text
stringlengths
8
5.77M
Anthony Waldman House Until recently, the limestone building at 445 Smith Avenue North, St. Paul, Minnesota, United States, was known in surveys and local architectural history books as the Anthony Waldman House. However, recent research and analysis of the building has revealed that the Waldman House was not in fact built by Waldman, and was not originally a "house" either. Instead, the structure was a small commercial building with residential quarters on the second floor. Evidence of this commercial design include a side porch/loading dock facing the alley to the north (since removed); obvious stone in-filling of the first-floor shop-front windows; a large structural beam above the one-time shop front that supported the second-story stonework; photographic evidence from the 1940s of remnants of the original first-floor commercial cornice (see enlarged image below); physical evidence of a central entrance step into the shop; and wooden sleepers that served as nailers for decorative wooden pilasters or perhaps signs at either side of the shop windows below the cornice. Documentary evidence suggests that the stone portion of the building dates to the late fall of 1857, coinciding with the onset of the Panic of 1857. Another unexpected discovery is that parts of the wood frame addition to the rear of the stone building actually predate the stone portion, making the latter the true "addition." The research is ongoing, and no doubt the Waldman House has more stories to tell. The house was nominated to the National Register of Historic Places (NRHP) in 1983 as part of the West Seventh Street Early Limestone Houses Thematic Resource, along with the Joseph Brings House and Martin Weber House. The Waldman House received an NRHP reference number, #83004866, but the listing was never finalized. None of the three buildings are officially on the National Register. It was listed with listing code DR, meaning "Date Received" and nomination pending, in 1983. Before the Stone House: Wild Land Speculation The Waldman House lies in the southwest block of Leech’s Addition to the City of St. Paul (legally described as the NE1/4 of SE1/4 Section 1, Township 28, Range 23). Leech’s Addition was platted by developer Samuel Leach in 1849 as a perfectly symmetric nine-block square of streets and alleys extending southwest from the earliest-settled core of St. Paul. Leech’s Addition was bounded by Wilkin Street to the east, Douglas Street to the west, Ramsey Street to the north, and Goodrich Street to the south. Notably, Fort Road (today’s West Seventh Street) ended at Ramsey Street and did not extend into Leech’s Addition until 1859, after the stone portion of the Waldman House was built (more on this timing below). Before then, the historic thoroughfare to the Fort Snelling ferry and the Minnesota River valley beyond meandered along the Mississippi bluff line in unplatted land to the south of Goodrich Street, labeled on early maps as “Bluff Street.” The lot occupied by the Waldman House was just paces away from Bluff Street. The lot spanned the area between block nine’s alley to the north and Goodrich to the south, and faced Forbes Street (renamed Smith Avenue in 1887) to the east. Prior to 1853 this lot was bought and sold as an undifferentiated part of the quarter-section, and later block, by such early and avid land speculators as Henry Sibley, Samuel Leech, James McClellan Boal ("McBoal"), William Forbes and Justus Ramsey. The lot was first individually mentioned in a December 1853 deed when it was sold by Indian trader Louis Roberts along with eleven other lots to local investor William McCarty for $1,500. Eight months later McCarty more than doubled his money by selling six of these lots—-including the stone house lot—-to Toronto investor John Eastwood for $2,000. Eastwood immediately split up his purchase and sold the stone house lot by itself to A. Vance Brown one month later for $350, making a small profit on this parcel and perhaps larger profits on the remaining parcels. Four months later, by deed dated December 8, 1854, Brown then resold the lot to Charles Fuchs (aka Fox) for $420. Taking this single year of sales in total and adjusting for inflation, the value of the lot had increased more than 275% in the single year between Louis Roberts’ sale and Charles Fuchs' ultimate purchase. Charles Fuchs: Original Stone House Owner It was during Fuchs' ownership that the stone portion of building at 445 Smith was constructed. Fuchs was a carpenter/contractor who emigrated from Wurttenburg, Germany in 1849. Fuchs married Sophia Daveneck in St. Louis, Missouri in May 1849 and moved to St. Paul with their son Charles in 1852. In March 1852 Fuchs purchased the lot at the southwest corner of Fort Road and Walnut Street, which he expanded by purchase of the northwest corner in June 1853, and the adjacent northwest corner of Walnut and Oak Street (now Smith Avenue N.) in November 1854. The $420 price paid by Fuchs for the stone house lot only one month later (December 1854) suggests there may already have been a small wood frame structure there. Fuchs' stature as a contractor is shown by the fact that he was hired to build the Athenaeum in 1859, one of the most prominent public buildings in Uppertown at the time, and also by the $6,000 in real estate he had amassed by 1860—at a time when vacant lots in Uppertown could be acquired for as little as $300. A saloon Fuchs' home was several blocks away at 148 Walnut Street and his business was based from Fort Road and Walnut, so it would appear that the stone house was an investment property. The question is, what was it used for? The Minnesota statehood census lists Edward and Sarah Shingles as residing on the lot in November 1857, and intriguingly, Edward's occupation is listed as "saloon." Both Shingles (aka Shindell and Shendle) and the building's owner after 1860, Anthony Waldman, paid the City of St. Paul for liquor licenses in March 1858. By May of that year Shingles is listed as the proprietor of the Winnebago Saloon on Jackson Street near St. Paul's lower levee (today's Lowertown), so if in fact Shingles operated an earlier saloon from the stone house it could not have been for long. Waldman, who purchased the stone house in October 1860, is listed as the owner of a lager beer saloon in the 1860 federal census. To add to the brewing connections, in October 1859 Waldman received a mortgage to the Stahlmann Cave Brewery (present-day Schmidt Brewery site) on West 7th Street as security for a $500 loan to Henry and Christoph Stahlmann, fellow Bavarians who were among St. Paul’s earliest and most successful brewers. Notably, there were a growing number of German lager houses and saloons in the immediate vicinity of the stone house prior to the Civil War. Immediately across the alley to the north on Forbes, John Fetzer ran a lager beer saloon from 1856 to 1860, and the notorious “Cave House” saloon and brothel operated a few blocks further down Bluff Street. All of this points to a possible intended use of the stone building as a saloon, perhaps first by Shingles and then by Waldman. Panic of 1857 If the Waldman "House" was in fact originally built for use as a saloon, the Panic of 1857 and shifting development patterns soon aborted this enterprise. St. Paul’s early historian J. Fletcher Williams was an eye-witness to Minnesota's first economic crisis, which he described in his History of St. Paul first published in 1876: Saint Paul was said by travelers, to be the fastest and liveliest town on the Mississippi River. Emigration was pouring in astonishingly, several boats landing daily loaded with passengers. Those intending to go back in the country, usually purchased their supplies here, and the stores were almost overtaxed, so profitable was their trade. The hotels and boarding houses were crowded to overflowing. The principal business streets fairly hummed with the rush of busy life. Building was never so brisk; an army of workman and mechanics labored night and day to keep up with the demand for dwellings and stores. That season they coined money.On August 24, occurred the failure of the Ohio Life Insurance and Trust Company, of New York, which gave rise to the memorable panic or financial revulsion of that year. To St. Paul, this pricking of the bubble of speculation was more ruinous and dire in its consequences than perhaps to any other city in the west. Everything had been so inflated and unreal--values purely fictitious, all classes in debt, with but little real wealth, honest industry neglected, and everything speculative and feverish—-that the blow fell with ruinous force. Business was paralyzed, real estate actually valueless and unsaleable at any price, and but little good money in circulation. Ruin stared all classes in the face. The note secured by mortgages must be paid, but all values were destroyed. No device would raise money, for no one had any to lend. Everybody was struggling to save himself. The banking houses closed their doors—-nearly all the mercantile stores suspended or made assignments. All works of improvement ceased, and general gloom and despondency settled down on the community. In a few days, from the top waive of prosperity, it was plunged into the slough of despond. And now the ‘hard times’ commenced in earnest. No description of this terrible and gloomy period will convey any idea of it. With many, even those who had but shortly before imagined themselves wealthy, there was a terrible struggle between pride and want. But few had saved anything, so generally had the reckless spirit of the times infected all classes. The humble poor, of course, suffered; but the keenest suffering was among those who experienced the fall from affluence to poverty. The papers were crowded for months with foreclosures of mortgages, executions, and other results of the crash. Not one in five of the business houses or firms weathered the storm, despite the most desperate struggles. The population of the City fell off almost 50 percent, and stores would scarcely rent at any price.” The Mystery of the Jacob Amos Store After Shingles, Jacob Amos is listed as the next occupant of the stone house in the 1858-9 St. Paul City Directory (the content of which was compiled prior to May 1858). Amos was a stonemason from Hesse Darmstadt, Germany, where he was born in 1824. Amos and his sometime business partner Christian Rhinehardt constructed numerous other limestone structures in Uppertown, including 202 McBoal Street (Martin Webber House, 1867). Jacob and his wife Elizabeth were married in Franklin County in southeastern Indiana on April 19, 1852. Elizabeth (née Seidenthaler) was born in Ohio about 1834. They had two children in Indiana (Jacob, b. 1852; George, b. 1855) before moving to Minnesota Territory by 1856, where their first daughter (Louisa) was born in 1856. They had five more children in St. Paul (Rosina, 1858; Phillipp, 1862; Frank, 1865; Charles, 1866; Ida, 1874). The first record of Amos in St. Paul is his listing in the 1856/7 City Directory as a “mason” living on Bluff Street, two blocks south of the stone building. Intriguingly, the 1858-9 City Directory describes the stone building where Amos and his family were living as a "store." This is the earliest documentary evidence (corroborating the clear architectural evidence) that the Waldman House was not always or solely a residence. However, the Directory makes no mention of what kind of store it was, and there is no cross-listing for any store at that location in the business section of the Directory. None of the state or federal censuses ever describe Amos' occupation as anything other than a stonemason. So, given the implausibility that Amos chose the worst economic crisis of the period to experiment in retail trade, one is compelled to conclude that the "store" description in the Directory may not be accurate. The Directory's use of the term may reflect nothing more than the compilers’ conjecture based on the building’s obvious (former) storefront appearance. Moreover, given the chaotic economic times, it may have been difficult for the Directory's compilers to decipher the building's current use (especially if its owner declined to pay for a fuller listing). The building is listed as vacant in the federal census of 1860, and its ownership changed twice that year before being purchased by Waldman. While it is only a guess, it is possible that Amos was the stonemason for the stone addition to the wood frame structure originally on the lot, and then occupied the building with his family after it fell vacant following the Panic—perhaps in lieu of Fuchs' payment for his work. In February, 1862, shortly after occupying the stone house, Amos enlisted as a private in Company E, 5th Infantry Regiment Minnesota. He was promoted to the ranks of Sergeant (April 2, 1862), 1st Lieutenant (August 2, 1863) and Full Captain (February 9, 1865), before mustering out at Fort Snelling on September 6, 1865. As a member of the 5th Minnesota, Amos participated in the Siege of Corinth, Mississippi (May 26–30, 1862); the Battle of Corinth (October 3–4, 1862); Grant’s central Mississippi campaign (November 1862-January, 1863); the Siege of Vicksburg (May 18-July 4, 1863); and the Battle of Nashville (December 15–16, 1864), among numerous other campaigns. After the war, the 1870 and 1880 censuses list Amos and his 9 other family members living in the same small, one-story house at 57 Banfil Street (the house remains today at 276 Banfil). Anthony Waldman: Conversion to a House Following Amos, Anthony Waldman was the next occupant of the stone house. Waldman emigrated from Bavaria in 1853 and was in St. Paul by 1856. He first established himself in St. Paul as a successful woodmerchant, judging by a series of advertisements he placed for the sale of 200 cords of hardwood in the November 1857 Pioneer & Democrat (wood sold for between $5.00 and $6.50 per cord that year.) The following year (1858) Waldman was among the minority of St. Paul residents having sufficient wealth to be assessed for the City's personal property tax—in Waldman's case, on "30 cords wood." As noted above, Waldman's occupation is listed as "lager beer saloon" in the 1860 census—the same year he purchased the stone house. However, by 1864 the City Directories begin consistently listing his occupation as the owner of a “feed and flour” store, a trade Waldman continued for the next fifteen years. His store is variously listed at “3d n[ear] Eagle, Swain’s block” (1864 to 1866); “Seventh bet[ween] St. Anthony and Chestnut” (1867); “66 Fort [Road]” (1868 to 1873), and finally at “114 Fort [Road]” during Waldman’s two year business partnership with George Eaton. Waldman's feed and flour store is never listed at his stone house address. A mortgage taken out by Waldman in May 1863 probably coincides with alterations to the stone building to convert it to purely residential use and appearance. In particular, the commercial storefront windows on the first floor were filled with stonework and two smaller windows to match those on the second story above. Apparently by this time the stone house was no longer a viable location for a retail business. Stranded by Shifting Development Patterns The reason for this is one of the most interesting aspects of the stone house's history. As mentioned above, the historic thoroughfare from St. Paul to the ferry at Fort Snelling ran along the Mississippi River bluff line, mostly through unplatted land west of the City. The developers of Leech's Addition effectively cut the City off from this causeway by interposing the Addition's rigid grid of north-south/east-west streets, which ran right through to the bluff line. Doubtless this was not a problem in the earliest years when streets only existed on paper. Nevertheless, in May 1857, at the urging of the St. Paul Common Council, the Territorial Legislature appointed five street commissioners, three of whom were St. Paul residents, to "lay out a public street and road from the present westerly termination of Fort Street [i.e. at Ramsey] in said City to the westerly limits of said City, and thence to the ferry landing opposite Fort Snelling, on the Mississippi River." The street commissioners began work that summer, causing a survey and plat of the new Fort Road extension to be made. Public notice of the plans were given in the newspapers and the plat was displayed at the Registrar's Office. It was the early autumn of 1857, just weeks before the sudden onslaught of the Panic. This is about the time Fuchs began building his stone commercial building on Forbes Street. What does the Fort Road extension have to do with the stone house? It explains the most frequently asked question people ask when they are told that the Waldman "House" used to be a commercial building: "Why would anyone put a commercial building there, in the middle of a residential neighborhood?" While the survey and plat drawing for this original Fort Road extension plan have been lost, newspaper accounts and court records suggest that the commissioners’ initial survey and plat proposed to bring the Fort Road extension down Forbes Street (renamed Smith Avenue today) right past the Waldman House to the Mississippi bluff line, and then along Bluff Street/Old Fort Road to the Fort Snelling ferry. If that is correct, Fuchs knew what he was doing when he built his commercial building facing a street that he and other observant property owners expected to become a major business thoroughfare. Fatefully, however, the route first proposed by the street commissioners met with suspicion and hostility. As the St. Paul Financial Real Estate and Railroad Advisor opined on September 5, 1857: This Avenue was intended by its projectors and by the Legislature to be some atonement to the people of St. Paul for the narrow, crooked, tortuous, bewildering and labryrinthine mases of the city streets. Nature has anticipated it, and provided for it in a broad, smooth, level plateau, stretching uninterruptedly to Fort Snelling. But instead of running it straight on to its terminous, the engineers are twisting it and coiling it through hills and ravines, out of a direct course, for the accommodation of private interests. Now we object to this perversion of the purpose of this road. We protest against this sacrifice of the beauty and convenience of this Avenue to the interests of anyone who can pay for its diversion." A. Vance Brown, who had sold the stone house lot to Fuchs in 1854, may have been among those suspected by the paper as exerting their influence. Brown was among the wealthiest real estate speculators of the day, and he owned several lots and commercial buildings along Bluff Street. There is no direct evidence linking Fuchs to the politics of the Fort Road extension. However, contemporaneous evidence shows he was not above pulling the levers of City government to improve the value of his properties. While no other street in Leech's Addition would be graded for another twenty years, in 1858 Fuchs and a handful of other owners along Forbes Street repeatedly petitioned the Common Council to grade Forbes and build a sidewalk on its west side, purportedly out of a concern that it was "impossible for school children to get to the School House from the upper part of the Town." Obviously unconvinced of their motives, Mayor Norman Kittson vetoed these improvements, stating that "the streets designated have as yet few buildings erected on them, and being situated on the outskirts of the populated parts of the City, must be for the convenience only of a few of the property owners." Whether or not Fuchs himself was influential in bending the path of the Fort Road extension past his property, he was surely disappointed by what happened next. Apparently stung by what Judge Palmer called, in a report to the Ramsey County Commissioners, "many difficult and embarrassing questions," the 1858 State Legislature voided the 1857 Act appointing the original street commissioners. Also voided were the commissioners' first survey and plat. In their place the Legislature appointed a new set of commissioners, overseen by Judge Palmer, to "lay out and establish the said public street . . . on the most direct and practicable route.''" This is the route of the present-day West 7th Street, the grading of which was completed in 1859. Senator William Davern led the charge for the corrected straight-line plan of West 7th Street, which coincidentally was drawn to pass immediately adjacent to Davern's farm southwest of the City. The end result was the veritable stranding of Fuchs' commercial building in what became a predominantly residential area. From 1858 on, almost all commercial development in Uppertown converged along West 7th Street. This made inevitable the re-purposing of the Waldman House as residence—which likely occurred in 1863, shortly after Waldman's purchase. Fetzer's Saloon next door also closed and became the Fetzer family's residence. One can imagine Fuchs' reaction, long after selling his property, when the construction of the High Bridge in 1889 once again turned (now) Smith Avenue into a major thoroughfare. History still being written Waldman increased his property holdings throughout the 1860s and 1870s, building two other residences immediately to the south on the same lot—the double house at 449-51 Smith (1871; razed 2009) and the larger Italianate Revival home at 457 Smith (1873). In 1885 Waldman sold his home and two rental properties on Forbes Street (now Smith Avenue), and returned to Germany where he died in Edenkoben, Pfalz, Rheinbauein in 1887. A French-Canadian real estate investor named Thomas Manning purchased the stone house, and from there it went through several decades of renters. John Rafter, an Irish stone worker and later St. Paul policeman, his wife Margaret and their five children rented the stone house from approximately 1896 to 1917. Wellie Vierow, a German widow with her three adult children, rented the house beginning in 1917 and remained there throughout the 1920s. Ultimately the house was finally purchased by John and Francis Dreyling in 1947. John Dreyling died in 1988, and Francis lived alone in the house until 2008 when it was purchased for restoration by Tom and Ann Schroeder. Bottom line Despite its outward residential appearance today, this building is the oldest surviving commercial structure in the City of St. Paul. Notes References St. Paul Common Council, Misc. Records (Minnesota Historical Society) St. Paul Pioneer & Democrat (1857–1860) Fletcher Williams, History of St. Paul (MHS Press) Ramsey County Property Records United States and MN Censuses, 1857–1900 St. Paul City Directories, 1856–1874 Category:Houses completed in 1864 Category:Houses in Saint Paul, Minnesota
LOS ANGELES — Amazon billionaire Jeff Bezos says his Blue Origin space venture will work with NASA as well as the European Space Agency to create a settlement on the moon. And even if Blue Origin can’t strike public-private partnerships, Bezos will do what needs to be done to make it so, he said here at the International Space Development Conference on Friday night. Bezos laid out his vision for lunar settlement during a fireside chat with yours truly, which took place just after he received the National Space Society’s Gerard K. O’Neill Memorial Award. In the short run, Blue Origin’s objective is to reduce the cost of access to space — initially with its New Shepard suborbital spaceship, and then with its orbital-class New Glenn rocket in the 2020s. In the long run, Bezos’ vision is to smooth the way for millions of people working in space. Those people just might live and work inside huge spinning habitats — a concept that was proposed decades ago by O’Neill, a Princeton physicist whose ideas on space settlement fueled Bezos’ passion for the final frontier.. The way Bezos sees it, moving heavy industry into solar-powered space outposts is the only way to ensure that our planet can cope with the rising demand for energy, and the stress that growing populations will put on Earth’s environment. “We will have to leave this planet,” Bezos told me. “We’re going to leave it, and it’s going to make this planet better. We’ll come and go, and the people who want to stay will stay.” Earth will be zoned for residential and light industrial use, while heavy industry will be moved off the planet and powered by 24/7 solar power, he said. “The Earth is not a very good place to do heavy industry. It’s convenient for us right now,” Bezos said. “But in the not-too-distant future — I’m talking decades, maybe 100 years — it’ll start to be easier to do a lot of the things that we currently do on Earth in space, because we’ll have so much energy.” So what comes between the short run and the long run? That’s where the moon plays a part. Just as Mars is always at center stage for SpaceX’s billionaire founder, Elon Musk, the moon looms as a focus for Bezos. Even before the Trump administration officially pivoted to targeting the moon and its environs, Bezos was talking about using robots to build a lunar city for eventual human occupants. During Friday’s chat, Bezos pointed out that the moon is conveniently located, reachable in just a couple of days with the right rocket. Scientists have determined that it has deposits of water ice near the poles that could be converted into drinkable water, breathable air and propellants for refuelable rockets. “It’s almost like somebody set this up for us,” Bezos said. To facilitate a return to the moon, Blue Origin has a lunar lander on the drawing boards that’s designed to be capable of delivery 5 tons of payload to the lunar surface. That’s hefty enough to be used for transporting people — and with enough support, it could start flying by the mid-2020s. Blue Origin has proposed building its Blue Moon lander under the terms of a public-private partnership with NASA. “By the way, we will do that, even if NASA doesn’t do it,” Bezos said. “We’ll do it eventually. We could do it a lot faster through a partnership.” The space agency is just starting to consider its options for a heavy-duty lunar lander — and Blue Origin is sure to face competition from other companies, including SpaceX as well as United Launch Alliance and Masten Space Systems. It’s important to point out that moon settlement isn’t just a NASA thing. Bezos told me he loves the European Space Agency’s approach, known as the Moon Village. “The Moon Village concept has a nice property in that it basically just says, look, everybody builds their own lunar outpost, but let’s do it close to each other. That way … you can go over to the European Union lunar outpost and say, ‘I’m out of eggs, what have you got?’ … Obviously I’m being silly with the eggs, but there would be real things, like, ‘Could I have some oxygen?’ ” So how far is Blue Origin willing to go? Bezos has already committed the company to build rockets and landers. How about rovers, habitats and all the other hardware that a moon base will need? “We’ll do anything we need to do,” Bezos said. “I hope we don’t need to do any of it. I want other people to do it. But if need be, we’ll do it.” Bezos is in this for the long haul. He’s the world’s richest person, with a net worth of more than $130 billion, and he’s cashing in a billion dollars’ worth of Amazon stock annually to fund Blue Origin. “One of two things will happen,” he said. “Either other people will take over the vision, or I’ll run out of money. Those are the two possibilities.” “I think it’ll be a while before you run out of money,” I told him. “Let’s hope so,” he said with a smile. Update for 11:39 p.m. PT May 28: I’ve revised the description of O’Neill habitats to make it more general.
Q: Regarding getting Date - n days Date Suppose I have a particular date stored in a variable date_m. I want ((date_m)-25) date. For example: I have 15/09/2014 stored in my variable , then I want 21/08/2014 returned if I subtract 25 from the date stored in variable. A: With the GNU implementation of date, to display yesterday's date, enter: $ date --date="1 days ago" OR $ date --date="-1 day" For your question: $ date --date="25 days ago" OR $ date --date="-25 day" For using it with variables, you can use $(): pastDate=$(date --date="-25 day") echo "$pastDate" For general case n days and for a specific date: #!/bin/bash date1="Tue Sep 2 07:53:47 EEST 2014" echo "Before? " read n date --date="$date1 -$n day" Source
Jackie (2016 film) Jackie is a 2016 biographical drama film directed by Pablo Larraín and written by Noah Oppenheim. The film stars Natalie Portman as Jackie Kennedy. Peter Sarsgaard, Greta Gerwig, Billy Crudup, and John Hurt also star; it was Hurt's final film released before his death in January 2017. The film follows Jackie Kennedy in the days when she was First Lady in the White House and her life immediately following the assassination of her husband, United States President John F. Kennedy, in 1963. It is partly based on Theodore H. White's Life magazine interview with the widow at Hyannis Port, Massachusetts, in November 1963. The film was selected to compete for the Golden Lion at the 73rd Venice International Film Festival, and was released in the United States on December 2, 2016, by Fox Searchlight Pictures to positive reviews and was nominated for three Oscars at the 89th Academy Awards: Best Actress (Portman), Best Original Score and Best Costume Design. Plot A week following the assassination of United States President John F. Kennedy, a journalist visits Jacqueline Kennedy for an interview at her home in Hyannis Port, Massachusetts regarding her husband's legacy. After Jackie reflects upon her 1961 televised tour of The White House, the journalist turns to inquiries about John F. Kennedy's assassination and its aftermath for Jackie and her family. She talks about events shortly prior to the assassination, before describing her shock and horror in reaction. Members of the White House close to the newly sworn-in President Lyndon B. Johnson and his wife Lady Bird are seen comforting Jackie in the aftermath onboard Air Force One. Robert F. Kennedy soon appears and shares her grief, escorting her back to Washington. Jackie expresses her deep concern for the well-being of her children in adjusting to the loss of their father. Robert continues to support her whilst dealing with his own sadness, and helps her in planning the funeral and looking after the family. She is seen struggling to sleep and becoming reliant on medications and alcohol. She is also seen regularly seeking spiritual counsel from a priest. Robert F. Kennedy along with President Lyndon B. Johnson, Lady Bird Johnson and members of the White House witness Lee Harvey Oswald's murder by Jack Ruby on live television. Robert insists to all that Jackie not be informed of this by anyone but himself; he will tell her when he feels the time is right. However Jackie finds out about it almost immediately, and condemns him for withholding it from her. After John F. Kennedy Jr.'s 3rd birthday, Robert voices his fears to Jackie that Jack's short time as President will not be noted by future generations. After the State funeral of John F. Kennedy, Jackie tells the priest that she contemplated suicide following the assassination. She then admits that she clearly remembers what happened during the assassination and feels unbearable pain and guilt that she did not act in some way to protect her husband. As the interview ends, Jackie makes it clear to the journalist that she maintains the right to control which parts of the interview may come to press and which parts are to be withheld. The film concludes with Jackie having her miscarried and stillborn children's coffins being re-interred next to John F. Kennedy's Grave at Arlington National Cemetery in Virginia. Cast Natalie Portman as Jacqueline "Jackie" Kennedy Peter Sarsgaard as Robert F. Kennedy Greta Gerwig as Nancy Tuckerman Billy Crudup as The Journalist (a composite of Arthur M. Schlesinger Jr., Theodore H. White, and William Manchester) John Hurt as The Priest Max Casella as Jack Valenti Beth Grant as Claudia "Lady Bird" Johnson Richard E. Grant as William Walton Caspar Phillipson as President John F. Kennedy John Carroll Lynch as President Lyndon B. Johnson Julie Judd as Ethel Kennedy Brody and Aiden Weinberg as John F. Kennedy Jr. Mathilde Ripley as Joan Bennett Kennedy Barbara Foliot as Pat Kennedy Albain Venzo as Peter Lawford David DeBoy as John Metzler Patrick Hamel as Sargent Shriver Frédérique Adler as Eunice Kennedy Shriver Stéphane Höhn as Charles Collingwood Sunnie Pelant as Caroline Kennedy Sara Verhagen as Mary Barelli Gallagher Georgie Glen as Rose Kennedy Roland Pidoux as Pablo Casals William Beaux d'Albenas as Hugh D. Auchincloss Nicolas Guigou as James C. Auchincloss David Friszman as Jack Brooks Éric Soubelet as Benjamin Bradlee Craig Sechler as Governor John Connally Emmanuel Herault as Robert McNamara Serge Onteniente as Brigade General Charles de Gaulle Rebecca Compton as Nellie Connally David Caves as Clint Hill Production Development The film's script, written by Noah Oppenheim, was originally conceived as an HBO miniseries, covering the "four days between John F. Kennedy's assassination and his burial, showing Jackie at both her most vulnerable and her most graceful". Steven Spielberg was originally set to produce the series, and later left the project. Pablo Larraín, not typically inclined to directing biopics, was initially hesitant to direct Jackie when he was offered the opportunity. He stated that although he did not have any history or knowledge about John F. Kennedy's assassination, he connected with Jacqueline Kennedy. Prior to directing Jackie, he had only made films centering on male protagonists rather than women. Thus, Jackie is the first film that he could approach from a woman's perspective. He grew more interested in Kennedy after learning more about her. To him, her life after the assassination "had all the elements that you need for a movie: rage, curiosity, and love." Oppenheim said that the screenplay itself did not change much over the long development process, revealing, "When Pablo Larraín boarded the project, he had ideas. I wrote two or three more drafts with his guidance, but over a very condensed period of time. So while it took six years from first draft to completion, most of those six years were not active years." Pre-production In April 2010, it was announced that Rachel Weisz would star in the titular role, with Darren Aronofsky set to direct and produce the film, from Oppenheim's script. However, both Weisz and Aronofsky dropped out after they ended their romantic relationship. The same year, Steven Spielberg showed interest in helming the film. Then in September 2012, without a director, Fox Searchlight Pictures started courting Natalie Portman to star in the film as Jacqueline "Jackie" Kennedy, hoping that her participation would bring back Aronofsky, although Portman's involvement was contingent on which director signed on. At the 65th Berlin International Film Festival in February 2015, Pablo Larraín was approached by Aronofsky to direct the film, after he was impressed by the former's The Club. Larraín was skeptical, and asked Aronofsky why he wanted a Chilean man who was not fond of biopics to helm the film. In May 2015, Portman was confirmed to star in the film. That same month, Larraín was hired to direct the film, with Aronofsky working as a producer. By the 2015 Cannes Film Festival, the film was officially a go. The rest of the cast – led by Greta Gerwig and Peter Sarsgaard – were announced between May and October of the same year. Casting Natalie Portman was approached to star in the film in September 2012, but her casting was not confirmed until May 2015. In preparation for the role, Portman studied Jackie Kennedy extensively by watching videos of her, repeatedly watching White House tour recordings, reading books, and listening to audiotapes of her interviews. She also read around twenty of her "pulpy" biographies, which she did not consider high literature. Her primary source was the seven-part eight-and-a-half-hour Life magazine interview conducted in the early part of 1964, by Arthur M. Schlesinger Jr. with Kennedy. One of three interviews she gave following her husband's assassination, it was kept private throughout her life. Portman said she was intimidated at first, and her initial knowledge of Kennedy was just a "superficial understanding of [Kennedy] as a fashion plate." But through playing her in the film, Portman gained a deeper understanding of the former first lady. While doing research, she found out that Kennedy had two personas in front of different people – a debutante in public but feisty behind closed doors. "When she was doing interviews, [her voice] was a lot more girly and soft, and then when you hear her talking to Schlesinger at home, you hear the ice in the glass clinking and the voice is a little deeper and her wit comes out more, so you get this real sense of the two sides." Mimicking Jackie's ranging vocals was pivotal for Portman, since Aronofsky said "conquering Kennedy's vocals was the key to the rest of the film." Portman trained with dialect coach Tanya Blumstein, and in the beginning, had difficulty with copying Kennedy's vocals, especially on the first day of set when her initial delivery was too much. She has also said that the costumes helped her to get into character. Portman is one of many actors to have portrayed Kennedy in cinema and on television, following Divine, Jaclyn Smith, Sarah Michelle Gellar, Roma Downey, Jill Hennessy, Joanne Whalley, Kat Steffens, Jacqueline Bisset, Jeanne Tripplehorn, Parker Posey, Blair Brown, Katie Holmes, Victoria Beckham, Ginnifer Goodwin, Stephanie Romanov and Minka Kelly. Filming Principal photography on the film began in December 2015 in a Paris-area studio, where most of the interior scenes were shot. Production designer Rabasse and set decorator Melery oversaw replication of the White House rooms needed for filming in the studio just outside Paris. In February 2016, production moved to downtown Washington, D.C., where JFK's funeral procession scenes were filmed. Music Mica Levi composed the film's accompanying score. Release The film had its world premiere at the 73rd Venice International Film Festival on September 7, 2016. It also screened at the Toronto International Film Festival on September 11, 2016, winning the festival's Platform Prize. Shortly after, Fox Searchlight Pictures acquired U.S distribution rights to the film, and set it for a December 9, 2016, release. It was later moved up a week to December 2. Home media Jackie was released on Blu-ray, DVD, and digital download by Fox Searchlight Pictures on March 7, 2017. Reception Box office Jackie grossed $14 million in the United States and Canada and $11.1 million in other territories for a worldwide total of $25.1 million. Fox Searchlight opened Jackie in a limited release in five theaters across the United States on December 2, 2016. In Los Angeles, it screened at the Arclight Hollywood and the Landmark West L.A., while in New York City, it played at AMC Lincoln Square, Cinema 1,2,3, and the Landmark Sunshine. It grossed $275,000 during its opening weekend (a per-theater average of $55,000), finishing 20th at the box office. Critical response Jackie received positive reviews from critics, with Portman's performance being widely acclaimed. On review aggregator website Rotten Tomatoes, the film has an approval rating of 88% based on 309 reviews, with an average rating of 7.9/10. The site's critical consensus reads, "Jackie offers an alluring peek into a beloved American public figure's private world — and an enthralling starring performance from Natalie Portman in the bargain." On Metacritic, the film has a score of 81 out of 100, based on 52 reviews, indicating "universal acclaim". David Rooney of The Hollywood Reporter gave the film a highly positive review, writing that the film is "Extraordinary in its piercing intimacy and lacerating in its sorrow." Guy Lodge of Variety also gave the film a highly positive review, writing that "Chilean helmer Pablo Larraín makes an extraordinary English-lingo debut with this daring, many-leveled portrait of history's favorite First Lady." Matt Zoller Seitz of RogerEbert.com, however, gave the film two-and-a-half out of four stars, criticizing the film's frame narrative and stating that it is "not ultimately necessary (few are, alas) because... we have already seen everything both of them might have had to say illustrated, in a more immediate and often wrenching way, by the flashbacks", which "constitute a second, far superior film, one that has the shock of revelation". Historical accuracy The Dallas Morning News commentator Anna Parks criticized the film's negative portrayal of Jackie's relationship with Lyndon and Lady Bird Johnson. She noted that letters, as well as a taped phone conversation between President Johnson and Jackie, which occurred on December 2, 1963, showed that the former first lady and the Johnsons were cooperating well. Accolades See also Cultural depictions of Jacqueline Kennedy Onassis Cultural depictions of John F. Kennedy References External links Jacqueline Kennedy, or “Faciality”: Media Icons and Political Iconography in "Jackie" (2016) by Pablo Larraín''. Category:2016 films Category:American films Category:French films Category:German films Category:Chilean films Category:Films directed by Pablo Larraín Category:Films produced by Darren Aronofsky Category:Films shot in Paris Category:Films shot in Washington, D.C. Category:Films set in 1961 Category:Films set in 1963 Category:Films set in Dallas Category:Films set in Massachusetts Category:Films set in Washington, D.C. Category:Films set in Virginia Category:French biographical drama films Category:Chilean biographical films Category:American biographical drama films Category:German biographical drama films Category:Chilean drama films Category:2010s biographical drama films Category:Cultural depictions of John F. Kennedy Category:Cultural depictions of Robert F. Kennedy Category:Cultural depictions of Jacqueline Kennedy Onassis Category:Cultural depictions of Lyndon B. Johnson Category:Cultural depictions of Charles de Gaulle Category:Films about the assassination of John F. Kennedy Category:Films about grieving Category:Films about widowhood Category:Protozoa Pictures films Category:Fox Searchlight Pictures films Category:LD Entertainment films Category:Films about the Kennedy family
Share This On Social The consortium of French oil giant Total, Hellenic Petroleum and Italian Edison will explore the waters off the Greek island of Corfu for offshore oil and gas. The representatives of the two companies commented that they had “realistic expectations” for the bloc on the basis of the first surveys, but also fears that the concession could be further delayed. These concerns may have their reasons. The tender for the exploration of the Ionian Sea block was announced four years ago, and Total, Edison and Hellenic Petroleum were named as contractors two years ago. Today, the consortium ensures that it is ready to start work. The Greek state receives 500,000 EUR in concession and expects an additional 1.5 million EUR from concession fees over the next eight years. French Total owns 50% of the project and the remaining companies share 25%. They are also candidates for another potential block in the offshore zone of Crete Island.
In both cases, those defending Hague and Coulson, an ex-editor of the News of the World and now David Cameron's Alastair Campbell, accuse their critics of being politically motivated (driven by commercial rivalry with the Murdoch-owned Wall Street Journal in the case of the New York Times's investigation into the phone-hacking operations at the NoW). Low calculations are part of the story – they usually are. And why not? Commercial motives drive much of what the media does. We are none of us in business to lose money, though we often do. Ten years ago, the pre-Murdoch WSJ ran a cracking page one profile of Murdoch's third wife, Wendi Deng – basically, it accused her of being a manipulative gold-digger – which is now behind the paywall, if there at all. Here's Slate's take on it, and here's Gawker's. You could argue that this piece, too, was politically or commercially motivated by fear of a rival who even then had his eye on the WSJ. But it was also a fascinating story about two important people, the sort of reporting which has a public interest defence. I thought it a touch too intrusive, but read every word. Public interest defence is the crucial bit. As I wrote here last week, I thought Hague didn't deserve the treatment he got. Did you notice that tawdry queue of Sunday columnists denouncing him for his embarrassing personal statement, as if he'd wanted to do it? Interestingly, of the Sunday papers I read at home, only the Murdoch Sunday Times bothered with the story. That's why I don't hesitate to mention the Deng profile again. Most papers were busier, as they had been for much of the week, with the NoW disclosures about alleged corruption in the Pakistan cricket team, where the evidence looks strong. Marked notes were reportedly found in the hotel rooms of key players – notes handed to the middleman by the NoW's reporters. Well done, NoW. But hang on: here's a problem which pulls some of the threads together. Pakistan's high commissioner in London has been robust – loyal but silly, says me – in suggesting his players may have been fitted up. Eventually, he may get round to suggesting collusion between the cops and the NoW. After all, it's happened before and is at the heart of what the efforts by the Guardian and the New York Times to expose what really happened in the phone-tapping affair and why Scotland Yard seems to have limited the scope of its inquiry into the Clive Goodman/Glenn Mulcaire case (jailed for tapping royal phones), the subsequent review of the files and failure to warn the "vast number" (internal description) of those whose phones may have been tapped. There may be good operational reasons for what the Met did, certainly in restricting its initial case – a commonplace procedure to make them manageable – though I did not hear it from the force's assistant commissioner, John Yates, on Radio 4 this morning. Police officers may have private as well as professional relationships with reporters, but not improper ones, he insisted. OK, if you say so, Mr Yates. I'm glad things are better than they were in my brief sojourn in the Yard's press room. The trouble there is that the NoW and the Sunday People were also busy at the weekend turning over Wayne Rooney's love life again. It's another of those tawdry kiss-and-tell stories by a gold-digger. Clearly, we can all see the public interest defence in exposing corruption in cricket. It destroys the very essence of the game. I remain at a loss to see the public interest in what Wayne Rooney does with one of his less important organs at the weekend – it's his feet and brain, all that highly-attuned coordination, that we're interested in. After the John Terry affair cost the Chelsea star his England captaincy, which can't have helped our hapless national team at the World Cup, you'd have thought they'd have learned. Rooney may have done, since the sex allegations against him relate to last year. But the tabloids never learn. It happens that, when the Sun turned over the teenage Rooney in a four-page special on his sex life in 2004, they caused a lot of grief to the family of the "auld slapper" (actually 52) with whom he'd been dealing. It's a complicated case, which I wrote about later. But the relevant bit, so I subsequently heard, was that the paper was able to win a libel case which the woman had brought because of information improperly provided by Merseyside police. She had made serious allegations against a copper, which should have remained confidential. All of which is another way of saying that there are intimate links between some policemen – including some very senior ones – and newspapers, especially those that investigate crime and rascality, real or imagined. It's a murky world, and not all of it is against the public interest. But some of it will be. You may have noticed that some top coppers (those more likely to be admired at the Guardian than the NoW) were among those targeted for hacking, along with the (Labour?) politicians, football pros and assorted celebs. If you want to, you can throw in the loans-for-honours inquiry, which saw Ruth Turner, a wholesome Blair staffer – still on the payroll – arrested in a much-publicised dawn raid which (predictably) never resulted in charges, but damaged Blair and Labour. Tory abuses of fundraising over the decades have been much more spectacular, as you'd expect from people with more money and better lawyers. So the spider's web of News International connections can easily seem a bit too cosy, especially if you want to get really paranoid and note that ex-Met chief Lord Stevens went on to write a NoW column. Andy Hayman, who headed the original inquiry into the phone-hacking affair, now writes for the Times. "It's not about us going for Coulson, it's more about the police," one Labour figure was quoted as saying by the Observer. That claim may be stretching a point. In a world where we all have to justify ourselves, newspapers should do so too. Likewise the police, difficult though their job is. It just so happens that the coalition has brought parliament back early this year – it opens at 2.30pm with questions to the home secretary. It is a wholesome decision it may regret in today's circumstances. This accountability stuff is hard work.
Effects of two stressors on behaviour in the elevated X-maze: preliminary investigation of their interaction with 8-OH-DPAT. Effects of water deprivation and restraint were compared in the rat elevated X-maze. Water deprivation for 12-48 h increased corticosterone and had a duration-dependent "anxiolytic" effect in the elevated X-maze, increasing the ratio of open/total arm entries (OTR) and the proportion of time spent on the open arms (% time) without affecting total entries. Brain 5HIAA/5HT was increased only after 24 or 48 h deprivation. Restraint for 15 min also increased plasma corticosterone and brain 5HIAA/5HT but had no effect on behaviour in the elevated X-maze when rats were tested immediately afterwards. However, 1 h restraint was "anxiogenic" in the elevated X-maze immediately after release, reducing OTR and % time, but with a less consistent reduction in total entries; reductions in OTR and % time were still present 24 h later. The 5HT1A agonist 8-hydroxy-2-(di-n-propylamino) tetralin (8-OH-DPAT) (0.1-0.2 mg/kg), administered 10 min before testing in the elevated X-maze, had "anxiogenic" actions in non-stressed rats. The effect of 0.1 mg/kg 8-OH-DPAT was not significantly altered by 24 or 48 h water deprivation but was abolished by restraint for 1 h immediately beforehand, despite the "anxiogenic" effect of restraint alone. Similar mutual antagonism of 8-OH-DPAT and restraint occurred when the dose of 8-OH-DPAT was increased to 0.2 mg/kg. Twenty-four hours after restraint, restrained rats which had received 8-OH-DPAT (0.1-0.2 mg/kg) still did not show any significant "anxiogenic effect" compared with non-restrained vehicle treated controls. Restraint-induced deficits in elevated X-maze exploration may prove a useful model with which to study the pharmacology of depression-related anxiety. However, the effects of the stressors examined, and their interaction with 8-OH-DPAT in the elevated X-maze, appear to depend on the nature of the stressor.
Q: Reference request: normalization of intertwining operators for GL(2, C) Take $F$ a local field and $\chi_1, \chi_2$ two characters, write $M(\chi_1, \chi_2)$ for the standard intertwining integral $$M(\chi_1. \chi_2).f(g) := \int_{F} f\left( \begin{pmatrix} 0&-1\\ 1& 0 \end{pmatrix} \begin{pmatrix} 1& x \\ 0 & 1 \end{pmatrix}g \right) \, dx.$$ (Which varies meromorphically as a function of $\chi_1,$ and $\chi_2$.) I would expect that if $L(\eta)$ denotes the usual local $L$ function attached to a character $\eta,$ then $L(\frac{\chi_1}{\chi_2})^{-1} M(\chi_1, \chi_2)$ is holomorphic and never the zero operator. That is, if I've formulated correctly this is a pretty easy check when $F$ is nonarchimedean and immediate from the explicit formula given in (6.15) of Bump's Automorphic forms and representations if $F=\mathbb R.$ So, I imagine it holds and is well known for $\mathbb C$ as well, but does anyone have a reference? A: This is on page 57-58 of M. Duflo, "Representations irreductibles des groupes semisimples complexes", in "Analyse harmonique sure les groupes de Lie", SLN 497, 1975, 26-88. V. Drinfeld also noted in email to me (2014) that Zelobenko wrote up SL(2,C) in 1963, in Izv. Akad. Nauk SSSR Ser. Mat. 27, 1343-1394, but I did not corroborate the latter. Wallach states the outcome for SL(2,C) in his article in Corvallis. (A more recent working of this exercise is at http://www.math.umn.edu/~garrett/m/v/intertwinings_SL2C.pdf )
Would you recommend the product? No | Price you paid?: Not Indicated | Rating: 0 Pros: First ingredient is a named meat product Cons: Insufficient meat content, mixed quality ingredients The first ingredient in this food is a named meat product, in meal form. It is the sole meat product in the food. The main grains in the food are barley and rice. These are decent quality grains, but with three grains and only one meat product ahead of the fat content, the food appears rather grain heavy. Rice bran is a grain fragment we consider to be primarily filler. Beet pulp is controversial filler which appears to be used in large quantities in this food. It is a by-product, being dried residue from sugar beets which has been cleaned and extracted in the process of manufacturing sugar. It is a controversial ingredient in dog food, claimed by some manufacturers to be a good source of fibre, and derided by others as an ingredient added to slow down the transition of rancid animal fats and causing stress to kidney and liver in the process. We note that beet pulp is an ingredient that commonly causes problems for dogs, including allergies and ear infections, and prefer not to see it used in dog food. There are less controversial products around if additional fibre is required. The food contains a small amount of vegetable matter in the form of sweet potatoes. Overall, the product appears to have minimal meat content, and remaining ingredients are of mixed quality.
Selima Oasis Selima Oasis is an oasis in the Sudan located west of the Third Cataract of the Nile and the ancient site of Amara West. It lies along the Darb al-Arbaʿīn (Forty Days' Road), a desert track linking Kordofan with Egypt. Just to the north of Selima, the track splits into a northern route going to Kharga Oasis and a northwestern route going to Dunqul Oasis. Geography Selima lies at the base of an escarpment of Jurassic and Cretaceous rock. Around 8300 BC, a freshwater lake formed over the site with depths of . The surrounding vegetation was savannah at the time. The remains of lacustrine fauna and of Palaeolithic artefacts have been recovered from the site. Around 4300, it transitioned to a saltwater sabkha and by 2700 it had dried up. Today it lies over the Nubian Sandstone Aquifer System. The flora of Selima is not particularly varied and includes grasses (Desmostachya bipinnata and Imperata cylindrica), reeds (Phragmites australis), camelthorn (Alhagi maurorum), date palm (Phoenix dactylifera), dom palm (Hyphaene thebaica) and several species of tamarisk (Tamarix). Although upwards of 2500 date palms were counted in the oasis in 1902, just over 1000 were found in 2011. Dates have never been an important part of the economy of the oasis. History Selima has been in use for millennia as a waypoint for travellers to bypass the Second Cataract. Pottery of the Mesolithic Early Khartoum culture has been found at Selima. The Egyptian official Harkhuf almost certainly used it on his trading missions to Kerma. Traveller's descriptions of the oasis date back to the 16th century and all describe the place as having easy access to water. Potable water is found below the surface. In the early 19th century, Frédéric Cailliaud found three wells in use at Selima and three wells are still in use today. The archaeologist William Boyd Kennedy Shaw, who visited Selima during his circuit of the Libyan Desert in 1935, called it the "loveliest of all the Libyan oases". Only minor archaeological work was done at Selima in the 1970s and 1980s. The first major excavations were undertaken by the Selima Oasis Project in 2011, 2013 and 2014. Atop a mound about southeast of the oasis vegetation lies the Beit es-Selima, the ruins of an ancient multi-roomed stone structure. Carbon dating and potsherds put the building in use the Nubian early (AD 600–850) and classical (AD 850–1100) Christian periods. Most pottery recovered was wheel-made and a few decorated pieces were from Aswan. Although not originally fortified, the building dominates the surrounding countryside and in the early 20th century was used a police watchtower or fort (tabia) by the Anglo-Egyptian administration. Theories about its purpose abound. It has been described as a tavern on the Darb al-Arbaʿīn managed by a warrior-princess named Selima and as a Christian convent. The Catholic missionary Theodor Krump described it as the ruins of an eight-celled monastery when he passed through in 1700. Support for this theory may come from the Ḥudūd al-ʿĀlam, a 10th-century Persian geography, which describes two monasteries as lying "in the desert between the Nuba and the Sudan". On and around the Beit es-Selima are numerous inscriptions and engravings. These include writing in Arabic and Libyco-Berber, but not Greek or Coptic. Some signs might be camel brands or tribal markings. There are also a few figural engravings. They show that Selima was in contact with the Kharga Oasis, the Dakhla Oasis and the Darfur. In 1928, the archaeologist Thomas Leach reported that salt was mined at Selima by groups who came by donkey and camel from Sukkot, Argo Island and the Mahas. The salt caravans followed a track from Sagiat el-Abd in the Nile valley. According to oral tradition recorded in the vicinity of the Dal Cataract in 2014, the last salt caravan took place in 1980. Today there is a military post, a police office and a customs station at Selima. Most traffic passing through is going to or coming from Libya. References Category:Oases of Africa Category:Geography of Sudan Category:Nubian architecture in Sudan
# Copyright 2019 The MediaPipe Authors. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. load( "//mediapipe/framework/tool:mediapipe_graph.bzl", "mediapipe_simple_subgraph", ) licenses(["notice"]) package(default_visibility = ["//visibility:public"]) cc_library( name = "renderer_calculators", deps = [ "//mediapipe/calculators/core:concatenate_normalized_landmark_list_calculator", "//mediapipe/calculators/core:concatenate_vector_calculator", "//mediapipe/calculators/core:split_normalized_landmark_list_calculator", "//mediapipe/calculators/util:annotation_overlay_calculator", "//mediapipe/calculators/util:detection_label_id_to_text_calculator", "//mediapipe/calculators/util:detections_to_render_data_calculator", "//mediapipe/calculators/util:landmarks_to_render_data_calculator", "//mediapipe/calculators/util:rect_to_render_data_calculator", "//mediapipe/graphs/face_mesh/calculators:face_landmarks_to_render_data_calculator", "//mediapipe/graphs/iris_tracking/calculators:iris_to_render_data_calculator", ], ) mediapipe_simple_subgraph( name = "iris_and_depth_renderer_gpu", graph = "iris_and_depth_renderer_gpu.pbtxt", register_as = "IrisAndDepthRendererGpu", deps = [ ":renderer_calculators", "//mediapipe/graphs/iris_tracking/calculators:iris_to_depth_calculator", ], ) mediapipe_simple_subgraph( name = "iris_renderer_cpu", graph = "iris_renderer_cpu.pbtxt", register_as = "IrisRendererCpu", deps = [ ":renderer_calculators", ], ) mediapipe_simple_subgraph( name = "iris_and_depth_renderer_cpu", graph = "iris_and_depth_renderer_cpu.pbtxt", register_as = "IrisAndDepthRendererCpu", deps = [ ":renderer_calculators", "//mediapipe/graphs/iris_tracking/calculators:iris_to_depth_calculator", ], )
Impact of intraoperative hydrodebrider treatment on postoperative sinonasal inflammation. The impact of intraoperative hydrodebrider sinus irrigation (HSI) during endoscopic sinus surgery (ESS) on postoperative inflammation, endoscopy, and patient-reported outcomes has not been studied. A clinical trial of 12 patients with symmetric chronic rhinosinusitis were prospectively randomized to HSI on one side after undergoing bilateral ESS. The contralateral side was not treated with any irrigation and served as an internal control. Preoperative computed tomography, endoscopic, 22-item Sino-Nasal Outcome Test (SNOT-22), and symptom visual analog scale (VAS) scores for each side were obtained. At 1 and 3 months postsurgery, endoscopy, SNOT-22, and sinus VAS were recorded. Sinonasal mucus levels of interleukin (IL)-6, IL-10, IL-17a, and tumor necrosis factor (TNF) alpha were measured at the time of surgery, 1 and 3 months, postoperatively, from each side. VAS scores improved on both sides (p < 0.05) and SNOT-22 improved at all postoperative time points (p < 0.05). Endoscopic scores of HSI-treated sides did not improve compared with baseline. HSI had no additional significant impact on postoperative VAS at any time point. HSI significantly decreased IL-17a levels when compared with the control side at 1 month (p = 0.034) and 3 months (p = 0.031). No significant change was seen in TNF-alpha, IL-6, or IL-10 on either side at any time point. Intraoperative HSI at the time of ESS failed to establish any improvement in postoperative endoscopy or most local cytokine levels after ESS.
My vision for ideal medical care is a partnership between the physician, patient, and expanded healthcare team that tackles the root causes of chronic disease and tries to reverse and prevent these problems. Dr. Bray Links Saturday, July 7, 2018 Galactose-alpha-1,3-galactose (alpha-gal) is a carbohydrate found in the cells of many mammals that humans eat, such as cows, sheep, and pigs. Poultry that has been injected with natural flavoring containing beef or other mammal cells may also have alpha-gal. As a result of autoimmune responses, some people become allergic to alpha-gal. People with this allergy may experience mild discomfort after eating meat, or they may have a dangerous reaction that leaves them unable to breathe. The spectrum of reactions to alpha-gal varies. Most instances of this allergy are triggered by tick bites. About DocBray.com Appropriate Use of Information Self-diagnosis and self-treatment based on information obtained from any health education content carries a number of risks. All of us should be in contact with a healthcare professional about obtaining specific recommendations for one's health.
The immediate goals for the research project during the current year are threefold. (1) It is planned to examine the potentially aggression-inducing properties of chronic administrations of THC. Particularly, the influence of dose level, housing conditions, and animal strain are examined. (2) An important goal for the current and next year is a comparison of the effects of THC and other drugs in three different animal species, including mice, rats, and monkeys. (3) Biochemical investigations will be performed in animals having been subjected to specific acute or chronic THC regimens and having shown significant changes in aggressive behavior. Our results confirm that acutely administered THC suppresses several kinds of aggressive behavior in a number of animal species, including primates, and establish THC, in contrast to most other psychotropic drugs, as an agent with potent and rather specific anti- aggressive properties. The major source of controversial information are studies on the potentially aggression-inducing effects of chronically administered THC in rats. At present, on the basis of studies employing a wide range of doses and different housing conditions, in four different strains of rats, we are not able to substantiate the reports that chronic THC induces aggressiveness in a significant number of animals. However, in some strains of rats, chronic THC initiates indiscriminate and non-specific mouse killing in more than 2/3 of the animals. Further studies will have to establish how elusive or ubiquitous the aggression inducing properties of chronically administered THC are.
But before that, those voters must do so later this year, to rid the House and the Senate of as many of Trump’s defenders, apologists and accomplices as possible. Should the time come where impeachment is inevitable, there must be enough votes in the House and Senate to ensure it. We have to stop thinking that we can somehow separate what racists believe from how they will behave. We must stop believing that any of Trump’s actions are clear of the venom coursing through his convictions. Everything he does is an articulation of who he is and what he believes. Therefore, all policies he supports, positions he takes and appointments he makes are suspect. And finally, we have to stop giving a pass to the people — whether elected official or average voter — who support and defend his racism. If you defend racism you are part of the racism. It doesn’t matter how much you say that you’re an egalitarian, how much you say that you are race blind, how much you say that you are only interested in people’s policies and not their racist polemics. As the brilliant James Baldwin once put it: “I can’t believe what you say, because I see what you do.” When I see that in poll after poll a portion of Trump’s base continues to support his behavior, including on race, I can only conclude that there is no real daylight between Trump and his base. They are part of his racism. When I see the extraordinary hypocrisy of elected officials who either remain silent in the wake of Trump’s continued racist outbursts or who obliquely condemn him, only to in short order return to defending and praising him and supporting his agenda, I see that there is no real daylight between Trump and them either. They too are part of his racism. When you see it this way, you understand the enormity and the profundity of what we are facing. There were enough Americans who were willing to accept Trump’s racism to elect him. There are enough people in Washington willing to accept Trump’s racism to defend him. Not only is Trump racist, the entire architecture of his support is suffused with that racism. Racism is a fundamental component of the Trump presidency.
// Copyright (c) .NET Foundation. All rights reserved. // Licensed under the Apache License, Version 2.0. See License.txt in the project root for license information. using System.Threading; using System.Threading.Tasks; namespace Microsoft.Extensions.Diagnostics.HealthChecks { /// <summary> /// Represents a publisher of <see cref="HealthReport"/> information. /// </summary> /// <remarks> /// <para> /// The default health checks implementation provided an <c>IHostedService</c> implementation that can /// be used to execute health checks at regular intervals and provide the resulting <see cref="HealthReport"/> /// data to all registered <see cref="IHealthCheckPublisher"/> instances. /// </para> /// <para> /// To provide an <see cref="IHealthCheckPublisher"/> implementation, register an instance or type as a singleton /// service in the dependency injection container. /// </para> /// <para> /// <see cref="IHealthCheckPublisher"/> instances are provided with a <see cref="HealthReport"/> after executing /// health checks in a background thread. The use of <see cref="IHealthCheckPublisher"/> depend on hosting in /// an application using <c>IWebHost</c> or generic host (<c>IHost</c>). Execution of <see cref="IHealthCheckPublisher"/> /// instance is not related to execution of health checks via a middleware. /// </para> /// </remarks> public interface IHealthCheckPublisher { /// <summary> /// Publishes the provided <paramref name="report"/>. /// </summary> /// <param name="report">The <see cref="HealthReport"/>. The result of executing a set of health checks.</param> /// <param name="cancellationToken">The <see cref="CancellationToken"/>.</param> /// <returns>A <see cref="Task"/> which will complete when publishing is complete.</returns> Task PublishAsync(HealthReport report, CancellationToken cancellationToken); } }
update=Sun May 22 21:21:19 2016 version=1 last_client=kicad [pcbnew] version=1 LastNetListRead= UseCmpFile=1 PadDrill=0.600000000000 PadDrillOvalY=0.600000000000 PadSizeH=1.500000000000 PadSizeV=1.500000000000 PcbTextSizeV=1.500000000000 PcbTextSizeH=1.500000000000 PcbTextThickness=0.300000000000 ModuleTextSizeV=1.000000000000 ModuleTextSizeH=1.000000000000 ModuleTextSizeThickness=0.150000000000 SolderMaskClearance=0.000000000000 SolderMaskMinWidth=0.000000000000 DrawSegmentWidth=0.200000000000 BoardOutlineThickness=0.100000000000 ModuleOutlineThickness=0.150000000000 [cvpcb] version=1 NetIExt=net [general] version=1 [eeschema] version=1 LibDir= [eeschema/libraries] LibName1=power LibName2=device LibName3=transistors LibName4=conn LibName5=linear LibName6=regul LibName7=74xx LibName8=cmos4000 LibName9=adc-dac LibName10=memory LibName11=xilinx LibName12=microcontrollers LibName13=dsp LibName14=microchip LibName15=analog_switches LibName16=motorola LibName17=texas LibName18=intel LibName19=audio LibName20=interface LibName21=digital-audio LibName22=philips LibName23=display LibName24=cypress LibName25=siliconi LibName26=opto LibName27=atmel LibName28=contrib LibName29=valves LibName30=/home/kleinjt/repos/vna/lib/74hc04 LibName31=/home/kleinjt/repos/vna/lib/74hc04_full LibName32=/home/kleinjt/repos/vna/lib/74xx1g14 LibName33=/home/kleinjt/repos/vna/lib/adf4355-3 LibName34=/home/kleinjt/repos/vna/lib/adl5380 LibName35=/home/kleinjt/repos/vna/lib/adl5902 LibName36=/home/kleinjt/repos/vna/lib/adm7150 LibName37=/home/kleinjt/repos/vna/lib/boosterpack_ti LibName38=/home/kleinjt/repos/vna/lib/cat102 LibName39=/home/kleinjt/repos/vna/lib/cmm0511-qt-0g0t LibName40=/home/kleinjt/repos/vna/lib/conn_sma LibName41=/home/kleinjt/repos/vna/lib/conn_sma_2gnd LibName42=/home/kleinjt/repos/vna/lib/hmc311sc70 LibName43=/home/kleinjt/repos/vna/lib/hmc321 LibName44=/home/kleinjt/repos/vna/lib/hmc424 LibName45=/home/kleinjt/repos/vna/lib/hmc525 LibName46=/home/kleinjt/repos/vna/lib/hmc629 LibName47=/home/kleinjt/repos/vna/lib/lmk61e2 LibName48=/home/kleinjt/repos/vna/lib/lmx2592 LibName49=/home/kleinjt/repos/vna/lib/lt1567 LibName50=/home/kleinjt/repos/vna/lib/ltc1566-1 LibName51=/home/kleinjt/repos/vna/lib/ltc1983 LibName52=/home/kleinjt/repos/vna/lib/ltc2323 LibName53=/home/kleinjt/repos/vna/lib/ltc5549 LibName54=/home/kleinjt/repos/vna/lib/maam-011101 LibName55=/home/kleinjt/repos/vna/lib/mga-82563 LibName56=/home/kleinjt/repos/vna/lib/mounting_box LibName57=/home/kleinjt/repos/vna/lib/mounting_hole LibName58=/home/kleinjt/repos/vna/lib/pcm2900 LibName59=/home/kleinjt/repos/vna/lib/pe42521 LibName60=/home/kleinjt/repos/vna/lib/pwr_splitter LibName61=/home/kleinjt/repos/vna/lib/rf_crossbar LibName62=/home/kleinjt/repos/vna/lib/scbd-16-63 LibName63=/home/kleinjt/repos/vna/lib/tcm-63ax+ LibName64=/home/kleinjt/repos/vna/lib/txco LibName65=/home/kleinjt/repos/vna/lib/lt1819 LibName66=/home/kleinjt/repos/vna/lib/nc7sv74kbx LibName67=/home/kleinjt/repos/vna/lib/tps793
Green, Yellow, and Red risk perception in everyday life - a communication tool. Adolescents have the highest risk for food allergy-related fatalities. Our main aim was to investigate the level of risk in everyday social situations as perceived by adolescents/young adults with peanut allergy, their families, and their friends. The web-based 'Colours Of Risks' (COR) questionnaire was completed by 70 patients (aged 12-23 years), 103 mothers and fathers, 31 siblings (aged 12-26 years), and 42 friends (aged 12-24 years). COR deals with six main contexts (home, school/university, work, visiting/social activities, special occasions/parties, and vacations), each with 1-12 items. Response categories are green (I feel safe), yellow (I feel uncertain), or red (I feel everything is risky). There was a high level of agreement between participants in defining situations as safe, uncertain, or risky, but female patients and mothers rated fewer situations as safe compared to male patients and fathers. Being with close friends and family, and attending planned parties without alcohol were perceived as situations of low risk. While 94% of patients took an epinephrine auto-injector (EAI) into risky situations, only 65% took it into safe situations. In contrast to the close family, 31% of the friends did not know the patient had an EAI, and fewer knew how to administer the EAI. Young adults with peanut allergy face challenges when moving from the safe home with ready assistance if needed, to independence with unpredictable surroundings and less certain help. Perceived 'safe' situations may in fact be the riskiest, as patients often do not take the EAI with them.
It looks like you're enjoying the forums but haven't created an account yet. Why not take a minute to register for your own free account now? As a member you get free access to all of our forums and posts plus the ability to post your own messages, communicate directly with other members and much more. Register now! Already a member? Login at the top of this page to stop seeing this message. __________________ Also Michael Hughes a f*****g 87 year old journeyman showed Garcia, Pongolle, Potter, Kewell and Cisse how to play in a wide position, he took the p**s out of us tonight. (LFC fansite) Another suggestion is the Palace Fulham game where the ref blew the final whistle and everyone filtered out only for the ref to bring the teams back on and play an extra minute or two because he had realised he had blown too early. Or perhaps the last minute own goal from about 40 yards on the Palace vs Brum match. Or the fa cup replay against Brighton at Stamford Bridge where Mullery flings down a 10s note at Venables.
#ifndef dx10StateManager_included #define dx10StateManager_included #pragma once class dx10StateManager { public: dx10StateManager(); ~dx10StateManager(); // Set all states to default void Reset(); // Sends states to DX10 runtime, creates new state objects if nesessary void Apply(); // Unmaps all constant bindings. void UnmapConstants(); // Set appropriate state. The fastest method. Prefer this code. void SetRasterizerState(ID3DRasterizerState* pRState); void SetDepthStencilState(ID3DDepthStencilState* pDSState); void SetBlendState(ID3DBlendState* pBlendState); void SetStencilRef(UINT uiStencilRef); void SetAlphaRef(UINT uiAlphaRef); void BindAlphaRef(R_constant* C); // The slowest (but finer) method // Can create state objects in runtime // These functions accept only DX9 style constants // Don't use these directly. Only via RCache to allow it // to route calls to DX9 // TODO: replace u32 with appropriate DX9 enums to avoid confusion void SetStencil(u32 Enable, u32 Func, u32 Ref, u32 Mask, u32 WriteMask, u32 Fail, u32 Pass, u32 ZFail); void SetDepthFunc(u32 Func); void SetDepthEnable(u32 Enable); void SetColorWriteEnable(u32 WriteMask); void SetCullMode(u32 Mode); void SetMultisample( u32 Enable ); void SetSampleMask( u32 Mask ); void EnableScissoring(BOOL bEnable = TRUE); // Functions which override value even if new state was set up. // Reset value to current state's value if override is disabled. void OverrideScissoring(bool bOverride = true, BOOL bValue = TRUE); private: void ValidateRDesc(); void ValidateDSDesc(); void ValidateBDesc(); private: // All states are supposed to live along all application lifetime ID3DRasterizerState* m_pRState; // Weak link ID3DDepthStencilState* m_pDepthStencilState; // Weak link ID3DBlendState* m_pBlendState; // Weak link UINT m_uiStencilRef; UINT m_uiAlphaRef; // If will need more constants create support class instead R_constant* m_cAlphaRef; // Appropriate state should be applied bool m_bRSNeedApply; bool m_bDSSNeedApply; bool m_bBSNeedApply; // Appropriate state is invalid. // Get a new state from cache by description before apply. bool m_bRSChanged; bool m_bDSSChanged; bool m_bBSChanged; // Appropriate description is invalid. // Init description before changing. bool m_bRDInvalid; bool m_bDSDInvalid; bool m_bBDInvalid; // Cached state descriptions // Valid only if *Valid flag is set D3D_RASTERIZER_DESC m_RDesc; D3D_DEPTH_STENCIL_DESC m_DSDesc; D3D_BLEND_DESC m_BDesc; bool m_bOverrideScissoring; BOOL m_bOverrideScissoringValue; UINT m_uiSampleMask; }; extern dx10StateManager StateManager; #endif // dx10StateManager_included
The Eat Fat, Get Thin Cookbook: More than 175 Delicious Recipes for Sustained Weight Loss and Vibrant Health Physician Hyman (The Blood Sugar Solution) pairs his earlier Eat Fat, Get Thin with over 175 mouth-watering and health-savvy recipes. Hyman, director of the Cleveland Clinic Center for Functional Medicine, debunks commonly held ideas about consuming fat. He cites new research suggesting that it does not cause obesity and heart disease; carbs do. Hyman asserts that consumption of olive and coconut oils, avocados, wild fatty fish, nuts, and seeds will reduce inflammation and boost energy, and, when combined with a low-glycemic and whole-food diet, can contribute to weight loss and even, he says, reverse type 2 diabetes. With the help of chef Frank Giglio, Hyman introduces sustaining and delectable recipes, including poached eggs with Hollandaise, taco salad, roasted cauliflower soup, and shrimp scampi. After a strict 21-day starter plan (which Hyman supplements with tips on maximizing fats, eating well on a budget, dining out and with kids, and saving time), Hyman recommends transitioning to a “Pegan” diet combining the best aspects of paleo and vegan diets. This cookbook is a must for gourmets, regardless of whether they’re looking to be healthier. Agent: Richard Pine, Inkwell Management. (Dec.)
With Emmanuel Macron’s defeat of the rightwing populist Marine Le Pen in the French presidential election, the EU and the euro have dodged a bullet. But geopolitical risks are continuing to proliferate. The populist backlash against globalisation in the west will not be stilled by Macron’s victory, and could still lead to protectionism, trade wars, and sharp restrictions to migration. If the forces of disintegration take hold, the UK’s withdrawal from the EU could eventually lead to a breakup of the trade bloc – Macron or no Macron. At the same time, Russia has maintained its aggressive behaviour in the Baltics, the Balkans, Ukraine, and Syria. The Middle East still contains multiple near-failed states such as Iraq, Yemen, Libya, and Lebanon. And the Sunni-Shia proxy wars between Saudi Arabia and Iran show no sign of ending. In Asia, US or North Korean brinkmanship could precipitate a military conflict on the Korean peninsula. And China is continuing to engage in – and in some cases escalate – its territorial disputes with regional neighbours. Despite these geopolitical risks, global financial markets have reached new heights. So it is worth asking if investors are underestimating the potential for one or more of these conflicts to trigger a more serious crisis, and what it would take to shock them out of their complacency if they are. There are many explanations for why markets may be ignoring geopolitical risks. For starters, even with much of the Middle East burning, there have been no oil-supply shocks or embargos, and the shale-gas revolution in the US has increased the supply of low-cost energy. During previous Middle Eastern conflicts – such as the 1973 Yom Kippur war, Iran’s Islamic revolution in 1979, and Iraq’s invasion of Kuwait in 1990 – oil-supply shocks caused global stagflation and sharp stock-market corrections. A second explanation is that investors are extrapolating from previous shocks, such as 9/11, when policymakers saved the day by backstopping the economy and financial markets with strong monetary and fiscal policy easing. These policies turned post-shock market corrections into buying opportunities, because the fall in asset prices was reversed in a matter of days or weeks. Third, the countries that actually have experienced localised asset-market shocks – such as Russia and Ukraine after Russia’s annexation of Crimea and incursion into eastern Ukraine in 2014 – are not large enough economically to affect US or global financial markets. Similarly, even as the UK pursues a “hard Brexit”, it still accounts for only about 2% of global GDP. A fourth explanation is that the world has so far been spared from the tail risks associated with today’s geopolitical conflagrations. There has not yet been a direct military conflict between any major powers, nor have the EU or eurozone collapsed; Donald Trump’s more radical populist policies have been partly contained; and China’s economy has not yet suffered from a hard landing, which would create sociopolitical instability. Markets have trouble pricing such “black swan” events: unknown unknowns that are unlikely but extremely costly. For example, the market could not have predicted 9/11. And even if investors think another major terrorist attack is likely, they cannot know when. A confrontation between the Washington and Pyongyang could also turn into a black swan event, but this is a possibility that markets have happily ignored. One reason is, notwithstanding Trump’s bluster, the US has few realistic military options: North Korea could use conventional weapons to wipe out Seoul and its surroundings, where almost half of South Korea’s population lives, were the US to strike. Investors may be assuming that even if a limited military exchange occurred, it would not escalate into a fully fledged war, and policy loosening could soften the blow on the economy and financial markets. In this scenario, as with 9/11, the initial market correction would end up being a buying opportunity. But there are other possible scenarios, some of which could turn out to be black swans. Given the risks associated with direct military action, the US is alleged to be using cyber-weapons to eliminate the North Korean nuclear threat against the US mainland. This may explain why so many of North Korea’s missile tests have failed in recent months. But how will North Korea react to being militarily decapitated? One answer is that it could launch a cyber-attack of its own. North Korea’s cyber-warfare capabilities are considered to be just a notch below those of Russia and China, and the world got an early glimpse of them in 2014 when it hacked Sony Pictures. A major North Korean cyber-attack could disable or destroy parts of the US’s critical infrastructure and cause massive economic and financial damage. That remains a risk even if the US can sabotage North Korea’s entire industrial system and infrastructure. Or, faced with disruption of its missile programme and regime, North Korea could go low-tech, by sending a ship with a dirty bomb into the ports of Los Angeles or New York. An attack of this kind would most likely be difficult to monitor or stop. So, while investors may be right to discount the risk of a conventional military conflict between the US and North Korea, they also may be underestimating the threat of a true black swan event, such as a disruptive cyberwar between the two countries or a dirty bomb attack against the US. Would an escalation on the Korean peninsula be an opportunity to “buy the dip” or would it mark the beginning of a massive market meltdown? It is well known that markets can price the risks associated with a normal distribution of events that can be statistically estimated and measured. But they have more trouble grappling with “Knightian uncertainty”: risk that cannot be calculated in probabilistic terms. • Nouriel Roubini is a professor at NYU’s Stern School of Business. He was a senior economist for international affairs in the Clinton White House and has worked for the International Monetary Fund, the Federal Reserve and the World Bank. © Project Syndicate
FIFA Secretary General Praises Maracana's Renovation FIFA Secretary General Jerome Valcke praised the result of the renovations in Rio's fabled Maracana during a visit Wednesday, despite earlier reports of delays in readying the stadium, and said he's not worried about the success of the Confederations http://archive.freep.com/VideoNetwork/2385059774001/FIFA-Secretary-General-Praises-Maracana-s-Renovationhttp://cdn.newslook.com/0d/0dff0ea0629ed8a765230090645bf6af/mp4_low/0dff0ea0629ed8a765230090645bf6af-mp4_low.mp4http://archive.freep.com/VideoNetwork/2385059774001/FIFA-Secretary-General-Praises-Maracana-s-Renovationhttp://cdn.newslook.com/0d/0dff0ea0629ed8a765230090645bf6af/images/frame_0007.jpgFIFA Secretary General Praises Maracana's RenovationFIFA Secretary General Jerome Valcke praised the result of the renovations in Rio's fabled Maracana during a visit Wednesday, despite earlier reports of delays in readying the stadium, and said he's not worried about the success of the Confederations5rio de janeiroBraziljerome valckesportsnewslookWorld00:52
100 Years of Remembrance Concert – King George’s Hall, Northgate. 7pm Free Admission, Tickets available from King George’s Hall. Thursday 8th Brothers in Arms – The Inspiring True Story of the Chavasse Twins. Blackburn Cathedral, 7.30pm – 9.30pm Tickets £2.00 available from the Cathedral Shop, proceeds to Royal British Legion. www.blackburncathedral.com Remembrance Service – Darwen Market Square, outside the Town Hall, Darwen 11.00am, followed by wreath laying at the Boer War Memorial, Belgrave Square, Darwen. Lest We Forget – Remembering WW1 – The Barlow, Edgworth. An afternoon of music, song and spoken word to commemorate the Armistice 100 years ago, ‘Lest We Forget’ will take place with Watch the Wall, Caffrey, Madge and McGurk, and Geoff Miller and friends from 2-4pm, free entry and refreshments. Tel. 01204 852216 or email: info@thebarlow.co.uk Sunday 11th Lone Piper –Battle’s O’er – Blackburn Cathedral 6.00am – 6.15am. ‘Pipe Sargent Kelly-Marie Pierce’ will play Battle’s O’er, a traditional air played by pipers after a battle. To mark the Centenary of the Signing of the WW1 Armistice Documents. Piper Gordon Smith – Will play Battle’s O’er and other laments at the Heritage Centre, Holker House, Darwen. 6am United Service of Remembrance – Blackburn Cathedral 9.30am. Following the service a parade will form on King William Street, moving at 10.25am to Corporation Park Gardens of Remembrance for a wreath laying service at 11am. The Cathedral Eucharist with Two Minutes Silence and Short Peel of Bells – Blackburn Cathedral 10.40am – 12pm Remembrance Service – 10.45am Service and Wreath laying at Bold Venture Park, Darwen at the War Memorial, followed by a service in St Peter’s Church, Darwen at 12noon. Friends of Darwen Cemetery: Local Community Act of Remembrance – The New WW1 memorial, Darwen Western Cemetery 10.30 for 10.45am. Battle’s Over – A Nation’s Tribute – 6.40pm Blackburn Cathedral – Commemoration event, with the Last Post, Two Minutes Silence and Reveille (bugler: Abbie Naylor) followed by the lighting of the Beacon of Light at 7.00pm. Sunday 11th continued Battle’s Over – Ringing Out for Peace – 7.05pm Blackburn Cathedral is joining other cathedrals, minsters and churches throughout the land in ringing the bells on the centenary of the end of the First World War. Piper Gordon Smith – Will play Battle’s O’er and other laments walking from the Heritage Centre, Holker House, to Darwen Town Hall. 6.40pm Battle’s Over – A Nation’s Tribute –Darwen Town Hall 6.45pm – Commemoration event, including the Last Post (bugler arranged by Darwen RBL) followed by the lighting of the Beacon of Light at 7.00pm. Battle’s Over – Ringing Out for Peace – 7.05pm St. Peter’s Church, Darwen is joining other cathedrals, minsters and churches throughout the land in ringing the bells on the centenary of the end of the First World War. Every effort has been made to ensure the accuracy of this information, however further changes can occur. Subscribe to our Channel Flickr CONTACT US This website uses cookies to give you the best experience. Agree by clicking the 'Accept' button. If you click 'Decline', you may continue to use the website, but it may not function correctly. To read our full privacy policy you can visit here.
On 2/6/2013 2:52 AM, David Bailey wrote:> On 05/02/2013 08:06, Richard Fateman wrote:>>>>> Here are some thoughts, though of course "proving" the correctness of>> anything, whether a program or a proof of a theorem continues to be>> an area for research.>> I'd feel better about using software which had these characteristics:>>>> 1. A formal rigorous definition of syntax and semantics.>> 2. More than one implementation, perhaps one that is open source.>> 3. Widely available and widely used by top practitioners of>> (for instance) scientific numerical computation.>> 4. Perhaps standardized by a committee responsive to the>> rigors of ANSI or IEEE.>> 5. Excellent error checking, debugging, profiling tools.>>>> I suppose I could think of more.>>>> How many of these are lacking in Mathematica?>> Well I guess we would all love perfect software, and perfect hardware> with infinite performance, but I am really quite curious as to what> practical advice you would give to someone with the sort of> symbolic/numerical problem that Mathematica is good at - what would you> tell them to use? There are a number of competitors to Mathematica, some free. This wouldcorrespond to item 2, sort of. That is, there are other implementations of symbolic math, though not of Mathematica per se. Unfortunately, there are some "bugs" that aresystem independent -- that is, ALL the authors/programmers fell into thesame hole. Therefore it is possible that several systems will agree onthe same wrong answer!There are some systems for primarily numerical computation that are farmore widespread than Mathematica, corresponding to item 3, at least fornumerics. I personally find the debugging facilities in Mathematica to be quite difficult to use. I speculate that it is because the "working model"I have in my mind (and I suspect others share it) is that I am writingprograms, composing them in various ways. In reality, the internalevaluation strategy of Mathematica is to apply rules to transform expressions. So while I'm looking for a clue as to which "program"has the bug, the debugging info shows transformations of expressions.This jerking back into the reality of Mathematica's actual natureof evaluation generally prompts me to shy away from the use of Trace.I don't know if it is inevitable, but Trace in particular, and debuggingin general in Mathematica seem to me to be quite weak. To theextent that some people might like Mathematica for debugging, it may bethat they are comparing it to a non-interactive system (like batchFORTRAN) which will crash and print out a hexadecimal core dump. There is a profiler in the Mathematica Workbench. I have not triedto use it but from the documentation it seems to suffer from the sameviewpoint as Trace. It also requires running Mathematica in "debug" mode; I don't know how that affects timings. So in regard to item 5, nearly any alternative system that has anappealing debugging framework. Which would be almost anything thatis not bound up in the rule-based paradigm of Mathematica. >(I don't quite know if mentioning other products in> this context is permitted here, but do you even have an existing piece> of software in mind?)>> As regards standardizing committees, I don't think their efforts have> always been positive. Standards vary in usefulness. They can be affected by politics, crazyparticipants with technical disagreements, etc. The deliberationssometimes are more interesting than the results. For example, thereis now an IEEE committee working on interval arithmetic. I do not knowif anyone at WRI is on the committee. I expect that MathematicaIntervals will not conform to that standard. Whether this is apositive or negative consequence depends on your viewpoint. > For example, I would say that Fortran 77 has not> been improved by the later standards, that added enormous complexity,> and a certain unpredictability in the performance of the more 'advanced'> constructs. I think the later standards (now FORTRAN 2008 ?) become complicated inpart to deal with eventualities that affect real computing circumstances, including (say) newer, standardized floating-pointoperations [exceptions, etc], multiprocessing, etc. I doubt thatanyone approaches the revision of a standard with the goal ofincreased complexity. It's the consequence of addressing some issue...
"♪ I got the wind in my hair and a fire within ♪" "♪ 'Cause there's something beginning ♪" "♪ I got a mystery to solve and excitement to spare ♪" "♪ Got a beautiful breeze blowing through ♪" "♪ I'm ready to follow it who knows where ♪" "♪ And I'll get there I swear ♪" "♪ With the wind in my hair ♪" "*TANGLED THE SERIES* Season 01 Episode 01 "What the Hair"" "Boo!" "Pffffft!" "Gothel:" "Hello, Rapunzel." "Did you think I was gone forever?" "What's the matter, dear?" "Aren't you happy to see your mummy?" "Gothel:" "And look!" "Your hair has returned!" "Ooh, isn't that wonderful?" "Come now, dear." "Let's get back to your tower, where you will be safe and secure." "Rapunzel!" " Fred?" " Huh?" "You haven't touched your food." "No, no, I..." "I've touched it." "I moved my eggs from here to here, you see?" "Hm." "Oh, sweetheart, it's been nearly a week." "Just talk to her." "You do recall my last conversation with Rapunzel didn't go quite as I had hoped?" "Uh, Fred, you confined her to the walls of Corona under martial law." "If that's a daddy-daughter conversation, I would hate to see what a talking-to is." "Just because it was a difficult choice, doesn't mean it wasn't the right one." "Come on, Cass!" "Those dreams are trying to tell me something!" " Ever since that night..." " Shh!" "Raps, I told you, we can't tell anyone about that night." "Um..." "I think the secret's pretty much out." "Yeah, yeah, everyone knows the hair's back, but if anyone knew I was the one who snuck you out when it happened," "I would be sent to a convent..." "Literally, a convent." "Well, I have to tell Eugene." "No, no, no, no, no." "As far as he knows, you just woke up that morning with long hair." "But Eugene is my boyfriend!" "We tell each other everything!" "I know this is a lot to ask, but I can't risk it." "Please, don't tell Eugene." "Tell Eugene what?" "Oh, come on, you guys keeping secrets?" "It's not really a secret, Eugene, it's more like a... sensitive situation." "Sensit..." "S..." "Ha!" "Sensitive?" "And you think Cassandra's gonna help?" "Blondie, I've met glaciers with more warmth and compassion." "And move faster, she's slow." "Rapunzel, it's me, Eugene." "Whatever's going on you can tell me." " I know I can, it's..." " Cassandra:" "I don't trust you!" "You have a big mouth!" "I do not!" "Name one time I blew a secret." "It's a scarf!" "Thanks, this was fun!" "And to think we were dreading it, right?" "Surprise!" "Oh, your surprise party is next week." "I said one time!" "Rapunzel, you're really not gonna tell me?" "I'm sorry." "Fine." "But you should know, I have things I keep from you." " Lots of things." " Name one." "Pete, the guard, is terrified of mimes." "Hey!" "They see things that aren't there!" "Pete, wait!" "No, it was a different Pete the guard." "You don't even know him." "Ahh!" "There they are!" "A veritable cornucopia of confidants, who trust me implicitly and would gladly divulge their innermost secrets." "Wait, who is this guy?" "That's Hook Hand's brother." "Oh, yeah?" "What's your name?" "Hook Foot?" "I gotta admit, I did not see that coming." " So, where is Hook Hand, anyway?" " There." "Eugene:" "Hook Hand went on a world tour?" "Does no one share anything with me?" "No feelings, no secrets, no news?" "Why won't anyone open up to me?" "Ahhh!" "Big Nose!" "Now there's a guy who knows how to share what's on his nose... mind!" "Here comes loverboy with more of his romantic "excapades."" "Hey, are those flowers for Assunta?" "Am I pronouncing that correctly?" "How is your lady friend, anyway?" "Oh, I'm glad you asked, but perhaps this latest poem I wrote will tell you." "I call it, "Can You Keep a Secret?" "I Love You."" ""Our love is like a timeless truth," ""It knows no tick nor tock." ""Our love is a big toe of honesty..."" "Big Nose: "poking through the hole of your favorite... sock."" "Cassandra:" "I was thinking about your hair." "Maybe there's a way we can discreetly try to get some answers, just the two of us." "I might know someone who can help." "I still think you're being unfair about Eugene." "But, um, who is this friend of yours?" "His name is Varian, and he's some kind of wizard." "Wow!" "A real wizard?" "Do you think he'll have one of those pointy hats, and, like, a robe and a staff and cast spells?" "No, I do not." "Very little is known about Varian, and what is, isn't good." "Some say he's dangerous." "But if we want answers, he's our best bet." "Right?" "Mm-hm." "Well, sounds like we have a wizard to visit." ""We keep no secrets, me and you," "Our love stays fresh like the morning... dew."" "You see, what I really tried to do is capture the oneness of our relationship." "Yep, oneness, got it." "Big Nose: 'Cause if you can't share everything with that someone special, then maybe that someone isn't so special." "Ha-ha!" "I gotta go." "This has been great." "You keep writin' those words down, 'cause one of these days..." "you'll have more of 'em." "Okay, bye, everybody!" "Good morning!" "Hey, Big Nose, what's goin' on with that lady that you have?" "Cassandra:" "So, this is where Varian lives." "It seems cozy, in a I-wish-I-had-said-goodbye- to-my-loved-ones- before-I-left kind of way." "Cassandra:" "Just watch your step, Raps." "Come on, this way." "It's just fog." "I'm sure it's okay." "Fine." "A booby trap!" "Raps, everything's gonna be... oh!" "What do you want?" "What are they doing?" "Um... hi." "So sorry to bother you, sir." "I... wanted to ask you about my hair." "Because you're such a magic exp..." "Magic?" "I do not work with magic." "I mean, technically, it's not magic." "It's alchemy, but... yeah..." "don't... don't sweat it." "Got it." "So, what is this?" "Oh, it's... it's a chemical compound of my own design." "Thank you." "See, we have a bit of a critter problem out here, and, through the miracle of modern alchemy," "I have found a humane way to solve the problem." "This is riveting, but could you get us out of here?" "Ha!" "Where is that neutralizing parti..." "Oh!" "C-Come... get outta here!" "I am so sorry, Your Highness." ""Your Highness"?" "Wait." "You know who I am?" "Uh, how could I not?" "Look at your hair!" "Ha!" "Your highness." "Oh, please." "Just Rapunzel." "Wow." "Really?" "Okay." "So, fantastical stories of your hair returning have spread throughout Corona." "Yeah, people say it's magic, but personally," "I don't really believe that." "Now, as you have probably guessed," "I am a man of science," " specifically, al..." " Alchemy." "We know." "Now listen, kid." "We need your help, but let me make something clear." "What happens here stays here, you got it?" "Oh, yes, this... this..." "Ah... is... it's very... long." "Oh, no, don't worry, Your High..." "Rapunzel." "I am sure that I, Varian, can unlock the mystery of your hair with the power of science!" "Ow!" "No sweat, it's just a little..." "What is taking 'em so long?" "I'm goin' in!" "Rapunzel: ♪ Bring back what once was mine ♪" "♪ What once was mine ♪" "Better?" "Oh, yeah..." "No!" "Huh... that used to work." "Well, silver lining:" "We've acquired some critical data about your hair." "It no longer possesses its legendary healing power." "Progress!" "Now let's figure out exactly what this hair is made of." "This machine can analyze any substance for chemical makeup, bitopic composition, and urgu-structural integrity." " I built it myself." " Nice!" "If I'm right, this should tell us all there is know" " about your hair." " Raps, are you sure you wanna..." " Rapunzel?" " Let's do this." "Okay!" "Rapunzel." "Now, um, this may get a little..." "Exciting?" "Um, sure!" "Yeah!" "That's a good word for it." "Whoa-kay!" "Whaaa!" "Whoa!" "Varian:" "And there we are!" "Done." "All right." "Not super fun, but it's over." "Ha!" "Oh, sorry." "Yeah, I..." "I meant done with the first test." "But don't worry, only 86 more to go!" "Blondie!" "Amazing!" "You were right, it's absolutely unbreakable!" "But I'm betting you're not!" "Let her go!" "Eugene!" "Hey!" "Blondie!" "You're okay!" "You wanna tell me what's goin' on here?" "You know what?" "I don't care." "I'm gettin' you outta there." "Hey!" "You're Flynn Rider!" "No." "You don't know what you're talking about." "I've never seen you before in my life." "You can't prove anything!" "I'm your biggest fan!" "See?" "Hey, now!" "Flynn Rider, nice to be met." "I used to see your wanted posters all the time!" "You're my hero!" "Oh, well, "hero" is a bit much." "I've read every single book about you!" "Oh... well, um, you see, that's not actually me." "I just took the name from the book." "Hey, hey!" "Remember the time you dueled that evil knight, blindfolded?" "No, no, not me." "Do you wanna put that down?" "This isn't right, Cassandra." "I have to tell him what's going on." "No." "Rapunzel, I want to trust you, and I trust that you trust Eugene, but I don't trust Eugene, and if I can't trust Eugene," "I can't trust you, and you're just going to have to trust me." "Trust me, that logic tracks." "Tell me about how you took on the Earl of Camembert!" "Also not me." "Would someone please explain to me who this child is?" "I'm Varian!" "Hot, hot, hot, hot!" "Oh, come on!" "What was that trembling?" "Trembling?" "I didn't notice any trembling." "Oh!" "Yeah!" "Almost forgot to get the spectrometric press!" "It's the only way I can read the results of the test!" "Flynn Rider!" "Wanna come with?" "Oooh!" "No." "Hey!" "If..." "If..." "If you come, I can show you something really special, but, um, you've got to keep it a secret." "You want to tell me a secret?" "Did you hear that, everyone?" " Varitas..." "V..." "Var..." " Varian!" "A complete stranger wants to tell me a secret!" "Listen, buddy, I need you to tell me everything that the princess told you." "Oh, yeah." "Well, okay, first, she said," ""We're looking for Varian," and then I said," ""I am Varian!"" "And then she said, "Uh, hi, sorry to bother you, sir, but I wanna ask you about my hair."" "Wait, oh, I'm sorry, let me back up." "I forgot to tell you about the raccoon trap." "So, there was..." "Yes, that's great, but what I meant is, tell me all the important stuff she said." "Mr. Rider, when the Princess of Corona speaks directly to you, every word is important." "I know that press is here somewhere, Flynn." "Again, it's Eugene." "Here it is!" "And, once the tests are done, it'll print the results on parchment paper..." "That's muy interesante, but getting back to what the princess said..." "Whoa, whoa!" "Why does that keep happening?" "Flynn Rider!" "I believe I promised you... a secret." "Now, if my dad knew I was down here, he'd kill me." "Of course, if he knew what I was actually doing down here, he'd probably be impressed, or at least I hope he'd be impressed." "These tunnels run through my entire village, which make them perfect for my project." "What project?" "This project." "I don't get it." "Through the miracle of alchemy... not magic..." "I have found a way to heat this entire tank of water with a single drop of my newest, yet to be named compound... which I'll call Flynnoelum!" " I still don't get it." " I'm gonna surprise my village by bringing the people hot, running water!" "I've constructed five of these babies all throughout the caverns." "Wait, wait, wait, wait, wait, wait, wait." "These... these tremors... your machines are causing them?" "No, no, no." "My machines are not causing them." "The chemical reactions they trigger do." "And no one else knows you're doing this?" "Okay, listen, kiddo." "I'm no expert in... whatever this is, but anything that can cause earthquakes cannot be safe." "We've gotta warn people about this." "No!" "We can't!" "Okay?" "You gave me your word you'd keep this a secret." "And besides, I am an expert, and this is all perfectly safe." "Yeah, it does..." "Does that all the time." "Only 12 more tests to go!" "Yaaaay!" "Team Awesome is ba-aaack!" "Now, Rapunzel, I know my tests have been a pain in the hm-hm." "Aw, I wouldn't say pain." "Y..." "Now I would." "In a moment, this little guy... he'll give us all the answers we want." "Woo-hoo!" "Answers!" "So, Eugene!" "Got yourself a secret, huh?" "If you wanna call it that." "The kid ha... uh-uh, nice try, Cass." "Look, Raps, I think it's time to go." "Now." "Now?" "You're kidding, right?" "This is almost finished." "Can we talk?" "Of course!" "That's what Team Awesome does..." "Those things down there are dangerous!" "Dangerous?" "No, they're not dangerous," "I..." "I have adjusted my calculations for every possible outcome." "The margin of error is..." "is less than .56 percent or... now, wait, was it .57?" "I don't know!" "Look, Varian." "I think you're a good kid, a... a... a smart kid, and you got great intentions." "But I'm asking you..." "pleading with you..." "For the love of my life, and your entire village, to please shut off those machines until a seisma-quake-atologist can come inspect 'em!" "Please!" "Do it for Team Awesome!" "Ohhhh!" "I suppose I can turn them down... a bit." "All right!" "Six more tests." "Then we can leave, right?" "Go someplace far away?" "Really, really far away." "Why do you want us to leave so bad?" "Oh, no, you can stay." "In fact, it'd be great if you stayed." "That way, when these things blow u..." "Oh, boy, never mind." "Whoa..." "Wait!" "What did you just say?" "Okay, Varian." "I..." "I guess it was .57." "Heh." "Eugene, what is wrong with you?" "Okay!" "You wanna know why we have to go?" "Oh, no... the Flynnoleum!" "Look, I tried to show you I could keep a secret, but I can't!" "This kid..." "Varian's got five of these huge, highly-pressurized underground machines, and they are clearly unstable." "I think they could blow up any minute!" " And that minute is now." " Get me out of this machine!" "Um, guys?" "Hurry!" "Give me your arm!" "Eugene!" "Varian!" "He's gonna get himself killed!" "Get her outta here!" "I'll get the kid." "Rapunzel:" "It's over!" "I need those results!" "No!" "Whoa!" "Listen, kid!" "We gotta get outta here!" "No, no!" "No, I've got three pumps to shut off, and I can't let this happen again!" "Look out!" "No, there's no time!" "Get out of here!" "I am not going anywhere without you." "I love you, Rapunzel." "I love you, too." "More than you will ever know." "What the hair?" "Thank you, m'lady." "Varian!" "Man:" "Varian!" "Quirin!" "Thank goodness you're here!" "Uh-oh." "It's my dad." "Are you okay?" "What happened?" "Dad, I'm sorry." "Not again, Varian." " But, Dad..." " Is everybody okay?" "Quirin, what do we do?" "It was terrible." "I'm sorry you didn't get those test results, Blondie." "I should never have kept a secret from you." "From now on, no more secrets." "Ever." "Oh, yeah?" "Well, what about Cassandra?" "That's... between her and me." "Okay." "The truth?" "You know how I said I just woke up with my hair long?" "Well, I didn't." "The night before, Cass kinda helped me break out of Corona." "Ohhh, I knew it!" "She's gonna get in so much trouble!" "That is, of course, if anyone were to find out, which they won't, because this guy is a vault." "You should have seen it, it was a crazy night." "She showed me these black rocks, and I know it sounds so weird, but I think they're what made my hair grow back." "Eugene:" "Hey, after today, nothing sounds weird." "Rapunzel:" "And then when I touched the rocks, they started chasing us." "Eugene:" "Rocks chasing you?" "Now we're back to weird." "Rapunzel:" "Yeah, well..." "Max was there, and once we got far enough away from them, they stopped growing." "Synchronized by srjanapala" "♪ Now I got my eyes opening wider ♪" "♪ My heart burning like fire ♪" "♪ Feels like I'm so alive I'm never going back ♪" "♪ Whatever I want now I'm gonna chase it ♪" "♪ Who I am I can't contain it ♪" "♪ I'm not gonna hold it in ♪" "♪ 'Cause there's more of me to give ♪" " ♪ Oh, Oh ♪ - ♪ Oh, yeah ♪" "♪ There's more of me to give ♪"
Neurodegenerative diseases and oxidative stress. Oxidative stress is now recognized as accountable for redox regulation involving reactive oxygen species (ROS) and reactive nitrogen species (RNS). Its role is pivotal for the modulation of critical cellular functions, notably for neurons astrocytes and microglia, such as apoptosis program activation, and ion transport, calcium mobilization, involved in excitotoxicity. Excitotoxicity and apoptosis are the two main causes of neuronal death. The role of mitochondria in apoptosis is crucial. Multiple apoptotic pathways emanate from the mitochondria. The respiratory chain of mitochondria that by oxidative phosphorylation, is the fount of cellular energy, i.e. ATP synthesis, is responsible for most of ROS and notably the first produced, superoxide anion (O(2)(;-)). Mitochondrial dysfunction, i.e. cell energy impairment, apoptosis and overproduction of ROS, is a final common pathogenic mechanism in aging and in neurodegenerative disease such as Alzheimer's disease (AD), Parkinson's disease (PD) and amyotrophic lateral sclerosis (ALS). Nitric oxide (NO(;)), an RNS, which can be produced by three isoforms of NO-synthase in brain, plays a prominent role. The research on the genetics of inherited forms notably ALS, AD, PD, has improved our understanding of the pathobiology of the sporadic forms of neurodegenerative diseases or of aging of the brain. ROS and RNS, i.e. oxidative stress, are not the origin of neuronal death. The cascade of events that leads to neurons, death is complex. In addition to mitochondrial dysfunction (apoptosis), excitotoxicity, oxidative stress (inflammation), the mechanisms from gene to disease involve also protein misfolding leading to aggregates and proteasome dysfunction on ubiquinited material.
1. Field of the Invention The present invention relates to an armrest locking device, and more particularly, to an armrest locking device having no risk of unintentional unlocking upon a car crash. 2. Description of the Related Art In accordance with a regulation of Korean safety standards related to interior compartment doors of automobiles, a locking device for an automobile interior receiving structure, for example, an armrest locking device, has to be designed so as not to be opened upon a car crash. To fulfill the above regulation, there has been suggested in the prior art that a button spring as one component of the locking device has a high strength sufficient to overcome an inertia moment produced by weights of a push button and a hook. However, using the high-strength button spring makes for a user to press the push button with a great force even in a normal use situation and therefore, may result in a degradation in the convenience of passengers and the merchantability of automobiles. FIG. 1 is a sectional view illustrating the configuration of a conventional armrest locking device, and FIG. 2 is a sectional view illustrating a state in which a push button of the conventional armrest locking device is retracted by a rear crash shock. As shown, the conventional armrest locking device includes an armrest body 10 defining a receiving space therein, an armrest cover 20 for opening and closing the armrest body 10, a push button 30 for regulating locking and unlocking of the armrest cover 20, a hook member 35 configured to move along with the push button 30, and an elastic member 32 for supporting the push button 30. The armrest cover 20 is coupled to the armrest body 10 by use of a hinge 22, to have a pivotally rotatable structure. The push button 30 is disposed at a front surface of the armrest cover 20 such that the push button 30 is retractable by manual operation of a user. The push button 30 is able to be returned to an original position thereof by a restoration force of the elastic member 32. If the push button 30 is pressed, the hook member 35 is pushed rearward of the armrest body 10 as the elastic member 32 is constricted, resulting in unlocking of the armrest locking device. With this configuration, it will be appreciated that the higher the strength of the elastic member 32, a greater force should be applied to press the push button 30, whereas the lower the strength of the elastic member 32, the push button 30 is able to be easily pressed even by a smaller force. Meanwhile, interior compartment doors of an automobile have a regulation in that the doors should not be opened upon a car crash. In particular, a rear car crash is problematic. As shown in FIG. 2, if an automobile has a rear crash, the push button 30 is pushed rearward by an inertia force. However, if the push button 30 is pushed rearward beyond a predetermined distance upon receiving a crash shock, the armrest locking device may experience an unintentional unlocking and therefore, have a difficulty to fulfill the above described safety regulation. Accordingly, there has been conventionally suggested to provide the elastic member 32 with a high strength, so as to prevent the push button 30 from being unintentionally pushed rearward. However, the elastic member 32 having the high strength makes for a user to apply a great force to the push button 30 for opening of an armrest and this is undesirable in the viewpoints of the operating performance of the armrest locking device and the convenience of use.
The Fine Print Full Details Don’t ever let it be said that we at Wowcher don’t like to shower you with indulgent home accessory deals. To prove it we have another one for you. We’re offering a truly luxurious premium quality 500gsm Egyptian combed cotton towel set in your choice of 11 fab colours, for just £25.99 with delivery included - saving you 61% off United Home Stores’ regular price of £67 (correct as of 6.2.14). This gorgeous set consist of two 30x30-cm face cloths; two 50x85-cm hand towels; two 70x125-cm bath towels and one 96x145-cm bath sheet – all made from luxurious 500gsm Egyptian combed cotton for a seriously fluffy post-bath or shower treat. Plus, whatever your bathroom interior décor scheme, there’s a shade to suit you. Choose from the following colours: aqua, black, charcoal, chocolate, ivory, latte, red, rust, sky blue, stone or white. If these thick, top-quality towels appeal to both your indulgent side and your bank balance we suggest cleaning up and hitting the BUY button - before we’re forced to say “That’s a wrap” on today’s deal.
option(NATIVE "Compile natively for this CPU" OFF) option(MINIMAL "Compile small executable" OFF) option(EASTL "Compile with EASTL C++ library" OFF) option(LTO_ENABLE "Enable LTO (Clang-only)" OFF) option(STACK_PROTECTOR "Enable stack protector (SSP)" ON) option(UBSAN "Enable the undefined sanitizer" OFF) option(STRIPPED "Strip the executable" OFF) option(DEBUG "Build and preserve debugging information" OFF) option(RTTI_EXCEPTIONS "Enable C++ RTTI and exceptions" OFF) option(BUILD_32 "Build a 32-bit kernel" OFF) set(CPP_VERSION "c++17" CACHE STRING "C++ version compiler argument") set(C_VERSION "gnu11" CACHE STRING "C version compiler argument") set(LINKER_EXE "ld" CACHE STRING "Linker to use") if (BUILD_32) set(ELF_FORMAT "i386") set(CMAKE_ASM_NASM_OBJECT_FORMAT "elf32") set(OBJCOPY_TARGET "elf32-x86-32") set(TARGET_TRIPLE "i686-pc-linux") set(CAPABS "-m32") else() set(ELF_FORMAT "x86_64") set(CMAKE_ASM_NASM_OBJECT_FORMAT "elf64") set(OBJCOPY_TARGET "elf64-x86-64") set(TARGET_TRIPLE "x86_64-pc-linux") set(CAPABS "-m64 -fno-omit-frame-pointer -fPIE") endif() enable_language(ASM_NASM) set(CAPABS "${CAPABS} -Wall -Wextra -g -ffreestanding") # Optimization flags set(OPTIMIZE "-mfpmath=sse -msse3") if (NATIVE) set(OPTIMIZE "${OPTIMIZE} -Ofast -march=native") elseif (MINIMAL) if ("${CMAKE_CXX_COMPILER_ID}" STREQUAL "Clang") set(OPTIMIZE "${OPTIMIZE} -Oz") else() set(OPTIMIZE "${OPTIMIZE} -Os -ffunction-sections -fdata-sections") endif() endif() set(CMAKE_CXX_FLAGS "-MMD ${CAPABS} ${OPTIMIZE} -std=${CPP_VERSION}") set(CMAKE_C_FLAGS "-MMD ${CAPABS} ${OPTIMIZE} -std=${C_VERSION}") if (LTO_ENABLE) if ("${CMAKE_CXX_COMPILER_ID}" STREQUAL "Clang") set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -flto=thin") set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -flto=thin") else() set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -flto") set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -flto") endif() # BUG: workaround for LTO bug set(KERNEL_LIBRARY --whole-archive kernel --no-whole-archive -gc-sections) else() set(KERNEL_LIBRARY kernel) endif() if (NOT RTTI_EXCEPTIONS) set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fno-exceptions -fno-rtti") endif() if ("${CMAKE_CXX_COMPILER_ID}" STREQUAL "Clang") set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -target ${TARGET_TRIPLE}") set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -target ${TARGET_TRIPLE}") endif() # Sanitizer options if (UBSAN) set(UBSAN_PARAMS "-fsanitize=undefined -fno-sanitize=vptr -DUBSAN_ENABLED") set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} ${UBSAN_PARAMS}") set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} ${UBSAN_PARAMS}") if ("${CMAKE_CXX_COMPILER_ID}" STREQUAL "Clang") set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fno-sanitize=function") set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fno-sanitize=function") endif() endif() if (STACK_PROTECTOR) set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fstack-protector-strong") set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fstack-protector-strong") endif() # linker stuff set(CMAKE_LINKER ${LINKER_EXE}) set(CMAKE_SHARED_LIBRARY_LINK_CXX_FLAGS) # this removed -rdynamic from linker output set(CMAKE_CXX_LINK_EXECUTABLE "<CMAKE_LINKER> -o <TARGET> <LINK_FLAGS> <OBJECTS> <LINK_LIBRARIES>") set(BBPATH ${CMAKE_CURRENT_LIST_DIR}) # linker arguments string(RANDOM LENGTH 16 ALPHABET 0123456789abcdef SSP_VALUE) set(LDSCRIPT "${BBPATH}/src/linker.ld") set(LDFLAGS "-static -nostdlib -N -melf_${ELF_FORMAT} --script=${LDSCRIPT} --defsym __SSP__=0x${SSP_VALUE}") if (NOT DEBUG AND STRIPPED) set(LDFLAGS "${LDFLAGS} -s") elseif (NOT DEBUG) set(LDFLAGS "${LDFLAGS} -S") endif() if (MINIMAL) set(LDFLAGS "${LDFLAGS} --gc-sections") endif() # Compiler, C and C++ libraries include(ExternalProject) ExternalProject_Add(exceptions PREFIX exceptions URL https://github.com/fwsGonzo/barebones/releases/download/exceptions/exceptions.zip URL_HASH SHA1=8851485a7134eb8743069439235c1a2a9728ea58 CONFIGURE_COMMAND "" BUILD_COMMAND "" UPDATE_COMMAND "" INSTALL_COMMAND "" ) # gcc-9 --print-file-name libgcc.a if (BUILD_32) execute_process(COMMAND ${CMAKE_C_COMPILER} -m32 --print-file-name libgcc_eh.a OUTPUT_VARIABLE LIBGCC_ARCHIVE OUTPUT_STRIP_TRAILING_WHITESPACE) else() execute_process(COMMAND ${CMAKE_C_COMPILER} -m64 --print-file-name libgcc_eh.a OUTPUT_VARIABLE LIBGCC_ARCHIVE OUTPUT_STRIP_TRAILING_WHITESPACE) endif() add_library(libgcc STATIC IMPORTED) set_target_properties(libgcc PROPERTIES LINKER_LANGUAGE CXX) if (EXISTS ${LIBGCC_ARCHIVE}) set_target_properties(libgcc PROPERTIES IMPORTED_LOCATION ${LIBGCC_ARCHIVE}) else() # Use this if you don't have a compatible libgcc_eh.a in your system: set_target_properties(libgcc PROPERTIES IMPORTED_LOCATION exceptions/src/exceptions/libgcc.a) endif() add_dependencies(libgcc exceptions) if (RTTI_EXCEPTIONS) add_library(cxxabi STATIC IMPORTED) set_target_properties(cxxabi PROPERTIES LINKER_LANGUAGE CXX) set_target_properties(cxxabi PROPERTIES IMPORTED_LOCATION exceptions/src/exceptions/libc++abi.a) add_dependencies(cxxabi exceptions) # Add --eh-frame-hdr for exception tables set(LDFLAGS "${LDFLAGS} --eh-frame-hdr") set(CXX_ABI_LIBS cxxabi) endif() # Machine image creation function(add_machine_image NAME BINARY_NAME BINARY_DESC) add_executable(${NAME} ${ARGN}) set_target_properties(${NAME} PROPERTIES OUTPUT_NAME ${BINARY_NAME}) target_include_directories(${NAME} PRIVATE src) target_compile_definitions(${NAME} PRIVATE KERNEL_BINARY="${BINARY_NAME}") target_compile_definitions(${NAME} PRIVATE KERNEL_DESC="${BINARY_DESC}") add_subdirectory(${BBPATH}/ext ext) if (EASTL) target_link_libraries(${NAME} eastl) endif() add_subdirectory(${BBPATH}/src src) target_link_libraries(${NAME} # BUG: unfortunately, there is an LLD bug that prevents ASM objects # from linking with outside files that are in archives, unless they are # --whole-archived, which sort of defeats the purpose of LTO ${KERNEL_LIBRARY} tinyprintf ${CXX_ABI_LIBS} libgcc kernel ) set_target_properties(${NAME} PROPERTIES LINK_FLAGS "${LDFLAGS}") # write out the binary name to a known file to simplify some scripts file(WRITE ${CMAKE_BINARY_DIR}/binary.txt ${BINARY_NAME}) endfunction() function(create_payload LIB_NAME BLOB_FILE BLOB_NAME) # call objcopy with curated filename, and then # create a static library LIB_NAME with payload set(OBJECT_FILE ${BLOB_NAME}_generated.o) add_custom_command( OUTPUT ${OBJECT_FILE} # temporarily name blob file as BLOB_NAME so that we can better control # the symbols generated on the inside of the kernel COMMAND cp ${BLOB_FILE} ${BLOB_NAME} COMMAND ${CMAKE_OBJCOPY} -I binary -O ${OBJCOPY_TARGET} -B i386 ${BLOB_NAME} ${OBJECT_FILE} COMMAND rm -f ${BLOB_NAME} DEPENDS ${BLOB_FILE} WORKING_DIRECTORY ${CMAKE_CURRENT_BINARY_DIR} ) add_library(${LIB_NAME} STATIC ${OBJECT_FILE}) set_target_properties(${LIB_NAME} PROPERTIES LINKER_LANGUAGE C) endfunction() function (add_machine_payload TARGET LIB_NAME BLOB_FILE BLOB_NAME) create_payload(${LIB_NAME} ${BLOB_FILE} ${BLOB_NAME}) target_link_libraries(${TARGET} --whole-archive mylib_payload --no-whole-archive) endfunction()
Introduction ============ Aging is usually defined as the progressive loss of function accompanied by decreasing fertility and increasing mortality with advancing age ([@b27]). Lifespan regulation is evolutionarily conserved, and found in various species ranging from eukaryotic multicellular (e.g. humans) to unicellular (e.g. yeast), and to prokaryotic (e.g. *Escherichia coli*) organisms ([@b52]). In unicellular species, cellular aging and organismal aging coincide. Previous studies in several model organisms have described many aging-related phenotypes, including morphological changes, accumulation of oxidatively damaged DNA and proteins, shortened telomeres, enriched extra-chromosomal rDNA circles (ERCs), etc. (reviewed in [@b43]; [@b2]; [@b26]; [@b33]). Nowadays, the elucidation of the molecular mechanism(s) in aging is of great interest to biologist. The budding yeast *Saccharomyces cerevisiae*, which divides asymmetrically, is a unicellular eukaryotic organism with a short and easily studied lifespan, and enables researchers to chase an individual cell through many cell divisions. The yeast cells undergo a limited number of cell divisions before senescence, and small budding daughter cells come from the larger aging mother cells in most of the lifespan. The total number of daughter cells produced by a mother cell prior to senescence is defined as the replicative lifespan of the mother cell ([@b36]). Aging in yeasts *S. cerevisiae* and *Schizosaccharomyces pombe* has also been measured as the length of time a population stay alive; it is referred to as chronological aging ([@b11]; [@b41]). Recent studies reveal that some of the molecular mechanisms of aging existing in higher eukaryotes have also been unraveled in *S. cerevisiae*. For example, the human WRN helicase defect causes the premature aging Werner syndrome ([@b10]), while mutation of Sgs1 helicase, the WRN homolog in yeast, causes the shortening of replicative lifespan ([@b45]). Calorie restriction, which significantly promotes longevity in various organisms including worms, flies, fish and mammals, also lengthens yeast lifespan ([@b54]; [@b18]; [@b31]; [@b28]). Deletion of Sir2 histone deacetylase decreases the replicative longevity of yeast, whereas an extra copy of *SIR2* integrated into the genome results in longer replicative lifespan ([@b20]). Similarly, increasing the dosage of Sir2.1 in *Caenorhabditis elegans* (the homologue of yeast Sir2) or *Drosaphila* Sir2 extends lifespan ([@b53]; [@b40]). So far, the mechanism by which Sir2 regulates lifespan is not well understood. *Saccharomyces* Sir2 has been shown to act at blocked replication forks in the rDNA to prevent DNA breaks, homologous recombination and ERC formation in a Fob1-mediated pathway ([@b20]). Therefore, it is suggested that ERCs are a cause of yeast aging ([@b44]), and Sir2 plays a specific role in promoting longevity. Since the budding yeast *S. cerevisiae* has been developed as an advantageous model of aging research, the development of techniques for large-scale isolation of old cells is extremely required in any biochemical or high-throughput analysis. As this problem is of major interest, several methods have been established in *S. cerevisiae* for obtaining large quantities of old cells ([@b37]), including yeast 'baby machine' ([@b16]), centrifugation elutriation ([@b57]), sucrose gradient centrifugation ([@b9]), fluorescence-activated cell sorting ([@b47]) and magnetic sorting ([@b48]). However, these approaches seem costly and laborious because (i) the mother and daughter cells are similar in shape; (ii) the proportion of old cells in any growing culture of logarithmic phase is miniscule ([@b37]); (iii) as *S. cerevisiae* yeast mother cells grow old, they enlarge and tend to produce large and short-lived daughter cells ([@b23]), and at last several divisions, daughter and mother cells are usually indistinguishable in size and can hardly separate from each other ([@b24]). Hence, we are encouraged to develop another model, *Candida albicans*, for aging study. *Candida albicans*, which diverges from *S. cerevisiae* over 140 million years ago ([@b3]), has been evolved to be a polymorphic fungus and exists as a commensal of warm-blooded animals including humans. It can grow in different ways: proliferating in yeast form and forming filamentous hyphal cells that can give birth to new mycelia or yeast form (ellipsoidal or blastospore) daughters ([@b35]). The growth form can be controlled by changing culture conditions including temperature, pH and nutrient composition ([@b49]). *C. albicans* usually exists as a diploid and parasexual organism, which is different from *S. cerevisiae*. As these interesting features are concerned, we anticipated to establish *C. albicans* as a new aging model complementary to *S. cerevisiae* and *S. pombe*. The complete genome sequencing has revealed that many *C. albicans* open reading frames have obvious *S. cerevisiae* homologs and the well-established tools for molecular-genetic manipulations make it feasible to set up *C. albicans* as a model organism. In the current study, we observed that *C. albicans* cells, like *S. cerevisiae* ones, have a finite lifespan. We have established a method to prepare a large number of old cells, facilitating the high-throughput analysis of cellular aging in *C. albicans*. We also characterized the old cells and found out that glycogen and oxidatively damaged proteins accumulate during the replicative aging of *C. albicans*. In addition, Sir2 regulates *Candida* lifespan in a dose-dependent manner, but the extra-chromosomal rDNA molecules show no obvious correlations with Sir2 dosage, suggesting that unlike in *S. cerevisiae*, extra-chromosomal rDNA molecules may not be the marker of aging in *C. albicans*. Results ======= Both yeast and hyphal form of *C. albicans* cells have finite lifespan ---------------------------------------------------------------------- *Candida albicans* is a prevalent opportunistic fungal pathogen in humans, and can grow in budding form or filamentous form ([Fig. 1A](#fig01){ref-type="fig"}). Like *S. cerevisiae*, *C. albicans* cells of yeast form propagate by budding at 30 °C ([Fig. 1A](#fig01){ref-type="fig"}, left panel). In response to serum at 37--40 °C, the yeast form cells can be induced to filamentous hyphae that usually contain a few cells in tandem ([Fig. 1A](#fig01){ref-type="fig"}, middle panel). The filamentous hyphal cells can also give rise to yeast form daughters when they are grown at 30 °C in the absence of serum ([Fig. 1A](#fig01){ref-type="fig"}, right panel) ([@b35]). ![Both yeast and hyphal form cells share similar replicative lifespan. (A) Different forms of *Candida albicans*. Left panel, *C. albicans* cells of yeast form cultured at 30 °C in YPD; middle panel, *C. albicans* cells of hyphal form induced by serum at 37 °C; right panel, yeast daughter cells produced by hyphal mother cells at 30 °C in the absence of serum. Photos were taken with a Zeiss Axioplan 2 microscope. (B) Lifespan analysis of yeast and hyphal cells. Mean lifespan and sample size are: yeast form 21.3 (*n* = 48), and hyphal form 19.3 (*n* = 54).](ace0007-0746-f1){#fig01} To find out whether *C. albicans* cells have finite lifespan, we performed replicative lifespan assay of both yeast and hyphal form cells. Since yeast cells produce daughters by budding, we analyzed their replicative lifespan as described in *S. cerevisiae* ([@b22]). Wild-type cells of SC5314 strain have a mean lifespan of 19--23 generations ([Fig. 1B](#fig01){ref-type="fig"} and [Fig. S4](#SD1){ref-type="supplementary-material"}). To measure the lifespan of hyphal cells, we induced the growth of hyphal mothers containing four to six single cells in tandem that can produce yeast daughters ([Fig. 2A](#fig02){ref-type="fig"}). The total daughters produced by a hyphal mother were counted. The ratio of the total daughter number to the cell number of a hyphal mother represents the replicative lifespan of a single hypha cell. [Figure 1B](#fig01){ref-type="fig"} shows that hyphal form cells share similar replicative lifespan with yeast form cells, indicating the morphological change does not affect the lifespan. These results also demonstrate that both yeast and hyphal form cells have finite replicative lifespan. Our data suggest that *C. albicans* could be used as a model to study cellular aging. ![Large-scale separation of old and young cells. (A) Most of the hyphae induced under the experimental conditions contain four to six single hyphal cells. Left panel, cells stained by Calcofluor and photographed under microscope; right panel, statistical results. (B) Schematic procedures for large-scale preparation of old cells. (C) Morphological differences between old and young cells. Photos were taken with a Zeiss Axioplan 2 microscope using 10 × 100 magnification. (D) Lifespan analysis of hyphal cells separated at the time points of 0 h, 38 h, 75 h and 114 h, respectively. Mean lifespan and sample size are: 22.9 (*n* = 76), 13.1 (*n* = 76), 8.4 (*n* = 74) and 5.4 (*n* = 56), respectively.](ace0007-0746-f2){#fig02} Dramatic morphological difference facilitates large-scale preparation of replicatively old cells ------------------------------------------------------------------------------------------------ Biochemical investigation of the age-associated changes often requires a large-scale preparation of sufficiently pure and terminally senescent cells. However, old cells only account for a negligible fraction of a logarithmic growing culture. The isolation of replicatively aged cells has proved to be one of the most difficult tasks in yeast aging research. Since the hyphal cells of *C. albicans* can produce yeast form daughters, we thought that the dramatic difference in size between hyphal and yeast cells provided an opportunity to feasibly separate the old cells from their progenies. With this in mind, we established a method that allows separation of hyphal and yeast form cells based on sucrose gradient centrifugation. The separation efficiency was determined by the percentage of hyphal cells in the population. Most of the hyphae in our culturing system have four to six hyphal cells and one original yeast cell ([Fig. 2A](#fig02){ref-type="fig"}). Hyphal cells account for ∼80% of the population after separation, so we think the separation is efficient enough. The separated hyphal cells are shown in [Fig. S1](#SD1){ref-type="supplementary-material"}. To separate the old hyphal mothers from their yeast daughters and study the aging associated phenotypes in *C. albicans*, we designed a procedure to obtain certain amount of old mother cells, schematically shown in [Fig. 2B](#fig02){ref-type="fig"}. Briefly, yeast form cells were incubated at 30 °C overnight, and hyphal cells were induced at 37 °C in the presence of serum for about 5 h. The hyphal cells in this culture should be at various replicative ages. The purified hyphae were then shifted back to YPD medium (1% yeast extract, 2% peptone, 2% glucose) to produce yeast cells at 30 °C for about 2.5 h. The relatively short time of culture ensured that the newborn yeast cells experienced no more than two cell divisions and could be regarded as young cells. These 'synchronized' young yeast cells were isolated from the culture by sucrose gradient centrifugation and then used to generate young hyphal mothers. When the hyphal mothers were cultured at 30 °C, they produced yeast form daughters and became older and older with prolonged culture time. Therefore, the hyphal cells are old cells and separated from yeast cells by sucrose gradient centrifugation ([Fig. 2B](#fig02){ref-type="fig"}). In this experiment, there are rare opportunities of young yeast daughter contamination in old hyphal mothers due to the dramatic size difference between hyphal and yeast form cells. In order to verify the separation strategy, we measured the replicative lifespan of the hyphal mothers separated at various time points (0 h, 38 h, 75 h and 114 h). As shown in [Fig. 2D](#fig02){ref-type="fig"}, the lifespan of the hyphal cells decreases along with growing old and the division capacity of the oldest cells is diminished largely, indicating that the hyphal mothers age gradually after they continuously give birth to yeast daughters, and the oldest cells we obtained are presumably not far from replicative senescence. In the following sections ([Figs 3 and 5](#fig03){ref-type="fig"}), we used the cell samples prepared at the same four time points. The old cells can also be distinguished from the young cells morphologically: hyphae are enlarged and broken into single cells ([Fig. 2C](#fig02){ref-type="fig"}). The procedures described here offer an opportunity to prepare old cells of different replicative ages in large-scale and examine the progressive changes associated with cellular aging. ![Accumulation of glycogen and oxidatively damaged proteins during *Candida* aging. (A) Examination and quantification of glycogen level by iodine staining. Error bars represent standard deviations of triple determinations. (B) Analysis of protein oxidation by anti-DNP immunoblotting. Total proteins were quantified by Bradford before loading. Tubulin served as an internal control.](ace0007-0746-f3){#fig03} Glycogen and oxidatively damaged proteins accumulate during replicative aging of *C. albicans* ---------------------------------------------------------------------------------------------- Glycogen accumulation has been described as a marker of aging, and reported in *S. cerevisiae* ([@b32]). Genomics study has also suggested that genes involved in gluconeogenesis and glycogen production are induced in old cells ([@b29]). We analyzed the glycogen level in *C. albicans* hyphal cells of different replicative ages, and the results showed that glycogen level increased during the aging period ([Fig. 3A](#fig03){ref-type="fig"}). The accumulation of glycogen in old cells may reflect a turnover of carbohydrates catabolism and energy metabolism. It is increasingly evident that the oxidative modification of cellular components, including oxidation of proteins, lipids and nucleic acids, is another apparent phenotype in old cells over many species ([@b51]). To characterize the old *C. albicans* cells, we examined the overall oxidation of proteins according to the methods reported by Levine *et al*. ([@b30]; [@b5]). The carbonyl groups (aldehydes and ketones) are introduced into oxidatively modified proteins irreversibly ([@b50]). Based on the reaction of carbonyl groups with 2,4-dinitrophenylhydrazine to form a 2,4-dinitrophenylhydrazone, we could immunodetect protein carbonylation using antibodies to the 2,4-dinitrophenyl moiety ([@b30]). [Figure 3B](#fig03){ref-type="fig"} shows that the level of carbonylated proteins was increasing remarkably as cells age, and the level of tubulin served as an internal control. These data demonstrate that oxidatively damaged proteins accumulate during replicative aging of *C. albicans*. Our results are consistent with the work in *S. cerevisiae* reported previously ([@b1]; [@b39]; [@b14]). It has been postulated that the age-related accumulation of oxidized proteins is a complex process that may integrate increases of reactive oxygen species generation rates, decreases in antioxidant activities or losses in the capacity to degrade oxidized proteins ([@b51]). In addition to glycogen and oxidatively damaged proteins that accumulate in old *C. albicans* cells, we also examined telomere length and chromosome integrity by Southern blot and pulsed field gel electrophoresis (PFGE), respectively. No obvious differences between young and old cells have been observed ([Figs S2](#SD1){ref-type="supplementary-material"} and [S3](#SD3){ref-type="supplementary-material"}). Lower glucose concentration delays cellular aging in *C. albicans* ------------------------------------------------------------------ Calorie restriction extends lifespan in a variety of species and has been proved a general mechanism to enhance longevity ([@b54]; [@b34]). In the yeast form cells of *C. albicans*, we examined the effect of low glucose concentration ([@b31]; [@b21]) on replicative lifespan. Cells grown in the presence of 0.1% glucose exhibited a longer lifespan in both SC5314 and BWP17 strains ([Fig. 4A](#fig04){ref-type="fig"}). Although the increase of lifespan in strain SC5314 seems weaker than that in strain BWP17 or *S. cerevisiae*, the calorie-restriction effect in strain SC5314 is significant because the *p*-value is less than 0.05. These data indicate that like in other species, calorie restriction extends lifespan in *C. albicans*. Notably, the two wild-type strains, SC5314 and BWP17, exhibited different lifespan: SC5314 is short-lived, while BWP17 is long-lived ([Fig. S4](#SD1){ref-type="supplementary-material"}). The divergence may be resulted from their different genetic background. ![Characterization of *SIR2* function in *Candida* aging. (A) Lower glucose concentration lengthens the lifespan of *C. albicans*. Left panel, strain SC5314; right panel, strain BWP17. Mean lifespan and sample size of SC5314: 2% glucose 19.1 (*n* = 54), 0.1% glucose 23.7 (*n* = 60); BWP17: 2% glucose 28.0 (*n* = 50), 0.1% glucose 36.8 (*n* = 50). (B) Left panel, deletion of one copy of *SGS1* causes a shortened lifespan. Mean lifespan and sample size are: BWP17 (wild-type) 28.1 (*n* = 72), *sgs1Δ/SGS1* 12.6 (*n* = 67). Middle panel, reduced dosage of Sir2 decreases lifespan. Mean lifespan and sample size are: BWP17 (wild-type) 27.4 (*n* = 60), *sir2Δ/SIR2* 18.2 (*n* = 60), *sir2Δ/sir2Δ* 11.9 (*n* = 60). Right panel, insertion of an extra copy of *SIR2* results in lifespan extension. Mean lifespan and sample size are: BWP17 (vector) 22.4 (*n* = 60), *SIR2/ADE2* 27.8 (*n* = 60). (C) Haplo-insufficiency of *SIR2* causes a reduction of rDNA silence. Cells from logarithmic culture were 10-fold serially diluted, spotted onto plates, incubated at 30 °C for 2 days and photographed. The isogenic strains were labeled on the left. Left panel, cells grown on YC plate; right panel, cells grown on YC+5-FOA plate. BWP17 UR represents the strain with a *URA3* gene inserted in rDNA loci. (D) Detection of extra-chromosomal rDNA molecules using pulsed field gel electrophoresis. Left panel, ethidium bromide staining of the PFGE gel; middle panel, Southern blot examination with an rDNA probe. The isogenic strains were labeled on the top and each lane represents an independent clone of the corresponding strain. Marker, Low Range PFG marker (New England BioLabs); *Saccharomyces cerevisiae* (strain BY4742) chromosomes are used as another marker. Arrows indicate the extra-chromosomal rDNA molecules. Right panel shows the quantification of extra-chromosomal rDNA molecules (ERMs). The relative amount of ERMs in BWP17 strain was assigned a value of 1. Error bars represent standard deviations of two independent clones.](ace0007-0746-f4){#fig04} Replicative lifespan of *C. albicans* correlates with the dosage of Sir2 ------------------------------------------------------------------------ It is known that the human Werner syndrome is caused by a defect in WRN helicase. Mutation of Sgs1 helicase, the WRN homolog, which is involved in DNA metabolism, causes the shortening of yeast lifespan ([@b45]). In order to study a *Candida* counterpart of the *SGS1* gene, we deleted one copy of *SGS1* in *C. albicans*, and measured the replicative lifespan of the mutant cells. The shortened lifespan of the *sgs1Δ/SGS1* heterozygote reveals a haplo-insufficiency, indicating that as in *S. cerevisiae*, Sgs1 is required for the regular lifespan of *C. albicans* ([Fig. 4B](#fig04){ref-type="fig"}, left panel). Previous studies in *S. cerevisiae* demonstrate that Fob1/Sir2 pathway is involved in regulating cellular aging via affecting ERCs ([@b44]; [@b20]). *sir2Δ* mutant exhibits shorter lifespan, whereas an extra copy of *SIR2* integrated into the genome results in longer lifespan ([@b20]). The deletion of *FOB1*, a gene required for blocking rDNA replication, suppresses rDNA recombination and ERC formation, extends lifespan in wild-type cells, and restores lifespan in *sir2* mutant cells ([@b8]). Despite the fact that the Fob1 homolog in *C. albicans* has not been identified, the Sir2 homologue in *C. albicans* has been reported to be essential for the maintenance of chromosome stability ([@b38]). We suspected that Sir2 also affects *Candida* longevity. Because *C. albicans* always lives as a diploid, we examined the lifespan of *sir2Δ/SIR2* and *sir2Δ/sir2Δ* cells. Like *S. cerevisiae*, the reduced dosage of Sir2 resulted in a decrease of replicative lifespan ([Fig. 4B](#fig04){ref-type="fig"}, middle panel) ([@b20]). When an extra copy of *SIR2* was integrated into the genome at the *ADE2* locus, the lifespan increased compared with the insertion of the empty vector ([Fig. 4B](#fig04){ref-type="fig"}, right panel), suggesting that a conserved Sir2 pathway that regulates cellular aging exists in *C. albicans*. It is not clear why the introduction of a control empty vector at *ADE2* locus in BWP17 shortened its lifespan ([Fig. S4A](#SD1){ref-type="supplementary-material"}). One possible explanation is that the disruption of *ADE2* has a negative role on replicative lifespan. Extra-chromosomal rDNA molecules do not increase in *sir2Δ* mutants of *C. albicans* ------------------------------------------------------------------------------------ Sir2 in *S. cerevisiae* has been indicated to affect the recombination of rDNA to regulate cell longevity ([@b15]). Homologous recombination between adjacent rDNA repeats which locate on chromosome XII results in the formation of ERCs. Sir2 is essential for the silenced chromatin formation in rDNA loci ([@b4]). In *C. albicans*, the rDNA units are clustered as tandem repeats on both chromosome R, and each unit is about 11.5 to 12.5 kb ([@b55]; [@b17]; [@b42]). The insertion of an exogenous *URA3* gene in rDNA loci did not affect the growth of cells in the 5'-FOA containing medium, indicating that the *URA3* gene was silenced as observed in *S. cerevisiae* ([Fig. 4C](#fig04){ref-type="fig"}, row 2). In contrast, single copy deletion of *SIR2* liberated the expression of the *URA3* gene, demonstrating a reduction of rDNA silencing ([Fig. 4C](#fig04){ref-type="fig"}, row 3). The silenced chromatin inhibits homologous recombination between rDNA repeats, and reduces the formation of ERCs. Several lines of evidence suggest that the ERC accumulation may be a cause of cell aging in *S. cerevisiae*, and introduction of artificial ERCs shortens lifespan of yeast cells ([@b44]). In *C. albicans*, the extra-chromosomal rDNA containing molecules have also been reported, but their size is ranging from 50 to 100 kb ([@b38]), which are much larger than the ones detected in *S. cerevisiae*. To investigate whether the extra-chromosomal rDNA molecules increases when the *SIR2* gene is deleted in *C. albicans*, we employed PFGE to separate the whole genome, and did Southern blot using an rDNA probe. As shown in [Fig. 4D](#fig04){ref-type="fig"}, the extra-chromosomal rDNA molecules were not increased in *sir2Δ/SIR2*or *sir2Δ/sir2Δ* mutant as compared with the wild-type strain BWP17. These data indicate that the decrease of lifespan in 2 mutant cells may not be associated with the amount of extra-chromosomal rDNA molecules. Previous work by [@b38]) reported that extra-chromosomal rDNA molecules were not detected in wild-type strain 3153 A, but enriched in *sir2Δ/sir2Δ* cells of *C. albicans*. In our experiments, the extra-chromosomal rDNA molecules have been detected in all examined strains including the wild-type SC5314 cells ([Fig. 4D](#fig04){ref-type="fig"}). The discrepancy may be resulted from a strain-specific genetic background. Extra-chromosomal rDNA molecules do not accumulate in aging *Candida* cells --------------------------------------------------------------------------- ERCs have been shown to accumulate during cellular aging in *S. cerevisiae*, so we wondered whether the extra-chromosomal rDNA molecules also accumulated along with the aging process in *C. albicans*. Thus, we performed PFGE and examined rDNA with Southern blot. In both wild-type strain and the two *sir2* deletion mutants, the extra-chromosomal rDNA molecules did not display any obvious changes as the replicative age increased ([Fig. 5A](#fig05){ref-type="fig"}). The extra-chromosomal rDNA molecules in hyphal cells seemed not to be as homogenous as that in yeast cells (compare the lane marked 'SC5314 (yeast)' with other lanes). We also examined the rDNA copy number in wild-type, *sir2Δ/SIR2* and *sir2Δ/sir2Δ* cells with different ages, and no increase was detected ([Fig. 5B](#fig05){ref-type="fig"}). All these findings further suggest that the extra-chromosomal rDNA molecules may not be associated with cellular aging of *C. albicans*. ![The extra-chromosomal rDNA molecules are not increased during *Candida* aging. (A) Detection of extra-chromosomal rDNA molecules during replicative aging. Upper left, ethidium bromide staining of the gel; lower left, Southern blot examination with an rDNA probe. Marker, Low Range PFG marker (New England BioLabs); *Saccharomyces cerevisiae* BY4742 chromosomes served as another marker. The lanes labeled 1, 2, 3 and 4 represent the time points of 114 h, 75 h, 38 h and 0 h, respectively. Right panel shows the quantification results. The first column was assigned a value of 1. (B) Examination of the rDNA copy number during replicative aging. Left panel, Southern blot with an rDNA probe, *ACT1* served as an internal control; right panel, quantification result, the rDNA copy number of wild-type (BWP17) young cells (column 4) is 55/cell as suggested ([@b19]). The lanes or columns labeled 1, 2, 3 and 4 represent the time points of 114 h, 75 h, 38 h and 0 h, respectively.](ace0007-0746-f5){#fig05} *Candida* Sir2 functions in the distribution of oxidatively damaged proteins during cell division ------------------------------------------------------------------------------------------------- Since the correlations between Sir2 and extra-chromosomal rDNA molecules were not observed in *C. albicans*, and previous studies in *S. cerevisiae* elucidated that Sir2 regulates the asymmetric inheritance of oxidatively damaged proteins during cell division ([@b1]), we wanted to know whether *Candida* Sir2 also affects the distribution of oxidatively damaged proteins in mother and daughter cells. In wild-type strain, more oxidatively damaged proteins were retained in mother cells as compared to its daughter budding cell. In contrast, in *sir2Δ/sir2Δ* strain, the oxidatively damaged proteins were distributed evenly between mother and daughter cells ([Fig. 6A](#fig06){ref-type="fig"}). The result illuminates that cells fail to segregate oxidized proteins when Sir2 is absent. To ask whether the accumulation of oxidatively damaged proteins is increased in the *sir2Δ* mutants, we performed the carbonyl assay to detect the overall level of oxidatively damaged proteins. Interestingly, the overall level of oxidatively damaged proteins in *sir2Δ/SIR2*or *sir2Δ/sir2Δ*cells seemed not to be higher than that in wild-type cells ([Fig. 6B](#fig06){ref-type="fig"}). These data indicate that Sir2 controls the ability of mother cells to retain oxidatively damaged proteins during cell division. Our results are consistent with the previous findings in *S. cerevisiae* ([@b1]). ![Analysis of oxidatively damaged proteins in wild-type and *sir2Δ* mutant cells. (A) Immunofluorescent detection of the distribution of oxidatively damaged proteins in mother and daughter cells. Left panel, typical budding cells visualized by Confocol microscopy. Right panel, oxidation density was quantified and compared between mother (open bars) and daughter (filled bars) cells. Fifty mother cells and corresponding daughter cells of each strain were used for quantification. Error bars are the standard deviations. Average oxidation density of daughter cells as compared with their mothers (assigned as 1): WT (0.53), *sir2Δ/sir2Δ* (0.96). (B) Western blot analysis of the overall protein oxidation in wild-type, *sir2Δ/SIR2* and *sir2Δ/sir2Δ* cells. Tubulin is used as an internal control. Right panel shows the quantification results. The level of total protein oxidation in wild-type strain was assigned as 1. Error bars represent standard deviations of two independent clones.](ace0007-0746-f6){#fig06} Discussion ========== The unicellular eukaryotic organism, *S. cerevisiae* has been considered as one of the representative model organisms in aging research. Previous studies have indicated that *S. cerevisiae* and *C. albicans*, the two well-studied yeast, bear many resemblances genetically and biochemically ([@b3]). In our current work, we characterized *C. albicans*, the polymorphic fungus that has a finite lifespan ([Fig. 1B](#fig01){ref-type="fig"}). Like *S. cerevisiae*, the old *C. albicans* exhibits some aging-associated phenotypes, including morphologically larger in size ([Fig. 2C](#fig02){ref-type="fig"}), accumulation of glycogen and oxidatively damaged proteins ([Fig. 3](#fig03){ref-type="fig"}), and down-regulation of nascent protein synthesis (data not shown). In addition, the old *Candida* cells show no changes in telomere length and chromosome integrity ([Figs S2](#SD2){ref-type="supplementary-material"} and [S3](#SD3){ref-type="supplementary-material"}). Moreover, *C. albicans* appears to share some conserved aging pathways with *S. cerevisiae*. For example, calorie restriction prolongs lifespan in *C. albicans* ([Fig. 4A](#fig04){ref-type="fig"}). Decreasing the dosage of Sir2 shortens lifespan, and overexpression of Sir2 leads to lifespan extension in *C. albicans* ([Fig. 4B](#fig04){ref-type="fig"}). These observations indicate that *C. albicans* could be considered as a new model system for aging study. In *C. albicans*, deletion of one copy of *SIR2* affects the rDNA silencing ([Fig. 4C](#fig04){ref-type="fig"}), indicating that like *S. cerevisiae*, *Candida SIR2* is involved in the maintenance of silent chromatin. In *S. cerevisiae*, it has been shown that Sir2 may delay aging by repressing recombination in the rDNA loci so as to inhibit the formation of ERCs ([@b13]; [@b44]). Interestingly, in *C. albicans*, the reduction of rDNA silencing in *sir2Δ*/*SIR2* mutant does not result in an increase of extra-chromosomal rDNA molecules ([Fig. 4D](#fig04){ref-type="fig"}). We speculate that the mechanism of regulating cellular aging by Sir2 in *C. albicans* may not be exactly the same as in *S. cerevisiae*. In fact, although the longevity-promoting role of Sirtuin family has been proved in a variety of species, including *S. cerevisiae*, *C. elegans*, and *Drosophila melanogaster* ([@b20]; [@b53]; [@b40]), the extra-chromosomal rDNA molecule (circle) associated aging has not been observed in other organisms except *S. cerevisiae*. Therefore, it remains elusive whether the molecular mechanism by which the extra-chromosomal rDNA molecules (circles) cause aging is evolutionarily conserved. This idea is also supported by the observation that extra-chromosomal rDNA molecules do not accumulate in the aging *C. albicans* cells in either wild-type or *sir2* mutant strains ([Fig. 5A](#fig05){ref-type="fig"}). In addition, plasmids are indeed not stable in *Candida* cells (reviewed in [@b7]). Thus, we postulate that the decrease of rDNA silencing in *sir2Δ/SIR2* cells accelerates aging through a mechanism other than promoting rDNA recombination to form extra-chromosomal rDNA molecules (circles) ([@b25]; [@b44]). Although it is not clear how Sir2 affect *C. albicans* longevity, oxidative damage accumulation seems to be a function of replicative age in *C. albicans*. It has been proved in *S. cerevisiae* that mother cells retain oxidatively damaged proteins during cell division, and the uneven distribution of these proteins between mother and daughter cells is not due to the different rate in production of reactive oxygen species or degradation of carbonylated proteins, but a result of asymmetric segregation of the oxidized proteins during cytokinesis in a Sir2-dependent manner ([@b1]). Given that in *C. albicans*, oxidatively damaged proteins accumulate with replicative aging ([Fig. 3B](#fig03){ref-type="fig"}), and evenly distribute in mother and daughter cells when Sir2 is absent ([Fig. 6A](#fig06){ref-type="fig"}), *Candida* Sir2 acts more likely as *Saccharomyces* Sir2 to protect the daughters from inheriting oxidative damage accumulated in the aged mothers. Therefore, Sir2 may promote longevity in *C. albicans* through regulating the distribution of oxidatively damaged proteins. Besides the similar aging-associated phenotypes between *C. albicans* and *S. cerevisiae*, *C. albicans* is able to provide some advantages, potentiating it a complementary model. To prepare large amount of old cells seems to be a bottleneck for aging-related biochemical or genomics/proteomics study. Because *C. albicans* cells can grow as yeast form and hyphal form, which are dramatically different in shape and size, someone would be able to obtain a large amount of old cells. The method we have established for acquirement of old cells is relatively simple and effective. In addition, the separation procedure allows harvesting both young and old cells at discretionary time points, and provides an opportunity to perform the phenotypic time-course analysis of aging progression. In conclusion, we have established a new cellular aging model of *C. albicans*, which allows large-scale isolation of replicative old cells. Our work also suggests that the extra-chromosomal rDNA molecules may not be associated with aging in *C. albicans.* This novel aging model will facilitate to find out novel aging markers and investigate the mechanisms of cellular aging. Experimental procedures ======================= Strains and growth conditions ----------------------------- The *C. albicans* strains used in this study are SC5314 (wild-type) and its derivative BWP17 (*ura3Δ::λimm434/ura3Δ::λimm434 his1::hisG/his1::hisG arg4::hisG/arg4::hisG*). To make *sgs1Δ/SGS1*or *sir2Δ/SIR2* strain, one copy of *SGS1*or *SIR2* was deleted, respectively, in BWP17 using a PCR-based gene disruption method ([@b56]). The *sir2Δ/sir2Δ* strain was generated similarly on the basis of *sir2Δ/SIR2* strain. BES116 plasmid was used to construct the Sir2 overexpression strain ([@b12]). The plasmid contains two *ADE2* homologous arms (0.6 kb and 0.9 kb, respectively) for the recombination at *ADE2* locus and a *URA3* gene for nutrition selection. Integration of *SIR2* at *ADE2* locus was accomplished by transforming BWP17 with the linear fragment of BES116-SIR2 digested with *Asc*I. In addition to the entire coding region of *SIR2*, ∼1000 bp of upstream sequence and ∼500 bp of downstream sequence are included. A vector control was obtained by transforming the *Asc*I digested product of BES116 into BWP17. Yeast cells were propagated in YPD medium at 30 °C for routine culture. Hyphal cells were induced with an initial density of 10^6^ yeast cells mL^−1^ and cultured in YPD plus 15% bovine serum for 5 h at 37 °C. Replicative lifespan analysis ----------------------------- Replicative lifespan assay of yeast cells was performed as described previously ([@b22]). Unless otherwise specified, the replicative lifespan experiments were performed on yeast form cells. Lifespan of hyphal cells was determined as follows. Hyphal cells were separated from liquid culture (refer to the 'Large-scale preparation of old and young cells' section) and subjected to lifespan analysis immediately. A cohort of randomly selected hyphal cells was patched onto the lifespan plate and arrayed using a Singer MSM micromanipulator (Singer Instruments, Roadwater, Watchet, Somerset, UK). The budded yeast daughter cells from hyphal mothers were removed and counted every one to two generations. If a hyphal mother contains more than one cell, the average number of daughter cells was calculated. The plates were incubated at 30 °C during the day and stored at 4 °C at night. All lifespan experiments were carried out on standard YPD plates (2% glucose) except for CR analysis. Each experiment has been repeated at least twice, and data shown represent single experiment results. Statistical significance was determined by Wilcoxon rank-sum test, and significant differences were stated for *p* \< 0.05. Calcofluor staining ------------------- The separated cells were stained with Fluorescent Brightener 28 (Calcofluor White M2R Tinopal UNPA-GX) (Sigma-Aldrich, St. Louis, MO, USA) to calculate the percentage of hyphal cells. One million cells were suspended in 1 mL of double-distilled H~2~O, sonicated to prevent clumping and resuspended in 95% ethanol for 1--2 h at 4 °C. After being washed with 150 µL of 1 [m]{.smallcaps} sorbitol, cells were resuspended in 150 µL of 1 mg mL^−1^ fluorescent brightener for 15 min at 4 °C. At last, the cells were washed three times with 1 mL of 1 [m]{.smallcaps} sorbitol and visualized under the fluorescent microscope (Zeiss Axioplan 2, Carl Zeiss Inc., Oberkochen, Germany). Separation of hyphal and yeast cells ------------------------------------ Discontinuous sucrose density gradient was made by layering 30 mL of 30% sucrose at the bottom of a 50 mL centrifuge tube (Corning Inc., Corning, NY, USA) under 15 mL of distilled H~2~O. Five milliliter of a mixture of hyphal and yeast cells was loaded onto a sucrose gradient, and centrifuged at 150 *g* for 3--5 min. Hyphal cells stayed at the bottom of the tubes, and yeast cells stayed in the upper layer of the gradient. The upper layer supernatant was collected to pellet yeast cells by centrifugation (3000 *g*, 3 min). The bottom pellet was visualized under a Nikon Eclipse E200 (Tokyo, Japan) microscope to check the purity of separated hyphal cells. More sucrose gradient centrifugation(s) would be performed until no dissociative yeast cells were mixed in the hyphal population. Hyphal cells were finally pelleted by centrifugation (3000 *g*, 3 min). Large-scale preparation of old and young cells ---------------------------------------------- A fresh colony was inoculated into YPD medium and incubated at 30 °C overnight. Hyphal cells were induced in the presence of 15% serum at 37 °C for 5 h, and then cultured in YPD for 2.5 h at 30 °C to produce yeast form cells. The newborn yeast cells in this short time were harvested by sucrose gradient centrifugation and used to induce the growth of young hyphae. The young hyphae were cultured in YPD at 30 °C to produce yeast form daughters continuously. During the cultivation sucrose gradient centrifugation was employed to get rid of yeast daughter cells, and hyphal mother cells were transferred to fresh YPD every 10--12 h. At the indicated time points, hyphal cells were separated thoroughly and subjected to replicative lifespan assay immediately. Iodine staining of glycogen --------------------------- Hyphae of different ages were sonicated to break into single cells and then counted using hemacytometer. About 5 × 10^5^ cells for each sample were dotted on GF/C filters (Whatman International Ltd, Maidstone, UK) triply. The filters were stained for 2 min by exposing to iodine vapor at 37 °C, and photographed with a digital camera. Images were quantitated with Bio-Rad Quantity-One program (Bio-Rad Laboratories, Hercules, CA, USA). Determination of oxidatively damaged proteins --------------------------------------------- Total proteins were prepared using the glass beads protocol, and the protein concentrations were determined by Bradford (Bio-Rad Laboratories Inc., Hercules, CA, USA). Oxidative proteins were reacted with 2,4-dinitrophenylhydrazine in sodium dodecyl sulfate ([@b30]) and detected by Western blot with rabbit anti-2,4-dinitrophenyl antibody (Zymed Laboratories, South San Francisco, CA, USA). Separation of *C. albicans* chromosomes --------------------------------------- The whole chromosomes were separated by PFGE as described previously ([@b6]). Determination of telomere length -------------------------------- *Candida albicans* telomere blot was performed as described ([@b46]). Genomic DNA was isolated using standard glass beads protocol and digested with *Nla*III and *Alu*I. Digested DNA was separated on a 0.9% agarose gel, transferred to Hybond-N+ membrane (GE Healthcare, Amersham Place, Little Chalfont, Buckinghamshire, UK), and hybridized with a 5′-end-labeled oligonucleotide (5′-GAAGTTAGACATCCGTACACCAAGAAGTTAGACATCCGTACACCAA-3′) containing two copies of the *C. albicans* telomere repeat. Detecting extra-chromosomal rDNA molecules and determination of rDNA repeat number ---------------------------------------------------------------------------------- The extra-chromosomal rDNA molecules were detected by PFGE using a CHEF-DRIII system (Bio-Rad Laboratories). About 10^7^ cells were harvested and digested with 40 µL of 2 mg mL^−1^ Zymolyase 20 T (MP Biomedicals, LLC, Solon, OH, USA) at 37 °C, then mixed with 40 µL of 2% low-melting agarose (cool to 50 °C). Plugs were prepared at 4 °C by adding 80 µL of the samples into a mold chamber, then treated with LET buffer (0.5 [m]{.smallcaps} EDTA, 0.01 [m]{.smallcaps} Tris (pH 7.5), \> 0.5%β-mercaptoethanol), NDS buffer (0.5 [m]{.smallcaps} EDTA, 0.01 [m]{.smallcaps} Tris (pH 7.5), 1% N-laurylsarcosine, 1 mg mL^−1^ Protease K) and 0.05 [m]{.smallcaps} EDTA for 16--24 h, respectively. The plugs were then filled in a 0.8% (w/v) agarose gel for electrophoresis. The running conditions for detecting extra-chromosomal rDNA molecules are as following: 0.5 × TBE buffer at 14 °C; constant voltage of 3.6 V cm^−1^; a 120S pulse interval for 20 h. DNA was visualized by ethidium bromide staining. After capillary transfer to Hybond-N+ membrane, the rDNA signals were detected by hybridization with a ^32^P labeled 1.7 kb PCR product of *C. albicans* 18S subunit of rDNA (forward primer: 5′-GGTTGATCCTGCCAGTAGTC-3′; reverse primer: 5′-GTTCACCTACGGAAACCTTG-3′). To determine the copy number of rDNA, genomic DNA was mini-prepared and digested with *Eco*RV and *Sal*I, and then separated on a 0.9% agarose gel. DNA was blotted to Hybond-N+ membrane and probed with rDNA. Subsequently the membrane was stripped and hybridized to a ^32^P labeled 1.1 kb PCR product of *C.* *albicans ACT1*(forward primer: 5′-ATGGACGGTGAAGTTGCTGC-3′; reverse primer: 5′-GTGGTGAACAATGGATGGACC-3′) for normalization. The copy number of rDNA was determined with Image Quant software. The young cells are assumed as 55 rDNA copies per cell ([@b19]). Immunofluorescent detection of oxidatively damaged proteins ----------------------------------------------------------- The oxidatively damaged proteins were detected as described in ([@b1]). Cells were digested with Zymolyase in the digestion buffer (50 m[m]{.smallcaps} Tris-HCl, pH 7.5; 10 m[m]{.smallcaps} MgCl~2~; 1 [m]{.smallcaps} Sorbitol). Primary and secondary antibodies were Rabbit anti-DNP (Zymed Laboratories) and Cy™3-conjugated AffiniPure Donkey Anti-Rabbit IgG (H+L) (Jackson ImmunoResearch Laboratories, West Grove, PA, USA), respectively. The fluorescence density was quantified using Image-Pro Plus software. We thank Dr Jiangye Chen for *C. albicans* strains, plasmids and helpful suggestions. We also thank Drs Keke Huo and Zhiqi Xiong for their equipment support, and Ms Lu-Xia Xu for her technical support. This work is supported by a Chinese Academy of Sciences-Max Planck Society Professorship (GJHZ05), and the grant from Commission of Science & Technology Shanghai Municipality (036505007), National Science Foundation of China (30630018) and Ministry of Science and Technology (2007CB914502). Supporting Information ====================== Additional supporting information may be found in the online version of this article. **Fig. S1** Hyphal cells are separated from yeast cells by sucrose gradient centrifugation. The photo was taken under a Zeiss Axioplan 2 microscope. **Fig. S2** Telomere length does not change during Candida aging. Two independent clones of each time point (0 h, 38 h, 75 h and 114 h) were examined. Lane Y, yeast form; lane H, hyphal form. TRFs represent terminal restriction fragments. **Fig. S3** Electrophoretic karyotypes of *Candida* cells during aging. *C. albicans* chromosomes were separated by PFGE and stained with ethidium bromide. **Fig. S4** Lifespan variations of different strains. (A) Lifespan analysis of three reference strains. Mean lifespan and sample size are: SC5314 20.3 (*n* = 50), BWP17 28.0 (*n* = 50), BWP17 (vector) 22.8 (*n* = 50). (B) Summary of mean lifespan of the wild-type strains SC5314 and BWP17. Each dot represents an independent lifespan experiment. The average of mean lifespan: SC5314, 20.9; BWP17, 26.9. Please note: Wiley-Blackwell are not responsible for the content or functionality of any supporting information supplied by the authors. Any queries (other than missing material) should be directed to the *Aging Cell* Central Office. [^1]: Xiao-Hong Fu and Fei-Long Meng contributed equally to this work.
1. Field of the Invention The present invention relates to a gamma voltage generation circuit. More particularly, the present invention relates to a gamma voltage generation circuit capable of shifting gamma voltages by a common voltage level. 2. Description of Related Art In a present information society, as information communication media and various electronic display devices are widely used in industrial apparatus or home appliances, the electronic display devices become indispensable, and the electronic display devices are continually updated to meet various demands of the information society. Generally, the electronic display devices display and transmit various information to users. Namely, the electronic device can convert electronic information signals into optical information signals that can be visually recognized by the users. In a present display device or a system, for example, a cathode-ray tube (CRT) or a liquid crystal display (LCD), a relationship between an input voltage and a display output thereof is not linear, and the relationship between the input voltage and the display output can be described by a gamma curve. Regarding the LCD, an output voltage (i.e. a gamma voltage) corresponding to each of gray levels can be found according to the gamma curve. A LCD panel can display a correct gray level according to the corresponding gamma voltage, so that the LCD can correctly display images. To improve a display effect of the LCD, some of the LCD panels can divide a single pixel into two sub-pixels. Common voltage levels of the two sub-pixels are probably different due to a circuit structure design. In this case, when a same gamma voltage is output to the LCD panel, display effects of the two sub-pixels can be different, so that a display quality thereof is influenced. Referring to FIG. 1, a pixel is composed of two sub-pixels A and B. The common voltage level of the sub-pixel A is VCOMA, and the common voltage level of the sub-pixel B is VCOMB. A difference ΔV between the common voltage levels VCOMA and VCOMB causes a phenomenon of color shift of the LCD panel, such that the display quality of the LCD would be reduced.
7 Tips To Save Your Sh*t From Flooding This December With the Elnino rains, it is quite saddening to hear over 20 people have died from floods so far. Here are some helpful tips you can use to avoid excessive damage or even loss of life this December: 1. Move costly possessions and important documents – shift valuable and electrical goods off the floor for their own protection, ideally upstairs. 2. Protect soft furnishings. Carpets can be moved upstairs if flooding looks likely and you can throw curtains over their rails to protect them. 3. Stock up on sandbags – buy in flood boards and sandbags to block doorways with, as these will help you fight the flooding and protect your home. Sandbags have been used to block doorways, drains and other openings into properties as well as to weigh-down manhole covers, garden furniture and to block sink, toilet and bath drains to prevent water backing up. 4. Protect irreplaceables. Items of sentimental value, such as photos, should be packed in waterproof bags and put somewhere safe, ideally upstairs. No amount of insurance money can bring these back, so put them out of harm’s way. 5. List useful contacts – write down important numbers and keep them close. 6. Pack a flood kit – put together an emergency kit containing personal IDs, any required medication and a change of clothing in case you do need to evacuate your home. 7. Keep informed. Watch the weather forecast and check the Met Office to make sure you’re up-to-date on any threats.
-- PROG='[^']*/Tests/RunCMake/find_program/A/testAandB' -- PROG='PROG-NOTFOUND' -- PROG='[^']*/Tests/RunCMake/find_program/B/testAandB' -- PROG='[^']*/Tests/RunCMake/find_program/A/testAandB'
Bloomberg Bloomberg | Quint is a multiplatform, Indian business and financial news company. We combine Bloomberg’s global leadership in business and financial news and data, with Quintillion Media’s deep expertise in the Indian market and digital news delivery, to provide high quality business news, insights and trends for India’s sophisticated audiences. Google Is Indonesia's New Weapon in War on Illegal Fishing (Bloomberg) -- Indonesia’s Fisheries Minister Susi Pudjiastuti deals with some dangerous men in her role, but they don’t rattle her. She has an equally intimidating weapon on her side: Google. Partnering with the search engine firm, Pudjiastuti is catching illegal fishing activity in real time, after thousands of vessels’ locations were revealed online. In her mission to clean up an industry once the domain of crooks, she’s convinced powerful local operators with foreign interests to stop practices that were robbing the economy of billions of dollars of revenue each year. "You have money, you have power, you have the reach probably to make me fail or to even basically eliminate me," Pudjiastuti recalls telling the industry’s so-called “godfathers” in meetings shortly after joining President Joko Widodo’s government in 2014. “But I also will not stop." After hunting down violators and blowing up their boats in public spectacles, Pudjiastuti’s approach has become more sophisticated. In a global first, the minister has teamed up with Google to use satellites to spot illegal fishermen from space. It’s paying off: Indonesia’s fish stocks have more than doubled in two years, and an industry plundered by foreigners for decades is once again contributing to economic growth, which Widodo has pledged to boost to 7 percent. In a sprawling archipelago of 17,000 islands, the potential is vast. While fishing currently accounts for just 2.6 percent of Indonesia’s gross domestic product, that portion has grown about 40 percent since Pudjiastuti started her role. At that time, there were some 10,000 foreign vessels fishing illegally in Indonesia’s territory. She says they’re now all but gone. Global Pirates But it’s not game over for the minister: she says local boats are still working with “global pirates” who catch fish just outside the permitted zone, which are then shipped to foreign destinations. And that’s where Google comes in. "They still steal from us. We see it on Google fishing watch," Pudjiastuti said, referring to Global Fishing Watch, an online mapping platform co-founded by Google. "They use Indonesian-affiliated companies and businesses and basically take their catch a few miles beyond the exclusive economic zone, where a refrigerated mothership is waiting." Indonesia last year became the first nation to share its Vessel Monitoring System information -- government-owned data used to monitor maritime traffic -- with the global monitoring platform, founded by Google, Oceana and SkyTruth, and funded by partners including the Leonardo DiCaprio Foundation and Bloomberg Philanthropies. Pudjiastuti’s initiative instantly made nearly 5,000 previously invisible boats viewable. She has called for other nations to follow her lead, with Peru last year committing to making its fishing data available. Brian Sullivan, the manager of Google Ocean and Earth Outreach, said information from Indonesia’s VMS was fed through the same algorithm used by Global Fishing Watch to produce a new set of analytics. That was then added to raw satellite imagery to produce an even more detailed footprint of fishing activities in near-real time. “Susi reached out to us and said ’I like what you’re working on, we’d like to see how we could use that information in Indonesia,” California-based Sullivan said in a telephone interview. “She has been probably one of the most progressive ministers within fisheries for taking something that historically all governments had kept extremely close.” Watching You By using machine learning and watching how a vessel moves, Google’s technology is able to establish patterns, and determine whether a vessel is in transit or fishing. A study published last month found that foreign fishing in Indonesia dropped by more than 90 percent and total fishing by 25 percent following the tough policies introduced by Pudjiastuti, which also included a ban on all foreign-owned and -made boats from fishing in Indonesia and the restriction of transfers of fish at sea. "We know what it looks like when a vessel is broadcasting because we see that vessel’s position,” said Sullivan. “And if it then goes quiet for a while and then reappears on the other side of a marine-protected area that would be considered suspicious activity." Ship Wrecker With almost 34,000 miles of coastline to monitor, the minister and her partners have a big job. But it’s not just about economic gains and food security: it’s also about sovereignty, an issue that plays well for the domestic audience. In 2016, Indonesia marked its Independence Day celebrations by sinking about 70 foreign fishing vessels, mostly from Vietnam but also from China. It was an overt display aimed at sending a message: the nation intended to protect its lucrative fishing grounds, including in the South China Sea. Since the end of 2014, Pudjiastuti has sunk more than 350 boats. “They take our resources. If we don’t put an end to them they’re going to come back and fish again,” she said. “And now I am screaming -- I want to tell everybody ‘Be aware, they are moving to you’.”
Binding of serum response factor to CArG box sequences is necessary but not sufficient to restrict gene expression to arterial smooth muscle cells. Serum response factor (SRF) plays an important role in regulating smooth muscle cell (SMC) development and differentiation. To understand the molecular mechanisms underlying the activity of SRF in SMCs, the two CArG box-containing elements in the arterial SMC-specific SM22alpha promoter, SME-1 and SME-4, were functionally and biochemically characterized. Mutations that abolish binding of SRF to the SM22alpha promoter totally abolish promoter activity in transgenic mice. Moreover, a multimerized copy of either SME-1 or SME-4 subcloned 5' of the minimal SM22alpha promoter (base pairs -90 to +41) is necessary and sufficient to restrict transgene expression to arterial SMCs in transgenic mice. In contrast, a multimerized copy of the c-fos SRE is totally inactive in arterial SMCs and substitution of the c-fos SRE for the CArG motifs within the SM22alpha promoter inactivates the 441-base pair SM22alpha promoter in transgenic mice. Deletion analysis revealed that the SME-4 CArG box alone is insufficient to activate transcription in SMCs and additional 5'-flanking nucleotides are required. Nuclear protein binding assays revealed that SME-4 binds SRF, YY1, and four additional SMC nuclear proteins. Taken together, these data demonstrate that binding of SRF to specific CArG boxes is necessary, but not sufficient, to restrict transgene expression to SMCs in vivo.
Q: $user->uid is always 1 when running automated tests In my automated tests, I create some users. debug('moderator_user: '.$this->moderator_user->uid); debug('editor_user: '.$this->editor_user->uid); outputs 'moderator_user: 2' 'editor_user: 4' So I would think that global $user; $this->drupalLogin($this->editor_user); debug('currently logged in as '.$user->uid); would output 'currently logged in as: 4' but instead it shows, 'currently logged in as: 1' It seems to be correctly logging user 4 because $this->drupalLogin($this->editor_user); $edit = array( 'title' => $this->randomName(), ); $this->drupalPost("node/add/{$this->content_type}", $edit, t('Save')); $node = $this->drupalGetNodeByTitle($edit['title']); debug('Draft was created by user with uid '.$node->workbench_moderation['current']->uid); yields 'Draft was created by user with uid 4' So what's going on? A: It happens exactly what described in the documentation page for DrupalWebTestCase::drupalLogin(). Please note that neither the global $user nor the passed-in user object is populated with data of the logged in user. If you need full access to the user object after logging in, it must be updated manually. If you also need access to the plain-text password of the user (set by drupalCreateUser()), e.g. to log in the same user again, then it must be re-assigned manually. For example: // Create a user. $account = $this->drupalCreateUser(array()); $this->drupalLogin($account); // Load real user object. $pass_raw = $account->pass_raw; $account = user_load($account->uid); $account->pass_raw = $pass_raw;
Movie review: Disney’s live-action version of ‘Aladdin’ presents a whole new world of a classic movie Ed Symkus More Content Now Wednesday May 22, 2019 at 10:00 AM The first thing that happens when you mix together British director Guy Ritchie with a Walt Disney film is that you get a never-before-experienced hybrid. Ritchie likes telling stories about criminals; Disney is famous for fairy tales with heroes - and heroines - and villains. Ritchie is known for keeping up a fast pace in telling his stories. Disney has always had some of the best looking visuals in the business. In “Aladdin,” the live-action re-do of Disney’s terrific 1992 animated feature, with Guy directing and co-writing, you get all of the above. OK, the hybrid part means there have also been some changes. Ritchie’s often amiable gangsters are now a petty thief, the young man in the title role. In place of rock songs on Ritchie’s soundtracks, there’s now the music of veteran Disney composer Alan Menken. It’s hard to recall many major female characters in Ritchie’s films, but here he’s got the beautiful Princess Jasmine, who’s as strong-willed as that street thief who will, of course, end up being in a romance with her. Fans of the original film will undoubtedly either have that one memorized or will be revisiting it before seeing this one, and they’re going to be pleasantly surprised. As, for the most part, will be Ritchie fans (except for those who thrive on his screen violence) who didn’t know he had this kind of thing in him. The story in the two films is intrinsically the same. In the Middle Eastern kingdom of Agrabah, Aladdin (Mena Massoud) and his pet monkey Abu get by via thievery - stealing food, snatching jewelry, anything it takes to survive. He believes he deserves a better life. Princess Jasmine (Naomi Scott), the daughter of the aging sultan (Navid Negahban) wants more out of life than waiting for the right prince to come along and marry her. In fact, though this sort of thing is unheard of in the kingdom, she’d like to be next in line to become sultan. She, too, has a pet, the fierce tiger Rajah. Aladdin and Jasmine meet under, let’s say, false pretenses, there’s the expected attraction that happens between opposites, at least in movies, and then there’s the villain to get in the way of it all. That would be the sultan’s vizier Jafar (Marwan Kenzari), who also has his eyes on the sultanship, and some minor magical powers to help him get it. But, as in the original, all eyes and ears are going to be getting into what’s radiating from the film’s biggest, brightest star: Call him Genie (Will Smith). Within seconds of his introduction, Smith will put viewers at ease about the impossibility of stepping into the shoes of Robin Williams. It’s the wildest and one of the best roles Smith has ever done. Something to remember before settling down to watch this is that it’s a full-blown musical - singing and dancing in eye-popping costumes and on dazzling sets wherever you look and listen. Some of the same Alan Menken songs from the original are here, some have reworked lyrics and arrangements to fit in with this hipper, more “contemporary” movie, and there are some brand new ones that zero in on issues of female equality. But it’s not a movie that goes out if its way to hammer that kind of thing home. It’s a visual spectacle, with long, sweeping tracking shots, and it’s a combination exercise in comedy and romance: Abu is probably a better thief than Aladdin, and no matter how bad things get, how much treachery is waiting around the corner, you just know that something will happen to get those two young lovebirds together. And there’s magic - the kind that the genie is capable of (which also leads to much of the film’s crazy humor) and the kind that’s done with state-of-the-art filmmaking techniques. The genie character alone is a marvelous CGI creation (as are the monkey, the tiger, a bad guy parrot, and we mustn’t forget the magic carpet). Match that with exterior filming in the deserts of Jordan, breathtaking production design, all of the positive messages about bettering ourselves, and you’ve got a great movie experience. Top it off with an ending that couldn’t get much happier, and you’ve got one of the best films to come from Guy Ritchie and from Disney in a long while. Ed Symkus writes about movies for More Content Now. He can be reached at esymkus@rcn.com.
.. _networking: Networking ########## The networking section contains information regarding the network stack of the Zephyr kernel. Use the information to understand the principles behind the operation of the stacks and how they were implemented. .. toctree:: :maxdepth: 1 overview.rst net-stack-architecture.rst networking-api-usage.rst networking_with_host.rst
JUDGING/SCORING Participants will be evaluated on the following parameters: vocal ability (rhythm/pitch/tone/timbre) musicality (interpretation/phrasing/memorization/dynamics) performance (movement/confidence/command/uniqueness) The actual judges and number will vary depending upon stage of the competition. SCORING Decisions as to who will advance will be made upon completion of each round. Round 1 (auditions) will be decided by the panel of judges. Round 2 (semi-finals) will be decided by a combination of judges’ scores (50%) and audience votes (50%). The finals will be decided entirely by the voting audience. Each audience member may vote only once. PRIZES The top three contestants in the competition will be awarded: 1st place: $500 prize plus the opportunity to record a 2-song demo 2nd place: $250 prize money 3rd place: $100 prize money All prize winners will be announced following the finals. Prizes are non-transferable and non-refundable.
5*x + 42. Let q be a(-12). Let k(n) = n**3 + 18*n**2 + n + 21. Let p be k(q). Factor 0 + 0*y**2 + 3/2*y**5 + y**p + 0*y - 5/2*y**4. y**3*(y - 1)*(3*y - 2)/2 Suppose -45 = -2*t + 1. Suppose -t - 1 + 2 - 8 + 9*z + 3*z**2 = 0. Calculate z. -5, 2 Let r be 2/(-2 - (-24)/9). Factor -21*q**4 + 6*q**r + 3*q**5 + 21*q**5 - 9*q**5. 3*q**3*(q - 1)*(5*q - 2) Let v(q) = -q**3 - 33*q**2 - q - 33. Let s be v(-33). Let o(r) be the second derivative of 3/100*r**5 - 1/10*r**4 + s + 0*r**2 + 1/10*r**3 + 2*r. Factor o(n). 3*n*(n - 1)**2/5 Let n(v) be the first derivative of -v**5/25 - 3*v**4/10 + 178. Find g such that n(g) = 0. -6, 0 Let a = 10 + -6. Solve -5 - 4 + a*g**2 - 2 - 16*g + 23 = 0. 1, 3 Let q(u) be the third derivative of -u**5/27 + 23*u**4/108 - 2*u**3/9 + 58*u**2. Find k, given that q(k) = 0. 3/10, 2 Let r(c) be the first derivative of c**4/16 - 13*c**3/4 + 507*c**2/8 + 41*c + 46. Let a(n) be the first derivative of r(n). Determine f, given that a(f) = 0. 13 Determine x so that -74*x - 15 + 15 - 12*x**2 + 4*x**5 + 12*x**4 - 44*x**3 + 114*x = 0. -5, -1, 0, 1, 2 Suppose 0 = -4*x + 1 - 1. Suppose -2*h = -5*t - x*h + 8, -3*t + 5 = -h. Factor 0 + 2/3*l**t - 2/3*l. 2*l*(l - 1)/3 Let c(q) be the third derivative of -q**6/780 + q**5/65 - q**4/13 + 8*q**3/39 - q**2 - 26. Factor c(p). -2*(p - 2)**3/13 Let f be (-10)/(-4) - 399/190. Let s(i) = 3*i**3 - 1. Let c be s(1). Determine p so that -3/5 - f*p + 1/5*p**c = 0. -1, 3 Let c(a) = a**2 + 3*a - 19. Let q be c(0). Let v(b) = -b - 16. Let p be v(q). Let 42/5*d**4 + 0*d + 6/5*d**2 + 0 + 33/5*d**p = 0. Calculate d. -1/2, -2/7, 0 Let m = -4/25 - -86/225. Let u = -1270/3 - -424. Find b such that m - 8/9*b + u*b**2 = 0. 1/3, 1 Let q(h) be the first derivative of h**4/28 - h**3/3 + 5*h**2/7 + 151. Factor q(r). r*(r - 5)*(r - 2)/7 Suppose 2/17*q**4 - 20/17*q**3 + 74/17*q**2 - 120/17*q + 72/17 = 0. Calculate q. 2, 3 Suppose 6*r - 1 = 9 + 2. Let x be 1*-2*3/(-7). Factor -x*b - 3/7*b**r + 0. -3*b*(b + 2)/7 Let t(v) be the third derivative of -v**5/150 + 7*v**4/60 + 8*v**3/15 - 17*v**2. Factor t(b). -2*(b - 8)*(b + 1)/5 Factor 0*m - 2/13*m**2 - 2/13*m**3 + 0 + 2/13*m**5 + 2/13*m**4. 2*m**2*(m - 1)*(m + 1)**2/13 Let c(z) be the second derivative of -5*z**9/3024 - z**8/112 - z**7/56 - z**6/72 + 10*z**3/3 - 12*z. Let v(h) be the second derivative of c(h). Factor v(o). -5*o**2*(o + 1)**3 Let -11/2*j**4 - 61/2*j**2 - 39/2*j**3 - 22*j - 1/2*j**5 - 6 = 0. Calculate j. -6, -2, -1 Let t(p) = 8*p**3 - 2*p**2 - 7*p - 7. Let o(d) = -4*d**3 + d**2 + 3*d + 3. Let i be 2*1*(-38)/(-4). Let g = i + -25. Let q(a) = g*t(a) - 14*o(a). Factor q(r). 2*r**2*(4*r - 1) Let k(q) = -q**4 + 1. Let c = -29 - -27. Let i(a) = -2*a**4 + 3*a**3 + 3*a**2 + a + 3. Let h(x) = c*i(x) + 6*k(x). Factor h(u). -2*u*(u + 1)**3 Let q(s) be the second derivative of -1/84*s**7 - 7/60*s**6 + 1/12*s**4 - 1/4*s**5 + 0 + 5/4*s**2 + 11/12*s**3 + 25*s. Let q(z) = 0. Calculate z. -5, -1, 1 Let c = 13 + -8. Suppose -10 - c = -5*g. What is t in -8*t**2 - g*t + 6*t**5 + 2*t**2 - t**5 - 2*t**5 + 6*t**4 = 0? -1, 0, 1 Let f(j) = -5*j**3 - 7*j**2 - 3. Let t(z) = 5*z**3 + 8*z**2 + 2. Suppose -3*m + 5*y - 22 = y, 2*m - 8 = -3*y. Let o(c) = m*f(c) - 3*t(c). Factor o(k). -5*k**2*(k + 2) Let j be (-7)/(-6) + (-100)/120 - (-1 + 1). Factor j*l**3 - 1/3*l**2 + 0*l + 0. l**2*(l - 1)/3 Suppose 0 = -48*v + 27*v + 28*v - 672. Factor v + 24*p + 3/2*p**2. 3*(p + 8)**2/2 Let z(t) be the first derivative of 8*t**5/25 + 2*t**4 - 46*t**3/15 + 6*t**2/5 + 7. Let z(i) = 0. Calculate i. -6, 0, 1/2 Let o(a) = a - 4. Let f be o(4). Let n be (-5)/((-125)/55) - 6/10. Factor -8/5*d**2 - 4/5*d + f + 4/5*d**5 + 0*d**3 + n*d**4. 4*d*(d - 1)*(d + 1)**3/5 Let q(k) be the first derivative of -5*k**4/4 - 235*k**3/3 - 2875*k**2/2 - 2645*k - 115. Factor q(s). -5*(s + 1)*(s + 23)**2 Let q(b) = -18*b**3 - 32*b**2 - 66*b - 34. Let l(j) = -2*j**3 + j**2 + j - 1. Let a(f) = -36*l(f) + 2*q(f). Let a(y) = 0. What is y? -1, -2/9, 4 Let a(n) = -n**3 + 3*n**2 + 2*n - 4. Let u be a(3). Find j such that -6*j**u + 30*j + 17*j**2 + 45 - 6*j**2 = 0. -3 Let x(m) be the third derivative of m**6/40 - 23*m**5/10 + 60*m**4 + 576*m**3 - 253*m**2. Solve x(o) = 0 for o. -2, 24 Let h be ((1 - 1) + 0 + 3)*1. Let t(x) = x**2 - 3*x. Let v be t(h). Suppose v + 0*s - 1/6*s**4 + 1/6*s**3 + 0*s**2 = 0. What is s? 0, 1 Let f be (-2)/9 - (1312/9)/(-8). Factor 11*q + 38*q - 9*q - f*q**2 - 8. -2*(q - 2)*(9*q - 2) Let 184*p - 260/3 + 8*p**3 - 320/3*p**2 + 4/3*p**4 = 0. Calculate p. -13, 1, 5 Let r(b) = -b**3 + 6*b**2 - b + 13. Let v be r(6). Factor -4*a**2 - 5 - a**5 + v - 6 + 8*a**4 - 8*a**3 - a**5 + 10*a. -2*(a - 2)*(a - 1)**3*(a + 1) Suppose 0 = 14*u - 21*u + 21. Let c(j) be the first derivative of 2 + 6/5*j - 1/5*j**u - 3/10*j**2. Factor c(i). -3*(i - 1)*(i + 2)/5 Let u be 2/8 - (-3934)/15400. Let t = u - -1/25. Suppose t*f + 0 + 2/11*f**2 = 0. Calculate f. -3, 0 Let y(x) be the second derivative of x**7/14 - 9*x**6/10 + 24*x**5/5 - 14*x**4 + 24*x**3 - 24*x**2 - 8*x. Factor y(j). 3*(j - 2)**4*(j - 1) Let v(m) be the third derivative of m**10/16800 + m**9/10080 - m**8/960 + m**7/840 - m**5/5 + 26*m**2. Let b(j) be the third derivative of v(j). Factor b(s). 3*s*(s - 1)*(s + 2)*(3*s - 1) Let k = 67 + -82. Let w be ((-25)/k)/((-5)/(-2)). Find b such that 0*b - w*b**2 + 0 - b**3 + 2/3*b**4 = 0. -1/2, 0, 2 Let i = -9517 + 85657/9. Factor -i*c**2 + 4/3*c - 8/9. -4*(c - 2)*(c - 1)/9 Let x(t) be the second derivative of -5*t**7/42 - t**6/6 + t**5/2 - 49*t. Suppose x(o) = 0. Calculate o. -2, 0, 1 Suppose 167 + 148 = 166*m - 17. Find b such that -3/4*b - 9/4*b**m - 9/4*b**3 - 3/4*b**4 + 0 = 0. -1, 0 Let 62/5*s + 2/5*s**2 + 0 = 0. What is s? -31, 0 Let y(n) = n**3 + 2*n**2 - n - 1. Let d(g) = 2*g**3 - 3*g**2 + 6*g + 6. Let s(h) = d(h) + 6*y(h). Suppose s(v) = 0. What is v? -9/8, 0 Find n such that -19815*n**3 + 19811*n**3 - 66*n**2 - 1024*n - 62*n**2 = 0. -16, 0 Let r(c) = -14*c + 490. Let v be r(34). Let f = 1931 + -5735/3. Determine y, given that 8/3 + 16*y - v*y**3 + f*y**2 = 0. -1/3, -2/7, 2 Factor -2/15*y**5 + 0*y**2 + 2/5*y**4 + 0*y + 0 + 8/15*y**3. -2*y**3*(y - 4)*(y + 1)/15 Suppose 0 = -2*t - t + 27. Suppose -5*o + 6 = -t. Determine g so that 8*g**2 - 7*g**2 - 16 - g**3 + o*g**3 + 24*g - 13*g**2 = 0. 2 Let s(v) be the second derivative of 0*v**3 + 17*v + 0*v**2 + 0 - v**4 - 2/5*v**5 + 2/15*v**6. Factor s(r). 4*r**2*(r - 3)*(r + 1) Let d(s) be the third derivative of 1/720*s**6 + 1/2016*s**8 + 1/120*s**5 - 1/72*s**4 + 0*s - 10*s**2 - 1/420*s**7 + 0*s**3 + 0. Find j such that d(j) = 0. -1, 0, 1, 2 What is x in 81 + 9/2*x**2 + 15/2*x**3 - 3/2*x**4 - 135/2*x = 0? -3, 2, 3 Let r(s) be the first derivative of s**6/120 + 3*s**5/40 - 12*s**3 - 47. Let q(j) be the third derivative of r(j). Determine n so that q(n) = 0. -3, 0 Let h(i) be the third derivative of -i**8/80640 + i**7/3360 - i**6/576 + i**5/60 - 6*i**2. Let j(d) be the third derivative of h(d). Factor j(o). -(o - 5)*(o - 1)/4 Let u(r) be the second derivative of r**5/70 + 5*r**4/21 - 23*r**3/21 + 12*r**2/7 - 3*r + 43. Suppose u(x) = 0. Calculate x. -12, 1 Let c = -1057/690 + 36/23. Let d(x) be the third derivative of 0*x + 6*x**2 + 2/15*x**5 + c*x**6 + 0*x**4 + 0*x**3 + 0. Solve d(p) = 0. -2, 0 Let j(s) be the first derivative of -s**4/7 + 20*s**3/21 - 16*s**2/7 + 16*s/7 - 2. Factor j(t). -4*(t - 2)**2*(t - 1)/7 Let p(m) be the second derivative of 0 + 5/33*m**3 + 6/11*m**2 - 1/66*m**4 + m. Suppose p(i) = 0. Calculate i. -1, 6 Let l(m) be the third derivative of -m**7/525 - 11*m**6/75 - 21*m**5/5 - 45*m**4 + 225*m**3 + 189*m**2. Factor l(j). -2*(j - 1)*(j + 15)**3/5 Let w(p) be the first derivative of -3*p**4/4 - 9*p**3 - 36*p**2 - 48*p + 127. Factor w(q). -3*(q + 1)*(q + 4)**2 Suppose 3*z = 3*i + 7*z - 11, 3*z = 2*i - 30. Let k = i - 5. Let 4*w**4 - 5*w**4 + 4*w**3 - w**k + 6*w**4 = 0. Calculate w. -1, 0 Let c(h) be the first derivative of h**4/28 - h**3/3 + 5*h**2/7 - 49. What is g in c(g) = 0? 0, 2, 5 Suppose -118*f**2 + 123*f**2 + 20 + 24 - 30*f + 1 = 0. Calculate f. 3 Determine l so that -26*l**2 + 1020*l + 53*l**2 - 558 + 330 = 0. -38, 2/9 Determine m, given that -8978*m**2 + 13601*m**3 + 3/4*m**5 + 0*m - 403/2*m**4 + 0 = 0. 0, 2/3, 134 Let t = -32/15 + 143/60. Let n(f) be the second der
Hide and Seek with Scooter In a court of law, everyone is entitled to the presumption of innocence, but there was a moment during the trial of I. Lewis “Scooter” Libby, the vice president’s former chief of staff, when this axiom was seriously shaken. It came during the cross-examination of Debbie Bonds, one of the FBI agents who had questioned Libby. She admitted, “It took a long time to get him to tell us what his first initial stood for.” Libby’s lawyer tried to make a joke of this—“He still won’t tell me,” Ted Wells quipped—but one has to wonder what the jury made of a suspect who wouldn’t come clean on such a simple matter. His first name, by the way, is Irving. As to why he would want to keep this—and so much else—secret is, perhaps, the key to understanding Libby, a man who, despite being one of the most powerful figures in Washington, was unknown to the general public before his indictment. As Slate reporter John Dickerson put it, Libby “represents the other side of the Bush administration: the secret undisclosed side. Like the vice president he works for, Libby prefers to work on policy in the shadows and leave the politics to others.” Well, yes, but that depends on what one means by “politics.” In the run-up to the invasion of Iraq, the president and his team were front and center, serving up the case for war, while Cheney and Libby, in their shadowy kitchen, were cooking the intelligence and beating back the CIA’s efforts to throw out their recipe. An anonymous Cheney aide told the Washington Post during the investigation’s early stages that the vice president’s involvement in the leaking of CIA agent Valerie Plame’s name was “‘implausible’ . . . because he rarely if ever involved himself in press strategy.” Libby’s trial has shown this up as pure malarkey. Working behind the scenes, Cheney and Libby sought to manipulate the media coverage of their war propaganda, with the vice president himself taking an active role—via Scooter—in distributing “talking points” to his underlings. As Special Counsel Patrick Fitzgerald has invested so much time and effort showing with a parade of witnesses—including Ari Fleischer, former White House press secretary, and Cathie Martin, former communications director for the vice president’s office—one aspect of this, amounting almost to an obsession, was the pushback against former Amb. Joseph Wilson, husband of Valerie Plame. According to the defense team, however, Wilson was just “a sliver,” a minor irritant, and didn’t merit much attention. Yet testimony reveals daily discussions about Wilson and efforts to shape a convincing response —personally directed by the vice president. On one occasion, Cheney dictated a script for Scooter to read to reporters asking about the Wilson matter, and, after doing so, the vice president’s loyal consigliere dutifully spread the news of Plame’s CIA affiliation. Whether this was a freelancing innovation by Scooter or a deed done at the direction of the vice president is the question hanging over this trial. And it is likely to come up, at least by implication, in Fitzgerald’s cross-examination of Cheney, if and when that comes to pass. Washington Post columnist David Ignatius writes that what the Libby trial reveals is “a failed cover up”—but what did Libby and Cheney have to hide? What’s being covered up here—albeit not for long—looks very much like the deliberate falsification of the “intelligence” that sparked the Iraq War. The office of the vice president was the headquarters of this campaign, which led to the outing of a CIA agent. Cheney’s consistent involvement in the day-to-day details of the cover-up is potentially the most explosive issue to come out of Libby’s trial. It all started in the early months of 2002, when the vice president received uncorroborated reports that the Iraqis were trying to buy uranium from the African nation Niger. Cheney made inquiries to the CIA, and they duly investigated. Langley was skeptical; the Defense Intelligence Agency, the Pentagon’s own spook factory, was more enthusiastic about the allegations, and the Niger uranium issue became a major bone of contention between the CIA and the neoconservatives within the administration who were pushing for war. A heated intra-bureaucratic battle ensued, with the CIA debunking the Niger uranium “intelligence” and the vice president’s office energetically defending it. George Tenet, then CIA director, personally intervened to get the “talking points” removed from the president’s public utterances, but the persistent efforts of the War Party paid off: in his 2003 State of the Union address, Bush stated unequivocally that the Iraqis had tried to procure yellowcake uranium from “an African nation,” citing the British as the source. The real source, however, was a cache of dubious documents that had been obtained from an Italian wheeler-dealer named Rocco Martino, sanitized by SISMI, the Italian intelligence service, and stovepiped to Washington. These documents piqued the vice president’s interest—he was, after all, always on the lookout for fresh evidence of Iraq’s alleged weapons of mass destruction—and so Joe Wilson was sent to Niger, where he found zero evidence that Iraq had obtained yellowcake from this source. When Wilson heard the president utter those infamous “16 words,” he went public with his first-hand knowledge that the Niger uranium charges were bogus. Also bogus, as it turned out, were the documents that started it all: when the International Atomic Energy Agency obtained the originals, it took only a few hours to determine that they were crude forgeries. Who was to blame for the “mistake”? All indications point to the office of the vice president. Cheney and Libby claim never to have received Wilson’s report or any indication that the CIA questioned the authenticity of the Niger uranium “intelligence.” But one of the benefits of the Libby trial is that previously classified documents have been dumped into the public domain. Notable among them is a CIA memo dated June 9, 2003, which shows that the Agency published a Senior Power Executive Intelligence Brief on Feb. 14, 2002, casting serious doubt on the alleged Niger-Iraq deal. Cheney certainly saw this brief, yet he and Scooter continued to push the Niger story. This is about much more than a cover up—the issue is nothing less than the integrity of the U.S. intelligence-gathering process. Cheney and Scooter reportedly made many trips to Langley, pressuring senior analysts into drawing the “right” conclusions about Iraq’s WMD and especially Saddam’s alleged nuclear program. Yet the Niger uranium affair suggests more than mere meddling. It originated, after all, in forged documents. Someone was trying to pull the wool over the eyes of the Americans. Did that someone include the vice president? However these fakes crept into the U.S. intelligence stream and ended up being cited by the president, the perpetrators would be sure to go after Wilson, whose New York Times op-ed shined the spotlight on a dark corner of the intelligence-gathering process. They would have found it necessary to discredit Wilson and close off any public inquiry into how the Niger allegations were—or were not—verified. Outing Wilson’s wife was part of the game plan: the idea was to not only tar him with nepotism but to intimidate anyone else from coming forward with damning evidence of faked intelligence. In lifting this rock, Fitzgerald has exposed a nest of normally nocturnal creatures who cannot long survive the light. A parade of prosecution witnesses and declassified documents have proved 1) the administration was warned about tall tales of deals between Iraq and Niger’s closely-monitored uranium consortium, 2) the vice president’s office, with Libby leading the charge, was out to discredit the leading critic of this line, Joe Wilson, and 3) Libby lied when he told a grand jury that he had heard of Plame’s CIA connection from journalists. On this last point, seven individuals—a former undersecretary of state, the former No. 3 official at the CIA, Cheney’s former spokeswoman, Libby’s daily CIA briefer, a former White House press secretary, and two prominent journalists—have all testified that Libby told them about Plame’s employment at the CIA before he spoke to Tim Russert, whom he originally claimed was his source. The Libby defense—that he forgot all these conversations and heard about Plame’s job “as if for the first time” from Russert—is absolutely unbelievable. (He later recollected, under FBI questioning, that “he first learned of Plame from the Vice President.”) In announcing Libby’s indictment, Fitzgerald said, “If you saw a baseball game and you saw a pitcher wind up and throw a fastball and hit a batter right smack in the head, and it really, really hurt them, you’d want to know why the pitcher did that.” Libby was charged not with outing Plame but with lying to the grand jury because “What we have when someone charges obstruction of justice, the umpire gets sand thrown in his eyes. He’s trying to figure what happened and somebody blocked their view.” The umpire’s view has been at least partially unblocked by the Libby trial. Whether this new clarity brings more indictments, and a further probe into the Niger uranium fiasco, remains to be seen—but the possibility looms. _______________________________
Q: take rgb string convert to decimal i have string 'rgb(255,0,0)' and need to get array of decimals. The following snippet seems to give me the desired results. Any suggestions, concerns, better ways? var arrRGB = pagedefault.nodelist.style.color.match(/\d+/g); //gives me ["255","0","0"] arrRGB[0] = Number(arrRGB[0]) / 255; arrRGB[1] = Number(arrRGB[1]) / 255; arrRGB[2] = Number(arrRGB[2]) / 255; A: 'rgb(255,0,0)'.match(/\d+/g).map(Number) // ==> [255, 0, 0] works if you have a map implemenation. A: I would wrap part of the logic in a for loop: var arrRGB = pagedefault.nodelist.style.color.match(/\d+/g); for (var i = 0; i < arrRGB.length; i++) { arrRGB[i] = Number(arrRGB[i]) / 255; } Otherwise, this looks fine.
Q: object 'panel.bpplot' not found error in R I'm fairly new to R and I'm trying to create a lattice bwplot, however I'm getting an error saying object 'panel.bpplot' not found. I have tried using the following example from R documentation: set.seed(13) x <- rnorm(1000) g <- sample(1:6, 1000, replace=TRUE) x[g==1][1:20] <- rnorm(20)+3 # contaminate 20 x's for group 1 # default trellis box plot require(lattice) bwplot(g ~ x) bwplot(g ~ x, panel=panel.bpplot, probs=seq(.01,.49,by=.01), datadensity=TRUE) The result is that the first plot is created (bwplot(g ~ x)), but when second one tries to run I get: Error in bwplot.formula(g ~ x, panel = panel.bpplot, probs = seq(0.01, : object 'panel.bpplot' not found Any help will be very much appreciated! A: panel.bpplot is function of package Hmisc, so you need to attach this package before plotting. library(Hmisc) bwplot(g ~ x, panel=panel.bpplot, probs=seq(.01,.49,by=.01), datadensity=TRUE)
In the United States Court of Federal Claims OFFICE OF SPECIAL MASTERS No. 15-933V (not to be published) ************************* Special Master Corcoran JOYCE WINTERFELD, * * Petitioner, * Filed: March 9, 2018 * v. * Decision; Final Fees and Costs. * SECRETARY OF HEALTH * AND HUMAN SERVICES, * * Respondent. * * ************************* Paul R. Brazil, Muller Brazil, LLP, LLC, Dresher, PA, for Petitioner. Debra A. Filteau Begley, U.S. Dep’t of Justice, Washington, DC, for Respondent. DECISION GRANTING A FINAL AWARD OF ATTORNEY’S FEES AND COSTS1 On August 26, 2015, Joyce Winterfeld filed a petition seeking compensation under the National Vaccine Injury Compensation Program (“Vaccine Program”).2 Petitioner alleges that she suffered from brachial neuritis and/or a shoulder injury as a result of receiving the influenza vaccine on October 16, 2014. The parties ultimately agreed that the issues before them could be informally resolved and submitted a stipulation for damages on December 7, 2017, which I adopted by decision that same day (ECF No. 38). 1 Although this Decision has been formally designated “not to be published,” it will nevertheless be posted on the Court of Federal Claims’s website in accordance with the E-Government Act of 2002, 44 U.S.C. § 3501 (2012). This means the Decision will be available to anyone with access to the internet. As provided by 42 U.S.C. § 300aa- 12(d)(4)(B), however, the parties may object to the Decision’s inclusion of certain kinds of confidential information. Specifically, under Vaccine Rule 18(b), each party has fourteen days within which to request redaction “of any information furnished by that party: (1) that is a trade secret or commercial or financial in substance and is privileged or confidential; or (2) that includes medical files or similar files, the disclosure of which would constitute a clearly unwarranted invasion of privacy.” Vaccine Rule 18(b). Otherwise, the Decision in its present form will be available. Id 2 The Vaccine Program comprises Part 2 of the National Childhood Vaccine Injury Act of 1986, Pub. L. No. 99-660, 100 Stat. 3758, codified as amended at 42 U.S.C. §§ 300aa-10 through 34 (2012) [hereinafter “Vaccine Act” or “the Act”]. Individual section references hereafter will be to § 300aa of the Act (but will omit that statutory prefix). Petitioner has now filed a motion requesting final attorney’s fees and costs, dated February 15, 2018. See Motion for Attorney’s Fees, dated Feb. 15, 2018 (ECF No. 43) (“Fees App.”). Petitioner requests reimbursement of attorney’s fees and costs in the total amount of $28,025.94 (representing $19,987.00 in attorney’s fees, plus $8,038.94 in costs). Id. at 2. In accordance with General Order No. 9, Petitioner indicated that she has not incurred any costs related to the matter. Id. at 2.3 Respondent filed a document reacting to the fees request on February 27, 2018, stating that she is satisfied that the statutory requirements for an award of attorney’s fees and costs are met in this case, but deferring to my discretion the determination of the amount to be awarded. ECF No. 44 at 2-3. Determining the appropriate amount of an award of reasonable attorney’s fees is a two-part process. The first part involves application of the lodestar method – “multiplying the number of hours reasonably expended4 on the litigation times a reasonable hourly rate.” Avera v. Sec’y of Health & Human Servs., 515 F.3d 1343, 1347-48 (Fed. Cir. 2008) (quoting Blum v. Stenson, 465 U.S. 886, 888 (1984)). The second part involves adjusting the lodestar calculation up or down to take relevant factors into consideration. Avera, 515 F.3d at 1348. This standard for calculating a fee award is considered applicable in most cases where a fee award is authorized by federal statute. Hensley v. Eckerhart, 461 U.S. 424, 429-37 (1983). Petitioner asks that counsel, Mr. Paul Brazil, his associates, and paralegals be reimbursed at varying rates for work performed from 2015-2018. Petitioner requests $245 per hour for Mr. Brazil’s work in 2015, with increases to $255 per hour in 2016, $275 per hour in 2017, and $300 per hour in 2018. See Fees App. at 1. Petitioner also requests that associates (Ms. Amy Senerth 3 Although Petitioner stated in her fees application that she did not incur any personal costs associated with this matter pursuant to General Order No. 9, she did not file the physical form required. I nevertheless deem Petitioner to have waived any additional costs not otherwise requested herein. 4 An attorney’s reasonable hourly rate is more precisely understood to be the “prevailing market rate” in the relevant forum. Avera, 515 F.3d at 1349; Rodriguez v. Sec’y of Health & Human Servs., No. 06-559V, 2009 WL 2568468, at *2 (Fed. Cl. Spec. Mstr. July 27, 2009), mot. for rev. denied, 91 Fed. Cl. 453 (2010), aff’d, 632 F.3d 1381 (Fed. Cir. 2011). That rate is in turn determined by the “forum rule,” which bases the award rate on rates paid to similarly qualified attorneys in the forum where the relevant court sits (Washington, D.C., for Vaccine Program cases). Avera, 515 F.3d at 1348. After the hourly rate is determined, the reasonableness of the total hours expended must be considered. Sabella, 86 Fed. Cl. at 205-06. This reasonableness inquiry involves consideration of the work performed on the matter, the skill and experience of the attorneys involved, and whether any waste or duplication of effort is evident. Hensley, 461 U.S. at 434, 437. In some cases, determining the proper hourly rate for a particular attorney requires consideration of whether there is a significant disparity between the forum rate applicable to the Vaccine Program generally and the geographic forum in which the attorney practices, in order to adjust the rate used for the lodestar calculation. Avera, 515 F.3d at 1349, (citing Davis County Solid Waste Mgmt. & Energy Recovery Special Serv. Dist. v. EPA, 169 F.3d 755, 758 (D.C. Cir. 1999)). 2 and Mr. Clark Hodgson) both be compensated at a rate of $225 per hour for work completed in 2017. Id. Finally, she also requests $125 per hour for the work of four paralegals completed in 2015-2018. Id. In my past decisions, I have determined that Muller Brazil, LLP is entitled to forum rates. See, e.g., Colagreco v. Sec’y of Health & Human Servs., No. 14-465V, 2016 WL 6518579 (Fed. Cl. Spec. Mstr. Sept. 26, 2016). This determination is also consistent with decisions issued by other special masters. See, e.g., Tyree v. Sec’y of Health & Human Servs., No. 16-586V, 2017 WL 4707720 (Fed. Cl. Spec. Mstr. Mar. 23, 2017); Griffis v. Sec’y of Health & Human Servs., No. 15- 483V, 2017 WL 694538 (Fed. Cl. Spec. Mstr. Jan. 25, 2017). The hourly rates awarded to Mr. Brazil, his associates, and his paralegal in the above decisions are the same as those requested herein, and I will likewise award them. Furthermore, Mr. Brazil’s requested increase to $300 per hour for work completed in 2018 is reasonable and consistent with the form rate chart set forth on the Court of Federal Claims’s website,5 and will be awarded. Petitioner also requests that counsel be reimbursed for $8,038.94 in costs (representing the filing fee, medical records requests, postage costs, and an expert consult with Dr. Lawrence Steinman). Fees App. at 16. According to the fees application, Petitioner requests that Dr. Steinman be compensated at a rate of $500 per hour for 14.5 hours of work (representing a total of $7,250.00 for expert services rendered). Id. at 27. I have awarded Dr. Steinman a rate of $500 per hour in my past decisions. See Chynoweth v. Sec’y of Health & Human Servs., No. 13-721V, 2017 WL 6892900, at *3 (Fed. Cl. Spec. Mstr. Oct. 30, 2017); Auch v. Sec’y of Health & Human Servs., No. 12-673V, 2017 WL 1718783, at *4 (Fed. Cl. Spec. Mstr. Apr. 5, 2017). The requested rate of $500 per hour has also been awarded by other special masters. See Rosof v. Sec'y of Health & Human Servs., No. 14–766V, 2017 WL 1649802, at *4 (Fed. Cl. Spec. Mstr. Mar. 31, 2017); Brown v. Sec'y of Health & Human Servs., No. 09–426V, 2012 WL 952268, at *10–11 (Fed. Cl. Spec. Mstr. Feb. 29, 2012). I will therefore compensate Dr. Steinman in full for his work on this matter. Upon my review of the billing record, the hours expended on this matter by counsel appear to be reasonable, and Respondent did not identify any entries as objectionable. Thus, I will reimburse counsel and his associates in full for their work on this matter. Furthermore, the requested litigation costs are reasonable and will be awarded in full. Accordingly, in the exercise of the discretion afforded to me in determining the propriety of interim fees awards, and based on the foregoing, I GRANT Petitioner’s Motion for Final 5 See Office of Special Masters Attorneys’ Hourly Rate Fee Schedule: 2018, https://www.uscfc.uscourts.gov/node/2914 (last accessed on Mar. 9, 2018). 3 Attorney’s Fees and Costs, and award a total of $28,025.94, in the form of a check jointly payable to Petitioner and Petitioner’s counsel, Mr. Paul Brazil, Esq. In the absence of a motion for review filed pursuant to RCFC Appendix B, the clerk of the court SHALL ENTER JUDGMENT in accordance with the terms of this decision.6 IT IS SO ORDERED. s/ Brian H. Corcoran Brian H. Corcoran Special Master 6 Pursuant to Vaccine Rule 11(a), the parties may expedite entry of judgment if (jointly or separately) they file notices renouncing their right to seek review. 4
function v = getversion %GETVERSION return MATLAB version number as a double. % GETVERSION determines the MATLAB version, and returns it as a double. This % allows simple inequality comparisons to select code variants based on ranges % of MATLAB versions. % % As of MATLAB 7.10, the version numbers are listed below: % % MATLAB version getversion return value % ------------------------------- ----------------------- % 7.10.0.499 (R2010a) 8.0 (this needs to be fixed). % 7.9.0.529 (R2009b) 7.9 % 7.8.0.347 (R2009a) 7.8 % 7.7.0.xxx (R2008b) 7.7 % 7.6.0.324 (R2008a) 7.6 % 7.5.0.342 (R2007b) 7.5 % 7.4.0.287 (R2007a) 7.4 % 7.3.0.267 (R2006b) 7.3 % 7.2.0.232 (R2006a) 7.2 % 7.1.0.246 (R14) Service Pack 3 7.1 % 7.0.4.365 (R14) Service Pack 2 7.04 % 7.0.1.24704 (R14) Service Pack 1 7.01 % 6.5.2.202935 (R13) Service Pack 2 6.52 % 6.1.0.4865 (R12.1) 6.1 % ... % 5.3.1.something (R11.1) 5.31 % 3.2 whatever 3.2 % % Example: % % v = getversion ; % if (v >= 7.0) % this code is for MATLAB 7.x and later % elseif (v == 6.52) % this code is for MATLAB 6.5.2 % else % this code is for MATLAB versions prior to 6.5.2 % end % % This getversion function has been tested on versions 6.1 through 7.10, but it % should work in any MATLAB that has the functions version, sscanf, and length. % % MATLAB 7.10 adds a twist. It is the first subversion that is 2 digits % ("10"). I need to decide how to handle this case. I can't return 7.1, % of course. But returning 8.0 is also problematic. % % See also version, ver, verLessThan. % Copyright 2007, Timothy A. Davis % This function does not use ver, in the interest of speed and portability. % "version" is a built-in that is about 100 times faster than the ver m-file. % ver returns a struct, and structs do not exist in old versions of MATLAB. % All 3 functions used here (version, sscanf, and length) are built-in. v = sscanf (version, '%d.%d.%d') ; v = 10.^(0:-1:-(length(v)-1)) * v ;
On Benchmarking of Automated Methods for Performing Exhaustive Reaction Path Search. In recent years, the importance of computational chemistry approaches has grown rapidly because of recent advances in computational software and hardware. Automated reaction path search is one of the promising techniques which would allow exploration of unknown chemistry using computers. Several methods have been developed so far, and comparison of the performance of existing methods would be a subject of interest to many chemists. In this paper, we present the performance of our single-component artificial force induced reaction method (SC-AFIR) to rectify the result shown in a recent report [ Grambow et al. J. Am. Chem. Soc. 2018 , 140 , 1035 - 1048 ] on the performance of the SC-AFIR method compared to four other methods. We discuss the flaws in their benchmark procedure and our thoughts on benchmarking of automated reaction path search methods.
The federal government has significantly expanded undercover operations in recent years, with officers from at least 40 agencies posing as business people, welfare recipients, political protesters and even doctors or ministers to ferret out wrongdoing, records and interviews show. . . . Undercover work, inherently invasive and sometimes dangerous, was once largely the domain of the F.B.I. and a few other law enforcement agencies at the federal level. But outside public view, changes in policies and tactics over the last decade have resulted in undercover teams run by agencies in virtually every corner of the federal government, according to officials, former agents and documents. . . . Some agency officials say such operations give them a powerful new tool to gather evidence in ways that standard law enforcement methods do not offer, leading to more prosecutions. But the broadened scope of undercover work, which can target specific individuals or categories of possible suspects, also raises concerns about civil liberties abuses and entrapment of unwitting targets. It has also resulted in hidden problems, with money gone missing, investigations compromised and agents sometimes left largely on their own for months. U.S. Justice Department officials have said that despite the setbacks, the use of aggressive law enforcement tactics would continue. Last September, Marshall L. Miller, the deputy chief of the Justice Department’s criminal division, said wiretaps, body wires and physical surveillance “have become a staple in our white collar investigations. I can promise you we will continue to use them.” Among other things, Freeman assisted prosecutors by recording conversations with Longueuil. This led to some extraordinary evidence for prosecutors such as a now-famous recorded statement by Longueuil about how he disposed of an incriminating “log” of insider information that was on a USB flash drive. Longueuil said he took two pairs of pliers, and then you rip it open. Pulled the external drives apart. … Put ’em into four separate little baggies, and then at 2 a.m. … 2 a.m. on a Friday night, I put this stuff inside my black North Face … jacket, … and leave the apartment and I go on like a 20 block walk around the city … and try to find a, a garbage truck … and threw the sh*t in the back of like random garbage trucks, different garbage trucks … four different garbage trucks. The good old days. As a point of personal privilege, I may be excused for cheering the vigor with which federal law-enforcement treats a Joseph A. Bank-wearing white-collar employee as though she or he were an ISIS-trained Bonnie or Clyde. Such an approach generates more work for me and my fellow white-collar defense lawyers. There is much to be said for that prospect. As a policy matter, however, what is the significance of the use of traditional organize crime techniques against business people? And what is the significance of this phenomenon for those people and the businesses they try to advance? There are doubtless multiple significant – and, as yet, unknowable – aspects to this practice. The most obvious aspect, however, is the continued erosion of the distinction between violent and nonviolent crime for purposes of investigation, indictment and sentencing. When a prosecutor – or any lawyer – uses the same tool in Case A and Case B, by definition he or she sees those two cases to be substantively and procedurally analogous. (Otherwise, it would be a waste of time to use the same two in both cases). In light of the power that a federal prosecutor wields, the erosion of that distinction can lead to an overbroad reading of the criminal statutes and related regulations. Many of those statutes are already broad, indecipherable and protean by virtue of the fact that Congress drafted them. What crime shall we define this evening? In that regard, political bloodlust that can arise on certain topics. Child pornography is one. Crime-in-the-suites is another. Political bloodlust is an important aspect of our consideration of the application of organized crime investigatory techniques to business offenses. Being “tough on crime” is rarely a political loser; being tough on sound-bites and abstractions such as “Wall Street,” “bankers” or “polluters” is equally attractive to federal legislators. In addition, the erosion of the distinction is cheered on by the most sophisticated members of the plaintiffs’ bar as well as by single-issue activists who otherwise would have little or nothing to do with the criminal law. So what? If a tool can investigate and prevent one type of crime, why not apply it to another type of crime? Why should a white-collar defendant get a pass from the rough-and-tumble techniques used on Banjo the Meth Dealer? In any event, one might argue, there are safeguards already in place with regard to these techniques, without regard to the subjects of the investigation. In other words, why is Sharman so wrapped around the axle on this question? Unwrapping myself from the axle, I identify at least four separate problems here. First, erosion of the distinction between street crime and “suite crime” skews the selection of cases to prosecute. In particular, questions of intent with regard to street crime, while certainly present, rarely pose the same kinds of nuances and knotty problems that the question of intent presents in white-collar cases. Second, as illustrated by the Wall Street Journal article, erosion of the distinction implicates the attorney-client privilege: Within the Treasury Department, undercover agents at the I.R.S., for example, appear to have far more latitude than do those at many other agencies. I.R.S. rules say that, with prior approval, “an undercover employee or cooperating private individual may pose as an attorney, physician, clergyman or member of the news media.” An I.R.S. spokesman acknowledged that undercover investigators are allowed to pose in such roles with approval from senior officials. But the agency said in a statement that senior officials “are not aware of any investigations where special agents have ever posed as attorneys, physicians, members of the clergy or members of the press specifically to gain information from a privileged relationship.” The agency declined to say whether I.R.S. undercover agents have posed in these roles in an effort to get information that was not considered “privileged,” meaning the type of confidential information someone shares with a lawyer or doctor. Giving advice. Banjo the Meth Dealer may have “counselors,” but they are likely to be chosen because they are armed, inked and loyal, rather than for their legal advice. (Of those three qualities, I claim one but decline to identify it). When a company’s general counsel videos his CEO; when IRS agents can permissibly pose as attorneys; or when HHS OIG agents as physicians, we have entered a world that is deeply threatening to perhaps the oldest privilege in Anglo-American law. Third, the proliferation of undercover agents and secret monitoring can result in a bitter comedy of errors. The Journal, again: Across the federal government, undercover work has become common enough that undercover agents sometimes find themselves investigating a supposed criminal who turns out to be someone from a different agency, law enforcement officials said. In a few situations, agents have even drawn their weapons on each other before realizing that both worked for the federal government. One is put in mind of the fine mob movie The Departed with Jack Nicholson and Leonard DiCaprio, in which Nicholson’s character (somewhat reminiscent of Whitey Bulger) has a gang in which almost everyone is working for a state or federal agency: Fourth, sound discretion and public perceptions of justice are skewed when federal investigatory entities get at least a portion of their funding from successful undercover activity and other secret operations. This system, even with some checks and balances, is not an incentive but, rather, an outright bounty. Not your lawyer, hopefully. You can always follow our advice about preserving the attorney-client privilege. Barring a political and technological sea-change, however, there is no reason American companies should expect that the government’s hunger to use mob-oriented techniques in the business context will abate any time soon.
/* * Copyright (c) 2002, 2018 Oracle and/or its affiliates. All rights reserved. * * This program and the accompanying materials are made available under the * terms of the Eclipse Public License v. 2.0, which is available at * http://www.eclipse.org/legal/epl-2.0. * * This Source Code may also be made available under the following Secondary * Licenses when the conditions for such availability set forth in the * Eclipse Public License v. 2.0 are satisfied: GNU General Public License, * version 2 with the GNU Classpath Exception, which is available at * https://www.gnu.org/software/classpath/license.html. * * SPDX-License-Identifier: EPL-2.0 OR GPL-2.0 WITH Classpath-exception-2.0 */ package com.sun.s1asdev.ejb.ejb30.hello.session2full; import jakarta.ejb.EJBException; import jakarta.ejb.SessionBean; import jakarta.ejb.CreateException; import jakarta.ejb.SessionContext; import javax.naming.InitialContext; import jakarta.transaction.TransactionManager; import jakarta.transaction.Status; import java.util.Collection; import java.util.Iterator; public class SlessEJB2 implements Sless, SessionBean { private SessionContext sc_ = null; public String hello() { System.out.println("In SlessEJB2:hello()"); try { sc_.getUserTransaction(); throw new EJBException("should have gotten exception when accessing SessionContext.getUserTransaction()"); } catch(IllegalStateException ise) { System.out.println("Got expected exception when accessing SessionContext.getUserTransaction()"); } return "hello from SlessEJB2"; } public String hello2() throws jakarta.ejb.CreateException { throw new jakarta.ejb.CreateException(); } public String getId() { try { // Proprietary way to look up tx manager. TransactionManager tm = (TransactionManager) new InitialContext().lookup("java:appserver/TransactionManager"); // Use an implementation-specific check to ensure that there // is no tx. A portable application couldn't make this check // since the exact tx behavior for TX_NOT_SUPPORTED is not // defined. int txStatus = tm.getStatus(); if( txStatus == Status.STATUS_NO_TRANSACTION ) { System.out.println("Successfully verified tx attr = " + "TX_NOT_SUPPORTED in SlessEJB2::getId()"); } else { throw new EJBException("Invalid tx status for TX_NOT_SUPPORTED" + " method SlessEJB2::getId() : " + txStatus); } } catch(Exception e) { e.printStackTrace(); throw new EJBException(e); } return "SlessEJB2"; } public Sless roundTrip(Sless s) { System.out.println("In SlessEJB2::roundTrip " + s); System.out.println("input Sless.getId() = " + s.getId()); return s; } public Collection roundTrip2(Collection collectionOfSless) { System.out.println("In SlessEJB2::roundTrip2 " + collectionOfSless); if( collectionOfSless.size() > 0 ) { Sless sless = (Sless) collectionOfSless.iterator().next(); System.out.println("input Sless.getId() = " + sless.getId()); } return collectionOfSless; } public void ejbCreate() { System.out.println("In SlessEJB2::ejbCreate()"); } public void setSessionContext(SessionContext sc) { sc_ = sc; } public void ejbRemove() {} public void ejbActivate() {} public void ejbPassivate() {} }
// Copyright (c) 2013-present, Facebook, Inc. All rights reserved. // This source code is licensed under both the GPLv2 (found in the // COPYING file in the root directory) and Apache 2.0 License // (found in the LICENSE.Apache file in the root directory). // // Copyright (c) 2011 The LevelDB Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. See the AUTHORS file for names of contributors. #ifndef __STDC_FORMAT_MACROS #define __STDC_FORMAT_MACROS #endif #ifndef GFLAGS #include <cstdio> int main() { fprintf(stderr, "Please install gflags to run rocksdb tools\n"); return 1; } #else #include "db_bench_tool.h" int main(int argc, char** argv) { return rocksdb::db_bench_tool(argc, argv); } #endif // GFLAGS
Q: VueJS user permissions when using Azure AD I'm working on a Vue Js Application with Netcore 2.0 and Azure AD for Authentication, I already Add Authentication to my app and I'm using authorization to allow access to to the different controllers of my API. My HomeController is using the Authorize method which forces all users to log in using their Ad Credentials. My Question from my Vue app how can I say If this user is in X group not show this option on the menu or do not allow access to this view. Any good examples of an Authorization service. StartUP.cs .AddMvc(); services.AddAuthorization(options => { } HomeController Example //[Microsoft.AspNetCore.Authorization.Authorize] public class HomeController : Controller { public IActionResult Index() { return View(); } public IActionResult Error() { return View(); } } Router JS Example (How can I filter if the user is not "basusers" not show admin menu and not give access.) export const routes = [ nent: Application } ] A: You can control routing conditionally using navigation guards. Look here: https://router.vuejs.org/guide/advanced/navigation-guards.html On a given page, Vue template elements are controlled by the 'v-if' statement, which points either to a data item in your script or to a computed property: <template> <div v-if="authorized">User authorized</div> </template> in your script, e.g.: data: function() { return { authorized }}, So, what's left to do is to set 'authorized' to true or false, based on the authorization query result. You can control properties, as well: <template> <button @click="..." :disabled="!authorized">Go Authorized</button> </template> This would disable the button unless 'authorized' is true. Group membership you might want to use a computed property, instead: <template> <button @click="..." :disabled="inGroup('group1')">Group 1 Members</button> </template> Script: data: function() {return { myGroups: ['group1', 'group2'] }}, computed: { function inGroup(queryGroup) { return queryGroup in groups; } }
Associations between vascular calcification, arterial stiffness and bone mineral density in chronic kidney disease. Vascular calcification (VC) and arterial stiffness are major contributors to cardiovascular (CV) disease in chronic kidney disease (CKD). Both are independent predictors of CV mortality and are inversely correlated with bone mineral density (BMD). Few studies have addressed the extent of VC in the pre-dialysis CKD population, with associated measurements of BMD and arterial compliance. We report cross-sectional data on 48 patients with CKD (GFR 17-55 ml/min) assessing the prevalence of VC and its associations. All patients had computed tomography (CT) scans through abdominal aorta and superficial femoral arteries (SFAs) to determine VC, pulse wave velocity (PWV) using SphygmoCor device (AtCor PWV Inc., Westmead, Australia) measuring arterial stiffness, and dual-energy X-ray absorptiometry (DEXA) scans to determine BMD, as well as serum markers of renal function and mineral metabolism. Patients, 71% male, 54% diabetic, had a median age 64.5 years. Mean estimated GFR was 35.1 +/- 10 ml/min. Mean PWV was 10.0 +/- 4.5 m/s and mean aortic VC score was 421.5 +/- 244 Hounsfield units, with 90% of subjects having some aortic VC present. In univariate linear regression analysis, aortic VC correlated positively with age (r 0.50, P < 0.001), triglycerides (r 0.47, P = 0.002) and PWV (r 0.33, P = 0.03). There was also greater VC with declining renal function (r -0.28, P = 0.05). There was no significant association between VC and serum markers of mineral metabolism, however phosphate and Ca x P correlated positively with PWV (r 0.35, P = 0.02, r 0.36, P = 0.02, respectively). There was also a positive association between PWV and triglycerides (P = 0.008), and a trend towards greater PWV with increasing age (P = 0.09). In multivariate regression analysis only increasing age and triglyceride levels were significantly associated with aortic VC and PWV. Mean spine and femoral T-scores on DEXA were 0.48 and -1.31 respectively, with 13% of subjects having femoral T-score <-2.5 (osteoporotic range). SFA VC inversely correlated with femoral T-scores (r -0.43, P = 0.004); however, there was a positive (likely false) association between spine T-scores and aortic VC (r 0.37, P = 0.01), related to the limitation of vertebral DEXA in CKD. There is a high prevalence of VC in pre-dialysis CKD patients, worse with increasing age, triglycerides and reducing renal function. Correlation exists between VC and PWV and determination of one or both may be useful for CKD patient CV risk assessment. Femoral BMD is inversely associated with SFA VC, but measurement of vertebral BMD by DEXA is unreliable in CKD patients with aortic VC.
kianross3's website Subtitle Dragon City Breeding Guide Breeding dragons may be time-consuming as each breeding period and egg hatching requires time. Most tier 2 types require at least 8 hours or maybe more for breeding and hatching. Ideally, you will need to begin getting the tier 3 dragons right away. That way, after you have two tier 3 dragons much like the gummy or soccer, you can begin targeting towards popular. Generation(Tier) 1 These include your basic dragons. There's a total of 8 elements. There're Terra, Flame, Water, Nature, Electric, Ice, Metal and Dark. The ice, metal and dark will probably be harder for getting because that you'll want to get to an advanced level to create their habitats. Generation 2 You have tier 2 after you breed two tier 1 from generation 1. Such as, in case you breed a this page with an ice dragon, we have a chance you will definitely get dandelion or mojito dragon. Tier 2 types must breed tier 3 dragons. Generation 3 You will discover primarily six tier 3 dragons. These tier 3 types can not be breed right from tier 1 type. If you try to reproduce a flame with ice, it certainly can't enable you. So, what will you must do should be to breed a tier 1 that has a tier 2 dragon to find the best chances to acquire one of them rare dragons. To breed a tier 3 type, make use of a tier 2 dragon with more then one a similar element and breed it while using primary element of the tier 1 dragon. By way of example, Gummy dragon contains the element of electric and nature. To offer the best probabilities of setting it up, you will require: Star Dragon(Terra + Electric) + Nature Dragon Alternatively, it's also possible to use another comb such as the Neon (Electric + Dark) and Nenufar (Water + Nature). This can take more tries with there being more possible combinations. Generation 4 These are the basic rare legendary dragons you could breed using tier 3 types. It's going to take you use 4 days to acquire them. That has 48 hours of breeding and a pair of times of hatching. Ideally, you really need to breed the tier 3 many times to get one of those dragons. There is a total of four tier 4 types plus they are legendary, mirror, crystal and wind. They are not only powerful, they are only weak to their own personal kind. Generation 5 To get these, you will need two tier 4 types to breed one of these simple. They are as powerful because tier 4 and you could also breed pure element dragons by breeding the pure dragon having a tier 1 dragon. If you want the total breeding list, please evaluate the Dragon City Egg website.
Category: Faith I know this sounds pretty gloomy, but your life is ending. That’s one thing we all know for sure. Death is inescapable. It’s something I’ve been thinking a lot about lately… not necessarily death, but rather the time we have here on earth between conception and the day we breath our last breath. So I’ve been thinking about life actually and the limited time we spend living it. Time is precious, no doubt, and we never know when ours is going to end. We get one chance at life to do whatever we are going to do and with every passing moment we will never get that time back again. Unless you’re Dr. Strange or Superman, you can’t rewind time and have a do-over. Knowing that my time is limited, I started thinking about how I’ve spent my 35 years on earth so far. I also asked myself, “If I die today, would I be able to look back at my life and be truly satisfied with how I spent my years here?” Right now the answer would be “no” and it may always be no, but that’s what will keep me striving for greatness. I would love for everyone to be able to answer these questions for themselves: If I die today, would I be able to look back at my life and be truly satisfied with how I spent my years here? If the answer to the above question is “yes,” then WHY is it “yes?” If the answer to the above question is “no,” then what can you do to live a life that you’d be satisfied with? What kind of legacy to you want to leave? Do you want to be remembered as a world-class spouse who became an example to other married couples, which strengthen the Sacrament of Marriage? Do you want to be remembered as a world-class parent who sets the bar for other parents strive to hit? Tell me if this doesn’t sober you up: Do you want your mark on this earth to be gravestone and some cloudy memories of you, which will die with the people you experienced those memories with? “You can‘t leave footprints in the sands of time if you‘re sitting on your butt. And who wants to leave buttprints in the sands of time?” The question is, what are you going to do with the time you’re given and with the rest of the sand in the hour glass. This is the BEST video that I have found which stresses this point. Take 5 minutes out of your day to watch it: Like this: A little over a week ago I began reading a book that has been sitting on my bookshelf for several months and I wish I would’ve opened it up and began reading it earlier. It’s called “Joseph’s Way – A Call To Fatherly Greatness.” In addition to discovering how to become a better father and husband I have been learning a lot about the Scriptures. Here is an example of what I learned in today’s reading: Today’s reading is about the “Listening Heart of Abraham.” In learning how to listen in silence during prayer with the Lord, I have also learned how the Patriarchs did the same. In Genesis 15 Abraham fears that he will die childless and that the servant of his house, Eliezer of Damascus, will be his heir. 2 But Abram said, “Lord GOD, what can you give me, if I die childless and have only a servant of my household, Eliezer of Damascus?” 3 Abram continued, “Look, you have given me no offspring, so a servant of my household will be my heir.” God responds by telling him that Eliezer will not be his heir, but Abraham’s own offspring will be his heir. Then God tests Abraham’s faith. He takes him outside and has him “Look up at the sky and count the stars” if he can and tells him “Just so, He added, will your descendants be.” At this point I, and I’m sure the majority of other Scripture readers imagine Abraham walking outside at night looking up and seeing the stars, BUT that’s not what happened. As today’s reading explains, “Later in the same account, the Scripture discloses that the Lord had actually commanded Abraham to count the stars while it was daylight, which rendered the stars imperceptible. Though Abram could see, he was blind to what existed in the heavens, and yet he gave his assent of faith, believing not in what was seen but what was unseen.” I had never realized this before so I quickly flipped to Genesis 15 to see where it said Abraham looked up at the stars in the daylight and there it was plain as day. Genesis 15:12 reads “As the sun was about to set,” making it clear that it was daylight when God told Abraham to count the stars. God is asking Abraham to have faith in not what is seen, but what is unseen. The reading goes on to say “seeing with his own eyes that he had no offspring, Abram relied upon his eyes of faith, believing in the promise of what was unseen instead of what was seen, and because of this God reckoned it to him as righteousness, for ‘what is seen is temporary, but what is unseen is eternal.'” (2 Corinthians 4:18) “Because of his faith Abraham became the father of many nations, for in view of the promise of God, he did not waver through unbelief, but was strengthened in faith, giving glory to God, being fully aware that whatever God has promised He is able to perform.” I look forward to reading each day’s reading. It’s such an incredible book and I recommend it to every father and husband out there. Like this: Have you ever noticed people (family, friends, co-workers) complain about their circumstances, but they keep living the same old routine day after day? They don’t change anything. They wake up, go to work, come home, eat, watch T.V., go to bed, etc. in hopes that someday and somehow their life will just get better. I have news for those people… it won’t. The hard truth is… if nothing changes then nothing changes. Are you one of those people stuck in the hamster wheel of life? The never ending rut where you find yourself constantly saying “next month we’ll be doing better” and then something else comes up? Ask yourself this question… are you okay if nothing changes? Are you okay if nothing changes? If you answered “yes” to that question then ask yourself the following… If you lost your job, would you still be okay? If not, wouldn’t you think it would be wise to have a “Plan B” income even to give you peace of mind? Is your marriage the best it can be? Are you the best spouse you can be? If not, why don’t you look into ways to improve your marriage? (Marriage conferences, read books on marriage – “The 5 Love Languages” would be a good start, or hang out with couples who’s marriage you would like to emulate) Are you the best parent you can be for your children? Children spell “love” T-I-M-E. Do you give them enough of it or just what’s left over at the end of the day? For things to change, you must change. Nothing is going to change by you “going through the motions” day in and day out. I know because I lived that life. At 32 years of age I was working 18 hours a day trading hours for dollars because there was always too much month at the end of the money. My student loan payments were crippling. Instead of hoping that the government would come to my rescue and bail me out by forgiving my loans, I took personal responsibility for making the choice to borrow the money in the first place, which meant I had to work a second job. Then I lived that 18 hour a day life for years until my friend introduced me to AdvoCare. In the past 3 1/2 years, AdvoCare has helped us eliminate a personal loan, three student loans, and five nearly maxed out credit cards. It’s given us the option to allow my wife to stay home and raise our children. It allows us to have more money to give to causes dear to our heart. It gives us peace of mind that we never even dreamed of until we were surrounded by the culture and the people involved with AdvoCare. If you don’t have a plan to give you more time with your family, eliminate your debt, or a Plan B income to take care of your family if you lose your job then it’s time to make some changes. If not AdvoCare then what’s your plan? If not AdvoCare then that’s okay… just do SOMETHING to better your situation. Like this: Constantly learning about my faith is an absolute love of mine. While many Christians may start and stop at the New Testament, I like to go back and understand the history of our faith. In particular, I like to learn how the ancient Jews understood the Old Testament (or as they call it, the “Tanakh”) and I also love learning all the Old testament and New Testament connections. Understanding how the ancient Jews and the early 1st century Jews understood the Old Testament and knowing their oral and written traditions helps me to better understand my Catholic faith and could help all Christians to know the history of Christianity and why we believe what we believe. Last week my wife and I were listening to the “The Jennifer Fulwiller Show” podcast and she had Dr. Brant Pitre as a guest speaker. If you haven’t heard of him, look him up today. He blows my mind with the biblical knowledge he has. While on the show he revealed some amazing information that Mariah, Jennifer Fulwiller, and I never knew about Jesus and Jonah. The one about Jonah left us in shock and I immediately began researching what he stated and came to find out that he is correct. When it comes to the story of Jonah, I have found that Christians either 1. believe that Jonah lived in the whale for three days and three nights or 2. that the story is made up as some sort of long parable (this is what I have found most Christians believe). I have not met any Christians, including myself, that thought Jonah died in the whale… until now. Before you go frantically looking in your Bible, hold on just a second. I will include the applicable verses for you in their original Hebrew text and the English text within this post. 😉 Knowing that Jonah died helps you to fully understand Jesus’ own prophecy about his death and resurrection in Matthew 12:40-41, which reads as follows (unless stated otherwise, all references to Scripture are the NABRE translation): 40 Just as Jonah was in the belly of the whale three days and three nights, so will the Son of Man be in the heart of the earth three days and three nights. 41 At the judgment, the men of Nineveh will arise with this generation and condemn it, because they repented at the preaching of Jonah; and there is something greater than Jonah here. Whenever I read Matthew 12:40 I only gathered that Jesus was prophesying that he would be gone for three days and three nights and then he would be back, BUT that’s not what happened as we all know. Jesus DIED and was gone for three days and three nights and was RESURRECTED. Think about this… Why would Jesus revert back to the story of Jonah to prophesy about his own death and resurrection if Jonah didn’t die and wasn’t resurrected? That wouldn’t make much sense in the full context of those two verses. Dr. Brant Pitre went on to explain how Jonah did not live in the whale, but DIED and God resurrected him to convert all of Nineveh much like Jesus’ death and resurrection converted so many to Christianity. So what did I do next? Probably what you are doing right now; open up my Bible and check the story of Jonah out again. When I read it myself it amazed me. I’ll do you a favor so you don’t have to go look it up and read the entire book of Jonah. Here is the applicable section (Jonah 2:1-4 NABRE): 1 But the LORD sent a great fish to swallow Jonah, and he remained in the belly of the fish three days and three nights. 2 Jonah prayed to the LORD, his God, from the belly of the fish: 3 Out of my distress I called to the LORD, and he answered me; From the womb of Sheol I cried for help, and you heard my voice. 4 You cast me into the deep, into the heart of the sea, and the flood enveloped me; All your breakers and your billows passed over me. (emphasis added) HERE IS A SIDE NOTE: I asked a question on Facebook last week which translation of the Bible my friends use. The overwhelming most popular one was the NIV, followed by KJ, ESV, MSG, NLT, and a few more. When I looked at each individual version listed in the comments of my post, I noticed that only two of the versions beside the one I use (NABRE – Catholic Bible) actually use the word “Sheol,” that being the ESV and the NKJV; however, there are more translations out there that use it. I think it’s important that “Sheol” be used as it is the ORIGINAL word used in the ancient Hebrew text. What is Sheol anyway? Well, it’s “a place of darkness to which all the DEAD go, both the righteous and the unrighteous, regardless of the moral choices made in life, a place of stillness and darkness cut off from life and from the Hebrew God.” It is a separate place in Hell also called the “Bosom of Abraham.” Here is a list of just some versions that use the word “Sheol” and a list of the ones that use something else in its place: ***Now that you can see what the different translations use, you can tell that the MSG is the weakest translation of this passage, which is another reason why I encourage my Protestant friends to please discontinue using that version. There are many weak translations within the MSG that could lead to someone completely missing something or lead to a completely different interpretation of Scripture. Here is the original Hebrew text. The word Sheol is שְׁאוֹל in Greek. Please take note of the popup from the highlighted word below. It’s from the popular BibleHub.com site. I also included the Sheol search page from BibleHub.com as well: Clearly you do not go to Sheol UNLESS you are DEAD and that’s exactly where Jonah went as you can see from the Bible’s original Hebrew text. I find it fascinating because at a young age I remember seeing cartoon pictures of Jonah hanging out inside of the whale ALIVE. So as I grew older I never put much deep thought into the aforementioned verses even when I read Matthew 12:40-41. Now Matthew makes much more sense knowing that Jonah died. It explains what Jesus meant when He said that his sign would be like that of Jonah’s where He would be dead for three days and three nights and not just in some other place. Knowing this also helped clear up my questions about the almost 2,000 year old belief that Jesus went to Hell (CCC 633), but that’s a discussion for another day. ;)Jes This past weekend my wife and I prayed outside of the abortion clinic in our city for the conversion of the hearts of all of the clinic workers, abortionists, and those that seek to end the lives of their children. Many people don’t even realize that we have an abortion clinic right here in our city. You wouldn’t realize it is an abortion clinic because it doesn’t broadcast itself as one. Instead, it goes by the name of “Reproductive Health Services” and it is located literally next door to a YMCA. If you were to walk out of the doors of the YMCA and kept walking for 30 yards, you’d run right into it since it’s directly next door. The people that know about it don’t wish to speak of it because Americans tend to like their abortions hidden and sanitary. They know it goes on and the majority disagree with it, but they don’t want to talk about it because it makes them uncomfortable. It’s very similar to how the Nazi regime was able to take over. People knew that they were killing Jews and no one spoke out because they were afraid or it was uncomfortable or both. One thing I do to speak out is to wear these feet that I’m wearing in the picture. They are called “Precious Feet.” They are the EXACT size and shape of a 10-week unborn baby’s feet (the same size feet that can and are ripped off of a baby’s legs during an abortion). What’s terrifying is that our state’s law allows for women to kill their babies by ripping their body parts off piece by piece up to twice the age (20-weeks) and well more than twice the size of these precious feet. Get this though, if the father did something to intentionally cause that baby’s death, instead of the mom having her baby ripped to shreds, he would be charged with Capital Murder and be eligible for the death penalty. Which means that the baby is a “person” if the father kills the baby, but not a person if the mother does. There’s no explanation for that other than extreme hypocrisy. We legalized murder in this country many decades ago and by doing so legalized infant genocide; however, we don’t have to allow it to go on any longer. Over the last couple weeks I have had conversations with many Christians (many being of my own faith, Catholic) and I’ve heard them say, “Roe v. Wade will never be overturned” so they move on to focus on other important issues. So many people have given up, but don’t realize that the US Supreme Court has overruled itself, just up til 2001, 220 times! There have been SEVERAL 5-4 decisions going the wrong way with this current supreme court. That’s ONE person on the court making a drastic difference in the outcome of cases and guess what… the next president will likely be replacing 3 to 4 of the current justices. So it’s more likely now than ever that Roe will be overturned and the worst time not to speak out about this issue. We have so much more technology now than we did when Roe was decided and with a conservative president we could be closer than ever to overturning one of the most horrifying rulings in American history. So this is not the time to be quiet and just “hope” that everything turns out okay. It’s the time to be a voice for life. The GOOD NEWS is… Millennials are now leaning to the “right” on abortion and are increasingly becoming more and more pro-life. smile emoticon If you’re not comfortable being a voice for unborn children, please pray for them. They need your prayers and so do the people that participate in the act of taking a child’s life. Love them, pray for them, and comfort them when they see what they’ve done. “The only thing necessary for the triumph of evil is for good men to do nothing.” – Edmund Burke If you want to see what speaking out on this issue of abortion did for a self-proclaimed super feminist, progressive liberal, pro-abortion woman’s viewpoint, I encourage you to read the article below: Like this: I posted this to Facebook this past week and wanted to post it here as well. After you read this, please follow the CALL TO ACTION: Thursday we went to the doctor for my wife’s 12-week baby appointment with Baby Rutter #2. I know I don’t have to go with her, but I do. I went for every appointment when she was pregnant with our first child mainly for one reason, and that reason was brought to light this past week. We were brought back to the room where the doctor would see her and he saw us almost immediately. As is routine, he checked for the baby’s heartbeat. With Camille he found it almost immediately every time; however, that wasn’t the case at all today. Using the heart monitor, he moved it up and down, left and right, and pressed down hard enough that he had to ask my wife if it hurt her or not. He relocated the device multiple times for several minutes searching for the heartbeat. I knew immediately what my wife was thinking. It was the same thing I was thinking. I closed my eyes, held Camille tightly, and began to pray. I said several Hail Mary’s and prayed that we would hear the heartbeat, but after several long minutes he didn’t find it. The doctor ordered an ultrasound to make sure that everything was okay. It didn’t take the ultrasound tech long to get in the room we walked to, but Mariah was already covered in her tears. As scared as I was I had to tell my wife that everything was going to be okay. Camille sensed her mom being upset and for the first time since we had walked into the doctor’s office she reached out to her because she wanted to console and be next to her mommy. It’s amazing how at less than a year old she already has those instincts. A million thoughts began running through my head, but I did my best to block them out and focus on praying and comforting my wife. My wife handed Camille back to me and then laid on the ultrasound table. As the ultrasound tech moved the device around on her, we saw our sweet little baby. All the fingers were there. All the toes. The arms and legs looked perfect as did the head. We waited for what seemed like an eternity for the heartbeat… and then we saw it, and then heard it. It was a huge relief. my wife hadn’t stopped crying and now her tears were of a different origin. They were coming from happiness and gratefulness. We thank God that He has given us a healthy baby. We thank God that He is giving Camille a baby brother or sister to play with. We realize how fortunate we are and in the same token, we realize how many people aren’t. After posting this on Facebook we had people say, “that’s why you shouldn’t tell people you’re pregnant until well after your first trimester.” We are of another mindset. We told everyone almost immediately upon finding out that my wife was pregnant. It’s a reason to rejoice. Another life is being created and we would want people praying that this child comes into the world healthy. If something went horribly wrong we would want people knowing why we were acting different. We would want people to be praying for us and for the soul of our child. That’s why we tell everyone and why we always will. So the call to action is to please pray a prayer of thankfulness for those of you who have been blessed with healthy children. Please pray for those who have suffered the loss of a child. Pray for the Lord to comfort them because I can’t imagine the pain they have endured. We just experienced the beginning of what we thought could’ve been a long journey of tears and heartache and that’s something I wouldn’t want anyone to experience. God bless you all who have experienced that. So that’s why I go with my wife. Because if we ever experience that, I don’t want her to experience it alone. Like this: Not too long ago Mariah and I shared our re-conversion story in a two-part series on ArchAngel radio. We shared it in hopes that many other people that walked a similar path as us would hear it and help shine some light on the path they were traveling before they grew further away from Christ. For those of you that didn’t hear it, here are Parts I & II: Both Mariah and I grew up in Catholic families going to mass every Sunday not really knowing why, but only because that’s what we were supposed to do. We also both attended Catholic schools. She attended a Catholic school all the way through high school and I attended one for four years from 5th to 8th grade and then another four years in a Catholic college. You would think that with all that Catholic schooling and attending mass with the family on Sunday and by being alter servers that we would’ve had a great understanding of why attending mass was so important, except that we didn’t. We actually didn’t until after we were married. To be honest, as a child I despised going to mass. My mom would have to basically bribe me by telling me that if I didn’t go to mass then I wouldn’t be allowed to go eat with the family when we dined out after the 7:00 p.m. mass. If you know me well, then you know I LOVE food! So I went, but that was the only reason. I thought church was boring. The music was terrible and mostly all on an organ, which didn’t help. There weren’t many people there my age and pretty much everyone there was already collecting social security. I had a tough time staying awake and keeping my eyes open during the readings, the Gospel, and the homilies. It also didn’t help that the church we attended was where it seemed all the priests were sent to retire. They were all old… very old. To stay awake I would talk during mass to anyone that would listen, therefore, I didn’t pay any attention. Then I went to a Catholic College. While there I played guitar in the church band and that may have been the only reason I went to mass with the exception of a few other times. I’m not sure why I decided to play in the band, but I did for about a year. During my college years the Catholic church was hit by a flood of priest sex abuse scandals, which didn’t exactly help my faith in the church. I thought, “If you can’t trust a priest, who can you trust?” There were so many things that I never understood. I never understood confessing to a priest, why we took the Eucharist, transubstantiation, and many other parts of the Catholic faith and I don’t feel like it was taught, or at least not well, while I attended Catholic schools. I do have one small caveat: I have always had a short attention span (pretty much major A.D.D.), which could’ve lead to me not paying attention when certain things were taught. I graduated from college in 2004 and after I received my bachelor’s degree in Theology… just kidding, it was in Graphic Design, I decided to go to law school. During those three years I can probably count the number of times I attended mass on two hands. I took a break from going to church for a while… a long while. It wasn’t until the end of my third year that some friends invited me to a non-denominational church service. For some reason I definitely did not want to go. Something inside of me was telling me that I was not doing the right thing by going, but I went anyway and I liked it. The band was great, the preacher was great, the people I met there were all great, but something felt missing. I had attended that church service, or “worship service” as many people like to call it, several more times for a little over a year and then began going to another non-denominational church service for another couple years. I felt great! I was finally feeling like this is what church was supposed to be like and this is how I’m supposed to live in communion with Jesus. I would come out of the service “on fire” for Christ. I’d be so pumped up that I just wanted to talk to everyone about Him and live out my life the way Christ did. I wanted to read more of the Bible and get involved in Bible studies, which I did. I began learning more and more about Scripture. Man, this was great stuff! So you may think that this is where my journey ended and remains today. That couldn’t be farther from the situation. Something kept pulling me back to the Catholic Church. So although I felt like an outsider and possibly an outcast after attending non-denominational services for so long, I began going to both non-denominational services AND mass in the same day. Guess what… after all these years of not going to mass, nothing changed. It was the same old mass except this time I did my best to follow along with the readings, the Gospel, and the homily. I had to tell myself that although the music may be just as terrible as I remembered, that wasn’t why I was going to mass. I did the dual-church thing for several months all the way up to the point of my marriage. At that time Mariah was also attending a non-denominational church in Baton Rouge. We discussed all the commonalities in our faith and religious walks and couldn’t believe how similar they were. We were engaged soon after we met and began planning our wedding. Then the question came as to where we would get married, as in which church. Just like something started pulling me back to the Catholic Church before, something was pulling me back there once again. I had to get married in a Catholic Church. I could not articulate why, but I knew that I would not get married if it wasn’t in a Catholic Church. So that was the plan. We went through the marriage prep and met with the priest that would preside over our wedding and promised him that we would live out the teachings of the Catholic Church including being open to children (which I don’t think anyone could say we have been otherwise since Camille was born before our one year anniversary) and we promised to go to keep holy the Sabbath (A.K.A. go to mass every Sunday). As the soon-to-be “man of the family,” I knew that I would have to be the faith leader. So I began to listen to educational talks on CD. I learned more about my faith on those CDs than I had in all of my Catholic school years. I continued to listen to them up to the date of our wedding and soon after. We had gone on a weekend engagement retreat to a monastery where we grew closer than ever as a couple and were forced to confront many possible issues that may arise in our marriage, such as where we would take our children to church and where they would go to school. We both decided on homeschooling or Catholic schools for our future children’s education and both decided on taking them to mass on Sundays because taking them to both services may be confusing. I’m glad that wasn’t a foreseeable problem for us and came to that decision on our own and together. We went on our honeymoon the week after our wedding and then came back home and went to mass. After being home for a week, in my eyes, the worst possible argument topic that could come up in a marriage presented itself. It was 10:30 at night and Mariah and I were both in bed. I could tell that something was bothering her, but was afraid to ask. I didn’t have to because she wound up telling me. She asked, “when are we going back to the non-denominational church?” That hit me like a ton of bricks. I was at a crossroads. Do I do what I believe God is telling me to do or do I put my wife first before God and do what will make her happy? That was an easy decision for me, but it didn’t make the pain I felt after giving her my answer any easier to deal with. I turned my head, took a deep breath, turned back to her and my exact words were, “We’re not.” She immediately began to cry. Two weeks into our marriage and I had my wife in tears. I thought to myself, “Way to go bud! Now your wife is going to cry herself to sleep.” As hard as it was to give her that answer I actually felt peace about it. Although I felt peace about it, I knew that my two word response that we weren’t returning to the other church was not going to satisfy my wife. I felt like I owed her more than that, but at that time I could not articulate why we weren’t going back. So with my wife crying in our bed I walked to the back of the house into the office, popped a CD into my computer called “Set All Afire” and began to listen. It was a compilation of seven talks by seven different speakers. I prayed that through that CD God would reveal to me how to articulate my reasoning to my wife. I didn’t just listen to the CD once. I kept listening to it for 4 straight hours until 2:30 a.m. After 4 hours of listening to the talks I decided it was time to go to bed. To my surprise, Mariah was still awake and still crying. So I was not looking forward to the next morning. I knew if I could get Mariah to listen to what I heard on the CD that the message would be received much better than if it were coming from me. So I circled four of the seven talks and pleaded with her the next morning to listen to them. Thankfully I have an AMAZING wife who was open to doing just that. She listened to all four the next morning while I was at work. I had to travel later that day and asked Mariah if she wanted to join me for the ride. I thought she’d most definitely decline since she wasn’t happy with me after the previous night, but she did come along. I asked a friend if he had anymore CDs that would help me with the issue we were dealing with and he gave me 5 more, 3 of which we played to and from our destination. It was on that car ride when our journey began. I asked Mariah if we could listen to the first CD my friend recommended. She said that was fine and I put it in the car CD player. We listened to a talk called “True Worship” by Father Michael Schmitz. He’s both hilarious and captivating. He also likes to explain with analogies or parables, which is how I also like to explain and learn things. Although hilarious and captivating, his talk was so powerful that it absolutely broke me. I came undone and felt extremely convicted listening to it. It was a good thing I was wearing sunglasses that day because if there’s one thing that can get me emotional it’s the feeling of God working in my life and how great He is. “True Worship” is to this day the most powerful talk I’ve ever heard. When it was over I told Mariah that she could plug her phone and play from her iTunes or listen to the radio if she wanted, but she surprisingly asked if we could listen to another talk on CD. That was it. Everything changed after that. We began to learn things we never knew or have ever heard about the Catholic faith we grew up with. Our journey back Home had started. I plan on writing exactly what it was that brought us back to His church and what we learned that somehow we missed after over 2 decades of Catholic upbringing. Now that we know what we were missing, His church and His love have become extremely beautiful to us and become more and more beautiful every day. If you would like to listen to the 3-part talk that changed our lives forever, you can do so by clicking the link below:
Q: Your connection is not private (Google Chrome 57.0.2987.133) I am using google chrome Version 57.0.2987.133 on windows 7 pro 32-bit and after that every tab is showing this message "Your connection is not private". I believe after update into latest release its stop working. Any guidance A: In order to resolve this problem, firstly, you need to test the range of this error by using another browser, such as Firefox and load the same website. If you get a similar error message, which is: Your connection is not secure, then definitely something was wrong with your computer, not from Google Chrome. However, if the problem is only come from Google Chrome, then you can start to diagnose and troubleshoot. Solution #1: Clean up all cookies and cached files on your browser. Solution #2: You can add "--ignore-certificate-errors" in the shortcut of Google Chrome to turn off this annoying warning. This is for temporary, not real solution to fix it. Besides, you should also check again your date and time to make sure those settings are correct. In case this error is appeared in both Google Chrome and Firefox (or any other web browsers), then you should take a look at your antivirus software. A feature called SSL scanning or something similar would be the cause of it. After trying those solutions but still getting this error, I would recommend using CCleaner to uninstall Google Chrome completely and then download it again into your computer. This will help you to remove all outdated & invalid settings of Google Chrome out of your computer, which could lead to this error. However, make sure to use Google Chrome Sync to backup your sensitive data first (saved passwords). Source: Fix Your Connection Is Not Private Error In Google Chrome
1. Field of the Invention The present invention relates to a cryopump and a method for repairing a cryopump. 2. Description of the Related Art A cryopump is a vacuum pump that traps gas molecules by condensing or adsorbing them on cryopanels cooled to a cryogenic temperature so as to pump them. A cryopump is generally used to attain a clean vacuum environment required in a semiconductor circuit manufacturing process or the like. A cryopump is a so-called entrapment vacuum pump and therefore regularly requires regeneration for discharging trapped gas to the outside.
#include "base/log.h" #include "base/atomic_op.h" #include "base/strtool.h" #include "base/arg_helper.h" #include <errno.h> #include <unistd.h> #include <string.h> #include <sys/stat.h> #include <sys/types.h> #include <sys/syscall.h> #include <sys/time.h> using namespace ff; #define gettid() ::syscall(SYS_gettid) str_format_t::str_format_t(const char* fmt_): m_fmt(fmt_), cur_format_index(0) { m_fmt_len = ::strlen(fmt_); } str_format_t::~str_format_t() { } bool str_format_t::move_to_next_wildcard() { m_fmt_type.clear(); char tmp = '\0'; for (; cur_format_index < m_fmt_len; ++ cur_format_index) { tmp = m_fmt[cur_format_index]; if (tmp != '%') { m_result += tmp; continue; } char next = m_fmt[cur_format_index + 1]; if (next == '%') { cur_format_index += 1; m_result += next; continue; } //! 支持多种格式化 %c %s, %d, %ld, %u, %lu, %x, %X, 找到格式化的类型 //for (++cur_format_index; cur_format_index < m_fmt_len; ++ cur_format_index) for (unsigned int i = 1 ; i <= 5; ++i) { char cur = m_fmt[cur_format_index + i]; if (cur == '\0' || cur == '%') { break; } else if (cur == 'c' || cur == 'd' || cur == 'u' || cur == 'x' || cur == 'f' || cur == 's') { m_fmt_type.type = cur; m_fmt_type.min_len = ::atoi(m_fmt + cur_format_index + 1); cur_format_index = cur_format_index + i + 1; if (next == '0') { m_fmt_type.fill_char = next; } return true; } else if (cur == 'l') { char c_num = m_fmt[cur_format_index + i + 1]; if ('d' == c_num || 'u' == c_num) { m_fmt_type.type = c_num; m_fmt_type.min_len = ::atoi(m_fmt + cur_format_index + 1); cur_format_index = cur_format_index + i + 2; if (next == '0') { m_fmt_type.fill_char = next; } return true; } } } m_result += tmp; } return false; } void str_format_t::append(const char* str_) { if (move_to_next_wildcard()) { unsigned int len = ::strlen(str_); int width = m_fmt_type.min_len > len? m_fmt_type.min_len -len: 0; for (; width > 0; -- width) { m_result += m_fmt_type.fill_char; } } m_result += str_; } void str_format_t::append(const string& str_) { if (move_to_next_wildcard()) { int width = m_fmt_type.min_len > str_.length()? m_fmt_type.min_len -str_.length(): 0; for (; width > 0; -- width) { m_result += m_fmt_type.fill_char; } } m_result += str_; } const string& str_format_t::gen_result() { if (cur_format_index < m_fmt_len) { m_result.append(m_fmt + cur_format_index); } return m_result; } log_t::log_t(int level_, const string& all_class_, const string& path_, const string& file_, bool print_file_, bool print_screen_): m_enabled_level(0), m_enable_class_set(new str_set_t()), m_file_name_index(0), m_line_num(0) { ::memset(&m_last_create_dir_tm, 0, sizeof(m_last_create_dir_tm)); m_class_set_history.push_back(m_enable_class_set); for (int i = 0; i <= level_; ++i) { m_enabled_level |= (1 << i); } vector<string> vt_class; strtool::split(all_class_, vt_class); for (size_t i = 0; i < vt_class.size(); ++i) { m_enable_class_set->insert(vt_class[i]); } m_path = path_; m_filename = file_; m_enable_file = print_file_; m_enable_screen = print_screen_; } log_t::~log_t() { for (ptr_vt_t::iterator it = m_class_set_history.begin(); it != m_class_set_history.end(); ++it) { delete (*it); } m_class_set_history.clear(); } void log_t::mod_level(int level_, bool flag_) { if (flag_) { m_enabled_level |= (1 << level_); } else { m_enabled_level &= ~(1 << level_); } } void log_t::mod_class(const string& class_, bool flag_) { str_set_t* pset = new str_set_t(m_enable_class_set->begin(), m_enable_class_set->end()); if (flag_) { pset->insert(class_); } else { pset->erase(class_); } m_class_set_history.push_back(pset); ATOMIC_SET(&m_enable_class_set, pset); } bool log_t::is_level_enabled(int level_) { return m_enabled_level & (1 << level_); } void log_t::mod_print_file(bool flag_) { m_enable_file = flag_; } void log_t::mod_print_screen(bool flag_) { m_enable_screen = flag_; } const char* log_t::find_class_name(const char* class_) { str_set_t* pset = ATOMIC_FETCH(&m_enable_class_set); str_set_t::iterator it = pset->find(class_); if (it != pset->end()) { return (*it).c_str(); } return NULL; } static const char* g_log_level_desp[] = { "FATAL", "ERROR", "WARN ", "INFO ", "TRACE", "DEBUG" }; static const char* g_log_color_head[] = { "\033[0;35m", "\033[0;31m", "\033[1;34m", "\033[1;32m", "", "\033[1;33m" }; static const char* g_log_color_tail[] = { "\033[0m", "\033[0m", "\033[0m", "\033[0m", "", "\033[0m" }; void log_t::log_content(int level_, const char* str_class_, const string& content_) { struct timeval curtm; gettimeofday(&curtm, NULL); struct tm tm_val = *localtime(&(curtm.tv_sec)); char log_buff[512]; ::snprintf(log_buff, sizeof(log_buff), "%02d:%02d:%02d.%03ld %s [%ld] [%s] ", tm_val.tm_hour, tm_val.tm_min, tm_val.tm_sec, curtm.tv_usec/1000, g_log_level_desp[level_], gettid(), str_class_); if (m_enable_file && check_and_create_dir(&tm_val)) { m_file << log_buff << content_ << endl; m_file.flush(); } if (m_enable_screen) { printf("%s%s%s%s\n", g_log_color_head[level_], log_buff, content_.c_str(), g_log_color_tail[level_]); } } bool log_t::check_and_create_dir(struct tm* tm_val_) { bool time_equal = (m_last_create_dir_tm.tm_mday == tm_val_->tm_mday && m_last_create_dir_tm.tm_mon == tm_val_->tm_mon && m_last_create_dir_tm.tm_year == tm_val_->tm_year); char file[1024]; if (false == time_equal) { int rc = ::access(m_path.c_str(), F_OK); if (0 != rc) { rc = ::mkdir(m_path.c_str(), 0777); if (rc != 0) { printf("log mkdir<%s>failed error<%s>\n", m_path.c_str(), ::strerror(errno)); return false; } } ::snprintf(file, sizeof(file), "%s/%d-%d-%d", m_path.c_str(), tm_val_->tm_year + 1900, tm_val_->tm_mon + 1, tm_val_->tm_mday); rc = ::access(file, F_OK); if (0 != rc) { rc = ::mkdir(file, 0777); if (rc != 0) { printf("log mkdir file<%s>failed error<%s>\n", file, ::strerror(errno)); return false; } } } if (false == time_equal || m_line_num >= MAX_LINE_NUM) { for (int i = 0; i < 10000; ++i) { ::snprintf(file, sizeof(file), "%s/%d-%d-%d/%s.%d", m_path.c_str(), tm_val_->tm_year + 1900, tm_val_->tm_mon + 1, tm_val_->tm_mday, m_filename.c_str(), ++m_file_name_index); int rc = ::access(file, F_OK); if (0 == rc) { continue; } break; } m_file.close(); m_file.open(file); m_line_num = 0; m_last_create_dir_tm = *tm_val_; } return true; } log_service_t::log_service_t(): m_log(NULL) { } log_service_t::~log_service_t() { stop(); } int log_service_t::start(const string& opt_) { if (m_log) return 0; int level = 2; string path = "./log"; string filename = "log"; bool print_file = true; bool print_screen = false; arg_helper_t arg(opt_); if (!arg.get_option_value("-log_level").empty()) level = ::atoi(arg.get_option_value("-log_level").c_str()); if (!arg.get_option_value("-log_path").empty()) path = arg.get_option_value("-log_path"); if (!arg.get_option_value("-log_filename").empty()) filename = arg.get_option_value("-log_filename"); if (arg.get_option_value("-log_print_file") == "false" || arg.get_option_value("-log_print_file") == "0") { print_file = false; } if (arg.get_option_value("-log_print_screen") == "true" || arg.get_option_value("-log_print_screen") == "1") { print_screen = true; } m_log = new log_t(level, arg.get_option_value("-log_class"), path, filename, print_file, print_screen); m_thread.create_thread(task_binder_t::gen(&task_queue_t::run, &m_task_queue), 1); return 0; } int log_service_t::stop() { if (NULL == m_log) return 0; m_task_queue.close(); m_thread.join(); delete m_log; m_log = NULL; return 0; } void log_service_t::mod_level(int level_, bool flag_) { m_task_queue.produce(task_binder_t::gen(&log_t::mod_level, m_log, level_, flag_)); } void log_service_t::mod_class(const string& class_, bool flag_) { m_task_queue.produce(task_binder_t::gen(&log_t::mod_class, m_log, class_, flag_)); } void log_service_t::mod_print_file(bool flag_) { m_task_queue.produce(task_binder_t::gen(&log_t::mod_print_file, m_log, flag_)); } void log_service_t::mod_print_screen(bool flag_) { m_task_queue.produce(task_binder_t::gen(&log_t::mod_print_screen, m_log, flag_)); }
<html> <head> <!-- change: fixed title tag --> <title>Special Report: MBA Outlook from The Economist Global Executive</title> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> </head> <body bgcolor="#ffffff" text="#000000" link="#990000" alink="#CC0000" vlink="#660000"> <table width="600" border="0" cellspacing="0" cellpadding="0"> <tr> <td rowspan="2" width="125"><a href="http://TheEconomist.s.maildart.net/link_34078_6617738_2_79987158_60345293_1_6f"><img alt="" src="http://www.economist.com/images/ecdc_125x34.gif" width="125" height="34" border="0"></a></td> <td rowspan="2" width="15"><img alt="" src="http://www.economist.com/images/blocks/spacer.gif" width="15" height="1"></td> <td width="460"><img alt="" src="http://www.economist.com/images/blocks/spacer.gif" width="460" height="1"></td> </tr> <tr> <td><a href="http://TheEconomist.s.maildart.net/link_34011_6617738_2_79987158_60345293_1_62"><img src="http://www.economist.com/images/globalexecutive/headergeem.gif" border="0" alt="Global Executive, a joint project with Whitehead Mann" width="329" height="34"></a><a href="http://TheEconomist.s.maildart.net/link_34010_6617738_2_79987158_60345293_1_61"><img src="http://www.economist.com/images/globalexecutive/headerwmem.gif" border="0" alt="Visit the Whitehead Mann Site" width="131" height="34"></a></td> </tr> </table> <table width="600" border="0" cellspacing="0" cellpadding="0"> <tr> <td valign="top" width="1" bgcolor="#999999" rowspan="8"><img src="http://www.economist.com/images/blocks/spacer.gif" width="1"></td> <td colspan="6" bgcolor="#999999"><img src="http://www.economist.com/images/blocks/spacer.gif" alt="" width="599" height="1" align="top"></td> </tr> <tr> <td valign="top" width="8"><img src="http://www.economist.com/images/blocks/spacer.gif" width="8"></td> <!-- change: extra br between From and Subject --> <td valign="top" colspan="5" width="591"><br><font face="Verdana, Geneva, Arial, sans-serif" size="-1"><b>From:</b> Andrew Rashbass, Managing Director, Economist.com<br><br> <b>Subject:</b> Special Report: <a href="http://TheEconomist.s.maildart.net/link_34012_6617738_2_79987158_60345293_1_63">MBA Outlook</a> from The Economist Global Executive</font><br><br></td> </tr> <tr> <td colspan="6" bgcolor="#999999"><img src="http://www.economist.com/images/blocks/spacer.gif" alt="" width="599" height="1" align="top"></td> </tr> <tr> <td valign="top" width="8"><img src="http://www.economist.com/images/blocks/spacer.gif" width="8"></td> <td valign="top" width="400"><br> <font face="Verdana, Geneva, Arial, sans-serif" size="-1">Dear Economist.com reader<br> <br> Until recently, MBA graduates commanded huge starting packages as companies vied to recruit them. In the current economic environment, their prospects have changed dramatically. With extensive layoffs at dotcoms and with other companies cutting back in the face of falling sales and profits, many graduates of MBA programmes have found themselves struggling to find jobs. <br> <br> A new report, <a href="http://TheEconomist.s.maildart.net/link_34013_6617738_2_79987158_60345293_1_64">MBA Outlook</a>, from The Economist Global Executive looks at the prospects for MBAs today. It provides insight into whether now is the time to take an MBA and it advises on how to position yourself for the job market if you already have or are studying for your MBA. <br> <br> This special report includes:<br> <ul> <li>The MBA, changing and static: What does business education offer in the face of an economic downturn? <li>Back to business school: A gamble that more people want to take <!-- change: editorial fix --> <li>An interview with Henry Mintzberg: What's wrong with business education today? <li>Whitehead Mann's advice on how to use your MBA to get a job in investment banking <li>The MBA in Europe: How European programmes are seeking to distinguish themselves <li>The dropouts return: CFO Magazine reports on the former dotcom hopefuls who are now finishing their studies <li>How a leading business school is coping with the economic downturn <li>How distance learning is making the MBA world smaller </ul>MBA Outlook is sponsored by a number of <a href="http://TheEconomist.s.maildart.net/link_34014_6617738_2_79987158_60345293_1_65">business schools</a>. They have provided comprehensive intelligence on their programmes giving you the information you need to make an informed choice. They tell you what, in their view, sets them apart, what courses they offer and what makes a successful applicant to their school. They advise applicants from outside the US and provide important statistics on their programmes as well as details of their career services and their alumni. Find these profiles here.<br> <br> In an uncertain economy, find out what rewards&#151;and risks&#151;come from pursuing an MBA degree. Research the effect of the downturn on MBA programmes and graduates. Learn what MBAs can do to position themselves best. Read <a href="http://TheEconomist.s.maildart.net/link_34016_6617738_2_79987158_60345293_1_67">MBA Outlook</a> from The Economist Global Executive today.<br> <br> As always, we welcome your comments and suggestions. Please e-mail us <a href="mailto:dotcommarketing@economist.com">here</a>. <br> <br> Yours sincerely<br> <br> Andrew Rashbass<br> Managing Director, Economist.com<br> <br> <br> P.S. Please feel free to pass this message on to your friends and colleagues.<br> </font><br> <img src="http://www.economist.com/images/blocks/spacer.gif" width="400" height="1"><br> </td> <td valign="top" width="8"><img src="http://www.economist.com/images/blocks/spacer.gif" width="8"></td> <td valign="top" bgcolor="#999999" width="1" rowspan="3"><img src="http://www.economist.com/images/blocks/spacer.gif" width="1"></td> <td valign="top" width="8" rowspan="3"><img src="http://www.economist.com/images/blocks/spacer.gif" width="8"></td> <td valign="top" width="175" rowspan="3"><br><table cellspacing="0" border="0" cellpadding="0" width="175"> <tr> <td><img src="http://www.economist.com/images/globalexecutive/reportsponsoredby175.gif" alt="" width="175" height="23" align="top" border="0"><br> </td> </tr> <tr> <td bgcolor="#EDF2E9"><table cellspacing="0" border="0" cellpadding="5" width="100%"> <tr> <td align="center"><font face="Verdana, Helvetica, Arial, Geneva, sans-serif" size="-2"> <img src="http://www.economist.com/images/globalexecutive/mba-logo-chi-150x50.gif" alt="Chicago logo" hspace="7" vspace="0" border="0" width="150" height="50"><br> <b> <a href="http://TheEconomist.s.maildart.net/link_34029_6617738_2_79987158_60345293_1_6b">The University of Chicago Graduate School of Business</a> </b><br><br><b> <a href="http://TheEconomist.s.maildart.net/link_34028_6617738_2_79987158_60345293_1_6a">Cornell University:<br>Johnson Graduate School of Management</a> </b><br><br><b> <a href="http://TheEconomist.s.maildart.net/link_34033_6617738_2_79987158_60345293_1_66">The George Washington University</a> </b><br><br><b> <a href="http://TheEconomist.s.maildart.net/link_34032_6617738_2_79987158_60345293_1_65">The University of Iowa<br>Henry B. Tippie School of Management</a> </b><br><br><b> <a href="http://TheEconomist.s.maildart.net/link_34031_6617738_2_79987158_60345293_1_64">Rice University<br>Jones Graduate School of Management</a> </b><br><br><b> <a href="http://TheEconomist.s.maildart.net/link_34030_6617738_2_79987158_60345293_1_63">Simon Graduate School<br>of Business, University of Rochester</a> </b><br><br><b> <a href="http://TheEconomist.s.maildart.net/link_34036_6617738_2_79987158_60345293_1_69">Thunderbird:<br>The American Graduate School of International Management</a> </b><br><br><b> <a href="http://TheEconomist.s.maildart.net/link_34035_6617738_2_79987158_60345293_1_68">The Anderson School at UCLA</a> </b><br><br><b> <a href="http://TheEconomist.s.maildart.net/link_34034_6617738_2_79987158_60345293_1_67">NIMBAS Graduate School of Management</a></b><br><br> </font></td> </tr> </table></td> </tr> <tr> <td><a href="http://TheEconomist.s.maildart.net/link_34037_6617738_2_79987158_60345293_1_6a"><img src="http://www.economist.com/images/globalexecutive/aboutsponsorship175.gif" width="175" height="12" border="0"></a></td> </tr> </table> <br> </td> </tr> <tr> <td colspan="3" bgcolor="#999999"><img src="http://www.economist.com/images/blocks/spacer.gif" alt="" width="400" height="1" align="top"></td> </tr> <tr> <td valign="top" width="8"><img src="http://www.economist.com/images/blocks/spacer.gif" width="8"></td> <td valign="top" width="400"><br> <font face="Verdana, Geneva, Arial, sans-serif" size="-2">You have received this e-mail because you requested updates about Economist.com. To stop receiving this newsletter, please visit: <a href="http://TheEconomist.s.maildart.net/link_34038_6617738_2_79987158_60345293_1_6b">http://economist.com/members/optin.cfm</a>, log in and complete the form.</font><br> <!-- change: deleted second paragraph of disclaimer --> <br> <img src="http://www.economist.com/images/blocks/spacer.gif" height="1"><br> </td> <td valign="top" width="8"><img src="http://www.economist.com/images/blocks/spacer.gif" width="8"></td> </tr> <tr> <td colspan="6" bgcolor="#999999"><img src="http://www.economist.com/images/blocks/spacer.gif" alt="" width="599" height="1" align="top"></td> </tr> </table> <table width="600" border="0" cellspacing="0" cellpadding="0"> <tr> <td align="CENTER" width="600"><font face="Arial, Helvetica, sans-serif" size="-1"><b><img src="http://www.economist.com/images/blocks/spacer.gif" width="600" height="6"></b></font><br> <font face="Verdana, Geneva, Arial, sans-serif" size="-2"><a href="http://TheEconomist.s.maildart.net/link_34055_6617738_2_79987158_60345293_1_6a">GO TO ECONOMIST.COM</a></font><br> <font face="Verdana, Geneva, Arial, sans-serif" size="-2" color="000066">&copy; <a href="http://TheEconomist.s.maildart.net/link_34054_6617738_2_79987158_60345293_1_69">Copyright</a> 2001 The Economist Newspaper and The Economist Group. All rights reserved.<br> <!-- change: Group slug --><a href="http://TheEconomist.s.maildart.net/link_34053_6617738_2_79987158_60345293_1_68"><IMG ALT="" src="http://www.economist.com/images/ads/EconomistGroupBusiness.gif" WIDTH="156" HEIGHT="15" hspace="0" vspace="4" border="0"></a><br><a href="http://TheEconomist.s.maildart.net/link_34057_6617738_2_79987158_60345293_1_6c">Privacy Policy</a> | <a href="http://TheEconomist.s.maildart.net/link_34056_6617738_2_79987158_60345293_1_6b">Terms &amp; Conditions</a></font><br> <br> </td> </tr> </table> <IMG SRC="http://TheEconomist.s.maildart.net/open_6617738_2_79987158_60345293_7a" HEIGHT=1 WIDTH=1 BORDER=0> </body> </html>
Q: Changing the class of the next() element is changing the class of the last sibling using jQuery I'm learning Javascript and I having a problem which I don't seem to understand. I am making a simple quiz app. Each question is within a div tag that can be active or inactive. If the div tag is active the question is red and if its inactive the question is black. The questions are added to the HTML based on this js code. var questionOne = { question: "A?", choices: ["4", "7", "6", "5"], correctAnswer:3 } var questionTwo = { question: "B?", choices: ["4", "7", "6", "5"], correctAnswer:0 } var questionThree = { question: "C", choices: ["4", "7", "6", "5"], correctAnswer:2 } var allQuestions = [questionOne,questionTwo,questionThree] var questionNumber = 0; var selectedAnswerValue; var score = 0; var main = function() { for(var j=0; j<allQuestions.length; j++) { var currentQuestion = allQuestions[j]; var questionDiv = $('<div/>', { "class": ("question" + j + " inactive") }); questionDiv.appendTo('.form-group'); var h1Question = $('<h1/>').text(currentQuestion.question); h1Question.appendTo(('.question' + j)); var answersDiv = $('<div/>', { "class": ("answers" + j) }); answersDiv.appendTo(('.question' + j)); for(var i=0;i<currentQuestion.choices.length;i++) { var radioBtn = $('<div class="radio"><label><input type="radio" name="question' + j + '" value="' + i + '">' + currentQuestion.choices[i] + '</label></div>'); radioBtn.appendTo(('.answers' + j)); } $('.btn').click(function() { var currentActiveQuestion = $('.active'); var nextQuestion = currentActiveQuestion.next(); nextQuestion.addClass('active').removeClass('inactive'); currentActiveQuestion.removeClass('active').addClass('inactive'); }); } }; $(document).ready(main); This code also have an event listener on a button that triggers on click and in theory changes the active(BLACK) div to inactive(RED) and the next() inactive div to active. So in this case, what I want is the question A to turn red and all other black. But instead changes only the last element to active like this: Then after ONE button click: I have tried lots of changes but nothing seems to work. Any help is welcome. Thanks! My HTML code is this: <!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>Quiz App</title> <link href="css/bootstrap.min.css" rel="stylesheet"> <link href="quiz.css" rel="stylesheet"> </head> <body> <div class="form-group"> <div class="tittle active"> <h1>Quiz</h1> </div> </div> <div> <button id="btn" type="button" class="btn btn-success">NEXT</button> </div> <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js"></script> <script src="js/bootstrap.min.js"></script> <script src="quiz.js"></script> </body> </html> And the resulting html formed from my js is this: <html lang="en"><head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>Quiz App</title> <link href="css/bootstrap.min.css" rel="stylesheet"> <link href="quiz.css" rel="stylesheet"> </head> <body> <div class="form-group"> <div class="tittle active"> <h1>Quiz</h1> </div> <div class="question0 inactive"> <h1>A?</h1> <div class="answers0"> <div class="radio"><label><input type="radio" name="question0" value="0">4</label></div> <div class="radio"><label><input type="radio" name="question0" value="1">7</label></div> <div class="radio"><label><input type="radio" name="question0" value="2">6</label></div> <div class="radio"><label><input type="radio" name="question0" value="3">5</label></div> </div> </div> <div class="question1 inactive"> <h1>B?</h1> <div class="answers1"> <div class="radio"><label><input type="radio" name="question1" value="0">4</label></div> <div class="radio"><label><input type="radio" name="question1" value="1">7</label></div> <div class="radio"><label><input type="radio" name="question1" value="2">6</label></div> <div class="radio"><label><input type="radio" name="question1" value="3">5</label></div> </div> </div> <div class="question2 inactive"> <h1>C</h1> <div class="answers2"> <div class="radio"><label><input type="radio" name="question2" value="0">4</label></div> <div class="radio"><label><input type="radio" name="question2" value="1">7</label></div> <div class="radio"><label><input type="radio" name="question2" value="2">6</label></div> <div class="radio"><label><input type="radio" name="question2" value="3">5</label></div> </div> </div> </div> <div> <button id="btn" type="button" class="btn btn-success">NEXT</button> </div> <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js"></script> <script src="js/bootstrap.min.js"></script> <script src="quiz.js"></script> </body></html> A: After trying several things I finally found the solution: ORDER IS IMPORTANT The solution was to put the event listener of the button first and then the script dynamicaly generating the elements. Like this: var main = function() { $('#btn').click(function() { var currentActiveQuestion = $('.active'); var nextQuestion = currentActiveQuestion.next(); currentActiveQuestion.removeClass('active'); nextQuestion.addClass('active'); }); for(var j=0; j<allQuestions.length; j++) { var currentQuestion = allQuestions[j]; var questionDiv = $('<div/>', { "class": ("question" + j) }); questionDiv.appendTo('.form-group'); var h1Question = $('<h1/>').text(currentQuestion.question); h1Question.appendTo(('.question' + j)); var answersDiv = $('<div/>', { "class": ("answers" + j) }); answersDiv.appendTo(('.question' + j)); for(var i=0;i<currentQuestion.choices.length;i++) { var radioBtn = $('<div class="radio"><label><input type="radio" name="question' + j + '" value="' + i + '">' + currentQuestion.choices[i] + '</label></div>'); radioBtn.appendTo(('.answers' + j)); } } }; $(document).ready(main); I'm not completely sure of the cause, because I'm a beginner, but I can't imagine the scrypt for the dynamically generated elements was messing with the classes of the elements before the click event.
Blog Archives Sometimes a movie just gives the wrong impression from its conception, pre-production, and initial advertisement, and that’s exactly King Arthur: Legend of the Sword. Optimistically planned as a six-part franchise, this new big-budget rendition of Arthurian legend looked like a total disaster. Director and co-writer Guy Ritchie (Sherlock Holmes) seemed like the wrong fit for the material, the tone seemed messy and unclear, and it screamed a transparent attempt by Hollywood execs to sex up something old. I was holding out a sliver of hope that it might be stylish, mindless fun, and this was coming off of Ritchie’s unexpectedly enjoyable Man from U.N.C.L.E. remake. If I do not see a more headache-inducing, self-indulgent, cumbersome, illogical, and generally exasperating movie this summer, I will consider myself most fortunate. Arthur (Charlie Hunnam) is a streetwise youth raised in a whorehouse on the dirty streets of Londinium. He’s a low-level criminal with his own loyal crew and his own moral code. He’s also, unbeknownst to him, loyalty in the making. Arthur is the son of the former King Uther (Eric Bana) who was murdered by his brother and mage, Vortigern (Jude Law). Arthur runs afoul of the law and is captured, and his identity is revealed when he successfully pulls Excalibur from the stone. Vortigern must kill the young upstart but a group of dissidents kidnaps Arthur and pleads with him to join their cause. Together they can topple Vortigern and free England of his tyranny. If you can keep up with Ritchie’s willfully shifty film narrative then you’re of sounder mind than me because it felt like King Arthur was just being made up on the spot. Whenever one tells a story in a fantasy realm with fantasy figures, the rules are important to establish, otherwise everything can just feel airless and arbitrary and anticlimactic. If a movie can’t establish its own internal logic and system of rules it feels obtuse. There aren’t setups, and without setups there can’t be well-orchestrated payoffs. This is basic structure, plain and simple. This does not happen in King Arthur at all. Beyond the most flimsy good-guys-triumph-over-evil underpinning, there is nothing that makes sense. Characters will all of a sudden achieve some advanced knowledge without the audience seeing how this was gained. Characters will make use of powers that would have been very useful if they had been used earlier but we have no explanation why. The Mage (Astrid Berges-Frisbey) all of a sudden summons a giant snake, or turns into a giant snake, and I’m thinking, if you have giant snake-making powers, why did you wait so long on this? Conversely, Vortigern offers blood sacrifices to an evil squid-siren-sister-threesome, but what he gains in exchange is vague, their demands are vague, as is their overall fit into a larger scheme. I thought Arthur was trying to stage an insurgency and court a political revolution, but that fizzles out after a few scenes of rare coherency. I gave up trying to understand the movie within the first twenty minutes. It feels like Ritchie and company are just hurtling through expected fantasy elements as if they were merely expanded features from a trailer and a chore to overcome. Arthur has an incredibly expedited adventure on an island with oversized animals (literal R.O.U.S.!), and it feels like Ritchie is just laughing at the expense of the audience and whatever genre demands they might have had. The characters are also extremely uninteresting and kept me at a distance for the entire film. Ritchie is trying to incorporate his cheeky gangster movies into the fantasy mythology of the King Arthur legend, and the two don’t exactly fit. An early sequence involves Arthur explaining his routine that day through repetitious, annoying narration and a non-linear time-skipping timeline. It’s the kind of narrative trick we’ve become accustomed to in Ritchie’s movie. This time it was shallow because it wasn’t funny, interesting, and its only justifiable purpose seemed to be beating an audience into submission to remember the names of Arthur’s pals through rote repetition. The characters have stupid, Dick Tracy-in-Midlevel times names like Goose Fat Bill, Wet Stick, Back Lack, Chinese George, Jack’s Eye, Blue and Mischief John. Silly names by themselves are not an issue, as Snatch had characters with monikers like Franky Four-Fingers and Bullet-Tooth Tony, but by God those characters were memorable. These characters lack striking personalities and general purpose other than filling the frame. If you challenged me to put names to faces I would probably fail (the main female character doesn’t even get a name; she’s simply The Mage). These boring people just drifted from scene to scene, bumping into an increasingly arbitrary, ungainly, and meaningless plot. The subtitle is also an indication of the deeper problems inherent with the plot. It’s “Legend of the Sword” and not “Arthur,” and it doesn’t even name the sword. We’re told that the sword wields immense power, though like much it’s never explained in any sort of manner that would provide context or general understanding. The sword is powerful but it’s also more active than our hero, because Arthur is told that the sword controls him and not the other way around. His mission then is learning to simply allow the sword to do its thing. His mission is to become more passive when fighting? Does that strike anybody as a character arc that makes sense or would be satisfying to watch? With so many missteps at so many levels, the only way this movie could have been salvaged is from some sensational action sequences to quicken one’s pulse. Ritchie is a stylish director but I don’t think he’s ever been a great stager of action. His documentary-style zooms, speed ramps, and quick cuts are more about engendering an impression. An excellent example, and probably the high-point of the movie, is a montage establishing Arthur’s childhood growing up on the rough and tumble streets of Londinium. It’s wordless, set to a gasping, percussion-heavy score, and quickly establishes through concise visuals how Arthur came of age and gained his street smarts. The legitimate action sequences are underwhelming and poorly orchestrated. The setups are rushed, confusing, and the edits are a scrambled mixture of slow motion, fast motion, and extreme close-ups, a combination that doesn’t aid in coherency. The advanced fighting feels like the movie just accelerated into a video game cut scene. It’s generally as incomprehensible as the plot and as ultimately tiresome as the various characters. Allow me to indulge an exemplary example as to why King Arthuris as stupid, irritating, and headache-inducing just from a plot standpoint, never mind Ritchie’s filmmaking tics. The villain has three chances to kill Arthur and he inexplicably whiffs every freaking time. The first is when Arthur is a young boy and his father manages to place him on a small dingy and pushes him out to sea like he’s Moses in a basket. Vortigern is his super video game bad guy ultra self, who we later see has the power to launch fiery projectiles, and he just watches as the slowest boat in the world slowly drifts away, forgetting he has projectile powers. Either that or the movie inserts an arbitrary limitation for no reason. Now established as king, Vortigern lives by the prophecy that Arthur will return and pull Excalibur from the stone and one day vanquish him; however, Arthur can still be killed because he is mortal. Arthur pulls the sword from its stony sheath and passes out. Does Vortigern kill his long-prophesied enemy while he’s unconscious? No. Does he kill him while he’s locked in a jail cell? No. Does he kill him before a big public ceremony where, surprise, a group of outlaws rescue Arthur? No. Even if you were being generous and account these foolish actions as the result of unchecked hubris, consider the very climactic battle between the adult Arthur and Vortigern. Once again, Vortigern has adopted his fiery, giant video game boss battle visage, the same that killed Arthur’s father that fateful night. It’s clearly a life and death showdown, and at one point Arthur gets thrown, hits his head on rock, and is knocked unconscious. He eventually wakes up and looks over to find… Vortigern just standing on the other side of the rock and admiring like a stone altar. It’s the battle between good and evil and evil decides to take a walk. Three obvious instances where the villain could have won, easily, and three illogical excuses that showcase the absence of even acceptable storytelling. So what if the story of King Arthur: Legend of the Swordis dumb and feels like it’s being randomly made up on the spot? So what if the characters are underwritten, lacking in distinguished personalities, and are rather pointless? So what if the main character has to learn to better give up his agency to a stupid magic sword? So what if the only significant female character doesn’t even merit a name? So what if the action often resorts to a slow-motion frenzy of a CGI dust cloud? So what if there are 300-foot sized elephants in this movie and then never appear again? So what if I don’t understand anybody’s personal relationships besides good and evil designations? So what if I was so bored and disengaged from the movie that I started contemplating strange subjects to pass the protracted time, like why does Hunnam’s natural British accent sound so fake, and why does Jude Law’s hair remind me of Bill Murray in Ghostbusters? The ultimate question is whether or not something as ostensibly irreverent as a cockney crime King Arthur is fun, and the answer is unequivocally no. If you’re still wondering how poorly conceived and executed this movie is, I’ve saved the best doozy for last, which coincidentally is also one of the final moments in the two-hour film. I kid you not, the movie ends with the eventual Knights of the Round Table actively befuddled by the existence of a round table. They cannot apply their knowledge of tables to this new, rounder model. They gawk, shake their heads, and wonder what it is exactly. There you have it, a group of heroes mentally defeated due to the absence of corners. Guy Ritchie’s big screen reboot of the 1960s TV show is the right kind of fizzy summer escapist entry that goes down smooth and entertains with just enough swanky style to pass the time. The Man from U.N.C.L.E. is equal parts spy thriller and straight-laced genre satire, hewing closer, and more successfully, to a marriage between Ritchie early cockney gangster flicks and his big-budget Sherlock Holmes action franchise. It’s often fun and surprising at how well it holds its tone between comedy and action; it almost feels like a screwball romance with guns and bombs. The trio of leads, Henry Cavill as the American agent, Armie Hammer as the KGB agent, and Alicia Vikander (Ex Machina) as the German asset, make an engaging group with plenty of conflicts to explore. It’s surprisingly more character-based than driven by its action set-pieces. Cavill shows far more life and personality than I’ve ever seen from him on screen. Vikander and Hammer have an amusing chemistry together and the movie allows them to roughhouse without pushing either character in a direction that feels too safe. Their series of will-they-won’t-they near misses will drive certain portions of the audience mad. The movie gets into danger when Ritchie and his co-screenwriter Lionel Wigram get too cute, especially with a narrative technique where the movie doubles back or highlights action that was in the background at least four times. The world of this movie is also another asset, as the period costumes, soundtrack, Italian locations and production design are terrific and further elevate the swanky mood. It’s an ebullient throwback that serves up enough entertainment with its own cock-eyed sense of throwback charm. Delivering pretty much more of the same, Sherlock Holmes: A Game of Shadows isn’t exactly an improvement over the classic detective’s first foray into out-and-out Hollywood action cinema. The real treat of the budding franchise is the comic interplay between Holmes (Robert Downey Jr.) and Watson (Jude Law). Their harried banter makes for the best moments. Once again the plot is overwrought, the side characters underdeveloped (poor original dragon tattooed girl, Noomi Rapace, given absolutely nothing to do but run in a gypsy skirt), mysteries that you give up and just wait for Holmes to explain, and a villain that proves to be lackluster. For Moriarty (Mad Men’s Jared Harris) to be the nemesis, the intellectual equal of Holmes I’m going to need to see much more than this. There is a fine sequence at the very end where Holmes mentally envisions the steps of his attack and then Moriarty joins in: “You think you’re the only one who can do that?” They hold an entire duel fought step-by-step in the imagination. I wanted more experiences like this, but director Guy Ritchie (Snatch) falls back on his signature stylized action sequences of fast whooshing and quick spinning. The action is a step up from the first Holmes, and that will be enough for most ticket-buyers. I’ll admit there is a certain meta-literary charm at watching Arthur Conan Doyle’s signature detective fighting his way through an armed body of baddies. Whatever your feelings were for the 2009 Sherlock Holmes, I’m fairly certain you’ll revisit them in their entirety with Game of Shadows. I know I did.
Q: Headless bolts blocking ignition swap on '16 CBR Is there a good way to remove headless bolts? My lock cylinder was ruined from an attempted theft over a year ago. I got a replacement from the same model and my self-repair is being blocked by these two headless bolts under the ignition. Guides aren't easily available because of the sensitive nature of replacing the ignition. The ones I can find say to cut a notch in the bolt (and the housing) to get traction with a screwdriver. While I could do this, I am concerned it would harm the value of the bike. I have the original keys and documentation that I am the owner. I'm considering just taking it to a shop or dealership to keep everything on record. A: I always managed to use a tapered punch to turn them - these were customers cars so no damage allowed... Once they started turning a pair of needle nose pliers worked.
Slow Start, but It’s Not Over Yet: 5 Things to Know About This Year’s Flu Season A Centers for Disease Control and Prevention report released recently shows a more effective vaccine compared with the previous two seasons and called this season a low-severity year so far for influenza—classified as having a fever, cough and body aches—but local doctors and public health officials also point out that flu season is far from over, with the illness typically lasting into April. They say those who haven’t received the flu shot this season could still benefit from one. Here are five things to know about this year’s flu: Content Square 1. More Typical SeasonWhile this season seems mild compared with last year’s harsh one that sickened 49 million and killed nearly 80,000 people across the country, doctors say this year’s flu actually is typical of years prior to the 2017-18 season. The CDC estimated this year’s flu season so far has sickened between 13.2 million and 15.2 million nationwide. This includes an estimated 9,600 to 15,900 deaths, according to public health estimates. Slow StartDoctors say the season was slow to start and they’ve noticed an uptick of patients this month. Dr. David Dungan, a Lombard internist and pediatrician with DuPage Medical Group, says while he’s had fewer patients than last year, he’s also noticed an uptick in recent weeks. Content Square 2. “I don’t think we should rest yet,” he says. “This is typical; this is why they give us a wide window of influenza season.” While Dr. Erin McCann, a Chicago pediatrician at Amita Health, says she’s also seen “a lot more flu in the last couple weeks,” she’s noticed those who have had a flu shot have shorter, milder cases. Vaccine SuccessAccording to the CDC report, the 2018-19 flu season vaccine is 47 percent effective overall and 61 percent effective for children ages 6 months through 17 years. That compares with 40 percent vaccine effectiveness across all age groups for the previous two seasons. Myers says her Lemont pediatrics practice is “as slow as it’s ever been” during a flu season, and the only patients she’s seen with influenza didn’t get the flu shot. Last year, she saw even immunized patients get sick, she says. CDC spokeswoman Kristen Nordlund says the main strain of influenza circulating this year is H1N1, a strain “the vaccine tends to perform a little bit better against.” Last year, another strain, H3N2, was more predominant, she says. That could have contributed to the severity of the season because while the vaccine protects against H3N2, it’s not as effective at doing so. While preliminary study data can show vaccine effectiveness, Nordlund says that percent could change—and even increase—when the CDC studies vaccine effectiveness again at the end of the season. There were some limitations to studying this year’s vaccine midseason, she says, because there are fewer people getting sick this year to test, especially given the slow start to the season. ‘It’s Not Too Late’Dungan, along with the CDC and other public health officials, encourage anyone who hasn’t gotten a flu shot to make sure to get one, even though it takes two weeks to become effective. Dungan also points out that during another H1N1-predominant season, people were still getting sick in May. It was unusual, he says, but it’s possible. The milder season “should give people confidence the vaccine will be helpful to them,” Dungan says. “It’s not too late.” Nordland adds that the milder season should give people confidence that the vaccine is working, pointing out that the vaccine aims not only to prevent flu but to lessen the duration and the severity. She also says last year’s harsh season could’ve caused the bump, nationally, in the number of people getting a flu shot this year. “Everyone remembered how bad it was,” she says. Multiple PeaksWhile local influenza cases had a spike in late December and trended upward again at the start of this month, according to local public health data, it’s not unusual to have a few peaks in a season, says Dr. Marielle Fricchione, medical director of the immunization program with the Chicago Department of Public Health. “We’re still hearing from doctors and hospitals about high volume,” she says. Influenza B has barely made an appearance locally or across the country. It’s typical for that strain to show up closer to spring, delivering another peak, Fricchione says. The second wave is another reason doctors recommend flu shots even late into the season.
"Let the Water Hold Me Down" is an episode that starts slow but builds. Big Plot Points to Remember: Aria uses Holden as an alibi, but he has his own plans. Maya dated a boy while she and Emily were apart. What Lucas lost was not A’s cellphone, but Caleb’s money, gambling. Spencer visits a blind rehab center in Philadelphia and steals a ledger book demonstrating Alison didn’t visit Jenna the day before she went missing. Nothing on Hanna’s new family. Nothing on the NAT club. No boots. No Dr. Sullivan. No (sniffle) Jason. Read More...
/**************************************************************************** * Copyright (c) 2017 snowcold * Copyright (c) 2017 ~ 2018.5 liangxie * * http://qframework.io * https://github.com/liangxiegame/QFramework * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN * THE SOFTWARE. ****************************************************************************/ using UnityEditor; using QFramework; namespace QFramework { public static class AssetBundleExporter { public static void BuildDataTable() { Log.I("Start BuildAssetDataTable!"); ResDatas table = new ResDatas(); EditorRuntimeAssetDataCollector.AddABInfo2ResDatas(table); var filePath = (FilePath.StreamingAssetsPath + AssetBundleSettings.RELATIVE_AB_ROOT_FOLDER).CreateDirIfNotExists() + table.FileName; table.Save(filePath); AssetDatabase.Refresh(); } } }
Is collision-induced dissociation of low-energy carbonyl sulfide cations adversely affected by asymmetry? We have measured relative abundances of fragment ions resulting from collision-induced dissociation of OCS(+) ions in collision with xenon neutrals as a function of ion kinetic energy and scattering angle. The lowest energy dissociation product, S(+), dominates at all energies up to 53 eV kinetic energy studied here. Surprisingly, the second most abundant dissociation channel is CS(+) and not CO(+) even though the thermochemical threshold for CO(+) is lower than that for CS(+) and CO(+) is more abundant than CS(+) in the normal mass spectrum of OCS. We do not observe any significant abundance of CO(+) in this energy range, suggesting that collision-induced excitation and dissociation of OCS(+) is significantly different to that of symmetric triatomic ions. A possible role of asymmetry in the molecular ion's collisional activation via neutral collision is suggested for the different behavior.
"Three" seasons room to four seasons I have what you could call a three seasons room off the back of my house. The stairs to the basement are located within this room. Wanting to semi-finish off the basement in the future I don't want to have to walk out in the cold to go into the basement. The walls are 2x4s with insulation and the ceiling has some insulation too. Three doors, 1 steel entry, 1 wood entry, and 1 wood to the garage. There are 7 storm windows around the room. The storms are fastened to 1xs between them. I know the storms are the coldest part of the room.
Sudden death with massive hemoptysis from rupture of a thoracic inflammatory aortic aneurysm: an autopsy case report. An 84-year-old-man was admitted to the Department of Neurosurgery for a sudden episode of fainting. Brain computed tomography and magnetic resonance imaging demonstrated no fresh lesions. Anorexia, fever and elevation of C-reactive protein and creatine phosphokinase were observed, and the patient was transferred to the Department of Internal Medicine for further examination and treatment. High-dose steroids and antibiotics were administered, and his fever subsided. However, massive hemoptysis suddenly developed and the patient died. A thoracic aortic aneurysm that had coalesced and ruptured a left lung bronchus was detected at autopsy. Pathological examination revealed an inflammatory aortic aneurysm.
Shameful Surrender by Emily Tilton Thirty-three-year-old tech company CEO Maia North has never been spanked, and she has certainly never been brought to a quivering, shameful climax while bent over the hood of her car in the company parking lot, but her life changes in a moment when handsome businessman Gordon Ernkat is tasked with giving her exactly what she needs, whether she likes it or not. Maia has something that Gordan’s employers want, and he is going to get it from her, one way or another. Maia soon finds herself being taken by van to a secret location, and before long she is blushing crimson as she is stripped bare, intimately examined, and punished sternly with Gordon’s belt. But will mastering Maia’s virgin body prove sufficient to compel her surrender? Publisher’s Note:Shameful Surrender is a stand-alone short story which is the third entry in the Bound for Service series, which shares the same near-future setting as The Institute Series. It includes spankings and sexual scenes. If such material offends you, please don’t buy this book. Excerpt Maia’s brilliant mind whirled in a way it never had before, and she suddenly understood that everything was very simple. She knew she had no choice, because she needed what Catherine needed, and Gordon somehow knew that about her. Gordon knew Maia needed spanking; he knew she needed fucking; he knew she needed to come right now. “I will,” she sobbed, bouncing desperately up and down on his hand, trying to rub her clit against the ball of his thumb as he pressed the fingertip further into her tiny anus, as if telling her that she would belong to him there, too. “You will what?” he murmured into her ear. Gordon had given all the rational arguments about the metadata back in the boardroom. Why had Maia refused to see reason? Right now she had no idea, and all she had to do was say she would do the thing she desperately wanted to do—and she didn’t even have to admit she wanted it. She whispered, through the panting he caused with the tiniest movements of his fingers, “I’ll be a good girl.” As soon as the words left her mouth, she felt him take hold of the small of her back, his big left hand steadying her so that his right, working her clit, could push her straight over the edge of her orgasm and into space, flying somehow under the power of her wantonness, the rocket fuel provided by his knowing hand. He stripped her jeans down, then, and Maia only had to step out of her sandals, and then the pants and panties. They could all see her red-furred pussy, now, the way she shaved most of it and left a little tuft at the top, just like Catherine did on NMB, because Mr. Stonehill had told her he liked it that way. How did Gordon like a pussy to look, she wondered with a deep blush as he picked her up and put her in the exam chair? She wouldn’t have to take off all her clothes, then? Wouldn’t have to stand naked in front of the big window? Gordon had commuted her sentence in that regard, Maia realized, just as he had made her come over her hood in the parking garage rather than spanking her with her jeans down. “Knees in the stirrups, please,” the doctor said. Maia bit her lip, the heat rising in her cheeks, as Gordon helped open her that humiliating way. She hated the gynecologist’s office not because of the embarrassment itself but because of the way her mind and her body reacted to it—the way she always worried about getting aroused even though in the reality of a GYN appointment she never did, since nothing actually arousing ever happened when she lay opened and exposed for the doctor. Now, though, with Dr. Franklin on a stool looking at her, touching her in a very different way from how her own doctor did; with him rubbing cool, slightly stinging alcohol on the sensitive little place between her vagina and her anus; with Gordon standing next to her, his left hand casually on her right knee; with the doctor saying, for some reason, “There we go—it will come on line in a few seconds”; with Gordon saying, “Go ahead and test her responsiveness for me”; with the doctor’s fingers…
A selection of two and three bedroom attractive stone built country farm cottages, set in the delightful Somerset Countryside yet close to all the holiday attractions of Weston-super-Mare. The cottages are surrounded by the tranquil beauty of the Somerset Wetlands and the rugged outcrops of the Mendips and Quantocks, yet they are close to the world heritage site of Bath and the historic Cathedral of Wells. All the character cottages have fully equipped modern kitchens, central heating, comfortable and spacious sitting rooms, outside entertaining and garden with ample car parking. Each cottage has a TV, DVD player and Wifi. The cottages are either in Kewstoke - five minutes from the unspoiled beach of Sand Bay noted as a site of scientific interest or set amongst the green fields of the hamlet of Rolstone. Both locations within easy distance of the seaside resort of Weston super Mare. West Country Farm Cottages understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of everyone who visits this website, http://www.westcountryfarmcottages.co.uk (“Our Site”) and will only collect and use personal data in ways that are described here, and in a way that is consistent with our obligations and your rights under the law. Please read our Privacy Policy carefully and ensure that you understand it. Your acceptance of this Privacy Policy is deemed to occur upon your first use of Our Site. If you do not accept and agree with this Privacy Policy, you must stop using Our Site immediately.
Hi there, I'm 6'1" white male Xtrabeing, welcome to the Fleshpots. Please don't be offended, but I like myself rather a lot. When stranger-girls shout out they want to have your baby to you, it tends to affect the ole ego a tad. 400 xwatchers come here daily and you're 1. The unbelievable, glo-ing Industrial Rev- olution began in the 1700s, but not until past 1850 was the holy grail discovered: lightning in a wire, electricity. Turbines move, creating electricity. Because battery storage improvement has proceeded at a shitty rate, we have a 24-hour electrical grid and power generation system that runs consistently and shunts from one sector of North America to another, sending power to heat our stove burners so we can cook food, cool our food so it doesn’t spoil, light our rooms, flush our toilets for us, let our telephones work, recharge our cell phones and make these glowing magic machines, wonder of the world, we call computers work. The Romans had aqueducts and arches and yes, watermills. But these are not what we call technology. Technology is about a level of complexity, frequently involving machines, which itself involves artificial movement of cogs and wheels and hydraulics, leading to actions that are amazing, desirable and well-nigh magical. In any battle between true magic and high technology, of course true magic wins out every time, but the mass replicability of technology (a hundred million dancing brooms, metaphorically speaking) has a kind of oomph on its own. Electricity has replaced nearly everything that came before. Because it hides unseen in our walls, and a front of computers or stoves uses it, we often completely disregard it. If there was ever a nuclear war, and future humans were left to piece together the valuable pieces of the past, electricity would hardly merit a mention in novels, the most common surviving source of tales and facts about the dominant technological sprawling civilizations we live in. In fact, there would be more stories about magic in the fantasy genre than there would be tales of tech in the modern world. Why does computing work depend on 5 volts of power? What even is a V? How can 0’s and 1’s, on or off, powered and unpowered, make a computer go? The food you eat at the supermarket all comes from factories. The assembly lines that move forward, the automatic cooking, always tasty, never spoiled, whether Pasteurization or Mason-Jar-like sealing in our tin cans, works like magic. We depend on this ease of manufacture, to the point that the prices of food are heavily subsidized by electricity. Knowledge of electricity is not widespread. My father, who in his working life was a nuclear engineer, had an extensive understanding of it as a front-line commando worker who simulated nuclear reactors and their pulses of outgoing energy. As a computer-programmer-in-training, at the University of Waterloo, I came to understand electricity in a more subtle way, in the software rather than the hardware, software always being my thing more than the cables and networks that glue the office together. It always seemed to me that the power and grace (yes grace) of electricity was a hallmark of the ultimately artistic situation of our civilization. Although I hate much of civilization, especially the shoddy societies it automatically produces every time, I admire the form and color of technology as it keeps streams of cars flowing to the timing of electrified, solar-powered traffic lights and powers our vital information-source TV sets that deliver our weather reports — rain or shine — before we step out of our doors in the morning on the way to work. Electricity is a miracle that demands to be taught, understood, and supported, in the sense, of instance, of channeling massive government subsidies away from social programs and toward *snarling vicious snap* proper battery storage that can keep the blue-white sizzling genie on tap for longer. It is a travesty and a shock that we are still working with dawn-of-electricity battery “technologies” when, to use one example, nuclear plants have shown massive advances over other power generators, and even old artifices like windmills have been updated for the modern world. Battery power must grow reliable, and become a massive commonplace. The U.S. military, as demonstrated in the Balkans during the unwise de facto Albanian protectorate, can drop disrupters on power grids, throwing a massive psychological monkey wrench into the civilian populace. Whereas conventional bombing in WW2 didn’t do much, the loss of power seemingly permanently is a de-testicularizer that fucks wid people bad. Kinda especially hard to live in the towering apartment buildings that characterize modern homes for many. No elevators, you know. When life throws lemons at you, make lemonades. When someone disrupts your power grid for you, make nukes and get ’em back. I think Iran knows in some sense that it will always be a jerking marionette at the U.S. beck and call as long as it doesn’t have nukes of its own. They don’t even have to reach the U.S. proper; the threat of wiping out Jerusalem and Tel Aviv will be enough to break the hearts of the poor little Middle-East-quagmire-addicted Americans. One day the Pax Americana will learn to ignore the Israelis, and life will march to a new electrical drummer — and unlike the fake Energizer bunny on ads, this one will really THUMP THUMP THUMP on and on without surcease.
Q: Why does my Default page's title not display on breadcrumb? I'm using SharePoint 2010 and all I am trying to do is be able to display my default page's title in the breadcrumb. All other pages work except the default page. Could there be any reason for this? Here is the line of code I am using in my master page: <asp:SiteMapPath ID="siteMapPath" Runat="server" SiteMapProvider="CurrentNavSiteMapProviderNoEncode" RenderCurrentNodeAsLink="false" SkipLinkText="" NodeStyle-CssClass="ms-sitemapdirectional"/> A: I haven't tested this myself, but this blog, indicates how to accomplish this. This involves making changes to your SiteMapPath, PlaceHolderTitleBreadcrumb on your master page, and overwriting the content placeholder for the PlaceHolderTitleBreadcrumb on the page layouts. Snippet (from blog): Even if in SharePoint 2010 we have the new and cool popup breadcrumb that shows the sites on actual levels (separate lines) the need for a down-to-earth normal breadcrumb still exists. How do we achieve it? First of all, we add the placeholder for the breadcrumb on the master page: <asp:ContentPlaceHolder id=”PlaceHolderTitleBreadcrumb2″ runat=”server”> <asp:SiteMapPath SiteMapProvider=”CombinedNavSiteMapProvider” id=”ContentMap2″ runat=”server” RenderCurrentNodeAsLink=”true” NodeStyle-CssClass=”ms-sitemapdirectional”/> </asp:ContentPlaceHolder> You can experiment with the available site map providers. In my case the CombinedNavSiteMapProvider did the best job. The options are (obviously, not all can be used everywhere): SPNavigationProvider SPSiteMapProvider SPContentMapProvider SPXmlContentMapProvider ExtendedSearchXmlContentMapProvider AdministrationQuickLaunchProvider SharedServicesQuickLaunchProvider PWASiteMapProvider GlobalNavSiteMapProvider CombinedNavSiteMapProvider CurrentNavSiteMapProvider CurrentNavSiteMapProviderNoEncode GlobalNavigation CurrentNavigation SiteDirectoryCategoryProvider MySiteMapProvider MySiteLeftNavProvider MySiteSubNavProvider I also wanted to concatenate this with the page level breadcrumb. This breadcrumb (or just page title in the case of pages) is heberated by the PlaceHolderTitleInArea place holder. So the content becomes: <asp:ContentPlaceHolder id=”PlaceHolderTitleBreadcrumb2″ runat=”server”> <asp:SiteMapPath SiteMapProvider=”CombinedNavSiteMapProvider” id=”ContentMap2″ runat=”server” RenderCurrentNodeAsLink=”true” NodeStyle-CssClass=”ms-sitemapdirectional”/> <span lang=”en-us” >&nbsp;&gt;</span> <asp:ContentPlaceHolder id=”PlaceHolderPageTitleInTitleArea” runat=”server”/> </asp:ContentPlaceHolder> However, this will not work on your page layouts, so in there you have to override the whole content place holder with: <asp:Content ContentPlaceHolderID=”PlaceHolderTitleBreadcrumb2″ runat=”server” > <asp:SiteMapPath SiteMapProvider=”CurrentNavSiteMapProviderNoEncode” id=”ContentMap2″ runat=”server” RenderCurrentNodeAsLink=”true” NodeStyle-CssClass=”ms-sitemapdirectional” /><span lang=”en-us”>&nbsp;&gt;</span> <SharePointWebControls:FieldValue id=”PageTitle” FieldName=”Title” runat=”server”/> </asp:Content> And here the CurrentNavSiteMapProviderNoEncode provider is mandatory.
Here is the curve fetch file sent to me. It has plenty of points in it. If you give me a list of which ones you need we may be able to construct a secondary worksheet to vlookup the values. adam 35227 -----Original Message----- From: Royed, Jeff Sent: Tuesday, September 25, 2001 11:37 AM To: Bayer, Adam Subject: Curve Fetch File Let me know if it works. It may be required to have a certain version of Oracle for it to work properly. Jeff Royed Enron Energy Operations Phone: 713-853-5295
ABOVE: Rabbi Abraham Cooper of the Simon Wiesenthal Center lights a candle in remembrance of Holocaust victims at an event held at Chulalongkorn University on Jan. 27. Thailand needs to increase its understanding of history to more successfully engage the world today and build peace in Southeast Asia, according to a recent discussion of the Holocaust and genocide held at Chulalongkorn University. Students, teachers and dignitaries gathered on the occasion of International Holocaust Memorial Day on Jan. 27 to discuss legacies of genocide as much in Southeast Asia as in Europe, and why it matters today in Thailand just as much as elsewhere. Israeli Ambassador Simon Roded, appearing along with his counterpart from the Czech Republic, artists and academics, said the event was intended “to teach lessons of the Holocaust and prevent future genocide” on a day which marked the 70th anniversary of the liberation of the Auschwitz death camp. Organized by the Israeli embassy and Chulalongkorn’s Rotary Peace Center, the university setting for the event had special significance, as noted by Rabbi Abraham Cooper of the Simon Wiesenthal Center in Los Angeles. Cooper said a late 2013 incident in which graduating seniors posed in front of a mural of Adolf Hitler, who was featured among various “superheroes,” underscored the need for greater awareness. Photo: Simon Wiesenthal Center Candles were lit as part of the ceremony and a moment of silence was held in memory of the 11 million lives that were lost at hands of the Nazis during World War II. The primary discussion however addressed awareness, education and cultural relevance of the Holocaust and genocide in Southeast Asia. Among speakers was renowned composer Somtow Sucharitkul, who said Thai people need to increase their understanding of history. “The lack of knowledge is absolutely abysmal,” he said about awareness of what happened in Europe during World War II. Somtow recently produced an adaption of “Brundibar,” an opera created during the Holocaust inside a Czech concentration camp. Cooper called on youth to leverage their technological savvy to work together to promote peace. “We need armies of young people who understand the power of the selfie and of the internet and social networking and put it to work for great things,” Cooper said. Chulalongkorn Professor Surichai Wun’gaeo spoke on the need for peace to counter hate and abuse of minority groups. Chy Terith, executive officer of the Documentation Center of Cambodia who spoke on the lack of essential media coverage of crimes against humanity as perpetrated in his country by the Khmer Rouge. Cambodia is struggling to educated its children so they don’t forget of its brutal recent history. The event concluded with the screening of award-winning documentary, “The Power of Good.” A traveling exhibition from the Museum of Tolerance in Los Angeles called “The Courage to Remember” is on display until tomorrow on the first floor of the Mahitaladhibersra Building at Chulalongkorn University. Isaiah Somanas is a junior Communication Arts student at Chulalongkorn University. Related: Israel condemns ‘Thai Values’ Hitler scene Director of ’12 Values’ film doesn’t get the Hitler fuss In Prayuth’s ‘Thai Values,’ school children love painting Hitler World Cup celebrants go off the chain with Hitler, celebrate their ignorance with world Chulalongkorn Fine and Applied Arts Faculty dean apologizes for Hitler graduation mural Former education minister: Kids need to study more Hitler, history in general Achtung! Chula students celebrate graduation with Hitler Nein! KFC threatens lawsuit against non-existent Hitler fried chicken restaurant Democrat MP salutes Hitler on Thailand Parliament floor Grove: Coconuts Brand Studio Fast. Funny. Digital. We produce creativity that delights and influences customers. Join forces with us to slay buzzwords, rise above the noise, and sow the seeds of something great.
/* * Copyright (c) 2012-2018 Red Hat, Inc. * This program and the accompanying materials are made * available under the terms of the Eclipse Public License 2.0 * which is available at https://www.eclipse.org/legal/epl-2.0/ * * SPDX-License-Identifier: EPL-2.0 * * Contributors: * Red Hat, Inc. - initial API and implementation */ package org.eclipse.che.security.oauth1; import org.eclipse.che.api.core.ServerException; /** * Exception raised when the OAuth authentication failed. * * @author Kevin Pollet * @author Igor Vinokur */ public final class OAuthAuthenticationException extends ServerException { /** * Constructs an instance of {@link OAuthAuthenticationException}. * * @param message the exception message. */ public OAuthAuthenticationException(final String message) { super(message); } /** * Constructs an instance of {@link OAuthAuthenticationException}. * * @param cause the cause of the exception. */ public OAuthAuthenticationException(final Throwable cause) { super(cause); } }
Taraki Sivaram Taraki Sivaram or Dharmeratnam Sivaram (11 August 1959 – 28 April 2005) was a popular Tamil journalist of Sri Lanka. He was kidnapped by four men in a white van on 28 April 2005, in front of the Bambalapitya police station. His body was found the next day in the district of Himbulala, near the Parliament of Sri Lanka. He had been beaten and shot in the head. Biography Sivaram, the well-known and controversial political analyst and a senior editor for Tamilnet.com, was born on 11 August 1959 in Batticaloa, Sri Lanka, to a prominent local family with significant land holdings and political connections near the village of Akkaraipattu. He was educated at St. Michael's College, Batticaloa, and later at Pembroke and Aquinas Colleges in Colombo. He was accepted into the University of Peradeniya in 1982 but soon dropped out due to tensions associated with the first phases of Sri Lanka civil war in 1983 (see Black July pogrom). On 8 September 1988 he married Herly Yogaranjini Poopalapillai of Batticaloa. They eventually had three children: Vaishnavi, Vaitheki, and Seralaathan. Political activity In 1982 Sivaram joined the Gandhian Movement, then a front organisation for the People's Liberation Organisation of Tamil Eelam (PLOTE), one of the many Tamil organisations. After Sri Lanka's ethnic conflict erupted into civil war in 1983, Sivaram, under the alias SR, soon became a PLOTE militant. In 1988, a year after the Indo-Lankan accord was signed, Uma Maheswaran, PLOTE's leader, appointed Sivaram General Secretary of the Democratic People's Liberation Front (DPLF), the organisation's registered political party. Sivaram left PLOTE in 1989, after disagreeing with Maheswaran's attempts to establish firmer relations with the Sinhala nationalist Janatha Vimukthi Peramuna (JVP) and because of group's involvement in an abortive coup in the Maldives. His career as a journalist In 1988 with the encouragement of fellow journalist, activist and actor Richard De Zoysa he became a reporter for the UN-funded Inter Press Service (IPS), for whom De Zoysa was a correspondent. In 1989, when The Island newspaper needed a political analyst, De Zoysa suggested Sivaram. The Island editor, Gamini Weerakon, proposed tharaka or star in Sinhalese as Sivaram's pen name but a sub-editor accidentally printed Taraki instead, giving birth to Sivaram's nom de plume. In 1990 Sivaram helped identify Richard De Zoysa's body after De Zoysa was abducted from his home and killed. Popularity Taraki's articles reflect his personal style combined with accurate and inside information, explaining military, political, strategic and tactical aspects of all sides in Sri Lanka's complex conflict. Moreover, his reading in military science and political philosophy benefited his literacy greatly. By the early 1990s, Sivaram's Taraki column had become a must read for many interested in Sri Lanka. As a free-lance journalist, Sivaram, eventually wrote for many newspapers including The Island, The Sunday Times, Tamil Times of London, The Daily Mirror, and the Tamil newspaper Virakesari. In 1997, Sivaram helped Tamilnet.com reorganise itself into a Tamil news agency with its own string of reporters, and remained a senior editor there until his death. He filed his last story for Tamilnet.com at 7:30 PM on the night he was murdered. Collaboration with academics Due to his grasp of Tamil politics and literature and Sri Lanka's complex history, he was able to collaborate with many academics. Hence, Sivaram collaborated with historians, political scientists, anthropologists, policy experts, and geographers from many of Sri Lanka's universities and think tanks, as well as with foreign and foreign-based scholars from (among other schools around the world) the University of Colorado, the University of South Carolina, and Clark University. His most prominent collaborators were Professor Mark Whitaker, an anthropologist with the University of South Carolina, and Dr. Jude Fernando of Clark University. Involvement with NGOs In the mid-1990s many governments and human rights non-governmental organisations (NGOs) collaborated with Sivaram for advice on local political and military matters. He widely travelled in Europe, Asia, and North America and equally well known to governments, the diplomatic community, and human rights activists. He was killed just ahead of a scheduled trip to Japan to consult with the Japanese government regarding the then current peace process. Threat to his life When Sivaram started receiving death threats, he was requested by his friends and colleagues to move himself and his family out of Sri Lanka. He always refused to leave. Where else should I die but here? he often declared. Yet in 2004 the police twice searched Sivaram's home, and various groups political parties such as the Jathika Hela Urumaya and Janatha Vimukthi Peramuna in Sri Lanka publicly threatened him as a Liberation Tigers of Tamil Eelam (LTTE) activist and a terrorist sympathiser. International reaction After his death was reported, governments such as Japan, and international organisations such as Reporters Without Borders and UNESCO officials publicly condemned his murder and requested the government of Sri Lanka to investigate the murder. Accusations and investigation The LTTE accused the government in complicity of his murder. Prior to his murder state owned media outlets since 2001 have accused him of being an LTTE spy, leading to the conclusion by some that his death was officially sanctioned (see State terrorism in Sri Lanka). One year later a Tamil man belonging to the PLOTE organisation was apprehended but eyewitnesses refused to identify him as one of the kidnappers. No more activity regarding the government investigation is available. Reporters Without Borders, a pres freedom organisation, said "The Sri Lankan authorities have regrettably demonstrated a complete lack of will to solve cases of murders and physical attacks against journalists." Controversy Sivaram was also accused by human rights activists such as Rajan Hoole who was critical of Sivaram's role as the Tamilnet.com's editor, that he was involved in the murder of two PLOTE dissidents during his days as a Tamil militant. This report was denied by fellow journalist David Jeyaraj from Canada. However, some activists and writers associated with former PLOTE dissidents have disagreed with Jeyaraj's conclusions. Jeyaraj wrote that Karuna, an LTTE splinter group leader and a member of a government aligned political-military organisation was personally involved in the murder of Sivaram. Karuna has denied this allegation categorically and blamed the LTTE leadership for his murder in addition to those of Lakshman Kadirgamar and Kumar Ponnambalam. After the arrest of one suspect, the investigation was abandoned. Legacy Sivaram following his death, became a cause célèbre for Tamil activists and journalists worldwide. He is revered for his work which focused not just the plight of the Eelam Tamils but helping oppressed people all over the world empower themselves and get out from oppression. His colleague Dr. Jude Fernando, of Clark University, was quoted saying: Eelam poet Kaasi Ananthan mentioned him as a neutral journalist who was not driven by racial emotions. He was posthumously honored as Maamanithar, the highest civilian honor in the former state of Tamil Eelam by LTTE Leader Velupillai Prabhakaran. In 2015, the 10th anniversary of his death was observed, in various parts of Tamil Nadu and Sri Lanka. Also a documentary film on Taraki's work was released on the World Press Freedom Day at the Chennai Press Club, Chennai. See also Tamilnet Interview with Dharmaratnam Sivaram Collection of writings 1991 An Insider's analysis of the Ethnic Conflict in Sri Lanka Collection of his writings at Tamilnation.org References External links Learning Politics From Sivaram, The Life and Death of a Revolutionary Tamil Journalist in Sri Lanka Taraki Sivaram Dossier by Nadchathiran Chevinthian(Tamil/Bamini font) HRW Country report for 2005 Amnesty International report on Sri Lanka 2006 Mourning Sivaram by Qadri Ismail Taraki: The selective politics of an assassination The man who knew too much – is now dead by Prof. Tom Plate UTHR(J) report on Sivaram Category:1959 births Category:2005 deaths Category:Deaths by firearm in Sri Lanka Category:Assassinated Sri Lankan journalists Category:Sri Lankan Tamil journalists Category:Sri Lankan Tamil editors Category:Minority rights activists Category:Assassinated Sri Lankan activists Category:People murdered in Sri Lanka Category:Sri Lankan Hindus Category:Alumni of the University of Peradeniya Category:Maamanithar Category:Alumni of St. Michael's College National School
--- abstract: 'From a combination of deep Hubble Space Telescope $V$ and $I$ images with groundbased images in the same bands, we have obtained color–magnitude diagrams of M10, M22, and M55, extending from just above the hydrogen burning limit to the tip of the red giant branch, down to the white dwarf cooling sequence. We have used the color-magnitude arrays to extract main sequence luminosity functions (LFs) from the turnoff to $m \sim 0.13m_\odot$. The LFs of M10 is significantly steeper than that for the other two clusters. The difference cannot be due to a difference in metallicity. A comparison with the LFs from Piotto, Cool, and King (1997), shows a large spread in the LF slopes. This spread is also present in the local mass functions (MFs) obtained from the observed LFs using different theoretical mass–luminosity relations. The dispersion in the MF slopes remains also after removing the mass segregation effects by using multimass King-Michie models. The globular cluster MF slopes are also flatter than the MF slope of the field stars and of the Galactic clusters in the same mass interval. We interpret the MF slope dispersion and the MF flatness as an evidence of dynamical evolution which makes the present day globular cluster stellar MFs different from the intial MFs. The slopes of the present day MFs exclude that the low mass star can be dynamically relevant for the Galactic globular clusters.' author: - 'G. Piotto' - 'M. Zoccali' date: 'Received ; accepted ' title: 'HST Luminosity Functions of the Globular Clusters M10, M22, and M55. A comparison with other clusters. [^1]' --- Introduction {#intro} ============ The [*Hubble Space Telescope (HST)*]{} allows the derivation of color magnitude diagrams (CMDs) of Galactic globular clusters (GCs) which extend to almost the faintest visible stars, just above the hydrogen-burning limit for the nearest clusters (King  1998). These CMDs can be used to extract luminosity functions (LFs), and from them mass functions (MFs) which extend over almost the entire mass range of the luminous GC stars, from the turnoff (TO) down to the bottom of the main sequence ($0.1\leq m/m_\odot\leq0.8$). The GC MFs are important as they can provide important observational inputs in a variety of astrophysical problems, like the realistic dynamical modeling of individual clusters (King, Sosin, and Cool 1995, Sosin 1997), and the role of dynamical evolution in modifying the GC stellar content (Piotto, Cool, and King 1997, PCK). In principle, GC MFs also give information about the amount of mass contained in very-low-mass stars and brown dwarf stars in globulars, and, by extension, in the Galactic halo. The observed MFs are related to the GC initial MFs (IMFs): a basic input parameter for any GC and galaxy formation model. Progress on these issues requires accurate photometry of main sequence (MS) stars. In many cases, the HST data alone cannot provide all the information. The brightest MS stars in the closest GCs are always badly saturated in deep WFPC2/HST frames, and often there are no short exposures in the same field, as we tend to use HST to measure the faintest objects. This lack of information might become a dangerous drawback when comparing the stellar LF of different clusters, as discussed in Cool, Piotto, and King (1996, CPK). In fact, the shape of the LF for stars fainter than $M_V\sim8$ is dominated by the slope of the mass-luminosity relation (MLR) more than by the shape of the MF. Ground-based data might become of great importance in this respect. Here we present the first deep HST CMDs and LFs for M10 (NGC 6254) and M55 (NGC 6809), and an independent determination of the CMD and the LF of M22 (NGC 6656). A CMD and a LF of M22 have already been presented by De Marchi and Paresce (1997), based on the same images. For all three clusters, the CMDs and LFs have been extended to the TO and above, by means of ground-based data. We compare the results for M22 with the LF of De Marchi and Paresce (1997), and then compare the LFs for the three clusters with each other. A comparison with the presently available HST LFs and MFs for intermediate and metal-poor clusters is also presented. This paper is a continuation and an extension of the paper by PCK. A description of the observations and of the data analysis is presented in Section \[dataset\]. The CMDs and LFs are presented in Sections \[cmd\] and \[lf\]. The MF is derived in Section \[mf\]. A comparison of the presently available LFs extended to the TO is shown in Section  \[comp\], and a discussion follows in Section \[disc\]. Object Telescope Obs. date Filter Exp. time (s) -------- ----------- ------------ -------- --------------- M22 HST 30-9-1995 F606W 1100 ” ” F606W 1200$\times$3 ” ” F814W 1100 ” ” F814W 1200$\times$3 DUTCH 15-4-1997 V 45 ” ” V 1500 ” ” I 45 ” ” I 1500 M55 HST 4-11-1995 F606W 1100 ” ” F606W 1200$\times$5 ” ” F814W 1100 ” ” F814W 1200$\times$5 DUTCH 15-4-1997 V 45 ” ” V 1500 ” ” I 45 ” ” I 1500 M10 HST 10-10-1995 F606W 1100 ” ” F606W 1200$\times$9 ” ” F814W 1100 ” ” F814W 1200$\times$9 JKT 30-5-1997 V 15 ” ” V 45 ” ” V 1500 ” ” I 15 ” ” I 45 ” ” I 1500 : Data Set[]{data-label="log"} Observations and Analysis {#dataset} ========================= The data presented in this paper consist of a set of WFPC2 images and a set of ground-based frames covering approximately the same field for the three GCs M10, M22, and M55. The WFPC2 data have been taken from the ST-ECF HST archive and were obtained with the F606W and F814W filters during Cycle 5. The observation dates and the exposure times are given in Table \[log\]. The fields are located at about 3.0 arcmin (for M10), 4.5 arcmin (for M22), and 3.0 arcmin (for M55) from the cluster centers. The HST archive data did not include short exposures. This fact made impossible the photometry of any stars brighter than V$\sim19.0$, because of the CCD saturation problems. This means that the CMDs and the LFs from the HST photometry are truncated at about two magnitudes below the TO. In order to extend both the CMDs and the LFs to the TO and above, we collected a set of short-exposure images with three 1-m size telescopes. For M22 we used the 0.9m Dutch telescope at ESO (La Silla), the 1.54m Danish telescope at ESO for M55, and the 1.0m Jacobus Kapteyn Telescope (JKT) at La Palma (Islas Canarias) for M10 ([*cf.*]{} Table \[log\] for the observation dates and the exposure times). The seeing conditions were exceptionally good at the JKT (0.7 arcsec FWHM), while the average seeing conditions for the ESO images were 1.2 arcsec FWHM. The ground-based images for M10 and M22 were collected in photometric conditions, while the M55 data come from a non-photometric night. HST data reduction {#hstdata} ------------------ All HST observations were pre-processed through the standard HST pipeline with the most up-to-date reference files. Following Silbermann  (1996), we have masked out the vignetted pixels, saturated and bad pixels and columns using a vignetting mask created by P.B. Stetson together with the appropriate data quality file for each frame. We have also multiplied each frame by a pixel area map (also provided by P.B. Stetson) in order to correct for the geometric distortion (Silbermann  1996). The photometric reduction was carried out using the\ DAOPHOT II/ALLFRAME package (Stetson 1987, 1994). A preliminary photometry was carried out in order to construct an approximate list of stars for each single frame. This list was used to accurately match the different frames. With the correct coordinate transformations among the frames, we obtained a single image, combining all the frames, regardless of the filter. In this way we could eliminate all the cosmic rays and obtain the highest signal/noise image for star finding. We ran the DAOPHOT/FIND routine on the stacked image and performed PSF-fitting photometry in order to obtain the deepest list of stellar objects free from spurious detections. Finally, this list was given as input to ALLFRAME, for the simultaneous PSF-fitting photometry of all the individual frames. The PSFs we used were the WFPC2 model PSFs extracted by P.B. Stetson (1995) from a large set of uncrowded and unsaturated images. We transformed the F606W and F814W instrumental magnitudes into the standard $V$ and $I$ systems using Eq. (8) of Holtzman  (1995) and the coefficients in their Table 7. Note that the CMDs of M10, M22, and M55 presented in the following come from the combination of the photometry in the three WF chips. The LFs have been obtained from chip WF2 for M10, from WF3 for M22, and WF4 for M55. These fields contain the largest number of unsaturated stars and the smallest number of saturated pixels. In view of the small error bars of the LFs presented in Section \[lf\], we considered it not worth the large cpu time that would have been required to run crowding experiments for every chip. Ground-based data reduction {#gbdata} --------------------------- Image pre-processing (bias subtraction and flatfielding) was carried out using standard IRAF routines. The stellar photometry has been obtained using DAOPHOT II/ALLFRAME as described above on all the images (including the short exposures) simultaneously. We constructed the model PSF for each image using typically $\sim$ 120 stars. Since some of the ground-based images have been collected on non-photometric nights, the calibration of the instrumental magnitudes was performed by comparison with the stars in the overlapping HST fields. We first adopted the color term obtained for the same telescopes during the previous nights in the same run (Rosenberg  1999). The zero points have been calculated by comparing all the non-saturated stars in the WFPC2 chips that were also measured in the ground-based images. The uncertainties in the $V$ zero points are 0.004, 0.035, and 0.015 magnitudes (the errors refer to the errors on the mean differences) for M10, M22, and M55, respectively. The errors in the $(V-I)$ colors are 0.006, 0.055, and 0.025, respectively. The zero point uncertainties for M22 are noticeably larger than for the other two clusters. This fact is due to the smaller overlap in magnitude between the ground-based and the HST photometries, as can be seen in Fig. \[cm22\]. The calibration of the M22 and M55 CMDs has been further checked by comparing these diagrams with other independently calibrated $V$ vs. $(V-I)$ ground-based CMDs kindly provided by Alfred Rosenberg (Rosenberg  1999). The two sets of data are consistent within the uncertainties given above. Shorter-exposure HST images (or longer-exposure ground-based frames) are desirable for a smoother overlap of the two data sets. Note that this problem does not affect the LF presented in Section \[lf\]. Indeed, a zero point error of a few hundreds of a magnitude is perfectly acceptable for a LF with magnitude bins of 0.5 mag. Artificial star tests {#astest} --------------------- Particular attention was devoted to estimating the completeness of our samples. The completeness corrections have been determined by standard artificial-star experiments on both the HST and ground-based data. For each cluster, we performed ten independent experiments for the HST images and five for the ground-based ones. In order to optimize the cpu time, in our experiments we tried to add the largest possible number of artificial stars in a single test, without artificially increasing the crowding of the original field. The artificial stars have been added in a spatial grid such that the separation of the centers in each star pair was two PSF radii plus one pixel. The position of each star is fixed within the grid. However, the grid was randomly moved on the frame in each different experiment. We verified that in this way we were not creating over-crowding by running an experiment with half the number of artificial stars. The finding algorithm adopted to identify and measure the artificial stars was the same used for the photometry of the original images. The artificial stars were added on each single V and I frame. For each artificial star test, the frame to frame coordinate transformations (as calculated from the original photometry) have been used to ensure that the artificial stars were added exactly in the same position in each frame. We started by adding stars in one V frame at random magnitudes; the corresponding I magnitude for each star was obtained using the fiducial line of the instrumental CMD. Finally, in each band, we scaled the magnitudes according to the frame to frame magnitude offset as calculated from the original photometry. The frames obtained in this way were stacked together in order to perform star finding and obtain the most complete star list. The latter was used to reduce the single frames simultaneously with ALLFRAME, following all the steps and using the same parameters as on the original images. In order to take into account the effect of the migration of stars toward brighter magnitudes in the LF (Stetson & Harris 1988), we corrected for completeness using the matrix method described in Drukier  (1988). In the LFs presented here, we include only points for which the completeness figures were 50% or higher, so that none of the counts have been corrected by more than a factor of 2. A comparison between the added magnitudes and the measured magnitudes allows also a realistic estimate of the photometric error $\sigma\subr{pho}$ (defined as the standard deviation of the differences between the magnitudes added and those found) as a function of magnitude. We use this information in different places in what follows. The color-magnitude diagrams {#cmd} ============================ The CMDs derived from the photometry discussed in the previous Section are presented in Figs. \[cm10\], \[cm22\], and \[cm55\]. The upper part of the CMDs comes from the ground-based data, while the lower part is from the three WF cameras of the WFPC2. In the case of M22, the CMD for magnitudes fainter than V=19.8 comes from the WF2 only: the differential reddening of this cluster (Peterson and Cudworth 1994) makes the sequence much broader than expected from the photometric errors. The MS of M22 from the three WF cameras is shown in Fig. \[cm22all\]. In Table \[disp\] the dispersion $\sigma_{MS}$ (defined as the sigma of the best fitting gaussian) of the MS (after the removal of the field star contamination as described in Section \[lf\]) is compared with the expected photometric error $\sigma_{(V-I)}$. The latter have been estimated from the artificial star tests (Section \[astest\]), in one magnitude bins, in the interval $20<V<26$. The resulting average differential reddening in the 3 WF fields is $\langle\sigma\subr{red}\rangle=\big\langle\sqrt{\sigma\subr{MS}^2-\sigma_{(V-I)}^2}\big\rangle=0.05$ magnitudes. This value must be considered as an upper limit for the differential reddening in this region. $$\begin{array}{llll} \hline \noalign{\smallskip} V & \sigma_{MS} & \sigma_{(V-I)} & \sigma_{red} \\ \noalign{\smallskip} \hline \noalign{\smallskip} 20.5 & 0.068 & 0.036 & 0.058 \\ 21.5 & 0.069 & 0.045 & 0.052 \\ 22.5 & 0.072 & 0.052 & 0.048 \\ 23.5 & 0.081 & 0.071 & 0.039 \\ 24.5 & 0.093 & 0.079 & 0.049 \\ 25.5 & 0.100 & 0.086 & 0.051 \\ \noalign{\smallskip} \hline \end{array}$$ The ground-based and the HST fields are partially overlapping, with the ground-based images always covering a larger portion of the cluster. A detailed discussion of these CMDs will appear elsewhere. Here it suffice to note that we measured stars from the tip of the giant brach to a limiting magnitude $V\sim28$. A white dwarf cooling sequence is clearly seen in all diagrams (but it will be discussed elsewhere). For the first time, we have a complete picture of a simple stellar population about 15 Gyr after its birth, from close to the hydrogen-burning limit to the final stages of its evolution along the white dwarf sequence. These diagrams can be used for a fine tuning of the stellar evolution and population synthesis models (Brocato  1996). Contamination by foreground/background stars is small for M10, as expected from its galactic latitute ($b=23^\circ$), though a few background stars (likely from the outskirts of the Galactic bulge) are present. Despite the fact that M55 has the same latitude as M10, a significantly larger fraction of field stars is visible in the CMD of Fig. \[cm55\]. Some of these stars are likely bulge members, but the prominent sequence blueward of the MS of M55 must be associated with the MS and TO of the stars in the Sagittarius dwarf spheroidal galaxy (Mateo  1996, Fahlman  1996). M22 is the most contaminated cluster. Both Galactic disk and Galactic bulge stars are clearly seen in the CMDs of Figs. \[cm22\] and \[cm22all\]. Deep CMDs also contain information on the low-mass content of the clusters. This information can be extracted from our data only after we have a reliable transformation from luminosities to masses. Unfortunately, such a transformation remains uncertain for low-metallicity, low-mass stars. Almost nothing is known from the empirical point of view, and different calculations of stellar models yield different masses, particularly for the lowest-mass stars (King  1998), and different overall trends (slopes) for the mass-luminosity relations (MLRs). As already found for NGC 6397 (King  1998) and the other three metal-poor clusters studied by PCK ( their Fig. 3), among the existing models we find that those by the group in Lyon (Baraffe  1997) and by the group in Teramo (Cassisi  1998, in preparation) best reproduce the observed sequences of M10, M22, and M55. \[Note that Cassisi et al.’s (1998) models below $0.5m_\odot$ ($M_V\sim8.1$) are the same models as in Alexander  (1997).\] The level of agreement between the models and the observed data can be fully appreciated in Figs. \[m10teo\], \[m22teo\], and \[m55teo\]. In these figures the open circles represent the MS ridgeline, obtained by using a mode-finding algorithm and a kappa-sigma iteration in order to minimize the field star contamination. The dotted line represents the $V$ magnitude limit of the LFs presented in the following Section \[lf\]; the data below this magnitude limit are not used in the present paper. The dashed line shows the isochrone corresponding to the metallicity which best matches the Zinn and West (1984) \[Fe/H\] (iron) content, scaled to the appropriate metallicity \[M/H\] assuming \[O/Fe\]=0.35 (Ryan and Norris 1991), and using the relation by Salaris, Chieffi, and Straniero (1993). According to Table \[distance\], we used the models for \[M/H\] $=-1.5$ for M22 and M55, and the models for \[M/H\] $=-1.3$ for M10. For comparison reasons, in Figs.\[m10teo\], \[m22teo\], and \[m55teo\] we show also the isochrones which best match the Zinn and West (1984) metallicity assuming a solar ratio for the alpha elements (solid line). The distance modulus and reddening have been left as free parameters. The resulting values of $(m-M)_V$ are in very good agreement with the values in the literature ( Djorgovski 1993). This is also true for the $E(V-I)$ resulting from the fit of the Lyon group models. The models from the Teramo group result systematically redder by about 0.06 magnitudes in $(V-I)$ than the isochrones from Baraffe  (1997), and the resulting reddening is marginally consistent with the reddening in the literature. In the LF comparison discussed in Section \[lf\], we have adopted the distance moduli and reddenings used in the fit of the Baraffe  models and listed in Table \[distance\]. We want to briefly comment on the comparisons in Figs.\[m10teo\], \[m22teo\], and \[m55teo\], leaving a more complete discussion to a future paper specific to the CMDs. There is an overall agreement between the models and the observed sequences. With the adopted distance moduli, both sets of models reproduce the characteristic bends of the MS, and at the correct magnitudes. The MSs of M22 and M55 seem to be better reproduced by the models, while the discrepancies seems to be more significant for M10. The deviations close to the TO might be due to the age of the adopted isochrones (the only ones available to us), which is 10 Gyr for the Lyon models and 14 Gyr for the Teramo ones. The isochrones seem to deviate more and more in color in the lowest part of the CMD. We can exclude that this is due to any internal errors in our photometry. The artificial-star experiments show that the average deviation in color due to photometric errors is less than 0.03 magnitudes at the faintest limit of the photometry. The residual differences might arise both from errors in the calibration from the HST to the standard $(V,I)$ system and to errors in the transformation from the theoretical to observational plane, very uncertain for these cool stars (Alexander  1997). Object model $(m-M)_V$ E(B-V) \[M/H\] -------- ---------------- ----------- -------- --------- -- M10 Baraffe et al. 14.20 0.29 -1.3 Cassisi et al. 14.25 0.23 -1.3 M22 Baraffe et al. 13.70 0.37 -1.5 Cassisi et al. 13.71 0.31 -1.54 M55 Baraffe et al. 13.90 0.14 -1.5 Cassisi et al. 14.15 0.10 -1.54 : Adopted Parameters[]{data-label="distance"} The luminosity functions {#lf} ======================== The principal objective of the present work is to measure main-sequence luminosity functions. To this end, we followed the same procedure outlined in CPK and PCK. We started by locating the ridge line of the MS using a kappa-sigma clipping algorithm both on the ground-based and on the HST data. The mode of the $(V-I)$ distribution was calculated in bins 0.25 mag wide in $V$. The next step was to subtract the MS ridge-line color from the measured color of each star, in order to produce a CMD with a straightened MS. Two lines, to the left and right of the straightened sequence, were then used to define an envelope around the MS. A range of $\pm3 \sigma$ (where $\sigma$ is the standard deviation of the photometric errors obtained from the artificial-star experiments) was used in order to encompass nearly all the MS stars. Stars within this envelope were binned in 0.5 mag intervals in order to produce a preliminary LF. These LFs must be corrected for field-star contamination. The field-star density was estimated by taking the average of the star counts in strips of width $6 \sigma$ outside each side of the MS envelope. In M10 and M55 the correction for field stars was always less than 10%. The case of M22 is more complicated. The field-star contamination is below 10% only in the magnitude interval $21.5<V<26$. At $V=26.25$ the contamination is already 15%. At fainter magnitudes, it becomes rather uncertain because of the spread of the MS due to the photometric errors. We think that below $V=26.5$ ($I=23.8$) it is not possible to estimate the field star contamination reliably with the present data for M22. In the magnitude interval $19.5<V<21.0$ the red giant branch of the bulge crosses the MS of M22, creating additional problems for the estimate of the field-star contamination. In this magnitude interval we estimated the amount of contamination using the counts obtained running the code by Ratnatunga and Bahcall (1985), normalized to the number of field stars we found in the box defined by $21.5<V<20.0$ and $1.0<(V-I)<1.5$ in the CMD of Fig. \[cm22\]. For this cluster, a more reliable LF can be obtained only with second-epoch HST observations of the same field analyzed in this paper, as was done by King  (1998) for NGC 6397. Both the $V$ and $I$ LFs for the three clusters are shown in Figs. \[m10\_gb\_hst\], \[m22\_gb\_hst\], and \[m55\_gb\_hst\] and listed in Tables \[m10lf\], \[m22lf\], and \[m55lf\]. Col. 1 gives the $V$ magnitudes, Col. 2 gives the field-star corrected LF, and Col. 3 lists the corrected (for both field star contamination and incompleteness) counts. The same figures for the $I$ LFs are in Cols. 4–6. The LFs listed in Tables \[m10lf\]–\[m55lf\] are from the HST photometry up to the brightest magnitude bin of the HST data; for brighter magnitudes Tables \[m10lf\]–\[m55lf\] list the ground-based LFs scaled to the area of one WF CCD. The ground-based LFs in Figs. \[m10\_gb\_hst\] and \[m22\_gb\_hst\] ([*open circles*]{}) have been obtained from the CMDs of Figs. \[cm10\] and \[cm22\], respectively. As the ground-based and HST LFs ([*filled circles*]{}) have been obtained at the same distance from the cluster center, they have been normalized by scaling the ground-based counts to the area of the HST field. In Fig. \[m55\_gb\_hst\] we compare the HST LF of M55 with the LFs from Zaggia  (1997) and from Mandushev (1996). Note that the data of Zaggia  refer to the same radial interval as the HST data, while the field of Mandushev  is located in an outer region (at 6.8 arcmin from the cluster center). In this case, the LF has been normalized to the others by using the total star counts in the common magnitude interval. Note the good agreement among the three LFs in the common region. The LF of Mandushev is slightly steeper than the HST LF, particularly at the lower end; this might be due to a mass-segregation effect. In Fig. \[m22\_gb\_hst\] the [*open triangles*]{} show the LF obtained by De Marchi and Paresce (1997) from the same HST data. Despite the fact that the photometry has been obtained in a completely independent way, and using rather different reduction procedures, it is comfortable to see that there is perfect agreement between the two LFs down to $I=23.25$, where the completeness is only 56% ( Table \[m22lf\]). We have already commented how, below $I\sim23.5$, the incompleteness and, most importantly, the difficulties in the field-star contamination estimates make the LF rather uncertain, and we prefer to avoid presenting data that are too uncertain. As was discussed in Section \[intro\], all three clusters have comparable metallicities (within $\sim 0.3$ dex). This fact allows to compare directly their LFs, without having to pass through the uncertain MLRs. Similarities or differences among the LFs of the three clusters reflect directly similarities or differences in their MFs. In addition, the HST fields where the LF was measured for M10, M22, and M55 are all located very close to the half-mass radius ($r\subr{obs}/r\subr{h}$=1.1 for M55, $r\subr{obs}/r\subr{h}$=1.4 for M10, and $r\subr{obs}/r\subr{h}$=1.8 for M22). This is a particularly fortunate case, as Vesperini and Heggie (1997), among others, have shown that the LF observed close to the half-mass radius in a King model (i.e., not collapsed) cluster, is close to the global (present day) LF. In other words, as a first approximation, our LFs do not need any mass-segregation correction. $V$ $N$ $N_{corr}$ $I$ $N$ $N_{corr}$ ------- ----- ------------ ------- ----- ------------ 18.25 9 11 16.75 4 4 18.75 16 20 17.25 6 9 19.25 21 27 17.75 11 20 19.75 25 32 18.25 16 30 20.25 53 46 18.75 41 34 20.75 72 68 19.25 75 64 21.25 87 94 19.75 98 98 21.75 89 78 20.25 115 115 22.25 79 68 20.75 101 99 22.75 108 110 21.25 149 157 23.25 116 124 21.75 179 202 23.75 163 187 22.25 222 255 24.25 188 220 22.75 250 323 24.75 203 260 23.25 180 243 25.25 175 230 23.75 141 195 25.75 126 167 24.25 104 150 26.25 102 161 24.75 46 86 26.75 55 75 27.25 45 80 27.75 19 34 : M10 Luminosity Function[]{data-label="m10lf"} $V$ $N$ $N_{corr}$ $I$ $N$ $N_{corr}$ ------- ----- ------------ ------- ----- ------------ 15.25 6 6 13.94 5 5 15.75 5 5 14.46 5 5 16.25 8 8 14.99 7 7 16.75 10 10 15.54 8 8 17.25 29 29 16.17 22 22 17.75 40 48 16.69 44 36 18.25 51 65 17.16 65 51 18.75 59 83 17.63 81 58 19.25 76 82 18.25 105 104 19.75 89 89 18.75 127 128 20.25 120 106 19.25 119 130 20.75 111 108 19.75 123 145 21.25 141 137 20.25 144 175 21.75 149 144 20.75 197 264 22.25 185 195 21.25 292 395 22.75 215 249 21.75 272 427 23.25 244 295 22.25 237 397 23.75 245 301 22.75 189 325 24.25 197 276 23.25 140 251 24.75 164 243 25.25 125 181 25.75 121 226 26.25 77 146 : M22 Luminosity Function[]{data-label="m22lf"} V N $N_{corr}$ I N $N_{corr}$ ------- ----- ------------ ------- ----- ------------ 19.75 89 94 18.75 96 120 20.25 93 100 19.25 109 120 20.75 89 107 19.75 109 127 21.25 95 101 20.25 135 148 21.75 96 98 20.75 142 162 22.25 132 142 21.25 189 235 22.75 151 173 21.75 255 330 23.25 201 240 22.25 285 378 23.75 256 341 22.75 224 321 24.25 229 274 23.25 158 242 24.75 166 247 23.75 108 175 25.25 115 149 24.25 73 140 25.75 99 150 26.25 57 83 : M55 Luminosity Function[]{data-label="m55lf"} The comparison is shown in Fig. \[comp3v\] ($V$ LFs) and Fig. \[comp3i\] ($I$ LFs). The adopted apparent distance moduli and reddenings are given in Table \[distance\] (Baraffe  rows). In the absence of a means of normalizing the three LFs to a global cluster parameter, arbitrary constants determine the vertical positioning of the individual LFs. We have chosen these constants exactly as described in PCK. Briefly, vertical shift of the M10, M22, and M55 LFs were made to bring them into alignment, according to a least-square algorithm, in the magnitude intervals $4.0<M\subr{V}<6.0$ and $3.5<M\subr{I}<5.5$. The overall trend of the LFs in Fig. \[comp3v\] and Fig. \[comp3i\] is similar, with a steep rise up to $M_V\sim10$ ($M_I\sim8.5$), followed by a drop to the limiting magnitude of the present investigation. Indeed, both the $V$ and $I$ LFs for M10 reach their maximum at magnitudes $\sim0.5$ fainter than in M55 and M22. This is qualitatively consistent with the fact that M10 is slightly more metal rich than the other two clusters (D’Antona and Mazzitelli, 1995). Despite the fact that the overall shape of the LF of M10 is similar to the others, a close inspection of Figs. \[comp3v\] and \[comp3i\] reveals that it is significantly steeper than the other two LFs. This difference can hardly be due to any internal dynamical evolution, if we consider that the three clusters have similar internal structures. Even if we did not fully trust the dynamical models (both King-Michie models and N-body simulations, Vesperini and Heggie 1997), which predict that our local LFs for M10, M22, and M55 closely resemble the global ones, it is noteworthy that the M10 field is at an intermediate position in terms of half-light radius $r_h$, between the M55 and the M22 fields. Therefore, the differences in LF slopes cannot be due to mass segregation. The mass functions {#mf} ================== The LFs can be transformed into MFs using a MLR. As emphasized in Section \[cmd\], such transformations are still uncertain for low-mass, low-metallicity stars, and we must rely on the models almost entirely. It is somehow reassuring that not only at least two of the existing models are able to reproduce the observed diagrams, but also the distance moduli and reddenings that result from the fit are in agreement, within the errors, with the values in the literature. This does not mean that the models by the Lyon and the Teramo groups used in Section \[cmd\] are the [*correct*]{} ones. They are simply the best ones presently available, and we will use both of them to gather some information on the general shape of the MFs of M10, M15, and M22. The cautionary remarks on the absence of empirical MLR data should still be heeded. For the sake of comparison, and in order to give an idea of the possible range of uncertainty, we will also use the MLR of the Roma group (D’Antona and Mazzitelli 1995). In Fig. \[mfi\] we compare the MFs derived from the $I$ LFs of M10, M22, and M55 from the TO down to $\sim 0.11m_\odot$. An arbitrary vertical shift is applied for reasons of clarity. The adopted distance moduli, reddenings, and metallicities for the MFs obtained using the Lyon and Teramo models are in Table \[distance\]. For the Roma model we adopted the values in Djorgovski (1993) and used the isochrone corresponding to 10 Gyr. The MFs obtained using the Lyon and Teramo models track one other closely for $m<0.6 m_\odot$. The small differences for higher masses might be due, at least in part, to the difference in the adopted ages. The MFs from the Roma models are systematically steeper, as already noted in PCK. Fig. \[mfvi\] compares the MFs obtained from the $V$ and $I$ LFs, using the Teramo models. In all cases, the two MFs are very similar, despite the fact that the two LFs have been independently obtained. This result is also reassuring on the theoretical side, showing the internal consistency of the models. In all cases, there is a hint of flattening at the low-mass end, but no sign of a drop-off. As the transformation from the LF to the MF is the weakest part of the present analysis, we prefer not to comment further on the detailed structure of the MF. We note only that the slopes of the MFs below $0.5m_\odot$, using any existing MLRs, are shallower than the $x=1$ slope ($x=1.35$ for the Salpeter MF in this notation) for which the integration of the total mass down to $m=0$ would diverge. Comparison with other clusters ==============================  \[comp\] It is interesting to compare the LFs in Fig. \[comp3v\] and \[comp3i\] with the LFs of other GCs with similar metallicity. The only other homogeneous set of $V$ and $I$ LFs extending from the TO to $m<0.15m_\odot$ has been collected by PCK for M15, M30, M92, and NGC 6397. In addition, Ferraro  (1997) have published an $I$ LF for NGC 6752. There are two other clusters, which have a metallicity comparable to M22 and M10, and for which deep HST LFs have been published: $\omega$ Cen (Elson, Gilmore, and Santiago 1995) and M3 (Marconi  1998). In both cases, saturation of the brightest stars does not allow to extend the LFs to the TO and we will omit them in the present comparison. As discussed in King  (1995) and PCK, at the intermediate radius at which M15, M30, M92, and NGC 6397 were observed, their LFs are fortuitously close to the global ones, with differences that nowhere exceed a few tenths in the logarithm (PCK), with the local LFs being always steeper than the global ones. So, a comparison of these LFs with the LFs of M10, M22, and M55 should be only marginally affected by mass segregation effects. Unfortunately, no detailed dynamical model for NGC 6752 is available at the moment. We ran a multi-mass King-Michie model on this cluster ( Section \[disc\]). We find that the locally observed LFs of NGC 6752 is significantly flatter than the global one. The metallicity of the three clusters presented in this paper is slightly higher than that of the clusters in PCK. We need to investigate the effect of this metallicity spread on the LFs. In Fig. \[met\] the theoretical LFs for a power law MF with a slope x=0.3 and three different metallicities are plotted together with the $V$ LFs of the four clusters in PCK used as reference. The three theoretical LFs are quite similar in the metallicity interval which span the entire metallicity range of the clusters discussed in the following. Figs. \[allv\] and \[allid\] compare the $V$ and $I$ LFs of M10, M22, and M55 with the LFs of all the clusters with \[Fe/H\]$<-1.6$ available in the literature. Only the LFs which extend to the TO are used. The overall shape of the LFs is similar for the eight clusters, with a steep rise up to $M_V\sim10$ ($M_I\sim8.5-9.0$), followed by a drop to the limiting magnitude. As shown in Fig. \[met\] this shape is mainly due to the mass-luminosity relation (MLR) and not to the morphology of the MF ( also Section \[mf\]). Despite the fact that the general trend of these LFs is similar, their slope is different. These differences are much larger than expected from the error bars (Figs. \[comp3v\] and \[comp3i\]) and from the cluster metallicity differences (Fig. \[met\]), i.e. imply different (local) MFs. In view of the small expected correction for the mass segregation above discussed, this also imply different global present day MFs. Had we chosen to align the LFs at the faint end instead of the bright end, the result would have been the same, as shown in Fig. \[alliu\]. This figure explicitly shows that the differences among the GC LFs become apparent only when they are extended to the TO. Discussion {#disc} ========== The differences among the LFs noted in the previous Section suggest differences among the observed MFs. They mainly imply that the ratio of the low mass to high mass stars differs from cluster to cluster. It is interesting to further comment on the possible origin of these differences. There are two possibilities: - The differences are primordial, i.e. the Galactic GCs are born with different IMFs; - The differences are a consequence of the dynamical evolution, both internal (energy equipartition, evaporation), or externally induced by the gravitational potential of our Galaxy. Of course, it is not possible to test the first hypothesis directly, and a combination of the above two possibilities cannot be excluded. PCK, relying on the presently available models for M15, M30, M92, and NGC 6397, and on the Galactic orbits of some of these clusters, propose that the different shape of the LF of NGC 6397 with respect to the other three arises from the interaction of this cluster with the Galaxy. It is a consequence of the frequent tidal shocks experienced by NGC 6397 along its orbit. At the time we are writing this paper, the number of clusters at our disposal is more than doubled, though it is still too small for any detailed analysis. As discussed in the previous Section, among the GCs with deep HST LFs, there are 8 clusters with a LF extending from the TO to somewhat above 0.1 $m_\odot$. As a sort of exercise, we can try to look for possible dependences of the overall shape of the MFs on the observable parameters which characterize the GGC population. This analysis can be done if we can: - Correct for mass segregation effects (though these have been anticipated to be small, with the only exception of\ NGC 6752); - Parametrize in some way the MF shape. In view of the still relatively small sample of objects, we have chosen a very simple approach. We have limited our analysis to the 3 clusters presented in this paper, the four objects of PCK, and NGC 6752 (Ferraro  1997). The other three objects with deep HST LFs have not been considered as their LFs are not complete, lacking the brightest part (from $\sim 0.5$ m$_\odot$ to the TO). First of all, the LFs have been trasformed into MFs using Baraffe et al.’s (1997) MLRs for the appropriate metallicity and using the distance modulus which best fits the CMDs ( previous Sections). Second, we run a King-Michie model in order to have a first approximation correction for the mass segregation effects. We used the code kindly provided by Jay Anderson and described in Anderson (1998), which is based on the Gunn and Griffin (1979) formulation of the multimass King–Michie model. These models have a lowered-Maxwellian distribution function, which approximate the steady-state solution of the Fokker–Planck equation (King 1965). In the case of the post–core–collapse (Djorgovski and King 1986) clusters these models do not incorporate important physical effects, most importantly, the deviation from a Maxwellian distribution function in the collapsed core (Cohn 1980). However, they are the simplest models that can predict the radial variation of the MF due to energy equipartition, and rather realistically, as shown by King  (1995) and Sosin (1997, see also King 1996). On the other side, as shown by Murphy et al. (1997) for M15, mass segregation prediction of King-Michie models are not very different from what found with more sophisticated Fokker–Planck models. For NGC 6397 we used the same model parameters obtained by King (1995), for M15 the parameters by Sosin and King (1997), and for M30 the parameters by Sosin (1997). For M92, we used the model parameters by Anderson (1998). The details of the models for the other clusters will be described elsewhere. We essentially followed the same procedure described in Sosin (1997). Briefly, we calculated the model by first choosing the core and tidal radii given by Trager, King and Djorgovski (1995). We then defined 17 mass groups, whose number of stars and averaged masses were constrained to agree with the observed MF at the distance from the cluster center of the observed field. We then added a group of 0.55 $m_\odot$ white dwarfs chosen (somewhat arbitrarely) to contain 20% of the cluster mass. Finally, we added 1.4 $m_\odot$ dark remnants and adjusted their mass fraction (usually around 1.5%) to make the radial profile of the stars in the brightest bin agree with the surface density profile of Trager et al. (1995). One of the outputs of the models are the global MFs for each cluster. In our model, the NGC 6752 field is located in a position strongly affected by mass segregation. In view of the large correction we should apply to its local MF in order to have the global one, the further uncertainties in the model due to the post–core–collapse status of this cluster, and the strong deviation from a power law of its MF (likely a further effect of the mass segregation), we will not include NGC 6752 in the following analysis. We fitted the global MFs of the remaining seven clusters with a power law $\xi(m)=\xi_0m^{-(1+x)}$, and used the index $x$ as a parameter indicating the ratio of low mass to high mass stars. The power law has proven to fit reasonably well all the seven global MFs. In view of the uncertainties associated to the MLR and to the model itself, any more sophisticated analysis is not justified. The slopes of the global present day MFs for $m<0.7m_\odot$ for the clusters in our sample are plotted in Fig. \[mfslopes\] against the half mass relaxation time ($T_{\rm rh}$), the position within the Galaxy (the galactocentric distance $R_{\rm GC}$ and the distance from the disk $Z$) and the destruction rates $\nu$ (in units of inverse Hubble time) as calculated by Gnedin and Ostriker (1997). The error bars show the formal error of the fit, and do not include the error in the MLR and the error associated to the mass segregation correction. The [*full circles*]{} show the slope of the [*global*]{} MF, while the [*open circles*]{} refer to the slopes of the original ([*local*]{}) MF. As already anticipated, the corrections for mass segregation are in general small. The discussion which follows applies to both the global and local MFs. The slopes have a large dispersion, showing that the present day global MFs significantly differ from cluster to cluster. Clusters with larger $\nu$ (and smaller $T_{\rm rh}$) tend to have flatter MFs, suggesting that the observed differences in the MF slopes might be related to the cluster dynamical evolution. There is also an indication of a trend with the distance from the Galactic center which resembles a similar dependency suggested by Djorgovski, Piotto and Capaccioli (1993), and which has been interpreted in terms of evidences of a dynamical evolution (Capaccioli, Piotto and Stiavelli 1993). Also a dependency on metallicity cannot be excluded, as shown in Fig. \[mfslopes\]. However, the uncertainty associated to the various transformations from the local LFs to the global MFs, and the small number of points do not allow to assess the significance of any of these trends. Another interesting feature from the slopes in Fig. \[mfslopes\] is their low value. For $m<0.7 m_\odot$ the MFs never exceed a slope $x=0.3$, ranging in the interval $-0.5<x<0.3$ (in the scale in which the Salpeter MF has a slope $x=1.35$). Also the field star MF is significantly flatter than the Salpeter MF in the low mass regime (Tinney 1998). Mera, Chabrier, and Baraffe (1996) find a slope $x=1$ for the disk MF for $m<0.6 m_\odot$, and Scalo (1998) in his review concludes that an average slope $x=0.2$ is appropriate for $0.1<m/m_\odot<1.0$ for both Galactic clusters and field stars. A slope $x=0.3$ is also proposed by Kroupa, Tout, and Gilmore (1993) and Kroupa 1995 for the field stars. More recently, Gould, Bahcall, and Flynn (1996) find a smaller $x=-0.1$ for $m<0.6m_\odot$, though this value is uncertain because it is based on a small number of stars. Still, the Galactic cluster and field star MF slopes seem to represent an [*upper limit*]{} to the GC present day MF slopes. This result implies that either the IMF of some GCs was flatter than the field MF, or the present day MFs in GCs do not represent the IMF(s), at least for some of the clusters in this sample. This could imply an evolution of the GC MF with time, with a tendency to flatten. This might be another evidence of the presence of dynamical evolution effects as predicted by the theoretical models (Chernoff and Weinberg 1990, Vesperini and Heggie 1997) and invoked by Capaccioli et al. (1993) and PCK in order to explain the observed GC MFs. Another consequence of the flatness of the MF is that the contribution to the total cluster mass by very-low-mass stars and brown dwarfs is likely to be negligible. Of course, the fraction of mass in form of brown dwarfs depends on (1) the MF slope in the corresponding mass interval and (2) the lower limit we assume for the brown dwarf masses ($m_{\rm low}$). As a working hypothesis, we might assume that we can extrapolate the MF power law which represents as a first approximation the GC present day MF for $0.1<m/m_\odot<0.8$ to the brown dwarf regime. We also arbitrarely adopt $m_{\rm low}=0.01 m_\odot$, which corresponds to the minimum Jeans mass at zero metallicity (Silk 1977). Even for the steepest slope ($x=0.3$) in Fig. \[mfslopes\], stars with $m_{\rm low}<m/m_\odot<0.09$ ($m\sim0.09 m_\odot$ correspond to the minimum mass for the core hydrogen burning ignition) contribute to less than 20% of the total mass of the stars with $m<0.8 m_\odot$, though they are more than 55% in number. If the brown dwarf MF is not radically different (steeper) than the main sequence MF, they cannot contribute in any significant way to the cluster dynamics. We are deeply grateful to Peter Stetson for providing us the mask files for vignetting and pixel area correction for WFPC2, and the PSF files, and for providing the most up-to-date versions of his programs. We thank also Jay Anderson for making available his multimass King-Michie code. We are particularly indebted to Ivan King who carefully read the manuscript and persuasively pushed us to make the mass segregation corrections and the comparisons of the last Section. This work has been supported by the Agenzia Spaziale Italiana and the Ministero della Ricerca Scientifica e Tecnologica. Alexander D.R., Brocato E., Cassisi S., Castellani V., Ciacio F., Degl’Innocenti S., 1997, A&A 317,90 Anderson J., 1998, PhD Thesis, University of California, Berkeley Baraffe I., Chabrier G., Allard F., Hauschildt P.H., 1997, A&A 327, 1054 Brocato E., Cassisi S., Castellani V., Cool A.M., King I.R., Piotto, G., 1996, in ASP Conf. Ser. 92, Formation of the Galactic Halo ... Inside and Out, ed. H. Morrison & A. Sarajedini (San Francisco: ASP), 76 Capaccioli M., Piotto G., Stiavelli M., 1993, MNRAS 261, 819 Chernoff D.F., Weinberg M., 1990, ApJ 351, 121 Cohn H. 1980, ApJ 242,765 Cool A.M., Piotto G., King I.R., 1996, ApJ 468, 655 (CPK) D’Antona F., Mazzitelli I., 1995, ApJ 456, 329 De Marchi G., Paresce F., 1997, ApJ 476, L19 Djorgovski S.G., 1993, in ASP Conf. Ser. 50, Structure and Dynamics of Globular Clusters, ed. S.D. Djorgovski & G. Meylan (San Francisco: ASP), 373 Djorgovski S.G., King, I.R., 1986, ApJ 305, L61 Djorgovski S.G., Piotto G., Capaccioli M., 1993, AJ 105, 2148 Drukier G.A., Fahlman G.G., Richer H.B., Vandenberg D.A., 1988, AJ 95, 1415 Elson R.A.W., Gilmore G.F., Santiago B.X., Casertano S., 1995, AJ 110, 682 Fahlman G.G., Mandushev G., Richer H.B., Thompson I.B., Sivaramakrishnan A., 1996, ApJ 459, L65 Ferraro F.R., Carretta E., Bragaglia A., Renzini A., Ortolani S., 1997, MNRAS 286, 1012 Gnedin, O.Y., Ostriker, J.P., 1997, ApJ 474, 223 Gould, A., Bahcall, J.N., Flynn, C., 1997, ApJ, 482, 913 Gunn J.E., Griffin R.E., 1979, AJ 84,752 Holtzman J.A., Burrows C.J., Casertano S., Hseter J.J., Trauger J.T., Watson A.M.,Worthey G. 1995, PASP 107, 1065 King I.R., 1965, AJ 70, 376 King I.R., 1996, in IAU Symp 174, Dynamical Evolution of Star Clusters - Confrontation of Theory and Observations, ed. P. Hut & J. Makino (Dordrecht: Kluwer), 29 King I.R., Sosin C., Cool A.M., 1995, ApJ 452, L33 King I.R., Anderson J., Cool A.M., Piotto G., 1998, ApJ 492, L37 Kroupa P., Tout A.T., Gilmore G., 1993, MNRAS 262, 545 Kroupa P., 1995, ApJ 453, 350 Mandushev G.I., Fahlman G.G., Richer H.B., 1996, AJ 112, 1536 Marconi G.  1998, MNRAS, 293, 479 Mateo M., Mirabal N., Udalski A., Szymanski M., Kaluzny J., Kubiak M., Krzeminski W., Stanek K.Z., 1996, ApJ 458, 13L Mera D., Chabrier G., Baraffe I. 1996, ApJ 459, L87 Murphy B.W., Cohn H.N., Lugger P.M., Drukier G.A., 1997, AAS 191, 8005 Peterson R.C., Cudworth K.M., 1994, ApJ 420, 612 Piotto G., Cool A., King I.R., 1997, AJ 113, 1345 (PCK) Ratnatunga U.K., Bahcall J.N., 1985, ApJ 59, 63 Rosenberg A.R., Saviane I., Piotto G., Aparicio A., 1999, A&SS Special Edition, The Evolution of Galaxies on Cosmological Timescales, in press Ryan S.G., Norris J.E., 1991, AJ 101, 1865 Salaris M.,Chieffi, A., Straniero O., 1993, ApJ 350, 645 Scalo J., 1998, preprint, astro-ph/9712317v2 Silbermann N.A. 1996, ApJ 470, 1 Silk J., 1977, ApJ, 214, 718 Sosin C., 1997, AJ 114, 1517 Sosin C., King I.R., 1997, AJ 113, 1328 Stetson P.B., 1987, PASP 99, 191 Stetson P.B., 1994, PASP 106, 250 Stetson P.B., 1995, private communication Stetson P.B., Harris W.E., 1988, AJ 96, 909 Vesperini E., Heggie D.C., 1997, MNRAS 289, 898 Tinney C., 1998, in The Third Mt. Stromlo Symposium: The Galactic Halo, ed. J. Norris, in press Trager S.C., King I.R., Djorgovski, S.G., 1995, AJ 109, 218 Zaggia S.R., Piotto G., Capaccioli M., 1997, A&A 327, 1004 Zinn R., West M., 1984, ApJS 55, 45 [^1]: Based on HST observations retrieved from the ESO ST-ECF Archive, and on observations made at the European Southern Observatory, La Silla, Chile, and at the JKT telescope at La Palma, Islas Canarias.
<template> <u-popup class="" :mask="mask" :maskCloseAble="maskCloseAble" mode="bottom" :popup="false" v-model="value" length="auto" :safeAreaInsetBottom="safeAreaInsetBottom" @close="popupClose" :zIndex="uZIndex"> <slot /> <view class="u-tooltip" v-if="tooltip"> <view class="u-tooltip-item u-tooltip-cancel" hover-class="u-tooltip-cancel-hover" @tap="onCancel"> {{cancelBtn ? cancelText : ''}} </view> <view v-if="showTips" class="u-tooltip-item u-tooltip-tips"> {{tips ? tips : mode == 'number' ? '数字键盘' : mode == 'card' ? '身份证键盘' : '车牌号键盘'}} </view> <view v-if="confirmBtn" @tap="onConfirm" class="u-tooltip-item u-tooltips-submit" hover-class="u-tooltips-submit-hover"> {{confirmBtn ? confirmText : ''}} </view> </view> <block v-if="mode == 'number' || mode == 'card'"> <u-number-keyboard :random="random" @backspace="backspace" @change="change" :mode="mode" :dotEnabled="dotEnabled"></u-number-keyboard> </block> <block v-else> <u-car-keyboard :random="random" @backspace="backspace" @change="change"></u-car-keyboard> </block> </u-popup> </template> <script> /** * keyboard 键盘 * @description 此为uViw自定义的键盘面板,内含了数字键盘,车牌号键,身份证号键盘3中模式,都有可以打乱按键顺序的选项。 * @tutorial https://www.uviewui.com/components/keyboard.html * @property {String} mode 键盘类型,见官网基本使用的说明(默认number) * @property {Boolean} dot-enabled 是否显示"."按键,只在mode=number时有效(默认true) * @property {Boolean} tooltip 是否显示键盘顶部工具条(默认true) * @property {String} tips 工具条中间的提示文字,见上方基本使用的说明,如不需要,请传""空字符 * @property {Boolean} cancel-btn 是否显示工具条左边的"取消"按钮(默认true) * @property {Boolean} confirm-btn 是否显示工具条右边的"完成"按钮(默认true) * @property {Boolean} mask 是否显示遮罩(默认true) * @property {String} confirm-text 确认按钮的文字 * @property {String} cancel-text 取消按钮的文字 * @property {Number String} z-index 弹出键盘的z-index值(默认1075) * @property {Boolean} random 是否打乱键盘按键的顺序(默认false) * @property {Boolean} safe-area-inset-bottom 是否开启底部安全区适配(默认false) * @property {Boolean} mask-close-able 是否允许点击遮罩收起键盘(默认true) * @event {Function} change 按键被点击(不包含退格键被点击) * @event {Function} cancel 键盘顶部工具条左边的"取消"按钮被点击 * @event {Function} confirm 键盘顶部工具条右边的"完成"按钮被点击 * @event {Function} backspace 键盘退格键被点击 * @example <u-keyboard mode="number" v-model="show"></u-keyboard> */ export default { name: "u-keyboard", props: { // 键盘的类型,number-数字键盘,card-身份证键盘,car-车牌号键盘 mode: { type: String, default: 'number' }, // 是否显示键盘的"."符号 dotEnabled: { type: Boolean, default: true }, // 是否显示顶部工具条 tooltip: { type: Boolean, default: true }, // 是否显示工具条中间的提示 showTips: { type: Boolean, default: true }, // 工具条中间的提示文字 tips: { type: String, default: '' }, // 是否显示工具条左边的"取消"按钮 cancelBtn: { type: Boolean, default: true }, // 是否显示工具条右边的"完成"按钮 confirmBtn: { type: Boolean, default: true }, // 是否打乱键盘按键的顺序 random: { type: Boolean, default: false }, // 是否开启底部安全区适配,开启的话,会在iPhoneX机型底部添加一定的内边距 safeAreaInsetBottom: { type: Boolean, default: false }, // 是否允许通过点击遮罩关闭键盘 maskCloseAble: { type: Boolean, default: true }, // 通过双向绑定控制键盘的弹出与收起 value: { type: Boolean, default: false }, // 是否显示遮罩,某些时候数字键盘时,用户希望看到自己的数值,所以可能不想要遮罩 mask: { type: Boolean, default: true }, // z-index值 zIndex: { type: [Number, String], default: '' }, // 取消按钮的文字 cancelText: { type: String, default: '取消' }, // 确认按钮的文字 confirmText: { type: String, default: '确认' } }, data() { return { //show: false } }, computed: { uZIndex() { return this.zIndex ? this.zIndex : this.$u.zIndex.popup; } }, methods: { change(e) { this.$emit('change', e); }, // 键盘关闭 popupClose() { // 通过发送input这个特殊的事件名,可以修改父组件传给props的value的变量,也即双向绑定 this.$emit('input', false); }, // 输入完成 onConfirm() { this.popupClose(); this.$emit('confirm'); }, // 取消输入 onCancel() { this.popupClose(); this.$emit('cancel'); }, // 退格键 backspace() { this.$emit('backspace'); }, // 关闭键盘 // close() { // this.show = false; // }, // // 打开键盘 // open() { // this.show = true; // } } } </script> <style lang="scss" scoped> @import "../../libs/css/style.components.scss"; .u-keyboard { position: relative; z-index: 1003; } .u-tooltip { @include vue-flex; justify-content: space-between; } .u-tooltip-item { color: #333333; flex: 0 0 33.333333%; text-align: center; padding: 20rpx 10rpx; font-size: 28rpx; } .u-tooltips-submit { text-align: right; flex-grow: 1; flex-wrap: 0; padding-right: 40rpx; color: $u-type-primary; } .u-tooltip-cancel { text-align: left; flex-grow: 1; flex-wrap: 0; padding-left: 40rpx; color: #888888; } .u-tooltips-submit-hover { color: $u-type-success; } .u-tooltip-cancel-hover { color: #333333; } </style>
#START-FILE-LIST # File List auto generated by waf2cmake.py, do not modify manually. start_sources() # -- editorfmod.waf_files -- sources_platform(ALL) add_sources("EditorFmod_uber_0.cpp" SOURCE_GROUP "Root" "AudioTableInfo.h" "Common.cpp" "Common.h" "Impl.cpp" "Impl.h" "Item.cpp" "Item.h" "Utils.cpp" "Utils.h" "main.cpp" "ProjectLoader.cpp" "ProjectLoader.h" "StdAfx.cpp" "StdAfx.h" SOURCE_GROUP "Connections" "EventConnection.cpp" "EventConnection.h" "GenericConnection.h" "KeyConnection.cpp" "KeyConnection.h" "ParameterConnection.cpp" "ParameterConnection.h" "ParameterToStateConnection.cpp" "ParameterToStateConnection.h" "SnapshotConnection.cpp" "SnapshotConnection.h" SOURCE_GROUP "DataPanel" "DataPanel.cpp" "DataPanel.h" "FilterProxyModel.cpp" "FilterProxyModel.h" "ItemModel.cpp" "ItemModel.h" "TreeView.cpp" "TreeView.h" ) add_sources("NoUberFile" SOURCE_GROUP "Resources" "EditorFmodUI.qrc" ) end_sources() #END-FILE-LIST CryEditorPlugin(EditorCryAudioImplFmod SOLUTION_FOLDER "Sandbox/Plugins/EditorAudioControlsEditor/Impl" OUTDIR EditorPlugins/ace) target_include_directories(${THIS_PROJECT} PRIVATE "${CRYENGINE_DIR}/Code/CryEngine/CryAudioSystem/Common" "${CRYENGINE_DIR}/Code/CryEngine/CryAudioSystem/implementations") target_compile_definitions(${THIS_PROJECT} PRIVATE -DNOT_USE_CRY_MEMORY_MANAGER -DACE_PLUGIN_EXPORTS -DUSE_BACKWARDS_COMPATIBILITY)
Faith Brings Results! By Kenneth E. Hagin But what saith it? The word is nigh thee, even in thy mouth, and in thy heart: that is, the word of faith, which we preach; That if thou shalt confess with thy mouth the Lord Jesus, and shalt believe in thine heart that God hath raised him from the dead, thou shalt be saved. For with the heart man believeth unto righteousness; and with the mouth confession is made unto salvation. —Romans 10:8–10 This passage in Romans deals specifically with salvation. But we receive salvation from God in the same way we receive other provisions from God. Every other provision was included in that salvation. Through His death, burial, and resurrection, Jesus made salvation, preservation, healing, provision, wholeness, and every good thing to us. Jesus did the work. How do we receive those provisions? With our heart we believe it, with our mouth we confess it, and then we receive it. MATTHEW 21:21–22 21 Jesus answered and said unto them, Verily I say unto you, If ye have faith, and doubt not, ye shall not only do this which is done to the fig tree, but also if ye shall say unto this mountain, Be thou removed, and be thou cast into the sea; it shall be done. 23 Jesus said unto him, If thou canst believe, ALL things are possible to him that believeth. This verse also says all things. Again, “all things” includes healing. Some people fail to receive all things from God because of what they interpret “all things” to mean. Jesus didn’t say, “All things are possible except one.” Or, “All things except a few.” But whatever people believe is what they receive. It’s important for us to keep exercising our faith and to believe what the Bible says. As we believe the Word, our faith grows, and we can believe God for greater results. The more we believe, the more we will receive because faith brings results! Let’s look at one more passage—my favorite. MARK 11:23–24 23 For verily I say unto you, That whosoever shall say unto this mountain, Be thou removed, and be thou cast into the sea; and shall not doubt in his heart, but shall believe that those things which he saith shall come to pass; he shall have whatsoever he saith. This passage also confirms Romans 10:8–10: When we believe in our heart and say (or pray) what we believe with our heart, we shall have whatsoever we say (or pray). Let’s discuss how to receive from God, especially in the area of healing. We’ve seen from Scripture that we must “believe in our heart” and “say with our mouth” what we believe with our heart. But there is something else I want to point out from this passage in Mark chapter 11, because this is where a lot of folks miss it. Notice that Mark 11:24 says: “What things soever ye desire, WHEN ye pray, believe that ye receive them, and ye shall have them.” A lot of people will tell you they are believing and confessing, but they miss it in the area of when. This verse says to believe you receive when you pray. Some things may take time to be manifested in the physical realm, but they are already a spiritual fact. Anything God has provided for you is a free gift you can receive right now. You don’t have to wait. When it comes to salvation or the baptism in the Holy Ghost, you don’t have to wait. You can have them right now. You can be saved right now and speak with tongues right now, because these are free gifts! Because healing is also a free gift from God, you can receive healing right now. Some people receive gradual healings. Usually, that is because their faith takes hold gradually. But our goal should be to grow our faith so that it takes hold now. When we believe and receive, we shall have! Suppose today was your birthday, and I told you I had bought you a watch and then held it out to you as a gift. And suppose you replied, “I believe you got me a watch. You said you did. I believe you did. I’m just waiting for it to come into manifestation. I believe it will sometime.” Well, you missed it entirely. The watch is yours. I’ve tried to give it to you. You just have to act on your faith that the watch belongs to you and then reach out and receive it. God has already provided healing for you. In the mind of God, you’re already healed. God remembers when He laid our sickness and disease on Jesus, and in the mind of God, that was the moment we were healed. Remember First Peter 2:24 says, “By whose stripes you were healed.” It’s past tense, a done deal. I like to say it this way: Whether it’s a headache, toothache, toe-ache, cancer, paralysis, or the worst thing you can think of, in the spirit realm your healing is already packaged with your name on it. Some may ask, “Why don’t I have it?” It’s just waiting for you to come and claim it. When do you claim it? After you pray? A week later? Next month? When the symptoms are gone? No! The Bible says to believe you receive when you pray. Right then, when you pray, is present tense. And you shall have it! It may not be manifested on the outside yet, but we know it’s ours because we received it in our spirit. Many times I’ve known on the inside I had received a certain thing that hadn’t shown up yet. But I kept my faith in God’s Word, and it wasn’t long before it showed up. Some things may take time, but when you believe you receive when you pray, and you’re willing to stand your ground, believing you received, you won’t wait long! The Bible says, “When you pray, believe that you receive, and you shall have.” If I’m not having, I know I must be missing it somewhere. I know God’s Word isn’t wrong. For one thing, we can’t believe, or have faith, beyond actual knowledge. Faith—scriptural believing—begins where the will of God is known. I’ve had many people ask me to pray that they will have more faith. It’s not really faith they need so much as it is knowledge of God’s Word. And faith doesn’t come through prayer, anyway. It comes from hearing the Word of God (Rom. 10: 17). Instead of praying for faith, we need to read the Word and pray as Paul did—that the eyes of our understanding will be opened (Eph. 1:16–17). Mark 11:24 says, “Believe you receive when you pray, and you shall have it.” Our part is to believe that we receive healing for our body when we pray. God’s part is to see to it that we have it. We don’t want to mess with the “have it” part. That’s not our part. God will take care of that! Our part is to believe we receive. When? Right when we pray. We receive healing on the inside first, in the inward man, and then it shows up on the outside. Whatever we receive from God we receive with our spirit, our inward man. Even before we see it on the outside, we believe, or know on the inside, that we have it. And just as sure as you believe and know it, it will show up. God will see to it! Faith comes from hearing God’s Word. We “believe it in our heart” and “confess it with our mouth”—believing we receive when we pray—and faith brings results! Rhema/Kenneth Hagin Ministries is committed to providing a website that is accessible to the widest possible audience. This commitment is ongoing, and we are constantly striving to achieve technologically feasible levels of accessibility. If you encounter difficulty with the functionality of our site, please contact us. We are continually seeking solutions that will maximize the accessibility of our website, and we value your thoughts and input on ways to do so. Please direct any comments or questions topartnerservices@rhema.orgor call (918) 258-1588, ext. 2314.
var searchData= [ ['verifyintegrity',['verifyIntegrity',['../interface_h_f_index_set.html#a60b3c2ff6ccbdbd53aa3474b0a2fa6c0',1,'HFIndexSet']]], ['view',['view',['../interface_h_f_representer.html#a9738e9e916b36b17e37b178234ee79fe',1,'HFRepresenter::view()'],['../group__view.html',1,'(Global Namespace)']]] ];
Q: Laravel 5.2 Flash Data Does Not Persist Should a redirect with flash data persist the flash data if the auth middleware is involved? A few housekeeping things to note that will answer some possible followup questions: I am calling the web middleware. I'm using the file sessions driver. I can retrieve values stored in the session with the exception of flashed data. I have tried reflashing the flashed data by adding the following line to the Authenticate middleware: $request->session()->reflash(); As such, Authenticate.php now appears as follows: public function handle($request, Closure $next, $guard = null) { if (Auth::guard($guard)->guest()) { if ($request->ajax() || $request->wantsJson()) { return response('Unauthorized.', 401); } else { return redirect()->guest('login'); } } $request->session()->reflash(); return $next($request); } This issue is also affecting the auth boilerplate generated by make:auth, resulting in the $errors failing to display on error. UPDATE (3/29 @ 08:54 EST) I uncovered what I believe to have been the root cause, as you will see below. Each route was calling 'web' middleware twice. As such, two requests were actually taking place which was removing the flash message(s) before the user had a chance to see them. Original route:list is below. +--------+----------+-------------------------+------+-----------------------------------------------------------------+---------------+ | Domain | Method | URI | Name | Action | Middleware | +--------+----------+-------------------------+------+-----------------------------------------------------------------+---------------+ | | GET|HEAD | / | | Closure | web | | | GET|HEAD | groups | | App\Http\Controllers\GroupsController@index | web,web,auth | | | GET|HEAD | groups/set-default/{id} | | App\Http\Controllers\GroupsController@setDefaultGroup | web,web,auth | | | GET|HEAD | home | | App\Http\Controllers\HomeController@index | web,web,auth | | | GET|HEAD | login | | App\Http\Controllers\Auth\AuthController@showLoginForm | web,web,guest | | | POST | login | | App\Http\Controllers\Auth\AuthController@login | web,web,guest | | | GET|HEAD | logout | | App\Http\Controllers\Auth\AuthController@logout | web,web | | | POST | password/email | | App\Http\Controllers\Auth\PasswordController@sendResetLinkEmail | web,web,guest | | | POST | password/reset | | App\Http\Controllers\Auth\PasswordController@reset | web,web,guest | | | GET|HEAD | password/reset/{token?} | | App\Http\Controllers\Auth\PasswordController@showResetForm | web,web,guest | | | GET|HEAD | register | | App\Http\Controllers\Auth\AuthController@showRegistrationForm | web,web,guest | | | POST | register | | App\Http\Controllers\Auth\AuthController@register | web,web,guest | | | GET|HEAD | visitees | | App\Http\Controllers\VisiteesController@index | web,web,auth | | | GET|HEAD | visitees/check-in/{id} | | App\Http\Controllers\VisiteesController@checkIn | web,web,auth | +--------+----------+-------------------------+------+-----------------------------------------------------------------+---------------+ My routes now appear as follows after removing the routes from the 'web' middleware: +--------+----------+-------------------------+------+-----------------------------------------------------------------+------------+ | Domain | Method | URI | Name | Action | Middleware | +--------+----------+-------------------------+------+-----------------------------------------------------------------+------------+ | | GET|HEAD | / | | Closure | web | | | GET|HEAD | groups | | App\Http\Controllers\GroupsController@index | web,auth | | | GET|HEAD | groups/set-default/{id} | | App\Http\Controllers\GroupsController@setDefaultGroup | web,auth | | | GET|HEAD | home | | App\Http\Controllers\HomeController@index | web,auth | | | GET|HEAD | login | | App\Http\Controllers\Auth\AuthController@showLoginForm | web,guest | | | POST | login | | App\Http\Controllers\Auth\AuthController@login | web,guest | | | GET|HEAD | logout | | App\Http\Controllers\Auth\AuthController@logout | web | | | POST | password/email | | App\Http\Controllers\Auth\PasswordController@sendResetLinkEmail | web,guest | | | POST | password/reset | | App\Http\Controllers\Auth\PasswordController@reset | web,guest | | | GET|HEAD | password/reset/{token?} | | App\Http\Controllers\Auth\PasswordController@showResetForm | web,guest | | | GET|HEAD | register | | App\Http\Controllers\Auth\AuthController@showRegistrationForm | web,guest | | | POST | register | | App\Http\Controllers\Auth\AuthController@register | web,guest | | | GET|HEAD | visitees | | App\Http\Controllers\VisiteesController@index | web,auth | | | GET|HEAD | visitees/check-in/{id} | | App\Http\Controllers\VisiteesController@checkIn | web,auth | +--------+----------+-------------------------+------+-----------------------------------------------------------------+------------+ Upon moving the routes out of the 'web' middleware group, the flash message display correctly. But, now I have a new issue! The flash messages are not being removed from the session after the initial request. They persist each subsequent request until they are manually flushed or forgotten. I'm not sure at this point if I should open up a second question that specifically addresses the persisting of the flash data. Please advise if so. A: please run a composer update to update laravel/framework to v5.2.27, then issue php artisan make:auth to regenerate auth routes
Q: How to create custom dialog common method for entire android app using java? I am custom dialog in every activity write custom dialog code.How to write common method passing two parameters context and message string?please give me any suggestion. final Dialog dialog = new Dialog(Activity.this,R.style.DialogTheme); dialog.requestWindowFeature(Window.FEATURE_NO_TITLE); dialog.setContentView(R.layout.notify_received_activity); // set the custom dialog components - text and button TextView text = (TextView) dialog.findViewById(R.id.txtmsg); text.setText("Tracking Number : " + mTrackingNR); Button dialogButton = (Button) dialog.findViewById(R.id.btncancel); // if button is clicked, close the custom dialog dialogButton.setOnClickListener(new OnClickListener() { public void onClick(View v) {dialog.dismiss();} }); dialog.show(); A: /** * Display Dialog **/ public static void showDialog(final Context context, String message) { Dialog dialog = new Dialog(context,R.style.DialogTheme); dialog.requestWindowFeature(Window.FEATURE_NO_TITLE); dialog.setContentView(R.layout.notify_received_activity); // set the custom dialog components - text and button TextView text = (TextView) dialog.findViewById(R.id.txtmsg); text.setText(message); Button dialogButton = (Button) dialog.findViewById(R.id.btncancel); // if button is clicked, close the custom dialog dialogButton.setOnClickListener(new OnClickListener() { public void onClick(View v) {dialog.dismiss();} }); dialog.show(); } and simply call anywhere as below: showDialog(ActivityName.this,"message");
Amazon has decided that its much-vaunted “second headquarters” will be split between Long Island City in Queens, and Crystal City, across the Potomac from Washington DC. Amazon’s decision coincides with America’s political tumult. Its main headquarters is in Seattle, one of the most liberal cities in the most liberal of states. Its picks – New York and metropolitan Washington – are liberal, too. Amazon could easily have decided to locate its second headquarters in, say, Indianapolis, Indiana. After all, Indianapolis was one of the finalists in Amazon’s search for a second headquarters, and the city vigorously courted the firm. Not incidentally, Indianapolis is a Republican city in a bright red Republican state. Sign up to receive the latest US opinion pieces every weekday Amazon’s decision wasn’t based on political partisanship, but it does expose the real political and economic divide in America today. Take a closer look at Amazon’s business and you see it’s not just a big retail operation selling stuff over the internet. Its real business is to get consumers anything they want, faster and better than anyone else can. To accomplish this, Amazon depends on a continuous flow of great new ideas that reveal what people want, how they consume and the most efficient ways of connecting them to the objects of their desire. In other words, like the other leading firms of the world economy, Amazon produces and acts on new ideas rather than standardized products or services. And the best way to generate new ideas is to get talented people to interact with each other continuously and directly – keying off one another’s creativity, testing new concepts, quickly discarding those that don’t work, and building cumulative knowledge. Technology isn’t a thing. It’s a process of group learning Technology isn’t a thing. It’s a process of group learning. And that learning goes way beyond the confines of any individual company, like Amazon. It now happens in geographic clusters. In America, those clusters are now mostly along the east and west coasts – in places like Seattle, New York, metropolitan Washington, Boston and Los Angeles. Indianapolis may be a nice place to live, but it doesn’t have nearly as big a cluster of talent as do these others. The result is widening inequalities of place. Increasingly, bright young people from all over America, typically with college degrees, are streaming into these places, where the sum of their individual capacities for invention is far greater than they’d be separately. The ideas sparked there are delivering streams of new designs and products to the rest of the world. In return, the money pouring into these places from the rest of the world is delivering high wages, good living conditions (museums, restaurants, cafes, recreation) and unbounded wealth. Yes, corporate rents and housing costs are soaring, as are the costs of sending kids to school (even many “public” schools are in effect private ones because nobody but the rich can afford to live in the school district). But the incomes and profits generated in these places more than make up for it. Which is largely why Amazon chose New York and metro Washington despite their high costs. 'It's obscene and wrong': Amazon HQ2 gets typically warm New York welcome Read more As money pours into these places, so do service jobs that cater to the new wealth – pricey lawyers, wealth managers and management consultants, as well as cooks, baristas and pilates instructors. Between 2010 and 2017, according to Brookings, nearly half of America’s employment growth centered in just 20 large metro areas that are now home to about a third of the US population. Relative to these booming mega-cities, America’s heartland is becoming older, less educated and poorer. The so-called “tribal” divide in American politics, which Trump has exploited, is better understood in these economic and cultural terms: on one side, mega-urban clusters centered around technologies of the future; on the other, great expanses of relatively open space inhabited by people left behind. Another consequence is a more distorted democracy. California (now inhabited by 39.54 million) and New York (19.85 million) each get two senators, as do Wyoming (573,000) and North Dakota (672,591). Even though Democratic Senate candidates in the midterm elections received 12m more votes than Republican Senate candidates, Republicans still gained at least one more Senate seat. The biggest talent centers – like San Francisco, Seattle and Washington – also harbor large and growing populations of poor who have been stranded by the turbo-charged gentrification. These gleaming cities are becoming the most Dickensian locales in America, where homelessness and squalor mix with luxury high-rises and tony restaurants. So as the American middle class disappears, the two groups falling perilously behind are white, rural, non-college Trump supporters, and the very poor inside America’s trendiest mega-urban centers, who are disproportionately black and Latino. Amazon doesn’t know or care. That responsibility falls on the rest of the nation.
// Copyright 2020 Phyronnaz #pragma once #include "CoreMinimal.h" #include "AssetTypeActions_VoxelBase.h" #include "VoxelSpawners/VoxelSpawnerConfig.h" class FAssetTypeActions_VoxelSpawnerConfig : public FAssetTypeActions_VoxelBase { public: using FAssetTypeActions_VoxelBase::FAssetTypeActions_VoxelBase; virtual FText GetName() const override { return VOXEL_LOCTEXT("Voxel Spawner Config"); } virtual FColor GetTypeColor() const override { return FColor(128, 255, 128); } virtual UClass* GetSupportedClass() const override { return UVoxelSpawnerConfig::StaticClass(); } };
Introduction ============ Breast cancer is the most common cancer in women, and its incidence shows an increasing trend globally ([@b1-ol-0-0-5470]--[@b3-ol-0-0-5470]). Annually, \~1,400,000 women are diagnosed with breast cancer worldwide, of which there are 500,000 mortalities. The incidence of breast cancer in China has also increased rapidly, and is a huge threat to the health of Chinese women ([@b4-ol-0-0-5470],[@b5-ol-0-0-5470]). At present, the treatment of breast cancer predominantly involves surgery combined with chemotherapy, endocrine therapy, targeted therapy or immunotherapy, which has shown good curative effects; however, the current treatment strategy has not shown good therapeutic effects for all patients. Gene therapy is the most promising potential treatment option for cancer, and is currently undergoing rapid development. Selecting appropriate therapeutic genes is the first stage in the development of gene therapy. Various genes have been investigated for their potential use in gene therapy, including genes that allow 'immortalization' of cells, which is a prerequisite for tumor formation, and genes that promote or induce tumor cell apoptosis ([@b6-ol-0-0-5470]). Apoptin, which is derived from the chicken anemia virus (CAV), is a highly conservative protein that has no homology with other animal or viral sequences ([@b7-ol-0-0-5470]). Due to its ability to selectively induce apoptosis in a large panel of human malignant cells, without affecting normal cells, it has emerged as an important potential agent for cancer gene therapy ([@b8-ol-0-0-5470]). An efficient gene delivery method is crucial for the implementation of gene therapy. Nonviral gene delivery systems, which involve using natural or synthetic proteins as delivery tools, have become increasingly popular due to their advantages, including safety, stability and relative cheapness ([@b9-ol-0-0-5470]). Human serum albumin (HSA) is the most abundant protein in serum, and is the main driving force of the circulatory system. HSA is also an important source of nutrition for the cells of the body. As tumor development requires a large volume of nutrients, HSA has been shown to accumulate in solid tumors ([@b10-ol-0-0-5470]). Rhaese *et al* ([@b11-ol-0-0-5470]) successfully constructed a HSA-DNA complex, and assessments of its stability, cytotoxicity, nuclease resistance and transfection and expression efficiency demonstrated that HSA may be an ideal gene delivery tool. The present study developed a gene therapy approach incorporating the delivery of the cancer-specific cytotoxic protein, apoptin, with HSA as a vector for the treatment of breast cancer. The HSA-polyethylenimine (PEI)-pcDNA-Apoptin construct was transfected into the MCF-7 breast cancer cell line, and the *in vitro* and *in vivo* effects on MCF-7 cell viability and apoptosis were determined. When systemically delivered into mice, the HSA-PEI-pcDNA-Apoptin construct was capable of inducing apoptosis and causing significant tumor regression, in the absence of damage to normal tissues. Materials and methods ===================== ### Cells and reagents The MCF-7 breast cancer cell line was obtained from the Type Culture Collection of the Chinese Academy of Sciences (Shanghai, China). MCF-7 cells were cultured in RPMI-1640 medium supplemented with 10% fetal bovine serum, 100 U/ml penicillin and 100 µg/ml streptomycin (complete medium; Invitrogen; Thermo Fisher Scientific, Inc., Waltham, MA, USA) at 37°C in 5% CO~2~. HSA and PEI were purchased from Sigma-Aldrich; Merck Millipore (Darmstadt, Germany). The enhanced green fluorescent protein (EGFP)-N1 plasmid (pEGFP-N1) was a gift from Professor Xinhan Zhao of Xi\'an Jiaotong University (Xi\'an, China). The study was approved by the Ethics Committe of Xi\'an Jiaotong University. ### Construction of the expression vector The expression vectors containing apoptin or EGFP were generated under the control of the cytomegalovirus promoter. The apoptin gene was synthesized by Shanghai GenePharma Co., Ltd. (Shanghai, China) based on sequences in GenBank (accession no. Ay171617), and amplified by polymerase chain reaction (PCR) using *Taq* DNA polymerase (Sigma-Aldrich; Merck Millipore). The primers were: Sense, 5′-ACGAATTCCGATGAACGCTCTCCAAGAAGATACTC-3′ and antisense, 5′-CAGGATCCGTFGACAGTCTFATACACCTTCTTGCG-3′. The terminals of the primers were used to introduce the *Eco* RI and *Xba* I excision sites. PCR was performed with an initial denaturation step at 94°C for 5 min, followed by 35 cycles of denaturation at 94°C for 30 sec, annealing at 56°C for 45 sec and extension at 72°C for 45 sec. A final extension step at 72°C for 10 min was performed. The PCR products were separated by agarose gel electrophoresis and the bands were purified from the gels. The PCR fragments were cloned into pEGFP-N1 using the T4 DNA ligase (Sigma-Aldrich; Merck Millipore). Subsequently, the insert site was released from pEGFP-N1 by digestion with *Eco* RI and *Xba* I restriction enzymes (Sigma-Aldrich; Merck Millipore), and PCR fragments were cloned into pEGFP-N1 using the T4 DNA ligase; the complex was termed pEGFP-N1-Apoptin, which was amplified in bacterial cells (*E. coli* DH5α; Takara Bio, Inc., Otsu, Japan). The cells were transfected with pEGFP-N1-Apoptin as follows: Following thawing of competent cells, 2 µl pEGFP-N1-Apoptin was added to 100 µl competent cells and incubated on ice for 30 min. This was followed by incubation in water for 45--60 sec at 42°C, then incubation on ice for 2 min, vortexing for 1 h at 37°C after added 900 µl SOC media. Finally, 100 µl bacteria liquid was added to the Luria-Bertani (LB) media, which contained 50 µg/ml kanamycin, and was incubated for 12--16 h at 37°C so that bacterial colonies would appear and select for positive clones. The pcDNA-EGFP vector was constructed by excising EGFP from the pEGFP-N1 plasmid using *Eco* RI/*Xba* I restriction enzymes and sub-cloning into the *Eco* RI and *Xba* I sites of pcDNA3.1 (Sigma-Aldrich; Merck Millipore). The pcDNA-Apoptin vector was constructed by subcloning the apoptin fragment from pEGFP-Apoptin into pcDNA3.1. ### Construction of recombinant HSA-PEI-pcDNA-Apoptin HSA (10 mg) was dissolved in 0.05 mol/l 2-(N-Morpholino) ethanesulfonic acid (MES) and 0.05 mol/l NaCl (MES/NaCl) buffer solution (pH 4). Subsequently, 300 mg 1-ethyl-3-(3-dimethyllaminopropyl)carbodiimide hydrochloride and 0.06 mol/l N-hydroxysuccinimide (NHS) were dissolved in MES/NaCl buffer to form an NHS-HSA ester. PEI (10 mg) was reacted with NHS-HSA solution at room temperature, and stirred for 20 h using a magnetic stirring apparatus. The HiTrap SP FF ion exchange column reagent kit (GE Healthcare Life Sciences, Shanghai, China) was used to purify the synthesized HSA-PEI according to the manufacturer\'s protocols. Finally, 10 µg HSA-PEI and 10 µg pcDNA-Apoptin or pcDNA were dissolved in 100 ml pure water. The recombinant HSA-PEI-pcDNA-Apoptin and HSA-PEI-pcDNA constructs were used for the following experiments. In order to identify the recombinant plasmid, the recombinant plasmid was digested using *Eco*RI and *Xba*I restriction enzymes, and the products were separated by 1% agarose gel electrophoresis. ### Cell transfection MCF-7 cells (2×10^5^) were cultured in 24-well culture plates. Upon reaching the logarithmic growth phase, various concentrations of HSA-PEI-pcDNA-Apoptin (0, 0.1, 0.25, 0.5 or 1.0 mg/ml) were added to the cells. After 24 h, the cells were stable, and were permeabilized and washed with phosphate-buffered saline (PBS), after which apoptin expression was examined under a fluorescence microscope. ### Cell viability assay The MTT assay (Sigma-Aldrich; Merck Millipore) was performed to detect cell viability following the transfection of MCF-7 cells with the HSA-PEI-pcDNA-Apoptin construct. MCF-7 cells were cultured in 96-well plates at a density of 4×10^4^/ml (200 µl per well) for 24 h at 37°C. Each plate was divided into three groups, including the HSA-PEI-pcDNA-Apoptin group, the HSA-PEI-pcDNA group and the blank control group. Subsequently, HSA-PEI-pcDNA-Apoptin, HSA-PEI-pcDNA and 0.9% NaCl were added to the appropriate wells and, after 24 h, 20 µl MTT (5 mg/ml) was added for 4 h at 37°C. The culture media was removed and the crystals were dissolved by addition of 150 µl dimethylsulfoxide per well, and oscillating for 15 min at room temperature. The absorbance of the reaction solution was measured at 490 nm using a microplate reader (Multiskan FC; Thermo Fisher Scientific, Inc.). The inhibition rate of cell growth was calculated as follows: Inhibition rate (%) = (1 - absorbance of experimental group / absorbance of control group) × 100. ### Flow cytometric analysis The effect of HSA-PEI-pcDNA-Apoptin on cell apoptosis was determined by flow cytometry using the Annexin V-phycoerythrin (PE)/7-aminoactinomycin D (7-AAD) Apoptosis kit (Genechem, Co., Ltd., Shanghai, China), according to the manufacturer\'s protocol. Briefly, MCF-7 cells were rinsed twice using PBS, digested with trypsin and centrifuged at 400 × *g* for 5 min. The cells were incubated with 50 µl Binding Buffer and 5 µl 7-AAD for 5--15 min in the dark at room temperature. Subsequently, 450 µl Binding Buffer and 1 µl Annexin V-PE were added to the cells for 5--15 min. The samples were analyzed using the BD FACSAria™ III Cell Sorter (BD Biosciences, San Jose, CA, USA), and the data were analyzed using FlowJo 7.6.1 software (FlowJo, LLC, Ashland, OR, USA). ### Semi-quantitative reverse transcription (RT)-PCR To detect the mRNA expression of apoptin in MCF-7 cells, total RNA was extracted using TRIzol reagent (Thermo Fisher Scientific, Inc.), according to the manufacturer\'s protocol. RT-PCR was performed using the OneStep RT-PCR kit (Thermo Fisher Scientific, Inc.) and the following manually designed PCR primers: Apoptin sense, 5′-CGGCCGGCGTGGGATGAACGATCTCCAAGAAGATAC-3′ and antisense, 5′-CAAGCTTCAGTCTTATACGCCTTCTTGCGGTTC-3′; and β-actin sense, 5′-TGACGGGGTCACCCACACTG-3′ and antisense, 5′-TAGAAGCATTTGCGGTGGAC-3′. The PCR cycling conditions were as follows: 35 cycles of 94°C for 30 sec, 56°C for 30 sec and 72°C for 30 sec, followed by an extension step at 72°C for 10 min. Subsequently, the PCR products were separated by 1.5% agarose gel electrophoresis, with β-actin as an internal marker. Images of the gel were captured, and the apoptin gene was analyzed, using the GeneGenius Bio Imaging system (Syngene, Frederick, MD, USA). ### Western blot analysis MCF-7 cells were washed three times with cooled PBS and lysed using radioimmunoprecipitation assay lysis buffer (Xi\'an Heart Biotechnology, Co., Ltd., Xi\'an, China) containing 2 mg/ml protease inhibitors for 30 min. The lysates were then centrifuged at 25,000 × *g* for 20 min at 4°C, followed by boiling in loading buffer for 5 min. Total protein concentrations were determined using a Bradford protein assay (Sigma-Aldrich; Merck Millipore), and 150 µg protein samples were separated by 10% SDS-PAGE and transferred onto polyvinylidene difluoride membranes. The membranes were blocked using 5% (w/v) skimmed milk powder (Inner Mongolia Yili Industrial Group, Co., Ltd., China) dissolved in Tris-buffered saline containing 0.1% Tween-20 (TBS-T) for 1 h at room temperature. The membranes were incubated with anti-apoptin (1:1,000 dilution; catalog no. ab193612; Abcam, Cambridge, MA, USA) and anti-β-actin (1:1,000 dilution; catalog no. sc-47778; Santa Cruz Biotechnology, Inc., Dallas, TX, USA) antibodies at 4°C overnight. After washing three times with TBS-T, the membranes were incubated with the goat anti-mouse IgG1-HRP (1:10,000 dilution; catalog no. sc-2060; Santa Cruz Biotechnology, Inc.) and goat anti-rabbit IgG-HRP (1:5,000 dilution; catalog no. sc-2030; Santa Cruz Biotechnology, Inc.) secondary antibodies for 2 h at room temperature. The membranes were then washed with TBS-T three times for 10 min, then either applied with enhanced chemiluminescence reagents (Merck Millipore), according to the manufacturer\'s protocols, and exposed to X-ray film, or applied with DAB (from which brown staining was visualized). Autoradiogram signals were quantified using a gel densitometric scanning program. The relative expression of protein was determined from the optical density ratio of the corresponding protein bands, as quantified using Quantity One 4.6.2 software (Bio-Rad Laboratories, Inc., Hercules, CA, USA). ### Experiments on a nude mouse model in vivo A total of 15 BALB/c nu/nu athymic nude female mice (4--5 weeks-of-age) were purchased from Shanghai Silaike Laboratory Animal Co., Ltd. (Shanghai, China). The mice were maintained at Xi\'an Jiaotong University in a sterile environment, with a temperature of 22--23°C, relative humidity of 45--55%, light/dark cycles of 12/12h, and food and water provided daily, in compliance with the Institutional Animal Care and Use Committee regulations. The mice were subcutaneously injected with 1×10^6^ MCF-7 cells (0.1 ml) into the left side of the second breast fat pad. When the tumors had reached \~100 mm^3^ in volume, the mice were randomized into three groups, as follows: i) The HSA-PEI-pcDN-Apoptin (0.5 mg/ml) group; ii) the HSA-PEI-pcDNA (0.5 mg/ml) group; and iii) the saline (control) group. The mice were injected (0.5 ml) into the tail vein with HSA-PEI-pcDN-Apoptin, HSA-PEI-pcDNA or saline once per day, and the tumor volumes were measured every 3 days. Tumor volumes were calculated using the equation: Tumor volume (mm^3^) = length × width^2^ × 0.5. After 25 days, the mice were sacrificed by cervical dislocation. The liver, lungs, kidneys and tumor tissues were harvested, fixed in 4% paraformaldehyde solution and embedded in paraffin. The liver and lung paraffin sections were stained with hematoxylin and eosin (HE), and were independently evaluated by two pathologists. The tissue proteins were extracted for western blot assay. The handling of animals was in accordance with the Animal Care Guidelines of Xi\'an Jiaotong University of Medical Sciences Ethical Committee. All the experiments were performed to minimize the stress and pain experienced by the animals. ### Statistical analysis Statistical analyses were performed using SPSS 13.0 software for Windows (SPSS Inc., Chicago, IL, USA). Two-tailed Student\'s t-tests were used for comparisons between two groups. Data are expressed as the mean ± standard deviation. P\<0.05 was considered to indicate a statistically significant difference. Results ======= ### Successful establishment of the HSA-PEI-pcDNA-Apoptin expression plasmid The recombinant plasmid was digested using *Eco* RI and *Xba* I restriction enzymes, and the products were separated by 1% agarose gel electrophoresis, which produced two fragments: Apoptin (376 bp) and pEGFP-N1 (5,000 bp) ([Fig. 1](#f1-ol-0-0-5470){ref-type="fig"}). Sequencing by Sigma-Aldrich (Thermo Fisher Scientific, Inc.) demonstrated that the apoptin gene sequence of the recombinant plasmid was the same as the apoptin sequence in GenBank (accession no. Ay171617). The apoptin DNA and EGFP DNA sequences were shown to form a complete reading frame, without frameshift mutations, which conformed to the experimental design. ### Apoptin expression in MCF-7 cells transfected with HSA-PEI-pcDNA-Apoptin To determine whether HSA-PEI-pcDNA-Apoptin was successfully transfected into MCF-7 human breast cancer cells, the cells were transfected with various concentrations of HSA-PEI-pcDNA-Apoptin or HSA-PEI-pcDNA, and were observed by fluorescence microscopy after 24 h. Approximately 90% of cells transfected with 0.5 or 1.0 mg/ml constructs showed positive green fluorescence staining ([Fig. 2A](#f2-ol-0-0-5470){ref-type="fig"}). For economic reasons, 0.5 mg/ml HSA-PEI-pcDNA-Apoptin was used in the subsequent *in vivo* experiments. The mRNA and protein expression of apoptin in MCF-7 cells was confirmed by semi-quantitative RT-PCR and western blotting. Apoptin transcripts were detected in MCF-7 cells at 24 h following transfection. Apoptin mRNA was only detected in MCF-7 cells transfected with HSA-PEI-pcDNA-Apoptin ([Fig. 2B](#f2-ol-0-0-5470){ref-type="fig"}); β-actin was an internal marker ([Fig. 2C](#f2-ol-0-0-5470){ref-type="fig"}). Western blot analysis confirmed that apoptin was only expressed in the MCF-7 cells transfected with HSA-PEI-pcDNA-Apoptin, and not in the HSA-PEI-pcDNA-transfected or blank control cells ([Fig. 2D](#f2-ol-0-0-5470){ref-type="fig"}). These results suggest that the HSA-PEI-pcDNA-Apoptin construct can be transfected into breast cancer cells, resulting in the stable expression of apoptin. ### HSA-PEI-pcDNA-Apoptin reduces the viability and induces the apoptosis of MCF-7 cells To identify whether HSA-PEI-pcDNA-Apoptin was able to reduce the viability of MCF-7 cells, MCF-7 cells were transfected with HSA-PEI-pcDNA-Apoptin or HSA-PEI-pcDNA, or treated with saline (blank control), and MTT assays were performed to assess the cytotoxic effects. The cell viability of the HSA-PEI-pcDNA-Apoptin group was decreased by 14.3% following transfection with HSA-PEI-pcDNA-Apoptin, whereas the viability of the other two groups did not change ([Fig. 3A](#f3-ol-0-0-5470){ref-type="fig"}). MCF-7 cells were positively stained with Annexin V-PE and 7-ADD, and flow cytometric analysis showed that the apoptosis of MCF-7 cells transfected with HSA-PEI-pcDNA-Apoptin was significantly increased from 9.13±1.65 to 27.23±7.23% (P=0.013 vs. control; [Fig. 3B](#f3-ol-0-0-5470){ref-type="fig"}). These results suggest that HSA-PEI-pcDNA-Apoptin has a significant effect on the apoptosis and viability of breast cancer cells. ### HSA-PEI-pcDNA-Apoptin effectively inhibits tumor growth in MCF-7 xenografts To evaluate the therapeutic effects of HSA-PEI-pcDNA-Apoptin *in vivo*, HSA-PEI-pcDNA-Apoptin, HSA-PEI-pcDNA or saline were injected into the tail veins of BALB/c (nu-nu) athymic nude mice bearing MCF-7 cells once per day for 25 days, and the tumor volumes were measured every 3 days. As is shown in [Fig. 4](#f4-ol-0-0-5470){ref-type="fig"}, HSA-PEI-pcDNA-Apoptin markedly inhibited tumor growth, including tumor weight and volume, whereas there were no significant changes in the control group and HSA-PEI-pcDNA group. The tumor weights following sacrifice were significantly reduced in the mice injected with HSA-PEI-pcDNA-Apoptin (P=0.0011 vs. HSA-PEI-pcDNA). ### Expression of apoptin in breast tumor and normal tissues Western blotting was performed to detect whether apoptin was expressed in the tumor tissue and normal tissues of mice injected with HSA-PEI-pcDNA-Apoptin. As is shown in [Fig. 5A](#f5-ol-0-0-5470){ref-type="fig"}, the mice injected with HSA-PEI-pcDNA-Apoptin showed positive apoptin protein expression in the normal tissues (liver, lungs and kidneys) and tumor tissues, although the expression of apoptin was higher in the tumor tissue compared with the normal tissues. Apoptin expression was rarely detected in the mice injected with HSA-PEI-pcDNA or saline ([Fig. 5A](#f5-ol-0-0-5470){ref-type="fig"}). In addition, the paraffin-embedded sections of the mice lung and liver tissues were stained with HE, and the tissue morphology was observed under a microscope. As is shown in [Fig. 5B](#f5-ol-0-0-5470){ref-type="fig"}, there were no pathological changes in the lung and liver tissues of the mice injected with HSA-PEI-pcDNA-Apoptin or HSA-PEI-pcDNA, suggesting that apoptin causes no damage to normal tissues. Discussion ========== Efficacy and specificity is an important requirement for successful cancer therapy ([@b12-ol-0-0-5470]). The present study demonstrated the *in vitro* and *in vivo* effects of an HSA-carrying apoptin construct on MCF-7 human breast cancer cells. Notably, this recombinant HSA-PEI-pcDNA-Apoptin construct was able to selectively induce the apoptosis of breast tumor cells. Apoptin is a protein of 13.6 kDa that was derived from the CAV and is encoded by the VP3 gene ([@b13-ol-0-0-5470],[@b14-ol-0-0-5470]). Apoptin has been shown to selectively induce the apoptosis of a variety of tumor cells, including hepatomas, lymphomas, cholangiocarcinomas, melanomas, and breast, lung, oral and colon carcinomas, while not affecting the normal non-transformed human cells, including primary fibroblasts, smooth muscle cells, T-cells, hepatocytes, hematopoietic stem cells, keratinocytes and endothelial cells ([@b13-ol-0-0-5470],[@b15-ol-0-0-5470]--[@b17-ol-0-0-5470]). In addition, numerous human tumor cell lines were shown to be susceptible to apoptin ([@b12-ol-0-0-5470],[@b18-ol-0-0-5470]--[@b20-ol-0-0-5470]), which makes it a promising new tool for cancer gene therapy. However, efficient systems are required to deliver apoptin to cancer cells or to promote the expression of apoptin within these cells. The apoptin gene is suitable for inclusion in technologies such as conditionally replicative viruses or nonviral transduction methods because of its potency and small size; however these novel delivery strategies are yet to be validated ([@b21-ol-0-0-5470]). HSA may be a good choice for a vector because of its characteristics: HSA is a major protein component of blood plasma that has an important function in regulating colloidal osmotic pressure and transporting numerous endogenous compounds, including fatty acids, hormones, toxic metabolites and bile acids ([@b22-ol-0-0-5470]). Furthermore, HSA selectively binds to various drug molecules, and in doing so alters their pharmacokinetic properties and biological activity ([@b23-ol-0-0-5470],[@b24-ol-0-0-5470]). In a previous study, an antitumor effect was reported in human breast cancer cell lines transfected with a λ phage nanobioparticle expressing the apoptin gene ([@b12-ol-0-0-5470]). This platform allowed the present study to successfully construct an apoptin expression vector that effectively transported apoptin into breast cancer cells. The results presented in this study provide suggested that HSA-mediated apoptin infection was able to reduce the viability and induce the apoptosis of MCF-7 cells. Furthermore, intravenous delivery of the HSA-PEI-pcDNA-Apoptin construct decreased tumor growth *in vivo*, and resulted in no damage to normal tissues. At present, cancer therapy includes surgery, chemotherapy, radiotherapy, targeted therapy and immunotherapy. However, these conventional therapeutic methods have unavoidable side effects, and resistance to cancer therapies has been reported for the majority of tumors ([@b25-ol-0-0-5470]--[@b32-ol-0-0-5470]). Novel therapeutic approaches that facilitate the selective targeting of cancer cells have emerged in recent years. Furthermore, gene therapy has become a research hot-spot. Gene therapy involving the delivery of apoptin into cancer cells offers unique advantages over current approaches for cancer therapy. Guan *et al* ([@b18-ol-0-0-5470]) developed a construct involving the *Salmonella typhimurium*-mediated delivery of apoptin into human laryngeal cancer cells, and demonstrated that the recombinant was able to induce apoptosis in these cells *in vitro* and *in vivo*, without causing significant side effects on normal tissues. van der Eb *et al* ([@b19-ol-0-0-5470]) used HepG2 tumor-bearing mice to investigate the *in vivo* effects of an adenovirus-expressing apoptin, and demonstrated that treatment with apoptin significantly improved the long-term survival of the mice. Other experiments also reported that apoptin is a promising and useful gene for cancer therapy ([@b33-ol-0-0-5470]--[@b35-ol-0-0-5470]). In conclusion, the present study generated a recombinant HSA-PEI-pcDNA construct expressing apoptin, and investigated its antitumor effects *in vitro* and *in vivo*. *In vitro* analyses demonstrated that the HSA-PEI-pcDNA-Apoptin construct resulted in the successful expression of apoptin in MCF-7 cells, and induced the apoptosis of these cells. *In vivo* experiments showed that the injection of HSA-PEI-pcDNA-Apoptin in nude mice bearing MCF-7 cells significantly suppressed tumor growth, without causing damage to normal tissues. These results indicated that HSA-PEI-pcDNA-Apoptin may be considered a potential therapeutic agent for the treatment of solid tumors, as apoptin was specifically active in malignant cells and its toxicity in normal cells was negligible. However, the mechanism of apoptin-induced cell death has yet to be fully elucidated and should be investigated in further experiments. In addition, further studies are required using breast tumor models to determine the tumor-specific apoptotic effect of the recombinant complex in its actual target environment, as well as its most appropriate application in gene therapy. The authors would like to thank Professor Chen Huang at Xi\'an Jiaotong University for providing the platform to conduct the experiments and for the expert advice. This study was supported by the Natural Science Foundation of Shaanxi Province, China (grant no. S2013JC10894). ![Successful establishment of the human serum albumin-polyethylenimine-pcDNA-Apoptin expression vector was confirmed by 1% agarose gel electrophoresis. Lane 1, DL15000 DNA marker. Lanes 2 and 3, pcDNA-Apoptin was digested by *Eco* RI and *Xba* I restriction enzymes, and produced two fragments: apoptin at 376 bp and p-enhanced green fluorescent protein (EGFP)-N1 at 5,000 bp. Lanes 4 and 5, pEGFP-N1 was digested by *Eco* RI and *Xba* I restriction enzymes, and produced only one fragment at 5,000 bp. Lanes 6 and 7, the pEGFP-N1 plasmid.](ol-13-02-0579-g00){#f1-ol-0-0-5470} ![Expression of apoptin in MCF-7 cells transfected with HSA-PEI-pcDNA-Apoptin. (A) MCF-7 cells transfected with 0.5 mg/ml HSA-PEI-pcDNA-Apoptin and HSA-PEI-pcDNA were observed by fluorescence microscopy at 24 h following transfection (magnification, ×200). (B) Reverse transcription-polymerase chain reaction (RT-PCR) analysis of apoptin and β-actin mRNA expression in MCF-7 cells transfected with HSA-PEI-pcDNA-Apoptin. (C) Western blot analysis of apoptin protein expression in MCF-7 cells transfected with HSA-PEI-pcDNA-Apoptin. The cells were harvested at 24 h after transfection for analysis of apoptin expression. Lane 1, HSA-PEI-pcDNA; lane 2, HSA-PEI-pcDNA-Apoptin; lane 3, blank control. HSA, human serum albumin; PEI, polyethylenimine.](ol-13-02-0579-g01){#f2-ol-0-0-5470} ![HSA-PEI-pcDNA-Apoptin reduces the viability and induces the apoptosis of MCF-7 cells. (A) MTT assays demonstrated that the viability of MCF-7 cells was reduced following transfection with the HSA-PEI-pcDNA-Apoptin expression vector. OD value of three groups. (B) Flow cytometric analysis indicated that MCF-7 cell apoptosis was significantly reduced following transfection with HSA-PEI-pcDNA-Apoptin. Data are presented as the mean ± standard deviation of triplicate experiments. \*P\<0.05 vs. control. HSA, human serum albumin; PEI, polyethylenimine; OD optical density.](ol-13-02-0579-g02){#f3-ol-0-0-5470} ![HSA-PEI-pcDNA-Apoptin effectively inhibited tumor growth *in vivo*. Female nude mice were injected with MCF-7 human breast cancer cells and divided into three groups: HSA-PEI-pcDNA-Apoptin group, HSA-PEI-pcDNA group and the saline (control group). The mice in these groups were injected with the expression vectors or NaCl once daily for 25 days. (A) The tumor tissue of the female nude mice following sacrifice. (B) Tumor weight was significantly reduced in the mice injected with the HSA-PEI-pcDNA-Apoptin expression vector. \*P\<0.05 vs. HSA-PEI-pcDNA. (C) Tumor volumes were measured every 3 days during treatment. HSA, human serum albumin; PEI, polyethylenimine; NaCl, sodium chloride.](ol-13-02-0579-g03){#f4-ol-0-0-5470} ![Effect of HSA-PEI-pcDNA-Apoptin on normal and tumor tissues. (A) Apoptin was upregulated in the tumor tissues of the HSA-PEI-pcDNA-Apoptin group, but showed low levels of expression in normal tissues, including the liver, lungs and kidney, as demonstrated by western blotting. Apoptin was rarely expressed in the HSA-PEI-pcDNA group and control group mice. (B) Hematoxylin and eosin staining showed that no overt pathological changes were noted in the lung and liver tissues of mice injected with HSA-PEI-pcDNA-Apoptin (magnification, ×200). HSA, human serum albumin; PEI, polyethylenimine; NaCl, sodium chloride.](ol-13-02-0579-g04){#f5-ol-0-0-5470} [^1]: Contributed equally
Novel [99mTcIII(PS)2(Ln)] mixed-ligand compounds (PS = phosphino-thiolate; L = dithiocarbamate) useful in design and development of TcIII-based agents: synthesis, in vitro, and ex vivo biodistribution studies. A general procedure for the preparation of a new class of neutral six-coordinated mixed ligand [(99m)Tc(III)(PS)2(Ln)] compounds (PS = trisalkyl-phosphino-thiolate; Ln = dithiocarbamate) is reported as well as their in vitro stability and the ex vivo tissue distribution studies. [(99m)Tc(PS)2(Ln)] complexes were prepared in high yield in nearly physiologic conditions following a one-pot procedure. For instance, the chemical identity of [(99m)Tc(PSiso)2(L1)] (PSiso = 2-(diisopropylphosphino)ethanethiol; L1 = pyrrolidine dithiocarbamate) was determined by HPLC comparison with the corresponding (99g)Tc-complex. All complexes comprise the stable [(99m)Tc(III)(PS)2](+) moiety, where the remaining two coordination positions are saturated by a dithiocarbamate chelate, also carrying bioactive molecules (e.g., 2-methoxyphenylpiperazine). [(99m)Tc(PS)2(Ln)] complexes were inert toward ligand exchange reactions. No significant in vitro and in vivo biotransformation were observed, underlining their remarkable thermodynamic stability and kinetic inertness. These results could be conveniently utilized to devise a novel class of (99m)Tc(III)-based compounds useful in radiopharmaceutical applications.
Q: How to change grid column value on DataBound event I have the following Grid, <div class="kotgrid"> </div> And I bound the data as following. Here I want to change timedelay column value on DataBound event, $(".kotgrid").kendoGrid({ dataSource: dataSource, dataBound: function (e) { var grid = this; grid.tbody.find('>tr').each(function () { var dataItem = grid.dataItem(this); var d = new Date(); var currentTime = parseTime(dataItem.servertime); var currenTime = d.getHours() + ":" + d.getMinutes(); var meanTime = diff(orderTime2, currenTime2) //I want to set this meanTime in timedelay coloumn. How can I achieve this? }) }, filterable: true, scrollable: true, columns: [ { hidden: true, field: "orderitemid" }, { field: "tableid", title: "Table No" }, { field: "itemname", title: "Items" }, { field: "quantity", title: "Quantity" }, { field: "modifier", title: "Modifier" }, { hidden: true, field: "orderedtime", title: "Time Delay" }, { field: "timedelay", title: "Time Delay" }, { hidden: true, field: "alert" }, { hidden: true, field: "category", groupHeaderTemplate: "#= value #" }, { command: { text: "Pickup", click: showDetails} } ], mobile: "phone", editable: false, selectable: "row", height: "600px" }); I don't know how to achieve it. Any help will be highly appreciable. Thanks in advance. A: You don't need to iterate over the <tr> elements, unless you only want to do it for the current page. You can just iterate over grid.dataSource.data(). So you could do something like: var data = this.dataSource.data(); $(data).each(function() { var d = new Date(); var currentTime = parseTime(this.servertime); var currenTime = d.getHours() + ":" + d.getMinutes(); var meanTime = diff(orderTime2, currenTime2) // set on dataItem this.set("timedelay", meanTime); }); Regardless of how you get access to the dataItem, you can set any property using the set method (the data source contains Model items which inherit from ObservableObject).
DNA-mediated gene transfer into mammalian cells and cancer. DNA-mediated introduction of genes into mammalian cells promises to be a powerful method for detecting sequences that control cell growth, confer resistance to toxic drugs, code for surface receptor proteins, or, indeed alter cell phenotype in any clearly defined way. The identification and molecular cloning of human transforming genes from neoplastic cells was enabled by the advances in existing techniques that allow DNA-gene transfer. Some methods of gene transfer which are inefficient today, should not be disregarded in the future. Every study of the genetic basis of cancer at the molecular level is an important step to the ability to influence human cancer cells and suppress their growth in vivo.
Q: Screensaver/blanking problem I have upgraded to 12.10 and then downgraded again to 12.04 LTS because of the screensaver or screen blanking problem. After 10-12 minutes the screen goes black/blank when i dont do anything (idle). I have tried setting in the Brightness and Lock menu that the screen should never lock or turn off if idle. This is very annoying when watching movies etc. Would be nice if someone knows this. A: I'm not certain which one thing fixed it, but here's what I did: Open dconf editor from the Dash Click on the Find, and type power (case-sensitive). Here's what I've got set: idle-brightness = 0 idle-dim-time = 0 sleep-display-ac = 0 sleep-display-battery = 0 sleep-inactive-ac-timeout = 0 sleep-inactive-battery-timeout = 0 Try setting those and see if it helps you. Again, not exactly sure which one thing fixes it, I haven't taken the time to check. And ultimately, one shouldn't have to do this in the first place. A: Updating the settings using the Dconf-Editor didn't work for me. I found this bug report -> https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1072531. Part of the bug report was a work-around. Try running "xset s 0 0" from the command line, this fixed the problem for me. A: This worked for me: Open Dconf-Editor from the Dash. Org -> Gnome -> Desktop -> Screensaver. In the window that appear, uncheck the line idle-activation-enabled and uncheck the line ubuntu-lock-on-suspend. Another option is: on the left side, just below the voice Screensaver you see Session. Click on that and in the window that appears, the first line says idle-delay, the value is in seconds so maybe you can change the default value of 600 sec into a much higher value. The movie-player Totem has a function in Preference -> Visualization, there is a line: Disable screensaver, you should check Video-audio. I hope it helps. If not, put everything back as default.
Q: Dietpi - How to upgrade my kernel version to latest version I had odroid-xu4 with DietPi OS on it. My current kernel version; uname -a: Linux DietPi 3.10.106+ #1 SMP PREEMPT Fri Nov 24 16:26:38 CET 2017 armv7l GNU/Linux I'm trying to install tp-link TL-WN822N wifi device driver. But it asks me to upgrade my kernel version to 3.10 to 4.*. I tried: sudo apt-get install linux-headers-$(uname -r) and sudo apt-get update also i tried: sudo apt-get install linux-generic It installed correctly but i run uname -a.It gives the same out as Linux DietPi 3.10.106+ #1 SMP PREEMPT Fri Nov 24 16:26:38 CET 2017 armv7l GNU/Linux When i finally restart my odroid,it cannnot boot. So,can anyone tell me a correct procedure to upgrade my kernel and how to change uname -a output to show a upgraded kernel A: Please keep back up of your important files before the upgrade. Please read this XU4 kernel upgrade Solution 1: sudo apt-get dist-upgrade Solution 2: If dist-upgrade does not work then please try removing conflicting 3.x package before install: sudo apt-get purge linux-image-3* Do not reboot system, until below is installed. sudo apt-get install linux-image-4.9-armhf-odroid-xu3 Solution 3: [Solved] XU4 kernel upgrade from 3.10 to 4.9 Download the .deb file wget https://oph.mdrjr.net/meveric/kernel/XU3/4.9.x/linux-image-4.9.29+_4.9.29-20170527-XU3_armhf.deb -O package.deb install the .deb file using dpkg dpkg -i package.deb
A wireless cellular communication system uses a number of wireless transmitters to create a geographic service area of the system. The service area may be broken down into cells, which can be sized according to subscriber density and demand within a particular region. Cells can be added to accommodate growth, such as to create new cells in unserved areas or overlaying cells in existing areas, for example. In the wireless communication system, the wireless transmitters send and receive electromagnetic signals through antennas (rather than or in addition to transmitting and receiving signals through a transmission line). Antennas couple electromagnetic energy from one medium (space) to another (e.g., wire, coaxial cable, etc.). Physical designs of antenna systems can vary, however it is generally desirable to focus radiation of electromagnetic energy (in the form of a wireless signal) in the direction of a receiving device to efficiently transmit wireless signals and to lessen interference to other radio communication networks. Beamforming is one way to extend wireless coverage and reliability by employing multiple transmission and reception antennas to focus transmission and reception of signals. Beamforming is a signal processing technique used in antenna arrays for directional signal transmission or reception. Spatial selectivity is achieved by using adaptive or fixed receive/transmit beampatterns, for example. Beamforming can focus energy to a specific location to extend coverage/reliability to an area where a user is located. Beamforming using directional antennas concentrates electromagnetic energy to produce a radiation pattern in one or more desired directions. For example, a directional antenna may produce a conical-shaped coverage pattern, similar to the light output pattern of a flashlight. An angle of a beam width of the coverage pattern specifies the antenna directionality. Typical beam width angles range from 90 degrees (somewhat directional) to 20 degrees (very directional). A directional antenna beam provides a narrow coverage pattern, which may allow for efficient transmission of wireless signals. However, since a directional antenna provides such a localized coverage pattern, an endpoint device should be within the localized coverage pattern (or possibly within a close proximity) in order to receive transmitted signals. This is because wireless devices may require control signaling messages to establish communication links, and even if the directional antenna radiates in directions slightly off-line from the endpoint device, little if any of the signals may be received in those off-line locations. Thus, if a user is not initially located within a direction of a coverage area of the directional antenna beam, the user may not be able to receive control signals needed to acquire service from the directional antenna. As a result, gaps between the coverage areas in a directional antenna system are dead-zones where users may not receive service.
Q: Git disassociate a branch from its parent I have the MAX-NAN commit which is a derived off of the MAX-12624 commit. I would like to merge ONLY the MAX-NAN commit, but Gerrit says I need to submit it with its parent. How can I remove all associations between these two branches such that MAX-12624 can be abandoned while the MAX-NAN can be merged independently A: Execute the following steps: Go to the MAX-NAN change Click on Rebase button Mark the Change parent revision checkbox Leave the next field empty Click on Rebase button The MAX-NAN change will not depend on the MAX-12624 anymore. Now you can submit MAX-NAN change and abandon MAX-12624 one.
Factors that influence physical activity participation among high- and low-SES youth. Researchers have rarely addressed the relationship between socioeconomic status (SES) and physical activity from the perspective of youth. To illuminate the factors that youth from low and high-SES areas consider important to increase physical activity participation among their peers, 160 youth (12-18 years) participated in small focus group interviews. Guiding questions centered on the general theme, "If you were the one in charge of increasing the physical activity levels of kids your age, what would you do?" Findings show that environmental factors (i.e., proximity, cost, facilities, and safety) are very important for youth living in low-SES areas to ensure participation in physical activity. Results also show that intrapersonal (i.e., perceived skill, competence, time) and social factors (i.e., friends, adult support) must be considered to help improve participation rates among both high- and low-SES youth.
"This is great." "Thanks for finally inviting me to one of your boring family barbecues." "Hey, this is what we do, okay?" "It's relaxing." "We're having a good time." "No, you're not." "Let me lighten things up a little bit." "Hey, everybody, you wanna hear a funny joke?" "Hey, wait, Rich, don't tell a joke." "There's kids here." "Don't worry, it's completely clean." "It's a kids' joke." "Why did the chicken cross the basketball court?" "I don't know." "Why?" "'Cause he heard the referee was blowing fouls." " Oh God." " I don't get it." "Foul is a double entendre, asshole." "It means the ref was sucking the chicken's dick." "Jesus!" " Shut up, Rich." " All right, fine." "Back to boring." "I do a pretty good Bill Cosby impression." "Really?" "Oh let's hear it." " Yeah, let's hear it." " No no, you don't wanna hear it." "Oh, come on, Walter, you have to do it now." " Okay." " All right, yeah." "Cosby, oh yeah." "Walter, no." "Well, they wanna hear it." "Walter, don't do this." "You sound nothing like the man." "It's a party." "It's a fun thing to do at a party." " Yeah, why don't you let him do it?" " Excuse me." "Walter, every time you do that impression you humiliate yourself, you humiliate me and people just feel embarrassed for you." "That's not true." "It is true." "God, that was awful." ""Lucky Louie" was taped before a live audience." "Wake up, you lazy piece of shit!" "What are you doing?" "Get up, Louie!" "I have to be at work in half an hour." "I'll get up in 29 minutes then." "What's your problem?" "Jesus." "I have been taking care of Lucy and getting ready for work all morning." "Get up!" "Now!" "I'm not kidding!" "Fucking tell me what to do." "I'll kill you." "Give me a kiss, baby." "Love you." "Hey, how about trying to squeeze in a shower today, okay, pal?" "Because you smell." "Why is Mommy so mad today?" "What did you do?" "Papa, look what I found." "Can I keep it?" "I don't think so, Lucy, that's a cigarette butt." "Come on." "Let her keep it." "Go wash your hands in the water fountain, okay?" "Do you think that fountain is any cleaner?" "The same homeless shemale that smoked that cigarette probably washed her balls in that fountain." "Man, this day blows." "Kim was really bitching it up this morning." "What did you do?" "Nothing..." "I don't think." " Must be PMS." " No, I know what that's like." "That's coming next week." "I'm looking forward to it after this shit." "Is she behaving erratically?" " Yeah." " Did it come on suddenly?" " Yeah." " Faggots have it easy, don't they?" "Well, whatever it is..." "I'm sure she's over it by now." "Hello." "What are you doing?" "What?" "Why the hell are you still here?" "Lucy's playing and I'm watching her." "What's your problem?" "Because, Louie, you should have been home an hour ago." "You were supposed to start dinner." "Her bath's gonna be late, she's gonna be up all night." "I won't sleep." "I have a double tomorrow and I'll be dead on my feet." "Hey!" "I'm having some quality time with my daughter, all right?" "So shut up." "Oh, that's great." "You're gonna act all tough in front of your friends?" "You think I give a shit what your friends think?" "Well, gotta get home." "See you, Kimmy." "Irritating bitch." "Excuse me?" "What was that?" "Hey, blow me, okay?" " What?" " I said blow me." "Okay, fine." "Take it out and I'll blow you." "What?" "If you take it out and it's hard," "I swear to God I will suck it." "Yeah." "Don't tempt me, babe." "Come on, let's go." "Whip it out, Rich." "I thought so." "What the hell just happened, Lou?" "I told you she'd be up all night." "I didn't sleep, now I'm screwed for the day." "Hey, I was up too." "God!" "You're such a selfish asshole sometimes." "Such a douche." "Such a..." "just dickhead." " I get it." " No, you don't!" "Hey!" "What is your problem these days?" "You have the gall to ask me that when you suck ass as a partner." "Well, that hasn't changed." "You changed." "I'm sucking exactly the same amount of ass" "I always sucked." "But it didn't use to bother you." "Now you are freaking out left and right." "What happened?" "Something happened." "You're right." "I don't know what happened." "Nothing happened." "I mean, usually I can deal." "But just... all of a sudden I just... hate you..." "I think." " What?" " Yeah." "I hate you." "Sorry." "It's just what I'm feeling." "What do you mean you hate me?" "Just..." "hate." "I hate you." "Sorry." "I don't get it." "I don't know." "I think there's just like this place where I put all your shit, and I think it just got full." "Well, does it have like a bag you can change out?" "I don't think so." "What are you saying?" "It's over?" "You wanna leave me?" "No no." "I still love you." "I do." "It's just..." "that I... fucking hate you a lot." "I'm sorry." "Okay, so what do we do about it?" "I don't know." "I don't want to hate you." "All right." "That's good to know." "Well, how about this:" "What about me do you hate?" "Try to think of some things." " What for?" " 'Cause I'll stop doing them." "I'll change." "Just think of some shit, some things you hate about me." "There's a lot of things." "Okay, that's good." "Look... just... just tell me everything about me that sucks." "Okay." "Well, I hate that you wake up whenever you feel like it." "You can't do that in a family, it's not fair." "Okay." "And you always wait for me to tell you what needs to be done, which makes me feel like a total nag." " Needs to be done..." " And you act like just doing your part around the house is a huge favor to me and a giant pain in your ass!" "Okay." "And you have no regard for the way you look around the house." "It's like what you wear to bed and during the day, there's no differential there." " Also, you don't even listen to me..." " I got enough." " But I'm not finished." " How much more..." "Never mind." "Just... let me work on these, and you can give me more later." "Okay." "That's good." "Thanks." "Oh, and nose hair." "Clip it." "I'm going to the dry cleaner's tomorrow, you have anything you want to drop off?" "I do an excellent Bill Cosby." "Oh, Walter." "Come on." "People have told me that it's good and they enjoyed it." "Those people are being polite." "I'm your wife, and I'm telling you that when you do it you look ridiculous." "Frankly, I'm doing you a favor." "Well, don't do me any favors." "I'm a man." "If I wanna do a Bill Cosby impersonation, I'm gonna do it." "We're in a new place." "You're not gonna do it here." "I'll do it if I want to." "I'm gonna do it." "If you do it, you'd better do an impression of Bill Cosby checking into a hotel." "Hey, good morning." "Have a seat." "I made you some breakfast." "Oh." "Thank you." "No problem." "Thanks for the frozen waffles, Papa." "Can I go get dressed?" "Sure you can." "I already picked out your outfit." "It's on your bed." "Here's a cup of tea also." "Thank you." "That's okay." "I really enjoyed it very much." "Also I packed your lunch and I put an apple in there." "I know that you like apples." "Yeah." "This is awful, please stop." "Well, what the fuck?" "I fixed everything on the list." "I know, but..." "Well, do you still hate me?" "What is it?" "Yeah." "But it's not the things you do." "Well, if it's not what I do then, what do you hate?" "What is it?" "I think it's just... your whole person." "Just who you are." "Your face." "Your voice." "Your smell and just... your whole essence of being, really." "You're kinda hurting my feelings right now." " I'm sorry." " No, it's okay." "But we got to find a way to get back to before" " you were disgusted by me." " I know." "I don't like feeling this way." "You know what?" "I think... maybe I need to spend some time away from you." "Okay." "No, okay." "You know what we should do?" "Why don't I just spend the weekend at Mike's or Rich's house?" "Oh yeah." "You'd love that." "You get to hang out with your friends, and I get to stay here to take care of all this shit by myself?" "Hey." "You guys got any more olives?" "Yeah, they're in the fridge, Jerry." "Thanks." "I just need three." "Maybe you should go somewhere for a couple of days." "Get a break from me." "Where am I gonna go?" "I don't know." "Stay in a hotel or something." "We can't afford a hotel." "You need a place to stay?" "Well, yeah, but just for the weekend." "Oh, stay at my apartment downstairs." "You can have the whole place to yourself." "Where will you stay?" "Oh yeah." "Wait wait." "Can I stay here?" " You wanna stay here?" " Yeah, Kim is staying at my place, and I got nowhere to go." "Okay so, what are we gonna tell Lucy?" "Well, we'll just tell her that you're visiting somebody far away." "That way she won't know you're right downstairs." "Okay." "That's good." "So..." "it's okay?" " I can stay here?" " Yeah, sure." "Wow." "Thanks, man." "You're really getting me out of a jam." "Oh shit." "I dated this guy once who cried like a baby every time we had sex." "That's kinda nice though." "No." "It wasn't like nice, soft crying." "It was like, he would wail like a baby, really loud while he was fucking me like," ""Oh Kim!" "Kim!"" "Oh Christ, that's horrible." "Oh God." "This is so great." "I'm never going back to my shitty little family." "What are we eating, Papa?" "I'm making wiggly pasta with tomato sauce." "What are you drawing?" "Something green." "That's great." "Look." "I drew a pony." "That doesn't look like a pony." "It doesn't?" "Here, it needs a tail." "Oh yeah." "Thanks." " Hey." " Hey." " Here you go." "Okay." " Thanks." "Hey, how is it going in there?" "Oh, really good actually." "Lucy's having a great time and I'm gonna watch "Rocky V" tonight while she's sleeping." " Good, you should." " Yeah." "How is it going down there?" "Good." "Really good, actually." "I just love my time to relax." " I read a whole book yesterday." " Good good." "Yeah, and I was actually thinking that tomorrow's Monday and I'm off, so maybe I could take one more day." "Just one day and one night more." "Oh, you should, totally." "Oh, then I can watch "Conquest of the Planet of the Apes" on TBS." " Yeah." "Okay great." " Yeah." " All right, I'll see you later then." " Okay." "Oh, here's your mail." "Oh, thanks." "Whoa." "This is kind of moving in a dangerous direction." "Yeah, I'm enjoying this shit a little too much." "I'm as happy as I've ever been." "Uh-oh." "Yeah, I bought a new lamp for Jerry's apartment." "I spent the whole day cleaning it and now I'm moving my stuff down there." "Wow." "If this keeps up we're gonna be... neighbors." "Fuck." " What do we do?" " We gotta work this out." "Look we gotta have a whole serious sit-down talky thing." "Now, like tonight." "I'll get a babysitter." "Okay, I'll meet you downstairs at 7:00." "Good." "Walter." "Walter, are you in the bedroom?" "Yeah." "Can you bring in my moisturizer?" "Okay, honey." "So this is good that we're doing this." "Definitely." "Definitely." "Are you guys ready to order?" "Oh yeah." "Just one second." "I'm gonna have the bacon double cheeseburger and..." "Don't get that." "Order something healthy." "It's a restaurant." "So that means you have to jam grease in your arteries?" "If it tastes good, yeah." "Louie, your heart's gonna explode." "Get the fucking organic mixed baby greens." "You know, why don't you just order for me?" "And why don't you eat it too?" "And then just shit in my mouth." "We're gonna need a minute." "Maybe this was a bad idea." "Jesus Christ." "You and your fucking hate." "You're not the only one who hates." "What?" "You hate me?" "Yeah, sometimes." "You're surprised?" "I don't know, just... hearing you say it." "God." "What do you do when you hate me?" "I just keep it in and I let it crush my heart down to a diamond." "So we hate each other and we're married." "How did that happen?" "I remember it used to be so nice." "You know, when we started dating." "Yeah, that was nice." "Not our first date though." "Oh God, no." "That was awful." "Nightmare." "You showed up wearing those stupid clothes and you took me to that shitty cafe." "You smelled." "And you never listened to me when I talked to you." "You ignored me the whole time." "And I remember watching you leave through my window and thinking, "Jesus, I hate that guy."" "Oh my God." "I've hated you from the beginning." "I felt the same thing." " You did?" " Yeah." "I remember I came to pick you up and you gave me a dirty look." "And then we went to that restaurant, you acted snooty about it." "And then you told these long, fucking stories that... who would listen to that shit?" "And I remember walking down your steps and thinking, "God, I hate the shit out of that bitch."" "So we always hated each other." "Yeah." " Isn't that bad?" " No, it's great." "'Cause all married couples hate each other." "The ones that don't make it are the ones that can't handle it." "But we know we can handle it, 'cause it's been there since the beginning." "But we still chose to be together." "Yeah, we did." "This marriage was built on hate." "That's why it's gonna last forever." "Listen." "Tonight, when we get home," "I'm gonna fuck your tits off." "So you see," "Pudding Pops are so delicious because it puts a smile on your face." "And you just say, "Oh boy."" "And your stomach says, "Thank you very much for the Pudding Pop,"" "and you say, "You're welcome, stomach."" "And then your stomach says, "I think I want another Pudding Pop with all the chocolate and the vanilla and the flavor."" "You know what, bitch?" "You can kiss my ass."
Q: UI Activity View Errors I'm quite the beginner to iOS Programming, and I googled how to get the UI Activity View implemented, but I'm getting errors that I do not quite understand. Anyone that can help me figure out what the errors mean in more specific detail and how to fix them, it would be greatly appreciated. #pragma mark - SHARING OPTIONS (using a DocumentInteractionController) ============= /* ================= NOTE: The following methods work only on real device, not iOS Simulator, and you should have apps like Instagram, iPhoto, etc. already installed into your device! ================= */ -(void)shareImageToAllAppsAvailable { NSLog(@"This code works only on device. Please test it on iPhone!"); // makes an NSURL file to the processed Image that needs to be saved NSURL *fileURL; docIntController.delegate = self; //Saves the Image to default device directory NSArray *paths = NSSearchPathForDirectoriesInDomains(NSDocumentDirectory, NSUserDomainMask, YES); NSString *documentsDirectory = [paths objectAtIndex:0]; NSString *savedImagePath = [documentsDirectory stringByAppendingPathComponent:@"My Selfie.jpg"]; UIImage *image = combinedImage; NSData *imageData = UIImagePNGRepresentation(image); [imageData writeToFile:savedImagePath atomically:NO]; //Load the Image Path NSString *getImagePath = [documentsDirectory stringByAppendingPathComponent:@"My Selfie.jpg"]; // this blank line here creates error 'use of undeclared identifier 'showActivityViewController'' // Create the URL path to the Image to be saved fileURL = [[NSURL alloc] initFileURLWithPath:getImagePath]; // Open the Document Interaction controller for Sharing options -(void)showActivityViewController { //-- set up the data objects NSString *textObject = _aTextView.text; UIImage *image = [UIImage imageNamed:@"My Selfie.jpg"]; NSArray *activityItems = [NSArray arrayWithObjects:textObject, url, image, nil]; //-- initialising the activity view controller UIActivityViewController *avc = [[UIActivityViewController alloc] initWithActivityItems:activityItems applicationActivities:nil]; //-- define the activity view completion handler avc.completionHandler = ^(NSString *activityType, BOOL completed){ NSLog(@"Activity Type selected: %@", activityType); if (completed) { NSLog(@"Selected activity was performed."); } else { if (activityType == NULL) { NSLog(@"User dismissed the view controller without making a selection."); } else { NSLog(@"Activity was not performed."); } } }; } A: You're missing a closing } before your -(void)showActivityViewController declaration. It looks like you're trying to call that method by defining it within another method, which is not valid Objective-C. Use the self construct to reference methods defined in the same class. #pragma mark - SHARING OPTIONS (using a DocumentInteractionController) ============= /* ================= NOTE: The following methods work only on real device, not iOS Simulator, and you should have apps like Instagram, iPhoto, etc. already installed into your device! ================= */ -(void)shareImageToAllAppsAvailable { NSLog(@"This code works only on device. Please test it on iPhone!"); // makes an NSURL file to the processed Image that needs to be saved NSURL *fileURL; docIntController.delegate = self; //Saves the Image to default device directory NSArray *paths = NSSearchPathForDirectoriesInDomains(NSDocumentDirectory, NSUserDomainMask, YES); NSString *documentsDirectory = [paths objectAtIndex:0]; NSString *savedImagePath = [documentsDirectory stringByAppendingPathComponent:@"My Selfie.jpg"]; UIImage *image = combinedImage; NSData *imageData = UIImagePNGRepresentation(image); [imageData writeToFile:savedImagePath atomically:NO]; //Load the Image Path NSString *getImagePath = [documentsDirectory stringByAppendingPathComponent:@"My Selfie.jpg"]; // this blank line here creates error 'use of undeclared identifier 'showActivityViewController'' // Create the URL path to the Image to be saved fileURL = [[NSURL alloc] initFileURLWithPath:getImagePath]; // Open the Document Interaction controller for Sharing options [self showActivityViewController]; //added } //added -(void)showActivityViewController { //-- set up the data objects NSString *textObject = _aTextView.text; UIImage *image = [UIImage imageNamed:@"My Selfie.jpg"]; NSArray *activityItems = [NSArray arrayWithObjects:textObject, url, image, nil]; //-- initialising the activity view controller UIActivityViewController *avc = [[UIActivityViewController alloc] initWithActivityItems:activityItems applicationActivities:nil]; //-- define the activity view completion handler avc.completionHandler = ^(NSString *activityType, BOOL completed){ NSLog(@"Activity Type selected: %@", activityType); if (completed) { NSLog(@"Selected activity was performed."); } else { if (activityType == NULL) { NSLog(@"User dismissed the view controller without making a selection."); } else { NSLog(@"Activity was not performed."); } } }; }
Where would you like to sign in? First Metformin Gum Patent Granted to Generex Biotechnology TORONTO -- (MARKET WIRE) -- November 14, 2006 -- Generex Biotechnology Corporation (NASDAQ: GNBT), the leader in drug delivery for metabolic diseases through the inner lining of the mouth, announced today that it has been granted the first patent for its medicinal gum platform titled "Compositions for Oral Transmucosal Delivery of Metformin." The patent covers claims to the composition, processes, and methodologies for the delivery of an oral transmucosal metformin composition via the oral mucosal membrane for absorption. This patent was issued by the Lebanese Ministry of National Economy Intellectual Property Protection Office. As a consequence of Lebanon's accession to the international Patent Co-operation Treaty, this patent will open the door to further filings in the other PCT signatory countries. Metformin is a generic drug used to regulate blood glucose (sugar) levels by reducing the amount of glucose produced by the liver, and by making the insulin produced by the body work more effectively to reduce the amount of glucose already in the blood. Metformin has been in use around the world for more than 30 years. It remains the most prescribed drug for Type-2 diabetes, a testimony to its efficacy and its prominent place in diabetes therapy. The total US market sales of all forms of metformin are approximately $1.8 Billion (IMS-MAT: December 2003). The patent relates to an oral transmucosal metformin composition comprising a pharmaceutically acceptable carrier being capable of delivering a pharmaceutically effective amount of metformin to the oral mucosal membrane for absorption. "We are very pleased to receive the first patent for our metformin gum product, a product that complements our flagship product, Generex Oral-lyn™, and related diabetes pipeline," said Rose C. Perri, the Generex Chief Operating Officer. The Company currently holds an aggregate of 80 patents worldwide (20 of which are United States Patents) and has an aggregate of 60 patent applications pending in various jurisdictions. About Generex Generex is engaged in the research and development of drug delivery systems and technologies. Generex has developed a proprietary platform technology for the delivery of drugs into the human body through the oral cavity (with no deposit in the lungs). The Company's proprietary liquid formulations allow drugs typically administered by injection to be absorbed into the body by the lining of the inner mouth using the Company's proprietary RapidMist™ device. The Company's flagship product, oral insulin (Generex Oral-lyn™), which is available for sale in Ecuador for the treatment of patients with Type-1 and Type-2 diabetes, is in various stages of clinical trials around the world. For more information, visit the Generex website at www.generex.com. Safe Harbor Statement: This release and oral statements made from time to time by Generex representatives concerning the same subject matter may contain "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. These statements can be identified by introductory words such as "expects," "plans," "intends," "believes," "will," "estimates," "forecasts," "projects" or words of similar meaning, and by the fact that they do not relate strictly to historical or current facts. Forward-looking statements frequently are used in discussing potential product applications, potential collaborations, product development activities, clinical studies, regulatory submissions and approvals, and similar operating matters. Many factors may cause actual results to differ from forward-looking statements, including inaccurate assumptions and a broad variety of risks and uncertainties, some of which are known and others of which are not. Known risks and uncertainties include those identified from time to time in the reports filed by Generex with the Securities and Exchange Commission, which should be considered together with any forward-looking statement. No forward-looking statement is a guarantee of future results or events, and one should avoid placing undue reliance on such statements. Generex cannot be sure when or if it will be permitted by regulatory agencies to undertake additional clinical trials or to commence any particular phase of clinical trials. Because of this, statements regarding the expected timing of clinical trials cannot be regarded as actual predictions of when Generex will obtain regulatory approval for any "phase" of clinical trials. Generex claims the protection of the safe harbor for forward-looking statements that is contained in the Private Securities Litigation Reform Act.
Post navigation Rest day: Some considerations Although yesterday when I finished running I was feeling awesome this morning when I woke up my legs and buttocks felt tight as hell. Given the present situation I have decided to take a rest and allow my muscles to recover. I ve been doing some research on the difference between trailing models and urban/asphalt models to see if there was much of a difference in design. The truth is appart from having a slightly thicker modified sole to increase grip and reinforced structure all five fingers models are pretty similar. That makes me wonder whether using fivefingers with a thicker sole may be better for transitioning to barefoot running. I used to have a Bikila model and I get the feeling that it was much harder on my feet than my current treksport model. I am not an expert but if you are planning on transitioning I would definitely suggest a trailing model, that is, if you intend to use it for running. Just talking out of my own experience though, could be different for others. So, my mission for today is to fight off the urge to slip into my fivefingers and let my feet recover. Tomorrow I will resume my 25 minute training and see how it goes
Q: Sequence within trait of FactoryGirl factory does not use main sequence counter I have the following factory: FactoryGirl.define do factory :foo do sequence(:name) { |n| "Foo #{n}" } trait :y do sequence(:name) { |n| "Fooy #{n}" } end end end If I run create :foo create :foo create :foo, :y I get Foo 1, Foo 2, Fooy 1. But I want Foo1, Foo2, Fooy 3. How can I achieve this? A: After a couple of hints from smile2day's answer and this answer, I came to the following solution: FactoryGirl.define do sequence :base_name do |n| " #{n}" end factory :foo do name { "Foo " + generate(:base_name) } trait :y do name { "Fooy " + generate(:base_name) } end end end
The pair take part in a daring mission to steal the plans to the Empire’s dreaded Death Star, and as sometimes happens with intense circumstances, it seems the pair become more than battle buddies. Specifically, the spot, subtitled “Jyn and Cassian” only teases glimpses of footage we haven’t seen before, but those are key to the pair: specifically Jyn clenching the rebel pilot’s hand, and the pair entering an Imperial facility disguised as baddies. “Hope begins with them,” a title card reads.
Q: How can I map some Visual Studio 2010 keybindings to nunit's DEBUG and RUN commands? Visual Studio has two default keybindings for unit testing :- CTRL-R then CTRL-T : Debug the current unit test 'context' (ie where the cursor is currently flashing). CTRL-R then T : Run the current unit test 'context' (as above). How can I rebind these to use nUnit? Currently, they only support MSTest. I also have ReSharper installed, if that's any help. I grab nUnit via NuGet. I don't manually install nUnit via some msi, fwiw. A: I got this on Tool -> Options -> Environment -> Keyboard Theres 2 resharper commands, search for contextrun and assign Ctrl+R, T and for contextdebug and assign Ctrl+R,Ctrl+T