/3 c Let g = 588 + -2938/5. What is the nearest to -38 in 0.5, 0.21, g? 0.21 Suppose -1425 = 22*v + 4229. Let o = -252 - v. Which is the closest to -2? (a) o (b) 7 (c) -0.2 (d) -1 d Let c = 1180 - 1139. What is the closest to 0 in 0.4, c, -1? 0.4 Let z = -1/68 - 4/17. Let j = 121.634 - 120.634. Which is the nearest to z? (a) -3 (b) 4 (c) j (d) -4 c Let c = 3219.3 + -3220. What is the closest to 1 in c, 2, 1/2, 4? 1/2 Let g = -1171.3 + 1170.8. What is the nearest to -0.113 in g, -2/13, 3? -2/13 Suppose -341*q + 55*q + 572 = 0. Which is the nearest to 3/7? (a) 2/13 (b) q (c) -1 (d) 2/201 a Let q be 1/13 + 99856/(-208). What is the closest to q in -1, 1, 2? -1 Let x be (608/(-48) - -17) + -4. Which is the nearest to -10/9? (a) x (b) 1/4 (c) 7 (d) 2/9 d Let q = 15486 - 15486. Which is the closest to q? (a) -5 (b) 7/4 (c) -0.2 (d) -33 c Let l = 275/72 + -27/8. Suppose -20*q - 64 = -24*q. Let h be ((-24)/32)/((-30)/q). What is the closest to -0.2 in -8, h, l? h Let w = -0.91283 + 0.41283. What is the closest to 6/137 in -2, w, -12? w Let m = 0.059 - -0.241. Which is the closest to 0.04? (a) 5 (b) -0.4 (c) m (d) 0.4 c Let c = 0.9367 - 681.0367. Let l = 680 + c. What is the closest to l in 1/9, -2/25, 0.1? -2/25 Let d = 15.11 - 15.51. Which is the nearest to -1? (a) 44 (b) d (c) -5 b Let d = 29422.2 - 29422. Let t be (-1)/(-4) + (-42)/104. Which is the closest to -2? (a) d (b) -1/5 (c) t b Let w = -2651.21 - -2616. Let z = 35 + w. Let h = -4.21 - z. Which is the closest to h? (a) 0.2 (b) -0.3 (c) 0.4 b Let j = -146.32 - -146.82. What is the closest to 1 in -9, 2, -5, j? j Let i = 381.84 - 381.64. What is the nearest to 1 in -0.8, i, 0.01? i Let g = -660 - -748. Let v be 38/g - (-66)/(-264). What is the nearest to -0.2 in -2/7, 0.5, v, 0? -2/7 Let j = -25 - -24.9. Let f = -3 + -1. Suppose -1388*x + 11 = -1389*x + d, -d + 10 = 0. Which is the closest to j? (a) -2.3 (b) x (c) f b Let m = 19.1 + -19. Suppose -65 = 34*u + 3. What is the nearest to 0.1 in 2, u, m? m Let u = -109973/6 - -18329. Which is the nearest to -0.1? (a) -3/4 (b) u (c) 0 (d) -6 c Suppose 5*d = 2*v + v + 22, -3*v - 4 = 4*d. Let y be 7/(-112)*-2 + 3/(-216). Let i be ((-1)/2)/((-8)/(-16)). What is the nearest to 1 in y, i, d? y Let y = 59 + -90. Let r = y - -61/2. Let s be (-29)/((-1624)/(-240)) - -4. Which is the nearest to r? (a) -4 (b) s (c) -5 b Let n = -0.4273329 + 0.0273329. Let u = -4.08 + 0.08. Which is the nearest to 5? (a) -5 (b) n (c) u (d) -0.04 d Let h be 8 + 220/(-30) + (-2 - (-15004)/11262). What is the nearest to 0.2 in -1/3, 2/15, -0.1, h? 2/15 Let o be (-6)/1 - (-4 + 0). Let j = -9094 + 9094.1. Which is the closest to j? (a) -0.1 (b) o (c) 2/7 (d) -36 c Let j = -1.08 + 0.81. Let z = 1.73 - j. Which is the closest to 3? (a) -4/7 (b) 0.19 (c) z c Suppose -4*n + 2*n - 2 = -4*d, -5*d + n + 10 = 0. Let m be 1/((-9)/4)*549/366. Let s be (-2)/6 - (-26)/60. What is the closest to d in m, 3, s? 3 Suppose y + 0*y = 4, 2*v = 3*y - 192. Let l be 2/3 + (-336)/v + -4. What is the nearest to l in -2, -4, 2? 2 Let j = -4492 + 4493. What is the nearest to -32 in 1/2, j, 0? 0 Suppose 0*o - 59 = -2*o + 3*k, -5*k = 5*o - 185. Suppose -5*i + 8 = 2*m, 4*m + 33*i - 16 = o*i. Which is the closest to -3? (a) -3 (b) 2 (c) m (d) -4 a Let p = -2.14868 - -0.14868. Which is the closest to -3.6? (a) p (b) -3/8 (c) 0 (d) 1/2 a Let m = -819 + 857.9. Let z = -39 + m. Let d = -14 - -15. Which is the closest to z? (a) d (b) -7 (c) -1/2 c Let a = -1.08 + -1.92. What is the nearest to 0.1 in a, 0.3, 4, 1? 0.3 Let t = -10673 + 10681. Let s be (-6)/(-27) - 19/(-36). What is the closest to s in 2/7, t, -4/7? 2/7 Let s = -1 + 2. Let y = 0.66 - 0.36. Let o = -1423/5 - -2851/10. What is the closest to s in o, -1, y? o Let i = -5070 - -5067. Which is the nearest to -184? (a) -1/6 (b) i (c) 1 b Let a = -2444 - -2447. Let x = -6 + 5.1. Let k = x + -2.1. What is the closest to -1/3 in k, a, -0.3? -0.3 Let t = 167/708 + 5/354. What is the nearest to -1/2 in -4, 2, t, -16? t
The 5 Bridges Walk Tour This can also be an Outdoor Meeting we will facilitate. Adventure starts in Bankers Hill and goes into Balboa Park. See 3 one of a kind canyons, which are very green right now with some wild flowers! A 4 mile walk. We go at a very relaxed pace with no hills! Many people don’t realize San Diego has colorful canyons just minutes from Downtown. During this adventure, we experience two spectacular footbridges that overlook pristine canyons filled with wildflowers, cactus and several unique palms. The neighborhood’s quiet streets are filled with beautiful homes and amazing architecture. This two hour tour starts on the outskirts of Balboa Park in Bankers Hill. The starting spots vary with each gr
Q: How to renew an expired US license as an expat? I've been living as an expat for a decade, and my extra class license expired a little more than a year ago. I'm currently in Taiwan. Is it possible to renew my license while staying here? Can I do it completely electronically? Or do the exams still need to be issued by an examiner or some proxy? This answer suggests everything is now electronic, but is that really true for the exam? I don't think there is a code test any more, right? It was still required when I took the test but I think it was about to disappear. I do have a mailing address in the US with people who can open and/or forward things for me. A: You CAN renew online, and you have a two-year grace period. From http://www.arrl.org/renewals: Amateur applications can be filed manually using paper forms or electronically via the web. Amateurs may electronically renew their FCC-issued licenses online using the FCC ULS . FCC permits online renewals at 90 days or less before a license will expire, and when the license has expired but is still within the two-year grace period for renewal. Licenses that have been expired for more than two years are not eligible for renewal or reinstatement. Amateurs may renew their licenses within 90 days before the license expiration date, or within the two-year license grace period after expiration, by using FCC Form 605 by mail to: FCC, 1270 Fairfield Rd, Gettysburg PA 17325-7245. Licenses that have been expired for more than two years are not eligible for renewal or reinstatement. For a complete list of FCC filing instructions and filing fees go to http://www.arrl.org/call-sign-renewals-or-changes.
One Serene stylus pen set. This set includes seven Serene Stylus pens with the silicone grip, one in each color, or the color combination of your choice.seven leather cases. We will send you an order form for color selection once we reach our goal. Free shipping in the continental USA. Less
--- abstract: | **Abstract**- We demonstrate pseudo spin valves with a (112)-textured D0$_{22}$ Mn$_{2.3-2.4}$Ga (MnGa) tilted magnetization fixed layer and an in-plane CoFe free layer. Single D0$_{22}$ MnGa films exhibit a small magnetoresistance (MR) typically observed in metals. In MnGa/Cu/CoFe spin valves a transition from a negative (-0.08%) to positive (3.88%) MR is realized by introducing a thin spin polarizing CoFe insertion layer at the MnGa/Cu interface and tailoring the MnGa thickness. Finally, the exchange coupling between the MnGa and CoFe insertion layer is studied using a first-order reversal curve (FORC) technique. **Index Terms**- Magneto-electronics, Spin valves, D0[$_{22}$]{} MnGa, Tilted polarizer, Negative magnetoresistance, First-order reversal curve (FORC) address: - '$^1$Material Physics Division, Royal Institute of Technology (KTH), Electrum 229, 164 40 Stockholm, Sweden' - '$^2$Department of Physics, University of Gothenburg, 412 96 Gothenburg, Sweden' - '$^3$InstitucióCatalana de Recerca i Estudis Avançats (ICREA) and Centre d’Investigacióen Nanociència i Nanotecnologia (ICN-CSIC), Campus Universitat Autònoma de Barcelona, 08193 Bellaterra, Spain' author: - 'C. L. Zha,$^1$ R. K. Dumas,$^1$ J. Persson,$^1$ S. M. Mohseni,$^1$ J. Nogués,$^{1,3}$ and Johan [Å]{}kerman[$^{1,2}$]{}' title: 'Pseudo Spin Valves Using a (112)-textured D0[$_{22}$]{} Mn$_{2.3-2.4}$Ga Fixed Layer' --- INTRODUCTION ============ Since the prediction by J. Slonczewski and L. Berger that a spin polarized current can exert enough torque on a magnetic layer to significantly affect its magnetization \[Slonczewski 1996, Berger 1996\], the Spin-Transfer Torque effect (STT) has been intensely investigated for potential applications in spintronic devices, such as Spin-Transfer Torque Magnetoresistance Random Access Memory (STT-MRAM) \[Zhu 2008\], Spin Torque Oscillators (STO) \[Katine 2008\], and domain-wall memory \[Parkin 2008\]. While such devices are typically divided into in-plane and perpendicular free or fixed layer geometries, we recently proposed a so-called Tilted Polarizer STO where the fixed layer magnetization is tilted out of the film plane in order to simultaneously achieve zero field operation and high output power \[Zhou 2008, Zhou 2009a\]. The tilt angle introduces an additional degree of freedom, which leads to a surprisingly rich phase diagram of spin torque switching and precession \[Zhou 2009b\]. A tilted spin polarizer, with both in-plane and out-of-plane spin polarization components, can be experimentally achieved using materials with strong tilted magneto-crystalline anisotropy. We have previously reported on using (111)-oriented L1$_0$ FePt and FePtCu with tilted magneto-crystalline anisotropy to fabricate pseudo spin valves (PSV’s) for spin torque devices \[Zha 2009a, Zha 2009b, Zha 2009c\]. However, L1$_0$ FePt and FePtCu have a number of drawbacks such as a relatively low spin polarization \[Seki 2008\], undesirably high damping factor \[Seki 2006\], and prohibitive cost due to its high Pt content. Very recently, D0[$_{22}$]{} ordered Mn$_{3-x}$Ga (x=0$\sim$1) was theoretically predicted to be a nearly half-metallic ferrimagnet with 88% spin polarization at the Fermi surface, and was consequently proposed to have great potential for STT devices \[Balke 2007, Winterlik 2008, Wu 2009\]. The large magneto-crystalline anisotropy (K$_{eff}$=$1.2\times10^7$ erg/cm$^3$), the low magnetization ($\leq$M$_s$=250 emu/cm$^3$) and the expected high degree of spin polarization make Mn$_{3-x}$Ga ideal as a tilted polarizer \[Winterlik 2008, Wu 2009\], provided the appropriate crystalline orientation of the D0[$_{22}$]{} phase can be realized. In this Letter, we report on the successful fabrication of (112)-textured D0$_{22}$ Mn$_{2.3-2.4}$Ga (MnGa hereafter) thin films with a tilted magnetization and pseudo spin valves based on these films. In single D0$_{22}$ MnGa films we observe a small magnetoresistance (MR) with a parabolic field dependence consistent with ordinary MR typically observed in all metals. In MnGa/Cu/CoFe PSV’s a small negative giant magnetoresistance (GMR) is observed between the MnGa and CoFe layers. In order to obtain a sizable positive GMR effect an ultra-thin CoFe layer is inserted at the MnGa/Cu interface. EXPERIMENTS =========== All film stacks were deposited at room temperature on thermally oxidized Si substrates using a magnetron sputtering system (AJA ATC Orion-8) with a base pressure better than $5\times10^{-8}$ Torr. Deposition of a 6 nm Ta underlayer was followed by MnGa deposition from a Mn$_{60}$Ga$_{40}$ alloy target. This bilayer was subsequently annealed $\emph{in-situ}$ at 400$^\circ$C for 35 min to form the D0[$_{22}$]{} (112)-textured MnGa phase. For the PSV’s a 5 nm Cu spacer and a 5 nm Co$_{50}$Fe$_{50}$ (CoFe) layer were deposited after cool-down to room temperature. Finally, a 3 nm Ta capping layer was deposited on both single MnGa films and PSV’s for oxidation protection. Three different MnGa thicknesses of 15, 25 and 50 nm were employed to fabricate PVS’s. The final Mn$_{70}$Ga$_{30}$ film composition was determined using energy dispersive x-ray spectrometry (EDX). Note that the achieved composition is located in the 66 to 74 at.% Mn range where the D0[$_{22}$]{} phase is expected to appear \[Niida 1996\]. Magnetic properties were characterized using a Physical Property Measurement System (PPMS) equipped with a Vibrating Sample Magnetometer (VSM) and an Alternating-Gradient Magnetometer (AGM) with a maximum field of 14 kOe. In addition to standard major hysteresis loop analysis we employed a first-order reversal curve (FORC) technique \[Davies 2004, Dumas 2007\]. First, a family of FORC curves was measured. Each curve started at a successively more negative reversal field, H$_R$, and was then measured with an increasing applied field, H, parallel to the film plane. Then, a mixed second-order derivative of the magnetization, M(H, H$_R$), was used to generate a FORC distribution, $\rho\equiv$-$\partial^{2}$M(H, H$_R$)/2$\partial$H$\partial$H$_R$, which was plotted against (H, H$_R$) coordinates on a contour map. Crystallographic structures were investigated by x-ray diffraction (XRD) with Cu K$_{\emph{a}}$ radiation in a symmetric scan geometry. Current-in-plane (CIP) electron transport properties were determined by a standard 4-point tester with the current orthogonal to the magnetic field (transverse configuration). ![\[fig:FigureXRDVSM\] (a) XRD patterns of 15 nm, 25 nm, 50 nm single MnGa films, respectively; (b) in-plane and out-of-plane VSM hysteresis loops and (c) current-in-plane magnetoresistance curve of a single 15 nm MnGa film; (d) in-plane and out-of-plane VSM hysteresis loops of a single 50 nm MnGa film.](fig1.eps){width="50.00000%"} RESULTS AND DISCUSSION ====================== Fig. 1 shows structural and magnetic properties of single MnGa films. Following Ref. \[Winterlik 2008\], we identify the peaks at 41.36$^\circ$ in Fig. 1(a) as the (112) diffraction peak of the D0$_{22}$ phase of Mn$_{3-x}$Ga. Importantly, with increasing film thickness we observe enhanced (112) texture as the relative diffraction intensity becomes stronger. Hysteresis loops of the 15 nm MnGa film in Fig. 1(b) exhibit in-plane coercivity (H$_{c\parallel}$) of 6.8 kOe and out-of-plane one (H$_{c\bot}$) of 1.5 kOe, as well as a 120 emu/cm$^3$ saturation magnetization (M$_S$). A 50 nm MnGa (Fig. 1(d)) reveals H$_{c\parallel}$=11.1 kOe, H$_{c\bot}$= 9.3 kOe, and M$_S$=160 emu/cm$^3$. These values are consistent with the ferrimagnetic structure of D0$_{22}$ MnGa film previously reported \[Wu 2009\]. The squareness ratios of the out-of-plane and the in-plane loops are less than 1, indicating that the easy magnetization axis lies in neither the film plane nor along the normal direction, as expected for highly textured (112) D0$_{22}$ MnGa films. The improved magnetic properties of the 50 nm MnGa film are consistent with its enhanced structural properties, Fig. 1(a). This indicates that the chemical ordering of the D0$_{22}$ phase of MnGa increases (inducing a higher magnetocrystalline anisotropy) with thickness under the same annealing condition. The CIP-MR is found to be 0.12% at $\pm$14 kOe for the 15 nm single MnGa film, Fig. 1(c), which we ascribe to ordinary magnetoresistance of a metal. A relatively large residual resistance of about 70 Ohm implies a moderate crystallinity, consistent with the XRD results(Fig. 1(a)). ![\[fig:FigureXRDVSM\]Current-in-plane magnetoresistance curves (left column) and hysteresis loops (right column) of Ta (6 nm)/MnGa (15 nm)/CoFe (y nm)/Cu (5 nm)/CoFe (5 nm)/Ta (3 nm), (a, b) y=0; (c, d) y=0.5; (e, f) y=1.0 and (g, h) y=1.5.](fig2.eps){width="50.00000%"} The magnetotransport and magnetic properties of PSV’s of MnGa (15 nm)/CoFe(0, 0.5, 1.0, 1.5 nm)/Cu (5 nm)/CoFe(5 nm) are shown in Fig. 2. The unique shape of the MR curve in Fig. 2(a), for MnGa/Cu/CoFe, is due to a combination of effects. The most prominent contribution to the MR is a negative GMR between the CoFe and MnGa layers. Near positive saturation the two layers are parallel and a relatively high resistance state is observed. As the applied field is reduced (dark filled squares) a sharp drop in resistance near zero field is observed as the CoFe (5 nm) free layer switches and becomes anti-parallel to the MnGa layer. With a further decrease in applied field the resistance remains nearly constant until roughly -5kOe where the MnGa layer begins to switch. Finally, a high resistance state, corresponding to parallel alignment of the CoFe and MnGa, is once again achieved at negative saturation. This situation is similar to Fe/Cu/GdCo spin valves \[Yang 2006\] and FeCoGd/AlO/FeCo tunnel junctions \[Bai 2008\] where a negative GMR is also observed. In addition to the dominant negative GMR contribution a small peak in the resistance near zero field is also observed and is most likely due to either anisotropic MR in the transverse measurement geometry or a small positive GMR component. Finally, a small parabolic background, most obvious at high fields, is observed due to the ordinary MR of the MnGa layer, similar to Fig. 1(c). CoFe usually gives positive bulk and interface spin asymmetry coefficients with Cu \[Li 2002\]. Considering, *ab initio* calculations \[Winterlik 2008\] of the electronic structure for D0$_{22}$ Mn$_3$Ga, it is found that the minority (majority) density of states exhibits a maximum (minimum) at the Fermi energy and the bulk spin asymmetry coefficient is positive \[Tsymbal 1996\]. However, based on the negative GMR found in this PSV, Fig. 2(a), we could not rule out the possibility of a negative interface spin asymmetry coefficient at the MnGa/Cu interface. To obtain a positive interface spin asymmetry coefficient we employ a thin CoFe insertion layer at the MnGa/Cu interface. We therefore expect to not only obtain conventional positive GMR, as anticipated for a PSV, but also enhancement of the MR \[Vouille 1999\]. ![\[fig:AFM\]CIP-MR curves (a, c) and in-plane AGM hysteresis loops (b, d) of Ta (6 nm)/MnGa (25 nm)/CoFe (1.5 nm)/Cu (5 nm)/CoFe (5 nm)/Ta (3 nm) and Ta (6 nm)/MnGa (50 nm)/CoFe (1.5 nm)/Cu (5 nm)/CoFe (5 nm)/Ta (3 nm), respectively.](fig3.eps){width="50.00000%"} As shown in Fig. 2(c), when an ultrathin 0.5 nm CoFe layer is inserted between the spacer and fixed layers, we find a positive MR of 0.07%. This suggests that GMR from spin-dependent interface scattering at the CoFe/Cu/CoFe interfaces is greater than net negative MR from MnGa alone. The MR is found to increase further as the thickness of the CoFe insertion layer is increased as shown in Figs. 2(e) and (g). The shape of the MR loops indicates a two-step switching for spin valves, which progressively weakens as the CoFe insertion layer becomes thicker, virtually disappearing for 1.5 nm layers. On the other hand, the easy magnetization axis is probably gradually pushed into the film plane by the thicker CoFe. ![\[fig:AFM\] (Color online) (a) A family of FORC curves and (b) the FORC diagram of MnGa (50 nm)/CoFe (1.5 nm)/Cu (5 nm)/CoFe (5 nm) spin valve. The red horizontal dashed line indicates the onset of irreversible switching.](fig4.eps){width="40.00000%"} The hysteresis loops in Figs. 2(b, d, f, h) show a two-stage switching which leads to the observed GMR effect. The large vertical separation between the upper and lower plateaus in the hysteresis loops is due to the much higher moment (4 times as high) of the CoFe free layer than the fixed layer. With increasing thickness of the CoFe insertion layer the switching plateau becomes gradually smaller and the coercivity of the MnGa fixed layer also gradually decreases, indicating the switching of the soft CoFe insertion layer assists the hard MnGa switching due to exchange interactions. To further improve current-in-plane magnetoresistance, we explore the effect of the MnGa thickness on magnetotransport. As shown in Figs. 3(a) and (c), MR increases to 3.88% when t$_{MnGa}$=25 nm. However, when increasing the thickness of MnGa to 50 nm we find the MR decreases to 2.95%. This decrease is most likely due to current shunting through the relatively thick MnGa layer \[Zha 2009d\]. Figs. 3(b) and (d) exhibit the in-plane magnetic properties for these two spin valves with t$_{MnGa}$=25 and 50 nm. The separate switching between the free CoFe layer and the fixed MnGa/CoFe bilayer corresponds to GMR. To better understand the interaction between the CoFe insertion layer and MnGa fixed layer the FORC technique is employed. The family of measured FORC curves is shown in Fig. 4(a) where black dots represent the starting point for each FORC. As the reversal field is decreased a sharp drop in magnetization is found near H$_R$$\sim$0 kOe which corresponds to the CoFe free layer switching. This is a highly irreversible process and manifests itself as a very narrow peak with a large intensity for reversal fields H$_R$$\sim$0 Oe in the FORC distribution. To highlight the switching of the MnGa (50 nm)/CoFe (1.5 nm) bilayer alone the FORC distribution is plotted for H$_R$&lt;-2 kOe in Fig. 4(b). Interestingly, the FORC diagram is nearly featureless for -6.5 kOe&lt;H$_R$&lt;-2 kOe indicating reversible switching processes. This region is also highlighted with a bracket in Fig. 4(a) and is associated with the highly reversible switching of the CoFe insertion layer. The onset of irreversible switching occurs for reversal fields H$_R$&lt;-6.5 kOe which is indicated with a horizontal dashed line in Fig. 4(b) and the red bold FORC in Fig. 4(a). For H$_R$&lt;-6.5 kOe we begin to see peaks in the FORC distribution that corresponds to irreversible switching of the MnGa layer as negative saturation is approached. We can interpret the reversal of the MnGa (50 nm)/CoFe (1.5 nm) bilayer as being that of a classic bilayer exchange-spring magnet \[Davies 2005, Fullerton 1998, Nagahama 1998\] where the MnGa and CoFe can be identified as the hard and soft components, respectively. This exchange spring interaction explains the lack of a two-step behavior in the MR data in samples with thick CoFe insertion layers. Essentially, after the CoFe free layer switches, the CoFe insertion layer begins to reversibly switch leading to a gradual decrease in the MR as saturation is approached. CONCLUSION ========== In summary, PSV’s using (112)-textured D0$_{22}$ MnGa as a fixed layer have been demonstrated and a MR up to 3.88% has been achieved. A negative GMR is observed in MnGa/Cu/CoFe spin valves. However, a negative to positive transition in the MR is realized by insertion of a thin CoFe layer at the MnGa/Cu interface. Reversal of the MnGa/CoFe bilayer has been analyzed and shows exchange-spring like behavior which explains the lack of a two-step reversal typically observed in the MR response of spin valves. These results are encouraging for future spintronic devices such as STO’s where MnGa will be an advantageous spin polarizer. ACKNOWLEDGMENT {#acknowledgment .unnumbered} ============== We are grateful to S. Lidin for giving us access to the PPMS. C.Z. thanks Dr. Ngoc Anh Nguyen Thi for fruitful discussions. Support from The Swedish Foundation for strategic Research (SSF), The Swedish Research Council (VR), the Göran Gustafsson Foundation, and the Knut and Alice Wallenberg Foundation is gratefully acknowledged. J.N. thanks the Wenner Gren Center Foundation, the Catalan DGR (2009SGR1292) and the Spanish MICINN (MAT2007-66309-C02) projects for partial financial support. J.[Å]{}. is a Royal Swedish Academy of Sciences Research Fellow supported by a grant from the Knut and Alice Wallenberg Foundation. REFERENCES {#references .unnumbered} ========== Bai XJ, Du J, Zhang J, You B, Sun L, Zhang W, et al (2008), *J. Appl. Phys.*, vol. 103, pp. 07F305. Balke B, Fecher GH, Winterlik J, and Felsera C (2007), *Appl. Phys. Lett.*, vol. 90, pp. 152504. Berger L (1996), *Phys. Rev. B*, vol. 54, pp. 9353-9358. Davies JE, Hellwig O, Fullerton EE, Denbeaux G, Kortright JB, and Liu K (2004), *Phys. Rev. B*, vol. 70, pp. 224434. Davies JE, Hellwig O, Fullerton EE, Jiang JS, Bader SD, Zimanyi GT, and Liu K (2005), *Appl. Phys. Lett.*, vol. 86, pp. 262503 Dumas RK, Li CP, Roshchin IV, Schuller IK, and Liu K (2007), *Phys. Rev. B*, vol. 75, pp. 134405 Fullerton EE, Jiang JS, Grimsditch M, Sowers CH, and Bader SD (1998), *Phys. Rev. B*, vol. 58, pp. 12193 Katine JA and Fullerton EE (2008), *J. Magn. Magn. Mater.*, vol. 320, pp. 1217-1226. Li M, Liao S, and Ju K (2002), US Patent 6683762. Nagahama T, Mibu K, and Shinjo T (1998), *J. Phys D: Appl. Phys*, vol. 31, pp. 43 Niida H, Hori T, Onodera H, Yamaguchi Y, and Nakagawa Y (1996), *J. Appl. Phys.*, vol. 79, pp. 5946-5948. Parkin SSP, Hayashi M, and Thomas L (2008), *Science*, vol. 320, pp. 190-194. Seki T, Hasegawa Y, Mitani S, Takahashi S, Imamura H, Maekawa S, et al (2008), *Nat. Mater.*, vol. 7, pp. 125-129. Seki T, Mitani S, Yakushiji K, and Takanashi K (2006), *Appl. Phys. Lett.*, vol. 88, pp. 172504. Slonczewski JC (1996), *J Magn. Magn. Mater.*, vol. 159, pp. L1-L7. Tsymbal EY, and Pettifor DG (1996), *Phys. Rev. B*, vol. 54, pp. 15314-15329 . Vouille C, Barthélémy A, Mpondo FE, Fert A, Schroeder PA, Hsu SY, et al (1999), *Phys. Rev. B*, vol. 60, pp. 6710-6722. Winterlik J, Balke B, Fecher GH, Alves MCM, Bernardi F, and Morais J (2008), *Phys. Rev. B*, vol. 77, pp. 054406. Wu F, Mizukami S, Watanabe D, Naganuma H, Oogane M, Ando Y, et al (2009), *Appl. Phys. Lett.*, vol. 94, pp. 122503. Yang DZ, You B, Zhang XX, Gao TR, and Zhou SM, Du J (2006), *Phys. Rev. B*, vol. 74, pp. 024411. $^a$Zha CL, Persson J, Bonetti S, Fang YY, and Åkerman J (2009), *Appl. Phys. Lett.*, vol. 94, pp. 163108. $^b$Zha CL, Bonetti S, Persson J, Zhou Y, and Åkerman J (2009), *J. Appl. Phys.*, vol. 105, pp. 07E910. $^c$Zha CL, Fang YY, Nogués J, and Åkerman J (2009), *J. Appl. Phys.*, vol. 106, pp. 053909. $^d$Zha CL, and Åkerman J (2009), *IEEE Trans. Mag.*, vol. 45, pp. 3491-3494. Zhou Y, Zha CL, Bonetti S, Persson J, and Åkerman J (2008), *Appl. Phys. Lett.*, vol. 92, pp. 262508. $^a$Zhou Y, Zha CL, Bonetti S, Persson J, and Åkerman J (2009), *J. Appl. Phys.*, vol. 105, pp. 07D116. $^b$Zhou Y, Bonetti S, Zha CL, and Åkerman J (2009), *New J. of Phys.*, vol. 11, pp. 103028. Zhu JG (2008), *Proc. IEEE*, vol. 96, pp. 1786-1798.
'''Fixtures for tests.''' # pylint: disable=redefined-outer-name import pytest import config from engine import Engine @pytest.fixture(scope='session') def eng(): '''Create and supply nvim engine.''' engine = Engine() yield engine engine.close() BACKENDS = {} if "gdb" in config.BACKEND_NAMES: BACKENDS['gdb'] = { 'name': 'gdb', 'launch': ' dd\n', 'tbreak_main': 'tbreak main\n', 'break_main': 'break main\n', 'break_bar': 'break Bar\n', 'launchF': ':GdbStart gdb -q {}\n', } if "lldb" in config.BACKEND_NAMES: BACKENDS['lldb'] = { 'name': 'lldb', 'launch': ' dl\n', 'tbreak_main': 'breakpoint set -o true -n main\n', 'break_main': 'breakpoint set -n main\n', 'break_bar': 'breakpoint set --fullname Bar\n', 'launchF': ':GdbStartLLDB lldb {}\n', } @pytest.fixture(scope="function") def terminal_end(eng): '''Check that the terminal last line is visible.''' yield True cursor_line = eng.eval("GdbTestPeek('client', 'win', 'cursor')")[0] last_line = eng.eval("GdbTestPeek('client', 'win', 'buffer', 'api', " "'line_count')") win_height = eng.eval("GdbTestPeek('client', 'win', 'height')") assert cursor_line >= last_line - win_height @pytest.fixture(scope="function") def post(eng): '''Prepare and check tabpages for every test. Quit debugging and do post checks.''' while eng.eval("tabpagenr('$')") > 1: eng.exe('tabclose $') num_bufs = eng.count_buffers() yield True eng.exe("GdbDebugStop") assert eng.eval("tabpagenr('$')") == 1 assert {} == eng.get_signs() assert 0 == eng.count_termbuffers() # Check that no new buffers have left assert num_bufs == eng.count_buffers() @pytest.fixture(scope="function", params=BACKENDS.values()) def backend(post, request, terminal_end): '''Parametrized tests with C++ backends.''' assert post assert terminal_end yield request.param @pytest.fixture(scope="function", params=BACKENDS.values()) def backend_express(post, request): '''Parametrized tests with C++ backends. Express.''' assert post yield request.param @pytest.fixture(scope="function") def two_backends(post): '''Use two C++ backends at once.''' assert post gdb = BACKENDS.get('gdb', None) lldb = BACKENDS.get('lldb', None) if gdb: yield gdb, lldb if lldb else gdb else: yield lldb, lldb
Heraclian revolt The Exarch of Africa Heraclius the Elder and his namesake son Heraclius the Younger began a rebellion against the Byzantine emperor Phocas in 608. In October 610, Heraclius the Younger reached Constantinople, executed Phocas, and was proclaimed as emperor, establishing the Heraclian dynasty of the Byzantine Empire. Background Various reasons may have contributed to the beginning of this rebellion, such as the atmosphere of terror and fear of purges in Phocas' military regime, avenging the death of Emperor Maurice in 602, personal ambitions of the Heraclii, the damaged reputation of Phocas. These were coupled with calculations in favor of the revolt, such as the distance of the Exarchate of Africa from Phocas in Constantinople, and the fact that Constantinople was relying on the grain and revenues from the Exarchate. The news of the Sasanian ruler Khosrow II's large-scale mobilization of forces to invade the eastern Byzantine territories, also ostensibly to overthrow Phocas and avenge Maurice's death, made the situation more favorable for this revolt in the west. The rebellion Heraclius the Elder first made himself and his son consuls, thus laying claim on the supreme power. The rebels attacked Egypt and Cyrenaica via land, while a naval assault was launched from North Africa against Constantinople, possibly via Sicily and Italy. The rebellion received support in most of Egypt and the central Mediterranean. Aftermath A revolt against the Heraclius' rule by Comentiolus, the brother of Phocas, was defeated after the assassination of the latter by patricius Justin in late 610 or 611. Heraclius the Elder dies shortly after the success of the revolt. References Sources Category:600s in the Byzantine Empire Category:600s conflicts Category:Heraclius Category:Civil wars of the Byzantine Empire Category:7th-century coups d'état and coup attempts
Apple threw the words of FBI Director James Comey back in his face Friday as part of a battle with the Department of Justice over unlocking an iPhone. In documents filed in federal court in Brooklyn, New York, Apple objected to the government's demand that the company help investigators unlock the phone. For one thing, the courtroom isn't the right place to solve the problem, Apple said. And so did Comey, at a conference held at Kenyon College earlier this month. "[L]itigation is a terrible place to have any kind of discussion about a complicated policy issue," Apple quoted Comey as saying, "especially one that touches on our values, on the things we care about most, on technology, on trade-offs and balance." Apple also questioned whether the US truly needs its help, given that the government was able to crack a different iPhone in a separate case without the company's assistance. In that case, the DOJ also said it needed Apple's help. But at the eleventh hour before a hearing on the matter, the DOJ told the court it had found a way to use a third party to open the phone of a terrorist who was involved in a mass shooting in California last year. The cases are just two of many in which government investigators want a tech company's assistance in accessing user data that's been encrypted, or scrambled so it can be read only when unlocked with the proper key. The DOJ last week told the court it will appeal a ruling from late February that Apple didn't have to help unlock an iPhone 5S used by a drug dealer. The man involved in the case confessed his crimes and is being sentenced in May. An Apple attorney, speaking with reporters last week on the condition of anonymity, said that while the company was disappointed that the government decided to pursue the case in New York, Apple wasn't surprised. That's because CEO Tim Cook and his team believe the US is trying to set a precedent in forcing Apple to help law enforcement unlock iPhones. The New York case is one of a number in which the US has looked to Apple to help bypass security on iPhones. The most notable involved an iPhone 5C tied to the San Bernardino, California, terrorist attack in December. In that case, after fierce resistance by Apple, the government ended up getting a work-around from an unnamed third party. The work-around applies only to the 5C and not to later models of the iPhone. The FBI still hasn't told Apple how it got into the phone. Now playing: Watch this: As encryption battle heats up on the Hill, FBI says iPhone... In both the New York and California cases, the US has relied on the two-century-old All Writs Act to compel Apple to help. A New York judge determined the act couldn't be used to force Apple's hand, something the DOJ wants reversed. It's up to individual courts around the country to determine whether Apple should assist or not. The New York and California cases have some notable differences. In the New York case, the phone is a higher-end iPhone than the device used in San Bernardino -- a 5S versus a 5C. The 5S has a fingerprint reader, which provides tougher security. But the phone is running iOS 7 compared with iOS 9 in the California case. Apple's two-year-old software has less-stringent security controls, which should make it easier to get data off the phone. And in the New York case, the FBI wants Apple to extract data from the iPhone 5S, not help determine the passcode, like it did in California. Apple would have had to create new software to bypass its own device security for the iPhone used by the San Bernardino terrorist. Cook argued that doing that would be an undue burden and put all iPhone users at risk. In New York, Apple wouldn't have to create entirely new software to get information off the device. The California case turned the previously private dealings between Apple and the FBI into a public battle and started a broader debate about privacy and security. Technology companies and rights groups argue that strong encryption is needed to keep people safe and protect privacy. Law enforcement argues it can't fight crimes unless it has access to information on mobile devices. Correction, 3 p.m. PT: This story originally misstated the forum for FBI Director James Comey's comments as quoted in Apple's filings. Comey was speaking at a conference at Kenyon College.
Analysis of a ferric uptake regulator (Fur) knockout mutant in Aeromonas salmonicida subsp. salmonicida. Aeromonas salmonicida subsp. salmonicida is the etiological agent of furunculosis; a serious infectious disease in aquaculture raised salmonids. Iron acquisition has been shown to be critical for the survival of pathogenic bacteria during the course of infection. Previous work has demonstrated that A. salmonicida expresses iron-repressible IROMP proteins, suggesting the presence of iron acquisition systems that are under the control of a ferric uptake regulator (Fur). In this study, the A. salmonicida fur has been sequenced and a fur deletion strain generated. The A. salmonicida fur gene has an open reading frame of 428 bp, coding for a protein of 143 amino acids, and with high homology to previously described Fur proteins. The Fur protein product had a 94% sequence identity and 96% sequence similarity to the Aeromonas hydrophila Fur protein product. Transcription of the A. salmonicida fur gene was not regulated by the iron status of the bacterium and is not autoregulated, as in Escherichia coli. Proteomic analysis of the A. salmonicida fur mutant, fails to repress iron-regulated outer membrane proteins in the presence of iron. The A. salmonicida fur::KO mutant shows significantly reduced pathogenicity compared to the wild-type parental strain. In addition, the A. salmonicida fur mutant provides an important tool for further investigation of the iron acquisition mechanisms utilized by A. salmonicida.
Background {#Sec1} ========== Although defined somewhat differently country to country, it is broadly estimated that there are approximately 7,000 rare diseases. In the U.S., a rare disease is defined as affecting fewer than 200,000 individuals, and rare diseases collectively as many as 30--35 million people. In Europe estimates are similar, with as many as 350 million individuals affected worldwide. Yet such large numbers stand in sharp contrast to the reality of most rare diseases for which there are only a handful of diagnosed individuals in an entire country. While the majority of rare diseases are genetic and the genes and mutations known for a rapidly increasing proportion, knowledge of disease often ends there, with only partial understanding of the role of the defective protein in cells and even less being known about disease pathogenesis. Nonetheless, understanding the function of rare disease-linked genes and their proteins can provide new insights into how cells function, which in turn may lead to insights into, and therapies for, both rare and common diseases. Not surprisingly, the road from rare disease discovery to implementation of successful therapies is inevitably long and must take into consideration many factors. These range from disease recognition and discovery of the cause of the disease and its pathogenesis, to natural history studies to provide a clearer understanding of how a particular rare disorder affects different individuals, to establishment of clinics to facilitate patient care. For some, discovery of the disease may have been more than a century ago, as for diseases like Niemann-Pick, whereas for others a matter of only a few years or less. While much progress has been made in defining the molecular basis of many genetic diseases, large gaps remain in our understanding of the complex chain of events between the underlying genetic defect and the phenotypic abnormalities at various levels from cells, tissues, and organs, to the whole organism. Since studies necessary for unraveling these pathogenic mechanisms often cannot be done in humans or with human tissues, animals with the same genetic disorders are a critical resource for knowledge advancement. Appropriate animal models also provide a means to test new therapies, with mice, cats, dogs, and non-human primates increasingly recognized as important intermediate models to assess these strategies. While a key goal for rare disease advancement is the development of clinical trials to test potential therapies, limited availability of affected patients often imposes significant constraints that require international cooperation to overcome. Fundamental to progress is the development of natural history studies, the purpose of which is to characterize the range of phenotypic heterogeneity and variability of disease progression. Information is obtained about frequency of signs and symptoms, age of onset, and disease progression. This information can be used to identify potential outcome measures for later therapeutic trials. Once the variability and rate of progression of a specific disease-related sign or symptom is known, the information can be used to adequately power a controlled clinical trial. From a natural history study, one also quickly learns information regarding the practicality and potential difficulties associated with obtaining data on a specific outcome measure. A second key aspect of natural history studies is that they provide a mechanism to collect patient biomaterials, including serum/plasma, urine, cerebrospinal fluid (CSF), DNA, and patient cells. These biomaterials provide a resource that can be used by scientists in studies focused on understanding the pathological processes underlying the disorder, as well as used to identify biomarkers to facilitate diagnosis or as tools to support the development of clinical trials. Such biomarkers may be any identified biochemical, genomic or proteomic feature, or even an imaging marker that serves as a measurable indicator of the disease state. Once validated in clinical trials against clinical outcome measures, these biomarkers have the potential to serve as surrogate outcome measures. Ultimately if validated as a surrogate, since they may respond quicker than clinical signs or symptoms, biomarkers could accelerate drug development by facilitating shorter and smaller clinical trials. Natural history studies are complemented by patient registries, which serve as a resource to identify patients who may be interested in participating in a clinical trial as well as to provide information on disease phenotype and progression. They have the potential advantage of being able to ascertain information from individuals who are not able to travel to a study site in order to participate in a natural history study. Development of natural history studies and registries, biomarker discovery, and expanded understanding of disease pathogenesis through availability of animal models (that can also be used for preclinical testing of specific treatments), effectively set the stage for clinical trials. Formal clinical trials in which data are collected in a rigorous and standardized manner are essential for approval of a drug by regulatory agencies. Prior to approval of a drug the Food and Drug Administration (FDA) requires that efficacy be shown "through adequate and well-controlled clinical studies" (21CFR314.126). Although well-documented case reports and case-series may provide information related to safety and insight into potential outcome measures for a subsequent well-controlled trial, they are not controlled studies and therefore would not be adequate for regulatory approval. While the above cycle of progress for a rare disease may appear fully exploitable through an academic medical center or network of such centers, in reality, the importance of patient advocacy as catalyst and supporter of these studies cannot be overstated. Disease advocates participate and have direct input in the process by bringing scientists together, organizing within the patient community, holding meetings/conferences with scientists and patient advocates, and funding early-stage, high-risk research through grants, both directly to researchers and by leveraging other funding. It is also critical to foster and support public-private partnerships by developing relationships with government agencies and industry. Patient liaisons that learn and understand the drug development and FDA regulatory process empower advocates to be more fully engaged and to interact with scientists and regulators. In order to build a collaboration and strong partnership, it is important to establish a relationship of trust and engagement between patient advocates and the scientists/clinicians to foster productive ways of working together. Key elements of the relationship are communication and mutual respect for each other's roles, including the establishment of defined boundaries and organizational structure so that the relationship remains collaborative and productive. Scientists know science and are pragmatic; parents are pragmatic in a different way, focused on saving their children's lives and bringing other perspectives and strategies to solving problems and implementing ideas that benefit the patient community. Several years ago a group of scientists, clinicians and parents came together in an attempt to overcome the obstacles inherent in developing an effective therapy for the rare brain disease known as Niemann-Pick type C, and in the process created an innovative research collaborative known as Support of Accelerated Research for Niemann-Pick C disease (SOAR-NPC) (Fig. [1](#Fig1){ref-type="fig"}). That experience is described here and we propose that it can serve as a basis for advancing therapies for other rare disorders.Fig. 1SOAR-NPC organizational chart. At the center of SOAR-NPC is the Collaborative, the scientific core which maintains vital relationships and open communication with other key groups (*arrows*). Ongoing interactions amongst groups facilitate SOAR-NPC's ability to rapidly respond to a dynamic research environment. See text for additional details Niemann-pick type C disease, a model example {#Sec2} -------------------------------------------- NPC disease is a rare, progressive, neurodegenerative disorder characterized by storage of unesterified cholesterol in the late endosomal/lysosomal system. Two genes (*NPC1* and *NPC2*) have been linked to NPC disease in humans, with 95% of cases associated with mutations in *NPC1*. NPC1 is a multi-spanning transmembrane protein and NPC2 is a soluble cholesterol-binding protein, both of which reside in late endosomes/lysosomes \[[@CR1]\]. The incidence of classical NPC1 disease has been estimated to be 1/89,000-104,000 \[[@CR1]\], whereas a late-onset variant of NPC1 has a predicted incidence of 1/39,000 based on analysis of *NPC1* carrier frequency from large-scale exome sequencing \[[@CR2]\]. Affected individuals typically present with visceral involvement as neonates, progressing in early childhood with ataxia and impairment of motor and intellectual function, and usually die in adolescence. Late-onset NPC1 disease increasingly is being recognized in young adults with psychoses and cognitive impairment, with a disease prevalence of \~2% among this population \[[@CR3]\]. The discovery of NPC1 disease biomarkers has transformed the diagnosis of NPC1 disease and accelerated drug development efforts. Until recently, the first-line diagnostic test for NPC disease was filipin staining of cultured primary skin fibroblasts for cholesterol. The discovery in one of the SOAR-NPC labs (Ory) that oxysterols are sensitive and specific disease markers \[[@CR4]\] has led to development of a clinical assay that has been implemented in more than 30 laboratories worldwide and is replacing the filipin test as the diagnostic standard \[[@CR5]\]. More recently, metabolomic profiling led to identification of unusual bile acid species that are specifically elevated in the plasma of NPC1 disease patients \[[@CR6]\]. A high-throughput, mass spectrometry-based method was developed and validated to measure the bile acid biomarkers in dried blood spots with their quantification providing the basis for a newborn screen for NPC disease. This screen is now ready for piloting in newborn screening programs. Establishment of an NPC disease natural history study at NIH in 2006 (NCT00344331) provided the means to characterize the clinical phenotype and phenotypic heterogeneity of NPC1 disease across a large number of patients in both a cross-sectional and longitudinal manner (Porter). The longitudinal nature of this study allowed for disease progression to be characterized and a Neurological Severity Score to be developed \[[@CR7]\]. This scoring system assessed disease progression in nine major and eight minor sign/symptom domains that are clinically relevant to NPC disease progression. The scale was found to be useful both retrospectively and prospectively to characterize disease status and progression. The NPC1 disease natural history study also provided an opportunity to establish a biorepository of blood, CSF, and fibroblasts from well characterized patients. These samples subsequently proved invaluable in the identification and characterization of pharmacodynamic biomarkers \[[@CR8]\] and biomarkers of neuronal damage such as tau \[[@CR9]\], FABP3 \[[@CR10]\] and calbindin D \[[@CR11]\]. These biomaterials were also essential for development of the assay for newborn screening for NPC disease mentioned earlier \[[@CR6]\]. In addition to defining the gene defect in NPC1 disease, developing disease-specific biomarkers and establishing a natural history study, the NPC research community has also identified disease models in multiple species. These include simple non-mammalian systems -- *S. cerevisiae*, *C. elegans*, *D. melanogaster*, and *Danio rerio-*as well as *M. musculus* and *F. catus* mammalian models. Several mouse models are available including both spontaneous mutations (e.g. BALB/cNctr-*Npc1* ^*m1N*^/J, C57BLKS/J-*Npc1* ^*spm*^/J) and targeted or chemically induced mutations (e.g. B6.129-*Npc1* ^*tm1.1Dso*^/J, p.I1061T, c.3182 T \> C; C57BL/6 J-*Npc1* ^*nmf164*^/J, p.D1005G, c.3163A \> G; and an NPC2 hypomorphic allele). The most widely used mouse model is the *Npc1* ^*m1N*^, a null model initially characterized at the NIH \[[@CR12]--[@CR14]\]. These mice exhibit weight loss, severe ataxia, and intracellular accumulation of cholesterol and other lipids, all prominent clinical and pathological manifestations seen in NPC1 patients. A humanized hypomorphic *Npc1* ^*tm1.1Dso*^ mouse model was also recently developed in one of the SOAR-NPC labs (Ory). Here, the p.I1061T (c.3182 T \> C) mutation, the most prevalent human disease allele, was inserted into the *Npc1* locus \[[@CR15]\]. *Npc1* ^*I1061T/I1061T*^ "knock-in" mice show an increased mean survival time as compared with *Npc1* ^*m1N/m1N*^ mice, consistent with partial function of the mutant protein. Onset of neurological signs is delayed 3 weeks, and the progression of signs and weight loss are less precipitous. The discovery of a large animal model of NPC1 disease occurring spontaneously in cats \[[@CR16]\] has proven to be a critical resource for advancing therapy. Here, the disorder results from a single missense mutation in *NPC1* (p.C955S, c.2864G \> C) that most closely models the clinical disease features of juvenile-onset NPC1 disease patients (the most common form of NPC1 disease) \[[@CR17]\]. The cat model displays ectopic dendritogenesis, a key neuropathological feature of many lysosomal disorders in humans and is a finding that occurs only minimally in murine models of these diseases \[[@CR18]\]. Furthermore, the NPC1 cats exhibit a massive degree of neuroaxonal dystrophy, thereby recapitulating another critical aspect of the cellular pathology of NPC1 disease. A breeding colony of NPC1 cats has been established at the National Referral Center for Animal Models of Human Genetic Disease of the School of Veterinary Medicine of the University of Pennsylvania by one of the SOAR-NPC scientists (Vite). The size of the feline model allows for the ability to both repeatedly administer experimental therapies intravenously or intrathecally and to repeatedly sample blood, urine, and CSF. This model has also allowed for validation of biochemical markers of disease severity and therapeutic effects that are specific to central nervous system (CNS) disease. Finally, its large size also allows for the development of metrics of disease progression using equipment identical to those used in people, e.g., magnetic resonance imaging (MRI) and electrodiagnostic testing. The cat model has been extensively used to evaluate the efficacy of experimental therapies of NPC disease \[[@CR19]--[@CR21]\]. The mammalian models of NPC1 disease have been particularly valuable in allowing for studies of NPC disease pathogenesis. Through such analysis it is now known that cholesterol, glycosphingolipids (GSLs), particularly GM2 and GM3 gangliosides and lactosylceramide, are abnormally sequestered in brain cells in NPC disease \[[@CR22], [@CR23]\]. Endosomal/lysosomal storage of gangliosides without clear evidence of deficiency of ganglioside catabolic enzymes in the NPC1 mouse and cat models led Walkley and colleagues to speculate that this might be the result of increased GSL synthesis \[[@CR24]\]. Subsequent studies using the GSL synthesis inhibitor, N-butyl-deoxynojirimycin or miglustat, in the NPC1 models were the first to demonstrate delay in onset of neurological disease and increased longevity for this disease \[[@CR25]\], a finding subsequently extended with additional studies in the feline model \[[@CR19]\]. Today, miglustat is an approved therapy for NPC1 disease in 45 countries, though not in the U.S. Most of the support for the above studies on NPC disease was derived from work funded through the "classic" model of peer-reviewed investigator-initiated projects. These were largely funded through the NIH using the widely recognized "R01" and "R21" mechanisms and by private foundations such as the Ara Parseghian Medical Research Foundation (APMRF) and the National Niemann-Pick Disease Foundation (NNPDF) following review by their scientific advisory boards. Importantly, funding by these private foundations often provided critical support for high risk, high impact projects that would not have been supported via traditional funding routes, such as the NIH. Grants supported by the APMRF, for example, led directly to identification of the NPC1 gene, to improved understanding of the function of the NPC1 and NPC2 proteins and to the discovery of miglustat's ameliorative effects on NPC disease. The APMRF also provided critical support for the initiation of the NPC natural history study described earlier. Yet despite these and other important advances for NPC disease, there was also a growing realization among some parents that a critical element for progress was missing. This was the pre-clinical and clinical expertise similar to that which pharmaceutical companies would have for effectively and fully developing therapies for this fatal neurodegenerative disease. It was in this mixed atmosphere of hope and realization that a complementary approach to research support was born, one focused specifically on development of NPC1 disease therapies. Emergence of SOAR-NPC {#Sec3} --------------------- The idea of the research collaborative known as SOAR-NPC emerged when three researchers and a parent traveled to Brazil in 2007 to visit the family of a young adult patient who had the disease. The patient's father was a potential funder of NPC disease research and the visitors wanted to prepare something more than a simple listing of potential therapeutic strategies. Inspired by a collaborative research model that had been developed by the Myelin Repair Foundation \[[@CR26]\], SOAR-NPC was conceived to incentivize and maximize scientific collaboration. Its ambitious objective, stated at the outset, was to develop, within 3--5 years, an FDA sanctioned clinical trial with emphasis on development of a combination therapy-or "cocktail" -- that would prevent or significantly delay the onset and progression of clinical neurological disease in individuals affected by this disorder. Toward this end, the initial family foundations in support of SOAR-NPC (Dana's Angels Research Trust and the Hide and Seek Foundation for Lysosomal Disease Research) established a funding stream for NPC disease research in 2008 prior to its first multi-party organizational meeting at Stanford University. In creating the SOAR-NPC Collaborative (Fig. [1](#Fig1){ref-type="fig"}), the researchers and families early on embraced the concept of a small network of highly interactive/collaborative scientists. Such individuals, it was decided, need not be at the same institution or even in the same country; rather, it was critical to have a detailed knowledge and involvement with NPC disease, and equally important, a strong willingness by each scientist to be truly collaborative, planning experiments and sharing data collection and analysis in real-time. It was decided that scientists entering the SOAR-NPC Collaborative must be willing to share unpublished data to aid in rapid and efficient progress. Hosting conference calls every other week was viewed as an essential element in coordinating activities. The number of scientists was also thought to be critical. Too many, and the close coordination between labs might be lost, yet too few and a deficiency in critical complementary skills might weaken research progress. Since the establishment of SOAR-NPC the number of scientists has ranged from 3 to 4, with 2 of the scientists (Ory and Walkley) being part of the collaborative since its inception. While the SOAR-NPC scientists elected their own group leader (Ory), it was also quickly realized that the group would need a scientific coordinator to act as project manager as well as liaison with the SOAR-NPC parent groups. This role was filled by different individuals over the years (including Ottinger) and continues to evolve with the changing needs of SOAR-NPC. Currently, this individual (Davidson) schedules the biweekly conference calls and biannual face-to-face meetings of the scientists and parents, as well as follows up on research questions arising in the scientific exchanges during the teleconferences or in discussions with parents. As unpublished data is constantly under discussion, agreement to maintain confidentiality by all parties involved has proved vital to success. Given the importance of the goal to accelerate therapy for NPC1 disease, the collaborative established connections early on to the NPC1 disease natural history study being carried out at the National Institutes of Health (Porter). With the discovery of 2-hydroxypropyl-β-cyclodextrin's (HPβCD) remarkable efficacy in animal models, this connection proved essential for rapid acceleration toward a clinical trial through links with NIH's Therapeutics for Rare and Neglected Diseases (TRND) Program in the new National Center for Advancement of Translational Science (NCATS), as described below. Critical to the operation of SOAR-NPC has been its ability to identify and fund investigators outside the SOAR-NPC Collaborative who are pursuing projects directed at therapy for NPC1 disease. These adjunct projects, coordinated by the SOAR-NPC research manager, have varied widely from those focused on proteostatic and gene therapies, to preventing ototoxicity following administration of cyclodextrin, to developing improved HPβCD formulations that cross the blood--brain barrier. Such pilot projects typically have lasted a year, or more, with funded scientists joining biweekly calls with the SOAR-NPC scientists as data was ready for analysis and discussion (Fig. [1](#Fig1){ref-type="fig"}). The collaborative character of SOAR-NPC is not limited to its scientific members as parents/guardians also play a key role in a number of ways. The SOAR-NPC families presently represent six individual foundations, each of which pursues their own avenue(s) to raise money to support NPC disease research. Resources are then pooled in order to partially fund not only the SOAR-NPC scientists, but also the smaller adjunct projects mentioned above that align with SOAR-NPC goals. Biannual face-to-face meetings (Fig. [2](#Fig2){ref-type="fig"}) between SOAR-NPC families and its scientists serve to not only share progress of studies, but importantly, to reach consensus on what avenues are worth pursuing in future research efforts, including those small pilot projects outside of main SOAR-NPC laboratories. Whenever necessary as part of such decisions on current and future research directions, the SOAR-NPC Collaborative seeks advice from its Research Advisory Committee (RAC). This group, which was used most often in the early years of SOAR-NPC, represents a small group of senior investigators in the lysosomal disease and drug development fields (Fig. [1](#Fig1){ref-type="fig"}). Overall, the biannual meetings of the Collaborative not only allow progress and plans to be reviewed, but also provide an opportunity for the SOAR-NPC families to understand the scientific merit of proposed projects, permitting them to make informed decisions on how pooled resources are utilized.Fig. 2SOAR-NPC Collaborative meeting. A face-to-face meeting of SOAR-NPC members as occurred at the Rose F. Kennedy Center at the Albert Einstein College of Medicine on February 26, 2014. Pictured are (*left* to *right*), Daniel S. Ory, Cristin D. Davidson, Charles H. Vite, Steven U. Walkley, Philip D. Marella and Sean Recke (not shown: Jonathan Jacoby). Individuals shown have consented to having their pictures published Beyond raising significant funds to support NPC1 disease research, parents are also involved in developing intellectual property agreements as well as fostering new relationships with researchers and the pharmaceutical industry, in representing the NPC1 disease community with government agencies, and in facilitating more regular and effective communication among the various stakeholders. Perhaps most importantly, parents bring a practical sense of urgency to the therapy-development project. Just as they learn the realities and practicalities of scientific research, parents bring their skill sets and personal experiences to the SOAR-NPC enterprise in a way that has tangibly accelerated the development of therapeutic strategies. The other major stakeholder in SOAR-NPC has been the NIH, which has a long history as a partner in the basic research and development of therapeutics for NPC1 disease and as a facilitator of interactions between the scientific and the NPC1 disease parent and patient communities. Scientists at NIH first identified the cellular defect in 1985 \[[@CR27]\] followed years later by the cloning of the *NPC1* gene in 1997 \[[@CR28]\] and subsequently implemented the first clinical trial to test cholesterol-lowering drugs. Shortly after SOAR-NPC was established in 2007, its scientists met with researchers at the NIH Chemical Genomics Center (NCGC), including its then scientific director, Dr. Christopher P. Austin, in order to discuss screening of patients' cells, provided by participants enrolled in the on-going NPC disease natural history study at NIH, with a collection of FDA-approved drugs. The goal was to look for molecules that could reverse cholesterol storage in cells, and as a result be "repurposed" as a therapy for NPC1 disease, potentially shaving years off the drug development timeline. In 2008, the NCGC received a grant from the APMRF to support this high-throughput screening effort. The collaboration with SOAR-NPC investigators involved testing the best lead compounds identified from the screening effort for *in vivo* efficacy in the NPC disease animal models. The initial lead compound identified from this screen and subsequently tested in the NPC1 (BALB/cNctr-*Npc1* ^*m1N*^/J) mouse model was a component of Vitamin E \[[@CR29]\], but the compound failed to show efficacy in the mouse. Nonetheless, the close working relationship established between the NCGC and SOAR-NPC scientists on this project laid the foundation for cooperative development of a new lead compound that was just emerging from several laboratories working on NPC1 disease. The discovery of cyclodextrin as therapy for NPC disease {#Sec4} -------------------------------------------------------- By the early 2000s, an improved understanding of NPC1 disease allowed scientists to focus more efforts on rational therapeutic approaches, such as targeting downstream effects, reducing accumulating metabolites, and as applicable, enhancing existing protein function. Projects focused on therapeutic intervention became more commonplace. Around the same time the idea of SOAR-NPC was taking shape, exciting new data from two independent laboratories, John Dietschy, a scientist at University of Texas Southwestern and Steven Walkley (a SOAR-NPC scientist) was being shared at the 2007 APMRF annual meeting. Here, both investigators reported the unexpected and surprising realization that HPβCD, the vehicle or "excipient" used to solubilize a putative therapeutic compound (allopregnanolone) \[[@CR30]\], provided far greater benefit in the NPC1 mouse model than allopregnanolone itself, or indeed any compound investigated thus far, including miglustat. Though an earlier study investigated HPβCD for treatment of NPC1 disease, use of a much lower dose failed to elicit the significant responses subsequently reported by the Dietschy and Walkley labs \[[@CR31]--[@CR34]\]. Importantly, the studies from these two groups revealed that treated mice not only exhibited delayed onset of clinical disease, but also showed dramatically less storage of cholesterol and sphingolipids and lived nearly twice their normal lifespan. Subsequent studies in a second SOAR-NPC lab (Vite) treating the feline NPC1 model with HPβCD further advanced the notion of this compound's ability to significantly impact the disease process. Indeed, direct administration of HPβCD into the cerebellomedullary cistern of presymptomatic cats with NPC disease prevented the onset of cerebellar dysfunction for greater than a year, and resulted in Purkinje cell survival and near normal concentrations of brain cholesterol and sphingolipids \[[@CR21]\]. At the same time, an adverse effect identified was an increase in hearing threshold. Together, these studies in the feline model provided critical data on efficacy and relative safety of direct CNS administration of the drug that have proven important in advancing the subsequent clinical trials. These substantial preclinical studies, combined with HPβCD\'s overall safety profile and many years of experience as an excipient in FDA-approved drugs, were largely responsible for promoting this compound as SOAR-NPC's lead candidate for advancement to clinical trial. During the latter period of preclinical research, several NPC1 disease families received approval from the FDA for individual expanded access Investigational New Drug (iIND) applications and their children began receiving HPβCD intravenously. While acknowledging the potential contribution of iINDs and first-in-human treatment with the drug for contributing information related to the safety of HPβCD, numerous investigators involved in HPβCD preclinical work and patient advocates realized the critical importance of carrying out a scientifically rigorous clinical trial to unambiguously establish safety and potential efficacy of this compound, so that it could eventually gain FDA approval. Accordingly, this effort became the common goal amongst all involved in the push towards establishing HPβCD as a bona fide therapy for NPC1 disease. In 2010, the NIH established the aforementioned program known as TRND which subsequently became an integral component of NCATS and incorporated the NCGC scientists with whom SOAR-NPC had previously collaborated. TRND was specifically designed to stimulate drug discovery and development for rare and neglected diseases through a collaborative model between the NIH, academic scientists, nonprofit organizations, and pharmaceutical and biotechnology companies. That same year, the National Institute for Neurological Disorders and Stroke (NINDS) sponsored the meeting, "Promising Therapies for NPC," organized by Drs. Steven Walkley and Danilo Tagle, to bring together NPC1 disease researchers and disease advocacy groups at NIH to discuss the current state of knowledge and possible therapeutic developments, focusing in part on the growing awareness of the promise of HPβCD for treating NPC. SOAR-NPC quickly recognized the potential for the TRND program to provide critical support for development of this compound as a therapeutic drug. In collaboration with Dr. Forbes Porter at the NIH, SOAR-NPC scientists (Ory and Walkley) developed a research proposal that provided a roadmap for rapid translation of preclinical studies of HPβCD to a Phase 1/2a trial at the NIH Clinical Center. The proposal was accepted and in early 2011 development of HPβCD for the treatment of NPC1 was selected as one of TRND's initial projects \[[@CR35]\]. This effort required the establishment of a large collaborative team with a wide range of expertise in all areas of drug development, including chemistry and manufacturing, formulation, pharmacology, pharmacokinetics, toxicology, and regulatory affairs, to advance the molecule from basic discovery to clinical testing. SOAR-NPC researchers (Ory, Vite and Walkley) became key members in establishment of the TRND-NPC team (Fig. [3](#Fig3){ref-type="fig"}), adding critical expertise in NPC1 disease animal models and biomarker discovery and assay development. In addition, a SOAR-NPC collaborator and leader of the NPC1 disease Natural History study at the NIH Clinical Center (Porter) provided clinical expertise in human NPC1 disease and patient care. Importantly, the TRND-NPC project manager (Ottinger) also provided project management for SOAR-NPC, serving as a liaison that helped to align the goals and interests of the parents with the researchers and their plan for developing a therapy for NPC1 disease. This centralized project management support and point of contact was found to be key to driving the project forward to meet milestones and the end goal, a Phase 1/2a clinical trial. It also ensured that the necessary resources were available, tracked the TRND-NPC team activities and studies, monitored overall project costs and fostered a cohesive team environment. This coordinated team effort facilitated completion of all the needed pre-clinical studies, leading to the successful initiation of the Phase 1/2a trial of a defined HPβCD preparation at the NIH Clinical Center in early 2013 \[[@CR35], [@CR36]\]. After years of effort in supporting NPC1 disease research and the close partnerships forged between advocacy groups and the research community, including the SOAR-NPC model, the NPC1 community had a drug candidate entering clinical studies. The extensive preclinical data package and early clinical data from the Phase 1/2a study, coupled with successful designation of HPβCD as an Orphan Drug in the U.S. and EU, sufficiently de-risked the HPβCD program such that TRND-NPC was able to able to attract an industry partner. Vtesse, Inc., a pharmaceutical company, was founded to develop a specific HPβCD preparation (VTS-270) for treatment of NPC1 disease, and the Phase 2b/3 international, multi-site trial was launched in September 2015. Vtesse's VTS-270 recently received the FDA's Breakthrough Therapy Designation, which could accelerate approval to provide the first effective treatment for slowing progress or stabilizing the devastating impacts of NPC in children and adolescents. The clinical trial has entered Phase 3 and once again the NPC community, including SOAR-NPC families and scientists, is mobilizing its efforts with a parent/patient clinical trial recruitment campaign called "51 and Done!" which acknowledges the number of patients to be recruited for the trial.Fig. 3TRND-NPC team members. First Row (*Left* to *Right*): Ilona Scott (Janssen Research & Development, LLC, Johnson & Johnson \[J&J\]), Patrick Frenchick (RRD International, Inc. \[RRD\]), Sandra L. Morseth (RRD), Kimberly Lilly (RRD), Mark L. Kao (J&J), Nicole Y. Farhat (NIH/NICHD), Elizabeth A. Ottinger (NIH/TRND), Nuria Carrillo (NIH/TRND), Xin Xu (NIH/TRND); Second Row (*Left* to *Right*): Steven U. Walkley (Albert Einstein College of Medicine), Charles H. Vite (University of Pennsylvania), Charles Finn (RRD), Joy K. Vander Wal (RRD), Steven A. Silber (J&J), John C. McKew (NIH/TRND), Forbes D. Porter (NIH/NICHD), Daniel S. Ory (Washington University School of Medicine), Christopher P. Austin (NIH/TRND), John Heiss (NIH/NINDS), Wei Zheng (NIH/TRND); Missing Team Members: Juan J. Marugan (NIH/TRND), William J. Pavan (NIH/NHGRI), James Cradock (NIH/TRND) and Pramod Terse (NIH/TRND) Individuals shown have consented to having their pictures published SOAR-NPC -- An evolving strategy {#Sec5} -------------------------------- At its inception, SOAR-NPC's primary goal was to initiate a clinical trial for NPC disease within a 3--5 year timeframe. Remarkably, this goal was accomplished in 2013, just under 5 years after the initiation of funding for the SOAR-NPC scientists. This success did not diminish the enthusiasm or desire to continue pursuit of different therapeutic compounds. Although VTS-270 holds substantial promise for treating NPC disease, SOAR-NPC acknowledges VTS-270's limitations and the necessity of finding additive, and even more optimal and tractable therapies. Early on, the members of SOAR-NPC decided a drug pipeline was essential to the success of efficient compound evaluation. This drug pipeline prioritizes compounds of interest while maintaining flexibility. When the pipeline was first conceived in 2007, 12 compounds of interest were selected for evaluation. To date more than 30 potential drugs have been processed through this pipeline. While VTS-270 continues to receive scientists' attention, greater emphasis has recently been placed on cutting-edge technologies such as gene therapy and modulators of the proteostatic network. Potential therapies failing to show improvements in *in vivo* studies are accordingly removed from the pipeline queue, thus allowing evolution and incorporation of new compounds brought to light through diligent awareness of new scientific literature by the SOAR-NPC scientists and by parents in the NPC1 disease community. As the list of compounds grows, so too does the number of researchers brought in to explore these different avenues. For example, a workshop jointly funded by SOAR-NPC and the APMRF on the topic of proteostatic modulation in NPC disease brought an additional five researchers into the fold as affiliate labs of SOAR-NPC. Efforts such as this workshop not only foster the growth of the NPC research community, but, equally as important, also increase its intellectual capacity and breadth. Conclusions {#Sec6} =========== Today's scientific environment is slowly transitioning from an atmosphere of scientists wary of sharing data before publication to one with a much greater appreciation for the power of collaboration. New relationships between academia, industry, government, and patient advocacy groups have allowed rapid progress and brought patient welfare to the forefront. Rare diseases, though often comprised of very small patient groups, are finding their way to the leading edge of research, sometimes for the simple reason that scientists find the missing gene and defective protein as a key to understanding some aspect of cell biology they are pursuing. Not only are scientists beginning to appreciate the applicability of knowledge gleaned from rare diseases to more common maladies, but the avenues and compounds being employed to treat these often lethal conditions are also pushing the therapeutic envelope. We have highlighted NPC1 disease and SOAR-NPC as an example of a successful pathway for increasing knowledge of a rare disease while efficiently advancing potential therapeutics to clinical trial. Certainly SOAR-NPC is not unique as an organization designed to advance rare disease research and therapy for lysosomal diseases, e.g., see Jonah's Just Begun <http://jonahsjustbegun.org/aboutus/>; The ML4 Foundation, <http://ml4.org/>; Team Sanfilippo, <http://teamsanfilippo.org/>; Beyond Batten Disease <http://beyondbatten.org/>, the National Tay-Sachs and Allied Diseases Foundation, <http://www.tay-sachs.org/and> others. Yet, SOAR-NPC appears unique in its internal organization, which has been honed through incorporation of a number of key features (Table [1](#Tab1){ref-type="table"}) to maximize its likelihood for success: selection of scientists willing to openly share data; incorporation of family foundations able to provide critical financial resources and who appreciate that the selected scientists both acknowledge the importance of and actively strive for therapy advancement; maintenance of flexibility from key players permitting adaptation to a rapidly changing environment, and welcoming the expertise of outside scientists, even if only for selected projects or a limited time; and most importantly, creation of a cohesive group of people with a shared vision to increase knowledge while simultaneously advancing therapeutics. Though there is no single correct formula for achieving success, we hope this blueprint using the "SOAR-NPC" model may help others in the rare disease community increase their knowledge and ultimately, improve the well-being of the nearly 350 million individuals worldwide who are united by the common designation of having a "rare" disease.Table 1How to establish a rare disease SOAR collaborative1. Find your fellow patients, families, and patient advocates who want to accelerate therapy-oriented research and development for the disease in question. Important characteristics: ability to give/raise research funds; good communication skills; willingness to devote time; openness to new ideas; ability to maintain confidentiality when needed within the SOAR.2. Interview and select a small group of scientists/physician scientists appropriate to the SOAR's objectives. Selection should be based on their research backgrounds, their genuine willingness to work collaboratively and openly share unpublished data and their familiarity and willingness to establish relationships with patients and families.3. Clearly identify and state main objectives of the SOAR. Be as specific as practical with regard to time frame, research strategy and/or development of treatment strategies.4. Establish a coordinated system of collaboration and communication between the scientists, ideally with one scientist acting as the Chair of the scientific working group.5. Identify a SOAR Project Manager to monitor and coordinate the scientific collaborative and to link the activities of the scientists with the patient advocates.6. Schedule regular briefings for SOAR patient advocates and twice-annual in-person joint meetings of patient advocates/families with SOAR scientists.7. Identify a small group of senior scientists to serve as an outside advisory group to be called upon as needed for advice.8. Develop payment plans, grant agreements and milestones for researchers. APMRF : Ara Parseghian medical research foundation CNS : Central nervous system CRADA : Cooperative research and development agreement CSF : Cerebrospinal fluid FDA : Food and drug administration GSLs : Glycosphingolipids HPβCD : 2-hydroxypropyl-β-cyclodextrin iIND : Individual expanded access investigational new drug NCATS : National center for advancement of translational science NCGC : National chemical genomics center NICHD : National institute of child health and human development NIH : National institutes of health NINDS : National institute of neurological disorders and stroke NNPDF : National Niemann-pick disease foundation NPC : Niemann-pick type C disease NPC1 : Niemann-pick C protein 1 NPC2 : Niemann-pick C protein 2 RAC : Research advisory committee TRND : Therapeutics for rare and neglected diseases VTS : Vtesse We acknowledge Drs. Ron Browne, Roberto Giugliani, Yiannis Ioannou, Marc Patterson, and Fran Platt, the Hempel family and the company, CollabRx, for their early contributions to the SOAR-NPC effort. We also thank Drs. William Gahl, Elizabeth Neufeld, William Sly and John Curd (deceased) for their participation on SOAR's Research Advisory Committee during the formative years of the Collaborative. We are deeply grateful to the Ara Parseghian Medical Research Foundation (APMRF) and the National Niemann-Pick Disease Foundation (NNPDF), and Janssen Research & Development, LLC, Johnson & Johnson for their collaboration and support. Finally, we thank all of the NPC families, clinicians and researchers, who are simply too numerous to list, that have helped propel the greater NPC community towards the ultimate goal of approved therapies for NPC disease. Funding {#FPar1} ======= We are grateful to the families who sponsor SOAR-NPC and collaborate with the scientific research team in this endeavor: Dana's Angel's Research Trust (Marella family), the Hide & Seek Foundation for Lysosomal Disease Research, Hadley Hope (Hadley family), Race for Adam (Recke family), Fight NPC (Chan family), and Andrews Firefly Fund (Andrews family). The important roles that these funding groups play in the operation of the SOAR-NPC Collaborative are outlined in the article. Two individuals (JJ, PDM) associated with these groups also participated in writing this article. Availability of data and material {#FPar2} ================================= Data sharing not applicable to this article as no datasets were generated or analysed during the current study. Authors' contributions {#FPar3} ====================== SUW provided the initial outline and final edit of the paper which was also significantly contributed to and edited and approved by all of the authors (CDD, JJ, PDM, EAO, CPA, FDP, CHV, and DSO). Competing interests {#FPar4} =================== NICHD and NCATS have a Cooperative Research and Development Agreement (CRADA) with Vtesse Inc. to support further development of therapies for lysosomal storage diseases including for Niemann-Pick type C. FDP is co-chair of the Scientific Advisory Board for Vtesse, Inc. as part of his official duties under the CRADA. EAO participates on the Vtesse, Inc. Preclinical Scientific Advisory Board as part of her official duty activities under the CRADA. SUW, CHV and DSO are also members of the Vtesse, Inc. Preclinical Scientific Advisory Board. All other authors declare no competing interests. Consent for publication {#FPar5} ======================= Not applicable. Ethics approval and consent to participate {#FPar6} ========================================== Not applicable.
Field The present invention relates to an electrical connector assembly. More specifically, the present invention relates to an electrical connector assembly including a power supply terminal. Related Art In a related art electrical connector assembly, as described in U.S. Pat. No. 8,734,167, herein incorporated by reference in its entirety, there is a connector assembly as illustrated in FIG. 1. In the related art example of FIG. 1, the electrical connector assembly includes an intermediate connector 10 having a housing 11 and two power supply terminals 21. The housing 11 is made of an electrical insulating material and has a substantial rectangular tubular shape with a space penetrating in a vertical direction. The power supply terminal 21 is supported by the housing 11 and extending in the vertical direction within the space of the housing 11 penetrating vertically. The power supply terminal 21 is made from a metal and has a shape of a straight pin. In the related art example of FIG. 1, the power supply terminal 21 is made as a rigid body and includes a main body portion 22 and a flange portion 23. The main body portion 22 has a shape of a pin with a circular sectional shape. The flange portion 23 is provided in a lower portion of the power supply terminal 21. The flange portion 23 has a shape of a ring projecting outward in a direction of a radius of the main body portion 22. An upper end and a lower end of the main body portion 22 are formed to be rounded. Further, the flange portion 23 includes a circumferential surface 23A having a conic shape expanding in a lower direction. The housing 11 for supporting the power supply terminal 21 having the rectangular tubular shape has a rectangular sectional shape which is elongated in a direction the power supply terminals 21 are arranged. The housing 11 includes receptacle portions 12 and 13 in an upper and lower edge portions thereof, respectively. The terminal penetrating portion 14 has a hole formed between thin walls 16 as being viewed in the direction perpendicular to a direction the power supply terminals 21 are arranged. A space is formed between an inner surface of the thin wall 16 and the power supply terminal 21. In addition, the thin wall 16 forms a space 16A between a rear side thereof and a sidewall 17. As shown in the related art example of FIG. 1, there is a terminal penetrating portion 14 which includes an elastic arm portion 18 in the lower portion thereof. The elastic arm portion 18 extends from a middle portion of the sidewall 17 of the housing 11, at a position situated on an upper side relative to the flange portion 23. The elastic arm portion 18 extends in the lower direction. The elastic arm portion 18 engages a lower surface of the flange portion 23 with a hook portion 18A provided in a lower end thereof. Additionally, a locking arm 19A extending in the lower direction and capable of elastic displacement is provided in a lower portion. Accordingly, the upper surface of the flange portion 23 is held by the bottom portion of a concaved portion and an edge portion of the thin wall 16 in one of the direction of the radius, as well as the lower surface of the flange portion 23 is held by the hook portion 18A of the elastic arm portion 18 in a direction perpendicular to the direction supra. Thereby, the power supply terminal 21 is positioned vertically. However, in some designs requiring shorter electrical connector assemblies (e.g. millimeters of reduction), a problem can occur that when the related art electrical connector assembly is made shorter, the elastic arm portion 18 may not be implementable within the related art electrical connector assembly due to lack of available spacing. Further, in some cases where the elastic arm portion 18 is implementable within a shorter version of the electrical connector assembly of FIG. 1, reduction of flexibility of the intermediate connector 10 may occur due to lack of available space. In some implementations of the electrical connector assembly, the intermediate connector 10 may have a minimum length restricted by the length of the elastic arm portion 18, which may be larger than the desired implementation.
Q: Approval Process submit for approval in bulk error I'm trying to detect which record caused an error when the Approval.ProcessResult process results in an error. The problem that I am having is I cannot relate this error back to the original record that was being submitted. It appears that upon failure one cannot get the result.EntityId() Does anyone know how to get the record that caused the error during the Approval.process? My goal is to have a visualforce page where a user selects multiple records for approval. Upon error they list should be updated with the corresponding error message of any records that failed. Thanks! reviewApprovals is a wrapper list of items that I am attempting to submit for approval. for ( reviewApproval activeApproval : activeApprovals ) { Approval.ProcessSubmitRequest req = new Approval.ProcessSubmitRequest(); req.setObjectId( activeApproval.reviewApproval.Id); submits.add( req ); } Approval.ProcessResult[] processResults = null; processResults = Approval.process(submits, false); string error = ''; for ( Approval.ProcessResult result : processResults) { if ( !result.isSuccess()) { system.debug( result.getErrors() ); for ( Database.error strError : result.getErrors() ) { error += '<br/>' + strError.getMessage(); } system.debug('error: ' + error); /* doesn't work as we cannot get the result.EntityId(); for ( integer i=0; i<reviewApprovals.size();i++ ) { if ( reviewApprovals[i].reviewApproval.Id == result.getEntityId()) { reviewApprovals[i].error = error; } } */ } } A: The indexes of the results is guaranteed to be the same order of the list that had the DML performed so you can do something like this: for ( Integer x=0;x<processResults.size();x++){ if(!processResults[x].isSuccess()){ system.debug(submits[x].getObjectId()); //this debugs the record ID that was submitted causing the error. you can do whatever you need to besides debug } }
[Unit] Description=VMware Authentication Daemon [Service] Type=forking ExecStart=/usr/bin/vmware-authdlauncher [Install] WantedBy=multi-user.target
import { Components, registerComponent } from '../../lib/vulcan-lib'; import { Posts } from '../../lib/collections/posts'; import React from 'react'; import { postHighlightStyles } from '../../themes/stylePiping' import { Link } from '../../lib/reactRouterWrapper'; const styles = (theme: ThemeType): JssStyles => ({ root: { maxWidth:570, ...postHighlightStyles(theme), }, highlightContinue: { marginTop:theme.spacing.unit*2 } }) const PostsHighlight = ({post, classes}: { post: PostsList, classes: ClassesType, }) => { const { htmlHighlight = "", wordCount = 0 } = post.contents || {} return <div className={classes.root}> <Components.LinkPostMessage post={post} /> <Components.ContentItemBody dangerouslySetInnerHTML={{__html: htmlHighlight}} description={`post ${post._id}`} /> {wordCount > 280 && <div className={classes.highlightContinue}> <Link to={Posts.getPageUrl(post)}> (Continue Reading{` – ${wordCount - 280} more words`}) </Link> </div>} </div> }; const PostsHighlightComponent = registerComponent('PostsHighlight', PostsHighlight, {styles}); declare global { interface ComponentTypes { PostsHighlight: typeof PostsHighlightComponent } }
Ronnie Lippett Ronald Leon Lippett (born December 10, 1960) is a former American professional football player who played eight seasons with the New England Patriots of the National Football League from 1983–1991. A 5'11", 180 lbs. cornerback from the University of Miami (FL), Lippett was selected by the Patriots in the eighth round of the 1983 NFL Draft. Ronnie was named the "AFC Defensive Player of the Week" as he intercepted Dan Marino twice in the Patriots 34–7 rout of the Miami Dolphins @ Sullivan Stadium on 10-05-86. Ronnie blocked an extra point attempt by Pat Leahy in the Patriots 23–13 win over the New York Jets @ Sullivan Stadium on 9-18-83. He recovered a fumble by Paul McDonald that helped set up the final TD in the Patriots 17–16 win over the Cleveland Browns on 10-07-84. Ronnie returned a pass by Art Schlitcher 13 yards, with 36 seconds left, in the Patriots 16–10 win over the Colts @ Sullivan Stadium on 12-16-84. He intercepted Joe Ferguson twice in the Patriots 38–10 rout of the Buffalo Bills @ Sullivan Stadium on 11-11-84. He intercepted Dan Marino twice in the Patriots 34–7 rout of Miami @ Sullivan on 10-05-86. He intercepted Dan Marino twice in their 27–24 loss to the Dolphins @ Foxboro Stadium on 09-09-90. Ronnie intercepted Jim Kelly and Frank Reich in the Patriots 23–3 rout of the Buffalo Bills @ Rich Stadium on 10-26-86. Ronnie intercepted Marc Wilson twice in the Patriots 27–20 AFC Playoff Game victory over the Los Angeles Raiders @ the LA Coliseum on 01-05-86. Ronnie was awarded the Patriots UNSUNG Hero Award after the 1987 season. He recovered an onside kick by Dean Biasucci in the Patriots 16–14 win over the Colts on 09-16-90. Ronnie started in 111 of his 122 regular season games for the New England Patriots and started in 4 Playoff Games. Ronnie attended Sebring High School in Sebring, FL. He currently lives in South Easton, Massachusetts. Ronnie Lippett hated the Dolphins ever since an incident when he visited a Dolphins training as a university student. Of his 24 career interceptions, 7 of them were Dan Marino passes. References Category:1960 births Category:Living people Category:American football cornerbacks Category:Miami Hurricanes football players Category:New England Patriots players Category:People from Melbourne, Florida Category:Players of American football from Florida
--- id: 5900f3b11000cf542c50fec4 challengeType: 5 title: 'Problem 69: Totient maximum' videoUrl: '' localeTitle: 问题69大欧拉 --- ## Description <section id="description"> Euler的Totient函数φ(n)[有时称为phi函数]用于确定小于n的数字的数量,这些数字是n的相对素数。例如,如1,2,4,5,7和8都小于9且相对于9,φ(9)= 6。 <p> n相对素数φ(n)n /φ(n)2 1 1 2 3 1,2 2 1.5 4 1,3 2 2 5 1,2,3,4 4 1.25 6 1,5 2 3 7 1,2, 3,4,5,6 6 1.1666 ... 8 1,3,5,7 4 2 9 1,2,4,5,7,8 6 1.5 10 1,3,7,9 4 2.5 </p><p>可以看出,对于n≤10,n = 6产生最大n /φ(n)。找到n≤1,000,000的值,其中n /φ(n)是最大值。 </p></section> ## Instructions <section id="instructions"> </section> ## Tests <section id='tests'> ```yml tests: - text: <code>euler69()</code>应该返回510510。 testString: assert.strictEqual(euler69(), 510510); ``` </section> ## Challenge Seed <section id='challengeSeed'> <div id='js-seed'> ```js function euler69() { // Good luck! return true; } euler69(); ``` </div> </section> ## Solution <section id='solution'> ```js // solution required ``` /section>