text stringlengths 8 5.77M |
|---|
By Lawrence Davidson
Soon after my analysis “In defence of Richard Falk” was published by Media with a Conscience (MWC), the site editor forwarded to me an unusual chastising response. It was unusual because it came from a relatively well-known scholar and writer by the name of Fred Skolnik.
Introducing Fred Skolnik
Skolnik is the editor-in-chief of a 22-volume Encyclopedia Judaica (second edition), a work that won the Dartmouth Medal in 2007. He is also the author of numerous works of fiction, all concerning life in Israel.
It is not rare for Zionists to take me to task, and Skolnik is most certainly a Zionist. Yet it is rare that those who chastise are of Skolnik’s stature. And so, a reply is in order.
Skolnik does not like Dr Falk who, the reader might remember, is the present United Nations special rapporteur for the Palestinian territories. And, because I defend Falk, he does not like me either. Indeed, as far as Skolnik is concerned I am part of “an army of Israel haters … churning out endless … venomous half truths” about the Land of Israel. Nonetheless, Skolnik has taken the time to write a three-page commentary to set me and my readers straight.
He says: “I will state Israel’s case in as few words as possible, though you of course may not choose to publish this in order not to lose the effect you are aiming at.” Well, that is silly. I have no objection to my readers seeing Skolnik’s response, which you can see by clicking here and then scrolling down to Skolnik’s comment.
Skolnik’s arguments
That being said, here is my analysis of elements of Skolnik’s case for Israel.
1. Skolnik: “There is no historic Palestine that has anything to do with the Arabs, nor is there an ‘indigenous’ or native Muslim population there.” This is a very old fantasy or myth that has been developed over the years to allow radical Zionists and violent settlers to rationalize their historical absorption of Palestinian land.
– Quoting from the Wikipedia entry for Palestinian People, an entry which reflects the latest research into this subject of who was where and when, including genetic analysis, we find that Palestinians are the
modern descendants of those who have lived in Palestine over the centuries and today are largely culturally and linguistically Arab… Genetic analysis suggests that a majority of the Muslims of Palestine, inclusive of the Arab citizens of Israel, are descendants of Christians, Jews and other inhabitants of the southern Levant whose core reaches back to prehistoric times.
– Furthermore, “a study of high-resolution haplotypes [DNA sequences] demonstrated that a substantial portion of Y chromosomes of Israeli Jews (70 per cent) and of Palestinian Muslim Arabs (82 per cent) belong to the same chromosome pool”.
– What all this means is that the ancestors of those Palestinians who are now culturally and linguistically Arab have been in Palestine for time immemorial. Over the ages, the population fragmented and acquired differing religious, linguistic and cultural traits. Indeed, those indigenous Palestinians, Jews and local Christians as well, are basically the same people gone in somewhat separate cultural ways.
– Poor Skolnik. It is a shock that he is so ardently supporting the ethnic cleansing of his own cousins.
2. Skolnik: “Most of the Arabs with ‘roots’ in the Land of Israel migrated there from other parts of the Arab world in the 19th and early 20th centuries while the Jews have been continuously present in the Land of Israel for well over 3,000 years.”
– This is another myth that was most prominently put forth in a book by Joan Peters, published in 1984, and entitled From Time Immemorial. Her argument and evidence were meticulously taken apart and shown to be false by Norman Finkelstein in his Image and Reality of the Israel-Palestine Conflict (1995).
3. Skolnik: “The displacement of the Arabs in the Land of Israel during Israel’s war of Independence …was paralleled by the displacement of hundreds of thousands of Jews living in Arab lands at the time whose lives were made unbearable under vindictive Arab rule.” Subsequently, the Israelis “received their Jewish brethren with open arms” while the Arab countries that received Arab refugees “herded them into camps and treated them like animals”.
– For an editor of a 22-volume encyclopedia Skolnik shows a deplorable tendency to slip into generalizing, stereotyping and lumping together multiple events with multiple outcomes. Here are some counterpoints:
– Actually, the exodus of Arab Jews from their countries of residence went on over an extended period of time and in some cases, such as Algeria, had nothing to do with the events in Palestine. In other cases where the Arab country found itself at war with Israel, as with Egypt, Jewish immigration was a direct result of the Zionist expulsion of Arabs. And in the case of Morocco, the government tried hard to assure the Jews’ safety and prosperity to counter Zionist propaganda urging them to leave.
– Sometimes the “displacement” was hastened, as in Iraq, by Zionist agents committing violent acts of sabotage against local Jewish communities.
– The reception the Arab Jews got in Israel wasn’t quite the “open arms” picture Skolnik paints. They were received by their European Jewish “brethren” with racial prejudice. Even today, Ashkenazi and Sephardic/Mizrachi relations in Israel are strained.
– As to the Arab refugees who were allegedly treated like animals by their fellow Arabs, this is an exaggeration. The situation differed country to country. For instance, treatment in Lebanon was bad, in Jordan it was good. In none of the refugee camps in Arab countries were conditions worse than those in the tent cities and “development towns” in the Negev Desert into which the Israelis herded 80 per cent of the Arab Jewish refugees.
4. Skolnik has other points which time and space do not allow me to address. The interested reader can find them in his response to my essay on Dr Falk. If you read and consider them please take the time to follow up with other sources of information, such as the works of the Israeli historians Ilan Pappe and Benny Morris as well as the journalistic pieces of Amira Hass and Gideon Levy (both of whom work for the Israeli newspaper Haaretz), and the reports of Israel’s human rights group B’Tselem. These are all Israeli sources, but they tell a very different story than does Skolnik.
From Skolnik to Gaza
As Skolnik so aptly demonstrates, we all live within our own world. These are usually constructed for us by our upbringing: our families, our peers, our schools, our friends and the level of attachment we develop to the community.
This attachment is usually sustained and deepened by the reinforcing information environment that the community provides for us. These environments at once transform us into “good” citizens and simultaneously narrow our views of the world so they conform to acceptable political and cultural paradigms. The process usually works quite well.
Nevertheless, it is still true that in any community you get a continuum of acceptance and devotion ranging from the sceptic to the true believer. For the latter, the community can do no wrong and its behaviour can always be rationalized. When it comes to Israel, Skolnik is a true believer.
In a country like Israel, one that has armed itself to the teeth yet feels perennially insecure, and where the true believers are in charge, the situation is made dangerous in the extreme. Over the years Israeli leaders, generally believing the same things that Fred Skolnik believes, have dispossessed and ethnically cleansed the Palestinians, pushing them into ever smaller areas of concentration.
Gaza is the worst example of these cases. It is a virtual “open air prison” of 1.5 million people squeezed into 139 square miles, the most densely populated place on earth. There, with the compliance of the United States and the European Union, the Israelis have proceeded to reduce most of the Gazans to abject poverty. When, periodically, these people strike out at their tormenters, usually in ineffective ways, they are labelled terrorists and, again with Western blessing, attacked furiously and disproportionately by the Israelis. You can now witness the latest onslaught live on the web.
Conclusion
Under these circumstances Skolnik’s assertions that the Jews were in Palestine first and the Arabs only came later as interlopers is really besides the point. Let us say, just for the sake of argument, that he is correct. That the Jews, even in their European guise, are the real indigenous Palestinians, having come back to the homeland after an extended absence of several thousand years. Even granted this fiction, does any of that give today’s Israeli Jews the right to treat the Palestinians as they do? Does it justify the creation of an apartheid environment in the occupied West Bank? Does it give them the right to reduce a million and half Gazans to a calculated impoverishment and then provoke them until they respond, whereupon Israelis indulge themselves in self-righteous mass murder?
I don’t believe any of Skolnik’s pseudo-history. I also don’t give a damn who lived in or controlled Palestine 3,000 years ago. The ones who control it now are, by their actions, no better than barbarians and the leaders in the West who back them have Palestinian blood on their hands. When it comes to behaviours like ethnic cleansing and cultural genocide the claim of self-defence is ludicrous. Nor can the fantasies of Fred Skolnik justify such on-going crimes. |
advice from a fake consultant
Wednesday, September 26, 2007
In a comment on the BlueNC site to one of my postings, Icloud aptly points out that Mr. Bush does not personally suffer the consequences of this war-that is, neither his family or personal fortune are at stake here.
The same can also be said of many of the Members of Congress. Jim Webb is an example of a Member who does feel that personal connection, and the passion he brings to this issue is clearly a result of that experience.
So how might we make the Members and the President more personally engaged in the daily lives of the military community…and more empathetic to the needs of the average military family?
The purpose of today’s discussion is to offer a suggestion that would do exactly that.
We can’t force the children of Members to serve personally in the Services, but we can bring a touch of the experience home fairly easily.
All we have to do is require Members and their families to obtain their medical care exclusively at VA and military facilities, and to encourage-by shame, if need be-those families to shop at military Exchange and Commissary stores.
For those not familiar, the Services operate two chains of official stores that provide the same kinds of things you might expect in a Target store (with a similar atmosphere, although not always as large) on bases and ships worldwide.
There are items unique to the military such as uniforms that are also available, which adds an interesting fashion atmosphere to the place, but that’s another story.
If Members had to see families in the grocery line trying to stretch the money they have; if they saw all the single parents who don’t have partners 15 months at a time…well, that might help to transcend the polics of why something as simple as the Webb amendment makes sense.
But for real impact, we should make it our business to insist that all Members, and their families, from now on, share the same medical care that our Servicemembers and their families receive-no better, no worse.
And to take it one step further, if there are billing disputes or customer care issues related to the health care needs of the Members and their families; send those issues to the same dispute resolution apparatus that serves the military community today.
Of course we can expect the usual objections: “It will be inconvenient…”“We would have to mingle with ordinary citizens…”“Our time is too valuable to be spent waiting in lines like veterans have to…”
Guess what?That’s the idea.
If it’s inconvenient enough to irritate the Members, it should become much more convenient for the military community in very short order.
If it's perceived by the public as another example of how Rs disrespect the troops while Ds support them, so much the better.
Now admittedly, none of this goes to the core of Iclouds original point; but by forcing every single Member to deal with this on a most personal level, it should force Congress to deal with a whole series of issues-or face the personal consequences.
How can this be accomplished?
Through the public choice of accepting the challenge, for the good of the troops-or accepting the shame of refusing.
Force Members to publicly answer the question of whether they feel they are too important to accept the same kind of care America’s troops volunteer for.
Force them to publicly admit they find the care our troops get is inadequate for their families.
Congressional Democrats-want to force the Republicans back on the defensive? Walter Reed, the issues of how Republicans take care of our troops, and the inadequate case management they receive when they return left the Rs rocking on their heels.
This is a tremendous issue for us-why not run with it and force the Rs to either agree or threaten a filibuster to fight you.
Candidates-why not now challenge the R candidates by coming out with the statement that as you run for President you will make every effort you can to devote yourself to this cause-and ask them why they won’t take a stand on what should be a bi-partisan issue?
Now I know this is an unlikely, long shot proposal, but long shots do happen.Consider that today the Seattle Mariners are playing a game in Seattle, at Safeco Field, their own stadium-and they are the visiting team.
If that can happen, why not this?Jim Webb, Harry Reid, John Murtha, Nancy Pelosi…whaddaya think?Want to try a different tack?I promise the public will support you-and it will raise public approval of Democratic Members.
Monday, September 24, 2007
Mr. Bush has officially informed us that recent success in Al-Anbar Province should convince us to “stay the course” in Iraq, despite the failure of every other aspect of his Iraq/Afghanistan/foreign policy initiatives-and the shifting nature of the definition of success.
Even more ironically, Mr. Bush now plans to become a crusader for fiscal responsibility, despite his failure to take this issue seriously in the past.
All of this has lead to a huge back and forth between those who claim this bit of recent overseas success and the current “strong economy” justify more of the same, as success is finally “just around the corner”, and those who see this President’s Iraq policy as essentially passing the problem on to the next President.
It’s always tough to judge a President during his term, considering the lack of a peer group to use for comparison. But what if Mr. Bush had the same won/loss record in a different job?
That question is the point of today’s conversation.
"You've got to be very careful if you don't know where you're going, because you might not get there."--Yogi Berra, former baseball manager
The crunching of the leaves below your feet tells us that the baseball playoffs have arrived-so let’s talk managers.
Not unlike a President, baseball managers are required to endure the blame and accept the credit for the fortunes of the teams they lead, making them an excellent subject for comparison.
Imagine a manager after a run of seasons in which his team was accused of being unprepared and undermanaged. Imagine if season after season they posted a mediocre to poor record.
Now imagine the press conference in which that manager told the team’s owners and fans to “stay the course”.
How might the upper management of such a team react?
Coincidentally, Mr. Bush was himself an owner and managing general partner of the Texas Rangers baseball club; which means we can actually perform a direct examination of how Mr. Bush himself would react when faced with the same issues of judging success and failure.
So in a question which will sound familiar to my Texas friends-what would the Rangers do if a 6-13 Mr. Bush was their manager?
The Ranger’s first manager, Ted Williams, retired following his first season after posting a 54-100 record.
There was Frank Lucchesi; who was fired after a 4th place finish in 1976, and a .500 record in ’77; and having his second baseman arrested after he was physically attacked by the player.
Billy Martin was fired even though he led the team to its best record until that point in Ranger history. (Of course, the Yankees were also unwilling to “stay the course” with Martin despite his exceptional success there.)
Buck Showalter; fired last year after 4 years with a .492 average winning percentage. (Ironically, the photo in the link shows Showalter losing to the Cleveland Indians. Here’s a link suggesting Showalter could have actually ended up working for the Indians.)
Then there’s Bobby Valentine and Kevin Kennedy-the two managers who led the team at the time Mr. Bush was the managing general partner.
So how tolerant was Mr. Bush of the failure of leaders under his baseball watch?
Valentine spent seven years with the team-and his exactly mediocre .501 average winning percentage got him canned.
So Kennedy was brought in (after a 76 game Toby Harrah era)-and he led the team to a second place finish in the Division (with an 86-76 record), which he followed with a 1st place Divisional finish the next year.
Mr. Bush oversaw his firing, too.
But my favorite managerial example: Johnny Oates. After amassing a 495-459 record with the Rangers over six years, he resigned in 2001 after beginning the season with an 11-17 record-and the most expensive player contract in baseball history, in the form of Alex Rodriguez.
And maybe that’s our real story for today: a leader who understood that failure upon expensive failure can lead you to no other decision but the right one-resigning for the good of the team.
Mr. Bush, if you really care as much about America as you do baseball...do a Johnny Oates. Admit to your losing record, accept some accountability for the first time in your life, and then we can make the moves that can get this team back on track to win the World Series.
Don’t drag it out until the end of a losing season-resign now. Take Cheney, your general manager, with you.
And maybe for the first time since Green Bay’s residents bought the Packers, the fans will again control the game-at least for a moment.
Thursday, September 13, 2007
Just as you have unfinished work piling up on your desk; stories pile up on mine that deserve discussion. Each of today’s stories would not in and of itself make a complete day’s work, so instead I’ll lay out on the table a late summer buffet, if you will, of conversational morsels that together will hopefully present a more complete “meal”.
First, to my friends in the Democratic leadership: I have again and again watched Democrats snatch defeat from the jaws of victory in Presidential elections by being too cautious. In the discussion this week of the “Petraeus” Report I see the start of the same process.
So let’s head it off right now.
“Now there's another thing I want you to remember. I don't want to get any messages saying that we are holding our position. We're not holding anything. Let the Hun do that. We are advancing constantly and we're not interested in holding onto anything -- except the enemy. We're going to hold onto him by the nose, and we're gonna kick him in the ass. We're gonna kick the hell out of him all the time, and we're gonna go through him like crap through a goose!”--George C. Scott as General George S. Patton.
More than 55% of Americans, by the Wall Street Journal’s count, even after this giant “product placement” we saw this week, believe this war cannot be won. Last week, that number was 62%. If history repeats itself that number will go back up as our perceived probability of “winning” goes back down.
You will not chase off any likely D voter by beating this point to death every chance you get. Most of the “purple” voters are leaning this way as well, if the numbers are correct.
There is nothing to be gained by being cautious.There is nothing to be gained by worrying that voters might be turned off by our aggression.There is everything to be gained by proving to the voters we are the real patriots.
Of course, our R friends have made a huge effort to muddy the rhetorical waters of Anbar Province; and that confuses the average voter enough to provide a bit of cover.
So that means you have to present a simple message that tells simple truths to parents and other voters who are scared of what the Rs might yet do and having trouble seeing through the mud. Here’s one:
“This Commander-in Chief lied and sent your kids to a war that can’t be won. When he did that, he broke the Army, the Marines, and Iraq. Now we have to end the war.”
Nice and simple. Already understood by more or less 60% of the voters.True-and becoming more so every day.
Moving on:
We are constantly guilty of being quick to criticize and slow to compliment. To break that trend, let’s begin today be presenting my First Irregularly Timed Unnoticed Hero award to Steven Aftergood, and by extension the fine folks at the Federation of American Scientists’ Project on Government Secrecy website.
For bloggers the gold vein is found in the “Congressional Research Service Documents” link. You pay for the data, Aftergood and his team engages in a daily struggle to wrest it from a reluctant Government.
These are reports that are written for “Congressional customers”, which means you are seeing the same reports your Member of Congress sees.
Last topic for today:
H.L. Mencken was associated with the Baltimore Sun from 1906 until 1948. If he were alive today he would undoubtedly be blogging; and in fact we are constantly quoting his famous Sun article of July 1920 “Bayard vs Lionheart”:
“As democracy is perfected, the office represents, more and more closely, the inner soul of the people. We move toward a lofty ideal. On some great and glorious day the plain folks of the land will reach their heart's desire at last, and the White House will be adorned by a downright moron.”
There is however, a better quote. In the final selection from today’s buffet, allow me to offer these paragraphs from that most excellent column of so long ago-that rings as true as if it had been written for this election cycle.
To set the stage, Mencken was discussing his frustration with candidates for President that to him appeared to be on the on the one hand stupid, and on the other hand, smart, cunning, and untrustworthy:
“But it is one thing to yield to virtuous indignation against such individuals and quite another thing to devise any practicable scheme for booting them out of the synagogue. The weakness of those of us who take a gaudy satisfaction in our ideas, and battle for them violently, and face punishment for them willingly and even proudly, is that we forget the primary business of the man in politics, which is the snatching and safeguarding of his job. That business, it must be plain, concerns itself only occasionally with the defense and propagation of ideas, and even then it must confine itself to those that, to a reflective man, must usually appear to be insane. The first and last aim of the politician is to get votes, and the safest of all ways to get votes is to appear to the plain man to be a plain man like himself, which is to say, to appear to him to be happily free from any heretical treason to the body of accepted platitudes-to be filled to the brim with the flabby, banal, childish notions that challenge no prejudice and lay no burden of examination upon the mind.
It is not often, in these later days of the democratic enlightenment, that positive merit lands a man in elective office in the United States; much more often it is a negative merit that gets him there. That negative merit is simply disvulnerability. Of the two candidates, that one wins who least arouses the suspicions and distrusts of the great masses of simple men. Well, what are more likely to arouse those suspicions and distrusts than ideas, convictions, principles? The plain people are not hostile to shysterism, save it be gross and unsuccessful. They admire a Roosevelt for his bold stratagems and duplicities, his sacrifice of faith and principle to the main chance, his magnificent disdain of fairness and honor. But they shy instantly and inevitably from the man who comes before them with notions that they cannot immediately translate into terms of their everyday delusions; they fear the novel idea, and particularly the revolutionary idea, as they fear the devil. When Roosevelt, losing hold upon his cunning at last, embraced the vast hodgepodge of innovations, some idiotic but some sound enough, that went by the name of Progressivism, they jumped from under him in trembling, and he came down with a thump that left him on his back until death delivered him from all hope and caring.”
The desk being clear enough for today; and there being no way I can top Mencken, let’s call it a job done. We have a couple stories under research, and over the next few days one of those should be up in this space as well.
Recent news reports from Spain have suggested the answer may be at hand…but apparently nothing in life is that easy. We’ll talk more about the bad news-and the good-as we go on.
First the bad news: There do appear to be two different problems the bees are facing, and unfortunately we can only resolve one at the moment.
One of the most common of bee diseases is nosema, caused by a parasitic infestation (Nosema Apis, for those keeping score at home) of the bee’s gut. It is easily treated with the antibiotic Fumigilin.
The news from Spain concerns reports of another similar bee parasite, Nosema Ceranae (a third parasite of this class, Nosema Bombi, is also known to infest bees), which appears to have made the jump from infesting Asiatic honeybees (Apis Cerana) to the far more numerous and, for agriculture, more important Western honeybee (Apis Mellifera). Thanks to the work of Dr. Mariano Higes we know that the infestation is widespread in Europe, and may be present in the US.
We first became aware that N. Ceranae was a problem for Western bees because of the fact that both Western and Asiatic bees are found in Vietnam-and in 2005, it was discovered that both had the same infestation. (A quick note-we have three members of the faculty of the School of Biological Sciences, Queen’s University, Belfast, to thank for the development of a rapid-sequencing DNA screening method that made this discovery possible: Julia Klee, Andrea Besana, and Robert J Paxton, whose story we referenced above.) Further confirmation was obtained when an imported colony of Western bees was found to be infested with N. Ceranae in Taiwan.
Klee and Besana’s work can be seen here. It contains an excellent discussion of the spread of N. Ceranae, “host jump”, the technical details of bee analysis, and a thorough description of how you too can sequence DNA at home in your spare time.
They also point out that the presence of N. Ceranae in collapsed European colonies does not automatically prove it’s causing CCD-it could well be coincindental.
So we now find ourselves facing a few questions:
--Are we looking at the source of Colony Collapse Disorder (CCD)?
--Is this infestation suddenly spreading because of opportunities created by the agent that causes CCD?
--If N. Ceranae is not the cause of CCD, what effect does this infestation have on the bees?
It does not appear that N. Ceranae is the cause of CCD, according to an analysis of Dr. Higes’ work published at North Carolina State University’s website. As we had discussed in April, the sheer number and variety of pathogens found makes it unlikely that one single agent was solely responsible. At the time the thinking was that a new infection or infestation was causing immunosupression through stress, allowing the variety of other opportunistic pathogens to take hold. To quote from the analysis:
"Initial studies on bee colonies experiencing the die offs has revealed a large number of disease organisms present in the dying colonies, with most being "stress related" diseases and without any one disease being supported as the "culprit" underlying the deaths. The magnitude of detected infectious agents in the adult bees suggests some type of immunosuppression. Case studies and questionnaires related to management practices and environmental factors have identified a few common factors shared by those beekeepers experiencing the CCD; but no common environmental agents or chemicals were easily identified by these surveys. The search for underlying causes has been narrowed by the preliminary studies, but several questions remain to be answered."
As to the other two questions: is N. Ceranae spreading opportunistically because of the agent that causes CCD? We don’t yet know.
What will be the effect of the spread of N. Ceranae in Western honeybees? That is a big unknown. It appears it can be easily treated, but what is unknown is what might happen if treatments are only applied irregularly. The possibility exists of “acclimation” to our current treatments, and that is but one of many possible implications that will have to be explored-the sooner the better.
There is guarded success in the effort to deal with CCD as well.
Details are literally coming in as we speak, but on September 6th Science Daily broke the story that a US based scientific consortium had discovered a connection between the presence of the Israeli Acute Paralysis Virus (IAPV) and Colony Collapse Disorder in numerous samples collected from a variety of media-including actual dead bees and royal jelly-collected from infected colonies and non-infected colonies.
The team was able to use DNA sequencing as a tool to determine associations between many pathogenic “possibilities” such as bacteria, viruses, and fungi, which is why the work could be completed so quickly. As a result of the sequencing work, it was determined that IAPV was found in all the collapsed colonies-and none of the non-infected ones.
Does this mean we have a culprit?Not so fast, friends.
As with N. Ceranae, association does not automatically mean causation has been established, and we are reminded to be cautious by the Mid Atlantic Apiculture Research and Extension Consortium (MAAREC) in a September 7th statement. (The statement also suggests imported Australian bees may be responsible for the infection.)
In fact, we are specifically told IAPV is likely a marker, or working with other opportunistic pathogens, and not likely to be the sole cause of CCD.
But we are again told that there is a very strong association (all the CCD colonies have IAPV present, and none of the non-infected ones do) between the two.
The statement tells beekeepers not to re-use hives, and continue to treat for Varroa and nosema as usual, and to keep hives healthy and well-fed (to maximize profits, as with any “livestock”, bees are fed exactly what they need to survive and not much more…this may also play a part in CCD).
Here’s some other possible good news: we are told that Australian bees are not affected by IAPV, and this could be because the Australian bees are immune to the virus. If so, cross-breeding is possible to eliminate the susceptibility. (It is also possible that Varroa, which is not present in Australian bees, may potentiate the virus, suggesting cross-breeding would not work.)
So that’s our story for today: the cause of CCD remains unknown, but tantalizing new information exists; a second new threat has been identified, and with any luck, our hard working friends in yellow and black (no, I don’t mean the Steelers) will be back where they belong-out hunting for your pollen.
Saturday, September 1, 2007
Even though I’ve been attending these meetings for awhile, I need to better understand how I came to be in this situation, so here goes…
It all started when I was reading about this George Bush guy that was running for President. This woman who used to write about Texas politics and its quirky nature put up a series of stories that gave you the impression that there was nothing good about this guy.
So I voted for Al Gore, because (I thought) he would make a better candidate. It turns out it was just a sign that I’m a member of the Lefty Fringe.
Don’t get me wrong-it’s not as if I haven’t sought help…but it just isn’t helping.
The news isn’t all bad.
I’ve been able to, with the help of my Conservative friends, admit that I’m addicted to hating America and all it stands for, which was a tough first step, but a necessary one.
I’ve also been able to recognize that the higher spiritual power of basic human morality can give me the strength to continue to seek a better future for America-and to realize that I have to work hard to own my government.
But then things start to get a bit fuzzy.
I’m supposed to be able to examine and make amends for my past errors, and I just can’t figure out what I’ve been doing wrong. They say a mentor can help you identify your past mistakes-would you like to help by telling me where I went off the track?
I remember thinking way back in 2001 that North Korea was not really as big a threat as this Administration seemed to want us to believe, and I don’t think I was wrong about that. But if you believed that point of view, you were a member of the Lefty Fringe.
And then there was September 11th. I heard Condoleezza Rice telling me that this sort of attack was “unprecedented”, even though crashing a plane into a building as a terrorist action had already been attempted in 1994-seven years earlier. Of course only Lefty Fringers would doubt such a highly placed individual…but that's me, I guess.
And I’ll never forget the day my friend Steve and I talked about how he was going to an anti-war protest…and I told him he was wasting his time. Being on the Lefty Fringe and all, I was pretty sure this decision had already been made (maybe even before Mr. Bush came into office), and our opinion wouldn’t mean squat. But he’s even farther over on the Fringe than I, so he gave it his best shot…
And why Iraq, anyway?
We on the Lefty Fringe knew that almost all the hijackers were Saudi. We knew the “aluminum tube” story was bogus, and if we didn’t know it already, in this case even the Administration’s own experts were trying to tell us so.
You know what else we knew? We knew that Shi’a would get revenge on the Sunni that had been oppressing them once Saddam was out of the way, and that a civil war that we could not control would be the result. We might even find ourselves in a quagmire, some thought; killing American troops to remove a guy who “wasn’t worth much”. Of course, there were lots of people who thought having these sorts of doubts was enough to not just put us on the Lefty Fringe, but to make us enemies of the State.
Lefty Fringers were confused to be in the mainstream when that awful Mr. Clinton was running Federal surpluses; and we are now back in our normal place with the far more economically traditional Mr. Bush’s Federal budget deficits, which seem to be in place to go on for many years to come.
Here’s the craziest part of all: I’m forced these days to defend the Constitution and the concept of separation of powers while my Conservative friends tell me I’m just giving aid and comfort to my enemies for my Lefty Fringe ideas. Here’s where I get really confused: these days, my Conservative friends suddenly trust the Government to do the right thing, while I’ve remained the principled skeptic.
I even use Richard Nixon and Ronald Reagan as examples of Presidents who understood that talking to our enemies is the smart thing to do, while my Conservative friends (who you might think would be Reagan supporters) tell me I’m some sort of appeaser for my thoughts. Thoughts like this Richard Nixon quote (substitute Iran for China, if you will) ". . . we simply cannot afford to leave China forever outside the family of nations, there to nurture its fantasies, cherish its hates, and threaten its neighbors…" are somehow considered ill-informed and inapplicable in today’s world.
Even today, apparently because of my addiction to hating America and all it stands for, I don’t think we’re making the slightest bit of progress in this “phony war on terrorism”. (As it turns out, I’m not the only one who hates America.)
Now if I really seek recovery, I’m supposed to make amends for my errors, and adopt a new code of conduct; but how do I do that?
Am I supposed to be sorry that I knew in advance that the Administration was wrong on every one of these issues?
Should I apologize to Pat Robertson for doubting that invading Iraq would be a good idea? Should I encourage my own godson to reenlist, knowing that this war is just about over-that “enormous success” is assured because the insurgency is in its last throes?
Should I adopt the traditional Conservative worldview that just assumes the Government should be trusted when it comes to war because Government knows what it’s doing at all times? That the Government will always be the guardian of the best interests of the citizens?
Maybe it’s because I’m addicted to hating my country so much, but I just can’t seem to do it. Instead I mistrust Government, and I want to control it, rather than the other way around. I hate this country so much that I want a Government that isn’t running around “nation-building” every chance it gets. Most of all, I hate America so much that I want other countries to admire us, respect us, and maybe even join into coalitions with us-to work on other global problems that even our own EPA recognizes will have huge impacts worldwide.
So that’s my testimony for today, and if someone will just sign my slip I’ll see you all next meeting. |
AdLit.org is a national multimedia project offering information and resources to the parents and educators of struggling adolescent readers and writers. AdLit.org is an educational initiative of WETA, the flagship public television and radio station in the nation's capital, and is funded by Carnegie Corporation of New York and by the Ann B. and Thomas L. Friedman Family Foundation.
Here Are Some Schools You Should Visit, Secretary DeVos
On one of her first days on the job, Betsy DeVos did what any U.S. Secretary of Education might do: She visited a public school.
Such an event might have gone relatively unnoticed if not for widespread worries that she neither understands public schools nor appreciates their central importance in building a civic community.
So, good for her.
She needs to see how public schools can be a beacon to the community — a metaphorical city on a hill, so-to-speak.
That is why I hope she is strategic and chooses to visit schools and districts that demonstrate how powerful public schools can be in the lives of their students — places that have marshaled the full power of schools as institutions to ensure that students learn a great deal.
In my work at The Education Trust, I have visited many schools — some of which have been recognized by Ed Trust as Dispelling the Myth schools — that demonstrate there is a great deal that can be done to overcome the obstacles of poverty and discrimination.
George Hall Elementary School, for example, has long been a shining city on a hill. Serving an isolated, low-income African American neighborhood in Mobile, Ala., for many years, it was one of the highest performing schools in Alabama. Following large changes in staff and in school boundaries, cuts in funding and changes in assessments, it is working to get back to its previous level; but, it was recognized recently as a National Title I Distinguished School, and the thoughtful way the principal and teachers think about continually improving is worth learning from.
A couple of hours west along the Gulf Coast is Pass Christian, Miss., which demonstrates what can happen when a community pulls together around its schools. Directly in the line of Hurricane Katrina, Pass Christian was almost destroyed in 2005. Only one school, its most inland, survived. Until the other three schools could be rebuilt or repaired, teachers and children whose homes had been destroyed spent their days in trailers parked in deep mud teaching and learning. Pass Christian educators like to say the experience made them even stronger. With a student population that is 30 percent African American as well as small numbers of students who are Asian and Hispanic, Pass Christian is an integrated school district with a significant population of students from low-income homes. If it were a low-performing district, no one would be surprised. But Pass Christian School District is one of the highest achieving school districts in the state, graduating almost as many students as much wealthier districts and sending many of them off to two- and four-year colleges and technical schools. Pass Christian is an example of a school district that has built relationships and competence, all in the spirit of being, as its slogan has it, “Committed to Excellence.”
For an example of a school that has absorbed large numbers of new immigrant students with aplomb, go to little De Queen Elementary School in Arkansas, which has been one of the top-performing schools in Arkansas for years. When its principal, Terriann Phillips, first started as a teacher, De Queen had one Hispanic student. Today, about two-thirds of the students are Hispanic, their families having been drawn there by jobs in the local poultry processing plant. With a careful approach to reading instruction and a dedication to ensuring that their students learn to be what they call “arguers,” students at De Queen are being prepared to be our future fellow citizens.
In the heart of the Rust Belt, Steubenville, Ohio’s elementary students (almost all of whom qualify for free and reduced-price lunch) have led the state in both reading and math for years — a testament to the systematic, coherent work the district has done to ensure that teachers work together to improve instruction for all students. And it is working on translating that success in the earlier grades into comparable success in the secondary grades. It isn’t there yet, but teachers, principals, and staff are determined to ensure that their students have the greatest possible opportunities for success as adults.
One of the schools I have visited most recently is Malverne High School, which serves two back-to-back towns in western Nassau County on New York’s Long Island. One town is primarily White; the other primarily African American, but with a number of new immigrants from the Caribbean, Africa, and Latin America. Back in the 1990s, it hit a low point with graduation rates below 40 percent, and almost all the White families abandoned the school. Thanks to school and district leaders who knew how to systematically build relationships and improve instruction, it now graduates more than 90 percent of its students, more than half of whom earn an advanced designation. Its success has been noticed by the local community, too. It has been attracting White families back from private and parochial schools, and now about 20 percent of its students are White.
Malverne High School — really, all the schools I have mentioned and many more — demonstrate the power that school and district leaders, working together with teachers, have to ensure that all their students achieve at high levels and become productive citizens.
I hope our new secretary of education sees that and finds ways to support their work.
Strong public schools are at the heart of the American experiment in democracy; our forebears thought of public schools as being the way we transmit both knowledge and democratic values.
We need to demand that all schools operate at a high level, but we must also recognize what a precious investment they represent and support all our schools so that they, too, can get better and better. |
Preparation of B lymphocyte-specific alloantisera by skin implant immunization of cattle.
B lymphocyte-specific antisera were prepared by immunizing cattle on either one or two occasions with a subcutaneous implant of allogeneic skin and subsequently absorbing the antisera with platelets. After absorption 15/26 antisera displayed B lymphocyte-specific activity. Titres against B-enriched cells were 8-64 while residual titres against B-depleted cells were 1-8. In comparison, 3-6 immunizations with allogeneic leucocytes produced antisera of similar peak cytotoxic titres against donor PBL, and after platelet absorption 8/15 antisera displayed B lymphocyte-specific activity. Titres against B-enriched cells were 8-64 while residual titres against B-depleted cells were 2-8. The skin implant method was less time-consuming than the leucocyte immunization method. |
Best Light Blackout Curtain Reviews in 2018
We decided to test and review some of the best blackout curtains on the market. We favor the H.Versailtex 100% Blackout Shade Curtains, they offer a complete blackout at a reasonable price. If you’re trying to ensure that the set you get is perfect for your home, then let’s take a look and see what we can do when it comes time to find that ultimate set of light blackout curtains.
Bestoverallpick!
Best overall: H.Versailtex
These are our favorites of the numerous blackout curtains we looked at. They’re priced great, provide serious blackout potential, available in a wide variety of colors… we can’t stop raving about them.
1. Best Overall
H.Versailtex 100% Blackout Shade Curtains
These are a great set of curtains for nearly any home. These are true blackout curtains, and pairing them with the right header and rod will give you a serious advantage over most of the competition.
They’re created with several layers of material, which will protect from light, dampen sound, and help to keep heat in or out depending on the weather in your area. All of this together ends up adding up to a bargain when you consider the low price.
The only real issue is that they have a very heavy look to go with their incredible properties that just doesn’t fit in everyone’s home. On the other hand, they’re available in pretty much any color you can think of and you’ll quickly find out that they’re some of the best around.
Pros and Cons
Affordably priced
True blackout curtains can stop nearly 100% of light
Insulated and sound dampening as well for ultimate privacy
Come in a ton of different colors
Shiny, polyester finish doesn’t appeal to some
Large grommets at top let some light through
2. Runner Up for Best Light Blackout Curtains
NICETOWN Thermal Insulated Grommet Blackout Curtains for Bedroom
Product Rating4.5 /5
Reviewed by: Max Perzon
If the above option runs a bit too expensive for your tastes, then you might end up being quite happy with these basic blackout curtains. They’re of a similar cut, with grommets allowing for a smooth pull out, and come in a wide variety of colors as well.
They have a similar three layer design, coming with black yarn sandwiched between two other layers of material in the color of your choosing. We also like the fact that the grommets are a bit tighter, but overall we feel like they look and feel a bit cheaper than our first pick.
As basic blackout curtains they’re remarkably effective. They block out light and the insulation works well on heat and they even have a bit of a sound dampening quality to them when they’re pulled tight.
If you’re looking for an alternative to our favorites, then you may have found a slightly cheaper option with these excellent curtains. Just be aware the cost difference shows, although it doesn’t seem to effect function much.
Pros and Cons
Wide variety of different colors available
Three layer, durable construction
Grommet design for smooth pull
Super affordable
Considerably cheap look and feel
Don’t block out enough light for dark room or nursery purposes
3. Best Room Darkening Curtains
Miuco Thermal Insulated Grommet
Product Rating4 /5
Reviewed by: Max Perzon
For light dampening purposes, these richly colored drapes from Miuco are fantastic. They even have weighted bottoms to ensure that they stay in place, and they block an astounding 100% of UV and 98% of sunlight in order to ensure that you get the darkness you need.
They also come in a wide variety of sizes, which is a nice touch since they’re useful pretty much everywhere in the home. Add in that they come with fashionable tie backs in the same color as the curtains and you’ve got a clear winner. Affordable and highly light blocking, we feel these are the best option for keeping a room dark. Add in a shade behind them and you’ll be able to block nearly 100% of even direct sunlight.
If you need to keep a room dark then take a look at these Miuco drapes.
Pros and Cons
Richly colored
Blocks almost all sunlight
Weighted bottom to hold them in place
A ton of different sizes available
Grommet design means you need to measure out a couple of extra inches
A little bit heavy, make sure you have a sturdy rod
4. Best White Blackout Curtains
AmazonBasics Room Darkening
Product Rating4 /5
Reviewed by: Max Perzon
While they’re available in a bunch of different colors, AmazonBasics has one of the best white blackout curtains around. The thing is, the majority of these which are sold tend to have an off-grey or bluish tint due to the interior material.
Meanwhile, the AmazonBasics model remains entirely white. That’s great for those who need to ensure that they’re tying the room together perfectly, allowing you to enjoy the best of the best.
Of course, they’re overall great blackout curtains no matter which color you choose, but we’d recommend our first choice for most who want a different coloration.
If you’re looking for white blackout curtains, you’ll quickly find out that AmazonBasics delivers in spades. The rest of the colors in the line aren’t too shabby either.
Pros and Cons
White runs true to color
Thick curtains also insulate heat and sound
Pull along design is easy to size
Available in three different sizes
Expensive
“Industrial” look
5. Best Budget Blackout Curtains
Vangao Burgundy Red
Product Rating3.5 /5
Reviewed by: Max Perzon
If you’re looking to save some money and don’t mind cutting a couple of corners then you’ll be in love. They look and feel a bit cheap compared to the rest of our favorites, but they function just the same which is what really matters for some applications.
While we wouldn’t recommend them to those trying to keep a chic home, they’ve definitely got their advantage in being just as good at keeping sound and light out as most of the rest on our list and they come in quite a few different colors.
If you don’t mind the inferior look and feel of these curtains, they work fantastic. Great for media rooms or dark rooms, where the majority of time you don’t want light anyways
Pros and Cons
Super affordable price
Come in a ton of different colors
Machine washable
Eco-friendly manufacturing process
“Cheap” look and feel
Only available in darker colors
Who Needs Blackout Curtains?
There are a lot of ways to keep light out of a room, but one of the most stylish and easiest to use are definitely blackout curtains. Whether you want to make things dim or remove the light altogether, making the investment in the right pair can really let you change the ambience in a room. Of course, if you truly care about your home décor then not just any set is going to do it. That means a bit of research is in order.
If you’re on the fence about whether or not light dampening or blackout curtains are right for you, then you should think about some of the advantages they afford.
UV Protection
UV rays are the most harmful portion of light, and even the weakest blackout curtain will help to keep the damage to things in the interior of your home to a minimum.
If you’ve had your home for any length of time you know this is a real concern when you’ve got leather furniture in a room with large windows. Things won’t degrade as quickly as if you left them in the yard, but it happens over time.
Minimize the damage by minimizing the amount of UV which hits your things and they’ll last longer.
Energy Conservation
Surprisingly, you can actually save on your power bill with the right curtains. Windows conduct heat and maintain it for a long time while trying to achieve equilibrium with the outside air.
This means that a good set of curtains can actually end up saving you money in the long run. Heating and cooling a home is super expensive so covering your windows is a good idea.
On top of that, in hotter climates blackout curtains can keep a home from heating excessively by keeping the room from experiencing direct radiation from the sun.
Movie Rooms
Tired of glare on the TV? The right curtains can solve that problem forever. It’s also useful for smaller devices, depending on where you’re going to be spending time in the house.
On top of that, it’s basically impossible to use a projector in any room with too much ambient light. By blacking things out you can achieve a dark room and watch your favorite movies right on your wall.
Privacy
Sheer curtains can still let people see what’s going on in your home from the street. Most of us like our privacy and light dampening or blackout curtains can handle the problem readily without looking as uninviting as some of the other options out there.
They also tend to last longer than blinds or shades, which is a big step in the right direction.
Tying the Room Together
If you’re looking to upgrade those shabby curtains anyways, then you’ll be in good hands by buying a set of curtains which both improves the look of your room and is super useful.
Unlike the older models, you can actually find fairly light curtains these days that block the majority of light out rather than being stuck with the old models which weren’t all that attractive.
Make the purchase now, and get the whole room tied together… with some added utility.
Uses for Light Blackout Curtains
There are a ton of different light dimming and blacking out curtains available. They all reflect differing levels of utility, and that can make it rather difficult to figure out what you need if you’ve never had to select a curtain before.
Light Dampening Curtains
Light dampening curtains will cut out quite a bit of the light and provide some privacy instead of just being the sheer design which most people think of when they hear the words “curtain.”
Essentially, they’ll be opaque.
These are some of the most often used, and indeed many people use the phrase interchangeably with blackout curtains. For bedrooms, living rooms, and other places where you might get a bit more light than you want they can be an invaluable addition.
For the most part these provide privacy without much insulation and they definitely don’t cut out light completely.
We recommend looking into light dampening curtains for bedrooms primarily, although living rooms can also be done depending on facing, your windows, and the climate.
Insulated Curtains
Insulated curtains generally aren’t sold as light dampening curtains, but they tend to actually block out more light than them due to the multiple layers of fabric.
They’re great for rooms with particularly large windows, since they’ll be able to keep heat in and cold out during the winter. Windows are a big convective loss of heat within most households, so an investment in insulated curtains can save money.
Of course, if you don’t use them you really aren’t going to save any cash, but that’s another matter entirely.
In most homes, insulated curtains are a welcome addition to living rooms and other places where you have broad windows that directly contact outside air. They can save quite a bit of money on central air control if used properly.
True Blackout Curtains
True blackout curtains are a bit overkill for most types of room. They tend to add a super dark feel, and it’s not all that attractive when they’re in use.
On the other hand, some rooms just need the absolute limiting of light.
Media rooms, home theaters, and nurseries are good examples of places where these curtains shine. Some people even use them in photo rooms.
In order to use them to their full extent you’ll also need to make sure you have a blackout header, a wraparound curtain rod, and possibly a set of pull down blinds to make absolutely sure no light gets in.
They really aren’t the right choice for many places in the home, but when they’re utilized to their full extent they can be extremely useful pieces.
Picking Your Blackout Curtains
The first thing to determine when you’re looking into these handy home additions is whether or not you want a fully dark room or just something which is going to limit the light.
Many people still like to have some natural light filtering through, but for media rooms and other applications where eliminating as much light as possible is a big concern there are actual blackout curtains which can be highly effective.
Type of Curtain
Curtains can be separated pretty easily.
Curtains are a single layer of fabric. In the case of blackout or light filtering curtains, they’ll have their protective properties built right into the fabric itself. This often takes the form of a lining layer, but there are a few different options out there.
Curtains can be extremely light proof. They’ll provide a lighter look to the window and a lighter feel due to their single layer nature.
Drapes on the other hand are made of multiple layers of fabric. With two or more layers, they tend to be best for blackout curtains as opposed to just light dampening although they come in both varieties.
Drapes look and feel a lot heavier due to the multiple layers, and they can function as a great asset to a room in many cases, especially when displayed with rich coloration.
Your choice mostly boils down to the look that you’re going for, although we do recommend drapes for rooms where having no light is absolutely essential.
Rods
If the curtains you’re looking at come with rods, then you’ll want to make sure they’re a few inches wider than the window you’re planning on using them for. This will help to eliminate the light “halo” effect from around the corners of the window and can completely eliminate it in some instances.
The look of the rod is also important to a lot of people, but it’s relatively easy to switch them out if you love a certain pair of curtains but aren’t totally convinced with the rod.
Wraparound rods are the best option for eliminating light from coming in. They’ll bring the curtains all the way to the wall quickly and easily, in order to give you the best chance at eliminating all outside light.
Header
If you buy a complete set, make sure that your header is of the same material as the curtains. This is another vital piece which some people miss due to not thinking about it.
Blackout headers can be quite stylish and they’re readily available if the set of curtains you’re looking at doesn’t fit with them.
If you’re new to interior decorating you may be surprised at just how important this part of the process can be. The header has a huge effect on the overall impression of the room.
Material
The material which your curtains are made of does more than just keep the light out, it can also alter the entire aesthetic effect of a room. If you want to make sure that you’ve got the best looking living room on the block, it bears some thought.
Fortunately, not all blackout curtains are made of the old polyester material most of us associate with cheap hotel rooms. Indeed, that stuff is almost impossible to find outside of institutional settings.
There are a ton of different materials available, ranging from light to heavy and looser weaves to stuff that resembles tapestries. Just take it into account when you pick your curtains and you’ll be fine.
Aesthetic
We were as surprised as anyone else to find out one thing: you can find blackout curtains in white.
More importantly, you can find them in basically any color you might want. We think curtains look best in lighter colors and drapes with richer ones, but with the super wide variety of things available these days you’ll be in good hands pretty much no matter what you want.
You’ll also need to match your header and rod with the curtains, so keep that in mind if the look of the room is a big concern for you and your family.
Sizing
You’ll also have to size your curtains appropriately, particularly if you’re planning on saving money by buying them online instead of going to have a custom set prepared for many times the cost.
Size them to the curtain rod, as opposed to the window itself, especially if you’re looking to eliminate the halo effect. You may also want to allow them to overlap a little bit to stand a better chance at keeping all light out if you’re looking into true blackout curtains.
Cost
The costs of curtains are all over the place, and don’t reflect their utility so much as the styling and designer who’s created them. We’ve done our best to provide a wide variety of options, but like any sort of home décor you’re going to want to find something that balances between what you love… and what you can afford.
Conclusion
Finding the best blackout curtains can be something of a pain, but armed with the information above you should be able to find the perfect set for each room in your home. Give it a shot, these curtains are handy and the quality of life improvements you’ll enjoy can be pretty impressive overall. |
let testComplexTypeWithOData = async (): Promise<void> => {
const contextProvider = Bit.DependencyManager.getCurrent().resolveObject<Bit.Contracts.IEntityContextProvider>("EntityContextProvider");
const context = await contextProvider.getContext<TestContext>("Test");
const complexDto = context.testComplex.add({ EntityId: 0, ComplexObj: { Name: "Test" } });
await context.saveChanges();
expect(complexDto.ComplexObj.Name).toBe("Test?");
let complexDtoLoadedFromServer = await context.testComplex.find(1);
context.attach(complexDtoLoadedFromServer, $data.EntityAttachMode.AllChanged);
complexDtoLoadedFromServer.ComplexObj.Name = "Test";
await context.saveChanges();
expect(complexDtoLoadedFromServer.ComplexObj.Name).toBe("Test?");
complexDtoLoadedFromServer = await context.testComplex.doSomeThingWithComplexObj(complexDtoLoadedFromServer).getValue();
expect(complexDtoLoadedFromServer.ComplexObj.Name).toBe("Test??");
expect((await context.testComplex.getComplexObjects().first()).Name).toBe("Test");
const testDtoWithNullComplex = (await context.testComplex.getObjectsWithNullComplexTypes().toArray())[0];
expect(testDtoWithNullComplex.ComplexObj.Name).toBeNull(); // This covers #146 but not #52. It needs more work.
};
let testComplexTypeWithOfflineDb = async (): Promise<void> => {
const contextProvider = Bit.DependencyManager.getCurrent().resolveObject<Bit.Contracts.IEntityContextProvider>("EntityContextProvider");
const insertContext = await contextProvider.getContext<TestContext>("Test", { isOffline: true });
let complexDto = insertContext.testComplex.add({ EntityId: 1, ComplexObj: { Name: "Test" } });
await insertContext.saveChanges();
const updateContext = await contextProvider.getContext<TestContext>("Test", { isOffline: true });
complexDto = await updateContext.testComplex.find(1);
updateContext.attach(complexDto, $data.EntityAttachMode.AllChanged);
complexDto.ComplexObj.Name = "Test2";
await updateContext.saveChanges();
const readContext = await contextProvider.getContext<TestContext>("Test", { isOffline: true });
complexDto = await readContext.testComplex.find(1);
expect(complexDto.ComplexObj.Name).toBe("Test2");
};
let simpleArrayValuesTest = async (): Promise<void> => {
const contextProvider = Bit.DependencyManager.getCurrent().resolveObject<Bit.Contracts.IEntityContextProvider>("EntityContextProvider");
const context = await contextProvider.getContext<TestContext>("Test");
const values = await context.testComplex.getValues([1, 2]).toArray();
expect(values.map(v => v)).toEqual([2, 1]);
};
let enumTest = async (): Promise<void> => {
const contextProvider = Bit.DependencyManager.getCurrent().resolveObject<Bit.Contracts.IEntityContextProvider>("EntityContextProvider");
const context = await contextProvider.getContext<TestContext>("Test");
const dtoWithEnum = await context.dtoWithEnum.getDtoWithEnumsByGender(Bit.Tests.Model.Dto.TestGender.Man).first();
expect(dtoWithEnum.Gender).toBe(Bit.Tests.Model.Dto.TestGender.Man);
const dtoWithEnum2 = await context.dtoWithEnum.getDtoWithEnumsByGender2(Bit.Tests.Model.Dto.TestGender2.Man).first();
expect(dtoWithEnum2.Test).toBe("Man");
expect((await context.dtoWithEnum.postDtoWithEnum(dtoWithEnum))).toBe(true);
await context.batchExecuteQuery([context.dtoWithEnum.getDtoWithEnumsByGender2(Bit.Tests.Model.Dto.TestGender2.Man), context.dtoWithEnum.getDtoWithEnumsByGender(Bit.Tests.Model.Dto.TestGender.Man)]);
const enumsArrayTest = await context.dtoWithEnum.testEnumsArray([Bit.Tests.Model.Dto.TestGender2.Man, Bit.Tests.Model.Dto.TestGender2.Man]);
expect(enumsArrayTest).toBe(true);
}; |
Q:
How to setup a scheduled task in Windows XP to run a Marcro in ms-access?
I typically have some need to run a process each day prior to my arrival at the office. I would like to set this up as a scheduled task.
How can this be accomplished?
Is there a best practice on doing this?
Can or should this be done programmatically?
A:
To resolve this I did the following:
Created a Macro named "Submit".
Created a Scheduled task .job file by going to:
Start > All Programs > Accessories > System Tools > Schedule Tasks
(This produced the .job file in the following location: "C:\WINDOWS\Tasks\Submit.job")
Once this was created, I placed the following syntax into the Run: text box.
"C:\Program Files\Microsoft Office\Office11\MSACCESS.EXE" "C:\MyDatabasePath\MyDatabaseName.mdb" /x "Submit"
After this, the remaining portion of the setup is completed as a normal schedule task should be. You can find more details about how to manually setup these tasks [here][2] or if you like to perform the setup through the command line, this is a particularly useful reference.
Note: Both the Macro and the job file must be setup for this to work correctly.
One way to accomplish this programmatically would be do utilize the job API's. Here is one such example where this was accomplished using VBA:
See Reference Here
Option Explicit
' Schedule api's
Declare Function NetScheduleJobAdd Lib "netapi32.dll" _
(ByVal Servername As String, Buffer As Any, Jobid As Long) As Long
' Schedule structure
Type AT_INFO
JobTime As Long
DaysOfMonth As Long
DaysOfWeek As Byte
Flags As Byte
dummy As Integer
Command As String
End Type
' Schedule constants
Const JOB_RUN_PERIODICALLY = &H1
Const JOB_NONINTERACTIVE = &H10
Const NERR_Success = 0
Private Sub Command1_Click()
Dim lngWin32apiResultCode As Long
Dim strComputerName As String
Dim lngJobID As Long
Dim udtAtInfo As AT_INFO
' Convert the computer name to unicode
strComputerName = StrConv(Text1.Text, vbUnicode)
' Setup the tasks parameters
SetStructValue udtAtInfo
' Schedule the task
lngWin32apiResultCode = NetScheduleJobAdd(strComputerName, udtAtInfo, lngJobID)
' Check if the task was scheduled
If lngWin32apiResultCode = NERR_Success Then
MsgBox "Task" & lngJobID & " has been scheduled."
End If
End Sub
Private Sub SetStructValue(udtAtInfo As AT_INFO)
Dim strTime As String
Dim strDate() As String
Dim vntWeek() As Variant
Dim intCounter As Integer
Dim intWeekCounter As Integer
vntWeek = Array("M", "T", "W", "TH", "F", "S", "SU")
With udtAtInfo
' Change the format of the time
strTime = Format(Text2.Text, "hh:mm")
' Change the time to one used by the api
.JobTime = (Hour(strTime) * 3600 + Minute(strTime) * 60) * 1000
' Set the Date parameters
If Val(Text3.Text) > 0 Then
' Set the task to run on specific days of the month i.e. 9th & 22nd of the month
strDate = Split(Text3.Text, ",")
For intCounter = 0 To UBound(strDate)
.DaysOfMonth = .DaysOfMonth + 2 ^ (strDate(intCounter) - 1)
Next
Else
' Set the task to run on sepecific days of the week i.e. Monday & Thursday
strDate = Split(Text3.Text, ",")
For intCounter = 0 To UBound(strDate)
For intWeekCounter = 0 To UBound(vntWeek)
If UCase(strDate(intCounter)) = vntWeek(intWeekCounter) Then
.DaysOfWeek = .DaysOfWeek + 2 ^ intWeekCounter
Exit For
End If
Next
Next
End If
' Set the interactive property
If Check1.Value = vbUnchecked Then
.Flags = .Flags Or JOB_NONINTERACTIVE
End If
' Set to run periodically
If Option2.Value = True Then
.Flags = .Flags Or JOB_RUN_PERIODICALLY
End If
' Set the command to run
.Command = StrConv(Text4.Text, vbUnicode)
End With
End Sub
|
Beach City Drug Rehab & Detoxhttp://beachcitydrugrehab.com
Beach City Community Outreach 949-324-0287Thu, 01 Mar 2018 05:09:23 +0000en-UShourly1https://wordpress.org/?v=4.9.4http://beachcitydrugrehab.com/wp-content/uploads/2016/07/cropped-SCRS-32x32.pngBeach City Drug Rehab & Detoxhttp://beachcitydrugrehab.com
3232Cocaine Addiction Symptoms and Effectshttp://beachcitydrugrehab.com/2016/07/15/cocaine-addiction-symptoms-and-effects/
Fri, 15 Jul 2016 18:46:12 +0000http://beachcitydrugrehab.com/?p=257Cocaine Addiction Symptoms and Effects
Contents
• What are the Signs and Symptoms of Cocaine Abuse?
• What are the Effects of Cocaine Dependency?
• How Does Cocaine Abuse Change the User’s Brain?
What are the Signs and Symptoms of Cocaine Abuse?
Cocaine is a powerful and addictive drug, classified by the federal government as a high abuse, high dependency risk stimulant. Signs and symptoms of cocaine abuse vary based on the method of ingestion.
The powdered form of cocaine can be inhaled through the nose (snorted) or dissolved in water and then injected directly into a vein. It can also be injected just under the skin (known as “skin popping”), which increases the duration of the high and can also lead to infection or other medical complications. Common signs of snorting cocaine, the most popular method of ingestion, include:
• loss of the sense of smell
• nosebleeds
• difficulty swallowing
• hoarseness
• a chronically runny nose
A form of cocaine with the street name crack is processed into a rock crystal and then smoked, most often using a pipe. Given the lower purity level and wider potential for introduction of other dangerous chemicals, long-term crack cocaine users may experience even more dramatic symptoms.
Cocaine addiction may also produce noticeable behavioral or personality changes, which are often signs of increases in the amount or frequency of use:
• irritability
• restlessness
• anxiety
• paranoia
What are the Effects of Cocaine Dependency?
Those who suffer from cocaine abuse and addiction can experience a condition known as severe paranoia, which is a temporary state of extreme paranoid psychosis. In this state they lose touch with reality and experience auditory hallucinations (hearing sounds that are not real). Ingesting cocaine by mouth can cause ulcers in the stomach lining and the death of a large amount of tissue (gangrene) in the bowel as a result of reduced blood flow.
Regardless of the manner or frequency of use, cocaine abusers can experience heart attacks or strokes. Quite often cocaine-related deaths are a result of heart attack or seizure followed by respiratory arrest during which the user stops breathing.
Common serious health problems resulting from cocaine dependency include:
• heart problems, including heart attacks
• respiratory effects, including respiratory failure
• nervous system problems, including strokes
• digestive problems
• contracting HIV and other diseases (by Injecting cocaine using shared needles)
• serious skin infections
• severe allergic reactions
• death
How Does Cocaine Abuse Change the User’s Brain?
Like other forms of drug addiction, cocaine dependence results from the effect the drug has on the brain that results in feelings of intense pleasure. Cocaine works as a stimulant drug by increasing the levels of the brain chemicals, especially dopamine. Under ordinary circumstances, lower amounts of dopamine are produced in response to the pleasurable activities we all experience as a natural part of our everyday lives.
Cocaine produces its euphoric effect in two ways:
• Artificially increasing the release of dopamine
• Preventing the normal re-absorption of dopamine back into the brain’s nerve cells
In all cases of habitual cocaine abuse and addiction the body builds a tolerance to the increased levels of dopamine, and progressively larger amounts of cocaine are required by the user to achieve the sensation of being high.
Commonly, cocaine abusers experience long-term changes in the brain’s reward system and in other brain systems. This can result in unusual or unpredictable behavior toward those around them. Many cocaine abusers become frustrated when their increased tolerance results in a failure to achieve the high they did from their initial exposures. They often then increase their dosage in an attempt to intensify and prolong the effect; this heightens the risk of adverse physiological or psychological effects, as well as the risk of a potentially deadly overdose. Also, using cocaine with alcohol increases the likelihood that the user will become a victim of a drug-related death.
Cocaine abuse and addiction are serious medical diseases that are extremely difficult to address. Orange County Intervention, is partnered with the leading rehab and recovery facilities for women and adolescent girls suffering with cocaine dependency as well as other addictions, eating disorders (anorexia, bulimia) and co-occurring disorders.
Immediate help line 714-725-1101
]]>Alcoholism and Alcohol Abusehttp://beachcitydrugrehab.com/2016/07/15/alcoholism-and-alcohol-abuse/
Fri, 15 Jul 2016 18:44:11 +0000http://beachcitydrugrehab.com/?p=255Signs, Symptoms, and Help for Drinking Problems
It’s not always easy to see when your drinking has crossed the line from moderate or social use to problem drinking. But if you consume alcohol to cope with difficulties or to avoid feeling bad, you’re in potentially dangerous territory. Alcoholism and alcohol abuse can sneak up on you, so it’s important to be aware of the warning signs and take steps to cut back if you recognize them. Understanding the problem is the first step to overcoming it.
Understanding alcoholism and alcohol abuse
Alcoholism and alcohol abuse are due to many interconnected factors, including genetics, how you were raised, your social environment, and your emotional health. Some racial groups, such as American Indians and Native Alaskans, are more at risk than others of developing alcohol addiction. People who have a family history of alcoholism or who associate closely with heavy drinkers are more likely to develop drinking problems. Finally, those who suffer from a mental health problem such as anxiety, depression, or bipolar disorder are also particularly at risk, because alcohol may be used to self-medicate.
Do you have a drinking problem?
You may have a drinking problem if you…
• Feel guilty or ashamed about your drinking.
• Lie to others or hide your drinking habits.
• Have friends or family members who are worried about your drinking.
• Need to drink in order to relax or feel better.
• “Black out” or forget what you did while you were drinking.
• Regularly drink more than you intended to.
Since drinking is so common in many cultures and the effects vary so widely from person to person, it’s not always easy to figure out where the line is between social drinking and problem drinking. The bottom line is how alcohol affects you. If your drinking is causing problems in your life, you have a drinking problem.
Signs and symptoms of alcohol abuse
Substance abuse experts make a distinction between alcohol abuse and alcoholism (also called alcohol dependence). Unlike alcoholics, alcohol abusers have some ability to set limits on their drinking. However, their alcohol use is still self-destructive and dangerous to themselves or others.
Common signs and symptoms of alcohol abuse include:
• Repeatedly neglecting your responsibilities at home, work, or school because of your drinking. For example, performing poorly at work, flunking classes, neglecting your kids, or skipping out on commitments because you’re hung over.
• Using alcohol in situations where it’s physically dangerous, such as drinking and driving, operating machinery while intoxicated, or mixing alcohol with prescription medication against doctor’s orders.
• Experiencing repeated legal problems on account of your drinking. For example, getting arrested for driving under the influence or for drunk and disorderly conduct.
• Continuing to drink even though your alcohol use is causing problems in your relationships. Getting drunk with your buddies, for example, even though you know your wife will be very upset, or fighting with your family because they dislike how you act when you drink.
• Drinking as a way to relax or de-stress. Many drinking problems start when people use alcohol to self-soothe and relieve stress. Getting drunk after every stressful day, for example, or reaching for a bottle every time you have an argument with your spouse or boss.
The path from alcohol abuse to alcoholism
Not all alcohol abusers become full-blown alcoholics, but it is a big risk factor. Sometimes alcoholism develops suddenly in response to a stressful change, such as a breakup, retirement, or another loss. Other times, it gradually creeps up on you as your tolerance to alcohol increases. If you’re a binge drinker or you drink every day, the risks of developing alcoholism are greater.
Signs and symptoms of alcoholism (alcohol dependence)
Alcoholism is the most severe form of problem drinking. Alcoholism involves all the symptoms of alcohol abuse, but it also involves another element: physical dependence on alcohol. If you rely on alcohol to function or feel physically compelled to drink, you’re an alcoholic.
Tolerance: The 1st major warning sign of alcoholism
Do you have to drink a lot more than you used to in order to get buzzed or to feel relaxed? Can you drink more than other people without getting drunk? These are signs of tolerance, which can be an early warning sign of alcoholism. Tolerance means that, over time, you need more and more alcohol to feel the same effects.
Withdrawal: The 2nd major warning sign of alcoholism
Do you need a drink to steady the shakes in the morning? Drinking to relieve or avoid withdrawal symptoms is a sign of alcoholism and a huge red flag. When you drink heavily, your body gets used to the alcohol and experiences withdrawal symptoms if it’s taken away. These include:
• Anxiety or jumpiness
• Shakiness or trembling
• Sweating
• Nausea and vomiting
• Insomnia • Depression
• Irritability
• Fatigue
• Loss of appetite
• Headache
In severe cases, withdrawal from alcohol can also involve hallucinations, confusion, seizures, fever, and agitation. These symptoms can be dangerous, so talk to your doctor if you are a heavy drinker and want to quit.
Other signs and symptoms of alcoholism (alcohol dependence)
• You’ve lost control over your drinking. You often drink more alcohol than you wanted to, for longer than you intended, or despite telling yourself you wouldn’t.
• You want to quit drinking, but you can’t. You have a persistent desire to cut down or stop your alcohol use, but your efforts to quit have been unsuccessful.
• You have given up other activities because of alcohol. You’re spending less time on activities that used to be important to you (hanging out with family and friends, going to the gym, pursuing your hobbies) because of your alcohol use.
• Alcohol takes up a great deal of your energy and focus. You spend a lot of time drinking, thinking about it, or recovering from its effects. You have few if any interests or social involvements that don’t revolve around drinking.
• You drink even though you know it’s causing problems. For example, you recognize that your alcohol use is damaging your marriage, making your depression worse, or causing health problems, but you continue to drink anyway.
Drinking problems and denial
Denial is one of the biggest obstacles to getting help for alcohol abuse and alcoholism. The desire to drink is so strong that the mind finds many ways to rationalize drinking, even when the consequences are obvious. By keeping you from looking honestly at your behavior and its negative effects, denial also exacerbates alcohol-related problems with work, finances, and relationships.
If you have a drinking problem, you may deny it by:
• Drastically underestimating how much you drink
• Downplaying the negative consequences of your drinking
• Complaining that family and friends are exaggerating the problem
• Blaming your drinking or drinking-related problems on others
For example, you may blame an ‘unfair boss’ for trouble at work or a ‘nagging wife’ for your marital issues, rather than look at how your drinking is contributing to the problem. While work, relationship, and financial stresses happen to everyone, an overall pattern of deterioration and blaming others may be a sign of trouble.
If you find yourself rationalizing your drinking habits, lying about them, or refusing to discuss the subject, take a moment to consider why you’re so defensive. If you truly believe you don’t have a problem, there should be no reason for you to cover up your drinking or make excuses.
Five myths about alcoholism and alcohol abuse
Myth #1: I can stop drinking anytime I want to.
Maybe you can; more likely, you can’t. Either way, it’s just an excuse to keep drinking. The truth is, you don’t want to stop. Telling yourself you can quit makes you feel in control, despite all evidence to the contrary and no matter the damage it’s doing.
Myth #2: My drinking is my problem. I’m the one it hurts, so no one has the right to tell me to stop.
It’s true that the decision to quit drinking is up to you. But you are deceiving yourself if you think that your drinking hurts no one else but you. Alcoholism affects everyone around you—especially the people closest to you. Your problem is their problem.
Myth #3: I don’t drink every day, so I can’t be an alcoholic OR I only drink wine or beer, so I can’t be an alcoholic.
Alcoholism is NOT defined by what you drink, when you drink it, or even how much you drink. It’s the EFFECTS of your drinking that define a problem. If your drinking is causing problems in your home or work life, you have a drinking problem—whether you drink daily or only on the weekends, down shots of tequila or stick to wine, drink three bottles of beers a day or three bottles of whiskey.
Myth #4: I’m not an alcoholic because I have a job and I’m doing okay.
You don’t have to be homeless and drinking out of a brown paper bag to be an alcoholic. Many alcoholics are able to hold down jobs, get through school, and provide for their families. Some are even able to excel. But just because you’re a high-functioning alcoholic doesn’t mean you’re not putting yourself or others in danger. Over time, the effects will catch up with you.
Myth #5: Drinking is not a “real” addiction like drug abuse.
Alcohol is a drug, and alcoholism is every bit as damaging as drug addiction. Alcohol addiction causes changes in the body and brain, and long-term alcohol abuse can have devastating effects on your health, your career, and your relationships. Alcoholics go through physical withdrawal when they stop drinking, just like drug users do when they quit.
Effects of alcoholism and alcohol abuse
Alcoholism and alcohol abuse can affect all aspects of your life. Long-term alcohol use can cause serious health complications, affecting virtually every organ in your body, including your brain. Problem drinking can also damage your emotional stability, finances, career, and your ability to build and sustain satisfying relationships. Alcoholism and alcohol abuse can also have an impact on your family, friends and the people you work with.
The effects of alcoholism and alcohol abuse on the people you love
Despite the potentially lethal damage that heavy drinking does to the body—including cancer, heart problems, and liver disease—the social consequences can be just as devastating. Alcoholics and alcohol abusers are much more likely to get divorced, have problems with domestic violence, struggle with unemployment, and live in poverty.
But even if you’re able to succeed at work or hold your marriage together, you can’t escape the effects that alcoholism and alcohol abuse has on your personal relationships. Drinking problems put an enormous strain on the people closest to you.
Often, family members and close friends feel obligated to cover for the person with the drinking problem. So they take on the burden of cleaning up your messes, lying for you, or working more to make ends meet. Pretending that nothing is wrong and hiding away all of their fears and resentments can take an enormous toll. Children are especially sensitive and can suffer long-lasting emotional trauma when a parent or caretaker is an alcoholic or heavy drinker.
Getting help for alcoholism or alcohol abuse
If you’re ready to admit you have a drinking problem, you’ve already taken the first step. It takes tremendous strength and courage to face alcohol abuse and alcoholism head on. Reaching out for support is the second step.
Whether you choose to go to rehab, rely on self-help programs, get therapy, or take a self-directed treatment approach, support is essential. Recovering from alcohol addiction is much easier when you have people you can lean on for encouragement, comfort, and guidance. Without support, it’s easy to fall back into old patterns when things get tough.
Your continued recovery depends on continuing mental health treatment, learning healthier coping strategies, and making better decisions when dealing with life’s challenges. In order to stay alcohol-free for the long term, you’ll also have to face the underlying problems that led to your alcoholism or alcohol abuse in the first place.
Those problems could be depression, an inability to manage stress, an unresolved trauma from your childhood, or any number of mental health issues. Such problems may become more prominent when you’re no longer using alcohol to cover them up. But you will be in a healthier position to finally address them and seek the help you need.
]]>About Heroin Abusehttp://beachcitydrugrehab.com/2016/07/15/about-heroin-abuse/
Fri, 15 Jul 2016 18:41:45 +0000http://beachcitydrugrehab.com/?p=247What Is Heroin?
Heroin is a substance that is both illegal and extremely addictive. The substance derives from opium from thepoppy plant before it is refined to morphine, then further chemically modified to become heroin. Despite its deserved negative reputation for its high risks, heroin continues to be a commonly abused drug in the US.
Heroin is sold and used in a number of forms including white or brown powder, a black sticky substance (tar heroin), and solid black chunks. These different forms of heroin can be smoked, snorted, or injected under the skin, into muscle, or directly into the veins.
Regardless of the technique of use, the drug delivers its potent effects quickly. As the strength of any street drug is hard to gauge from batch to batch, the potential to overdose on heroin is always a distinct possibility.
Why Do People Use Heroin?
Heroin use is increasing across new demographics. Learn more about this disturbing trend.
Heroin is abused for the immediate pleasurable feelings it can elicit, including:
• A surge of enjoyable feelings called the “rush.”
• A warm, calm feeling.
• A heavy, slowed feeling in the arms and legs.
• An increased sense of well-being and confidence.
________________________________________
Signs and Symptoms
Signs and symptoms of heroin abuse will depend on how much, how often, and how long it has been abused.
Immediate Symptoms
Some users report immediate negative symptoms from the drug like:
• Nausea.
• Vomiting.
• Itching.
• Dry mouth.
Delayed Symptoms
Following the immediate effects of heroin, another set of symptoms begin to occur that involve the body slowing down and being less active and alert. These signs of heroin use include:
• Feeling drowsy and sleepy for several hours.
• Having a foggy mental state.
• Slowed breathing.
• Slowed heart rate.
• “Nodding,” where the user will alternate between periods of being awake and asleep.
Signs of Long-Term Use
With continued use over a period of time, the person abusing heroin may exhibit other signs like:
• Needle marks and bruising on the injection sites.
• Skin problems like abscesses and infections.
• Heart problems.
• Disease in organs including the liver and kidneys.
• Collapsed veins from repeated injections.
If you or someone you love has been displaying any of the above signs and symptoms of heroin abuse, there is something you can do.
Call (562) 393-0850
to receive more information and potential treatment options.
________________________________________
Video: A Deadly Dance
The following short documentary from the New York Times illustrates the heroin addiction epidemic in the US.
Credit: The New York Times
________________________________________
Effects of Heroin Abuse
Addiction, tolerance, and dependence are three likely outcomes once someone begins using heroin.
• Addiction is marked by increased effort and energy assigned to getting and using the drug even when problems from use have resulted.
• Tolerance is indicated by the need for more of the substance, higher purity, or different methods of delivery to feel the same results.
• Dependence is when your body requires heroin to feel normal and withdrawal symptoms present without the substance in your body.
These effects transpire because when the drug is used, the active opiate molecules interact with opioid receptors. These receptors, which are located throughout the brain and body, play a role in modifying pain perception, rewarding behaviors, and maintaining body functions like blood pressure and breathing.
Abuse of heroin can lead to unwanted social effects like troubled relationships, being fired from work, financial worries, and legal issues. Also, heroin use is linked to many long-term health consequences like:
• Increased risk of infectious diseases including HIV/AIDS and hepatitis.
• Persistent mental health issues such as depression and personality changes.
• Reproductive issues like sexual dysfunction and inconsistent menstrual cycles.
• Damage to the septum and nose tissues from snorting.
Women that use the drug while pregnant place themselves and their child at risk for miscarriages, low birth weight, and neonatal abstinence syndrome (NAS), which involves the child being born dependent on the substance and enduring withdrawal effects.
Opiate Overdose
Perhaps the most serious effect of heroin is the risk of overdose. Because of variability in purity of the substance as well as lack of information regarding what is mixed into the drug, dosing is difficult to measure. Effects of overdose include:
• Dangerously slowed breathing rate.
• Depressed heart rate.
• Loss of consciousness.
• Permanent brain damage.
• Coma.
• Death.
A medication called naloxone – brand name Narcan – is approved to reverse the effects of an overdose.
Who’s Using Heroin?
Heroin is a drug that attracts many new users annually. Consider the following statistics regarding the drug according to the National Institute on Drug Abuse:
• From 2002 to 2012, the past year use of heroin increased by more than 50%.
• In 2012, almost 670,000 reported to use heroin within the last year.
• The number of people that met criteria for a diagnosis of heroin abuse or heroin dependence doubled from 2002 to 2012.
________________________________________
Heroin Abuse Treatment
With addiction and dependence to heroin in place, professional treatment is frequently necessary to overcome the influence of the drug–several effective options are available. The first challenge in heroin recovery is enduring withdrawal symptoms that begin when the substance is no longer in the user’s body.
Heroin withdrawal symptoms include:
You don’t have to fight a battle against heroin alone. Learn about treatment programs now.
• Agitation and edginess.
• Widespread pain in the bones and muscles.
• Trouble sleeping.
• Nausea, diarrhea, and vomiting.
• Feeling cold.
• Involuntary kicking movements.
• Strong cravings for more of the substance.
Heroin withdrawal is not usually deadly, but it can be dangerous and extremely uncomfortable, often prompting those who want to quit to return to use to avoid the symptoms. With this being the case, supervised detoxification may be needed to safely navigate the early stage of recovery. During detox, a medical treatment team will monitor your symptoms while providing medications that will add to your comfort.
Many people transition from detox treatment to a rehabilitation program for continued treatment. Rehabs are residential programs that vary length based on the needs of the individual in recovery. This allows for outside distractions to be eliminated and recovery to be the primary focus.
From there, outpatient mental health, drug and alcohol counseling, and community supports can be utilized to maintain abstinence from the substance as you reintegrate into your environment.
No matter the setting, some aspects of heroin addiction treatment are consistent including:
• Behavioral therapy – Done in outpatient, inpatient, and residential settings, behavioral therapy will work to make you aware of your patterns to find ways to modify them towards healthier alternatives.
• Medication management – Methadone, buprenorphine, naltrexone, and other drugs are used during different stages to aid in heroin recovery. Some work by activating the same opioid receptors as heroin does, and others block the receptors so heroin’s effects are not felt.
If you are in need of treatment for heroin abuse, call 714-725-1101
to gain more information regarding your substance and treatment options.
________________________________________
Am I Addicted?
If you’re worried about your use of heroin, you likely have a problem. However, you can use our heroin addiction assessment to help determine your level of addiction and need for treatment. |
On Evolution and Opiates
Jerry Coyne explains why evolution is true. After all the scientific evidence it gets juicy. Coyne theorizes on why evolution gets so much cultural resistance (spoiler alert: religion) and shows some stunning data on the correlation between religion and unhealthy societies. A long video in internet terms, but worth watching. |
A randomised controlled trial of intravenous dexamethasone combined with interscalene brachial plexus blockade for shoulder surgery.
We recruited patients scheduled for shoulder rotator cuff repair or subacromial decompression under general anaesthesia and interscalene brachial plexus blockade (30 ml ropivacaine 0.5%). We allocated 240 participants into four groups of 60 that were given pre-operative saline 0.9% or dexamethasone 1.25 mg, 2.5 mg or 10 mg, intravenously. We recorded outcomes for 48 h. The median (IQR [range]) time to first postoperative analgesic request after saline was 12.2 (11.0-14.1 [1.8-48]) h, which was extended by intravenous dexamethasone 2.5 mg and 10 mg to 17.4 (14.9-21.5 [7.2-48]) h, p < 0.0001, and 20.1 (17.2-24.3 [1.3-48]) h, p < 0.0001, respectively, but not by dexamethasone 1.25 mg, 14.0 (12.1-17.7 [2.1-48]) h, p = 0.05. Postoperative analgesia was given sooner after rotator cuff repair than subacromial decompression, hazard ratio (95% CI) 2.2 (1.6-3.0), p < 0.0001, but later in older participants, hazard ratio (95% CI) 0.98 (0.97-0.99) per year, p < 0.0001. |
---
category:
- Puzzles
- Games
note: Games
|
Q:
Trigger click on element dynamically created by AngularJS
I'm using AngularJS to create a new tag in order to download a csv file. Below the code I use to trigger the download. The download starts on Chrome but not in Firefox. Do you have any clue why this happens?
var element = angular.element('<a/>');
element.attr({
href: exportedString,
target: '_self',
download: 'test.csv'
})[0].click();
EDIT: Firefox needs an existent DOM
JS:
var linkElem = $("#link");
var element = angular.element(linkElem);
HTML:
<a ng-hide=true id="link"></a>
EDIT 2: On Chrome, the downloaded file name is "download" and not the passed value ("test.csv" in this case). Any suggestions?
Here there is also a plunker
A:
This is a bug in Chrome 35 reported in issue #377860.
Follow this answer for more details
I updated your plunker solution.
Basically you need to use it like follow:
var element = document.createElement('a');
var blob = new Blob([$scope.exportContent], {
type: 'text/csv'
});
var url = URL.createObjectURL(blob);
element.href = url;
element.setAttribute('download', 'test.csv');
document.body.appendChild(element); //Append the element to work in firefox
element.click();
|
Q:
Как реализовать обработку http запросов get/post/put/delete с использованием com.sun.net.httpserver.HttpServer?
Есть простой Http Server
private com.sun.net.httpserver.HttpServer server = null;
public void startHttpServer(int port) {
try {
server = com.sun.net.httpserver.HttpServer.create(new InetSocketAddress(port), 0);
} catch (IOException e) {
e.getStackTrace();
}
System.out.println("HTTP server started at " + port);
server.createContext("/", new RootHandler());
server.createContext("/api/0.1/device_configuration", new PostDeviceConfiguration());
server.createContext("/api/0.1/order", new PutCancellationOrder());
server.createContext("/api/0.1/order", new PostOrder());
server.setExecutor(Executors.newCachedThreadPool());
server.start();
}
Может ли такой сервер различать различать http методы get/post/rest/delete ? Если да, то как это сделать? Необходимо реализовать post и put с одинаковым URL.
A:
Можно определить какой используется метод через HttpExchange.getRequestMethod()
import com.sun.net.httpserver.HttpServer;
import java.io.OutputStream;
import java.net.InetSocketAddress;
public class TestHttpServer {
public static void main(String[] args) throws Exception {
HttpServer server = HttpServer.create(new InetSocketAddress(8080), 0);
server.createContext("/", http -> {
String response = createResponse(http.getRequestMethod().toUpperCase());
http.getResponseHeaders().add("Content-Type", "text/html");
http.sendResponseHeaders(200, response.length());
OutputStream os = http.getResponseBody();
os.write(response.getBytes());
os.close();
});
server.setExecutor(null);
server.start();
System.out.println("http://localhost:8080/");
}
private static String createResponse(String requestMethod) {
String resp = "<svg viewbox='-10 -10 20 20' height='100vh'><text text-" +
"anchor='middle' stroke='red' stroke-width='0.05' font-size='4'>%s</text></svg>";
if ("GET".equals(requestMethod))
return String.format(resp, "GET");
if ("POST".equals(requestMethod))
return String.format(resp, "POST");
return "unknown method";
}
}
|
<?xml version="1.0" encoding="UTF-8"?>
<project version="4">
<component name="EclipseCodeFormatter">
<option name="defaultSettings" value="true" />
<option name="formatter" value="ECLIPSE" />
<option name="id" value="1439811978020" />
<option name="name" value="default" />
<option name="pathToConfigFileJava" value="E:/eclipse开发相关/代码format/iptvclient_android_codeFormatter.xml" />
<option name="selectedJavaProfile" value="iptvclient.android" />
<option name="useOldEclipseJavaFormatter" value="true" />
</component>
<component name="EntryPointsManager">
<entry_points version="2.0" />
</component>
<component name="NullableNotNullManager">
<option name="myDefaultNullable" value="android.support.annotation.Nullable" />
<option name="myDefaultNotNull" value="android.support.annotation.NonNull" />
<option name="myNullables">
<value>
<list size="4">
<item index="0" class="java.lang.String" itemvalue="org.jetbrains.annotations.Nullable" />
<item index="1" class="java.lang.String" itemvalue="javax.annotation.Nullable" />
<item index="2" class="java.lang.String" itemvalue="edu.umd.cs.findbugs.annotations.Nullable" />
<item index="3" class="java.lang.String" itemvalue="android.support.annotation.Nullable" />
</list>
</value>
</option>
<option name="myNotNulls">
<value>
<list size="4">
<item index="0" class="java.lang.String" itemvalue="org.jetbrains.annotations.NotNull" />
<item index="1" class="java.lang.String" itemvalue="javax.annotation.Nonnull" />
<item index="2" class="java.lang.String" itemvalue="edu.umd.cs.findbugs.annotations.NonNull" />
<item index="3" class="java.lang.String" itemvalue="android.support.annotation.NonNull" />
</list>
</value>
</option>
</component>
<component name="ProjectLevelVcsManager" settingsEditedManually="false">
<OptionsSetting value="true" id="Add" />
<OptionsSetting value="true" id="Remove" />
<OptionsSetting value="true" id="Checkout" />
<OptionsSetting value="true" id="Update" />
<OptionsSetting value="true" id="Status" />
<OptionsSetting value="true" id="Edit" />
<ConfirmationsSetting value="0" id="Add" />
<ConfirmationsSetting value="0" id="Remove" />
</component>
<component name="ProjectRootManager" version="2" languageLevel="JDK_1_7" default="true" assert-keyword="true" jdk-15="true" project-jdk-name="1.7" project-jdk-type="JavaSDK">
<output url="file://$PROJECT_DIR$/build/classes" />
</component>
<component name="ProjectType">
<option name="id" value="Android" />
</component>
<component name="masterDetails">
<states>
<state key="ScopeChooserConfigurable.UI">
<settings>
<splitter-proportions>
<option name="proportions">
<list>
<option value="0.2" />
</list>
</option>
</splitter-proportions>
</settings>
</state>
</states>
</component>
</project> |
492 P.2d 271 (1971)
SALEM SAND & GRAVEL COMPANY, a Corporation, and C.J. Montag & Sons, Inc., a Corporation, Dba M & S Construction Co., Appellants,
v.
CITY OF SALEM, Oregon, a Municipal Corporation, Defendant, and
Cornell, Howland, Hayes & Merryfield, Inc., a Corporation, and James C. Howland, Thomas B. Hayes, Fred Merryfield, Holly A. Cornell, Archie H. Rice, Earl C. Reynolds, Jr., Ralph E. Roderick, Robert R. Adams, and Sidney E. Lasswell, Respondents.
Supreme Court of Oregon.
Argued and Submitted October 12, 1971.
Decided December 30, 1971.
*272 Cleveland C. Cory, Portland, argued the cause for appellants. With him on the briefs were Richard A. Franzke and Davies, Biggs, Strayer, Stoel & Boley, Portland.
John Gordon Gearin, Portland, argued the cause for respondents. With him on the brief were Gearin, Hollister & Landis, Portland, and John B. Fenner, Corvallis.
Before O'CONNELL, C.J., and DENECKE, TONGUE, HOWELL and BRYSON, JJ.
*273 HOWELL, Justice.
Plaintiffs, joint venturers, were successful bidders for the construction of a sewer line for the City of Salem. The defendants are engineers hired by the city to prepare the plans and specifications for the sewer project and to supervise and direct the construction of the project. Plaintiffs filed this action charging fraud and misrepresentation against the City of Salem and the engineers in withholding the results of certain subsurface tests made by the engineers prior to the preparation of the plans and specifications and the calling of bids.
After issue was joined on plaintiffs' third amended complaint, the trial court allowed the defendants' motion for a judgment on the pleadings on the ground that the complaint affirmatively showed that plaintiffs' cause of action was barred by the two-year statute of limitations, ORS 12.110(1).[1] (The City of Salem was eliminated on the ground of immunity from tort liability.) Plaintiffs appeal only from the judgment dismissing the action against the defendant engineers.
Plaintiffs alleged in their third amended complaint that the City of Salem had engaged defendant engineers to draw the plans and specifications for the sewer project and to supervise the construction. The engineers dug several test trenches and test holes to determine the water and ground conditions that bidders would encounter, and prepared records and photographs of the subsurface conditions. The plaintiffs also alleged that the engineers failed to include all of this data to the bidders on the sewer project and had they done so, the data would have disclosed subsurface conditions "substantially less favorable" for the project than those actually included in the plans and specifications. By including only the favorable data regarding the trenches and test holes, the defendant engineers represented that the subsurface conditions were more favorable than "they were in fact." The said representations were made with intent that plaintiffs rely on them, which the plaintiffs did in submitting their bid for this project. Plaintiffs' bid submitted by March 6, 1963, was accepted. After plaintiffs received the bid and "during the performance" of the project, plaintiffs encountered job conditions substantially less favorable because of excessive water conditions, unstable earth base, and unstable trench walls, which they could not have anticipated based on the engineers' plans and specifications. As a result, plaintiffs were required to incur job expenses in excess of those which could have been reasonably expected. Plaintiffs completed the project in November, 1964.
In plaintiffs' original complaint, filed January 26, 1967, they alleged in paragraph XI that on August 18, 1965, the defendant engineers allowed plaintiffs to examine their files on the sewer job "at which time [plaintiffs] first learned that [defendant engineers] [were] in possession of all the concealed and suppressed documents and data heretofore alleged."
These allegations were stricken by the court. Plaintiffs filed an amended complaint without the stricken allegations. A demurrer on the grounds that the action was not commenced within the statute of limitations was sustained with leave to plaintiffs to amend. Plaintiffs filed a second amended complaint containing the following allegation in paragraph XI:
"[Plaintiffs] relied upon the representations of [defendant engineers] and Salem in the preparation of its bid and in the performance of its contract with *274 Salem. That the full extent of the losses of [plaintiffs] under said contract were not ascertainable by, or known to [plaintiffs] until performance of the aforesaid contract was completed. In December 1964, [plaintiffs] made written inquiry of [defendant engineers] about certain items in the plans and specifications prepared by [defendant engineers].
"In January of 1965 [plaintiffs] presented a written claim to Salem. In March 1965, Salem, acting through its attorney rejected the claim of [plaintiffs]. Thereafter [plaintiffs] acting through one of its attorneys undertook to arrange a conference between representatives of [plaintiffs], [defendant engineers] and Salem to discuss the aforesaid plans and specifications. Said conference was held on August 18, 1965. At that time [defendant engineers] allowed a representative of [plaintiffs] to examine its files with respect to said sewer line job, at which time [plaintiffs] first learned [defendant engineers] had failed to include the test trench and test hole photographs, test trench and test hole logs and well data, in its plans and specifications. That [plaintiffs] had no knowledge that [defendant engineers] had failed to include said data and information in the plans and specifications until August 18, 1965, for the reason that said information was in the exclusive possession and control of Salem and its agent [defendant engineers] until said time."
The trial court again allowed a motion to strike the above paragraph with leave to plaintiffs to amend. Plaintiffs then filed the third amended complaint containing a new paragraph XI which states:
"Although [plaintiffs] exercised reasonable diligence, [plaintiffs] did not discover and had no knowledge that [defendant engineers] had failed to include all of the said test hole photographs, detailed test trench and test hole logs (with engineer's comments) and well data as herein alleged, until August 18, 1965, for the reason that said data and information was in the exclusive possession and control of Salem and its agent, [defendant engineers], until said time."
Defendants again moved to strike the above paragraph, but the court denied the motion and in a memorandum opinion stated:
"The material pleaded in paragraph XI is now pleaded to cure the defect in the Complaint which made it demurrable on its face. It now for the first time is pleaded to show date of discovery and exercise of reasonable diligence." (Emphasis supplied.)
Defendants then filed a demurrer to the third amended complaint alleging, as one of the grounds of the demurrer, that the action was barred by the statute of limitations. The court overruled the demurrer. The defendants filed an answer denying paragraph XI above and further denying "any concealment, suppression, false * * * representations on their part in any particular as alleged or at all * * *." The answer also alleged the statute of limitations as an affirmative defense. Plaintiffs' reply denied the affirmative allegations of defendants' answer.
Thereafter, on motion of the defendants, the court allowed a judgment on the pleadings against plaintiffs on the ground that the plaintiffs' pleading did not negative their failure to bring the action within two years after discovery of the fraud or deceit.
At the outset in considering the validity of a motion for judgment on the pleadings, the defendants are confronted with the well-established rule that such a motion is not favored by the courts. Scott & Payne v. Potomac Ins. Co., 217 Or. 323, 341 P.2d 1083 (1959). Issues of fact cannot be tried on a motion for judgment on the pleadings. Scott & Payne v. Potomac Ins. Co., supra; Smith v. Aplanalp et al., 126 Or. 213, 267 P. 1070 (1938). The motion is only allowable when the pleadings taken together affirmatively show that *275 plaintiff has no cause of action against the defendant or when the defendant affirmatively alleges a complete defense which is admitted by the reply. Morford v. Calif.West. States Life Ins. Co., 161 Or. 113, 68 P.2d 303 (1939).
Under ORS 12.110(1), an action at law for fraud and deceit must be commenced within two years from the "discovery of the fraud or deceit." "Discovery" means from the time the fraud was known or could have been discovered through exercise of reasonable care. Linebaugh v. Portland Mortgage Co., 116 Or. 1, 8, 239 P. 196 (1925).
When the pleadings disclose that the action was not commenced within two years after the alleged fraud was consummated, it is necessary for plaintiff to negative lack of diligence in the discovery of the fraud and to set forth the reasons why there was not an earlier discovery of the fraud. Dixon et ux. v. Schoonover et ux., 226 Or. 443, 359 P.2d 115, 360 P.2d 274 (1961); Heard v. Coffey et al., 218 Or. 275, 344 P.2d 751 (1959); Huycke et ux. v. Latourette et al., 215 Or. 173, 332 P.2d 606 (1958). Ordinarily the question of whether reasonable diligence was exercised is a question of fact for the jury. Dilley v. Farmers Ins. Group, 250 Or. 207, 441 P.2d 594 (1968); Heise v. Pilot Rock Lbr. Co., 222 Or. 78, 352 P.2d 1072 (1960).
The defendants argue that any misrepresentation on their part was discovered, or should have been discovered, by plaintiffs when they encountered job site conditions different from those plaintiffs could have expected based on the plans and specifications submitted by defendants.
Plaintiffs' contract was entered into shortly after March 6, 1963. Work was completed in November, 1964. Plaintiffs alleged the fraudulent withholding was not discovered until August 18, 1965. Plaintiffs' first complaint was filed January 26, 1967. In the third amended complaint, they alleged that although they exercised reasonable diligence, they did not discover that defendants failed to include all the pertinent data until August 18, 1965, because such data was in the exclusive possession of defendant engineers. When the defendants denied these allegations and further denied any concealment or suppression of any data, a question of fact was presented. We cannot say that the pleadings taken together affirmatively showed that plaintiffs' cause of action was barred by the statute of limitations.
Defendants make the additional argument that plaintiffs' third amended complaint is not based on the theory of fraud and deceit because plaintiffs have not alleged that defendants knew the representations were false or made such representations recklessly without knowledge of their truth or falsity. Defendants overlook the established law that fraud may be committed by concealment of material facts as well as by affirmative and positive misrepresentation. In re Brown, 255 Or. 628, 469 P.2d 763, 765 (1970); Heise v. Pilot Rock Lbr. Co., supra; Musgrave et ux. v. Lucas et ux., 193 Or. 401, 238 P.2d 780 (1951).
While plaintiffs' third amended complaint may not have been a model of pleading, the trial court found prior to the motion for judgment on the pleadings that it alleged sufficient facts to withstand defendants' motion to strike and defendants' demurrer. As the pleadings raised issues of fact, they were not vulnerable to a motion for judgment on the pleadings.
Reversed with directions to set aside the judgment on the pleadings and for further proceedings not inconsistent herewith.
NOTES
[1] ORS 12.110(1) states:
"Within two years; determination of period in action for fraud or deceit; injuries to person from professional malpractice. (1) An action for assault, battery, false imprisonment, for criminal conversation, or for any injury to the person or rights of another, not arising on contract, and not especially enumerated in this chapter, shall be commenced within two years; provided, that in an action at law based upon fraud or deceit, the limitation shall be deemed to commence only from the discovery of the fraud or deceit." (Emphasis added.)
|
What Our Customers Say!
4.9 / 5
We are working with eKomi, the independent feedback company, to ensure that we offer our customers the best service possible.
Each and every one of our reviews has been given by confirmed customers so you can be sure they are as accurate as possible and a true reflection of the 'INKredible Experience'!
Date:
28/06/2016 16:29
5 out of 5
very good as ever. always tell friends about inkredible.\nthanks
Date:
01/07/2016 12:41
5 out of 5
Great service and prices. Would recommend.
Date:
30/06/2016 14:25
5 out of 5
Never had a bad cartridge from this company and delivery is usually next day. Unfortunately they don't do Lexmark colour laser refills so had to dump the printer as originals cost more than a new printer
Date:
06/07/2016 09:56
5 out of 5
I've found Inkredible.co.uk to be a very prompt and trustworthy supplier of replacement cartridges for Canon inkjet printers. Their cartridges are reliable and economically priced.
Date:
17/06/2016 19:33
4 out of 5
Satisfied with order procedure and speedy delivery. Can't comment on ink yet as not used them. Read excellent reviews before buying which convinced me to procedure with purchase.
Date:
30/06/2016 13:42
5 out of 5
The compatible cartridges work exactly as the originals and provide problem free high quality prints at a fraction of the cost of originals.
Date:
01/07/2016 13:37
5 out of 5
Iam pleased with the epson ink and delivery on time next day as stated
Date:
01/07/2016 11:34
5 out of 5
I would recommend this product to anyone like me who does not wish to renew a printer that is good enough for general use.
Date:
10/06/2016 16:04
5 out of 5
quick delivery easy to order
Date:
09/06/2016 20:49
5 out of 5
As excellent as ever!
Date:
19/06/2016 22:04
5 out of 5
Speedy service and good prices
Date:
17/06/2016 21:07
5 out of 5
As good as manufacturer's
Date:
10/06/2016 18:13
5 out of 5
Not used the contents as yet but the delivery was first class.
Date:
30/06/2016 19:06
5 out of 5
Because I use the inks for general printing I think the quality is outstanding and would recommend to friends & family
Date:
02/07/2016 10:28
5 out of 5
No improvement required. First class service, competitive prices and great customer support. |
---
abstract: 'KEK-ATF is studying the low-emittance multi-bunch electron beam for the future linear collider. In ATF, thermionic gun is used to generate 20 bunches electron beam with the bunch spacing of 2.8 ns. Due to a distortion of the gun emission and the beam loading effect in the bunching system, the intensity for each bunch is not uniform by up to 40 % at the end of the injector. We have developed a system to correct the gun emission by precisely controlling the cathode voltage with a function generator. For the beam loading effect, we have introduced RF amplitude modulation on Sub Harmonic Buncher, SHB. By these technique, bunch intensity uniformity was improved and beam transmission for later bunches was recovered from 67% to 91%, but intensity for first five bunches is still lower than others.'
author:
- |
M. Kuriki, H. Hayano, T. Naito, KEK, Tsukuba, Ibaraki, Japan\
K. Hasegawa, Scientific university of Tokyo, Noda, Chiba, Japan
title: 'Multi-bunch generation by thermionic gun '
---
Introduction
============
KEK-ATF is a test facility to develop the low emittance multi-bunch beam and beam instrumentation technique for the future linear collider. That consists from 1.5 GeV S-band linac, a beam transport line, a damping ring, and a diagnostic extraction line.
In the linac, the electron beam is generated by a thermionic electron gun. Typical intensity is $\rm 1.0\times 10^{10}$ electron/bunch. The bunch length is compressed from 1 ns to 10 ps by passing a couple of sub-harmonic bunchers, a TW buncher, and the first S-band accelerating structure. This area is called as injector part. After the injector part, electron energy becomes 80 MeV.
The electron beam is then accelerated up to 1.3 GeV by 8 of the S-band regular accelerating section. One section has two accelerating structures driven by a klystron-modulator. Klystron is Toshiba E3712 generating 80 MW with a pulse duration of $\rm 4.5 \mu s$ RF. A peak power of 400 MW with a pulse duration of $\rm 1.0\mu s$ is obtained by SLED cavity and makes a high gradient accelerating field, 30 MeV/m.
20 of bunches separated by 2.8 ns are accelerated by one RF pulse. This multi-bunch method is one of the key technique in the linear collider.
In April 2000, we achieved horizontal emittance $\rm 1.3\times 10^{-9}
rad.m $, vertical emittance$1.7\times 10^{-11} rad.m $ (both for $2.0\times 10^9 electron/bunch$, single bunch mode )[@emittance] which are almost our target.
In November 2000, we have started the multi-bunch operation. The commissioning was successfully done. Due to lack of the instrumentation device for the multi-bunch diagnostic, emittance for each bunch is not measured yet.
Multi-bunch beam generation
===========================
The gun assembly consists from a thermionic gun, Grid pulser, and a high voltage gun pulser.
The thermionic gun, is a triode type, EIMAC Y796. The electron current is controlled by Grid bias.
To make a multi-bunch electron beam with a bunch spacing of 2.8 ns, 357 MHz RF signal is applied to the GUN cathode. 357MHz ECL level RF signal is amplified by a power amplifier. This output has a pulse height of 400 V peak-to-peak, but the amplitude is gradually changing at the rise and fall edge as shown in FIG. \[fig:gunrf\].
![ To omit the rise and fall edge of 357 MHz RF signal, a rectangular signal is combined. Grid bias is determined to clip uniform multi-bunch beam.\[fig:gunrf\]](gunrf.ps){width="3in"}
If the RF signal is directly applied to Gun cathode, bunch intensity becomes not flat. To get uniform bunches, an additional rectangular pulse is combined as shown in FIG \[fig:gunrf\]. The grid bias is determined that the rectangular pulse clips out the flat part of the RF signal. Finally, only the flat part of the RF pulse is obtained as real beam current.
Emission correction
===================
FIG. \[fig:raw\] shows the multi-bunch beam generated by thermionic gun. The vertical and horizontal axes show time in ns and the beam current in A respectively. The grid bias was set to 240 V. The left side is early bunch. The beam current is measured by a current transformer which is set right after the gun exit. The current transformer measures the beam current as the induction voltage, so the output decays with a time constant.
![Multi-bunch beam measured by a current transformer. Vertical axis shows the beam current in A. Grid bias was 240 V.\[fig:raw\]](ct.eps){height="2.5in"}
Intensity for the first three bunches is still increasing. This behavior is due to the rounded rising edge of the clipping rectangular pulse.
In addition, several bunches around 13th and 14th have lower intensity than others. A study for the gun emission [@linac99] demonstrated that the gun response to the rectangular pulse reproduced this dip, but the reason was not fully understood. This is not any problem on the electrical circuit such as reflection signal because any dip was not observed in direct measurement of the rectangular pulse applied to the cathode.
![Multi-bunch beam applying the correction signal. Grid bias was 240 V. \[fig:corr\]](ct-cor.eps){height="2.5in"}
To correct this dip, an additional signal source was introduced. The correction signal is produced by a function generator, Tektronix AWG 510 which can make an arbitrary waveform with 1 GHz clock speed. The signal is transfered to the gun high voltage station through an optical cable , amplified 20 W RF amplifier, and combined with the main signal through a resistive power combiner. Typical amplitude of the correction signal is 30 V which is roughly 10% of the main signal applied to the gun cathode.
FIG. \[fig:corr\] shows the gun output by applying the correction signal. The grid bias was set to 240 V. The first three bunches have still current lower than others, but the large dip on 12-15th bunches in FIG. \[fig:raw\] was well compensated.
SHB amplitude modulation
========================
Electron beam generated by the thermionic gun has approximately 1 ns bunch length which is larger than acceptance of S-band acceleration. A couple of 357 MHz standing wave Sub-harmonic bunchers, and a traveling wave S-band buncher are placed to gather electrons into the S-band acceptance, $\rm 10 - 20 ps$.
In multi-bunch operation, the bunching field is decreased by beam induced field, i.e. wake field. This is the beam loading effect. Beam loading effect is larger for later bunch, so the condition becomes worse for the later bunches.
![ In amplitude modulation method, amplitude of input RF is changed synchronously with the beam timing. Cavity RF amplitude is then gradually increased with the filling time as shown by the dashed line. On the other hand, RF amplitude is decreased by the beam loading effect as shown by the dotted line. Totally, cavity RF amplitude is kept flat.\[fig:am\]](am.eps){width="3in"}
To compensate the beam loading effect, we have introduced amplitude modulation on pulsed RF for SHBs. In amplitude modulation, the amplitude of pulsed RF is changed synchronously with the beam timing. FIG. \[fig:am\] shows the beam loading compensation by amplitude modulation schematically. Cavity RF amplitude is then gradually increased with filling time as shown by the dashed line. On the other hand, RF amplitude is decreased by the beam loading effect as shown by the dotted line. Totally, cavity RF amplitude is kept flat. The bunching quality becomes equal for all bunches.
The beam loading effect always decelerates the followed bunches. In ATF, the first SHB, SHB1 is operated in deceleration mode and the second, SHB2 is in acceleration mode. The beam loading effectively increases RF amplitude in SHB1 and decreases in SHB2 . Modulation sign is then negative for SHB1 and positive for SHB2.
![ Multi-bunch beam profile by wall current monitor. Horizontal axis shows time in ns. Vertical axis shows wall current monitor response in V. The dotted and solid curves were obtained without and with amplitude modulation on SHB RF. \[fig:wc\]](wc.eps){height="2.6in"}
Optimization for the amplitude modulation has been done by looking beam transmission at the end of injector part. A wall current monitor is placed at the exit of the injector part to observe the beam current. FIG. \[fig:wc\] shows the response of the wall current monitor to the multi-bunch beam. The dotted and solid curves indicate those obtained with the conventional pulsed RF and the amplitudely modulated pulsed RF on SHBs respectively. Transmission for the later bunches was recovered by the amplitude modulation.
The beam loading effect affects the transmission for the later bunches, then we should investigate the bunch transmission to examine the beam loading effect. Since the absolute transmission for each bunch is hard to measure exactly, the intensity ratio of the early bunch and later bunch can be used instead of the absolute transmission.
Intensity of the last bunch is much lower than others due to the less sharpness of the clipping rectangular pulse. Because of that, effect of the amplitude modulation should be examined by the last second bunch rather than the last bunch.
The transmission ratio of the second last bunch was 0.67 for the conventional SHB RF and 0.91 for the amplitudely modulated SHB RF respectively. The most intense bunch was used as the reference. Improvement of the transmission by the amplitude modulation was 24%.
FIG. \[fig:intensity\] shows distributions of bunch intensity for 6th and later bunches. The peak voltage of wall current monitor is here used instead of the real beam current. The solid and hatched histograms are those with the amplitude modulation and the conventional pulsed RF on SHB respectively. With the amplitude modulation, most bunches are distributed more than 18 V, but with the conventional RF, bunches are spread widely from 12 V to 20 V. The amplitude modulation improved the flatness of intensity for these later bunches.
FIG. \[fig:intensity\] does not include the first five bunches. The lower intensity of these bunches is due to the rounded rising edge of the clipping pulse. That will be one of the main issue on the multi-bunch operation.
![The horizontal axis shows bunch intensity measured by wall current monitor. The vertical axis is number of bunches per 1.0 V. The solid and hatched histograms show those with the amplitude modulation and the conventional RF on SHB respectively. \[fig:intensity\]](intensity.epsi){height="2.4in"}
summary
=======
In KEK-ATF, multi-bunch beam was successfully generated by a thermionic electron gun with bunch spacing of 2.8 ns. The beam already reached to the extraction line, but the emittance was not measured yet due to lack of the instrumentation for multi-bunch beam.
Intensity for each bunch is not uniform because of ; 1) gun emission un-uniformity; 2) beam loading effect.
For gun emission problem, we have applied a correction signal generated by an arbitrary function generator to Gun cathode. Bunch intensity flatness was significantly improved by this emission correction. However, Gun emission for first five bunches is still lower than others. That will be one of the main issue in future.
For beam loading effect, we have introduced amplitude modulation on SHB RF. The amplitude modulation compensated the beam loading effect and recovered the beam transmission from 67% to 91%.
[9]{}
http://lcdev.kek.jp/ATF/
M. Kuriki et al., ’Multi-bunch beam generation by Thermionic Electron Gun’,24th Linac meeting at Sapporo, 1999
|
Findings in revision myringoplasty.
Findings in 38 revision myringoplasty operations were studied. Fascial grafts were used in all operations. The majority of immediate failures after primary procedures were found to be consequences of technical faults, i.e. poor anterior adaptation of the graft. Most of the late re-perforations were caused by atrophy of the graft without infection. The success rate for revision myringoplasty did not differ significantly from that for primary operations. It was concluded that better surgical techniques and better graft materials should be developed. |
/*
* Trace2DSorted, a TreeSet- based implementation of a ITrace2D that performs
* insertion- sort of TracePoint2D - instances by their x- value.
* Copyright (c) 2004 - 2011 Achim Westermann, Achim.Westermann@gmx.de
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
* If you modify or optimize the code in a useful way please let me know.
* Achim.Westermann@gmx.de
*/
package info.monitorenter.gui.chart.traces;
import info.monitorenter.gui.chart.ITrace2D;
import info.monitorenter.gui.chart.ITracePoint2D;
import java.util.Iterator;
import java.util.SortedSet;
import java.util.TreeSet;
/**
* Has the behavior of <code>Trace2DReplacing</code> and additional features.
* <p>
* <ul>
* <li>All traceoints added whose x- values are not already contained are added
* to the internal Tree ordered by growing x-values. Therefore it is guaranteed
* that the tracepoints will be sorted in ascending order of x- values at any
* time.</li>
* </ul>
* <p>
*
* Because sorted insertion of a List causes n! index- operations (
* <code>get(int i)</code>) additional to the comparisons this class does not
* extend <code>Trace2DSimple</code> which uses a List. Instead a
* <code>TreeSet </code> is used.
* <p>
*
* @author <a href='mailto:Achim.Westermann@gmx.de'>Achim Westermann </a>
*
* @version $Revision: 1.15 $
*/
public class Trace2DSorted extends ATrace2D implements ITrace2D {
/** Generated <code>serialVersionUID</code>. */
private static final long serialVersionUID = -3518797764292132652L;
/** The sorted set of points. */
protected SortedSet<ITracePoint2D> m_points = new TreeSet<ITracePoint2D>();
/**
* Defcon.
* <p>
*/
public Trace2DSorted() {
// nop
}
/**
* In case p has an x- value already contained, the old tracepoint with that
* value will be replaced by the new one. Else the new tracepoint will be
* added at an index in order to keep the ascending order of tracepoints with
* a higher x- value are contained.
* <p>
*
* @param p
* the point to add.
*
* @return true if the given point was successfully added.
*/
@Override
protected boolean addPointInternal(final ITracePoint2D p) {
// remove eventually contained to allow adding of new one
this.removePoint(p);
return this.m_points.add(p);
}
/**
* @see info.monitorenter.gui.chart.ITrace2D#getMaxSize()
*/
public int getMaxSize() {
return Integer.MAX_VALUE;
}
/**
* @see info.monitorenter.gui.chart.ITrace2D#getSize()
*/
public int getSize() {
return this.m_points.size();
}
/**
* @see info.monitorenter.gui.chart.ITrace2D#isEmpty()
*/
public boolean isEmpty() {
return this.m_points.size() == 0;
}
/**
* @see info.monitorenter.gui.chart.ITrace2D#iterator()
*/
public Iterator<ITracePoint2D> iterator() {
return this.m_points.iterator();
}
/**
* @see ATrace2D#addPointInternal(info.monitorenter.gui.chart.ITracePoint2D)
*/
@Override
protected void removeAllPointsInternal() {
this.m_points.clear();
}
/**
* @see ATrace2D#removePointInternal(info.monitorenter.gui.chart.ITracePoint2D)
*/
@Override
protected ITracePoint2D removePointInternal(final ITracePoint2D point) {
ITracePoint2D result = null;
if (this.m_points.remove(point)) {
result = point;
}
return result;
}
}
|
Q:
Passing a Variable in DAX
I'm trying to pass a variable through to a DATEADD function using PowerBI Desktop DAX so that it changes the Interval.
I'm using
Sales Comparison = CALCULATE( [SALES], DATEADD('CALENDAR'[DATE],-1,YEAR))
to show sales in the same period last year, but i'd like the YEAR function to be variable.
The idea is to change it so the user can compare to last month, last quarter, etc.
I've created a Period table with month, quarter, year and I've tried to pass it through to show
Sales Comparison =
CALCULATE( [SALES],
DATEADD('CALENDAR'[DATE],-1,VALUES(PERIOD[PERIOD])
)
)
It errors out showing "the Last Argument must be one of these keywords: DAY, MONTH, QUARTER or YEAR.
I've been replacing the VALUES with SELECTEDVALUE and VALUE; all of which fail on me.
Help on this would be greatly appreciated.
A:
DAX can be a really frustrating language - so new and raw and yet so restrictive ...
I would duplicate the DATEADD 4 times (for DAY, MONTH, QUARTER and YEAR) and wrap the whole steaming mess in a SWITCH function. Something like:
Sales Comparison =
SWITCH (
VALUES ( PERIOD[PERIOD] ),
"DAY", CALCULATE ( [SALES], DATEADD ( 'CALENDAR'[DATE], -1, DAY ) ),
"MONTH", CALCULATE ( [SALES], DATEADD ( 'CALENDAR'[DATE], -1, MONTH ) ),
"QUARTER ", CALCULATE ( [SALES], DATEADD ( 'CALENDAR'[DATE], -1, QUARTER ) ),
"YEAR", CALCULATE ( [SALES], DATEADD ( 'CALENDAR'[DATE], -1, YEAR ) )
)
Then I would need a shower.
|
1. Field of the Invention
The present invention relates to intra-vascular devices. More particularly, the present invention relates to a stent for treatment of intra-vascular aneurysms.
2. Description of the Related Art
A self-expanding stent-graft typically includes a self-expanding stent and a graft material sewn to the stent. In stent-graft deployment systems, the self-expanding stent-graft is restrained within a sheath. After placement of the stent-graft at the desired location via fluoroscopic guidance, the physician retracts the sheath to deploy the stent-graft, i.e., to expose the stent-graft and allow it to self-expand.
However, the human anatomy is tortuous by nature. Thus, during guidance of the stent-graft to the desired location, the stent-graft is subjected to significant bending and flexing. A conventional stent-graft has practical limits to the allowed amount of bending to avoid damage or destruction to the stent-graft. Avoiding extreme bending or destruction of the stent-graft limits the range of anatomical variation in which the stent-graft can be used.
Further, to guide the stent-graft to the desired location, the stent-graft is compressed within the sheath to have the smallest possible cross-section, i.e., to have the smallest possible stent-graft delivery profile. However, conventional stent-graft designs imposed practical limits on the possible reduction of the stent-graft delivery profile. |
Press Buries Two Stubborn Obama Shutdown Settlement Rejections
Perhaps the most frustrating aspect of this government shutdown has been the inability of the average person to get a handle on what's really going on.
Outfits like the network evening news shows, the Associated Press, the New York Times and others compose their spin, and almost invariably tilt their coverage towards the Obama administration and Democrats; developments favoring the GOP and conservatives, if mentioned at all, get washed away. Two examples from today of shutdown settlement ideas President Barack Obama rejected will prove the point.
The first comes from Rush Limbaugh. As he was following the goings-on in real time during his show today, Rush noted an important development (bolds are mine throughout this post):
Let's talk about the state of play right now. It looks like the Senate Republicans want to give Obama and the Democrats everything they want. They want to give an extension of the continuing resolution through the end of the year, which would then open the government. That would end the shutdown. They want to give them a debt ceiling hike through the middle of January so that we're not going through this during the holidays. Oh, they're also even offering a delay on one Obamacare tax for their union buddies. I mean, it's a total win for Obama. Did you hear how Obama reacted to it? He rejected it. He said the Republicans have offered another ransom.
I sit here, I'm as far away from Washington in the continental US you can get here in Los Angeles and I'm still stunned that those guys much closer than I don't see this. I know you see it, too. Obama does not want a deal.
Other than what Rush saw in TV coverage, Obama's rejection, and the likelihood based on his actions and inaction that he really doesn't want the matter settled, are complete secrets. I have attempted to find evidence that Obama's rejection of the plan to which Senate Republicans acquiesced was covered by an establishment press outlet, and found none.
The second is from early this evening via Jonathan Allen at the Politico, the official establishment press burial ground for inconvenient stories:
President Barack Obama told House Democratic leaders Tuesday that he would veto debt-ceiling legislation if it includes a provision pushed by Sen. David Vitter (R-La.) and House GOP leaders that would cut health subsidies for congressional and senior executive branch officials, according to sources familiar with the discussion at a private White House meeting.
The version of the provision included in a bill the House is slated to consider Tuesday night would eliminate employer contributions for lawmakers’ and Hill staffers’ health insurance purchases, and require the president, vice president and political appointees to enter into Obamacare exchanges without a tax subsidy.
Obama brought up the issue of the so-called Vitter language unprompted, according to one of the sources.
A search at the Associated Press's national web site on Vitter's last name at 11 p.m ET came up empty. Besides one story at the Hill, I was unable to find another story covering Obama's rejection of Vitter's proposal.
How much different would the nation's perception of who is at fault in this standoff be if they knew that Obama rejected both a Senate Republican surrender attempt and the idea of treating congressional and White House staff the same treatment under Obamacare as the rest of America?
But the original source press rarely mentions items such as these, and if they do, they rarely make it the overall "what happened today" summaries.
This isn't an excuse or justification for caving on one's principles, but it does shed a bit of light on why Congressional and Senate conservatives and Republicans must be so frustrated. Of course, knowing how tilted the media landscape is, they should be doing more to get their message out in other ways.
Federal employees and military personnel can donate to the Media Research Center through the Combined Federal Campaign or CFC. To donate to the MRC, use CFC #12489. Visit the CFC website for more information about giving opportunities in your workplace. |
Luxury Foods From Around The World
As there is a need to cleanse the palate with a sorbet (or shot of cold vodka) in any good restaurant, I also need to keep this column fresh and mix it up from time to time. So today's focus will be some luxury, decadent and odd foods that will likely start a party in your mouth, so to speak.
Some of us may never have the chance to taste or afford some of the following items. My philosophy is that it is incumbent on me to bring them to you via the Internet. Face it: Most people will never scarf down a cobra heart or sip a flute of Krug Clos du Mesnil Champagne. Or will they? Nah, I think not. If that were the case, the subsequent items would defy decadence and exclusivity.
Vanilla beans
Everyone has a bottle of vanilla extract in the cupboard, but the real deal is completely unlike the imitation stuff.
Believe me, there is nothing like real vanilla bean essence. The flavor is just ridiculous. The pure extract is, at minimum, 35% alcohol and has a rich honey color. It is very expensive, but you do get what you pay for. While pure extract is all good, the best flavor comes from pure vanilla beans.
The process that transforms the raw vanilla pod into the vanilla bean available at stores everywhere, full of intense flavor, can take up to a month to produce. So count on a hefty premium for all that superb taste. Just remember where the taste comes from: within the vanilla bean.
You have to split that bad boy open and remove all the small seeds. In the interim, store your vanilla in your sugar container — that'll keep it fresh and flavor the sugar.
Estimated cost: $71 per pound
Fugu fish
There is an old expression in Japan that translates loosely into "I want to eat fugu, but I don't want to die." Sure, I can understand that. This notorious fish is not only expensive, but requires an expert hand to prepare it in order not to kill the consumer.
Over 40 types of fugu, or blow/globe/puffer fish, are available in Japan and the most deadly contain a lethal poison that causes near instant death. The most amazing fact is that the poison changes location from one fugu species to the next.
Imagine the pressure on a fugu chef to ensure the life of his clients! Despite the threat, intrepid diners dish out up to $250 and more for one fugu meal. Not surprisingly, the most toxic variety (Tora-fugu) is reputed to be the most delicious. |
by
The Gospel of Matthew begins not with the birth story itself, but with a genealogy of Jesus. This is to establish “Messianic credibility” beginning with the Messiah must be a descendant of King David:
1Chronicles 17.11 When your days are over and you go to be with your fathers, I will raise up your offspring to succeed you, one of your own sons, and I will establish his kingdom. 2Samuel 7 12. When your days are over and you rest with your fathers, I will raise up your offspring to succeed you, who will come from your own body, and I will establish his kingdom. 13. He is the one who will build a house for my Name, and I will establish the throne of his kingdom forever. 14I will be his father, and he will be my son.
Matthew presents an incredibly detailed genealogy from Joseph to Abraham the literal and proverbial “father” of Judaism, Christianity and Islam. (King David is in verse 6):
1. The record of the genealogy of Jesus the Messiah, the son of David, the son of Abraham:
2. Abraham was the father of Isaac, Isaac the father of Jacob, and Jacob the father of Judah and his brothers.
3. Judah was the father of Perez and Zerah by Tamar, Perez was the father of Hezron, and Hezron the father of Ram.
4. Ram was the father of Amminadab, Amminadab the father of Nahshon, and Nahshon the father of Salmon.
5. Salmon was the father of Boaz by Rahab, Boaz was the father of Obed by Ruth, and Obed the father of Jesse.
6. Jesse was the father of David the king. David was the father of Solomon by Bathsheba who had been the wife of Uriah.
7. Solomon was the father of Rehoboam, Rehoboam the father of Abijah, and Abijah the father of Asa.
8. Asa was the father of Jehoshaphat, Jehoshaphat the father of Joram, and Joram the father of Uzziah.
9. Uzziah was the father of Jotham, Jotham the father of Ahaz, and Ahaz the father of Hezekiah.
10. Hezekiah was the father of Manasseh, Manasseh the father of Amon, and Amon the father of Josiah.
11. Josiah became the father of Jeconiah and his brothers, at the time of the deportation to Babylon.
12. After the deportation to Babylon: Jeconiah became the father of Shealtiel, and Shealtiel the father of Zerubbabel.
13. Zerubbabel was the father of Abihud, Abihud the father of Eliakim, and Eliakim the father of Azor.
14. Azor was the father of Zadok, Zadok the father of Achim, and Achim the father of Eliud.
15. Eliud was the father of Eleazar, Eleazar the father of Matthan, and Matthan the father of Jacob.
16. Jacob was the father of Joseph the husband of Mary, by whom Jesus was born, who is called the Messiah.
17. So all the generations from Abraham to David are fourteen generations; from David to the deportation to Babylon, fourteen generations; and from the deportation to Babylon to the Messiah, fourteen generations.
18. Now the birth of Jesus Christ was as follows: when His mother Mary had been betrothed to Joseph, before they came together she was found to be with child by the Holy Spirit.
19. And Joseph her husband, being a righteous man and not wanting to disgrace her, planned to send her away secretly.
20. But when he had considered this, behold, an angel of the Lord appeared to him in a dream, saying, “Joseph, son of David, do not be afraid to take Mary as your wife; for the Child who has been conceived in her is of the Holy Spirit.
21. “She will bear a Son; and you shall call His name Jesus, for He will save His people from their sins.”
22. Now all this took place to fulfill what was spoken by the Lord through the prophet:
23. “BEHOLD, THE VIRGIN SHALL BE WITH CHILD AND SHALL BEAR A SON, AND THEY SHALL CALL HIS NAME IMMANUEL,” which translated means, “GOD WITH US.”
24. And Joseph awoke from his sleep and did as the angel of the Lord commanded him, and took Mary as his wife,
25. but kept her a virgin until she gave birth to a Son; and he called His name Jesus.
Ahh, clean cut, clear and meaningful. Thanks be to God… but wait there’s already an issue: The Gospel of Luke has a genealogy, too. And it is completely different.
Luke 3 23. When He began His ministry, Jesus Himself was about thirty years of age, being, as was supposed, the son of Joseph, the son of Eli,
24. the son of Matthat, the son of Levi, the son of Melchi, the son of Jannai, the son of Joseph,
25. the son of Mattathias, the son of Amos, the son of Nahum, the son of Hesli, the son of Naggai,
26. the son of Maath, the son of Mattathias, the son of Semein, the son of Josech, the son of Joda,
27. the son of Joanan, the son of Rhesa, the son of Zerubbabel, the son of Shealtiel, the son of Neri,
28. the son of Melchi, the son of Addi, the son of Cosam, the son of Elmadam, the son of Er,
29. the son of Joshua, the son of Eliezer, the son of Jorim, the son of Matthat, the son of Levi,
30. the son of Simeon, the son of Judah, the son of Joseph, the son of Jonam, the son of Eliakim,
31. the son of Melea, the son of Menna, the son of Mattatha, the son of Nathan, the son of David,
32. the son of Jesse, the son of Obed, the son of Boaz, the son of Salmon, the son of Nahshon,
33. the son of Amminadab, the son of Admin, the son of Ram, the son of Hezron, the son of Perez, the son of Judah,
34. the son of Jacob, the son of Isaac, the son of Abraham, the son of Terah, the son of Nahor,
35. the son of Serug, the son of Reu, the son of Peleg, the son of Heber, the son of Shelah,
36. the son of Cainan, the son of Arphaxad, the son of Shem, the son of Noah, the son of Lamech,
37. the son of Methuselah, the son of Enoch, the son of Jared, the son of Mahalaleel, the son of Cainan,
38. the son of Enosh, the son of Seth, the son of Adam, the son of God.
Uh oh… Joseph has two daddies (Matt. 1:16 & Luke 3:23), and two great-grandfathers (Matt. 1:15 & 3:24), and so on. One explanation of this discrepancy is that Matthew’s genealogy is that of Joseph’s (the legal, patriarchal one), and Luke’s Gospel contains that of Mary’s (the only source of Jesus’ actual human bloodline, but of no value in a patriarchal society where a woman’s name could not be on legal genealogies).
Another explanation of the discrepancy in Jesus’ genealogy is the occurrence of a “Levirate marriage”: if a Jewish man died before having any children, the dead man’s brother was bound by law to marry and impregnate his wife so that the dead brother’s lineage might continue with a son. So one genealogy might be one of the legal (dead) father, and the other of the biological (brother) father. Maybe, but the great-grandfathers are clearly different, too (Eleazar vs. Levi). In fact, almost every generation is different between the two gospels. Did the Levirate marriage scenario happen multiple times in the lineage?
The “multiple Levirate marriage” scenario is improbable but not impossible, and the “genealogy of Mary” theory is even more so. Therefore, if your faith in Jesus relies on his absolute literal lineage from King David, then you can have it. There’s chance enough to believe, if you need. Personally, my faith doesn’t rely on these genealogies being factual, and I think it’s silly to put so much importance on such a trivial detail of who Jesus was in terms of lineage.
Ummm… trivial? Well, let me ask you this: why are Christians even having this discussion if we believe he truly is The Son of God? It seems a little redundant to argue that he was also from the line of David. Would someone actually say, “Oh! He’s ‘The Son of God’ and he’s descended from King David? Well, now I’ll take his story seriously. Before when he was just ‘The Son of God’, I was like, ‘meh’. But NOW…”
Personally, instead of setting Jesus apart, I find this emphasis on his Davidian lineage and his “Child of God” status very affirming to our universal potential as humans. Consider this: King David died almost 1000 years before Christ was even born. He begat Solomon, but Solomon begat… and begat… and begat some more. From David to Jesus is 27 generations (by Matthew’s count), which in reality is probably more like 50 (at 20 years per generation). That means at least thousands, tens-of-thousands, or even hundreds-of-thousands of Jewish people were his descendants and “from the line of David” during the time of Jesus!
Could it be, that instead of making Jesus something apart, something rare and higher and better than us, that being one of hundreds-of-thousands just like him should make him more like the rest of us? Perhaps a more spiritual understanding of this whole “genealogy dilemma” is that being from “the line of David” isn’t really all that unique or important; the earthly origins and pedigree don’t really matter. Rather it’s how we live and act in this lifetime that make us God’s Children. We should realize that we ALL have the potential to be and do what Jesus was and did: be the living embodiment of God’s love, compassion, and concern for justice in this world.
Our faith should never rely solely on who Jesus was predicted to be. Rather our faith should be grounded in who he was and what he meant in his life, in his death, and what he means walking with us today. |
Police are pointing to a dispute over videogames as the motivation behind a teen's fatal attack on his great-grandmother.
A 14-year-old boy described by his neighbors as "kind of shy," has slain his great-grandmother and wounded his grandmother with a large medieval-style sword in Georgia. Police arrived at his home soon after the violence occurred to find the teenaged killer pacing across his front lawn beside the body with a pellet gun in one hand and his murder weapon in the other. What could have caused such a grisly scene? According to witnesses, his 77-year-old great-grandmother had asked him to turn off a videogame. Sigh.
Douglas County Sheriff Phil Miller was one of the first policemen on the scene, and boy was he in for a surprise when he stepped out of his squad car. "He came out with a pellet gun and shot two windows out of a patrol car that was sitting there. He was shooting at us with the pellet gun and swinging the sword around in the air," Miller said. "We sent a K-9 unit in and he hit the K-9 with the butt of his gun. At that point, we tased him, then took him into custody."
Then again, maybe Miller shouldn't have been surprised after all. According to police investigators, this was the third, yes third, time this 14-year-old has been arrested, and the second time the arrest has involved a sword and his grandma. When asked about the first, Miller said, "This is not the same sword. He cut his grandmother on the foot with it that time."
So, wait a second. This was a different sword than the one he used to stab his grandmother's foot? Does that mean that someone actually thought this kid needed more than one sword? More importantly, does that mean that after the first round of sword versus grandmother took place, he was still allowed to keep them? There seems to be quite a bit wrong with how this tragedy went down, and though the absolute last thing that comes to my mind as a cause is "videogames," I'm sure that some group of blockheads can't wait to file this story under "P" for "proof that videogames cause violent behavior." Aren't videogames prevalent enough these days to finally be considered more of a coincidence than a cause?
Don't get me wrong; the real tragedy is this poor woman's untimely death. To live through so much history only to be skewered by the progeny of your offspring's offspring is downright heartbreaking. I just hope this deranged teenager didn't also help fuel the seemingly never-ending anti-videogame blame-game.
Source: New York Daily News |
Maharaja (1998 film)
Maharaja is a 1998 Indian Hindi supernatural adventure film directed by Anil Sharma. It stars Govinda and Manisha Koirala in the title roles. It is about the struggle of a prince with supernatural powers to get his kingdom back. After the surprise big hit of Mr. India as a superhero movie, Maharaja came out with a bigger budget film in the same genre.
Maharaja is considered to be a pioneer in Hindi superhero films but it failed at the box office.
Plot
Fearing his death, Ranbir Singh (Salim Ghouse) decides to kill Kohinoor when he is a child, though in vain. After 20 years, Kohinoor (Govinda) returns to claim his rightful place in the kingdom. He has developed advanced powers over matter and animals, which he uses to his advance to free his nanny, Ameenabi (Aruna Irani) who is being held by Ranbir and his associates. Kohinoor must pass numerous tests, including being exploited by a television reporter, Shaili Mathur (Manisha Koirala), who claims that she loves him; and fight hungry, blinded, man-eating lions.
Cast
Govinda as Kohinoor
Manisha Koirala as Shaili Mathur
Raj Babbar as Ali
Salim Ghouse as Ranvir Singh
Shakti Kapoor as Bhalu Prasad Bihari Orey
Kulbhushan Kharbanda as Hanuman Baba
Ishrat Ali as Devkaran
Aparajita as Kohinoor's mom
Shanoor Mirza as Tutu, Shaili's younger brother
Aruna Irani as Amina Bi
Syed Badr-ul Hasan Khan Bahadur
Soundtrack
The music of Maharaja has been composed by Nadeem-Shravan with lyrics by Sameer. Tracks like 'Maharaja ki Kahani' became famous during the release.
Reception
Although the film wasn't received positively by all the critics, the actors were praised for their performance . The film was a major success in some parts of the country.
References
External links
Category:1998 films
Category:Indian films
Category:1990s Hindi-language films
Category:Films scored by Nadeem–Shravan |
Not to be outdone by their neighbors and rivals from Japan, Chinese scientists this summer have set out to find a potentially vast new source of cleaner-burning fossil fuels, located beneath the floor of the South China Sea.
Surging Demand and Reliance on Foreign Energy
China’s domestic market for natural gas is soaring. Demand for natural gas in China surged to 130 billion cubic meters (4,590 billion cubic feet) in 2011, which is four times higher than in 2000, according to IEA’s 2012 China gas report.
It should come as no surprise, then, that more than a dozen cities on China’s Pacific coast are now building new terminals to receive liquid natural gas imports from nations in the Middle East and other regions.
The exploration comes five months after Japan announced in March that it had extracted natural gas from a new source of energy — methane hydrate, a type of natural gas that is trapped in an ice shield and forms when methane and water combine at high pressure and low temperature — from the deepwater seabeds in the Pacific Ocean, off Aichi Prefecture. Japan has since announced that it found more than 200 other sources of methane hydrate in the seabeds surrounding the island nation.
Methane hydrate reserves have the potential to contain more energy than any other fossil fuel, according to the U.S. Geological Survey and a 2011 study by the Massachusetts Institute of Technology (MIT). Just one cubic meter of pure methane hydrate can be depressurized and warmed to produce 164 cubic meters at room temperature and ambient pressure.
Scientists estimate that 99 percent of methane hydrate reserves exist at water depths ranging from 300 meters (984 feet) to more than 4,000 meters (13,123 feet), depths that encompass much of the planet. The methane hydrates are then buried an additional 50 to 250 meters (165 to 805 feet) below the ocean floor.
With 32,000 kilometers (19,884 miles) of ocean shoreline, China is hoping to find its own stockpile of underwater methane hydrate reserves. Some Chinese experts have even compared the energy potential of methane hydrate reserves in the South China Sea to that in Daqing — China’s largest oil field, discovered in 1959 — which produced 293 million barrels of oil in 2012. That is 50 million barrels more than the shale boom of North Dakota produced in 2012, according to U.S. Energy Information Administration.
“It is unclear that hydrate production can be commercial in the short and medium term, especially in light of the recent shale gas development.”
Still, though the potential energy reserve is high, some energy authorities are not sure that methane hydrate can be a game changer for China, especially when commercial production appears so far away.
“The recent Japan pilot — which indeed was successful — is for a particular geologic setting and hydrate play. And, even there, it is unclear whether production could be sustained at high rates and for long periods of time,” said Ruben Juanes, associate professor in energy studies at MIT, during an interview with Circle of Blue. “It is unclear that hydrate production can be commercial in the short and medium term, especially in light of the recent shale gas development. It is not easy for me to see when hydrate could play a big role in the energy mix.”
Unconventional Gas Markets
Deteriorating air quality and rising carbon emissions are driving China’s urgent shift from coal combustion, which currently makes up 70 percent of the nation’s energy consumption. China’s clean energy sector is the world’s largest, due to increases in power generation from wind and water over the last decade. Likewise, demand for cleaner-burning natural gas in China has experienced a four-fold increase over the past decade.
“Hydrates are primarily a research topic right now, but an interesting one.”
— Tim Collett, research geologistU.S. Geological Survey
But the Chinese have been less competent in developing reserves of unconventional natural gas, specifically coal bed methane and deep shale gas. Technology challenges and water scarcity have been barriers to bringing gas to market, despite a national push to explore every possible source and boost the production and use of natural gas.
The process of tapping deep seabed methane hydrate by depressurization, meanwhile, does not involve water use at all. On the contrary, it produces water with no salts, which some models suggest could be an important commodity — either for energy production or human consumption, depending on quantities produced — according to Tim Collett, a research geologist at the United States Geological Survey (USGS) who studies gas hydrates. However, the technology for extracting commercial quantities of gas at reasonable costs is far from being perfected, especially because dissociated, depressurized methane hydrates tend to reform if temperatures drop and pressures increase.
“Methane hydrate technology is still a new technology. We’ve only tested it for a short period of time. But suppose that Japan does make it commercial in five years: then 15 years will be feasible for methane hydrate [development] in China.”
–George Hirasaki, professorRice University, Houston, TX
“We don’t have a good handle on production rates, and production rates are directly tied to the amount of produced water,” Collett told Circle of Blue, noting that the longest hydrate production tests last only 10 to 20 days, whereas production data for other unconventional fuels has generally taken over a year. “Hydrates are primarily a research topic right now, but an interesting one.”
The Wall Street Journal reported that the estimated cost of tapping methane hydrate ranges from $US 1,059 to $US 2,100 per 1,000 cubic meters ($US 30 to $US 60 per 1,000 cubic feet), which is 10 to 20 times as high as natural gas produced from deep shales in the United States and double to quadruple the imported liquid natural gas (LNG) market price in China during July.
What Is Affordable?
George Hirasaki, a professor and methane hydrate researcher at Rice University in Houston, Texas, told Circle of Blue that, for the time being, importing shale gas will be more economical for China than domestic production of gas via extraction from methane hydrate. He added, though, that import prices for shale gas could rise for China as demand outpaces production, making methane hydrate extraction more price competitive in the near future.
Photo courtesy of National Energy Technology
Methane hydrates contains more energy than any other fossil fuels that have been discovered. Click image to enlarge.
In the case of Japan, an ambitious timetable calls for commercial methane hydrate production within five years. If Japan succeeds, the tools and practices for meeting that goal would be available globally — meaning that other countries could learn quickly, according to Hirasaki.
“Methane hydrate technology is still a new technology. We’ve only tested it for a short period of time,” Hirasaki said. “But suppose that Japan does make it commercial in five years: then 15 years will be feasible for methane hydrate [development] in China.”
In the meantime, China’s search for methane hydrates is not limited to the ocean floors.
Chinese state media reported that Shenhua Group — the largest coal-producing company in China — has begun to move to the Qinghai-Tibetan permafrost area to conduct experimental drilling for methane hydrate. Some reports say that the amount of hydrate in the permafrost could sustain China’s energy use for 90 years. Additionally, several other Chinese drilling technology companies have also expressed interest in the region. All are hoping to deliver the technology that will make methane hydrate extraction more economically feasible.
Linyi Zhang, who recently graduated from Northwestern University’s Medill School of Journalism with a Master’s degree, is reporting this summer from Circle of Blue’s news desk in Traverse City, Michigan. Brett Walton, Circle of Blue’s Seattle-based writer, contributed reporting. |
If you're thinking about formatting the output messages of your application, just require mag-hub before all mag requires.
mag-hub is passthrough stream. If you require mag-hub then all log objects will be written to this stream. You can read from this stream and make any transformation with your messages before writing them to stdout. |
Turkish Ambassador hosted high tea at his official residence
September 13, 2018
The Ambassador of Turkey to India, H.E. Mr Şakir Özkan Torunlar, Hosted a High Tea for members of the Indian tourism and economy media at the official residence in New Delhi. The informal meet & greet session was organised to acknowledge media for their ongoing support to Turkey and apprise them on current tourism statistics and trends between both the countries.
The High Tea at ambassador’s residence was an extravagant occasion giving a peek of Turkish culture, enjoyed in exquisite surroundings. The guests were seen interacting with the Ambassador and over snacks,tea and Turkish coffee, they discussed a variety of subjects from Turkish culture, Turkish cuisine, Indian destination weddings in Turkey and, of course, tourism.
“Turkey and India enjoy warm relations and also share a close historical relationship with strong cultural links. The relationship between Turkey and India has steadily grown year by year in both scope and depth and spans many different areas of cooperation. Turkey enjoys immense geographical, cultural & social diversity, which is why it is extremely popular with Indians. We are working towards tourism related verticals like increasing air connectivity and changes in visa policy so as to ensure better engagement between both countries.” said H.E. Mr Şakir Özkan Torunlar, Ambassador of Turkey. According to the Ambassador, every singleIndian who visits Turkey once, becomes the ambassador of Turkey after his return back to India.
The Turkish Tourism Board in India recently announced that the number of Indian tourists travelling to Turkey has doubled.
“In 2017, Turkey hosted more than 32 million international tourists while from India the number was 87,000. This year, from January to July, we recorded 25 per cent increase in the number of overall tourists. Thatmeans we will be hosting 40 million international tourists by the end of 2018. When we look at figures from India, we see 95 per cent increase for the same period. If this trend continues we will be hosting almost 2 lakhsIndian tourists by the year end”, said Mr. Deniz ERSÖZ, Culture & Tourism Counsellor, of the Turkish Embassy.
Mr Ersöz further added, “Istanbul, Antalya, Cappadocia, Troy and Izmir are extremely popular with Indian travellers. However, Bodrum and Marmaris have also emerged as major tourist attractions in recent past.In addition to that, Konya where Celaleddin Rumi spent his last 45 years, the sacred site where he was buried is also among the popular destinations for Indians. When we talk about food, Turkish cuisine is amongst the richest cuisines in the world with influences of Middle Eastern, Mediterranean and Balkan cuisines. Wellness is another area where Turkish hammams are well famous. There are some particular regions that focus on holistic wellness. And the traditional hammams of Turkey have visitors from all over the world. With world-class hotels, restaurants, pristine beaches, mountains, adventure sports, nightlife etc, there is plenty to see and explore in Turkey for everyone.”
Turkey is the home of unique nature, culture and deep-rooted historical and religious prestige which reflects inits 18 world heritage sites recognized by UNESCO. It also offers diverse cuisine and entertainment options,along with world class hotel and transportation servicesand the popular tourist sites while drawing attention to the emerging trends of adventure tourism, faith tourism, medical tourism and the country as a trending wedding destination.
Last but not the least, it is worth to mention that the new airport of Istanbul which will be inaugurated at the end of October 2018, will be one of the largest airports in the world with a capacity of 200 million passengers/year.
Travel Trade Journal (TTJ), established in 2010, changed the way travel news was treated in trade journals and raised the bar of trade publications in India. A monthly update on the happenings and news in the trade circuit, TTJ is a magazine with a difference. |
Capitalism: An Old World Order
Since the end of World War II, the international world order of political apparatuses such as the United Nations has established a defacto global community in which institutions and individuals can interact in a mutually neutral environment. Lesser-remembered international agreements started during this time includes the economic agreement known as the Brenton Woods agreement. This became basis for the international currency known as the Petrodollar, derived is from the US dollar as an international standard of exchange. Political networks entangle the United States with the supranational institution of NATO, alliances with Arabian oil kingdoms like Saudi Arabia, policies of regime change and economic hitmen to orient other nations's economic policies, amongst many other questionable policies and trends. A structure of corporate conglomerates formed as a reaction by markets to the hegemonic nature of the Petrodollar. This resulted in structures of corporate networks among the world's 43,000 transnational corporations; forming an economic core of 1318 mega corporations controlling 80% of global revenue. Within this corporate core resides large financial institutions like Barclays, JP Morgan, Deutsche Bank, HSBC, AXA, etc; as well as the worlds largest oil companies such as Exxon, BP, etc.https://arxiv.org/PS_cache/arxiv/pdf/1107/1107.5728v2.pdf
Together, the monetary structure of the United States's World Bank and the European Union's International Monetary Fund that facilitate the global currency system, challenge by the Brazil-Russian-India-China-South Africa alliance of the BRICS Development Bank, in addition to the Chinese based Asian Infrastructure Investment Bank is putting pressure on the global hegemony of the Petrodollar. Such economic struggles will fail to solve economic issues and will result in corporate consolidation of the global economic system. In order to prevent further chaos and hardship, we must assess our current situation and prevent new mistakes and errors.
By allowing private capital to transcend national boundaries via multinational corporation's, banking institutions, and other structures of privatized wealth; the corporate core network of 1318 transnational corporations form a de facto global structure. The global structure of the worlds largest multinational corporation's with resources of all areas of industry and from all creations of civilization that also consist of the banking institutions that drive the currencies of the world, with a particular emphasis on the global petrodollar system; results in a corporate-monetary system that generates its own conception of wealth, growth, and development that completely negates the thought of "externalities". Also known as the consequences of actions taken by these corporate entities, especially in context to macro level phenomenons and potential large scale repercussions. The global structure systematically installs permanence and legitimacy to plagues of civilization such as inequality, war, poverty, illness/disease, and other repercussions of the privatization of capital extracted through a market system that commodifies resources into capital capable of utilization by the owner of said capital.
The globalization of private capital is as contradictory as it is paradoxical. Its efficiency in transforming resources into capital that is networked rapidly across the globe in systems of consumerism in all areas of life will become its own self-destructive mechanism. The direct association of this defacto world structure has overseen the complete devastation of the world's biosphere through its incompetencies and internal failures, mistakes, and contradictions. But even with these immense failures, the industrial capability and capacity generated has the means of rapidly shifting into a new structure entirely.
The industrial capacity of over a century ago was capable of waging war on a global scale; and was able to repeat on a larger scale twenty years later with an industrial mobilization of war that waged for years. When the United States economy, the basis for which the global economy was later modeled, shifted from domestic production to war industry during the second world war; it only took six months to see a complete shift of priorities. Without a massive realignment of priorities, the global structure of the corporate-monetary system no matter what nation or alliances of nations control the system; will be incapable of solving the issues of the world in a manner that will place proper responsibility and accountability on achieving the tasks at hand, correcting past mistakes/errors, and ensuring the basis of a legitimate world structure. One that is capable of ensuring the collective intentions of the human species towards being wise custodians of the biosphere of Earth.
Apocalypse not Armageddon
When civilizations teeters on the brink of change, typically the breakdown of complex society; beliefs in the “end of the world”, end times prophecies from religions, and other notions of the world as one knows it ceasing to exist grow popular amongst segments of society. This phenomenon has been witnessed throughout history, with a famous account being within the fall of the Western Roman civilization. What became Christianity had elements of some of these end times mentalities that are still present in the religion to this day. One can observe, particularly in the Western world where Christianity is most prominent, a notion that as western civilization faces the challenges of its own in a contradiction; so the appearance that the world is ending is both merited and irrational.
It is undeniable that the social constructed institutions and mechanisms of society, not just in the West but globally, are failing to deal with their own contradictions in terms of economics, politics, religious strife, social discontent, etc. These factors all play a part in the destabilizing of society and the undoing of complex systems of civilization that make up modern life. Added to this, the mechanisms that are breaking down have been for centuries contributing to the slow ecological suicide of anthropocentrism. This philosophical mentality that humanity first and foremost has the right to do whatever humanity wishes with planet, its resources, and the other lifeforms harboring within the biosphere; which has accumulated into the literal breakdown of the massive complex systems of nature. The contradictions of global civilization are creating the circumstances in which the entire biosphere risks collapsing. This indeed would lead to the end of complex human society and possibly the species as a whole. The skies may not rain fire, demons may not rise from the depths of the underworld; but for all intents and purposes, it is likely the closest humanity will come to a self induced Armageddon, short of a global nuclear war.
But this is where an interesting linguistic focus creates distinctly different ideas. Many attribute the idea of Armageddon with the idea of the Apocalypse; but this is largely a mistake from centuries of translation. Apocalypse is rooted in a Greek terminology that essentially means “revealing“, an awakening of perception to reveal the greater truth of reality. Where Armageddon is a distinct idea built around Christian end times mentality; Apocalypse does not imply the end of anything. It does not imply that the world is ending, society is falling apart, civilization is destabilizing; arguably quite the opposite.
The Apocalypse, as a concept, is a moment that offers change in either direction of positive or negative repercussions. The reaction to the revealing of perception and the awakening of what the human species could evolve into leaves us all with the recognition that humanity does not have to die off; we do not have to let civilization collapse. Apocalypse occurred in the past once before, the transitioning of the European dark ages to the Renaissance and the Enlightenment. This transitional period allowed a completely new perception of existence for human life to be built out of the knowledge gained from the expanded perception. And considering events like the bubonic plague and other mass deaths occurred during this timeframe, where massive portions of the worlds population died off in a short period of time; the possibility of European civilization collapsing beyond repair was a real possibility. But as we reflect back today, the apocalyptic unfolding of this era proved not to be a breakdown of complexity, but an expanded and energized growth and evolution on scales unseen in Europe for centuries, not since the days of antiquity before the fall of Rome.
So as we humans deal with the stress of balancing civilization in a manner that can prevent complex structures from buckling under the weight of modern life; we must also learn to grow and strengthen the bonds of society and the connection shared between all members the human species. The threat of Armageddon we face is on a global scale; no longer will one region fall into dark ages as others continue on. Twenty First century global civilization means that we are all in this complex situation together. We must therefore recognize that a willful and deliberate Apocalypse is the needed alternative to awaken the minds of the human race in order to create the conscious awareness that we require for survival.
What Mississippians Don't Know About The Alarming New Gun Bill
House Bill 1083 is pending approval in the Senate, passing in the Mississippi House by an overwhelming 80-29 vote. It is an amendment to a law created in 2011 allowing for the carrying of firearms on public property by obtainment of an enhanced concealed carry permit.
The permit can be issued after the completion of an 8-hour practicum and a live-fire range session with a DPS-approved instructor. The amendment closes loopholes, voids restrictions, and eliminates certain fees for permit-holders who want to carry a concealed weapon.
Many public spaces were previously not required under state authority to adopt its rules, including statutes on active courtrooms. This bill would be a motion to deregulate any ban on guns, including “gun-free zones” or “illegal-to-carry” settings. This could also impact highly-sensitive and densely populated areas like schools, university campuses, and other institutes of learning.
This NRA-backed legislation is a deceptive bill that will provoke several unintended consequences, including steep declines in tourism rates and a weakening of the vacation industry in Mississippi.
Colleges will be adversely affected in terms of fan attendance and crowd support at games, recruitment of out-of-state students, and large-scale boycotts of collegiate events and proceedings. This chips away at the influence of law enforcement and will gradually weaken their ability to enforce local and state policies.
HB 1083 stems from an agreement between Judiciary B Chairman Andy Gipson and NRA gun-sales benefactors. A strong bond exists between the interest group and Gipson’s political posturing. Pro-gun and NRA-sponsored bills such
as HB 786 and HB 314 are represented by Andy Gipson. He has submitted to
rich campaign contributors like the NRA for years.
George Washington said, “Few men have the virtue to withstand the
highest bidder.”
The NRA have acquired leverage with
politicians and their voting records through bribes, payouts, and other surreptitious
means. They have given millions to politicians to block gun-control laws and keep
silent on polling data like how a majority of Americans want background checks. Unless boundaries are drawn against the NRA, pro-gun bills like 1083 are funneled through our politics, and limitations that could prevent future gun crime are rejected. |
/*
materialextension.h
This file is part of GammaRay, the Qt application inspection and
manipulation tool.
Copyright (C) 2014-2020 Klarälvdalens Datakonsult AB, a KDAB Group company, info@kdab.com
Author: Anton Kreuzkamp <anton.kreuzkamp@kdab.com>
Licensees holding valid commercial KDAB GammaRay licenses may use this file in
accordance with GammaRay Commercial License Agreement provided with the Software.
Contact info@kdab.com if any conditions of this licensing are not clear to you.
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#ifndef GAMMARAY_QUICKINSPECTOR_MATERIALEXTENSION_H
#define GAMMARAY_QUICKINSPECTOR_MATERIALEXTENSION_H
#include <core/propertycontrollerextension.h>
#include "materialextensioninterface.h"
#include <memory>
QT_BEGIN_NAMESPACE
class QSGGeometryNode;
class QSGMaterialShader;
QT_END_NAMESPACE
namespace GammaRay {
class AggregatedPropertyModel;
class MaterialShaderModel;
class PropertyController;
class ObjectEnumModel;
class MaterialExtension : public MaterialExtensionInterface, public PropertyControllerExtension
{
Q_OBJECT
Q_INTERFACES(GammaRay::MaterialExtensionInterface)
public:
explicit MaterialExtension(PropertyController *controller);
~MaterialExtension() override;
bool setObject(void *object, const QString &typeName) override;
public slots:
void getShader(int row) override;
private:
QSGGeometryNode *m_node;
AggregatedPropertyModel *m_materialPropertyModel;
MaterialShaderModel *m_shaderModel;
std::unique_ptr<QSGMaterialShader> m_materialShader;
};
}
#endif // MATERIALEXTENSION_H
|
Yesterday, I came across your show where you painted the whole Muslim population with the same color of ISIS and Islamic fundamentalism.
Sometimes, as a Muslim, it becomes unbearable to watch the criticism coming from those people who do not know anything about Islam, sitting in tall buildings, in fully air conditioned room with hell of a makeup on their face. But you were right on many counts especially when talking about the liberal values such as freedom of speech, women equality, freedom to leave the religion, treating minorities equal — not being present in the Islamic world.
But what astonishes me the most is your hypocrisy. Before commenting on Muslims, you should have asked yourself, where were you when your government was supporting the dictators who were against these same liberal values? Where were you, when your government was busy toppling the democratically elected governments all over the world ? You never told your viewers about the sanctions on Iraq which killed half a million children and deprived others of their basic human rights. I bet you were watching television, with popcorn in one hand, when people were being killed in Pakistan and Yemen, just because they appear in a certain way and fall in a certain age group, by your tax funded drones.
Sitting in a high rise and giving your opinion about things which are happening several thousands of kilometers away is very easy, living under buzzing sounds of drones and constant occupation and humiliation is entirely different experience.
You said Muslims are not brave enough to speak out against these terrorist groups. They speak out Mr. Bill, but nobody gives them airtime because they don’t fit into the image purported by your liberal media. That is the reason, nobody knows about the event when 120 prominent Muslim leaders around the world signed a letter condemning ISIS and their methods, in September this year.
Essentially you branded all of the Muslim population as murderous, blood thirsty, fundamentalist horde. Well you know what, if we are murderous and blood thirsty religion what will you call yourself and your country’s army which has killed millions of civilians in Iraq and Afghanistan and still they continue doing so with laser guided precision strikes. As Ben Affleck pointed out correctly, you have killed more Muslims in the last decade than Muslims have killed in the last century.
Here is an interesting fact for you; Iran the so called “evil country” fought its last war with Iraq which ended in August 1988. Since then how many wars have America fought? How many governments have they toppled? Yeah keep counting. But only Muslims are bloodthirsty monsters!
I am not writing this article to prove or disprove anybody, but to express myself in front of the world, a world which has been hell bent on destroying the Middle Eastern Muslim countries since the World War 1.
I apologize to you that Muslims, as a community, never stood up against the tyranny of imperialistic powers, they just watched the neighborhood burning and when the fire reached their homes they simply didn't have anywhere to go. I apologize to you that we simply stood numb, when Britain, France and other western countries carved out our lands and distributed it among themselves as the spoils of war. I apologize to you that we have not tried hard enough to remain united in front of the invading armies. I apologize to you that we have allowed foreign countries to plunder our resources as our leaders descended into corruption and chaos. I apologize to you that we were not strong enough to rise and fight against the barbaric rulers of our country installed at the throne by your governments.
I apologize to you that I am writing this article, because as I write, I am sure many children would have lost their parents, sisters their brothers, fathers their sons, some of them would have been slaughtered with their whole family in places like Rakhine (Myanmar), Gaza, West Bank, Yemen, Iraq, Pakistan and Afghanistan, and most of them in the name of collateral damages.
User Ratings
92 minHumanity is more than ever threatened by its own actions; we hear a lot about the need to minimize footprints and to reduce our impact. But what if our footprints were beneficial? What if we could meet human needs while increasing the health and well-being of our...
87 minWithin Reach explores one couple's pedal-powered search for a place to call home. Mandy and Ryan gave up their jobs, cars, and traditional houses to 'bike-pack' 6500 miles around the USA seeking sustainable community. Rather than looking in a traditional neighborhood, they...
102 minThis stunning film takes you on a hypnotic journey, reaching to the past to understand the origins of the catastrophic environmental transitions we now face. Over two years, director Matt Anderson traveled 16,000 miles to document firsthand our modern industrial world and the... |
/*
** Copyright (C) 2001-2016 Erik de Castro Lopo <erikd@mega-nerd.com>
** Copyright (C) 2004 Paavo Jumppanen
**
** This program is free software; you can redistribute it and/or modify
** it under the terms of the GNU Lesser General Public License as published by
** the Free Software Foundation; either version 2.1 of the License, or
** (at your option) any later version.
**
** This program is distributed in the hope that it will be useful,
** but WITHOUT ANY WARRANTY; without even the implied warranty of
** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
** GNU Lesser General Public License for more details.
**
** You should have received a copy of the GNU Lesser General Public License
** along with this program; if not, write to the Free Software
** Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
*/
/*
** The sd2 support implemented in this file was partially sponsored
** (financially) by Paavo Jumppanen.
*/
/*
** Documentation on the Mac resource fork was obtained here :
** http://developer.apple.com/documentation/mac/MoreToolbox/MoreToolbox-99.html
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <ctype.h>
#include "common.h"
#include "sfconfig.h"
#include "sfendian.h"
#include "sndfile.h"
/*------------------------------------------------------------------------------
* Markers.
*/
#define Sd2f_MARKER MAKE_MARKER ('S', 'd', '2', 'f')
#define Sd2a_MARKER MAKE_MARKER ('S', 'd', '2', 'a')
#define ALCH_MARKER MAKE_MARKER ('A', 'L', 'C', 'H')
#define lsf1_MARKER MAKE_MARKER ('l', 's', 'f', '1')
#define STR_MARKER MAKE_MARKER ('S', 'T', 'R', ' ')
#define sdML_MARKER MAKE_MARKER ('s', 'd', 'M', 'L')
enum
{ RSRC_STR = 111,
RSRC_BIN
} ;
typedef struct
{ unsigned char * rsrc_data ;
int rsrc_len ;
int need_to_free_rsrc_data ;
int data_offset, data_length ;
int map_offset, map_length ;
int type_count, type_offset ;
int item_offset ;
int str_index, str_count ;
int string_offset ;
/* All the above just to get these three. */
int sample_size, sample_rate, channels ;
} SD2_RSRC ;
typedef struct
{ int type ;
int id ;
char name [32] ;
char value [32] ;
int value_len ;
} STR_RSRC ;
/*------------------------------------------------------------------------------
* Private static functions.
*/
static int sd2_close (SF_PRIVATE *psf) ;
static int sd2_parse_rsrc_fork (SF_PRIVATE *psf) ;
static int parse_str_rsrc (SF_PRIVATE *psf, SD2_RSRC * rsrc) ;
static int sd2_write_rsrc_fork (SF_PRIVATE *psf, int calc_length) ;
/*------------------------------------------------------------------------------
** Public functions.
*/
int
sd2_open (SF_PRIVATE *psf)
{ int subformat, error = 0, valid ;
/* SD2 is always big endian. */
psf->endian = SF_ENDIAN_BIG ;
if (psf->file.mode == SFM_READ || (psf->file.mode == SFM_RDWR && psf->rsrclength > 0))
{ psf_use_rsrc (psf, SF_TRUE) ;
valid = psf_file_valid (psf) ;
psf_use_rsrc (psf, SF_FALSE) ;
if (! valid)
{ psf_log_printf (psf, "sd2_open : psf->rsrc.filedes < 0\n") ;
return SFE_SD2_BAD_RSRC ;
} ;
error = sd2_parse_rsrc_fork (psf) ;
if (error)
goto error_cleanup ;
} ;
if ((SF_CONTAINER (psf->sf.format)) != SF_FORMAT_SD2)
{ error = SFE_BAD_OPEN_FORMAT ;
goto error_cleanup ;
} ;
subformat = SF_CODEC (psf->sf.format) ;
psf->dataoffset = 0 ;
/* Only open and write the resource in RDWR mode is its current length is zero. */
if (psf->file.mode == SFM_WRITE || (psf->file.mode == SFM_RDWR && psf->rsrclength == 0))
{ psf->rsrc.mode = psf->file.mode ;
psf_open_rsrc (psf) ;
error = sd2_write_rsrc_fork (psf, SF_FALSE) ;
if (error)
goto error_cleanup ;
/* Not needed. */
psf->write_header = NULL ;
} ;
psf->container_close = sd2_close ;
psf->blockwidth = psf->bytewidth * psf->sf.channels ;
switch (subformat)
{ case SF_FORMAT_PCM_S8 : /* 8-bit linear PCM. */
case SF_FORMAT_PCM_16 : /* 16-bit linear PCM. */
case SF_FORMAT_PCM_24 : /* 24-bit linear PCM */
case SF_FORMAT_PCM_32 : /* 32-bit linear PCM */
error = pcm_init (psf) ;
break ;
default :
error = SFE_UNIMPLEMENTED ;
break ;
} ;
psf_fseek (psf, psf->dataoffset, SEEK_SET) ;
error_cleanup:
/* Close the resource fork regardless. We won't need it again. */
psf_close_rsrc (psf) ;
return error ;
} /* sd2_open */
/*------------------------------------------------------------------------------
*/
static int
sd2_close (SF_PRIVATE *psf)
{
if (psf->file.mode == SFM_WRITE)
{ /* Now we know for certain the audio_length of the file we can re-write
** correct values for the FORM, 8SVX and BODY chunks.
*/
} ;
return 0 ;
} /* sd2_close */
/*------------------------------------------------------------------------------
*/
static int
sd2_write_rsrc_fork (SF_PRIVATE *psf, int UNUSED (calc_length))
{ SD2_RSRC rsrc ;
STR_RSRC str_rsrc [] =
{ { RSRC_STR, 1000, "_sample-size", "", 0 },
{ RSRC_STR, 1001, "_sample-rate", "", 0 },
{ RSRC_STR, 1002, "_channels", "", 0 },
{ RSRC_BIN, 1000, "_Markers", "", 8 }
} ;
int k, str_offset, data_offset, next_str ;
psf_use_rsrc (psf, SF_TRUE) ;
memset (&rsrc, 0, sizeof (rsrc)) ;
rsrc.sample_rate = psf->sf.samplerate ;
rsrc.sample_size = psf->bytewidth ;
rsrc.channels = psf->sf.channels ;
rsrc.rsrc_data = psf->header.ptr ;
rsrc.rsrc_len = psf->header.len ;
memset (rsrc.rsrc_data, 0xea, rsrc.rsrc_len) ;
snprintf (str_rsrc [0].value, sizeof (str_rsrc [0].value), "_%d", rsrc.sample_size) ;
snprintf (str_rsrc [1].value, sizeof (str_rsrc [1].value), "_%d.000000", rsrc.sample_rate) ;
snprintf (str_rsrc [2].value, sizeof (str_rsrc [2].value), "_%d", rsrc.channels) ;
for (k = 0 ; k < ARRAY_LEN (str_rsrc) ; k++)
{ if (str_rsrc [k].value_len == 0)
{ str_rsrc [k].value_len = strlen (str_rsrc [k].value) ;
str_rsrc [k].value [0] = str_rsrc [k].value_len - 1 ;
} ;
/* Turn name string into a pascal string. */
str_rsrc [k].name [0] = strlen (str_rsrc [k].name) - 1 ;
} ;
rsrc.data_offset = 0x100 ;
/*
** Calculate data length :
** length of strings, plus the length of the sdML chunk.
*/
rsrc.data_length = 0 ;
for (k = 0 ; k < ARRAY_LEN (str_rsrc) ; k++)
rsrc.data_length += str_rsrc [k].value_len + 4 ;
rsrc.map_offset = rsrc.data_offset + rsrc.data_length ;
/* Very start of resource fork. */
psf_binheader_writef (psf, "E444", rsrc.data_offset, rsrc.map_offset, rsrc.data_length) ;
psf_binheader_writef (psf, "Eop", make_size_t (0x30), psf->file.name.c) ;
psf_binheader_writef (psf, "Eo2mm", make_size_t (0x50), 0, Sd2f_MARKER, lsf1_MARKER) ;
/* Very start of resource map. */
psf_binheader_writef (psf, "E444", make_size_t (rsrc.map_offset), rsrc.data_offset, rsrc.map_offset, rsrc.data_length) ;
/* These I don't currently understand. */
if (1)
{ psf_binheader_writef (psf, "Eo1422", make_size_t (rsrc.map_offset + 16), 1, 0x12345678, 0xabcd, 0) ;
} ;
/* Resource type offset. */
rsrc.type_offset = rsrc.map_offset + 30 ;
psf_binheader_writef (psf, "Eo2", make_size_t (rsrc.map_offset + 24), rsrc.type_offset - rsrc.map_offset - 2) ;
/* Type index max. */
rsrc.type_count = 2 ;
psf_binheader_writef (psf, "Eo2", make_size_t (rsrc.map_offset + 28), rsrc.type_count - 1) ;
rsrc.item_offset = rsrc.type_offset + rsrc.type_count * 8 ;
rsrc.str_count = ARRAY_LEN (str_rsrc) ;
rsrc.string_offset = rsrc.item_offset + (rsrc.str_count + 1) * 12 - rsrc.map_offset ;
psf_binheader_writef (psf, "Eo2", make_size_t (rsrc.map_offset + 26), rsrc.string_offset) ;
/* Write 'STR ' resource type. */
rsrc.str_count = 3 ;
psf_binheader_writef (psf, "Eom22", make_size_t (rsrc.type_offset), STR_MARKER, rsrc.str_count - 1, 0x12) ;
/* Write 'sdML' resource type. */
psf_binheader_writef (psf, "Em22", sdML_MARKER, 0, 0x36) ;
str_offset = rsrc.map_offset + rsrc.string_offset ;
next_str = 0 ;
data_offset = rsrc.data_offset ;
for (k = 0 ; k < ARRAY_LEN (str_rsrc) ; k++)
{ psf_binheader_writef (psf, "Eop", make_size_t (str_offset), str_rsrc [k].name) ;
psf_binheader_writef (psf, "Eo22", make_size_t (rsrc.item_offset + k * 12), str_rsrc [k].id, next_str) ;
str_offset += strlen (str_rsrc [k].name) ;
next_str += strlen (str_rsrc [k].name) ;
psf_binheader_writef (psf, "Eo4", make_size_t (rsrc.item_offset + k * 12 + 4), data_offset - rsrc.data_offset) ;
psf_binheader_writef (psf, "Eo4", make_size_t (data_offset), str_rsrc [k].value_len) ;
psf_binheader_writef (psf, "Eob", make_size_t (data_offset + 4), str_rsrc [k].value, make_size_t (str_rsrc [k].value_len)) ;
data_offset += 4 + str_rsrc [k].value_len ;
} ;
/* Finally, calculate and set map length. */
rsrc.map_length = str_offset - rsrc.map_offset ;
psf_binheader_writef (psf, "Eo4o4", make_size_t (12), rsrc.map_length,
make_size_t (rsrc.map_offset + 12), rsrc.map_length) ;
psf->header.indx = rsrc.map_offset + rsrc.map_length ;
psf_fwrite (psf->header.ptr, psf->header.indx, 1, psf) ;
psf_use_rsrc (psf, SF_FALSE) ;
if (psf->error)
return psf->error ;
return 0 ;
} /* sd2_write_rsrc_fork */
/*------------------------------------------------------------------------------
*/
static inline int
read_rsrc_char (const SD2_RSRC *prsrc, int offset)
{ const unsigned char * data = prsrc->rsrc_data ;
if (offset < 0 || offset >= prsrc->rsrc_len)
return 0 ;
return data [offset] ;
} /* read_rsrc_char */
static inline int
read_rsrc_short (const SD2_RSRC *prsrc, int offset)
{ const unsigned char * data = prsrc->rsrc_data ;
if (offset < 0 || offset + 1 >= prsrc->rsrc_len)
return 0 ;
return (data [offset] << 8) + data [offset + 1] ;
} /* read_rsrc_short */
static inline int
read_rsrc_int (const SD2_RSRC *prsrc, int offset)
{ const unsigned char * data = prsrc->rsrc_data ;
if (offset < 0 || offset + 3 >= prsrc->rsrc_len)
return 0 ;
return (((uint32_t) data [offset]) << 24) + (data [offset + 1] << 16) + (data [offset + 2] << 8) + data [offset + 3] ;
} /* read_rsrc_int */
static inline int
read_rsrc_marker (const SD2_RSRC *prsrc, int offset)
{ const unsigned char * data = prsrc->rsrc_data ;
if (offset < 0 || offset + 3 >= prsrc->rsrc_len)
return 0 ;
if (CPU_IS_BIG_ENDIAN)
return (((uint32_t) data [offset]) << 24) + (data [offset + 1] << 16) + (data [offset + 2] << 8) + data [offset + 3] ;
if (CPU_IS_LITTLE_ENDIAN)
return data [offset] + (data [offset + 1] << 8) + (data [offset + 2] << 16) + (((uint32_t) data [offset + 3]) << 24) ;
return 0 ;
} /* read_rsrc_marker */
static void
read_rsrc_str (const SD2_RSRC *prsrc, int offset, char * buffer, int buffer_len)
{ const unsigned char * data = prsrc->rsrc_data ;
int k ;
memset (buffer, 0, buffer_len) ;
if (offset < 0 || offset + buffer_len >= prsrc->rsrc_len)
return ;
for (k = 0 ; k < buffer_len - 1 ; k++)
{ if (psf_isprint (data [offset + k]) == 0)
return ;
buffer [k] = data [offset + k] ;
} ;
return ;
} /* read_rsrc_str */
static int
sd2_parse_rsrc_fork (SF_PRIVATE *psf)
{ SD2_RSRC rsrc ;
int k, marker, error = 0 ;
psf_use_rsrc (psf, SF_TRUE) ;
memset (&rsrc, 0, sizeof (rsrc)) ;
rsrc.rsrc_len = psf_get_filelen (psf) ;
psf_log_printf (psf, "Resource length : %d (0x%04X)\n", rsrc.rsrc_len, rsrc.rsrc_len) ;
if (rsrc.rsrc_len > psf->header.len)
{ rsrc.rsrc_data = calloc (1, rsrc.rsrc_len) ;
rsrc.need_to_free_rsrc_data = SF_TRUE ;
}
else
{
rsrc.rsrc_data = psf->header.ptr ;
// rsrc.rsrc_len > psf->header.len ;
rsrc.need_to_free_rsrc_data = SF_FALSE ;
} ;
/* Read in the whole lot. */
psf_fread (rsrc.rsrc_data, rsrc.rsrc_len, 1, psf) ;
/* Reset the header storage because we have changed to the rsrcdes. */
psf->header.indx = psf->header.end = rsrc.rsrc_len ;
rsrc.data_offset = read_rsrc_int (&rsrc, 0) ;
rsrc.map_offset = read_rsrc_int (&rsrc, 4) ;
rsrc.data_length = read_rsrc_int (&rsrc, 8) ;
rsrc.map_length = read_rsrc_int (&rsrc, 12) ;
if (rsrc.data_offset == 0x51607 && rsrc.map_offset == 0x20000)
{ psf_log_printf (psf, "Trying offset of 0x52 bytes.\n") ;
rsrc.data_offset = read_rsrc_int (&rsrc, 0x52 + 0) + 0x52 ;
rsrc.map_offset = read_rsrc_int (&rsrc, 0x52 + 4) + 0x52 ;
rsrc.data_length = read_rsrc_int (&rsrc, 0x52 + 8) ;
rsrc.map_length = read_rsrc_int (&rsrc, 0x52 + 12) ;
} ;
psf_log_printf (psf, " data offset : 0x%04X\n map offset : 0x%04X\n"
" data length : 0x%04X\n map length : 0x%04X\n",
rsrc.data_offset, rsrc.map_offset, rsrc.data_length, rsrc.map_length) ;
if (rsrc.data_offset > rsrc.rsrc_len)
{ psf_log_printf (psf, "Error : rsrc.data_offset (%d, 0x%x) > len\n", rsrc.data_offset, rsrc.data_offset) ;
error = SFE_SD2_BAD_DATA_OFFSET ;
goto parse_rsrc_fork_cleanup ;
} ;
if (rsrc.map_offset > rsrc.rsrc_len)
{ psf_log_printf (psf, "Error : rsrc.map_offset > len\n") ;
error = SFE_SD2_BAD_MAP_OFFSET ;
goto parse_rsrc_fork_cleanup ;
} ;
if (rsrc.data_length > rsrc.rsrc_len)
{ psf_log_printf (psf, "Error : rsrc.data_length > len\n") ;
error = SFE_SD2_BAD_DATA_LENGTH ;
goto parse_rsrc_fork_cleanup ;
} ;
if (rsrc.map_length > rsrc.rsrc_len)
{ psf_log_printf (psf, "Error : rsrc.map_length > len\n") ;
error = SFE_SD2_BAD_MAP_LENGTH ;
goto parse_rsrc_fork_cleanup ;
} ;
if (rsrc.data_offset + rsrc.data_length != rsrc.map_offset || rsrc.map_offset + rsrc.map_length != rsrc.rsrc_len)
{ psf_log_printf (psf, "Error : This does not look like a MacOSX resource fork.\n") ;
error = SFE_SD2_BAD_RSRC ;
goto parse_rsrc_fork_cleanup ;
} ;
if (rsrc.map_offset + 28 >= rsrc.rsrc_len)
{ psf_log_printf (psf, "Bad map offset (%d + 28 > %d).\n", rsrc.map_offset, rsrc.rsrc_len) ;
error = SFE_SD2_BAD_RSRC ;
goto parse_rsrc_fork_cleanup ;
} ;
rsrc.string_offset = rsrc.map_offset + read_rsrc_short (&rsrc, rsrc.map_offset + 26) ;
if (rsrc.string_offset > rsrc.rsrc_len)
{ psf_log_printf (psf, "Bad string offset (%d).\n", rsrc.string_offset) ;
error = SFE_SD2_BAD_RSRC ;
goto parse_rsrc_fork_cleanup ;
} ;
rsrc.type_offset = rsrc.map_offset + 30 ;
if (rsrc.map_offset + 28 > rsrc.rsrc_len)
{ psf_log_printf (psf, "Bad map offset.\n") ;
goto parse_rsrc_fork_cleanup ;
} ;
rsrc.type_count = read_rsrc_short (&rsrc, rsrc.map_offset + 28) + 1 ;
if (rsrc.type_count < 1)
{ psf_log_printf (psf, "Bad type count.\n") ;
error = SFE_SD2_BAD_RSRC ;
goto parse_rsrc_fork_cleanup ;
} ;
rsrc.item_offset = rsrc.type_offset + rsrc.type_count * 8 ;
if (rsrc.item_offset < 0 || rsrc.item_offset > rsrc.rsrc_len)
{ psf_log_printf (psf, "Bad item offset (%d).\n", rsrc.item_offset) ;
error = SFE_SD2_BAD_RSRC ;
goto parse_rsrc_fork_cleanup ;
} ;
rsrc.str_index = -1 ;
for (k = 0 ; k < rsrc.type_count ; k ++)
{ if (rsrc.type_offset + k * 8 > rsrc.rsrc_len)
{ psf_log_printf (psf, "Bad rsrc marker.\n") ;
goto parse_rsrc_fork_cleanup ;
} ;
marker = read_rsrc_marker (&rsrc, rsrc.type_offset + k * 8) ;
if (marker == STR_MARKER)
{ rsrc.str_index = k ;
rsrc.str_count = read_rsrc_short (&rsrc, rsrc.type_offset + k * 8 + 4) + 1 ;
error = parse_str_rsrc (psf, &rsrc) ;
goto parse_rsrc_fork_cleanup ;
} ;
} ;
psf_log_printf (psf, "No 'STR ' resource.\n") ;
error = SFE_SD2_BAD_RSRC ;
parse_rsrc_fork_cleanup :
psf_use_rsrc (psf, SF_FALSE) ;
if (rsrc.need_to_free_rsrc_data)
free (rsrc.rsrc_data) ;
return error ;
} /* sd2_parse_rsrc_fork */
static int
parse_str_rsrc (SF_PRIVATE *psf, SD2_RSRC * rsrc)
{ char name [32], value [32] ;
int k, str_offset, rsrc_id, data_offset = 0, data_len = 0 ;
psf_log_printf (psf, "Finding parameters :\n") ;
str_offset = rsrc->string_offset ;
psf_log_printf (psf, " Offset RsrcId dlen slen Value\n") ;
for (k = 0 ; data_offset + data_len < rsrc->rsrc_len ; k++)
{ int slen ;
slen = read_rsrc_char (rsrc, str_offset) ;
read_rsrc_str (rsrc, str_offset + 1, name, SF_MIN (SIGNED_SIZEOF (name), slen + 1)) ;
str_offset += slen + 1 ;
rsrc_id = read_rsrc_short (rsrc, rsrc->item_offset + k * 12) ;
data_offset = rsrc->data_offset + read_rsrc_int (rsrc, rsrc->item_offset + k * 12 + 4) ;
if (data_offset < 0 || data_offset > rsrc->rsrc_len)
{ psf_log_printf (psf, "Exiting parser on data offset of %d.\n", data_offset) ;
break ;
} ;
data_len = read_rsrc_int (rsrc, data_offset) ;
if (data_len < 0 || data_len > rsrc->rsrc_len)
{ psf_log_printf (psf, "Exiting parser on data length of %d.\n", data_len) ;
break ;
} ;
slen = read_rsrc_char (rsrc, data_offset + 4) ;
read_rsrc_str (rsrc, data_offset + 5, value, SF_MIN (SIGNED_SIZEOF (value), slen + 1)) ;
psf_log_printf (psf, " 0x%04x %4d %4d %3d '%s'\n", data_offset, rsrc_id, data_len, slen, value) ;
if (rsrc_id == 1000 && rsrc->sample_size == 0)
rsrc->sample_size = strtol (value, NULL, 10) ;
else if (rsrc_id == 1001 && rsrc->sample_rate == 0)
rsrc->sample_rate = strtol (value, NULL, 10) ;
else if (rsrc_id == 1002 && rsrc->channels == 0)
rsrc->channels = strtol (value, NULL, 10) ;
} ;
psf_log_printf (psf, "Found Parameters :\n") ;
psf_log_printf (psf, " sample-size : %d\n", rsrc->sample_size) ;
psf_log_printf (psf, " sample-rate : %d\n", rsrc->sample_rate) ;
psf_log_printf (psf, " channels : %d\n", rsrc->channels) ;
if (rsrc->sample_rate <= 4 && rsrc->sample_size > 4)
{ int temp ;
psf_log_printf (psf, "Geez!! Looks like sample rate and sample size got switched.\nCorrecting this screw up.\n") ;
temp = rsrc->sample_rate ;
rsrc->sample_rate = rsrc->sample_size ;
rsrc->sample_size = temp ;
} ;
if (rsrc->sample_rate < 0)
{ psf_log_printf (psf, "Bad sample rate (%d)\n", rsrc->sample_rate) ;
return SFE_SD2_BAD_RSRC ;
} ;
if (rsrc->channels < 0)
{ psf_log_printf (psf, "Bad channel count (%d)\n", rsrc->channels) ;
return SFE_SD2_BAD_RSRC ;
} ;
psf->sf.samplerate = rsrc->sample_rate ;
psf->sf.channels = rsrc->channels ;
psf->bytewidth = rsrc->sample_size ;
switch (rsrc->sample_size)
{ case 1 :
psf->sf.format = SF_FORMAT_SD2 | SF_FORMAT_PCM_S8 ;
break ;
case 2 :
psf->sf.format = SF_FORMAT_SD2 | SF_FORMAT_PCM_16 ;
break ;
case 3 :
psf->sf.format = SF_FORMAT_SD2 | SF_FORMAT_PCM_24 ;
break ;
case 4 :
psf->sf.format = SF_FORMAT_SD2 | SF_FORMAT_PCM_32 ;
break ;
default :
psf_log_printf (psf, "Bad sample size (%d)\n", rsrc->sample_size) ;
return SFE_SD2_BAD_SAMPLE_SIZE ;
} ;
psf_log_printf (psf, "ok\n") ;
return 0 ;
} /* parse_str_rsrc */
|
Q:
Call an assembler function from C code in linux
I want to call a print function from my C program.
assembler prog:
#test.s
.text
.global _start
.global print
.type print, @function
_start:
call print
# and exit.
movl $0,%ebx # first argument: exit code.
movl $1,%eax # system call number (sys_exit).
int $0x80 # call kernel.
print:
# write our string to stdout.
movl $len,%edx # third argument: message length.
movl $msg,%ecx # second argument: pointer to message to write.
movl $1,%ebx # first argument: file handle (stdout).
movl $4,%eax # system call number (sys_write).
int $0x80 # call kernel.
mov $0, %eax
ret
.data
msg:
.ascii "Hello, world!\n" # the string to print.
len = . - msg # length of the string.
I can assemble and link it using:
$as test.s -o test.o
$ld test.o -o test
And I can execute it as a program, and it outputs "Hello, world!"
But when I tried to call a print from C code like this:
#include <stdio.h>
extern int print();
int main(){
int g;
g = print();
printf("Hello from c!, %d\n", g);
}
It was compiled using:
$gcc -c main.c test
It just prints "Hello from c, 13", that means that the function was called and return a number of chars, but does not print anything!
What am I doing wrong?
P.S.
When I trying to compile prog like this:
$as test.s -o test.o
$gcc -c main.c -o main.o
$gcc main.c test.o
I have a error:
/usr/bin/ld: test.o: in function `_start':
(.text+0x0): multiple definition of `_start'; /usr/lib/gcc/x86_64-pc-linux-gnu/9.2.0/../../../../lib/Scrt1.o:(.text+0x0): first defined here
/usr/bin/ld: test.o: relocation R_X86_64_32 against `.data' can not be used when making a PIE object; recompile with -fPIE
/usr/bin/ld: final link failed: nonrepresentable section on output
collect2: error: ld returned 1 exit status
A:
Ok, done! Thanks clearlight
I can compile all use
$as test.s -o test.o
$gcc -c main.c -o main.o
$gcc -no-pie main.c test.o
And all will work fine!
|
2011 Welsh devolution referendum
The Referendum on the law-making powers of the National Assembly for Wales, was a non-binding referendum held in Wales on 3 March 2011 on whether the Welsh Assembly should have full law-making powers in the twenty subject areas where it has jurisdiction. The referendum asked the question: ‘Do you want the Assembly now to be able to make laws on all matters in the 20 subject areas it has powers for?’
If a majority voted 'yes', the Assembly would then be able to make laws, known as Acts of the Assembly, on all matters in the subject areas, without needing the UK Parliament's agreement. If a majority voted 'no', the arrangements at the time of the referendum would have continued – that is, in each devolved area, the Assembly would be able to make its own laws on some matters, but not others. To make laws on any of these other matters, the Assembly would have had to ask the UK Parliament to transfer the powers to it. Regulations for the referendum, and the powers to be approved or rejected by it, were provided for in the Government of Wales Act 2006.
The results of the referendum were announced on 4 March 2011. Overall, 63.49% voted 'yes', and 36.51% voted 'no'. In 21 of 22 local authorities the vote was 'yes', with the exception being Monmouthshire by a slim majority. The overall turnout was 35.2%. First Minister Carwyn Jones, welcoming the result, said: "Today an old nation came of age."
Background
In the One Wales coalition agreement on 27 June 2007 the Wales Labour Party and Plaid Cymru made the commitment "to proceed to a successful outcome of a referendum for full law-making powers under Part IV of the Government of Wales Act 2006 as soon as practicable, at or before the end of the Assembly term". The two parties agreed "in good faith to campaign for a successful outcome to such a referendum" and to set up an All-Wales Convention to prepare for such a successful outcome.
On 27 October 2007 the then First Minister Rhodri Morgan and the Deputy First Minister Ieuan Wyn Jones appointed Sir Emyr Jones Parry, the recently retired Permanent Representative from Britain to the United Nations to head the convention. Sir Emyr stated on 22 November 2007 that he would like to begin to work as soon as possible and hoped to have the report ready by 2009 at the latest.
The All Wales Convention reported to the First Minister and the Deputy First Minister on 18 November 2009. It reported that a "yes" vote would be obtainable but not guaranteed. An opinion poll for the convention had found that 47% would vote Yes, and 37% would vote No. The report suggested that the Assembly needed to decide before June 2010 whether to trigger a referendum if the vote was to be held before the next Assembly elections.
On 2 February 2010 the new First Minister Carwyn Jones, who had succeeded Rhodri Morgan on 9 December 2009, confirmed that a trigger vote would be held on 9 February on whether the Assembly should request a referendum on full law making powers. The Welsh Liberal Democrats and Welsh Conservative Party stated they did not want the referendum to be held on the same day as the 2011 Assembly elections and would abstain from voting to trigger the referendum if this date was not ruled out. The trigger vote was held in the Assembly on Tuesday 9 February 2010, and was approved unanimously across all parties, with 53 out of the 60 AMs voting for it. Under the Government of Wales Act 2006 the First Minister was required to send a letter within two weeks to the Welsh Secretary (then Peter Hain), who would then have 120 days to lay a draft order for a referendum before Parliament. It was expected that the referendum date would not be set until after the general election.
On 15 June 2010 Cheryl Gillan, the new Welsh Secretary in the Conservative--Liberal Democrat coalition government at Westminster, announced that the referendum would probably be held between January and March 2011. Others proposed that it should be held on 5 May 2011, together with both the Assembly elections and the AV referendum. It was agreed that the referendum be held on 3 March 2011, after representations to the Welsh Secretary from the Welsh Government.
Referendum question
Draft question
The draft referendum question submitted by the Welsh Secretary to the Electoral Commission on 23 June 2010 was:
This wording was, however, criticised by the Welsh Government.
Revised question
A revised question was released in September 2010:
permitting a simple YES / NO answer (to be marked with a single (X)).
Opinion polls and comments
In 2007, one poll suggested that 47% might say Yes in a referendum vote, with 44% against. A poll in February 2008 saw 49% in favour of a full law-making parliament and 41% against. On 3 February 2010 the Western Mail endorsed the Yes campaign. A BBC poll released on 1 March 2010 (St. David's Day) found that support had risen for full law making powers, up to 56%, with 35% against, although Nick Bourne the leader of the Welsh Conservative Party (who supported a yes vote) was sceptical of the poll results.
A summary table of poll results in advance of the referendum is set out below.
Overall result
The results were counted and announced the following day on Friday 4 March 2011, locally initially with the final result declared at the Senedd in Cardiff by the Chair of the Electoral Commission Jenny Watson who announced the result in both Welsh and English.
In 21 of 22 unitary authorities, the vote was Yes. The only counting area to declare a No result was Monmouthshire, which was announced following a recount. The difference was only 320 votes.
Results by council areas
Turnout was highest in Carmarthenshire (44.36%) and lowest in Wrexham (27.04%). The highest percentage of Yes votes was in Gwynedd (76.03% Yes) and the highest percentage of No votes was in Monmouthshire (50.64% No).
Reactions to the result
First Minister Carwyn Jones said: "Today an old nation came of age."
Deputy First Minister and Plaid Cymru leader Ieuan Wyn Jones said that it marked "the beginning of a new era of Welsh devolution - the decade to deliver for Wales. ... To demand respect, you must first display self-respect. Today we have done just that, and the rest of the world can now sit up and take notice of the fact that our small nation, here on the western edge of the continent of Europe, has demonstrated pride in who we are, and what we all stand for."
Kirsty Williams, leader of the Welsh Liberal Democrats, said that the referendum showed that people "wanted to endorse and strengthen devolution", but they "also want it to work better". She said that voters were right to show "widespread dissatisfaction" with the Welsh Government's performance.
Welsh Secretary Cheryl Gillan, a member of the Conservative Party, said that there had been concern over turnout, but called it "a good day for Wales". She said that the British Government would reinforce its commitment to make the arrangements work effectively.
Roger Lewis, Chairman of the Yes for Wales campaign, said he was delighted, adding: "It is clear, the people of Wales have spoken."
Rachel Banner, of the No campaign, said that it marked a "turning point for our nation". She questioned the legitimacy of the result, asking: "Has it got the full-hearted consent of the Welsh people?" She also stated that she did not believe that the 42 backbench members of the Assembly could provide high-quality scrutiny of the activities of the Welsh Government.
See also
Yes for Wales
Commission on Scottish Devolution
Referendums in the United Kingdom
References
External links
Official website of the "YES" campaign "Yes for Wales"
Official website of the "YES" campaign "Tomorrow's Wales"
Official website of the "NO" campaign "True Wales"
Official website of the "NO" campaign by "Mark Beech"
Electoral Commission webpage on the referendum
Government of Wales Act 2006 (full text)
BBC News: Wales Referendum 2011
BBC News, Roger Scully, What will Wales powers referendum result mean?, 28 February 2011
Category:Referendums in Wales
Category:2011 elections in the United Kingdom
Category:2011 referendums
Category:2011 in Wales
Category:National Assembly for Wales
Category:Welsh devolution
Category:Autonomy referendums
Category:March 2011 events in the United Kingdom |
;;; TOOL: run-gen-wasm-bad
magic
version
section(TYPE) { count[1] function params[0] results[1] i32 }
section(FUNCTION) { count[1] type[0] }
section(CODE) {
count[1]
func {
locals[
decl_count[1]
local_count[leb_i32(3334443763)] ;; <- huge number of locals
42 ;; <- invalid type
]
}
}
(;; STDERR ;;;
000001e: error: expected valid local type
000001e: error: expected valid local type
;;; STDERR ;;)
|
The spec defines the LATM/LAOS container format, not how to put it into MP4. In fact, it would make no sense to put it into MP4 like that, instead the underlying AAC should be extracted and put into the MP4 container, no sense in putting a container into a container. |
--- net/minecraft/client/gui/GuiIngameMenu.java
+++ net/minecraft/client/gui/GuiIngameMenu.java
@@ -6,12 +6,16 @@
import net.minecraft.client.resources.I18n;
import net.minecraft.realms.RealmsBridge;
-public class GuiIngameMenu extends GuiScreen {
+public class GuiIngameMenu extends GuiScreen/* WDL >>> */ implements wdl.ducks.IBaseChangesApplied/* <<< WDL */ {
protected void init() {
int i = -16;
int j = 98;
GuiButton guibutton = this.addButton(new GuiButton(1, this.width / 2 - 100, this.height / 4 + 120 + -16, I18n.format("menu.returnToMenu")) {
public void func_194829_a(double p_194829_1_, double p_194829_3_) {
+ /* WDL >>> */
+ wdl.WDLHooks.handleWDLButtonClick(GuiIngameMenu.this, this); // XXX this call is awkward, maybe just make it for the disconnect button?
+ /* <<< WDL */
+
boolean flag = GuiIngameMenu.this.minecraft.isIntegratedServerRunning();
boolean flag1 = GuiIngameMenu.this.minecraft.isConnectedToRealms();
this.active = false;
@@ -64,6 +68,10 @@
GuiIngameMenu.this.minecraft.displayGuiScreen(new GuiStats(GuiIngameMenu.this, GuiIngameMenu.this.minecraft.player.getStats()));
}
});
+
+ /* WDL >>> */
+ wdl.WDLHooks.injectWDLButtons(this, buttons, this::addButton);
+ /* <<< WDL */
}
public void tick() {
|
The banking industry is changing and Blockbank is riding the wave to the new generation. Recognizing that the paradigms of banking are melting away, co-founders Adam Cuffe and Yusuf Sozistrive forward in modernizing banking solutions with blockchain’s wind under their wings.
While the rush to jump on the ICO bandwagon has gripped many new start-ups, Blockbank have taken the time to ensure that every step of their own journey has been fruitful in providing a more solid foundation for business — that will support the future of commercial banking. While a wealth of ‘banking’ start-ups revel in the panegyrics attributed to them in crypto space media, many of these bolting blooms wilt following their token generation events, as their banking licenses are unapproved.
Their conceptual businesses appear to blossom on the basis of peer-to-peer lending schemes and buckets of optimism, yet there has never been a fully licensed bank on blockchain — until now.
The first fully licensed bank on blockchain, Blockbank is leveraging cutting-edge technology to pioneer commercial banking solutions to close the global funding gap.
What is Blockbank?
Blockbank, as stated above, is the first fully licensed cryptobank. Despite the phrase ‘cryptobank’ being coined by other companies, there has been no real bank on the blockchain until this point.
Blockbank is offering commercial loans on a global scale by using blockchain technology and their own ERC20 coin. By paying loan fees in BBRT — Blockbank’s token — commercial entities can now apply for funding from anywhere in the world without excessive third-party payment gateway fees, high-cost currency exchange fees, and jurisdictional blocks.
Aside from the cross-border transactional capabilities of the software, thanks to their approved banking license, Blockbank are legally able to provide commercial lending products to customers worldwide — closing the funding gap legitimately.
What’s more, because Blockbank is grounded in blockchain technology, all customers enjoy the benefits of this reflected in their commercial financial products. For example, as there is no need for a middleman, savings in transactions fees are directly related to savings in interest rates. In this respect,
Moreover, their deployment of smart contracts to automatically manage and execute funding also cuts back on costs and time. This means that funding is available more quickly, while also attributing to the lower interest fees.
Additionally, while current banks and financial institutions are constantly gracing the media with yet another hack or malicious attack, blockchain technology provides extra security to protect Blockbank customers. Not only does the immutability of a decentralized ledger provide crystal-clear transparency in operations, the high levels of encryption and the very quiddity of a decentralized system provides exceptionally superior security to conventional banks.
In short, thanks to their innovative use of this trailblazing technology and their full banking license, Blockbank are able to leverage blockchain to provide affordable, secure, asset-backed, commercial FIAT loans, accessible across a global network.
What About Other Cryptobanks?
The term ‘Cryptobank’ has already been floating around the blockchain space, with companies shoving it into their taglines to coin the phrase to reflect any fintech institution vaguely representing a bank.
However, to be a bank, a company must have a banking license. Companies without banking licenses are third-party financial institutions, restricted to certain activities. While it may walk like a bank and talk like a bank, the lack of licenses means it isn’t really a bank.
As the term ‘Cryptobank’ isn’t restricted to such pernickety specific definitions as the word ‘Bank’, blockchain and crypto companies use the term to imply their trustworthiness, expertise, and power by including the suffix ‘bank’. For potential customers, it gives these entities more credibility.
While most often this isn’t to deceive people into losing money, it is important to be aware that existing ‘Cryptobanks’ do not hold these licenses in the way that Blockbank does.
Let’s take a look at some of the existing enterprises in the blockchain space that are referring to themselves as ‘Cryptobanks’ or are offering similar banking services to conventional banks.
Cryptobank.co
Cryptobank.co isn’t a bank whatsoever. It can be considered more of a currency exchange than anything else — or perhaps a trading platform. Cryptobank sets out to help provide stablecoins. These are cryptocurrencies pegged to the same value as regular FIAT currency.
In this sense, Cryptobank isn’t a cryptobank at all, but instead allows its users to gain cryptocurrencies using their FIAT currencies, without worrying about the volatile crypto rates of coins like Bitcoin.
European Cryptobank
European Cryptobank appears to be a wallet for cryptocurrency combined with a trading platform and a series of financial analysis services. As European Cryptobank doesn’t have a banking license, they can’t provide bank services in the same way in which Blockbank are able. While Blockbank can offer commercial loans, European Cryptobank serves only as a storage for cryptocurrency.
Nebeus
Nebeus provides peer-to-peer loans, which is a new phenomenon using the concept of the sharing society. P2P loans operate a little like crowdfunding and allow global microloans between customers. Nebeus also don’t have a banking license and are not able to offer commercial loans. Businesses looking for affordable commercial products won’t find them at Nebeus.
Cryptov8 and World Bit Bank
Cryptov8 and World Bit Bank are very similar concepts. They are looking to become proper cryptobanks offering personal loans, and are currently seeking licenses. However, both are currently in their ICO phases without having already attained an approved license. With respect to token investors, if these two companies are unable to gain banking licenses, they will be unable to offer their services — leading to a drop in token value.
Not only does Blockbank offer commercial rather than personal loans, it also differs in the fact that Blockbank already has a banking license. Blockbank made certain to acquire their banking license approval beforeentering the crypto space with an ICO.
Equally, both these companies only offer loans in cryptocurrency, not in FIAT. Blockbank is offering affordable FIAT commercial loans. While assets can be in cryptocurrency, loans are paid in FIAT straight to the successful applicant’s bank account.
Unchained Capital
Unchained Capital are a familiar investment face in the crypto space. They offer both commercial and personal loans in FIAT cash but only in return for cryptocurrency assets. This company is not based on blockchain and wires cash in return for the cryptocurrency assets. Unchained Capital does not have a banking license and cannot provide the financial services that Blockbank are legally, technologically, and professionally able to tender.
What Are the Benefits of a Banking License?
If these companies are able to pose as banks behind the loose definition of ‘cryptobank’, why bother getting a banking license at all? Surely these companies show that there is no need for a banking license whatsoever if they’re storming ahead.
It’s confusing but actually these blockchain start-ups limit themselves by not having banking licenses. By being the first fully licensed bank on blockchain, Blockbank are able to leap over these competitors into a next generation of banking, without the restrictions of legality or consumer scepticism.
Legality
Firstly, banking licenses are awarded to companies meeting the legal standards of banking entities. When an enterprise is dealing with your funds, ensuring they are in compliance with all regulations and standards demonstrates their stringency in observing rules and codes of conducts.
For companies that flout this, jumping through loopholes to appear as banks without the proper licensing, they are limited to only carry out certain services.
Imagine relishing the thought of a cold pint after a hard day of work, walking into a building labelled ‘Pub’, only to realise they couldn’t service beer as they have no alcohol license. That’s what these other ‘cryptobanks’ are doing. While not illegal, their lack of license restricts the activities in which they can be involved.
However, if those companies overstep the mark, crossing over into ‘banking practices’ territory, they transgress their legal boundaries. This can result in repercussions that affect the share prices of the company or in the case of crypto enterprises, usually the value of their tokens.
With Blockbank, by acquiring full licensing before their ICO, they aren’t putting themselves in the position of legal turmoil at a later date, and are able to conduct their activities without pressure of rebuttal. For token holders, this means that Blockbank’s BBRT is far less likely to drop in value at a later date.
Trust
Hacks and data breaches are becoming commonplace in traditional banking. This is one of the main reasons that it is no surprise that blockchain technology is infiltrating the industry at such a rapid rate. However, while conventional banks have been publicly garrulous about their potential integration of blockchain technology, their current systems remain the same leading to security breaches. These persistent security issues leave customers worried about their financial futures.
This could give the impression that the average person is frenetically combing through alternative options for personal and commercial banking. Sadly, this is not the case.
While many blockchain evangelists expect the general public to sheepishly gallop into the open arms of cryptobanking, most everyday people are unsure about the unknown. A puckishly complex concept, blockchain technology is often far too confusing for busy working people to willing delve into, and therefore leaves them rejecting the benefits of the technology — especially in areas such as banking.
Moreover, with the failures of many blockchain start-ups and a lack of legitimacy in many others, those who initially had cryptocurrency excitement are also now a little wary. In this light, despite the security issues with conventional banks, the smattering of ‘cryptobanks’ that have currently popped up pose little serious competition.
While most people don’t understand blockchain, they understand what a banking license is — to a point. Why would one enter into a loan agreement with a company that calls itself a bank without a banking license? Even if they do claim to be ‘this new blockchain thing’?
Legally, these enterprises may be following all regulations. However, for the average customer, a company calling itself a bank without a license paints a picture of untrustworthiness. Moreover, the lack of a banking license questions their credibility, the legitimacy of their services, and their compliance with regulations.
For the average person looking for an affordable loan anywhere in the world, who has the nous to enter the blockchain space, Blockbank’s full banking license provides certificated trustworthiness, bolstering Blockbank’s legitimacy and credibility.
Extended Services
Not only does Blockbank’s banking license mean that they are able to offer low-cost commercial FIAT loans globally, it also means that they are a fully licensed commercial bank.
Currently only offering commercial loans, the future for Blockbank looks to be bright. With plans to expand their service range to become a more comprehensive one-stop-shop for commercial entities and governmentS, Blockbank aim to go public in a few years’ time.
Compounding this, Blockbank’s BBRT decentralized token economy opens the doors to their ERC20 token becoming a global payment mechanism. This helps commercial entities smooth the logistics of their supply chains utilizing Blockbank’s funding — while also thickening their revenue streams by accepting the currency and generating loyalty.
By combining the token economy with their plans for extended commercial banking services, Blockbank aims to pave the way to a more bespoke yet automated banking experience, with hassle-free affordable funding services, and financial expertise to support every project.
BBRT tokens are now available on the LATOKENexchange
Blockbank’s Platforms
https://bbcl.io/
https://theblock-bank.com
https://www.theblockbankexchange.com |
Q:
jquery validation - addMethod/remote - error message in json response
I'm trying to either use the remote method, or add a method that mimics the remote method to be able to send the entered data to a web service and get a json response back with the error state and error message.
so I have this json response:
{
"isError": "true",
"errorMessage": "The User Name you chose is already in use. Please enter another name."
}
I've used the remote method to get a true/false response, but not with extra data.
Any help would be appreciated.
Edit
Tried this, but of course it didn't work because the variable is not a global variable...
$.validator.addMethod("uniqueUserName", function(value, element) {
$.ajax({
type: "POST",
url: "js/username.json",
contentType: "application/json; charset=utf-8",
dataType:"json",
data: "{'" + $('#enterEmail').attr('id') + "': '" + $('#enterEmail').val() + "'}",
dataFilter: function(data) {
var isError = data.isError;
var uniqueError = data.errorMessage;
if(isError == "true"){
return false;
}
}
})
}, uniqueError); //this last line would typically be: }, "my error message");
see fiddle:
http://jsfiddle.net/jasonday/fWk5u/
A:
I ended up figuring it out. The return success is what I was failing - I kept returning, returning true, or returning false - and every one of them would "fail" validation.
remote: {
type: "POST",
url: "js/username.json",
contentType: "application/json; charset=utf-8",
dataType:"json",
data: "{'" + $('#enterEmail').attr('id') + "': '" + $('#enterEmail').val() + "'}",
dataFilter: function(data) {
var json = JSON.parse(data);
if(json.isError == "true") {
return "\"" + json.errorMessage + "\"";
} else {
return success;
}
}
}
|
Archived Content
Information released online from June 2012 to September 2017.Note: Content in this archive site is NOT UPDATED, and external links may not function. External links to other Internet sites should not be construed as an endorsement of the views contained therein.
Impact Newsletter - March 1, 2013
Friday, March 1, 2013
Volume Four, Issue Four
U.S. Government Historic Visit to Somalia
The President of Somalia and Administrator Raj Shah during his visit.
USAID
USAID Administrator Rajiv Shah visited Somalia Feb. 21 as a part of a multi-country trip that also included stops in Kenya and Tanzania. His visit to Somalia marks the first trip by a senior U.S. Government official in 20 years.
Shah told the Associated Press,"America is prepared and committed to stand with the people of Somalia and their new, now-recognized and legitimate government as it tries to build both peace and prosperity." Shah pledged $20 million in humanitarian assistance. Watch Administrator Shah on MSNBC's Mitchell Reports.
Administrator Shah Travels to India and Burma
The clinic provides free primary healthcare services on the Thai-Burma border and mobile clinics serving more than 17,000 Internally Displaced Persons in Burma.
Peter Biro / The IRC
Administrator Shah will visit Mumbai, India, from March 5-6 to announce significant new programs and partnerships that will reduce preventable child deaths. While in Mumbai, the Administrator will meet with senior government officials, members of India's private sector and representatives from civil society, and deliver keynote remarks at the Indian Philanthropy Forum and the Asia Society.
Administrator Shah will make his first ever visit to Burma from March 7-8. where he will further advance the U.S.-Burma Partnership for Democracy, Peace and Prosperity, building upon President Obama's recent visit to the country. Administrator Shah's visit will highlight the progress USAID has made in moving forward our partnership with Burma, as well as with the American private sector, universities, and non-governmental organizations to provide humanitarian, democracy, human rights, governance, and economic development assistance to Burma.
For updates on Administrator Shah's trip, follow USAID Burma on Twitter. Learn more about our work in Burma and India.
USAID Wins Mobile Development Award
USAID received the Best Government Policy for Mobile Development award for its work to expand the use of mobile technology by women in developing countries. The recognition came earlier this week at the 2013 Mobile World Congress in Barcelona, Spain. This annual event is the mobile industry's largest trade association that attracts over 70,000 participants.
During the same event, USAID, along with partners Qtel Group and AusAID, announced the winners of the GSMA mWomen Design Challenge, which aims to redefine the smartphone user experience for resource-poor women in emerging markets. The challenge was launched at the Social Good Summit during the 2012 United Nations General Assembly.
The Mobile World Congress in Barcelona.
Joseph Lago / AFP
Qtel Group CEO Dr. Nasser Marafih presented the Grand Prize of $20,000 USD to Jeremy Canfield, Sarah Fathallah and Angel Kittiyachavalit for their design, 'Sahel Shake'. Second place, with a prize of $10,000 USD, was awarded to Aloke Pillai of the York Sheridan Design Program for 'mpower'. The Emerging Talent Prize of $10,000 USD, which is reserved for an entry from emerging markets to ensure entrepreneurs are able to compete alongside professional design firms, was awarded to Raphael Mutiso, from Kenya for his entry 'Simplified Grayscale Power Efficient Interface.' Click herefor a description of the winning programs and finalists. Check out our Storify feed for a recap of the week.
International Women's Day: Call for Your Photos
Women learn about their family planning options in Bangladesh.
JSI (USAID/Deliver)
To commemorate International Women's Day, USAID's Global Health Bureau is calling for photos to showcase women champions around the world who have benefited from or who work on USAID-funded health projects.
The bureau is seeking photographs highlighting women working to make a difference in the lives of other women, families, and communities. Select photos will be featured on the USAID website, used in an e-card sent to our external distribution list, and highlighted on the Global Health Bureau's Twitter and Facebook accounts.
All photographers will receive credit for themselves and their organization. Please submit high-res photographs with caption and credit to ghcommunicationsteam@usaid.gov by close of business March 5. Captions should be descriptive and no longer than 200 words. Please include any relevant links to your project or success stories that we can feature. By submitting a photograph, you are giving USAID the right to use it in current and future communications.
DC Details:
On the Hill
Yesterday, Mark Feierstein, USAID's Assistant Administrator for Latin America and the Caribbean, testified before the House Committee on Foreign Affairs on President Barack Obama's second term development priorities for the region. View his remarks here.
On March 7 from 11 a.m. to noon EST, Feierstein will take questions on Twitter about our work with Latin America and the Caribbean. Don't forget to tweet @MarkFeierstein your questions using the hashtag #AskUSAID.
Public ACVFA Meeting Announced: March 14, 2013
On March 14, USAID will hold a public meeting of the Advisory Committee on Voluntary Foreign Aid (ACVFA). Chaired by Jack Leslie (Chairman, Weber Shandwick), ACVFA is made up of 25 private citizens who represent the diverse views of USAID's key stakeholders - private and voluntary organizations, cooperatives, foundations, private firms, professional societies, and universities. ACVFA was established by President Truman in 1946, and its basic mandate remains one of providing substantive advice, analysis, and recommendations to the USAID Administrator on key development issues and challenges. The public meetings serve as one of several ways in which USAID and the Committee interact with the public and share information about the collective work we are doing in global development. The next meeting will be held on Thursday, March 14, 2013 at 2pm EST in the Ronald Reagan Building. Please register here to attend.
USAID In the News
Can't get enough of USAID? The Press Trust of India reports on USAID's announcement that Administrator Rajiv Shah, the "highest ranking Indian-American in the Obama Administration," will travel to India and Myanmar in March. Shah is expected to "announce a major program to reduce preventable child deaths" in Mumbai.TheChristian Science Monitor reports on the U.S. policy of not branding aid parcels aims to ensure they reach Syrians. USAID's Nancy Lindborg said, "We are not putting flags on the aid so that it's perhaps not as visible as it is in other situations. Our priority is to ensure that it reaches people and that it doesn't create additional insecurity." The Wall Street Journal quoted Shah, saying "India is the most important country in the world when it comes to saving children's lives and if they can achieve success and we can support it, the world will be well on its way to achieving an extraordinary and historic result of ensuring that every single child around the world lives to see their fifth birthday." The Times Of Central Asia reports that USAID has joined the fight against TB in Kyrgyzstan. USAID representative Carey Gordon stated, "Over the past decades, tuberculosis remains one of the relevant issues for Kyrgyzstan's healthcare for many reasons, including socio-economic issues, and because of poorly established TB detection and treatment in the country." In Jordan, the Women and Children's Hospital in Mafraq is now double its size a year ago after a USAID renovation. It serves both Jordanians and Syrian refugees, and the hospital is one of 14 USAID renovated in the past three years throughout the country according to Zawya.
Have you Seen our Blog?
Check out the Impact Blog to stay updated on the latest information about USAID programs in Washington and around the world. Read stories from the field, hear from development experts, and view weekly photos and videos of development in action. You can also join the conversation on social media! |
Does Bruce Regret Becoming Caitlyn? Sources Confirm...
We've all experienced buyer's remorse. You buy that new shirt and take off the tags, only to realize it doesn't fit like you thought it would. However, some things are a little harder to take back than others. Like a sex change.
That, amongst many other reasons, is why it is so detrimental that young people are being sold the lie that they should "change genders" (as if that's possible) if they are unhappy with their current reality. Stars like Bruce/Caitlyn Jenner have made it seem popular and glamorous to "free yourself" from the chains of the gender you were born with. But reports are coming out that Bruce is not experiencing the joy and freedom he was expecting.
The Christian Post reports that Ian Halperin, a No. 1 New York Times bestselling author, is writing a book about the famous Kardashian family. Through his research, Halperin has been told by several sources close to Caitlyn that he is unhappy with his current life. "One source confirmed to me Caitlyn has made whispers of 'sex change regret,' hinting she might go back to being Bruce Jenner," Halperin said.
In fact, the source shared that a "de-transition" is quite likely in the next couple of years. "It hasn't been easy for Caitlyn, it's been very hard. She's thrilled she has raised awareness about how transgender people have long been discriminated against but I think there's a chance she'll de-transition in the next couple years. I don't think it would surprise anybody in her inner circle. It has been much harder than she anticipated. My heart goes out to her and I know her true friends will be there to support her on whatever path she chooses."
And a recent study in Sweden confirmed that Bruce's unhappiness with his decision is not rare. "The study, which followed 191 male-to-female gender reassignments and 133 female-to-male gender reassignments from 1973-2003, found that suicide attempts and in-patient psychiatric treatment actually increased in Sweden among those who had a sex change," shares The Christian Post.
It makes sense, since you can never really change your true sexual identity. But it is sad. And it's even more sad that young people are looking at Jenner as inspiration, while in reality, he may be quite unhappy and regretful. What do you think of these reports? Do you think Jenner is unhappy with his decision? Do you think he will ever change back to Bruce? |
The present invention relates to cable management. More specifically, the present invention relates to cable management structures for use with electronic equipment racks.
In the telecommunications industry, electronic equipment is housed in a series of equipment racks to permit higher densities of connections per unit of floor space. Installing a large number of connections in an equipment rack is efficient with respect to floor space but places a premium on the ability to manage and maintain the cables leading to and away from these equipment racks. A telecommunications installation might have outside plant or network infrastructure cables connected to switching equipment housed in a series of telecommunications equipment racks, local distribution cables connected to the same switching equipment in the racks, and patch cords and cross-connect jumpers linking the switching equipment. The switching equipment being connected can be located within the same rack, in adjacent racks, in racks within the same linear row or aisle, or in racks in different aisles. In addition, electrical power and thus power cables must be supplied to the switching equipment. All of these cables must be provided with paths or cable management structures within the equipment racks and between the equipment racks.
These network infrastructure, patch, jumper and power cables share the available cable management structures within a telecommunications installation. For dense installations, it is desirable to provide some manner of grouping like cables together to improve maintenance and operational efficiency. For instance, cross-connect cables and network infrastructure cables may share the same vertical path on an equipment rack. The cross-connect cables are accessed and moved much more frequently than the network interface cables. Therefore, some way of grouping and segregating these cables within the same vertical cable path is desirable.
In addition, segregation and separation of cross-connect cables is also desirable. Some cross-connect cables link devices on the same rack while other cross-connect cables link equipment on separate racks. The racks within a particular telecommunications installation will have a series of horizontal paths or troughs which serve both types of cross-connect cables. For improved operational and maintenance efficiency, some apparatus for organizing and segregating these cross-connect cables as intra-rack and inter-rack should be provided. Other improvements to these troughs to provide better access to and visibility of the cables in the troughs, and to allow easier entry and exit of cables to the troughs, are also desirable.
There is an ever-increasing demand for additional telecommunications connections within existing installations. It is desirable to supply these connections within the same physical racks and wiring closets. Devices which allow switching and connection modules of higher levels of connection density are desirable. In addition, in a telecommunications equipment rack, it is desirable to have some ability to store small tools and equipment as well as additional patch cords for cross-connecting circuits. This will allow minor tasks, such as switching and small repairs to be done at that rack with materials close at hand. However, the provision of such a storage area should not detract from the number of circuits that a telecommunications rack can supply.
The present invention relates to electronic equipment racks which provide a higher density of connections within a given floor space, provide improved cable management structures, and provide storage of tools and cables on the rack itself without sacrificing connection space.
A first aspect of the present invention relates to cable guides including first and second ring structures which define first and second vertical cable channels, respectively. The second ring structure is hingedly mounted to the first ring structure and moves from a position closing access to the first channel and a second position allowing access to the first cable channel. A further aspect of the present invention relates to the use of cable guides on a telecommunications equipment rack to define vertical cable channels for managing cables extending from equipment attached to the rack. A further aspect of the present invention relates to a method of inserting cables into vertical cable channels defined by cable guides.
A further aspect of the invention relates to cable troughs having a mounting wall, a bottom and two outer walls, with cable access openings in the bottom. One embodiment of these cable troughs defines two horizontal cableways, between the mounting wall and the first outer wall and between the first outer wall and the second outer wall. Access is provided into both cableways through openings in the bottom and an opening allowing cables to move from one cableway into the other cableway is provided in the first inner wall. A second embodiment of the cable troughs defines a single cableway between the first and second outer walls and provides access to the cableway through an opening in the bottom and an opening in the first outer wall. A further aspect of the present invention relates to the use of cable troughs to define upper and lower horizontal cable troughs on a telecommunications equipment rack. A further aspect of the present invention relates to a method of managing cables extending from equipment mounted in a telecommunications equipment rack using horizontal cable troughs. A further aspect of the present invention relates to an electronic equipment rack with a storage drawer attached, wherein the storage drawer is mounted in the lowest position on the rack.
A further aspect of the invention relates to cross aisle connection panels and ring structures attached to cross aisle panels defining vertical cable channels. A further aspect of the present invention relates to the installation of cross aisle panels near the top of telecommunications equipment racks where the ring structures cooperate with cable guides to form vertical cable channels.
A further aspect of the invention relates to cross-connect modules for connecting telecommunications equipment. These cross-connect modules include a front mounted jack field and rear connections mounted on several connector planes, the connector planes being offset horizontally from each other. A further aspect of the present invention relates to a cross-connect module having three sections, with each section having a different width, a jack field on the front of the first section and rear connectors being mounted to the rear of the second and third sections. A further aspect of the present invention relates to a telecommunications rack with a cross-connect module installed, the cross-connect module having three sections, with each section having a different width, a jack field on the front of the first section and rear connectors being mounted to the rear of the second and third sections. A further aspect of the present invention relates to a cross-connect cable tray attached to the rear of a cross-connect module and removable from the module without tools.
A variety of advantages of the invention will be set forth in part in the description that follows, and in part will be apparent from the description, or may be learned by practicing the invention. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as claimed. |
/****************************************************************************
* Copyright (c) 2003-2012,2014 Free Software Foundation, Inc. *
* *
* Permission is hereby granted, free of charge, to any person obtaining a *
* copy of this software and associated documentation files (the *
* "Software"), to deal in the Software without restriction, including *
* without limitation the rights to use, copy, modify, merge, publish, *
* distribute, distribute with modifications, sublicense, and/or sell *
* copies of the Software, and to permit persons to whom the Software is *
* furnished to do so, subject to the following conditions: *
* *
* The above copyright notice and this permission notice shall be included *
* in all copies or substantial portions of the Software. *
* *
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS *
* OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF *
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. *
* IN NO EVENT SHALL THE ABOVE COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, *
* DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR *
* OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR *
* THE USE OR OTHER DEALINGS IN THE SOFTWARE. *
* *
* Except as contained in this notice, the name(s) of the above copyright *
* holders shall not be used in advertising or otherwise to promote the *
* sale, use or other dealings in this Software without prior written *
* authorization. *
****************************************************************************/
/*
* $Id: background.c,v 1.15 2014/08/09 22:31:23 tom Exp $
*/
#define NEED_COLOR_CODE 1
#define NEED_COLOR_NAME 1
#include <color_name.h>
static int default_bg = COLOR_BLACK;
static int default_fg = COLOR_WHITE;
static void
test_background(void)
{
NCURSES_COLOR_T f, b;
int row;
int chr;
if (pair_content(0, &f, &b) == ERR) {
printw("pair 0 contains no data\n");
} else {
printw("pair 0 contains (%d,%d)\n", (int) f, (int) b);
}
getch();
printw("Initializing pair 1 to red/%s\n", color_name(default_bg));
init_pair(1, COLOR_RED, (NCURSES_COLOR_T) default_bg);
bkgdset((chtype) (' ' | COLOR_PAIR(1)));
printw("RED/BLACK\n");
getch();
printw("Initializing pair 2 to %s/blue\n", color_name(default_fg));
init_pair(2, (NCURSES_COLOR_T) default_fg, COLOR_BLUE);
bkgdset((chtype) (' ' | COLOR_PAIR(2)));
printw("This line should be %s/blue\n", color_name(default_fg));
getch();
printw("Initializing pair 3 to %s/cyan (ACS_HLINE)\n", color_name(default_fg));
init_pair(3, (NCURSES_COLOR_T) default_fg, COLOR_CYAN);
printw("...and drawing a box which should be followed by lines\n");
bkgdset(ACS_HLINE | (attr_t) COLOR_PAIR(3));
/*
* Characters from vt100 line-drawing should be mapped to line-drawing,
* since A_ALTCHARSET is set in the background, and the character part
* of the background is replaced by the nonblank characters written.
*
* Characters not in the line-drawing range are usually sent as-is.
*
* With SVr4 curses it is possible to rely on this to mix uppercase text
* with the (lowercase) line-drawing characters. ncurses uses some of
* the uppercase characters for encoding thick- and double-lines.
*/
row = 7;
mvprintw(row++, 10, "l");
for (chr = 0; chr < 32; ++chr)
addch(' ');
printw("x\n");
chr = 32;
while (chr < 128) {
if ((chr % 32) == 0)
mvprintw(row++, 10, "x");
addch((chtype) ((chr == 127) ? ' ' : chr));
if ((++chr % 32) == 0)
printw("x\n");
}
mvprintw(row++, 10, "m");
for (chr = 0; chr < 32; ++chr)
addch(' ');
printw("j\n");
getch();
bkgdset((chtype) (' ' | COLOR_PAIR(0)));
printw("Default Colors\n");
getch();
printw("Resetting colors to pair 1\n");
bkgdset((chtype) (' ' | COLOR_PAIR(1)));
printw("This line should be red/%s\n", color_name(default_bg));
getch();
printw("Setting screen to pair 0\n");
bkgd((chtype) (' ' | COLOR_PAIR(0)));
getch();
printw("Setting screen to pair 1\n");
bkgd((chtype) (' ' | COLOR_PAIR(1)));
getch();
printw("Setting screen to pair 2\n");
bkgd((chtype) (' ' | COLOR_PAIR(2)));
getch();
printw("Setting screen to pair 3\n");
bkgd((chtype) (' ' | COLOR_PAIR(3)));
getch();
printw("Setting screen to pair 0\n");
bkgd((chtype) (' ' | COLOR_PAIR(0)));
getch();
}
static void
usage(void)
{
static const char *msg[] =
{
"Usage: background [options]"
,""
,"Options:"
#if HAVE_ASSUME_DEFAULT_COLORS
," -a invoke assume_default_colors, repeat to use in init_pair"
#endif
," -b XXX specify background color"
#if HAVE_USE_DEFAULT_COLORS
," -d invoke use_default_colors, repeat to use in init_pair"
#endif
," -f XXX specify foreground color"
};
size_t n;
for (n = 0; n < SIZEOF(msg); n++)
fprintf(stderr, "%s\n", msg[n]);
ExitProgram(EXIT_FAILURE);
}
int
main(int argc GCC_UNUSED, char *argv[]GCC_UNUSED)
{
#if HAVE_ASSUME_DEFAULT_COLORS
int a_option = 0;
#endif
#if HAVE_USE_DEFAULT_COLORS
int d_option = 0;
#endif
int n;
setlocale(LC_ALL, "");
while ((n = getopt(argc, argv, "ab:df:")) != -1) {
switch (n) {
#if HAVE_ASSUME_DEFAULT_COLORS
case 'a':
++a_option;
break;
#endif
case 'b':
default_bg = color_code(optarg);
break;
#if HAVE_USE_DEFAULT_COLORS
case 'd':
++d_option;
break;
#endif
case 'f':
default_fg = color_code(optarg);
break;
default:
usage();
}
}
#if HAVE_USE_DEFAULT_COLORS && HAVE_ASSUME_DEFAULT_COLORS
if (a_option && d_option) {
fprintf(stderr, "Use either -a or -d option, but not both\n");
ExitProgram(EXIT_FAILURE);
}
#endif
initscr();
cbreak();
noecho();
if (has_colors()) {
start_color();
#if HAVE_USE_DEFAULT_COLORS
if (d_option) {
printw("Using default colors...\n");
use_default_colors();
if (d_option > 1) {
default_fg = -1;
default_bg = -1;
}
}
#endif
#if HAVE_ASSUME_DEFAULT_COLORS
if (a_option) {
printw("Using assumed colors %s/%s...\n",
color_name(default_fg),
color_name(default_bg));
assume_default_colors(default_fg, default_bg);
if (a_option > 1) {
default_fg = -1;
default_bg = -1;
}
}
#endif
test_background();
} else {
printw("This demo requires a color terminal");
getch();
}
endwin();
ExitProgram(EXIT_SUCCESS);
}
|
Introduction
############
https://thomas-cokelaer.info/tutorials/sphinx/rest_syntax.html#id8
Preface
-------
Sub Preface
^^^^^^^^^^^
This is an image with caption:
.. figure:: img/web_gui_host_details.png
:align: center
:alt: Host Details
:scale: 95
The Home View of the Host Details Page
This is an inline |cog_icon| image.
.. |cog_icon| image:: img/cog_icon.png
This is inline code
:code:`--online-license-check`
This is a block of bash code:
.. code:: bash
ntopng -h
ntopng -i wlan0
.. note::
This is a note
.. warning::
This is a warning
This is a list:
- An element
- Another element
Footnote reference [1]_
.. [1] This is a footnote
See `another page`_ for more details
.. _`another page`: another_page.html
|
The Coverage of Schultz’s Slutty Slur Against Ingraham
That’s how LauraIngrahamSucks.com handled the news of MSNBC liberal host Ed Schultz calling conservative commentator Laura Ingraham a “right-wing slut” on his Tuesday radio program. Schultz tried to backtrack and call her a “talk slut” but the damage was done and those in the conservative blogosphere are screaming “mysogyny” and wondering whether MSNBC will suspend him.
“You’ll recall that the “M” in MSNBC stands for misogyny,” wrote Michelle Malkin on her website while Big Journalism essentially mimicked the “M is for misogny” mantra. The Daily Caller‘s Jeff Poor, meanwhile, writes, “So much for civility, at least at MSNBC – the home of the ‘Lean Forward’ mantra.” The publication’s headline calls Schultz “unhinged.” National Review Online‘s Media Blog comes right out with it. Nat Brown writes, “This is disgusting.” Mediaite‘s Jon Bershad also doesn’t soft peddle it. He writes, “Yeah. Apparently Ed Schultz has forgotten that he’s not on Saturday Night Live. And that it isn’t 1978.” Bershad tries to contemplate a scenario when it might fit for Schultz to call Ingraham a slut: “Maybe if Ingraham herself had walked into the studio wearing a shirt with the words ‘Hey, please call me a slut’ written in big letters. Even then it would be a bad idea.” Weasel Zippers, which “scours the bowels of the internet” writes simply, “Amazing what the left can get away with saying with virtually no repercussions.” The Radio Equalizer’s Brian Maloney made clear what he thinks ought to happen. “Bye-bye, Ed Schultz,” he wrote. “We’ll especially miss your gigantic ego, unending rage and all-around delightful personality. Will Comcast tolerate this kind of behavior from one of its cable hosts, particularly on top of so many past antics? It was fun while it lasted. See ya.”
Other outlets, such as RealClearPolitics, played it stick straight, ran the clip and offered no opinion. HuffPost, known for its liberal slant, also made no significant comment and ran the audio and quotes: “Ed Schultz called conservative radio host Laura Ingraham a ‘right-wing slut’ on his Tuesday radio show. Schultz was criticizing Ingraham for what he saw as her hypocritical criticism of President Obama for drinking beer in Ireland while a tornado was destroying Joplin, Missouri.”
See the full text of Schultz’s words after the jump…
ED SCHULTZ (02:52): And what do the Republicans thinking about? They’re not thinking about their next-door neighbor. They’re just thinking about how much this is going to cost. President Obama is going to be visiting Joplin, Mo., on Sunday but you know what they’re talking about, like this right-wing slut, what’s her name?, Laura Ingraham? Yeah, she’s a talk slut. You see, she was, back in the day, praising President Reagan when he was drinking a beer overseas. But now that Obama’s doing it, they’re working him over. |
Q:
Anyone know of good tutorials for creating an Augmented Reality application from scratch or using an open source framework?
I am looking for good tutorials that go through every step of creating an AR application. It would be beneficial if it also covers some of the theory behind optics and such.
A:
A good setup is to use ARToolKit plus osgART.
The tutorial of ARToolKit also explains also some of the principles of Computer Vision:
http://www.hitl.washington.edu/artoolkit/documentation/
osgART is the ARToolKit for OpenSceneGraph and abstracts some of the principles of using a computer vision based tracking in a scenegraph application
Both toolkits have a large and vibrant development community.
|
You may have remembered to spring forward this past weekend, but your body clock is likely telling you that you’re at work this morning at 7 instead of 8. It also may be saying you’re eating lunch at 11 a.m. instead of noon and dinner at 5 p.m. rather than 6.
Perhaps, too, you are still missing that hour of sleep you lost.
We’ve found studies that suggest daylight saving time can be hazardous to your health. Research by the University of Michigan in 2009 correlated the time change to an increase in injuries in the workplace. It maintained that the average person was sleeping about 40 minutes less per night.
Tim Roenneberg, a chronobiologist at Ludwig-Maximilians University in Munich, Germany, said his studies show that our circadian body clocks — set by light and darkness — never adjust to gaining an “extra” hour of sunlight at the end of the day during daylight saving time.
“The consequence of that is that the majority of the population has drastically decreased productivity, decreased quality of life, increasing susceptibility to illness and is just plain tired,” Roenneberg said.
Conversely, other studies show that daylight saving time enhances health because it provides impetus for people to spend more time outdoors and encourages exercise.
Most people do relish the fact we have longer hours for sunshine but look forward to the fall when some people believe we actually gain an extra hour of sleep. That’s somewhat of an illusion because there are still 24 hours in a day.
It does seem people are less moody when the sun is out longer.
Daylight saving time has a long history and was originally implemented for the benefit of the railroads or farmers depending on the source used. As time has passed, the railroads have ceased to be the main mode of passenger travel across the country and our farmers have become fewer in number.
Many still don’t buy the claim that daylight saving time saves energy and resources. It’s all a bit complicated and changing time has always been somewhat of a contentious issue.
Not all states observe daylight saving time. Before 2005, Indiana never changed its time.
So, we’re wondering why we need to fall back. If there is no illusionary lost hour of sleep as a point of reference, we would never miss it again. And our body clocks could remain in sync.
We believe the time has come to set our clocks to our current time for the last time.
Will it ever be a burning issue in the Legislature? Only time will tell. |
Q:
How do I animate a ?
I am trying to keep the <div> centered on the screen but this fails.
Here is the code:
var self = $(this);
self.animate({
'top': ($(window).height() / 2) - (self.outerHeight() / 2),
'left': ($(window).width() / 2) - (self.outerWidth() / 2)
}, 600, 'swing', function () {
self.animate({
'width': '+=200px',
'height': '+=200px',
'top': ($(window).height() / 2) - (self.outerHeight() / 2), //NO UPDATE
'left': ($(window).width() / 2) - (self.outerWidth() / 2) //NO UPDATE
}, 600, 'linear');
});
So mainly after the second animation where the <div> grows by 200px on each direction, top and left stay the same from the first animation. I'd like the position to update as well.
What can be done here?
A:
Do take into consideration than when running the following code:
'top': ($(window).height() / 2) - (self.outerHeight() / 2), //NO UPDATE
'left': ($(window).width() / 2) - (self.outerWidth() / 2) //NO UPDATE
The value you get from self.outerHeight() is the absolute current value (without the added amount) as jQuery will increment the size slowly to give the impression of an animation.
To make it work you must add the amount manually:
'top': ($(window).height() / 2) - ((self.outerHeight()+200) / 2), // notice the +200
|
Mercer did not have any identification and gave the officer a false name that didn't match any records, so he was taken into custody, police said. Mercer gave another false name at the police station, but finally revealed his true identity and told the officers that he didn't give his real name at first because he had a "(expletive) warrant out of Crestview and I didn't want to go back." |
Our products
suPARnostic® is developed to measure the amount of suPAR protein (soluble urokinase Plasminogen Activator Receptor) in human blood.It is the only CE-IVD certified product range applied for clinical determination of suPAR in human plasma and serum.The suPARnostic® brand consists of the following 3 products: |
Monarch butterflies have made a significant comeback in their wintering grounds in Mexico after suffering serious declines in the past several years, investigators announced Friday.
Migratory monarch butterfly populations rebounded to 68 percent of a 22-year average in 2015, occupying almost 10 acres of forest in their Mexican hibernation areas, as indicated by a new survey. They covered only 2.8 acres in 2014, and the record low was just 1.66 acres in 2013.
"We are seeing the beginning of success," Daniel Ashe, director of the U.S. Fish and Wildlife Service, said at a World Wildlife Fund news conference in Mexico on Friday. "Our task now is to continue building on that success."
Every year around October, the orange-and-black butterflies migrate between 1,200 to 2,800 miles from Canada through the U.S. to spend the winter in the temperate mountain forests of Michoacán State and Mexico State.
During this journey, monarchs face manifold hazards, including deforestation and logging, pesticides, climate change and loss of milkweed, which is the only plant that they use to breed along the way, as explained by the World Wildlife Fund (WWF). Larvae feed and grow on milkweed before metamorphosing into butterflies.
The annual migration pattern is a biologically inherited trait, and no single butterfly lives to make the full round trip. It remains a mystery how they make their way back to the same forested swath each year, The Guardian noted.
While the acreage increase indicates a potential for recovery, the numbers remain far below the nearly 45 acres in which monarchs spent the winter months in the peak year of 1996, after which the species lost 90 percent of its population.
"What the scientific monitor is showing is that there is an apparent recovery in the last two years, which is why this is good news," said Omar Vidal, director general of the WWF in Mexico, according to The New York Times. "But the threats for the butterfly, for their migration, continue."
"Now more than ever, Mexico, the United States, and Canada should increase their conservation efforts to protect and restore the habitat of this butterfly along its migratory route," Vidal concluded.
The U.S. is trying to replace about 7.5 million acres of milkweed through planting projects as well as regulations of pesticide use. In Mexico, where illegal logging is a considerable threat, local farmers have been provided with uniforms and equipment by the government's environmental watchdog, Profepa in order to monitor a 140,000-acre reserve territory that encompasses most of the monarchs' hibernation area.
@ 2018 HNGN, All rights reserved. Do not reproduce without permission. |
Q:
How can i write Linq2Entities Query with inner joins
How can I get data from these related entities. I want to get these columns only:
Term.Name , related Concept_Term.Weight, related Concept.Id
I wrote the SQL but I don't want to use
select t.Name,ct.ConceptId,ct.Weight from Term t
inner join Concept_Term ct on t.Id=ct.TermId
inner join Concept c on c.Id=ct.ConceptId
where c.Id == 80298 and t.LanguageId=2
What I want to see is the same result like a table in a console application with the same result that I wrote in SQL.
Picture of the entities : http://img7.imageshack.us/img7/7129/77365088.jpg
Note: Sorry I can't embed this photo in my post because the system doesn't allow me to do that.
A:
If you've set up you relations properly, this is quite simple:
from t in db.Terms
where t.LanguageId == 2 // Do this early on for perf
from ct in t.ConceptTerms // This is the reverse FK: ct.TermId -> t.Id
where ct.Concept.Id == 80298 // This is the other FK: ct.ConceptId -> c.Id
select new {
t.Name, ct.ConceptId, ct.Weight
};
This code assumes you have set your foreign keys to work in both directions.
It also demonstrates that you have some redundancy. Instead of JOINing:
where ct.Concept.Id == 80298
We could do the check directly:
where ct.ConceptId == 80298
|
Evaluation of concurrent malaria and dengue infections among febrile patients.
Despite a wide overlap between endemic areas for two important vector-borne infections, malaria and dengue, published reports of co-infections are scarce till date. To find the incidence of dengue and malaria co-infection as well as to ascertain the severity of such dengue and malaria co-infection based on clinical and haematological parameters. Observational, retrospective cross-sectional study was designed including patients who consulted the tertiary care hospital of Ahmedabad seeking treatment for fever compatible with malaria and/or dengue. A total of 8364 serum samples from clinically suspected cases of fever compatible with malaria and/or dengue were collected. All samples were tested for dengue NS-1 antigen before 5 days of onset of illness and for dengue IgM after 5 days of onset of illness. In all samples, malaria diagnosis was based on the identification of Plasmodium parasites on a thin and thick blood films microscopy. Only 10.27% (859) patients with fever were tested positive for dengue and 5.1% (434) were tested positive for malaria. 3.14% (27) dengue cases show concurrent infection with malarial parasites. Hepatomegaly and jaundice 37.03% (10), haemorrhagic manifestations 18.51% (5) and kidney failure 3.7% (1), haemoglobin <12 g/dl 100% (27) and thrombocytopenia (platelet count <150,000/cmm) 96.29% (26) were common in malaria and dengue co-infections and were much more common in Plasmodium falciparum infections. All febrile patients must be tested for malaria and dengue, both otherwise one of them will be missed in case of concurrent infections which could lead to severe diseases with complications. |
Hamden High School Football Player Killed In Crash
This is an archived article and the information in the article may be outdated. Please look at the time stamp on the story to see when it was last updated.
A 15-year-old Hamden boy died in a car accident Thursday morning on Dixwell Avenue in Hamden, police said.
Hamden High School Principal Gary Highsmith identified the teen as Tyseem Troutman, a sophomore who was on the football team. He said the teen had just transferred to Hamden High School from North Carolina. Thursday, Hamden’s football coach had the tough task of telling players one of their own was gone.
“Coach spoke to us after practice,” said Hamden football player Lonnie Numan. “He was saying how we have to pull together as a team because, it’s sad, he was young, he just got here.”
“His locker was right next to mine,” said teammate Austin Banks, who described Troutman as a quiet kid who kept to himself.
Principal Highsmith had been in touch with Troutman’s family members Thursday and said they were holding up as well as they can
“We miss him. Even though he hasn’t been here much, he became an instant member of our school community so we still miss him as if he were here for four years,” said Principal Highsmith.
Highsmith learned through the family that Troutman was in the car with his uncle heading to grab a bite to eat when the unthinkable happened.
Police said two cars collided. The drivers of both vehicles were injured. Troutman was pronounced dead shortly after being transported to the hospital.
Highsmith said Troutman is the second student to die in a car accident within the last week. Grief counselors will be available at the school to help students cope. |
Q:
How to fill populate a dropdown form with items from the database using codeigniter?
I am attempting to create a dropdown filled with items from my database.
I have it populating but the values are ending up being the position in the array. i.e: 0, 1, 2, etc.
Here is my code for the form:
echo form_open('main/generate_report');
$depts = array();
foreach ($my_depts->result() as $row)
{
$depts[] = $row->DEPT_NAME;
}
echo form_dropdown('dept_select', $depts);
echo form_submit('report_submit', 'Generate Report');
it goes to this function when submitted:
echo '<h1><u>Report</u></h1>';
echo '<h2>';
echo $this->input->post('dept_select');
echo '</h2>';
for example when I select the first option named "test", it outputs 0 (its position in the array) rather than "test" like I want it to.
How do I adjust what the value is when populating the dropdown?
thank you in advance.
I am using Codeigniter 3.
A:
Try below code. Use associative array for dropdown.
echo form_open('main/generate_report');
$depts = array();
foreach ($my_depts->result() as $row)
{
$depts[$row->DEPT_NAME] = $row->DEPT_NAME;
}
echo form_dropdown('dept_select', $depts);
echo form_submit('report_submit', 'Generate Report');
|
'use strict'
module.exports = balanced
function balanced (a, b, str) {
if (a instanceof RegExp) a = maybeMatch(a, str)
if (b instanceof RegExp) b = maybeMatch(b, str)
var r = range(a, b, str)
return r && {
start: r[0],
end: r[1],
pre: str.slice(0, r[0]),
body: str.slice(r[0] + a.length, r[1]),
post: str.slice(r[1] + b.length)
}
}
function maybeMatch (reg, str) {
var m = str.match(reg)
return m ? m[0] : null
}
balanced.range = range
function range (a, b, str) {
var begs, beg, left, right, result
var ai = str.indexOf(a)
var bi = str.indexOf(b, ai + 1)
var i = ai
if (ai >= 0 && bi > 0) {
begs = []
left = str.length
while (i >= 0 && !result) {
if (i === ai) {
begs.push(i)
ai = str.indexOf(a, i + 1)
} else if (begs.length === 1) {
result = [ begs.pop(), bi ]
} else {
beg = begs.pop()
if (beg < left) {
left = beg
right = bi
}
bi = str.indexOf(b, i + 1)
}
i = ai < bi && ai >= 0 ? ai : bi
}
if (begs.length) {
result = [ left, right ]
}
}
return result
}
|
Q:
Jquery promises whit objects
function uploadfiles(inputcontrol){
//here the function takes all the files of an input files
//for each inputcontrol.files[i]
//createObject(inputcontrol.files[i]);
}
function createObject(files){
//this function creates an object with each one of them the files
//are processed and loaded in a web service whit AJAX
}
when(uploadfiles()).then(alert('All files uploaded'));
When I run this script, the alert is displayed immediately and it does not wait for the files to be uploaded correctly. How should I run the $ .when?
A:
I updated your clupload class so it can read the file using the Deferred object, because we can now chain the process of reading the file and then upload it.
I also changed the getBase64 function so it returns the Deferred object, this way we can use the done and fail methods later.
Here is the code:
class clupload {
constructor(file, Ticket) {
this.f = file;
this.t = Ticket;
}
readFile () {
var dfd = $.Deferred();
var reader = new FileReader();
reader.onload = function(e) {
dfd.resolve(e.target.result);
};
reader.readAsDataURL(this.f);
return dfd.promise();
}
procesar() {
var tt = this.t;
var nombre = this.f.name;
var user = $('#loginUsrApp').val();
return this.readFile().then(function (salida) {
return $.ajax({
type: "POST",
url: "WebService.asmx/SubirArchivo",
data: "{T:'" + tt + "',b64:'" + salida + "',N:'" + nombre + "',U:'" + user + "'}",
contentType: "application/json; charset=utf-8",
dataType: "json"
})
});
}
}
function getBase64(f, T) {
var files = document.querySelector(f).files;
var uploads = files.map(function (file) {
var upload = new clupload(file, T);
return upload.procesar();
});
return $.when.apply($, uploads);
}
Now you only have to call it like this:
getBase64('#upload1', r.d).done(function() {
alert('Guardado');
}).fail(function () {
alert('Error');
});
|
Q:
Jenkins git plugin: How to configure different fetch and push git remotes?
I have a Jenkins project which has a git checkout url. The Jenkins master is configured with git-Jenkins plugin version 2.2.10_2 (https://wiki.jenkins-ci.org/display/JENKINS/Git+Plugin).
I wanted to check if there is any way to provide different git remotes for fetch and push.
e.g: $ git remote -v
origin git@<read-only-git>.com:org/repo.git (fetch)
origin git@<read-write-git>.com:org/repo.git (push)
The use case here is to use a read only source for clones and push any changes back to a read-write source. There is an external synchronization mechanism to update the read only copy.
Thank you,
-Mayur
A:
Use the --push option of git remote set-url.
Assuming you'd cloned from the read-only repo:
Before
$ git remote -v
origin git@<read-only-git>.com:org/repo.git (fetch)
origin git@<read-only-git>.com:org/repo.git (push)
Command
git remote set-url --push origin git@<read-write-git>.com:org/repo.git
After
$ git remote -v
origin git@<read-only-git>.com:org/repo.git (fetch)
origin git@<read-write-git>.com:org/repo.git (push)
|
Siaka Bamba
Siaka Bamba (born 24 August 1989), is an Ivorian footballer who plays as a defensive midfielder for Lusitano Ginásio Clube.
In the summer of 2013, Bamba rejoined former side Desportivo de Chaves.
Whilst at Feirense, Bamba won the SJPF Segunda Liga Player of the Month for March 2011.
Bamba represented his country at the 2005 FIFA U-17 World Championship. During the tournament which saw his side finish bottom of their group, Bamba scored a goal for his country in a 1–1 draw with the United States.
In 2018–19, he signed in for Recreativo do Libolo in Angola's premier league, the Girabola.
In 2019-20 he signed in for Lusitano Ginásio Clube from Évora.
Honours
Club
Desportivo de Chaves
Taça de Portugal: Runners-up 2009–10
Vitória de Guimarães
Taça de Portugal: 2012–13
Individual
SJPF Segunda Liga Player of the Month: March 2011
References
External links
Category:1989 births
Category:Living people
Category:Sportspeople from Abidjan
Category:Ivorian footballers
Category:Association football midfielders
Category:Primeira Liga players
Category:LigaPro players
Category:Portuguese Second Division players
Category:G.D. Chaves players
Category:C.D. Feirense players
Category:C.R.D. Libolo players
Category:Vitória S.C. players
Category:C.D. Cova da Piedade players
Category:Cypriot First Division players
Category:Nea Salamis Famagusta FC players
Category:Expatriate footballers in Portugal
Category:Expatriate footballers in Cyprus
Category:Ivorian expatriate footballers
Category:S.U. Sintrense players |
Oral challenge with metal salts. (II). Various types of eczema.
299 patients with chronic dermatitis of obscure origin were challenged orally in a controlled study with 2.5 mg nickel, 2.5 mg chromium, and 1 mg cobalt given as salts of the respective metals. Flares of the dermatitis were seen in 12 of 61 patients with patch-test-negative hyperkeratotic eczema, in 9 of 32 patients with patch-test-negative perianal eczema, and in 7 of 143 patients with various other patch-test-negative eczemas. In this latter group, flares were seen only among patients with nummular eczema or hand eczema. Among 34 patients with various positive patch tests not relevant to the current dermatitis, 3 with hand eczema experienced flares. Patients who reacted to oral challenge with the metal salt to which they had a positive patch test, included 3 of 9 with nickel allergy, 2 of 5 with cobalt allergy and 6 of 15 with chromate allergy. These patients were tested openly. Low metal diets were prescribed for 33 patients who had flares after oral challenge with specific metal salts. For 23 of these, the dermatitis cleared or improved markedly after following the diet for at least 4 weeks. Responses to a questionnaire sent to the 23 patients indicated that 16 had followed the prescribed diet rigorously or intermittently for at least a year. |
Q:
Kendo-Knockout: Window does not close correctly
I am using RPNiemeyer kendo-knockout library. I have a grid. When the user clicks on a row of grid a pop up window is showed. When You close the window and open it again in the same way the application freezes with the closing animation. I tried as much as I can to reproduce this scenario in fiddle.
In fiddle when You close the pop up window and click on the row again nothing happens and the browser is reloaded. I strongly believe that something similar is happening in my application.
html:
<div data-viewId="languageList" >
<div id="languageList" data-bind="with: viewModel">
<div id="languageListGrid" data-bind="kendoGrid: { data: languageViewModels, columns: [
{
template: '<a href=\'\' data-bind=\'click: function() { onLanguageSelected("#=Language#") }\'>#=Language#</a>',
field: 'Language',
title: 'Language',
width: 50
}
],
scrollable: false, sortable: true, pageable: false }" style="height: 380px">
</div>
</div>
</div>
<div data-viewid="languageDetails">
<div id="languageDetails" data-bind="with: viewModel" class="hidden">
<form id="languageDetailsForm" action="" style="font-family: Trebuchet MS, Verdana, Helvetica, Sans-Serif;">
<div data-bind="kendoWindow: {isOpen: isOpen, title:'Language', width: 400, height: 200, modal: true }" >
test
<button id="cancelLanguage" class="k-button" data-bind="click: cancelLanguage">Cancel</button>
</div>
</form>
</div>
</div>
javascript:
$(function () {
var elementIsBoundNew = function (element) {
return !!ko.dataFor(element);
}
var applyBindings = function (viewModel, elementId) {
var element = $('div[data-viewId="' + elementId + '"]')[0];
if (!elementIsBoundNew(element)) {
var parentViewModel = { viewModel: viewModel };
ko.applyBindings(parentViewModel, element);
}
};
var FranchiseDetailsViewModel = function () {
var
self = this,
initialize = function () {
self.languagesInfoViewModel(new LanguageListViewModel(self));
applyBindings(self.languagesInfoViewModel, "languageList");
};
FranchiseDetailsViewModel.prototype.languagesInfoViewModel = ko.observable();
initialize();
};
var LanguageListViewModel = function (franchise) {
var
self = this,
initialize = function () {
var languageViewModel = new LanguageDetailsViewModel(franchise);
self.languageViewModels.push(languageViewModel);
};
LanguageListViewModel.prototype.languageViewModels = ko.observableArray([]);
LanguageListViewModel.prototype.selectedLanguageViewModel = ko.observable();
LanguageListViewModel.prototype.onLanguageSelected = function (selectedLanguage) {
// when you uncomment this line everyting works fine
//var language = new LanguageDetailsViewModel();
self.selectedLanguageViewModel(self.languageViewModels()[0]);
applyBindings(self.selectedLanguageViewModel, "languageDetails");
self.selectedLanguageViewModel().openPopUp();
};
initialize();
};
var LanguageDetailsViewModel = function () {
var
self = this,
closePopUp = function () {
self.isOpen(false);
};
self.Language = ko.observable("English");
LanguageDetailsViewModel.prototype.isOpen = ko.observable(false);
LanguageDetailsViewModel.prototype.openPopUp = function () {
self.isOpen(true);
};
LanguageDetailsViewModel.prototype.cancelLanguage = function () {
closePopUp();
};
};
var initialize = new FranchiseDetailsViewModel();
});
The strange thing is that if I add this line of code to my onLanguageSelected method everyting works fine:
var language = new LanguageDetailsViewModel();
Fiddle:
http://jsfiddle.net/bZF9k/26/
Any help with working example will be greatly appreciated. Thanks!
Update per RPNiemeyer`s post:
I have added these lines of code to use the technique from here Kendo-Knockout: Calling a method that changes viewmodel property from a template with data-binding inside a grid, breaks bindings:
ko.bindingHandlers.preventBinding = {
init: function() {
return { controlsDescendantBindings: true };
}
};
ko.bindingHandlers.kendoGrid.options.dataBound = function(data) {
var body = this.element.find("tbody")[0];
if (body) {
ko.applyBindings(ko.dataFor(body), body);
}
};
This is exactly what is happening in my application. When I open the pop up, close it and than open it again for the second time it is not closing correctly. Please see my updated fiddle:
http://jsfiddle.net/bZF9k/29/
What am I missing ? Thank You once again for your feedback!
A:
It looks like the window is not properly cleaned up after it is closed. This is normally not a problem (and is desirable), but if the grid is re-rendered, then a new kendoWindow is initialized that does not know that there is a window already out there.
It might be possible to handle this in the knockout-kendo code. The destroy method of the window is already called, so I would need to look into why it is not actually removing the window elements.
A workaround for now is to configure a global handler for when a window is closed like:
ko.bindingHandlers.kendoWindow.options.close = function() {
$('.k-window, .k-overlay').remove();
};
Sample here: http://jsfiddle.net/rniemeyer/dcYRM/
|
White House Push to End ‘Don’t Ask, Don’t Tell’ Spurs Debate in Military
February 23, 2010 at 12:00 AM EDT
Loading the player...
Judy Woodruff takes a look at gay rights in America, as Army officials air concerns about the president's plan to move ahead with a repeal of the "don't ask, don't tell" policy. Experts on gay rights issues examine the shifting politics of sexual orientation in the armed forces and beyond.
TRANSCRIPT
JIM LEHRER: Now: gay rights in America, and the question of whether gays and lesbians should be able to openly serve in the U.S. military.
That issue is continuing to draw attention in Congress, and that was the case again today.
Judy Woodruff has our story.
JUDY WOODRUFF: The Army’s top leaders made it clear today at a Senate hearing on the Army budget they’re worried about repealing don’t ask, don’t tell, the policy governing gays in uniform.
Army Chief of Staff General George Casey:
GENERAL GEORGE CASEY, army chief of staff: I do have serious concerns about the impact of the repeal of the law on a force that’s fully engaged in two wars and has been at war for eight-and-a-half years. We — we just don’t know the impacts on readiness and military effectiveness.
JUDY WOODRUFF: And Secretary of the Army John McHugh said he opposes a temporary halt to the current policy of discharging gays from the service.
JOHN MCHUGH, secretary of the army: If the question is my personal opinion, if asked, the preference would be we wouldn’t enact a moratorium.
JUDY WOODRUFF: The president made his wishes known in his State of the Union address last month.
U.S. PRESIDENT BARACK OBAMA: This year, I will work with Congress and our military to finally repeal the law that denies gay Americans the right to serve the country they love because of who they are.
ROBERT GATES, U.S. secretary of defense: We have received our orders from the commander in chief, and we are moving out accordingly.
JUDY WOODRUFF: At that same hearing, Admiral Mike Mullen, chairman of the Joint Chiefs of Staff, surprised many by supporting repeal.
ADMIRAL MICHAEL MULLEN, joints chiefs chairman: Speaking for myself, and myself only, it is my personal belief that allowing gays and lesbians to serve openly would be the right thing to do.
JUDY WOODRUFF: And, yesterday, General Ray Odierno, the top U.S. commander in Iraq, agreed with Admiral Mullen.
MAJ. GENERAL RAYMOND ODIERNO, commander, Multi-National Corps-Iraq: My opinion is, everyone should be allowed to serve, as long as we’re still able to fight our wars and we’re able to have forces that are capable of doing whatever they’re asked to do.
JUDY WOODRUFF: The prospect of letting gays serve openly in the military comes as gay advocates are also pressing for changes in civilian policy, by challenging bans on same-sex marriage and other legal restrictions.
We take a wider look now at the state of gay rights and where the issue of military service fits into that.
George Chauncey is a professor of history at Yale University whose work focuses on lesbian and gay history. He has testified in favor of gay rights in a number of court cases, including the ongoing trial over Proposition 8, the same-sex marriage ban in California. Suzanna Walters, professor of gender studies at the University of Indiana, she is the author of the book “All the Rage: The Story of Gay Visibility in America.” Michael Kazin, he’s a social historian at Georgetown University. And Andrew Kohut, president and director of the Pew Research Center for the People and the Press.
Thank you all for being with us.
And, Andy Kohut, I’m going to start with you and ask you about the polls. What to they show in terms of the evolution of attitudes on the part of Americans toward gays serving in the military?
ANDREW KOHUT, director, Pew Research Center: Most of the polls that have come out recently have found pretty broad support for allowing gays to serve openly — openly in the military. Our polls conducted in early February found 61 percent favoring, 27 percent opposed.
And the other polls more or less show that — the same kind of margin of support. Now, if you go back to 1993, 1994, the polls were much more divided about — the American public was much more divided about whether this was a good idea or not, but not so now. There’s broad — broad acceptance of this notion.
JUDY WOODRUFF: So, you have clearly seen a change in thinking.
Professor Walters, how — what do you attribute that change to? You have studied this.
SUZANNA WALTERS, professor of gender studies, University of Indiana: I mean, we have seen in the last 10 to 15 years huge explosion of visibility in popular culture, in — in the world at large and how we understand our world.
But I guess I would be a little cautious here, because I think there has been shifts, but I think we would be mistaken to think that we can’t also go backwards. You know, what can be won can be lost. And we have seen this historically with all kinds of social movements, particularly the women’s movement and abortion rights.
And I fear that, if we’re too optimistic about where we are now with the gay rights movement, we will not be vigilant enough to fight back against the kind of backlash that I think we’re — we’re seeing right now.
Why do you think there’s been this shift in attitude? And do you think that those who — who want gay rights to advance are right to be worried, as Professor Walters is?
MICHAEL KAZIN, social historian, Georgetown University: I’m not sure.
I think that, you know, in the history of social movements, certainly, there is a backlash sometimes. Things go back. But once a movement gets defined as a movement for rights, for individual rights especially, it’s very difficult to oppose that movement for most people.
Now, certainly, one of the reasons why, as Suzanna Walters, said that — that the gay rights has advanced is so many people young people are growing up with other young people who have come out, both gay men and lesbians. As she said, popular culture is full of gay characters in very high places, very visible places.
So, being gay no longer seems unusual, remarkable, deviant, which is an old term that used to be used. It seems quite normal, especially for a lot of young people in many parts of the country. And that I think makes — coming out was really the most — one of the most brilliant acts that any social movement has — has exercised in recent years.
JUDY WOODRUFF: Professor Chauncey, how do you see attitudes shifting? And how do you see the attitude toward gays in the military fitting into that? Which one is leading the other?
GEORGE CHAUNCEY, professor of history, Yale University: Well, you know, I think that attitudes across the country can’t be homogenized.
There are a lot of differences along lines of religion, race, region, and certainly generation. And Americans across those divisions are more comfortable with some gay rights issues than with others.
I think part of the useful historical context here is to realize that don’t ask, don’t tell actually governed relations between gay and straight people across most domains for many years. Anti-gay discrimination was so widespread that gay people realized that they had to remain hidden, closeted to function as full citizens.
The military policy itself that we’re debating now originated at the beginning of the — beginning of the Second World War, when, for the first the military, didn’t just prosecute homosexual behavior, but actually singled out gay people as a class of citizens they would discriminate against and prohibit from serving.
And, shortly after the war, the federal government implemented policies to prohibit gays from working in the civilian work force, civilian federal service. There were regulations in many states prohibiting gay people from being served in restaurants or bars. And there were raids on gay bars and other meeting places across the country.
So, gay people realized they had to be very hidden. And the — the civil rights movement that developed in the ’40s and ’50s in response to that was deeply inspired by the Civil Rights movement, the black movement, which didn’t just seek an end to discrimination, but dignity. And, for gay people, that meant the rights and the — of being able to live and the dignity of being open about who they were.
And I guess I have been struck by, as a historian, that this movement, like most civil rights movements, is really a long-term affair, and that there have been so many movements forwards and backwards. In the early ’70s, you had cities and towns beginning to pass laws that added sexual orientation to their anti-discrimination laws.
But, beginning in the late ’70s, you had a tidal wave of referenda around the country overturning those laws. Likewise…
JUDY WOODRUFF: Well, let me interrupt you there and — and turn back to Andy Kohut, because we have talked about gays in the military. And you gave us those statistics. But what about — you know, we have heard our other three guests talk about attitude toward gays overall evolving. What do you see when you ask Americans how they accept gays? What changes do you see?
ANDREW KOHUT: Well, you know, with regard to rights, there’s no question there’s a big change. In the early — in the mid-’80s, two-thirds of people said homosexuals shouldn’t be allowed to be teachers. Now two-thirds of the public say just the reverse. Sure, they should be.
But when we ask people should homosexuality be an acceptable — an accepted way of life, you get still a pretty close division of opinion, not that much change — some change over the years. When we ask, is homosexuality morally wrong, you still find about 49 percent of the public saying it’s morally wrong.
So, there is a lot of movement with respect to rights, very small, modest movement, mostly generationally-based, with respect to the acceptance, broader acceptance of homosexuality in American society.
JUDY WOODRUFF: Professor Walters, does that fit with what your study, your research has shown?
SUZANNA WALTERS: Yes, absolutely.
I mean, I think there — I — let me — let me be clear. I think there have been enormous shifts that have gone on in a very positive way. But you’re absolutely right that — that, when asked broader questions about sort of general acceptance of gays and lesbians, the numbers are pretty daunting.
And I think that — that part of the problem is, we haven’t focused enough on a shift in consciousness and a shift towards not — not just reaching for the brass ring of marriage rights or the brass ring of serving openly in the military, although those are key issues, but the deeper question of how to construct a sort of robust integration of gays and lesbians into American culture, a full sense of belonging and citizenship.
And that’s not going to — we — I could see a future, for example, where we have marriage rights, where we have basic civil rights, but we still don’t have that robust, rich sense of belonging, of community, of citizenship. That still is eluding us, as it has many other minority groups, I would add.
You know, just because Obama is elected president, we’re not post-racial. Just because gays are on TV, we’re not post-gay. These things still need to be struggled over. And, again, I think we need to focus on a deeper level, not just on those — attaining what seem to me no-brainers in terms of civil rights issues, marriage, military rights and so on…
JUDY WOODRUFF: Right.
SUZANNA WALTERS: … but achieving a deeper sense of integration.
JUDY WOODRUFF: So, Professor Kazin, what is holding acceptance back on the part of that 49 percent that Andy Kohut cited?
MICHAEL KAZIN: Well, we often forgot what a radical change this is, to have homosexuality accepted even to the extent it’s accepted in this culture.
We have thousands of years of human culture where homosexuality was considered to be a sin by religious groups. And…
JUDY WOODRUFF: Strong religious…
MICHAEL KAZIN: Yes. And, so, in some ways, I don’t want to be too optimistic, but the last 40 years have been amazing, in terms of the progress of gay rights, the progress of the acceptance of gay people.
And I just disagree a little bit with Professor Walters. You know, one of the things that — when laws change, that helps to change consciousness. When the civil rights law was passed, when the Voting Rights Act was passed in the 1960s, then people’s attitudes began to change.
Even if they didn’t necessarily — white people didn’t like African-Americans any more, but they felt that, well, it wasn’t OK anymore to voice their dislike of African-Americans. Racism began to be something that was marginal, that you had to talk about in private. And that I think could begin to happen also with views about — about gay rights…
JUDY WOODRUFF: Well…
MICHAEL KAZIN: … if the laws do change, if gays are allowed to serve openly in the military, and if gay marriage becomes more and more legal in more — more places.
JUDY WOODRUFF: Professor Chauncey, pick up on what we heard about the future and what the gay movement, what society has to look forward to in the future?
What are the main obstacles out there? And for those who feel passionately that this is wrong, what are their prospects — that greater acknowledgment and acceptance of gays is wrong — what are their prospects for making their views more widely accepted?
GEORGE CHAUNCEY: Well, I think they still are making their views widely known.
And I guess I’m struck by how deeply polarized the nation remains, so that in urban liberal enclaves, it’s easy to forget how widespread anti-gay hostility is, how easy it is in many parts of the country to be openly gay — anti-gay, how the fact gay has become the primary term of derision in youth culture today. If you don’t like an exam or a teacher or a football play, you call it “so gay.”
JUDY WOODRUFF: And that’s despite the fact that you have all pointed out that young people are much more accepting.
GEORGE CHAUNCEY: Yes. I mean, there certainly has been a sea change in attitudes on the part of the young. And I think that’s one of the most encouraging things that we see, is they have grown up in a society where they’re more likely to know openly gay people and to see gay people in the public domain.
But, at the same time, the — the Christian right and its allies have continued to demonize gay people, to compare them to the most despicable things, and to argue quite forcefully against gay rights.
I mean, on the question of what’s polite now that Michael Kazin raised, you know, I’m struck that, in the Prop 8 campaign in California, many of the advocates of Prop 8 to take away marriage rights from gay couples in their church rallies and so forth were quite vicious in their demonization of gay people.
In the public campaign, they didn’t do that, but they still focused on the threat that gay marriage might pose to children. And one of their slogans was not just protect marriage, but protect California’s children, which hearkened back to the oldest of the anti-gay stereotypes.
JUDY WOODRUFF: Let me turn quickly to Andy Kohut.
Do you find that gay marriage is the stumbling block, as I was reading today, for many it seems to be?
ANDREW KOHUT: Well, it certainly is.
I mean, we still have 53 percent saying they oppose it — same-sex marriage, 39 percent saying they favor. There’s been a little movement over the past six or seven years in the direction of favoring same-sex marriage, but there’s pretty strong opposition predicated upon the view of morality, because, when you shift the question to civil unions, we now have broad majority support for that, real — a real liberalizing trend in a relatively short period of time.
JUDY WOODRUFF: So, Professor Walters, quickly back to you, is gay marriage going to continue to be the end-all/be-all of this movement?
SUZANNA WALTERS: Well, I mean, I for one don’t think it should be, I have to say. I think it’s an important civil right. Again, I think it’s a sort of no-brainer. Either you’re — you’re not — you know, you’re a full citizen or you’re not. It seems quite simple.
We’re invested in it as a movement. I don’t think there’s a turning back from that. But I think again, you know, questions of employment rights, questions of harassment in schools for kids, which continues to go on, questions of hate crimes, these all need to be dealt with. These all need to be reckoned with. We can’t put it all on marriage, although, you know, again, it does remain a very important issue for many people.
JUDY WOODRUFF: We are going to leave it there. It’s a very big subject. And I hope we can come back to it again in the future.
PBS NewsHour allows open commenting for all registered users, and encourages discussion amongst you, our audience. However, if a commenter violates our terms of use or abuses the commenting forum, their comment may go into moderation or be removed entirely. We reserve the right to remove posts that do not follow these basic guidelines: comments must be relevant to the topic of the post; may not include profanity, personal attacks or hate speech; may not promote a business or raise money; may not be spam. Anything you post should be your own work. The PBS NewsHour reserves the right to read on the air and/or publish on its website or in any medium now known or unknown the comments or emails that we receive. By submitting comments, you agree to the PBS Terms of Use and Privacy Policy, which include more details. |
Media outlets access enhanced multi-platform content at no charge, with alerts when we have new content on issues or from regions you may select. Once we receive the filled out form below, you'll receive a message with the passcode/s. Welcome!
*These fields are required
*Media Outlet name
*Media Outlet City/State
Contact name
Contact phone
*Email address or fax #
*Media Outlet type
Additional (beyond the state you are located in) content that you would like to receive
Newscasts
PNS Daily Newscast - May 24, 2018
Jared Kushner is finally granted his security clearance. Also on our nationwide rundown: A new lawsuit seeks the release of a gay man from ICE detention in Pennsylvania; and protecting an Arizona water source for millions near Phoenix.
Public News Service - IA: Toxics
DES MOINES, Iowa - Iowa's record number of complaints about the misuse of pesticides last year has resulted in both online and in-person training for farmers to prevent a repeat of the problem.
"Pesticide drift" is the biggest issue, especially when using dicamba. Dicamba has been used on and off f
AMES, Iowa — A new research project is underway to explore how Iowa farmers could use cover crops as a way to prevent soil, nitrogen and phosphorus from leaving farm fields.
The group, Practical Farmers of Iowa, says cover crops such as cereal rye can be planted in the fall and then terminat
DES MOINES, Iowa – A new study has come up with a surprising result: Because cars are now dramatically cleaner than they used to be, products like skin lotions and indoor cleaners are becoming the dominant source of key emissions.
University of Colorado lead author and scientist, Brian McDon
DES MOINES, Iowa -- Pesticide drift is not only unwanted and destructive, it is also illegal - and Iowa farmers are encouraged to learn more about the problem and take steps to prevent it.
Rob Faux owns Genuine Faux Farm, a certified organic vegetable and poultry operation. He happened to be outsi
DES MOINES, Iowa -- There's been a lot of focus on ensuring safe, affordable drinking water from public systems in Iowa’s urban centers. But some groups believe just as much attention is needed in rural communities.
Stephanie Enloe, program associate with the Center for Rural Affairs, said m
DES MOINES, Iowa – Lawnmowers will soon be switched out for snow blowers in many Iowa garages, as homeowners assess what they'll need during the winter months.
And often, hazardous materials that need disposal are uncovered in garages and sheds during the process.
Trish Radke, program coor
AMES, Iowa — The Iowa Department of Agriculture and Land Stewardship has introduced tiny, parasitic wasps to combat the invasive emerald ash borer as it continues to threaten the more than 50 million ash trees in the state.
The emerald ash borer has appeared in one-third of the counties in I
DES MOINES, Iowa – Toxic blue-green algae outbreaks that are harmful to humans and pets aren't limited to Florida where a state of emergency has been declared.
It also can show up in Iowa's ponds, lakes, streams, rivers and other waterways.
While this year may not reach 2015's record numbe |
Q:
Teradata - Group the amount by product with the latest date of purchase in Teradata
I am new to Teradata, can anyone help me with below query.
I've a custom table with millions of records like given below :
Basically, I need to group the amount by product with the latest date of purchase. The Columns I need is Cust_id, Cust_name, date, Product and amount.
Need the result set as below:
Please help me with this.
Thanks in advance!
A:
You can use aggregation along with qualify and rank to get your desired result.
select Custid, custname, Date1, product, sum(amount) as amount
from table1
group by custid, custname, product, date1
qualify rank() over(partition by custid, custname order by date1 desc) = 1
order by custname asc, date1 desc;
Result:
P.S. It's not clear why records with id 601 are missing from your sample desired output
|
"It's time." "Hey there good morning." "How are you today?" "Hey." "What are you doing up?" "Moo." "Is that Daddy?" "Hey there, cowgirl." "She's a little feisty today." "Babies should be sleeping." ""I'm too hungry for my own good." Yes." "I gotta get ready." "Wrong day to be forgetting stuff." "You know how lucky you are." "Don't screw this up." "AII right!" "Jesus." "She go back to sleep?" "Yes." "Ate like a pig." "I know I'm lucky." "I ace this job, the department's wide open." "Get my own division someday." "You should see their houses." "hello?" "well, yes." "Don't worry, I will." "He's right here." "It's Alonzo." "hello." "Hoyt?" "Yes, sir." "Going to roll call?" "I'm leaving now." "Hoyt?" "Yes, sir?" "Fairies go to roll call." "We don't." "Good to know." "There's a coffee shop on 7th." "Be there at 10." "Be in comfortable shoes." "Got a backup gun?" "only the standard issue Beretta." "Bring it." "Cuffs too." "Maybe we'll do some business." "We 're aggressive." "I know." "That's why I signed up." "I want to thank you for this" "What's wrong?" "feels like football tryouts." "I wish it was tomorrow so I'd know if I made the squad." "Listen, it's not tomorrow, it's today." "I know it's gonna work out." "You do?" "Good morning, sir." "No, thank you, ma'am." "Get some chow in you." "My dollar." "Thank you, sir, but I ate." "Fine." "Don't." "It's nice here." "May I read?" "I'm sorry, sir." "I" "Thank you." "I'II get something to eat." "hell, no you won't." "You fucked up." "I'm trying to read." "please shut up." "I'II like not being in a hot black and white all summer." "tell me a story, Hoyt." "Like my story?" "Not your story, a story." "Since you can't shut up so I can read, tell me a story." "I don't know any." "You don't?" "No." "I'II tell you one." "This is a newspaper, right?" "It's 90 percent bullshit." "But it's entertaining." "So I read it." "It entertains me." "You won't let me read it, so you entertain me." "tell me a story now." "Go." "There was a DUI stop." "A DUI stop?" "Let me load up!" "A DUI?" "Oh, shit!" "well, I" "Listen, we were on midwatch" "We who?" "Oh, me and Debbie." "Who's Debbie?" "Debbie maxwell, my training officer." "A female training officer?" "Yes, sir." "Okay." "AII right." "Was she black, white?" "She was white." "Lick-her license?" "A what?" "A Iick-her license." "Was she a dyke, a lesbian?" "Is she any good?" "She's pretty good." "Okay, Debbie, midwatch." "Go." "Right." "It was a quiet night" "Boom!" "What the fuck?" "You never know, that's the point." "Go." "It was quiet and we're rolling I'm driving." "This Acura, just a beautiful car..." "He drives for 10 blocks before he pulls over." "plates run clean, so I test and arrest." "I'm belting in our unit, and she's tossing his car." "She shows me a .38" "and two loaded shotguns." "No shit?" "No shit!" "So she calls and I'm searching." "I find 500 grams of meth." "Turns out he's on bail for distribution on his way to smoke his ex-partner before trial." "Boom." "Prevented a murder." "You got him." "It's amazing." "It is." "That you're out there with a fine bitch for a year and the best story you can tell me is a drunk stop." "But I don't believe you." "You tapped that ass, didn't you?" "tell the truth." "You know you tapped that ass." "In the back, bam!" "Code X." "I got a wife." "You got a dick." "You do have one, don't you?" "Yes." "Your dick lines up straight." "Right and left of it are pockets." "In those pockets are money." "Look in either one." "Pay the bill." "Grab that menu off that window for me." "Get in, it's unlocked." "Throw that in the glove box." "This is not from the motor pool." "No." "Sexy, though, huh?" "Where's the office, at division?" "You're in the office." "Going up." "Today is a training day." "Give you a taste of the business." "I got 38 cases pending trial 63 active investigations, 250 I can't clear." "I supervise five officers." "Five personalities." "Five sets of problems." "You could be six." "I ain't holding no hands." "You got today to show me what you're made of." "You don't like Narcotics, get the fuck out of my car get a job chasing bad checks." "You hear me?" "I hear you." "Okay." "Why do you want to be a narc?" "To serve my community by ridding it of dangerous drugs." "Right, but why a narc?" "I want to make detective." "Stick with me, you can do it." "UnIearn that academy shit." "Don't bring that here." "It'II get you killed." "I'II do anything you want me to do." "My nigger." "roll your window down." "Start there." "Got to hear it, smell it, taste it." "Right." "How's your Espanol?" "." "Learn that shit." "That will get you killed." "They plot all kinds of shit behind your back." "You gonna teach me that oId-schooI Rodney IKing shit?" "We don't roll like that no more." "Now we use this." "These niggers are too strong." "Think I'm crazy?" "I don't know what to think." "Yeah?" "Yeah." "Good." "Good." "Been married long?" "About a year." "Yeah?" "You got a kid?" "A girl, 9 months." "I got four." "Boys." "You need a son, I'II hook your lady up." "Can't miss." "Can we not talk about my family, all right?" "I respect that." "I'm married, I got my queen too." "I remember having a young bride." "You probably fuck her face-to-face, don't you?" "Let's not talk about her." "That's my point." "You're so in love, it's coming right out." "The day you bring that here is the day you don't make it back." "Hide it deep inside of you." "The maggots out here will find it use it against you and chew you up." "Never wear the ring to work." "I'm serious about that." "Thanks." "What's here?" "Transactions." "You see that guy trying to act like he's not sIanging dope?" "Yeah." "That's my boy." "That's my boy, Neto." "only 1 7, but he can kill." "Works for me." "He's an informer?" "Teammate." "I got eyes everywhere." "He gets to make some cash." "Lets me know when big things happen." "Big transactions." "You trust him?" "Damn right I do." "Sprung his mom from INS detention." "Here we go." "Watch this." "That's right." "Come on down." "Come on." "Look at it." "Sexy, ain't it?" "That's right." "See the hand-to-hand?" "I saw it." "When was your last felony stop?" "Two weeks ago." "You need practice." "college kids." "They'II get an education today." "I want them grabbing glass." "You take the back." "Stay off of the Rover." "Let's go." "You little fuckers." "Run, baby, run." "police!" "Let's see your hands!" "Put them up!" "Put them up!" "Put your hands on the windshield!" "Put your hands on the glass." "Driver, put it in park!" "It's a stick shift!" "Throw the keys out the window!" "Put your hands on your chest!" "AII right, fork it over." "What?" "You know." "The marijuana." "Give it to me!" "Give it!" "Okay!" "Sorry, sir." "Shut up!" "Give me that pipe." "My mom gave me that pipe." "She can pick it up in jail." "Give me the cigarettes too." "control your suspect!" "palms on the glass!" "Move the hands, I'II slap you!" "Face against the glass!" "Right there!" "You know this is a gang neighborhood?" "Yeah!" "Then don't come down here." "I see you down here again, I'II make you walk home." "I'II let the homeboys run a train on her." "iknow what that is?" "Yes, sir." "AII right, gentlemen." "Thanks for your cooperation." "Let's go." "Safe your iron, son." "Shit!" "I Iike that shit." "I Iike how you move." "You were trained well." "Check that out." "It's a bad dime." "See the hairs, undeveloped seeds." "You see how immature it is." "That's classic Mexican garbage." "Let me see." "It's old." "probably last year's." "To be truly effective a good narcotics agent must know and love narcotics." "A good narcotics agent should have narcotics in his blood." "What, you gonna smoke that?" "No, you are." "hell if I am!" "Yes." "You're not?" "No." "Why?" "You a Mormon?" "I'm not losing my job." "This is your job." "Smoke it." "No." "This ain't a test." "Take a hit." "Listen, I became a cop to stop people from using" "That ain't cocaine." "Take a hit." "No, man." "Jesus Christ!" "Yeah, right." "If I was a dealer, you'd be dead!" "Turn shit down out here, and your wife gets a flag." "What's wrong with you?" "You know what?" "I don't want you in my unit." "Get the fuck out of my car, rookie." "Poo butt-ass." "What's the holdup?" "Move it!" "Give me that thing." "I'II smoke it." "Give it to me." "You want me to, I'II smoke it." "Virgin lungs." "Man up now." "Man up, nigger." "Man up." "Go ahead." "Get it." "Come on!" "Shut the fuck up and just wait!" "Man the fuck up!" "Finish that shit!" "Geronimo." "Let's go, nigger." "Let's go." "Oh, shit!" "You okay, kid?" "That's a man size hit you took." "When's the Iast time you smoked weed?" "The Iast" " twelfth grade." "We were...." "well, we were...." "Smoking weed." "Yeah." "Yeah." "Left that out of your service jacket." "I know you got secrets." "Everybody got secrets." "Didn't know you liked it wet, though." "What's wet?" "Butt-naked." "III." "Sherm." "Dust." "PCP." "Primos." "P-dog." "That's what you had." "You couldn't taste it?" "I never done it." "I haven't, but you have now." "Shit!" "Shit." "I'II get piss-tested, and I'II get fired." "The boss has our back." "We know before we piss." "Shit!" "Boom!" "Why did you do this?" "You're an adult." "Nobody made you smoke." "You made a decision." "Live with it." "Not like I put a gun to your head." "Man...." "Oh, man, shit." "Come on, get your shit together now." "This is my dog's house." "We'II see what he thinks of you." "Get your ass in here!" "Roger, what's up?" "How are they treating you?" "AII right." "I didn't wake you up?" "I never sleep." "Right." "This my new guy, Jake." "Come on." "Get in here." "Yeah." "Time to get my swerve on here!" "What you drinking?" "The best." "The best, I know." "Best for the best." "I heard about Vegas." "Got a green light on your ass." "No problem." "Russians want you." "I got your back." "I know that." "Thank you." "Here." "Get that medicine up in you." "Back to the world." "Back to the world." "Went and got yourself a daisy-fresh rookie." "He's high as a motherfucker." "What did you give him?" "A little of Mexico's finest." "Yeah." "Garbage." "Where'd you grow up?" "North hollywood." "What's your last name?" "Hoyt." "Hoyt." "Hoyt...." "Strong safety, North hollywood High." "Right." "How'd you know that?" "How did you?" "I follow all the good players." "No doubt." "Excuse me." "Shit." "Strong safety, huh?" "It's me." "What's up?" "I can't do anything." "clean up your own mess." "Don't call me." "Hey!" "Here's a joke, boy." "Man walks out of his house, sees this snail lying on his porch." "So he picks it up, chucks it into the backyard." "snail bounces off a rock, busts its shell up all to shit Iands in the grass." "snail lies there dying." "But snail doesn't die." "Soon it can crawl again." "And one day snail heads back to the front of the house." "finally, after about a year the little guy crawls back on the porch." "Right then the man walks out of his house sees this snail again." "So he looks at it and he says:" ""The fuck's your problem?"" "That's not funny." "What you laughing for then?" "I don't know, man." "I" "Hey!" "Figure that joke out, you'II figure the streets out." "Nothing to figure out." "It's senseless bullshit." "You know" " I already figured it out." "really?" "Yeah." "You already figured the streets out?" "well, it's all about smiles and cries." "Put the drink down." "What is that?" "hold on!" "hold on." "smiles and cries." "smiles and cries." "smiles and cries." "I hear you." "Yeah, you gotta control your smiles and cries because that's all you have, and nobody can take that away." "Oh, shit." "What you think, dog?" "Think this greenhorn can handle undercover?" "You were just like him." "Same siIIy-ass look and everything." "Saving the goddamn world." "Now that's some smiles and cries for your ass!" "That was you." "Shit lasted a week." "Gotta get back to it." "Thanks for the snort." "Good to see you." "Yeah." "Yes, sir." "What you doing later?" "Stay home." "Save some cheddar." "My dream's less than a year away." "philippine islands, here I come." "Let me go too." "You're invited." "Hey." "Open your eyes, man." "You'II feel a Iot better." "Boom!" "Come on, man." "Sit your ass up." "Who are you?" "I'm the Zig-Zag man." "Who are you?" "I'm a cop." "Watch out!" "Don't shoot nobody." "Get that beer in you for ballast." "No, man." "Get it in you." "You'II feel better." "Stop the car!" "Stop the car!" "I saw something!" "Just relax." "Stop!" "AII right!" "hold the fuck on" " Hey!" "Fuck me, man!" "Shit." "police officer!" "Get away from the girl!" "I'm gonna fuck you too, cop!" "Get the" "We didn't do shit!" "Bitch is crazy!" "roll over, man." "roll the fuck over!" "Fucking ass prick!" "My nigger!" "Go ahead, cowboy, you got mad squabbIes." "Thanks for the help." "You should've shot them." "What's happening?" "You're dead!" "Okay!" "Wait!" "hold it!" "You too, white boy!" "Okay...." "My cousins will blast you fools!" "calm down." "calm down." "You okay?" "No, I'm not!" "Look at my nose!" "I see it." "Put ice on it." "You'II be fine." "What're you doing here?" "I was just" "They probably got AIDS." "Why you not at school?" "I was going to a ditch party and" "You almost became the ditch party." "Where your cousins from?" "HiIIside Trece!" "Remember that!" "tell your cousins to get your back." "Grab your bag and go home now." "No!" "I need a statement" "Don't need no statement." "They'II fuck you up." "We gonna let them go?" "You wanna beat them up, go ahead." "I got a punching bag at home." "They should be off the streets." "You hear that?" "Wanna go home or to jail?" "What you think?" "Got room at the booty house." "You been there?" "You'II grab your ankles." "Suck my dick!" "I know people." "That's how it starts." "What about you?" "What you got?" "Got nothing?" "No." "You sure?" "Yeah." "Where's your horn?" "Got none." "You got money, though." "You lied to me!" "Lucky I don't make you eat that." "Stand up, you." "Stand the fuck up!" "Yeah." "Oh, shit, huh?" "Turn around, sucker." "Turn around." "So you Iike raping girls?" "Like to rape girls?" "No, man." "That's what you Iike?" "No...." "That what you Iike?" "Don't lie." "told me to suck your dick." "Is that what you said?" "Look at me." "You wanted me to suck your dick, right?" "Isn't that what you said?" "Didn't you say suck it?" "Don't lie." "Am I a liar?" "You didn't say that?" "That's not what you said?" "So I'm lying?" "No, please!" "Where is it?" "I can't find it." "pull your pants down." "Which nut you want?" "I'II leave you one." "Your choice." "Just make a decision." "AII right." "Put your hands on your head." "close your eyes." "close your eyes." "Lucky I got other business." "I'd cut your fucking dick off and stick it up your funky ass." "Bitch." "Damn!" "I'm thirsty." "I want a beer." "What about you?" "You want a beer?" "I'm gonna leave you three to it." "Pussy-ass bitch!" "I see you again, I'II fuck you up!" "You won't see shit coming!" "I'II dent your mouth, I'II crack your head open." "You fucking pig!" "Come on!" "That girl's 14." "She all woman, though." "You tax that ass for days, man!" "IKeep walking, bitch!" "You want a beer?" "No, I don't want a beer, man." "No?" "You mad?" "Want to book that $60, huh?" "Here, go ahead, book it into evidence." "Where the suspects?" "Go get them." "You let them go." "I let them go?" "You did." "You want to run and gun, stay in patrol." "This is Investigations." "Garbage men handle garbage." "professional anglers go after the big fish." "Chasing them crackhead motherfuckers...." "They'd have killed you." "They belong in jail." "Why?" "They got beaten, lost their money." "hillside's éses will smoke them." "What more you want?" "I want justice." "That's not justice?" "That's street justice." "So?" "Let them kill each other?" "God willing." "Fuck them!" "Everybody looking like them." "reality is, the good guys they die first." "The school kids and moms family men, don't want to catch any bullets." "To protect the sheep, you got to catch the wolf." "It takes a wolf to catch a wolf, understand?" "What?" "Protect the sheep by killing wolves." "I heard you." "You didn't hear me." "AII right." "Whatever." "Whatever the fuck-ever!" "Do you ever lock anybody up?" "You seem busy keeping people out." "You don't know shit!" "Shit, they build jails because of me!" "Judges gave over 1 5,000 man-years of incarceration time based on my cases." "My record speaks for itself." "How many felons have you got?" "I rest my case." "I'm not smoking crack, all right?" "I'm glad." "Put it in the glove box." "Put the $60 in there too." "That'II come in handy." "We'II use it like a credit card." "No matter what I say, you did the right thing." "Reminds me when I was chasing down bad guys." "Pretty amazing shit you did back there." "Thanks." "I noticed you applied that chokehoId though, huh?" "That's a no-no procedure." "I was getting my ass kicked." "You did what you had to do." "You did what you had to do." "That's right." "What a wolf does." "You a wolf?" "Come on, wolf!" "Come on, dog!" "No, I said a wolf, not a rooster, a wolf." "That's a rooster, give me a wolf!" "Give me a beer!" "There you go!" "That's my nigga." "You got the magic eye, Hoyt." "You have the magic eye." "You up your street IQ you'II do some damage, I guarantee." "Crime fighter." "What you need?" "Crack." "Uh, 20 bucks...." "Crack?" "smell like bacon!" "Do I Iook like a sucker to you, nigga?" "Fuck you, rookie!" "Go fetch, dog." "You want me to...." "Oh, come on, man, it's...." "Give me a break!" "Hey, you!" "slow up!" "Come on, stop!" "police officer!" "police officer!" "Stop!" "Come on, man!" "Give me a break!" "Shit!" "Get out!" "Get out of here or I call police." "police officer, ma'am, calm down." "I said stop!" "Stop!" "Get the fuck off me." "Fuck off." "You're making this so much harder!" "Just calm down!" "You love this shit, huh?" "Hey, man, hey!" "Pick him up!" "civil rights violating motherfuckers!" "Fuck!" "Watch the fucking legs, man!" "Pick his legs up." "Ain't got nothing better to do than fuck with me, man?" "Shit!" "Who you working for?" "I ain't work for nobody!" "I'm on disability!" "Shit!" "You know you cracking." "I don't sell no more." "No rocks?" "No rocks." "But I found this." "No, you don't." "That motherfucker planted that shit on me." "Put me in the front seat, I'II whup his ass!" "Who you working for?" "told you I don't work for nobody, man!" "Where the rocks?" "I got nothing on me." "I gave it up." "Where the rocks?" "Open your mouth." "You a doctor now?" "A dentist." "Open it." "Lift up your tongue." "Your partner already searched me." "I'm straight." "Yeah, okay." "You got a pen, got a writing pen?" "Didn't see the motherfucker coming!" "Nothing in there?" "Nothing, man!" "Ain't got nothing, huh?" "God!" "Damn!" "Now what is that?" "Crack, man!" "Right." "Jimmy crack corn." "One, two, three, four, five, six." "Oh, you federally fucked now." "You got crack and a gun." "With your record you'II get 10 years per bullet, you know?" "Give me a name, now." "You know I ain't no snitch!" "I know you ain't." "Give me a name." "Twenty." "A name!" "Fuck!" "That's 30 years!" "You want to go to jail or go home?" "He in County." "Who?" "This nigga named Sandman." "That's all I know!" "Shit!" "Sandman?" "See how easy it was?" "Unhook him." "Sick of this shit, man!" "Want the evidence?" "Fuck that, man." "My nigga." "It's Bob." "hello." "How's it going?" "It's AIonzo." "Got your gang book?" "Why?" "I need a res on a Sandman." "He may be in custody." "Hold on." "I'll check." "No problem." "That doesn't fly anymore." "Shoving a pen down." "What if he complains?" "To who?" "23130, 1 13th Street." "Kevin Miller, a.k.a. Sandman." "Got it?" "I know where it is." "Out there by imperial Courts?" "Exactly, uh-huh." "Thanks a Iot." "No problem." "We go after Sandman?" "We go after him." "Opening a Circuit City?" "No, unclaimed shit from Property." "Hand it out to my CI's, witnesses, victims." "Try to help out their families." "Put this on." "Come on, Iet's go." "intel says she lives here alone." "She got two female juveniles possibly a male juvenile." "If he's not here, why are we?" "To serve this warrant." "We can't do that." "Yes, we can." "We the police." "Why not get a real warrant?" "We trying to get shit done." "Stand over there and don't get me killed." "police, we got a search warrant!" "L.A.P.D., open up!" "IKevin ain't here!" "Just open the door!" "IKevin ain't here!" "Open the door, ma'am!" "He ain't even here!" "I said IKevin ain't even over here!" "We got a search warrant." "Open up." "Ain't nobody here!" "Get your big ass down!" "Right down!" "Down!" "Don't move, spread them out!" "Don't move!" "Anybody in the house?" "Is anybody in the house?" "!" "My nephew, Dimitri!" "In the bedroom!" "Okay." "I'm gonna clear the house, check it for weapons." "IKitchen's clear!" "Dimitri?" "Yeah?" "Put your hands up, son." "Anybody else?" "No." "You sure?" "Yeah." "Okay, just stay right there." "Don't move!" "Don't you move." "Stand up." "IKeep your hands where I can see them." "Sit down and place them on your knees." "Sit down." "We're the good guys." "Just sit down right over there next to your auntie." "Right over there." "House is Code-4." "I'm starting the search." "I wanna see that warrant." "The what?" "The warrant." "I need a copy." "My partner has it." "He'II be out soon." "Where's your backup?" "Just be quiet until we're through with our investigation." "You got the gun, don't you?" "That's right." "Punk-ass, bitch-ass, crooked-ass cop!" "You a rookie." "Give me a break, okay?" "How you doing over there?" "You cool?" "Come on." "Don't worry about it, you're cool." "Just stay cool." "AII right." "Ma'am, please sit down." "You act like you pay the rent!" "Sit down!" "You all stink!" "You gotta get drunk to come up here!" "Sit down now!" "Y'aII stink!" "You're gonna shoot me, boss?" "close your eyes." "This punk cop is gonna shoot me!" "Sit down, right now!" "Okay." "Okay!" "Everything is fine." "We made a mistake." "Didn't find a damn thing." "I'm very sorry." "Thanks for your cooperation." "Let's go." "Show me that warrant." "What?" "I want to see that goddamn warrant!" "Here you go." "Let's go!" "Shit!" "Motherfuckers!" "Hey, jackers!" "Give me my money back." "You ain't no police!" "Give me my money back!" "Jackers, why you all standing over there?" "!" "blast them fools!" "You ain't no police!" "I want my money back!" "Start, you motherfucker!" "Fuck!" "Gun!" "Just get out of here!" "Stay in the car!" "Yeah, motherfuckers!" "That was not cool, all right?" "That was not cool at all!" "Opening fire in a neighborhood." "Where was the Sandman?" "What were you doing back there?" "Checking for narcotics activity." "Drugs, guns, baggies, you know?" "Yeah, cash!" "Speak on it, son." "She's screaming about money" "bullshit." "She's screaming about having us killed!" "I'II be on the 6:00 news in handcuffs because of you." "With the scandals, it is open season on misconduct." "They'II nail us to the wall." "pull over." "pull over." "Here?" "Yeah, pull over." "Shit!" "What?" "Listen." "You're in a privileged position to Iearn." "IKeep your mouth shut, eyes open." "Want to do some good, this is the place to Iearn." "You can't take it, maybe you should go back to your division." "Get a nice job lighting flares or measuring car wrecks." "You got to decide whether you're a wolf or a sheep." "Get your ink or go give him a hand." "What are we doing here?" "We'II get killed." "You know about this place?" "It's the jungle, right?" "They say don't come with anything less than a platoon." "This is the heart of it." "jungle." "Damu headquarters." "Stoners." "A Iot of murder investigations lead here." "One way in, one way out." "Thought we were going to eat." "Don't ever come here without me." "I'm serious." "For your safety." "How'd you get a golden pass?" "I treat them fair." "They know if they cross the line, I tax that ass." "What's that, up there?" "They flipping pigeons to signal I'm here." "What's up, Bone?" "What's up?" "What's up?" "It's all good." "I appreciate what you did for my nephew." "For sure." "For sure." "You better call me." "I'm sick of it." "I can't stand him!" "Who are they?" "Nobody." "I got them under my thumb." "What's up, AIonzo?" "AII right, Spider." "What's happening?" "Hey, what's up, girl?" "Look at you." "Go ahead." "AII that jelly and no toast." "Who lives here?" "Just one of my lovelies." "A loving touch, you know?" "Don't worry." "New guy, Jake." "Nice to meet you." "welcome to my house." "Give him some food." "Take care of him." "Of course." "Of course." "How are you?" "Good, good." "I have cable." "You watch whatever you want, okay?" "Thanks." "This is your house." "I'II be right back." "How you doing?" "Fine." "Now, this is all EI SaIvadorian food." "Thank you." "It looks great." "I have to go." "Yeah, all right." "Let's go." "We got a meeting in 1 5 minutes." "I just need to" "Forget it." "Let's go." "I'II see you, buddy." "You okay?" "Here, use this." "Who's here?" "L.A.P.D.'s finest." "Don't speak till you're spoken to." "Come on." "Good to see you." "That's my new guy." "Jake Hoyt." "Captain Lou Jacobs." "Need to talk to the feds, go to him first." "He'II take your back for you." "Stan Gursky, he runs the D.A. shooting team." "Think about him before you shoot someone." "If you're wrong, he'II use your nuts for dice." "Right here, Detective Doug RosseIIi handles theft cases for the French-poodIe crowd." "He's a good man." "pleased to meet you." "Good man." "should I...?" "Shoo." "Get yourself a steak or something." "AII right, gents." "I don't know why I'm meeting you." "I don't talk to dead men." "I ain't dead yet." "Fucking prick." "Excuse me." "Why the Iong face, Doug?" "Feds seize your house or something?" "Fuck yourself." "tell him the story." "Come on, tell the story." "If it's so funny, you tell him." "It's your story." "asshole." "AII right." "There's a serial burglar." "Chased him for a year." "A real sIickster." "Captain's riding my ass the whole time." "Sentencing was today." "Judge is female." "That's right." "Landers." "I know Landers." "She's a sharp lady." "No?" "Guy gets ahold of some peanut butter, packs his ass-crack with it." "He's standing before the bench, waiting to give his statement." "Shoves his hand down his pants, comes out with extra-chunky Jif." "BaiIiffs won't come near him." "Now he looks the judge right in the eyes and licks his fingers clean." "holy shit." "So the judge says:" ""This man's insane." "He can't go to prison."" "Sends him to Psychiatric." "She fell for it." "Yeah!" "She's so fucking smart." "By the time she found out, the guy's already been transferred." "Proceedings closed." "Yeah, closed." "He'II do six months in the puzzle factory and they'II let him go." "Never, ever do a day in prison." "Give him credit." "He worked the system, deserves his freedom." "Yeah?" "Think so?" "Or not." "I'II tell you what." "I'II find this guy on the street and I'II do him." "Better take his bullets away, Stan." "Shit!" "Heard you had an expensive weekend in Vegas." "How did you ever screw up so bad?" "It's nothing." "I didn't know." "It's not my town." "The Russians don't care if you're a cop." "They'II whack you." "You ought to get on a plane." "Why?" "It's an easy fix." "How?" "I'II just cash in an account." "Whose?" "One of my old ones." "My first one." "The guy's a high-security risk." "If I'm not around, who will keep him off the radar?" "I'm just taxing him, that's all." "Okay?" "It's your call." "Don't dick this up." "I do not want to see you on the front page like the others." "Yeah, I understand." "Who's driving?" "Me." "Gray Mercedes." "Get the car." "black Monte carlo there, back windows shot out." "It's me." "Listen, we got the green light." "Fax a copy of the warrant to the clerk." "Get it signed by the judge, and I want you and paul to bring it to me." "tell Jeff to pick up some tools." "Picks and shovels." "Make sure he signs them out from maintenance." "Copy?" "That's right." "Hurry up!" "Later." "So how much cash was in that jacket?" "Forty G's." "What's that for?" "really want to know?" "Yes, I do." "Nothing's free in this world." "Not even arrest warrants." "Shit, man, I didn't want to know." "Check this out." "Nice suit, Mark." "beautiful suit." "Yeah, fuck you guys!" "AII right." "Nice, nice." "What's up, AIonzo?" "The picks and shovels?" "In the trunk." "Digging a ditch?" "No, you are." "Nice suit you got on there." "That's what I said." "What up, killer?" "What's up with you?" "Heard you ran into trouble." "It's all good." "Don't worry, everything's fine." "Shit, if we can get away with it, I'm with you." "Who the fuck is this?" "Jake Hoyt." "It's my first day." "You're a Iong way from Starbucks." "Why the fuck is he here?" "Gotta get his cherry popped." "Stay the fuck out of my way." "This is for the big dogs." "feel me?" "Here it is, all legit, signed by the judge, okay?" "Thanks to the Sandman." "Now listen." "Safety is first." "He gives us shit, we give him lead." "Let's do this right so we can all go home." "Time to punch in, ladies." "Freeze!" "On the floor!" "Down!" "What are you clowns doing?" "Hey, new guy, watch him!" "I'm on him." "You know what you're doing?" "Drop your gun!" "Five." "Four." "Three." "Boom!" "Give me a reason." "AIonzo's gonna have your ass." "What's up, Roger?" "What's going down, brother?" "Oh, it's all good, baby." "It's all good." "That's for you." "What am I supposed to do with this?" "Wipe my ass?" "Bad news, dog." "Gimme some of that $300-a-gIass shit." "please." "Had lunch with the wise men." "You gotta render unto Caesar." "Those vampires want my pension." "No, no." "Just a tax." "They got their boats and mistresses, house payments." "Nothing I can do." "I'm just a lowly civil servant." "You're their bitch." "What about me?" "I got your back." "Don't worry, we won't take anything you'II miss." "I'm sorry." "Orders, dog." "No you ain't, cop." "In the kitchen, fellas." "Give me the bitch." "You guys hold him down." "Who'II pay for my floor?" "The city." "Right here." "That's what I'm talking about." "What's in here?" "Coke?" "You'II see." "Grab that hammer and knock this lock off." "One, two...." "That's $250,000 you're holding." "Over four million in here." "A $3 million bust on day one." "You said four." "Minus tax, brother!" "Nothing's free in this world." "Buy your wife a car." "Put the kids through college." "The only checks I cash say "L.A.P.D."" "Somebody didn't sleep through Ethics." "You don't want a piece of this?" "No, right?" "Not like this." "No." "No?" "First time, you're not comfortable." "I'II hold it for you." "What about you?" "Oh, I'm comfortable." "How about you?" "I'm very comfortable." "Let's wrap this up." "Don't touch a thing!" "Evidence." "AIonzo, what are those pricks thinking?" "That I'm gonna stand still and let them horsefuck me?" "could put you out of your misery." "Hey, Jake, here." "Sit down." "Here's a secret:" "When you kill someone on duty they have to be your slave in the afterlife." "There you go." "Start an entourage." "Shoot him?" "Yeah." "Come on, kid." "Do me a favor." "Come on." "Do yourself a favor." "Hit him." "Are you serious?" "Hey, close the blinds." "AII right, I'II shoot him." "Go." "Pow!" "Boom!" "Shoot him." "No, man." "IKids these days." "Not gonna do it?" "AII right, give it to me." "Rookies!" "You want shit done, you gotta do it yourself." "holy shit!" "Come on, breathe." "Breathe, there you go." "Just let it go." "Breathe, dog!" "He's finished." "Where's the stinger?" "Right here." "AII right, Jeff." "You took fire coming in." "I need some time off, but...." "Watch the shades." "AII right." "Ready?" "IKiss me." "One...." "You okay?" "Yeah." "I gotta give you one more, though." "Do it." "Fuck!" "It's not what you know, it's what you prove." "Here it is." "Mark and paul kick the door." "Jeff's in first." "Roger fires twice." "What, one go through?" "You shot him!" "You fucking shot me, man!" "Don't worry." "call an ambulance!" "Go to jail, or go home?" "AII right, here's the scenario." "Mark and paul kick the door." "Jeff runs in." "Roger opens fire, hits Jeff." "Hoyt is in second, drops Roger with the shotgun." "Who shot Roger?" "New guy." "New guy." "You two?" "Hoyt." "Fuck Hoyt." "ambulance time!" "Done." "paul, call them up." "1 1 -49. 998." "Shots fired." "Officer down." "Repeat, officer down." "5951 Baxter Street." "congratulations." "You're gonna get a medal of valor for this." "I didn't shoot him." "Four cops saw it." "But I didn't." "You did." ""An L.A.P.D. narcotics officer was killed today serving a warrant in Echo Park."" "Give me the bitch." ""A spokesperson said the officer is survived by a wife and child."" "There's more." "You get the picture?" "Yeah, I get it." "That's the second time you pointed a gun at me!" "Goddamn, boy!" "That's it, Jake!" "Y'aII see this?" "That's it!" "I'II put a bullet in that melon." "Wait, wait." "I'm gonna be cool." "Drop the gun!" "Shoot me." "He's coming with me." "I'II shoot!" "He's a fed." "No, he ain't." "He's just a kid that got the drop on y'aII." "Let's take a deep breath and just diffuse this." "Jake?" "I didn't sign up for this!" "I know you're angry." "Everybody, put the guns down." "hell, no." "Choirboy first." "Listen!" "That's an order!" "Put them down!" "Use your ears, Jake." "Sometimes we take this shit all the way." "It's the nature of the business." "You'II never have to pull the trigger again, all right?" "Mark, where are you transferring?" "S.I.S." "Detective." "You give me 18 months, I give you a career." "We make the big seizures, Jake." "But if you're in my unit, you gotta be in it all the way." "I thought you were man enough to handle this shit." "Five decorated officers say that you shot Roger." "They will check your blood for intoxicants." "What are they gonna find?" "You've been smoking PCP all day." "You've been planning this all day." "AII week, son." "You talk, your blood gets to the lab." "You wanna take a walk?" "You won't make it out of here." "If you're cool, you're a hero." "You're above suspicion." "AIonzo, there's two shots left." "We need to kill him now and say Roger got him." "No, we ain't killing nobody." "This is a good man." "I can feel it." "Just had a little freak-out, that's all." "I say he's cool." "Nobody's gonna hurt him." "You do have a decision to make." "Because this place is gonna be overrun with blue suits." "So why don't you please go outside, clear your head." "Or shoot me." "Hey, paul?" "You're dead, motherfucker!" "You hear me?" "!" "Dead!" "well, lay off the device." "AII right." "Make sure that tub is clean." "AII right?" "AII right, later." "You all right?" "It behooves you not to dick around on this one." "justifiable homicide in the line of duty." "Now, what happened" "What happened was murder." "And armed robbery." "We had badges, so it's different?" "Son, open your eyes!" "Can't you see?" "That man was your friend, and you killed him like a fly." "My friend?" "tell me why?" "Because he knows my first name?" "This is the game." "I played his ass." "That's our job." "Roger sold dope to kids." "The world's better off without him." "This man was the biggest major violator in Los angeles." "I watched that cocksucker for years and now I got him." "This is chess, not checkers!" "What'd you think?" "We'd roll up in a black and white?" "slap the cuffs on him?" "He's a high roller, dog." "Take the money." "I'm not taking it." "Just take it." "No!" "Look, I don't give a fuck, but the boys'II feel better." "Fuck their feelings!" "Jake, we're a team." "A team?" "You guys are fucking insane." "I'II go back to the valley, I'II cut parking tickets." "It can't be like this." "It is." "I'm sorry, but it is." "It's ugly, but it's necessary." "I became a cop to put away dealers and criminals, not to be one." "You sound just like me." "I know what you're going through and feeling." "You're scared." "I'm not." "Yes, you are." "Everyone goes through that the first time." "I did." "The sooner you match what's in your head with what's in the real world the better you'II feel." "In this business you gotta have dirt on you to be trusted." "When all this is behind you, a whole other world will open up for you." "I walk a higher path, son." "I have the keys to all the doors." "What do you mean?" "My guys aren't leaders, they're clowns." "You're a leader." "You want my job?" "You got it." "You want to lock up poisoners?" "This is the place to do it." "But you gotta take your time." "You'II make detective, you'II grow wise." "And then you can change things." "But it's gotta be from the inside." "Let's go downtown to the station." "talk to my guy, Stan." "He'II go through what you gotta say to the D.A." "What are we doing now?" "I told an informant I'd take care of his family for him." "Bring them food, stuff like that." "Gotta help out the family." "believe it or not, I do try to do some good." "You know where you're at, dog?" "The fuck you looking at?" "Hey, we got some things for the family." "IKitchen's this way." "Put it on the counter." "Where's the head?" "Right through." "I'm gonna go to the head." "Two seconds, we're gone." "Hey, Iet me get the CD player." "No, the CD player's mine." "Dreamer!" "Come here!" "Count that shit, all right?" "Thanks a Iot, I was busy." "Learn how to count, fucking math whiz." "You looked!" "I didn't." "You calling me a cheater, ése?" "deal again, Sniper." "You play cards, cop?" "No, not really." "Want a beer?" "Have a cold one." "No, thanks, I'm good." "Come on, sit down." "play a card game with us." "Don't be rude, ése." "You're a guest." "Why don't you play one hand?" "Don't worry, we ain't betting money." "We gotta roll in a second." "AIonzo's taking a shit." "AII right, I'II play one hand." "Is this five-card draw?" "Yeah, jokers are wild." "Why don't you tell us something?" "How long you been a pig?" "My bad." "My bad." "I meant a police officer." "I've been a pig for 1 9 months." "Is that right?" "You like it?" "I should've been a fireman." "One more." "What you got, dog?" "Three of a kind." "I didn't get shit." "Boo-ya, baby!" "Two pair!" "What the fuck?" "He won." "I got two pair!" "Three of a kind beats two pair, you fucking dumb truck." "You're fucking stupid." "Take your medication." "seriously." "I know I'm number one." "See why we don't play for money?" "Because of this vato." "Show me your cohete." "What?" "Your gun, homes." "Underneath your shirt." "What is it, .380 stainless?" "9mm Beretta." "Like that?" "Just like it." "Yeah?" "Here's the problem." "I seen this one." "I want to see yours." "Come on, ése, I ain't gonna shoot nobody." "Let me check it out." "Learn that in the Academy?" "Neat trick." "This is nice." "Nice." "You could fuck a vato up with this." "What you do is, you aim like that." "I'm just playing." "Yeah, I gotta go." "AIonzo!" "IKick back and party." "Ain't nothing out there for you." "What are you talking about?" "Hey, white boy." "If you ask me homes, that's just, of course, if you ask AIonzo played you, ése." "Big time." "Wait, where you going?" "It's your deal." "It's all there." "Sure?" "You can count it yourself." "AIonzo pulled off a miracle." "Times are tight." "Scared up a Iot of cash." "Who'd he jack, homes?" "I don't know." "He jacked Roger." "blasted that fool." "AIonzo's a Iow-down, ruthless vato." "But I Iike that." "That's why I never shake his hand." "He don't respect nada." "iknow what the money's for?" "AIonzo, he's a hothead." "Last week in Vegas, some Russian starts talking shit." "AIonzo, he just snapped." "Beat his ass to death." "Turns out, that Russian, he's a somebody." "Now, AIonzo's into the Russians for a million." "How do you know that?" "AIonzo has until tonight to pay up." "But he's still on their list." "Nobody thought he could get the cash." "Good thing he did." "They're looking for him." "If he don't turn up downtown with the cash by midnight...." "Your vato he's dead." "Hey, pig." "Ever had your shit pushed in?" "simple question." "No?" "No." "Had my shit pushed in." "Yeah, man." "I had my shit pushed in, bro!" "Big time!" "smiley?" "Sure, I always get love from the homeys." "You guys fucked him up!" "Go next door." "Get the fuck out of here!" "You fucked up." "You're under arrest!" "For being a cop, dogging me in the mouth in my own pad." "You got the right to be bitch-sIapped!" "Drag him to the tub." "Punk motherfucker!" "Raid his ass!" "Do it!" "It's gonna be loud." "Let me get his money." "Wait." "Hurry up." "smiley, check it out." "Is that your little cousin?" "What's this?" "I found it!" "Who had it?" "I found it!" "Where?" "I found it in MacArthur Park!" "MacArthur Park!" "Wait up, I can't even see." "Shut the fuck up!" "Get in your last prayer." "Listen to me, man." "She was being raped." "Two crackheads were attacking her and I stopped them!" "I swear to God!" "You're lying to me!" "I am not lying!" "She was being raped!" "I stopped them!" "please!" "I got a kid." "Shut up, fag!" "blast his ass." "I have a little girl!" "Do it!" "I'm gonna get to the bottom of your bullshit." "She's my cousin, homes." "Ain't right involving her." "You fucked up." "If you're lying to me I blow your balls off." "Hello." "Hey, Letty." "What's up?" "Hey, Smiley." "Just doing homework." "You want Tony?" "No, I want you." "You go to school today?" "Yeah." "You didn't ditch?" "Nope." "I went to every class." "Why?" "I heard different." "Cops talk to you today?" "No, no." "All right, Letty don't bullshit me." "I got jumped by two crackheads." "You got jumped?" "I think they wanted to rape me." "But nothing happened, okay?" "Because this cop came." "They almost killed him but he kicked their ass." "Describe him." "He was a white boy." "He looked real young." "You're okay?" "Yeah, I'm fline." "Hey, Letty." "Yeah?" "We're not done." "Okay." "What's up?" "You gonna blast him?" "Vato was telling the truth." "Life's a trip, qué no?" "This is some trippy shit." "That's for getting my cousin's back." "Cover your head." "You'II mess up my floor." "You know this was just business, right?" "Right?" "Right." "What you doing here?" "You know you don't belong here." "What's up?" "Must be lost, motherfucker!" "Gonna need more than that up in here, boy!" "You got business here, rookie?" "I'm here for AIonzo." "Hey." "Is your dad home?" "In the bedroom." "He's in the bedroom?" "AII right, you wanna open up the door?" "Okay." "Thanks." "You watching TV?" "Yeah, anything good on?" "Do you want me to call my mom?" "No, I don't." "I'II tell you what I want." "Find a good hiding spot." "Do you have a favorite place to hide?" "The closet." "In the closet?" "That's perfect." "Okay, open up the closet." "AII right." "Good, good." "Can you sit down in there?" "AII right." "Now stay in here and be very quiet." "I'II be right back." "AII right?" "It's all good, baby." "You, against the wall." "Move real slow." "Put the money in that bag take your weapons and place them inside that piIIowcase." "congratulations, son." "You made it." "You passed the test." "You're a narc." "Put the gun down before you give her a heart attack." "I said put the money in that bag." "place your weapons inside that piIIowcase." "Fuck your appointment with the Russians." "Oh, okay." "Okay." "Hand me the pillowcase, baby." "Baby!" "Hand me the pillowcase." "You're gonna book me?" "You smoked the dust." "You ran out, and you're the one that shot Roger." "Here you go." "And the one on your ankle?" "Want the one in my back pocket too?" "One problem:" "You got no witnesses." "Who are your witnesses, huh?" "Roger?" "smiley?" "You think they'II help you?" "It's not what you know." "It's what you can prove." "What can you prove, huh?" "Nothing." "Where's your evidence?" "There." "Oh, shit!" "It's on now, Jake." "Don't move." "Where you at, Jake?" "Come on out, dog!" "Ah!" "I see you." "Shit!" "I'm surgical with this bitch." "How you want it?" "That fool in the wheelchair?" "How you think he got there?" "Mommy." "AIonzito!" "You see what I see?" "Officer Hoyt, job number one:" "Preserve life." "There's my son." "Don't hurt him." "We're walking out together." "AIonzito!" "AIonzito!" "You all right?" "I want my mommy." "I know, I know, I know." "Just sit tight, all right?" "It's gonna be all right." "I know." "Shut the fuck up!" "AII right, Iet me see your hands!" "Where is he?" "The window." "Come on!" "Get your kid, stay down." "AIonzito!" "Hey, man, you tripping?" "It's no fun when the rabbit has the gun, is it?" "My nigga." "Hey, first Damu puts one in his head I'II make you a rich man!" "Come on now." "Who wanna get paid?" "Who wanna get paid?" "They're not Iike you." "You know what I Iearned today?" "I'm not Iike you." "That's good." "I'm glad to hear that." "Good." "So, what now?" "Huh?" "What you gonna do, shoot me?" "You gonna bust your cherry killing a cop?" "There it is, Jake." "Hit me." "You never killed nobody before." "It ain't like stepping on ants." "Takes a man to kill." "Are you man enough to kill?" "Hit me right there." "Get me, Jake." "Get me." "Hit me." "Hit me." "You can't do it." "Somebody drop this fool for me." "You got us twisted." "You got to put your own work in." "AII right." "It's like that, Bone?" "It's like that." "player to player, pimp to pimp." "I don't believe you'd shoot me." "Don't do it." "Don't." "I don't believe you got it in you." "I'm gonna get that gun and that money." "You ain't gonna do a thing." "You ain't gonna shoot no cop in the back." "Don't do it." "You know what you'd get?" "The gas chamber." "You know what it smells like?" "Pine oil." "That's where you headed, to pine oil heaven." "I'm gonna get that gun and that money." "I don't think you got it in you." "I'm gonna go get it." "Shit!" "Ah, you motherfucker!" "The next one will kill you." "Son of a bitch!" "You shot me in the ass!" "Okay, wait, wait, wait." "Okay, okay." "AII right." "Come on, I need the money." "Give me the money." "Give me that money!" "It's not gonna happen." "You gonna take my own money from me?" "That's my evidence." "You wanna go to jail or go home?" "I wanna go home, Jake." "Give me the money, and let me go home." "You wanna go home?" "Yeah, Iet me go home, Jake." "Give me the money, and let me go." "Give me the money, and let me go home, Jake." "That's right, come on." "You don't deserve this." "Okay, motherfucker." "Jake, go and bounce, homey." "Get up out of here." "We got your back." "What?" "It's like that." "Oh, no, you didn't!" "Wait a minute!" "No, you-- Hey, hey, Jake!" "Hey!" "Jake!" "Jake!" "Jake, come back here!" "Jake!" "You disIoyaI, fooI-ass, bitch-made punk." "I need my money!" "Jake!" "Oh, you motherfuckers!" "Okay." "AII right!" "I'm putting cases on all you bitches!" "Huh?" "You think you can do this shit?" "Jake!" "You think you can do this to me?" "!" "You motherfuckers will be playing basketball in pelican Bay when I get finished with you!" "Shoe program, nigga!" "Twenty-three hour Iock-down!" "I'm the man up in this piece!" "Who you think you fucking with?" "!" "I'm the police!" "I run shit here!" "You just live here!" "That's right, you better walk away." "I'm gonna burn this motherfucker down!" "IKing IKong ain't got shit on me!" "That's all right." "That's all right." "Shit, I don't fuck" "I'm winning anyway." "I'm winning." "I'm winning anyway." "I can't lose." "Shit, you can shoot me, but you can't kill me." "Oh, what a day." "What a motherfucking day!" "An L.A. police offiicer was killed today serving a warrant near LAX." "An L.A.P.D. spokesperson said Offiicer Harris was survived by his wife and four sons." "The highly decorated offiicer, a 13-year L.A.P.D. veteran...." |
The Best Passagemaker
18 of 43 photos
18 of 43 photos
70 to 80 feet
Outer Reef 700
“Let’s just say this one was done the right way,” said one editor when reviewing the latest Outer Reef 700 (read a full review here). The yard continues to produce exquisite, solidly built, customized designs built for long-range cruising. Expect a range of nearly 4,300 miles at a bit under 6 knots or about 2,600 miles at 8 knots. This gem of a boat will take you where you want to go. |
Far-infrared bandpass filters from cross-shaped grids.
The optical transmission characteristics of electroformed metal grids with inductive and capacitive cross patterns have been investigated in the far-infrared spectral region. The transmission characteristics of one-and two-grid devices are represented by transmission line theory parameters. Results are used to suggest construction guidelines for two-grid bandpass filters. |
Christian Petersen/Getty Images
On July 4, 2017, while plenty of NBA fans were enjoying barbecues and family time, Utah Jazz faithful took an offseason gut punch.
"Free-agent Gordon Hayward plans to sign with the Boston Celtics," Chris Haynes tweeted that day. Utah's homegrown All-Star had spurned the Jazz for a reunion with his college coach, Brad Stevens.
"Timing has been problematic," then-general manager Dennis Lindsey said on July 5, per the Deseret News' Randy Hollis. "... There's not as many (free agent) prospects left on the board because of the timing."
He went on to tout Rudy Gobert, the acquisition of Ricky Rubio, Rodney Hood being a primary scorer and Derrick Favors being healthy.
Two years later, three of those four are gone. Standing in their place is a legitimate title contender built around Gobert and a rising star who was drafted shortly before Hayward left.
Thanks to some shrewd maneuvering from Lindsey, now the executive vice president of basketball operations, and new general manager Justin Zanik, Utah enters 2019-20 with a dynamic potential starting five.
Mike Conley, Donovan Mitchell (2017's ray of hope), Joe Ingles, Bojan Bogdanovic and Gobert.
That's a more balanced lineup than any coach Quin Snyder has had in the NBA.
Conley and Mitchell both averaged over 20 points last season. Bogdanovic was at 18.0, but he put up 20.6 per game following Victor Oladipo's injury. All three can pass, shoot and handle.
Ingles doesn't score as much, but he's another playmaker who can run the pick-and-roll.
Over the last three seasons, Gobert's usage percentage is 17.1. Among the 181 with a rate at least that high (and with 3,000-plus minutes), Gobert's 67.5 true shooting percentage ranks first. The average true shooting percentage of that bunch is 56.1, over 11 points below Gobert.
He's one of the best rim rollers (93.1 percentile in 2018-19) and second-chance creators (77.8 percentile) in the league, and now he's surrounded by four legitimate offensive weapons.
On the other end, the loss of Favors is cause for concern. Bogdanovic is nowhere near his level defensively. But the mere presence of Gobert should allow the Jazz to remain stout.
In the last three seasons, Utah's ranks in points allowed per 100 possessions read as follows: second, first and third. Gobert was first in the NBA in defensive real plus-minus in each of those campaigns.
Conley and Mitchell may be undersized, but they'll compete on the perimeter. Ingles can make things difficult on pretty much whatever position he's asked to guard. And Royce O'Neale will come off the bench as perhaps the team's best non-Gobert defender.
There's plenty of talent on that end.
Not having Favors may cost the Jazz another top-five defense, but the upgrades on offense should more than make up for that.
The Ringer's Kevin O'Connor broke down some of what Conley will bring:
"Conley ranks annually as one of the league’s most efficient scorers in the pick-and-roll, as the chart above shows. Now he’ll join a Jazz team that finished more possessions using the pick-and-roll than any other team in the NBA, according to Synergy. Conley is so good because he changes tempos and can score from all areas of the court. Over the past six seasons, he’s hit 36 percent of his dribble-jumper 3s, 41.9 percent of his dribble-jumper 2s, and 57.6 percent of his shots around the rim. The man knows how to score. And he can pass, too. Mitchell has shot 40.1 percent on catch-and-shoot 3s in his career, and Conley will feed him more of those chances. Rudy Gobert could be in for a career-best season finishing lobs."
The jump from Rubio to Conley probably can't be overstated. Last season, Conley's advantages in points, relative true shooting percentage and real plus-minus were substantial. And defenses won't be able to ignore him the way they did Rubio for much of the last two seasons.
On plenty of possessions, Rubio's primary defender would sag down into the lane, double-team someone or otherwise play more free safety than on-ball defender. That made things exponentially more difficult for Utah's other four players.
Improvement from Mitchell should help too. That's natural for most third-year players, but perhaps even likelier for Mitchell. His usage level was a lot to ask of someone with his experience over the last two seasons. Conley and Bogdanovic commanding defensive attention should get him more open looks.
The presence of two more creators will also be good for Ingles. He's a solid point forward, but more opportunities to simply be a catch-and-shoot outlet should serve him well. Over the last three seasons, Ingles' effective field-goal percentage on catch-and-shoot opportunities is a scorching 65.5.
In the same span, Bogdanovic's effective field-goal percentage is 61.0 on catch-and-shoot attempts. And he showed an ability to be much more than that in Oladipo's absence last season.
And so far, we've only hit on the potential starting five. Utah's depth has been a key part of its success in the Snyder era. And in 2019-20, the Jazz will have Dante Exum, O'Neale, Georges Niang, Jeff Green and Ed Davis filling out the rotation. Emmanuel Mudiay and second-round pick Jarrell Brantley may even lend a hand.
Utah is loaded, and for the first time in years, modern.
The Jazz are poised to have a real shot in the post-#LightYears West.
The Golden State Warriors are down Kevin Durant (signed with the Nets) and Klay Thompson (ACL injury). They won't fold, but their weaker hand has inspired others to up the ante.
The Los Angeles Lakers added Anthony Davis to LeBron James. The Los Angeles Clippers pulled off a heist to land Kawhi Leonard and Paul George.
The Denver Nuggets and Houston Rockets aren't going away either. Continuity may win the day for them.
The Jazz mixed both approaches. The most important players—Gobert, Mitchell and Ingles—are all back. Utah supplemented them with Conley, Bogdanovic, Davis and Green.
Utah's success in recent years was based mostly on defense. That's still there. But now, the Jazz should be able score a little too.
If the NBA is in a post-superteam era, Utah has positioned itself to take on, and potentially beat, any other contender.
Unless otherwise noted, stats courtesy of NBA.com, Basketball Reference or Cleaning the Glass.
Andy Bailey covers the NBA for Bleacher Report. Follow him on Twitter (@AndrewDBailey) and listen to his Hardwood Knocks podcast, co-hosted by B/R's Dan Favale. |
Email notification sign-up
Monetary Policy and Central Banking
March 28, 2019
Central banks play a crucial role in ensuring economic and financial
stability. They conduct monetary policy to achieve low and stable
inflation. In the wake of the global financial crisis, central banks
have expanded their toolkits to deal with risks to financial stability
and to manage volatile exchange rates. Central banks need clear policy
frameworks to achieve their objectives. Operational processes tailored
to each country’s circumstances enhance the effectiveness of the
central banks’ policies. The IMF supports countries around the world by
providing policy advice and technical assistance.
Monetary policy
A key role of central banks is to conduct monetary policy to achieve price stability (low and stable inflation) and to help manage economic fluctuations. The policy frameworks within which central banks operate have been subject to major changes over recent decades.
Since the late 1980s, inflation targeting has emerged as the leading framework for monetary policy. Central banks in Canada, the euro area, the United Kingdom, New Zealand, and elsewhere have introduced an explicit inflation target. Many low-income countries are also making a transition from targeting a monetary aggregate (a measure of the volume of money in circulation) to an inflation targeting framework.
Central banks conduct monetary policy by adjusting the supply of money, generally through open market operations. For instance, a central bank may reduce the amount of money by selling government bonds under a “sale and repurchase” agreement, thereby taking in money from commercial banks. The purpose of such open market operations is to steer short-term interest rates, which in turn influence longer-term rates and overall economic activity. In many countries, especially low-income countries, the monetary transmission mechanism is not as effective as it is in advanced economies. Before moving from monetary to inflation targeting, countries should develop a framework to enable the central bank to target short-term interest rates (paper).
Following the global financial crisis, central banks in advanced economies eased monetary policy by reducing interest rates until short-term rates came close to zero, which limited the option to cut policy rates further (i.e., limited conventional monetary options). With the danger of deflation rising, central banks undertook unconventional monetary policies, including buying long-term bonds (especially in the United States, the United Kingdom, the euro area, and Japan) with the aim of further lowering long term rates and loosening monetary conditions (paper). Some central banks even took short-term rates below zero.
Foreign exchange regimes and policies
The choice of a monetary framework is closely linked to the choice of an exchange rate regime. A country that has a fixed exchange rate will have limited scope for an independent monetary policy compared with one that has a more flexible exchange rate. Although some countries do not fix the exchange rate, they still try to manage its level, which could involve a tradeoff with the objective of price stability. A fully flexible exchange rate regime supports an effective inflation targeting framework.
Macroprudential policy
The global financial crisis showed that countries need to contain risks to the financial system as a whole with dedicated financial policies. Many central banks that also have a mandate to promote financial stability have upgraded their financial stability functions, including by establishing macroprudential policy frameworks. Macroprudential policy needs a strong institutional foundation to work effectively. Central banks are well placed to conduct macroprudential policy because they have the capacity to analyze systemic risk. In addition, they are often relatively independent and autonomous. In many countries, legislators have assigned the macroprudential mandate to the central bank or to a dedicated committee within the central bank. Regardless of the model used to implement macroprudential policy, the institutional setup should be strong enough to counter opposition from the financial industry and political pressures and to establish the legitimacy and accountability of macroprudential policy. It needs to ensure that policymakers are given clear objectives and the necessary legal powers, and to foster cooperation on the part of other supervisory and regulatory agencies (see further Key Aspects of Macroprudential Policy). A dedicated policy process and is needed to operationalize this new policy function, by mapping an analysis of systemic vulnerabilities into macroprudential policy action (Staff Guidance Note on Macroprudential Policy).
How the IMF supports effective central bank frameworks
The IMF promotes effective central bank frameworks through multilateral surveillance, policy papers and research, bilateral dialogue with its member countries, and the collection of data for policy analysis and research.
The IMF has provided policy advice on how to avoid potential side effects from the implementation of and exit from unconventional monetary policy (paper), and established principles for evolving monetary policy regimes in low income countries (paper).
The Fund has also examined interactions between monetary and macroprudential policy (paper), and provided principles for the establishment of well-functioning macroprudential frameworks (guidance note).
The IMF is in regular dialogue with member country central banks through bilateral surveillance (Article IV consultation), FSAPs and technical assistance:
In its Article IV consultations, the IMF provides advice on monetary policy action to achieve low and stable inflation, as well as on establishing effective monetary policy and macroprudential policy frameworks.
The Financial Sector Assessment Program (FSAP) provides member countries with an evaluation of their financial systems and in-depth advice on policy frameworks to contain and manage financial stability risks, including the macroprudential policy framework, which is now often covered in dedicated technical notes (see for example Finland, Netherlands, and Romania).
Country programs supported by an IMF arrangement often include measures to strengthen monetary policy and central bank governance.
In order to inform policy development and research, the IMF is also engaged with its members to develop and maintain databases:
The IMF has for some time kept track of countries’ monetary policy arrangements (AREAER), as well as central banks’ legal frameworks (CBLD), and their monetary operations and instruments (MOID).
The IMF has recently launched a new annual survey of macroprudential measures and institutions. This survey will support IMF advice and policymakers around the world, by providing details on the design of macroprudential measures, and enabling comparisons across countries and over time
The IMF also compiled a comprehensive historical database of macroprudential measures (iMaPP) that integrates the latest survey information and allows for an assessment of the quantitative effects of macroprudential instruments (paper). This database is now being used by IMF economists to measure policy effects, and it is also available to researchers around the world. |
Send this page to someone via email
A new analysis of escalating trade disputes involving the United States warns that a deterioration into an all-out, global trade war would knock North America’s economies into a recession.
The report by Scotiabank says if the U.S. breaks all trade ties with its partners, and imposes across-the-board tariffs averaging 20 per cent, then Canada and Mexico would see their economies contract in 2020.
For Canada, it predicts the economy would shrink 1.8 per cent.
Earlier this month, the U.S. imposed new tariffs on steel and aluminum imports from other countries, including Canada, Mexico and the EU — and Washington is now threatening to introduce more duties, this time on automobiles.
Story continues below advertisement
America’s allies, including Canada, have vowed to retaliate with tariffs of their own on U.S. imports.
Then on Friday, U.S. President Donald Trump went further by slapping a 25 per cent tariff on up to $50 billion dollars worth of goods from China.
The tariffs are set to take effect July 6 and would push the world’s two largest economies closer to a full-scale trade war.
WATCH: Fact check on Donald Trump’s statements on trade
8:05 Fact check on Donald Trump’s statements on trade Fact check on Donald Trump’s statements on trade |
/*---------------------------------------------------------------------------------------------
* Copyright (c) Microsoft Corporation. All rights reserved.
* Licensed under the MIT License. See License.txt in the project root for license information.
*--------------------------------------------------------------------------------------------*/
// Do not edit this file. It is machine generated.
{
"carret.moveLeft": "Mover Carret a la izquierda",
"carret.moveRight": "Mover Carret a la derecha"
} |
Express Scripts Gets Fraud Charges Dismissed
Law360, New York (June 11, 2007, 12:00 AM EDT) -- The Supreme Court's recent Twombly decision was once again put to use on a defendant's behalf in a federal case, when a judge on Thursday granted a pharmacy benefit management company's motion to dismiss, saying the plaintiffs' fraud charges were too ambiguous to merit continued proceedings.
In June 2006, Express Scripts Inc. filed a motion to dismiss Pearson's Pharmacy Inc.'s complaint, filed in January 2006 in the U.S. District Court for the Middle District of Alabama, charging ESI with fraudulent misrepresentation and suppression in failing to... |
5466
What is 0 divided by -221744295?
0
Divide -5775414 by -77.
5775414/77
-594295 divided by -444
594295/444
2688 divided by 58018
1344/29009
Divide -12786 by -22410.
2131/3735
What is 7767450 divided by -18?
-431525
Calculate -13668375 divided by 41.
-333375
What is 7701665 divided by 4?
7701665/4
461987 divided by -3
-461987/3
Calculate 627694529 divided by 583.
1076663
-12537409 divided by -2
12537409/2
What is 3550881 divided by -1183627?
-3
What is 12394330 divided by -2478866?
-5
Divide -58690565 by 9395.
-6247
Divide 71501710 by 88822.
805
What is 89979526 divided by -13?
-6921502
Calculate -56 divided by -298392.
7/37299
217884 divided by -117
-72628/39
Divide -3799 by -82648.
3799/82648
Calculate -1121 divided by -41608.
1121/41608
What is 823309 divided by -49?
-823309/49
-3457 divided by -16837
3457/16837
Divide 70660792 by 6.
35330396/3
What is 742896 divided by -4824?
-154
-1051799821 divided by 23
-45730427
Calculate 1 divided by -1535515.
-1/1535515
Divide -24111320 by 5.
-4822264
Calculate 13532313 divided by -237409.
-57
What is -18738 divided by 208?
-9369/104
-5 divided by -505047
5/505047
-3497305360 divided by 4
-874326340
Calculate 5 divided by -32580266.
-5/32580266
What is -83062 divided by -3540?
41531/1770
What is -24794196 divided by 147?
-168668
Calculate 5103620 divided by -5103620.
-1
Divide 46 by 10326836.
23/5163418
-13293748 divided by -17
13293748/17
Divide 384139256 by -419366.
-916
-35912362 divided by -17956181
2
Calculate 119959 divided by 165.
119959/165
What is 332057 divided by 66?
30187/6
Divide -145024 by 2112.
-206/3
40504800 divided by -6
-6750800
Calculate -96694973 divided by -2.
96694973/2
Calculate 12946831 divided by -251.
-51581
-2551 divided by -3735
2551/3735
-8 divided by -702867
8/702867
Divide -30139275 by 16.
-30139275/16
Divide 18821908 by 1876.
10033
408 divided by 1431956
102/357989
530 divided by 2062
265/1031
Calculate 1050660295 divided by -5.
-210132059
Calculate -515924950 divided by 103184990.
-5
-3053 divided by 70822
-3053/70822
-35374 divided by 21069
-35374/21069
Calculate 7488523 divided by 2281.
3283
What is -64750 divided by 244?
-32375/122
113794 divided by -5396
-56897/2698
Calculate -72696650 divided by 1261.
-57650
15 divided by -303307
-15/303307
Calculate 93 divided by -264673.
-93/264673
Calculate -3 divided by 54669136.
-3/54669136
What is -1941499 divided by 8?
-1941499/8
285292552 divided by 12404024
23
Calculate -404276 divided by -958.
422
What is -73260495 divided by 5?
-14652099
What is 5 divided by 7091116?
5/7091116
Divide 9426384 by 3.
3142128
Calculate 4 divided by -113358963.
-4/113358963
What is 66069972 divided by -254?
-260118
Calculate -333 divided by -203.
333/203
Divide 127774517 by 2587.
49391
Divide 23306616 by 5048.
4617
Calculate 7025 divided by -3266.
-7025/3266
Divide -41639603 by 885949.
-47
302942444 divided by 7
43277492
Calculate 380196500 divided by -10.
-38019650
Calculate -4 divided by 176906.
-2/88453
Calculate 46807103 divided by 119.
393337
What is -29427316 divided by 4?
-7356829
Calculate -357500 divided by -89375.
4
What is -4 divided by -33435316?
1/8358829
What is 233297 divided by -914?
-233297/914
-19912879 divided by 1
-19912879
What is 3083 divided by -4899?
-3083/4899
Divide 35227208 by -8542.
-4124
-2437001 divided by -17
143353
Calculate -52993897 divided by -3.
52993897/3
Calculate -4 divided by -120703173.
4/120703173
-10961544 divided by -31
10961544/31
What is -114 divided by -968190?
19/161365
Divide -61483050 by 401850.
-153
909522129 divided by -700171
-1299
Calculate -906 divided by -20010.
151/3335
Divide 166340 by 615.
33268/123
What is 19 divided by 5772?
19/5772
0 divided by -358846074
0
Divide 1928 by -2650.
-964/1325
What is -87 divided by 76106?
-87/76106
What is -128 divided by -142227?
128/142227
Calculate 5041872 divided by -216.
-23342
Divide 110777 by 197.
110777/197
4597 divided by -8299
-4597/8299
-35336840 divided by -11
3212440
-24660608 divided by -181328
136
What is 3 divided by -4039320?
-1/1346440
-5 divided by 23751
-5/23751
-43427036 divided by -9131
4756
What is 83496750 divided by -683?
-122250
1202388 divided by -3
-400796
What is -18107130 divided by 71?
-255030
Divide -568619764 by -14963678.
38
27738006 divided by -10981
-2526
Calculate 36287586 divided by -5.
-36287586/5
Divide 34890444 by 6.
5815074
374401 divided by -2018
-374401/2018
-72781632 divided by -4752
15316
What is 65037599 divided by -474727?
-137
Calculate 17 divided by -1064528.
-17/1064528
What is 13330797 divided by -4443599?
-3
Calculate -63880941 divided by -2.
63880941/2
Divide -3975750 by -25650.
155
What is -265290004 divided by -322?
823882
What is 2 divided by 2518850?
1/1259425
-1530 divided by 3313
-1530/3313
Divide -2069954 by 4.
-1034977/2
-1 divided by 106360075
-1/106360075
What is 14733 divided by -427?
-14733/427
Divide 135121008 by -3.
-45040336
Divide 21428 by -199.
-21428/199
Calculate -1037239 divided by 1.
-1037239
31192028 divided by -318286
-98
Calculate -1339124 divided by -838.
1598
Calculate -1780827 divided by -91.
1780827/91
319604100 divided by -6
-53267350
What is -746877354 divided by 13906?
-53709
-210907662 divided by -717373
294
-7609392 divided by -951174
8
Calculate -110458712 divided by 28.
-3944954
-51234475 divided by -5
10246895
What is 303 divided by -66025?
-303/66025
What is 83726 divided by -278?
-41863/139
-59036 divided by -1305
59036/1305
2747367 divided by -3
-915789
-9597555 divided by -3091
3105
Calculate -1 divided by -5544174.
1/5544174
Divide -8234778 by -3.
2744926
Divide -22147356 by -671132.
33
Divide 128606860 by -64303430.
-2
What is 305686 divided by 1?
305686
Divide 132741 by 11.
132741/11
Calculate -30679404 divided by 28.
-1095693
Divide 1 by -11275487.
-1/11275487
What is 194079304 divided by 97039652?
2
Divide -654627645 by -130925529.
5
Divide -8495828 by 2123957.
-4
-221020203 divided by 111
-1991173
What is -4 divided by -3236681?
4/3236681
Divide 155760553 by 13.
11981581
What is 3087 divided by 23024?
3087/23024
What is -3191452035 divided by -3?
1063817345
2497 divided by -473728
-2497/473728
Divide -2754231 by -27.
918077/9
Calculate 1621157 divided by 5.
1621157/5
-135884 divided by 1
-135884
-36677625 divided by 36677625
-1
Calculate -4 divided by -2710732.
1/677683
Calculate -1156339524 divided by -3.
385446508
-53088220 divided by 20
-2654411
Divide -1443618 by -31.
1443618/31
Calculate 15131985 divided by -1465.
-10329
Divide 14107122 by 4702374.
3
What is -233110 divided by 86?
-116555/43
-100885540 divided by 20
-5044277
Divide 5529925 by -30.
-1105985/6
305466 divided by 49
6234
What is 9179226 divided by 34902?
263
Calculate -510 divided by -35871.
170/11957
What is -4781286 divided by -2390643?
2
What is -63131 divided by -249?
63131/249
What is 16 divided by 3016190?
8/1508095
Divide 286932550 by -2.
-143466275
2539390 divided by -16
-1269695/8
What is -151383337 divided by 21626191?
-7
Divide 52563717 by 2285379.
23
Divide 5568 by -1719.
-1856/573
What is -2942271 divided by -1847?
1593
Calculate 98103760 divided by 80.
1226297
What is 365 divided by 32467?
365/32467
Calculate 50940057 divided by 2425717.
21
Divide -1361618794 by 2.
-680809397
Calculate 342550 divided by 1607.
342550/1607
Divide -195028420 by 166.
-1174870
What is 1 divided by 989267?
1/989267
Calculate -452976510 divided by 3.
-150992170
What is 5061156 divided by 74?
68394
What is -1743539 divided by -44?
1743539/44
Calculate -278973888 divided by -192928.
1446
Divide 2300 by -193860.
-115/9693
Divide -86492133 by -39.
2217747
Divide -2 by 38726550.
-1/19363275
Divide 38263427 by -38263427.
-1
Divide -79061598 by 908754.
-87
189847008 divided by 1216968
156
Divide 0 by -12822832.
0
44791716 divided by -11197929
-4
What is -160430088 divided by 1348152?
-119
-261272792 divided by 5
-261272792/5
Divide 452 by 554012.
113/138503
Divide -792539304 by 356.
-2226234
4490698 divided by -73618
-61
Calculate -3167118 divided by 351902.
-9
Divide 1996299 by 691.
2889
Calculate -4613494 divided by 79543.
-58
-312868314 divided by 52144719
-6
Calculate 3 divided by 36891267.
1/12297089
Divide -2023285 by 404657.
-5
Calculate -30566 divided by 6099.
-30566/6099
Divide -32886 |
Q:
Anything better than VBA
I have had the opportunity to code using VBA. Most of the VBA Script i have done have been with having Excel in foreground, and excel files not being accessible while the code ran.
Now I am curious to know if there is any ways to keep excel in background and do the cell updation in the same way as it is done on foreground.
Update 1:-
By background i mean that the file is not kept open on the desktop, but is being access by the program.
A:
It's hard to understand exactly what you mean by background and foreground, but if your macro is taking too long to run (like minuits) try adding the things below from the article here:
https://blogs.office.com/2009/03/12/excel-vba-performance-coding-best-practices/
Essentially add this at the start of your code:
With Application.Excel
.ScreenUpdating = False
.DisplayStatusBar = False
.Calculation = xlCalculationManual
.EnableEvents = False
End With
and this at the end:
With Application.Excel
.ScreenUpdating = True
.DisplayStatusBar = True
.Calculation = xlCalculationAutomatic
.EnableEvents = True
End With
You can also use
ActiveSheet.DisplayPageBreaks = False 'at the beginning and True at the end
Personally though I have found that the biggest performance upgrade generally comes with deactivating the calculations.
|
module Ekylibre
module FirstRun
module Faker
class Base
def self.run(options = {})
new(options).run
end
def initialize(options = {})
@max = options[:max] || 0
end
def files
Pathname.new(__FILE__).dirname.join('files')
end
def path(*args)
files.join(*args)
end
def count(name, options = {}, &_block)
STDOUT.sync = true
f = Ekylibre::FirstRun::Counter.new(@max) do |_count, _increment|
print '.'
end
start = Time.zone.now
label_size = options[:label_size] || 21
label = name.to_s.humanize.rjust(label_size)
label = Ekylibre::FirstRun::Base.ellipse(label, label_size)
print "[#{'FAKE'.magenta}] #{label.blue}: "
begin
yield(f)
print ' ' * (@max - f.count) if @max > 0 && @max > f.count
print ' '
rescue Ekylibre::FirstRun::Counter::CountExceeded => e
print '! '
end
puts "#{(Time.zone.now - start).round(2).to_s.rjust(6)}s"
end
end
end
end
end
|
United Nations Development Programme
UNDP and World Bank pledge support to Philippines peace process
07 May 2013
Payuna Biano, 59, (far right) with four of her grand children live in a cramped crawlspace beneath a school in the southern Philippine town of Datu Piang in Maguindanao province. Biano and her family are among thousands still left displaced by 2008 fighting between Muslim separatist rebels and government forces. (Photo: Jason Gutierrez/IRIN)
Manila/New York— The United Nations Development Programme (UNDP) and World Bank announced last week that they will offer a comprehensive support package to on-going peace negotiations between the Government of the Philippines and the Moro Islamic Liberation Front, a secessionist group in the south.
The scheme, drawn up in consultation with the Government, will help both sides to meet the terms of a landmark peace deal signed in October 2012. A key part of that agreement, which seeks to bring closure to a 15-year-old peace process, calls for replacing the current Autonomous Region in Muslim Mindanao with a new administrative body called The Bangsamoro.
The UN will assume full responsibility for the funds and a consultative transitional commission – made up of representatives from the Government and the Moro Islamic Liberation Front – will determine which areas are given advice and support.
At the launch of the programme, UN Resident Coordinator Luiza Carvalho said the scheme will recruit national and international governance experts who will help the transition commission, made up of members from both sides, begin the critical work of establishing a new government as stipulated by the peace agreement.
The first step is the drafting of The Bangsamoro’s Basic Law, “which will reflect the Bansamoro people’s aspirations for genuine autonomy while establishing the basis for efficient and accountable government,” Carvalho said.
The United Nations Development Programme (UNDP) has so far put close to US$1 million into the support package and is working to raise the remaining $6 million that will be needed to provide experts who will help establish the Bangsamoro administration. The funds will go towards services that are essential to ensuring the terms of the agreement and long-term peace in the Philippines.
In addition to helping draft the Basic Law, advisors provided by UNDP and the World Bank will help set up the new autonomous administration, providing guidance to the transition commission in such areas as reform of the justice, court and security sectors. They will also provide advice on development and economic planning in post-conflict situations, natural resource management and how to establish fiscal and tax policies.
"Technical support from the UN and World Bank will give us access to ideas and practices that have been found successful in other parts of the world,” said Al Haj Murad, Chairman of the Liberation Front. “It will help us reach out to communities and facilitate local dialogue and consultation to secure broader ownership and help us draft the best possible Basic Law." |
SEGA Rally Championship - Demo FAQ
_____ _______________ ____ ____
/ ___// ____/ ____/ | / __ \____ _/ / /_ __
\__ \/ __/ / / __/ /| | / /_/ / __ `/ / / / / /
___/ / /___/ /_/ / ___ | / _, _/ /_/ / / / /_/ /
/____/_____/\____/_/ |_| /_/ |_|\__,_/_/_/\__, /
D E M O F A Q /____/
FAQ created based on PC demo of SEGA Rally
By Adam Copper
E-mail: adam3k3@gmail.com
This FAQ is Copyright (c) 2005 Adam Copper
Adam3k3 FAQer Profile
http://homepages.tesco.net/vicky.reynolds1/profiles/adam3k3.htm
Last Revision August 30th, 2005
Table of Contents
1.Introduction..........................................[INT]
2.Version History.......................................[VHS]
3.Controls..............................................[CON]
4.Demo Track............................................[TRK]
5.Moding................................................[MOD]
6.FAQ...................................................[FAQ]
7.Legal Disclaimer......................................[LDR]
USE the "CTRL+F" to Search the FAQ, just copy and paste
the code into the search bar and click Find.
===============================================================================
[INT] 1. I N T R O D U C T I O N
===============================================================================
Welcome to my first demo FAQ on Sega Rally for PC version. This demo gives
you one car and one track to race on, not a lot but still nice. Any way this
FAQ covers all possible things that can be done with this demo, enjoy.
===============================================================================
[VHS] 2. V E R S I O N H I S T O R Y
===============================================================================
Version 1.00 August 30th, 2005
Finished the FAQ, everything is here. If you have any mods to add
just e-mail me.
===============================================================================
[CON] 3. C O N T R O L S
===============================================================================
Shift gear up: Up Arrow
Shift gear down: Down Arrow
Make left turn: Left Arrow
Make right turn: Right Arrow
Accelerate: Numpad 0
Break: Numpad 1
Change view: Numpad 4
Make selection: Numpad 1
Return to previews screen: Numpad 0
Thus are the default settings; you can change them by pressing F1
and going into controls.
===============================================================================
[TRK] 4. D E M O T R A C K
===============================================================================
You start out on the forest track and you have 50 seconds to start with.
Etch check points add to the total time depending haw fast you go. You
have to finish first in this 2 laps race, your opponent is not hard but
you still have to drive right in order to win.
There are many normal turns and some hard turns. When you see normal sign
turn (it's in blue) that means you have to sharply or easily depending on
the turn hold the break and turn, if it's a hard turn (in red) you have to
hold the break and let go of the Accelerate button. Drive in a couple of
test runs to know the track. Here is a map I draw:
eeeeeeeeeee
eeeee. uuu.eeee
eeee eeeE
Deeee ee5
zeee Eeeeeeeez ee
ee Xeeee yeeeeeeX ee
e# eee ueee. eu
ee ee .eG De
Xe eG eK eE
eW XeW e. Kee
ue ee ee zee
eX ee De eee
e eK eeeE eee
e e eee yee
e ee Xee# ee
ee ee ee eE
9ee Gee ee e
eeX ee e. ee
ye e ze #e
e# e5 e De
ee ee e5 De
ee ee eX De
ee ee ee ye
ee ee ee ee
e e Ee. Gee
ye e e ee
ee ee ee ee
Eee Eey ee ee
ee# ee e eX
e e e eD
e e e eD
e e GeG eX
Ke eW ee eX
e eE .ee ee
XeE ee #e. eey
e e9 eX ee
ee e e eG
Xe e e eeW
ee e e e
eu ee e e
5ez e ee 5e
Ke e ee eeu
ee #ee ee ee
eW ee ee Xee
e yee ee ee
Xee eeX ee Ee eeeeeeeE
ee eE ee ee eee# eeee
#eG ee ee e ee eeee
ee ee e ee eeE XEG9u e
ee ee e e Xeu eeeyK9eeeee e
ee 9eu e e De eee e ee
9ee .ee ee eeeKuuuKeee zeeE e eee
ee. eey ye Deeeeez eee ee ee
yee ee Xe ee. eeeX e
ee ee ee. ee# Ee e
ee ee eeeeeXXeee e e
ee eee .9E95 e ye
Dee eeeK ee ee
ee .eeeeeeeeEEEEEeeeee eee ee
ee eeeu eeeG ee
Gee EeeeeeeeW 5eeeeeeee ee
eeeG zee ee eeD
eeeeee eee Xee
eee eeee
eeeeeeeeee
Ok its not exactly the greatest map every made but it will have to do.
===============================================================================
[MOD] 5. M O D I N G
===============================================================================
Just in case you don't know what moding stands for it's modifying,
editing something. Many PC games can be moded easily, some with
special programs and some with simple ones like Paint or Photoshop.
Ok before doing anything or editing any file I sagest bucking it up,
copy past it some where so if something goes wrong you always have a
buck up file to save the day. In this demo the only thins you can mod
are the graphs, yes that blue left or right sign can be edited and can
be made look like what you want. To start off you will need to follow
this steps:
1. Go to the game directory
2. Select the file you want to mode; C:\where you save it\Sega Rally\SCROBJ
3. Remember when you finish editing it you have to save it as the same type
it was and by the same dimensions or it wont work right and may also crash
the game.
Try all graphics and see haw they looks.
===============================================================================
[FAQ] 6. F A Q
===============================================================================
Q: Who made this game and when was it released?
A: The game was published and developed by SEGA
Release Date:
US: March 25, 1997
Japan: February 4, 1998
Europe: February 4, 1998
Q 2: Where can I get the demo?
A 2: You can get it from many websites like:
www.gamespot.com
www.fileplanet.com
Q 3: Where can I buy it?
A 3: It's old so you may want to check out EBay or Amazon.
===============================================================================
[LDR] 7. L E G A L D I S C L A I M E R
===============================================================================
Copyright (c) 2005 Adam Copper
This FAQ is registered with the Copyright Office. It may not be placed
on any public display including and not limited to websites, magazines,
or any other distributed form. Any part of it may not be used anywhere
under any circumstances. No money must be made of it, selling, giving
away with a parches is prohibit. This FAQ was created for private personal
use only, violation any of these terms will result in taking legal action
agents you immediately.
All trademarks and copyrights contained in this document are owned by
their respective trademark and copyright holders.
IF YOU WANT TO USE THIS FAQ ON YOUR WEBSITE, YOU MUST REQUEST PERMISSION
FROM ME. SEND ME YOU'R WEBSITE URL, THAN WAIT FOR MY PERMISSION. IF YOU
USE THIS FAQ OR ANY PART OF IT WITHOUT MY PERMISSION ON YOUR WEBSITE OR
ANY PUBLIC DISPLAY, YOU WILL FORCE ME TO TAKE LEGAL ACTION IMMEDIATLY.
This FAQ can only appear on the following websites:
.(GameFAQs) http://www.gamefaqs.com
.(Cheat Codes) http://www.cheatcodes.com
.(Neosekeer) http://www.neosekeer.com
.(IGN) http://faqs.ign.com
If anyone fined this FAQ on any unlisted site please inform me ASAP.
E-MAIL: adam3k3@gmail.com
Contac information
I may be contacted at any time via my e-mail, (adam3k3@gmail.com).
If you have any questions, contributions, corrections, or anything else
feel free to e-mail, just make sure to put "Game Name" as a subject and
watch how fast I delete your e-mail if you acutely put "Game Name" as a
subject!
READ THOSE RULES BEFORE SENDING AN E-MAIL:
Types I WILL accept:
. Questions that are NOT answered in the FAQ
. Contributions
. Corrections
. Asking if you can put it on your website
Types I will NOT accept:
. Hate mail
. Chain letters
. Questions already answered in this FAQ
Credits/Special Thanks
---------------------------------------------------
.All listed websites for accepting my FAQs.
.You for reading this FAQ.
.Me for creating this FAQ for all of you out there.
FAQ Created by
___ __ _____ __ _____
/ | ____/ /___ _____ ___ |__ // /_|__ /
/ /| |/ __ / __ `/ __ `__ \ /_ (/ //_//_ (
/ ___ / /_/ / /_/ / / / / / /__/ / ,( ___/ /
/_/ |_\__,_/\__,_/_/ /_/ /_/____/_/|_/____/
-End of Document- |
Vega Motorcycle Helmets
Vega Motorcycle Helmets
Vega helmets are built to last and have affordable features. All Vega helmets, such as the Vega
Altura or the Vega XTS helmet, are either DOT approved or DOT and ECE approved. Some have a fiberglass shell while other Vega motorcycle helmets have an advance thermoplastic shell. |
UNPUBLISHED
UNITED STATES COURT OF APPEALS
FOR THE FOURTH CIRCUIT
No. 19-4035
UNITED STATES OF AMERICA,
Plaintiff - Appellee,
v.
ALEX ALTERICK HAMILTON, a/k/a P,
Defendant - Appellant.
Appeal from the United States District Court for the Eastern District of North Carolina, at
Raleigh. Terrence W. Boyle, Chief District Judge. (7:18-cr-00034-BO-1)
Submitted: October 24, 2019 Decided: November 14, 2019
Before KEENAN and RUSHING, Circuit Judges, and TRAXLER, Senior Circuit Judge.
Affirmed by unpublished per curiam opinion.
Mary Jude Darrow, LAW OFFICE OF MARY JUDE DARROW, Raleigh, North Carolina,
for Appellant. Jennifer P. May-Parker, Assistant United States Attorney, OFFICE OF THE
UNITED STATES ATTORNEY, Raleigh, North Carolina, for Appellee.
Unpublished opinions are not binding precedent in this circuit.
PER CURIAM:
Alex Alterick Hamilton pled guilty to distributing cocaine, in violation of 21 U.S.C.
§ 841(a)(1), (b)(1)(C) (2012), and possessing a firearm in furtherance of, and using and
carrying a firearm during and in relation to, a drug trafficking crime, in violation of 18
U.S.C. § 924(c)(1)(A) (2012). The district court sentenced Hamilton to 262 months’
imprisonment. Hamilton’s counsel has filed a brief pursuant to Anders v. California, 386
U.S. 738 (1967), stating that there are no meritorious grounds for appeal but questioning
whether Hamilton’s sentence is reasonable. We affirm.
We review a sentence for reasonableness, applying “a deferential
abuse-of-discretion standard.” Gall v. United States, 552 U.S. 38, 41 (2007). This review
entails consideration of both the procedural and substantive reasonableness of the sentence.
Id. at 51. In determining procedural reasonableness, we consider whether the district court
properly calculated the defendant’s Sentencing Guidelines range, gave the parties an
opportunity to argue for an appropriate sentence, considered the 18 U.S.C. § 3553(a)
(2012) factors, and sufficiently explained the selected sentence. Id. at 49-51. If there are
no procedural errors, then we consider the substantive reasonableness of the sentence,
evaluating “the totality of the circumstances.” Id. at 51. A sentence is presumptively
reasonable if it “is within or below a properly calculated Guidelines range,” and this
“presumption can only be rebutted by showing that the sentence is unreasonable when
measured against the 18 U.S.C. § 3553(a) factors.” United States v. Louthian, 756 F.3d
295, 306 (4th Cir. 2014).
2
We have reviewed the record and conclude that Hamilton’s sentence is procedurally
reasonable, and Hamilton fails to rebut the presumption that his sentence is substantively
reasonable. The district court properly calculated his Guidelines range and reasonably
determined that a sentence at the low end of the Guidelines range was appropriate in this
case.
In accordance with Anders, we have reviewed the entire record in this case and have
found no meritorious grounds for appeal. We therefore affirm the criminal judgment. This
court requires that counsel inform Hamilton, in writing, of the right to petition the Supreme
Court of the United States for further review. If Hamilton requests that a petition be filed,
but counsel believes that such a petition would be frivolous, then counsel may move in this
court for leave to withdraw from representation. Counsel’s motion must state that a copy
thereof was served on Hamilton.
We dispense with oral argument because the facts and legal contentions are
adequately presented in the materials before this court and argument would not aid the
decisional process.
AFFIRMED
3
|
FXPay
"Foreign Exchange Trading per Day"
FXPay
Our goal is to address the current inefficiencies within the market and to provide cost-saving solutions to brokers, traders, and liquidity providers.
Description
Our goal is to address the current inefficiencies within the market and to provide cost-saving solutions to brokers, traders, and liquidity providers. By utilizing blockchain technology, FXPay can intelligently reduce the risk for brokers and traders by providing more opportunities and increase the speed of transactions in the Forex market. FXPay is proud to bring our initial coin offering to the market and to allow investors to become part of our exciting new product and journey. The FXPay platform will immediately start addressing the issues within the current Forex market. Our proposed solution will demonstrate the tangible value of the FXP token.
About
FXPay World's first forex token ecosystem enable financing, investing and trading on the blockchain FXPay is an exciting and highly prospective business opportunity that brings innovative technology to the Foreign Exchange (Forex) market. Our goal is to address the current inefficiencies within the market and to provide cost-saving solutions to brokers, traders, and liquidity providers. By utilizing blockchain technology, FXPay can intelligently reduce the risk for brokers and traders by providing more opportunities and increase the speed of transactions in the Forex market. FXPay is proud to bring our initial coin offering to the market and to allow investors to become part of our exciting new product and journey. The FXPay platform will immediately start addressing the issues within the current Forex market. Our proposed solution will demonstrate the tangible value of the FXP token. |
/*
* Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
* or more contributor license agreements. Licensed under the Elastic License;
* you may not use this file except in compliance with the Elastic License.
*/
package org.elasticsearch.xpack.security.authc;
import org.elasticsearch.ElasticsearchException;
import org.elasticsearch.Version;
import org.elasticsearch.action.ActionListener;
import org.elasticsearch.action.bulk.BulkAction;
import org.elasticsearch.action.bulk.BulkRequest;
import org.elasticsearch.action.index.IndexAction;
import org.elasticsearch.action.index.IndexRequestBuilder;
import org.elasticsearch.action.support.PlainActionFuture;
import org.elasticsearch.client.Client;
import org.elasticsearch.common.bytes.BytesArray;
import org.elasticsearch.common.bytes.BytesReference;
import org.elasticsearch.common.collect.Tuple;
import org.elasticsearch.common.settings.SecureString;
import org.elasticsearch.common.settings.Settings;
import org.elasticsearch.common.unit.TimeValue;
import org.elasticsearch.common.util.concurrent.AbstractRunnable;
import org.elasticsearch.common.util.concurrent.EsRejectedExecutionException;
import org.elasticsearch.common.util.concurrent.ThreadContext;
import org.elasticsearch.common.xcontent.LoggingDeprecationHandler;
import org.elasticsearch.common.xcontent.NamedXContentRegistry;
import org.elasticsearch.common.xcontent.ToXContent;
import org.elasticsearch.common.xcontent.XContentBuilder;
import org.elasticsearch.common.xcontent.XContentHelper;
import org.elasticsearch.common.xcontent.XContentType;
import org.elasticsearch.common.xcontent.json.JsonXContent;
import org.elasticsearch.license.XPackLicenseState;
import org.elasticsearch.license.XPackLicenseState.Feature;
import org.elasticsearch.test.ClusterServiceUtils;
import org.elasticsearch.test.ESTestCase;
import org.elasticsearch.test.VersionUtils;
import org.elasticsearch.threadpool.FixedExecutorBuilder;
import org.elasticsearch.threadpool.TestThreadPool;
import org.elasticsearch.threadpool.ThreadPool;
import org.elasticsearch.xpack.core.XPackSettings;
import org.elasticsearch.xpack.core.security.SecurityContext;
import org.elasticsearch.xpack.core.security.action.CreateApiKeyRequest;
import org.elasticsearch.xpack.core.security.authc.Authentication;
import org.elasticsearch.xpack.core.security.authc.Authentication.AuthenticationType;
import org.elasticsearch.xpack.core.security.authc.Authentication.RealmRef;
import org.elasticsearch.xpack.core.security.authc.AuthenticationResult;
import org.elasticsearch.xpack.core.security.authc.support.AuthenticationContextSerializer;
import org.elasticsearch.xpack.core.security.authc.support.Hasher;
import org.elasticsearch.xpack.core.security.authz.RoleDescriptor;
import org.elasticsearch.xpack.core.security.authz.privilege.ApplicationPrivilege;
import org.elasticsearch.xpack.core.security.user.User;
import org.elasticsearch.xpack.security.authc.ApiKeyService.ApiKeyCredentials;
import org.elasticsearch.xpack.security.authc.ApiKeyService.ApiKeyDoc;
import org.elasticsearch.xpack.security.authc.ApiKeyService.ApiKeyRoleDescriptors;
import org.elasticsearch.xpack.security.authc.ApiKeyService.CachedApiKeyHashResult;
import org.elasticsearch.xpack.security.authz.store.NativePrivilegeStore;
import org.elasticsearch.xpack.security.support.FeatureNotEnabledException;
import org.elasticsearch.xpack.security.support.SecurityIndexManager;
import org.elasticsearch.xpack.security.test.SecurityMocks;
import org.junit.After;
import org.junit.Before;
import org.mockito.Mockito;
import java.io.IOException;
import java.nio.charset.StandardCharsets;
import java.time.Clock;
import java.time.Duration;
import java.time.Instant;
import java.time.temporal.ChronoUnit;
import java.util.Arrays;
import java.util.Base64;
import java.util.Collection;
import java.util.Collections;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import java.util.Set;
import java.util.concurrent.CompletableFuture;
import java.util.concurrent.ExecutionException;
import java.util.concurrent.ExecutorService;
import java.util.concurrent.Semaphore;
import java.util.concurrent.atomic.AtomicInteger;
import java.util.stream.Collectors;
import static org.elasticsearch.test.TestMatchers.throwableWithMessage;
import static org.elasticsearch.xpack.core.security.authc.AuthenticationField.API_KEY_LIMITED_ROLE_DESCRIPTORS_KEY;
import static org.elasticsearch.xpack.core.security.authc.AuthenticationField.API_KEY_ROLE_DESCRIPTORS_KEY;
import static org.elasticsearch.xpack.core.security.authz.store.ReservedRolesStore.SUPERUSER_ROLE_DESCRIPTOR;
import static org.elasticsearch.xpack.security.Security.SECURITY_CRYPTO_THREAD_POOL_NAME;
import static org.hamcrest.Matchers.contains;
import static org.hamcrest.Matchers.containsString;
import static org.hamcrest.Matchers.emptyArray;
import static org.hamcrest.Matchers.equalTo;
import static org.hamcrest.Matchers.instanceOf;
import static org.hamcrest.Matchers.is;
import static org.hamcrest.Matchers.not;
import static org.hamcrest.Matchers.notNullValue;
import static org.hamcrest.Matchers.nullValue;
import static org.hamcrest.Matchers.sameInstance;
import static org.mockito.Matchers.any;
import static org.mockito.Matchers.anyString;
import static org.mockito.Matchers.eq;
import static org.mockito.Mockito.doAnswer;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.verify;
import static org.mockito.Mockito.when;
public class ApiKeyServiceTests extends ESTestCase {
private ThreadPool threadPool;
private XPackLicenseState licenseState;
private Client client;
private SecurityIndexManager securityIndex;
@Before
public void createThreadPool() {
threadPool = Mockito.spy(
new TestThreadPool("api key service tests",
new FixedExecutorBuilder(Settings.EMPTY, SECURITY_CRYPTO_THREAD_POOL_NAME, 1, 1000,
"xpack.security.crypto.thread_pool", false))
);
}
@After
public void stopThreadPool() {
terminate(threadPool);
}
@Before
public void setupMocks() {
this.licenseState = mock(XPackLicenseState.class);
when(licenseState.isSecurityEnabled()).thenReturn(true);
when(licenseState.checkFeature(Feature.SECURITY_API_KEY_SERVICE)).thenReturn(true);
this.client = mock(Client.class);
this.securityIndex = SecurityMocks.mockSecurityIndexManager();
}
public void testCreateApiKeyWillUseBulkAction() {
final Settings settings = Settings.builder().put(XPackSettings.API_KEY_SERVICE_ENABLED_SETTING.getKey(), true).build();
final ApiKeyService service = createApiKeyService(settings);
final Authentication authentication = new Authentication(
new User("alice", "superuser"),
new RealmRef("file", "file", "node-1"),
null);
final CreateApiKeyRequest createApiKeyRequest = new CreateApiKeyRequest("key-1", null, null);
when(client.prepareIndex(anyString())).thenReturn(new IndexRequestBuilder(client, IndexAction.INSTANCE));
when(client.threadPool()).thenReturn(threadPool);
service.createApiKey(authentication, createApiKeyRequest, Set.of(), new PlainActionFuture<>());
verify(client).execute(eq(BulkAction.INSTANCE), any(BulkRequest.class), any());
}
public void testGetCredentialsFromThreadContext() {
ThreadContext threadContext = threadPool.getThreadContext();
assertNull(ApiKeyService.getCredentialsFromHeader(threadContext));
final String apiKeyAuthScheme = randomFrom("apikey", "apiKey", "ApiKey", "APikey", "APIKEY");
final String id = randomAlphaOfLength(12);
final String key = randomAlphaOfLength(16);
String headerValue = apiKeyAuthScheme + " " + Base64.getEncoder().encodeToString((id + ":" + key).getBytes(StandardCharsets.UTF_8));
try (ThreadContext.StoredContext ignore = threadContext.stashContext()) {
threadContext.putHeader("Authorization", headerValue);
ApiKeyService.ApiKeyCredentials creds = ApiKeyService.getCredentialsFromHeader(threadContext);
assertNotNull(creds);
assertEquals(id, creds.getId());
assertEquals(key, creds.getKey().toString());
}
// missing space
headerValue = apiKeyAuthScheme + Base64.getEncoder().encodeToString((id + ":" + key).getBytes(StandardCharsets.UTF_8));
try (ThreadContext.StoredContext ignore = threadContext.stashContext()) {
threadContext.putHeader("Authorization", headerValue);
ApiKeyService.ApiKeyCredentials creds = ApiKeyService.getCredentialsFromHeader(threadContext);
assertNull(creds);
}
// missing colon
headerValue = apiKeyAuthScheme + " " + Base64.getEncoder().encodeToString((id + key).getBytes(StandardCharsets.UTF_8));
try (ThreadContext.StoredContext ignore = threadContext.stashContext()) {
threadContext.putHeader("Authorization", headerValue);
IllegalArgumentException e =
expectThrows(IllegalArgumentException.class, () -> ApiKeyService.getCredentialsFromHeader(threadContext));
assertEquals("invalid ApiKey value", e.getMessage());
}
}
public void testAuthenticateWithApiKey() throws Exception {
final Settings settings = Settings.builder().put(XPackSettings.API_KEY_SERVICE_ENABLED_SETTING.getKey(), true).build();
final ApiKeyService service = createApiKeyService(settings);
final String id = randomAlphaOfLength(12);
final String key = randomAlphaOfLength(16);
final User user;
if (randomBoolean()) {
user = new User(
new User("hulk", new String[]{"superuser"}, "Bruce Banner", "hulk@test.com", Map.of(), true),
new User("authenticated_user", new String[]{"other"}));
} else {
user = new User("hulk", new String[]{"superuser"}, "Bruce Banner", "hulk@test.com", Map.of(), true);
}
mockKeyDocument(service, id, key, user);
final AuthenticationResult auth = tryAuthenticate(service, id, key);
assertThat(auth.getStatus(), is(AuthenticationResult.Status.SUCCESS));
assertThat(auth.getUser(), notNullValue());
assertThat(auth.getUser().principal(), is("hulk"));
assertThat(auth.getUser().fullName(), is("Bruce Banner"));
assertThat(auth.getUser().email(), is("hulk@test.com"));
assertThat(auth.getMetadata().get(ApiKeyService.API_KEY_CREATOR_REALM_NAME), is("realm1"));
assertThat(auth.getMetadata().get(ApiKeyService.API_KEY_CREATOR_REALM_TYPE), is("native"));
assertThat(auth.getMetadata().get(ApiKeyService.API_KEY_ID_KEY), is(id));
assertThat(auth.getMetadata().get(ApiKeyService.API_KEY_NAME_KEY), is("test"));
}
public void testAuthenticationIsSkippedIfLicenseDoesNotAllowIt() throws Exception {
final Settings settings = Settings.builder().put(XPackSettings.API_KEY_SERVICE_ENABLED_SETTING.getKey(), true).build();
final ApiKeyService service = createApiKeyService(settings);
final String id = randomAlphaOfLength(12);
final String key = randomAlphaOfLength(16);
final User user;
if (randomBoolean()) {
user = new User(randomAlphaOfLength(6), new String[] { randomAlphaOfLength(12) }, new User("authenticated_user",
new String[] { "other" }));
} else {
user = new User(randomAlphaOfLength(6), new String[] { randomAlphaOfLength(12) });
}
mockKeyDocument(service, id, key, user);
when(licenseState.checkFeature(Feature.SECURITY_API_KEY_SERVICE)).thenReturn(false);
final AuthenticationResult auth = tryAuthenticate(service, id, key);
assertThat(auth.getStatus(), is(AuthenticationResult.Status.CONTINUE));
assertThat(auth.getUser(), nullValue());
}
public void testAuthenticationFailureWithInvalidatedApiKey() throws Exception {
final Settings settings = Settings.builder().put(XPackSettings.API_KEY_SERVICE_ENABLED_SETTING.getKey(), true).build();
final ApiKeyService service = createApiKeyService(settings);
final String id = randomAlphaOfLength(12);
final String key = randomAlphaOfLength(16);
mockKeyDocument(service, id, key, new User("hulk", "superuser"), true, Duration.ofSeconds(3600));
final AuthenticationResult auth = tryAuthenticate(service, id, key);
assertThat(auth.getStatus(), is(AuthenticationResult.Status.CONTINUE));
assertThat(auth.getUser(), nullValue());
assertThat(auth.getMessage(), containsString("invalidated"));
}
public void testAuthenticationFailureWithInvalidCredentials() throws Exception {
final Settings settings = Settings.builder().put(XPackSettings.API_KEY_SERVICE_ENABLED_SETTING.getKey(), true).build();
final ApiKeyService service = createApiKeyService(settings);
final String id = randomAlphaOfLength(12);
final String realKey = randomAlphaOfLength(16);
final String wrongKey = "#" + realKey.substring(1);
final User user;
if (randomBoolean()) {
user = new User("hulk", new String[] { "superuser" }, new User("authenticated_user", new String[] { "other" }));
} else {
user = new User("hulk", new String[] { "superuser" });
}
mockKeyDocument(service, id, realKey, user);
final AuthenticationResult auth = tryAuthenticate(service, id, wrongKey);
assertThat(auth.getStatus(), is(AuthenticationResult.Status.CONTINUE));
assertThat(auth.getUser(), nullValue());
assertThat(auth.getMessage(), containsString("invalid credentials"));
}
public void testAuthenticationFailureWithExpiredKey() throws Exception {
final Settings settings = Settings.builder().put(XPackSettings.API_KEY_SERVICE_ENABLED_SETTING.getKey(), true).build();
final ApiKeyService service = createApiKeyService(settings);
final String id = randomAlphaOfLength(12);
final String key = randomAlphaOfLength(16);
mockKeyDocument(service, id, key, new User("hulk", "superuser"), false, Duration.ofSeconds(-1));
final AuthenticationResult auth = tryAuthenticate(service, id, key);
assertThat(auth.getStatus(), is(AuthenticationResult.Status.CONTINUE));
assertThat(auth.getUser(), nullValue());
assertThat(auth.getMessage(), containsString("expired"));
}
/**
* We cache valid and invalid responses. This test verifies that we handle these correctly.
*/
public void testMixingValidAndInvalidCredentials() throws Exception {
final Settings settings = Settings.builder().put(XPackSettings.API_KEY_SERVICE_ENABLED_SETTING.getKey(), true).build();
final ApiKeyService service = createApiKeyService(settings);
final String id = randomAlphaOfLength(12);
final String realKey = randomAlphaOfLength(16);
final User user;
if (randomBoolean()) {
user = new User("hulk", new String[] { "superuser" }, new User("authenticated_user", new String[] { "other" }));
} else {
user = new User("hulk", new String[] { "superuser" });
}
mockKeyDocument(service, id, realKey, user);
for (int i = 0; i < 3; i++) {
final String wrongKey = "=" + randomAlphaOfLength(14) + "@";
AuthenticationResult auth = tryAuthenticate(service, id, wrongKey);
assertThat(auth.getStatus(), is(AuthenticationResult.Status.CONTINUE));
assertThat(auth.getUser(), nullValue());
assertThat(auth.getMessage(), containsString("invalid credentials"));
auth = tryAuthenticate(service, id, realKey);
assertThat(auth.getStatus(), is(AuthenticationResult.Status.SUCCESS));
assertThat(auth.getUser(), notNullValue());
assertThat(auth.getUser().principal(), is("hulk"));
}
}
private void mockKeyDocument(ApiKeyService service, String id, String key, User user) throws IOException {
mockKeyDocument(service, id, key, user, false, Duration.ofSeconds(3600));
}
private void mockKeyDocument(ApiKeyService service, String id, String key, User user, boolean invalidated,
Duration expiry) throws IOException {
final Authentication authentication;
if (user.isRunAs()) {
authentication = new Authentication(user, new RealmRef("authRealm", "test", "foo"),
new RealmRef("realm1", "native", "node01"), Version.CURRENT,
randomFrom(AuthenticationType.REALM, AuthenticationType.TOKEN, AuthenticationType.INTERNAL,
AuthenticationType.ANONYMOUS), Collections.emptyMap());
} else {
authentication = new Authentication(user, new RealmRef("realm1", "native", "node01"), null,
Version.CURRENT, randomFrom(AuthenticationType.REALM, AuthenticationType.TOKEN, AuthenticationType.INTERNAL,
AuthenticationType.ANONYMOUS), Collections.emptyMap());
}
XContentBuilder docSource = service.newDocument(new SecureString(key.toCharArray()), "test", authentication,
Collections.singleton(SUPERUSER_ROLE_DESCRIPTOR), Instant.now(), Instant.now().plus(expiry), null,
Version.CURRENT);
if (invalidated) {
Map<String, Object> map = XContentHelper.convertToMap(BytesReference.bytes(docSource), true, XContentType.JSON).v2();
map.put("api_key_invalidated", true);
docSource = XContentBuilder.builder(XContentType.JSON.xContent()).map(map);
}
SecurityMocks.mockGetRequest(client, id, BytesReference.bytes(docSource));
}
private AuthenticationResult tryAuthenticate(ApiKeyService service, String id, String key) throws Exception {
final ThreadContext threadContext = threadPool.getThreadContext();
try (ThreadContext.StoredContext ignore = threadContext.stashContext()) {
final String header = "ApiKey " + Base64.getEncoder().encodeToString((id + ":" + key).getBytes(StandardCharsets.UTF_8));
threadContext.putHeader("Authorization", header);
final PlainActionFuture<AuthenticationResult> future = new PlainActionFuture<>();
service.authenticateWithApiKeyIfPresent(threadContext, future);
final AuthenticationResult auth = future.get();
assertThat(auth, notNullValue());
return auth;
}
}
public void testValidateApiKey() throws Exception {
final String apiKey = randomAlphaOfLength(16);
Hasher hasher = randomFrom(Hasher.PBKDF2, Hasher.BCRYPT4, Hasher.BCRYPT);
final char[] hash = hasher.hash(new SecureString(apiKey.toCharArray()));
ApiKeyDoc apiKeyDoc = buildApiKeyDoc(hash, -1, false);
ApiKeyService service = createApiKeyService(Settings.EMPTY);
ApiKeyService.ApiKeyCredentials creds =
new ApiKeyService.ApiKeyCredentials(randomAlphaOfLength(12), new SecureString(apiKey.toCharArray()));
PlainActionFuture<AuthenticationResult> future = new PlainActionFuture<>();
service.validateApiKeyCredentials(creds.getId(), apiKeyDoc, creds, Clock.systemUTC(), future);
AuthenticationResult result = future.get();
assertNotNull(result);
assertTrue(result.isAuthenticated());
assertThat(result.getUser().principal(), is("test_user"));
assertThat(result.getUser().fullName(), is("test user"));
assertThat(result.getUser().email(), is("test@user.com"));
assertThat(result.getUser().roles(), is(emptyArray()));
assertThat(result.getUser().metadata(), is(Collections.emptyMap()));
assertThat(result.getMetadata().get(API_KEY_ROLE_DESCRIPTORS_KEY), equalTo(apiKeyDoc.roleDescriptorsBytes));
assertThat(result.getMetadata().get(API_KEY_LIMITED_ROLE_DESCRIPTORS_KEY),
equalTo(apiKeyDoc.limitedByRoleDescriptorsBytes));
assertThat(result.getMetadata().get(ApiKeyService.API_KEY_CREATOR_REALM_NAME), is("realm1"));
apiKeyDoc = buildApiKeyDoc(hash, Clock.systemUTC().instant().plus(1L, ChronoUnit.HOURS).toEpochMilli(), false);
future = new PlainActionFuture<>();
service.validateApiKeyCredentials(creds.getId(), apiKeyDoc, creds, Clock.systemUTC(), future);
result = future.get();
assertNotNull(result);
assertTrue(result.isAuthenticated());
assertThat(result.getUser().principal(), is("test_user"));
assertThat(result.getUser().fullName(), is("test user"));
assertThat(result.getUser().email(), is("test@user.com"));
assertThat(result.getUser().roles(), is(emptyArray()));
assertThat(result.getUser().metadata(), is(Collections.emptyMap()));
assertThat(result.getMetadata().get(API_KEY_ROLE_DESCRIPTORS_KEY), equalTo(apiKeyDoc.roleDescriptorsBytes));
assertThat(result.getMetadata().get(API_KEY_LIMITED_ROLE_DESCRIPTORS_KEY),
equalTo(apiKeyDoc.limitedByRoleDescriptorsBytes));
assertThat(result.getMetadata().get(ApiKeyService.API_KEY_CREATOR_REALM_NAME), is("realm1"));
apiKeyDoc = buildApiKeyDoc(hash, Clock.systemUTC().instant().minus(1L, ChronoUnit.HOURS).toEpochMilli(), false);
future = new PlainActionFuture<>();
service.validateApiKeyCredentials(creds.getId(), apiKeyDoc, creds, Clock.systemUTC(), future);
result = future.get();
assertNotNull(result);
assertFalse(result.isAuthenticated());
apiKeyDoc = buildApiKeyDoc(hash, -1, true);
creds = new ApiKeyService.ApiKeyCredentials(randomAlphaOfLength(12), new SecureString(randomAlphaOfLength(15).toCharArray()));
future = new PlainActionFuture<>();
service.validateApiKeyCredentials(creds.getId(), apiKeyDoc, creds, Clock.systemUTC(), future);
result = future.get();
assertNotNull(result);
assertFalse(result.isAuthenticated());
}
public void testGetRolesForApiKeyNotInContext() throws Exception {
Map<String, Object> superUserRdMap;
try (XContentBuilder builder = JsonXContent.contentBuilder()) {
superUserRdMap = XContentHelper.convertToMap(XContentType.JSON.xContent(),
BytesReference.bytes(SUPERUSER_ROLE_DESCRIPTOR
.toXContent(builder, ToXContent.EMPTY_PARAMS, true))
.streamInput(),
false);
}
Map<String, Object> authMetadata = new HashMap<>();
authMetadata.put(ApiKeyService.API_KEY_ID_KEY, randomAlphaOfLength(12));
authMetadata.put(API_KEY_ROLE_DESCRIPTORS_KEY,
Collections.singletonMap(SUPERUSER_ROLE_DESCRIPTOR.getName(), superUserRdMap));
authMetadata.put(API_KEY_LIMITED_ROLE_DESCRIPTORS_KEY,
Collections.singletonMap(SUPERUSER_ROLE_DESCRIPTOR.getName(), superUserRdMap));
final Authentication authentication = new Authentication(new User("joe"), new RealmRef("apikey", "apikey", "node"), null,
VersionUtils.randomVersionBetween(random(), Version.V_7_0_0, Version.V_7_8_1),
AuthenticationType.API_KEY, authMetadata);
ApiKeyService service = createApiKeyService(Settings.EMPTY);
PlainActionFuture<ApiKeyRoleDescriptors> roleFuture = new PlainActionFuture<>();
service.getRoleForApiKey(authentication, roleFuture);
ApiKeyRoleDescriptors result = roleFuture.get();
assertThat(result.getRoleDescriptors().size(), is(1));
assertThat(result.getRoleDescriptors().get(0).getName(), is("superuser"));
}
public void testGetRolesForApiKey() throws Exception {
Map<String, Object> authMetadata = new HashMap<>();
authMetadata.put(ApiKeyService.API_KEY_ID_KEY, randomAlphaOfLength(12));
boolean emptyApiKeyRoleDescriptor = randomBoolean();
final RoleDescriptor roleARoleDescriptor = new RoleDescriptor("a role", new String[] { "monitor" },
new RoleDescriptor.IndicesPrivileges[] {
RoleDescriptor.IndicesPrivileges.builder().indices("*").privileges("monitor").build() },
null);
Map<String, Object> roleARDMap;
try (XContentBuilder builder = JsonXContent.contentBuilder()) {
roleARDMap = XContentHelper.convertToMap(XContentType.JSON.xContent(),
BytesReference.bytes(roleARoleDescriptor.toXContent(builder, ToXContent.EMPTY_PARAMS, true)).streamInput(), false);
}
authMetadata.put(API_KEY_ROLE_DESCRIPTORS_KEY,
(emptyApiKeyRoleDescriptor) ? randomFrom(Arrays.asList(null, Collections.emptyMap()))
: Collections.singletonMap("a role", roleARDMap));
final RoleDescriptor limitedRoleDescriptor = new RoleDescriptor("limited role", new String[] { "all" },
new RoleDescriptor.IndicesPrivileges[] {
RoleDescriptor.IndicesPrivileges.builder().indices("*").privileges("all").build() },
null);
Map<String, Object> limitedRdMap;
try (XContentBuilder builder = JsonXContent.contentBuilder()) {
limitedRdMap = XContentHelper.convertToMap(XContentType.JSON.xContent(),
BytesReference.bytes(limitedRoleDescriptor
.toXContent(builder, ToXContent.EMPTY_PARAMS, true))
.streamInput(),
false);
}
authMetadata.put(API_KEY_LIMITED_ROLE_DESCRIPTORS_KEY, Collections.singletonMap("limited role", limitedRdMap));
final Authentication authentication = new Authentication(new User("joe"), new RealmRef("apikey", "apikey", "node"), null,
VersionUtils.randomVersionBetween(random(), Version.V_7_0_0, Version.V_7_8_1),
AuthenticationType.API_KEY, authMetadata);
final NativePrivilegeStore privilegesStore = mock(NativePrivilegeStore.class);
doAnswer(i -> {
assertThat(i.getArguments().length, equalTo(3));
final Object arg2 = i.getArguments()[2];
assertThat(arg2, instanceOf(ActionListener.class));
ActionListener<Collection<ApplicationPrivilege>> listener = (ActionListener<Collection<ApplicationPrivilege>>) arg2;
listener.onResponse(Collections.emptyList());
return null;
}
).when(privilegesStore).getPrivileges(any(Collection.class), any(Collection.class), any(ActionListener.class));
ApiKeyService service = createApiKeyService(Settings.EMPTY);
PlainActionFuture<ApiKeyRoleDescriptors> roleFuture = new PlainActionFuture<>();
service.getRoleForApiKey(authentication, roleFuture);
ApiKeyRoleDescriptors result = roleFuture.get();
if (emptyApiKeyRoleDescriptor) {
assertNull(result.getLimitedByRoleDescriptors());
assertThat(result.getRoleDescriptors().size(), is(1));
assertThat(result.getRoleDescriptors().get(0).getName(), is("limited role"));
} else {
assertThat(result.getRoleDescriptors().size(), is(1));
assertThat(result.getLimitedByRoleDescriptors().size(), is(1));
assertThat(result.getRoleDescriptors().get(0).getName(), is("a role"));
assertThat(result.getLimitedByRoleDescriptors().get(0).getName(), is("limited role"));
}
}
public void testGetApiKeyIdAndRoleBytes() {
Map<String, Object> authMetadata = new HashMap<>();
final String apiKeyId = randomAlphaOfLength(12);
authMetadata.put(ApiKeyService.API_KEY_ID_KEY, apiKeyId);
final BytesReference roleBytes = new BytesArray("{\"a role\": {\"cluster\": [\"all\"]}}");
final BytesReference limitedByRoleBytes = new BytesArray("{\"limitedBy role\": {\"cluster\": [\"all\"]}}");
authMetadata.put(API_KEY_ROLE_DESCRIPTORS_KEY, roleBytes);
authMetadata.put(API_KEY_LIMITED_ROLE_DESCRIPTORS_KEY, limitedByRoleBytes);
final Authentication authentication = new Authentication(new User("joe"), new RealmRef("apikey", "apikey", "node"), null,
Version.CURRENT, AuthenticationType.API_KEY, authMetadata);
ApiKeyService service = createApiKeyService(Settings.EMPTY);
Tuple<String, BytesReference> apiKeyIdAndRoleBytes = service.getApiKeyIdAndRoleBytes(authentication, false);
assertEquals(apiKeyId, apiKeyIdAndRoleBytes.v1());
assertEquals(roleBytes, apiKeyIdAndRoleBytes.v2());
apiKeyIdAndRoleBytes = service.getApiKeyIdAndRoleBytes(authentication, true);
assertEquals(apiKeyId, apiKeyIdAndRoleBytes.v1());
assertEquals(limitedByRoleBytes, apiKeyIdAndRoleBytes.v2());
}
public void testParseRoleDescriptors() {
ApiKeyService service = createApiKeyService(Settings.EMPTY);
final String apiKeyId = randomAlphaOfLength(12);
List<RoleDescriptor> roleDescriptors = service.parseRoleDescriptors(apiKeyId, null);
assertTrue(roleDescriptors.isEmpty());
BytesReference roleBytes = new BytesArray("{\"a role\": {\"cluster\": [\"all\"]}}");
roleDescriptors = service.parseRoleDescriptors(apiKeyId, roleBytes);
assertEquals(1, roleDescriptors.size());
assertEquals("a role", roleDescriptors.get(0).getName());
assertArrayEquals(new String[] { "all" }, roleDescriptors.get(0).getClusterPrivileges());
assertEquals(0, roleDescriptors.get(0).getIndicesPrivileges().length);
assertEquals(0, roleDescriptors.get(0).getApplicationPrivileges().length);
roleBytes = new BytesArray(
"{\"reporting_user\":{\"cluster\":[],\"indices\":[],\"applications\":[],\"run_as\":[],\"metadata\":{\"_reserved\":true}," +
"\"transient_metadata\":{\"enabled\":true}},\"superuser\":{\"cluster\":[\"all\"],\"indices\":[{\"names\":[\"*\"]," +
"\"privileges\":[\"all\"],\"allow_restricted_indices\":true}],\"applications\":[{\"application\":\"*\"," +
"\"privileges\":[\"*\"],\"resources\":[\"*\"]}],\"run_as\":[\"*\"],\"metadata\":{\"_reserved\":true}," +
"\"transient_metadata\":{}}}\n");
roleDescriptors = service.parseRoleDescriptors(apiKeyId, roleBytes);
assertEquals(2, roleDescriptors.size());
assertEquals(
Set.of("reporting_user", "superuser"),
roleDescriptors.stream().map(RoleDescriptor::getName).collect(Collectors.toSet()));
}
public void testApiKeyServiceDisabled() throws Exception {
final Settings settings = Settings.builder().put(XPackSettings.API_KEY_SERVICE_ENABLED_SETTING.getKey(), false).build();
final ApiKeyService service = createApiKeyService(settings);
ElasticsearchException e = expectThrows(ElasticsearchException.class,
() -> service.getApiKeys(randomAlphaOfLength(6), randomAlphaOfLength(8), null, null, new PlainActionFuture<>()));
assertThat(e, instanceOf(FeatureNotEnabledException.class));
// Older Kibana version looked for this exact text:
assertThat(e, throwableWithMessage("api keys are not enabled"));
// Newer Kibana versions will check the metadata for this string literal:
assertThat(e.getMetadata(FeatureNotEnabledException.DISABLED_FEATURE_METADATA), contains("api_keys"));
}
public void testApiKeyCache() {
final String apiKey = randomAlphaOfLength(16);
Hasher hasher = randomFrom(Hasher.PBKDF2, Hasher.BCRYPT4, Hasher.BCRYPT);
final char[] hash = hasher.hash(new SecureString(apiKey.toCharArray()));
ApiKeyDoc apiKeyDoc = buildApiKeyDoc(hash, -1, false);
ApiKeyService service = createApiKeyService(Settings.EMPTY);
ApiKeyCredentials creds = new ApiKeyCredentials(randomAlphaOfLength(12), new SecureString(apiKey.toCharArray()));
PlainActionFuture<AuthenticationResult> future = new PlainActionFuture<>();
service.validateApiKeyCredentials(creds.getId(), apiKeyDoc, creds, Clock.systemUTC(), future);
AuthenticationResult result = future.actionGet();
assertThat(result.isAuthenticated(), is(true));
CachedApiKeyHashResult cachedApiKeyHashResult = service.getFromCache(creds.getId());
assertNotNull(cachedApiKeyHashResult);
assertThat(cachedApiKeyHashResult.success, is(true));
creds = new ApiKeyCredentials(creds.getId(), new SecureString("foobar".toCharArray()));
future = new PlainActionFuture<>();
service.validateApiKeyCredentials(creds.getId(), apiKeyDoc, creds, Clock.systemUTC(), future);
result = future.actionGet();
assertThat(result.isAuthenticated(), is(false));
final CachedApiKeyHashResult shouldBeSame = service.getFromCache(creds.getId());
assertNotNull(shouldBeSame);
assertThat(shouldBeSame, sameInstance(cachedApiKeyHashResult));
apiKeyDoc = buildApiKeyDoc(hasher.hash(new SecureString("foobar".toCharArray())), -1, false);
creds = new ApiKeyCredentials(randomAlphaOfLength(12), new SecureString("foobar1".toCharArray()));
future = new PlainActionFuture<>();
service.validateApiKeyCredentials(creds.getId(), apiKeyDoc, creds, Clock.systemUTC(), future);
result = future.actionGet();
assertThat(result.isAuthenticated(), is(false));
cachedApiKeyHashResult = service.getFromCache(creds.getId());
assertNotNull(cachedApiKeyHashResult);
assertThat(cachedApiKeyHashResult.success, is(false));
creds = new ApiKeyCredentials(creds.getId(), new SecureString("foobar2".toCharArray()));
future = new PlainActionFuture<>();
service.validateApiKeyCredentials(creds.getId(), apiKeyDoc, creds, Clock.systemUTC(), future);
result = future.actionGet();
assertThat(result.isAuthenticated(), is(false));
assertThat(service.getFromCache(creds.getId()), not(sameInstance(cachedApiKeyHashResult)));
assertThat(service.getFromCache(creds.getId()).success, is(false));
creds = new ApiKeyCredentials(creds.getId(), new SecureString("foobar".toCharArray()));
future = new PlainActionFuture<>();
service.validateApiKeyCredentials(creds.getId(), apiKeyDoc, creds, Clock.systemUTC(), future);
result = future.actionGet();
assertThat(result.isAuthenticated(), is(true));
assertThat(service.getFromCache(creds.getId()), not(sameInstance(cachedApiKeyHashResult)));
assertThat(service.getFromCache(creds.getId()).success, is(true));
}
public void testAuthenticateWhileCacheBeingPopulated() throws Exception {
final String apiKey = randomAlphaOfLength(16);
Hasher hasher = randomFrom(Hasher.PBKDF2, Hasher.BCRYPT4, Hasher.BCRYPT);
final char[] hash = hasher.hash(new SecureString(apiKey.toCharArray()));
Map<String, Object> sourceMap = buildApiKeySourceDoc(hash);
ApiKeyService realService = createApiKeyService(Settings.EMPTY);
ApiKeyService service = Mockito.spy(realService);
// Used to block the hashing of the first api-key secret so that we can guarantee
// that a second api key authentication takes place while hashing is "in progress".
final Semaphore hashWait = new Semaphore(0);
final AtomicInteger hashCounter = new AtomicInteger(0);
doAnswer(invocationOnMock -> {
hashCounter.incrementAndGet();
hashWait.acquire();
return invocationOnMock.callRealMethod();
}).when(service).verifyKeyAgainstHash(any(String.class), any(ApiKeyCredentials.class), any(ActionListener.class));
final ApiKeyCredentials creds = new ApiKeyCredentials(randomAlphaOfLength(12), new SecureString(apiKey.toCharArray()));
final PlainActionFuture<AuthenticationResult> future1 = new PlainActionFuture<>();
// Call the top level authenticate... method because it has been known to be buggy in async situations
writeCredentialsToThreadContext(creds);
mockSourceDocument(creds.getId(), sourceMap);
// This needs to be done in another thread, because we need it to not complete until we say so, but it should not block this test
this.threadPool.generic().execute(() -> service.authenticateWithApiKeyIfPresent(threadPool.getThreadContext(), future1));
// Wait for the first credential validation to get to the blocked state
assertBusy(() -> assertThat(hashCounter.get(), equalTo(1)));
if (future1.isDone()) {
// We do this [ rather than assertFalse(isDone) ] so we can get a reasonable failure message
fail("Expected authentication to be blocked, but was " + future1.actionGet());
}
// The second authentication should pass (but not immediately, but will not block)
PlainActionFuture<AuthenticationResult> future2 = new PlainActionFuture<>();
service.authenticateWithApiKeyIfPresent(threadPool.getThreadContext(), future2);
assertThat(hashCounter.get(), equalTo(1));
if (future2.isDone()) {
// We do this [ rather than assertFalse(isDone) ] so we can get a reasonable failure message
fail("Expected authentication to be blocked, but was " + future2.actionGet());
}
hashWait.release();
assertThat(future1.actionGet(TimeValue.timeValueSeconds(2)).isAuthenticated(), is(true));
assertThat(future2.actionGet(TimeValue.timeValueMillis(100)).isAuthenticated(), is(true));
CachedApiKeyHashResult cachedApiKeyHashResult = service.getFromCache(creds.getId());
assertNotNull(cachedApiKeyHashResult);
assertThat(cachedApiKeyHashResult.success, is(true));
}
public void testApiKeyCacheDisabled() {
final String apiKey = randomAlphaOfLength(16);
Hasher hasher = randomFrom(Hasher.PBKDF2, Hasher.BCRYPT4, Hasher.BCRYPT);
final char[] hash = hasher.hash(new SecureString(apiKey.toCharArray()));
final Settings settings = Settings.builder()
.put(ApiKeyService.CACHE_TTL_SETTING.getKey(), "0s")
.build();
ApiKeyDoc apiKeyDoc = buildApiKeyDoc(hash, -1, false);
ApiKeyService service = createApiKeyService(settings);
ApiKeyCredentials creds = new ApiKeyCredentials(randomAlphaOfLength(12), new SecureString(apiKey.toCharArray()));
PlainActionFuture<AuthenticationResult> future = new PlainActionFuture<>();
service.validateApiKeyCredentials(creds.getId(), apiKeyDoc, creds, Clock.systemUTC(), future);
AuthenticationResult result = future.actionGet();
assertThat(result.isAuthenticated(), is(true));
CachedApiKeyHashResult cachedApiKeyHashResult = service.getFromCache(creds.getId());
assertNull(cachedApiKeyHashResult);
}
public void testWillGetLookedUpByRealmNameIfExists() {
final Authentication.RealmRef authenticatedBy = new Authentication.RealmRef("auth_by", "auth_by_type", "node");
final Authentication.RealmRef lookedUpBy = new Authentication.RealmRef("looked_up_by", "looked_up_by_type", "node");
final Authentication authentication = new Authentication(
new User("user"), authenticatedBy, lookedUpBy);
assertEquals("looked_up_by", ApiKeyService.getCreatorRealmName(authentication));
}
public void testWillGetLookedUpByRealmTypeIfExists() {
final Authentication.RealmRef authenticatedBy = new Authentication.RealmRef("auth_by", "auth_by_type", "node");
final Authentication.RealmRef lookedUpBy = new Authentication.RealmRef("looked_up_by", "looked_up_by_type", "node");
final Authentication authentication = new Authentication(
new User("user"), authenticatedBy, lookedUpBy);
assertEquals("looked_up_by_type", ApiKeyService.getCreatorRealmType(authentication));
}
public void testAuthWillTerminateIfGetThreadPoolIsSaturated() throws ExecutionException, InterruptedException {
final String apiKey = randomAlphaOfLength(16);
final ApiKeyCredentials creds = new ApiKeyCredentials(randomAlphaOfLength(12), new SecureString(apiKey.toCharArray()));
writeCredentialsToThreadContext(creds);
SecurityMocks.mockGetRequestException(client, new EsRejectedExecutionException("rejected"));
ApiKeyService service = createApiKeyService(Settings.EMPTY);
final PlainActionFuture<AuthenticationResult> future = new PlainActionFuture<>();
service.authenticateWithApiKeyIfPresent(threadPool.getThreadContext(), future);
final AuthenticationResult authenticationResult = future.get();
assertEquals(AuthenticationResult.Status.TERMINATE, authenticationResult.getStatus());
assertThat(authenticationResult.getMessage(), containsString("server is too busy to respond"));
}
public void testAuthWillTerminateIfHashingThreadPoolIsSaturated() throws IOException, ExecutionException, InterruptedException {
final String apiKey = randomAlphaOfLength(16);
final ApiKeyCredentials creds = new ApiKeyCredentials(randomAlphaOfLength(12), new SecureString(apiKey.toCharArray()));
writeCredentialsToThreadContext(creds);
Hasher hasher = randomFrom(Hasher.PBKDF2, Hasher.BCRYPT4, Hasher.BCRYPT);
final char[] hash = hasher.hash(new SecureString(apiKey.toCharArray()));
Map<String, Object> sourceMap = buildApiKeySourceDoc(hash);
mockSourceDocument(creds.getId(), sourceMap);
final ExecutorService mockExecutorService = mock(ExecutorService.class);
when(threadPool.executor(SECURITY_CRYPTO_THREAD_POOL_NAME)).thenReturn(mockExecutorService);
Mockito.doAnswer(invocationOnMock -> {
final AbstractRunnable actionRunnable = (AbstractRunnable) invocationOnMock.getArguments()[0];
actionRunnable.onRejection(new EsRejectedExecutionException("rejected"));
return null;
}).when(mockExecutorService).execute(any(Runnable.class));
ApiKeyService service = createApiKeyService(Settings.EMPTY);
final PlainActionFuture<AuthenticationResult> future = new PlainActionFuture<>();
service.authenticateWithApiKeyIfPresent(threadPool.getThreadContext(), future);
final AuthenticationResult authenticationResult = future.get();
assertEquals(AuthenticationResult.Status.TERMINATE, authenticationResult.getStatus());
assertThat(authenticationResult.getMessage(), containsString("server is too busy to respond"));
}
public void testCachedApiKeyValidationWillNotBeBlockedByUnCachedApiKey() throws IOException, ExecutionException, InterruptedException {
final String apiKey1 = randomAlphaOfLength(16);
final ApiKeyCredentials creds = new ApiKeyCredentials(randomAlphaOfLength(12), new SecureString(apiKey1.toCharArray()));
writeCredentialsToThreadContext(creds);
Hasher hasher = randomFrom(Hasher.PBKDF2, Hasher.BCRYPT4, Hasher.BCRYPT);
final char[] hash = hasher.hash(new SecureString(apiKey1.toCharArray()));
Map<String, Object> sourceMap = buildApiKeySourceDoc(hash);
mockSourceDocument(creds.getId(), sourceMap);
// Authenticate the key once to cache it
ApiKeyService service = createApiKeyService(Settings.EMPTY);
final PlainActionFuture<AuthenticationResult> future = new PlainActionFuture<>();
service.authenticateWithApiKeyIfPresent(threadPool.getThreadContext(), future);
final AuthenticationResult authenticationResult = future.get();
assertEquals(AuthenticationResult.Status.SUCCESS, authenticationResult.getStatus());
// Now force the hashing thread pool to saturate so that any un-cached keys cannot be validated
final ExecutorService mockExecutorService = mock(ExecutorService.class);
when(threadPool.executor(SECURITY_CRYPTO_THREAD_POOL_NAME)).thenReturn(mockExecutorService);
Mockito.doAnswer(invocationOnMock -> {
final AbstractRunnable actionRunnable = (AbstractRunnable) invocationOnMock.getArguments()[0];
actionRunnable.onRejection(new EsRejectedExecutionException("rejected"));
return null;
}).when(mockExecutorService).execute(any(Runnable.class));
// A new API key trying to connect that must go through full hash computation
final String apiKey2 = randomAlphaOfLength(16);
final ApiKeyCredentials creds2 = new ApiKeyCredentials(randomAlphaOfLength(12), new SecureString(apiKey2.toCharArray()));
mockSourceDocument(creds2.getId(), buildApiKeySourceDoc(hasher.hash(new SecureString(apiKey2.toCharArray()))));
final PlainActionFuture<AuthenticationResult> future2 = new PlainActionFuture<>();
final ThreadContext.StoredContext storedContext = threadPool.getThreadContext().stashContext();
writeCredentialsToThreadContext(creds2);
service.authenticateWithApiKeyIfPresent(threadPool.getThreadContext(), future2);
final AuthenticationResult authenticationResult2 = future2.get();
assertEquals(AuthenticationResult.Status.TERMINATE, authenticationResult2.getStatus());
assertThat(authenticationResult2.getMessage(), containsString("server is too busy to respond"));
// The cached API key should not be affected
mockSourceDocument(creds.getId(), sourceMap);
final PlainActionFuture<AuthenticationResult> future3 = new PlainActionFuture<>();
storedContext.restore();
service.authenticateWithApiKeyIfPresent(threadPool.getThreadContext(), future3);
final AuthenticationResult authenticationResult3 = future3.get();
assertEquals(AuthenticationResult.Status.SUCCESS, authenticationResult3.getStatus());
}
public void testApiKeyDocDeserialization() throws IOException {
final String apiKeyDocumentSource =
"{\"doc_type\":\"api_key\",\"creation_time\":1591919944598,\"expiration_time\":1591919944599,\"api_key_invalidated\":false," +
"\"api_key_hash\":\"{PBKDF2}10000$abc\",\"role_descriptors\":{\"a\":{\"cluster\":[\"all\"]}}," +
"\"limited_by_role_descriptors\":{\"limited_by\":{\"cluster\":[\"all\"]," +
"\"metadata\":{\"_reserved\":true},\"type\":\"role\"}}," +
"\"name\":\"key-1\",\"version\":7000099," +
"\"creator\":{\"principal\":\"admin\",\"metadata\":{\"foo\":\"bar\"},\"realm\":\"file1\",\"realm_type\":\"file\"}}";
final ApiKeyDoc apiKeyDoc = ApiKeyDoc.fromXContent(XContentHelper.createParser(NamedXContentRegistry.EMPTY,
LoggingDeprecationHandler.INSTANCE,
new BytesArray(apiKeyDocumentSource),
XContentType.JSON));
assertEquals("api_key", apiKeyDoc.docType);
assertEquals(1591919944598L, apiKeyDoc.creationTime);
assertEquals(1591919944599L, apiKeyDoc.expirationTime);
assertFalse(apiKeyDoc.invalidated);
assertEquals("{PBKDF2}10000$abc", apiKeyDoc.hash);
assertEquals("key-1", apiKeyDoc.name);
assertEquals(7000099, apiKeyDoc.version);
assertEquals(new BytesArray("{\"a\":{\"cluster\":[\"all\"]}}"), apiKeyDoc.roleDescriptorsBytes);
assertEquals(new BytesArray("{\"limited_by\":{\"cluster\":[\"all\"],\"metadata\":{\"_reserved\":true},\"type\":\"role\"}}"),
apiKeyDoc.limitedByRoleDescriptorsBytes);
final Map<String, Object> creator = apiKeyDoc.creator;
assertEquals("admin", creator.get("principal"));
assertEquals("file1", creator.get("realm"));
assertEquals("file", creator.get("realm_type"));
assertEquals("bar", ((Map<String, Object>)creator.get("metadata")).get("foo"));
}
public void testApiKeyDocDeserializationWithNullValues() throws IOException {
final String apiKeyDocumentSource =
"{\"doc_type\":\"api_key\",\"creation_time\":1591919944598,\"expiration_time\":null,\"api_key_invalidated\":false," +
"\"api_key_hash\":\"{PBKDF2}10000$abc\",\"role_descriptors\":{}," +
"\"limited_by_role_descriptors\":{\"limited_by\":{\"cluster\":[\"all\"]}}," +
"\"name\":null,\"version\":7000099," +
"\"creator\":{\"principal\":\"admin\",\"metadata\":{},\"realm\":\"file1\"}}";
final ApiKeyDoc apiKeyDoc = ApiKeyDoc.fromXContent(XContentHelper.createParser(NamedXContentRegistry.EMPTY,
LoggingDeprecationHandler.INSTANCE,
new BytesArray(apiKeyDocumentSource),
XContentType.JSON));
assertEquals(-1L, apiKeyDoc.expirationTime);
assertNull(apiKeyDoc.name);
assertEquals(new BytesArray("{}"), apiKeyDoc.roleDescriptorsBytes);
}
public static class Utils {
private static final AuthenticationContextSerializer authenticationContextSerializer = new AuthenticationContextSerializer();
public static Authentication createApiKeyAuthentication(ApiKeyService apiKeyService,
Authentication authentication,
Set<RoleDescriptor> userRoles,
List<RoleDescriptor> keyRoles,
Version version) throws Exception {
XContentBuilder keyDocSource = apiKeyService.newDocument(new SecureString("secret".toCharArray()), "test", authentication,
userRoles, Instant.now(), Instant.now().plus(Duration.ofSeconds(3600)), keyRoles, Version.CURRENT);
final ApiKeyDoc apiKeyDoc = ApiKeyDoc.fromXContent(
XContentHelper.createParser(NamedXContentRegistry.EMPTY, LoggingDeprecationHandler.INSTANCE,
BytesReference.bytes(keyDocSource), XContentType.JSON));
PlainActionFuture<AuthenticationResult> authenticationResultFuture = PlainActionFuture.newFuture();
apiKeyService.validateApiKeyExpiration(apiKeyDoc, new ApiKeyService.ApiKeyCredentials("id",
new SecureString("pass".toCharArray())),
Clock.systemUTC(), authenticationResultFuture);
AuthenticationResult authenticationResult = authenticationResultFuture.get();
if (randomBoolean()) {
// maybe remove realm name to simulate old API Key authentication
assert authenticationResult.getStatus() == AuthenticationResult.Status.SUCCESS;
Map<String, Object> authenticationResultMetadata = new HashMap<>(authenticationResult.getMetadata());
authenticationResultMetadata.remove(ApiKeyService.API_KEY_CREATOR_REALM_NAME);
authenticationResult = AuthenticationResult.success(authenticationResult.getUser(), authenticationResultMetadata);
}
if (randomBoolean()) {
// simulate authentication with nameless API Key, see https://github.com/elastic/elasticsearch/issues/59484
assert authenticationResult.getStatus() == AuthenticationResult.Status.SUCCESS;
Map<String, Object> authenticationResultMetadata = new HashMap<>(authenticationResult.getMetadata());
authenticationResultMetadata.remove(ApiKeyService.API_KEY_NAME_KEY);
authenticationResult = AuthenticationResult.success(authenticationResult.getUser(), authenticationResultMetadata);
}
final ThreadContext threadContext = new ThreadContext(Settings.EMPTY);
final SecurityContext securityContext = new SecurityContext(Settings.EMPTY, threadContext);
authenticationContextSerializer.writeToContext(
apiKeyService.createApiKeyAuthentication(authenticationResult, "node01"), threadContext);
final CompletableFuture<Authentication> authFuture = new CompletableFuture<>();
securityContext.executeAfterRewritingAuthentication((c) -> {
try {
authFuture.complete(authenticationContextSerializer.readFromContext(threadContext));
} catch (IOException e) {
throw new RuntimeException(e);
}
}, version);
return authFuture.get();
}
public static Authentication createApiKeyAuthentication(ApiKeyService apiKeyService,
Authentication authentication) throws Exception {
return createApiKeyAuthentication(apiKeyService, authentication,
Collections.singleton(new RoleDescriptor("user_role_" + randomAlphaOfLength(4), new String[]{"manage"}, null, null)),
null, Version.CURRENT);
}
}
private ApiKeyService createApiKeyService(Settings baseSettings) {
final Settings settings = Settings.builder()
.put(XPackSettings.API_KEY_SERVICE_ENABLED_SETTING.getKey(), true)
.put(baseSettings)
.build();
return new ApiKeyService(settings, Clock.systemUTC(), client, licenseState, securityIndex,
ClusterServiceUtils.createClusterService(threadPool), threadPool);
}
private Map<String, Object> buildApiKeySourceDoc(char[] hash) {
Map<String, Object> sourceMap = new HashMap<>();
sourceMap.put("doc_type", "api_key");
sourceMap.put("creation_time", Clock.systemUTC().instant().toEpochMilli());
sourceMap.put("expiration_time", -1);
sourceMap.put("api_key_hash", new String(hash));
sourceMap.put("name", randomAlphaOfLength(12));
sourceMap.put("version", 0);
sourceMap.put("role_descriptors", Collections.singletonMap("a role", Collections.singletonMap("cluster", "all")));
sourceMap.put("limited_by_role_descriptors", Collections.singletonMap("limited role", Collections.singletonMap("cluster", "all")));
Map<String, Object> creatorMap = new HashMap<>();
creatorMap.put("principal", "test_user");
creatorMap.put("full_name", "test user");
creatorMap.put("email", "test@user.com");
creatorMap.put("metadata", Collections.emptyMap());
sourceMap.put("creator", creatorMap);
sourceMap.put("api_key_invalidated", false);
return sourceMap;
}
private void writeCredentialsToThreadContext(ApiKeyCredentials creds) {
final String credentialString = creds.getId() + ":" + creds.getKey();
this.threadPool.getThreadContext().putHeader("Authorization",
"ApiKey " + Base64.getEncoder().encodeToString(credentialString.getBytes(StandardCharsets.US_ASCII)));
}
private void mockSourceDocument(String id, Map<String, Object> sourceMap) throws IOException {
try (XContentBuilder builder = JsonXContent.contentBuilder()) {
builder.map(sourceMap);
SecurityMocks.mockGetRequest(client, id, BytesReference.bytes(builder));
}
}
private ApiKeyDoc buildApiKeyDoc(char[] hash, long expirationTime, boolean invalidated) {
return new ApiKeyDoc(
"api_key",
Clock.systemUTC().instant().toEpochMilli(),
expirationTime,
invalidated,
new String(hash),
randomAlphaOfLength(12),
0,
new BytesArray("{\"a role\": {\"cluster\": [\"all\"]}}"),
new BytesArray("{\"limited role\": {\"cluster\": [\"all\"]}}"),
Map.of(
"principal", "test_user",
"full_name", "test user",
"email", "test@user.com",
"realm", "realm1",
"realm_type", "realm_type1",
"metadata", Map.of()
)
);
}
}
|
Brain dopamine and kinematics of graphomotor functions.
Three experiments were performed in an attempt to achieve a better understanding of the effect of dopamine on handwriting. In the first experiment, kinematic aspects of handwriting movements were compared between healthy participants and patients with Parkinson's disease (PD) on their usual dopaminergic treatment and following withdrawal of dopaminergic medication. In the second experiment, the writing performance of healthy participants with a hyperechogenicity of the substantia nigra as detected by transcranial sonography (TCS) was compared with the performance of healthy participants with low echogenicity of the substantia nigra. The third experiment examined the effect of central dopamine reduction on kinematic aspects of handwriting movements in healthy adults using acute phenylalanine and tyrosine depletion (APTD). A digitising tablet was used for the assessment of handwriting movements. Participants were asked to perform a simple writing task. Movement time, distance, velocity, acceleration and measures of fluency of handwriting movements were measured. The kinematic analysis of handwriting movements revealed that alterations of central dopaminergic neurotransmission adversely affect movement execution during handwriting. In comparison to the automatic processing of handwriting movements displayed by control participants, participants with an altered dopaminergic neurotransmission shifted from an automatic to a controlled processing of movement execution. Central dopamine appears to be of particular importance with regard to the automatic execution of well-learned movements. |
Effect of pre-existing cytotoxic T lymphocytes on therapeutic vaccines.
Therapeutic vaccines which aim to induce CD8(+) cytotoxic T lymphocyte (CTL) responses will often be required to perform in the presence of pre-existing CTL which recognize epitopes within the vaccine. Here we explore the ability of a viral vaccine vector presenting several co-dominant CTL epitopes to prime CTL responses in animals that have a pre-existing CTL response to one of the epitopes in the vaccine. The vaccine was usually capable of inducing multiple new responses, suggesting that immunodomination effects of pre-existing CTL may generally be minimal following vaccination. However, when large numbers of pre-existing CTL were present, a novel type of immune modulation was observed whereby (1) the vaccine failed to prime efficiently new CTL responses that were restricted by the same MHC gene as the pre-existing responses, and (2) vaccine-induced CTL responses restricted by other MHC genes were enhanced. These results may have implications for therapeutic multi-epitope vaccines for diseases like HIV and melanoma, which aim to broaden CTL responses. |
From: Sven LUTHER <luther@maxime.u-strasbg.fr>
Subject: Re: Xfree 3.3.3.1 for slink anywhere?
Date: Wed, 26 May 1999 12:23:26 +0200
> On Wed, May 19, 1999 at 11:43:40PM +0100, Adrian Bridgett wrote:
> > I've spent quite a while trying to find out but the only reference I could
> > see doesn't have any packages there anymore (www.debian.org/~vincent IIRC).
> >
> > NB: I know that generally you can just grab the Xserver you want.
>
> Just grab the source and compile your own slink X packages, should work without
> problem.
Here is an apt stanza to point you to some "potato" versions compiled
with glibc 2.0 (also includes apache 1.3.6, communicator 4.6 (doesn't
work for me), gimp 1.1, PHP 3 and some more stuff).
deb http://netgod.net/ x/
HTH,
--Amos
--Amos Shapira | "Of course Australia was marked for
| glory, for its people had been chosen
amos@gezernet.co.il | by the finest judges in England."
| -- Anonymous |
Q:
Make div collaspible into a icon block
I am trying to make a div collapse into an icon when a certain screen width is reached. It is almost like responsive menus in Drupal, but for a div.
I'm planning on using jQuery and CSS to accomplish this, unless there is a more elegant way, (e.g. a module for Drupal 8 that would do this).
I'm wondering how you would do it, but I'll post my way in the answers.
UPDATE: The main drawback for these circumstances I can't edit the HTML...without jQuery. I only have my div, and I need to insert my trigger icon through jQuery. (For the Drupal users, I am using Drupal and selecting a region that contain two blocks.)
A:
My way, haven't perfected it yet, is based on the following jQuery:
var menuIcon = function() {
if ($(window).width() < 750) {
$(".DIV-CLASS").unwrap();
$(".menu-icon").remove();
$(".DIV-CLASS").children().wrapAll("<div class='menu-wrapper' />")
$(".DIV-CLASS").prepend('//ICON HTML');
} else {
$(".menu-icon").remove();
}
};
$(document).ready(function () {
menuIcon();
});
$(window).resize(function() {
menuIcon();
});
$('.menu-icon').click(function()
{
$(".DIV-CLASS").toggleClass("open");
});
|
Q:
How to get distinct items from Microsoft.Office.Interop.PowerPoint.Hyperlinks
Hi can somebody help to get distinct items from Microsoft.Office.Interop.PowerPoint.Hyperlinks using LINQ on the basis of Hyperlink.TextToDisplay and Hyperlink.Address. I want to have items with distinct values for Address and TextToDisplay.
This is what I have tried
Microsoft.Office.Interop.PowerPoint.Hyperlinks links = links.Cast<Microsoft.Office.Interop.PowerPoint.Hyperlink>().Select(p=>p.TextToDisplay).Distinct().ToList();
Thanks in Advance.
A:
Try this:
var distinctLinks = links
.Cast<Microsoft.Office.Interop.PowerPoint.Hyperlink>()
.GroupBy(x => new {x.TextToDisplay, x.Address})
.Select(x => x.First())
.ToList();
|
Q:
Can NSDictionary contain different types of objects as values?
Why does the following result in a BAD_ACCESS error?
NSDictionary *header=[[NSDictionary alloc]initWithObjectsAndKeys:@"fred",@"title",1,@"count", nil];
Can you have different types of objects as values in NSDictionary, including another NSDictionary?
A:
You can put any type of object into an NSDictionary. So while @"fred" is OK, 1 is not, as an integer is not an object. If you want to put a number in a dictionary, wrap it in an NSNumber:
NSDictionary *header = { @"title": @"fred", @"count": @1 };
|
A conventional article joining system is disclosed in Japanese Patent Application Laid-open No. H8-188223.
The article joining apparatus disclosed in Japanese Patent Application Laid-open No. H8-188223 joins articles fed in from three conveying lines and comprises front conveyors, rear conveyors, and a collection conveyor.
The front conveyors are disposed in front (downstream side) in the conveying direction in each of the three conveying lines.
The rear conveyors are disposed behind (upstream side) in the conveying direction of the front conveyors in each of the three conveying lines.
One collection conveyor is disposed in front of the front conveyors close thereto.
With the above-described configuration, the rear conveyors to which the articles are not fed are operated at a “low speed”.
When the articles are fed to any one of a plurality of the conveying lines, the rear conveyor of the conveying line in which the articles were fed is operated at a “high speed”. Therefore, the articles present on the conveying line are conveyed at a high speed.
Furthermore, when the articles are fed to any one of a plurality of conveying lines ahead of the others, if the articles are introduced into one of the other conveying lines, the conveying line into which the articles were introduced still operates at a “low speed” and is operated at a “high speed” after the prescribed time elapses. As a result, the rear conveyor of the conveying line in which the articles have been conveyed ahead of the other lines has already been operated at a “high speed” before the rear conveyor of the conveying line into which the articles were introduced is operated at a “high speed”, the articles that were conveyed ahead of others have already been fed out to an accumulation conveyor, and the articles located on the conveying line that was switched to a “high speed” are fed out at a high speed following those articles that have been fed out. Therefore, the articles fed in a plurality of rows can be orderly joined in one row.
However, with the above-described conventional article joining system, when articles are conveyed with one conveying line, no control is conducted to enhance the conveying capacity of the conveyor in this conveying line. Therefore, the difference in the number of conveyed articles appears between the case where the articles are conveyed with one conveying line and the case where the articles are conveyed with a plurality of conveying lines. The resultant problem is that a constant conveying capacity cannot be maintained. |
This great to know, many thanks!
Debra Perlingiere
Enron North America Corp.
Legal Department
1400 Smith Street, EB 3885
Houston, Texas 77002
dperlin@enron.com
Phone 713-853-7658
Fax 713-646-3490 |
Raleigh Dirt Cross
The Raleigh Dirt Cross was a children's bicycle manufactured from 1996-1999 by the Raleigh Bicycle Company of Nottingham, England.
Design and styling
The Dirt Cross was very unusual design and is best described as a hybrid of a Grifter and a mountain bike. It was fitted with 20 and 24 inch wheels, and the styling of the handlebars and frame were similar to those of a BMX, with dimensions designed to accommodate 6 to 10 year olds. The Dirt Cross was fitted with 5 or 10 speed Shimano gears and a twist-grip gear controller as standard. It is possible that the design was influenced by the [[Raleigh Grifter,Strika and Boxer as the bikes were fitted with imitation front suspension forks. Although children's bikes with functional suspension forks were available from Raleigh during the late 1990s, those fitted to Dirt Cross were purely cosmetic. The bikes came in the colours green,red and silver.
Advertising
Television and poster advertisements for the Dirt Cross featured the Nottingham Forest striker Stuart Pearce
. The Dirt Cross was the first children's bike to be advertised by Raleigh using a multimedia application complete with MPEG video clips running on interactive public information kiosks.
Despite the rather high profile marketing campaign, sales of the Dirt Cross appear to be quite low. Production ceased in 1999 with no similar replacement model.
Go Kart
The Dirt Cross title was later used on a children's Go Kart from Raleigh which is still on sale in 2009.
References
External links
Raleigh Dirt Cross television commercial
Dirt Cross |
290 F.2d 552
39 P.U.R.3d 228
SUNRAY MID-CONTINENT OIL COMPANY, Petitioner,v.FEDERAL POWER COMMISSION, Respondent.
No. 6589.
United States Court of Appeals Tenth Circuit.
May 6, 1961.
Homer E. McEwen, Jr., Tulsa, Okl. (M. Darwin Kirk, Tulsa, Okl., and Dale E. Doty, Washington, D.C., on the brief), for petitioner.
Peter H. Schiff, Washington, D.C. (John C. Mason and Howard E. Wahrenbrock, Washington, D.C., on the brief), for respondent.
Before LEWIS and BREITENSTEIN, Circuit Judges, and KERR, District judge.
LEWIS, Circuit Judge.
1
Petitioner, Sunray Mid-Continent Oil Company, seeks review of an order of the Federal Power Commission the import of which was to deny as presently effective a change in rate level upon sales of natural gas made by Sunray to Northern Natural Gas Company pursuant to contract. The case does not explore the merits of rates but is limited to a jurisdictional attack upon the power of the Commission to question the rate level under the procedural circumstances premising the controversy.
2
The critical event giving rise to the present issues was a contract change agreed to by Sunray and Northern on March 28, 1960. The original contract between the parties had provided for the sale and purchase of natural gas from leaseholds in Ochiltree County, Texas, and Beaver County, Oklahoma, at 15 1/2cents per 1000 cubic feet of gas delivered, reserving, however, to Sunray as seller the right to process and retain all liquid hydrocarbons. On the date indicated Sunray for a consideration of 1cents per Mcf relinquished its right to process and reclaim the liquid constituents from the gas then being delivered to Northern. The total contract consideration was thus raised from 15 1/2cents per Mcf to 16 1/2cents per Mcf.
3
Sunray then reported the contractual change to the Commission by filing a 'Notice of Change in Rate Schedule' asserting the change to be effective upon date of authorization or 30 days after date of filing, whichever first occurred. The contract amendment was attached to the filing and the notation made:
4
'The subject contract was amended March 28, 1960, to provide for the waiver of Applicant's right to process the casinghead and gas-well gas reserves for the extraction of liquefiable hydrocarbons, and the payment to Sunray by the Purchaser of one (1cents) cent for such liquids in each one thousand (1,000) cubic feet of gas delivered. The subject amendment is dated March 28, 1960 and is attached hereto as Exhibit 'A-1'.'
5
Sunray's filing did not include a comparative statement of sales and revenues as required by the Commission's regulation in respect to change in rate level.1 Sunray succinctly stated its reason for not so doing:
6
'A comparative statement of sales and revenues in connection with the proposed change is not attached hereto for the reason that the proposed change does not change the rates or charges made for the natural has sold to Purchaser under this contract.'
7
The Federal Power Commission filed these documents on April 11 and notified Sunray of its action by form letter:
8
'This is to advise you that the rate filings listed at the bottom of this letter have been accepted for filing and that such rate schedules have become effective on the dates shown (May 12, 1960) upon expiration of 30 days' statutory notice.'
9
Sunray and Northern interpreted these procedures as authorizing the payment of an increased contract price on and after May 12, 1960 and delivered and accepted gas from such date at 16 1/2cents per Mcf and until July 25, 1960 when the Commission by letter refuted the contracting parties' construction of the Commission action. The Commission stated its position thus:
10
'By the foregoing amendment, Northern agreed to increase your contract price by 1.0cents per Mcf in consideration of your relinquishing your rights to process the gas for the removal of liquid hydrocarbons. Your amendment was not accompanied by a comparative statement of sales and revenues nor by a statement in support of the increased rate. Accordingly, such amendment was not considered to be a change in rate but only a contractual vehicle under which Sunray could at a future date file a notice of change in rate. As such, the amendment was accepted for filing by the Commission's letter dated May 16, 1960.' (The date is apparently a typographical error.)
11
Upon receipt of the Commission letter-order, Northern ceased payment of the additional 1cents per Mcf; Sunray applied for reconsideration of the Commission order and was denied; and the instant petition followed.2
12
In presenting to the Commission its claim to an absolute right to payment from Northern of 16 1/2cents per Mcf on and after March 12, 1960, Sunray asserted the finality of its original notice and the invalidity of the Commission's July 25 letter-order upon several separate jurisdictional grounds. Each was premised upon the consistent claim that Sunray's original Notice of Change in Rate Schedule was filed under the legal theory that the Commission had no rate jurisdiction over the amendment to Sunray's contract with Northern. The Commission's ruling that Sunray's original notice was entitled to acceptance and was entitled to Commission filing only as a contract change3 apparently did not require the Commission to reach, in these proceedings, the pivotal question of whether the contract amendment effected a jurisdictional sale. In any event, Sunray in these proceedings does not preserve or press a claim of a non-jurisdictional sale. Rather, petitioner now points out that the Commission was fully apprised of Sunray's claim that such sale was nonjurisdictional because of the specific negation of a rate change in the Notice of Change in Rate Schedule; that being so apprised the Commission could manifest its disagreement with the theory by rejecting the filing as not complying with the Commission's regulations (footnote 1, supra) or by waiving the deficiency and proceeding to examine the rate change pursuant to Sec. 4(e) of the Natural Gas Act. 52 Stat. 822, 15 U.S.C.A. 717c(e). Since the Commission did neither the petitioner claims the 16 1/2cents price to be effective both through affirmative acceptance of the rate by the Commission in its April 11 letter and the jurisdictional limit of 30 days set upon the Commission in Sec. 4(d) of the Act. See Mississippi River Fuel Corporation v. Federal Power Comm., 3 Cir., 202 F.2d 899. We deem petitioner's argument to be basically faulty.
13
Sec. 4(d) of the Natural Gas Act requires natural gas companies to file with the Commission all contract changes regardless of whether such changes affect the rate level or whether they do not. The basic contract together with amendments is the rate schedule which at all times must be available for Commission use and public inspection. The compulsion of Sec. 4(d) and the potential of its dual purpose are recognized and clearly set out in the Commission's regulation 154.94, supra. Paragraph (e)(1) sets forth the information required for all contract changes and (e)(2) of the additional information required when such changes are intended as notice of a proposed change in rate level. And we know of no burden placed upon the Commission to explore, at its peril and that of the public interest, the facets of a notice of contract amendment to determine the subjective legal theory that may influence the extent of notice given. Here, Sunray was required to give notice of the contract amendment regardless of whether a change in rate level was involved. The company negatived in the notice that new rate charges were then being sought and the Commission was justified in accepting the filing of the contract amendment for what it purported to be-- a change of contract not affecting the rates for natural gas sold. The use of a form letter to acknowledge the acceptance of Sunray's filing, which form we understand is also used for the acceptance of a change in rate level with applicable data added, may have led Sunray and Northern into a mistaken interpretation of the Commission's intended action and may suggest procedural improvement for the future. But the now disputed letter-order of July 25 is not inconsistent with the earlier acceptance of Sunray's filing and cannot be used as a jurisdictional bar to the Commission's right to review and determine the question of rates. The Commission was correct in holding that neither by its affirmative action nor by its non-action was it bound to accept a new rate, the existence of which was expressly denied by the filing company.
14
The action of the Commission is affirmed.
1
Sec. 154.94 Changes in Rate Schedules, 18 CFR (1960 Supp) 154.94:
'(e) (1) With each change in rate schedule there shall be submitted reasons, nature, and basis for the proposed change, and the information required under subdivisions (i) through (iv) of this subparagraph:
'(i) The designation of the FPC Gas Rate Schedule (by name of seller and rate schedule number), the names of the parties on whose behalf the change in rate schedule is made, and the date on which the change is proposed to be made effective;
'(ii) The name of the purchaser;
'(iii) Description of the contract provision authorizing the change;
'(iv) The geographical location (field or area, county, and State) where delivery is made;
'2. With each change in rate level, in addition to the foregoing, there shall be submitted the following information and data (actual data shall be used wherever possible and estimates shall be so designated and explained):
'(i) The present total effective price in cents per Mcf with the base rate and any provisions for tax reimbursement, gathering charge, dehydration charge and other components thereof show separately, and the measurement presure base (psia);
'(ii) Any deductions from the present total effective price in cents per Mcf by the purchaser for amortization, dehydration, gathering, treating, etc. Note if subject to Btu adjustment;
'(iii) The proposed total price in cents per Mcf with the base rate and any provisions for tax reimbursement, gathering charge, dehydration charge and other components thereof shown separately, and the measurement pressure base (psia);
'(iv) Any deductions from proposed total price in cents per Mcf by the purchaser from amortization, dehydration, gathering, treating, etc. Note if subject to Btu adjustment;
'(v) A comparative statement of the total sales made and total revenues therefrom under the effective rate schedule and under the proposed changed rate schedule, or rate, charge, classification or service contained in the filing, for the 12 months immediately preceding and the 12 months immediately succeeding the proposed effective date of the rate schedule tendered for filing, and the difference in the total sales and total revenues for each of the 12-month periods.'
2
Sunray also filed a new notice specifically showing a 1cents rate change whereupon the Commission ordered hearings and suspended the proposed rates until March, 1961. The parties agree that the issues of the present petition are entited to entirely independent consideration
3
Sec. 154.92 of the Commission's regulations requires the filing of rate schedules by every independent producer and Sec. 154.93 defines rate schedule as follows:
'For the purpose of 154.92 through 154.101 'rate schedule' shall mean the basic contract and all supplements or agreements amendatory thereof, effective and applicable on and after June 7, 1954, showing the service to be provided and the rates and charges, terms, conditions, classifications, practices, rules and regulations affecting or relating to such rates or charges, applicable to the transportation of natural gas in interstate commerce or the sale of natural gas in interstate commerce for resale subject to the jurisdiction of the Commission.'
|
Sign up for our Wine Club today.
Barack Obama was absolutely right to announce, in his September 10 address to the nation, that he had asked Congress to postpone a vote to authorize the use of force against Syria. In seizing the diplomatic path out of the crisis offered by Russia, Obama was accepting the fact that Moscow had achieved an important breakthrough. Russia’s proposal, and Syria’s positive response, have already accomplished more than even the most optimistic predictions regarding the outcome of a US military strike: not only has Syria acknowledged, for the first time, that it possesses chemical weapons; it has offered to give them up entirely and to sign the Chemical Weapons Convention as well.
Of course the Assad regime could renege or stall on this offer, and the difficulties of impounding such weapons during a civil war are undeniable. And agreement on a UN Security Council resolution to carry out the plan could be rocky; as we go to press, Russia has said it will reject language that threatens force against Syria or poses an ultimatum. But there’s no question that a plan, brokered and carried out with UN oversight, to eliminate Syria’s chemical weapons is vastly better than a unilateral US attack to “deter and degrade” Syria’s ability to use them.
That’s not the only breakthrough the Syrian crisis has generated. Overwhelming public resistance to a wider war has renewed the democratic spirit. In Britain, a skeptical Labour Party and Parliament forced Prime Minister David Cameron to abandon his plans for war. In America, public opposition has strengthened the checks and balances that are celebrated here but not always respected.
One of the most telling moments in Obama’s speech was when he suggested, “even though I possess the authority to order military strikes, I believed it was right, in the absence of a direct or imminent threat to our security, to take this debate to Congress. I believe our democracy is stronger when the president acts with the support of Congress. And I believe that America acts more effectively abroad when we stand together. This is especially true after a decade that put more and more war-making power in the hands of the president.”
Obama is wrong in claiming authority to order military strikes in the absence of congressional action, but he deserves credit for recognizing what has over decades become an increasingly imperial presidency. At the same time, wise members of Congress deserve credit for exploring alternatives to war.
Those members, especially Republican Scott Rigell and Democrat Barbara Lee, who penned and circulated letters calling for a congressional debate and vote, created a space not just for themselves but for the American people. The people, in turn, attended town hall meetings and contacted members with calls, e-mails and letters. Their opposition to another war—evidenced by dramatic poll numbers—slowed the process down, with activist groups proposing serious alternatives. As the Progressive Democrats of America put it, “forceful diplomacy is the alternative to force without a diplomatic solution.” Instead of simply bending to the authority of the executive branch, Congress bent to the people.
This does not mean the crisis is resolved. Diplomacy does not always prevail. The president may yet come back to Congress seeking authorization of the use of force. Indeed, he has an obligation to do so before taking any military action. But Obama could also achieve the diplomatic solution that he says is “overwhelmingly my preference” by working with the Russians and the UN to put Syria’s chemical weapons under international control. And that, in turn, could lead to a revival of the Geneva peace conference and to a political settlement, which is the only means to achieve lasting resolution of the Syrian crisis.
The president was wise to note that the United States “should not be the world’s policeman.” May these words inspire a new foreign policy, one that rejects blinkered isolationism and blundering military interventionism in favor of an engaged internationalism that recognizes the power and potential of diplomacy.
Stephen F. Cohen and Katrina vanden Heuvel outline a plan for a diplomatic solution to the crisis in Syria. |
A Winnipeg boy got the surprise of his life when his hockey hero showed up at his house to wish him a happy birthday.
It all started when Lucas Bydak, 8, wrote a letter to Winnipeg Jets rookie forward Patrik Laine and invited him to his birthday party planned for Jan. 7.
My nephews note to Patrik Laine...Worth a shot <a href="https://twitter.com/hashtag/nhljets?src=hash">#nhljets</a> <a href="https://twitter.com/NHLJets">@NHLJets</a> <a href="https://twitter.com/hashtag/GoJetsGo?src=hash">#GoJetsGo</a> <a href="https://twitter.com/PatrikLaine29">@PatrikLaine29</a> <a href="https://t.co/04e57v1rZT">pic.twitter.com/04e57v1rZT</a> —@marcopolo_1979
"It sat on our fridge, because I didn't think to mail it," said Bydak's mom Nicole Berube. "He kept insisting that I mail it to Patrik,"
On Christmas Day his uncle saw the letter and decided to post a photo of the hand-written note on Twitter.
Turns out, social media worked its magic.
Berube said Laine's mother, Tuija Laine, got in touch with the family by email, after hearing about the letter through a media report in Finland. She told the boy's mother Laine couldn't make the birthday party, but he wanted to send a little something in the mail. Then Thursday, Laine and his mom showed up at the family's home in person.
"Big surprise," said Bydak. "I was really excited. I never really thought he would ever come.... It ended up really well."
Lucas Bydak got the surprise of his life when his hockey hero showed up at his house to wish him a happy birthday. 1:33
Laine wished him happy birthday, signed his jersey, and brought a few gifts including some of his favourite candy from Finland.
The 18-year-old Jet is currently on the injured reserved list, after suffering a concussion in the game against the Buffalo
Bydak said he asked how Laine was feeling and congratulated him for being named to the 2017 NHL All-Star team.
"I asked him if he was going to the All-Star game," said Bydak. "He said maybe."
Berube is grateful.
"From a mom to another mother, I really appreciated all the work that they did to find Lucas," she said.
She added it not only made her son's year, but her year as well.
"I think it's even more exciting for me because I know how important it is to him." |
Blue nevus with an unusual presentation: two patients with endocervical location.
To report two cases of endocervically located blue nevus. Case report. University of Abant Izzet Baysal, Duzce, Turkey. Blue nevus is a benign lesion, which is usually found on the skin, rarely on mucous membranes. In two patients the endocervical location of blue nevus was described. Blue nevus when located on the cervix may be confused with other benign or malignant lesions. |
Q:
Elastic4s java.lang.NoSuchMethodError
I am attempting to connect to an ES cluster through Elastic4s. I am using the example given in the github repo:
import com.sksamuel.elastic4s.ElasticClient
import com.sksamuel.elastic4s.ElasticDsl._
object Test extends App {
val client = ElasticClient.transport(ElasticsearchClientUri(host, port))
// await is a helper method to make this operation synchronous instead of async
// You would normally avoid doing this in a real program as it will block your thread
client.execute { index into "bands" / "artists" fields "name"->"coldplay" }.await
// we need to wait until the index operation has been flushed by the server.
// this is an important point - when the index future completes, that doesn't mean that the doc
// is necessarily searchable. It simply means the server has processed your request and the doc is
// queued to be flushed to the indexes. Elasticsearch is eventually consistent.
// For this demo, we'll simply wait for 2 seconds (default refresh interval is 1 second).
Thread.sleep(2000)
// now we can search for the document we indexed earlier
val resp = client.execute { search in "bands" / "artists" query "coldplay" }.await
println(resp)
}
The client accepts connections on 9434 as described in here - https://www.elastic.co/guide/en/cloud/current/security.html#security-transport
Furthermore it looks for a or appends - depending on the construction way chosen - elasticsearch:\\ to the host and port.
Upon running even the line that initializes the Client I get Exception in thread "main" java.lang.NoSuchMethodError: scala.Predef$.refArrayOps([Ljava/lang/Object;)[Ljava/lang/Object;
Clearly I am misunderstanding something. Please let me know what I am doing wrong.
EDIT:
As validation I have a .Net client to ES that uses the regular http connection.
var node = new Uri(url);
var connectionSettings = new ConnectionSettings(node);
connectionSettings.BasicAuthentication(settings.username,settings.password);
client = new ElasticClient(connectionSettings);
I am aiming to achieve the same.
A:
That would appear you are missing the scala-library in your dependencies. So depending on what version of Scala you are using you have to have your deps match that. What build tool are you using?
SBT (you shouldn't need to do this, SBT Should do it automatically based on your scalaVersion)
"org.scala-lang" % "scala-library" % "YOUR SCALA VERSION"
Maven
<dependency>
<groupId>org.scala-lang</groupId>
<artifactId>scala-library</artifactId>
<version>2.12.1</version>
</dependency>
SBT also has some information here, http://www.scala-sbt.org/1.0/docs/Configuring-Scala.html
|
Betaferon - Betaseron
Betaferon - Betaseron Information
BETASERON® (interferon beta-1b) is a prescription medicine used to reduce the number of relapses in people with relapsing forms of multiple sclerosis (MS). This includes people who have had their first symptoms of multiple sclerosis and have an MRI consistent with multiple sclerosis. BETASERON will not cure MS but may decrease the number of flare-ups of the disease.
Betaferon Betaseron Information Video
Betaferon Betaseron RSS News Feed
iHerb Discount on 1st Order!
USE CODE: YUG116
For cheap, quality supplements I recommend iHerb, you can get a $5.00 to $10.00 discount off your first order by clicking the logo below or entering the Code: YUG116 when asked if you were referred by another member. |
Hi - I use the epsom salt baths - not as often as I should. Sometimes they can be magical, sometimes they can be, well, disappointing. If you can handle it, the thing to do is to soak until you get good and sweaty. Then be sure to wash off, or your body will just reabsorb the toxins you release with the sweating. I've heard of adding baking soda and hydrogen peroxide to the bath but haven't tried that yet.
This is one of the cruellest things anyone can say, because in many ways this fatigue is very similar to someone with cancer, but there is no way to make people believe that.
Well now I can , thanks to a one of a series of mitochondrial tests I had done recently by Acumen Lab.
The test measured Cellular DNA, which measures the amount of dead cells floating around in the blood.
PWC's have a high level of cell die off especially when overdoing it and crashing. These dead cells cause an immune reaction which is thought to be the main cause of post exertional malaise.
According to the lab report,
" Cellular DNA are present in malignancy,stroke and CFS. Positive results have been found in 93% of CFS sufferers up to a duration of 5 years. In those with with CFS who have suffered from 5 to 14 years it was found in 75%."
I came in at high level on the results, now if anyone starts on me I can just pull out the report and prove that the fatigue we suffer is in the same bracket as those with cancer.
When I read, " 'You don't look sick.' This one used to really bother me. Till it occurred to me that maybe it would be worse if I looked as bad as I felt. Didn't want THAT peering back at me from the mirror," I burst out laughing....all too true.
Usually my response to being told how good I look is along the lines of "Thank you, I am so glad I don't look as bad as I feel." or "Thank you. If I looked half as bad as I felt, I would be scaring everyone away." Gets the message across w/o appearing to be ungrateful (if they were trying to compliment me) or w/o stooping to their level (if they were being mean).
As to the first one, that is my absolute biggest pet peeve....makes me want to slap the person every time! I recently realized that my dad finally got it (at least more so than he used to) when I made a comment about being really tired and he said that he was too, but then he qualified it as "but not anything like you are" or something along those lines (he was not being sarcastic or anything - he genuinely understood that it was different)....I was mentally jumping up and down and cheering, bc I cannot tell you how many times in the past I have tried to explain to him that it is not the same type of tired.
And the one you mentioned about prayer......I am a Christian and have struggled with this type of thing a lot.....finally realized that there are people in the Bible like Job, whom God Himself said was "a righteous man, like no other", and yet who went thru tremendous pain, suffering, loss, and illness....and kept rt on praying and praising God.....I challenge anyone to try to say that Job's suffering happened bc he wasn't praying enough, didn't have enough faith, etc.....and there are certainly other exps on the Bible, too, of Christian heroes who suffered....not to mention all those places where it talks about love and compassion, etc
This is one of the cruellest things anyone can say, because in many ways this fatigue is very similar to someone with cancer, but there is no way to make people believe that.
:
Click to expand...
Yeah, this one really bothers me, too....and the thing is that quite honestly I have often wished that it were cancer, bc many times they either get better or they die (and then they are no longer suffering)....this is not to say that people with cancer have it easy or anything - I do feel bad for them, too, but I really hate that kind of comment
One of the written testimonies to the CFSAC meeting in Oct was by someone who had had cancer and now has CFS - she said that the cancer was much easier to handle....she also said that her dtr had recently been diagnosed with cancer and that she was rejoicing that it was not CFS
When I read, " 'You don't look sick.' This one used to really bother me. Till it occurred to me that maybe it would be worse if I looked as bad as I felt. Didn't want THAT peering back at me from the mirror," I burst out laughing....all too true.
Usually my response to being told how good I look is along the lines of "Thank you, I am so glad I don't look as bad as I feel." or "Thank you. If I looked half as bad as I felt, I would be scaring everyone away." Gets the message across w/o appearing to be ungrateful (if they were trying to compliment me) or w/o stooping to their level (if they were being mean).
Click to expand...
Tammie, great responses. I get told that I "look good" or "look well" a lot and have never known what to say in response.
But one day, when I thought I was feeling pretty good and doing pretty well, having what I thought was a "good" day, I had one of my instructors tell me, while looking very concerned, that I didn't look well at all. Now THAT was really disconcerting.
Tammie, great responses. I get told that I "look good" or "look well" a lot and have never known what to say in response.
But one day, when I thought I was feeling pretty good and doing pretty well, having what I thought was a "good" day, I had one of my instructors tell me, while looking very concerned, that I didn't look well at all. Now THAT was really disconcerting.
Click to expand...
Thanks!
As to your good day, I have had that happen, too, and you're rt, it is disconcerting.
And, now I have gained some weight, lost some hair, and been having problems with dandruff, so I probably won't be getting the "you look good" comments much more, and I don't like that either .......perhaps it should just be illegal to comment on one another's appearance, regardless!
When I read, " 'You don't look sick.' This one used to really bother me. Till it occurred to me that maybe it would be worse if I looked as bad as I felt. Didn't want THAT peering back at me from the mirror," I burst out laughing....all too true.
Usually my response to being told how good I look is along the lines of "Thank you, I am so glad I don't look as bad as I feel." or "Thank you. If I looked half as bad as I felt, I would be scaring everyone away." Gets the message across w/o appearing to be ungrateful (if they were trying to compliment me) or w/o stooping to their level (if they were being mean).
As to the first one, that is my absolute biggest pet peeve....makes me want to slap the person every time! I recently realized that my dad finally got it (at least more so than he used to) when I made a comment about being really tired and he said that he was too, but then he qualified it as "but not anything like you are" or something along those lines (he was not being sarcastic or anything - he genuinely understood that it was different)....I was mentally jumping up and down and cheering, bc I cannot tell you how many times in the past I have tried to explain to him that it is not the same type of tired.
And the one you mentioned about prayer......I am a Christian and have struggled with this type of thing a lot.....finally realized that there are people in the Bible like Job, whom God Himself said was "a righteous man, like no other", and yet who went thru tremendous pain, suffering, loss, and illness....and kept rt on praying and praising God.....I challenge anyone to try to say that Job's suffering happened bc he wasn't praying enough, didn't have enough faith, etc.....and there are certainly other exps on the Bible, too, of Christian heroes who suffered....not to mention all those places where it talks about love and compassion, etc
Can you tell that this article hit home?!
Click to expand...
Tammie,
Oh yeah. I discern that you were affected by this piece. Picked up on that. |
Steven universe/Deadpool: Stevepool!!!! By sentry1996 Watch
62 Favourites 25 Comments 3K Views
Deadpool finally convinced steve to fuse with him and Peridot, for science, decided to observe non-gem fusion in action
This was the result
Results of experiment
Deadpool felt awesome
Peridot got more then she asked for
Steven got a glimpse inside deadpool's head
IMAGE DETAILS Image size 1252x1668px 334.78 KB Show More
Published : May 3, 2016 |
We've got some more pre-season analysis for you, and I can't imagine that too many fans of the Minnesota Vikings are going to be too enamored with this latest installment of list-a-mania.
Andy Benoit of SI.com's MMQB site has compiled his rankings of the 32 starting quarterbacks going into the season, and young Teddy Bridgewater is. . .well, he's pretty low on the list. Of the 32 starting quarterbacks, he has Bridgewater at #23.
Here's what Benoit had to say in his limited commentary about Bridgewater, and it's hard to disagree with what he says.
Was tightly managed last season before showing extremely encouraging signs down the stretch. The Vikings think they have their guy. Loosen the leash and let's find out.
The reason that Bridgewater was "tightly managed" last season is two-fold. First of all, he wasn't supposed to be managed at all last year, at least on the field in the regular season. The plan was to have him sit for a year (possibly two) and learn from Matt Cassel. (Even though, let's face it, who's going to learn anything from Matt Cassel?) Of course, after nine quarters of football in the 2014 season, that plan went out the window as Cassel broke his foot and Bridgewater got tossed into the fire.
(Incidentally, Cassel is ranked #32 out of 32 on Benoit's list. Thanks for the free fifth-round pick, Buffalo.)
The second reason is that, well, there was a whole lot of turnover going on around Bridgewater personnel-wise last season. Aside from the Adrian Peterson issue, the offensive line was shifting, the receivers were still working to get chemistry with Bridgewater, and Bridgewater was still getting comfortable in the Norv Turner system of offense. As Benoit points out, he did get significantly better near the end of last season, and with Peterson's return, all of the signs are pointing to him having a much bigger season in 2015.
Some of the quarterbacks that were ranked ahead of Bridgewater are ones that I have a hard time agreeing with. Guys like Sam Bradford (who could be great if he could stay healthy for ten minutes), Colin Kaepernick, Andy Dalton, Derek Carr (who is not better than Teddy Bridgewater, I don't care how many people jump up and down and try to convince anyone that he is), Alex Smith (the guy that didn't throw a single TD pass to a wide receiver in 2014) and Jay Cutler (HAHAHAHAHAHAHAHAHAHA) are above Bridgewater on the list. I know that, as Vikings fans, we're pretty biased towards Bridgewater and think he's on course for some pretty big things, but still. . .how many of those guys would you trade #5 straight up for?
Teddy Bridgewater has some people to convince going into the 2015 NFL season. I don't think he'll need to convince nearly as many going into the 2016 season. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.