text stringlengths 8 5.77M |
|---|
A Hydrae
The Bayer designations a Hydrae and A Hydrae are distinct. Due to technical limitations, both designations link here. For the star
a Hydrae, see 6 Hydrae (HR 3431)
A Hydrae, see 33 Hydrae (HR 3814)
See also
α Hydrae (Alphard)
Category:Hydra (constellation)
Hydrae, a |
Another day, another bogus claim against GamerGate. This time, it’s from Anita Sarkeesian’s boyfriend, and man-behind-the-curtain, Jonathan McIntosh. This guy has been comedy gold throughout the last couple months, but today he decided he wanted to get in on the false accusation game. He and Anita are experts at using Twitter to stoke up some bullshit, so it could just be another Feminist Frequency promotion. All just another day at the office for Mr. McIntosh.
There’s a tweet up on his feed right now, that talks about his father getting harassed in a phone call. If this is true, it’s deplorable, and we condemn it. But, I don’t see why you wouldn’t simply call the police, rather than report it on Twitter. Or, if you did talk about it, perhaps wait a couple days? It just seems like blatant self-promotion. Before I learned of the original tweet, I sent out a message to McIntosh:
Deleted tweet from @radicalbytes. Did you call the authorities before sending out a Twitter advisory, Jon? #GamerGate pic.twitter.com/7MkptJbwbt — Ethan Ralph (@TheRalphRetort) October 17, 2014
I had been told the tweet was deleted, and it actually had been. But I was thinking about a different tweet. The one that had actually been deleted, accused GamerGate of being directly responsible for the threat. This, despite having zero evidence. Of course, since you’re on this site, chances are you know that is nothing new. Here’s the original tweet:
What makes these people hurl so many hurtful and damaging accusations? I have nothing but love for the elderly. I don’t support dropping rape threats. I’ve repeatedly condemned harassment. But, I’m #GamerGate. So, I guess none of that matters. I’m just subhuman scum. As we saw this morning, nothing is too extreme for these radical feminists. They will use whatever foul tool they have at their disposal.
Our tool, is exposure. Good thing it beats all the rest. |
The salaries of Philadelphia City Council members are among the highest in the nation. At about $130,000 a year, 17 council members are bringing in more than $2 million a year in salaries combined.
For some members of council though, this well-paying full-time job isn’t their only source of income.
Four members of City Council have jobs at for-profit companies, while several others have secondary sources of income ranging from owning properties in the city to pulling in a pension while they’re not actually retired. District councilman Bobby Henon made more than $70,000 last year in his second job with IBEW Local 98. Councilman Brian O’Neill has long worked as an attorney with Fox Rothschild. Freshman councilman Allan Domb is a powerhouse businessman running a real estate business and working with restauranteurs — though he’s donating his entire City Council salary to the school district.
These details and more are spelled out in recently-filed financial disclosure forms required to be completed by city employees. It’s perfectly legal for council members to hold other positions while they’re serving, and one of the people who used this most in the past was former Councilman and now-Mayor Jim Kenney. On top of his job as an at-large councilman, he also worked as a consultant at an architecture firm and served on the board of Independence Blue Cross. He’s left Council, of course, and pulls in a much higher salary as the city’s chief executive… but he’s still pulling in thousands in pension payments.
Most political watchers say there’s nothing inherently wrong with local politicians holding other positions, so long as it doesn’t become a conflict of interest. That’s the whole point of them disclosing these outside gigs. The council members who have had other jobs for years are often asked about how they avoid a conflict, and they’ll say every time that they recuse themselves from a vote that would even look like a conflict of interest.
So in the interest of transparency, we went through the financial disclosure forms of every city council member and the mayor to see which of these elected officials had secondary sources of income. We’re also including the freshman council members whose sources of income in 2015 were their jobs at the time.
Also in those disclosure forms, which can be publicly searched here, are debts owed and the full disclosure of gifts like tickets to sporting events or upscale dinners. Here’s what we found:
Mayor Jim Kenney
Including his City Council salary, Jim Kenney brought in nearly $350,000 last year. On top of his job as an at-large councilman, he worked as a consultant at Vitetta Architects and Engineers, served on the Amerihealth/ Independence Blue Cross board, was an adjunct professor at Penn and brought in hefty pensions from both the city and the state.
We know how much Kenney made last year thanks to the mayoral financial disclosure being more detailed than what’s required by City Council. In this form, Kenney was required to disclose how much he made at each of his other gigs in 2015. Here’s what it showed he made:
Vitetta Architects and Engineers: $ 69,004.52
Amerihealth/ IBC: $43,200.00
University of Pennsylvania: $1,312.50
City Council: $10,833.01
City of Philadelphia retirement: $83,607.51
State retirement: $9,327.12
It’s important to note that when Kenney was elected mayor, he gave up those side jobs he held before. Spokeswoman Lauren Hitt said he quit work as an adjunct at Penn in February 2015 (hence the relatively small salary from the university last year) and his jobs at Independence Blue Cross and Vitetta ended in December before he took office. The City Council salary listed above is because he quit his job on Council at the end of January 2015 to run for mayor.
While Kenney was a councilman, he caught plenty of heat for his work with Vitetta. Former Mayor John Street brought up Kenney’s work with Vitetta and Independence Blue Cross when they were sparring over ethics legislation and how to use the city’s allotted box seats at sports arenas. His job with Vitetta has come up several times since he took the consulting position in 2002 saying he couldn’t support his family on the then-council salary of $82,000 a year. The firm didn’t pursue city work after hiring Kenney, though it was responsible for City Hall restoration, for which it won the bid for prior to Kenney’s hiring.
You also might notice the mayor has a significant pension. He spent 23 years on council, earning him $7,577.72 a month in pension payments, the Inquirer reported last year. He also has a state pension from the time he spent as an aide to former state Sen. Vince Fumo.
District council members
Bobby Henon
Represents: District 6 – Parts of Port Richmond, Tacony, Frankford, Mayfair, Holmesburg and Northeast Philly
Party: Democrat
Other source of income in 2015: In addition to a property he owns that brings in some cash, Henon — the majority leader — has been on the payroll at IBEW Local 98, one of the most powerful unions in the state, since he was elected to council in 2011. A former electrician from Northeast Philadelphia, Henon became the political director of the union and spent time lobbying for legislation that would have impacted its membership before he was elected.
In 2015, Henon made $71,711 from the union which listed his position only as “office” in its filings with the Department of Labor. His office didn’t respond to questions about what exactly the work with IBEW entails and he’s not listed as a top staffer on the union’s website. He has however received a boatload of political support from IBEW Local 98, which is arguably the most politically active union in the state and is run by John Dougherty, the connected union boss and head of the building trades labor groups.
In Henon’s post with IBEW, he reports directly to Dougherty and has praised the union leader as a pivotal person in his career. Without Dougherty, “I wouldn’t be where I’m at,” he told The Inquirer.
Brian O’Neill
Represents: District 10 – Parts of Northeast Philly
Party: Republican
Other source of income in 2015: O’Neill has long been an employee at Fox Rothschild, a large law firm here in Philly. The longtime Republican who represents parts of Northeast Philadelphia was, in 2004, seen as the target of ethics legislation proposed by Street that would have made it difficult for O’Neill to continue working for the firm. Ethics legislation backed by Street and sponsored by then-Councilman and would-be Mayor Michael Nutter had the potential to make it harder for City Council members to hold outside jobs. Some speculated O’Neill was the target of this because of votes he had cast against what Street wanted earlier that year.
O’Neill is still working as counsel at Fox Rothschild and his work there is some of the most controversial in terms of side jobs council members have, largely because the city has frequently awarded contracts to the firm. O’Neill has said he abstains from any vote with even of the appearance of a conflict of interest.
Cherelle Parker
Represents: District 9 – Parts of North and Northwest Philly
Party: Democrat
Other source of income in 2015: Parker is a freshman City Council member elected last year to represent District 9. She is a former state representative, so her source of income last year was her state salary. State representatives make about $85,000 a year (so you’ll note she got a nice pay bump in switching to local politics). Clearly, she’s no longer receiving this salary.
Mark Squilla
Represents: District 1 – Parts of South Philly east of Broad Street, Pennsport, Old City, Society Hill, Northern Liberties, Fishtown, Kensington and Port Richmond
Party: Democrat
Other source of income in 2015: The only secondary source of income listed on Squilla’s financial disclosure form is the Commonwealth of Pennsylvania. His chief of staff Anne Kelly King said this is his state pension that he receives. The city councilman who was elected in 2011 worked in the state Office of the Auditor General for 25 years prior.
At-large council members
Allan Domb
Represents: Entire city
Party: Democrat
Other source of income in 2015: Allan Domb’s accountant is very, very busy. Most city council members’ financial disclosure forms were a page, maybe two. Domb’s was more than a dozen and he listed every source of income he had last year, down to the unit numbers of the condos he owns. His sources of income included dozens of properties, condominiums, restaurants and firms including Allan Domb Real Estate, AD Mortgage Corporation, Schlesinger’s, Parc Rittenhouse, Pier Five Marina, West Bank Hospitality, Stephen Starr, Starr restaurant organization, Barclay restaurant group, SBI restaurant partners, 1801 Chestnut Associates, the list goes on… and on… and on.
Known as the “Condo King,” Domb was a well-known figure in the city’s real estate and restaurant circles who then spent millions of dollars bankrolling his run to serve as an at-large City Council member. He has vowed to make decisions on Council that are based on what’s best for the city, not his business interests. He’s also donating his entire $130,000 Council salary to the School District of Philadelphia.
Derek Green
Represents: Entire city
Party: Democrat
Other source of income in 2015: Freshman City Councilman Derek Green, a former aide to longtime Councilwoman Marian Tasco, listed two sources of income on his financial disclosure from last year in addition to his city salary. He made some cash last year through investments and also serving as counsel at Obermayer Rebmann Maxwell and Hippel, a law firm with locations in Pennsylvania, New Jersey and Delaware. A spokeswoman for his office said he’s still “Of Counsel” at Obermayer, a designation usually given to an attorney who has a relationship with a lawfirm but isn’t an associate or a partner. His bio on Obermayer’s website says his practice areas include litigation and government relations.
Helen Gym
Represents: Entire city
Party: Democrat
Other source of income in 2015: Gym is a freshman city councilwoman who was elected last year on a platform largely focused on education and children. Prior to being elected to serve on City Council, she was known in the community as a fierce advocate for public education. Last year, she made $9,600 serving as the interim executive director of Asian Americans United, a non-profit. That position ended Jan. 31 last year and she’s not currently employed with the group.
Gym also was paid by the University of Pennsylvania for leading a single class at the school, according to her spokesman. She no longer holds a position at Penn either.
David Oh
Represents: Entire city
Party: Republican
Other source of income in 2015: A lawyer by trade, City Councilman David Oh listed that he was on the payroll last year at Zarwin Baum Devito Kaplan Schaer & Toddy, a lawfirm headquartered in Philadelphia with offices in Pennsylvania and New Jersey. He’s listed as an immigration lawyer at the firm, but Oh said he’s no longer associated with Zarwin Baum and isn’t receiving income from them. He said his relationship with the firm ended at the beginning of 2015. Oh, who was elected to City Council in 2011, led his own firm for the better part of two decades that had merged with Zarwin Baum.
He now has an active license practicing law after there was some controversy that his law license had been suspended because he failed to pay a $200 renewal fee. However, he says he’s not practicing law or working for any entity besides the city.
Blondell Reynolds Brown
Represents: Entire city
Party: Democrat
Other source of income in 2015: The only other source of income for Reynolds Brown, an at-large city councilwoman first elected last year to serve her fifth term on council, is a rental property she owns located on North 33rd Street in West Philadelphia. It’s not clear how much money Reynolds Brown made last year from owning the property.
Al Taubenberger
Represents: Entire city
Party: Republican
Other source of income in 2015: Taubenberger was elected to City Council last year and in 2015 earned incomes from the Philadelphia Parking Authority and the Greater Northeast Philadelphia Chamber of Commerce. He served as the executive director at the Chamber, but is no longer on the payroll there, according to a spokesman. In 2014, he made about $67,000 a year at the Chamber, according to its federal tax forms. Taubenberger was receiving a stipend at the PPA for serving on its board, and while he is still a member of the board at the PPA, he’s doing it on a pro bono basis, the spokesman said. |
Field of the Invention
The invention relates to a linear actuator, and more particularly to a linear actuator improving the offset in a linear movement.
Description of Related Art
With respect to the ACME screw and ball screw transmission, the rotary motion is conversed into linear motion by rotating the nut disposed on the screw. However, the inaccuracy during the conversion may occur due to the process capability, and the tolerances of geometry, size and linearity.
In order to enhance the accuracy, the WO2014092255 patent disclosed a tube holds a positioned linear bearing to support the inner tube and guide the linear motion thereof. In addition, it also disclosed a non-circular restricting unit disposed on the inner tube and reciprocating along the inner tube thereby restricting the rotation between the inner tube and the outer tube.
Although the above conventional technology can provide the support and guide during the linear motion to prevent from unnecessary rotation, the offset compensated by the gap between ball and the ball retainer of the linear bearing is too limited to improve the accuracy during the linear motion. |
The Copenhagen County child cohort: design of a longitudinal study of child mental health.
Epidemiological studies of psychopathology in the first years of life are few, and the association between mental health problems in infancy and psychiatric disturbances later in life has not been systematically investigated. The aim of the present project was to study mental health problems and possibilities of intervention from infancy and onward. The basic study population consists of a birth cohort of 6,090 children born in the year 2000 in the County of Copenhagen, the Copenhagen County Child Cohort, CCCC 2000. At stage one CCCC 2000 was established on data from the Civil Registration System, Danish national registers, and standardized, longitudinal data from the first year of living obtained by public health nurses. At stage two a subsample was assessed at 1(1/2) years of age concerning child psychiatric illness and associated factors in a case-control study nested in the cohort, including a random sample. Participation rate at stage one was 92%. Ongoing studies of CCCC 2000 include studies of failure to thrive, register studies, and studies of the predictive validity of public health screening. A follow-up study concerning the prevalence of psychopathology at age 5 is planned. The Copenhagen County Child Cohort CCCC 2000 is a longitudinal study of mental health from infancy investigating psychopathology in early childhood. Results from this study will add to the knowledge of risk factors and course of mental health problems in childhood and contribute to the validation of the mental health screening made by public health nurses. |
I’m giving you guys the whole late pick 4 at Tampa, however you want to play it. TAMPA R8 HILLSBOROUGH G3 9F TURF 4 2 8 1 11 morning line had good value on the 4 who’s definitely the one to beat, but watch out for dangerous late running from long shots 2 8 and […] |
/******************************* MODULE HEADER *******************************
* writefnt.c
* Function to take a FI_DATA_HEADER structure and write the data to
* the passed in file handle as a font record. This layout is used
* in both minidrivers and the font installer font file.
*
* Copyright (C) 1992 Microsoft Corporation.
*
*****************************************************************************/
#include <precomp.h>
#include <stdio.h>
#include <libproto.h>
#include "fontinst.h"
/******************************* Function Header *****************************
* iWriteFDH
* Write the FI_DATA_HEADER data out to our file. We do the conversion
* from addresses to offsets, and write out any data we find.
*
* RETURNS:
* The number of bytes actually written; -1 for error, 0 for nothing.
*
* HISTORY:
* 16:58 on Thu 05 Mar 1992 -by- Lindsay Harris [lindsayh]
* Based on an experimental version first used in font installer.
*
* 17:11 on Fri 21 Feb 1992 -by- Lindsay Harris [lindsayh]
* First version.
*
*****************************************************************************/
int
iWriteFDH( hFile, pFD )
HANDLE hFile; /* File wherein to place the data */
FI_DATA *pFD; /* Pointer to FM to write out */
{
/*
* Decide how many bytes will be written out. We presume that the
* file pointer is located at the correct position when we are called.
*/
int iSize; /* Evaluate output size */
FI_DATA_HEADER fdh; /* Header written to file */
if( pFD == 0 )
return 0; /* Perhaps only deleting? */
memset( &fdh, 0, sizeof( fdh ) ); /* Zero for convenience */
/*
* Set the miscellaneous flags etc.
*/
fdh.cjThis = sizeof( fdh );
fdh.fCaps = pFD->fCaps;
fdh.wFontType= pFD->wFontType; /* Device Font Type */
fdh.wXRes = pFD->wXRes;
fdh.wYRes = pFD->wYRes;
fdh.sYAdjust = pFD->sYAdjust;
fdh.sYMoved = pFD->sYMoved;
fdh.u.sCTTid = (short)pFD->dsCTT.cBytes;
fdh.dwSelBits = pFD->dwSelBits;
fdh.wPrivateData = pFD->wPrivateData;
iSize = sizeof( fdh ); /* Our header already */
fdh.dwIFIMet = iSize; /* Location of IFIMETRICS */
iSize += pFD->dsIFIMet.cBytes; /* Bytes in struct */
/*
* And there may be a width table too! The pFD values are zero if none.
*/
if( pFD->dsWidthTab.cBytes )
{
fdh.dwWidthTab = iSize;
iSize += pFD->dsWidthTab.cBytes;
}
/*
* Finally are the select/deselect strings.
*/
if( pFD->dsSel.cBytes )
{
fdh.dwCDSelect = iSize;
iSize += pFD->dsSel.cBytes;
}
if( pFD->dsDesel.cBytes )
{
fdh.dwCDDeselect = iSize;
iSize += pFD->dsDesel.cBytes;
}
/*
* There may also be some sort of identification string.
*/
if( pFD->dsIdentStr.cBytes )
{
fdh.dwIdentStr = iSize;
iSize += pFD->dsIdentStr.cBytes;
}
if( pFD->dsETM.cBytes )
{
fdh.dwETM = iSize;
iSize += pFD->dsETM.cBytes;
}
/*
* Sizes all figured out, so write the data!
*/
if( !bWrite( hFile, &fdh, sizeof( fdh ) ) ||
!bWrite( hFile, pFD->dsIFIMet.pvData, pFD->dsIFIMet.cBytes ) ||
!bWrite( hFile, pFD->dsWidthTab.pvData, pFD->dsWidthTab.cBytes ) ||
!bWrite( hFile, pFD->dsSel.pvData, pFD->dsSel.cBytes ) ||
!bWrite( hFile, pFD->dsDesel.pvData, pFD->dsDesel.cBytes ) ||
!bWrite( hFile, pFD->dsIdentStr.pvData, pFD->dsIdentStr.cBytes ) ||
!bWrite( hFile, pFD->dsETM.pvData, pFD->dsETM.cBytes ) )
return -1;
return iSize; /* Number of bytes written */
}
|
Adam Smith's Lost Legacy
GavinK9 AT gmail DOT com
Tuesday, May 30, 2006
Adam Smith's Future in Modern Economics
Most academic economists today would dismiss Adam Smith as a mere ‘literary economist’; many are not sure about the economist bit. Flipping through a copy of the Wealth of Nations, and not finding a single mathematical equation among nearly a million words of text, is enough to dissuade busy students of economics and their adult tutors from making an effort to read beyond the title page and, perhaps, flick through the index. Of course, every economist has heard of Adam Smith, and so have most of the chattering classes that pass for today’s groupie intelligentsia.
Politicians, journalists, tv presenters and lobbyists mention his name regularly and select from one of a few famous, but well-worn, quotations attributed to him to give themselves an air of profundity, especially undeserved when they misuse his name in pursuit of ends, many of which its author never intended and, living in the 18th century, could know nothing about.
A secondary objective of Lost Legacy is to expose as many of these misattributions as possible. It is not my main objective, as it can get repetitive if I try to comment on all of them on a daily basis, and it detracts from my current objective of completing my new book on Adam Smith’s economics and philosophy.
Rather than mainline on the errors of modern commentators, many of them of little consequence because the fads of modern media moguls will pass the same way as yesterday’s gossip, celebrity scandal and today’s newspapers, I would rather concentrate on the few commentators that are of consequence, in scholastic terms, and on the many modern economists whose talents are presently directed towards the fantasy world of abstract mathematics that excludes people by assumption (in the case of growth and development it often excludes technology, even knowledge) and has few lasting policy implications. Beyond the theory of comparative advantage (1818), abstract reasoning has little of permanent value to show for its efforts, though it has created a magnificent world that attracts the best minds in the field, some focussed on hyper-specialist sectors that occupy small portions of its landscape, and few with wider vision, but of no greater long-run relevance.
Adam Smith had much to offer both in terms of scientific method and practical outcomes of his inquiry into the existing 18th century social and economic system. When more modern economists re-examine that legacy, not to mimic its recommendations – the interventions into the Natural Order of the 18th century have been overtaken by modern forms that change almost totally the environment in which the Natural Order is repressed – but to apply the methods of scientific enquiry that Smith excelled in, their contributions may have an impact beyond their current efforts, in which each new school overturns the old, until overturned itself by the next big new thing, with the problems remaining in that unfinished agenda that we know as human society.
The philosopher’s role is not to change the world, but to understand it by doing nothing, but observing everything. The key word here is ‘observe’. Economists in their contributions should ‘look out of their windows’ occasionally. Human societies do not move like planets, nor like molecules or DNA, which movements may be mapped with mathematical precision. The people in societies move, as Smith put it under laws of motions determined by themselves. Ascribing self-interest to humans to develop determinate solutions to their behaviours is ‘not enough’ because the self-interest of individuals is mediated by the need to accommodate their self-interest to those with whom the individuals interact.This takes me to a theme I have worked on for sometime; aspects of it are discussed in ‘Adam Smith’s Lost Legacy’ (Palgrave, 2005) and also on occasion here. Smith correctly identified the common method of mediating differing self-interests of individuals as ‘bargaining’. This phenomenon preceded Smith by millennia; it follows him by centuries through to today. The bargaining process is a niggling problem for modern economics. It has not managed to map it mathematically through all the years of marginal analysis, neo-classical and post-neo-classical analysis.
John Nash claimed to have solved the bargaining problem, but what he solved was the bargaining outcome and not the bargaining process (he eliminated the process by his assumptions). Attempts to solve the latter by economists (Zeuthen, Hicks, etc.,) failed. Hence, the central most common behaviour in markets, organisations, families and societies remains outside the ambit of abstract economics still, after over 200 years since Smith wrote about it. I am interested in why, and what might be the remedies. The answer, whatever it is, will not be found in the arguments of functions, but might be in the arguments of bargainers (of which I have done my fair share of observing).
That is my future agenda for Lost Legacy (with occasional comments on misquoters).
Monday, May 29, 2006
James Hutton, geologist and Friend of Adam Smith
Fordyce Maxwell (the paper’s agricultural correspondent – though that severely underestimates his journalistic savvy, local wit and experience) - reports in The Scotsman (29 may) on more evidence of the slowly reviving public consciousness of Scotland’s finer days during the 18th century Enlightenment. The occasion is the opening up of the James Hutton trail in rural Berwickshire, south of Edinburgh.
Relatively unknown out of Scotland, James Hutton was a founding author of the science of geology. He was the first to write about the age of the Earth being measured in millions of years and not in the ridiculously short space of 6,000 years at that time preached by the Churches on the authority of what they claimed was ‘God’, no less. I believe this date is still believed with passionate intensity by some strains of religion.
James Hutton, largely unnoticed at the time, gave his reasons based on observation of rock formations. He published his Theory of the Earth in 1787; it did not sell well; in fact it is hard to find now, and originals sell for hundreds of pounds the last time I looked for a copy on the web.
So what, I hear you say? Well, James Hutton was also a close friend of Adam Smith, often in his company and often sharing walks in Holyrood Park in Edinburgh, the site of a former volcano (extinct for 5 million years – I hope). Hutton had a house on a nearby ridge. I have been reading about James Hutton recently and discussing his work and his influence on Smith with Norman Butcher, an academic colleague, like me now retired, but also very active intellectually.
Smith had a theory of the history of society and in many places throughout his works reveals an understanding of social evolution quite remarkable given the paucity of information about pre-history in his days. Interesting in this context, Charles Darwin, after completing the Beagle voyage took the time to read ‘Wealth of Nations’ to see what political economists were saying about the past prior to his developing his evolutionary theories based on the scientific evidence he had found in nature during the Beagle voyage, as if to give himself the confidence to pursue the realism of his revolutionary science of natural selection.
James Hutton’s many conversations with Adam Smith are not recorded but given Hutton’s interests, which besides geology included farming and land improvement (he was a gentleman farmer practising what he studied), moral philosophy (he wrote a 3 volume book on the subject which he must have discussed with Smith) and chemistry, were typical of the range of thinkers in the Enlightenment. We know that Smith enjoyed conversations on scientific subjects and both men must have influenced each other’s thinking. So much so, that Smith made James Hutton one of two of his Literary Executors (the other was Joseph Black, the renowned chemist who discovered latent heat).
Extracts from Fordyce Maxwell’s article summarise aspects of Hutton’s scientific persona:“Aubrey Manning, emeritus professor of natural history at Edinburgh University, is an admirer of a man he calls "an intellectual giant".
There has been renewed interest in Hutton in recent years and Manning was speaking at the most recent, the official opening of the James Hutton Trail in the Reiver farm shop close by Slighhouses farm. He was an exponent of the scientific method, said Manning, going solely by the evidence and never beyond, never producing a complicated answer when a simple one would do.The result was his theory, first delivered to the Royal Society of Edinburgh in 1785, which showed how the formation of landscape was an endless cycle of deposition of sedimentary rock, subsequently raised, buckled and broken by immense subterranean upheaval, then worn down by erosion.Such processes would require millions upon millions of years, ca'ing the legs from religious belief in an earth 6,000 years old and counting.If only, that thought again, his attempted written explanations had been easier to grasp, Manning admitted: "He was not the clearest of writers." He produce[d] his, now famous, phrase: "We find no vestige of a beginning - no prospect of an end."But I like to think that his early efforts on a Borders farm, tackling what until recently were still seen as the priorities of ensuring secure field boundaries, good drainage and fertile fields - up to 400 two-horse loads of marl per acre - not only helped shape his thinking, but contributed to a rounded personality.”
Co-authors of Wealth of Nations?
The New Economist Blog (28 May) comments on a piece by Greg Mankiw: “why are co-authors so important?”
“Why are co-authors so important for the way I work? One reason is found in Adam Smith's famous story of the pin factory. Smith observed that the pin factory was so productive because it allowed workers to specialize. Research is no different--it is just another form of production. Doing research takes various skills: identifying questions, developing models, providing theorems, finding data, expositing results. Because few economists excel at all these tasks, collaborating authors can together do things that each author could not do as easily on his own. In manufacturing knowledge, as in manufacturing pins, specialization raises productivity. (The puzzle is why Adam Smith chose to ignore his own analysis and write The Wealth of Nations without the benefit of a co-author.)
"The puzzle is why Adam Smith chose to ignore his own analysis and write The Wealth of Nations without the benefit of a co-author.)"
Research is slightly different from writing a report of a 12 year inquiry into the nature and causes of the wealth of nations. In academic research you are usually working on original data to add to the knowledge base. Here a division of labour between the authors has the advantages you identified.
Smith was working with many 'co-authors' through his use of their earlier works in the forms of the books and pamphlets they wrote and published. Each provided a piece of knowledge that Smith used to mine the knowledge base for the data he needed to develop his own work.Wealth of Nations contains the work of many scores of other authors. Smith did not invent, discover or create the works he used to arrive at his own conclusions. No work of such a scale is the undivided labour of one author.
In a research project, which by design are narrow, limited and non-enclydopedic, the small team of authors, each a specialist in a part if not the whole, there is an active division of labour; in Wealth of Nations the division of labour is passive (many of the authors Smith drew upon were dead, including the hundreds of references to the writings of classical Rome and Greece).A research team too, uses the labours of passive particpants - its mandatory literature review, for example.Hence there is no 'puzzle' about Smith and his lone authorship. Indeed, some (Schumpeter, Rothbard and Rashid) accuse Smith of plagiarism, an unfair and misleading accusation in my view.
Sunday, May 28, 2006
Invisible Hand no 35
For today’s exhibition of ill-informed journalism using Adam Smith in pursuit of a very unSmithian view of the world we have this editorial from The Telegram (‘the people’s paper’) published St John’s, NewFoundland, Canada (28 May)
“Harper follows ‘invisible hand’ policies”:“Second, it shows Harper is prepared to act on beliefs that are very much in tune with philosopher Adam Smith, a Scotsman who died some 216 years before Harper was elected. Smith introduced the phrase “invisible hand” to describe the unseen force unleashed by the free market.Smith believed this “invisible hand” would operate only when each person worked for the benefit of himself, without worrying about anyone else. When everyone focused on improving their own lot, he argued, the whole society ended up benefiting — similar to the economic notion of a rising tide lifting all boats.”CommentWhat a travesty of Adam Smith’s philosophy and political economy that is! No, he did not believe such selfish nonsense (the editorial writer confuses Smith with Bernard Mandeville, 1724: The Fable of the Bees).
Individuals could work for themselves and create a living hell for others. The Enron example ruined thousands o innocent people by their bosses 'improving their lot' without 'worrying about anybody else'. A thief ‘improves his own lot’, so does a polluter, and a rapist. Smith, a Moral Philosopher, never wrote such crass nonsense. It depends upon what the individual does, not the mere fact that he seeks ‘only’ to improve his own lot by ‘benefiting himself’. There is a clear difference. And educated journalists - editors to boot - should know better.
Society may end up benefiting from individuals focusing on improving their own lot, but it depends upon what they are doing. In the single case he discusses in Wealth of Nations (p 456), he is talking about individuals who prefer to invest their scarce money locally and not at a great distance with strangers. This natural concern for the safety of their money had the effect of developing their locality quicker than if they sent their investment elsewhere.
Should they fritter their income away instead of investing it anywhere they may ‘improve their lot’ by living in luxury, frequenting the comforts of taverns, whorehouses and drug dens, this would hold back economic development. Hence, it depends, as always, on the specifics.
Saturday, May 27, 2006
Smith on Morality
Here is a typical sentence from Lawrence Kidlow, an accomplished US columnist, that manages to state convincingly something that is not quite true – and in a real sense is absolutely misleading – yet is half true, but not in the way it is presented:
“A couple hundred years ago, in his "Theory of the Moral Sentiments," Adam Smith contended that capitalism requires a moral and ethical center if it is to function effectively and to the benefit of all.”
My problem with this sentence is that Adam Smith did not write about ‘capitalism’, a system as yet in 1759 when he wrote ‘Moral Sentiments’, based on lecture notes he had delivered in his Edinburgh public lectures from 1748-51 and at the University of Glasgow from 1751. He certainly wrote about morality and how it evolved in human society, and how it was a necessary social habit, under the rule of law, if society was to survive as a harmonious success and not become a vicious failure.
But his insights and his vision (the ‘impartial spectator’, the mediation of conflicting interests, the unintentional petty foibles of humans that worked to stabilise the love of justice that prevented society dissolving ‘into atoms’) were not aimed at any particular social or economic system. True, he saw them at the most advanced in the ‘Age of Commerce’, his ‘Fourth Stage of Society’, but this had nothing specifically to do with a society, the capitalist economy, first mentioned as such in 1854 (Thackery), and not recognisable to an 18th century Moral Philosopher, who, along with his contemporaries, had no notion of what was about to happen some decades after he died in 1790.
Smith’s Moral Sentiments are universal; they apply to all societies; if their bounds are breached then man would enter the company of other men as if entering a lions’ den (Smith took the metaphor from Montesquieu). So by extension, Lawrence Kidlow is right: ‘Moral Sentiments’ applies to our capitalist centuries too, but he is wrong to root that application in the writing of Adam Smith.
He is partly right in the following:
“Indeed, ownership is a self-help virtue, and it is held in much higher cultural esteem than the vice of government-dependant welfarism. This investor culture has at its core the very same ethical foundation that Adam Smith wrote about in 1759.”
The aspect in which I consider him wrong his in his cleavage to separate the investor culture, where morality must obtain if it is to survive – an investor community of cheats, liars and fraudsters would collapse in corruption and its sources of people’s savings would diminish (honesty, trust and the delivery of promises are part of morality), from that part of society which depends upon ‘government-dependent welfarism’.
The same habits of morality must also apply in the operation of state welfarism, if it is to survive (with all its blemishes) without collapsing in expense, mass fraud, cheating and petty thieving. To assert that welfarism is more susceptible to fraud, cheating and crime is overdoing it, when compared to the investor community.
Just as the men of Enron are not typical of the investor community (though their crimes are of a higher magnitude), so are the petty criminals on welfarism. In fact, because those on welfare programmes live check by jowl with a criminal class (drugs, prostitution, household thefts, and so on – the poor are often the worse sufferers from living among thieves) they are often mixed with the morally deviant in the public image.
I think it is in this area that Lawrence Kudlow strays from accuracy in his portrayal of the moral basis of investment (much of what he says I agree with). So when he concludes that “Looking down from his perch in heaven, Adam Smith would be very proud”, I am inclined to believe that Adam would also be frustrated that Mr Kidlow didn’t quite get his main point about the need for morality in any society; but then Adam, by now, must have got used to his successors’ way with his ideas, tending as they do to stretch them beyond the context in which he originally placed them.
Read Lawrence Kidlow’s article at: either Human Events Online: The National Conservative Weekly Washington DC, or National Review Online, New York
Friday, May 26, 2006
If you Dish it Out, You Must also Take It
David Warsh replies (brilliantly) to my comments on his Blog, www.economicprincipals.com. about his new book, Knowledge and the Wealth of Nations. I reproduce it here in the interests of balance. My two longer, rather too robust, pieces are below.
Gavin Kennedy, emeritus professor at Edinburgh’s Heriot-Watt University and blogger at Adam Smith’s Lost Legacy, is upset (May 23 entry) that Knowledge and the Wealth of Nations doesn’t do justice to the subtley of the views of Adam Smith. It most certainly does not. But then that is not what the book is about.
What it is about – how formal methods, mathematics in particular, have enabled economists to move beyond the ambiguities in the work of early literary economists, Smith in particular, to a demonstrably clearer understanding of the world — Kennedy airily dismisses with a wisecrack. “Of the controversies over the maths of competing economic growth theories, I shall say nothing. Like the sex life of a rhinoceros, they are of compelling interest only to other rhinos.”I am more interested than most in Smith’s genius — did he or did he not actually visit a pin factory? — but from the first word of its title on, Knowledge and the Wealth of Nations is about knowledge, meaning all that has been grasped by the human mind, and the effect of its growth on human well-being. The punchline, derived from mathematical economics, is that the economics of knowledge differs profoundly from the economics of things (and, for that matter, of skilled people), in that knowledge is nonrival: it can be copied and used in many different activities and by many different people at the same time.
Thursday, May 25, 2006
Great News for the Truth About Adam Smith
Prospect Magazine, London, UK, June
Iain MacLean interviews Adam Smith in a scene from the University of Glasgow. It is the best short guide to the policies of the real Adam Smith, incomparably more accurate than most of the claims about Smith that appear in the world’s press and which I comment on here regularly.
If the article represents the content of the eagerly awaited (by me anyway) new book from Iain MacLean due out on 22 June, Adam Smith: Radical and Egalitarian, Edinburgh University Press, then the book deserves to do very well.
On the basis of this article, I found little in Iain MacLean's approach with which I disagree. MacLean is spot on dealing with the alleged theory of the Invisible Hand, Laissez-Faire, Capitalism and the boundaries of the State, so often presented misleadingly by many authors (see my review of David Warsh’s recent, readable, but often wrong, new book earlier this week).
What a pleasure to read an account of Adam Smith with which I agree in almost all parts. I especially liked Iain Maclean's elaboration on a theme in my ‘Adam Smith’s Lost Legacy’ (Palgrave 2005) of the real reason why Smith did not complete his 31-year old promise to publish his book on Jurisprudence.
This was due to his prudence that such a book would cause offence to the constitutional monarch in that he was bound to appraise positively the US rebellion and the US Constitution in terms of Liberty; or if he said nothing about it, he would offend his own principles. The need for prudence was occasioned by the unforgiving reaction of the British establishment to acts of, or sympathy for, rebellion. That his prudence was justified in light of the reactions against his Works following the French Terror in 1793 and the judicial investigations into his friends’ conduct.
Iain MacLean advances the idea that Smith would be sympathetic to New Labour in Britain. I will await my reading of his book before commenting on this theme. You can order Iain MacLean’s, Adam Smith: Radical and Egalitarian, from Amazon.
Wednesday, May 24, 2006
Pleasant Thought and Arithmetical Errors
Robert J. Samuelson writes ‘Behind the Birth Dearth’ in the WashingtonPost.com. It is an informative article. It compares birth rates in developed countries, which have fallen below the natural replacement rate of 2.1 children per woman.
An exception is in the USA. However, he gives a curious statistic:
“American fertility is roughly at the replacement rate, 2.1 children per woman. Nor does the U.S. rate merely reflect, as some think, a higher rate among Hispanic Americans. The fertility rate is 1.9 for non-Hispanic whites and about 2 for African Americans, reports demographer Nicholas Eberstadt of the American Enterprise Institute.”
If the fertility rate is 1.9 for non-Hispanic whites and about 2 for African Americans, then some other group(s) of Americans must be greater than 2.1, because by averaging the total of all groups on this basis it must pull the average down to 2.1 and no average of 1.9 and 2 can produce a group average of 2.1. This means some group(s) of Americans is above 2.1, and if it is a minority group (where the total is not divided equally among the three groups mentioned), it must have a average well above 2.1.
Samuelson does not give the fertility rate for Hispanic Americans. Hence, I cannot see why he criticises the notion that the US the 2.1 rate is pulled up by the fertility rate of Hispanic Americans, if they are the missing group. I have no axe to grind about which group pulls the national rate up above 2.1, but there is something wrong with Samuelson’s argument here.
I did like his concluding sentence in his concluding paragraph:“By not having children, people are voting against the future -- their countries' and perhaps their own. It is easy to imagine the sacrifices and disappointments of raising children. It is hard, try as people might, to imagine the intense joys and selfish pleasures.
People ignore Adam Smith's keen insight: "The chief part of human happiness arises from the consciousness of being beloved."
Tuesday, May 23, 2006
Part Two of a Review of 'Knowledge and the Wealth of Nations'
Review of David Warsh, ‘Knowledge and the Wealth of Nations: a story of economic discovery’, Norton & Co. New York, 2006
Part Two
I have now completed the book. It is a good read and will be enjoyed by both specialist economists and general readers alike; the former will know the theories Warsh refers to and the latter can get an idea of the theories from his verbal account of them. It also sparked my interest in re-looking over a few of the theorists’ models of growth from my student days, which says something about its ability to get at least this reader’s attention.
However, my disappointments, as expressed, perhaps a little too brusquely, in Part One after I had read six chapters, are not totally assuaged now that I have reached chapter 27 and the book’s conclusions. Of the controversies over the maths of competing economic growth theories, I shall say nothing. Like the sex life of a rhinoceros they are of compelling interest only to other rhino’s.
David Warsh presents a version of Adam Smith at variance to what Smith wrote about. If his book did not mention Adam Smith at all it would be a good read, but if a reader has read Adam Smith his mentions by Warsh are irritating in the extreme. Consider:
‘Ever since Adam Smith the most important proposition in economics has been the proposition that, left to their own devices, individuals will pursue courses that lead, as if arranged by an Invisible Hand, to the outcome that is “best overall” (Warsh, p 365).
This is just not true in respect of Adam Smith. It may be true as a proposition by modern economists, most of whom never read Adam Smith and take their notions about his work second- and third-hand from their tutors. Smaller point: note how Warsh has slipped in the words ‘as if’ before invisible hand; these were never used by Smith at all (see WN IV.ii.9: p 456).
Warsh continues: ‘Economists have refined Smith’s intuition to a very fine grain. The efficiency of decentralised competitive markets under certain conditions is what Kenneth Arrow and Gerard Debrue demonstrated mathematically in the early 1950s, leading to an eventual Nobel Prize. It was then that economists began to talk of the Invisible Hand theorems as propositions so well established as to have been proved.’
Unpacking the errors in this paragraph is necessary. Arrow and Debrue did ‘demonstrate that decentralised competitive markets’ were ‘efficient under certain conditions’; they did receive a Bank of Sweden Prize in memory of Alfred Nobel; and no doubt many economists did begin to ‘talk of the Invisible Hand theorems’ as being ‘proved’.
But what they did not do was work with ‘Invisible Hand theorems’, Smith’s ‘intuitions’ or ‘prove’ them, because there were no ‘Invisible Hand theorems’ from Smith’s ‘insights’ to ‘prove’. He was not advancing ‘theorems’ about competitive markets when he used the lonely metaphor, the invisible hand, to state a consequence of human motivations on an entirely different subject to ‘competitive markets’. The myth that there were ‘theorems’ of an invisible hand to prove is purely a fiction of modern economics, culled I think from Chicago economists in the 20th century.
Smith never argued the ‘the proposition that, left to their own devices, individuals will pursue courses that lead, as if arranged by an Invisible Hand, to the outcome that is “best overall”. He was talking about relately poor tradesmen who were concerned about the safety of their scarce capital, preferring to use it close by where they were and not to send it out of sight because of the risk (their ‘security’). He was not discussing markets at all (he had already covered markets in Book 1; his single reference to the invisible hand comes in Book IV). He was discussing the consequence in this circumstance of trading locally, where you could see the user and be more assured of being paid, or trading abroad at much greater risk (this was the 18th century) dealing with people you did not know or see. Insecurity inhibited international trade and the 18th and 19th centuries were about devising more secure means of international trade and payments.
On this occasion, if fear and risk drove owners of capital-stock (artisans and tradesmen) to keep their activities close to them, then whatever their intentions and lack of concern for the public good, it would mean that capital accumulation would be aided locally by their individual decisions and not dissipated by spreading it a long way from them.
However, it cannot be generalised into a theorem that any individuals ‘left to their own devices, individuals will pursue courses that lead … to the outcome that is “best overall”. Smith was a Professor of Moral Philosophy, not a naïve reformer of the world. Individuals ‘left to their own devises’ can, and do, act in a manner which most decidedly does not ‘lead … to the outcome that is “best overall”. One has only to think of the Tragedy of the Commons to realise that such a proposition would be absurd, plus pollution, fraud and dangerous products.
Generalising from this, as David Warsh does, leads to a sense of comfort in the maths of ‘perfect competition’, to which I would draw attention to Smith’s comments on ‘The man of system … who imagines he can arrange the different members of a great society with as much ease as the hand arranges the different pieces upon a chess board’ whereas ‘in the great chess board of human society, every single piece has a principle of motion of its own’ (Moral Sentiments,VI.ii.2.18: p 234).
Finally, the Pin factory is not the entirety of Smith on the division of labour. It was a single, ‘trifling’ example ‘often taken notice of’ by others ,to open a discussion on the productive powers of labour (WN I.i.3: pp 14-15). Generalising from this partial point, Warsh and others have seen this as a statement of ‘increasing returns’, which, of course, collides with ‘diminishing returns’, if we conceive them as complete opposites. I should imagine that maths minded economists would be wary here; it depends on where on the curve a factor is at, and nothing is implied about infinite increasing returns.
Smith’s second example is that of the sectors that contribute to the manufacture of a common labour’s woollen coat (WN I.i.11: pp 22-24). These inter-sector linkages are what makes an economy grow, and not just a single item (pins). Economies that consist of many markets (not just one!) are growing towards opulence (here Smith compares the poorest Scottish labourer favourably in opulence to that of an ‘Indian prince’). It is not just the technology or knowledge of the pin makers, but of all labourers and capitals intersecting in ever more complex sets of markets within which growth operates. By aggregating capital and labour factors to look for the causes of economic growth, a big something is missed. That it has taken 200 years to realise this, suggests our science has been a trifle myopic. I found this aspect most interesting in Warsh’s book. I recommend that you read it, contemplate its messages, and, like me when I had finished it, think about what you were doing while the growth controversy was joined by only a few, albeit brilliant, giants who tried to look at the ‘big picture’ but they could not see what was going on around their feet.Visit David Warsh's Blog at www.economicprinciples.comCommentI posted a comment on David Warsh's Blog but either I did it wrong or it was censored. If my rhetoric was a bit abrasive I apologise for any upset this may have caused.
Monday, May 22, 2006
Review of David Warsh's new book
ReviewDavid Warsh. 2006. Knowledge and the Wealth of Nations, W. W. Norton, New York
Part One
While it is better to be approximately right than precisely wrong, it is even better to be precisely right where we can. David Warsh spoils what looks to be a most interesting book by asserting errors as profound facts in the early chapters. I am only up to Chapter 6 and the errors are becoming irritants, saved from my dismissal of the rest of the book only by its engaging style, excellent composition and its story of the economics profession and people in, many of whom were familiar names from my student days and afterwards as the high tide of Keynesian whimpered to an end.
I will press on with it, but feel compelled to post a preliminary comment, with others, perhaps, to follow.
The preliminary summary in two pages (pp 35-6) of Wealth of Nations is masterly. No quarrels there. It may just be presentational, but Chapter Four grates on my sensibilities, ‘The Invisible Hand and the Pin Factory’!
Yes, David Marsh has bought the conventional account of Smithian economics right out of mainstream US academe. He writes ‘you’ll learn further that the book’s publication marked the discovery of the “Invisible Hand” – that is, of the great self-organizing interdependency of prices and quantities that we know today as the price system’ (p 37) and he calls the Invisible Hand and the Pin Factory the ‘bifocals of Adam Smith’.
No, I shall not stop on this occasion to demonstrate the fallacy of this interpretation of the generality of Smith’s lonely use of the metaphor of the invisible hand (from Shakespeare’s Macbeth, 1605, and Defoe’s Moll Flanders, 1722). I have covered this many times on this Blog and elsewhere, so if you are a new reader check through the archives.
I shall press on with a comment that David Marsh and his informants have a narrow view of Smith on the division of labour. The famous Pin Factory was one of two illustrations offered in Wealth of Nations. Warsh correctly notes that Smith took this from ‘an encyclopaedia’. For the record it was Diderot’s and also for the record, Warsh is wrong to assert (p 40) that Smith did not visit a pin manufactory; he did, though not the one Diderot described, and he says so in Wealth of Nations (WN I.i.3, p 15) with details of the work of ‘ten men only’, where ‘some of them consequently performed two or three distinct operations’ of the ‘eighteen distinct operations’ referred to by Diderot.
To insist that Smith didn’t do what he states he did is to assert that he was lying. It is a small point, but indicative of the errors lurking in an account based on secondary sources.
If Warsh, or his sources, had read further they would have come across Smith’s most significant assertion of the source of growth, and with it opulence, namely the ‘multiplication of productions of all the different arts, in consequence of the division of labour’, which he illustrates with the example of the day-labourer’s woollen coat (WN I.i.11: pp 22-4). It is not the intensity of the division of labour in a single product like a pin that is decisive but the extensity of the divisions of labour across entire productive sectors, and eventually across the entire globe, that brings about economic growth and opulence.
Maybe later on in Warsh’s book he and those of whom he reports recognise this important Smithian insight (also noted by others, including Bernard Mandeville, Fable of the Bees, 1724), but I must wait and see.
These errors or omissions pale into insignificance in Warsh’s treatment of the epithet of the ‘dismal science’ applied to economics. Chapter 5 is entitled, ‘How the Dismal Science Got its Name’ but manages to avoid stating the basis for Warsh’s assertion. What it does ionstead is repeat the myths popularised in textbooks and newspaper Op Eds circulating in and from US academe in the 20th century.
Warsh links ‘dismal’ as a contrast with the alleged optimism of Smith (1723-90), Condorcet (1743-1794) and Godwin ( ), and places among the ‘dismal’ proponents of economics the names of Malthus and Ricardo, the former a prisoner of the iron law of exponential and arithmetic series and the latter an exponent of the inevitability diminishing returns to factors. A plausible enough theory bought in its entirely by Warsh, but, alas, so wrong as to be embarrassing. Warsh, an established journalist of 23 years vintage on the Boston Globe, apparently forgot the golden rule of journalism: check your facts and check your checks.
The first uses of the term the ‘dismal science’ came not from the pessimism of Malthus and Ricardo, nor from the restless years of the Napoleonic wars. The ‘joy’ of being ‘alive’ and the ‘heaven’ of being ‘young’ were a prelude to the mood swings of an artist’s disillusion, and not the considered opinions of critics of economics. The accolade, for such as it is, for calling economics the ‘dismal science’ belongs to Thomas Carlyle years later - in the late 1840s to be more precise – and while a charge against economics the substance of the charge had nothing to do with Smith’s, Condorcet’s, or Godwin’s optimism versus Matlhus and Ricardo’s pessimism.
It was caused by Carlyle’s racism and his horror at the idea, suggested by James Stuart Mill’s, that forcing fellow human beings, such as Negro people, into slavery was inhuman and morally wrong. Carlyle reacted to the notion that Negro people were human with horror and disgust, and because economists appeared to endorse the notion that blacks and whites were full members of a common race, the human race, he accused them of expounding an utterly ‘dismal’ philosophy contrary to all civilised values.
The evidence for Carlyle, long after Smith, Condorcet, Godwin, Malthus and Ricardo had died, being the source, the inspiration and the original exponent of economics being the ‘dismal science’ has been discussed before on this Blog (see archives), and the academic evidence for this being case can be found at:
Should David Warsh have known this? This would only be an unfair assertion if he had mentioned it in passing, but his Chapter 5 carries the heading, ‘How the Dismal science Got its Name’, and an experienced journalist is duty bound to check his facts (he could Google ‘dismal science’ and see for himself).
I did note that Warsh assumes or implies Smith had a theory of growth, but so far Warsh speaks as if Smith did not have a ‘stagnation’ scenario, which in fact he did have. In Adam Smith’s Lost Legacy (2205) is discuss Smith’s growth and stagnation hypothesis in detail.
I shall continue reading ‘Knowledge and the Wealth of Nations’ and report back in Pat Two.
APOLOGIES!
I have been cut off from the Internet since Saturday's post by a strange 'logic' in France Telecom.
Grateful for an opportunity to acquire ASDL broadband in rural France, I agreed to pruchase the connections from France Telecom. I was not told that the connection would take place on 1st June, but this is no problem as I can wait a fortnight.
However, France Telecom meanwhile cut off my phone line connection to Wanadoo without telling me, presumably without a concern that I would be without any internt connection until the undisclosed 1st June broadband connection.
It took all Monday morning to discover this and to arrange re-connection. I am used to French adninistrative 'logic' having lived here each summer over the past 17 years, but nothing beats the thinking behind whoever cut me off!
Now its restorted (hopefully). Hence, apologies for the interruption to my posting.
Saturday, May 20, 2006
Galbraith Was Not Like Adam Smith
“Of course my introduction to economics spoiled me because I thought that all economists possessed Professor Galbraith’s gift for language. Such was not the case. Mr. Galbraith was a throwback to classical economists such as Adam Smith and David Ricardo, who combined a facility with language and keen observations of human nature in writing their tomes. Smith, in particular, littered The Wealth of Nations with wry comedic observations (I’m not saying the book is filled with knee-slappers about priests, rabbis, and horses who walk into bars, but there are many passages that should bring a smile).”
CommentI would agree with Mr Dell that Adam Smith “combined a facility with language and keen observations of human nature in writing” his ‘Moral Sentiments’ (1759) and ‘Wealth of Nations’ (1776), but David Ricardo? And Smith had a rhetorical style that was sharp and amusing; I do not remember many such ‘wry comedic observations’ in Ricardo, who is better known for his abstract language and sometimes tortuous syntax.
“The Age of Uncertainty describes itself as “A history of economic ideas and their consequences.” As he describes in the related book’s introduction, the point was to talk about men first, then the institutions that implemented their ideas. One point was, no doubt, to show how far the free market disciples had strayed from the source of their devotion; modern Chambers of Commerce will praise self-interest without understanding what Adam Smith’s true views on self-interest were.”
CommentI think the main problem with Galbraith is that he was wrong on many points; he exaggerated the influence of corporations and seemed to see society as one gigantic conspiracy theory (a theme suggesting that US society is paranoid – the ‘powers that be are not out to get you; they already have managed to do so’).
Smith’s rhetoric and historical method survives and will last. Galbraith, much like Veblen, latched onto a few powerful themes that are already dated. Chomsky is another intellectual in similar vein.
Friday, May 19, 2006
Growl If You Dare
“Stocks continued their weeklong plunge yesterday, selling off again at the end of the day on more inflationary fears. The way to understand this washout -- knocking 4.4% off the Dow -- is that Adam Smith is giving the U.S. financial establishment a warning.We're using our favorite moral philosopher here as a proxy for the ruthless discipline of financial markets. They can be brutal in punishing economic mismanagement, and for several days Mr. Smith has been growling that the Federal Reserve and its easy-money cheerleaders on Wall Street and in Washington need to sober up.”
Comment
Well, that’s journalism for you. If you can annoint an article with a reference to Adam Smith (‘spinning in his grave’ is a common one) you gain credibility of some kind. But it is a nonsense, of course. Modern financial markets are beyond anything that Smith imagined or could have imagined in the 18th century.
He had much to say about profligacy and the fate of those who spent revenue rather than invested it in capital stock to support productive labour to produce real output for local or distant sale. But I cannot imagine him ‘growling’ as a ‘warning’ to individuals about what they choose to do with their own money. He was not an evangilist nor an interferer in people’s behaviour!
Smith observed – the true role of a philosopher – he was not an activist, a capaigner for everybody to do what he felt was the ‘right’ thing to do. Actions had consequences; he pointed some of them out in his ‘Inquiry’, but whether others took note was entirely up to them.
Please read Adam Smith before you quote him in pursuit of your agendas. Otherwise, I’ll growl at you.
Thursday, May 18, 2006
On the Virtues of Immigration
A short post today:
News Item: Additional embarrassment for the government and the Home Office.
Illegal immigration and criminal convictions have been in the news lately. Yesterday, the Home Office official in charge of sending back immigrants who are not in the UK legally, including persons convicted of serious crimes and recommended by the Courts for deportation, admitted to a Select Committee of MPs that his department 'hadn't the faintest idea' how many illegal immigrants are in the country. This honest admission caused 'shock and horror' among the MPs and the tabloids had a great time castigating the government and the officials for not knowing the number.
I find it difficult to understand how any department could answer such a question; if the number of illegals is known it becomes an odd definition of 'illegal' because I would have thought that by definition such a number would be unknown.
If asked how many criminals there are in Britain we could count the number of persons convicted of crimes and announce that figure, though it would vary by when the cut-off date for their convictions was chosen and how many convicted persons had since died. But the number of persons who have committed criminal offences at any one time poses different problems. Many are not caught, many may commit more than one offence and many crimes are not reported.
However, tonight the tv is blasting all over the screen the embarrassing news that five 'illegals' have been arrested who were caught working as cleaners in the Home Office building.
But before we all snigger - or at least just afterwards - I had to ask myself which would I prefer: People who were legally in the UK but behaving criminally, or legals and illegals who were behaving criminally in prostitution slavery, drug trading, enforcement, theft and gangland murders, or illegals working at peaceful low paid jobs cleaning government buildings?
I am increasingly dubious about the rising clamour against 'illegal' immigration, as much as I am broadly in favour of general immigration. I say nothing about the USA situation. But it seems to me that immigration on the whole is a positive social change. Combined with a firm policy of deportation of those who commit crimes (risks of returning them to certain countries should not prevent deportation), are security risks and who are undesireable for their criminal records; a society should welcome people coming here to work and add to the GNP.
Scotland had a credible record on such matters in the 18th century. Slavery was declared illegal in Scotland and a slave who had been brought into the country was set free in 1778. Smith took a stance against slavery. In Moral Sentiments he wrote:
Fortune never exerted more cruelly her empire over mankind, than when she subjected those nations of heroes to the refuse of the jails of Europe, to wretches who possess the virtues neither of the countries which they came from. nor of those which they go to, and whose levity, brutality, and baseness, so justly expose them to the contempt of the vanquished (TMS v.2.9).
Wednesday, May 17, 2006
A Wee Parable for Today's Easy Solutions
“Aren’t economists in a rut? We need a more credible human model than what economic theory has been able to provide.” By Arun Mairi
“While some people were delighted with this apparent change of heart amongst profit-obsessed businessmen, others, like The Economist, were aghast. In an issue focussing on corporate social responsibility, the journal argued that good economics (citing Adam Smith for this, as it often does) requires corporate leaders’ social responsibility be limited to the pursuit of profits for shareholders and nothing else.”“Economists tend to over-simplify their assumptions to enable mathematical modelling. For example, The Economist says, “Measuring profits is fairly straightforward; measuring environmental protection and social justice is not. The difficulty is partly that there is no single yardstick...How is any given success for environmental action to be weighed against any given advance in social justice, or, against any given change in profits? Measuring profits—the good old single bottom line—offers a pretty clear test of business success.”This is sheer intellectual laziness. If Newton had decided to ignore the concept of gravity merely because he did not have the means to measure it, physics could not have developed its power to change man’s world.”
Published in Financial Express, Mumbai, India today.
CommentMakes it sound easy, doesn’t it? Modern economics has gone down a blind alley into abstract mathematics, turning it back on political economy as envisaged by Adam Smith, yet it often justifies this direction by references to Adam Smith and isolated quotations from ‘Wealth of Nations’, shorn of their context.
‘Trading for the public good?’ Waste of time. If the government directed them to do so with a view to growing the domestic economy and not dissipating its energies in distant investments, it would probably fail. Hence, don’t bother. Leave ‘em alone and they’ll bring the bacon home.
Why? Well most of them don’t like to invest their scarce capital stock where they cannot watch over it. It’s called risk and in the early primitive stage of capital accumulation the risks are greatest, the consequences dire if it goes wrong – absolute poverty for those involved. Hence, they are more likely to take smaller risks with their capital-stock where they can watch over it. This itself concentrates capital accumulation, job creation and profit earning locally.
Makes sense doesn’t it? What? Is it different today since Smith wrote the above ideas in 1776? Well of course it is. Small tradesmen and artisans with £5 or £100 of capital have been replaced with multi-million, even multi-billion pound corporations, the rule of law and contracts is so widespread and sophisticated that whole firms of lawyers, accountants, financial and technology specialists abound.
Yes, we need new approaches and I have only mentioned Adam Smith’s ideas on this particular issue because the Economist did so. Whether the Economist’s use of the ideas of Smith suitable for the 18th century are valid in the 21st, that’s another question. But whatever you do, don’t ask a mathematician – they know little about people and less about how real economies work.
Tuesday, May 16, 2006
New Research on the Invisible Hand
On www.mises.org Mark Thornton publishes a thoughtful paper on the uses and abuses of the invisible hand in modern economics, including several top flight professional economics journals recently. It is an extremely interesting paper and should be read widely.Below are some preliminary comments of mine. They are not definitive just yet as I need more time to study Mark's analysis and to think about his theme, including to check over Cantillon's Essai which I have with me in France.Comment (Posted on www.mises.org)"The Invisible Hand was used as a metaphor by Adam Smith in his ‘History of Astronomy’ (1743-48) in mockery of pagan religious beliefs that invisible gods intervened in human affairs (his mockery may also have been a coded sneer at established religion). It was used as a metaphor in ‘Moral Sentiments’ (1759) similarly to mock the pretensions of the rich landowners because in spite of their ‘vileness’ they ended up doing what the poor would have done for themselves, namely fed, clothed and sheltered their families. It was also used as a metaphor in ‘Wealth of Nations’ (1776) to mock the unintentional local wealth creation of people seeking to better themselves amidst private concerns about the risks (the ‘security’) of their capital moving outside their neighbourhood. ‘Distant sale’ represents a slow, gradual and cautious development of trade practice.
In none of these cases did Smith create a theory of markets. Nor did he need to ascribe anything ‘mysterious’ to how markets worked. The source of ‘wonder’ precedes understanding; ‘admiration’ comes from understanding in Smith’s philosophical method. Once the ‘connecting chain’ is identified and understood the philosopher is no longer in ‘awe’.
The metaphor itself long preceded Smith’s first use of it in the 1740s. It can be found, for example, in Shakespeare (Macbeth, 3:2; 1605): ‘thy bloody and invisible hand’, and in Defoe (The Fortunes and Misfortunes of Moll Flanders; 1722): ‘A sudden Blow from an almost invisible hand, blasted all my Happiness’.
I read and much enjoyed your paper and will take some time to study it and its sources. My initial comment is that modern usage of Smith’s metaphor is to take it far too literally, almost to subject it to metamorphosis, well beyond what Smith intended. Smith lectured and wrote in a rhetorical style, common in the 18th century.
While justly exposing the fallacies of the ten interpretations of the invisible hand, I find your painstaking analysis of them terminating in a another fallacy, albeit brilliantly argued from his links to Cantillon’s Essai. You seem to say Smith started using the metaphor in 1749, and again in 1759, both usages suspected as being just ‘metaphors’, but in 1776, after reading Cantillon’s manuscript in French (there have been suggestions that Smith translated it – I am sorry but my references are at my Edinburgh home and not with me here in France), found a real theory of markets to which the metaphor could be applied and that he used it in this sense in Wealth of Nations, though when he did he was not writing about markets!
If you had confined yourself to establishing a source for Smith’s use of Natural and Market prices and the rewards to land, labour and capital stock, you would have done enough. At his moment I think you went too far in trying to invest his casual use of a mere metaphor with deeper meaning.
Despite this preliminary conclusion, congratulations on a well researched paper."
Monday, May 15, 2006
Hernando de Soto Interviewed
“The Poor are the Solution, not the Problem, Hernando de Soto interviewed:
“R&L: And finding this missing thing is the mystery of capital. De Soto: That’s right. What the book tries to convey is that the traditional reforms associated with establishing a capitalist system—monetary stability, fiscal equilibrium, privatization—are definitely not enough. What makes the capitalist system function well in the United States, Western Europe, Japan, and the four Asian tigers is a very good property and transaction legal system. As both Adam Smith and Karl Marx explained, what gives the market economy system its power is essentially the wide-spread division of labor, what we today call specialization. Specialization has been possible in the Western world throughout these last two centuries because of the ability of specialists to create and exchange capital among themselves, and that ability exists because the West has good property law, which allowed for good market transactions. For at least 70 to 80 percent of the world’s population, for former communist nations and developing countries, a legal system allowing for the definition of property rights and their transaction in an orderly market is not in place.
R&L: What is this property and transaction legal system?
De Soto: It is what you in the United States have right under your noses. Every asset, from a bicycle all the way up to a nuclear plant, is essentially titled within the law. Every act inside your legal system is done according to written rules and can be followed within up-to-date records, where transactions, debts, and investments can be tracked. Every company is owned by people represented in its shares. Every home and automobile has a recorded property title or deed, which allows the identification of who owns what and where. All developing and former communist nations, with the exception of maybe 10 to 20 percent of their population, do not have such records or rules.”
Edward Lucas Applies Pure Smithian Good Sense
“CHRISTIAN AID WEEK is rightly a time for warmheartedness. But that is no excuse for softheadedness. It is sloppy thinking, for example, to believe poverty in one place is caused by wealth in another. To share the wealth of the rich world evenly among the poor would temporarily dent poverty, not end it. Redistribution invariably destroys wealth in one place; it rarely creates it in another. The redistributed money would mostly go on short-term consumption or be stolen by corrupt officials. The root cause of poverty, above all injustice, would remain.Hernando de Soto, the Peruvian economist, has shown convincingly how abuse of property rights by the powerful and corrupt prevents subsistence farmers and shantytown dwellers from getting on to the first rung of the wealth-creating ladder. No property rights mean no collateral for loans, no mobility and no investment.
Nelson Mandela said last year in a speech of uncharacteristic foolishness, that “like slavery and apartheid, poverty is not natural. It is man-made.” Actually, poverty is all too natural: not so long ago a nice flint axe and a dry cave was the summit of human material ambition.But, tragically, anti-poverty campaigners in the West have allowed themselves to be conned by the protectionist arguments of rich people in poor countries. The protection of corrupt, incompetent and uncompetitive producers and providers of goods and services in poor countries levies yet another tax on the weakest. Yet the poor above all need the best choice of goods and services at the lowest possible prices.”
Read the article in full at The Times at http://www.timesonline.co.uk/article/0,,6-2180706,00.htmlComment:Edward Lucas speaks pure Smithian market economics, linked to honest government, the rule of law and the protection of property. We should never forget that Smith took a holistic view of society and recognised social malformations (laws that irked the poor, discriminated against women and protected the property only of the rich) stood in the way of the spread of opulence to all classes.
Hernando de Soto, the Peruvian economist, appears to be an economist worth reading too. This is an example of the beauty of the blogosphere: it spreads the word.
Sunday, May 14, 2006
Eamonn Butler, James Buchan and Adam Smith
Eamonn Butler of the Adam Smith Institute (13 May) writes:
“Chancellor leads second kidnap attempt on Adam Smith”
“An unseemly battle is being fought over the soul of Adam Smith. Britain's Chancellor of the Exchequer, Gordon Brown, wants to paint his fellow Kirkcaldy resident as a Scottish socialist, rather than the champion of non-intervention, and has prompted economists and historians to make this case. His enthusiasm has infected James Buchan's new book on Smith; and in a month or two the title of Iain McLean's new volume ('Adam Smith: Radical and Egalitarian') will say it all.There are three arguments. The first is that Smith was no defender of merchants and manufacturers, and in fact distrusted them. Quite right. But then he distrusted governments and regulation too. He thought that people should be able to trade freely, without ministers, officials, or indeed would-be monopolists trying to stop them. It a view that I share: I hate all coercion, either from monopolists or governments. But it hardly makes me a socialist.Second, it is said that Adam Smith did not really say much about the 'invisible hand' and even then it is not an argument for laissez-faire. Quite true. But what Smith actually advocated, as I do, was not laissez-faire but a free, competitive, market economy. Markets need general rules to prevent coercion and preserve competition: while socialist intervention is coercive and destroys competition.The third criticism is that Smith wrote at length on the virtue of human sympathy, which cannot be reconciled with the self-interested nature of capitalism. This reveals the fault in the Brownian thesis: it has not got Smith entirely wrong, but it has got capitalism entirely wrong. If businesspeople really were as amoral as that, our leading industries would be people trafficking and gun running. But most people who run businesses and invest in businesses are ordinary, moral people who might well want to turn a buck – but an honest buck.Smith's famous remark that when businesspeople meet up they invariably start conspiring against the rest of us, is followed by an explanation of what prompts such cartels. In a word, it is regulation. Smith was no critic of fair commerce: but he was a staunch critic of the power of our rulers to pervert it.”
I have no standing with the ASI – a campaigning organisation for competitive markets in place of government sponsored attempts to intervene from the top – though we have parallel concerns in this area and I am broadly sympathetic with much of what ASI stands for. That said, I recognise the significance of ASI’s intervention in the burgeoning dispute between those who misuse Adam Smith for ends he never advanced on both sides of the political spectrum and those whose concerns are broadly to present the facts about Smith, his life and work, in the best traditions of scholarship.
One problem with politically motivated interpretations of Adam Smith’s legacy is that they selectively extract from his life’s writings – more that one and a quarter million words – and apply them to circumstances over two hundred years after they were written and which are so far from the world he knew of as to be almost meaningless.
Gordon Brown is not the first by a long way to have engaged in such antics. People of a more conservative disposition have been doing this to Smith’s legacy since early in the 19th century and the habit is almost rampant in the United States in both political commentary and, sadly, in academe. Smith is presented, laughably, as the ‘High Priest of Capitalism’, a pioneer of ‘laissez faire’, a theorist of the ‘invisible hand’, and advocate of the ‘night watchman state’ and ‘free trade’. Worse, it is asserted, by a ‘Nobel prize winner’, that ‘Wealth of Nations’ is founded on the granite of ‘self-interest’. None of these assertions (Gordon Brown’s included) about Adam Smith are true.
Jacob Viner, a long time ago, expressed it judiciously in his admirable 1928 essay: ‘Traces of every conceivable sort of doctrine are to be found in that most catholic book, and an economist must have peculiar theories indeed who cannot quote from the Wealth of Nations to support his special purposes.’
In this Eamonn is absolutely right: ‘what Smith actually advocated, as I do, was not laissez-faire but a free, competitive, market economy.’ Spot on!
Apologists for government excesses, spinner of lies about the malfeasance of corporate executives caught in nefarious scheme to cheat consumers and investors, and all those who rely on jaded quotations from Wealth of Nations and Theory of Moral Sentiments for their tired (lazy is not too strong a word) attempts to hijack Adam Smith behind their misuse of his legacy for unworthy ends deserve their uncomfortable shelters exposure to the truth.
James Buchan’s new book is an admirable and refreshing account of Adam Smith, his ideas and life. I have not yet seen Ian Mclean’s new book (it’s on order) and pre-publicity suggests, unpromisingly, it will attempt to establish the hypothesis that Smith would support New Labour. I will judge it on its merits. Meanwhile, this blog: (www.lostlegacy.co.uk) shows with what I deal almost daily from a Smithian point of view in respect of the issues Eamonn raises.
“The late Jane Jacobs was a voice of sanity against Big Brother's urban planning. She and Adam Smith were reading from the same page.Jane Jacobs died recently at the age of 89. She ‘was most noted for her 1961 book, "The Death and Life of Great American Cities," which refuted the pretensions of liberal-progressive city planners.
In the works of both Jane Jacobs and Adam Smith, individualistic spontaneity, exercised incrementally, over many generations, is understood to be the wellspring of all of human society's effective and enduring institutions.”
CommentThis last paragraph is an excellent summary of Smith’s approach. Thomas Brewton adds:
“Adam Smith's 1776 "Wealth of Nations" was the first comprehensive inquiry into the realities of economic activity. He observed in the records of thousands of years of history that social institutions bettering the human condition were spontaneous, trial-and-error affairs involving many thousands of individuals in disparate locations, most of whom were unaware of each other and of each other's intentions.
CommentSmith took the long view of events. So should we all. That is why the recent discussion about the Fall of Rome on the Mises Blog is important. One commentator asked why the years after the fall of Rome are known as the Dark Ages – what else would you call a thousand years of social stagnation and barbarism?
But note the point that Thomas Brewton makes about the “spontaneous, trial-and-error affairs involving many thousands of individuals in disparate locations, most of whom were unaware of each other and of each other's intentions.” That exhibits as complete an understanding of Adam Smith’s philosophy as can be crammed into one sentence.
Tim Harford on Adam Smith
Tim Harford who, like Tim Worstall, ‘knows economics and writes well’ – in fact, probably better than just ‘well’ - publishes a review in Friday’s Financial Times of James Buchan’s new book, ‘Adam Smith and the pursuit of perfect liberty’ (Profile Books, May 2006). And an excellent review it is too.The following paragraphs caught my attention:“Buchan’s evident admiration for Smith doesn’t stop him attempting to deflate the idolatry of the philosopher by modern pundits. Scornfully dismissing a paean to Adam Smith by Alan Greenspan, then chairman of the Federal Reserve, Buchan sneers, “One could with better justice claim that Moll Flanders, a resourceful whore in the fiction of Daniel Defoe who also uses the phrase ‘invisible hand’, is another towering contributor to the stability of international markets.”In this, Buchan goes too far. It is true that the phrase “invisible hand” was never used by Smith to refer to the smooth and socially beneficial operation of market forces. And it is also true that the commercial activities he so carefully observed, in marked contrast to the fact-free theorising of some of his followers, were part of the horse-and-cart economy of the 18th century, not the global finances of the 21st.But Smith is unmistakeably a chronicler, theorist and great advocate of the virtues of the market, as Buchan shows. Twenty five years before his most famous work, The Wealth of Nations, was published, Smith argued in a public lecture in Glasgow that “little else is requisite to carry a state to the highest degree of opulence from the lowest barbarism, but peace, easy taxes and a tolerable administration of justice”. Greenspan may have interpreted Smith’s ideas too loosely but he did not imagine some fictional hero.”
CommentTim Harford goes ‘too far’ himself with his polite chastisement of James Buchan for his correct identification of the transformation by Greenspan (who has no excuse being himself an accomplished economist) of Smith’s lone metaphor into a theory of markets. Smith never used the metaphor of the invisible hand as a theory of markets; he did not even use it in a discussion about markets.
This can be seen by anybody who reads the quotation mentioning the invisible hand metaphor in its place in the section of Wealth of Nations (Page 456). Surely, someone preparing an important speech to a distinguished audience, among them many economists of note, would check his references even assuming he was unfamiliar with the quotation – surely a wistful hope in the case of an eminent economist like Alan Greenspan.
That Tim Harford excuses the crass error of Greenspan is surprising; he should be congratulatory of James Buchan for making such a telling point about Moll Flanders, Defoe’s 1722 fictional character (Buchan, p 2, n 2). The invisible hand goes back further to Shakespeare’s Macbeth (3:2) in 1605. Yet it is repeated almost daily as Smith’s theory of markets when Smith was perfectly clear about how markets work without ‘miracles’ or great ‘mysteries’.
It wasn’t that Greenspan imagined ‘some fictional hero’, but that Greenspan imagined some fictional Adam Smith.
Tim Harford’s reference to Smith’s 1755 speech ‘twenty-five years’ earlier that Wealth of Nations (twenty-six actually) and its well-known summary that “little else is requisite to carry a state to the highest degree of opulence from the lowest barbarism, but peace, easy taxes and a tolerable administration of justice’, on which I have commented in the Appendix, The 1755 Paper’, in ‘Adam Smith’s Lost legacy’ (Palgrave 2005), is apposite too. It does not mention markets. Indeed, Smith was of the opinion that if liberty was essential to each country that became opulent there would be few countries developing into opulence anywhere.
I think Smith’s point was that in a state of liberty, countries would develop towards opulence without the regrettable vestiges of oppression so much associated with the ‘rulers of mankind’. The oppressors, war mongers and tax collectors, so common in history were unnecessary for mankind’s well-being and happiness. To which I hope we can all agree.
The Romans and the Greeks did much more than develop a professional army, but I would need to read the original article to be definitive about this. But taking the fall of the Roman Empire in the round, the fact that Europe entered a 1,000 year period which was back at the stage of economic development before the classical Greek and Roman civilisations and largely bereft of the Age of Commerce that they ushered in, suggests that Adam Smith's assessment was correct.
The destruction of the western European economy under the war lords, the great land grab and the almost permanent centuries of warfare between and among local war lords, were not conducive to economic progress. I am not sure we owe very much to the barbarians, whose demise was the appearance of settled fuedalism, almost non-existant trade and thereby local self-sufficiency at a low standard of living ('princes' included), and a curbing of science and technological progress.
Still, I am always willing to study new scenarios. Where can I get a copy of their arguments?
Thursday, May 11, 2006
Apologies - again
The frustration continues.... to the exigences of a 19-hour drive to our place in rural France, I picked up a flu/virus en route from Poland, then found my computer did not connect to the Internet, and having sorted that out from 80-mile round trip, I find that the telephone line runs at 36 bips!
I will need some days to sort this through France Telecom; messages will be rare and short for a few days.
Modern technology is wonderful, when it works. I am working to solve it.
Monday, May 08, 2006
A short intermission
More light blogging for a day or two while I drive to France. I should be active again, once I reconnect, by Wednesday evening or Thursday.
This migration is now an annual event.
There are lots of snippets on Adam Smith studies in my in-tray. The visit to Warsaw, Poland was most interesting and stimulating. But with most of my library packed and the rest in France from last year's migration it is better that I await before developing some of the themes.
Smith's Missing Jurisprudence Work
The comment by James Farrell on Nicholas Gruen’s review of James Buchan’s recent book on Adam Smith questions the failure of Smith to complete what he announced he had set out to do in his ‘Theory of Moral Sentiments’ 1759, namely to write an account of jurisprudence. Now Smith claimed consistently that he was still working on this project for 31 years, right up to his final edition of ‘Wealth of Nations’, sent to his printer only a few months before he died in 1790.
James Farrell, in his comment on Nicholas Gruen’s review presents the conventional account for Smith’s behaviour:
“My only comment is to wonder whether there is really any great mystery about why Smith abandoned the 'third' book (which would have been the second book had fate in the form of Townsend not intervened). I didn't think there was more to it than what John Rae wrote:‘In the preface to the 1790 edition [of TMS, Smith] refers to the promise he had made in that of 1759 of treating in a future work of the general principles of law and government, and of the different revolutions they had undergone in the different ages and periods of society, not only in what concerns justice, but in what concerns policy, revenue, and arms, and whatever else is the object of law; and he says that in the Wealth of Nations he had executed this promise so far as policy, revenue, and arms were concerned, but that the remaining part of the task, the theory of jurisprudence, he had been prevented from executing by the same occupations which had till then prevented him from revising the Theory. He adds: "Though my very advanced age leaves me, I acknowledge, very little expectation of ever being able to execute this great work to my own satisfaction, yet, as I have not altogether abandoned the design, and as I wish still to continue under the obligation of doing what I can, I have allowed the paragraph to remain as it was published more than thirty years ago, when I entertained no doubt of being able to execute everything which it announced.’ ”
Two aspects of Smith’s own explanations for not concluding his promised work on jurisprudence, and of some other works which he claimed at various times to have on the ‘anvil’, raise credible doubts as to the truth merely being completely explained by what he allowed into the public domain.
Over 31 years between his first public announcement and his last is at the very least most strange. He was not suffering from ‘very advanced age’ for all 31 years; he did not have to make public pronouncements of his intentions to remind readers of what was missing; he wrote and delivered the bulk of his intellectual ‘system’ in his Glasgow lectures in 1751-63 (see his ‘Lectures on Jurisprudence, 1762-3; for which he received his doctorate, LL.D) and he worked diligently from 1778-1790, excepting some minor periods of leave while engaged in publishing editions of his two books and advising the UK government on trade policy and, significantly the American war, as a Commissioner of Scottish Customs in Edinburgh, showing anything but indolence or the effects of ‘advanced age’ right up to a few months before he died.
In this respect note that Smith wrote or signed 90 per cent of the over 1,100 pieces of correspondence and reports for the Scottish Commissioners, which allowing for his few absences, means he dealt personally with nearly 100 per cent of their output from 1778-1790.
Hence, there is controversy about his sudden decision not to publish the long awaited third book on Jurisprudence to complete the promised trilogy. My suggested explanation in Adam Smith’s Lost Legacy (2005) is that Smith was too embarrassed politically and personally to publish Jurisprudence. He was noted for his prudence in all matters (for instance, only critiquing by name dead, not those of living, authors).
Reading his lecture notes on Jurisprudence, made by students in 1762-3, on the social-political evolution of constitutional liberty in Britain (mainly England), knowing of his ‘Hanoverian’ affiliations through his father’s role in the 1704-5 shenanigans to unify the parliaments of Scotland and England and of his own predilections that led him to be within the Duke of Argyll’s sphere of interest in those crucial years from which he obtained his education at Glasgow and Oxford, and his chairs at Glasgow University, and knowing from his works of he ‘republican’ sympathies (i.e., ‘democratic’, pro-the lower orders of society and in favour of ‘liberty’), it is not a stretch of conjecture to suggest that the American rebellion posed serious personal problems for Smith.
Wealth of Nations contains material of the ‘recent disturbances’ in the American colonies and he takes a conciliatory line towards the demands of the colonists within a frank discussion of the proper role of colonies in a ‘great Empire’. That is about as far as he could go without causing political repercussions for himself and for others who espoused similar sympathies. In the context of Smith avowal of the benefits of stability in social harmony, amidst the ever present dangers of ‘factions’ and ‘discord’, he faced a dilemma: to support the cause of constitutional liberty in America was disloyal to the Hanoverian King and government; to oppose the same was disloyal to those principles he enunciated to his classes in 1751-63. He chose to remain silent.
As it was just after his death in 1790, from the time Dugald Stewart read his eulogy in 1793, the political atmosphere had swung towards repression under the influence of the French Terror, and many of Smith’s friends were investigated, along with Smith’s books, for signs of sedition and for stirring up discord among the common peoples. Men of lesser social importance were subjected to judicial punishments, including transportation to New South Wales and in a few instances to hanging. If ‘Jurisprudence’ had been published as it was likely to have been written on the basis of his jurisprudence teachings, the ‘close’ inquiries into Smith’s friends, and his own reputation, would have been a lot ‘warmer’ and discomforting than it was when the authorities only had Wealth of Nations and informers’ reports to go on.
When Smith ordered his unfinished manuscripts to be burned he did not know about the students’ notes, which by then were stored among family papers and forgotten. He could assume that the oral tradition was not a threat to him or others, the students having dispersed. Without hard evidence the authorities were powerless to think the worse. A hundred years later in 1896, the first set of students notes surfaced in Scotland (John Rae’s biography was published in 1895) and the second set was discovered in 1958. This changed the game considerably from the effects of natural aging to one of contrived prudence.
Tuesday, May 02, 2006
Temporary Interruption to Lost Legacy Daily Blog
From Wednesday 3 May I am attending a seminar in Warsaw, Poland until Sunday 7 May, when I return to Edinburgh.
I do not know if I will be connected to the net (my laptop with wireless connection is in for repair; I hope it will be fixed by 8 May).
On 9 May I am travelling to France for the next few months. I am connected to Lost Legacy on the net from 10 May on my system at our house there.
Apologies for this interruption to Lost Legacy, which comes at an inconvenient time as in the last week of April Lost Legacy achieved the best number of weekly hits and the largest number of page views since we started in March 2005 (10,000).
As I will be hoping to complete my current project of a volume on Adam Smith for Palgrave's 'Great Thinkers in Economics' series during the next few months in France, I shall have quite a lot to say about Smith's social evolutionary 'system', much of which I hope to share with readers.
I shall also update Smith's bibliography which I first published in 2005 on Lost Legacy. Since then during my current researches I have collected many more titles for the listing.
Apologies for my temporary absence. I hsall make some contributions on my return from Poland on the 7th and 8th May.
Good Advice in Nova Scotia
TO FOLLOW ALL 2083 POSTS
(AND COUNTNG) FROM HERE TO 2012 AND BEYOND, PLEASE USE THE NEW ADDRESS.
THANK YOU
Gavin Kennedy
The ChronicleHerald.ca Halifax Noa Scotia 2 May:
‘Allowing free market to work in Nova Scotia makes a lot of sense’ by Peter Moreira, a St. Margaret’s Bay writer who authored Hemingway on the China Front, which was just published by Potomac Books.”Scotland gave the world not only golf, curling and kilts but also the science of economics. The world’s first economist was Adam Smith, an 18th-century Scottish professor.
I’ve never read Smith’s 1776 treatise, The Wealth of Nations, because, well, it’s pretty long and has lots of big words. But I do know it says nations grow wealthy by encouraging competition and free trade. That way, their goods and services are sold to as large a market as possible, and their consumers pay the lowest price for products.‘‘The price of monopoly is upon every occasion the highest which can be got," wrote the sage of the marketplace 230 years ago. "The natural price, or the price of free competition, on the contrary, is the lowest which can be taken, not upon every occasion, indeed, but for any considerable time together."
Once again, we’re facing the bleak prospect of gasoline regulation for no good economic reason. In fact, according to Adam Smith, the best way to lower the price of gas or anything else is to leave it to the marketplace.
CommentHonest enough to admit he hasn't read Wealth of Nations - too long, big words? - but right about gas regulation, Peter Moreira is different from most people who have read Smith's book. Many of them get it all wrong.
Anyway, nice to see the good folks of Nove Scotia are reading good advice (and without any reference to invisible hands and laissez faire!
Monday, May 01, 2006
For a Bit of Balance
“He will, perhaps, be best remembered for his infamous praise of the Soviet economy in the 1980s. Writing in The New Yorker, he said: "That the Soviet system has made great material progress in recent years is evident both from the statistics and from the general urban scene... One sees it in the appearance of well-being of the people on the streets...Partly, the Russian system succeeds because, in contrast with the Western industrial economies, it makes full use of its manpower." Separately, he said that that standing on the Berlin Wall: "Looking in either direction it really makes no great difference". But by this point Reagan and Thatcher were both in power who recognised the failure of the state command-and-control economic ideas followed in post-war period. The Soviet economy collapsed, and Galbraith was out of fashion.”CommentIt’s always amazing what one cannot see for looking in making sweeping judgements about economies or societies or their politics if you have a certainty about your theory of how the world works. It’s much the same with a lot of anti-Americanism today - only the bits consistent with your world view are seen; the abundant contrary evidence dims in comparison. To lighten this up a bit, stern football fans of a particular team see every slight knock by another team as warranting the referee’s dismissal.
Galbraith in this judgement was woefully wrong, much like Karl Marx, for all his studying of 19th century capitalism and his conclusions that it would collapse under the strain of falling living standards for the already starving workers. But in Galbraith’s case, to err is human, to forgive divine. He did so much more that to make the odd serious mistake hardly condemns his life’s work out of hand. And it is still worth reading to see how economics might be written.
Galbraith in What He had Learned
“I've long been an admirer of Adam Smith, who's greatly praised by conservatives--who unfortunately have never read him. They would be shocked to find some of the things Smith advocates.”
CommentI hope we can all agree with that, though as Jacob Viner put it: ‘Traces of every conceivable sort of doctrine are to be found in that most catholic of book, and an economist must have peculiar theories indeed who cannot quote from the Wealth of Nations in support of his special purposes’ (Laissez Faire, in Adam Smith, 1776-1926: Lectures to commemorate the sesquicentennial of the publication of the Wealth of Nations, 1928. University of Chicago: p 126).
And: “The terrible truth with which we must all contend is that the day may come when nuclear arms fall under the control of some idiot someplace in the world. And that will be the day of reckoning.”
How prescient of Galbraith about what we might face if such a ‘idiot’ were to be walking the planet right now?
Read Galbraith’s short article, first published in 2003 at: http://www.esquire.com/features/learned/060501_mwi_galbraith.html
The One True Republic of Letters
Good writing is associated with both Milton Friedman and John Galbraith and in the aftermath of the death of Galbraith in his 90s, this short essay by Professor Jim Heskett deserves a wide readership. It is an excellent example of how to explain fairly complex ideas to non-economists (and, indeed some economists) without diluting their power with concessions to brutal simplicity.
It also reminds us that the quartet mentioned, of Galbraith, Friedman, Keynes and Smith were each in their own way great explicators of their ideas on how their economies worked. If they wanted to gain and keep the attention of the people who made decisions about the degree of interference in the economy, for good and ill, they had to write clearly (preferably with ‘perspicuity’, as Smith advised his students in his lectures on Rhetoric and Belles Lettres in Edinburgh and Glasgow between 1749-63).
Whatever stance you take on the different policy issues represented by Galbraith and Friedman, I was struck by the anecdotal reference that the “Friedman's occasionally vacationed with the Galbraith's at the latter's Vermont farm, according to biographer Richard Parker” (in John Kenneth Galbraith: His Life, His Politics, His Economics (New York: Farrar, Straus, and Giroux, 2005). As a student I attended a lecture given by Milton Friedman in the late 60s at the University of Strathclyde at the height of controversy about his advocacy of economic policies to deal with inflation and he opened with his greetings to fellow citizens of the ‘Republic of Letters – the one true republic’. I think this defused the tension a great deal, enough at least to guarantee him a hearing from an audience containing among it what can only be described as a ‘hostile ’ minority from the largely leftwing faculty. It was the first time I heard the Republic of Letters invoked, though I have heard it many times since, the notion of the Galbraith’s and the Friedman’s vacationing together in peace and harmony as members of that Republic is a great example of the mutual respect that great minds show towards candidate members of the Republic learning to learn and not to hurl abuse in place of understanding.
Jim Heskett writes:
“With the death of John Kenneth Galbraith on April 29, it is perhaps appropriate to reflect about the influence of two economists, Galbraith and Milton Friedman, described by Time magazine in 1975 as the modern world's most important economists along with Alfred [sic]Keynes and Adam Smith. There were remarkable similarities between them. Both strongly influenced government policy. Both wrote prolifically, and for a broader audience than just theoretical economists. Both, of course, lived to see the age of ninety and then some. And despite their sharply contrasting views of political economics (Friedman regarded Galbraith as a socialist), the Friedman's occasionally vacationed with the Galbraith's at the latter's Vermont farm, according to biographer Richard Parker.Galbraith, in his book The Affluent Society, argued for the importance of fiscal policy in influencing the allocation of resources between rich and poor. This was to be done through the maintenance of a progressive tax system to insure that the wealthy provided their proportionate share of funding to enable government to channel funds to such endeavors as the environment, support for the poor, and the development of the arts. The objective was to create a society that would provide a better standard of living for all.Friedman, on the other hand, in a book Free to Choose, advocated a minimalist role for government, relying instead on lower tax rates to provide the wherewithal for Americans to decide for themselves how they wished to live and spend their increased take-home pay. In another work coauthored with Anna Jacobson Schwartz, The Monetary History of the United States, he had earlier argued, however, for a significant government role in managing monetary policy to guard against the booms and busts that characterized the early part of the twentieth century. According to this thesis, by regulating the supply of money, governments could have an immediate and important impact on such things as interest rates, inflation, and general economic prosperity. “
From: “Who Will Cast a Longer Shadow on the 21st Century: Friedman or Galbraith? by Professor Jim Heskett.
I wonder how many in that audience have since changed their minds of the certainties they held about inflation, Keynesian macro-economics and the perfidious intentions of Milton Friedman? |
---
author:
- |
Marie Hervé$^{1}$, Bertrand Dupé$^{2,3}$, Rafael Lopes$^{4}$, Marie Böttcher$^{2}$, Maximiliano D. Martins$^4$, Timofey Balashov$^{1}$, Lukas Gerhard$^{5}$, Jairo Sinova$^{2,6}$, Wulf Wulfhekel$^{1,5}$\
$^1$Physikalisches Institut, Karlsruhe Institute of Technology, 76131 Karlsruhe, Germany\
$^2$Institut für Physik, Johannes Gutenberg Universität Mainz, D-55099 Mainz, Germany\
$^3$Institute of Theoretical Physics and Astrophysics, University of Kiel, 24098 Kiel, Germany\
$^4$Centro de Desenvolvimento da Tecnologia Nuclear, 31270-901, Belo Horizonte, Brazil\
$^5$Institute of Nanotechnology, Karlsruhe Institute of Technology, 76128 Karlsruhe, Germany\
$^6$Institute of Physics, Academy of Sciences of the Czech Republic, Cukrovarnická 10, 162 53 Praha 6 Czech Republic\
bibliography:
- 'citations2.bib'
title: Stabilizing isolated skyrmions at low magnetic fields exploiting vanishing magnetic anisotropy
---
[**Supplementary material**]{}
As mentioned in previous studies [@growth], interdiffusion between Co and Ru occurs at deposition temperatures above . The STM topography Fig. 1a in the main text shows that for 1.1 Co ML deposited at $\approx$ . the lower step edges of Ru are decorated by islands appearing brighter (higher $dI/dU$) than the Co wetting layer in the $dI/dU$ map. Additional investigations of the density of these islands for different deposition temperatures are displayed in Fig. \[fig\_S1\]. 1.1 Co ML was deposited at (Fig. \[fig\_S1\]a) and (Fig. \[fig\_S1\]b). Increasing the deposition temperature from to leads to an increase of the density of these islands. We interpreted the nature of these islands as an alloying between Co and Ru. Detailed informations will be presented elsewhere.
![ \[fig\_S1\] [**Alloy islands.**]{} $dI/dU$ maps of 1.1 Co ML deposited at (a) and (b). The bright islands decorating the lower step edges are ascribed to an alloy of Co and Ru. The density of these islands increased with deposition temperature ($I$=, $\Delta{U}_{rms}$=, (a) $U$=, (b) $U$=). The pure Co areas show the spin spiral contrast probed with a spin-polarized tip in (a) and a non-spin polarized tip in (b).](S1.pdf){width="7cm"}
[**S2 Magnetic field dependency of the spin polarized contrast**]{}
The periodic stripe pattern shown in Fig. 1c in the main text can be modified by the application of an out-of-plane magnetic field. Moderate positive magnetic fields ($B$=, cf. Fig. \[fig\_S2\]b) lead to an expansion of the bright areas, while negative magnetic fields ($B$=), cf. Fig. \[fig\_S2\]d) lead to the expansion of the dark areas. Decreasing $B$ from to regenerates the balance between dark and bright areas (cf. Fig. \[fig\_S2\]c). This indicates that the observed bright and dark contrast areas are due to a local out-of-plane orientation of magnetization. Note that for the small field used here, the spin-polarization direction of the tip is not affected [@sander].
![\[fig\_S2\] [**Magnetic field dependency of the stripe pattern.**]{} (a) - (d) $dI/dU$ maps of the same area recorded consecutively with an out-of-plane spin-polarized tip at an out-of-plane magnetic field as indicated (400$\times$${}^{2}$, $I$=, $U$=, $\Delta{U}_{rms}$=). (e) $dI/dU$ spectra recorded in the middle of a bright stripe where the local magnetization is parallel to the tip spin polarization (red curve) and in the middle of a dark stripe where the local magnetization is antiparallel to the tip spin polarization (dark curve) ($I$=, $U$=, $\Delta{U}_{rms}$=).](S2.pdf){width="12cm"}
The voltage dependency of the TMR effect presented in Fig. 2a in the main text was obtained from the two curves presented in Fig. \[fig\_S2\]e. $dI/dU$ spectra were recorded by stabilizing the tip at -1.5 V, disabling the feedback and ramping the voltage with the tip located in the middle of a bright stripe (red curve) and in the middle of a dark stripe (dark curve). The relative variation of the $dI/dU$ signal between the spectra measured on the dark and the bright stripe was converted to the voltage dependency of the TMR (Fig. 2a - main text) as: $$TMR=\frac{\frac{d I}{ d U}_{dark}-\frac{d I}{ d U}_{bright}}{\frac{d I}{ d U}_{dark}}.$$
The evolution of the periodic stripe pattern under an out-of-plane magnetic field was recorded with non-spin polarized tip as well. Fig. \[fig\_S3\]a shows a $dI/dU$ map recorded at a bias voltage of on an isolated Co island. The darkest zone in this image corresponds to the bare Ru substrate. The contrast inside the island shows the periodic stripe pattern. Fig.\[fig\_S3\]a to h display half of a magnetization cycle in this isolated Co island. For an out-of-plane magnetic field of (Fig. \[fig\_S3\]c) and (Fig. \[fig\_S3\]h), the magnetization is almost saturated and is aligned parallel with the magnetic field. For both positive and negative magnetic field, an expansion of the bright area is observed. The maximum of the $dI/dU$ signal (bright contrast) corresponds to an out-of-plane magnetization direction (either up or down). An in-plane magnetization gives a minimum of the $dI/dU$ signal (dark contrast). The observed contrast is interpreted as originating from an out-of-plane TAMR effect where the $dI/dU$ varies as a $cos^2$ with the angle formed between the magnetization and an out-of-plane quantization axis [@bode; @vanbergman; @TAMR]. Note that in the saturated magnetic state (Fig. \[fig\_S3\]c and h), dark contrast patches still remain on the island edges. At these locations, the magnetization is twisted. While decreasing the magnetic field toward (Fig. \[fig\_S3\]d and e), the spin spiral state is regenerated.
![\[fig\_S3\] [**Magnetic field dependency of the TAMR contrast.**]{} (a) - (h) $dI/dU$ maps recorded at out-of-plane magnetic fields as indicated. The tip was unpolarized and the spin spiral was probed through TAMR ($I$=, $U$=, $\Delta{U}_{rms}$=). (i) - (k) $dI/dU$ spectra recorded on a bright stripe (red curve - local magnetization out-of-plane) and on a dark stripe (dark curve and local magnetization in-plane) with three different tips ((i): $I$=, $U$=, $\Delta{U}_{rms}$= - (j) and (k): $I$=, $U$=, $\Delta{U}_{rms}$=). (l) Voltage dependency of the TAMR for the three different tips.](S3.pdf){width="10cm"}
The voltage dependency of the TAMR effect presented in Fig. 2a in the main text was obtained from the two curves presented in Fig. \[fig\_S3\]i. $dI/dU$ spectra were recorded with the tip located in the middle of a bright stripe (red curve - out-of-plane magnetization) and in the middle of a dark stripe (dark curve - in-plane magnetization). The relative variation of the $dI/dU$ signal is converted to the voltage dependency of the TAMR effect (Fig. 2a - main text) as: $$TAMR=\frac{\frac{d I}{ d U}_{in-plane}-\frac{d I}{ d U}_{out-of-plane}}{\frac{d I}{ d U}_{in-plane}}.$$
As explained in the main text, an inversion of the TAMR occurs at . Fig. \[fig\_S3\] shows the $dI/dU$ maps at a bias voltage of . In that case, the TAMR is negative, a maximum of the $dI/dU$ signal corresponds to an out-of-plane magnetization, a minimum of the $dI/dU$ amplitude coincide with an in-plane magnetization. In contrast, Fig. 2c (main text) shows the $dI/dU$ map recorded at a bias voltage of . Then, the TAMR is positive and the magnetization pointing out-of-plane correspond to a minimum of the $dI/dU$ amplitude, while in-plane magnetization shows a maximum of the $dI/dU$ signal.
Note that in scanning tunneling spectroscopy measurements, sample and tip LDOS are convoluted. By means of voltage pulses it was possible to change the tip termination and its LDOS. Fig. \[fig\_S3\]j and k display two other kind of $dI/dU$ spectra recorded with two other tip termination. The general shape of the $dI/dU$ spectra is strongly affected by the tip LDOS. However, the TAMR feature (see Fig. \[fig\_S3\]l) remains unchanged.
As indicated in the main text, when ramping down the magnetic field to some magnetic skyrmions remain stable. Fig. \[fig\_S4\]a displays a spin polarized $dI/dU$ map recorded after ramping down the magnetic field from to . Tip was out-of-plane spin-polarized. On one of the narrow terraces (green dotted box) three skyrmions remain. Fig. \[fig\_S4\]b and c show two $dI/dU$ maps of this area recorded after two consecutive changes of the tip spin polarization. In (b), the tip was in-plane spin-polarized. The three skyrmions appear with the same orientation, which confirms that the spin structure is chiral. In (c) the tip was unpolarized and the skyrmions were imaged via the TAMR effect. Note that the top skyrmion of the image merged with a fourth skyrmion in (a). Indeed it is frequently observed that a spin polarized tip in this system interacts with the spin structure. The origin of this interaction is still unclear.
![\[fig\_S4\] [**Metastable skyrmions at zero magnetic field.**]{} $dI/dU$ maps showing remaining skyrmions after ramping down the magnetic field from to . (a) The tip was out-of-plane spin-polarized ($I$=, $U$=, $\Delta{U}_{rms}$=). (b) and (c) were recorded in the area marked in (a) after two consecutive tip changes. The tip was in-plane spin-polarized in (b) and unpolarized in (c) ($I$=, $U$=, $\Delta{U}_{rms}$=).](S4.pdf){width="12cm"}
[**S5 Estimation of T$_{\mathrm{c}}$**]{}
In order to compare the coefficients of our effective atomistic spin model with experiments, we performed Monte Carlo simulation to determine the critical temperature T$_{\mathrm{c}}$ at B=0 T. We have used a standard metropolis Monte Carlo method. To decrease the computational costs, we modeled a slab of Co/Ru(0001) using an asymmetric supercell composed of $200\times10$ magnetic moments along the $\bar{\Gamma}-\bar{M}$ direction. We have used $J_{\mathrm{eff}}=13.1$ meV/Co, $D_{ij}=-0.2$ meV/Co and $K=0.015$ meV/Co. The starting configuration is a ferromagnetic state where the magnetic moments are pointing along the long axis of the slab. We have computed 100 equally spaced temperatures within the range $[$1 K, 650 K$]$. For each temperature, the magnetic moments were first thermalized $2\times10^5$ MC steps. The energy, magnetization densities and the magnetic susceptibility were averaged over $5\times10^6$ MC steps, each of them separated by $2\times10^4$ autocorrelation steps.
![\[fig\_S5\] [**Determination of $T_{\mathrm{c}}$.**]{} (a) Energy density as a function of temperature. The inset shows the specific heat as a function of temperature. The peak of specific heat corresponds to the phase transition between the ordered and disordered phases. (b) Magnetization density as a function of temperature. The magnetization disappears at $T\sim 200$ K. The inset shows the magnetic susceptibility and a lorentzian fit (red line). We extract from the fit $T^M_{\mathrm{c}}=152$ K.](S5.pdf){width="8cm"}
In order to estimate the Curie temperature, we analyse the energy and the magnetization density. We compute the specific heat as:
$$\begin{aligned}
C=\frac{ \left< E^2 \right> - \left< E \right>^2 }{k_{\mathrm{B}}T^2},\end{aligned}$$
where $\left< E \right>$ is the average energy density, $k_{\mathrm{B}}$ is the Boltzmann constant and $T$ is the temperature. We have computed the magnetic susceptibility as:
$$\begin{aligned}
\chi_{M}=\frac{ \left< M^2 \right> - \left< M \right>^2 }{k_{\mathrm{B}}T}.\end{aligned}$$
We have modeled the energy and the magnetization density as arctangent function. We can then fit $C$ and $\chi_M$ with the Lorentzian function:
$$\begin{aligned}
F(T)=F_0+\frac{2I}{\pi} \frac{\sigma}{4 \left( T - T_c \right)^2 + \sigma^2},\end{aligned}$$
where $I$ is the intensity of the peak and $\sigma$ is the mean-height width. All the fits were carried out with a linear background. By fitting of the specific heat, we obtain $T_{\mathrm{c}}=350$ K. This critical temperature corresponds to the transition between the ordered phase to the disordered phase. Ref. [@SPLEEM] reports on the temperature at which the magnetization vanishes i.e. $T^{\mathrm{M}}_{\mathrm{c}}=170$ K. When the susceptibility $\chi_M$ is fitted with the Lorentzian curve, we found $T^{\mathrm{M}}_{\mathrm{c}}=152$ K, in good agreement with the experimental value.
[**S6 Determination of the skyrmion radii**]{}
As indicated in the main text, any stray field of the tip modifies the skyrmion structure or laterally moves it during scanning. Therefore, to determine the dependency of the skyrmion shape with magnetic field (Fig. 5b in the main text), a bare tungsten tip was used to image the skyrmion with the TAMR. In oder to take advantage of the high sensitivity of TAMR to distinguish between in-plane and out-of-plane oriented area, the definition of the skyrmion radius used here defer from the one use in [@Bocdanov-1994aa]. We measured the diameter of the dark ring observed in the TAMR $dI/dU$ maps (inset Fig. 5b - main text). The theoretical radius was obtained on the same way (green dot - Fig. 5b - main text). \[fig\_S6\] show the theoretical skyrmion profiles of the magnetization orientation from the center to the edge for magnetic field from 200 to . The skyrmion radius was determine by calculating the distance between the two opposite in-plane oriented sections i.e. two times the distance to the center represented by the vertical dashed lines.
![\[fig\_S6\] [**Determination of the skyrmion radii.**]{} Magnetization orientation from the center to the edge for magnetic field from 200 to of the calculated skyrmion profiles. Dashed vertical lines correspond to the distance to the center where magnetization is in-plane. This distance is half the skyrmion radius defined throughout this paper.](S6.pdf){width="8.5cm"}
[**S7 Dipole-dipole interaction in Co/Ru(0001)**]{}
We have estimated the strength of the dipole-dipole interaction. The dipole-dipole energy density is given by:
$$\begin{aligned}
E=\frac{\mu_0\mu_s^2}{4 N \pi} \sum_{i,j=1}^N \frac{ \left( \mathbf{m}_i \cdot\mathbf{m}_j \right) r_{ij}^2 -3 \left( \mathbf{m}_i \cdot \mathbf{r}_{ij} \right) \left( \mathbf{m}_j \cdot \mathbf{r}_{ij} \right)}{ r_{ij}^5 },\end{aligned}$$
where $N=\sqrt{3}S/2a^2$ is the number of magnetic moments, $S$ is the surface and $a$ is the lattice parameter ($a=0.27$ nm), $\mu_0$ is the magnetic permeability of vacuum ($\mu_0=5.788.10^{-5}$ eV.T${}^{-1}$), $\mu_s$ is the magnetic moments of Co ($\mu_s=1.8$ $\mu_B$), $\mathbf{m}_i$ the magnetization unit vector at position $\mathbf{r}_i$ and $\mathbf{r}_{ij}= \mathbf{r}_{j} - \mathbf{r}_{i}$. To quantify the energy density originating from the dipole-dipole interaction, we compare the situation where the magnetization points in different direction for a hexagonal domain of size $270 \times 11.7$ nm${}^2$ with closed and open boundary conditions.
We start by calculating the total energy of the spin-spiral which was obtained from our DFT calculations. When the dipole-dipole energy is included, this spin spiral configuration is the ground state. If we consider homogeneously magnetized states, as expected, the out-of-plane magnetized domain is the maximum of energy. The dipole-dipole energy difference between the out-of-planed and the in-planed magnetized domain is $70 \, \mu$eV/Co and $72 \, \mu$eV/Co with open and closed boundary conditions, respectively and favors an in-plane magnetization .
|
Prostate cancer gene 3 urine assay for prostate cancer in Japanese men undergoing prostate biopsy.
To examine the clinical utility of the prostate cancer gene 3 (PCA3) urine test in predicting prostate cancer in Japanese men undergoing prostate biopsy. The study group included 105 men who underwent extended prostate biopsy based on an elevated serum prostate-specific antigen (PSA). In all cases, the patients' race was Asian. Urine specimens were collected after digital rectal examination, and PCA3 score (PCA3/PSA mRNA) was determined in the urine using the APTIMA PCA3 assay. PCA3 score was investigated for a correlation with serum PSA, prostate volume (PV), PSA density and biopsy outcome. All urine samples collected were successfully analyzed (i.e. the informative specimen rate was 100%). Biopsy showed prostate cancer in 38 men (36%). The PCA3 score was not associated with serum PSA nor PV. The median PCA3 score in prostate cancer was significantly higher than that in negative biopsy (59.5 vs 14.2 P<0.0001). The probability of prostate cancer was 69% at a PCA3 score of more than 50 and 5% at a PCA3 score of less than 20. On multivariable logistic regression, PSA density (P<0.05) and PCA3 score (P<0.0001) were the independent predictors for prostate cancer. There was no significant difference in AUC between PCA3 score and PSA density. The combination of PCA3 score and PSA density increased the AUC from 0.72 for PSA alone to 0.88. The specificity of the PCA3 urine assay for prostate cancer was excellent in Japanese men undergoing biopsy. PCA3 score could improve the prediction for prostate cancer and help to better select men who might benefit from prostate biopsy. |
Good morning, this is Richard Parkin bringing you the main stories and must-reads on Friday 7 September.
Top stories
US vice president Mike Pence has denied he was the author of an explosive anonymous op-ed piece attributed to a “a senior official in the Trump administration” that ran in the New York Times on Wednesday and reportedly enraged president Donald Trump. Pence, secretary of state Mike Pompeo, and US ambassador to the UN, Nikki Haley, have all issued public statements denying authorship, while White House press secretary Sarah Sanders has attacked the media’s “wild obsession with the identity of the anonymous coward”. The Washington Post claims Trump’s reaction was “volcanic” anger, with the president tweeting that the Times should hand the person responsible over to the government “for National Security purposes”.
Meanwhile it’s been revealed that a government photographer edited official pictures of Donald Trump’s inauguration to make the crowd appear bigger following a personal intervention from the president. The photographer cropped out empty space “where the crowd ended” for a new set of pictures requested by Trump on the first morning of his presidency, after he was angered by images showing his audience was smaller than Barack Obama’s in 2009.
Burt Reynolds, the star of Deliverance, The Longest Yard and Boogie Nights, has died, aged 82. The actor, who famously turned down the roles of James Bond and Han Solo, was currently working on a film with Quentin Tarantino. Reynolds made his debut in 1961 in Angel Baby, but it wasn’t until Deliverance in 1972 that he burst to prominence. The Longest Yard, Smokey and the Bandit and Boogie Nights were also famous movies for Reynolds, with his depiction of adult film director Jack Horner earning him an Oscar nomination. A Michigan native transplanted to Florida, he was an American football player in his youth, but switched to acting after a knee injury was aggravated by a car accident.
Inequalities in gender pay require more women at the top of economic agencies and in parliament, the shadow assistant treasurer, Andrew Leigh has said. In a speech to the Women in Economics Network in Melbourne today, Leigh will argue part of the reason the gender gap and inequality in the tax system is not being addressed strategically is because women aren’t in sufficiently senior positions such as treasury secretary, Reserve Bank governor, or ACCC boss. “We need to change that,” Leigh will say Friday. “Good policies for women are more likely to emerge when there are more women in the room”.
Russia has come under a sustained barrage of almost universal condemnation as nations lined up at the UN security council in New York to decry its role in the novichok poisonings in the UK. Led by the UK ambassador to the UN, Karen Pierce, a host of governments turned on Moscow. She accused Russia of “playing dice with the lives of the people of Salisbury”. She said: “This is a direct challenge to the rules-based international system,” she said, adding that Moscow worked “in a parallel universe whether the normal rules of international affairs are inverted”. Russia’s ambassador responded by accusing the UK of putting out “repeated lies” about Russia’s development of novichok, and called the British case against the two Russian intelligence officers an “unfounded and mendacious cocktail of facts”.
Australia’s regional authority and influence is being eroded by its refusal to address the threat climate change poses to many of its Pacific neighbours, a leading climate scientist has warned. Australia faced criticism at the Pacific Islands Forum in Nauru on Wednesday for attempting to water down a collective statement on the severity of the threat, with Tuvalu’s prime minister Enele Sopoaga singling out Australia as responsible. “I hear it from Pacific leaders all the time,” said Dr Bill Hare, a former IPCC lead author, “they are fighting to save their countries and their people and they cannot understand why the Australian government leadership can’t see the problems they’ve got.”
Ninety per cent of government staff believe Australia is failing to meet its domestic and international obligations to protect threatened species, a survey of relevant department workers has found. In a submission to a Senate inquiry investigating Australia’s high rate of fauna extinctions, the Community and Public Sector Union survey found that staff “generally thought the government’s performance was poor or very poor”, a finding exacerbated by a reduction in the division’s staffing by almost one-third, following a 25% budget cut in May. Less than 40% of Australian species have a national recovery plan, with those that do “often not utilised to the extent they should be”, the survey concluded.
Sport
Spanish rider Jesús Herrada of Confidis has blown open the Vuelta a España on stage 12 taking the overall leader’s red jersey, after finishing in a breakaway nine minutes ahead of previous leader Simon Yates. The Vuelta now heads into three big mountain stages.
Seven years since an ignominious 186-point loss to Geelong, Melbourne head into an elimination final with the Cats looking an entirely different prospect, writes Jonathan Horn. “The scale of the losses, the haemorrhaging of talent and the all-round awfulness of it all was unprecedented.”
Thinking time
Germaine Greer’s comments in May on the subject of rape attracted worldwide headlines,including the suggestion that the punishment for rape should be reduced. Speaking at a literary festival in Hay, the full nuance to Greer’s statements was yet to come, and it now has in the form of a small book called On Rape. Guardian Australia asked four experts in the field of sexual assault to read and respond to Greer’s essay, and they have, with mixed results.
After the Salisbury novichok attack Nato countries and Australia need to seriously examine their chemical defence capabilities, especially for attacks on urban areas, writes chemical weapons expert Hamish de Bretton-Gordon. “What if the Salisbury attack had taken place in a mega city like Sydney? Let’s say for a start the Central Business District is cordoned and unusable for six months. Millions terrified to go into the city and a 35% reduction in business takings, with millions of tourists avoiding visiting.”
Nike’s ad campaign with NFL player Colin Kaepernick has drawn furious response from many consumers, but is the marriage between a prominent civil rights activist and a corporation a harbinger of 21st-century activism, or a case study in capitalist co-option, ask Ben Carrington and Jules Boykoff? “To be sure, Nike is riding the zeitgeist of athlete activism, not creating it. We’re in the throes of what the scholar-activist Harry Edwards has called a ‘fourth wave of athlete activism’”, they write. “Nike may be amplifying a courageous voice of dissent, but we should also recognise that it’s in its economic interest to do so.”
Media roundup
Several major mastheads, including the Australian, have led with the war of words between Peter Dutton and former Border Force commissioner Roman Quaedvlieg, after Quaedvlieg’s submission to a Senate inquiry that Dutton’s chief of staff contacted him about an au pair’s visa for “the boss’s mate in Brisbane”.
The Age reports that a man in his 40s died on a construction site in Melbourne after a tub of concrete fell from a crane on Thursday, with unions calling for the crane company to cease operation.
And, the Daily Telegraph features insider accounts of the darker side of being a super yacht stewardess, following the death of 20-year-old Sinead McNamara on a super yacht in Greece.
Coming up
A Snap Climate Rally with the slogan Kick Coal Out of Politics will be held in Melbourne tonight as part of the worldwide Rise for Climate protests this weekend.
Nigel Farage will completes his speaking tour of Australia in Melbourne.
Supporting the Guardian
We’d like to acknowledge our generous supporters who enable us to keep reporting on the critical stories. If you value what we do and would like to help, please make a contribution or become a supporter today. Thank you.
Sign up
If you would like to receive the Guardian Australia morning mail to your email inbox every weekday, sign up here. |
Q:
Control push segue button in master/detail template in xcode
Using the master/detail template you get an automatic push segue between master and detail views. How do I access the logic of the returning button (as shown on the left of the upper bar in the detail view)? Before I let the user return to the master, I want to apply some checks regarding the work they did while in the detail view. There must be a method for this button that I can somehow override?? thanks
A:
A couple of days after posting here, I posted the same question on Apple's developer forum
https://developer.apple.com/devforums/
and received a terrific solution. Below is a link to that solution by MVC123.
https://devforums.apple.com/message/910072#910072
|
The Two-Dimensional Arrow of Biological Time
April 27, 2010
The Two-Dimensional Arrow of Biological Time
Biological time is best described by a two-dimensional surface that takes the shape of a second order helix, says a new theory.
It’s tempting to think of time as a linear sequence of events best captured by a straight line, the x-axis on a graph for example. But physicists have never felt constrained by such a definition, on the contrary they’ve never hesitated to mould time to their own ends.
In thermodynamics, for example, the arrow of time comes about because of irreversible phenomena such as phase transitions, bifurcations and chaos. In relativity, space and time are as one, and Minkowski, in his famous formulation, used the idea of a ‘causality cone’ to explain the correlation between physical objects.
In quantum mechanics, the notion of time becomes even more strange. Time is sometimes two-dimensional, sometimes reversible to maintain CPT (charge, parity, time) symmetry and at other times discontinuous and fractal-like.
In short, physicists reformulate time in whatever suits them, or at least in whatever way provides the best predictive or explanatory power.
So why shouldn’t biologists try the same trick? Today, they get their chance thanks to some innovative thinking by Giuseppe Longo at the Ecole Normale Superieure in Paris et deux amis.
Longo and co argue that biological entities require a non-linear formulation of time because their existence is characterised by rhythms and cycles rather than linear processes.
So the team has formulated a notion of time which captures the essential rhythms and cycles of biology.
The idea is to take a standard linear representation of time and to represent a rhythm using a second, perpendicular dimension of time. Being cyclical, this dimension takes the form an angle, represented by a short perpendicular rotating line, like the hand of a clock.
Extra rhythms can simply be added to this perpendicular line. So a circadian rhythm might take close to 24 hours to rotate, while on top of this the rhythms of breathing and heartbeats take just seconds.
The result is that a point in this ‘time-space’ moves along the surface of a kind of two-dimensional helicoid (see picture above). Longo and co call this shape a second order helix.
That’s all very well. The question is what explanatory and predictive powers does this representation bring. How useful is it?
Longo and co say first that it provides a visual representation of the scale of life’s rhythms and periodicities which make comparisons between and within species particularly easy.
They plot, for example, the periodicity of heartbeats during sleep and wakefulness saying that the new representation of biological time makes it easy to distinguish important features at a glance.
They also look at the difference between biological aging and physical aging, showing how biological aging can tend to zero in certain circumstances while physical aging continues unabated, such as during hibernation.
They also raise the question of whether biological aging can go into reverse while physical aging continues, a phenomenon that appears to occur in certain types of stem cells.
Finally, they examine that difference in periodicities between the young and old, suggesting (not entirely convincingly) that this may explain the difference in the perception of time between young and old people ie that time passes slowly for the young and quickly for the old.
So there’s certainly some useful explanatory power in this formulation of biological time–it looks a powerful new way to represent biological data.
Whether it has any predictive power is another question entirely and one that Longo and co must surely be puzzling over.
What they need now is to show that this new approach provides genuinely new insights into the problems of biology and aging, something they don’t quite manage that in this paper. |
Implications of CA3 NMDA and opiate receptors for spatial pattern completion in rats.
Theoretical models of the CA3 suggest that because of its architecture, it mediates spatial pattern completion and working memory processes. The aim of this study was to determine whether with the use of drugs to block neurotransmitter action in CA3 one can separate the operation of these two processes using a visual-spatial pattern completion task for multiple cues. Rats were trained on a cheeseboard apparatus with a black curtain containing four extramaze cues. In the study phase rats removed a black block from one of 15 food wells and then after a 10- or 30-s delay in the test phase they had to return to the food well in the absence of the black block. After reaching criterion performance cannulae were bilaterally implanted into the CA3 of the rats. Rats were then given AP5, naloxone, or phosphate buffered saline (PBS) and following the standard study phase they were given the test phase with 0, 1, 2, 3, or 4 cues removed. The mean degree of error in all drugs and all cue conditions was recorded. Overall spatial inaccuracy was recorded in rats under the AP5 30-s delay condition, whereas deficits were contingent upon the number of cues available under all naloxone conditions. Results show that the blockage of glutamate via AP5 inhibited short-term or working memory, whereas the blockage of mu-opioids via naloxone disrupted visual-spatial pattern completion. |
Tower defense may be the most overpopulated genre on iOS today, but there's good reason for that. They're simple to develop, and although the App Store has plenty of 'em, they're still really fun. To separate themselves from the herd, Backflip Studios is tying theirs into cult-classic film Army of Darkness.
Back in March we reported on the announcement of an officially licensed iPhone game based on the legendary cult-classic Army of Darkness. Today that game arrived in the New Zealand App Store which means there's a very high liklihood the game will be arriving in App Stores around the world in the coming hours. |
Windows 10: Deleted Windows.old, not enough disk space freed
Deleted Windows.old, not enough disk space freed
As the title suggests, only 9 gigabytes of disk space appear to have been freed after deleting roughly 18 gigabytes worth of old Windows files via Windows Disk Cleanup. Since the Windows.old folder still exists even after the cleanup, I decided to check the folder properties to see if the folder still took up some space, but it was completely empty, save for a few empty subfolders that I didn't have permission to delete myself. I tried Disk Cleanup a second time, but it did not give me the option to delete old Windows files. Anybody got an answer for me? Please hurry. My poor SSD is suffering. It needs more games.
My ComputerYou need to have JavaScript enabled so that you can use this ...
Those empty Windows.old folders do not take up any space and if I recall correctly, they will go away eventually. As to the space usage on your SSD you have to be more precise. Best is to post a picture.
My ComputerYou need to have JavaScript enabled so that you can use this ...
As the title suggests, only 9 gigabytes of disk space appear to have been freed after deleting roughly 18 gigabytes worth of old Windows files via Windows Disk Cleanup. Since the Windows.old folder still exists even after the cleanup, I decided to check the folder properties to see if the folder still took up some space, but it was completely empty, save for a few empty subfolders that I didn't have permission to delete myself. I tried Disk Cleanup a second time, but it did not give me the option to delete old Windows files. Anybody got an answer for me? Please hurry. My poor SSD is suffering. It needs more games.
My apologies for the delayed response; I've gotten so tied up this week that I completely forgot to reply. The software distribution folder amounts to only 304 megabytes, so that didn't free up a whole lot of space. As for the command prompt solution, I got an error, as is depicted in the screenshot below.
The fact that I have pending Windows updates awaiting a restart slipped into my head as a possible cause, but I have no basis for this suspicion and am rather uneducated when it comes to using command prompt, so I'll paste the logs from today (the entire log file was quite long, as you might imagine) so that one of you might be able to identify what the problem is.
Hi, I have a Nextpad device that comes with Windows 10 installed on it. I did not yet install any user application on it, and the File Explorer reports that it has about 16G out of a total 28G disk space available. Now Windows Update has found the...
I'm using a storage space for a two-way mirror of two 4Tb drives as D: drive. C: is a completely separate 128Gb SSD, and the page file and TEMP folder are on a second SSD. I set the storage space up initially under Windows 8.1 Pro x64, and it worked...
I have upgraded from Windows 8.1 to Windows 10. Now, my C drive is almost full with 714GB occupied by "System and reserved". I was in an assumption that, Windows 10 was suppose to take less space. Can you please help me in this.
Hi there
To Windows updaters (those who've upgraded rather than done a "Clean install").
This is also especially good if you are using smaller capacity SSD's for your installation or even VM's where you don't want to use too much disk space...
About Us
Windows 10 Forums is an independent web site and has not been authorized,
sponsored, or otherwise approved by Microsoft Corporation.
"Windows 10" and related materials are trademarks of Microsoft Corp. |
Reward, Punishment, and Accountability in 13th-century Diocesan Administration—and What the Modern University Can Tell Us
Michael Burger (bio)
I write about the social history of 13th-century English diocesan administration: how it worked, particularly with regard to the relations between bishops and the bureaucrats who served them. It will help explain my conclusions on the subject to imagine an early 21st-century academic world much like our own. It submits to the same panoply of bureaucrats: department chairs, deans (in a stunning variety), directors of this and that, vice presidents, provosts, chancellors, presidents, and the rest. But, as in 13th-century diocesan administration, all of these figures also hold tenured positions, not in their administrative roles, but as faculty. Indeed, it is their faculty positions that provide their pay, their sole pay.
Thus far, of course, this alternative universe may not seem too alternative; cannibalizing faculty lines to support administrators is hardly unknown, although additional money is customarily superadded to the professorial income. Imagine, however, some further conditions. While a dean may also be a tenured professor of chemistry, her duties to the chemistry department—her teaching, scholarship, even service—are carried out by lower-paid underlings, leaving the dean the vast bulk of the professorial income with none of its obligations. She instead spends all of her time doing whatever it is deans do. This may remind some uncomfortably of graduate-student assistants, but clearly strays beyond the practice of some of our universities into fantasy.
The fantasy grows wilder when one considers that, analogous to the 13th-century diocesan context, our dean may not be simply a tenured professor of chemistry, but also a tenured associate professor of history and a tenured professor of marketing—enjoying the income of all these positions, again with the professorial duties carried out by subordinates while the dean does her Very Important Work. Such a dean, as in our own 21st-century academic universe, might someday "return to faculty." She has security of tenure in these faculty lines; should she cease to be dean—at either her decision or the administration's— she will continue as professor of chemistry, associate professor of history, etc., while retaining her various subordinates to carry out her faculty duties. And, in a feature that most emphatically distinguishes this fantasy and 13th-century diocesan administration from our academic reality, should the dean move to an administrative post at another university, she will keep all her tenured faculty positions at the first, while she may very well add to her collection at the next.
This universe will strike many as a managerial nightmare. An essential element of the discipline of employees in our world is the loss of income or the threat of it. No work, no pay, is the principle on which modern employment is supposed to work. A system where work and pay are decoupled should be a system doomed to fail. Under these circumstances, how can one expect administrators to administer?
Historians sometimes speak of the past as a foreign country, in fact, an alternative universe. The alternative universe I have described is modeled on 13th-century English diocesan bureaucracy. It was an age of burgeoning administration, both secular and ecclesiastical—the start, it has even been said, of a civil service. Historians have long pointed out that the clergy who staffed these administrations were supported by benefices: ecclesiastical endowments, usually churches, that provided the material support that today comes from salary. (The spiritual duties that came with benefices could be carried out by low-paid deputies [often graduate students in our universe]; benefices so managed were the original sinecures.) In this way, it has been argued, bishops, and kings and lords for that matter, transferred the burden of rewarding their administrators from their own resources to those of the Church. Such cost cutting was why beneficeswere the common prize of administrative service. This explanation is a rather bishop/lord/king-centered one, ignoring the perspective of the bureaucrats who received benefices. In fact, I think, the security of tenure offered by benefices—more on this below— meant that bishops gave benefices to assuage demand from their own men, demand that indeed sometimes...
If you would like to authenticate using a different subscribed institution that supports Shibboleth authentication or have your own login and password to Project MUSE, click 'Authenticate'.
Recommend
Additional Information
ISSN
1944-6438
Print ISSN
1941-4188
Pages
pp. 5-6
Launched on MUSE
2012-12-04
Open Access
No
Project MUSE Mission
Project MUSE promotes the creation and dissemination of essential humanities and social science resources through collaboration with libraries, publishers, and scholars worldwide. Forged from a partnership between a university press and a library, Project MUSE is a trusted part of the academic and scholarly community it serves. |
Q:
Javascript changing background color
I tried to change a background color with javascript and it didn't work out, and after lots of trying I didn't find any problem.
var x=1;
switch(x) {
case 1: {
document.getElementsByClassName("gallery").style.backgroundColor="blue";
}
}
I don't see any need to copy html or css to here. If this code is fine though I'll edit and add the other codes.
Edit: Html added, as you requested.
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>פרדס מרים ומרדכי</title>
<link href="../../CSS.css" rel="stylesheet" type="text/css" />
<script language="JavaScript" src="Album1.js" type="text/javascript"></script>
</head>
<body>
<div id="wrapper">
<div id="header"></div>
<div id="menu">
<pre class="menu1"><a class="menu1" href="../../index.html">דף הבית</a> <a class="menu1" href="../../HowToArrive.html">כיצד מגיעים</a> <a class="menu1" href="../../HowItAllBegan.html">איך הכל התחיל</a> <a class="menu1" href="../../Albums.html">אלבומי תמונות</a> <a class="menu1" href="../../Contact.html">צור קשר</a></pre>
</div>
<div id="main">
<div class="gallery_bg">
<div class="gallery"></div>
</div>
</div>
</div>
</body>
</html>
Edit: CSS added. I believe you only need the part referring to the gallery class. The whole code is really long, if you need it I'll add it too, just say.
.gallery {
width:550px;
height:550px;
-webkit-background-size: 550px 550px;
-moz-background-size: 550px 550px;
background-size: 550px 550px;
border:#fff 3px solid;
margin:0 auto;
}
A:
Try this:
document.getElementsByClassName("gallery") returns NodeList , and it is like Array , so you can do:
document.getElementsByClassName("gallery")[0].style.backgroundColor="blue";
Or do it in loop:
var galleries = document.getElementsByClassName("gallery");
var len = galleries.length;
for(var i=0 ; i<len; i++){
galleries[i].style.backgroundColor="blue";
}
|
Q:
Alpha interpolation in a pixel shader
How does the interpolation in a fragment shader work when it comes to the alpha parameter?
I'm programming a shader with SharpDX, DirectX11. My idea is to interpolate 2 3d points of a segment, so that I'll have the position interpolated in between in the pixel shader. But I want to know what happens with the alpha parameter when that position is blocked by another polygon.
For instance, if alpha is 1.0 at the left end of my segment and 0.0 at the other one. What is the value of alpha in the middle, 0.5? Or does it depend on the visibility at that point (meaning it could be, for instance, 1.0 OR 0.0 depending on if that part of the segment is hidden by a poolygon?
A:
Alpha has nothing to do with the depth test. All vertex shader outputs just get interpolated across the pixels, and don't change based on per-pixel visibility. In your example, if an alpha parameter is output from the vertex shader as 0 at one end and 1 at the other end of the rectangle, it will be 0.5 in the center.
|
// PR c++/12883
// Bug: Destructor of array object not called if no prior
// instantiation of the template has happened.
// { dg-do run }
int ret = 1;
template <int> struct X
{
X(int) { }
~X() { ret = 0; }
};
int main()
{
{
X<0> array[] = { 0 };
}
return ret;
}
|
Introduction {#S0001}
============
Colorectal cancer (CRC) is the third most common malignant tumor in the world, with high tumor migration and invasion ability.[@CIT0001],[@CIT0002] In CRC, the development of normal epithelial cells into malignant tumors is considered to be a multi-stage process involving genetic alterations, leading to oncogene activation and tumor suppressor gene inactivation. Although migration and invasion are considered the deadliest features of solid tumors, the potential molecular mechanisms are rarely known. Therefore, it is very important to identify novel molecules with different expression in CRC cells, and it may aid the obtainment of insight into the involved mechanisms.
MicroRNAs (miRNAs) are small noncoding RNAs that are 18--22 nucleotides in length and that regulate gene expression negatively, affecting either mRNA cleavage or the translational inhibition of genes at post-transcriptional level.[@CIT0003] They play vital effects in tumorigenesis and metastasis, regulating gene expression through knockdown of mRNA translation, and also play oncogenic or tumor-suppressive roles according to the regulatory targets.[@CIT0004] Recent reports have indicated that miRNAs play important roles in the occurrence and development of different human cancers.[@CIT0005]--[@CIT0007] miRNA-145 (miR-145), a tumor-suppressive miRNA, is downregulated in several malignancies such as breast cancer, lung cancer, bladder cancer, ovarian cancer, colon cancer, and prostate cancer.[@CIT0008]--[@CIT0013] miR-145 was first found to be downregulated in CRC in 2003, and it is considered a tumor suppressor gene.[@CIT0014] Furthermore, miR-145 can regulate the expression response of a specific set of certain genes to tumorigenesis and metastasis by participating in CRC.[@CIT0014],[@CIT0015] However, the potential molecular mechanism of miR-145 in the progression of CRC is unclear.
TWIST1 (twist family bHLH transcription factor 1), a highly conserved basic helix-loop-helix (bHLH) transcription factor, is represented by a basic DNA-binding region targeting the consensus E-box sequence 5′-CANNTG-3′ and a HLH area.[@CIT0016] Epithelial--mesenchymal transition (EMT) is a new cellular process that is very important for the development of metastatic disease. TWIST1 is considered an inducer of EMT and a basic regulator of cancer metastasis.[@CIT0017],[@CIT0018] TWIST1 promotes cancer metastasis by promoting EMT.[@CIT0019].[@CIT0020] Based on its function as a cell adhesion molecule, the deletion of E-cadherin is considered a prerequisite for EMT to facilitate cancer cell proliferation and metastasis.[@CIT0019] Therefore, regulating the expression of TWIST1 might be a potential target for suppressing CRC cell invasion and migration.
In our present study, we investigated miR-145 and determined its effect on CRC cell invasion and migration. We prove that TWIST1 expression correlated negatively with miR-145 expression in CRC. We also observed that miR-145 overexpression inhibited the cell invasive and migration ability by regulating TWIST1 in CRC cells.
Materials and Methods {#S0002}
=====================
Cell Culture {#S0002-S2001}
------------
Human CRC cells (LOVO, HCT116, HT29) were obtained from American Type Culture Collection (Manassas, VA, USA). LOVO and HT29 cells were maintained in RPMI 1640 medium (Gibco, Grand Island, NY, USA) supplemented with 10% fetal bovine serum (FBS; Gibco) and 1% penicillin/streptomycin (Sigma, St. Louis, MO, USA). The HCT116 cells were cultured in McCoy's 5A medium (Gibco) supplemented with 10% FBS and 1% penicillin/streptomycin (Sigma). All cells were incubated at 37°C in a humidified atmosphere containing 5% CO2.
RNA Oligoribonucleotides and Transfection {#S0002-S2002}
-----------------------------------------
miR-145 mimics, inhibitor, and negative control were synthesized by GenePharma (Shanghai, China). TWIST1 small interfering RNA (siRNA) was purchased from Santa Cruz Biotechnology (Santa Cruz, CA, USA). Lipofectamine 2000 (Invitrogen, Carlsbad, CA, USA) was used to transfect the CRC cells according to the manufacturer's protocol. The oligoribonucleotide sequences were as follows:
miR-145 mimics: 5′-GUCCAGUUUUCCCAGGAAUCCCU-3′ and 5′-GGAUUCCUGGGAAAACUGGACUU-3′; miR-145 inhibitor: 5′-AGGGAUUCCUGGGAAAACUGGAC-3′; negative control: 5′-UUCUCCGAACGUGUCACGUTT-3′ and 5′-ACGUGACACGUUCGGAGAATT-3′.
Wound Healing Assay {#S0002-S2003}
-------------------
The cell migration ability was determined using the wound healing assay. Cells were plated in 6-well plates at 3 × 10^5^ cells/well, and then transfected with miR-145 mimics, inhibitor, or control. Yellow pipette tip was used to create a wound in the cell monolayer. After washing with phosphate-buffered saline, the wound area was photographed under an inverted light microscope (Olympus IX51, Olympus, Center Valley, PA, USA) at 0 h and 48 h. The ratio of residual wound area to initial wound area was calculated and the wound area was quantified by Image-Pro Plus v. 6.0 (Media Cybernetics, Bethesda, MD, USA).
Transwell Invasion Assay {#S0002-S2004}
------------------------
Cell invasion was examined in 24-well Transwell chambers (8 μm; Corning, Inc.). First, we used Matrigel (10 μg/mL; BD Biosciences, San Jose, CA, USA) to cover the reverse side of the upper chambers and the surface was coated with 70 μL Matrigel (1 mg/mL). CRC cells (5 × 10^4^) in 200 μl FBS-free medium were seeded in the upper chamber and 700 μL complete medium (with 10% FBS) was added to the bottom well. After 24-h incubation, cells that had invaded to the lower surfaces were gently cleaned and fixed with methanol for 10 min and stained with 0.1% crystal violet for 10 min. Five random fields were observed from the membrane, and the number of migrated cells was counted under an inverted phase contrast microscope (Olympus; ×40 magnification) and photographed.
Western Blotting {#S0002-S2005}
----------------
The cell proteins were extracted using cell lysis buffer (Cell Signaling Technology, Danvers, MA, USA), after which the protein concentration was determined by a bicinchoninic acid protein assay kit (BCA, Sigma-Aldrich; Merck KGaA). Protein samples (40 μg/lane) were separated by 10% sodium dodecyl sulphate-polyacrylamide gel electrophoresis (SDS-PAGE) and subsequently transferred to polyvinylidene difluoride (PVDF) membranes (Millipore, Billerica, MA, USA). The membranes were blocked with Tris-buffered saline and 0.1% Tween 20 (TBS-T) containing 5% bovine serum albumin, then incubated with primary antibody against E-cadherin, vimentin, and TWIST1 (diluted 1:1000 in TBS-T; Abcam, Cambridge, MA, USA). The membranes were incubated at 4°C overnight. After washing with TBS-T three times, the membranes were incubated with the appropriate horseradish peroxidase--labeled secondary antibody (diluted 1:2000 in TBS-T; Abcam) at 37°C for 2 h. GAPDH was used as the internal control. The proteins were examined using enhanced chemiluminescence reagents (Pierce, Rockford, IL, USA) and the band density was scanned using Image Lab 5.0 (Bio-Rad, Hercules, CA, USA).
Quantitative Real-Time PCR (qRT-PCR) {#S0002-S2006}
------------------------------------
Total RNA was isolated using the TRIzol one-step method (Invitrogen). RNA (1 μg) was used, and complementary DNA (cDNA) was obtained by reverse transcription with a PrimeScript RT reagent kit according to the manufacturer's instructions (Takara Biotechnology, Dalian, China). qPCR was performed on a 7500 Real-Time PCR system (Applied Biosystems, Foster City, CA, USA) using SYBR Premix Ex Taq II kits (Takara Biotechnology) according to the manufacturer's instructions. The U6 RNA level was used as the internal control for miRNAs. Relative expression was calculated using the comparative threshold cycle (2^−ΔΔCt^) method.
Analysis of Lung Metastasis in Nude Mice {#S0002-S2007}
----------------------------------------
pCDH-CMV-luc-P2A-copGFP-T2A-Puro (Hangzhou Shiyu Biotechnology, Hangzhou, China) virus was transfected into a 6-well plate of LOVO cells. Stable strains were screened using 10 μg/mL puromycin, and observed under fluorescence microscopy. The cells were expanded to sufficient amounts, and then transfected with LV-miR-NC, LV-mimics-145, or LV-inhibitor-145. Female BALB/c nu/nu mice (5--6 weeks old) were randomly divided into four groups (n = 8 per group): normal saline, NC (negative control), miR-145, and miR-145 sponge. For lung metastasis analysis, 2 × 10^6^ cells per mouse were injected into the tail vein of each nude mouse. The mice were weighed every other day, and changes in body weight were observed. After 4 weeks, the mice were injected intraperitoneally with D-luciferin. Then, they were anesthetized by isoflurane and photographed in an IVIS imaging system. The lungs were removed and fixed in 10% formalin. Subsequently, consecutive tissue sections were made from each lung block, and stained with hematoxylin--eosin (H&E). The experimental procedures and use of laboratory animals were approved by the Medical Ethics Committee of Tongde Hospital of Zhejiang Province, Hangzhou, China, and conformed to the National Institutes of Health Guide for Care and Use of Laboratory Animals (NIH Publications, No. 8023, revised 1978).
Statistical Analysis {#S0002-S2008}
--------------------
All experimental data are reported as the mean ± standard deviation (n = 3); the data were analyzed using Prism 5 (GraphPad Software, La Jolla, CA, USA). Statistical differences between two groups were detected using the Student's *t*-test; comparisons among multiple groups were performed using one-way analysis of variance, followed by Tukey's post hoc test. *P* \< 0.05 was considered to indicate a statistically significant difference.
Results {#S0003}
=======
miR-145 Regulated CRC Cell Migration and Invasion {#S0003-S2001}
-------------------------------------------------
To explore whether miR-145 affects cell migration and invasion in CRC, we transfected the cells with miR-145 mimics or inhibitor, and then examined them using Transwell invasion and wound healing assays. miR-145 overexpression inhibited CRC cell migration ability, whereas miR-145 inhibitor enhanced it ([Figure 1A](#F0001){ref-type="fig"} and B). The Transwell invasion assay indicated that compared with the negative control, few cells crossed the membrane after miR-145 mimics transfection, but more cells crossed the membrane following miR-145 inhibitor transfection. qRT-PCR determined the interference efficiency of miR-145 following transfected with miR-145 mimic or inhibitor ([Figure 1C](#F0001){ref-type="fig"}). The results confirm that miR-145 can regulate CRC cell migration and invasive ability.Figure 1miR-145 regulated CRC cell invasion and migration. (**A**) Wound healing assay of CRC cell migration capability following transfection with miR-145 mimics or inhibitor compared with negative control (Control). \*\**P* \< 0.01, \*\*\**P* \< 0.001. (**B**) Transwell invasion assay determination of the number of CRC cells that crossed the Matrigel layer after transfection with miR-145 mimics, inhibitor, or negative control (Control). \**P* \< 0.05, \*\*\**P* \< 0.001. (**C**) qRT-PCR detection of miR-145 levels in CRC cells. \*\**P* \< 0.01, \*\*\**P* \< 0.001.
TWIST1 Was A Direct Target Gene of miR-145 {#S0003-S2002}
------------------------------------------
We hypothesized that miR-145 regulates TWIST1. To verify this, we used TargetScan ([[www.targetscan.org](http://www.targetscan.org)]{.ul}) to predict whether *TWIST1* is a target of miR-145 ([Figure 2A](#F0002){ref-type="fig"}), and the results were as we had expected. Next, we examined TWIST1 protein and miR-145 levels using Western blotting and qRT-PCR, respectively, and found that TWIST1 expression correlated negatively with miR-145 expression ([Figure 2B](#F0002){ref-type="fig"} and [C](#F0002){ref-type="fig"}). Then we transfected CRC cells with miR-145 mimics, inhibitor, or negative control and detected TWIST1 protein expression. miR-145 significantly downregulated TWIST1 levels, but the miR-145 inhibitor had the opposite effect ([Figure 2D](#F0002){ref-type="fig"}). These findings suggest that *TWIST1* is a target gene of miR-145 in CRC cells.Figure 2*TWIST1* was a direct target gene of miR-145 in CRC cells. (**A**) TargetScan prediction matching miR-145 to the *TWIST1* 3′UTR. (**B**) Western blot detection of TWIST1 expression. (**C**) qRT-PCR detection of miR-145 and *TWIST1* expression. \**P* \< 0.05, \*\**P* \< 0.01, \*\*\**P* \< 0.001. (**D**) Western blot detection of TWIST1 expression following transfection with miR-145 mimics or inhibitor.
TWIST1 siRNA Reduced CRC Cell Migration and Invasive Capability {#S0003-S2003}
---------------------------------------------------------------
Increasing evidence suggests that TWIST1 is related with cell invasion and metastasis in various tumors, such as pancreatic cancer, ovarian cancer, and non--small cell lung cancer (NSCLC).[@CIT0021]--[@CIT0023] To assess the role of TWIST1 in CRC cells, we transfected CRC cells with TWIST1 siRNA or negative siRNA, and determined the interference efficiency of TWIST1 siRNA using Western blotting ([Figure 3C](#F0003){ref-type="fig"}). The wound healing assay determined that, compared with negative siRNA, TWIST1 knockdown increased cell motility significantly and weakened CRC cell migration ability significantly ([Figure 3A](#F0003){ref-type="fig"}); the Transwell assay demonstrated significantly fewer invaded cells among the cells transfected with TWIST1 siRNA as compared with cells transfected with negative siRNA ([Figure 3B](#F0003){ref-type="fig"}), indicating that inhibiting TWIST1 suppresses CRC cell migration and invasive ability significantly.Figure 3*TWIST1* knockdown reduced CRC cell invasive and migration capability. (**A**) Wound healing assay determining the cell migration ability following transfection with TWIST1 siRNA or negative siRNA. \**P* \< 0.05, \*\*\**P* \< 0.001. (**B**) The Transwell assay showed that the number of invaded cells following transfection with TWIST1 siRNA or negative siRNA. \*\*\**P* \< 0.001. (**C**) TWIST1 expression following transfection with TWIST1 siRNA or negative siRNA. \*\*\**P* \< 0.001.
miR-145 Suppressed CRC Cell Migration and Invasion by Targeting TWIST {#S0003-S2004}
---------------------------------------------------------------------
We demonstrated that miR-145 and TWIST1 can regulate cell invasion and migration and that miR-145 can regulate TWIST1 levels. We hypothesized that miR-145 regulates CRC cell invasion and migration by regulating TWIST1. To prove this, we silenced TWIST1 and then transfected CRC cells with miR-145 mimics or inhibitor. The results showed that there was no significant difference among the three groups, i.e., TWIST1 siRNA only, TWIST1 siRNA+miR-145 mimics, and TWIST1 siRNA+miR-145 inhibitor ([Figure 4A](#F0004){ref-type="fig"} and [B](#F0004){ref-type="fig"}). Western blotting confirmed TWIST1 expression following treatment with TWIST1 siRNA or negative control siRNA ([Figure 4C](#F0004){ref-type="fig"}).Figure 4miR-145 suppressed CRC cell migration and invasion by targeting TWIST1. (**A**) Wound healing assay showing no significant difference among cells transfected with TWIST1 siRNA alone, or with TWIST1 siRNA and miR-145 mimics or miR-145 inhibitor. (**B**) Transwell assay after treatment with TWIST1 siRNA alone, or with TWIST1 siRNA and miR-145 mimics or miR-145 inhibitor. (**C**) Western blot showing the interference efficiency of TWIST1 siRNA. \*\*\**P* \< 0.001.
miR-145 Overexpression Inhibited EMT in CRC Cells {#S0003-S2005}
-------------------------------------------------
Much evidence has indicated that EMT is associated with cell invasive and migration capability in different cancers, including hepatocellular carcinoma, pancreatic cancer, NSCLC, gastric cancer, and colon cancer.[@CIT0024]--[@CIT0028] Here, we found that, compared with negative siRNA transfection, TWIST1 knockdown significantly upregulated E-cadherin expression and downregulated the level of vimentin in the CRC cells ([Figure 5A](#F0005){ref-type="fig"}). Furthermore, we found that miR-145 overexpression increased E-cadherin levels and decreased vimentin expression significantly, whereas miR-145 inhibition had the opposite effect ([Figure 5B](#F0005){ref-type="fig"}).Furthermore, we detected the expression of MMP-9 following transfection with miR-145 mimic or inhibitor in Figure S. These results indicate that miR-145 can regulate E-cadherin and vimentin levels in CRC cells. Figure 5Overexpression of miR-145 inhibited EMT in CRC cells. (**A**) Western blot was used to analyze E-cadherin and vimentin expression following transfection with TWIST1 siRNA, negative siRNA, or control. \**P* \< 0.05, \*\**P* \< 0.01, \*\*\**P* \< 0.001 vs control. (**B**) Western blot determination of E-cadherin and vimentin levels. \**P* \< 0.05, \*\**P* \< 0.01, \*\*\**P* \< 0.001.
miR-145 Regulated Metastasis in vivo {#S0003-S2006}
------------------------------------
To further research the effect of miR-145 on CRC metastasis in vivo, we transfected LOVO cells with pCDH-CMV-LUC-P2A-copGFP-T2A-Puro and later transfected them with NC, miR-145 mimic, or miR-145 inhibitor to obverse lung metastasis in vivo. qRT-PCR determined the transfection efficiency of miR-145 treatment with miR-145 mimic or inhibitor ([Figure 6A](#F0006){ref-type="fig"}). [Figure 6B](#F0006){ref-type="fig"} shows the changes in body weight. Luciferase signals from the lungs of the miR-145 inhibitor group indicated higher metastasis ability compared with that of control group at 4 weeks post-injection ([Figure 6C](#F0006){ref-type="fig"} and [D](#F0006){ref-type="fig"}). H&E staining also showed that the capability for lung metastasis was faster following transfection with miR-145 inhibitor ([Figure 6E](#F0006){ref-type="fig"} and [F](#F0006){ref-type="fig"}). These results were consistent with the in vitro results.Figure 6miR-145 regulated metastasis in vivo. (**A**) miR-145 levels were determined by qRT-PCR. (**B**) The body weight was measured every other day in the different treatment groups. (**C** and **D**) Luciferase expression from intrahepatic tumors of the different treatment groups (normal saline, NC, miR-145, miR-145 sponge). (**E** and **F**) Lung tissues were photographed, fixed, and stained with H&E.
Discussion {#S0004}
==========
miRNAs can regulate 30% of human genes post-transcriptionally, suggesting that they may play a key role in physiological and pathological processes, including even human carcinogenesis.[@CIT0029] Recently, many reports have proven that miRNA expression is closely related to the occurrence, progression, metastasis, and prognosis of CRC.[@CIT0030],[@CIT0031] Accordingly, the identification of CRC-related miRNAs will facilitate understanding of the etiology of CRC and elucidate their biological effects in the diagnosis and prognosis. miR-145 can inhibit the migration and invasive ability in some cancer cells, such as breast cancer cells, glioma stem cells, prostate cancer cells, and NSCLC cells.[@CIT0008],[@CIT0032]--[@CIT0034] In the present study, we prove that miR-145 overexpression inhibited CRC cell invasion and migration, while miR-145 inhibitor had the opposite effect. These findings indicate that miR-145 plays a vital role in regulating CRC cell invasion and migration.
*TWIST1* is a novel oncogene overexpressed in a variety of tumors.[@CIT0035] Its activation inhibits apoptosis and promotes the induction of EMT and proliferation in human cancer cells, which contribute to metastasis.[@CIT0036],[@CIT0037] Much evidence has indicated that some miRNAs, such as miR-186, miR-151-3p, miR-720, miR-548c, miR-33a, and miR-520d-5p, directly regulate TWIST1 in a variety of cancer cells.[@CIT0038]--[@CIT0043] miR-151-3p can repress invasion and metastasis in breast cancer by regulating *TWIST1* expression.[@CIT0039] Here, we explored the role of the molecular mechanism of miR-145. TargetScan identified TWIST1 as a direct functional downstream target of miR-145. Moreover, miR-145 expression was negatively associated with TWIST1 expression. TWIST1 knockdown inhibited CRC cell invasion and migration. To explore whether miR-145 actually suppressed CRC cell migration and invasion by targeting TWIST1, we silenced TWIST1, then transfected CRC cells with miR-145 mimics and inhibitor, found no significant difference in cell migration and invasion compared with that of cells transfected with TWIST1 siRNA alone. These results indicate that the role of miR-145 in inhibiting CRC cell invasion and migration is associated with TWIST1 expression.
EMT is a complex transdifferentiation process that is accompanied by the loss of junctional adhesion and changes in mesenchymal phenotype and morphology, resulting in increased cell invasion and migration.[@CIT0044] EMT activation causes tumor cell invasion and spread, so it is considered the first step of metastasis.[@CIT0044] TWIST1 is a well-known transcription factor in EMT progression. Recently, it was reported that most miRNAs participated in tumor metastasis by targeting important EMT genes.[@CIT0045] Liu et al and You et al have revealed that the overexpression of miR-132 or miR-204 suppresses lung cancer cell migration and invasion by targeting EMT.[@CIT0027],[@CIT0046] miR-145 can also suppress breast cancer cell migration by targeting and inhibiting EMT.[@CIT0008] Furthermore, others have reported that miRNAs can regulate cell invasion and migration by targeting TWIST1 and inhibiting EMT in cancer cells.[@CIT0039],[@CIT0047] In the present study, we determined that miR-145 is involved in cell invasion and migration by regulating TWIST1 and EMT. Western blotting indicated that transfection with miR-145 mimics significantly upregulated the level of E-cadherin and downregulated vimentin expression, compared with the negative control, but the miR-145 inhibitor had the opposite effect. Moreover, the increased expression of matrix metalloproteinases (MMPs) is associated with increased potential for metastasis.[@CIT0048] Therefore, we determined the expression of MMP-9 following transfection with miR-145 mimic or inhibitor, and show that miR-145 mimic downregulated MMP-9, while miR-145 inhibitor upregulated it ([[Figure S1](https://www.dovepress.com/get_supplementary_file.php?f=216147.docx)]{.ul}).
In conclusion, we demonstrate that the overexpression of miR-145 can inhibit CRC cell invasion and migration by targeting TWIST1 and inhibiting EMT. These findings indicate that miR-145 plays an important role in regulating CRC cell invasion and migration.
This study was funded by Zhejiang Basic Public Welfare Research Project (No. LGF18H160033), Zhejiang Provincial Natural Science Foundation of China (No. LQ13H160006), 2019 Jixing Key Discipline of Medicine-Oncology (Supporting Subject; 2019-zc-11), the Medical and Health Science and Technology Project of Zhejiang Province, China (2019KY214), Zhejiang Provincial Ten Thousand Plan for Young Top Talents (2018), Training objects of health innovative talents of Zhejiang Health (2018), Key Project Co-constructed by Zhejiang Province and Ministry (WKJ-ZJ-1916) and Natural Science Foundation of China (81972693, 81972674 and 31900543). Kequn Chai and Wei Chen are co-corresponding authors.
Disclosure {#S0005}
==========
The authors report no conflicts of interest in this work.
|
[Modification of the lipid profile in coronary patients undergoing cardiac rehabilitation].
To assess the effect of continuous and controlled exercise training on the lipid profile of coronary pts. in a cardiac rehabilitation program, we evaluated forty-nine males aged 56.8 +/- 9.6 years, thirty-two with previous surgical myocardial revascularization, two submitted to percutaneous transluminal coronary angioplasty and fifteen on exclusive pharmacological therapy. Patients with changes in drugs that could potentially induce modifications in serum lipid values, were excluded. The values of total cholesterol, triglycerides, HDL-cholesterol, the HDL-cholesterol/total cholesterol ratio, weight and the body mass index at admission of training phase, end of training phase (III)-21 patients (Group I) and maintenance (IV)-28 patients (Group II), were assessed. The training phase (III) had a duration of 3-4 months and maintenance (IV) nine months. In Group I, evaluated at the end of the training period (phase III), there was no significant modification in lipid profile reduction; only 1% and 20% reduction (p = NS) in values of total cholesterol and triglycerides, was detected. The HDL-cholesterol rose 12.5% (p = NS), and the HDL cholesterol/total cholesterol ratio 10.5% (p = NS). In Group II (at the end of the maintenance phase-IV-) there was no important change in total cholesterol levels. The HDL-cholesterol rose 19.5% (p = 0.003) and the HDL-cholesterol/total cholesterol ratio, also increased 33.3% (p < 0.0001). The benefit in relation to triglycerides was restricted to patients with higher values (> 200 mg/dl), where a reduction of 36% (p = 0.004) was found. There was no change in the weight or in body mass index, induced by the program. We concluded that the participation in a cardiac rehabilitation program induces a favourable modification of lipid profile in our population, with potential interest for secondary prevention of coronary heart disease. This change was particularly in serum values of triglycerides, HDL-cholesterol and the ratio HDL-cholesterol/total cholesterol. In what concerns triglycerides, the benefits were seen only in the group of patients with the highest serum values. |
Mount Silliman
Mount Silliman is a mountain in California along the boundary between Sequoia National Park and Kings Canyon National Park The summit, at is on the Sillman Crest, a part of the Kings-Kaweah Divide.
History
The peak was named by members of the Whitney Survey in honor of Benjamin Silliman, professor of chemistry at Yale College. William Brewer, the head of the survey, had studied agricultural chemistry under Silliman. Besides the mountain and crest, there are a pass, a creek, a meadow and a lake that bear the name Sillman.
The first ascent was by Clarence King, James Gardiner, Richard Cotter, and William Brewer on June 28, 1864.
Climb
The summit can be approached by way of the Twin Lakes trail from the Lodgepole Campground on the Generals Highway. From Sillman Pass traverse () to the east ridge and follow it to the summit. There are several more technical routes to the summit which are mostly or more difficult.
Flora
The rare foxtail pine grows directly below Silliman's summit.
See also
Silliman Pass, directly below
Twin Peaks, quite near
References
Category:Mountains of Sequoia National Park
Category:Mountains of Tulare County, California
Category:Mountains of Northern California |
/*
* Copyright (c) 2013, 2018 Oracle and/or its affiliates. All rights reserved.
*
* This program and the accompanying materials are made available under the
* terms of the Eclipse Public License v. 2.0, which is available at
* http://www.eclipse.org/legal/epl-2.0.
*
* This Source Code may also be made available under the following Secondary
* Licenses when the conditions for such availability set forth in the
* Eclipse Public License v. 2.0 are satisfied: GNU General Public License,
* version 2 with the GNU Classpath Exception, which is available at
* https://www.gnu.org/software/classpath/license.html.
*
* SPDX-License-Identifier: EPL-2.0 OR GPL-2.0 WITH Classpath-exception-2.0
*/
package com.sun.enterprise.admin.remote.reader;
import com.sun.enterprise.admin.remote.AdminCommandStateImpl;
import com.sun.enterprise.admin.util.AdminLoggerInfo;
import com.sun.enterprise.util.io.FileUtils;
import java.io.ByteArrayOutputStream;
import java.io.IOException;
import java.io.InputStream;
import java.net.HttpURLConnection;
import java.util.logging.Level;
import java.util.logging.Logger;
import org.codehaus.jettison.json.JSONException;
import org.codehaus.jettison.json.JSONObject;
import org.glassfish.api.admin.AdminCommandState;
/**
*
* @author mmares
*/
public class AdminCommandStateJsonProprietaryReader implements ProprietaryReader<AdminCommandState> {
static class LoggerRef {
private static final Logger logger = AdminLoggerInfo.getLogger();
}
@Override
public boolean isReadable(Class<?> type, String mimetype) {
return type.isAssignableFrom(AdminCommandState.class);
}
public AdminCommandState readFrom(HttpURLConnection urlConnection) throws IOException {
return readFrom(urlConnection.getInputStream(), urlConnection.getContentType());
}
@Override
public AdminCommandState readFrom(final InputStream is, final String contentType) throws IOException {
ByteArrayOutputStream baos = new ByteArrayOutputStream();
FileUtils.copy(is, baos, 0);
String str = baos.toString("UTF-8");
try {
JSONObject json = new JSONObject(str);
return readAdminCommandState(json);
} catch (JSONException ex) {
LoggerRef.logger.log(Level.SEVERE, AdminLoggerInfo.mUnexpectedException, ex);
throw new IOException(ex);
}
}
public static AdminCommandStateImpl readAdminCommandState(JSONObject json) throws JSONException {
String strState = json.optString("state");
AdminCommandState.State state = (strState == null) ? null : AdminCommandState.State.valueOf(strState);
boolean emptyPayload = json.optBoolean("empty-payload", true);
CliActionReport ar = null;
JSONObject jsonReport = json.optJSONObject("action-report");
if (jsonReport != null) {
ar = new CliActionReport();
ActionReportJsonProprietaryReader.fillActionReport(ar, jsonReport);
}
String id = json.optString("id");
return new AdminCommandStateImpl(state, ar, emptyPayload, id);
}
}
|
‘In many respects the international financial system is stronger than in 1997-98. But in one crucial aspect – the overall strength of the world economy – it is weaker.’
So wrote Ed Crooks and Thomas Catan in the Financial Times (17 July) amid a brief panic in financial circles that Argentina would default on its debts.
Their apparently contradictory statement expressed the anxieties now felt by many mainstream economists.
Four years ago a financial storm started in Thailand which spread to batter down the east Asian, Russian and Latin American economies. But the high priests of the system managed to declare that it was just a temporary squall, since ‘only’ about a third of the world was pushed into slump by it. I remember a former adviser to Thatcher (Patrick Minford) and a former adviser to Gordon Brown (Meghnad Desai) both telling me when I debated with them that Alan Greenspan, head of the US Federal Reserve, had been able to keep it under control simply by lowering interest rates a little.
That storm was not simply financial. It was caused by the way in which east Asian firms rushed to produce things in competition with each other in export markets without paying any regard to the limits of the market. Carried away by this apparent success, financial institutions then poured money into those countries, causing a classic ‘bubble’ – which was then pricked by a sudden fall in the value of the Thai currency.
The impact of the storm on the advanced industrial countries was, however, mainly financial. Institutions which had placed their bets on the east Asian, Russian and Latin American currencies and stock markets lost out. In the process the near collapse of the hedge fund Long Term Capital Management (LTCM) threatened to bring chaos to New York, London and Frankfurt as well as Bangkok, Seoul, Moscow and Buenos Aires. But Alan Greenspan forgot all the rhetoric about free markets as he organised a bail out for LTCM, while the IMF applied the pressure necessary to protect the interest repayments of western moneylenders.
US capitalism was able to go on booming through the turbulence as if nothing had happened. Falling prices for goods from east Asia like electrical equipment and clothing held back inflationary pressures elsewhere. And funds which might have gone to the ‘emerging economies’ poured into US stock markets, the most likely place to yield a quick profit.
So hardly had the mythology about the Asian Tigers collapsed than it was replaced by the mythology of a ‘new paradigm’ ensuring endless crisis-free growth for the US economy. The new technologies associated with the silicon chip, it was claimed, were producing massive advances in productivity which ensured rising profits.
In fact, as I pointed out in Socialist Review while the ‘new paradigm’ was still all the rage, the rising profits were a result of a very old fashioned increase in the rate of exploitation of American workers, despite an increase in the working year of over 160 hours – a month – per worker. But even these profits were still lower then in the long boom of the 1960s, and certainly not enough to justify the high level of US stock markets, which were reaching levels twice as high as they should have been on the basis of company profitability. American investors were simply betting on profits continuing to rise as they had in the past, without any justification for their actions except that other investors were making the same bet.
There was a get rich quick mood of sheer exuberance which led investors – and the economics professors who turn their prejudices into complicated mathematical formulae – to pretend that what had happened in Asia was of no account. Against that background, companies continued to promise higher profits, and funds continued to pour into the US from everywhere else in the world, allowing it to consume 5 percent more than it produced last year.
In fact, it now seems that at the time of the Asian crisis the real profits of US companies were already in decline. The Economist (23 June 2001) reports,
‘Spectacular growth in profits during the 1990s was partly due to dodgy accounting ... According to Bob Barbera of Hoenig, an investment bank, the stated operating profits of S&P 500 companies rose at a much faster rate than profits measured in the national accounts ... Thus, in the 1990s, profits at S&P 500 companies tripled, but profits recorded in the national accounts merely doubled.’
Firms could get away with this pretence so long as share prices seemed to provide investors with magical capital gains. But the moment anything, however little, upset the upward spiral, disaster was bound to threaten.
The little something was the collapse of the outrageously hyped e-commerce companies, which had risen higher than anything else during the first months of 2000, only to collapse towards the end of the year. Few mainstream commentators recognised what their demise portended. Then just before Xmas it became clear that mainstream new technology companies were also in trouble, and a few people noted that firms like General Motors were not doing very well either. Even so, quarter or half percent cuts in interest rates by Greenspan were enough to restore many capitalist spirits.
Today the overall picture is much harsher. The Economist, which opposed Greenspan’s attempts to boost the US economy at the turn of the year as potentially inflationary, now warns, ‘The world economy is starting to look remarkably, even dangerously, vulnerable.’ The US may have already stumbled into its first recession in a decade, according to the National Bureau of Economic Research. Stephen Welting, an analyst at Salomon Smith Barney in New York, entitled his latest report on the US economy ‘Help! I’ve Fallen and Can’t Get Up’. Even so, Greenspan is trying to keep rich people’s confidence up by saying all that is happening is a V-shaped ‘correction’ – a dip in the economy soon to be followed by new growth at the end of the year. He is hoping that his interest cuts, Bush’s tax cuts and the new spate of military spending associated with the Son of Star Wars programme will provide a boost that the market, left to itself, cannot provide. So much for the neoliberal claims that states play no role.
Meanwhile, ‘emerging’ economies like Argentina, Turkey and Brazil which relied on the US boom to get them out of their last lot of troubles are in a deep mess again. As in 1997-98, these troubles can have a knock-on effect on banks in the US, Germany, Britain and elsewhere. But this time the impact can be much greater, since it will be very difficult for anyone to pretend it is only the financial superstructure and not the industrial core of the system that is in crisis.
Real profits were already in decline at the time of the east Asian crisis |
Labour Wants Illegal All-Black And All-LGBT Parliamentary Short Lists
The leader of the Labour Party is considering ways around the Equalities Act to enact discriminatory short lists to force more disabled, LGBT (lesbian, gay, bisexual, and transgender), and black people into parliament.
Jeremy Corbyn was quizzed today during a session of Parliament’s Women and Equalities Committee, titled Women in the House of Commons after the 2020 election.
advertisement
“Jeremy, you’re a believer in equality,” asked Tory MP Ben Howlett, “so why isn’t there all black short lists, all disabled shortlists, or all LGBT shortlists in the Labour Party?”
.@ben4bath asks why not all-black, all-LGBT, all-disabled shortlists? @jeremycorbyn: I have sympathy with that – we need diverse Parliament
“There have been suggestions about that… put forward. I have some sympathy with that actually,” he responded enthusiastically. Discriminatory selection based on race is currently illegal in the UK.
However, Mr. Corbyn has been considering ways around this. “I think you can deliver it without breaking the Equalities Act by requiring them to be included in a short listing process,” he explained.
He said he had “a lot of sympathy with ensuring that there is a place in the selection processes for people representing LGBT communities, black communit[ies] , or those with disabilities.”
“I think there is a process [needed] to ensure that happens,” he asserted.
There was also an amusing moment at the beginning of the session when Mr. Corbyn apologised for the being a white male, before being shot down by the chair because it was, indeed, his “fault”.
Jeremy Corbyn at the Women & Equalities Committee“Thank you very much for inviting us & I hope you are also going to be taking evidence from women – it seems slightly odd to have four white men sitting in front of you giving evidence. We have 43% of M.P.s who are women, and our aim is for 50%.
We’ve just set up a foundation which will help to promote and train and mentor young women who want to become MPs, in honour of the late Jo Cox ”
The Labour Party leader Jeremy Corbyn makes his opening statement to the Women & Equalities Committee, points out there are no female witnesses, and inexplicably gets blamed for the fact there are no female witnesses.
Much of the rest of the session was dedicated to discussing positive discrimination and all women shortlists. The legality of such lists, only widely used by the Labour Party, has been challenged several times and they were found to be illegal in 1997.
However, a Parliamentary report released this year said they are permissible according to the Sex Discrimination Act of 2002, claiming that “the Equality Act 2010 extended the period in which all-women shortlists may be used until 2030”.
Mr. Corbyn agreed that discrimination was the “most effective” way to promote diversity, because “the men in the party have got to realise that they have a part to play”, as well as slamming “macho culture”.
He explained that his party had already started a specific “women’s conference” which is “promoting women in the party” and a “mentoring programme” being operated by Labour’s Women’s Network.
Tim Farron, the leader of the Liberal Democrats, promised similar measures including more “restricted… all women short lists”.
He said “being left with eight white blokes” after the last general election was “hardly a great result” and slammed “the failure of men to take a lead on equality of women and indeed access to all underrepresented groups”. |
If there’s one person who has absolutely zero business criticizing anyone for how they’re running the country, it’s Dick Cheney. This should be obvious to pretty everyone by now, but apparently the Wall Street Journal didn’t get the message. Today, the paper published an editorial by Cheney and his daughter Liz in which the former Vice President blasts the “collapsing Obama doctrine” of foreign policy.”
Taking the rapid advance of ISIS radicals through northern Iraq as his cue, Cheney accuses President Obama of “emboldening” America’s enemies. He writes:
Rarely has a U.S. president been so wrong about so much at the expense of so many. Too many times to count, Mr. Obama has told us he is ‘ending’ the wars in Iraq and Afghanistan - as though wishing made it so. His rhetoric has now come crashing into reality...America's enemies are not ‘decimated.’ They are emboldened and on the march.
According to Cheney, the “failures” of the Obama presidency - which I guess are to not get the country involved in any more decade-long wars - are proof that our first African-American president is actively trying to take down America. He writes:
Despite clear evidence of the dire need for American leadership around the world, the desperation of our allies and the glee of our enemies, President Obama seems determined to leave office ensuring he has taken America down a notch. Indeed, the speed of the terrorists' takeover of territory in Iraq has been matched only by the speed of American decline on his watch.
Forget for a second that President Obama has continued many of the policies of the Bush administration - the drone wars and NSA spying both started under Cheney’s watch - and just consider the fact that Dick Cheney of all people actually has the gall to call someone else out for “taking America down a notch” and “being so wrong about so much at the expense of so many.”
You don’t need a political science degree to know how ridiculous this is. The Iraq War was the single biggest foreign policy disaster in recent - or maybe even all - of American history. It cost the country around $4 trillion dollars, killed hundreds of thousands, if not millions of innocent civilians, left 4,500 Americans dead, and turned what was once one of the more developed countries in the Arab World into a slaughterhouse.
Make no mistake about it, Iraq would not be the violent place it is today if the Bush administration hadn’t lied its way into a costly, unnecessary, and destructive war. Ironically, things have played out exactly as Cheney said they would when he was asked back in the 1990s about why the first Bush administration didn’t march all the way to Baghdad during the First Gulf War.
Really, there’s no one who’s done more to damage America’s reputation around the world and embolden our enemies than our former Vice President. The Iraq War was the best Al Qaeda propaganda video ever, and whatever Cheney might say about the surge and how successful it was, the truth is that there were no terrorists in Iraq before we invaded.
But Cheney’s hypocrisy on Iraq is just the tip of the iceberg when it comes to all the reasons why he’s probably the worst person ever to listen to for advice on, well, everything. Remember, Cheney was the guy who almost bankrupted Halliburton by exposing it to asbestos liabilities and then used his position as Vice President of the United States to bail the company out with no-bid contracts during the Iraq War, all while owning millions in Halliburton stock options.
Remember, Cheney was the guy who played a key role in the Bush administration’s illegal torture program. You know - the illegal torture program that was based on tactics invented by Maoist China and turned our country into a pariah state. And remember, Cheney was the guy who was supposed be on the lookout for terrorist attacks in the summer of 2001, but was too busy plotting out ways to attack Iraq to listen to warning after warning about how Al Qaeda was about to kill thousands of Americans.
Cheney let 9/11 happen on his watch.
American history has had its share of villains - J. Edgar Hoover, Joe McCarthy, and Richard Nixon come to mind as some of the worst - but there is no one in recent history who has disgraced our country quite like Dick Cheney has. He lied his way into an illegal war, profited off that war, and shredded the Constitution. He’s a war criminal and has the blood of hundreds of thousands of innocent people on his hands.
Dick Cheney should be rotting in a prison cell at The Hague, not writing editorials for the Wall Street Journal. |
A comparison of alternative plant mixes for conservation bio-control by native beneficial arthropods in vegetable cropping systems in Queensland Australia.
Cucurbit crops host a range of serious sap-sucking insect pests, including silverleaf whitefly (SLW) and aphids, which potentially represent considerable risk to the Australian horticulture industry. These pests are extremely polyphagous with a wide host range. Chemical control is made difficult due to resistance and pollution, and other side-effects are associated with insecticide use. Consequently, there is much interest in maximising the role of biological control in the management of these sap-sucking insect pests. This study aimed to evaluate companion cropping alongside cucurbit crops in a tropical setting as a means to increase the populations of beneficial insects and spiders so as to control the major sap-sucking insect pests. The population of beneficial and harmful insects, with a focus on SLW and aphids, and other invertebrates were sampled weekly on four different crops which could be used for habitat manipulation: Goodbug Mix (GBM; a proprietary seed mixture including self-sowing annual and perennial herbaceous flower species); lablab (Lablab purpureus L. Sweet); lucerne (Medicago sativa L.); and niger (Guizotia abyssinica (L.f.) Cass.). Lablab hosted the highest numbers of beneficial insects (larvae and adults of lacewing (Mallada signata (Schneider)), ladybird beetles (Coccinella transversalis Fabricius) and spiders) while GBM hosted the highest numbers of European bees (Apis mellifera Linnaeus) and spiders. Lucerne and niger showed little promise in hosting beneficial insects, but lucerne hosted significantly more spiders (double the numbers) than niger. Lucerne hosted sig-nificantly more of the harmful insect species of aphids (Aphis gossypii (Glover)) and Myzus persicae (Sulzer)) and heliothis (Heliothis armigera Hübner). Niger hosted significantly more vegetable weevils (Listroderes difficillis (Germar)) than the other three species. Therefore, lablab and GBM appear to be viable options to grow within cucurbits or as field boundary crops to attract and increase beneficial insects and spiders for the control of sap-sucking insect pests. Use of these bio-control strategies affords the opportunity to minimise pesticide usage and the risks associated with pollution. |
An attorney for Bill Cosby said Tuesday that it is unlikely the comedian will speak publicly about his sexual assault case, after his spokesman said he was considering a series of town halls.
The spokesperson made the announcement after a sexual assault trial in Pennsylvania ended in a hung jury and mistrial on June 17. Prosecutors say they will retry Cosby, 79. After the mistrial, a Cosby spokesman had said the entertainer was considering a town hall in July.
Asked whether his attorneys would allow that before the second trial, Cosby attorney Angela Agrusa told reporters after a hearing in a California civil case: "I can't imagine that we would."
"He does not take lightly these criminal charges," Agrusa said. "He would never do anything that undermined the import of this issue. So I don’t see him speaking publicly like that, no.”
Attorney Angela Agrusa, representing Bill Cosby, speaks after a trial setting conference in a civil suit against Cosby at the Santa Monica Courthouse on June 27, 2017. Frederick M. Brown / Getty Images
Agrusa spoke to reporters after a hearing in Santa Monica involving Judith Huth, who has accused Cosby of forcing her to perform a sex act at the Playboy Mansion sometime around 1974, when she was 15.
In a different criminal case in Pennsylvania, a jury deadlocked last week and a judge declared a mistrial. That case involves allegations that Cosby drugged and molested Andrea Constand, then an employee of Temple University, at his suburban Philadelphia home in 2004.
That case is the only instance in which Cosby faces criminal charges. Other women have accused him of sexual misconduct. Cosby and his lawyers have denied all the claims.
Montgomery County District Attorney Kevin Steele announced he plans to retry the case. Cosby is free on $1 million bail.
Related: Cosby Juror Says It Was a 'True Deadlock'
Agrusa said the town halls under consideration never included Cosby speaking about sexual assault. She said Cosby is eager to return to performing.
Bill Cosby holds up the hand of his defense attorneys Angela Agrusa as he exits the courthouse after a declared mistrial on the sixth day of jury deliberations of his sexual assault trial at the Montgomery County Courthouse on June 17, 2017 in Norristown, Pennsylvania. File Eduardo Munoz Alvarez / AFP - Getty Images File
Cosby spokesperson Andrew Wyatt had initially said the events under consideration would involve discussions about the judicial system, and later said it would be about education and personal development and if questions about the criminal case came up they would be vetted and Cosby "may or may not" answer them.
Related: Cosby Could Testify at Second Trial, Lawyer Says
Agrusa said prosecutors have indicated a retrial could take place within 120 days. "I believe that round two will ultimately provide the acquittal that Mr. Cosby seeks in Norristown," she said of the criminal case.
Huth's attorney, Gloria Allred, said the judge in that case set a trial date for July 30, 2018. If Cosby does give public appearances to discuss the criminal matter, Allred said she may hold “a parallel speaking tour” in cities where he appears. |
The sun was shining and nearly 300 guests gathered at the Inverness Hotel and Conference Center to support the Arapahoe/Douglas Mental Health Network. The network provides mental health services for uninsured and underinsured clients of all ages. Attendees networked at the the reception and then moved into Summit Ballroom. The centepiece of each table was a hand painted watering can that could be purchased and each guest recieved a package of forget-me-not seeds to plant.
Master of Ceremonies Dave Aguilera of CBS Denver welcomed the guests and introduced the Executive DIrector Joan DiMaria, who thanked the Board of Directors and introduced the Community Leader of the Year, Captain Attila Denes, a member of the Douglas County Sheriff's Office. Captain Denes leads the county's Crisis Intervention Team. He also co-ordinated the formation of the CIT Association of Colorado. Barb Becker, Director of Communtiy Programs talked about the range of services provided by the network. Todd Helvig, president of the board of directors, let guests know how their donations would be used to serve uninsured and underinsured clients.
Keynote speaker Bucky Dilts, former punter with the Denver Broncos, talked about his personal experiences with depression, and his personal mission to remove the stigma surrounding mental illness. Serious mental illness affects about 5% of the population of the United States each year. Untreated mental illness costs the American economy billions of dollars. Each year over 30,000 people complete suicide.
To kick the fundraising into high gear, Dave Aguilera encouraged guests to pay a premium for the Denver Bronco watering can from Bucky's table. Arapahoe County community advocate Debbie Stafford teamed with Bucky Dilts to create a one of a kind prize for an impromptu auction. The lucky winner won a tailgate with Bucky Dilts and other Bronco alumni along with the handpainted watering can.
For further information about the Arapahoe/Douglas Mental Health Network please check out their website at http://www.admhn.org |
If I understand this correctly, the Navy Yard shooter had been visited by police in Newport, R.I., about five weeks before the shooting. He had called the police because he was terrified by the walls, floors, etc., talking to him. Apparently Navy officials felt there was nothing they could.
Why on Earth wasn’t he taken to a hospital for evaluation on the basis that he was an imminent threat to himself and others? Any individual who is delusional and/or hallucinating is at very high risk for harming himself and others because he’s very emotional, doesn’t perceive reality, and believes things that are not real.
One promising pathway to decreasing the number of shootings and other violence would be to train police to recognize when an individual needs to be professionally evaluated for mental problems. This would increase the likelihood of disturbed individuals being evaluated and treated before these tragedies occur — which would be good for everyone.
Audrey Brodt, Littleton
This letter was published in the Sept. 20 edition.
Navy Yard mass murderer Aaron Alexis kept his security clearance while being treated for serious mental illness symptoms and in spite of years of documented incidents of violent, out-of-control behavior. At the same time, the rest of us have been forced to give up all rights to privacy in our everyday communications and are subjected to shoe removal and a lengthy list of inconvenient requirements involving clear plastic bags and tiny bottles every time we want to board a plane.
How can the tradeoff of rights and convenience for security imposed on us be justified while such serious and blatant red flags are completely ignored? It would be a joke of it weren’t so tragic.
Felice Sage, Littleton
This letter was published in the Sept. 20 edition.
The Navy Yard shooter reported to police a month before the killings that he heard voices. He had undergone mental health treatment. He had been discharged from the service due to a problem with “misconduct.” He had repeated run-ins with his military superiors and the law. Yet this and other incidences did not affect his security clearance.
Restrictive gun laws will create more killings since only criminals will have guns. We need sensible laws to control people who are mentally ill. We need to make it clear to those in authority they must report these people and can do so without recrimination.
I am sure no one grieves more than this man’s family. He should have been stopped. All of us need protection from these people.
Lillian Fish, Englewood
This letter was published online only.
For information on how to send a letter to the editor, click here. Follow eLetters on Twitter to receive updates about new letters to the editor when they’re posted.
Restrictive gun laws will create more killings since only criminals
will have guns. We need sensible laws to control people who are mentally
ill. We need to make it clear to those in authority they must report
these people and can do so without recrimination.
I fully agree that we don’t need any more gun laws, but we need many, many, many more surveillance laws for all Americans to be searched for mental illness so they don’t shoot their guns into crowds or at their loved ones.
See, it would be sooooooooooooooooooooooooo much easier to enact many more new laws to surveil our neighbors and family to assess their mental health and then take them into custody and pay the lawyer fees to take their guns, or pay their mental health bill to ensure they can keep their gun.
Yeah, that’ll work.
Best,
D
rightwingliberal
Again, you make no sense. You might need a refresher course on HIPAA, and as peterpi stated, sort of, due process and the rights of the mental health patients. When you figure out how to get people on a national mental health registry without violating their rights, then you will have something. Till then, keep spewing your vomitous troll drivel and prove to the world that you are loonier than a conservative Southern Baptist.
Dano2
When you figure out how to get people on a national mental health
registry without violating their rights, then you will have something.
Tell that to the gun fetishists who will say anything would be better than lowering the rate of gun sales to a small, scared, white minority.
And thanks for the comedy!
Best,
D
rightwingliberal
Yet most gun crimes are committed by blacks and hispanics. You are pretty safe from us white guys. I wonder what your fetish is, locked up in a dark basement all day. Or do you live under a bridge.
fedupwithgungrabbers
I think he lives under a bridge. He’s some kind of thick-headed troll.
Dano2
What the gun manufacturing lobby doesn’t tell you (to keep you scared and consuming their ammo) is that The Brown don’t kill crackers.
That’s right: the dusky hordes don’t go hunting scared white people.
But let’s not let facts dispel our irrational fear.
Best,
D
toohip
Just can’t leave the bigotry out of the discussion? I guess when you have a belief agenda, you can’t leave out the sordid details.
thor
Those who practice the soft bigotry of low expectations shouldn’t point out bigotry in others. Especially when it isn’t there.
toohip
oooh, you had me with the privacy of HIPPAA, and the rights of mental health patients,. . then you had to resort to right-wing trash talking. Even right wing liberals are “nice.” Try it sometime, you get more people to listen to your point.
mrfxx
Folks seem to believe that both doctor patient privilege and lawyer client confidentiality are sacrosanct, which is untrue.
For doctor patient privilege, here are 2 common reasons for what might seem to some to be a breach:
Criminal liability: this pertains mostly to psychiatric care. If a patient tells the psychiatrist about having committed a crime or that they are thinking about committing one, the psychiatrist may be compelled to report it to the authorities. Psychiatrists will not always report it because they want the patient to express everything freely.
Harmful Action: Although doctors are typically restricted from breaking patient confidentiality, doctors are also restricted from causing harm to others. If a patient’s actions would cause harm to others, the doctor may be compelled to break the privilege. The most common occurrence of this exception is when a patient has HIV or other sexually transmitted disease wishes to have unprotected sex with partners who have no knowledge of the patient’s condition.
I found the above by Googling “doctor patient confidentiality exclusions” – and got over 45 million hits.
toohip
you forgot the “/sar/” logo ;o) The hypocrisy of the right, asking for what they loath. . gov’t surveillance on private citizens.
peterpi
Felice Sage, spot on!
thor
I guess each of us will surprise the other when we agree on something.
toohip
I believe we can agree on Ms Sage’s irony of security differences in these examples, but “the red flags” which NOW seem obvious . . were not obvious in the fast-track procedures to get contractors access to secured work sites. Budget cuts create cursory electronic checks rather that personal follow-ups if a so called “red flag” appears. There’s a lot missing in this “contractor” aspect (see Snowden) of how contractors have access to sensitive data and don’t seem to be held to the same accountability as full-time Federal employees and military personnel.
thor
Ah, two good comments in a row. Nicely done. Except for the constant hammering on bigotry that isn’t there, you do seem able to make decent points once in a while.
Robtf777
The Letters made some good points.
#1 was the lack of intervention in getting the guy some help when he appeared to be delusional.
Apparently the police were concerned enough to forward the police report to other personnel…….but apparently they didn’t think that “concern” rose to the level where he was clearly a danger to himself and others.
It’s a tough call sometimes. When the police do take someone into “custody” on an “involuntary 72-hour mental health hold” …….they do so with the understanding that they must be able to clearly articulate WHY they did so……as various civil rights groups, lawyers, mental health professionals, judges, and even the US Justice Dept could very well do a “Monday-morning quarterbacking job” on what the police did……weeks or months later…….in response to an allegation that the police violated the subject’s civil rights.
“Hearing voices” and thinking that other people may be sending microwaves into his body”……is…..strange……but that does NOT, in and of itself, indicate that the per”son may be a real danger to himself or others…..to the point that he would commit suicide or shoot 30 or so people.
If we interviewed all the homeless panhandlers on the streets of Denver and every person who is a War Vet who goes to the VA Hospital…….I can guaranty you that we would find at least one……and some people would suggest “several” or “a lot”……who are “homeless,” “panhandling,” and/or are “unemployed Vets”……because they have various degrees of……mental, psychological, and emotional problems…….although few people would suggest “locking them all up because they may be the next mass killer.”
#2 Washington DC is one of the most gun-restrictive cities in this country.
The Washington Navy Yard has one of the better “security” arrangements…….with armed guards, metal detectors and the use of “ID-passes”…….than most businesses do…..and certainly much more than Columbine, the Connecticut School, and the Aurora Theater did.
And this guy was able to “breach” that security……with reportedly…..a long gun.
Washington DC is about as close to a “police state” as the Constitution allows it to be.
And the Washington Navy Yard took that “police state” mentality……a little bit farther.
And yet a guy with a history of “illegal use and discharge” of guns……whose military record was not spotless…….who was recently found to be hearing voices and thinking things that made him change motels three times……..was able to get a long gun into the Washington Navy Yard…….simply because he worked there…….and either he found and utilized a hole in the security of that place……or security was slack that day because he was an “employee with a valid pass.”
The Washington Navy Yard……did a LOT of things to actually PREVENT what happened…….from EVER happening. But it happened anyway……because they was a breach or a failure or a hole in that security…..somewhere……and a “criminal”……an “armed criminal”…..took the opportunity to shoot a lot of people.
The rest of us do NOT live in that sort of “police state”…..yet……where we walk through metal detectors to enter or leave our own homes……or our church……or the grocery stores……or buses……or through random metal detectors placed on the streets and sidewalks………although some us us DO walk through metal detectors to enter a public school or to board a plane.
Banning guns and having metal detectors…..everywhere……and having security/police……everywhere……may give us the…..illusion…..of “safety and security”……until someone who works at that place……takes a gun and begins to shoot……and doesn’t stop shooting until he is killed……simply because he COUNTED on…….everyone but him……. being UNARMED.
The Columbine Shooters counted on…..every student and every teacher….being unarmed.
The Connecticut Shooter counted on…..every student and every teacher…..being unarmed.
The Fort Hood Shooter counted on…..everyone else…..being unarmed.
Every Mass Shooter/Killer…..counted on the FACT that……virtually EVERYONE that they initially shoot……is UNARMED……and that they can continue to shoot and shoot and shoot…….all the bullets they want to…….because they COUNT ON the FACT that the police are…..precious minutes away……at the closest…….and NO ONE is going to be capable of stopping him……until someone with a gun finally shows up.
The one obvious exception was the New Life Church…….wherein the Shooter apparently didn’t realize that the Church had armed personnel……and no one had to wait for the police to show to finally put an end to all the shooting he intended to do.
peterpi
Yep, blame it on civil-rights attorneys. If someone is on a 72-hour hold, and a shrink says “Judge, we need more time”, just have the judge say “Heck, take your time, I’m putting an indefinite hold on this nutcase. Use all the time you need. Call me when you think he’s done. Until then, he’s yours for however long you need.”
What’s wrong with due process, Robtf? What’s wrong with the shrinks having to show a judge why someone needs to be held for 30 days or 180 days?
We used to just lock people up. It was extremely easy for cops, relatives, others, to tell a judge that Jane Doe is a menace to society, she’s a loonie. And Jane was never heard from again. Relatives could then ransack her fortune, political opponents could be confident she’d never be heard from again, doctors had plenty of patients to perform experiments on and take the government’s stipend for.
The authorities had plenty of goods on this guy. They failed to follow up. They failed to do their duty.
But nope, it’s those darned nasty civil-rights attorneys — spelled “ACLU”, Robtf? — who are responsible.
toohip
there but for the grace of God. . . .
fedupwithgungrabbers
Lillian Fish: “Restrictive gun laws will create more killings since only criminals
will have guns. We need sensible laws to control people who are mentally
ill.”
She makes a great point here.
Dano2
She makes a great point .(Restrictive gun laws will create more killings …We need sensible laws to control people who are mentally ill) here
I agree with following the…erm…”logic” to its conclusion: we need more laws to allow us to surveil Americans to test their fitness, and to seize their guns based on…on…well, we need a law that allows us to seize guns. That means more gubmint, more lawyers and more mental facilities. Maybe more brown doctors too so we can examine more people and judge them fit to own a projectile killing machine.
We then need more gubmint to administer these laws. More po-po to stop and frisk gun owners. More holding facilities, which can’t be staffed by the same private contractors that allowed this guy (and Snowden) to slip under the radar….
Sounds like a big government lover’s drrrrrrrrrrrrrrrrrrrrrream!
Best,
D
toohip
It’s the classic “be careful what you ask for.” Dumbing it down won’t make it easy for them to understand. They operate on the fringe, and core facts and reality escape them.
Dano2
I don’t expect the lunatic gunnie fringe to understand – I’m more interested in allowing the vast majority to see just how vapid the gun manufacturer’s (and their stooges’) argumentation is.
Best,
D
IBXNJ
One good question: How did someone who had a less than Honorable discharge get a job with a government contractor and get a security clearance as well??
At least one article stated that he had a “General DIscharge” – which – as they say – is neither fish nor fowl. It is “a ;ess” than an honorable discharge; however it is not an honorable discharge.
toohip
But apparently virtually of the recent mass killers using firearms either passed background checks with no felonies (like Alexis) or evaded background checks which is easy to do if you buy privately or on the internet. Most of the mass killers are not convicted criminals, and most are clinically sane.
Pointing the finger at mentally ill people, is the classic “straw man” argument, because it has no effect, because one, the same pro-gun people are on the right and refuse to provide tax payer funding to identify and help mentally ill people, and two, refuse to use mental health as a criteria of whether a person should be able to buy a firearm. So where’s your solution regarding mentally illness and firearms. . a pretty deadly combination?
fedupwithgungrabbers
My solution regarding mentally ill people and firearms is to improve and strengthen the existing background check system (without expanding it to private sales/transfers). Obviously it could be improved because too many prohibited people are slipping through the cracks. Also, when someone who tries to buy a gun fails a background check, aggressively prosecute them, as the law currently allows. This is something that currently isn’t being done. There are a lot of things you can do to reduce the number of guns in the wrong hands without burdening or taking away the rights of legitimate gun buyers. Still, there’s no magic law that’s going to catch everybody or prevent every shooting. That’s just reality.
Tbone
No she doesn’t. States with more guns have more gun violence.
It’s impossible to have a conversation with the gun nuts until they join reality.
Dano2
I agree with your implication that the dusky hordes are scary. That’s what the gun lobby thinks too. You’d better consume more of their ammo. On sale today!
Best,
D
toohip
Hey Tanner Gun Show this weekend! Get your firearm today! (wonder if anyone’s there to enforce background checks?)
Tbone
Don’t you know that white people have never shot anyone before? It’s all the negros and their uppity attitudes.
toohip
It’s obvious many people don’t live in the real world, but a world of “belief,” be it a political agenda or a just a naivete of ignorance. We live in modern world of democratic rights and freedoms, one of which is the right to privacy. How many of these letter writers would like to have all of their medical treatments and aspects of their private lives shared with the police, their employers, or the public?
We understand the connection between the security clearance and access to sensitive data and people with mental illness treatments or even questionable behavior many feel is “criminal.” But we live in a world of checks and balances, and when those checks don’t list a felony because someone’s behavior was never charged (and convicted) of a felony. . there is no smoking gun (excuse . . ). Alexis was never charged for his behavior of shooting out someone’s tires in anger, or discharging a firearm in his home. And as I stated before on my “Secret” security clearance investigation, back in the mid-70’s for the Defense Mapping Agency, they sent investigators to my home town to interview neighbors and friends. Not today, they conduct an electronic background check and if nothing comes up as a red flag to follow up on, the clearance is approved.
But consider, that it’s not this security clearance that would of prevented Alexis from conducting his rampage. If he didn’t have the clearance and didn’t work at the Navy Yard, he would of carried out this rampage in some other public arena.
But goes Alexis and his personal mental illness problems. . goes a lot of Americans. The key element here is NOT Alexis’s mental illness issues, but his access to firearms. While the gun-right continues to obstruct every possible gun control attempt. . including simple felony background checks, we will never be able to stop what all of us agree. . and whine about AFTER the fact of carnage. . that some people not because of their criminal record but because of their clinical mental illness. . should not be allowed to access firearms. But do you REALLY. . believe the gun right will allow a mental illness background check, when they fight every effort to have felony conviction background checks on private and internet sales? The reality is, they know many of the gun-crazed-right would FAIL a mental illness evaluation background check.
We are all wannabe arm-chair psychologists and we view people like Alexis as “mentally ill” when we get to review all the media reports. But his friends said he was like a brother to them, nice and always helpful, smart, etc. It’s always easy to point fingers AFTER the event and claim he should of been what. . locked up? denied his clearance access? not able to buy that 12 gauge shotgun in easy-to-buy-gun Virginia?
Fact: Virtually all of the mass shooters in the past couple decades were clinically sane. Studies show that only 17% of recent mass shooters had “behavior problems.” Most acted out in anger.
Guidelines: The Post welcomes letters up to 150 words on topics of general interest. Letters must include full name, home address, day and evening phone numbers, and may be edited for length, grammar and accuracy. |
Club Brent, Brown may have visited checked
IRVING, Texas, Dec. 10 (UPI) -- The Texas Alcoholic Beverage Commission is investigating the club where two Dallas Cowboys may have been prior to their fatal road accident.
Jerry Brown Jr., 25, was killed, and Josh Brent, 24, was arrested for intoxicated manslaughter after the car driven by Brent crashed early Saturday in Irving, Texas.
At the scene of the accident Brent refused to name the club they had visited, the arrest affidavit said, but a Dallas radio station reported Brent and Brown patronized the private club Private Dallas that evening, and a Twitter account registered to Private Dallas posted, "Cowboys! Surprise celeb guests!"
If violations are found, the club, which a Commission official did not identify Sunday, could be fined or have its license permit canceled, the Fort Worth Star-Telegram reported Monday.
"We're establishing where they had been and if they were sold alcohol while they were drunk. The investigation could take days or it could take months," said commission spokeswoman Carolyn Beck, adding agents will interview patrons, bartenders and any other witnesses in the club.
Police said Brent was driving at high speed when his car struck a curb and flipped at least once.
As Irving police officers arrived on the scene, Brent was dragging Brown from the burning car, authorities said, adding Brent was able to speak to officers but Brown was unresponsive. Brown died at Parkland Memorial Hospital in Dallas Saturday morning.
United Press International is a leading provider of news, photos and information to millions of readers around the globe via UPI.com and its licensing services.
With a history of reliable reporting dating back to 1907, today's UPI is a credible source for the most important stories of the day, continually updated - a one-stop site for U.S. and world news, as well as entertainment, trends, science, health and stunning photography. UPI also provides insightful reports on key topics of geopolitical importance, including energy and security.
A Spanish version of the site reaches millions of readers in Latin America and beyond.
UPI was founded in 1907 by E.W. Scripps as the United Press (UP). It became known as UPI after a merger with the International News Service in 1958, which was founded in 1909 by William Randolph Hearst. Today, UPI is owned by News World Communications. |
<!DOCTYPE html>
<meta charset="utf-8">
<title>CSS Text level 3 Test: zwj and text-shaping</title>
<link rel="author" title="Florian Rivoal" href="https://florian.rivoal.net/">
<link rel="help" href="https://drafts.csswg.org/css-text-3/#text-encoding">
<link rel="help" href="https://www.unicode.org/versions/Unicode11.0.0/ch23.pdf">
<link rel="help" href="https://www.unicode.org/versions/Unicode11.0.0/ch09.pdf">
<link rel="help" href="https://www.w3.org/TR/alreq/#h_joining_enforcement">
<link rel="match" href="reference/shaping-join-001-ref.html">
<meta name="assert" content="Arabic characters next to a ZERO WIDTH JOINER character must take their correct positional form.">
<style>
table {
font-size: 3em;
border-spacing: 0 3px;
}
td {
padding: 0 0.5ch;
line-height: 1;
border: 1px solid;
}
@font-face {
font-family: 'csstest_noto';
src: url('/fonts/noto/NotoNaskhArabic-regular.woff2') format('woff2');
}
table {
font-family: 'csstest_noto';
}
</style>
<p>Test passes if both halves of each of the pairs below are identical:
<table dir=rtl>
<tr><!-- alef, final form as it doesn't have a medial form -->
<td>‍ا‍
<td>ﺎ
<tr><!-- alef, final form -->
<td>‍ا
<td>ﺎ
<tr><!-- beh, initial form -->
<td>ب‍
<td>ﺑ
<tr><!-- beh, medial form -->
<td>‍ب‍
<td>ﺒ
<tr><!-- beh, final form -->
<td>‍ب
<td>ﺐ
</table>
|
Our doctor suggested we try these for our 6 year old son's fine motor issues. At 385 mg, these gelcaps are HUGE! I would prefer giving multiple smaller pills over one huge pill. That said, this stuff has REALLY help his fine motor issues. Handwriting has improved immensely and he now likes drawing. |
The human tumor colony-forming chemosensitivity assay: a biological and clinical review.
Over forty papers describing correlations between in vitro human tumor sensitivity to a variety of chemotherapeutic agents and the in vivo response of patients to those agents have been published since the publication in 1978 by Salmon and Hamburger of their results of a human tumor colony-forming chemosensitivity assay (CFCA). The true positive rate in over 1600 correlations is 71% and the true negative rate is 94%. The biological elements of the assay, its developmental history, its place in the spectrum of in vitro chemosensitivity assays, and its theoretical and practical limitations are discussed. The scope, design, and limitations of key clinical trials are presented and an analysis of the potential errors of statistical interpretation of the trials as well as the results of the trials is given. |
Marlin lever 30-30-good price?
This is a discussion on Marlin lever 30-30-good price? within the General Firearm Discussion forums, part of the Related Topics category; I found a couple of Marlin lever action rifles in .30-.30 at my pawn shop.
30AS? (I think) for $225 in pretty decent shape.
336? ...
I just sold a Marlin 336 .30-30 in near-new shape for $330. I was surprised to get that much, as several used ones can be found for $50-100 less. Still, someone wanting a new-to-you safe queen would jump at this one. One did.
I think the prices you listed sound good, assuming the guns are in good, serviceable shape. |
Q:
How to replace the rectangle(DIP) bridge rectifier with round one.
I want to make an AC dimmer and the circuit diagram from the instructables uses a bridge rectifier which is in DIP package and rectangle in shape and the rectifier which I have is round one, so how can I connect it in the circuit replacing the rectangular one?
instructable - http://www.instructables.com/id/Arduino-controlled-light-dimmer-The-circuit/?ALLSTEPS
A:
If you want to keep the modifications of the circuit board to a minimum I would recommend to get another DIP socket (6 pins), remove the unneeded pins, cut the wires of the round rectifier to an appropriate length and solder the them to the DIP socket. Finally plug the DIP socket to the PCB. Be sure to watch for the proper pinout though, but since everything is labeled that should be quite easy.
Always assuming that the current and voltage ratings of the new rectifier are appropriate. As pointed out by Spehro Pefhany, the voltage rating of the W005M (round) is lower than the rating of the DF02 (DIP), so this needs to be checked against the supply voltage before changing the parts.
|
Q:
HTML 5 pattern regex to accept twitter handle like words, starting with @ only
I'm trying to develop a HTML5 form validation technique for a form input to accept words starting with the @ character only, like twitter handles.
For example to accept: @photography101
And reject: photography101
OR @photography@101
It must accept only a string in the same.format as twitter handles. one @ character only, no spaces and the @ character must be at the beginning.
My form input is as follows:
<input type="text" name="pagehandle" pattern="^@\s[a-z0-9]" required="required" \>
But this pattern is not accepting words entered in the input area that start with @
Can anyone help with the correct regex pattern?
A:
Try this:
pattern="^@[a-z0-9]+$"
where the + means one or more times
$ is the end of string anchor
the \s seems useless.
|
*m**3 - 58*m**3 + 39*m**3.
163*m**3
Collect the terms in -955*q**3 + 1843*q**3 - 894*q**3.
-6*q**3
Collect the terms in -20*l**2 - 26364339*l + 26364339*l.
-20*l**2
Collect the terms in 265 - 2788*j**2 - 265 + 2833*j**2.
45*j**2
Collect the terms in 13*m**3 - 145*m**3 - 78*m**3.
-210*m**3
Collect the terms in 302*i - 302*i + 273 - i**2 - 273 + 3*i**2.
2*i**2
Collect the terms in -180 - 722 + 901 - 18*k.
-18*k - 1
Collect the terms in -1067 - 38*c**2 + 14*c**2 + 1067 + 18*c**2.
-6*c**2
Collect the terms in 3*j - 749*j**3 + 736*j**3 - 851*j**2 + 851*j**2.
-13*j**3 + 3*j
Collect the terms in 13*d - 1923 - 1881 + 3804.
13*d
Collect the terms in 4*r**2 + 10*r**2 + 22696 - 22696.
14*r**2
Collect the terms in 5969*n**2 - 2968*n**2 - 1779*n**2.
1222*n**2
Collect the terms in -38*u**2 - 199*u**2 + 239*u**2.
2*u**2
Collect the terms in -186264*z**2 - 3 + 186304*z**2 + 3.
40*z**2
Collect the terms in -1074*j - 5 - 1055*j + 2135*j + 5.
6*j
Collect the terms in 209 - 3*s - 37 - 44 + 170 + 32.
-3*s + 330
Collect the terms in -13*q + 66 + 3*q + 6*q + 2*q + q.
-q + 66
Collect the terms in 13*v**3 - 367*v**3 - 6 + 6.
-354*v**3
Collect the terms in -d + 2 + 32*d + 16*d - 36*d.
11*d + 2
Collect the terms in 19691190*k**3 - 121*k**2 + 121*k**2 - 19691192*k**3.
-2*k**3
Collect the terms in -21*i**2 - 3*i**2 + 2*i + 37*i**2 - 41*i**2 - 24*i**2.
-52*i**2 + 2*i
Collect the terms in 0 + 922*j**2 - 1100*j**2 + 168*j**2 + 0.
-10*j**2
Collect the terms in -1176*x + 1166*x + 0 + 0.
-10*x
Collect the terms in -1182*a - 310 + 1183*a - 254 - 157 + 0.
a - 721
Collect the terms in -44*v**2 + 18000050 - 18000050.
-44*v**2
Collect the terms in 3959 - 3959 + 356*h.
356*h
Collect the terms in 2748*c - 2049*c + 3602*c.
4301*c
Collect the terms in 66227 - 33160 - 33119 + 2*f**3.
2*f**3 - 52
Collect the terms in -3440*w + 7 - 3441*w - 3449*w + 10319*w - 4.
-11*w + 3
Collect the terms in -15 + 147*s**3 + 30 - 15.
147*s**3
Collect the terms in -5*a - 7*a - 24*a.
-36*a
Collect the terms in -3 - 1284*u**2 + 1291*u**2 - 5 + 8.
7*u**2
Collect the terms in -6 - 88*x**3 - 3*x + 283*x**3 - 94*x**3.
101*x**3 - 3*x - 6
Collect the terms in 45*f - 11*f + 7*f - 5*f.
36*f
Collect the terms in 44*y**2 + 54*y - 50 + 50 + 10*y**2.
54*y**2 + 54*y
Collect the terms in 7*q - q + 6*q**3 - 21*q - 4*q**3.
2*q**3 - 15*q
Collect the terms in -706*l**3 + 1970*l**3 + 1762*l**3.
3026*l**3
Collect the terms in -178*r**3 + 64*r**3 + 110*r**3.
-4*r**3
Collect the terms in 3391*z + 3388*z - 10156*z + 3396*z.
19*z
Collect the terms in -76*y**3 - 77*y**3 + 278*y**3 - 94*y**3.
31*y**3
Collect the terms in -151*k + 12 - 5 - 2*k**2 - 504*k.
-2*k**2 - 655*k + 7
Collect the terms in -2004*b + 1236*b - 2006*b + 2776*b.
2*b
Collect the terms in -1079*o**2 + 1069*o**2 + 0*o + 7*o - 5*o - 2*o.
-10*o**2
Collect the terms in 4 - 4 + 153*v**2 - 528*v**2.
-375*v**2
Collect the terms in 2329377*i - 1164687*i - 1164684*i.
6*i
Collect the terms in -449*z + 891*z - 436*z.
6*z
Collect the terms in 31324*u + 31638*u - 62960*u.
2*u
Collect the terms in -13*v**2 + 3*v**2 + 6*v**2 - 26*v.
-4*v**2 - 26*v
Collect the terms in y - y + 1267*y**3 - 223*y**3 + 0*y.
1044*y**3
Collect the terms in -10410*m**3 + 20729*m**3 - 10340*m**3.
-21*m**3
Collect the terms in 5*v + 5*v + 29*v - 16*v.
23*v
Collect the terms in -3*s**2 - 46*s + 6 + s**2 + 5.
-2*s**2 - 46*s + 11
Collect the terms in -23751*g + 24*g**2 + 23751*g.
24*g**2
Collect the terms in 26*d**3 - 29*d + 12*d + 17*d - 29*d**3.
-3*d**3
Collect the terms in 4*z**3 + 2*z**3 + 4*z**3 + 6*z**3 - 20*z**3.
-4*z**3
Collect the terms in -a + 4*a + 5*a + a + 15*a - 15*a.
9*a
Collect the terms in -6 + 24 + 2*p - 3 + 33 - 6.
2*p + 42
Collect the terms in -4374*f - 4400*f + 8723*f.
-51*f
Collect the terms in -72*v**3 + 28*v**2 - 24*v**2 - 4*v**2 + 3.
-72*v**3 + 3
Collect the terms in 101 + s + 122 - 607 - 461.
s - 845
Collect the terms in 75*f - 475*f + 102*f + 95*f + 95*f + 102*f.
-6*f
Collect the terms in -131*j + 223*j - 2*j**3 - 120*j.
-2*j**3 - 28*j
Collect the terms in -554*i + 4 - 7 - 1 + 3.
-554*i - 1
Collect the terms in 15 - 6 - 4 - 140*l**2 + 26*l**3.
26*l**3 - 140*l**2 + 5
Collect the terms in 1863013*x - 1863013*x + 41*x**2.
41*x**2
Collect the terms in 44*x**2 - 8*x**2 - x**2 + 122*x**2.
157*x**2
Collect the terms in -6*d + 1184047 - 1184047.
-6*d
Collect the terms in 752540*h - 752540*h - 10*h**2.
-10*h**2
Collect the terms in 4 - 14 - 2*a**3 + 27*a**2 - 27*a**2 - 17.
-2*a**3 - 27
Collect the terms in 7759286*t + 2*t**3 - 7759286*t.
2*t**3
Collect the terms in -21*x - 3 + 9*x + 5 - 29*x.
-41*x + 2
Collect the terms in 7*o**2 + 10*o**2 - 2*o**2 - 31*o**2.
-16*o**2
Collect the terms in -1371 + 1371 + 2*s**2 - 82*s.
2*s**2 - 82*s
Collect the terms in -32 - 30 - 26 - 11*f - 30 + 118.
-11*f
Collect the terms in -3976*v**2 + 1995*v**2 + 30 + 1982*v**2.
v**2 + 30
Collect the terms in 72 + 39 + 6*o**3 - 37 - 37 - 37.
6*o**3
Collect the terms in 4*v + 35 - 2*v - 159.
2*v - 124
Collect the terms in -24342*r + 12187*r + 12152*r.
-3*r
Collect the terms in 1 + 997*h**2 - 1 - 988*h**2.
9*h**2
Collect the terms in -144 - 50*w + 285 - 141.
-50*w
Collect the terms in 8*q**2 + 22 + 7*q**2 - 85*q**2.
-70*q**2 + 22
Collect the terms in 3*u - 4*u - 28287112*u**3 + 28287116*u**3.
4*u**3 - u
Collect the terms in 188*g + 226*g + 482*g + 871*g.
1767*g
Collect the terms in 107*z - 8*z - 22*z.
77*z
Collect the terms in -1082*u - 1010*u - 313*u.
-2405*u
Collect the terms in 137 - 150 + 8 - 15*r**3 + 5.
-15*r**3
Collect the terms in 794*t - 1492*t + 764*t.
66*t
Collect the terms in 8172*h**2 + 33061*h**2 - 10271*h**2.
30962*h**2
Collect the terms in -44*c - 136 + 0*c**2 + 368*c + 134 - c**2.
-c**2 + 324*c - 2
Collect the terms in -2*u**3 + 6*u**3 - 6*u**3 + 247.
-2*u**3 + 247
Collect the terms in -166 + 166 - 32707*h + 32704*h.
-3*h
Collect the terms in -660*f**2 - 26*f**3 + 661*f**2 - 55*f**3.
-81*f**3 + f**2
Collect the terms in -3 - 340*b - 85*b + 1 + 1.
-425*b - 1
Collect the terms in 2*h**3 - 163 - 101 + 0*h**3 + 264.
2*h**3
Collect the terms in -10*q**3 + 4 - 2*q + 8 + 0.
-10*q**3 - 2*q + 12
Collect the terms in -168*x + 22 + 83*x - 24 - 55*x**2 + 85*x.
-55*x**2 - 2
Collect the terms in 361523*y**3 - 180759*y**3 - 180765*y**3.
-y**3
Collect the terms in 4 + 16293*u**3 - 16307*u**3 + 8 - 3 - 9.
-14*u**3
Collect the terms in 7*t + 14*t + 2*t - 27*t + 3*t.
-t
Collect the terms in 2 + 87*f**2 - 2 + 2*f - 21*f**2.
66*f**2 + 2*f
Collect the terms in -11252145*c**2 + 22504310*c**2 - 11252155*c**2.
10*c**2
Collect the terms in -35*m + 16*m + 9*m - 11 + 14*m.
4*m - 11
Collect the terms in -1879 - 625*q + 1879.
-625*q
Collect the terms in -b**2 + 10*b**2 + 2 - 7 + 12.
9*b**2 + 7
Collect the terms in 708*v**2 - 4040*v**2 + 764*v**2 - 5126*v**2.
-7694*v**2
Collect the terms in -5*y - 75*y + 19*y + 97*y + 10*y.
46*y
Collect the terms in -100 - 19*p + 100 + 70*p - 29*p - 21*p.
p
Collect the terms in -1600 + 19*i + 18*i + 15*i - 54*i.
-2*i - 1600
Collect the terms in 11*w + 12*w + 6*w + 18*w - 44*w.
3*w
Collect the terms in 110 - 5*f**2 - 6*f**3 + 4*f**2 + 12*f**3.
6*f**3 - f**2 + 110
Collect the terms in -42*c + 13*c**2 + 3*c**2 + 31*c**2.
47*c**2 - 42*c
Collect the terms in -17*a**2 + 3*a**2 - 19*a**2 + 68*a**2 - 20*a**2.
15*a**2
Collect the terms in -4 + 554818*z**2 - 554814*z**2 + 4.
4*z**2
Collect the terms in 9*q**2 + 1755 - 5*q - 1755 + 5*q.
9*q**2
Collect the terms in -179 + 34*c**2 + 39*c**2 - 74*c**2.
-c**2 - 179
Collect the terms in -13840*f - 13864*f + 27700*f.
-4*f
Collect the terms in 24*y - 188*y - 288*y.
-452*y
Collect the terms in -91*r - 150*r - 24*r - 47*r.
-312*r
Collect the terms in 185*j**2 - 765*j + 765*j.
185*j**2
Collect the terms in -7 - 84*a + 24*a + 22*a + 37*a.
-a - 7
Collect the terms in -6389 + 6389 - 170*i.
-170*i
Collect the terms in 0*t**3 - t**3 + 5*t**3 - 13*t**3 - t**3.
-10*t**3
Collect the terms in -12*y**2 - 15*y**3 + 10*y**3 + 435*y - 435*y.
-5*y**3 - 12*y**2
Collect the terms in -20 + 2*w**2 + 902*w + 899*w - 1801*w - 3*w**2.
-w**2 - 20
Collect the terms in 4*q - 4*q + 0*q - 942*q**3.
-942*q**3
Collect the terms in -55*w - 101*w**3 + 102*w**3 - 91*w**2 + 22*w + 33*w.
w**3 - 91*w**2
Collect the terms in 128*v**2 + 635*v**2 + 4*v**2.
767*v**2
Collect the terms in 246*r + 84*r + 39 - |
Father's Day Thanksgiving Wedding Easter Children's Day Birthday Party Party Christmas Back To School Mother's Day Earth Day New Year April Fool's Day House Moving Graduation Valentine's Day Chinese New Year Halloween
Respect of customer hello! please be sure to read the prompt carefully before shopping our wedding invitation cards.Under 2 lots product unified default sending via ePacket or China Post Air Mail, more than 2 lots (including 2 lots) will be shipped via DHL or Fedex. Products more than 2 lots, due to different weight and different volume,the freight charges, fuel surcharge is also different, after customers place the order, please contact customer service to confirm if the freight need revise or not . If freight needs to be revised, but without modifying price those who makes direct payment, dispute generated shall be undertaken by the customer.
Ps: Customer who lives in remote place must check to see if the logistics can reach your area or not, If you directly make payment without contacting the seller,product also may not be shipped, thank you for your cooperation!
All products in our store are usually delivered within 5 to 10 days. If there is no inventory, we will contact you to delay delivery of the goods. In case of holidays will be postponed delivery, thanks for your understanding! Once getting your query, we will give you prompt feedback.please understanding!
This product is a laser technology, the commodity is made of pearl paper/cardboard, edge inevitably there will be coking, do not belong to the flaws, real color film, mutatis mutandis, the shallow, existence chromatism, Mind off color customers purchase. How much each display different, pictures and in-kind will have off color, please understand. Custom-made customers, do not provide return service. Product master specialty paper/pearl paper as material, a variety of hollow out flower shape design with stereo modelling, beautiful features. Flower shape the balance of the hundreds of choice. |
A federal appeals court on Monday rejected a fresh challenge to New Jersey’s ban on so-called gay conversion therapy for minors, saying the prohibition does not violate the rights of either children or their parents.
By a 3-0 vote, the 3rd U.S. Circuit Court of Appeals said the ban did not infringe the First Amendment rights of minors and their parents to receive information and exercise religion, or the rights of parents to decide how to raise their children.
The challenge came from a 15-year-old boy known as John Doe, who claimed to suffer from anxiety, panic attacks, self-hatred and suicidal thoughts as he struggled with his sexual identity, and his parents, who said they had sincere religious beliefs that homosexuality was sinful and harmful.
The family plans to appeal to the U.S. Supreme Court, said their lawyer, Mathew Staver.
“It is a tragedy when people who are not in the counseling room try to dictate what the client wants to receive and what the counselor is allowed to offer,” Staver, chairman of Liberty Counsel, said in a phone interview.
Signed by Republican Governor Chris Christie in August 2013, New Jersey’s law bans licensed counselors from trying to convert homosexual minors into heterosexuals.
The law was upheld last Sept. 11 by the same 3rd Circuit panel after counselors claimed it violated their free speech rights.
Citing that ruling, which is also being appealed to the Supreme Court, Circuit Judge Dolores Sloviter on Monday said: “The listener’s right to receive information is reciprocal to the speaker’s right to speak.”
She added: “The fundamental rights of parents do not include the right to choose a specific type of provider for a specific medical or mental health treatment that the state has reasonably deemed harmful.”
Monday’s decision upheld a July 2014 ruling by U.S. District Judge Freda Wolfson in Trenton, New Jersey.
A spokesman for Christie did not immediately respond to requests for comment.
On April 8, President Barack Obama called for an end to gay conversion therapy for children, citing “overwhelming scientific evidence” that it was “neither medically nor ethically appropriate and can cause substantial harm.”
The American Psychiatric Association in 1973 declassified homosexuality as a mental disorder. Some conservative and religious groups have said sexual orientation can be changed. |
Q:
Nested Form has_many
I am not sure how to proper create a rails form with nested form. I have followed many tutorial but becoming more confused has in what should it be, singular plurials, controller... Here my models
model/event.rb
attr_accessible :description :title, :tag_ids, :locations_attributes
has_many :location
accepts_nested_attributes_for :location, :allow_destroy => true
model/location.rb
attr_accessible :address, :customer_id, :event_id, :latitude, :longitude
belongs_to :customer
belongs_to :event
controller.rb
def new
@event = Event.new
...
def create
@event = Event.new(params[:event])
...
view form.html.erb
<%= form_for(@event) do |f| %>
<%= f.fields_for :locations do |e| %>
<%= e.text_field :longitude %>
<%= e.text_field :latitude %>
<% end %>
...
<% end %>
error
Can't mass-assign protected attributes: locations
params send
"locations"=>{"longitude"=>"45.6666",
"latitude"=>"47.44444665"},
Either my relationship are wrong because fields_for doesn't support it, either my controller is not proper, or either rails is just not a great language, or i don't understand it anymore.
A:
You.re nearly there...
event.rb - locations NOT location
attr_accessible :description :title, :tag_ids, :locations_attributes
has_many :locations
accepts_nested_attributes_for :locations, :allow_destroy => true
Should do it I think
edit
And as Valery Kvon says, you need to add
@event.locations.build
to your controller
|
Rite of Passage on Cantrasa Shoal
Currents of SurigaoAs good fortune would have it, I was again tagged along by the nice folks of Punta Bilar Dive Center to join them for a dive. This time, it's the Cantrasa Shoal, just off Punta Bilar's shoreline. But here's the deal - the current is strong. I've heard of horrifying tales about Surigao's current - it can pull the regulator off your mouth and rip your mask off! It has shamed many experienced divers. First time I heard it, I was excited and at the same time fearful to give it a try. Now that I'm faced with it, I feel butterflies in my stomach.
Cantrasa Shoal(general area)
Zati's Plunge
We were to hang on to the rope connected to the anchor line and jump, pulling ourselves down. Zati jumped ahead of me, but due to a misunderstanding with the boatman, she jumped on the other side of the boat - there was no anchor line to hang-on to! Immediately, the current grabbed hold of her and pulled her out, like quicksand sucking you in. From the boat, the crew, Jeanne and everyone else were quick to grab her by the regulator before she drifted off. It was a harrowing ordeal until she was safely pulled back into the boat - sigh of relief to everyone, specially Zati who was left shaken. She opted not to dive anymore that day - good call. That episode was one for the books.
Who's Next?The thing is, after Zati, it was my turn to make the jump. Yeah, right! I started reliving a mountain bike episode back in the day when I was next in line to make a big-air jump. The guy in front of me took his turn, over-compensated and landed on his tailbone and writhed in pain - no one wanted to be next after that. Now, looking at the water, I wanted to tuck my tail between my legs and come up with a plausible bailout...headache? toothache? LBM? I would have tried all the excuses but there was no fig leaf to be found.
Leap of Faith
"Forced to Good", I grabbed the rope and jumped, pulling myself down the anchor line. Yes, the current was quick to call my attention. I could feel my mask loosening - I had to press it against my face. When I let go of the rope, the current took control. I finned against it, but I was still being pulled. Someone should have taken a shot of the horrified look on my face. Not seeing anyone, I clung to the coral wall - with no gloves. At that point, my breathing was shallow and fast, and I was probably pale with a near-panic look in my eyes. I was afraid I'd use up my air too fast. What the f#$@ did I get myself into this time?
The Good Samaritans
Clint appeared from the shadows and gestured me to follow him. Whew! Seeing him was like a new lease on life. Now I know how Moses felt when he saw the Burning Brush on that mountain top. Salvation was at hand! At some point, I lost sight of Clint but there was Jeanne. Confidence was back with her around.
Ending ThoughtsAs we continued our dive, the current felt less and less until it felt normal - I could maintain bouyancy while staying on one spot. The whole time, I thought the dive would be under torrential current conditions! That ordeal was quite something. I got scared despite managed expectations. But what I went through is not nearly as extreme as some of the stories I've heard. That current only loosened my face mask. It didn't rip it off. I didn't feel my mouthpiece (primary second stage) being pulled from my mouth. But I'd been told of such extreme diving conditions when divers would even employ a commando crawl on the ocean floor to weather the current. I'll leave that part to the intrepid divers of Surigao. For now, this experience is plenty for me. Diving Surigao's semi-strong current...check!
Many many thanks to Jeanne, Zati, Marlon, Clint and Anna for a dive worth retelling to my future grandkids!
To make scuba dive arrangements in Surigao City and the Caraga region, contact:
Punta Bilar Dive Centerlocation: Brgy. Punta Bilar, 8400 Surigao Citymobile: 0920.909.0999 |
email:jake_miranda1@yahoo.comrates: starting at P800 for shore dives and P1200 for boat dives, minimum 2 pax. If you are diving alone, then you pay P500 for the divemaster, which already includes his gear. Gear rental for whole day is only P750
FYI
Surigao divers are strong divers, able to swim against currents that shame the most experienced divers. Some divers at Punta Bilar Dive Center are among the country's most adept cave divers. Read: You're in good hands with Punta Bilar Dive Center folks!
Sua Cold Spring - in Brgy Esperanza. From main highway, get off at Madrid terminal and take motorcycle ride for the spring. If coming from Lanuza, get off at crossing of Cangcaban then take habal-habal for the spring
Lubcon Falls - from Tandag, take jeep for Cantilan or Cortes and ask the driver to drop you off at Lubcon Falls, P25, 30 mins, 15 kms
Burgos Togonan Falls
Laswitan - strong waves crashing against the rocks and spilling over to fill up a rock pool (while you're dipping in it)
Campiri Rocks - going over huge boulders, dipping in a rock pool, standing on a rock summit as waves hits and splash against it, and to cap all, you rest on the base of the light house perched on top of the rocks in full view of the magnificent Pacific Ocean
Bakwitan Cave - a refuge by the towns folk during the Japanese occupation and during the typhoon of 2004
Buybuyan Beach - small beach, almost like a personal beach, fine white sand (there are no commercial establishments on the beach...its undeveloped)
Sihagan Beach - fine white sand for long walks on a beach (there are no commercial establishments on the beach...its undeveloped) |
Wireless Security Applications
Savvy ECs, heed your calling
For connectivity, mobility and remote monitoring, wireless continues to show the world that it is a reliable and flexible transmission method. Wireless solutions handle harsh environments with ease and provide secure data communications. In hybrid systems, wireless coexists efficiently with hardwired solutions such as coaxial, structured wiring and fiber to protect facilities and commercial enterprise. It’s more than a simple point-and-shoot transmission method. Wireless provides both long-haul and short-range transmission, allowing a firm to become more mobile. Piggybacked on the World Wide Web, every business has an opportunity to take on a global presence with wireless.
Mobile equals global
Wireless communication continues to extend and promote a global business in many ways. For security command centers, wireless such as Internet protocol-based (IP) systems, coupled with in-house local and wide area networks (LANs and WANs) allow on-the-fly and remote camera surveillance and physical security deployment anywhere in the world. Management and accountability instantly become centralized. Physical security and information technology work together in such a way that the protected premises benefit with the ability to initiate proactive security measures. In sensors, access control and locking hardware, wireless provides robust communication typography.
Wireless sensors extend the Internet into the physical world, said Deborah Estrin, computer scientist and head of the UCLA-based Center for Embedded Networked Sensing, according to a Feb. 12, 2007, Associated Press report. The center’s research has deployed wireless networks and nodes in remote rice paddies, rain forests and the mountain wilderness to more closely monitor the world. In the not-too-distant future, the center said, wireless networks will monitor the environment for pollutants, sense if buildings are at structural risk or even track medical patients in real-time parameters. Networked wireless sensors the size of dust particles will allow the Internet to virtually connect people with personal computers in buildings anywhere or even in the crop fields of a Midwestern farmer’s acreage.
Traditional wireless intrusion sensors and supervisory detectors have become reliable devices that accommodate the environment and its characteristics. Loss of range and weak signals are a thing of the past. Frequency hopping often is used, and it is a modulation technique used in spread spectrum signal transmission. It repeatedly switches frequencies to find the best signal. Animal or object detection specifications, called pet alleys, or lens space detection patterns adeptly avoid false alarms and have long been part of these sensors. The latest innovations in wireless sensing technologies have focused on microprocessor advancements and immunity to radio frequency interference from stray sources, and the result is a new breed of sensor that can be used in harsh industrial signaling.
Critical infrastructure protection
In addition to security intrusion applications using passive infrared devices or dual-technology sensors, wireless detectors extend the realm of practicality and increasingly are used for critical infrastructure protection.
“Wireless sensors have matured to the point that they are being used by oil refineries, chemical plants and first responders,” said Bob Durstenfeld, director, corporate marketing, RAE Systems, San Jose, Calif.
Durstenfeld said RAE products offer two radio footprints: 900 MHz IMS band point-to-point or 2.4 GHz ZigBee, which is developed by the ZigBee Alliance, an organization of approximately 150 companies working on standardization and common interoperability platforms for these RF devices.
“Wireless is less expensive to install as only power is needed,” Durstenfeld said. “Battery backup availability is also a plus. If power is lost, real-time monitoring is still possible.”
Mesh networks
Mesh, nodes, links and other devices push wireless signals to even greater applicability.
Mesh networks can provide a solution to escalating labor costs and general accessibility in some construction environments. A wireless mesh network sets up remote access points over a wide area without cabling, letting the user deploy a wireless system using the existing Ethernet or as an all-wireless scenario. It can extend a LAN or WAN between buildings without additional trenching or cabling.
Mesh networks are flexible and scalable and consist of nodes, access points and hardware, which route traffic to one another instead of through cable. The technology enables network appliances and devices to operate over the wireless mesh, providing connectivity wherever cabling is too difficult, disruptive or costly.
In the past, security and surveillance cameras were connected to centralized monitoring and recording facilities with hardwired coaxial cable. The advent of IP addressable cameras offered additional advantages, but they were still limited by how far their network cabling would reach. A mesh network can provide standard Ethernet ports on virtually every wireless node, so any enterprise-grade IP camera can connect with an existing network.
There are new variations on the theme of wireless mesh networks. PacketHop Inc., Redwood City, Calif., developed a mobile mesh networking-based system that distributes video surveillance with or without an infrastructure. PacketHop’s technology fits into a vehicle like a school bus, train or police cruiser. It connects to video surveillance or closed-circuit television (CCTV) cameras and wirelessly streams video to any mobile device within its range or to a remote location via Wi-Fi or cellular backhaul—software with advanced algorithms route video through the most efficient wireless path. The Lakewood, N.J., police department is using the technology for virtual backup (streaming real-time video from police cruisers to dispatchers), and a municipality on the East Coast is testing the technology for video surveillance in school buses.
Wireless security
IP solutions, especially video, are where wireless shines. Municipalities, cities and other jurisdictions continue to deploy wireless for surveillance. The Dallas Police Department recently deployed an IP video surveillance system to aid in deterring, detecting and investigating crime in its central business district. The public safety solution combines the latest wireless innovations, including 40 IP video cameras from Sony Security Group, Park Ridge, N.J.; 35 multiradio mesh network nodes from Firetide Inc., Los Gatos, Calif.; and seven high-capacity, gigabit Ethernet and 100 Mbps backbone links from BridgeWave Communications, Santa Clara, Calif. Gigabit data rate wireless links are a higher frequency band than typically used 2–24 GHz (they are 60–90 MHz) and are designed as a secure solution between buildings, on a campus or across town, according to Gregg Levin, vice president of marketing, BridgeWave Communications.
“As a result of the use of these higher frequencies, the radio transmissions are constrained to very narrow beams, which make the transmissions practically impossible to intercept or jam,” Levin said. One of the main concerns for lower frequency wireless in corporate or other venues concerned using the network to transmit sensitive or private documents.
“For most people, it is counterintuitive that wireless transmission could be more secure than wired transmissions; however, the cost and effort needed to attempt to intercept or disrupt our wireless signals is normally much higher than the cost and effort of digging into an interbuilding conduit and gaining access to fiber or copper cable,” Levin said. “At the end of the day, the degree of difficulty of intercepting or disrupting a transmission is the true measure of how secure it is.”
Because of the secured aspect of this form of wireless communication, the BridgeWave product is gaining acceptance in medical campus networks, which typically must meet HIPAA requirements as well as government, public safety, military and financial institutions.
Let’s not forget wireless solutions that have been around for decades, such as radio frequency identification (RFID) tags used in retail, point of sale and asset tracking. These wireless supply chain solutions continue to take up a large share of the wireless market, and this upward trend in saturation will continue.
Wireless sensors are intelligent and multifaceted radio frequency devices that run the gamut of wavelength to include detection as long-range radio for backup and primary signaling applications or short range for traditional security sensing applications. RFID asset tracking and point-of-sale management provides another viable and growing adjunct. In critical infrastructure detection and especially IP video, wireless represents a world of opportunity. For the electrical contractor, it is a field that may offer the chance to grow the business with technology.EC
O’MARA is the president of DLO Communications in Park Ridge, Ill., specializing in low-voltage. She can be reached at 847.384.1916 or domara@earthlink.net. |
Silvestre De León
Silvestre De León (1802–1842) was the second son born to the influential De León family in Victoria, Texas. He became the third alcalde of Victoria. De León joined his brother-in-law Plácido Benavides to fight with Stephen F. Austin at the 1835 Siege of Béxar. He joined the rest of the De León family in New Orleans in 1836 after Brigadier General Thomas Jefferson Rusk ordered the evacuation of Mexican families from Victoria. In 1842, he returned to Victoria and was murdered by persons unknown. Texas Historical Marker number 6544 placed at Evergreen Cemetery in 1972 acknowledges Silvestre De León's contribution to Texas.
Early life
Silvestre De León was born in 1802 in Texas, the third child of empresario Martín De León and his wife Patricia de la Garza De León. Older brother Fernando De León had been born in Mexico in 1798. Sister Candelaria, who married José Miguel Aldrete, was born in Texas in 1800. They would eventually be joined by two more brothers: Felix (1806) and Agapito (1808). Five more sisters would also be born into the family: Guadalupe (1804) who married Desedrio Garcia; Maria (1810) who married Rafael Manchola; Refugia (1812) who married José María Jesús Carbajal; Augustina (1814) who married Plácido Benavides; and Francisca (1818) who married Vincente Dosal.
Alcalde
Along with his family, Silvestre was one of the co-founders of De León's Colony, becoming a colonial merchant, as well as co-founder of the city of Victoria, Texas.
De León became the third alcalde of Victoria. Martín De León had been the first alcalde, while Silvestre's brother-in-law Plácido Benavides had been the second. After Benavides built the fortress known as "Plácido's Round House" (or the "Round Top House") the two brothers-in-law engaged in several attacks against the Tonkawa and Karankawa Indian tribes.
War against Santa Anna
When Antonio López de Santa Anna revoked the 1824 Constitution of Mexico and installed his own political machine in 1833, many Tejanos were opposed to the regime. Some of the De León extended family, specifically Benavides, Carbajal and brother Fernando, joined with John Joseph Linn to fight Santa Anna's dictatorship. De León contributed livestock and equipment for the Texan resistance. In 1835, he joined the Benavides unit and fought under Stephen F. Austin during the two-month Siege of Béxar campaign to drive out Martín Perfecto de Cos.
Louisiana exile
Although many Mexicans were opposed to Santa Anna's regime, they were not necessarily in favor of Texas becoming an independent state. On July 20, 1836, Brigadier General Thomas Jefferson Rusk ordered Mexican families in the Victoria area to be evacuated in an attempt to stem any assistance being given to Santa Anna. The Carbajal, Benavides and De León families left for New Orleans, forced to abandon their money and possessions.
Death
In 1842, De León returned to Victoria to try to reclaim the family's property, and was murdered by persons unknown. He is buried at Evergreen Cemetery in Victoria, Texas. Recorded Texas Historic Landmark number 6544 placed at Evergreen Cemetery in 1972 acknowledges Silvestre De León's contribution to Texas.
Personal life
Silvestre De León married Rosalie de la Garza. The couple had two sons, Martín and Francisco. Upon Silvestre's death, the sons were adopted by Silvestre's brother Fernando De León. On April 12, 1833, they received a 4,428-acre tract of land from the Mexican government. The town of Nursery, Texas was founded in 1884 on part of that land.
Further reading
Notes
References
Category:1802 births
Category:1842 deaths
Category:19th-century Mexican people
Category:People of Spanish Texas
Category:People of the Texas Revolution
Category:People of Mexican Texas |
Akpobolokemi guilty? Verdict 16 Oct.
A Federal High Court in Lagos is to rule on Oct. 16. on the no-case submission made by Patrick Akpobolokemi, a former Director-General of the Nigerian Maritime Administration and Safety Agency (NIMASA) and others.
Akpobolokemi is charged with N2.6 billion fraud by the Economic and Financial Crimes Commission (EFCC).
Justice Ibrahim Buba fixed the date on Friday after hearing arguments on the no-case submission by the Defence Counsel, Mr Joseph Nwobike (SAN).
Former DG of NIMASA, Patrick Ziadeke Akpobolokemi (centre) being led out of court after his arraignment by EFCC in Lagos.
On Dec. 4, 2015 the EFCC arraigned Akpobolokemi alongside five others, for allegedly diverting N2.6 billion from the coffers of NIMASA between December, 2013, and May, 2015.
The anti-graft agency claimed that the funds were approved by ex-President Goodluck Jonathan for the implementation of a security project.
The accused people had pleaded not guilty to the 22 charges pressed against them.
The prosecution had then opened its case and during trial, called 12 witnesses and tendered 77 exhibits in a bid to establish its case.
After the prosecution closed its case, the accused, through their lawyers, filed no-case submissions, contending that the prosecution failed to established a prima-facie case against them to warrant their entering any defence.
Arguing Akpobolokemi’s no-case submission, Nwobike contended that the EFCC failed to link his client with the alleged diversion of funds from NIMASA.
Nwobike pointed out that his signature to such effect was never shown to the court.
He said that the first accused could not be held liable because he did not approve the security project and the money disbursed.
Nwobike also described the evidence given against the accused by the prosecution witness as mere hearsay, which he said, had no legal weight before the court.
He, therefore, urged the court to come to the conclusion that the first accused could not be called upon to enter any defence because no prima-facie case had been established against him.
In response, the Prosecutor, Mr Rotimi Oyedepo, maintained that the testimonies of the 12 witnesses and the 77 exhibits tendered had successfully linked Akpobolokemi to the alleged fraud.
He argued that being the head and chief accounting officer of NIMASA at the time of the alleged fraud, Akpobolokemi could not by any stretch of imagination claim to be innocent.
He argued that even if it was the former president that approved the security project, Akpobolokemi was the head of NIMASA at the time, who constituted a committee to handle the project and also approved funds.
He submitted that the prosecution had established that rather than its intended purpose, the funds were illegally converted to the personal use of the accused.
On his part, Mr Edoka Onyeka, Counsel for the second accused, (Agaba), argued that there was a mismatch between the offence his client was accused of committing and the section of the law under which he was charged.
He noted that in the circumstance, the court could only dismiss the case and free his client.
Again, in response, Oyedepo maintained that Agaba was properly charged, adding that even if there was error, it could not be a basis to discharge him.
The other defence counsel, Mr Seni Adio (SAN) and Ige Asemudara, similarly, urged the court to hold that the prosecution failed to link their clients to the alleged crime and urged the judge to discharge them.
After entertaining arguments from the parties, Justice Buba fixed Oct. 16 and Oct. 17 for ruling.
In the 22-count charge, the EFCC alleged that the accused induced the Federal Government to approve and deliver to NIMASA N795 million under the false pretence that the sum represented the cost for the implementation of the Security Code in Nigeria. |
Q:
new sys.path in python
I am having difficulties importing a script from a directory that is not stored in sys.path. I have a script saved as test.py in a directory called "Development" and am trying to add the development directory to sys.path so I can import a function from my current script called index.py.
Here is my code for index.py:
import sys
sys.path.append ('/Users/master/Documents/Development/')
import test
printline()
printline() is defined in test.py as:
def printline():
print "I am working"
Here is the error I am receiving:
Traceback (most recent call last):
File "/Users/master/Documents/index.py", line 6, in <module>
printline()
NameError: name 'printline' is not defined
Any ideas on how I can get this to work?
Thanks.
A:
If you do import test, the function you defined is imported into its own namespace, so you must refer to it as test.printline().
test may be the name of another module in your Python path, and since the directory you insert is appended to the path, it will be considered only if test is nowhere else to be found. Try inserting the path to the head of sys.path instead:
sys.path.insert(0, "...")
In a vanilla Python, the culprit is likely #1, but if you do not want your scripts to break in the future, you should also get used to #2.
|
Shifting income sources of the aged.
Traditional defined benefit pensions, once a major source of retirement income, are increasingly giving way to tax-qualified defined contribution (DC) plans and individual retirement accounts (IRAs). This trend is likely to continue among future retirees who have worked in the private sector. This article discusses the implications of those trends for the measurement of retirement income. We conclude that Census Bureau's Current Population Survey (CPS), one of the primary sources of income data, greatly underreports distributions from DC plans and IRAs, posing an increasing problem for measuring retirement income in the future. The CPS and other data sources need to revise their measures of retirement income to account for periodic (irregular) distributions from DC plans and IRAs. |
Women's Soccer
Lady 'Canes shutout by No. 19 Armstrong Atlantic, 4-0
The Georgia Southwestern women's soccer team dropped a 4-0
decision to No. 19 Armstrong Atlantic State University on Saturday
afternoon in Savannah.
The Lady Hurricanes were held without a shot.
Kristin Burton scored her PBC-leading 14th goal of the season in
the 6th minute to put the hosts up 1-0. Erin O'Rourke notched
goals in the 23rd and 59th minutes, then assisted Elizabeth
Kerkhoff, who rounded out the scoring for the Pirates at
the 60:34 mark.
Southwestern goalkeeper Amber Bahri stayed busy and recorded
nine saves. Three goalkeepers split time for AASU. |
Q:
Prove the increasing union of ideals is an ideal
prove that $I_{1} \subseteq I_{2} \subseteq I_{3} \subseteq....$ are ideals of $R$ then $\bigcup_{n =1} I_n$ is an ideal of $R$. I am having a hard time picture this in my mind. Help anyone.
A:
Let $I_1 \subseteq I_2 \subseteq \cdots$ be an ascending chain of ideals in a ring $R$. Define $I = \bigcup_{n = 1}^\infty I_n$. We first show that $I$ is an additive abelian group:
Let $x, y \in I$, then $x \in I_m$, $y \in I_n$ for some $m, n \in \mathbb N$. Since we are in an ascending chain of ideals, either $I_m \subseteq I_n$ or $I_n \subseteq I_m$. Suppose, without loss of generality, that $I_m \subseteq I_n$, then $x, y \in I_n$. Since $I_n$ is an ideal, it is an additive abelian group, and in particular it is closed under addition, that is, $x + y = y + x \in I_n$. Hence $x + y \in I$ and we also get that $I$ is commutative under addition.
Let $x \in I$, then $x \in I_n$ for some $n \in \mathbb N$. Since $I_n$ is an ideal, it is an additive group, so $-x \in I_n$. Thus $-x \in I$.
Observe that $0 \in I$ since $0 \in I_1$ and $I_1$ is an ideal and hence additive abelian group, so it has an additive identity: $0$.
Now we show that $I$ absorbs elements from $R$. Since we are working in a commutative ring with identity, we don't have to worry about left and right ideals. Let $d \in R$ and $i \in I$ be arbitrary. Since $i \in I$, then $i \in I_n$ for some $n \in \mathbb N$. Since $I_n$ is an ideal, it has the absorption property, so $id \in I_n$ and hence $id \in I$. Conclude by definition that $I$ is an ideal.
|
Category Archives: Preparation
So, you’ve had that call, and you have time, maybe a day, to prepare. What to do? Many teachers experience feelings of stress on supply, especially if it’s going to be their first day in a new school.
Here are some practical ideas to help your day run more smoothly, and to keep you busy while waiting to set off:
Do you know where the school is? If not, take time to go there. It really does save a lot of anxiety on the morning of the supply day.
Save the school’s telephone number on your mobile phone. You never know what’s going to happen that morning. Traffic, transport etc. and I’ve actually had to call the school once to ask them to let me in as no-one was answering the door!
Get your clothes and lunch ready the night before. And then set two alarms.
Get your bag ready. Include chocolate, a couple of bottles of water, half a dozen pencils and your trainers. Read Sarah’s article ‘What’s in your supply bag?‘ for more ideas.
Have in mind how you are going to introduce yourself to the children, giving them your name and your expectations for the day.
Be prepared to be faced with no planning. This should not happen if you have been pre-booked, but unfortunately sometimes it does. In which case, as long as you identify one literacy lesson, one numeracy lesson, one foundation lesson (don’t assume you’ll be let loose in the hall for gymnastics or in the ICT suite!) and one time-filler (circle time, personal research into their geography topic, etc.) which you can deliver with few resources, you’ll do okay! If there is planning, don’t enforce your own planning.
Take time to learn the names of the Head Teacher, Deputy Head, Class Teacher you are covering and the Secretary etc., perhaps from the school website.
Tips and hints on how to make the most of the time you have before you arrive at school.
If you have any other ideas you would like to add to this list, please contact us. |
Cheetos, the brand that took cheese curls mainstream. Mike Mozart/CC BY 2.0
A version of this post originally appeared on Tedium, a twice-weekly newsletter that hunts for the end of the long tail.
They change the color of our skin. They get stuck in our teeth. But for some reason, we can’t stop eating cheese curls, the puffiest snack food ever created.
But these corn-and-powder snacks didn’t just fall like manna from the sky into our bowls, always there for us ahead of our Bojack Horseman marathon.
The story of the cheese curl is one of the more unusual creation stories in snack-food history, starting, of course, in Wisconsin, an agricultural hub that has given us a lot of food innovations over the years. (Three words: fried cheese curds.)
Some of these were intentional, others not, but the accident that made the cheese curl proved hugely fruitful for Flakall Corporation, a Beloit, Wisconsin animal feed manufacturer whose owners later switched gears to producing snack foods, all thanks to the way the company cleaned its machines. The company’s approach to producing animal feed was to put the material through a grinder, effectively flaking out the corn to get as much material as possible from the grain, as well as to ensure cows weren’t chewing any sharp kernels.
“This flaking of the feed is of advantage because it avoids loss of a good percentage of material which otherwise is thrown off as dust, and gives a material which keeps better in storage by reason of the voids left between the flakes, such that there can be proper aeration, not to mention the important fact that flaked feed is more palatable and easily digested by the animal,” the firm stated in a 1932 patent filing.
The grinder did its job, but it wasn’t perfect, and periodically required cleaning to ensure it wouldn’t clog. One strategy that Flakall workers used was to put moistened corn into the grinder. During this process, however, something unusual happened: the moist corn ran directly into the heat of the machine, and when it exited the grinder, it didn’t flake out anymore—it puffed up, like popcorn, except without the annoying kernels.
A 1932 patent for a feed grinder, a process that led to the cheese curl. Google Patents US1987941A
By complete accident, Flakall had invented the world’s first corn snack extruder.
Edward Wilson, an observant Flakall employee, saw these puffs come out of the machine, and decided to take those puffs home, season them up, and turn them into an edible snack for humans—a snack he called Korn Kurls.
You’re noshing, in other words, on repurposed animal feed.
This state of affairs led to the second patent in Flakall’s history, a 1939 filing titled “Process for preparing food products.” A key line from the patent:
The device preferably is designed so as to be self-heated by friction between the particles of the material and between the particles and the surfaces of contacting metal and to progressively build up pressure during the heating period. Thus the uncooked raw material, having a predetermined moisture content is processed into a somewhat viscous liquid having a temperature high enough to cook the mass and heat the water particles to a temperature high enough for evaporation at atmospheric pressure but being under sufficient pressure to prevent it.
If that’s a little complicated to understand, a 2012 clip from BBC’s Food Factory does the trick.
In the video, host Stefan Gates takes an extruder and connects it to a tractor, making the extruder move so fast that it puffs the corn out in an extremely fast, extremely dramatic way.
Clearly, Flakall had something big. The firm eventually changed its name to Adams Corporation, which helped take some attention off the fact that it was selling a food product to humans that was originally intended for cows.
Flakall wasn’t the only early claimant to the cheese curl throne, however. In Louisiana, a firm called the Elmer Candy Corporation, developed a product eventually called Chee Wees, that they said was the actual first. And later the New York-based Old London Foods came out with its own popular variation, the Cheez Doodle, in the late 1950s.
But the most notable brand that still sells cheese curls wasn’t the first mover, just the one with the best marketing and distribution.
That would be, of course, Cheetos, which came about in 1948. While Cheetos came along later than its competitors, the Frito company’s variation quickly overtook the market, in part because Cheetos had gained national distribution due to the prior success of its namesake.
That company’s founder, Elmer Doolan, worked out a deal with H.W. Lay and Company to market Cheetos to the broader market. It quickly became a massive hit.
The success of Cheetos was so impressive that it played a large role in the merger of Frito with Lay in 1961, as well as the company’s later merger with PepsiCo just four years later.
And that success continues to the modern day. Cheetos are by far the most popular brand of cheese curls in the United States: According to Statista, the Cheetos brand had an estimated $969.5 million in sales in 2016, with the next most popular brand being Frito-Lay’s more-upscale Chester’s brand, which garnered up just 7 percent of Cheetos’ total sales.
These days, here are two main varieties of Cheetos—crunchy, the most common kind, and puffed, which only came about in 1971 or so. Each is made through different variations on the corn snack extruder process.
Yet despite the early success of the Cheeto, its mascot, Chester Cheetah, didn’t come about until well after the product’s launch.
These days, Chester Cheetah is trying to goad Beyoncé on Twitter just like every other advertising mascot worth its weight in salt, but there was a time that the cheetah was seen as so impressive that there was chatter it could become a cartoon lynchpin.
In fact, Frito-Lay got pretty far down the road with Fox in turning the mascot, launched in 1986, into a cartoon. Yo! It’s the Chester Cheetah Show, as the toon would have been called, was developed as a potential part of Fox’s Saturday morning cartoon slate. (CBS also considered making the show, but rejected it.)
Problem was, advocacy groups were not happy with the idea for the show, because of the fact that its roots were very clearly as advertising. Action for Children’s Television (ACT) and the Center for Science in the Public Interest (CSPI) were among the groups that petitioned the FCC regarding the program.
“His only previous television appearances, indeed his entire existence, have been in traditional commercial spots designed to sell a product,” the FCC petition stated, according to the New York Times.
The 1942 patent for the preparation of cheese curls. Google Patents US2295868A
ACT noted that it was rare to petition the FCC about a cartoon only in the planning stages, but felt it had to speak up due to what it felt was the unprecedented nature of the idea.
It didn’t help that Kraft was trying to sell Cheesasaurus Rex, its macaroni and cheese mascot, as a TV show around the same time.
Just a few weeks after the controversy blew up, Frito Lay and Fox shelved the idea, with Fox claiming that differences in creative control and long negotiations killed the show—not protests.
“I still believe he’s one of the best characters since Bugs Bunny, and the fact he is associated with a product was irrelevant to us,” Fox Kids President Margaret Loesch told the Times.
Frito Lay spokesman Tod MacKenzie, in comments to the Associated Press, was a bit more honest.
“Since Chester came out in 1986, he’s been wildly popular,” MacKenzie told the AP. “We don’t want to jeopardize the job he’s doing here.”
The book Saturday Morning Censors: Television Regulation Before the V-chip, published in 1998 by Duke University Press, pointed out that while ACT didn’t officially win the case with the FCC—which, during the Bush era, was in no mood to censor a show that wasn’t indecent—the group acted like it did, especially after its efforts also killed off the Cheesasaurus Rex show.
“We feel we have zapped, for the time being, the problem of logos turning into half-hour programs,” ACT President Peggy Charred stated at the end of the controversy.
But you still have to wonder what might have happened if the show got the green light after all this. (This wiki page certainly does.) Would we be eating fewer cheese curls? Maybe more?
Clearly, the cheese curl has come a long way from the days when it was a happy agricultural accident.
But one firm that didn’t see the success of the Cheeto is the firm that was Flakall. Well, at least not directly. Its successor organization is a firm called Maddox Metal Works, which literally makes machines designed to manufacture corn-based foods. Here’s the one for cheese curls.
The company acquired Flakall’s successor company, Adams International, in 1993. It was an acquisition that makes a lot of sense. In the 1950s, Maddox Machine Shop worked directly with the Frito company to build the machinery used to produce the company’s snack foods, and it grew from there.
In Beloit, Wisconsin, there is a Frito-Lay factory—a big one, one that the company has invested millions of dollars into. One that makes extruded snacks.
I’d like to think that a Frito-Lay executive put the factory there because they wanted this story to come full circle.
A version of this post originally appeared on Tedium, a twice-weekly newsletter that hunts for the end of the long tail.
Gastro Obscura covers the world’s most wondrous food and drink.
Sign up for our email, delivered twice a week. |
Q:
error: assignment makes integer from pointer without a cast
I wanted to do a scan chain in following order but I face to an error :
error: assignment makes integer from pointer without a cast
What is wrong with my assignments?
/****************************************************/
void * x1_in[1024];
int x_out[1024];
double a1, a2;
for (k=0; k<init_num; k++) {
a1 = *(x1_in + k);
a2 = *(x1_in + (k+1));
x_out[k] = a1 + a2;
}
/****************************************************/
A:
void * x1_in[1024]; is a pointer to an array which is equal to a pointer, so you have a pointer to a pointer.
Dereferencing a1 = *(x1_in +k); returns a pointer, you need a1 = *(double*)(x1_in +k);
|
/* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.flowable.bpmn.model;
/**
* @author Tijs Rademakers
*/
public class FormValue extends BaseElement {
protected String name;
public String getName() {
return name;
}
public void setName(String name) {
this.name = name;
}
@Override
public FormValue clone() {
FormValue clone = new FormValue();
clone.setValues(this);
return clone;
}
public void setValues(FormValue otherValue) {
super.setValues(otherValue);
setName(otherValue.getName());
}
}
|
Osteoradionecrosis: predisposing factors and outcomes of therapy.
Eighty-three episodes of osteoradionecrosis are reported. Of those episodes affecting the mandible (78), 23 (29.5%) required radical resection. The most common precipitating factors were postradiation extractions (22/83), periodontal disease (19/83), and preradiation extractions (17/83). Those episodes initially located within the zone of attached mucosa fared well with conservative measures while those initially located beyond the zone of attached mucosa fared poorly. In bone necroses where the external radiation dose to the affected bone exceeded 7,000 rad, the mandibular resection rate was high (44%). The most effective way of resolving advanced bone necroses was achieved with a course of hyperbaric oxygen therapy combined with a surgical sequestrectomy. |
Crown and zloty seen firming, forint giving up some ground: Reuters poll
Czech Crown coins and notes are seen in this picture illustration taken April 1, 2017. REUTERS/David W Cerny/Illustration
March 7, 2019
By Sandor Peto
BUDAPEST (Reuters) – The crown is expected to gain almost 2 percent against the euro in the coming year as the Czech central bank keeps raising interest rates to fight inflation, a Reuters poll found.
According to a March 1-6 Reuters poll of analysts, the crown is expected to strengthen to 25.185 versus the euro in a year from its mid-Wednesday level of 25.620.
The Czech central bank, Central Europe’s most hawkish, raised its main rate five times in 2018 to 1.75 percent, before pausing in December and February. Its next meeting is on March 28, a day before Britain is due to quit the European Union.
Rate setter Tomas Holub has said that Britain exiting without an agreement with the EU could prompt a delay in further tightening, but one or two rate increases remain possible this year.
Another rate setter, Ales Michl, has said it could be a reason not to lift rates if an economic slowdown in Germany, a key export market of the region, worsens.
Growing certainty over the details of Brexit and better economic data from the euro zone could help the crown appreciate, analysts said.
“With naturally stronger koruna (crown), there may be no need to hurry with the interest rate hike in March,” said Jan Bures, the chief economist of Patria Finance.
An economic slowdown in the euro zone will be closely watched for threats to the region’s exports and a delay in the European Central Bank’s monetary tightening, which makes Central Europe’s assets relatively more attractive.
The slowdown is likely to affect the region’s economies, but Czech output expanded faster in the fourth quarter than the central bank expected, at a 2.8 percent annual rate. Polish and Hungarian growth is near 5 percent. Inflation trends, however, have diverged in the region.
Rising inflation in Hungary has led to a hawkish shift in the central bank’s rhetoric after seven years of loose policy. Polish inflation, on the other hand, was running at a 0.9 percent annual rate in January, well below the Polish central bank’s 1.5 to 3.5 percent target range.
Poland’s central bank left interest rates unchanged on Wednesday. The Hungarian bank is widely expected to start to tighten liquidity at its meeting on March 26.
“There will be no huge monetary policy turnaround,” said Orsolya Nyeste, an analyst at Erste Group in Budapest. “We could call it a shift to ‘loose’ from ‘ultraloose’ … and the narrowing trade surplus will weigh on the forint.”
The median estimate of analysts in the poll foresees 0.6 percent strengthening in the forint against the euro in the next 12 months to 317.5. The zloty is seen gaining 1.1 percent to 4.255.
A fiscal stimulus plan announced by the Polish government late last month could have inflationary impacts. The Polish central bank is unlikely to raise rates this year but may start next year, analysts said.
The zloty’s expected gains over the next year would only help it catch up with the forint, which has outperformed this year, gaining about 1.8 percent.
The leu has been the worst regional performer. It has shed almost 2 percent since December as the government shocked markets with new taxes on banks and energy firms and other measures.
Even though the government is expected to change some of those measures, the leu is forecast to weaken 1 percent to 4.795 versus the euro in the coming year. |
Q:
Changing a TextView in another class from a Service
I have two classes, one is a standard activity, the other a service. I would like the service to update a TextView (via .setText()) of the Activity on certain events that happen within the service.
I've tried to achieve this by programming something like a setter-method inside the Activity-Class, but TextViews don't accept a static-reference, and when I try invoking an instance of the Activity-class instead (via MyActivityClassName aVariable = new MyActivityClassName();), I get a NullPointer Exception, even though the View in questions is visible at the time of the call.
Could anyone tell me what I'm doing wrong :-)? It is probably more of a basic Java question than an Android-one, but since it might have to do with the nature of Android-services, I've still added the android-tag.
Thanks for your help!
A:
I would like the service to update a
TextView (via .setText) of the
Activity on certain events that happen
within the service.
I would strongly recommend greater logical decoupling. Have the Service tell the Activity to update the TextView.
You can do that via a broadcast Intent, or by having the Activity provide a listener object that the Service calls. In either case, be sure the Activity detaches from the service (unregisters the listener or broadcast Intent receiver), lest you cause a memory leak.
And, of course, this only works if the activity is actually running.
|
10/19/2011
Amnesty: States foreign armed the Arab rulers
A report by Amnesty International (Amnesty) Russia and the United States and European countries ignored the concerns about human rights violations in the Arab world, and sold large quantities of weapons of repression of the governments in the Middle East and North Africa in recent years.The director of arms control in the organization Brian Wood said that "Arab spring reaction of the people who were stripped of their rights by force, forced by governments and security forces on the use of tools available from Europe and North America, Russia and others."The FAO has identified both from Austria, Belgium, Britain, Bulgaria, Czech Republic, France, Germany, Italy, Russia and the United States as the main supplier of the five which saw popular protests this year against the ruling elites in Arab countries.Amnesty International has also identified ten countries were licensed for the supply of arms to the government of Muammar Gaddafi since 2005, including Britain, France, Belgium, Germany, Italy, Russia and Spain.The organization said that Russia's largest arms supplier to Syria, where you go 10% of the exports of Russian weapons there. Wood added, "It is money and short-sighted by the rule of law and respect for human rights."Examines the report of Amnesty International arms transfers to Bahrain, Egypt, Libya, Syria and Yemen since 2005.
TreatyThe organization said that the failure showed the need for a meaningful international treaty in the field of arms trade to stifle the supply of arms to countries that may be used against their people.She said she want to review each case of proposed transfers of weapons to stop an export if there is a significant risk to human rights violations.Believes that a ban on weapons is often only when the damage occurred.And comment on the Amnesty International hopes talks amend the Arms Trade Treaty which is scheduled to resume in the United Nations in February next.Wood said that 2012 will be a crucial year of the Treaty, is "life or death," adding, "I think that we will have a treaty, but the question is: will equal the paper it's written on?".The report comes at a time in which it urged human rights groups, the U.S. Congress to prevent the deal to $ 53 million for the sale of weapons to Bahrain, where more than 30 people in protests.On the other hand, said a spokesman for the Ministry of Foreign Affairs Mark Toner Tuesday that several procedural steps remain before the United States before it can deliver the arms to Bahrain.Toner noted that the process of selling related equipment "for purposes of external defense," but he acknowledged that a number of members of Congress have expressed concerns about the deal.Britain said it plans to tighten export rules to stop sales of arms and ammunition and gas lacrimal countries where security conditions are a concern. |
Q:
Find $\lim_{n \to \infty} M(n)/n$ where $M(n)$ is the largest integer satisfying a binomial inequality
Let $M (n) $ be the largest integer such that ${m \choose n-1}>{m-1 \choose n} $, then what is the value of $\lim _{n \to \infty} \frac {M (n)}{n} $?
Attempt: After solving and simplifying the given condition, I get a quadratic in $m$ as $m^2-m (1+3n)+n^2-n < 0$. Solving for $m$ we have $m=\frac {(3n+1) \pm \sqrt {5n^2+10n+1}}{2} $ thus I get two values for limit as $\frac{3 \pm \sqrt {5}}{2} $ . As both are positive I can't discard any value straight forward. So what should be done to discard one value or are both values the answer? Note that there can be more than one correct answer.
A:
Note that from the condition we get the ratio of the two binomials to be $\frac{mn}{(m-n+1)(m-n)}$ so our condition simplifies to $(m-n+1)(m-n) - mn <0$. That is $m^2 - 3mn + m - n + n^2< 0$. (note that this is different to your condition). We can simplify this to $m^2 - m(3n-1) + n^2 - n < 0$. This quadratic has roots $$\alpha,\beta = \frac{3n-1 \pm \sqrt{5n^2 - 2n+1}}{2}$$ where $\alpha$ corresponds to the root larger root and $\beta$ the smaller one. (Note that this differs from your roots as well).
It is clear that $m$ must lie between $\beta < m < \alpha$. Since $\alpha - \beta= \sqrt{5n^2 - 2n +1} > 1$ then there is at least one integer between $\beta$ and $\alpha$. So $M(n)$ is the greatest integer in this interval. That is $\alpha - 1 \leq M(n) \leq \alpha$ or equivalently $\frac{\alpha - 1}{n} \leq \frac{M(n)}{n} \leq \frac{\alpha}{n}$.
Now we squeeze $$\lim \frac{\alpha - 1}{n} \leq \frac{\lim M(n)}{n} \leq \lim \frac{\alpha}{n}$$
But since $$\lim \frac{\alpha}{n} = \lim\frac{3 - \frac{1}{n} + \sqrt{5 - \frac{2}{n} + \frac{1}{n^2}}}{2} = \frac{3+\sqrt{5}}{2}$$ and $\lim \frac{\alpha - 1}{n} = \lim \frac{\alpha}{n}$ we squeeze $M(n) \to \frac{3+\sqrt{5}}{2}$.
|
Chlorinated hydrocarbon and PCB residues in tissues and lice of northern fur seals, 1972.
DDT, dieldrin, and PCB contents of tissues and the sucking lice of the northern fur seal (Callorhinus ursinus) were studied in samples collected in July 1972 in the Pribilof Islands, Alaska. They included the analyses of two nursing cows and their two newborn pups, three 2-month-old pups, and the sucking lice inhabiting these animals, Antarctophthirus callorhini and Proechinophthirus fluctus. The sigmaDDT content of fat tissue was 5.2, 5.6 and 63 mug/g (-/x) for cows, newborns, and 2-month-old pups, respectively. Dieldrin appeared at trace levels. PCB residues (Aroclor 1254) were 5.8, 5.5, and 33 mug/g (-/x), respectively. The sigmaDDT content of blood was less than 0.01 mug/g for cows and newborns and 4.6 mug/g for 2-month-old pups. PCB's were found only in trace amounts in the blood of all animals except one 2-month-old pup which contained 3.4 mug/g. Lice contained 0.2-6 percent, respectively, of the sigmaDDT and PCB's detected. All residues were expressed on a wet-weight basis. Two-month-old pups had far higher residue levels than had cows. A high percentage of sigmaDDT occurred as the DDE metabolite: 60 percent in cows and newborn pups and 90 percent in 2-month-old pups. |
Sun Apr 01 05:41:27
I mean, in substance Sinclair isn't any more disgusting than CNN or MSNBC; their news anchors simply fly under multiple banners instead of a single one. It's disingenuous and rather disturbing to see so many people reading from the same script, but it's wrong to single Sinclair out when other news companies that reach millions of viewers likewise have their own internal marching orders.
The bigger problem is the long-running oligarchization of the media, which has allowed a mere six corporations to own 90% of the entire industry. There is nothing new in this, it's been going on for two decades now. Telecommunications Act of 1996 really fucked everything up.
Of course the Trump administration was never likely going to help fix the problem. But it's not like any mainstream Republican or Democrat was ever going to seriously fight against this trend either. Narrowing this story to a "fuck Sinclair Group and fuck Ajit Pai" rant seriously overlooks just how diseased mainstream media has become.
Paramount
Member
Sun Apr 01 06:19:23
The president of Baltimore-based Sinclair Broadcast Group Inc., which owns the local Fox television affiliate, was arrested in 2004 and charged with committing a perverted sex act in a company-owned Mercedes.
Smith and Mary DiPaulo, 31, were charged with committing an unnatural and perverted sex act.
--
Unnatural sex act? Did they have sex with a goat?
--
The Sinclair Broadcast Group has been controversial due to Smith's broadcasting decisions. Smith airs what many believe to be only right-wing viewpoints and has cancelled news reports that do not lend themselves to support of the President George W. Bush White House, as with the Ted Koppel Nightline broadcast in 2004 on soldiers killed in Iraq.
--
In a speech to business executives in New York (on December 16, 2016), Jared Kushner said that Donald Trump’s campaign had struck a deal with Sinclair to provide extra access and coverage. Kushner said the agreement gave Sinclair Broadcasting stations special access to Trump during the campaign and in exchange, Sinclair would broadcast their Trump interviews across the country without commentary.[7]
Sinclair Broadcasting has hired Boris Epshteyn as their chief political analyst. Mr. Epshteyn was previously a spokesperson for Donald Trump's campaign. All Sinclair stations are required to air Mr. Epshteyn's commentary nine times per week. [8] He was born in Moscow, Soviet Union and emigrated to the United States as a child.[9]
Sun Apr 01 06:30:24
Looks to me that the USA has indeed been infiltrated by Russians. Russian Jews. But yea, let's blame Putin and not Netanyahu.
Rugian
Member
Sun Apr 01 06:44:42
jergul,
That was a quotation.
Rugian
Member
Sun Apr 01 06:52:56
"So you are basically saying that there is a problem that Jews controls too much of your media."
Oy vey
Paramount
Member
Sun Apr 01 07:06:47
Maybe a bit off topic, but:
"In an interview with NBC previewed on Saturday, Russian President Vladimir Putin said that some of the people recently indicted by Special Counsel Robert Mueller for disrupting the 2016 U.S. election might be — gasp — Jewish.
[...]
Maybe they’re not even Russians,” he said. “Maybe they’re Ukrainians, Tatars, Jews, just with Russian citizenship. Even that needs to be checked. Maybe they have dual citizenship. Or maybe a green card. Maybe it was the Americans who paid them for this work. How do you know? I don’t know.”
Sun Apr 01 08:40:46
Putin should know what he is talking about. He is not stupid.
Now, when all these people are hurting Russia – how much more will Russia take until they will have to send out agents to eliminate these troublemakers?
Hot Rod
Revved Up
Sun Apr 01 08:46:06
As long as they are not in the same market and they tell the truth I don't see a problem.
I'm assuming their local news is relevant.
Aeros
Member
Sun Apr 01 10:12:54
I would argue old media is consolidating under a few banners in order to survive. The internet is eating their fucking lunch. You can go onto youtube and have dozens of competing discussions on any issue from gun rights to whether or not the earth is flat. I can't remember when the last time I watched my local affiliate was because it just does not compare to that. |
Killing C.I.A. Informants, China Crippled U.S. Spying Operations - easilyBored
https://www.nytimes.com/2017/05/20/world/asia/china-cia-spies-espionage.html?ribbon-ad-idx=3&rref=world/asia
======
Boothroid
I wonder whether humanity will ever ascend to a level beyond realpolitik?
~~~
clamprecht
I wonder if it can be proved one way or the other, whether it's even possible
to ascend beyond it.
~~~
gtt
I think, individuality is a cornerstone of realpolitik. Remove it and you will
have unified human hive. Does it worth it?
|
Q:
How to force the deletion of a locked file that has no locking handle on Windows?
When I try to delete the file, using the GUI it says
The action cannot be completed because the file is open in another
program
And using the del /f /q command line it says
Access is denied
I have tried unlocking the file with Unlocker, as well as trying to locate which process is using the file with the Resource Monitor or the Process Explorer, but no locking handle was found in either case.
I am able to rename or move the file, but not to delete it or change its content.
A:
We are always glad to help, but just to double-check (since you didn't elaborate), are you certain that this isn't a critical operating system file?
If you are confident that this isn't an essential OS or application file, you can always utilize a Linux Live CD of some type and navigate to the file accordingly. Under those circumstances, it won't be constrained by the Windows operating system and can easily be deleted.
If you are trying to completely delete the Windows.old folder, that is understandably frustrating. I have encountered similar problems following a Windows 10 upgrade, and was finally able to delete it by booting into a command prompt. Try utilizing the following method:
While logged into Windows 10, open the Run window by holding + R
Type shutdown /r /o /f /t 00 in the subsequent window, then press Enter
After the system reboots, click on Troubleshoot
Click on Advanced Options
Click on Command Prompt
The ensuing window will ask you to Choose an account to continue
Select a local administrator account, type in the appropriate password, and click on Continue
Within the command prompt, type diskpart and press Enter (as seen below)
In the command prompt, type list volume and press Enter
From the listed volumes, look for and verify the drive letter of your Windows 10 drive.
In the command prompt, type exit and press Enter
Ensure that you substitute "D" in the command below with the actual drive letter of your Windows drive as displayed from step 10 (above).
To delete the "Windows.old" folder, type RD /S /Q "D:\Windows.old" and press Enter
Close the command prompt window.
Back at the Choose an option window, click on Continue to restart the computer.
(Source: How to Delete Windows.old Folder in Windows 10)
|
Friends
Saved Events
Favorite Places
Saved Stories
Custom Lists
Recent Comments
Well this is NOT the bar at Dorchester Lanes. This is a small little road side bar. Very nice people with A LOT of regulars. It is a private club. When we showed up we had to pay to join and wait 24 hours. But there was a nice few people that signed us in as guests. Darts, Pool and shuffle board are on the games menu here. The Karoke was not really a stage area but more of a anywhere in the bar kinda thing. Kinda Neat. If your not a smoker do not go. Other than that a nice place. |
Enforcing social distancing carried the full force of the law in Mount Carmel, Pennsylvania in October 1918. Pandemic influenza arrived in the Northumberland County mining community in the days following a Liberty Loan Drive parade to raise funds the American war effort in Europe.
With the development of more than 100 cases of influenza and resulting pneumonia in Mount Carmel, the town’s board of health announced the following regulations on October 5, 1918:
The Board of Health of Mount Carmel announces that all homes where Spanish influenza or pneumonia exist are under strict quarantine. No persons are permitted to visit the sick except physicians or nurses and only when death is near will near relatives be permitted to visit the patient.
Emphasis is given to the general quarantine issued yesterday and no public assemblages of any character will be permitted until further notice.
It is impossible to state the extent of the epidemic in Mount Carmel at the present writing. There are practically 100 well-defined cases of influenza, but in addition there are scores of pneumonia cases which undoubtedly were caused by influenza.
The previous day, the board of health had closed all theaters, restaurants, saloons, churches, and other places where people could congregate.
The board explicitly referenced the stores and public places on Oak Street in Mount Carmel and told people to avoid congregating in this area.
Don’t Congregate on Oak Street
Dr. R.W. Montelius, President of the Board of Health, announces that while Spanish influenza quarantine is in force the congregating of people on Oak Street, especially between Third and Fifth, will not be permitted. The crowds must keep moving and the police officers will see that they do move, as these crowds are a menace to health.
With these instructions apparently being ignored, the board had a notice published in the newspapers that threatened arrest if they ignored these new regulations:
Arresting for Congregating
The borough police are following out rigid instructions not to permit any congregating on Oak Street or any other street here and in order to show that they meant business had to make an arrest Saturday evening.
As the outbreak in Mount Carmel worsened, as it did throughout the Coal Region, deaths began to mount. Every day, new death notices were posted in local newspapers. With these deaths, understandably, people sought to have funerals. But these gatherings were also banned by the board of health’s regulations to keep people socially distant.
From the Mount Carmel Item, October 14, 1918:
Private Funeral Rule Disregarded
The rule of the Health Board calling for strictly private funerals is not being observed, or at least has not been, in many cases.
Health Officer Gross informed the Item that as many as fifty people have congregated in a single room where lay the corpse of a man who died from Influenza.
From now on funerals will be under the strict surveillance of the State Police and all offenders of the law will be arrested.
Others in Mount Carmel were disregarding the rules against gathering in barrooms, saloons, and grog shops.
From the Item, October 15, 1918:
Congregated in a Bar-room; Four Arrested
By Corporal Parker and Fined by Justice Hughes, Proprietor Has Influenza
Congregating in barrooms despite the ruling of the State Board of Health continues here with the result that the State Police are active making arrests for the violation.
Corporal Arthur Parker of the local detachment of the State policy had George Pennypacker, butcher of Lavelle; Alex Kachalovich, Anthony Kutocus and Joseph Kulziski, arraigned before Justice Hughes for congregating in the saloon of Frank Tiknock, 140 South Locust Street.
It was charged the offense was committed on Saturday, entrance having been gained by way of the back door. The butcher was fined $25.00 and the costs and the other three defendants were fined $10.00 and the costs.
The proprietor Frank Tiknock, is bedfast, suffering from Spanish influenza and will be arraigned when he recovers for breaking the quarantine. The officials say that his wife was bar tender to the congregators.
But having the police on the streets came at costs. By October 19, Mount Carmel only had one police officer, John Rix, left on the beat. All the rest had fallen ill with influenza, including the borough’s chief of police.
The state police took up the charge of enforcement of the ban on public gatherings in the wake of the borough police department’s manpower shortage. On their rounds on the evening of October 23, they heard a commotion inside the town’s Exchange Hotel.
From the Item:
Exchange Saloon Raided
By State Police, who find 18 customers congregated – Case tonight at Hughes
The state police strolled over to the exchange last evening and discovered that the quarantine law was also being broken in that town by a hotel man.
They raided the hotel of Joseph Horosko, and found 18 customers inside. Proprietor and customers will be given a hearing before Justice Hughes tonight. This is about the sixth hotel proprietor who has been arrested here and at Exchange for breaking the law.
By the end of the month, the quarantine was lifted and the costs were counted. Mount Carmel had experienced thousands of cases of influenza, but due to strict enforcement of the quarantine, fewer lives were lost in Mount Carmel as compared to neighboring communities like Shamokin, where the outbreak was much more severe and deadly.
Featured Image: Police with masks during the 1918 influenza pandemic, Seattle, Washington (National Archives)
Read more of our coverage of the 1918 influenza pandemic by clicking here
Follow Blog via Email Enter your email address to follow this blog and receive notifications of new posts by email. |
1. Field of Invention
The invention relates to systems and methods for deskewing a substrate.
2. Description of Related Art
There are a variety of transport and deskew systems in use that transport and register various substrates, such as copy sheets. In many deskew systems, such as those often found in copiers, facsimiles, and printers (i.e., reproduction systems), drive mechanisms often include at least one driven elastomer-covered roll backed by a hard idler roll to form a roll pair defining a nip region there between. A substrate, such as copy paper, provided to the nip region is advanced by rotation of the roll pair, specifically rotation of the driven roll, which causes corresponding linear movement of the substrate, such as paper.
Paper skew is the angular deviation of the longitudinal axis of the substrate in the process direction and/or the angular deviation of the lateral axis of the substrate perpendicular to the process direction. The lateral edges are the edges of the sheets that are substantially parallel to the process direction. The process edges are edges of the sheets that are substantially perpendicular to the process direction. The process edges may be referred to as the leading edge and the trailing edge.
In order to remove the skew, a leading edge of a sheet, provided at a nip region of a downstream roll pair, is stopped while an upstream roll pair continues to advance the sheet to thereby form a buckle. The buckle ensures that the leading edge straightens out against the nip region of the downstream roll pair. The substrate is then pulled straight through the nip after the buckle has been formed and the skew has been removed.
Conventional reproduction systems typically include three supply paths that are used to supply sheets to a print engine. The supply paths typically include (1) a path that transports sheets from a sheet supply tray that stores a plurality of sheets within the reproduction system, (2) a path that transports sheets from a multi-purpose tray that stores sheets on a tray attached to an outside of the reproduction system and (3) a path that returns printed sheets to the print engine so that double sided printing can be performed.
Typically, there are separate deskew systems for each path in order to correct deskew errors due to paper skew, process edge deskew errors in the process direction and/or lateral edge deskew errors. Each of the deskew systems include a one-sided buckle chamber that is bordered on one side with the deskew nip and on another side with a common transport roller with a sufficient nip load. After a firm grip has been achieved by the common transport roller, a buckle is formed on only one side of the buckle chamber.
Also, in most conventional deskew systems used in various reproduction systems, the types of substrates being transported usually do not vary much. That is, many systems typically encounter only a limited number of different substrate types, such as basic draft sheet stock of a certain weight in basic sizes such as A4 or 8.5×11 inches. A typical deskew system is designed to transport, for example, 20 lb. bond sheet stock (roughly 75 grams/m2 or GSM). Occasionally, higher quality bond paper of a slightly higher weight, such as 24 lb. bond (roughly 90 GSM) or 28 lb. bond (roughly 105 GSM) sheet stock is used. In conventional deskew systems, these sheets are transported using the same drive profiles. That is, the drive control parameters are fixed (i.e., set irregardless of the weight of the sheet being used).
In the United States, paper weight is expressed as pounds per 500 sheet ream of uncut C-size paper (4×letters size). As such, a cut ream of 20 pound letter paper (500 sheets of 8.5×11) would weigh 5 pounds. Because each type of paper has a different “basis size”, it is often confusing to talk in terms of the U.S. pound weight system. Instead, it is much more convenient to express paper “weight” as mass per unit area as in the ISO (metric) system in which the weight of paper is given in grams per square meter (GSM). For example, 20 pound bond letter stock corresponds to roughly 75 GSM, 24 pound bond letter stock corresponds to roughly 90 GSM, and 28 pound bond letter stock corresponds to roughly 105 GSM. 20 pound Bristol board on the other hand, which has a different basis size, corresponds to roughly 44 GSM. Other known substrates can have substantially higher GSM, some over 300 GSM. |
Senate Confirms Kagan as Justice In Partisan Vote
By CARL HULSE
Published: August 6, 2010
WASHINGTON -- The Senate confirmed Elena Kagan to a seat on the Supreme Court on Thursday, giving President Obama his second appointment to the court in a year and a victory over Republicans who sharply challenged her credentials and record.
Ms. Kagan, who is set to be sworn in Saturday as the newest member of the court, was approved by a vote of 63 to 37 after hearings and floor debate that showcased the competing views of Democrats and Republicans about the court but exposed no significant stumbling blocks to her confirmation.
In welcoming the Senate action, Mr. Obama said he expected that Ms. Kagan would be a strong addition to the court because she ''understands that the law isn't just an abstraction or an intellectual exercise.''
''She knows that the Supreme Court's decisions shape not just the character of our democracy, but the circumstances of our daily lives,'' the president said.
Ms. Kagan, the former dean of the Harvard Law School, a legal adviser in the Clinton administration and solicitor general in the Obama White House, becomes the fourth woman to serve on the court. She will join two other women currently serving, including Justice Sonia Sotomayor, who was confirmed almost exactly a year ago, and Justice Ruth Bader Ginsburg. She will be the only justice on the court not to have served previously as a judge.
At age 50, the New York native could have a long tenure, but her confirmation is not seen as immediately altering the current closely divided ideological makeup of the court, which is often split 5 to 4 on major decisions. She succeeds Justice John Paul Stevens, the leader of the court's liberal bloc, who is retiring.
''Her qualifications, intelligence, temperament and judgment will make her a worthy successor to Justice John Paul Stevens,'' said Senator Patrick J. Leahy, Democrat of Vermont and chairman of the Judiciary Committee.
The court she is joining has grown more assertive in placing a conservative stamp on decisions under Chief Justice John G. Roberts Jr., and is likely to confront an array of divisive issues in coming years, like same-sex marriage, immigration and the federal government's role in health care.
Among the cases she is expected to sit in on when the new term starts in October are two major First Amendment clashes: one involving California's attempts to limit the sale of violent video games to minors, the other on the free speech rights of protesters at military funerals.
Because of her role as solicitor general in the Obama administration, Ms. Kagan has already identified 11 cases on the docket for the next term in which she would disqualify herself because she had worked on them for the White House. One concerns the privacy rights of scientists and engineers at the Jet Propulsion Laboratory who object to federal background checks.
In the final vote, 5 Republicans joined 56 Democrats and 2 independents in supporting the nomination; 36 Republicans and one Democrat, Senator Ben Nelson of Nebraska, opposed her. In a sign of the import of the moment, senators formally recorded their votes from their desks.
The partisan divide over the nomination illustrated the increasing political polarization of fights over Supreme Court nominees, who in years past were backed by both parties in the absence of some disqualifying factor. Ms. Kagan received fewer Republican votes than Justice Sotomayor, who was supported by nine Republicans in her 68-to-31 confirmation on Aug. 6, 2009. Democrats balked at Samuel A. Alito Jr., nominated by President George W. Bush, with only four endorsing him in a 58-to-42 vote in January 2006.
Most Senate Republicans challenged Ms. Kagan's nomination until the end, asserting that she lacked sufficient experience and had unfairly stigmatized the military by supporting a bar on recruiters at Harvard Law over the military's policy against allowing gay men and lesbians to serve openly. They said her record in both Democratic administrations and her strong ties to Mr. Obama suggested that she would try to imprint her own political values and those of the president on court decisions.
''Whether it's small-claims court or the Supreme Court, Americans expect politics to end at the courtroom door,'' said Senator Mitch McConnell of Kentucky, the Republican leader. ''Nothing in Elena Kagan's record suggests that her politics will stop there.''
Republicans said the need to interpret the Constitution strictly was, in their view, reaffirmed by this week's federal court ruling against California's voter-imposed ban on same-sex marriage, a case considered likely to eventually reach the Supreme Court.
Senator Jeff Sessions of Alabama, the senior Republican on the Judiciary Committee, warned that the American public would ''not forgive the Senate if we further expose our Constitution to revision and rewrite by judicial fiat to advance what President Obama says is a broader vision of what America should be.''
But Democrats described the new justice as a brilliant legal scholar who would broaden the outlook of the court.
''When it opens this fall, three women -- a full third of the bench -- will preside together for the first time,'' Senator Harry Reid, the Nevada Democrat and majority leader, said. ''That's really progress.''
Mr. Obama called Ms. Kagan's confirmation ''a sign of progress that I relish not just as a father who wants limitless possibilities for my two daughters, but as an American proud that our Supreme Court will be more inclusive, more representative and more reflective of us as a people than ever before.''
Ms. Kagan has never been a judge and her previous courtroom experience was limited -- she argued her first case before the Supreme Court last year -- leading some Republicans to cite her lack of time on the bench as a chief factor in their opposition. They included Senator Scott Brown, a Massachusetts Republican, who announced Thursday that he would oppose the nomination of the woman he introduced at her confirmation hearings.
''When it comes to the Supreme Court, experience matters,'' he said in a statement.
Democrats dismissed that argument, with Senator Christopher J. Dodd of Connecticut noting that more than one-third of the 111 Americans who have served on the court were not previously judges, including former Chief Justice William H. Rehnquist, whose tenure was highly regarded by many Republicans.
''I would therefore submit to my colleagues that there are other important measures of the quality of a Supreme Court nominee besides the depth of his or her experience on the bench,'' Mr. Dodd said. |
Breakthrough in treatment of deadly 'Alabama rot' dog disease
Alba the first patient to receive therapeutic plasma exchange (TPE) or plasmapheresis. Credit: Royal Veterinary College
Researchers at the Royal Veterinary College's (RVC) Queen Mother Hospital for Animals (QMHA) have made a ground-breaking discovery in the treatment of Alabama rot, a deadly disease which affects dogs.
Alabama rot, properly known as cutaneous and renal glomerular vasculopathy (CRGV) first emerged in Alabama in the 1980s, giving it the nickname 'Alabama Rot'. The lack of understanding on how it spreads or can be stopped has led to high fatality rates for dogs who develop it. The reason for its sudden appearance in the UK six years ago also remains a mystery.
It causes small clots in blood vessels, which eventually result in skin ulcers, tissue damage, and kidney failure in many cases. Many theories have been put forwards about the cause; anything from E. coli-produced toxins to parasites and bacteria. But without knowing the exact source it is impossible to develop an effective cure.
The breakthrough treatment offered by the RVC at QMHA is known as therapeutic plasma exchange (TPE) or 'plasmapheresis.' This method involves filtering all the patient's blood so that toxic substances, including whatever causes CRGV, are removed. Once filtered, the blood is returned to the patient.
Its development was made possible by the discovery of the similarities between 'Alabama Rot' in dogs and thrombotic microangiopathy in humans, which is also treated with plasma exchange.
The RVC clinicians reported that two out of six dogs who underwent plasmapheresis made a full recovery. The full findings of the research have been published in Frontiers in Veterinary Science.
Dr. Stefano Cortellini, an author of the study and Lecturer in Emergency and Critical Care at the RVC, said "Despite the fact that only a third of dogs treated with TPE recovered from their disease, this is the first time that dogs so severely affected by CRGV have been reported to survive and so we remain optimistic that TPE may play an important role in the treatment of this deadly disease."
More information:
Ragnhild Skulberg et al. Description of the Use of Plasma Exchange in Dogs With Cutaneous and Renal Glomerular Vasculopathy, Frontiers in Veterinary Science (2018). DOI: 10.3389/fvets.2018.00161
In 2015, a New Delhi-metallo-beta-lactamase (NDM) Escherichia coli bacteria was discovered in two Finnish dogs. An article recently published in the journal Eurosurveillance reveals that the dogs' owner also carried the bacterium. ...
The soaring temperatures in Europe and North America have seen a rise in reports of dogs being rescued from hot cars. Police across England, Wales, Scotland, Northern Ireland, Ireland, and Canada have all saved dogs from ...
Free radicals, those DNA-damaging single-oxygen atoms, are produced in spades during exercise. Dogs that exercise a lot, like hunting dogs, may need to consume more antioxidants than their less-active counterparts to protect ...
Recommended for you
Past studies have found that a variety of complex networks, from biological systems to social media networks, can exhibit universal topological characteristics. These universal characteristics, however, do not always translate ...
Metasurfaces are two-dimensional (2-D) metamaterials that can control scattering waves of a light beam. Their applications include thin-sheet polarizers, beam splitters, beam steerers and lenses. These structures can control ...
The Transiting Exoplanet Survey Satellite (TESS) was launched on April 18 of last year with the primary objective of discovering transiting planets smaller than Neptune around stars bright enough for spectroscopic investigations ...
A pair of researchers at Purdue University has found a way to use a diatomic Ni-Ni catalyst to synthesize cyclopentenes. In their paper published in the journal Science, You-Yun Zhou and Christopher Uyeda describe their method ...
Photocatalysts – materials that trigger chemical reactions when hit by light – are important in a number of natural and industrial processes, from producing hydrogen for fuel to enabling photosynthesis.
Neutron stars are among the densest-known objects in the universe, withstanding pressures so great that one teaspoon of a star's material would equal about 15 times the weight of the moon. Yet as it turns out, protons—the ...
0 comments
Please sign in to add a comment.
Registration is free, and takes less than a minute.
Read more
Click here to reset your password.
Sign in to get notified via email when new comments are made. |
Share this:
The Patriots were bland on kickoff returns last year — consistently consistent, little more, little less. With a couple of more weapons on the roster in 2010, who will emerge as the Patriots' most dynamic kick returner?
Last season, the Patriots averaged 22.7 yards per kickoff return, which ranked 15th in the NFL. Their longest return of the season, however, was a 52-yarder from Laurence Maroney. Only four teams failed to run one back longer than that.
And lastly, the Patriots were one of 18 teams that didn’t return a kickoff for a touchdown. Three teams had multiple touchdown returns, and it's no surprise that they were blessed with the three best returners in the game: Josh Cribbs had three with Cleveland, Percy Harvin had two with Minnesota and Ted Ginn Jr. had two with Miami.
Tate had the best average, but he only lasted two games due to injury. Slater, who is one of the two fastest players on the team, had the second-best average, but he couldn’t break tackles. Everyone else just fell in line after that.
Obviously, this doesn’t fall solely on the kick returners. The blockers have to be aligned properly, and that’s on them and special teams coordinator Scott O'Brien, who was in his first year with the Patriots in 2009.
The kick returner, however, holds the majority of the responsibility. He's got to be one of the most athletic players on the team, with the vision to read his blocks several steps in advance and the physicality to burst through the initial hole and break away from first contact.
It was somewhat curious why Butler didn’t get as much of a shot last season, though his average doesn’t exactly back up that average. But Butler has excellent open-field awareness, and he knew exactly what to do with the football when he returned an interception 91 yards for a touchdown in the regular-season finale against the Texans. It would be worth it to give him another look during the preseason.
Edelman might also warrant more positive results. His rookie season was hampered by injuries, and that could have led to limited productivity on kick returns. He's quick and shifty enough to be a pest as a slot receiver, and he looked like a real special teams asset when he returned a punt for a touchdown in the 2009 preseason.
Rookie cornerback Devin McCourty will also get a look. He averaged 25.4 yards per return last year at Rutgers, and he also registered a 98-yard touchdown scamper. Patriots head coach Bill Belichick praised McCourty for his work on special teams, so it's only natural to think he'll get a chance to show his kick return ability in 2010.
There's one guy who should emerge from the pack, though. Tate, who is the ACC's all-time leader in kick return yardage, displayed otherworldly speed on kickoff returns during the Patriots' spring practices. The kid flies, and he runs with a purpose in the return game, where he developed as a star at North Carolina.
Tate has drawn plenty of comparisons to Harvin, but he never got a chance to boast those skills during a rookie season that was all but washed away due to a knee injury. If Tate comes as advertised, he could be the best kick returner in New England since Raymond Clayborn.
NESN.com will answer one Patriots question each day until July 24.
Saturday, July 17: Can Zoltan Mesko add some life to the punting unit? |
Lethality among Patients with HIV/AIDS Monitored in the Clinic of Infectious Diseases in St George University Hospital, Plovdiv, 2010-2014.
The introduction of complex antiretroviral therapy has resulted in signifi cant decrease in the mortality rate of HIV positive patients, but it still remains unacceptably high, especially in some groups of patients. To investigate the death rate in patients with HIV/AIDS, lethality and mortality in co-infection, and the most common causes and predictors of fatal outcome, focused on early diagnosis and appropriate therapy. The study included 53 deceased patients with HIV/AIDS, monitored at the Clinic of Infectious Diseases in St George University Hospital, Plovdiv between 01.01.2010 and 31.12.2014. The methods of research included clinical analysis, laboratory tests, microbiological and serological tests (HCV, HBV, toxoplasmosis), ELISA, PCR. Statistical analysis was performed by descriptive statistics, the Student's t-test, the method of Van der Ward, and regression analysis (logistic regression). During the study period 316 patients with HIV/AIDS were monitored, 53 of them with lethal outcome. Lethality was 16.7% for the whole group; in intravenous drug users - 13.8%; in co-infected patients: HIV/M. tuberculosis - 46%, in HIV/HCV - 17.8%. Lethality and mortality in HIV(+) patients with co-infections in populations of diff erent age, gender, duration since starting сАRТ and degree of immunodefi ciency (according to CD4, VL) was compared with the lethality and mortality in patients with these conditions from the general population. Fatal outcome in patients with HIV/AIDS was most commonly associated with co-infections HIV/M. tuberculosis and HIV/HCV. Predictors of a fatal outcome are pulmonary tuberculosis, advanced immunodefi ciency with VL> 500 000 c/μL and CD4 <100/mm3, absence or non-systemic antiretroviral therapy. |
Pedal voyager crosses Pacific
Jan 1, 2003
An attempt at the first-ever human-powered circumnavigation is approximately half complete now that the pedal-powered vessel Moksha is safe in Tarawa, a small island in the Kiribati group (formerly known as the Gilbert Islands) of the South Pacific.
The 26-foot craft, powered by either one or two operators at the foot pedals, started its circumnavigation in July 1994 in London. Britons Jason Lewis and Steve Smith bicycled from the U.K. after being ferried across the Channel, through France and across Spain and Portugal to the Algarve. They joined the vessel and pedaled to Funchal, Gran Canaria, and then across the Atlantic to Turks and Caicos, ultimately arriving in Miami.
Moksha was then trucked across the U.S. as its owners, one on bicycle and the other on in-line skates, sweated across the continent. In Sept. 1998, the pair reboarded Moksha and pedaled to Hilo, Hawaii, from San Francisco, a 2,200-mile, 54-day voyage. After a break, only one of the adventurers resumed the voyage; Lewis pedaled the boat solo from Kona, Hawaii, to Tarawa in 73 days, arriving in May 1999.
Pedal for the Planet, as the expedition is called, is funded entirely by donations of equipment and money. For example, the vessel is equipped with a Pitchometer custom propeller, R-300 Realword Computer "ruggedized" laptop, A C.A.R.D. anti-collision radar detector from Survival Safety Engineering, a PUR desalinator pump, ICOM radios, and a Trimble Galaxy Inmarsat C.
Follow the progress of Pedal for the Planet, which will resume its journey from Tarawa to Australia in April 2000, by web site: www.goals.com, or call 800-943-0114. |
Synthesis and characterization of nanosilver-silicone hydrogel composites for inhibition of bacteria growth.
Nanosilver-silicone hydrogel (NAgSiH) composites for contact lenses were synthesized to asses the antimicrobial effects. Silicone hydrogel (SiH) films were synthesized followed by impregnation in silver nitrate solutions (10, 20, 30, 40, 60, 80ppm) and in-situ chemical reduction of silver ions using sodium borohydride (NaBH4). The silver nano particles (AgNPS) were identified by UV-vis absorption spectroscopy, Energy-dispersive X-ray spectroscopy (EDX) mapping and EDX spectrum. Physico-mechanical and chemical properties of NAgSIH films were studied. The antimicrobial effect of the hydrogels against Escherichia coli, Pseudomonas aeruginosa, Bacillus subtilis and Staphylococcus aureus was evaluated. The numbers of viable bacterial cells on NAgSiH surface or in solution compared to control SiH were examined. The NAgSiH films were successfully synthesized. FTIR results indicated that AgNPS had no effect on the bulk structure of the prepared SiH films. From TGA analysis, NAgSiH(R80) and SiH(R0) films had the same maximum decomposition temperature (404°C). UV-vis absorption spectroscopy and EDX mapping and spectrum emphasized that AgNPS were in spherical shape. The maximum absorption wavelength of NAgSiH films were around 400nm. The light transmittance decreased as the concentration of AgNPS increased, but still greater than 90% at wavelength around 555nm. The Young's modulus increased gradually from 1.06MPa of SiH(R0) to highest value 1.38MPa of NAgSiH(R80). AgNPS incorporated into SiH films reduced the bacterial cell growth and prevented colonization. Groups NAgSiH(R60,R80) demonstrated an excellent reduction in bacterial viability in solution and on the SiH surface. NAgSiH composites were successfully synthesized and possessed an excellent antimicrobial effects. |
Q:
Delete rows from the second table if the corresponding user is deleted from the first table
I'm deleting some rows (users) from a table using the following query
DELETE
FROM
rfs_users
WHERE
ID > 1 AND user_registered < '2017-05-16 12:09:54' AND user_login NOT IN ('username1', 'username2')
I have another table and I also need to delete some rows from it. This table (rfs_usermeta) has a different structure and I can't use the same query on it.
In rfs_users, one row corresponds to one user. In rfs_usermeta, multiple rows corresponds to one user. I could just use
DELETE FROM rfs_usermeta WHERE user_id > 1
but that would delete almost all rows. I need to delete a user in rfs_usermeta if that user is also to be deleted in rfs_users.
For example:
// loop rows in rfs_users
for (row in rfs_users) {
// target specific rows
if (row.user_id > 1 && row.user_registered < '2017-05-16 12:09:54' && !('username1', 'username2').includes(row.user_login)) {
// delete matching row
row.remove()
// also delete rows from rfs_usermeta
rfs_usermeta.getRows(row.user_id).remove()
}
}
How do I form this query?
A:
Does the usermeta have a Foreign Key Constraint to the users table? If so you can set what happens in the referenced row.
You can automatically remove corresponding rows by adding the foreign key constraint to the usermeta like this:
ALTER TABLE usermeta ADD CONSTRAINT FOREIGN KEY (user_id) REFERENCES users(id) ON DELETE CASCADE;
This removes all usermeta rows that reference a removed user.
If you do not want to do that you can also add a Trigger to the user table that removes usermeta rows.
Hope this helps ;)
|
@allanlei
Digital Ocean has taken notice of rise of Kubernetes and is now also planning to offer it as a service. This is great news for companys who are looking to cost save or developer just wanting to startup a basic cluster without breaking the bank. $5 for 1CPU,2 5GB disk, and 1TB bandwith is pretty hard to beat. Combine it with their other offerings like Load Balance, Spaces, Block Storage and its quite hard to beat.
Hopefully Digital Ocean gives the big cloud providers a run for their money.
Google introduced support for custom HTTP headers on their load balancers and provide some pre-defined variables, notibly geolocation related headers such as client_city_lat_long for latitude, longitude. With this, backend servers no long need to load a large (and probably licenced) database to resolve an IP address.
It's finally here! Port forwarding to something other than a pod. As of 1.10, you can forward to Pods, Deployments, Services, almost anything with a selector. All that is left is binding to something other than localhost. |
naslag
UPDATE ON LOAN REQUIREMENT
Do you need Financial Assistance?
Do you seek funds to pay off credits and debts?
We give out loan with an Interest rate of 1.00%
Are you in any kind of financial difficulties? Do you need a loan to clear your debts?
Are you going to increase your finances? You are a business person who wants to expand his/her
business. Seeking is recognized by both the physical and the government for our great effectiveness.
Services include:
* Personal Loans (Secure and Unsecured)
* Business Loans (Secure and Unsecured)
* the Improvement Home
* the Inventor Loans
* Auto Loans
Please, contact us for more information:
Contact Email: hititseramik.com.tr@consultant.com
Contact Email: hititseramik.com.tr@email.com
Contact Email: hititseramik.com.tr@qualityservice.com
We are certified, trustworthy, reliable, efficient, fast and dynamic.
Yours sincerely,
Mrs.Tina Garner
Naam:
Uit:
WE OFFER ALL KIND OF LOANS
Nederland
Datum:
Cijfer:
2018-12-06 16:43:40
10
Opmerkingen:
Do You Need A Loan To Consolidate Your Debt At 1.0%? Or A Personal Loans * Business Loans etc. Interested Parties Should Contact Us For More Information Through Via E-mail: SuiteCapitals@gmail.com ( SuiteCapitals@post.com )
We Offers Financial Consulting To Client, Companies Seeking Debt / Loan Financing And Seeking For Working Capital To Start A New Business Or To Expand Existing Business. Interested Parties Should Contact Us For More Information Through Via E-mail: SuiteCapitals@gmail.com ( SuiteCapitals@post.com )
Naam:
Uit:
WE OFFER ALL KIND OF LOANS
Nederland
Datum:
Cijfer:
2018-12-06 16:43:36
10
Opmerkingen:
Do You Need A Loan To Consolidate Your Debt At 1.0%? Or A Personal Loans * Business Loans etc. Interested Parties Should Contact Us For More Information Through Via E-mail: SuiteCapitals@gmail.com ( SuiteCapitals@post.com )
We Offers Financial Consulting To Client, Companies Seeking Debt / Loan Financing And Seeking For Working Capital To Start A New Business Or To Expand Existing Business. Interested Parties Should Contact Us For More Information Through Via E-mail: SuiteCapitals@gmail.com ( SuiteCapitals@post.com )
Naam:
Uit:
WE OFFER ALL KIND OF LOANS
Nederland
Datum:
Cijfer:
2018-12-06 16:43:34
10
Opmerkingen:
Do You Need A Loan To Consolidate Your Debt At 1.0%? Or A Personal Loans * Business Loans etc. Interested Parties Should Contact Us For More Information Through Via E-mail: SuiteCapitals@gmail.com ( SuiteCapitals@post.com )
We Offers Financial Consulting To Client, Companies Seeking Debt / Loan Financing And Seeking For Working Capital To Start A New Business Or To Expand Existing Business. Interested Parties Should Contact Us For More Information Through Via E-mail: SuiteCapitals@gmail.com ( SuiteCapitals@post.com )
Naam:
Uit:
WE OFFER ALL KIND OF LOANS
Nederland
Datum:
Cijfer:
2018-12-06 16:43:30
10
Opmerkingen:
Do You Need A Loan To Consolidate Your Debt At 1.0%? Or A Personal Loans * Business Loans etc. Interested Parties Should Contact Us For More Information Through Via E-mail: SuiteCapitals@gmail.com ( SuiteCapitals@post.com )
We Offers Financial Consulting To Client, Companies Seeking Debt / Loan Financing And Seeking For Working Capital To Start A New Business Or To Expand Existing Business. Interested Parties Should Contact Us For More Information Through Via E-mail: SuiteCapitals@gmail.com ( SuiteCapitals@post.com ) |
A Kuwaiti newspaper claimed on Friday that indirect talks have taken place in Moscow between Iran and Israel in an attempt to find solutions for a number of regional issues, mainly Tehran’s nuclear programme and the Iranian presence in Syria.
Al-Jarida said that the visits to Moscow of senior Iranian official Ali Akbar Velayati and Israeli Prime Minister Benjamin Netanyahu at the same time were not a coincidence. They were, it claimed, arranged by the Russians to conduct indirect talks.
“Russia passed the Israeli demands to Tehran and asked [the Iranian government] to dispatch a representative with full power to reach a solution for the Iranian issue with Syria,” said an unnamed diplomat. Velayati is said to have responded to all the Israeli demands during his meeting with Vladimir Putin on Thursday and proposed Iran’s conditions to accept the US demands regarding the Iranian nuclear programme. He apparently asked Putin to take the conditions to the Russian President’s meeting with Donald Trump slated for 16 July.
The diplomat added that Iran has started to tone down its position on Israel in return for some leniency to be shown by Washington and Europe.
Velayati arrived in Moscow on Wednesday to hand over a message from Iran’s Supreme Leader to Putin and discuss mutual relations as well as regional and international issues with senior Russian officials. Putin, the foreign diplomat pointed out, voiced his rejection of the US sanctions on Iran and stressed his support for Russia’s main ally in the Middle East. |
A positional scanning combinatorial library of peptoids as a source of biological active molecules: identification of antimicrobials.
A positional scanning library of N-alkylglycine trimers (peptoids) containing over 10 000 compounds has been synthesized on solid phase. The synthetic pathway involved the use of the submonomer strategy and a set of 22 commercially available primary amines as a chemical diversity source. The unbiased nature of the library allowed its screening against a variety of biological targets, leading to the identification of individual peptoids exhibiting remarkable biological activities (García-Martínez, C. et al. Proc. Natl. Acad. Sci. U.S.A. 2002, 99, 2374. Montoliu, et al. J. Pharm. Exp. Therap. 2002, 302, 29. Planells-Cases, R., et al. J. Pharm. Exp. Therap. 2002, 302, 163). In the present work, the screening of this library against a panel of Gram-positive and Gram-negative bacteria led to the identification of different compounds exhibiting antimicrobial activity. |
- 12 = 0, -2*f + 6*f = -2*i + 14. Suppose d + 3*u = 16, f*d - 4*u + 24 = 4*d. Solve -d = 2*s - 0 for s.
-2
Suppose 19*i = 31 + 26. Solve i*o + 0 = 15 for o.
5
Let p = 0 + 1. Suppose 6*d - 7*d = 4. Let y be -5 + 8 + d + 6. Solve p = -y*r - 9 for r.
-2
Let z(k) = -5*k - 113. Let q be z(-24). Solve -10*r = -27 + q for r.
2
Let i = 26 - 29. Let p(k) = k**3 + 4*k**2 + 2*k - 3. Let z be p(i). Suppose -4*h - 13 = -2*r - 3*h, z = -r + 5*h + 29. Solve r*v = -6 - 14 for v.
-5
Let j = -18 + 23. Solve 5*p - j = 6*p for p.
-5
Suppose 0 = -w + 2, 8*i - 11*i + w + 1 = 0. Solve i = -2*j - 5 for j.
-3
Suppose -3*j = -37 + 1. Solve j = -6*v - 0 for v.
-2
Let r(a) = a**3 - 9*a**2 - 9*a - 10. Let d be r(10). Solve 3*p + 4 - 16 = d for p.
4
Let i be 24*2/16*4. Let p be -6*(-3)/i*2. Solve -p*t = 2*t for t.
0
Let z be (-1 + -2)*20/(-12). Suppose -3*u + z = -4. Suppose -u*l + 27 = 5*w, -15 = -4*w + 2*l + 11. Solve -3*i + w = -0*i for i.
2
Let z(s) = -s**2 - 8*s + 37. Let u be z(4). Let x = 16 + u. Solve 0 = -6*a + x*a + 5 for a.
5
Let p = -13 - -13. Suppose 2*b + 6 + 2 = p, 5*f - 26 = 4*b. Let a = f - -2. Solve 0 = -2*g + g + a for g.
4
Suppose 28 = 5*p - g - 2*g, -p = 2*g - 16. Suppose 2*q = d + 3 + p, -2*q + 5*d = -31. Solve z = -q*z - 20 for z.
-5
Let m = 105 - 95. Solve m*a = 15 - 55 for a.
-4
Let m(i) = -2*i**3 - 2. Let b(g) = -g**3. Let t(u) = b(u) - m(u). Let a be t(0). Solve -a*z = -3*z - 2 for z.
-2
Let w be (-79)/(-4) + 2/8. Let s be 48/(-20)*(w/(-8) + 0). Let n = -9 + 15. Solve 4*o + n + s = 0 for o.
-3
Suppose 7*c = 4*c + 3*a + 45, 0 = 3*c + 4*a - 59. Suppose 2 + 1 = i. Suppose -5*f = 4*m - 23, i*m - 4*m = 5*f - c. Solve 3*v = m*v for v.
0
Let i(f) = 18*f + 64. Let m be i(-3). Solve 3*q = 8*q + m for q.
-2
Suppose -2*l - 3*p - 15 = -7*l, -4*l - 5 = p. Solve l = -8*k + 20 - 4 for k.
2
Let z(j) = -21*j - 459. Let a be z(-23). Solve 4*m - a = -4 for m.
5
Let o(k) = 2*k**3 - 2*k**2 - 4*k - 9. Let t be o(3). Solve -t = -2*g - 23 for g.
-4
Let t be (4 + -7)*(0 + -1). Solve -4*m - t = -15 for m.
3
Let f = 501 - 499. Solve -2*i + 12 = f*i for i.
3
Let j(t) = 2*t**2 + 9*t - 5. Let b be j(5). Let g = b - 87. Solve 8*c = g*c for c.
0
Suppose 3*c - 2 - 15 = i, -2*c = -10. Let v be i/(-4 - 28/(-8)). Solve -m = v*m - 15 for m.
3
Let v be (-1)/(2*4/(-88)). Suppose -4*c = -1 - v. Solve 0 = c*u - 3 for u.
1
Let p = 219 - 215. Solve -b - p*b - 25 = 0 for b.
-5
Let s(p) = -19*p - 20. Let a(j) = -10*j - 10. Let x(v) = -11*a(v) + 6*s(v). Let b be x(-4). Solve 0 = -c + 4*c - b for c.
2
Suppose t - 1 = -2*r + 4, 15 = -r - 4*t. Suppose 15 + 10 = -r*f. Let o(z) = z**2 + z - 10. Let c be o(f). Solve -a - a = -c for a.
5
Suppose -5*c - h + 21 = 0, 2*h = -2*c + 3*h + 7. Solve c*i = -i - 15 for i.
-3
Let u(o) = 5*o + 166. Let s be u(-31). Solve r + 9 = s for r.
2
Let a = -3 - -15. Let u be 24/9*45/a. Solve g - 6*g + u = 0 for g.
2
Suppose 7*q - 5*q = 4, -3*v = -3*q - 18. Let b = v - 5. Let x be ((-6)/4)/b*-10. Solve -5*a = -0*a - x for a.
1
Let u = 9 + -9. Suppose -2*k - 12 = -2, -4*w - 4*k + 16 = u. Solve -4*a = w - 1 for a.
-2
Suppose 4*s + 8 = 0, -l + 10 = -s + 1. Solve -2*p = -l*p - 5 for p.
-1
Suppose 4*h = 5*y + 357, 16*h - 17*h = -3*y - 91. Solve o = 93 - h for o.
5
Let q(v) be the third derivative of -v**5/60 - v**4/6 - v**3/6 + 10*v**2. Let l be q(-2). Solve -l*t = -t + 10 for t.
-5
Let h be (4 - 2) + 2*-1. Suppose h*b = -4*b. Suppose -3*o + 2*o = b. Solve 3*m + o = 3 for m.
1
Suppose -d - 11 = -19. Solve -d*i = -4*i for i.
0
Let k be 72/252*7/2. Suppose -5*a + 85 = 5*o, 3*a - 4*o + 82 = 8*a. Let j be 10/a + 8/28. Solve j = -u - k for u.
-2
Suppose 102 = -45*j + 372. Solve -8*a - j = -2*a for a.
-1
Let v(n) = -n**3 - n + 1. Let w be v(0). Let h be 148/12 - w/3. Suppose 0 = 4*f + 2*f - h. Solve 0*s + 4 = -f*s for s.
-2
Let y(x) = -8*x + 3*x - 2*x - 38. Let q be y(-6). Solve 2*m + 10 = q for m.
-3
Suppose 0 = -3*m + 4*y + 285, 6*m = 4*m + 5*y + 197. Let v be 8/(-14) + 1144/m. Solve -v*a = -7*a for a.
0
Let b be 90 + 0/2 + -2 + 4. Suppose b = 5*r + 3*h, 2*r - 12 = r + h. Solve -r = 4*x - 0*x for x.
-4
Suppose -3*a + 9 = -0*a. Let z be (-2)/(-3)*a/2. Suppose 0 = -p + 4*g - 10, 0 = -3*g + 13 - z. Solve -2*x + 2 - p = 0 for x.
-2
Let w(y) = 2*y**3 + 3*y**2 - 4*y - 3. Let t be w(-3). Let l(r) = r**3 + 19*r**2 + 19*r + 20. Let g be l(t). Solve -a = -g*a + 4 for a.
4
Let a(j) = -j**2 + 12*j - 8. Let n be a(10). Let w be (-4*(-2)/3 - 2)*n. Solve 4*o - w*o = -8 for o.
2
Let w be (8/28)/(-1) + 6/21. Solve -q + 0 - 3 = w for q.
-3
Suppose 2*d + 3 + 1 = 0, -2*d + 20 = -2*h. Let x(t) be the second derivative of t**4/12 + 2*t**3 + 7*t**2/2 - 63*t. Let u be x(h). Solve -3*l + u = 1 for l.
2
Suppose -36 = c - 5*c. Let j = -14 + 14. Suppose -4*x - c + 25 = j. Solve -x = -4*m - 0 for m.
1
Let b = -112 + 66. Let q = 49 + b. Solve q = 3*n - 0 for n.
1
Suppose 7*p = 18*p - 55. Solve -10 = -p*k - 0 for k.
2
Suppose -4*o + 3*o - 5 = -2*x, 4*x + 5*o - 31 = 0. Let q be 168/(-8) - 3*-1. Let u be q/(-5) - (-9)/(-15). Solve -3 = x*g - u*g for g.
-3
Suppose -4*z - 4*j + 4 = -3*z, 4*z + 2*j - 30 = 0. Let a be 1 + 9/(18/z). Solve 0 = 2*i - a - 3 for i.
4
Let g(m) = -m**3 - 6*m**2 + 2*m + 16. Let z be g(-6). Suppose -2*f + 30 = 3*f. Solve 6*n - f = z*n for n.
3
Let b(r) = -2*r**2 + 3*r - 2. Let s be b(3). Let l(a) = 16*a**2 - 11 - 9*a + 19*a + a**3 - 4*a**2. Let d be l(s). Solve -z + 2 - 1 = d for z.
1
Suppose 3*c = -5*k + 256, 4*k = -3*c + 91 + 115. Suppose k = 5*f - 250. Suppose -5*b + f = -b. Solve n = -2*n - b for n.
-5
Suppose 0 = 90*x - 68*x - 220. Solve -x = -83*a + 85*a for a.
-5
Suppose x + 1 = 7. Let u be -2 + (x - 4) - -2. Solve 5 = -3*f + u*f for f.
-5
Let s = -90 - -97. Suppose -g + 5*q + 11 + 0 = 0, -6 = -4*g + q. Solve 0 = 2*i - s + g for i.
3
Let x be 254/(-10) - 50/(-125). Let a = x - -26. Solve -a = g - 5 for g.
4
Let o = 65 + -73. Let p be (-49)/o + (-3)/(-48)*-2. Solve 4 = -p*x + 2*x for x.
-1
Let v = -23 - -28. Suppose -3*r + 4*u - 5 = -49, -u - 45 = -v*r. Suppose r*z = 2*z + 30. Solve 0 = g - z*g for g.
0
Let f be (4/(-14))/(-1) + 231/49. Let g be 0 + f - (7 - 7). Solve -g*v = -v - 20 for v.
5
Let z be ((-12)/(-30))/(2/180). Suppose -2*u + 7*u = -4*k + z, 0 = -4*u + 3*k + 35. Suppose 0 = -2*a - a + 6. Solve a*d - 4*d = u for d.
-4
Suppose -2*i = i + 6. Let l be (i - -25) + 3 - 2. Suppose -2*m - l = -6*m. Solve 3*b + m = b for b.
-3
Let c be (-7)/(-1) + (-14)/7. Suppose -10 + c = y. Let o be (-25)/(-4) - y/(-20). Solve 4*h = 6*h + o for h.
-3
Suppose -139 = -5*i - 3*n, -4*i + 88 = 2*n - 22. Suppose -51 = 5*a + 59. Let d = i + a. Solve -r - d*r = -15 for r.
3
Suppose 11 = -2*x + 1. Let n be (-1)/x - (-8)/(-40). Let m(v) = -v - 2. Let f be m(-4). Solve n = -y - f*y for y.
0
Suppose -6*b + 44 = -10. Solve -8*p = -5*p - b for p.
3
Let o(q) = 3*q + 47. Suppose 4*a + 2 + 50 = 2*k, -37 = 3*a - 2*k. Let x be o(a). Let w(l) = -l**3 - 2*l**2 - 2*l. Let h be w(-2). Solve -10 = -x*i + h*i for i.
-5
Let a = 50 - 42. Solve u = a - 7 for u.
1
Suppose 9 = -2*n + 3. Let h = 4 - n. Solve 20 = -2*o + h*o for o.
4
Suppose -a = -3*a + 8. Let p = -1 + 1. Let n be 0/(-1 + -1 + 1). Solve -a*b + p*b - 20 = n for b.
-5
Let y = -4174 + 4185. Suppose 0 = -2*r - 4*z - 6, -3*r + 2*z + 10 = -13. Solve -4 - y = -r*u for u.
3
Let v(o) = -o**3 - 15*o**2 + 2*o + 30. Let w be (-6)/(-14) - (-2052)/(-133). Let y be v(w). Solve y = -0*q - 2*q for q.
0
Suppose 12*t - 54 = 3*t. Solve 4*c = -t + 2 for c.
-1
Let b(p) = -p**2 - 7*p - 3. Let h be b(-6). Let l be 8/((-12)/h) - -4. Suppose 2*c - 4*c = 0. Solve r - l*r + 2 = c for r.
2
Let i = 16 + -14. Suppose v = -2*v + i*y + 10, 0 = 2*v - 4*y - 20. Solve -4*k - 12 = -v*k for k.
-3
Let y(p) = -p. Let c be y(-1). Let q be c*(0 - (-1 - 1)). Let j be q/(-1) - (-3 - 0). Solve -j = w - 2 for w.
1
Let f(x) = x**3 + 5*x**2 - 2*x - 3. Let l be f(-5). Suppose 0 = -8*c + c + l. Let k(i) = 2*i**2 - 3*i + 1. Let o be k(c). Solve o = -4*s - 0 - 4 for s.
-1
Suppose -7*k = -10 + 17. Let j be (0/((-3)/(-3)))/(k - -2). Solve j = -b + 4 - 7 for b.
-3
Suppose -5*p - 6 = 9. Let q(h) = -h**3 - h**2 + 5*h - 5. Let d be q(-3). Let k be (p - -3)/((-2)/d). Solve k = -s - 0*s - 2 for s.
-2
Suppose 0 = -3*k - 178 + 202. Solve k*q = 24 - 8 for q.
2
Let o = 1529 - 1486. Solve 5*x + 38 = o for x.
1
Let b(s |
The headlines have been buzzing with the “triumph” of statistics and math in this election. But before I jump into how well statistics served us, let’s do a little primer on the margin of error.
Whenever we measure less than the whole population we’ll have some variability in the sample. Chances are good that the sample will not precisely match the entire population. However, we can do some calculations to estimate our confidence in the true parameter and that’s called the margin of error. Most polls and surveys will use a 95% confidence interval to calculate the margin of error. It’s important to know that this isn’t a 95% probability, it is a confidence interval. That is 95% of the time, we expect the true value to be within the margin of error (and yes that’s different then saying the true value has a 95% chance to be within the margin of error). In other words, if we make one hundred predictions with 95% confidence, we would expect that the true value of 5 of those (5%) would be outside our margin of error.
Now we get to Nate Silver’s work. We cannot judge his work by how many states “right” or “wrong” he actually got (though many people are). Instead we have to judge by the accuracy of the forecasts within the confidence intervals. He made 51 forecasts of how the states (and D.C.) would turn out with 95% confidence. Therefore, we cannot expect him to be right 100% of the time, only 95% of the time. If he were right 100% of the time, then there’s something wrong. Instead we would expect (51 forecasts * 5% wrong = ) 2.55 states should be outside of his confidence intervals, or in other words, 2 or 3 election results should fall outside the confidence intervals. But even getting 1 or 4 states may still be expected. However, it’d be worthy of raising an eyebrow if all 51 forecasts fell within the margin of error.
We should expect 2 or 3 states to have election results that fall outside the margin of error. The forecasts would be more inaccurate if all 51 fell within the margin of error.
So how’d he do?
Pulling data from Nate’s blog (he lists all 51 forecasts on the right side), I was able to make a list. For example, in Alabama, he listed Obama as getting 36.7% of the vote and Romney getting 62.8% with a margin of error of 3.8%. Which means, come election day we expect Obama to get between 32.9%-40.5% of the vote and Romney should get between 59%-66.6 (with 95% confidence).
Next we pull the actual results. I grabbed data from uselections.org and sure enough in Alabama, Obama recieved 38.56% of the vote and Romney got 60.52%. Both fall within the margin of error, congratulations statistics.
When it’s all said and done, Nate Silver correctly forecasted 48 of the 51 election results and that’s great! We expected 2.5 states to be outside the margin of error and 3 were. He could not have been more accurate. If he had gotten 51 of 51 states correct, the forecasts would be more wrong because these are estimates with 95% confidence.
What’s that look like?
Combining the two data sources (forecasts with results) we can see that the three states that fell outside the margin of error were Connecticut, Hawaii and West Virginia (marked with asterisks). But looking down the list, we can see how varied the forecasts were and yet how specific they were and how well almost all of them did. Another interesting thing to pick out: in states that were not contested, the margin of error was much larger (since fewer polls were done in those states) so the lines were longer, and in the swing states that margin was considerably smaller. (click image to enlarge)
I wrote a post over on the Society of Information Risk Analysts blog and I was having so much fun, I just had to continue. I focused this work on the American version of Roulette, which has “0” and “00” (European version only has “0” producing odds less in favor of the house). The American versions also have “Five Numbers” option to bet, which the European version doesn’t have.
According to this site, the American version of roulette could do about 60-100 spins in an hour, I figured maybe 4 hours in the casino and being conservative, I decided to model 250 iterations of roulette. I then chose $5 bets, which isn’t significant, changing the bet would only change the scale on the left, not the visuals produced. I then ran 20,000 simulations of 250 roulette spins and recorded the loss or gains from the bets along the way. One way to think of this is like watching 20,000 people play 250 spins of roulette and recording and plotting the outcomes.
I present this as a way to understand the probabilities of the different betting options in roulette. I leveraged the names and payout information from fastodds.com. The main graphic represents the progression of the 20,000 players through the spins. Everyone starts at zero and either goes up or down depending on lady luck. The distribution at the end shows the relative frequency of the outcomes.
Enough talking, let’s get to the pictures.
Betting on a single number
What’s interesting is the patterns forming from the slow steady march of losing money punctuated by large (35 to 1) wins. Notice there would be a few unlucky runs with no wins at all (the red line starts at zero and proceeds straight down to 1250). Also notice in the distribution on the right that just over half of the distribution occurs under zero (the horizontal line). The benefit will always go to the house.
Betting on a pair of numbers
Same type of pattern, but we see the scale changing, the highs aren’t as high and the lows aren’t as low. None of the 20,000 simulations lost the whole time.
Betting on Three Numbers
Betting on Four Number Squares
Betting on Five Numbers
Betting on Six Numbers
Betting on Dozen Numbers or a Column
Betting on Even/Odd, Red/Green, High/Low
And by this point, when we have 1 to 1 payout odds, the pattern is gone along with the extreme highs and lows.
Mixing it Up
Because it is possible to simulate most any pattern of betting, I decided to try random betting. During any individual round, the bet would be on any one of the eight possible bets, all for $5. The output isn’t really that surprising.
Rolling it up into one
Pun intended. While these graphics help us understand the individual strategy, it doesn’t really help us compare between them. In order to do that I created a violin plot (the red line represents the mean across the strategies).
Looking at the red line, they all have about the same mean with the exception of Five Numbers (6-1). Meaning overtime, the gambler should average to just over a 5% loss (or a 7% loss with five number bets). We can see that larger odds stretch the range out, which smaller odds cluster much more around a slight loss. The “scatter” strategy does not improve the outcome and is just a combination of the other distributions. As mentioned, the 6-1 odds (Five Numbers) bet does stick out here as a slightly worse bet than the others.
While I may disagree that the only bets to avoid are limited to those (had to get that in), I also disagree with the blanket statement. Since they all lose more often than they win, trying to get less-sucky-odds seems a bit, well, counter-intuitive. I would argue that the bets to avoid are not the same for every gambler. The bets should align with the tolerance of the gambler. For example, if someone is risk-averse, staying with the 2-1 or 1-1 payouts would limit the exposure to loss, while those more risk-seeking, may go for the 17-1 or 35-1 payout – the bigger the risk, the bigger the reward. Another thing to consider is that the smaller odds win more often. If the thrill of winning is important, perhaps staying away from the bigger odds is a good strategy.
Now that you’re armed with this information, if you still have questions, the Roulette Guru is available to advise based on his years of experience.
I wanted to title this “CBC mode in the AES implementation on the iPhone isn’t as effective as it could be” but that was a bit too long. Bob Rudis forwarded this post, “AES on the iPhone is broken by Default” to me via twitter this morning and I wanted to write up something quick on it because I responded “premise is faulty in that write up” and this ain’t gonna fit in 140 characters. Here is the premise I’m talking about:
In order for CBC mode to perform securely, the IV must remain impossible for the attacker to derive or predict.
This isn’t correct. In order for CBC mode to be effective the initialization vector (IV) should be unique (i.e. random), preferably per individual use. To correct the statement: In order for AES to perform securely, the key must remain impossible for the attacker to derive or predict. There is nothing in the post that makes the claim that the key is exposed or somehow able to be derived or predicted.
Here’s the thing about IV’s: they are not secret. If there is a requirement to keep an IV secret, the cryptosystem is either designed wrong or has some funky restrictions and I’ll be honest, I’ve seen both. In fact, the IV is so not secret, the IV can be passed in the clear (unprotected) along with the encrypted message and it does not weaken the implementation. Along those lines, there are critical cryptosystems in use that don’t use IV’s. For example, some financial systems leverage ECB mode which doesn’t use an IV (and has it’s own problems). Even a bad implementation of CBC is better than ECB. Keep that in mind because apparently ECB is good enough for much of the worlds lifeblood.
So what’s the real damage here? As I said in order for CBC to be effective, the IV should not be reused. If it is reused (as it appears to be on the implementation in the iPhone Nadim wrote about), we get a case where an attacker may start to pull out patterns from the first block. Which means if the first block contains repeatable patterns across multiple messages, it may be possible to detect that repetition and infer some type of meaning. For example, if the message started out with the name of the sender, a pattern could emerge (across multiple encrypted messages using the same key and IV) in the first block that may enable some inference as to the sender on that particular message.
Overall, I think the claim of “AES is broken on the iPhone” is a bit overblown, but it’s up to the interpretation of “broken”. If I were to rate this finding on a risk scale from “meh” to “sky is falling”, off the cuff I’d say it was more towards “meh”. I’d appreciate this fixed from apple at some point… that is, if they get around to it and can squeeze it in so it doesn’t affect when I can get an iPhone 5… I’d totally apply that patch. But I certainly wouldn’t chuck my phone in the river over this.
I had an article published in the November issue of the ISSA journal by the same name as this blog post. I’ve got permission to post it to a personal webpage, so it is now available here.
The article begins with a quote:
When we take action on the basis of an [untested] belief, we destroy the chance to discover whether that belief is appropriate. – Robin M. Hogarth
That quote from his book, “Educating Intuition” and it really caught the essence of what I see as the struggles in information security. We are making security decisions based on what we believe and then we move onto the Next Big Thing without seeking adequate feedback. This article is an attempt to say that whatever you think of the “quant” side of information security needs to be compared to the what we have without quants – which is an intuitive approach. What I’ve found in preparing for this article is that the environment we work in is not conducive to developing a trustworthy intuition on its own. As a result, we have justification in challenging unaided opinion when it comes to risk-based decisions and we should be building feedback loops into our environment.
Have a read. And by all means, feedback is not only sought, it is required.
Yup, Chris Hayes (and I) have released the 1.0 version of OpenPERT. I had a sneaking suspicion that most people would do what I did with my first excel add-in. “Okay, I installed it, now what?” then perhaps skim some document on it, type in a few formulas and walk away thinking about lunch or something. In an attempt to minimize OpenPERT being *that* add-in, we created something to play with – the next generation of the infamous ALE model. We call in “ALE 2.0”
About ALE
ALE stands for Annualized Loss Expectancy and it is taught (or was taught back in my day) to everyone studying for the CISSP exam. The concept is easy enough: estimate the annual rate of occurrence (ARO) of an event and multiply it by the single loss expectancy (SLE) of an event. The output of that is the annualize loss expectancy or ALE. Typically people are instructed to use single point estimations and if this method has ever been used in practice it’s generally used with worst-case numbers or perhaps an average. Either way, you end up with a single number that, while precise, will most likely not line up with reality no matter how much effort you put into your estimations.
Enter the next generation of ALE
ALE 2.0 leverages the BETA distribution with PERT estimates and runs a Monte Carlo simulation. While that sounds really fancy and perhaps a bit daunting, it’s really quite simple and most people should be able to understand the logic by digging into the ALE 2.0 example.
Let’s walk through ALE 2.0 by going through a case together: let’s estimate the annual cost of handling virus infections in some made-up mid-sized company.
For the annual rate of occurrence, we think we get around 2 virus infections a month on average, some months there aren’t any, and every few years we get an outbreak infecting a few hundred. Let’s put that in terms of a PERT estimate. At a minimum (in a good year), we’d expect maybe 12 a year, most likely there are 30 per year and bad years we could see 260 outbreaks.
For the single loss expectancy, we may see nothing, the anti-virus picks it up and cleans it automatically and there’s no loss. Most likely, we spend 30 minutes to manually thump it, worst case we do system rebuilds, taking 2 hours, non-dedicated time but there are some other overhead tasks. Putting that in terms of money, we may say minimum is $0, most likely, oh $50 of time, worst case, $200.
Now let’s hit the button. Some magic happens and out pops the output:
There were a couple of simulations with no loss (min value) from responding to viruses given those inputs, on average there was about $4,400 in annualized loss and there were some really bad years (in this case) going up to around $35k. There are some statements to make from this as well, like "10% of the ALE simulations exceeded $9,000.”
But the numbers, or even ALE for that matter aren’t what this is about, it’s about understanding what OpenPERT can do.
What’s going on here?
Swap over to the “Supporting Data” tab in Excel, that’s where the magic happens. Starting in cell A2, we call the OPERT() function with the values entered in for ARO. The OPERT function takes in the minimum, most likely, maximum values and an optional confidence value. In the cell, the function returns a random value based on a beta distribution of values. This ARO calculation is repeated for 5000 rows in column A, that’s the Monte Carlo portion. Column B has all of the SLE calculations (OPERT function calls in SLE estimations) for 5000 simulations and column C is just the ARO multiplied by the SLE (the ALE for the simulation).
In summary, this leverages the OPERT() function to returns a single instance for the two input estimations (ARO and SLE) and we repeat that to get a large enough sample size (and 5000 is generally a large enough sample size, especially for this type of broad-stroke ALE technique).
Also, if you’re curious the table to the right of column C is the data used to construct that pretty graph on the first tab (show above).
Next Steps
The ALE method itself may have limited application, but it’s the thought process behind it that’s important. The combination of PERT estimations with the beta distribution to feed into Monte Carlo simulations is what makes this approach better than point estimates. This could be used for a multitude of applications, say for estimating the piano tuners in Chicago or any number of broad estimations, some of them even related to risk analysis hopefully. We’re already working on the next version of OpenPERT too, in which we’re going to integrate Monte Carlo simulations and a few other features.
It would be great to build out some more examples. Can you think of more ways to leverage OpenPERT? Having problems getting it work? Let us know, please!
OWASP Risk Rating Methodology. If you haven’t read about this methodology, I highly encourage that you do. There is a lot of material there to talk and think about.
To be completely honest, my first reaction is “what the fudge-cake is this crud?” It symbolizes most every challenge I think we face with information security risk analysis methods. However, my pragmatic side steps in and tries to answer a simple question, “Is it helpful?” Because the one thing I know for certain is the value of risk analysis is relative and on a continuum ranging from really harmful to really helpful. Compared to unaided opinion, this method may provide a better result and should be leveraged. Compared to anything else from current (non-infosec) literature and experts, this method is sucking on crayons in the corner. But the truth is, I don’t know if this method is helpful or not. Even if I did have an answer I’d probably be wrong since its value is relative to the other tools and resources available in any specific situation.
But here’s another reason I struggle, risk analysis isn’t easy. I’ve been researching risk analysis methods for years now and I feel like I’m just beginning to scratch the surface – the more I learn, the more I learn I don’t know. It seems that trying to make a “one-size fits all” approach always falls short of expectations, perhaps this point is better made by David Vose:
I’ve done my best to reverse the tendency to be formulaic. My argument is that in 19 years we have never done the same risk analysis twice: every one has its individual peculiarities. Yet the tendency seems to be the reverse: I trained over a hundred consultants in one of the big four management consultancy firms in business risk modeling techniques, and they decided that, to ensure that they could maintain consistency, they would keep it simple and essentially fill in a template of three-point estimates with some correlation. I can see their point – if every risk analyst developed a fancy and highly individual model it would be impossible to ensure any quality standard. The problem is, of course, that the standard they will maintain is very low. Risk analysis should not be a packaged commodity but a voyage of reasoned thinking leading to the best possible decision at the time.
So here’s the question I’m thinking about, without requiring every developer or infosec practitioner to become experts in analytic techniques, how can we raise the quality of risk-informed decisions?
Let’s think of the OWASP Risk Rating Methodology as a model, because, well, it is a model. Next, let’s consider the famous George Box quote, “All models are wrong, but some models are useful.” All models have to simplify reality at some level (thus never perfectly represent reality) so I don’t want to simply tear apart this risk analysis model because I can point out how it’s wrong. Anyone with a background in statistics or analytics can point out the flaws. What I want to understand is how useful the model is, and perhaps in doing that, we can start to determine a path to make this type of formulaic risk analysis more useful.
There are very few things more valuable to me than someone constructively challenging my thoughts. I have no illusions thinking I’m right and I’m fully aware that there is always room for improvement in everything. That’s why I’m excited that lonervamp wrote up “embrace the value, any value, you can find” providing some interesting challenges to my previous post on “Yay! we have value now!”
Overall, I’d like to think we’re more in agreement than not, but I was struck by this quote:
Truly, we will actually never get anywhere if we don’t get business leaders to say, "We were wrong," or "We need guidance." These are the same results as, "I told ya so," but a little more positive, if you ask me. But if leaders aren’t going to ever admit this, then we’re not going to get a chance to be better, so I’d say let ‘em fall over.
Crazy thought here… What if they aren’t wrong? What if security folks are wrong? I’m not going to back that up with anything yet. But just stop and think for a moment, what if the decision makers have a better grasp on expected loss from security breaches than security people? What would that situation look like? What data would we expect to find to make them right and security people wrong? Why do some security people find some pleasure when large breaches occur? Stop and picture those for a while.
I don’t think anyone would say it’s that black and white and I don’t think there is a clear right or wrong here, but I thought I’d attempt to shift perspectives there, see if we could try on someone else’s shoes. I tend to think that hands down, security people can describe the failings of security way better than any business person. However, and this is important, that’s not what matters to the business. I know that may be a bit counter-intuitive, our computer systems are compromised by the bits and bytes. The people with the best understanding of those are the security people, how can they not be completely right in defining what’s important? I’m not sure I can explain it, but that mentality is represented in the post that started this discussion. This sounds odd, but perhaps security practitioners know too much. Ask any security professional to identify al the ways the company could be shut down by attackers and it’d probably be hard to get them to stop. Now figure out how many companies have experienced losses anything close to those and we’ve got a very, very short list. That is probably the disconnect.
Let me try and rephrase that, while security people are shouting that our windows are susceptible to bricks being thrown by anyone with an arm (which is true), leaders are looking at how often bricks are thrown and the expected loss from it (which isn’t equal to the shouting and also true). That disconnect makes security people lose credibility (“it’s partly cloudy, why are they saying there’s a tornado?”) and vice versa (“But Sony!”). I go back to neither side is entirely wrong, but we can’t be asking leadership to admit they’re wrong without some serious introspection first.
I’d like to clarify my point #3 too. Ask the question: how many hack-worthy targets are there? Whether explicit or not, everyone has answered this in there head, most everyone is probably off (including me). When we see poster children like RSA, Sony, HBGary and so on. We have to ask ourselves how likely is it that we are next? There are a bazillion variables in that question, but let’s just consider it as a random event (which is false, but the exercise offers some perspective). First, we have to picture “out of how many?” Definitely not more than 200 Million (registered domain names), and given there are 5 Million U.S. companies (1.1 Million making over 1M, 7,500 making over 250M), can we take a stab at how many hack-worthy targets there are in the world? 10 thousand? Half a million? Whatever that figure is, compare it to the number of seriously impactful breaches in a year. 1? 5? 20? 30? Whatever you estimate here, it’s a small, tiny number. Let’s take worst case of 30/7,500 (max breaches over min hack-worthy) that comes out to a 1 in 250 chance. That’s about the same chance a white person in the US will die of myeloma or that a U.S. female will die of brain cancer. It might even be safe to say that in any company, female employees will die of brain cancer more often than a major/impactful security breach will occur. Weird thought, but that’s the fun of reference data points and quick calculations.
This is totally back-of-the-napkin stuff, but people do these calculations without reference data and in their head. Generally people are way off on these estimations. It’s partly why we think Sony is more applicable than it probably is (and why people buy lottery tickets). The analogy LonerVamp made about the break-ins in the neighborhood doesn’t really work, it puts the denominator too small in our heads. Neighborhoods are pictured, I’d guess as a few dozen, maybe 100 homes max, and makes us think we’re much more likely to be the next target. Perhaps we could say, “imagine you live in a neighborhood of 10,000 houses and one of them was broken into…” (or whatever the estimate of hack-worthy targets is).
I bet there’s an interesting statistic in there, that 63% percent of companies think they are in the top quarter of prime hack-worthy targets. (yeah, made that up, perhaps there’s some variation of the Dunning-Kruger effect for illusory hack-worthiness). Anyway, I’m cutting the rest of my points for the sake of readability. I’d love to continue this discussion and I hope I didn’t insult lonervamp (or anyone else) in this discussion, that isn’t my intent. I’m trying to state my view of the world and hope that others can point me in whatever direction makes more sense. |
Acupressure, its use and contraindications
12 August, 2017
Acupressure is an ancient oriental method of treatment of many pathologies.It is based on the corresponding impact points on the body that are associated with the internal organs.
This type of treatment is characterized by individual approach to the patient, gradual and complex effects on the pathogenetic mechanisms of diseases through the external effect on the active points of the body.As it has long been known that a disease of the body should be treated as if the whole body is sick, because all the structures of the human body are closely linked.
Acupressure is somewhat similar to acupuncture, but it is used finger pressing the appropriate parts of the body, which leads to an improvement in the condition of patients and the restoration of disturbed functions.
data areas in modern medicine are called biologically active points.I must say that the human body of 365, and all of them have certain characteristics.So, they are characterized by low electrodermal resistance, significant electrical pot
ential and high skin temperatures.In addition, they are characterized by heightened pain sensitivity, faster metabolism and increased oxygen uptake.
What kind of influence acupressure on the human body?
Depending on what point of action can stimulate or relax the nervous system, increases blood circulation and nutrition of tissues in the body, affect the functioning of the glands of the endocrine system, to eliminate the pain of various etiologies, relieves spasms and muscle tone.
Such a wide range of effects on the human body allows the use of acupressure in the following pathologies:
• neurosis and depression;
• diseases of the nervous system, including neuritis, neuralgia, vegetative-vascular disorders, sciatica.In addition, acupressure head perfectly struggling not only with migraine attacks neurogenic origin, but also able to improve the whole body;
• circulatory system diseases, notably the essential hypertension, reflex angina, arrythmia (if it is not associated with severe infarction);
• diseases of the digestive system, especially in its functional disorders.
Widespread received acupressure back, which is especially common in patients with lesions of the musculoskeletal system and connective tissue.This therapeutic technique perfectly helps with pain in osteochondrosis, rheumatoid arthritis or allergic origin, sciatica, spondylosis.
Despite the positive impact on the body, the use of acupressure is impossible in the presence of benign tumors, cancer, blood abnormalities, acute infectious diseases, myocardial infarction, acute thrombosis or embolism, tuberculosis, a sharp exhaustion, a peptic ulcer.Do not use an impact on biologically active points among pregnant women, the elderly and children under one year of age.
It should be noted that for each disease need to only affect the corresponding points.Interestingly, they generally are not placed in the affected areas.For example, in cardiac disorders were acupressure not the chest, and feet, and when expressed headaches recommended point impact in the 2-3 lumbar vertebra. |
Russian plane carrying too much gold falls apart during takeoff scattering gold bars
On March 15, an incident occurred to an An-12 aircraft in Yakutia. The cargo hatch came off the aircraft during takeoff.
The An-12 was carrying nine tons of gold. Most of the cargo fell out of the aircraft as a result of the incident. Gold bars were scattered on the airfield. For the time being, 172 gold bars, each weighing 20 kilos, have been recovered.
The gold that the cargo plane was carrying on board was evaluated at 21 billion 600 million rubles ($378 million). The crew decided to return to Yakutsk immediately after the incident. The aircraft landed successfully. Airport employees inspected the aircraft before departure and found it completely serviceable.
The Investigative Committee of Russia launched investigation into the incident with the An-12 plane in Yakutia.
"When ascending, the cargo ramp was damaged after the cargo went adrift. The plane was carrying the concentrate containing precious metal, in bars weighing about 9.3 tonnes. The cargo belongs to the Chukotka Mining and Geological Company," officials with the Investigative Committee said.
Photos taken from social networks
Pravda.Ru
Read article on the Russian version of Pravda.Ru |
Q:
Error when compiling simple Qwt program on Mac OSX 10.7.4
I'm trying to get the following c++ program using Qwt v. 6.0.1 to work:
#include <cmath>
#include <QApplication>
#include <qwt_plot.h>
#include <qwt_plot_curve.h>
int main(int argc, char **argv)
{
QApplication a(argc, argv);
QwtPlot plot(QwtText("CppQwtExample1"));
plot.setGeometry(0,0,640,400);
plot.setAxisScale(QwtPlot::xBottom, 0.0, 2.0*M_PI);
plot.setAxisScale(QwtPlot::yLeft, -1.0, 1.0);
QwtPlotCurve sine("Sine");
std::vector<double> xs;
std::vector<double> ys;
for (double x=0; x<2.0*M_PI; x+=(M_PI/10.0)) {
xs.push_back(x);
ys.push_back(std::sin(x));
}
sine.setData(&xs[0], &ys[0], xs.size());
sine.attach(&plot);
plot.show();
return a.exec();
}
and the .pro file looks like:
TEMPLATE = app
TARGET = CppQwtExample1
QMAKEFEATURES += /usr/local/qwt-6.0.1/features
CONFIG += qwt
INCLUDEPATH += /usr/local/qwt-6.0.1/lib/qwt.framework/Headers
LIBS += -L/usr/local/qwt-6.0.1/lib/qwt.framework/Versions/6/ \
-lqwt
SOURCES += qwtTest.cpp
However, when I now try to do
qmake
make
I get the error:
ld: library not found for -lqwt
collect2: ld returned 1 exit status
make: * [qwtTest.app/Contents/MacOS/qwtTest] Error 1
I surely miss something here. Any help is greatly appreciated.
A:
LIBS += -L/usr/local/qwt-6.0.1/lib/qwt.framework/Versions/6/ -lqwt
This is wrong. Due to the naming conventions of Mac OS X frameworks, the dynamic library inside qwt.framework isn't named "libqwt.dylib" (which the linker requires), but simply "qwt".
Use
LIBS += -F/usr/local/qwt-6.0.1/lib -framework qwt
instead.
|
"Do you get it? Are you going to straighten up? Because I'm not playing with you today. Do you understand," the officer asks. "Now, we're going to get up and you're not going to do anything stupid again." |
{
"_from": "tsutils@^3.17.1",
"_id": "tsutils@3.17.1",
"_inBundle": false,
"_integrity": "sha1-7XGZF/EcoN7lhicrKsSeAVot11k=",
"_location": "/tsutils",
"_phantomChildren": {},
"_requested": {
"type": "range",
"registry": true,
"raw": "tsutils@^3.17.1",
"name": "tsutils",
"escapedName": "tsutils",
"rawSpec": "^3.17.1",
"saveSpec": null,
"fetchSpec": "^3.17.1"
},
"_requiredBy": [
"/@typescript-eslint/eslint-plugin",
"/@typescript-eslint/typescript-estree"
],
"_resolved": "https://registry.npm.taobao.org/tsutils/download/tsutils-3.17.1.tgz",
"_shasum": "ed719917f11ca0dee586272b2ac49e015a2dd759",
"_spec": "tsutils@^3.17.1",
"_where": "D:\\www\\xing\\dapps\\node_modules\\@typescript-eslint\\eslint-plugin",
"author": {
"name": "Klaus Meinhardt"
},
"bugs": {
"url": "https://github.com/ajafff/tsutils/issues"
},
"bundleDependencies": false,
"dependencies": {
"tslib": "^1.8.1"
},
"deprecated": false,
"description": "utilities for working with typescript's AST",
"devDependencies": {
"@fimbul/mithotyn": "^0.17.0",
"@fimbul/valtyr": "^0.20.0",
"@fimbul/wotan": "^0.20.0",
"@types/chai": "^4.0.10",
"@types/mocha": "^5.0.0",
"@types/node": "^11.13.0",
"chai": "^4.1.2",
"coveralls": "^3.0.0",
"github-release-from-changelog": "^1.3.0",
"mocha": "^6.0.2",
"npm-run-all": "^4.1.2",
"nyc": "^13.3.0",
"ts-transform-const-enum": "^0.0.1",
"tslint": "^5.8.0",
"tslint-consistent-codestyle": "^1.11.0",
"ttypescript": "^1.5.5",
"typescript": "^3.6.0-dev.20190804"
},
"engines": {
"node": ">= 6"
},
"homepage": "https://github.com/ajafff/tsutils#readme",
"keywords": [
"typescript",
"ts",
"ast",
"typeguard",
"utils",
"helper",
"node"
],
"license": "MIT",
"name": "tsutils",
"peerDependencies": {
"typescript": ">=2.8.0 || >= 3.2.0-dev || >= 3.3.0-dev || >= 3.4.0-dev || >= 3.5.0-dev || >= 3.6.0-dev || >= 3.6.0-beta || >= 3.7.0-dev || >= 3.7.0-beta"
},
"repository": {
"type": "git",
"url": "git+https://github.com/ajafff/tsutils.git"
},
"scripts": {
"compile": "rm -rf {,util,typeguard,test/**}/*.js; ttsc -p .",
"coverage": "nyc run-s test",
"github-release": "GITHUB_TOKEN=$(cat ~/github_token.txt) github-release-from-changelog",
"lint": "run-p lint:*",
"lint:tslint": "wotan -m @fimbul/valtyr",
"lint:wotan": "wotan",
"postpublish": "git push origin master --tags; run-s github-release",
"prepublishOnly": "run-s verify",
"report-coverage": "cat ./coverage/lcov.info | coveralls",
"test": "mocha test/*Tests.js && tslint --test 'test/rules/**/tslint.json'",
"verify": "run-s compile lint coverage"
},
"version": "3.17.1"
}
|
/*********************************************************
* Copyright (C) 2008-2019 VMware, Inc. All rights reserved.
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU Lesser General Public License as published
* by the Free Software Foundation version 2.1 and no later version.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the Lesser GNU General Public
* License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
*********************************************************/
/*
* string.hh --
*
* A string wrapper for bora/lib/unicode. This class is intended to provide
* more c++ features such as operator overloading, automatic string conversion
* between different types of string classes.
*
* This class uses glib::ustring as the underlying storage for its data,
* we chose this object because of its internal support for unicode.
*
*/
#ifndef UTF_STRING_HH
#define UTF_STRING_HH
#include <string>
#include <vector>
#include <algorithm>
#ifdef _WIN32
#pragma pack(push, 8)
#endif // _WIN32
/*
* Include glib.h here as a work-around - hopefully temporary - for a
* compilation error that would otherwise occur as a result of the
* inclusion of <glibmm/ustring.h> on the next line. The compilation
* error that would otherwise occur is the result of:
* (1) nested includes in <glibmm/ustring.h> ultimately include a
* glib-related header file other than glib.h; but
* (2) including a glib header file other than glib.h outside
* of glib code is not allowed with the latest glib.
*
* Although including glib.h here does not actually fix the underlying
* problem, it does turn off the complaint. It's believed (hoped?) that
* an upgrade of glibmm will fix the issue properly and eliminate the
* need to include <glib.h> here.
*/
#include <glib.h>
#include <glibmm/ustring.h>
#ifdef _WIN32
#pragma pack(pop)
#endif // _WIN32
#ifdef _WIN32
#include "ubstr_t.hh"
#endif
#include <libExport.hh>
#include <unicodeTypes.h>
#ifdef _WIN32
/*
* Disabling Windows warning 4251
* This is a warning msg about requiring Glib::ustring to be DLL
* exportable.
*/
#pragma warning(push)
#pragma warning(disable:4251)
#endif
namespace utf {
/* utf8string should be replaced with an opaque type. It is temporarily used
* to replace the std::string in our codebase.
*/
typedef std::string utf8string;
typedef std::basic_string<utf16_t> utf16string;
class VMSTRING_EXPORT string
{
public:
// type definitions
typedef Glib::ustring::size_type size_type;
typedef Glib::ustring::value_type value_type;
typedef Glib::ustring::iterator iterator;
typedef Glib::ustring::const_iterator const_iterator;
// constant definitions
static const size_type npos;
// Normalize mode map to Glib::NormalizeMode
typedef enum {
NORMALIZE_DEFAULT = Glib::NORMALIZE_DEFAULT,
NORMALIZE_NFD = Glib::NORMALIZE_NFD,
NORMALIZE_DEFAULT_COMPOSE = Glib::NORMALIZE_DEFAULT_COMPOSE,
NORMALIZE_NFC = Glib::NORMALIZE_NFC,
NORMALIZE_ALL = Glib::NORMALIZE_ALL,
NORMALIZE_NFKD = Glib::NORMALIZE_NFKD,
NORMALIZE_ALL_COMPOSE = Glib::NORMALIZE_ALL_COMPOSE,
NORMALIZE_NFKC = Glib::NORMALIZE_NFKC
} NormalizeMode;
string();
string(const char *s);
#ifdef _WIN32
string(const ubstr_t &s);
explicit string(const _bstr_t &s);
#endif
string(const utf16string &s);
string(const utf16_t *s);
string(const char *s, StringEncoding encoding);
string(const Glib::ustring &s);
string(const string &s);
~string();
// Implicit conversions
operator const Glib::ustring& () const;
#ifdef _WIN32
operator const ubstr_t() const;
#endif
// Conversions to other i18n types (utf8, utf16, unicode)
const char *c_str() const;
const utf16_t *w_str() const;
const Glib::ustring& ustr() const;
// Mapping functions to Glib::ustring
void swap(string &s);
void resize(size_type n, value_type c = '\0');
void reserve(size_type n = 0);
bool empty() const;
size_type size() const;
size_type w_size() const;
size_type length() const;
size_type bytes() const;
string foldCase() const;
string trim() const;
string trimLeft() const;
string trimRight() const;
string normalize(NormalizeMode mode = NORMALIZE_DEFAULT_COMPOSE) const;
string toLower(const char *locale = NULL) const;
string toUpper(const char *locale = NULL) const;
#ifdef USE_ICU
string toTitle(const char *locale = NULL) const;
#endif
// String-level member methods.
string& append(const string &s);
string& append(const string &s, size_type i, size_type n);
string& append(const char *s, size_type n);
string& assign(const string &s);
void push_back(value_type uc);
void clear();
string& insert(size_type i, const string& s);
string& insert(size_type i, size_type n, value_type uc);
string& insert(iterator p, value_type uc);
string& erase(size_type i, size_type n = npos);
iterator erase(iterator p);
iterator erase(iterator pbegin, iterator pend);
string& replace(size_type i, size_type n, const string& s);
string& replace(const string& from, const string& to);
string replace_copy(const string& from, const string& to) const;
int compare(const string &s, bool ignoreCase = false) const;
int compare(size_type i, size_type n, const string &s) const;
int compareLength(const string &s, size_type len, bool ignoreCase = false) const;
int compareRange(size_type thisStart, size_type thisLength, const string &str,
size_type strStart, size_type strLength,
bool ignoreCase = false) const;
size_type find(const string &s, size_type pos = 0) const;
size_type rfind(const string &s, size_type pos = npos) const;
size_type find_first_of(const string &s, size_type i = 0) const;
size_type find_first_not_of(const string &s, size_type i = 0) const;
size_type find_last_of(const string &s, size_type i = npos) const;
size_type find_last_not_of(const string &s, size_type i = npos) const;
string substr(size_type start = 0, size_type len = npos) const;
// Character-level member methods.
value_type operator[](size_type i) const;
size_type find(value_type uc, size_type pos = 0) const;
size_type rfind(value_type uc, size_type pos = npos) const;
size_type find_first_of(value_type uc, size_type i = 0) const;
size_type find_first_not_of(value_type uc, size_type i = 0) const;
size_type find_last_of(value_type uc, size_type i = npos) const;
size_type find_last_not_of(value_type uc, size_type i = npos) const;
// Sequence accessor.
iterator begin();
iterator end();
const_iterator begin() const;
const_iterator end() const;
// Operator overloads
string& operator=(string copy);
string& operator+=(const string &s);
string& operator+=(value_type uc);
// Some helper functions that are nice to have
bool startsWith(const string &s, bool ignoreCase = false) const;
bool endsWith(const string &s, bool ignoreCase = false) const;
std::vector<string> split(const string &sep, size_t maxStrings = 0) const;
// Overloaded operators
string operator+(const string &rhs) const;
string operator+(value_type uc) const;
bool operator==(const string &rhs) const;
bool operator!=(const string &rhs) const;
bool operator<(const string &rhs) const;
bool operator>(const string &rhs) const;
bool operator<=(const string &rhs) const;
bool operator>=(const string &rhs) const;
private:
// Cache operations
void InvalidateCache();
// Cache accessors
const utf16_t *GetUtf16Cache() const;
// utf::string is internally backed by Glib::ustring.
Glib::ustring mUstr;
// Cached representations.
mutable utf16_t *mUtf16Cache;
mutable size_type mUtf16Length;
/*
* All added members need to be initialized in all constructors and need
* to be handled in swap().
*/
};
// Helper operators
string inline
operator+(const char *lhs, const string &rhs) {
return string(lhs) + rhs;
}
string inline
operator+(const string& lhs, const char *rhs) {
return lhs + string(rhs);
}
bool inline
operator==(const char *lhs, const string &rhs) {
return string(lhs) == rhs;
}
bool inline
operator!=(const char *lhs, const string &rhs) {
return string(lhs) != rhs;
}
bool inline
operator<(const char *lhs, const string &rhs) {
return string(lhs) < rhs;
}
bool inline
operator>(const char *lhs, const string &rhs) {
return string(lhs) > rhs;
}
bool inline
operator<=(const char *lhs, const string &rhs) {
return string(lhs) <= rhs;
}
bool inline
operator>=(const char *lhs, const string &rhs) {
return string(lhs) >= rhs;
}
// This lets a utf::string appear on the right side of a stream insertion operator.
inline std::ostream&
operator<<(std::ostream& strm, const string& s)
{
strm << s.c_str();
return strm;
}
inline std::wostream&
operator<<(std::wostream& strm, const string& s)
{
strm << s.w_str();
return strm;
}
// ConversionError class for exception
class ConversionError {};
// Helper functions
VMSTRING_EXPORT bool Validate(const Glib::ustring& s);
VMSTRING_EXPORT string
CreateWithLength(const void *buffer, ssize_t lengthInBytes, StringEncoding encoding);
VMSTRING_EXPORT string
CreateWithBOMBuffer(const void *buffer, ssize_t lengthInBytes);
VMSTRING_EXPORT string CopyAndFree(char* utf8, void (*freeFunc)(void*) = free);
VMSTRING_EXPORT string IntToStr(int64 val);
VMSTRING_EXPORT void CreateWritableBuffer(const string& s,
std::vector<char>& buf);
VMSTRING_EXPORT void CreateWritableBuffer(const string& s,
std::vector<utf16_t>& buf);
} // namespace utf
// Template specializations for utf::string.
namespace std {
template<>
inline void
swap<utf::string>(utf::string& s1, // IN/OUT
utf::string& s2) // IN/OUT
{
s1.swap(s2);
}
} // namespace std
#ifdef _WIN32
#pragma warning(pop)
#endif
#endif
|
Taking place within a flashback within a flashback within a flashback — it actually makes a fitting kind of sense once you see it — Ralph Fiennes plays Gustave H., the concierge and unofficial manager of a majestic hotel lodged high in the mountains of the fictional Republic of Zubrowka, in 1932.
The hotel itself feels like a cinematic dollhouse, and not just due to Anderson’s artistic use of ornate miniatures. Populated by guests who frequent the hotel often solely for the luxury of Gustave’s private company, the hotel is a lavish destination for all types of elite guests and a coveted place of employment. The course of events in the film are told from the point of view of Zero (Tony Revolori), the new lobby boy at the Grand Budapest.
When one of Gustave’s regular companions, the 84-year-old Madame D. (an unrecognizable Tilda Swinton), dies suddenly of what is ruled to be a poisoning and Gustave is bequeathed her most prized painting, he finds himself embroiled in an absolutely hilarious caper involving bitter relatives, suspicious officers, ruthless criminals, colour-coordinated concierges, and his faithful lobby boy.
Anderson is known for reusing cast members in subsequent films, but The Grand Budapest Hotel may be his most expansive reunion to date. Past collaborators Bob Balaban, Adrien Brody, Willem Dafoe, Jeff Goldblum, Harvey Keitel, Bill Murray, Edward Norton, Jason Schwartzman, Swinton, Owen Wilson, and Wallace Wolodarsky all return. Joined by newcomers F. Murray Abraham, Mathieu Amalric, Fiennes, Jude Law, Revolori, Saoirse Ronan, Léa Seydoux, Fisher Stevens, and Tom Wilkinson, The Grand Budapest has one of the largest and most respected casts of any modern comedy, and makes wonderful use of each and every actor.
The Grand Budapest Hotel is a maturely envisioned and cleverly constructed comedy. For example: The film jumps between three different time periods, and to help the audience keep them straight, Anderson uses a different screen ratio (1.33:1, 1.85:1, and 2.35:1) for each one. Touches like this give the movie a unique flavour at once fitting for an Anderson picture and yet refreshingly new and different for the director.
The script is remarkably funny, perhaps more overtly so than anything Anderson has done to date. It allows the movie a wonderful blend of visual art and loose comedy that seems like a natural evolution for Anderson while also proving to be a bridge between his hip audiences of fans and those who’ve never found his films to be accessible enough for mainstream tastes.
Anderson’s previous film, 2012’s Moonrise Kingdom, felt like a greatest-hits compilation of his prior movies (magnificent, though it was), sampling tones, characters, themes, story threads, and relationships in a melange that felt brilliant to those unfamiliar with his catalogue but oddly repetitive to those who’d followed his films with a fanatical fervour.
What remained to be seen was whether Anderson had run out of original ideas or if it was simply the closing of the first chapter of his career. As The Grand Budapest Hotel proves, Moonrise Kingdom was the swan song of what will likely be known as the Early Wes Anderson Years. The Grand Budapest Hotel is the beginning of Chapter 2. And what a stunning and auspicious start it is, too. |
Q:
Costs/profit of/when starting an indie company
In short, I want to start a game company. I do not have much coding experience (just basic understanding and ability to write basic programs), any graphics design experience, any audio mixing experience, or whatever else technical. However, I do have a lot of ideas, great analytical skills and a very logical approach to life. I do not have any friends who are even remotely technical (or creative in regards to games for that matter).
So now that we've cleared that up, my question is this: how much, minimally, would it cost me to start such a company? I know that a game could be developed in under half a year, which means it would have to operate for half a year prior, and that's assuming that the people working on the first project do their jobs good, don't leave game breaking bugs, a bunch of minor bugs, etc.. So how much would it cost me, and what would be the likely profit in half a year? I'm looking at minimal costs here, as to do it, I would have to sell my current apartment and buy a new, smaller one, pay taxes, and likely move to US/CA/UK to be closer to technologically advanced people (and be able to speak the language of course).
EDIT: I'm looking at a small project for starters, not a huge AAA title.
A:
This is mostly an unanswerable question, but I'll go through some of the things you mention.
You don't have any useful skills to bring to the table - sorry to be blunt - so you basically have to bankroll the enterprise if you want anybody to take you seriously.
Your main cost is the people you need to employ. Unless you know what sort of game you're going to make, you're not going to know how many people you need, so that hinders things somewhat. But I'll assume you can make the game you want to make with 1 programmer and 1 artist.
According to the Game Developer 2011 Game Industry Salary Survey you'd expect to pay a programmer about $7750 a month and artists about $6300. Most developers can be hired for significantly less than that - but with a small team, you probably can't afford to gamble on junior people. So that's almost $85,000 on salary for six months - not including paying yourself. Perhaps you can save a few thousand on less experienced developer, but there are other roles such as sound, music, web developer, etc, so I don't imagine you'll be able to do it much more cheaply than that.
You may be able to get away without spending money on an office and have people work from home instead, but you'll probably have to spend on technology and infrastructure - this could be anything from next to nothing to maybe $5000 for a few engine licenses, app approval fees and developer network fees, server hosting, IT support, etc.
Then you'll need some sort of publicity for the game. That means advertising campaigns, marketing, PR, etc. I would expect to spend several thousand on that if you mean business.
So, I would estimate the costs for you to be roughly in the area of $100,000.
How much profit would you make? Well, most games don't make a profit. One survey of iOS games said the average revenue was $165,121, so you might expect profit of $65,000. Unfortunately revenue is not distributed normally across all games - and in fact the median revenue was $2,400, meaning you might more commonly expect to lose about $97,000. So it's a very risky gamble.
I would suggest learning a technical skill so that you can contribute directly to your game and decrease your salary costs. It also means you can work on the game while otherwise employed, and then only take the company full time when the game is released and successful - if it ever reaches that point.
|
- 7. Let q be b*3/(-12)*-2. Suppose 4*j - 4*h + 0 = -8, -4*j - h + 12 = 0. Solve -3*v + 6 = 3*z, j = 3*z - q for v.
1
Suppose -f = 2, -2*f + 7*f = -5*z - 10. Let y be 2 - 1 - (1 + -2). Solve 4*s + c + 10 = -c, z = y*s - 2*c + 8 for s.
-3
Let i = 65 - 39. Let z be 4/6 + i/6. Suppose -10*m = -z*m - 25. Solve p - 2*f = -3, -2*p = -3*p - m*f + 25 for p.
5
Let m(d) = -2*d**2 - 39*d - 173. Let a be m(-7). Solve -a*v = -3*l - v, -4*l = 4*v for l.
0
Let g be ((-12)/(-18))/(2/15). Suppose 3*s + g = 4*s. Solve 4*t - 5 = s*r, -1 = 4*t + 4*r + 3 for t.
0
Let w(f) = 3*f**3 - 2*f**2 + 3*f - 2. Let y be w(1). Let t be y/11 - (-84)/22. Solve -3*i - t*a = -0*a + 22, -3*i = -a + 2 for i.
-2
Let u be -7 + 29/4 + 3/4. Solve 2*f = x - u, 2*f - f + 4*x + 14 = 0 for f.
-2
Suppose 0 = 2*q + o - 7, -2 = -4*q + 5*q - 5*o. Solve 0 = -0*x - x - 2*p, q*x - p - 14 = 0 for x.
4
Suppose 2*u - 2 = l, 4*u = -4*l + 12 + 16. Suppose -5*k = -q + 12 + 21, -15 = -5*q - 5*k. Solve -5*b - l*y = -q, -3*b + 5*b = -5*y + 10 for b.
0
Let t be ((-7)/84*-30)/(5/4). Solve 6 = 2*y - 4*z, y + 0*y - t = 3*z for y.
5
Let b(c) = -2*c**2 + 11*c + 13. Let k be b(6). Let q be ((-24)/30)/(1 - k/5). Solve 2*x - 3*v + 5 = q*v, -3*x + 1 = v for x.
0
Suppose -4*b = -3*l + b + 7, l + 3*b - 21 = 0. Let q be -4*l/24 + 26/4. Solve -4*x = 2*h + 12, q*h + 7 = x - 1 for x.
-2
Suppose 65*v = 34*v + 124. Solve -3*o = -v*q, -3*o + 2*q = -q + 3 for o.
-4
Suppose 107*f = 111*f. Suppose -a + 1 = -s, a - 5*a + 5*s = f. Solve 0 = -5*i - 3*x - 1 + 3, -a*x - 6 = -i for i.
1
Let z(j) = -j**3 - 6*j**2 + 26. Let x be z(-5). Solve -l = 2*w + x, -3*w + 3 = w + 3*l for w.
-3
Suppose 5*i - 30 - 45 = 0. Let n = 4 - -3. Let v be n/4 - 9/(-36). Solve -3*p + 2*z = i, -3 = v*z - 3*z for p.
-3
Let a be 1/((-30)/(-14) - 2). Let r be (7/a)/(2/4). Suppose j = -3*j + 12. Solve d = -r*s + 4, j*s = -d + 5 + 2 for s.
3
Let v(k) = 14*k + 184. Let u be v(-11). Solve -u = -m - 5*o, 4*m - 8*m + o = -15 for m.
5
Let v = 26617 + -26600. Let c = -5 - -10. Solve a + a = c*h - 23, -3*a - v = -4*h for a.
1
Let a = 327 + -326. Solve -a = -3*b + 4*j, j = 4*b - j - 8 for b.
3
Suppose -l - 7 = -2*h - 0*l, -4*h = -l - 15. Suppose 6 = -h*n + 7*n. Solve 1 = -3*v - 5*j + 2, v - 1 = -n*j for v.
-3
Let c = -14 - -17. Let v be ((-1)/c*2)/((-16)/744). Solve -3*g - 5*i = -v, -2*i + 4 = -3*g - 0*i for g.
2
Let t = -48 - -51. Suppose 3*q = 6, -q + t*q + 16 = 5*j. Solve -5*g - 3*o - 23 = 0, j*g - 2*o + o + 15 = 0 for g.
-4
Let n = 157 + -88. Let s = n - 51. Solve 10 = j + 5*x, -x + s = -3*j - 0 for j.
-5
Let n be (3/2)/((-2)/(-4)). Suppose -3*a - 1 = -4. Let f be (a - 6)/(1*-1). Solve -4*q + 5*y + 3 = 0, -f*y + n*y = -4*q + 6 for q.
2
Let n(j) = -j**3 + 8*j**2 - 13*j - 8. Let m be n(8). Let a = -103 - m. Solve -3*i - 27 = 3*s, -2*i - 4*s + a*s = -10 for i.
-5
Let i be (-4)/(-2) + -10 + 13. Suppose -5*o = -0*o - 5*q - 35, q + i = 0. Solve -4 = -5*g + l, 2*l + 4 = o*g + l for g.
0
Let g be (-1)/(-1)*(-1 + 4). Suppose -g*k = -7 - 2. Suppose -2*y = k*y - 10. Solve -2*p + 9 = -y*d + 3*d, 0 = 5*d - p - 12 for d.
3
Let z be (-11)/(-1) + -14 + 8. Solve -2*n + 4*w - 22 = 0, 2*n + 21 = 6*n + z*w for n.
-1
Let z(h) = 3*h - 1. Let a(g) = -2*g. Let m(d) = 6*a(d) + 5*z(d). Let w be m(10). Solve c = 2*j + 16 - 4, 3*j + w = 5*c for c.
2
Suppose -2*u + f = -10, 6*f - 7*f - 15 = -3*u. Solve 5*y = -4*k - 7, -y + u = -k + y for k.
-3
Suppose z - 5*u = 7, -u + 17 = z - 2. Solve -4*p = 3*h - z, -5*h - 5 + 22 = p for p.
2
Let o(n) = -14*n - 3. Let z be o(-2). Suppose -7*k = -6*k - z. Let a(s) = s**2 + 9*s - 10. Let i be a(-10). Solve -j + 6*j + 2*u + k = 0, 4*j - u + 7 = i for j.
-3
Let y(l) = l**3 + l**2 + l - 6. Let b be y(0). Let c = b - -25. Solve -4*j - j = -h + c, -4*h = -4*j - 12 for h.
-1
Suppose 3*t - 2*i = 10, 0*i - 5*i = 3*t - 38. Let v be ((-65)/39)/((-2)/t). Solve -4 = -2*a + 3*z, -3*a + 4*z + 11 - v = 0 for a.
2
Let n(v) be the third derivative of -v**6/120 - 2*v**5/15 - 17*v**4/24 - 2*v**3/3 + 19*v**2. Let a be n(-6). Solve 0 = 4*k - 2*d + a, 5*k - d = -31 + 3 for k.
-5
Suppose -g - 11 = -5*s + 59, 0 = -s - 2*g + 3. Let a = 16 - s. Suppose 33 = 3*k + a*u, 6 = k + 3*u - 9. Solve -5*d = 3*o - 29, -o = -2*o + 3*d - k for o.
3
Suppose 14*u - 28*u + 16*u = 0. Solve x - 5*b + 25 = 0, 5 = -x - u*b + b for x.
0
Let g = -38 - -18. Let o = -18 - g. Solve b + q = -4, b - o*q + 2 = -q for b.
-3
Let a be ((-36)/(-15))/2*(-375)/(-150). Solve -2*k + 3 = 5*p - 6*p, a*p - 4*k = -7 for p.
-1
Let c be (-3 + 7)/(4/3). Suppose 2*b = c*t + 2 - 8, -2*b + 8 = 4*t. Solve 0 = 4*l + l + 5*s - 10, -3*l + s = -t for l.
1
Let q = -1593 - -1597. Solve q*i - 11 + 1 = 5*x, 4*x = -8 for i.
0
Let o = -19 - -24. Suppose o*g + 0*g - 25 = 0. Solve g*y - w = -11, w - 3*w + 10 = -4*y for y.
-2
Suppose 4 = g - 0. Let u(x) = -2*x**2 + 2*x + 12. Let p be u(-2). Solve -3*o - 4*l - 2 = p, l = 3*o - g*o - 1 for o.
-2
Let v be ((-1)/2)/(3/(-6)). Let m be ((-5)/v)/(7/(-7)). Suppose -m*o + 4*o + 5 = 0. Solve 3*x - 5 = 5*z, 4*z - 1 + o = -x for x.
0
Let u be (-2 - (-5)/1) + 0. Let o(g) = 20 - 5*g**2 + 409*g**3 - 9*g**2 + 16*g - 410*g**3. Let r be o(-15). Solve 3*q + r*x + 9 = -q, 5*q + 2 = u*x for q.
-1
Suppose -u = 5*m - 12, -11*m + 13*m - 4*u - 18 = 0. Solve -t - 2*s + 8 = -5*t, m*s = 2*t + 8 for t.
-1
Suppose 617 = 36*s - 103. Solve -4*q + s = -0*n + 5*n, n = 0 for q.
5
Suppose 0 = -13*m + 868 - 712. Solve 0 = 2*g - 3*t - m + 4, g - 4*t - 4 = 0 for g.
4
Suppose -2*o - p + 22 = p, 9 = 4*o - 3*p. Let a be o/(-3) - (-11)/(44/24). Solve -5*w - 11 = -4*r, -4*r + 0*w + 8 = -a*w for r.
-1
Let h = -12 - -24. Suppose h = 3*f - 7*f. Let w be 84/20 + f/15. Solve 5*z + m = 15, 3*z = -m + w*m + 27 for z.
4
Let o = -30 + 34. Suppose 75 = o*j + 19. Solve 3*q = m + j, -q = 2 - 6 for m.
-2
Let l(h) = -h**3 - 7*h**2 - 7*h - 2. Let y be 3/(-7)*2*28/4. Let u be l(y). Solve -4*n - 4 + 11 = 3*a, u*a = 20 for n.
-2
Let c(t) = 3*t**2 - 16*t + 29. Let b be c(3). Solve j - 11 = -0*z + 4*z, b = -2*z for j.
-5
Suppose 0 = 2*v + 2*v + 12. Let r = -3 - v. Let g = 121 - 119. Solve -m = g*p + 9, 4*p - m + 8 + 13 = r for p.
-5
Let d = 25 + -32. Let v be d/(-14) + (-15)/6. Let c be 70/98 - v/7. Solve 3*k + 2 = -2*t, -c = 2*k - 5 for t.
-4
Let z(d) = -d**3 - 7*d**2 - 3*d + 19. Let a be z(-6). Solve -3*p + 8 + 1 = 0, s + p - a = 0 for s.
-2
Let l = 442 - 422. Solve 4*k - 3 = z - 4, 5*z = -5*k - l for z.
-3
Let i be 1/(4/(-6)) + 70/(-20). Let g be ((-75)/(-10))/i*8/(-6). Solve 3 = 5*q + g*k - 9, 3*q = k + 16 for q.
4
Let l(k) = 2*k - 22. Let y be l(12). Suppose -3*f - 5*b + 27 = 0, y*b = 4*f - 0*b - 10. Solve -3*q = 2*w + 11, f*w + 5*q = w - 18 for w.
-1
Let o(l) = l**2 + 19*l + 23. Let g(b) = b - 5. Let n be g(-13). Let k be o(n). Suppose -2*p + 2 = -p. Solve k*m + 5 = -5*d, -11 = p*m - 3 for d.
3
Let h(q) = 2*q**2 - 23*q - 20. Let i(r) = r**2 - r + 1. Let m(g) = -h(g) + 3*i(g). Let k be m(-19). Solve 5*o - o + a - 23 = 0, 37 = 5*o + k*a for o.
5
Suppose 0 = -4*o - 765 + 773. Solve 3*h + 0 - 13 = -j, -4*j + o*h - 4 = 0 for j.
1
Suppose 34 = -23*w + 57. Solve 0 = -v - w, -2*x + v - 5*v + 4 = 0 for x.
4
Let y = -15 + 35. Let i(h) = -4*h**3 - h**2 + 1. Let j be -1*(1 + 0/(-1)). Let f be i(j). Solve -f*l + 5*d = -3*l - y, 5 = -d for l.
-5
Let c be ((-2)/(-7))/(24/336). Solve 5*g - 31 = -5*w + 9, -2 = -c*w + 2*g for w.
3
Suppose 20 = -307*s + 312*s. Solve -s*o - 5 = -3*x, 4*o + 5*x = 1 - 14 for o.
-2
Let j = -259 + 263. Solve 0 = -2*r - 10, -j*r = 2*d - r + 19 for d.
-2
Suppose h - 18 = -h. Suppose -h = t - 4*t. Solve -15 = -k + 4*q, t*k - 9 = q + 3 for k.
3
Suppose 2*k = -2*o + 48 - 2, 5*k + 4*o = 113. Let a = -19 + k. Suppose -a*b + 17 = 9. Solve -4*j + 5*d + b = 0, -3*d - 4 = 3*j - 7*j for j.
1
Suppose 0 = -21*r + 18*r - 6, 2*k + 3*r + 6 = 0. Solve o + 1 = -3*c + 10, -3*o + 5*c - 15 = k for o.
0
Let w(x) = x**3 + 19*x**2 + 2*x + 43. Let g be w(-19). Solve -4*s + 3*l - 11 = 0, -9 - 4 = g*s - 4*l for s.
-5
Suppose 0 = w + 141 - 141. Solve -h - 2*h + j + 8 = w, 4*j = -4*h for h.
2
Let o = -2 + 3. Let w(k) = 3*k**3 - 2*k**2 - k + 2. Let s be w(o). Solve 0 = -4*a + 3*f - s + 26, -2*a + 3*f = -18 for a.
3
Let s = -212 - -227. Solve -s = b + 2*b - v, 5*v = 0 for b.
-5
Suppose v + 1 = 7. Suppose 0 = -0*h + v*h. Let u(m) = m**2 - 3*m. Let l be u(3). Solve l*f |
Introduction {#s1}
============
*Rana grylio* virus (RGV) is a pathogenic agent that causes lethal disease in cultured pig frogs (*Rana grylio*), which was the first iridovirus isolated in China [@pone.0043033-Zhang1], [@pone.0043033-Zhang2]. Previous studies have revealed that RGV is a large, icosahedral, dsDNA virus, belonging to the family *Iridoviridae* and closely related to frog virus 3, the type species of the genus *Ranavirus* [@pone.0043033-Zhang3]--[@pone.0043033-Huang1]. At least 16 structural proteins were detected [@pone.0043033-Zhang2]. Cellular changes and some viral proteins involved in RGV infection and replication have been identified and characterized, such as 3β-hydroxysteroid dehydrogenase (3β-HSD), deoxyuridine triphosphatase (dUTPase), thymidine kinase (TK) and a gene belonging to the essential for respiration and viability family (ERV1) [@pone.0043033-Sun1]--[@pone.0043033-Lei1]. In application, a recombinant RGV containing EGFP gene (ΔTK-RGV) was constructed, which could be easily detected by fluorescent microscopy [@pone.0043033-He1]. Recently, the complete genome of RGV has been sequenced and analyzed, and the results confirmed that RGV belongs to the genus *Ranavirus* [@pone.0043033-Lei2].
Iridoviruses, belonging to Nucleo-Cytoplasmic large DNA viruses (NCLDVs), contain circularly permutated and terminally redundant double-stranded DNA genomes ranging from 103 to 212 kbp in length and replicate in both the nucleus and cytoplasm of infected cells, and could infect varieties of invertebrates and poikilothermic vertebrates [@pone.0043033-Chinchar1]. Based on the Ninth Report of the International Committee on Taxonomy of Virus (ICTV), the family *Iridoviridae* is currently classified into five genera: *Ranaviru*s, *Lymphocystivirus, Megalocytivirus*, *Iridovirus* and *Chloriridovirus* [@pone.0043033-Jancovich1]. Members of the genus *Ranavirus* could cause systemic disease or die-offs in a wide range of economically and ecologically important vertebrates including fish, amphibians and reptiles, which have become serious problems in modern aquaculture, fish farming and wildlife conservation, leading to serious economic losses [@pone.0043033-Eaton1]--[@pone.0043033-Gui1].
Virion assembly of iridoviruses takes place in electron-lucent viral matrix (virus factory) which contains virus particles at different stages of assembly, including empty capsids, capsids with partial cores and the matured nucleocapsids [@pone.0043033-Zhang3], [@pone.0043033-Huang1]. Little is known about the precise process of virion morphogenesis in iridoviruses. Up to date, only two structure proteins of iridoviruses have been identified to be linked to virion assembly, including the major capsid protein (MCP) (RGV ORF 97R) and a putative myristoylated membrane protein (ORF 53R of RGV and FV3) [@pone.0043033-Chinchar2]. MCP of iridovirus is an internal lipid membrane, the sequence of which is highly conserved within all members of the family [@pone.0043033-Mao1]. The MCP comprises 40% of the total virion protein content and contains the viral genome, constituting the inner core of iridovirus particles [@pone.0043033-Devauchelle1], [@pone.0043033-Yan1]. Knock down studies using artificial microRNAs and asMOs demonstrated that 53R was indispensable for virion assembly, and *in* *vitro* studies also showed that 53R was associated with virus factories and the virion membrane [@pone.0043033-Kim1]--[@pone.0043033-Zhao3].
{#pone-0043033-g001}
Analysis of the RGV genome showed that it contains 106 ORFs encoding peptides ranging from 41 to 1294 amino acids in length, and the ORF 50L, containing a putative SAP motif \[named after SAF-A/B, Acinus and PIAS (protein inhibitor of activated STAT)\], shares high identity with soft-shelled turtle iridovirus (STIV) while relatively low with FV3 [@pone.0043033-Lei2]. The homolog of RGV 50L in Singapore grouper iridovirus (SGIV), SGIV 25L, has been detected by LC-MALDI workflow [@pone.0043033-Song1], however, the characteristics and functions of the gene have not been studied yet.
10.1371/journal.pone.0043033.t001
###### Comparisons of RGV 50L with its homologues in other iridoviruses.
{#pone-0043033-t001-1}
Virus Accession No. ORF^a^ Length (aa)^b^ MW^c^ (kDa) Id%^d^
-------- --------------- ---------- ---------------- ------------- --------
RGV JQ654586 50L 499 55.5 100
STIV EU627010 52L 499 55.5 100
CMTV JQ231222 59R 503 55.8 89
EHNV FJ433873 83L 541 60.7 85
ATV AY150217 79L 513 60.0 82
TFV\* AF389451 51L, 52L 440 49.5 69
FV3 AY548484 49L 249 27.5 49
RRV -- -- 193 21.4 33
GIV AY666015 9L 505 55.8 23
SGIV AY521625 25L 510 56.5 23
LCDV-1 L63545 59L 200 22.2 12
LCDV-C AY380826 62R 197 22.3 12
To understand the role of RGV 50L in iridovirus propagation, we cloned RGV *50L* gene, prepared anti-RGV 50L serum, characterized its expression pattern and detected its molecular mass. Then, cycloheximide (CHX) and cytosine arabinofuranoside (Ara C) were used to identify the expression pattern of RGV *50L*. Subsequently, EGFP-50L and NLS motif mutant EGFP-50L-ΔNLS were constructed to identify subcellular locations of the fusion protein. Moreover, ΔTK-RGV and anti-RGV 50L serum were used to detect the localization of 50L protein during RGV infection. Furthermore, in order to know the effect of 50L on other RGV genes, real-time quantitative PCR of *MCP* were determined in 50L-pcDNA3.1 stably transfected cells.
{#pone-0043033-g002}
Results {#s2}
=======
Sequence Analysis of RGV 50L {#s2a}
----------------------------
The complete ORF of RGV (GenBank Accession No. JQ654586) 50L, a fragment of 1500 bp in length, was amplified from RGV genomic DNA using specific primers. Sequence analysis revealed that RGV 50L encodes 499 amino acids and contains several conserved features, including a lysine-rich nuclear localization signal (NLS), a helix-extension-helix motif (putative SAP domain) and a continuous QQEKQQPEE AVVE tri-repeated sequence ([Fig. 1](#pone-0043033-g001){ref-type="fig"}). 50L had homologues in many iridoviruses, showing high identities (82∼100%) with STIV 52L, common midwife toad ranavirus (CMTV) 59R, epizootic hematopoietic necrosis virus (EHNV) 83L, and *Ambystoma tigrinum* virus (ATV) 79L, while relatively low (less than 50%) with FV3 49L, grouper iridovirus (GIV) 9L, Singapore grouper iridovirus (SGIV) 25L, lymphocystis disease virus (LCDV-1) 59L and lymphocystis disease virus-China (LCDV-C) 62R ([Table 1](#pone-0043033-t001){ref-type="table"}).
{#pone-0043033-g003}
Prokaryotic and Temporal Expression of RGV 50L {#s2b}
----------------------------------------------
To prepare anti-RGV 50L serum, pET32a-50L was transformed into *Escherichia coli* BL21 (DE3) and expression of the 50L-His fusion protein was induced. As shown in [Fig. 2A](#pone-0043033-g002){ref-type="fig"}, the induced fusion protein was approximately 75 kDa (Lane 2--4), whereas no protein band was found at the same position of the non-induced 50L-pro/BL21 (Lane 1). The fusion protein was purified using Ni^2+^-NTA affinity chromatography (Lane 5), and used to prepare anti-RGV 50L antibody in mice.
{#pone-0043033-g004}
The temporal expression pattern of RGV 50L was characterized by real-time quantitative PCR (qRT-PCR) and western blot analysis. Transcriptional level of RGV 50L was expressed by the common logarithm of the relative quantity (Log ΔRQ). As shown in [Fig. 2B](#pone-0043033-g002){ref-type="fig"}, transcripts of 50L increased from 4 h post infect (p.i.) in RGV-infected cells and the value of Log ΔRQ was more than six at 48 h p.i. A specific protein band for 50L could be detected from 8 h p.i. by western blot assay using anti-RGV 50L antibody and the quantity also increased with the elongation of infection time ([Fig. 2C](#pone-0043033-g002){ref-type="fig"}).
{#pone-0043033-g005}
Molecular Mass Detection of RGV 50L {#s2c}
-----------------------------------
The MW of 50L shown in [Fig. 2C](#pone-0043033-g002){ref-type="fig"} was about 85 kDa, which was much larger than the data 55 kDa predicted using DNAStar. In order to confirm the result and assure the correctness of ORF prediction, further western blot analysis was performed with RGV-infected cells, 50L-pcDNA3.1 transfected cells, purified RGV particles and control cells. As shown in [Fig. 3](#pone-0043033-g003){ref-type="fig"}, positive signals could be detected in RGV-infected cells, 50L-pcDNA3.1 transfected cells and purified RGV particles (Lane 3--5 respectively), and the positive bands were about 85 kDa, while no signals were detected in mock-infected cells and pcDNA3.1 transfected cells (Lane 1 and 2 respectively). The result confirmed that the MW of RGV 50L was about 85 kDa and the predicted ORF was correct.
{#pone-0043033-g006}
Identification of RGV 50L as an Immediate-early Gene {#s2d}
----------------------------------------------------
To verify the transcriptional pattern of RGV, drug inhibition assay was carried out using Cycloheximide (CHX) and Cytosine β-D-arabinofuranoside (Ara C). The samples were detected by RT-PCR and western blot analysis, and the 50L, dUTPase and MCP were confirmed to be IE, E and L transcripts gene, respectively. As shown in [Fig. 4A](#pone-0043033-g004){ref-type="fig"}, the 50L transcript could be detected in the RGV-infected samples and the samples treated with 50 µg ml^−1^ of CHX and infected with RGV for 6 h, and that treated with 100 µg ml^−1^ of Ara C and infected with RGV for 48 h, but not in samples only treated drugs above. Proteins extracted from the corresponding samples were detected by western blot analysis. The result was shown in [Fig. 4B](#pone-0043033-g004){ref-type="fig"}, which was consistent with RT-PCR analysis. The data demonstrated that RGV 50L is an IE gene during the *in vitro* infection.
{#pone-0043033-g007}
Intracellular Localization of RGV 50L {#s2e}
-------------------------------------
Immuno-fluorescence assay was performed to reveal the intracellular localizations of 50L distribution. ΔTK-RGV, which could emit green fluorescence, was used to confirm the infection of RGV. As shown in [Fig. 5](#pone-0043033-g005){ref-type="fig"}, 50L appeared early and persisted in the infected cells, and its localization changes of 50L followed two routes, one route was that weak red signals could be detected initially in the cytoplasm at 6 h post infection (p.i.), later appeared in both the cytoplasm and nucleolus at 8 h p.i, then mainly in the nucleolus at 10 h p.i. and the phenomenon was similar at 12 h p.i., subsequently, the RGV-infected cells were observed to be in clusters and strong signals could be detected in the cytoplasm, nucleus and viral matrix at 16 h p.i., at last, the signals aggregated mainly in the viral matrix; the other was that 50L co-localized with viral matrix (arrows): at first the viral matrix was very tiny, and the red fluorescent signal of 50L was a tiny spot, then viral matrices became bigger and bigger, and the red spotted signals of 50L also increased, at last the viral matrix became a large one near the nucleus and completely co-localized with 50L.
{#pone-0043033-g008}
Dynamic changes of 50L-EGFP fusion protein in pEGFP-50L-transfected cell were detected. Strong green fluorescent signals (long arrows) first appeared mainly in the cytoplasm and little in the nucleus at 16 h after transfection, then less in the cytoplasm and more in the nucleus at 24 h, and only in the nucleus at 48 h ([Fig. 6](#pone-0043033-g006){ref-type="fig"}). Furthermore, in the site-directed mutagenesis assay, normal *50L* and NLS mutant *50L* were used for transfection, and green fluorescence was detected at 48 h after transfection. The results showed that green fluorescent signals only appeared in the nucleus in the pEGFP-50L transfected cells, however, positive signals (short arrows) only appeared in the cytoplasm of the pEGFP-50L-ΔNLS transfected cells at 48 h ([Fig. 6](#pone-0043033-g006){ref-type="fig"}), which suggested that the NLS motif of RGV 50L plays an important role in its localization in the nucleus of cells.
10.1371/journal.pone.0043033.t002
###### Summary of the putative post translational modifications in 50L protein.
{#pone-0043033-t002-2}
Motif Site Pattern Randomized probability
-------------------------------------------------------------- ------------------- ----------------------------------- ------------------------
cAMP- and cGMP- dependent protein kinasephosphorylation site 339 to 342 KRRT \[RK\](2)-x-\[ST\] 1.572e−03
Protein kinase C phosphorylation site 70 to 72 SKK \[ST\]-x-\[RK\] 1.423e−02
180 to182 TAK
376 to378 TLK
422 to424 TKR.
Casein kinase II phosphorylation site 35 to 38 TFSE \[ST\]-x(2)-\[DE\] 1.482e−02
78 to 81 SYAD
100 to 103 SEPE
189 to 192 TKTE
191 to 194 TESE
227 to 230 SDSE
229 to 232 SENE
289 to 292 TADD
293 to 296 SSDD
325 to 328 SDSE
327 to 330 SEAE
349 to 352 SSDD
350 to 353 SDDE
429 to 432 SKVD
492 to 495 SWTE
N-myristoylation site 23 to 28 GLGHTM G-{EDRKHPFYW}-x(2)-\[STAGCN\]-{P} 1.397e−02
246 to 251 GVRKTM
379 to 384 GMCKTR
390 to 395 GNKAAL
488 to 493 GIRYSW
Effects of 50L on mRNA Levels of RGV *53R* {#s2f}
------------------------------------------
RGV 53R is an important structural protein of RGV. The effect of RGV 50L on the transcriptional level of the gene was analyzed by qRT-PCR, which detected the relative mRNA level of *53R* in the 50L-pcDNA3.1/pcDNA3.1 transfected cells after infected by RGV. Compared with the controls (pcDNA3.1 transfected cells), mRNA level of *53R* was higher at 24 and 36 h p.i. ([Fig. 7](#pone-0043033-g007){ref-type="fig"}). The result implied that 50L protein may effect the transcription of RGV*53R*.
10.1371/journal.pone.0043033.t003
###### Primers used for plasmid construction, RT-PCR and quantity real time PCR.
{#pone-0043033-t003-3}
Primer name Sequence (5′-3′) (enzyme cleavage site was underlined)
------------- --------------------------------------------------------
50L-pro-F ATT*GGATCC*ATGCAAGTCTACTCTCC (*BamHI*)
50L-pro-R *AAGCTT* GTAACACAGATAATCTTCAG (*HindIII*)
50L-GFP-F ATT*GCTAGC*ATGCAAGTCTACTCTCC (*NheI*)
50L-GFP-R CAA*GGATCC*CTCACACAGATAATCTTC (*BamHI*)
50L-3.1-F ATT*GCTAGC*ATGGAAGTCTACTCTCC (*NheI*)
50L-3.1-R CAAA*GGATCC*TAACACAGATAATCTTC (*BamHI*)
50L-ΔNSL-F GCCTGTAGAGCAGCCTACAGCCGTTAGAAAGTCTAGAGCAAA
50L-ΔNSL-R TTTGCTCTAGACTTTCTAACGGCTGTAGGCTGCTCTACAGGC
50L-RT-F GGCAGAGAGCACATGCTGATGG
50L-RT-R GTCCAGCTGTACCTGATGCCCATG
DUT-RT-F TGGTCCCCTCCTTTGGCAG
DUT-RT-R ACCCCTGTCGGTAGAGTCCA
MCP-RT-F GACTTGGCCACTTATGAC
MCP-RT-R GTCTCTGGAGAAGAAGAA
50L-qRT-F AAAAGCTGGACGAGGCTACA
50L-qRT-R AGCTATGCCGTCTGCCTCTA
53R-qRT-F CCAAGGTCACCATGACACAG
53R-qRT-R CCAGAACGATGATGACGATG
β-actin-F CACTGTGCCCATCTACGAG
β-actin-R CCATCTCCTGCTCGAAGTC
Note: Restriction sites are italicized.
Effect of siRNAs on RGV *50L* Silencing {#s2g}
---------------------------------------
To knockdown RGV *50L*, three chemically synthesized siRNAs targeted to *50L* and a negative control siRNA were used to reduce *50L* gene expression. As shown in [Fig. 8](#pone-0043033-g008){ref-type="fig"}, the band of 50L in the siRNA-319 transfected sample was the weakest at 24 h p.i., which revealed that siRNA-319 suppressed the expression of RGV 50L most effectively among the four siRNAs. So siRNA-319 was selected for viral titer assay (expressed as TCID~50~/ml). Viral titers of siRNA-NC and un-transfected samples did not show significant difference with that of siRNA-319 transfected samples, and cytopathic effects were similar among these samples (data not shown).
10.1371/journal.pone.0043033.t004
###### siRNA sequences (sense strand) used in this study.
{#pone-0043033-t004-4}
siRNA name Target sequence Position in gene sequence
------------ ----------------------- ---------------------------
si50L594 GGCUUGACCUCGUUGUAAUTT 594--614
si50L811 CAGAGUCGCUUAUAACAAATT 811--831
si50L319 CGGCCUUGUUUCCAGAUAUTT 319--339
siNC UUCUCCGAACGUGUCACGUTT
Discussion {#s3}
==========
Although homologues of RGV 50L could be found in many iridoviruses belonging to the genera *Ranavirus* and *Lymphocystivirus*, those from lymphocystiviruses showed low identities with 50L, and the predicted molecular masses and identity percentages compared with 50L of those from other ranaviruses made a great difference, which may be related to different adaptabilities of different viruses.
The MW of 50L detected by western blot assay in RGV infected cells was 85 kDa, which was much larger than the predicted 55 kDa. Further western blot analysis of RGV-infected cells, pcDNA3.1--50L transfected cells and purified RGV particles showed that the positive bands were about 85 kDa and identical in the three samples (which was consisted with our previous report that RGV indeed contains a 85 kDa structural protein [@pone.0043033-Zhang2]). The data confirmed that the protein encoded by 50L gene was actually larger than the predicted data, and also demonstrated that the ORF prediction of 50L was correct. The difference in the actual and predicted MW suggested that RGV 50L may be subjected to eukaryotic post translational modifications, which are indispensable for functions of some proteins [@pone.0043033-Topol1], [@pone.0043033-Kaothien1]. This is in line with the characteristic of 50L sequence. PredictProtein analysis of 50L sequence showed that it contained many putative phosphorylation sites besides five N-myristoylation sites, such as one cAMP- and cGMP-dependent protein kinase phosphorylation site, four protein kinase C phosphorylation sites and fourteen casein kinase II phosphorylation sites ([Table 2](#pone-0043033-t002){ref-type="table"}). Similar phenomena have been observed in Singapore grouper iridovirus (SGIV) ICP18 and ICP46 [@pone.0043033-Xia1], [@pone.0043033-Xia2].
The iridovirus genes are expressed in three temporal kinetic classes: immediate-early (IE), early (E) or delayed-early (DE) and late (L) during the viral infection, which can be defined by *de novo* viral protein synthesis and DNA replication inhibitors [@pone.0043033-Williams1], [@pone.0043033-Lua1]. Drug inhibition assay showed that 50L could not be inhibited by CHX or Ara C, suggesting that it was an IE gene, and the transcriptional pattern of which was identical to that of 3β-HSD an IE gene identified previously [@pone.0043033-Sun1]. Many researches on large DNA viruses infecting mammals have been reported [@pone.0043033-Castillo1]--[@pone.0043033-Su1], but studies on characteristics of iridovirus IE genes are rare.
Intracellular localizations of 50L during RGV-infection detected by immuno-fluorescent assay revealed that location changes of 50L followed two patterns. One pattern was that 50L exhibited a cytoplasm-nucleus-vitromatrix distribution pattern, and the other was that 50L co-localized with viral matrix, which has not been reported in iridoviruses to date. Proteins are synthesized in the cytoplasm, so it was not surprising that 50L presented in the cytoplasm. However, it is believed that only ions and small molecules (relative molecular mass less than 40--60 kDa) are freely permeable to the nuclear pore complex (NPC), and macromolecules were imported by energy-dependent mechanisms [@pone.0043033-Nigg1], [@pone.0043033-Zanta1]. As stated in the above, the MW of 50L is about 85 kDa, which is too large to be translocated trough the NPC. 50L-EGFP fusion protein could also translocate from the cytoplasm to the nucleus in pEGFP-50L transfected cells, but how did it enter into the nucleus? A lysine-rich NLS was predicted at the N-terminus of the RGV 50L, and the NLS deleted mutation experiment showed that the normal 50L containing an NLS motif could be imported into the nucleus successfully, while the mutant 50L without an NLS could not be imported into the nucleus and was diffuse in the cytoplasm. The results revealed that nucleus translocation of 50L was NLS-dependent, as NLS could import macromolecular cargoes into the nucleus by binding to nuclear transport proteins through the nuclear pore [@pone.0043033-Grlich1]. The exportation of 50L from the nucleus to the cytoplasm may be related to the putative leucine-rich nuclear-exported signal (NES) motif formed by residuals 384--394, which could export macromolecules from the nucleus to the cytoplasm [@pone.0043033-Moroianu1], [@pone.0043033-Liu1]. But how the exportation actually took place needs further investigation.
Viral matrix, the place for virus assembly, contains viral DNA, large quantities of virus structural proteins and other components [@pone.0043033-Chinchar1], [@pone.0043033-Novoa1]. In this study, a part of 50L was detected to accompany the viral matrix: the signals of 50L were very weak at first, then it gradually increased with the enlargement of viral matrices. This phenomenon was consisted with previous electron microscopy studies of NCLDVs-infected cells, which showed that small low density viral matrix formed in the cytoplasm as early as 3 h p.i., the size of which increased with time and with the production of progeny virions [@pone.0043033-Huang1], [@pone.0043033-SuzanMonti1]. As shown in [Table 2](#pone-0043033-t002){ref-type="table"}, 50L was predicted to contain five putative M-G-X-X-X-(S/T/A) N-myristoylation sites, which were shown to be required for the assembly of many viruses [@pone.0043033-Andrs1], [@pone.0043033-Capul1]. Furthermore, 50L, as a virus structural protein, appeared early and persisted in the cells till the late stage of infection, so it is no doubt that 50L plays an important role in RGV assembly and life circle.
Effects of RGV 50L on mRNA levels of RGV *53R* detected by qRT-PCR showed that 50L could affect the transcriptional level of the important structural protein encoding gene. Second structure of 50L was predicted to contain a glutamine and glutamic acid-rich tri-repeated domain in the N-terminus and a SAP domain in the C-terminus which was proved to be a new type of eukaryotic DNA binding domain and associated in gene transcription [@pone.0043033-Aravind1], [@pone.0043033-Ahn1]. Whether the effect of 50L on the gene is related to these structures and whether 50L could effect transcriptions of other genes need further studies.
Furthermore, expression of RGV 50L could be reduced by siRNA-319. However, the virus yields of offspring did not show significant difference among the siRNA-319, siRNA-NC and un-transfected samples. This result may implicate that RGV 50L is not a gene associated with virus replication directly *in* *vitro*. Similar phenomenon was also observed in another ranavirus IE gene FV3 ICP18 knocked down using antisense morpholino oligonucleotides (asMOs) [@pone.0043033-Sample1]. Our findings suggested that 50L is directly related to virus assembly and implied that RGV 50L may contribute indirectly to ranavirus replication by affecting the expression of other structural proteins. Additionally, it is also possible that as the expression of RGV 50L was not inhibited completely by siRNA, a small quantity of RGV 50L may be enough for RGV replication. However, how RGV 50L exactly works still needs further studies.
In conclusion, we have cloned and characterized RGV *50L* gene as an IE gene of RGV, and revealed that 50L appeared early and persisted in RGV-infected cells following two distribution patterns, one pattern was that 50L exhibited a cytoplasm-nucleus-viromatrix distribution pattern, and the other was that 50L co-localized with viral matrix. This phenomenon was the first report in iridoviruses. The data reveals that RGV *50L* is a novel IE gene encoding a virus structural protein associated with virus assembly.
Materials and Methods {#s4}
=====================
Virus and Cells {#s4a}
---------------
RGV was used in this study. *Epithelioma papulosum cyprinid* (EPC) cells grown in TC 199 medium supplemented with 10% fetal bovine serum (FBS) at 25°C were used for virus propagation. Cell culture, virus propagation and DNA purification were performed as we described previously [@pone.0043033-Zhang2], [@pone.0043033-Du1].
Gene Cloning, Protein Sequence Analysis and Plasmids Construction {#s4b}
-----------------------------------------------------------------
The full length of RGV 50L was amplified from genomic DNA with specific primers containing restriction enzyme cleavage sites, respectively ([Table 3](#pone-0043033-t003){ref-type="table"}). PCR was carried out under the following conditions: 4 min at 94°C and then 30 s at 94°C, 30 s at 56°C, 1.5 min at 72°C for 32 cycles, followed by 72°C for 10 min. The amplified fragments were cloned into prokaryotic vector pET32a (+), eukaryotic vector pEGFP-N3 and pcDNA3.1 (+) by corresponding restriction enzymes respectively. These different constructs were named pET32a-50L, pEGFP-50L and pcDNA3.1-50L, respectively. All the constructs were confirmed by restriction enzyme digestion and DNA sequencing.
The sequence data were compiled and analyzed using DNASTAR software. The non-redundant protein sequence database of the National Center for Biotechnology Information (National Institutes of Health, MD, USA) was searched using BLASTP. Multiple sequence alignments were conducted using CLUSTAL_X v1.83 and edited using GeneDoc. Further patterns/signatures and structure analysis of 50L amino acid sequence were carried out by Network Protein Sequence Analysis server (<NPS@> server) [@pone.0043033-Combet1], and NLS was predicted using PredictProtein server (<https://www.Predict> protein.org) [@pone.0043033-Rost1]. NES prediction of RGV 50L was performed using the CBS online service NetNES 1.1 (<http://www.cbs.dtu.dk/services/NetNES>) [@pone.0043033-IaCour1].
NLS coding sequence was removed by site-directed mutagenesis using an overlap extension-PCR method in a two-step PCR procedure [@pone.0043033-Heckman1]. Briefly, in the first step, two simultaneous PCR reactions were performed. One reaction was performed with primers 50L-EGFP-F and 50L-ΔNLS-R to amplify the N-terminal of the 50L, the other reaction was performed with primers 50L-ΔNLS-F and 50L-EGFP-R to amplify the C-terminal. To obtain the full-length mutated fragment without the NLS, equal amounts of the two products from the first step were mixed and used as templates for the second PCR reaction, with primers 50L-EGFP-F and 50L-EGFP-R. Finally, the full length mutated fragments were ligated into pEGFP-N3 vector, and the construct was named EGFP-50L-ΔNLS.
Prokaryotic Expression, Protein Purification and Antibody Preparation {#s4c}
---------------------------------------------------------------------
50L-His fusion protein expression, purification and antibody preparation were performed as we previously described [@pone.0043033-Whitley1]. Briefly, 50L-pro plasmid was induced with 1 mM IPTG at 37°C to express the recombinant protein after transformed into *Escherichia coli* BL21 (DE3). The recombinant protein was purified according to the protocols of the HisBind Purification Kit (Novagen). To obtain antibody of RGV 50L, the purified fusion protein (about 400 µg) was mixed with equal volume of Freund's adjuvant (Sigma) to immunize mice once every 7 days, and the antiserum was collected after the fourth immunization.
This experiment was carried out in strict accordance with the recommendations in the Regulations for the Administration of Affairs Concerning Experimental Animals of China. The protocol was approved by the Wuhan University Center for Animal Experiment (Approval ID: SCXK 2008-0004). All surgery was performed under sodium pentobarbital anesthesia, and all efforts were made to minimize suffering.
Real-time Quantitative PCR and Western Blot Analysis of 50L Temporal Expression {#s4d}
-------------------------------------------------------------------------------
Total RNAs and protein were prepared from cells infected by RGV at an M.O.I. of 1 at various time (0, 4, 8, 12, 16, 24, 36 and 48 h) post-infection (p.i.) or mock infected, and subjected to real-time quantitative PCR and western blot analysis, respectively. The synthesis of cDNA was carried out as described previously [@pone.0043033-Lei1]. Real-time quantitative PCR was performed with Fast SYBR® Green Master Mix using the StepOne™ Real-Time PCR System (Applied Biosystems Ins., USA). Each reaction consisted of 1 µl of product from the diluted RT reaction, 10 µl 2×Fast SYBR® Green Master Mix, 250 nM of sense and antisense primer and sterile water. The mixture was incubated in a 48-well plate at 95°C for 20 sec, followed by 40 cycles of 95°C for 3 sec and 60°C for 30 sec. The melting curve analysis of PCR products from 60°C to 95°C were performed after PCR. Primers were named 50L-qRT-F/50L-qRT-R, 53R-qRT-F/53R-qRT-R and MCP-qRT-F/MCP- qRT-R, respectively ([Table 1](#pone-0043033-t001){ref-type="table"}). For relative quantification of each sample, the relative standard curve quantification method was employed, and all experimental data were normalized to the β-actin gene. The data were expressed as means±SD from three independent experiments.
Western blot analysis was carried out as described previously [@pone.0043033-Chen1]. Briefly, protein samples prepared above were electrophoresed in 12% SDS-PAGE and transferred to a PVDF membrane (Millipore). The membrane was blocked with 5% skim milk in TBS (0.02 M Tris--HCl pH 7.4; 154 mM NaCl) for 1 h at room temperature. Then, the membrane was e incubated successively with 1∶1000 diluted RGV 50L mouse anti-serum for 2 h, and 1∶1000 diluted alkaline phosphatase-conjugated goat anti-mouse IgG (H+L) antibody (Vector Laboratories) for 1 h. Finally, substrates NBT and BCIP (Sigma, USA) were used for color reaction. Internal control was carried out simultaneously by detecting β-actin protein.
Molecular Weight Identification of 50L {#s4e}
--------------------------------------
Western blot assay was applied to identify the molecular weight of 50L in eukaryotic cells. Plasmid pcDNA3.1-50L/pcDNA3.1 was transfected into EPC cells by Lipofectamine® 2000 Reagent (Invitrogen) following the instructions, and the samples were subjected to western blot analysis after incubated for 12 h. Mock- and RGV-infected cells at 12 h p.i. and purified RGV particles were analyzed together. Procedures for western blot were carried out as described above.
Drug Inhibition of *de novo* Protein Synthesis and Viral DNA Replication {#s4f}
------------------------------------------------------------------------
Cycloheximide (CHX), as *de novo* protein synthesis inhibitor, and Cytosine β-D- arabinofuranoside (Ara C), as viral DNA replication inhibitor, were selected to classify the transcriptional model of RGV 50L. The experiment and RT-PCR analysis were carried out as described previously [@pone.0043033-Zhao1]. Specific primers were used to detect RGV 50L transcripts (50L-RT-F/50L-RT-R in [Table 1](#pone-0043033-t001){ref-type="table"}). As control, two pairs of primers were used to detect the transcripts of the known early (E) transcription gene, dUTPase, and late (L) transcription gene, major capsid protein (MCP), respectively (primers DUT-RT-F/DUT-RT-R and MCP-RT-F/MCP-RT-R in [Table 1](#pone-0043033-t001){ref-type="table"}) [@pone.0043033-Zhao1], [@pone.0043033-Chinchar2]. β-actin was also performed as internal control. Protein from each sample was extracted and western blot analysis was carried out as described above.
Subcellular Localization {#s4g}
------------------------
Subcellular localization of RGV 50L was performed by 50L-EGFP fusion protein expression and immunofluorescence. For EGFP fusion protein expression, EPC cells were cultured on coverslips in 6-well plates and transfected with plasmid pEGFP-50L, and plasmid pEGFP-N3 was used as control. After 16 h and 24 h incubation, the cells were fixed and stained with Hoechst 33342 in PBS for 5 min at room temperature.
To examine the effect of the NLS motif on RGV 50L translocation, the recombinant plasmids pEGFP-50L and pEGFP-50L-ΔNLS were used to track the movement of normal or mutant RGV 50L-EGFP fusion protein. The cells were fixed and stained as describe above at 48 h after transfection.
In order to observe the intracellular localization of 50L during RGV-infection, immuno- fluorescence microscopy was carried out as previously described [@pone.0043033-Chen2]. EPC cells, grown on coverslips in 6-well plates, were either mock or infected with approximately 1 MOI RGV and fixed at 6 h, 8 h, 10 h, 12 h, 16 h and 24 h. After blocked in 10% bovine serum albumin at room temperature for 1 h, the cells were then successively incubated with mice anti-RGV-50L serum in 1% normal bovine serum and Rhodamine Red-X Goat Anti-Mouse IgG (Pierce Biotechnology, Rockford). Nuclei were counterstained with Hoechst-33342. All samples were examined under a Leica DM IRB fluorescence microscope.
Effects of 50L Over-expression on Transcriptional Level of RGV *53R* {#s4h}
--------------------------------------------------------------------
About 8.0×10^5^ EPC cells were seeded into 24-well plates and transfected with empty vector pcDNA3.1 or pcDNA3.1-50L using the method mentioned above after 16 h. The pcDNA3.1 and pcDNA3.1-50L-transfected EPC cells were termed as pcDNA3.1/EPC and 50L-pcDNA3.1/EPC, respectively. Following transfection for 24 h, the transfectants were mock-infected or infected by RGV at an M.O.I. of 1. Total RNAs were extracted at 24 and 36 h p.i., and mock infected cells were used as control. Subsequent real-time quantitative PCR for RGV *53R* was done as above using primers 53R-qRT-F and 53R-qRT-R ([Table 3](#pone-0043033-t003){ref-type="table"}) and relative quantities for each sample were expressed as N-fold changes in target gene expression relative to the same gene target in the calibrator sample, both normalized to the β-actin gene. The significant differences between control and treatments groups are determined by T-TEST.
Knockdown of *50L* Expression by RNAi {#s4i}
-------------------------------------
Three duplex siRNAs targeted to *50L* and a negative control (siNC) ([Table 4](#pone-0043033-t004){ref-type="table"}, GenePharma, Shanghai, China) were chemically synthesized for knockdown of RGV *50L*, and the experiment was carried out as described previously with some modifications [@pone.0043033-Ke1], [@pone.0043033-Kim1]. Briefly, EPC cells were cultured in 24-well plates at a density of about 8.0×10^5^ cells/ml. The siRNAs were transfected at a final concentration of 150 nM, respectively. Then, the un-transfected and transfected cells were infected with approximately 1 MOI RGV after 5 h and incubated 1 h at 25°C, and the samples were mixed gently every 15 min and harvested at 24 h p.i. The silence effect of siRNAs was detected by western blot analysis, and un-treated cells were used as negative control. Subsequently, EPC cells were un-transfected or transfected with the siRNA with silence effect or siRNA-NC. RGV infection was carried out as described above, and every sample was triplicates. Finally, all samples were serially diluted 10-fold after three cycles of freeze-thaw, and 100 µL of each dilution was added to four repetitive wells of confluent EPC monolayers grown on 96-well plates to perform the TCID~50~ assay.
[^1]: **Competing Interests:**The authors have declared that no competing interests exist.
[^2]: Conceived and designed the experiments: QYZ. Performed the experiments: XYL TO. Analyzed the data: XYL QYZ. Contributed reagents/materials/analysis tools: XYL QYZ. Wrote the paper: XYL QYZ.
|
/*
Copyright (C) 2013 Google Inc.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
PR.registerLangHandler(PR.createSimpleLexer([["pln",/^[\t\n\r \xA0]+/,null,"\t\n\r \u00a0"]],[["com",/^#!(?:.*)/],["kwd",/^\b(?:import|library|part of|part|as|show|hide)\b/i],["com",/^\/\/(?:.*)/],["com",/^\/\*[^*]*\*+(?:[^\/*][^*]*\*+)*\//],["kwd",/^\b(?:class|interface)\b/i],["kwd",/^\b(?:assert|async|await|break|case|catch|continue|default|do|else|finally|for|if|in|is|new|return|super|switch|sync|this|throw|try|while)\b/i],["kwd",/^\b(?:abstract|const|extends|factory|final|get|implements|native|operator|set|static|typedef|var)\b/i],
["typ",/^\b(?:bool|double|Dynamic|int|num|Object|String|void)\b/i],["kwd",/^\b(?:false|null|true)\b/i],["str",/^r?[\']{3}[\s|\S]*?[^\\][\']{3}/],["str",/^r?[\"]{3}[\s|\S]*?[^\\][\"]{3}/],["str",/^r?\'(\'|(?:[^\n\r\f])*?[^\\]\')/],["str",/^r?\"(\"|(?:[^\n\r\f])*?[^\\]\")/],["typ",/^[A-Z]\w*/],["pln",/^[a-z_$][a-z0-9_]*/i],["pun",/^[~!%^&*+=|?:<>/-]/],["lit",/^\b0x[0-9a-f]+/i],["lit",/^\b\d+(?:\.\d*)?(?:e[+-]?\d+)?/i],["lit",
/^\b\.\d+(?:e[+-]?\d+)?/i],["pun",/^[(){}\[\],.;]/]]),["dart"]);
|
Bengaluru: The use of Hindi in sign-boards of Bengaluru's Metro rail has sparked off strong protests by pro-Kannada campaigners, who have urged the State government to do away with the three-language policy and stick to two languages.
The protests – mostly an online/ social media campaign under the hashtag #NammaMetroHindiBeda – have begun after the inauguration last week of the full phase 1 of the Metro rail, with the north-south corridor being made operational last Saturday.
The social media activism soon drew over 10 lakh responses from across the city and the State, with many weighing in on what they felt was an imposition of Hindi in a local commuter transit system.
"For Kannadigas, there is Kannada signage. For others (migrants), it is in English. There are other community language people here too – like Telugu, Tamil and Malayalam speakers who are greater in number than Hindi-speakers. Why should Hindi be given special status? We are against that," said Arun Javagal, one of the campaigners.
Reiterating that this is not an anti-Hindi protest – in that, the campaigners are neither against the Hindi language nor against Hindi-speakers – the campaigners said they questioned the special treatment being meted by Metro officials to Hindi specifically.
An online campaign has been launched against the reported Hindi hegemony by Banavasi group. (Photo: CNN-News18 TV grab)
"When we go to north Indian cities, we make the effort to learn Hindi. If there are migrants from other States who come to Karnataka, a large number of them have tried to assimilate here by learning the language. We welcome that. But the small chance that there is, that new migrants will make any effort to learn Kannada, will diminish if the convenience of Hindi is there," said Vallish Kumar, another activist.
Metro officials refused to comment on the language debate, saying this is only an option offered to commuters – nowhere is Kannada neglected. Besides, if Hindi boards are to be shunned, should Hindi films also be banned, they asked, on condition of anonymity.
But Kumar argued that the campaigners have nothing against private initiatives or institutions – only state government institutions that seem to willingly include Hindi where it is not mandated.
"Many Central government services that were earlier in Hindi, English and local languages are not available in the local Kannada language now. This could be postal services, railway tickets, bank documents like cheque books. Why has this slowly crept in? In the case of the Metro, neither the State government nor the Centre has insisted on Hindi signages – but this was a policy adapted by the Bangalore Metro Rail Corporation Board members many years back," Kumar said.
Karnataka is the second southern state seeing a backlash against what they see as forced Hindi imposition in services, after Tamil Nadu that saw protests by many, including political parties, against Hindi sign-boards along highways.
Asked whether this is not language chauvinism that hits at the cosmopolitan nature of a city like Bengaluru, the campaigners said their campaign is only about a local commuter service restricted to a city – not the railways or the airport which are Central government institutions.
"There is fear that, over a period of time, languages would be extinct because very few use them – we have seen this Hindi hegemony bring down the extent of usage of languages like Bhojpuri or Maithili or Santhali," said Javagal.
The campaign drew support from the State government and Opposition MLAs – with Congress spokesperson Dinesh Gundu Rao saying he is against the overuse of Hindi.
"I think Kannada should be given priority and Karnataka will give priority to Kannada. I think people should also learn Kannada. In that sense, I don't see why people need Hindi on signages. If people want to learn and read Hindi, that is up to them. But in signages and hoardings, it isn’t required, we need to look at this seriously," said Rao.
Transport Minister Ramalinga Reddy said he would hold consultations with Metro officials on what prompted this move.
"Bengaluru is a cosmopolitan city; Hindi, English and Kannada are used. Kannada is compulsory and English should be used, but the Centre cannot force Hindi on people. We will talk to the concerned officials about this," Reddy told News18.
ALSO READ: Bangalore Metro, Hindi hegemony & flawed understanding of cosmopolitanism |
1. Technical field of the Invention
This invention relates to a developer collection vessel for collecting waste toner, a developer collected from a developing machine adopting a trickle developing system, or the like and an image formation apparatus comprising the developer collection vessel.
2. Description of the Related Art
In an electrophotographic image formation apparatus applied to a printer, a copier, etc., developers to be discharged occur in a photoconductor, a transfer roll, a developing machine, etc., and need to be collected, and a developer collection vessel is placed.
Hitherto, as an image formation apparatus comprising this kind of developer collection vessel, an apparatus has been disclosed in Japanese Patent No. 2912073. In the related art example, a plurality of collected developer occurrence sections are connected to a discharge section via a transport passage and the discharge section is connected to a collection port formed in the collection vessel so as to collect collected developers occurring from the collected developer occurrence sections.
When the collection vessel becomes full of the developers, it needs to be replaced and thus the collection vessel being full of the developers is detached from the discharge section and a new collection vessel is attached. In this case, to prevent the developer from spilling from the discharge section, it is possible to provide the collection vessel with a shutter for opening/closing the collection port. It may be common practice to abut the discharge section against the shutter when the collection vessel is attached and open the shutter in association with attachment of the collection vessel.
However, when the collection vessel is detached, the shutter needs to be closed to prevent the developer from spilling from the collection port and thus the shutter is urged in a direction closing the collection port using a spring, etc. Thus, when the collection vessel is attached, a press force is placed on the discharge section from the shutter and the press force on the discharge section is transmitted to a collected developer occurrence section. If the collected developer occurrence section is cleaned with a blade, for example, there is a fear of causing a blade nip failure, etc., to occur. If the collected developer occurrence section is movable, for example, if the image formation apparatus comprises a magnet roll of a developing machine detachable from a photoconductor and the developing machine is provided with the collected developer occurrence section, when the discharge section abuts the shutter, it is feared that the pressure acting on the discharge section from the shutter may hinder a move of the developing machine.
It is a first object of the invention to prevent pressure of a shutter from being placed on a discharge section in a developer collection vessel having the shutter. It is a second object of the invention to make it possible to allow a discharge section to move. It is a third object of the invention to simplify a mechanism for opening and closing a collection port including a shutter.
To the ends, according to a first aspect of the invention, there is provided an image formation apparatus comprising a collected developer occurrence section, a discharge section being connected to the collected developer occurrence section, a collection vessel having a collection port into which the discharge section is inserted and a shutter urged in a direction closing the collection port, and retreat means for retreating the shutter to a position where the discharge section does not abut the shutter with the discharge section inserted in the collection port. Therefore, the retreat means retreats the shutter to a position where the shutter does not abut the discharge section with the discharge section inserted in the collection port, so that pressure of the shutter can be prevented from being placed on the discharge section.
The collected developer occurrence sections are placed in the developing machines, the photoconductors, the intermediate transfer bodies, the transfer roll, etc., and are formed as developer discharge passages and cleaning means. Each developing machine adopts a trickle developing system, for example, and to collect an extra developer, the developer is collected into the collection vessel. The collected developer occurrence sections are placed so that they can be moved in any other direction than the insertion axial direction of the discharge section; for example, if the collected developer occurrence section is placed in the developing machine, it is placed so that it can be moved in a direction coming in or out of contact with the photoconductor. If the discharge section is moved together with the collected developer occurrence section, the collection port is formed as a shape for allowing the discharge section to move. The collection port is shaped like a long hole, for example. Preferably, the shutter is retreated to a position where the shutter does not interfere with the discharge section in the movable range of the discharge section. To place the collection vessel on an image formation apparatus main unit, the collection vessel is not necessarily placed straightly on the image formation apparatus main unit. Thus, if the collection vessel is placed slantingly on the image formation apparatus main unit, preferably the discharge section first abuts and the shutter is opened so as not to hinder opening the shutter. Further, the retreat means may have a configuration for enabling the shutter urged in the closing direction to be moved to the retreat position. A protrusion may be provided in the image formation apparatus main unit for moving the shutter or the shutter can also be moved in conjunction with the cover of the image formation apparatus main unit.
According to a second aspect of the invention, there is provided an image formation apparatus comprising a plurality of collected developer occurrence sections, a plurality of discharge sections being connected to the plurality of collected developer occurrence sections, and a collection vessel having a plurality of collection ports into which the plurality of discharge sections are inserted and a shutter urged in a direction closing the plurality of collection ports, wherein the shutter opens and closes the plurality of collection ports in one piece. Therefore, one shutter may be used to open and close the plurality of collection ports, so that the number of parts can be lessened and the opening/closing mechanism can be simplified.
According to a third aspect of the invention, there is provided an image formation apparatus comprising a collected developer occurrence section, a discharge section being connected to the collected developer occurrence section, and a collection vessel formed with a collection port into which the discharge section is inserted, wherein the discharge section is moved in any other direction than the insertion axial direction of the discharge section into the collection port and the collection port is formed as a shape for allowing the discharge section to move. Therefore, the discharge section can move the collection port freely, so that load can be prevented from being imposed on the collected developer occurrence section.
According to a fourth aspect of the invention, there is provided an image formation apparatus comprising a photoconductor, a developing machine being placed so that the developing machine can be brought into and out of contact with the photoconductor, and a collection vessel formed with a collection port into which a discharge section connected to a collected developer occurrence section placed in the developing machine is inserted, wherein the collection port is formed as a shape for allowing the discharge section to move as the developing machine is brought into and out of contact with the photoconductor. Although a magnet roll of the developing machine is brought away from the photoconductor when the image formation operation is not performed, the discharge section connected to the developing machine can move the collection port freely, so that the developing machine can be moved smoothly.
According to another aspect of the invention, there is provided a developer collection vessel used with the image formation apparatus described above. |
Creative Writings
There has been a sudden interest in human trafficking - from international funding to policy interventions to public media, and even Bollywood, everyone seems to have woken up to this 'worst thing affecting humanity' after HIV/AIDS.
In June 2007, the US Department of State released the 'Trafficking in Persons Report', which placed India on the Tier 2 watch list for the fourth year in a row for failing to effectively combat trafficking. India was actually a borderline case. Had Deputy Secretary of State John Negroponte had his way, India could have very well been a Tier 3 country, meaning worst offender, but Secretary of State Condoleezza Rice intervened and agreed to undertake a special evaluation in six months' time.
That deadline expires this December. Consequently, there has been hectic campaigning via the public media to present India's unfailing commitment to combating trafficking. However, these 'well meaning' efforts have only resulted in a raw deal for sex workers.
Two recent anti-trafficking campaigns by MTV and the UN Office on Drugs and Crime (UNODC) perpetuate the image of the sex worker as the agency-less trafficked woman. 'Sold', a film which is part of the MTV End Exploitation and Trafficking (EXIT) campaign, does not look at prostitution as the only logical end of trafficking, but a major portion is devoted to prostitution and has several simulated images of a girl trafficked into prostitution, being raped. The larger narrative - done by model-turned-actor Lara Dutta - passes value judgments about how demand for paid sex among the youth in India is a major cause for sex trafficking. It further suggests that we will be able to combat trafficking only when we stop paying for sex, which in effect is an abolitionist stand on sex work.
A list of anti-trafficking organizations in India has been provided on EXIT's portal, but the work of sex workers' collectives - Self Regulatory Boards (SRBs) of the Durbar Mahila Samanyaya Committee (DMSC), Kolkata, and the Mohalla Committees of Veshya Anyay Mukti Parishad (VAMP), Sangli, which are internationally recognized models for anti-trafficking work - is not mentioned. Is it so difficult to imagine that sex workers can also articulate the right to sex work as strongly as their right against trafficking and exploitation?
The UNODC campaign - UN Global Initiative to Fight Human Trafficking (UN- GIFT) - has also made a public service film, 'One Life, No Price'. While the script is similar to 'Sold', this film has Bollywood stars, such as Amitabh Bachchan, urging people to join the fight against trafficking. The cases represented are based on real incidents.
Though 'One Life...', too, does not singularly focus on sex trafficking, the stories of four girls, who were sold into a brothel, duped into joining a massage parlor and forced to work as a bar dancers, have been given maximum screen space. The recreation of the brothel is especially alarming - sex workers are shown chewing pan (betel leaf) and accosting clients, while the trafficked girl is being tortured by an evil looking 'madam'. This representation constructs brothels as 'hell holes' where women have no agency, denying the reality.
While brothels are definitely not the best places, recognizing the ways in which women negotiate their stay and work there is necessary if we are to devise policies for 'rescuing' them. Interestingly, the director of this film, Sunita Krishnan, who runs Prajwala, an anti-trafficking organization in Hyderabad, was quoted saying that since all women are forced into prostitution, they must also be forced out of it.
Disturbed by the UNODC campaign - which also stated that India is among the top human trafficking destinations in South Asia, with over 35,000 young girls and women from Bangladesh and Nepal being brought here every year - both DMSC and VAMP have responded strongly. In an open letter, the DMSC alleged that these statistics were merely anecdotal, and that the anti-trafficking strategy of UNODC does not make sex workers stakeholders in the campaign.
"Being engaged in anti-trafficking programmes in West Bengal for the last 12 years we know the inner workings/strategies of the traffickers. Without sex workers' participation, trafficking cannot be stopped - SRBs are a conclusive example of this. We run 30 SRBs across the state. We can immediately ascertain whether a newcomer has come willingly or has been trafficked. If she is trafficked, we send her back home... the local stakeholders and the police have developed a strong network and under our vigilance a trafficker, however well-connected, cannot escape," DMSC's letter states. The DMSC also wonders how appeals by film stars will deter traffickers.
Meena Seshu of VAMP says, "They will have to accept that the community can actually identify and address violations it faces - with or without outside help. History has recorded that generations of outsiders and outside interventions have tried but failed miserably. Be it the SRB or the VAMP Mohalla Committees, we need to recognize and be encouraging of their smallest successes."
One of the major sources that fuel this tension between sex workers and anti- trafficking work is the US government's policy on HIV/AIDS and trafficking. Governments in India and the Global South have been required to take cognizance of the 2003 United States Leadership against HIV/AIDS, Tuberculosis and Malaria Act (Global AIDS Act) and the Trafficking Victims Protection Reauthorization Act. The US Global AIDS Act bars the use of federal funds to "promote, support, or advocate the legalization or practice of prostitution".
A report by the Centre for Health and Gender Equity in the US points out: "Organizations receiving US global HIV/AIDS funding also must adopt specific organization-wide positions that explicitly oppose prostitution and trafficking. Such funding restrictions force organizations working in public health from Southern countries that heavily rely on US funding to comply with an ideological litmus test that often runs counter to both public health practice and human rights standards." In 2005, when it returned a $12,000 grant from USAID (the US frontline funding agency), because it did not wish to be bound by such conditions, VAMP was falsely accused of engaging in child trafficking.
Anti-trafficking policy and campaigns have always tended to wrongly collate trafficking and sex work based on the assumption that trafficked women are always forced into sex work. But it overlooks many other occupations that the trafficked women may take up; it denies women the agency they can exercise to migrate on their own; and it does not address the violence and abuse they might face in the process of being trafficked. Moreover, anti-trafficking measures seldom privilege the experiences of sex workers - who collectively also combat trafficking - to devise policies.
Sex workers are also wrongly identified as the primary vectors for the spread of HIV/AIDS. The idea is to stop HIV/AIDS from leaving the 'bodies' of sex workers, and, through married male clients, reaching the wives and the family. While there are mandatory health check-ups of sex workers to safeguard families, there are hardly any measures to create enabling and safe working conditions for sex workers.
It's a pity that in an attempt to combat trafficking, we have ended up marketing it for its perverse popularity and, in effect, are trading the rights of sex workers, instead of making them equal stakeholders. |
Q:
How to refer a undefined parameter in global scope
var a = 2;
function f(a) {return a;}
console.log(f(1));// return 1
console.log(f());// return undefined, but I want to make it return 2...
f() returns undefined, but I want to it refer the variable a in global scope. How could I achieve that?
A:
var a = 2;
function f(b) {
return b || a;
}
You need to use a different name for the function argument, else it's going to shadow the outer a and won't give you any chance to return it. Then it's a simple matter of deciding which value to return. Here I'm using a simple falsey check, you may or may not want to use something more detailed like typeof b === 'undefined' or such.
A:
Use arguments.length to test if a parameter was passed to the function:
var a = 2;
function f(b) {
if(arguments.length===1) return b;
return a;
}
console.log(f(3)); //3
console.log(f(undefined)); //undefined
console.log(f(0)); //0
console.log(f()); //2
|
P. Chidambaram, as Finance Minister, had an equal role in fixing the 2G spectrum licence prices, the Centre for Public Interest Litigation (CPIL) alleged in the Supreme Court on Wednesday, seeking a CBI probe into his part in the scam.
Counsel Prashant Bhushan cited before a Bench of Justices G.S. Singhvi and K.S. Radhakrishnan a number of documents to drive home the point that Mr. Chidambaram was actively involved in price fixation along with the then Telecom Minister, A. Raja. It was clearly established with facts and documents that the then Finance Minister overruled the officers of his own Ministry who favoured auction/market-based pricing of spectrum, and instead, allowed the 2G scam to take place and the companies which got the licence to make windfall profits, counsel argued.
Meanwhile, the Bench asked the CBI, the Enforcement Directorate and the Income Tax Department to file a status report on the probe being conducted in the 2G case with particular reference to investigation abroad.The report should be filed in three weeks, it told senior counsel K.K. Venugopal, appearing for the CBI.
Elaborating on his allegations against Mr. Chidambaram, Mr. Bhushan said the Minister had in no time revised his position from giving away 4.4 MHz of spectrum to giving away 6.2 MHz of spectrum at 2001 prices, thus causing an additional loss to the exchequer. He knew full well even post issue of Letters of Intent (LoI) that it was legally possible to auction start-up spectrum and the provisions of the licence agreement cited by the DoT were not applicable as the LoI holders were not licensees at this stage. Further, the then Finance Minister allowed Swan and Unitech to sell off their stakes, without charging any government's share of its premium on account of spectrum valuation and without enforcing his own agreement, dated January 30, 2008, with Mr. Raja.
Counsel argued that the new documents and evidence showed that within three weeks of the LoIs being issued, the two Ministers met and concluded that14 operators were too many for the Indian market and that several of the new entrants had come in for ‘speculative reasons'. Further, they knew full well that these companies would enter into Mergers and Acquisitions and make windfall profits because of the premium linked to the spectrum they had received in 2008 at 2001 prices.
Reading out media reports, Mr. Bhushan said Mr. Chidambaram was aware of the critical stories about the price of spectrum and asked officials to track all those reports.
The petition said Janata Party president Subramanian Swamy, as a private complainant, could have only produced the documents in his possession. A thorough investigation could be done only by an official agency like the CBI to unearth the role of the Finance Minister/Ministry in the 2G scam. The CBI had so far not done any proper investigation into these aspects and had not even questioned the then Finance Minister.
The CPIL sought a direction to the CBI to conduct a thorough investigation/ further probe into the role of the Finance Ministry under Mr. Chidambaram, under the close supervision of the Supreme Court assisted by the Central Vigilance Commissioner and the senior Vigilance Commissioner.
Mr. Venugopal said the documents being referred to by Mr. Bhushan were part of the 500-page documents perused by the court earlier and it rejected any probe against Mr. Chidambaram. The same set of documents was being annexed now, he said. However, Dr. Swamy disputed his submission and said the Supreme Court had only asked the trial court to decide the matter and had not dismissed his plea. Arguments will continue on April 11. |
Concise total synthesis of spirocurcasone.
A concise total synthesis of spirocurcasone was accomplished. Key features of the synthesis involved a vinylogous Mukaiyama aldol reaction, a Carroll rearrangement of β-keto allyl ester derivative, an intramolecular aldol condensation, and a spiro ring formation by ring-closing metathesis of the pentaene compound. This synthetic work was complete in nine steps from (S)- or (R)-perillaldehyde without the use of protecting groups. Interestingly, the optical rotation of the synthetic spirocurcasone was different from the reported value of the natural product. |
This appeal presents the question whether the disciplinary actions of a private college, by virtue of a state statute requiring colleges to adopt disciplinary rules and to file them with the state, constitute state action under the Constitution and 42 U.S.C. § 1983 (1982). The appeal also requires us to address and to clarify the pleading requirements for claims brought under 42 U.S.C. § 1981 (1982). Appellants are students who were suspended by Hamilton College on November 14, 1986 when they refused to end a three-day occupation of Hamilton's main administration building. On November 26, 1986, seeking injunctive relief under Section 1983, the suspended students brought this action in the Northern District of New York. Named as defendants were the College; its President, J. Martin Carovano; and its Dean of Students, Jane L. Jervis. The students' Section 1983 claim asserted that the College was a state actor because it had adopted disciplinary rules pursuant to N.Y. Educ. Law § 6450 (McKinney 1985), the so-called Henderson Act, and had denied them due process when it suspended them pursuant to those rules. That Act directs all colleges and universities in the State of New York to adopt and to file with the state "rules and regulations for the maintenance of public order" that include as possible sanctions "suspension, expulsion or other appropriate disciplinary action." For their Section 1981 claim, appellants alleged that "the defendants are selectively enforcing the College rules on student conduct against plaintiffs," among other reasons, "because of their criticisms of . . . prejudice[] at Hamilton, . . . and because they are black, Latin or gay; supportive of the rights of blacks, Latins and gays and without old family ties to Hamilton." Complaint para. 35.
Appellants sought a preliminary injunction against their suspensions, and appellees moved to dismiss the complaint. After some hurried discovery, the district court on December 23 held an evidentiary hearing on the issue of state action. At the end of that hearing, Judge Cholakis, treating appellants' Section 1981 claim as arising under Section 1983, denied appellants' request for a preliminary injunction and dismissed their complaint on the ground that state action was lacking. The students appealed, and a divided panel of this court reversed. Albert v. Carovano, 824 F.2d 1333, modified on rehearing, 839 F.2d 871 (2d Cir. 1987). We ordered reconsideration in banc upon appellees' suggestion, and we now vacate the panel opinion. We affirm the dismissal of the Section 1983 claim, but remand the Section 1981 claim to allow appellants an opportunity to replead it.
BACKGROUND
Chartered in 1812, Hamilton College is a privately-endowed institution of higher learning located in Clinton, New York. Until 1969, it prescribed a concise code of conduct for its students. The College stated only that "Conduct becoming a gentleman is expected of Hamilton men at all times," and that "It is assumed that undergraduates will understand what constitutes gentlemanly conduct without expressed rules to cover every occasion." The College's Judiciary Board limited suspensions to "extremely serious misconduct."
The College altered its code of conduct in 1969, however, after New York enacted the Henderson Act. That Act was a response to campus unrest in the 1960's, and as noted, requires colleges both to adopt rules concerning the maintenance of public order on campus and to file those rules with the state.*fn1 Colleges that fail to comply are not eligible to receive state aid.
The language of the Henderson Act requires only that rules adopted and filed pursuant to the Act provide "suspension, expulsion or other appropriate disciplinary action" as penalties for violation of those rules. Beyond this the Act is silent. Colleges are free to define breaches of public order however they wish, and they need not resort to a particular penalty in any particular case. Finally, nothing in the language of Section 6450 requires colleges to enforce the regulations filed pursuant to that Section at all. As we have previously observed, the terms of the Act leave "one wonder[ing] whether rules and regulations consisting solely of the statement that any individual guilty of a transgression against the public order of the campus shall be required to give the Dean of the College a rose and a peppercorn on Midsummer's Day would satisfy the literal command of the statute in all respects." Coleman v. Wagner College, 429 F.2d 1120, 1124 (2d Cir. 1970).
To comply with Section 6450, the Trustees of Hamilton College adopted and filed a set of rules styled "Freedom of Expression/Maintenance of Public Order at Hamilton College." Today these rules are incorporated in Hamilton's A Guide to the Policies and Procedures of Hamilton College (1986). Included as examples of "disruptions of public order" are disruptive noise, violence or threats, the destruction of college property, and the disruptive "physical possession of a building." The rules set forth the various tactics and procedures (ranging from "constructive discussion" to court orders) that Hamilton's President may invoke at his or her discretion in response to disturbances. In addition, the rules state:
Penalties for violations of the provisions of this Section of "Student Conduct" [referring to a section of the Guide ] (which penalties shall be in addition to any penalty provided for in the New York state penal law or any other New York or federal law to which a violator may be subject) shall include the following:
b. For students the procedures shall be those set forth under "Student Discipline," [a subsection of "Student Conduct"], and may result in disciplinary action of the most severe kind, including suspension or expulsion;
Elsewhere in the Guide, the subsection entitled "Student Discipline" (which was not filed with the state) explains in great detail the processes by which Hamilton's students may be disciplined. Most of this detail is devoted to the structure and conduct of the school's "Judiciary Board," which "has jurisdiction over infractions by students of general standards of conduct." At the same time, however, the Guide suggests that Hamilton's President may dispense with procedures outlined in the Guide. It thus states, "The right of the President to decide finally on any student disciplinary matter is not precluded by the provisions outlined below."
According to the complaint and the affidavit of appellant Gur Melamede, the dispute at issue originated in a series of incidents on the Hamilton campus during the academic year 1985-86. Protests developed against apartheid and against Hamilton College's investments in firms doing business in South Africa. According to appellants, some black women students who participated in the protests were the victims of racial insults, and one received several threats on her life. These insults and threats were aggravated in the students' eyes by Hamilton College's alleged failure to investigate the incidents, to establish an African-American Studies program, and to divest itself of investments in firms doing business in South Africa.
The College apparently hoped to reduce tensions by scheduling a series of public discussions of prejudice. These efforts backfired. On November 7, 1986, the College held an alumni symposium on the topic of discrimination. Of the four symposium panelists, only one was female, and she was not herself a graduate of Hamilton but rather the wife of an alumnus and the mother of another. Some students considered this panel's composition as sexist. On Monday, November 10, the College held a debate on the issue of divestment, at which a faculty member who favored divestment likened apartheid to Nazism. President Carovano described this comparison as outrageous because it trivialized the Holocaust. Black students in attendance walked out en masse.
During the next two days, students formed a coalition among five organizations -- the Black and Latin Student Union, the Women's Center, the Gay and Lesbian Alliance, the Progressive Young Democrats, and Hamiltonians for Divestment -- in order to protest what they saw as the College administration's failure "meaningfully" to address "the perceived racism, sexism and other prejudice at Hamilton." Complaint para. 10. Meanwhile, on Tuesday, November 11, a handwritten leaflet was circulated on campus "to those who are truly black." The leaflet said that "at the Divestment debate our race was truly insulted by . . . President Carovano," and announced plans for an "all night 'for real' sit in." This protest apparently never occurred. On the next day, however, a group of approximately forty to sixty students from the student coalition marched on Buttrick Hall, Hamilton's main administrative building. When the students arrived there shortly after 4:00 p.m., they gathered in the lobby, held a moment of silence, and then sang "We Shall Overcome." A few speeches were given. Dean Jervis was told that the students wished to meet with President Carovano. She responded that Carovano was away and warned the students that they would have to leave Buttrick Hall by 4:30 p.m., the building's regular closing time. The students, however, refused to obey. The 4:30 deadline passed, and the students were warned again shortly before midnight. Throughout the night, students freely came and went from the building, a minimum of perhaps ten to fifteen remaining there at any given time. The students, equipped with blankets and sleeping bags, chatted with security guards. An assistant dean brought in some pizza.
On the next morning, Thursday, November 13, 1986, the occupation of Buttrick Hall continued. The administrative staff that normally worked in Buttrick was told to stay home. Dean Jervis went to Buttrick at 8:45 a.m. and told the students that the building was off-limits and was closed to outsiders. Jervis warned that if the students did not leave within fifteen minutes, the College would seek a temporary restraining order against their continued presence at Buttrick. In making this announcement, Jervis expressly noted that she was following one of the possible alternatives listed in Hamilton's "Freedom of Expression/Maintenance of Public Order" statement (filed with the state pursuant to the Henderson Act). The students nevertheless persisted.
Hamilton thereupon went to the Supreme Court of New York, Oneida County, and later in the morning obtained an order temporarily enjoining the students from "congregating within the College's administrative building . . . in such manner as to disrupt or interfere with normal functions conducted by [the College] in such place or to block, hinder, impede or interfere with ingress to or egress from" Buttrick Hall. The College served the order upon the students occupying Buttrick and nailed it to a door of the building. The students, who felt they were not "disrupting" or "interfering" with anyone or anything, refused to budge. At 4:00 p.m., Jervis returned to remind the students yet again that they were, in the view of the College, violating the restraining order. She added that the College was sending letters of warning to those students present who could be identified, and that copies of the warning letters would be sent to the students' parents. The occupation of Buttrick continued.
At 11:00 a.m. on Friday, Dean Jervis returned once again. She read a terse notice stating that each of the students in Buttrick was violating the restraining order, that Hamilton would initiate contempt proceedings, and that the students were trespassing and could be subject to criminal charges. Finally, she warned that if they did not vacate Buttrick immediately, the students would be suspended from the College. Jervis personally handed copies of the notice to each of the students. She posted a copy as well. Two hours later, she again returned to Buttrick, where she found the twelve appellants and informed them that they were suspended. Appellants concede that "the defendants advised the students assembled [in Buttrick] that any who did not leave would be suspended." Complaint para. 15.
On the following Monday, November 17, President Carovano modified the suspensions so that they would not take effect until December 20, 1986, the final day of the fall semester, thus allowing appellants to complete the semester. The Hamilton Trustees were to meet in early December, and the students in question were invited to inform the trustees in writing of their "views on what has happened." The students' written response to this invitation demanded hearings before the Judiciary Board and stated that the chance to air their views before the Trustees did not accord them due process. Carovano also invited the students to present to him any "extraordinary circumstances" that might justify lessening the penalty imposed in any particular case. The students ignored this invitation.
Instead, on November 26 the students filed this suit in the Northern District of New York. They asserted three causes of action. The first alleged that the College had violated the due process clause of the fourteenth amendment, and hence Section 1983, when it suspended the students. The second, a pendent state-law claim, alleged that the College had violated its own disciplinary procedures. See Tedeschi v. Wagner College, 49 N.Y.2d 652, 427 N.Y.S.2d 760, 404 N.E.2d 1302 (1980). The third, which did not mention Section 1981 but which appellants now assert states a Section 1981 claim, alleged that the College had selectively enforced its disciplinary code against appellants because they were, among other things, "black, Latin or gay; supportive of the rights of blacks, Latins and gays and without old family ties to Hamilton." Appellants sought a preliminary injunction, and appellees moved to dismiss.
The district court promptly granted appellants' request for the expedited discovery of all files maintained by the New York State Education Department regarding the implementation of the Henderson Act. Appellants requested no further discovery. ARgument on the parties' opposing motions was initially held on December 19 before Judge Cholakis. After argument, however, Judge Cholakis on his own motion ordered the parties to present evidence on the issue of state action at a hearing that he scheduled for December 23.
At the evidentiary hearing, appellants introduced numerous exhibits, virtually all of which came from the files of the State Education Department and concerned the circumstances surrounding the passage of the Henderson Act. These documents were largely intended to prove the state of mind of college administrators in New York in 1969. In addition, appellants called as witnesses Professors Austin Briggs and James Ring, members of the Hamilton faculty who testified about the circumstances surrounding the College's drafting, adoption and filing of its "Freedom of Expression/Maintenance of Public Order" statement in 1969. Briggs testified on direct examination that Hamilton's administration had felt compelled by the Henderson Act to adopt and to file the "Freedom of Expression" statement. Ring identified minutes from faculty meetings held in 1968 and 1969. Neither witness testified as to any involvement by state officials in the drafting of the "Freedom of Expression" statement, and neither gave any testimony about the decision to suspend appellants.
Appellants also called Robert D. Stone, Esq., who was, both at the time of the hearing and in 1969, General Counsel to the State Education Department. On direct examination, he testified about a meeting held in Albany in May 1969 between state officials and representatives of various private colleges and universities located in New York. The purpose of this meeting was to discuss and to explain the freshly-minted Henderson Act. Stone was also asked about his understanding of Section 6450:
Q: At the time [1969] did you have a belief that the colleges were required by the law to eject for instance those who were occupying buildings at some point, or whether they could simply under the legislation let the occupation go on for months?
A: It was my understanding of the statute that the penalties for infractions must include ejection. It was not my impression then or now that the legislature meant to instruct the institutions as to when that penalty should be imposed.
On cross-examination, Stone explained that the State Education Department's review of filings under Section 6450 is entirely mechanical. Applying the criteria listed in a memorandum written by Stone on May 8, 1969, a junior staff member simply looks at submissions to see if they meet four requirements: (1) that the filings have been "promulgated by the . . . governing body of the institution"; (2) that they "relate to the maintenance of public order on the premises of the institution"; (3) that they "govern the conduct . . . of students, faculty, staff and all visitors"; and (4) that they provide for "ejection," "suspension, expulsion or other appropriate disciplinary action." Stone's May 8, 1969 memorandum also stated that "a range of penalties may be specified, with provision for the manner in which the specific penalty within the range will be determined in a specific case." Stone also testified as to the Education Department's implementation of Section 6450:
Q: Is it fair to say, Mr. Stone, that in 1969 the Department viewed its task in implementing Section 6450 as constituting a ministerial act of comparing the submissions of the colleges with the four items listed in your memo of May 8th, 1969, and determining whether those criteria were contained in each of the submittals?
A: That is a fair characterization of the way we saw our task.
Q: And after the acknowledgement letter was sent to a particular college advising them that their proposed regulations had been accepted and filed, did the Department undertake any further steps with that college concerning implementation of 6450?
A: The chapter, as I recall it, required that any revisions likewise be filed, and if they were, of course, they were reviewed in the same way as the initial submissions, or against the same criteria.
I do not recall that the Department did any follow-up to see that that requirement of the statute was ...
Our website includes the first part of the main text of the court's opinion.
To read the entire case, you must purchase the decision for download. With purchase,
you also receive any available docket numbers, case citations or footnotes, dissents
and concurrences that accompany the decision.
Docket numbers and/or citations allow you to research a case further or to use a case in a
legal proceeding. Footnotes (if any) include details of the court's decision. If the document contains a simple affirmation or denial without discussion,
there may not be additional text.
Buy This Entire Record For
$7.95
Download the entire decision to receive the complete text, official citation,
docket number, dissents and concurrences, and footnotes for this case. |
Blue Buffalo Company is voluntarily recalling one production lot of Cub Size Wilderness Wild Chews Bones. This is being done in an abundance of caution, as the product has the potential to be contaminated with Salmonella.
Salmonella can affect animals eating the product and there is risk to humans from handling contaminated pet products, especially if they have not thoroughly washed their hands after having contact with the products or any surfaces exposed to these products.
Healthy people infected with Salmonella should monitor themselves for some or all of the following symptoms: nausea, vomiting, diarrhea or bloody diarrhea, abdominal cramping and fever. Rarely, Salmonella can result in more serious ailments including arterial infections, endocarditis, arthritis, muscle pain, eye irritation and urinary tract symptoms. Consumers exhibiting these signs after having contact with this product should contact their healthcare provider.
Pets with Salmonella infections may have decreased appetite, fever and abdominal pain. Other clinical signs may include lethargy, diarrhea or bloody diarrhea, and vomiting. Infected but otherwise healthy pets can be carriers and infect other animals or humans. If your pet has consumed the recalled product and has these symptoms, please contact your veterinarian.
The product was distributed starting November 19, 2015 in PetSmart stores located in the following 9 states: California, Kansas, Michigan, Minnesota, Montana, Nevada, Oregon, Utah, and Washington. The recalled product comes individually shrink-wrapped in plastic with the UPC number 840243110087 printed on a sticker affixed to the product, and an expiration date of November 4, 2017, printed as “exp 110417” on the shrink-wrap. Consumers should look at the UPC Code and expiration date on the product package to determine if it is subject to the voluntary recall.
The voluntary recall is limited to the following product and production lot:
Product Name
UPC Code
Expiration Date
Cub Size Wilderness Wild Chews Bone
840243110087
November 4, 2017
Routine testing at the manufacturing site revealed the presence of Salmonella in the product. No illnesses have been reported to date and no other Blue Buffalo products are affected.
Consumers who have purchased the product subject to this recall are urged to dispose of the product or return it to the place of purchase for full refund.
Consumers with questions may contact Blue Buffalo at: 888-641-9736 from 8 AM to 5 PM Eastern Time Monday through Friday and the weekend of November 28, 2015, or by email at Bluebuffalo4260@stericycle.com for more information. |
Dr Karl › Dr Karl's Great Moments In Science
Achoo! Sunlight sets off sneeze reflex
Dr Karl sheds some light on a strange phenomenon called the photic sneeze reflex aka the ACHOO syndrome.
If you do crosswords a lot, you'll know many unusual words. So you might well know that a fancy word for sneezing is 'sternutation'. But one thing that nobody knows is why some people sneeze when they go out from the dark into the sunlight.
Actually, it also happens with artificial light, not just sunlight. The colour of the light doesn't matter — just the change in brightness from dark to light.
That great Greek thinker, Aristotle, knew of this phenomenon about 350 years BC.
The current official name is the 'photic sneeze reflex', but some medicos with a sense of humour call it the 'ACHOO syndrome'. 'ACHOO' is the sound you make when you sneeze, and so with a bit of imagination, the medicos came up with the 'A' in 'ACHOO' standing for 'autosomal dominant'.
And yes, the photic sneeze is genetically dominant — if one parent has it, then any of their children have a 50 per cent chance of also having it.
The 'C' stands for 'compelling', which is not quite accurate (but at least it starts with the letter 'c').
Roughly one quarter of us have some degree of this strange reflex of sneezing in the light — but it varies enormously in how it affects us.
A very small percentage of people will sneeze the same number of times, as regular as clockwork, whenever they go into the light. But at the other end of the spectrum are those people who might be affected only if they are just on the point of sneezing, with the inside of their nose tickling away like crazy — and then, when they stare into a very bright light, they'll have their sneeze. So 'C' for 'compelling' is more artistic than accurate.
Next in the word 'ACHOO' is the letter 'H'. This stands for Sun, from the Greek word for sun: 'helios'.
Finally, we have the two 'O's at the end of 'ACHOO'. The first 'O' stands for 'ophthalmic', coming from the Greek word 'ophthalmos' meaning 'eye', while the second 'O' stands for 'outburst', which could be very loosely thought of as a 'sneeze'.
Now a sneeze is not just an accident. It's a carefully co-ordinated series of reflex actions involving structures in your head and chest, and lots of nerves and muscles firing off at exactly the right time.
The fact that it's a reflex means that you don't have a lot of control over it. We have found a 'sneeze centre' in the brain of some animals, and we suspect that humans have one - but we haven't proved this yet.
A sneeze has two parts.
First, there's the inspiratory part, where the air is sucked into your lungs, following some kind of stimulus. This stimulus can be fine dust or irritants inside your nose, cold air, the plucking of your eyebrows, rhinitis, an anaesthetic injected into your skin near the eyes, sexual excitement or orgasm, a full meal and yes, stepping out into the bright light.
In the second part of the sneezing process, the vocal cords snap shut, the air pressure builds up inside your lungs and then the air bursts out of your nose and mouth, blowing out nasal debris and irritants.
So what makes people sneeze in bright light? At this stage, we simply don't know.
One theory says that the nerves that set off a sneeze travel close to the nerves that carry visual information, and that there's some kind of leaking of information or cross-talk — and so light sets off a sneeze.
Another theory says that it's related to one of your major nervous systems — the parasympathetic nervous system.
We know that the parasympathetic nervous system makes your pupils smaller when light lands on your eyes. It also is involved in triggering sneezes. Again, maybe there's some cross-talk from one nerve to another.
And quite separately from either of these theories, some recent research shows that when photic sneezers see stuff, their visual cortex responds in a more excited manner than non-photic sneezers.
But overall, we still don't know why some of us sneeze in the Sun.
We do know that photic sneezing can be hazardous. Imagine that you are a strong photic sneezer driving a car through the alternating light-and-dark generated by a line of trees at the roadside. In this case, you could wear a hat or polarizing sunglasses to shield your eyes.
I don't know if law enforcement officers would accept the photic reflex as a valid excuse for driving into somebody's car. Saying "I'm sorry officer, but I have the ACHOO syndrome" probably won't cut it.
^ to top |
Humidity control is a primary concern in many industries. Accordingly, over the years, various techniques have been developed to address these concerns. One such technique to control humidity combines cooling and condensation principles to remove humidity from air. The air in an enclosed space is cooled until it reaches a temperature below its dew point temperature at which time the moisture in the air condenses on the nearest surface. Conventional cooling-based dehumidification systems typically include a cooling coil, a condensing coil and a compressor.
While these types of systems are capable of extracting moisture from the air, it should be noted that they are primarily designed for cooling air. Nonetheless, the use of cooling-based dehumidification systems in industrial facilities and installations remains relatively widespread. Some cooling-based dehumidification systems have even been used on work sites located in generally hazardous environments where significant explosion or ignition hazards tend to exist. A readily apparent advantage associated with these cooling-based dehumidification systems resides in the fact that these systems do not generate high temperature air streams which could otherwise ignite flammable vapours or gases in the ambient air. The use of such systems however has had mixed results. While these systems have tended to be effective at removing moisture from the air in regions where the ambient temperature is generally warm and the humidity is relatively high, they have tended not to perform well in regions where the climate tends to be colder. In particular, cooling-based dehumidification systems tend to become inefficient at removing moisture from the air when the dew point of the air approaches 0° C. because at that temperature the moisture freezes on the condensing coil. Accordingly, cooling-based dehumidification systems have been found to be ill-suited for use in hazardous environments located in cold climates.
Another known humidity control technique relies on differences in vapour pressure to remove water vapour from air. When air is humid it has a relatively high water vapor pressure. In contrast, a dry desiccant surface tends to have a low water vapour pressure. When the moist air comes in contact with the desiccant surface, the water molecules will move from the humid air to the desiccant surface in an effort to equalize the differential pressure. In the result, the humid air will be dried. Since these systems do not involve any liquid condensate, they can continue to remove moisture efficiently even when the dew point of the air is below freezing. In fact, the performance of such desiccant-based dehumidification systems tends to improve in colder temperatures. It will thus be appreciated that such systems do not suffer from the same drawback traditionally associated with cooling-based dehumidification systems.
Desiccant-type dehumidification systems typically employ a rotating desiccant wheel whose core is impregnated with desiccant material. The desiccant wheel includes a process section and a regeneration section. In operation, an air stream from the enclosed space flows through the process section in one direction, while simultaneously another, heated air stream through the regeneration section in an opposite direction, all the while the desiccant wheel rotates slowly about its longitudinal axis. As the air flows through the process section, the desiccant material in the core extracts moisture from the air. The thus treated air is returned to the enclosed space in a dehumidified state. The desiccant material is regenerated by the heated air stream which flows through the reactivation section of the desiccant wheel.
While such systems tend perform well in colder climates, conventional desiccant-type dehumidification systems have tended not to be employed in hazardous environments. This is because proper functioning of a conventional desiccant wheel requires the use of a heated air stream and a thermal energy source for regeneration (usually electricity). Both of these requirements tend to create significant explosion and ignition risks in a hazardous environment. Moreover, the risk of explosion or ignition is further compounded by the fact that rotation of the wheel and the drying action of the desiccant tend to promote the generation of significant static electrical charges. The build-up of these static electrical charges can result in electrostatic discharge causing sparking. In a hazardous location, sparking can ignite flammable or combustible vapours in the ambient air.
Accordingly, there is a need for a desiccant-based dehumidification system that is versatile and that may be safely deployed in hazardous environments while minimizing the risks of explosion and/or ignition. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.