text stringlengths 8 5.77M |
|---|
The United States Postal Service has been reporting billion-dollar losses annually for more than a decade. In 2010, the agency hired private consultants who advised it to cut back operation days, increase mail delivery times, automate postal services and replace unionized labor with non-unionized labor.
Pete Buttigieg was on that team of consultants as an employee with McKinsey & Company.
Buttigieg, who spent three years at McKinsey, is now the mayor of South Bend, Indiana, and is seeking the Democratic nomination for president. On Tuesday he released his client list from 2007 to 2010, which included the Postal Service. Since then, Buttigieg, who has seen a significant bump in recent early state polls, has faced scrutiny for what he did at McKinsey, a company known for prioritizing corporate profits.
The outcome of that 2010 Postal Service project was a report, drawing on suggestions from McKinsey and two other consulting groups. It was fairly critical of revenue-raising ideas supported by union workers, like expanding financial services through the post office, warning they would be “limited by high operating costs and the relatively light customer traffic of Post Offices compared to commercial retailers.”
Any objective observer would have to say McKinsey had a real and negative impact. Mark Dimondstein, president of the American Postal Workers Union
But in a statement to HuffPost, the Buttigieg campaign distanced the mayor from that report, insisting he didn’t work on cost-cutting but rather focused on raising revenue through products like greeting cards.
“Pete was part of a team tasked with generating ideas to increase revenue like selling greeting cards and increasing the use of flat rate boxes, and exploring new products to get more people to use the postal service and help make it profitable,” Buttigieg’s campaign said. “He never worked on cost-cutting or anything involving staff reorganization or the privatization of essential post office services.”
The Postal Service implemented a number of recommendations from the 2010 report — decisions that are now widely regarded as failures. The Postal Service closed 141 processing plants in 2012 and 2013, after adopting a proposal to increase delivery times. A 2018 audit from the Postal Service’s regulatory body found the decision only reaped 5% of the savings the private consultants projected it would.
Another of McKinsey’s proposals, to cut costs by establishing public-private partnerships, replaced unionized Postal Service workers with staff at retail stores like Staples. In 2014, that swap ran into legal trouble with the National Labor Relations Board, which ruled it in violation with the collective bargaining agreement between the postal workers’ union and the USPS.
“Any objective observer would have to say McKinsey had a real and negative impact,” said Mark Dimondstein, the president of the American Postal Workers Union, which endorsed Sen. Bernie Sanders (I-Vt.) for president in 2016. “These are corporate consultants and corporations are generally not about the public good and the public commons.”
The Buttigieg campaign said it could not specify which products the South Bend mayor worked on, but noted that Buttigieg left McKinsey before the March 2010 report was finalized. Buttigieg has criticized McKinsey’s more recent clients, calling its work with U.S. Immigration and Customs Enforcement “disgusting” in an interview with CNN. In an interview with The New Yorker, he said he found the company’s decisions “infuriating ... especially in years since I left the firm.”
Buttigieg has downplayed his role at McKinsey on the presidential campaign trail, saying he was just a junior employee. However, during his run for mayor, Buttigieg leaned into his time in the private sector, saying that dealing with multibillion-dollar budgets in part qualified him to be mayor.
As the youngest candidate in the race for president, Buttigieg’s experience in the private sector makes up a significant chunk of his overall resume. And the Postal Service’s financial situation is an issue any president will likely have to confront in the coming years.
The Postal Service’s financial turmoil is well documented. In 2019, USPS reported $8.8 billion in operating losses, despite increasing revenues by more than $1 billion. The Postal Service is government-run, but doesn’t get taxpayer dollars like other government agencies. It is subject to the partisan whims of Congress, however.
Meg McLaughlin/ASSOCIATED PRESS Democratic presidential candidate and South Bend, Indiana, Mayor Pete Buttigieg speaks during a campaign stop at the Danceland Ballroom on Dec. 7, in Davenport, Iowa.
Republicans have long called for severe cost-cutting measures and for the system to be turned over completely to private companies. Democrats point out, however, that much of the financial turmoil is attributable to a 2006 law requiring the Postal Service to pre-fund retirement benefits, unlike any other government pension system. USPS is currently $150 billion in debt, in large part because of the mandate to pre-fund retirement payments.
There are two schools of thought on how to get out of this debt. The Trump administration has called for major cost-cutting, which the union warns will hurt workers and put consumers — particularly seniors who rely on the Postal Service for timely access to prescription drugs — at risk of worse service. The McKinsey report, which acknowledges the detrimental pension system, strongly errs on the side of privatization and cost-cutting; their proposals amounted to reducing hours, consolidating processing facilities, offering kiosks and potentially charging more to send mail and packages to difficult-to-reach locations.
On the other end of the spectrum, politicians like Sanders and Sen. Elizabeth Warren (D-Mass.) have been strong supporters of expanding postal services far past greeting cards — into financial services like banking. The Postal Service already does some of this, issuing money orders and cashing some checks.
Buttigieg’s campaign has said the candidate is considering a form of postal banking that would expand access to financial services and credit, and work against predatory lending practices. Those policies would be a departure from the McKinsey recommendations his former employer supported, and would get likely serious pushback from corporate banking interests.
“It gets to the role of government,” said Donald Cohen, the executive director of In the Public Interest, a think tank that promotes democratic control of public services. “What do we think we should be doing together?”
Should the post office expand its services in the community? Should it become a bank? Provide more census services? Notary?
“Folks that McKinsey work with would say that’s not the role of government,” Cohen said.
Clarification: Language has been amended to note that the American Postal Workers Union endorsed Sanders in the 2016 election, not 2020. |
Player Page
Brennan Clay | Running Back
Latest News
Recent News
Broncos signed Oklahoma RB Brennen Clay.
Clay (5-foot-10 3/4, 202) was the No. 2 running back recruit in the 2010 high school class, behind only Penn State/USC's Silas Redd. (2010 wasn't a good year for RBs.) A committee back for his entire stay at Oklahoma, Clay wound up rushing 379 times for 1,913 yards (5.05 YPC) and 13 touchdowns, with 52 receptions. He ran 4.64 at the Sooners' Pro Day, adding a respectable 9-foot-11 broad jump. Clay has enough talent to be a No. 2 NFL back, but lacks starting-caliber attributes. He'll fight for reps behind Montee Ball and C.J. Anderson. Sun, May 11, 2014 02:44:00 PM
Oklahoma senior RB Brennan Clay accepted an invitation to play in the East-West Shrine Game.
Clay rushed for 913 yards and six touchdowns this past season for an average of 5.8 yards per carry. The senior's production came in bursts, as he dropped 200 yards in a win over Kansas State and another 170 in a victory over West Virginia. Clay may not have lived up to the recruiting hype in Norman, but Bob Stoops didn't help matters with his seemingly random running back platoons. Fri, Dec 20, 2013 03:19:00 PM
Oklahoma senior RB Brennan Clay rushed for 170 yards on 22 carries in a 16-7 win over West Virginia.
Clay and Damian Williams practically split carries, but Clay made the most of his opportunities. Oklahoma's offense has really struggled thus far with young passer Trevor Knight at the helm. Knight struggles to pass from the pocket but can move defenses with his feet. We expect the Sooners to rely on the running game throughout this season. Sun, Sep 8, 2013 09:28:00 AM
Oklahoma beat writer John Hoover believes that Sooners junior RB Brennan Clay is no longer the odd man out in the team's backfield after his 157 yard performance.
Hoover states that Clay, "finally arrived, finally lived up to his recruiting hype, finally had a big-play, consistent-play, breakout game." Just one week prior to his outstanding performance against Iowa State, Clay only received one carry against Notre Dame. The Sooners backfield is a mess to predict, and the real odd man out is Roy Finch. Wed, Nov 7, 2012 10:36:00 AM
Player News
Oklahoma senior RB Brennan Clay accepted an invitation to play in the East-West Shrine Game.
Clay rushed for 913 yards and six touchdowns this past season for an average of 5.8 yards per carry. The senior's production came in bursts, as he dropped 200 yards in a win over Kansas State and another 170 in a victory over West Virginia. Clay may not have lived up to the recruiting hype in Norman, but Bob Stoops didn't help matters with his seemingly random running back platoons.
Oklahoma senior RB Brennan Clay rushed for 170 yards on 22 carries in a 16-7 win over West Virginia.
Clay and Damian Williams practically split carries, but Clay made the most of his opportunities. Oklahoma's offense has really struggled thus far with young passer Trevor Knight at the helm. Knight struggles to pass from the pocket but can move defenses with his feet. We expect the Sooners to rely on the running game throughout this season.
Oklahoma beat writer John Hoover believes that Sooners junior RB Brennan Clay is no longer the odd man out in the team's backfield after his 157 yard performance.
Hoover states that Clay, "finally arrived, finally lived up to his recruiting hype, finally had a big-play, consistent-play, breakout game." Just one week prior to his outstanding performance against Iowa State, Clay only received one carry against Notre Dame. The Sooners backfield is a mess to predict, and the real odd man out is Roy Finch.
With depth an issue this spring, Brennan Clay should receive plenty of work toting the football.
Dominique Whaley is not available this spring as he continues to recover from a broken ankle suffered last season and JC transfer Damien Williams will not be in Norman until June. Clay, who was bothered by injuries last season, had a nice contribution (9-44 rush and 3 rec.) in the Insight Bowl win over Iowa. He was 75-274-1 with 18 receptions on the year.
The pre-season AP No. 1 is trying to find a No. 1 running back, a spot that could be occupied by sophomore Brennan Clay.
When Heisman candidate QB Landry Jones turns to hand off the ball in the opener against Tulsa on Sept. 3, Clay could be the man initially getting it in the breadbasket. The sophomore, who had 36 carries last season, is listed atop the Sooners' depth chart at the position. Four others are in the mix, including Roy Finch, OU's leading returning rusher with 398 yards. |
A perverse struggle is underway now within the “Blob.” Half of Washington (or slightly more) is convinced that Russia has undertaken a brazen attack against America’s democratic institutions and that liberalism everywhere, but particularly in its Euro-Atlantic core, is under sustained assault from the Kremlin and its army of “bots.” But the other half believes such claims are mostly malarkey intended to undermine the current president’s electoral legitimacy. They contend, by contrast, that Russia is merely one “chess piece” in the larger struggle against China. Recent references on the right to Beijing’s “interference in American domestic politics” illustrate how willing one side of this asinine debate takes up the dubious ammunition deployed by the other.
In a somewhat cynical way, the current administration’s sudden announcement that the United States intends to withdraw from the Intermediate-Range Nuclear Forces (INF) Treaty is an attempt to square this circle. In what seems on the surface to represent a robust diplomatic demarche aimed at the Kremlin, the reality is an attempt to apply heavy diplomatic and strategic pressure on Beijing. Yet, the move has the rather convenient, simultaneous impact of mollifying (or at least briefly quieting) the many Kremlin-baiters on Capitol Hill. Indeed, the subtext of National Security Advisor John Bolton’s recent visit to the Kremlin appears to have been an attempt to suggest to Russia’s leaders that China constitutes the biggest threat to Russia, as well as to America.
One Russian-language article in the newspaper Nezavisimaya Gazeta [Независимая Газета] (NG) covering the Bolton visit to Moscow appeared under the headline “The Kremlin is Advised to Keep Away from China” [Кремлю Предлагают Держатся от Китая Подальше]. To my estimate, the withdrawal from IMF is more a political stunt that laid the groundwork for the second Putin-Trump meeting coming up in France, rather than a well thought out strategy. But first let’s consider a timely October 2018 analysis in Military Review [Военное Обозрение] by Ilya Polansky, which asks the vital question in the headline: “Who is the Main Enemy for the USA: China or Russia [Кто главный враг США: Китай или Россия]?”
Polansky observes that following the collapse of the Soviet Union, Moscow was simply too weak to stand up to Washington. He explains that “it was an era of a unipolar world, in which the USA dictated its will to the rest of humanity. [было эпохой однополярного мира, в котором США диктовали свою политическую волю всему остальному человечеству].” After the Georgia War in 2008, he contends that “our country returned to its usual spot for Americans – enemy of the progress of humankind.” Then, the Ukraine events of 2014 meant Russia became the “main enemy of ‘American democracy.’” After that, he asserts, “… a real information war against our country began.” By contrast, Polansky suggests that America’s problem with China is more economical than ideological. For instance, he illustrates that America has very good relations with its former enemy Vietnam—still very much a communist state. Moreover, Polansky writes: “In the White House, China’s policy is considered to be expansionist [В Белом доме политику Китая квалифицируют как экспансионистскую].”
He sees the Washington establishment as divided among anti-Chinese conservatives and primarily Russophobic cosmopolitan liberals. The article notes that some American conservatives sympathize with President Vladimir Putin and consider “Russia as an outpost of traditional and conservative values… [о России как о форпосте традиционных и консервативных ценностей].” Without rendering judgment, Polansky even admits that some of these conservatives might prefer Russia, as a country facing the common problems of “‘white’ humanity [‘белым’ человечеством].” The author then lists some of the accusations that American “cosmopolitan liberals” level against Russia, including “violations of human rights, freedom of sexual minorities, [and] persecution of the opposition…” With a little bit of seeming sympathy, he allows that the liberal cosmopolitan “position is more principled … [Их позиция более принципиальна].”
Putting aside momentarily Washington’s ferocious debate on which power constitutes the gravest threat, was Bolton’s recent trip to Moscow the first attempt to play the Russia card against China? This is what I have described elsewhere as a “Kissinger move in reverse.” To say that Moscow is skeptical of this overture is likely a significant understatement. The sub-head of the article summarizing Bolton’s visit to the Kremlin reads “Putin will not succeed in avoiding the China theme at the new meeting with Trump [Путину на новой встрече с Трампом не удастся обойти тему КНР],” which implies obviously this is not a subject that Putin wants on the agenda.
That article also features comments from Fyodor Lukyanov, Chairman of the Council on Russian Foreign and Defense Policy. He comments that the upcoming summit must rightly focus on the urgent issues of nuclear weapons and arms control, Syria, Ukraine, and North Korea. As a sad comment on the state of contemporary U.S. diplomacy, he notes dryly that it matters not what is actually discussed, since “the result will be something completely different,” given the American President’s total focus is on domestic political imperatives. With regard to China, Lukyanov offers crisply: “There are no people crazy enough to think that Russia would be willing to join an anti-China alliance [Нет сумасшедших, которые бы полагали, что Россия готова вступить в антикитайский альянс].” Lukyanov explains that Bolton’s efforts are aimed at preventing Russia and China from becoming ever closer: “Bolton has not hid this and is not hiding it [Болтон этого не скрывал и не скрывает].” Noting that Beijing is one of Moscow’s most important partners, he concludes, “There is no doubt that the Trump Administration has China on their minds – it’s their policy. Russia, of course, will not join them [Россия, конечно, к ним присоединяться не будет].”
Perhaps the idea of discarding the INF Treaty is not entirely senseless. After all, it could prompt some discussion in Moscow, Beijing and elsewhere about the nature and direction of China’s rapid improvements in missile technology. The practical impact of leaving the INF Treaty is, moreover, likely exaggerated. Putting aside the not inconsiderable issue that Washington would probably have nowhere to base medium-range missiles in either Europe or the Asia-Pacific, both superpowers have more than enough nuclear firepower on sea-based and air-based assets to obliterate each other many times over.
On the other hand, the symbolic import of leaving the INF Treaty will undoubtedly be enormous and devastating, further inflaming dangerous rivalries and putting into question other important arms control agreements. As venerated Republican statesman George Schultz wrote recently in the New York Times, “Leaving the treaty would be a huge step backward.” Both political parties in America are partially responsible for the New Cold War and the resulting chaotic and violent state of world politics. Under President George W. Bush, the wrecking ball was first applied to arms control as America pulled out of important agreements such as the ABM Treaty. However, President Bill Clinton started the fateful ball rolling on North Atlantic Treaty Organization expansion, while President Barack Obama poisoned the delicate U.S.-China relationship with his poorly thought out “Pivot to Asia” and clumsy attempt to undermine the Asian Infrastructure Bank.
Trying to play a “Russia card” against China now is at best a pointless waste of time based on a simplistic view of history, but at worst may well further intensify strains across the key geopolitical rivalries. I have explained elsewhere that China-Russia cooperation is helpful on the most delicate and vital issue of North Korea. American leaders must rise above geopolitical gamesmanship derived from simplistic, zero-sum thinking and attempt to build a more viable world order by nurturing, constructive relationships simultaneously with all other great powers.
Lyle J. Goldstein is a research professor in the China Maritime Studies Institute at the United States Naval War College in Newport, RI. In addition to Chinese, he also speaks Russian, and he is also an affiliate of the new Russia Maritime Studies Institute at Naval War College. You can reach him at [email protected]. The opinions in his columns are entirely his own and do not reflect the official assessments of the U.S. Navy or any other agency of the U.S. government.
Image: Reuters |
Pathophysiological roles of P2 receptors in glial cells.
Extracellular nucleotides act through specific receptors on target cells: the seven ionotropic P2X and the eight G protein-coupled P2Y receptors. All these receptors are expressed by brain astroglia and microglia. In astrocytes, P2 receptors have been implicated in short-term calcium-dependent cell-cell communication. Upon mechanical stimulation or activation by other transmitters, astrocytes release ATP and respond to ATP with a propagating wave of intracellular calcium increases, allowing a homotypic astrocyte-astrocyte communication, as well as an heterotypic signalling which also involves neurons, oligodendrocytes and microglia. Astrocytic P2 receptors also mediate reactive astrogliosis, a reaction contributing to neuronal death in neurodegenerative diseases. Signalling leading to inflammatory astrogliosis involves induction of cyclo-oxygenase 2 through stimulation of ERK1,2 and of the transcriptional factors AP-1 and NF-kappaB. Microglia also express several P2 receptors linked to intracellular calcium increases. P2 receptor subtypes are differentially regulated by typical proinflammatory signals for these cells (e.g. lipopolysaccharide), suggesting specific roles in brain immune responses. Globally, these findings highlight the roles of P2 receptors in glial cell pathophysiology suggesting a contribution to neurodegenerative diseases characterized by excessive gliosis and neuro-inflammation. They also open up the possibility of modulating brain damage by ligands selectively targeting the specific P2 receptor subtypes involved in the gliotic response. |
The pathogenesis of hypertension-induced target organ damage is related to long-term changes in vessel function and structure. This maladaptive process of vascular remodeling is determined by genetic programs governing cell growth, programmed cell death, inflammation and matrix modulation. The set of genes that are actively expressed by the genome, the transcriptome, is a dynamic determinant of the cellular phenotype and tissue function. The proposed project will test the central hypothesis that target organ damage in hypertension is mediated by the selective up-regulation of a "vasculopathic" gene profile induced by the renin-angiotensin-aldosterone system (RAAS) and is counterbalanced by an intrinsic set of "vasculo-protective" genes activated by the nuclear receptor PPAR-gamma. Our experimental strategy will incorporate transgenic animals and classic pharmacologic approaches as well as DNA microarray and serial analysis of gene expression (SAGE) technologies. These analytical tools will enable us to define the vascular transcriptome during the pathogenesis of hypertension-induced target organ damage. One outcome of these studies will be the characterization of a common "pharmacogenomic" profile of genes shared by therapeutic strategies that prevent target organ damage that are selectively targeted at modulating the activation of the angiotensin type I receptor, the mineralocorticoid receptor and the PPAR-gamma receptor/transcription factor. The specific aims of the project are to: Define the vascular transcriptome associated with hypertension-induced target organ damage by establishing vascular SAGE libraries in both murine and human primary hypertension. Define the mediator role of the renin-angiotensin-aldosterone system as a "vasculo-pathic" determinant of the vascular transcriptome during hypertension-induced target organ damage. Define the mediator role of PPAR-gamma as a "vasculo-protective" determinant of the vascular transcriptome during hypertension-induced target organ damage. |
Asthma is an obstructive lung disease in which recurrent bronchospasms cause breathing difficulties, dyspnoea and wheezing ([Holgate and Polosa, 2006](#bib10){ref-type="other"}). The prevalence of asthma has increased during the past decades and according to a US survey, 8.9% of the adult population has ever been diagnosed with asthma ([Scheller *et al*, 2006](#bib21){ref-type="other"}). The annual incidence rate for adults has been 2.2 cases per 1000 persons in the Nordic countries ([Toren *et al*, 2004](#bib26){ref-type="other"}). An improved hygiene and a drop in exposure to viral and bacterial infections are thought to explain part of the increase ([Maddox and Schwartz, 2002](#bib14){ref-type="other"}; [Oh *et al*, 2004](#bib18){ref-type="other"}; [Yeatts *et al*, 2006](#bib32){ref-type="other"}). An enhanced TH2 immune response followed by an increased production of cytokines of type IL-4 and IL-5 are thought to contribute to the development of asthma ([Ngoc *et al*, 2005](#bib17){ref-type="other"}). Corticosteroids and *β*-adrenergic bronchodilators have been the principal medication for asthma, and from about 1970 these have been administered by inhalation ([Chu and Drazen, 2005](#bib5){ref-type="other"}; [Bateman *et al*, 2008](#bib3){ref-type="other"}). As newer agents were introduced in the 1990s, antileukotrienes targeted the bronchoconstrictor and anti-IgE block circulating IgE ([Chu and Drazen, 2005](#bib5){ref-type="other"}). The changing asthma treatment in Sweden between 1980 and 1991 led to a 3.8-fold increase in the cost of pharmaceuticals, mainly inhaled corticosteroids, which in turn decreased the need for hospital admissions by 35% in the same period ([Jacobson *et al*, 2000](#bib12){ref-type="other"}; [Bateman *et al*, 2008](#bib3){ref-type="other"}).
The immune system has important functions against tumour formation ([Swann and Smyth, 2007](#bib24){ref-type="other"}). Thus, dysregulation of the immune function in conditions such as asthma could potentially lead to cancer development. Some earlier studies have evaluated the association between a history of asthma and cancer occurrence, but the results have been inconsistent ([Alderson, 1974](#bib2){ref-type="other"}; [Vena *et al*, 1985](#bib29){ref-type="other"}; [Markowe *et al*, 1987](#bib15){ref-type="other"}; [Reynolds and Kaplan, 1987](#bib20){ref-type="other"}; [Kallen *et al*, 1993](#bib13){ref-type="other"}; [Vesterinen *et al*, 1993](#bib30){ref-type="other"}; [Ye *et al*, 2001](#bib31){ref-type="other"}; [Boffett *et al*, 2002](#bib4){ref-type="other"}; [Soderberg *et al*, 2006](#bib23){ref-type="other"}). Many earlier studies have been small in size and short in follow-up time. To overcome these limitations, we carried out a longitudinal cohort study to quantify the subsequent cancer risk in hospitalised asthma patients, using the Swedish nationwide registers. This study is by far the largest one published on the theme, covering 140 425 patients and allowing a separate analysis of patients with multiple hospital admissions and thus with chronic asthma.
Patients and methods
====================
We used the Swedish Hospital Discharge Register, founded in 1964--65 by the National Board of Health and Welfare with a complete nation-wide coverage since 1987, to create a cohort of asthma patients. Only those patients with hospital admission on account of asthma were included in this study. These patients were retrieved from the registry according to the seventh (1964--68 code 241), eighth (1969--86 code 493), ninth (1987--96 code 493), and tenth (1997-- code J45 and J46) International Classification of Diseases (ICD) codes. However, outpatients were not included in the Swedish Hospital Discharge Register, and therefore these patients were not included in our study. A total of 140 425 patients were identified in the registry. The study cohort was linked to the national Swedish Cancer Registry, founded in 1958 with close to 100% coverage, to ascertain all incident cancers from the start of follow-up until 31 December 2004. The Cancer Registry used a four-digit code according to ICD-7 to identify malignant tumours during the study period. Additional linkages were carried out to the national census data to obtain individual occupational status, to the National Registry of Causes of Death to identify the date of death, and to the Emigration Registry to identify the date of emigration. All linkages were carried out by the use of an individual national identification number that is assigned to each person in Sweden for his or her lifetime. This number was replaced by a serial number for each person in order to provide anonymity.
Person-years were calculated from the last hospital admission for asthma until diagnosis of cancer, death, emigration or closing date (31 December 2004), whichever came first. The follow-up time was divided into four periods: \<1, 1--4, 5--9 and ⩾10 years. Standardised incidence ratios (SIRs) were calculated as the ratio of observed to expected number of cases. The expected numbers were calculated by the incidence rates for all individuals without a history of asthma, and the incidence rates in the reference group were similar to the general population in our database. The rates were standardized by 5-year age, gender, period (5-year group), socioeconomic status, and residential area ([Esteve *et al*, 1994](#bib7){ref-type="other"}). For cancers of the female reproductive system, age at first childbirth and parity were also standardised. The 95% confidence interval of the SIR was calculated assuming a Poisson distribution, and they were rounded to the nearest two decimals ([Esteve *et al*, 1994](#bib7){ref-type="other"}). Temporal trend was tested based on the χ^2^ distribution of the test statistic *χ*^*2*^ with 1 degree of freedom. All analyses were performed using the SAS statistical package (version 9.1; SAS Institute, Cary, NC, USA). The ethics committee at Karolinska Institute, Stockholm, Sweden, approved this study.
Results
=======
A total of 140 425 patients were hospitalised in Sweden for asthma during 1965--2004; among them 83 098 (59.2%) patients were hospitalised only once, 22 338 (15.9%) twice, 10 253 (7.3%) thrice, 5836 (4.2%) for four times, 3717 (2.7%) for five times, and 15 183 (8.7%) for more than five times. A total of 7421 patients developed subsequent cancer after being hospitalised for asthma, giving an overall SIR of 1.36 and a SIR of 1.24 for cancer diagnosed later than 1 year of the last hospital admission (all 1+), as shown in [Table 1](#tbl1){ref-type="table"}. Only those cancer sites with at least 60 cases during the whole follow-up period were listed. The risk for some cancer sites, such as lung cancer and leukaemia, was high during the first year, probably because of a concomitant diagnosis of asthma and cancer. Thus, we show the data for the whole follow-up period and 1+, respectively; the results agreed for significant increases and decreases for almost all the examined cancers. The highest overall increase of 2.28 was noted for lung cancer, and the increases were noted in the whole follow-up periods. Even all the other cancers, with an exception for breast and ovarian cancers and non-Hodgkin\'s lymphoma and myeloma, showed a significantly increased SIR. A significantly decreased SIR was noted for endometrial cancer (0.77) and skin melanoma (0.84).
Multiple hospital admissions may reflect the disease severity, and we examined cancer risk by the number of hospital admissions by starting the follow-up after the last admission ([Table 2](#tbl2){ref-type="table"}). The overall SIR was 1.23 for asthma patients who have been hospitalised once, and it was slightly increased to 1.25 for those with 2--5 hospital admissions and to 1.29 for those with more than five hospital admissions. The SIR was higher for almost all cancers when asthma patients had multiple hospital admissions, with an exception for lung, bladder and endocrine gland tumours, and leukaemia. We tested for the significance of the trend in the number of hospital admissions (see asterisk after 'cancer site\'). Stomach and colon cancers and non-Hodgkin\'s lymphoma showed an increasing trend with the number of admissions, whereas a reverse trend was noted for lung cancer. In those hospitalised more than five times, the SIR of kidney cancer exceeded that of lung cancer.
To study the periodic effects in respect to the changing therapeutic regimens and diagnosis criteria, we analysed cancer risk among asthma patients who were hospitalised in the 1970s, 1980s, and 1990s ([Table 3](#tbl3){ref-type="table"}). As maximally 14 years could be followed up for those who had been hospitalised in the 1990s, analyses were limited to cancers diagnosed 1--14 years after the last hospital admission. The overall SIR was marginally higher for the patients hospitalised in the 1970s compared with those hospitalised later. The highest risk (2.79) was noted for oesophageal cancer when patients were hospitalised in the 1990s. We tested for the significance of the temporal trends. The risk for stomach cancer and melanoma showed an increasing temporal trend, whereas a reverse trend was noted for non-Hodgkin\'s lymphoma.
Discussion
==========
In this population-based study, 140 425 asthma patients were identified from the Swedish Hospital Discharge Register and were followed up to 40 years, an observation time longer than that in any published study on this theme. The additional strengths of our study include its population-based prospective design and completeness of follow-up of the patients. All the data were from nation-wide databases guaranteeing reliable information. One limitation of this study is that because multiple comparisons were performed, some of the findings may be due to chance. The lack of information regarding medication and treatment and regarding the possible confounding factors, such as smoking, is another limitation. Moreover, the data from this study are not directly applicable to all patients with asthma because outpatients were not included in this study and hospitalised patients probably represent a severe and chronic clientele.
Overall, a 36% excess incidence of cancer was noted among asthma patients who had been treated in hospitals. Most earlier studies reported a reverse association or no association between asthma and the overall cancer risk ([Kallen *et al*, 1993](#bib13){ref-type="other"}; [Turner *et al*, 2005](#bib28){ref-type="other"}, [2006](#bib27){ref-type="other"}); a Swedish study from the earlier days of the Hospital Discharge Register reported a decreased mortality of 66% ([Kallen *et al*, 1993](#bib13){ref-type="other"}). According to a recent review on cancer risk in asthma ([Turner *et al*, 2006](#bib27){ref-type="other"}), only one Finnish cohort study has shown a positive association ([Vesterinen *et al*, 1993](#bib30){ref-type="other"}), but significant only for men. The number of cancer cases in our study was almost the sum of cases in three earlier cohort studies ([Kallen *et al*, 1993](#bib13){ref-type="other"}; [Vesterinen *et al*, 1993](#bib30){ref-type="other"}; [Turner *et al*, 2005](#bib28){ref-type="other"}). For the cancers overall, the highest risks were noted during the first year after last hospital admission for asthma, which could be due to lead time bias because of concomitant diagnosis. However, these earlier cancers were so few that the SIRs calculated for the whole follow-up period and for the whole period minus the first year were basically unchanged.
For specific cancers, some of the observed associations have been reported earlier. The increased risk for lung cancer was noted in many earlier studies ([Vesterinen *et al*, 1993](#bib30){ref-type="other"}; [Huovinen *et al*, 1997](#bib11){ref-type="other"}; [Mayne *et al*, 1999](#bib16){ref-type="other"}; [Boffett *et al*, 2002](#bib4){ref-type="other"}). Smoking is a common risk factor for lung cancer and asthma ([Silverman *et al*, 2003](#bib22){ref-type="other"}; [Eisner, 2008](#bib6){ref-type="other"}). The excess of bladder and kidney cancers in our study may also reflect confounding by smoking; however, the data on the number of hospital admissions and on temporal trends for kidney and lung cancers suggest that non-smoking-related factors contribute to kidney cancer, particularly towards the end of the study period. An increase in oesophageal and stomach cancers was reported earlier and partly attributed to gastro-oesophageal reflux caused by *β*-adrenergic medication ([Ye *et al*, 2001](#bib31){ref-type="other"}). A significant increase of rectal cancer has been reported among Finnish women ([Vesterinen *et al*, 1993](#bib30){ref-type="other"}), whereas an excess of prostate cancer has been reported in cohort studies from Japan and Australia ([Ohrui *et al*, 2002](#bib19){ref-type="other"}; [Talbot-Smith *et al*, 2003](#bib25){ref-type="other"}).
The increased risks in cancers of the colon, liver, and pancreas have not been reported earlier and most earlier studies have shown a reduced risk or risk close to unity ([Vesterinen *et al*, 1993](#bib30){ref-type="other"}; [Talbot-Smith *et al*, 2003](#bib25){ref-type="other"}; [Turner *et al*, 2005](#bib28){ref-type="other"}). The excess of colon cancer increased with the number of hospital admissions and the SIR was 1.99 for those hospitalised more than 5 times, highest for any cancer, suggesting a true aetiological link. IL-6 trans-signalling is critically involved in the maintenance of both asthma and colon cancer ([Scheller *et al*, 2006](#bib21){ref-type="other"}). Asthma medications may also play a role in this association ([Friedman *et al*, 1998](#bib8){ref-type="other"}). Although a recent review reported no association with pancreatic cancer ([Turner *et al*, 2006](#bib27){ref-type="other"}), a 56% excess was noted in our study and the risk was significant even after 1 year of hospital admission. An increased occurrence of squamous cell skin cancer has not been reported earlier. This cancer is one of the hallmarks of dysregulated immunity; another hallmark, non-Hodgkin\'s lymphoma, showed no increase and a decrease in those hospitalised only once. The decrease in endometrial cancer raised the possibility that dysregulated immune function among asthma patients may affect oestrogen production ([Ahmed *et al*, 1999](#bib1){ref-type="other"}; [Hemminki *et al*, 2008](#bib9){ref-type="other"}). The only other tumour with a decreased risk was melanoma, but only in asthmatics diagnosed in the 1970s. The increase in cervical cancer may signal vulnerability to infection by human papillomaviruses; immune impairment is a risk factor for cervical cancer. In contrast to the inverse association between asthma and leukaemia in the earlier studies, an increased risk was noted in our study. The positive associations with cancers of the upper aerodigestive tract, nervous system, and endocrine glands were confined for the first year after hospital admission, suggesting that they were due to the lead-time bias.
We examined the study group by the number of hospital admissions, using this as a surrogate for disease severity and chronicity. The overall cancer risk was not affected, but there were large differences by cancer types. The excess in stomach, colon, liver and skin cancers were most pronounced with multiple hospital admissions, and so was the protection in endometrial cancer. For oesophageal cancer, the highest risk of 2.21 was noted for those hospitalised 2--5 times. The two-fold risk of colon cancer may indicate medical surveillance.
The diagnostic criteria and treatment for asthma patients have changed during the follow-up period. We examined the temporal trends of cancer development among asthma patients. The overall risk was marginally higher for patients hospitalised in the 1970s compared with the later periods, and for the most specific cancers the risk did not change or decreased slightly during the study period. In view of the large increase in medications, the relatively constant risks observed throughout the study period suggest that the medical condition 'asthma\' rather than its medication may be associated with cancer risk. However, the increasing temporal trend for stomach cancer calls for clinical attention.
In summary, a 36% excess incidence of cancer was noted among asthma patients. The robust relative risks and their consistency with multiple hospital admissions suggest real associations with several cancer sites and protection for endometrial cancer, more likely with the disorder than with its medication.
This study was supported by Deutsche Krebshilfe, the Swedish Cancer Society, the EU, LSHC-CT-2004-503465, and the Swedish Council for Working Life and Social Research.
######
SIR for subsequent cancer in patients with hospitalised asthma during the follow-up time
**Follow-up interval (years)**
--------------------------- -------------------------------- ----------------- -------------- ------ ----------------- -------------- ------ ----------------- -------------- ------ ----------------- -------------- ------ ----------------- -------------- ------ ----------------- --------------
Upper aerodigestive tract 20 **1.77** (1.08, 2.73) 37 1.11 (0.78, 1.53) 36 1.26 (0.88, 1.74) 42 1.09 (0.79, 1.48) 135 **1.21** (1.01, 1.43) 115 1.14 (0.94, 1.37)
Oesophagus 9 1.99 (0.90, 3.79) 29 **[2.14]{.ul}** (1.43, 3.08) 28 **[2.39]{.ul}** (1.59, 3.46) 19 1.20 (0.72, 1.88) 85 **[1.87]{.ul}** (1.49, 2.31) 76 **[1.85]{.ul}** (1.46, 2.32)
Stomach 49 **[2.41]{.ul}** (1.78, 3.18) 98 **[1.72]{.ul}** (1.40, 2.10) 44 0.96 (0.70, 1.30) 68 1.20 (0.94, 1.53) 259 **[1.44]{.ul}** (1.27, 1.63) 210 **[1.32]{.ul}** (1.15, 1.51)
Colon 98 **[2.34]{.ul}** (1.90, 2.85) 225 **[1.77]{.ul}** (1.55, 2.02) 170 **[1.54]{.ul}** (1.32, 1.79) 210 **[1.42]{.ul}** (1.24, 1.63) 703 **[1.65]{.ul}** (1.53, 1.77) 605 **[1.57]{.ul}** (1.45, 1.70)
Rectum 49 **[2.12]{.ul}** (1.57, 2.81) 82 1.18 (0.94, 1.47) 72 1.20 (0.94, 1.51) 108 **[1.33]{.ul}** (1.09, 1.61) 311 **[1.33]{.ul}** (1.19, 1.49) 262 **[1.24]{.ul}** (1.10, 1.40)
Liver 48 **[2.94]{.ul}** (2.17, 3.90) 89 **[1.88]{.ul}** (1.51, 2.31) 59 **[1.51]{.ul}** (1.15, 1.95) 49 0.99 (0.73, 1.31) 245 **[1.61]{.ul}** (1.41, 1.82) 197 **[1.45]{.ul}** (1.25, 1.67)
Pancreas 44 **[2.90]{.ul}** (2.10, 3.89) 58 1.31 (1.00, 1.70) 55 **[1.50]{.ul}** (1.13, 1.95) 66 1.40 (1.08, 1.78) 223 **[1.56]{.ul}** (1.36, 1.78) 179 **[1.40]{.ul}** (1.20, 1.62)
Lung 285 **[6.98]{.ul}** (6.19, 7.84) 294 **[2.41]{.ul}** (2.14, 2.70) 186 **[1.76]{.ul}** (1.52, 2.04) 170 1.20 (1.03, 1.40) 935 **[2.28]{.ul}** (2.14, 2.43) 650 **[1.76]{.ul}** (1.63, 1.90)
Breast 71 1.09 (0.85, 1.38) 221 1.05 (0.91, 1.20) 172 0.89 (0.76, 1.04) 297 1.07 (0.95, 1.20) 761 1.02 (0.95, 1.09) 690 1.01 (0.94, 1.09)
Cervix 11 1.79 (0.89, 3.21) 30 **1.56** (1.05, 2.23) 20 1.18 (0.72, 1.83) 32 1.28 (0.87, 1.81) 93 **[1.38]{.ul}** (1.11, 1.69) 82 **1.34** (1.07, 1.66)
Endometrium 18 1.18 (0.70, 1.87) 36 0.74 (0.52, 1.02) 30 **0.68** (0.46, 0.98) 45 0.76 (0.55, 1.01) 129 **0.77** (0.64, 0.92) 111 **0.73** (0.60, 0.88)
Ovary 19 1.60 (0.96, 2.50) 38 1.02 (0.72, 1.40) 29 0.89 (0.60, 1.28) 38 0.87 (0.61, 1.19) 124 0.99 (0.82, 1.18) 105 0.92 (0.76, 1.12)
Prostate 178 **[2.12]{.ul}** (1.82, 2.45) 346 **[1.38]{.ul}** (1.24, 1.53) 265 **[1.19]{.ul}** (1.05, 1.35) 397 **[1.26]{.ul}** (1.14, 1.39) 1186 **[1.36]{.ul}** (1.29, 1.44) 1008 **[1.28]{.ul}** (1.20, 1.36)
Kidney 38 **[2.40]{.ul}** (1.70, 3.30) 71 **[1.55]{.ul}** (1.21, 1.95) 60 **[1.61]{.ul}** (1.23, 2.07) 38 0.79 (0.56, 1.08) 207 **[1.41]{.ul}** (1.22, 1.61) 169 **[1.29]{.ul}** (1.10, 1.50)
Urinary bladder 59 **[2.21]{.ul}** (1.68, 2.85) 117 **[1.47]{.ul}** (1.21, 1.76) 87 **1.26** (1.01, 1.56) 113 1.21 (1.00, 1.45) 376 **[1.40]{.ul}** (1.26, 1.55) 317 **[1.31]{.ul}** (1.17, 1.46)
Melanoma 15 1.02 (0.57, 1.69) 30 **0.63** (0.43, 0.90) 42 0.93 (0.67, 1.26) 65 0.89 (0.68, 1.13) 152 **0.84** (0.71, 0.99) 137 **0.83** (0.69, 0.98)
Skin, squamous cell 36 **1.56** (1.09, 2.16) 92 **1.28** (1.03, 1.57) 83 **1.30** (1.04, 1.61) 116 **[1.32]{.ul}** (1.09, 1.59) 327 **[1.33]{.ul}** (1.19, 1.48) 291 **[1.30]{.ul}** (1.16, 1.46)
Nervous system 48 **[3.01]{.ul}** (2.22, 3.99) 57 1.13 (0.86, 1.47) 51 1.15 (0.85, 1.51) 66 1.08 (0.84, 1.38) 222 **[1.29]{.ul}** (1.13, 1.48) 174 1.12 (0.96, 1.30)
Endocrine glands 28 **[3.11]{.ul}** (2.07, 4.51) 33 1.18 (0.81, 1.67) 29 1.19 (0.79, 1.70) 37 1.07 (0.75, 1.47) 127 **[1.32]{.ul}** (1.10, 1.57 99 1.14 (0.92, 1.39)
Non-Hodgkin\'s lymphoma 42 **[1.87]{.ul}** (1.35, 2.53) 54 0.78 (0.58, 1.02) 47 0.77 (0.56, 1.02) 87 1.03 (0.82, 1.27) 230 0.97 (0.85, 1.10) 188 0.87 (0.75, 1.01)
Myeloma 13 1.65 (0.87, 2.82) 24 1.02 (0.65, 1.52) 21 1.05 (0.65, 1.60) 31 1.16 (0.79, 1.65) 89 1.14 (0.91, 1.40) 76 1.08 (0.85, 1.35)
Leukaemia 40 **[3.25]{.ul}** (2.32, 4.42) 56 **[1.51]{.ul}** (1.14, 1.96) 47 **[1.56]{.ul}** (1.15, 2.08) 45 1.24 (0.90, 1.65) 188 **[1.62]{.ul}** (1.40, 1.87) 148 **[1.43]{.ul}** (1.21, 1.68)
All 1264 **[2.40]{.ul}** (2.27, 2.54) 2205 **[1.38]{.ul}** (1.32, 1.44) 1700 **[1.21]{.ul}** (1.15, 1.27) 2252 **[1.16]{.ul}** (1.11, 1.21) 7421 **[1.36]{.ul}** (1.33, 1.39) 6157 **[1.24]{.ul}** (1.21, 1.28)
CI=confidence interval; SIR=standardised incidence ratio.
Bold values represent 95% CI that does not include 1.00. Underlined values represent 99% CI that does not include 1.00.
######
SIR for subsequent cancer in patients hospitalised for asthma by number of hospitalisations
**Number of hospitalisations**
--------------------------- -------------------------------- ----------------- -------------- ------ ----------------- -------------- ----- ----------------- --------------
Upper aerodigestive tract 65 1.15 (0.89, 1.47) 43 1.31 (0.95, 1.76) 7 0.62 (0.24, 1.28)
Oesophagus 39 **[1.72]{.ul}** (1.22, 2.36) 30 **[2.21]{.ul}** (1.49, 3.16) 7 1.45 (0.57, 3.00)
Stomach^\*^ 98 1.11 (0.90, 1.35) 81 **[1.54]{.ul}** (1.22, 1.92) 31 **[1.70]{.ul}** (1.15, 2.41)
Colon^\*\*^ 302 **[1.43]{.ul}** (1.27, 1.60) 212 **[1.66]{.ul}** (1.44, 1.90) 91 **[1.99]{.ul}** (1.60, 2.44)
Rectum 149 **[1.28]{.ul}** (1.08, 1.51) 78 1.12 (0.88, 1.40) 35 1.42 (0.99, 1.98)
Liver 110 **[1.47]{.ul}** (1.21, 1.77) 61 **1.35** (1.03, 1.73) 26 **1.62** (1.06, 2.38)
Pancreas 97 **[1.37]{.ul}** (1.11, 1.67) 59 **1.39** (1.06, 1.80) 23 1.55 (0.98, 2.33)
Lung^\*\*^ 402 **[1.96]{.ul}** (1.78, 2.16) 190 **[1.56]{.ul}** (1.35, 1.80) 58 **1.36** (1.04, 1.76)
Breast 399 1.04 (0.94, 1.14) 217 0.98 (0.85, 1.12) 74 0.99 (0.78, 1.24)
Cervix 46 1.30 (0.95, 1.73) 28 1.43 (0.95, 2.07) 8 1.29 (0.55, 2.55)
Endometrium 67 0.79 (0.62, 1.01) 36 **0.71** (0.50, 0.99) 8 **0.46** (0.19, 0.90)
Ovary 60 0.93 (0.71, 1.20) 34 0.92 (0.63, 1.28) 11 0.90 (0.44, 1.61)
Prostate 525 **[1.21]{.ul}** (1.11, 1.32) 359 **[1.37]{.ul}** (1.24, 1.52) 124 **[1.33]{.ul}** (1.10, 1.58)
Kidney 94 **1.27** (1.03, 1.56) 52 1.21 (0.90, 1.59) 23 **1.59** (1.00, 2.38)
Urinary bladder 189 **[1.42]{.ul}** (1.22, 1.63) 97 1.21 (0.98, 1.48) 31 1.09 (0.74, 1.55)
Melanoma 72 **0.76** (0.59, 0.95) 48 0.90 (0.66, 1.19) 17 0.97 (0.57, 1.56)
Skin, squamous cell 151 **[1.25]{.ul}** (1.06, 1.47) 94 **1.26** (1.02, 1.54) 46 **[1.64]{.ul}** (1.20, 2.19)
Nervous system 93 1.01 (0.81, 1.23) 58 1.19 (0.91, 1.54) 23 **1.58** (1.00, 2.38)
Endocrine glands 70 **[1.42]{.ul}** (1.11, 1.79) 23 0.81 (0.51, 1.22) 6 0.64 (0.23, 1.40)
Non-Hodgkin\'s lymphoma 90 **0.75** (0.60, 0.92) 71 0.01 (0.79, 1.27) 27 1.11 (0.73, 1.62)
Myeloma 42 1.08 (0.78, 1.47) 24 1.03 (0.66, 1.54) 10 1.21 (0.58, 2.24)
Leukaemia 89 **[1.46]{.ul}** (1.17, 1.80) 47 **1.45** (1.07, 1.93) 12 1.18 (0.61, 2.07)
All 3407 **[1.23]{.ul}** (1.19, 1.27) 2028 **[1.25]{.ul}** (1.20, 1.30) 722 **[1.29]{.ul}** (1.20, 1.38)
CI=confidence interval; SIR=standardised incidence ratio.
Bold values values represent 99% CI that does not include 1.00. ^\*^*P*-value for trend is \<0.05. ^\*\*^*P*-value for trend is \<0.01.
######
SIR for subsequent cancer in patients with hospitalised asthma during diagnosis period
**1970s** **1980s** **1990s**
------------------------------- ----------- ----------------- -------------- ------ ----------------- -------------- ------ ----------------- --------------
Upper aerodigestive tract 12 0.92 (0.47, 1.62) 44 1.17 (0.85, 1.57) 35 1.27 (0.88, 1.77)
Oesophagus 12 **[2.73]{.ul}** (1.40, 4.78) 18 1.18 (0.70, 1.87) 34 **[2.79]{.ul}** (1.93, 3.91)
Stomach^\*\*^ 22 0.92 (0.58, 1.39) 81 **1.36** (1.08, 1.69) 71 **[1.67]{.ul}** (1.30, 2.10)
Colon 63 **[1.69]{.ul}** (1.30, 2.17) 216 **[1.54]{.ul}** (1.34, 1.75) 201 **[1.67]{.ul}** (1.45, 1.92)
Rectum 32 **1.51** (1.03, 2.14) 81 1.04 (0.83, 1.30) 83 **1.29** (1.03, 1.60)
Liver 33 **[1.98]{.ul}** (1.36, 2.78) 87 **[1.70]{.ul}** (1.36, 2.10) 54 **1.35** (1.01, 1.76)
Pancreas 18 1.11 (0.66, 1.76) 79 **[1.66]{.ul}** (1.32, 2.08) 49 1.32 (0.97, 1.74)
Lung 96 **[2.31]{.ul}** (1.87, 2.83) 215 **[1.58]{.ul}** (1.38, 1.81) 238 **[2.21]{.ul}** (1.94, 2.51)
Breast 63 1.09 (0.84, 1.40) 239 1.01 (0.88, 1.14) 205 0.93 (0.81, 1.07)
Cervix 14 1.68 (0.92, 2.83) 29 1.39 (0.93, 2.00) 20 1.22 (0.74, 1.89)
Endometrium 8 0.64 (0.27, 1.27) 41 0.77 (0.55, 1.05) 41 0.79 (0.56, 1.07)
Ovary 16 1.23 (0.70, 2.01) 38 0.94 (0.67, 1.29) 28 0.81 (0.54, 1.17)
Prostate 97 **[1.38]{.ul}** (1.12, 1.68) 362 **[1.22]{.ul}** (1.10, 1.35) 303 **[1.28]{.ul}** (1.14, 1.43)
Kidney 17 1.00 (0.58, 1.61) 70 **[1.46]{.ul}** (1.14, 1.84) 61 **[1.61]{.ul}** (1.23, 2.07)
Urinary bladder 41 **[1.63]{.ul}** (1.17, 2.21) 115 **1.27** (1.04, 1.52) 92 **1.29** (1.04, 1.58)
Melanoma^\*^ 6 **0.39** (0.14, 0.85) 45 0.77 (0.56, 1.03) 45 0.95 (0.69, 1.27)
Skin, squamous cell 18 1.13 (0.67, 1.78) 104 **1.25** (1.02, 1.51) 96 **1.32** (1.07, 1.61)
Nervous system 23 1.30 (0.82, 1.95) 75 **[1.41]{.ul}** (1.11, 1.76) 40 0.83 (0.59, 1.13)
Endocrine glands 14 1.49 (0.81, 2.50) 41 1.32 (0.95, 1.80) 28 1.09 (0.72, 1.58)
Non-Hodgkin\'s lymphoma^\*\*^ 21 1.39 (0.86, 2.13) 76 1.26 (0.99, 1.58) 45 0.85 (0.62, 1.14)
Myeloma 4 0.53 (0.14, 1.38) 31 1.19 (0.81, 1.69) 22 1.03 (0.65, 1.57)
Leukaemia 16 1.00 (0.57, 1.64) 50 0.94 (0.70, 1.24) 56 1.11 (0.84, 1.44)
All 675 **[1.35]{.ul}** (1.25, 1.45) 2213 **[1.23]{.ul}** (1.18, 1.28) 1932 **[1.29]{.ul}** (1.23, 1.34)
CI=confidence interval; SIR=standardised incidence ratio.
Bold values represent 95% CI that does not include 1.00. Underline values represent 99% CI that does not include 1.00. ^\*^*P*-value for trend is \<0.05. ^\*\*^*P*-value for trend is \<0.01.
|
570 S.W.2d 208 (1978)
Gordon MARTIN, Appellant,
v.
MANN MERCHANDISING, INC., Appellee.
No. 5172.
Court of Civil Appeals of Texas, Eastland.
August 3, 1978.
Rehearing Denied August 31, 1978.
*209 Marvin G. Shwiff, Shwiff, Caraway & Emerson, Dallas, for appellant.
William R. Allensworth, Haynes & Boone, Dallas, for appellee.
McCLOUD, Chief Justice.
This is a summary judgment case. Plaintiff, Gordon Martin, sued defendant, Mann Merchandising, Inc., plaintiff's former employer, seeking severance and vacation pay. Plaintiff alleged that defendant represented to him that its policy was to pay one week's severance pay for each year of service and two weeks' vacation in the event his employment with defendant was terminated. Plaintiff pleaded he had been employed under an oral agreement for a period of more than eleven years and upon termination he was paid only one half of the severance and vacation pay he was entitled to receive.
The trial court granted defendant's motion for summary judgment and plaintiff has appealed. We reverse and remand.
Severance pay is usually associated with termination of the employment relationship for reasons generally beyond the control of the employee, and its purpose is to assure a worker whose employment has terminated certain funds while he seeks another job. 40 A.L.R.2d 1045.
Plaintiff stated in his affidavit opposing summary judgment that he was employed by defendant for eleven years and during that period he learned that defendant paid one week's severance pay for each year of service. He said he was furnished a copy of a memorandum showing that this was the policy of the company and he personally knew of other sales managers who were terminated and given their severance pay. Plaintiff's affidavit further provided:
"... I never thought I was going to be fired, but certainly from my knowledge of their company policy and my knowledge that other sales managers received their severance pay, I believe that I would receive such same as the others and knowing that I must have and did consciously rely upon receiving same. I did all my work and I expected the company to perform all its obligation. Everyone who left the company before me received at least 1 week's severance pay for every year of service, and I was the only one who did not receive same."
By deposition plaintiff testified that no officer or anyone with the company ever orally told him he would receive one week's severance pay for each year he worked. Plaintiff answered that he did not discuss it with anyone because he never planned on leaving. This testimony establishes that there was no express contract but plaintiff urges there was a contract implied in fact. *210 Plaintiff stated he first learned of the alleged severance pay policy after he became a regional manager. This was about a year or a year and a half before he was terminated. While being questioned about two regional managers who had received severance pay after being terminated by defendant, plaintiff stated he did not personally know how their severance pay was calculated, but one of the managers told him it was "very, very generous". Immediately following this answer, plaintiff was asked the following questions and he gave the following answers:
"Q That didn't have anything to do with your decision to take the job as Regional Manager?
A No; this happened after I had been Regional Manager.
Q Didn't have anything to do with whether you stayed on as Regional Manager, did it?
A No.
Q So, this was just something else like extra salary? If it went up, that was great; is that right?
A Give me that again, please?
Q That didn't have anything to do with whether you went to work for the company?
A When I go to work for a company, I plan on staying `til I'm dead."
Defendant contends the answers by plaintiff conclusively establish that he did not rely upon the alleged offer of severance pay. We disagree. Plaintiff clearly stated in his affidavit he did so rely. Plaintiff's answers, if contradictory, created a fact issue. United States Fidelity & Guaranty Co. v. Carr, 242 S.W.2d 224 (Tex.Civ.App. San Antonio 1951, writ ref'd). Moreover, we think "reliance" by the employee is not significant in a case of this nature. We find no Texas case in point, however, in Anthony v. Jersey Central Power & Light Co., 51 N.J.Super. 139, 143 A.2d 762 (1958), when confronted with the argument there was no evidence that the employees relied upon the promise of severance pay in continuing their employment, the court, after holding that reliance was presumed, stated:
"As was said in a different context in Diamond v. Davis, 62 N.Y.S.2d 181, 194 (Sup.Ct.1945):
`Employees have the right to place reliance upon the full performance of every authorized act and plan for employee benefit and welfare, such as group life insurance, retirement allowance, bonus, managers shares, and any other incentive offers. Every benefit firmly offered or authoritatively fixed for an employee or official which in the course of fair dealing and reasonable conduct should be rightfully expected may be regarded as part of or a just increment to the compensation payable for the work, labor or service performed or to be performed in a specified period.'
The employer obviously cannot evade liability for one of the proffered items of compensation after the employee has performed his labor by showing that the employee would have taken the job without the particular benefit in question and therefore cannot be said to have relied upon it in doing the work.
It makes no difference that the severance pay plan was promulgated after the plaintiffs had been employed for some time by defendant. Since the employment was always at will, any announcement of a change in or addition to the compensation of the employees of any form followed by the continuance of the employees in employment constituted an effective and binding agreement at the new terms for the service rendered thereafter. Consequently, once defendant improved the terms of compensation for plaintiffs' work by announcing the institution of the severance pay plan it must be assumed that plaintiffs were thereafter working for that benefit as much as for any other benefit or item of compensation held out to them as compensation by the employer.
Suppose, instead of the institution of the severance pay plan, the employer had of its own volition announced a 10% increase in the salary of the plaintiffs. *211 Could the defendant have thereafter repudiated its assumed obligation for the increase at the end of a pay period by the argument that plaintiffs had not relied thereon because they would have continued in their jobs even if the increase had not been announced? The question answers itself and also the defendant's contention here."
The Supreme Court of Oklahoma in Dangott v. ASG Industries, Inc., 558 P.2d 379 (1976), a severance pay case, cited the quoted language from Anthony v. Jersey Central Power & Light Co., supra, and added:
"Admittedly the facts in the Jersey case show the plans sought to be enforced were distributed and communicated to all employees. This difference or distinction does not destroy the principles of law enunciated. Employees at will are entitled to additional compensation or benefits under any policy, because continuance in service after such policy change effects a binding agreement under the terms of the new policy."
See also: Hinkeldey v. Cities Service Oil Company, 470 S.W.2d 494 (Mo.Sup.1971); Cain v. Allen Electric & Equipment Company, 346 Mich. 568, 78 N.W.2d 296 (1956); 56 C.J.S. Master and Servant § 87; 53 Am. Jur.2d Master and Servant § 81.
We find out of state authority which discusses and appears to require reliance by the employee; however, the existence of severance pay being a matter of contract between the parties, we hold that the question of reliance is not significant. We think the proper rule was announced in Hercules Power Co. v. Brookfield, 189 Va. 531, 53 S.E.2d 804 (1949), wherein the court held that the question to be determined was whether an offer had been made by the employer which was accepted by the employee. The court said:
"Plaintiff insists that the offer or promise made by defendant that payment of dismissal wage or salary would be made was contained in reasonably sufficient terms and the consideration to be rendered by an employee was his continued satisfactory service with the company for the period or periods mentioned in the offer. Performance of the condition imposed, he asserts, is a full and complete acceptance of the offer.
With this we agree. Through and by compliance with the terms of the offer, plaintiff necessarily had to and did forego his right to seek and accept other employment and affirmatively met all conditions imposed by rendering service to the defendant for the period and until the specified time.
Ample authority sustains the view that such a promise amounts to an offer, which, if accepted by performance of the service, fulfills the legal requirements of a contract."
Marine Inspection Serv., Inc. v. Alexander, 553 S.W.2d 185 (Tex.Civ.App.Houston (1st Dist.) 1977, no writ), relied upon by defendant is clearly distinguishable. First, the case merely held there was no evidence the company agreed that the employee would be entitled to a paid salary in lieu of vacation time. Second, the language cited in Alexander, supra, from 53 Am.Jur.2d, Master and Servant, §§ 76 & 78 deals with compensation for extra or overtime work. The case is not concerned with a contract providing for severance pay.
The instant case is a summary judgment case. Defendant must establish as a matter of law by summary judgment proof that there is no genuine issue of fact as to one or more of the essential elements of plaintiff's cause of action. Gibbs v. General Motors Corporation, 450 S.W.2d 827 (Tex. 1970). Defendant has failed to fullfil its burden. Defendant has failed to conclusively establish that no contract implied in fact existed between the parties as urged by plaintiff.
The judgment of the trial court is reversed and the cause is remanded.
|
Homestore
DIY projects 'can raise value of a home'
Canny British homeowners are looking to DIY projects such as loft extensions, side extensions and garage conversions to increase the value of their properties.
A new survey conducted by Sainsbury's Home Insurance shows that the average amount to be spent per household on structural changes over the next 12 months is expected to total £22,730.
This is an increase from last year's average of £17,361 spent on large-scale DIY projects to add space to a home.
Loft extensions have remained the most popular improvement, with side extensions and garage conversions taking second and third spots ahead of rear extensions and conservatories.
"In the current housing climate, creating extra space in your home is another option for those who have maybe decided to put their plans to move on hold," said Joanne Mallon, Sainsbury's home insurance manager.
In May, a study by Halifax revealed that gaining an extra bedroom or a playroom was the most popular reason for building an extension or converting a loft.
Conservatories, the third-most popular structural change, are often constructed to be used as an additional reception room.
N.B. The information contained in this story is provided by the supplier and does not necessarily reflect the views and opinions of lets-do-diy.com. |
La victime risque de perdre plusieurs doigts et a été touchée au visage, jeudi 6 septembre dans le Connecticut aux Etats-Unis.
Un accident domestique des plus insolites : jeudi 6 septembre au soir alors qu'un orage faisait rage dans le Connecticut aux Etats-Unis, ce qui a entraîné une coupure d'électricité, une mère de famille décide d'allumer des bougies. Or elle n'en a pas sous la main et le magasin le plus proche étant fermé selon ABC News. C'est à ce moment-là qu'elle se rappelle avoir vu une boîte de bougies au sous-sol, laissée par les précédents occupants de la maison.
Un explosif et non de vieilles bougies
Dans la précipitation, la trentenaire mère d'un enfant en bas âge allume sans trop regarder cette "boîte de vieilles bougies" et malheureusement pour elle il ne s'agit pas d'un bâton de bougie, mais bel et bien d'un de dynamite.
L'explosion a blessée la jeune femme au visage et à la main. Elle risque de perdre plusieurs doigts. La détonation a été entendue dans tout le quartier. Fort heureusement il n'y a pas eu d'autre blessés.
Interdiction de posséder de la dynamite
Un autre bâton de dynamite a été saisi et détruit. Posséder ce type d'explosif est interdit, mais comme la famille ne savait pas qu'elle possédait ce genre d'arme, donc elle ne devrait pas être poursuivie. |
Food makes you a target: disentangling genetic, physiological, and behavioral effects determining susceptibility to infection.
Genetics, physiology, and behavior are all expected to influence the susceptibility of hosts to parasites. Furthermore, interactions between genetic and other factors are suggested to contribute to the maintenance of genetic polymorphism in resistance when the relative susceptibility of host genotypes is context dependent. We used a maternal sibship design and long- and short-term food deprivation treatments to test the role of family-level genetic variation, body condition, physiological state, and foraging behavior on the susceptibility of Lymnaea stagnalis snails to infection by a trematode parasite that uses chemical cues to locate its hosts. In experimental exposures, we found that snails in the long-term food deprivation treatment contracted fewer parasites than snails that were continuously well-fed, possibly because well-fed snails grew larger and attracted more transmission stages. When we kept the long-term feeding rates the same, but manipulated the physiological state and foraging behavior of the snails with short-term food deprivation treatment, we found that snails that were fed before the exposure contracted more parasites than snails that were fed during the exposure. This suggests that direct physiological effects of food processing, but not foraging behavior, predisposed snails to infection. Feeding treatments also affected the family-level variation in snail susceptibility, suggesting that the relative susceptibility of host genotypes was context dependent. |
=================================
Review Board 1.7.14 Release Notes
=================================
**Release date**: September 15, 2013
Security Updates
================
* We now require Django 1.4.8, which is their latest security release. It
fixes a major denial-of-service attack vector against the authentication
support. We strongly encourage everybody running Review Board 1.7.x to
update to this release, particularly if you're running a site exposed
to the Internet.
* Some API resources were accessible even if their parent resources were not,
due to a missing check. In most cases, this was harmless, but it can affect
those using access control on groups or review requests.
New Features
============
* Added Team account support for Bitbucket_.
The new support for Bitbucket only worked for personal accounts. Now, when
configuring your Bitbucket repository, you can select that it's a Team
account instead.
All existing configurations are assumed to be personal accounts.
.. _Bitbucket: http://bitbucket.org/
Bug Fixes
=========
* If django-storages was installed, but Amazon's boto library for S3 was not,
the Storage settings page would fail to load. (:bug:`3062`)
* Fixed expanding the top-most chunk of a diff file. (:bug:`3026`)
* For LDAP authentication, the fully-qualified DN is now used when binding.
Patch by Harald Glock. (:bug:`2836`, :bug:`3069`)
* The clickable overlay for file attachment thumbnails wasn't positioned
correctly in all cases, making it impossible to click parts of the
thumbnail to navigate to the file.
Contributors
============
* Christian Hammond
* David Trowbridge
* Harald Glock
* Mark Côté
|
Noha Aboueldahab is a visiting fellow at the Brookings Doha Center, and the author of Transitional Justice and the Prosecution of Political Leaders in the Arab Region: A comparative study of Egypt, Libya, Tunisia and Yemen
Arms deals are not merely a financial transaction. They are a powerful expression of political support and partnership between two governments. When Stephen Harper signed the $15-billion arms deal with Saudi Arabia in 2014 – the largest contract in Canada’s history – he attempted to justify the controversial deal by pointing to Saudi Arabia as a partner in the fight against Islamic State. He also argued that cancelling the contract would unjustly punish the 3,000 Canadian workers who manufacture the weapons in London, Ont.
Chrystia Freeland’s tweet last month, which called for the release of detained human-rights activists in Saudi Arabia, triggered a Canadian-Saudi spat in which Saudi Arabia abruptly cut diplomatic and new-trade ties with Canada. It also pulled thousands of Saudi scholarship students from Canadian universities.
Story continues below advertisement
Ms. Freeland’s tweet and previous calls by the Canadian government for the release of arbitrarily detained activists and dissidents in Saudi Arabia are in line with Canada’s professed human-rights-conscious foreign policy. The continuation of its multibillion-dollar arms deal with Saudi Arabia is most definitely not.
After Saudi Arabia’s punitive response to Ms. Freeland’s tweet, she stated that Canada would continue to stand up for human rights at home and around the world. But Canada’s so-called feminist and human-rights-oriented foreign policy rings hollow in the ever-expanding gravesites of Yemen.
The war in Yemen, fought between the rebel Houthis and the Saudi-led coalition, has caused one of the world’s worst humanitarian crises in which innocent Yemenis, especially children, continue to suffer death by air strikes, starvation and preventable disease.
Canada has actively and rightly supported the establishment of United Nations inquiries into the extensive war crimes being committed against innocent Yemenis. The most recent report emphasizes that all parties to the conflict may be responsible for war crimes, but that the Saudi-led coalition’s actions have been the "leading direct cause of civilian deaths and destruction” in Yemen.
Notably, the report calls for the halting of the provision of arms that may be used in the conflict in Yemen, highlighting the significance attached to the detrimental impact of such arms sales on the perpetration of crimes in Yemen.
That Canada continues to supply Saudi Arabia with arms, despite the horrific atrocities being committed in Yemen on a daily basis by a military coalition led by Saudi Arabia, is puzzling – if not absurd.
Canada’s arms-control regulations prevent the export of arms in cases where there is a substantial risk that they will be used to commit human-rights violations. This stipulation was reiterated by Ms. Freeland herself earlier this year.
Story continues below advertisement
Regardless of whether Canadian weapons are actually used in the war on Yemen or not, the fact that the Mr. Trudeau government continues to defend this arms deal sends a very troubling message: Canada supports the protection of human rights, only insofar as it does not harm Canada’s business interests. One would be hard pressed to expect, then, that Saudi Arabia or any other country would take Canada’s statements regarding human rights seriously.
In the growing list of countries that have decided to halt arms exports to Saudi Arabia, Spain is the most recent one, citing fears that its weapons could be used in Yemen. Spain’s decision, along with that of Germany, the Netherlands, and Norway, sends the important message that the risk alone that their weapons could be used in the war in Yemen is not worth the millions of Euros in arms sales to Saudi Arabia.
Canada’s arms deal with Saudi Arabia, signed by Mr. Harper and endorsed and defended by the Trudeau government, turns Canada’s human rights policy into a farce. Of course, the lucrative arms deals struck between the UK, the U.S. and Saudi Arabia provide the political support that the Saudi-led coalition needs to continue its ruthless military campaign in Yemen. Internal pressure to halt these exports has fallen on deaf ears.
If Canada is to maintain any kind of credibility when it conducts its foreign policy and calls for the protection of human rights around the world, ending its arms sales to Saudi Arabia is a first and concrete step that must be taken. So far, Ms. Freeland seems quite comfortable in honouring this unjustifiable arms deal. It is difficult, then, to take seriously her outrage at the arbitrary arrests of Samar Badawi and others, while Yemeni lives are taken daily by a Saudi-led coalition that Canada actively supports. |
Q:
Would a super-hot object launch itself into the air?
In this XKCD What If, an indestructible hairdryer outputs 2 GW of power, turning the earth under it into gas:
Periodic explosions of gas beneath the box launch it into the air, and it starts fires and forms a new lava pool where it lands.
At 20 GW:
The box begins to be tossed around by the powerful updrafts it’s creating.
Later it outputs 11 PW, turning the surface of an entire lake into plasma and launching itself into space:
Is this really accurate, though?
The energy is being emitted isotropically, so the energy itself shouldn't cause any net thrust in any direction, right?
If the object were surrounded by a fluid on all sides, would there be net force upward? Due to creating convection currents that push upwards against it? Does this depend on the density of the object?
Or does the thrust upward only exist when it's on a boundary between air and earth/water? The liquid/solid material below the box is greatly increasing in volume due to the phase changes, while the air above is not changing in volume as much, so the gases and plasma are rushing upward overall and carrying the box with it?
But that effect would drop off with height, leading to the case of it being surrounded by air on all sides again.
In what conditions does the superhot object launch upward into space, and in what conditions does it melt its way into the center of the earth?
A:
In the final part of the XKCD article the box containing hairdrier is floating on a lake, and the power it's producing boils the water and causes a steam explosion. It's the steam explosion that flings the box into space. As you've anticipated in your question, the motion is because it's environment is assymetric. Once the hairdrier has been launched away from the water surface the force reduces with distance just as in any explosion.
If the hairdrier was surrounded by fluid on all sides then as long as the depth of the fluid was effectively infinite, i.e. bigger than the range of the hairdrier's heating effect, then there would be no net motion.
Rock contains a lot of water and dissolved gas, which is (one reason) why volcanos explode. So I'd guess that even well away from surface water the box is unlikely to just quietly melt its way to the core. However I doubt the sort of blast you see in volcanos would provide enough force to launch the box into orbit.
|
File Tampering Check - keyurparalkar1
https://github.com/keyurparalkar/file-tampering-check.git
======
CaptainCode
Not gonna argue if the program itself is stupid or not, but please… do not use
md5 (nor sha1). Use sha-256 at least.
|
With age comes many physiological changes; oftentimes, they’re dreaded changes. One example is menopause, which is associated with many uncomfortable side effects. Experienced largely in the latter years of a woman’s life, perimenopause can start as early as age 35, and it can last several years. Once a woman experiences her last period, menopause begins, which usually starts mid-to-late 40s—the median age of menopause for American women is about 47.5 years, and the United States has about 41.75 million women older than the age of 50, according to the North American Menopause Society (NAMS). Once this occurs, women enter into postmenopause. During these years, several things change in a woman’s body, and because a decline in estradiol levels occurs, perimenopausal, menopausal and postmenopausal women experience symptoms related to vasomotor instability, such as hot flashes and palpitations. Other symptoms include bone loss, mental decline, cold flashes, mood swings and many other unpleasant changes. Since 37.5 million U.S. women are at or near menopause, and 45.6 million are postmenopausal, according to NAMS; and hormone replacement therapy (HRT) isn’t always an attractive remedy, women are in search of effective remedies that can reduce symptoms and the risk for breast cancer and osteoporosis.
Ragged and Rooted
Among the many side effects that accompany menopause, fatigue, followed by anxiety and depression, plague many older women. Roots, such as the Peruvian root known as maca, have shown promise in helping women combat these symptoms, as well as others. Maca was found to be clinically useful in perimenopausal and menopausal women, as one study showed it benefits the production of sex hormones, enhanced sex drive, stimulated body metabolism, controlled body weight, increased energy, reduced stress, decreased depressant and improved memory.1 Preliminary findings published in Menopause confirmed these effects, showing six weeks of supplementing with 3.5 g/d of maca powder reduced psychological symptoms, including anxiety and depression, and lowered measures of sexual dysfunction in 14 postmenopausal women independent of estrogenic and androgenic activity.2
Phytoestrogens and Isoflavones
Phytoestrogens such as soy, red clover and plant lignans offer individual benefits during the different stages of menopause. Findings presented at the Ninth Annual AACR Frontiers in Cancer Prevention Research Conference in November 2010 showed among premenopausal women, the highest intake of isoflavones had a 30-percent decreased risk of stage I breast cancer, a 70-percent decreased risk of having a tumor larger than 2 cm, and a 60-percent decreased risk of having stage 2 breast cancer. These connections were not seen among postmenopausal women.
Isoflavones show promise not only in breast health, but on postmenopausal symptoms, too. A double blind prospective study randomly assigned 60 healthy postmenopausal women into two groups: 60 mg/d of isoflavones or placebo for three months. Fifty-one women finished the 12-week study.4 In women receiving 60 mg/d isoflavones, hot flashes and night sweats were reduced by 57 percent and 43 percent, respectively. The treatment did not change the levels of circulating estradiol or follicle-stimulating hormone. Immunohistochemical staining of endometrial and breast biopsy specimens revealed isoflavones did not affect expression levels of steroid receptors; estrogen receptors alpha, beta and betacx; progesterone receptors A and B; or the proliferation marker Ki67. No side effects on body weight or lipoprotein lipids were observed.
A whole-soy germ-based nutritional supplement containing natural S-equol, a compound resulting— when certain bacteria are present in the digestive tract—from the natural metabolism, or conversion, of daidzein, an isoflavone found in whole soybeans, reduced the frequency of moderate to severe hot flashes, reduced muscle and joint pain, and significantly inhibited bone breakdown in a study among postmenopausal U.S. women, according to peer-reviewed data presented as a poster presentation at the North American Menopause Society (NAMS) Annual Meeting.
Red clover also does its best to in the role of menopause management. In 2010, red clover-derived isoflavones (MF11RCE), similar to the roots mentioned above, were effective in reducing depressive and anxiety symptoms among postmenopausal women.5 A total of 109 postmenopausal women aged 40 or older were randomly assigned to receive two capsules/d of MF11RCE (80 mg of red clover isoflavones, Group A) or placebo (Group B) for 90 days. After a washout period of seven days, medication was crossed over and taken for 90 days more. After receiving the MF11RCE compound, anxiety and depression scores decreased significantly, with a 76.9-percent reduction in the total Hospital Anxiety and Depression Scale (HADS) score (76 percent for anxiety and 78.3 percent for depression); and an 80.6-percent reduction in the total Self-Rating Depression Scale (SDS) score. After placebo, total HADS (anxiety and depression subscale also) and total SDS scores also decreased significantly in comparison to baseline, but only equivalent to an average 21.7 percent decline.
Red clover seems to only work not on the brain, but on the bone, too. In one study, red clover isoflavones were found to be effective in reducing bone loss induced by ovariectomy, most likely by reducing of the bone turnover via inhibition of bone resorption.6 Bilateral ovariectomy was performed on female Wistar rats. One week after the operation, rats were treated with an oral dose of 20 and 40 mg/d of isoflavones for 14 weeks. Ovariectomy reduced bone mineral content, femoral weight, femoral density, mechanical strength of the tibia and increased the levels of bone-specific alkaline phosphatase in the serum and the number of osteoclasts in the femur sections compared with sham operated controls. Treatment with isoflavones significantly increased bone mineral content, mechanical strength of the tibia, femoral weight, femoral density and prevented the rise of serum alkaline phosphatase levels. In addition, the treatment with isoflavones significantly reduced the number of osteoclasts compared with the ovariectomized control rats.
A second root—Pueraria mirifica (PM)—also helps with vaginal dryness. A study published inMenopause found PM (as Puresterol®, from Bio-Botanica) showed estrogenicity on vaginal tissue by alleviating vaginal dryness symptoms and dyspareunia, and improving signs of vaginal atrophy, and restoring the atrophic vaginal epithelium in healthy postmenopausal women.3
Separately, a red clover preparation in dosages amenable to clinical practice improved ovariectomized -induced osteoporosis, with researchers noting a mild metabolic alkalosis might further synergize some therapeutic aspects.7 A quality-controlled red clover extract (RCE) standardized to contain 40-percent isoflavones by weight (genistein, daidzein, biochanin A and formononetin presented as hydrolyzed aglycones) together with a modified alkaline supplementation on bone metabolic and biomechanical parameters was used in an experimental model of surgically induced menopause. Rats were randomized into four groups: Group A represented normal rats (sham operated) while three other groups were ovariectomized and fed for three months: standard food (group B), 6 mg/kg/d food mixed with RCE (Group C), or given 6 mg/kg/d of RCE plus 16 mg of a modified alkaline supplementation (BP) (group D). The animals were killed 90 days after surgery. As compared to group B, RCE or RCE + BP treatments significantly increased estradiol levels, and mitigated the weight loss of the uterus and improved maximum load of the femoral neck. Osteocalcin level showed more than a 65-percent increase in group B, but both RCE and RCE + BP treatments prevented such abnormality with a significantly better result in RCE + BP group ,which virtually normalized such parameter as well as urinary excretion of DPD. Group C and D reduced the more than 20-percent loss of BMD and bone mineral content/body weight ratio observed in untreated post-ovariectomy group. Untreated ovariectomy caused about a 48-percent decrease of cancellous bone mass in the femoral neck, while this abnormality was prevented at similar extent by both RCE and RCE + BP treatments. Ovariectomy showed an 80-percent increase of bone alkaline phosphatase (BALP) level, but both RCE and RCE + BP treatments significantly mitigated such variable. The BALP decrease yielded by the combined RCE + BP treatment was statistically lower than RCE alone.
Plant lignans, although not an isoflavone like soy and red clover, exert weak estrogen-like activity after the body converts them into human lignans—mainly enterolactone. Lignans are able to make up for deficiencies when estrogen levels are low in the body, and are able to reduce the activity of estrogen; and similar to soy, they too play a role in breast health. A cohort study that included 29,785 women, ages 50 to 64 years, between 1993 and 1997, reported a tendency toward a lower risk for breast cancer with higher concentrations of enterolactone, which was restricted almost entirely to ERalpha-negative breast cancer.8 Finnish researchers also examined the association between serum enterolactone and risk of breast cancer, concluding, “Serum enterolactone level was significantly inversely associated with risk of breast cancer.”9
Within the same class of phytoestrogens is genistein, an isoflavone that serves as a very weak phytoestrogen that has shown promise in many peri- and postmenopausal women. Italian researchers compared the effects of genistein, estrogen-progestogen therapy (EPT) and placebo on hot flushes and endometrial thickness in postmenopausal women.10 A total of 90 healthy, postmenopausal women, 47 to 57 years of age, were randomly assigned to receive continuous EPT (n=30; 1 mg 17 beta-estradiol combined with 0.5 mg norethisterone acetate), the phytoestrogen genistein (n=30; 54 mg/d) or placebo (n=30) for one year. Daily flushes reduced significantly by 22 percent after three months, 29 percent after six months and 24 percent after 12 months of genistein treatment compared with placebo. Flush score decreased by 53 percent after three months, 56 percent after six months and 54 percent after 12 months of EPT, as compared with placebo. No side effect was observed on the uterus of the participants.
A placebo-controlled, double blind study presented by James Elliott at the Ninth International Symposium on the Role of Soy in Health Promotion and Chronic Disease Prevention and Treatment meeting in Washington, conducted in collaboration with KGK Synergize Inc., London, Ontario, randomized 84 healthy postmenopausal women to receive either geniVida ®(from DSM), pure genistein or a placebo. After 12 weeks, the women on geniVida had a 51-percent reduction on hot flashes and night sweats compared to only 27 percent for the women in the placebo.
In 2002, researchers performed a randomized, double blind, placebo-controlled study to evaluate and compare HRT with the effect of the phytoestrogen genistein on bone metabolism and BMD in postmenopausal women.11 A total of 90 healthy ambulatory women, 47 to 57 years old, with a BMD at the femoral neck of less than 0.795 g/cm2 were randomly assigned to receive continuous HRT for one year, 54 mg/d of genistein or placebo after a four-week stabilization on a standard fat-reduced diet. Genistein treatment significantly reduced the excretion of pyridinium cross-links at six months and 12 months, unlike the placebo. A similar and not statistically different decrease in excretion of pyridinium cross-links was also observed in the postmenopausal women randomized to receive HRT. Genistein markedly increased serum bone-specific ALP (B-ALP) and osteocalcin (bone Glaprotein [BGP]) either at six months or at 12 months. Postmenopausal women treated with HRT had, in contrast, decreased serum B-ALP and BGP levels either at six months or 12 months. Furthermore, at the end of the experimental period, genistein and HRT significantly increased BMD in the femur and lumbar spine
Herbal Help
Black cohosh (Actaea racemosa L), a member of the buttercup family, along with St. John’s wort and a few other herbal remedies, also thwarts menopausal side effects such as hot flashes, depression and anxiety. A 2010 systematic search of three databases was conducted, revealing preparations containing black cohosh improved menopausal symptoms overall by 26 percent; there was, however, significant heterogeneity between these trials.13
Another benefit to black cohosh is its safety profile. A number of clinical studies using Remifemin, a standardized extract used in Europe as an alternative to HRT, have demonstrated efficacy for the alleviation of menopausal complaints.14 The safety profile of black cohosh is positive, with low toxicity, few and mild side effects, and good tolerability, according to the studies.
In contrast, a randomized, double blind, placebo-controlled, parallel group trial examined the efficacy and tolerability of Cimicifuga racemosa (black cohosh) extract for the treatment of anxiety disorder due to menopause, and it didn’t fare well.15 Subjects were randomized to therapy with either pharmaceutical-grade black cohosh extract (n=15) or placebo (n=13) for up to 12 weeks. There was neither a significant group difference in change over time in total HAM-A scores, nor a group difference in the proportion of subjects with a reduction of 50 percent or higher in baseline HAM-A scores at study end point (P=0.79). There was a significantly greater reduction in the total Green Climacteric Scale (GCS) scores during placebo (versus black cohosh; P=0.035), but no group difference in change over time in the GCS subscale scores or in the PGWBI (P=0.140). One subject (3.6 pecent) taking black cohosh discontinued treatment because of adverse events. Overall, researchers found no statistically significant anxiolytic effect of black cohosh versus placebo. However, small sample size, choice of black cohosh preparation, and dosage used may have been limiting factors producing negative results.
St. John’s wort has a reputation in effectively fighting off vasomotor symptoms. A study published in the March 2010 issue of Menopause included 100 women, with a mean age of 50.4 years, treated with St. John's wort extract or placebo for eight weeks.16 The difference in duration of hot flashes between the groups was not significant on the fourth week of intervention (P=0.27); however, it was statistically significant between the two groups on the eighth week of treatment (P<0.001). The fall-off in frequency of hot flashes on the fourth and eighth weeks of intervention was more evident in women receiving St. John's wort, and the differences between groups were statistically significant (P=0.005 and P<0.001, respectively). When both study groups were compared, the decrease in the severity of flashes in women who received St. John's wort was more evident on the fourth and eighth weeks (P=0.004 and P<0.001, respectively).
These results coincide with a pilot double blind, randomized clinical trial conducted one year prior.17 A total of 47 symptomatic perimenopausal women aged 40 to 65 years who experienced three or more hot flashes a day were randomly assigned to receive ethanolic St. John's wort extract (900 mg TID) or placebo. The women were asked to keep a daily diary during the week before randomization and during the week before the three-month follow-up to record hot flash frequency and intensity. After 12 weeks of treatment, a non-significant difference favoring the St. John's wort group was observed in the daily hot flash frequency and the hot flash score. After three months of treatment, compared with the placebo group, women in the St. John's wort group reported significantly better menopause-specific quality of life and significantly fewer sleep problems. “Hypericum perforatum may improve quality of life in ways that are important to symptomatic perimenopausal women, but these results need to be confirmed by a larger clinical trial,” the researchers said.
Interestingly, during the North American Menopause Society (NAMS)/Utian Translational Science Symposium on Soy and Soy Isoflavones, held Oct. 9 to 10, 2010, a working group of faculty and panelists composed of clinical and research experts in the fields of women's health and botanicals met to cover the latest evidence-based science on isoflavones as they affect menopausal symptoms, breast and endometrial cancer, atherosclerosis, bone loss and cognition.12 The group reported: “From the hundreds of studies reviewed in this report, there are mixed results of the effects on midlife women. Soy-based isoflavones are modestly effective in relieving menopausal symptoms; supplements providing higher proportions of genistein or increased in S-equol may provide more benefits. Soy food consumption is associated with a lower risk of breast and endometrial cancer in observational studies. The efficacy of isoflavones on bone has not been proven, and the clinical picture of whether soy has cardiovascular benefits is still evolving. Preliminary findings on cognitive benefit from isoflavone therapy support a ‘critical window’ hypothesis wherein younger postmenopausal women derive more than older women.”
Black cohosh and St. John’s wort have garnered a lot of attention in the menopause market; but a couple of lesser known herbal combos have also lent promising results. Genopause®, an Ayurvedic formulation of Tinospora cordifolia, Asparagus racemosus, Withania somnifera and Commiphora mukulfrom Gencor Nutrients, was examined in an unpublished study for its neuropsychophysiological affect on menopausal women, aged 40 to 60 years, who ended their menstrual cycle one year prior. They were randomized in a double blind, placebo-controlled manner into two groups: Group 1 administered a placebo to 70 menopausal females for six months. Group 2 gave 86 menopause females the organic extract of 150 mg of Tinospora cordifolia, 200 mg of Asparagus racemosus, 200 mg of Withania somnifera and 450 mg of Commiphora mukul in effective doses continuously for six months. Hot flushes, parethesia, insomnia, nervousness, melancholia, vertigo, weakness, anthelia and myalgia, headaches and palpitations improved considerably in the treatment group after six months. Depressive behavior also improved, as well as a decrease in body fat and positive chances in cholesterol levels in the herbal treatment group.
Another unpublished study was conducted on a different herbal remedy, EstroG-100™ (from SunBio)—Cynanchum wilfordii, Phlomis umbrosa and Angelica gigas. A three-month, randomized, double blind, placebo-controlled clinical trial was performed for 12 weeks with 61 pre-, peri- and postmenopausal non-Asian American women, who were randomly allocated to either the EstroG-100 group (n=31) or placebo group (n=33). The mean Kupperman Menopause Index (KMI) score was significantly reduced in the EstroG-100 group from 29.45±7.39 at baseline to 13.62±7.61 at week six and to 11.31±5.78 at week 12, while the placebo group showed changes from 29.16±6.55 at baseline to 23.31±8.96 at week six and to 23.66±7.68 at week 12. The improvement was statistically significant in comparison with the two groups (P<0.01). EstroG-100 showed statistically significant improvement in menopausal symptoms such as hot flush and night sweats, paresthesia, insomnia, nervousness, melancholia, vertigo, fatigue, rheumatic pain and vaginal dryness compared to placebo. No adverse effects were reported with EstroG-100. Weight, biochemical safety markers as well as serum hormone levels all failed to show any statistically significant changes. Additionally, in a binding affinity test showed EstroG-100 and black cohosh had no binding affinity to ER-alpha and ER-beta.
From the Vine
Resveratrol is popular for anti-aging and heart health, but it also exerts estrogenic effects. In 2007, Taiwanese researchers investigated resveratrol’s potential for therapy of osteoporosis.18 They found resveratrol exhibited bone-protective effects equivalent to those exerted by HRT, as well as decreased the risk of breast cancer in in vivo and in vitro models. Forkhead proteins were essential for both effects of resveratrol. The bone-protective effect was attributable to induction of bone morphogenetic protein-2 through Src kinase-dependent estrogen receptor activation, and FOXA1 is required for resveratrol-induced estrogen receptor-dependent bone morphogenetic protein-2 expression. The tumor-suppressive effects of resveratrol were the consequence of Aktinactivation-mediated FOXO3a nuclear accumulation and activation.
Additionally, the University of Connecticut randomly assigned 24 pre- and 20 postmenopausal women to consume 36 g/d of a lyophilized grape powder (LGP; 92 percent carbohydrate and rich in flavans, anthocyanins, quercetin, myricetin, kaempferol and resveratrol) or placebo for four weeks.19 After a three-week washout period, subjects were assigned to the alternate treatment for an additional four weeks. Plasma triglyceride concentrations were reduced by 15 percent and 6 percent in pre- and postmenopausal women, respectively (P<0.01) after LGP supplementation. In addition, plasma low-density lipoprotein (LDL) cholesterol, and apolipoproteins B and E were lower due to LGP treatment (P<0.05). Further, cholesterol ester transfer protein activity was decreased by approximately 15 percent with intake of LGP (P<0.05). In contrast to these beneficial effects on plasma lipids, LDL oxidation was not modified by LGP treatment. However, whole-body oxidative stress as measured by urinary F(2)-isoprostanes was significantly reduced after LGP supplementation. LGP also decreased the levels of plasma tumor necrosis factor-alpha (TNF-a), which plays a major role in the inflammation process. Through alterations in lipoprotein metabolism, oxidative stress and inflammatory markers, LGP intake beneficially affected key risk factors for coronary heart disease in both pre- and postmenopausal women.
Menopause can be a long road; and it can seem even longer without symptomatic relief. Fortunately, these ingredients provide a good starting point for women under fire. But in order to expand its offerings and its science, the menopausal market needs to continue researching new and mainstay ingredients for their safety, toxicity, efficacy and innovation. |
Discovery and development of the complement inhibitor eculizumab for the treatment of paroxysmal nocturnal hemoglobinuria.
The complement system provides critical immunoprotective and immunoregulatory functions but uncontrolled complement activation can lead to severe pathology. In the rare hemolytic disease paroxysmal nocturnal hemoglobinuria (PNH), somatic mutations result in a deficiency of glycosylphosphatidylinositol-linked surface proteins, including the terminal complement inhibitor CD59, on hematopoietic stem cells. In a dysfunctional bone marrow background, these mutated progenitor blood cells expand and populate the periphery. Deficiency of CD59 on PNH red blood cells results in chronic complement-mediated intravascular hemolysis, a process central to the morbidity and mortality of PNH. A recently developed, humanized monoclonal antibody directed against complement component C5, eculizumab (Soliris; Alexion Pharmaceuticals Inc., Cheshire, CT, USA), blocks the proinflammatory and cytolytic effects of terminal complement activation. The recent approval of eculizumab as a first-in-class complement inhibitor for the treatment of PNH validates the concept of complement inhibition as an effective therapy and provides rationale for investigation of other indications in which complement plays a role. |
Q:
iOS Swift: Eliminate trailing zeroes for CGFloat
I have float value that ends in .0 or .5 (for example 10.0 or 10.5). If it ends in .0 I would like to eliminate the trailing zero. What is the easiest way to do this in Swift?
func myFunction() {
var string = pickerData[picker.selectedRowInComponent(0)]
var float = ((string as NSString).floatValue - 45) / 2
label.text = float.description
}
A:
You should use NSNumberFormatter() to format your numbers as follow:
extension Double {
var formatted:String {
let formatter = NSNumberFormatter()
formatter.numberStyle = NSNumberFormatterStyle.DecimalStyle
// you can set the minimum fraction digits to 0
formatter.minimumFractionDigits = 0
// and set the maximum fraction digits to 1
formatter.maximumFractionDigits = 1
return formatter.stringFromNumber(self) ?? ""
}
}
10.5.formatted // "10.5"
10.0.formatted // "10"
In your case it would look like this:
label.text = float.formatted
|
Billy Wayne(1897–1970)
Billy Wayne was born on February 12, 1897 in New Orleans, Louisiana, USA as William Daniel Overing. He was an actor, known for The Jackie Robinson Story (1950), Harvey (1950) and Hot Sands (1931). He died on June 12, 1970 in Guadalajara, Jalisco, Mexico. See full bio » |
Slideshow Widget
Archive for April 2006
Tuesday, April 25, 2006
I intended to add our pictures from Easter onto flickr, but somehow only two pictures from Sunday got on here. Argh. I hope to have the Easter pics up very soon.
Benjamin is going to be 10 months on Thursday, which is really nuts. He's getting SO big and is crawling all over the place. He now knows to crawl from room to room, which he really enjoys. He laughs the whole way. It is so cute.
Mike babysat our friend, Lora's two daughters on Sunday while she and I went to rehearsal. He took the three kids to the park and took a couple of pictures, which are now on flickr. We are enjoying the nice weather as much as we can!!!
Monday, April 10, 2006
Benjamin visited the Easter Bunny this weekend, which turned out to be more eventful than expected. We drove up to the Cities to go to AJ's 1st birthday party. AJ had a bad cold which was made worse by his asthma, so Joe took him to urgent care. They ended up calling an ambulance to take him to Children's Hospital because his breathing wasn't improving. They diagnosed him with pneumonia at the hospital and he ended up staying two nights. He is doing much better now though. Poor little guy missed out on almost his whole party. He did get some awesome gifts though, which he can enjoy when he feels better.
We stayed in the cities so that we could visit AJ in the hospital and we heard about a Breakfast with the Easter Bunny while we were up there. We took Benjamin and he had a blast (as you can see in the photos). The rest of our photos from the weekend are on our flickr site. |
Bad or Changed Breath
Bad breath is breath which has unpleasant odor. It is also called as halitosis. It can be temporary or long lasting. There are millions of bacteria in the mouth mainly in the back of the tongue. This bacterial growth requires mouth?s warm and moist conditions.
Bad breaths are in most cases caused by problems in the mouth.
Causes
Poor dental hygiene: Improper brushing, flossing and bad breath is caused due to food decay in the mouth. |
Q:
Using multiple CTEs in one statement
I want to use multiple CTEs in my query, but I haven't been able to get it working. The following is an example of what I would like to do:
WITH tbl1 AS
(SELECT *
FROM tblStuff)
WITH tbl2 AS
(SELECT tbl1.fldStuff1 ...
FROM tbl1, tblStuff2)
SELECT *
FROM tbl2
A:
You only need to specify WITH once. Then you can list additional CTEs separated by a comma. E.g.:
WITH cte1 AS
(
...
),
cte2 AS
(
...
)
SELECT ...;
A:
WITH tbl1 AS
(SELECT *
FROM tblStuff),
tbl2 AS
(SELECT tbl1.fldStuff1, tbl1.fldStuff2, tblStuff2.fldStuff1, tblStuff2.fldStuff2
FROM tbl1, tblStuff2)
SELECT *
FROM tbl2
When you use multiple CTEs, no need for the extra WITH, seperate with a comma.
|
Shame
Modern western society is heavily influenced by Christian biblical ideas, which in turn came from the ancient superstitions of the culture in which the bible arose. One of these is the notion that illness is the result of some kind of sin. Essentially, this says that we are sick because we are bad people who do bad things. Even though few people nowadays are callous enough to acknowledge this idea explicitly, it still forms part of the thinking that underpins western society. Old superstitions can take a long time to really dispel.
In biblical times, people who were ill were considered “unclean”, and ostracised from other members of society. Evidently people had worked out that some conditions were contagious even long before any infectious agents were discovered. Stigmatising and segregating the ill helped contain the spread of disease. Nowadays we have a better idea of what illnesses are contagious and what the underlying causes are, but nevertheless the stigma remains. So it’s easy to end up feeling ashamed of being ill.
Western society values people who are strong, independent, healthy, and productive. Chronic Fatigue makes me feel weak, I become dependent on other people, sick all the time, and I’m no longer capable of achieving what I would like to because I don’t have the energy. I worry that other people will think I’m simply lazy, or depressed; and the mental illnesses that often accompany Chronic Fatigue like anxiety and depression have their own set of stigma attached despite being astonishingly widespread.
I have been involved in personal development for many years, since long before I became ill. While many people in the personal development area can be wonderfully supportive, I have also found others who were quite intolerant when it came to chronic illness. On one level, books like Louise Hay’s You Can Heal Your Life are excellent and offer hope that we can and will get better; but on another, the same ideas can be shame-inducing if you happen to be trying hard to heal yourself but getting nowhere. I have been told that I would wake up cured tomorrow if I simply believed that it was possible, and been berated by people who couldn’t handle the idea that I could be sick through no fault of my own. They assumed that there must be some secondary gain behind my being ill, some subconscious process I wasn’t aware of, or some lesson to be learned that I still hadn’t got. All these things can be true to some degree, but they can also be used by careless people who just end up rubbing salt into our wounds. Some treatment programmes are even based on the idea that we’re not actually ill, but it’s just something that we create in our minds.
I resisted joining any kind of Chronic Fatigue support group for a long time. After all, who wants to hang out with sick people? I wanted to be out doing all the fun stuff I used to enjoy with my regular friends. However, I found that joining a support group lessened my sense of shame about being ill. Here were people who understood what I was going through. I didn’t need to justify how I felt or why I didn’t have the energy to do everything I wanted to do. They understood without judging, because they’d been through it, and were still going through it themselves.
I also found it very helpful talking to people who had suffered from Chronic Fatigue in the past. Not only did they understand what I was going through, but they also offered me hope that recovery was possible and that there is going to be life on the other side.
4 thoughts on “Shame”
I just read this after clicking through from a more recent post of yours. This is a really good and nicely-written observation of shame and the role it plays in illness and society. It’s a word which I only recently came to recognise the importance of and I think it’s key when it comes to exploring the origins of this, and many other illnesses. Shame is sneaky. It doesn’t like light and lurks in the shadows of ourselves and society. I believe it is at the core of illness. And that it is self perpetuating. I’ve been ill my entire adult life and still feel ashamed of it. It’s rife in society and governments play on it. Here in the UK the government demonise the vulnerable and cut whatever they can get away with in benefits. And they can get away with a lot, because we’re an oppressed bunch.
There’s a line in the film The Beach which has always stuck with me because I think it sums up a general unspoken approach to illness: “Get better or die. It’s the hanging around in between that really pisses people off.”
Thanks Craig. I recently heard neuroscience researcher Mario Martinez (author of The MindBody Code: How to Change the Beliefs that Limit Your Health, Longevity, and Success) in an interview mention that shame has an inflammatory effect. This makes sense when you think that our faces tend to go red as they’re flushed with blood when we experience shame. Brene Brown’s TED talk on Shame, which focuses primarily on the mental health implications is one of my favourites. It’s not surprising that it can make us physically sick too. She makes the point that people with a lot of shame rarely talk about it, and I believe this is the antidote. If you’d like to talk more about yours, drop me a line. |
INTRODUCTION {#s1}
============
Gliomas are amongst the most lethal forms of cancer \[[@R1], [@R2]\]. Their invasive growth makes complete tumor resection very difficult leading to high lethality \[[@R3]\]. A better molecular understanding of adjuvant therapies for glioma could lead to new, more effective therapeutic approaches to treat gliomas.
The Period2 (Per2) gene, an indispensable component of the mammalian circadian clock \[[@R4]\], has been reported to play an important role in tumorigenesis. Per2-deficient mice show increased tumor development \[[@R5]\] and Per2 is often elevated in tumor but not in peripheral tissues \[[@R6]--[@R10]\]. Overexpression and/or mutations in the Per2 gene correlate with enhanced tumor growth in breast cancer, colon cancer, and lymphoma, along with altered expression of TP53 and the oncogenes BCLxl, BCL-2, cyclinB1, cyclin D, cyclin E, and c-myc \[[@R11]--[@R16]\]. Per2 has been linked to DNA damage response pathways \[[@R17]\], and low Per2 expression may increase the efficacy of radiotherapy against glioma by promoting apoptosis \[[@R18]--[@R20]\].
The transcription factor p53 is known as the "guardian of the genome" \[[@R21], [@R22]\]. The majority of human tumors have mutations in the TP53 gene, which encodes the p53 protein \[[@R23]\]. Additionally, the p53 tumor suppressor is a key transcription factor that regulates cellular pathways, such as DNA repair, cell cycle, apoptosis, angiogenesis, and senescence. p53 acts as an important defense mechanism against cancer onset and progression and is negatively regulated by interactions with the oncoprotein murine double minute 2 (MDM2). In human cancers, the TP53 gene is frequently mutated or deleted or wild-type p53 function is inhibited by high levels of MDM2, leading to downregulation of the tumor suppressive p53 pathways. Thus, the inhibition of MDM2-p53 interactions presents an appealing therapeutic strategy for the treatment of glioma. Recent studies show that the MDM2-p53 interaction is complex, involving multiple levels of regulation by numerous cellular proteins and epigenetic mechanisms. A comprehensive re-examination of this intricate interplay is imperative \[[@R24]\].
We previously reported that Per1 and Per2 expression abnormalities are associated with glioma occurrence \[[@R9]\]. Additionally, decreased Per1 and Per2 expression increases the efficacy of radiotherapy against glioma by promoting apoptosis \[[@R20], [@R25]\]. Here, we examine the role of Per2 in X-ray-induced DNA damage in U343 glioma cells and an animal glioma model.
RESULTS {#s2}
=======
Expression of per2 in U343 glioma cells {#s2_1}
---------------------------------------
We determined Per2 mRNA and protein expression levels in the U343MG cell line, which overexpresses MDM2 and maintains wild-type p53 levels, using quantitative real-time PCR (qRT-PCR) and Western blotting, respectively. Both Per2 mRNA and protein levels were notably reduced in the U343 cells transfected with shRNA-PER2 relative to the shRNA-transfected control U343 cells (*P* \< 0.05; *n* = 3) or blank-treated U343 cells(the blank treatment is the normal U343 cells) (*P* \< 0.05; *n* = 3; Figure [1](#F1){ref-type="fig"}).
{#F1}
Correlation between Per2 expression and glioma growth {#s2_2}
-----------------------------------------------------
We injected three types of U343MG cells (2 × 107 cells) into the dorsolateral region of nude mice, and tumors grew in approximately 95% of the mice within 2--3 weeks. We found that tumor growth in the Per2-deficient group was substantially faster than the control virus-treated group or the blank-treated group (both, *P* \< 0.05). Additionally, we observed that the tumors in the Per2-deficient group reached a standard volume (1000 mm3) earlier than those in the other two groups (Figure [2A](#F2){ref-type="fig"} and [2B](#F2){ref-type="fig"}). When the volume of each group reached the standard volume (1000 mm3), they were exposed to 10 Gy X-ray. We recorded the volume of each group at 24, 48, and 72 hours after irradiation. After 24 hours the 3 groups were indistinguishable but by the 48 and 72 hour time points, the Per-2 deficient mice had larger tumors than either of the two control groups (Figure [3](#F3){ref-type="fig"}).
{#F2}
{#F3}
Effect of irradiation on Per2 gene expression {#s2_3}
---------------------------------------------
In glioma tissue, the level of Per2 mRNA was higher in the irradiated (10 Gy) group than in the control (untreated) group at 24 hours after irradiation (*p* \< 0.05). The level of Per2 mRNA was lower in the Per2-knockdown group than in the control group at after 24 hours (*p* \< 0.05) with or without irradiation (Figure [4A](#F4){ref-type="fig"}). A similar result was observed with protein level (*p* \< 0.05) (Figure [4B](#F4){ref-type="fig"}). Comparing the unirradiated Per2 shRNA group with the unirradiated control group at the 24 hour time point the knockdown efficiency of Per2 was 54.56%. Furthermore, we measured the tumor volume of each irradiated group at the 24, 48 and 72 hour time points (Figure [3](#F3){ref-type="fig"}). Interestingly, tumor volumes were indistinguishable at 24 hours but expression levels of Per2 were different in each irradiated group. Although the expression of Per2 changes the growth of glioma, the tumor volume of each group may not differ because of the limited time and limited sensitivity of the gliomas at 24 hours (statistical difference was found in tumor volume at 48 and 72 hours). On the other hand, we found nuclear atypia and tumor-like morphology (Figure [5](#F5){ref-type="fig"}). Our tumor cells showed a large nucleus, hyperchromatism, and pleomorphism.
{#F4}
{#F5}
Positive correlation between apoptosis and Per2 levels in glioma tissue {#s2_4}
-----------------------------------------------------------------------
After 10 Gy of irradiation, the mice were sacrificed, and the internal organs were removed for further analysis. First, we measured apoptosis using a TUNEL (Terminal deoxynucleotidyl transferase dUTP nick end labeling) assay. The Per2-knockdown group exhibited an obvious trend of increased apoptosis over time (*P* \< 0.05), while the other two groups showed little change in the levels of apoptosis (*P* \> 0.05) (Figure [6](#F6){ref-type="fig"}).
{#F6}
Positive correlation between DNA damage and Per2 levels in glioma tissue {#s2_5}
------------------------------------------------------------------------
X-ray exposure leads to breakage of double-strand DNA. We used western blotting for phosphorylated histone H2AX to identify DNA double-strand breaks. The Per2 knockdown group showed increasing DNA breakage over time while the blank and control virus groups were almost unchanged (Figure [7A](#F7){ref-type="fig"}). The histological result is consistent with the western blot result (Figure [7B](#F7){ref-type="fig"}). Blue speckles indicate normal cell nuclei and brown ones indicate positive cell nuclei with phosphorylated histone H2AX. 6 400 × magnification fields were randomly selected and counted; mean H2AX + cells per field was obtained for statistical analysis. Brown speckles in the Per2-knockdown group increased over time, while the other two groups were approximately equal (Figure [7B](#F7){ref-type="fig"}).
{#F7}
Correlation between MDM2, c-myc, p53, ATM and Per2 expression levels in glioma tissue {#s2_6}
-------------------------------------------------------------------------------------
We examined the expression of ATM, TP53, MDM2, and C-MYC, important genes for repair, programmed cell death, and proliferation. Protein and phosphorylation levels were normalized to the level of GAPDH and baseline expression. After exposure to 10 Gy X-ray-irradiation, the expression of ATM and TP53 was reduced in Per2 knockdown U343 glioma cells relative to the other two groups at all measured time points (both *p* \< 0.05). In contrast, the expression of the oncogenes c-myc and MDM2 increased in the irradiated shRNA-PER2 U343 glioma cells (Figure [8A](#F8){ref-type="fig"}). Differences in mRNA expression were found to correlate with similar changes in immunoreactive proteins detected by western blot (Figure [8B](#F8){ref-type="fig"}). *In vitro*, the same results were observed; downregulation of Per2 reduced the expression of ATM and TP53 and increased the expression of c-myc in X-ray-irradiated U343 glioma cells. Secondly, in the Per2 knockdown group, ATM and p53 proteins increased while Per2 and MDM2 were reduced over time. However, c-myc protein and mRNA were unchanged among the three time points.
{#F8}
DISCUSSION {#s3}
==========
Mutations in the Per2 gene, an essential regulator of the mammalian circadian clock system, have been identified in a wide range of human cancers, including colorectal and breast cancer \[[@R26]\]. Furthermore, circadian Per2 disruption has been implicated in cell cycle dysfunction and apoptosis, which was evident by the aberrant rhythmic expression of the cell cycle gene cyclin D1 as well as the negative p53 regulator MDM2 \[[@R27]\]. Additionally, there are several links between Per2 and DNA damage responses. Aberrant Per2 expression results in potent downstream effects on both cell cycle and apoptotic targets, which is suggestive of a tumor suppressive role for Per2 \[[@R28]\]. Additional lines of evidence, suggest a role for Per2 in tumor suppression. Per2-deficient mice have a low tumor incidence; however, following γ-irradiation, these mice become cancer-prone \[[@R5]\]. In humans, Per2 expression is significantly reduced in both sporadic and familial primary breast cancers \[[@R7]\], and a few breast cancer cases contain PER2 mutations \[[@R29]\]. In cases where Per2 is not mutated, altered Per2 promoter methylation has been observed \[[@R6]\]. Consistent with this finding, Per2 expression is reduced in breast cancer stem cells (BCSCs) \[[@R30]\]. Several studies have described a correlation between Per2 and cell cycle regulation or DNA damage response gene expression \[[@R5], [@R11], [@R18], [@R31], [@R32]\].
In our previous study, we reported that Per1 and Per2 expression abnormalities are associated with glioma occurrence \[[@R9]\]. Another study showed that Per2 expression may increase the efficacy of radiotherapy against glioma \[[@R33]\]. Furthermore, the circadian genes Per1 and Per2 increase the radiosensitivity of gliomas *in vivo* \[[@R20]\]. In this study, we focused on how Per2 induces DNA damage and apoptosis of glioma cells after X-ray irradiation. Per2 knockdown in U343 glioma cells promoted the tumor formation process in nude mice, which is consistent with gastric cancer and breast cancer research \[[@R33], [@R34]\]. By irradiating glioma tissue with 10 Gy X-rays, we found that DNA damage and apoptosis of glioma cells were reduced in the Per2-knockdown group compared with the other groups. This result suggests that Per2 might be relevant in X-ray treatment, promote apoptosis of glioma cells, and be a suppressive gene.
Ionizing radiation is a genotoxic agent that produces a wide range of DNA alterations (e.g., strand breaks, base damage, and cross-links), which, after processing through the cellular repair machinery, determine the variety and severity of cellular and tissue effects. Double-strand breaks (DSB) are critical lesions that can lead to cell death or genomic instability unless properly repaired \[[@R35]\]. An important steps in evaluating the damage severity and cellular ability to advance through the cell cycle is the activation of p21WAF1/Cip1. p21 inhibits cell cycle-dependent kinases (CDK) by suppressing Cyclin E and Cyclin A-associated CDK2 activities, thus blocking cell cycle progression \[[@R36]\]. p21 acts as a cell cycle checkpoint and is able to block the cell cycle at both G1/S and G2/M phases. It is also one of the main factors that induce p53-dependent apoptosis \[[@R37], [@R38]\]. p21 is upregulated in the initial phases of human primary keratinocyte terminal differentiation and decreased at the late stages of the process \[[@R37]\]. This protein increase has been suggested as a necessary step in the removal of cells with accumulated DNA damage via apoptosis. When sub-lethal DNA damage is induced, p21 acts as an inducer of cell cycle arrest and facilitates damage repair \[[@R36]--[@R38]\]. Previous studies have used γH2AX foci as a sensitive monitor of DSB formation and repair in cultured cells and *in vivo* \[[@R39], [@R40]\]. We obtained tumor tissues from mice after a low dose of X-ray irradiation and detected DNA damage in glioma cells. Once a DNA strand break occurs, H2A is rapidly phosphorylated. In our study, we found that the level of phosphorylated histone H2AX in the gliomas of the Per2-knockdown group after X-ray irradiation was significantly lower than the control virus or normal control groups at all time points, indicating reduced DNA double strand breakage.
After X-ray irradiation, the expression of phosphorylated histone H2AX was increased in the Per2-knockdown group but unchanged in the control groups. Moreover, when we measured apoptosis in the three glioma groups after irradiation, we found that the apoptosis levels in the Per2-knockdown group were lower, consistent with the changes in DNA damage.
Previous studies have shown that Per-mutant mice are cancer-prone, whereas Cry1−/−; Cry2−/− mice are deficient in cell proliferation in the first 72 h of liver regeneration \[[@R5], [@R14], [@R41], [@R42],\]. A similar deficiency in liver regeneration was reported for mice lacking the nuclear receptor FXR, which are also prone to spontaneous hepatocellular carcinoma \[[@R43], [@R44]\]. These findings suggest that cell proliferation is differentially controlled under different physiological conditions *in vivo*. Using the central clock-SNS-peripheral clock axis as a model system, we propose that central clock-controlled SNS signaling generates coupled AP1, peripheral clock, and ATM activation. AP1 activation leads to myc-induced cell cycle progression, while the activation of the peripheral clock inhibits myc overexpression and is required for ATM activity. ATM then induces p53 to prevent Myc oncogenic signaling by blocking p53-MDM2 interactions. Disruption of circadian rhythm desynchronizes the central clock-SNS-peripheral clock axis, which suppresses peripheral clock and peripheral clock-dependent ATM-p53 signaling; however, it has no effect on c-myc activation. Together, these events lead to Myc oncogenic activation, which promotes genomic instability and tumor development. This model suggests that the circadian clock plays a dual role in cell cycle control and suppression of tumor development by controlling homeostasis but not the inhibition of cell proliferation. Our finding regarding the sympathetic control of ATM-p53 signaling indicates that the induction of p53 occurs as an integrated part of the mammalian daily physiology *in vivo*. This finding has important therapeutic implications \[[@R45]\].
p53 is a potent transcription factor, activated in response to diverse stresses and environmental insults, leading to induction of cell cycle arrest, apoptosis, or senescence. Thus, the main function of p53 is to restrain the emergence of transformed cells with genetic instabilities, acting as the 'guardian of the genome'. In normal cells, p53 is kept at low levels by MDM2, a ubiquitin ligase. MDM2 and p53 form a negative-feedback loop, in which p53 induces the expression of MDM2, which in turn promotes the degradation of p53 and quenches cellular p53 activity \[[@R46]\]. Approximately 50% of human cancers possess a mutated form of p53, while more than 17% of tumors exhibit mdm2 gene amplification. These alterations, separately or concomitantly, lead to poor prognosis and treatment failure \[[@R47]--[@R49]\]. For these reasons, the MDM2-p53 interaction appears to be an excellent target for cancer therapy and has been a focal point of research in both academia and industry, aiming to develop better targeted cancer therapeutics.
Per2 overexpression can lead to cell differentiation and apoptosis and changes the expression levels of apoptosis-related genes \[[@R18], [@R50]\]. In response to DNA damage, several checkpoint genes, including ATM/ATR and CHK1/2, are successively activated. Subsequent TP53 activation \[[@R51]--[@R55]\], results in cell cycle arrest at the G1/S, S, or G2/M phases, providing sufficient time for DNA damage repair \[[@R50], [@R51]\]. If DNA damage is not repaired in a timely manner, chromosomal deletions, duplications, or translocations can appear. MDM2 expression is induced by TP53, promoting p53 degradation and limiting its activity \[[@R46]\]. In our study, the Per2, P53, and ATM expression levels in the Per2-knockdown group were lower than those in the control virus and blank groups at 24, 48, and 72 hours after X-ray irradiation. However, MDM2 and c-myc expression was higher in the Per2-knockdown group. We believe that Per2 regulates glioma cell apoptosis via the ATM-p53 pathway, promotes ATM and P53 expression, and inhibits the c-myc and MDM2 expression. Per2 is an excellent potential target for glioma treatment.
We conclude that Per2 is both a tumor suppressor gene and an upstream regulatory gene of TP53. It inhibits tumor growth and promotes cancer cell apoptosis by regulating TP53 expression and DNA damage repair. Our findings identify Per2 as an excellent target for the clinical treatment of glioma and a reliable basis for post-radiation therapy and gene therapy for gliomas.
MATERIALS AND METHODS {#s4}
=====================
Cell lines and reagents {#s4_1}
-----------------------
The U343 glioma cell line was purchased from Ji Ni Biotechnology Co. Ltd. (Guangzhou, China). The cells were maintained according to the supplier\'s directions and were cultivated at 37°C in a 100% Rh 5% CO2/95% air atmosphere. ShRNA-PER2 lentivirus was obtained from the Genechem Chemical Technology Co. Ltd. (Shanghai, China). The oligonucleotide primer and probe sequences were designed and provided by Sangon Biotech Co. Ltd. (Shanghai, China). BALB/C mice were purchased from the Ningxia Medical University animal center. The per2, p53, c-myc, ATM, and mdm2 antibodies (Abcam, USA), the phosphorylated H2AX antibody (CST, USA), the total RNA extraction kit, the reverse transcription kit, the real time quantitative PCR kit, the total protein extraction kit, the protein concentration detection kit (Thermo-Fisher, USA), and the TUNEL kit (Roth, USA) were used according to the manufacturers' instructions. A USA Varian IX (SNSS04) accelerator provided the 10 Gy X-ray irradiation.
Transfection with shRNA lentivirus {#s4_2}
----------------------------------
Per2 expression levels were modified using a lentiviral transfection of shRNA (Table [1](#T1){ref-type="table"}). U343 glioma cells were stably transformed with shRNA-PER2 and shRNA-control constructs according to the manufacturers' protocol. U343 cells were plated in 6-well plates at a density of 2 × 104 cells/well in RPMI-1640 medium (Gibco, USA) and allowed to attach for 18 h prior to transfection with the shRNA lentivirus vectors. The viral constructs were permitted to integrate for 24 h after infection. Puromycin (3 μg/ml) was added to select cells with integrated retrovirus, and stable cell lines were established after 3 weeks. Then, qRT-PCR and Western blot analyses were used to verify the Per2 expression levels.
###### Interference sequence of shRNA-PER2 are showed in table 1
Name Plasmid sequences
-------------- --------------------------------------------------------------------
Period2-RNAi 5ʹ--CCGGCCACGAGAATGAAATCCGCTACTCGAGTAGCGGATTTCATTCTCGTGGTTTTTG--3ʹ
Control-RNAi 5ʹ--TTTCTCCGAACGTGTCACGTTTCAAGAGAACGTGACACGTTCGGAGAATTTTTTC--3ʹ
Animal experiments {#s4_3}
------------------
These studies were conducted in accordance with the animal care guidelines of the Animal Studies Committee of Ningxia Medical University.
The three groups of cells were cultured and collected in the logarithmic growth phase. An appropriate volume of fetal bovine serum-free RPMI1640 medium and double antibody (Inactivated 10% fetal bovine serum and 1% mildew chain mildew) was added to each of the three groups of cells to bring them to a uniform concentration of 2 × 107 cells/ml. Samples were frozen for later establishment of transplanted tumor models. 54 BALB/C nude mice (male, 18--20 g) were divided into three groups that were administered one of the three different groups of cell. The mice were injected according to the SPF protocol, and tumor growth was observed. When the tumor volumes reached 1,000 mm3, each group was divided into irradiated and non-irradiated groups. The irradiated groups were administered a single 10-Gy X-ray dose. Three mice were sacrificed by cervical dislocation at 24, 48, and 72 hour time points; then, the tumor was excised.
Tissue treatment {#s4_4}
----------------
The tumors were harvested, and portions of the tumors were fixed in 4% formalin for 48 h. Morphological changes were evaluated by hematoxylin and eosin staining, while the remaining sample was cut into pieces for protein and RNA isolation.
TUNEL analysis {#s4_5}
--------------
Dewaxing and rehydration of the tissue sections was conducted according to standard protocols (i.e., heating at 60°C followed by washing in xylene and rehydration through a graded series of ethanol and double distilled water). The tissue sections were then incubated for 15--30 min at +21 to +37°C with a proteinase K working solution. The slides were then rinsed twice with PBS, and the area around the sample was dried. Then, 50 μl of TUNEL reaction mixture was added (a total volume of 50 μl of Enzyme solution (vial 1) was added to the remaining 450 μl of Label Solution in vial 2) to the sample. Samples were capped and incubated for 60 min at 37°C in a humidified atmosphere in the dark. The slides were rinsed 3 times with PBS. The samples were analyzed in a drop of PBS under a fluorescence microscope at this state, with 450--500 nm excitation and 515--565 nm emission detection (green).
Histology analysis {#s4_6}
------------------
Briefly, sections were deparaffinized, pretreated with 0.3% H2O2 for 20 min to inhibit endogenous peroxidase activity, blocked with 2% goat serum for 30 min, and incubated with a primary antibody overnight at 4°C. The avidin-biotin-complex technique and high-sensitivity diaminobenzidine (DAB+) chromogenic substrate system (Dako Denmark) were used for visualization; then, samples were counterstained with hematoxylin. We counted 6 randomly selected 400 × fields, and the mean number of H2AX+ cells per field was obtained for statistical analysis.
Western blot analysis {#s4_7}
---------------------
Tumor extracts or cell lysates were mixed with sample loading buffer and separated under reducing conditions with a 10% SDS-polyacrylamide gel, then incubated with rabbit anti-per2, anti-mdm2, anti-p53, anti-ATM (Abcam), or anti-phosphorylated-H2AX (Ser139) antibodies (Cell Signaling Technology). Protein and phosphorylation levels were normalized to that of GAPDH (ProteinTech Group) and baseline expression.
qRT-PCR analysis {#s4_8}
----------------
The relative mRNA quantification of Per2 target genes was performed by RT-PCR as described above. Specific primers for p53, MDM2, c-myc, and ATM mRNA were designed to include intron/exon boundaries and are reported in Table [2](#T2){ref-type="table"}. The relative expression of the Per2, p53, MDM2, c-myc, and ATM mRNA was determined using the relative quantification method and 2 -ΔΔCt analysis.
###### Real-time RT-PCR: primer nucleotide sequences
Genes Forward Reverse
------- -------------------------------- --------------------------------
Per2 5ʹ--CCCTGGTGTCTGGGAAGAT--3ʹ 5ʹ--GGAGGTGAAACTGTGGAACA--3
ATM 5ʹ--TGTGACTTTTCAGGGGATTTG--3ʹ 5ʹ--ATAGGAATCAGGGCTTTTGGA--3ʹ
p53 5ʹ--CTCCTCAGCATCTTATCCGAGT--3ʹ 5ʹ--GCTGTTCCGTCCCAGTAGATTA--3ʹ
c-myc 5ʹ--CCTCCACTCGGAAGGACTATC--3ʹ: 5ʹ--TGTTCGCCTGACATTCTC--3ʹ
MDM2 5ʹ-GCTTTATGGGTGGATGCTGA--3ʹ 5ʹ-TTGCCTTTCGTTTGTTAGCTC--3ʹ
GAPDH 5ʹ-AGAAGGCTGGGGCTCATTTG-3ʹ 5ʹ-AGGGGCCATCCACAGTCTTC--3ʹ
Statistical analyses {#s4_9}
--------------------
All data are presented as the mean ± SEM. Statistical analysis was performed with one-way analysis of variance (ANOVA) tests with Bonferroni\'s corrected *t*-tests for post-hoc pair-wise comparisons. Densitometric analysis of the immunoreactive bands was performed using the ImageJ program. For the *in vivo* experimental data, a two-way ANOVA was performed to compare the different parameters amongst the different groups. *P* \< 0.05 was considered significant.
We thank the Incubation Base of the National Key Laboratory for Cerebrocranial Diseases, Ningxia Medical University, and the Departments of Pathology and Radiotherapy of Ningxia Medical University Hospital for providing support and help. This work was also supported by the National Natural Science Foundation of China (grant 81160313).
**CONFLICTS OF INTEREST**
None.
|
We’re looking over our shoulders at the year that was—to celebrate the positives and, we hope, learn from the negatives. In that spirit, we (Julia, Karen, JoAnna and Lisa) have compiled what we consider to be some of the best and worst moments for dogs in 2010.
Best: After more than 125 years as the purebred dog’s advocate, the American Kennel Club invites mixed breeds to participate in its new Canine Partners Program. Mixes now go paw-to-paw against purebreds in agility, obedience and Rally competitions nationwide.
Worst: Despite providing excellent animal control services for the city of New Orleans for many years, the Louisiana SPCA is forced to play hardball with a new mayoral administration and city councilmembers when the latter offers a paltry sum for its 2011 contract. On December 15, the LA/SPCA says, thanks but no thanks to the city, explaining that humane work cannot be fueled by blood, sweat and tears alone. Two weeks later, the politicians come to their senses and offer a more agreeable sum so that all of New Orleans’ companion animals will be better served.
Best: Couple in Oklahoma, after losing all six of their pets (two dogs, four cats) to poisoning from melamine-tainted pet food, donate five acres of land in Tulsa for a memorial garden to all the animals who lost their lives in this horrible way. They believe that all the pets need to be honored and that the people who suffered deserve to know that their pets matter.
Worst: The new kids book Smooch Your Pooch actually instructs kids to hug and kiss dogs—advice that greatly increases the likelihood of kids being bitten. This is exactly the sort of behavior that those of us who work with dogs in general, and aggressive dogs in particular, work so hard to discourage. Sigh.
Best: Ignoring the misinformation campaign of Tea Party activists, nearly 1 million Missouri voters approve the Puppy Mill Cruelty Protection Act, a statewide ballot initiative to establish basic standards of care for dogs in large-scale commercial breeding facilities, of which Missouri has the most in the country.
Worst:Missouri Sen. Bill Stouffer (R), who apparently doesn’t seem to think citizens should have a say, files a bill to repeal the puppy mill measure days after it passes. Also pretty lame are the other Missouri legislators working to gut the law.
Best: The U.S. Department of Defense announces that it is financing a $300,000, 12-month study that will look at the effects of service dogs on changes in PTSD symptoms and medication use in veteran soldiers. Even better, some of the dogs being trained for the study will be rescued from animal shelters.
Worst: Target the war hero dog is accidentally euthanized after escaping from his adopted family’s backyard. The Shepherd mix had been brought over to the United States after warning soldiers of a suicide bomber in Afghanistan, saving dozens of lives.
Best: Always best—in this and every year—are the countless volunteers who give their all for dogs in need. This year we wrote about a few, including Gateway Pet Guardians, a small coterie of volunteers, who feed and find homes for the strays of East St. Louis and Laura Pople, who raided her savings and turned her farm into a sanctuary for pets who are casualties of the recession. Julia wrote about the invaluable work of breed-specific rescue organizations, which provide lifesaving support to overburdened shelters and city animal control departments. And during the year, we profiled a few animal transporters, like Operation Roger, C.A.R.E. and Pilots N Paws, which move dogs from regions where they can’t find a home to regions where the can. These volunteers make a difference for dogs every day and always inspire us at Bark.
What happenings in dogdom raised your ire or earned your praise in 2010? |
Bonk 3: Bonk's Big Adventure
is an action video game for the TurboGrafx-16 in 1993, in the Bonk video game series. It was ported to the TurboDuo in 1994, with a new cover illustration by Marc Ericksen. It was released for the Wii Virtual Console in Europe on August 31, 2007 and in North America on September 3, 2007. It was also released in Japan on the PlayStation Store on January 20, 2010 and on the Wii U Virtual Console June 25, 2014, the latter receiving a North American release on June 29, 2017.
Bonk 3: Bonk's Big Adventure brought the series many new gameplay elements, including candies that made the player shrink and grow, and cooperative multiplayer. The story is similar to that of the other Bonk games, putting the player character up against Evil King Drool and many new enemies in the Dinosaur Kingdom.
Reception
Though two of Electronic Gaming Monthly'''s reviewers commented that Bonk 3 offers little new content to the Bonk series, all four of them praised the two-player cooperative mode, and all but one judged that the game maintained the Bonk series's tradition of excellent gameplay design, appealing cartoony graphics, and strong audio. They scored the TurboGrafx-16 version a 7.75 out of 10.
Reviewing the TurboDuo version, GamePro'' praised Bonk's variety of abilities, the cartoony graphics, and the CD audio, but criticized the pacing and controls and stated that it offers too little new content to be worthwhile to gamers who had already played the cartridge version.
References
External links
The Bonk Compendium (Covering all games and references to Bonk)
Category:1993 video games
Category:A.I Company games
Category:Bonk video games
Category:TurboGrafx-16 games
Category:TurboGrafx-CD games
Category:Video games developed in Japan
Category:Virtual Console games
Category:Virtual Console games for Wii U
Category:PlayStation Network games
Category:Cooperative video games
Category:Video game sequels |
Category: Uncategorized
As one who has followed the triumphs and travails of the former Orchestra London for decades, I was really pleased to see its musicians coalesce around a new structure with a new name two days ago. New beginnings are always sweet — but for this ensemble, it must have been doubly so.
London Symphonia has managed a difficult balancing act: It has retained many of its core musicians, added others and reorganized in such a way as to preserve its artistic integrity and attract new support after throwing off the shackles of the organization that closed its doors in late 2014 and dissolved into bankruptcy in mid-2015. According to spokesperson Andrew Chung, London Symphonia already enjoys the support of government arts granting organizations, as well as a dedicated quorum of new and old supporters. That sounds far easier than it is.
I’ve written several columns (you can find samples here and here) over recent years about Orchestra London’s organizational failures and its struggle to battle back from life support to some sort of institutional viability. While the ensemble’s artistry was never in doubt, the former orchestra suffered from poor governance, ineffectual administrative leadership and structural models that were no longer in tune with its marketplace.
The ensemble’s musicians valiantly pursued their craft, post-bankruptcy, through #WePlayOn, which continued to play publicly, often for free, as they tried to find a suitable container for talents and aspirations of its members. London Symphonia is the result.
CTV London covered the new orchestra’s first concert, and London Free Press arts writer James Stewart Reaney provided a fitting column as one of his last acts on staff at the newspaper before his retirement.
London Symphonia’s website is here; its Twitter account is here. I wish them great success. It has been a long, hard, rocky road.
Musicians of the former Orchestra London play a Christmas concert in the baggage claim area at London International Airport on Dec. 22, 2014 — just weeks after Orchestra London closed its doors — in an effort to keep orchestral music in the community alive.
Share this:
Like this:
I anticipate Christmas Eve each year, and even long for it, because by about 6 p.m., the commercial din that began mere days after Thanksgiving and grew slowly over the succeeding weeks toward a fulsome frenzy of mall mania, parking-lot angst and swipe-card silliness suddenly falls quiet. Silence becomes nearly palpable. Suburban streets, shopping centres and downtown office buildings assume a kind of haunting eeriness that suggests some kind of rapturous event has occurred, leaving mere mortals behind.
And, in a way, it has. Christmas has come, ready or not. Commercial jingles and slogans about the meaning of the season are mercifully sucked into some unseen cosmic dumpster, laying bare the stark, enchanting nudity of Christmas — the bare bones, the naked flesh, the unadorned essence.
There is nothing left now but to approach the creche — this crude, stylized manger scene meant to mirror some similar imagining of nearly 2,000 years ago. We tend too often to admire it only from afar. In our detached, urbane, 20th-century sophistication, we refuse to allow ourselves to get close enough. Like a finely played classical guitar or cello, this event is best appreciated in close proximity, in its unamplified, undistorted form.
Pause before this natal moment, this nativity scene. Take several steps, sometimes many steps, forward. Dare to gaze intently into the eyes of this child. Wait patiently until, like an a 3-D optical puzzle or motion picture, the full depth of this event suddenly comes into focus — the unbearable dimensions of the infinite contained in the finite, the eternal captured in the temporal. Once seen, you wonder why you couldn’t see it at first blush.
But the voyage of discovery continues. Look even more closely, adjusting your focus again, slightly, ever so slightly, until there, at the outer edge of the child’s cornea, you glimpse your own reflection.
In seeing that image, you grasp the mysterious, eternal truth that the invasion of human history by something divine is celebrated in the nativity, but is not confined to it. That discovery, with its many Christmas corollaries, is the best hope for peace on earth in a world conflicted by poverty, war and injustice.
Share this:
Like this:
LikeLoading...
Author
Larry Cornies is a journalist and educator based in London, Canada. He has been a reporter and editor at news organizations in Canada and the United States for more than 25 years and currently acts as coordinator of journalism programs at Conestoga College in Kitchener, Ont. |
Objectives
==========
To study the prevalence of malnutrition in surgical patients. To identify the patients at risk of early postoperative wound infection. To observe the pattern of wound healing in various groups of surgical patients based on their preoperative nutritional status.
Design
======
A descriptive study in the surgical department at Jinnah Hospital Lahore, Pakistan.
Participants
============
One hundred patients presenting to surgical OPD since 1 January 2001.
Methods
=======
Serum albumin levels and the BMI of these patients were evaluated and patients were assigned to a group according to their nutritional status.
Main outcome measures
=====================
Adding all patients in groups II, III, and IV and dividing by the total number of patients in the study determined the prevalence of malnutrition. Wounds of all patients were examined on the third postoperative day and the wound category was recorded. Wound infection was observed in various nutritional status groups.
Results
=======
The prevalence of malnutrition in surgical patients is 70%. Wound infection was present in all groups of patients except group I. Patients in groups II and IV had more severe wound infection.
Conclusion
==========
Malnutrition is common in surgical patients. Hypoalbuminemia is associated with increased risk of early postoperative wound infection. The BMI has no direct effect on early postoperative wound infection. Further studies are needed to explore the role of other parameters of nutritional assessment on early postoperative wound infection in patients with different demographic factors.
|
---
abstract: |
A novel method to infer logical relationships between sets is presented. These sets can be any collection of elements, for example astronomical catalogs of celestial objects. The method does not require the contents of the sets to be known explicitly. It combines incomplete knowledge about the relationships between sets to infer a priori unknown relationships. Relationships between sets are represented by sets of *Boolean hypercubes*. This leads to deductive reasoning by application of logical operators to these sets of hypercubes. A pseudocode for an efficient implementation is described.
The method is used in the [[Astro-WISE]{}]{}information system to infer relationships between catalogs of astronomical objects. These catalogs can be very large and, more importantly, their contents do not have to be available at all times. Science products are stored in [[Astro-WISE]{}]{}with references to other science products from which they are derived, or their dependencies. This creates full *data lineage* that links every science product all the way back to the raw data. Catalogs are created in a way that maximizes knowledge about their relationship with their dependencies. The presented algorithm is used to determine which objects a catalog represents by leveraging this information.
author:
- Hugo Buddelmeijer
- 'Edwin A. Valentijn'
date: 'Received: date / Accepted: date'
title: Leveraging Data Lineage to Infer Logical Relationships between Astronomical Catalogs
---
Introduction
============
A set is a collection of elements. For example, an astronomical catalog is a set with celestial objects as elements. These sets have relationships with one another, for example a set could be a subset of another set. The relationships between sets can be inferred by comparing their elements. However, this is only possible when it is feasible to iterate over all the elements in the sets. A novel method is presented that does not require the contents of the sets to be known explicitly. A priori unknown relationships between sets are inferred by combining incomplete information that is available.
The method is designed for the [[Astro-WISE]{}]{}information system to infer relationships between astronomical catalogs [@pullingcatalogs]. Catalog handling using this method is discussed in the following sections. However, the method is generic enough to be used for other purposes.
Catalogs can be stored and even used in [[Astro-WISE]{}]{}without determining their full contents. The creation of the catalog data is postponed until necessary and the result is only stored when beneficial for performance. That is, the information system will only derive those parts of a catalog that are required for further processing. As a result, the catalog data might not be available as a whole when the catalog is used. One of the key aspects of [[Astro-WISE]{}]{}is that science products are automatically found or created when requested. This requires the information system to be able to infer the contents of the catalogs automatically. Determining the contents of the catalogs has to be possible without requiring access to the catalog data itself, since this might not be stored.
[[Astro-WISE]{}]{}stores science products with all the information required to (re)create the data. In particular, every science product is stored with links to other science products from which it was derived, called its *dependencies*. This creates full *data lineage* that links data products all the way back to the raw data. As a result of this, every catalog ‘knows’ from which other catalogs it is derived. In particular, it is known which relations might hold between the sets of sources of a catalog and those of its dependencies. A priori only this local information about the relationships between catalogs is available. A more global overview of the relationships between catalogs is necessary for the desired automation. The presented method combines this local information to achieve the required knowledge.
The novelty of the method is the use of Boolean hypercubes to represent relations between sets. Relationships between specific sets are represented as sets of hypercubes in order to account for incomplete knowledge. This makes it possible to deduce relationships by application of logical operators on these sets of hypercubes.
Ultimately, the presented method is a specialized form of automated theorem proving. Other such methods could be used to infer relationships, for example software that can solve the problems in the SET domain of the TPTP Problem Library[^1][@SutcliffTPTP]. Those methods are very generic and can be used to solve several kinds of logical problems. The presented mechanism is more specific: while the used hypercube representation is natural for dealing with sets, it is not directly applicable to more general problems.
Relational databases can use similar mechanisms for query optimization (see for example @Chaudhuri:1998:OQO:275487.275492 for an overview). These are embedded in the optimization algorithms and are therefore not directly applicable to the requirements of [[Astro-WISE]{}]{}.
This paper is structured as follows. The representation of relationships by means of sets of hypercubes and the details of the method are given in [section \[sec:descriptionofalgos\]]{}. Applications of the presented mechanisms in [[Astro-WISE]{}]{}are discussed in [section \[sec:astrowise\]]{}. Subsequently, the pseudocode of the algorithms is given in [section \[sec:pseudocode\]]{}. This is followed by an example in [section \[sec:example2\]]{} and conclusions in [section \[sec:conclusions\]]{}.
Description of Algorithms {#sec:descriptionofalgos}
=========================
The basis of the method is the use of Boolean hypercubes to represent logical relations between sets ([section \[sec:relashyper\]]{}). The relationships between specific sets are represented by means of a set of hypercubes to account for incomplete knowledge ([section \[sec:relasset\]]{}). Deduction is possible through application of logical operators on the sets of hypercubes ([section \[sec:logicaloperationsonrels\]]{}). Scalability in implementation is achieved by optimizing important logical operators ([section \[sec:optimizations\]]{}). Pseudo code for an implementation of the method is given in [section \[sec:pseudocode\]]{}.
Relations as Hypercubes {#sec:relashyper}
-----------------------
A Boolean hypercube can be used to represent a relation between sets by associating a set to each dimension of the hypercube ([Fig. \[fig:hypercuberep\]]{}). This representation is well suited for a numerical implementation by means of a multidimensional array ([Fig. \[fig:matrixrep\]]{}). Examples of hypercube representations of relations are given in [table \[tab:hypercubeslowd\]]{}. In particular the relations that are directly relevant to our astronomical application are shown.
Every logical relation between $n$ sets can be represented by means of an $n$-dimensional hypercube. This is done by identifying each of the $2^n$ possible intersections between the sets with one of the vertices of the hypercube. A vertex in the second position of a specific dimension represents objects that are elements of the set corresponding to that dimension. A vertex in the first position of the dimension represents objects not in the corresponding set. For example, the vertex that is in the second position in all dimensions represents objects that are in all the sets described by the hypercube. The vertex that is in the first position in all dimensions represents objects that are in none of the sets under consideration. A Boolean value can be assigned to each vertex to indicate whether the corresponding intersection between sets contains any objects: a Boolean [`True`]{}value is assigned if the vertex represents one or more objects and a Boolean [`False`]{}value is assigned if it does not. The collection of all objects—whether inside a set or not—is called the *universe*, which can be empty.
This hypercube representation of relations between sets is similar to Karnaugh maps [@k:map:1953] and to the hypercube representation of logical operators by @Clarke199497short. Furthermore, the hypercubes can be translated into shaded Venn diagrams [@Venn1880] by assigning every vertex to a region of overlap in the Venn diagram.
A hypercube of a certain dimension also represents specific relations of lower dimensions. A lower dimensional relation is inferred by summing the hypercube over the dimensions that represent the unwanted sets (Algorithm \[algo:removeset\]). Summing over a dimension means repeatedly performing the logical *or* operator on two adjacent vertices that are aligned in that dimension, since Boolean values are assigned to the vertices.
Relationships as Sets of Hypercubes {#sec:relasset}
-----------------------------------
A relationship between specific sets is described with a set of all hypercubes that are consistent with the available knowledge about the relationship. This stems from our astronomical requirements, where the exact relationship between sets is not always known. For example, there are four different hypercubes that represent an equality: between empty or nonempty sets and with or without objects outside the considered sets ([table \[tab:hypercubeslowd\]]{}). Representing that two sets are identical, without any extra available information, should therefore be done with a set of these four hypercubes. However, more information is usually not necessary: it is enough to determine that the relationship between two sets must be one of these four in order to infer that they are equal.
The set of hypercubes representation allows us to define four classes of relationships between sets:
- The *Contradiction*, an empty set of hypercubes: there is no relation between the sets that is consistent with the available knowledge.
- An *Exact Relation*, a set with exactly one hypercube: there is only one relationship possible between the sets; everything is known about the sets under consideration.
- An *Inexact Relation*, a set with more than one hypercube: there are several relations that are consistent with the available knowledge.
- The *Tautology*, a set with all $2^{2^n}$ possible hypercubes representing $n$ sets: every relationship is possible; nothing is known about these sets.
The use of the tautology can be prevented in a numerical implementation ([section \[sec:optimizations\]]{}). It is included here because it is useful in discussing the presented mechanisms.
A relationship also represents knowledge about sets that do not correspond to any dimension of the hypercubes. For example, an empty universe can be represented with a hypercube of any dimension with [`False`]{}as the value of all vertices. Such a relation implies that all sets, also those that have no corresponding dimension in the hypercube, must be empty. Most relationships are less strict: in general they tend to represent the tautology for sets that have no corresponding dimension.
A higher dimensional relationship can be inferred from a lower dimensional one by adding dimensions to the hypercubes. This results in a set of hypercubes that can be constructed as follows (Algorithm \[algo:addsetsimple\]): first create the tautology for the higher dimension. Subsequently remove all hypercubes that are not consistent with the original relationship. Adding a set to a relationship usually results in an increase of the number of hypercubes necessary to represent the relationship.
Logical Operations on Relations {#sec:logicaloperationsonrels}
-------------------------------
A natural way to apply logical operators to relations follows from the use of sets of hypercubes to represent the relations. The basic principle is that applying a logical operator to one or more relations, amounts to applying this operator to their corresponding sets of hypercubes. This leads to an implicit way to infer unknown relationships from known ones by application of the material (non)implication.
The only non-trivial unitary operator is the negation (NOT, $\neg$). The negation of a relationship between $n$ sets is represented by the set of hypercubes of dimension $n$ that are not consistent with the original relationship. This set can be constructed by creating the tautology of dimension $n$ and removing those hypercubes that were used to represent the original relationship (Algorithm \[algo:negation\]). This is not scalable, because the size of the tautology grows exponentially with the number of dimensions. The negation should therefore be avoided, and thereby also its implicit use in binary operators.
Applying a binary operator to two relationships requires that the used hypercubes represent the same sets (Algorithm \[algo:binaryoperator\]). In general this can be achieved by adding sets to each relationship (through algorithm \[algo:addsetsimple\]) until they represent relationships between identical sets. However, in some cases it suffices to remove sets from the relationships ([section \[sec:optimizations\]]{}). Binary operators that are of particular importance for the deduction of a priori unknown relationships are:
- Conjunction (AND, $\wedge$, ${\cap}$): Combines two relationships that are both known to hold. The result of $P \wedge Q$ is a relationship represented by hypercubes that are consistent with both a hypercube in $P$ and one in $Q$.
- Disjunction (OR, $\vee$, ${\cup}$): Combines relationships of which it is known that at least one of them holds. The result of $P \vee Q$ is a relationship represented by hypercubes that are consistent with a hypercube in $P$ and/or one in $Q$.
- Material Implication ($\rightarrow$): Can be used to infer relations. The result of $P\rightarrow Q$ is a relationship with hypercubes that are consistent with both $P$ and $Q$, together with those that are not consistent with $P$. The relationship $P$ implies that relationship $Q$ holds when $P\rightarrow Q$ results in the tautology. The material implication ($P \rightarrow Q$) can be implemented as $(\neg(P \wedge (\neg Q)))$, which requires the negation operator. An implementation of the negation is not scalable; the material implication is therefore not suitable to prove whether unknown relations hold.
- Material Nonimplication ($\nrightarrow$): Can also be used to infer relationships. The relation that is the result of the material nonimplication $(P \nrightarrow Q)$ is represented by the set of hypercubes that is consistent with $P$, but not with $Q$. This operation can be used to prove that relation $Q$ must hold given $P$, because $P$ implies $Q$ when the result of the operation is the contradiction. This operation is more suitable for implementation than the material implication, because it always results in a relation that is represented by less hypercubes than the original relations.
The logical operators can be used to prove that a specific relationship must hold by testing for entailment (Algorithm \[algo:entailment\]). First a list of relationships $(S_0, S_1, ...)$ is constructed, where each $S_i$ contains partial a priori knowledge about the sets. The logical conjunction operator is subsequently applied to all these relationships, resulting in relationship $S$. Finally, the nonimplication $S\nrightarrow R$ is applied, where $R$ is the relationship that needs to be proven. Relationship $R$ must be valid if the result of the nonimplication is the contradiction.
Optimizations {#sec:optimizations}
-------------
The logical operators are discussed in the previous section in an intuitive but naive form that will lead to an unscalable implementation. Firstly, adding a set to a relationship requires the creation of all hypercubes of a specific dimension. This is not feasible for dimensions higher than about 4. This can be avoided by not creating hypercubes with [`True`]{}vertices that correspond to two [`False`]{}vertices in the original (Algorithm \[algo:addsetbetter\]). Secondly, enlarging the set of hypercubes in order to apply binary operators can sometimes be avoided entirely, in particular for conjunction and material nonimplication.
Adding sets to $P$ with the purpose of performing the conjunction $P\wedge Q$ can often be done without enlarging the number of hypercubes. This is the case when for each hypercube of $P$ there is at most one more-dimensional hypercube that is consistent with both $P$ and $Q$. Algorithm \[algo:conjunctionenhanced\] shows how to verify this condition when only one of the sets in $Q$ is not in $P$. The algorithm checks for a one-to-one correspondence between the hypercubes of $Q$ and the hypercubes of $Q$ with this extra set removed. This correspondence, if existent, can be used to add the extra set to $P$ without enlarging the number of hypercubes.
The material nonimplication operator can sometimes be performed by *removing* dimensions instead of adding them, because it tests for inconsistency (Algorithm \[algo:enhancedmaterialnonimplication\]). This is possible for the operation $P\nrightarrow Q$ when all the sets of $Q$ are also represented by $P$. It is not necessary to add the extra dimensions of $P$ to $Q$ in order to test which hypercubes in $P$ are inconsistent with $Q$: the hypercubes of $Q$ essentially represent the tautology for these extra sets and it is not possible to be inconsistent with the tautology. Instead, the extra dimensions can be removed from the hypercubes of $P$ to determine whether the originals are consistent with $Q$.
Furthermore, sets that are equal can be represented with the same dimension of the hypercubes. This optimization would make the presentation of the algorithms more complicated without adding conceptual insights and is therefore not discussed in this paper.
[[Astro-WISE]{}]{} {#sec:astrowise}
==================
The presented method is used in the [[Astro-WISE]{}]{}information system to handle astronomical catalogs. These catalogs contain information about astronomical objects and can therefore be seen as sets with these objects as elements. Catalogs in [[Astro-WISE]{}]{}are primarily created either from images or by performing an operation on other catalogs; the mechanisms presented in this paper are only used for the latter kind.
Objects and Dependency Graphs
-----------------------------
[[Astro-WISE]{}]{}uses an Object-Oriented data model in which science products are stored as class instantiations. Every class forms a blueprint of how its instances should be processed to create the data from other objects. Every object has *persistent properties* that are stored in the database, which allows the object to be used across sessions and shared between scientists. The persistent properties of an object include all the details of its processing: its *dependencies*, and the values of any process parameters that can be set. Different catalog classes are designed for different operations to create catalogs.
To create full *data lineage*, the depencies of an object have their own dependencies. This net of dependencies that links an object to the raw data is called a *dependency graph* ([Fig. \[fig:scexamplebare\]]{}). The algorithms presented in this paper are used for the automatic creation and manipulation of dependency graphs dealing with catalogs.
Target Processing
-----------------
The heart of [[Astro-WISE]{}]{}is its request driven way of data handling, called *target processing* [@Mwebaze:2009:ATU:1683300.1683752]. In the traditional way of data handling, scientists start with a data set and perform operations until they reach their required end product. Target processing turns this around: scientists request the desired end product directly—their *target*—and the information system will create a dependency graph that ends with an object representing the requested data. The information system can reuse existing objects, possibly created by other scientists. Furthermore, it can autonomously create new objects, because the class definition forms a blueprint for new objects.
The data lineage allows any object to be processed at any time, because the object’s class and persistent properties describe how this can be done. This is taken to the extreme for catalog instances: catalogs can be created and stored without fully processing them, or without processing them at all [@pullingcatalogs]. In other words, it is not required to create or store the contents of a catalog as a whole, achieving the scalability required to handle large catalogs. Therefore, determining the contents of the catalogs should be possible without consulting the catalog data directly.
The information system can process catalogs partially by modification of dependency graphs. This allows new catalogs to be created in their most general form to maximize their reusability for future requests. At the same time this ensures that catalog data is only created when this is essential for the requested dataset. Optimization of the dependency graphs requires the information system to know as much as possible about the contents of the catalogs in the graph *before* they are processed.
Algorithm Specifics
-------------------
The presented method determines whether a desired relation holds by combining information about known relationships between catalogs. The catalog classes for [[Astro-WISE]{}]{}are designed to maximize this a priori knowledge. In particular, every catalog class corresponds to a specific operation to derive catalog data from other objects. Many of these correspond to relational operators [@Codd:1970:RMD:362384.362685]. Each catalog class allows only a specific set of relationships between the sets of sources of a catalog and its dependencies.
Every catalog instance has partial knowledge about its relationship with its dependencies: it knows which relations are permitted by its class, not which of those actually holds. A priori this is the only available information. The presented mechanism is used to acquire knowledge that requires combining this local information.
In this astronomical setting, sets correspond to astronomical catalogs, and the elements are astronomical objects. This background puts several constraints on the use of the algorithm:
- All catalogs by design have one of the following relationships with their dependencies, with in brackets the number of corresponding hypercubes ([table \[tab:hypercubeslowd\]]{}): equality (4), subset (4), intersection (16) or union (16). However, they can have any relationship with catalogs that are not their direct dependency.
- The following relations are the most important in checking which relations hold between sets: non-emptiness (2), equality (4), superset (4).
- A relation where all objects are within a set can never hold.
Most of the relations that are enforced by the catalog classes are shown in [table \[tab:hypercubeslowd\]]{}. In [section \[sec:example2\]]{} the method is applied to a simplified [[Astro-WISE]{}]{}use case.
Scalability
-----------
The major factor in the scalability of the method is the size of the set of hypercubes used to represent relationships. Adding a dimension to a hypercube, will result in $3^t$ new hypercubes, where $t$ is the number of [`True`]{}cells in the original hypercube. The size of the hypercubes themselves is less of an issue: these scale with $2^{n}$, while the number of possible hypercubes scales with $2^{2^n}$ where $n$ is the number of sets. The number of possible hypercubes can grow very rapidly with the number of sets when little is known about their relationship. However, this is not necessarily problematic for application in [[Astro-WISE]{}]{}:
- Many catalogs represent the exact same objects. It is not required to add a new dimension to the hypercubes when adding a set that is known to be equal to one of the other sets: the set can be associated with an existing dimension.
- Sets that are different can still have a relation that is quantified by a low number of [`True`]{}cells. For example, sets that are a subset of another set occur often and require only one extra [`True`]{}cell. Furthermore, some sets, e.g. those that are the intersection of sets already in a relation, can be added without increasing the number of [`True`]{}cells at all (Algorithm \[algo:conjunctionenhanced\]). The relations that require the most [`True`]{}cells, such as disjoint or partially overlapping sets, are rare, because comparisons are done on catalogs that are connected through data lineage.
- Some relations are very unlikely to occur at all. For example there will always be objects not in any set.
Nonetheless, the set of hypercubes can become large for large dependency graphs of catalogs. However, in most cases the number of hypercubes can be limited:
- External knowledge—with respect to this algorithm—can be used explicitly. For example it can often be determined whether a catalog is empty or whether two catalogs are disjoint.
- Any knowledge about the relationships that is obtained, through the algorithm or otherwise, can be stored for future use.
- The sets of hypercubes are created by traversing the dependency graphs of catalogs. The most interesting relationships in a dependency graph are those between the begin and end points. Dimensions that correspond to catalogs in the middle of a dependency graph might be removed when this has little or no influence on the relationships between the catalogs at the edges.
This combination of factors ensures that the algorithm is sufficiently scalable to meet the requirements for use in [[Astro-WISE]{}]{}.
0D
-- -- ---- -- ------- ----- -- -- -- -- -- -- ----------- --
1D
empty
(3) 2D
equality
subset
superset
3D union
intersec.
: Examples of hypercube representations of low dimensional relations. Relations that are not directly relevant to our astronomical application are omitted. They are replaced with a number in parenthesis that indicates the number of missing hypercubes. The top vertex of each hypercube represents objects not in any of the sets under consideration, the bottom vertex objects in all the sets. A solid circle is used for [`True`]{}values and an open circle for [`False`]{}. The hypercubes are ordered hierarchically: a relation in a lower cell implies the relations of lower dimension in the cells above it. The check marks at one and two dimensions indicate that a set of these hypercubes represents the relation mentioned in the last column. Check marks below the numbers in parenthesis indicate the number of omitted hypercubes that are part of this set. The *superset* and *subset* labels in the 2D rows refer to the extra dimension with respect to the one already present in the 1D row. Furthermore they are *strict*: an equality is not considered a subset. Of the 256 three dimensional relations, only those where the third dimension corresponds to the union or intersection of the first two are shown. []{data-label="tab:hypercubeslowd"}
Pseudocode {#sec:pseudocode}
==========
The pseudocode for the algorithms mentioned above is presented. Every relationship $P$ is assumed to be represented with a set of hypercubes $H_p$ and a set of labels $\Lambda_p$. These labels identify the dimensions of the hypercubes with the sets considered by the relationship. The administration of these labels is trivial and is therefore only discussed when relevant for handling the hypercubes.
Dimensions of the hypercubes are denoted with $\nu$’s. A specific vertex or cell in a hypercube $h_p\epsilon H_p$ is denoted with $h_p(\nu_1, \nu_2, ..., \nu_n)$, where each $\nu_i$ can have a value of $0$ or $1$. It is assumed that the dimensions of the hypercubes are in the same order when they are compared. A transposition of the dimensions suffices to accomplish this when necessary.
$H_o =$ set of hypercubes of the original relationship $d =$ dimension corresponding to the to-be-removed set. $H_r =$ set of all hypercubes consistent with $H_o$ without dimension $\nu_d$ $n \leftarrow$ dimension of the hypercubes in $H_o$ $H_r \leftarrow$ empty set of hypercubes $h_r \leftarrow$ hypercube of dimension $n-1$ with all values set to [`False`]{} $c_p \leftarrow h_o(\nu_1,...,\nu_{d-1},0,\nu_{d+1},...,\nu_{n})$ $c_q \leftarrow h_o(\nu_1,...,\nu_{d-1},1,\nu_{d+1},...,\nu_{n})$ $h_r(\nu_1,...,\nu_{d-1},\nu_{d+1},...,\nu{n}) \leftarrow c_p \vee c_q$ $H_r \leftarrow H_r {\cup}\mathrm{set}(h_r)$
$H_o =$ set of hypercubes of the original relationship $H_r =$ set of all hypercubes consistent with $H_o$ with one extra dimension $n \leftarrow$ dimension of the hypercubes in $H_o$ $H_r \leftarrow$ empty set of hypercubes $H_t \leftarrow$ set of all $2^{\left(2^{n+1}\right)}$ distinct hypercubes of dimension $n+1$ $h_u \leftarrow h_t$ with dimension $\nu_{n+1}$ removed (Algorithm \[algo:removeset\]) $H_r \leftarrow H_r {\cup}\mathrm{set}(h_t)$
$H_p =$ set of hypercubes of the original relationship $H_r =$ set of all hypercubes of the same dimension that are not consistent with $H_p$ $n \leftarrow$ dimension of the hypercubes in $H_p$ $H_r \leftarrow$ empty set of hypercubes $H_t \leftarrow$ set of all $2^{\left(2^n\right)}$ distinct hypercubes of dimension $n$ $H_r \leftarrow H_r {\cup}\mathrm{set}(h_t)$
$H_p =$ set of hypercubes of the first relationship $\Lambda_p =$ list of labels that correlates sets to the dimensions of $H_p$ $H_q =$ set of hypercubes of the second relationship $\Lambda_q =$ list of labels that correlates sets to the dimensions of $H_q$ $\circ =$ the logical operation to be applied to the relationship $H_r =$ set of hypercubes that is consistent with both $H_p$ and $H_q$ $H_v \leftarrow H_q$ with dimension $\lambda_p$ added (Algorithm \[algo:addsetsimple\], \[algo:addsetbetter\]) $H_u \leftarrow H_p$ with dimension $\lambda_q$ added (Algorithm \[algo:addsetsimple\], \[algo:addsetbetter\]) $H_r \leftarrow H_u \circ H_v$
$P_i = $ set of relationships representing the a priori knowledge, $i=1,2,..$. $Q = $ a relation for which it is unknown whether it holds $r = $ [`True`]{}when $P_i$ entails $Q$, [`False`]{}otherwise $P \leftarrow (P_0 \wedge (P_1 \wedge ... ))$ $R \leftarrow (P \nrightarrow Q)$ $r \leftarrow$ [`True`]{} $r \leftarrow$ [`False`]{}
$H_o =$ set of hypercubes of the original relation $H_r =$ set of all hypercubes consistent with $H_o$ with one extra dimension $n \leftarrow$ dimension of the hypercubes in $H_o$ $H_r \leftarrow$ empty set of hypercubes $h_t \leftarrow$ hypercube of dimension $n+1$ with all values set to [`False`]{} $h_t(\nu_1,\nu_2,...,\nu_n,0) \leftarrow c_o$ $h_t(\nu_1,\nu_2,...,\nu_n,1) \leftarrow c_o$ $H_t \leftarrow \mathrm{set}(h_t)$ $h_u \leftarrow h_t$ $h_u(\nu_1,\nu_2,...,\nu_n,0) \leftarrow \mathtt{False}$ $h_v \leftarrow h_t$ $h_v(\nu_1,\nu_2,...,\nu_n,1) \leftarrow \mathtt{False}$ $H_t \leftarrow H_t {\cup}\mathrm{set}(h_u, h_v)$ $H_r \leftarrow H_r {\cup}H_t$
$H_p =$ set of hypercubes of dimension $n_p$ of the original relation $H_q =$ set of hypercubes of dimension $n_q$ where only the last dimension $\nu_{n_q}$ is not present in $H_p$ and the first dimensions $\nu_{1}$ to $\nu_{n_q-1}$ correspond to the first dimensions of $H_p$ $H_r =$ set of hypercubes of dimension $n_p+1$ that is consistent with both $H_p$ and $H_q$ $H_t \leftarrow H_q$ with dimension $n_q$ removed (Algorithm \[algo:removeset\]) $h_t \leftarrow$ hypercube of dimension $n_q$ with all values set to [`False`]{} $h_t(\nu_1,\nu_2,...,\nu_{n_q}) \leftarrow c_t \vee h_q(\nu_1,\nu_2,...,\nu_{n_q})$ $H_r \leftarrow$ empty set of hypercubes $h_r \leftarrow$ hypercube of dimension $n_p+1$ with all values set to [`False`]{} $h_r(\nu_1,\nu_2,...,\nu_{n_p}, 0) \leftarrow True$ $h_r(\nu_1,\nu_2,...,\nu_{n_p}, 1) \leftarrow True$ $h_m \leftarrow h_r$ with dimension $n_p+1$ removed $H_r \leftarrow H_r {\cup}\mathrm{set}(h_r)$ Create $H_r$ through the regular conjunction with algorithm \[algo:binaryoperator\].
$H_p =$ set of hypercubes of the first original relation $\Lambda_p =$ list of labels that correlates sets to the dimensions of $H_p$ $H_q =$ set of hypercubes of the second original relation $\Lambda_q =$ list of labels that correlates sets to the dimensions of $H_q$ $\mathrm{set}(\Lambda_q) \subseteq \mathrm{set}(\Lambda_p)$ $H_r =$ set of hypercubes that is consistent with $H_p$ but not with $H_q$ $H_r \leftarrow$ empty set of hypercubes $h_t \leftarrow h_p$ $h_t \leftarrow h_t$ with dimension corresponding to $\lambda_t$ removed (Algorithm \[algo:removeset\]) $H_r \leftarrow H_r {\cup}\mathrm{set}(h_p)$
Example {#sec:example2}
=======
The method is demonstrated with a simplified application in [[Astro-WISE]{}]{}. We will use the terms *source* for an astronomical object in a catalog, that is, an element in a set. Furthermore we use the term *attribute* for a quantified physical property of that object, for example its mass. [Fig. \[fig:scexamplebare\]]{} shows a simplified part of a dependency graph consisting of four catalogs:
- Catalog $A$ is the base catalog from which the others are derived and contains a finite, known, set of sources. The catalog does not contain all the sources in the Universe.
- Catalog $B$ represents a subset of the sources of $A$. The selection criterion is known, but unevaluated. The contents of $B$ is therefore unknown, and it might even be empty.
- Catalog $C$ represents new attributes of the sources in catalog $A$. That is, the attributes are not in catalog $A$ and have to be derived. The values of these attributes do not have to be calculated or stored in order to create the dependency graph. Catalog $C$ represents the same sources as catalog $A$.
- Catalog $D$ combines the attributes of catalogs $B$ and $C$ and represents an intersection of their sources. The precise contents of this catalog is unknown at its creation, because the selection criterion of $B$ is not yet evaluated and the attributes of $C$ are not yet calculated.
Such a dependency tree would have been created automatically by requesting the attributes from $A$ and $C$ for the sources specified in $B$. The information system will attempt to process this dependency graph in an optimal way. In this case, it will try to limit the processing of catalog $C$ to those sources that are required to process $D$. A priori, the only available information about $D$ is the local knowledge that $D$ has about its relationship with $B$ and $C$. The algorithm is applied to determine that set $D$ represents the exact same sources as $B$. The following steps are performed, visualized in [Fig. \[fig:example2man\]]{}:
- All the hypercubes consistent with the local information are created as relationships $A$ (nonempty), $AB$ (subset), $AC$ (equality) and $BCD$ (intersection).
- The conjunction operator is subsequently applied on these relationships. Dimensions are added to the hypercubes when necessary. The result is a four dimensional relationship between $A$, $B$, $C$ and $D$.
- Relationship $BD$ is created, representing an equality between $B$ and $D$. It is a priori unknown whether this relation holds.
- The material nonimplication operator is applied to relation $ABCD$ and $BD$, resulting in the contradiction ([section \[sec:relasset\]]{}). That is, there are no possible relationships between $A$, $B$, $C$ and $D$—given the a priori knowledge—in which $B$ and $D$ are not equal. Therefore, $B$ and $D$ must represent the same sources.
The information system will optimize the dependency graph using the knowledge that the sources in $B$ and $D$ are equal. In particular, it will evaluate the selection criterion in $B$ and only calculate the attributes of $C$ for those sources. The conclusion that $B$ is equal to $D$ is reached without having to consult any catalog data, which was necessary because the catalog data had not yet been created.
![A simplified part of a dependency graph in [[Astro-WISE]{}]{}. Catalog $A$ contains a known set of sources. Catalog $B$ represents an yet unknown subset of the sources of $A$. Catalog $C$ represents the same sources as $A$ with a different set of attributes. Catalog $D$ represents an intersection of the sources of $B$ and $C$ with the attributes of both $B$ and $C$. []{data-label="fig:scexamplebare"}](scexamplebarem){width="0.4\linewidth"}
![The determination that catalogs $B$ and $D$ of [section \[sec:example2\]]{} ([Fig. \[fig:scexamplebare\]]{}) represent the same astronomical objects. The hypercubes are projected such that a specific set is always oriented in the same direction. A solid circle represents a [`True`]{}value and an open circle a [`False`]{}one. The circle at the top represents the first cell in all dimensions. The four dimensional hypercubes of the relationship between $A$, $B$, $C$ and $D$ are also shown in reduced form as a relationship between $B$ and $D$. $B$ must be equal to $D$ because both hypercubes representing the relationship between $A$, $B$, $C$ and $D$ are consistent with this equality. []{data-label="fig:example2man"}](example2man){width="0.9\linewidth"}
Conclusions {#sec:conclusions}
===========
A novel mechanism for inferring relationships between sets is discussed. It is shown that the use of sets of hypercubes to represent relationships leads to a natural way of inferring a priori unknown relations: deduction is performed by combining incomplete knowledge through the application of logical operators. Algorithms that are suitable for a scalable implementation are presented, including pseudocode.
The novel aspects of the method were demonstrated by its use in [[Astro-WISE]{}]{}, where the sets correspond to catalogs and the elements to astronomical objects. Catalogs can be stored and used in [[Astro-WISE]{}]{}without their content being evaluated. The method is used to acquire knowledge about their contents without requiring direct access to the catalog data. This has lead to design choices in the way catalogs are handled in [[Astro-WISE]{}]{}: catalogs are created such that the knowledge about their relationships is maximized.
An automated way to infer relations between catalogs is essential for the request driven way of processing in information systems such as [[Astro-WISE]{}]{}. The presented algorithms form an excellent method to accomplish this. The method is generic enough to be implemented in any programming language and can be used by any information system.
This research is part of the project “Astrovis”, research program STARE (STAR E-Science), funded by the Dutch National Science Foundation (NWO), project no. 643.200.501. [[Astro-WISE]{}]{}is an on-going project which started from a FP5 RTD programme funded by the EC Action “Enhancing Access to Research Infrastructures”. The authors thank the anonymous reviewers for their insightful comments, which led to a higher quality and better structure of the paper and indirectly to new research directions.
Buddelmeijer, H., Valentijn, E.A.: Automatic optimized discovery, creation and processing of astronomical catalogs. Exp. Astron. (2011), doi:10.1007/s10686-011-9272-z Chaudhuri S. (1998) An overview of query optimization in relational systems. Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems. PODS ’98 34-43 Clarke M. C. (1994) Visualizing boolean operations on a hypercube. Mathematical and Computer Modelling 20(9):97–103 Codd, E.F.: A relational model of data for large shared data banks. Commun. ACM 13, 377–387 (1970) Karnaugh M. (1953) The Map Method for Synthesis of Combinational Logic Circuits. Trans. AIEE pt. I 72(9):593–599 Mwebaze, J., Boxhoorn, D., Valentijn, E.A.: Astro-wise: Tracing and using lineage for scientific data processing. In: Proceedings of the 2009 International Conference on Network-Based Information Systems, NBIS ’09, pp. 475–480. IEEE Computer Society, Washington, DC, USA (2009) Sutcliffe G. (2009) The TPTP Problem Library and Associated Infrastructure. The FOF and CNF Parts, v3.5.0. Journal of Automated Reasoning 43(4):337-362 Venn J.: On the diagrammatic and mechanical representation of propositions and reasonings. Phil. Mag., Series 5 10(59), 1-18 (1880)
[^1]: <http://www.cs.miami.edu/~tptp/>
|
The objective of the proposed studies is to ascertain the separate and combined regulatory effects of endocrine and neural factors on the production and metabolism of calcitonin (CT) and its biosynthetic precursors--procalcitonin (proCT) and a putative prepolcalcitonin (preproCT). For these studies we will employ in vitro preparations of functional C-cells, including organ cultures, suspension cultures, and long-lived monolayer cultures. Our preliminary investigations have shown these C-cell preparations to be exceptionally well suited for regulatory studies of both production and secretion of CT. For instance, we have noted regulatory actions and interactions of enteric polypeptide hormones and vitamin D metabolites and adrenergic and cholinergic agonists on CT production and secretion. Our studies will characterize the separate and combined effects of many neural and endocrine factors on CT secretion and production. We will determine the acute and/or chronic effects of individual and combined regulatory factors on the rates of synthesis, of cleavage, and of degradation of CT, proCT, and preproCT. Relative changes in the rates of these processes will be studied by pulse, pulse-chase, and double-label radioisotopic techniques. Immunoextracted radiolabeled CT moieties chromatography. Regulatory effects on the concentrations of specific CT moieties will be assessed by radioimmunoassay. Effects on the rates of production, cleavage, and/or degradation of CT, proCT, and preproCT will be assessed by incorporation and by decay of radioactivity in specific CT moieties. Understanding the individual and combined regulatory effects of endocrine and neural factors on the rates of synthesis and proteolysis of specific CT moieties will illuminate the metabolic basis for the multifactorial regulation of polypeptide biosynthesis and secretion in eukaryotic cells. |
Analgesic effect of intrathecal ketamine in rats.
The analgesic effect of ketamine hydrochloride 200, 400, 800 and 1600 micrograms kg-1, administered intrathecally in rats, was evaluated using the tail-flick test. A short-lived analgesic effect was demonstrated with the larger doses and this could be abolished by pretreatment with naloxone hydrochloride 200 micrograms kg-1. Intrathecal morphine 100 micrograms kg-1 produced a more profound analgesic effect than intrathecal ketamine 1600 micrograms kg-1. There were three deaths shortly after intrathecal injection of ketamine. Histopathological examination of the spinal cords and nerve roots of these rats revealed the presence of vacuoles in the cells of the posterior root ganglion. Other rats sacrificed for histopathological examination showed no changes attributed to the injectate. |
MOSCOW - The leaders of Russia and Ukraine met for the first time in three years in an attempt to end the conflict in eastern Ukriane. In the wake of that meeting earlier this week in Paris, attention now shifts to renewed peace efforts to stem the violence between Ukrainian government forces and Moscow-backed separatists.
Yet in interviews and comments online, analysts warn that while important gestures were made, Russia and Ukraine remain far apart on key aspects of the five-year conflict, which has killed at least 13,000 people, and shows no signs of abating.
One well-accepted view holds that the mere fact that Monday's Paris talks took place was reason enough for French President Emanuel Macron to smile.
"The fact that we sat side by side today ... is an achievement," Macron told reporters.
The French leader, with backing from German Chancellor Angela Merkel, has been the driving force behind renewed European efforts to persuade Ukraine and Russia to return to the negotiating table.
"Macron showed that Paris is ready to play a bigger role in European politics," Alexey Pushkov, a Kremlin ally and former member of Russia’s Federation Council, wrote in a tweet that praised the meeting.
Left unmentioned? Macron is also seen by Kremlin allies as a rare and recent European voice pushing for renewed detente with Moscow.
Ukraine's President Volodymyr Zelenskiy, German Chancellor Angela Merkel, French President Emmanuel Macron and Russia's President Vladimir Putin attend a joint news conference after a summit in Paris, Dec. 9, 2019.
Zelenskiy vs. Putin
The highest stakes going into the talks, however, belonged to Ukrainian President Volodymyr Zelenskiy.
Analysts wondered how Zelenskiy, a 41-year-old comedy actor elected to the presidency in a stunning landslide victory earlier this year, would fare against a far more seasoned opponent in Russian President Vladimir Putin.
Indeed, in advance of the summit, crowds gathered in Kyiv warning Zelenskiy against appeasing the Kremlin. Protesters held signs saying, "No Capitulation" and "No Red Lines."
The Ukrainian leader seemed to receive the message.
"I felt the whole of the Ukrainian nation with me," Zelenskiy said during a press conference following the talks. "I’m here representing all Ukrainians."
Analysts said Zelenskiy held his own, with neither Russia nor Ukraine gaining the edge in negotiations, which bore signs of a thaw in relations, yet no overt breakthroughs.
"Everyone believed that Putin would be able to prevail over Zelenskiy, that Zelenskiy is no competitor to him," Konstantin Skorkin, a Ukraine specialist at the Carnegie Moscow Center, told VOA.
"But the reality showed that they could talk to each other and their previous telephone communications led to some progress in the peace effort," Skorkin said.
"I think it would be appropriate to be diplomatic as we’ve just started talking. Let’s say for now it’s a draw," Zelenskiy said to journalists.
Putin, more sanguine, allowed that a spate of recent diplomatic initiatives signaled a "warming" in relations.
"All this gives us the grounds to suppose that the process is developing in the right direction," the Russian president said.
For all the diplomatic pleasantries, neither leader appeared to acknowledge the other in public.
Results not talk
For now, the Paris talks yielded the promise of a cease-fire, despite what Russia and Ukraine acknowledge were several previous failed attempts to stop the fighting.
The warring parties will take "immediate measures to stabilize the situation in the conflict area," according to a signed communique.
Equally pressing? An agreement for a mass prisoner swap with the rebels before year’s end.
Beyond a gesture of goodwill to unite families ahead of New Year's, the measure builds on a widely heralded prisoner exchange negotiated between Putin and Zelenskiy in September.
Putin also hinted at a deal to transit discounted Russian gas to, and through, Ukraine to Europe.
French President Emmanuel Macron, second left, Russian President Vladimir Putin, left, German Chancellor Angela Merkel and Ukrainian President Volodymyr Zelenskiy gather for talks at the Elysee Palace, in Paris, France, Dec. 9, 2019.
There was wide agreement, however, that the Paris talks brought little progress to the core issue of the war: the future of the Donbas region in east Ukraine, and the status of two unrecognized "independent republics" in Donetsk and Luhansk.
Prisoner exchanges and other compromises are "peripheral to the conflict, and don't go to the heart of the matter - the heart being the status of the Donbas," wrote Tatiana Stanovaya of Reality of Russian Politics in a Facebook post assessing the Paris negotiations.
"Both sides are confident that they are right and they are not going to retreat. It doesn’t matter who’s right or wrong," Shorkin, of the Carnegie Moscow Center, told VOA.
"Each side is sticking to their position. No one is willing to back down," he said.
Zelenskiy said Kyiv still wants to reestablish full control over Luhansk and Donetsk, the two self-proclaimed independent republics.
Putin also is insisting Ukraine adhere to promises under the so-called Minsk Agreements negotiated under Zelenskiy’s predecessor, Petro Poroshenko.
The Minsk accords, negotiated in 2015 and 2016 with European backing, allow for increased autonomy in the separatists regions, as well as direct talks with the rebels as a precursor to Russia handing over control of the Ukraine-Russian border to Kyiv.
East vs. West
Many in Kyiv argue the Minsk accords give Moscow undue influence over their ambitions to join the European Union and, perhaps, one day NATO.
In Russia, the battle over Ukraine is widely seen as part of the Kremlin’s insistence that Ukraine serve as a buffer state against the alliance’s expansion east toward Russia’s border.
Analysts argue the Minsk agreements also portray Russia as a mediator in the conflict, masking its role as the separatists’ key backer, providing money, soldiers and weapons, facts well documented by independent journalists on the ground.
"Everyone perfectly realizes who these leaders in Luhansk and Donetsk are," Moscow-based political analyst Yuliy Nesnevich told VOA.
"What is the point to come to an agreement with them when it’s clear who really stands behind them? When it’s clear who is the puppet master?" Nesnevich said.
Going forward, the diplomatic calendar is clear.
The so-called Normandy Format quartet of nations reconvenes in four months in Berlin.
Its mission is to assess the Paris agreements and revisit what are seemingly incompatible positions between Moscow and Kyiv.
Whatever progress the parties make may determine the Donbas’ last chance at seeing something resembling peace, analysts said.
Withdrawal from negotiations has "no broad support," Carnegie’s Skorkin said. But the alternative is far messier, he said.
|
Virtual office in Kuwait City, Al Hamra Tower
Al Hamra Tower, 35th floor, East Maqwa, Kuwait City
The Al Hamra Tower business centre occupies the 35th floor of an iconic 80-story skyscraper - the tallest building in Kuwait City - and commands dramatic views of the bay and surrounding areas. The elegant, twisting sculptural form of the Al Hamra Tower dominates the skyline in the downtown East Maqwa district. Inside, the business centre boasts the highest quality finishes, including an impressive 20-metre high reception area and two sky lobbies - one above and one below the centre. Business neighbours include oil, logistics, telecoms and insurance companies. Kuwait is a major crude oil producer (oil represents 56% of GDP) but is working to reduce its reliance on the sector, focusing on growth areas such as financial services, real estate, business services, storage, communication and transport. Kuwait has an advanced transportation network, including multi-lane highways, two commercial ports at Shuwaikh and Shuaiba, and Kuwait International Airport (KIA), which is 16km from the business centre.
Virtual office in Kuwait City, Al Hamra Tower
Al Hamra Tower, 35th floor, East Maqwa, Kuwait City
The Al Hamra Tower business centre occupies the 35th floor of an iconic 80-story skyscraper - the tallest building in Kuwait City - and commands dramatic views of the bay and surrounding areas. The elegant, twisting sculptural form of the Al Hamra Tower dominates the skyline in the downtown East Maqwa district. Inside, the business centre boasts the highest quality finishes, including an impressive 20-metre high reception area and two sky lobbies - one above and one below the centre. Business neighbours include oil, logistics, telecoms and insurance companies. Kuwait is a major crude oil producer (oil represents 56% of GDP) but is working to reduce its reliance on the sector, focusing on growth areas such as financial services, real estate, business services, storage, communication and transport. Kuwait has an advanced transportation network, including multi-lane highways, two commercial ports at Shuwaikh and Shuaiba, and Kuwait International Airport (KIA), which is 16km from the business centre. |
Deacidization is required before a raw natural gas or any other gaseous mixture that contains significant amounts of acid gas, such as hydrogen sulfide (H2S), carbon dioxide (CO2), NOX, SOX, or similar contaminants, can be utilized. The deacidization process reduces the acid gas impurity in the gaseous mixture to acceptable levels. This is commonly done with an amine gas treatment process. Amine gas treatment processes are common in various types of industrial settings, such as refineries, natural gas processing plants, and petrochemical plants. Amine gas treatment processes include the processes utilizing aqueous solutions of amines to remove acid gas, such as H2S and CO2, from natural gases.
A common deacidization process is gas-liquid absorption. Such process typically involves contacting a gaseous mixture containing an acid gas to be removed with an aqueous amine solution, whereby the amine solution is an absorbent that absorbs the acid gas. In industrial settings, the most commonly used amines are alkanolamines, such as monoethanolamine (MEA) and diethanolamine (DEA). The use of the alkanolamine methyldiethanolamine (MDEA) for CO2 separation has recently become notable for use in industrial settings. Diisopropanolamine (DIPA) is currently used in the Sulfinol process and in the SCOT process for Claus plant tail acid gas purification.
In the typical gas-liquid absorption process, after the acid gas is absorbed into the absorbent in an absorption unit, the gas-rich absorbent is sent to a regeneration unit, where the gas-rich absorbent is treated and separated to regenerate the absorbed gas and the gas-lean absorbent. The regenerated gas-lean absorbent is then recycled back into the absorption unit and the acid gas is either collected or discharged, depending on the purpose of the user. In this type of gas-liquid absorption, the regeneration process accounts for greater than 80% of the total energy costs because the entire volume of the absorbent effluent must be regenerated in order to be reused in the absorption unit. In addition, the typical gas-liquid absorption process is limited to the use of an absorbent in the form of one liquid phase. |
Even though a local Fox News reporter raised the story during Tuesday’s White House press briefing, three major news networks ignored the rape of a 14-year-old teenager in Maryland by at least one illegal immigrant, according to a Wednesday report from the Media Research Center.
MRC, a right-leaning media watchdog, noted that Fox News was the first national television network to report on the incident Monday. On Tuesday, a local Fox News reporter brought the crime to White House press secretary Sean Spicer’s attention in front of a crowded room filled with reporters from the major news networks. And yet, ABC, NBC, MSNBC, CNN, and CBS all ignored the story Tuesday night and Wednesday morning.
“So what deserved more attention than the brutal rape of a 14-year-old girl, in her own high school by two men, at least one of which shouldn’t have been allowed into this country?”
More from LifeZette TV
MORE NEWS: Justice Ruth Bader Ginsberg dead
“In fact, the only mention NewsBusters could find of this story on any of these networks were brief reports on the 4 am CNN and CBS early morning shows,” MRC NewsBusters wrote on its site. “So what deserved more attention than the brutal rape of a 14-year-old girl, in her own high school by two men, at least one of which shouldn’t have been allowed into this country?”
As MRC’s report noted, “Apparently ABC’s ‘Good Morning America’ thought a lengthy segment on whether expensive pasta was better than cheaper pasta was more newsworthy.” In addition, the site noted that “over on NBC’s ‘TODAY’ they spent three minutes demonstrating a futuristic car that could be elevated on stilts.”
Do you agree that protesting is acceptable, but rioting is not? Yes No Email Address (required) By completing the poll, you agree to receive emails from LifeZette and that you've read and agree to our privacy policy and legal statement Results Vote
Residents of Maryland’s Montgomery County were outraged following the chilling report of the brutal rape that occurred Thursday in a men’s bathroom in Rockville High School. El Salvadoran Jose O. Montano, 17, and Guatemalan Henry E. Sanchez-Milian, 18, were charged with raping their fellow ninth-grade classmate.
Although authorities confirmed that Sanchez-Milian was an illegal immigrant, they would not confirm Montano’s immigration status because he is a minor. At the time of the rape, Sanchez-Milian was being considered for deportation. U.S. Immigration and Customs Enforcement even released reports showing that Montgomery County had ignored ICE detainer requests.
County school administrators and police held a meeting Tuesday evening with concerned parents and residents to address the issue.
MORE NEWS: ‘The View’ Derails After Kim Klacik Calls Out Joy Behar For ‘Parading In Blackface’
According to Fox News, one parent at the meeting wondered why this meeting occurred five days after the rape and not sooner, as well as the school’s relative lack of communication with the students’ parents. Other parents wanted to know why they had to find out details about the controversy from the media instead of from the school itself.
[lz_related_box id=”511018″]
Other parents brought up the assailants’ immigration status and why a 17-year-old and an 18-year-old were placed in the ninth grade with 14-year-olds. Some people distributed handouts with information about a Supreme Court ruling requiring schools to provide education regardless of immigration status, as well as the county’s decision to avoid asking its public school students about their legal status.
“Why is an 18-year-old man in a class with 13 or 14-year-old girls? Why was his status not known to those folks? Why was he allowed to enter the country after he was picked up for illegally crossing the border — both of them? So there are a lot of questions,” Maryland Gov. Larry Hogan told FOX 5 Tuesday.
“My biggest concern is the Montgomery County School System — and their lack of cooperation and the lack of information they’ve been providing,” Hogan added. “Not only have they refused to provide any information to us, but they’ve refused to provide information to the state Board of Education, which specifically requested more information.” |
Featured Blogger: Emily Michael
This article challenges the idea that a literary crisis is looming over the younger generations. Which is funny considering that each generation does this as they get older, as the author, Bronwyn T. Williams points out. Why do we have this tendency to reminisce about the good ol’ days? Williams breaks it down into cause, reason, cultural capital, and solution.
So, what is the cause to this doomsday feeling for reading and writing? Of course, people always want to blame the teachers. People seem to be critical of anything innovative. Anything new and unfamiliar is like so scary! Pop culture is one of those things that the young people are into that make more seasoned individuals shake their heads. Yet Williams makes a really good point…the generation before them had the same drama about their own children’s literacy. Whaddya know, each generation sparks a new unseen fear of a failing in the education department. And of course, they turned out just fine, duh. Otherwise, they probably wouldn’t have the skills to be complaining about it in the first place. The author seems to think that the adult generation just wants something to cry about. Williams points out that a lot of this crying has to do with anecdotal evidence from the selective memory of the superior adult. I thought it was interesting that popular media likes to stoke the fire of literacy crisis. There are also flaws in these systems such as standardized testing that are poor portrayals of a student’s ability…go figure. So, it seems like the cause of this crisis has more to do with people’s groundless fears. We clearly have some anxieties about the younger generation’s ability to meet our level of literacy and exceed them.
The reason for these anxieties? Competitiveness in the market, status, and privilege. As a society, we somehow fear that we will fail the economic market if our children do not do exactly what we did. Yet, as the author points out, the economy has done nothing but thrive. So who exactly has these anxieties? Of course, it would be the middle class. They’re the ones who think they have the most to lose. Like yeah, rich people don’t have to worry about anything. They will private tutor the crap out of their kids because they can afford it. Unfortunately, the “poor” don’t usually get much say in any matter so the complaining isn’t from their end. Yet, why does the middle class want to see students as struggling? How does this perception of students affect the way we teach them?
It all comes down to dun dun dun CULTURAL CAPITAL. You might be wondering what the hell that is. Well, if literacy is more or less perceived as power in the eyes of the middle class, then a loss of literacy is like losing power. Literacy is a tool to be used to gain access to different classes. Yet, it’s interesting that only certain literacies are considered valuable in our culture. Those that are used in middle and upper classes are what matter…apparently. It is no secret that students these days are great at communicating in other ways such as online or through text messaging. For some reason those don’t count though? The whole agenda is very elitist in my opinion. Why is it that literacy only consist of the reading of “great books” and how does that make them a better person? Because being cultured equals status for the middle class. The middle class has the most to lose because they know that they need this edge for a white collar job. Williams makes an interesting point in saying that the middle class does not want to necessarily inherit MORE wealth but simply imitate the behavior of the upper class. Unfortunately having speech or language that is not considered “conventional” is considered to be of the lower class and thus anyone who uses it loses economic opportunities??? Wack. So, if someone uses unconventional language then they could potentially fall into the lower class though I’m not sure that’s how it works but cool. I thought it was surprising when Williams said, “Middle class identity is not primarily about economic status. Middle class identity…is the ability to display certain kinds of cultural capital.” Again, we go back to this fear of the unfamiliar. Language that is not within the conventional is considered a threat to this capital we’ve been talking about. What even is grammar and who decides how it is used? Is language not constantly changing anyway? But really it’s how you use it in a given situation. The context is what is important. It is less about grammar and more about how you convey meaning in a clear and structured manner.
The solution to this madness? It is really important to just teach students how language, culture, and identity work as a unit. That way a student can pull from their learning experiences to utilize them in any context. In this sense, knowledge really is power.
In a small group discussion, we wondered why students and instructors have different views of what reading should be. We wondered why there was a disconnect and whose fault is it? The educators? The system itself? The government?
Then we started to ask ourselves, why don’t we like reading? Perhaps we don’t like taking notes on EVERYTHING we read. It takes the fun out of it. We like reading for the pleasure of it not picking it apart until there is nothing left but the bone. Because there is a difference between article reading and novel reading. Reading an article is technical reading, reading for direct information. Novels are meant to be read for the pleasure, the thrill, the adventure.
But when we thought about it…aren’t BuzzFeed articles meant to do both? Scrolling through Facebook, we come across articles that pique our interest and we read them because we want to, not because we have to.
But what do the professors want exactly? They want us to read and analyze a text but can’t we do that in genres we enjoy? We all have books we want to read, but the difference is the teachers don’t want us to read that. We thought that while we want to read one thing, teachers want to read another so we can talk about it.
One classmate suggested that, growing up, we are not told that reading is important. The thing we thought was interesting is that we are not explicitly told we will be reading our whole life. Books are shoved down students throat without making books enjoyable and we aren’t taught how to read just anything for fun.
Another classmate reflected on teachers from their past who assigned books that were not comprehensible to them either. We wondered why a teacher would pick a book that they don’t enjoy either. If they don’t enjoy teaching it, neither will the students enjoy learning it. It is important to not only to be taught reading but to enjoy reading. Sadly, school doesn’t teach you how to want to read on your own. Is there really a purpose to reading canonical texts? It seems to be more about the school district wanting to assign something because it’s what they think they are “supposed to” rather than pick up books you can learn from and enjoy.
This tangent made us think of Accelerated Reading. Like good god what is that even? Whose genius idea was that? Reading as a point system and then taking a quiz to prove you read it…yeah, I remember finding ways to cheat on those tests. When we talked about it it made me wonder how they decided how much a book was worth. From the beginning, we are taught that books have a certain worth. And some books are worth more than others. But why??? Really. Why is some reading worth more than others?
In a class discussion we literacy as a skill versus a practice. And that was sooooo confusing. Why is a book club literary practice and not a skill? If practice is when you apply your skill…then just reading in general and learning the alphabet is the skill. But isn’t reading a practice of the alphabet and phonics? This brought us back to cultural capital. What is it?? Is it about respectability? If we read certain books are we going to be more respected. Or maybe it’s about how useful you can be to a group of people…how much knowledge can be exchanged? We realized this could be related to performance value, which interestingly enough led to a discussion about Sparknotes because…because it just did so try and follow:
Why does it matter if we use Sparknotes and can basically fake cultural capital? It is a text that helps you do work with other texts. What’s wrong with that? When thinking about the exchange value, Sparknotes is a form of literacy with value of exchange. You can obtain textual information and finish multiple books by having it broken down into the most important components. However, we realized that most text simply cannot be replaced with this medium. Some works such as Shakespeare are poorly translated. You can use Sparknotes to have the plot but what makes Shakespeare, Shakespeare is his language. That cannot be conveyed through Sparknotes.
When we think of education nowadays where we spit out any paper for a grade, it sucks the freakin’ joy out of reading! The class is being overwhelmed with the sheer amount of reading material. How can we be expected to read X novels at the same time? Unfortunately, Sparknotes only gives you one version of the text and that is the Sparknotes version. Each person brings their own flavor or pizazz to their reading. Actually reading the text changes your relationship to with that text.
Of course this leads to many more questions. Why not just watch the movie? Why don’t we let students choose in high school and then introduce canonical novels in college? Will these kinds of questions ever have answers? I don’t think there is a right answer. But if we want to encourage students to enjoy reading, things will have to change.
Author Bio: Emily is a fourth year English Studies major at Chico State working towards her bachelor’s degree. She transferred to Chico State from Merced Community College with an Associate of Arts degree in Communication Studies. Traveling and exploring new ideas are important to her, which is why she studied abroad in London for a month in a faculty-led program. She also enjoys reading “trashy” novels, drinking coffee, hiking new trails, and cuddling with her dog. |
Q:
How to wait for asynchronous http subscription to complete in multilevel nested function
I am new to Rxjs. I am trying to implement a canActivate guard for my nativescript-angular app. Basically, if the user has JWT token in the storage, it will try to check for the JWT validity from the server, and land on the homepage if the token still valid, or redirect to the login page if its invalid. The following code works fine when the server is up, however, when the server is down, it will land on an incomplete homepage because data is not available to fetch from the server. This happen because the synchronous if(this.authService.isLoggedIn()) do not wait for the asynchronous http call and return true (code below). I want it to redirect to login page instead of the homepage by blocking when the server is down, I have tried various ways (even refactoring the code) but none of them works. This and this are quite similar to my case, but the solutions are not helpful. Here is my code:
Edit:
auth.service.ts (Updated)
import { getString, setString, remove } from 'application-settings';
interface JWTResponse {
status: string,
success: string,
user: any
};
export class AuthService {
tokenKey: string = 'JWT';
isAuthenticated: Boolean = false;
username: Subject<string> = new Subject<string>();
authToken: string = undefined;
constructor(private http: HttpClient) { }
loadUserCredentials() { //call from header component
if(getString(this.tokenKey)){ //throw error for undefined
var credentials = JSON.parse(getString(this.tokenKey));
if (credentials && credentials.username != undefined) {
this.useCredentials(credentials);
if (this.authToken)
this.checkJWTtoken();
}
}
}
checkJWTtoken() {
this.http.get<JWTResponse>(baseURL + 'users/checkJWTtoken') //call server asynchronously, bypassed by synchronous code in canActivate function
.subscribe(res => {
this.sendUsername(res.user.username);
},
err => {
this.destroyUserCredentials();
})
}
useCredentials(credentials: any) {
this.isAuthenticated = true;
this.authToken = credentials.token;
this.sendUsername(credentials.username);
}
sendUsername(name: string) {
this.username.next(name);
}
isLoggedIn(): Boolean{
return this.isAuthenticated;
}
destroyUserCredentials() {
this.authToken = undefined;
this.clearUsername();
this.isAuthenticated = false;
// remove("username");
remove(this.tokenKey);
}
clearUsername() {
this.username.next(undefined);
}
auth-guard.service.ts
canActivate(route: ActivatedRouteSnapshot,
state:RouterStateSnapshot): Observable<boolean> | Promise<boolean> | boolean{
this.authService.loadUserCredentials(); //skip to next line while waiting for server response
if(this.authService.isLoggedIn()){ //return true due useCredentials called in the loadUserCredentials
return true;
}
else{
this.routerExtensions.navigate(["/login"], { clearHistory: true })
return false;
}
}
app.routing.ts
const routes: Routes = [
{ path: "", redirectTo: "/home", pathMatch: "full" },
{ path: "login", component: LoginComponent },
{ path: "home", component: HomeComponent, canActivate: [AuthGuard] },
{ path: "test", component: TestComponent },
// { path: "item/:id", component: ItemDetailComponent },
];
Edit2:
I tried these code:
auth-guard.service.ts
canActivate(route: ActivatedRouteSnapshot,
state:RouterStateSnapshot): Observable<boolean> | Promise<boolean> | boolean{
this.authService.loadUserCredentials();
if(this.authService.isLoggedIn()){
console.log("if");
return true;
}
else{
console.log("else");
this.routerExtensions.navigate(["/login"], { clearHistory: true })
return false;
}
}
auth.service.ts
async checkJWTtoken() {
console.log("checkJWTtoken1")
try{
console.log("try1")
let res = await this.http.get<JWTResponse>(baseURL + 'users/checkJWTtoken').toPromise();
console.log("try2")
this.sendUsername(res.user.username);
console.log("try3")
}
catch(e){
console.log(e);
this.destroyUserCredentials();
}
console.log("checkJWTtoken2")
}
// checkJWTtoken() {
// this.http.get<JWTResponse>(baseURL + 'users/checkJWTtoken')
// .subscribe(res => {
// // console.log("JWT Token Valid: ", JSON.stringify(res));
// this.sendUsername(res.user.username);
// },
// err => {
// console.log("JWT Token invalid: ", err);
// this.destroyUserCredentials();
// })
// }
and here is the console output:
JS: Angular is running in the development mode. Call enableProdMode() to enable the production mode.
JS: checkJWTtoken1
JS: try1
JS: if
JS: ANGULAR BOOTSTRAP DONE. 6078
JS: try2
JS: try3
JS: checkJWTtoken2
Edit3:
tsconfig.json
{
"compilerOptions": {
"module": "commonjs",
"target": "es5",
"experimentalDecorators": true,
"emitDecoratorMetadata": true,
"noEmitHelpers": true,
"noEmitOnError": true,
"lib": [
"es6",
"dom",
"es2015.iterable"
],
"baseUrl": ".",
"paths": {
"*": [
"./node_modules/tns-core-modules/*",
"./node_modules/*"
]
}
},
"exclude": [
"node_modules",
"platforms"
]
}
Please advise and thanks in advance.
A:
You could modify your service to make the checkJWTToken wait for http call to complete before returning
import 'rxjs/add/operator/toPromise';
//...
async checkJWTtoken() {
try
{
let res = await this.http.get<JWTResponse>(baseURL + 'users/checkJWTtoken').toPromise(); //call server synchronously
this.sendUsername(res.user.username);
}
catch(e)
{
console.log(e);
this.destroyUserCredentials();
}
}
Edit When using async/await, the code just 'waits' where you use await, which in within the checkJWTToken method. BUt the code from the parent execution continues as normal
You need to use async/await up the call chain, u to where you want to really wait (which in in canActivate)
guard
async canActivate(...) {
//..
await this.authService.loadUserCredentials();
service
async loadUserCredentials(){
//...
await this.checkJWTtoken();
async checkJWTtoken() {
//...
//let res = await this.http.get<JWTResponse>(baseUR
I created a stackblitz demo
|
Internet, mobile communications, navigation, online gaming, sensing technologies and large scale computing infrastructures have produced large amounts of data sets every day. Big Data is data that is beyond the processing capacity of conventional database systems and analyzing capacity of traditional analyzing methods due to its large volume and fast moving and growing speed. More companies now rely on Big Data to make real-time decisions to solve various problems. Current methods involve utilizing a lot of computational resources, which are very costly, yet still may not satisfy the needs of real-time decision making based on the newest information, especially in the financial industry. How to efficiently, promptly and cost-effectively process and analyze Big Data presents a difficult challenge to data analysts and computer scientists.
Processing Big Data can include performing calculations on multiple data elements. When performing statistical calculations on Big Data, the number of data elements to be accessed may be quite large. For example, when calculating simple linear regression coefficients a (potentially large) number of data elements may need to be accessed.
The difference between processing live data stream and streamed Big Data is that when processing streamed Big Data, all historical data elements are accessible, and thus it may not need to create a separate buffer to store newly received data elements.
Further, some statistical calculations are recalculated after some data changes in a Big Data set. Thus, the (potentially large) number of data elements may be repeatedly accessed. For example, it may be that simple linear regression coefficients are calculated for a computation set and the computation set includes n pairs of data elements of a Big Data set stored in storage media. As such, every time an existing pair of data elements (one data element from an independent variable and the other from a dependent variable) to be removed from the computation set and a pair of data elements to be added to the computation set are accessed or received, the to-be-removed pair of data elements is removed from the computation set and the to-be-added pair of data elements is added to the computation set. All 2n data elements in the computation set are then accessed to re-estimate simple linear regression coefficients.
As such, each pair of data elements remains in the computation set for n simple linear regression coefficient calculations before it is aged out of the computation set. Accordingly, each pair of data elements is read from the buffer and used n times. Performing statistical calculations on streamed data elements this way is time consuming and is an inefficient use of resources. When performing simple linear regression coefficient calculation on all 2n data elements all the 2n data elements in the computation set will be visited and used.
Depending on necessity, the computation set size n may be extremely large, so the data elements in a computation set may be distributed over a cloud comprising hundreds of thousands of computing devices. Re-performing simple linear regression coefficient calculation in traditional ways on a Big Data set after some data changes results in slow response and significant waste of computing resources. |
Israeli soldiers shoot dead four Palestinian attackers in West Bank: army
2 Min Read
Masked young Palestinians loyal to Hamas take part in rally in Khan Younis in the southern Gaza Strip January 7, 2016. REUTERS/Mohammed Salem
JERUSALEM (Reuters) - Israeli security forces on Thursday shot dead four Palestinians who launched two separate stabbing attacks in the occupied West Bank, the military said, as a surge in street violence entered its fourth month.
The first attack occurred at Gush Etzion Junction, the scene of many similar recent incidents. Three Palestinians attacked a group of soldiers with knives, the army said in a statement, and the “forces thwarted (the) attack and shot (the) assailants”.
Shortly after, at an Israeli checkpoint near the city of Hebron, a Palestinian tried to stab a soldier and was shot and killed, the army said.
No soldiers were injured in either incident.
Stabbings, car-rammings and shootings by Palestinians have killed 21 Israelis and a U.S. citizen since the start of October.
Israeli forces or armed civilians have killed at least 137 Palestinians in the same period, 87 of whom authorities described as assailants. Most of the others have been killed in clashes with security forces.
Commentators say the surge in attacks has been fueled by the collapse of U.S.-sponsored peace talks in 2014, the growth of Jewish settlements on land Palestinians want for a future state and Islamist calls for the destruction of Israel.
Also stoking the violence has been Muslim opposition to increased Israeli access to Jerusalem’s al Aqsa mosque complex, which is the third holiest site in Islam and is also revered in Judaism as the location of two biblical temples. |
The component of Carica papaya seed toxic to A. aegypti and the identification of tegupain, the enzyme that generates it.
As Aedes aegypti transmits the etiologic agents of both yellow and dengue fever; vector control is considered essential to minimise their incidence. The aim of this work was to identify the component of Carica papaya seed toxic to A. aegypti, and the identification of tegupain, the enzyme that generates it. Aqueous extracts (1%, w/v) of the seed tegument and cotyledon of C. papaya are not larvicidal isolately. However, a mixture of 17μgmL(-1) tegument extract and 27μgmL(-1) cotyledon extract caused 100% larval mortality in a bioassay. The mixture was no longer larvicidal after the tegument extract was pre-treated at 100°C for 10min. The enzyme tegupain efficiently hydrolysed the substrate Z-Phe-Arg-pNan (Km 58.8μM, Kcat 28020s(-1), Kcat/Km 5×10(8)M(-1) s(-1)), and its activity increased with 2mM dithiothreitol (DTT), at 37°C, pH 5.0. The chelating agent EDTA did not modify the enzyme activity. Inhibition of tegupain by cystatin (Kiapp 2.43nM), E64 (3.64nM, 83% inhibition), and the propeptide N-terminal sequence indicate that the toxic activity is due to a novel cysteine proteinase-like enzyme, rendered active upon the hydrolysis of a cotyledon component of C. papaya seeds. |
By Arab News
By Rashid Hassan
Saudi Arabia and Greece ushered in a new era of relations as King Salman and Greek President Prokopis Pavlopoulos held bilateral talks to enhance cooperation.
“I consider this a historic visit,” Greek Ambassador Polychronis Polychroniou told Arab News on the final day of the visit. “Our two people enjoy friendly relations and share the same principles on almost every issue.”
He added: “During this visit, the president met the Custodian of the Two Holy Mosques as well as many senior officials, and the meetings were very productive, paving the way for a new era in our already close relations.”
However, he pointed out that visits at the top level are needed to further enhance cooperation and “specify certain areas where we can work together even more closely.”
The envoy said: “We signed two agreements, one on technological and scientific cooperation, and the other in the field of satellite technology and its applications.”
In addition, a joint ministerial committee between the two governments was convened, giving the two sides the opportunity to agree on many pending issues, he said.
Ilias Andronikos Klouvatos, deputy head of mission at the Greek Embassy, told Arab News that on Wednesday, the president met Gulf Gulf Cooperation Council (GCC) Secretary-General Abdullatif Al-Zayani. The two leaders discussed relations with Greece and various ways to enhance cooperation between the EU and the GCC.
The president and his accompanying delegation also visited the King Abdulaziz City for Science and Technology (KACST), where he met KACST President Prince Turki bin Saud bin Mohammed. The president was briefed on activities and research projects.
An agreement on satellite applications was signed between Prince Turki and Greek Minister of Foreign Affairs Nikolaos Kotzias. Prince Turki and George Katrojals, Greek minister of state for international economic relations and foreign trade, signed another accord for scientific and technical cooperation. |
Genio e fantasia se ne sono andati in buona quantità con Andrea Pirlo e Carlos Tevez. Una bella "pezza", comunque, la Juventus l’ha messa acquistando Paulo Dybala. E nel segno del ricambio generazionale va interpretata pure la conferma del 19enne Kingsley Coman, "giocatore che resta sicuramente con noi", fanno sapere da corso Galileo Ferraris.
RESPINTO IL BAYERN — Il baby prodigio francese è nei cuori del club e di Massimiliano Allegri. A dimostrarlo concretamente c’è il recente "no, grazie" indirizzato al Bayern Monaco. Un no che pesa 15 milioni di euro, questa è infatti la cifra offerta dal prestigioso club tedesco a Marotta. Pep Guardiola sta facendo i conti con il delicato momento di Ribery, tormentato da grossi problemi fisici, muscolari in particolare. Il 32enne francese è infatti fuori da marzo, e complessivamente nell’ultima stagione ha giocato solo 1501’, segnando comunque nove gol. Fra l’altro, pure Robben ha mostrato qualche scricchiolio di troppo. E che Guardiola pensi a Coman per rinfrescare le fasce bavaresi la dice lunga sulla considerazione goduta a livello internazionale dal talentino ex Psg, pescato a costo zero dalla Juventus.
CALCIOMERCATO Rumors, trattative e affari fatti: tutte le notizie di mercato — Prima del Bayern, altri club hanno bussato alla porta di Marotta per Coman: Bologna e Sassuolo su tutti, poi anche alcune società francesi. Il ragazzo chiede maggiore spazio, in un primo momento si era pensato al prestito, ma il no al Bayern cambia di parecchio le carte in tavola. D’altronde, al momento Massimiliano Allegri dispone là davanti di prime e seconde punte, mancano invece un esterno offensivo e un trequartista puro, ruoli che Coman ricopre con una certa naturalezza.
LEGGI L'ARTICOLO COMPLETO DI MIRKO GRAZIANO SULLA GAZZETTA IN EDICOLA OGGI |
825 F.2d 429
44 Fair Empl.Prac.Cas. 657,44 Empl. Prac. Dec. P 37,324, 263 U.S.App.D.C. 292,56 USLW 2114
Alfred U. McKENZIE, et al.v.Ralph E. KENNICKELL, Jr., Public Printer, Appellant.
No. 84-5785.
United States Court of Appeals,District of Columbia Circuit.
Argued March 27, 1985.Decided July 31, 1987.As Amended July 31, 1987.
John D. Bates, Asst. U.S. Atty., with whom Joseph E. diGenova, U.S. Atty., Royce C. Lamberth and R. Craig Lawrence, Asst. U.S. Attys., Washington, D.C., were on brief, for appellants.
Douglas L. Parker, with whom Roderic V.O. Boggs, Washington, D.C., was on brief, for appellees. Elliot M. Mincberg, Washington, D.C., also entered an appearance for appellees.
Before ROBINSON, EDWARDS and SCALIA*, Circuit Judges.
Opinion for the Court filed by Circuit Judge SPOTTSWOOD W. ROBINSON, III.
SPOTTSWOOD W. ROBINSON, III, Circuit Judge:
1
We are asked to determine the propriety of an order entered by the District Court in the remedial phase of an employment discrimination suit against the United States Government Printing Office (GPO).1
2
On January 12, 1977, the District Court found GPO in violation of Title VII of the Civil Rights Act of 19642 for engaging in racially discriminatory hiring and promotional practices in its offset press section.3 The court issued a final order on January 30, 1981, providing classwide relief, including goals and timetables for hiring and promotion over a period of four years.4 Both rulings were appealed to and substantially affirmed by this court on July 27, 1982.5
3
The appeal now before us arises from a subsequent order of the District Court, entered September 19, 1984, in response to a motion by the plaintiff class to compel compliance with the terms of that court's 1981 order. The 1984 order, in relevant part,6 required GPO to select a member of the plaintiff class to fill the position of head offset pressman on the second shift in the offset press section.7 GPO protests this directive on the ground that it is inconsistent with this court's 1982 decision respecting the District Court's 1981 order.8 We agree, and we reverse.I
4
As the history of this litigation has elsewhere been recounted in some detail,9 we need focus only on the remedial components of the 1981 order. That order awarded backpay to victims of racial discrimination at GPO, as well as several types of injunctive relief pertinent to disposition of this appeal. The order mandated various alterations in GPO's training and promotional practices, including modifications in training programs through which employees advance to journeyman, uprate, and supervisory positions in the offset press section, as well as new procedures by which journeymen would be selected for promotion to uprate and supervisory positions. These changes were designed to rectify the discriminatory bias pervading former selection and promotional procedures.10 In addition, to ameliorate the continuing effects of GPO's past discrimination, which over the years had produced a racially stratified workplace, the order set goals and imposed timetables for promotion of members of the plaintiff class. For promotions to uprate positions and the positions of group chief and assistant foreman, the goal was 60 percent occupancy of those positions by members of the plaintiff class by January 1, 1985, four years from the date of the order;11 and for foreman positions the goal was 50 percent.12 These percentage goals were adopted by the District Court in light of the composition of the applicant pools for the positions.13
5
Finally, in an effort to ensure that GPO would achieve these goals within the four-year period, the order established mandatory selection rates. For promotions to all positions except foreman, GPO was to fill 80 percent of vacancies occurring after the date of the order with members of the plaintiff class.14 This rate was to be met by the end of the second year after the date of the order, and by the end of each succeeding two-year period, until the percentage goals for the positions were achieved. If GPO failed to meet the 80 percent selection rate by the end of the first two-year period, the selection rate was to increase to 90 percent.15
6
GPO appealed to this court from both the remedial provisions of the order and the finding of racial discrimination on which they were predicated. In 1982, we affirmed the District Court's finding, concluding that the plaintiffs' evidence was "overwhelming"--ample to justify summary judgment on the ground that the offset press section had discriminated in selecting journeymen and in promotions to uprate and supervisory positions.16 Only with respect to alleged discrimination in the selection of journeymen after 1971 was the evidence deemed insufficient to support the award of summary judgment.17 The remedial portions of the 1981 order were affirmed in most respects, this court concurring with the District Court that "sweeping changes were needed in promotional practices at OPS,"18 and noting that in 1981, four years after the finding of discrimination, still no black employees held foreman or assistant foreman positions in the offset press section.19
7
We also approved the following revised promotional procedures imposed by the 1981 order. For each uprate or supervisory vacancy, GPO is to convene a five-member selection panel, of which at least three members must be black. This panel is to select a group of "best qualified" employees on the basis of job-related performance standards. From this group, five applicants are to be nominated in accordance with an evaluation and selection guide furnished by GPO. The five names are to be certified to the superintendent of the offset press section, who may select any one of the five to fill the vacancy.20
8
We likewise affirmed the promotional goals set by the District Court, cautioning, however, that pursuit of them "should be as limited as needed to end discrimination effectively, targeted at the specific discrimination to be eradicated as consistent as possible with the legitimate concerns of others, and if possible supplanted by other forms of relief."21 In light of these concerns, we judged the 60 and 50 percent goals of the order appropriate:
9
They were selected after consideration of the emerging employment picture at [the offset press section]: by 1978, nearly half of the journeymen and one-third of the uprates were blacks ... and these numbers will increase as [the section] selects from within. The goals are of relatively short duration--four years--and the district court hopefully will not be long in the business of supervising [the section's] efforts to mend its ways. The goals are targeted precisely at the discrimination found: that [the section] has been especially dilatory in promoting blacks to positions beyond the level of journeyman. Finally, the goals are flexible: they will permit [the section] to make employment decisions that accommodate the interests of its other employees, while moving expeditiously to end discrimination.22
10
Although we approved the revised promotional procedures and goals mandated by the 1981 order, we held that the selection rates ordered by the District Court were unwarranted. We concluded that the promotional procedures and goals set forth in the order were sufficient to cure the continuing effects of discrimination at GPO: "[t]o mandate timetables in addition," we said, "is to place [the offset printing section] in a straight jacket that is quite likely unnecessary."23 More importantly, we observed, the goals we approved would allow GPO flexibility in complying with the relief order, whereas the selection rates in question "would reduce [the section's] flexibility in meeting the needs of all its employees."24 We therefore directed that the selection rates be deleted and, with these modifications, implementation of the order proceeded.
II
11
In August, 1984, at a time when GPO's ability to meet its remedial goals by the deadlines specified appeared doubtful, the plaintiff class moved to compel compliance with the terms of the 1981 order.25 The immediate impetus for the motion was GPO's announced intention to promote a white employee from offset pressman to head offset pressman on the second shift, an uprate position, despite the availability of a black "best qualified" candidate for the job.26 The plaintiffs pointed out that as of August 8, 1984, only 45 percent of those in uprate positions were black, considerably short of the 60 percent goal to be met by January 1, 1985.27 The plaintiffs questioned GPO's good-faith effort to meet the 60 percent goal in timely fashion, and moved to have a class member placed in the vacancy.28
12
In response, GPO insisted that it had been acting in good faith. It pointed to the fact that of the 28 promotions to uprate positions since promulgation of the 1981 order, 22, or 78.6 percent, had gone to members of the plaintiff class. If supervisory positions were considered, GPO observed, the percentage would be even higher, since 33 of 40 promotions, or 82.5 percent, went to class members.29
13
Notwithstanding GPO's assertion of good faith efforts to comply with its remedial obligations, the District Court's 1984 order enjoined GPO to select a member of the plaintiff class to fill the available position.30 It is this order whose propriety GPO contests in the instant appeal. GPO complied with the 1984 order but, in consequence of candidate attrition, ultimately promoted a class member not on the original list of "best qualified."
14
In accordance with the terms of the 1981 order, a five-member selection panel certified to the superintendent of the offset press section five candidates as "best qualified." Two of the five were black. Before the 1984 order issued, one of the black candidates accepted promotion to a different position as head offset pressman at GPO.31 The superintendent chose a white candidate for promotion, prompting the plaintiffs' motion for compliance and the issuance of the 1984 order directing promotion of a member of the plaintiff class. After that order issued, the other black candidate declined the head offset pressman job in order to accept promotion to second web offset pressman.32 Because no class member remained in the original group of "best qualified" selectees, a class member not originally on the "best qualified" list was certified to and ultimately selected by the superintendent.33
III
15
We conclude that the District Court's 1984 order, so far as it requires selection of a class member for promotion,34 is inconsistent with this court's 1982 decision. Clearly, a concern that GPO would not attain the goals of the 1981 order within the deadlines specified moved the District Court to intervene in GPO's promotional process, but anticipated delay alone was not sufficient ground therefor. The court was obliged to ascertain the cause of the projected delay and to determine whether the 1981 order, as modified by this court, left it free to intervene in such circumstances. Our review convinces us that the requisite authority was lacking.
16
As the plaintiff class acknowledges, GPO's "failure to meet the uprate goal has occurred primarily because GPO's projections about the frequency of vacancies, on which plaintiffs had based their request for a four-year time period, proved inaccurate."35 This court's decision respecting the 1981 order was infected with the same faulty estimate. The court struck the mandatory selection rates from the order, reasoning that the newly-mandated promotional procedures and goals were sufficient in and of themselves to achieve timely compliance with remedial objectives within the designated four-year period. Indeed, the court was of the view that were GPO required to make promotions in accordance with the 80 percent selection rate specified in the order, "depending on the numbers of vacancies within [the offset press section, it] might overshoot the goals."36
17
As it developed, the assumption that the promotional goals for uprate positions could be reached within the four-year period, without mandatory selection rates akin to those originally incorporated into the 1981 order, proved fallacious. Not only did the rate of job vacancies fail to accelerate realization of the goals, but it in fact impeded their timely achievement.
IV
18
Despite GPO's compliance efforts--particularly its promotion of class members to uprate positions at a frequency approaching the 80 percent selection rate struck from the 1981 order37--attainment of the uprate promotional goals within the four-year period appeared unlikely at the time of the 1984 order. This single circumstance did not, however, justify renewed intervention on behalf of the plaintiff class. This court spurned the selection rates mandated by the 1981 order in the belief that they were unnecessary to timely achievement of the employment goals, but made equally clear the independent concern that such rates would "reduce [GPO's] flexibility in meeting the needs of all its employees."38 Given the clearly expressed admonition that any injunctive relief must afford GPO "flexibility in meeting the needs of all its employees,"39 GPO's impending failure to meet timely the goals of the 1981 order did not warrant the action the District Court took. While the rate of job turnover diminished promotional opportunities for members of the plaintiff class, it similarly affected promotional opportunities for other employees, and an increase in the rate at which class members would secure promotions would just as surely correspondingly diminish such opportunities for others. In light of the fact that GPO was already promoting class members at a rate that this court explicitly declined to require, the District Court overstepped its authority when it dictated a selection on terms still more stringent. By treating the remedial goals and timetables of the 1981 order as unyielding, the District Court's 1984 order undeniably imposed a "straight-jacket"40 on a GPO promotion decision at a time when more flexibility, not less, was needed. Absent a finding of bad-faith resistance to that order's unmodified injunctive provisions that might justify special remedial measures, we hold the District Court's 1984 order inconsistent with our 1982 mandate.41
19
We find admirable the District Court's concern that relief from wrongdoing be efficacious, but view it as inapposite in the circumstances of this case. Lacking in the 1984 order is a recognition that invocation of Title VII remedies may well necessitate a degree of flexibility. The District Court measured compliance with its 1981 order in overly rigid terms, limiting its focus, it would seem, to the interests of the plaintiff class. In short, the court overlooked the traditions of equity that supply the foundation principles for awards of Title VII relief.
20
As the Supreme Court has now repeatedly counseled, courts fashioning Title VII remedies must endeavor to accommodate the interests of innocent third parties when vindicating the rights of victims of discrimination. In Teamsters v. United States,42 the Court made this plain:
21
Although not directly controlled by the Act, the extent to which the legitimate expectations of nonvictim employees should determine when victims are restored to their rightful place is limited by basic principles of equity. In devising and implementing remedies under Title VII, no less than in formulating any equitable decree, a court must draw on the "qualities of mercy and practicality [that] have made equity the instrument for nice adjustment and recognition between the public interest and private needs as well as between competing private claims."... Especially when immediate implementation of an equitable remedy threatens to impinge upon the expectations of innocent parties, the courts must "look to the practical realities and necessities inescapably involved in reconciling competing interests," in order to determine the "special blend of what is necessary, what is fair, and what is workable."43
22
More recently, in Sheet Metal Workers International Association v. EEOC,44 the Court sustained the remedial use of hiring goals when designed and enforced with a tempering measure of flexibility. A plurality of the Court, speaking through Justice Brennan, emphasized that the trial court had twice adjusted the deadline for achievement of the goals; had modified their terms to account for the fact that economic circumstances not within the defendant union's control might have prevented it from realizing those objectives; and had shown itself disposed "to accommodate legitimate explanations for the [union's] failure to comply with the court's orders."45 Furthermore, the plurality stressed, "we think it significant that ... the membership goal [does not] 'unnecessarily trammel the interests of white employees.' "46 These same concerns were substantially reiterated in a concurring opinion by Justice Powell.47 A majority of the Court thus approved the use of hiring goals by courts fashioning Title VII remedies when they are imposed flexibly and with due regard for the interests of other employees.
23
Last term in United States v. Paradise,48 the Court again sanctioned the use of employment goals in fashioning Title VII remedies. Upon a finding that the Alabama Department of Public Safety had systematically discriminated in hiring and promoting state troopers, the Court affirmed an order providing that qualified members of the plaintiff class were to be promoted on a one-for-one basis with nonvictim employees until a goal of 25 percent was attained. The order in question was conditional in its application, to be enforced "only if there were qualified black candidates, if the rank were less than 25% black, and if the Department had not developed and implemented a promotional plan without adverse impact for the relevant rank."49 Although the department had long resisted compliance with prior remedial orders, the Court repeatedly referred to the conditional features of the order. A plurality of the Court, speaking through Justice Brennan, described the one-for-one promotional requirement--in effect, a 50 percent selection rate--as "flexible, waivable, and temporary in application,"50 and "hedged about with specific qualifying measures designed to prevent any unfair impact that might arise from rigid application."51 The plurality concluded that "the District Judge properly balanced the individual and collective interests at stake, including the interests of the white troopers eligible for promotion, in shaping this remedy."52 Justice Powell, concurring, noted that the "District Court's order contains significant elements of flexibility and fairness," and pointed out that the impact of the order on nonvictim employees "is likely to be relatively diffuse."53 Justice Stevens, also concurring, reiterated that the "District Court's task in each case is to 'be guided by equitable principles. Traditionally, equity has been characterized by a practical flexibility in shaping its remedies and by a facility for adjusting and reconciling public and private needs.' "54
24
Together, these decisions insist that Title VII remedies are to be designed and enforced with appropriate attention to the interests of nonvictim employees--in the words of this court, "with care to see that they wound as little as possible."55 The need for flexible enforcement of employment goals is at its maximum when the legitimate interests of third-party employees are at stake.56 Here, when the District Court saw that the promotional goals of its final order might not be realized in a timely fashion--for reasons involving no bad faith on the part of the governmental defendant--it was obliged to countenance some delay in their attainment before it could adopt additional remedial measures that would increase the burden to be borne by other employees whose opportunities for promotion had already been significantly curtailed during the long journey toward nondiscriminatory employment.
V.
25
We reverse the District Court's 1984 order, to the extent that it requires the placement of a class member in the position of head offset pressman in GPO's offset printing section.57 Our decision to do so stems solely from the court's failure to give adequate weight to interests of third parties affected by the order--a concern expressed by this court on its 1982 review of the District Court's 1981 order, and a function mandated by recent Supreme Court precedent. The District Court's evident commitment to providing the plaintiff class effective and expeditious relief meets with our wholehearted approval so long as its effectuation duly regards the full range of obligations to be accommodated in the crafting of Title VII remedies.
26
We thus encourage the District Court to explore such alternative forms of relief as might prove to be necessary and appropriate. For example, that court's 1984 order requests information on the prospects of modifying GPO's subcontracting arrangements to expand employment opportunities for all GPO employees.58 This step, if economically feasible, might serve admirably to reconcile the interests of the plaintiff class and nonmember employees. Should delay in achieving the promotional goals of the 1981 order become excessive, a formal modification of the remedial timetable, undertaken in light of the actual rate of job turnover and the competing interests of other employees, might be warranted. While we express no view on the particulars of such alternatives, they do manifest a proper regard for the welfare of all GPO employees, and perhaps an appropriate exercise of the District Court's remedial authority in this case.
27
Order reversed in part and case remanded.
*
Judge (now Justice) Scalia was a member of the panel at the time this case was argued, but did not participate in this opinion
1
McKenzie v. Barrett, Civ. No. 73-0974 (D.D.C. Sept. 19, 1984) (order), Joint Appendix (J.App.) 21
2
42 U.S.C. Secs. 2000e-2000e-17 (1982)
3
McKenzie v. McCormick, 425 F.Supp. 137 (D.D.C.1977)
4
McKenzie v. Saylor, 508 F.Supp. 641 (D.D.C.1981)
5
McKenzie v. Sawyer, 221 U.S.App.D.C. 288, 684 F.2d 62 (1982)
6
The 1984 order may be separated into four parts. The first part directed the hiring of a member of the plaintiff class to fill the position of head offset pressman on the second shift. This is the only portion of the order here at issue. The second part of the order addressed procedures for filling future vacancies in uprate and supervisory positions. This portion was remanded to the District Court at the request of the parties, see McKenzie v. Kennickell, No. 84-5785 (D.C.Cir. Mar. 7, 1985) (order), and an agreement thereon has been reached and approved by the District Court. See Relief Agreement, McKenzie v. Kennickell, Civ. No. 73-0974 (D.D.C.) (filed Apr. 3, 1985). The third and fourth parts of the order required the filing of reports by GPO. Since these reports have been filed, any questions regarding these portions are now moot
7
McKenzie v. Barrett, supra note 1, at 1, J.App. 21. GPO moved for summary reversal or, in the alternative, for a stay pending appeal. Emergency Motion for Summary Reversal, McKenzie v. Barrett, No. 84-5785 (D.C.Cir.) (filed Dec. 3, 1984). This court denied the motion for summary reversal, McKenzie v. Barrett, No. 84-5785 (D.C.Cir. Dec. 7, 1984) (order), J.App. 27, but ordered that any action taken by the District Court should "not displace any present employees." Id
8
Reply Brief for Appellant at 3-8
9
See McKenzie v. Sawyer, supra note 5
10
McKenzie v. Saylor, supra note 4, 508 F.Supp. at 644-645. See Ledoux v. District of Columbia, 820 F.2d 1293 (D.C.Cir.1987) at 1299 (one of the principal purposes of Title VII is to abolish traditional patterns of racial segregation and hierarchy)
11
McKenzie v. Saylor, supra note 4, 508 F.Supp. at 655
12
Id. at 655-656
13
Id. at 645
14
Id. at 655-656
15
Id. at 656
16
McKenzie v. Sawyer, supra note 5, 221 U.S.App.D.C. at 298-300, 684 F.2d at 72-74
17
Id. at 300, 684 F.2d at 74
18
Id. at 305, 684 F.2d at 79
19
Id
20
Id.; see also McKenzie v. Saylor, supra note 4, 508 F.Supp. at 654-655
21
McKenzie v. Sawyer, supra note 5, 221 U.S.App.D.C. at 306, 684 F.2d at 80 (citing Thompson v. Sawyer, 219 U.S.App.D.C. 393, 440, 678 F.2d 257, 294 (1982))
22
McKenzie v. Sawyer, supra note 5, 221 U.S.App.D.C. at 306, 684 F.2d at 80
23
Id
24
Id
25
Plaintiffs' Fourth Motion to Compel Compliance With Final Order, McKenzie v. Barrett, Civ. No. 73-0974 (D.D.C.) (filed Aug. 15, 1984), Record Document (R.Doc.) 258
26
Memorandum in Support of Plaintiffs' Fourth Motion to Compel Compliance with Final Order, McKenzie v. Barrett, Civ. No. 73-0974 (D.D.C.) (filed Aug. 15, 1984) at 2-4, R.Doc. 258 [hereinafter Compliance Memorandum]. GPO is required by the 1981 order to give the plaintiffs' equal employment opportunity monitoring committee 30 days notice of any promotion to an uprate or supervisory position in the offset printing section. See McKenzie v. Saylor, supra note 4, 508 F.Supp. at 649
27
Compliance Memorandum, supra note 26, at 2 n. 2, R. Doc. 258
28
Plaintiffs' Fourth Motion to Compel Compliance With Final Order, supra note 25, at 2, R. Doc. 258
29
Defendant's Response to Plaintiffs' Fourth Motion to Compel Compliance with Final Order, McKenzie v. Barrett, Civ. No. 73-0974 (D.D.C.) (filed Sept. 5, 1984) at 3, R. Doc. 262; see also Brief for Appellant at 23; Reply Brief for Appellant at 4-5
30
McKenzie v. Barrett, supra note 1, at 1, J.App. 21. For summary of additional terms of the September 19 order, see note 6 supra
31
Defendant's Report Regarding Efforts to Select a Class Member for the Position of Head Offset Pressman, McKenzie v. Barrett, Civ. No. 73-0974 (D.D.C.) (filed Oct. 19, 1984) at 2, R.Doc. 269 [hereinafter Defendant's Report]; see also Affidavit of Francis R. Del Bianco, Superintendant, Press Division, United States Government Printing Office (filed Oct. 19, 1984) at 2, J.App. 7 [hereinafter Del Bianco Affidavit]
32
Defendant's Report, supra note 31, at 1, R.Doc. 269; Del Bianco Affidavit, supra note 31, at 1, J.App. 6
33
Defendant's Report, supra note 31, at 2, R.Doc. 269; Del Bianco Affidavit, supra note 31, at 2, J.App. 7. GPO apparently interpreted the December 17, 1984 order of this court, see note 7 supra, denying its motion for summary reversal, as requiring reinstatement of the white employee originally promoted, and proceeded to reinstate him accordingly. See note 57 infra. The controversy remains live, however, since another member of the plaintiff class could be placed in the contested position
34
See note 6 supra
35
Brief for Appellee at 4; see also Reply Brief for Appellants at 2 n. 2
36
McKenzie v. Sawyer, supra note 5, 221 U.S.App.D.C. at 306, 684 F.2d at 80
37
See id. at 305-306, 684 F.2d at 79-80
38
Id. at 306, 684 F.2d at 80
39
Id
40
Id
41
The mandate of this court bound any further action by the District Court. See Maggard v. O'Connell, 227 U.S.App.D.C. 62, 67, 703 F.2d 1284, 1289 (1983); City of Cleveland v. FPC, 182 U.S.App.D.C. 346, 348-349, 561 F.2d 344, 346-347 (1977); Wheeler v. City of Pleasant Grove, 746 F.2d 1437, 1440-1441 (11th Cir.1984)
42
431 U.S. 324, 97 S.Ct. 1843, 52 L.Ed.2d 396 (1977)
43
Id. at 374-375, 97 S.Ct. at 1874-1875, 52 L.Ed.2d at 439-440 (footnote and citations omitted)
44
478 U.S. ----, 106 S.Ct. 3019, 92 L.Ed.2d 344 (1986)
45
478 U.S. at ----, 106 S.Ct. at 3051, 92 L.Ed.2d at 389 (plurality opinion) (emphasis in original)
46
Id. at ----, 106 S.Ct. at 3052, 92 L.Ed.2d at 390 (plurality opinion) (quoting United Steelworkers v. Weber, 443 U.S. 192, 208, 99 S.Ct. 2721, 2730, 61 L.Ed.2d 480, 492 (1979))
47
Justice Powell concurred in part and concurred in the judgment. In approving the trial court's management of the remedial phase of the case, Justice Powell similarly highlighted its flexible imposition of numerical goals, pointing to the court's willingness to postpone timetables before imposing sanctions as attestation of an understanding that effectuation of a Title VII remedy, and not racial balance per se, was at stake. Sheet Metal Workers Int'l Ass'n v. EEOC, supra note 44, 478 U.S. at ----, 106 S.Ct. at 3056, 92 L.Ed.2d at 395-396 (concurring opinion). He further emphasized that the relief granted was appropriate insofar as it did not place undue burdens on nonminorities, distinguishing the case from Wygant v. Jackson Bd. of Educ., 476 U.S. ----, 106 S.Ct. 1842, 90 L.Ed.2d 260 (1986), where a consent decree required employment of a constant percentage of minority teachers, even when layoff of nonminority teachers with greater seniority resulted, thus placing " 'the entire burden of achieving racial equality on particular individuals....' " Sheet Metal Workers Int'l Ass'n v. EEOC, supra note 44, 478 U.S. at ----, 106 S.Ct. at 3056, 9 L.Ed.2d at 396 (concurring opinion) (quoting Wygant v. Jackson Bd. of Educ., supra, 476 U.S. at ----, 106 S.Ct. at 1851-1852, 90 L.Ed.2d at 274)
48
--- U.S. ----, 107 S.Ct. 1053, 94 L.Ed.2d 203 (1987)
49
Id. at ----, 107 S.Ct. at 1063, 94 L.Ed.2d at 218 (plurality opinion) (emphasis in original)
50
Id. at ----, 107 S.Ct. at 1071, 94 L.Ed.2d at 228 (plurality opinion)
51
Id. at ----, 107 S.Ct. at 1072, 94 L.Ed.2d at 230 (plurality opinion) (footnote omitted)
52
Id. at ----, 107 S.Ct. at 1074, 94 L.Ed.2d at 232 (plurality opinion). As the plurality assessed the impact of the one-for-one promotions order, it
did not impose an unacceptable burden on innocent third parties.... It was used only once at the rank of corporal and may not be utilized at all in the upper ranks. Nor has the court imposed an "absolute bar" to white advancement.... In the one instance in which the quota was employed, 50% of those elevated were white.
Id. at ----, 107 S.Ct. at 1073, 94 L.Ed.2d at 230 (plurality opinion) (citation omitted).
53
Id. at ----, 107 S.Ct. at 1076, 94 L.Ed.2d at 234 (concurring opinion)
54
Id. at ----, n. 4, 107 S.Ct. at 1079-1080 n. 4, 94 L.Ed.2d at 239 n. 4 (concurring opinion) (quoting Brown v. Board of Educ., 349 U.S. 294, 300, 75 S.Ct. 753, 756, 99 L.Ed. 1083, 1106 (1955))
55
Thompson v. Sawyer, supra note 21, 219 U.S.App.D.C. at 430, 678 F.2d at 293
56
As this court cautioned in a recent sex discrimination case involving GPO, care in the use of hiring goals is required, among other reasons, because other minority employees may be among those whose employment opportunities are affected by them. See id. at 430-432, 678 F.2d at 294-296 (Title VII and Equal Pay Act remedy)
57
So far as we are advised, this disposition will not result in any change in the status quo. A white employee temporarily assumed the position of head offset pressman pending resolution of the plaintiffs' motion to compel compliance. Compliance Memorandum, supra note 26, at 1 n. 1. The District Court's 1984 order forced the removal of that employee and his replacement with a class member. Defendant's Report, supra note 31; see also Brief for Appellant at 10 n. 13. GPO apparently interpreted the December 7, 1984 order of this court denying its motion for summary reversal, see note 33 supra, as requiring the reinstatement of the white employee. Reply Brief for Appellant at 3 n. 4, and the displaced black employee has since been promoted to another uprate position. See Appellant's Notice of Change in Facts, McKenzie v. Kennickell, Civ. No. 84-5785 (D.C.Cir.) (filed Sept. 20, 1985) at 1
58
McKenzie v. Barrett, supra note 1, at 2-5, J.App. 22-25
|
Introduction
============
Renal cell cancer/carcinoma (RCC) is considered to be one of the most treatment-resistant cancers and is the tenth cancer-related cause of death in USA, with an estimated 39,140 new cases and 8,900 deaths in 2014.[@b1-ott-8-1581] In People's Republic of China, the incidence of RCC is relatively low and accounts for 2% of adults' malignant tumors. In nearly 20 years, the morbidity of RCC increases at an average of 6.5% per year. Its cancer-related mortality exceeds the bladder cancer and ranks the first in the genitourinary cancer.[@b2-ott-8-1581] Due to the social, economic, and environmental factors, about half of the Chinese patients with RCC have been found in advanced stage at diagnosis and the curative effect is not satisfactory with traditional treatment strategies. In recent years, targeted therapies have dramatically improved prognosis of patients with metastatic renal cell cancer (mRCC). Sorafenib (Nexavar, Bayer AG, Leverkusen, Germany), a representative multikinase inhibitor of tumor-cell proliferation and angiogenesis, is a kind of novel multitargeting micromolecule compound aiming at vascular endothelial growth factor (VEGF). It is the first molecular-targeting agent approved by the FDA for patients with mRCC. Some international collaborative Phase III trials demonstrated that sorafenib could obviously improve progression-free survival (PFS) with tolerable toxicities in patients with mRCC.[@b3-ott-8-1581]--[@b5-ott-8-1581] Until now, it still lacks the long-term follow-up data on overall survival (OS) and PFS from Asian patients. The objective of this study was to observe long-term efficacy of sorafenib and make an effort to explore the impact factors on prognosis in Chinese patients with mRCC.
Patients and methods
====================
Clinical data
-------------
In this retrospective study, 406 consecutive patients were diagnosed as mRCC histopathologically between October 2007 and October 2010 from six comprehensive cancer centers in Northeast China. The primary metastatic sites included viscera (liver and lungs), bones, and lymph nodes. First, we excluded 266 patients who accepted nephrectomy or immunotherapy alone without sorafenib. Second, we excluded nine patients who were lack of adequate follow-up data. The Eastern Cooperative Oncology Group performance status (ECOG PS) of 131 patients enrolled in this study was 0--2 ([Figure 1](#f1-ott-8-1581){ref-type="fig"}). The cutoff date for follow-up and data statistics was October 2013. All patients received 400 mg of sorafenib orally twice daily on a continuous basis until progression of disease or occurrence of intolerable toxicities. OS (definition as the time from initiation of sorafenib therapy to death) and PFS (definition as the time from initiation of sorafenib therapy to the first documentation of disease progression or to death from any cause, whichever occurred first) were appointed as main outcome measures. In addition, the influence of sex, ECOG PS, primary metastatic sites, and previous therapy on survival in patients were observed. The relationship between clinical variables and prognosis of patients was also evaluated.
Statistical analyses
--------------------
Clinical data were analyzed using the SPSS statistical software (version 17.0, SPSS Inc., Chicago, IL, USA). OS and PFS curves were drawn using the Kaplan--Meier method. Clinical variables were included on univariate and multivariate analysis to evaluate associations with OS and PFS by the log-rank test and Cox proportional hazard models, *P*\<0.05 was considered as statistically significant.
Results
=======
A total of 131 patients were available for survival analysis, including 96 males and 35 females. The median age was 60 years (33--79 years). By October 2013, the median follow-up periods were 16.9 months (0.6--48.5 months). The baseline characteristics of patients are shown in [Table 1](#t1-ott-8-1581){ref-type="table"}. According to the results of survival analysis, the median OS was 16.1 months and the median PFS was 10.5 months ([Figure 2](#f2-ott-8-1581){ref-type="fig"}). OS of patients with ECOG PS 0/1 was 24.6 months and 19.1 months, respectively, which was significantly better than 7.1 months of those cases with PS 2. Compared with metastatic lesions such as viscera, lymph nodes, and bones, patients with multiple organs metastasis had the worst prognosis. According to the conditions of previous therapy, patients who undergo nephrectomy + immunotherapy or immunotherapy alone had a longer lifetime than those who only undergo surgery or untreated. Univariate analysis showed that PFS for patients with ECOG PS 0/1 was better than those cases with PS 2. In addition, patients who undergo nephrectomy + immunotherapy or immunotherapy alone had a longer PFS than those cases who only undergo surgery or untreated ([Table 2](#t2-ott-8-1581){ref-type="table"}). ECOG PS, metastatic lesions, and previous therapy were predictive factors for OS in Cox proportional hazard models ([Figure 3](#f3-ott-8-1581){ref-type="fig"}). ECOG PS and previous therapy were predictive factors for PFS in Cox proportional hazard models ([Figure 4](#f4-ott-8-1581){ref-type="fig"}). In the subgroup analysis for 78 patients with visceral metastasis, the prognosis of patients with lung metastasis alone was better than those cases with liver metastasis alone or multiple organs metastasis ([Figure 5](#f5-ott-8-1581){ref-type="fig"}). Subsequently, the multivariate analysis suggested that ECOG PS (*P*=0.004), metastatic lesions (*P*=0.003), and previous therapy (*P*=0.019) were the independent prognostic factors for OS, and ECOG PS (*P*=0.000) and previous therapy (*P*=0.003) as the independent prognostic factors for PFS ([Tables 3](#t3-ott-8-1581){ref-type="table"} and [4](#t4-ott-8-1581){ref-type="table"}).
Discussion
==========
RCC is one of the most common malignant tumors in Caucasian and one-third of cases with localized RCC eventually develop metastatic disease despite surgical resection of the primary tumor.[@b6-ott-8-1581],[@b7-ott-8-1581] In People's Republic of China, 20%--30% of patients with RCC have metastases at diagnosis and 20%--40% of postnephrectomy patients will subsequently develop metastases.[@b8-ott-8-1581],[@b9-ott-8-1581] Metastasis is the leading cause of death in Chinese patients with RCC, and previously we lack effective treatment strategy for mRCC.
During the past few years, strategies targeted at VEGF, platelet-derived growth factor, and the mammalian target of rapamycin pathway dominate in RCC treatment. As a representative drug, sorafenib brings great benefit to Asian patients.[@b10-ott-8-1581] It is a novel signal transduction inhibitor that can inhibit RAF-1 and B-RAF serine/threonine kinase activities as well as VEGF-2, VEGF-3, platelet-derived growth factor-β, KIT, and FLT-3 tyrosine kinases.[@b11-ott-8-1581] It also has double-antitumor activity that directly inhibits tumor-cell proliferation by blocking the RAF/MEK/ERK pathways or inhibits neovascularization by cutting off nutritional supply to tumor cells.[@b12-ott-8-1581]--[@b14-ott-8-1581] However, it still lacks data about sorafenib from Asian patients with mRCC in a large sampling and long-term follow-up profile.
This study was the first major clinical retrospective investigation for mRCC in Northeast China. After more than 3 years follow-up for all cases, we found that the median OS and PFS were 16.1 months and 10.5 months, respectively. The median OS in this study was similar to the data from some European and American research, but there were differences in median PFS.[@b15-ott-8-1581]--[@b17-ott-8-1581] In the global Phase III study TARGET, the final OS and PFS of Caucasian patients receiving sorafenib were 17.8 months and 5.5 months, respectively.[@b5-ott-8-1581] Compared with the TARGET study, the median PFS of our study was much longer (10.5 months vs 5.5 months). The results of our study were consistent with reported data from a small sampling of Chinese patients, which were little different from other Asian non-Chinese data.[@b9-ott-8-1581],[@b18-ott-8-1581] In a Japanese study, they found that the median PFS was 7.4 months, the median OS was 25.3 months, and these results were also longer than that in the TARGET study.[@b19-ott-8-1581] Some results from another Japanese study showed that the median PFS was 9.0 months and sorafenib was effective in Japanese patients with advanced renal cell cancer in general clinical practice.[@b20-ott-8-1581] In the study of Korean patients, OS and PFS in subgroup of patients receiving sorafenib were 25.7 months and 8.6 months, respectively.[@b21-ott-8-1581] Compared with Asian non-Chinese data, we found that OS in our study was worse. The reason for this phenomenon was not clear, but it might be related to some patients who occurred to progression of disease in the early stage of sorafenib therapy. However, from the above data, Asian patients may acquire more benefit from sorafenib treatment.
At the same time, we surveyed some clinical factors that might affect the prognosis of Chinese patients with mRCC. Previous studies showed that tumor burden should be an independent prognostic factor in mRCC and c-KIT might be a potential predictive factor for the efficacy of sorafenib in mRCC with sarcomatoid feature.[@b22-ott-8-1581],[@b23-ott-8-1581] In this study, we discussed the relationship between clinical factors and prognosis. We used some statistical methods to certify that ECOG PS, metastatic lesions, and previous therapy were the independent prognostic factors for OS, and ECOG PS and previous therapy as the independent prognostic factors for PFS. Furthermore, in a retrospective study, authors found that metastatic sites were associated with PFS and OS in patients with RCC treated with targeted therapies and patients with multi-metastatic sites had shorter PFS and OS.[@b24-ott-8-1581] The subgroup analysis showed that patients with lung metastases were more sensitive to sorafenib than those with other organ metastases, which was similar to Kondo's study.[@b25-ott-8-1581] In addition, there were some limitations in our study. Retrospective data were collected from local area of the Northeast China and patient sampling was not large enough to revise the treatment guideline for mRCC. Due to a larger proportion of the enrolled patients with poor PS, the OS data were lower than that of the Asian population.
Taken together, according to the present data from European/American/Asian patients with mRCC, Asian patients may be more benefit from sorafenib treatment. This long-term follow-up study also demonstrated that Chinese patients with lung metastases were more sensitive to sorafenib than those with other organ metastases. ECOG PS, metastatic lesions, and previous therapy may be important parameters for OS and PFS prediction. Further researches on selecting the candidate patients with mRCC for sorafenib treatment should be done to confirm these findings.
We thank Prof Li Xin for expert technical assistance with statistics. We thank Dr Yongye Liu and Dr Long Xu for secretarial and organizational support in this study. We thank Prof Jia Li and Dr Qingqing Sun for critical revision of the manuscript. This work was supported by grants from the National Research Key Project of The Twelfth Five-Year Plan of People's Republic of China (No 2012ZX09303016-002) and Science and Technology key programs of Liaoning Province (No 2012225019). No additional external funding received for this study.
**Disclosure**
The authors report no conflicts of interest in this work. Some results in this study had been presented at the 2013 ASCO Annual Meeting and abstract number is e15582. We confirm that the actual paper has never been published.
{#f1-ott-8-1581}
{#f2-ott-8-1581}
######
Relationship between clinical variables and OS.
**Notes:** (**A**) There was no significant difference between male group and female group for OS in patients with mRCC (*P*\>0.05). (**B**) Both groups with age \<65 years and age ≥65 years had no difference in OS (*P*\>0.05). (**C**) OS for patients with ECOG PS 0/1 was significantly better than those cases with PS 2 (24.6 months vs 7.1 months, *P*\<0.05; 19.1 months vs 7.1 months, *P*\<0.05). (**D**) Compared with other metastatic lesions such as viscera, lymph nodes, and bones, patients with multiple organs metastasis had the worst prognosis (20.4 months vs 7.7 months, *P*\<0.05; 16.0 months vs 7.7 months, *P*\<0.05; 20.7 months vs 7.7 months, *P*\<0.05). (**E**) According to the conditions of previous therapy, patients who undergo nephrectomy + immunotherapy or immunotherapy alone had a longer lifetime than those cases who only undergo surgery or untreated (22.6 months vs 6.2 months, *P*\<0.05; 22.6 months vs 5.2 months, *P*\<0.05; 19.1 months vs 6.2 months, *P*\<0.05; 19.1 months vs 5.2 months, *P*\<0.05).
**Abbreviations:** ECOG PS, Eastern Cooperative Oncology Group performance status; mRCC, metastatic renal cell cancer; OS, overall survival.


######
Relationship between clinical variables and PFS.
**Notes:** (**A**) There was no significant difference between male group and female group for PFS in patients with mRCC (*P*\>0.05). (**B**) Both groups with age \<65 years and age ≥65 years had no difference in PFS (*P*\>0.05). (**C**) PFS for patients with ECOG PS 0/1 was better than those cases with PS 2 (16.1 months vs 2.9 months, *P*\<0.05; 12.3 months vs 2.9 months, *P*\<0.05). (**D**) Metastatic sites had no obvious correlation with PFS in patients with mRCC (*P*\>0.05). (**E**) Patients who undergo nephrectomy + immunotherapy or immunotherapy alone had a longer lifetime than those cases who only undergo surgery or untreated (12.4 months vs 5.3 months, *P*\<0.05; 12.4 months vs 3.1 months, *P*\<0.05; 12.3 months vs 5.3 months, *P*\<0.05; 12.3 months vs 3.1 months, *P*\<0.05).
**Abbreviations:** ECOG PS, Eastern Cooperative Oncology Group performance status; mRCC, metastatic renal cell cancer; PFS, progression-free survival.


{#f5-ott-8-1581}
######
Baseline characteristics
Characteristic Patients, n (%)
--------------------------- -----------------
Sex
Male 96 (73.3)
Female 35 (26.7)
Age, years
\<65 87 (66.4)
≥65 44 (33.6)
Metastatic sites
Lung 99 (75.6)
Liver 55 (42.0)
Bone 41 (31.3)
Lymph nodes 17 (13.0)
Number of metastatic foci
1 75 (57.3)
2 36 (27.5)
≥3 20 (15.2)
ECOG PS
0 38 (29.0)
1 49 (37.4)
2 44 (33.6)
Prior nephrectomy
Yes 95 (72.5)
No 36 (27.5)
Prior immunotherapy
IL-2 + IFN 46 (35.1)
IL-2 alone 18 (13.7)
IFN alone 23 (17.6)
None 44 (33.6)
**Abbreviations:** ECOG PS, Eastern Cooperative Oncology Group performance status; IFN, interferon; IL, interleukin.
######
The univariate analysis to evaluate the relationship between clinical variables and OS/PFS
Clinical variables N Median OS (months) 95% CI Log rank (*P*-value) Median PFS (months) 95% CI Log rank (*P*-value)
----------------------------------------------------- ---- -------------------- ---------------- -------------------------------------------------- --------------------- ---------------- --------------------------------------------------
Sex
Male 96 15.7 13.396--18.004 0.243 9.3 7.380--11.220 0.328
Female 35 21.9 14.598--29.202 12.9 8.940--16.860
Age
\<65 87 16.2 14.006--18.394 0.128 10.3 8.371--12.229 0.902
≥65 44 17.1 5.120--29.080 10.7 5.175--16.225
ECOG PS
0 38 24.6 21.428--27.772 0.000[\*](#tfn2-ott-8-1581){ref-type="table-fn"} 16.1 14.650--17.550 0.000[\*](#tfn2-ott-8-1581){ref-type="table-fn"}
1 49 19.1 16.219--21.981 12.3 9.843--14.757
2 44 7.1 6.017--8.813 2.9 1.971--3.829
Metastatic sites
Multiple organs 39 7.7 3.907--11.493 0.004[\*](#tfn2-ott-8-1581){ref-type="table-fn"} 2.9 2.043--3.757 0.083
Viscera[\#](#tfn3-ott-8-1581){ref-type="table-fn"} 78 20.4 13.800--27.000 12.3 10.955--13.645
Lymph nodes 7 16 14.460--17.540 8.8 7.260--10.340
Bones 7 20.7 16.594--24.806 15.6 9.441--21.759
Previous therapy
Nephrectomy + immunotherapy 70 22.6 16.769--28.431 0.004[\*](#tfn2-ott-8-1581){ref-type="table-fn"} 12.4 9.530--15.270 0.001[\*](#tfn2-ott-8-1581){ref-type="table-fn"}
Immunotherapy alone 25 19.1 11.705--26.495 12.3 9.208--15.392
Nephrectomy alone 17 6.2 0.000--16.319 5.3 1.220--9.380
None 19 5.2 1.503--8.897 3.1 2.397--3.803
**Notes:**
*P*\<0.05 was considered as statistically significant.
Viscera only consider the lungs and liver, except for other organs.
**Abbreviations:** CI, confidence interval; ECOG PS, Eastern Cooperative Oncology Group performance status; OS, overall survival; PFS, progression-free survival.
######
Multivariate analysis for OS
Clinical variables Odds ratio 95% CI *P*-value
-------------------- ------------ -------------- -----------
ECOG PS 1.423 1.120--1.808 0.004
Metastatic sites 0.816 0.713--0.933 0.003
Previous therapy 0.820 0.694--0.968 0.019
**Abbreviations:** CI, confidence interval; ECOG PS, Eastern Cooperative Oncology Group performance status; OS, overall survival.
######
Multivariate analysis for PFS
Clinical variables Odds ratio 95% CI *P*-value
-------------------- ------------ -------------- -----------
ECOG PS 1.561 1.233--1.977 0.000
Previous therapy 0.775 0.654--0.918 0.003
**Abbreviations:** CI, confidence interval; ECOG PS, Eastern Cooperative Oncology Group performance status; PFS, progression-free survival.
[^1]: These authors contributed equally to this work
|
We've reached a point in the top goals of the year list that any of the following entries could make a darn good argument for the No. 1 spot; where the following goals simply make you shake your head, and remember those executing said miracles are paid to play hockey for a reason. They're good at their jobs.
Corey Perry is one of the best at his job. The only players to have scored more goals than Perry since 2008 are some guys named Alex Ovechkin and Steven Stamkos. Perry's main responsibility is to put the puck in the back of net, and he does that just as well as any player on the planet. And he can be quite creative in finding ways to beat goaltenders.
Eric Evelhoch, Anaheim Calling: Anaheim fans have seen for years that no matter the circumstance or spot on the ice in the offensive zone, Corey Perry is a threat to score.
Mark D, Lighthouse Hockey: Any goal featuring Anders Nilsson (or any Islanders goalie from last season for that matter) should be automatically disqualified.
Dan Saraceni, Lighthouse Hockey: If you don't follow the Islanders that closely (and really, no one would blame you if you didn't), you might not know that their seasons generally end in November, not April. Every year, the team goes on vacation at some point after Halloween, loses a bunch of games in a row and digs themselves into a hole they can't climb out of. The fact that they last made the playoffs in a season that didn't have a November has not been lost on us over at Lighthouse Hockey. Although it happened in December, the night Perry worked his magic was typical of the annual Woevember gauntlet.
Derek Satterfield, Anaheim Calling: It's not a typical Corey Perry shift unless No. 10 has either just vacated the penalty box, stickhandled through a defender as if he was being controlled by a 12-year-old with an Xbox controller, spent some quality time with his knees on the ice, or, of course, scored a goal. In this case, he's checked off all of those boxes.
The fourth-best goal of 2013-14
How it unfolded
Lois Y, Anaheim Calling: After an extremely frustrating and lackluster opening of the game, I along with all the other Duck fans in the stands just felt like punching someone (like the couple Islander fans jeering in front of me). And you know what? The words "frustrating and lackluster" didn't do my feelings justice. We were downright disgusted by how slow and confused the Ducks looked on home ice. And then in a matter of minutes, the Ducks started raining goals.
This was a 2-2 game late in the second period. Perry had gone to the box having taken an additional minor during a scrum with just over two minutes remaining. But on the Islanders' power play, it was the Ducks' Cam Fowler who scored, giving Anaheim its first lead of the night. On the ensuing faceoff, with only 16 seconds remaining on the Perry minor, the Islanders got the puck deep into the Ducks' end, only to turn it over just as Perry stepped out of the box.
But as Anaheim turned the play the other way, there were only 8.8 seconds remaining on the clock. Daniel Winnik was in possession, while Perry, in the bottom of the frame, began to join the rush.
Winnik hit the blue line, and dropped it for Perry. By continuing to crash the net, Winnik guaranteed he'd take at least one defenseman with him. Behind the play, Brock Nelson wasn't exactly hustling to get back.
Calvin de Haan attempted to reach and poke the puck away from Perry, but the offensively gifted forward went to the toe drag, maneuvering around de Haan's stick.
As Perry walked around de Haan, the Islanders defenseman swept his leg backwards, tripping Perry up.
For many players, this would have been good enough. Many would have been content to draw a penalty having just taken one themselves, and their team having taken a shorthanded lead. Anaheim could have entered the final 20 minutes of the game up a goal, and on the man advantage.
But it wasn't good enough for Perry.
Instead of just haplessly going down, Perry used his hands to steady his fall, allowing himself to get into a shooting position, while Travis Hamonic and Winnik were tied up.
The acumen and skill level of what Perry did next was a nod to those 200-plus goals he's scored over the past six seasons. Perry managed to get his shoulders around the puck and into a shooting position, which required a good deal of upper body strength, considering he was on his knees.
Lois Y, Anaheim Calling: He skated, made a move, tripped, fell -- all while keeping his eyes on the net, puck still on the tape of his stick.
It's difficult to say whether what Perry did next was intentional or not. "I knew what I wanted to do," Perry said after the game, although there's no way of knowing if Perry realized just how little time was left. Meanwhile, with Hamonic still playing Winnik tight, the forward wasn't exactly concerned with leaving his five-hole open.
From the penalty box, to center ice, to his knees and finally, the back of the net, in a matter of seconds.
Ben Nierengarten, Anaheim Calling: In the more recent NHL games by EA Sports, if your player is tripped on a breakaway, sometimes they'll fall to their knees and you can still throw a couple of dekes until they run out of momentum. If you're good, you can light the lamp before you crash into the boards/goalie, but by no means is it something you expect to see in the real version of the league ... with the exception of that Dec. 9 game between the Ducks and Islanders. Corey Perry literally scored a video game goal.
Lois Y, Anaheim Calling: I don't think it really registered until it happened. Literally the arena faded to black and grew silent, with one lone spotlight on Corey Perry. The red lights flash. Beer spills, everyone on their feet, crowd roars, high-fives and hugs all around. Everyone's eyes went straight to the Jumbotron to confirm what we all just witnessed. *cue Bro Hymn*
Dan Saraceni, Lighthouse Hockey: To be honest, I'm not even sure I saw the Perry goal happen in real time. By then, the Ducks owned the game, the Islanders looked lost and I figured the period was over. I was gearing up for an intermission speech about "Battle Level" and "compete," so I wasn't really paying attention. Perry's ice ballet effort to stick with the puck is extraordinary, but that goal has all the hallmarks of a typical Islanders swoon. Defenders spun around helplessly, the puck sitting in open space just long enough for a star to get to it, a well-placed shot that nonetheless bounces off an Islander's skate and past an out-of-position and overmatched goalie, all happening at the most painful possible time. The loss was the Islanders' 10th straight -- the cherry on top of a Kick In The Nuts sundae. It's the kind of goal an All-Star scores against a team on a double-digit losing streak.
Eric Evelhoch, Anaheim Calling: That game was the sixth in a stretch of seven straight games Perry scored a goal (he had eight during the stretch), with five of the opponents in the span (SJS, LAK, CHI, STL, MIN) eventually being playoff teams. Just as easily as he'll score snapping a shot far post on a breakaway, he'll also take a beating in front of the net and still be able to convert rebounds and deflections. When you have the kind of hands he does, as well as ability and more importantly comfort moving quickly in tight spaces, it creates opportunities for some truly sublime scoring that few on the planet can pull off.
Dan Saraceni, Lighthouse Hockey: The Islanders would actually break their slump the next night in San Jose, a shootout win mostly attributed to an unreal performance by goalie Kevin Poulin. They would lose their next three games before straightening themselves out for the rest of the season, which was, baring a miracle, done. There was no miracle.
Derek Satterfield, Anaheim Calling: A big part of what makes this goal so impressive is that he was able to get a good shot off from such a disadvantageous position on the ice, but what caught my eye was the fact that the puck was on edge right before he shot it, probably making it easier to elevate and therefore score. As is best seen in the third replay of the Anaheim broadcast (the low angle looking toward the Islanders' zone from the Ducks' zone), the puck is flat on the ice throughout the entirety of Perry's undressing of Calvin de Haan and doesn't in fact go on edge until Perry moves it from his backhand to his forehand while on his knees. My initial assumption is that he accidentally did that to the puck and it worked out for him, but what if I'm wrong? Is it possible that, during that fraction of a fraction of a second, he realized he needed the puck to be on edge in order to elevate it, and he made it happen on purpose? If that is the case, this goal is even more spectacular than it appears.
Eric Evelhoch, Anaheim Calling: I fully understand why the rest of the league hates Perry so much. To have a player who is a grade-A agitator that also has world scoring touch is almost unfair. It's as if the Ducks have a reincarnation of Claude Lemieux who plays the regular season as if it were the playoffs, though Perry hasn't consistently found that next level of play in the postseason of yet. Still, to have a scorer so unafraid to get himself dirty while at the same time being able to single-handedly create and convert chances, one can't help but marvel. |
Receive the latest television updates in your inbox
Blame "Saturday Night Live" or credit the show for being ahead of its times: A 1980 skit set at an 18th Century English ball featured Lords Worcestershire and Salisbury and the Earl of Sandwich, the namesakes, of course, of some common items. The next guests to arrive: Lord and Lady Douchebag. Tasteless hilarity ensues.
The sketch likely marked the first network comedic appearance of the variant of the D-Word, presaging by about three decades its frequent use as a prime-time punchline/insult.
Celeb Breakups: "Bachelorette" Stars
The Parents Television Council, at the behest of The New York Times, counted D-word usage on TV. It’s been uttered at least 76 times this year on prime-time network shows, compared to six in 2005,the Times reported.
So does this mark progress in artistic expression, a coarsening of the popular culture or is it just a reflection of what kids are saying these days?
Scream Queens: Ladies of Horror
The discussion speaks to the impact of language, which George Carlin explored in his infamous "Seven Words You Can Never Say Television" routine. The bit became the basis of an obscenity case that wound up before the U.S. Supreme Court, which ultimately ruled the FCC has a right to prohibit broadcasts with “indecent” content when children are likely to be in the audience. Back in 1972, Carlin, who scoffed at the out-sized power conferred onto mere words, probably never considered the D-word for his list.
The Times' front-page article didn't offer a show-by-show log of D-word usage. But if we’re guessing, the prime-time champion likely is "Family Guy," as spoken by Stewie Griffin (oh, out of the mouths of babes).
Top Entertainment Photos
The word also has turned up frequently on "South Park," whose creators Matt Stone and Trey Park cleverly have noted the changing use of language on TV even as they have contributed to it (Remember the 2001 episode about the S-word being uttered in primetime on a “NYPD Blue”-like show? “South Park” tried to show the ridiculousness of the hoopla by repeating the curse dozens of times).
A more recent “South Park” installment – this month’s "The F-Word" episode – tackled what the Parker and Stone see as the evolving meaning of a nasty, three-letter anti-gay slur and its longer, six-letter variant.
To Cartman and his cronies, the word is a way to taunt “annoying, inconsiderate” jerks who make noise on Harley-Davidson motorcycles – and not a means of insulting their friend Big Gay Al and homosexuals in general.
Big Gay Al bought the argument – but not the Gay & Lesbian Alliance Against Defamation. As noted by The Hollywood Reporter, GLADD appreciated the attempt to take back the slur, but thought the satire would be lost on some: “If even a small number of those take from this a message that using the ‘F-word’ is okay, it worsens the hostile climate that many in our community continue to face.”
The commonality between the F-word, as re-imagined by “South Park,” and the D-word, as used on everything from “The Cleveland Show” to “The New Adventures of Old Christine” to “Community,” rests in making them all-purpose, generic insults. In fact, on the “South Park” episode, the D-word is a used at one point as a synonym for the newly constituted F-word.
“Vulgar slang has a way of waxing and waning, where we become desensitized to a word’s earlier meanings,” Timothy Jay, the author of “Cursing in America” told the Times. “I would bet most kids today couldn’t tell you what a douche bag is.”
Maybe. And the jury, for many, may be out on whether this language shift should be playing out in primetime.
But for now, we’ll let the late Carlin have the final word, from a two-decade-old routine on slurs: “They’re only words. It’s the context that counts. It’s the user, the intention behind the user that makes them good or bad. Words are completely neutral. The words are innocent.” |
groups:
- name: thanos-query.alerts
rules:
- alert: ThanosQueryGrpcErrorRate
expr: rate(grpc_server_handled_total{grpc_code=~"Unknown|ResourceExhausted|Internal|Unavailable",name="prometheus", prometheus="{{ include "prometheus.name" . }}"}[5m]) > 0
for: 5m
labels:
context: thanos
service: prometheus
severity: info
tier: {{ include "alerts.tier" . }}
meta: 'Thanos query is returning errors for Prometheus {{`{{ $labels.prometheus }}`}}'
annotations:
description: 'Thanos Query is returning Internal/Unavailable errors for Prometheus {{`{{ $labels.prometheus }}`}}. Grafana is not showing metrics.'
summary: Thanos query errors
|
At a Washington, DC gathering of African state leaders and U.S. corporations, President Obama on Tuesday unveiled a multi-billion dollar drive to promote U.S. business investments in Africa. While the President said the plan will unleash "the next era of African growth," experts warn it amounts to more of the same extractive policies that have already impoverished and dispossessed people across the continent.
"All you have to do is look who has a seat at the table to understand what is happening," said Emira Woods, expert on U.S. foreign policy in Africa and social impact director at ThoughtWorks, a technology firm committed to social and economic justice, in an interview with Common Dreams. "We're talking African leaders, some with bad human rights records, and American CEOs."
"Strip away all the modern PR and prettified palaver and it’s an ugly scramble for oil, minerals, and markets for U.S. goods. Everyone wants a piece of Africa: drooling outsiders, corrupt insiders, cynical middle men."
—John Feffer, Foreign Policy in Focus
Obama's much-touted "Africa Summit"—which started Monday and ends Wednesday—is co-sponsored by the U.S. Commerce Department and former New York Mayor Michael Bloomberg's foundation, and was attended by chief executives of General Electric, Coca-Cola, Wal-Mart, IBM, and other multinational corporations.
Obama took the opportunity to announce $7 billion in what the White House describes as "new financing to promote U.S. exports to and investments in Africa." Obama also championed $14 billion in new investments by U.S. corporations in Africa, which includes $5 billion from Coca-Cola for manufacturing equipment. This is in addition to another $12 billion in new commitments for Obama's Power Africa initiative, which will give multinational corporations—including GE—billions of dollars in energy deals to "double the number of people with access to power in Sub-Saharan Africa." The total bill comes to $33 billion for "supporting economic growth across Africa and tens of thousands of U.S. jobs," according to the White House.
"We've got to do better, much better," said Obama. "I want Africans buying more American products and I want Americans buying more African products."
General Electric chief executive Jeffrey Immelt put the interest of U.S. corporations more bluntly at a discussion moderated by former U.S. President Bill Clinton on Tuesday. “We kind of gave Africa to the Europeans first and to the Chinese later, but today it’s wide open for us," he said, according to the Washington Post.
“I’m excited about Africa,” Wal-Mart chief executive Doug McMillon said at the same discussion. “For us, it’s a long-term proposition. We invested $2.6 billion in 2011, and that’s just the beginning.”
But that is just what critics are worried about.
"If there is business as usual, we will continue to have a situation where people on whose land resources lie will be pushed further and further to the brink, left without health care, housing, education, or any means of benefiting."
—Emira Woods, ThoughtWorks"Strip away all the modern PR and prettified palaver and it’s an ugly scramble for oil, minerals, and markets for U.S. goods," writes John Feffer for Foreign Policy in Focus on Wednesday. "Everyone wants a piece of Africa: drooling outsiders, corrupt insiders, cynical middle men."
"What we are seeing are that the rules of the game have long been stacked in the favor of one percent: multinational corporations and CEOs and the local elites who do their bidding," said Woods. "If there is business as usual, we will continue to have a situation where people on whose land resources lie will be pushed further and further to the brink, left without health care, housing, education, or any means of benefiting."
In an analysis published last year, the World Bank found that Africa's economic growth and foreign investment over the past decade have failed to benefit a majority of people living on the continent, and deep poverty and inequality are “unacceptably high and the pace of reduction unacceptably slow.” The report predicts, "Almost one out of every two Africans lives in extreme poverty today," and by the year 2030, "a vast majority of the world's poor will be located in Africa."
Woods warned that that drive for investment from oil and gas extraction industries is especially dangerous for a continent that is already at the "epicenter of climate catastrophe." According to Woods, "Power Africa is very focused on accessing new sources of oil that have been discovered in and around the African continent without recognizing the long-term implications of continuing on a path of fossil fuels."
Woods emphasized that the push for U.S. investments, represented at the summit, takes place alongside the expansion of the U.S. military's AFRICOM, as well as weapons, across the country, furthering the destabilization and militarization of numerous communities. "Economic interests are bolstered by military power to reinforce the opportunity to fully extract resources," said Woods.
"What is needed now is a change to the status quo." |
A market in the Shujaiya district of Gaza City was attacked by Israel yesterday; at least 17 people were killed. Ashraf Amra APA images
Update
The US House of Representatives passed HR 107 on Wednesday afternoon, which condemns Hamas for using civilians as human shields—an accusations based solely on Israeli propoganda—and blames Hamas for the civilian carnage Israel has inflicted on the people of Gaza while praising Israel for warning residents to flee before flattening their neighborhoods.
By the time the bill passed, it had 102 co-sponsors—64 Republicans and 48 Democracts, though it’s impossible to know who voted in favor of the resolution since it was passed by voice vote.
The American Israel Public Affairs Committee (AIPAC), Israel’s premier lobbying organization in the US, agitated for and immediately applauded the resolution’s passage.
Originial article
Both houses of the US Congress are considering passing a resolution that condemns Hamas for using human shields despite not having any evidence to prove Hamas is employing this tactic.
Over the last 22 days, the Israeli army has deliberately bombed family homes, UN shelters, schools, places of worship, hospitals, water infrastructure and more, killing more than 1,300 Palestinians, 80 percent of whom have been civilians, including nearly 300 children.
In propaganda echoed by the US State Department, the Israeli government has repeatedly claimed that Hamas is using women and children as human shields to protect its weapons and rocket launchers, forcing Israel to massacre innocent Palestinians.
The only evidence Israel has provided for this unsubstantiated accusation is cartoon sketches.
But even The New York Times has conceded that “There is no evidence that Hamas and other militants force civilians to stay in areas that are under attack.”
The BBC’s Middle East editor, Jeremy Bowen, similarly declared, “I saw no evidence during my week in Gaza of Israel’s accusation that Hamas uses Palestinians as human shields.”
But Israel’s pathetic drawings are all the evidence US elected officials need to absolve Israel of responsiblity for war crimes.
Double standards
In the House of Representatives, Ileana Ros-Lehtinen, a Republican, introduced Resolution 107 on 16 July, “Denouncing the use of civilians as human shields by Hamas and other terrorist organizations in violation of international humanitarian law.” With 76 co-sponsors — 47 Republicans and 29 Democrats — the bill is awaiting consideration in the House’s foreign affairs committee.
On 24 July, an identical resolution was introduced in the Senate by Ted Cruz, a Republican, and co-sponsored by Kirsten Gillibrand, a Democrat.
Like the House bill, the Senate version slams Hamas for “placing its underground tunnel network and missile batteries in densely populated areas, and in and around schools, hospitals, and mosques” and “calls on the international community to recognize the grave breaches of international law committed by Hamas in using human shields.”
Besides ignoring the fact that all of Gaza is densely populated, this accusation fails to address that Israel also places its military command centers among civilian populations, most notoriously HaKirya, the Israeli army headquarters, which is located in the heart of densely populated Tel Aviv, surrounded by malls, museums, hospitals, schools and so on.
Perhaps one day Israel will be held to the same standards as Hamas by US elected officials, but for now it appears the “most moral army in the world” can do as it pleases.
The bill goes on to condemn some 2,000 rockets fired by Hamas at Israel but makes no mention of the more than 3,000 tons of precision-guided explosives that Israel deliberately dropped on Gaza’s civilian population and infrastructure in the first fifteen days of this onslaught.
Praising Israeli “warnings”
Next, the bill praises Israel for warning Palestinians in advance with leaflets and text messages before obliterating their neighborhoods, though it neglects to note that the people of Gaza have nowhere safe to evacuate to, given that they are prevented from leaving the tiny coastal enclave, where nothing, not even hospitals, is off limits for Israeli bombs.
Still, the bill declares that Israel “goes to extraordinary lengths to target only terrorist actors,” which suggests that the bill’s authors believe hospitals, playgrounds, family homes and UN schools sheltering the displaced (at least six have been shelled by Israel) qualify as “terrorist” targets.
Most outrageously, the bill equates Hamas with al-Qaida and the Islamic State of Iraq and the Levant (ISIL).
Hamas is the Palestinian political party that was democratically elected in 2006 to govern the occupied West Bank and Gaza. It also happens to have a military wing engaged in armed resistance against the State of Israel, a state that has been ethnically cleansing Palestinians from their indigenous lands for nearly seventy years, in what amounts to “incremental genocide,” according to the Israeli historian Ilan Pappe.
Likening Hamas’ armed resistance to a rogue sectarian militia that is slaughtering civilians in Syria and Iraq is utterly absurd and irresponsible propaganda that only the most extreme of Israel’s supporters are spreading.
Israel should be condemned
Ironically, it is Israel that has a well-documented history of using Palestinian civilians, including children, as human shields. In what is referred to as “the neighbor procedure,” Israeli soldiers force Palestinian civilians to approach armed suspects and homes potentially rigged with explosives to protect the lives of soldiers.
Israel was condemned by the United Nations as recently as last year for its “continuous use of Palestinian children as human shields and informants.”
More recently, Palestinian civilians have accused Israeli forces of using them as human shields in the Khuzaa neighborhood in Gaza, which has been the site of heavy shelling.
If anyone should be condemned for using human shields, it is clearly Israel.
Nevertheless, the US Senate has already unanimously passed two resolutions reaffirming America’s unconditional support for Israel’s right to carry out massacres in Gaza.
Meanwhile, the US was the only nation to vote against a United Nations inquiry into possible Israeli war crimes in Gaza. |
Italy Earthquake: Hope For Survivors Fades As Death Toll Climbs To 267
An increasingly forlorn search for victims of the earthquake that brought carnage to central Italy entered a third day Friday as the confirmed death toll climbed to 267.
Releasing the new count, Immacolata Postiglione, head of the Civil Protection agency’s emergency unit, indicated there had been no survivors found overnight in any of the remote mountain villages devastated by Wednesday’s powerful pre-dawn quake.
At least 367 people have been hospitalised with injuries but no one has been pulled alive from the piles of collapsed masonry since Wednesday evening.
As hundreds of people woke from a second night sleeping in cars or hastily erected tented villages, the area was rocked by a 4.8 magnitude aftershock just after 6:00 am (0400 GMT), underlining the perilous nature of a rescue effort involving more than 4,000 emergency service staff and volunteers.
More than 900 aftershocks have rattled the region since Wednesday’s 6.0-6.2 magnitude first one triggered the collapse of hundreds of ill-prepared old buildings across dozens of tiny communities playing host to far more people than usual because of the summer holidays.
Many of the survivors camping out in the tents were carrying plastic bags containing the handful of possessions — clothes, ID documents, phones and wallets — they had been able to grab before fleeing their homes in terror.
Over a dinner provided by an emergency cell of an Italian chefs’ organisation on Wednesday evening, one survivor told how close she had come to being trapped in a house in the tiny hamlet of Illica.
– Dawn shock –
“I managed to get out alive because I found a hole in the wall and managed to make it bigger and I made it out onto a roof and walked across until I got to a terrace and managed to get down from there,” said Elisa.
“We shared clothes, there were people going around with one slipper on, those who were basically naked until 11:00 am.
“When dawn came it was devastating because then we really understood what the damage was, and that there were people who couldn’t be found, who were missing, who were dead.”
Italian Prime Minister Matteo Renzi has declared a state of emergency for the regions affected by Wednesday’s quake, which occurred in an area that straddles Umbria, Lazio and Marche.
Renzi also released an initial tranche of 50 million euros ($56 million) in emergency aid.
Quake experts have estimated that the cost of the short-term rescue effort and mid to longer-term reconstruction could exceed a billion euros.
There are also fears of a negative impact of an already stagnating Italian economy.
Past experience indicates that quakes always have a negative impact on tourism for the whole country in which they occur.
Tourism is particularly important to Italy, contributing around four percent of its GDP.
At least eight foreigners were among the dead, according to media reports and updates from foreign ministries.
Rescue workers were notably still trying to clear the wreckage of the Hotel Roma in Amatrice, where 32 people were staying on the night of the quake.
– Foreigners among dead –
British media, citing an official in Amatrice, said three Britons had died, including a 14-year-old boy.
Romania reported two of its nationals, who were resident in Italy, had died. Spain, Canada and El Salvador all said that one of their citizens had perished.
Renzi’s government and local authorities are now facing questions as to why there had been so many deaths in a sparsely-populated area so soon after a 2009 earthquake in the nearby city of L’Aquila left 300 people dead.
That disaster, just 50 kilometres (30 miles) south, underscored the region’s vulnerability to seismic events — but preparations for a fresh quake have been exposed as inadequate.
“Italy should have a plan that is not just limited to the management of emergency situations,” Renzi said.
He said that proofing centuries-old buildings against the risk of collapse in the event of a quake would be difficult but that more could be done.
Culture Minister Dario Franceschini said Thursday that some 293 historical buildings were damaged or destroyed by the quake, although the most important heritage sites in the region were unscathed.
A total of 215 people were rescued from the rubble in the immediate aftermath of the first shock. But there have been no reports of survivors being found since Wednesday evening’s rescue of eight-year-old Giorgia. She was saved 16 hours after being trapped, having been located by a labrador called Leo.
About Us
Xclusive Hit is an online media platform that provides exclusive news content across Nigeria. Trust us for real time updates on happenings in and all around your community.
Xclusive Hit is a new age online magazine where you get to read about every bit of updates in your immediate environment and beyond. Ranging from opinions to entertainment gist, metro news, political affairs, latest music and education. |
Verify that the wiki displays a text string 'Table of contents'
Create a page in a wiki with text and headers. Add text and headers until the wiki automatically create a TOC
Search for the string on the Language customization page (or in AMOS, lang.moodle.org)
Michael de Raadt
added a comment - 17/Jan/12 11:44 AM Thanks for reporting this.
I've put that on the backlog.
In the meantime feel free to help us work on this issue. If you are able to provide a patch, please add a patch label so we will spot it.
Eloy Lafuente (stronk7)
added a comment - 01/Jul/12 4:03 AM Integrated (21, 22, 23 & master), thanks!
PS: Note 21_STABLE is already out of support so we are stopping bug fixes to land there along the next days... |
A grey-haired woman in a t-shirt that says “free grandma hugs” is dancing to Lady Gaga’s Born This Way. She looks in my direction, makes eye contact, and walks toward me. I’ve never been one to participate in the free-hug movement because I’m particular with body contact. Don’t be a curmudgeon, I coach myself internally, Just hug her. I step forward with my arms open. She wraps herself around me. Her small body is round and soft.
It’s summertime. I’m in my hometown—the city of Prince George—for a family reunion. My visit happens to coincide with the city’s Pride festivities. In the company of my family, I’ve come downtown for the Pride parade. We’re standing on the sidewalk across the street from the pool where, a few decades previously, I learned how to swim. My dad and stepmom watch and smile. My sister cheers. My niece and nephew dart between floats to collect candy. By most metrics, this is a fun event.
My family doesn’t know it, but I’m fighting the urge to cry. This is my first time attending Pride in my hometown. It feels like a type of homecoming, a type of redemption. But the vibe is relaxed and if I start crying, well, that changes things. Cry later, I tell myself. The soft grandma hug, however, hasn’t made it easier. Under my dark sunglasses, I blink away a couple tears.
I’ve attended Pride parades in other cities, such as Montreal and Toronto, that were more like massive carnivals. The Prince George parade is minuscule in comparison, yet bigger than I expected. There are floats from the local university, the public library, the radio station, even a local coworking space. The town has a new gender clinic: trans teenagers dance in the back of a pickup truck. I’m impressed, gladdened. I got hugged, and it actually felt pretty good.
This is all wildly different from the town I grew up in—a town that I left behind 20 years ago.
*
I was 17 years old. It was my final semester of high school. The past few years hadn’t been horrible, but high school felt like a bothersome hoop that I was forced to jump through before being allowed to get on with the rest of my life. I arrived at school one morning, walked through the front doors and down the hallway. I stopped suddenly, several feet away from my locker. The word “FAG” was carved onto the door. I ran my fingers over the peeled red paint; it had the bumpy texture of a scar.
My stomach turned. This didn’t feel like random vandalism. This was not a coincidence. Throughout my years in high school, I had been on the receiving end of homophobic slurs, occasional hallway shoulder checks, and gym class harassment. Looking at the word FAG, I felt singled out. I felt detested. At that moment, however, I was not openly gay. I was not even silently gay. I didn’t know what my sexuality was. I was a kid trying to make it through high school, a poster boy for teenage survival mode.
The bell rang. I opened the locker, using the door to conceal the redness that had swept over my face. If this had happened earlier in my teenage years, I probably would have felt even more provoked, more disheartened. But now I was mere weeks away from graduation. I had survived high school. My world was about to open up exponentially.
I exhaled and grabbed my book. Then I closed my locker softly and went to class. Call me a fag, I really don’t care anymore. That’s what I remember thinking.
*
In many ways, my hometown is an emblematic Canadian city. It’s a working-class town, primarily supported by the forest industry. Citizens enjoy watching hockey and sipping double-doubles at the numerous Tim Horton’s coffee shops. As a teenager I stood out in this environment. I was captain of the volleyball team and active on student council. I made the honour roll and was well-liked by my teachers. Despite success across various domains, however, I was constantly failing in one vitally important area: I did not actively assert my maleness.
Prince George in the 1990s was a cauldron of toxic masculinity. Guys were expected to talk about sports or cars or hunting. We were expected to get shitfaced at pit parties. We were expected to have girlfriends or at least comment on girls’ bodies. Most importantly, we were expected to not show emotion. Indifference (at best) and brutality (at worst) were yardsticks of masculinity, and I did not measure up. When a popular guy at school died tragically in a drinking-and-driving car accident, I did what felt most appropriate: in the middle of math class I wept with the girls. My softness, my tears, even my goofiness—these things worked against me.
I was deemed a faggot by default.
At the end of twelfth grade, I attended my graduation ceremony at the Prince George Civic Centre. I won several awards, including Outstanding Graduate, an accolade presented to the one student who best exemplifies the potential of the graduating class. I was then nominated as the Prince George Youth of the Year. I mention these awards to highlight the discord of my teenage experience: to be celebrated in some realms and treated as less-than-human in others. The awards felt like superficial validation. At the time, I didn’t know how to articulate it, but now I understand: high school had felt like prison and I won Best Prisoner. Nobody wants that award. They just want out.
During the very last week of high school, I arrived to see that my locker had been repainted. Overnight a custodian has erased the word FAG from my world. Again, I looked at the locker, this time blank and smooth. I didn’t feel relief or exoneration. I felt the opposite. For a minute I considered carving the word back onto the locker in bigger, bolder letters—re-vandalizing as an act of reclamation. You tried to bring me down, but it didn’t work. Maybe I am a fag. What difference does it make? But I didn’t. I couldn’t be bothered.
Two days later, I emptied my locker and walked out the high school forever. Then I walked out of my hometown.
*
After the Pride Parade, I meet up with my friend Hilary to attend the evening’s festivities: a drag show and dance. The events are being held at the Prince George Civic Centre. It’s my first time back in the building since the graduation ceremony 20 years prior. Not much has changed—it still feels like a 1990s conference centre. But I’ve changed. I see it with different eyes now. It feels smaller than I remember, even somewhat charming.
A few hundred people are in the room. They sit on padded chairs at circular conference tables. Before the drag show gets underway, Hilary and I strike up a conversation with a man who is standing alone. He has a small beer belly, a mustache and hearing aids.
“This is fun. It’s nice to be here,” he says motioning around the room. He tells us that he lives in a small town a few hundred kilometres west of Prince George. He smiles as he talks. I sense that he’s eager to connect with people. After a few minutes, he mentions that being open about his sexuality has had mixed results. “My children don’t talk to me anymore.” He shrugs his shoulders. Hilary asks him to sit with us. He does.
The drag show is less like RuPaul’s Drag Race and more like a variety show: some drag queens and some burlesque performers, some singing and some dancing. During the final number, the audience rushes the stage to tuck five-dollar bills into a drag king’s G-string. Then the dance party begins. The setlist is somewhere between a wedding reception and high school dance. For me, this is perfect. I groove to AC/DC’s Thunderstruck—a local anthem—with a woman in her seventies. She wraps a pink boa around my neck and smiles the entire time. I’m smiling, too. In a way, I feel like I’m dancing myself back home.
*
Brain drain is the emigration of highly trained or intelligent people from a particular geographic area. A similar phenomenon happens with LGBT peoples in rural communities and small towns—“gay drain,” if you will. When queer folks don’t see a future in a community, they do one of two things. If they have the financial or social agency, they leave. If they don’t have money or social connections, they learn to protect themselves, and oftentimes this takes the form of shutting down or tuning out.
But some stay and refuse to wilt. These are the strongest ones.
In Prince George, some LGBT folks have chosen to stay, to build a community. They have refused to fade into the backdrop or be silenced, and they’ve subsequently altered the social fabric of the city, to rewire the city’s collective conscience. They are doctors and mail carriers, grocery store clerks and social workers. They’re refusing to be invisible. They each deserve an award.
Some incredible advancements have been made in LGBT visibility over the past 20 years, but the push towards social justice is certainly not complete. Transfolk continue to experience discrimination and hate. Queer folks of colour are wildly underrepresented in media. Indigenous queers face a complex intersection of race, gender, and colonial trauma. Gay men are still rejected from the most sacred spaces of masculinity (case in point: we don’t have an openly gay NHL player). Injustice is linked together—unless we are all free, none of us is truly free.
So, what is the best way forward? How do we continue to make advancements? The short answer: keep showing up. Go to the big-city Prides if you want. Have fun at the carnival of it all. But more importantly, go to the small-town Prides: listen to people’s stories, dance with people you wouldn’t typically dance with, offer a hug. At any time of year, you can donate dollars to community organizations that support queer youth or trans advocacy or reconciliation. Also, don’t assume anyone’s gender identity or pronouns. Most importantly of all, remind people they are welcome; not despite their difference, but because of it. Your hug—literal or metaphorical—sends an important message. It says, “Honey, it’s okay. You’re safe here now.” This is a message that everyone is entitled to hear.
And now that I’ve heard it, my hometown has never felt more like home.
Lead photo: Andrew Kurjata
More photos from Prince George Pride: D. Rigo Photography
Read this next: The Art of Wasting Time |
Abstract
This study is part of a larger research project on "Promoting Low-Carbon Transport in India", a major initiative of the United Nations Environment Programme (UNEP), hereafter referred to as the Low Carbon Transport (LCT) project in this document. The overall context in which the LCT project has been undertaken is the critical role of the transport sector in reducing greenhouse gas (GHG) emissions. India is currently the fourth largest GHG emitter in the world, although its per capita emissions are less than half the world's average. Furthermore, India's transport sector accounts for 13 percent of the country's energy related CO2 emissions. It is evident that opportunities exist to make India's transport growth more sustainable by aligning development and climate change agendas.
At present, India is pursuing a comprehensive set of policies to move the country to a low-carbon growth path. In 2009, India announced that it would reduce the emissions intensity of its gross domestic product (GDP) by 20 percent to 25 percent over the 2005 levels by the year 2020. Specific measures to attain these goals are also being developed through the national missions identified in the National Action Plan on Climate Change (NAPCC) of 2008. The NAPCC recognises that GHG emissions from transport can be reduced by adopting a sustainability approach through a combination of measures such as increased use of public transport, higher penetration of bio-fuels, and enhanced energy efficiency of transport vehicles. |
Taegu Broadcasting Corporation
The Taegu Broadcasting Corporation Hangul: 대구 방송() is a regional television and radio broadcasting company that is based in Daegu (Taegu), South Korea, and are eventually broadcasting as an affiliate of Seoul Broadcasting System (SBS). The station were originally established on August 10, 1994, and had first started its demo emissions, although it were later beginning its test transmissions on October 7, 1994, and then, it had officially commenced its official broadcasts on May 14, 1995.
Stations
Television
Channel - Ch. 15 (LCN 6-1)
Launched - May 14, 1995
Call Sign - HLDE-DTV
FM radio (Dream FM)
Frequency - 99.3 MHz (Daegu, Gyeongju, Gumi), 99.7 MHz (Pohang, Yeongdeok, Uljin), 106.5 MHz (Andong, Yeongju, Seongseo, Jisan, Beommul)
Launched - December 1, 1997
Call Sign - HLDE-FM
Tie-up stations
Hiroshima Home Television (Hiroshima, Japan; since 2002)
KCOP-TV (Los Angeles, United States; since 1995)
Shenyang Television (Shenyang, China)
See also
List of South Korean broadcasting networks
Communications in South Korea
SBS (Korea)
External links
Category:Seoul Broadcasting System affiliates
Category:Broadcasting companies of South Korea
Category:Media in Daegu
Category:Radio stations in South Korea
Category:Television channels in South Korea
Category:Media companies of South Korea
Category:Television channels and stations established in 1994
Category:Companies listed on KOSDAQ |
How Project Borealis uses Git for distributed workflows
Hello and welcome to our very first tech blog! During the development of Project Borealis we want to remain open and communicative, and while our Development Update videos aim to provide a high level overview of our progress, we wanted to take the opportunity to delve into some specifics from time to time. This is the first in what we hope will be a series of more technical blogs about the development of the game.
Today, we’d like to talk about how we’re collaborating on a large scale game project effectively in an entirely remote setting, while keeping costs at a minimum. We didn’t get this right on the first (or second) try, so we’ll first go over some of our less successful systems, what went wrong with them, and what we learned. Finally, we’ll detail our current setup and how it’s evolved to scale for a team of nearly 100 game developers working all around the world. Feel free to skip to the second part if you’d like to get right into the technical details on what we currently use, but we think the failures of our first attempts provide some useful context.
If at first you don’t succeed, try, try again…
In the first few days of our project, when Epistle 3 had just been published, things were hectic. We were effectively making a game development studio from scratch, and it had to be entirely remote. Game development is traditionally done at a physical studio, because of the large assets which are hard to transfer over the Internet, as well as many collaboration and iteration problems normally solved by being in the same room as people you’re working with.
Once the team had settled and we had made some larger decisions (like which engine to use!), we instinctively turned to Git and Git LFS (Large File Storage) to host our game repo.
Repo v1
We first settled on using GitLab.com. We were able to find Git LFS to store our art assets and GitLab.com provided storage for LFS for free. This worked well for a time, since our game repo was mostly code at that point -- our artists were working independently in their art tools and design was in the pre-production stage, so we didn’t have to worry about levels yet either. Programmers would branch off our main branch and submit pull requests (merge requests in GitLab). So far so good. Once artists began submitting assets, we just let them branch however they wanted and merge back in whenever they wanted. We hit some small road bumps, such as where artists were missing editor binaries to launch the game editor - programmers just instructed artists on how to install Visual Studio so they could compile it themselves. This system worked for the most part…but not very well. It was also not at all friendly to artists who weren’t familiar with these systems. But we faced a bigger issue than technical ease-of-use: repo size. GitLab.com was quite unstable at the time we were using it, and with larger repository sizes, it could cut out regularly, especially for new people cloning the entire repo. Team members were also required to download the entire project for their work, even when they didn’t need it all. In addition to this we were also quickly approaching the 10GB repo size limit with all the new art assets and initial levels being added. In an attempt to mitigate these issues we redesigned our repository structure. It was probably one of the worst technical decisions we made.
Repo v2
First, we split the repo into submodules, grouped by project type and then asset type. They were named Shared, for all core assets, Imported, for all Valve reference assets imported to Unreal Engine, Development, for any test assets, Ravenholm, for all tech demo specific assets, and Episode3, for all Episode 3 specific assets. Each of these groups had submodules for particles, models, materials, music, sound, etc. And this was all backed by a mandatory command line script called Icebreaker that would, at least theoretically, manage all these submodules for you. It sounded great and seemed like it would solve all of our problems, however it quickly became a convoluted nightmare.
The actual result was a whole host of bugs, technical issues, and confused artists, for very little benefit. Unfortunately we had backed ourselves into a corner with this system. The massive amount of submodules and the workflows being built around them were too unwieldy to use with anything else except for Icebreaker. So we dealt with it. Support requests went through the roof, and there was a lot of frustration with getting content into the repository. Ultimately it was a huge waste of time, but we couldn’t commit to changing as the issues piled up because we were getting closer to Development Update 4 and needed to show off Ravenholm. We couldn’t pause development to rework the repo until afterwards. After Update 4, our team took a well deserved break and programming was free to restructure the repo once more. And this time, we wanted to make a scalable and robust collaboration solution that was easy to use.
Repo v2: Episode 1
We had learned a lot from our previous repos and took a good look at where the problems were to see how we could best address them.
The first decision we made was to move to a self-hosted GitLab server. This was to avoid the downtime, and instability that had plagued GitLab.com, and to remove the repo size limit. This allowed us to have a unified repository again, which was a great first step.
Next, we wanted to address the “anything-goes” branching structure which had caused so many of merge conflicts (where people modify the same file, and the changes from one version can’t be kept), as well as general confusion from our artists. A formal branch structure document was made, complete with full software lifecycle details, merge policy and schedule. We created a dev branch from which programmers created branches, a master branch which contained the latest generally stable code ready to be used by to creatives, and then content branches from master. After a short time, we realized that we were not getting much value out of git flow for creatives and thus just made a content-main branch which all creatives pushed to and pulled from directly, and it would be merged to master for stable game build releases. Ultimately, this structure wasn’t as efficient as it could be at managing where changes flowed in preparation for a game build release.
On the hosting side, we managed a distributed object storage network with some edge server caching through CloudFlare for LFS objects which had become the majority of our bandwidth. We also made use of Argo Smart Routing to cut down on latency for requests, mainly for file locking. This increased speeds by a lot, but we were still being bottlenecked by bandwidth on git object updates and diffing on our self hosted server. It was also a lot of new infrastructure to maintain ourselves.
Finally, for tools, we started out with a simple batch script for pulling the latest from the repo, updating our custom engine with ue4versionator, and launching the project. The rest of source control (checking out files, committing, pushing) was done in the UE4 Git plugin, to which we added a hack to for parallel locking to speed up check out operations within the editor instead of locking one by one using our Git LFS fork, as well as a few other improvements. However, that simple batch script got unwieldy over time as we matured our source control workflow to cover common problems, streamline getting the latest changes, and manage binary dependencies. Thus, PBSync and PBGet were born.
Our solution to highly distributed game development
Repo v3
Third time’s the charm. For our final repository iteration, we created PBSync and PBGet (now open source!) to scale to our demands for a complete solution for repository and dependency management.
PBSync is a robust, battle-tested set of Python scripts which assist users in syncing the project, handling source control edge cases, updating binaries, restoring bad repositories to a good state, deploying game builds, and much more! This came about when our previous batch scripts became too unwieldy for us. Now, we sync project editor DLL binaries through Nuget, rather than in source control. This keeps our source control lighter, and uses a package manager for what it was made to do: handling binary packages. We are also able to maintain complex logic and edge cases to streamline project syncing even in bad repository states and fresh clones, with guided setup.
PBGet is an underlying framework for working with Nuget to download packages, which are linked to their expected location for UE4 using junctions. It also allows programmers to bump our project version, and push new source files to Nuget.
But having a programmer manage all of that wouldn’t work at scale, so using these robust tools, we were able to create an entirely automated Continuous Integration system which assists us in these pipelines and source control flows. We currently use TeamCity to automatically build binaries and merge changes for creatives to use on their own branch, and to sync content changes back to the programmer development branch. Code feature branches are automatically statically analyzed, and we also run a style check and Doxygen build with linting. This ensures that code review doesn’t miss any small changes and we have our rules enforced to maintain a clean and well functioning code base.
As a side note, we also migrated our repository to GitHub from our self-hosted GitLab, to ease up some maintenance pressure on our end, and to relieve some performance concerns by taking advantage of GitHub’s great engineering efforts to create a reliable and efficient distributed source control infrastructure. This was largely a straightforward process thanks to Git’s decentralized nature.
Finally, we adjusted our git config to take advantage of upcoming performance features and usability enhancements to further make game development on git fast and easy. We use the commit graph for optimizing many local operations, watchman as a git filesystem monitor to passively monitor file changes, and many more optimizations for repositories with many files. We also use rebasing for our project default pull method, so that there are not lock conflicts in merge commits, and it also makes it easier and cleaner for creatives to make sure they’re on the latest changes.
All of this together made for an overwhelmingly positive response. Programmers and creatives alike love the system we have built, and find it to be streamlined and pain free! Our stats reflect this: tech support tickets have gone down by over 95%! So now we are left with a high speed, low latency source control that works with our repository with over 14,000 files totalling over 28GB for an entirely remote team distributed around the world from California to Germany to New Zealand.
We’ll talk more about our build pipeline (up to game build releases) and merge policies in a future post, but until then, you can view our new project wiki, where we're publishing some internal documents about our source control. Stay tuned for that on our Twitter, and feel free to ask questions on our Discord.
And as a bonus for making it to the end of the blog, we have a new video up, which visualizes our project repository’s long and rich history through Gource! |
CONTACT PHOENIX ROOFING
FOR COMMERCIAL ROOF REPAIR, RESTORATION, REPLACEMENT & ASSESSMENT
Phoenix is there for you.
We give roofs new life. Whether you need an emergency repair or a full roof replacement, Phoenix Roofing can maximize the life expectancy of your commercial roof. Protect your building—contact us today. |
N-oleoyl-dopamine decreases muscle rigidity induced by reserpine in rats.
N-oleoyl-dopamine (OLDA), a product of condensation of oleic acid and dopamine (DA), is a bioactive compound that crosses the blood-brain barrier after systemic administration. The possibility arises that OLDA could have a potential role in treating DA-related disorders, such as Parkinsons disease (PD). In the present study we seek to determine whether OLDA would affect muscle tone and akinesia in two rat models of PD: the reserpine-evoked muscle rigidity and the reserpine- and haloperidol-induced catalepsy. We found that OLDA (20 mg/kg) significantly decreased muscle rigidity induced by reserpine (2.5 mg/kg), measured as an increased mechanical muscle resistance (MMG) in response to a passive extension and flexion of a rat hind limb at the ankle joint. Moreover, OLDA potently decreased the reserpine-enhanced tonic and reflex electromyographic (EMG) activities recorded before and during the movement, respectively. A lower dose of OLDA (10 mg/kg) failed to have appreciable effects. The reference compound L-DOPA (25 mg/kg) also attenuated the reserpine-increased MMG and EMG activities; the effects were, however, observed much later and were less prominent than those characteristic of OLDA. In contrast to the effects on muscle tone, OLDA (20 and 40 mg/kg) did not influence catalepsy induced by either reserpine (1.25 mg/kg) or haloperidol (0.5 mg/kg). In conclusion, the study demonstrates a novel biological action of N-oleoyl-dopamine consisting of lowering the reserpine-induced muscle rigidity. However, the lack of influence on akinesia suggests that the compound has myorelaxant rather than anti-Parkinsonian properties. |
Sen. Jeanne Shaheen Cynthia (Jeanne) Jeanne ShaheenSenate Democrats introduce bill to sanction Russians over Taliban bounties Trump-backed candidate wins NH GOP Senate primary to take on Shaheen Democratic senator urges Trump to respond to Russian aggression MORE (D-N.H.) said on Tuesday that she will oppose CIA Director Mike Pompeo Michael (Mike) Richard PompeoOvernight Defense: Pentagon redirects pandemic funding to defense contractors | US planning for full Afghanistan withdrawal by May | Anti-Trump GOP group puts ads in military papers Overnight Defense: House Democrats unveil stopgap spending measure to GOP opposition | Bill includes .6B for new subs | Trump issues Iran sanctions after world shrugs at US action at UN Navalny calls on Russia to return clothes he was wearing when he fell ill MORE's nomination to be secretary of State, appearing to leave him short of winning a majority of the Foreign Relations Committee.
"After careful consideration, I cannot support Director Mike Pompeo’s nomination to serve as Secretary of State,” Shaheen said in a statement.
Shaheen added that she has "deep concerns regarding Mr. Pompeo’s past statements and policy views, particularly in regards to the LGBTQ community, American Muslims and women’s reproductive rights."
Shaheen's announcement comes as Sen. Bob Corker Robert (Bob) Phillips CorkerHas Congress captured Russia policy? Tennessee primary battle turns nasty for Republicans Cheney clashes with Trump MORE (R-Tenn.) wants to hold a vote on Pompeo's nomination in the Foreign Relations Committee next week.
ADVERTISEMENT
To get a favorable recommendation from the panel, a majority of its members would need to vote for Pompeo's nomination.
But that appears increasingly unlikely. GOP Sen. Rand Paul Randal (Rand) Howard PaulSecond GOP senator to quarantine after exposure to coronavirus GOP senator to quarantine after coronavirus exposure The Hill's Morning Report - Sponsored by National Industries for the Blind - Trump seeks to flip 'Rage' narrative; Dems block COVID-19 bill MORE (Ky.) has said he will oppose the nomination.
Republicans hold a one-seat majority on the panel, meaning Pompeo would need to pick up at least one Democratic vote to be reported to the Senate floor favorably.
Shaheen and Sen. Tim Kaine Timothy (Tim) Michael KaineButtigieg stands in as Pence for Harris's debate practice Trump meets with potential Supreme Court pick Amy Coney Barrett at White House Names to watch as Trump picks Ginsburg replacement on Supreme Court MORE (Va.) were the only Democratic members of the panel to support Pompeo's nomination to be CIA director and were viewed as his best chance to pick up support from Democrats during his committee vote.
But Kaine announced earlier this week that he would oppose Pompeo.
Shaheen added on Tuesday that she appreciates "his willingness to serve and his dedication as Director of the CIA" but "the secretary of State is a policy-making position."
Though several liberal members of the panel have come out against his nomination, a few Democrats — including Sen. Bob Menendez Robert (Bob) MenendezKasie Hunt to host lead-in show for MSNBC's 'Morning Joe' Senators ask for removal of tariffs on EU food, wine, spirits: report VOA visa decision could hobble Venezuela coverage MORE (D-N.J.), the ranking member — have yet to say how they'll vote.
Corker noted that he wasn't sure how a couple of Democrats on the panel would vote and declined to specifically say he would send Pompeo's nomination to the floor regardless of the vote outcome.
But Republicans are expected to give Pompeo a vote before the full Senate even if he doesn't win over support from a majority of the committee. |
You will need to sign on with your LLLID (La Leche League ID) before you can post. If you have never claimed your LLLID, create your LLLID now. To sign in, click the LLLID Sign On button in the upper right corner. Enter your LLLID Alias and click the button again.
Slowest flow nipples? Glass bottles?
I'm going to be returning to work in a couple weeks, so DS will be bottle-fed EBM during the day. He's already has the occasional bottle in preparation, but drinks them down way too fast! DH tries to slow him down with frequent pauses, but DS HATES that and yowels like a feral child. I love GLASS, but the newborn flow on my glass Avents seems way too fast. I've switched it up with the Medela bottles, which do seem better (but not glass, oh well). The Medelas are also convenient since my plan is to pump what I need for the next day directly into them (crosses fingers that I have enough supply). Can I do better though? Which slowest-flow nipple brands do you like? Any glass bottle brands with slower flowing nipples than the Avents? Anyone try the nipples for Lifefactory bottles?
Re: Slowest flow nipples? Glass bottles?
Thanks auderey. I was just looking into the evenflo as they're compatible with medela PIS... And cheap! Anyone know if nuk nipples are compatible with them? Also, do you know if the medela bottle caps fit on the evenflo bottles? I have a bunch of nice ones that allow you to indicate the day of the week they were pumped and I'd love to still use them.
Re: Slowest flow nipples? Glass bottles?
You can check your nipples to make sure they aren't worn out or the wrong flow speed. Hold the nipple upside down and run some water into it. Slow flow nipples should drip about one drop per second. If it's going too fast, replace them.
“We are not put on earth for ourselves, but are placed here for each other. If you are there always for others, then in time of need, someone will be there for you.”
--Anonymous
Re: Slowest flow nipples? Glass bottles?
I spent a LOT of time trying to figure this out! I wanted glass, not expensive, compatible with my PISA and with a wide-base, slow flow nipple. The system we ended up with, which has worked very well, is the Evenflo glass bottles coupled with the Medela wide-base nipple and ring. They were the widest base nipples that I could find that fit on a regular (not widemouth) bottle. And the Evenflo bottles are great--very sturdy, cheap. We have 12 of them. I pump directly into the Evenflo bottles hooked up to my PISA. I use the yellow Medela caps for storage. I am positive your caps will work. It's been a good system and I've never had one break or leak.
Re: Slowest flow nipples? Glass bottles?
Also, I want to add, if you are like me and benefit a lot in terms of your stress level when you're able to streamline annoying chores like washing bottles and pump parts, and if you're not averse to spending a little more money on your pumping setup... I would like to recommend buying 5 full sets of pump parts (if you work 5 days/week). I wish I had done this when I first went back to work. I had 2 sets, one that came with my pump and one that I got in the hospital when my baby wasn't latching well and they had me pumping. Then after forgetting my pump parts 2x at home and buying more, I ended up with 4. And I finally bought a 5th set just to get to 5. Now, I bring all 5 sets into work with me on Monday morning and I never wash pump parts on weeknights or have to remember to bring parts with me in the morning. I pack them in a mesh lingerie bag with a zipper and carry that in a tote bag. I just use a set during the day, bring it home with me at night, throw them into a tub and then on the weekend I soak them for a few hours and then wash them in hot soapy water. I also leave my pump at work. It's removed a LOT of the burden of pumping for me. I bring my ice pack and cooler to tote my milk home in, but that's it. Like I said, I wish I'd done this from the beginning! It's a bit of an investment in a lot of otherwise useless plastic, but I hope I can use it all for baby #2 and even if not, it is worth it to me.
Re: Slowest flow nipples? Glass bottles?
yes, we never had any trouble. honestly, i was worried with all the talk i hear of all these incompatible bottles and threads and everythign - but i never once had a problem.
Perfect!
Originally Posted by @llli*still.here
You can check your nipples to make sure they aren't worn out or the wrong flow speed. Hold the nipple upside down and run some water into it. Slow flow nipples should drip about one drop per second. If it's going too fast, replace them.
All the nipples are new (rarely used) and size 1. I tested them like you suggested and while the Avent nipple was a drop per second, the Medela was definitely faster. Interesting because DS guzzles the Avent bottles down faster.
Originally Posted by @llli*sprocket
I spent a LOT of time trying to figure this out! I wanted glass, not expensive, compatible with my PISA and with a wide-base, slow flow nipple. The system we ended up with, which has worked very well, is the Evenflo glass bottles coupled with the Medela wide-base nipple and ring. They were the widest base nipples that I could find that fit on a regular (not widemouth) bottle. And the Evenflo bottles are great--very sturdy, cheap. We have 12 of them. I pump directly into the Evenflo bottles hooked up to my PISA. I use the yellow Medela caps for storage. I am positive your caps will work. It's been a good system and I've never had one break or leak.
I'm thinking Evenflo is where it's at! I just took a chance and ordered 2 packs of 3.
Originally Posted by @llli*sprocket
Also, I want to add, if you are like me and benefit a lot in terms of your stress level when you're able to streamline annoying chores like washing bottles and pump parts, and if you're not averse to spending a little more money on your pumping setup... I would like to recommend buying 5 full sets of pump parts (if you work 5 days/week). I wish I had done this when I first went back to work. I had 2 sets, one that came with my pump and one that I got in the hospital when my baby wasn't latching well and they had me pumping. Then after forgetting my pump parts 2x at home and buying more, I ended up with 4. And I finally bought a 5th set just to get to 5. Now, I bring all 5 sets into work with me on Monday morning and I never wash pump parts on weeknights or have to remember to bring parts with me in the morning. I pack them in a mesh lingerie bag with a zipper and carry that in a tote bag. I just use a set during the day, bring it home with me at night, throw them into a tub and then on the weekend I soak them for a few hours and then wash them in hot soapy water. I also leave my pump at work. It's removed a LOT of the burden of pumping for me. I bring my ice pack and cooler to tote my milk home in, but that's it. Like I said, I wish I'd done this from the beginning! It's a bit of an investment in a lot of otherwise useless plastic, but I hope I can use it all for baby #2 and even if not, it is worth it to me.
This is a great idea! I was actually stressing about having to clean on top of pump during my already BUSY schedule. My friend hooked me up with a spare pump that I need to order parts for. I already decided that will be my weekend pump and I'll use the newer one at work. I think I'll order extras for work!
So, with the Evenflos I also went ahead and ordered Dr. Brown's preemie nipples, with the hope that it'll take DS longer to feed. The size 1s all seem way too fast. At least nipples aren't *too* expensive, so if they don't work out I'll keep looking.
Re: Slowest flow nipples? Glass bottles?
buying all the pump parts in multiple is a great idea, sprocket! i don't know how you got by with 12 bottles - we probably have 4 or 5 dozen! but then i froze in them a lot. anway, extra bottles also cut down on the weekday washing.
Re: Slowest flow nipples? Glass bottles?
Ha! Good point. I also had a bunch of the small (2.5oz?) cylindrical medela bottles from when I was pumping in the hospital. So I would bring those with my pump parts and glass bottles and put one of the plastic ones on my left side (which I never pump more than 1-2 oz from) and the Evenflo bottle on my right and then pour it all into the glass bottle at the end. There was a few weeks there where I was pumping more than the 5 oz that the Evenflo bottles would hold, so occasionally I would come home with some in the plastic bottles too but not usually. I only froze milk in the bags. I mostly wanted glass because I didn't want to have someone heating plastic bottles, but I was OK with freezing in the storage bags. But I can understand wanting to avoid plastic altogether, too. Anyway, we keep 2 bottles at daycare so I really only have 10! But I only ever pump 2x per day because I nurse at lunch time so I will use 2 bottles per day for 5 days without washing. So yeah, if you routinely pump larger volumes, 3-ish times per day and want to have some for storage, 4-5 dozen sounds about right they are cheap enough, anyway! |
*Dear Editor,*
The article by Ahmadi et al. documented that boys affiliated more with deviant peers, experienced higher rates of riskier sex and lower levels of parental monitoring compared to girls among a sample of 1266 Tehran students. Additionally, the authors reported direct relationships between parental monitoring and sexual risk behaviors. Finally, results provided evidence that negative peer norms mediated the relationship between parental monitoring and sexual risk behaviors ([@A14815R1]). Taken together, these findings make important contributions to the extant literature, corroborating earlier findings ([@A14815R2], [@A14815R3]) and articulating important gender differences that warrant further study. The literature on youth development often supports multiple perspectives on the trajectory of youth problem behaviors. One common perspective asserts that the influence of parental figures diminishes while that of peers increases. Another posits that the significance of negative peer influences only increases to the extent that strong parental monitoring functions are absent. The findings of this study reinforce these two perspectives and support their accuracy, at least among this population.
However, not unlike many scientific studies, these findings seem to present more questions than definitive answers. First, there were no clear temporal stems for major study variables (i.e. parental monitoring, negative peer norms, or sexual risk behaviors). Therefore we do not know the temporal ordering of these variables and it is likely that many of the significant relationships in this study are bidirectional. For instance, it is plausible that engaging in risky sexual behaviors may draw youth into cohorts of peers who endorse drug and alcohol use or vice-versa. More importantly, cross-sectional studies like this one are limited in their ability to tease out temporal orderings or infer causal inferences. Given the methodological limitations of cross-sectional approaches, I find it highly unorthodox when the language of 'prediction' is associated with findings based on this method. However, notwithstanding these limitations, cross-sectional findings are highly valuable in establishing the existence of important relationships prior to developing costly longitudinal studies, which might then clarify temporal associations.
As the authors noted, there are few studies that have examined the dynamics of sexual risk-taking, peer influences and parental monitoring in Tehran. Consequently, the significance of this study is timely. However, it remains unclear when this study was conducted as dates are not included. The authors mention that "4.5% of \[teens\] reported distress in the structure of their family;" although it is unclear what this distress refers to, such language suggests that important additional variables were collected in this survey. Using a broader ecological perspective, it would be intriguing to explore how community-level factors (e.g. community violence exposure or distress, gender roles and expectations and/or other cultural constructs) might impact parental monitoring and the pathways to risk explored in this study. In addition, given that the results of separate structural equation models were not reported in this study, nor was gender treated as a covariate, it is unclear whether to pathways to risk noted in this study were in fact gendered. Increasingly, research is documenting that although adolescent males and females may engage in similar types of risk behaviors, though at times to varying degrees, the mechanisms to such behaviors are often gendered ([@A14815R4]). Based on these study findings, and given the unique gender and cultural scripts present in Tehran, there is still much to learn about the trajectories of youth problem behaviors in this region.
There is no acknowledgement.
**Financial Disclosure:**
There is no conflict of interest.
**Funding/Support:**
This letter did not receive any fund.
|
Q:
SOQL Relationship issues
I am trying to write a SOQL query to pull out a number of items from 3 Objects - Contact, Account and Case.
I have the following code:
SELECT id, accountid, contactid, contact.primary_contact__c FROM case WHERE contact.Phone = '+6491234567' order by contact.primary_contact__c asc
Which returns a result if the Contact has an open Case related to them.
However, I'm trying to do an equivalent of a SQL Join - whereby I get NULL values and pulling from the Contact object:
SELECT id, accountid, primary_contact__c, (select id from case) FROM contact WHERE Phone = '+6491234567' order by primary_contact__c asc
(So the query will always return the ID of the Contact, the Account ID, etc. and if there is a case assigned against that contact, the case ID)
However the second query does not work - I know that the Relationships exist (otherwise the first query would not work) however, I'm not sure what I'm doing wrong here.
A:
This is because the child relationship name is wrong in 2nd query, while writing inner query for case it should be like from cases, it should not be from case
I tried as below and it did work for me
SELECT id, accountid, primary_contact__c, (select id from cases) FROM
contact WHERE Phone = '+6491234567' order by primary_contact__c asc
|
Citation
========
Montesanto G (2015) A fast GNU method to draw accurate scientific illustrations for taxonomy. In: Taiti S, Hornung E, Štrus J, Bouchon D (Eds) Trends in Terrestrial Isopod Biology. ZooKeys 515: 191--206. doi: [10.3897/zookeys.515.9459](10.3897/zookeys.515.9459)
Introduction
============
Aiming to express a concept or convey a message, the use of a picture is certainly a clearer and understandable way compared to a text-only description. Images help reading a text and explain immediately what that text would represent. In biosystematics, descriptions of new plant and animal taxa are always combined with figures and plates in order to illustrate the anatomical parts and body details. Such figures are of great value for species identifications. Line drawings are normally used for many species descriptions. They can be produced by inexpensive means (ink and paper), as stated in the Council of Biology Editors' guide, *Illustrating Science*: "A good pen and ink drawing is pleasing, informative and reproduces well, even on poor grades of paper". The drawings should be organized to highlight the characters and their details. However, each figure should not be cluttered with too much detail, and there should be a pleasing balance between lines and white space ([@B31]). When line drawing a body part, one usually makes it larger than requested by the size of the journal page in order to highlight details. The reduced final size will look sharper and small imperfections will usually be minimized ([@B32]). Further notes on the preparation of illustrations for taxonomic papers are discussed in [@B12].
Taxonomists need images of good quality in describing taxa. As a rule, drawings are better detailed than stereo or light microscopes photographs since some details, which are often barely visible in a photograph, may be highlighted. When using photographs, focusing a complete detail requires many photos at a high level of magnification. Then, by using an appropriate software, it is afterwards possible to combine all the images, although the resulting quality is considerably low and require further processing steps.
Nowadays, only digital figures (drawings or photographs) are accepted by the most important taxonomic journals. The traditional way to generate high quality figures and plates for taxonomic papers, is to make pencil drawings first and then ink with high precision technical pens, which normally use capillary cartridge and different line widths. The single figures are then settled on a sheet of paper and each plate is scanned to a digital format. This method is sufficiently quick but may produce imperfect lines or gaps.
Digital drawing techniques that use vector graphics have already been described in literature to support scientists in drawing figures and plates for scientific illustrations ([@B6], [@B8]); these techniques use a range of software packages and various hardware devices, such as digitiser boards or digital graphic pens.
The GNU Project (GNU is a recursive acronym meaning "GNU's not Unix") is a mass collaboration project of free software. Software that have been developed under the GNU Project guarantee these freedom-rights legally (via its license), and are therefore free software. GIMP is an acronym for GNU Image Manipulation Program. The GIMP is suitable for a variety of image manipulation tasks, including photo retouching, image construction and composition. GIMP can be used as a simple paint program, or as an expert quality photo retouching program, or again as an online batch processing system, a mass production image render, an image format converter, etc. (GIMP documentation is available at: <http://www.gimp.org/>). GIMP is freely available from many sources for many operating systems. Most GNU/Linux distributions include the GIMP as a standard application. The GIMP software application is covered by the General Public License (GPL).
The purpose of this methodological work is to describe a new digital drawing method using GIMP software that helps the taxonomist in making high quality line drawings. This method was developed on drawings of terrestrial isopods for taxonomic papers. Some examples are here given.
Method
======
First of all GIMP has to be installed on a computer. Notes about installing GIMP on your computer are reported on the official GIMP website at the following URL: <http://www.gimp.org/docs/>. GIMP version 2.8.14 on a Mac computer (Mac Mini, late 2013, with Mac OS 10.10.1) has been used to illustrate the procedures of this paper.
The pencil drawings that need to be digital traced must be saved in a digital file or directly digitized in a Portable Document Format (a common PDF file).
Preparing the workspace
-----------------------
In order to prepare the window visualization at first access after the GIMP installation, all the panels that are shown should be closed. Only the "Toolbox" and the Dockable Dialogs "Layers" and "Tool Options" will be used and kept on screen:
Windows \> Toolbox
Windows \> Dockable Dialogs \> Layers
Windows-\> Dockable Dialogs \> Tool Options.
Now the workspace should be arranged as reported in Fig. [1](#F1){ref-type="fig"}, with Image window (Fig. [1A](#F1){ref-type="fig"}) and three floating windows: Toolbox (Fig. [1B](#F1){ref-type="fig"}), Tool Options (Fig. [1C](#F1){ref-type="fig"}) and Layers (Fig. [1D](#F1){ref-type="fig"}). In the Toolbox select black and white for the Foreground and Background colours (Fig. [1E](#F1){ref-type="fig"}).
{#F1}
Using different versions of GIMP or different operative systems the toolbox and the two Dockable Dialogs are sometimes covered by the Image window and not visible as front windows. In GIMP for Windows OS you can change this setting from: Edit \> Preferences \> Window Management. In Mac OS from: GIMP \> Preferences \> Window Management (Fig. [2A](#F2){ref-type="fig"}). To have the toolbox and the other windows always on top of the screen change the Hint for the toolbox from 'Normal Window' to 'Utility Window'. You will be asked to restart GIMP in order to make changes effective.
{#F2}
Step-by-step instructions
-------------------------
The user can follow the instructions of the present method according to two different levels of difficulty: beginner and advanced. Beginners are suggested to start testing the former method and then move to the advanced level once they have gained some experience.
Beginner level
--------------
1. Open the file that contains the pencil drawings: File \> Open
(with PDF files, set the resolution at 300 pixel/in) (Fig. [2B](#F2){ref-type="fig"}).
2. Create a new layer with a white background:
Layer \> New Layer
(Layer Set "White" as Layer Fill Type) (Fig. [2C](#F2){ref-type="fig"}).
Set the opacity of this new level to 60--80 in the Layers window.
3. Create another new layer for the first trace: Layer \> New Layer
(Set "Transparency" as Layer Fill Type).
4. Choose the brush left clicking on "Paintbrush Tool".
On the "Tool Options" window, click on the square icon labelled "Brush" (Fig. [2D](#F2){ref-type="fig"}).
Choose the brush No. 2. "Hardness 075".
Set the "Size" to 3-5 points (Fig. [2E](#F2){ref-type="fig"}). Adjust the zoom level to 400--800%
5. Start drawing (see the "How to draw" section).
6. Once finished, set again the opacity of the "White" layer to 100, and the opacity of this first trace layer to 20--40, in order to better see the second trace.
7. Create another new layer for the second trace: Layer \> New Layer
(Set "Transparency" as Layer Fill Type).
8. Start drawing in this new layer, following only the lines in the first trace. Remember to set the brush size to 5--7 points and to adjust the zoom level to 800--1100%.
Advanced level
--------------
1. Open the file that contains the pencil drawings: File \> Open
(with PDF files, set the resolution at 300 pixel/in)
2. Create a new layer for the trace: Layer \> New Layer
(Set "Transparency" as Layer Fill Type).
3. Choose the brush: click on "Paintbrush Tool". On the "Tool Options" window click on the square labelled "Brush". Choose the brush "2. Hardness 075". Set the "Size" to 5--6 points.
4. Start drawing (see the "How to draw" section), following the lines of pencil drawings.
How to draw (with a mouse)
--------------------------
- Set the zoom level to 400--800% for the first trace, 800--1100% for the second (or at advanced level);
- choose an appropriate starting point (e.g. a corner or an intersection);
- choose the brush tool with the right size (see above) and do a first click with the left button (Fig. [3C](#F3){ref-type="fig"}) at the starting point you have chosen;
- start to trace out the pencil line by pressing the shift key on the keyboard (Fig. [3A](#F3){ref-type="fig"}), then move the mouse pointer along the pencil line: a guide line will appear to help you to trace a segment (Fig. [3B](#F3){ref-type="fig"});
- stop the pointer where you consider worthwhile; left click once again to trace a segment;
- press the space bar of the keyboard (Fig. [3A](#F3){ref-type="fig"}) to move along the drawing, only moving the mouse, without clicking any other button;
- change the brush size whenever you need to draw smaller details;
- find a suitable balance between several closer points or less numerous but more distant points (i.e. the suitable balance between the time you have and the quality of your drawings).
{#F3}
Shorter segments will appear as a continuous line and the quality will be even better in the printed version since the figure size is smaller than the digital image.
Drawing dashed lines
--------------------
- Choose the "Path tool" in the toolbox (Fig. [4A](#F4){ref-type="fig"});
- left click several times following the pencil line;
- once finished, click "Stroke path" in the "Tool options" dialog window (Fig. [4B](#F4){ref-type="fig"});
- in the "Stroke path" window (Fig. [4C](#F4){ref-type="fig"}), choose the line width (e.g. 4 or 5 pixels) and open the "Line Style" dialog;
- choose "round" (the second icon) for "Cap style" in the "Line style" option, then "Medium dashed" in the "Dash preset" option (Fig. [4C](#F4){ref-type="fig"});
- click on the "Stroke" button and then again on the "Paintbrush tool" to see the result (Fig. [4D](#F4){ref-type="fig"}).
{#F4}
Sorting out plates
------------------
First of all open a new file with a blank image. Choose File \> New and select A4 (300 ppi) in the Template menu, then click "OK" (Fig. [5A](#F5){ref-type="fig"}). The size of this new image will be 2480 × 3508 pixels at 300 points per inches. It is possible to change the resolution, e.g. at 600 ppi, opening the Advanced Options (Fig. [5A](#F5){ref-type="fig"})
{#F5}
In order to move the trace that has been already drawn into the new plate: open the. xcf file and select the layer that contains that trace. Use the 'Free Select Tool' to carve out the part of the drawing; left click several times following the trace outline. Then copy the selection (Edit \> Copy) and paste it (Edit \> Paste) into the new blank image. A new layer, named 'Floating Selection' will appear in the Layers Dialog (Fig. [5B](#F5){ref-type="fig"}); right click on this new layer and choose 'To a new layer' to create a new layer (named "Pasted Layer") with the clipping (Fig. [5C](#F5){ref-type="fig"}). This is particularly useful in order to rearrange the plate later. It is also possible to move the entire layer (with a simple drag and drop of the layer into the new image) but this step will increase the file size. The new layer can be renamed by double-clicking on its name in the "Layers" window.
Next step is to move, scale, flip or rotate the drawings to set them in the right position. In the toolbox it is possible to find the right instruments (Fig. [5D](#F5){ref-type="fig"}).
*Move.* Use the "Move Tool" in the Toolbox. In the "Layers" window select the layer with the trace. In the Tool Option Window, choose "Layer" (the first icon) in the "Move" option and "Move the active layer" in the "Tool Toggle" option. Then, it is possible to move the trace in the right position by left clicking on the trace and dragging the layer.
*Scale.* Use the "Scale Tool" in the Toolbox. In the Tool Option Window, choose "Layer" in the "Transform" option and leave the other options with the default values. Left click on the trace and a grid and a "Scale" window will appear helping the user to adjust the image at the right size. It is possible to use percentages by changing the "pixels" option.
*Flip.* Similarly, use the "Flip Tool". In the Tool Option Window, choose "Layer" in the "Affect" option and then choose "Horizontal" or "Vertical" in the "Flip type" option. Left click on the trace and the drawing will be mirrored upside down or left/right.
*Rotate.* It is also possible to rotate a drawing with the "Rotate Tool". As before, left click on the trace and a grid and a "Scale" window will appear helping the user to adjust the image at the right angle. Then left click on the "Rotate" button to set the new arrangement.
Once completed, it is necessary to repeat the steps above to insert all the drawings into the new plate.
*Lettering.* Easily, it is possible to add text (e.g. numbers and letters) on the new plate using the "Text Tool". A common option in the "Tool Options" window is: "Arial" in the Font box and 80--100 in the Size box. A new layer will appear with the text. It can be easily moved with the "Move Tool" just as explained before.
It is also possible to crop the image in order to eliminate the blank space around the traces.
This can be easily done with the "Crop Tool" in the Toolbox. Left-click and drag the mouse pointer to crop the part of the plate.
Saving the files
----------------
Once completed it is important to save the work in different files. Precisely, the user should be save the draft files in the GIMP proprietary format XCF (eXperimental Computing Facility) in order to leave the possibility to work again on the different layers. In the "File" menu, choose "Save" (or "Save As"); then the user will be asked to add a file name and select a destination folder. Otherwise, it is possible to save the plates as one-layer files in a high resolution format, such as TIFF files, normally used for publication in a scientific journal. This step should be done with the "Export" (or "Export As") option of the "File" menu. A new dialog window will appear on the screen: in this case choose "TIFF image" in the "Select File Type" option (Fig. [6A](#F6){ref-type="fig"}). Then, it is possible to set the level of compression (that is the quality of images). Generally a LZW compression offer the right balance between quality of the printed image and an appropriate file size. This option is specifically requested by several journals (Fig. [6B](#F6){ref-type="fig"}).
{#F6}
Results
=======
The method here explained, produce three different kind of files: the original digitized pencil drawings (normally PDF or TIFF files), the. xcf files of the traces, the. xcf files of the plates. These last ones are used to export the plates in 'Tagged Image File Format' (TIF) that may be directly uploaded to the journal submission website. All those files should be kept because they could be useful in the future for many purposes.
The final result is to have perfect lines without any signs of tremble. The black lines appear as a sharp continuous line in the final version, because the size of the printed image is not as big as the digital image. Generally, the use of digital drawing techniques allows undoing the last action and trying again after an error, until the result is satisfying.
Some illustrations made with the method of the present paper, were already published in other articles about terrestrial isopods: figure 1 in [@B13]; figure 2 in [@B17]; figures 2, 3 in [@B18]; figures 1--5 in [@B19]; figures 1, 2 in [@B14]; figure 1 in [@B15]; figures 6, 7, and 9 in [@B20]; figure 1 in [@B11]; figures 2, 3 in Montesanto et al. (2013); figures 1--6 in [@B16]. Some indications about drawing terrestrial isopods for taxomomic papers are reported in Figure [7](#F7){ref-type="fig"}, whereas magnifications show the differences of the brush size for different anatomical parts.
{#F7}
Finally, due to the practice made with the method here introduced, some other suggestion are proposed to the reader: draw the possible dotted shadows on a new layer above the other ones; use maximum zoom level for details, even more than 1100%; delete errors with the Eraser Tool (in the toolbox) or by clicking "Undo" in the Edit menu; always look at the general shape of the curve (reducing zoom level); avoid excessively long segments in order to point out no edges; try different size of brushes for setae, spines and other little details (see Fig. [7](#F7){ref-type="fig"}).
Discussion
==========
In a work of biological taxonomy, the part that requires more time, is the preparation of illustrations. There are always many species that need to be described so some taxonomists usually describe more species, not so detailed, others describe fewer species, but very detailed ([@B7]). Our predecessors and contemporary isopodologists published exemplary literature (e.g. [@B29], [@B30]; [@B4], [@B5]; Schmalfuss 1996; [@B26]; [@B22], [@B23], [@B24]; [@B27]; [@B28]); every taxonomist would aim to publish such high quality works that would be still useful in the future, but the limited time is always a problem. Software packages like DELTA ([@B9]; [@B10]), can automatically generate dichotomous keys and also taxonomical diagnoses and descriptions, that accelerate the description process. Nevertheless, making illustrations for taxonomy papers and also for software like DELTA, is always a long process ([@B7]). At first a pencil drawing is made often using a camera lucida; then these drawings are traced again on plates for the publication.
Other similar methods of digital drawings techniques, but with the use of vector graphics, have already been described in literature ([@B2], [@B6], [@B1]). Such methods were a significant step forward in speeding up the time consuming part of a taxonomic description, but they nevertheless showed some weak spots. Actually, those techniques require the use of several software and various hardware devices (such as digitiser boards and digital graphic pens), and plus the cost of complicate and very expensive software (e.g. Adobe Illustrator™, Adobe Photoshop™). Nonetheless, simple and free vector graphics software (e.g. Inkscape, <https://inkscape.org>) may be used in order to obtain good results.
On the other hand, the method here discussed produces good results in terms of image quality and precision, saving time and costs. Specific strengths are listed here: 1. It is simple but accurate, producing detailed lines at the highest resolution. 2. Small structures can be greatly magnified, so that drawing is easier than using common inking on paper. 3. The raster lines appear as realistic ink-made drawings. 4. It is much faster than the traditional way of making illustrations. 5. Everyone can learn to use this simple technique; it can also be used by technical staff or even inexperienced volunteers. 6. This method is completely free as it doesn't use expensive and licensed software. 7. As reported in the introduction of this article, GIMP is available for different platforms (Windows, Mac OS, or Linux), thus the work files can be moved in different computers maintaining the same file extension (.xcf).
Genuinely, some specialist can find the last points debatable preferring, therefore, the use of vector graphics. For example, only vector graphics allows to scale a drawing supporting the maximum detail; on the other hand when bitmap line drawings are magnified over 200%, they clearly show a typical 'pixels' vision. In addition, some other specialist can find a better choice working with a drawing board instead of a simple mouse, and this is also possible with GIMP. These are clearly subjective points. The best suggestion is try as many methods as possible. Then, once practiced, the users will have their better choice.
The basis for the digital drawing method here proposed is a conventional pencil drawing, made with a microscope and a camera lucida. However, it is possible to use the same method starting with a work of stack microphotography, in order to avoid the time-taking drawing process. For this purpose many software are available to combine images of different depth of focus into one photo, such as Auto-Montage (<http://www.syncroscopy.com/auto-montage/>), CombineZP (<http://www.hadleyweb.pwp.blueyonder.co.uk/>), Helicon Focus (<http://www.heliconsoft.com/>), Zerene Stacker (<http://www.zerenesystems.com/>). Recently, an interesting comparison of the focus stacking software packages has been published by [@B3], as a possible solution for mass digitization of type specimens; an ant of the genus *Meranoplus* and a beetle of the genus *Trachys* were tested. Nonetheless, these photographic methods show some issues (see also [@B7]). Actually, a drawing can show important characters that are difficult to see in a photo. Even small details, such as aestetaschs of antennulae, so important for terrestrial isopods taxonomy, can be easily shown, e.g. in Trichoniscidae, fine lines between articles of antennal flagellum, or other characters that are often used for species taxonomy. A detailed illustration may be considered as an interpretation, it is not only a simple description of the morphology. So, it is possible to point out some structures that are covered by others ([@B7]). Generally, one other big advantage of such digital inking methods is that technical assistants or other volunteers may be employed in order to save time. The specialist can afterwards correct the illustrations, if indispensable (see also [@B6], [@B7]).
GIMP offers many other opportunities that have not been described in this paper. In fact, the use of GIMP has been cited in other papers on digital drawing (such as: [@B25]). Here have been reported only the essential informations needed to obtain high-quality figures and plates which are suitable for online and printed publication. Any further request for clarification may be asked to the author.
Additional material
-------------------
An explanatory playlist (with 6 videos) has been published at the following URL, in order to facilitate the users with the method here showed:
<https://www.youtube.com/playlist?list=PLHuMNpWqA6OxGAgzk6yp07a55KV7i2caJ>
A very special thanks goes to Dr. Stefano Taiti (ISE-CNR, Florence, Italy) for his constructive comments and precious help in the early version of this paper. Stefano shared many tricks and useful suggestions about drawing and preparing plates for terrestrial isopods taxonomy. I gratefully acknowledge Dr. Annamaria Pulina (University of Pisa, Italy) for editing the english language, without which the present manuscript could not have been completed. I would like to thank Dr. Charles Oliver Coleman (Museum für Naturkunde, Berlin, Germany) and also Dr. Cene Fišer (University of Ljubljana, Slovenia) for their valuable comments which helped to improve the manuscript.
[^1]: Academic editor: Jasna Štrus
|
FIG. 1 shows one example of an SRAM (static random access memory) as a prior art semiconductor memory device.
In FIG. 1, an address decoder 1 generates a word select signal corresponding to an address signal and supplies it to each of memory blocks 10(0)-(n) via a word line 20.
Each of the memory blocks 10(0)-(n) is a memory block of the same configuration, which is formed corresponding to each bit of data signal buses DB0-n.
An internal configuration of the memory block is described below in connection with an example of memory block 10(0).
In the figure, in memory block 10(0), there are provided a number of memory cells for storing one bit of information signal, corresponding to the number, m, of words stored. Each of these memory cells 100 is comprised of inverters 101 and 102 for storing one bit of information signal, a transmission gate 103 for transmitting the output of the inverter 102 to a bit line 21 in response to the word select signal, and a transmission gate 104 for transmitting the output of the inverter 101 to a bit line 22 in response to the word select signal.
Within m memory cells 100(1)-(m), only a memory cell to which a logic "1" word select signal is supplied from the address decoder 1 is accessed. Then, the accessed memory cell sends its stored information signal to the bit line 21 via the transmission gate 103. Furthermore, the accessed memory cell sends an inverted version of the stored information signal to the bit line 22 via the transmission gate 104. If a logic "1" word signal is not supplied to any of the memory cells 100(1)-(m), a precharge circuit (not shown) is activated. This precharge circuit forcefully charges the bit lines 21 and 22 to a logic "1" state.
A FF (flipflop) 30 formed of gates 31 and 33 rapidly determines the read result in accordance with the logic value of a pair of signal lines, such as the afore-mentioned bit lines 21 and 22. When the signal logic state on the bit line 21 is a logic "1" and the signal logic state on the bit line 22 is a logic "0" the FF 30 supplies a logic "0" information signal to the data bus driver 40 in response thereto. When the signal logic state on the bit line 21 is a logic "0" and the signal logic state on the bit line 22 is a logic "1", the FF 30 supplies a logic "1" information signal to the data bus driver 40 in response thereto. When the bit lines 21 and 22 are both in the logic "1" state due to the afore-described precharge circuit operation, the logic state of the information signal supplied to the data bus driver 40 prior to that state is held, while it is supplied to the data bus driver 40.
The data bus driver 40 is rendered into an output enable state when a logic "0" memory read instruction signal is supplied to its inverting output control terminal a. Furthermore, the data bus driver 40 is rendered into an output enable state when a logic "0" memory read instruction signal is supplied via the inverter 41 to its output control terminal b. That is, the data bus driver 40 is rendered into the output enable state depending on the supply of the logic "0" memory read instruction signal. Due to such an output enable state, the data bus driver 40 generates a voltage corresponding to the signal logic value of one bit of information signal stored in the FF 30 and applies it to the data signal bus DB0, whereas if the memory read instruction signal is not supplied, it is rendered into an output disable state. Thus, the data signal bus DB0 is then rendered into a so-called high-impedance state.
As described above, with the above configuration, in response to a logic "1" word select signal, the information signal stored in the memory cell is sent onto the bit line, and a memory read instruction signal is further supplied, so that the information signal on that bit line is read onto the data bus.
With the SRAM so configured, one possible method for reading stored data at a faster access time is to make the supply timing of the word select signal coincide with that of the memory read instruction signal.
FIG. 2 shows one example of operational timing chart where the stored data is read at such a timing.
In this figure, FF 30 stores a logic "0" information signal a as an initial value and outputs it as appropriate. It is also assumed that the memory cell 100 prestores a logic "0" information signal.
First, because the word select signal is in a logic "0" state, the bit line 21 (denoted by a solid line) and bit line 22 (denoted by a dotted line) are both in a logic "1" state, due to the operation of the afore-described precharge circuit. Furthermore, because the memory read instruction signal is a logic "1", the data signal bus DB0 is in a high-impedance state Z.
Next, when the word select signal becomes a logic "1", the logic "0" information signal stored in the memory cell 100 is sent onto the bit line 21 in response thereto. Also, to the bit line 22 is sent a logic "1" signal, or an inverted version of that information signal. Then, until the information signal stored in the memory cell 100 is sent to the bit lines 21 and 22 from a transition point where the word select signal is rendered into a logic "1", a delay is introduced as shown in FIG. 2, due to the influence of component capacitance, length of wiring and the like. After such delay, when the logic values of the bit lines 21 and 22 become "0" and "1", respectively, then the FF 30 outputs a logic "1" information signal b corresponding thereto. Then, concurrent with the afore-described transition of the word select signal to a logic "1" state, a logic "0" memory read instruction signal is supplied. In response to that memory read instruction signal, the data bus driver 40 is rendered into an output enable state. This output enable state causes the data bus driver 40 to generate a voltage corresponding to the logic value of the information signal supplied from the FF 30, and applies it to the data signal bus DB0. During that time, a delay as shown in the figure is present until the information signal b stored in the memory cell 100 is sent onto the bit lines 21 and 22. Thus, although the data bus driver 40 is in the output enable state in response to the memory read instruction signal, the FF 30 cannot immediately supply the information signal b to the data bus driver 40, during which time the information signal a is supplied to the data bus driver 40.
Thus, to read not only the information signal b read from the memory cell 100 but also the information signal a onto the data signal bus DB0, the data bus driver 40 generates a voltage corresponding to that information signal a and applies it to the data signal bus DB0, resulting in wasted power.
To cope with that, one conceivable method is to use a delay circuit to delay the timing of the memory read instruction signal supplied to the data bus driver 40, thereby preventing the aforementioned information signal a from being read onto the data bus. However, since the delay value of such a delay circuit is set somewhat greater in consideration of various factors, such as production process variations, supply voltage fluctuations, ambient temperature, it is difficult to reduce the access time associated with that method.
Accordingly, it is an object of the present invention to provide a low power consumption semiconductor memory device that permits reading of stored data at a faster access time, while minimizing power consumption. |
Sex and Health
The third issue of Buwa! focusses on sex and health in southern Africa as Alice Kanengoni explains in her editorial.
In the last three decades that the African continent has been battling the impacts of HIV and AIDS, a number of positives have been realised. One has been the subject of sex and sexuality finding a somewhat more comfortable place in development discourses on the continent. Sex and sexuality have largely been regarded as issues fit for the private sphere, and in some cases even treated as taboos that are only to be spoken of in hushed tones. The HIV and AIDS movements as well as feminist movements on the continent – and elsewhere – have challenged the notion of sex as a private matter, and brought it into discourses on health, economics, politics and power, thus firmly establishing it as a rights issue.
Two recent global platforms have been quite telling in this regard. The 12th AWID International Forum in Istanbul in April 2012, under the theme Transforming Economic Power to Advance Women’s Rights and Justice had a significant number of sessions focusing on sex, sexuality, sex work, pleasure and their intersections with economics and money as well as politics and power. Meanwhile, in May, the Open Society Africa Foundations convened the OpenForum – an equally diverse platform whose theme focused on money, power and sex. What was most striking for me at both events was the significant space given to sex and sexuality on their programmes; and I thought to myself, the continent has indeed come far!
This Issue of BUWA! carries African voices and stories, unpacking and sharing experiences in sex and health, and highlighting trends, realities, opportunities and challenges. Although sex has arguably firmly taken root in health and rights discourses, this has not been without challenges. Dr Vicci Tallis and Laura Washington illuminate some of these challenges and contentions in a piece that locates the sexual and reproductive health rights discourse in the broader feminist struggle for women’s sexuality rights and emancipation.
Given the tendency – dictated by culture and tradition – to confine sex and sexuality to the private sphere, HIV and AIDS discourses have managed to break that artificial wall, bringing issues of sex and sexuality into the public sphere, albeit as health and reproductive health and rights issues. Thus, it has been largely HIV and AIDS movements that have led the southern Africa region in pushing an agenda for sexual and reproductive health rights. A number of significant gains have been recorded on this front – key among them being finding space for sex, sexuality and reproductive health rights on public agendas and dialogues. It is precisely because of this important step forward that global forums discussing so-called hard issues of economic transformation, money and power could legitimately and confidently engage with issues of sex and sexuality. However, most sex and health rights movements in the region are still struggling – like women’s movements generally – and the challenge remains to continue strengthening these movements to ensure that these critical issues remain in the public domain and are not relegated once again to the private sphere.
Another gain has been on the steady traction towards gaining autonomy over women’s bodies. During the decades spent fighting HIV and AIDS on the continent, it has become clear how women’s vulnerabilities are increased by a lack of real choice in relation to protection, treatment and care. Practices such as lobola, as discussed by Takunda Chabata, have become a key part of the debate with lobola being viewed as giving men the right to decide how and when married women can have sex. A woman’s right to choose even in issues of contraception becomes compromised in this regard.
As such, married women tend to be more vulnerable, and have less control over their bodies, than their unmarried counterparts. The space to negotiate safe and enjoyable sex in a marriage context tends to be more limited. This is even more pronounced in countries where there are many different marriage regimes, creating challenges for women. For instance, customary law marriages allow men to have more than one spouse, increasing women’s vulnerability to HIV and AIDS. Some of the challenges are articulated by Sibusisiwe Ndlovu-Bhebe, who argues that there is a need to harmonise Zimbabwe’s marriage laws to make it easier for women. Emmah Machokoto’s poem aptly summarises how marriage increases women’s vulnerability.
A review of policy and legislative frameworks in southern Africa in relation to women’s bodily integrity paints a picture of a region that offers half measures; where laws and policies do not fully guarantee women choices regarding their bodies. Issues of abortion, sex work and sterilisation are cases in point. Namuchana Mushabati highlights some of the shortfalls in her analysis of policy trends in Zambia. These gaps often result in backstreet abortions, which have taken the lives of many women, as illustrated by Karina Dulobo and Mazuba Haanyama in their analysis of the role that the family unit has played in denying women, particularly young women, their right to bodily integrity.
However, it is not only the family that has helped men to maintain their control over women’s bodies, but also health care institutions. In southern Africa, especially in Namibia, South Africa and Botswana, there have been reports of the forced sterilisation of HIV positive women by medical doctors. In Namibia, a few cases have been brought before the courts but these are – almost certainly – just the tip of the iceberg in what is suspected to be a systematic and widespread practice that violates women’s reproductive health rights. There is suspicion that this practice might also be happening in other countries in the region, and there is need for research and provision of safe spaces that allow for women to open up and share their experiences.
The education system has also not been sensitive to school-going girls’ sexuality and reproductive health rights as Stella Jerop Chebiiillustrates in her case study of how a lack of access to sanitary towels had been a barrier to adolescent girls accessing education in urban slums in Kenya.
On the African continent women are not encouraged to enjoy sex, and the reasons for this are often rooted in culture, tradition and religion. Some religions have been manipulated to deny women the right to enjoyable sex as Grace Chirenje and Brian Nachipo demonstrate based on their observations of how some Christian Scriptures are cited out of context to control women’s access to contraception and good, safe and enjoyable sex. Sex, in their observation, is interpreted as primarily for procreation, and not for enjoyment, and pleasure is regarded as the preserve of men. This is not just in the context of religion, but also in the context of culture and tradition, as Tinashe Mema and Rudo Chigudu argue.
The notion of sex being for men’s pleasure also manifests in Africa in the form of female genital mutilation (FGM). A number of cultures promote various forms of FGM, which in some cases has serious consequences on the reproductive health of the women. A number of research initiatives and documentation of the dangers and injustices of such practices have been done on the continent, and one such book by Marie-Helene Mottin-Sylla and Joelle Palmieri is discussed in this Issue by Mazuba Haanyama, who questions, among other things, the notion of labelling such practices as ‘mutilation’.
Sian Maseko contends that because sex and pleasure are often defined in the context of hetero-normativity, the tendency is to adopt a moralistic attitude towards sex outside of marriage. In particular, same sex relationships are criminalised in most countries in the region.
Another way in which women’s bodies have been controlled is through rape. Although rape is recognised as a crime in southern Africa, certain types of rape are often ignored, as Gemma Hancox argues in her piece, which decries the prevalence of marital rape in South Africa in spite of laws and policies that are designed to protect women. Similarly, rape targeted at lesbians and transgender people purportedly to ‘correct’ them is also becoming prevalent in the region, as shown by Tiffani Wesley, who makes a case for such rape to be classified as a hate crime.
Control of the woman’s body is also linked to who defines beauty – and how it is defined. Societal standards of beauty have created an industry that controls women’s hair, skin, size, shape and looks; all driven by a capitalist ethos, which is the bedrock of patriarchy. Davina Jogi highlights this in her powerful photo-essay from Zimbabwe.
However, there are some positive moves towards giving women more control over their bodies. In particular, strides have been made in research towards preventive tools with regards to HIV and AIDS. Groundbreaking microbicide trials are a case in point. Pauline Irungu sheds light on how the African continent is at the brink of delivering on the 20-year-old dream of providing women with access to vaginal microbicides, a form of protection they hopefully will be able to control. But even with such breakthroughs, there is still the need to develop a culture of respect for the sexual and reproductive health rights of women – and it is necessary to start fostering this culture at lower levels of the education system, as exemplified by Lerissa Thaver and Astrid Leao in their case study of South African secondary schools.
For decades, women have been organising, coalescing and building movements to resist all forms of oppression – including denial of their sexuality and reproductive health rights. These efforts need to be captured and documented, as in the case of the publication African Women Writing Resistance: Contemporary Voices (Edited by Jennifer Browdy de Hernandez, Pauline Dongala, Omotayo Jolaosho and Anne Sarafin), which is reviewed Dr Hleziphi Naomie Nyanungo.
We hope this Issue of BUWA! challenges African women and men to continue loosening the lid that has been kept tightly shut for decades to prevent issues of sex and sexuality from being openly discussed – and in the process making women and girls more vulnerable and putting their lives at risk.
A pre-election report providing a comprehensive view of events and activities in the run-up to the elections. In this report offered to key stakeholders and the electorate, ZEIC notes a number of key issues that may be determining factors in the delivery of a free fair and...
Since its independence from Britain in 1966, Botswana has been hailed as Africa’s model nation, a “political diamond.” The country, which is the size of France but with only about 2 million residents, is stable—its democratic elections so peaceful and predictable they’ve... |
Q:
How do I pass data from my service object to my controller?
This is the code from my service object app/services/grab_feed_from_jse.rb:
class GrabFeedFromJSE
def initialize(url)
require 'oga'
require 'net/http'
body = Net::HTTP.get(URI.parse(url))
document = Oga.parse_html(body)
@titles = document.css('li')
end
end
When I do a pry at the end of that file, this is the response I get:
[1] pry(#<GrabFeedFromJSE>)> @titles
=> NodeSet(Element(name: "li" children: NodeSet(Text(" "), Element(name: "input" attributes: [Attribute(name: "class" value: "ticker-status"), Attribute(name: "type" value: "hidden"), Attribute(name: "name" value: "Language"), Attribute(name: "value" value: "summary")]))), Element(name: "li" attributes: [Attribute(name: "class" value: "live-ticker-heading")] children: NodeSet(Text("Market Summary for 2018-05-10 "), Element(name: "br"), Text(" "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/index-data/jse-index")] children: NodeSet(Text("\n\n \n\n\n JSE Index \n \n "), Element(name: "br"), Text("\n\n 5,201,225 Vol\n "), Element(name: "br"), Text("\n\n 299,198.19 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name: "src" value: "/img/up.png")]), Text("\n\n \n 22.32\n "))), Text("\n\n\n "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/index-data/all-jamaican")] children: NodeSet(Text("\n\n \n\n\n JSE All Jamaican Composite Index \n \n "), Element(name: "br"), Text("\n\n 3,842,904 Vol\n "), Element(name: "br"), Text("\n\n 328,387.59 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name: "src" value: "/img/up.png")]), Text("\n\n \n 24.50\n "))), Text("\n\n\n "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/index-data/jse-select")] children: NodeSet(Text("\n\n \n\n\n JSE Select Index \n \n "), Element(name: "br"), Text("\n\n 1,995,939 Vol\n "), Element(name: "br"), Text("\n\n 8,948.62 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name: "src" value: "/img/down.png")]), Text("\n\n \n -31.23\n "))), Text("\n\n\n "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/index-data/jse-junior")] children: NodeSet(Text("\n\n \n\n\n Junior Market Index \n \n "), Element(name: "br"), Text("\n\n 1,858,849 Vol\n "), Element(name: "br"), Text("\n\n 2,917.69 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name: "src" value: "/img/down.png")]), Text("\n\n \n -15.45\n "))), Text("\n\n\n "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/index-data/combined-index")] children: NodeSet(Text("\n\n \n\n\n JSE Combined Index \n \n "), Element(name: "br"), Text("\n\n 7,028,074 Vol\n "), Element(name: "br"), Text("\n\n 306,927.60 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name: "src" value: "/img/down.png")]), Text("\n\n \n -148.29\n "))), Text("\n\n\n "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/index-data/us-equities")] children: NodeSet(Text("\n\n \n\n\n JSE USD Equities Index \n \n "), Element(name: "br"), Text("\n\n 220,397 Vol\n "), Element(name: "br"), Text("\n\n 165.29 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name: "src" value: "/img/down.png")]), Text("\n\n \n -8.87\n "))), Text("\n\n\n "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/listed-companies/trade-information/CCC/latest")] children: NodeSet(Text("\n\n \n\n\n CCC\n \n "), Element(name: "br"), Text("\n\n 979,272 Vol\n "), Element(name: "br"), Text("\n\n $37.25 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name: "src" value: "/img/down.png")]), Text("\n\n \n -0.05\n "))), Text("\n\n\n "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/listed-companies/trade-information/CAR/latest")] children: NodeSet(Text("\n\n \n\n\n CAR\n \n "), Element(name: "br"), Text("\n\n 109,202 Vol\n "), Element(name: "br"), Text("\n\n $10.60 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name:
[2] pry(#<GrabFeedFromJSE>)> ls @titles
ActiveSupport::ToJsonWithActiveSupportEncoder#methods: to_json
Enumerable#methods:
all? collect_concat each_slice find_index group_by_day_of_month group_by_month_of_year index_by member? partition slice_before to_h
any? cycle each_with_index first group_by_day_of_week group_by_period inject min pluck slice_when to_set
as_json detect each_with_object flat_map group_by_hour group_by_quarter lazy min_by reduce sort uniq
chart_json drop entries grep group_by_hour_of_day group_by_second many? minmax reject sort_by without
chunk drop_while exclude? grep_v group_by_minute group_by_week map minmax_by reverse_each sum zip
chunk_while each_cons find group_by group_by_minute_of_hour group_by_year max none? select take
collect each_entry find_all group_by_day group_by_month include? max_by one? slice_after take_while
Oga::XML::NodeSet#methods:
+ == attr concat delete empty? index inspect length owner= push shift text unshift
<< [] attribute count each equal_nodes? insert last owner pop remove size to_a
instance variables: @existing @nodes @owner
So that has the results I want. Notice all the methods accessible on my @titles object.
However, when I try to execute this service object in my portfolio_controller.rb like this:
class PortfolioController < ApplicationController
def ticker
@output = GrabFeedFromJSE.new('http://www.someurl.com')
end
end
This is what the result looks like:
[1] pry(#<PortfolioController>)> @output
=> #<GrabFeedFromJSE:0x00007fe70942d8d8
@titles=
NodeSet(Element(name: "li" children: NodeSet(Text(" "), Element(name: "input" attributes: [Attribute(name: "class" value: "ticker-status"), Attribute(name: "type" value: "hidden"), Attribute(name: "name" value: "Language"), Attribute(name: "value" value: "summary")]))), Element(name: "li" attributes: [Attribute(name: "class" value: "live-ticker-heading")] children: NodeSet(Text("Market Summary for 2018-05-10 "), Element(name: "br"), Text(" "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/index-data/jse-index")] children: NodeSet(Text("\n\n \n\n\n JSE Index \n \n "), Element(name: "br"), Text("\n\n 5,201,225 Vol\n "), Element(name: "br"), Text("\n\n 299,198.19 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name: "src" value: "/img/up.png")]), Text("\n\n \n 22.32\n "))), Text("\n\n\n "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/index-data/all-jamaican")] children: NodeSet(Text("\n\n \n\n\n JSE All Jamaican Composite Index \n \n "), Element(name: "br"), Text("\n\n 3,842,904 Vol\n "), Element(name: "br"), Text("\n\n 328,387.59 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name: "src" value: "/img/up.png")]), Text("\n\n \n 24.50\n "))), Text("\n\n\n "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/index-data/jse-select")] children: NodeSet(Text("\n\n \n\n\n JSE Select Index \n \n "), Element(name: "br"), Text("\n\n 1,995,939 Vol\n "), Element(name: "br"), Text("\n\n 8,948.62 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name: "src" value: "/img/down.png")]), Text("\n\n \n -31.23\n "))), Text("\n\n\n "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/index-data/jse-junior")] children: NodeSet(Text("\n\n \n\n\n Junior Market Index \n \n "), Element(name: "br"), Text("\n\n 1,858,849 Vol\n "), Element(name: "br"), Text("\n\n 2,917.69 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name: "src" value: "/img/down.png")]), Text("\n\n \n -15.45\n "))), Text("\n\n\n "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/index-data/combined-index")] children: NodeSet(Text("\n\n \n\n\n JSE Combined Index \n \n "), Element(name: "br"), Text("\n\n 7,028,074 Vol\n "), Element(name: "br"), Text("\n\n 306,927.60 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name: "src" value: "/img/down.png")]), Text("\n\n \n -148.29\n "))), Text("\n\n\n "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/index-data/us-equities")] children: NodeSet(Text("\n\n \n\n\n JSE USD Equities Index \n \n "), Element(name: "br"), Text("\n\n 220,397 Vol\n "), Element(name: "br"), Text("\n\n 165.29 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name: "src" value: "/img/down.png")]), Text("\n\n \n -8.87\n "))), Text("\n\n\n "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/listed-companies/trade-information/CCC/latest")] children: NodeSet(Text("\n\n \n\n\n CCC\n \n "), Element(name: "br"), Text("\n\n 979,272 Vol\n "), Element(name: "br"), Text("\n\n $37.25 \n "), Element(name: "img" attributes: [Attribute(name: "style" value: "height:16px"), Attribute(name: "src" value: "/img/down.png")]), Text("\n\n \n -0.05\n "))), Text("\n\n\n "))), Element(name: "li" children: NodeSet(Text("\n\n "), Element(name: "a" attributes: [Attribute(name: "href" value: "/market-data/listed-companies/trade-information/CAR/latest")] children: NodeSet(T
[2] pry(#<PortfolioController>)> ls @output
ActiveSupport::ToJsonWithActiveSupportEncoder#methods: to_json
instance variables: @titles
Why are the objects different?
How do I get my @titles object in my GrabFeedFromJSE class in that service object, to be accessible to my @output instance variable in my controller.
A:
I figured it out.
This is what I did....in my services/grab_feed_from_jse.rb file:
class GrabFeedFromJSE
require 'oga'
require 'net/http'
def initialize(url)
body = Net::HTTP.get(URI.parse(url))
@document = Oga.parse_html(body)
end
def nodes
@document.css('li')
end
end
Then in my portfolio_controller.rb, I did this:
class PortfolioController < ApplicationController
def ticker
@output = GrabFeedFromJSE.new('http://www.someurl.com')
end
end
In my views, I now do @output.nodes and I iterate over that collection.
That solves that.
|
; Copyright (C) Internet Systems Consortium, Inc. ("ISC")
;
; This Source Code Form is subject to the terms of the Mozilla Public
; License, v. 2.0. If a copy of the MPL was not distributed with this
; file, You can obtain one at http://mozilla.org/MPL/2.0/.
;
; See the COPYRIGHT file distributed with this work for additional
; information regarding copyright ownership.
. 120 NS ns.
ns. 120 A 10.53.0.1
|
Domain extension options
The following domain extensions are available for the domain name, with a total of 730 variations available:
content2zero.net
content2zero.org
content2zero.info
content2zero.xyz
content2zero.top
content2zero.loan
content2zero.biz
content2zero.win
content2zero.club
content2zero.online
content2zero.vip
content2zero.wang
content2zero.mobi
content2zero.site
content2zero.bid
content2zero.men
content2zero.tech
content2zero.pro
content2zero.website
content2zero.space
content2zero.shop
content2zero.kiwi
content2zero.网址
content2zero.link
content2zero.xin
content2zero.trade
content2zero.party
content2zero.store
content2zero.racing
content2zero.life
content2zero.cat
content2zero.рус
content2zero.cloud
content2zero.tel
content2zero.xxx
content2zero.accountant
content2zero.live
content2zero.date
content2zero.信息
content2zero.blog
content2zero.download
content2zero.stream
content2zero.work
content2zero.ltd
content2zero.click
content2zero.rocks
content2zero.today
content2zero.review
content2zero.nyc
content2zero.email
content2zero.solutions
content2zero.news
content2zero.pub
content2zero.world
content2zero.tokyo
content2zero.design
content2zero.london
content2zero.guru
content2zero.one
content2zero.webcam
content2zero.realty
content2zero.host
content2zero.berlin
content2zero.company
content2zero.公司
content2zero.photography
content2zero.science
content2zero.ovh
content2zero.faith
content2zero.jobs
content2zero.realtor
content2zero.red
content2zero.city
content2zero.press
content2zero.ren
content2zero.agency
content2zero.media
content2zero.center
content2zero.ninja
content2zero.网络
content2zero.group
content2zero.tips
content2zero.global
content2zero.bayern
content2zero.services
content2zero.studio
content2zero.technology
content2zero.expert
content2zero.手机
content2zero.amsterdam
content2zero.sale
content2zero.コム
content2zero.lol
content2zero.help
content2zero.academy
content2zero.hamburg
content2zero.koeln
content2zero.digital
content2zero.sexy
content2zero.在线
content2zero.video
content2zero.systems
content2zero.photo
content2zero.zone
content2zero.network
content2zero.cricket
content2zero.international
content2zero.education
content2zero.moscow
content2zero.consulting
content2zero.events
content2zero.paris
content2zero.directory
content2zero.photos
content2zero.support
content2zero.social
content2zero.gallery
content2zero.church
content2zero.love
content2zero.casa
content2zero.training
content2zero.travel
content2zero.nrw
content2zero.uno
content2zero.market
content2zero.marketing
content2zero.swiss
content2zero.wiki
content2zero.business
content2zero.reviews
content2zero.kim
content2zero.istanbul
content2zero.bet
content2zero.gmbh
content2zero.москва
content2zero.house
content2zero.wien
content2zero.cool
content2zero.vegas
content2zero.我爱你
content2zero.care
content2zero.bike
content2zero.bio
content2zero.guide
content2zero.frl
content2zero.land
content2zero.coffee
content2zero.family
content2zero.ist
content2zero.immo
content2zero.닷컴
content2zero.clothing
content2zero.games
content2zero.works
content2zero.中文网
content2zero.wine
content2zero.ink
content2zero.lawyer
content2zero.property
content2zero.team
content2zero.wales
content2zero.blue
content2zero.porn
content2zero.properties
content2zero.scot
content2zero.software
content2zero.community
content2zero.rentals
content2zero.fun
content2zero.farm
content2zero.pics
content2zero.buzz
content2zero.miami
content2zero.fund
content2zero.ruhr
content2zero.legal
content2zero.school
content2zero.direct
content2zero.cafe
content2zero.art
content2zero.chat
content2zero.beer
content2zero.jetzt
content2zero.management
content2zero.run
content2zero.band
content2zero.melbourne
content2zero.sucks
content2zero.sydney
content2zero.adult
content2zero.tools
content2zero.coach
content2zero.fitness
content2zero.quebec
content2zero.law
content2zero.institute
content2zero.estate
content2zero.fyi
content2zero.mom
content2zero.cash
content2zero.wtf
content2zero.商标
content2zero.foundation
content2zero.sex
content2zero.fit
content2zero.kaufen
content2zero.ventures
content2zero.移动
content2zero.audio
content2zero.boutique
content2zero.dog
content2zero.plus
content2zero.barcelona
content2zero.deals
content2zero.healthcare
content2zero.style
content2zero.coop
content2zero.gift
content2zero.yokohama
content2zero.pet
content2zero.gold
content2zero.nagoya
content2zero.attorney
content2zero.immobilien
content2zero.pictures
content2zero.fashion
content2zero.brussels
content2zero.capital
content2zero.graphics
content2zero.dental
content2zero.pink
content2zero.wedding
content2zero.tours
content2zero.ooo
content2zero.forsale
content2zero.yoga
content2zero.money
content2zero.careers
content2zero.eus
content2zero.bzh
content2zero.reisen
content2zero.energy
content2zero.solar
content2zero.vin
content2zero.restaurant
content2zero.moe
content2zero.domains
content2zero.golf
content2zero.cymru
content2zero.construction
content2zero.clinic
content2zero.earth
content2zero.vlaanderen
content2zero.shopping
content2zero.kred
content2zero.camp
content2zero.世界
content2zero.kitchen
content2zero.lighting
content2zero.express
content2zero.repair
content2zero.vision
content2zero.cards
content2zero.equipment
content2zero.show
content2zero.finance
content2zero.hosting
content2zero.menu
content2zero.place
content2zero.partners
content2zero.codes
content2zero.exchange
content2zero.report
content2zero.productions
content2zero.bar
content2zero.watch
content2zero.dance
content2zero.university
content2zero.enterprises
content2zero.cologne
content2zero.parts
content2zero.ski
content2zero.tirol
content2zero.shoes
content2zero.study
content2zero.vet
content2zero.taxi
content2zero.limited
content2zero.tax
content2zero.black
content2zero.商城
content2zero.holdings
content2zero.promo
content2zero.pizza
content2zero.holiday
content2zero.computer
content2zero.camera
content2zero.engineering
content2zero.capetown
content2zero.football
content2zero.haus
content2zero.insure
content2zero.gratis
content2zero.supply
content2zero.toys
content2zero.discount
content2zero.taipei
content2zero.gal
content2zero.green
content2zero.singles
content2zero.contractors
content2zero.vacations
content2zero.fish
content2zero.onl
content2zero.college
content2zero.saarland
content2zero.rent
content2zero.builders
content2zero.build
content2zero.casino
content2zero.delivery
content2zero.financial
content2zero.apartments
content2zero.gifts
content2zero.srl
content2zero.gent
content2zero.ngo
content2zero.ong
content2zero.catering
content2zero.poker
content2zero.industries
content2zero.credit
content2zero.glass
content2zero.joburg
content2zero.vote
content2zero.okinawa
content2zero.diet
content2zero.닷넷
content2zero.jewelry
content2zero.investments
content2zero.cab
content2zero.film
content2zero.feedback
content2zero.cheap
content2zero.plumbing
content2zero.loans
content2zero.bank
content2zero.supplies
content2zero.cam
content2zero.auction
content2zero.town
content2zero.fail
content2zero.desi
content2zero.doctor
content2zero.tienda
content2zero.dentist
content2zero.recipes
content2zero.онлайн
content2zero.best
content2zero.associates
content2zero.lat
content2zero.dating
content2zero.mortgage
content2zero.mba
content2zero.exposed
content2zero.moda
content2zero.engineer
content2zero.soccer
content2zero.voyage
content2zero.diamonds
content2zero.reise
content2zero.irish
content2zero.futbol
content2zero.bargains
content2zero.schule
content2zero.christmas
content2zero.ceo
content2zero.limo
content2zero.degree
content2zero.lgbt
content2zero.tattoo
content2zero.cleaning
content2zero.surf
content2zero.durban
content2zero.网店
content2zero.viajes
content2zero.rip
content2zero.condos
content2zero.cruises
content2zero.furniture
content2zero.florist
content2zero.game
content2zero.versicherung
content2zero.horse
content2zero.flowers
content2zero.flights
content2zero.courses
content2zero.how
content2zero.gop
content2zero.alsace
content2zero.villas
content2zero.movie
content2zero.rest
content2zero.archi
content2zero.lease
content2zero.surgery
content2zero.tube
content2zero.coupons
content2zero.rehab
content2zero.claims
content2zero.actor
content2zero.mma
content2zero.blackfriday
content2zero.garden
content2zero.army
content2zero.tennis
content2zero.fishing
content2zero.cooking
content2zero.fans
content2zero.guitars
content2zero.accountants
content2zero.vodka
content2zero.hiphop
content2zero.salon
content2zero.みんな
content2zero.орг
content2zero.rio
content2zero.gives
content2zero.soy
content2zero.museum
content2zero.career
content2zero.shiksha
content2zero.hockey
content2zero.bingo
content2zero.hospital
content2zero.maison
content2zero.physio
content2zero.tickets
content2zero.дети
content2zero.сайт
content2zero.africa
content2zero.gripe
content2zero.juegos
content2zero.country
content2zero.theater
content2zero.luxury
content2zero.democrat
content2zero.republican
content2zero.bible
content2zero.sarl
content2zero.eco
content2zero.corsica
content2zero.tatar
content2zero.شبكة
content2zero.organic
content2zero.网站
content2zero.tires
content2zero.creditcard
content2zero.storage
content2zero.navy
content2zero.markets
content2zero.neustar
content2zero.audi
content2zero.集团
content2zero.kyoto
content2zero.osaka
content2zero.trading
content2zero.بازار
content2zero.broker
content2zero.ryukyu
content2zero.airforce
content2zero.موقع
content2zero.memorial
content2zero.qpon
content2zero.hoteles
content2zero.ltda
content2zero.auto
content2zero.hiv
content2zero.creditunion
content2zero.rodeo
content2zero.car
content2zero.observer
content2zero.baby
content2zero.cars
content2zero.krd
content2zero.商店
content2zero.moi
content2zero.homes
content2zero.机构
content2zero.abogado
content2zero.voto
content2zero.makeup
content2zero.security
content2zero.pharmacy
content2zero.insurance
content2zero.中信
content2zero.broadway
content2zero.企业
content2zero.游戏
content2zero.boats
content2zero.seat
content2zero.citic
content2zero.nra
content2zero.reit
content2zero.forex
content2zero.yachts
content2zero.广东
content2zero.娱乐
content2zero.bradesco
content2zero.佛山
content2zero.abbott
content2zero.leclerc
content2zero.संगठन
content2zero.barclays
content2zero.weir
content2zero.theatre
content2zero.bloomberg
content2zero.政务
content2zero.lotto
content2zero.whoswho
content2zero.cancerresearch
content2zero.protection
content2zero.bot
content2zero.rich
content2zero.ストア
content2zero.man
content2zero.motorcycles
content2zero.stada
content2zero.weber
content2zero.iselect
content2zero.autos
content2zero.globo
content2zero.fage
content2zero.monash
content2zero.pictet
content2zero.trust
content2zero.セール
content2zero.linde
content2zero.dvag
content2zero.八卦
content2zero.sky
content2zero.uol
content2zero.firmdale
content2zero.wed
content2zero.fresenius
content2zero.new
content2zero.mini
content2zero.mlb
content2zero.microsoft
content2zero.mango
content2zero.total
content2zero.sener
content2zero.csc
content2zero.schwarz
content2zero.afl
content2zero.ファッション
content2zero.書籍
content2zero.aco
content2zero.saxo
content2zero.shriram
content2zero.kpn
content2zero.abb
content2zero.cba
content2zero.家電
content2zero.basketball
content2zero.foo
content2zero.食品
content2zero.aig
content2zero.健康
content2zero.bing
content2zero.aquarelle
content2zero.bentley
content2zero.crs
content2zero.toray
content2zero.クラウド
content2zero.bbva
content2zero.yandex
content2zero.axa
content2zero.cisco
content2zero.xbox
content2zero.cern
content2zero.windows
content2zero.bmw
content2zero.philips
content2zero.arte
content2zero.allstate
content2zero.google
content2zero.smart
content2zero.azure
content2zero.barclaycard
content2zero.scb
content2zero.goog
content2zero.health
content2zero.公益
content2zero.deloitte
content2zero.radio
content2zero.fox
content2zero.otsuka
content2zero.cfa
content2zero.chanel
content2zero.erni
content2zero.aarp
content2zero.abc
content2zero.aeg
content2zero.airbus
content2zero.lamborghini
content2zero.shell
content2zero.bms
content2zero.accenture
content2zero.jprs
content2zero.praxi
content2zero.blanco
content2zero.edeka
content2zero.ice
content2zero.bosch
content2zero.orange
content2zero.williamhill
content2zero.afamilycompany
content2zero.lidl
content2zero.maif
content2zero.komatsu
content2zero.sap
content2zero.clubmed
content2zero.sca
content2zero.latrobe
content2zero.catholic
content2zero.vanguard
content2zero.tatamotors
content2zero.hotmail
content2zero.canon
content2zero.swatch
content2zero.ikano
content2zero.jcb
content2zero.med
content2zero.oracle
content2zero.nab
content2zero.omega
content2zero.schmidt
content2zero.nico
content2zero.aws
content2zero.hitachi
content2zero.dabur
content2zero.sew
content2zero.guardian
content2zero.crown
content2zero.sanofi
content2zero.walter
content2zero.genting
content2zero.sbs
content2zero.nadex
content2zero.gmo
content2zero.glade
content2zero.ladbrokes
content2zero.kerryhotels
content2zero.dell
content2zero.嘉里大酒店
content2zero.nissay
content2zero.飞利浦
content2zero.lupin
content2zero.liaison
content2zero.statoil
content2zero.lipsy
content2zero.next
content2zero.nextdirect
content2zero.ubs
content2zero.warman
content2zero.java
content2zero.emerck
content2zero.xperia
content2zero.stc
content2zero.ericsson
content2zero.active
content2zero.redstone
content2zero.jaguar
content2zero.landrover
content2zero.rwe
content2zero.lego
content2zero.obi
content2zero.shangrila
content2zero.香格里拉
content2zero.norton
content2zero.dnp
content2zero.suzuki
content2zero.lundbeck
content2zero.sandvik
content2zero.duck
content2zero.rexroth
content2zero.nationwide
content2zero.off
content2zero.onyourside
content2zero.raid
content2zero.scjohnson
content2zero.skin
content2zero.volvo
content2zero.tiffany
content2zero.nikon
content2zero.ntt
content2zero.spreadbetting
content2zero.慈善
content2zero.sony
content2zero.jll
content2zero.lancaster
content2zero.新闻
content2zero.sfr
content2zero.statefarm
content2zero.bridgestone
content2zero.brother
content2zero.teva
content2zero.ricoh
content2zero.toyota
content2zero.sandvikcoromant
content2zero.seven
content2zero.symantec
content2zero.gea
content2zero.meet
content2zero.wme
content2zero.삼성
content2zero.samsung
content2zero.pru
content2zero.cfd
content2zero.fan
content2zero.locus
content2zero.extraspace
content2zero.sbi
content2zero.sncf
content2zero.skype
content2zero.forum
content2zero.ipiranga
content2zero.mtn
content2zero.kia
Global Alexa rating
As mentioned by Alexa on their official page, the Alexa rank or rating is calculated using a number of different parameters, such as daily average of unique visitors as well as pageviews over the last three months. The more unique visitors and pageviews, the higher the overall rank.
Content2zero.com
Lowest rating:
996,794
spotted 1,820 days ago
Current rating:
515,281
spotted 1,189 days ago
Best rating:
368,301
spotted 1,199 days ago
Average rating:
490,680
Website domain mistypes
Visitors frequently mistype content2zero.com.Here is a list of most common misspellings:
contdnt2zero.com
wcontent2zero.com
conteng2zero.com
contwnt2zero.com
cojtent2zero.com
conyent2zero.com
content2xero.com
content2aero.com
contemt2zero.com
content2zerp.com
wwcontent2zero.com
fontent2zero.com
contebt2zero.com
content2zwro.com
conrent2zero.com
confent2zero.com
contejt2zero.com
wwwcontent2zero.com
ckntent2zero.com
content2sero.com
conhent2zero.com
contenr2zero.com
conteht2zero.com
content2zeeo.com
content2zefo.com
content2zeto.com
content2zsro.com
contenh2zero.com
comtent2zero.com
vontent2zero.com
cpntent2zero.com
content2zego.com
cohtent2zero.com
contsnt2zero.com
content2zerocom.com
contfnt2zero.com
cobtent2zero.com
contenf2zero.com
conteny2zero.com
xontent2zero.com
contrnt2zero.com
content2zrro.com
cintent2zero.com
congent2zero.com
content2zedo.com
dontent2zero.com
content2zdro.com
content2zfro.com
clntent2zero.com
content2zeri.com
contentz2ero.com
cntent2zero.com
conteent2zero.com
content2zreo.com
ocntent2zero.com
contetn2zero.com
content2zeroo.com
content2zeero.com
conttent2zero.com
conyeny2zero.com
ontent2zero.com
contnt2zero.com
ccontent2zero.com
clntent2zerl.com
contnet2zero.com
conetnt2zero.com
conntent2zero.com
content2zerk.com
content2zro.com
content2zerro.com
conten2tzero.com
contentt2zero.com
coontent2zero.com
comtemt2zero.com
cojtejt2zero.com
congeng2zero.com
cpntent2zerp.com
content2zzero.com
cnotent2zero.com
contet2zero.com
contentzero.com
cohteht2zero.com
content2zer.com
content2ezro.com
content2zerl.com
content2zero.com
content2zeo.com
contennt2zero.com
content22zero.com
cotent2zero.com
content2zeor.com
ckntent2zerk.com
conten2zero.com
cotnent2zero.com
confenf2zero.com
conent2zero.com
cintent2zeri.com
cobtebt2zero.com
content2ero.com
conrenr2zero.com
cokntent2zero.com
contwnt2zwro.com
congtent2zero.com
conbtent2zero.com
ciontent2zero.com
colntent2zero.com
contyent2zero.com
contrent2zero.com
conmtent2zero.com
contehnt2zero.com
contsnt2zsro.com
xcontent2zero.com
cojntent2zero.com
contednt2zero.com
clontent2zero.com
copntent2zero.com
comntent2zero.com
contdnt2zdro.com
cfontent2zero.com
conytent2zero.com
ckontent2zero.com
conftent2zero.com
conjtent2zero.com
conternt2zero.com
contewnt2zero.com
contefnt2zero.com
contdent2zero.com
conrtent2zero.com
cointent2zero.com
cxontent2zero.com
cdontent2zero.com
contwent2zero.com
cvontent2zero.com
cobntent2zero.com
conhenh2zero.com
conhtent2zero.com
vcontent2zero.com
contgent2zero.com
contfent2zero.com
contrnt2zrro.com
cohntent2zero.com
contsent2zero.com
dcontent2zero.com
cpontent2zero.com
contebnt2zero.com
contfnt2zfro.com
conthent2zero.com
contesnt2zero.com
fcontent2zero.com
contenbt2zero.com
content2zedro.com
contemnt2zero.com
content2zerfo.com
content2zwero.com
content2azero.com
content2zxero.com
content2zerpo.com
content2zerio.com
content2zergo.com
conten2zerocom.com
contenjt2zero.com
contentg2zero.com
content2zfero.com
content2zerol.com
content2xzero.com
content2zsero.com
content2zegro.com
contejnt2zero.com
contenyt2zero.com
content2zeroi.com
content2zdero.com
content2zetro.com
content2zefro.com
cotent2zerocom.com
cntent2zerocom.com
conent2zerocom.com
content2zerlo.com
content2zerdo.com
content2zaero.com
contenft2zero.com
contenrt2zero.com
ontent2zerocom.com
contenth2zero.com
content2zesro.com
contenht2zero.com
content2zrero.com
contenty2zero.com
content2zereo.com
content2zerto.com
contenmt2zero.com
content2zewro.com
content2zerko.com
contentf2zero.com
content2szero.com
contnt2zerocom.com
contengt2zero.com
content2zerop.com
content2zerok.com
contentr2zero.com
contet2zerocom.com
wwcntent2zero.com
content2zeocom.com
wwcontent2zeo.com
wwconent2zero.com
wwwconten2zero.com
wwwcontent2zer.com
wcontet2zero.com
wconent2zero.com
wwcontent2zro.com
xonten2zero.com
content2zrocom.com
content2zerocm.com
wwconten2zero.com
wcontent2ero.com
wwwcontent2zeo.com
wwwcontent2zro.com
wwcontent2ero.com
content2erocom.com
wwwconent2zero.com
wcontnt2zero.com
wwontent2zero.com
wontent2zero.com
wwcontentzero.com
xotent2zero.com
xntent2zero.com
xonent2zero.com
wcontentzero.com
wcotent2zero.com
wwwcontentzero.com
content2zeroco.com
wwwcntent2zero.com
wcontent2zer.com
wwwcontet2zero.com
wwcotent2zero.com
contentzerocom.com
wwcontet2zero.com
wwwcontnt2zero.com
wwcontent2zer.com
wcntent2zero.com
content2zercom.com
wwcontnt2zero.com
wcontent2zro.com
wwwontent2zero.com
wwwcontent2ero.com
xontnt2zero.com
content2zeroom.com
wconten2zero.com
wcontent2zeo.com
wwwcotent2zero.com
xontet2zero.com
fonten2zero.com
xontent2zeo.com
vontnt2zero.com
fontent2ero.com
dontent2zeo.com
fontnt2zero.com
vontent2zer.com
vontent2zro.com
vonent2zero.com
pntent2zero.com
xontent2zro.com
dotent2zero.com
fontent2zer.com
cinent2zero.com
fonent2zero.com
fotent2zero.com
votent2zero.com
xontent2ero.com
dontentzero.com
vontent2zeo.com
fontet2zero.com
vonten2zero.com
vntent2zero.com
cintent2ero.com
cintentzero.com
cintent2zro.com
citent2zero.com
vontent2ero.com
dontent2zer.com
donent2zero.com
dontet2zero.com
cinten2zero.com
dontent2zro.com
fontentzero.com
xontentzero.com
fontent2zeo.com
dontent2ero.com
vontet2zero.com
vontentzero.com
xontent2zer.com
fontent2zro.com
cintnt2zero.com
dontnt2zero.com
fntent2zero.com
cintent2zeo.com
dntent2zero.com
intent2zero.com
cintet2zero.com
donten2zero.com
cintent2zer.com
kntent2zero.com
cpntet2zero.com
ckntent2zeo.com
cknent2zero.com
clntet2zero.com
clntent2zeo.com
cobten2zero.com
cobtnt2zero.com
ckntent2zro.com
cohtentzero.com
cpntnt2zero.com
cpntent2ero.com
cknten2zero.com
cobtent2zro.com
clntent2zro.com
clntent2ero.com
ckntent2ero.com
cpnent2zero.com
cltent2zero.com
cobtet2zero.com
clntent2zer.com
obtent2zero.com
ckntentzero.com
cohent2zero.com
chtent2zero.com
cohtnt2zero.com
cobtent2ero.com
cobent2zero.com
clnten2zero.com
cpntent2zro.com
cpntent2zer.com
ohtent2zero.com
clntnt2zero.com
cktent2zero.com
cptent2zero.com
ckntet2zero.com
clnent2zero.com
ckntent2zer.com
cbtent2zero.com
cpnten2zero.com
ckntnt2zero.com
cobtent2zeo.com
cpntent2zeo.com
clntentzero.com
cohtet2zero.com
cpntentzero.com
cobtentzero.com
cobtent2zer.com
lntent2zero.com
cohten2zero.com
comtentzero.com
cohtent2zer.com
conget2zero.com
comtent2zro.com
cojtent2zer.com
comtet2zero.com
onfent2zero.com
congent2zeo.com
congnt2zero.com
cnrent2zero.com
cohtent2zeo.com
cojent2zero.com
ongent2zero.com
confnt2zero.com
comtnt2zero.com
coment2zero.com
cogent2zero.com
cohtent2zro.com
cojtent2ero.com
congent2zer.com
comten2zero.com
congentzero.com
cngent2zero.com
confent2zro.com
confent2ero.com
confent2zeo.com
cofent2zero.com
congent2zro.com
omtent2zero.com
cojtnt2zero.com
cojten2zero.com
confentzero.com
cojtent2zeo.com
comtent2ero.com
cohtent2ero.com
comtent2zer.com
cojtent2zro.com
congen2zero.com
congent2ero.com
ojtent2zero.com
comtent2zeo.com
confet2zero.com
cojtet2zero.com
cmtent2zero.com
confent2zer.com
cjtent2zero.com
cnfent2zero.com
confen2zero.com
cojtentzero.com
onrent2zero.com
cnhent2zero.com
conren2zero.com
ontdnt2zero.com
conhet2zero.com
conyen2zero.com
conyent2zer.com
contdnt2ero.com
contdn2zero.com
conhent2zer.com
contsnt2zro.com
conret2zero.com
conrent2zro.com
conhent2ero.com
contdnt2zer.com
conyent2zeo.com
conyent2zro.com
conhent2zeo.com
conrnt2zero.com
coyent2zero.com
contdntzero.com
onhent2zero.com
cotdnt2zero.com
conhent2zro.com
contst2zero.com
consnt2zero.com
contsn2zero.com
contdnt2zeo.com
contdt2zero.com
conyentzero.com
conrent2zeo.com
onyent2zero.com
cotsnt2zero.com
conyet2zero.com
conhnt2zero.com
corent2zero.com
conhentzero.com
conynt2zero.com
cntdnt2zero.com
condnt2zero.com
conrentzero.com
conhen2zero.com
ontsnt2zero.com
conrent2zer.com
conyent2ero.com
contsntzero.com
conrent2ero.com
contdnt2zro.com
cntsnt2zero.com
cnyent2zero.com
contsnt2ero.com
contrnt2zeo.com
cntwnt2zero.com
contfnt2zro.com
ontfnt2zero.com
cntrnt2zero.com
contrnt2ero.com
contbt2zero.com
cotebt2zero.com
contfnt2ero.com
conteh2zero.com
ontwnt2zero.com
contwt2zero.com
contft2zero.com
contebt2ero.com
contrntzero.com
contrn2zero.com
contfntzero.com
contsnt2zer.com
contwnt2zeo.com
conebt2zero.com
contrnt2zro.com
contfnt2zer.com
contfn2zero.com
cnteht2zero.com
onteht2zero.com
coteht2zero.com
contebtzero.com
cntebt2zero.com
cotrnt2zero.com
contwn2zero.com
contwnt2ero.com
contebt2zer.com
ontrnt2zero.com
contrnt2zer.com
contsnt2zeo.com
cotfnt2zero.com
contwnt2zer.com
contfnt2zeo.com
ontebt2zero.com
cotwnt2zero.com
cntfnt2zero.com
contebt2zro.com
contwntzero.com
contrt2zero.com
coneht2zero.com
conwnt2zero.com
conteb2zero.com
contebt2zeo.com
contwnt2zro.com
contht2zero.com
contem2zero.com
conteht2zeo.com
coneng2zero.com
contemt2ero.com
contejt2zeo.com
conemt2zero.com
conteng2zer.com
conteng2zro.com
coteng2zero.com
ontenr2zero.com
conteht2zro.com
cntejt2zero.com
contemt2zer.com
cotenf2zero.com
cotemt2zero.com
cntemt2zero.com
cnteng2zero.com
conteht2ero.com
contejtzero.com
conteng2zeo.com
contmt2zero.com
conteg2zero.com
onteng2zero.com
contenf2ero.com
contenfzero.com
contenf2zro.com
cntenf2zero.com
conteng2ero.com
contejt2zer.com
cotejt2zero.com
contjt2zero.com
contef2zero.com
contejt2zro.com
contemtzero.com
contehtzero.com
contemt2zeo.com
contejt2ero.com
contng2zero.com
contengzero.com
conteht2zer.com
contemt2zro.com
conenf2zero.com
conejt2zero.com
ontemt2zero.com
contenf2zeo.com
ontejt2zero.com
ontenf2zero.com
contnf2zero.com
contej2zero.com
contenf2zer.com
ontenh2zero.com
contnr2zero.com
contenh2zer.com
cotenh2zero.com
contny2zero.com
conteny2zeo.com
conten2aero.com
contnt2aero.com
contenh2zeo.com
contentsero.com
conenr2zero.com
contenr2ero.com
contenhzero.com
content2aeo.com
conteny2zro.com
conteny2ero.com
contenh2zro.com
cotenr2zero.com
cnteny2zero.com
contet2aero.com
conteny2zer.com
cntent2aero.com
contenh2ero.com
conent2sero.com
cotent2sero.com
contnt2sero.com
content2aro.com
conent2aero.com
contey2zero.com
contenr2zro.com
contenr2zer.com
cntent2sero.com
coneny2zero.com
cntenh2zero.com
cntenr2zero.com
contnh2zero.com
coteny2zero.com
ontent2aero.com
cotent2aero.com
conter2zero.com
conenh2zero.com
content2aer.com
contenr2zeo.com
contenyzero.com
contet2sero.com
contenrzero.com
contentaero.com
ontent2sero.com
onteny2zero.com
conten2sero.com
contentzdro.com
ontent2xero.com
contet2zsro.com
content2zdo.com
ontent2zdro.com
contet2zdro.com
cotent2zwro.com
ontent2zwro.com
contnt2zsro.com
conent2zrro.com
content2ser.com
conent2xero.com
cntent2zsro.com
contet2zwro.com
contnt2zdro.com
conent2zdro.com
conent2zsro.com
content2seo.com
content2xro.com
cntent2zwro.com
conten2zdro.com
contentzsro.com
cotent2zsro.com
content2zwr.com
content2zwo.com
ontent2zrro.com
contnt2zwro.com
content2zsr.com
cntent2zdro.com
contnt2xero.com
conten2xero.com
content2wro.com
content2xer.com
content2dro.com
content2sro.com
ontent2zsro.com
content2xeo.com
conten2zsro.com
content2zso.com
cntent2xero.com
content2zdr.com
conten2zwro.com
contet2xero.com
cotent2zdro.com
cntent2zrro.com
cotent2xero.com
conent2zwro.com
contentzwro.com
contentxero.com
cotent2zrro.com
contet2zrro.com
conten2zrro.com
content2zrr.com
contentzrro.com
content2rro.com
contnt2zrro.com
content2zerocom.com
Domain history
It seems content2zero.com has only been registered once and was never abandoned or has never expired.
Rating by Quantcast
Established in 2006, the technology company Quantcast provides audience measurements and an opportunity for advertising in real time. In addition to that, the American company ensures public access to all sorts of website-related data (traffic and demographic) for millions of websites, as well as in-depth user insights to digital bloggers and publishers enrolled in Quantcast's Quantified Publisher Program. The processing capability provided by Quantcast is impressive – over 800 thousand transactions per second, with, as claimed by the company, accurate audience calculation for over 100 million online destinations. In 2013, Quantcast was widely believed to be among the top five of world's largest data processing companies. Holding offices in London, Dublin, New York and Chicago, the main headquarters of Quantcast is in San Francisco, CA.
Unfortunately, our database contains no Quantcast rank data for Content2zero.com at this time. |
The first time I saw this bird, it wasn’t even illustrated in the standard North American field guides yet.
I was 17 years old, an obsessed teen birder a thousand miles from home, hitch-hiking around south Texas in pursuit of new birds. Back then, the field guides showed two kinds of kingfishers: Belted Kingfisher, found at the water’s edge all across the continent, and the little Green Kingfisher, a Texas specialty. But word through the birding grapevine was that a third species, Ringed Kingfisher, was being seen on a wild stretch of the Rio Grande just downriver from Falcon Dam.
It wasn’t easy to get there by hitch-hiking. It took a whole series of short rides and long walks for me to reach that riverbank. Once I arrived, though, and once I finally spotted the Ringed Kingfisher, there was no mistaking it. The bird came flying high overhead, with a loud, measured tchack! . . . tchack! . . . tchack! . . . as if to announce itself. Just downriver from where I stood, it swooped up to a high branch and let loose with a wild, clattering rattle, raising and shaking a shaggy crest on its head. The bird wore stunning, rich colors, all deep chestnut and blue, and it was huge—it seemed twice the size of a Belted Kingfisher. I stared, open-mouthed in awe, for a minute, and then said to myself: “It’s like a King Kongfisher!”
That was in 1972. At the time, only a few individuals edged across the border near Falcon Dam. But in the years since, Ringed Kingfishers have spread all up and down the lower Rio Grande Valley, from Del Rio to Brownsville, and they’re now hard to miss on even a brief birding visit. They are well established north into central Texas, often showing up along the river in downtown Austin. Wandering birds have reached northern and western Texas, Oklahoma, Louisiana, and even western Florida.
So this big kingfisher is now a staple of U.S. birding, pictured in all the field guides, expected on every south Texas trip. But why did it invade northward in the first place?
Illustration: Kenn Kaufman
Six species of kingfishers live in the Americas. There are places in South America where you can find five of them living side by side. How do five kinds of kingfishers manage to coexist? Ace ornithologist Van Remsen studied this question and found that they separated out by size—large, medium, and small—and by habitat, with three species favoring open water and two living in deep shade. The smallest kingfishers tended to perch lowest, dropping into the water and taking the smallest fish. Ringed Kingfisher, the largest species, chose the highest perches and dove to catch the biggest fish. In tropical waters with a good diversity of fish near the surface, it was possible for fish-catching birds to coexist by specializing on slightly different hunting niches and prey sizes.
How big are those biggest fish nabbed by the Ringed Kingfisher? Up to about eight inches long at the most. In other words, nothing that would be a record catch for a human angler, but this bird also weighs less than a pound. After diving face-first into the water and grabbing a fish in its bill, it has to be able to lift off from the surface and fly away, and there are limits to what it can carry.
Illustration: Kenn Kaufman
South Texas has three coexisting kingfishers in winter, when the medium-sized Belted arrives to join the small Green and large Ringed Kingfisher. (A fourth species, the medium-sized Amazon Kingfisher, has been seen a few times, and one was in Laredo at the beginning of December this year.) In summer, all the Belted Kingfishers retreat northward. They don’t nest any farther south than north-central Texas, and surveys suggest that their numbers have been declining in that region in recent decades. So are Ringed Kingfishers moving north into Texas to fill a niche as Belted Kingfishers become scarcer there? Possibly, but no one has found evidence to back that up. (Besides, would the mighty Kong be held at bay by a mere swarm of Belted adversaries? I don’t think so.)
Could the northward spread of this largest kingfisher be a reflection of a warming climate? That’s a reasonable theory. Many bird species have gone through a northward expansion recently. But unlike many tropical birds, Ringed Kingfishers don’t need hot weather to thrive. They’re widespread in the temperate zone of South America, all the way to the southern end of the continent. I’ve seen a few in southernmost Argentina, fishing the cold waters of Tierra del Fuego, in landscapes and temperatures that reminded me of Alaska. So it doesn’t make sense to think the Texas climate ever would have been too chilly for them.
In the end, I don’t have any good explanation for why this species has invaded Texas, or why it was absent there in the past. All I can say is that this bird that I still call the “King Kongfisher” is a welcome invader, a strikingly beautiful bird, and an exciting addition to our birdlife north of the border.
Illustration: Kenn Kaufman
(Kenn Kaufman's Notebook is a regular column featuring original artwork and essays by Kaufman, a field editor for Audubon, and a world-renowned bird expert, author, and environmentalist.)
Audubon is a nonprofit organization committed to protecting birds and the places they need. We rely on our members for support. You can help us by making a donation today.
We're in a race against time — to give birds a fighting chance in a rapidly changing world. Your support will hellp secure the future for birds at risk from climate change, habitat loss, and other threats. |
Savage Resurrection Suddenly Appears on Steam Early Access
Sometimes they come back. That’s the case of Savage Resurrection, which all of a sudden appeared a few days ago on Steam Early Access without any promotion or fanfare at all.
If you’re a MOBA fan, you might have heard of S2 Games as the makers of Heroes of Newerth. However, they had previously released two games in the Savage franchise – Savage: The Battle for Newerth (2003) and Savage 2: A Tortured Soul (2008). These titles were unique in that they blended various genres (RTS, Action RPG, FPS) and even settings (Sci-fi and fantasy) to create something quite different.
Savage Resurrection, developed with Epic’s Unreal Engine 4, vows to go back to the roots of the first game in the series.
The rebirth of the classic action FPS / RTS hybrid is here! Experience fast-paced combat and cunning strategic gameplay in glorious Unreal 4 environments. Engage in epic 12v12 front-line combat, or take Command to outplay and outmaneuver your team’s way to victory.
Savage is a multiplayer-only game with a competitive focus. Combat includes both melee and shooter aspects, and should challenge even seasoned gamers. Servers are currently located in the US, EU, and AUS with more planned.
As a member of the fearsome Beasts or crafty Humans, you must fight to:
Add Bots! You can sharpen your skills in practice matches, or they can fill missing player or commander slots in Casual matches
Expand our Map offerings
Create new, fun, game modes
Create new features, as requested by the community
Polish and tweak art and interfaces
Create desirable cosmetic items
We decided the best way to create the optimal modern Savage experience was to take Savage 1 as our starting point, then continue developing the game in concert with our community through the Early Access program and beyond.
Our continuing development is funded largely by cosmetic item purchases: there is no persistent power progression system, there are no paid upgrades or boosts. This is a competitive game: there will be no Pay2Win.
So far, user reviews for Savage Resurrection have been very positive with an 82% recommendation rating. Let us know in the comments your opinion, if you’ve played it already. |
I am not a supporter of the Boycott, Divestment and Sanctions (BDS) movement. For a number of years, I had direct contact with many of the international peace and solidarity groups that make it up. There’s a lot of diversity in those organizations, and amongst the people who participate in them. But for someone like me, who believes in a two-state solution, with one of those states being a democratic Jewish homeland, and who finds a great deal of fault for the ongoing Israel-Palestine conflict in all parties, there is more to it than I can live with.
Berkeley students pack an auditorium to debate divestment resolution
However, as I pointed out in an earlier articlein Zeek, pro-peace supporters of Israel do ourselves a disservice when we give in to the radical rhetoric that considers it anti-Israel for anyone to use citizen-based economic action to protest or try to end the occupation.
We’ve seen a striking example of it this week at UC Berkeley. A proposed bill in the student union called for the university to divest its holdings in two American corporations that the students said were profiting from Israel’s occupation. The bill passed by a 16-4 vote.
And then things got interesting.
A wide array of pro-Israel groups (mostly those who obstruct any pressure on Israel to end its occupation, but including, unfortunately, a couple of pro-peace groups as well) came out in opposition and mobilized on campus. The ASUC president, whom I’m told was initially quite supportive of the bill, vetoed the measure.
To override the veto, the 20-member Senate needed 14 votes. In the end, the vote was 13 for overriding, 6 against and one abstention. The motion was then tabled and will be reconsidered next week. But the week leading up to the vote, and especially the night it happened, featured a vigorous and passionate debate on the issue on the UC campus.
What Kind of Divestment?
The attack on the UC senate’s decision offered little of substance. It said the bill was “based on misleading and contested allegations that unfairly targets the State of Israel while also marginalizing Jewish students on campus who support Israel.” But it never addressed the substance. (more…)
Israeli Prime Minister Benjamin Netanyahu states that Israel would not be bullied into peace. The implication, that peace is something the Netanyahu government is, at best, not enthused about, was lost on most of the media.
Where did this tough stance in the face of pressure come from? Well, it turns out that he was referring to an idea that was soon reported by David Ignatius in the Washington Post. According to Ignatius, President Barack Obama is seriously considering putting forth an American peace plan that would be accompanied by American pressure on both Israel and the Palestinians to accept it in principle.
One day later, Netanyahu decided not to attend a summit on nuclear weapons being organized by Obama in
Netanyahu is increasingly being forced to make it clear that he just doesn't want peace
Washington. The excuse he offered was that Arab states intended too bring up Israel’s refusal to sign the Nuclear Non-Proliferation Treaty and its possession of nuclear weapons. Bibi defines this as “Israel-bashing,” a fairly absurd characterization since Israel is well-known as having nuclear weapons (and really makes no secret of it), and it’s more than fair that this be brought up.
More to the point, Bibi surely knew that Arab states would raise this issue in a private meeting long before he accepted the invitation to attend. No, his reason for cancelling is the ongoing tension with Washington over building in Jerusalem, the fact that he would not have had a personal meeting with Obama on the trip and the new idea of an American peace plan.
What can be gleaned from these events? The most obvious point is that the Obama Administration is forcing Netanyahu to make it more and more obvious that he does not want peace. The mantra that Bibi has repeated — “Israel desperately desires peace but has no partner”– has been exposed as paper-thin dissembling. The current Israeli government has no interest in evacuating any settlements, sharing Jerusalem in any way or withdrawing Israeli troops from any of the West Bank. They certainly have interest in finding a way to connect Gaza to the West Bank, much less see the establishment of a Palestinian state. (more…)
In my latest piece in Zeek, I look at the new clarity of so-called “pro-Israel” voices which are not actually pro-Israel but rather anti-peace. These voices are taken to represent Israelis and American Jews and in fact are not at all representative of either group, but stand for views that the majority of those groups reject. |
Defensive helping: threat to group identity, ingroup identification, status stability, and common group identity as determinants of intergroup help-giving.
On the basis of development of the concept of "defensive helping," the authors demonstrated that high ingroup identifiers thwart a threat to group identity through defensive help-giving (i.e., by extending help to an outgroup member whose achievements jeopardize their status). Participants were 255 Israeli high school students (130 boys and 125 girls) ages 16-18. The phenomenon of defensive helping was demonstrated in a minimal group (Study 1) and real-group (Study 2) experiment. Study 3, which examined real groups, supported the extension of the phenomenon of defensive helping to relations between high- and low-status groups, showing that members of a high-status group who perceive status relations with the low-status outgroup as unstable will protect the ingroup's identity by providing dependency-oriented help to the low-status outgroup. Priming for common ingroup identity reversed this pattern, with participants electing to offer autonomy-oriented rather than defensive help. Theoretical and applied implications of these findings are discussed with respect to social change, paternalism, and helping between nations. |
Family of ejected Bills fan plans to sue for wrongful death
Posted by Mike Florio on June 23, 2013, 7:49 PM EST
Getty Images
The smoke signals were noticeable last December. Now, it’s becoming obvious that a wrongful-death lawsuit will be filed on behalf of a man who died after being ejected from a Bills game in November 2012.
According to WGRZ, the family of David Gerken, Jr. has filed formal notice that it intends to sue Erie County. The claim will focus in part on the quality of lighting and fencing at a spot where Gerken fell into a creek and drowned. The suit also will apparently attack the decision to eject Gerken while intoxicated and allowing him to walk away from the stadium by himself.
Erie County owns Ralph Wilson Stadium, and Gerken’s family alleges that Erie County is therefore responsible for the safety of its patrons, even if they are tossed out of the building.
Complicating the situation for Gerken’s family is that Gerken called his brother, who also was attending the game. Gerken told his brother that Gerken had been ejected, and they agreed to meet at a nearby bar after the game.
If the case ever goes to trial, it will be difficult to get a jury to place responsibility on Erie County for Gerken’s safety after leaving the stadium when Gerken’s brother decided to stay and watch the game. The legal theory based on the lighting and fencing gives Gerken’s family a path around that predicament. It could make sense to focus on that argument only, and to avoid completely the idea that his brother decided not to leave the stadium with Gerken.
A jury possibly will have a hard time making anyone else responsible for Gerken’s death when his own brother chose staying at the game over protecting him. The best strategy for the family’s lawyers could be to do whatever is necessary to keep that fact out of the case.
Dealing with intoxicated fans presents a challenge for stadium operators, from a liability standpoint. A stadium that doesn’t eject a drunk fan, risks liability to someone they may injure in the stadium. A stadium that detains them until they are sober or until someone is available to accompany them risks a false imprisonment claim. And if, as the folks in Buffalo did, a stadium summarily ejects a drunk fan, the stadium operator faces a potential claim if something happens to them after they leave the premises.
I feel for their loss, but why is it anyone else’s problem when a person CHOOSES to get so drunk he can’t even care for himself. No, he didn’t deserve to die, but this was his own doing. My guess is that his brother was so tired of dealing with his drunken behavior (probably not the first time) that he figured he should just learn to deal with it.
Where exactly is the stadium located. I picture him being let out in the same place that deliverance was filmed, banjos and all. Maybe it was a canal, slightly different from a creek. It is Buffalo though. He must of sounded sober enough for his bother to tell him to meet at the bar. I don’t care what’s going on, if my brother needed me, Im there. Love you bro!
FinFan68 says:Jun 23, 2013 8:07 PM
The claims are ridiculous. The guy was drunk and did something to warrant getting ejected from the stadium. His own brother chose to stay. the drunk had an accident. Nobody is to blame but him. If he wasn’t rowdy, he wouldn’t have been kicked out. If he wasn’t drunk he probably wouldn’t be dead. The angle about the lighting is just a ridiculous ploy to assign blame where it doesn’t belong and hopefully gain some sort of profit. Do they know he actually fell and didn’t try to kill himself? Regardless, the death is tragic but the only guy to blame is already dead.
db105 says:Jun 23, 2013 8:08 PM
Only in America do we blame others for our own ineptitude.
hedleykow says:Jun 23, 2013 8:09 PM
I’m sort of surprised anyone in the family could stay sober long enough to file a lawsuit.
packhawk04 says:Jun 23, 2013 8:11 PM
So, guy gets drunk and kicked out of a game. His brother, knowing hes drunk and kicked out, allows his drunk brother to leave by himself. Brilliant.
This is an example of everything wrong with this country. Nobody accepts responsibility for anything. Everything is someone else’s fault. It is tragic that he died but who buys a ticket to a football game thinking they have a babysitter to make sure they get home safe? Having said all that he will likely win. Like the guy that slips an injures himself while robbing someone then suing the owner of the house. Sad.
Unless you’re being physically restrained and having alcohol forced down your throat, you’d never get my judgement in favor. If you choose to get drunk at a public establishment, then you assume the risk when that establishment kicks you out
Nobodies fault but his own. Should have been more responsible. The Bills were just trying to protect him from injuring other fans and himself in the stadium. But with the way things are in life I’m sure the family will win. As a tax payer in Erie County, I’m sure my taxes will go up to pay for the lawsuit.
This is just an example of how the legal system works in this country. No matter what someone does there will always be someone else to blame, as long as they have some money. I get drunk drive home and hit a tree, can’t sue the tree but maybe the car company and , the bar and the company that makes what you were drinking, it goes on and on.
whatchutalkinabouthillis says:Jun 23, 2013 8:16 PM
If you’re so drunk that you don’t notice you’re starting to walk into a creek, (which you should notice no matter how much lighting there is, then you are liable for your own behavior at that point. This isn’t kindergarten, no one should be following every drunk around making sure they aren’t doing stupid things. They might as well sue any person who saw him stumbling around and didn’t attempt to assist him, in the lawsuit’s terms, they’re as guilty as the County.
this is the biggest problem in our country. you can sue someone else for your own moronic stupidity and win. wow. honestly that seems more like natural selection at its finest there.
fdugrad says:Jun 23, 2013 8:26 PM
Went to a game in Seattle two years ago. It was the first game I have attended in person in many years. I swear, I have never seen that much drinking by individuals in my sixty years. I had two thoughts running through my mind. The first was how in god’s name are these folks going to drive home without several major accidents. The second thought was are there any limits on consumption of beer within the stadium? I know some people drink when they tailgate prior to the game however, the mountain of empty bottles inside the stadium was striking. I believe the responsibility should rest on the shoulders of deceased man for consuming that huge amount, however I wonder if the family might claim irresponsible over-serving or something along those lines as well as the above mentioned approaches?
hedleykow says:Jun 23, 2013 8:32 PM
The Bills should be grateful they aren’t being sued for wrongful faxing. Wrongful death should be a cakewalk.
hedleykow says:Jun 23, 2013 8:34 PM
Can’t the Bills just take the low road and contend in court that maybe the fellow isn’t dead, but just sleeping it off?
mikeyhigs says:Jun 23, 2013 8:36 PM
So from now on all creeks, streams, brooks, ponds, lakes, and puddles must be littered with street lights to prevent potential drunken drownings. What has taken us so long to realize this!?!
nnagi says:Jun 23, 2013 8:38 PM
this dude got so hammered that he was asked to leave the stadium, unfortunately he paid the ultimate price, nobody’s fault but his own…end of story
Stiller43 says:Jun 23, 2013 8:40 PM
You get so wasted that you get tossed out….youre SO wasted that you drown in a creek (how deep can a creek be?)…and its somebody elses fault…
OKAY
ianijm says:Jun 23, 2013 8:43 PM
It’s tough to blame the family … normally it’s some ambulance chaser who has been whispering in their ear for months about how “unfair” it is that their loved one is gone and how they need to make those responsible “pay” for their deeds so no one else will be “harmed by their gross negligence and despicable actions.”
By the time the shysters are done the family feels like they’d be doing a public disservice if they didn’t sure.
Not to open a can of worms here, but what they should sue Erie County for is serving beer to the point of intoxication to ANYONE or for serving beer at ALL. Add the NFL for good measure and that’s the lawsuit. Don’t worry all of you personal responsibilities conservatives may decry it but it will come it will come – may long live the social evolution of a society out of the dark ages into the light. See Gideon.
no reason to bash his brother on this site.all it says is that he called his brother and said he had been thrown out and meet up later.for all anyone knows the brother could have left the game right then.let him mourn in peace ppl.
I can’t stand wrongful death suits. I was selected for jury duty in a wrongful death lawsuit and let’s just say the family didn’t like what I had to say.
granadafan says:Jun 23, 2013 9:05 PM
Hate to say it but I’m on the Bills side.
commonsensedude says:Jun 23, 2013 9:05 PM
My condolences to the family for their loss but this is a clear cut case of personal responsibility. Nobody made him get drunk. Nobody made his brother stay to watch the game instead of getting him. Maybe the best thing for him would have been if he were taken into temporary custody. But the police have real work to do and are usually too busy to babysit drunk and disruptive fans. There is no case here.
blmonroe12 says:Jun 23, 2013 9:07 PM
At some point, self accountability is a factor. I’ve been to many stadiums and have always found my way around – drunk or sober. When you drink, you need to manage yourself or surround yourself with people that will help you manage yourself. Again, tragic loss, but at some point you are responsible for any outcome.
Why is this even a discussion about being drunk or not drunk? This is a case about the liability of the property owner to provide adequate lighting and security until their patron leaves their premises. As someone else said, if this had been a sober person who stumbled and fell, there would be no debate. If the property owners (namely Erie County and the Bills) wanted to eject this person, they should have escorted him COMPLETELY off the property assure no liability for injury, at which point, I would have turned him over to the police for public intoxication…he would have gone to jail and spent the night getting sober instead of drinking with the fishes.
So yes, Erie County was absolutely negligent in protecting a patron that they deemed unfit to sit in their stadium. Well, the parking lot is still their property, and they are still liable for personal injury or wrongful death unless (or up until) that person leaves their property.
Had they let this man get in his car and drive away and then he killed someone, they would be equally liable for wrongful death. Regardless of the man’s intoxication, Erie County is screwed on this one.
A family of losers indeed, any good judge would toss this case, this family, and their blood sucking lawyer out on their arses….but if the city of Buffalo, or the county detain intoxicated these individuals….why cannot the city or county open some sort of law enforcement sub station to use in cases such as this one?
1964bclions says:Jun 23, 2013 9:35 PM
Sorry… It is his own fault.
Was he wearing his Scott Norwood jersey when he slowly drifted to the right, and landed in the creek?
gcsuk says:Jun 23, 2013 9:36 PM
I pray that the family gets laughed out of court for this one, and somehow the Bills/Erie County find a way to make the family pay the legal fees for wasting their time.
The family should just say “We lost a member of our family”, NOT “How can we make a buck off this?”.
Sorry about the family’s loss. However, I think we all know whose fault this is.
tangerinediesel says:Jun 23, 2013 10:17 PM
I am sorry for the family’s loss, but I will also say they’re selfish and dumb. I’m a fan who likes having drinks before and during games, but I also make sure to be responsible. Thanks to irresponsible selfish people more and more rules come about which hinder my experience. I always have a dd or take the bus, but I can’t order a drink during the 4th because of some idiot in ny who was backed by bleeding hearts. How about this, you screw up big just once on alchohol and your id gets a big red stamp? Have any seller require id regardless of age and stop the idiots from buying. Guess that’s too simple and those of us who drink responsibly will keep getting punished thanks to idiots.
mondaymorningtasters says:Jun 23, 2013 10:27 PM
If this is the creek I am thinking of, its in some woods, how are you supposed to light that properly?
acdc84 says:Jun 23, 2013 10:30 PM
The family should be ashamed. The money they’re wasting on legal fees should have been put to a good cause.
What ever happened to people being responsible for their own actions??
mackcarrington says:Jun 23, 2013 10:50 PM
So drunk that he gets tossed out of the stadium and he wants to meet his brother in a BAR.
Additionally if they think that Erie County has deep pockets they are mistaken. Erie County is as broke as most municipalities in the country at this time. Good luck with that.
Well I would think along terms of any bar; letting a drunk customer leave and he gets into an accident, the bar and the bartender are liable. The same rules would apply here. Doesn’t matter if the dumb brother didn’t take his brother home. He’s gonna have to live with his mistake forever.
They sort of have a case, but I feel the bill will probably win it. Or they settle out of court.
desal2ds says:Jun 23, 2013 10:59 PM
I agree with most on here. While it is a sudden tragic death no one is to blame but the person who died and the people he was with at the stadium who let him leave. Buddy of mine got kicked out of Citi field was bombed but we all left with him. I’m so tired of the lawsuits
omniscient48 says:Jun 23, 2013 11:06 PM
They should never have let him walk out of the stadium and walk home (or to a bar) — they obviously should have let him drive to the bar.
You guys can’t be serious, right? Maybe you’ve just never had the pleasure of working in the service industry.
The people pouring drinks bear a decent share of the blame here. I don’t know how it works everywhere else in the US, but where I live we take classes that blatantly say if you overserve someone, you and your establishment will suffer should something bad happen.
The stadium gladly took his money on over priced beer, but then when he was having too much fun, they booted him out without so much as calling him a cab? At least if he’s that drunk you’d think they’d have him taken away in the back of a cop car. Bad deal for all parties involved.
msstiller58 says:Jun 24, 2013 12:03 AM
He had impaired judgement from the time he decided to walk into a stadium where the Bills were playing. But really, isn’t there some responsibility for a person to be responsible for himself? It’s sad he died. I bet his brother was equally impaired.
steelersarewhatfootballisabout says:Jun 24, 2013 12:41 AM
When are people going to finally accept that the disease of addiction is real? This person is responsible for facing the natural consequences to his actions, and unfortunately, he paid for it with his life. At the same time, legalities aside, there are people posting their comments about this article still thinking that this person chooses to be drunk. If you really understood the intricacies of the disease, you’d know that though a person can choose to learn to live sober one day at a time emotionally, mentally, and spiritually, it is still a very formidable task. If more people consistently attended Al-Anon and/or Nar-Anon, the counterpart to AA or NA, they would get a better grasp. In reality, the Al-Anon and Nar-Anon rooms can be very sparse in their attendance when they actually need to be overflowing with people that their lives had been touched by the pain of a family member, spouse, child, friend, coworker being addicted/alcoholic. But their frustration, powerlessness, and hurt is what they give into, and they let their pain come out in venomous verbal shots towards the person(s) struggling with the disease. Wake up people. It affects human beings all over the world regardless of their socioeconomic status. That’s why it’a disease, it doesn’t discriminate based on your skin color, education level, etc.
So said drunk is thrown out for his drinking , then wants to go to a bar to continue drinking. Then said idiot would get in his car and kill someone else on a DUI. He saved someone’s life by drowning in a creek. Let’s put more creeks in more stadiums, they save lives.
He was drunk. People need to realize that they are still accountable for their actions, especially if they are intoxicated.
defscottyb says:Jun 24, 2013 3:40 AM
Remember when that person sued McDonald’s (and won several hundred thousand dollars) because their coffee was too hot and she burned her mouth? Jeez, people will sue for anything. My personal opinion is this guy brought it on himself (hate to seem insensitive but it’s true). Also, I know from personal experience the horrors of alcohol abuse (for those who cannot handle it)… from myself, alot of my family members and friends as well have been greatly affected by this. I have lost family members and friends directly due to alcohol. I’m not saying it is all bad (for responsible drinkers and those who can handle it (ie: control their doses… yes doses because it is a drug). You wouldn’t just let someone do doses and doses of Heroin would you? So, why alcohol? Pretty sure alcohol causes more deaths a year than hard drugs (statistics anyone)? I’m not pushing for another prohibition (My former job for years was in the liquor industry and I do believe in responsible consumption, education and stopping underage drinking) but let’s face it… Alcohol is a DRUG and it can be just as devastating as any hard drug short term or over time.
How’s THIS for an idea… give everyone a breathalyzer before a beer purchase. If your over the legal limit then no more beer for you simple as that. But, some may be “offended” or claim it’s an invasion of their privacy. Just offering suggestions…
So if I go to a Bills game, get hammered, take home an ugly chick and get her knocked up, will Erie county pay me child support? It’s their fault…they should’ve stopped me from leaving with that mud fence!
hpb2167 says:Jun 24, 2013 6:27 AM
It’s called 3rd party liability…check it out. If he was served over the limit that establishment (stadium in this case) is held accountable, they should have cut him off.
So the guy gets drunk and has an accident. Who would the family blame if he had gotten behind the wheel ,drove off and killed someone else? This is the rare occasion where the dru k person lost the life and the innocent person didn’t . Who would the family try to get money out of in that scenario???
gtodriver says:Jun 24, 2013 8:27 AM
The lawsuit is for “poor lighting and fencing” of a creek.
Does that mean that we have to light and fence off every creek, stream, river, lake and ocean?
And maybe we need to do that for mud puddles too – as it is possible to drown in just a few inches of water.
I watched the video on the link in the story above. That creek was not on any walkway – you couldn’t even see the water from the paved area. A person would have had to walk into the wooded area for a distance to end up in the creek.
There should be no case here – but that doesn’t mean that a jury couldn’t choose to ignore reality and make an award for the grieving family.
Several people are making it a point to point out that the stadium was feeding him drinks to the point of intoxication.
However, the stadium does not serve after half time meaning that the stadium forces people to sober up for 2 or 3 hours before the game is over.
If this man was drunk to the point of not noticing running water then it probably wasnt $9 stadium beer that did it. My guess is that it had something to do with the 4 hours prior to the game that hit him hard. |
Private. None of your data is ever stored anywhere else other than on your computers. There is no central server that might be compromised, legally or illegally.
Encrypted. All communication is secured using TLS. The encryption used includes perfect forward secrecy to prevent any eavesdropper from ever gaining access to your data.
Authenticated. Every node is identified by a strong cryptographic certificate. Only nodes you have explicitly allowed can connect to your cluster.
If you have a security concern, please see the security page for details and contact information. |
California State University turned away a record numbers of qualified applicants – 1 in 10, or 31,000 – last year, for lack of space. On Jan. 11, Gov. Jerry Brown unveiled his proposed 2018-19 state budget; the 3 percent increase for the 23-campus CSU system, say CSU leaders and others, is not enough to help fix the problem.
On the same day, California Faculty Association members staged a pop-up art installation called “Every Student Deserves a Seat – Fund the CSU” on the North Lawn of the State Capitol.
The installation – 1,507 empty white chairs, with each seat representing 20 qualified students – was meant to symbolize the increasing lack of access to CSU and quality public higher education.
Pop-up art installation on Jan. 10 at the State Capitol. There were 1,507 empty chairs; each chair represented 20 qualified students turned away by CSU for lack of space.
Brown budget plan proposes $92.1 million in additional state funding for the CSU. CFA is calling for an additional $422.6 million in state funding for the CSU, which would allow for healthy enrollment growth of an additional 18,205 students.
“By not allowing qualified students access, we’re failing them before they even have a chance to walk in the classroom,” said CFA President Jennifer Eagan. “It’s time for our state to stand up for the CSU—for our students, for our university, and for the future of California.” |
French Open champion Ash Barty's first Grand Slam title allowed her to rise to a career-best No. 2 on Monday, almost three years to the day after she re-entered the WTA rankings following a hiatus from tennis while she played professional cricket.
Barty moved up six places and now trails only reigning U.S. Open and Australian Open champion Naomi Osaka.
"New ground for me. New experiences, new feelings. A goal of mine this year was to try and crack the top 10. And we were able to do that," said Barty, a 23-year-old Australian who ended last season at No. 15. "And then it was chipping away, trying to get top five. It's all happened pretty quickly over the last two weeks. But we're trying to take it in our stride and obviously we'll have a couple of quiet days now to relax, to enjoy, to celebrate. And then set new goals."
She never had been past the fourth round at a major tournament until getting to the Australian Open quarterfinals in January. She beat 19-year-old Marketa Vondrousova of the Czech Republic 6-1, 6-3 in Saturday's final at Roland Garros.
Barty took about a 1½-year break from tennis after the 2014 U.S. Open, saying she needed time away from the pressures and rigors of life on the tour. She returned to competition in 2016, and on June 8 of that year, she moved back into the rankings at No. 623.
Look at her now, so close to No. 1.
"That's kind of the next point, the next goal, the next situation I could see myself in," Barty said about the idea of trying to overtake Osaka for the top spot. "But being No. 2 in the world's incredible. It's something I never dreamed of as a child and obviously we'll keep chipping away and try our best to get to No. 1."
Runner-up Vondrousova's run to her first Grand Slam final helped her get from No. 38 to No. 16 on Monday. Semifinalist Amanda Anisimova, a 17-year-old American, also made quite a jump, going from No. 51 to No. 26.
The player Anisimova upset in the quarterfinals, defending champion Simona Halep, dropped from No. 3 to No. 8. She used to be ranked No. 1.
Another former top-ranked player and past French Open champion, Garbine Muguruza, fell six places to No. 25.
The top eight spots in the ATP rankings stayed the same, with French Open champion Rafael Nadal at No. 2, behind Novak Djokovic. Roger Federer is still at No. 3, and Roland Garros runner-up Dominic Thiem is No. 4.
This was the first time since the 2012 Australian Open that the top four men in the rankings all reached the semifinals at a tournament.
Karen Khachanov, a quarterfinalist in Paris, cracked the top 10 for the first time, rising two spots to No. 9, with Fabio Fognini at No. 10.
Top U.S. man John Isner, who missed the French Open with a foot injury, dropped out of the top 10 to No. 11.
Three-time major champion Stan Wawrinka's run to his first Grand Slam quarterfinal in two years after knee surgery boosted him nine places to No. 19. |
On Monday’s Mark Levin show, Since the day he took office, President Trump has been baselessly threatened with impeachment by the Democrats in Congress. Leading the pack, Nancy Pelosi clamors on and on about convincing Trump supporters that they made a huge mistake. Maybe it’s time we expel Nancy Pelosi and the Democrats from Congress. If they’re gonna talk about impeachment, then we need to talk about expulsion, it’s time to go on offense. Democrats tried to take out Ronald Reagan, George W. Bush and now Trump. Who is the “Party of No” now? We have now reached the point where the Democrat Party is a soviet style party. The Democrat Party is built on violence and ethnic balkanization. It doesn’t care about the Constitution unless it can use it to take out somebody. In addition, the Democrats are trying to drive down Trump’s popularity so they can pick off some Republican seats in the House. When the Democrats are out of office they are viscous and vile. After that, Sen Chuck Schumer is saying that criticizing the media is against the core of democracy. Of course it’s not against American values to criticize them, but is perfectly legitimate. The media is supposed to be a bulwark against government but they were in the tank for Barack Obama and Pelosi. They have thrown in with the progressives. Also, Trump’s plan on infrastructure ought to be resisted. This is not free market economics and will just add to the national debt. It’s not the 1930’s and the New Deal. The problem is too much government, Andrew Jackson would be absolutely appalled at this. The problem with this country is too little economic freedom and too little commerce. The majority of this money is going to new projects not to fix old bridges, tunnels, etc.
THIS IS FROM:
Right Scoop
‘What has the Trump administration done?…They’ve done NOTHING’ – Nancy Pelosi
Independent Journal Review
Jorge Ramos: Okay for Illegal Immigrants to Use Fake IDs because They’re ‘Here to Benefit Our Lives’
DC Whispers
Dems Prepare To Disrupt President Trump’s Address To Congress
NJ
Wendy’s reportedly to install self-order kiosks at 1,000 stores
NRO
New DNC Chairman Tom Perez Is No ‘Moderate’ At All
The podcast for this show can be streamed or downloaded from the Audio Rewind page.
Image used with permission of Getty Images / Chip Somodevilla |
1993 Benson & Hedges Cup
The 1993 Benson & Hedges Cup was the twenty-second competing of cricket’s Benson & Hedges Cup. It was an English limited overs county cricket tournament which was held between 27 April and 10 July 1993. The tournament was won by Derbyshire County Cricket Club who defeated Lancashire County Cricket Club by 6 runs in the final at Lord's.
Format
In the late 1980s the Test and County Cricket Board (TCCB) created a Structure Working Party under the chairmanship of Michael Murray to identify weaknesses in the structure of county cricket and suggest improvements. It reported in 1992. Its main recommendations were the reduction of the County Championship from 22 matches a side to seventeen (each of the eighteen first-class counties playing each other once), all County Championship matches to be played over four days, the Sunday League to be extended from 40 overs a side to 50 overs, and the dropping of the zonal stage of the Benson & Hedges Cup, which would instead be played as a knockout.
These changes were adopted in advance of the 1993 season by a vote of eleven to eight (with one abstention) at a special meeting of the TCCB on 19 May 1992. Although it was agreed that the system should last for a minimum of three years, it was agreed to revert to a zonal system at the TCCB winter meeting on 8–9 December 1993. The changes were implemented in time for the 1995 season.
Fixtures and results
Preliminary round
First round
Quarter-Finals
Semi-Finals
Final
References
See also
Benson & Hedges Cup
Category:Benson & Hedges Cup seasons
Category:1993 in English cricket |
7-[3-(1-piperidinyl)propoxy]chromenones as potential atypical antipsychotics.
Compound 1 (1-benzyl-3-methyl-4-[4-(4-fluorophenyl)-4-oxobutyl]piperazine), a synthetic intermediate identified as a potential atypical antipsychotic, was selected as the starting point for pharmacological improvement. From 1, sequential structural variations were conducted in order to improve its potency and oral bioavailability. These variations included a series of piperazine, ethanediamine, and piperidine derivatives. The piperidine series afforded some orally potent compounds in the inhibition of apomorphine-induced climbing and hyperactivity in mice, which are regarded as behavioral models predictive of antipsychotic efficacy. Further optimization of these structures led to the highly potent 7-[3-(1-piperidinyl)propoxy]chromenones. Inhibition of stereotypies and induction of catalepsy in rats at doses substantially higher than required for inhibition of climbing suggest an atypical antipsychotic profile, which is assumed to predict a reduced induction of extrapyramidal side effects in humans. |
The anti-white racism of the political left remains one of the few taboo subjects in America. In this book, David Horowitz, a former confidante of the Black Panthers, lays bare the liberal attack on whiteness, the latest battle in the war against American democracy.
Horowitz acknowledges that America's political culture is the creation of white, European, primarily Christian males. But it is these very men and their heirs that have led the world in abolishing slavery, establishing the principles of ethnic and racial inclusion, and creating a society of unparalleled rights and opportunities that people of every race and creed continue to flock to. Horowitz points to the hypocrisy of this and challenges racism in all its forms, especially the hidden ones. Download and start listening now!
BK_BLAK_003174
Listener Opinions
by Elke | 11/6/2012
" Horrible, one sided book that basically convinces me of nothing. "
by Andy | 10/26/2012
" A collection of essays, and as such, a bit uneven. Comes out swinging with the title piece, continues to hit hard with the next essay, an expose of the Black Panthers, but then bogs down into obligatory Clinton-bashing endemic of the era. "
by Jessica | 4/9/2011
" Good points. Great perspective. "
by Ted Heitz | 6/7/2009
" Nothing new really, but interesting enough and reassuring that a conversion is possible. "
[ShoppingCartItemsAddedOnMerge] audiobook(s) were left in your cart from a previous visit, and saved to your account for your convenience. You may view or remove these audiobooks on the shopping cart page. |
Complementary and alternative medicine and lymphedema.
To review the evidence for the effectiveness of complementary and alternative medicine (CAM) on cancer-related lymphedema. CINAHL, PsycINFO, and PubMed (1990-2012). To date, there is insufficient evidence to draw conclusions about the benefits of CAM use for cancer patients with lymphedema. Although some CAM types may offer positive effects for the management of lymphedema, negative adverse effects have also been observed. Oncology nurses and therapists should be aware of and ready to educate cancer patients about the potential effects of CAM. A conversation about the potential risks and benefits of CAM use should be provided. |
Earl Bellamy profile links
Earl Bellamy profile links
Earl Bellamy net worth & biography:
Directed more than 1,600 episodes of television. Graduated from Hollywood High School in 1935 and got a job as a messenger at Columbia Studios, working his way up to second assistant director by 1939. Served in the U.S. Navy's photographic unit near the end of World War II. Wikipedia
More about Earl Bellamy:
Filmography
Awards
Salaries
Facts
Quotes
Trademarks
Pictures
Director
Director
Title
Year
Status
Character
Rin-Tin-Tin: Hero of the West
1991
Video archive directed by
Lime Street
1985-1986
TV Series 2 episodes
V
1985
TV Series 1 episode
Trapper John, M.D.
1982-1985
TV Series 18 episodes
Blue Thunder
1984
TV Series 1 episode
Hart to Hart
1980-1984
TV Series 12 episodes
Magnum Thrust
1981
Code Red
1981
TV Series 1 episode
CHiPs
1981
TV Series 2 episodes
The Love Boat
1981
TV Series 2 episodes
Fantasy Island
1978-1980
TV Series 20 episodes
Valentine Magic on Love Island
1980
TV Movie
The Castaways on Gilligan's Island
1979
TV Movie
Starsky and Hutch
1976-1979
TV Series 9 episodes
Eight Is Enough
1978-1979
TV Series 2 episodes
Desperate Women
1978
TV Movie
The San Pedro Beach Bums
1977
TV Series 2 episodes
Young Dan'l Boone
1977
TV Series 1 episode
Speedtrap
1977
Sidewinder 1
1977
Fire!
1977
TV Movie
Future Cop
1977
TV Series 1 episode
Flood!
1976
TV Movie
The Quest
1976
TV Series 1 episode
Isis
1976
TV Series 2 episodes
The Wackiest Wagon Train in the West
1976
archive footage
Stranded
1976
TV Movie
Medical Center
1969-1976
TV Series 22 episodes
Against a Crooked Sky
1975
Walking Tall Part II
1975
Matt Helm
1975
TV Series 1 episode
S.W.A.T.
1975
TV Series 2 episodes
The Six Million Dollar Man
1975
TV Series 2 episodes
Sidecar Racers
1975
Seven Alone
1974
Dusty's Trail
1973-1974
TV Series 2 episodes
The F.B.I.
1972-1973
TV Series 4 episodes
The Brian Keith Show
1973
TV Series 7 episodes
M*A*S*H
1973
TV Series 2 episodes
Marcus Welby, M.D.
1972
TV Series 1 episode
The Rookies
1972
TV Series 2 episodes
The Partners
1971-1972
TV Series 3 episodes
My Three Sons
1971-1972
TV Series 24 episodes
The Sixth Sense
1972
TV Series 1 episode
The Brady Bunch
1972
TV Series 1 episode
Me and the Chimp
1972
TV Series 1972
The Trackers
1971
TV Movie
Mod Squad
1968-1971
TV Series 14 episodes
The Partridge Family
1971
TV Series 1 episode
The Young Rebels
1970
TV Series 1 episode
That Girl
1970
TV Series 1 episode
Then Came Bronson
1970
TV Series 1 episode
The Doris Day Show
1969-1970
TV Series 2 episodes
The Desperate Mission
1969
TV Movie
The Pigeon
1969
TV Movie
To Rome with Love
1969
TV Series
Backtrack!
1969
Gentle Ben
1968-1969
TV Series 4 episodes
My Friend Tony
1969
TV Series
Three Guns for Texas
1968
I Spy
1966-1968
TV Series 14 episodes
Cowboy in Africa
1968
TV Series 3 episodes
Heroic Mission
1967
TV Series
Accidental Family
1967
TV Series 2 episodes
Get Smart
1967
TV Series 7 episodes
Daniel Boone
1966-1967
TV Series 6 episodes
Tarzan
1966
TV Series 2 episodes
Iron Horse
1966
TV Series 1 episode
The Monroes
1966
TV Series 1 episode
Munster, Go Home!
1966
Laredo
1965-1966
TV Series 3 episodes
The Virginian
1962-1966
TV Series 8 episodes
Gunpoint
1966
The John Forsythe Show
1965-1966
TV Series 2 episodes
Incident at Phantom Hill
1966
Pistols 'n' Petticoats
1966
TV Series 2 episodes
The Munsters
1964-1965
TV Series 7 episodes
Fluffy
1965
Kraft Suspense Theatre
1965
TV Series 1 episode
McHale's Navy
1964-1965
TV Series 6 episodes
Broadside
1964
TV Series 2 episodes
Destry
1964
TV Series 1 episode
Arrest and Trial
1963-1964
TV Series 2 episodes
The Andy Griffith Show
1963-1964
TV Series 7 episodes
Perry Mason
1963
TV Series 3 episodes
Rawhide
1963
TV Series 1 episode
Leave It to Beaver
1960-1963
TV Series 4 episodes
Wide Country
1963
TV Series 1 episode
Alcoa Premiere
1963
TV Series 1 episode
Our Man Higgins
1962
TV Series
Stagecoach to Dancers' Rock
1962
Mr. Smith Goes to Washington
1962
TV Series
Kraft Mystery Theater
1962
TV Series 1 episode
Bachelor Father
1959-1962
TV Series 82 episodes
General Electric Theater
1962
TV Series 1 episode
Frontier Circus
1962
TV Series 1 episode
The Bob Cummings Show
1961
TV Series 3 episodes
The Donna Reed Show
1961
TV Series 1 episode
Whispering Smith
1961
TV Series 1 episode
Checkmate
1961
TV Series 1 episode
O'Conner's Ocean
1960
TV Movie
Laramie
1959-1960
TV Series 2 episodes
Pete and Gladys
1960
TV Series 1 episode
Bat Masterson
1960
TV Series 1 episode
The Best of the Post
1960
TV Series 1 episode
Westinghouse Desilu Playhouse
1960
TV Series 1 episode
Lassie
1959-1960
TV Series 7 episodes
M Squad
1957-1960
TV Series 3 episodes
U.S. Marshal
1959
TV Series 2 episodes
Tales of Wells Fargo
1957-1959
TV Series 41 episodes
State Trooper
1956-1959
TV Series 3 episodes
Mike Hammer
1959
TV Series 3 episodes
Schlitz Playhouse
1958
TV Series 1 episode
The Toughest Gun in Tombstone
1958
Studio 57
1958
TV Series 1 episode
The Restless Gun
1958
TV Series 4 episodes
Sergeant Preston of the Yukon
1957-1958
TV Series 8 episodes
Wagon Train
1957-1958
TV Series 2 episodes
The Lone Ranger
1956-1957
TV Series 29 episodes
Annie Oakley
1956-1957
TV Series 2 episodes
The Sheriff of Cochise
1957
TV Series 1 episode
Soldiers of Fortune
1955-1956
TV Series 4 episodes
Crusader
1956
TV Series 1 episode
Blackjack Ketchum, Desperado
1956
The Adventures of Rin Tin Tin
1955-1956
TV Series 7 episodes
Masquerade
1955
TV Movie
Jungle Jim
1955
TV Series 4 episodes
Tales of the Texas Rangers
1955
TV Series
Seminole Uprising
1955
The Lineup
1954
TV Series 3 episodes
Assistant Director
Assistant Director
Title
Year
Status
Character
A Star Is Born
1954
assistant director
It Should Happen to You
1954
assistant director
From Here to Eternity
1953
assistant director
Let's Do It Again
1953
assistant director
Salome
1953
assistant director
Castle in the Air
1952
assistant director
He Cooked His Goose
1952
Short assistant director - uncredited
The Marrying Kind
1952
assistant director
Ten Tall Men
1951
assistant director
Chain of Circumstance
1951
assistant director
Sirocco
1951
assistant director
Born Yesterday
1950
assistant director
Emergency Wedding
1950
assistant director
The Fuller Brush Girl
1950
assistant director
In a Lonely Place
1950
assistant director
A Woman of Distinction
1950
assistant director
And Baby Makes Three
1949
assistant director
The Reckless Moment
1949
assistant director
Johnny Allegro
1949
assistant director
Laramie
1949
assistant director - uncredited
Desert Vigilante
1949
assistant director - uncredited
The Crime Doctor's Diary
1949
assistant director - uncredited
Shockproof
1949
assistant director
El Dorado Pass
1948
assistant director
Black Eagle
1948
assistant director
The Loves of Carmen
1948
assistant director
Sport of Kings
1947
assistant director
Bulldog Drummond at Bay
1947
assistant director - uncredited
Jewels of Brandenburg
1947
assistant director
Backlash
1947
assistant director
Vacation Days
1947
assistant director
Dangerous Millions
1946
assistant director
Kiss and Tell
1945
assistant director
Counter-Attack
1945
assistant director
Rough Ridin' Justice
1945
assistant director
Mr. Winkle Goes to War
1944
assistant director
The Desert Hawk
1944
assistant director
Jam Session
1944
assistant director
Klondike Kate
1943
assistant director
The Return of the Vampire
1943
assistant director - uncredited
The Chance of a Lifetime
1943
assistant director
Footlight Glamour
1943
assistant director
After Midnight with Boston Blackie
1943
assistant director - uncredited
The Talk of the Town
1942
third assistant director - uncredited
Arizona
1940
assistant director - uncredited
Producer
Producer
Title
Year
Status
Character
Stagecoach to Dancers' Rock
1962
producer
Won awards
Won awards
Won awards
Year
Award
Ceremony
Nomination
Movie
Award shared with
2002
Golden Boot
Golden Boot Awards
1954
DGA Award
Directors Guild of America, USA
Outstanding Directorial Achievement in Motion Pictures
From Here to Eternity (1953)
Fred Zinnemann
Nominated awards
Nominated awards
Nominated awards
Year
Award
Ceremony
Nomination
Movie
Award shared with
1968
DGA Award
Directors Guild of America, USA
Outstanding Directorial Achievement in Television
I Spy (1965)
1967
Primetime Emmy
Primetime Emmy Awards
Outstanding Directorial Achievement in Comedy
I Spy (1965)
1958
DGA Award
Directors Guild of America, USA
Outstanding Directorial Achievement in Television
Wagon Train (1957)
Looks like we don't have Earl Bellamy salary information. Sorry!
#
Fact
1
Talks about the Bela Lugosi movie The Return of the Vampire (1943)--on which he worked as assistant director--in the book "A Sci-Fi Swarm and Horror Horde" (McFarland & Co., 2010) by Tom Weaver.
2
Children: Earl J. Bellamy, Michael Bellamy, Karen Bellamy.
#
Quote
1
[about the ability of Highland Dale--aka "Beauty"--the title horse used in Fury (1955), to play baseball] The horse was out in center field. When the kid hit the ball, wherever it went, Fury went after it and ran to home base with it. McCutcheon [trainer Ralph McCutcheon] had the horse so well trained he could say, "All right, Beaut, go". The horse would run and Ralph would yell to him, "Look over your right shoulder" and the horse would turn while running and look back. He could do that on either the right or left side. What McCutcheon used to train horses and dogs I'll never know, but he was unbelievable! |
A perspective on sympathetic renal denervation in chronic congestive heart failure.
Medical therapy has indisputably been the mainstay of management for chronic congestive heart failure. However, a significant percentage of patients continue to experience worsening heart failure (HF) symptoms despite treatment with multiple therapeutic agents. Recently, catheter-based interventional strategies that interrupt the renal sympathetic nervous system have shown promising results in providing better symptom control in patients with HF. In this article, we will review the pathophysiology of HF for better understanding of the interplay between the cardiovascular system and the kidney. Subsequently, we will briefly discuss pivotal renal denervation (RDN) therapy trials in patients with resistant hypertension and then present the available evidence on the role of RDN in HF therapy. |
Q:
JSF resets fields when doing an ajax update
I have a problem on my JSF page where I type a name into the first billing first name field. If I click on copy billing address checkbox; this stops rendering the delivery address panel and hides it via ajax, the value I just typed into the first field gets reset to its previous state.
JSF Page
<h:form>
<p:inputText value="#{addressBean.billingAddress.firstName}" required="true"/ >
<p:selectBooleanCheckbox value="#{addressBean.copyBillingAddress}" id="duplicateBillingDetails">
<f:ajax render="@form" />
</p:selectBooleanCheckbox>
<h:panelGrid rendered="#{not addressBean.copyBillingAddress}" columns="3">
<p:inputText value="#{addressBean.deliveryAddress.firstName}"/>
</h:panelGrid>
<p:commandButton value="Checkout" action="#{addressBean.saveAddress}"/>
</h:form>
Backing Bean
@Component
@Scope("view")
public class AddressBean implements Serializable {
@Inject
private CurrentUserBean currentUserBean;
@Inject
private UserService userService;
private Address deliveryAddress = new Address();
private Address billingAddress = new Address();
private boolean copyBillingAddress;
public AddressBean() {
}
public boolean isCopyBillingAddress() {
return copyBillingAddress;
}
public void setCopyBillingAddress(boolean copyBillingAddress) {
this.copyBillingAddress = copyBillingAddress;
}
public String saveAddress() {
if (copyBillingAddress) {
deliveryAddress = new Address(billingAddress);
}
User user = currentUserBean.getUser();
if (!billingAddress.isSame(user.getBillingAddress())) {
user.setBillingAddress(billingAddress);
}
if (!deliveryAddress.isSame(user.getDeliveryAddress())) {
user.setDeliveryAddress(deliveryAddress);
}
currentUserBean.setUser(userService.save(user));
return "/checkout.xhtml";
}
public CurrentUserBean getCurrentUserBean() {
return currentUserBean;
}
public void setCurrentUserBean(CurrentUserBean currentUserBean) {
this.currentUserBean = currentUserBean;
}
public Address getDeliveryAddress() {
return deliveryAddress;
}
public void setDeliveryAddress(Address deliveryAddress) {
this.deliveryAddress = deliveryAddress;
}
public Address getBillingAddress() {
return billingAddress;
}
public void setBillingAddress(Address billingAddress) {
this.billingAddress = billingAddress;
}
}
A:
The <f:ajax> processes by default only the current component as in execute="@this". So the submitted values of all other input components won't be processed and thus not be updated into the model. However, you're by render="@form" forcing the entire HTML output of the form to be refreshed with current (non-updated!) model values of all other input components.
Assuming that your intent is to not unnecessarily convert/validate/update all other input components, you'd better make the render attribute more specific. Update only the content which really needs to be updated and not the entire form.
<p:selectBooleanCheckbox value="#{addressBean.copyBillingAddress}" id="duplicateBillingDetails">
<f:ajax render="copyBillingAddress" />
</p:selectBooleanCheckbox>
<h:panelGroup id="copyBillingAddress">
<h:panelGrid rendered="#{not addressBean.copyBillingAddress}" columns="3">
<p:inputText value="#{addressBean.deliveryAddress.firstName}"/>
</h:panelGrid>
</h:panelGroup>
Or, if you really need the render="@form", then you need to add a execute="@form" in order to tell <f:ajax> to process all other input components as well.
<f:ajax execute="@form" render="@form" />
Note that this may unnecessarily trigger conversion/validation on those input components.
See also:
Why do I need to nest a component with rendered="#{some}" in another component when I want to ajax-update it?
|
This Valet Stand has a modern look and features a hanger for suits and jackets, a bar for hanging pants, and a drawer for storing jewelry, watches, wallets and change. The top circular mirror is perfect for a quick glance. The Valet measures 19-21/25" W x 14-24/25" D x 54-19/25" H and has a rich Espresso finish. |
If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
Excuse me if this has already been fixed on CVS or someone else has already posted a patch.
Anyway, here are the changes required for the "UI->Folders" to work correctly:
1) From folders.itcl, change line 921 from:
set form_td [td "ALIGN=CENTER" [html_form_checkbox "fsid($fsid)" ""]]
to:
set form_td [td "ALIGN=CENTER" [html_form_checkbox "fsida($fsid)" ""]]
2) From confirm.itcl, change line 33 from:
if {$id!=""} {set fsid($id) 1}
to:
if {$id!=""} {set fsida($id) 1}
3) For some reason folders.itcl references checkall.js instead of CheckAll.js and since I don't know where to change that I simply created a copy of script file as "checkall.js".
The folders.itcl has been broken since several versions so I hope this will help the developer correct these issues for the upcoming release.
Started messing around with updating my folder definitions with holiday time on my hands and implemented these changes to try and fix problems. Actually #2 is already present in the latest TWP although #1 was not. Still having difficulty getting non-series recordings to assign to a folder and even when they do they sometimes go back to unassigned after trying to add something else.
updated todofeed module
Here's an update for the todofeed module, which provides an iCal-formatted todo list that is viewable in most calendar programs. It fixes a character set problem where non-English accents would break the feed. This version also validates to the iCalendar 2.0 Strict ruleset, if that kind of thing keeps you up at night.
Inaccurate video search
Why does the Search by Title + Movies feature return different results than the same search in the TiVo UI? For example, I was just browsing through the movies for the next two weeks, and both the TiVo and TiVoWebPlus returned Blade Runner: The Final Cut on Encore HD, but TWP did not return Blade Runner, which is also on. The TiVo listed both. I have noticed before quite a few times that the TiVo UI would list an item while TWP does not, and sometimes even the reverse, where the Movie filter excludes the program on the TiVo UI, but it shows up on TWP. Obviously, there must be some sort of difference between the two filter mechanisms, but what? I don't mind at all TWP listing a handful of programs that the TiVo UI does not think are movies, but I very much would rather TWP not miss any movie listings, as this might easily cause me to miss recording something I very much want to record. |
Search form
You are here
Python. Why Did it Have to be Python?
March 4, 2013 - 10:22amisabelleg
It is the Year of the Snake, and here at ActiveState, the snake in question has always been Python. The Year of the Snake heralds a great year ahead for the Python community. Second blog of a series celebrating the Year of the Python.
The Python Way
Over thirty years ago, Harrison Ford as Indiana Jones spoke the famous phrase, “Snakes. Why did it have to be Snakes?” in the film Raiders of the Lost Ark. At ActiveState, we too have often reflected on our relationship with snakes, except we weren’t quite so worried about a roomful of Python(ista)s.
Embracing Python was an obvious choice for ActiveState, but finding the Python way was not that easy. The Python community is vibrant, and over the years, pythonists, pythonistas, and pythoneers have elaborated a strong culture. The Python philosophy, summarized in a document called “The Zen of Python,” rejects exuberant syntax, such as the one used in Perl in favor of a simpler grammar. Aphorisms such as “Simple is better than complex,” “Explicit is better than implicit,” and “Readability counts,” capture the essence of the Python philosophy. “Pythonistas tend to be very interested in the cleanness of the language,” says Troy Topnik, ActiveState’s Technical Writer. In contrast to the Perl’s principle which states that "there is more than one way to do it," pythoneers believe there should only be one clear right way to do it.
This presents a set of challenges for anyone seeking to make a contribution, and it comes down to getting agreement on which way is “the right way.” Yet with ActivePython, ActiveState has learned to navigate the Python Way.
Supporting Enterprises: It Just Works
With the ActivePython distribution, first released in in 2000, ActiveState supports the needs of Python users and solves critical problems. “The enterprise support we provide is our biggest Python contribution,” says Jeff Hobbs, VP, Engineering at ActiveState. “We provide consistent cross-platform support, and we make sure it works.”
Given how easy it is to learn Python, it is almost surprising that enterprises need support at all. And as a matter of fact, Graham Stuart, ActiveState’s Tech Lead, QA/Support, confirms that Python is lower maintenance than any other language. “It just seems that Python users don’t hit the same problems that Perl people do,” Stuart says. Yet sooner or later, Python enterprise users hit some roadblocks, and ActivePython clears the way for them. For example, upgrading to new Python versions used to be very difficult for Windows users. “With ActivePython, it becomes simpler to upgrade, and there are fewer traps and gotchas,” Stuart says. But the major breakthrough came with PyPM.
PyPM: The Life of Python Made Easy
PyPM is ActivePython’s package manager, and simplifies the process of finding and installing modules, libraries, and extensions for Python. One of the drivers for initiating PyPM was the need to solve complicated deployment problems for Python modules such as SciPy and NumPy. Developed in 2009, PyPM offers a simple way to install modules, and saves time and deployment headaches.
It significantly improved on pip, the default method for installing Python packages, by using binary packages pre-built for the target architecture. This saves significant time and effort over compiling some modules from source.
The Year of the Python Continues at ActiveState
Over the years, ActiveState has been involved in many more initiatives related to Python. Watch for our next Year of the Python Blog to be posted soon: Dragon Meets Snake, or how Python became the foundation for the Komodo IDE. |
Enchanted, Indeed!
Posted by Bill Vossler
10/31/2016 3:30:45 PM
Enchanted, Indeed!
Highway Helps Town and Aids Region's Tourism
By Bill Vossler
When Gary Greff took a sabbatical from teaching school in 1989, little did the Regent, North Dakota, native know he would stay in his hometown, and become the town's, and perhaps even the region's, savior. "Well, I'd say that's pretty strong language. I'd rather say 'I helped,'" Greff says of that characterization.
While in Regent again he realized his hamlet needed some betterment, or it would die. "In only 20 years it had lost a third of its population, so I knew something had to be done to get people and businesses here."
One day while driving down Hettinger County Road 2117, he spotted a well-worn path into a field of harvested corn. Several visitors were snapping pictures of prairie art: a dummy in overalls hoisting a thousand-pound hay bale above its head.
"I thought, if people will drive off the road for that, how many more would come for something grander? No big business is going to come into a small community like this. We've got to work with what we've got, and what we had was a paved highway. So I figured, ‘I'll give you a reason to drive down it.'"
That "something grander" became his dream of the Enchanted Highway, today's seven giant iron sculptures reflecting prairie life situated along 32 miles of lonely, winding, but very accessible road south off Interstate 94's Exit 72. The Enchanted Highway offers panoramic views of grassland, buttes, and bluffs - and the largest iron sculptures in the world - before ending on Regent's Main Street.
Auspicious Beginning
At the outset, everything looked grand for the implementation of Greff‘s idea. The first two sculptures reinvigorated the community, says Greff. Supported financially by citizens, local civic organizations, and the North Dakota Council on the Arts, a local crew of farmers and ranchers spent the winter of 1992 making the Tin Family. "This was first because family was important in settling our country," Greff says.
The Tin Family, like all the sculptures, utilizes local products - barbed wire for the mother's hair, grain augers for earrings, while the son licks a lollipop - the bottom of a 500-gallon farm fuel tank. "Normal-sized sculptures wouldn't lure people into my sleepy town," Greff says. That's why all the sculptures are oversized. Tin Pa, supported by 16 hidden telephone poles, is 45 feet tall. Tin Ma, a foot shorter, is supported by a dozen. Tin Kid is 23 feet high. "It took a bit of engineering to figure what size could be supported against the prairie wind and storms."
A year later came Theodore Roosevelt Rides Again. Used oil well pipe was erected to build this second sculpture, weighing 9,000 pounds, commemorating the 26th U.S. President, who declared that if it had not been for the time he spent in North Dakota, especially its Badlands located 90 miles away from Regent, he would never have been President.
Teddy, created in 1993, rides his favorite horse, Mulley, 51-feet tall, behind a stagecoach for children, and a jungle gym. Greff received less family and community help for this sculpture.
And that would be the pattern moving on as he created his next five sculptures. Though farmers have since loaned equipment, and leased land for $1 so Greff could continue his project, early enthusiasm has waned. "I began to realize this was going to end up being a Greff thing," the 61-year-old bachelor says.
The project has been his full-time non-paying job for two decades. "I figured nobody else could give up that kind of time." He hires area youth, including Boy Scouts, to help him from time to time.
The sculptures stretch from the largest, Geese in Flight, higher than a 10-story building, just off I-94's Exit 72, followed by another every four miles south. Each sculpture area possesses a parking lot, picnic tables, information board, and small, child-friendly sculptures to climb on. All the folk-art sculptures are huge, most 40 feet or taller, constructed of local materials - oil well tanks and pipes, old farm machinery, scrap metal.
Kathy Greff, Gary's sister-in-law, says her four sons and other area youth have worked on the project. "They've learned a lot, responsible job safety, welding, site mowing and upkeep. Eagle Scout projects included building playground equipment and bulletin boards for the sites."
"They've also learned about recycling," Greff says. "Most of the sculptures first belonged to something else."
The other finished sculptures include:
Pheasants on the Prairie. This third sculpture was completed in 1996, in honor of the game bird that brings hunters to the area. The three-dimensional 40-foot high by 70-foot long rooster pheasant, with his 35-by 60-foot hen, and trio of 15-by-20-foot chicks, all made of wire mesh, are so real, area clergyman Joe Berg recalls that a hunting dog half a mile away went immediately into point.
Also memorable was the time Greff had to cut a pheasant in half because it was too wide to come out of the workshop.
Grasshoppers in the Field. In 1999, sculpture number four was erected. "The grasshopper forced the farmer to find alternative crops, but more importantly, it challenged his patience and integrity, making him a better farmer," Greff says.
The five grasshoppers, made of old fuel oil and oil well tanks cut into pieces and welded back together, face the road. The largest, 40-feet tall and 50-feet long, is trailed by four 12-by-15-foot grasshoppers, as well as three smaller ones suitable for youngsters' crawling. The work took one winter, and another for site readiness.
Geese in Flight came next, in 2001. Atop the hill off I-94's exit 72, this sculpture intrigued passersby with its monstrous size. The gravel road up to the sculpture is flanked by miniature metal geese on steel poles. The sculpture itself, built of flattened oil well tanks, pipes, and scrap metal, was the most expensive at $50,000. "Most went for a construction crane," Greff says. Weighing 157,659 pounds, it is listed in the Guinness Book of World Records as the world's largest scrap-metal sculpture. At 154 feet, it is nearly as wide as a football field.
Deer Crossing. Silhouettes of a buck 75-feet high by 60-feet long and a doe 50-by-50-feet grace the road a few miles south. He had to perform surgery on the buck's leg, as telephone poles made Regent's Main Street's too narrow. "I rewelded the leg on out at the site."
The deer are also made of oil well tanks cut apart and welded to form the shadow-like design.
Fisherman's Dream. The most recent sculpture, a three-dimensional view of seven fish in the sky, was completed in 2006. A fisherman in a boat tried to land a leaping 70-foot-long rainbow trout. Other 30-foot long fish include a small mouth bass, walleye, catfish, northern pike, salmon and bluegill. "Welding sparks started a grass fire here," Greff says, "So in town the word was that we'd had the world's largest fish fry."
Most sculptures cost between $20,000 and $50,000 each, and all the money is donated.
Present Success, Future Hopes
Since the completion of the first seven sculptures, new businesses have come to Regent - a couple of gift shops, a convenience store, an RV park, a new building for the Ag Alliance feed store, and Killdeer Mountain Manufacturing.
And people. Postmaster Ervin Binstock says, "On Main Street I see an unbelievable amount of traffic - cars and tour buses - coming through." They are from every state, in addition to worldwide locations in Africa, Europe, and Asia.
Greff's future plans for sculptures include a spider web on I-94; a huge buffalo, or bison; an American Indian on a horse spearing a buffalo; a farm scene over a wheat field and sunset, all in 3-D. The one he is working on now will be the "world's largest motorcycle," measuring 102-feet tall and 40-feet wide, all made to scale. Greff hopes the first piece of this sculpture will be erected this summer next to the Enchanted Highway Gift Shop, with the remaining being finished as money comes in.
"At the beginning I only thought like an artist, but now I've realized I have to think more like a businessman if this project is going to be self-sustaining, so we're trying to figure out ways to get more people visiting here, over and above the 15,000 per year we already have."
The motorcycle will cost twice the other projects, or about $100,000, with $20,000 raised so far through a motorcycle raffle. But Greff has a positive attitude that it will be raised one way or another, although not through any state money. "People are astonished when I tell them that we don't get any monetary support from the state of North Dakota at all."
Professor Vince Vitelka, formerly of North Dakota State University, says of the Enchanted Highway sculptures, "Farmers are artists of the land, and the imagery appearing in these sculptures is folk art in its finest form."
Greff's hopes are for it to be the number one tourist attraction in North Dakota someday. "It's going to be awesome when it's all done. As long as your dream is alive, you've got a chance. I've always been a dreamer," the former educator says. "When I see something, I always wonder, how could you make it better?'"
Julius Honeyman, the Regent farmer who donated land for the pheasants sculpture says, "I think it's amazing what one guy with a vision, and a dream, can do if he puts his mind to it."
The Castle to open this spring
Greff is presently working on finishing The Castle, a 20-room motel remodeled out of the old Regent school, planned for opening in April. "We're down to putting on the finishing touches, tiling the entryway, carpeting the halls, and grouting. All the plumbing, electricity, and other work has been donated on shares of the profits of the motel," Greff says, which shows how many area people have come to believe in the project.
After the motel proves successful, Greff wants to build a steakhouse and a lounge. "We have to take it one step at a time. I don't think all of this will be completed in my lifetime, but one thing I know is that I never stop dreaming."
Bill Vossler is a former North Dakota teacher and a frequent contributor to North Dakota Horizons. He lives is Rockville, Minnesota, and can be reached at bvossler@juno.com.
Information on the giant sculptures along the Enchanted Highway can be found at www.regentnorthdakota.com; or at www.enchantedhighway.net, where donations to the Enchanted Highway 501-3C nonprofit organization, can be made. |
Thanks !
Thank you very much to the Tetsworth Fete organisers who have donated a total of £568 to the hall from the 2016 and 2017 fete proceeds - we've put the money towards the kitchen refurbishment fund.
And thank you very much to all those who attended our own quiz nights last year and this year - in addition to the fund-raising suppers at The Swan in Nov 2014 and The Wandering Kitchen in April 2015.
We have now raised £3,762 from these events and donations towards the kitchen refurbishment.
Thanks again.
TMH Committee
Bricks !
The original sponsored bricks are fixed in place and on display in the foyer - we are currently collecting a new set of sponsored requests for bricks from families and individuals.
TMH Committee |
Music of Friuli-Venezia Giulia
The musical fortunes of Friuli-Venezia Giulia (Furlanija – Julijska krajina) are closely tied to its political fortunes over the course of centuries, all having to do with proximity to the great maritime Republic of Venice as well as to the Austro-Hungarian empire and the vicissitudes of being a heavily contested area during the first World War. The vast comings and goings of various ethnic groups through this section of Italy have led to cultural and musical variety for diversity.
Furlana was a dance that was named from Friuli that became very popular in Venice, then was adopted by French royal court and then it spread all over Europe, being used by Johann Sebastian Bach and many other musicians.
It could have a Slav origin, though.
The most prominent musical theater in the region was built in 1801 in Trieste and was named the Teatro Giuseppe Verdi in 1901. The city is the site of the Giuseppe Tartini music conservatory. It is also the home base for the internationally acclaimed Trieste Trio chamber music ensemble.
Elsewhere in the region, the province of Gorizia has at least five spacious auditoriums and hosts a number of music events during the year, including the international Rudolfo Lipizer violin competition as well as various popular music festivals. The province of Pordenone hosts an international organ festival and competition as well as sponsoring an event dedicated to the Renaissance organ. Various musical associations in Pordenone include:
the Vincenzo Colombo Association for Sacred Music;
the Institute for Music of the Pedemontana;
the Farandola Cultural Association.
An additional music conservatory, named for Jacopo Tomadini, is located in the city of Udine.
References
Guide Cultura, i luoghi della music (2003) ed. Touring Club Italiano.
External links
Teatro Verdi, Trieste
Trieste music conservatory
Concerts today in Friuli
Friuli-Venezia Giulia
Category:Friuli-Venezia Giulia |
Introduction {#sec1-1}
============
**What was known?**
Dermatofibrosarcoma protuberans is a relatively rare skin tumor characterized by a low potential of malignancy.
Dermatofibrosarcoma of Darier-Ferrand or dermatofibrosarcoma protuberans (DFSP) is a rare cutaneous mesenchymal tumor characterized by a low potential of malignancy with a very low rate of metastasis but a rate of local recurrences rather important. The transformation of a DFSP into a fibrosarcoma (FS) is exceptional. This transformation is responsible for a significant metastatic potential.\[[@ref1]\] Through clinical observation, the authors report the epidemiologic, clinical, histological, therapeutic, and evolutionary characteristics of the disease.
Case Report {#sec1-2}
===========
We report the case of a 19-year-old female, without any pathological history, presenting a cutaneous mass of the lower third of the right upper leg that appeared 7 years ago. The clinical study showed an 8 cm diameter mass located on the anterior and internal side of the distal third of the right upper leg. This mass was firm, painless, vascularized, nodular, and polylobulated. It was dependent on the superficial cutaneous tissues and evoking a tumor of Darier and Ferrand \[[Figure 1](#F1){ref-type="fig"}\]. No weight loss was noted. No systemic adenopathy or signs of distant metastasis were found on the chest, abdomen, and pelvis computed tomography scan. A magnetic resonance imaging study of the right lower extremity revealed an 8 cm × 8 cm × 5.7 cm well limited, vascularized, round mass in the cutaneous, and subcutaneous tissues \[[Figure 2](#F2){ref-type="fig"}\]. The patient underwent a 5 cm margin excision involving in-depth the aponeurosis with resection margins microscopically negative \[[Figure 3](#F3){ref-type="fig"}\]. The residual skin defect was grafted. The histological study revealed a malignant transformation of the dermatofibrosarcoma of Darier and Ferrand into a sarcoma \[Figures [4](#F4){ref-type="fig"} and [5](#F5){ref-type="fig"}\]. The esthetic and functional result was assessed as good. There was no recurrence at 5 years follow-up \[Figures [6](#F6){ref-type="fig"} and [7](#F7){ref-type="fig"}\].
{#F1}
{#F2}
{#F3}
{#F4}
{#F5}
{#F6}
{#F7}
Discussion {#sec1-3}
==========
Cutaneous sarcomas represent \<1% of all cancers. The DFSP generally occurs in the young adult between 20 and 40 years. There is a discrete male prevalence. The transformation of a dermatofibrosarcoma of Darier and Ferrand into an FS (FS-DFSP) is exceptional, until now and since the first description of a metastatic DFSP by Penner\[[@ref2]\] in 1953, only 100 cases of FS-DFSP were reported. The DFSP generally occurs in the trunk (47%), the upper limb (38%), or the cervico-cephalic area (15%). This tumor generally begins with a single swelling, hardened by place, brown-red, purplish. After several years (a few decades), one or more nodules become rising protuberant. After a long time superficial growth, this tumor will invade the deeper layers extending along the fascia. No significant clinical difference was noted between FS-DFSP and the traditional form. The tumoral proliferation of the DFSP interests cutaneous and sub cutaneous layers of the skin; it is made up of spindle-shaped cells with few atypies and mitosis. In the periphery, the tumoral cells are arranged in great corrugated and flexuous beams loose parallelism at the surface. In depth, the tumor infiltrates the sub-dermal in tablecloth dissociating the fat lobules and takes the form of interlobular partitions. It can extend from the primary zone, reaching the underlying fascia or aponeurotic layer.
The tumoral cells of the DFSP express the CD34 in 90% of the cases and factor XIII. The PS100 does not express.\[[@ref3]\] The FS-DFSP is defined histologically by the presence in a cellular DFSP of ranges pointing towards an FS, the transition is abrupt or gradual. Cell areas are characterized by a chevron fascicular architecture and high mitotic activity.
The treatment of these cutaneous tumors, mainly surgical, is based on broad resection in the case of malignant tumor. The safety margins vary from one tumor to another.\[[@ref4][@ref5]\] Adjuvant radiotherapy can be used to obtain local control when the resection margins are microscopically positive or when wide excision results in a significant functional or esthetic deficiency.\[[@ref6]\] The evolution of the DFSP is slow, and frequently recurrences occur. Their frequencies depend on the margins of the initial excision: 40% if they are 2 cm, 10--20% for margins of 3 cm, and 1.75% for margins of 4 cm. In all the cases, the excision must carry in depth a safe aponeurotic layer. Metastasis are rare (5%) mostly pulmonary.\[[@ref3]\] The relationship between the presence of fibrosarcomatous foci with locoregional or metastatic evolution remains controversial.\[[@ref7][@ref8]\] The rate of locoregional recurrence of the FS-DFSP depends on the quality of the resection, without a significant difference compared to DFSP. On the other hand, the free interval, preceding the possible recurrence, could be shortened (usually \<2 years) compared to the traditional form.\[[@ref9]\] A large study published by Mentzel *et al*.\[[@ref10]\] showed an association between the presence of fibrosarcomatous foci and significant metastatic potential. In this study, approximately 15% of the patients developed primarily pulmonary metastases without significant association with the prognostic factors such as the size of the lesions, the mitotic activity or the presence of necrosis.
Conclusion {#sec1-4}
==========
The DFSP is a rare tumor, its diagnosis is histological, and its treatment is surgical. The transformation of a DFSP into an FS is exceptional. This transformation seems to be in association with a significant metastatic potential estimated at 15%. The identification of fibrosarcomatosis implies a complete assessment of extension and a closer follow-up.
{#sec2-1}
### Financial support and sponsorship {#sec3-1}
Nil.
### Conflicts of interest {#sec3-2}
There are no conflicts of interest.
**What is new?**
The transformation of DFSP into a FS is exceptional and comes with a high potential of malignancy. However, a broad resection with safety margins could lead to a cure.
|
FEDERAL MERCHANTS
Sanpellegrino Sparkling Fruit Beverages are a delightful blend of rich citrus juice with sparkling water. Available in bottles or cans, they are the perfect accompaniment for your Christmas dinner, your next BBQ or any special occasion in between.
@sanpellegrino_au
#sanpellegrinonz |
/**
* Force HTTPS
*
* Keep users secure by redirecting them to HTTPS if not already
*/
var kiwiModules = require('../server/modules');
var module = new kiwiModules.Module('force_https');
module.on('http request', function (event, event_data) {
var req = event_data.request;
var res = event_data.response;
var is_https = !!req.connection.encrypted;
if (!is_https) {
event.preventDefault();
res.writeHead(301, {Location: 'https://' + (req.headers.host.split(':')[0]) + req.url});
res.end();
}
});
|
AT-rich sequences from the arbuscular mycorrhizal fungus Gigaspora rosea exhibit ARS function in the yeast Saccharomyces cerevisiae.
Autonomous replicating sequences are DNA elements that trigger DNA replication and are widely used in the development of episomal transformation vectors for fungi. In this paper, a genomic library from the mycorrhizal fungus Gigaspora rosea was constructed in the integrative plasmid YIp5 and screened in the budding yeast Saccharomyces cerevisiae for sequences that act as ARS and trigger plasmid replication. Two genetic elements (GrARS2, GrARS6) promoted high-rates of yeast transformation. Sequence analysis of these elements shows them to be AT-rich (72-80%) and to contain multiple near-matches to the yeast autonomous consensus sequences ACS and EACS. GrARS2 contained a putative miniature inverted-repeat transposable element (MITE) delimited by 28-bp terminal inverted repeats (TIRs). Disruption of this element and removal of one TIR increased plasmid stability several fold. The potential for palindromes to affect DNA replication is discussed. |
Q:
ADFS SSO Anonymous Home Page MVC 4 ASP.NET
I have been looking for the answer to this, but it is admittedly a difficult concept to phrase at Google.
I have several MVC sites using our ADFS to authenticate using single-sign-on. It works well. However, I am wondering if it is possible to have a home page which allows anonymous users to access some features without being logged in. I have seen people referring to redirecting users to the anonymous home page after single-sign-out from the relying party. Basically, can I secure half the application using ADFS SSO?
<?xml version="1.0" encoding="utf-8"?>
<configuration>
<configSections>
<section name="entityFramework" type="System.Data.Entity.Internal.ConfigFile.EntityFrameworkSection, EntityFramework, Version=6.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" requirePermission="false" />
<section name="system.identityModel" type="System.IdentityModel.Configuration.SystemIdentityModelSection, System.IdentityModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=B77A5C561934E089" />
<section name="system.identityModel.services" type="System.IdentityModel.Services.Configuration.SystemIdentityModelServicesSection, System.IdentityModel.Services, Version=4.0.0.0, Culture=neutral, PublicKeyToken=B77A5C561934E089" />
<connectionStrings>
</connectionStrings>
<appSettings>
<add key="webpages:Version" value="3.0.0.0" />
<add key="webpages:Enabled" value="false" />
<add key="ClientValidationEnabled" value="true" />
<add key="UnobtrusiveJavaScriptEnabled" value="true" />
<add key="ida:FederationMetadataLocation" value="https://sts.testsite.com/FederationMetadata/2007-06/FederationMetadata.xml" />
<add key="ida:Realm" value="https://localhost:44301" />
<add key="ida:AudienceUri" value="https://localhost:44301" />
<add key="owin:AutomaticAppStartup" value="false" />
</appSettings>
<location path="Account">
<system.web>
<authorization>
<allow users="*" />
</authorization>
</system.web>
</location>
<system.web>
<authentication mode="None" />
<authorization>
<deny users="?" />
</authorization>
<compilation debug="true" targetFramework="4.5" />
<httpRuntime targetFramework="4.5" requestValidationMode="4.5" />
<customErrors mode="On" defaultRedirect="~/Error.cshtml">
</customErrors>
</system.web>
<system.webServer>
<validation validateIntegratedModeConfiguration="false" />
</system.webServer>
<runtime>
<runtimes here.../>
</runtime>
<entityFramework>
<defaultConnectionFactory type="System.Data.Entity.Infrastructure.LocalDbConnectionFactory, EntityFramework">
<parameters>
<parameter value="v11.0" />
</parameters>
</defaultConnectionFactory>
<providers>
<provider invariantName="System.Data.SqlClient" type="System.Data.Entity.SqlServer.SqlProviderServices, EntityFramework.SqlServer" />
</providers>
</entityFramework>
<system.webServer>
<modules>
<add name="WSFederationAuthenticationModule" type="System.IdentityModel.Services.WSFederationAuthenticationModule, System.IdentityModel.Services, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" preCondition="managedHandler" />
<add name="SessionAuthenticationModule" type="System.IdentityModel.Services.SessionAuthenticationModule, System.IdentityModel.Services, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" preCondition="managedHandler" />
</modules>
</system.webServer>
<system.identityModel>
<identityConfiguration>
<audienceUris>
<add value="https://localhost:44301" />
</audienceUris>
<securityTokenHandlers>
<add type="System.IdentityModel.Services.Tokens.MachineKeySessionSecurityTokenHandler, System.IdentityModel.Services, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />
<remove type="System.IdentityModel.Tokens.SessionSecurityTokenHandler, System.IdentityModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />
</securityTokenHandlers>
<certificateValidation certificateValidationMode="None" />
<issuerNameRegistry type="System.IdentityModel.Tokens.ValidatingIssuerNameRegistry, System.IdentityModel.Tokens.ValidatingIssuerNameRegistry">
<authority name="http://sts.testsite.com/adfs/services/trust">
<keys>
<add thumbprint="AA6032061B0E74B3B5B0D495DC7C55B18B0862A4" />
</keys>
<validIssuers>
<add name="http://sts.testsite.com/adfs/services/trust" />
</validIssuers>
</authority>
</issuerNameRegistry>
</identityConfiguration>
</system.identityModel>
<system.identityModel.services>
<federationConfiguration>
<cookieHandler requireSsl="true" />
<wsFederation passiveRedirectEnabled="true" issuer="https://sts.testsite.com/adfs/ls/" realm="https://localhost:44301" requireHttps="true" />
</federationConfiguration>
</system.identityModel.services>
</configuration>
This is the Global.asax.
protected void Application_Start()
{
AreaRegistration.RegisterAllAreas();
FilterConfig.RegisterGlobalFilters(GlobalFilters.Filters);
RouteConfig.RegisterRoutes(RouteTable.Routes);
BundleConfig.RegisterBundles(BundleTable.Bundles);
AntiForgeryConfig.UniqueClaimTypeIdentifier = ClaimTypes.Email;
}
protected void Application_BeginRequest()
{
if (!Context.Request.IsSecureConnection)
Response.Redirect(Context.Request.Url.ToString().Replace("http:", "https:"));
}
protected void Application_Error(object sender, EventArgs e)
{
var error = Server.GetLastError();
var cryptoEx = error as CryptographicException;
if (cryptoEx != null)
{
FederatedAuthentication.WSFederationAuthenticationModule.SignOut();
Server.ClearError();
if (Request.Cookies["StoreNumber"] != null)
{
HttpCookie storeNumber = Request.Cookies["StoreNumber"];
storeNumber.Expires = DateTime.Now.AddDays(-1);
}
}
}
A:
It should behave the way you want by default. Most likely what is happening is that this setting in your web.config is causing it to require everyone to log in, because this is an explicit deny to anonymous users. Try removing it and see if it then works as you want.
<authorization>
<deny users="?" />
</authorization>
In theory, you also should not need the following lines, if you have put [Authorize] on any controller that requires authorization/login. It should be allowing anonymous users to access the AccountController once you remove the deny. You should be able to control which controllers/methods require authorization with [Authorize] and [AllowAnonymous] alone.
<location path="Account">
<system.web>
<authorization>
<allow users="*" />
</authorization>
</system.web>
</location>
|
const fields = {
data: {
text: '',
userId: undefined
},
validators: {
text: [function(value) {
if (!value) {
return 'This field is required';
}
}],
userId: [function(value) {
if (!value) {
return 'This field is required';
}
}]
},
fields: {
text: {
type: 'text',
props: {
label: 'Message',
placeholder: "What's happening?"
}
},
userId: {
type: 'select',
props: {
label: 'User',
optionLabel: 'nickname',
options: function(getState, props) {
return getState('user.find');
}
}
}
}
};
export default {
dialogs: {
create: fields,
update: fields
},
/**
* Use this section to override polling behavior on a per-model basis
*/
// polling: {
// interval: 5000,
// delayOnStart: true
// },
properties: {
/**
* Override the idAttribute if the primary key in the resource is named
* anything other than 'id'. Doing so will allow the other methods to
* behave as expected, such as composing the expected url for CRUD
* operations and being able to retrieve the primary key by 'model.id'
*/
// idAttribute: 'id'
/**
* Override the initialize method if you need to save data for use
* in other functions. This is especially useful if you have a nested
* URL for an API endpoint, like /authors/:userId/books. In that case,
* you can save the author here and refer to it when creating the URL
* in the url() or urlRoot() method.
*/
// initialize: function(attributes, options) {
// return;
// },
/**
* Override the urlRoot if your API endpoint does not match the default
* conventions. For example, given a model named 'bookAuthor', and assuming
* an apiRoot of 'http://localhost:1337' with pluralize set to true, the
* endpoint for creating a model is assumed to be 'http://localhost:1337/bookAuthors'
* If this model is on a different server (such as http://localhost:3001) or the
* endpoint is named something different (such as book_authors or books/:id/authors)
* you will need to set that here; urlRoot can be either a string or a function
*/
// urlRoot: function() {
// return 'https://api.example.com/endpoint'
// },
/**
* Override the url method if you need complete control over the final URL
* endpoint. This is especially useful when you have an endpoint like /user
* or /profile that returns a single resource with information about the current
* user and an id is not required. You'll also need to override this method if
* the route doesn't use the primary key of the resource.
*/
// url: function() {
// return 'https://api.example.com/unconventional/endpoint/123'
// },
/**
* Override the parse method if you need to modify data before using
* it in the application, such as converting timestamps or adding
* properties to absorb breaking API changes.
*/
// parse: function(resp, options) {
// return resp;
// },
/**
* Override the sync method if you need to modify data before sending
* it to the server.
*
* If you override this method the library will make no AJAX requests
* for this model, so you'll need to make sure you implement the AJAX
* call yourself or make a call to sync.apply(this, arguments).
*
* Use of 'sync' refers to sync method provided by the 'lore-models'
* package, i.e. require('lore-models').sync
*/
// sync: function() {
// return sync.apply(this, arguments);
// }
}
}
|
Q:
Writing your first Django app, part 3, polls questions do not show in the browser
I am following DJango tutorial.
return HttpResponse(template.render(context, request))
does not return polls question and I get the message that 'No polls are available.'
I have exactly followed tutorial but I cannot get the result.
view:
def index(request):
latest_question_list=Question.objects.order_by('-pub_date')[:5]
template = loader.get_template('polls/index.html')
context = {
'latest question list': latest_question_list,
}
return HttpResponse(template.render(context, request))
index.html
{% if latest_question_list %}
<ul>
{% for question in latest_question_list %}
<li><a href="/polls/{{question.id}}/">{{question.question_text}}</a></li>
{% endfor %}
</ul>
{% else %}
<p>why No polls available now</p>
{% endif %}
database screenshot:
model:
class Question(models.Model):
question_text = models.CharField(max_length=200)
pub_date = models.DateTimeField('date published')
def __str__(self):
return self.question_text
def was_published_recently(self):
return self.pub_date >= timezone.now() - datetime.timedelta(days=1)
A:
You have invalid context variable name in view, it should be latest_question_list instead of latest question list same as in the template:
def index(request):
latest_question_list=Question.objects.order_by('-pub_date')[:5]
template = loader.get_template('polls/index.html')
context = {
'latest_question_list': latest_question_list,
}
return HttpResponse(template.render(context, request))
|
Q:
How to reveal 3 masks with Stroke in After Effects
How to reveal this image with Stroke Effect in a single image layer?
I created 3 masks using Pen Tool
For each mask , I added a Stroke effect and animated everything.
In Stroke effect the settings, I switched Paint Style to Reveal original image
The problem is that I can reveal only one mask, and for two or more, nothing happens. How to animate each mask individually on one single layer using Stroke Effect?
Thank you.
A:
If I understand this correctly, your goal is to be able to adjust the stroke effect in one shape and have it applied to every other shape, right?
If so, here's how I'd approach this:
create your shape layer and add the stroke effect to reveal the image
Pre-compose the shape layer
Duplicate the precomp three two times and scale them, so you have three different sizes
To remain the same thickness of your shapes, you could apply the "min-max" effect and widen the alpha- and colorchannels to make the shape appear thicker.
If you now adjust the stroke-effect of the shape in any of your three precomps, it is applied to every precomp, effectively changing the animation for all the three shapes.
|
Athletics Information
Important Announcement Regarding Athletic Physicals
Please make plans to schedule your child's athletic physical through your family doctor or another health care provider. Also, please remember that a valid physical for the 2018-19 school year must be signed by the appropriate medical staff on or after April 15th, 2018. This is a Michigan High School Athletic Association requirement, so please plan on scheduling physicals on or after April 15th of every year. THEY MUST HAVE A VALID PHYSICAL ON FILE BEFORE THEY MAY PARTICIPATE.
If you are a parent of a high school student-athlete, please be aware of the following school policies:1. All of your child's uniforms and equipment must be turned in from their previous sport before they may begin their next sport. This includes the paying of any outstanding athletic bills.2. Their participation fee from any previous athletic seasons must be paid before they may begin their next athletic season.
Athletic Ticket & Prices
Galesburg-Augusta Community Schools offer a variety of ways for families to save money while attending athletic events. Please see the ticket information below to find out how you can save money of athletic event admissions.
Please contact Mr. Woodard the Athletic Director with any questions or concerns 484-2016.
Ticket Information
Students:You may purchase student Athletic Passes in the high school office, or at many of the high school athletic events. The cost is $20 for elementary and middle school students and $30 for high school students. The passes are good for all regular season, home high school athletic events throughout the school year.
Adults:
We offer a variety of discount punch cards for home high school athletic events. There are several different prices, from $25 to $100. The more admissions you purchase, the greater the savings. For example, for $100 you receive 40 admissions. This comes out to $2.50 per admission.
Senior Citizens:
Senior Citizens (62 yrs. and up) will receive free admission to all home events and most away events. However, you must have a Senior Citizen pass. You can obtain a Senior Citizen Pass from the high school office. This is for residence of Galesburg and Augusta. Otherwise, you may contact your local school district to inquire about obtaining a pass.
Military Veterans:
Anyone that is currently serving in the U.S. Military will now receive free admission to all of our regular season events. Simply show your military I.D., or be in uniform.
It is the policy of the Galesburg-Augusta Community Schools that no discriminatory practices based on sex, race, religion, color, age, national origin, disability, height, weight, or any other status covered by federal, state or local law be allowed in providing instructional opportunities, programs, services, job placement assistance, employment or in policies governing student conduct and attendance. |
In two separate, hand-delivered letters, the Lutz campaign requested a series of eight debates, taking place in each community throughout the 52nd district. Delivery of the second letter was recorded on video, and was greeted with malice, verbal abuse and expulsion of the camera from the Hunter's office. Libertarian candidate Michael Benoit agreed to the series of debates without condition.
For the time being, all debates have been canceled.
"Until Hunter steps up to the plate, I'll be stepping away from the dinner plate," Lutz said. "Starting at sundown this Thursday, August 12, I will refuse to eat until he agrees to debate. I hope my sacrifice will make him realize the community expects him to take their issues seriously.
For the duration of the strike, during many daytime hours, Lutz and sympathizers will sit in an isolation booth outside his office along the Promenade Park in El Cajon. Supporters are encouraged to sign up to take a few pounds off and engage in at least one day of hunger strike in support of Lutz's attempt to force sanity back into our democratic process.
A moderator will have to approve your message before it will appear.Simple bad-talking or insulting messages will likely be deleted.If you are trying to write to a candidate that appears on the site, they likely do not read this and will not answer.This site is an English language site and non-English messages will be deleted. Enter This Code |
San Francisco, Calif. – May 26, 2011 – Pacific Crossing, a wholly owned subsidiary of NTT Communications Corporation and operator of the transpacific submarine cable system PC‐1, has completed repair on the PC‐1 North route which links Ajigaura, Japan with Harbour Pointe, Washington. The North and West routes of PC‐1 were damaged during the Tohoku Earthquake on March 11, 2011. The West route is expected to be
restored in late June.
Pacific Crossing is experiencing exponential demand for bandwidth on the PC‐1 cable system due to the industry leading low latency it offers between the United States and Japan. To keep ahead of customer demand, the cable restoration is accompanied by an upgrade of the system capacity and the enhancement of the company’s Ethernet service offering. Following the upgrade of the PC‐1 system in 2010, which pushed the lit capacity of the cable over the 1.3Tbps (terabits per second) mark, Pacific Crossing has now added additional wavelengths to boost transpacific capacity to 1.8Tbps.
“Pacific Crossing has successfully recovered its service on PC‐1 North route despite its extensive damage near the epicenter of the Tohoku earthquake on March 11,” said Mr. Takahiro Sumimoto, chief executive officer of Pacific Crossing. “The PC‐1 North route not only recovered from the earthquake, but we increased capacity to support further traffic growth, especially for financial industry customers who deploy time sensitive applications on our cable systems.”
As an NTT Communications company, Pacific Crossing provides the highest quality network infrastructure with the lowest latency between the United States and Japan, including extensive backhaul and Internet networks at both ends. Mr. Sumimoto added, “We will continue the restoration work on PC‐1 West until we fully recover our cable system. Pacific Crossing will keep investing in our network infrastructure and services in order to further strengthen our high quality offerings.”
Pacific Crossing owns and operates the transpacific, subsea fiber‐optic network ring, PC‐1, connecting the United States and Japan. The 21,000km PC‐1 submarine cable system offers the highest reliability and the lowest latency across the Pacific. Supported by extensive backhaul into major U.S. and Japanese cities, Pacific Crossing’s infrastructure offers seamless interconnection to virtually every major international network operator for onward global access. The company delivers state‐of‐the‐art capacity and managed network services at competitive prices to a growing customer base of carriers and media and information transport‐intensive enterprise customers. The company is registered in the USA and Japan, with principal
offices in San Francisco, United States and Tokyo, Japan. For more information, please visit www.pc1.com.
About NTT Communications Corporation
NTT Communications provides a broad range of global networks, management solutions and IT services to customers worldwide. The company is renowned for reliable, high‐quality security, hosting, voice, data and IP services, as well as expertise in managed networks and leadership in IPv6 transit technology. NTT Communications’ extensive infrastructure includes Arcstar Global IP‐VPN and Global e‐VLAN, as well as a Tier 1 IP backbone reaching more than 150 countries in partnership with major Internet service providers, and secure data centers in Asia, North America and Europe. NTT Communications is the wholly‐owned subsidiary of Nippon Telegraph and Telephone Corporation, one of the world’s largest telecoms with listings on the Tokyo, London and New York stock exchanges. Please visit http://www.ntt.com/index‐e.html. |
A fox left a one-month-old baby boy with a serious hand injury after creeping into his bedroom and dragging him from his cot.
Police said they were investigating the incident in Bromley, south east London, in which the animal tore the infant's finger off.
The child's screams alerted his mother, who rushed to his room to see his hand lodged "halfway down the animal's throat", according to the Mail on Sunday. She is said to have kicked the fox until it let go.
Surgeons managed to reattach the finger in an "extremely difficult" three-hour operation, the newspaper reported. The child, who also suffered puncture wounds to his face, was said to be recovering well.
The attack happened after the fox entered the house through an open back door, which was apparently awaiting repair by the council.
A Metropolitan police spokesman said: "We were called at 16.38 on Wednesday 6 February by staff at St Thomas's hospital to reports a baby boy who had been admitted to hospital after being attacked by a fox.
"Police attended to find a four-week-old baby with a hand injury. The baby was admitted to hospital after the attack at its home address in Bromley."
An RSPCA spokeswoman said the only reason a fox would attack is due to fear. She added: "It's extremely unusual for foxes to attack young children or anyone.
"It's not typical fox behaviour at all. Foxes will come closer to a house if there are food sources. Then they can become quite bold, but they usually do back off and run away when there's people around."
A fox attack in June 2010 left nine-month-old twins Lola and Isabella Koupparis scarred for life. The girls' mother, Pauline, described the mauling at their east London home as a "living nightmare". |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.