text stringlengths 8 5.77M |
|---|
Maternal smoking in successive pregnancies and recurrence of low birthweight: the 2004 Pelotas birth cohort study, Brazil.
To evaluate the frequency of maternal smoking in successive pregnancies and its association with repetition of low birthweight, a study was conducted of a subsample of mothers from the 2004 Pelotas Birth Cohort in Brazil. Only women with previous histories of low birthweight newborns were included. Women with ≥ 2 previous births were eligible only if at least one of the two births immediately preceding the 2004 birth had low birthweight. From 4,458 births, 565 were included in this study. Frequency of smoking was 32.4%. Considering past pregnancies, 67.1% of mothers never smoked, 21.4% smoked during all pregnancies, 6.5% were ex-smokers, and 5% smoked only during the current pregnancy. In the adjusted analyses, when compared to mothers who never smoked, those who smoked during all pregnancies had 2.5 times greater probability of low birthweight recurrence in 2004 (PR = 2.5; 95%CI: 1.32-4.80). Smoking persistence is an important factor for the recurrence of low birthweight in successive pregnancies. |
Comparison between metabolite productions in cell culture and in whole plant of Maclura pomifera.
Plant tissue cultures of Maclura pomifera showed a metabolite accumulation pattern which was both quantitatively and qualitatively different from that of the parent plant. Triterpenes and flavonoids were isolated from callus and cell cultures, however, xanthones and stilbenes, which have been reported in the whole plant, were not found. Among the flavonoids, flavones and flavanones were produced preferentially by the suspended cells, but with the prenyl substituents exclusively on ring A, while the isoflavones did not show the 3',4'-dihydroxyl substitution pattern found in the products isolated from fruits. A new prenylated 6'-deoxychalcone was also isolated from the callus and cell cultures. |
Network
Network
1. A hub is a device used as a central connection point when adding workstations to a network, or to strengthen signals when longer cable segments are added between workstations. A switch is similar to a hub. Their main differences are that switches have per-port switching (each port or outlet on the switch gets the full bandwidth of the switch) and they can be managed (each port on the switch can be configured
2. 6.5 data transmission- modes and rates
2.1. data transmission- the process of moving some data from one space to another
2.2. there are three different methods of data transmission- simplex, half-duplex and full duplex
2.4. Half-duplex- data can travel in either direction but only one data stream at a time
2.5. duplex- data can move in either direction simultaneously
3. 6.1
3.1. Nature and role- protocol is with which the language and manners with which we communicate. Therefore protocols run our lives. Protocols run computers as well by determining what the computer must do.
3.2. Networks can be clasified as either client-server or peer-to-peer servers. The easiest way to get file is to send a request to a server then the server sends the file requested to you. Peer-to-peer networking is like torrenting, where you get a small part fo the file from each computer to make a complete the media file
3.3. Nature and role- to have security against hackers people use firewalls, passwords, secure tape backups and uninterruptible power supplies.
3.4. The disadvantages of networks are the cost of installation which can be hundreds of thousands of dollars). You also have to pay for administration and maintenance. You need an administrator to update and fix the network when it is down which will cost the owner more.
3.5. Nature and role- an operating system creates an environment for the application software. This gives you your network connection. The network control exists in the operating system.
3.6. Nature and role- peripheral devices are external devices that are used by computers or associated with computers. A single peripheral device is called a node. A shared peripheral device is a printer or mouse that can be used for many computers so that you don't have to waste money on seperate and individul devices.
4. 6.6
4.1. The longer the waveform the further they travel
4.2. Microwave transmitters send very high frequency radio waves in a direct line. These transmissions can be sent and received by towers mounted on tall buildings or mountain tops or by satellites orbiting the Earth.
5. 6.2
5.1. LAN- local area network
5.2. A wide area network (WAN) can be thought of as a collection of LANs. A WAN is usually used to connect computers which are hundreds or thousands of kilometres apart. A business with offices in different cities can connect the LANs in each office to create a WAN, allowing all of its staff to communicate easily
5.3. A virtual private network (VPN) is one which uses the public telephone network and the Internet to carry encrypted data. VPNs created by businesses and educational institutions allow their employees and students to gain remote access to their LANs, so they can work or study at home.
5.4. Servers Servers are purpose-built computers that store data, control access to data, authenticate users and, in some cases, perform any required processing. A single server may perform all of these tasks.
5.5. • File servers are used to store files and data that are to be shared by users of the network. File servers may also authenticate users to ensure that only registered users have access to certain files and data. •
5.7. Proxy servers act as an intermediary between an end user and the Internet. They temporarily store frequently accessed web pages. When a user requests a web page, the proxy server checks whether it has stored the page before forwarding the request to the Internet. This can make access to frequently visited pages much faster than retrieving the pages from the Internet each time they are required.
5.8. Print servers are dedicated to processing printing requests from users on a LAN.
5.10. Workstations are the computers, which may be connected to a network, that allow users to do their work. They range from dumb terminals with no hard-drive memory or processor (all processing and data storage is done by the server) to high-end, graphics workstations that have more processing power than some of the supercomputers of about five years ago.
5.11. Repeaters are the simplest form of signal booster. They are physical devices designed to tie two long network cable segments together. Repeaters accept data in the form of packets sent by the nodes on the network and rejuvenate (or amplify) the packet signal so that it can travel a long distance without data loss.
5.12. Routers are more sophisticated than bridges; they are not tied to any one topology or protocol. They pay attention only to the destination addresses (a set of four integers separated by full stops) attached to data packets. These addresses identify the interfaces as nodes within the network. Routers may be a physical device or a piece of routing software.
5.13. A network interface card (NIC) is the card installed in a computer or peripheral device that allows it to connect to the network. The NIC must be matched to the topology of cables of the network. NICs package data according to the rules of the network operating system (NOS) and transmit data along the connecting network cable. An exception to this, of course, is the wireless network card which does not use a cable.
5.14. Networks require specialised software called the network operating system (NOS). The NOS is like the operating system on a personal computer; it provides an interface between the users, and the network and its attached peripheral devices. The NOS handles such tasks as user authentication, file storage and management of printing jobs.
6. Cable Media
6.1. Cable media include copper wire, as a coaxial cable or a twisted pair cable, and optical fibre cable. Each of these media has several advantages and disadvantages.
6.2. A coaxial cable is made of stiff copper wire surrounded by insulating material, which is then encased in a cylindrical conductor like a mesh. The cable is then coated in a plastic cover. The mesh shielding helps to block electrical interference; this makes it a more reliable carrier of data than a twisted pair cable, However, it is heavier and less flexible than a twisted pair cable and takes up more space. The data transfer rate through a coaxial cable is limited to 10 Mbps.
6.3. A twisted pair cable consists of pairs of insulated copper wire twisted together (to reduce interference) and covered by an outer jacket. The twisted pair cable used in networks is called unshielded twisted pair (UTP). It is called unshielded because there is no shielding between the insulated pairs and the outer jacket. Its main advantage is that it is cheap to purchase and install. UTP cable is currently able to transfer data at 1000 Mbps (1 Gbps).
6.4. Optical fibre cable allows data to be sent as pulses of light. One light pulse can signal a ‘1’ bit, while a nolight pulse signals a ‘0’ bit. The optical fibre consists of an extremely thin fibre of glass or plastic surrounded by a layer of a different type of glass or plastic. The boundary between the two different materials acts like a mirror and traps the light pulses inside the inner cable. A laser diode at one end of the cable emits light pulses into the cable. A photodiode (light-detecting diode) at the other end of the cable detects the light pulses
7. 6.4 Network Topologies
7.1. Topology of a network is the arrangement of the nodes these are star topology, ring topology and bus topology
7.2. star topology- is when all connections are connected and controlled from a hub or switch device
7.3. Bus topology- uses a cable in a single line with two connections and makes sure there is a terminator which blocks signals from one end and makes sure they dont reflect back into the network
7.4. Ring topology- signal goes around the ring of the network and links up with the nodes.
8. 6.7
8.1. Firewall
8.1.1. TCP/IP is where the pods sit
8.1.2. Only communication that can occur is through 8080
8.1.3. network services run on 1024 communication
8.1.4. Security systems need a password and a login name
8.2. Encryption
8.2.1. You receive privacy from encryption
8.2.2. Digital Signature is when you sign your name on a computer
8.2.3. One way of encrypting data is to use public and private keys. A public key is designed to be spread around freely, while a private key is held only by its owner and should never be disclosed publicly.
8.3. Unix
8.3.1. Designed to handle millions of clients
8.3.2. No limit on RAM
9. Database
9.1. Have individual eyes and characteristics this individualality is achieved by file management in the database.
9.2. A database record stores all of the data describing just one item in the database.
9.3. A database record stores all of the data and describes just one item in the database.
9.4. A database field is a single piece of data from a record. Every record must have at least one field.
9.5. Data types are:
9.5.1. TEXT
9.5.1.1. Number
9.5.1.1.1. Yes/no/ true or false
10. 3.2 Database development
10.1. A record is information about an entity.
10.2. A record associated with eye color, jim bloggs (the record is all about him/ his specific entity)
10.3. The purpose of validation rules are to ensure the data is in the correct format.
10.4. All positive numbers are in the record.
10.5. Validation checks at to make sure the record meets the criteria for the data set.
10.6. Validation checks are basically checking to see if the data is to small or big or if it is the wrong type of data. This check is used to make sure the data is accurate and to the highest potential. |
;
; Exports of file HTTPEXT.dll
;
; Autogenerated by gen_exportdef
; Written by Kai Tietz, 2007
;
LIBRARY HTTPEXT.dll
EXPORTS
GetExtensionVersion
HttpExtensionProc
TerminateExtension
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
|
The year is 3160 something and there are only around 100,000 people left on earth. A massive android war has resulted in the death of most of the human population. However two societies still exist in constant war with one another. One has mostly fled to a colony on the moon but desperately wishes to return to earth. The other is a highly guarded underground civilization still on earth. Both societies have massive automated droid building facilities on earth that continue to develop robotic soldiers. It’s been over twenty years since the last human fled the surface of earth. But the robots remain and fight everyday.
Edgar Readybicker is a junior hacker working for the underground earth society. But his status is about to be upgraded. He’s on the verge of completing a program that will allow him to steal control of the moon colony android army and their factories. But Edgar has confided his plans in the wrong person. And moon colony spies hiding among his people have just attempted to assassinate him.
In order to flee the assassins Edgar is forced to step foot aboveground, on land that most humans haven’t walked on in over two decades. He’s on the run to try and find a secret subterranean community where he can complete his work and put an end to over three hundred years of fighting.
Will Edgar make it to safety? Or find himself a victim in a violent android war?
Let us know what you think about our ideas! Comment below to give us your opinion, add onto an existing idea, or submit one of your own! |
Q:
Is there a way to run a script file every time before my pod is compiled?
I have a basic swift script that writes to a file. I need to run that script every time my cocoapods library is compiled.
Is there a way to do this?
A:
In the podspec file you can do something like this:
s.script_phase = { :name => 'Writing to files', :script => '(./myscript)', :execution_position => :before_compile }
|
Drag Queen Story Hour began as a small operation in San Francisco, but quickly grew to a global phenomenon. DQSH now produces over one hundred events each year and has chapters worldwide.
The South Hill Library in Spokane, Washington became the latest moral battleground over the controversial Drag Queen Story Hour (DQSH).
Hundreds of jeering protesters and counter-protesters faced off outside the library as parents and their excited children gathered inside to listen to Andrea Tate, a drag king better known as Tirrany, read from such books as "The Princess and the Pony," "Not all Princesses Wear Pink" and "Love Is Love Is Love," part and parcel of a national program designed to expose kids to positive queer role models and gender fluidity.
"I'm done with letting drag be confined to adult-only spaces," explained Tate of the Spokane event, where libraries turned away dozens of kids due to the large public turnout. "Obviously we're not teaching kids what it means to be gay. That's not our goal here. Our goal with this story hour is to teach kids that regardless of what someone else looks like, or who they love, we have no place telling them they're not allowed to do that."
Drag Dissent
Conservative Christian Tom Turner, who joined about 200 people protesting the Spokane event, waving signs reading "Gender fluidity is a lie" and "Drag is Black Face," was not buying Tate's message of inclusion for one second.
"I'm on this side of the street because God isn't over there," he said, pointing to the 400-or-so counter-protesters who showed up to support the drag queens. "Ultimately, they're being deceived. The fact that this is happening all over the U.S. reflects where our society and culture is headed. Sin is never satisfied."
Anti-LGBTQ rights organization MassResistance mobilized a similar protest at a Seattle story hour, describing it as inappropriate and hypersexualized. And a religious group in Houston even filed a legal challenge against DQSH, saying the event violated their religious freedom.
Meanwhile, at an unrelated "Teen Pride" celebration at a Washington public library, two concerned mothers were ridiculed online for their efforts to expose a graphic dance by a drag queen, as well as the distribution of questionable adult sex and gender materials.
Still, the pastor of Westminster United Congregational Church of Christ applauded the Spokane event, glad that her own granddaughter could attend. "Even though there's only one of me up here," began Rev. Andrea CastroLang, "there are other Christian churches that are friends and allies, and it really sucks to have to represent Christianity sometimes because we've done a lot of disservice. So I'm here to try and be a friendly face."
The Debate Drags On
The libraries hosting the events are generally very supportive of the events. Judy Zuckerman, Director of Youth and Family Services at Brooklyn Public Library, said that "Drag Queen Story Hour is a fun and important program that celebrates diversity in the way that children may dress and act. It encourages children to look beyond gender stereotypes and embrace unfettered exploration of self."
But those in opposition see Drag Queen Story Hour as the unnecessary promotion of homosexuality to children. One protester at the Des Moines, Washington Drag Queen Story Hour laid his argument out. "Why impose this lifestyle on a child? Children will grow up and learn their own opinions all by themselves. There's no reason for this." Another protester at last year's event in Mobile, Alabama was even blunter. "They're going to try to say that they're just trying to teach kids how to read Everybody knows that's not what this is about. They're trying to teach children that there's nothing wrong to have two fathers instead of a mother and father. I mean that's what this is all about, and I'm against that."
So as Drag Queen Story Hour continues, so too will the protests. But DQSH co-founder Jonathan Hamilt is unfazed by the opposition, and insists the protests are born out of ignorance. "When you leave big liberal areas, people tend to be more conservative. Their fear can come out as anger." |
Validation of self-reported chronic conditions and health services in a managed care population.
Self-reported data are commonly used to estimate the prevalence of health conditions and the use of preventive health services in the population, but the validity of such data is often questioned. The Behavioral Risk Factor Survey (BRFS) was admin istered by telephone to a stratified, random sample of health maintenanc e organization (HMO) subscribers in Colorado in 1993, and self-reports w ere compared with HMO medical records for 599 adults aged >21. Sensitivity and specificity were calculated for three chronic conditions and use of six preventive services. Sensitivity was highest for hypertension (83%), moderate for diabetes (73%), and lowest for hypercholesterolemia (59%); specificity was >80% for all three conditions. Sensitivity ranged from 86% to 99% for influenza immunization, clinical breast examination, blood cholesterol screening, mammography, Pap test, and blood pressure screening; specificity was <75% for all preventive services. Self-reports are reasonably accurate for certain chronic conditions and for routine screening exams and can provide a useful estimate for broad measures of population prevalence. |
Iraqi Christian genocide survivors may forever vanish from their ancient homelands. They were in crisis when I met with them a few days before Christmas last year in Erbil, in the Kurdistan region of Iraq. Now their survival is endangered and two things must be done to secure it.
The Senate should quickly bring up and pass the House-passed, bipartisan H.R. 390 (Iraq and Syria Genocide Emergency Relief and Accountability Act)—which I authored with my colleague, Rep. Anna Eshoo (CA-18). H.R. 390 authorizes the Administration to direct humanitarian and recovery assistance to all religious and ethnic minority communities ISIS targeted for genocide. Aid would come from already-approved funds and no additional money is authorized. Authorization would ensure that as long as the U.S. is responding to the crises in Iraq and Syria, vital aid will go to these genocide-surviving communities.
The President should also issue formal instructions, such as a Presidential Memorandum, directing his Administration—especially the State Department and U.S. Agency for International Development (USAID)—to identify the needs of these communities and immediately fund entities effectively assisting them on-the-ground. H.R. 390 is a blueprint for such executive action.
The President and Vice President have spoken strongly about the ISIS genocide and committed the Administration to bringing relief to survivors. The Secretary of State formally issued the Administration’s genocide declaration in the recently released International Religious Freedom Report for 2016. His predecessor had also declared the genocide. Last year, the House and Senate unanimously passed resolutions with genocide declarations. The genocide determination is settled. What remains unsettled is whether the U.S. will help Christian and Yazidi communities survive.
Our actions over the next month or two may determine whether the Nineveh Plains remain the historic homeland of many Iraqi Christians. ISIS drove them out with its genocidal campaign and destroyed or damaged their homes, markets and churches. Reconstruction has begun on some homes and some families have returned. Many other families have signaled they want to return. However, they know the U.S. and most other countries have done little to help them survive and rebuild. They also know private funding from groups like the Knights of Columbus and Aid to the Church in Need that sustained them in Erbil is running out. Unless more homes are rebuilt, or humanitarian aid provided, many may be forced to abandon their homes and leave Iraq permanently.
America also has pressing national security interests in enabling Christians to return to their homes. Iran has been paying individuals to move into empty Christian homes in the Nineveh Plains—house-stealing—and backing them with its proxy militias. This supports the Iranian government’s aspirations to directly or indirectly control road access in Iraq, Syria and Lebanon to move weapons and personnel.
Additionally, ISIS murders, tortures and enslaves religious and ethnic minorities as part of its ideology and recruitment. Even if ISIS is defeated militarily in Iraq, if it succeeds in purging religious and ethnic minorities from their homelands, terrorist radicalization, recruiting and violence will be fed for generations. Aiding these genocide survivors is an essential element of countering this threat.
Despite this urgency, some career staff at the State Department and USAID have been thwarting the President by making the same decisions as they did during the Obama Administration: refusing to prioritize the survival of religious and ethnic communities targeted for genocide.
These staffers claim they are only able to look at the needs of individuals, without consideration for the survival of their communities, and are unable to fund faith-based entities like the Chaldean Catholic Archdiocese of Erbil. I saw first-hand how the Archdiocese has been providing almost all the medical care, food and shelter to more than 95,000 Christians—almost 90% of Christian survivors—who escaped ISIS and remain in Iraq, as well as some Yazidi and Muslim survivors. The Archdiocese has also been leading the ecumenical Nineveh Reconstruction Committee, which is working to rebuild 12,000 damaged or destroyed Christian homes.
Neither U.S. law nor international norms prohibit directing such assistance to such communities or prohibit funding faith-based entities like the Archdiocese of Erbil, so long as they use it strictly for humanitarian and related purposes and are able to meet certain standards of effectiveness, accounting and transparency.
Nevertheless, some of these staffers continue to claim they lack authorization to implement the commitments of the President and the requirements in the budget bill for the current fiscal year. Passing H.R. 390, and signing it into law, will leave no doubt about the will of the President, the Congress and the American people. Formal instructions from the President will likewise make it clear how he expects his Administration to help these genocide survivors and that there will be accountability if the relevant government agencies fail to act accordingly.
Since ISIS began its genocidal rampage in 2013, I have chaired nine hearings, focused wholly or partially on the crisis. It became clear hearings were not enough and legislation was necessary to move the rank and file bureaucrats. That is why I introduced H.R. 390 in the last Congress and introduced it again this Congress. Together with ongoing Congressional oversight, executive instructions and accountability, the legislation will help Christians, Yazidis and other persecuted religious and ethnic minorities outlast the genocide. It is bipartisan and supported by a wide range of leaders, groups and constituents across the country.
When I met with surviving Christian families in Erbil, they told me suffering had strengthened their faith and they still believed the United States would not abandon them. They need our help now. Will we give it? |
All the Arts, All the Time
When it comes to comedy, the only rule that counts is whatever works. Yet after seeing “Matthew Modine Saves the Alpacas,” the jejune meta-farce starring Modine as a fictionalized version of himself, I’d like to propose a few guidelines for playwrights and those who care about their careers.
First, it’s never a good idea to include in your title a mammal that most audience members can relate to only as a blanket or throw. Second, you should avoid giving any stage time to these grazing creatures, as they tend to lower the general level, especially when portrayed by shaggy puppets with dopey expressions. Third and finally, unless you can justify putting a laugh track on the Discovery Channel, you better not attempt to wring guffaws from mating scenes — and I don’t care how spryly adorable you think their congress may be.
To his own detriment, Blair Singer, a journeyman dramatist and TV writer, violates each of these tenets. And though his play — which had its world premiere Wednesday at the Geffen Playhouse under the direction of John Rando — wouldn’t work even if he hadn’t, the resulting fiasco is of a far more grandiose order.
How bad are we talking? Well, the old saying that “dying is easy, comedy is hard” seemed to pertain as much to theatergoers eking out stray giggles from their seats as those poor performers saddled with this bomb material onstage.
More’s the pity for Modine, who plays a washed-up Hollywood caricature named Matthew Modine who sleeps in a Winnebago and subsists on junk food, bong hits and memories of his ’80s glory. What must have seemed like a self-parodying lark ought to result in some white-knuckle meetings with his current management team.
OK, sometimes blind hope gets the better of all of us, but was there no one at the Geffen (including Rando, a Tony winner for “Urinetown: The Musical”) capable of making an objective assessment of a script that should have gone no further than a benefit reading with a carefully planned guest list? Did the game involvement of Modine — a stage and film actor, so terrific in “Married to the Mob” and “Full Metal Jacket” and still impossibly boyish after all these years — short-circuit everyone’s critical faculties?
Modine isn’t the only victim here. Peri Gilpin (familiar to many as Roz on “Frasier,” a series that will live eternally in rerun heaven) plays Whimberly North, a glamorous shark-like publicist Botoxed to the nines, whose much coveted expertise is in rescuing stars from their shameful (and typically self-inflicted) crises, the most heinous of which, of course, is Hollywood oblivion.
Gilpin’s character is a flimsy knockoff of the actor-devouring agent that Julie White won a Tony for portraying in Douglas Carter Beane’s “The Little Dog Laughed,” a role that White reprised in Los Angeles at the Kirk Douglas Theatre. Unfortunately, the only thing Whimberly has over her theatrical predecessor is her wardrobe (kudos to costume designer Robert Blackman for making Gilpin look so fabulous). Suffice it to say that the flamboyant flourishes of this A-list flack seem strained, and the wit Singer inflicts on her, instead of being smutty in a satirically revealing way, is often just plain crass.
French Stewart (an L.A. stage stalwart and “3rd Rock From the Sun” alum) gives it his farcical all as Whimberly’s gay assistant, Jeffrey, the sassy in-house genius who comes up with the idea of having Matthew salvage his nearly extinguished fame by rescuing the dying alpacas on Mt. Chimborazo in the Andes (a foreign relations strategy that has apparently replaced adopting African babies as a cynical public relations ploy). Stewart knows how to get a rise from the audience, but the hernia-inducing strenuousness of his effort is apparent, especially when he assumes his other role of Pierre du Perrier Jouet, a French U.N. official with a love of Champagne and a total disregard for English pronunciation.
By the time Pierre enters the madcap escapade, Singer’s galumphing story has reached South America, and we’ve moved from a silly entertainment industry lampoon to a sketch comedy bungle for the theatrical record books. And not even set designer Beowulf Boritt’s playfully stagy backgrounds or the presence of exotic animal puppets can coax us into overlooking the obvious ineptitude.
Edward Padilla, Mark Damon Espinoza and Reggie De Leon try against all odds to preserve a scrap of honor in their “Gilligan's Island”-like sketches of Chimborazo brothers (no luck, I’m afraid). But at least they’re spared the indignities of Mark Fite, the cast member left stranded by two of Singer’s most ham-fisted scenes, the first requiring him to personify Matthew’s conscience, the other setting him up to impersonate Charlie Rose.
A veteran of loony comedy, Rando keeps revving up the high jinks, but this backfiring spoof cries out for a cease-and-desist order. Maybe Modine’s lawyer can make a few well-placed calls. |
Introduction
============
Neuromyelitis optica spectrum disorder (NMOSD) is an infrequent autoimmune inflammatory disorder of the central nervous system (CNS).^[@B1]^ The prevalence of NMOSD among the Iranian population living in Tehran, Iran, was 0.86 per 100000 populations in 2016. Moreover, the highest prevalence rate was observed in the 40-49 years age group of the mentioned population.^[@B2]^ Despite the remarkable number of studies addressing NMOSD, its risk factors have not been thoroughly attended.^[@B3]^ Smoking has been recognized as a major environmental risk factor promoting the development of a wide range of inflammatory and autoimmune diseases in genetically-susceptible individuals.^[@B4]^ The mechanism by which cigarette smoking causes an imbalance in the immune system and contributes to the pathogenesis of autoimmunity has not been grasped yet; however, some factors such as toxic compounds in cigarettes that cause epigenetic changes seem to be involved in this regard.^[@B5],[@B6]^
Rheumatoid arthritis (RA),^[@B7]^ systemic lupus erythematosus (SLE),^[@B8]^ multiple sclerosis (MS),^[@B9]^ NMOSD,^[@B3]^ and Graves' hyperthyroidism^[@B10]^ are among the autoimmune diseases that smoking has been demonstrated to play a role in their pathogenesis. Interestingly, smoking also leads to autoantibody production, which can be regarded as a piece of its immune balance impairment puzzle. NMOSD is distinguished from MS with the recognition of aquaporin-4 immunoglobulin G (AQP4-IgG), also known as NMO-IgG, which acts as an autoantibody against AQP4 that is a water channel in the brain parenchyma.^[@B11]^ As far as the authors of the present study are concerned, the association between smoking and NMO-IgG sero-positivity has not been investigated yet. Therefore, the present study aimed at determining the smoking history of patients with NMOSD and then examining any association between smoking and NMO-IgG sero-positivity.
Materials and Methods
=====================
***Study population and patients:*** A cross-sectional study was conducted in Sina Hospital, a tertiary referral center in Tehran.^[@B2],[@B12]^ All the patients, who received a definite diagnosis of NMOSD based on the international 2015 consensus criteria^[@B1],[@B13]^ and were admitted to the hospital from August 1, 2015 to September 21, 2016, were included in the study. The diagnosis was confirmed by a neurologist, as well. The NMOSD patients with positive history of smoking were compared with a group of NMOSD patients without any smoking habits.
***Laboratory analyses/detection of NMO-IgG:*** The enzyme-linked immunosorbent assay (ELISA) was used to examine the presence of AQP4-IgG status.^[@B14]^ Most of the tests were performed during the relapse phase, before receiving corticosteroids.
***Cigarette smoking:*** To assess the possible association between NMO-IgG sero-positivity and cigarette smoking habits, a researcher-made questionnaire was designed, which covered the patients' demographic information, lifestyle information on smoking habits, and clinical characteristics including the onset of the clinical symptoms and the status of NMO-IgG. To collect the required data, structured face-to-face interviews were conducted by trained interviewers. Data about patients' lifetime cigarette smoking status, number of cigarettes per day, and years of smoking were collected using the following three categories: lifetime daily cigarette smoking (1 per day for over 6 months), current daily cigarette smoking, and passive smoking (whether the person lived with a regularly smoking person or has been with a regular smoker in the workplace).^[@B3]^
Chi-square test was used to examine the association among the variables, and logistic regression was applied to determine the interactions between the variables. The crude odds ratio (OR), adjusted OR (AOR), and 95% confidence interval (CI) were calculated. P-values \< 0.05 were considered significant. All data analyses were performed using SPSS software (version 23, IBM Corporation, Armonk, NY, USA).
The study protocol was approved by the Ethics Committee of Institutional Review Board (IRB) in Tehran University of Medical Sciences, Tehran (reference number: IRTUMSREC13941195). Moreover, informed consents were obtained from all patients.
Results
=======
A total of 94 patients consisting of 78 (83%) women and 16 (17%) men were enrolled in the study. Female to male ratio was 4.8:1 ([Table 1](#T1){ref-type="table"}). The mean patient age on the prevalence day was 37.05 years. The minimum and maximum ages were 14 and 71 years, respectively. The patients aging 19-38 years comprised the major proportion of the participants (52.1%) ([Table 1](#T1){ref-type="table"}).
######
Baseline characteristics and clinical features of patients with neuromyelitis optica spectrum disorder (NMOSD)
**Variables** **Women \[n (%)\]** **Men \[n (%)\]** **Total \[n (%)\]** **P**
------------------------------- --------------------- ------------------- --------------------- -------
Age group (year) 0.26
≤ 18 2 (2.6) 2 (12.5) 4 (4.3)
19-38 42 (53.8) 7 (43.7) 49 (52.1)
39-58 32 (41.0) 6 (37.5) 38 (40.4)
≥ 59 2 (2.6) 1 (6.3) 3 (3.2)
Marital status 0.57
Single 27 (34.6) 7 (43.8) 34 (36.2)
Married 51 (65.4) 9 (56.3) 60 (63.8)
Educational level 0.29
Illiterate 3 (3.8) 2 (12.5) 5 (5.3)
Primary/secondary school 35 (44.9) 8 (50.0) 43 (45.7)
University 40 (51.3) 6 (37.5) 46 (48.9)
Clinical onset symptom 0.14
ON 25 (32.1) 4 (25.0) 29 (30.8)
TM 20 (25.6) 8 (50.0) 28 (29.8)
ON + TM 33 (42.3) 4 (25.0) 37 (39.4)
NMO-IgG status 0.29
Positive 38 (48.7) 6 (37.5) 44 (46.8)
Negative 40 (51.3) 10 (62.5) 50 (53.2)
ON: Optic neuritis; TM: Transverse myelitis; NMO-IgG: Neuromyelitis optica-immunoglobulin G
Moreover, the mean age of the patients with NMOSD at the disease onset was 31.88 years with a mode of 42 years. There was no significant relationship between the patients' mean age at disease onset and their gender (P = 0.57). Majority of the patients, 60 (63.8%), were married, and 46 (48.9%) ones had a university degree.
The status of NMO-IgG was examined in all patients. The results were negative and positive for 50 (53.2%) and 44 (46.8%) patients, respectively. The first presenting symptoms among patients were symptoms of transverse myelitis (TM), optic neuritis (ON), and TM + ON that were manifested in 28 (29.8%), 29 (30.8%), and 37 (39.4%) patients, respectively ([Table 1](#T1){ref-type="table"}).
The results of the univariate analysis addressing the NMO-IgG status as well as the significant association of environmental risk factors among NMOSD population are presented in [table 2](#T2){ref-type="table"}. There were increased odds of NMO-IgG sero-positivity status among patients with lifetime cigarette smoking habit for at least six months (AOR = 4.12, 95% CI: 1.01-16.86) ([Table 2](#T2){ref-type="table"}). Following the mentioned group, the patients with lifetime passive smoking status indicated the increased odds of NMO-IgG sero-positivity status (AOR = 3.06, 95% CI: 1.31-7.13) ([Table 2](#T2){ref-type="table"}).
######
Environmental risk factors for neuromyelitis optica-immunoglobulin G (NMO-IgG)
**Variables** **NMO-IgG** **NMO-IgG** **Crude OR (95% CI)** **AOR (95% CI)** **P**
---------------------------- ------------- ------------- ----------------------- ------------------- -------
Age group (year) 0.53
≤ 18 2 (4.5) 6 (12.0) Reference Reference
19-38 29 (65.9) 31 (62.0) 0.35 (0.06-1.90) 0.37 (0.06-1.99)
39-58 12 (27.3) 12 (24.0) 0.33 (0.05-1.99) 0.39 (0.06-2.39)
≥ 59 1 (2.3) 1 (2.0) 0.33 (0.01-8.18) 0.30 (0.01-7.61)
Lifetime cigarette smoking 0.03
Yes 3 (6.8) 12 (24.0) 4.31 (1.13-16.48) 4.12 (1.01-16.86)
No 41 (93.2) 38 (76.0) Reference Reference
Lifetime passive smoking 0.01
Yes 18 (40.9) 33 (66.0) 2.80 (1.21-6.48) 3.06 (1.31-7.13)
No 26 (59.1) 17 (34.0) Reference Reference
Adjusted for sex
OR: Odds ratio; AOR: Adjusted odds ratio; CI: Confidence interval; NMO-IgG: Neuromyelitis optica-immunoglobulin G
Discussion
==========
The present study revealed a direct association between long-term smoking and antibody positivity in patients with NMOSD. Although the relationship between antibody titer and disease severity still remains imprecise and the provided results are contradictory in this respect,^[@B15],[@B16]^ considering the role of antibodies in the pathogenesis of the disease as well as the evidence presented in the pertinent studies, the relationship between antibodies and severity of the disease is indicated.^[@B17]^
The obtained finding is of great value as it can confirm the findings of previous studies specifying the relationship between smoking and disease onset. In the study conducted by Heydarpour et al., it was indicated that current use of cigarette directly correlated with the number of attacks. Furthermore, duration and daily dose-rate of cigarette smoking were directly related to the patients' Expanded Disability Status Scale (EDSS) score.^[@B18]^ Moreover, it has been revealed that smoking has a direct relationship with the mentioned patients' quality of life.^[@B19]^ To the researchers' best knowledge, the relationship between cigarette smoking and antibodies has not been investigated yet. However, reviewing similar studies focusing on a wide array of autoimmune diseases can shed more light on the cause of the observed relationship. As it was mentioned in the introduction, cigarette smoking has specific effects on the immune system and generally can lead to immunosuppression.^[@B20]^
It seems that the mentioned effect of smoking is mainly due to its nicotine, which has inhibitory effects on both innate and adaptive immune responses.^[@B21]^ Smoking also has diverse effects on the components of the immune system. Smoking increases the level of T-helper 17 (Th17) cells in the blood of patients with chronic obstructive pulmonary disease (COPD)^[@B22]^ and Crohn\'s disease,^[@B23]^ and subsequently worsens the disease-specific health status. Moreover, smoking can increase the number and activity level of cytotoxic T cells (CD8+ T cells) in the blood.^[@B24]^
Smoking not only affects T cells but also has a definite effect on B cells. In this regard, smoking can lead to an increased number of memory B cells, which is followed by an increase in the level of IgE and a decrease in the number of regulatory B cells (Bregs).^[@B25]^ As already mentioned, smoking has a definite effect on the innate immunity as a result of increasing the incidence rate and impact intensity of toll-like receptors (TLRs)^[@B26]^ as well as affecting the performance and efficiency of dendritic cells (DCs), natural killer cells (NK cells), and macrophages.^[@B25]^ The mentioned inclusive effect of smoking on the immune system practically anticipates its relationship with antibody positivity in patients. As already specified, to the best of the authors' knowledge, no research has been conducted in this regard so far. However, the effect of smoking on the production of antibodies in a number of other autoimmune diseases has been previously examined, and the results revealed that current use of cigarettes was directly related to double stranded deoxyribonucleic acid (dsDNA) autoantibody sero-positivity. According to the theory presented by the researchers interested in this area of investigation, DNA damage caused by smoking can lead to an increased risk of antibody production against smoking, which can be considered as a justification for the obtained findings.
The role of smoking in the production of antibodies can be probably facilitated by antigen expression. The mentioned issue has not been only attended to by the authors of the present study, but also is insisted on in other studies. For instance, the study conducted by Mysikova et al. revealed that the level of antibodies specific for New York esophageal squamous cell carcinoma 1 (NY-ESO-1) in patients with non-small-cell lung cancer (NSCLC) was significantly higher than that of the control group. The mentioned finding indicates that the level of antibodies has a direct relationship with smoking. Probably, the immunological effects of smoking lead to antigen presentation and subsequently antibody production.^[@B27]^ The presented studies can be used as a guide to explain the findings of the present study regarding the relationship between sero-positivity and smoking in patients with NMOSD.
Conceivably, smoking with its immunological effects leads to other additional presentations of antibodies. AQP4 is a membrane protein that is predominately expressed in the end-feet of astrocytes.^[@B28]^ The mentioned point clarifies why astrocytes play a very significant role in NMOSD, which is referred to as astrocytopathy.^[@B29]^ It has been indicated that smoking can damage the mentioned cells^[@B30]^ which probably contribute to the expression of AQP4 and consequently development of antibodies. Moreover, animal studies conducted in this regard verify the mentioned claim. It has been reported that following the onset of smoke inhalation in rats, the level of AQP4 expression in astrocyte cells in the retina increased.^[@B31]^ Considering the findings of the present study as well as those of the mentioned studies, it can be concluded that smoking has the same effect on human brain astrocytes.
The present study can be considered as an introduction to the effect of smoking on the trend and severity of NMOSD. However, further research is required to present a better and more comprehensive understanding of this issue. Clinically, the presented findings can be regarded as very strong evidence for recommending smoking cessation in patients with NMOSD which can in turn lead to the improvement of disease condition.
Conclusion
==========
Smoking cigarette leads to the production of autoantibodies such as NMO-IgG in patients with NMOSD. Lifetime and current cigarette smoking habits are the risk factors for NMO-IgG sero-positivity.
The authors would like to thank Miss Saeideh Ayobi for her helpful collaboration.
Notes:
======
**How to cite this article:** Eskandarieh Sh, Naser Moghadasi A, Sahraiain MA, Azimi AR, Molazadeh N. Association of cigarette smoking with neuromyelitis optica-immunoglobulin G sero-positivity in neuromyelitis optica spectrum disorder. Iran J Neurol 2019; 18(3): 93-8.
Conflict of Interests
=====================
The authors declare no conflict of interest in this study.
|
Hospital payment arrangements to encourage efficiency: the case of Victoria, Australia.
The casemix funding arrangements introduced in Victoria on 1 July 1993 represent a significant departure from the previous approaches to public hospital funding in Australia. They are designed to change the economic incentives on hospitals by linking payment to the number and case complexity of patients treated. The new funding arrangements include a combination of fixed and variable payments to hospitals for inpatient services. Outpatient services remain funded on a historical basis. Special payments are made for teaching and research functions. Total payments to hospitals are capped through operation of an 'Additional Throughput Pool' which allows price to fluctuate inversely with volume to ensure an expenditure limit. Because of operations of specific conditions on the Additional Throughput Pool, hospitals were given an incentive to reduce waiting lists. Despite the success in reducing waiting lists and budgets, there are a number of problems with the casemix approach including both technical issues (how are payment rates to be updated?; the failure to address problems of capital) and ethical issues. These are discussed in the paper. |
Q:
Como apagar informação no BD usando DataGridView?
alguém sabe me informar qual comando devo colocar para apagar do Banco de dados usando a informação da celular selecionada?
Coloquei assim:
SQLcmd.CommandText = ("DELETE FROM usuario WHERE nome = '" & DataGridView3.IsCurrentCellInEditMode & "' ")
mas pelo visto não deu certo....
A:
Para pegar o valor do dataGrid seria apenas isso:
var valordacelular = DataGridView3.CurrentCell.Value;
Não é indicado você concatenar o valor direto na string do SQL não, abaixo como sua linha iria ficar, mas que não é aconselhável.
SQLcmd.CommandText = ("DELETE FROM usuario WHERE nome = '" & DataGridView3.CurrentCell.Value & "' ");
O correto seria você adicionar parâmetros dentro da String assim:
SQLcmd.CommandText = ("DELETE FROM usuario WHERE nome = @param1");
SQLcmd.CommandType = CommandType.Text;
SQLcmd.Parameters.Add(new SQLiteParameter("@param1", DataGridView3.CurrentCell.Value));
|
Archives
The Girl in the Black Chemise
She Was Sweet, Silky… And Dangerous
A Frank Novel Of Fallen Angels — And The Men Who Prey Upon Them
From the back:
Is Three A Crowd?
The Girl in the black chemise, Iris, was not housewife material. She was a woman of the twilight. Besides, she was convinced that Tom Grant still loved the utterly beautiful, utterly alluring, utterly wicked Bertha, to whom he had been wed many years.
So Iris let Tom love her, love her all he wanted to. But she refused to marry him. Inevitably, Tom sought solace in the arms of other twilight women; a step which proved fatal. For it threw him once again into the company of his irresistible ex-wife. By all indications, Bertha again was making him her love slave…
But Iris, Iris of the back chemise, suddenly decided to fight for her man and rejoined the fray. Her charms, already too much for Tom, proved just as devastating to Bertha! |
This is a discussion on Karnataka Road Tax, Crack down announced.EDIT: High Court Judgement on Pg 36 attached within The Indian Car Scene, part of the BHP India category; I feel that it is more intensive in KA because of the high tax rates for new cars. The reasoning ...
I feel that it is more intensive in KA because of the high tax rates for new cars. The reasoning that the rto has is that since the tax on new vehicles is high a lot of people will get cars from out of state cheaply and effectively rob the state exchequer of revenue. This leads to this frequent and intensive crack downs on out of state vehicles .
Eventually because of the constant harrasment people will just buy KA registered cars and keep filling the governments coffers
I feel if only state governments allow private owners to pay annual taxes instead of lifetime taxes, RTO would find less tax evaders and also vehicle owners, we, would be more than willing to pay taxes at the State of our residence.
Lifetime taxes are otherwise, a big hundi, you may put money inside but can never get back anything.
What is the reason for not allowing annual taxes? Arent we renewing our insurances annually? Is this so hard for us owners or the Traffic Police to be vigilant that vehicle owners have uptodate paid insurances? Dont we pay so many taxes on an annual basis, property taxes, income taxes, etc?? Whatever be the reason for not having, life time taxes are simply making life miserable for people who have to shift residence quite often.
I feel if only state governments allow private owners to pay annual taxes instead of lifetime taxes, RTO would find less tax evaders and also vehicle owners, we, would be more than willing to pay taxes at the State of our residence.
Lifetime taxes are otherwise, a big hundi, you may put money inside but can never get back anything.
What is the reason for not allowing annual taxes? Arent we renewing our insurances annually? Is this so hard for us owners or the Traffic Police to be vigilant that vehicle owners have uptodate paid insurances? Dont we pay so many taxes on an annual basis, property taxes, income taxes, etc?? Whatever be the reason for not having, life time taxes are simply making life miserable for people who have to shift residence quite often.
+1 to this ! For us software engineers, we have no idea how long we are going to be in one place. And it just doesnt make any sense for people to pay life time taxes wherever we go. The RTO guys can always say that "you can get the reimbursement from the previous state" but how feasible / efficient is that mechanism ? Knowing our government machinery, that would be another do or die battle to get the reimbursement ! And for Karnataka, I seriously dont understand the policy of such high taxes as the roads and simply not upto the mark - makes me think why should I pay the road taxes for such pathetic roads.
Edit: In my first year of job, I was transferred to 3 different states within one year [the 4th one was offered in the next 6 months which I declined] , which means that I need to pay taxes 3 times ! Now that's sick! Thank God I didnt have cash to buy a car itself that time!
If your employer transfers you to another state, aren't they responsible for reimbursing the registration taxes paid in the new state? At least my companies transfer policy covers re-registration reimbursement and they were okay to shell out 2+ Lacs for re-registering my vehicle. But after a few days on Bangalore roads , I decided not to waste my companies money on re-registering in Bangalore since the road infrastructure here does not deserve any tax payment. Isn't it so evidently clear from Bangalore roads that all these high taxes that you pay are simply going to feed some corrupt babus or their kin or their brothel spends?
But to operate it here on my KA-01 license might be cause for trouble, going by all this.
Yes I am on Goa RTO License. With local address.
The Karnataka license should match the car registration is a load of bull given by the scum residing in Karnataka RTO. You can use a license obtained from anywhere to drive or own a car anywhere in the country.
Quote:
Originally Posted by aroop
What does address on the licence have to do with the address in the registration of the vehicle?
It has to do with how smart or dumb you appear to be to the KA RTO.
Quote:
Originally Posted by svsantosh
Having a diff state licence or not has nothing to do with the motor vehicles act, just a easy way to get out a soup,
These are some of the absurdities in this state. The RTO has been such a corrupt institution that anything uttered by anyone, even the peon becomes a law. It has been going on for so long that now no one makes out the difference.
Even a court judgment asking the KA Govt to mend their tax structure fell on deaf years. The court said instead of extorting money from individuals make your tax structure competent to stop people from buying from other states. This state took the easy way out - arm wrestling people in paying up instead.
A friend was involved in a small accident. The car is a KL registered Suzuki Wagon R. There was road work taking place on outer ring road (Bangalore) and a worker suddenly decided to run across the road. The car hit the worker. My friend took him to the hospital to get him treated. The hospital reported the matter to the police and the car was impounded for a night. The documents were also taken. The RTO officials checked the cars road worthiness the next day and returned the car but not the documents. My friend was asked to pay the road tax to get back his papers. This was no bribe. The amount was around Rs. 53000. The road tax was paid and documents returned. The car has been used in Bangalore for over 2 years. My question is; can the RTO confiscate your documents for such reasons? It was my friends bad luck that he was involved in an accident.
Most of my colleagues drive out of state vehicles and have had no trouble at all. The traffic cops pull them over only to verify documents or if they have jumped a light.
I would like to buy a car from Kerala state as the savings are quite a bit. For how long can a drive a out of state car in Karnataka? Will the same thing happen if I were involved in a accident? Sounds like it can.
I would like to buy a car from Kerala state as the savings are quite a bit. For how long can a drive a out of state car in Karnataka? Will the same thing happen if I were involved in a accident? Sounds like it can.
A car registered in one state, before migrating to another, must get an NOC from the home state and also obtain a pro-rata refund of the road tax. The car must then be re-registered in the new state of residence and the pro-rata road tax of that particular state will have to be paid. Else pay the road tax in the current state, obtain NOC from home state and re-register within one year from the date of payment of tax. But usually if road tax is paid, they won't insist on re-registration.
This is the rule for the entire country. Some states may enforce it strictly, some don't. I suppose KA has the highest tax regime in south India, hence don't want to lose revenue precisely in the way you mention.
The same problem arose in the 90's between TN and Pondy. A lot of people bought cars at Pondy to save on tax and used them at Chennai. Beyond a point, all Pondy registered cars were targeted mercilessly to put an end to it.
The same problem arose in the 90's between TN and Pondy. A lot of people bought cars at Pondy to save on tax and used them at Chennai. Beyond a point, all Pondy registered cars were targeted mercilessly to put an end to it.
Now in Karnataka (Bangalore) I see the same thing is happening. I see lots of Imported and luxury car are running around the City with PY reg.
Now obvious reason nor the police or RTO will put hands on them as we can guess who will be the probable owner of this beauty
Now in Karnataka (Bangalore) I see the same thing is happening. I see lots of Imported and luxury car are running around the City with PY reg.
Now obvious reason nor the police or RTO will put hands on them as we can guess who will be the probable owner of this beauty
Tax only on Mango People
Why Bangalore, even in my little Udupi, the few Beemers that are there are all PY registered. There is one Cayenne running without plates for more than 1-2 months. There is one Accord in Manipal on Haryana temporary plates for 2-3 yrs. This guy is even made license plate with the temp numbers!
If a city like Delhi (Mumbai too?) can tolerate the cars from other states without any fuss, why can't Karnataka? The reg is cheaper in Gurgaon than Delhi. So, some people do get it register there. So what? Let them do it. What's such a fuss..
I think it is one way of exhibiting authority. Telling 'outside people' who's the boss. Telling people that when your'e in 'our' land, do as what we say. And Karnataka is not the worst here. There are states in our country which are even more discriminatory.
Yes. I don't understand why each state government thinks of itself as a country and defines its own road tax. I don't mind paying road tax. There has to be something in return. Give us a nice road to drive on.
Paying toll for our highways is another rip off. After one pays such a premium to use the road, you are still held accountable for hitting the person coming on the wrong side of the road. We should be allowed to hit and forget in such situations.
I think it is one way of exhibiting authority. Telling 'outside people' who's the boss. Telling people that when your'e in 'our' land, do as what we say.
It is nothing like that. Even a local guy with outside registration will be caught. The Karnataka government realised few years back that road tax is a cash cow, they can get money for doing nothing. And that people will buy cars no matter how much road tax they levy. So the systematic looting of car buyers started and has been increasing every couple years.
Now let's come to outside cars. When there is significant difference between the road tax of KA and neighboring states, lot of people will indulge in arbitrage. If the RTO does nothing, KA will be full of out-of-state registration cars thanks to high road-tax of KA. Lot of KA residents will buy their cars outside state only to drive it in KA. As we all know, address proof thing can be easily manipulated. That will be a major dent in KA government coffers.
Therefore, they crack down on outside state cars plying in KA. If you can prove you are just passing by, then they can't do much. But if you have local credentials, yet drive a out-of-state vehicle, then you are liable to pay.
I can't believe I am defending the stupid ultra-corrupt KA government, but the fact has to be stated.
Now let's come to outside cars. When there is significant difference between the road tax of KA and neighboring states, lot of people will indulge in arbitrage. If the RTO does nothing, KA will be full of out-of-state registration cars thanks to high road-tax of KA. Lot of KA residents will buy their cars outside state only to drive it in KA. As we all know, address proof thing can be easily manipulated. That will be a major dent in KA government coffers.
Exactly what happened in TN. I remember how people use to buy vehicles from Pondy and use it in chennai. I use to see a lot of PY registration until one day. Think similar crack down helped them.
And I agree it is fact. But I would also love to see a pan-india road tax. With all the NH going to made toll and may be SH too, let them atleast releive us from this pain of transferring Road Tax between states.
I suppose KA has the highest tax regime in south India, hence don't want to lose revenue precisely in the way you mention.
A small addition my friend, KA (Bangalore for sure) has the highest road tax in the whole of India. As you mentioned, why would they want to lose this huge revenue?
I got caught 2 times before I decided to pay the road tax of my bike (KL) in 2003 and after that, never till now. It's strange! Maybe they know from your confidence that you have all the papers ready |
Andrej Ciesielski will climb anything, and he usually gets away with it. He’s already added the third-tallest building in Shanghai and one of the great pyramids of Giza to his list, while evading security guards and local authorities. But during a visit to Tokyo, Ciesielski’s luck ran out.
In Japan to see (and climb) the sights, he eventually made his way to the Rainbow Bridge, a 2,618-foot long suspension bridge finished in 1993, the towers of which rise 413 feet above the water. In a city filled with visual stunners, it’s one of the most recognizable landmarks for its towers, which are often illuminated with spectral colors overnight.
Tokyo's Rainbow Bridget By Gussisaurio (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0) or GFDL (http://www.gnu.org/copyleft/fdl.html)], via Wikimedia Commons
Naturally, Ciesielski wanted to climb the thing. He tells Inverse he made the decision on what he thought would be his final day in the city.
The Rainbow Bridge is far from the tallest thing he’s climbed, and he reached the top, no problem. But when he and a companion climbed down, the police were waiting. “I left Japan with good and bad memories,” Ciesielski tells Inverse. “We both got caught by the police and we were arrested for 10 days in Japanese jail.”
During his incarceration, Ciesielski said he had no contact with anyone in his family. Even after his release, he had to wait for a month before he could leave the country — but importantly, he made it out with the footage – or at least some of it.
On Instagram, Ciesielski told his story again, and thanked one of his friends, who found out he was arrested and notified his family.
He says he got off easy, but he also warned others not to attempt the feat. “Please don’t try to repeat this action because in a bad case you can face 6 months [in] prison,” he wrote on Instagram.
Check out the illegal climb below.
Here are a few more photos he sent us: |
Track-type machines, such as excavators, bulldozers, track-loaders and skid-steer loaders, are used in a variety of applications. Generally speaking, these machines have an operator station, a power source, an undercarriage and a pair of track systems laterally flanking the machine. Each track system may include a roller frame positioned along a lengthwise-extending direction of the track-type machine, a drive sprocket mounted on the roller frame and rotatably driven by the power source, and one or more idler wheels also mounted for rotation on the roller frame. An endless track that circumscribes the drive sprocket and the one or more idler wheels. The endless track is engaged by the drive sprocket so the power source can drive the endless track over the drive sprocket and the idler wheels and propel the track type-machine over a work surface. To further separate the endless track from the roller frame and cause the endless track to have a desired shape for driving the track-type machine, known track systems typically include one or more upper and/or lower track roller assemblies. These track roller assemblies are located along the lengthwise-extending axis of the roller frame between the drive sprocket and the one or more idler wheels to force the endless track along the desired path.
The track roller assemblies may include a roller shaft mounted to the roller frame or to a support member to the track roller assembly, and a track roller having a through-bore may be rotatably mounted on the roller shaft. The roller shaft may be fixed in place and the track roller may rotate about the roller shaft when the track-type machine is in motion and the endless track passes over the track roller assembly. The track-type machine may operate in adverse environments wherein the track roller assemblies may be exposed to abrasive mixtures of water, dirt, sand, rock or other materials, and even chemical elements. These contaminants may enter a space between the roller shaft and the through-bore of the track roller and lead to wear of the surfaces of the roller shaft and the through-bore. Accordingly, track roller seals may be utilized to prevent the afore-mentioned contaminants from entering the space between the roller shaft and the through-bore, and to retain lubricant within the space between the roller shaft and the through-bore to minimize friction and wear in the track roller assembly.
Track roller seals of the type generally described above are known in the art. For example, U.S. Pat. No. 6,568,684 issued to Bedford et al. on May 27, 2003, and entitled “Method of Forming a Seal Assembly Around a Shaft,” discloses a method for forming a seal assembly around a shaft. More specifically, a track roller seal utilizing two seal members engaging at a seal face limits ingress of contaminants into the track roller and mitigates leakage of lubricant from the track roller. |
New-generation liquor store, Five Guys slated for Monroeville
Lillian DeDomenic | For The Times Express - Former site of the Roth Carpet store and soon-to-be home of a wine and spirits store in Monroeville at the intersection of William Penn Highway and Northern Pike.
Lillian DeDomenic | For The Times Express - Former site of the Roth Carpet store and soon-to-be home of a wine and spirits store in Monroeville at the intersection of William Penn Highway and Northern Pike.
Daily Photo Galleries
A new-look liquor store and a burger shop are scheduled to open on Monroeville Boulevard on the former Roth Carpet property in coming months.
A Wine & Spirits superstore is expected to open by spring of 2013, said Stacy Kriedeman, spokeswoman for the Pennsylvania Liquor Control Board.
The store will include 8,400 square feet of retail space, which is more than twice the size of the Wines and Spirits on William Penn Highway, Kriedeman said.
The extra space will allow for a larger selection of wine and liquor, as well as a counter in the center of the store where customers can taste wines and liquors, Kriedeman said.
The LCB has not decided if the store on William Penn Highway, which opened in late 1955, will remain open, Kriedeman said.
Opening next door to the new Wine & Spirits will be Five Guys Burger and Fries, which also is expected to open by this spring, said developer Craig Cozza.
In recent years, Five Guys restaurants have established a presence in the Pittsburgh region. Five Guys restaurants have opened in Murrysville, North Huntingdon, Fox Chapel, Tarentum and Hempfield in recent years.
The redevelopment of Roth Carpet is one of a number of real-estate maneuvers in Monroeville performed by Pittsburgh-based Cozza Enterprises — which Cozza heads — over the past six years.
“I think Craig has been an asset to the community,” said Monroeville Mayor Greg Erosenko. “He certainly has helped our local economy, providing good jobs. He's a visionary with his business dealings.”
In 2006, Cozza purchased the Palace Inn at the intersection of Routes 22 and 48 and then sold the property to UPMC.
While he initially was leaning toward transforming the former hotel in to a casino, the project wasn't worth the additional costs involved, he said.
“We already spent millions of dollars gutting the place,” Cozza said. “You have to be ready to evolve and change. At some point the money makes sense.”
He used a portion of the profit to build four stores at the former BP location in the Miracle Mile Shopping Center — Pro Bikes, GNC, AT&T and Elite Runners & Walkers.
Pro Bikes was a pet project for Cozza, who said fellow cyclists have traveled from as far as Altoona to shop there. It also was one of his more difficult projects, because of the environmental risks of developing at a former gas station.
“It was a blighted, ugly property just sitting there, and we figured out a way to make it work environmentally,” he said.
Cozza also was the developer who brought Levin Mattress and Noodles & Co. to the former Electra Lighting location along William Penn Highway.
Kyle Lawson is a staff writer for Trib Total Media. He can be reached at 412-856-7400, ext. 8755, or klawson@tribweb.com.
TribLive commenting policy
You are solely responsible for your comments and by using TribLive.com you agree to our Terms of Service.
We moderate comments. Our goal is to provide substantive commentary for a general readership. By screening submissions, we provide a space where readers can share intelligent and informed commentary that enhances the quality of our news and information.
While most comments will be posted if they are on-topic and not abusive, moderating decisions are subjective. We will make them as carefully and consistently as we can. Because of the volume of reader comments, we cannot review individual moderation decisions with readers.
We value thoughtful comments representing a range of views that make their point quickly and politely. We make an effort to protect discussions from repeated comments either by the same reader or different readers.
We follow the same standards for taste as the daily newspaper. A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING. Don't include URLs to Web sites.
We do not edit comments. They are either approved or deleted. We reserve the right to edit a comment that is quoted or excerpted in an article. In this case, we may fix spelling and punctuation.
We welcome strong opinions and criticism of our work, but we don't want comments to become bogged down with discussions of our policies and we will moderate accordingly.
We appreciate it when readers and people quoted in articles or blog posts point out errors of fact or emphasis and will investigate all assertions. But these suggestions should be sent via e-mail. To avoid distracting other readers, we won't publish comments that suggest a correction. Instead, corrections will be made in a blog post or in an article.
Print Source
Welcome to PrintSource, a division of Trib Total Media.
We have established a veteran team that provides daily and weekly newspaper companies with a comprehensive set of services that include design, print, packaging and delivery of their products, all from one source and location.
Gone are the days when each facet of newspaper printing and delivery had to be outsourced to different companies and venues. Now, PrintSource provides a viable solution with just one phone call.
Digital Sales
We offer a wide variety of traditional and new digital advertising options customized to fit your needs!
Whether you're just starting out, or you've been a keystone in the community for years, our knowledgeable staff can provide you with a customized package including online banners/advertisements, Social Media Marketing (Facebook / Twitter), Website development, Search Engine Optimization, Email Marketing solutions and much more!
Contact your local sales rep today for details, personalized proposal and a meeting to discuss how we can meet your needs. |
" Vim support file to define the syntax selection menu
" This file is normally sourced from menu.vim.
"
" Maintainer: Bram Moolenaar <Bram@vim.org>
" Last Change: 2017 Oct 28
" Define the SetSyn function, used for the Syntax menu entries.
" Set 'filetype' and also 'syntax' if it is manually selected.
fun! SetSyn(name)
if a:name == "fvwm1"
let use_fvwm_1 = 1
let use_fvwm_2 = 0
let name = "fvwm"
elseif a:name == "fvwm2"
let use_fvwm_2 = 1
let use_fvwm_1 = 0
let name = "fvwm"
else
let name = a:name
endif
if !exists("s:syntax_menu_synonly")
exe "set ft=" . name
if exists("g:syntax_manual")
exe "set syn=" . name
endif
else
exe "set syn=" . name
endif
endfun
" <> notation is used here, remove '<' from 'cpoptions'
let s:cpo_save = &cpo
set cpo&vim
" The following menu items are generated by makemenu.vim.
" The Start Of The Syntax Menu
an 50.10.100 &Syntax.AB.A2ps\ config :cal SetSyn("a2ps")<CR>
an 50.10.110 &Syntax.AB.Aap :cal SetSyn("aap")<CR>
an 50.10.120 &Syntax.AB.ABAP/4 :cal SetSyn("abap")<CR>
an 50.10.130 &Syntax.AB.Abaqus :cal SetSyn("abaqus")<CR>
an 50.10.140 &Syntax.AB.ABC\ music\ notation :cal SetSyn("abc")<CR>
an 50.10.150 &Syntax.AB.ABEL :cal SetSyn("abel")<CR>
an 50.10.160 &Syntax.AB.AceDB\ model :cal SetSyn("acedb")<CR>
an 50.10.170 &Syntax.AB.Ada :cal SetSyn("ada")<CR>
an 50.10.180 &Syntax.AB.AfLex :cal SetSyn("aflex")<CR>
an 50.10.190 &Syntax.AB.ALSA\ config :cal SetSyn("alsaconf")<CR>
an 50.10.200 &Syntax.AB.Altera\ AHDL :cal SetSyn("ahdl")<CR>
an 50.10.210 &Syntax.AB.Amiga\ DOS :cal SetSyn("amiga")<CR>
an 50.10.220 &Syntax.AB.AMPL :cal SetSyn("ampl")<CR>
an 50.10.230 &Syntax.AB.Ant\ build\ file :cal SetSyn("ant")<CR>
an 50.10.240 &Syntax.AB.ANTLR :cal SetSyn("antlr")<CR>
an 50.10.250 &Syntax.AB.Apache\ config :cal SetSyn("apache")<CR>
an 50.10.260 &Syntax.AB.Apache-style\ config :cal SetSyn("apachestyle")<CR>
an 50.10.270 &Syntax.AB.Applix\ ELF :cal SetSyn("elf")<CR>
an 50.10.280 &Syntax.AB.APT\ config :cal SetSyn("aptconf")<CR>
an 50.10.290 &Syntax.AB.Arc\ Macro\ Language :cal SetSyn("aml")<CR>
an 50.10.300 &Syntax.AB.Arch\ inventory :cal SetSyn("arch")<CR>
an 50.10.310 &Syntax.AB.Arduino :cal SetSyn("arduino")<CR>
an 50.10.320 &Syntax.AB.ART :cal SetSyn("art")<CR>
an 50.10.330 &Syntax.AB.Ascii\ Doc :cal SetSyn("asciidoc")<CR>
an 50.10.340 &Syntax.AB.ASP\ with\ VBScript :cal SetSyn("aspvbs")<CR>
an 50.10.350 &Syntax.AB.ASP\ with\ Perl :cal SetSyn("aspperl")<CR>
an 50.10.360 &Syntax.AB.Assembly.680x0 :cal SetSyn("asm68k")<CR>
an 50.10.370 &Syntax.AB.Assembly.AVR :cal SetSyn("avra")<CR>
an 50.10.380 &Syntax.AB.Assembly.Flat :cal SetSyn("fasm")<CR>
an 50.10.390 &Syntax.AB.Assembly.GNU :cal SetSyn("asm")<CR>
an 50.10.400 &Syntax.AB.Assembly.GNU\ H-8300 :cal SetSyn("asmh8300")<CR>
an 50.10.410 &Syntax.AB.Assembly.Intel\ IA-64 :cal SetSyn("ia64")<CR>
an 50.10.420 &Syntax.AB.Assembly.Microsoft :cal SetSyn("masm")<CR>
an 50.10.430 &Syntax.AB.Assembly.Netwide :cal SetSyn("nasm")<CR>
an 50.10.440 &Syntax.AB.Assembly.PIC :cal SetSyn("pic")<CR>
an 50.10.450 &Syntax.AB.Assembly.Turbo :cal SetSyn("tasm")<CR>
an 50.10.460 &Syntax.AB.Assembly.VAX\ Macro\ Assembly :cal SetSyn("vmasm")<CR>
an 50.10.470 &Syntax.AB.Assembly.Z-80 :cal SetSyn("z8a")<CR>
an 50.10.480 &Syntax.AB.Assembly.xa\ 6502\ cross\ assember :cal SetSyn("a65")<CR>
an 50.10.490 &Syntax.AB.ASN\.1 :cal SetSyn("asn")<CR>
an 50.10.500 &Syntax.AB.Asterisk\ config :cal SetSyn("asterisk")<CR>
an 50.10.510 &Syntax.AB.Asterisk\ voicemail\ config :cal SetSyn("asteriskvm")<CR>
an 50.10.520 &Syntax.AB.Atlas :cal SetSyn("atlas")<CR>
an 50.10.530 &Syntax.AB.Autodoc :cal SetSyn("autodoc")<CR>
an 50.10.540 &Syntax.AB.AutoHotKey :cal SetSyn("autohotkey")<CR>
an 50.10.550 &Syntax.AB.AutoIt :cal SetSyn("autoit")<CR>
an 50.10.560 &Syntax.AB.Automake :cal SetSyn("automake")<CR>
an 50.10.570 &Syntax.AB.Avenue :cal SetSyn("ave")<CR>
an 50.10.580 &Syntax.AB.Awk :cal SetSyn("awk")<CR>
an 50.10.590 &Syntax.AB.AYacc :cal SetSyn("ayacc")<CR>
an 50.10.610 &Syntax.AB.B :cal SetSyn("b")<CR>
an 50.10.620 &Syntax.AB.Baan :cal SetSyn("baan")<CR>
an 50.10.630 &Syntax.AB.Basic.FreeBasic :cal SetSyn("freebasic")<CR>
an 50.10.640 &Syntax.AB.Basic.IBasic :cal SetSyn("ibasic")<CR>
an 50.10.650 &Syntax.AB.Basic.QBasic :cal SetSyn("basic")<CR>
an 50.10.660 &Syntax.AB.Basic.Visual\ Basic :cal SetSyn("vb")<CR>
an 50.10.670 &Syntax.AB.Bazaar\ commit\ file :cal SetSyn("bzr")<CR>
an 50.10.680 &Syntax.AB.Bazel :cal SetSyn("bzl")<CR>
an 50.10.690 &Syntax.AB.BC\ calculator :cal SetSyn("bc")<CR>
an 50.10.700 &Syntax.AB.BDF\ font :cal SetSyn("bdf")<CR>
an 50.10.710 &Syntax.AB.BibTeX.Bibliography\ database :cal SetSyn("bib")<CR>
an 50.10.720 &Syntax.AB.BibTeX.Bibliography\ Style :cal SetSyn("bst")<CR>
an 50.10.730 &Syntax.AB.BIND.BIND\ config :cal SetSyn("named")<CR>
an 50.10.740 &Syntax.AB.BIND.BIND\ zone :cal SetSyn("bindzone")<CR>
an 50.10.750 &Syntax.AB.Blank :cal SetSyn("blank")<CR>
an 50.20.100 &Syntax.C.C :cal SetSyn("c")<CR>
an 50.20.110 &Syntax.C.C++ :cal SetSyn("cpp")<CR>
an 50.20.120 &Syntax.C.C# :cal SetSyn("cs")<CR>
an 50.20.130 &Syntax.C.Cabal\ Haskell\ build\ file :cal SetSyn("cabal")<CR>
an 50.20.140 &Syntax.C.Calendar :cal SetSyn("calendar")<CR>
an 50.20.150 &Syntax.C.Cascading\ Style\ Sheets :cal SetSyn("css")<CR>
an 50.20.160 &Syntax.C.CDL :cal SetSyn("cdl")<CR>
an 50.20.170 &Syntax.C.Cdrdao\ TOC :cal SetSyn("cdrtoc")<CR>
an 50.20.180 &Syntax.C.Cdrdao\ config :cal SetSyn("cdrdaoconf")<CR>
an 50.20.190 &Syntax.C.Century\ Term :cal SetSyn("cterm")<CR>
an 50.20.200 &Syntax.C.CH\ script :cal SetSyn("ch")<CR>
an 50.20.210 &Syntax.C.ChaiScript :cal SetSyn("chaiscript")<CR>
an 50.20.220 &Syntax.C.ChangeLog :cal SetSyn("changelog")<CR>
an 50.20.230 &Syntax.C.Cheetah\ template :cal SetSyn("cheetah")<CR>
an 50.20.240 &Syntax.C.CHILL :cal SetSyn("chill")<CR>
an 50.20.250 &Syntax.C.ChordPro :cal SetSyn("chordpro")<CR>
an 50.20.260 &Syntax.C.Clean :cal SetSyn("clean")<CR>
an 50.20.270 &Syntax.C.Clever :cal SetSyn("cl")<CR>
an 50.20.280 &Syntax.C.Clipper :cal SetSyn("clipper")<CR>
an 50.20.290 &Syntax.C.Clojure :cal SetSyn("clojure")<CR>
an 50.20.300 &Syntax.C.Cmake :cal SetSyn("cmake")<CR>
an 50.20.310 &Syntax.C.Cmod :cal SetSyn("cmod")<CR>
an 50.20.320 &Syntax.C.Cmusrc :cal SetSyn("cmusrc")<CR>
an 50.20.330 &Syntax.C.Cobol :cal SetSyn("cobol")<CR>
an 50.20.340 &Syntax.C.Coco/R :cal SetSyn("coco")<CR>
an 50.20.350 &Syntax.C.Cold\ Fusion :cal SetSyn("cf")<CR>
an 50.20.360 &Syntax.C.Conary\ Recipe :cal SetSyn("conaryrecipe")<CR>
an 50.20.370 &Syntax.C.Config.Cfg\ Config\ file :cal SetSyn("cfg")<CR>
an 50.20.380 &Syntax.C.Config.Configure\.in :cal SetSyn("config")<CR>
an 50.20.390 &Syntax.C.Config.Generic\ Config\ file :cal SetSyn("conf")<CR>
an 50.20.400 &Syntax.C.CRM114 :cal SetSyn("crm")<CR>
an 50.20.410 &Syntax.C.Crontab :cal SetSyn("crontab")<CR>
an 50.20.420 &Syntax.C.CSDL :cal SetSyn("csdl")<CR>
an 50.20.430 &Syntax.C.CSP :cal SetSyn("csp")<CR>
an 50.20.440 &Syntax.C.Ctrl-H :cal SetSyn("ctrlh")<CR>
an 50.20.450 &Syntax.C.Cucumber :cal SetSyn("cucumber")<CR>
an 50.20.460 &Syntax.C.CUDA :cal SetSyn("cuda")<CR>
an 50.20.470 &Syntax.C.CUPL.CUPL :cal SetSyn("cupl")<CR>
an 50.20.480 &Syntax.C.CUPL.Simulation :cal SetSyn("cuplsim")<CR>
an 50.20.490 &Syntax.C.CVS.commit\ file :cal SetSyn("cvs")<CR>
an 50.20.500 &Syntax.C.CVS.cvsrc :cal SetSyn("cvsrc")<CR>
an 50.20.510 &Syntax.C.Cyn++ :cal SetSyn("cynpp")<CR>
an 50.20.520 &Syntax.C.Cynlib :cal SetSyn("cynlib")<CR>
an 50.30.100 &Syntax.DE.D :cal SetSyn("d")<CR>
an 50.30.110 &Syntax.DE.Datascript :cal SetSyn("datascript")<CR>
an 50.30.120 &Syntax.DE.Debian.Debian\ ChangeLog :cal SetSyn("debchangelog")<CR>
an 50.30.130 &Syntax.DE.Debian.Debian\ Control :cal SetSyn("debcontrol")<CR>
an 50.30.140 &Syntax.DE.Debian.Debian\ Copyright :cal SetSyn("debcopyright")<CR>
an 50.30.150 &Syntax.DE.Debian.Debian\ Sources\.list :cal SetSyn("debsources")<CR>
an 50.30.160 &Syntax.DE.Denyhosts :cal SetSyn("denyhosts")<CR>
an 50.30.170 &Syntax.DE.Desktop :cal SetSyn("desktop")<CR>
an 50.30.180 &Syntax.DE.Dict\ config :cal SetSyn("dictconf")<CR>
an 50.30.190 &Syntax.DE.Dictd\ config :cal SetSyn("dictdconf")<CR>
an 50.30.200 &Syntax.DE.Diff :cal SetSyn("diff")<CR>
an 50.30.210 &Syntax.DE.Digital\ Command\ Lang :cal SetSyn("dcl")<CR>
an 50.30.220 &Syntax.DE.Dircolors :cal SetSyn("dircolors")<CR>
an 50.30.230 &Syntax.DE.Dirpager :cal SetSyn("dirpager")<CR>
an 50.30.240 &Syntax.DE.Django\ template :cal SetSyn("django")<CR>
an 50.30.250 &Syntax.DE.DNS/BIND\ zone :cal SetSyn("bindzone")<CR>
an 50.30.260 &Syntax.DE.Dnsmasq\ config :cal SetSyn("dnsmasq")<CR>
an 50.30.270 &Syntax.DE.DocBook.auto-detect :cal SetSyn("docbk")<CR>
an 50.30.280 &Syntax.DE.DocBook.SGML :cal SetSyn("docbksgml")<CR>
an 50.30.290 &Syntax.DE.DocBook.XML :cal SetSyn("docbkxml")<CR>
an 50.30.300 &Syntax.DE.Dockerfile :cal SetSyn("dockerfile")<CR>
an 50.30.310 &Syntax.DE.Dot :cal SetSyn("dot")<CR>
an 50.30.320 &Syntax.DE.Doxygen.C\ with\ doxygen :cal SetSyn("c.doxygen")<CR>
an 50.30.330 &Syntax.DE.Doxygen.C++\ with\ doxygen :cal SetSyn("cpp.doxygen")<CR>
an 50.30.340 &Syntax.DE.Doxygen.IDL\ with\ doxygen :cal SetSyn("idl.doxygen")<CR>
an 50.30.350 &Syntax.DE.Doxygen.Java\ with\ doxygen :cal SetSyn("java.doxygen")<CR>
an 50.30.360 &Syntax.DE.Doxygen.DataScript\ with\ doxygen :cal SetSyn("datascript.doxygen")<CR>
an 50.30.370 &Syntax.DE.Dracula :cal SetSyn("dracula")<CR>
an 50.30.380 &Syntax.DE.DSSSL :cal SetSyn("dsl")<CR>
an 50.30.390 &Syntax.DE.DTD :cal SetSyn("dtd")<CR>
an 50.30.400 &Syntax.DE.DTML\ (Zope) :cal SetSyn("dtml")<CR>
an 50.30.410 &Syntax.DE.DTrace :cal SetSyn("dtrace")<CR>
an 50.30.420 &Syntax.DE.Dts/dtsi :cal SetSyn("dts")<CR>
an 50.30.430 &Syntax.DE.Dylan.Dylan :cal SetSyn("dylan")<CR>
an 50.30.440 &Syntax.DE.Dylan.Dylan\ interface :cal SetSyn("dylanintr")<CR>
an 50.30.450 &Syntax.DE.Dylan.Dylan\ lid :cal SetSyn("dylanlid")<CR>
an 50.30.470 &Syntax.DE.EDIF :cal SetSyn("edif")<CR>
an 50.30.480 &Syntax.DE.Eiffel :cal SetSyn("eiffel")<CR>
an 50.30.490 &Syntax.DE.Elinks\ config :cal SetSyn("elinks")<CR>
an 50.30.500 &Syntax.DE.Elm\ filter\ rules :cal SetSyn("elmfilt")<CR>
an 50.30.510 &Syntax.DE.Embedix\ Component\ Description :cal SetSyn("ecd")<CR>
an 50.30.520 &Syntax.DE.ERicsson\ LANGuage :cal SetSyn("erlang")<CR>
an 50.30.530 &Syntax.DE.ESMTP\ rc :cal SetSyn("esmtprc")<CR>
an 50.30.540 &Syntax.DE.ESQL-C :cal SetSyn("esqlc")<CR>
an 50.30.550 &Syntax.DE.Essbase\ script :cal SetSyn("csc")<CR>
an 50.30.560 &Syntax.DE.Esterel :cal SetSyn("esterel")<CR>
an 50.30.570 &Syntax.DE.Eterm\ config :cal SetSyn("eterm")<CR>
an 50.30.580 &Syntax.DE.Euphoria\ 3 :cal SetSyn("euphoria3")<CR>
an 50.30.590 &Syntax.DE.Euphoria\ 4 :cal SetSyn("euphoria4")<CR>
an 50.30.600 &Syntax.DE.Eviews :cal SetSyn("eviews")<CR>
an 50.30.610 &Syntax.DE.Exim\ conf :cal SetSyn("exim")<CR>
an 50.30.620 &Syntax.DE.Expect :cal SetSyn("expect")<CR>
an 50.30.630 &Syntax.DE.Exports :cal SetSyn("exports")<CR>
an 50.40.100 &Syntax.FG.Falcon :cal SetSyn("falcon")<CR>
an 50.40.110 &Syntax.FG.Fantom :cal SetSyn("fan")<CR>
an 50.40.120 &Syntax.FG.Fetchmail :cal SetSyn("fetchmail")<CR>
an 50.40.130 &Syntax.FG.FlexWiki :cal SetSyn("flexwiki")<CR>
an 50.40.140 &Syntax.FG.Focus\ Executable :cal SetSyn("focexec")<CR>
an 50.40.150 &Syntax.FG.Focus\ Master :cal SetSyn("master")<CR>
an 50.40.160 &Syntax.FG.FORM :cal SetSyn("form")<CR>
an 50.40.170 &Syntax.FG.Forth :cal SetSyn("forth")<CR>
an 50.40.180 &Syntax.FG.Fortran :cal SetSyn("fortran")<CR>
an 50.40.190 &Syntax.FG.FoxPro :cal SetSyn("foxpro")<CR>
an 50.40.200 &Syntax.FG.FrameScript :cal SetSyn("framescript")<CR>
an 50.40.210 &Syntax.FG.Fstab :cal SetSyn("fstab")<CR>
an 50.40.220 &Syntax.FG.Fvwm.Fvwm\ configuration :cal SetSyn("fvwm1")<CR>
an 50.40.230 &Syntax.FG.Fvwm.Fvwm2\ configuration :cal SetSyn("fvwm2")<CR>
an 50.40.240 &Syntax.FG.Fvwm.Fvwm2\ configuration\ with\ M4 :cal SetSyn("fvwm2m4")<CR>
an 50.40.260 &Syntax.FG.GDB\ command\ file :cal SetSyn("gdb")<CR>
an 50.40.270 &Syntax.FG.GDMO :cal SetSyn("gdmo")<CR>
an 50.40.280 &Syntax.FG.Gedcom :cal SetSyn("gedcom")<CR>
an 50.40.290 &Syntax.FG.Git.Output :cal SetSyn("git")<CR>
an 50.40.300 &Syntax.FG.Git.Commit :cal SetSyn("gitcommit")<CR>
an 50.40.310 &Syntax.FG.Git.Config :cal SetSyn("gitconfig")<CR>
an 50.40.320 &Syntax.FG.Git.Rebase :cal SetSyn("gitrebase")<CR>
an 50.40.330 &Syntax.FG.Git.Send\ Email :cal SetSyn("gitsendemail")<CR>
an 50.40.340 &Syntax.FG.Gitolite :cal SetSyn("gitolite")<CR>
an 50.40.350 &Syntax.FG.Gkrellmrc :cal SetSyn("gkrellmrc")<CR>
an 50.40.360 &Syntax.FG.Gnash :cal SetSyn("gnash")<CR>
an 50.40.370 &Syntax.FG.Go :cal SetSyn("go")<CR>
an 50.40.380 &Syntax.FG.Godoc :cal SetSyn("godoc")<CR>
an 50.40.390 &Syntax.FG.GP :cal SetSyn("gp")<CR>
an 50.40.400 &Syntax.FG.GPG :cal SetSyn("gpg")<CR>
an 50.40.410 &Syntax.FG.Grof :cal SetSyn("gprof")<CR>
an 50.40.420 &Syntax.FG.Group\ file :cal SetSyn("group")<CR>
an 50.40.430 &Syntax.FG.Grub :cal SetSyn("grub")<CR>
an 50.40.440 &Syntax.FG.GNU\ Server\ Pages :cal SetSyn("gsp")<CR>
an 50.40.450 &Syntax.FG.GNUplot :cal SetSyn("gnuplot")<CR>
an 50.40.460 &Syntax.FG.GrADS\ scripts :cal SetSyn("grads")<CR>
an 50.40.470 &Syntax.FG.Gretl :cal SetSyn("gretl")<CR>
an 50.40.480 &Syntax.FG.Groff :cal SetSyn("groff")<CR>
an 50.40.490 &Syntax.FG.Groovy :cal SetSyn("groovy")<CR>
an 50.40.500 &Syntax.FG.GTKrc :cal SetSyn("gtkrc")<CR>
an 50.50.100 &Syntax.HIJK.Haml :cal SetSyn("haml")<CR>
an 50.50.110 &Syntax.HIJK.Hamster :cal SetSyn("hamster")<CR>
an 50.50.120 &Syntax.HIJK.Haskell.Haskell :cal SetSyn("haskell")<CR>
an 50.50.130 &Syntax.HIJK.Haskell.Haskell-c2hs :cal SetSyn("chaskell")<CR>
an 50.50.140 &Syntax.HIJK.Haskell.Haskell-literate :cal SetSyn("lhaskell")<CR>
an 50.50.150 &Syntax.HIJK.HASTE :cal SetSyn("haste")<CR>
an 50.50.160 &Syntax.HIJK.HASTE\ preproc :cal SetSyn("hastepreproc")<CR>
an 50.50.170 &Syntax.HIJK.Hercules :cal SetSyn("hercules")<CR>
an 50.50.180 &Syntax.HIJK.Hex\ dump.XXD :cal SetSyn("xxd")<CR>
an 50.50.190 &Syntax.HIJK.Hex\ dump.Intel\ MCS51 :cal SetSyn("hex")<CR>
an 50.50.200 &Syntax.HIJK.Hg\ commit :cal SetSyn("hgcommit")<CR>
an 50.50.210 &Syntax.HIJK.HTML.HTML :cal SetSyn("html")<CR>
an 50.50.220 &Syntax.HIJK.HTML.HTML\ with\ M4 :cal SetSyn("htmlm4")<CR>
an 50.50.230 &Syntax.HIJK.HTML.HTML\ with\ Ruby\ (eRuby) :cal SetSyn("eruby")<CR>
an 50.50.240 &Syntax.HIJK.HTML.Cheetah\ HTML\ template :cal SetSyn("htmlcheetah")<CR>
an 50.50.250 &Syntax.HIJK.HTML.Django\ HTML\ template :cal SetSyn("htmldjango")<CR>
an 50.50.260 &Syntax.HIJK.HTML.HTML/OS :cal SetSyn("htmlos")<CR>
an 50.50.270 &Syntax.HIJK.HTML.XHTML :cal SetSyn("xhtml")<CR>
an 50.50.280 &Syntax.HIJK.Host\.conf :cal SetSyn("hostconf")<CR>
an 50.50.290 &Syntax.HIJK.Hosts\ access :cal SetSyn("hostsaccess")<CR>
an 50.50.300 &Syntax.HIJK.Hyper\ Builder :cal SetSyn("hb")<CR>
an 50.50.320 &Syntax.HIJK.Icewm\ menu :cal SetSyn("icemenu")<CR>
an 50.50.330 &Syntax.HIJK.Icon :cal SetSyn("icon")<CR>
an 50.50.340 &Syntax.HIJK.IDL\Generic\ IDL :cal SetSyn("idl")<CR>
an 50.50.350 &Syntax.HIJK.IDL\Microsoft\ IDL :cal SetSyn("msidl")<CR>
an 50.50.360 &Syntax.HIJK.Indent\ profile :cal SetSyn("indent")<CR>
an 50.50.370 &Syntax.HIJK.Inform :cal SetSyn("inform")<CR>
an 50.50.380 &Syntax.HIJK.Informix\ 4GL :cal SetSyn("fgl")<CR>
an 50.50.390 &Syntax.HIJK.Initng :cal SetSyn("initng")<CR>
an 50.50.400 &Syntax.HIJK.Inittab :cal SetSyn("inittab")<CR>
an 50.50.410 &Syntax.HIJK.Inno\ setup :cal SetSyn("iss")<CR>
an 50.50.420 &Syntax.HIJK.Innovation\ Data\ Processing.Upstream\ dat :cal SetSyn("upstreamdat")<CR>
an 50.50.430 &Syntax.HIJK.Innovation\ Data\ Processing.Upstream\ log :cal SetSyn("upstreamlog")<CR>
an 50.50.440 &Syntax.HIJK.Innovation\ Data\ Processing.Upstream\ rpt :cal SetSyn("upstreamrpt")<CR>
an 50.50.450 &Syntax.HIJK.Innovation\ Data\ Processing.Upstream\ Install\ log :cal SetSyn("upstreaminstalllog")<CR>
an 50.50.460 &Syntax.HIJK.Innovation\ Data\ Processing.Usserver\ log :cal SetSyn("usserverlog")<CR>
an 50.50.470 &Syntax.HIJK.Innovation\ Data\ Processing.USW2KAgt\ log :cal SetSyn("usw2kagtlog")<CR>
an 50.50.480 &Syntax.HIJK.InstallShield\ script :cal SetSyn("ishd")<CR>
an 50.50.490 &Syntax.HIJK.Interactive\ Data\ Lang :cal SetSyn("idlang")<CR>
an 50.50.500 &Syntax.HIJK.IPfilter :cal SetSyn("ipfilter")<CR>
an 50.50.520 &Syntax.HIJK.J :cal SetSyn("j")<CR>
an 50.50.530 &Syntax.HIJK.JAL :cal SetSyn("jal")<CR>
an 50.50.540 &Syntax.HIJK.JAM :cal SetSyn("jam")<CR>
an 50.50.550 &Syntax.HIJK.Jargon :cal SetSyn("jargon")<CR>
an 50.50.560 &Syntax.HIJK.Java.Java :cal SetSyn("java")<CR>
an 50.50.570 &Syntax.HIJK.Java.JavaCC :cal SetSyn("javacc")<CR>
an 50.50.580 &Syntax.HIJK.Java.Java\ Server\ Pages :cal SetSyn("jsp")<CR>
an 50.50.590 &Syntax.HIJK.Java.Java\ Properties :cal SetSyn("jproperties")<CR>
an 50.50.600 &Syntax.HIJK.JavaScript :cal SetSyn("javascript")<CR>
an 50.50.610 &Syntax.HIJK.Jess :cal SetSyn("jess")<CR>
an 50.50.620 &Syntax.HIJK.Jgraph :cal SetSyn("jgraph")<CR>
an 50.50.630 &Syntax.HIJK.Jovial :cal SetSyn("jovial")<CR>
an 50.50.640 &Syntax.HIJK.JSON :cal SetSyn("json")<CR>
an 50.50.660 &Syntax.HIJK.Kconfig :cal SetSyn("kconfig")<CR>
an 50.50.670 &Syntax.HIJK.KDE\ script :cal SetSyn("kscript")<CR>
an 50.50.680 &Syntax.HIJK.Kimwitu++ :cal SetSyn("kwt")<CR>
an 50.50.690 &Syntax.HIJK.Kivy :cal SetSyn("kivy")<CR>
an 50.50.700 &Syntax.HIJK.KixTart :cal SetSyn("kix")<CR>
an 50.60.100 &Syntax.L.Lace :cal SetSyn("lace")<CR>
an 50.60.110 &Syntax.L.LamdaProlog :cal SetSyn("lprolog")<CR>
an 50.60.120 &Syntax.L.Latte :cal SetSyn("latte")<CR>
an 50.60.130 &Syntax.L.Ld\ script :cal SetSyn("ld")<CR>
an 50.60.140 &Syntax.L.LDAP.LDIF :cal SetSyn("ldif")<CR>
an 50.60.150 &Syntax.L.LDAP.Configuration :cal SetSyn("ldapconf")<CR>
an 50.60.160 &Syntax.L.Less :cal SetSyn("less")<CR>
an 50.60.170 &Syntax.L.Lex :cal SetSyn("lex")<CR>
an 50.60.180 &Syntax.L.LFTP\ config :cal SetSyn("lftp")<CR>
an 50.60.190 &Syntax.L.Libao :cal SetSyn("libao")<CR>
an 50.60.200 &Syntax.L.LifeLines\ script :cal SetSyn("lifelines")<CR>
an 50.60.210 &Syntax.L.Lilo :cal SetSyn("lilo")<CR>
an 50.60.220 &Syntax.L.Limits\ config :cal SetSyn("limits")<CR>
an 50.60.230 &Syntax.L.Linden\ scripting :cal SetSyn("lsl")<CR>
an 50.60.240 &Syntax.L.Liquid :cal SetSyn("liquid")<CR>
an 50.60.250 &Syntax.L.Lisp :cal SetSyn("lisp")<CR>
an 50.60.260 &Syntax.L.Lite :cal SetSyn("lite")<CR>
an 50.60.270 &Syntax.L.LiteStep\ RC :cal SetSyn("litestep")<CR>
an 50.60.280 &Syntax.L.Locale\ Input :cal SetSyn("fdcc")<CR>
an 50.60.290 &Syntax.L.Login\.access :cal SetSyn("loginaccess")<CR>
an 50.60.300 &Syntax.L.Login\.defs :cal SetSyn("logindefs")<CR>
an 50.60.310 &Syntax.L.Logtalk :cal SetSyn("logtalk")<CR>
an 50.60.320 &Syntax.L.LOTOS :cal SetSyn("lotos")<CR>
an 50.60.330 &Syntax.L.LotusScript :cal SetSyn("lscript")<CR>
an 50.60.340 &Syntax.L.Lout :cal SetSyn("lout")<CR>
an 50.60.350 &Syntax.L.LPC :cal SetSyn("lpc")<CR>
an 50.60.360 &Syntax.L.Lua :cal SetSyn("lua")<CR>
an 50.60.370 &Syntax.L.Lynx\ Style :cal SetSyn("lss")<CR>
an 50.60.380 &Syntax.L.Lynx\ config :cal SetSyn("lynx")<CR>
an 50.70.100 &Syntax.M.M4 :cal SetSyn("m4")<CR>
an 50.70.110 &Syntax.M.MaGic\ Point :cal SetSyn("mgp")<CR>
an 50.70.120 &Syntax.M.Mail :cal SetSyn("mail")<CR>
an 50.70.130 &Syntax.M.Mail\ aliases :cal SetSyn("mailaliases")<CR>
an 50.70.140 &Syntax.M.Mailcap :cal SetSyn("mailcap")<CR>
an 50.70.150 &Syntax.M.Mallard :cal SetSyn("mallard")<CR>
an 50.70.160 &Syntax.M.Makefile :cal SetSyn("make")<CR>
an 50.70.170 &Syntax.M.MakeIndex :cal SetSyn("ist")<CR>
an 50.70.180 &Syntax.M.Man\ page :cal SetSyn("man")<CR>
an 50.70.190 &Syntax.M.Man\.conf :cal SetSyn("manconf")<CR>
an 50.70.200 &Syntax.M.Maple\ V :cal SetSyn("maple")<CR>
an 50.70.210 &Syntax.M.Markdown :cal SetSyn("markdown")<CR>
an 50.70.220 &Syntax.M.Markdown\ with\ R\ statements :cal SetSyn("rmd")<CR>
an 50.70.230 &Syntax.M.Mason :cal SetSyn("mason")<CR>
an 50.70.240 &Syntax.M.Mathematica :cal SetSyn("mma")<CR>
an 50.70.250 &Syntax.M.Matlab :cal SetSyn("matlab")<CR>
an 50.70.260 &Syntax.M.Maxima :cal SetSyn("maxima")<CR>
an 50.70.270 &Syntax.M.MEL\ (for\ Maya) :cal SetSyn("mel")<CR>
an 50.70.280 &Syntax.M.Messages\ (/var/log) :cal SetSyn("messages")<CR>
an 50.70.290 &Syntax.M.Metafont :cal SetSyn("mf")<CR>
an 50.70.300 &Syntax.M.MetaPost :cal SetSyn("mp")<CR>
an 50.70.310 &Syntax.M.MGL :cal SetSyn("mgl")<CR>
an 50.70.320 &Syntax.M.MIX :cal SetSyn("mix")<CR>
an 50.70.330 &Syntax.M.MMIX :cal SetSyn("mmix")<CR>
an 50.70.340 &Syntax.M.Modconf :cal SetSyn("modconf")<CR>
an 50.70.350 &Syntax.M.Model :cal SetSyn("model")<CR>
an 50.70.360 &Syntax.M.Modsim\ III :cal SetSyn("modsim3")<CR>
an 50.70.370 &Syntax.M.Modula\ 2 :cal SetSyn("modula2")<CR>
an 50.70.380 &Syntax.M.Modula\ 3 :cal SetSyn("modula3")<CR>
an 50.70.390 &Syntax.M.Monk :cal SetSyn("monk")<CR>
an 50.70.400 &Syntax.M.Motorola\ S-Record :cal SetSyn("srec")<CR>
an 50.70.410 &Syntax.M.Mplayer\ config :cal SetSyn("mplayerconf")<CR>
an 50.70.420 &Syntax.M.MOO :cal SetSyn("moo")<CR>
an 50.70.430 &Syntax.M.Mrxvtrc :cal SetSyn("mrxvtrc")<CR>
an 50.70.440 &Syntax.M.MS-DOS/Windows.4DOS\ \.bat\ file :cal SetSyn("btm")<CR>
an 50.70.450 &Syntax.M.MS-DOS/Windows.\.bat\/\.cmd\ file :cal SetSyn("dosbatch")<CR>
an 50.70.460 &Syntax.M.MS-DOS/Windows.\.ini\ file :cal SetSyn("dosini")<CR>
an 50.70.470 &Syntax.M.MS-DOS/Windows.Message\ text :cal SetSyn("msmessages")<CR>
an 50.70.480 &Syntax.M.MS-DOS/Windows.Module\ Definition :cal SetSyn("def")<CR>
an 50.70.490 &Syntax.M.MS-DOS/Windows.Registry :cal SetSyn("registry")<CR>
an 50.70.500 &Syntax.M.MS-DOS/Windows.Resource\ file :cal SetSyn("rc")<CR>
an 50.70.510 &Syntax.M.Msql :cal SetSyn("msql")<CR>
an 50.70.520 &Syntax.M.MuPAD :cal SetSyn("mupad")<CR>
an 50.70.530 &Syntax.M.Murphi :cal SetSyn("murphi")<CR>
an 50.70.540 &Syntax.M.MUSHcode :cal SetSyn("mush")<CR>
an 50.70.550 &Syntax.M.Muttrc :cal SetSyn("muttrc")<CR>
an 50.80.100 &Syntax.NO.N1QL :cal SetSyn("n1ql")<CR>
an 50.80.110 &Syntax.NO.Nanorc :cal SetSyn("nanorc")<CR>
an 50.80.120 &Syntax.NO.Nastran\ input/DMAP :cal SetSyn("nastran")<CR>
an 50.80.130 &Syntax.NO.Natural :cal SetSyn("natural")<CR>
an 50.80.140 &Syntax.NO.NeoMutt\ setup\ files :cal SetSyn("neomuttrc")<CR>
an 50.80.150 &Syntax.NO.Netrc :cal SetSyn("netrc")<CR>
an 50.80.160 &Syntax.NO.Ninja :cal SetSyn("ninja")<CR>
an 50.80.170 &Syntax.NO.Novell\ NCF\ batch :cal SetSyn("ncf")<CR>
an 50.80.180 &Syntax.NO.Not\ Quite\ C\ (LEGO) :cal SetSyn("nqc")<CR>
an 50.80.190 &Syntax.NO.Nroff :cal SetSyn("nroff")<CR>
an 50.80.200 &Syntax.NO.NSIS\ script :cal SetSyn("nsis")<CR>
an 50.80.220 &Syntax.NO.Obj\ 3D\ wavefront :cal SetSyn("obj")<CR>
an 50.80.230 &Syntax.NO.Objective\ C :cal SetSyn("objc")<CR>
an 50.80.240 &Syntax.NO.Objective\ C++ :cal SetSyn("objcpp")<CR>
an 50.80.250 &Syntax.NO.OCAML :cal SetSyn("ocaml")<CR>
an 50.80.260 &Syntax.NO.Occam :cal SetSyn("occam")<CR>
an 50.80.270 &Syntax.NO.Omnimark :cal SetSyn("omnimark")<CR>
an 50.80.280 &Syntax.NO.OpenROAD :cal SetSyn("openroad")<CR>
an 50.80.290 &Syntax.NO.Open\ Psion\ Lang :cal SetSyn("opl")<CR>
an 50.80.300 &Syntax.NO.Oracle\ config :cal SetSyn("ora")<CR>
an 50.90.100 &Syntax.PQ.Packet\ filter\ conf :cal SetSyn("pf")<CR>
an 50.90.110 &Syntax.PQ.Palm\ resource\ compiler :cal SetSyn("pilrc")<CR>
an 50.90.120 &Syntax.PQ.Pam\ config :cal SetSyn("pamconf")<CR>
an 50.90.130 &Syntax.PQ.PApp :cal SetSyn("papp")<CR>
an 50.90.140 &Syntax.PQ.Pascal :cal SetSyn("pascal")<CR>
an 50.90.150 &Syntax.PQ.Password\ file :cal SetSyn("passwd")<CR>
an 50.90.160 &Syntax.PQ.PCCTS :cal SetSyn("pccts")<CR>
an 50.90.170 &Syntax.PQ.PDF :cal SetSyn("pdf")<CR>
an 50.90.180 &Syntax.PQ.Perl.Perl :cal SetSyn("perl")<CR>
an 50.90.190 &Syntax.PQ.Perl.Perl\ 6 :cal SetSyn("perl6")<CR>
an 50.90.200 &Syntax.PQ.Perl.Perl\ POD :cal SetSyn("pod")<CR>
an 50.90.210 &Syntax.PQ.Perl.Perl\ XS :cal SetSyn("xs")<CR>
an 50.90.220 &Syntax.PQ.Perl.Template\ toolkit :cal SetSyn("tt2")<CR>
an 50.90.230 &Syntax.PQ.Perl.Template\ toolkit\ Html :cal SetSyn("tt2html")<CR>
an 50.90.240 &Syntax.PQ.Perl.Template\ toolkit\ JS :cal SetSyn("tt2js")<CR>
an 50.90.250 &Syntax.PQ.PHP.PHP\ 3-4 :cal SetSyn("php")<CR>
an 50.90.260 &Syntax.PQ.PHP.Phtml\ (PHP\ 2) :cal SetSyn("phtml")<CR>
an 50.90.270 &Syntax.PQ.Pike :cal SetSyn("pike")<CR>
an 50.90.280 &Syntax.PQ.Pine\ RC :cal SetSyn("pine")<CR>
an 50.90.290 &Syntax.PQ.Pinfo\ RC :cal SetSyn("pinfo")<CR>
an 50.90.300 &Syntax.PQ.PL/M :cal SetSyn("plm")<CR>
an 50.90.310 &Syntax.PQ.PL/SQL :cal SetSyn("plsql")<CR>
an 50.90.320 &Syntax.PQ.Pli :cal SetSyn("pli")<CR>
an 50.90.330 &Syntax.PQ.PLP :cal SetSyn("plp")<CR>
an 50.90.340 &Syntax.PQ.PO\ (GNU\ gettext) :cal SetSyn("po")<CR>
an 50.90.350 &Syntax.PQ.Postfix\ main\ config :cal SetSyn("pfmain")<CR>
an 50.90.360 &Syntax.PQ.PostScript.PostScript :cal SetSyn("postscr")<CR>
an 50.90.370 &Syntax.PQ.PostScript.PostScript\ Printer\ Description :cal SetSyn("ppd")<CR>
an 50.90.380 &Syntax.PQ.Povray.Povray\ scene\ descr :cal SetSyn("pov")<CR>
an 50.90.390 &Syntax.PQ.Povray.Povray\ configuration :cal SetSyn("povini")<CR>
an 50.90.400 &Syntax.PQ.PPWizard :cal SetSyn("ppwiz")<CR>
an 50.90.410 &Syntax.PQ.Prescribe\ (Kyocera) :cal SetSyn("prescribe")<CR>
an 50.90.420 &Syntax.PQ.Printcap :cal SetSyn("pcap")<CR>
an 50.90.430 &Syntax.PQ.Privoxy :cal SetSyn("privoxy")<CR>
an 50.90.440 &Syntax.PQ.Procmail :cal SetSyn("procmail")<CR>
an 50.90.450 &Syntax.PQ.Product\ Spec\ File :cal SetSyn("psf")<CR>
an 50.90.460 &Syntax.PQ.Progress :cal SetSyn("progress")<CR>
an 50.90.470 &Syntax.PQ.Prolog :cal SetSyn("prolog")<CR>
an 50.90.480 &Syntax.PQ.ProMeLa :cal SetSyn("promela")<CR>
an 50.90.490 &Syntax.PQ.Proto :cal SetSyn("proto")<CR>
an 50.90.500 &Syntax.PQ.Protocols :cal SetSyn("protocols")<CR>
an 50.90.510 &Syntax.PQ.Purify\ log :cal SetSyn("purifylog")<CR>
an 50.90.520 &Syntax.PQ.Pyrex :cal SetSyn("pyrex")<CR>
an 50.90.530 &Syntax.PQ.Python :cal SetSyn("python")<CR>
an 50.90.550 &Syntax.PQ.Quake :cal SetSyn("quake")<CR>
an 50.90.560 &Syntax.PQ.Quickfix\ window :cal SetSyn("qf")<CR>
an 50.100.100 &Syntax.R.R.R :cal SetSyn("r")<CR>
an 50.100.110 &Syntax.R.R.R\ help :cal SetSyn("rhelp")<CR>
an 50.100.120 &Syntax.R.R.R\ noweb :cal SetSyn("rnoweb")<CR>
an 50.100.130 &Syntax.R.Racc\ input :cal SetSyn("racc")<CR>
an 50.100.140 &Syntax.R.Radiance :cal SetSyn("radiance")<CR>
an 50.100.150 &Syntax.R.Ratpoison :cal SetSyn("ratpoison")<CR>
an 50.100.160 &Syntax.R.RCS.RCS\ log\ output :cal SetSyn("rcslog")<CR>
an 50.100.170 &Syntax.R.RCS.RCS\ file :cal SetSyn("rcs")<CR>
an 50.100.180 &Syntax.R.Readline\ config :cal SetSyn("readline")<CR>
an 50.100.190 &Syntax.R.Rebol :cal SetSyn("rebol")<CR>
an 50.100.200 &Syntax.R.ReDIF :cal SetSyn("redif")<CR>
an 50.100.210 &Syntax.R.Relax\ NG :cal SetSyn("rng")<CR>
an 50.100.220 &Syntax.R.Remind :cal SetSyn("remind")<CR>
an 50.100.230 &Syntax.R.Relax\ NG\ compact :cal SetSyn("rnc")<CR>
an 50.100.240 &Syntax.R.Renderman.Renderman\ Shader\ Lang :cal SetSyn("sl")<CR>
an 50.100.250 &Syntax.R.Renderman.Renderman\ Interface\ Bytestream :cal SetSyn("rib")<CR>
an 50.100.260 &Syntax.R.Resolv\.conf :cal SetSyn("resolv")<CR>
an 50.100.270 &Syntax.R.Reva\ Forth :cal SetSyn("reva")<CR>
an 50.100.280 &Syntax.R.Rexx :cal SetSyn("rexx")<CR>
an 50.100.290 &Syntax.R.Robots\.txt :cal SetSyn("robots")<CR>
an 50.100.300 &Syntax.R.RockLinux\ package\ desc\. :cal SetSyn("desc")<CR>
an 50.100.310 &Syntax.R.Rpcgen :cal SetSyn("rpcgen")<CR>
an 50.100.320 &Syntax.R.RPL/2 :cal SetSyn("rpl")<CR>
an 50.100.330 &Syntax.R.ReStructuredText :cal SetSyn("rst")<CR>
an 50.110.100 &Syntax.M.ReStructuredText\ with\ R\ statements :cal SetSyn("rrst")<CR>
an 50.120.100 &Syntax.R.RTF :cal SetSyn("rtf")<CR>
an 50.120.110 &Syntax.R.Ruby :cal SetSyn("ruby")<CR>
an 50.120.120 &Syntax.R.Rust :cal SetSyn("rust")<CR>
an 50.130.100 &Syntax.S-Sm.S-Lang :cal SetSyn("slang")<CR>
an 50.130.110 &Syntax.S-Sm.Samba\ config :cal SetSyn("samba")<CR>
an 50.130.120 &Syntax.S-Sm.SAS :cal SetSyn("sas")<CR>
an 50.130.130 &Syntax.S-Sm.Sass :cal SetSyn("sass")<CR>
an 50.130.140 &Syntax.S-Sm.Sather :cal SetSyn("sather")<CR>
an 50.130.150 &Syntax.S-Sm.Sbt :cal SetSyn("sbt")<CR>
an 50.130.160 &Syntax.S-Sm.Scala :cal SetSyn("scala")<CR>
an 50.130.170 &Syntax.S-Sm.Scheme :cal SetSyn("scheme")<CR>
an 50.130.180 &Syntax.S-Sm.Scilab :cal SetSyn("scilab")<CR>
an 50.130.190 &Syntax.S-Sm.Screen\ RC :cal SetSyn("screen")<CR>
an 50.130.200 &Syntax.S-Sm.SCSS :cal SetSyn("scss")<CR>
an 50.130.210 &Syntax.S-Sm.SDC\ Synopsys\ Design\ Constraints :cal SetSyn("sdc")<CR>
an 50.130.220 &Syntax.S-Sm.SDL :cal SetSyn("sdl")<CR>
an 50.130.230 &Syntax.S-Sm.Sed :cal SetSyn("sed")<CR>
an 50.130.240 &Syntax.S-Sm.Sendmail\.cf :cal SetSyn("sm")<CR>
an 50.130.250 &Syntax.S-Sm.Send-pr :cal SetSyn("sendpr")<CR>
an 50.130.260 &Syntax.S-Sm.Sensors\.conf :cal SetSyn("sensors")<CR>
an 50.130.270 &Syntax.S-Sm.Service\ Location\ config :cal SetSyn("slpconf")<CR>
an 50.130.280 &Syntax.S-Sm.Service\ Location\ registration :cal SetSyn("slpreg")<CR>
an 50.130.290 &Syntax.S-Sm.Service\ Location\ SPI :cal SetSyn("slpspi")<CR>
an 50.130.300 &Syntax.S-Sm.Services :cal SetSyn("services")<CR>
an 50.130.310 &Syntax.S-Sm.Setserial\ config :cal SetSyn("setserial")<CR>
an 50.130.320 &Syntax.S-Sm.SGML.SGML\ catalog :cal SetSyn("catalog")<CR>
an 50.130.330 &Syntax.S-Sm.SGML.SGML\ DTD :cal SetSyn("sgml")<CR>
an 50.130.340 &Syntax.S-Sm.SGML.SGML\ Declaration :cal SetSyn("sgmldecl")<CR>
an 50.130.350 &Syntax.S-Sm.SGML.SGML-linuxdoc :cal SetSyn("sgmllnx")<CR>
an 50.130.360 &Syntax.S-Sm.Shell\ script.sh\ and\ ksh :cal SetSyn("sh")<CR>
an 50.130.370 &Syntax.S-Sm.Shell\ script.csh :cal SetSyn("csh")<CR>
an 50.130.380 &Syntax.S-Sm.Shell\ script.tcsh :cal SetSyn("tcsh")<CR>
an 50.130.390 &Syntax.S-Sm.Shell\ script.zsh :cal SetSyn("zsh")<CR>
an 50.130.400 &Syntax.S-Sm.SiCAD :cal SetSyn("sicad")<CR>
an 50.130.410 &Syntax.S-Sm.Sieve :cal SetSyn("sieve")<CR>
an 50.130.420 &Syntax.S-Sm.Simula :cal SetSyn("simula")<CR>
an 50.130.430 &Syntax.S-Sm.Sinda.Sinda\ compare :cal SetSyn("sindacmp")<CR>
an 50.130.440 &Syntax.S-Sm.Sinda.Sinda\ input :cal SetSyn("sinda")<CR>
an 50.130.450 &Syntax.S-Sm.Sinda.Sinda\ output :cal SetSyn("sindaout")<CR>
an 50.130.460 &Syntax.S-Sm.SiSU :cal SetSyn("sisu")<CR>
an 50.130.470 &Syntax.S-Sm.SKILL.SKILL :cal SetSyn("skill")<CR>
an 50.130.480 &Syntax.S-Sm.SKILL.SKILL\ for\ Diva :cal SetSyn("diva")<CR>
an 50.130.490 &Syntax.S-Sm.Slice :cal SetSyn("slice")<CR>
an 50.130.500 &Syntax.S-Sm.SLRN.Slrn\ rc :cal SetSyn("slrnrc")<CR>
an 50.130.510 &Syntax.S-Sm.SLRN.Slrn\ score :cal SetSyn("slrnsc")<CR>
an 50.130.520 &Syntax.S-Sm.SmallTalk :cal SetSyn("st")<CR>
an 50.130.530 &Syntax.S-Sm.Smarty\ Templates :cal SetSyn("smarty")<CR>
an 50.130.540 &Syntax.S-Sm.SMIL :cal SetSyn("smil")<CR>
an 50.130.550 &Syntax.S-Sm.SMITH :cal SetSyn("smith")<CR>
an 50.140.100 &Syntax.Sn-Sy.SNMP\ MIB :cal SetSyn("mib")<CR>
an 50.140.110 &Syntax.Sn-Sy.SNNS.SNNS\ network :cal SetSyn("snnsnet")<CR>
an 50.140.120 &Syntax.Sn-Sy.SNNS.SNNS\ pattern :cal SetSyn("snnspat")<CR>
an 50.140.130 &Syntax.Sn-Sy.SNNS.SNNS\ result :cal SetSyn("snnsres")<CR>
an 50.140.140 &Syntax.Sn-Sy.Snobol4 :cal SetSyn("snobol4")<CR>
an 50.140.150 &Syntax.Sn-Sy.Snort\ Configuration :cal SetSyn("hog")<CR>
an 50.140.160 &Syntax.Sn-Sy.SPEC\ (Linux\ RPM) :cal SetSyn("spec")<CR>
an 50.140.170 &Syntax.Sn-Sy.Specman :cal SetSyn("specman")<CR>
an 50.140.180 &Syntax.Sn-Sy.Spice :cal SetSyn("spice")<CR>
an 50.140.190 &Syntax.Sn-Sy.Spyce :cal SetSyn("spyce")<CR>
an 50.140.200 &Syntax.Sn-Sy.Speedup :cal SetSyn("spup")<CR>
an 50.140.210 &Syntax.Sn-Sy.Splint :cal SetSyn("splint")<CR>
an 50.140.220 &Syntax.Sn-Sy.Squid\ config :cal SetSyn("squid")<CR>
an 50.140.230 &Syntax.Sn-Sy.SQL.SAP\ HANA :cal SetSyn("sqlhana")<CR>
an 50.140.240 &Syntax.Sn-Sy.SQL.ESQL-C :cal SetSyn("esqlc")<CR>
an 50.140.250 &Syntax.Sn-Sy.SQL.MySQL :cal SetSyn("mysql")<CR>
an 50.140.260 &Syntax.Sn-Sy.SQL.PL/SQL :cal SetSyn("plsql")<CR>
an 50.140.270 &Syntax.Sn-Sy.SQL.SQL\ Anywhere :cal SetSyn("sqlanywhere")<CR>
an 50.140.280 &Syntax.Sn-Sy.SQL.SQL\ (automatic) :cal SetSyn("sql")<CR>
an 50.140.290 &Syntax.Sn-Sy.SQL.SQL\ (Oracle) :cal SetSyn("sqloracle")<CR>
an 50.140.300 &Syntax.Sn-Sy.SQL.SQL\ Forms :cal SetSyn("sqlforms")<CR>
an 50.140.310 &Syntax.Sn-Sy.SQL.SQLJ :cal SetSyn("sqlj")<CR>
an 50.140.320 &Syntax.Sn-Sy.SQL.SQL-Informix :cal SetSyn("sqlinformix")<CR>
an 50.140.330 &Syntax.Sn-Sy.SQR :cal SetSyn("sqr")<CR>
an 50.140.340 &Syntax.Sn-Sy.Ssh.ssh_config :cal SetSyn("sshconfig")<CR>
an 50.140.350 &Syntax.Sn-Sy.Ssh.sshd_config :cal SetSyn("sshdconfig")<CR>
an 50.140.360 &Syntax.Sn-Sy.Standard\ ML :cal SetSyn("sml")<CR>
an 50.140.370 &Syntax.Sn-Sy.Stata.SMCL :cal SetSyn("smcl")<CR>
an 50.140.380 &Syntax.Sn-Sy.Stata.Stata :cal SetSyn("stata")<CR>
an 50.140.390 &Syntax.Sn-Sy.Stored\ Procedures :cal SetSyn("stp")<CR>
an 50.140.400 &Syntax.Sn-Sy.Strace :cal SetSyn("strace")<CR>
an 50.140.410 &Syntax.Sn-Sy.Streaming\ descriptor\ file :cal SetSyn("sd")<CR>
an 50.140.420 &Syntax.Sn-Sy.Subversion\ commit :cal SetSyn("svn")<CR>
an 50.140.430 &Syntax.Sn-Sy.Sudoers :cal SetSyn("sudoers")<CR>
an 50.140.440 &Syntax.Sn-Sy.SVG :cal SetSyn("svg")<CR>
an 50.140.450 &Syntax.Sn-Sy.Symbian\ meta-makefile :cal SetSyn("mmp")<CR>
an 50.140.460 &Syntax.Sn-Sy.Sysctl\.conf :cal SetSyn("sysctl")<CR>
an 50.140.470 &Syntax.Sn-Sy.Systemd :cal SetSyn("systemd")<CR>
an 50.140.480 &Syntax.Sn-Sy.SystemVerilog :cal SetSyn("systemverilog")<CR>
an 50.150.100 &Syntax.T.TADS :cal SetSyn("tads")<CR>
an 50.150.110 &Syntax.T.Tags :cal SetSyn("tags")<CR>
an 50.150.120 &Syntax.T.TAK.TAK\ compare :cal SetSyn("takcmp")<CR>
an 50.150.130 &Syntax.T.TAK.TAK\ input :cal SetSyn("tak")<CR>
an 50.150.140 &Syntax.T.TAK.TAK\ output :cal SetSyn("takout")<CR>
an 50.150.150 &Syntax.T.Tar\ listing :cal SetSyn("tar")<CR>
an 50.150.160 &Syntax.T.Task\ data :cal SetSyn("taskdata")<CR>
an 50.150.170 &Syntax.T.Task\ 42\ edit :cal SetSyn("taskedit")<CR>
an 50.150.180 &Syntax.T.Tcl/Tk :cal SetSyn("tcl")<CR>
an 50.150.190 &Syntax.T.TealInfo :cal SetSyn("tli")<CR>
an 50.150.200 &Syntax.T.Telix\ Salt :cal SetSyn("tsalt")<CR>
an 50.150.210 &Syntax.T.Termcap/Printcap :cal SetSyn("ptcap")<CR>
an 50.150.220 &Syntax.T.Terminfo :cal SetSyn("terminfo")<CR>
an 50.150.230 &Syntax.T.Tera\ Term :cal SetSyn("teraterm")<CR>
an 50.150.240 &Syntax.T.TeX.TeX/LaTeX :cal SetSyn("tex")<CR>
an 50.150.250 &Syntax.T.TeX.plain\ TeX :cal SetSyn("plaintex")<CR>
an 50.150.260 &Syntax.T.TeX.Initex :cal SetSyn("initex")<CR>
an 50.150.270 &Syntax.T.TeX.ConTeXt :cal SetSyn("context")<CR>
an 50.150.280 &Syntax.T.TeX.TeX\ configuration :cal SetSyn("texmf")<CR>
an 50.150.290 &Syntax.T.TeX.Texinfo :cal SetSyn("texinfo")<CR>
an 50.150.300 &Syntax.T.TF\ mud\ client :cal SetSyn("tf")<CR>
an 50.150.310 &Syntax.T.Tidy\ configuration :cal SetSyn("tidy")<CR>
an 50.150.320 &Syntax.T.Tilde :cal SetSyn("tilde")<CR>
an 50.150.330 &Syntax.T.Tmux\ configuration :cal SetSyn("tmux")<CR>
an 50.150.340 &Syntax.T.TPP :cal SetSyn("tpp")<CR>
an 50.150.350 &Syntax.T.Trasys\ input :cal SetSyn("trasys")<CR>
an 50.150.360 &Syntax.T.Treetop :cal SetSyn("treetop")<CR>
an 50.150.370 &Syntax.T.Trustees :cal SetSyn("trustees")<CR>
an 50.150.380 &Syntax.T.TSS.Command\ Line :cal SetSyn("tsscl")<CR>
an 50.150.390 &Syntax.T.TSS.Geometry :cal SetSyn("tssgm")<CR>
an 50.150.400 &Syntax.T.TSS.Optics :cal SetSyn("tssop")<CR>
an 50.160.100 &Syntax.UV.Udev\ config :cal SetSyn("udevconf")<CR>
an 50.160.110 &Syntax.UV.Udev\ permissions :cal SetSyn("udevperm")<CR>
an 50.160.120 &Syntax.UV.Udev\ rules :cal SetSyn("udevrules")<CR>
an 50.160.130 &Syntax.UV.UIT/UIL :cal SetSyn("uil")<CR>
an 50.160.140 &Syntax.UV.UnrealScript :cal SetSyn("uc")<CR>
an 50.160.150 &Syntax.UV.Updatedb\.conf :cal SetSyn("updatedb")<CR>
an 50.160.160 &Syntax.UV.Upstart :cal SetSyn("upstart")<CR>
an 50.160.180 &Syntax.UV.Valgrind :cal SetSyn("valgrind")<CR>
an 50.160.190 &Syntax.UV.Vera :cal SetSyn("vera")<CR>
an 50.160.200 &Syntax.UV.Verbose\ TAP\ Output :cal SetSyn("tap")<CR>
an 50.160.210 &Syntax.UV.Verilog-AMS\ HDL :cal SetSyn("verilogams")<CR>
an 50.160.220 &Syntax.UV.Verilog\ HDL :cal SetSyn("verilog")<CR>
an 50.160.230 &Syntax.UV.Vgrindefs :cal SetSyn("vgrindefs")<CR>
an 50.160.240 &Syntax.UV.VHDL :cal SetSyn("vhdl")<CR>
an 50.160.250 &Syntax.UV.Vim.Vim\ help\ file :cal SetSyn("help")<CR>
an 50.160.260 &Syntax.UV.Vim.Vim\ script :cal SetSyn("vim")<CR>
an 50.160.270 &Syntax.UV.Vim.Viminfo\ file :cal SetSyn("viminfo")<CR>
an 50.160.280 &Syntax.UV.Virata\ config :cal SetSyn("virata")<CR>
an 50.160.290 &Syntax.UV.Visual\ Basic :cal SetSyn("vb")<CR>
an 50.160.300 &Syntax.UV.VOS\ CM\ macro :cal SetSyn("voscm")<CR>
an 50.160.310 &Syntax.UV.VRML :cal SetSyn("vrml")<CR>
an 50.160.320 &Syntax.UV.Vroom :cal SetSyn("vroom")<CR>
an 50.160.330 &Syntax.UV.VSE\ JCL :cal SetSyn("vsejcl")<CR>
an 50.170.100 &Syntax.WXYZ.WEB.CWEB :cal SetSyn("cweb")<CR>
an 50.170.110 &Syntax.WXYZ.WEB.WEB :cal SetSyn("web")<CR>
an 50.170.120 &Syntax.WXYZ.WEB.WEB\ Changes :cal SetSyn("change")<CR>
an 50.170.130 &Syntax.WXYZ.Webmacro :cal SetSyn("webmacro")<CR>
an 50.170.140 &Syntax.WXYZ.Website\ MetaLanguage :cal SetSyn("wml")<CR>
an 50.170.160 &Syntax.WXYZ.wDiff :cal SetSyn("wdiff")<CR>
an 50.170.180 &Syntax.WXYZ.Wget\ config :cal SetSyn("wget")<CR>
an 50.170.190 &Syntax.WXYZ.Whitespace\ (add) :cal SetSyn("whitespace")<CR>
an 50.170.200 &Syntax.WXYZ.WildPackets\ EtherPeek\ Decoder :cal SetSyn("dcd")<CR>
an 50.170.210 &Syntax.WXYZ.WinBatch/Webbatch :cal SetSyn("winbatch")<CR>
an 50.170.220 &Syntax.WXYZ.Windows\ Scripting\ Host :cal SetSyn("wsh")<CR>
an 50.170.230 &Syntax.WXYZ.WSML :cal SetSyn("wsml")<CR>
an 50.170.240 &Syntax.WXYZ.WvDial :cal SetSyn("wvdial")<CR>
an 50.170.260 &Syntax.WXYZ.X\ Keyboard\ Extension :cal SetSyn("xkb")<CR>
an 50.170.270 &Syntax.WXYZ.X\ Pixmap :cal SetSyn("xpm")<CR>
an 50.170.280 &Syntax.WXYZ.X\ Pixmap\ (2) :cal SetSyn("xpm2")<CR>
an 50.170.290 &Syntax.WXYZ.X\ resources :cal SetSyn("xdefaults")<CR>
an 50.170.300 &Syntax.WXYZ.XBL :cal SetSyn("xbl")<CR>
an 50.170.310 &Syntax.WXYZ.Xinetd\.conf :cal SetSyn("xinetd")<CR>
an 50.170.320 &Syntax.WXYZ.Xmodmap :cal SetSyn("xmodmap")<CR>
an 50.170.330 &Syntax.WXYZ.Xmath :cal SetSyn("xmath")<CR>
an 50.170.340 &Syntax.WXYZ.XML :cal SetSyn("xml")<CR>
an 50.170.350 &Syntax.WXYZ.XML\ Schema\ (XSD) :cal SetSyn("xsd")<CR>
an 50.170.360 &Syntax.WXYZ.XQuery :cal SetSyn("xquery")<CR>
an 50.170.370 &Syntax.WXYZ.Xslt :cal SetSyn("xslt")<CR>
an 50.170.380 &Syntax.WXYZ.XFree86\ Config :cal SetSyn("xf86conf")<CR>
an 50.170.400 &Syntax.WXYZ.YAML :cal SetSyn("yaml")<CR>
an 50.170.410 &Syntax.WXYZ.Yacc :cal SetSyn("yacc")<CR>
an 50.170.430 &Syntax.WXYZ.Zimbu :cal SetSyn("zimbu")<CR>
" The End Of The Syntax Menu
an 50.195 &Syntax.-SEP1- <Nop>
an <silent> 50.200 &Syntax.Set\ '&syntax'\ Only :call <SID>Setsynonly()<CR>
fun! s:Setsynonly()
let s:syntax_menu_synonly = 1
endfun
an <silent> 50.202 &Syntax.Set\ '&filetype'\ Too :call <SID>Nosynonly()<CR>
fun! s:Nosynonly()
if exists("s:syntax_menu_synonly")
unlet s:syntax_menu_synonly
endif
endfun
" Restore 'cpoptions'
let &cpo = s:cpo_save
unlet s:cpo_save
|
Promotions
Additional Information
Put some prep in your step with this mini skirt. The pull-on adjustable style is the opposite of stuffy with a drawstring waist. The navy and white striped French Terry is sophisticated but also effortless with a light weight and airy feel.
Recently Viewed
Rated 5 out of
5 by
DENISEIRENE from
Nice comfy skirtI bought this skirt a month ago. Its so comfy and cute. I loved it. Fits beautiful.... True to size.. I recommend this skirt.
Date published: 2017-04-01
Rated 5 out of
5 by
New Love from
LoveTrue to size and very soft. Looks very nice with bright color shirts.
Date published: 2017-03-11
Rated 5 out of
5 by
me harris from
Perfect fitI'm a size 1 and 5'10", so the skirt hits a bit higher on the thigh, but I don't mind showing off my legs (especially when I throw some self-tanner on them). There's something about the fit of this that is absolutely perfect and gives me a nice shape at the waist. Well done Torrid!
Date published: 2017-03-01
Rated 5 out of
5 by
boxerchick123 from
My new favorite skirtI'm 5'3 and this is the perfect length. It is also the perfect mix of casual and work appropriate.
Date published: 2017-01-12
Rated 5 out of
5 by
Cherry55 from
So softI bought this and was sure about the Stripes but I tried it it's well it's super soft and just the right length |
It is known that certain alloys under certain conditions can undergo very large amounts of deformation without failure, the phenomenon being known as superplasticity and characterised by a high strain rate sensitivity index in the material as a result of which the normal tendency of a stretched specimen to undergo preferential local deformation ("necking") is suppressed. Such large deformations are moreover possible at relatively low stresses so that the forming or shaping of superplastic alloys can be performed more simply and cheaply than is possible with even highly ductile materials which do not exhibit the phenomenon. As a convenient numerical criterion of the presence of superplasticity, it may be taken that a superplastic material will show a strain rate sensitivity ("m"-value) of at least 0.3 and a uniaxial tensile elongation at temperature of at least 200%, "m"-value being defined by the relationship .sigma.=.eta. .epsilon..sup.m where .sigma. represents flow stress, .eta. a constant, .epsilon. strain rate and m strain rate sensitivity index.
No known aluminium-base alloy can be superplastically deformed other than the Al-Cu entectic composition which contains 33% copper and has neither the low density nor the good corrosion resistance characteristic of aluminium alloys. A known alloy of 22% Al and 78% Zn is also superplastically deformable, but because of its high density and poor creep and corrosion resistance has not found commercial acceptance. |
/*
* Tencent is pleased to support the open source community by making Tinker available.
*
* Copyright (C) 2016 THL A29 Limited, a Tencent company. All rights reserved.
*
* Licensed under the BSD 3-Clause License (the "License"); you may not use this file except in
* compliance with the License. You may obtain a copy of the License at
*
* https://opensource.org/licenses/BSD-3-Clause
*
* Unless required by applicable law or agreed to in writing, software distributed under the License is
* distributed on an "AS IS" basis, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
* either express or implied. See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.tencent.tinker.loader.shareutil;
import android.annotation.SuppressLint;
import android.content.Context;
import android.content.pm.ApplicationInfo;
import android.os.Build;
import com.tencent.tinker.loader.TinkerRuntimeException;
import java.io.BufferedInputStream;
import java.io.BufferedReader;
import java.io.Closeable;
import java.io.File;
import java.io.FileInputStream;
import java.io.FileOutputStream;
import java.io.IOException;
import java.io.InputStream;
import java.io.InputStreamReader;
import java.security.MessageDigest;
import java.util.jar.JarEntry;
import java.util.jar.JarFile;
import java.util.zip.ZipEntry;
import java.util.zip.ZipFile;
public class SharePatchFileUtil {
private static final String TAG = "Tinker.PatchFileUtil";
private static char[] hexDigits = {'0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'a', 'b', 'c', 'd', 'e', 'f'};
/**
* data dir, such as /data/data/tinker.sample.android/tinker
* @param context
* @return
*/
public static File getPatchDirectory(Context context) {
ApplicationInfo applicationInfo = context.getApplicationInfo();
if (applicationInfo == null) {
// Looks like running on a test Context, so just return without patching.
return null;
}
final String dirName = ("oppo".equalsIgnoreCase(Build.MANUFACTURER) && Build.VERSION.SDK_INT == 22)
? ShareConstants.PATCH_DIRECTORY_NAME_SPEC : ShareConstants.PATCH_DIRECTORY_NAME;
return new File(applicationInfo.dataDir, dirName);
}
public static File getPatchTempDirectory(Context context) {
ApplicationInfo applicationInfo = context.getApplicationInfo();
if (applicationInfo == null) {
// Looks like running on a test Context, so just return without patching.
return null;
}
return new File(applicationInfo.dataDir, ShareConstants.PATCH_TEMP_DIRECTORY_NAME);
}
public static File getPatchLastCrashFile(Context context) {
File tempFile = getPatchTempDirectory(context);
if (tempFile == null) {
return null;
}
return new File(tempFile, ShareConstants.PATCH_TEMP_LAST_CRASH_NAME);
}
public static File getPatchInfoFile(String patchDirectory) {
return new File(patchDirectory + "/" + ShareConstants.PATCH_INFO_NAME);
}
public static File getPatchInfoLockFile(String patchDirectory) {
return new File(patchDirectory + "/" + ShareConstants.PATCH_INFO_LOCK_NAME);
}
public static String getPatchVersionDirectory(String version) {
if (version == null || version.length() != ShareConstants.MD5_LENGTH) {
return null;
}
return ShareConstants.PATCH_BASE_NAME + version.substring(0, 8);
}
public static String getPatchVersionFile(String version) {
if (version == null || version.length() != ShareConstants.MD5_LENGTH) {
return null;
}
return getPatchVersionDirectory(version) + ShareConstants.PATCH_SUFFIX;
}
public static boolean checkIfMd5Valid(final String object) {
if ((object == null) || (object.length() != ShareConstants.MD5_LENGTH)) {
return false;
}
return true;
}
public static String checkTinkerLastUncaughtCrash(Context context) {
File crashFile = SharePatchFileUtil.getPatchLastCrashFile(context);
if (!SharePatchFileUtil.isLegalFile(crashFile)) {
return null;
}
StringBuffer buffer = new StringBuffer();
BufferedReader in = null;
try {
in = new BufferedReader(new InputStreamReader(new FileInputStream(crashFile)));
String line;
while ((line = in.readLine()) != null) {
buffer.append(line);
buffer.append("\n");
}
} catch (Exception e) {
ShareTinkerLog.e(TAG, "checkTinkerLastUncaughtCrash exception: " + e);
return null;
} finally {
closeQuietly(in);
}
return buffer.toString();
}
/**
* Closes the given {@code obj}. Suppresses any exceptions.
*/
@SuppressLint("NewApi")
public static void closeQuietly(Object obj) {
if (obj == null) return;
if (obj instanceof Closeable) {
try {
((Closeable) obj).close();
} catch (Throwable ignored) {
// Ignored.
}
} else if (Build.VERSION.SDK_INT >= 19 && obj instanceof AutoCloseable) {
try {
((AutoCloseable) obj).close();
} catch (Throwable ignored) {
// Ignored.
}
} else if (obj instanceof ZipFile) {
try {
((ZipFile) obj).close();
} catch (Throwable ignored) {
// Ignored.
}
} else {
throw new IllegalArgumentException("obj: " + obj + " cannot be closed.");
}
}
public static final boolean isLegalFile(File file) {
return file != null && file.exists() && file.canRead() && file.isFile() && file.length() > 0;
}
/**
* For some special device whose dex2oat procedure is optimized for tinker. (e.g. vivo, oppo)
*
* Because these devices by-pass our dex2oat request, which cause vm to load tinker's dex with interpret-mode
* and generate nothing instead of a valid oat file. It's fine to skip the check so far.
*
* @param file
* @return
*/
public static final boolean shouldAcceptEvenIfIllegal(File file) {
final boolean isSpecialManufacturer =
"vivo".equalsIgnoreCase(Build.MANUFACTURER)
|| "oppo".equalsIgnoreCase(Build.MANUFACTURER);
final boolean isSpecialOSVer =
(Build.VERSION.SDK_INT >= 29)
|| (Build.VERSION.SDK_INT >= 28 && Build.VERSION.PREVIEW_SDK_INT != 0)
|| (ShareTinkerInternals.isArkHotRuning());
final boolean isFileIllegal = !file.exists() || file.length() == 0;
return (isSpecialManufacturer || isSpecialOSVer) && isFileIllegal;
}
/**
* get directory size
*
* @param directory
* @return
*/
public static long getFileOrDirectorySize(File directory) {
if (directory == null || !directory.exists()) {
return 0;
}
if (directory.isFile()) {
return directory.length();
}
long totalSize = 0;
File[] fileList = directory.listFiles();
if (fileList != null) {
for (File file : fileList) {
if (file.isDirectory()) {
totalSize = totalSize + getFileOrDirectorySize(file);
} else {
totalSize = totalSize + file.length();
}
}
}
return totalSize;
}
public static final boolean safeDeleteFile(File file) {
if (file == null) {
return true;
}
if (file.exists()) {
ShareTinkerLog.i(TAG, "safeDeleteFile, try to delete path: " + file.getPath());
boolean deleted = file.delete();
if (!deleted) {
ShareTinkerLog.e(TAG, "Failed to delete file, try to delete when exit. path: " + file.getPath());
file.deleteOnExit();
}
return deleted;
}
return true;
}
public static final boolean deleteDir(String dir) {
if (dir == null) {
return false;
}
return deleteDir(new File(dir));
}
public static final boolean deleteDir(File file) {
if (file == null || (!file.exists())) {
return false;
}
if (file.isFile()) {
safeDeleteFile(file);
} else if (file.isDirectory()) {
File[] files = file.listFiles();
if (files != null) {
for (File subFile : files) {
deleteDir(subFile);
}
safeDeleteFile(file);
}
}
return true;
}
/**
* Returns whether the file is a valid file.
*/
public static boolean verifyFileMd5(File file, String md5) {
if (md5 == null) {
return false;
}
String fileMd5 = getMD5(file);
if (fileMd5 == null) {
return false;
}
return md5.equals(fileMd5);
}
public static boolean isRawDexFile(String fileName) {
if (fileName == null) {
return false;
}
return fileName.endsWith(ShareConstants.DEX_SUFFIX);
}
/**
* Returns whether the dex file is a valid file.
* dex may wrap with jar
*/
public static boolean verifyDexFileMd5(File file, String md5) {
return verifyDexFileMd5(file, ShareConstants.DEX_IN_JAR, md5);
}
public static boolean verifyDexFileMd5(File file, String entryName, String md5) {
if (file == null || md5 == null || entryName == null) {
return false;
}
//if it is not the raw dex, we check the stream instead
String fileMd5 = "";
if (isRawDexFile(file.getName())) {
fileMd5 = getMD5(file);
} else {
ZipFile dexJar = null;
try {
dexJar = new ZipFile(file);
ZipEntry classesDex = dexJar.getEntry(entryName);
// no code
if (null == classesDex) {
ShareTinkerLog.e(TAG, "There's no entry named: " + ShareConstants.DEX_IN_JAR + " in " + file.getAbsolutePath());
return false;
}
InputStream is = null;
try {
is = dexJar.getInputStream(classesDex);
fileMd5 = getMD5(is);
} catch (Throwable e) {
ShareTinkerLog.e(TAG, "exception occurred when get md5: " + file.getAbsolutePath(), e);
} finally {
closeQuietly(is);
}
} catch (Throwable e) {
ShareTinkerLog.e(TAG, "Bad dex jar file: " + file.getAbsolutePath(), e);
return false;
} finally {
closeZip(dexJar);
}
}
return md5.equals(fileMd5);
}
public static void copyFileUsingStream(File source, File dest) throws IOException {
if (!SharePatchFileUtil.isLegalFile(source) || dest == null) {
return;
}
if (source.getAbsolutePath().equals(dest.getAbsolutePath())) {
return;
}
FileInputStream is = null;
FileOutputStream os = null;
File parent = dest.getParentFile();
if (parent != null && (!parent.exists())) {
parent.mkdirs();
}
try {
is = new FileInputStream(source);
os = new FileOutputStream(dest, false);
byte[] buffer = new byte[ShareConstants.BUFFER_SIZE];
int length;
while ((length = is.read(buffer)) > 0) {
os.write(buffer, 0, length);
}
} finally {
closeQuietly(is);
closeQuietly(os);
}
}
/**
* for faster, read and get the contents
*
* @throws IOException
*/
public static String loadDigestes(JarFile jarFile, JarEntry je) throws Exception {
InputStream bis = null;
StringBuilder sb = new StringBuilder();
try {
InputStream is = jarFile.getInputStream(je);
byte[] bytes = new byte[ShareConstants.BUFFER_SIZE];
bis = new BufferedInputStream(is);
int readBytes;
while ((readBytes = bis.read(bytes)) > 0) {
sb.append(new String(bytes, 0, readBytes));
}
} finally {
closeQuietly(bis);
}
return sb.toString();
}
/**
* Get the md5 for inputStream.
* This method cost less memory. It read bufLen bytes from the FileInputStream once.
*
* @param is
*/
public final static String getMD5(final InputStream is) {
if (is == null) {
return null;
}
try {
BufferedInputStream bis = new BufferedInputStream(is);
MessageDigest md = MessageDigest.getInstance("MD5");
StringBuilder md5Str = new StringBuilder(32);
byte[] buf = new byte[ShareConstants.MD5_FILE_BUF_LENGTH];
int readCount;
while ((readCount = bis.read(buf)) != -1) {
md.update(buf, 0, readCount);
}
byte[] hashValue = md.digest();
for (int i = 0; i < hashValue.length; i++) {
md5Str.append(Integer.toString((hashValue[i] & 0xff) + 0x100, 16).substring(1));
}
return md5Str.toString();
} catch (Exception e) {
return null;
}
}
public static String getMD5(byte[] buffer) {
try {
MessageDigest mdTemp = MessageDigest.getInstance("MD5");
mdTemp.update(buffer);
byte[] md = mdTemp.digest();
int j = md.length;
char[] str = new char[j * 2];
int k = 0;
for (int i = 0; i < j; i++) {
byte byte0 = md[i];
str[k++] = hexDigits[byte0 >>> 4 & 0xf];
str[k++] = hexDigits[byte0 & 0xf];
}
return new String(str);
} catch (Exception e) {
return null;
}
}
/**
* Get the md5 for the file. call getMD5(FileInputStream is, int bufLen) inside.
*
* @param file
*/
public static String getMD5(final File file) {
if (file == null || !file.exists()) {
return null;
}
FileInputStream fin = null;
try {
fin = new FileInputStream(file);
String md5 = getMD5(fin);
return md5;
} catch (Exception e) {
ShareTinkerLog.e(TAG, e.getMessage());
return null;
} finally {
closeQuietly(fin);
}
}
/**
* change the jar file path as the makeDexElements do
* Android O change its path
*
* @param path
* @param optimizedDirectory
* @return
*/
public static String optimizedPathFor(File path, File optimizedDirectory) {
if (ShareTinkerInternals.isAfterAndroidO()) {
// dex_location = /foo/bar/baz.jar
// odex_location = /foo/bar/oat/<isa>/baz.odex
String currentInstructionSet;
try {
currentInstructionSet = ShareTinkerInternals.getCurrentInstructionSet();
} catch (Exception e) {
throw new TinkerRuntimeException("getCurrentInstructionSet fail:", e);
}
File parentFile = path.getParentFile();
String fileName = path.getName();
int index = fileName.lastIndexOf('.');
if (index > 0) {
fileName = fileName.substring(0, index);
}
String result = parentFile.getAbsolutePath() + "/oat/"
+ currentInstructionSet + "/" + fileName + ShareConstants.ODEX_SUFFIX;
return result;
}
String fileName = path.getName();
if (!fileName.endsWith(ShareConstants.DEX_SUFFIX)) {
int lastDot = fileName.lastIndexOf(".");
if (lastDot < 0) {
fileName += ShareConstants.DEX_SUFFIX;
} else {
StringBuilder sb = new StringBuilder(lastDot + 4);
sb.append(fileName, 0, lastDot);
sb.append(ShareConstants.DEX_SUFFIX);
fileName = sb.toString();
}
}
File result = new File(optimizedDirectory, fileName);
return result.getPath();
}
public static void closeZip(ZipFile zipFile) {
try {
if (zipFile != null) {
zipFile.close();
}
} catch (IOException e) {
ShareTinkerLog.w(TAG, "Failed to close resource", e);
}
}
public static boolean checkResourceArscMd5(File resOutput, String destMd5) {
ZipFile resourceZip = null;
try {
resourceZip = new ZipFile(resOutput);
ZipEntry arscEntry = resourceZip.getEntry(ShareConstants.RES_ARSC);
if (arscEntry == null) {
ShareTinkerLog.i(TAG, "checkResourceArscMd5 resources.arsc not found");
return false;
}
InputStream inputStream = null;
try {
inputStream = resourceZip.getInputStream(arscEntry);
String md5 = SharePatchFileUtil.getMD5(inputStream);
if (md5 != null && md5.equals(destMd5)) {
return true;
}
} finally {
closeQuietly(inputStream);
}
} catch (Throwable e) {
ShareTinkerLog.i(TAG, "checkResourceArscMd5 throwable:" + e.getMessage());
} finally {
SharePatchFileUtil.closeZip(resourceZip);
}
return false;
}
public static void ensureFileDirectory(File file) {
if (file == null) {
return;
}
File parentFile = file.getParentFile();
if (!parentFile.exists()) {
parentFile.mkdirs();
}
}
}
|
More than a day after the Easter Sunday suicide bombings in Sri Lanka that claimed the lives of nearly 300 people, little has been revealed or said about the militant group government officials are blaming for the violence.
Multiple media reports cited Health Minister Rajitha Senaratne as saying Monday that an obscure organization called National Thowfeek Jamaath was behind the blasts that rocked churches and luxury hotels yesterday in and around Colombo – Sri Lanka’s capital and largest city.
But officials from the island nation off the coast of India still have not produced evidence directly tying the group to the bombings. Officials told The Wall Street Journal their suspicions are hinging on information received from an unnamed foreign government in the lead-up to the attacks, alleging that National Thowfeek Jamaath had been planning acts of violence. Yet those warnings, they added, were not clear enough to take action on.
Even the spelling of the group appears to have formed a divided consensus among the international news media, with translations of its name appearing in reports as everything from Nations Thawahid Jaman to National Thawheed Jama’ut.
SRI LANKA AUTHORITIES WARNED OF EASTER CHURCH BOMBINGS WEEKS BEFORE SUNDAY’S MASSACRE, OFFICIALS SAY
And adding to the confusion: no militant group as of late Monday has claimed responsibility for the Sri Lanka bombings. The Associated Press has quoted Senaratne as saying that whichever group carried out the attacks likely had help from outside the country – further widening the scope of the investigation.
Sri Lankan President Maithripala Sirisena announced Monday that as of midnight tonight, the country’s military will be granted war-time powers to arrest and detain suspects in the bombings probe. The Associated Press reported 24 people are already in custody for questioning, but their names, ages and affiliations are unclear.
Anne Speckhard, the director of the International Center for the Study of Violent Extremism, told the New York Times that National Thowfeek Jamaath’s mission is to generate hate, fear and divisions through the spread of the global jihadist movement.
The group originated in 2009 on Sri Lanka’s east coast and became known for vandalizing Buddhist statues and stoking religious tensions, according to The Wall Street Journal.
In March 2017, the group was involved in a clash in the Muslim-majority town of Kattankudy – near one of Sunday’s church bombing sites – that left three hospitalized and resulted in 10 arrests, the New York Times says, citing a local media report.
The Indian Express website says the group was formed in Kattankudy and has been pushing for Sharia law in the region.
Yet the Easter Sunday bombings would represent a new – and radical -- escalation of violence for National Thowfeek Jamaath and its supporters.
CLICK HERE TO GET THE FOX NEWS APP
“This attack took a lot of planning, which is surprising for a group that most have never heard of,” Raffaello Pantucci, a member of the London-based Royal United Services Institute for Defence and Security Studies think tank, told The Wall Street Journal. “That makes me suspect that there is an external link, and Islamic State or Al Qaeda are the obvious suspects.”
Researchers also told the newspaper that Christians and Westerners are increasingly coming under attack by extremists in Asia and Africa. |
These release notes lists new, updated, and deprecated features in each version of our software.
We publish release notes each time that we deploy major production release version to the EDGE tier. A version's release notes list new, updated, deprecated, and removed features. The release notes also include third-party software versions and new and updated API calls.
Legacy versions of cPanel & WHM
cPanel, WebHost Manager, and WHM are registered trademarks of cPanel, Inc. for providing its computer software that facilitates the management and configuration of Internet web servers. ®2018 All rights reserved.
cPanel, WebHost Manager, and WHM are registered trademarks of cPanel, Inc. for providing its computer software that facilitates the management and configuration of Internet web servers. ®2018 All rights reserved. |
Q:
What type of wood does black oyster mushrooms grow on?
I have a bag of black oyster mushroom sawdust, and was wondering what type of wood I should use to make totems with.
A:
Dark Oyster mushroom (Pleurotus sp.) having a place with Class Basidiomycetes and Family Agaricaceae is famously known as 'dhingri' in India and develops normally in the mild and Most regularly found on deciduous hardwoods and tropical woodlands on dead and decaying wooden logs (trees that lose their leaves). Beech and aspen trees are normal. Sometimes found on conifers also.
|
<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<Plugin providerName='Tasking/Mcl_Cmd_Ifconfig_Tasking.pyo' providerType='script'>
<Command id="0" name="Ifconfig">
<Help>Outputs interface configuration information</Help>
<Input>
</Input>
<Output>
</Output>
</Command>
</Plugin>
|
Experience with a new technique for managing severely overcorrected valgus high tibial osteotomy at total knee arthroplasty.
Total knee arthroplasty (TKA) after valgus proximal tibial osteotomy poses no major difficulties in most cases. There is, however, a small subgroup of severely overcorrected patients in whom TKA is particularly difficult. These patients require special considerations. A complex ligament reconstruction has been developed to allow simultaneous implantation of a minimally constrained total knee prosthesis for patients with failed, severely overcorrected valgus high tibial osteotomies. The technique is described in five patients. The mean age of the group was 57 years and the average follow-up period was 34 months (range, 12-72 months). A 100-point knee-evaluation scale was used to rate the knees before and after TKA. The average pre- and postoperative scores were 50 and 94, respectively. None of the patients was noted to have any more than mild instability in any direction postoperatively. Despite this extensive reconstruction, the group functioned as well as most recipients of more standard primary TKAs and demonstrated it is possible to avoid highly constrained implants, custom prostheses, or major bone grafts. |
/// Copyright (c) 2012 Ecma International. All rights reserved.
/**
* @path ch15/15.2/15.2.3/15.2.3.6/15.2.3.6-4-48.js
* @description Object.defineProperty - 'name' property doesn't exist in 'O', test [[Writable]] of 'name' property of 'Attributes' is set as false value if absent in data descriptor 'desc' (8.12.9 step 4.a.i)
*/
function testcase() {
var obj = {};
Object.defineProperty(obj, "property", {
value: 1001,
enumerable: true,
configurable: false
});
return dataPropertyAttributesAreCorrect(obj, "property", 1001, false, true, false);
}
runTestCase(testcase);
|
Despite being far away from their all-time high, cryptocurrencies are still the best-performing asset class of 2019. That means cryptocurrencies have given more annualized return than US equity, commodities and bond markets in 2019.
2019 started as a rough year for cryptocurrencies, with Bitcoin (the largest cryptocurrency) reaching a two year low at close to $3,500 in the first quarter of 2019. But from the second quarter, the markets rebounded, with Bitcoin reaching close to $13,000 during the month of July. The markets since then have fallen.
Much of the cryptocurrency markets’ success lies with Bitcoin, which is up by 100% since Jan 1st, 2019. The second-largest cryptocurrency, Ethereum, is up by 56% since Jan 1st, 2019. Litecoin is up 54% while Bitcoin Cash is up by 22%. XRP is the only one from the Top 5 cryptocurrencies that underperformed in 2019. XRP is down by 36% since Jan 1st, 2019.
Due to the rebound of the US Equity and Bond market in the third quarter, the traditional markets are narrowing the gap. But cryptocurrency markets still have a significant lead.
It is expected that the cryptocurrency market will perform good in 2020 due to the much anticipated Bitcoin Halving which is scheduled for mid-2020.
Join Bitxmi Exchange
Disclaimer: Bitxmi News is a news portal and does not provide any financial advice. Bitxmi's role is to inform the cryptocurrency and blockchain community about what's going on in this space. Please do your own due diligence before making any investment. Bitxmi News won't be responsible for any loss of funds. |
Landowner to get $6M from Georgia Power
Family turned down initial offer of $3.9M for North Hall land
The Georgia Power Co. must pay Hall County’s largest landowner $2.2 million more than it initially offered to install power lines along a three-mile stretch of undeveloped land in North Hall, a jury decided Friday.
Hall County Superior Court jurors decided that the utility should pay Glade Farms LLC $6.1 million for 109 acres of land it condemned inside a 5,000-acre tract off Ga. 365. The amount was more than the $3.9 million Georgia Power had offered but less than the $10 million to $18 million a Glade Farms attorney suggested to the jury during closing arguments.
The property is owned by the Goess-Saurau family of Austria and is the largest contiguous tract of undeveloped land in Hall County. A 800-acre portion of the property was sold to Hall County in 2001 for a planned reservoir that could yield 6.4 million gallons per day.
The power transmission lines Georgia Power is planning to install are the biggest the company makes, supported by more than 20 steel towers standing 110 feet tall. The company altered its original plans to avoid interfering with the possible construction of a reservoir, but the lines would still mar the scenery of a planned mixed-use development that is likely years from development, Glade Farms attorneys said.
Last year the Hall County Board of Commissioners approved rezoning a portion of the land for 2,000 units and 3 million square feet of commercial office space. The 30-year plan, if it comes to fruition, projects 19,000 residents.
“Everyone agrees it will be some years before it is fully developed,” Glade Farms attorney Michael Terry told jurors in his closing argument Friday. “It’s going to take several years to start and it will take decades to finish.”
Still, Terry told jurors they could should rely on an appraisal of the land based on its “highest and best use,” not the undeveloped timberland it is now. The 3.5-mile long, 240 foot-wide swath of power lines installed by Georgia Power will permanently alter the scenic beauty of the land, he said.
“(The property) is like a diamond up in northern Hall County,” Terry said. “What Georgia Power has done is put a crack in that diamond. It will never be as valuable. Whatever money you award, our client would rather give it back and never have this power line here.”
Georgia Power attorney Doug Henderson told jurors the company is wrongfully maligned for condemnations like the one at Glade Farms.
“We get bashed over this,” Henderson said. “Do we go out and put lines wherever we want? No. We put them in the best location we can.”
Henderson told the jury they should consider the worth of the property at the time it was taken by Georgia Power in November 2007, and not rely on speculation as to how it might be developed.
“The idea that we’re destroying this property that hasn’t been developed is just not backed up by the evidence,” Henderson said.
The jury of seven women and five men took about 90 minutes to reach its verdict at the conclusion of the five-day condemnation trial.
Afterward, Glade Farms property manager Carl Nichols, a close friend and business associate of the Goess-Saurau family, said he was satisfied with the verdict.
“The jurors were very attentive and did their job,” Nichols said. “It shows the system we have in place is quite adequate. We commend the jury for the job they did and we accept the number they gave us.”
Nichols said he hopes the proposed reservoir, stalled by the ongoing tri-state water wars, would get the needed state and federal permitting this year. |
ATK (football club)
ATK (previously known as Atlético de Kolkata) is an Indian professional football club based in Kolkata, West Bengal, that plays in the Indian Super League under licence from the All India Football Federation (AIFF). It was established on 7 May 2014 as the first team in the Indian Super League, and plays its home games at the Vivekananda Yuvabharati Krirangan; also known as the Salt Lake Stadium.
The team is owned by Kolkata Games and Sports Pvt. Ltd. which consists of former Indian cricket captain Sourav Ganguly, alongside businessmen Harshavardhan Neotia, Sanjiv Goenka and Utsav Parekh. Initially for first three seasons, Spanish La Liga club Atlético Madrid were also a co-owner, later Goenka bought the shares owned by Atlético Madrid. After the end of their partnership with Spanish giant, Atlético de Kolkata has been rechristened to ATK in July 2017. The team's name and colours are derived from their former Spanish partner.
Under coach Antonio López Habas, Atlético hosted and won the first match of the Indian Super League. They won the inaugural season, beating Kerala Blasters 0–1 in the final. Two years later, under José Francisco Molina, the team won on penalties against the same opponent in the final. Currently, ATK holds the most ISL trophies along with Chennaiyin FC.
History
Foundation
In March 2014, it was announced that the All India Football Federation, the national federation for football in India, and IMG-Reliance would be accepting bids for ownership of eight of nine selected cities for the upcoming Indian Super League, an eight-team franchise league modeled along the lines of the Indian Premier League cricket tournament. On 13 April 2014, it was announced that Sourav Ganguly, Harshavardhan Neotia, Sanjiv Goenka, Utsav Parekh, and Spanish La Liga side Atlético Madrid had won the bid for the Kolkata franchise. It turned out to be the most expensive franchise, being purchased for 180 million (around US$3 million). On 7 May 2014, the team was officially launched as Atlético de Kolkata.
Inaugural season
The club signed their first player on 4 July 2014 with the acquisition of former Real Madrid midfielder Borja Fernández. The team then went on to sign two more Spaniards: their first head coach, Antonio López Habas, and marquee player, former UEFA Champions League winner Luis García, on 8 July 2014. Luis García was named the first marquee player of the season.
The first Indian signing by the club took place in round one of the 2014 ISL Inaugural Domestic Draft in which Atlético de Kolkata selected Cavin Lobo, midfielder for the city's I-League team East Bengal FC, with their pick. They were the biggest spenders in the draft with an expenditure of 39.1 million, their biggest signing being Sanju Pradhan for 7 million. In the International Draft, four of Atlético de Kolkata's allotted seven picks were Spaniards, including defender Josemi, a UEFA Champions League winner with Liverpool in 2005. On 6 September, the team bolstered their midfield with the acquisition of Mamunul Islam, captain of the Bangladesh national team, who stated that the move would help relations between East Bengal (Bangladesh) and West Bengal.
The club played their first match on 12 October 2014 at home against Mumbai City FC in the opening Indian Super League match. Fikru Teferra scored the first goal in team and league history in the 27th minute as Atlético de Kolkata went on to win 3–0.
By finishing third in the league, the club qualified for the end-of-season play-offs, where they advanced via a penalty shootout past FC Goa in the semi-finals after a goalless draw. At the final against the Kerala Blasters at the DY Patil Stadium in Mumbai, Atlético won 1–0 with an added-time goal by Mohammed Rafique. At the end of season awards, García was named the Most Exciting Player.
2015 season
On 5 June 2015, the team acquired Canadian international forward Iain Hume, whose five goals had helped Kerala to the final of the previous season. In the second season's domestic draft, Atlético de Kolkata had the first pick, choosing Pune F.C. goalkeeper Amrinder Singh for a fee of 450,000; their most expensive purchase was that of defender Augustin Fernandes for 2.6 million. On 29 July, with García released due to his injury record, the team brought in Portugal international forward Hélder Postiga as their new marquee player; aged 32, he became the youngest such player in the league. García's role as captain was taken on by his compatriot Borja.
Postiga scored twice in Atlético's first game of the season, a 3–2 win at Chennaiyin FC, but was substituted later in the match due to injury, and missed the rest of the campaign. Pelé, regarded as one of the greatest footballers of all time, watched the 2–1 win over Kerala at the Salt Lake Stadium on 13 October, Atlético's first home game of the season. Hume scored two hat-tricks in November, in 4–1 wins against Mumbai City, and FC Pune City. The latter result made the team the first to qualify for the play-offs, where they lost 4–2 on aggregate to Chennaiyin.
2016 season
In March 2016, it was reported that López Habas would leave the club due to concerns over his ₹23.5 million ($350,000) annual salary. On 25 April, he left for Pune. On 3 May, he was replaced by another Spaniard, former Villarreal manager José Francisco Molina. Postiga returned to be the marquee again, but suffered another long-term injury early into the second game of the season. The club's ownership admitted that they had wanted a different marquee due to his record, but had been unable to sign one.
Atlético de Kolkata finished in fourth place, taking the final position in the finals, and were drawn against first-place Mumbai in the semi-finals. They hosted a 3–2 win in the first leg, with all goals in the first half, including two by Hume, and advanced with a goalless draw in the second leg. In the final, away to Kerala on 18 December, Kolkata fell behind to a goal by their former player Mohammed Rafi, and equalised before half-time with a header by defender Henrique Sereno. The game went to penalties, with Hume having Atlético's first attempt saved by Graham Stack, but Elhadji Ndoye missed for Kerala and Debjit Majumder saved from Cédric Hengbart to win Kolkata the title.
2017–18 season
After the separation from Spanish club Atlético Madrid, most of the squad was not retained for the new season. On 14 July 2017, ATK appointed former England international striker Teddy Sheringham as their head coach for the upcoming season. While former Bengaluru FC head coach Ashley Westwood was appointed as the technical director for the club. On 4 August, the team acquired former Irish international forward Robbie Keane as their new marquee player.
On 24 January 2018, Sheringham was sacked by ATK after winning only three of his ten games in charge and appointed Ashley Westwood as their interim coach. For the first time in four years the club could not make it to the playoffs, but avoided last place by registering a 1–0 win over NorthEast United FC in the final game, Robbie Keane netting the deciding goal.
Robbie Keane was named the player-manager for the upcoming cup fixtures and they started their Super Cup campaign with a 4–1 win over I League club Chennai City FC, but failed to make it to the quarter-finals after a 3–1 defeat against FC Goa.
2018–19 season
After a forgettable season, ATK appointed Sanjoy Sen as their mentor to recruit national players. The former Mohun Bagan A.C. head coach roped in some of his own former players who he had the experience of working with, along with former ATK players Arnab Mondal and Cavin Lobo. They mainly focused on more local players and it served as the main foundation for building the squad for the season. Former Manchester United F.C striker Steve Coppell was named as the head coach for the season. Coppell had the experience of managing ISL clubs before such as Kerala Blasters FC and Jamshedpur FC. Under him the team finished 6th in the league winning 6 games.
In the Super Cup the team reached the semi-finals. They defeated Real kashmir F.C 3–1 on their way to finish 4th.
2019–20 season
Crest
On 7 July, the team's jersey and logo were unveiled by West Bengal Chief Minister Mamata Banerjee at the Nabanna building, temporary headquarters of the state's secretariat. The logo features a hybrid Bengal tiger–phoenix, with the latter element being symbolic of perpetuity, due to the footballing heritage in Kolkata. Five stars above the crest symbolise the five owners of the club. The shield is striped with tigers' stripes.
Stadium
The 85,000-capacity Salt Lake Stadium is the home ground of Atlético de Kolkata. The multi-purpose stadium, located in Salt Lake City (Bidhan Nagar), in the outskirts of Kolkata, is the largest stadium in the country. The Salt Lake Stadium is owned by the West Bengal State Government. Salt Lake Stadium, officially known as Vivekananda Yuba Bharati Krirangan (VYBK), is the largest stadium in India by seating capacity. Before its renovation in 2011, it was the second largest football stadium in the world, having a seating capacity of 120,000. Prior to the construction and opening of Rungrado May Day Stadium in 1989, it was the largest football stadium in the world. The stadium hosted the final match of the 2017 FIFA U-17 World Cup, alongside hosting other matches of the tournament.
Atlético de Kolkata played their first two seasons at Salt Lake Stadium, but in the 2016 season, they had to move to Rabindra Sarobar Stadium due to the unavailability of Salt Lake Stadium, which was shortlisted as one of the venues for the 2017 FIFA U-17 World Cup. During the first season Atlético de Kolkata has achieved an average home attendance of 45,172 per match and most attended game of the season with 65,000 people.
During the second season, 405,659 people attended the home matches of Kolkata (most by any club in that season) with an average of 50,707 per match, and they held the most attended game of the season for the second year in a row with 68,340 people. During the third season, an average of 11,703 people per match attended the home matches of Kolkata.
The fourth season saw a formidable decline in the average attendance in the home matches of Kolkata due to the low capacity of Rabindra sarobar stadium. The lowest attendance count was 3,165 whereas the highest was 32,816. In their nine home games ATK managed to pull an average attendance of just 12,629.
Supporters
Atlético de Kolkata, and the ISL in general, were initially announced with a mixed reception among football fans in Kolkata. Some locals feared that it could overshadow the development of players at the city's two long-established I-League clubs, while others saw the new franchise as a way to unite both sets of I-League supporters, who would be drawn together further by the involvement of Ganguly, who is idolised across the state.
Ahead of the second season, the franchise accredited the ATK Fans Fraternity (ATKFF), whose ₹800 membership includes a home season ticket and an official jersey. The fraternity offered 4,000 memberships in an exclusive part of the stadium. Firstpost journalist Pulasta Dhar described it as a "brilliant" deal which could be replicated in order to help all ISL clubs fill their stadia.
Atlético Madrid have also engaged with the ATK support: in September 2015, their striker Fernando Torres sent a video message to the fans in India.
Ownership and finances
The Kolkata Games and Sports Pvt. Ltd is a consortium established to oversee the administration and operations of ATK of the Indian Super League. The consortium is made up of former India cricket captain Sourav Ganguly, businessmen Harshavardhan Neotia, Sanjiv Goenka, and Utsav Parekh.
The club's initial sponsors were Indian telecommunications corporation Aircel, while its partners were Kolkata-based underwear brand Lux Cozi and insurance firm Apollo Munich. In October 2015, Kolkata-based Birla Tyres agreed a deal to be the principal sponsors for the club's second and third seasons.
Players
Current squad
Other players under contract
Out on loan
Current technical staff
More:List of ATK managers
Management
Statistics and records
* Super Cup was announced in the 2017–18 season onwards.
Most appearances for the club – Borja Fernández (47)
Top goalscorer for the club – Iain Hume (18 goals)
Kit manufacturers and shirt sponsors
Honours
Domestic
Indian Super League
Winners (2): 2014, 2016
See also
List of ATK players
List of ATK records and statistics
List of football clubs in Kolkata
List of Indian Super League records and statistics
References
External links
Official page on the Indian Super League website
Category:Association football clubs established in 2014
Category:Football clubs in India
Category:Football clubs in Kolkata
Category:Football clubs in West Bengal
Category:Indian Super League teams
Category:2014 establishments in India
Category:ATK (football club) owners |
Q:
Setting properties to a class in a loop overwrites the last properties
I am trying to set new properties to a class at runtime and attaching a lambda which behaviour depends on some property specific data. If I set the properties in a loop, as in class B, the first property gets overwritten. While setting them sequentially works. Can't find the problem. There is mention in other question that I should use __getattr__ instead of properties, as in link. But I would like to understand what the issue here.
import time
class A():
def __init__(self, dynprops = ['a', 'b']):
setattr(A, 'a', property(lambda x: self.print_prop('a')))
setattr(A, 'b', property(lambda x: self.print_prop('b')))
def print_prop(self, dynprop):
print(time.time(), dynprop)
class B():
def __init__(self, dynprops = ['a', 'b']):
for prop in dynprops:
setattr(B, prop, property(lambda x: self.print_prop(prop)))
def print_prop(self, dynprop):
print(time.time(), dynprop)
a = A()
print(a.a)
print(a.b)
b = B()
print(b.a)
print(b.b)
gives
>> 1481137121.6755576 a
>> None
>> 1481137121.6756482 b
>> None
>> 1481137121.6757774 b
>> None
>> 1481137121.6758344 b
>> None
A:
It happens because prop is changed to 'b' and then stays like that. The lambda function returns the current value of prop, not the value that was assigned to it during the creation of the lambda. To avoid this behaviour you should use a closure:
class B():
def __init__(self, dynprops = ['a', 'b']):
for prop in dynprops:
setattr(B, prop, property(self.printer(prop)))
def print_prop(self, dynprop):
print(time.time(), dynprop)
def printer(self, prop):
return lambda x: self.print_prop(prop)
|
Drug-induced alterations in the efflux of 5-hydroxytryptamine and of 5-hydroxyindoleacetic acid into superfusates of the rat spinal cord.
The effect of dl-p-chloroamphetamine, fluoxetine and probenecid on the efflux of endogenous 5-hydroxytryptamine (5HT) and 5-hydroxyindoleacetic acid (5HIAA) into superfusates of the spinal cord of anesthetized rats was examined. Mean basal efflux of 5HT and 5HIAA was 0.27 and 15.56 ng/ml superfusate, respectively. The addition of dl-p-chloroamphetamine to the superfusate produced a dose-dependent increase in the efflux of 5HT into the superfusate, but did not increase the efflux of 5HIAA. Probenecid (200 mg/kg i.p.) increased the basal efflux of both 5HT and 5HIAA as compared to control values. When administered systemically, fluoxetine (10 mg/kg i.p. or s.c.) decreased the basal efflux of 5HIAA, but did not alter the basal efflux of 5HT as compared to control values. In contrast, when administered in the superfusate, fluoxetine produced a dose-dependent increase in the basal efflux of 5HT, but did not alter the basal efflux of 5HIAA. The release of 5HT produced by the addition of 2.5 X 10(-4) M dl-p-chloroamphetamine to the superfusate was not prevented in rats pretreated systemically with fluoxetine, although when administered in the superfusate fluoxetine inhibited the dl-p-chloroamphetamine-induced release of 5HT. |
1. Field of the Invention
The present invention relates to container structures and more particularly pertains to an arm supported drinking container for supporting a quantity of fluid relative to a limb of an individual.
2. Description of the Prior Art
The use of container structures is known in the prior art. More specifically, container structures heretofore devised and utilized are known to consist basically of familiar, expected and obvious structural configurations, notwithstanding the myriad of designs encompassed by the crowded prior art which have been developed for the fulfillment of countless objectives and requirements.
Known prior art container structures include U.S. Pat. No. 5,301,858; U.S. Pat. No. 5,167,354; U.S. Pat. No. 5,244,114; U.S. Pat. No. 5,104,008; U.S. Pat. No. 4,955,572; and U.S. Design Pat. No. 330,993.
While these devices fulfill their respective, particular objectives and requirements, the aforementioned patents do not disclose a arm supported drinking container for supporting a quantity of fluid relative to a limb of an individual which includes a container having an arcuate inner side wall positionable along an exterior of a human limb, a plurality of securing straps extending from opposed sides of the container for securing about the limb to mount the container relative thereto, and a dispensing valve mounted relative to the container for permitting dispensing of fluid therefrom during a physical activity.
In these respects, the arm supported drinking container according to the present invention substantially departs from the conventional concepts and designs of the prior art, and in so doing provides an apparatus primarily developed for the purpose of supporting a quantity of fluid relative to a limb of an individual. |
Monday, February 22, 2010
Analysis of a (Real) Spy Movie
Let me preface this analysis with two preliminary points.
First, anybody who knows me knows that I read lots and lots of espionage novels (and even some intelligence and espionage-related non-fiction). Just take a look at my LibraryThing catalog and you’ll see that a large proportion of my reading is in the area of espionage fiction (and a favorite series by Daniel Silva involves Israeli assassin Gabriel Allon). And that’s been the case since my early teens. Thus, I think that it’s fair to say that I’ve read a lot of espionage novels (not to mention seen quite a few movies, too) and have, over the years, built up a casual knowledgebase (though no actual experience). For that matter, I’ve also tried my hand at writing espionage fiction (though with the exception of a short story written in college, most of my efforts have bogged down, much to my own disappointment).
Second, I’m a student of the Israeli-Palestinian conflict. In college, I studied extensively in the area (including writing my senior thesis on “Use of Israel as a Policy Surrogate for US Actions”; I got a very good grade from a very pro-Palestinian professor). In addition to the espionage books that I read, I also read a fair number of history or political science books on Israel and the conflict, and a far, far larger set of scholarly (and not-so-scholarly) articles on the subject. I’ve also used this blog to write quite a bit about Israel and the Israel-Palestinian conflict. So, here too, I think that I can legitimately claim to have at least a decent working understanding of the issues, the players, and the objectives.
Anyway, by now you’ve probably seen (or at least heard about) the video posted by police authorities in Dubai that claims to show an 11-member assassination squad stalking and eventually killing Mahmoud al-Mabhouh, a high-ranking member of Hamas, who had traveled to Dubai (on a false passport) allegedly to purchase arms from Iran. As I watched the video I thought back to my understanding of how operations like this are or should probably be carried out. I also thought about what the respective players had to gain from this particular assassination carried out in this particular way.
So get yourself some popcorn and watch the video (be aware that the video is 27 minutes; that’s why I suggested the popcorn). If nothing else, it is entertaining. As you watch, see if anything strikes you as odd or if there are any issues that you think are left curiously unresolved. Come back when you’re done and I’ll walk through an analysis of some of the more interesting parts of the video. [Update 2/24/2010: The video link from Gulf News TV that was embedded below and all across the web has, without apparent explanation, been shortened from 27 minutes to 1:46; it now consists just of a few “highlights”. I’m trying to find a new link to the full video. In the meantime, it may be worth asking why the full video has disappeared, especially given the attention that the original video and the assassination have garnered.]
Are you back? Good. Did you “enjoy” the video? Any quick thoughts on whether you agree with the analysis of Dubai’s police authorities? Any problems jump out at you?
One more thing before I jump into the analysis itself. Do I feel bad for al-Mabhouh? Nope. He was a known and wanted terrorist. If you play in that particular sand box, you should pretty much know that those whose wives and kids you try to kill probably don’t think real highly of you and might kick a little sand your way. Do I think that this kind of assassination is wrong? Again, nope. A clinical and clean operation like this is much better than dropping a bomb on al-Mabhouh’s house and risking harm to innocent civilians. Targeted assassinations have their place.
With that all having been said, let’s look at the video:
0:10: It is worth noting right away that the video uses the word “murder” throughout. Later in the video, we are told that there is “proof” that al-Mabhouh was murdered and did not die naturally (as was initially reported). However, that proof is not clearly identified (at least not in the video; other sources have since had more to say). Moreover, to the extent that al-Mabhouh was, in fact, a terrorist (or member of a terrorist organization), then might it not be more accurate to describe his death as a “killing” (in the military sense of the word) rather than ”murder”? If a solider shoots at another soldier and kills him, is that a murder? So if an intelligence organization (and we’ll presume for the moment that the “killers” are from an intelligence organization) kills a terrorist who is trying to buy arms to kill civilians, then why should that death be “worse” than the soldier killed in combat?
0:28: At least the Dubai police acknowledge that al-Mabhouh was a “senior Hamas military commander” and a founder of the al-Qassam Brigades (the charming chaps who launch rockets from Gaza into southern Israel). The claim is also made that there were failed attempts to assassinate al-Mabhouh in the past and the clear inference, without it being said outright, is that Israel was responsible for these failed attempts. Apparently, this information comes from al-Mabhouh himself in an interview with al-Jazeera (and if a terrorist said it, then it must be true, right…), though one wonders how exactly al-Mabhouh knew that it was Israel that had tried to kill him.
0:42: While the film does show quite a few interesting things, it is permeated with conjecture. For example, we are told that the “murder was carried out by a professional team that is highly skilled in these kinds of operations”. The basis for this allegation is the “fact” that “there were no traces left behind that could help uncover their identities”. Um, really? First, didn’t we just watch 27 minutes of video where we can see the faces of the members of this “highly skilled” team? And didn’t the Dubai authorities manage to track down their respective passports quite quickly? You’d think (and I’ll come back to this theme regularly) that if these assassins were so good at their job, that the Dubai police would never have been able to pick them out from the crowd in the first place. Plus, it is worth noting that just because a group is able to successfully accomplish a complicated plan, doesn’t necessarily mean that the group is either professional or highly skilled. All it means is that the plan worked.
0:50: We’re told the team used “special communications devices”. Like, what? Cellphones? Walkie talkies? How do the Dubai police know that the “devices” were in any way special and not just toys from Radio Shack? The fact that this claim is made repeatedly seems designed to lend credence to the “highly skilled” and “professional” allegation at the heart of the analysis of the Dubai police.
1:06: Remember about 20 seconds ago when we were told that the “professional team” that was “highly skilled” left no traces? Then how is it that Dubai’s police were able to “track the killers and identify them within 24 hours” (emphasis added)? That seems to call into question that whole “professional” and “highly skilled” allegation, not to mention the claim that no traces were left. Note too that this is being referred to as a “crime”.
2:00: Have you ever read any kind of espionage novel written in the last 10 years or so? One thing that you will almost always read about is the efforts that the protagonists (or antagonists, as the case may be) go through not to have their faces visible on cameras. They will wear a hat, or turn their head slightly, or raise a hand to cover a “cough” or raise a newspaper in front of their face; anything to avoid having their face clearly seen on camera (but while still managing to look natural). Watch Michael (or is it James?) right at the 2:00 mark. He almost looks right at the camera; he certainly does nothing to avoid the camera. Ah, but maybe he didn’t know the camera was there, you say. Well, if this team was as “professional” and “highly skilled” as Dubai wants us to think they were, then shouldn’t they have known where the cameras were? If they were so professional “in these kinds of operations” don’t you suppose that they would have done a “dry run” to try to learn about the type of security (including cameras) that would need to be avoided? It seems to me that one of the distinctions between highly skilled and … um … amateurish? … is the advanced knowledge and planning put into the operation to be sure that simple mistakes like being seen by a camera are minimized.
2:03: Gail allows her face to be clearly seen by the video camera at the airport not once but twice.
2:12: Michael and James again allow their faces to be seen by the video camera. They make small efforts not to look right at the camera, but it would have been easy for them to simply turn their backs to the camera so as not to be so easily seen. I don’t suppose that some of the members of this team actually want to be identified, do they?
2:33: It would have been hard for Gail to do a better job of looking at the camera without being obvious about it. So, at 2:38, she does it again, just in case.
3:01: What made the phone calls “suspicious”? The mere fact that they went to Austria? Note that Dubai’s police only speculate as to what those numbers were. Given the other detail presented, it seems somewhat strange that no more information about those telephone numbers was readily available. In addition, if the team were so “professional” and “highly skilled” why would they make numerous calls to different numbers in the same country? If it was to some kind of command center, couldn’t the destination of those calls be traced? Wouldn’t it make more sense for the calls to have been placed to vastly different destinations from which they were routed to their actual destinations? Dubai’s police also tell us that it is “probable that highly encrypted systems were used to communicate” but no explanation regarding this statement of probability is provided. I wonder if this statement was designed simply to make us wonder about the ability of Dubai’s police to monitory regular communications in the emirate.
3:19: This is the first time that we’re shown Gail’s passport photo. Does that look like Gail to you?
3:55: When Peter arrives, we’re told he is carrying a “suspicious bag”. What about the bag was suspicious?
4:33: We’re shown Peter returning to the airport and we’re told that he “meets with a team member”. Look closely at what you see on the video. Peter indeed returns to the airport (though it is impossible to read the time stamp to know for sure that this clip of Peter in the airport indeed follows the previous clip). But note that at 4:41 (when we first see Peter again) he appears to be reading a piece of paper in his hand and the other man (identified simply as a “team member”) seems to stop and point at the paper. I suppose that one interpretation of this could be that Peter met with a team member; then again, it is just as likely that Peter was looking at the paper for information about, say maybe, the name of his hotel, and a helpful passerby stopped to aid Peter. Who knows? But it is important not to read operational activities into every single movement of every single person, especially as that can lead to snaring people who may not even be related to the operation. Does is seem likely that two operatives would meet in plain view of a camera, especially a rotating camera that would have missed their meeting had they waited just a few seconds more (unless that is they wanted to be seen together)? It is also worth noting that we’re next told that the suspects left in different directions; wouldn’t that also be consistent with unrelated people leaving the airport?
5:11: Here we see a photo of Peter entering a hotel. One thing jumped out at me in this photo. Notice that sweater tied around his shoulders? I went back and looked at the video of Peter in the airport where he is also wearing the sweater. If an agent was trying to look inconspicuous, would tying a brown sweater around a white shirt in a desert country accomplish that goal? In fact, Peter’s outfit makes it quite easy to spot him. I wonder why? At least he appears to look a little bit away from the camera as he enters the hotel (and at 5:24 he does a good job of looking down as the camera takes his picture).
5:28: Next we see Peter leaving the hotel and going shopping. Boy that striped shirt is inconspicuous, too. I will say that Peter does a pretty good job of keeping his face away from the cameras.
5:48: “Three suspects” arrive at the shopping center. I do find it interesting that some of the subjects are named (and later 11 passport photos are shown) but several times we’re simply referred to subjects. How do they link these random people to the 11 passports? And note that none of the 3 seems to do anything to avoid the camera, especially the “suspect” on the right in the blue shirt who almost looks right at the camera.
5:53: Next Kevin and Gail arrive at the shopping center. This seems like a good place for another quick aside: Would you have been able to identify that woman as Gail if you hadn’t been told it was her? She seems to be wearing a scarf (as Gail was when she checked into the hotel) but her pants are now white, her hair is now loose, and it appears lighter (maybe). The real issue to take note of is the quality (or lack thereof) of the facial recognition software being used by the Dubai police. Clearly the police could not (certainly not in 24 hours, and probably not even in a month) have looked at every second of every piece of CCTV (closed circuit TV) footage from throughout Dubai. So either the police had information of which camera feeds to look at or relied upon facial recognition software to help identify suspects on different video feeds. Of course the question then becomes how good that software is and how many false positives (or negatives) are generated? Is that really Gail? Who knows?
6:01: Gail leaves the shopping center. Again, is that Gail? How do we know? We don’t see her face. And to me it looks like her hair is slightly different again and the color of her top seems to have shifted slightly (though her purse looks like it might be the same). Maybe it’s just the light; maybe that isn’t Gail at all.
6:10: Kevin leaves with a suspect. But all we really see is two men leaving the shopping center at the same time. Are they together? And is the fact that the guy in the blue shirt leaves at the same time as Kevin the reason he was targeted as a suspect in the first place? If so, doesn’t that call into question whether the two men he walked in with are actually suspects themselves? Note that the video clip stops before we see where Kevin and the other man go. Do they both get in that cab? Do they walk different directions? We’re not shown that piece of information.
6:15: Two suspects leave. I note that when these two leave, we do see their faces, but we didn’t see the faces of Gail, Kevin, or Mr. Blue Shirt. Whys is that? One more question: Why did five alleged suspects go to the mall? Remember, they supposedly have “special communications devices” that are probably “highly encrypted”; so why would they need to meet up in the first place? Unless, of course, the goal was to be seen together.
6:23: When Kevin checks out of the hotel, note the inconspicuous shopping bag that he carries. Yep, if I’m off to do dirty spy stuff, I’d carry around a big white shopping bag with a bright stripe on the side. One other thing to take note of and this is a pretty good time to do so. We see quite a lot of interaction between the “suspects” and hotel staff members. What language did the suspects speak? Did they have accents? Those seem like pretty important bits of information and nothing is said about any of that. Hmm.
6:52: We’re shown “before and after” photos of Kevin. Is the dark-haired man actually Kevin? It’s hard to tell. I mean a light blue shirt and blue blazer are pretty unusual clothing choices, right? How many of you reading this have a blue shirt and a blue blazer? If Kevin really wanted to change his appearance, don’t you think it likely that he’d change shirts? Or lose the jacket (or even have a reversible jacket)? Is this “disguise” really the best these “highly skilled” “professionals” can do?
6:58: At least these guys manage to avoid looking right at the camera.
7:15: “Two of the suspects” … again with the unnamed suspects whose faces we can’t see. But hey, they did walk into a hotel that Kevin walked into, right? I mean, that is suspicious…
7:18: This is one of those little jumps in logic that we’re expected to simply accept: “A suspect from the surveillance team [how do they know he’s a suspect or part of the surveillance team] arrives at another location [um, isn’t this the same guy that just walked into the hotel that Kevin walked into? same blue hat…] anticipating the arrival of the victim [note: not terrorist, but “victim”], as he was known to frequent this hotel [how and why was he known to frequent this hotel; for that matter, why was Dubai allowing a known terrorist to “frequent” anywhere in Dubai?]. He leaves after it is confirmed to him that the victim has checked into another hotel.” OK, wait one minute. How do the Dubai police know that he left “after it is confirmed”? And how do they even know that “it is confirmed” in the first place? This is one of those places where Dubai’s police have made guesses — perhaps educated and perhaps correct — but guesses nevertheless for which no evidence is offered.
7:55: Now this is interesting. Gail checks out of her hotel room. OK. But note that her hair has now been pulled back again and she’s apparently changed from the brown top and white pants she wore to the mall back to the pantsuit that she wore when she arrived. Odd? It also seems like somewhat unusual behavior for people to be checking in and out of hotels so quickly. That seems like the kind of thing that authorities might actually be monitoring (especially for foreigners who have to show their passports).
8:05: Another of those mysterious, unnamed suspects whose face is not seen.
8:08: Peter arrives in a rented car with a driver. First, why hire a driver? Doesn’t that add another person with whom the operative would have come in contact with? Did the Dubai police interview the driver? What did he tell them about Peter?
8:30: Let’s go with the presumption that this is a surveillance team at the airport. But if my job is to surveil, shouldn’t I be inconspicuous instead of wearing a colorful shirt and (at 8:48) kicking my legs in a way bound to draw attention to me? This guy couldn’t possibly be just another bored person waiting at an airport…?
9:15: Gail’s “disguise” is even worse than Kevin’s. All she did was put on a black wig. Same clothing, same bags. Ooh, I’m so confused. Go read an espionage novel. Read about agents doing all sorts of subtle things to change appearance (from cotton in their gums, to slightly different walks, to holding their shoulders differently, and the list goes on). And if the Dubai police were able to figure out these disguises so quickly, one might wonder what the point of the disguise was in the first place. And why is it that only Kevin and Gail use disguises?
10:00: This is one of the more interesting segments of the film and one of the few that really does look like surveillance of al-Mabhouh. It is hard to identify any other purpose for what these two tennis players are doing wandering around the second floor elevator lobby. But note that at 10:30 we can only presume that the blue-shirted tennis player walked past al-Mabhouh’s room to try to find the room number. That seems like a good guess, but still. The Dubai police have interestingly not told us that these two tennis players were staying in another hotel or another floor of this hotel. If they were staying at this hotel (especially on the second floor), might the entire sequence here be viewed differently? And note that the video skips when blue-shirt he walks out of sight. How long was he gone? You’re analysis might be different depending on whether he spent 10 seconds or 10 minutes further down that hallway. How long does white-shirt spend in the elevator lobby waiting for blue-shirt to return?
10:36: The surveillance team uses “special communications devices”. OK, first, what makes the device special? To me, presuming white-shirt guy is holding a communications device, it looks like a light-colored cell phone. Or maybe it was an asthma inhaler. It looked like he held it up to his face, not his ear. Maybe. And if he is a “highly skilled” “professional” why would he ever use that “special communications device” in any place where it could be seen on video?
11:15: Wait a minute! Are the tennis courts or athletic facilities on the same floor as al-Mabhouh’s room? Did the Dubai police do an investigation of whether white-shirt and blue-shirt played tennis at the hotel or whether they had even reserved a court? Again, those are the kinds of little facts that a “highly skilled” team would have thought through and which a thorough investigation would have examined.
11:18: “The room number and the one opposite is communicated to the rest of the team.” And we know this how? I thought that it was probable that those special communications devices were highly encrypted.
11:25: OK. So blue-shirt hangs out while white shirt goes outside and back in. Once again, look how inconspicuous that blue shirt is (not to mention the really ugly socks).
11:42: Um. If this is a surveillance team, why are they leaving?
12:39: Peter makes some phone calls from a hotel business center. I’m having a bit of trouble with this one. First, why use a hotel business center? If any phone is likely to be bugged by Dubai’s police, I’d rank that one pretty high on the list. And why use the same phone to make two calls that can then obviously be linked together? And what happened to throw away cellphones or those special communications devices? Furthermore, does anybody else find it odd that with CCTV virtually everywhere, there doesn’t appear to be a camera in the business center? Finally, I note (from the time stamp in the bottom left) that it only took Peter 8 minutes to make a hotel reservation (for a specific room; how did the team know it would be unoccupied?) and airline reservations including a stop. Have you ever tried to make a hotel reservation by phone? How about an airline reservation? How long did it take? 8 minutes for both?
13:04: I can’t think of a more inconspicuous set of outfits for a surveillance team to wear when standing around a luxury hotel lobby. That bright blue shirt and bright red shirt with great big bags would never be noticed by anybody. One of the basic concepts is to blend in, but it’s more than just blending in. The agent has to be so plain looking that if you were to see him (or her) now and again in 15 minutes, you wouldn’t recognize that you’d seen the person before. Now, would you recall seeing two guys hanging out in bright blue and bright red shirts?
13:45: Here is one of the most interesting (though very subtle) moments in the entire video. Kevin gets into a taxi. OK. Fine. But look at the guy who walks out of the hotel behind Kevin (in a black jacket and blue shirt). Why is his face blurred? The face of the doorman isn’t blurred. We’ve seen lots of “man on the street faces” so far, but why is this particular guy’s face blurred? As Arsenio used to say, “Hmm”.
13:48: Gail leaves with the “other suspects”. Are we convinced that these “other suspects” are people that we’ve seen before?
14:29: “The description of the victim’s car is communicated to the rest of the team.” Again, we know this how? First, there is nothing in the video to indicate time so we have no idea how long after al-Mabhouh left the hotel that red-shirt walked out the front door. Yes, red-shirt uses a cellphone (what happened to the special devices?), but in and of itself, I don’t think that tells us much.
14:36: We’re told that red-shirt “returns to his original position”. Again, how do we know? What was his “original position”? How do we know that is where he went? At least he does a decent job of keeping his hat low enough to obscure his face.
15:22: So how did the team make sure that the room opposite al-Mabhouh’s would be vacant? And would anybody really be so bold as to make a request for a particular, apparently non-descript, room? Wouldn’t that set of all sorts of red flags? “Um, gee, Mr. X, why is it that you want room 237”? And what would have happened if that room was occupied?
15:36: We’re told that Peter gives the room key to Kevin. But we don’t actually see this, do we?
15:54: Gail arrives with two big (inconspicuous) shopping bags. But she didn’t appear to have those bags when she got in the cab at 13:48. So are we sure these are the same person?
16:21: A “suspect” walks into the hotel with a blue hat. We’re told that he goes up to the room wearing a wig. On what basis do we know that he’s wearing a wig? Are we even sure it’s the same guy?
16:50: Gail leaves the hotel. OK, I can see that. But we’re told that she leaves to deliver bags to other team members in the parking lot. Again, we know this how? All we see is that she walks down the sidewalk and then returns without the bags. Sure, it’s a good presumption, but without additional video I’m not quite sure that all other possibilities are eliminated.
17:23: Oooh, the first “execution team”. You know the question to ask. By the way, note how casual these guys look but they do seem careful to keep their heads turned away from the camera.
17:45: Here’s team two! Again, watch how they keep their faces away from the camera (one guy even raises his hand to briefly cover his face). They look a lot more professional that the rest of the “highly skilled” team.
18:05: A new surveillance team arrives. One thing interesting about this is the fact that one member of this team appears to be a woman, yet the passports and information released by Dubai keep referring to an eleven member team with one woman. She manages to keep well hidden with that hat, but her “partner” is quite recognizable.
18:26: Those special communications devices are back. Do you see anything special? Go back and look in the woman’s hand when she walks through the revolving door. There’s something right there in her palm. Would she really hold her special communications device that obviously? And when the camera zooms in on her a few moments later, all I see is a woman on a cellphone who then adjusts her shirt or bra while her partner shields her from view. This is Dubai, after all. But anyway, would they really use their special communications device in the middle of the hotel lobby?
20:39: Another person with their face blurred. And this person spends some time talking to Kevin.
21:01: “Kevin signals the team”. Sorry, missed the signal. But what is it that Kevin is holding in his hand? Was this the attempt to change the door lock for al-Mabhouh’s room? In the elevator lobby?
22:15: I’m certainly willing to acknowledge that Kevin and Gail appear to be up to something as they loiter around the elevator lobby. But is that really the kind of surveillance and monitoring that you’d want? Wouldn’t it have been easier to put a small wireless camera in that plant in the corner? Certainly there have to be better ways to surveil an elevator lobby than having two operatives wander around talking on cellphones right in front of two cameras. And for that matter, shouldn’t they know where those cameras were and take steps to remain out of sight of the cameras?
22:30: “As the execution team acts”. Again, that’s one of those pretty big presumptions.
22:38: The Dubai police suggest that a way to gain access was by reprogramming the lock. But if the lock was reprogrammed, wouldn’t the report say that instead of an “attempt”? Second, if the team could reprogram the lock don’t you think that they’d be able to cover their tracks of having done so? And why just Kevin or Gail posing as hotel staff? Why not one of the other people allegedly in the room across the hall? For that matter, how do we know that the people in the room across the hall (if that' is where they were) didn’t just barge their way into the room as al-Mabhouh was opening his door? This whole thing about how to get into the room seems a bit overly complex, not to mention subject to a whole bunch of things that could go wrong. What if al-Mabhouh wasn’t alone; what if he refused to open the door; what if someone else was in the hallway; what if al-Mabhouh was on the telephone when the door was opened?
22:55: The murder has taken place. OK. And how do we know such an absolutely precise time of death? And it appears that things happened pretty quickly; I find it interesting to note that the alleged execution teams didn’t seem to take any time to interrogate al-Mabhouh before killing him. You know, maybe ask him questions about those arms purchases he was making in Dubai?
23:10: Did you notice that one member of the “execution team” is now wearing a glove or bandage on his hand? Don’t get too worked up over that; he was wearing it when he entered the hotel. I went back and looked.
23:19: Both execution teams wind up riding the same elevator. Sloppy. Very, very sloppy.
24:34: Does Gail look the same here as she did at any other point? Are we sure that Gail isn’t really an amalgam of several women?
24:43: Did you note that when the hotel staff opened the door to al-Mabhouh’s room it "was locked from the inside with the latch and chain in place” (emphasis added)? Interesting, no? What special device was used to accomplish that little trick?
24:51: Also, the initial cause of death was an “increase in blood pressure in the brain”.
25:33: Results “proved that it was a murder and not a natural death”. But all we’re given of that “proof” is a letter from a hospital in Arabic. Moreover, unless it’s just a case of poor wording, it appears that the General Department of State assigned teams to find out “how it was carried out” before they had the proof that anything had been “carried out” and that al-Mabhouh’s hadn’t died of natural causes.
26:00: This is another of the most interesting moments in the entire video (if not the most interesting). Remember how I’ve been talking about the operatives not doing a very good job to keep their faces away from the camera? Right. Watch Gail look directly at the camera and smile! And then, look closely at the face of the woman in the passport photo. Are those the same woman? (For that matter, I’m not sure that the woman in the passport photo isn’t really a man!) And why is this the only time that we see that particular camera angle (presumably of the hotel hallway). Did that camera never see any of the other members of the team? If not, why not?
27:17: A few things to note about all of those passport photos. First, while some of the photos looked like the people in the videos, several did not. Where, for example, are the guys in the “execution teams”? Maybe they’re pictured; maybe not. But where was that third surveillance team, you remember the one with a man and woman? I didn’t see their pictures. And some of those passport pictures were really clear photos. I guess that would be OK if you were wearing a really good disguise when the photo was taken.
Whew. I know. Quite a bit to digest. So what do we make of all this? I suspect that some kind of team of operatives did indeed go to Dubai and kill al-Mabhouh. I’m much less convinced that the entire operation was conducted in the way that Dubai’s police suggest and I’m really not terribly convinced that all of the people shown were involved and/or that others not shown weren’t also involved.
But the bigger question is not whether or how but, obviously, who. Who killed al-Mabhouh? The obvious answer is Israel and certainly that’s where fingers are pointing. But there are other possibilities, starting with the Palestinian Authority and/or Fatah not to mention Hamas itself or maybe even Egypt or Iran. So let’s take a few minutes and examine the possibilities.
First let’s start with the obvious choice: Israel. Clearly Israel has something to be gained by killing al-Mabhouh; after all, he’s wanted by Israeli authorities and he’s a known terrorist who has allegedly been involved in illegal weapons purchases to be smuggled into Gaza. That certainly seems reason enough for Israel to want al-Mabhouh dead. But query whether that is simply too obvious? A Hamas commander is killed, so who else would be the obvious assassin? But why would Israel go through the effort and risk to assassinate al-Mabhouh in Dubai? It would seem a lot easier to get him in, oh, I don’t know, maybe Gaza? Why put 11 or more Israeli operatives at risk, not just in a foreign country, but in an Arab country (and a fairly moderate Arab country friendly to the West), in order to assassinate this one guy? Imagine the problems that Israel would have faced had one of its operatives been captured or killed in Dubai? Imagine if al-Mabhouh had gotten off a lucky shot and killed a member of the team. Al-Jazeera would have loved that one.
We also (on the basis of books and films, not to mention history) have a picture of Mossad as being quite competent. Yet this operation, as I discussed above, was riddled with odd behavior if not outright errors. Is Mossad slipping? Or was this operation intended to look like it was carried out by Israel but actually conducted by operatives without the skill that has given Mossad its reputation?
Here are a few things to think about:
Why did the Dubai police look into al-Mabhouh’s death in the first place; after all, he was found dead of apparently natural causes in a locked room.
How were the Dubai police able to focus on the 11 alleged members of the assassination squad so quickly? It’s almost as if they were told where to begin looking (or simply to begin looking). Remember, they didn’t open his door until the next day, yet they claim to have discovered the 11 members of the team within 24 hours!
Why did so many of the agents (especially Gail in that last scene) seem to make such an effort to look directly at the cameras, rather than trying to keep their faces covered?
If Israel was behind the plot, why would the Mossad have used false passports bearing the names of real Israelis? After all, Israel goes to quite a lot of effort to keep its own people (not just Mossad agents) safe. Frankly, I find it odd that Mossad would use stolen identities in the first place (rather than well-crafted false identities that would stand up to initial scrutiny), let alone identities stolen from Israelis.
Why would Israel allow 11 agents to be subject to such scrutiny that they can likely never work outside Israel again? After all, Peter, Kevin, and Gail are probably pretty famous and well known to police around the world by now.
Was al-Mabhouh really such an important target that Israel would put together this kind of operation, taking these kinds of risks, making these kinds of mistakes, and risking the international condemnation that will no doubt follow?
So, if not Israel, who else might have something to gain from al-Mabhouh’s assassination? As a starting point, it is worth considering whether al-Mabhouh’s assassination was the goal of any other organization or country or whether he was simply the McGuffin to use to frame Israel as having done a “bad thing”. Nobody’s going to believe Israel bombing a plane or a bus, but people are certainly willing to believe that Israel might assassinate a terrorist.
What about the Palestinian Authority or Fatah? The PA and Fatah are practically in a state of civil war with Hamas. Might this have been a part of that civil war? Might this have been a veiled statement to Hamas that the PA and/or Fatah are willing to take the fight global? Then again, perhaps the assassination was part of a power struggle within Hamas. We know that the Syrian-based wing of Hamas and the Gaza-based wing don’t quite see eye-to-eye (especially after the Syrian leaders had the chance to watch their brothers in Gaza get pummeled by Israeli in January 2009). Egypt is itself struggling with Islamic extremism (the Muslim Brotherhood) and has been making a few half-hearted attempts to stop weapons smuggling through Egypt into Gaza. Might this assassination have been an attempt by Egypt to warn Hamas? Finally, Iran stands to gain from any further incitement to violence in the Middle East, both in terms of actual conflict between Hamas or Hezbollah and Israel and in terms of the focus of world attention on Israel and away from Iran’s nuclear weapons program. Or perhaps Iran and al-Mabhouh had a falling out over the arms sales.
One other point worth noting: It has been reported by several sources (though curiously the report is not repeated anywhere near as often as the claim that Israel is responsible) that “[t]wo Palestinians alleged to have provided logistical support to the operation are in custody in Dubai”. Palestinians providing logistical support to an Israeli assassination team? Interesting.
Right now, it seems that there is a rush to judgment to presume that the operation was carried out by Israel. Perhaps it was, though if so, I must say that I’m less impressed with Mossad’s operational skill and technique than I’d anticipated I would be. On the other hand, there are just enough little questions floating around to make me wonder whether this whole operation was put together either by someone else who wanted al-Mabhouh dead or who wanted Israel to take the fall for an assassination. Of, if we want to get really cynical, the operation could have been undertaken by Israel in a way that would divert suspicion off of Israel and onto someone else (“Gee, if we’re real sloppy, no one will seriously believe that we did it…”). Of course, once you start down that road of reasoning there is no stopping.
I’m not saying that Israel didn’t do it. I don’t know; maybe Israel did. But there are just enough odd things, just enough questions, just enough sloppiness, to make one wonder whether Israel is responsible and sloppy or whether someone else wants us to think that Israel was responsible.
It will be interesting to see how this whole investigation plays out. It will be interesting to see how forthcoming Dubai is with additional facts that “prove” the case. If nothing else, it makes for a pretty interesting spy movie.
Twitter Updates
Although I shouldn't have to say it, any opinion expressed herein is solely that of the author and is not necessarily representative of any association or organization with which I may be affiliated or involved or any company by whom I am employed. My employers expressly disclaim any responsibility for or involvement in my posts and I think them giving me the freedom to offer my thoughts and express my feelings via this blog. |
/**
* @public
* @description Start all services
* @returns {Promise} - Resolve when all services are started.
* @example
* service.startAll();
*/
async function startAll() {
return Promise.all(Object.keys(this.getServices()).map((serviceKey) => this.start(serviceKey)));
}
module.exports = {
startAll,
};
|
Role of frizzled 7 in the regulation of convergent extension movements during gastrulation in Xenopus laevis.
Wnt signalling plays a crucial role in the control of morphogenetic movements. We describe the expression and functional analyses of frizzled 7 (Xfz7) during gastrulation in Xenopus. Low levels of Xfz7 transcripts are expressed maternally during cleavage stages; its zygotic expression strongly increases at the beginning of gastrulation and is predominantly localized to the presumptive neuroectoderm and deep cells of the involuting mesoderm. Overexpression of Xfz7 in the dorsal equatorial region affects the movements of convergent extension and delays mesodermal involution. It alters the correct localization, but not the expression, of mesodermal and neural markers. These effects can be rescued by extra-Xfz7, which is a secreted form of the receptor that also weakly inhibits convergent extension when overexpressed. This suggests that the wild-type and truncated receptors have opposing effects when coexpressed and that overexpression of Xfz7 causes an increased signalling activity. Consistent with this, Xfz7 biochemically and functionally interacts with Xwnt11. In addition, Dishevelled, but not (&bgr;)-catenin, synergizes with Xfz7 to affect convergent extension. Furthermore, overexpression of Xfz7 and Xwnt11 also affects convergent extension in activin-treated animal caps, and this can be efficiently reversed by coexpression of Cdc42(T17N), a dominant negative mutant of the small GTPase Cdc42 known as a key regulator of actin cytoskeleton. Conversely, Cdc42(G12V), a constitutively active mutant, rescues the effects of extra-Xfz7 on convergent extension in a dose-dependent manner. That both gain-of-function and loss-of-function of both frizzled and dishevelled produce the same phenotype has been well described in Drosophila tissue polarity. Therefore, our results suggest an endogenous role of Xfz7 in the regulation of convergent extension during gastrulation. |
He really has a chance to make the team. With Lou Williams already completing 3 years and dominating the summer league last year I doubt he plays this year. Could open up some minutes. Sixers are looking for a pg to replace Kevin Ollie. If they sign Josh Smith they don't have money to sign a solid backup and could get Gordon for cheap. He wouldn't really play. More of a guy to have in case Andre Miller or Lou suffer an injury. But I think whoever impresses the most on the summer league team at pg could get a spot because they need one for cheap.
Why would he sign to an agent after he went undrafted? He should've just went back to school and entered next year. Bad move IMO.
He wouldn't have been able to enter the draft next year. He would have had to pull a Randolph Morris and sign as a free agent.
Remember, Randolph Morris entered the draft after his sophomore season, didn't sign an agent (barely) and wasn't drafted, returned to school for his junior season (and had to sit out like 10 games), and then signed with the Knicks after Kentucky's season was over. He was playing the NBA before all the other junior could even enter the draft. |
<?xml version="1.0" standalone="no" ?>
<!DOCTYPE pov SYSTEM "/usr/share/cgc-docs/replay.dtd"><pov>
<cbid>CROMU_00011</cbid>
<replay>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>RqrHr = |"xDZ9rO","LZO","ofSx","nHl8","U0zff","5hEdKB","7P3fCl"|\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>TVo43MN = |"ofSx","7P3fCl","nHl8","5hEdKB","2DZD6S7BEN"|\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>TVo43MN@RqrHr\n</data></write>
<read echo="ascii"><delim>\n</delim><match><data>FALSE\n</data></match></read>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>fTAgk8 = TVo43MN ~ TVo43MN\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>MwZq2Yq = |"s6mEpG","pSSY","Nix7R","4sSEBpg","EEgcdr","3Hw"|~|"td1T7"|\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>ZPHeD = TVo43MN + TVo43MN\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>l1gsmZ = |"Cmdnid7","23gC","SN","KLgIR"|+|"KLgIR","H0ehW","q","y"|\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>rYYZIM = RqrHr - ZPHeD\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>oTk6q = fTAgk8 + TVo43MN\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>ReaFp6v = |"ya","krf","C","fi","mw5e3a"|~|"X"|\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>jDb2R = ReaFp6v + MwZq2Yq\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>wFxqaC = fTAgk8 - TVo43MN\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>ed8tTXE = |"ou","QKm","mXOH","Z5","UMi","NqX3i"|\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>CdOMC = |"mXOH","Z5","UMi"|\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>CdOMC@ed8tTXE\n</data></write>
<read echo="ascii"><delim>\n</delim><match><data>TRUE\n</data></match></read>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>jZL9Tu = rYYZIM - jDb2R\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>PeWdMD = fTAgk8 ^ CdOMC\n</data></write>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>.p\n</data></write>
<read echo="ascii"><delim>\n</delim><match><data>RqrHr = |"xDZ9rO","LZO","ofSx","nHl8","U0zff","5hEdKB","7P3fCl"|\n</data></match></read>
<read echo="ascii"><delim>\n</delim><match><data>TVo43MN = |"ofSx","7P3fCl","nHl8","5hEdKB","2DZD6S7BEN"|\n</data></match></read>
<read echo="ascii"><delim>\n</delim><match><data>fTAgk8 = ||\n</data></match></read>
<read echo="ascii"><delim>\n</delim><match><data>MwZq2Yq = |"s6mEpG","pSSY","Nix7R","4sSEBpg","EEgcdr","3Hw","td1T7"|\n</data></match></read>
<read echo="ascii"><delim>\n</delim><match><data>ZPHeD = |"ofSx","7P3fCl","nHl8","5hEdKB","2DZD6S7BEN"|\n</data></match></read>
<read echo="ascii"><delim>\n</delim><match><data>l1gsmZ = |"Cmdnid7","23gC","SN","KLgIR","H0ehW","q","y"|\n</data></match></read>
<read echo="ascii"><delim>\n</delim><match><data>rYYZIM = |"xDZ9rO","LZO","U0zff"|\n</data></match></read>
<read echo="ascii"><delim>\n</delim><match><data>oTk6q = |"ofSx","7P3fCl","nHl8","5hEdKB","2DZD6S7BEN"|\n</data></match></read>
<read echo="ascii"><delim>\n</delim><match><data>ReaFp6v = |"ya","krf","C","fi","mw5e3a","X"|\n</data></match></read>
<read echo="ascii"><delim>\n</delim><match><data>jDb2R = |"ya","krf","C","fi","mw5e3a","X","s6mEpG","pSSY","Nix7R","4sSEBpg","EEgcdr","3Hw","td1T7"|\n</data></match></read>
<read echo="ascii"><delim>\n</delim><match><data>wFxqaC = ||\n</data></match></read>
<read echo="ascii"><delim>\n</delim><match><data>ed8tTXE = |"ou","QKm","mXOH","Z5","UMi","NqX3i"|\n</data></match></read>
<read echo="ascii"><delim>\n</delim><match><data>CdOMC = |"mXOH","Z5","UMi"|\n</data></match></read>
<read echo="ascii"><delim>\n</delim><match><data>jZL9Tu = |"xDZ9rO","LZO","U0zff"|\n</data></match></read>
<read echo="ascii"><delim>\n</delim><match><data>PeWdMD = ||\n</data></match></read>
<read echo="ascii"><delim> </delim><match><data>\x3E </data></match></read>
<write echo="ascii"><data>.l\n</data></write>
</replay>
</pov>
|
Q:
any way to do an asynchronous put with astyanax for cassandra or hector?
I would like to stream some files in and out of cassandra since we already use it rather than setting up a full hadoop distributed filesystem. Is there any asynchronous puts in atyanax or hector that I provide a callback for when it is complete so I can avoid the 1 ms network delays for 1000 calls as I write 1000 entries(split between a few rows and colums as well so it is streamed to a few servers in parallel and then all the responses/callbacks come back when done streaming). Does Hector or astyanax support this?
It looks like astyanax supports a query callback so I think I can get with the primary keys to stream the file back with astyanax?
thanks,
Dean
A:
Cassandra doesn't actually support streaming via the thrift API. Furthermore, breaking up the file into a a single mutation batch that spreads data across multiple row and columns can be very dangerous. That could result in blowing the heap on cassandra or you may also run into the 1MB socket write buffer limit which under certain error cases can actually cause your thrift connection to hang indefinitely (although I think this may be fixed in the latest version of cassandra).
The new chunked object store recipe in Astyanax (https://github.com/Netflix/astyanax/wiki/Chunked-Object-Store) builds on our experience at Netflix with storing large objects in Cassandra and provides a simple API that handles all the chunking and parallelization for you. It could still make 1000's of calls to cassandra (depending on your file size and chunk size) but also handles all the retries and parallelization for you. The same goes for reading files. The API will read the chunks and reassemble them in order into an OutputStream.
|
BERLIN (Reuters) - Germany plans to pass legislation by the end of 2019 to create a state-owned fund that can protect key companies from takeovers by Chinese and other foreign firms, government sources said, in a marked shift from its “hands-off” approach to business.
FILE PHOTO: German Economy Minister Peter Altmaier presents the national industry strategy for 2030 during a news conference in Berlin, Germany, February 5, 2019. REUTERS/Fabrizio Bensch/File Photo
Economy Minister Peter Altmaier proposed the fund in February as part of a more defensive industrial strategy and three officials told Reuters the government was now working on draft laws so the fund could be up and running next year.
Two senior government officials, who spoke on condition of anonymity, said the idea was for the state-owned investment fund to work with the private sector when buying company stakes to foil unwelcome takeovers.
One official said the state could buy a stake initially and then sell it on as soon as possible to private investors while the other official said in some cases the fund could work with private investors from the start.
“In the past, Germany was too reluctant to define its national interests. This is changing now,” the first government official said.
“We see that we cannot lean back anymore and let everything be decided by the free play of market forces,” he said. “And this means more protection from the state.”
Long an ardent advocate of free markets, Germany’s move is a response to China’s state-driven metamorphosis from customer to competitor and U.S. President Donald Trump’s threats of unilateral trade sanctions and higher tariffs, the sources said.
For decades, German politicians followed the “ordoliberal” principles of post-war economy minister Ludwig Erhard who said free markets should decide winners and losers, with the state only providing a framework for fair competition.
The German move also comes at a time the European Union as a whole is reconsidering the bloc’s industrial strategy and relations to China in the face of increased investment in critical sectors by Chinese state-owned enterprises.
The European Commission has urged the bloc to back its ideas to curb Chinese companies and EU leaders are due to discuss the issue at a summit in Brussels this week.
WAKE-UP CALL
In Germany, the Chinese takeover of robotics maker Kuka KU2G.DE in 2016 was the wake-up call for the government that underlined the urgency for the state to become more active, the officials said.
An attempt by China's State Grid last year to buy a stake in power grid operator 50Hertz also focused German minds. After Berlin failed to find an alternative private investor in Europe, German state-owned bank KfW www.kfw.de/kfw.de-2.html stepped in to keep the Chinese out.
Slideshow ( 2 images )
That’s why the German government is now aiming to pass new laws creating the investment fund by the end of the year so it can be ready for use in 2020, the first official told Reuters.
“Ideally, there will be stake acquisitions together with private investors,” the official said, adding that Berlin had no plans to intervene in daily business decisions. “It’s not about the state becoming entrepreneurial.”
The state-owned fund could be managed by KfW, or be an altogether new entity empowered to hold company shareholdings, the second official said.
The plan goes hand in hand with a decision by the government in December to lower the threshold for screening, and even blocking, purchases of stakes in German firms in strategic areas by non-European investors.
An economy ministry spokesman said investment by the state fund would be limited to “very exceptional cases” and stakes would only be bought for a restricted period.
Such cases would mainly involve the protection of critical infrastructure where the government viewed a non-European investor as a threat to Germany’s national interests, the ministry spokesman said.
“The idea and its possible implementation are being discussed now in the further process of the industrial strategy,” said the spokesman, who declined to comment on the fund’s expected size.
‘ECONOMIC SOVEREIGNTY’
Altmaier said in February after presenting Germany’s industrial strategy for the next decade that key sectors were steel and aluminum, chemicals, machine and plant engineering, optics, autos, medical equipment, Green technologies, defense, aerospace and 3D printing.
Among the companies whose survival Altmaier described as crucial for the economy as a whole were marquee names such as Deutsche Bank DBKGn.DE, thyssenkrupp TKAG.DE, Siemens SIEGn.DE and Germany's big carmakers.
Altmaier told Reuters in an interview that his aim was to safeguard global competitiveness and technological leadership of German industry for the coming decades.
“This should also be a top priority for the next European Commission,” he said. “With this, we will secure jobs and prosperity in Germany and Europe. And, above all, it’s what will give Europe its economic sovereignty and independence.”
Germany and France, the two biggest economies in the euro zone, are liaising closely on how the EU could overhaul its competition and state subsidy rules to support European champions that can compete on a global level.
Following a decision by Brussels to block a rail deal between Siemens SIEGn.DE and Alstom ALSO.PA - a merger that was meant to counter Chinese competition - German Chancellor Angela Merkel wants to put reform of Europe's competition laws high on the agenda during Germany's EU presidency in 2020.
BUSINESS BACKLASH
While Germany's powerful BDI english.bdi.eu industry association has welcomed the government's plan to tackle a more assertive China, support national champions and reform competition law, it has criticized the idea of a state investment fund.
“New instruments for state ownership should not be used to fend off company takeovers, they should only support projects of new technologies,” BDI director general Joachim Lang said.
In light of growing unease among coalition lawmakers and industry groups, Altmaier is trying to reassure critics that Germany will remain open for foreign direct investment and that the government wants to intervene as little as possible.
“However, there can be exceptional cases in which the state must take action to avoid severe disadvantages for the economy as a whole and the country’s national welfare,” Altmaier told Reuters. “For example in cases when our critical infrastructure is at stake or when it comes to game changer technologies.”
Carsten Linnemann, deputy leader of Merkel’s conservatives in parliament and head of the bloc’s business-friendly Mittelstand wing, said the government’s focus on national champions was problematic. “We shouldn’t confuse size with competitiveness,” Linnemann told Reuters.
He said Germany’s “hidden champions” - mostly family-run firms that are market leaders in niche segments - were a good example that innovation is often driven by small enterprises.
Linnemann also rejected the idea of state intervention.
“The state simply doesn’t have more knowledge than the market. This basic rule hasn’t changed in times of big technological disruptions, in fact rather the opposite.”
Asked if parliament would block legislation for a state investment fund, Linnemann said coalition lawmakers were still in the process of forming an opinion. He said they generally shared the government’s goal to support the industrial sector.
“But we won’t achieve this by copying the industrial policy of China, the United States and France.”
($1 = 0.8829 euros) |
I’ve criticized evolutionary psychology more than a few times, and usually my arguments rest on their appallingly bad understanding of the “evolutionary” part of their monicker — proponents all seem to be rank adaptationists with a cartoon understanding of evolution. But what about the “psychology” part? I’ve mentioned at least one dissection of EP by a psychologist in the past, but here’s another one, a paper by the same author, Brad Peters, that explains that evolutionary psychology is poor neurobiology and bad psychology.
The paper points out that EP uses evidence inappropriately, ignores the range of alternative explanations to set up false dichotomies (“if you don’t accept evolutionary psychology, you must also deny evolution!”), plays rhetorical games to dodge questions about its assumptions, and basically is pulling an ideologically distorted version of neuroscience out of its institutional ass.
Evolutionary psychology defines the human mind as comprising innate and domainspecific information-processing mechanisms that were designed to solve specific evolutionary problems of our Pleistocene past. This model of the mind is the underlying blueprint used to engage in the kind of research that characterizes the field: speculating about how these innate mechanisms worked and what kinds of evolutionary problems they solved. But while evolutionary psychologists do engage in research to confirm or disconfirm their hypotheses, the results of even the most rigorous studies have been open to alternative, scientifically valid means of interpretation. What constitutes “evidence” would seem to vary in accordance with the theoretical assumptions of those viewing it. Arguments about, or appeals to, “the evidence” may thus involve little more than theoretical bible-thumping or pleading for others to view the “facts” from their preferred theoretical perspective. When theoretical paradigms are unable to agree on what it is that they are looking at, it reminds us that the data are anything but objective, and gives good reason to question the theoretical blueprints being used. This paper argues that evolutionary psychology’s assumptive definitions regarding the mind are often inconsistent with neurobiological evidence and may neglect very real biological constraints that could place limits on the kinds of hypotheses that can be safely posited. If there are problematic assumptions within evolutionary psychology’s definition of the mind, then we also have reason to question their special treatment of culture and learning, since both are thought to be influenced by modular assumptions unique to the paradigm. It is finally suggested that the mind can be adequately understood and its activities properly explained without hypothetical appeal to countless genetically pre-specified psychological programs, and in a way that remains consistent with both our neurobiology and neo-Darwinian evolution. While some of these critiques have been previously stated by others, the present paper adds to the discussion by providing a succinct summary of the most devastating arguments while offering new insights and examples that further highlight the key problems that face this field. Importantly, the critiques presented here are argued to be capable of standing their ground, regardless of whether evolutionary psychology claims the mind to be massively or moderately modular in composition. This paper thus serves as a continuation of the debate between evolutionary psychology and its critics. It will be shown how recent attempts to characterize critiques as “misunderstandings” seem to evade or ignore the main problems, while apparent “clarifications” continue to rely on some of the same theoretical assumptions that are being attacked by critics.
Another valid criticism is how evolutionary psychologists seem to be unaware of how the brain actually develops and works. Anybody who has actually studied neurodevelopment will know that plasticity is a hallmark. While genes pattern the overall structure, it’s experience that fine-tunes all the connections.
The current consensus within the neurobiological sciences seems to support a view where much of the brain is thought to be highly plastic and in which an abundance of neural growth, pruning, and differentiation of networks is directly influenced by environmental experience. This is especially the case for secondary, tertiary, and associational areas, which make up the majority of the brain’s neocortex and are primarily involved in the kinds of complex, higher-order, psychological processes that appear to be of greatest interest to experimental psychologists. These particular areas seemingly lack characteristics indicative of innate modularity, though, with experience and use, they may build upon the functional complexity of adjacent primary cortices that perhaps have such characteristics.
I also like that he addresses a common metaphor in EP — floating free of good evidence, much of the field relies on glib metaphors — that we can just treat the brain like it is a computer. It may compute, but it’s not very analogous to what’s going on in your desktop machine or phone. We aren’t made of circuits hard-printed by machines in Seoul; there is a general substrate of capabilities built upon by the experiences of the user. Further, we’re not entirely autonomous but rely in the most fundamental ways on by growth and development, sculpted by culture.
We can see the problem from a different perspective using evolutionary psychology’s favored computer analogy. While it is true that humans have some engrained and preprogrammed biological circuits, all evidence would suggest that, unlike modern computers, our environmental experiences can cause these mental circuits to become edited, hi-jacked, intensified or lessened, inhibited, and so on. How else might we explain a person acquiring a phobia of hats, a fetish for shoes, or having an apparent indifference to what might be an evolutionarily relevant danger (e.g., cliff jumping)? If we accept this is true, we must also accept that it becomes difficult to say what might have been there at birth, or instead shaped by common environmental experiences that we all share. Modern computers cannot be re-programmed without a human; they do not function like the human mind. We are the ones who effectively tell computers what the binary ones and zeros of their programming language will represent. We give symbolic meaning to the code, which allows us to even say that computers processes information. Now let us turn to the human mind. Evolutionary psychologists want to say that meaning and information are objectively pre-programmed by our inherited biology. However, it would appear that we extract much of our information, and the meaning it contains, from a sociocultural cloud of symbolic representations that belong to a shared human subjectivity, or something Raymond Tallis refers to as the community of minds. Our subjective mental states are thus socioculturally structured and shaped through our reliance on an agreed-upon language and agreed-upon sets of subjective human meanings. The brain is only one part of the picture: it facilitates the mechanistic activities of the mind, but it does not solely cause them. Human meanings, which belong to the collective community of minds, will thus often transcend the underlying mechanisms that represent them.
Wait. If the “evolution” part is crap, and the “psychology” part is bullshit, what’s left in evolutionary psychology to respect?
Peters, BM (2013) Evolutionary psychology: Neglecting neurobiology in defining the mind. Theory & Psychology 23(3) 305–322. |
328 A.2d 127 (1974)
Donald L. JUSTARD
v.
OXFORD PAPER COMPANY et al.
Supreme Judicial Court of Maine.
November 18, 1974.
Fred E. Hanscom, Rumford, for plaintiff.
Mahoney, Robinson, Mahoney & Norman by James S. Kriger, Robert F. Hanson, Portland, for defendants.
Before DUFRESNE, C. J., and WEATHERBEE, POMEROY, WERNICK, ARCHIBALD and DELAHANTY, JJ.
WERNICK, Justice.
On February 12, 1973 Donald L. Justard (hereinafter "petitioner") filed with the Industrial Accident Commission a petition seeking an award of compensation on account of a personal injury allegedly sustained by him in June, 1972 by accident arising in the course, and out, of his employment at Rumford, Maine, with respondent, Oxford Paper Company. The petition described the incident as follows:
"Worked considerable overtime leading up to the loss of sight of left eye."
Petitioner was employed as a checker in the shipping department. He had work responsibility in connection with the preparation of freight cars to contain rolls of paper being shipped from the mill. Specifically, petitioner's duties were to drive the trucks from which the paper rolls were loaded into the freight cars and to inspect the rolls of paper to ensure they would be placed into the proper cars.
In answer to the petition respondent paper company and its insurance carrier, Travelers Insurance Company, admitted the employment but denied that petitioner had received
"a personal injury by accident arising out of and in the course of his employment."
After a hearing at which the petitioner and Dr. J. Wayne Tyler (an ophthalmologist) were the only witnesses, the Industrial Accident Commission Commissioner, on September 25, 1973, ordered that
*128 "compensation be paid to the employee for a period of twenty-eight weeks beginning on July 3, 1972 at the rate of $81.14 per week and then cease."
The evidence disclosed that petitioner was often obliged to work "merry-go-round", so-called. This meant that during a period (for example) of a Thursday to Saturday, petitioner would work 11:00 p. m. (Thursday) to 7:00 a. m. (Friday), 3:00 p. m. to 11:00 p. m. (Friday) and 7:00 a. m. to 3:00 p. m. (Saturday). On some occasions, if there was no "mate" to relieve him while he was working a "merry-go-round", petitioner would work two of the eight hour shifts successively, a so-called "16."
During the week ending June 12, 1972, petitioner worked a total of sixty-four hours, including a "merry-go-round" and a "16." On or about June 9, 1972 petitioner, who had not previously had eye-trouble, noticed that his left eye had become very red. He went immediately to the medical department and there a nurse, "put some salve and some drops in my eye . . . ." On instructions from the nurse petitioner returned for several days thereafter to the medical department for further treatment of his eye by the nurse.
On June 13, 1972 petitioner went to work on the 3:00 p. m. shift and "got stuck" into working seventeen consecutive hours before he was relieved at approximately 8:00 a. m. on June 14, 1972. He was then leaving the mill when the sight in his left eye, in petitioner's words, "dropped out on me." Petitioner explained in his testimony this meant that he did not experience any pain but the vision in his left eye "just let go."
Later the same day, petitioner was examined by Dr. J. Wayne Tyler. Dr. Tyler testified that he found an
"inflammation [generalized] of the interior of the eye and an increase in the intraocular pressure, . . . due to the inflammation"
in that
". . . sometimes in the presence of inflammation the out-flow channels inside the eye become plugged by debris so that the fluids . . . formed within the eye cannot escape and the pressure rises. . . ."
Dr. Tyler prescribed, as treatment, prednisone pills and eye drops of two types each to be used two or three times a day. Dr. Tyler authorized petitioner to return to work with his left eye covered by a patch. Dr. Tyler expected the symptoms would run "a prolonged course", and so he kept check on petitioner "very regularly" thereafter for many weeks.
Petitioner's need for increasingly frequent administrations of medication, and difficulties he encountered because the prednisone medication aggravated a preexisting diabetic condition, forced petitioner to cease working as of July 3, 1972.
The impairment of the vision in petitioner's left eye, according to Dr. Tyler's testimony, worsened from an initial "blurring" to the loss of "all useful vision" as of August 6, 1972.
Late in September of 1972 Dr. Tyler concluded that another physician should be consulted. He arranged for petitioner to see Dr. Kevin Hill, an ophthalmologist practising in Waterville, Maine. In early October of 1972 Dr. Hill examined petitioner and made a diagnosis that the retina of petitioner's left eye had become detached. Surgery was performed on October 11, 1972 but the sight of the left eye could not be restored.
In awarding petitioner compensation, the Commissioner concluded: (1)
"the sudden `dropping out of sight' as. . . [petitioner] was leaving his employment was an accident within the meaning and intent of 39 M.R.S.A. § 51";
*129 and (2)
". . . this condition `arose out of' the . . . employment . . . because of the long hours of work. . . ."
The Commissioner added a third conclusion that
"petitioner has sustained his burden of proof on . . causation because it is more likely that his condition was caused by the strain of the work conditions tha[n] it is not."
In reaching his conclusions as to "causation", the Commissioner explained that, according to his conception, the "medical" and "legal" approaches to the "assessment" of causation are fundamentally different; and, hence,
"there are many questions of causation. . . which are presently unanswerable. . . and must properly remain unanswered . . ."
under "standards of discipline of the medical profession" which by "legal" standards are capable of being answered, must be answered and are answered by the Commissioner's decision in the case at bar. Here, the Commissioner concluded that, measured by the appropriate "legal" standards, petitioner had carried the burden of proof to show "legal" causal relationship between his employment and the vision impairment of his left eye notwithstanding Dr. Tyler's testimony that when the question is considered strictly in "medical" terms, some "conjecture" is involved.
The Commissioner revealed in the written opinion explaining his decision that his causation analysis had been influenced in part by material which had not been introduced in evidence by the parties. We have this subject-matter before us because the Commissioner annexed a copy of it to his opinion as an exhibit and expressly incorporated it as a part of his decision.
Although within its own confines the document appended makes no mention of its authors or otherwise identifies itself as to source, the Commissioner attributed it to Elliot L. Segall, M.D., Boston, and Robert E. Fast, Esq., "Partner Hale and Dorr." Further, the Commissioner described the exhibit as connected with "Medicine in the Court Room 1971." Such description leaves us uninformed concerning the origins of the material and how the Commissioner came upon it, since "Medicine in the Court Room 1971" could indicate a published summary of views expressed in a symposium, or a published article (the publication, however, remaining unidentified) or even a condensation of conclusions made by a "Hale and Dorr" partner who had participated as a member of a panel, or symposium, and retained the summary in the internal files of the law firm.
The exhibit delineates in a seriatim outline form, without amplifying analysis or documentation, various respects in which the "medical and legal approaches to causation assessment" may be conceived to differ.
We agree with respondents that the opinon of the Commissioner establishes on its face that the Commissioner gave evidentiary weight to the contents of the document which the Commissioner had made an exhibit in the case after hearing had been concluded; and the Commissioner thus acted (1) without consultation with counsel for the parties, and (2) notwithstanding that the two persons whose opinions were reflected had never been qualified in the case as experts and had never given their opinions as testimony under oath and subject to the testing of cross-examination. In this respect, the Commissioner committed error sufficiently serious to require that his evaluation of the case, in the form in which it is now before us, cannot stand.
The critical issues of the instant case were recently and comprehensively evaluated by this Court in Towle v. Department of Transportation, State Highway, Me., 318 A.2d 71 (1974) decided several months *130 after the Commissioner's decision. Since the opinion of the Commissioner reveals that he was troubled by the interrelationships between medical facts and opinions and the legal standards of causation, the analysis in Towle, supra, not available to the Commissioner when he was struggling with the problems in September of 1973, could furnish him with substantial guidance in his reconsideration of the case.
Moreover, the record presently before us reveals that it was the medical opinion of the witness, Dr. Tyler, that had petitioner in fact been "working long hours and worked several 16's", such circumstances
". . . would . . . be a contributing factor . . . one of the contributing factors"
to the loss of vision in petitioner's left eye (resulting from a detached retina, as ultimately diagnosed). Because of this testimony the record as now before us, evaluated most favorably to petitioner in accordance with the legal principles extensively analyzed in Towle, supra, cannot fairly be said to foreclose as a rational possibility a fact-finder's conclusion, were it to be reached properly without resort to extraneous matters not in evidence, that petitioner had sustained a compensable injury.[1]
In Severance v. State of Maine, Department of Transportation, Me., 324 A.2d 314 (1974), while we acknowledged that the "one day in court" principle generally underlying the determination of civil actions is applicable to cases decided by the Industrial Accident Commission, we were careful to stress that in the situations in which a Commissioner's decision cannot be permitted to stand as written, and a remand of the case to the Commission for further evaluation is necessary, instances may arise in which justice requires that such Commission reevaluation shall not be confined to the record already made but shall be upon a record amplified by additional evidence to be adduced through further hearing.
Since, here, (1) the Commissioner's decision cannot be permitted to stand and the case must be remanded to the Commission for further consideration, and (2) neither the Commissioner nor counsel for the parties had the benefit of our opinion in Towle when the present record was being made, we believe justice requires that the Commissioner's new evaluation be made after a further hearing in which the parties, as they may be guided by the exposition in Towle, shall have opportunity to bring forward such additional evidence as they deem appropriate.
The entry is:
Appeal sustained.
The pro forma decree of the Superior Court is vacated.
Case remanded to the Industrial Accident Commission for further hearing.
Ordered that $350.00 to cover fees and expenses of counsel for the petitioner be, and is, allowed, to be paid by Appellant, Oxford Paper Company, to the Appellee, Donald L. Justard.
All Justices concurring.
NOTES
[1] In light of the ultimate diagnosis by Dr. Hill that petitioner suffered a detachment of his retina as the underlying cause of his loss of vision, a fact-finder would be warranted in a conclusion, were he to see fit to arrive at it, that, here, there exists (1) the kind of "internal breakdown of . . . structure" which Towle reveals may constitute "a personal injury by accident" should it result from the "stress of labor aggravat[ing] or accelerat[ing] the development of a preexisting infirmity" (p. 72 of 318 A.2d), such that (2) it may be regarded as a personal injury by accident which arises out of the employment if the aggravating or accelerating "stress of labor" is from the labor required by petitioner's employment.
|
// SPDX-License-Identifier: MIT
/*
* Copyright © 2016-2019 Intel Corporation
*/
#include "i915_drv.h"
#include "intel_guc_ct.h"
#include "gt/intel_gt.h"
#define CT_ERROR(_ct, _fmt, ...) \
DRM_DEV_ERROR(ct_to_dev(_ct), "CT: " _fmt, ##__VA_ARGS__)
#ifdef CONFIG_DRM_I915_DEBUG_GUC
#define CT_DEBUG(_ct, _fmt, ...) \
DRM_DEV_DEBUG_DRIVER(ct_to_dev(_ct), "CT: " _fmt, ##__VA_ARGS__)
#else
#define CT_DEBUG(...) do { } while (0)
#endif
struct ct_request {
struct list_head link;
u32 fence;
u32 status;
u32 response_len;
u32 *response_buf;
};
struct ct_incoming_request {
struct list_head link;
u32 msg[];
};
enum { CTB_SEND = 0, CTB_RECV = 1 };
enum { CTB_OWNER_HOST = 0 };
static void ct_incoming_request_worker_func(struct work_struct *w);
/**
* intel_guc_ct_init_early - Initialize CT state without requiring device access
* @ct: pointer to CT struct
*/
void intel_guc_ct_init_early(struct intel_guc_ct *ct)
{
spin_lock_init(&ct->requests.lock);
INIT_LIST_HEAD(&ct->requests.pending);
INIT_LIST_HEAD(&ct->requests.incoming);
INIT_WORK(&ct->requests.worker, ct_incoming_request_worker_func);
}
static inline struct intel_guc *ct_to_guc(struct intel_guc_ct *ct)
{
return container_of(ct, struct intel_guc, ct);
}
static inline struct intel_gt *ct_to_gt(struct intel_guc_ct *ct)
{
return guc_to_gt(ct_to_guc(ct));
}
static inline struct drm_i915_private *ct_to_i915(struct intel_guc_ct *ct)
{
return ct_to_gt(ct)->i915;
}
static inline struct device *ct_to_dev(struct intel_guc_ct *ct)
{
return ct_to_i915(ct)->drm.dev;
}
static inline const char *guc_ct_buffer_type_to_str(u32 type)
{
switch (type) {
case INTEL_GUC_CT_BUFFER_TYPE_SEND:
return "SEND";
case INTEL_GUC_CT_BUFFER_TYPE_RECV:
return "RECV";
default:
return "<invalid>";
}
}
static void guc_ct_buffer_desc_init(struct guc_ct_buffer_desc *desc,
u32 cmds_addr, u32 size)
{
memset(desc, 0, sizeof(*desc));
desc->addr = cmds_addr;
desc->size = size;
desc->owner = CTB_OWNER_HOST;
}
static void guc_ct_buffer_desc_reset(struct guc_ct_buffer_desc *desc)
{
desc->head = 0;
desc->tail = 0;
desc->is_in_error = 0;
}
static int guc_action_register_ct_buffer(struct intel_guc *guc,
u32 desc_addr,
u32 type)
{
u32 action[] = {
INTEL_GUC_ACTION_REGISTER_COMMAND_TRANSPORT_BUFFER,
desc_addr,
sizeof(struct guc_ct_buffer_desc),
type
};
/* Can't use generic send(), CT registration must go over MMIO */
return intel_guc_send_mmio(guc, action, ARRAY_SIZE(action), NULL, 0);
}
static int ct_register_buffer(struct intel_guc_ct *ct, u32 desc_addr, u32 type)
{
int err = guc_action_register_ct_buffer(ct_to_guc(ct), desc_addr, type);
if (unlikely(err))
CT_ERROR(ct, "Failed to register %s buffer (err=%d)\n",
guc_ct_buffer_type_to_str(type), err);
return err;
}
static int guc_action_deregister_ct_buffer(struct intel_guc *guc, u32 type)
{
u32 action[] = {
INTEL_GUC_ACTION_DEREGISTER_COMMAND_TRANSPORT_BUFFER,
CTB_OWNER_HOST,
type
};
/* Can't use generic send(), CT deregistration must go over MMIO */
return intel_guc_send_mmio(guc, action, ARRAY_SIZE(action), NULL, 0);
}
static int ct_deregister_buffer(struct intel_guc_ct *ct, u32 type)
{
int err = guc_action_deregister_ct_buffer(ct_to_guc(ct), type);
if (unlikely(err))
CT_ERROR(ct, "Failed to deregister %s buffer (err=%d)\n",
guc_ct_buffer_type_to_str(type), err);
return err;
}
/**
* intel_guc_ct_init - Init buffer-based communication
* @ct: pointer to CT struct
*
* Allocate memory required for buffer-based communication.
*
* Return: 0 on success, a negative errno code on failure.
*/
int intel_guc_ct_init(struct intel_guc_ct *ct)
{
struct intel_guc *guc = ct_to_guc(ct);
void *blob;
int err;
int i;
GEM_BUG_ON(ct->vma);
/* We allocate 1 page to hold both descriptors and both buffers.
* ___________.....................
* |desc (SEND)| :
* |___________| PAGE/4
* :___________....................:
* |desc (RECV)| :
* |___________| PAGE/4
* :_______________________________:
* |cmds (SEND) |
* | PAGE/4
* |_______________________________|
* |cmds (RECV) |
* | PAGE/4
* |_______________________________|
*
* Each message can use a maximum of 32 dwords and we don't expect to
* have more than 1 in flight at any time, so we have enough space.
* Some logic further ahead will rely on the fact that there is only 1
* page and that it is always mapped, so if the size is changed the
* other code will need updating as well.
*/
err = intel_guc_allocate_and_map_vma(guc, PAGE_SIZE, &ct->vma, &blob);
if (unlikely(err)) {
CT_ERROR(ct, "Failed to allocate CT channel (err=%d)\n", err);
return err;
}
CT_DEBUG(ct, "vma base=%#x\n", intel_guc_ggtt_offset(guc, ct->vma));
/* store pointers to desc and cmds */
for (i = 0; i < ARRAY_SIZE(ct->ctbs); i++) {
GEM_BUG_ON((i != CTB_SEND) && (i != CTB_RECV));
ct->ctbs[i].desc = blob + PAGE_SIZE/4 * i;
ct->ctbs[i].cmds = blob + PAGE_SIZE/4 * i + PAGE_SIZE/2;
}
return 0;
}
/**
* intel_guc_ct_fini - Fini buffer-based communication
* @ct: pointer to CT struct
*
* Deallocate memory required for buffer-based communication.
*/
void intel_guc_ct_fini(struct intel_guc_ct *ct)
{
GEM_BUG_ON(ct->enabled);
i915_vma_unpin_and_release(&ct->vma, I915_VMA_RELEASE_MAP);
}
/**
* intel_guc_ct_enable - Enable buffer based command transport.
* @ct: pointer to CT struct
*
* Return: 0 on success, a negative errno code on failure.
*/
int intel_guc_ct_enable(struct intel_guc_ct *ct)
{
struct intel_guc *guc = ct_to_guc(ct);
u32 base, cmds, size;
int err;
int i;
GEM_BUG_ON(ct->enabled);
/* vma should be already allocated and map'ed */
GEM_BUG_ON(!ct->vma);
base = intel_guc_ggtt_offset(guc, ct->vma);
/* (re)initialize descriptors
* cmds buffers are in the second half of the blob page
*/
for (i = 0; i < ARRAY_SIZE(ct->ctbs); i++) {
GEM_BUG_ON((i != CTB_SEND) && (i != CTB_RECV));
cmds = base + PAGE_SIZE / 4 * i + PAGE_SIZE / 2;
size = PAGE_SIZE / 4;
CT_DEBUG(ct, "%d: addr=%#x size=%u\n", i, cmds, size);
guc_ct_buffer_desc_init(ct->ctbs[i].desc, cmds, size);
}
/*
* Register both CT buffers starting with RECV buffer.
* Descriptors are in first half of the blob.
*/
err = ct_register_buffer(ct, base + PAGE_SIZE / 4 * CTB_RECV,
INTEL_GUC_CT_BUFFER_TYPE_RECV);
if (unlikely(err))
goto err_out;
err = ct_register_buffer(ct, base + PAGE_SIZE / 4 * CTB_SEND,
INTEL_GUC_CT_BUFFER_TYPE_SEND);
if (unlikely(err))
goto err_deregister;
ct->enabled = true;
return 0;
err_deregister:
ct_deregister_buffer(ct, INTEL_GUC_CT_BUFFER_TYPE_RECV);
err_out:
CT_ERROR(ct, "Failed to open open CT channel (err=%d)\n", err);
return err;
}
/**
* intel_guc_ct_disable - Disable buffer based command transport.
* @ct: pointer to CT struct
*/
void intel_guc_ct_disable(struct intel_guc_ct *ct)
{
struct intel_guc *guc = ct_to_guc(ct);
GEM_BUG_ON(!ct->enabled);
ct->enabled = false;
if (intel_guc_is_fw_running(guc)) {
ct_deregister_buffer(ct, INTEL_GUC_CT_BUFFER_TYPE_SEND);
ct_deregister_buffer(ct, INTEL_GUC_CT_BUFFER_TYPE_RECV);
}
}
static u32 ct_get_next_fence(struct intel_guc_ct *ct)
{
/* For now it's trivial */
return ++ct->requests.last_fence;
}
/**
* DOC: CTB Host to GuC request
*
* Format of the CTB Host to GuC request message is as follows::
*
* +------------+---------+---------+---------+---------+
* | msg[0] | [1] | [2] | ... | [n-1] |
* +------------+---------+---------+---------+---------+
* | MESSAGE | MESSAGE PAYLOAD |
* + HEADER +---------+---------+---------+---------+
* | | 0 | 1 | ... | n |
* +============+=========+=========+=========+=========+
* | len >= 1 | FENCE | request specific data |
* +------+-----+---------+---------+---------+---------+
*
* ^-----------------len-------------------^
*/
static int ct_write(struct intel_guc_ct *ct,
const u32 *action,
u32 len /* in dwords */,
u32 fence,
bool want_response)
{
struct intel_guc_ct_buffer *ctb = &ct->ctbs[CTB_SEND];
struct guc_ct_buffer_desc *desc = ctb->desc;
u32 head = desc->head;
u32 tail = desc->tail;
u32 size = desc->size;
u32 used;
u32 header;
u32 *cmds = ctb->cmds;
unsigned int i;
if (unlikely(desc->is_in_error))
return -EPIPE;
if (unlikely(!IS_ALIGNED(head | tail | size, 4) ||
(tail | head) >= size))
goto corrupted;
/* later calculations will be done in dwords */
head /= 4;
tail /= 4;
size /= 4;
/*
* tail == head condition indicates empty. GuC FW does not support
* using up the entire buffer to get tail == head meaning full.
*/
if (tail < head)
used = (size - head) + tail;
else
used = tail - head;
/* make sure there is a space including extra dw for the fence */
if (unlikely(used + len + 1 >= size))
return -ENOSPC;
/*
* Write the message. The format is the following:
* DW0: header (including action code)
* DW1: fence
* DW2+: action data
*/
header = (len << GUC_CT_MSG_LEN_SHIFT) |
(GUC_CT_MSG_WRITE_FENCE_TO_DESC) |
(want_response ? GUC_CT_MSG_SEND_STATUS : 0) |
(action[0] << GUC_CT_MSG_ACTION_SHIFT);
CT_DEBUG(ct, "writing %*ph %*ph %*ph\n",
4, &header, 4, &fence, 4 * (len - 1), &action[1]);
cmds[tail] = header;
tail = (tail + 1) % size;
cmds[tail] = fence;
tail = (tail + 1) % size;
for (i = 1; i < len; i++) {
cmds[tail] = action[i];
tail = (tail + 1) % size;
}
GEM_BUG_ON(tail > size);
/* now update desc tail (back in bytes) */
desc->tail = tail * 4;
return 0;
corrupted:
CT_ERROR(ct, "Corrupted descriptor addr=%#x head=%u tail=%u size=%u\n",
desc->addr, desc->head, desc->tail, desc->size);
desc->is_in_error = 1;
return -EPIPE;
}
/**
* wait_for_ctb_desc_update - Wait for the CT buffer descriptor update.
* @desc: buffer descriptor
* @fence: response fence
* @status: placeholder for status
*
* Guc will update CT buffer descriptor with new fence and status
* after processing the command identified by the fence. Wait for
* specified fence and then read from the descriptor status of the
* command.
*
* Return:
* * 0 response received (status is valid)
* * -ETIMEDOUT no response within hardcoded timeout
* * -EPROTO no response, CT buffer is in error
*/
static int wait_for_ctb_desc_update(struct guc_ct_buffer_desc *desc,
u32 fence,
u32 *status)
{
int err;
/*
* Fast commands should complete in less than 10us, so sample quickly
* up to that length of time, then switch to a slower sleep-wait loop.
* No GuC command should ever take longer than 10ms.
*/
#define done (READ_ONCE(desc->fence) == fence)
err = wait_for_us(done, 10);
if (err)
err = wait_for(done, 10);
#undef done
if (unlikely(err)) {
DRM_ERROR("CT: fence %u failed; reported fence=%u\n",
fence, desc->fence);
if (WARN_ON(desc->is_in_error)) {
/* Something went wrong with the messaging, try to reset
* the buffer and hope for the best
*/
guc_ct_buffer_desc_reset(desc);
err = -EPROTO;
}
}
*status = desc->status;
return err;
}
/**
* wait_for_ct_request_update - Wait for CT request state update.
* @req: pointer to pending request
* @status: placeholder for status
*
* For each sent request, Guc shall send bac CT response message.
* Our message handler will update status of tracked request once
* response message with given fence is received. Wait here and
* check for valid response status value.
*
* Return:
* * 0 response received (status is valid)
* * -ETIMEDOUT no response within hardcoded timeout
*/
static int wait_for_ct_request_update(struct ct_request *req, u32 *status)
{
int err;
/*
* Fast commands should complete in less than 10us, so sample quickly
* up to that length of time, then switch to a slower sleep-wait loop.
* No GuC command should ever take longer than 10ms.
*/
#define done INTEL_GUC_MSG_IS_RESPONSE(READ_ONCE(req->status))
err = wait_for_us(done, 10);
if (err)
err = wait_for(done, 10);
#undef done
if (unlikely(err))
DRM_ERROR("CT: fence %u err %d\n", req->fence, err);
*status = req->status;
return err;
}
static int ct_send(struct intel_guc_ct *ct,
const u32 *action,
u32 len,
u32 *response_buf,
u32 response_buf_size,
u32 *status)
{
struct intel_guc_ct_buffer *ctb = &ct->ctbs[CTB_SEND];
struct guc_ct_buffer_desc *desc = ctb->desc;
struct ct_request request;
unsigned long flags;
u32 fence;
int err;
GEM_BUG_ON(!ct->enabled);
GEM_BUG_ON(!len);
GEM_BUG_ON(len & ~GUC_CT_MSG_LEN_MASK);
GEM_BUG_ON(!response_buf && response_buf_size);
fence = ct_get_next_fence(ct);
request.fence = fence;
request.status = 0;
request.response_len = response_buf_size;
request.response_buf = response_buf;
spin_lock_irqsave(&ct->requests.lock, flags);
list_add_tail(&request.link, &ct->requests.pending);
spin_unlock_irqrestore(&ct->requests.lock, flags);
err = ct_write(ct, action, len, fence, !!response_buf);
if (unlikely(err))
goto unlink;
intel_guc_notify(ct_to_guc(ct));
if (response_buf)
err = wait_for_ct_request_update(&request, status);
else
err = wait_for_ctb_desc_update(desc, fence, status);
if (unlikely(err))
goto unlink;
if (!INTEL_GUC_MSG_IS_RESPONSE_SUCCESS(*status)) {
err = -EIO;
goto unlink;
}
if (response_buf) {
/* There shall be no data in the status */
WARN_ON(INTEL_GUC_MSG_TO_DATA(request.status));
/* Return actual response len */
err = request.response_len;
} else {
/* There shall be no response payload */
WARN_ON(request.response_len);
/* Return data decoded from the status dword */
err = INTEL_GUC_MSG_TO_DATA(*status);
}
unlink:
spin_lock_irqsave(&ct->requests.lock, flags);
list_del(&request.link);
spin_unlock_irqrestore(&ct->requests.lock, flags);
return err;
}
/*
* Command Transport (CT) buffer based GuC send function.
*/
int intel_guc_ct_send(struct intel_guc_ct *ct, const u32 *action, u32 len,
u32 *response_buf, u32 response_buf_size)
{
struct intel_guc *guc = ct_to_guc(ct);
u32 status = ~0; /* undefined */
int ret;
if (unlikely(!ct->enabled)) {
WARN(1, "Unexpected send: action=%#x\n", *action);
return -ENODEV;
}
mutex_lock(&guc->send_mutex);
ret = ct_send(ct, action, len, response_buf, response_buf_size, &status);
if (unlikely(ret < 0)) {
CT_ERROR(ct, "Sending action %#x failed (err=%d status=%#X)\n",
action[0], ret, status);
} else if (unlikely(ret)) {
CT_DEBUG(ct, "send action %#x returned %d (%#x)\n",
action[0], ret, ret);
}
mutex_unlock(&guc->send_mutex);
return ret;
}
static inline unsigned int ct_header_get_len(u32 header)
{
return (header >> GUC_CT_MSG_LEN_SHIFT) & GUC_CT_MSG_LEN_MASK;
}
static inline unsigned int ct_header_get_action(u32 header)
{
return (header >> GUC_CT_MSG_ACTION_SHIFT) & GUC_CT_MSG_ACTION_MASK;
}
static inline bool ct_header_is_response(u32 header)
{
return !!(header & GUC_CT_MSG_IS_RESPONSE);
}
static int ct_read(struct intel_guc_ct *ct, u32 *data)
{
struct intel_guc_ct_buffer *ctb = &ct->ctbs[CTB_RECV];
struct guc_ct_buffer_desc *desc = ctb->desc;
u32 head = desc->head;
u32 tail = desc->tail;
u32 size = desc->size;
u32 *cmds = ctb->cmds;
s32 available;
unsigned int len;
unsigned int i;
if (unlikely(desc->is_in_error))
return -EPIPE;
if (unlikely(!IS_ALIGNED(head | tail | size, 4) ||
(tail | head) >= size))
goto corrupted;
/* later calculations will be done in dwords */
head /= 4;
tail /= 4;
size /= 4;
/* tail == head condition indicates empty */
available = tail - head;
if (unlikely(available == 0))
return -ENODATA;
/* beware of buffer wrap case */
if (unlikely(available < 0))
available += size;
CT_DEBUG(ct, "available %d (%u:%u)\n", available, head, tail);
GEM_BUG_ON(available < 0);
data[0] = cmds[head];
head = (head + 1) % size;
/* message len with header */
len = ct_header_get_len(data[0]) + 1;
if (unlikely(len > (u32)available)) {
CT_ERROR(ct, "Incomplete message %*ph %*ph %*ph\n",
4, data,
4 * (head + available - 1 > size ?
size - head : available - 1), &cmds[head],
4 * (head + available - 1 > size ?
available - 1 - size + head : 0), &cmds[0]);
goto corrupted;
}
for (i = 1; i < len; i++) {
data[i] = cmds[head];
head = (head + 1) % size;
}
CT_DEBUG(ct, "received %*ph\n", 4 * len, data);
desc->head = head * 4;
return 0;
corrupted:
CT_ERROR(ct, "Corrupted descriptor addr=%#x head=%u tail=%u size=%u\n",
desc->addr, desc->head, desc->tail, desc->size);
desc->is_in_error = 1;
return -EPIPE;
}
/**
* DOC: CTB GuC to Host response
*
* Format of the CTB GuC to Host response message is as follows::
*
* +------------+---------+---------+---------+---------+---------+
* | msg[0] | [1] | [2] | [3] | ... | [n-1] |
* +------------+---------+---------+---------+---------+---------+
* | MESSAGE | MESSAGE PAYLOAD |
* + HEADER +---------+---------+---------+---------+---------+
* | | 0 | 1 | 2 | ... | n |
* +============+=========+=========+=========+=========+=========+
* | len >= 2 | FENCE | STATUS | response specific data |
* +------+-----+---------+---------+---------+---------+---------+
*
* ^-----------------------len-----------------------^
*/
static int ct_handle_response(struct intel_guc_ct *ct, const u32 *msg)
{
u32 header = msg[0];
u32 len = ct_header_get_len(header);
u32 msgsize = (len + 1) * sizeof(u32); /* msg size in bytes w/header */
u32 fence;
u32 status;
u32 datalen;
struct ct_request *req;
bool found = false;
GEM_BUG_ON(!ct_header_is_response(header));
GEM_BUG_ON(!in_irq());
/* Response payload shall at least include fence and status */
if (unlikely(len < 2)) {
CT_ERROR(ct, "Corrupted response %*ph\n", msgsize, msg);
return -EPROTO;
}
fence = msg[1];
status = msg[2];
datalen = len - 2;
/* Format of the status follows RESPONSE message */
if (unlikely(!INTEL_GUC_MSG_IS_RESPONSE(status))) {
CT_ERROR(ct, "Corrupted response %*ph\n", msgsize, msg);
return -EPROTO;
}
CT_DEBUG(ct, "response fence %u status %#x\n", fence, status);
spin_lock(&ct->requests.lock);
list_for_each_entry(req, &ct->requests.pending, link) {
if (unlikely(fence != req->fence)) {
CT_DEBUG(ct, "request %u awaits response\n",
req->fence);
continue;
}
if (unlikely(datalen > req->response_len)) {
CT_ERROR(ct, "Response for %u is too long %*ph\n",
req->fence, msgsize, msg);
datalen = 0;
}
if (datalen)
memcpy(req->response_buf, msg + 3, 4 * datalen);
req->response_len = datalen;
WRITE_ONCE(req->status, status);
found = true;
break;
}
spin_unlock(&ct->requests.lock);
if (!found)
CT_ERROR(ct, "Unsolicited response %*ph\n", msgsize, msg);
return 0;
}
static void ct_process_request(struct intel_guc_ct *ct,
u32 action, u32 len, const u32 *payload)
{
struct intel_guc *guc = ct_to_guc(ct);
int ret;
CT_DEBUG(ct, "request %x %*ph\n", action, 4 * len, payload);
switch (action) {
case INTEL_GUC_ACTION_DEFAULT:
ret = intel_guc_to_host_process_recv_msg(guc, payload, len);
if (unlikely(ret))
goto fail_unexpected;
break;
default:
fail_unexpected:
CT_ERROR(ct, "Unexpected request %x %*ph\n",
action, 4 * len, payload);
break;
}
}
static bool ct_process_incoming_requests(struct intel_guc_ct *ct)
{
unsigned long flags;
struct ct_incoming_request *request;
u32 header;
u32 *payload;
bool done;
spin_lock_irqsave(&ct->requests.lock, flags);
request = list_first_entry_or_null(&ct->requests.incoming,
struct ct_incoming_request, link);
if (request)
list_del(&request->link);
done = !!list_empty(&ct->requests.incoming);
spin_unlock_irqrestore(&ct->requests.lock, flags);
if (!request)
return true;
header = request->msg[0];
payload = &request->msg[1];
ct_process_request(ct,
ct_header_get_action(header),
ct_header_get_len(header),
payload);
kfree(request);
return done;
}
static void ct_incoming_request_worker_func(struct work_struct *w)
{
struct intel_guc_ct *ct =
container_of(w, struct intel_guc_ct, requests.worker);
bool done;
done = ct_process_incoming_requests(ct);
if (!done)
queue_work(system_unbound_wq, &ct->requests.worker);
}
/**
* DOC: CTB GuC to Host request
*
* Format of the CTB GuC to Host request message is as follows::
*
* +------------+---------+---------+---------+---------+---------+
* | msg[0] | [1] | [2] | [3] | ... | [n-1] |
* +------------+---------+---------+---------+---------+---------+
* | MESSAGE | MESSAGE PAYLOAD |
* + HEADER +---------+---------+---------+---------+---------+
* | | 0 | 1 | 2 | ... | n |
* +============+=========+=========+=========+=========+=========+
* | len | request specific data |
* +------+-----+---------+---------+---------+---------+---------+
*
* ^-----------------------len-----------------------^
*/
static int ct_handle_request(struct intel_guc_ct *ct, const u32 *msg)
{
u32 header = msg[0];
u32 len = ct_header_get_len(header);
u32 msgsize = (len + 1) * sizeof(u32); /* msg size in bytes w/header */
struct ct_incoming_request *request;
unsigned long flags;
GEM_BUG_ON(ct_header_is_response(header));
request = kmalloc(sizeof(*request) + msgsize, GFP_ATOMIC);
if (unlikely(!request)) {
CT_ERROR(ct, "Dropping request %*ph\n", msgsize, msg);
return 0; /* XXX: -ENOMEM ? */
}
memcpy(request->msg, msg, msgsize);
spin_lock_irqsave(&ct->requests.lock, flags);
list_add_tail(&request->link, &ct->requests.incoming);
spin_unlock_irqrestore(&ct->requests.lock, flags);
queue_work(system_unbound_wq, &ct->requests.worker);
return 0;
}
/*
* When we're communicating with the GuC over CT, GuC uses events
* to notify us about new messages being posted on the RECV buffer.
*/
void intel_guc_ct_event_handler(struct intel_guc_ct *ct)
{
u32 msg[GUC_CT_MSG_LEN_MASK + 1]; /* one extra dw for the header */
int err = 0;
if (unlikely(!ct->enabled)) {
WARN(1, "Unexpected GuC event received while CT disabled!\n");
return;
}
do {
err = ct_read(ct, msg);
if (err)
break;
if (ct_header_is_response(msg[0]))
err = ct_handle_response(ct, msg);
else
err = ct_handle_request(ct, msg);
} while (!err);
}
|
Congenital diaphragmatic hernia: Impact of contemporary management strategies on perinatal outcomes.
This study aims to review temporal changes in perinatal management and 1-year survival outcomes of cases of congenital diaphragmatic hernia (CDH) from 1996 to 2015 in Western Australia (WA). This research is a retrospective study of all cases of CDH in WA from 1996 to 2015 identified from five independent databases within the WA health network. Detailed information pertaining to pregnancy and survival outcomes were obtained from review of maternal and infant medical records. There were 215 cases of CDH with 164 diagnosed prenatally. Between 1996 and 2010, a decline in live birth rates for CDH-affected pregnancies was observed, reaching a nadir of 5.3 per 10 000 births before increasing to a peak of 9.73 per 10 000 births in 2011-2015. A corresponding decline was seen in the number of pregnancies terminated in the same period from 8.3 to 4.6 per 10 000 births (P = 0.14) and an increase in survival of live births from 38.9% to 81.3% (P = 0.01). The improved overall survival rate in infants with CDH over the last 20 years may have resulted in an increased tendency for women to continue their pregnancy with a concomitant decline in termination rates. Information from this study will help in the counselling of women following prenatal detection of CDH. |
The present invention relates to a method of storing a virtual image from space data generated based on actually captured data, a method of rendering a virtual space on the basis of stored space data, and apparatuses therefor and, more particularly, to progressive storage and rendering of the space data.
The present invention also relates to a virtual image rendering method that downloads large-size image data such as ray space data (to be abbreviated as RS data hereinafter), and presents the downloaded data to the user, and a rendering apparatus.
Many schemes that describe and express a virtual space on the basis of actually captured images in place of a description based on three-dimensional geometric models have been proposed. Such schemes are called Image Based Rendering (to be abbreviated as IBR hereinafter), and are characterized in that they can express a virtual space with high reality, which cannot be obtained by a scheme based on three-dimensional geometric models, since these schemes are based on actually captured images.
Attempts to describe a virtual space on the basis of a ray space theory as one of IBR schemes have been proposed. See, for example, xe2x80x9cImplementation of Virtual Environment by Mixing CG model and Ray Space Dataxe2x80x9d, IEICE Journal D-11, Vol. J80-D-11 No. 11, pp. 3048-3057, November 1997, or xe2x80x9cMutual Conversion between Hologram and Ray Space Aiming at 3D Integrated Image Communicationxe2x80x9d, 3D Image Conference, and the like.
The ray space theory will be explained below.
As shown in FIG. 1, a coordinate system 0-X-Y-Z is defined in a real space. A light ray that passes through a reference plane P (Z=z) perpendicular to the Z-axis is defined by a position (x, y) where the light ray crosses P, and variables xcex8 and xcfx86 that indicate the direction of the light ray. More specifically, a single light ray is uniquely defined by five variables (x, y, z, xcex8, xcfx86). If a function that represents the light intensity of this light ray is defined as f, light ray group data in this space can be expressed by f(x, y, z, xcex8, xcfx86). This five-dimensional space is called a xe2x80x9cray spacexe2x80x9d. Generally, a time variation t is also used in some cases, but is omitted here.
If the reference plane P is set at z=0, and disparity information of a light ray in the vertical direction, i.e., the degree of freedom in the xcfx86 direction is omitted, the degree of freedom of the light ray can be regenerated to two dimensions (x, xcex8). This x-xcex8 two-dimensional space is a partial space of the ray space. As shown in FIG. 3, if u=tan xcex8, a light ray (FIG. 2) which passes through a point (X, Z) in the real space is mapped onto a line in the x-u space, which line is given by:
X=x+uxc2x7Zxe2x80x83xe2x80x83(1)
Image sensing by a camera reduces to receiving light rays that pass through the lens focal point of the camera by an image sensing surface, and converting their brightness levels and colors into an image. In other words, a light ray group which passes through one point, i.e., the focal point position, in the real space is captured as an image in correspondence with the number of pixels. In this way, since the degree of freedom in the xcfx86 direction is omitted, and the behavior of a light ray is examined in only the X-Z plane, only pixels on a line segment that intersects a plane perpendicular to the Y-axis need only be considered. In this manner, by sensing an image, light rays that pass through one point can be collected, and data on a single line segment in the x-u space can be captured by single image sensing.
When this image sensing is done a large number of times by changing the viewpoint position (in this specification, the viewpoint position includes both the position of the viewpoint and the line-of-sight direction unless otherwise specified), light ray groups which pass through a large number of points can be captured. When the real space is captured using N cameras, as shown in FIG. 4, data on a line given by:
x+Znu=Xnxe2x80x83xe2x80x83(2)
can be input in correspondence with a focal point position (Xn, Zn) of the n-th camera (n=1, 2, . . . , N), as shown in FIG. 5. In this way, when an image is captured from a sufficiently large number of viewpoints, the x-u space can be densely filled with data.
Conversely, an observation image from a new arbitrary viewpoint position can be generated (FIG. 7) from the data of the x-u space (FIG. 6). As shown in FIG. 7, an observation image from a new viewpoint position E(X, Z) indicated by an eye mark can be generated by reading out data on a line given by equation (1) from the x-u space.
However, the above prior art makes arithmetic operations for converting all pixels of an actually captured image into ray space groups. That is, if there are E actually captured images each having mxc3x97n pixels, the pixels are converted into light ray groups via Exc3x97mxc3x97n computations, resulting in a very large computation volume. Especially, when a ray space group is mapped in the ray space to maintain the resolution of an input image and the RS data is quantized, the quantized data size also becomes huge.
It is an object of the present invention to provide a RS data storage method and apparatus, which allow progressive display of RS data of a target object.
It is another object of the present invention to provide a method and apparatus for displaying progressively stored space data.
Actually captured image data like the aforementioned RS data is compressed and stored in an external storage device or the like for each unit (e.g., for each object). Therefore, in order to render such space data in a virtual space, the data must be downloaded onto a main storage device, decoded, and rendered on the main storage device. On the other hand, the user can recognize a given virtual space only after virtual images of all virtual objects to be rendered in that virtual space are displayed. Therefore, when there are a plurality of objects to be rendered, the user cannot recognize such virtual objects until space data of all these objects are downloaded, decoded, and rendered. That is, when the user wants to walk through such virtual space, a rendering apparatus with poor response is provided.
This is the second problem of the prior art upon handling space data such as RS data.
The third problem of the prior art results from the fact that actually captured image data such as RS data or the like contain a large volume of data. It is a common practice to store such data at a location separated from an image processing apparatus in the form of a database. For this reason, when the image processing apparatus maps a virtual image in a virtual space, a large volume of space data must be downloaded into the image processing apparatus in advance. Owing to the huge size of actually captured image data, the turn around time from when space data is requested until that space data is ready to be rendered in the image processing time is not so short, although the communication speed is improving recently. Under these circumstances, the user must be prevented from being bored during the wait time until actually captured image data is ready for use in such system that presents a virtual space to him or her. That is, during this wait time, a billboard image (a single image) with a short download time is displayed instead, although a scene from an arbitrary viewpoint position cannot be obtained.
The fourth problem of the prior art occurs when a walk-through system which allows the user to freely walk through a virtual space using actually captured image data such as RS data has a limited memory size. That is, in order to combat the aforementioned second problem, a technique for segmenting a virtual space into a plurality of subspaces (e.g., in case of a virtual art museum, each exhibition room forms one subspace) can be proposed.
More specifically, when it is detected that the user is about to approach a given exhibition room, space data of that exhibition room is prefetched to shorten the time required for transfer prior to rendering. Furthermore, when the user is about to leave that exhibition room (subspace A), space data for the next subspace (e.g., exhibition room B) must be overwritten and stored on the memory area that stored space data of exhibition room A so far. In this manner, virtual subspaces of exhibition rooms can be reproduced in turn in nearly real time even by a relatively small memory size.
This prefetch start timing is determined depending on whether or not the viewpoint position of the user approaches a target subspace. However, since the user""s viewpoint position moves using a mouse or the like without any high-precision route guide, the user may often be guided to a wrong route. That is, when it is erroneously detected that the user""s viewpoint position which does not reach a prefetch start zone has reached that zone, the system starts prefetch. Especially, when the user""s viewpoint position moves near the prefetch start zone, such operation error readily occurs. For example, as shown in FIG. 32, when the viewpoint position moves from the exhibition room space into the prefetch start zone and returns to the exhibition room space again, if the aforementioned wrong prefetch starts, large-size space data for the exhibition room space is purged (deleted), and the system must re-transfer the data of the exhibition room space to xe2x80x9creturnxe2x80x9d to the exhibition room space (since this situation takes place due to a detection error of the viewpoint position, the user has no actual sense of returning), resulting in time-consuming operation.
The present invention is directed to solving the third problem.
It is still another object of the present invention to provide an image rendering method and apparatus, which can render space data stored in an internal memory, as needed, under the condition that space data in an external memory is rendered using at least two space data, one of which is stored in the external memory, and the other of which is stored in the internal memory.
In order to achieve the above objects, an image storage method for storing space data which includes real image data of an actually captured image in association with a predetermined space different from a real image space, comprises:
the first layer dividing step of hierarchically dividing the real image data into layers in accordance with resolutions;
the second layer dividing step of hierarchically dividing a map that represents correspondence between the real image space and the predetermined space into layers in accordance with resolutions, the resolutions of the divided layers corresponding to resolutions of the layers divided in the first layer dividing step; and
the step of storing obtained hierarchical image data from the first layer dividing step and hierarchical map data from the second layer dividing step in a storage device as the space data.
According to claim 2 as a preferred aspect of the present invention, the space data is RS data.
According to claim 3 as a preferred aspect of the present invention, the layers and resolutions are set in ascending or descending order.
According to claim 4 as a preferred aspect of the present invention, each of the first and second layer dividing steps includes the step of performing a data decimation process.
According to claim 5 as a preferred aspect of the present invention, the second layer dividing step includes the block segmentation step of segmenting the map data into a plurality of blocks in correspondence with a block having a size set in correspondence with the number of divided layers.
The map of space data includes address information. In the process of dividing map data into layers, this address information must also be appropriately converted. Hence, according to claim 6 as a preferred aspect of the present invention, the second layer dividing step uses converted address ni given by:
ni=[njxe2x88x921/2pxe2x88x92i]
where p is the number of divided layers, i is a layer to be processed, and nj is the storage address of map data of the i-th layer.
According to a preferred aspect of the present invention, if the block size is Nxc3x97N, the block segmentation step sets:
N=2pxe2x88x921
where p is the number of divided layers. By satisfying this condition, hierarchization is simplified.
Hierarchical space data stored by the method of the present invention are effective in terms of progressive display at the time of rendering. Hence, according to a preferred aspect of the present invention, an image rendering method for rendering hierarchical in a virtual space, comprises:
the step of reading hierarchical space data of respective layers in ascending order of resolution; and
the rendering step of rendering a virtual image in the order the hierarchical space data is read.
According to a preferred aspect of the present invention, the method further comprises the detection step of detecting a user""s viewpoint position, and the rendering step includes the step of rendering a virtual image on the basis of the detected viewpoint position.
In order to render a virtual image still faster, objects to be rendered can be limited. Hence, according to another method of the present invention, the reading step includes the step of reading hierarchical space data of a space near the detected viewpoint position.
The above objects are also achieved by providing a storage medium that stores a program for implementing the aforementioned storage or rendering method on a computer.
According to a preferred aspect of the present invention, the present invention is a computer that mounts a storage medium.
Furthermore, the above objects are achieved by an image storage apparatus or image processing apparatus.
The above objects are also achieved by a image downloading method for downloading space data which is formed based on image data of an actually captured image in association with a predetermined space different from a real image space. That is, this method comprises:
the first layer dividing step of hierarchically dividing real image data in the space data into layers in accordance with resolutions; and
the downloading step of downloading obtained hierarchical image data, and a map that represents correspondence between the real image space and the predetermined space to an external apparatus.
According to a preferred aspect of the present invention, the method further comprises the second layer dividing step of hierarchically dividing the map into layers in accordance with resolutions, and
the downloading step includes the step of downloading the obtained hierarchical image data and hierarchical map data.
According to a preferred aspect of the present invention, the resolutions of the respective layers of the map are set in correspondence with resolutions of the respective layers divided in the first layer dividing step.
According to a preferred aspect of the present invention, the resolutions increase in an order the data are downloaded.
According to a preferred aspect of the present invention, the first layer dividing step includes the step of dividing the image data to make hierarchical image data of a first layer include real image data at a pixel position common to the respective layers, and hierarchical data of a second layer as a layer higher than the first layer not include the real image data at the common pixel position.
According to a preferred aspect of the present invention, the external apparatus merges the hierarchical image data of the first and second layers.
According to a preferred aspect of the present invention, the actually captured image data and space data are stored in an image database, which executes the first layer dividing step in response to a downloading request from the external apparatus.
The above objects are also achieved by the following image processing method. That is, this method comprises:
the step of converting input image data into space data that pertains to a predetermined space coordinate system different from an image space coordinate system of the input image data;
the first layer dividing step of hierarchically dividing the space data into layers in accordance with resolutions;
the step of generating a map that represents correspondence between image data in the image space coordinate system and space data in the predetermined space;
the second layer dividing step of hierarchically dividing the map into layers in accordance with resolutions;
the step of storing obtained hierarchical space data and hierarchical map data in a storage device; and
the image generation step of generating an image on the basis of the hierarchical space data and hierarchical map data.
According to a preferred aspect of the present invention, the resolutions of the respective layers divided by the second layer dividing step are set to correspond to the resolutions of the respective layers divided in the first layer dividing step.
According to a preferred aspect of the present invention, the layers and resolutions are set in ascending or descending order.
According to a preferred aspect of the present invention, each of the first and second layer dividing steps includes the step of performing a data decimation process.
According to a preferred aspect of the present invention, the second layer dividing step includes the block segmentation step of segmenting the map data into a plurality of blocks in correspondence with a block having a size set in correspondence with the number of divided layers.
The map of space data includes address information. In the process of dividing map data into layers, this address information must also be appropriately converted. Hence, the second layer dividing step uses converted address ni given by:
xe2x80x83ni=[njxe2x88x921/2pxe2x88x92i]
where p is the number of divided layers, i is a layer to be processed, and nj is the storage address of map data of the i-th layer.
According to a preferred aspect of the present invention, if the block size is Nxc3x97N, the block segmentation step sets:
N=2pxe2x88x921
where p is the number of divided layers. By satisfying this condition, hierarchization is simplified.
According to a preferred aspect of the present invention, the method further comprises:
the step of reading hierarchical space data of respective layers in ascending order of resolution; and
the rendering step of rendering a virtual image in the order the hierarchical space data is read.
According to a preferred aspect of the present invention, the method further comprises the detection step of detecting a user""s viewpoint position, and the rendering step includes the step of rendering a virtual image on the basis of the detected viewpoint position.
In order to render a virtual image still faster, objects to be rendered can be limited. Hence, according to another method of the present invention, the reading step includes the step of reading hierarchical space data of a space near the detected viewpoint position.
The above objects are also achieved by providing a storage medium that stores a program for implementing the aforementioned processing method on a computer.
Furthermore, the above objects are also achieved by the following image processing apparatus. That is, this apparatus comprises:
means for converting input image data into space data that pertains to a predetermined space coordinate system different from an image space coordinate system of the input image data;
first layer dividing means for hierarchically dividing the space data into layers in accordance with resolutions;
means for generating a map that represents correspondence between image data in the image space coordinate system and space data in the predetermined space;
second layer dividing means for hierarchically dividing the map into layers in accordance with resolutions;
means for storing obtained hierarchical space data and hierarchical map data in a storage device; and
image generation means for generating an image on the basis of the hierarchical space data and hierarchical map data.
According to a preferred aspect of the present invention, the resolutions of the respective layers divided by the second layer dividing means are set to correspond to the resolutions of the respective layers divided by the first layer dividing means.
According to a preferred aspect of the present invention, the layers and resolutions are set in ascending or descending order.
According to a preferred aspect of the present invention, each of the first and second layer dividing means performs a data decimation process.
According to a preferred aspect of the present invention, the second layer dividing means includes block segmentation means for segmenting the map data into a plurality of blocks in correspondence with a block having a size set in correspondence with the number of divided layers.
The map of space data includes address information. In the process of dividing map data into layers, this address information must also be appropriately converted. Hence, according to a preferred aspect of the present invention, the second layer dividing means uses converted address ni given by:
ni=[njxe2x88x921/2pxe2x88x92i]
where p is the number of divided layers, i is a layer to be processed, and nj is the storage address of map data of the i-th layer.
According to a preferred aspect of the present invention, if the block size is Nxc3x97N, the block segmentation means sets:
N=2pxe2x88x921
where p is the number of divided layers. By satisfying this condition, hierarchization is simplified.
According to a preferred aspect of the present invention, the apparatus further comprises:
means for reading hierarchical space data of respective layers in ascending order of resolution; and
rendering means for rendering a virtual image in the order the hierarchical space data is read.
According to a preferred aspect of the present invention, the apparatus further comprises detection means for detecting a user""s viewpoint position, and the rendering means renders a virtual image on the basis of the detected viewpoint position.
In order to render a virtual image still faster, objects to be rendered can be limited. Hence, according to the apparatus of the present invention, the reading means reads hierarchical space data of a space near the detected viewpoint position.
According to the present invention, an rendering method for rendering a virtual image viewed from an arbitrary viewpoint position in a virtual space, comprises the steps of:
storing first space data in a first format at a first viewpoint position in an internal memory;
storing second space data in a second format at the first viewpoint position in an external memory;
downloading the second space data from the external memory to generate a virtual image at an arbitrary viewpoint position; and
rendering the virtual image at the arbitrary viewpoint position on the basis of the first space data in the internal memory before downloading is completed, and on the basis of the second space data downloaded into the internal memory after downloading is completed.
The second space data that must be downloaded is huge space data and may often be difficult to reside on the internal memory. Before such second space data is downloaded, a virtual image is rendered on the basis of the first space data in the internal memory, thus preventing the user from being disturbed by an image non-display period, and efficiently using an expensive internal memory.
Note that the first space data is space data which is optimal to form a billboard image.
On the other hand, the first space data is VRML space data which has a small size but is inferior to the second space data in terms of precision and resolution, and the second space data is RS data which requires a large size but is superior to the first space data in terms of precision and resolution.
According to a preferred aspect of the present invention, this rendering method provides a virtual walk-through environment to a user in the virtual space.
The first space data also requires a relatively large size. It is preferable to store such first space data in the external memory. Hence, according to a preferred aspect of the present invention, the first space data is stored in the external memory, and downloading of the first space data to the internal memory is completed before downloading of the second space data.
For example, in the walk-through environment, a virtual space is made up of a plurality of subspaces. That is, the second space data is comprised of a plurality of units of space data.
Hence, according to a preferred embodiment of the present invention, the method further comprises steps of:
storing space data of a plurality of images captured in advance from a plurality of different viewpoint positions in the external memory as the second space data;
detecting a user""s viewpoint position which moves; and
executing a rendering process of an image at a viewpoint position after movement, and a download process of the second space data as parallel processes. In this specification, this method is implemented by the first example of the second embodiment.
On the other hand, in another embodiment, the method further comprises the steps of:
storing space data of a plurality of images captured in advance from a plurality of different viewpoint positions in the external memory as the second space data;
detecting a user""s viewpoint position which moves;
downloading space data corresponding to a viewpoint position after movement from the external memory; and
rendering a virtual image on the basis of the first space data in the internal memory before downloading is completed, and on the basis of the second space data which has been downloaded into the internal memory and corresponds to the viewpoint position after movement after downloading is completed. In this specification, this method is implemented by the second example of the second embodiment.
According to a preferred aspect of the present invention, the internal memory has a capacity for storing at least the first and second space data.
Note that the objects of the present invention can also be achieved by a rendering apparatus described in claim 60 and the like.
Furthermore, the objects of the present invention can also be achieved by a rendering method for rendering a virtual image at an arbitrary viewpoint position in a virtual space, according to the present invention, comprising the steps of:
rendering first space data in a first data format and second space data in a second data format at an arbitrary viewpoint position as virtual images; and
mapping the virtual image based on the first space data in the virtual space when rendering of the virtual image based on the second space data does not end in time before mapping in the virtual space.
Other features and advantages of the present invention will be apparent from the following description taken in conjunction with the accompanying drawings, in which like reference characters designate the same or similar parts throughout the figures thereof. |
Determination of Dicyclohexylamine in Beeswax by Aqueous Normal Phase Liquid Chromatography Coupled With Tandem Mass Spectrometry.
Dicyclohexylamine (DCH) is an excipient present in commercial formulations of fumagillin (Fumagilin-B® and Fumidil-B®), an antibiotic which is employed in apiculture for the control of nosema disease. DCH has been demonstrated to be stable in harvested honey; however, its fate in the beehive has not been investigated. In this study, DCH residues were determined in beeswax samples collected from brood chambers and honey supers from various apiaries throughout Alberta. The determination of DCH was performed using a simple extraction procedure followed by low-temperature cleanup and finally analysis with aqueous normal phase liquid chromatography-electrospray ionization tandem mass spectrometry. The method was found to yield high accuracy and precision (94.9 ± 1.7% to 110.8 ± 6.6%) for replicate beeswax samples spiked with 4, 80, 360 and 2,000 μg kg-1 of DCH. With a limit of quantification of 1 μg kg-1, 100% of the 61 beeswax samples analyzed were found to contain residues of DCH ranging from 15 to 6,410 μg kg-1. The results indicate that DCH can accumulate in beeswax when Fumagilin-B® or Fumidil-B® is applied in apiculture and that these concentrations can vary significantly among beekeeping operations. |
An avenue for me to share my thoughts and opinions about anything under the Sun
I have a funny feeling…
..that the Mclaren F1 team and Lewis Hamilton will win the Malaysian Grand Prix at Sepang F1 Circuit this Sunday. Lewis is a kinda of a person who when pinned to the wall, will come back stronger than ever and bite you.
So Lewis, I don’t bloody care that you lied to the FIA stewards at all. I always let your driving do the talking.
Go get ’em Lewis.
Advertisements
Like this:
LikeLoading...
Related
One thought on “I have a funny feeling…”
hello,
its pinkey2we, and i thought that it would be great if you could check out my random blog http://luhy.wordpress.com. Im really sorry if this is spam, just please check it out and add it to your blogroll!
Thanx!
-Pinkey2we |
GOP Lawmaker Doesn't Care If The Death Penalty Involves 'Being Fed To The Lions'
In an interview with the Associated Press published Saturday, Christian said Clayton Lockett's case did not sway his support for the practice.
"I realize this may sound harsh," Christian told the AP, "but as a father and former lawman, I really don't care if it's by lethal injection, by the electric chair, firing squad, hanging, the guillotine or being fed to the lions."
According to a Thursday report unveiled by Oklahoma's state prisons chief, Lockett died Tuesday night of an apparent heart attack 10 minutes after his execution was halted. Director Robert Patton said Lockett had an intravenous tap put in his groin after officials searched for 51 minutes to find a suitable vein elsewhere. That vein collapsed, and the state ran out of additional doses of drugs used in the procedure.
Prior to the execution horror, Fox News reported Monday that Christian spearheaded an effort to impeach Oklahoma state Supreme Court justices who were aiming to delay Lockett's death. After the incident Tuesday, Christian released a detailed statement, explaining how the botched execution was "unfortunate," but the "real takeaway" was Lockett's killing of a teenager.
BEFORE YOU GO
Lethal Injection
AP
Until 2010, most states used a three-drug combination: an anesthetic (pentobarbital or sodium thiopental), a paralytic agent (pancuronium bromide) to paralyze the muscle system, and a drug to stop the heart (potassium chloride). Recently, European pharmaceutical companies have refused to sell drugs to the U.S. for use in lethal injections, requiring states to find new, untested alternatives.
Gas Chamber
AP
Gas chambers, like this one pictured at the former Missouri State Penitentiary in Jefferson City, Mo., were first used in the U.S. in 1924. In the procedure, an inmate is sealed inside an airtight chamber which is then filled with toxic hydrogen cyanide gas. Oxygen starvation ultimately leads to death, but the inmate does not immediately lose consciousness.
Electric Chair
AP
The first electric chair was used in 1890. Electrodes attached to an inmate's body deliver a current of electricity. Sometimes more than one jolt is required.
Hanging
AP
Hanging was used as the primary method of execution in the U.S. until the electric chair's invention in 1890. Death is typically caused by dislocation of the vertebrae or asphyxiation, but in cases when the rope is too long, the inmate can sometimes be decapitated. If too short, the inmate can take up to 45 minutes to die.
Firing Squad
AP
This Old West-style execution method dates back to the invention of firearms. In a typical scenario in the U.S., the inmate is strapped to a chair. Five anonymous marksmen stand 20 feet away, aim rifles at the convict's heart, and shoot. One rifle is loaded with blanks.
A punishment for men convicted of high treason, "hanging, drawing and quartering" was used in England between the 13th and 19th centuries. Men were dragged behind a horse, then hanged, disemboweled, beheaded, and chopped or torn into four pieces.
Slow Slicing
Carter Cutlery/Wikimedia Commons
Also called "death by a thousand cuts," this execution method was used in China from roughly A.D. 900 until it was banned in 1905. The slicing took place for up to three days. It was used as punishment for treason and killing one's parents.
Boiling Alive
Wikimedia Commons
Death by boiling goes back to the first century A.D., and was legal in the 16th century in England as punishment for treason. This method of execution involved placing the person into a large cauldron containing a boiling liquid such as oil or water.
Crucifixion
Wikimedia Commons
Crucifixion goes back to around the 6th century B.C.used today in Sudan. For this method of execution, a person is tied or nailed to a cross and left to hang. Death is slow and painful, ranging from hours to days.
Burning Alive
Pat Canova via Getty Images
Records show societies burning criminals alive as far back as the 18 century B.C. under Hammurabi's Code of Laws in Babylonia. It has been used as punishment for sexual deviancy, witchcraft, treason and heresy.
Live Burial
Antoine Wiertz/Wikimedia Commons
Execution by burial goes back to 260 B.C. in ancient China, when 400,000 were reportedly buried alive by the Qin dynasty. Depending on the size of the coffin (assuming there is one), it can take anywhere from 10 minutes to several hours for a person to run out of oxygen. |
Nordstrom: Still Relevant in Changing Retail World
Nordstrom, Inc. (JWN)is a leading fashion retailer based in the U.S., explains David Fried, editor of The Buyback Letter, which, as its name suggests, focuses exclusively on stocks that are actively undergoing buyback and stock repurchase programs.
It began as a shoe store in Seattle, and now operates 380 stores in 40 states, including 118 full-line stores in the U.S., Canada and Puerto Rico; 248 Nordstrom Rack stores; three Jeffrey boutiques; two clearance stores; six Trunk Club clubhouses; and three Nordstrom Local service concepts.
The online customers are served at Nordstrom.com, Nordstromrack.com, HauteLook and TrunkClub.com.
Nordstrom has found a way to remain relevant in the challenging retail market that is increasingly moving online, when others may not have (Sears, JCPenney come to mind).
And the company is hoping for a kick start by opening new Nordstrom Local stores – smaller in size, offering personal styling services and alterations; these Locals are also a hub for picking up online orders.
Customers can order items shipped to the Local store to try on in person, and purchase them that day if they like. Co-president Erik Nordstrom notes that people who visit a Nordstrom Local store spend 2.5 times more than people who visit a regular Nordstrom.
The Locals will also begin to accept merchandise returns from rivals like Macy’s and Kohl’s at these smaller-format locations. JWN also recently opened its 7th Nordstrom Rack in Canada. The Rack is the off-price retail division of Nordstrom.
Long attractive to dividend investors looking for income and growth, JWN has a rising dividend yield. It’s a heavy importer of goods made in China, so the stock price has been sensitive to tariff-related news, and has whipsawed back and forth depending on news events. Q2 came in better than expected.
The company earned 90 cents a share on revenue of $3.87 billion, while analysts were looking for EPS of 77 cents on revenue of $3.92 billion. For the full year, Nordstrom expects to earn $3.25-$3.50, compared with a previous range of $3.25-$3.65, and the $3.27 consensus estimate.
The company sees net sales declining 2%, down from its prior outlook for flat to 2% growth. Shares outstanding have been reduced by 7.609% in the last 12 months. |
Featured Shows
Weekday
Weekend
Can Trump's new chief of staff bring order to chaotic West Wing?
After over 200 days of reports that Trump's White House is chaotic and divided, can his new chief of staff John Kelly finally bring some calm? Zeke Miller & Anita Kumar react. ...moreDuration: {{video.duration.momentjs}} |
Alzheimer's disease (AD) is the most common cause of dementia in later life. Pathologically, AD is characterized by the deposition of amyloid in extracellular plaques and intracellular neurofibrillary tangles in the brain. The amyloid plaques are mainly composed of amyloid peptides (Aβ peptides) which originate from the β-Amyloid Precursor Protein (APP) by a series of proteolytic cleavage steps. Several forms of APP have been identified of which the most abundant are proteins of 695, 751 and 770 amino acids length. They all arise from a single gene through differential splicing. The Aβ peptides are derived from the same domain of the APP.
Aβ peptides are produced from APP through the sequential action of two proteolytic enzymes termed β- and γ-secretase. β-Secretase cleaves first in the extracellular domain of APP just outside of the trans-membrane domain (TM) to produce a C-terminal fragment of APP containing the TM- and cytoplasmatic domain (CTFβ). CTFβ is the substrate for γ-secretase which cleaves at several adjacent positions within the TM to produce the Aβ peptides and the cytoplasmic fragment. Various proteolytic cleavages mediated by γ-secretase result in Aβ peptides of different chain length, e.g. Aβ38, Aβ40 and Aβ42. The latter one is regarded to be the more pathogenic amyloid peptide because of its strong tendency to form neurotoxic aggregates.
The β-secretase is a typical aspartyl protease. The γ-secretase is a proteolytic activity consisting of several proteins, its exact composition is incompletely understood. However, the presenilins are essential components of this activity and may represent a new group of atypical aspartyl proteases which cleave within the TM of their substrates and which are themselves polytopic membrane proteins. Other essential components of γ-secretase may be nicastrin and the products of the aph1 and pen-2 genes. Proven substrates for γ-secretase are the APP and the proteins of the Notch receptor family, however, γ-secretase has loose substrate specificity and may cleave further membrane proteins unrelated to APP and Notch.
The γ-secretase activity is absolutely required for the production of Aβ peptides. This has been shown both by genetic means, i.e., ablation of the presenilin genes and by low-molecular-weight inhibitory compounds. Since according to the amyloid hypothesis for AD the production and deposition of Aβ is the ultimate cause for the disease, it is thought that selective and potent inhibitors of γ-secretase will be useful for the prevention and treatment of AD.
An alternative mode of treatment is the modulation of the γ-secretase activity which results in a selective reduction of the Aβ42 production. This will result in to an increase of shorter Aβ isoforms, such as Aβ38, Aβ37 or others, which have reduced capability for aggregation and plaque formation, and hence less neurotoxic. Compounds which show this effect on modulating γ-secretase activity include certain non-steroidal anti-inflammatory drugs (NSAIDs) and related analogues (Weggen et al. Nature, 414 (2001) 212-16).
Numerous documents describe the current knowledge on γ-secretase modulation, for example the following publications: Morihara et al, J. Neurochem., 83 (2002) 1009-12 Jantzen et al, J. Neuroscience, 22 (2002) 226-54 Takahashi et al, J. Biol. Chem., 278 (2003) 18644-70 Beher et al, J. Biol. Chem. 279 (2004) 43419-26 Lleo et al, Nature Med. 10 (2004) 1065-6 Kukar et al, Nature Med. 11 (2005) 545-50 Perretto et al, J. Med. Chem. 48 (2005) 5705-20 Clarke et al, J. Biol. Chem. 281 (2006) 31279-89 Stock et al, Bioorg. Med. Chem. Lett. 16 (2006) 2219-2223 Narlawar et al, J. Med. Chem. 49 (2006) 7588-91 |
It’s been quite a year to say the least: I’ve mourned the demise of the Twinkie bar, and watched New York’s Board of Health legislation against a ban on the sale of large sodas and other sugary drinks at restaurants, street carts and cinemas take effect.
Meanwhile closer to home, we’ve had some drastic weather, which combined with various droughts and storms around the world look set to have a knock on effect on staple crops, such as wheat and corn, as well as pushing up the cost of animal feeds, which will make meat even more expensive.
But it’s not all doom and gloom: we’ve seen the continued rise of British street food, the march of the noodle bar and the new love affair with chicken and American style comfort food. Food markets and pop ups continue to grow and innovate, and the food ‘rave’ now seems derigeur. At least in Hoxton.
As usual, I’ve put together a list of things that may be making an appearance next year. Trend predictions are always a funny thing: I know some journalists hate them, and to be frank, most of the time it’s the equivalent of sticking a wet finger in the air, but do have a read, and let me know what you think.
Beer
The Real Ale movement has been going on in the Uk for quite some time, and there have been efforts to offer menus specifically matching beers with food (e.g. at Le Gavroche and Quilon). However next year, expect to see a different approach.
Beer is not only going to appear on the drinks list (with luck we should see more small British breweries gaining prominence), but also used as an ingredient – think beer based sauces, confectionery and even bread.
Pickling
Pundits could argue that we’re already in a pickle, but the art of preserving using vinegar is set to gain in popularity. We’re not just talking about the humble pickled onion: the likes of Meateasy and Pitt Cue have already popularised sweet and sour cucumbers, but look out for an array of veg (and interestingly fruit).
Pickles won’t just be Western style – look out for more Kim Chi, Achars from Malaysia, Chinese preserved cabbage and radish and Japanese umeboshi plums and daikon.
Barrel Ageing
Tony Conigliaro may have developed barrel aged cocktails a few years ago, but barrel ageing is going one step further.
In America, you can find Ocean aged bourbon (jeffersonbourbon.com), Aged Sumatra coffee beans (which have a distinctive wood and tobacco flavour – wateravenuecoffee.com) and aged demerara sugar with vanilla, which is left for 6 months in bourbon barrels, imparting a caramel scent (249sweet.com). It’s only a matter of time…
Goldenberry
The Goldenberry (physallis) used to be ones of those pointless garnishes in the 80s, but no longer. Goldenberries contain anti-inflammatory bioflavonoids and are also a good source of vitamins A and C.
Look out for them in jams, dried and also as a fresh juice.
Tea Bars
London has now been populated with independent coffee bars, each one carefully sourcing beans, the right milk etc. So next year, it’s tea’s turn.
Although Teapod and Teasmith have already stolen a march, look out for a new teabar from Kusmi, while Palais de Thes, having had a pop up at Harvey Nichols, may be looking for something more permanent.
Whole Animal Dining
Whole animal or whole bird dinners are set to gain in popularity. New York’s Momofuko offers a $200 Korean “bo saam” family-style meal of a dozen oysters, a whole roasted pork shoulder, bbq sauce, kimchee and lettuce in which to wrap the meat.
London’s A La Cruz did a whole lamb feast earlier this year, and other restaurants do offer whole animal options with advance booking, but expect to see this start to appear on more menus, and from a variety of cuisines.
The New Jewish
Jewish food is well known for its comfort food – think of chopped liver and knishes, bagels smothered with cream cheese and lox..the list goes on. Because of its origins, the cuisine has sometimes erred on the heavy side, but chefs such as Yottam Ottolenghi and Canadians Noah and Rae Bernamoff are producing Jewish food that is modern and incorporates newer flavours. At New York’s Mile End, a tongue sandwich uses pickled lamb tongue, sliced lengthwise, griddled and served with pumpernickel toast and red wine onion marmelade.
A Tale of Two Patisseries
While it’s with a heavy heart that I have to acknowledge the cupcake is never disappearing, two new sweet treats should be rising in popularity in 2013 – the madeleine and the choux bun. Both classically French, look out for these one or two bite morsels, which won’t just be served at afternoon tea, but also given as gifts to rival macarons. Both On Patisserie (oncafe.co.uk) and Choux (choux-london.co.uk) already offer them in a variety of flavours and colours.
Gourmet Syrups & Bitters
I’m not referring to the likes of Monin which offer a whole range of syrups commonly used in flavoured coffees, but artisan produced produced ones which have been infused with interesting botanicals, herbs and fruits, and can be used in cake making, cocktails and desserts. The Sonoma County versions shown above do a fantastic lavender syrup, while Brooklyn Bitters use organic and local ingredients to create unusual flavours, such as their Rhubarb bitters. |
Minillas River
The Minillas River () is a river of Bayamón, Puerto Rico.
See also
List of rivers of Puerto Rico
References
External links
USGS Hydrologic Unit Map – Caribbean Region (1974)
Rios de Puerto Rico
Category:Rivers of Puerto Rico |
Shut it down.
Special Counsel Robert Mueller is now investigating Trump’s firing of former FBI Director James Comey and other actions he has taken as President because, Russia.
Mueller asked the White House for documents relating to the firing of former FBI Director James Comey as well as the firing of former NatSec Advisor General Flynn, reported the New York Times.
Mueller is also seeking records on a May meeting President Trump had in the Oval Office with Russian government officials where Trump reportedly called Comey a ‘nutjob’ and said firing the FBI Director relieved “great pressure” on him.
WHO CARES.
TRENDING: Black Lives Matter Activist Wearing 'Justice for Breonna Taylor' Shirt Walked into a Louisville Bar and Murdered Three People
In the last few weeks, Mueller sent the White House a document detailing THIRTEEN different areas that his team of 17 liberal hack lawyers want more information on. Per the New York Times:
In recent weeks, Mr. Mueller’s office sent a document to the White House that detailed 13 different areas that investigators want more information about. Since then, administration lawyers have been scouring White House emails and asking officials whether they have other documents or notes that may pertain to Mr. Mueller’s requests.
Mueller also requested documents on Donald Trump Jr.’s meeting with Russian lawyer Veselnitskaya.
So Hillary Clinton can meet with Ukrainian government officials to gather dirt on Trump’s camp, mishandle classified information and use her position as Secretary of State to peddle influence and power through the Clinton Foundation and there is no Special Counsel investigating her. Amazing.
Ty Cobb, an attorney for Trump told the New York Times, “We can’t comment on any specific requests being made or our conversations with the special counsel.’’
FOX News analyst Gregg Jarrett previously stated: Mueller is Hopelessly Conflicted in Violating the Law, President Should DEMAND He Resign.
If true, this development makes the argument even more compelling that Mueller cannot serve as special counsel. He has an egregious conflict of interest. The special counsel statute specifically prohibits Mueller from serving if he has “a personal relationship with any person substantially involved in the investigation or prosecution.” The language is mandatory. He “shall” disqualify himself. Comey is substantially involved in the case. Indeed, he is the central witness. The two men and former colleagues have long been friends, allies and partners. Agents have quipped that they were joined at the hip while at the Department of Justice and the FBI. They have a mentor-protégé relationship. The likelihood of prejudice and favoritism is glaring and severe. So, it is incomprehensible that the man who is a close friend of the star witness against the president… will now determine whether the president committed a prosecutable crime in his dealings with Mueller’s good friend.
As the Gateway Pundit previously reported, Special Counsel Robert Mueller just hired another Obama-Hillary crony to investigate President Trump.
This is the 17th lawyer to join the pack of wolves investigating Trump.
Greg Andres was the 16th lawyer to be added to Mueller’s team. He worked under Eric ‘Fast N’ Furious’ Holder from 2010 to 2012. No bias here though. This is a completely fair investigation as Paul Ryan says.
Here is a look at the 15 other attorneys who will investigate Trump.
Rush Atkinson , an attorney on detail from the Criminal Division’s Fraud Section at the Department of Justice
— Donated $200 to Clinton in 2016 Peter Carr – DOJ spokesman under Barack Obama. Andrew Goldstein , a public corruption prosecutor on detail from the U.S. Attorney’s Office in the Southern District of New York
— Worked under Trump-basher Preet Bharara in the liberal New York southern district. Adam Jed , an appellate attorney on detail from DOJ’s Civil Division.
— Defended Obamacare at the DOJ. Rober Mueller – Special Counsel Team leader.
— Best friend to fired leaker James Comey.
Lisa Page , an attorney on detail from the FBI’s Office of the General Counsel and a former trial attorney with the Criminal Division’s Organized Crime and Gang Section
— Investigated Ukrainian oligarch Dmitry Firtash, a one-time business partner of former Trump campaign manager Paul Manafort, at the DOJ.
, an attorney on detail from the FBI’s Office of the General Counsel and a former trial attorney with the Criminal Division’s Organized Crime and Gang Section Elizabeth Prelogar , an appellate attorney on detail from the Office of the Solicitor General.
–Fluent in Russian; former law clerk to Justices Ruth Bader Ginsburg and Elena Kagan .
, an appellate attorney on detail from the Office of the Solicitor General. . James Quarles, a former partner at WilmerHale and a former assistant special prosecutor for the Watergate Special Prosecution Force.
–Former assistant special prosecutor on the Watergate Special Prosecution Force.
a former partner at WilmerHale and a former assistant special prosecutor for the Watergate Special Prosecution Force. Jeannie Rhee , a former partner at WilmerHale who has served in the Office of Legal Counsel at DOJ and as an assistant U.S. attorney for the District of Columbia.
— Rhee is a Clinton Foundation Lawyer and former Deputy Assistant Attorney General in the Office of Legal Counsel under Barack Obama.
, a former partner at WilmerHale who has served in the Office of Legal Counsel at DOJ and as an assistant U.S. attorney for the District of Columbia. Brandon Van Grack , an attorney on detail from the Justice Department’s National Security Division.
— Led a grand jury inquiry in Northern Virginia scrutinizing former Trump associate Michael Flynn’s foreign lobbying.
, an attorney on detail from the Justice Department’s National Security Division. Andrew Weissmann , who is on detail from the Criminal Division’s Fraud Section and who has served as general counsel at the FBI and as an assistant U.S. attorney for the Eastern District of New York.
— Weissmann donated $2,300 to the Obama Victory Fund in 2008, $2,000 to the DNC in 2006 and at least $2,300 to the Clinton campaign in 2007.
, who is on detail from the Criminal Division’s Fraud Section and who has served as general counsel at the FBI and as an assistant U.S. attorney for the Eastern District of New York. Aaron Zebley, a former partner at WilmerHale who has previously served with Mueller at the FBI and has served as an assistant U.S. attorney in the Eastern District of Virginia.
— Worked with Robert Mueller at the WilmerHale firm.
These other Mueller attorneys have less conspicuous political leanings:
Aaron Zelinsky , an attorney on detail from the U.S. Attorney’s Office in the District of Maryland.
— Worked under Assistant AG Rod Rosenstein in Maryland.
, an attorney on detail from the U.S. Attorney’s Office in the District of Maryland. Zainab Ahmad , a top national security prosecutor on detail from U.S. Attorney’s Office in the Eastern District of New York.
, a top national security prosecutor on detail from U.S. Attorney’s Office in the Eastern District of New York. Michael Dreeben, an appellate attorney on detail from the Office of the Solicitor General, described by former colleagues as one of the brightest criminal law experts of the past two generations.
President of Judicial Watch Tom Fitton has repeatedly called for the Mueller investigation to be shut down as it is unsupervised and unconstitutional.
Trump is an innocent man and he is being investigated by almost 20 left-wing lawyers for a crime that has yet to be named. |
257 S.E.2d 109 (1979)
42 N.C. App. 515
MANPOWER OF GUILFORD COUNTY, INC.
v.
Claude H. HEDGECOCK and Tempco, Inc.
No. 7818SC858.
Court of Appeals of North Carolina.
August 7, 1979.
*113 Adams, Kleemeier, Hagan, Hannah & Fouts by Clinton Eudy, Jr., and Bruce H. Connors, Greensboro, for plaintiff-appellant.
Stephen E. Lawing, High Point, for defendant-appellee.
MORRIS, Chief Judge.
Plaintiff has assigned error to the denial of its motion for a preliminary injunction and to the entry of summary judgment in behalf of both defendants. It is clear from the record that the basis of the trial court's ruling was its conclusion that the corporate employer's signature on the agreement not to compete was insufficient, and that, therefore plaintiff could not enforce the covenants against competition.
Plaintiff asserts that the issue of the signature is the only question for review because of the trial court's opinion, expressed at the hearing, that the agreement was otherwise valid and enforceable. Plaintiff's argument on appeal is addressed primarily to the sufficiency of the signatures. Although we agree with plaintiff, as pointed out below, that the employment contract and its ancillary covenants against competition are not infirm because of the requisite signatures, the sufficiency of the signatures is not the only question before us. We must consider each challenge to the enforceability of the agreement. A correct ruling by a trial court will not be set aside merely because the court gives a wrong or insufficient reason for its ruling. See e. g., In re Will of Pendergrass, 251 N.C. 737, 112 S.E.2d 562 (1960); Temple v. Temple, 246 N.C. 334, 98 S.E.2d 314 (1957); Reese v. Carson, 3 N.C.App. 99, 164 S.E.2d 99 (1968). The ruling must be upheld if it is correct upon any theory of law.
Plaintiff is correct in its contention that plaintiff's signature is not necessary to render enforceable the covenant not to compete. The sufficiency of the writing is controlled by G.S. 75-4. Its language is clear and unambiguous. Subject to the general restrictions as to reasonableness of ancillary restraints on competition, G.S. 75-4 establishes that contracts or agreements limiting the rights of persons to do business in this State may be enforceable if put in writing "duly signed by the party who agrees not to enter into any such business within such territory". G.S. 75-4 is consistent with the other "statute of frauds" provisions in our law which require only that the writing be "signed by the party charged therewith", G.S. 22-1 (29 Charles II (1676), ch. 3, sec. 4), or require that the writing be signed by "the party against whom enforcement is sought", G.S. 25-2-201(1) (Uniform Commercial Code). Our holding is consistent with the general view with respect to the necessary signatures to satisfy the Statute of Frauds. See generally 72 Am.Jur.2d, Statute of Frauds § 364. It is not necessary that the person seeking enforcement of the terms required to be in writing also sign the writing. Lumber Co. v. Corey, 140 N.C. 462, 53 S.E. 300 (1906). The reasoning for this rule was stated in the early case of Mizell v. Burnett, 49 N.C. 249 (1857).
"Common justice, and the general principles of law, require that there shall be a mutuality in contracts; that is, if one party is bound the other ought to be. But there may be exceptions. Although it is a maxim that a contract is never binding unless there be consideration, yet, there is a distinction between a consideration and the mutuality of contracts in reference to the obligation thereof, and the fact that by some other principle of law, or the provisions of a statute, one party has it in his power to avoid the obligation, although it suggests a very forcible reason for not entering into a one-sided contract, does not necessarily have the effect of making such contract void as to both parties." Id. at 253. *114 Indeed, in this situation there is no concern over the absence of mutuality. Nor do we find validity to the argument that the employment contract is not a valid contract because not properly signed by a corporate officer. A contract of employment generally need not be in writing in North Carolina to be enforceable. Because of our conclusion that the covenant not to compete satisfies the requirements of G.S. 75-4, we now direct our inquiry to determine whether the covenants are otherwise valid and enforceable as against each defendant.
Defendants contend that the covenant not to compete is unenforceable by plaintiff for three reasons. First, they argue, the agreement sued upon is, on its face, between Hedgecock and Manpower, Inc., a legal entity separate from Manpower of Guilford County, Inc., and therefore is not enforceable by this plaintiff. However, the evidence at the hearing was uncontradicted that "Manpower, Inc." was used by plaintiff as being synonymous with "Manpower of Guilford County, Inc." and also that "Manpower, Inc." was the name used by plaintiff under the terms of its licensing agreement. The trial court concluded, and we so hold, that for purposes of enforcing this contract Manpower, Inc. and Manpower of Guilford County, Inc. are one and the same. Hedgecock had been employed by plaintiff for some time prior to entering into the employment agreement and no doubt knew that his contract was with Manpower of Guilford County, Inc. Defendants' second argument challenging the validity of the covenant not to compete, which addresses the sufficiency of the signatures to the agreement, has, of course, been resolved against defendants. Finally, however, we must consider the validity of the time and territory restrictions on competition imposed by the agreement.
When the nature of employment such as in the instant case is such that the employee has personal contact with the patrons and customers of an employer, or where the employee acquires valuable information as to the nature and character of the business and the names of patrons or customers, thereby enabling him to take advantage of such knowledge and to compete unfairly with a former employer, equity may be interposed to prevent the breach of a covenant not to compete which is reasonable as to time and territory. Greene Co. v. Arnold, 266 N.C. 85, 145 S.E.2d 304 (1965); Exterminating Co. v. Griffin and Exterminating Co. v. Jones, 258 N.C. 179, 128 S.E.2d 139 (1962). The restrictions, however, must be no wider in scope than is necessary to protect the business of the employer. Comfort Spring Corp. v. Burroughs, 217 N.C. 658, 9 S.E.2d 473 (1940). See generally Annot., 41 A.L.R.2d 15 (1955); Annot., 43 A.L.R.2d 94 (1955).
A major consideration in determining the reasonableness of restrictions as to time and territory relates to the type of position occupied by the employee, and the skills and/or knowledge obtained by the employee while under employment. The individual defendant in this case occupied a managerial position which necessitated constant contact with customers of the plaintiff. Our courts have attached significance to the fact of an employee's managerial position. The employee's opportunity to acquire intimate knowledge of the business and to develop personal association with customers is an important consideration. Moskin Bros. v. Swartzberg, 199 N.C. 539, 155 S.E. 154 (1930). See also Sonotone Corp. v. Baldwin, 227 N.C. 387, 42 S.E.2d 352 (1947); Exterminating Co. v. Wilson, 227 N.C. 96, 40 S.E.2d 696 (1946). One of the single most important assets of a business is its clientele, and protection of established customers is a valid interest of the employer. See generally 43 A.L.R.2d at 162; 41 A.L.R.2d at 71. Thus, a time limitation contained in a covenant not to compete should remain valid and enforceable if its duration can be justified on the ground that it is reasonably necessary to prevent a loss of customers to the employee or a subsequent employer. See generally 41 A.L.R.2d at 71. Furthermore, in determining the reasonableness of territorial restrictions, when the primary concern is the employee's knowledge of customers, the territory *115 should only be limited to areas in which the employee made contacts during the period of his employment. See Associates, Inc. v. Taylor, 29 N.C.App. 679, 225 S.E.2d 602 (1976), cert. denied, 290 N.C. 659, 228 S.E.2d 451 (1976).
In our opinion, Hedgecock's agreement not to compete with plaintiff "for a one (1) year period after termination [of employment] (such period not to include any period(s) of violation or period(s) of time required for litigation to enforce the covenants . . .)" is reasonable. Essentially, the restriction is for a period of one year unless Hedgecock is determined to have violated the covenant. In that case, construing the restriction strictly against its draftsman, as we must do with contracts of this nature, the practical result is that the restriction continues for a maximum of one year after a breach of the covenant ceases. The time required for litigation to enforce the covenants necessarily terminates upon enforcement of a decree prohibiting a continued violation of the covenant. The result is that plaintiff is entitled to one continuous year without competition from plaintiff. This is not unreasonable. Indeed, periods far exceeding one year have been recognized as reasonable in cases where the employee has had extensive customer contact. See Machinery Co. v. Milholen, 27 N.C.App. 678, 220 S.E.2d 190 (1975); Sales & Service v. Williams, 22 N.C.App. 410, 206 S.E.2d 745 (1974). See also Greene Co. v. Arnold, supra (4 years); Welcome Wagon, Inc. v. Pender, 255 N.C. 244, 120 S.E.2d 739 (1961) (5 years); Exterminating Co. v. Wilson, supra (2 years); Moskin Bros. v. Swartzberg, supra (2 years).
Despite our conclusion that the covenant against competition is valid with respect to the time limitation, we are compelled to find that the restriction exceeds reasonable territorial limitations. The covenant provided that Hedgecock was "not to engage in a business similar or competitive to that of Manpower, Inc. and/or its affiliates and/or licensees, within a 25 mile radius of any city where there is a Manpower office or Manpower licensed business." (Emphasis added.) A restriction as to territory is reasonable only to the extent it protects the legitimate interests of the employer in maintaining his customers. This restriction potentially covers a 25-mile radius of any city in the country. Hedgecock's employer, Manpower of Guilford County, Inc., however, only has offices in Greensboro, High Point, and Winston-Salem. Manpower of Guilford County, Inc., has no legitimate interest in preventing Hedgecock from competing with other Manpower franchises in other cities or states. Although Manpower, Inc., the franchisor, may have a legitimate right to prohibit its franchisees from competing with it or its affiliates throughout the country, see generally Annot., 50 A.L.R.2d 746 (1973), it is not a party to this lawsuit seeking to enforce the territorial restrictions. We express no opinion concerning whether the covenant restrictions concerning territory would be reasonable if the franchisor, Manpower, Inc., were seeking to enforce the covenant in its capacity as perhaps a third party beneficiary of the contract. We reserve our consideration of this question until it properly is brought before this Court. Thus, we conclude that the territorial restriction imposed by plaintiff was more extensive than necessary to secure his business or goodwill. Compare Paper Co. v. McAllister, 253 N.C. 529, 117 S.E.2d 431 (1960); Comfort Spring Corp. v. Burroughs, supra. Although the restrictions might withstand scrutiny were they limited to the region in which plaintiff seeks to enjoin defendants (25 miles of Greensboro and High Point), this Court cannot in the absence of clearly severable territorial divisions, enforce the restrictions only insofar as they are reasonable. Welcome Wagon, Inc. v. Pender, supra; Noe v. McDevitt, 228 N.C. 242, 45 S.E.2d 121 (1947).
In light of our conclusion that the trial court properly entered summary judgment for defendants thus resolving against plaintiff the action for a permanent injunction and damages, we find it unnecessary to consider the assignment of error directed to *116 the denial of the plaintiff's motion for a temporary injunction.
Affirmed.
HEDRICK and WEBB, JJ., concur.
|
# Super Gluu Radius Resource Owner Password Credentials Script
# Copyright (c) 2019 Gluu Inc.
from java.util import Date , HashMap
from org.gluu.oxnotify.client import NotifyClientFactory
from org.gluu.model.custom.script.type.owner import ResourceOwnerPasswordCredentialsType
from org.gluu.oxauth.model.common import SessionIdState
from org.gluu.oxauth.model.config import ConfigurationFactory , Constants
from org.gluu.oxauth.security import Identity
from org.gluu.oxauth.service import AuthenticationService, SessionIdService
from org.gluu.oxauth.service.common import EncryptionService, UserService
from org.gluu.oxauth.service.push.sns import PushPlatform, PushSnsService
from org.gluu.service.cdi.util import CdiUtil
from org.gluu.util import StringHelper
from gluu_common import PushNotificationManager, NetworkApi, GeolocationData, SuperGluuRequestBuilder
import java
import json
import sys
class ResourceOwnerPasswordCredentials(ResourceOwnerPasswordCredentialsType):
def __init__(self,currentTimeMillis):
self.currentTimeMillis = currentTimeMillis
self.initiateAuthStepName = "initiate_auth"
self.verifyAuthStepName = "verify_auth"
self.resendNotificationStepName = "resend_notification"
self.stepParamName = "__step"
self.acrvaluesParamName = "__acr_values"
self.usernameParamName = "username"
self.passwordParamName = "__password"
self.idtokenParamName = "__id_token"
self.sessionIdParamName = "__session_id"
self.remoteIpParamName = "__remote_ip"
self.sessionIdClaimName = "__session_id"
self.clientIdSessionParamName = "__client_id"
self.authSchemeParamName = "__auth_scheme"
self.oneStepAuthScheme = "onestep"
self.twoStepAuthScheme = "twostep"
def init(self, customScript, configurationAttributes):
print "Super-Gluu-RO Init"
if not configurationAttributes.containsKey("application_id"):
print "Super-Gluu-Radius RO PW Init Failed. application_id property is required"
return False
if not configurationAttributes.containsKey("credentials_file"):
print "Super-Gluu-RO Init Failed. credentials_file is required"
return False
notificationServiceMode = None
if configurationAttributes.containsKey("notification_service_mode"):
notificationServiceMode = configurationAttributes.get("notification_service_mode").getValue2()
self.applicationId = "*" # wildcard. Selects all devices irrespective of the application
if configurationAttributes.containsKey("application_id"):
self.applicationId = configurationAttributes.get("application_id").getValue2()
credentialsFile = configurationAttributes.get("credentials_file").getValue2()
if configurationAttributes.containsKey("push_notification_title"):
self.pushNotificationManager.titleTemplate = configurationAttributes.get("push_notification_title").getValue2()
if configurationAttributes.containsKey("push_notification_message"):
self.pushNotificationManager.messageTemplate = configurationAttributes.get("push_notification_message").getValue2()
self.authWithoutPassword = False
if configurationAttributes.containsKey("auth_without_password"):
auth_without_password = configurationAttributes.get("auth_without_password").getValue2()
if StringHelper.equalsIgnoreCase(auth_without_password,"yes"):
self.authWithoutPassword = True
self.issuerId = CdiUtil.bean(ConfigurationFactory).getAppConfiguration().getIssuer()
if configurationAttributes.containsKey("issuer_id"):
self.issuerId = configurationAttributes.get("issuer_id").getValue2()
self.pushNotificationManager = PushNotificationManager(notificationServiceMode,credentialsFile)
self.networkApi = NetworkApi()
return True
def destroy(self, configurationAttributes):
print "Super-Gluu-RO. Destroy"
self.pushNotificationManager = None
print "Super-Gluu-RO. Destroyed Successfully"
return True
def getApiVersion(self):
return 11
def authenticate(self, context):
if self.perform_preliminary_user_authentication(context) == False:
print "Super-Gluu-RO. User authentication state not validated"
return False
step = context.getHttpRequest().getParameter(self.stepParamName)
if StringHelper.equalsIgnoreCase(step,self.initiateAuthStepName):
return self.initiate_authentication(context)
elif StringHelper.equalsIgnoreCase(step,self.resendNotificationStepName):
return self.resend_push_notification(context)
elif StringHelper.equalsIgnoreCase(step,self.verifyAuthStepName):
return self.verify_authentication(context)
else:
context.setUser(None)
print "Super-Gluu-RO. Unknown authentication step '%s'" % step
return False
def initiate_authentication(self, context):
print "Super-Gluu-RO initiatate_authentication"
authscheme = context.getHttpRequest().getParameter(self.authSchemeParamName)
if authscheme == None:
authscheme = self.twoStepAuthScheme
if StringHelper.equalsIgnoreCase(authscheme,self.oneStepAuthScheme):
print "Super-Gluu-RO using one-step authentication"
print "User '%s' authenticated using one-step" % context.getUser().getUserId()
return True
elif StringHelper.equalsIgnoreCase(authscheme,self.twoStepAuthScheme):
print "Super-Gluu-RO using two-step authentication"
client = CdiUtil.bean(Identity).getSessionClient().getClient()
sessionId = self.new_unauthenticated_session(context.getUser(),client)
# set session id in identity object
# this will be used by our dynamic scope script
identity = CdiUtil.bean(Identity)
identity.setSessionId(sessionId)
if not self.send_push_notification_to_user(sessionId,context):
print "Send push notification to user '%s' failed" % context.getUser().getUserId()
context.setUser(None)
return False
print "Super-Gluu-RO initiate_authentication complete"
return True
else:
print "Super-Gluu-RO. Unknown authentication scheme specified '%s'" % authscheme
context.setUser(None)
return False
print "Super-Gluu-RO using two-step authentication"
client = CdiUtil.bean(Identity).getSessionClient().getClient()
sessionId = self.new_unauthenticated_session(context.getUser(),client)
# set session id in identity object
# this will be used by our dynamic scope script
identity = CdiUtil.bean(Identity)
identity.setSessionId(sessionId)
if not self.send_push_notification_to_user(sessionId,context):
print "Send push notification to user '%s' failed " % context.getUser().getUserId()
context.setUser(None)
return False
print "Super-Gluu-RO initiate_authentication complete"
return True
def resend_push_notification(self,context):
print "Super-Gluu-RO resend_push_notification"
sessionIdService = CdiUtil.bean(SessionIdService)
session_id = context.getHttpRequest().getParameter(self.sessionIdParamName)
if session_id == None:
print "Super-Gluu-RO. No session_id was specified for resend_push_notification"
context.setUser(None)
return False
sessionId = sessionIdService.getSessionId(session_id)
if sessionId == None:
print "Super-Gluu-RO. Session '%s' does not exist or has expired" % session_id
context.setUser(None)
return False
client = CdiUtil.bean(Identity).getSessionClient().getClient()
if not self.verify_session_ownership(sessionId,context.getUser(),client):
print "Super-Gluu-RO. resend_push_notification_failed due to invalid session ownership"
context.setUser(None)
return False
self.send_push_notification_to_user(sessionId,context)
print "Super-Gluu-RO resend_push_notification complete"
return True
def verify_authentication(self, context):
print "Super-Gluu-RO verify_authentication"
session_id = context.getHttpRequest().getParameter(self.sessionIdParamName)
sessionId = CdiUtil.bean(SessionIdService).getSessionId(session_id)
if sessionId == None:
print "Super-Gluu-RO.verify_authentication failed. Session {%s} does not exist or has expired" % session_id
context.setUser(None)
return False
client = CdiUtil.bean(Identity).getSessionClient().getClient()
if not self.verify_session_ownership(sessionId,context.getUser(),client):
print "Super-Gluu-RO. verify_authentication failed due to invalid session ownership"
context.setUser(None)
return False
if not self.is_session_authenticated(sessionId):
print "Super-Gluu-Ro. verify_authentication failed. Session is not authenticated"
context.setUser(None)
return False
print "Super-Gluu-RO verify_authentication complete"
return True
def perform_preliminary_user_authentication(self, context):
username = context.getHttpRequest().getParameter(self.usernameParamName)
if self.authWithoutPassword:
userService = CdiUtil.bean(UserService)
user = userService.getUser(username,"uid")
if user == None:
print "Super-Gluu-RO. User '%s' not found" % username
return False
context.setUser(user)
print "Super-Gluu-RO. User '%s' authenticated without password" % username
return True
password = context.getHttpRequest().getParameter(self.passwordParamName)
authService = CdiUtil.bean(AuthenticationService)
if authService.authenticate(username, password) == False:
print "Super-Gluu-RO. Could not authenticate user '%s' " % username
return False
context.setUser(authService.getAuthenticatedUser())
return True
def new_unauthenticated_session(self,user,client):
sessionIdService = CdiUtil.bean(SessionIdService)
authDate = Date()
sid_attrs = HashMap()
sid_attrs.put(Constants.AUTHENTICATED_USER,user.getUserId())
sid_attrs.put(self.clientIdSessionParamName,client.getClientId())
sessionId = sessionIdService.generateUnauthenticatedSessionId(user.getDn(),authDate,SessionIdState.UNAUTHENTICATED,sid_attrs,True)
print "Super-Gluu-RO. Generated session id. DN: '%s'" % sessionId.getDn()
return sessionId
def send_push_notification_to_user(self, sessionId,context):
remote_ip = context.getHttpRequest().getParameter(self.remoteIpParamName)
if remote_ip == None or (remote_ip != None and StringHelper.isEmpty(remote_ip)):
remote_ip = self.networkApi.get_remote_ip_from_request(context.getHttpRequest())
user = context.getUser()
srbuilder = SuperGluuRequestBuilder()
srbuilder.username = user.getUserId()
srbuilder.app = self.applicationId
srbuilder.issuer = self.issuerId
srbuilder.state = sessionId.getId()
srbuilder.requestLocation(self.networkApi.get_geolocation_data(remote_ip))
srbuilder.req_ip = remote_ip
device_count = self.pushNotificationManager.sendPushNotification(user,self.applicationId,srbuilder.build())
if device_count == 0:
print "User %s has no device enrolled for Super-Gluu authentication" % user.getUserId()
return False
return True
def is_session_authenticated(self, sessionId):
if sessionId == None:
return False
state = sessionId.getState()
custom_state = sessionId.getSessionAttributes().get(SessionIdService.SESSION_CUSTOM_STATE)
if state == None:
print "Super-Gluu-RO. Session {%s} has no state variable set" % sessionId.getId()
return False
state_unauthenticated = SessionIdState.UNAUTHENTICATED == state
state_authenticated = SessionIdState.AUTHENTICATED == state
custom_state_declined = StringHelper.equalsIgnoreCase("declined",custom_state)
custom_state_expired = StringHelper.equalsIgnoreCase("expired",custom_state)
custom_stated_approved = StringHelper.equalsIgnoreCase("approved",custom_state)
if state_unauthenticated and (custom_state_declined or custom_state_expired):
print "Super-Gluu-RO. Session {%s} isn't authenticated" % sessionId.getId()
return False
if state_authenticated or (state_unauthenticated and custom_stated_approved):
print "Super-Gluu-RO. Session {%s} is authenticated" % sessionId.getId()
return True
return False
# this function verifies if the session was created when invoked with the
# current client's credentials and with the current user's credentials
def verify_session_ownership(self, sessionId, user, client):
session_attributes = sessionId.getSessionAttributes()
client_id = session_attributes.get(self.clientIdSessionParamName)
if not StringHelper.equalsIgnoreCase(client.getClientId(),client_id):
print "Super-Gluu-RO. Session {%s} client_id mismatch" % sessionId.getId()
return False
user_id = session_attributes.get(Constants.AUTHENTICATED_USER)
if not StringHelper.equalsIgnoreCase(user_id,user.getUserId()):
print "Super-Gluu-RO. Session {%s} user_id mismatch" % sessionId.getId()
return False
return True
|
#!/bin/bash
# Copyright 2019 Tomoki Hayashi
# MIT License (https://opensource.org/licenses/MIT)
# shellcheck disable=SC1091
. ./path.sh || exit 1;
num_dev=100
num_eval=100
train_set="train_nodev"
dev_set="dev"
eval_set="eval"
shuffle=false
# shellcheck disable=SC1091
. utils/parse_options.sh || exit 1;
db_root=$1
spk=$2
data_dir=$3
# check arguments
if [ $# != 3 ]; then
echo "Usage: $0 <db_root> <spk> <data_dir>"
echo "e.g.: $0 downloads/cms_us_slt_arctic slt data"
echo ""
echo "Options:"
echo " --num_dev: number of development uttreances (default=250)."
echo " --num_eval: number of evaluation uttreances (default=250)."
echo " --train_set: name of train set (default=train_nodev)."
echo " --dev_set: name of dev set (default=dev)."
echo " --eval_set: name of eval set (default=eval)."
echo " --shuffle: whether to perform shuffle in making dev / eval set (default=false)."
exit 1
fi
set -euo pipefail
# check speaker
available_spks=(
"slt" "clb" "bdl" "rms" "jmk" "awb" "ksp"
)
if ! echo "${available_spks[*]}" | grep -q "${spk}"; then
echo "Specified speaker ${spk} is not available."
echo "Available speakers: ${available_spks[*]}"
exit 1
fi
[ ! -e "${data_dir}/all" ] && mkdir -p "${data_dir}/all"
# set filenames
scp="${data_dir}/all/wav.scp"
segments="${data_dir}/all/segments"
# check file existence
[ -e "${scp}" ] && rm "${scp}"
[ -e "${segments}" ] && rm "${segments}"
# make scp
find "${db_root}" -name "*.wav" -follow | sort | while read -r filename; do
id="${spk}_$(basename "${filename}" | sed -e "s/\.[^\.]*$//g")"
echo "${id} ${filename}" >> "${scp}"
done
# make segments
find "${db_root}/lab" -name "*.lab" -follow | sort | while read -r filename; do
# get start time
while read -r line; do
phn=$(echo "${line}" | cut -d " " -f 3)
if [ "${phn}" != "pau" ]; then
break
fi
start=$(echo "${line}" | cut -d " " -f 1)
done < <(tail -n +2 "$filename")
# get end time
while read -r line; do
end=$(echo "${line}" | cut -d " " -f 1)
phn=$(echo "${line}" | cut -d " " -f 3)
if [ "${phn}" != "pau" ]; then
break
fi
done < <(tail -n +2 "$filename" | tac)
echo "${spk}_$(basename "${filename}" .lab) ${spk}_$(basename "${filename}" .lab) ${start} ${end}" >> "${segments}"
done
# check
diff -q <(awk '{print $1}' "${scp}") <(awk '{print $1}' "${segments}") > /dev/null
# split
num_all=$(wc -l < "${scp}")
num_deveval=$((num_dev + num_eval))
num_train=$((num_all - num_deveval))
utils/split_data.sh \
--num_first "${num_train}" \
--num_second "${num_deveval}" \
--shuffle "${shuffle}" \
"${data_dir}/all" \
"${data_dir}/${train_set}" \
"${data_dir}/deveval"
utils/split_data.sh \
--num_first "${num_dev}" \
--num_second "${num_eval}" \
--shuffle "${shuffle}" \
"${data_dir}/deveval" \
"${data_dir}/${dev_set}" \
"${data_dir}/${eval_set}"
# remove tmp directories
rm -rf "${data_dir}/all"
rm -rf "${data_dir}/deveval"
echo "Successfully prepared data."
|
Preparation for the European Council (14-15 December 2006) (debate)
President
The next item is the Council and Commission statements on the preparation for the European Council on 14-15 December, that is to say, starting tomorrow.
Paula Lehtomäki
Mr President, ladies and gentlemen, thank you for this opportunity to discuss here in Parliament beforehand the European Council meeting to be held on 14 and 15 December. The main themes at the summit that convenes tomorrow will be enlargement, more effective decision-making in justice and home affairs, and immigration policy.
The Heads of State or Government will hold an in-depth debate in the European Council on how to take the EU's enlargement process forward. The Presidency has a clear mandate from the June European Council to hold this debate. The enlargement strategy made public on 8 November, and the in-depth discussion in the General Affairs and External Relations Council on Monday, will provide a sound basis for the European Council discussions.
As I stated here this morning, the aim of the enlargement debate is to consolidate the commitments that we have now made to Croatia and Turkey, who are now engaged in membership negotiations, and to the countries of the Western Balkans.
It is our intention that the outcome of the European Council's enlargement debate should result in a renewed agreement by the Member States on the future of enlargement. It will be based on the Commission's enlargement strategy: keeping to commitments on conditionality and better communications. At the same time, attention must also be paid to the EU's capacity to accept new members.
Enlargement is not the only topic of major importance to the future of the Union to be discussed at the summit starting tomorrow. Over dinner, Prime Minister Vanhanen will give his colleagues his assessment of the confidential consultations which have been held during our Presidency on the future of the Constitutional Treaty. He will also present the most important general conclusions from the consultations.
It was the aim of the Finnish Presidency to move on to a more active phase of the debate on the Constitutional Treaty after a year of silence. Consultations have now been held with all Member States and with Romania and Bulgaria, which will join the Union on 1 January 2007. It has been rewarding to realise that internal debate has begun in the Member States, and has become robust. It has been too early to look for ready solutions, but we have been able to identify certain priorities in the views expressed by the Member States. We will be presenting our detailed analysis to the German Presidency to serve as a basis for the continuation of this work.
One conclusion of crucial significance for the future is that all Member States think that the Treaties need to be reformed to ensure that the Union functions properly. We now need to consider together how best to move forward. We need to come up with a formula that everyone can agree on.
The Finnish Parliament adopted the Constitutional Treaty at the beginning of this month, and the President of the Republic of Finland decided to ratify the Treaty last week. This makes Finland the 16th Member State to ratify the Treaty. By doing this, we want to send the message that we think that the Constitutional Treaty is a well-balanced package and provides a good basis to work on in the search for a solution that is acceptable to all Member States.
The general public expects effective action from the Union to combat international crime, human trafficking and terrorism. There is quite a lot of evidence showing that the Union is currently unable to meet its citizens' expectations as well as it might.
Time after time, the way forwards is obstructed by a small minority of Member States using their veto to block a decision. It is disturbingly easy to come up with examples: negotiations on the European arrest warrant lasted for more than three years; we have made no progress in the past two years in discussions on a framework decision on combating racism; and talks on developing cross-border police investigations petered out. Unfortunately, last week a framework decision on prisoner transfers was scuppered by the opposition of one Member State.
Examples like these explain why the Finnish Presidency made improving decision-making one of its objectives, especially when the decisions are about improving the security of our citizens. We were also given a clear mandate for this by the June European Council.
Police cooperation and cooperation in criminal matters is a difficult area. The Member States' willingness to compromise is unfortunately minimal on many important issues, since the veto can always be used to block a decision at the last minute. Negotiations deliver meagre results and little progress.
Some Member States have said that, instead of striving for more effective decision-making, the Union should concentrate on developing concrete cooperation. Action is the best way to promote areas of common concern to us. Practical cooperation, however, requires ground rules, and it is precisely these rules which we have found difficult to agree on. This problem cannot be ignored.
It is clearly not just the public but also the EU Member States that have been frustrated with the way the Union operates. This has led more and more Member States to ponder the possibility of switching to a model of enhanced cooperation. Some Member States have decided to pursue the path of cooperation outside EU structures. A good example of this is the Prüm agreement.
Finland has proposed switching to qualified majority voting for decisions on police cooperation and cooperation on crime, a change that is already possible under the existing Treaties. It has become clear during the course of the Finnish Presidency, however, that the Member States are not keen on this solution. We are still of the opinion, though, that we need a more effective, more open and more responsible way of making decisions on police cooperation and cooperation on crime.
That is why we want to exhaust all the possibilities provided by the mandate given to us last June to make decision-making more effective. The European Council is set to discuss more effective decision-making in the field of justice and home affairs. We hope that the Heads of State or Government will be able to make a commitment to finding a solution to this problem, which has already been solved once in the talks on the Constitutional Treaty.
The European Parliament has made its views on this matter very clear. The Presidency very much appreciates the contribution Mr Borrell made at the informal meeting of Heads of State or Government in Lahti, where you, Mr President, clearly expressed Parliament's opinion that decision-making in the area of justice and home affairs had to be made more effective.
A great deal of work has been done on various issues relating to immigration during Finland's Presidency. Good progress has been made on implementing the global approach. That has also proven to be the right way to tackle this issue. Immigration is currently one of the biggest challenges facing the Union, but it is also an opportunity.
During the Finnish term, special attention has been paid to cooperation with African countries. We organised two productive ministerial conferences on immigration and development. In addition, Frontex, the EU's border security agency, has coordinated successful operations on the Union's southern borders.
The next major step is to agree on the principles for a global approach for other geographical regions and to extend its scope to other policy areas too.
We have consistently stressed that the EU needs to be able to formulate a comprehensive policy for managing immigration, one that gives due attention to the issues surrounding both illegal and legal immigration, including integration.
The European Council which starts tomorrow proposes to agree on the priorities for next year. The measures agreed will be based on the two Commission communications from last week.
It is important for us to be able to agree not just on long-term action but also on measures that the Union can take in response to sudden and unexpected migration flows.
Since there is only one official meeting of the European Council during our Presidency, a great many hopes and expectations have been pinned on the conclusions of the meeting. We have nevertheless long held the opinion that the Heads of State or Government should see the European Council conclusions as a genuine reflection of their discussions. They should not be just a list of all the pending issues and all matters for consideration. Accordingly, in preparing for the European Council, we were guided by the notion that the conclusions should cover only those issues which were actually to be discussed by the Heads of State or Government, or on which political guidelines need to be set for future work.
Thus, the conclusions for this European Council will make reference not just to the discussion topics that I have mentioned, but will mention innovation policy, energy policy and climate change as a follow-up to the Lahti meeting of Heads of State or Government. These are important themes for the future of the Union, and the European Council will monitor how work is progressing on all of them when it meets next spring.
At the Foreign Ministers' dinner, to be held in conjunction with the European Council tomorrow evening, the discussion will centre on the Middle East, including Iran, and Africa, in particular the situation in Sudan and Darfur.
Mr President, ladies and gentlemen, I hope and believe that we will have an active and worthwhile exchange of views on matters for discussion at the European Council which starts tomorrow.
(Applause)
President
Thank you very much, Mrs Lehtomäki. Following your speech, I would like to thank you on my own behalf and on behalf of all of the Members for your efforts and your work during the Finnish Presidency that is now drawing to a close. You have attended eight sittings, you have taken part in thirty debates on various issues and you have always been available to Parliament. You therefore deserve our appreciation and gratitude.
(Applause)
|
Q:
How to deal with comments about my likes and dislikes
Let me try to explain. I have certain food items that I really dislike. I am not allergic to them, but their taste I just can not bear at all. They include some foods that people tend to have in too many meals, and the best example is onions (in any way, green onions, leek, cooked onions, etc.). Overall I am not a very picky eater, but even a tiny bit of onion will spoil any dish for me. I know I am not alone in this, I have several friends also totally disliking onions, but in general people like them, obviously.
So whenever I am at a restaurant and I have to mention food should be cooked without onions, they sometimes forget it, then I remind them I asked, and the waiter either says something like: "But it compliments the dish!" or "But there's not much of it!", or they pick the most obvious pieces out, but it remains there.
Whenever I am with friends or I meet new people in a friendly gathering and someone cooks for everyone, every time I am being mocked - in a friendly way, but - about it. I have, unfortunately, zero sense of humor, even though I try to cultivate it and am a good-natured person, so I can never think of a witty or a proper answer.
Whenever I am visiting my granny, she loves to cook for me (as grannies are) and at every single meal there will be a talk how I should try onions and how food is not eatable without them and so on and so forth.
I know this is my own problem, but I get really frustrated from all these comments and situations. I know I can not change everyone around me. I can definitely not change granny or any new people I meet, and I can not force my friends not to joke about it since it's their way of expressing friendliness towards me, light jokes. But it seriously angers me and makes me feel like an idiot. I can not control my food dislike, that's a given.
Any advice of how I can behave in such situations? Maybe how to answer properly to stop the conversations at the very start, not being too rude, but effective? I hope I have made it clear enough.
A:
When it comes to strangers, or servers at restaurants (people you are never going to meet again), I would stick to telling them it's an allergy (or better, express that you'll have a 'bad reaction' to consuming them) if they ask. There's no reason for them to care whether it's a preference or an allergy, they should take your food preparation request seriously regardless. This way when the food preparation does go amiss (onions in your food), you can tell them that you can't eat it (which is true, because for you the dish tastes awful and is ruined), without being grilled for your preferences.
Example encounter:
You order your food with no onion
You receive your food WITH onion
You: "Excuse me, I can't eat this, could I please get a new dish without onion?"
Waiter: "Why not? There's not that many, you can pick them out."
At this point, the waiter is putting you on the spot and being argumentative of your own personal preferences.
You: "I'm unable to digest onion/I have an allergic reaction to eating onion/I'm intolerant to onion."
If the waiter presses any further, tell them it's not their business (this is a polite thing to do at this point, honestly)
The above is something a friend of mine with gastroparesis (which eliminates a wide variety of foods from a diet) frequently did at restaurants. She found that it ended up being more tiresome to explain why she was making a request to someone than to just tell them she was allergic. Your experience at a venue is your business alone, and telling a white lie to ensure you continue to enjoy your experience without arguing with a server is acceptable.
However, the people in your life who know that you simply don't like onions are a harder subject to address. It might be best to find a short sentence you can respond with whenever it comes up. I was giving my friend who dislikes eggs a hard time once, to which he replied:
Never going to eat them - they taste like feet.
I certainly don't agree that eggs taste like feet, but I could agree that if something reminded me of feet while I was eating it, I'd stop eating it too!
Just find a short, somewhat comical (tastes like feet/butts/etc.), statement that you can say quickly and passively to move the conversation along. I'd aim for something universally unappetizing, so that the interest to continue talking about food is lessened.
This also has the effect to make people think "WOW, I am not going to bring up onions around Alice anymore because every time I do, she talks about feet!"
|
12 October, 2016 | 19:00–21:00, Members’ Restaurant, European ParliamentEuropean sustainable biodiesel – Towards a low-carbon economy post-2020Sharing experiences with CaliforniaOrganised under the kind patronage of Ms Françoise Grossetête, MEP and Vice-President of the EPP Group, this event will bring together decision-makers from both the EU and California, as well as representatives of the agricultural and the biofuel sectors, to share experiences and discuss the role of European sustainable biodiesel in the low-carbon economy.Registration is mandatory: jeanmichel.luyckx(at)hkstrategies.com |
Alabama’s economy is growing, but not as fast as the economy in many neighboring Southern states.
The Yellowhammer State’s gross domestic product - the value of goods produced and services provided in a year - increased by about $9 billion between 2015 and 2018, a 4.8 percent increase, according to recently released data from the Bureau of Economic Analysis. That brings Alabama’s total GDP to $198 billion.
Alabama is firmly in the middle of the pack nationally. The state’s GDP and GDP percent growth both rank 27th in the United States. Its GDP growth in terms of total dollars ranks 26th.
Nearby Florida, Georgia, South Carolina and Tennessee all have seen faster GDP growth since 2015. Florida and Georgia rank 9th and 10th nationally, but the top 10 is dominated by the West Coast. The eastern-most state in the top eight is Colorado at No. 8.
Economies on the West Coast are doing very, very well. | graphic by Ramsey Archibald
Most Alabama counties are seeing economic growth, but growth is slow compared to the rest of the country. The fastest growing economy in the state - Lee County - ranks just 550th in the country.
Forty-four of Alabama’s 67 counties saw their GDP rise by more than 1 percent between 2015 and 2018, according to the BEA. Lee County, the home of Auburn University and one of the fastest-growing counties in the state, saw the largest increase at just over 10 percent.
Lee’s GDP increased by $550 million to just over $6 billion in 2018.
Jefferson, the most populous county in the state, had a GDP of nearly $42 billion in 2018. Madison, home of the booming tech hub Huntsville, was a distant second with nearly $22 billion.
But Madison’s economy is growing at a faster rate than Jefferson’s. Madison’s GDP has grown by over 9 percent since 2015, the fourth fastest rate of growth in the state. Jefferson’s grew by 5.7 percent.
But Jefferson added over $2.2 billion in GDP over those four years. That’s more than the total GDP of 48 Alabama counties.
Mobile County has the state’s third-largest GDP at $17.9 billion, with growth of just 1.9 percent. Montgomery’s GDP is $12.6 billion, and grew by 2.8 percent. Shelby, with $10.3 billion GDP, was the only other county with more than $10 billion.
Jefferson County's GDP is nearly twice as large as the next closest county. | graphic by Ramsey Archibald
Alabama’s top 10 counties in terms of percent growth since 2015 is a somewhat eclectic list.
First-place Lee isn’t exactly surprising, but Washington County, a rural county just north of Mobile along the Mississippi border, is second. It’s GDP increased by 9.8 percent.
Washington is followed by two of the fastest-growing counties in the state - Shelby and Madison. But behind them is Coffee County at 8.9 percent. The rest of the top 10 is rounded out by Bullock, Chambers, Marshall, Baldwin and Coosa counties.
Baldwin is the fastest-growing county in Alabama in terms of population. Coosa’s GDP increased by 7.4 percent, but it has the lowest total GDP in the state at $177 million.
Most of Alabama's counties are seeing some kind of economic growth. | graphic by Ramsey Archibald
Not all of Alabama is seeing economic growth. Several counties are basically stagnant, and 18 saw their GDP decrease since 2015.
The biggest percentage loss was in Perry, where the GDP decreased by nearly 10 percent. Only 208 counties in the country, out of more than 3000, saw larger losses.
Do you have an idea for a data story about Alabama? Email Ramsey Archibald at rarchibald@al.com, and follow him on Twitter @RamseyArchibald. |
Post-quake, it has experienced a population boom. But the 'Town of the Future' has built four new schools in recent years.
Something must be happening in a town that has gone from just one primary school to five primaries and a secondary school in about as many years. Rolleston has a future, as John McCrone discovers.
It is obligatory to mention the road-side sign that for many years gave everybody driving by a hearty chuckle. "Rolleston: The town of the future."
In the 1970s, Labour Prime Minister Norman Kirk thought the sleepy rail junction village of 1000 people would be a great place for a state-built satellite town of 50,000 to 80,000. Another Porirua or Otara.
Christchurch was beginning to bust its green belt urban limit. Rolleston could be a second city which would siphon off that growth pressure.
A change of government saw the idea shelved. But for many years – promoted by local developers – the "town of the future" sign stood proud and ironic at the state highway turn-off, until someone quietly took it down.
READ MORE:
* Ports go head on in battle for container traffic
* Rolleston's Izone industrial park fast-tracks land development by two years
* Rolleston running out of residential land
* Ambitious plan to develop Rolleston
Today, however, Rolleston is no longer anyone's joke.
Instead, driven by a post-quake need for new housing, and also a surprise twist where Rolleston has become the focus of a freight-forwarding battle between the South Island ports, it is undergoing crazy growth – officially the fastest expanding small town in the country.
The developers can't carve out new lots quick enough. Down at Faringdon, one of a number of sprawling subdivisions, salesman Brian Mason says out of 1000 sections, he only has about 15 left.
Every stage of the four-year-old development is being snapped up as soon as it is released, Mason says. "People love the rural feel here. They say how spacious and safe it is. Yet Christchurch is right on the doorstep."
Iain McGregor Levi Park, one of many subdivisions which have helped house Rolleston's 19,000 residents.
At the offices of Selwyn District Council, Deputy Mayor Sarah Walters says Rolleston's pace of growth is indeed confounding all expectations.
It is hard for outsiders too appreciate just how fast the town is whizzing along, Walters says. "Which makes it a great success story on one level, but an interesting dynamic, an interesting challenge, on other levels," she adds, mixing a groan with the smile.
Walters says to get a grip on the numbers, Rolleston's population was scratching to get to 3000 just 15 years ago. The opening of a New World supermarket in 2002 was the first sign of something possibly starting to happen.
"Rolleston was beginning to develop a little bit. But the council at the time thought Rolleston was only going to get to about 4500 people. So to build a supermarket at that time was a big sign of commitment."
However, then came the Canterbury earthquakes and a flood of house-construction. Walters says under emergency government powers, greenfield land intended to be developed over many decades was released onto the market all at once.
By 2013, the population of Rolleston had breezed past 9000. Today it stands at 14,000. Predictions it will hit 19,000 within 10 years are beginning to look like an underestimate.
Walters says the mix of arrivals is cosmopolitan. "We seem to have a lot of English especially." And rather than being all quake refugees, it is more often the case that people have sold a home in Christchurch, allowing them to make the step further out.
But above all the demographic is youthful, says Walters. It is largely young families that are coming. And this is making Rolleston a 1960s baby boom story all over again. You see people pushing prams everywhere.
Council figures show that a quarter of Rolleston is aged under 15, compared to a Canterbury average of 16 per cent. And just 8 per cent are over 65 – half the usual number.
So Walters says six years ago, Rolleston had a single primary school. Now that one is bursting at the seams, having become the largest in the South Island. And the ministry has had to build three new primaries, with a fifth, Lemonwood, about to open after Christmas.
And also opening after Christmas is a first secondary school, Rolleston College. With 250 Year 9 pupils as an initial intake, it will be the fastest growing secondary school seen anywhere for a long time.
It is just like a repeat of the baby boom, says Walters. You can see why she groans about the challenge. Can Rolleston keep pace with its own expansion?
ALDEN WILLIAMS/FAIRFAX NZ Rolleston's pace of growth is confounding all expectations.
After the new schools there are also the new parks and sports grounds.
Rolleston College is being built on the corner of Foster Park – the second new public reserve the council has created over the past few years. Yet already Rolleston needs a third still larger.
"Foster Park is only just under development, but we've identified that even that's not going to meet the long-term needs. So we've just bought another block of 100 hectares for a future reserve," Walters says.
Likewise the $15 million Selwyn Aquatic Centre. The first indoor pool in Selwyn, it was only opened in 2013. However plans are in hand for its expansion.
And Rolleston's library and community centre – not much older – are slated to be replaced as part of a major redesign and enlargement of the town shopping centre.
You get the picture, Walters says. The traffic barrelling down the state highway doesn't see what is happening off to the side. But back from the road, Rolleston is growing like stink.
The council doesn't even publish traditional town maps anymore. New streets and facilities are being added too fast. "Now we just print off A3 sheets as people need them so they are up-to-date with things."
Walters says with construction about to start on the Southern Motorway extension – which will halve the journey time between Rolleston and central Christchurch – the town is only going to become even more attractive as an alternative to other post-quake housing areas like Halswell, Wigram and Belfast.
So for Christchurch, it seems time to stop laughing and start asking. Where is Rolleston's rapid expansion all headed?
Does it spell the emergence of a serious rival – a new town on the doorstep stealing away valuable economic growth from the big city? Or instead, is Rolleston going to wind up effectively a new motorway suburb of Christchurch?
Whatever the answer, Rolleston certainly appears to be winning.
Transport hub
As they say in real estate, it all comes down to location. And that is a big reason why people have so long scoffed about the idea of Rolleston.
When Kirk talked of an instant new town, the common reaction was who would ever want to live stuck out in the middle of such a dry, flat and stony part of the Canterbury plains.
Rolleston lacks any obvious destination appeal – no beaches, no hills, no rivers, no wetlands, no bush, no views or interesting features of pretty much any kind.
And yet the converse of that, points out Walters, is it means Rolleston has an abundance of good, cheap land, ideal for construction.
There are no braided rivers threatening floods. Or more importantly these days, Rolleston's shingle ground is proof against earthquakes. Boring can be an advantage when thinking of making 50 to 100 year investments in a town.
Joseph Johnson Rolleston School pupils Chloe Simmons, Edan Innes and Cam Poki during a sports activity. Young families are making Rolleston a 1960s baby boom story all over again.
And then Rolleston is strategically positioned as a transport hub.
Walters says not only is Rolleston sitting on the state highway, soon to be connected all the way into Christchurch by a motorway, but it exists as a settlement because 150 years ago it was the rail junction where the South Island track forks to cross over to the West Coast.
So it is a convergence of road and rail. And this is what is driving the other side of Rolleston's extreme growth – the snowballing development of the empty fields across the northern side of the state highway to create what is now the South Island's fastest spreading industrial estate.
Selwyn council has its 180ha Izone Southern Business Hub – an area reserved for factories and warehouses larger than Hagley Park.
And next door to that, Christchurch's richest family, the Carter Group, has begun to break ground on I Port, a further 120ha of industrial – and possibly big box retail – development.
Recounting its history, former Selwyn councillor and local poultry farmer turned developer, Jens Christensen, says the Izone began as a gut decision.
Back in 2002, the council knew Rolleston would need local jobs if it was to grow. It didn't want to be simply a satellite commuter community of Christchurch.
So when the council's economic development portfolio was dropped in his lap, says Christensen, it seemed an obvious thing to use Rolleston's abundance of land to start an out-sized business park where people could build mega-projects without the usual city restrictions.
"In this day and age, it was a pretty unique decision because there were no feasibility studies, no economic studies, no studies on anything – just the feeling this would go because it was adjacent to the highways and railways both to the north and south, and also to the West Coast."
Christensen says it helped Selwyn council was small and so handed the whole project to a commercial board. They came in and put in the wide roads, the industrial scale drainage – all the features that would attract big business.
"We made it easy for developers to pick up the size of property they wanted. We met whatever the market asked for. And we were a third to half of the price of industrial land in Christchurch."
Joseph Johnson Developers can't carve out new lots quick enough. "People love the rural feel here. They say how spacious and safe it is. Yet Christchurch is right on the doorstep," says Faringdon salesman Brian Mason.
But Christensen says no-one could imagine how quickly the Izone has taken off. It now houses over 60 businesses employing about 1100 people.
Warehouse was one of the first, building its South Island distribution centre with a shunting area where it could take the containers straight off the trains. Then came others like Westland Milk and PGG Wrightson Seeds.
Drive around the Izone and there are Fiordland lobster exporters, steel fabricators, wheelchair makers, and farm construction firms. Christensen says because of Rolleston's position, it is becoming a South Island centre for freight despatch and agribusiness.
So the industrial zone was going well, and then a year ago it took another huge jump because the ports decided to make Rolleston a battleground in their national-level competitive tussle.
The Port of Tauranga has ambitions to be New Zealand's main deep harbour taking the next generation of super-sized container ships. South Island ports like Lyttelton could be reduced simply to being local feeders.
As part of its positioning, in 2013 Tauranga took a half stake in Timaru's struggling PrimePort. Then it followed that by buying 15ha in Rolleston's Izone to create MetroPort, an inland freight clearing facility.
Christensen says the logic is that trucks of milk powder, chilled lamb or other Canterbury produce can converge on Rolleston where there will be the free choice of which way to send it – either south by rail to PrimePort, or north to Lyttelton, depending on who offers the best deal.
To counter that clever move, Lyttelton Port has built its own mirror-image operation. The 27ha MidlandPort has just opened as the first tenant for the Carter's I Port development.
So sitting on a rail and road junction is working out far better for Rolleston than anyone dared predict, says Christensen. "We didn't have a clue the ports would be here."
And the port one-upmanship must bring ever more export-oriented businesses to Rolleston, especially the agricultural.
Joseph Johnson From left, Lynley McEvedy, Pat McEvedy, Shirley Reid and Harper Clark enjoy a cafe lunch. A nearby business park employs about 1100 people, which provides opportunities for the hospitality industry.
Christensen says the Central Plains Water (CPW) irrigation scheme is also rolling out across Selwyn and over time that will result in a greater variety of crop production.
So think ahead another decade and it could be the big canning plants and food processing factories which want to build in Rolleston, he says.
"There's a potato chip manufacturer who says he just waiting for CPW to come on stream before he moves his operation to Rolleston. There's a lot of things like vegetable and seed production that are going to have to come right through here to get to market in the future."
JOHN KIRK-ANDERSON/FAIRFAX NZ Deputy mayor Sarah Walters (left) with Education Minister Hekia Parata (centre) open a primary school.
Local friction
Rolleston is rocketing away on both sides of the state highway now. On one side the bulldozers are scrapping away the ground for the new subdivisions, on the other, for yet more industrial building.
Walters says that is another of the challenges of success for Rolleston. It risks being divided in two by its roads and rail lines. "We're getting congestion at our only traffic lights at the cross roads. With the increased industrial activity, we have 37 train crossings to deal with a day."
SUPPLIED/SELWYN DISTRICT COUNCIL Paddle boat racing: Rolleston's new indoor pool is already pegged for expansion.
That means another big ticket item on the civic wish list, she says. Selwyn is hoping to get the funding to start building a flyover between the two halves of the town by 2021.
And no doubt such an arch over the main road will be a great place to re-hang that "town of the future" banner in a few years! Which brings back the issue of how much of Rolleston's economic development is at the expense of Christchurch's own western suburbs like Hornby and Halswell.
Walters is bemused by this Christchurch-centric question. First off, she replies, after the earthquakes Christchurch is probably lucky Rolleston was so ready with the greenfield space which kept families and jobs in the area.
Joseph Johnson Rolleston College, opening after Christmas, will be the town's first high school.
"We were already geared up for growth. If Selwyn hadn't been here and set up, many of those people would probably have been lost from Canterbury completely. They would have gone to Auckland or Australia."
But also, Walters says, the way Rolleston has so come up in the world is creating quite enough political friction even locally within Selwyn district itself.
Jealousy is too strong a word. But Selwyn was formed in 1989 by the amalgamation of Malvern and Ellesmere counties. And a division still persists, Walters says.
Joseph Johnson Building is booming at Rolleston's Faringdon subdivision.
For many years, the council split itself across several locations because the Malvernites of course thought the district centre should be in Darfield, while the Ellesmerians wanted it in Leeston. "At one stage, we even had some staff based in Hornby," says Walters.
It was only in 2007 that it was agreed to do the sensible thing and build a new administrative base in the middle of the district – strategically situated Rolleston.
Still, Walters says, it is hard to persuade Selwyn voters that spending money to bolster Rolleston's rapid development might be a good idea. Even locals are too used to thinking of it as simply another small town in a district composed of small towns.
SUPPLIED/SELWYN DISTRICT COUNCIL Aerial view: Rolleston's young demographic makes it like a baby boom suburb from the 1960s.
An example is a current fuss over tidying up some of Rolleston's older roads so they match the standard of its new developer paid for subdivisions.
"At the last council meeting we had quite a discussion around providing funding to put in some kerb and channel down Masefield Drive. It's right close to the centre of town, but has got a bus stop that's basically a puddle, and no footpath next to it."
Walters says the feeling in Selwyn is why should Rolleston keep getting everything – the new schools, new parks, new swimming pools?
When the council talked about needing parking wardens, again there was the comment that country townships just don't justify such big city services.
Walters – one of the five councillors contesting Selwyn's mayoralty with incumbent Kelvin Coe retiring – says unfortunately Rolleston has yet to find its own political voice. The voter turn out at the last local election in the Selwyn Central ward was a dismal 36 per cent.
"Probably that was because so many were new arrivals. They would have been so busy moving into their houses or getting kids established in school that there wasn't a huge interest last time around," she says.
But Walters says Rolleston – like Lincoln – is the place that is growing. And Rolleston is reaching a size now where for the first time Selwyn has a proper town to speak of.
This is important for the district's sense of identity. Yet also practically.
"At the moment there are no government departments based in Selwyn at all. We're serviced out of Christchurch, or North Canterbury, or Ashburton." A town with a decent population would bring welfare offices and better health services to the district, she says.
So yes, it is good thing if Christchurch is thinking a little differently about Rolleston these days, agrees Walters. But the hope is that everyone is starting to see it in this new and more serious light. |
Liquid cocaine body packers.
Internal transport of cocaine in liquid form by body packers has been reported by the media, but there are no scientific publications on the clinical aspects of this practice. We describe two cases of body packers bearing 36 and 4 packs containing liquid cocaine in the colon and rectum, respectively. Abdominal X-ray in both cases showed radiological characteristics that differed from those commonly found in body packers transporting solid-state cocaine, heroin, or cannabis (packs with lower radiological density, diffuse borders, elongated and resembling feces). Both patients were asymptomatic and were discharged from the emergency department 6 hours after admission. Expulsion time after laxative administration was shorter compared to "solid" drug body packers. The diagnostic sensitivity of different imaging techniques remains to be established for internally concealed liquid drugs. There have been press reports of internal pack rupture resulting in death, so caution is required. The lower radiographic density of liquid cocaine condom packs and their adaptability to intestinal anatomy make them difficult to detect using plain abdominal radiography. Physicians should be aware of the possibility of false negative radiological findings in these cases. |
Chynów railway station
Chynów railway station is a railway station at Chynów, Grójec, Masovian, Poland. It is served by Koleje Mazowieckie.
References
Station article at kolej.one.pl
External links
Category:Railway stations in Warsaw |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<!--NewPage-->
<HTML>
<HEAD>
<!-- Generated by javadoc (build 1.6.0_45) on Sun Sep 08 19:26:28 EDT 2013 -->
<TITLE>
Checksummer (JHOVE Documentation)
</TITLE>
<META NAME="date" CONTENT="2013-09-08">
<LINK REL ="stylesheet" TYPE="text/css" HREF="../../../../../stylesheet.css" TITLE="Style">
<SCRIPT type="text/javascript">
function windowTitle()
{
if (location.href.indexOf('is-external=true') == -1) {
parent.document.title="Checksummer (JHOVE Documentation)";
}
}
</SCRIPT>
<NOSCRIPT>
</NOSCRIPT>
</HEAD>
<BODY BGCOLOR="white" onload="windowTitle();">
<HR>
<!-- ========= START OF TOP NAVBAR ======= -->
<A NAME="navbar_top"><!-- --></A>
<A HREF="#skip-navbar_top" title="Skip navigation links"></A>
<TABLE BORDER="0" WIDTH="100%" CELLPADDING="1" CELLSPACING="0" SUMMARY="">
<TR>
<TD COLSPAN=2 BGCOLOR="#EEEEFF" CLASS="NavBarCell1">
<A NAME="navbar_top_firstrow"><!-- --></A>
<TABLE BORDER="0" CELLPADDING="0" CELLSPACING="3" SUMMARY="">
<TR ALIGN="center" VALIGN="top">
<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../overview-summary.html"><FONT CLASS="NavBarFont1"><B>Overview</B></FONT></A> </TD>
<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="package-summary.html"><FONT CLASS="NavBarFont1"><B>Package</B></FONT></A> </TD>
<TD BGCOLOR="#FFFFFF" CLASS="NavBarCell1Rev"> <FONT CLASS="NavBarFont1Rev"><B>Class</B></FONT> </TD>
<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="package-tree.html"><FONT CLASS="NavBarFont1"><B>Tree</B></FONT></A> </TD>
<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../deprecated-list.html"><FONT CLASS="NavBarFont1"><B>Deprecated</B></FONT></A> </TD>
<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../index-all.html"><FONT CLASS="NavBarFont1"><B>Index</B></FONT></A> </TD>
<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../help-doc.html"><FONT CLASS="NavBarFont1"><B>Help</B></FONT></A> </TD>
</TR>
</TABLE>
</TD>
<TD ALIGN="right" VALIGN="top" ROWSPAN=3><EM>
</EM>
</TD>
</TR>
<TR>
<TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2">
<A HREF="../../../../../edu/harvard/hul/ois/jhove/ChecksumInputStream.html" title="class in edu.harvard.hul.ois.jhove"><B>PREV CLASS</B></A>
<A HREF="../../../../../edu/harvard/hul/ois/jhove/ChecksumType.html" title="class in edu.harvard.hul.ois.jhove"><B>NEXT CLASS</B></A></FONT></TD>
<TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2">
<A HREF="../../../../../index.html?edu/harvard/hul/ois/jhove/Checksummer.html" target="_top"><B>FRAMES</B></A>
<A HREF="Checksummer.html" target="_top"><B>NO FRAMES</B></A>
<SCRIPT type="text/javascript">
<!--
if(window==top) {
document.writeln('<A HREF="../../../../../allclasses-noframe.html"><B>All Classes</B></A>');
}
//-->
</SCRIPT>
<NOSCRIPT>
<A HREF="../../../../../allclasses-noframe.html"><B>All Classes</B></A>
</NOSCRIPT>
</FONT></TD>
</TR>
<TR>
<TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2">
SUMMARY: NESTED | <A HREF="#field_summary">FIELD</A> | <A HREF="#constructor_summary">CONSTR</A> | <A HREF="#method_summary">METHOD</A></FONT></TD>
<TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2">
DETAIL: <A HREF="#field_detail">FIELD</A> | <A HREF="#constructor_detail">CONSTR</A> | <A HREF="#method_detail">METHOD</A></FONT></TD>
</TR>
</TABLE>
<A NAME="skip-navbar_top"></A>
<!-- ========= END OF TOP NAVBAR ========= -->
<HR>
<!-- ======== START OF CLASS DATA ======== -->
<H2>
<FONT SIZE="-1">
edu.harvard.hul.ois.jhove</FONT>
<BR>
Class Checksummer</H2>
<PRE>
java.lang.Object
<IMG SRC="../../../../../resources/inherit.gif" ALT="extended by "><B>edu.harvard.hul.ois.jhove.Checksummer</B>
</PRE>
<DL>
<DT><B>All Implemented Interfaces:</B> <DD>java.util.zip.Checksum</DD>
</DL>
<HR>
<DL>
<DT><PRE>public class <B>Checksummer</B><DT>extends java.lang.Object<DT>implements java.util.zip.Checksum</DL>
</PRE>
<P>
The Checksummer class encapsulates the calculation of the
CRC32, MD5, and SHA-1 checksums.
<P>
<P>
<HR>
<P>
<!-- =========== FIELD SUMMARY =========== -->
<A NAME="field_summary"><!-- --></A>
<TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY="">
<TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor">
<TH ALIGN="left" COLSPAN="2"><FONT SIZE="+2">
<B>Field Summary</B></FONT></TH>
</TR>
<TR BGCOLOR="white" CLASS="TableRowColor">
<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
<CODE>protected long</CODE></FONT></TD>
<TD><CODE><B><A HREF="../../../../../edu/harvard/hul/ois/jhove/Checksummer.html#_nByte">_nByte</A></B></CODE>
<BR>
Byte count.</TD>
</TR>
</TABLE>
<!-- ======== CONSTRUCTOR SUMMARY ======== -->
<A NAME="constructor_summary"><!-- --></A>
<TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY="">
<TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor">
<TH ALIGN="left" COLSPAN="2"><FONT SIZE="+2">
<B>Constructor Summary</B></FONT></TH>
</TR>
<TR BGCOLOR="white" CLASS="TableRowColor">
<TD><CODE><B><A HREF="../../../../../edu/harvard/hul/ois/jhove/Checksummer.html#Checksummer()">Checksummer</A></B>()</CODE>
<BR>
Creates a Checksummer, with instances of each of
CRC32, MD5 MessageDigest, and SHA-1 MessageDigest.</TD>
</TR>
</TABLE>
<!-- ========== METHOD SUMMARY =========== -->
<A NAME="method_summary"><!-- --></A>
<TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY="">
<TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor">
<TH ALIGN="left" COLSPAN="2"><FONT SIZE="+2">
<B>Method Summary</B></FONT></TH>
</TR>
<TR BGCOLOR="white" CLASS="TableRowColor">
<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
<CODE> java.lang.String</CODE></FONT></TD>
<TD><CODE><B><A HREF="../../../../../edu/harvard/hul/ois/jhove/Checksummer.html#getCRC32()">getCRC32</A></B>()</CODE>
<BR>
Returns the value of the CRC32 as a hex string.</TD>
</TR>
<TR BGCOLOR="white" CLASS="TableRowColor">
<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
<CODE> java.lang.String</CODE></FONT></TD>
<TD><CODE><B><A HREF="../../../../../edu/harvard/hul/ois/jhove/Checksummer.html#getMD5()">getMD5</A></B>()</CODE>
<BR>
Returns the value of the MD5 digest as a hex string.</TD>
</TR>
<TR BGCOLOR="white" CLASS="TableRowColor">
<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
<CODE> java.lang.String</CODE></FONT></TD>
<TD><CODE><B><A HREF="../../../../../edu/harvard/hul/ois/jhove/Checksummer.html#getSHA1()">getSHA1</A></B>()</CODE>
<BR>
Returns the value of the SHA-1 digest as a hex string.</TD>
</TR>
<TR BGCOLOR="white" CLASS="TableRowColor">
<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
<CODE> long</CODE></FONT></TD>
<TD><CODE><B><A HREF="../../../../../edu/harvard/hul/ois/jhove/Checksummer.html#getValue()">getValue</A></B>()</CODE>
<BR>
getValue is required by the Checksum interface, but
we can return only one of the three values.</TD>
</TR>
<TR BGCOLOR="white" CLASS="TableRowColor">
<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
<CODE> void</CODE></FONT></TD>
<TD><CODE><B><A HREF="../../../../../edu/harvard/hul/ois/jhove/Checksummer.html#reset()">reset</A></B>()</CODE>
<BR>
Resets all checksums and the byte count to their
initial values.</TD>
</TR>
<TR BGCOLOR="white" CLASS="TableRowColor">
<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
<CODE> void</CODE></FONT></TD>
<TD><CODE><B><A HREF="../../../../../edu/harvard/hul/ois/jhove/Checksummer.html#update(byte)">update</A></B>(byte b)</CODE>
<BR>
Updates the checksum with the argument.</TD>
</TR>
<TR BGCOLOR="white" CLASS="TableRowColor">
<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
<CODE> void</CODE></FONT></TD>
<TD><CODE><B><A HREF="../../../../../edu/harvard/hul/ois/jhove/Checksummer.html#update(byte[])">update</A></B>(byte[] b)</CODE>
<BR>
Updates the checksum with the argument.</TD>
</TR>
<TR BGCOLOR="white" CLASS="TableRowColor">
<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
<CODE> void</CODE></FONT></TD>
<TD><CODE><B><A HREF="../../../../../edu/harvard/hul/ois/jhove/Checksummer.html#update(byte[], int, int)">update</A></B>(byte[] b,
int off,
int len)</CODE>
<BR>
Updates the checksum with the argument.</TD>
</TR>
<TR BGCOLOR="white" CLASS="TableRowColor">
<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
<CODE> void</CODE></FONT></TD>
<TD><CODE><B><A HREF="../../../../../edu/harvard/hul/ois/jhove/Checksummer.html#update(int)">update</A></B>(int b)</CODE>
<BR>
Updates the checksum with the argument.</TD>
</TR>
</TABLE>
<A NAME="methods_inherited_from_class_java.lang.Object"><!-- --></A>
<TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY="">
<TR BGCOLOR="#EEEEFF" CLASS="TableSubHeadingColor">
<TH ALIGN="left"><B>Methods inherited from class java.lang.Object</B></TH>
</TR>
<TR BGCOLOR="white" CLASS="TableRowColor">
<TD><CODE>clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait</CODE></TD>
</TR>
</TABLE>
<P>
<!-- ============ FIELD DETAIL =========== -->
<A NAME="field_detail"><!-- --></A>
<TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY="">
<TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor">
<TH ALIGN="left" COLSPAN="1"><FONT SIZE="+2">
<B>Field Detail</B></FONT></TH>
</TR>
</TABLE>
<A NAME="_nByte"><!-- --></A><H3>
_nByte</H3>
<PRE>
protected long <B>_nByte</B></PRE>
<DL>
<DD>Byte count.
<P>
<DL>
</DL>
</DL>
<!-- ========= CONSTRUCTOR DETAIL ======== -->
<A NAME="constructor_detail"><!-- --></A>
<TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY="">
<TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor">
<TH ALIGN="left" COLSPAN="1"><FONT SIZE="+2">
<B>Constructor Detail</B></FONT></TH>
</TR>
</TABLE>
<A NAME="Checksummer()"><!-- --></A><H3>
Checksummer</H3>
<PRE>
public <B>Checksummer</B>()</PRE>
<DL>
<DD>Creates a Checksummer, with instances of each of
CRC32, MD5 MessageDigest, and SHA-1 MessageDigest.
If one or both of the MessageDigests aren't supported
on the current platform, they are left as null.
<P>
<DL>
<DT><B>See Also:</B><DD><CODE>CRC32</CODE>,
<CODE>MessageDigest</CODE></DL>
</DL>
<!-- ============ METHOD DETAIL ========== -->
<A NAME="method_detail"><!-- --></A>
<TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY="">
<TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor">
<TH ALIGN="left" COLSPAN="1"><FONT SIZE="+2">
<B>Method Detail</B></FONT></TH>
</TR>
</TABLE>
<A NAME="reset()"><!-- --></A><H3>
reset</H3>
<PRE>
public void <B>reset</B>()</PRE>
<DL>
<DD>Resets all checksums and the byte count to their
initial values.
<P>
<DD><DL>
<DT><B>Specified by:</B><DD><CODE>reset</CODE> in interface <CODE>java.util.zip.Checksum</CODE></DL>
</DD>
<DD><DL>
</DL>
</DD>
</DL>
<HR>
<A NAME="getValue()"><!-- --></A><H3>
getValue</H3>
<PRE>
public long <B>getValue</B>()</PRE>
<DL>
<DD>getValue is required by the Checksum interface, but
we can return only one of the three values. We
return the CRC32 value, since that's the one which
is guaranteed to be available.
<P>
<DD><DL>
<DT><B>Specified by:</B><DD><CODE>getValue</CODE> in interface <CODE>java.util.zip.Checksum</CODE></DL>
</DD>
<DD><DL>
</DL>
</DD>
</DL>
<HR>
<A NAME="update(byte)"><!-- --></A><H3>
update</H3>
<PRE>
public void <B>update</B>(byte b)</PRE>
<DL>
<DD>Updates the checksum with the argument.
Called when a signed byte is available.
<P>
<DD><DL>
</DL>
</DD>
<DD><DL>
</DL>
</DD>
</DL>
<HR>
<A NAME="update(int)"><!-- --></A><H3>
update</H3>
<PRE>
public void <B>update</B>(int b)</PRE>
<DL>
<DD>Updates the checksum with the argument.
Called when an unsigned byte is available.
<P>
<DD><DL>
<DT><B>Specified by:</B><DD><CODE>update</CODE> in interface <CODE>java.util.zip.Checksum</CODE></DL>
</DD>
<DD><DL>
</DL>
</DD>
</DL>
<HR>
<A NAME="update(byte[])"><!-- --></A><H3>
update</H3>
<PRE>
public void <B>update</B>(byte[] b)</PRE>
<DL>
<DD>Updates the checksum with the argument.
Called when a byte array is available.
<P>
<DD><DL>
</DL>
</DD>
<DD><DL>
</DL>
</DD>
</DL>
<HR>
<A NAME="update(byte[], int, int)"><!-- --></A><H3>
update</H3>
<PRE>
public void <B>update</B>(byte[] b,
int off,
int len)</PRE>
<DL>
<DD>Updates the checksum with the argument.
Called when a byte array is available.
<P>
<DD><DL>
<DT><B>Specified by:</B><DD><CODE>update</CODE> in interface <CODE>java.util.zip.Checksum</CODE></DL>
</DD>
<DD><DL>
</DL>
</DD>
</DL>
<HR>
<A NAME="getCRC32()"><!-- --></A><H3>
getCRC32</H3>
<PRE>
public java.lang.String <B>getCRC32</B>()</PRE>
<DL>
<DD>Returns the value of the CRC32 as a hex string.
<P>
<DD><DL>
</DL>
</DD>
<DD><DL>
</DL>
</DD>
</DL>
<HR>
<A NAME="getMD5()"><!-- --></A><H3>
getMD5</H3>
<PRE>
public java.lang.String <B>getMD5</B>()</PRE>
<DL>
<DD>Returns the value of the MD5 digest as a hex string.
Returns null if the digest is not available.
<P>
<DD><DL>
</DL>
</DD>
<DD><DL>
</DL>
</DD>
</DL>
<HR>
<A NAME="getSHA1()"><!-- --></A><H3>
getSHA1</H3>
<PRE>
public java.lang.String <B>getSHA1</B>()</PRE>
<DL>
<DD>Returns the value of the SHA-1 digest as a hex string.
Returns null if the digest is not available.
<P>
<DD><DL>
</DL>
</DD>
<DD><DL>
</DL>
</DD>
</DL>
<!-- ========= END OF CLASS DATA ========= -->
<HR>
<!-- ======= START OF BOTTOM NAVBAR ====== -->
<A NAME="navbar_bottom"><!-- --></A>
<A HREF="#skip-navbar_bottom" title="Skip navigation links"></A>
<TABLE BORDER="0" WIDTH="100%" CELLPADDING="1" CELLSPACING="0" SUMMARY="">
<TR>
<TD COLSPAN=2 BGCOLOR="#EEEEFF" CLASS="NavBarCell1">
<A NAME="navbar_bottom_firstrow"><!-- --></A>
<TABLE BORDER="0" CELLPADDING="0" CELLSPACING="3" SUMMARY="">
<TR ALIGN="center" VALIGN="top">
<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../overview-summary.html"><FONT CLASS="NavBarFont1"><B>Overview</B></FONT></A> </TD>
<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="package-summary.html"><FONT CLASS="NavBarFont1"><B>Package</B></FONT></A> </TD>
<TD BGCOLOR="#FFFFFF" CLASS="NavBarCell1Rev"> <FONT CLASS="NavBarFont1Rev"><B>Class</B></FONT> </TD>
<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="package-tree.html"><FONT CLASS="NavBarFont1"><B>Tree</B></FONT></A> </TD>
<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../deprecated-list.html"><FONT CLASS="NavBarFont1"><B>Deprecated</B></FONT></A> </TD>
<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../index-all.html"><FONT CLASS="NavBarFont1"><B>Index</B></FONT></A> </TD>
<TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../help-doc.html"><FONT CLASS="NavBarFont1"><B>Help</B></FONT></A> </TD>
</TR>
</TABLE>
</TD>
<TD ALIGN="right" VALIGN="top" ROWSPAN=3><EM>
</EM>
</TD>
</TR>
<TR>
<TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2">
<A HREF="../../../../../edu/harvard/hul/ois/jhove/ChecksumInputStream.html" title="class in edu.harvard.hul.ois.jhove"><B>PREV CLASS</B></A>
<A HREF="../../../../../edu/harvard/hul/ois/jhove/ChecksumType.html" title="class in edu.harvard.hul.ois.jhove"><B>NEXT CLASS</B></A></FONT></TD>
<TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2">
<A HREF="../../../../../index.html?edu/harvard/hul/ois/jhove/Checksummer.html" target="_top"><B>FRAMES</B></A>
<A HREF="Checksummer.html" target="_top"><B>NO FRAMES</B></A>
<SCRIPT type="text/javascript">
<!--
if(window==top) {
document.writeln('<A HREF="../../../../../allclasses-noframe.html"><B>All Classes</B></A>');
}
//-->
</SCRIPT>
<NOSCRIPT>
<A HREF="../../../../../allclasses-noframe.html"><B>All Classes</B></A>
</NOSCRIPT>
</FONT></TD>
</TR>
<TR>
<TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2">
SUMMARY: NESTED | <A HREF="#field_summary">FIELD</A> | <A HREF="#constructor_summary">CONSTR</A> | <A HREF="#method_summary">METHOD</A></FONT></TD>
<TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2">
DETAIL: <A HREF="#field_detail">FIELD</A> | <A HREF="#constructor_detail">CONSTR</A> | <A HREF="#method_detail">METHOD</A></FONT></TD>
</TR>
</TABLE>
<A NAME="skip-navbar_bottom"></A>
<!-- ======== END OF BOTTOM NAVBAR ======= -->
<HR>
</BODY>
</HTML>
|
In vitro and in vivo degradation of poly(propylene fumarate-co-ethylene glycol) hydrogels.
The degradation of poly(propylene fumarate-co-ethylene glycol) hydrogels was examined in vitro in phosphate-buffered saline at pH 7.4 and in vivo in a subcutaneous rat model. These hydrogels have potential application as biodegradable, injectable cardiovascular stents, and, as such, their mass loss, dimensional changes, mechanical properties, morphology, and biocompatibility over a 12-week time course were evaluated. Three formulations were fabricated: one base formulation consisting of 25% (w/w) PEG, molecular weight 4,600; one high weight percent PEG formulation with 50% (w/w) PEG; and one high molecular weight PEG formulation, molecular weight 10,500. All three formulations showed significant weight loss (between 40 and 60%) on the first day due to leaching of the uncrosslinked fraction. Further weight loss was observed only for the low weight percent PEG copolymers in the in vivo case, and a slight increase in volume was observed due to degradative swelling. The mechanical properties of the P(PF-co-EG) hydrogels decreased significantly in the first 3 weeks, showing the biphasic pattern typical of bulk degradation. In vitro, the hydrogels showed at least a 20% retention of their initial ultimate tensile stress after 3 weeks. The dynamic mechanical properties showed similar retention, with the in vivo mechanical properties differing from the in vitro properties only after 6 weeks of degradation. Differences in PEG molecular weight appeared to have little effect, but increasing the weight percent PEG decreased the rate of degradation both in vitro and in vivo. The morphology of the copolymer films, based on scanning electron microscopy observation, was not significantly different either among the three formulations or over the time course of the study, suggesting there were no macroscopic structural changes during this time period. The P(PF-co-EG) hydrogels demonstrated good initial biocompatibility, showing responses characteristic of biomaterial implants. |
1. Field of the Invention
The present invention relates to applications of microRNA-195, and in particular relates to applications of microRNA-195 with regard to atherosclerosis treatment and detection.
2. Description of the Related Art
MicroRNAs (miRNAs) are single-stranded RNA molecules of about 21-23 nucleotides in length, which regulate gene expression. MiRNAs are first transcribed as a pri-miRNA with a cap and a poly-A tail and then processed to short, 70-nucleotide stem-loop structures known as pre-miRNA in a cell nucleus. The pre-miRNAs are then processed to mature miRNAs in the cytoplasm. A mature miRNA is complementary to a part of one or more messenger RNAs (mRNAs). Animal miRNAs are usually complementary to a site in the 3′ untranslated region (UTR). Annealing of the miRNA to the mRNA inhibits protein translation, but sometimes facilitates cleavage of the mRNA.
MiRNAs are important regulators for cell growth, differentiation, and apoptosis (Costinean S, et al. Proc Natl Acad Sci USA. 2006; 103:7024-7029, Ambros V. 2004; 431:350-355 and Hwang H W, et al. Br J Cancer 2006; 94:776-780). Therefore, miRNAs may be important for normal development and physiology of cells. Consequently, dysregulation of miRNA may lead to human diseases. In this respect, an exciting research area is the role of miRNAs in cancer, given that cell dedifferentiation, growth, and apoptosis are important cellular events during the development of cancer. MiRNAs are currently thought to function as both tumor suppressors and oncogenes (Esquelq-Kerscher A, et al. Nature Reviews Cancer. 2006; 6:259-269). Although miRNAs are expressed in the cardiovascular system (Lagos-Quintana M, et al. Curr Biol. 2002; 12:735-739), the role of miRNAs in atherosclerotic diseases are almost completely unknown. However, few studies have revealed the importance of miRNAs in cardiomyopathies (van Rooij E, et al. Proc Natl Acad Sci U S A. 2006; 103:18255-18260). Nevertheless, the role of miRNAs in atherosclerotic diseases has yet to be fully investigated.
A tissue-specific expression is one important characteristic of miRNA expression. Specifically, one miRNA may be highly expressed in one tissue but have no or low expression in other tissues (Lagos-Quintana M, et al. Curr Biol. 2002; 12:735-739). A recent study using a rat model showed that 140 out of 180 tested miRNAs were expressed in the rat carotid arteries and 49 of the 140 were highly expressed in the rat normal arteries (Ji R, et al. Circ Res. 2007; 100:1579-1588). |
Taking vitamin D could halve the risk of asthma attacks.
Cochrane library research has found that giving a daily oral vitamin D supplement to people with mild to moderate asthma reduced the risk of severe attacks requiring hospital admission or emergency department attendance from 6% to about 3%. |
Q:
Post-processing captured video in AS3, creating slow motion
I have an interesting project wherein I need to allow users to capture video of themselves with a webcam at a kiosk, after which I email them a link to their video. The trick is the resulting video needs to be a 'slow motion' version of the captured video. So for example, if someone creates a 2 minute movie, the resulting movie will be 4 minutes.
I'd like to build this in Flex / AS3 if possible. I don't have issues capturing the video and storing it / generating and emailing a link, but slowing down the video is the real mind bender. I'm unsure how to approach 'batch post-processing' a set of videos using Adobe tools.
Has anyone had a project similar to this or have suggestions on routes to take in order to do this?
Thanks!
-Josh
A:
This is absolutely feasible from the client side, contrary to what some may believe. :)
http://code.google.com/p/flvrecorder/
Just adjust the capture rate, which shouldn't be too difficult all the source is there.
Alternatively, you could write an AIR app that launches Adobe Media Encoder after writing a file and launch it with a preset that has FTP info etc. Or you can just use the socket class to connect and upload over FTP.
http://code.google.com/p/fl-ftp/
|
The Truth About Grover Norquist
December 31, 2012
Want more independent journalism?
Thank you for signing up. For more from The Nation, check out our latest issue.
Subscribe now for as little as $2 a month!
Support Progressive Journalism
The Nation is reader supported: Chip in $10 or more to help us continue to write about the issues that matter.
Fight Back!
Sign up for Take Action Now and we’ll send you three meaningful actions you can each week.
Travel With The Nation
Be the first to hear about Nation Travels destinations, and explore the world with kindred spirits.
Sign up for our Wine Club today.
Did you know you can support The Nation by drinking wine?
This article was reported in partnership with The Investigative Fund at The Nation Institute, with support from The Puffin Foundation.
As Grover Norquist made the rounds on television during the “fiscal cliff” negotiations, he reprised his now-familiar role as the titular spokesman for and enforcer of the GOP’s anti-tax orthodoxy. Despite a few high-profile defections from Norquist’s party line, most Republican lawmakers remained unwilling to raise revenues to deal with the debt crisis they had engineered over a year ago.
How can Norquist, a bespectacled 56-year-old conservative activist, hold such sway over an entire party? Though he has carefully cultivated a certain mystique—on his website, Norquist highlights a quote calling him the “dark wizard of the Right’s anti-tax cult”—in reality, his wizardry is little more than a skillful manipulation of high-dollar politics. Although he’s best known for his “Taxpayer Protection Pledge,” a document created in 1986 and now signed by over 95 percent of the Republican legislators in Congress, Norquist’s influence actually derives from his alliances with powerful donors.
Norquist has never been elected to office, and his foundation, Americans for Tax Reform, doesn’t boast a large membership base like other Washington advocacy groups, such as AARP and the National Rifle Association. Instead, Norquist commands respect because behind him loom some of the most politically active Republican billionaires and biggest industry associations on Capitol Hill.
The Nation reviewed the foundation’s most recently available tax disclosures, which show that in 2010 Americans for Tax Reform received more than 66 percent of its budget from only two sources. That year, the Koch-affiliated Center to Protect Patient Rights donated $4,189,000 to the foundation, and Karl Rove’s Crossroads GPS gave $4 million.
Taken together, these two groups constitute the nexus that has fueled the post–Citizens United dark money explosion in American politics. The Center to Protect Patient Rights is the foundation used by the billionaire clique led by the Koch brothers to distribute grants to allied groups. Two years ago, wealthy moguls like Steve Bechtel of the Bechtel Corporation and Steve Schwarzman of the Blackstone Group met behind closed doors to help raise money for these very efforts. Crossroads GPS, of course, is the group Rove uses to pummel Democrats with negative advertising. The only known individual donor to Crossroads is Paul Singer, the “vulture” hedge fund king famous for his generous contributions to conservative politicians and his efforts to extract large interest payments from third world debt.
Norquist’s pledge, which stipulates that its signatories must oppose efforts to raise tax rates or cut tax credits unless accompanied by dollar-for-dollar reductions in rates, is lucrative for these billionaires. After all, wealthy investment managers enjoy extraordinarily low tax rates because of loopholes like the carried interest rule, which allows their earnings to be taxed at capital gains rates rather than as income. Any effort to raise upper-income marginal rates or close this loophole—which allows some fund managers to pay at lower rates than their doormen—would violate Norquist’s pledge. And to make matters worse for any Republican thinking of such heresy, the big-money network underwriting Americans for Tax Reform also funds the Club for Growth, the Super PAC that has promised to spend big bucks on primary challenges for those who don’t hold the line on taxes.
4
5
The second provision of the pledge—the promise not to cut tax credits—is important for understanding how Norquist has become a proxy for K Street. From a budget standpoint, a targeted tax credit is basically equivalent to a subsidy: the main difference between a $1 million tax credit to an ethanol refinery and a $1 million subsidy to the same ethanol refinery, for example, is that one is distributed by the IRS, the other by another federal agency. But Norquist slams any effort to cut tax credits as an onerous tax increase. There are enough of these subsidies in the tax code that many profitable companies, like Duke Energy, can pay an effective negative tax rate.
* * *
A look at Norquist’s other donors provides an important window into his relationship with the business lobby. Take General Electric, which faced withering bipartisan criticism when The New York Times reported that the company, thanks to a multitude of tax credits and other tax subsidies, paid no federal income taxes in 2010. Norquist was there to defend the company in a chat with The Washington Post, arguing absurdly that removing billions in tax rebates to GE would just be a tax on consumers—cutting GE’s tax credits, after all, would break the Norquist pledge. In a recently posted 2011 giving report, GE says it made a contribution of $50,000 to Norquist’s foundation that year. Consider that for a moment: GE gave more to Norquist in 2011 than it reportedly paid the IRS for income taxes in 2010, a year the corporation made $14.2 billion in profits.
Though Norquist claims to protect all tax credits, he seems to devote a great deal of his attention to some groups rather than others. A search on Norquist’s foundation website shows countless action alerts to protest attempts by law-makers to shutter wasteful energy subsidies, including billions in tax credits to oil and gas companies. One post claims that removing nearly $100 billion in tax subsidies for oil companies amounts to a “tax hike on energy producers and families.”
Disclosures reviewed by The Nation show that, from 2008 to 2011, the American Petroleum Institute, a trade association for oil and gas companies like Chevron and ExxonMobil, gave $525,000 to Americans for Tax Reform.
It is difficult, from a public relations standpoint, for oil companies to defend their tax credits on the merits. Oil companies with billions in quarterly profits can deduct costs for drilling wells and receive “manufacturing” tax deductions for simply refining crude oil. Norquist’s pledge (and his foundation’s advocacy) transforms billions in taxpayer handouts into “tax cuts” that cannot be removed. In other words, Norquist is providing ideological cover for his benefactors in the oil industry and the rest of corporate America.
He developed his peculiar style of corporate advocacy in the 1980s. As Thomas Frank detailed in his book The Wrecking Crew, Norquist figured out early that he could leverage big business donors. Through a nonprofit called the United States of America Foundation, Norquist and his colleagues in the College Republicans would collect money from corporate interests in exchange for a promise to oppose efforts by campus-based Public Interest Research Groups (the consumer action groups better known as PIRGs). As these groups fought to enact regulations on polluters, for example, Norquist would solicit those same polluters to donate to his nonprofit, which would then do battle with the PIRG do-gooders.
He went on to work as a registered lobbyist. One of his first official gigs was a contract to represent France-Albert René, the leftist leader of the Seychelles, a small island nation off the east coast of Africa. In one of the first exposés of Norquist’s coin-operated conservatism, Tucker Carlson, in a piece for The New Republic, called out the foreign influence peddling, referring to Norquist as just another “cash-addled, morally malleable lobbyist.”
Norquist later started his own lobbying firm, Janus-Merritt Strategies, and signed up an elite roster of clients—including, most famously, Fannie Mae. In the late 1990s, Microsoft invited representatives of Americans for Tax Reform to travel to Washington State for a three-day presentation (which included tickets to a Mariners game as well as dinner and entertainment at Seattle’s Teatro ZinZani). Two days after they returned, the foundation sent a letter to House Republicans urging them to cut deeper into the budget of the Justice Department’s anti-trust division—the same unit then pursuing Microsoft in a high-stakes legal case. Microsoft, The WashingtonPost noted, had paid Norquist $40,000 as a registered lobbyist for the company.
Early in the Obama administration’s first term, Norquist sent a letter to FedEx, demanding that the company back away from an anti-UPS website it hosted to fight off a measure that would enable FedEx employees to join a union. (UPS workers are unionized.) It was a surprisingly pro-union move for a conservative like Norquist, who has praised draconian efforts to curb organizing rights in states like Wisconsin. Yet it is less surprising given that UPS, through its charitable foundation, gave Americans for Tax Reform $25,000 a few months after he sent the letter.
The most sordid examples, however, come from the Senate investigation into Jack Abramoff’s lobbying. As the Associated Press reported, one of Abramoff’s clients, the Mississippi Choctaw tribe, worked out an arrangement in which Norquist would transfer $1.2 million in Choctaw money through Americans for Tax Reform to other Abramoff efforts. In exchange for laundering the money, Norquist kept a cut of $50,000 from two of the transfers. Somehow, Norquist emerged from the Abramoff scandal largely unscathed and more influential than ever.
In spite of all this, the press has been quick to designate Norquist a “movement” leader or an ideological purist—terms that merely enhance his prestige. Another term might be more accurate: corporate lobbyist. |
Q:
An ambiguity problem with "the first thing you remember"
I'm having an ambiguity problem with the following sentence:
What's the first thing you remember?
If I'm right, it may mean either:
1) What is the first thing you can recall, the furthest in your memories, the earliest thing you remember? (like from your childhood = your earliest memory)
2) What is the first thing that comes to your mind just like that? (the first thing you can think of RIGHT NOW)
Am I right? Considering I am, how would you rephrase the sentence, to get rid of the ambiguity problem?
A:
To me, they are different. "What's the first thing you remember?" always means "what's your earliest memory?" never "what are you thinking right now?" This is so because present thought is not memory, again only in my view.
"what are you thinking right now?" is a question about meta-thought -- a thought about a present thought, just as "what's the first thing you remember?" is a question about meta-thought, but a thought this time about an earlier thought.
"A penny for your thoughts" is a lot different from "what's the first thing you remember?"
A:
Normally, we do not refer to an immediate thought as remembering. For that, we would say something like "What's the first thing that comes to mind?" (as you already did yourself) or "What's the first thing that pops into your head?"
Also, "What's the first thing you remember?" often does not refer to the first memory in a person's life, but rather the first since some event, such as getting injured in an accident or being knocked on the head by an attacker.
A:
Yes, it can take either meaning. So, you can say:
What's your earliest childhood memory?
What's the first thought/memory that comes to your mind?
|
require 'gem-patching'
# ActionDispatch::Integration::Runner defines method_missing but no accompaning
# respond_to? method. It thus doesn't respond_to? to named route url helpers even
# though it actually responds to them. Happens with the PolymorphicRoutes patch
# above, so this patch is here as well.
Gem.patching('rails', '3.0.15') do
ActionDispatch::Integration::Runner.module_eval do
def respond_to?(method, include_private = false)
@integration_session.respond_to?(method, include_private) || super
end
end
end
|
Q:
systemd timer every 2 hours at 30 minutes past the hour?
There are several good references on systemd timers including this one:
systemd.time
Unfortunately, it still isn't clear to me how to create a timer that will run periodically, but at a specific number of minutes after the top of the hour.
I want to create a timer that runs 30 minutes past the hour, every 2 hours. So it would run at 14:30 (2:30 pm), 16:30, 18:30, 20:30, etc.
I tried several things that did not work, including this:
OnCalendar=*-*-* *00/2:30
And this:
OnCalendar=*-*-* *:00/2:30
I did not find the time specification to produce the desired result.
Also, it does not have to run exactly at that moment, so I was thinking about using:
AccuracySec=5m
A:
Every 2 hours at 30 minutes past the hour should be
OnCalendar=00/2:30
# iow hh/r:mm
00/2 - the hh value is 00 and the repetition value r is 2 which means the hh value plus all multiples of the repetition value will be matched (00,02,04..14,16..etc)
30 - the mm value, 30 will match 30 minutes past each hour
I left the date and the seconds out since, per the same man page:
date specification may be omitted, in which case the current day [...] is implied [...]If the second component is not specified, ":00" is assumed.
|
Episode 11: The One With The Generational Booty
Wherein your hosts talk about the upcoming NHL Expansion Draft and Awards Ceremony, the top 5 things we hate hearing from students, who’s got the NHL’s generational booty, why Leap Year is a cinematic masterpiece (even though it doesn’t make geographic sense OR star Nicolas Cage), why Jane Austen novels (and Kris Russell) are pretty garbage, who the NHL’s Wonder Woman is, and whether or not it’s okay to sit in a tub of your own filth. |
It is crazy to think we are halfway through our summer program! It is going by too quickly. I have enjoyed each and every moment with my camp groups. Each week we have new campers join in a mix of campers that are with us all summer and some that stop by for a day or two. It is great the way this multi age group works. They have been accepting of one another, inclusive, and encouraging!
I am attempting to play catch up on the blog so here is weeks 1-3 of Sprout Summer Camp at Roycemore School!
Like this:
This week in Sprout, we tackled big issues: OUR THOUGHTS! Gifted kiddos often think and feel bigger than others. They can be told they are too sensitive, you talk too much, you have too many opinions! How frustrating for our kiddos!
Our groups went round-robin style telling us quickly their random thoughts and feelings, LOL! We were all over the place from video games, flooding, art ideas, traveling, to hunger.
We took all of these thoughts and feelings and put them in our Smash book! Our Sprouters were able to write, draw, cut and paste images, etc into their own books. They could share or keep private.
I’ve never heard our groups so quiet and then burst into laughter or deep conversations. They connected over shared thoughts and feelings. It was an amazing week!
Like this:
The request was made for a day of video games at Sprout… who would’ve thought! So, of course, I had to comply.
We began with a timeline – when, why, and what.
Then we moved into a pros and cons list. The pro side: They are fun! They could be used for learning. They are fun! You can connect with people from all over the world.
Cons side: Too much screentime may be harmful. You waste too much time. You lose track of time. My mom yells at me when I play for too long. (LOL) There’s no human interaction. (This was debated)
Then we talked about how are video games created. You need to think about four main things: Concept, Visuals, Coding, and Distribution.
Finally the choice of the project: You can conceptualize, create a storyboard, and create visuals for a game you’ve invented. This could mean you make a new version of a game you know too.
or
Take a favorite part of a game you play and create a hands-on game or art project from that game.
So what did the Sprout group learn from an activity like this?
They learned to listen to each other, share information, and debate issues. They learned that it is tough to start from scratch on a new idea that follows a plan and makes sense.
Whenever we partake in activities such as this, that are so incredibly open-ended and the children could take in any direction they want, we see a few of the same outcomes.
A small group of students knows exactly what they want and rush to start and finish the task.
“I’m done!” Is proudly heard in the quiet room.
When questioned, “tell me about your game.”
The student begins with “It’s called…, You can…, It’s so fun! What can I do now?”
Redirecting that student to add detail, give more thought, think more about the project can be really tricky and more often than not it will be frustrating for the kid that likes to be done and done first!
2. Another small group of students stares blankly, “I don’t know what to do.”
Ok, this can be tricky too. You need to walk them through the outline/design process. You need to find out what personally he/she is interested in. You need to offer choices and ideas without giving too much away.
3. Then there are the one or two kiddos that do not follow one thing that was laid out in front of them, even though you offered choices in the outcome. They came up with a completely different outcome than the class project.
In situations like this, it’s important to evaluate the child, not necessarily the project outcome. Think about why he/she didn’t make ‘a video game.’ Think about if he/she participated during the group ‘lesson.’ Then think about why? Is it because the project didn’t speak to him/her? Is it because he/she didn’t understand the project? Does his/her outcome make any sense in the plan for the day?
Each class period, it is important to look at what the students like but it is just as valuable to look at what the students don’t like and why they might not like it. What challenges does your gifted child face?
Overall, this project turned out to be a very successful project. There was much collaboration, sharing, and creating.
Like this:
The school year is underway. Supplies bought and sent off. The nerves of meeting your child’s new teacher have melted away. New clothes for the first day and class photos worn out already. The buzz and excitement of the new school year has faded.
And now what?
Each day your child comes home with the same attitude. The conversation is redundant, day after day.
How was school today?
Mumble, mumble…fine.
Tell me about what you are reading?
Charlotte’s Web but I read that when I was five.
Tell me about Science.
OH YEAH! We made catapults today! I told the other kids about the trajectory of the projectile is influenced by the push force of the catapult, the angle of the release, the weight of the projectile, air resistance and gravity.… but they were no longer listening and only said that what I was saying was weird and they had no idea what I was talking about.
Emotions such as these are ones encountered daily by our students. They are excited with anticipation of a new school year and deflated pretty quickly if their needs are not being met. Gifted students can become impatient and bored if the classroom isn’t flowing quickly enough. They can get frustrated if the material isn’t challenging them on multiple levels. They crave being understood and finding a group of intellectual peers or a “tribe of their own.” A lack of challenges can cause gifted students to take shortcuts in their work, doing the minimal amount or taking the easy way out. Gifted students, if not challenged from the start of their academics, will not show their true potential and their chance of ever loving school will be lost.
Your child finishes all the work in five minutes. Your child is the one that raises his/her hand with the correct answer before the teacher even finishes posing the problem. He/she is the student that never stops asking why. So, what do you do?
Create a partnership with your child’s teacher
Start by meeting with your child’s teacher. Approach the conference as a partnership. Share your child’s interest, strengths, and areas of challenge. This could even be goals for your child’s social and emotional growth.
Ideas on how to approach differentiated work
It is important that gifted and talented students pass state standards in each grade level so to avoid assuming your child knows everything, ask the teacher to give your child a pre-test for units of study. Some schools approach this by using the end of the unit assessment as not to create more work for the teacher. Just like a spelling test, children are given the test on a Monday and if they pass the test (90% or above) they can be given a choice board of things to do during the unit.
Bring ideas to the table such as supplementing work that your child already knows with things that would expand his/her knowledge in that area.
Ask for ways that technology could be brought in during different units of study. For instance IXL, Kahn Academy, and Beast Academy have online activities and lessons that a student could engage in to learn materials rapidly and then engage in a activity that is meaningful and challenging.
Although I don’t advocate for a gifted child to become the assistant teacher in the classroom for his/her own learning, there are benefits to having children become the “teacher” for a lesson or two on occasion. As an educator, I found that when I was taught to teach others there was a deeper understanding of a topic became real to me instead of a passive way of learning the material. By preparing lessons and having materials/visual aids, a student can gain a deeper insight into a topic and work on presentation skills – oral speaking, making eye contact, and engaging others. Some students would not love this option so it might push them out of their comfort zone to try something new and work on a new skill too.
Connections
Find ways to connect your child with other people that think like him/her. By looking at activities outside of school to help engage your child, he/she will be sure to find a community of learners that are passionate and eager to learn more. Check out your local universities and online tools as well for enrichment activities.
By creating the partnership with your child’s teacher and having ways that you can help support your student, you will be off to a great start to the school year.
Like this:
Monday’s Sprout Class Tessellations! Third time a charm… even though it was still a frustrating/abstract idea for some, we had many terrific outcomes. Feelings of accomplishment and delight flew through our class today!
One child commented, “It’s finally quiet in here!” LOL 🙂 We do have lots of energy in Sprout.
This week, we explored M.C. Escher’s art and math this week. It was a difficult concept to grasp but each child worked so hard on their own frustrations and challenges! I saw a lot of perfectionism this week but lots of perseverance to complete the task too!
Like this:
This is a great article that NPRed published on September 28, 2018. It talks about the need of gifted students finding their “tribe” of people and the need to be challenged without judgement. It talks about what schools should be doing to identify gifted learners and how best to advocate for them. I hope you find the article as interesting as I did. Please share your thoughts!
Like this:
What makes a good rule or law? The Sprout kids debated many ideas of what makes a good law after reviewing The Code of Hammurabi and our Middle School Assistants talked about the Bill of Rights too! After our discussion we played a game of guess the rule, where the students had to guess the rule based on objects they found around the room. Finally, they made their own laws. Of course some kiddos coded their laws and you have to decode it!!! Thanks to our friends at FWD – Gifted Services for the great activity!
Like this:
What a fun Sprout session! This week we made cloud slime! The Sprouters learned about polymers and ions, states of matter, and viscosity. There is so much science to know in a fun sensory activity! It never gets old. |
Q:
Results related to The Happy Ending Problem
Im giving a small talk for a combinatorics class on the Erdos-Szekeres conjecture regarding the happy ending problem (the paper is focused on recent work regarding the conjecture). I always find that when the audience is not up for a long technical proof, and they aren't familiar with the field (in this case combinatorial geometry) that it is important to provide strong motivation for why the problem is important, and perhaps mention a couple interesting related results that have applications in other fields, or to other problems.
For the Happy Ending problem, I am aware of connections to the $n$-hole problem for points in general position, Ramsey theory (via the original paper by erdos and szekeres in 1935), and the generalization of the E&S theorem for convex bodies. But Im not sure if these are good things to mention since the class does not know any Ramsey theory and convex bodies are probably too abstract to mention offhand.
So my question is: does anyone know of other interesting related results to the Happy Ending Problem, and the corresponding theorem and conjecture. Or, can you tell me succinctly why or why not this conjecture is important in mathematics.
I will accept anything along the lines of similar geometrically or combinatorially, directly related, or mentioned in a paper involving the E&S conjecture.
The original paper from 1935 is a goldmine of things like the ordered pigeonhole principle, but Im interested in things I havent read yet.
A:
You might look at this for some recent related work, and investigate its 14 references:
"Every Large Point Set contains Many Collinear Points or an Empty Pentagon." CCCG 2009, 99-102. The main result is exactly what is stated in the title.
|
QEP - Quality Enhancement Plan
The Quality Enhancement Plan (QEP) is a five-year action and implementation plan designed to enhance student learning and further strengthen Trenholm State’s educational mission. The QEP is required by the Southern Association of Colleges and Schools Commission on Colleges (SACSCOC), the regional accrediting body for the accreditation of degree-granting higher education institutions in the Southeastern states. The Commission’s mission is to maintain the educational quality of colleges throughout the region and help them develop programs to improve learning and success for their students.
WHY ARE WE CREATING A QEP?
Every ten years, all regionally accredited colleges and universities engage in the renewal of their institution’s accreditation. A major part of the reaffirmation process is the development and submission of a QEP to SACSCOC. Trenholm State administrators, faculty, and staff developed enhancements to the developmental mathematics courses and actions to improve student success in these courses. This new program is entitled “Raising the Bar for Math Success.”
DESIRED GOALS AND STUDENT LEARNING OUTCOMES
QEP Goals
Goal 1:
Decrease the percentage of students placing into developmental mathematics by providing intervention activities prior to enrollment
Goal 2:
For students who place in developmental mathematics, increase the percentage of students enrolled in developmental mathematics during their first semester
Goal 3:
Increase success rates of students participating in developmental mathematics
Goal 4:
Increase retention of students participating in developmental mathematics
Goal 5:
Increase the percentage of students completing developmental mathematics who successfully complete the program capstone course (MTH100 or higher) within one year
Course Specific Student Learning Outcomes
Course
Student Learning Outcomes
MTH098
Elementary
Algebra
Solve mathematical problems involving real numbers
Solve problems involving linear equations and inequalities in one variable
Solve a variety of problems related to graphing and writing linear equations in two variables
Solve systems of equations in two variables using a variety of methods
History of
Excellence
For half a century, thousands of students have charted their path to success at Trenholm State Community College. From the 1960s to today, we have been part of the fabric of Montgomery and the River Region, growing to include diverse programs of study, multiple campuses, and online learning. Now, we celebrate the present and move forward with a renewed dedication to our community and the success of our students. We invite you to join us.
Follow Trenholm State
Trenholm State Community College is an equal opportunity employer and does not discriminate on the basis of sex, race, color, religion, national origin, age, veteran status, disability or any other legally protected status. Click here for information »
Trenholm State Community College is accredited by the Southern Association of Colleges and Schools Commission on Colleges (SACSCOC) to award associate degrees. Contact the Southern Association of Colleges and Schools Commission on Colleges (SACSCOC) at 1866 Southern Lane, Decatur, Georgia 30033-4097 or call 404-679-4500 for questions about the accreditation of Trenholm State Community College. |
For cool context here is the same place he is standing but today:
Shareholders re-elect Sealaska board incumbents
Three incumbents and a newcomer who ran with them beat out eight independent candidates.
Results were released Saturday via Sealaska’s Facebook page during the Southeast regional Native corporation’s annual meeting, held in Hydaburg, on Prince of Wales Island.
Another result: A measure to reduce the board’s size failed to attract enough votes to pass.
Juneau-based Sealaska has about 22,000 shareholders, which gives it the largest base of Alaska’s dozen regional Native corporations.
Sidney Edenshaw of Hydaburg is one of the three winning incumbents. He’s president of his community’s tribal association and has been on Sealaska’s board for 12 years.
Another is Ed Thomas of Kingston, Washington. The former Juneau resident spent 27 years as president of the Central Council of Tlingit and Haida Indian Tribes of Alaska. He’s been on Sealaska’s board for 27 years. [Read the rest]
Alaska to receive almost $30 million from feds in PILT funding
The Department of the Interior announced today that 29 local Alaska governments would receive $29.7 million in Payment in Lieu of Taxes funds, or PILT. PILT funding provides local governments with funding they can’t get from tax-exempt federal lands within their boundaries. It pays for services such as public safety, schools and roads in communities containing national parks, national forests and other public lands.
The Mat-Su Borough and Kenai Peninsula Borough will receive the largest funding amounts with both getting more than $3 million each from the federal government.
The almost $30 million Alaska will receive is part of a record $464.6 million that will be distributed to 1,900 local governments in the country this year. [Source]
Southeast Alaska’s rainy, cool summer may continue
KFSK by Joe Viechnicki
Salmon berries are a little late to ripen this year with cool temperatures and rainy weather likely to continue into July.
The rainy, cool weather in Southeast Alaska this month is likely to continue in the near future, despite a short break in the showers expected this week. That might mean a little later and less sweet year for wild berries.
“The plants here in Southeast Alaska are used to having a good amount of cloud cover,” he said. “They’ve all adapted to that but the more sun, the quicker they’ll ripen and also the more sweet they’ll be. They can even ripen and look really nice and lovely and bright but just not be quite as sweet because there hasn’t been as much photosynthesis going on. And that’s a function of the light but also the temperature and how much actual sugar production is going on in the plant.”
While it’s probably not setting records, Petersburg is experiencing a wetter and cooler month than usual. The normal monthly rainfall total for June is just under five inches. The town has already surpassed that with over a week left in the month.
National Weather Service forecaster Rick Fritsch specializes in the climate of Southeast Alaska and doesn’t see big changes on the horizon. “The current pattern that we’re in and have been in for all of June so far, I cannot see that it’s gonna change anytime soon,” Fritsch said. “And so I would say there is a fairly good chance that we are gonna see above normal precipitation going into July. Climatologically this is supposed to be the driest part of the year.” [Source]
London School Asks Pupils to Write Their Own Suicide Notes
A school in London has come under fire after telling 60 teenage pupils to write their own suicide notes during an English class assignment.
The task was given as part of the year group’s studies on Shakespeare’s Macbeth, in which Lady Macbeth dies “by self and violent hands”.
Senior staff at Thomas Tallis School in Kidbrooke apologised for upsetting students, some of whom are said to have friends who have taken their own lives.
One mother said three of her daughter’s friends had killed themselves, and that her daughter was “very distressed” after being asked to write the note.
She said she complained to the school as soon as her daughter told her about the task.
“On what universe was it ever a good idea to ask a group of teenagers to write suicide notes?” she said to local newspaper News Shopper.
Tallis School headteacher, Carolyn Roberts, said “action had been taken” and that similar projects would not happen again. [Source]
What a strange story! All of a sudden these parents who want to home school their kids are looking like geniuses....
Without Immigration, Tokyo More Than Doubles Housing Space Per Person
Clearly, the Japanese should instead have chosen mass immigration so that they could continue to live in 640 sq. ft. per family of four instead of 1400 sq. ft. per family of four.
Been looking at Tokyo housing stats and I think this is the most amazing thing I've found - a doubling of space per person in <50 years pic.twitter.com/CgLFkDL0k2
Here in America, we constantly hear about how awful the Japanese economy is, but that’s largely because it hasn’t done much of anything for Wall Street since the giant Bubble popped around 1990. But, the Japanese economy has been fairly successful for the Japanese. [Source]
Your Dog Can Tell From Your Voice If You’re Happy or Sad
Over the past few years at Eötvös Loránd University, in Hungary, a team of researchers has been using fMRI (functional magnetic resonance imaging) technology—which tracks blood flow to various areas of the brain, a sign of increased activity—to peer inside the minds of dogs. One of a handful of labs groups worldwide that's using the technology in this way, they've used positive reinforcement training to get a study group of 11 dogs to voluntarily enter the fMRI scanner and stay perfectly still for minutes at a time, which is necessary to get accurate readings.
Their main discovery is that certain areas of the dogs' brains consistently responded more when they heard vocalizations (whether other dogs' or humans), as compared to non-vocal noises. "The very exciting finding is that in both the human brain and the dog brain, these 'voice areas' are located in very similar places," Andics says.
This, he explains, suggests that the underlying vocal recognition area originally evolved in a last common ancestor of humans and dogs (and by default all other existing placental mammals) which lived around 100 million years ago. In enabling a few key mammal characteristics—a high degree of communication and social structure—the development of this brain area may even go a long way towards explaining why mammals been so evolutionarily successful as a whole.
The researchers also found that different areas of the dogs' brains showed activity in response to hearing each category of sound. Out of the total brain area that was involved in auditory response, 39 percent showed activity after they heard recordings of dog vocalizations (barking, whining or other dog noises), 48 percent showed activity after hearing the non-vocal noises and 13 percent specifically showed activity after they listened to human speech. [Read the rest]
No comments:
Post a Comment
Author Details
POWReport serves as the go to source for residents to get Prince of Wales news, reports, and updates from across the different communities.
Besides Local News our goal is to provide alternative news that the MSM will not cover.
Comments or hate mail may be sent to powreport@gmail.com
Contact Form
About Me
POWReport serves as the go to source for residents to get Prince of Wales news, reports, and updates from across the different communities.
Besides Local News, my goal is to provide alternative National and World news that the MSM will not cover.
We hope that you have an interest in contributing and writing articles to be featured on this site and any constructive suggestions or ideas will always be appreciated and can be sent to powreport@gmail.com |
List of United States Supreme Court cases, volume 449
This is a list of all the United States Supreme Court cases from volume 449 of the United States Reports:
Colorado v. Bannister, (per curiam)
Hughes v. Rowe, (per curiam)
Dennis v. Sparks,
Allied Chemical Corp. v. Daiflon, Inc., (per curiam)
Stone v. Graham, (per curiam)
Wisconsin v. Illinois, (per curiam)
County of Imperial v. Munoz,
EPA v. National Crushed Stone Assn.,
Pacileo v. Walker, (per curiam)
Allen v. McCurry,
United States v. DiFrancesco,
Webb's Fabulous Pharmacies, Inc. v. Beckwith,
Railroad Retirement Bd. v. Fritz,
Vincent v. Texas, (per curiam)
United States v. Will,
FTC v. Standard Oil Co. of Cal.,
Delaware State College v. Ricks,
Potomac Elec. Power Co. v. Director, Office of Workers' Compensation Programs,
United States v. Darusmont, (per curiam)
Allstate Ins. Co. v. Hague,
Watkins v. Sowders,
United States v. Morrison,
Firestone Tire & Rubber Co. v. Risjord,
Upjohn Co. v. United States,
Mariscal v. United States, (per curiam)
United States v. California, (per curiam)
United States v. Cortez,
Rubin v. United States,
Cuyler v. Adams,
Minnesota v. Clover Leaf Creamery Co.,
Fedorenko v. United States,
Sumner v. Mata,
Chandler v. Florida,
EEOC v. Associated Dry Goods Corp.,
Walter Fleisher Co. v. County of Los Angeles, (per curiam)
Consolidated Rail Corporation v. National Assn. of Recycling Industries, Inc., (per curiam)
O'Connor v. Board of Ed. of School Dist. 23,
McCarthy v. Harper,
Atiyeh v. Capps,
California v. Riegler,
External links
Volume 449
Category:1980 in United States case law
Category:1981 in United States case law |
Scarlett Johansson has slammed stars who thank God when they win an award.The stunning actress claims movie stars who mention God or Jesus in their acceptance speech are an embarrassment to the profession. She said: "Some people can be so goofy, especially the ones that say, 'I'd like to thank our Lord Jesus up above!' I'm like, 'For the love of God, keep your mouth shut. That's why the world is so f***ed up because God is focusing solely on your career.'" However, Scarlett admits she would probably make a fool of herself by crying if she ever won an Oscar. She revealed to Britain's B magazine: "If I won, I'd probably cry. I mean, it looks pretty overwhelming. And if you look around and see you mom crying, and your agent crying, well, you'd cry too."
Tagged in Scarlett Johansson |
585 F.2d 436
78-2 USTC P 9745
Ralph L. BRUTSCHE and Ingrid Brutsche, Petitioners-Appellants,v.COMMISSIONER OF INTERNAL REVENUE, Respondent-Appellee.Ruth L. FARLEY, Petitioner-Appellant,v.COMMISSIONER OF INTERNAL REVENUE, Respondent-Appellee.
No. 76-1962.
United States Court of Appeals,Tenth Circuit.
Argued Jan. 24, 1978.Decided Oct. 11, 1978.
Joseph A. Sommer, Sommer, Lawler & Scheuer, Santa Fe, N. M., for petitioners-appellants.
William S. Estabrook, III, Atty. Tax Div., Dept. of Justice, Washington, D. C. (Myron C. Baum, Acting Asst. Atty. Gen., Gilbert E. Andrews and Crombie J. D. Garrett, Attys., Tax Div., Washington, D. C., with him on the brief), for respondent-appellee.
Before HOLLOWAY, DOYLE and McKAY, Circuit Judges.
McKAY, Circuit Judge.
1
This consolidated appeal1 turns on a determination of whether the taxpayers made a valid Subchapter S election. If they did, they are liable for any properly assessed tax deficiencies arising from corporate activities. If they did not, the corporation, not the individual taxpayers, is liable. The case is complex only because prior to this litigation the IRS claimed the election was not valid and now claims it was, while the taxpayers prior to this litigation claimed the election was valid and now claim it was not.
2
Briefly stated, Subchapter S of the Internal Revenue Code allows an electing corporation to be taxed similarly to a partnership.2 A qualifying Subchapter S corporation is not subject to corporate income taxes, but rather its taxable income is taxed to the shareholders pro rata or its net operating losses are deductible by the shareholders pro rata. The Commissioner of Internal Revenue claims that certain items of gross income were realized by Thunder Mountain Construction Company (T.M.) in fiscal year 1969, and that, because T.M. was a Subchapter S corporation, such income was directly taxable to taxpayers as T.M. shareholders. Thus, the determination of Subchapter S status controls whether T.M. itself or its shareholders must bear the burden of any tax deficiency resulting from a finding of additional corporate income.
3
Taxpayers complain the Tax Court erred in finding they made a valid election to have T.M. taxed as a Subchapter S corporation. They argue the attempted election was invalid because (1) the filing of the election was not timely, and (2) the necessary shareholders' consent to the election was not properly filed.
Timely Election
4
Section 1372 of the I.R.C. provides that a Subchapter S election "may be made by a small business corporation for any taxable year at any time during the first month of such taxable year, or at any time during the month preceding such first month." To be effective such election must be timely and in strict compliance with statutory and regulatory requirements.3 Regulations promulgated by the Secretary of the Treasury clarify that "the first month of the taxable year of a new corporation does not begin until the corporation has shareholders or acquires assets or begins doing business, whichever is the first to occur."4
5
The initial issue then is whether T.M.'s Treasury Form 2553 election, filed on June 26, 1961, was made within the first month of its taxable year as a new corporation. Finding that T.M. had shareholders by May 1, 1961, and conducted business by May 26, 1961, the Tax Court concluded that the June 26 election was not made within the first month of T.M.'s taxable year as required by law and was hence invalid for that taxable year. We agree. Where adherence to specific procedures within a specified time is required, a court cannot supply what the corporation has failed to do.5
6
Having concluded that T.M.'s election in June 1961 was not timely for purposes of its first taxable year, there remains the question whether this election might be valid for its second taxable year and all subsequent years including fiscal 1969. Resolution of this question requires a determination of what T.M.'s taxable year actually was. Section 441(b)(1) of the I.R.C. defines "taxable year" as "the taxpayer's annual accounting period, if it is a calendar year or a fiscal year." The Tax Court found that T.M. came into legal existence on the date of its incorporation on March 29, 1961, and that it sometime thereafter adopted a fiscal year ending June 30 as its annual accounting period. The Tax Court noted that "(e)ven though the record is inadequate to determine how Thunder Mountain adopted a fiscal year ending June 30, the record is clear it did use such a fiscal year in keeping its books and filing its Federal income tax returns."6 There is nothing in the record that indicates this finding of the Tax Court was erroneous. T.M. filed all its tax returns and prepared its financial statements on a July 1 to June 30 fiscal year accounting period.
7
We therefore agree with the Tax Court that the election, while invalid for T.M.'s short taxable year May 1, 1961, through June 30, 1961, was nevertheless timely for T.M.'s taxable year July 1, 1961, to June 30, 1962. Section 1372(c) (1) specifically provides that an election may be made "for Any taxable year . . . at any time during the month preceding such first month." (Emphasis added.) Since the June 26, 1961 filing was within the month preceding the first month of T.M.'s July 1 to June 30 taxable year, the election was timely.
8
Taxpayers argue that, since a return was not made for the short taxable year ending June 30, 1961 as it could have been under I.R.C. §§ 441(b)(3), 443 T.M.' § first taxable year was a 12-month fiscal year beginning on March 29, 1961, and that its June 26, 1961 election was untimely. This argument fails for two reasons. First although I.R.C. § 441(b)(1) allows a taxpayer to use a fiscal year accounting period as his taxable year, I.R.C. § 441(e) specifically limits the term "fiscal year" to mean a period of 12 months "ending on the last day of any month other than December." If, as taxpayers claim, March 29 is the beginning date of a fiscal year, it is obvious the fiscal year ends on March 28. Since March 28 is not the last day of March, it could not possibly mark the end of any fiscal accounting period cognizable by the Code as determinative of T.M.'s "taxable year." Second, T.M.'s own failure to file a return for the short taxable year, May 1, 1961, to June 30, 1961, surely does not support taxpayers' view that the proper taxable year was other than the fiscal period it utilized over a nine-year period. Accordingly, the Subchapter S election filed June 26, 1961, was timely with respect to T.M.'s fiscal year commencing July 1, 1961. See Rev.Rul. 66-68, 1966-1 C.B. 197.
Shareholders' Consent
9
Even though the Form 2553 election may have been timely, it would nevertheless be defective and invalid for the fiscal year ending June 30, 1962, and all subsequent years, unless accompanied by the requisite shareholders' consent statement. I.R.C. § 1372(a) provides that "(s)uch election shall be valid only if all persons who are shareholders in such corporation . . . on the day on which the election is made . . . consent to such election." The Secretary's regulations further specify that the consent statement "shall set forth the name and address of the corporation and of the shareholder, the number of shares of stock owned by him, and the date (or dates) on which such stock was acquired."7 Failure to file a timely consent will not be fatal to a timely election if a proper consent is filed within any extended period of time as may be granted by the IRS.8
10
Taxpayers filed a timely shareholders' consent statement along with their Form 2553 Subchapter S election on June 26, 1961. That statement was in the form of a letter signed by all of T.M.'s shareholders, including appellants. The letter read:
11
We, the undersigned shareholders, do hereby consent to the election of Thunder Mountain Land Company, Inc. to be taxed as a small business corporation under Section No. 1372, Internal Revenue Code.9
12
By letter dated September 8, 1961, an IRS district office advised T.M.:
13
Your Form 2553, Election by Small Business Corporation and Statement of Shareholders Consent are considered incomplete due to the following:
14
Number of shares issued to each shareholder.
15
Please return this letter with the information requested within 20 days from date shown above, otherwise the Election will not become effective.10
16
Consequently, for T.M.'s election to be valid and effective for its taxable year ending June 30, 1962, and all subsequent years, its shareholders had to consent to the election in the appropriate manner on or before September 28, 1961, as allowed by the IRS' extension of time.
17
Neither the Tax Court nor this court has found any direct evidence in the record that such later consent was filed by the shareholders. However, the Tax Court held that the election was valid by reasoning as follows:
18
The inference is that such a later consent was filed since a copy but not the original of the letter extending the time for the information to be filed was in (taxpayers') records. However, respondent's determination that Thunder Mountain was an electing small business corporation is presumptively correct and petitioners have the burden to show that the corporation's shareholders did not properly file consents to the corporation's election if they rely on this fact to show that the corporation's election was invalid. Rule 142, Tax Court Rules of Practice and Procedure.11
19
The Tax Court finding of a valid shareholder consent is thus based on an inference and the procedural allocation of the burden of proof.
20
It is apparently the practice of the IRS to send shareholders both the original and a carbon copy of letters such as the one dated September 8, 1961. As the letter specified, the compliance necessary to effectuate a valid election included returning the original of the letter to the IRS by September 28, 1961, together with the information requested. Taxpayers introduced a carbon copy of the September 8 letter at trial in the Tax Court and testified that, despite a diligent search, the original of this letter could not be found. As to both the IRS' carbon copy of this letter and any subsequent response by taxpayers, the Commissioner stipulated:
21
(W)e contacted the Austin Service Center in an attempt to locate the documents relating to the election form 2553 and there is no record. . . . (W)e were unable to find a record of letters or correspondence attached to this 2553 or supposedly with the file. . . . (W)e have searched diligently through our administrative files in our possession and we are unable to find it.12
22
Earlier in the trial the Commissioner reported to the Tax Court that he could find "absolutely no verification" that the original of the September 8, 1961 letter was returned to the IRS together with the requisite shareholder consent.13 Taxpayer Ralph Brutsche testified he had no recollection of responding to the letter giving 20 days to file a proper consent.14
23
In admitting taxpayers' carbon copy of the September 8 letter, the Tax Court ruled:
24
I am going to receive this as the copy of a document which was retained in this taxpayer's files, obviously sent with an original because the original was to be returned and for no other purpose. It doesn't prove whether the original was ever returned, what compliance was ever made or anything.15
25
We agree with this initial ruling, and reject the Tax Court's later legal conclusion stated in its opinion, and quoted above that an inference of compliance flows from the fact that a copy but not the original letter extending the filing time was found in taxpayers' records. Such an inference is a product of unwarranted speculation.
26
The Tax Court also based its finding of a valid shareholder consent on Rule 142 of the Tax Court Rules of Practice and Procedure. Rule 142 provides generally that "(t)he burden of proof shall be upon the petitioner" to show that the Commissioner's determination of tax deficiency is erroneous. Under the circumstances of this case, taxpayers have the initial burden of proving that the Subchapter S election was invalid on the grounds that the required shareholders' consent statement was not filed.16 The Tax Court ruled that taxpayers did not carry their burden. We disagree.
27
Even though the Commissioner's determination of this issue is presumptively correct, taxpayers carried their burden in the Tax Court insofar as it is possible to prove a negative. The IRS rejection letter of September 8, 1961, is direct evidence that the shareholders' original attempt to consent to T.M.'s Subchapter S election was unsuccessful. In order to show that no later consent was filed conforming to the demands of the IRS rejection letter, taxpayers had to prove the nonexistence or nonoccurrence of any such later consent.
28
The nonexistence of a document or nonoccurrence of an event can be shown only by inferences drawn from circumstantial evidence. Rule 143 of the Tax Court Rules of Practice and Procedure incorporates by reference the rules of evidence generally applicable in the federal courts, including Rule 803(10) of the Federal Rules of Evidence. This rule provides that
29
the absence of a record, report, statement, or data compilation, in any form, or the nonoccurrence or nonexistence of a matter of which a record, report, statement, or data compilation, in any form, was regularly made and preserved by a public office or agency (may be proved by testimony) that diligent search failed to disclose the record, report, statement, or data compilation, or entry.
30
The failure of T.M.'s shareholders to submit any later consent was proven by all the direct and circumstantial evidence possibly available. The Commissioner testified that "absolutely no verification" of such later consent could be found. The Commissioner also stipulated that he was unable to find the correspondence in question despite a diligent search of his administrative files. Moreover, taxpayer Brutsche testified directly that, as president of T.M., he did not respond to the rejection letter. There is absolutely no evidence in the record to support a contrary conclusion. If evidence of a failure of the IRS to locate a shareholders' consent statement after diligent search of its records does not constitute evidence that the document was not filed, it is difficult to perceive how the United States ever carries the burden of proof in a criminal prosecution for willful failure to file a return under I.R.C. § 7203.
Election and Estoppel
31
After taxpayers had presented their case to the Tax Court, the Commissioner rested without presenting any defense. However, with the consent of taxpayers, he amended his answer to plead affirmatively the defense of estoppel on the basis that the government had relied to its detriment on the documents filed on June 26, 1961.17 Because the Tax Court found the attempted election valid, it did not consider the estoppel defense in its opinion.18 The Commissioner has not cross-appealed on this issue, but he raises in his brief the analogous doctrine of election.
32
The doctrine of election and the doctrine of estoppel are not the same.19 Like estoppel, however, the doctrine of election is an affirmative defense which must be pleaded in the Tax Court.20 Since the doctrine of election was neither pleaded nor decided below, we are without power to consider the matter on appeal.21
33
Although it was properly pleaded in the Tax Court, no findings of fact or conclusions of law were rendered with respect to the issue of estoppel. Because the Commissioner rested at the close of taxpayers' case, choosing not to present any evidence in support of his defense, the record is closed. Despite the temptation to decide such issues from the record, we note that
34
(t)he function of the court is to decide whether the correct rule of law was applied to the facts found; and whether there was substantial evidence before the (Tax Court) to support the findings made. . . . If the (Tax Court) has failed to make an essential finding and the record on review is insufficient to provide the basis for a final determination, the proper procedure is to remand the case for further proceedings before the (Tax Court). . . . And the same procedure is appropriate even when the findings omitted by the (Tax Court) might be supplied from examination of the record.22
35
Having found that T.M.'s shareholders failed to file a proper shareholders' consent, the deficiency judgments premised on a valid Subchapter S election cannot stand. Since the doctrine of election was not raised in the Tax Court, it cannot be used as an alternative basis for upholding the judgments. Because we are without power to consider the doctrine of estoppel as an initial trier of fact, the case is remanded to the Tax Court for findings of fact from the record on the estoppel issue. In view of our determination of the Subchapter S election issue, we need not examine the many other issues relating to the proper computation of any claimed deficiency.
36
The decision of the Tax Court upholding the Commissioner's deficiency judgments against taxpayers accordingly is set aside and the case remanded for further proceedings not inconsistent with this opinion.
1
Taxpayers appeal from a decision of the Tax Court upholding various deficiency judgments assessed against them as individual shareholders by the Commissioner. Brutsche v. Commissioner, 65 T.C. 1034 (1976). A detailed statement of facts is included in the opinion of the Tax Court. Id. at 1035-47
2
I.R.C. §§ 1371-1379
3
Calhoun v. United States, 370 F.Supp. 434 (W.D.Va.1973); Rowland v. United States, 315 F.Supp. 596 (W.D.Ark.1970); Joseph W. Feldman, 47 T.C. 329, 332-33 (1966); William Pestcoe, 40 T.C. 195, 198 (1963)
4
Treas. Reg. § 1.1372-2(b)(1), T.D. 6500, 25 F.R. 12055 (Nov. 26, 1960)
5
Note 3 Supra ; See J. E. Riley Inv. Co. v. Commissioner, 311 U.S. 55, 58-59, 61 S.Ct. 95, 85 L.Ed. 36 (1940)
6
65 T.C. at 1055
7
Treas. Reg. § 1.1372-3(a), T.D. 7012, 1969-2 C.B. 246
8
Id. § 1.1372-3(c), T.D. 7012, 1969-2 C.B. 247
9
Exhibit 19-S
10
Exhibit 40
11
65 T.C. at 1058
12
Record, vol. 2, at 86
13
Id. at 23
14
Id. at 89
15
Id. at 96-97 (emphasis added)
16
See Brody v. Commissioner, 34 T.C.M. (CCH) 310 (1975), Appeal dismissed (2d Cir. Oct. 19, 1976); Frank E. Poulter, 26 T.C.M. (CCH) 1092 (1967), Aff'd, 397 F.2d 415 (4th Cir. 1968)
17
Record, vol. 2, at 116
18
65 T.C. at 1059
19
For a discussion of the distinction between the two, see 10 J. Mertens, Law of Federal Income Taxation § 60.19 (1976)
20
See Rule 39 of the Tax Court Rules of Practice and Procedure, which requires that a party "set forth in his pleading any matter constituting an avoidance or affirmative defense."
21
See Helvering v. Salvage, 297 U.S. 106, 109, 56 S.Ct. 375, 80 L.Ed. 511 (1936); General Utilities & Operating Co. v. Helvering, 296 U.S. 200, 206, 56 S.Ct. 185, 80 L.Ed. 154 (1935); Commissioner v. Callner, 287 F.2d 642, 645 (7th Cir. 1961); Gaylord v. Commissioner, 153 F.2d 408, 416 (9th Cir. 1946)
22
Helvering v. Rankin, 295 U.S. 123, 131-32, 55 S.Ct. 732, 79 L.Ed. 1343 (1935) (emphasis added) (footnotes omitted); General Utilities & Operating Co. v. Helvering, 296 U.S. at 206, 56 S.Ct. 185
|
Summary Report for:49-2021.01 - Radio Mechanics
Test or repair mobile or stationary radio transmitting and receiving equipment and two-way radio communications systems used in ship-to-shore communications and found in service and emergency vehicles.
Sample of reported job titles:
Electronics Technician, Field Service Technician, Field Technician, Radio Frequency Technician, Radio Repairman, Radio Technician, Two-Way Radio Technician
Customer and Personal Service — Knowledge of principles and processes for providing customer and personal services. This includes customer needs assessment, meeting quality standards for services, and evaluation of customer satisfaction.
Engineering and Technology — Knowledge of the practical application of engineering science and technology. This includes applying principles, techniques, procedures, and equipment to the design and production of various goods and services.
Physics — Knowledge and prediction of physical principles, laws, their interrelationships, and applications to understanding fluid, material, and atmospheric dynamics, and mechanical, electrical, atomic and sub- atomic structures and processes.
Public Safety and Security — Knowledge of relevant equipment, policies, procedures, and strategies to promote effective local, state, or national security operations for the protection of people, data, property, and institutions.
Design — Knowledge of design techniques, tools, and principles involved in production of precision technical plans, blueprints, drawings, and models.
Abilities
Finger Dexterity — The ability to make precisely coordinated movements of the fingers of one or both hands to grasp, manipulate, or assemble very small objects.
Near Vision — The ability to see details at close range (within a few feet of the observer).
Deductive Reasoning — The ability to apply general rules to specific problems to produce answers that make sense.
Inductive Reasoning — The ability to combine pieces of information to form general rules or conclusions (includes finding a relationship among seemingly unrelated events).
Oral Comprehension — The ability to listen to and understand information and ideas presented through spoken words and sentences.
Problem Sensitivity — The ability to tell when something is wrong or is likely to go wrong. It does not involve solving the problem, only recognizing there is a problem.
Manual Dexterity — The ability to quickly move your hand, your hand together with your arm, or your two hands to grasp, manipulate, or assemble objects.
Visualization — The ability to imagine how something will look after it is moved around or when its parts are moved or rearranged.
Arm-Hand Steadiness — The ability to keep your hand and arm steady while moving your arm or while holding your arm and hand in one position.
Information Ordering — The ability to arrange things or actions in a certain order or pattern according to a specific rule or set of rules (e.g., patterns of numbers, letters, words, pictures, mathematical operations).
Interacting With Computers — Using computers and computer systems (including hardware and software) to program, write software, set up functions, enter data, or process information.
Inspecting Equipment, Structures, or Material — Inspecting equipment, structures, or materials to identify the cause of errors or other problems or defects.
Making Decisions and Solving Problems — Analyzing information and evaluating results to choose the best solution and solve problems.
Evaluating Information to Determine Compliance with Standards — Using relevant information and individual judgment to determine whether events or processes comply with laws, regulations, or standards.
Performing for or Working Directly with the Public — Performing for people or dealing directly with the public. This includes serving customers in restaurants and stores, and receiving clients or guests.
Communicating with Supervisors, Peers, or Subordinates — Providing information to supervisors, co-workers, and subordinates by telephone, in written form, e-mail, or in person.
Job Zone
Title
Job Zone Three: Medium Preparation Needed
Education
Most occupations in this zone require training in vocational schools, related on-the-job experience, or an associate's degree.
Related Experience
Previous work-related skill, knowledge, or experience is required for these occupations. For example, an electrician must have completed three or four years of apprenticeship or several years of vocational training, and often must have passed a licensing exam, in order to perform the job.
Job Training
Employees in these occupations usually need one or two years of training involving both on-the-job experience and informal training with experienced workers. A recognized apprenticeship program may be associated with these occupations.
Education
Credentials
Interests
Interest code: RIC
Realistic — Realistic occupations frequently involve work activities that include practical, hands-on problems and solutions. They often deal with plants, animals, and real-world materials like wood, tools, and machinery. Many of the occupations require working outside, and do not involve a lot of paperwork or working closely with others.
Investigative — Investigative occupations frequently involve working with ideas, and require an extensive amount of thinking. These occupations can involve searching for facts and figuring out problems mentally.
Conventional — Conventional occupations frequently involve following set procedures and routines. These occupations can include working with data and details more than with ideas. Usually there is a clear line of authority to follow.
Work Values
Support — Occupations that satisfy this work value offer supportive management that stands behind employees. Corresponding needs are Company Policies, Supervision: Human Relations and Supervision: Technical.
Independence — Occupations that satisfy this work value allow employees to work on their own and make decisions. Corresponding needs are Creativity, Responsibility and Autonomy.
Relationships — Occupations that satisfy this work value allow employees to provide service to others and work with co-workers in a friendly non-competitive environment. Corresponding needs are Co-workers, Moral Values and Social Service. |
Q:
Having a lot of trouble deploying a java applet
I'm new to Java. I'm simply trying to build a .jar file of my applet so I can run it from my browser. This is what my directory structure looks like:
C:\java\pacman\src
contains all of the .java class files.
C:\java\pacman\assets
contains about 4-5 images and audio files.
If I try to use the following code:
Image someFile=getCodeBase().toString() + "file.png";
The result of getCodeBase() is
file:/C:/java/pacman/bin/
However the following code fails to load:
img=new ImgHelper(getCodeBase().toString() + "assets/");
ImageIO.read(new File(img.getPath("pacman.png")));
Moving my 'assets' folder to the 'bin' folder didn't fix this either. It tries loading:
file:/C:/java/pacman/bin/assets/pacman.png
saying:
Can't read input file!
But the url it gave opens fine if I paste it into run and hit enter:
So to avoid myself a lot of headache i commented out the code in my ImgHelper class and did this:
public ImgHelper(String dir)
{
//this.imgDir=dir;
imgDir="C:\\java\\pacman\\assets\\";
}
Which works perfectly. But I want to put this on a web server, and I have no idea how/what I should do to make all the images and sounds work. Any ideas?
Thanks...
A:
Why not put it all in a JAR file and then call Class.getResourceAsStream?
A JAR file is better as it is a single HTTP connection rather than one HTTP connection per file. It is also much more flexible to use a Stream than a File.
getResourceAsStream will work when the files are not in a JAR as well, they need to be relative to the class file.
EDIT:
Another thing, the File method won't work if the applet is on a server as it will be trying to open the file from the local machine (I think, I haven't tried it) rather then from the server. Even if it tried to create a file path to the server that won't work.
|
Solar Panels in Vancouver
If your home or business is situated in an area of Vancouver that gets totally saturated with sunlight on clear days, then you are doing yourself a huge disservice every minute you aren’t taking advantage of solar energy. In the past, solar energy was nearly always met with skepticism, but the technology has made leaps and bounds in the last few years. Now more than ever, solar panels are an effective way of powering your home or business, reducing your carbon footprint, saving you money on your utility bills and earning you all kinds of special tax credits.
Of course, the way to reap all the benefits of making the switch to solar energy is to get trusted professionals to set it up for you so that you can be assured that everything is up to code and ready to provide reliable, green energy to your Vancouver home or business. Alvis Electrical Inc. has the team you need to get your solar panels up and running.
For the last several years, Alvis Electrical Inc. has made a point of learning the intricacies of solar panels and solar energy systems. Thanks to our dedication to keeping up with alternative energy, we have successfully completed the installation of commercial and residential solar panels all over the Vancouver area.
If you are ready to make the switch to solar energy, give Alvis Electrical Inc. a call today.
Why You Should Get Solar Panels
If you are still mulling the decision to get solar panels, below are a few compelling reasons why it will be one of the smartest investments you’ll ever make.
Save money. When your home or business has solar panels, and is able to rely on solar energy, you can reduce your utility bills by paying a lower rate.
Gain control. With solar panels, you will rely less on your utility company for your electricity needs by harnessing the sun. You are in control of your own energy production.
Clean energy. Energy is changing and the need for it to be clean has never been stronger. Solar is a clean, renewable and sustainable source of energy. Its power isn’t just good for your home or business, it’s good for the whole planet.
Increase your property’s value. Homes and commercial buildings with solar capabilities typically sell faster and command a higher asking price than the neighboring buildings who haven’t invested in solar panels. People are willing to pay a premium in exchange for lower monthly energy bills, so, if you are thinking about selling sometime in the near future, it’s worth your while to invest in solar panels now and get more when it goes to escrow.
These are just a few reasons why solar panels have become increasingly popular throughout the area. If you have any questions about solar panels and how they can benefit your family or organization, please do not hesitate to contact Alvis Electrical Inc..
Contact Us Today
Alvis Electrical Inc. can help with all things related to solar panels. Whether it’s sales, repairs, maintenance, installation or design, just get in touch with us and we’ll be happy to help.
Get in touch with us today!
All information provided is provided for information purposes only and does not constitute a legal contract between Alvis Electrical Inc. and any person or entity unless otherwise specified. Information is subject to change without prior notice. Although every reasonable effort is made to present current and accurate information, LinkNow™ Media makes no guarantees of any kind. |
From pypi
Give it a try
short Flask example
fromdatetimeimportdatetimeimportflaskimportmarshmallowimporthapicfromhapic.ext.flaskimportFlaskContextimportjsonhapic=hapic.Hapic()app=flask.Flask(__name__)classUriPathSchema(marshmallow.Schema):# schema describing the URI and allowed valuesname=marshmallow.fields.String(required=True)age=marshmallow.fields.Integer(required=False)classHelloResponseSchema(marshmallow.Schema):# schema of the API responsename=marshmallow.fields.String(required=True)now=marshmallow.fields.DateTime(required=False)greetings=marshmallow.fields.String(required=False)@app.route('/hello/<name>')# flask route. must always be before hapic decorators@hapic.with_api_doc()# the first hapic decorator. Register the method for auto-documentation@hapic.input_path(UriPathSchema())# validate the URI structure@hapic.output_body(HelloResponseSchema())# define output structuredefhello(name='<No name>',hapic_data=None):return{'name':name,'now':datetime.now(),'dummy':{'some':'dummy'}# will be ignored}classUriPathSchemaWithAge(marshmallow.Schema):# schema describing the URI and allowed valuesname=marshmallow.fields.String(required=True)age=marshmallow.fields.Integer(required=False)@app.route('/hello/<name>/age/<age>')@hapic.with_api_doc()@hapic.input_path(UriPathSchemaWithAge())@hapic.output_body(HelloResponseSchema())defhello2(name='<No name>',age=42,hapic_data=None):return{'name':name,'age':age,'greetings':'Hello {name}, it looks like you are {age}'.format(name=name,age=age),'now':datetime.now(),'dummy':{'some':'dummy'}# will be ignored}hapic.set_context(FlaskContext(app))print(json.dumps(hapic.generate_doc(title='API Doc',description='doc desc.')))# Generate the documentationapp.run('127.0.0.1',8080,debug=True) |
China’s known for developing at a breath-taking speed. Sure, there are bound to definitely be some architectural duds along the way, some building fails, some “Only in China” moments and definitely some WTF?! constructions. But from time to time, in China stunning architectural moments happen! Here are 5 architectural wonders to celebrate in China in 2013.
These top architectural wonders were selected by Jing Daily, a magazine dedicated to the business of luxury and culture in China.
#1 China stunning architectural: Sifang Parkland (Nanjing)
Sifang Parklang is an 11-building complex, including a hotel, a conference center, residential villas, and the Sifang Art Museum. Guess they really like geometric shapes in Nanjing! Built over the course of 10 years on the outskirts of Nanjing, Sifang Parkland was developed by the 58-year old real-estate developer Lu Jun and his son, Lu Xun.
#2 China stunning architectural: Shenzhen Bao’an International Airport (Shenzhen)
Designed by Rome-based Studio Fuksas […] the Shenzhen Bao’an International Airport’s new Terminal 3 officially opened in November with its first flight taking off for Mongolia.
I already really liked Beijing’s Airport look and feel, can’t wait to go check out Shenzhen’s new airport terminal! The outside looks extremely impressive too! But as the author points out, I might not be getting a change to use the terminal any time soon.
In spite of its cosmopolitan architectural elegance and abundant passenger capacity, the $1-trillion airport currently serves mostly regional routes and has only one direct flight to Europe—Helsinki. Time will tell whether more airlines will connect to the new airport terminal.
#3 China stunning architectural: Shenzhen Stock Exchange (Shenzhen)
photo by philippe ruault – image courtesy of OMA
This building’s most unique feature is the three-story portion that sticks out from the rest, at 120 feet above the ground. Never mind the fact the Chinese stock exchange performed the worst this year, and Shanghai especially, this new Stock Exchange building is set to shine.
#4 China stunning architectural: New Century Global Center (Chengdu)
This massive new shopping center – 4 times the size of the Mall of America, can you imagine? – is so huge you could almost fit anything you’d want in it. It IS the World’s largest building after all. So you could fit in it: 20 Sydney Opera Houses or 3 Pentagons. Instead, it holds an IMAX theater, shops, restaurants, offices, hotels, conference rooms, a “Mediterranean village,” a pirate ship, and a skating rink.
And a gigantic artificial beach, complete with a waterpark,fake sunrises and sunsets and everything. Makes sense for a shopping mall.
#5 China stunning architectural: The China Wood Sculpture Museum (Harbin)
Photo: Iwan Baan
This surreal, sleek looking building sure sticks out in Harbin! Despite being a decent size, the city doesn’t have too many modern looking buildings yet…so this sort of looks like an alien tried to park his ship, don’t you think?
What do you think of these buildings? Did we miss architectural wonders that were built in China in 2013? Let us know in the comments below!
Now let’s see what gets built in 2014 I’m hoping this awesomely crazy bus comes to life!
The Nincha Team!
Ninchanese is a new platform where you’ll have fun learning Chinese! We’re still working on it for now, so sign up to try the beta for free when we launch! And stay in touch with us on Facebook, Twitter, Google + and Weibo. |
Performance of an algorithm based on WHO recommendations for the diagnosis of smear-negative pulmonary tuberculosis in patients without HIV infection.
To evaluate the performance of an algorithm based on WHO recommendations for diagnosis of smear-negative pulmonary tuberculosis in HIV-negative patients. We recruited HIV-negative patients with clinical suspicion of tuberculosis who had had three negative sputum smears in Lima, Peru. All included subjects underwent a complete anamnesis, physical examination and chest X-ray, and had a sputum specimen cultured in Ogawa, Middlebrook 7H9 media and MGIT®. We applied an algorithm based on WHO recommendations to classify patients as having tuberculosis or not. The diagnostic performance of the algorithm was evaluated comparing its results against the reference standard of a positive culture for M. tuberculosis in either of the media used. A total of 264 of the 285 patients included (92.6%) completed evaluation and follow up. Of these, 70 (26.5%) had a positive culture for M. tuberculosis. Clinical response to a broad spectrum course of antibiotics was good in 32 of these 70 patients (45.7; 95%CI 34.0-57.4%). Overall, the algorithm attained a sensitivity of 22.9% (95% CI 13.1-32.7%) and a specificity of 95.4 % (95% CI 92.4-98.3%) compared to culture results. The positive likelihood ratio was 4.93 and the negative likelihood ratio was 0.81. The sensitivity and negative likelihood ratio of the algorithm is poor. It should be re-evaluated, and possibly adapted to local circumstances before further use. The clinical response to an antibiotic trial is the most important component to reassess. We also suggest considering performing chest X-ray earlier in the diagnostic work-up. |
string_literal<3>=foo
a=foo
b=bar
a+b=foobar
(a+b).size()=6
(a+b)[0]=f
(a+b)[5]=r
|
First up, Dee Hock has made more money than God, so I feel like it might be a
good idea to trust him when it comes to how we comport ourselves in the business
place. Although maybe not. Wikipedia hillariously states: “Through a series of
unlikely accidents, Hock helped invent and became chief executive of the credit
system that became VISA International.” I leave unlikely accidents as an
exercise to the reader.
At any rate, I like this quote a lot. This post is a pretty rambling one about
why I like it so much. I believe that it touches on some deep ways that we work,
and can help us reject cynicism and laziness that finds its way into
organizations.
But First: Thought-Terminating Clichés
There’s a good book on propaganda by a Psychiatrist named Robert Lifton:
Thought Reform, and the Psychology of
Totalism. The book is pretty good in
general, but Lifton invokes an interesting concept that I’d like to talk about:
Thought-terminating Clichés.
From the book:
This refers to a cliché that is a commonly used phrase, or folk wisdom,
sometimes used to quell cognitive dissonance. Though the clichéd phrase in and
of itself may be valid in certain contexts, its application as a means of
dismissing dissent or justifying fallacious logic is what makes it
thought-terminating.
In the context of this book Lifton discusses them as a tool that states used to
alter thought in predictable ways.
Freedom is universally accepted to mean… something. Propagandists can subtly
occupy the phrase with their own ideology. If the state’s will is common sense,
how would you ever argue with it? If the state’s will is self contradictory
(democracy is good, but let’s put dictators in power if they’ll deal with us),
this can entirely be hidden inside the cliché, and the mind never really has to
experience the contradiction.
Thought-Termination and Principles
Suppose Romeo meets Juliet and wants to know what he feels. Wanting to know a
good word to describe what he’s going through, he turns to Google and types
“define love”
an intense feeling of deep affection.
“Ah! Okay, all sorted then.” thinks Romeo. His thought has terminated. He has a
useful word for it. Why go further?
I argue that “Love” is a thought-terminating cliché. There is a very good reason
why wizened elders will roll their eyes at puppy-dog love between star crossed
lover types. In the play, Romeo and Juliet are experiencing a particular brand
of adolescent “love,” that ultimately leads to the tragic ending of double
suicides and happy daggers. It isn’t good, and people get a feel for how
senseless it was, and how shallow their relationship was. They were just two
kids who met at a party!
As much as we can talk about people having experience and learning what is
meant by a word like Love, we can definitely see that the word doesn’t seem to
be doing a good job in this case. Lots of young people hear about the concept
of Love and go into relationships saying “I love you” basically ASAP. Talk to
these same people years later, and they will laugh about how naive they were
back then (Not romeo and Juliet thought because 🔪, obviously.) We write a lot
of songs about Love and how crazy it makes you. And on and on.
Really, Love is always something more. It takes a lot of time. It isn’t quite
happiness. It isn’t quite connection. It isn’t quite security. But it certainly
is partly all of these things and others. Divorces happen. Sixth marriages do
to. Nowhere in this soupy mess is the word or definition of “Love” very useful.
In fact it could even be very destructive. People can fall out of Love, and
never know it. They can say the word without being in love and never notice
they weren’t. Just as “freedom” masked state hypocrisy in the previous section,
“love” can do the same but between two people. Maybe if Juliet would have sat
and thought about what she really meant by love, she’d have woken up in the
church, and walked out alive.
We all say it, but I think nobody is quite positive what is really meant by it;
but that doesn’t make the word unimportant. In fact, people will vigorously
defend the idea that they Love their significant other, and they’ll say it back
and forth all day long, and get warm fuzzies and feel certain that what they
have is love. How can we be so sure that we have a thing if we can’t even
explain it?
Because Love is a principle.
Those Who are Closest
I think a good principle, in the way that Dee Hock means it, is like Love or
Freedom. We can never really define or understand them.
From Wikipedia.
[Tao] is a Chinese word signifying ‘way’, ‘path’, ‘route’, or sometimes more
loosely, ‘doctrine’ or ‘principle’. Within the context of traditional Chinese
philosophy and religion, the Tao is the intuitive knowing of “life” that
cannot be grasped full-heartedly as just a concept but is known nonetheless
through actual living experience of one’s everyday being.
Principles are like the Tao (ARE the Tao.) They are things which can only be
understood through living them. You can’t completely ever define them. You can’t
completely understand them. That’s the whole point. Their shifting nature is
part of what makes them useful. Fixate solely on Love, and you end up like Romeo
and Juliet. Focus on the life you want with the person you want to have it with,
and you end up with love. You cannot fall in love by wanting to fall in Love.
You just kind of have to go and be in Love.
The power of principles is not what they are as concepts. The power of a
principle are their undefinability. A good principle will yield infinite
action without becoming more clear to you. In fact, if you follow a principle,
understanding it really doesn’t seem important any more. Don’t worry about it.
Resist the urge to document or capture your principles. Just think about them,
and act.
The difficulty with company principles is that they are formed outside of
yourself. When they’re adopted and distributed to the teams, it is exceedingly
difficult to express this intangibility in a way that clicks properly. At this
point, principles will operate as thought-terminating clichés. They are reduced
to a definition. The moment this happens they stop being principles, and start
being words. It is a way, not a concept. The only value to be had in a principle
is the value gained by thinking beyond it. When principles degrade, they
actually prevent us from progessing. How does a company learn to naturally live
with its principles? How do we work together as a team to embody undefinable
concepts?
Zen does not confuse spirituality with thinking about God while one is peeling
potatoes. Zen spirituality is just to peel the potatoes. - Alan Watts |
My 2018 New Year Goals
These are my goals for 2018 because new year resolutions are so 2017. Why am I making my goals public? Because I read somewhere that if you make your goals public, you are more likely to achieve them. Or maybe not. Maybe I’ll be the first one to prove that wrong. My first goal is to make 100 videos in 100 days. Am I going to make it? I’m not really sure. Am I afraid to fail? Yes I am but even if those 100 videos suck, at least I’d learn something, and if only at least one of them is any good, then that means I still really suck and need to work at.
it I also need to keep the 4 agreements again. If you guys never heard of the 4 agreements, google it. These are the 4 agreements in no particular order:
Be impeccable with your word. That means saying what you mean and meaning what you say. And doing what you say you will do and also not saying anything bad about anybody even if they’re really bad, like that guy that I know.
Always do your best. It’s self explanatory.
Never take anything personally even if somebody attacks you don’t ever take it personally. Never make assumptions. As the old saying goes, assume makes an ass of “u” and “me”. That’s so hacky, I know.
I’m also gonna apply what I learned in the book “The One Thing”, which means everyday I’m gonna do that one thing that really matters – that one thing if you do it , everything else will not matter.
And those are my goals for 2018. I hope to achieve most of them and I hope you guys will achieve yours too. See you later. Bye bye, have a good new year. Happy new year! |
A Minnesota man who pleaded guilty to a federal hate crime for firebombing a Somali restaurant in North Dakota was sentenced Tuesday to 15 years in prison.
Authorities say Matthew Gust, of East Grand Forks, Minnesota, used an explosive made from a 40-ounce beer bottle to start a fire at the Juba Coffee House in neighboring Grand Forks in December. Prosecutors say Gust did not like Somalis and did not want them living in the area.
Gust's attorney, Ted Sandberg, said during a 90-minute sentencing hearing that Gust was trying to get even after he and a family member had been previously robbed at gunpoint while they were working at a sandwich shop. Gust, 26, believed the robbers were Somali, Sandberg said.
"It is not an excuse. It is not a mitigating factor," Sandberg said. "This was his way of striking back at the people who robbed him and humiliated him."
U.S. District Judge Ralph Erickson, at the end of a 20-minute exchange with Gust, said the defendant's decision to burn down the cafe over the burglary was silly since it's not even clear if they were Somali.
"If you had been robbed by three Norwegian dudes, would you attack the Sons of Norway hall?" the judge asked.
Gust got the idea when he heard about someone spray-painting what some have described as a Nazi-like symbol on the business, along with the phrase "go home," Sandberg said. Police have not charged anyone in connection with that vandalism, which occurred three days before the fire; Gust has denied any involvement.
"After a night of drinking, and a day of ingesting meth, Gust created the Molotov cocktail and decided he would settle the score with the robbers by damaging their national associates' gathering place," Sandberg said. "He would burn the Juba Cafe."
Prosecutors say the fire caused an estimated $250,000 in losses, including damage to neighboring businesses. A few days after the incident, dozens of people of different faiths showed up for a candlelight ceremony outside the cafe.
An FBI agent testified Tuesday that Gust told family members he wished the Somali residents "would go away" and said he would shoot them if they came to his house. Sandberg said that even if Gust had a "pre-existing racial proclivity," he had never acted on it.
Erickson said a combination of numerous medically diagnosed conditions, drug and alcohol abuse, and Gust's "huge anger management and impulse controls problems" is why he wound up "sitting in front of a guy in a black dress getting a lecture." |
Primary Care & Wellness ~ a Holistic Approach for the Whole Family
Primary Care
Our clinic performs periodic physical exams such a school physicals, well women exams and annual wellness visits for Medicare enrollees. We provide non-immunization newborn, infant and child checkups as well as much more at gerstenberg.clinic.
Cutting-Edge Services
gerstenberg.clinic is always looking to stay aware of current medical standards and breakthroughs as we pioneer the future. You will find many options here that are not available anywhere else in the area.
Natural Options
You always have the right to be responsible for your medical care. We offer a variety of supplements since there are almost always non-drug treatment options. We want to be your advocate as we partner with you in your healthcare.
Hormone Replacement Therapy
As we age, hormone production changes, and hormonal imbalance can occur as a result. Unbalanced hormones can have a variety of side effects and symptoms.
BioTE is a human-identical hormone subcutaneous pellet therapy to help NATURALLY balance hormones in both women and men.
Medical Weight Loss
Many people have stubborn fat reserves that just won’t budge no matter what they’ve tried, whether diet or exercise. With Reforming Life Medical Weight Loss, you can naturally remove abnormal fat from your body.
This will reset your hypothalamus to keep you at a normal weight, and teach you to eat correctly to maintain a healthy weight for life. |
Friday, January 13, 2012
Nanooks Play a Back and Forth Battle, Win 5-4 in a Shootout
Two shootouts between the two series on the road, and the Nanooks prevail again with a 1-0 victory in the shootout on the lone goal scored by Adam Henderson, which bumps the game score to 5-4 for CCHA scoring purposes, but it will go as a tie in the NCAA's book.
But anyhow, the Nanooks got some more chances, and for the large part, controlled a lot of the game, but again giving Ferris State a lot of chances on miscues, especially on the Nanooks end of the ice. Nik Yaremchuk opened the scoring in a bit of a back and forth first period to notch his 8th of the year with helpers from Granberg and Odegard, which prevailed as the lone goal to the end of the 1st period. The 2nd started off with a bang as Jordie Johnston, the opportunity shark for the Bulldogs put one home just 23 seconds removed from the starting faceoff. A good rush and attack with speed, which kinda caught the 'Nooks by surprise.
But this only started the swarm of scoring in the 5 goal 2nd period, as Nolan Youngmun, the freshman out of Anchorage scored his 2nd career Nanooks goal, and just like the 1st, this one also goes into the books unassisted. A bit of an interesting stat there!
Garrett Thompson got Ferris State up to tie it again on a power play goal, but that didn't last long as Granberg buried a beautiful redirection off a slapshot from the point to put the Nanooks up 3-2 on a power play goal of their own. But a good opportunity arose on a takeaway by Derek Graham off a costly defensive zone mistake on the Nanooks as he found Justin Buzzeo for the score to make it 3-3 headed into the final period.
Now, unfortunately I missed Kyle Bonis' goal there in the 3rd, so perhaps someone can fill us in there, but that goal gave Ferris their first lead of the game, at this point 4-3. But two quick penalties to Aaron Schmit and Garrett Thompson gave the Nanooks a golden 5 on 3 power play that they wasted no time on. 21 seconds after it started, Enders let one loose from the point that hit a body in front, but Henderson found the rebound in front and knocked it in for his 2nd of the year. And man has Henderson been playing well lately. He's only got a pair of goals this season, but is contributing a lot to the special teams units and really adding a lot of energy to the line up. With his style of play, he'll definitely start to get rewarded more with opportunities.
Now headed in to overtime, the Nanooks did not even surrender a shot on goal. They came close, and it probably could have been a shot, but it did not count as the Nanooks had two quality scoring chances to close out the extra period.
Henderson, who I had pegged as my 3rd star of the evening buried the only goal in the shootout as Greenham denied them all to give the Nanooks the extra point in the standings. Granberg finished as the stud of the goal with a goal and a pair of assists for a 3 point night, fairing well for him after missing some action. I guess he's got some catching up to do! Also in the multiple point category, Enders picks up a couple of helpers as he fed his centers in front of the net for goals. Nik Yaremchuk also with a goal and an assist on Granberg's goal.
Overall, a good outing for the Nanooks. They certainly got their chances, and gave a few up to Ferris State which they were able to capitalize on. I certainly hope tomorrow doesn't fare like last Saturday did for the Nanooks in Marquette after winning the shootout, but time will tell as the Nanooks will take on the Bulldogs again tomorrow afternoon, looking for their first win in 2012. |
Q:
Are far objects really accelerating away at that huge rate?
Discutssions around this question
Why is light bent but not accelerated?
got me thinking. Specifically, hsinghal said
"The absorption lines appeared to be red shifted (de accelerated photons) they come from a massive star. – hsinghal Jun 9 at 0:33"
My question is, are we taking this (redshift caused by massive star/galaxy) into account when we rely on redshift to conclude that the universe is expanding, at the rate we think it does and when we estimate distances to far objects?
A:
Yes, we are. For instance if we look at stars in our immediate neighbourhood (including the Sun) whose velocities relative to us we know, then we can get a very good idea of what the gravitational redshift due to their mass is (hint: very small for most of them).
When we look at stars very much further away we see much larger redshifts, and the redshifts increase as they get further away eventually becoming really dramatic. So we are led to one of two conclusions:
stars further away from us are receding from us, and their recession velocity increases as they get further away;
or stars much further away are much more massive, and they get more massive the further away they get, but equally so in all directions.
The second conclusion is bizarre.
For it to be true we must live in a completely unique place in the universe, where stars are very light -- this is a violation of the principles that our part of the universe is not somehow special, and that the universe is the same everywhere on large scales.
For it to be true would also imply that the laws of physics which control stellar evolution vary across the universe -- this must be true because we can, based on study of nearby stars build rather good models which relate the masses of stars to their spectra, metallicity and so on, and we can use those models to infer the masses of much more distant stars. Yet if very distant stars are systematically heavier than these models predict, the models -- and hence the laws of physics on which they are based -- must be wrong.
In other words for this conclusion to be true not only must we live in a very odd place in a universe which is not isotropic or homogeneous on large scales, but the laws of physics must in fact vary across the universe, with us, again, being at a very special place in the universe.
|
Infolinks In Text Ads
Pretty Flower Ruffles Shoulder HE09596GR16
Wore this last night to a black tie ball. I know I probably had one of the least expensive dresses there but I never felt like it. The blue color is amazing especially in person. I glammed it up with gold accessories such as heels, purse and bracelets. A very comfortable dress too when sitting and getting in and out of cars. The material flowed perfectly once I had it pressed as it comes a bit wrinkly out of the shipping box. I truly feel I had one of the most stunning dresses at the event due to the color, fit and flow. I was originally looking at $300-$500 dresses when I said to hell with it let's see if I can save some money and I'm so happy I made that decision. I did need to spend about $20 on getting the bottom hemmed. I'm 5'2" and with 3 1/2" heels I still need 1 1/2" taken off the bottom. No alterations needed for the top as I'm about a D cup and it was perfect so if smaller chested this wouldn't probably work for you. I'm around 39" around the chest and 29" around the waist and the size 8 fit perfectly. I usually wear size 8 dresses and pants. I will consider this brand for future events.
10 Responses to “Yacht Weddings”
I ordered the blue one for the cruise we are going on for our honeymoon and the color is so much better in person! I took my own measurements and used the size chart and I think that it fit very well. Definitely go by the measurements in the chart. I've been looking at formal night dresses that are 6 times the price of this one and this one is so much prettier. I think that I got great value for the price and definitely recommend this dress and getting dresses from ever pretty.
This is a very nice dress, looks so nice and fits well, except for the top, which I knew would be a little big. I would say the bra size is about a full C cup, but it's easily altered. It was delivered before the estimated time. I would suggest anyone to order from this seller.
I really loved this dress! I`m from Paraguay, and it arrived before I expected! It fits true to size and the colour was exactly like the picture. This was my first shop from Amazon and I`m very satisfied!
I really love the dress. If you are looking for a beautiful dress that will make you look elegant and gorgeous, you should buy this dress. I just cant believe how I found this dress. This was a smart purchase I made.You won't be dissapointed.Go smart shopping!
Wore this last night to a black tie ball. I know I probably had one of the least expensive dresses there but I never felt like it. The blue color is amazing especially in person. I glammed it up with gold accessories such as heels, purse and bracelets. A very comfortable dress too when sitting and getting in and out of cars. The material flowed perfectly once I had it pressed as it comes a bit wrinkly out of the shipping box. I truly feel I had one of the most stunning dresses at the event due to the color, fit and flow. I was originally looking at $300-$500 dresses when I said to hell with it let's see if I can save some money and I'm so happy I made that decision. I did need to spend about $20 on getting the bottom hemmed. I'm 5'2" and with 3 1/2" heels I still need 1 1/2" taken off the bottom. No alterations needed for the top as I'm about a D cup and it was perfect so if smaller chested this wouldn't probably work for you. I'm around 39" around the chest and 29" around the waist and the size 8 fit perfectly. I usually wear size 8 dresses and pants. I will consider this brand for future events.
Don't think I'm going to keep -- just didn't fit my shape-- need smaller top half to be flatteringGreat for my daughter who is not so well endowedWell madeBeautifully constructedFabric very high quality |
A Singaporean man is suing the Immigration Department of Malaysia for RM2.67 million (S$876,000), claiming that he went through "torture" and stayed in "inhuman" conditions while he was detained by the authorities there.
According to the Malay Mail, the Singaporean man Gilbert Louis and four other individuals were detained by the Immigration Department on Oct. 9, 2018.
All of them were residing at Louis' Johor Baru house.
One of the four people was a female friend of Louis' from the Philippines with a valid visa.
However, the other three men allegedly had no valid visas.
Louis's lawyer, Arun Kasi, claimed that Louis' visa was valid until Nov. 7, 2018.
Mobile phone confiscated
In a follow-up report by the Malay Mail on June 12, Louis claimed that immigration officials at the Setia Tropika immigration office confiscated his personal belongings, such as his mobile phone, wallet, cash, keys and shoes.
He was then allegedly kept in a "cramped cell" with 100 other detainees, and he had to sleep on a "bare dirty floor".
The next day, he was transferred to Pekan Nanas immigration camp, supposedly suffering breathing difficulties along the way.
Kept in allegedly terrible conditions
At Pekan Nanas camp, where Louis was allegedly detained for 36 days until Nov. 14, 2018, things supposedly got worse.
Louis claimed the following things happened:
He was kept in an overcrowded cell meant to hold 50 people, but held 130.
The open toilet was dirty, no clean drinking water was available, food was provided in an "unhygienic" condition.
The cell was warm, had limited ventilation and detainees slept in cramped conditions.
Essential items such as a mat, blanket, pillow and toiletries were not provided, and he had to walk barefoot and sleep on a "dirty" floor.
He had to wear the same clothes for 14 days, and only changed them when officers brought him back to his house to view a CCTV recording.
Supposedly forced to pay up
Louis allegedly only managed to shower after 10 days, and only after buying soap at an "excessive price" from a supposed off-the-books store.
He also claimed that he was forced to buy items from this store for another detainee, a self-proclaimed leader of a pack.
He said he was also forced to pay RM1050 (S$344) for the ferry tickets of three Indonesian detainees.
Louis's health problems
But that's not all.
Louis also alleged that he suffered health problems as a result of his stay.
He supposedly contracted diseases and lost substantial weight due to the conditions he experienced, and could only seek treatment after his release.
He also claimed that he informed immigration officials that he suffered from a heart condition and needed medicine, but he was denied them except for one occasion when a government doctor outside the camp gave him a few days' supplies.
He was also allegedly given limited access to his friends and family, no access to his lawyer, and was denied a meeting with the commissioner of oaths to affirm an affidavit for court purposes.
Claim filed in KL High Court
In the statement of claim seen by Malay Mail, Louis alleged the following:
The treatment he received amounted to "torture" and "cruel, inhuman and degrading treatment and punishment" as defined under international conventions.
The treatment breaches Articles 5 and 7(1) of Malaysia's Federal Constitution.
Louis left Malaysia after Nov. 14, 2018.
He claimed his arrest was unlawful as:
There was no valid reason for the arrest.
No investigation was carried out for any offence.
No charges were pressed against him.
He was not presented before a magistrate.
Louis's lawsuit was filed in the High Court in Kuala Lumpur on May 28.
According to Malaysiakini, both the Director-General of the Immigration Department and the government of Malaysia were named.
You can see Louis's Facebook post below, shared on June 11, in which he name checks both Kasi and Singaporean lawyer M Ravi.
However, Ravi is not mentioned in neither the Malay Mail nor the Malaysiakini news reports.
Not the first time someone mentioned horrible detention conditions in Malaysia:
Top image from Gilbert Louis's Facebook page and MTUC.my. |
Primary care for adults with Down syndrome: adherence to preventive healthcare recommendations.
Due to significant medical improvements, persons with Down syndrome now live well into adulthood. Consequently, primary care for adults with Down syndrome needs to incorporate routine care with screening for condition-specific comorbidities. This study seeks to evaluate the adherence of primary care physicians to age- and condition-specific preventive care in a cohort of adults with Down syndrome. In this retrospective observational cohort study, preventive screening was evaluated in patients with Down syndrome aged 18-45 years who received primary care in an academic medical centre from 2000 to 2008. Comparisons were made based on the field of patients' primary care providers (Family or Internal Medicine). This cohort included 62 patients, median index age = 33 years. Forty per cent of patients received primary care by Family Physicians, with 60% seen by Internal Medicine practices. Patient demographics, comorbidities and overall screening patterns were similar between provider groups. Despite near universal screening for obesity and hypothyroidism, adherence to preventive care recommendations was otherwise inconsistent. Screening was 'moderate' (50-80%) for cardiac anomalies, reproductive health, dentition, and the combined measure of behaviour, psychological, or memory abnormalities. Less than 50% of patients were evaluated for obstructive sleep apnea, atlanto-axial instability, hearing loss or vision loss. We observed inconsistent preventive care in adults with Down syndrome over this 8.5-year study. This is concerning, given that the adverse effects of many of these conditions can be ameliorated if discovered in a timely fashion. Further studies must evaluate the implications of screening practices and more timely identification of comorbidities on clinical outcomes. |
This paper analyses the health-improving effects of introducing four different constitutional social and environmental human rights (health, free education, adequate living (or welfare), and environment) and the American Convention on Human Rights (ACHR) into national constitution and...
This paper assesses the limitations that the Stability and Growth Pact has imposed on Italy’s economic recovery and its debt reduction. By evaluating Germany’s fiscal policy since 1997, the paper offers recommendations for the Italian authorities. Measures put forward by European Union...
The paper complements the scarce literature on knowledge economy (KE) in Africa by comparing KE dynamics within Africa in order to assess best and worst performers based on fundamental characteristics of the continent's development. The five dimensions of the World Bank's knowledge economy index...
This book and its companion volume offer a better understanding of the lessons that Indian policymakers can learn from China's economic experience over the last 40 years. The aim of the two books together is to evaluate China's incremental reforms and how these reforms have impacted on the...
This book and its companion volume offer a better understanding of the lessons that Indian policymakers can learn from China's economic experience over the last 40 years. The aim of the two books together is to evaluate China’s incremental reforms and how these reforms have impacted on the...
The dissertation deals with social inequalitiy between insiders and outsiders in Europe and its relation to employment protection legislation. In this regard, it focuses particularly on differences in unemployment. The dissertation is cumulative and captures four different empirical studies each...
The present study is a follow up to a previous paper by the same authors that aimed to systematize the similarities and differences of the economic structures of the countries of the European Union. This errand has been expanded to include the countries of the OECD. The starting point of the... |
Q:
Hashmap implementation to count the occurrences of each character
The below code is to count the occurence of each character and it should print the count.
But with the code I have tried I get only a 1 I don't know the changes I should make.
import java.io.BufferedReader;
import java.io.DataInputStream;
import java.io.FileInputStream;
import java.io.IOException;
import java.io.InputStreamReader;
import java.util.HashMap;
import java.util.Map;
class Count_CharMap {
public static void main(String[] args) {
try
{
FileInputStream file = new FileInputStream("D:\\trial.txt");
DataInputStream dis = new DataInputStream(file);
BufferedReader br = new BufferedReader(new InputStreamReader(dis));
String Contents="";
String str="";
while ((Contents = br.readLine()) != null) {
str+=Contents;
}
char[]char_array =str.toCharArray();
int count = 0;
char ch = char_array[count];
Map<Character,Integer> charCounter=new HashMap<Character,Integer>();
for(int i=0;i<str.length();i++)
{
if(charCounter.containsKey(char_array[i]))
{
charCounter.put(ch, charCounter.get(ch)+1);
}
else
{
charCounter.put(ch, 1);
}
}
for(Character key:charCounter.keySet())
{
System.out.println(key+""+charCounter.get(key));
}
}
catch(IOException e1){
System.out.println(e1);
}
}
}
Actual output should be like
If i have abcdabc in my trial.txt it should print a 2 b 2c 2 d 1.
A:
You're leaving char ch set as the same character through each execution of the loop.
It should be:
ch = char_array[i];
if(charCounter.containsKey(ch)){
charCounter.put(ch, charCounter.get(ch)+1);
}
else
{
charCounter.put(ch, 1);
}
Inside the for loop.
A:
Java 8 streams:
Map<String, Long> map =
Arrays.stream(string.split("")).
collect(Collectors.groupingBy(c -> c, Collectors.counting()));
Guava HashMultiset:
Multiset<Character> set = HashMultiset.create(Chars.asList("bbc".toCharArray()));
assertEquals(2, set.count('b'));
A:
Hai All The below code is to count the occurrence of each character and it should print the count. may be helps you..Thanks for seeing
package com.corejava;
import java.util.Map;
import java.util.TreeMap;
public class Test {
public static void main(String[] args) {
String str = "ramakoteswararao";
char[] char_array = str.toCharArray();
System.out.println("The Given String is : " + str);
Map<Character, Integer> charCounter = new TreeMap<Character, Integer>();
for (char i : char_array) {
charCounter.put(i,charCounter.get(i) == null ? 1 : charCounter.get(i) + 1);
}
for (Character key : charCounter.keySet()) {
System.out.println("occurrence of '" + key + "' is "+ charCounter.get(key));
}
}
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.