text stringlengths 8 5.77M |
|---|
Q:
Can an employer make a 401k vesting schedule worse?
Say a person works for an employer for 2+ years based on the statement (promise?) that they will be 100% vested in their 401k employer match after 5 years. Is the employer then permitted to change the rules so that it will take the employee 6 years to be fully vested?
From my research it seems they may be allowed to do this provided they don't reduce the percentage already vested at any point? However even given that, it would still seem unfair since the job would have been partly been accepted based on the original promise, and when the vesting schedule is made worse, then at the point it's made worse, it's like telling someone, hey that money you have been anticipating (and working under the assumption) to be fully yours by year 5 will now take until year 6 to be fully yours.
EDIT: I just found the following guidance on the IRS website
https://www.irs.gov/retirement-plans/change-in-plan-vesting-schedules
Seems from this link (esp. the example they offer) that there are actually quite tight restrictions on what employers can do... e.g. seems to me that if accrued non-vested amounts are additionally restricted by a worsened future vesting schedule, that this may not be allowed after all? And even for people with less than 3 years service?!
A:
My interpretation of the IRS link you provided is that any amount of existing employer contributions must follow the least restrictive of the old and new vesting schedules, AND, any participating employee who has been an employee for at least 3 years can elect to stay on the old plan if the wish (for both existing and future contributions). Perhaps this could be best explained with an example:
Old Vesting Schedule:
1 year = 20%
2 years = 40%
3 years = 60%
4 years = 80%
5 years = 100%
New Vesting Schedule:
2 year = 20%
3 years = 40%
4 years = 60%
5 years = 80%
6 years = 100%
You mentioned you have 2 years, so for this example you currently would be vested at 40%. Had you had 3 years you could elect to completely stay on the old plan and all of your existing and future contributions would be fully vested after 5 years. But with less than 2 years it works like this:
All employer contributions that you have at the time of the plan change will continue to vest on the old schedule (completely vested after 5 years- up to 3 years from now).
All future employer contributions that you receive will vest on the new schedule (completely vested after 6 years - up to 4 years now.) Contributions you receive "today" would be vested at 20%, whereas those that were made "before" were vested at 40%.
It may be easier to conceptualize this as your account "splitting" into two separate accounts on the day of the plan change, with all new contributions going into the second account and each account vesting at its respective schedule.
|
// Copyright (c) 2001-2010 Hartmut Kaiser
// Copyright (c) 2001-2010 Joel de Guzman
//
// Distributed under the Boost Software License, Version 1.0. (See accompanying
// file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
///////////////////////////////////////////////////////////////////////////////
//
// A complex number micro generator - take 3.
//
// Look'ma, still no semantic actions! And no explicit access to member
// functions any more.
//
// [ HK April 6, 2010 ] spirit2
//
///////////////////////////////////////////////////////////////////////////////
#include <boost/config/warning_disable.hpp>
#include <boost/spirit/include/qi.hpp>
#include <boost/spirit/include/karma.hpp>
#include <boost/spirit/include/phoenix_core.hpp>
#include <boost/spirit/include/phoenix_operator.hpp>
#include <boost/fusion/include/std_pair.hpp>
#include <boost/fusion/include/adapt_adt.hpp>
#include <iostream>
#include <string>
#include <complex>
///////////////////////////////////////////////////////////////////////////////
// The following macro adapts the type std::complex<double> as a fusion
// sequence.
//[tutorial_karma_complex_number_adapt_class
// We can leave off the setters as Karma does not need them.
BOOST_FUSION_ADAPT_ADT(
std::complex<double>,
(bool, bool, obj.imag() != 0, /**/)
(double, double, obj.real(), /**/)
(double, double, obj.imag(), /**/)
)
//]
namespace client
{
///////////////////////////////////////////////////////////////////////////
// Our complex number parser/compiler (that's just a copy of the complex
// number example from Qi (see examples/qi/complex_number.cpp)
///////////////////////////////////////////////////////////////////////////
template <typename Iterator>
bool parse_complex(Iterator first, Iterator last, std::complex<double>& c)
{
using boost::spirit::qi::double_;
using boost::spirit::qi::_1;
using boost::spirit::qi::phrase_parse;
using boost::spirit::ascii::space;
using boost::phoenix::ref;
double rN = 0.0;
double iN = 0.0;
bool r = phrase_parse(first, last,
(
'(' >> double_[ref(rN) = _1]
>> -(',' >> double_[ref(iN) = _1]) >> ')'
| double_[ref(rN) = _1]
),
space);
if (!r || first != last) // fail if we did not get a full match
return false;
c = std::complex<double>(rN, iN);
return r;
}
///////////////////////////////////////////////////////////////////////////
// Our complex number generator
///////////////////////////////////////////////////////////////////////////
//[tutorial_karma_complex_number_adapt
template <typename OutputIterator>
bool generate_complex(OutputIterator sink, std::complex<double> const& c)
{
using boost::spirit::karma::double_;
using boost::spirit::karma::bool_;
using boost::spirit::karma::true_;
using boost::spirit::karma::omit;
using boost::spirit::karma::generate;
return generate(sink,
// Begin grammar
(
&true_ << '(' << double_ << ", " << double_ << ')'
| omit[bool_] << double_
),
// End grammar
c // Data to output
);
}
//]
}
///////////////////////////////////////////////////////////////////////////////
// Main program
///////////////////////////////////////////////////////////////////////////////
int main()
{
std::cout << "/////////////////////////////////////////////////////////\n\n";
std::cout << "\t\tA complex number micro generator for Spirit...\n\n";
std::cout << "/////////////////////////////////////////////////////////\n\n";
std::cout << "Give me a complex number of the form r or (r) or (r,i) \n";
std::cout << "Type [q or Q] to quit\n\n";
std::string str;
while (getline(std::cin, str))
{
if (str.empty() || str[0] == 'q' || str[0] == 'Q')
break;
std::complex<double> c;
if (client::parse_complex(str.begin(), str.end(), c))
{
std::cout << "-------------------------\n";
std::string generated;
std::back_insert_iterator<std::string> sink(generated);
if (!client::generate_complex(sink, c))
{
std::cout << "-------------------------\n";
std::cout << "Generating failed\n";
std::cout << "-------------------------\n";
}
else
{
std::cout << "-------------------------\n";
std::cout << "Generated: " << generated << "\n";
std::cout << "-------------------------\n";
}
}
else
{
std::cout << "-------------------------\n";
std::cout << "Parsing failed\n";
std::cout << "-------------------------\n";
}
}
std::cout << "Bye... :-) \n\n";
return 0;
}
|
1. Introduction {#sec1}
===============
Invasive Group B*Streptococcus* (GBS), a leading cause of illness and death among infants in the first week of life and of infection in pregnant women, also causes significant morbidity and mortality among nonpregnant adults \[[@B1]\]. GBS has been traditionally considered a neonatal pathogen; however due to effective screening and intrapartum chemoprophylaxis the incidence of the disease has drastically fallen among this population \[[@B1], [@B2]\].
Recently GBS has emerged as an important cause of invasive infection in nonpregnant adults. In a large, population-based analysis the incidence of adult GBS disease has more than doubled over an observed 18-year study period from 3.6 cases per 100,000 persons in 1990 to 7.3 cases per 100,000 in 2007 \[[@B3]\]. Typical presentations of GBS disease in adults include bacteremia without focus and skin and soft-tissue infection. Other serious clinical syndromes, such as meningitis, pneumonia, streptococcal toxic shock syndrome, and endocarditis, are rare but are often associated with considerable morbidity and mortality \[[@B1], [@B4]--[@B11]\]. Nonfocal bacteremia and pneumonia were more common among patients aged 65 years and older. Osteomyelitis, skin and/or soft-tissue infection, peritonitis, meningitis, and necrotizing fasciitis were more common among younger adults \[[@B3]\]. Among adults, the most common risk factors for invasive GBS disease are older age and medical comorbidities; 88% of cases occur among persons with one or more underlying chronic medical conditions, especially diabetes \[[@B3]--[@B6], [@B8]--[@B10]\]. We highlight a rare case of GBS pelvic abscess in a nonpregnant patient with no significant comorbidities.
2. Case {#sec2}
=======
A 43-year-old G2P1011 with a history of total vaginal hysterectomy six years before presentation, laparoscopic ovarian cystectomy, and a remote history of pelvic inflammatory disease presented to our emergency department with four days of pelvic pain, low-grade fever, chills, anorexia, and body aches.
On admission, the patient was febrile to 38.4°C and found to have leukocytosis (white count 14,900/mm^3^) with a left shift. While the patient was in the ED a pelvic ultrasound was obtained and was significant for a large (7.0 × 5.2 × 6.9 cm) heterogeneous complex lesion with multiple septations in the left adnexa with apparent fallopian tube involvement concerning for tuboovarian abscess. The decision was made to admit the patient. A pelvic CT with contrast was completed ([Figure 1](#fig1){ref-type="fig"}) and found a multiloculated cystic mass measuring 7.9 cm with enhancing walls in the pelvis diagnostic of a pelvic abscess. No noted abnormalities were seen in the small bowel or colon.
After blood cultures had been drawn in the ED, which yielded no growth at five days, the patient was empirically started on IV Cefoxitin, Doxycycline, and Flagyl and referred to our interventional radiology department for possible drainage. On day 1 of admission, an 8.5-French Cook all-purpose drainage catheter was placed transgluteally within the pelvic abscess ([Figure 2](#fig2){ref-type="fig"}). After placement, the Cook catheter drained purulent material that was subsequently sent for culture. The specimen showed Gram-positive cocci that speciated to GBS, resistant to clindamycin and erythromycin.
Over the course of the admission the patient clinically improved, she remained afebrile, leukocytosis resolved to normal, and drainage decreased gradually. Four days after the catheter placement an interval CT showed a marked improvement of the pelvic abscess with only small residual locules of fluid found adjacent to the drainage catheter. At this stage, the interventional radiology team removed the catheter with no noted complications ([Figure 3](#fig3){ref-type="fig"}).
The patient remained afebrile with resolved leukocytosis and was discharged home on a course of oral antibiotics with follow-up in two weeks.
3. Discussion {#sec3}
=============
Upon thorough review of the literature, all large studies describing GBS disease burden among multiple populations fail to mention GBS as a causative microorganism of deep-seeded pelvic abscesses. A search of the English literature using PubMed was conducted; cases were included if the patient was a nonpregnant adult with an abscess occurring in the pelvis or abdominal cavity. To the best of our knowledge, this is the first case of a sporadic pelvic abscess of unknown origin in a previously healthy patient with no medical comorbidities.
Published cases of deep-seeded GBS abdominal or pelvic abscesses were reported in patients with previous comorbidities, mostly diabetes, and involved an infection of the kidney \[[@B12]--[@B14]\], bladder \[[@B15]\], prostate \[[@B16]\], adrenal gland \[[@B17]\], liver \[[@B18]\], and uterus \[[@B19]\]. One case of sporadic GBS abdominal abscess was recently described in 2015 \[[@B20]\].
The most common cause of pelvic abscesses is fistula formation. The majority of cutaneous fistulas represent a complication of recent abdominal surgery \[[@B21]\]. The leading causes of internal fistulas are Crohn\'s disease, diverticulitis, malignancy, or a complication of treatment of these entities \[[@B22]--[@B26]\]. Other causes of pelvic abscesses include tuboovarian abscess (TOA) and complication following surgery for a ruptured appendix.
The predominant bacteria in intra-abdominal and pelvic abscesses with an intestinal culprit are polymicrobial in origin and the most common isolates in most series are the*B. fragilis* group and*E. coli* \[[@B27], [@B28]\]. Pelvic abscesses caused by TOAs are predominantly also polymicrobial in nature, although*Neisseria gonorrhoeae* and*Chlamydia trachomatis* are occasionally cultured in sexually active women of the reproductive age \[[@B29]--[@B31]\].
Overall, this case we present is unusual for numerous reasons. The monobacterial nature of the pelvic abscess, the deep-seeded pelvic site, the absence of an ascending route given the history of total vaginal hysterectomy with an intact vaginal cuff, and the lack of medical comorbidities in this patient make this finding extremely unlikely.
As the number of GBS infections is increasing yearly, clinicians are becoming more prone to include GBS as a culprit in their differential diagnoses for patients with multiple comorbidities, especially diabetes. This case, however, shows the ability of GBS to cause severe and invasive disease in a previously immunocompetent patient with no risk factors. Given the wide range of clinical presentations and capacity to cause invasive disease in healthy patients, clinicians should consider GBS in their differential, especially in sporadic abdominal or pelvic abscesses.
Competing Interests
===================
The authors declare that they have no competing interests.
{#fig1}
{#fig2}
{#fig3}
[^1]: Academic Editor: Hao Lin
|
Q:
Download Files from a Website with Python
I have about 300 small files that I need to download from a website. All are located in one directory. The files are of different sizes and have different extensions. I don't want to type each one into my web browser and then click 'save as' and such. I want to give my list to python and have it download and save each file in a directory. If python can simply download the directory, that would be even better.
A:
This is all detailed here. I would favor using Requests as it's generally great, but urllib2 is in the standard library so doesn't require the installation of a new package.
|
A 31-year-old man has been charged in the August death of a jogger who was found naked and partly burned in a wooded area near her mother’s house in rural Massachusetts, the authorities said Saturday.
The police tracked down Angelo Colon-Ortiz after investigators spent months following two strong but incomplete leads. People reported seeing a dark-colored sport utility vehicle near where the jogger, Vanessa Marcotte, 27, died. Witness accounts and DNA retrieved from her hands suggested the killer might be a Hispanic man about 30 years old.
Those clues came together last week when a state trooper in Worcester spotted a man matching that description driving the same kind of vehicle. The trooper traced the license plate to Mr. Colon-Ortiz and met him at his apartment, and he voluntarily provided a DNA sample, the authorities said.
Image Vanessa Marcotte Credit... Worcester County District Attorney's Office, via Associated Press
The DNA samples came back as a match on Friday afternoon, Joseph D. Early Jr., the Worcester County district attorney, said at a news conference on Saturday. |
ISET Students from Five Countries Host International Tea Party
Details
Created: 06 February 2017
ISET takes pride in its diverse international community, and uses every chance to celebrate it. The international tea party hosted in the cafeteria was an excellent illustration of this tradition. On February 6, ISET students from Armenia, Azerbaijan, Georgia, Japan and Iran took over ISET's cafeteria to host the community with tasty delights of their home countries.
The event organizers took the lead and did their best to surprise their guests with the limited resources available to them. One could try traditional Azeri tea made from herbs (mainly with cloves and cardamom), unexpectedly delicious Armenian tea with thyme and mint brought specially for the event from the Armenian mountains and, Japanese tea with a taste as mysterious as Japan itself (at least, from a Georgian perspective) all in one place!
The students completely outdid themselves and served traditional national delicacies to make the event even more remarkable. Shakarbura, Pakhlava, and Bamiya from Azerbaijan; Gata, dried fruits, whole green walnut jam, dogberry and fig jam from Armenia; Matcha cake with Anko, Mitarashi-Dango (dumplings with sauce) and Konpeitos (candies) from Japan; Pistachios and Qottabs from Iran. Every contribution made an excellent addition to the large variety of tea.
The ISET community is privileged to enjoy such international cultural events quite often; the institute has a long tradition of special cuisine days when representatives of different countries present their national cuisine to the community. These events serve the bigger purpose of bringing students and faculty together, giving them the opportunity to learn more about different cultures and traditions. It is about building a firm and diverse community, a goal which ISET takes seriously. |
Some 800 anti-establishment accounts and pages have been yanked from Facebook in a sweeping crackdown the social media giant framed as a fight against spammers. RT talked to those who were targeted in the cleansing.
Among the hundreds of pages and accounts Facebook and Twitter took down were those both on the political left and right, ranging from conspiracy theorists and police brutality watchers, to news outlets with non-mainstream angles, While their content could be at times described as controversial, the bulk of the banished pages boasted large followings and outreach.
READ MORE: ‘Land of censorship & home of the fake’: Alternative voices on Facebook and Twitter’s crackdown
RT spoke to some of the voices silenced by the Facebook move. Here is what they had to say.
Jason Bassler, The Free Thought Project, 3.1mn followers
The Free Thought Project bills itself as a "hub for free thinking conversations." Both its Facebook and Twitter accounts were shut down in the pre-midterms purge. Jason Bassler, who co-founded the project in 2013, told RT that what Facebook did is an act of political censorship and has nothing to do with its stated goal to clean up its platform from spam.
"If that was just spam, if that was just irrelevant garbage they wouldn't be so threatening, they would not ban us, they would not care, we would not have been on their radar."
By spinning the story as a fight against unworthy news trash, Facebook itself is misleading users with its own version of fake news, he said: "This is nothing more than political censorship and trying to eradicate certain political ideologies."
Nicholas Bernabe, founder of The Anti-Media, 2.1mn followers
Nicholas Bernabe, blogger and entrepreneur behind the independent news aggregator The Anti-Media, believes that "the most troubling" thing in Facebook's treatment of media pages is that tech giants are now trying to police cultural dialogue by posing as politically neutral.
"That could actually be perceived as Facebook itself meddling in elections, because we are only a few weeks away from the midterms and they go and target 800 politically-oriented media pages for deletion."
He added that the majority of the banned pages held "very anti-establishment, very anti-authoritarian views," that appealed to those whose take on election is very different from what mainstream media has to offer.
READ MORE: FBI investigating as Facebook says hackers accessed data of 29 million users
Matt Savoy, The Free Thought Project, 3.1mn followers
It is hard to overestimate the implications for those that were swept up in the purge, Matt Savoy of The Free Thought Project said. Many of the affected websites will be out of business and "thousands of people will be out of work."
"This is like a death blow. Facebook was a source of how we were able to get our links out and drive traffic to the website, and we no longer have it. The few remaining employees that we have, they are going to be gone."
Journalists did not have any time to prepare for the looming crackdown, Savoy said, and at first the staff thought it was a mere glitch.
Matt Bergman, Punk Rock Libertarians, 190,000 followers
Matt Bergman, who founded the Punk Rock Libertarians in 2010, told RT that his 'The Daily Liberator' podcast was taken down from Facebook without any explanation. Bergman's own account was also briefly suspended, as well as those of other page admins.
The purge is the result of the pressure Congress put on Mark Zuckerberg, and its first targets were independent outlets "right of the dial," since it's easier to get away with banning relatively small outlets than major channels like RT, he argued.
"Their terms of service agreement is probably a million words long. Nobody has ever read it all the way through and I would think that if they wanted to they can ban CNN, they can ban you guys, if they wanted to, they can ban anybody."
Bergman said he is filing an appeal in a bid to restore the account.
Dan Dicks, Investigative Journalist, 350,000 followers
Vancouver-based investigative journalist Dan Dicks, who writes for The Press for Truth, said the Facebook crackdown was "clearly political" as it saw tech companies assuming the role of "the gatekeepers of political thought."
"What we are dealing with here today is the silencing of anybody who goes against the status quo right now, does not matter right or left side of the political spectrum."
Conspiracy theorist Alex Jones, expunged from Facebook and Twitter, might have been "the first domino to fall," but now the crackdown has widened to affect smaller outlets that vie for minds of the people on par with mainstream media, he said.
The crackdown on anti-establishment voices will come back to bite Facebook, UK Labour Party activist and political theorist Dr. Richard Barbrook argued.
Facebook and other tech companies who feel compelled to impose more "traditional media censorship" are likely to see a mass exodus from their platforms, he believes.
"The problem is if they are doing it too much, people would be gone somewhere else, where they don't have network effects working against them," Barbrook told RT. |
51104.5
What is the product of -4 and 4360651?
-17442604
What is -0.0164655 times 26?
-0.428103
Multiply 5.5221977 and -3.
-16.5665931
Calculate -0.1693024*-5.1.
0.86344224
Product of -164076575 and -0.5.
82038287.5
34749637*-4
-138998548
4432888 * 30
132986640
Product of 21.37 and 34.76.
742.8212
-4542666 * 0.14
-635973.24
What is -58764 times 42?
-2468088
-0.1 times 278.63227
-27.863227
What is 1069 times -342378?
-366002082
-257.67*65
-16748.55
What is the product of 0.2 and 907758?
181551.6
Work out -3063 * -1396.43.
4277265.09
Calculate -2578*-1.0582.
2728.0396
Multiply -389.37 and 0.01005.
-3.9131685
-0.343415 * 8
-2.74732
Product of 13595.969 and -3.
-40787.907
679716 * 24
16313184
Calculate 53314023*-10.
-533140230
Calculate -7.106*-7942.
56435.852
Product of -334.378 and 8.
-2675.024
Calculate -291972.97*-0.11.
32117.0267
Multiply -12733 and -12692.
161607236
Product of -133542 and -1852.
247319784
What is the product of -14.37995 and 0.03?
-0.4313985
-4 times 23537.73
-94150.92
1.444765*-4
-5.77906
Work out 0.0905 * 19.4011.
1.75579955
Multiply 293.08268 and -2.
-586.16536
What is the product of 0.05025714 and 0.1?
0.005025714
150.56 times 24.3
3658.608
-44.9*5975.1
-268281.99
10.7744 * -0.0185
-0.1993264
Product of 323589 and -6.
-1941534
119395.17 times -0.3
-35818.551
Calculate -130644.78*-78.
10190292.84
What is the product of 0.5 and -82047.015?
-41023.5075
-97 times 8.38568
-813.41096
Work out 1650962 * 1.2.
1981154.4
What is 0.07 times -13.274438?
-0.92921066
Calculate -22*-16645061.
366191342
Calculate -235.31053*-0.4.
94.124212
Calculate -123653*0.5.
-61826.5
Product of 638169 and 1.4.
893436.6
1805.8*132
238365.6
Calculate 1.97323*-14.
-27.62522
Work out -582 * -885.67.
515459.94
Calculate -3252235*5.
-16261175
Work out -1309 * 127933.
-167464297
Calculate -0.4*-0.1458519.
0.05834076
Product of -4 and 212.38963.
-849.55852
Work out 5.2164 * -3199.
-16687.2636
Calculate -1.52*-12.455.
18.9316
Multiply 2.5 and -9604.53.
-24011.325
-0.011 * 0.269902
-0.002968922
0.194 * 55042
10678.148
Calculate 145*-39005.
-5655725
Product of -4004 and -25016.
100164064
Multiply -671.14 and 2979.
-1999326.06
-501 times 4290.5
-2149540.5
-63605259 times 4
-254421036
Multiply -4730264 and -0.4.
1892105.6
0*0.02351037
0
Multiply -0.55 and 0.0270204.
-0.01486122
What is the product of 63.1 and -30.423?
-1919.6913
-2069 times -287266
594353354
-0.043 * -583968
25110.624
-5 * -28600122.4
143000612
What is 10153 times -64216?
-651985048
2470273491 times 3
7410820473
Multiply -69 and 20333.
-1402977
-2 times -42871.769
85743.538
30849752*-3
-92549256
7022625 times -0.3
-2106787.5
Multiply 38534 and 631.
24314954
Multiply 13639 and -120.
-1636680
1.8 * -0.08990951
-0.161837118
-14965 times -1739
26024135
Multiply -74 and -4074327.
301500198
-9559128*0.85
-8125258.8
Calculate 1.500646*-33.
-49.521318
2009.646 times 4
8038.584
Multiply 23562.6 and 71.
1672944.6
-45 * 0.996772
-44.85474
What is the product of 0.05 and 4.647079?
0.23235395
30523170 * 0
0
-22832 times 0.1921
-4386.0272
Work out 2.35 * 2.10731.
4.9521785
Multiply -17967648 and 0.5.
-8983824
Calculate -6651*-453.
3012903
-78*-115016
8971248
Multiply -4428 and -0.78.
3453.84
Work out 192.6728 * 5.
963.364
Product of -0.15 and -6.145699.
0.92185485
1.2 times -1724432
-2069318.4
What is 258.6 times -19413?
-5020201.8
Multiply -0.0345 and 5693.
-196.4085
What is the product of -0.00253 and 0.151?
-0.00038203
3 * 0.0148138
0.0444414
Product of -168.5617 and 0.17.
-28.655489
What is the product of 0.179 and -64399?
-11527.421
-4268*194997
-832247196
256822*-178
-45714316
What is the product of -725 and -340072?
246552200
Product of -1.8 and 138287.6.
-248917.68
Calculate 47*114.373.
5375.531
-717800*86
-61730800
What is -35109 times -13127?
460875843
What is the product of 0.0926 and -137.9?
-12.76954
What is the product of 1.916 and 201.16?
385.42256
-0.1 times -287.63576
28.763576
-355.3 * -0.13
46.189
What is 20.895 times 21?
438.795
Product of -7 and 15356070.
-107492490
Multiply 968 and -155989.
-150997352
Product of -244 and 3822.
-932568
-22.5 times 1907
-42907.5
Calculate -2.99*-252632.
755369.68
What is -0.1 times 25393.075?
-2539.3075
0.522 times 0.64492
0.33664824
92*96890
8913880
706677*-0.31
-219069.87
Multiply -8.254 and 345.
-2847.63
What is -1 times -2805.389?
2805.389
What is the product of -7190.49 and -0.1?
719.049
Work out 380033 * -144.7.
-54990775.1
Product of -2690 and 0.103809.
-279.24621
Work out -0.44292 * -39.
17.27388
Multiply 0.2659 and -0.06609.
-0.017573331
Multiply 1426654922 and 5.
7133274610
What is the product of -98 and 210303.1?
-20609703.8
What is 2.4 times 2380.13?
5712.312
What is the product of -0.1546 and -137?
21.1802
What is the product of -32.811505 and 6?
-196.86903
-9*-112077
1008693
-22.5 times 633.3
-14249.25
Multiply -0.059171017 and 0.4.
-0.0236684068
What is the product of -18.49078 and 13?
-240.38014
Calculate 803*-10437.3.
-8381151.9
Work out -53221920 * -1.
53221920
Product of -1.33037 and 1.6.
-2.128592
-636342.701 times 0.4
-254537.0804
What is 11 times 33598581?
369584391
136095614 * -0.2
-27219122.8
What is the product of -0.430096 and -53?
22.795088
Work out -0.648 * 23.95.
-15.5196
What is the product of -1474 and -22.045?
32494.33
Multiply 2221.09 and 0.12.
266.5308
Multiply -50.6417 and 0.0292.
-1.47873764
-3 * -5641450
16924350
Calculate -9406*0.06535.
-614.6821
-0.0111 * -137603
1527.3933
What is -2 times 146165.38?
-292330.76
What is -5 times -337.0926?
1685.463
What is 3990344.9 times -0.3?
-1197103.47
-0.32 times -994664
318292.48
18.2 times -0.56239
-10.235498
Work out 173177 * -4.311.
-746566.047
-80600*-0.161
12976.6
What is 11275951 times 6?
67655706
Calculate -6*-4844356.
29066136
-0.62297599 * -0.4
0.249190396
Multiply 435479 and -3.47.
-1511112.13
Product of 10851.34455 and 0.
0
-1.8 * 292929
-527272.2
What is 11401 times -33.4?
-380793.4
Multiply -1069495036 and -0.4.
427798014.4
Work out 2 * 1412.865.
2825.73
Multiply 3383577 and -13.
-43986501
-5*-2138750
10693750
Multiply -428717 and -0.035.
15005.095
Calculate -204434*-862.
176222108
Calculate -0.0306723*-1160.
35.579868
Work out -1156013 * 2.
-2312026
Work out 0.93256 * -405.7.
-378.339592
-10.62*0.025
-0.2655
18956 times -4471
-84752276
Multiply -110 and -3562587.
391884570
-265 * -1019.9
270273.5
0.1*-308.166707
-30.8166707
What is 480 times 25.426?
12204.48
Multiply -81 and -22284.3.
1805028.3
Product of -50100 and 2.03.
-101703
What is 0.00173971 times -0.142?
-0.00024703882
What is the product of -18 and 10438.06?
-187885.08
Work out 2247017 * -6.
-13482102
Calculate -1258605*-11.6.
14599818
Multiply 7 and 13048900.
91342300
4.999761*-27
-134.993547
Work out 0.24132 * 1.4.
0.337848
Multiply 1120951 and 1.7.
1905616.7
Multiply 0.17821745 and 2.
0.3564349
What is -0.4 times -6369187?
2547674.8
Multiply 3852.34 and -1955.
-7531324.7
-10310.7 times -2168
22353597.6
3.26 * -39530
-128867.8
Product of -28 and -42328.4.
1185195.2
Calculate -5*1800.102.
-9000.51
Multiply -0.339 and 3780.
-1281.42
220.068 times 0.02
4.40136
-0.004*3217288
-12869.152
Calculate 0.319379*9.9.
3.1618521
Multiply 700789 and -315.
-220748535
Calculate 0.0404597*129.8.
5.25166906
Multiply 0.04 and -28931428.
-1157257.12
-0.1223 times -146697
17941.0431
What is the product of 131883.1 and -69?
-9099933.9
Product of -3.0716067 and 0.1.
-0.30716067
-615 * 66586
-40950390
What is the product of -70 and 35359?
-2475130
-12358.0483 times -2
24716.0966
-4074997.7 * 12
-48899972.4
Product of -7 and -89115602.
623809214
What is the product of 2.4 and -347059?
-832941.6
3390.049 * -1.6
-5424.0784
Work out -338 * 478.
-161564
What is the product of -1631.349 and 0.1?
-163.1349
What is the product of -1.5575 and 27580?
-42955.85
Multiply 740 and 302310.
223709400
-15657239*1
-15657239
Multiply 24 and 0.1148.
2.7552
0.2*-0.783215
-0.156643
-644 times 58797
-37865268
-7453.2 * -289
2153974.8
Calculate -28*0.22099.
-6.18772
Calculate -11121*-0.164.
1823.844
What is the product of -168.4 and -7321?
1232856.4
Multiply 10677 and 135240.
1443957480
What is -0.015 times 9657788?
-144866.82
What is the product of 2.1 and -307412?
-645565.2
What is the product of 5025384 and 39?
195989976
-4.1*-160844
659460.4
W |
/* Copyright 2019-2020 Canaan Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <hlir/ops/constant.h>
#include <hlir/transforms/neutral/fold_constant.h>
#include <hlir/visitor.h>
#include <llir/evaluator.h>
#include <scheduler/scheduler.h>
#include <targets/target.h>
#include <unordered_set>
using namespace nncase;
using namespace nncase::hlir;
using namespace nncase::hlir::transforms;
using namespace nncase::scheduler;
namespace
{
std::unordered_set<node_opcode> dontfold_ops { };
}
bool fold_constant_transform::on_try_match(node &node, transform_context &context)
{
if (dontfold_ops.find(node.runtime_opcode()) == dontfold_ops.end()
&& node.inputs().size() && std::all_of(node.inputs().begin(), node.inputs().end(), [](input_connector &conn) {
return conn.connection()->owner().runtime_opcode() == op_constant;
}))
{
for (auto &in : node.inputs())
context.inputs.emplace_back(&in);
for (auto &out : node.outputs())
context.outputs.emplace_back(&out);
context.matched_nodes.emplace_back(&node);
for (auto &in : node.inputs())
context.matched_nodes.emplace_back(&in.connection()->owner());
return true;
}
return false;
}
void fold_constant_transform::process(transform_context &context)
{
auto &output = *context.inputs[0]->connection();
auto inputs = context.outputs[0]->connections();
auto &old_op = *context.matched_nodes[0];
// 1. Construct new eval graph
graph new_graph;
std::vector<output_node *> op_outputs;
std::vector<constant *> output_values;
for (auto &out : old_op.outputs())
{
auto node = op_outputs.emplace_back(new_graph.emplace<output_node>(out.type(), out.shape()));
if (old_op.outputs().size() > 1)
node->name(out.owner().name() + "/" + out.name());
else
node->name(out.owner().name());
node->input().connect(out);
}
// 2. Eval
{
std::vector<std::unique_ptr<memory_allocator>> allocator_holder;
std::unordered_map<memory_type_t, memory_allocator *> allocators;
context.target.fill_allocators(allocators, allocator_holder);
allocation_context alloc_ctx(allocators);
std::vector<llir::node *> compute_sequence;
hlir_compile_context hl_ctx;
new_graph.compile(hl_ctx);
schedule(hl_ctx.graph.outputs(), alloc_ctx, compute_sequence, 0);
llir::evaluate_context eval_ctx(allocators, alloc_ctx.allocations());
llir::evaluator eval(eval_ctx, compute_sequence);
eval.evaluate();
for (size_t i = 0; i < op_outputs.size(); i++)
{
auto &op_output = *op_outputs[i];
auto mem = eval.output_at<uint8_t>(i);
auto out_val = context.graph.emplace<constant>(op_output.input().type(), op_output.input().shape(), mem.begin(), mem.end());
out_val->name(op_output.name());
output_values.emplace_back(out_val);
}
}
// 3. Clear eval graph connections to main graph
for (auto &out : op_outputs)
out->input().clear_connection();
for (size_t i = 0; i < old_op.outputs().size(); i++)
{
auto &out = old_op.outputs()[i];
for (auto &in : dup(out.connections()))
in->connect(output_values[i]->output());
}
}
|
White witches need to stop appropriating other cultures! You are not an earthbound spiritual “gypsy” traveler. The word gypsy is a racial slur towards the Romani people! No you’re not smudging when you use your sage bundles, you’re just smoke cleansing. Unless you’re Indigenous it’s literally just smoke cleansing (and I don’t mean that 1/13 bullcrap either). No you’re not working with any spirits or working with any real magic when you try to practice Voodoo and/or Hoodoo! Those are closed African spiritual practices that you need to stay👏🏾out👏🏾of.👏🏾 No you don’t have “dreadlocks” y’all are determined to ignore black people who ask you to stop appropriating this hairstyle so on y’all it’s matts and you shouldn’t get them. Not every culture wants to have their practices taken by other cultures especially if you’re an American with witch! In American poc were denied the rights to their own spirituality and culture for so long it’s not even funny! And you guy really just need to stay in your lane and LEAVE OTHER CULTURES ALONE! You have your own culture and even some open cultural aspects from poc that are open to everyone. There is no reason to appropriate. |
Honoring fallen U.S. military rugby players
Maj. Nate Conkey of Joint Base Lewis-McChord, Wash., places a rugby ball alongside a U.S. Army flag during a remembrance ceremony for all U.S. military rugby players who made the ultimate sacrifice. In the background, retired Army Chief Warrant Officer 5 Jay Leasure plays "Amazing Grace" on the bagpipes. The ceremony was part of the Serevi Rugbytown Sevens tournament, played Aug. 16-18, 2013, in Glendale, Colo., where the All-Army team won the 2013 Armed Forces Rugby Sevens Championship. |
James is dead. Jake murdered him, gunned him down in the street, and left David alive to throb with the guilt of surviving.
One of the reasons this death hits so hard is that it means losing this fantastic actor from our regular roster. Dan Bucatinsky was able to treat what should have been a secondary character with all the charm and benevolence James Novak required to counter Cyrus’s deeply evil persona. I rooted for James even when I wasn’t rooting for Cyrus, knowing that he deserved better but hoping he would find a way back to the love and family he really wanted with Cyrus. When Olivia and Rowan had their heart-to-heart and she asked him if it was worth putting on the white hat and doing the work of saving all the monsters in the world, I was hearing James. He got tripped up and got angry and got revenge just like everyone else, but in the end he put on the white hat and wanted to save the world from monsters, even the monster closest to his heart. Three cheers to Dan Bucatinsky. James, you deserved better.
I had to treat his death with some gravitas because the rest of these cast members have looooooooost theeeeeeeeir goddaaaaaaaaamn miiiiiiiiiiiiiiinds.
Huck needs to die, and I’m not even sorry to say it. This creepy, I might kill you but I might have sex with you but I’ll definitely kiss you while my face is covered in a loogie you horked up on me after I ripped a gun from your hands but maybe I’ll weirdly spy-cam you, all with bulging eyes and heavy breathing? I AM DONE. They’ve turned him into a strangely neutered psychopath who treats Quinn like a doll made for his amusement, and I am way, way over his Quinn-centric God complex. You showed her how to work the deep web — that doesn’t mean you control her forever! He keeps trying to frame his psychosis through Quinn possibly still having some vestige of gladiator left in her, but how can she ever conjure up the mental wherewithal to come back to the people who have tortured, physically abused, and generally fucked her entire life over? Quinn needs to go rogue, she needs to go on a killing spree, she needs to start with Huck and never look back. I wish Scandal would stop framing abuse as love. This is a show where a woman chewed through her own wrists, and the first time I gagged was during this kiss scene.
I like that Fitz remains a gorgeous, surly mess. He hates being the president more than anyone hates anything, but manages to push through the din and fall on the “bold but brilliant” side of ending gun violence, giving Sally the endorsement from the gun lobby that they so desperately need to stay in the White House. Fitz is basically at the “Fuck it — in for a penny, in for a pound” stage of his career and his press secretary just got murked in a carjacking. He’s tottering around in a half-open bathrobe with a full glass of whiskey, frowning at CNN. Fitz is your old, drunk grandpa now.
Andrew and Mellie were so pissed that they spent all that time shooting clay pigeons with grown men named Dick only to have Fitz pull the plug on gun lobbyists that they had revenge sex! Mellie finally got some. Andrew has the sex appeal of brown paper bag but he legit loves her, and she legit needs to shake Fitz crumbs out of her vagina for good. I fully support this union, whether it’s a one-night stand or it brings down their marriage, the nation, the world!
Speaking of bringing down the nation, Adnan Salif handed Marie “Mama Pope” Wallace a sack of cash to make some kind of deal she instantly regrets. I think Adnan is going to die soon — she’s sexy and savvy, but she has hitched her pony to the wrong motherfucker. I mean, Mama Pope very casually killed that nice Russian man just for showing up unexpectedly, so does Adnan really think she can outrun whatever hell Mama Pope has planned for her? She won’t even see it coming.
For some reason, David thought he could watch three people get executed in front of him and still walk away unscathed, so it was no surprise that he eventually caved and told Abby what was up. David is a soft-boiled egg of a man, and he was always going to crack. His integrity is keeping him from setting up this Lynch dude as a patsy for a crime he knows Jake committed, but what is he supposed to do with his life at stake? David got to live, and the stress of it is going to kill him.
I’m in mourning about Jake “Puppy Eyes” Ballard. I could see the writing on the wall when they made him Command, but DAMN, SHONDA, why did you have to turn this sweet, hot, Boy Scout of a military man into a stone cold thug? The republic isn’t worth it, I promise! It will be interesting to see if he can maintain the unrelenting killer vibe as he racks up his own number to rival Papa Pope’s 183 killings he’s responsible for, but they keep trying to do this thing where they make him icy about his role, and then remorseful. The show has always done a really great job with unsympathetic characters in the past (like Billy, who was a massive asshole but also deftly pushed the story into new territory, or even Mama Pope), but they’ve also gone way off the rails by taking a formerly likable character into no man’s land (um, hello Huck). Real talk — are we ever going to be able to enjoy shirtless Jake again? This is a pressing concern.
Through James’s death, we were able to float through the greatest hits of his relationship with Cyrus, ending with the punishing, hefty release of grief Cyrus finally expresses at the podium. That they had a rocky start is true to who they always were to us, but damn did I cry when Cyrus went to grab James, Pretty in Pink–style, and twirl him onto the dance floor in full view of the slack-jawed, disbelieving Republican attendees of the state dinner. Because that was who they were, too, living between each moment of pain and glory, like the song they were dancing along to:
Oh, there have been times when times were hard But always somehow I made it, I made it through ’Cause for every moment that I’ve spent hurting There was a moment that I spent just loving you
If anyone should ever write my life story For whatever reason there might be Oh, you’ll be there between each line of pain and glory ’Cause you’re the best thing that ever happened to me
Cyrus’s face crumpled like tin foil and he let out that wail, buried under the doubly horrible weight of his husband’s murder and knowing that his eagerness to prevent the facts about Daniel Douglas’s murder from seeing the light of day might have set this train in motion. Jeff Perry acted the living shit out of that grief-stricken moment, and it was brutal to watch.
Equally brutal, though, was seeing that James didn’t die right away. Jake purposely took him down sloppily to make the carjacking story seem more realistic, so just when you thought your heart couldn’t take anymore, you see James, crawling and gasping, covered in blood, dying slowly. Jake apologized and stayed with him, talking him through the most emotionally horrific moment I’ve ever seen on this show. Was he trying to convince himself he was still a good guy? Did he think that having your murderer crouch over you like that while he looked off in the distance and tried to placate his victim would actually make him sympathetic? When James said, “Ella” and Jake assured him that his daughter would be fine, my eyes filled up with tears again. James was loving and protective to the bitter end, and Jake did him no comfort by watching him die. This was a knockout episode, even if I sort of hate everyone now.
Leaderboard of Arbitrary Points, Week 14
– 45,000 points to Jake for very casually digging a deep grave for Vanessa Chandler and Shelby Moss, the reporters he murdered along with James. I am willing to give him back 20,000 for digging in that tight white T-shirt, but I am STILL VERY MAD AT YOU, JAKE.
+ 10,000 points for James’s bitchy burns while he was courting Cyrus, namely “You really think I’m gonna take fashion advice from a guy with a neckbeard?”
– Infinity points to Quinn and Charlie for standing over the guy they framed, smiling while telling him that inmates get free medical care. What is this, a Quentin Tarantino movie?
+ 85,000 points to Shondaland for upping their Block Olivia’s Bump game to the next level by using Fitz’s knee in one scene, then a lamp, then her own purse. When this baby comes out, Kerry Washington is going to have a team of set decorators putting fully sashed curtains in front of the umbilical cord hanging out of her choach.
+ 1,000,000 points to drunk Mellie, now and forever (“Bloody Marys kill far more people than guns!”). I also love that they got drunk on the tiny mini-bar bottles.
– 4,765 points to Papa Pope for his unsympathetic, hand of god, monsters and demons, “I’m responsible for a whole lot of dying” speech. He is basically a madman on a bench at this point. However …
+ 3,000 points to Papa Pope for holding Liv’s hand for ten seconds, then being like, “Can I be done being your dad now? Great. Bye.” It was the only time I laughed all night.
+ 3,650 points to the gladiators for timing their reveals perfectly — Abby told Liv that Jake is behind the murder, Harrison scooted in to tell her Adnan Salif is back, and Huck ambled over to talk about getting Quinn out of B613. In my head, the Benny Hill soundtrack played the entire time.
– 7,981 points to Sheila, the intermediary White House Press Secretary. Honey, you are not cut out for this.
+ 10,000 points to Mellie because of course she knows guns like the back of her hand. Of course.
– Infinity points to the White House Press Corp who still flashed pictures of Cyrus during his emotional breakdown, because that felt too real in the “completely lacking in humanity” department
+ 500 points to Cyrus for finally figuring out the best way to flirt with James was to kiss him. “Damn right that’s your move.”
+ 200 points to Papa Pope for telling Olivia “Being the hand of god is already the worst punishment in the world.” I think she needs to be reminded that she doesn’t have to be the arbiter of good and bad for everyone.
+ 1,000 points to Lauren’s eye roll when Cyrus said, “Get me a new press secretary!” I am ready for the Lauren spinoff. |
---
abstract: 'In this paper, we study Bernoulli random sequences, i.e., sequences that are Martin-Löf random with respect to a Bernoulli measure $\mu_p$ for some $p\in[0,1]$, where we allow for the possibility that $p$ is noncomputable. We focus in particular on the case in which the underlying Bernoulli parameter $p$ is proper (that is, Martin-Löf random with respect to some computable measure). We show for every Bernoulli parameter $p$, if there is a sequence that is both proper and Martin-Löf random with respect to $\mu_p$, then $p$ itself must be proper, and explore further consequences of this result. We also study the Turing degrees of Bernoulli random sequences, showing, for instance, that the Turing degrees containing a Bernoulli random sequence do not coincide with the Turing degrees containing a Martin-Löf random sequence. Lastly, we consider several possible approaches to characterizing blind Bernoulli randomness, where the corresponding Martin-Löf tests do not have access to the Bernoulli parameter $p$, and show that these fail to characterize blind Bernoulli randomness.'
address: |
Department of Mathematics and Computer Science\
Drake University\
Des Moines, IA 50311\
USA
author:
- 'Christopher P. Porter'
bibliography:
- 'Bernoulli.bib'
title: Effective Aspects of Bernoulli Randomness
---
Introduction
============
Algorithmic randomness with respect to biased probability measures on the Cantor space ${2^\omega}$ has been studied in two separate strands: with respect to computable measures, such as in [@BieMer09], [@BiePor12], and [@HolPor17], and with respect to non-computable measures, such as in [@DayMil13] and [@ReiSla18] (see the recent survey [@Por19] for an overview of both approaches). In this article, we study the interaction of these two strands in the context of Bernoulli measures on ${2^\omega}$. Recall that, for $p\in[0,1]$, the Bernoulli $p$-measure $\mu_p$ is defined by $\mu_p({\llbracket}\sigma{\rrbracket})=p^{\#_0(\sigma)}(1-p)^{\#_1(\sigma)}$ for each basic open subset ${\llbracket}\sigma{\rrbracket}$ of ${2^\omega}$, where, for $i\in\{0,1\}$, $\#_i(\sigma)$ is the number of occurrences of the symbol $i$ in $\sigma$. We refer to such a $p$ as a *Bernoulli parameter*. We will refer to Martin-Löf randomness with respect to some Bernoulli measure as *Bernoulli randomness.*
The most significant work on the topic of Bernoulli randomness is due to Kjos-Hanssen [@Kjo10], who focuses in particular on randomness with respect to non-computable Bernoulli measures. On the standard approach to defining Martin-Löf randomness with respect to a non-computable measure, one includes the measure as an oracle to be used in enumerating the corresponding Martin-Löf tests (or, more precisely, a sequence that encodes the values of the measure on basic open sets in some effective way). In the case of defining Bernoulli randomness with respect to a non-computable Bernoulli parameter $p$, it suffices to use $p$ as an oracle in the definition of the corresponding Martin-Löf tests.
By contrast with the standard approach, Kjos-Hanssen considers *blind* Bernoulli randomness, i.e. Bernoulli randomness defined in terms of Martin-Löf tests that do not have access to the Bernoulli parameter $p$. His two main findings are the following: First, he shows that for $p\in[0,1]$, every Bernoulli $p$-random sequence computes the Bernoulli parameter $p$. Second, using this first result, he shows that the standard notion of Bernoulli $p$-randomness (given in terms of tests that have access to the oracle $p$) coincides with the notion of blind Bernoulli $p$-randomness.
In this study, we extend Kjos-Hanssen’s investigations in several respects. First, in Section \[sec-3\] we study the behavior of sequences that are Bernoulli random with respect to an algorithmically random Bernoulli parameter $p$. It follows from work of V’yugin [@Vyu12] (building upon work in [@VovVyu93]) and, independently, Hoyrup [@Hoy13], that if a sequence $x$ is Bernoulli random with respect to a Martin-Löf random Bernoulli random parameter $p$, that $x$ is *proper*, that is, random with respect to a computable measure on ${2^\omega}$. Here, by a careful analysis of Kjos-Hanssen’s first result discussed above, we prove a partial converse of this result: If a proper sequence $x$ is Bernoulli random with respect to some parameter $p$, then $p$ itself must be proper as well. We then explore a number of consequences of this theorem.
Second, by our first main result, every Bernoulli random sequence that is proper has Martin-Löf random Turing degree (i.e., is Turing equivalent to a Martin-Löf random sequence). This raises a number of questions about the Turing degrees of Bernoulli random sequences, which we consider in Section \[sec-4\]. For instance, we show that for every parameter $p$, there is a Bernoulli $p$-random sequence that has Martin-Löf random Turing degree, and by contrast, there is some parameter $p$ and some Bernoulli $p$-random sequence that does not have Martin-Löf random Turing degree.
Lastly, in Section \[sec-5\] we study several candidate definitions of blind Bernoulli randomness given in terms of initial segment complexity and supermartingales. It is well-known that a sequence is Bernoulli $p$-random if and only if $\mathit{KA}^p(x{{\upharpoonright}}n)\geq -\log\mu_p(X{{\upharpoonright}}n)-O(1)$, where $\mathit{KA}(\sigma)$ is the a priori complexity of $\sigma\in{2^{<\omega}}$ (defined below in Section \[sec-5\]). Here we show that the weaker condition $\mathit{KA}(x{{\upharpoonright}}n)\geq -\log\mu_p(x{{\upharpoonright}}n)-O(1)$ does not imply that $x$ is Bernoulli $p$-random, which shows that this condition does not provide a notion of blind randomness in terms of a priori complexity that is equivalent to Kjos-Hanssen’s original definition of blind randomness. From this result, we can easily derive the conclusion that (1) a similar condition in terms of prefix-free Kolmogorov complexity and (2) a notion of randomness defined in terms of blind supermartingales both fail to characterize Bernoulli randomness.
Before establishing the above-described results, in the following section we provide the requisite background.
Background {#sec-2}
==========
Notation and Measures
---------------------
The set of finite binary strings is denoted ${2^{<\omega}}$. The space of all infinite binary sequences is denoted ${2^\omega}$ and comes equipped with the product topology generated by the clopen sets $ {\llbracket}\sigma{\rrbracket}= \{x \in {2^\omega}: \sigma\prec x\}$, where $\sigma \in {2^{<\omega}}$ and $\sigma \prec x$ means $\sigma$ is an initial segment of $x$.
A *(probability) measure* $\mu$ on ${2^\omega}$ is a function that assigns to each Borel subset of ${2^\omega}$ a number in the unit interval $[0,1]$ and satisfies $\mu(\bigcup_{i \in \omega} {\mathcal{B}}_{i})= \sum_{i \in \omega} \mu({\mathcal{B}}_{i})$ whenever the ${\mathcal{B}}_{i}$’s are pairwise disjoint Borel subsets of ${2^\omega}$. Carathéodory’s extension theorem guarantees that the conditions
- $\mu({2^\omega})= 1$ and
- $\mu({\llbracket}\sigma{\rrbracket}) = \mu({\llbracket}\sigma0{\rrbracket}) + \mu({\llbracket}\sigma1{\rrbracket})$ for all $\sigma \in {2^{<\omega}}$
uniquely determine a measure on ${2^\omega}$. We thus identify a measure with a function ${\mu\colon {2^{<\omega}}\to [0,1]}$ satisfying the above conditions and $\mu(\sigma)$ is often written instead of $\mu({\llbracket}\sigma{\rrbracket})$. The Lebesgue measure $\lambda$ on ${2^\omega}$ is defined by $\lambda(\sigma) = 2^{-|\sigma|}$ for each string $\sigma\in {2^{<\omega}}$, where $|\sigma|$ denotes the length of $\sigma$. The space of all measures on $2^{\omega}$ is denoted $\mathscr{P}({2^\omega})$.
Some computability theory {#sec:some-comp-theory}
-------------------------
We assume the reader is familiar with the basic concepts of computability theory as found, for instance, in the early chapters of [@Nie09] or [@DowHir10]. We review a few useful concepts.
A $\Sigma^0_1$ *class* $S\subseteq {2^\omega}$ is an effectively open set, i.e., an effective union of basic clopen subsets of ${2^\omega}$ and a $\Pi^{0}_{1}$ *class* is the compliment of a $\Sigma^{0}_{1}$ class. A map $\Phi\colon \subseteq {2^\omega}\to {2^\omega}$ is a Turing functional if there is an oracle Turing machine that when given $x \in {\text{dom}}(\Phi)$ (as an oracle) and $k \in \omega$ outputs $\Phi(x)(k)$ (unless $\Phi(x)(k)$ is undefined). Relativization of this notion to some $z\in{2^\omega}$ leads to the notion of a $z$-computable function. A measure $\mu$ on ${2^\omega}$ is computable if $\mu(\sigma)$ is a computable real number, uniformly in $\sigma\in 2^{<\omega}$. Note that the Bernoulli $p$-measure $\mu_p$ (as defined in the introduction) is computable if and only if the Bernoulli parameter $p\in[0,1]$ is computable. If $\mu$ is a computable measure on ${2^\omega}$ and $\Phi\colon \subseteq {2^\omega}\to {2^\omega}$ is a Turing functional defined on a set of $\mu$-measure one, then the *pushforward measure* $\mu_\Phi$ defined by $$\mu_\Phi(\sigma)=\mu(\Phi^{-1}(\sigma))$$ for each $\sigma\in {2^{<\omega}}$ is a computable measure.
Martin-Löf randomness with respect to various measures
------------------------------------------------------
Recall that for a fixed computable measure $\mu$ on ${2^\omega}$ and $z\in {2^\omega}$, a *$\mu$-Martin-Löf test relative to $z$* (or simply a *$\mu$-test relative to $z$*) is a uniformly $\Sigma^{0,z}_{1}$ sequence $({\mathcal{U}}_{i})_{i\in\omega}$ of subsets of ${2^\omega}$ with $\mu ({\mathcal{U}}_{n}) \leq 2^{-i}$ for every $i\in\omega$. $x\in {2^\omega}$ passes such a test $({\mathcal{U}}_{i})_{i\in\omega}$ if $x\notin \bigcap_{i\in\omega} {\mathcal{U}}_{i}$ and $x$ is $\mu$-Martin-Löf random relative to $z$ if $x$ passes every $\mu$-Martin-Löf test relative to $z$. The set of all such $x$’s is denoted by ${\mathsf{MLR}}_{\mu}^{z}$. As in the introduction, we say that $x\in{2^\omega}$ is proper if $x$ is Martin-Löf random with respect to some computable measure. Lastly, for each choice of $\mu$ and $z$ as above, there is a single, *universal*, $\mu$-test relative to $z$, $({\mathcal{U}}_{i})_{i\in \omega}$ such that $x \in {\mathsf{MLR}}_{\mu}^{z}$ if and only if $x$ passes $({\mathcal{U}}_{i})_{i\in \omega}$.
For $p\in[0,1]$, a sequence $x\in{2^\omega}$ is *Bernoulli $p$-random* if it passes every $\mu_p$-Martin-Löf test relative to $p$. The collection of Bernoulli $p$-random sequences will be written as ${\mathsf{MLR}}_{\mu_p}$ (we suppress the oracle $p$). We say that $x\in{2^\omega}$ is a *Bernoulli random* if it is Bernoulli $p$-random for some $p\in[0,1]$.
In the next section, we will briefly consider Martin-Löf random members of $\mathscr{P}({2^\omega})$, which can be defined by defining the notion of a Martin-Löf test in the setting of $\mathscr{P}({2^\omega})$ (or more generally, any computable metric space, as in, for instance, [@Hoy13]), or by representing each measure by a sequence and defining a random measure to be one that has a random representing sequence (as in [@Cul15]). The former is a straightforward extension of the definition of Martin-Löf randomness for computable measures on ${2^\omega}$; as we will not formally define such tests in the sequel, we omit the details.
We conclude this section with a pair of useful results concerning the interaction between Turing functionals and Martin-Löf randomness:
\[thm-pres\] Let $\Phi\colon \subseteq {2^\omega}\to {2^\omega}$ be a Turing functional and $\mu\in\mathscr{P}({2^\omega})$ be computable with $\mu({\text{dom}}(\Phi))=1$.
- (Preservation of Randomness [@ZvoLev70]) If $x \in {\mathsf{MLR}}_{\mu}$ then $\Phi(x) \in {\mathsf{MLR}}_{\mu_\Phi}$.
- (No Randomness Ex Nihilo [@She86]) If $y \in {\mathsf{MLR}}_{\mu_\Phi}$, then there is some $x\in {\mathsf{MLR}}_{\mu}$ such that $\Phi(x)=y$.
\[thm:PoR-and-NReN\]
Random Bernoulli measures {#sec-3}
=========================
Mixtures of Bernoulli measures
------------------------------
The mixture of Bernoulli measures was first studied by De Finetti [@DeF31]. Given a measure $P$ on $\mathscr{P}({2^\omega})$, the *barycenter* of $P$ is the measure $\xi_P$ on ${2^\omega}$ defined by $$\xi_P(\mathcal{U}) = \int \mu(\mathcal{U})\, dP(\mu)$$ for all Borel ${\mathcal{U}}\subseteq{2^\omega}$. In the case that $P$ is concentrated on a set of Bernoulli measures in $\mathscr{P}({2^\omega})$, we say that the barycenter $\xi_P$ is a *mixture of Bernoulli measures*.
A measure $\xi$ is *exchangeable* if the $\xi$-probability of a string $\sigma$ being an initial segment of $x\in{2^\omega}$ is the same as the $\xi$-probability of $\sigma$ occurring as a subword at any fixed block of bits of length $|\sigma|$ in $x$. A classical result in probability theory is De Finetti’s theorem, which says that $\xi$ is exchangeable if and only if it is the mixture of Bernoulli measures. Freer and Roy [@FreRoy12] proved that in this setting $\xi$ is computable if and only if $P$ is computable. Hoyrup then generalized this result via the following theorem.
\[thm-barycenter\] If $P$ is a computable measure on $\mathscr{P}({2^\omega})$, then its barycenter measure $\xi_P$ is computable and $${\mathsf{MLR}}_{\xi_P}=\bigcup_{\mu\in{\mathsf{MLR}}_P}{\mathsf{MLR}}_\mu.$$
This result provides a useful tool for studying random Bernoulli measures. Given a computable measure $\nu$ on $[0,1]$, $\nu$ induces a measure $P_\nu$ on $\mathscr{P}({2^\omega})$ that satisfies $$\int\mu({\mathcal{U}})dP_\nu(\mu)=\int\mu_p({\mathcal{U}})d\nu(p)$$ for all Borel ${\mathcal{U}}\subseteq{2^\omega}$. If $\xi$ is the resulting barycenter of $P_\nu$, it follows from Theorem \[thm-barycenter\] that $\xi$ is the mixture of $\nu$-random Bernoulli measures:
\[cor-barycenter\] Let $\nu$ be a computable measure on $[0,1]$. Then there is a computable measure $\xi$ on ${2^\omega}$ such that $${\mathsf{MLR}}_{\xi}=\bigcup_{p\in{\mathsf{MLR}}_\nu}{\mathsf{MLR}}_{\mu_p}.$$
This result in implicit in [@Hoy13] and was shown independently by V’yugin in [@Vyu12].
Characterizing proper Bernoulli parameters
------------------------------------------
An immediate consequence of Corollary \[cor-barycenter\] is the following:
\[cor-prop\] Let $p\in[0,1]$ be proper. Then there is some computable $\xi\in\mathscr{P}({2^\omega})$ such that ${\mathsf{MLR}}_{\mu_p}\subseteq {\mathsf{MLR}}_\xi$.
We thus have the consequence that every sequence that is Bernoulli $p$-random for some proper $p$ is itself proper. This raises a natural question: If $x$ is proper and Bernoulli $p$-random for some $p\in[0,1]$, must $p$ be proper? We answer this question in the affirmative. To do so, we will draw upon facts from the proof of the following result, discussed in the introduction, which is due to Kjos-Hanssen:
\[thm-kj1\] For $p\in[0,1]$, if $x\in{\mathsf{MLR}}_{\mu_p}$, then $x\geq_T p$.
\[thm-prop\] If $x$ is proper and $x\in{\mathsf{MLR}}_{\mu_p}$ for some $p\in[0,1]$, then $p$ is proper.
Fix $p$ such that $x\in{\mathsf{MLR}}_{\mu_p}$ and suppose that $x\in{\mathsf{MLR}}_\nu$ for some computable measure $\nu$. By the proof of Theorem \[thm-kj1\] there is a blind Martin-Löf test $(\mathcal{V}_d)_{d\in\omega}$ such that (i) $(\mathcal{V}_d)_{d\in\omega}$ is a $\mu_q$-Martin-Löf test for all $q\in[0,1]$, and (ii) for each $d\in\omega$, there is a Turing functional $\Theta_d$ such that $y\notin\mathcal{V}_d$ implies that $$\Theta_d(y)=\lim_{n\rightarrow\infty}\frac{\#\{i<n\colon
y(i)=1\}}{n}.$$
Since $x\in{\mathsf{MLR}}_{\mu_p}$, there is some $d\in\omega$ such that $x\notin\mathcal{V}_d$. We define a total Turing functional $\Gamma$ in terms of the $\Pi^0_1$ class $\mathcal{P}_d:={2^\omega}\setminus\mathcal{V}_d$ as follows: For $y\in{2^\omega}$, to compute $\Gamma(y)$, we attempt to calculate $\Theta_d(y)$. If $y\in{2^\omega}\setminus\mathcal{V}_d$, then $\Theta_d(y)$ will compute the relative frequency of 1s in $y$. However, if $y\notin\mathcal{P}_d$, there will be some stage $s$ such that $y\notin\mathcal{P}_{d,s}$ where $(\mathcal{P}_{d,s})_{s\in\omega}$ is an effective sequence of clopen subsets of ${2^\omega}$ such that $\bigcap_{s\in\omega}\mathcal{P}_{d,s}=\mathcal{P}_d$. In this case, we will terminate the calculation of $\Theta_d(y)$ and $\Gamma(y)$ will switch to outputting 0s thereafter (following any initial bits that might have been calculated before the first stage $s$ at which we see $y\notin\mathcal{P}_{d,s}$). Clearly, $\Gamma$ is total.
Next, we set $\zeta=\nu\circ\Gamma^{-1}$, which is a computable measure because $\nu$ is computable and $\Gamma$ is a total Turing functional. To see that $p$ is proper, note that since $x\in\mathcal{P}_d\cap{\mathsf{MLR}}_\nu$, $\Gamma(x)=p$, and $\Phi$ is defined on a set of $\nu$-measure one (as $\Phi$ is total), it follows by the preservation of randomness (Theorem \[thm-pres\](i)) that $\Gamma(x)=p\in{\mathsf{MLR}}_\zeta$.
Combining Corollary \[cor-prop\] and Theorem \[thm-prop\], we have shown:
For $x\in{\mathsf{MLR}}_{\mu_p}$ for some $p\in[0,1]$, $x$ is proper if and only if $p$ is proper. \[thm:xpropiffpprop\]
The above result shows that any value $p$ for which there is a proper $p$-random sequence must itself be proper. Can this be shown to hold uniformly? That is, given a computable measure $\nu$ on ${2^\omega}$, can we find a *single* computable measure $\zeta$ such that $$(\forall p\in[0,1])\bigl[{\mathsf{MLR}}_\nu\cap{\mathsf{MLR}}_{\mu_p}\neq\emptyset\;\Rightarrow\; p\in{\mathsf{MLR}}_\zeta\bigr]?$$ We answer this question in the affirmative.
\[thm-uniform\] If $\nu$ is a computable measure on ${2^\omega}$, then there is a computable measure $\zeta$ on $[0,1]$ such that for every $p\in[0,1]$ such that ${\mathsf{MLR}}_\nu\cap{\mathsf{MLR}}_{\mu_p}\neq\emptyset$, we have $p\in{\mathsf{MLR}}_\zeta$.\[thm:compatibility\]
As in the proof of Theorem \[thm:xpropiffpprop\], for every $p\in[0,1]$ and every $x\in{\mathsf{MLR}}_\nu\cap{\mathsf{MLR}}_{\mu_p}$, there is some $d\in\omega$ such that $x\in \mathcal{P}_d$ and thus a corresponding measure $\zeta_d$ (defined in terms of the functional $\Theta_d$) such that $p\in{\mathsf{MLR}}_{\zeta_d}$. Moreover, the collection of measures $(\zeta_j)_{j\in\omega}$ is uniformly computable. Thus we can define the convex combination $\zeta {\mathrel{\mathop:}=}\sum 2^{-(i+1)}\zeta_{i}$, which is itself a computable measure. We claim that ${\mathsf{MLR}}_{\zeta_d}\subseteq{\mathsf{MLR}}_\zeta$. Given $q\notin{\mathsf{MLR}}_\zeta$, there is some $\zeta$-Martin-Löf test $({\mathcal{U}}_i)_{i\in\omega}$ such that $q\in\bigcap_{i\in\omega}{\mathcal{U}}_i$. Then since for each $i\in\omega$ we have $$2^{-(d+1)}\zeta_d({\mathcal{U}}_i)\leq\sum_{i\in\omega}2^{-(j+1)}\zeta_j({\mathcal{U}}_i)=\zeta({\mathcal{U}}_i)\leq 2^{-i},$$ it follows that $({\mathcal{U}}_i)_{i\geq d+1}$ is a $\zeta_d$-Martin-Löf test containing $q$. $\zeta$ is thus the desired measure.
Let us say that a sequence is *continuously proper* if it is random with respect to a continuous, computable measure, where a measure $\mu$ is continuous if $\mu(\{x\})=0$ for every $x\in{2^\omega}$. We have seen that a Bernoulli $p$-random sequence is proper if and only if $p$ is sequence. Does a similar result hold for continuously proper $p$-random sequences? One direction is straightforward:
\[prop-contprop\] Let $p\in[0,1]$. If $x\in{\mathsf{MLR}}_{\mu_p}$ is proper, then $x$ is continuously proper.
Since $x$ is $p$-random and proper, by Theorem \[thm-prop\], $p$ is random with respect to some computable measure $\eta$ on $[0,1]$. If $\xi$ is the mixture of all Bernoulli measures with parameters that are random with respect to $\eta$, then we have, for every $z\in{2^\omega}$, $$\xi(\{z\})=\lim_{n\rightarrow\infty}\xi(z{{\upharpoonright}}n)=\lim_{n\rightarrow\infty}\int\mu_p(z{{\upharpoonright}}n)d\eta(p)= \int\lim_{n\rightarrow\infty}\mu_p(z{{\upharpoonright}}n)d\eta(p)=0$$ (where the second equality follows from the dominated convergence theorem). Thus, $\xi$ is continuous and $x$ is continuously proper.
We now show that the converse of Proposition \[prop-contprop\] does not hold.
There is some proper $r\in[0,1]$ and $x\in{\mathsf{MLR}}_{\mu_r}$ such that $x$ is continuously proper but $r$ is not continuously proper.
By [@Por15 Theorem 3.2], there is a computable measure $\nu$ on $[0,1]$ with the following properties:
- $\nu$ has countable support, i.e., there is a countable collection $\mathcal{C}$ of sequences such that $\nu(\mathcal{C})=1$;
- every $y\in\mathcal{C}$ is an atom of $\nu$, i.e. $\nu(\{y\})>0$, and hence is computable (as shown by Kautz [@Kau91] every atom of a computable measure is computable); and
- there is one non-computable sequence $r$ such that ${\mathsf{MLR}}_\nu=\mathcal{C}\cup\{r\}$.
Given $x\in {\mathsf{MLR}}_{\mu_{r}}$, by Proposition \[prop-contprop\], $x$ is continuously proper. However, $r$ is not continuously proper: Suppose otherwise. Then there would be a computable, continuous measure $\zeta$ on $[0,1]$ such that $r \in {\mathsf{MLR}}_{\zeta}$. Then if $({\mathcal{U}}_i)_{i\in\omega}$ is a universal $\zeta$-Martin-Löf test, then $r\in{2^\omega}\setminus{\mathcal{U}}_i$ for some $i\in\omega$. Since ${2^\omega}\setminus{\mathcal{U}}_i$ is a $\Pi^0_1$ class consisting of sequences that are random with respect to $\zeta$, and since $\zeta$ is continuous, there is no computable sequence in ${2^\omega}\setminus{\mathcal{U}}_i$. Thus, $\nu({2^\omega}\setminus{\mathcal{U}}_i)=0$, that $r\notin{\mathsf{MLR}}_{\nu}$ (since no $\nu$-random sequence can be contained in a $\nu$-null $\Pi^0_1$ class), a contradiction.
We conclude this section with the observation that Theorem \[thm-uniform\] gives us a method for showing that certain mixtures of Bernoulli measures cannot be obtained effectively. For example:
There is no computable mixture of Bernoulli measures that includes all computable Bernoulli measures.
Suppose there is some computable measure $\xi$ such that for all computable $c\in[0,1]$, there is some $x\in{\mathsf{MLR}}_\xi\cap{\mathsf{MLR}}_{\mu_c}$. By Theorem \[thm-uniform\], there is a computable measure $\zeta$ on $[0,1]$ such that for every $p\in[0,1]$ such that ${\mathsf{MLR}}_\nu\cap{\mathsf{MLR}}_{\mu_p}\neq\emptyset$, we have $p\in{\mathsf{MLR}}_\zeta$. But then there is a computable measure $\zeta$ such that every computable sequence is random with respect to $\zeta$, which is impossible (one can always construct a computable sequence $z$ such that $\zeta(\{z\})=0$ by following the least non-ascending path of the $\zeta$-measure of members of ${2^{<\omega}}$).
The Turing Degrees of Bernoulli Random Sequences {#sec-4}
================================================
We now consider the Turing degrees of Bernoulli random sequences. Levin [@ZvoLev70] and Kautz [@Kau91] independently proved that for every pair of computable measures $\mu$ and $\nu$, there is a $\mu$-almost total functional $\Phi_{\mu\rightarrow\nu}$ such that $\Phi_{\mu\rightarrow\nu}({\mathsf{MLR}}_\mu)={\mathsf{MLR}}_\nu$. If, in addition, $\mu$ and $\nu$ are continuous and positive (i.e. $\nu(\sigma)>0$ for all $\sigma\in{2^{<\omega}}$), then $(\Phi_{\mu\rightarrow\nu})^{-1}=\Phi_{\nu\rightarrow\mu}$. In fact, these result also holds for non-computable measures, at least as long as the two functionals have access to some encoding of $\mu$ and $\nu$ as binary sequences. In our context, to convert between randomness with respect to two Bernoulli measures $\mu_p$ and $\mu_q$ only requires oracle access to the parameters $p$ and $q$. Thus we have:
\[thm-lk\] Let $p,q\in[0,1]$.
1. There is a $(p\oplus q)$-computable functional $\Phi_{p\rightarrow q}$ such that $\Phi_{p\rightarrow q}({\mathsf{MLR}}_{\mu_p}^{p\oplus q})={\mathsf{MLR}}_{\mu_q}^{p\oplus q}$.
2. $(\Phi_{p\rightarrow q})^{-1}=\Phi_{q \rightarrow p}$.
Here we will focus primarily on the conversion between Lebesgue randomness and $p$-randomness for some $p\in[0,1]$. In particular, the following is an immediate consequence of Theorem \[thm-lk\]:
\[thm-bernlk\] Let $p\in[0,1]$.
- For every $x\in{\mathsf{MLR}}_{\mu_p}$ there is some $y\in{\mathsf{MLR}}^p$ such that $x\equiv_T y\oplus p$.
- For every $y\in{\mathsf{MLR}}^p$ there is some $x\in{\mathsf{MLR}}_{\mu_p}$ such that $x\equiv_T y\oplus p$.
\(i) Let $x\in{\mathsf{MLR}}_{\mu_p}$. By Theorem \[thm-lk\](1) applied to $q=\frac{1}{2}$, $\Phi_{p\rightarrow q}$ is a $p$-computable functional such that $\Phi_{p\rightarrow q}(x)\in{\mathsf{MLR}}^p$ since $x\in{\mathsf{MLR}}_{\mu_p}^{p\oplus q}$; set $y=\Phi_{p\rightarrow q}(x)$. By Theorem \[thm-lk\](2), $\Phi_{q\rightarrow p}(y)=x$, where $\Phi_{q\rightarrow p}$ is $p$-computable. Thus, we have $x\oplus p\equiv_Ty\oplus p$. By Theorem \[thm-kj1\], since $x\in{\mathsf{MLR}}_{\mu_p}$, we have $x\geq_T p$, and thus the conclusion follows.
\(ii) The argument is nearly identical as the above, except that we first apply the functional $\Phi_{q\rightarrow p}$ to $y\in{\mathsf{MLR}}^p$ with $q=\frac{1}{2}$ and argue as above.
Comparing degrees of Bernoulli parameters
-----------------------------------------
We first consider how the Turing comparability of two Bernoulli parameters relates to the Turing comparability of the associated Bernoulli random sequences.
\[thm-berndeg1\] Every $x\in{\mathsf{MLR}}_{\mu_p}$ computes some $y\in{\mathsf{MLR}}_{\mu_q}$ if and only if $q\leq_Tp$.
($\Rightarrow$) For this direction, we will use Stillwell’s generalization of Sack’s Theorem [@Sti72]: If $\lambda(\{x\colon a\leq_T b\oplus x\})>0$, then $a\leq_T b$ (see [@DowHir10 Theorem 8.12.6]). Now suppose that each $p$-random sequence computes a $q$-random sequence. Given any $z\in{\mathsf{MLR}}^p$, by Theorem \[thm-bernlk\](ii), there is some $x\in{\mathsf{MLR}}_{\mu_p}$ such that $z\oplus p\equiv_T x$. By assumption, $x$ computes some $y\in{\mathsf{MLR}}_{\mu_q}$, which in turn computes $q$ by Theorem \[thm-kj1\]. Thus we have $z\oplus p\geq_Tq$ for every $z\in{\mathsf{MLR}}^p$. It follows that $\lambda(\{z\colon q\leq_T z\oplus p\})>0$, and hence by Stillwell’s theorem, $q\leq_Tp$.
($\Leftarrow$) Suppose that $q\leq_Tp$. Given $x\in{\mathsf{MLR}}_{\mu_p}$, by Theorem \[thm-bernlk\](i) there is some $z\in{\mathsf{MLR}}^p$ such that $z\oplus p\equiv_Tx$. Since $q\leq_Tp$, ${\mathsf{MLR}}^p\subseteq {\mathsf{MLR}}^q$ and hence $z\in{\mathsf{MLR}}^q$. Then by Theorem \[thm-bernlk\](ii), there is some $y\in{\mathsf{MLR}}_{\mu_q}$ such that $y\equiv_Tz\oplus q$, and hence we have $$y\equiv_Tz\oplus q\leq_T z\oplus p\equiv x.\qedhere$$
Clearly, if every $p$-random sequence is Turing-incomparable with every $q$-random sequence, then $p$ and $q$ are Turing-incomparable. Interestingly, the converse does not hold:
For every pair of relatively random $p,q\in[0,1]$, there are sequences $x\in{\mathsf{MLR}}_{\mu_p}$ and $y\in{\mathsf{MLR}}_{\mu_q}$ such that $x\equiv_T y$.
Let $p,q\in[0,1]$ satisfy $p\in{\mathsf{MLR}}^q$ and $q\in{\mathsf{MLR}}^p$. Since $p\in{\mathsf{MLR}}^q$, $\Phi_{\lambda\rightarrow\mu_q}(p)\in{\mathsf{MLR}}_{\mu_q}$ by Theorem \[thm-lk\]. Setting $y=\Phi_{\lambda\rightarrow\mu_q}(p)$, we have $y\equiv_{T}p\oplus q$ by Theorem \[thm-bernlk\](ii). Similarly, since $q\in{\mathsf{MLR}}^p$, $\Phi_{\lambda\rightarrow\mu_p}(q)\in{\mathsf{MLR}}_{\mu_p}$ by Theorem \[thm-lk\]. Setting $x=\Phi_{\lambda\rightarrow\mu_p}(q)$, again we have $x\equiv_{T}p\oplus q$ by Theorem \[thm-bernlk\](ii). Thus $x\equiv_Tp\oplus q\equiv_T y$.
On Turing degrees containing Bernoulli random sequences
-------------------------------------------------------
We now turn to the task of determining which Turing degrees contain a Bernoulli random sequence. First, note that every Bernoulli random sequence computes a Martin-Löf random sequence via von Neumann’s trick, which is given by the following procedure: Given a sequence $x$ as input, our procedure reads a pair of bits. If it reads the pair 01, it outputs a 0, while if it read the pair 10, it outputs a 1; if the procedure reads either 00 or 11, it moves on to the next pair of input bits with no output. One can verify that this procedure induces the Lebesgue measure, and hence, given any Bernoulli random as input, we get a Martin-Löf random sequence as the output by the preservation of randomness.
Recall that a sequence $x$ has diagonally noncomputable (DNC) degree if there is some $f\leq_T a$ such that $f(n)\neq{\varphi}_n(n)$ for every $n$ (where $({\varphi}_i)_{i\in\omega}$ is the standard enumeration of all partial computable functions). As every sequence that computes a subset of a Martin-Löf random sequence has DNC degree (which can be deduced from results in [@Kjo09] and [@GreMil11]) we can conclude:
Every Bernoulli random sequence has DNC degree.
Having DNC degree, however, does not characterize the degrees of Bernoulli random sequences.
There is a DNC degree that does not contain a Bernoulli random sequence.
As shown by Kumabe and Lewis [@KumLew09], there is a sequence $x$ of DNC degree and minimal degree (if $y\leq_T x$, then either $y$ is computable or $y\equiv_Tx$). However, no Bernoulli random sequence has minimal degree, since, as noted above, every Bernoulli random sequence computes a Martin-Löf random sequence.
Another candidate for characterizing the degrees of Bernoulli random degrees is the collection of Martin-Löf random degrees, i.e., those Turing degrees that contain a Martin-Löf random sequence. As we now show, this characterization does not hold, as there are Bernoulli random degrees that contain no Martin-Löf random sequence. Before we prove this result, we first show that for every $p\in[0,1]$, there is some Bernoulli $p$-random that has Martin-Löf random degree.
For every $p\in[0,1]$, there is some $p$-random sequence $x$ and a Martin-Löf random sequence $y$ such that $x\equiv_T y$.
For $p\in[0,1]$, consider $\Omega^p=\sum_{U^p(\sigma)\downarrow}2^{-|\sigma|}$, Chaitin’s $\Omega$ relative to the oracle $p$, where $U$ is a universal, prefix-free oracle machine. As shown by Downey, Hirschfeldt, Miller, and Nies [@DowHirMil05], $\Omega^p\in{\mathsf{MLR}}^p$ and $\Omega^p\oplus p\equiv_T p'$. By Theorem \[thm-bernlk\](ii), since $\Omega^p\in{\mathsf{MLR}}^p$, there is some $p$-random sequence $x\equiv_T \Omega_p\oplus p$. In addition, by the Kučera-Gács theorem ([@Kuc85],[@Gac86]), for every $a\geq_T\emptyset'$, there is some $y\in{\mathsf{MLR}}$ such that $y\equiv_T a$. Thus there is some $y\in{\mathsf{MLR}}$ satisfying $y\equiv_Tp'$, which yields $$x\equiv_T (\Omega^p\oplus p)\equiv_T p'\equiv_T y.\qedhere$$
Thus, there is no $p\in[0,1]$ with the property that no $p$-random sequence has Martin-Löf random degree. However, we have the following:
\[thm-berntd\] There is some $p\in[0,1]$ and some $y\in{\mathsf{MLR}}_{\mu_p}$ such that there is no $x\in{\mathsf{MLR}}$ satisfying $x\equiv_Ty$.
In the proof of Theorem \[thm-berntd\], we will make use of several results. First we have two relativizations of standard results in the theory of algorithmic randomness (the proofs of which are direct relativizations of the proofs of the original theorems). First, we have the relative version of what is sometimes referred to as the *XYZ Theorem*, originally due to Miller and Yu [@MilYu08].
For $x,y,z,p\in{2^\omega}$, if $x\in{\mathsf{MLR}}^p$ and $x\leq_Ty\oplus p$ for $y\in{\mathsf{MLR}}^{z\oplus p}$, then $x\in{\mathsf{MLR}}^{z\oplus p}$.
Next, we have the relative version of van Lambalgen’s theorem [@Van90]:
For $x,y,p\in{2^\omega}$, $x\oplus y\in{\mathsf{MLR}}^p$ if and only if $x\in{\mathsf{MLR}}^{y\oplus p}$ and $y\in{\mathsf{MLR}}^p$.
Lastly, we will draw upon a recent result involving $K$-trivial sequences. Recall that a sequence $a\in{2^\omega}$ is $K$-trivial if there is some $c\in\omega$ such that $$K(a{{\upharpoonright}}n)\leq K(n)+c$$ for all $n\in\omega$ (here $K(\sigma)=\min\{|\tau|\colon U(\tau)=\sigma\}$ is the prefix-free Kolmogorov complexity of $\sigma\in{2^{<\omega}}$, where $U$ is a universal prefix-free machine; see [@Nie09 Chapter 5] or [@DowHir10 Chapter 11] for more details). As shown by Nies [@Nie05], $a$ is $K$-trivial if and only if ${\mathsf{MLR}}^a={\mathsf{MLR}}$ (a property referred to as being *low for Martin-Löf randomness*.
To establish our result, we make use of the following result about $K$-trivial sequences due to Bienvenu, Greenberg, Kučera, Nies, and Turetsky [@BieGreKuc16]:
\[thm-ktriv\] There is a $K$-trivial sequence $p$ such that for every Martin-Löf random $x=x_0\oplus x_1$, $p\not\leq_Tx_i$ for some $i\in\{0,1\}$.
Fix a $K$-trivial $p$ as in the proof of Theorem \[thm-ktriv\]. We claim that $p$ is the desired Bernoulli parameter. Let $a\oplus b\in{\mathsf{MLR}}$. By Theorem \[thm-ktriv\], without loss of generality we can assume that $p\not\leq_Ta$. Splitting $a$ into $a_0\oplus a_1$, we have $p\not\leq_Ta_i$ for $i\in\{0,1\}$. Moreover, for each $i\in\{0,1\}$, by the relative version of van Lambalgen’s theorem and the fact that $a_0\oplus a_1\in{\mathsf{MLR}}^p$, we have $a_i\in{\mathsf{MLR}}^{a_{1-i}\oplus p}$.
Next, we apply the Levin-Kautz theorem: For each $i\in\{0,1\}$, since $a_i\in{\mathsf{MLR}}^p$, by Theorem \[thm-bernlk\](ii) there is some $y_i\in{\mathsf{MLR}}_{\mu_p}$ such that $y_i\equiv_T a_i\oplus p$. Suppose now for the sake of contradiction that for each $i\in\{0,1\}$, there is some $x_i\in{\mathsf{MLR}}$ such that $x_i\equiv_T y_i$. By the relativized version of the XYZ Theorem, since $x_i\in{\mathsf{MLR}}^p$, $x_i\leq_T a_i\oplus p$, and $a_i\in{\mathsf{MLR}}^{a_{1-i}\oplus p}$, it follows that $x_i\in{\mathsf{MLR}}^{a_{1-i}\oplus p}={\mathsf{MLR}}^{x_{1-i}}$. We can thus conclude that $x=x_0\oplus x_1\in{\mathsf{MLR}}$ by van Lambalgen’s theorem. However, since $p\leq_Ty_i\equiv_T x_i$ for $i\in\{0,1\}$, this contradicts our assumption that $P$ cannot be computed by two halves of a random sequence. Thus, either $\deg_T(y_0)$ or $\deg_T(y_1)$ is a Bernoulli random Turing degree that contains no Martin-Löf random sequence.
The proof of Theorem \[thm-berntd\] yields many Bernoulli degrees that are not Martin-Löf random degrees:
There are uncountably many Turing degrees that contain a Bernoulli random sequence and no Martin-Löf random sequence.
For every Martin-Löf random sequence $x$, if we split $x$ into $(x_0\oplus x_1)\oplus(x_2\oplus x_3)$, then at least one of $x_i\oplus p$ (where $p$ is as in the proof of Theorem \[thm-berntd\]) for $i\in\{0,1,2,3\}$ is Turing equivalent to a $p$-random sequence but not Turing equivalent to a Martin-Löf random sequence.
Note that any parameter $p$ for which there is a $p$-random sequence not Turing equivalent to a Martin-Löf random sequence must of necessity be non-proper. For given a proper sequence $p$, any $p$-random sequence is proper by Corollary \[cor-prop\] and hence is Turing equivalent to a Martin-Löf random sequence (by the Levin-Kautz theorem and randomness preservation). Characterizing precisely which parameters $p$ yield Theorem \[thm-berntd\] remains open.
For which $p\in[0,1]$ is there a Bernoulli $p$-random sequence that is not Turing equivalent to any Martin-Löf random sequence?
Blind randomness with respect to a Bernoulli measure {#sec-5}
====================================================
In addition to showing Theorem \[thm-kj1\], another contribution of [@Kjo10] is the introduction of blind randomness and its application to the study of randomness with respect to a Bernoulli measure. For a non-computable measure $\mu$ on ${2^\omega}$, a sequence of uniformly $\Sigma^0_1$ classes $({\mathcal{U}}_i)_{i\in\omega}$ is called a *blind* $\mu$-Martin-Löf test if $\mu({\mathcal{U}}_i)\leq 2^{-i}$ for every $i\in\omega$; that is, the test does not make use of the measure as an oracle, unlike the standard definition of Martin-Löf randomness with respect to non-computable measures. Moreover, we say that $x\in{2^\omega}$ is *blind $\mu$-Martin-Löf random* if $x$ passes every blind $\mu$-Martin-Löf test.
In the context of Bernoulli measures, for $p\in[0,1]$, a blind $\mu_p$-Martin-Löf random test is one that does not use the parameter $p$ as an oracle. Kjos-Hanssen proved that, for the purposes of defining Bernoulli randomness, having oracle access to the Bernoulli parameter is optional:
\[thm-kh\] For $p\in[0,1]$, $x\in{2^\omega}$ is $\mu_p$-Martin-Löf random if and only if $x$ is blind $\mu_p$-Martin-Löf random.
To date, no initial segment complexity characterization of blind randomness has been provided. In this section, we show that several reasonable approaches to characterizing blind randomness in terms of initial segment complexity fail to do so. Let us review several relevant definitions.
Recall that a *semimeasure* $\rho:{2^{<\omega}}\rightarrow[0,1]$ is a function satisfying $\rho(\emptyset)\leq 1$ and $\rho(\sigma)\geq\rho(\sigma0)+\rho(\sigma1)$ for every $\sigma\in{2^{<\omega}}$. Moreover, a semimeasure $\rho$ is *left-c.e.* if, uniformly in $\sigma$, each value $\rho(\sigma)$ is left-c.e., i.e., the limit of a computable, non-decreasing sequence of rational numbers. Levin [@ZvoLev70] proved the existence of a universal, left-c.e. semimeasure $M$: for every left-c.e. semimeasure $\rho$, there is some $c\in\omega$ such that $M\geq c\cdot\rho$. We then define the *a priori complexity* of $\sigma$ to be ${\mathit{KA}}(\sigma):=-\log M(\sigma)$. These notions are straightforwardly relativizable to any $z\in{2^\omega}$.
For $p\in[0,1]$, it is a standard result that a sequence $x\in{2^\omega}$ is Bernoulli $p$-random if and only if ${\mathit{KA}}^p(x{{\upharpoonright}}n)\geq-\log\mu_p(x{{\upharpoonright}}n)-O(1)$ (see [@MilRut18 Proposition 2.2] for a proof of the more general statement that holds for all noncomputable measures). Here we consider those sequences that satisfy $${\mathit{KA}}(x{{\upharpoonright}}n)\geq-\log\mu_p(x{{\upharpoonright}}n)-O(1),$$ where we remove the oracle $p$ and consider unrelativized a priori complexity. As we now show, this notion is not, in general, sufficient for Bernoulli $p$-randomness.
\[thm-noblind\] Let $p\in[0,1]$ satisfy $p\geq_T\emptyset'$. Then there is some $y\notin{\mathsf{MLR}}_{\mu_p}$ such that $${\mathit{KA}}(y{{\upharpoonright}}n)\geq-\log\mu_p(y{{\upharpoonright}}n)-O(1).$$
Fix $c\in\omega$ and consider the $\Pi^{0,p}_1$ class $$\mathcal{P}=\{x\in{2^\omega}\colon (\forall n)[{\mathit{KA}}(x{{\upharpoonright}}n)\geq-\log\mu_p(x{{\upharpoonright}}n)-c]\}.$$ Observe that for $T=\{\sigma\in{2^{<\omega}}\colon \colon {\mathit{KA}}(\sigma)\geq -\log\mu_p(\sigma)-c\}$, we have $T\leq_T p$; indeed, the predicate $ {\mathit{KA}}(\sigma)\geq -\log\mu_p(\sigma)-c$ is computable in $p\oplus \emptyset'\equiv_T p$. We claim that $T=\{\sigma\in{2^{<\omega}}\colon (\exists x\in{\mathcal{P}})[\sigma\prec x]\}$, the set of extendible nodes of ${\mathcal{P}}$. In particular, we show that if $\sigma\in T$, then either $\sigma0$ or $\sigma1$ is in $T$.
Suppose that for some $\sigma\in T$, $\sigma0\notin T$ and $\sigma1\notin T$. Since $\sigma\in T$, we have ${\mathit{KA}}(\sigma)\geq-\log\mu_p(\sigma)-c$, which implies that $$\label{eq1}
M(\sigma)\leq 2^c\mu_p(\sigma).$$ For $i\in\{0,1\}$, $\sigma i\notin T$ implies that ${\mathit{KA}}(\sigma i)<-\log\mu_p(\sigma i)-c$, and hence we have $$\label{eq2}
M(\sigma i)> 2^c\mu_p(\sigma i)$$ for $i\in\{0,1\}$. Combining Equations (\[eq1\]) and (\[eq2\]) and using the properties of measures and semimeasures, we have $$2^c\mu_p(\sigma)\geq M(\sigma)\geq M(\sigma 0)+M(\sigma1)>2^c(\mu_p(\sigma0)+\mu_p(\sigma1))=2^c\mu_p(\sigma),$$ which is impossible. Thus, either $\sigma0\in T$ or $\sigma1\in T$. Since every $\sigma\in T$ has an extension in $T$, every $\sigma$ extends to an infinite path through $T$. Thus the claim follows.
As $p\geq_T T=\{\sigma\in{2^{<\omega}}\colon (\exists x\in{\mathcal{P}})[\sigma\prec x]\}$, it follows that $p$ can compute the leftmost path through ${\mathcal{P}}$. That is, there is some $y\in {\mathcal{P}}$ such that (i) ${\mathit{KA}}(y{{\upharpoonright}}n)\geq-\log\mu_p(y{{\upharpoonright}}n)-c$ for all $n$ and (ii) $y\leq_Tp$, from which it follows that $y\notin{\mathsf{MLR}}_{\mu_p}$.
Note that since ${\mathit{KA}}(\sigma)\leq K(\sigma)+O(1)$ for every $\sigma\in{2^{<\omega}}$, we can also conclude that the condition that $K(x{{\upharpoonright}}n)\geq-\log\mu_p(x{{\upharpoonright}}n)-O(1)$ does not imply Bernoulli $p$-randomess.
Let $p\in[0,1]$ satisfy $p\geq_T\emptyset'$. Then there is some $y\notin{\mathsf{MLR}}_{\mu_p}$ such that $$K(y{{\upharpoonright}}n)\geq-\log\mu_p(y{{\upharpoonright}}n)-O(1).$$
A third attempt at characterizing blind $p$-randomness can be given in terms of supermartingales. Recall that, for a computable measure $\mu$ on ${2^\omega}$, a $\mu$-martingale is a computable function $M:{2^{<\omega}}\rightarrow\mathbb{R}^{\geq 0}$ that satisfies $$M(\sigma)=\dfrac{\mu(\sigma0)}{\mu(\sigma)}M(\sigma0)+\dfrac{\mu(\sigma1)}{\mu(\sigma)}M(\sigma1)$$ for every $\sigma\in{2^{<\omega}}$. It is not hard to show that for every computable $\mu$-martingale $M$, there is some computable measure $\nu$ such that $M=\frac{\nu}{\mu}$.
Similarly, a c.e. $\mu$-supermartingale is a left-c.e. function $M:{2^{<\omega}}\rightarrow\mathbb{R}^{\geq 0}$ that satisfies $$M(\sigma)\geq\dfrac{\mu(\sigma0)}{\mu(\sigma)}M(\sigma0)+\dfrac{\mu(\sigma1)}{\mu(\sigma)}M(\sigma1)$$ for every $\sigma\in{2^{<\omega}}$. As with the case of computable $\mu$-martingales, one can show that for every c.e. $\mu$-supermartingale $M$, there is some left-c.e. semimeasure $\delta$ such that $M=\frac{\delta}{\mu}$.
Lastly, a $\mu$-martingale $M$ *succeeds* on a sequence $x$ if $\limsup_{n\in\omega} M(x{{\upharpoonright}}n)=\infty$; one can define success for a supermartingale in the same way.
In [@KjoTavTha14], Kjos-Hanssen, Taveneaux, and Thapen studied blind $\mu_p$-martingales for $p\in[0,1]$ with the aim of study a blind analogue of computable randomness with respect to the measure $\mu_p$. Although they did not phrase their definition in this way, one can straightforwardly show that, for each $p\in[0,1]$, a blind $p$-martingale as defined in [@KjoTavTha14] has the form $M=\frac{\nu}{\mu_p}$, where $\nu$ is a computable measure (and not a $p$-computable measure). Similarly, we can define a blind $p$-supermartingale to be any function of the form $M=\frac{\delta}{\mu_p}$, where $\delta$ is a left-c.e. semimeasure.
Kjos-Hanssen, Taveneaux, and Thapen showed that there is some for every Martin-Löf random $p\in[0,1]$, there is a $p$-computable sequence $x$ such that no blind $p$-martingale succeeds on $x$ . We show a similar but less general result:
Let $p\in[0,1]$ satisfy $p\geq_T\emptyset'$. Then there is some $y\notin{\mathsf{MLR}}_{\mu_p}$ such that no blind $p$-supermartingale succeeds on $y$.
Let $y$ be as in the proof of Theorem \[thm-noblind\]. Suppose there is a blind $p$-supermartingale $M$ that succeeds on $y$. That is, for every $d\in\omega$, there is some $n\in\omega$ such that $M(y{{\upharpoonright}}n)>2^d$. Since $M=\frac{\delta}{\mu_p}$ for some left-c.e. semimeasure $\delta$, we have that for every $c\in\omega$, there is some $n\in\omega$ such that $$\frac{\delta(y{{\upharpoonright}}n)}{\mu_p(y{{\upharpoonright}}n)}>2^d.$$ Applying the negative logarithm to both sides yields $$\label{eq3}
-\log\delta(y{{\upharpoonright}}n)<-\log\mu_p(y{{\upharpoonright}}n)-d.$$ By the optimality of the universal left-c.e. semimeasure, there is some $e\in\omega$ such that $2^e\cdot M\geq \delta$, or equivalently, $-\log M(\sigma)\leq -\log \delta(\sigma) + e$. Combining this with Equation (\[eq3\]) yields $$-\log M(y{{\upharpoonright}}n)<-\log\mu_p(y{{\upharpoonright}}n)-(d-e).$$ Thus, for every sufficiently large $c\in\omega$, there is some $n\in\omega$ such that $${\mathit{KA}}(y{{\upharpoonright}}n)<-\log\mu_p(y{{\upharpoonright}}n)-c,$$ which contradicts Theorem \[thm-noblind\]
Note that the choice of $p$ in Theorem \[thm-noblind\] requires that $p\geq_T\emptyset'$. We do not know whether we can drop this assumption.
For each noncomputable $p\in[0,1]$, is there some $y\notin{\mathsf{MLR}}_{\mu_p}$ such that $${\mathit{KA}}(y{{\upharpoonright}}n)\geq-\log\mu_p(y{{\upharpoonright}}n)-O(1)?$$
Acknowledgement {#acknowledgement .unnumbered}
===============
Many thanks to Quinn Culver for extremely helpful conversations during the early phases of this project.
|
Shaq Isn't the Godfather, He's Hyman Roth
Shaq gave us one of sports’ greatest quotes when he compared himself to Vito Corleone, Penny Hardaway to Fredo, Kobe Bryant to Sonny, and Dwyane Wade to Michael.
Upon closer examination, Shaq is not comparable to Vito. He is Hyman Roth.
“Your father did business with Hyman Roth, your father respected Hyman Roth, but he never trusted Hyman Roth.”
Is there a better quote to describe how Kobe, Wade, or Phil Jackson thought about Shaq? Or Steve Nash? Ask him if he trusts Shaq after he stole his reality tv idea.
But the parallels run much deeper than trust. Both men formed their identities in similar ways. Shaq named himself after his favorite superhero, the Man of Steel. Roth named himself after his favorite mob hero, Arnold Rothstein, the man alleged to have fixed the World Series.
Is it a coincidence that Roth’s underlings, Johnny Ola and Fredo, go see a performer named Superman?
Both Shaq and Roth have huge divides between their public and private personas.
Shaq has worked hard to get the public to think of him as the jovial, goofy star who jokes with reporters, dances at All-Star games, and stars in Aaron Carter videos.
In reality, Shaq is a hateful, mean man, who without his fun-loving persona would be Albert Belle.
Ask Larry Johnson what happens when you call your opponents the Sacramento "Queens." Well, nobody liked LJ like they do Shaq, and Shaq never averaged 2.7 yards per carry. Or ask Gasol what happens when you say “tell Yao Ming, ching chong yang.” No one seemed to care when he took shots at Chris Quinn and Ricky Davis.
Who else in sports does something like that? And don’t forget Kobe’s remark that he wasn’t the only Laker unfaithful but unlike others he did not pay his "companions" large sums to stay quiet.
Likewise, Hyman Roth maintains the image of a quiet old man. “I am a retired investor on a pension, and I wished to live here as a Jew in the twilight of my life.” Only this pensioner was running a syndicate bigger than U.S. Steel. He pretended to be an uncle to Michael, while using his brother to try to kill him.
Roth and Shaq both seem like they are never going to go away. “Hyman Roth has been dying of the same heart attack for the last 20 years,” quips Michael. Likewise, Shaq has looked rejuvenated since leaving Miami and put up 18 points a game last year.
In the mob where everyone dies or goes to jail, Roth survived for a long time for one reason, according to Johnny Ola.
“Hyman Roth makes money for his partners. One by one, all our old friends are gone…Hyman Roth is the only one left, because he always made money for his partners.”
Shaq has survived being a jerk, and leaving four teams on bad terms by making money for his partners. But Roth does not live forever due to his betrayal of the Corleones and the fall of Batista.
A time will come where Shaq will not make anyone money and his true colors will be more apparent.
When Roth cannot stay in the U.S., he tries to seek asylum in Israel. I would not be the first to suggest Shaq would consider playing for Maccabi in 2012. But even that team might not want the baggage. |
First Storm Shadow missile succesfully released from a Eurofighter Typhoon airplane
Hallbergmoos, Germany - The trials also verified the interface of the missile with the weapon system for pre-launch checks
A Eurofighter Typhoon Instrumented Production Aircraft (IPA) has successfully completed a release of the MBDA Storm Shadow, conventionally armed, stealthy, long-range stand-off precision missile.
This continues the series of trials that Eurofighter Partner Company, Alenia Aermacchi, is leading to demonstrate the full integration of the Storm Shadow missile with Typhoon's weapon system. With support... |
As funny money season begins, here‘s a peek into how the Patriots build their team, with the Dwayne Allen trade the latest example. Plus items on Kenny Stills staying in Miami, the Brandon Marshall-Giants deal and more
Let’s start with a story, the kind best shared at a dimly lit Indianapolis steakhouse during the combine, as an example of why a certain NFL dynasty has thrived for more than a decade.
Today at 4 p.m. ET is the official start of NFL free agency, though legal tampering has gone on for two days, and illegal tampering for even longer. And every year, that brings another round of cautionary tales, desperate teams shelling out jaw-dropping money and holding triumphant press conferences for new acquisitions that in many cases turn out to be fool’s gold. Among those primed for a big payday this year: QB Mike Glennon, a sub-60 percent passer as a starter; CB A.J. Bouye, who a mere five months ago was the fourth cornerback on the Texans defense; and WR Alshon Jeffery, a sub-1,000 yard receiver each of the past two seasons.
Standing in stark contrast to much of the league is the Patriots, who approach free agency like no other team in the NFL. Here’s a story that illuminates how they do business.
During one recent offseason, a veteran player came to Foxborough for a free-agent visit. He wasn’t a big name, but the Patriots had identified him as a guy who could earn a starting role at a position of need, and also contribute on special teams. As his agent and director of player personnel Nick Caserio closed in on terms for a multi-year deal, the player got fitted for a helmet, picked out a locker—all the things you do when you’re about to settle in with your new team. The numbers were done before dinnertime, and all that was left to do was type up the contract.
The Patriots reportedly sent a fourth-round pick to the Colts for tight end Dwayne Allen and a sixth-rounder in return. Zach Bolinger/Icon Sportswire/Corbis via Getty Images
Then, Bill Belichick called, not from New England, but rather, a warm beachside destination with some bad news. “I can’t do this deal,” he said to the agent. What? Why? Belichick couldn’t sign off on the terms the agent and Caserio had discussed. Of issue, Belichick explained, was the final year of the deal. Based on what the player’s age would be in that last year, and the position he plays, Belichick expected that he would be declining out of a starting role by that point. Plus, he figured they’d have drafted a replacement who’d be ready to replace the veteran player by then. By that logic, the salary figure in the final year of was simply too high to work for the Patriots.
The player could head home and go back on the open market, Belichick suggested. The other option was to re-open negotiations, and carve out a seven-figure chunk of money out of the back end of the deal. And that’s exactly what happened. The player signed for the reduced terms, and guess what? He started exactly the number of years Belichick guessed he would, and no more.
This, in a nutshell, is how the Patriots approach free agency: They think about what their 53-man roster will look like two or three years in advance. They don’t clutter up their roster with wasteful spending, and they let the market come to them. Wednesday’s trade for Dwayne Allen is a perfect example. Expecting that the price tag on Martellus Bennett will be too rich for their tastes, the Patriots find a bargain replacement before he officially leaves.
• A NORMAL HUMAN BEING WHO JUST LIKES TO SMILE: Tim Rohan profiles Martellus Bennett, one of the NFL’s most provocative players
There’s an easy answer to the obvious question, Why don’t more teams operate this way? No one else has a coach with the unparalleled job security of Belichick, or a quarterback who is the greatest of all time but yet willing to earn below market value like Tom Brady. They have the equity to take risks, and their five Super Bowl rings afford them the unique ability to offer players below market value, knowing that the chance to compete for a title is priceless. (My colleague Robert Klemko expertly detailed this in January.)
But as we enter funny money season, a peek into how the Patriots approach this portion of the NFL calendar serves as a reminder of why discipline in free agency matters toward team success. Sure, there are examples of teams reaping the benefits of free agency—the Broncos’ Super Bowl 50 team, or the Giants’ defense last year. But more often than not, we see franchises doomed by looking to buy a shortcut to success, or a big-splash signing that will excite the fan base.
Jason Licht, Tampa Bay’s general manager, was schooled in the Patriots’ business principles in one season as their assistant director of player personnel and three seasons as their director of player personnel. But when he struck out on his own as a general manager, inheriting a Bucs team that had gone 4-12 the year before, Licht fell into the trap of going on a spending spree. He doled out close to $145 million in the 2014 free agency, including $55 million in guaranteed money. The Bucs went 2-14 that season and cut three of their biggest signings—DE Michael Johnson, LT Anthony Collins and QB Josh McCown—just one year later.
“I made some mistakes my first year,” Licht says. “The difference in a player that’s making ‘X’ amount of dollars (higher) to making this much (lower), what’s the difference in his talent level? The Patriots do a great job of saying, The difference in money doesn’t make sense to pay for this difference in talent.”
Licht has since pledged to the mantra he learned from his years in New England: It’s about the right 53, not the best 53. Building a roster is about putting the right puzzle pieces together. Look at the Patriots’ 2017 free-agent class. They traded away two players they knew they were not going to keep, Chandler Jones and Jamie Collins, before their contracts expired. For their players hitting the market this week, the Patriots’ standard operating procedure is right of first refusal: Go out and see what you can fetch, and let us know.
If they lose running back LeGarrette Blount, they’ll find another goal-line back in their price range. Same with CB Logan Ryan. A guy like Dont’a Hightower, whose forced fumble was one of the key plays in Super Bowl 51, might be the type of cornerstone player they work to keep against the open market, as happened with Devin McCourty two years ago. But let’s say Hightower commands far beyond their budget for an inside linebacker. The Patriots may very well be content in re-signing Alan Branch, the 32-year-old defensive tackle who will have a much smaller market, and counting on his presence up front to make the linebackers’ jobs easier behind him.
When the Patriots bring in pieces from the outside to supplement their roster, they do so with a specific role in mind. Two months after losing the AFC Championship Game to Denver, for example, they spent $12 million on Darrelle Revis, a cornerback who could cover Demaryius Thomas. Last offseason, they offered Chris Long a one-year, $3 million contract to be a situational player on their defensive line. Both players won a championship, and left. A big part of success is identifying the kind of players that fit their scheme, and counting on their coaching and structure to help the player pick it up quickly and contribute right away. A great example: Replacing Collins with a midseason trade for Kyle Van Noy.
Agents who have negotiated with the team point to the fact that the Patriots have one voice, Belichick. Unlike many other teams across the league, they acquire and release players without competing agendas inside the building (or clutter left over from past regimes). Another key to their system working is that Caserio, Belichick’s personnel deputy, is basically embedded with the coaching staff. Caserio is on the practice field, and during games, offensive coordinator Josh McDaniels counts him among the three “coaches” he communicates with up in the booth. They talk between plays, and between series. Says McDaniels, “There are not many guys who have his role who are that clued into the actual coaching of the game and the utilization of all the personnel. … He knows exactly what we are looking for.”
The Patriots’ sustained success may allow them to do business in this way; but you could also say that doing business this way is also what allows them to have this sustained success. Keep that in mind as the market floods open today.
“To get to that point, you have to have a pretty good team, a pretty good foundation to get to where they are at,” Licht says. “But you can’t buy a championship, you just can’t.”
• 10 THOUGHTS ABOUT FREE AGENCY: Andy Benoit on the best fit for Adrian Peterson, the ‘Holy Crap’ deal on the horizon and more
* * *
FIRST AND 10
Competitors in the past, Odell Beckham and Brandon Marshall now will be teammates in 2017. Al Pereira/Getty Images
1. Bill O’Brien has had a winning record for three straight years, and made the playoffs two straight years, with questionable quarterback play. I want to see what he could do with Tony Romo.
2. Signing Brandon Marshallto a two-year deal makes on-field football sense for the Giants, who needed another outside threat opposite Odell Beckham Jr., and particularly a red-zone target. However, let’s not ignore the fact that there’s at least some risk for the Giants in putting two strong personalities—and two guys who are used to being the No. 1 receiver—in the same position meeting room.
3. Joe Mixon ran a 4.43 40-yard dash at Oklahoma’s pro day on Wednesday, which further supports what many teams believe: Talent-wise, he’s a first-rounder, behind only Leonard Fournette in this year’s RB class. What round teams are actually comfortable drafting Mixon, of course, depends on their evaluation of what led to him punching a female student and fracturing four bones in her face in 2014, and what actions he’s taken since to correct his behavior.
• THE PUNCH, AND WHAT JOE MIXON SAYS HE LEARNED: Albert Breer talks to the Oklahoma RB about what he’s telling NFL teams about his violent incident
4. The Bills keeping Tyrod Taylor is a big win for the new coaching staff—both in their ability to win this year, and the power balance in their arranged marriage with GM Doug Whaley.
5. The combine was pushed back a week this year, butting up right against free agency. Expect it to stay that way for this reason—it gives the NFL one big event per month as the offseason begins. Super Bowl in Feburary. Combine in March. Draft in April.
6. John Ross’ 40-yard dash was impressive to teams not only for its time, a combine record 4.22 seconds, but also how he handled it afterward. He came across as a humble kid who wasn’t showboating.
7. On the other hand, here’s something that may raise some eyebrows: Ross told NFL Network he pulled out of the rest of his on-field workout because he was cramping up at the end of his first 40-yard dash. That’s a short distance to elicit muscle cramps. There may be nothing to it, but teams look into everything.
8. Heard this often in Indy: This is a far better year to go into the draft needing help on defense, than needing help on offense.
9. Good tidbit, and reminder of why questions swirl about this year’s quarterbacks class, from NFL Network’s Kim Jones: The last time Mitchell Trubisky played under center in a game was sixth grade. Wow.
10. Last week in MMQB, Peter King described how the miss rate for OL drafted in the top half of the first round is higher than for QBs. Here’s a smart take from longtime Chargers center Nick Hardwick on why teams might be looking for the wrong thing.
• A LOVE/HATE RELATIONSHIP WITH FREE AGENCY: Peter King on A.J. Bouye, Mike Glennon and the dichotomy of the open market
* * *
FOUR-DOWN TERRITORY
Kenny Stills started every game for the Dolphins in 2016 and scored a career-high nine touchdowns. Mike Ehrman/Getty Images
1. I’m sticking to the theory that even Bill Belichick can be bought. The Browns just have to see what the price is for Jimmy Garoppolo. Mike Garafolo of NFL Network reported it’s in the neighborhood of a first-round pick both this year and next, a veritably hefty tag. But the Browns have a lot of extra draft capital to make a compelling offer. This year, they have both the No. 1 and No. 12 picks, an extra second-rounder and four compensatory picks, including a third-rounder; they also have an extra second-round pick in 2018. That’s enough to take Myles Garrett at No. 1, and offer, say, the No. 12 pick plus a Day 2 pick, either this year or next. I have no idea if that would pass muster for either side. But the Browns need to make a move, and they don’t have a lot of options. It’s not rocket science to expect that they’ll try to address the QB position through multiple avenues this offseason, both a veteran and one, or maybe even two, draft picks. With Tyrod Taylor working out a restructured contract to stay with the Bills, and A.J. McCarron not going to be dealt within the division, options are drying up. The Browns went through hell last season doing a total roster teardown. Now it’s time to put the next phase of the plan to work and pony up for the quarterback they really want.
2. This is how much of a surprise it is that the Dolphins were able to re-sign WR Kenny Stills: They were preparing to lose him in free agency as far back as last year’s draft. (Stills re-signed Wednesday to a reported four-year, $32 million deal.) Remember when the Dolphins spent a lot of draft capital—a sixth-rounder, and their 2017 third- and fourth-rounders—to trade up for Rutgers’ Leonte Carroo? They did it with two things in mind: 1) They knew they’d get some compensatory picks back in 2017, which they did, including a third-rounder; and 2) Stills hitting free agency this year. Being able to keep Stills is a big win for head coach Adam Gase, but the fact that they had also executed a contingency plan is nearly as impressive. It’s a case of the Dolphins showing the same kind of foresight we talked about above with the Patriots.
3. Here’s one theory on why Deshaun Watson’s combine performance was so good. One attribute teams love about the Clemson QB, and defending national champion, is that he thrives on competition. Well, the on-field drills at the combine are completed in alphabetical order. The quarterbacks do each event, including the passing drills, one at a time, according to last name. QB No. 14 was Mitchell Trubisky. QB No. 15? Watson. So as the quarterbacks were asked to throw the route tree, Watson was standing in line right behind Trubisky, watching him make each throw, waiting for his turn. Trubisky, by most evaluators’ accounts, had a good day. You think Watson wanted to be shown up? No chance. We know what happened next: Watson turned in the best day of any of the quarterbacks, just another example of him rising to the occasion.
4. The question-asking quarterback. Earlier this week, I wrote about the three retired quarterbacks—Mark Brunell, Chad Pennington and Ryan Leaf—who were working at the combine for the NFL as mentors to the incoming class of players. Those guys gain as much insight into the current class of QBs in four days in Indy as anyone else. This didn’t make it into the story, but Brunell described a quarterback last year who didn’t have first-round hype but stood out from the crowd. He asked a lot of questions, got along with everybody and didn’t get overwhelmed by the big stage. His name was Dak Prescott.
Sure, hindsight might be 20/20, but it goes to show that the way players carry themselves in situations like the combine—high pressure and out of their comfort zone—can sometimes be a tell. With that in mind, I asked Brunell how much teams try to mine him for information. “This is the first year that I have been asked to do a little recon on some guys,” Brunell said. “Teams I have played with and worked for before will say, tell me about that Kizer kid. What do you think of Trubisky? One coach asked, try to spend a little more time with this kid and tell me what you think. I wasn’t exactly comfortable, because I am not here to scout or give out information. I just said, ‘Oh yeah, he’s a good kid.’ I would only say anything positive about him, because it is just not why I am here. But I have definitely been asked.”
• THE POST-COMBINE MOCK DRAFT: Emily Kaplan predicts how Nos. 1 to 32 will go, including how many quarterbacks will be selected in round one
* * *
OFFSEASON LESSON TO LEAVE WITH YOU
DeMarco Murray’s rough ride in Philly is a good cautionary tale for those who put too much stock in free agency signings. Rich Schultz/Getty Images
To further sober your zest for free agency, I present to you a look back at the 2015 free-agent class. The biggest spender that year was the Jets, who committed $168 million to five signings. They have since released two of the five players, Darrelle Revis and Antonio Cromartie, who inked the largest deals. They missed the playoffs in 2015 and 2016 and are now embarking on a total rebuild.
I logged the 20 biggest free-agent contracts handed out that year, based on total value and counting only players who moved from one team to another, and how they’ve fared since. Of these 20 splash signings, nine players are no longer with the teams that signed them (including the Julius Thomas trade that will become official in the new league year) and just five Pro Bowl nods were produced over the past two seasons. In short: Buyer beware.
Player Deal Note MIA DT Ndamukong Suh 6 yr, $114M Started 32 games, ’16 Pro Bowl NYJ CB Darrelle Revis 5 yr, $70M Cut ‘17 PHI CB Byron Maxwell 6 yr, $63M Traded ‘16 KC WR Jeremy Maclin 5 yr, $55M 1,624 yds, 10 TD in 27 games JAX TE Julius Thomas 5 yr, $46M Trade ’17 (pending new league year) OAK C Rodney Hudson 5 yr, $44.5M Started 29 games, ’16 Pro Bowl JAX DL Jared Odrick 5 yr, $42.5M Cut ‘17 ARI G Mike Iupati 5 yr, $40M Started 28 games, ’15 Pro Bowl PHI RB DeMarco Murray 5 yr, $40M Traded ‘16 SF WR Torrey Smith 5 yr, $40M Cut ‘17 CHI OLB Pernell McPhee 5 yr, $38.75M Played 23 games, started 12 BUF TE Charles Clay 5 yr, $38M 1,080 yds, 7 TDs in 28 games LAC G Orlando Franklin 5 yr, $36.5M Started 26 games WAS CB Chris Culliver 4 yr, $32M Cut ‘16 NYJ CB Antonio Cromartie 4 yr, $32M Cut ‘16 JAX RT Jermey Parnell 5 yr, $32M Started 31 games TEN OLB Brian Orakpo 4 yr, $31M Started 32 games, ’16 Pro Bowl OAK DT Dan Williams 4 yr, $25M Played 32 games NYJ CB Buster Skrine 4 yr, $25M Played 30 games, started 22 JAX S Davon House 4 yr, $24.5M Cut ‘17
• Question or comment? Email us at talkback@themmqb.com |
The quality control and stability testing of homeopathic preparations.
Homeopathic medicines are known and have been used traditionally in Europe for many centuries. The preparation of the medicines is based on the medicines is based on the experiments of individual homeopathists instead of industry scale. Moreover, limited literature is available and the analytical methods used for the analysis of homeopathic raw materials are not by means of high tech analyses. In order to achieve high quality homeopathic products, our laboratory has developed, as well as, improved the analytical techniques for the homeopathic raw materials using TLC, HPLC and titration methods. Examples being: a) TLC method for Ambra grisea (1) b) HPLC method for Harpagophytum procumbens O = D1 (2) c) Titration method for Ostrea edulis D1 (3) The stability test of homeopathic products is based on its chemical, physical and microbiological stability. Results of these assays will be presented. |
/*!
{
"name": "Navigation Timing API",
"property": "performance",
"caniuse": "nav-timing",
"tags": ["performance"],
"authors": ["Scott Murphy (@uxder)"],
"notes": [{
"name": "W3C Spec",
"href": "https://www.w3.org/TR/navigation-timing/"
},{
"name": "HTML5 Rocks article",
"href": "http://www.html5rocks.com/en/tutorials/webperformance/basics/"
}],
"polyfills": ["perfnow"]
}
!*/
/* DOC
Detects support for the Navigation Timing API, for measuring browser and connection performance.
*/
define(['Modernizr', 'prefixed'], function(Modernizr, prefixed) {
Modernizr.addTest('performance', !!prefixed('performance', window));
});
|
Filed
Washington State
Court of Appeals
Division Two
February 26, 2019
IN THE COURT OF APPEALS OF THE STATE OF WASHINGTON
DIVISION II
DEREK GRONQUIST, No. 49392-6-II
Appellant,
RICHARD KING and RICHARD JACKSON,
individually and representing a class of
similarly situated individuals,
Plaintiffs
v.
DEPARTMENT OF CORRECTIONS OF THE UNPUBLISHED OPINION
STATE OF WASHINGTON and KING
COUNTY PROSECUTOR DANIEL
SATTERBURG,
Respondents.
CHASE RIVELAND and JANET BARBOUR,
in their official capacities; the
INDETERMINATE SENTENCING REVIEW
BOARD; and KEN EIKENBERRY, in his
official capacity as Attorney General of the
State of Washington,
Defendants.
MELNICK, J. — Derek Gronquist was convicted in 1988 of two felony sex offenses. He
entered the Sexual Offender Treatment Program (SOTP).
In 1993 a permanent injunction issued precluding the release of SOTP records, including
Gronquist’s. Before a court vacated the injunction in January 2016, Gronquist moved for a finding
of contempt against the Department of Corrections (DOC) and the King County Prosecutor (KCP).
49392-6-II
He alleged they violated the injunction. After vacating the injunction, the trial court denied
Gronquist’s contempt motion on mootness grounds.
Because the trial court could have awarded Gronquist compensation for any losses, costs,
and attorney fees associated with DOC’s and KCP’s contemptuous acts, the trial court erred. We
reverse.
FACTS
In 1991, some convicted sex offenders who had participated in the SOTP brought a class
action lawsuit against DOC to enjoin the release of their SOTP files. See King v. Riveland, 125
Wn.2d 500, 502-04, 886 P.2d 160 (1994). The SOTP files included extensive information about
the individual’s psychological evaluations, treatment progress, answers to tests, DOC evaluation
results, staff notes on therapy sessions, relapse prevention plans, and other documents. King, 125
Wn.2d at 503. The case resulted in a permanent injunction (King injunction) prohibiting DOC
from releasing any documents from any class member’s SOTP file.
After being convicted of two sex offenses in 1988, Gronquist entered the SOTP program.
Although not a named party in King, Gronquist fell within the class of persons protected by the
King injunction.
II. CURRENT LITIGATION
In July 2015, Gronquist intervened in the 1991 case that resulted in the King injunction.
He alleged that DOC violated the King injunction by sharing his SOTP file with KCP. Gronquist
filed a motion for an order to show cause why DOC and KCP should not be held in contempt. 1
1
KCP was not a party to the litigation at this time. After Gronquist filed his motion, KCP
intervened as a defendant in the case.
2
49392-6-II
Gronquist alleged that DOC had forwarded KCP his entire SOTP file in February 2013 when KCP
planned to initiate civil commitment proceedings against Gronquist.2
KCP moved to vacate or modify the King injunction as to Gronquist because of law changes
since the Supreme Court had upheld the injunction in 1995. DOC joined this motion.
On January 14, 2016, the trial court entered a written order vacating the injunction as to
Gronquist. The court noted that the law had “changed significantly since this injunction was
entered” and that changes to SVP statutes “unequivocally require[] disclosure to the prosecuting
attorney of all records, including complete SOTP files, in connection with Sexually Violent
Predator proceedings.” Clerk’s Papers (CP) at 594 (citing RCW 71.09.025). The court concluded
that the vacation of the injunction as to Gronquist, would “not directly affect the current contempt
action.” CP at 595. It clarified that its decision was “prospective only, and [did] not resolve
allegations of contempt in the past.” CP at 595.
After the injunction had been vacated and this court declined review, DOC provided KCP
with Gronquist’s complete SOTP file.
DOC and KCP argued that Gronquist’s motion for contempt was moot because DOC was
no longer prohibited from releasing the SOTP file. They claimed that, because the purpose of civil
contempt was to coerce parties to obey court orders, no remaining remedy existed because KCP
2
Whether DOC and KCP violated the King injunction is an issue the trial court will need to resolve
on remand. It did not reach this issue because it dismissed Gronquist’s contempt motion as moot.
3
49392-6-II
now lawfully possessed the SOTP file. They argued that any remedy would be punitive, which
would require criminal contempt charges and new proceedings initiated by a prosecutor. The trial
court agreed and denied Gronquist’s motion for contempt as moot. Gronquist appeals.3
ANALYSIS
I. STANDARDS OF REVIEW
We review a trial court’s decision on a contempt of court motion for abuse of discretion.
Weiss v. Lonnquist, 173 Wn. App. 344, 363, 293 P.3d 1264 (2013). However, “[a] court’s
authority to impose sanctions for contempt is a question of law, which we review de novo.” In re
Interest of Silva, 166 Wn.2d 133, 140, 206 P.3d 1240 (2009). Mootness is also a question of law
reviewed de novo. Robbins v. Legacy Health Sys., Inc., 177 Wn. App. 299, 308, 311 P.3d 96
(2013).
This case involves the denial of a motion for civil contempt based on mootness. It involves
the court’s authority to provide effective relief to Gronquist based on DOC’s and KCP’s alleged
contempt. The court’s authority to impose sanctions is a legal question that we review de novo.
II. LEGAL PRINCIPLES
Contempt of court includes the “[d]isobedience of any lawful judgment, decree, order, or
process of the court.” RCW 7.21.010(1)(b).
Whenever it shall appear to any court granting a restraining order or an order of
injunction . . . that any person has willfully disobeyed the order after notice thereof,
such court shall award an attachment for contempt against the party charged, or an
order to show cause why it should not issue.
RCW 7.40.150.
3
Gronquist filed a notice of appeal in which he sought review of four trial court orders. A
commissioner of this court subsequently dismissed Gronquist’s appeal as to one of those orders
and Gronquist has not briefed issues relating to two others. Therefore, we address only Gronquist’s
appeal of the order denying his contempt motion on mootness grounds.
4
49392-6-II
Contempt is “‘neither wholly civil nor altogether criminal,’” such that “a defendant may
be ‘punished’ even in a civil contempt proceeding if the purpose is to compensate the
complainant.” In re Rapid Settlements, Ltd., 189 Wn. App. 584, 608, 359 P.3d 823 (2015) (quoting
Gompers v. Buck’s Stove & Range Co., 221 U.S. 418, 441, 31 S. Ct. 492, 55 L. Ed. 797 (1911)).
There are differences between civil and criminal contempt.
“It is not the fact of punishment but rather its character and purpose that often serve
to distinguish between the two classes of cases. If it is for civil contempt the
punishment is remedial, and for the benefit of the complainant. But if it is for
criminal contempt the sentence is punitive, to vindicate the authority of the court.
It is true that punishment by imprisonment may be remedial, as well as punitive,
and many civil contempt proceedings have resulted not only in the imposition of a
fine, payable to the complainant, but also in committing the defendant to prison.”
Rapid Settlements, 189 Wn. App. at 608 (quoting Gompers, 221 U.S. at 441-42). Because the
current case concerns civil contempt, Gronquist must show that the trial court had some remedial
sanction available.
A remedial sanction is “a sanction imposed for the purpose of coercing performance when
the contempt consists of the omission or refusal to perform an act that is yet in the person’s power
to perform.” RCW 7.21.010(3). Remedial sanctions are “sometimes referred to as coercive”
because their goal “is to coerce a party to comply with a court order.” State v. Sims, 1 Wn. App.
2d 472, 479, 406 P.3d 649 (2017), review granted, 190 Wn.2d 1012 (2018). “A remedial sanction
must contain a purge clause or it loses its coercive character and becomes punitive.” Sims, 1 Wn.
App. 2d at 479.
RCW 7.21.030(2) provides that a court may find a person in contempt and impose a
remedial sanction only upon a “person [who] has failed or refused to perform an act that is yet
within the person’s power to perform.” However, “a court may find a person in contempt whether
or not it is possible to coerce future compliance.” Rapid Settlements, 189 Wn. App. at 601. In
5
49392-6-II
such a case, the court may “order a contemnor to pay losses suffered as a result of the contempt
and costs incurred in the contempt proceedings for any ‘person found in contempt of court’ without
regard to whether it is possible to craft a coercive sanction.” Rapid Settlements, 189 Wn. App. at
601 (quoting RCW 7.21.030(3)).
Remedial sanctions for contempt of court include:
(a) Imprisonment . . . so long as it serves a coercive purpose.
(b) A forfeiture not to exceed two thousand dollars for each day the contempt of
court continues.
(c) An order designed to ensure compliance with a prior order of the court.
(d) Any other remedial sanction other than the sanctions specified in (a) through (c)
of this subsection if the court expressly finds that those sanctions would be
ineffectual to terminate a continuing contempt of court.
RCW 7.21.030(2). The court may also, in addition to the “remedial sanctions” listed above, “order
a person found in contempt of court to pay a party for any losses suffered by the party as a result
of the contempt and any costs incurred in connection with the contempt proceeding, including
reasonable attorney’s fees.” RCW 7.21.030(3).
“To determine whether sanctions are punitive or remedial, the courts look not to the ‘stated
purposes of a contempt sanction,’ but whether it has a coercive effect—whether ‘the contemnor is
able to purge the contempt and obtain his release by committing an affirmative act.’” Silva, 166
Wn.2d at 141-42 (internal quotation marks omitted) (quoting In re Dependency of A.K., 162 Wn.2d
632, 646, 174 P.3d 11 (2007)).
III. MOOTNESS
Gronquist contends that the trial court erred by denying his contempt motion on the basis
of mootness. He contends that his contempt motion was not moot because the trial court could
6
49392-6-II
have required DOC and KCP to compensate him “for his injuries, costs, and attorney fees.” 4 Br.
of Appellant at 27. We agree.
“A case is moot if a court can no longer provide effective relief.” SEIU Healthcare 775NW
v. Gregoire, 168 Wn.2d 593, 602, 229 P.3d 774 (2010). The general rule is that moot cases should
be dismissed. State v. Cruz, 189 Wn.2d 588, 597, 404 P.3d 70 (2017). “‘The central question of
all mootness problems is whether changes in the circumstances that prevailed at the beginning of
litigation have forestalled any occasion for meaningful relief.’” City of Sequim v. Malkasian, 157
Wn.2d 251, 259, 138 P.3d 943 (2006) (quoting 13A CHARLES ALAN WRIGHT, ARTHUR R. MILLER
& EDWARD H. COOPER, FEDERAL PRACTICE AND PROCEDURE § 3533.3, at 261 (2d ed. 1984)).
RCW 7.21.030(3) provides:
The court may, in addition to[5] the remedial sanctions set forth in subsection (2) of
this section, order a person found in contempt of court to pay a party for any losses
suffered by the party as a result of the contempt and any costs incurred in
connection with the contempt proceeding, including reasonable attorney’s fees.
This provision “allows the court to order a contemnor to pay losses suffered as a result of the
contempt and costs incurred in the contempt proceedings for any ‘person found in contempt of
court’ without regard to whether it is possible to craft a coercive sanction.” Rapid Settlements,
189 Wn. App. at 601 (quoting RCW 7.21.030(3)). As a result of this statute, “a defendant may be
4
Gronquist also suggests several other types of relief that prevent his motion from being moot.
Because we agree that the trial court, if it found DOC and KCP in contempt, could order them to
compensate Gronquist for his injuries, costs, and attorney fees attributable to their contemptuous
conduct, we do not reach Gronquist’s additional suggested remedies. We also do not reach
Gronquist’s judicial estoppel argument.
5
DOC contends that this “in addition to” language implies that a court may only order a contemnor
to pay losses, costs, and attorney fees if it additionally orders one of the remedial sanctions laid
out in RCW 7.21.030(2). This argument is inconsistent with Rapid Settlements, discussed below.
7
49392-6-II
‘punished’ even in a civil contempt proceeding if the purpose is to compensate the complainant.”
Rapid Settlements, 189 Wn. App. at 608.
“Compensatory fines have been imposed in Washington contempt proceedings to address
many types of loss and damage caused by a party’s contumacious acts.” Rapid Settlements, 189
Wn. App. at 610. In Rapid Settlements, the court awarded attorney fees and costs incurred in the
contempt proceedings, losses incurred as a result of the contemptuous conduct, and a onetime
$1,000 sanction. 189 Wn. App. at 606, 610-11. The court analyzed what specific losses, costs,
and fees, were actually attributable to the contemptuous conduct, but it never questioned its own
authority to award the portions that were caused by the contempt. Rapid Settlements, 189 Wn.
App. at 606-12.
DOC distinguishes Rapid Settlements on the ground that the party awarded costs and fees
in that case also sustained “losses,” distinct from costs, and fees, which the court awarded. Br. of
DOC at 22. It claims that, unlike the movant in Rapid Settlements, Gronquist has not shown any
economic losses distinct from his costs and attorney fees.6
The issue of mootness is about whether the court is able to provide effective relief. DOC’s
and KCP’s arguments that Gronquist has not shown any losses do not go to mootness but to
whether he can show damages. A court has authority to order DOC and KCP to compensate
Gronquist for any losses he suffered as a result of their alleged contempt. The trial court denied
Gronquist’s motion for contempt as moot without reaching the issue of whether contempt actually
occurred or whether Gronquist suffered any losses as a result. If Gronquist can prove DOC and
6
DOC also relies on Shell Offshore Inc. v. Greenpeace, Inc., 815 F.3d 623 (9th Cir. 2016), for the
proposition that “coercive contempt proceedings are moot when the order or injunction alleged to
have been violated expires or is otherwise no longer in effect.” Br. of DOC at 20. Shell Offshore
specifically distinguished purely coercive contempt orders from those concerning compensatory
damages to the movant, such as those alleged in this case. 815 F.3d at 630.
8
49392-6-II
KCP are in contempt, then he can recover losses that he proves resulted from the disclosure of his
SOTP file. The court can award him compensatory relief. Therefore, Gronquist’s motion for
contempt is not moot.
We reverse the trial court’s order denying Gronquist’s motion for contempt as moot and
remand for the court to rule on the contempt motion.
A majority of the panel having determined that this opinion will not be printed in the
Washington Appellate Reports, but will be filed for public record in accordance with RCW 2.06.040,
it is so ordered.
Melnick, J.
We concur:
Worswick, P.J.
Sutton, J.
9
|
Welcome
Welcome to the POZ/AIDSmeds Community Forums, a round-the-clock discussion area for people with HIV/AIDS, their friends/family/caregivers, and
others concerned about HIV/AIDS. Click on the links below to browse our various forums; scroll down for a glance at the most recent posts; or join in the
conversation yourself by registering on the left side of this page.
Privacy Warning: Please realize that these forums are open to all, and are fully searchable via Google and other search engines. If you are HIV positive
and disclose this in our forums, then it is almost the same thing as telling the whole world (or at least the World Wide Web). If this concerns you, then do not use a
username or avatar that are self-identifying in any way. We do not allow the deletion of anything you post in these forums, so think before you post.
The information shared in these forums, by moderators and members, is designed to complement, not replace, the relationship between an individual and his/her own
physician.
All members of these forums are, by default, not considered to be licensed medical providers. If otherwise, users must clearly define themselves as such.
Forums members must behave at all times with respect and honesty. Posting guidelines, including time-out and banning policies, have been established by the moderators
of these forums. Click here for “Am I Infected?” posting guidelines. Click here for posting guidelines pertaining to all other POZ/AIDSmeds community forums.
We ask all forums members to provide references for health/medical/scientific information they provide, when it is not a personal experience being discussed. Please
provide hyperlinks with full URLs or full citations of published works not available via the Internet. Additionally, all forums members must post information which are
true and correct to their knowledge.
I've moved your thread to the Nutrition forum, which is the more appropriate place for supplement discussions. There are already several threads that discuss K-Pax, use the search function and you'll find loads of info.
"...health will finally be seen not as a blessing to be wished for, but as a human right to be fought for." Kofi Annan
Nymphomaniac: a woman as obsessed with sex as an average man. Mignon McLaughlin
HIV is certainly character-building. It's made me see all of the shallow things we cling to, like ego and vanity. Of course, I'd rather have a few more T-cells and a little less character. Randy Shilts
We are all so different in the way our bodies handle things. I went on the K Pax immune support. I lasted about 3 months. At the time, I was not on meds. My t-cells made a sharp decline and viral load went up. Showed my dr. what I was taking. She said, "Please don't ever take these again". When I got off, my viral load went back down and t-cells shot up nicely. Someone else may take them and it turn out great.
Expensive urine is about all vitamins are. If it works for you take them though.
Logged
1997 is when I found out, being deathly ill. I had to go to the hospital due to extreme headache and fever. I fell coma like, two months later weighing 95 pounds and in extreme pain and awoke to knowledge of Pancreatis, Cryptococcal Meningitis, Thrush,Severe Diarea, Wasting, PCP pneumonia. No eating, only through tpn. Very sick, I was lucky I had good insurance with the company I worked for. I was in the hospital for three months that time. (2010 Now doing OK cd4=210 VL= < 75)I have become resistant to many nukes and non nukes, Now on Reyataz, , Combivir. Working well for me not too many side effects. I have the wasting syndrome, Fatigue . Hard to deal with but believe it or not I have been through worse. Three Pulmonary Embolism's in my life. 2012 520 t's <20 V load
To be fair, looking at the dosage of each supplement (120 caps), it may will be more pricey if one buys them separately*, given ALA and NAC are expensive supplements to begin with; plus definitely more pills to take now;
I would enjoy to read a good investigative article on K PAX. How they got ADAP approval in states, the doctors who support their use and the doctors who do not. They are costing individuals and taxpayers a lot of money. What is their exact utility now, 2009, and for whom.
Logged
“From each, according to his ability; to each, according to his need” 1875 K Marx
What is this evidence then? The only 'evidence' I have ever seen was a laughable and quite unscientific study carried out by Jon D. Kaiser, the guy whose formulation it is. I have on the other hand seen plenty of solid evidence to support the expensive urine theory.
Even if you take Jon Kaiser's study at face value, there were only two areas in which there was a significant difference between K-PAX and a totally inert placebo:
peripheral neuropathy
CD4 counts
Even the CD4 count 'evidence' is totally undermined by the fact that the patients in the placebo group saw an overall fall in their CD4 counts - which is quite remarkable when you consider that each and every one of them was taking combination therapy at the time - so that would suggest that half the people here (myself included) would be dead by now if that is the effect that taking your HIV meds really has.
So, peripheral neuropathy aside, there isn't actually any remotely credible suggestion that K-PAX will do anything for you that doing nothing at all, or simply supplementing with any of the multitude of much cheaper generic micronutrient supplements, will do.
As far as peripheral neuropathy is concerned; I don't think anyone in their right mind would expect an inert placebo to help with that; but simply adding a cheap generic version of acetyl L-carnitine, N-acetyl cysteine or alpha lipoic acid to your generic vitamin pill will probably deliver all the supposed benefits that K-Pax does (and still save you more than 90% of the extortionate cost of K-PAX).
And of course, if you aren't on treatment and unfortunate enough to be suffering from peripheral neuropathy; then there isn't actually a single shred of evidence (not even from K-PAX or Jon Kaiser himself) to support the belief that K-PAX, over a cheap broad-spectrum multivitamin & mineral pill, does anything other than give you the very expensive urine that has already been mentioned.
There is abundant evidence to support the idea that a daily broad-spectrum multivitamin will improve the general health and CD4 counts of those in resource limited settings / nutrient restricted diets, who are not yet on treatment; but it takes a major act of deception to turn that into evidence that would support spending a small fortune on potentially dangerous mega-dosing, with several hundred times the daily recommended safe limits of certain substances .. and it is a hard fact that, in the developed world, most people with HIV quite simply are not deficient in most of the nutrients that you are mega-dosing on when you take K-PAX.
At UK prices:
K-PAX, as used in Kaiser's study, would come in at £1,199.40/year (£719.40 if you opt for the single strength formulation) - plus another £59.40 in delivery costs, if you don't buy in bulk.
A perfectly adequate standard broad-spectrum multivitamin & mineral pill, plus an acetyl-L-carnitine and alpha lipoic acid supplement, can easily be sourced on your local high street (Boots, GMC or Holland & Barrett) for less than £50/year - so that's less than the delivery costs alone on K-PAX - and comes in at closer to £30 if you shop wisely when certain retailers (GMC or Holland & Barrett) run their regular cycle of product promotions.
Right now, using a random online retailer with no price promotions, a 360 day supply of multi-vitamins, minerals and micronutrients (£12.99) along with acetyl-L-carnitine & alpha lipoic acid (£35.98) - so that's a grand total of just two pills a day - comes in at £48.97 with free delivery.
By my calculations, that makes K-PAX enriched urine more than 25 times more expensive than any other evidence suggests it needs to be; which probably explains why I've never met a single HIV specialist who doesn't consider it to be tantamount to an exploitation racket and that it is far better, and safer, to target specific identified deficiencies.
To be fair, looking at the dosage of each supplement (120 caps), it may will be more pricey if one buys them separately*, given ALA and NAC are expensive supplements to begin with; plus definitely more pills to take now;
I spent some time putting together my supplement regimen. One of its goals was to clone all the ingredient of k-pax. It can really be done for much less than the "single dose" k-pax . It does take work and a complicated spreadsheet to match the dosage of all the individual nutrients. One of the tricks is to start with a good multi that already includes selenium 200mcg and zinc. So there is no need to buy separate pills for those.
Also, you are not taking into account the pillcount, you just added the cost of individual supplements ignoring how many need to be taken per day.From iherb.com :
It is made of 10 different products and a total of 14 capsules/tablets per day - compared with 8 for K-pax. The daily cost is $1.63 . Or $48.90 per month - compared with $74.95 for K-pax . That's 2/3rd of the price.And if you buy in bulk like I do (for one year), you can get discounts up to 16% off and free shipping. So it ends up costing closer to half of K-pax. I am not affiliated with Iherb - just a happy customer.
I will admit it is more complicated with the pill boxes to have so many different products to take. With K-pax I believe the capsules are all identical (not sure since I never bought it), so you just need to take 8 of them, no need fort sorting.
By my calculations, that makes K-PAX enriched urine more than 25 times more expensive than any other evidence suggests it needs to be; which probably explains why I've never met a single HIV specialist who doesn't consider it to be tantamount to an exploitation racket and that it is far better, and safer, to target specific identified deficiencies.
Wow great post Luke, thanks.
And anyone have any explanation how this got ADAP coverage in some states? Was it more a function of the state of things in the year it was approved for coverage? That's what i suspect....
Logged
“From each, according to his ability; to each, according to his need” 1875 K Marx
You may have misread my post. I believe it's clear my comparison shows it is more expensive to buy pills separately and more pills to pop otherwise.
I think I read your post correctly, and I responded by showing you that your math is wrong - it can be much less expensive to buy the individual pillls than K-PAX, even though it will be more pills to pop.
To reiterate, your math is wrong because you are adding up the price of individual supplement bottles that will last much longer than one month, and then comparing that sum against the cost of one month of K-PAX. That's a meaningless comparison.
And of course, if you aren't on treatment and unfortunate enough to be suffering from peripheral neuropathy; then there isn't actually a single shred of evidence (not even from K-PAX or Jon Kaiser himself) to support the belief that K-PAX, over a cheap broad-spectrum multivitamin & mineral pill, does anything other than give you the very expensive urine that has already been mentioned.
There is also no evidence that K-PAX is less helpful in people not on treatment than in people on treatment. Placebo-controlled trials are generally considered unethical in HIV/AIDS meds. We will never know exactly because it would endanger the life of too many patients to have one group taking placebo and another group taking k-pax. That doesn't mean the second group wouldn't see some benefit.
Even new HIV drugs are compared with some other existing treatment that did have some placebo-controlled trials before, not against an actual placebo.
There have however been many studies about some of the individual nutrients in K-PAX and their benefits in HIV. Many of them were in people not on HAART, before HAART existed, or in populations who couldn't afford meds (HAART or pre-HAART). Don't you think some of that research can be applied to K-PAX too to figure out the answer to its effect in people not on HAART ?
Quote
There is abundant evidence to support the idea that a daily broad-spectrum multivitamin will improve the general health and CD4 counts of those in resource limited settings / nutrient restricted diets, who are not yet on treatment; but it takes a major act of deception to turn that into evidence that would support spending a small fortune on potentially dangerous mega-dosing, with several hundred times the daily recommended safe limits of certain substances .. and it is a hard fact that, in the developed world, most people with HIV quite simply are not deficient in most of the nutrients that you are mega-dosing on when you take K-PAX.
At UK prices:
I think you make two separate arguments. One about the price, and one about the usefulness or toxicity of the product.
On price, nobody needs to pay the inflated UK K-PAX prices when they can get essentially the same product for 2/3rd of the US price or less by ordering the individual ingredients.
On toxicity, I haven't seen anything in K-PAX that was above safe limits, let alone by several hundred times. And I checked the FDA and many other websites for the upper intake levels when I put together my K-PAX clone to make sure it was OK. I think as long as you use the K-PAX formula for the "single strength" product, you won't get close to the safe limits. The double strength one is another matter. K-PAX recommends it for anyone above 120 lbs. I wonder why at that exact cutoff one needs 2x as much supplements. I weigh 150 lbs and I would not use the double strength. Perhaps if I weighed 250+ lbs I would consider using the double strength dosage but I'm not sure even then.
Some B vitamins in K-PAX are indeed far in excess of the recommended values, but that doesn't mean they are unsafe - any excess will pass in urine as you well know. Just check the formulation for any B-complex supplement and you will see doses far above recommended. Essentially the K-PAX regimen includes a b-complex. I don't think it's a bad thing. But if you don't like the color of your urine, you can always build a similar combo without the high amount of B vitamins.
Just check the formulation for any B-complex supplement and you will see doses far above recommended. Essentially the K-PAX regimen includes a b-complex. I don't think it's a bad thing. But if you don't like the color of your urine, you can always build a similar combo without the high amount of B vitamins.
I know no such thing, because it is just plain wrong and a figment of your imagination. If excess vitamin B is harmlessly passed in the urine, how come then that there are so many well documented conditions - including, quite ironically, peripheral neuropathy - resulting from vitamin B toxicity? Maybe it is time you stop making wholesale quotes from the bizarre drivel they include in the K-PAX promotional.
Kaiser is the lunatic making unsubstantiated claims and tortured extrapolations from other research - and growing rich in the process. Ask yourself why he won't subject his witches brew to a proper peer-reviewed study - and indeed do so at his own expense, because why should valuable resources be diverted to disproving his crackpot theories?.
The placebo argument is a total red herring - he himself used a placebo group in this ludicrous 'study' of his - and he doesn't even need to use a placebo; because he can simply compare it to simple cheap multivitamins and a few generic supplements. Also, it is not unethical to use placebo groups where it isn't a matter of life and death .. and not even you have the gall to make the case that K-PAX is a matter of life or death.
The answer is simple: he wouldn't stand to gain financially if people saw that K-PAX offers them nothing at all that can't be easily achieved at a very small percentage of the cost, and without scatter-gun megadosing at, yes indeed, up to several hundred times the recommended safe limits.
The whole basis of your argument is that it must be fine if no-one has bothered to prove his specific claims wrong. Keep following that if you like; meanwhile, I am sure that most people will settle for avoiding what is the patent irresponsible stupidity of megadosing.
I know no such thing, because it is just plain wrong and a figment of your imagination. If excess vitamin B is harmlessly passed in the urine, how come then that there are so many well documented conditions resulting from vitamin B toxicity? Maybe it is time you stop making wholesale quotes from the bizarre drivel they include in the K-PAX promotional.
I never cared about the K-PAX promotional. If you want to make an argument about vitamin B toxicity in K-PAX, you should look at doses at which this was reported to happen. Then compare them to the doses in K-PAX. Then report back.
Quote
Ask yourself why he won't subject his witches brew to a proper peer-reviewed study - and indeed do so at his own expense, because why should valuable resources be diverted to disproving his crackpot theories?.
Anyone else is free to do additional research on supplements, including on K-PAX. I would welcome it. But the funding for it is very scarce. There is no point in using name calling here, I don't think it is helpful.
Quote
The placebo argument is a total red herring - he himself used a placebo group in this ludicrous 'study' of his - and he doesn't even need to use a placebo; because he can simply compare it to simple cheap multivitamins and a few generic supplements. Also, it is not unethical to use placebo groups where it isn't a matter of life and death .. and not even you have the gall to make the case that K-PAX is a matter of life or death.
It wasn't a placebo group since one group had patients on HAART, and another group on HAART + KPAX. But yes, he could have compared the efficacy against HAART + other supplements. That would be very useful data to have. I haven't seen any life or death claims made about K-PAX. I just went to the K-PAX web site to check and it talks about immune system enhancement.
Quote
The answer is simple: he wouldn't stand to gain financially if people saw that K-PAX offers them nothing at all that can't be easily achieved at a very small percentage of the cost, and without scatter-gun megadosing at, yes indeed, up to several hundred times the recommended safe limits.
If you want to continue making the argument that K-PAX is mega-dosing and is above safe limits, then I think you should cite some nutrient levels in K-PAX and which one exceed upper tolerable intake levels for them, or studies of toxicity reported at those levels.
Quote
The whole basis of your argument is that it must be fine if no-one has bothered to prove his specific claims wrong. Keep following that if you like; meanwhile, I am sure that most people will settle for avoiding what is the patent irresponsible stupidity of megadosing.
No, that's not the whole of it at all. I have spent dozens of hours researching nearly every nutrient that is in K-PAX when I built my K-PAX clone. I did not check just a single source of information. I could not find any evidence that it is irresponsible. And other than for the B vitamins, which can also be found in similar levels in other high-end multivitamins, I don't think anything in K-PAX can be called megadosing. It is just a lot of nutrients put together, at levels high enough to have been previously shown to be of therapeutic value.
I never cared about the K-PAX promotional. If you want to make an argument about vitamin B toxicity in K-PAX, you should look at doses at which this was reported to happen. Then compare them to the doses in K-PAX. Then report back.
Then why do you keep quoting the K-Pax promotionals almost word-for-word? And if you care to check, the long-term vitamin B6 toxicities - including peripheral neuropathy - are documented at lower levels than the doses Kaiser used in his own study formulation.
Quote
There is no point in using name calling here, I don't think it is helpful.
And you really don't think that you deliberately and systematically misrepresenting what people say, and their knowledge and beliefs, is tantamount to exactly the same?
Quote
It wasn't a placebo group since one group had patients on HAART, and another group on HAART + KPAX. But yes, he could have compared the efficacy against HAART + other supplements. That would be very useful data to have. I haven't seen any life or death claims made about K-PAX. I just went to the K-PAX web site to check and it talks about immune system enhancement.
Of course it was a placebo. One group was on HAART + K-PAX and the other group was on HAART + a placebo. Maybe it is you who should recheck your dubious sources.
Quote
If you want to continue making the argument that K-PAX is mega-dosing and is above safe limits, then I think you should cite some nutrient levels in K-PAX and which one exceed upper tolerable intake levels for them, or studies of toxicity reported at those levels.
And if you want to continue it, then perhaps it would behove you to stick to facts.
Quote
No, that's not the whole of it at all. I have spent dozens of hours researching nearly every nutrient that is in K-PAX when I built my K-PAX clone. I did not check just a single source of information. I could not find any evidence that it is irresponsible. And other than for the B vitamins, which can also be found in similar levels in other high-end multivitamins, I don't think anything in K-PAX can be called megadosing. It is just a lot of nutrients put together, at levels high enough to have been previously shown to be of therapeutic value.
Well, megadosing has a clearly defined meaning and it is certainly more than just vitamin B6 that is megadosed. If you want to redefine it for your purposes, then that is up to you; but there are endless studies and statistics out there to show the very real dangers of megadosing at the levels at which it is defined.
I'll point to specifics in regard to my HIV infection. And as you can see, I'm now on meds for a month.
I was able to go 5 years before going on meds. Nothing remarkable there. But for about 4 years, I maintained an equilibrium with my HIV. Which isn't uncommon, however, I performed better than my doctor expected based upon my initial numbers. He even said to me, whatever your doing, keep it up and understood and added to my file what I was taking.
But in the end, no supplementation program is going to stop HIV. And in my case, I can't really claim that supplements helped me maintain my equilibrium. It was entirely a stalling tactic in my thought process.
But where supplements did make a difference was Digestive and Metabolically. HIV impacted my digestive function fairly significantly. After I began supplementation with glutamine and pro-biotics, my function improved significantly, and i even reach a never better state. But as my VL increased, the supplements only help to a point and digestive issues ultimately returned over the last 7 months prior to me going on meds.
I also had fatigue issues that increasing was effecting me. I cycled on and off of Ginseng and clearly there was a difference in my energy level on Ginseng vs. not.
I also took Alpha Lipoic Acid for my fatty liver condition, and for a time, my elevated liver counts went to zero. But slowly returned. Which probably has much to do with the extra weight I'm carrying, which was difficult for me to control because of fatigue. but for a while, I got some results.
I agree that the problem often is, lack of information. But if your having issues, then what choices do we have and can these things help?
Not everything needs to come from the doctor in a prescription for it to be effective. Ginger is a great anti-nausea agent and you can get them in freeze dried form in capsules. Does that make it a supplement?
I'll let others decide if K-PAX is a shame or not. But I simply do not discount supplements, because my experience says that they can play a role in how we try to manage HIV's effects.
You pretty much do need to one by one and not lump supplements and "throw them under the bus" so to speak, and in my opinion.
I totally agree. I am absolutely not arguing against carefully targeted and informed supplementation - I use them myself. I am arguing against the sort of irresponsible and unsupervised scatter-gun supplementation advocated by Kaiser.
my opinion was, if the book was correct about his practice, he would try anything to keep his patients alive, and developed these techniques as part of his practice. He wasn't against meds, but doing everything you can from stress reduction, acceptance therapy, and supplements to attempt to maintain control.
He also was a bit advocate to regular intestinal parasitic screening which is clearly outside of conventional thinking, but after I had Blasto Hominus, got just an inkling how much more severe these "typical" conditions can be if your HIV positive. Fortunately, the lab i used was able to detect the parasite and the treatment worked.
i don't know much more about Kaiser than from the book he wrote. But much of what he advocates for dealing with HIV issues, such as the glutamine, Acetyl L Carnitine, Alpha Lipoic acid, NAC are staples in most HIV supplementation routines.
Yes its scatter shot in a combo, but as folks who take Atripla note, taking one thing that has all the things in it, may be simpler than trying to figure it out. Its also more expensive for certain.
I now don't really know what to make of Kaiser. He seems to stimulate devotion and ridicule simultaneously. I don't think he's a quack, but he certainly has done thing differently than others.
I would say, folks that have used his practice, what did they think of his approach? And of course we need to realize that much of this was developed in the 90's, so it is a bit backward looking.
Overall that is a problem with HIV therapy, we tend to look at things from a historical perspective. And we wait what seems like forever for results from studies. It may be the best drug ever, but until we go through long term use studies, the advice is to use the current drugs that have been studied for a long time.
When Reyataz showed up, Kaletra was so strong that even my doc said, wait and see. Part of my waiting was to hold off long as possible before going on meds, and now I'm on Reyataz. I probably could have started sooner and avoided 6 months of feeling like crap. But that is the nature of the beast.
We have to decide what we are going to do, what role to play, and what resources we want to expend. Much of it is on us as individuals. Madbrain's thoughts as my own, our our own individual attempts to see what we can do to attempt to control this thing. I was a big time advocate of supplements in the past, but I now accept that as hopeful thinking. But a part of living with HIV is being hopeful. And we all need our own devices in determining what gives us hope.
At least I was in a pill taking routine for 5 years, and still continuing. Because of my routine, my doc, who normally recommends Atripla, knew that I can take 3 pills a day in the morning like clock work. For folks having trouble taking pills, taking supplements and getting used to it and finding a way, may have some ancillary benefit down the road when it comes time to take meds every day.
But much of what he advocates for dealing with HIV issues, such as the glutamine, Acetyl L Carnitine, Alpha Lipoic acid, NAC are staples in most HIV supplementation routines.
I disagree. Almost everyone I know takes some sort of supplement, but I don't actually know anyone for whom all those four are staples. I also don't know anyone who would routinely take them at anywhere near the doses advocated by Kaiser. I can't speak for the USA, so maybe it is a cultural difference.
I do however know that my clinic routinely prescribes some of them to good effect, at significantly lower doses than in K-PAX, where there is an identified need - in particular where a patient suffers from peripheral neuropathy.
Then why do you keep quoting the K-Pax promotionals almost word-for-word?
I did no such thing.
Quote
And if you care to check, the long-term vitamin B6 toxicities - including peripheral neuropathy - are documented at lower levels than the doses Kaiser used in his own study formulation.
Yes, I have checked. That is the one thing I take exception to in K-PAX, and that's why I take slightly less B6 than is in K-PAX in my clone (75 vs 100mg).
Quote
And you really don't think that you deliberately and systematically misrepresenting what people say, and their knowledge and beliefs, is tantamount to exactly the same?
I haven't done any such thing.
Quote
Of course it was a placebo. One group was on HAART + K-PAX and the other group was on HAART + a placebo. Maybe it is you who should recheck your dubious sources.
In other words, there was no group that was on a placebo alone.
Quote
And if you want to continue it, then perhaps it would behove you to stick to facts.
That is a really interesting comment coming from you, since most of your posts include very few facts, they are full of personal attacks, against Kaiser, the price of K-PAX, or anyone who takes supplements.
Quote
Well, megadosing has a clearly defined meaning and it is certainly more than just vitamin B6 that is megadosed. If you want to redefine it for your purposes, then that is up to you; but there are endless studies and statistics out there to show the very real dangers of megadosing at the levels at which it is defined.
If it is more than B6 that is megadosed, and it is dangerous, please enlighten us with facts about it. I certainly would like to know since I take a combo similar to K-PAX. This is another example of a factless post from you.
Yes, I have checked. That is the one thing I take exception to in K-PAX, and that's why I take slightly less B6 than is in K-PAX in my clone (75 vs 100mg).
Oh, so now your story changes and you have all along taken exception to the one thing which only a few posts ago you were telling us was so harmless that any excess would just pass harmlessly out in urine. Pardon me for laughing whilst I watch you dig this rather large hole for yourself.
Quote
I haven't done any such thing.
I repeat: Then you clearly aren't even aware of the contents of your own posts.
Quote
In other words, there was no group that was on a placebo alone.
In other words there was a placebo group - by every definition of the meaning of a placebo group and even Kaiser refers to it as such - only you can't admit it, because that would make you wrong ... again. If you are testing the benefits in treating people with peripheral neuropathy caused by their meds (which is the only benefit that Kaiser has ever managed to demonstrate) then of course the placebo group needs to be on meds. As for the people who aren't yet requiring meds, there simply is no ethical dilemma.
Quote
That is a really interesting comment coming from you, since most of your posts include very few facts, they are full of personal attacks, against Kaiser, the price of K-PAX, or anyone who takes supplements.
Really? That is just a blatant lie. Yes I have certainly made comments about Kaiser and the extortionate and quite unjustifiable cost of his witches brew; but show me anywhere that I have attacked people who take supplements. As I have made very clear on this thread, I don't have an issue with sensible and targeted supplementation. The fact that you have to lie repeatedly, and so blatantly, shows just how desperate you are.
Quote
If it is more than B6 that is megadosed, and it is dangerous, please enlighten us with facts about it. I certainly would like to know since I take a combo similar to K-PAX. This is another example of a factless post from you.
Well, just one single example is vitamin B12. Thiamine is another (and before you desperately try to claim that they aren't also dangerous, try thrombosis and anaphylaxis for size). The list goes on. So the fact that you claim that there aren't others (having previously claimed that there were none at all) just shows that it is you, not I, who is factless in their posts - in fact, I doubt you even know the meaning of the word 'fact' - so, as I have clearly demonstrated that you are singularly unable to stick to any of these elusive facts, there is therefore little point in continuing this.
It seems that your idea of making a point is to indiscriminately spray as many non-facts around as Kasier would have us consume needless vitamins, and then desperately cling to the hope that one of them may actually turn out to be a fact. Perhaps this is an illustration of what megadosing does to your faculties.
I think you are so blinded by your beliefs that you are reading things in my post that I just didn't write.
Quote
Oh, so now your story changes and you have all along taken exception to the one thing which only a few posts ago you were telling us was so harmless that any excess would just pass harmlessly out in urine. Pardon me for laughing whilst I watch you dig this rather large hole for yourself.
My storing is not changing - my supplement regimen has been available publicly for a long time and you can see the B6 dosing in it at links I previously posted, and how it differs from K-PAX slightly (it is less). And I have even discussed the B6 issue previously if you care to search the forum or use google.
Quote
In other words there was a placebo group - by every definition of the meaning of a placebo group and even Kaiser refers to it as such - only you can't admit it, because that would make you wrong ... again.
You are a real piece of work ! You would do well to start reading the posts before you reply to them. I suggest you go back to my first response and see what I quoted and responded to.
You made an argument that just because there was a trial of K-PAX in people on HAART that showed some benefit, it didn't mean K-PAX was also beneficial in people not on HAART.
In principle I agree with that. It's a different population, and it would require a different trial to get conclusive evidence.
I then pointed out that there could be no placebo-controlled trial of K-PAX in that other population for ethical reasons.
As far as "By every definition of the meaning of a placebo group", the population is part of the definition of the trial. You can't talk about the placebo group without defining the population.
Kaiser writes about a placebo group in his trial of KPAX, which is in the population of people that were all on HAART.
He does not write about a placebo group in a population of people not on HAART, simply because there wasn't any such trial.
The only person to mention K-PAX as life-or-death was you. The life-or-death issue is with performing trials on HIV-positive people that are purposedly kept off life-saving HAART, that is the ethical issue I was referring to. But you proceeded to put words in my mouth.
Since there is no trial of K-PAX in people not on HAART, and there is never going to be any for ethical reason, we have to rely on other related research to help figure out whether K-PAX might also be helpful in that population.
Quote
The fact that you have to lie repeatedly, and so blatantly, shows just how desperate you are.
More personal attacks. What would I need to be desperate about ? I'm glad the supplement company paid for Kaiser's research. Now I get to benefit from it, without having paid to pay the high cost, by using a similar, cheaper supplement regimen.
Quote
Well, just one single example is vitamin B12. Thiamine is another. And the list goes on.
What is the health risk of too much vitamin B12?The Institute of Medicine of the National Academies did not establish a UL for this vitamin because vitamin B12 has a very low potential for toxicity. The IOM states that "no adverse effects have been associated with excess vitamin B12 intake from food and supplements in healthy individuals" [7]. In fact, the IOM recommends that adults older than 50 years get most of their vitamin B12 from vitamin supplements or fortified food because of the high incidence of impaired absorption in this age group of vitamin B12 from foods that come from animals [7].
And since you cited it, same question for thiamine.
Same question for "the list goes on". I didn't see that one anywhere on the K-PAX fact sheet, though.
Quote
So the fact that you claim that there aren't others just shows that it is you, not I, who is factless in their posts - in fact, I doubt you even know the meaning of the word 'fact' - so, as I have clearly demonstrated that you are singularly unable to stick to any of these elusive facts,
More personal attacks. It's clear you don't have anything useful to say in this discussion other than to bash Kaiser, complain about his overpriced formula, and make repeated claims about its dangers, without substantiating them.
Quote
there is therefore little point in continuing this.
On this part, I fully agree with you. If you had anything factual or of substance to say, you would have been able to state it by now, and also do it in a civil way. You have the honors of being only the second person to make it to my ignore list. Life is too short to waste responding to twits like you.
As for B12, even K-PAX on their own packages here in the UK, show the percentage against recommended intake - and it is over 10,000%, which is pretty spectacular for something which you claim isn't even megadosed - and I have already given thrombosis as an example of the result of B12 toxicity, so I really shouldn't even need to have to repeat myself. Same goes for thiamine and anaphylaxis. If you don't consider them to be dangerous, then there really is little hope for mankind. Rare toxicities they may be, but they are none-the-less very real in people with chronic conditions (I take it you do realise that you are talking to people with HIV and that HIV is a chronic condition).
Don't forget that this is in addition to the B6; which we have now established can cause peripheral neuropathy - but only after you had quite irresponsibly claimed that it was harmless and that any excess would simply be harmlessly passed in urine. Yet it turns out that you are worried enough about it to decrease your own intake whilst telling others that it is harmless (but that's OK, because you disingenuously tell us that anyone reading this would know that, because it is hidden away somewhere amongst the rest of the copious nonsense you have posted on the subject in the past).
As for the rest of the drivel - not only are you misrepresenting my own posts, but you are denying what you have posted in this very thread - all I can say is that you are seriously deluded and that I am done with this ridiculous circular nonsense.
Madbrain by name and madbrain by nature. Have fun, because you wouldn't know a fact (let alone a twit) if it stood up and smacked you in the face.
I was able to go 5 years before going on meds. Nothing remarkable there.
Yes, that's about average.
Quote
But for about 4 years, I maintained an equilibrium with my HIV. Which isn't uncommon, however, I performed better than my doctor expected based upon my initial numbers. He even said to me, whatever your doing, keep it up and understood and added to my file what I was taking.
To me, it's clear that HIV behaves differently in different people. Even the same HIV behaves very differently in me as it does in my bf. He went on meds 2 years ago, and I still don't need it. There are some genetic factors in play. Scientists have not identified most of them yet, unfortunately.
Even though you ended up with some average time to meds, how can you know how you would have done without the supplements ? Your HIV progressed, at a certain average rate. But perhaps it would also have progressed even faster without the supplements. You might have needed meds less than 12 months after your last HIV negative test like my bf did.
Quote
But in the end, no supplementation program is going to stop HIV.
Probably not - at least, no supplementation program that anyone has ever come up with and studied yet.
Quote
I agree that the problem often is, lack of information.
Yes, unfortunately the available research is insufficient when it comes to supplements.
Quote
But if your having issues, then what choices do we have and can these things help?
Exactly. I have always had serious GI issues too, and the supplements I take have clearly helped. That's a lot easier to measure than the effect of HIV on CD4 and VL which are much less visible except in the labs every 3 months, at least for me so far.
Madbrain, Luke, you two need to stop this pissing contest right now. Enough is enough. Either agree to disagree - or ignore each other. And yes, this is a warning. Stop it.
Out of the eight B vitamins, only three of them have any recorded toxicities.
Vitamin B3 niacin - recommended intake, no more than 35 mg/day from supplements, drugs or fortified food. Harmful effects may include: Flushing (redness of the skin, often accompanied by itching or a mild burning sensation). Intake of 3000 mg/day of nicotinamide and 1500 mg/day of nicotinic acid are associated with nausea, vomiting, and signs and symptoms of liver toxicity.
None of the other B vitamins have upper limits and none of the others have any known toxicities. B vitamins are water soluable and the worst effect most of them have is they make your piss very expensive. That's it, other than the three listed above.
"...health will finally be seen not as a blessing to be wished for, but as a human right to be fought for." Kofi Annan
Nymphomaniac: a woman as obsessed with sex as an average man. Mignon McLaughlin
HIV is certainly character-building. It's made me see all of the shallow things we cling to, like ego and vanity. Of course, I'd rather have a few more T-cells and a little less character. Randy Shilts
If Luke is having issues, then his speaking from experience is of value to us in learning more about this possibility.
But, I would also comment that I've pretty much taken the K-PAX formula, via selecting individual components myself, which often leads to taking up to 40 supplement tabs and caps a day.
My doctor nor did I suspect at any time that I was having a vitamin/supplement toxicity issue.
Now that I'm on meds, I've altered my supplementation to eliminate Herbal Supplements, and pulled it back to a Multi without Iron with Selenium, Alpha Lipoic Acid, NAC and Acetyl L Carnintine, 100 mg of 7-Keto DHEA, and Vitamin D supplement based upon how much sun I'm getting, Glutamine and Psyllium Fiber.
My blood work didn't indicate issues either and honestly, I thought the level of what i was taking is Generally Regarded as Safe.
I'm also a 215lb man at 5'8", short and husky, but with enough muscle to go on long bike rides, lift wieghts, etc.
Just like everything, one size does not fit all, but we are often living in guidelines that are one size fits all.
Madbrain has terrible issues with Vitamin D deficiency. Luke has toxicity issues. That about says it all.
From my point of view, guidelines are conservative, minimal, well researched and meaningful. But we are all different.
I know for years I've had increasing trouble during the winter months. Tried Light Therapy and Zoloft with minimal relief. Then I just increased my Vitamin D supplementation from 400 i.u, to 1200 i.u. That was the thing I needed.
My mom scoffs at what I'm taking, insisting that she takes 2000 i.u. a day. she's in her 70's. And lives in Arizona. She might be overdoing it, but not a whisper of Osteoporosis. |
:orphan:
=============
Release 0.9.0
=============
Release summary
---------------
statsmodels is using github to store the updated documentation which
is available under
https://www.statsmodels.org/stable for the last release, and
https://www.statsmodels.org/devel/ for the development version.
**Warning**
API stability is not guaranteed for new features, although even in
this case changes will be made in a backwards compatible way if
possible. The stability of a new feature depends on how much time it
was already in statsmodels master and how much usage it has already
seen. If there are specific known problems or limitations, then they
are mentioned in the docstrings.
The list of pull requests for this release can be found on github
https://github.com/statsmodels/statsmodels/pulls?utf8=%E2%9C%93&q=is%3Apr+is%3Amerged+milestone%3A0.9
(The list does not include some pull request that were merged before
the 0.8 release but not included in 0.8.)
The Highlights
--------------
- statespace refactoring, Markov Switching Kim smoother
- 3 Google summer of code (GSOC) projects merged
- distributed estimation
- VECM and enhancements to VAR (including cointegration test)
- new count models: GeneralizedPoisson, zero inflated models
- Bayesian mixed GLM
- Gaussian Imputation
- new multivariate methods: factor analysis, MANOVA, repeated measures
within ANOVA
- GLM var_weights in addition to freq_weights
- Holt-Winters and Exponential Smoothing
What's new - an overview
------------------------
The following lists the main new features of statsmodels 0.9. In addition,
release 0.9 includes bug fixes, refactorings and improvements in many areas.
**base**
- distributed estimation #3396 (Leland Bybee GSOC, Kerby Shedden)
- optimization option scipy minimize #3193 (Roman Ring)
- Box-Cox #3477 (Niels Wouda)
- t_test_pairwise #4365 (Josef Perktold)
**discrete**
- new count models (Evgeny Zhurko GSOC, Josef Perktold)
- NegativeBinomialP #3832 merged in #3874
- GeneralizedPoisson #3727 merged in #3795
- zero-inflated count models #3755 merged in #3908
- discrete optimization improvements #3921, #3928 (Josef Perktold)
- extend discrete margin when extra params, NegativeBinomial #3811
(Josef Perktold)
**duration**
- dependent censoring in survival/duration #3090 (Kerby Shedden)
- entry times for Kaplan-Meier #3126 (Kerby Shedden)
**genmod**
- Bayesian GLMM #4189, #4540 (Kerby Shedden)
- GLM add var_weights #3692 (Peter Quackenbush)
- GLM: EIM in optimization #3646 (Peter Quackenbush)
- GLM correction to scale handling, loglike #3856 (Peter Quackenbush)
**graphics**
- graphics HDR functional boxplot #3876 merged in #4049 (Pamphile ROY)
- graphics Bland-Altman or Tukey mean difference plot
#4112 merged in #4200 (Joses W. Ho)
- bandwidth options in violinplots #4510 (Jim Correia)
**imputation**
- multiple imputation via Gaussian model #4394, #4520 (Kerby Shedden)
- regularized fitting in MICE #4319 (Kerby Shedden)
**iolib**
- improvements of summary_coll #3702 merged #4064 (Natasha Watkins,
Kevin Sheppard)
**multivariate**
- multivariate: MANOVA, CanCorr #3327 (Yichuan Liu)
- Factor Analysis #4161, #4156, #4167, #4214 (Yichuan Liu, Kerby Shedden,
Josef Perktold)
- statsmodels now includes the rotation code by ....
**regression**
- fit_regularized for WLS #3581 (Kerby Shedden)
**stats**
- Knockoff FDR # 3204 (Kerby Shedden)
- Repeated measures ANOVA #3303 merged in #3663, #3838 (Yichuan Liu, Richard
Höchenberger)
- lilliefors test for exponential distribution #3837 merged in #3936 (Jacob
Kimmel, Josef Perktold)
**tools**
- quasi-random, Halton sequences #4104 (Pamphile ROY)
**tsa**
- VECM #3246 (Aleksandar Karakas GSOC, Josef Perktold)
- exog support in VAR, incomplete for extra results, part of VECM
#3246, #4538 (Aleksandar Karakas GSOC, Josef Perktold)
- Markov switching, Kim smoother #3141 (Chad Fulton)
- Holt-Winters #3817 merged in #4176 (tvanzyl)
- seasonal_decompose: trend extrapolation and vectorized 2-D #3031
(kernc, Josef Perktold)
- add frequency domain seasonal components to UnobservedComponents #4250
(Jordan Yoder)
- refactoring of date handling in tsa #3276, #4457 (Chad Fulton)
- SARIMAX without AR, MA #3383 (Chad Fulton)
**maintenance**
- switch to pytest #3804 plus several other PRs (Kevin Sheppard)
- general compatibility fixes for recent versions of numpy, scipy and pandas
`bug-wrong`
~~~~~~~~~~~
A new issue label `type-bug-wrong` indicates bugs that cause that incorrect
numbers are returned without warnings.
(Regular bugs are mostly usability bugs or bugs that raise an exception for
unsupported use cases.)
see https://github.com/statsmodels/statsmodels/issues?q=is%3Aissue+label%3Atype-bug-wrong+is%3Aclosed+milestone%3A0.9
- scale in GLM fit_constrained, #4193 fixed in #4195
cov_params and bse were incorrect if scale is estimated as in Gaussian.
(This did not affect families with scale=1 such as Poisson)
- incorrect `pearson_chi2` with binomial counts, #3612 fixed as part of #3692
- null_deviance and llnull in GLMResults were wrong if exposure was used and
when offset was used with Binomial counts.
- GLM Binomial in the non-binary count case used incorrect endog in recreating
models which is
used by fit_regularized and fit_constrained #4599.
- GLM observed hessian was incorrectly computed if non-canonical link is used,
fixed in #4620
This fix improves convergence with gradient optimization and removes a usually
numerically small error in cov_params.
- discrete predict with offset or exposure, #3569 fixed in #3696
If either offset or exposure are not None but exog is None, then offset and
exposure arguments in predict were ignored.
- discrete margins had wrong dummy and count effect if constant is prepended,
#3695 fixed in #3696
- OLS outlier test, wrong index if order is True, #3971 fixed in #4385
- tsa coint ignored the autolag keyword, #3966 fixed in #4492
This is a backwards incompatible change in default, instead of fixed maxlag
it defaults now to 'aic' lag selection. The default autolag is now the same
as the adfuller default.
- wrong confidence interval in contingency table summary, #3822 fixed in #3830
This only affected the summary and not the corresponding attribute.
- incorrect results in summary_col if regressor_order is used,
#3767 fixed in #4271
Description of selected new feature
-----------------------------------
The following provides more information about a selected set of new features.
Vector Error Correction Model (VECM)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The VECM framework developed during GSOC 2016 by Aleksandar Karakas adds support
for non-stationary cointegrated VAR processes to statsmodels.
Currently, the following topics are implemented
* Parameter estimation for cointegrated VAR
* forecasting
* testing for Granger-causality and instantaneous causality
* testing for cointegrating rank
* lag order selection.
New methods have been added also to the existing VAR model, and VAR has now
limited support for user provided explanatory variables.
New Count Models
----------------
New count models have been added as part of GSOC 2017 by Evgeny Zhurko.
Additional models that are not yet finished will be added for the next release.
The new models are:
* NegativeBinomialP (NBP): This is a generalization of NegativeBinomial that
allows the variance power parameter to be specified in the range between 1
and 2. The current NegativeBinomial support NB1 and NB2 which are two special
cases of NBP.
* GeneralizedPoisson (GPP): Similar to NBP this allows a large range of
dispersion specification. GPP also allow some amount of under dispersion
* ZeroInflated Models: Based on a generic base class, zeroinflated models
are now available for Poisson, GeneralizedPoisson and NegativeBinomialP.
Generalized linear mixed models
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Limited support for GLIMMIX models is now included in the genmod
module. Binomial and Poisson models with independent random effects
can be fit using Bayesian methods (Laplace and mean field
approximations to the posterior).
Multiple imputation
~~~~~~~~~~~~~~~~~~~
Multiple imputation using a multivariate Gaussian model is now
included in the imputation module. The model is fit via Gibbs
sampling from the joint posterior of the mean vector, covariance
matrix, and missing data values. A convenience function for fitting a
model to the multiply imputed data sets and combining the results is
provided. This is an alternative to the existing MICE (Multiple
Imputation via Chained Equations) procedures.
Exponential smoothing models
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Exponential smoothing models are now available (introduced in #4176 by
Terence L van Zyl). These models are conceptually simple, decomposing a time
series into level, trend, and seasonal components that are constructed from
weighted averages of past observations. Nonetheless, they produce forecasts
that are competitive with more advanced models and which may be easier to
interpret.
Available models include:
- Simple exponential smoothing
- Holt's method
- Holt-Winters exponential smoothing
Improved time series index support
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Handling of indexes for time series models has been overhauled (#3272) to
take advantage of recent improvements in Pandas and to shift to Pandas much of
the special case handling (especially for date indexes) that had previously been
done in statsmodels. Benefits include more consistent behavior, a reduced
number of bugs from corner cases, and a reduction in the maintenance burden.
Although an effort was made to maintain backwards compatibility with this
change, it is possible that some undocumented corner cases that previously
worked will now raise warnings or exceptions.
State space models
~~~~~~~~~~~~~~~~~~
The state space model infrastructure has been rewritten and improved (#2845).
New features include:
- Kalman smoother rewritten in Cython for substantial performance improvements
- Simulation smoother (Durbin and Koopman, 2002)
- Fast simulation of time series for any state space model
- Univariate Kalman filtering and smoothing (Koopman and Durbin, 2000)
- Collapsed Kalman filtering and smoothing (Jungbacker and Koopman, 2014)
- Optional computation of the lag-one state autocovariance
- Use of the Scipy BLAS functions for Cython interface if available
(`scipy.linalg.cython_blas` for Scipy >= 0.16)
These features yield new features and improve performance for the existing
state space models (`SARIMAX`, `UnobservedComopnents`, `DynamicFactor`, and
`VARMAX`), and they also make Bayesian estimation by Gibbs-sampling possible.
**Warning**: this will be the last version that includes the original state
space code and supports Scipy < 0.16. The next release will only include the
new state space code.
Unobserved components models: frequency-domain seasonals
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Unobserved components models now support modeling seasonal factors from a
frequency-domain perspective with user-specified period and harmonics
(introduced in #4250 by Jordan Yoder). This not only allows for multiple
seasonal effects, but also allows the representation of seasonal components
with fewer unobserved states. This can improve computational performance and,
since it allows for a more parsimonious model, may also improve the
out-of-sample performance of the model.
Major Bugs fixed
----------------
* see github issues for a list of bug fixes included in this release
https://github.com/statsmodels/statsmodels/pulls?utf8=%E2%9C%93&q=is%3Apr+is%3Amerged+milestone%3A0.9+label%3Atype-bug
https://github.com/statsmodels/statsmodels/pulls?q=is%3Apr+is%3Amerged+milestone%3A0.9+label%3Atype-bug-wrong
* Refitting elastic net regularized models using the `refit=True`
option now returns the unregularized parameters for the coefficients
selected by the regularized fitter, as documented. #4213
* In MixedLM, a bug that produced exceptions when calling
`random_effects_cov` on models with variance components has been
fixed.
Backwards incompatible changes and deprecations
-----------------------------------------------
* DynamicVAR and DynamicPanelVAR is deprecated and will be removed in
a future version. It used rolling OLS from pandas which has been
removed in pandas.
* In MixedLM, names for the random effects variance and covariance
parameters have changed from, e.g. G RE to G Var or G x F Cov. This
impacts summary output, and also may require modifications to user
code that extracted these parameters from the fitted results object
by name.
* In MixedLM, the names for the random effects realizations for
variance components have been changed. When using formulas, the
random effect realizations are named using the column names produced
by Patsy when parsing the formula.
Development summary and credits
-------------------------------
Besides receiving contributions for new and improved features and for bugfixes,
important contributions to general maintenance for this release came from
* Kevin Sheppard
* Peter Quackenbush
* Brock Mendel
and the general maintainer and code reviewer
* Josef Perktold
Additionally, many users contributed by participation in github issues and
providing feedback.
Thanks to all of the contributors for the 0.9 release (based on git log):
.. note::
* Aleksandar Karakas
* Alex Fortin
* Alexander Belopolsky
* Brock Mendel
* Chad Fulton
* ChadFulton
* Christian Lorentzen
* Dave Willmer
* Dror Atariah
* Evgeny Zhurko
* Gerard Brunick
* Greg Mosby
* Jacob Kimmel
* Jamie Morton
* Jarvis Miller
* Jasmine Mou
* Jeroen Van Goey
* Jim Correia
* Joon Ro
* Jordan Yoder
* Jorge C. Leitao
* Josef Perktold
* Joses W. Ho
* José Lopez
* Joshua Engelman
* Juan Escamilla
* Justin Bois
* Kerby Shedden
* Kernc
* Kevin Sheppard
* Leland Bybee
* Maxim Uvarov
* Michael Kaminsky
* Mosky Liu
* Natasha Watkins
* Nick DeRobertis
* Niels Wouda
* Pamphile ROY
* Peter Quackenbush
* Quentin Andre
* Richard Höchenberger
* Rob Klooster
* Roman Ring
* Scott Tsai
* Soren Fuglede Jorgensen
* Tom Augspurger
* Tommy Odland
* Tony Jiang
* Yichuan Liu
* ftemme
* hugovk
* kiwirob
* malickf
* tvanzyl
* weizhongg
* zveryansky
These lists of names are automatically generated based on git log, and may not
be complete.
|
Guard Joshua Garnett and defensive tackle Solomon Thomas are still highly regarded, at least in the eyes of general manager John Lynch.
But they’ve been afterthoughts as the 49ers have snowballed to a 1-9 start, especially Garnett, a 2016 first-round draft pick who’s spending this season on injured reserve to rehabilitate a knee injury and reshape is body.
Thomas, as the No. 3 overall pick this year, has been almost just as tough to analyze. That’s mainly because the injury-laden 49ers haven’t been able to use him in their ideal manner: as an interior pass-rusher who should overrun guards.
A knee injury sidelined Thomas the past two games, but he might return Sunday when the 49ers come off their bye to host the Seattle Seahawks. Thomas has two sacks, and his 26 tackles are the team’s 12th-most this season.
“I challenge anyone to say he hasn’t played extremely well,” Lynch said Tuesday. “He’s been a very solid player. It will only get better. Part of our vision for where he was going to excel was in the sub package, in the nickel stuff as an inside rusher.
“We aren’t in a complete process there so we’ve to generate pass rush more, so that has taken away from his ability to line up on a guard and go to work on him. As we add pieces, he’ll get only better. I’m really extremely positive on his future for a long, long time for us.”
Lynch said Thomas’ injury-induced hiatus “almost came at a good time” because he saw Thomas showing signs of fatigue from a heavy workload.
“I overthink sometimes,” Thomas told the Sacramento Bee. “Just trying to adjust to this scheme. You know, I haven’t really played on the edge much my whole career. So adjusting to that and to moving inside during games.
“I’m adjusting to it all. It’s taken me longer than I expected, but I’m working hard to make sure I fix some things and become the best player I can be out there.”
Thomas was taken after the Cleveland Browns took pass rusher Myles Garrett (four sacks in five games after an injury-delayed start) and the Chicago Bears traded up with the 49ers to draft quarterback Mitchell Trubisky (2-4 since becoming their starter). Other rookies off to solid starts: cornerback Marshon Lattimore (Saints), safety Jamal Adams (Jets), running backs Kareem Hunt (Chiefs) and Leonard Fournette (Jaguars), and, pass rushers T.J. Watt (Steelers) and Derek Barnett (Eagles).
“I’ve been very, very pleased with Solomon,” Lynch added. “Some people are saying, ‘Hey, the No. 3 pick should be perhaps a little more dynamic.’ But his play has been solid. We knew it would be a process. He’s a young kid and physically will grow in stature.”
Speaking of physical growth, that is what the 49ers challenged Garnett to do in this medical-redshirt season. He was lining up as their starting left guard a week into training camp before requiring minor surgery.
When Garnett returns next year, he figures to compete for that starting spot which at first was held by Zane Beadles this season before he gave way to Laken Tomlinson.
“We took a long-term view with Josh,” Lynch said. “It could have been something where we put him on designated to return (from injured reserve). But we said let’s give the guy an opportunity to really get this thing right. We felt it would have been rushing it, given the information we had. We said this guy is not just a first-round pick but somebody we watched and feel could be a nice fit with what we do.”
Joshua Garnett celebrates a 49ers touchdown in last season’s finale against the Seattle Seahawks. (Photo by Ezra Shaw/Getty Images)
But Garnett (6–foot-5, 321 pounds) has to change himself to make that fit work.
“He’s working his tail off. He’s done a great job changing his body composition,” Lynch said. “We took a real holistic look – I challenged everybody on our medical, strength, conditioning, to our functional performance, to our nutrition – and we challenged Josh. ‘We want to do this and here’s why. We also want you to use this as an opportunity to really improve yourself in every aspect.’
“We’re going to try to use that as a model for anybody in a situation like him, and it’s working really well.”
Those endorsements, of course, were coming from a fellow Stanford man, one who attended last Saturday’s Big Game with his son, Jake, a linebacker being recruited by his dad’s alma mater. But Lynch spoke highly about any player brought up Tuesday in a 40-minute media session. If two linemen can live up to their projections, Lynch and the 49ers will have more good things to say in 2018 and beyond. |
A vehicle-mounted electronic control device, such as a general motor-driving inverter device, has a structure where an electronic component unit equipped with a semiconductor switching element, a control circuit, etc. is received in a protective space (a space provided with waterproofing, etc.) inside of a housing prepared by assembling and joining a plurality of housing members (for example, Patent Publications 1 and 2).
As a specific example of the electronic control device, there is known a structure in which two housing members (housing members, etc. to be opposingly arranged and joined) to be joined with each other are fastened by a fastening means (screw, etc.) for joining in a condition an elastic packing (rubber packing, etc.) is interposed between their joining surfaces to seal the joining surfaces (for example, Patent Publication 3). Furthermore, there is also known a structure in which a sealing groove is formed on the joining surface of one housing member, and they are fastened together by a fastening means for joining in a condition where an elastic packing is fitted into the sealing groove (for example, Patent Publications 4 and 5). Besides, instead of applying an elastic packing, it is possible to think of a structure in which they are joined in a condition that the sealing groove is filled with a sealing material (a sealing material with fluidity and adhesion, such as liquid gasket), and then the joining surfaces are sealed by hardening the sealing material. |
Archive for the ‘Uncategorized’ Category
The Supreme Court has allowed the appeal by a former cohabitee that she should get 90 per cent of the former couple’s home, restoring the trial judge’s decision to depart from the traditional assumption that interest in the property should be split 50-50. Giving the lead judgment, Lady Hale said the trial judge had correctly found that the couple’s intention after they separated “did change significantly” from their initial plans when they moved in together to “provide a home for themselves and their progeny”. When they separated, the couple sought to sell the property but eventually took it off the market, preferring to cash in a life insurance policy the proceeds of which allowed Mr Kernott to buy his own property. “The logical inference is that they intended that his interest in [the property] should crystallise then,” Lady Hale said. “Just as he would have the sole benefit of any capital gain in his own home, Ms Jones would have the sole benefit of any capital gain in [the property]. “Insofar as the judge did not in so many words infer that this was their intention, it is clearly the intention which reasonable people would have had had they thought about it at the time. But in our view it is an intention which he both could and should have inferred from their conduct,” she said. She went on: “A rough calculation on this basis produces a result so close to that which the judge produced that it would be wrong for an appellate court to interfere.”
To avoid going to court you should formerly set out your share from the outset. Come to Partridge Allen we will assist you with this. |
/* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
/* */
/* This file is part of the program and library */
/* SCIP --- Solving Constraint Integer Programs */
/* */
/* Copyright (C) 2002-2013 Konrad-Zuse-Zentrum */
/* fuer Informationstechnik Berlin */
/* */
/* SCIP is distributed under the terms of the ZIB Academic License. */
/* */
/* You should have received a copy of the ZIB Academic License. */
/* along with SCIP; see the file COPYING. If not email to scip@zib.de. */
/* */
/* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
/**@file objmessagehdlr.cpp
* @brief C++ wrapper for message handlers
* @author Tobias Achterberg
*/
/*---+----1----+----2----+----3----+----4----+----5----+----6----+----7----+----8----+----9----+----0----+----1----+----2*/
#include <cassert>
#include "objmessagehdlr.h"
/*
* Data structures
*/
/** message handler data */
struct SCIP_MessagehdlrData
{
scip::ObjMessagehdlr* objmessagehdlr; /**< message handler object */
SCIP_Bool deleteobject; /**< should the message handler object be deleted when message handler is freed? */
};
/*
* Callback methods of file reader
*/
extern "C"
{
/** warning message print method of message handler */
static
SCIP_DECL_MESSAGEWARNING(messagehdlrWarningObj)
{ /*lint --e{715}*/
SCIP_MESSAGEHDLRDATA* messagehdlrdata;
messagehdlrdata = SCIPmessagehdlrGetData(messagehdlr);
assert(messagehdlrdata != NULL);
assert(messagehdlrdata->objmessagehdlr != NULL);
/* call virtual method of messagehdlr object */
messagehdlrdata->objmessagehdlr->scip_warning(messagehdlr, file, msg);
}
/** dialog message print method of message handler */
static
SCIP_DECL_MESSAGEDIALOG(messagehdlrDialogObj)
{ /*lint --e{715}*/
SCIP_MESSAGEHDLRDATA* messagehdlrdata;
messagehdlrdata = SCIPmessagehdlrGetData(messagehdlr);
assert(messagehdlrdata != NULL);
assert(messagehdlrdata->objmessagehdlr != NULL);
/* call virtual method of messagehdlr object */
messagehdlrdata->objmessagehdlr->scip_dialog(messagehdlr, file, msg);
}
/** info message print method of message handler */
static
SCIP_DECL_MESSAGEINFO(messagehdlrInfoObj)
{ /*lint --e{715}*/
SCIP_MESSAGEHDLRDATA* messagehdlrdata;
messagehdlrdata = SCIPmessagehdlrGetData(messagehdlr);
assert(messagehdlrdata != NULL);
assert(messagehdlrdata->objmessagehdlr != NULL);
/* call virtual method of messagehdlr object */
messagehdlrdata->objmessagehdlr->scip_info(messagehdlr, file, msg);
}
/** destructor of message handler to free message handler data */
static
SCIP_DECL_MESSAGEHDLRFREE(messagehdlrFree)
{ /*lint --e{715}*/
SCIP_MESSAGEHDLRDATA* messagehdlrdata;
messagehdlrdata = SCIPmessagehdlrGetData(messagehdlr);
assert(messagehdlrdata != NULL);
assert(messagehdlrdata->objmessagehdlr != NULL);
/* call virtual method of messagehdlr object */
SCIP_CALL( messagehdlrdata->objmessagehdlr->scip_free(messagehdlr) );
/* free message handler object */
if( messagehdlrdata->deleteobject )
delete messagehdlrdata->objmessagehdlr;
/* free message handler data */
delete messagehdlrdata;
SCIP_CALL( SCIPmessagehdlrSetData(messagehdlr, NULL) ); /*lint !e64*/
return SCIP_OKAY;
}
}
/*
* message handler specific interface methods
*/
/** creates the message handler for the given message handler object */
SCIP_RETCODE SCIPcreateObjMessagehdlr(
SCIP_MESSAGEHDLR** messagehdlr, /**< pointer to store the message handler */
scip::ObjMessagehdlr* objmessagehdlr, /**< message handler object */
SCIP_Bool deleteobject /**< should the message handler object be deleted when message handler is freed? */
)
{
SCIP_MESSAGEHDLRDATA* messagehdlrdata;
SCIP_RETCODE retcode;
/* create file messagehdlr data */
messagehdlrdata = new SCIP_MESSAGEHDLRDATA;
messagehdlrdata->objmessagehdlr = objmessagehdlr;
messagehdlrdata->deleteobject = deleteobject;
/* create message handler */
retcode = SCIPmessagehdlrCreate(messagehdlr, objmessagehdlr->scip_bufferedoutput_, (const char*)NULL, FALSE,
messagehdlrWarningObj, messagehdlrDialogObj, messagehdlrInfoObj,
messagehdlrFree, messagehdlrdata); /*lint !e429*/
if( retcode != SCIP_OKAY )
{
/* free message handler object */
if( messagehdlrdata->deleteobject )
delete messagehdlrdata->objmessagehdlr;
delete messagehdlrdata;
SCIP_CALL( retcode );
}
return SCIP_OKAY; /*lint !e429 !e593*/
}
/** returns the message handler object for the given message handler */
scip::ObjMessagehdlr* SCIPgetObjMessagehdlr(
SCIP_MESSAGEHDLR* messagehdlr /**< message handler */
)
{
SCIP_MESSAGEHDLRDATA* messagehdlrdata;
messagehdlrdata = SCIPmessagehdlrGetData(messagehdlr);
assert(messagehdlrdata != NULL);
return messagehdlrdata->objmessagehdlr;
}
|
Jajá (Brazilian footballer)
Francisco Jaílson de Sousa (born November 29, 1986 in Itapipoca), or simply Jajá, is a Brazilian attacking midfielder. He is currently plays for Jiangxi Liansheng in the China League One.
Career History
On 2005, Jaja started his senior football career in Bahia. On 2006, when he joined Cruzeiro on a 6-year contract. On 2008, he played 17 matches for Cruzeiro, however he could not have a good performance. Between 2006 and 2012, he played on loan in many Brazilian football clubs in Série B and Série C of Brazilian football league. On 2009, he also played for a short time in Montedio Yamagata in J1 League in Japan. On January 2013, he joined Guarani-MG, a football club competing in Série D.
In July 2014, he joined Atlético CP in Portugal.
Honours
Cruzeiro
Campeonato Mineiro: 2008
Vitória
Campeonato Baiano: 2009
Boa Esporte
Taça Minas Gerais: 2012
References
External links
Guardian.uk statistics
Jajá at ZeroZero
Category:1986 births
Category:Living people
Category:Brazilian footballers
Category:Esporte Clube Bahia players
Category:Cruzeiro Esporte Clube players
Category:Ipatinga Futebol Clube players
Category:Associação Desportiva Cabofriense players
Category:Clube Náutico Capibaribe players
Category:Vila Nova Futebol Clube players
Category:Sociedade Esportiva e Recreativa Caxias do Sul players
Category:Montedio Yamagata players
Category:Horizonte Futebol Clube players
Category:Campeonato Brasileiro Série B players
Category:J1 League players
Category:Expatriate footballers in Japan
Category:Atlético Clube de Portugal players
Category:LigaPro players
Category:China League One players
Category:Jiangxi Liansheng players
Category:Expatriate footballers in China
Category:Brazilian expatriate sportspeople in China
Category:Brazilian expatriate footballers
Category:Expatriate footballers in Portugal
Category:Brazilian expatriate sportspeople in Portugal
Category:Association football midfielders |
IT company to create 300 jobs in St. Louis
Governor Jay Nixon announces Unisys will hire 300 people in St. Louis.
(Photo by Bill Greenblatt/UPI)
By Maria Altman/Rebecca Thiele, St. Louis Public Radio
St. Louis, MO – A global IT company is promising to bring 300 new jobs in St. Louis.
The Unisys Corporation announced Thursday plans to build a technology center in St. Louis that will develop applications for Mac computers, and Apple's iPhone and iPad.
The center will employ about 300 people, making an average of $55,000 a year. Unisys Vice President Ted Davies said the company is expanding.
"We have a long term relationship with USDA as well as clients at Scott Air Force Base," Davies said. "We have a team on the ground already and we are continuing to grow, we've won some new work recently with the Department of Agriculture. So we plan to add 75 more jobs by the end of this year and growing to 300 by the end of 2012."
The company received $4.5 million in state tax incentives credits and an additional $1 million to help recruit and train employees. Governor Jay Nixon said the state expects to see a return on its investment quickly.
"The first job they add with Quality Jobs incentives, we will see a benefit off that right at the start," Nixon said.
The governor said employees are already working at a temporary site and plan to move to a permanent location later this year. |
De novo characterization of the antler tip of Chinese Sika deer transcriptome and analysis of gene expression related to rapid growth.
Deer antlers are well known for their regeneration and rapid growth. However, little is known about the genes that are involved in their development, especially the molecular mechanisms responsible for rapid growth. In the present study, we produced more than 41 million sequencing reads using the Illumina sequencing platform. These reads were assembled into 89,001 unique sequences (mean size: 450 bp), representing more than 58 times as many Sika deer sequences previously available in the NCBI database (as of Sep 15, 2011). Based on a similarity search with known proteins, we identified 40,088 sequences with a cut-off E value of 10(-5). Assembled sequences were then annotated using Gene ontology terms, Clusters of Orthologous Groups classifications, and Kyoto Encyclopedia of Genes and Genomes pathways. In addition, we found a number of highly expressed genes involved in the regulation of Sika deer antler rapid growth, including transcription factors, signaling molecules, and extracellular matrix proteins. Our data represent the most comprehensive sequence resource available for the deer antler and provide a basis for new research on deer antler molecular genetics and functional genomics. |
Master of Magic, Age of Wonders, Civs, or Elemental War of Magic multiplayer anyone
December 8th, 2011, 06:37
Would like to start a group playing some civ games online, starting with the fantasy setting, games especially Master of Magic, then Elemental war of magic and Age of Wonders 2, then others like galactic civs and civ 4 & 5.
So is anyone familiar with Master of Magic and how o play online?
— To sum it up, I feel our space program ended up like this. "It's one small step for man. One giant leap for man kind. Oops I fell on my butt after that leap and can't get up anymore." |
Advice—April 2006
Dear Sparkle,
I was separated from my birth mommy too early. I think that she was sick. When my human found me I was only five weeks old and I had been abandoned. So now every time I get into a “comfortable” situation (anything that makes me purr) I start drooling. Then I start licking and trying to nurse from whatever I’m licking. It started off just being the comforter that my human sleeps under (since I love to sleep in her bed!) but now I’ll lick whatever it is that’s around when I start purring. I know that these impulses are caused by the natural instincts to feel nurtured when I’m feeling good, but what can I do to stop licking every blanket in sight?
Signed,
Mommy’s Cat
Dear Mommy’s Cat,
Humans are strange when it comes to how they feel about cats who lick and suck. Sometimes they think the habit is kittenish and cute, but eventually they start getting annoyed, which I really don’t understand—I mean, why do they coo over something one moment and then get mad at us later on for doing the very same thing? Occasionally it has to do with—as they put it—”ruining” a blanket or sweater… as if they have a better use for it than we do. You don’t say whether your human is starting to give you a hard time about your licking habit but since you wrote to me I figure that maybe she has. And of course that means the two of you need to come to an agreement. Compromise is one of the downsides of cohabitating with humans.
Hopefully your human realizes that nothing is going to stop your licking and sucking habit completely, but she can do things to keep herself happy without cramping your style too much. One thing she can do—and this is actually pretty cool—is distract you with toys when you start getting too fixated on a blanket. Most of the time playing is actually a lot more fun than licking a blanket. Or she can designate one small blanket as being yours and yours alone and gently nudge it under your mouth every time you start your licking habit. That way you’re only “destroying” one blanket, and you still get to have your little blissful moments. In a pinch, if she really doesn’t want you sucking something in particular, she can blow in your face.
I’ve heard some people recommend really nasty things, like making loud noises every time a cat displays this behavior, or spraying the cat with water, or putting bad-tasting stuff on the fabric that the cat is licking. In my opinion, these are not acceptable solutions. They are mean and show no respect for us cats. Maybe putting something bitter on an electrical cord is okay—after all, that’s for our own safety—but not when we’re in such a pleasantly comfortable and dreamy state. But of course, that’s just my own opinion.
One thing that may be a concern is your drooling. Sometimes cats who lick and suck will drool because their actions feels so good, but it could also indicate that you need to have your mouth looked at. You could be developing gingivitis or tooth decay, and if that’s the case it should be addressed. Even relatively young cats can have mouth problems, and gum diseases can lead to other serious illnesses in cats (humans too).
Lastly, be careful about getting really obsessive about your licking and sucking. While humans seem to take a lot of enjoyment in complaining about things we cats do, there are times when a habit really does get out of hand. If that is the case with you, then you may need to consult with your vet about medication. Cats will occasionally develop obsessive-compulsive disorder (I think it’s because humans drive us up a wall), and drugs actually can help. |
1. Introduction {#sec1-insects-08-00107}
===============
The abundance of many bee and other pollinator species has been declining for a variety of reasons, including increased pesticide usage, agricultural practices, habitat fragmentation, invasive species, spread of pathogens, and climate change \[[@B1-insects-08-00107]\]. Conversely, solitary wasps that may be important for control of pest insects \[[@B2-insects-08-00107]\] may also be negatively affected by intensive agriculture \[[@B3-insects-08-00107]\] and, thus, habitat diversity may benefit some predatory wasp species \[[@B4-insects-08-00107]\]. Many common agricultural practices (e.g., plowing, planting monocultures, etc.) are considered harmful to bees and wasps \[[@B5-insects-08-00107]\], as well as overall floral and faunal biodiversity \[[@B6-insects-08-00107]\]. Agricultural intensification has removed pollinator foraging and nesting habitats, resulting in reduced pollination services available for crops \[[@B7-insects-08-00107]\], and has caused a significant decline of biodiversity \[[@B8-insects-08-00107]\]. In Europe, sown wildflower strips planted near intensively farmed areas are becoming increasingly popular for the purpose of augmenting insect pollinator populations and biological control agents \[[@B9-insects-08-00107]\]. Overall, wildflower strips generally positively impact pollinator abundance and species richness \[[@B8-insects-08-00107]\]. Some researchers have documented higher abundances of pollinators in crops that have wildflower strips growing nearby \[[@B10-insects-08-00107]\]. However, others have found the opposite for some insect species. For example, despite higher abundances in sown wildflower strips, butterfly species richness was not significantly different in wildflower strips compared to that in extensively managed meadows \[[@B11-insects-08-00107]\]. There is also some concern that field margins may shelter potential agricultural pests that could spill over onto adjacent crops \[[@B12-insects-08-00107]\]. Some predatory wasps have been shown to be more abundant in agricultural areas that have greater habitat diversity \[[@B4-insects-08-00107]\] and, therefore, some agricultural practices could help with pest management. As a result, it is important to know more about how wildflower plantings impact beneficial (pollinators, biological control agents) and pest insect species.
Bees and wasps are examples of beneficial insects that might be impacted by wildflower plantings \[[@B8-insects-08-00107]\]. Some solitary bees and wasps utilize tunnels in dead wood or grass stems as nest sites (these usually are called "trap-nesting" bees and wasps) \[[@B13-insects-08-00107]\]. They comprise about 5% of all bee and wasp species \[[@B13-insects-08-00107]\], and knowing how they are impacted by wildflower plantings is important for a few different reasons. First, these bees and wasps can be used as bioindicators for ecological change \[[@B14-insects-08-00107]\], with trap-nesting Hymenoptera exhibiting species richness declines within fragmented landscapes \[[@B15-insects-08-00107]\]. Second, trap-nesting wasp diversity can be an indicator of predator/prey interactions, as they may act as biological controls for many insects \[[@B15-insects-08-00107]\]. Third, declines in bee diversity or insect pollinator activity have been shown to cause reduced pollen loads on plants, resulting in lower seed set in plants and decreased plant fitness \[[@B16-insects-08-00107],[@B17-insects-08-00107]\]. These disruptions of pollination systems can lead to a cascade of bottom-up or top-down ecosystem effects \[[@B16-insects-08-00107]\].
The aim of this study was to determine if small (0.1 ha) planted wildflower strips can increase the number of bamboo reeds occupied by trap-nesting bees and wasps at a given site. Reeds similar to the ones we used are commonly deployed by homeowners and others to increase nesting sites for bees and wasps that can act as pollinators and/or biological control agents \[[@B18-insects-08-00107]\]. Graham \[[@B19-insects-08-00107]\] used trap-nests within the same region as our study, and captured higher abundances of wasps compared to bees despite numerous trap-nesting bees inhabiting this region. However, these trap-nests were randomly placed, and were not placed near wildflowers \[[@B19-insects-08-00107]\]. We hypothesized that the increased floral resources and potential increased prey abundances provided by planted wildflowers plots would result in increased occupation of reeds by trap nesting bees and wasps near the wildflower plots compared to those in fallow controls.
2. Experimental Section {#sec2-insects-08-00107}
=======================
2.1. Study Sites {#sec2dot1-insects-08-00107}
----------------
Eight sites located within agriculturally dominated areas were selected within North-Central Florida ([Figure 1](#insects-08-00107-f001){ref-type="fig"}). All of the sites were located near various crop fields. Each site contained two plots (0.1 ha each), one planted with wildflowers and a second as a fallow control plot, that were located approximately 500 m apart. The relatively short distance between the wildflower and control plots ensured that land use would be similar at a given site and that bees and wasps could potentially visit either plot. Each wildflower plot was prepared for seeding by application of glyphosate and mowing to minimize weed competition with the wildflowers. In October/November 2014, nine native annual and perennial herbaceous flowering plant species ([Table 1](#insects-08-00107-t001){ref-type="table"}) that had been shown to perform well in north Florida agricultural systems \[[@B20-insects-08-00107]\] were hand broadcast within the wildflower plot. In the wild, these wildflowers produce and drop most of their seeds in the fall and our seeding attempted to mimic the natural systems. For each wildflower plot, partridge pea was restricted to a small portion of the plot (\~15% of the area) due to its potential to outcompete other seeded species. A hand seed roller was used immediately after seeding to maximize seed-to-soil contact. During the following spring and summer, the removal of non-desirable weedy species was performed as needed through hand removal, the application of a post-emergence herbicide (i.e., glyphosate or clethodim), and/or mowing. The unenhanced fallow control plots consisted primarily of grasses (Poaceae or Gramineae). The fallow control plots were similar in plant composition to that of the wildflower plots prior to preparing the plots for seeding. The control plots were maintained at the discretion of the landowner and therefore some were mowed every few weeks, while others were mowed only once or twice a year. No flowering forbs or other plants were documented within the fallow control sites during the course of this research.
2.2. Trap-Nests {#sec2dot2-insects-08-00107}
---------------
A set of trap-nests was placed on the edge of each wildflower and fallow control plot shortly before seeding of the wildflower plots (August 2014). The set of trap-nests consisted of three PVC pipes (ID 8.9 cm) within a corrugated plastic box placed 1.5 m above the ground ([Figure 2](#insects-08-00107-f002){ref-type="fig"}). Each PVC pipe contained \~25 pieces of bamboo reed (*Bambusa* sp.). Each reed was 19--22 cm in length, and was cut after an internode, or had one side sealed with concrete to ensure a single entrance into the reed. Reeds with openings of varying inside diameters (IDs) were placed within each PVC pipe to provide nesting resources appropriate to accommodate a wide range of potential hymenopteran species. Available reed IDs ranged from 2.8 mm to 13.4 mm. Between August 2014 and November 2015, reeds were checked every 2--3 weeks, and occupied nests (reeds in which nests were constructed) were removed from the nest-box and replaced with new reeds. The occupied reeds were labeled (date collected and site locality), and a plastic vial was placed over the opening of each occupied reed to collect emerging adults. The occupied reeds were stored outside in an open-air enclosure. The ID of each reed opening was measured using a digital caliper after all insects had emerged from the reed. The first insects emerged in October 2014, and the last emerged in May 2016.
2.3. Data Analysis {#sec2dot3-insects-08-00107}
------------------
Paired *t*-tests were used to determine differences in the number of (1) nests occupied by the various wasp species (abundance); (2) species within the occupied nests (species richness); and (3) wasp prey item availability between augmented wildflower plots and fallow control plots. Reeds that were occupied between April 2015 and November 2015 were used for this analysis because this was when the wildflower plots were in bloom, and thus when they were able to have the greatest impact on nest construction in the reeds. Reed data were averaged from each site during the collection period and a square root transformation was accomplished to assure normality. Only wasp genera for which a minimum of 25 nested reeds were used were included in the abundance analysis. Bee usage of the reeds never reached this threshold. Correspondingly, bee abundance data were not analyzed. Data transformation did not normalize reed ID data and, therefore, a Kruskal-Wallis test was used to determine how reed ID influenced nest construction by the various wasp and bee genera. All analyses were conducted using Statistix 9.0 (Analytical Software, Tallahassee, FL, USA).
3. Results {#sec3-insects-08-00107}
==========
During the flowering period (April--November 2015), bees and wasps constructed nests in a total of 400 reeds throughout the wildflower and fallow control plots. These occupied reeds yielded 1100 individual Hymenopterans and some associated brood parasites. An additional 286 reeds (475 emerging individuals) were gathered prior to the flowering period (August 2014--March 2015). A total of sixteen species of bees and wasps emerged from the reeds along with 12 natural enemies (other wasps, flies, and beetles) ([Table 2](#insects-08-00107-t002){ref-type="table"}). *Pachodynerus erynnis* (Vespidae) was the most common species to emerge from the reeds, emerging from 24.6% of all occupied reeds ([Table 2](#insects-08-00107-t002){ref-type="table"}). They were followed by *Euodynerus megaera* (Vespidae, 15% of occupied reeds), and *Parancistrocerus pedestris* (Vespidae, \~12% of occupied reeds) ([Table 2](#insects-08-00107-t002){ref-type="table"}). The most common brood parasites were from the genus *Chrysis* (Chrysididae) and were found in 9% of all occupied reeds followed by dipterans (2.8%, fly) and natural enemies Ripiphoridae (2.5%, beetle) ([Table 2](#insects-08-00107-t002){ref-type="table"}). Bees from four *Megachile* species emerged from only 11 reeds (1.6% of all occupied reeds) ([Table 2](#insects-08-00107-t002){ref-type="table"}). Overall, diverse food types were represented among the trap-nesting wasps/bees \[[@B13-insects-08-00107],[@B21-insects-08-00107],[@B22-insects-08-00107]\] ([Table 2](#insects-08-00107-t002){ref-type="table"}) as were variable emerging success rates for the various genera/species ([Table 3](#insects-08-00107-t003){ref-type="table"}).
No significant differences in the number of occupied reeds by common (N \> 25 occupied reeds) wasp genera or number of reeds utilized by all parasites were detected between trap-nests placed adjacent to wildflower and those placed adjacent to fallow control plots (*p* \> 0.05; [Table 4](#insects-08-00107-t004){ref-type="table"}). Likewise, no significant difference in species richness of bees or wasps in the occupied reeds was detected between the wildflower and fallow control plots (*p* = 0.389). Reed ID significantly impacted which bee and wasp genera would utilize a given reed as a nest site, with many wasp genera preferring to nest within a narrow range of IDs ([Figure 3](#insects-08-00107-f003){ref-type="fig"}). Wasps or bees emerged from 54% of occupied reeds that also contained natural enemies.
4. Discussion {#sec4-insects-08-00107}
=============
Although wildflower enhancements on farmlands have been used to help augment the numbers of pollinating insects \[[@B9-insects-08-00107],[@B10-insects-08-00107],[@B23-insects-08-00107]\] and arthropod predators \[[@B24-insects-08-00107],[@B25-insects-08-00107]\] adjacent to crops, our data indicated that such enhancements did not increase nest construction by trap-nesting bees or wasps. Tscharntke et al. \[[@B14-insects-08-00107]\] found that trap-nesting wasp occupancy of nests was doubled by adding numerous trap nests, supporting the notion that nest site availability may be more important to nest-seeking wasps than habitat quality.
Tunnel-nesting wasps occupied the majority (\~97.5% nests) of reeds containing nests in this study. Only a few megachilid bees utilized the trap-nests (\~2.5% nests) (excluding bee/wasp parasites). Similarly, Graham \[[@B19-insects-08-00107]\] found that a higher percentage of wasps nested in hollow reeds than did bees in the same region our study was conducted. The wasps collected often utilize nectar, and sometimes use pollen as adults \[[@B26-insects-08-00107]\], but feed their young solely arthropod prey. Therefore, wasps that utilize trap-nests may be more apt at successfully identifying habitats with abundant prey rather than those with high floral diversity \[[@B15-insects-08-00107],[@B27-insects-08-00107]\]. Species richness and abundance of trap-nesting wasps have been found to be unrelated to plant species richness \[[@B15-insects-08-00107],[@B27-insects-08-00107]\]. Due to the small size of the enhanced wildflower plots utilized in this study, wasps would have foraged outside the experimental plots, thus making it possible that wasp prey could also have gathered outside the experimental plots. Pfiffner et al. \[[@B28-insects-08-00107]\] found that enhanced wildflower strips did not always increase lepidopteran egg predator or parasite abundance and that their abundance was more closely related to site-specific environmental factors. Trap-nests have been used as a conservation tool to augment pollinating bees numbers, but have also been found to be attractive to wasps that can contribute to pollination and also help to control some arthropod pest species \[[@B18-insects-08-00107]\].
Bee/wasp utilization of reeds with openings of various IDs was significantly different among the genera, such that genera with larger/longer bodies generally nested in reeds with larger ID openings. Wasps and bees have been shown to have nest entrance size preferences \[[@B14-insects-08-00107],[@B25-insects-08-00107],[@B29-insects-08-00107]\]. Several cavity-nesting Megachilidae have specific nest opening size and structure requirements, and have been managed successfully for pollination services \[[@B30-insects-08-00107],[@B31-insects-08-00107]\]. Commercial trap-nests have been designed to trap and maintain populations of many species of Megachilidae bees for crop pollination. Although inundative release of small parasitoid wasps is a common practice to combat some pests \[[@B32-insects-08-00107]\], no commercial trap-nests for wasps are designed and utilized for biological control. The majority of the aculeate wasp species collected in this study capture microlepidoptera to feed to their young, whereas others prey upon Gryllidae, other Orthopterans, and spiders. Many of these arthropods are common pests within agricultural and residential settings. Due to the narrow range in nest ID preferences of the wasps collected in this study, and their propensity to prey upon certain crop pests, the potential for directed biological control could exist and be augmented using appropriately sized nests.
Megachilidae, the only family of bees using the trap nests in this study, are dependent on nectar as adults, but also gather pollen and some nectar for the mass provisioning of their young. Interestingly, *Megachile lanata* was found in our southernmost experimental site. Native to India and parts of North Africa, it spread to the Antilles during the slave trade \[[@B33-insects-08-00107]\], and later expanded to southern Florida. To our knowledge, this is the first record of this bee collected from a trap-nest. In India, it is an important pollinator of sunn hemp (*Crotalaria juncea*), which is being experimentally tested as a cover crop in Florida \[[@B34-insects-08-00107]\]. Sunn hemp cannot be pollinated by small bees, and a lack of appropriate pollinators can result in reduced seed set \[[@B34-insects-08-00107]\]. Therefore, *M. lanata* could be used as a pollinator of sunn hemp if this plant becomes commercially grown in Florida.
Species richness and abundance of trap-nesting bees and wasps appeared to vary greatly among the sites, suggesting that many of these species have patchy distributions. This variation could be due to many factors, such as nesting/floral resource availability in time and space, pesticide use, surrounding land-use, or other site-specific characteristics \[[@B35-insects-08-00107]\]. The nest IDs of the majority of wasps have not been documented and our data suggests that some wasp species may be attracted to certain nest IDs.
The potential agricultural utility of wildflower strips should not be underestimated, as many benefits have been documented \[[@B9-insects-08-00107]\]. Habitat patches left within cropped areas of large-scale agricultural systems can increase native bee abundance and the corresponding pollination services they provide to adjacent crops \[[@B3-insects-08-00107],[@B36-insects-08-00107]\]. However, whether these beneficial species are simply foragers, or are utilizing the nearby patches for nesting sites is poorly understood. Floral resources are important for sustaining and attracting foraging pollinators. Despite this, nesting structure needs have largely been ignored by most researchers, and should be a priority for bee conservation \[[@B37-insects-08-00107]\]. Our data support the idea that nesting material can be used by trap-nesting wasps, regardless of the surrounding vegetation.
We thank Hennelly Irvin, Mary Bammer, Kane Barr, Steven Pelkey, Siria Gamez, and Josie Irvin for trap establishment, insect collection, and data entry; and Jon Bremer for fly identification. This project was funded by Syngenta as part of the *Operation Pollinator* initiative.
Joshua W. Campbell, Cory Stanley-Stahr, Jaret C. Daniels, and James D. Ellis contributed equally to the overall design of the research. Joshua W. Campbell analyzed the data and wrote the manuscript, with Chase B. Kimmel and Allyn Irvin contributing to the development of the manuscript. Cherice Smithers and Allyn Irvin gathered the data and assisted with data analysis.
The authors declare no conflict of interest.
{#insects-08-00107-f001}
{#insects-08-00107-f002}
{#insects-08-00107-f003}
insects-08-00107-t001_Table 1
######
List of native wildflowers and seed rates used to establish the wildflower plots for this study. \* Partridge pea was planted separately, i.e., in its own strip that occupied \~15% of the wildflower plot. The seeds were purchased from Wildflower Seed and Plant Growers Association (Crescent City, FL, USA).
Plant List Type Seed Rate (kg/ha)
------------------------------------------------------ ----------- -------------------
Partridge Pea (*Chamaecrista fasciculata*) Annual 1.12 \*
Goldenmane Tickseed (*Coreopsis basalis*) Annual 1.01
Lanceleaf Tickseed (*Coreopsis lanceolata*) Perennial 0.19
Leavenworth\'s Coreopsis (*Coreopsis leavenworthii*) Perennial 0.19
Indian Blanket (*Gaillardia pulchella*) Annual 3.03
Swamp Sunflower (*Helianthus angustifolius*) Perennial 0.37
Spotted Beebalm (*Monarda punctata*) Perennial 0.15
Blackeyed Susan (*Rudbeckia hirta*) Annual 0.59
Tall Ironweed (*Vernonia angustifolia*) Perennial 0.69
insects-08-00107-t002_Table 2
######
List of all insect species and number of reeds occupied by the species in the trap-nests from wildflower and fallow control plots at eight sites in Florida.
Order Family Species Site 1 Site 2 Site 3 Site 4 Site 5 Site 6 Site 7 Site 8 Total Food/Food Breadth
--------------------- --------------- ----------------------------------------------------------- -------- -------- -------- -------- -------- -------- -------- -------- ------- -------------------
Hymenoptera (Wasps) Chrysididae *C. inaequidens/wasbaueri* 0 1 0 1 0 0 0 1 3 Wasp/Bee
*Chrysis inaequidens* 0 1 0 4 5 3 5 1 19 Wasp/Bee
*Chrysis nisseri* 0 0 0 0 0 3 1 3 7 Wasp/Bee
*Chrysis pellucidula/remissa* 0 0 0 0 0 2 1 0 3 Wasp/Bee
*Chrysis remissa* 0 4 0 0 0 14 1 0 19 Wasp/Bee
*Chrysis tripartita* 0 0 0 0 0 1 0 0 1 Wasp/Bee
*Chrysis wasbaueri* 0 3 0 1 0 1 1 4 10 Wasp/Bee
Leucospididae *Leucospis affinis* 0 0 0 0 0 0 0 1 1 Bee
Crabronidae *Trypoxylon collinum* 0 8 1 0 8 1 0 1 19 Araneae
*Trypoxylon lacitarse* 0 0 0 0 0 0 2 1 3 Araneae
Sphecidae *Isodontia auripes* 0 14 14 1 6 0 0 9 44 Orthoptera
*Isodontia Mexicana* 1 15 2 0 2 0 14 2 36 Orthoptera
Vespidae *Euodynerus annulatus* 0 0 0 4 1 0 1 0 6 Lepidoptera
*Euodynerus hildalgo* 0 8 0 3 0 3 2 0 16 Lepidoptera
*Euodynerus megaera* 0 6 0 0 30 18 13 36 103 Lepidoptera
*Monobia quadridens* 0 11 0 0 3 3 0 12 29 Lepidoptera
*Pachodynerus erynnis* 2 36 22 24 5 40 37 3 169 Lepidoptera
*Pachodynerus nasidens* 0 0 0 7 0 0 0 0 7 Lepidoptera
*Parancistrocerus pedestris* 3 29 7 0 1 5 29 6 80 Lepidoptera
*Parancistrocerus fulvipes* 0 23 13 0 0 4 14 10 64 Lepidoptera
Hymenoptera (Bees) Megachilidae *Megachile lanata* 0 0 0 2 0 0 0 0 2 Polylectic
*Megachile parallela* 0 0 0 0 0 0 1 0 1 Polylectic
*Megachile policaris* 0 0 0 5 0 0 0 0 5 Polylectic
*Megachile xylocopoides* 0 1 0 0 0 0 2 0 3 Polylectic
Diptera Bombyliidae *Toxophora amphitea* 1 2 0 1 1 1 3 0 9 Wasp/Bee
Sarcophagidae Miltogramminae 1 3 0 1 1 1 2 1 10 Wasp/Bee
(incl. *Amobia* sp., *Senotainia* sp., *Phrosinella* sp.)
Coleoptera Ripiphoridae *Macrosiagon cruenta* 1 5 1 2 2 1 1 3 16 Wasp
*Macrosiagon* sp. 0 0 0 0 0 0 0 1 1 Wasp
Total 9 170 60 56 65 101 130 95 686
insects-08-00107-t003_Table 3
######
Average \# adults (SE) that emerged from reeds and ranges of adult emergences for common species/genera.
Avg. \#/Reed Range
------------------------------ -------------- -------
*Isodontia auripes* 3.0 (0.3) 1--8
*Isodontia mexicana* 3.7 (0.3) 1--7
*Trypoxylon* spp. 3.9 (0.5) 1--10
*Euodynerus annulatus* 2.2 (0.5) 1--3
*Euodynerus hildalgo* 3.1 (0.7) 1--11
*Euodynerus megaera* 2.0 (0.4) 1--8
*Monobia quadridens* 1.0 (0.3) 1--4
*Pachodynerus erynnis* 2.8 (0.2) 1--7
*Pachodynerus nasidens* 1.0 (0.4) 1--4
*Parancistrocerus pedestris* 1.1 (0.1) 1--6
*Parancistrocerus fulvipes* 1.0 (0.2) 1--3
*Megachile* spp. 2.7 (0.6) 1--6
insects-08-00107-t004_Table 4
######
Mean (±SE) abundance of occupied nests by the various wasp species, total parasites and species richness of wasps and bees collected April 2015--November 2015 between fallow control plots and augmented wildflower plots.
Fallow Controls Wildflower Plots P~trt~ (df = 7)
------------------------------ ----------------- ------------------ -----------------
*Euodynerus megaera* 1.9 (1.7) 1.6 (1.0) 0.85
*Isodontia auripes* 1.8 (1.6) 2.0 (1.1) 0.56
*Isodontia mexicana* 1.1 (0.7) 3.1 (1.5) 0.08
*Pachodynerus erynnis* 8.0 (3.3) 6.1 (2.3) 0.90
*Parancistrocerus pedestris* 4.6 (2.2) 4.6 (1.9) 0.90
*Parancistrocerus fulvipes* 2.5 (1.0) 1.8 (0.9) 0.55
Total parasites 3.1 (1.5) 2.3 (1.0) 0.66
Species richness 4.4 (0.8) 5.2 (0.7) 0.39
|
12 Healthy Energy Snacks For Your Workday
I’m not sure if it’s an American thing, a Southern thing, or just a Kaitlin thing, but this girl loves to snack. I’m like a little grandma — I keep a bag packed at all times with healthy snacks to keep myself from getting off track. Because seriously, eating healthy is hard enough without being hungry on top of it.
But what do you do when 10:30 a.m. hits and it’s too early for lunch but you’ve already eaten your breakfast? What about around 3 p.m. in the afternoon when your stomach starts to grumble and you look at it in fear, knowing it’ll be several hours before you’ll be home with a heaping dinner plate in front of your face?
You have a few options. You could hit up the vending machine and load up on sugar and soda, leading to an inevitable crash within a few hours
We’ve put together a list of our favorite healthy energy snacks to get you from clean meal to clean meal without any detours or diversions.
12 Healthy Energy Snacks
1. Popcorn
Photo by Alex Munsell
Some people consider popcorn healthy and some people don’t. For me personally, I think it’s fine in small amounts, especially if you’re choosing a brand that doesn’t have a lot of crazy ingredients and additives. The danger with popcorn comes in the serving size.
Pack a small bag of popcorn for a mid-morning or mid-afternoon snack that tastes good and will fill you up. Be sure you don’t do more than about a handful to keep your calories low.
2. A Good Protein Bar
Shopping for protein bars can be like dodging a land mine. So many of today’s options are absolute trash, filled to the brim with sugar. However, with some careful nutrition label sleuthing, you CAN find some healthy protein bar options. Protein bars are an excellent “snack” or meal replacement — they keep you full and satisfied and contain lots of protein and in some cases, lots of fiber. Ideally, you want to keep your sugars low to avoid a mid-day snooze fest.
3. Apples and Peanut Butter
Sugar in small amounts is not a bad thing, especially when it’s sugar from fruit combined with some filling peanut butter! Grab a small apple, cut it into slices and get to dipping/slathering depending on your peanut butter preferences for a morning snack to keep you full and satisfied while staying focused on the tasks at hand.
4. Berries
Photo by Cecilia Par
Berries are great for a little boost. They taste great, are packed full of antioxidants and are relatively low-sugar, meaning you won’t eat them and come crashing down a few hours later. If you need a larger or more well-balanced snack, try throwing a boiled egg or a few slices of deli meat in as well to keep you full till dinner time.
5. Raw Veggies with Hummus
Raw vegetables are packed with nutrients, vitamins, good carbs and more. Accompany them with a little bit of hummus for a little additional protein and fiber to keep you full for a perfect healthy energy snack.
6. Deli Meat
Looking for a quick protein pick me up? Look no further than a slice (or two) of your favorite deli meat.
7. A Handful of Nuts
Photo by Raechel Walker
You can make your own mix or grab your favorite option from the grocery store. Whether you prefer salted, roasted or flavor-enhanced nuts or a more plain Jane variety, nuts are packed with healthy fats. Grab some almonds, cashews, pistachios or Brazil nuts to help you avoid break room donuts.
8. A Mini Antipasto Platter
It’s easy to make your own antipasto snack. Grab a few olives, a few pickles, a few cubes of your favorite cheese and viola, you’ve got a sophisticated little snack. This would be perfect to get your energies levels up an hour or so before you hit the gym.
Want to get really fancy? Add some red pepper slices, artichoke hearts or cherry tomatoes to make all your cubicle-mates jealous.
9. Carrots with Guacamole
Photo by Mink Mingle
Guacamole is a direct descendent of the avocado and we all know there is nothing better in this world than a fresh avocado.
You can make your own guac with some onion, a little salt and pepper and a splash of lime juice or buy the snack-sized portions at your local grocery stores. Guacamole is packed full of good healthy fats that’ll make your hair shiny and your tummy happy!
10. Dried Fruit
Dried fruit is a great snack for when you’re feeling a little drowsy, but beware — most dried fruit contains a lot of natural and added sugar, so you should keep your portion sizes VERY small. If you choose to enjoy dried fruit as a healthy energy snack, stick with less than a handful to avoid a sugar crash later on in the day.
11. Almond Butter
Almond butter is delicious and even comes in little serving size packets now, meaning it’s easier than ever to utilize it as a healthy snack while you’re at work or on the go. It’s cheaper than a candy bar — most packets usually run for less than a $1 each.
12. Coconut Flakes
Coconut shavings or coconut flakes are a great healthy energy snack for any time of day. High in good fats and low in carbs and sugar, you can keep a bag in your car or in your gym bag to tide over any sort of crazy cravings or to keep you full between meals.
Summary
Article Name
12 Healthy Energy Snacks
Description
But what do you do when 10:30 a.m. hits and it's too early for lunch but you've already eaten your breakfast? What about around 3 p.m. in the afternoon when your stomach starts to grumble and you look at it in fear, knowing it'll be several hours before you'll be home with a heaping dinner plate in front of your face? We've put together a list of our favorite healthy energy snacks to get you from clean meal to clean meal without any detours or diversions. |
Hepatic overexpression of idol increases circulating protein convertase subtilisin/kexin type 9 in mice and hamsters via dual mechanisms: sterol regulatory element-binding protein 2 and low-density lipoprotein receptor-dependent pathways.
Low-density lipoprotein receptor (LDLR) is degraded by inducible degrader of LDLR (Idol) and protein convertase subtilisin/kexin type 9 (PCSK9), thereby regulating circulating LDL levels. However, it remains unclear whether, and if so how, these LDLR degraders affect each other. We therefore investigated effects of liver-specific expression of Idol on LDL/PCSK9 metabolism in mice and hamsters. Injection of adenoviral vector expressing Idol (Ad-Idol) induced a liver-specific reduction in LDLR expression which, in turn, increased very-low-density lipoprotein/LDL cholesterol levels in wild-type mice because of delayed LDL catabolism. Interestingly, hepatic Idol overexpression markedly increased plasma PCSK9 levels. In LDLR-deficient mice, plasma PCSK9 levels were already elevated at baseline and unchanged by Idol overexpression, which was comparable with the observation for Ad-Idol-injected wild-type mice, indicating that Idol-induced PCSK9 elevation depended on LDLR. In wild-type mice, but not in LDLR-deficient mice, Ad-Idol enhanced hepatic PCSK9 expression, with activation of sterol regulatory element-binding protein 2 and subsequently increased expression of its target genes. Supporting in vivo findings, Idol transactivated PCSK9/LDLR in sterol regulatory element-binding protein 2/LDLR-dependent manners in vitro. Furthermore, an in vivo kinetic study using (125)I-labeled PCSK9 revealed delayed clearance of circulating PCSK9, which could be another mechanism. Finally, to extend these findings into cholesteryl ester transfer protein-expressing animals, we repeated the above in vivo experiments in hamsters and obtained similar results. A vicious cycle in LDLR degradation might be generated by PCSK9 induced by hepatic Idol overexpression via dual mechanisms: sterol regulatory element-binding protein 2/LDLR. Furthermore, these effects would be independent of cholesteryl ester transfer protein expression. |
Infowars’ post on the subject is predictably hyperbolic and free of substance, touting the pass as “an epic blow to the mainstream media’s control of the narrative.”
However, as difficult as this may be to believe, Corsi isn’t being completely upfront with the facts here. As Trey Yingst of the right-wing One America News Network and Mike Warren of the conservative opinion magazine the Weekly Standard point out, Corsi was granted a White House day pass. Those are only good for one day—i.e., today, while Trump is out of town—and for which just about anyone who applies, including high school students, is eligible. (Note that Corsi is standing in an empty press room.)
Advertisement
For regular access, you have to be approved for a “hard pass,” which is permanent, as opposed to day passes, which must be turned in on your way out the door. So congratulations, Infowars—you’ve officially reached high-school newspaper levels of legitimacy. |
Lauren Selby
Lauren Selby, (born 18 July 1984 in Sawbridgeworth) is a professional squash player who represents England. She reached a career-high world ranking of World No. 34 in October 2012. Her brother is the professional squash player Daryl Selby. She attended Brentwood School in Brentwood, Essex during her secondary school years. She also coaches at Ardleigh Squash Club, Essex.
References
External links
Category:English female squash players
Category:Living people
Category:1984 births
Category:People from Sawbridgeworth |
Power Players
Most voters will likely never know her name, let alone cast a vote for her at the ballot box, but that’s not deterring Dr. Jill Stein from running for president in 2016.
Stein was the Green Party’s presidential nominee in 2012 and is expected to announce Friday the she’s exploring another White House bid in 2016.
Prior to making the announcement, Stein sat down exclusively with “Power Players” to explain why she’s stepping forward as an alternative to the current field of likely presidential contenders that she characterizes as “corrupt and sold out.”
“There are rules that make it possible for the very rich to buy politicians -- that's what's going on,” Stein said. “There's a horse race around grabbing the money right now, and I think it speaks volumes about what a really sorry state our political system has come to.”
In her 2012 campaign, Stein received fewer than half a million votes across the country – less than 1 percent of the total popular vote – and was even arrested for trying to get into a televised debate from which she was excluded.
Stein recalled the arrest – and subsequent holding – as “the most bizarre experience you can imagine.”
“For trying to get into that debate, I was actually arrested, taken to a dark site where no one knew where I was -- the site was secret -- and held handcuffed to metal chairs for approximately eight hours,” Stein said. “It speaks volumes about how terrified the political system is that the voices of principled opposition may actually get heard."
Before entering politics, Stein was a practicing doctor and authored two books on medical topics. Now, Stein said she’s practicing a different type of medicine.
“What I'm doing now is practicing political medicine, which I call the mother of all illnesses,” Stein said. “If we want to fix what's ailing us -- both our health, our jobs, our foreign policy -- which is generating incredible blowback … we need to fundamentally fix our democracy and the political system.”
Story continues
On a quest against the current political system that she believes has been “bought and paid for by the one percent,” Stein acknowledged that she is waging an uphill battle.
That battle is particularly steep given the Green Party abstains from collecting any corporate donations, at a time when Super PACs and dark money bankroll most major political campaigns.
“What we will raise will be a drop in the ocean compared with what the Koch brothers are spending,” said Stein, who estimates that her 2012 campaign raised a total of around a million dollars. That’s compared to the $900 million that the conservative billionaire businessmen Koch brothers alone plan to spend in the 2016 cycle.
“If we as Americans allow our electoral system to be just bought and sold and that's it, then there's really not very much hope going forward in the future,” Stein said, defending the Green Party’s decision not to collect corporate dollars.
In the 2000 presidential election, some Democrats blamed third party candidate Ralph Nader for taking votes away from Democratic nominee Al Gore and helping advance President George W. Bush’s narrow victory.
As a third party candidate herself, it’s a critique Stein is used to hearing – and dismissing.
“We've heard of that, what we call the politics of fear, that tells you, ‘You have to be very worried about secondary effects of your vote,’” Stein said. “If you don't stand up and vote for what you want and you need, then you're never gonna get it and the system won't get it.”
For more of the interview with Stein, including why she disagreed with President Obama’s declaration of a strong economic recovery in his State of the Union address, check out this episode of “Power Players.”
ABC News’ Ali Dukakis, Gary Westphalen, Richard Norling, and Shari Thomas contributed to this episode. |
Rust-Oleum
But wait, what’s NeverWet? It’s Rust-Oleum’s miracle water-repelling coating which is super hydrophobic. It actually works, and we’re kind of surprised we haven’t seen it used in a hack yet! Anyway, let’s start this hack with a quick disclaimer. NeverWet is not designed for waterproofing electronics.
But when has that ever stopped the pursuit of science!?
The experimenters chose a few electronic guinea pigs to test out NeverWet’s capabilities. An Arduino Micro, a FLORA LED broach, and a Raspberry Pi. Using the proper application method they coated the unlucky electronics with a few generous layers of the product. Using plain NYC tap water they tested each component. The FLORA LED broach (shown above) lasted underwater for about 4 hours before it died. The Arduino Micro fared similar, however the Wet Raspberry only booted once before losing connection to the SD card.
For full details check out the full experiment or stick around after the break to see a video of the tests. |
---
abstract: 'We prove that the insertion-elimination Lie algebra of Feynman graphs in the ladder case has a natural interpretation in terms of a certain algebra of infinite dimensional matrices. We study some aspects of its representation theory and we will discuss some relations with the representation of the Heisenberg algebra.'
address:
- 'Boston University, Department of Mathematics and Statistics, Boston University, 111 Cummington Street, Boston, MA 02215, USA'
- 'CNRS at IHES, 35, route de Chartres, 91440, Bures-sur-Yvette, France'
author:
- 'Igor Mencattini$^\ddagger$ and Dirk Kreimer$^\dagger$'
title: 'Insertion and Elimination Lie Algebra: the ladder case.'
---
=-13mm =-17mm =-0.8cm
\#1 \[section\] \[thm\][Lemma]{} \[thm\][Proposition]{} \[thm\][Corollary]{} \[thm\][Definition]{} \[thm\][Remark]{}
Introduction
============
In the last few years perturbative QFT had been shown to have a rich algebraic structure [@Kr] and deep relations with apparently unrelated sectors of mathematics like non-commutative geometry and Riemann-Hilbert like problems[@C-K; @1; @C-K; @2]. Such extraordinary relations can be resumed, to some extent, by the existence of a commutative, non co-commutative Hopf algebra $\cal H$ defined on the set of Feynman diagrams. In what follows we will discuss some first relations of perturbative QFT with the representation theory of Lie algebras. In fact the Hopf algebra $\cal H$ is isomorphic via the celebrated Milnor-Moore theorem [@M-M] to the dual of the universal enveloping algebra of a Lie algebra $\cal L$. The Lie algebra $\cal L$ can be realized as derivations of the Hopf algebra $\cal H$ and it has been shown in [@C-K] to have two natural representations whose action on $\cal H$ is given by elimination and insertion operators. Here, the goal of the authors is to study the simplest case, i.e the case of the cocommutative sub Hopf algebra of ladder graphs. In this version the Hopf algebra is reduced to a polynomial algebra freely generated by infinitely many generators and insertion and elimination are performed by increasing or decreasing the degree of the generators of such algebra. Even in this simplified context the Lie algebra introduced in [@C-K] has non-trivial features.
A further motivation for the study of this Lie algebra comes from [@BK]. There, a sub Hopf algebra of graphs was studied which is non-cocommutative and contains the one considered here. The Dyson-Schwinger equation for that Hopf algebra was solved by turning the renormalization group into a propagator-coupling duality. The crucial ingredient was the understanding how the elimination Lie algebra (called “befooting” in [@BK]) commutes with the generator of the equation of motion, the Hochschild one-cocycle $B_+$, and how it commutes with the derivation $S\star Y=m\circ(S\otimes Y)\circ\Delta$ (terminology as in that paper).
We can easily rewrite the solution of any DSE in the form $$X=r+\sum_{res(\Gamma)=r}g^{\vert\Gamma\vert}Z_{\Gamma,r}(r),$$ where the residue $r$ specifies the external quantum numbers of the graph and the sum is over all graphs with external legs specified by these quantum numbers. Following [@BK], we then need to understand the commutators $[Z_{[r,\Gamma]},Z_{[\Gamma,r]}]$ and $[Z_{[r,\Gamma]},S\star Y]$ to solve the DSE in accordance with the RG.
We will express below the derivation $S\star Y$ acting on the Hopf algebra (of ladder graphs) in terms of generators of the insertion and elimination Lie algebra, and thus show that the methods of [@BK] can be formulated entirely in that Lie algebra.
The Lie algebra ${\cal L}_{L}$
==============================
Let us start recalling the following theorem where we refere for notation and symbols to [@C-K]:
\[t0\] For all 1-PI graphs $\Gamma_{i}$, s.t. [**res**]{}$(\Gamma_1)$=[**res**]{}$(\Gamma_2)$=[**res**]{}$(\Gamma_3)$=[**res**]{}$(\Gamma_4)$, the bracket
$$\begin{aligned}
\big[Z_{[\Gamma_{1},\Gamma_{2}]},Z_{[\Gamma_{3},\Gamma_{4}]}\big]
& = &
Z_{\overline{[Z_{[\Gamma_{1},\Gamma_{2}]}\times\delta_{\Gamma_3}},\Gamma_{4}]}-
Z_{[\Gamma_{3},\overline{Z_{[\Gamma_{2},\Gamma_{1}]}\times\delta_{\Gamma_4}}]}
-Z_{\overline{[Z_{[\Gamma_{3},\Gamma_{4}]}\times\delta_{\Gamma_1}},\Gamma_{2}]}\nonumber\\
& &
+
Z_{[\Gamma_{1},\overline{Z_{[\Gamma_{4},\Gamma_{3}]}\times\delta_{\Gamma_2}}]}-
\delta_{\Gamma_2,\Gamma_3}Z_{[\Gamma_1,\Gamma_4]}+\delta_{\Gamma_1,\Gamma_4}Z_{[\Gamma_3,\Gamma_2]},
\label{00}\end{aligned}$$
defines a Lie algebra of derivations acting on the Hopf algebra ${\cal H}_{FG}$ via: $$Z_{[\Gamma_1,\Gamma_2]}\times\delta_{X}=\sum_{I}\langle Z^{+}_{\Gamma_2},\delta_{X'_{(i)}} \rangle\delta_{X''_{(i)}\ast_{G_i}\Gamma_1},$$ where the $G_i$ are normalized gluing data.
We need to translate the formula (\[00\]) to the ladder case. We start with the following:
${\cal L}_{L}= \hspace{5pt}span_{\bC}\hspace{5pt}\{Z_{n,m}; n,m\geq 0\}$
This is obvious if we identify the $n$-loop ladder graph $\Gamma_n$ in the Hopf algebra with a Hopf algebra element $\delta_n$, $n$ being a non-negative integer, and $Z_{[\Gamma_n,\Gamma_m]}$ with $Z_{n,m}$. Here, any subclass of $n$-loop graphs $\Gamma_n$ such that $$\Delta(\Gamma_n)=\Gamma_n\otimes 1+1\otimes
\Gamma_n+\sum_{j=1}^{n-1}\Gamma_j\otimes\Gamma_{n-j}$$ can serve as an example of a Hopf sub algebra of ladder graphs.
Then, the theorem \[t0\] becomes:
${\cal L}_{L}$ is a Lie algebra with commutator given by the following formula: $$\begin{aligned}
\big[Z_{n,m}, Z_{l,s}\big] & = &
\Theta(l-m)Z_{l-m+n, s}-\Theta(s-n)Z_{l,s-n+m}\nonumber\\ & & -
\Theta(n-s)Z_{n-s+l,m}+\Theta(m-l)Z_{n,m-l+s}\nonumber\\ & &
-\delta_{m,l}Z_{n,s}+\delta_{n,s}Z_{l,m},\label{e5}\end{aligned}$$ where:\
$$\begin{cases}
\Theta(l-m) &=0 \hspace{5pt} \text{if $l<m$}, \\
\Theta(l-m) &=1 \hspace{5pt} \text{if $l\geq m$}
\end{cases}$$ and $$\begin{cases}
\delta_{n,m} &=1 \hspace{5pt} \text{if $m=n$},\\
\delta_{n,m} &=0 \hspace{5pt} \text{if $n\neq m$}.
\end{cases}$$
Let us now introduce some natural module for the Lie algebra ${\cal L}_{L}$.
\[d1\] $${\cal S}=\bigoplus_{n\geq 0}{\bC}t_n={\bC}[t_0,t_1,t_2,t_3.....].$$ We will assign a degree equal to $k$ to the generator $t_{k}$ for each $k\geq 0$.\
${\cal L}_{L}$ acts on $\cal S$ via the following:
$$\begin{gathered}
Z_{n,m}t_k=0\hspace{5pt}if\hspace{5pt} m>k,\notag\\
Z_{n,m}t_k=t_{k-m+n}\hspace{5pt}if\hspace{5pt} m\leq k\label{e0}.\end{gathered}$$
\[r1\] $\cal S$ is a polynomial algebra with infinite many generators graded as in definition \[d1\]. The product of two polynomials $x_i$, $x_j$ will be denoted by concatenation: $$x_i\otimes x_j\longrightarrow x_ix_j;$$ in particular $deg(t_it_j)=i+j$ and $y$ is a unit for $\cal S$ with respect to this product if and only if it is a scalar. Beside this algebraic structure we need to define on $\cal S$ the following product: $$\star:{\cal S}\otimes {\cal S}\longrightarrow {\cal S}$$ $$\star(t_{n}\otimes t_m)\mapsto t_{n+m}.$$ With respect to this product $\cal S$ becomes a standard polynomial algebra in one generator with the usual grading: $$deg(t_k)=k,\hspace{20pt}deg(t_k\star t_l)=deg(t_{k+l})=l+k.$$ In particular $y\in\cal S$ is a unit with respect to the $\star$-product if and only if $y\in \bC t_0$.
In what follows we will call $\cal S$ the standard representation for the Lie algebra ${\cal L}_{L}$.
We recall that a Lie algebra $\frak g$ is called $\bZ$-graded if: $${\frak g}=\bigoplus_{n\in \bZ}{\frak g}_n, \hspace{30pt} [{\frak g}_i,{\frak g}_j]\subseteq {\frak g}_{i+j}.$$ In the decomposition ${\frak g}=\bigoplus_{n\in \bZ}{\frak g}_n$, the components ${\frak g}_{n}$ are called homogeneous of degree equal to $n$.
The Lie algebra ${\cal L}_{L}$ is $\bZ$-graded, $${\cal L}_{L}=\bigoplus_{n\in {\bZ}}l_n,$$ where the homogeneous components of degree $n$ are: $$l_n=\hspace{5pt}span_{\bC}\{Z_{k,m};\hspace{5pt} k-m=n\}.$$
We need to prove that if $Z_{n,m}\in l_i$ and $Z_{l,s}\in l_j$ than: $$[Z_{n,m},Z_{l,s}]\in l_{i+j}.$$ This follows by direct computation using (\[e5\]).
From the $\bZ$-grading it follows that ${\cal L}_{L}$ has the following decomposition:
$${\cal L}_{L}= L^{+}\oplus L^{0}\oplus L^{-};$$
where $L^{+}=\oplus_{n>0}l_n$, $L^{-}=\oplus_{n<0}l_n$ and $L^{0}=l_0$.
We have that:
$L^{+}$, $L^{-}$ and $L^{0}$ are sub Lie algebras of ${\cal L}_{L}$. Moreover $L^{0}$ is commutative and fulfills the following: $$[L^{+},L^{0}]\subseteq L^{+},\hspace{20pt}[L^{-},L^{0}]\subseteq L^{-}.$$
It follows by direct computation using (\[e5\]).
We thus have the following:
\[l2\] In terms of the standard representation we have:\
given $n,m\geq 0$, $Z_{n,m}$ is a matrix in which the only non-zero entries are all equal to one and are located on the $n-m$ lower diagonal if $n>m$, or on the $m-n$ upper diagonal if $m>n$. More precisely given $n>m\geq 0$ and $k>0$:\
a) $Z_{n-m,0}$ is a matrix in which the entries of the $n-m$ (lower) diagonal are all equal to 1;\
b) $Z_{n-m+k,k}$ is a matrix having zeros on the first $k-1$ entries of the $n-m$ (lower) diagonal and all the other entries of such diagonal equal to one.\
a) and b) hold for the matrices $Z_{0,n-m}$ and $Z_{k, n-m+k}$ substituting, in the previous statements, lower with upper.
It follows directly from (\[e0\]). The following claim is now evident:
Given $n,m$ as in the lemma (\[l2\]), we have that: if $n-m>0$ $Z_{n,m}\in L^{+}$, if $n-m<0$ $Z_{n,m}\in L^{-}$ and if n=m $Z_{n,m}\in L^{0}$.\
We recall that given a graded Lie algebra ${\frak g}=\bigoplus_{n\in\bZ}{\frak g}_n$, a vector space $V$ is a graded $\frak g$-module if $V=\bigoplus_{n\in\bZ}V_n$ and $g_jV_i\subseteq V_{i+j}$, $\forall i,j\in\bZ$. The $\frak g$-module $V$ will be said to be of finite type if ${\text {dim}}\hspace{4pt}V_j<\infty$, $\forall j\in\bZ$. So we have:
$\cal S$ is a graded ${\cal L}_{L}$-module of finite type.
It follows from direct computation; given any element $Z_{n,m}\in l_i$ with $i=n-m$: $$Z_{n,m}t_k=t_{k-m+n}\in l_{k+i}$$ from (\[e0\]).
We also recall that a highest weight (h.w) $\frak g$-module of highest weight $\alpha\in{\frak g}_{0}^{\ast}$ is a $\bZ$-graded $\frak g$-module $V(\alpha)=\bigoplus_{n\in{\bZ}_{\geq 0}}V_n$ such that the following properties hold:\
a) $V_{0}={\bC}w_{\alpha}$, where $w_{\alpha}$ is a vector not equal to zero;\
b) $hw_{\alpha}=\alpha (h)w_{\alpha}$, for all $h\in {\frak g}_{0}$;\
c) ${\frak g}_{-}w_{\alpha}=0$;\
d) ${\cal U}({\frak g}_{+})w_{\alpha}=V(\alpha)$,\
where ${\frak g}_{+}=\bigoplus_{n>0}{\frak g}_{n}$, ${\frak g}_{-}=\bigoplus_{n<0}{\frak g}_{n}$ and with ${\cal U}{(\frak g)}$ we indicated the universal enveloping algebra of $\frak g$. The vector $w_{\alpha}$ is called highest weight vector (h.w.v) and any vector $v$ such that ${\frak g}_{-}v=0$ is called singular vector. Moreover we have that the module $V(\alpha)$ is irreducible if and only if every singular vector is a multiple of the h.w.vector. Now we can state the following:
$\cal S$ is an irreducible h.w. module for the Lie algebra ${\cal L}_{L}$ with h.w. vector $w_{\alpha}=t_{0}$.
It follows directly by the definitions.
Classical Lie algebras and the Lie algebras ${\cal L}_{L}$.
===========================================================
In what follows we will investigate some relations of the Lie algebra ${\cal L}_{L}$ with some (infinite dimensional) classical Lie algebras. In particular we will give a complete description of ${\frak sl}_{+}(\infty)$ in terms of ${\cal L}_{L}$. Let’s start with the following:
[@K; @K-R]
$${\frak gl}(\infty)=\{ E_{i,j}:\hspace{5pt}i,j\in {\bZ}: [E_{i,j}, E_{n,m}]=E_{i,m}\delta_{j,n}-E_{n,j}\delta_{m,i}\};$$
and
$${\frak gl}_{+}(\infty)=\{ E_{i,j}:\hspace{5pt}i,j\geq 0: [E_{i,j}, E_{n,m}]=E_{i,m}\delta_{j,n}-E_{n,j}\delta_{m,i}\}.$$
Now we can state the following:
We have an embedding of Lie algebras: $$\phi:{\frak gl}_{+}(\infty)\longrightarrow{\cal L}_{L}. \label{i}$$
Define $\phi(E_{i,j})=Z_{i,j}-Z_{i+1,j+1}$ for each $i,j\geq 0$.\
Now it suffices to show that $\phi$ is morphism of Lie algebras, i.e that: $$[Z_{i,j}-Z_{i+1,j+1}, Z_{n,m}-Z_{n+1,m+1}]=(Z_{i,m}-Z_{i+1,m+1})\delta_{j,n}-(Z_{n,j}-Z_{n+1,j+1})\delta_{m,i}.$$ This follows directly from the definitions.
[@K; @K-R] $${\frak sl}_{+}(\infty)=\{A\in{\frak gl}_{+}(\infty):\hspace{5pt}trA=0\}$$
We recall now that a set of generators for ${\frak sl}_{+}(\infty)$ is given by: $$\begin{cases}
E_{i,j}& i<j,\\
E_{i,j}& i>j, \\
E_{i,i}-E_{l,l}& \text{with $i\neq l$}.\label{e1}
\end{cases}$$
From (\[e1\]) we get the following (standard) triangular decomposition: $${\frak sl}_{+}(\infty)={\frak n}_{+}\oplus{\frak h}\oplus{\frak n}_{-};\label{e3}$$ where
${\frak n}_{+}=span_{\bC}\{E_{i,j};\hspace{5pt}j>i\}$; ${\frak n}_{-}=span_{\bC}\{E_{i,j};\hspace{5pt}i>j\}$; ${\frak h}=span_{\bC}\{E_{i,i}-E_{l,l};\hspace{5pt}i\neq l\}$.\
Let us now introduce Chevalley’s generators and co-roots for the Lie algebra ${\frak sl}_{+}(\infty)$ ([@K]): The Chevalley’s generators are:
$$e_i=E_{i,i+1}\hspace{20pt} f_{i}=E_{i+1,i}\hspace{8pt}\forall i\in{\bZ}_{\geq 0}$$
and
$$\check\Pi=\{E_{i,i}-E_{i+1,i+1}; i\in{\bZ}_{\geq 0}\}$$
is the set of simple co-roots.
We can now write the Chevalley’s [@K] generators and a co-root system for ${\frak
sl}_{+}(\infty)$ in terms of the generators $Z_{n,m}$ of the Lie algebra ${\cal L}_{L}$:
The Chevalley generators for ${\frak sl}_{+}(\infty)$, $\{e_i,
f_i;\hspace{5pt}i\geq 0\}$ can be written in terms of the generators $Z_{n,m}$ in the following way: $$\begin{cases}
f_i &= Z_{i+1,i}-Z_{i+2,i+1},\\
e_i &= Z_{i,i+1}-Z_{i+1,i+2}.
\end{cases}$$ If we define: $$\check{\alpha}_i = Z_{i,i}-2Z_{i+1,i+1}+Z_{i+2,i+2};$$ then $\{\check{\alpha_i};\hspace{5pt}i\geq 0\}$ is a system of positive simple co-roots for the Lie algebra ${\frak sl}_{+}(\infty)$.
It follows from the definition of Chevalley generators, positive simple roots and from the embedding of ${\frak gl}_{+}(\infty)$ in ${\cal L}_{L}$ defined in (\[i\]).
[@K] The root system for ${\frak sl}_{+}(\infty)$ is described in the following way; we remember that we have a triangular decomposition for ${\frak gl}_{+}(\infty)$ analogous to (\[e3\]): $${\frak gl}_{+}(\infty)={\frak n}_{+}\oplus{\frak h}\oplus{\frak n}_{-},$$ where now: $${\frak h}=span_{\bC}\{E_{i,i};\hspace{5pt} i\geq 0\}.$$ Define now: $${\frak h}^{\ast}=\{{\bC}-\text{linear functions on}\hspace{5pt}{\frak h}\}=span_{\bC}\{\epsilon_i;\hspace{5pt} i\geq 0\},$$ where $$\epsilon_i(E_{j,j})=\delta_{i,j},$$ or in terms of $Z_{n,m}$ generators: $$\epsilon_i(Z_{j,j}-Z_{j+1,j+1})=\delta_{i,j}.$$ From this description follows immediately:\
The root system for ${\frak sl}_{+}(\infty)$ is given by:
- $\Delta=span_{\bC}\{\epsilon_i-\epsilon_j;\hspace{5pt}i\neq j\}$;
- $\Delta^{+}=span_{\bC}\{\epsilon_i-\epsilon_j;\hspace{5pt}i,j\geq 0;\hspace{5pt}i<j \}$;
- $\Pi=span_{\bC}\{\epsilon_i-\epsilon_{i+1};\hspace{5pt}i\neq 0\}$;
where $\Delta$, $\Delta^{+}$ and $\Pi$ are respectively called the set of roots, the set of positive roots and the set of simple positive roots.
The Chevalley’s involution on ${\cal L}_{L}$.
---------------------------------------------
We define now an involution on ${\cal L}_{L}$ whose restriction to ${\frak sl}_{+}(\infty)$ gives us the Chevalley’s involution. Let us start with:
$$C:{\cal L}\longrightarrow{\cal L}$$ $$Z_{n,m}\longmapsto -Z_{m,n}$$ for each $n,m\geq 0$.
We have the following:
$C$ is an homomorphism of Lie algebras, i.e: $$C([Z_{n,m},Z_{l,s}])=[C(Z_{n,m}),C(Z_{l,s})],\label{e4}$$ $\forall\hspace{5pt} n,m, l, s\geq 0$.
It follows applying the (\[e5\]) to both sides of (\[e4\]):\
RHS=$\big[Z_{m,n},Z_{s,l}\big]=\Theta(s-n)Z_{s-n+m, l}-\Theta(l-m)Z_{s,l-m+n}-$\
$$\Theta(m-l)Z_{m-l+s,n}+\Theta(n-s)Z_{m,n-s+l}
-\delta_{n,s}Z_{m,l}+\delta_{m,l}Z_{s,n},$$
LHS=$C\big(\big[Z_{n,m},Z_{l,s}\big]\big)=-\Theta(l-m)Z_{s,l-m+n}+\Theta(s-n)Z_{s-n+m,l}+$\
$$\Theta(n-s)Z_{m,n-s+l}-\Theta(m-l)Z_{m-l+s,n}
-\delta_{n,s}Z_{m,l}+\delta_{m,l}Z_{s,n}.$$
We recall that:
[@K] Given a Lie algebra $\frak g$, a set of its Chevalley’s generators $\{f_i,e_i;i\geq 0\}$ and a system of simple positive co-roots $\{\check{\alpha}_i,\hspace{5pt}i\geq 0\}$, the map: $$\omega:{\frak g}\longrightarrow {\frak g}$$ defined by: $$\omega(f_i)=-e_i,\hspace{8pt}\omega(e_i)=-f_i,\hspace{8pt}\omega(\check{\alpha}_i)=-\check{\alpha}_i,$$ is called Chevalley’s involution.
The restriction of the map $C$ to ${\frak sl}_{+}(\infty)$ is the Chevalley’s involution.
It is obvious from the definitions: $$C(f_i)=C(Z_{i+1,i}-Z_{i+2,i+1})=-Z_{i,i+1}+Z_{i+1,i+2}=e_{i},$$ $$C(\check{\alpha}_{i})=C(Z_{i,i}-2Z_{i+1,i+1}+Z_{i+2,i+2})=-Z_{i,i}+2Z_{i+1,i+1}-Z_{i+2,i+2}={\check{\alpha}}_{i}.$$
$l^{+},\hspace{5pt}l^{-}$ and their central extensions.
=======================================================
In this section we are going to consider the relation between the Lie algebra ${\cal L}_L$ and the Heisenberg algebra. We will introduce two sub-algebras of ${\cal L}_{L}$ that play the role of “shift” operators for the standard module $\cal S$. Let us start with the following:
Define: $$l^{+}=span_{\bC}\{Z_{n,0};\hspace{5pt} n\geq 0\}$$ and $$l^{-}=span_{\bC}\{Z_{0,n};\hspace{5pt} n\geq 0\}.$$
We have:
\[l1\] 1)$$\big[l^{+},l^{+}\big]=0,\hspace{15pt}\big[l^{-},l^{-}\big]=0;$$ 2) $l^{+}$ acts as algebra of shift operators on $\cal S$ and $l^{-}$ as algebra of quasi-shift operators, i.e $\forall n, k>0$ $Z_{0,n}$ will eliminate any $t_k\in\cal S$ if $k<n$ and will shift such element to the element $t_{k-n}$ if $n<k$.
a\) follows applying (\[e5\]) to elements in $l^{+}$ and $l^{-}$.\
b) follows trivially from the definition of the ${\cal L}_{L}$ action on $\cal S$.
Note that the commutativity of these two algebras stems from the cocommutativity of the ladder Hopf algebra ${\cal H}_L$. The general case provides non-commutative Lie algebras for insertion as well as elimination [@C-K].
Let us now define two other commutative Lie algebras.
Let $\{Z_{n}^{+}; n\in {\bZ}\}$ and $\{Z_{n}^{-}; n\in {\bZ}\}$ two sets of symbols. Let us define: $$\check{l^{+}}=span_{\bC}\{Z_{n}^{+};\hspace{5pt}n\in {\bZ}\}$$ and $$\check{l^{-}}=span_{\bC}\{Z_{n}^{-};\hspace{5pt}n\in {\bZ}\}$$ and let us introduce the canonical isomorphism: $$d:\check{l^{+}}\longrightarrow\check{l^{-}}$$ defined on the generators by: $$d(Z_n^{+})=Z_n^{-}\hspace{15pt} n\in {\bZ}$$
Now define the following maps:
$${\frak a}^{+}:l^{+}\longrightarrow\check{l^{+}}$$ $$Z_{2n,0}\mapsto Z_{n}^{+}\hspace{5pt}\forall\hspace{5pt}n\geq 0$$ $$Z_{2n-1,0}\mapsto Z_{-n}^{+}\hspace{5pt}\forall\hspace{5pt}n\geq 1$$ and
$${\frak a}^{-}:l^{-}\longrightarrow\check{l^{-}}$$ $$Z_{0,2n}\mapsto Z_{n}^{-}\hspace{5pt}\forall\hspace{5pt}n\geq 0$$ $$Z_{0,2n-1}\mapsto Z_{-n}^{-}\hspace{5pt}\forall\hspace{5pt}n\geq 1$$
Now we have the following:
${\frak a}^{+}$ and ${\frak a}^{-}$ are isomorphisms of Lie algebras compatible with the involution $C$.
It follows trivially from the definitions of $C$, $d$ and from the commutativity of the Lie algebras $l^{\pm}$ and $\check{l^{\pm}}$.
It is a well known result that:
[@K; @K-R] $$H^{2}(\check{l^{\pm}},{\bC})\neq 0$$
Let’s focus on $\check{l^{+}}$ case (the case $\check{l^{-}}$ is completely analogous). Define the following bilinear map: $$c^{+}:\check{l^{+}}\otimes\check{l^{+}}\longrightarrow{\bC}$$ $$(Z_{n}^{+}\otimes Z_{m}^{+})\mapsto n\delta_{n,-m}.$$ $c^{+}$ clearly satisfies the following: $$c^{+}(Z_{n}^{+},Z_{m}^{+})=-c^{+}(Z_{m}^{+},Z_{n}^{+})\hspace{5pt}{\text and}$$ $$c^{+}\big(\big[Z_{n}^{+},Z_{m}^{+}\big],Z_{k}^{+}\big)+\hspace{5pt}\text{cyclic permutations}=0;$$ i.e $c^{+}$ is a non trivial two co-cycle.
[@K; @K-R] The co-cycle gives rise to a central extension: $$0@>>> {\bC}{\cal C} @>>> {\cal H}^{+} @>p>> \check{l^{+}} @>>> 0,$$ where ${\cal H}^{+}=span_{\bC}\{Z_{n}^{+}, {\cal C}\}_{n\in
{\bZ}}$ and relations: $$\big[Z^+_{n},Z^+_{m}\big]=n\delta_{n,-m}{\cal C}\hspace{15pt} \big[Z^+_{n},{\cal C}\big]=0.$$
${\cal H}^{+}$ is called Heisenberg Lie algebra; the “$-$” case is completely analogous: the co-cycle $c^{-}$ will give us the central extension ${\cal H}^{-}$ with ${\cal H}^{-}\cong {\cal H}^{+}$.
Let us now consider a $\cal H$-module V (in what follows we will drop the $\pm$ sign) on which $Z_0$ acts as multiplication operator. Let us define the following operators:
$$L_{0}=\frac{{\mu}^2+{\lambda}^2}{2}+\sum_{n>0}Z_{-n}Z_n,$$ and $$L_n=\frac{1}{2}\sum_{j\in\bZ}Z_{-j}Z_{j+n}+i\lambda nZ_n\hspace{5pt}\forall n\in{\bZ}^{\ast}\hspace{5pt}\lambda\in{\bC}.$$ Then we have that the $L_n$’s defined above fulfill the Virasoro commutation relations: $$\big[L_n,L_m\big]=(n-m)L_{n+m}+\delta_{n,-m}\frac{(n^3-n)}{12}(1+12\lambda^2)Id_{V},$$ where $\lambda\in\bC$ gives the central charge of the Virasoro algebra.
It is now time to turn to the derivation $S\star Y$, expressed in generators $Z_{0,n},Z_{m,0}$ and their commutators.
The derivation $S\star Y$
=========================
Let us now turn to an expression of the derivation $S\star Y$ in terms of the generators of the insertion elimination Lie algebra. To that end, let $\Gamma_m$ correspond to the $m$-loop ladder graph as a generator in the sub Hopf algebra ${\cal H}_L$ of ladder graphs.
Define a derivation $D_1$ on ${\cal H}_L$ by $$D_1(\Gamma_m)=\sum_{n=0}^\infty \Gamma_n Z_{0,n}(\Gamma_m)$$ which takes care of $m\circ \Delta$: for any two characters $\phi_1,\phi_2$ on ${\cal H}_L$ we have $$\phi_1\star\phi_2(\Gamma_m)=m\circ (\phi_1\otimes \phi_2)\circ\Delta(\Gamma_m)=\sum_{n=0}^\infty \phi_1(\Gamma_n)\phi_2(Z_{0,n}(\Gamma_m)).$$ The degree operator $Y$ can be described by a derivation $D_2$, $$D_2(\Gamma_m)=\sum_{k=1}^\infty Z_{k,k}(\Gamma_m)=m\Gamma_m$$ and $S(\Gamma_m)$ iteratively by a derivation $D_3$, $$D_3(\Gamma_m)=-Z_{0,0}(\Gamma_m)-\sum_{n=0}^\infty
D_3(\Gamma_n)Z_{1,n+1}(\Gamma_m).$$ Note that $Z_{k,k}=[Z_{k,0}, Z_{0,k}]+Z_{0,0}$, similarly $Z_{1,n+1}$ involves the commutator $[Z_{1,0},Z_{0,n+1}]$.\
Now we get $S\star Y$ from the definitions.
$S\star Y$ is the derivation that is uniquely given on the linear generators $\Gamma_i$ as: $$S\star Y(\Gamma_m)=\sum_{n=0}^\infty D_3(\Gamma_n)D_2(Z_{0,n}(\Gamma_m)).\label{S1}$$
Note that (\[S1\]) holds as the coproduct is linear on generators on the lhs in the ladder case, and on the linear subspace of generators the antipode can indeed be decribed by a derivation.
The standard module $\Lambda$.
==============================
In this section we are going to address the following question: what is the equivalent of the standard module $\cal S$ for the Lie algebras $\check{l^{\pm}}$? Recall (Remark \[r1\]) that on ${\cal S}=\bigoplus_{n\geq 0}{\bC}t_{n}$ one can naturally define the product: $$\star:{\cal S}\otimes {\cal S}\longrightarrow {\cal S}$$ $$\star(t_{n}\otimes t_m)\mapsto t_{n+m}$$ and that with respect to this product $\cal S$ is isomorphic to a polynomial algebra having only one generator. We also remember that the action of $l^{\pm}$ is given in \[l1\] (2). To define the standard module for $\check{l^{\pm}}$, we introduce the following notation: $$o(n)\doteq -exp(n-\frac{1}{2}),\hspace{5pt}n>0;$$ $$e(n)\doteq exp(n),\hspace{5pt}n\geq 0.$$
Let us start defining the vector space: $$\Lambda=span_{\bC}\{\alpha(o(n)), \alpha(e(n))\}$$ $\Lambda$ is a unital algebra with the following product: $$\bullet :\Lambda\otimes\Lambda\longrightarrow\Lambda$$ $$\alpha(\xi(n))\bullet\hspace{3pt} \alpha(\xi(m))=\alpha(\xi(n)\xi(m));$$ where $\xi(k)$can be either $o(k)$ or $e(k)$. The unit is given by $\alpha=\alpha(e(0))$.
Let us now define:
$$\phi:{\cal S}\longrightarrow\Lambda$$ by the following: $$\phi(t_{2k})=\alpha(e(k)),\hspace{5pt}k\geq 0\hspace{5pt}\phi (t_{2k-1})=\alpha(o(k)),\hspace{5pt}k>0.$$
The map $\phi$ is an isomorphism of $\bC$-algebras.
We need only to check that $\phi$ is a morphism of algebras, for example: $$\phi(t_{2n-1}\star t_{2m-1})=\phi(t_{2(n+m-1)})=$$ $$\alpha(e(n+m-1))=\alpha(o(n)o(m))=$$ $$\alpha(o(n))\bullet\hspace{3pt}\alpha(o(m))=\phi(t_{2n-1})\bullet\hspace{3pt}\phi(t_{2m-1}).$$
We have now the following:
$\Lambda$ is a $\check{l^{\pm}}$ module.
It suffices to define: $$\lambda^{\pm}:\check{l^{\pm}}\longrightarrow End(\Lambda),$$ as multiplication operators since $\check{l^{\pm}}$ are commutative Lie algebras and $\Lambda$ is a commutative algebra. Let us define: $$\lambda^{+}(Z_{n}^{+})(\alpha(\xi(k)))\doteq\alpha(e(n))\bullet\hspace{3pt}\alpha(\xi(k)),$$ $$\lambda^{+}(Z_{-n}^{+})(\alpha(\xi(k)))\doteq\alpha(o(n))\bullet\hspace{3pt}\alpha(\xi(k))$$ and: $$\lambda^{-}(Z_{n}^{-})(\alpha(\xi(k)))\doteq\alpha({\tilde e}(n))\bullet\hspace{3pt}\alpha(\xi(k)),\hspace{3pt}if\hspace{3pt}k-n\geq 0$$ and $\lambda^{-}(Z_{n}^{-})(\alpha(\xi(k)))=0$ otherwise; $$\lambda^{-}(Z_{-n}^{-})(\alpha(\xi(k)))\doteq\alpha({\tilde o}(n))\bullet\hspace{3pt}\alpha(\xi(k)),\hspace{3pt}if\hspace{3pt}k-n\geq 0,$$ and $\lambda^{-}(Z_{-n}^{-})(\alpha(\xi(k)))=0$ otherwise, where ${\tilde e}(n)=e(-n)=exp(-n)$\
while ${\tilde o}(n)=-exp(-n+\frac{1}{2})$.
We can now state and prove the main result of this section:
The following diagrams commute: $$\begin{array}{ccc}
S &
\stackrel{Z_{2n,0}}{\longrightarrow} &
S \\
\Big\downarrow\vcenter{\rlap{$\phi$}} & &
\Big\downarrow\vcenter{\rlap{$\phi$}} \\
\Lambda &
\stackrel{Z^{+}_{n}}{\longrightarrow} &
\Lambda
\end{array}$$
$$\begin{array}{ccc}
S &
\stackrel{Z_{2n-1,0}}{\longrightarrow} &
S \\
\Big\downarrow\vcenter{\rlap{$\phi$}} & &
\Big\downarrow\vcenter{\rlap{$\phi$}} \\
\Lambda &
\stackrel{Z^{+}_{-n}}{\longrightarrow} &
\Lambda
\end{array}$$ The same statement holds for: $$\begin{array}{ccc}
S &
\stackrel{Z_{0,2n}}{\longrightarrow} &
S \\
\Big\downarrow\vcenter{\rlap{$\phi$}} & &
\Big\downarrow\vcenter{\rlap{$\phi$}} \\
\Lambda &
\stackrel{Z^{-}_{n}}{\longrightarrow} &
\Lambda
\end{array}$$ $$\begin{array}{ccc}
S &
\stackrel{Z_{0,2n-1}}{\longrightarrow} &
S \\
\Big\downarrow\vcenter{\rlap{$\phi$}} & &
\Big\downarrow\vcenter{\rlap{$\phi$}} \\
\Lambda &
\stackrel{Z^{-}_{-n}}{\longrightarrow} &
\Lambda
\end{array}$$
It follows by inspection. Let us consider for example the fourth diagram: $$\phi(Z_{0,2n-1}(t_{2k-1}))=\phi(t_{2(k-n)})=\alpha(e(k-n))$$ and $$Z_{-n}^{-}(\phi(t_{2k-1}))=Z_{-n}^{-}(\alpha(-exp(k-\frac{1}{2})))=\alpha(-exp(-n+\frac{1}{2}))\bullet\hspace{3pt}\alpha(-exp(k-\frac{1}{2}))=$$ $=\alpha(e(k-n))$. Similarly: $$\phi(Z_{0,2n-1}(t_{2k}))=\phi(t_{2(k-n)+1})=\alpha(-exp(k-n+\frac{1}{2}))=\alpha(o(k-n+1)),$$ and $$Z_{-n}^{-}(\phi(t_{2k}))=Z_{-n}^{-}(\alpha(exp(k)))=\alpha(-exp(-n+\frac{1}{2}))\bullet\hspace{3pt}\alpha(exp(k))=$$ $=\alpha(-exp(k-n+\frac{1}{2}))=\alpha(o(k-n+1))$.
Conclusions and outlooks
========================
With this paper we started the study of the Lie algebra introduced in [@C-K]. We considered the simplest case for this Insertion-Elimination Lie algebra, the one coming from the sub-Hopf algebra of ladder graphs, giving a description of such a Lie algebra in terms of (infinite) matrices. We then described the relations of such Lie algebra with other well known infinite dimensional Lie algebras like the Heisenberg algebra and ${\frak
gl}(\infty)$.
In forthcoming works we will study the structure and representation theory of ${\cal L}_L$ and we will consider the case of of the Insertion-Elimination algebra coming from the ladder Hopf algebra with additional decorations, which makes the underlying Hopf algebra non-cocommutative, in contrast to the case studied here.
#### **Acknowledgements.**
I.M. thanks the IHES for hospitality during a stay in the spring of ’03. The authors thank Kurusch Ebrahimi Fard for his careful reading of a preliminary version of the paper and for valuable discussions.
[BMP]{}
D. J. Broadhurst, D. Kreimer [*Exact solutions of Dyson-Schwinger equations for iterated one-loop integrals and propagator-coupling duality,*]{} Nucl. Phys.B [**600**]{}, 403 (2001) \[arXiv:hep-th/0012146\].
A. Connes, D. Kreimer [*Renormalization in quantum field theory and the Riemann Hilbert problem. I. The Hopf algebra structure of graphs and the amin theorem*]{}, Comm. Math. Phys. [**210**]{} (2000), no.1, 249-273.
A. Connes, D. Kreimer [*Renormalization in quantum field theory and the Riemann Hilbert problem . II. The $\beta$-function, diffeomorphism and the reneormalization group*]{}, Comm. Math. Phys. [**216**]{} (2001), no.1, 215-241.
A. Connes, D. Kreimer, [*Insertion and Elimination: the doubly infinite Lie algebra of Feynmann graphs*]{}, Ann. Henri Poincare [**3**]{}, (2002) no. 3, 411-433.
V. Kac [*Infinite Dimensional Lie Algebras*]{}, Cambridge University Press, 3rd Ed. (1994).
V. Kac, A. Raina [*Bombay Lectures on Highest Weight Representation of Infinite Dimensional Lie Algebras*]{}, Advanced Series in Mathematical Physics, Vol 2, World Scientific Pub., 1988.
D. Kreimer [*On the Hopf algebra structure of perturbative quantum field theory*]{}, Adv. Theor. Math. Phys, [**2**]{}, no. 2, 1998.
J. W. Milnor, J. C. Moore [*On the Structure of Hopf Algebras*]{}, Ann. of Math, [**81**]{}, no. 2, 1965, 211-264.
|
El Proyecto KDE lanzo hoy KDE Plasma 5.15, una actualización mayor que introduce un gran número de mejoras y novedades a este popular entorno gráfico.
Con seis meses de desarrollo, el entorno KDE Plasma 5.15 llega con un gran número de cambios para mejorar tu experiencia. Este lanzamiento incluye varios retoques a las interfaces de configuración, nuevas opciones para configuraciones de red complejas, iconos rediseñados, mejor integración con tecnologías y aplicaciones de terceros y un administrador de paquetes Discover mejorado.
Estas son las novedades más importantes de KDE Plasma 5.15
Entre las mejoras de KDE Plasma 5.15 se incluye un renovado administrador de paquetes Plasma Discover con mejor soporte para formatos Flatpak y Snap, mejor manejo de paquetes locales, soporte para actualizar distribuciones de Linux desde el widget de notificaciones de actualizaciones, nueva página de Fuentes y una más simple instalación de actualizaciones a través de la página de actualizaciones.
El widget de energía de Plasma recibió soporte para ver el estado de la batería de dispositivos Bluetooth conectados, ahora ya hay integración nativa con Firefox y otras aplicaciones GTK, la página de ajustes para escritorios virtuales tiene soporte en Wayland. El widget para redes de Plasma recibe soporte para túneles VPN WireGuard.
Otros cambios que valen la pena mencionar es el soporte para marcar la conexión de red como “limitada” en el widget de red, mejor soporte para usuarios con problemas de la vista en el lector en pantalla para que pueda leer los iconos de escritorio, soporte para ver y descargar nuevas extensiones del fondo de pantalla directamente de la configuración de los ajustes del sistema y un mejorado tema de iconos Breeze.
Hay muchos otros cambios en KDE Plasma 5.15, puedes ver una lista completa en este enlace. KDE Plasma 5.16 llegará el 11 de junio. KDE Plasma 5.15 llegará pronto a los repositorios estables de todas las distribuciones compatibles. |
Other than the economic downturn most of the world is grappling with due to the Sub-Prime Mortgage Crisis, no other topic has been more center stage lately than the energy crisis. Painful fill-ups at the pumps emptying wallets, food shortages ravaging the third world as corn is converted into ethanol, inflation rising as transportation costs are passed onto consumers, and the devaluation of the dollar as the U.S. government mass-prints money to keep up in competitive buying of fuel — all these and many more troubles have befallen the world over the amount of available oil.
“Black Gold,” “Texas Tea,” “Liquid Dinosaur” — the readiness of this substance is the source of troubles in modern world politics. It will also be a huge motivator in the prophetic scenes of Israel overcoming their Arab neighbors (Psalm 83), Russia and Iran trying and failing to seize the Middle East oil fields (Ezekiel 38,39), and the Antichrist’s struggle against Israel to control the Middle East to establish his Revived Roman Empire (Daniel 2,7).
While the world goes ga-ga over oil, Israel instead has been leading the way in becoming energy independent. With no known oil of their own, Israel knows that currently they are totally dependent on the millions of hostile Arabs intent on destroying them. If it wasn’t for God and the greed of OPEC being greater than their Islamic conviction to utterly remove Israel from the face of the earth, Israel would have been reduced to an agrarian society and destroyed by now.
Companies like Zion Oil and Gas, Inc., via The Joseph Project have been vigorously drilling for that questionable Israeli oil, believing the Bible supports that Israel is sitting on trillions of dollars underground. They base their search on Genesis 49:25-26; Deuteronomy 32:24; Deuteronomy 33:24; and Job 29:6. These verses speak of “blessings of the deep that lies below” and “oil from the flinty crag” and “let him bathe his feet in oil” and “the rock poured out for me streams of olive oil.”
Whether oil is under Israel or not, where Israel’s true search for energy independence lies is in its brilliant innovations in alternative energy sources like solar and battery power. Israeli scientists have released revolutionary second generation solar cells that are light years ahead of current installs. Israel is also looking to be the first country by 2020 to have eliminated all gas-powered cars with battery-powered cars. Because of Israel’s small size, driving distances are well within the current 124 mile battery limit. Israel is motivated to be totally energy independent because it knows it is in a race to survive.
The United States and EU, instead of selling out Israel to appease oil-rich Arab countries to keep the supply of oil running, should instead be partnering with Israel in their breakthrough advancements in energy. The United States could indeed be not just energy independent by following Israel’s lead and partnering with them, but also become major suppliers of energy to the world and eliminate the woefully unbalanced trade deficit.
Unfortunately, as end-time players are nearly ready to fulfill their prophetic roles and fall all over themselves to get Middle East oil, the day the world is free of oil tyranny with energy independence may well have to wait till Jesus is on the throne during His Millennial Kingdom. Pity our short-sightedness and greed. |
Q:
how to plot a bar graph of attributes of node in R
how can i plot a bar graph in R, with specific attributes of specific node?
i have a gml file like this:
graph [
node [
id 0
label "Apple"
year 1997
bold 1
normal 4
light 15
]
node [
id 1
label "Apple"
year 2000
bold 2
normal 16
light 2
]
node [
id 2
label "BBC"
year 2010
bold 18
normal 2
light 0
]
]
and i run this R script,i have troubles when i need to extract attributes value from a node selection:
install.packages(c("igraph"))
library(igraph)
g = read.graph(file = "/media/Data/TEMP/R_test/test.gml", format = "gml")
apple = V(g)$label[V(g)$label == "Apple"]
table(apple)
for(i in seq(along=apple)){
mL = apple[,i]$bold
L = apple[,i]$normal
pL = apple[,i]$light
barplot(????)
}
how can i fix this script?thx
A:
Here's a barplot of bolds per year for Apple:
df <- subset(as_data_frame(g, "vertices"), label=="Apple", c(year, bold))
barplot(df$bold, names.arg = df$year, main = "Apple")
|
Colorado Farmers Face Charges in Deadly Listeria Outbreak
By Miguel Bustillo, Ana Campoy
Federal prosecutors on Thursday brought criminal charges against two Colorado brothers whose farm’s cantaloupes were allegedly linked to a 2011 listeria outbreak that caused the deaths of 33 people and sickened more than 140 others in 28 states.
Eric Jensen, 37 years old, and Ryan Jensen, 33, who are the owners of Jensen Farms, turned themselves in to U.S. marshals Thursday and appeared before U.S. Magistrate Michael Hegarty on charges of selling contaminated cantaloupes across state lines, the U.S. attorney’s office for the District of Colorado said.
The brothers pleaded not guilty and were released on a $100,000 bond, pending a trial set to start Dec. 2, according to a federal spokesman. If convicted of the six counts of adulteration of a food and aiding and abetting, each faces up to a year infederal prison, as well as a fine of up to $250,000 for each of the charges.
“U.S. consumers should demand the highest standards of food safety and integrity,” said Patrick J. Holland of the Food and Drug Administration’s Office of Criminal Investigations, which helped bring the case. “The filing of criminal charges in this deadly outbreak sends the message that absolute care must be taken to ensure that deadly pathogens do not enter our food-supply chain.”
In a statement released by their lawyer, the Jensens said the charges didn’t suggest they knew about any contamination. They added that food producers and processors “must be strictly liable for the safety of our food supply.”
“As they were from the first day of this tragedy, the Jensens remain shocked, saddened and in prayerful remembrance of the victims and their families,” the statement said.
Prosecutors alleged the Jensen brothers were responsible for introducing listeria, a poisonous bacterium, into interstate commerce because their cantaloupes were prepared, packed and stored in substandard conditions.
In September 2011, the FDA announced that Jensen Farms had issued a voluntary recall after its Rocky Ford brand of cantaloupe had been linked to a listeria outbreak. The Centers for Disease Control and Prevention, which also assisted in the case, concluded in an August 2012 summary of the outbreak that 147 people became ill and 33 died. A pregnant woman also suffered a miscarriage, the CDC said.
Jensen Farms, located in Granada, Colo., was hit with numerous civil suits and filed for bankruptcy protection in 2012 following the outbreak.
Bill Marler, a lawyer representing 25 family members of those who died in the outbreak and 20 others who became ill, said he believed the charges are unprecedented, given that there was no evidence that the Jensens knowingly sold contaminated melons.
“It underscores the fact that these bugs are deadly, and farmers, manufacturers and retailers need to pay a heck of a lot more attention to how production is done,” he said.
Prosecutions as a result of food-borne outbreaks are rare, though not unheard of, said Michael Osterholm, director of the Center for Infectious Disease Research and Policy at the University of Minnesota.
“I applaud it,” he said. “It sends a very important message to the small group of bad actors that implicated a largely safe food industry.” |
## LanBlog 一站式个人博客解决方案
[](https://goreportcard.com/report/github.com/sinksmell/LanBlog)
[](https://godoc.org/github.com/sinksmell/LanBlog)
[](https://travis-ci.com/sinksmell/LanBlog)

<a href="https://github.com/d2-projects/d2-admin" target="_blank"><img src="https://raw.githubusercontent.com/FairyEver/d2-admin/master/doc/image/d2-admin@2x.png" width="200"></a>
**感谢以下开源项目作者及参与者的无私奉献**
> * [Beego](https://github.com/astaxie/beego/)
> * [Vue](https://github.com/vuejs/vue)
> * [D2Admin](https://github.com/d2-projects/d2-admin)
> * 其他相关开源项目
**技术栈**
> Vue.js + axios(ajax) + Beego Restful api + Mysql + Nginx
> 目前已经进行初步容器化,可在 k8s 集群上快速部署

### **项目介绍**
### 效果图
> * 暂时只迁移一篇文章
> * [演示地址](http://47.101.222.133)
* 首页

* 侧边栏

* 阅读界面

* 后台登录界面

* 后台管理界面

### 安装&使用
> * 以Ubuntu为例
> * 必须要有能正常工作,拉取镜像的 k8s 集群
### 快速部署
> * 首先需要一个可以工作的 k8s 集群
> * Mysql 默认密码是 sinksmell
> * 后台管理账号和密码均是 sinksmell
> * 配置文件在 conf/app.conf 里面可以修改登录密码,但是要重新编译镜像,在yaml文件中替换镜像版本
```shell
# 1. 克隆项目
cd /home
git clone https://github.com/sinksmell/lanblog.git
# 2. 进入项目根目录
cd /home/lanblog
```
#### 1. 部署mysql服务
```shell
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# ls
build conf controllers front go.mod go.sum LICENSE main.go makefile models README.md routers sql swagger vendor
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# kubectl apply -f build/mysql/lanblog-mysql.yaml
service/lanblog-mysql created
persistentvolumeclaim/mysql-pv-claim created
deployment.apps/lanblog-mysql created
persistentvolume/local-pv-1 created
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# kubectl get svc
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
kubernetes ClusterIP 10.152.183.1 <none> 443/TCP 24h
lanblog-mysql ClusterIP None <none> 3306/TCP 53s
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# kubectl get po
NAME READY STATUS RESTARTS AGE
lanblog-mysql-bfb7c765f-hkd5n 1/1 Running 0 2m19s
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog#
# 进入Mysql pod 内创建数据库 myblog
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# kubectl get po
NAME READY STATUS RESTARTS AGE
lanblog-backend-6d86579456-zqvtg 1/1 Running 0 3m24s
lanblog-mysql-bfb7c765f-hkd5n 1/1 Running 0 9m3s
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# kubectl exec -it lanblog-mysql-bfb7c765f-hkd5n /bin/bash
root@lanblog-mysql-bfb7c765f-hkd5n:/# mysql -u root -p
# 默认密码 sinksmell
mysql> CREATE DATABASE `myblog` CHARACTER SET utf8 COLLATE utf8_general_ci;
mysql>
# exit 退出容器
```
**至此MySQL服务成功部署!**
#### 2. 部署backend
```shell
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# ls
build conf controllers front go.mod go.sum LICENSE main.go makefile models README.md routers sql swagger vendor
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# kubectl apply -f build/lanblog/lanblog.yaml
deployment.apps/lanblog-backend created
service/lanblog-backend created
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# kubectl get po
NAME READY STATUS RESTARTS AGE
lanblog-backend-6d86579456-zqvtg 1/1 Running 0 10s
lanblog-mysql-bfb7c765f-hkd5n 1/1 Running 0 5m49s
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog#
# 测试一下 能否正常访问
# ps 在node上要通过clusterIp来访问service
# 在pod里可以直接通过 service name
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# curl -v http://10.152.183.204:8088/v1/category/list
* Trying 10.152.183.204...
* TCP_NODELAY set
* Connected to 10.152.183.204 (10.152.183.204) port 8088 (#0)
> GET /v1/category/list HTTP/1.1
> Host: 10.152.183.204:8088
> User-Agent: curl/7.58.0
> Accept: */*
>
< HTTP/1.1 200 OK
< Access-Control-Allow-Credentials: true
< Access-Control-Allow-Headers: Origin,Authorization,Access-Control-Allow-Origin,Access-Control-Allow-Headers,Content-Type
< Access-Control-Allow-Methods: GET,POST,OPTIONS
< Access-Control-Allow-Origin: *
< Access-Control-Expose-Headers: Content-Length,Access-Control-Allow-Origin,Access-Control-Allow-Headers,Content-Type
< Content-Length: 4
< Content-Type: application/json; charset=utf-8
< Server: beegoServer:1.12.0
< Date: Sat, 12 Oct 2019 06:52:47 GMT
<
* Connection #0 to host 10.152.183.204 left intact
# 正常访问
```
#### 3. 部署gateway
```shell
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# ls
build conf controllers front go.mod go.sum LICENSE main.go makefile models README.md routers sql swagger vendor
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# kubectl apply -f build/gateway/lanblog-gateway.yaml
deployment.apps/lanblog-gateway created
service/gateway created
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# kubectl get svc
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
gateway ClusterIP 10.152.183.118 <none> 80/TCP,9090/TCP 7s
kubernetes ClusterIP 10.152.183.1 <none> 443/TCP 24h
lanblog-backend ClusterIP 10.152.183.204 <none> 8088/TCP 15m
lanblog-mysql ClusterIP None <none> 3306/TCP 21m
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# kubectl get po
NAME READY STATUS RESTARTS AGE
lanblog-backend-6d86579456-zqvtg 1/1 Running 0 15m
lanblog-gateway-bc89c665c-k4lfr 1/1 Running 0 19s
lanblog-mysql-bfb7c765f-hkd5n 1/1 Running 0 21m
# 判断gateway是否工作正常
root@iZuf6i0qzccaf7xbj7ugtxZ:/home/lanblog# curl -v http://10.152.183.118:80
* Rebuilt URL to: http://10.152.183.118:80/
* Trying 10.152.183.118...
* TCP_NODELAY set
* Connected to 10.152.183.118 (10.152.183.118) port 80 (#0)
> GET / HTTP/1.1
> Host: 10.152.183.118
> User-Agent: curl/7.58.0
> Accept: */*
>
< HTTP/1.1 200 OK
< Server: nginx/1.17.4
< Date: Sat, 12 Oct 2019 07:05:58 GMT
< Content-Type: text/html
< Content-Length: 22270
< Last-Modified: Sat, 12 Oct 2019 06:34:31 GMT
< Connection: keep-alive
```
#### 4. 向外暴露服务
> * 借助nginx向外暴露服务,需要事先安装 nginx 和 80,9090 两个端口
>
> * 安装的Nginx有一个默认的Server 占用了 80 端口 手动删除
```shell
# 删除默认server
rm /etc/nginx/sites-enabled/default
# 拷贝lanblog.conf到 /etc/nginx/conf.d
cp front/lanblog.conf /etc/nginx/conf.d/lanblog.conf
# 查看gateway服务的clusterIP 本例中是 10.152.183.118
kubectl get svc
# 修改 /etc/nginx/conf.d/lanblog.conf 中的 proxy_pass 将 ip 替换为 上述ip
# 以下是修改后的结果
server {
listen 80;
server_name localhost;
# access_log /root/blog.log main;
location / {
proxy_pass http://10.152.183.118:80/ ;
}
}
server {
listen 9090;
server_name localhost;
# access_log /root/blog.log main;
location / {
proxy_pass http://10.152.183.118:9090/ ;
}
}
# 重新加载配置文件
nginx -s reload
```
#### 5. 访问博客
```shell
1. 输入IP访问博客界面
2. 输入IP:9090访问后台管理界面
```


|
Q:
Cant assign found item to variable as array
db.getSiblingDB("pilates").ball.find({ "list.Barcode.": "80196061999242"})
When , i run this query, it brings this document.
{
"Brand" : "Givi",
"list" : [
{
"Barcode" : [
"8019606199942"
]
}
..
}
]
.
...
.
}
but when i run this
db.getSiblingDB("pilates").ball.find({ "list.Barcode.": "80196061999242"}) .forEach(function(x){
print("m "+x.list.[0].Barcode);})
it gives this output
m undefined
or for this
print("m "+x.list.(0).Barcode);})
it gives this
is not a function :
@(shell):4:16
DBQuery.prototype.forEach@src/mongo/shell/query.js:501:1
@(shell):1:1
for this
print("m "+x.list.Barcode);})
gives this
m undefined
for this
print("m "+x.$.Barcode);})
gives this
$ is undefined :
@(shell):4:3
DBQuery.prototype.forEach@src/mongo/shell/query.js:501:1
@(shell):1:1
Why cant it get?
A:
List ins't an object but an array, then you need to do this:
print("m "+x.list[0].Barcode[0]);
Basically, to remove the .. And Barcode is an array too.
|
#tb 0: 1/22050
#media_type 0: audio
#codec_id 0: pcm_s16le
#sample_rate 0: 22050
#channel_layout 0: 3
#channel_layout_name 0: stereo
0, 0, 0, 1856, 7424, 0x18540b36
0, 1856, 1856, 1824, 7296, 0x5acd2484
0, 3680, 3680, 1856, 7424, 0xa1bc5c5a
0, 5536, 5536, 1824, 7296, 0x71a02ad1
0, 7360, 7360, 1856, 7424, 0x09cc32f2
0, 9216, 9216, 1824, 7296, 0xa3451726
0, 11040, 11040, 1824, 7296, 0x1eb40a18
0, 12864, 12864, 1856, 7424, 0xc55a2acf
0, 14720, 14720, 1824, 7296, 0x5b9fad3f
0, 16544, 16544, 1856, 7424, 0xea651ae7
0, 18400, 18400, 1824, 7296, 0x2bd5ddb6
0, 20224, 20224, 1856, 7424, 0xde4243b4
0, 22080, 22080, 1824, 7296, 0x358806d3
0, 23904, 23904, 1824, 7296, 0x511a144e
0, 25728, 25728, 1856, 7424, 0x887a3e84
0, 27584, 27584, 1824, 7296, 0xfeae2a0c
0, 29408, 29408, 1856, 7424, 0xa4ea5d22
0, 31264, 31264, 1824, 7296, 0xb3adf7fa
0, 33088, 33088, 1856, 7424, 0xce995dcc
0, 34944, 34944, 1824, 7296, 0x5b4cf574
0, 36768, 36768, 1824, 7296, 0x8a70eaf0
|
Social Icons
Sunday Is For...Pampering
12 February 2017
Hey everyone!I find it so hard to relax and switch off my brain, BUT pamper evenings are probably one of the only things that can solve both of those. Today I'm going to be sharing with you some of the products I use on a pamper evening.
BATHS
The first thing I do is run a warm bath. I have been loving the Zoella Beauty Bath Latte, a bath and shower milk, that you can pour under running water to leave your skin feeling super silky soft. The scent is filled with oh so delicious things; sweet almond, cacao and honey.
Usually I use a bath bomb or have some bubbles in my bath to make it a bit less boring!
FACE MASKS
Whilst I'm in or out the bath, I will put a face mask on. The one I have been using and loving is the Quick Fix Purifying Charcoal Mask. I leave it on for about 15 minutes but you know you need to take it off when your face feels tight and the mask has dried. Once taken off, my face feels so clean and clear.
SKINCARE
After taking off the face mask, I use the Garnier micellar water to cleanse my face. One of my new loves for moisturiser is coconut oil. I only use this at night because it leaves your face quite oily. But it is a miracle worker! When you wake up, the oil has sunk in and your face feels plump and so soft. You can get this from your local supermarket. It really helps to reduce dry patches and soothe chapped lips.
NAILS
On a pamper evening, I find it really therapeutic and relaxing to paint my nails. I don't do it that often because we aren't allowed it at school. This week I can as it's half term, yay! I have been loving this Essie nail polish in 'Figi'. The perfect spring shade!
Finally I like to finish off my pamper evening by reading and catching up on some Youtube videos. Check out my Book Recommendation posts to see what books I have been loving recently. |
github: [inlet]
custom: ["https://www.paypal.me/donatepatrick"]
|
Baseline evaluation of hand hygiene compliance in three major hospitals, Isfahan, Iran.
Hand hygiene is the mainstay of nosocomial infection prevention. This study was a baseline survey to assess hand hygiene compliance of healthcare workers by direct observation in three major hospitals of Isfahan, Iran. The use of different hand hygiene products was also evaluated. In 3078 potential opportunities hand hygiene products were available on 2653 occasions (86.2%). Overall compliance was 6.4% (teaching hospital: 7.4%; public hospital: 6.2%; private hospital: 1.4%). Nurses (8.4%) had the highest rates of compliance. Poor hand hygiene compliance in Isfahan hospitals necessitates urgent interventions to improve both hospital infrastructure and staff knowledge. |
Adenylate cyclase in the Drosophila memory mutant rutabaga displays an altered Ca2+ sensitivity.
Adenylate cyclase in washed, crude membrane fractions prepared from the Drosophila conditioning mutant, rutabaga, displays an altered responsiveness to Ca2+. The results are of interest since the modulation of adenylate cyclase activity by Ca2+ has recently been suggested to play a role in molecular events that underlie memory formation. |
package com.xuecheng.framework.domain.cms.response;
import com.xuecheng.framework.domain.cms.CmsPage;
import com.xuecheng.framework.model.response.ResponseResult;
import com.xuecheng.framework.model.response.ResultCode;
import lombok.Data;
import lombok.NoArgsConstructor;
@Data
@NoArgsConstructor
public class CmsPageResult extends ResponseResult {
CmsPage cmsPage;
public CmsPageResult(ResultCode resultCode,CmsPage cmsPage) {
super(resultCode);
this.cmsPage = cmsPage;
}
}
|
Q:
Setting Alsa to output 44.1kHz
I would like Alsa to output everything at 44.1kHz (by default it looks like it's using 48kHz). I understand that the correct option would be something like:
defaults.pcm.dmix.rate 44100
But where should this be included: in .asoundrc or .asoundrc.asoundconf? Does .asoundrc override settings in .asoundrc.asoundconf?
A:
Possible locations for the configuration file are /etc/asound.conf for all users, or ~/.asoundrc for a single user.
The file ~/.asoundrc.asoundconf is a file created by the asoundconf tool, and should not be edited by hand.
|
An analog-to-digital converter (ADC) is a device or circuit element that converts an analog signal to a digital data. For example, digital data can include a number of different digital codes, and each of the digital codes can correspond to a unique voltage or current level of the analog signal.
Advances in complimentary metal-oxide semiconductor (CMOS) technologies have dramatically improved the performance of systems which generally require an ADC as an interface. As the performance of such systems continues to improve, the performance of analog-to-digital conversion is becoming more important as analog-to-digital conversion is starting to become the system bottleneck in performance as well as power consumption. In addition to the concern of power consumption, some of the challenges in designing an ADC in such scaled CMOS technologies include, for example, a higher resolution, a higher sampling rate leading to a higher bandwidth, etc. |
Q:
Number of arrangements of the $10\heartsuit|9\heartsuit|8\heartsuit|5\spadesuit|2\clubsuit$
Let's say that the original ordering of the cards is $10\heartsuit|9\heartsuit|8\heartsuit|5\spadesuit|2\clubsuit$ and then we shuffle the cards.
I declare these two random variables and I want to calculate the probability of their outcomes:
$X$-number of cards that stayed in the same place after the shuffle.
$Y$-number of the heart suit cards that stayed in the same place after the shuffle.
For $X$ I have looked at this as the probability of picking the right place
$$\small{Pr[X=0]=\frac{D(5)}{5!}, Pr[X=1]=\frac{5*D(4)}{5!}, Pr[X=2]=\frac{{5\choose{2}}*D(3)}{5!}, Pr[X=3]=\frac{{5\choose{3}}*D(2)}{5!},Pr[X=5]=\frac{1}{5!},Pr[X=4]=0}.$$
For $Y$ :
$$Pr[Y=0]=\frac{\small\text{number of derangements of the 3 hearts*}|\{\{5\spadesuit,2\clubsuit\},\{2\clubsuit,5\spadesuit\}\}|}{\text{number of permutations}}=\frac{D(3)\cdot2}{5!}$$
For $Pr[Y=1]$ I'm having trouble counting.
A:
To compute the probability distribution for $Y$:
Note: throughout, $!n$ will denote the number of Derangements on $n$ letters.
$Y=0\quad $ We have three cases, according to how many of the black cards are fixed. If $0$ black cards are fixed then there are $!5$ ways to do it. If exactly one black card is fixed then there are $!4$ for each of the two ways to choose the fixed black card. And if both black cards are fixed then there are $!3$. Thus $$P(Y=0)=\frac {!5+2\times !4+!3}{5!}=\frac 8{15}$$
$Y=1\quad $ There are $3$ ways to choose the fixed Heart. For a fixed choice, we again have three cases. If $0$ black cards are fixed then there are $!4$ ways to do it. If exactly one black card is fixed then there are $!3$ ways to do it for each choice of fixed black card, and if both black cards are fixed then there is only $1$ way to do it. Thus $$P(Y=1)=3\times \frac {!4+2\times 3!+1}{5!}=\frac 7{20}$$
$Y=2\quad$ There are $3$ ways to choose the fixed pair of Hearts. For a fixed choice, we again have three cases. If $0$ black cards are fixed then there are $!3$ ways to do it. If exactly one black card is fixed then there are $!2$ ways to do it for each choice of fixed black card. If both black cards are fixed then there is no way to do it. Thus $$P(Y=2)=3\times \frac {!3+2\times !2}{5!}=\frac 1{10}$$
$Y=3\quad$ In this case we either permute the two black cards or we fix them both, so $$P(Y=3)=\frac 2{5!}=\frac 1{60}$$
Sanity checks: first of all, these must sum to $1$. Indeed we get $$\frac {32+21+6+1}{60}=1$$
Secondly, it is easy to see that the expected number of fixed hearts is $\frac 35$ (hint: use indicator variables). And it is easy to confirm that number directly from the probabilities.
|
New Delhi: The Congress on Tuesday questioned the need to deploy the CISF to guard a food park belonging to Baba Ramdev at Haridwar as the government maintained that it was "no special favour" to the yoga guru or to his manufacturing unit.
Answering supplementaries from Congress member Jyotiraditya Scindia in the Lok Sabha, Minister of State for Home Kiren Rijiju said: "We have a long list of 11,000 private enterprises and industries that have been provided with security cover by CISF personnel".
"You took the name of only one company. It will not be right to say that we have done a favour to one individual or only his firm," Rijiju said, adding that the decision to deploy Central Industrial Security Force (CISF) personnel at Ramdev s food park at Haridwar was done following "established procedures and specific inputs from the Intelligence Bureau".
Following a union home ministry order, the CISF has started providing full-time security cover to the food park from March. Rijiju said the decision to provide security cover to private enterprises by CISF was taken in 2009 when the law pertaining to CISF personnel was amended by the erstwhile United Progressive Alliance (UPA) regime. "Moreover, for the private firm you named, we have deployed only 35 CISF personnel.
It is the lowest on the table. CISF personnel have been deployed in various private enterprises," the minister added. Scindia also wanted to know why Baba Ramdev s park was provided with CISF personnel, while some airports were denied. In reply, the minister said that for deployment of CISF personnel in airports a well laid down procedure is followed.
"For example, for Srinagar airport, after assessing the ground reality, the CRPF (Central Reserve Police Force) has been deployed," Riiju said. Another Congress member Kamal Nath raised the issue of shortage of CISF personnel, to which the minister said the government will be soon recruiting about two lakh personnel. |
Mariupol’s “We Improve the City” campaign winners announced
Mariupol’s “We Improve the City” campaign announced the winning 16 projects for this year. The winners were given grants from Metinvest of up to UAH 100,000. The Company allocated UAH 1.4 million in total for this program.
This was the fourth time this contest was held in Mariupol. This year, Mariupol citizens submitted more than 100 projects and ideas for landscaping, improving the environment and developing the city’s infrastructure.
Most of the projects that won this year were focused on developing social infrastructure and health and fitness offerings. Ideas to promote patriotism and Ukrainian cultural heritage were also popular.
As a result of these projects, Mariupol will soon get a folk museum, alley of peace, ethnographic playground in a schoolyard, and patriotic street-art murals on city buildings.
Yuriy Zinchenko, general director of Ilyich Iron & Steel Works of Mariupol:
“The “We Improve the City” contest supported by Metinvest Group is changing life in Mariupol for the better. It involves citizens in social projects, supports them and gives them a real opportunity to implement specific actions. I was sure that there would be many people who wanted to take part in Metinvest Group’s contest, because the citizens of Mariupol are people who are active in life. The contest is growing every year and opportunities through the contest are always improving: we raise the budget and the minimum grants per one project have been increasing. I'd like to congratulate all of the winners. Your ideas are driving the development of Mariupol.”
Enver Tskitishvili, general director of Azovstal:
“Today, iron and steel workers and citizens of Mariupol represent a huge family that is allowing us to overcome many difficulties and helping with peaceful plans. Every year, more and more citizens are participating in the contest and bringing us many interesting ideas. The program involves active people and gives them a chance to feel like we are an effective force that can improve life in the city. Metinvest provides opportunities for citizens to become socially active and obtain financial support to realize actual projects. I would like to thank to all participants and winners for their proactivity!”
Yuriy Khotlubey, mayor of Mariupol:
“We have seen the 16 wonderful projects and learned about the people behind them. The main task for the metallurgical plants is not just to manufacture steel, provide work places and pay salaries, but for many other things! We welcome this initiative of Metinvest Group, the plants and their managers. Thanks to this contest, our city will have a more comfortable living environment, because the projects include the dreams of both adults and children, and issues related to patriotism and the environment – this deserves our thanks.” |
Football 101: Definitions and TermsBy Malamute,
last updated 12 April 2004
This document presents the definitions of terms used in the Football-101 section
of this
website (see left navigation bar). This list of definitions is a work in progress
that will be updated and expanded on a regular basis.
Reference Figure 1, below, for the nomenclature used in the defensive alignments
discussed within the terms and definitions.
Confused by the following
football terminology, I enlightened myself by doing some googling and studying. I
hope this document will be an enlightenment; however, be forewarned that I've never played football,
other than the sandlot variety.
Triple option – The
triple option, a three pronged attack, involves four players: the fullback, the
play-side guard, the quarterback and a trailing back.
After the play is underway and the quarterback takes the
snap, the quarterback looks for the play-side guard who may or not be visible.
If the quarterback can’t see the guard, he gives the ball to the fullback to
follow the guard up field. If the guard remains in the blocking pattern, the quarterback
veers along the line of scrimmage reading the DE’s shoulders—in this case, the DE
has been left unblocked. If the DE’s shoulders are not square to the
quarterback, the quarterback keeps the ball and cuts inside of the DE. If the
DE’s shoulders are square to the quarterback, the QB pitches the ball to the
trailing back who has maintained a five-yard separation with the QB.
Variations of the
triple option include, the inside veer option, outside veer option, and midline
option. Then there are the double option plays, plays run off triple
option action, with variations such as the speed option (with no fake hand-off
to the fullback).
Pistol Formation
The quarterback lines
up four yards behind the center, which is much closer than the seven-yard
setback in a traditional shotgun formation. The running back then lines up three
yards directly behind the quarterback, which is in contrast to the shotgun,
where they are beside each other. (See
the following link)
Wildcat formation
The Werewolf formation
figuratively sucks the life's blood out of an opposing defense, while the
Wildcat formation can add life to an offense. Seriously, in
the Wildcat formation, the quarterback is replaced with a running back --
think single wing. The ball is snapped directly to the running back, with no
time wasted handing the ball off; also, there is an extra blocker. The running
back has the option to pass, making the formation even more difficult to
defend. (See the following link).
Speed Option
If the pitch key (e.g., the DE above) takes the
quarterback, the QB pitches the ball to the pitch back. If the pitch key takes
the pitch back, the QB keeps the ball, plants his back foot and cuts
vertically up field. If the the pitch key attacks the quarterback quickly, then
the quarterback does not have to attack the pitch key, just pitches the
ball. A benefit of the option attack is that it leaves one player unblocked, a
simplifying factor.
Bubble Screen
Unlike a normal
screen, in which a running back receives a short pass with offensive linemen
blocking in front of him, the bubble screen uses a wide receiver receiving a
pass behind a wall of offensive players lined up wide, often being other
receivers and, perhaps, a tight end. (See the following link).
Spread Offense
As its name implies, the spread offense spreads a defense
horizontally with the threat of an option game (double and triple options) and
vertically because of the threat of 3 or 4 quick wide receivers. The spread
formation features five basic runs (the zone dive; the trap; the trap option,
the triple option; and the speed option). The passing game consists of play
action and sprint out passes. The quarterback must be able to run and pass.
"Because
an opposing defense is unable to stack the line of scrimmage with eight men due
to the four and five wide receiver sets, the quarterback has a smorgasbord of
options with the running game alone. You will see the quarterback run the ball
himself on draw plays, traps where the offense guard will pull and be a lead
blocker, and even an occasional quarterback sweep." [Smith].
The threat of
the passing game forces a defense into nickel and dime packages, making it
easier to run against. The offense allows teams with weaker personnel to move
the ball against superior players because all of them need not be blocked.
Cover-2 – The Cover-2 defense, a response to
the West Coast Offense and its short passing game, requires the two safeties to
defend the deepest portion of the field, which is split in half, each
safety defending half of the field, the "2" part of the defense. The three line backers and two cornerbacks
“cover” the middle portion of the field, which has been divided into zones.
It’s paramount that the four defensive linemen put a strong rush on the
quarterback.
Tampa Bay Defense - It all begins with a front four
that penetrates quickly, forcing the offense to secure the line of scrimmage.
Paying extra attention to the quick penetration allows the linebackers, who are
all gifted, to roam free and make plays; the secondary lines up in a cover 2.
It’s all about speed, and speed kills.
This defense allows the offensive coordinator to be
conservative in his quest to win the field-position battle, a battle aimed at
controlling the middle of the field between the thirty-fives. Once mid-field is
secured, the noose is tightened, until the opposing team is helplessly driven
back towards its own goal line. After that, a multiplicity of bad things can happen to it, ranging from block punts to interceptions, leading ultimately to
certain defeat.
Same in ice hockey, good teams control center ice with
strong fore-checking.
Same in chess; a good chess player controls the middle of
the board, i.e., the d4, e4, d5, and e5 squares.
Gaps
The open spaces between players on the line of scrimmage.
For example, the gap between the center and guard is called the "A" gap. See
Figure 1 below.
X, Y, Z Receivers
The x receiver, or the split end, aligns on the weak side
of the formation. The z receiver, or the flanker, aligns on the strong side of
the formation, maybe a couple of steps off the line of scrimmage in the slot.
The tight end functions as the y receiver, but often on passing plays functions
as another wide receiver.
Slot Receiver
The basic offensive formation
has the tackle and tight end closely positioned and receivers positioned wide
near the sidelines. That leaves a gap -- a slot -- between each receiver and the
line. When a receiver lines up in that gap, he is called the slot receiver.
Horse Collaring
Pulling an opponent
down by the back of his shoulder pads and riding him to the ground. Horse
collaring an opponent will draw a flag in both college and pro football.
Blitz
The linebackers and defensive backs keep their hands off the ground, although a
hand may need a “wipe” during the game (see USA’s “Monk” TV series for the
definition of obsessive-compulsive behavior).
When a linebacker(s) and/or defensive back(s) joins the defensive linemen in
rushing the quarterback, it is called a blitz. One, two, three, or four of them
may blitz the quarterback, overwhelming the offensive linemen. Cagey
quarterbacks look for blitzes, anticipating vacant areas to throw to, maybe to a
"hot receiver," such as the tight end.
Zone Blitz
In a standard zone blitz, a linebacker rushes the
quarterback while a defensive lineman -- usually on the other side of the field
-- drops back into pass coverage. Defensively, it can overwhelm an offense on
one side of the ball and leave it with no one to block on the other side.
Traditional blitzes leave a defense short handed, forcing
it to play man-to-man. Since a defensive lineman has dropped back into coverage
in the zone blitz, the defense can play zone coverage.
Problems result when the defensive lineman isn’t as quick as the receiver he
might cover or when the pass rush is not as effective because of his absence.
Bootleg
An
offensive play in which the quarterback fakes a handoff to a running back, then
sprints out in the opposite direction, looking to run or pass.
Play-action Pass
In play action,
a quarterback fakes a handoff to running back while he's dropping back to pass.
The quarterback hopes to slow down the defensive rush and force the defensive
backs to make a wrong decision, hoping for them to come up to help stop the run.
Skinny Post
Wiley Post was a skinny Post, but he's not involved in this
play. Any pass-receiving route that is directed towards the goal
posts is called a “post pattern.” For example, a receiver may run down a
sideline before angling towards the middle of the field, which in the case of a
post pattern is defined by a vertical swath (the width of the goal posts)
running from the line of scrimmage to the attacking goal posts. In a skinny
post, or a “glance,” the route is shorter in length and quicker than a deep
post, which may cover 30 or 40 yards. A color announcer may refer to the skinny
post as a "glance in" or a "bang eight." (See
Wikipedia for diagram)
Computing a hypothetical per
game offensive line efficiency rating
Since
the offensive line is arguably the most important positional unit on a team, a
way of measuring its performance efficiency is needed.
Otherwise, as they say, the
quarterback gets too much credit for winning and too much blame for losing.
Our hypothetical measure is a function of a
team's passing efficiency rating, its rushing yards per carry, its rushing
touchdowns, its offensive line's penalty yards and its sacks allowed. That is,
(*) The normalizing numbers X=20.57 and Y=5.09
were chosen so that YPC plus RT would be
equivalent to a Passing Efficiency Rating of 100. X and Y are the averages for
the Pac-12 stats involving YPC (X = 90/4.375) and RT (Y = 10/1.96) for the 2013
season. The numbers 90 and 10 were chosen so that YPC would have more weight in
the computation than RT; the numbers 4.375 and 1.96 are the Pac-12 averages for
YPC and RT. To guard against a meaningless
rating resulting from a limited number of carries, the normalizing number x
needs to be restricted. For one, if the number of carries
is less than z then set x=1, with the value of z yet to be determined. Alternatively, the
value of the factor ypc * x could be controlled in a similar way to the limits placed on the
NFL's passer rating computation.
This defense involves a defensive back who covers a
receiver individually (one on one), with no one to help him out if he gets beat,
usually a cornerback in that case.
Off Tackle Running Play
We
used to run this play in the school yard. Gil Dobie, Washington's unbeaten
coach (59-0-3; 1908-1916), worked on off-tackle plays in practices until the cows came home and ate
all the grass off Denny Field, leaving it a field of rocks and mud. Basically,
the tailback runs to the strong side, where the tight end lines up. A hole is
created by the tight end, the tackle and the fullback, who leads the play. The
fullback's job is to take out the outside linebacker, giving the tailback room
to run.
5-Technique
A defensive
alignment, whereby the defensive player aligns outside-eye to outside-shoulder
of the tackle. (See Figure 1 below).
Encroachment
Like a 5-yard
offside penalty. However, defensive contact is made with the offensive player
before the snap.
Pass Efficiency Rating
A measure of the quarterback's
effectiveness in the passing game. To determine pass-efficiency ratings points,
multiply a passer's yards per attempt by 8.4; add the number obtained by
dividing pass completions by pass attempts, multiplied by 100; add the number
obtained by dividing touchdowns by pass attempts, multiplied by 330; and
subtract the number obtained by dividing interceptions by pass attempts,
multiplied by 200. A passer rating of 100 or better is considered terrific in
the NFL. A rating of 158.3 is considered perfect in the NFL. However, certain
percentages in the NFL are capped, although the same measures are used. The NCAA
formula is shown below.
A convicted criminal may receive a sentence ranging from a nickel to a dime
(5 to 10 years). In football, nickel and dime packages refer to the number of
defensive backs employed in an obvious passing situation, when the offense
spreads the defense with receivers. The nickel package adds a fifth defensive
back (called the nickel back), usually a cornerback. Six defensive backs comprise a
dime package.
Free Safety
This sounds like a form of birth control, but it is not. A defensive player who
lines up deepest in the secondary. He defends the deep middle of the field and
seldom has man-to-man responsibilities.
Strong Safety
This sounds like...forget the joke. Like the free safety, the strong safety also
plays deep, but he usually lines up on the same side as the tight end and has
more responsibility in the run defense. A strong safety usually is bigger and
more physical than a free safety.
Cut and Chop Blocks
A cut block involves
a block below the knees, most often used by offensive linemen against defensive
linemen and linebackers. Two players double-teaming a defensive player, one
blocking high and one blocking low is called a chop block, which is illegal
because it can lead to injury.
Trap Block
As its name implies,
a defensive player is baited and then trapped. He is allowed through the
offensive line only to be blocked by another player behind the line, usually a
tight end, who is often put in motion on a trap block so that he gets to the
area behind the line of scrimmage where the defensive player is coming through
the line. On a "trap play," the running back attacks the hole left by the
vacated lineman.
Zone Blocking
In zone blocking schemes, the
offensive linemen team up to protect an area of the field, particularly against
teams that stunt or slant to a defensive gap on the snap of the ball. Because of
the myriad of defenses an offense is likely to face, it is necessary to reduce
blocking to its simplest elements rather than have a blocking scheme for every
defense that an offense might face. Hence, the introduction of blocking rules
and the concept of team blocking. For example, a tackle and guard may team up to
block a linebacker and defensive tackle, the blocking scheme for each offensive
player depending on whether the linebacker and tackle play straight up or the
linebacker stunts inside. Zone blocking depends on the concept of team blocking,
and its principles are built by getting movement off the line of scrimmage,
blocking all gaps and seams, and securing an area to the play-side of the hole.
Underneath Coverage
A defensive scheme
in which one or more linebackers drop back into pass coverage, but the safeties
remain positioned behind them. If a defense is playing underneath coverage, the
quarterback's passing lanes may be filled and he will have to dump the ball off
to a running back.
Weak-side and Strong-side
Weak-side refers to the side of
the line of scrimmage opposite the alignment of the tight end, while strong-side
refers to the side of the line of scrimmage whereby the tight end is positioned.
The right side of the formation in Figure 1 below would be called the strong
side, providing the player "LE" was aligned to create a marked "C" gap between
himself and the left tackle (LT).
Red Zone
The area on the
playing field between the opponent's 20-yard line and the opponent's goal line,
an area where the offense is expected to score a touchdown or at the least, a
field goal. Statistical percentages involving red-zone offense and red-zone
defense provide analysts with a strong measure for rating the quality of a
football team.
Recursive Formation
See recursive formation. (Just a
dumb joke for Geeks who like football, the Geek/liking of which may be an
oxymoron).
Tenets of the West Coast Offense
-- According to Bill Walsh, in the ideal setup, the wide
receivers would catch 15 passes a game, the running backs would catch 10 and the
tight ends would catch 5. A team is looking for 25 first downs a game. These
quantities are referred to as "Walsh's numbers."
--
Players must have more discipline; they have little opportunity for freelancing.
--
Use the pass to set up the run. The most successful WCO teams run the ball well.
--
If a team gains 7-8 yards per run, it can run as little as one out of four
plays; otherwise, the WCO calls for an equal number of running and passing
plays.
--
The quarterback must be mobile, be able to throw a touch pass with accuracy, and
be intelligent. He must throw on rhythm and timing. As Steve Young says, "In
contrast, the West Coast offense as it originated with Bill Walsh is any play or
set of plays that tie the quarterback's feet to the receiver's route so there is
a sense of timing."
--
In the 2-WR, 2-RB, 1-TE base set, any of these five players can be the primary
receiver at any given time.
--
Defenses are given a variety of looks, with an offense attacking a defense with
more receivers than it can cover. Mismatches and confusion are created on
defense by using 2 TE sets, 4 WR sets, and 3 WR sets, etc.
--
Using motion forces a defense to cover players with inappropriate players for
coverage, i.e., it creates mismatches.
--
Throw the football on any down or distance.
--
To maintain ball control, short passes to the tight end and swing passes to
running backs are key. Use tight ends who can catch better than block if there
is a question of personnel. Tight ends are key to a red zone attack.
--
The quarterback must be able to release the ball quickly and accurately on
timing after a 3-step drop. Receivers run precision routes. The offense is
designed to keep the quarterback healthy.
--
After the QB drops 3-steps back, one of the receivers should be open to catch a
pass if necessary. Ron Jenkins calls him the HOT receiver.
--
Power running behind zone blocking to minimize negative yardage plays. This is a
departure from the 49ers version of the WCO that used man-blocking and cut
blocks and misdirection. |
// ------------------------------------------------------------
// Copyright (c) Microsoft Corporation. All rights reserved.
// Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
// ------------------------------------------------------------
#include "stdafx.h"
static const size_t defaultReserveSize = 3;
namespace Transport
{
SecurityBuffers::SecurityBuffers()
{
ulVersion = SECBUFFER_VERSION;
cBuffers = 0;
pBuffers = nullptr;
freeSecurityBuffers_ = false;
Reserve(defaultReserveSize);
}
SecurityBuffers::SecurityBuffers(bool freeSecurityBuffers)
{
ulVersion = SECBUFFER_VERSION;
cBuffers = 0;
pBuffers = nullptr;
freeSecurityBuffers_ = freeSecurityBuffers;
Reserve(defaultReserveSize);
}
SecurityBuffers::SecurityBuffers(PSecBufferDesc pDesc, bool freeSecurityBuffers)
{
ulVersion = SECBUFFER_VERSION;
cBuffers = 0;
pBuffers = nullptr;
freeSecurityBuffers_ = freeSecurityBuffers;
if (pDesc != nullptr)
{
Reserve(pDesc->cBuffers);
for (ULONG i = 0; i < pDesc->cBuffers; i++)
{
AddBuffer(pDesc->pBuffers[i].BufferType, pDesc->pBuffers[i].pvBuffer, pDesc->pBuffers[i].cbBuffer);
}
}
}
void SecurityBuffers::Reserve(size_t size)
{
buffers_.reserve(size);
}
SecurityBuffers::~SecurityBuffers()
{
if (freeSecurityBuffers_)
{
for (ULONG i = 0; i < cBuffers; i++)
{
::FreeContextBuffer(pBuffers[i].pvBuffer);
}
}
}
void SecurityBuffers::AddBuffer(int type, void * pData, size_t size)
{
SecBuffer buffer;
buffer.BufferType = type;
buffer.pvBuffer = pData;
buffer.cbBuffer = static_cast<ULONG>(size);
buffers_.push_back(buffer);
cBuffers = static_cast<ULONG>(buffers_.size());
pBuffers = buffers_.data();
}
void SecurityBuffers::AddEmptyBuffer()
{
AddBuffer(SECBUFFER_EMPTY, NULL, NULL);
}
void SecurityBuffers::AddBuffer(int type, std::vector<byte> & data)
{
AddBuffer(type, data.data(), data.size());
}
void SecurityBuffers::AddDataBuffer(void * pData, size_t size)
{
AddBuffer(SECBUFFER_DATA, pData, size);
}
void SecurityBuffers::AddDataBuffer(std::vector<byte> & data)
{
AddBuffer(SECBUFFER_DATA, data);
}
void SecurityBuffers::AddDataBuffer(WSABUF & data)
{
AddBuffer(SECBUFFER_DATA, data.buf, data.len);
}
void SecurityBuffers::AddTokenBuffer(void* token, size_t size)
{
AddBuffer(SECBUFFER_TOKEN, token, size);
}
void SecurityBuffers::AddTokenBuffer(std::vector<byte> & token)
{
AddBuffer(SECBUFFER_TOKEN, token);
}
void SecurityBuffers::AddPaddingBuffer(void* padding, size_t size)
{
AddBuffer(SECBUFFER_PADDING, padding, size);
}
void SecurityBuffers::AddPaddingBuffer(std::vector<byte> & padding)
{
AddBuffer(SECBUFFER_PADDING, padding);
}
void SecurityBuffers::AddStreamHeaderBuffer(std::vector<byte> & header)
{
AddBuffer(SECBUFFER_STREAM_HEADER, header);
}
void SecurityBuffers::AddStreamTrailerBuffer(std::vector<byte> & trailer)
{
AddBuffer(SECBUFFER_STREAM_TRAILER, trailer);
}
void SecurityBuffers::RequestBuffer(int type)
{
AddBuffer(type, nullptr, 0);
}
void SecurityBuffers::RequestToken()
{
AddBuffer(SECBUFFER_TOKEN, nullptr, 0);
}
void SecurityBuffers::ResizeBuffer(int type, std::vector<byte> & buffer)
{
for (ULONG i = 0; i < cBuffers; i++)
{
if (pBuffers[i].BufferType == static_cast<ULONG>(type))
{
buffer.resize(pBuffers[i].cbBuffer);
}
}
}
void SecurityBuffers::ResizeTokenBuffer(std::vector<byte> & token)
{
ResizeBuffer(SECBUFFER_TOKEN, token);
}
void SecurityBuffers::ResizePaddingBuffer(std::vector<byte> & padding)
{
ResizeBuffer(SECBUFFER_PADDING, padding);
}
void SecurityBuffers::ResizeStreamHeaderBuffer(std::vector<byte> & header)
{
ResizeBuffer(SECBUFFER_STREAM_HEADER, header);
}
void SecurityBuffers::ResizeStreamTrailerBuffer(std::vector<byte> & trailer)
{
ResizeBuffer(SECBUFFER_STREAM_TRAILER, trailer);
}
void SecurityBuffers::WriteTo(Common::TextWriter & w, Common::FormatOptions const &) const
{
w.WriteLine();
for (auto iter = buffers_.cbegin(); iter != buffers_.cend(); ++ iter)
{
w.Write(" type = {0}, size = {1}, data =", iter->BufferType, iter->cbBuffer);
for (ULONG i = 0; i < iter->cbBuffer; ++ i)
{
byte byteValue = ((byte*)(iter->pvBuffer))[i];
w.Write(" {0:x}", byteValue);
}
w.WriteLine();
}
}
}
|
Inhibition of nuclear factor kappa B (NFkappaB) activity induces nerve growth factor-resistant apoptosis in PC12 cells.
The mechanism(s) underlying nerve growth factor (NGF)-mediated rescue of neurons from apoptosis is poorly understood, although it is well established that the high-affinity NGF receptor (TrkA) plays a pivotal role in mediating NGF effects. The report that the low-affinity NGF receptor (p75NGFR) can induce apoptosis prompted us to analyze the role played by a putative p75NGFR-associated signal-transduction element, the transcription factor nuclear factor kappa B (NFkappaB), in the modulation of apoptosis in PC12 cells. Here, we report that inhibition of NFkappaB function results in apoptosis of rat PC12 cells, a neuroblast-like cell line model of NGF-responsive neural tissues. Furthermore, NGF did not protect PC12 cells from cell death induced by the inhibition of NFkappaB. These results indicate that NFkappaB function is essential to maintain PC12 cell survival and to permit NGF-mediated rescue, consistent with the idea that signaling elements potentially associated with both TrkA- and p75NGFR are involved in the regulation of apoptosis. |
"use strict";
var utils = require('../../../src/packages/dom');
describe("SirTrevor.Submittable", function() {
var submittable;
var formTemplate = "<form><input type='submit' value='Go!'></form>";
beforeEach(function() {
submittable = new SirTrevor.Submittable(utils.createDocumentFragmentFromString(formTemplate));
});
describe("submitBtn", function() {
it("should be an input btn", function() {
expect(submittable.submitBtns[0].nodeName).toBe("INPUT");
});
});
describe("submitBtnTitles", function() {
it("has the initial title for the submitBtn", function() {
expect(submittable.submitBtnTitles).toContain("Go!");
});
});
describe("_disableSubmitButton", function() {
beforeEach(function(){
submittable._disableSubmitButton();
});
it("should set a disabled attribute", function() {
expect(submittable.submitBtns[0].getAttribute('disabled')).toBe('disabled');
});
it("should set a disabled class", function() {
expect(submittable.submitBtns[0].classList.contains('disabled')).toBe(true);
});
});
describe("_enableSubmitButton", function() {
beforeEach(function(){
submittable._disableSubmitButton();
submittable._enableSubmitButton();
});
it("shouldn't set a disabled attribute", function() {
expect(submittable.submitBtns[0].getAttribute('disabled')).toBe(null);
});
it("shouldn't have a disabled class", function() {
expect(submittable.submitBtns[0].classList.contains('disabled')).toBe(false);
});
});
describe("setSubmitButton", function() {
it("Adds the title provided", function() {
submittable.setSubmitButton(null, "YOLO");
expect(submittable.submitBtns[0].value).toBe('YOLO');
});
});
describe("resetSubmitButton", function() {
beforeEach(function() {
submittable.setSubmitButton(null, "YOLO");
submittable.resetSubmitButton();
});
it("should reset the title back to its previous state", function() {
expect(submittable.submitBtns[0].value).toContain("Go!");
});
});
});
|
Equip All delivers this extremely versatile combo backhoe & grapple attachment which mounts quickly and easily. It requires no outriggers yet it can outperform the larger, more expensive skidsteer backhoes in both speed and ease of operation. The unique large capacity bucket with retractable thumb allows for land clearing, stump removal, brush piling, log handling and much more. It can even handle the largest round hay bales. Professionally built to heavy-duty industrial standards. Suitable for commercial, industrial and construction uses, yet practical and affordable for the property owner. Unlike any other product you've seen! Check out the 8 foot Dig and heavy-duty construction! |
“No, don’t pull on that line!” yelled Rex Moore, as he watched the crew of a natural gas drilling rig struggle to work on a frigid and rainy day in Williamsport, Pennsylvania. Despite Moore’s 40 years of gas industry experience and the crew’s efforts, the well proved dry.
The one exception to Wednesday night tavern festivities in the Aiken Brewing Company in downtown Aiken, South Carolina -- where locals gathered to sip locally-made beer and cheer the Atlanta Braves -- was the tavern owner, Rob Pruitt.
“How many of you have been laid off at least once in your career as coal miners?” Robert Murray asks a group of coal mining foreman assembled at the St. Clairsville, Ohio headquarters of Murray Energy. Nearly every hand in the room goes up. The 75-year-old is CEO and president of Murray Energy, one of America’s largest coal companies. |
ITC Kulukundis™ font family
About ITC Kulukundis™ font family
ITC Kulukundis is the work of designer Daniel Pelavin, a square, connecting script which looks as though it could have been cast in shiny chrome for the side of a 1950s American roadster. Pelavin based his design very loosely on a vertical French script but the overall look is all his own. Unlike calligraphic scripts, the lower case letters all connect in exactly the same way and the straight diagonal junctures give the typeface its broad, spacious character and keep it locked into a continuous line. ITC Kulukundis could also be used to create a decorative border for special occasions. |
{
"name": "@welcome-ui/icons.information",
"sideEffects": false,
"main": "dist/icons.information.cjs.js",
"module": "dist/icons.information.es.js",
"version": "2.0.2",
"gitHead": "5e05d638c444651c818138903aef4a68cbbb5747",
"publishConfig": {
"access": "public"
},
"peerDependencies": {
"react": "^16.10.2",
"react-dom": "^16.10.2"
},
"dependencies": {
"@welcome-ui/icon": "^2.0.2"
},
"license": "MIT"
}
|
Isao Takahata talks about his film "The Tale of The Princess Kaguya" in 2015 Keystone
Isao Takahata, co-founder of the prestigious Japanese animation studio Ghibli that stuck to a hand-drawn “manga” look in the face of digital filmmaking, has died aged 82. He scored a worldwide hit in the 1970s with the Japanese TV series “Heidi, Girl of the Alps”, based on the book by Swiss author Johanna Spyri.
This content was published on April 6, 2018 - 14:13
swissinfo.ch, SDA-ATS/ts
Takahata founded Ghibli along with Oscar-winning animator Hayao Miyazaki in 1985, hoping to create Japan’s version of Disney. He helped shape the style and voice of what became one of the world’s most respected animation studios as well as this nation’s prized cultural export.
He directed “Grave of the Fireflies”, a tragic tale about wartime childhood, and produced some of the studio’s films, including Miyazaki’s 1984 “Nausicaa of the Valley of the Wind”, which tells the horror of environmental disaster through a story about a princess.
But it is for a little Swiss orphan for which Takahata will probably be best known outside Japan – particularly in Europe and South America.
External Content heidi <b>
“Heidi, Girl of the Alps”, a 52-episode anime series, was released in Japan in 1974 and has since been dubbed into around 20 languages. Takahata’s smiling Heidi ended up on cups, T-shirts and Swiss posters.
Thanks to the series’ continuing success, vast numbers of Japanese tourists flock to Switzerland every year in search of “Heidiland” in Maienfeld, which still uses Takahata’s animation on its website.
In 2009, Takaharta was awarded a Leopard of Honour at the Locarno International Film Festival.
Although Takahata’s films were often fantasies, he was a realist, insisting, for instance, on genuine musical instruments being played that matched what was depicted on the screen. He was gentle but also a perfectionist, grilling his voice actors until the tone and character interpretations were just right.
All his stories, he said, held the message of urging everyone to live life to their fullest, to be all they can be, not bogged down by petty concerns like money and prestige.
This article was automatically imported from our old content management system. If you see any display errors, please let us know: community-feedback@swissinfo.ch |
Q:
Maximo - Return multiple values based on another field using List Where Clause in Domain
I know I can't return multiple values with the Case statement but this is the best way I can explain what I want to accomplish. I am trying to write a statement where I will return different values based on what is entered in another field. I have something like this currently:
SELECT animal WHERE
CASE
WHEN :textbox is not null
THEN (SELECT animal from animalsTable where animalType = :textbox
ELSE (SELECT plant from plantsTable where plantType = 'edible')
So basically, I want to be able to list all the animals that correspond to what the user types in the textbox, but if they do not enter anything in the textbox, then I want to show them all plants that are edible instead. I almost always going to return multiple values for each value they enter.
For example, if the user types 'dog' then i will return 'dog' and 'wolf'. So this causes a problem since the case statement is boolean. How can I get around this?
Thanks.
A:
You can create an ALN Domain that contains all your lookup value list. In this case, both animals and plants. Then create a table domain that references ALN domain based on the key field you want to filter by. You'll need store this key in the Description field as a single value, or multiple values separated by a space or comma.
For us, we used a custom field (subcategory) that displayed a limited lookup from the ALN Domain using a Table domain filtering on the asset department number. The Asset Department Number is listed in the ALN Domain description.
ALN domain contains your plant and animal values. Description of ALN domain contains your key field vale.
If the Asset Department is empty, then entire list shows up.
The list where clause looks something like this:
domainid='CBRSUBCAT' and description like '%' || (select eq5 from asset where assetnum = :assetnum) || '%'
I used a like so we could enter multiple departments for one subcategory separated by comma. For you, you could use description = (equals) if you wanted.
|
Do changes in lymph node status distribution explain trends in survival of breast cancer patients in Denmark?
We studied the impact on survival of changes in breast cancer patients' distribution by lymph node status at the time of diagnosis. Our study included breast cancer patients diagnosed from 1978 to 1994 in Denmark, where the treatment schemes for breast cancer patients were fairly stable, and where mammography screening was limited. We measured lymph node status by the proportion of positive lymph nodes of all excised lymph nodes, as assessed by a pathologist. This measure was available for two-thirds of the breast cancer patients. The outcome was 5-year relative survival. Changes in lymph node status distribution explained half of the improvement in 5-year relative survival, and seem to be the single most important cause behind the improved survival of breast cancer patients in Denmark. |
MIAMI -- Dwyane Wade is now among the top 50 scorers in NBA history.
Wade has passed Dale Ellis for 50th on the league's all-time list. Ellis scored 19,004 points in his career; Wade's free throw with 3:10 left in the second quarter of Miami's 96-91 win over Philadelphia on Saturday night gave the perennial All-Star guard 19,005 for his career.
Wade finished with a game-high 27 points to go along with seven rebounds and four assists.
His career average of 24.0 points per game ranks fifth among active players, and only eight active players have more points than Wade.
Information from The Associated Press was used in this report. |
Charles Henry Goode
For Charles Henry Goode (c. 1851–1914) see his father's entry: Samuel Goode (mayor)
For Charles Henry Goode (1868–1940) see his father's entry: Charles Rufus Goode
Sir Charles Henry Goode (, 26 May 1827 – 5 February 1922) was a British Australian merchant, businessman, politician and philanthropist in the early days South Australia. He founded Goode, Durrant and Company in 1882.
History
He was born at Hinton, near Peterchurch, Herefordshire on 26 May 1827, and was apprenticed at the age of 12 years to a drapery establishment in Hereford, and in 1845 he proceeded to London, where he worked for Goode, Gainsborough and Co. and was, with later fellow-Adelaidean R. A. Tarlton, one of the first members of YMCA and closely identified with its founder Sir George Williams.
In 1848 he left England for South Australia aboard John Mitchell with Thomas Good (c. 1822 – 21 January 1889) of Birmingham (each later married a sister of the other), arriving in Adelaide in April 1849. Together they travelled the State by horse and cart hawking softgoods, and were successful enough to start a small softgoods business in Kermode Street, North Adelaide.
(Thomas Good later founded the softgoods firm Good, Toms & Co. His son Charles T. Good, was to be a partner in the architectural firm of Williams and Good who, amongst other work, designed the Grenfell Street premises of Goode, Durrant and Co.)
In September 1850 his parents and brothers Samuel and Matthew arrived in Adelaide on the Princess Helena, and helped carry on the business for 30 years as Goode Brothers. Warehouses were established in Rundle Street, Stephens Place and Grenfell Street, and carried out business throughout South Australia, Western Australia, and Broken Hill, New South Wales. A London establishment was opened in 1859, and Charles Goode returned to England for four years.
Politics
Charles was back in Adelaide from 1863 to 1867. In March 1865 he was elected, with Neville Blyth, a brother of Sir Arthur Blyth, as a member of the House of Assembly for East Torrens, the same election at which Adam Lindsay Gordon entered Parliament. Charles sat on several Royal Commissions, notably the Destitute Act Commission, which sat for over two years and established the State Children's Council, of which Charles was a founding member. He was a leading member of a committee appointed to secure religious equality in celebration of marriages as embodied in the Marriage Bill. He was at that time described by the Rev. James Maughan (October 1826 – 8 March 1871) as "a gentleman well known not only as an earnest advocate, but also as a firm supporter of the great cause of civil and religious equality". In 1866 Goode resigned his seat in the Assembly due to demands of his business. There was a worldwide recession and Charles was doing everything he could to keep the firm solvent.
Return to London
The following year Goode again returned to England, and remained for 12 months, managing the London branch of the company. While there, he was active in religious and philanthropic work, helping with the Field Lane Ragged Schools (with which Charles Dickens was associated), assisted with Regent's Park College and Rev. Dr. William Landells' Baptist church at Regent's Park, where he led the young men's Bible class. Among his pupils was Jacob Gould Schurman, who became President of Cornell University.
Goode, Durrant, Tite and Co.
In 1882 the partnership Goode Brothers was dissolved by mutual consent, and a new partnership with William Howard Durrant (c. 1819 – 15 September 1910) (previously a partner in Snook, Durrant and Co. of Nottingham) was formed, with temporary premises in Leigh Street, Durrant taking over the London branch. William Henry Tite (1832–1903), who had been associated with Goode Brothers for 20 years, joined the partnership later that year and remained with them until he retired in 1894. the company again becoming Goode, Durrant and Co. Durrant died in 1910 without ever visiting Australia. His association with Goode and George Wills (1823–1906), another prominent Adelaide draper, dates back to their days as employees of Goode, Gainsborough and Co. in London. The firm took much of the newly built Y.M.C.A. building, and in 1905 their own building in Grenfell Street. On Tite's retirement the firm became Goode, Durrant & Co., Limited.
Goode, Durrant and Murray
In the early 1930s both Goode, Durrant and their competitor D. & W. Murray Limited were operating at a loss, and combined their financial resources, and amalgamated their Adelaide businesses, returning to profitability.
D & W. Murray's building on Gawler Place was left vacant, later tenanted without charge or at peppercorn rental by the Red Cross Society.
Other business interests
Charles Henry Goode was, with J. H. Barrow, previously editor of the Register, a founder of the Adelaide Advertiser in 1858. The company was re-formed in 1864, with additional shareholders P. H. Burden, John Baker, Captain Scott, James Counsell, Thomas Graves and some others. His brother Matthew sold his share in 1871 on his behalf (Charles was in London) when the partnership was dissolved. By this time the shareholders were John Henry Barrow, Charles Henry Goode, Robert Stuckey, Thomas Graves, William Parkin, Thomas King, James Counsell, and George Williams Chinner.
He was chairman of the Adelaide Hat Factory, Ltd. a director of the AMP Society, and of the London and Lancashire Insurance Company. For a time he and his partners dabbled in sheep farming, but lost on the venture.
Philanthropic and religious activities
Goode was a great supporter of the Industrial School for the Blind, Adelaide YMCA, the James Brown Memorial Trust (managing Kalyra Home for Consumptives and Estcourt House), and the Children's Hospital. An extension of "Kalyra" was named the "Goode Wing" in his honour. He was a member of the State Children's Council, committeeman of the District Trained Nursing Society, the Convalescent Home, the Benevolent and Strangers' Friend Society, president of the Home for Weak Minded Children, chairman of the Adult Deaf and Dumb Mission, president of the Royal Institution for the Blind. For many years he ran the Flinders Street Baptist Young Men's Bible Class.
Recognition
His portrait was presented by the people of Adelaide to the Art Gallery of South Australia
He was knighted in 1912.
Family
Sir Charles had three brothers in South Australia: Thomas Goode (1816–1882) of Goolwa,
Matthew Goode (c. 1820–1901) of Matthew Goode and Co. and Samuel Goode jun.
He had two sisters in South Australia – Ann and Elizabeth. Their father, Samuel Goode snr., had leasehold properties at Walkerville and Islington.
Thomas Goode (c. 1834 – 22 July 1926) of Canowie Station and Matthew Goode of Goolwa were cousins.
Sir Charles Goode married twice; first on 6 August 1856 to Mary Harriet Good (c. 1830 – 18 August 1889), sister of his first business partner, and who was an invalid for much of her adult life, and on 16 December 1890 to Mrs. Helen Augusta Lloyd (née Smith), (12 March 1852 – 16 August 1936), who grew up in Beaumont and was educated by Elizabeth Whitby. She was the widow of Rev. Morgan Lloyd (1850–1888) and sister of Quinton Stow Smith (1864–1963), the first lay president of the Baptist Union. Sir Charles Goode had no children. Children of Lady Goode were:
Ethel Innes Lloyd (1881–1951),
Constance Gwen Lloyd (c. 1884–1913) married Harold Charles Drew on 2 March 1904
Helen Lloyd (c. 1885–1906).
References
A. C. Hill, 'Goode, Sir Charles Henry (1827–1922)', Australian Dictionary of Biography'', National Centre of Biography, Australian National University, accessed 8 February 2013.
Category:Australian company founders
Category:Australian philanthropists
Category:Members of the South Australian House of Assembly
Category:1827 births
Category:1922 deaths
Category:English emigrants to colonial Australia
Category:YMCA leaders |
Lion Fever High school students get firsthand look at UAPB
Hundreds of high school students from as far away as Indiana and Georgia gathered at the University of Arkansas at Pine Bluff on Friday as part of Lion Fever Day.
The UAPB Office of Recruitment hosted the annual event that gave prospective juniors and seniors a chance to tour the campus and to meet with faculty, staff and current students.
“We had almost 800 students from throughout the state of Arkansas as well as from Indiana, Atlanta, St. Louis, Louisiana, Mississippi and Texas,” UAPB Director of Recruitment Lee Hardman said. “It was a great turnout. During the program we talked about financial aid, the admissions process, the University College and the Honors College.”
Hardman said the students were broken into two groups, with one given a campus tour while the other took part in the college recruitment fair. The two groups then switched.
The campus tour gave students the opportunity to learn about the buildings where classes take place as well as the heritage of the university with a stop at the UAPB Museum and Cultural Center.
“They were able to hear the band and view a step performance,” Hardman said. “We had a good group of students. They all represented their schools well. We didn’t have any problems. All of the UAPB students that took part in the event did a good job.”
Hardman said members of the student government participated in the program as well as representatives from the campus Greek organizations.
Hardman said students were able to speak with representatives of every department on campus from aquaculture/fisheries to residential life and to have their questions answered so that they might leave with a better understanding of UAPB.
“Lion Fever Day is a tradition which dates back 20 or more years,” Hardman said. “We want students to have an opportunity to come to our campus to see for themselves what UAPB has to offer in the realm of education.” |
Q:
How to use xpath in JavaScript?
To access an element i used the following command document.getElementById('ghi').innerHTML="Replace the paragragh with this text"
How to use the same functionality in javascript by using xpath As in out suite we used xpath only
A:
It would do what you want:
function xpathFindById(id) {
return document.evaluate(".//*[@id='" + id + "']", document.lastChild, null,
XPathResult.ANY_TYPE, null).iterateNext();
}
var content = xpathFindById("content");
|
You are here
Virginia court upholds Oklahoma argument
OKLAHOMA CITY – A decision this week by the Fourth Circuit Court of Appeals backs Oklahoma’s argument in the state’s health care case that it has the right to sue the federal government over the law’s large employer mandate. The Virginia case involved whether Liberty University had “standing” to sue the federal government over the health care mandate and whether the Anti-Injunction Act applied to the case. The State of Oklahoma has argued the same issues in federal court in its lawsuit against an IRS rule that goes outside of the law. The federal justices unanimously ruled that the university did have standing and that the AIA did not apply. A brief filed Friday in Oklahoma’s health care case states, “In rejecting the federal government’s standing arguments, the appeals court relied on the fact that, notwithstanding any potential penalties, the mandate imposed substantial compliance costs on Liberty University.” In the opinion, the justices wrote, “Liberty need not show that it will be subject to an assessable payment to establish standing if it otherwise alleges facts that establish standing. … Even if the coverage Liberty currently provides ultimately proves sufficient, it may well incur additional costs because of the administrative burden of assuring compliance with the employer mandate, or due to an increase in the cost of care.” Oklahoma’s lawsuit was filed in September in federal court in the eastern district of Oklahoma. The lawsuit argues that an IRS rule punishes “large employers,” including local government, with millions of dollars in tax penalties in states that did not adopt state health care exchanges, which is not allowed under the Affordable Care Act. The lawsuit also asserts that the IRS rule violates the Administrative Procedures Act. |
The scientific goal of this project is to gain further insjght into how chromatin-based pathways contribute to endothelial cell (EC) gene expression. A focus of our studies is the gene responsible for the production of NO by vascular endothelium, namely endothelial nitric oxide synthase (eNOS). We have reported that the promoter of the eNOS gene is hypomethylated in endothelial cells both in vitro and in vivo. In contrast, the promoter was densely methylated in genomic DNA isolated from cell types that do not express eNOS. We have also reported that the nucleosomes that encompass the eNOS core promoter were highly enriched in activating histone modifications in expressing versus non-expressing cell types. The overall hypothesis of this project is that epigenetic processes play a major role in the spatial and temporal regulation of EC gene expression. This project is extremely complementary to our overall PPG theme. We will collaborate with all members of this PPG and take full advantage of the PPG Cores. In Aim I we will define whether the maintenance of cell-specific epigenetic marks at the eNOS proximal promoter is critically important for maintaining constitutive transcription of eNOS in ECs and transcriptional repression in differentiated cell types that do not express eNOS. In Aim II we will define the contribution of epigenetic pathways to the temporal regulation of eNOS expression during EC differentiation and vascular development. We will use in vitro and in vivo approaches. We have found differential patterns of epigenetic modifications at the promoters of a number of EC-specific genes suggesting that our findings with the eNOS gene may be broadly relevant. Therefore, in Aim III we will use a ChlP-on-chip approach to define the contribution of epigenetic pathways to the global regulation of EC-specific gene expression. We will also identify large-intergenic non-coding RNAs that especially enriched in ECs. We anticipate that our studies will provide new insight into the contribution of epigenetic pathways to global patterns of EC-specific gene expression |
This project was created over a couple of months simply for training purposes. I've taught myself the basics of a couple plugins and ZBrush thanks to this.
I made the whole thing in Photoshop except for the node editor, which was created in Illustrator.
Some elements, like the bacteria, the drone wireframe, the telemetery thing and the planet were made in After Effects.
This will be animated at a later point, but for now it works as a simple styleframe. |
information from West Seattle Junction Association
Extensive interviews with business owners throughout West Seattle
Recommendations include peninsula-wide marketing effort
A new study directed by West Seattle Chamber of Commerce and West Seattle Junction Association, funded by the Office of Economic Development, set to identify the biggest challenges facing West Seattle businesses.
They are physical, direct challenges that are harming businesses.
These challenges are based in emotion or perspective.
Tangible Challenges
Parking & Transportation
Cost of Doing Business in Seattle
Homelessness
Space/Infrastructure
Intangible Challenges
Relationship with City of Seattle
Feeling of Helplessness
Loss of Community Feel
“The goals of this project were to determine the key challenges that West Seattle businesses face, identify common threads between business nodes, and collect information on key resources available to the community. The results of the report gave us the forum to have impactful conversations with business owners.” said Lora Swift, Executive Director of WSJA. “Now our organizations (WSJA and WSCC) have a deeper understanding of the challenges in West Seattle, and how we can build a better business community by combining the strengths of our organizations.”
The qualitative study was done through 32 in-depth interviews primarily with small business owners in the seven business nodes (Alaska Junction, Morgan, Alki, Avalon, Admiral, 35th, Westwood Village) and a few community stakeholders, all located in West Seattle.
There were four recommendations from the report:
Market West Seattle to New Residents Close Divide Between City of Seattle and West Seattle Businesses Continue Hosting Solutions-Focused Programming Get Involved in West Seattle Mural Project
Selected quotes from interviews:
“We fell in love with this place. After looking all over the city, we decided that unless we could live and work in West Seattle, we weren’t going to move [to Seattle].”
-Small business owner on Alki
“Parking is the biggest challenge. My business depends on people getting in and out quickly. Lack of parking would drive us out of the Junction.”
-Small business owner in the Junction
“I feel that the Seattle City Council sees business as an adversary and a checkbook.”
-Business owner in Alki
“We feel helpless at times. We hope it will get better, but it’s exhausting.”
-Small business owner in the Alaska Junction
“That’s my biggest fear, that people will move in
and turn West Seattle into a bedroom community for downtown.”
-Small business owner in the Junction
“The new minimum wage is killing the restaurant business.”
-Restaurant owner on Alki
“Well, do we go back to dumpster diving for packing materials?
Would we do that for our employees to have health insurance?
I guess we would.”
-Retail business owner in Avalon
“I don’t feel like the city cares about small business. They care about Trader Joes.
We’re just a blink.”
-Small business owner in the Alaska Junction
“The partnership of the WS Junction Association and the West Seattle Chamber of Commerce allows two organizations, each with a small professional staff, to make a positive impact on the business community. Using this information, we are moving forward. Immediately after the study, an application was completed and a 2018 grant from the Office of Economic Development gives us seed money for a pilot program marketing West Seattle to new residents.” - Lynn Dennis, CEO, West Seattle Chamber of Commerce.
Part of the results were geared towards a way to connect all of the West Seattle resources together in a living website. The website would focus on gathering resources around West Seattle that could be referenced by both business and citizens. The result was the new West Seattle Resource Roundup site that ties together nonprofits, media, city and neighborhood groups.
http://wsresourceroundup.com
The Junction is a nonprofit 501(c)(3) that was developed to pay for the parking lots in the Junction. The Junction Association merchants produce many community events throughout the year including Art Walk (year round 2nd Thursdays), Summer Fest (July), West Seattle Outdoor Movies (July-August) Harvest Festival (October) and Hometown Holidays (December). In addition, the Junction Association merchants pay to keep the streets of the Junction safe & clean, plus we fund the 95 flower baskets that beautify the Junction from May through September.
The West Seattle Chamber of Commerce is a nonprofit 501(c)(6) that has served as the leading advocate for the West Seattle business community since 1923. A volunteer-based group of businesses and individuals takes advantage of benefits including networking opportunities, educational programs and a unified voice in governmental affairs that impact our business environment. The Chamber focuses on the sustainable economic growth of a diverse, viable business community on the West Seattle peninsula. |
be (2 + 0)*(408/80 - 5). What is the smallest value in u, r, -3?
-3
Let s = -139 + 138.945. Let m be (-3 - -3) + (-2)/9. Which is the smallest value? (a) 3 (b) s (c) m
c
Let v be (-2 - -6) + (1 - 46). Let t = 44 + v. What is the second biggest value in -2, t, -0.4?
-0.4
Let u be (150/(-36))/25 + 3/(-6). Which is the second biggest value? (a) 0.4 (b) -0.614 (c) u
b
Let w be ((-52)/(-91))/(156/(-42)). Which is the smallest value? (a) 0.2 (b) -3 (c) w (d) 3/8 (e) -4
e
Let c = 0 - -2. Let q be (5 - c) + 3*-1. Let w = -5.5896 + 1.5896. What is the second biggest value in 0.4, w, 1, q?
0.4
Let g(s) = -101*s + 405. Let l be g(4). What is the second biggest value in 0.12, -19, 2/9, l?
2/9
Let t = 10.58 - 1.01. Let n = t - 7.57. Let a be (3/10)/(6/(-5)). What is the third biggest value in -1/7, n, a?
a
Let w be (-1)/(-6) - (-50)/240. Let s = -1.5 + 1. Let u = 227 + -228. Which is the second smallest value? (a) w (b) 4 (c) u (d) s
d
Suppose -8374*w - 22 = -8385*w. Let n be (-31)/15 - (-10)/25. Which is the third biggest value? (a) 0.07 (b) w (c) n (d) -2
c
Suppose 0 = 4*r - 3*t - 11, -5*r + 4*r - 1 = 3*t. Which is the third biggest value? (a) -0.02 (b) 1.1 (c) r
a
Let t(i) = -23*i - 51. Let d be t(-3). Suppose -32 = -d*f + 40. What is the third smallest value in f, 2, 0.1, -14?
2
Let q = -388.6 + 382.6. Which is the third smallest value? (a) 2 (b) 7 (c) q
b
Let i = -212541/4 - -53136. Let v be 2/(-3) - (-20)/36. Which is the third smallest value? (a) v (b) i (c) 4
c
Let q = -2278/3 + 759. Let s = -6 - -1. Let t = -1 - -5. What is the third smallest value in q, t, s?
t
Let y = 127 - 209. Let d = -7853 - -7853. What is the smallest value in y, d, 3?
y
Let t = 0.9 + -1. Let s be ((-25)/10)/(250/200). What is the biggest value in s, 4, t?
4
Let r = 22.5 + -23. Let d = 15.8 - 10.8. Which is the third smallest value? (a) r (b) 3 (c) d
c
Let n be ((-112)/(-40))/(-2*(-1)/130). Let h = 2364/13 - n. Which is the fourth biggest value? (a) h (b) -4 (c) 0.3 (d) -1
b
Let s = 6974.4 - 6974. Which is the biggest value? (a) 2 (b) s (c) 12 (d) 1/4 (e) -11
c
Suppose 9*g - 3*g = 30. Let l be -2 + (4 - g) + 1. Let x be (l + -2 - -2)/10. Which is the third smallest value? (a) 0.05 (b) x (c) 0.1
c
Let h = -3.2384 + 3.4384. Let x(y) = -y - 1. Let j be x(3). Let q be (-7)/(-4) + (-1)/j. Which is the biggest value? (a) -5 (b) h (c) 3 (d) q
c
Let l = 43988 + -87977/2. Which is the fourth biggest value? (a) 4 (b) l (c) 1791 (d) -3
d
Let s = 1000.5 - 1001. Let l = 103 - 506. Let x = -6047/15 - l. Which is the second biggest value? (a) s (b) -5 (c) x (d) -2
a
Let r be 730/(-415)*105/(-585). Let d = r + -2/249. Which is the biggest value? (a) d (b) 1 (c) -0.06
b
Let d = -2.53 - 0.47. Let k = 2.7 + d. Let n(y) = y**2 + 4*y. Let x be n(-3). What is the biggest value in k, 0.3, -2, x?
0.3
Let t = -9 + 39. Let k = -32 + t. What is the second smallest value in k, 3/7, -1?
-1
Let s = -12.9 - -10. Let q = -0.1 + s. Let f = -325/8 + 967/24. Which is the third biggest value? (a) -0.21 (b) -4 (c) f (d) q
d
Let g be (-42501)/(-1209) + 4/(-26). Suppose -90 = 26*p - g*p. Which is the third biggest value? (a) 4/7 (b) p (c) -0.4
c
Let v = 0.059733 - 0.559733. Let u be (-40)/(-18) + 2/(-9). Let b = -1 + u. What is the fourth smallest value in b, 1/5, 14, v?
14
Let m = 8043 + -56303/7. Which is the smallest value? (a) m (b) 0.2 (c) -1/731
a
Suppose 2*k + k + 33 = 0. Let y be (-5)/10 - k/30. Let x = 30142 + -30142. Which is the third smallest value? (a) x (b) -0.3 (c) y
a
Let m = 12.462 - 12.2. Let o = m - 0.282. Which is the third smallest value? (a) o (b) -3 (c) 2/3
c
Let j(r) = 29*r**2 - 5*r + 3. Let o be j(3). Let s be ((-49)/98)/(2*(-1)/1005). Let t = s - o. Which is the second smallest value? (a) t (b) -0.5 (c) 1/3
c
Let w = -0.166 + 4.886. Let y = -1.72 + w. What is the second biggest value in -1/5, -1/17, y?
-1/17
Let s be 1 + -48 + (1187 - 1137). Let g be 5*(4/(-10) - -2). What is the second smallest value in -0.3, s, g?
s
Let w(f) = -f**3 - 2*f**2 + 4*f - 3. Let z be w(-4). Let y = 1.3366 + -1.5366. Which is the biggest value? (a) y (b) -1/4 (c) 0.2 (d) z
d
Let w be (-580)/104*384/(-10). Let f = -214 + w. Let q = 0.43 + -0.03. What is the third biggest value in q, -0.4, 0.07, f?
0.07
Let j = 0.34 - 0.04. Let o be (-99)/(-330) - 74/180. What is the second smallest value in o, j, 0.1, -2/5?
o
Let q = 71.3 + -87.3. What is the third biggest value in q, -2/17, 3/2, -3, 0?
-2/17
Let r = 3701/7 + -529. Let p = -9.4 + 9.4. What is the fourth biggest value in 2/9, p, -4, r?
-4
Let j = 0.156 - -8.544. Let i = -1.74923 - 0.25077. Which is the second smallest value? (a) -1 (b) j (c) i
a
Let v be 18/(-52) - (-1)/2. Let t = 318873 - 318873.017. Let y = -3 + 3.2. Which is the second smallest value? (a) v (b) y (c) t
a
Let s = -668.8 - -694. Let g = s - 27.2. Let y = -3 + 2. What is the smallest value in -0.1, g, y, 3/5?
g
Suppose 3*q = 4*a + 23, 16 = -4*a + 4*q - 12. Let l be 1/(6/9 - 1). Let m be (-12)/8*l + -3. What is the smallest value in a, -4, m?
-4
Let m = 0.05 - 0. Let i = 112.13 + -111.93. What is the second smallest value in m, i, 2?
i
Let y = -13621 - -20228. Let j = -6603.887 + y. Let z = j + -0.113. Which is the fourth smallest value? (a) -20 (b) -0.4 (c) z (d) 1/5
c
Let i = -4499 - -4504. What is the smallest value in -2, 0.1, -1, 0.4, i?
-2
Let x = 388 + -836. Let k = x - -451. What is the second biggest value in -2/23, k, 0, -4?
0
Let y = -0.2561 + 4.2561. Which is the fourth smallest value? (a) 5 (b) -4 (c) y (d) -0.79
a
Let i = 295/7 - 3287/77. What is the second smallest value in i, -5, -0.9?
-0.9
Let g = -178 + 173. Let l = -1.2 + -0.7. Let v = 5.9 + l. What is the third smallest value in 5/2, -4/5, g, v?
5/2
Let l be 1/(-10)*2*3. Let p be (-3)/(-108)*6*(4 + (-13)/4). Which is the fourth biggest value? (a) l (b) p (c) -5 (d) -68
d
Let j be 5/(-18) + 41552/(-15264). Suppose 6*l - l - 5 = 0. Suppose 5*w - 4 = l. What is the smallest value in w, 5, j?
j
Let w = -12361 - -12363. Let p(o) = -2*o**2 + 5*o + 5. Let g be p(5). Let q be 0 + 1 + g/22. Which is the third biggest value? (a) w (b) q (c) 3/7
b
Let i(w) = -677*w - 4061. Let y be i(-6). What is the fifth biggest value in -397, 0.4, -3, y, -1?
-397
Let l be -2*1/12*2. Suppose -2*v = 3*r - 12, 0 - 30 = -5*v + 4*r. Let s = -5.42 + 4.42. Which is the third biggest value? (a) l (b) v (c) s
c
Let f(w) = -3*w - 66. Let l be f(-29). Let h(n) = -2*n**3 + 42*n**2 + n - 19. Let i be h(l). What is the third biggest value in -5, -0.02, i?
-5
Let z = 0 + 0.1. Let s = -3/5 + 37/45. Let g = 220.4 - 219. What is the third smallest value in s, g, z?
g
Let x = 3691.9 + -3692. What is the third smallest value in x, 0, -7?
0
Let m = 2.8 - 3. Let s = 258.94 + -259.31. What is the biggest value in m, -0.5, s?
m
Let n = -36.66 - -1564.66. Let t = n - 1527.8. Let m = -20 + 31. Which is the second biggest value? (a) -1/3 (b) t (c) m
b
Let s be 28/(-238) + (-288)/(-714). What is the biggest value in 257, -4, s?
257
Let a = 67 - 48. Let k(r) = r - 34. Let j be k(a). Let y be 25/10*(-2)/j. What is the fourth smallest value in -0.3, y, -5, -2/15?
y
Let p = 14.411 + -13.891. What is the second biggest value in 34, p, -2?
p
Let p = 7242 + -7247. What is the fourth biggest value in p, -2/3, 0, -4/3, 642?
-4/3
Let u = 21/4 - 9/2. Let b(p) = 8*p - 3 - 55 + 22. Let z be b(5). What is the fourth biggest value in 1/5, -0.4, u, z?
-0.4
Let l = -1.6 + 1.1. Let f = -275 + 7426/27. What is the third biggest value in -1, f, l?
-1
Let s be ((-28)/1176)/(4/24). What is the smallest value in 1/3, 0.2, s, 1013?
s
Let r = -63 + 67. Let z = 9.55 + -4.55. What is the second biggest value in 2, z, r?
r
Let u = -88757/9 - -9862. What is the second biggest value in u, 124, 1, -2/11?
1
Let o = -2.3 + 0.3. Let p be (-7)/(210/(-12)) + (-1)/40. Let k be 3*1*(-413)/4956. Which is the smallest value? (a) k (b) p (c) o (d) -1/2
c
Let p be 6/(-14) + -11 + 1710/168. Let o = p - -17/12. What is the smallest value in 18, -1, o?
-1
Let h = -68 - -63. Let v(y) = -28*y - 39. Let r be v(6). Let p be r/231 + 4/22. Which is the second biggest value? (a) -3 (b) p (c) h
a
Let x = -2 - 2. |
In Defense of Old Grumpy Guy: Get Off My Lawn - DanielBMarkham
http://www.whattofix.com/blog/archives/2011/03/in-defense-of-o.php
======
mquander
_At the same time, the average individual's ability to commit to something of
any duration has decreased dramatically._
Citation?
_It wasn't unusual for a (home-schooled) pre-teen in the 1700s to know Greek
and Latin._
Bullshit. Pre-teen or not pre-teen, in the mid-1700s, the majority of Europe
didn't know how to read and write.
I don't think it's reasonable to make sweeping remarks like this without real
statistics to back them up. I don't have many friends who sit on their ass
playing WoW all day and night, and I doubt you do either. Just because these
people exist doesn't mean that the whole world is going to shit at record
rates.
~~~
synnik
I'd recommend y'all not worry too much about the inaccuracies of his
historical contexts.
He actually gets to his point farther down in the article, and his point is
valid.
~~~
mquander
Hah, but he _added_ citations! I would never have had this nitpicking
opportunity if I hadn't asked!
I know there's a lot of evidence that increased screen time for kids is
harmful for studies, so I won't begrudge that point.
Let me argue a point I didn't intend to argue. Suppose the average American
(just a reference class that I feel OK making guesses about) really is getting
dumber, more hedonistic, and more prone to distraction. Is this going to kill
us?
The same technology that is causing problems for the average American is
opening up awesome new opportunities for anyone who gives a shit. My life is
_way_ better than it would have been twenty years ago; I can get any book I
please and it arrives instantly, or in a few days. I can take as much time as
I like online and have careful conversations with smarter people than me, or
collaborate with them. Anyone can self-publish anything and be judged by their
peers on its merit, and I can generally go read it and judge them for myself.
These are amazing changes, and it seems impossible to enable these things
without enabling WoW players, cat videos, and inane soundbite banter.
Do we need to try to strive to make something out of people who don't care to
make anything out of themselves?
------
dralison
As an old guy myself (47), I've found that it's easy to get frustrated when
you see youth repeating the mistakes you've made. While I've learned many
things over the years that I enjoy passing on to those less experienced, the
skill most valuable is the ability to convey that information in a positive
and constructive way.
The irony to me is that so many incredibly talented "senior" engineers and
business people have awesome lessons to impart but they never acquired the
gift of communications. They don't present themselves as the sage elder that
deftly imparts wisdom, they feel a sense of entitlement from their age and it
shows as soon as they open their mouths.
That said, I really enjoyed reading your blog post Daniel.
------
ojbyrne
"Atheism is making one of it's cyclical comebacks to popularity"?
That's bad?
Also
"Over the past couple of millennia, the amount of work required simply to live
has decreased dramatically, at least in the western world. It used to be
almost your entire life was taken up simply in an effort to survive; now most
of us work 40 hours per week and it takes care of all of our needs."
That's not really true. I suggest reading "A Farewell to Alms"
([http://www.amazon.com/Farewell-Alms-Brief-Economic-
History/d...](http://www.amazon.com/Farewell-Alms-Brief-Economic-
History/dp/0691121354))
A more accurate description would be something like "After several thousands
of years where civilization has made life more difficult for the vast majority
of people, over the last 200 years, in a few countries that have experienced
the industrial revolution, the effort required to survive has returned to
roughly the same level as required by paleolithic hunter-gatherers. Though
with significantly longer life spans almost entirely due to a large reduction
in infant and child mortality."
------
cafard
"Not trying to sound militaristic, but it used to be when a national emergency
beckoned, you'd have to beat people off to keep them from volunteering. Now
the volunteer is an unusual animal."
Has anybody told Mr. Markham that the US has had an all-volunteer military
since the 1970s, or that the biggest national emergency of all was largely met
with draftees? (Also, to keep an eye out of double entendres...)
~~~
jtbigwoo
Yeah, no one mentions this anymore, but there were huge protests against the
draft for World War I. And rather than being able to rely on the volunteers,
the U.S. had to draft something like 10 million men for World War II.
~~~
anamax
> there were huge protests against the draft for World War I.
Wilson campaigned against the war, and then turned around and escalated.
FWIW, the WWI draft protests were much less vehement than the Civil War draft
protests. (Curiously, the draft protests were much worse in the NE, especially
NY and NYC even more so, than the in the midwest and south.)
> And rather than being able to rely on the volunteers, the U.S. had to draft
> something like 10 million men for World War II.
Nope. WWII had a surplus of volunteers and they used the draft to manage
things.
------
gm
I think in the article you confuse old grumpy guy with experienced guy who
does not know how to interface with people.
Old grumpy guy to me is someone who is unquestioning in his own views. Does
not care if he's wrong and does not give the least shit about what you think
or how the world is changing. "Get off my property!" while holding a shotgun
sums up this guy nicely.
The old grumpy guy you talk about in the article is someone different.
Nobody's going to groan about scalability unless the message is delivered in
an antagonizing way. In this case it _is_ the fault of the messenger.
------
jtbigwoo
I'm a fairly old guy and I found myself getting bored 1/3 of the way in.
When we were younger, all of us ran into a grumpy old guy (or gal) and told
ourselves, "No way I'll be like that." Then we get a little older and many of
us realize that we're turning into that same guy. At that point we all have a
choice:
1\. Figure out what's important (here's a hint, it's not pre-teens learning
Latin) and learn to communicate it in a manner that will actually move people
to action regardless of their age.
2\. Become a cranky old guy and wonder why no one appreciates your wisdom and
brilliance.
------
ekidd
_It wasn't unusual for a (home-schooled) pre-teen in the 1700s to know Greek
and Latin._
I'd love to see some actual evidence for this. A solid command of either
language would require on the rough order of 1000 hours of work (or perhaps
only 350 if you had a lot of raw talent and studied effectively). This is
entirely reasonable for a member of the educated classes in any era. But were
ancient Latin and Greek _ever_ common skills among your stereotypical pre-
industrial dirt farmers?
~~~
JonnieCache
No. The people who were being schooled in the 1700s to speak greek and latin
were the children of the highest aristocracy. When talking about broad
societal trends, they are irrelevant.
------
colanderman
> It used to be almost your entire life was taken up simply in an effort to
> survive ; now most of us work 40 hours per week and it takes care of all of
> our needs .
...as well as the whims and fancies of the super-rich. If income disparity
wasn't so high, I believe most of us would get by working significantly fewer
hours per week (which could likely exacerbate some of the problems he
mentions). The complexities in government that he mentions act as proverbial
rocks in the stream, diverting wealth disproportionately to executives,
lawyers, and bankers and keeping those "kids" busy.
------
th
The last quarter of this post has the real message. The first half will
probably snatch most of the comments though because that's where all the
controversial ramblings and historical inaccuracies are.
~~~
DanielBMarkham
I debated going back and arguing each little historical point, but in fact,
the response here is a wonderful example of exactly what I was saying. It
doesn't matter. Just assume I'm wrong. If my information doesn't fit with a
reader's model, the value of what I am saying is lost. With some types of
information, there is no way to say it "the right way" -- it's just not going
to fit. Perhaps 99% of that information is bad, perhaps not, but if we don't
consume it, we'll never know. Several people still never got to the point of
the article. So really the comments on HN work as an extended example.
Very meta, and pretty neat.
~~~
mquander
"Everything is going to shit" is a much easier thing to argue about than "you
should listen to critical people."
~~~
DanielBMarkham
Yeah but the point wasn't that everything is going to hell, and it wasn't that
you should listen to critical people, it's that there are certain criticisms
that deserve attention and concern, yet these concepts are impossible to
broach with some because it becomes an assault on their way of looking at the
universe. You get into endless arguments. This can be confused easily with
"everything is going to hell" especially for those who don't want to
acknowledge any problems at all. It's grumpy-old-man-syndrome, the other side.
As I pointed out in another comment, this is a attribute of how groups of
people relate to one another. Citing my personal view of things only served to
frame up my suggestions in the manner I was talking about, which then caused
exactly the response I mention.
I think it's a facile argument to say that this is an issue about criticism
only. If only it were so simple.
~~~
mquander
OK, sorry for mischaracterizing your point.
|
L.A. is home to some of the most renowned, contemporary art museums in the world. Check out these popular museums for a cultural, Los Angeles experience. The Museum of Contemporary Art 250 S Grand Ave. Website This museums is broken up into three distinct venues—MOCA Grand Avenue, The Geffen Contemporary at MOCA, and MOCA Pacific… |
Beneficial effect of plasma exchange in the treatment of toxic epidermal necrolysis: a series of four cases.
Toxic epidermal necrolysis (TEN) is a rare, life-threatening disease with a high mortality rate that is linked to drug toxicity. There is a lack of data about the underlying pathophysiologic mechanisms and treatment options. The only widely accepted treatment of TEN is withdrawal of the offending drug followed by supportive care. The potential roles of corticosteroids, intravenous immunoglobulin (IVIG) and plasmapheresis (TPE) remain controversial. We present four patients with severe TEN (all with >80% involvement of body surface) who were treated with TPE following unsuccessful treatment with corticosteroids/IVIG. TPE was performed using a COBE Spectra blood cell separator. ACD-A was used as anticoagulant fluid and the target-washed plasma volume was one body volume. Plasma was replaced by a 5% solution of human albumin + Ringer's lactate. The mean number of TPE sessions was 5.25 ± 2.22 (range 3-8). Drugs were implicated as an etiologic agent in each case. TPE led to prompt improvement of acute condition and general health as well as halting of disease progression. Additionally, the restoration of the epithelium began in all four patients. Plasmapheresis should be considered as an alternative treatment modality for patients with the most severe form of TEN if initial treatment with other agents, including corticosteroids and/or IVIG, fails. Drugs were suspected to be the cause of TEN in all four cases. |
Methylmethacrylate reconstruction of large iliac crest bone graft donor sites.
Often full-thickness iliac crest grafts are necessary for various reconstructive procedures. Sometimes large defects remain in the donor ilium subsequent to their removal. Several complications have occurred as a result of these bony defects. Although several reports have been published regarding the repair of iliac herniae, little has been written about procedures to prevent these complications. A technique was devised to reconstruct the ilium with methylmethacrylate. After preparation of the defect, malleable retractors are bent to conform to the contour of the iliac crest. Methylmethacrylate is then packed into the mold made by the retractors. After hardening, the methylmethacrylate casting of the defect is trimmed and routine soft tissue closure is performed. This technique has been used in eight patients without any complications. The appearance of the waist and crests has been excellent; there have been no fractures or displacements of the mass of cement and there have been no infections. All these reconstructions have been mechanically stressed as all patients had well molded postoperative casts and/or braces. Reconstruction of the ilium with methylmethacrylate after removal of full-thickness grafts appears to be a reliable, safe, and easy technique based on a short-term follow-up of up to three years. |
Share this Page
Arsenal end interest in Monaco star; turn focus to sales
Arsenal have reportedly given up on signing winger Thomas Lemar as they believe Monaco will not sell until next summer.
The Gunners have been strongly linked with a move for the France winger throughout this transfer window but now seem to have done their business for the summer.
Monaco are currently battling to try and stop former Gunners target Kylian Mbappe from joining French rivals PSG and it is believed that Lemar will not be going anywhere as a result of Mbappe’s potential exit.
Indeed, the report in the Mail on Sunday now claims that Arsenal boss Arsene Wenger will instead focus on offloading some of his fringe first-team players.
Mathieu Debuchy, Kieran Gibbs, Carl Jenkinson, Lucas Perez and Joel Campbell have all reportedly been told that they can move on, while Jack Wilshere is another who is expected to quit the Emirates this summer.
Talk of Mesut Ozil and Alexis Sanchez leaving seems to have died down for now, although there would well be significant bids in for the latter as the clock counts down to August 31.
Another player who has been linked with a possible exit is Alex Oxlade-Chamberlain, but that looks less likely now after the England star impressed playing at left wing-back and then right-back in the 4-3 win over Leicester.
Oxlade-Chamberlain has a year remaining on his current Gunners deal but his commitment could not be questioned on Friday night as he turned in an all-action display against the Foxes. |
Alternative methods of mechanical cardiopulmonary resuscitation.
Due to the relative ineffectiveness of standard resuscitation techniques, alternative methods have been explored for many years. The aim of new methods is to improve haemodynamics and increase survival rates. In spite of some encouraging haemodynamic results, all but one study failed to show an increase in long-term survival rates with an alternative method in a convincingly large group of patients (hospital discharge without neurological damage, and 1-year survival). In this study active compression-decompression resuscitation (ACD-CPR) increased long-term survival compared to standard-CPR. The results from certain individual studies, which showed a significant increase in short-term survival rate, could not be reproduced in other trials. This may be attributed in part to the fact that the alternative methods are not significantly superior, but also due to logistical and statistical problems in the conduct of the studies and differences in application within and between the study sites. ACD-CPR has been the most studied method amongst the alternatives and can be recommended for patients with asystole in centres with special training and where outcome quality is regularly verified and evaluated. |
Assessment of sensitization to holm oak (Quercus ilex) pollen in the Mérida area (Spain).
Sensitization to Quercus ilex (holm oak) was studied in 760 patients with clinically suspected sensitization to aeroallergens. Prick tests with commercial extracts of Q. ilex proved positive in 27 patients; none were monosensitive. Nasal and conjunctival provocation tests and specific IgE (RAST) performed with Q. ilex extracts in these patients were negative in all but one patient, who exhibited specific IgE titer (by RAST) of 7 PRU/ml (class 3). We conclude that Q. ilex pollen, though obtained in considerable quantities by our collector, does not cause allergies in our area. |
Much like the characters implied by the title, Zombieland 2 keeps coming back to life. The original writers, Rhett Reese and Paul Wernick, have been thinking about a sequel for years and eventually spun some of those ideas into a Amazon TV pilot. The show was not picked up, and most thought that was the end. Like a good zombie, however, the feature version of Zombieland 2 is now rising from the grave.
A new report says Sony Pictures has hired Dave Callaham, writer of the first two Expendables movies, to pen a sequel with Ruben Fleischer expected to return and direct.
The original Zombieland opened in 2009 and was a surprise hit, grossing over $100 million worldwide. There were immediately talks about the sequel and there was even a script as early as 2010.
At that time, there were reports that Jesse Eisenberg was already on board the project, which was looking for a new comedic villain and a rival to Woody Harrelson’s Tallahassee. They were also hoping to populate the film with cameos like the Bill Murray one in the original film. Again though, that was when Reese and Wernick were still writing. The new writer suggests anything we knew before could be wiped clean.
The Deadline report says Fleischer will be overseeing Callaham’s script and is expected to direct but hasn’t signed anything yet. The same is said for all of the stars, many of which have since become much more bankable – a definite reason why this film is now seeing a resurgence. While the studio would obviously want as many of them back as possible, nothing set in stone outside of Callaham. If his script comes in and does the job, things could be moving very quickly. Fleischer has a few things on the horizon, but nothing happening imminently (as evidence by his inclusion in the Ant-Man discussions earlier this year). |
The present invention relates generally to prosthetic joints, and more particularly to a shoulder prosthesis. The invention has specific application with respect to the humeral component of the shoulder prosthesis.
Conventional prostheses for the replacement of the shoulder joint include a segment engaged within the humerus bone and a mating articulating segment affiliated with the glenoid bone. In the typical shoulder prosthesis, the upper portion of the humerus is replaced by a unitary structure. This structure includes a stem designed to extend downwardly into bore or cavity formed within the humerus. This stem is secured within the bone by bone cement or through the use of coatings designed to promote ingrowth to secure the stem in place. Again with the conventional prosthesis, the stem is attached to a body portion that is designed to replace portions of the humerus at the anatomical neck of the bone. A generally spherical head portion projects from a surface of the body. This spherical head mates with a complementary concave articulating component mounted within the glenoid.
In recent years, modular shoulder prostheses have been developed to account for the different anatomies of the shoulder joint among patients. For instance, differently sized prostheses are necessary to accommodate the different bone sizes of prospective patients. Similarly, different shoulder joints require different angles of inclination of the articulating elements relative to the long axis of the humerus bone. Thus, a variety of modular prostheses have been developed that permit substitution of particular components of the prosthesis as necessary prior to implantation. One example of such a shoulder prosthesis system is disclosed in U.S. Pat. No. 5,314,479, owned by the assignee of the present invention, the disclosure of which is incorporated herein by reference.
One problem faced by both the conventional and the modular shoulder prosthesis is the deterioration of the shoulder joint that can accompany a shoulder arthroplasty. For instance, a patient who has undergone shoulder arthroplasty may experience loss of soft tissue strength, specifically at the rotator cuff, which can eventually lead to a total loss of key constraints that maintain the patency of the joint. This loss of soft tissue and soft tissue strength can allow unnatural joint loads to be produced, which can compromise the function of the prosthetic joint and/or lead to joint pain.
One solution for this problem for this problem is revision of the shoulder prosthesis. This revision can entail the substitution of different articulating components, or differently sized prosthetic components. In one treatment, the shoulder prosthesis is changed to a “reverse” type of prosthesis. A typical prosthetic shoulder replicates the standard anatomy of the joint. Specifically, the humeral component provides a convex articulating surface, much like the natural humeral end of the bone. This convex surface mates with a concave glenoid component.
A “reverse” type prosthesis essentially reverses the arrangement of the articulating surfaces. Specifically, the glenoid component includes a convex or partially spherical component, while the complementary concave surface is integrated into the humeral component. One consideration involved in the use of a reverse prosthesis is that the concave articular surface that is now part of the humeral component may actually protrude into the metaphyseal region of the humerus. This modified geometry can require modification of the metaphyseal portion of the humerus bone as well as the prosthesis.
Prior systems have required total revision of the joint. A total revision entails removal of the entire implant, including the stem that is fixed within the diaphyseal portion of the humerus. Of course, this surgical procedure is very difficult and invasive, and can place the patency of the patient's existing bone at risk. In view of these deleterious effects, what is needed is a shoulder prosthesis system that simplifies the revision process and that allows ready replacement of a standard joint component with a reverse-type component. |
Q:
Does this technique that deals with syllable meters have a name?
On the poem extract below I noticed the following technique and it sounded really familiar, reminding me of punk rock songs and some strong man speeches (I know this is super vague, if I remember any examples I'll link them in the comments). This technique consists of a metric progression of long verses to short verses culminating with a one or two syllable verse, this happens from verses 1 to 5 below, then this is followed by same metric length verses with Anaphoras, in this case it's an anaphora with "the". Does anyone know if this has a name?
1 Pretty women wonder where my secret lies.
2 I’m not cute or built to suit a fashion model’s size
3 But when I start to tell them,
4 They think I’m telling lies.
5 I say,
6 It’s in the reach of my arms,
7 The span of my hips,
8 The stride of my step,
-Phenomenal Woman, by: Maya Angelou
A:
There is no single descriptor for what you're asking. Instead, writers might indicate repetition of short lines that create a turn or pivot in the stanza.
The most prominent pattern is repetition (source) at the level of utterance:
"I say" performing a turn or pivot or contrast in each stanza from what others say and what the speaker says
"I’m a woman / Phenomenally. / Phenomenal woman, / That’s me." ending the self-directed speech and the stanza.
As for the changes in line length, especially with "I say," one could describe the break of pattern (turn/pivot/contrast) as a short line (if the other lines are normally longer) or a long line (if the other lines are usually short). This vocabulary filters into descriptions of line length:
The short, irregular lines of John Burnside's 'De Humanis Corporis Fabrica' mirror the slow accumulation of various bodily details in the poem. (https://www.poetryarchive.org/glossary/line)
Long lines are oceanic. They wash over you like waves, one after another, each of them full of shells and sand and fish and surfboards, sometimes pieces of wrecks and the bodies of sailors. The long line is more conclusive and inclusive than the partial, subdivided short line. If short lines are like quick pants, long lines resemble great, deep breathes. (https://poets.org/text/whitmans-long-lines)
And an example from the Victoria and Albert Museum describing a similarly-structured poem, "Things Men Have Made" by D.H. Lawrence:
The most obvious device here is the repetition, with variation: 'men have made', 'men who made'. These phrases occur at the beginning and end of the poem, with a single syllable before the first occurrence and after the second. They balance each other, emphasising a balance between the first two lines and the last two, between the first sentence or proposition of Lawrence's statement and the second, which echoes it and develops it further. The whole poem pivots around the very short line in the middle, 'for long years'.
|
Q:
SQL error with script to create
I used the SQL Server management studio on a table with Create Script to New and did minor changes. Give me an error "Incorrect syntax near '('" for the "(" after "WITH"
/* EventType Table Creation */
CREATE TABLE [EventType]
(
[pkEventID] [int] IDENTITY(1,1) NOT NULL,
[Description] [nvarchar](50) NOT NULL,
[BeginDate] [datetime] NOT NULL,
[EndDate] [datetime] NOT NULL,
[Comments] [nvarchar](500) NOT NULL,
CONSTRAINT [PK_EventType] PRIMARY KEY
CLUSTERED
(
[pkEventID] ASC
)
WITH
(
PAD_INDEX = OFF,
STATISTICS_NORECOMPUTE = OFF,
IGNORE_DUP_KEY = OFF,
ALLOW_ROW_LOCKS = ON,
ALLOW_PAGE_LOCKS = ON
)
ON [PRIMARY]
)
ON [PRIMARY]
GO
A:
Which version of Microsoft SQL Server are you executing this CREATE TABLE statement against? According to documentation, MS SQL Server 2000 does not recognize the syntax for WITH (...index options...). That syntax is supported in MS SQL Server 2005 and later.
Even if you use SQL Managment Studio 2005, you may be connecting to MS SQL Server 2000. To verify the version, try this query:
SELECT SERVERPROPERTY('productversion'),
SERVERPROPERTY ('productlevel'),
SERVERPROPERTY ('edition');
MS SQL Server 2000's productversion is 8.x.
MS SQL Server 2005's productversion is 9.x.
MS SQL Server 2008's productversion is 10.x.
|
Local, Spatial Audio
In addition to visual fidelity, this application also emphasizes localization and spatialization of audio to achieve a greater sense of presence and immersion. Well crafted audio is one of the most under utilized aspects of virtual reality development that can make a deceptively huge difference in the perceived quality of the experience. This is an area we will explore in greater detail in future projects.
Interactivity
You can configure materials and colors throughout the condo, such as wall colors and floor materials, countertops and more. It also includes the ability to swap alternate furniture items, and panoramic scenery options. This interactivity is achieved by integrating Immerse Framework.
Navigation
We have effectively eliminated motion sickness through a variety of advanced navigation methods. This includes ‘comfort mode,’ with ratcheted strafing and rotation, as well as blink-based teleportation that fades to black briefly while the player is moved to a new location. By removing any sense of vection, players are able to navigate the VR application comfortably. We have also made navigation easy and intuitive for new users, especially those who have never played a video game or used an Xbox controller.
Multi-Player
By integrating Immerse Collaborative system, we are able to invite multiple people to explore the same environment together simultaneously. They can walk, talk and point at things with a laser, which is perfect for most architecture, construction or real estate visualizations.
Furnishings, Fixtures and Finishes
We have developed rigorous quality standards for the architectural environments and furnishing assets we use in our applications. This application draws upon the Immerse Assets library, which are fully prepared for PBR workflow to achieve the greatest possible realism, and are balanced to incorporate the highest amount of detail possible without compromising our framerate performance targets for virtual reality. Each of these assets is built from scratch, and designed to easily swap materials and colors of each component. |
Euronews
Philips will hand over the majority of its European television manufacturing operation to a Chinese company. The deal sees the creation of a new company for making the TVs, of which Philips will only own 30 percent, but will still have its name on the televisions. Philips has been making TVs for 80 years.
Frans van Houten, Philips chief executive, said: “I can still can remember when the first Philips TV came into our house in 1966. I was a little boy. So it’s very emotional and important for me. Philips is a very strong brand so in looking for a solution, we focused on continuity.”
Analysts were concerned that Philips loss-making TV division was dragging down the the group’s results. The Dutch company sells significantly fewer flatscreens than its competitors and already licensed out production in the US and China.
Philips will now concentrate on more profitable areas – such as healthcare equipment where sales rose this year by 35 million euros. It is forecasting that the TV venture will earn it at least 50 million euros annually from 2013. |
[Tympanoplasty with adipose tissue].
Among other materials it is also possible to use autologous fat tissue for closing tympanic membrane perforations. In this study we have evaluated 44 consecutive myringoplasties with adipose tissue performed between 1999 and 2001. The indications were residual microperforations following tympanoplasty with temporalis fascia or tympanic membrane perforations due to trauma or chronic otitis media simplex. Myringoplasty with fat tissue was performed as an outpatient procedure and took about 15 minutes. The adipose tissue was harvested from the posterior side of the ear lobe in local anaesthesia. After refreshing the borders of the tympanic membrane perforation with a micro hook, the adipose tissue was positioned into the perforation by using a handheld or fixed ear speculum. The graft was covered with a silk strip soaked with Garamycine ointment. In bigger perforations a bed of gelfoam was put into the tympanic cavity in order to avoid adhesions between the graft and the promontorium. A permanent healing of the tympanic membrane was achieved in 40 (91 %) out of the 44 patients. In 21 patients hearing improved between 5 -10 dB. Surgical complications did not occur. Our results indicate that transcanal myringoplasty with adipose tissue is a simple and minimally invasive method for closing small to medium sized tympanic membrane perforations. |
This is going to be a Memorial Day weekend to remember at Viacom, as board members cling to their seats.
Chief Executive Philippe Dauman and the entire board of directors are bracing for the possibility that they will be removed.
Their fears may be well founded.
On May 20, Redstone’s lawyers booted Dauman and George Abrams, another board member and longtime ally, from his family’s trust, and also from the directorship of the Boston-based cinema chain National Amusements, the entity that controls both CBS and Viacom through Class A shares.
The news sent shock waves around the media industry and boosted Viacom’s stock price 15.2 percent since May 20, to $44.24, on hopes that new leadership will lead to growth.
The stock is off 34 percent over the last 12 months — one reason for the 93-year-old Redstone’s discontent.
“The Street is [assuming] that he [Dauman] will be gone,” said a Viacom investor, explaining the stock is on the rise because it is widely believed Dauman will exit.
Redstone — fond of bombastic outbursts and filthy language (when he’s able to talk, that is) — has been strangely talkative and diplomatic in recent press statements.
“Sumner Redstone will make every decision with the same deliberation and consideration with which he removed Philippe Dauman and George Abrams as trustees, based on the best interests of shareholders.”
“Sumner Redstone will make every decision with the same deliberation and consideration with which he removed Philippe Dauman and George Abrams as trustees, based on the best interests of shareholders,” a spokesman for Redstone’s law firm said on Friday.
Some read that as a last-ditch effort for board members to present their case to Redstone before he boots Dauman out of Viacom’s 1515 Broadway headquarters. Redstone is understood to be planning a meeting with lead independent director Fred Salerno soon.
It seems Redstone and his lawyers at Los Angeles’ Orrick, Herrington & Sutcliffe are laying the groundwork for a complicated chess match that will ultimately result in one of the most stunning corporate reversals in recent memory — the recombining of CBS and Viacom — sources close to the Redstone family predict.
But a few things have to fall into place before Wall Street can get its most desired outcome.
CBS boss Leslie Moonves has long stated he’s against such a move. Perhaps, with Dauman out of the picture, he may think differently. Moonves’ CBS was carved out of Viacom back in 2006 to unlock growth in cable.
What happens to Viacom in the interim period also offers a lot of uncertainty for current investors.
If — or, more likely, when — the widely expected ouster happens, Dauman and the board will go down fighting.
Dauman is working with law firm Paul, Weiss, while the board is being advised by Skadden, Arps. Dauman, who was said to be in the Hamptons this weekend, spent much of Friday in a war room brainstorming his plays.
All this drama comes after two years of near silence from Redstone and a recent video deposition that showed Redstone struggling with his own birth name. He didn’t answer other questions at all. (Redstone clearly articulated his desire to have daughter Shari Redstone be in charge of his health care, however.)
Some in the Dauman camp believe that Shari has played a part in the downfall of the company. She has been consulting her bankers at Evercore to aid her efforts to find a better boss at Viacom, sources say, and they believe that she has been quietly working to undermine Dauman.
“It is absurd for anyone to accuse Shari of manipulating her father or controlling what goes on in his household,” a spokesperson said.
Viacom Chief Operating Officer Tom Dooley may be made interim CEO, sources close to the family say.
At least one investor is tearing his hair out over the most recent developments.
Michael Cuggino, president of the Permanent Portfolio, told The Post last week: “This dysfunction is causing a paralysis. That’s not to say it’s all Philippe Dauman’s fault, but that doesn’t mean it’s OK. Is he trying to hold on too long to his position?” |
NRCS to Deploy Technical Team to Increase Conservation in Delmarva Area
DOVER, Del., March 21, 2011- USDA’s Natural Resources Conservation Service (NRCS) recently announced that Delaware will receive $180,000 to help fund a Strategic Watershed Action Team (SWAT) to help growers develop nutrient management plans throughout targeted areas of the Chesapeake Bay Watershed.
NRCS is deploying four SWATs, or technical experts, to provide additional planning, education and technical assistance to farmers to further improve water quality. The four teams will focus on working with producers in the Delmarva area (Delaware and Maryland), Piedmont area (Pennsylvania), Shenandoah Valley (Virginia), and West Virginia.
According to Delaware State Conservationist Russell Morgan, the Delaware portion of the Delmarva SWAT will provide up to two specialists working with farmers to develop and write more than 300 Animal Waste Management Plans or Nutrient Management Plans. “Together with our conservation partners, we can target our resources to significantly reduce nutrient and sediment losses to the Chesapeake Bay.”
Delaware’s conservation partners, the local conservation districts and the State of Delaware, are committing $50,000 in additional funding. Each SWAT will help individual agricultural producers plan and implement conservation practices needed to address priority natural resource concerns.
SWATs will not only help achieve USDA goals, but also support State Watershed Implementation Plan goals for Best Management Practice implementation set through the Environmental Protection Agency (EPA) Total Maximum Daily Load (TMDL) process. It is anticipated that SWAT would further environmental improvement while keeping production agriculture competitive and profitable.
SWAT is just one component of the Presidential Executive Order (EO) Strategy for Protecting and Restoring the Chesapeake Bay Watershed to help USDA implement new conservation practices on four million acres of agricultural working lands in priority watersheds by 2025. Acres treated by SWAT will be tracked to count toward the EO Strategy goal.
SWAT teams are expected to be in place this spring. For more information about SWAT, contact your local USDA Service Center or visit www.nrcs.usda.gov. |
Q:
How does the UITableView get styled in the Core Data Recipes Sample code?
I'm trying to use Apple Core Data Sample code as a basis for my own app. I'm using this code: http://developer.apple.com/iphone/library/samplecode/iPhoneCoreDataRecipes/index.html
I can't work out how that first table View is styled. I want it to be grouped (UITableViewStyleGrouped), but there seems to be no obvious place to tell it how to style the table. The table seems to be created programmatically since there is no UITableView in the xibs.
A:
In the view controller that handles the table, look for the initWithNibName:bundle: method. Override it so that it contains the following snippet:
- (id)initWithNibName:(NSString *)nibNameOrNil bundle:(NSBundle *)bundle {
if(self = [super initWithNibName:nibNameOrNil bundle:bundle]) {
self.tableView.style = UITableViewStyleGrouped;
// Other custom code here...
}
}
|
Chronic heart failure (CHF) is a leading cause of mortality and morbidity in the world. The prevalence of CHF s increasing as the population ages. While recent advances in the pharmacotherapy of congestive hearts have reduced this mortality and morbidity, a large number of patients develop progressive decompensated heart failure. Typically for CHF, a pump such as a ventricular assist device (VAD) is implanted in a patient awaiting a heart transplant. The VAD is implanted as a “bridge to transplant” for those weakened hearts that are expected to become unable to pump enough blood to sustain life. A VAD is typically attached to the left ventricle and draws blood from the left ventricle and sends the blood to the aorta. During the procedure to implant a VAD, the wall of the left ventricle must be opened, resulting in an interference with the operation of the left ventricle and little chance of cardiac recovery.
A cardiac recovery is possible for patients who suffer from CHF, especially through treatment with biopharmaceuticals (for example, growth factors, cytokines, myoblasts, and stem cells). The likelihood of cardiac recovery is believed to be increased by reducing the stress on the heart from the decompensated state. However, the existence of a VAD greatly reduces the likelihood of cardiac recovery from CHF. The scarcity of transplantable hearts further lessens the chances of recovery after a VAD has been implanted.
Therefore, there exists a need for a hemodynamic assist device that can be implanted without damaging the heart and preventing cardiac recovery. |
25 Ill. App.3d 727 (1975)
323 N.E.2d 813
In re ESTATE OF JOSEPHINE TRAHEY, Incompetent. (MARGARET FITZPATRICK, Petitioner-Appellant,
v.
JAMES C. McLELLAN, Individually and as Conservator of the Estate of JOSEPHINE TRAHEY, Incompetent, et al., Respondents-Appellees.)
No. 59596.
Illinois Appellate Court First District (3rd Division).
January 23, 1975.
*728 John G. Spatuzza, Gerald M. Chapman, and Alan M. Polikoff, all of Chicago, for appellant.
Paul R. Hoffman, of Chicago, for appellees.
Judgment affirmed.
*729 Mr. JUSTICE DEMPSEY delivered the opinion of the court:
This action was brought by Margaret Fitzpatrick to recover funds which had been held in a joint account in her name and that of the deceased, Josephine Trahey. Her petition was denied and she has appealed.
On July 7, 1960, Josephine Trahey opened a joint account with the right of survivorship at the Drover's Trust and Savings Bank with her brother John Conway and her nephew James McLellan. The account continued in their names until December 1970 and grew from the initial deposit of $5,906.99 to $32,519.03. In the intervening years Mrs. Trahey, a widow, lived with her younger brother, John. Her health gradually deteriorated, and cataracts developed in her eyes. In July 1970 an operation was performed on one eye. It was only partially successful, and her vision remained impaired.
On December 7, 1970, when she was in her 89th year of life, she accompanied Margaret Fitzpatrick, who was married to a nephew of Mrs. Trahey's deceased husband, to the Drover's bank and transferred the funds from the Trahey-Conway-McLellan account to a new joint account in her name and that of Mrs. Fitzpatrick. Mrs. Fitzpatrick took possession of the passbook and $150 was withdrawn from the account that day.
In January 1971 Mrs. Trahey broke her hip and was hospitalized. She died on June 6. While she was in the hospital, her brother petitioned the probate court to appoint a conservator for her and her estate and nominated James McLellan. The petition was supported by a doctor's affidavit which stated that she was confused, disoriented and incapable of managing her affairs. She was adjudicated an incompetent on February 24, and McLellan was appointed conservator. On the same day, a citation was directed to Mrs. Fitzpatrick for information about and discovery of personal property belonging to Mrs. Trahey's estate. She was commanded to appear before the judge of the probate court on March 18 under threat of being punished for contempt. A few days after the citation was served, Mrs. Fitzpatrick and her husband called upon John Conway and turned the passbook over to him.
On March 4, McLellan filed a petition which alleged that Mrs. Trahey was incompetent when her funds were transferred from the first joint account to the second, and that she was induced by Mrs. Fitzpatrick to make the change. The petition stated that Mrs. Fitzpatrick had given the passbook to Conway; it requested that the balance in the second account be redeposited in the names of Mrs. Trahey, John Conway and James McLellan. The petition was granted and the funds were redeposited.
On March 18, 1971, the return date of the citation, the conservator's *730 attorney and the Fitzpatricks appeared in court, but at different times. Their versions of what took place were testified to at the hearing on the plaintiff's petition. The attorney said that when the case was called he asked that the citation be dismissed because its purpose had been accomplished, and that it was dismissed. Mrs. Fitzpatrick testified that when her name was called she approached the bench and the judge read the citation. She informed him that she had brought the passbook to Conway, and the judge concluded the matter by saying that was probably why the other side did not show up.
There were no further developments in the case until 11 months later when Mrs. Fitzpatrick was granted leave to enter her appearance. Four weeks after this on March 13, 1972 she filed a petition which asserted that the order of March 4, 1971, improperly directed transfer of the funds from her account with Mrs. Trahey and she asked that the order be vacated. The petition alleged that the order was entered without prior notice to her; that she was frightened by the citation summons; that she was confused and without benefit of counsel when she surrendered the passbook; that she did not intend to relinquish her interest in the account, and that she had expected that the dispute between her and the conservator would be resolved on the return date of the citation. She took exception to the conservator's final account and asked for a hearing as provided for by the Probate Act (Ill. Rev. Stat. 1971, ch. 3, par. 187a) to determine her right to the money on deposit in the joint bank account on the day the order was entered.
The conservator's motion to dismiss the petition was denied, and a hearing was held. At its conclusion the trial court found that Mrs. Trahey was incompetent at the time she opened the account with Mrs. Fitzpatrick. Mrs. Fitzpatrick acknowledges that the pivotal issue in her appeal is the court's finding of incompetency, but she nevertheless argues that the court erred in not first passing on the validity of the order of March 4, 1971. She contends that this order (a) divested her of her property without a hearing and thus deprived her of due process of law, and (b) that there was no evidence that she knowingly waived her claim to the joint tenancy account.
The two contentions are intertwined. The argument of invalidity is based upon the conceded fact that no notice of the March 4 petition or hearing was served upon her. The respondents reply that notice was not necessary because she had relinquished all interest in the account before the March 4, 1971, hearing.
Upon being served with the citation, Mrs. Fitzpatrick called the attorney whose name appeared on the citation. He testified that she asked him what the citation was all about and whether she should retain a *731 lawyer. He told her she should. A day later he returned a telephone call from her husband who said his wife claimed no interest in the account and asked to whom the passbook should be given. The Fitzpatricks disputed this testimony. Mrs. Fitzpatrick said she did not discuss the citation with the attorney. Mr. Fitzpatrick testified that the attorney instructed him to turn over the passbook.
John Conway testified that when the Fitzpatricks surrendered the passbook Mr. Fitzpatrick said, "We didn't want any part of this anyhow, we have no interest in it." Mrs. Fitzpatrick testified, "I gave him back his bank book," but she added that nothing was said concerning her interest in the account.
1, 2 The principle of "waiver" will be recognized whenever a party intentionally relinquishes a known right or acts in such a manner to warrant an inference of such relinquishment. (National Bank v. Newberg (1972), 7 Ill. App.3d 859, 289 N.E.2d 197; A-1 Cleaners & Dyers v. American Mutual Liability Insurance Co. (1940), 307 Ill. App. 64, 30 N.E.2d 87.) From the above testimony, and the additional facts that the passbook was quickly surrendered in the face of a scheduled court proceeding and that Mrs. Fitzpatrick neither consulted nor engaged a lawyer to defend her right, if she thought she had one, in a $32,500 account, the trial court could have concluded that she voluntarily waived her interest in the account and that she had not demonstrated why a subsequent hearing, held without notice to her, should be declared void.
But apart from this, she is in no position to protest. She made no motion to vacate the order of March 4 and did not appeal it. It was a final order. It removed Mrs. Trahey's money from her account with Mrs. Fitzpatrick and redeposited it in her account with Conway and McLellan. Mrs. Fitzpatrick attempts to circumvent her failure to appeal by asserting that her petition of March 13, 1972, filed 1 year after the order of which she complains, was actually a petition within the scope of section 72 of the Civil Practice Act (Ill. Rev. Stat. 1971, ch. 110, par. 72) and that the trial court erred in not treating it as such.
3, 4 The petition was not a section 72 petition and it was not intended to be. It specifically stated that it sought relief under section 187a of the Probate Act. There was no explanation for the lack of diligence in filing the petition and in truth, there could not be. If her surrender of the passbook and the impending citation proceeding did not alert Mrs. Fitzpatrick that she might be divested of the account, the death of Mrs. Trahey in June 1971 was notice that she had been. An inquiry about the account at the Drovers Bank would have brought the response that it had been closed pursuant to the court order of March 4, 1971. The failure to allege and prove diligence is fatal to a section 72 petition; such *732 a petition is not designed to excuse a petitioner's own carelessness or mistake. Filosa v. Pecora (1974), 18 Ill. App.3d 123, 309 N.E.2d 356.
Moreover, the point concerning the possibility that the petition was within the scope of section 72 was raised for the first time in Mrs. Fitzpatrick's reply brief. Points not argued in an appellant's principal brief are waived and cannot be raised in the reply brief, in oral argument or in a petition for rehearing. Ill. Rev. Stat. 1971, ch. 110A, par. 341(e) (7).
At the hearing on the petition most of the testimony concerned Mrs. Trahey's mental condition. Her brother testified that when she was in the hospital in July 1970 she talked strangely and imagined seeing a woman in her room who was not there. She talked about some men taking her to the basement. She tried to walk down a stairway at the hospital and had to be confined in bed. When she returned home she accused their housekeeper of stealing. She sat in a chair near a window and would ask about a little nun she imagined seeing outside in the rain, where there was no nun and no rain. She remarked every night about the beautiful lights she saw, when the only visible lights were those of automobiles. She frequently got up during the night and on occasion had to be restrained from going outside in her nightgown. Her nephew, a friend of hers and the husband of her niece all testified as to her lack of competency. They related incidents which tended to show the deterioration of her mind in the last few years of her life, and precipitately so after her hospitalization in July 1970, such as losing her train of thought during conversations, her nonrecognition of relatives and her confusion as to their relationship, her imagining seeing people on the street outside her home or on the steps of a nearby church when there were no such people there at all.
Three friends of Mrs. Trahey testified for the petitioner. One said that Mrs. Trahey's physical condition except for her lost eyesight and her mental condition were the same in the final months of her life as they had been before. Another, who had not seen her between her eye operation and her death, but who had talked to her over the phone about once a week, testified that she conversed without rambling and her mental condition seemed the same as it always had been. A third friend, who had seen her at the Fitzpatrick home several times after the operation, testified that her physical appearance was the same as it always had been, her vision was improving, and that during these visits which lasted from 1 in the afternoon until 8:30 or 9 in the evening, she talked intelligently, carried on conversations as well as anyone and was in excellent mental condition.
The conflicting testimony posed a credibility question for the trial *733 court which was resolved by its finding that the "evidence is clear and convincing that Josephine Trahey was mentally incompetent to terminate the bank account at Drovers National Bank identified as Account No. 270085-4, at the time of the alleged termination of the same, and further, was mentally incompetent to open a new account at Drovers National Bank in the name of Josephine Trahey and Margaret Fitzpatrick, which account is identified as Account No. 269117 at the time of the alleged opening of said account in December of 1970."
The petitioner complains that the court erred in evaluating the testimony and that its finding was against the manifest weight of the evidence; that the respondents failed to sustain the burden that was theirs of overcoming the legal presumption that Mrs. Trahey was sane; and that the evidence they did present about her old age, ill health, impaired eyesight and lapses of memory was not sufficient in either weight or quality to prove that she did not know what she was doing at the time she and the petitioner opened the joint account.
5 No witness testified as to Mrs. Trahey's mental condition on the exact day the account was opened. Therefore, whether she was capable of understanding the nature of the transaction had to be deduced from the testimony concerning her physical weaknesses and mental incapabilities before and after that day. (Ergang v. Anderson (1941), 378 Ill. 312, 38 N.E.2d 26.) The testimony produced by the respondents showed that her decline in both capacities was rapid and continuous. By accepting this testimony, as was its right, the trial court could reasonably infer that on the day of the transfer she lacked the mental capacity to comprehend the consequences of her act which took her entire assets from the protective co-ownership of her blood relatives with whom she had no discord and who had not disturbed the account in the 10 years of its existence and transferred them to a person to whom she was not related by consanguinity a transfer which did not come to light until weeks later when money was needed to defray the medical expenses arising from her broken hip. Although Mrs. Trahey was not adjudicated an incompetent until February 24, 1971, and there is a legal presumption that she was competent prior to the adjudication, and while illness and impairment of mind due to old age do not necessarily indicate so great a deterioration of capacity that a person is unable to understand the nature and effect of his actions or to protect his own interests, the trial court's finding that Mrs. Trahey was unsound in mind and memory at the time the second account was opened on December 7, 1970, was not against the manifest weight of the evidence.
6 The petitioner stresses the presumption of a gift arising from Mrs. Trahey's execution of the joint tenancy agreement. In Murgic v. Granite *734 City Trust & Savings Bank (1964), 31 Ill.2d 587, 591, 202 N.E.2d 470, the court stated:
"We hold that an instrument creating a joint account under the statutes presumably speaks the whole truth; and, in order to go behind the terms of the agreement, the one claiming adversely thereto has the burden of establishing by clear and convincing evidence that a gift was not intended. This burden does not shift to the party claiming under the agreement."
No evidence was introduced about the circumstances relating to the Trahey-Fitzpatrick account except the card bearing their signatures which provided that it was a joint account payable upon death to the survivor. The petitioner argues that the presumption of donative intent created by the presentation of that card was not overcome. The presumption of donative intent is completely overcome if the donor was incompetent at the time of the alleged gift. This, in effect, was the decision of the trial judge who cited the Murgic case in his memorandum opinion.
7 In finding that the evidence was clear and convincing that Mrs. Trahey was mentally incompetent to open the account in December 1970, the court could have taken into consideration, in addition to the testimony we have outlined, her signature on the account card. It is so illegible that a meaningful reproduction in this opinion is impossible. The signature, when contrasted to the one on the 1960 account card, is graphic evidence of her physical deterioration.
The judgment of the circuit court is affirmed.
Affirmed.
McGLOON, P.J., and McNAMARA, J., concur.
|
812 So.2d 324 (2001)
Bernice RAMSEY and Lillie Ardis
v.
Robert C. O'NEAL et al.
1000960.
Supreme Court of Alabama.
August 31, 2001.
*325 Thadius W. Morgan, Jr., Enterprise, for appellants.
Gary D. Bradshaw, Enterprise, for appellees.
STUART, Justice.
This is a boundary-line dispute between owners of coterminous lands in Dale County.
Robert C. O'Neal and Robert C. O'Neal, Jr., (the "O'Neals"), the owners of an 80-acre tract of land in Section 7, sued Bernice Ramsey and Lillie Pearl Ardis. The O'Neals subsequently sold their 80 acres to Anthony Byrd, and Byrd intervened in the lawsuit. Ramsey owns an approximately 4.7-acre parcel of land that has as its southern border the northern border of the O'Neal-Byrd property. The O'Neals sued after Ramsey had torn down a fence they had constructed; Ramsey claimed the fence had encroached on her property. She put up a fence that blocked the O'Neals' use of an easement by prescription across the property of Ardis (the property was later sold to Ramsey). The easement had been purchased by the O'Neals and later sold to Byrd.
In their complaint, the O'Neals requested (1) that the Court determine and fix the true location of the boundary between the parties' property, (2) that the Court establish the existing dirt road as an easement for ingress and egress across the Ardis/Ramsey property to the property owned by the O'Neals and subsequently by Byrd, (3) that the Court issue a temporary order allowing use of the road for ingress and egress during the pendency of the proceedings, and (4) that the court award compensatory and punitive damages for the defendants' alleged willful, intentional, wrongful, and malicious destruction of the fence the O'Neals had erected. Ramsey and Ardis denied the allegations of the complaint.
The trial judge viewed the property before the trial and ordered that an independent surveyor survey the boundary line. Because the original court-appointed surveyor was unable to timely complete the task, Kinsaul and Associates, a surveying firm, was appointed by the court to make an independent survey.
After conducting an ore tenus hearing, the trial court entered the following order, on October 11, 2000:
"This matter having come before this Court on an initial hearing and again on a final hearing on September 6, 2000, with the parties and their attorneys and sworn testimony was taken and documented evidence received from which this Court does hereby ORDER, ADJUDGE AND DECREE that the Defendant, Bernice Ramsey, is awarded the 3.557 acre plus or minus tract of land immediately South of where her residence now [sits]. The Plaintiffs, Robert C. O'Neal and D. Anthony Byrd, are to execute a [quitclaim deed] to the Defendant, Bernice Ramsey, within fifteen days of this ORDER for the following property:
"[Property description omitted]
"That D. Anthony Byrd is awarded 8.182 acres plus or minus lying West of the property of the Defendant's and North of other property owned by D. Anthony Byrd and East of property owned by Walter S. Dykes. The Defendants, Bernice Ramsey and Lillie Ardis, are ordered to execute a [quitclaim] deed to D. Anthony Byrd within fifteen days of the date of this ORDER for the following legal description:
"[Property description omitted]
"The existing dirt drive/road shall be encompassed in the property of Bernice *326 Ramsey and Lillie Pearl Ardis. However, [ingress to and egress from] all parties' property shall be allowed over the existing dirt drive/road. All permanent structures and fixtures resting on the [lands described above] shall be the property of the [grantees] in the aforementioned [quitclaim deeds].
"It is further ordered by this Court that the cost ($3780.00) of the Court ordered survey completed by Kinsaul & Associates shall be divided equally between the Plaintiffs and Defendants and is to be paid directly to Kinsaul & Associates within fifteen days of the date of this ORDER. The Court is satisfied that the survey completed by Kinsaul & Associates did establish the forty line in question.
"All other relief ... sought or requested, but not addressed in this ORDER is denied.
"Done this 11th day of October, 2000.
"/s/Charles L. Woods
"Circuit Judge"
Ramsey and Ardis filed a "Motion to Vacate Judgment and Motion for New Trial," arguing that the court's order "is contrary to law in that the court is without jurisdiction to order a land swap in a case involving a land line dispute". The court denied their motion, and they appealed. On appeal, neither side makes an argument concerning those portions of the judgment granting the easement and denying damages. The sole issue before the Court is whether the trial court's order requiring the parties to exchange quitclaim deeds, instead of merely determining and fixing the true boundary line between the properties, amounted to a "land swap" and thus exceeded the court's authority. We conclude that the trial court did indeed exceed its authority. We, therefore, reverse and remand.
In 1983, Ardis and her husband sold an 80-acre tract of land to Burion Bundy and Doras Bundy. The Bundys sold this same tract to the O'Neals in 1985. In 1998, the O'Neals sold the property to D. Anthony Byrd.
This property was described in the deeds as the south one-half of the southeast quarter of Section 7, Township 6 North, Range 23 East. The property purchased by the O'Neals and later sold to Byrd had an easement by prescription across the property of Ardis. This property was later sold to Ramsey.
Ramsey's property, which she purchased on January 16, 1995, is described by a metes-and-bounds description and is described as being "in and a portion of the northeast quarter of the southeast quarter of Section 7, Township 6 North, Range 23 East." Other than filing a joint answer with her daughter, Bernice Ramsey, Ardis did not defend this lawsuit.
The record does not indicate why the trial court ordered the "land swap." The O'Neals, in their brief, state that the court entered the order in an attempt to bring about an equitable solution and because Ramsey had placed her mobile home within 10 feet of the established property line and her septic tank and the field lines for her septic tank were on the O'Neal Byrd property.
Pursuant to Ala.Code 1975, § 35-3-2, in a boundary-line dispute "[t]he court shall determine any adverse claims in respect to any portion of the land involved which it may be necessary to determine for a complete settlement of the boundary lines and shall make such order respecting costs and disbursements as it shall deem just." Adverse possession is a defense frequently asserted in cases involving boundary-line disputes. A coterminous landowner attempting to establish title by *327 adverse possession must prove open, notorious, hostile, continuous, and exclusive possession of the disputed property for a period of 10 years. Sims v. Vandiver, 504 So.2d 250 (Ala.1987). Although the phrase "adverse possession" was referred to several times during the trial, it was not pleaded as a defense and no effort was made to prove the elements of adverse possession. We find no evidence to support a claim of adverse possession.
Section 35-3-3, Ala.Code 1975, provides:
"The judgment shall locate and define the boundary lines involved by reference to well-known permanent landmarks, and if it shall be deemed for the interest of the parties, after the entry of judgment, the court may direct a competent surveyor to establish a permanent stone or iron landmark in accordance with the judgment from which future surveys of the land embraced in the judgment shall be made. Such landmarks shall have distinctly cut or marked thereon `judicial landmark.' The surveyor shall make report to the court, and in his report shall accurately describe the landmark so erected and define its location as nearly as practicable."
The only reference to the boundary line in the court's order is this statement: "The Court is satisfied that the survey completed by Kinsaul & Associates did establish the forty line in question." The record contains no direction to the surveyor to mark the boundary line with "judicial landmarks," and it contains no clear judgment holding that the "forty line," i.e., the northern line of the south one-half of the southeast quarter of section 7, Township 6 North, Range 23 East, is the true boundary line between the two properties even though this is the only boundary line supported by the evidence.
The court-ordered survey prepared by Kinsaul & Associates was run from a point of beginning at the corner marker of the northeast corner of the south one-half of the southeast quarter of Section 7, a recognized landmark, as determined by the original survey of the area in the 1800s. The survey by Wiregrass Engineering, Inc., offered into evidence by Ramsey plotted the location of Ramsey's 4.7 acres as described in her deed beginning from pins purportedly placed by another surveyor in 1988. In that survey, no effort was made to locate the running section line because the landowner, Ramsey, did not request it. The Wiregrass Engineering surveyor acknowledged that the property described in Ramsey's deed encroached over the forty line.
Instead of establishing the true boundary line between the properties, the trial court, it appears, intended to establish a new boundary line by ordering quitclaim deeds executed to effectuate a "land swap." The O'Neals argue that Ala.Code 1975, § 12-11-31 or § 12-11-33, authorizes the circuit court to order a "land swap" such as that ordered in this case. We disagree. Section 12-11-31 provides in pertinent part:
"The powers and jurisdiction of circuit courts as to equitable matters or proceedings shall extend:
"(1) To all civil actions in which a plain and adequate remedy is not provided in the other judicial tribunals.
". . . .
"(5) To establish and define uncertain or disputed boundary lines, whether the complaint contains an independent equity or not."
Section 12-11-33 provides:
"Circuit courts, when exercising equitable jurisdiction, must take cognizance of the following cases:
"(1) When the defendants reside in this state.
*328 "(2) Against nonresidents, when the object of the action concerns an estate of, lien or charge upon lands or the disposition thereof, or any interest in, title to, or encumbrance on personal property within this state, or where the cause of action arose, or the act on which the civil action is founded was to have been performed in this state."
A judgment establishing a boundary line between coterminous lands, based on evidence submitted ore tenus, is presumed correct, if it is supported by credible evidence. Nelson v. Styron, 524 So.2d 353 (Ala.1988). Further, such a judgment will be reversed only if it is plainly erroneous or manifestly unjust. Reeves v. Lord, 487 So.2d 879 (Ala.1986).
This Court has held, however, that it is error for a trial court to establish a line not supported by the evidence presented by either landowner. In Wilson v. Cooper, 256 Ala. 184, 54 So.2d 286 (1951), the trial court fixed the boundary line between coterminous lands; it was to run along a line equidistant between the two lines the owners had agreed as the true line. This Court reversed, stating: "[N]either party claims that the line established by the trial court is the true boundary line dividing their lands, nor did either party offer evidence to prove that such a line was the true line." 256 Ala. at 185, 54 So.2d at 287.
In a case similar to the present case, Catrett v. Crane, 295 Ala. 337, 329 So.2d 536 (1976), a case in which both parties appealed, the trial court failed to fix as the boundary line the line asserted as the true line by either party, but established a different line as the boundary line and ordered the parties to exchange deeds to accomplish the court's division of the disputed property. This Court reversed, finding no evidence to support a judgment establishing the line fixed by the trial court.
In this case we have found no evidence to support a claim of adverse possession. Furthermore, no evidence supports any boundary line other than the "forty line." If, as it appears, the court intended the exchange of deeds to establish a new boundary line between the properties, then we must hold that no evidence in the record supports an order establishing a new line. The role of the court in a boundary-line dispute is to determine and fix the existing boundary line, not to create a new one.
No evidence supports the trial court's judgment establishing a new boundary line to replace the line set out in the parties' deeds and shown on the court-ordered survey admitted into evidence. Accordingly, we reverse the judgment and remand the cause for an order or proceedings consistent with this opinion.
REVERSED AND REMANDED.
MOORE, C.J., and SEE, BROWN, and HARWOOD, JJ., concur.
|
Q:
How to match word INCLUDING word with hyphens?
I'm using the following regex to match words with hyphens:
/\b\w*[-']\w*\b/
However, it doesn't match words without hyphens. How can I turn it into a regex that also matches words without hyphens?
A:
You can eliminate the \w* on both sides of the character class and just use:
/\b[\w'-]+\b/
That should match word characters with hyphens or without that are at least >= one character long.
|
San Antonio Spurs head coach Gregg Popovich didn’t hold back on his feelings regarding Zaza Pachulia’s closeout on Kawhi Leonard on Sunday that resulted in Leonard reinjuring his left ankle, an injury that has left his status in doubt for Game 2 on Tuesday.
Popovich listed a number of questionable incidents involving the Warriors center and said the play in the Spurs’ Game 1 loss was a “totally unnatural closeout” on Leonard, who underwent an MRI on Monday.
“The play where he took Kawhi down and locked his arm in Dallas – he could have broken his arm,” Popovich said of Pachulia on Monday. “Ask David West, his current teammate, how things went when Zaza was playing with Dallas and he and David got into it. Then think about the history he’s had and what that means to a team what happened last night.
“A totally unnatural closeout that the league has outlawed years ago and pays great attention to it. And Kawhi’s not there. And you want to know how we feel about it. You want to know if that lessens our chances or not.”
Popovich wasn’t done taking aim at Pachulia, further questioning the 33-year-old’s intent on the play.
“Because he’s got this history, [people say] ‘It was inadvertent. He didn’t have intent.’ Who gives a damn about what his intent was,” Popovich said. “You ever hear of manslaughter of manslaughter? You still go to jail I think when you’re a Texan and you end up killing somebody, but you might not have intended to do that. All I care is what I saw, all I care about is what happened. The history there exacerbates the situation and makes me very, very angry.”
The Spurs held a 23-point lead in Sunday’s Game 1 before the third-quarter sequence in which Leonard, who underwent an MRI on Monday and reportedly didn’t suffer structural damage, attempted a corner jumper and came down awkwardly. Pachulia closed out to affect Leonard’s shot, but his foot went under Leonard’s leg, resulting in San Antonio’s best player twisting his ankle.
The Warriors immediately went on an 18-0 run and hung on to a 113-111 win to take a 1-0 series lead. Leonard initially tweaked the ankle, which forced him to miss Game 6 of the Spurs’ semifinal series against the Rockets, earlier in the game when he stepped on a teammate’s foot near the Spurs’ bench.
Leonard finished with 26 points and eight rebounds in 24 minutes. San Antonio was a plus-21 with the two-time Defensive Player of the Year on the floor but slowly gave up the cushion to the Warriors, who led the league in scoring in the regular season.
“Honestly, I had no idea he landed on my foot until I turned back and he was already on the ground. As soon as he released the ball I turned around and tried to chase the rebound and see where the ball was going, and apparently he landed on my foot while I was already turned.
“I really feel bad for the guy. I wish it didn’t happen, that it was a different result … I have a lot of respect for Kawhi. I think he is one of the best players. I wish him all the best.” |
Arrogance Kills Bull Markets But This One Remains Humble
By Michael P. Regan -
Aug 12, 2014
Companies need to increase the pace of hiring to keep this bull market going, right? They need to shell out more in capital expenditures, right? Oh and don’t forget inventories, they need to boost them big time. Right??!
Not so fast, says Adam Parker, chief U.S. equity strategist at Morgan Stanley. While all that may be good for economic growth, if overdone it also could threaten profit margins and hasten the end of the cycle that’s almost tripled the Standard & Poor’s 500 Index in the past five-and-a-half years.
“Management arrogance gone awry,” is how he described it to Trish Regan on Bloomberg Television’s “Street Smart” program yesterday. “Too much hiring, too much inventory, too much capital spending. As long as they don’t do that, the probability of the cycle ending isn’t really there and you can kind of have a slow and steady cycle that lasts a long time.”
“Hubris and debt” mark the top of every cycle, Parker and colleagues wrote in a report yesterday, and these days it’s hard to make the case that the peak is near. U.S. companies are showing discipline when it comes to hiring, capital spending should remain muted and inventories relative to sales are growing at a rate that shouldn’t be a big problem for margins, they wrote.
As far as debt goes, companies are earning enough money to cover interest expenses much more easily than in the past, with the coverage ratio for the biggest 1,500 companies doubling in the past five years, according to Morgan Stanley’s math.
Bullish Turn
The recent dip in stocks, which sent the S&P 500 down as much as 3.9 percent from its last record close on July 24, made Parker and his colleagues bullish again.
They especially like technology companies and upgraded the industry to overweight, the equivalent of buy, from market-weight, or hold. Consumer discretionary stocks, the worst-performing group this year among the 10 main industries in the S&P 500, also caught their interest. The strategists added payment-processing company Vantiv Inc., Nike Inc. and Las Vegas Sands Corp. to their model portfolio.
“The way that portfolio managers should address the question of how to get more bullish is to buy health-care, technology, and consumer discretionary, and to sell consumer staples and financials,” they wrote.
Parker expects the S&P 500 to reach 2,050 by the middle of next year. That would be a 5.8 percent rise from yesterday’s close. For the record, Parker is no Pollyanna when it comes to his projections. The S&P 500 finished 2012 and 2013 more than 20 percent above his forecasts in January of those years, while in 2011 he came within 2 percent of the mark, according to data compiled by Bloomberg. |
240 S.W.3d 720 (2007)
STATE ex rel. Tracy McKEE, Petitioner,
v.
The Honorable John J. RILEY, et al., Respondents.
No. SC 88867.
Supreme Court of Missouri, En Banc.
December 21, 2007.
*722 Maleaner R. Harvey, Courtney M. Harness, Office of the Public Defender, St. Louis, for petitioner.
Jennifer M. Joyce, Charles W. Billings, Office of the Circuit Attorney, St. Louis, for respondents.
ORIGINAL PROCEEDING IN MANDAMUS
LAURA DENVIR STITH, Judge.
Petitioner Tracy McKee seeks a writ of mandamus directing the trial court to dismiss the indictment pending against him with prejudice on grounds that the failure to try him for over 18 months following his arrest violates his constitutional right to a speedy trial under the sixth and fourteenth amendments to the United States Constitution and under article I, section 18(a) of the Missouri Constitution, as well as his statutory right to a speedy trial under section 545.780, RSMo 2000.[1] Mr. McKee asserted these rights in various pro se motions for speedy trial and in a pro se motion to dismiss, although represented by counsel from the office of the public defender.
This Court rejects Mr. McKee's claim that his continued prosecution violates section 545.780. That statute supplements the constitutional right to a speedy trial by declaring that a case shall be set for trial as soon as possible after defendant announces ready for trial and files a request for speedy trial. Where, as here, a defendant is represented by counsel, however, it is counsel who will try the case and, therefore, only counsel who can declare that the defense is "ready for trial."
The same is not true of Mr. McKee's pro se invocation of his constitutional right to a speedy trial. That right is personal to a defendant and may be asserted by a defendant pro se even when, as in this case, defendant is represented by counsel. The trial court, and counsel for Mr. McKee and for the State, erred in simply ignoring Mr. McKee's repeated motions asserting his constitutional right to a speedy trial. Mere delay accompanied by an assertion of one's right to a speedy trial is insufficient to entitle one to dismissal, however. A defendant also must show that the defense is not unduly responsible for the delay and that the delay has caused prejudice to the defendant. Here, the record does not sufficiently elucidate the reasons for the delays nor does it disclose the extent and nature of prejudice to the defendant. Accordingly, the Court issues a peremptory writ of mandamus, directing the trial court: (1) to immediately hold a hearing to determine whether the conditions placed upon Mr. McKee's release at the time of his arrest pursuant to Rule 33.01 remain appropriate,[2] and (2) to hold a hearing *723 within seven days of the issuance of this Court's mandate to determine whether Mr. McKee's constitutional right to a speedy trial has been violated. If the trial court finds that his speedy trial right has been violated, the charges against Mr. McKee shall be immediately dismissed. If the trial court concludes otherwise, Mr. McKee shall be brought to trial as soon as practicable, but in no event more than thirty days after the hearing on his motion.
I. FACTUAL AND PROCEDURAL BACKGROUND
The record indicates that Mr. McKee is 42 years old and was unemployed and homeless when he was arrested on June 4, 2006. He was charged with six crimes related to three alleged incidents of tampering with motor vehicles. More specifically, the state has charged that on June 16, 2005, Mr. McKee defaced a 2000 Nissan Maxima[3] and pushed security officer Beverly Black, resulting in a felony charge of first-degree tampering and a misdemeanor charge of third-degree assault. Then, on March 27, 2006, Mr. McKee allegedly entered unlawfully into a building owned by Interpark and fled from a police officer, resulting in misdemeanor charges of trespassing and resisting arrest. Finally on June 4, 2006, Mr. McKee allegedly broke out the passenger window of a 2004 Ford Excursion and stole items over $500 in value, resulting in his arrest on a charge of felony stealing and a misdemeanor charge of second-degree property damage.[4] Bond was set at $20,000 cash, which could be satisfied with $1000 cash and either $19,000 secured or 10 percent. Mr. McKee was unable to make bond.
The public defender was appointed to represent Mr. McKee on June 6, 2006, two days after his arrest. On June 6, 2006, the cause was continued until July 19 at the request of the state, but the record does not state a reason for this continuance. On July 19, the cause was continued until August 23 at the request of the state, but again, the record does not state a reason for this continuance.[5]
The state presented the six charges set forth above to a grand jury in August 2006. The grand jury returned an indictment on the tampering charge and on the four misdemeanor charges, but it determined that there was insufficient evidence to support an indictment on the stealing charge, so that count was dismissed. On August 23, 2006, the cause was continued until September 13, 2006, at the request of the court.[6] On September 13, Mr. McKee was arraigned on the charges in the grand jury indictment. After pleading not guilty, *724 the cause was assigned for an initial appearance in Division 16 on October 5, 2006. The October 5, 2006, hearing was "Continued/Rescheduled" for reasons that are not reflected in the docket sheets or the record submitted by the parties.[7]
In September 2006, shortly after his arraignment, Mr. McKee filed his first pro se motion for a speedy trial, alleging that he had been in custody for 100 days without trial and that further delay would have an "adverse impact on the defendant due to stressful incarceration conditions" and would undermine his ability to have a fair trial. That motion was accepted for filing by the trial court, and no motion to strike was filed by the circuit attorney opposing its filing on the ground, now asserted on appeal, that he had no right to file such a pro se motion because he was represented by counsel.
In October 2006, the public defender assigned a new attorney to Mr. McKee. On November 15, 2006, the case was set for trial to begin on January 29, 2007. On December 4, 2006, the prosecuting attorney sent a letter to counsel for Mr. McKee indicating the state's belief that five years would be an appropriate disposition of the charges if Mr. McKee were interested in pleading guilty.
The January 29, 2007, trial date was not kept. The parties suggest this was due to a failed plea agreement, but if so, no record was made to that effect in the trial court. This Court, like all appellate courts, is guided by the record, and neither the record nor the docket indicates what, if anything, occurred on January 29. The record does disclose that the prosecutor filed a superseding information on January 31, 2007, which amended the June 2005 tampering count (the only felony charge in the case) to allege tampering with a 2000 Nissan Maxima rather than a 2004 Ford Excursion. The superseding information was identical to the indictment in all other material respects. On February 9, 2007, the cause was continued (in an unsigned order) to April 30, 2007. As with most of the previous continuances, the record does not disclose a reason for this continuance other than that it was made at the request of the court. On April 17, 2007, the state issued at least four subpoenas for witnesses to testify at the April 30 trial date.
On April 27, the Friday before the April 30 trial date, Mr. McKee filed a letter with the court that notes he has "been incarcerated for 11 months and has yet to be brought to trial after having requested and answered ready many times." In this letter, Mr. McKee also requested discovery of certain items that he believed were pertinent to his defense. Although witnesses had been subpoenaed to testify, the April 30 trial date passed without even a docket entry reflecting that anything occurred in the case. Apparently some continuance was granted without record entry, for a letter from Mr. McKee that was filed on May 3 notes that his "most recent missed court date for trial was 04-30-07 again of no reason or cause of my own nor for any good cause of the state." Mr. McKee's May 3 letter again notes that he has been incarcerated for 11 months and has yet to be brought to trial "after having requested many times for a fast speedy trial." The conclusion of Mr. McKee's May 3 letter reads: "At this point I wish to file a motion to dismiss, pro-se if need be, and I request your powers and judgement to rule on this motion please. I intend to stand before your court soon for trial."
*725 On May 9, 2007, a docket entry reflects that the cause was reset for July 2, 2007. The record contains no further information about this continuance. This continuance prompted another pro se motion for a speedy trial from Mr. McKee, filed on May 22, 2007. This motion invoked Mr. McKee's state and federal constitutional rights to a speedy trial and requested the sanction of dismissal. It notes that Mr. McKee has had "numerous employment opportunities" that "have been put on hold pending completion and final disposition of this cause, which places hardship on the defendant's family." Like Mr. McKee's previous motion for speedy trial, this motion was accepted for filing without opposition by the circuit attorney, but the trial court took no action on it nor did his counsel call it up for hearing. It simply sat, ignored, in the case file.
On July 11, 2007, a docket entry reflects that the July 2 hearing was "Continued/Rescheduled" to September 20, 2007. The record contains no further information about this continuance. Also on July 11, a "Plea/Trial Setting" was scheduled for August 13, 2007. Mr. McKee filed a third pro se motion for a speedy trial on July 18, 2007. In this motion, which was filed on a prepared form, Mr. McKee asserted that his statutory and constitutional rights to a speedy trial were being infringed, and he sought an evidentiary hearing to prove his claim. Mr. McKee also filed an offer to plead guilty to the lesser charge of tampering in the second degree on July 18, 2007.
There is no information in the record supplied to indicate whether the August 13, 2007, plea/trial setting was kept or, if it was continued, the reasons for the continuance. The record does reflect, though, that on August 14 Mr. McKee filed a pro se motion to dismiss the pending charges for a violation of his statutory and constitutional rights to a speedy trial. Again, although both the July 18 and August 14 motions were filed without opposition, neither of these motions were addressed by the trial court or by counsel.
On September 20, 2007, a docket entry reflects the cause was "continued/rescheduled" to October 17, with a "Plea/Trial setting" on October 9. According to the docket, nothing took place on October 9 in Mr. McKee's case. On October 17, a docket entry reflects that the cause was "Continued/Rescheduled" to December 3 for trial. The record does not disclose a reason for either of these continuances.
Since the trial court took no action on Mr. McKee's motions to dismiss and for a speedy trial, Mr. McKee sought a writ of mandamus directing the trial court to dismiss the charges against him for violation of his statutory and constitutional rights to a speedy trial. This Court issued an alternative writ of mandamus.
II. STANDARD OF REVIEW
This Court has the authority to "issue and determine original remedial writs." Mo. Const. art. V, sec. 4.1. It issues a writ of mandamus "to compel the performance of a ministerial duty that one charged with the duty has refused to perform." Furlong Cos. v. City of Kansas City, 189 S.W.3d 157, 165-66 (Mo. banc 2006). "A litigant asking relief by mandamus must allege and prove that he has a clear, unequivocal, specific right to a thing claimed." Id. at 166. The speedy trial statute specifically allows that "the provisions of this section shall be enforceable by mandamus." Sec. 545.780(2).
III. RIGHT OF A REPRESENTED DEFENDANT TO FILE PRO SE MOTION ALLEGING VIOLATION OF SPEEDY TRIAL RIGHTS
Mr. McKee alleges violation of his statutory right to speedy trial under section *726 545.780, violation of his constitutional right to "a speedy and public trial" under U.S. Const. amend. VI and violation of the promise of Mo. Const. art. I, sec. 18(a) that "the accused shall have the right to . . . a speedy public trial".
Respondent argues that this Court should not reach the merits of Mr. McKee's speedy trial claims because they were asserted in pro se motions by a defendant who was represented by counsel. In general, one must choose between self-representation and representation by counsel. As this Court recently noted, once the right to counsel is invoked, a defendant "effectively cede[s] to his counsel the authority to seek reasonable continuances." State ex rel. Wolfrum v. Wiesman, 225 S.W.3d 409, 412 (Mo. banc 2007); accord State v. Williams, 34 S.W.3d 440, 442 (Mo.App. S.D.2001) ("defendant . . . has no right to . . . a combination of self-representation and assistance of counsel").[8]
Here, because Mr. McKee had counsel, but counsel never filed a speedy trial motion or called Mr. McKee's pro se motions up for hearing, Respondent argues the trial court never became obligated to address the motions in the first instance. By extension, Respondent argues that it would be inappropriate for this Court to issue a writ of mandamus. Since the right to a speedy trial has both statutory and constitutional origins, the Court will address whether Mr. McKee's pro se motions were effective to invoke his statutory right separately from the issue of whether they were effective to assert his constitutional right.
A. Statutory Right to Speedy Trial Cannot Be Invoked by Defendant Pro Se.
Mr. McKee claims that the trial court's inaction on his pro se motions violated his statutory right to a speedy trial under section 545.780. Section 545.780 states:
1. If defendant announces that he is ready for trial and files a request for a speedy trial, then the court shall set the case for trial as soon as reasonably possible thereafter.
2. The provisions of this section shall be enforceable by mandamus. Neither the failure to comply with this section nor the state's failure to prosecute shall be grounds for the dismissal of the indictment unless the court also finds that the defendant has been denied his constitutional right to a speedy trial.
The statute expressly states that it does not entitle a defendant to dismissal unless the constitutional right to speedy trial is also violated. Sec. 545.780(2); see also State v. Owsley, 959 S.W.2d 789, 794 (Mo. banc 1997) (statute provides that indictment cannot be dismissed where the defendant is not denied his constitutional right to a speedy trial).[9]
*727 The statute's self-evident purpose is not to expand the constitutional right to a speedy trial, but rather to provide a mechanism for bringing a case to trial when a defendant seeks a timely resolution of his or her case. The statute accomplishes this purpose by requiring the court to set a case for trial "as soon as reasonably possible" after "defendant announces that he is ready for trial and files a request for a speedy trial." Sec. 545.780(1). The statute limits the harsh remedy of dismissal for its violation to only those cases where there is also a constitutional violation, which should be analyzed separately from the statutory violation. See State v. Bolin, 643 S.W.2d 806, 810 (Mo. banc 1983) (distinguishing between the constitutional and statutory rights to a speedy trial).[10]
Mr. McKee clearly intended to invoke the protections of Missouri's speedy trial statute in his pro se motions. In his August 15, 2007, motion, for example, he argued that "at every trial setting defendant answered ready and available for trial." But section 545.780, in requiring that defendant announce that he is "ready for trial," clearly contemplates that it is counsel, not the represented defendant, who must invoke this statutory protection. Any other interpretation of the statute could place defense counsel in an untenable position when, for example, a represented defendant announced "ready for trial" without consulting his or her counsel, and counsel was not, in fact, ready for trial. Trial would then have to proceed with counsel who could potentially be inadequately prepared.
Since the statute provides a procedure for a defendant's trial to be held expeditiously, and since, where defendant is represented by counsel, it is counsel who will try the case, it therefore must be counsel's prerogative to announce when the defense is "ready for trial" for the purposes of Missouri's speedy trial statute. See Wolfrum, 225 S.W.3d at 412.
In this case, while Mr. McKee did invoke his right to speedy trial, so far as the record shows (and the record submitted to this Court is by no means complete), Mr. McKee's defense counsel never announced ready for trial. Mr. McKee's pro se declaration that he was ready for trial was not effective to trigger the statute's protections, as it was counsel not Mr. McKee who would try the case. Therefore, this Court agrees with Respondent that Mr. McKee cannot claim a violation of the speedy trial act.
B. The Constitutional Right to Speedy Trial Can Be Invoked Pro Se Even by a Represented Defendant.
The outcome is different, however, in regard to Mr. McKee's constitutional right to a speedy trial. The constitutional right to speedy trial is unique in that its assertion, under some circumstances, can place the defendant in a conflicting position *728 with defense counsel. Unlike the right to an impartial jury or the right to confront and cross-examine witnesses, where defense counsel is often in a better position to understand the contours of the right and appreciate situations in which it has not been properly respected, the right to a speedy trial depends, in part, on circumstances that are uniquely experienced by the defendant. "[T]he speedy trial right exists primarily to protect an individual's liberty interest, `to minimize the possibility of lengthy incarceration prior to trial . . . and to shorten the disruption of life caused by arrest and the presence of unresolved criminal charges.'" United States v. Gouveia, 467 U.S. 180, 190, 104 S.Ct. 2292, 81 L.Ed.2d 146 (1984) (addressing distinction between right to speedy trial and right to counsel under the Sixth Amendment) (quoting United States v. MacDonald, 456 U.S. 1, 8, 102 S.Ct. 1497, 71 L.Ed.2d 696 (1982)). Although defense counsel may understand that pretrial incarceration is a vexing condition, the prejudice to the defendant that flows from this condition is neither experienced nor directly shared by defense counsel. A defendant, thus, has a reason, not necessarily shared by counsel, to want trial to proceed as expeditiously as possible.
Even excellent defense counsel may not be prepared to go to trial and may seek a continuance, or multiple continuances, due to the press of other business or for other perfectly proper reasons unrelated to the defense of defendant's case. The individual defendant, whose right to a speedy trial is at stake, may not care about those other cases or those other reasons. The defendant incarcerated while awaiting trial is properly concerned with his own need to resolve the charges against him. The tension between the burdens on defense counsel and the defendant's desire to resolve the charges quickly appears to have arisen in this case, in which defendant repeatedly sought a speedy trial, and counsel appears never to have sought to bring the case to trial or to call up the speedy trial motions or motion to dismiss for hearing.
Perhaps with this type of situation in mind, our court of appeals repeatedly has allowed a represented defendant to assert his right to a speedy trial through a pro se motion. See e.g., State v. Smith, 849 S.W.2d 209, 214 (Mo.App. E.D.1993) (filing of a pro se motion for speedy trial represents "the first formal assertion of [the] right to a speedy trial"); State v. McNeal, 699 S.W.2d 457, 461 (Mo.App. E.D.1985) (defendant timely asserted "his right to a speedy trial in a pro se motion"); State v. Morris, 668 S.W.2d 159, 163 (Mo.App. E.D.1984) (appellant asserted the right "when he filed a pro se motion to dismiss based on his constitutional right to a speedy trial and [sec.] 545.780, the speedy trial statute"). See also State v. Galvan, 795 S.W.2d 113, 117-18 (Mo.App. S.D.1990) (delays under sec. 217.460, the Uniform Mandatory Disposition of Detainers Law, should be calculated based on "the day defendant filed his pro se request for speedy trial").[11] The federal courts, too, have allowed a defendant to assert speedy trial rights through pro se motions. See, e.g., U.S. v. Rothrock, 20 F.3d 709, 712 (7th Cir.1994) (construing pro se motion for speedy trial as effective to assert both statutory and constitutional rights).
In light of this precedent and the unique and conflicting interests of defendant and of his counsel in regard to a request for speedy trial, this Court affirmatively holds what Missouri's court of *729 appeals has long recognized: a represented defendant may assert his constitutional right to a speedy trial through a pro se motion. This Court then must determine whether Mr. McKee's constitutional right to speedy trial has been violated.
IV. A RECORD MUST BE MADE AS TO WHETHER DEFENDANT'S CONSTITUTIONAL SPEEDY TRIAL RIGHT WAS VIOLATED
The United States and Missouri Constitutions provide equivalent protection for a defendant's right to a speedy trial. See Bolin, 643 S.W.2d at 810 n. 5 (the "Missouri constitutional provision" protecting the right to a speedy trial is not "any broader in scope than is the sixth amendment"). To assess whether the constitutional right to a speedy trial has been respected or denied, the Court must balance four factors: (1) the length of delay; (2) the reason for the delay; (3) the defendant's assertion of his right; and (4) prejudice to the defendant. See State v. Edwards, 750 S.W.2d 438, 441 (Mo. banc 1988); Barker v. Wingo, 407 U.S. 514, 533, 92 S.Ct. 2182, 33 L.Ed.2d 101 (1972).
In this case, there is no dispute about the length of the delay. As of the date of this opinion, Mr. McKee has been detained awaiting trial for over 18 months. Missouri courts have held that delays longer than eight months are presumptively prejudicial to the defendant. State v. Williams, 34 S.W.3d 440, 447 (Mo.App. S.D.2001) ("eight months or longer is presumptively prejudicial"); see also State v. Farris, 877 S.W.2d 657, 660 (Mo.App. S.D. 1994) (citing cases holding eight months or longer is presumptively prejudicial).
Moreover, the accusations levied against Mr. McKee represent, at most, ordinary street crimes. "[T]he delay that can be tolerated for an ordinary street crime is considerably less than for a serious, complex conspiracy charge." Barker, 407 U.S. at 530, 92 S.Ct. 2182; see also Bolin, 643 S.W.2d at 814 ("for this `ordinary street crime' . . . a delay of seven months . . . is presumptively prejudicial").
The delay in bringing a defendant to trial is measured from the time of arrest, not from the time that the right is first asserted. Bolin, 643 S.W.2d at 813 ("the protections of the speedy trial provisions attach when there is a formal indictment or information or when actual restraints [are] imposed by arrest and holding to answer a criminal charge") (internal quotations omitted); United States v. MacDonald, 456 U.S. 1, 6, 102 S.Ct. 1497, 71 L.Ed.2d 696 (1982) ("In addition to the period after indictment, the period between arrest and indictment must be considered in evaluating a Speedy Trial Clause claim"). But, the timely assertion of the right to speedy trial is a factor in determining whether the speedy trial right has been violated. Id. at 814. "Although `[a] defendant has no duty to bring himself to trial,'" "`failure to assert the right will make it difficult for a defendant to prove that he was denied a speedy trial.'" Id. (citing Barker, 407 U.S. at 527, 532, 92 S.Ct. 2182).
Here, there is little dispute that defendant timely filed pro se motions asserting his right to speedy trial. He filed his first motion one month after his indictment, when he had already been incarcerated for just over three months. In the intervening year, he filed repeated requests to be brought to trial quickly.
The two factors that do present live disputes in this mandamus petition are the reasons for the many delays and the prejudice inuring to Mr. McKee from those delays. Mr. McKee asserts that the state is entirely responsible for the delay in this case. The record discloses at least four continuances of the trial date with almost *730 no information regarding why they were continued. The January date was continued to April at the request of the court, but the record contains no information regarding why the April, July, and October dates were continued. Since each continued trial date prompted Mr. McKee to file another motion for speedy trial, it seems evident that none of these continuances were entered at his request. It is unclear whether some were at the behest of the circuit attorney, or whether some or all occurred because of dockets so congested that the case simply could not be reached. Counsel at oral argument were unable to provide the Court with any clarity on the reason for these continuances.
To the extent that these delays are due to the court's docket they "should be weighted less heavily [against the state than deliberate delays to hamper the defense] but nevertheless should be considered since the ultimate responsibility for such circumstances must rest with the government rather than with the defendant." Barker, 407 U.S. at 531, 92 S.Ct. 2182.
Respondent asserts that Mr. McKee is responsible for two of the delays, citing instances in January and July 2007 in which Mr. McKee expressed a willingness to plead guilty and then did not go forward with that plea at the hearing. Although the record does contain some references to a plea hearing, there is nothing in the record before this Court that discloses the circumstances of those plea hearings, who scheduled them and what exactly took place. For example, the record contains a letter from Mr. McKee file-stamped August 3, 2007, that indicates he appeared before Judge Riley "briefly" on July 27, 2007, and that it was his "sincere intention to resolve this cause with a plea agreement with the state" but that he was unable to do so due to unfamiliarity with the "procedure one should practice when standing before you."[12] The docket entries reflect no activity on July 27, however, leaving this Court unable to discern from this record what, if anything, took place at this alleged appearance.
If the parties expected the case to be resolved at these plea hearings and then, due solely to a change of heart by defendant it was not, then some associated delay would be attributable to the defendant. But Respondent also acknowledged that there was a factual error in the indictment as to the felony count on the date of the apparent January plea hearing, an error corrected by a superseding information filed on January 31, 2007. A defendant's unwillingness to plead guilty to a factually inaccurate indictment is unlikely to be a delay attributed to the defendant. "It is ultimately the duty of the state to bring a defendant to trial." Bolin, 643 S.W.2d at 814.
Respondent also argues that it deferred its efforts to obtain blood and saliva samples from Mr. McKee at the request of defense counsel, who the circuit attorney says represented that such efforts would be detrimental to the plea negotiations.[13] Presuming a record of such an agreement could be made below, it might well justify some delay in testing until a plea hearing could be held. But, once the plea agreement failed in January 2007, the case was set for trial in April and the state subpoenaed *731 its witnesses for that date. It does not appear reasonable on this record for the prosecution to have delayed pursuit of this evidence after the January plea negotiations failed. Certainly when the plea agreement allegedly failed again in July 2007, the prosecution had no basis to further delay taking steps to secure scientific evidence it apparently felt might identify the culprit. A speedy trial is not only for the benefit of the defendant, it "is also for the benefit of society." State ex rel. Kemp v. Hodge, 629 S.W.2d 353, 356 n. 4 (Mo. banc 1982). See also Zedner v. United States, 547 U.S. 489, 126 S.Ct. 1976, 1985, 164 L.Ed.2d 749 (2006) (holding that federal speedy trial statute protects both the interests of the defendant and the public in the speedy disposition of criminal charges).
Based on the uncertainties in the record on this petition, this Court simply lacks a sufficient record from which it can determine to whom the delays in bringing Mr. McKee to trial should be attributed and, if some is attributable to the defendant, how much of the overall delay is attributable to his conduct. Without that record, this Court lacks sufficient information regarding the causes of the delays to reach a conclusion whether Mr. McKee's right to a speedy trial has been violated. Such a determination should be made indeed it should have already been made by the trial court in the first instance. The failure to provide any reasons for granting continuances in a criminal case coupled with the complete absence of record entries reflecting significant actions in the case is exceedingly troubling. It leads to a lack of confidence in the record as a whole and in the record-keeping practices of the trial court.
Since a hearing will be required to determine the reasons for the lengthy delay in this case, the Court will also entrust to the trial court an inquiry regarding the specific prejudice this delay has caused Mr. McKee. The present record discloses a lengthy period of pretrial incarceration, which in some cases would provide sufficient prejudice to conclude that the defendant's constitutional rights were violated. See Doggett v. United States, 505 U.S. 647, 652, 112 S.Ct. 2686, 120 L.Ed.2d 520 (1992) ("the presumption that pretrial delay has prejudiced the accused intensifies over time"). There may be other factors relevant to prejudice that can be developed at an evidentiary hearing (e.g., availability of witnesses, loss or spoliation of evidence, particular harm flowing from the defendant's pretrial incarceration).
In considering how to weigh any delay caused by crowded dockets, this Court and Respondents must take into consideration that the delay in this case is not unique. Numerous other petitions for writs have been filed in this Court by persons incarcerated while awaiting disposition of their charges in this and on some occasions in other jurisdictions, similarly alleging lengthy delays. The right to a speedy trial is an important right that the courts of this state are duty-bound to honor, even in the face of heavy trial dockets and competing demands for trial. Protracted and unreasonable delays in criminal cases due to crowded dockets cannot become routine. Neither is it acceptable for the prosecuting attorney and defense counsel to accept or request such routine continuances without objection. The defendant's right to a speedy trial and the public's interest in timely resolution of criminal cases demands that this and other similar cases receive more expeditious treatment, even in the face of competing demands on counsels' and the court's time.
This Court does not mean to suggest that any party to this proceeding has intended to violate any defendant's speedy trial rights, but "unreasonable delay in *732 run-of-the-mill criminal cases cannot be justified by simply asserting that the public resources provided by the State's criminal-justice system are limited and that each case must await its turn." Barker, 407 U.S. at 538, 92 S.Ct. 2182 (White, J., concurring). Mr. McKee is entitled to a prompt hearing on his claim that his constitutional rights have been violated and, if they have not yet been, then he is entitled to a prompt trial on the merits of these charges.
V. CONCLUSION
Because this case involves assertion of the right to speedy trial after a lengthy delay, the Court quashes its alternative writ and directs its peremptory writ to issue commanding Respondent: (1) to immediately hold a hearing to determine whether the conditions placed upon Mr. McKee's release at the time of his arrest pursuant to Rule 33.01 remain appropriate,[14] and (2) to convene a hearing within seven days of this Court's mandate to determine whether Mr. McKee's constitutional right to a speedy trial has been violated.[15] If the trial court finds that his speedy trial right has been violated, the charges against Mr. McKee shall be immediately dismissed. If the trial court concludes otherwise Mr. McKee shall be brought to trial as soon as practicable thereafter, but in no event more than thirty days after the hearing on his motion.
TEITELMAN, LIMBAUGH, RUSSELL, WOLFF and BRECKENRIDGE, JJ., concur.
PRICE, J., concurs in part in separate opinion filed.
WILLIAM RAY PRICE, JR., Judge, concurring in part.
I concur with the majority that an immediate hearing is necessary concerning Tracy McKee. I differ concerning the reason for the hearing and, in part, the focus of the hearing.
Once represented by an attorney, a party cannot independently pursue a separate strategy with separate court filings. See State ex rel. Wolfrum v. Wiesman, 225 S.W.3d 409, 412 (Mo. banc 2007); State v. Williams, 34 S.W.3d 440, 442 (Mo.App. 2001). The majority creates an exception to this rule concerning an individual's constitutional right to a speedy trial. Such an exception, even in this important and limited circumstance, threatens confusion and gamesmanship in our criminal procedure.
While I would not recognize Mr. McKee's written communications to the court as "filings" that invoke procedural and constitutional rights, they are evidence that indicate the attorney-client relationship has failed, jeopardizing Mr. McKee's right to adequate representation and, in turn, his right to a speedy and fair trial. Mr. McKee has been incarcerated for over 17 months and has written to the court in one form or another on six separate occasions complaining of delay. I would hold that when presented with this evidence, the trial court is obligated to immediately *733 investigate and, if necessary, remedy the situation.
NOTES
[1] Unless stated otherwise, all subsequent statutory references are to RSMo 2000.
[2] Rule 33.06 allows the trial court to "modify the requirements for release."
[3] The prosecuting attorney filed a superseding information on January 31, 2007, which amended the tampering count to allege tampering with a 2000 Nissan Maxima instead of a 2004 Ford Excursion. The superseding information was identical to the indictment in all other material respects.
[4] More specifically, Mr. McKee was accused of violating sec. 569.080 (first-degree tampering), sec. 570.030 (felony stealing over $500), sec. 565.070 (third-degree assault), sec. 575.150 (resisting arrest), sec. 569.120 (second-degree property damage), and sec. 569.140 (first-degree trespass).
[5] These continuances were made on pre-printed order forms that provide several inches of blank space to provide reasons for the continuance. Neither these continuances at the state's request nor most of those continuances at the court's request, addressed infra, provide such reasons. To the extent that the state now asserts some of those continuances are attributable to the defendant's conduct, those reasons ought to have been reflected in the order of continuance in the first instance.
[6] The reasons given for this continuance are "Indictment filed," and the continuance also notes, "Bring Back Early."
[7] The docket reflects a pro se motion for speedy trial on September 13, 2006, but the motion itself states in its certificate of service that it was mailed on September 15, and the file stamp reads September 19, 2006. Although the difference is immaterial in this case, the discrepancy between docket entries and filing dates is troublesome.
[8] Trial courts occasionally appoint counsel to operate as "standby counsel" when a defendant chooses self-representation. Occasionally, the appellate courts have referred to this as "hybrid representation," see e.g., State v. White, 44 S.W.3d 838, 846-47 (Mo.App. W.D. 2001), but those cases are different than the case at bar, where the defendant at no time was permitted to proceed pro se or with only standby counsel.
[9] The dicta in State v. Owsley that "the statute provides [a defendant] no relief" where he is not denied his constitutional right to a speedy trial, 959 S.W.2d 789, 794 (Mo. banc 1997), refers to the effect of the statute on a defendant's right to have a charge dismissed. The statutory speedy trial right could, if necessary, be enforced by mandamus where a trial court failed to timely bring a case to trial once the statute was properly invoked, even where there was no violation of the constitutional right to a speedy trial. The statute makes it clear that the remedies for statutory violations, however, cannot include dismissal of the indictment unless there also is a constitutional violation.
[10] This Court in Bolin held that "the constitutional standard . . . has no application when the question is whether a defendant has been denied a statutory speedy trial right." Bolin, 643 S.W.2d at 810. At the time of State v. Bolin, the speedy trial statute required a defendant to be brought to trial within 180 days of arraignment. See Sec. 545.780(2), RSMo 1978. In 1986, the legislature amended the statute to make the defendant's constitutional right to a speedy trial relevant to the remedy for statutory violations, so the statement in Bolin that the constitutional standard "has no application" is no longer relevant. The Court's recognition of the difference between constitutional and statutory standards, however, remains pertinent today.
[11] Section 217.460 requires pending charges filed against persons already serving sentences in the department of corrections to be resolved within 180 days of a request for their resolution. It protects the same interests as the speedy trial statute.
[12] This letter also states that Mr. McKee "made a counter-offer" in the plea negotiations "in a desperate desire to resolve this matter after 14 months of stressful pretrial incarceration."
[13] According to the motion to compel blood and saliva samples, there was "blood on the center console of the victim's vehicle" with which the state sought to compare Mr. McKee's blood.
[14] Rule 33.06 allows the trial court to "modify the requirements for release."
[15] Although the period for filing post-disposition motions is ordinarily fifteen days under Rule 84.17, in light of the lengthy delay in bringing Mr. McKee to trial thus far, the Court shortens the period for filing post-disposition motions so that any such motion shall be filed on or before 12:00 noon on December 28, 2007. See Rule 84.24(j) (allowing Court on original writs to "dispense with such portions of the procedure as is necessary in the interests of justice"); see also Rule 94.01 (permitting Court on mandamus to "direct the . . . details of procedure as may be necessary . . . to give effect to the remedy").
|
If you have used AngularJS, you probably have at least once used the Scope.$on or Scope.$watch methods, and probably had to dispose of listeners / watchers. Here’s a little trick you may like to do just that in a few lines.
Deregistration functions are awkward
AngularJS’s Scope.$on and Scope.$watch methods return a deregistration function which should be called when you don’t need the callback anymore (e.g. if you were listening on $rootScope from a controller), mainly for performance reasons. Not disposing of listeners will keep the garbage collector from doing its job. For instance, if the fooListener below was to use a variable (say counter ) from a higher context, it wouldn’t be freed from memory. This can lead to a large consumption of RAM, and is especially something to watch for in Single-Page Applications and mobile apps.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
var deregisterFooListener = $rootScope.$on( 'myFooEvent' , fooListener);
var deregisterBarListener = $rootScope.$on( 'myBarEvent' , barListener);
var deregisterBazListener = $rootScope.$on( 'myBazEvent' , bazListener);
$scope.$on( '$destroy' , deregister);
var counter = 0 ;
function fooListener ( ) {
counter = counter + 1 ;
}
function deregister ( ) {
deregisterFooListener();
deregisterBarListener();
deregisterBazListener();
}
Use an array!
This is OK when you only have one or two listeners to care for, but gets messier the more you have. My humble tip: use an array of deregistration functions which you can loop on and call one by one.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
var listeners = [
$rootScope.$on( 'myFooEvent' , fooListener),
$rootScope.$on( 'myBarEvent' , barListener),
$rootScope.$on( 'myBazEvent' , bazListener)
];
$scope.$on( '$destroy' , deregister);
function deregister ( ) {
while (listeners.length) {
listeners.pop()();
}
}
That way you won’t pollute the local scope and you won’t have to come up with awkward variable names such as deregisterStateChangeSuccessListener .
Deregistration as a Service
You don’t want to repeat yourself and copy-paste this deregister function all around the codebase, do you? Enter the deregister service.
1
2
3
4
5
6
7
8
9
10
11
12
angular
.module( 'app.utils' )
.value( 'deregister' , deregister);
function deregister ( listeners ) {
return function deregisterCallback ( ) {
while (listeners.length) {
listeners.pop()();
}
};
}
And then you can simply use it like this:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
function MyController ( $scope, deregister ) {
$scope.$on( '$destroy' , deregister([
$rootScope.$on( 'myFooEvent' , fooListener),
$rootScope.$on( 'myBarEvent' , barListener),
$rootScope.$on( 'myBazEvent' , bazListener)
]));
var deregisterEverything = deregister([
$rootScope.$on( 'myFooEvent' , fooListener),
$rootScope.$on( 'myBarEvent' , barListener),
$rootScope.$on( 'myBazEvent' , bazListener)
]);
$scope.$on( '$destroy' , deregisterEverything);
}
Much cleaner, isn’t it? |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.