text stringlengths 8 5.77M |
|---|
Hi! This is my new lego ideas project : The Lego Space Launch System. This project is a reproduction of the space launch system (SLS). The Space Launch System (SLS) is an American Space Shuttle derived heavy expendable launch vehicle being designed by NASA. It follows the cancellation of the Constellation program, and is to replace the retired Space Shuttle. The NASA Authorization Act of 2010 envisions the transformation of the Constellation program's Ares I and Ares V vehicle designs into a single launch vehicle usable for both crew and cargo, similar to the Ares IV. SLS will be the world's most powerful rocket with about 20% more thrust than Saturn V and a comparable payload capacity.
That's why I decided to create this NASA space shuttle. This is composed of around four stages, with the first stage motor and the spacecraft. You can see the interior design of the rocket in the third picture. This set is build with 485 lego pieces and includes three lego astronaut figures (with Scott Kelly figure).
Which softwares did I used for creating and rendering all my projects?
I use several softwares like LDD, Leocad, LDraw and Mecabricks for creating the lego set (Space Launch System and figures). And then I use Blender for rendering my lego project, adding textures on lego pieces and creating the background!
Please show your support and share the project with your friends and family! If you like this, please support this project!
Please also support my other projects like the Lego Disneyland Microscale project and the Zoo Collection!
Disneyland Microscale : https://ideas.lego.com/projects/116281
Zoo Collection : https://ideas.lego.com/projects/104098
Thanks,
CARLIERTI |
// Copyright 2020 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// Code generated by protoc-gen-go_gapic. DO NOT EDIT.
package recommender_test
import (
"context"
recommender "cloud.google.com/go/recommender/apiv1"
"google.golang.org/api/iterator"
recommenderpb "google.golang.org/genproto/googleapis/cloud/recommender/v1"
)
func ExampleNewClient() {
ctx := context.Background()
c, err := recommender.NewClient(ctx)
if err != nil {
// TODO: Handle error.
}
// TODO: Use client.
_ = c
}
func ExampleClient_ListInsights() {
// import recommenderpb "google.golang.org/genproto/googleapis/cloud/recommender/v1"
// import "google.golang.org/api/iterator"
ctx := context.Background()
c, err := recommender.NewClient(ctx)
if err != nil {
// TODO: Handle error.
}
req := &recommenderpb.ListInsightsRequest{
// TODO: Fill request struct fields.
}
it := c.ListInsights(ctx, req)
for {
resp, err := it.Next()
if err == iterator.Done {
break
}
if err != nil {
// TODO: Handle error.
}
// TODO: Use resp.
_ = resp
}
}
func ExampleClient_GetInsight() {
// import recommenderpb "google.golang.org/genproto/googleapis/cloud/recommender/v1"
ctx := context.Background()
c, err := recommender.NewClient(ctx)
if err != nil {
// TODO: Handle error.
}
req := &recommenderpb.GetInsightRequest{
// TODO: Fill request struct fields.
}
resp, err := c.GetInsight(ctx, req)
if err != nil {
// TODO: Handle error.
}
// TODO: Use resp.
_ = resp
}
func ExampleClient_MarkInsightAccepted() {
// import recommenderpb "google.golang.org/genproto/googleapis/cloud/recommender/v1"
ctx := context.Background()
c, err := recommender.NewClient(ctx)
if err != nil {
// TODO: Handle error.
}
req := &recommenderpb.MarkInsightAcceptedRequest{
// TODO: Fill request struct fields.
}
resp, err := c.MarkInsightAccepted(ctx, req)
if err != nil {
// TODO: Handle error.
}
// TODO: Use resp.
_ = resp
}
func ExampleClient_ListRecommendations() {
// import recommenderpb "google.golang.org/genproto/googleapis/cloud/recommender/v1"
// import "google.golang.org/api/iterator"
ctx := context.Background()
c, err := recommender.NewClient(ctx)
if err != nil {
// TODO: Handle error.
}
req := &recommenderpb.ListRecommendationsRequest{
// TODO: Fill request struct fields.
}
it := c.ListRecommendations(ctx, req)
for {
resp, err := it.Next()
if err == iterator.Done {
break
}
if err != nil {
// TODO: Handle error.
}
// TODO: Use resp.
_ = resp
}
}
func ExampleClient_GetRecommendation() {
// import recommenderpb "google.golang.org/genproto/googleapis/cloud/recommender/v1"
ctx := context.Background()
c, err := recommender.NewClient(ctx)
if err != nil {
// TODO: Handle error.
}
req := &recommenderpb.GetRecommendationRequest{
// TODO: Fill request struct fields.
}
resp, err := c.GetRecommendation(ctx, req)
if err != nil {
// TODO: Handle error.
}
// TODO: Use resp.
_ = resp
}
func ExampleClient_MarkRecommendationClaimed() {
// import recommenderpb "google.golang.org/genproto/googleapis/cloud/recommender/v1"
ctx := context.Background()
c, err := recommender.NewClient(ctx)
if err != nil {
// TODO: Handle error.
}
req := &recommenderpb.MarkRecommendationClaimedRequest{
// TODO: Fill request struct fields.
}
resp, err := c.MarkRecommendationClaimed(ctx, req)
if err != nil {
// TODO: Handle error.
}
// TODO: Use resp.
_ = resp
}
func ExampleClient_MarkRecommendationSucceeded() {
// import recommenderpb "google.golang.org/genproto/googleapis/cloud/recommender/v1"
ctx := context.Background()
c, err := recommender.NewClient(ctx)
if err != nil {
// TODO: Handle error.
}
req := &recommenderpb.MarkRecommendationSucceededRequest{
// TODO: Fill request struct fields.
}
resp, err := c.MarkRecommendationSucceeded(ctx, req)
if err != nil {
// TODO: Handle error.
}
// TODO: Use resp.
_ = resp
}
func ExampleClient_MarkRecommendationFailed() {
// import recommenderpb "google.golang.org/genproto/googleapis/cloud/recommender/v1"
ctx := context.Background()
c, err := recommender.NewClient(ctx)
if err != nil {
// TODO: Handle error.
}
req := &recommenderpb.MarkRecommendationFailedRequest{
// TODO: Fill request struct fields.
}
resp, err := c.MarkRecommendationFailed(ctx, req)
if err != nil {
// TODO: Handle error.
}
// TODO: Use resp.
_ = resp
}
|
Chapter 3: Three of Diamonds
Roulette Academy eventually became a fairly successful player in the High School Tankery League after that. The addition of a fourth tank to the team and the inspiration granted to them by Ooarai made them perform all the harder. They moved on from 2v2 skirmish matches to full on fights against small schools that only usually fielded Tankathlon teams.
Viggen and Gregor Highschool were the first to be added to the list of the defeated. The respectively themed Swedish and Czechoslovakian schools struggled against the coordinated might of the M6 and new SU-76I crews, with the Chaffee providing reconnaissance with their speed.
Friedrich started keeping a physical list in her office of the defeated schools, and the dream was to eventually see the Big Three names on there, furthermore with Ooarai's at the top. An ambitious dream that a future commander may have to fulfil, but Friedrich was certainly going to give that commander a good head start, as she managed to add Viking Fisheries, Koala and Count Highschool to the list. They lost the first time to the latter because the enemy showed up with a surprising number of Romanian tank destroyers that she wasn't prepared for.
Their success got them noticed by their unofficial sponsor, who started to "find" more tanks for them to add to their roster.
The commander of one such new crew was currently enjoying a spot of reading. She was lounging in her special reading spot in her dorm room of the unthemed complex. Hijiri's spot was an expensive bean bag with a low, small coffee table just beside it to rest a cup of green tea and a book on.
Hijiri was reading a history book on the North African Campaign, partially out of interest, partially because she had chosen to write a paper on it for school; but mostly it was to see if she could steal a few tactics. The long conflict saw the genius minds of Montgomery and Rommel trying to out-do each other, so she figured it was a gold mine for tank strategies. The only thing she wasn't liking about it so far was that it didn't feature any late-WW2 British tanks, which were her favourite.
Hijiri was a rather colourful girl with twin ponytails that had a gradient of sky blue on her scalp to navy blue at her tail ends. The sky blue matched her eyes. Her hair was long enough to reach her hips when she stood up. When she sat down in her spot, she liked to spread the ends of the tails over the bean bag; she took pride in the length of her hair.
On her little coffee table, her phone buzzed. She picked it up and saw it was a notification from the Roulette Ship app. Some school ships had taken to making apps to keep the community connected, they had live updates for the ships destination, weather forecasts and energy graphs. Of course, the Roulette app featured a plethora of casino and gambling games that connected to the casinos on the Strip; some of the students had tabs in their favourite casinos that were like second bank accounts.
Hijiri tried to keep out of the Blackjack, slots and Roulette games, but she liked to dabble in a good bet. And a smile grew across her face as she saw the notification appear on her screen.
Congratulations! You won a bet! 1000 yen added to your tab
And very shortly afterwards, she got a text message from Sakura from the Chaffee crew,
You were right honey! I just saw Allison and Fiona on a date, they're totally hooking up. Did you get your pot?
Hijiri typed out a response.
Sure did! Which couple should I correctly guess this time? ;-)
It was only a half-joke.
The four themed dorms took inspiration from existing schools, and much like how the school ships had bastardised cultures of the countries they attempted to ape, the school dorms had bastardised atmospheres of the school ships they masqueraded.
Maginot Maginot was one such dorm. It was visually inspired by the Paris Paris hotel in real Las Vegas, complete with an Eiffel tower out the front, albeit obviously smaller; and it took its theme from the French Maginot school. It featured an art gallery, which was half filled with replicas while the other half was filled with the works of Roulette's very own top performing art students; as well as a series of restaurants (all French themed, of course) and a few relaxing bars. The dorm was the second smallest, and a lot of it was reserved as a hotel, so as a consequence the dorm rooms were studio apartments much like those of the unthemed dorm.
Maginot Maginot was were the "artsy" students tended to end up, though a few on normal education programme would sometimes request to live there.
One such case was Akira. At the moment, she was trying on a series of accessories whilst wearing the Roulette Tankery uniform in front of the mirror, with a smile on her face. Not a beaming smile, but a smile that showed off just how content she was with where she was and what she was doing, the kind of smile that if somebody else had been there she might start humming.
Flowers, clips, bracelets, scarves, belts, snoods, necklaces and even handbags. Anything she had she was trying on. Akira had heard that Friedrich was trying to secure a match with one of the French schools. Akira loved the French, so she wanted to look her best for the match. She wasn't quite sure what it was about them she adored so much, it just seemed to be a little bit of everything to do with the French spirit. Maybe it was the food, that was one of the major reasons she picked Maginot Maginot after all, so she could live above all the restaurants.
Her love of the French didn't go unnoticed, and her friends gave her the nickname 'Orleans' after they heard she had been to both the old and new namesake cities. And her favourite tank was the AMX-13, that didn't help either.
Her phone started singing the instrumental of Dans les Hussards as it received a call. Picking it up, she noticed it was just the person she was thinking of.
"De Brak, honey! How are you?"
"I am just fine, mon cherie! I did some looking and found a spare Czapka for you!"
"Thanks a lot! Do you think you could bring it to school tomorrow?"
"Not a problem, dear. See you tomorrow!"
"Au revoir," Akira joked with a giggle and hung up.
Akira was the only case of Hijiri losing a bet on a gay couple forming. Hijiri had bet Akira would eventually hook up with De Brak, but it wasn't to be. Akira was straight after all, much to her own frustration. She could at least admit De Brak was attractive.
Akira admired herself in the mirror for a moment to see if she liked her image. Her blonde hair was tied into a bun with some hanging loops, a hairstyle she was quite pleased with. Her nails were painted a blue that matched the French flag. She also had a red hair clip in her hair shaped like a playing card diamond, but she wasn't sure if she liked how it went with the blue.
Not that any of this mattered. As the loader, it wasn't like anyone was going to see her.
She heard some hissing coming from her stove and panicked as she realised she left her dinner boiling in a pan with a lid, and now the water was starting to spill out over the sides. She rushed over to save her dinner.
Bake in the oven for ten minutes until crispy on the outside.
Well, which was it? For ten minutes, or until crispy? What if the cookies didn't go crispy after ten minutes? How was she meant to check? Just by looking? What if her sense of judgement wasn't right? What if her view of "crispy" was different to that of the people who wrote the book? Maybe it was lots of people that wrote it, that would be worse! Then there would be a whole array of contradicting beliefs on what the perfect "crispy" cookie looked like, and she was just another addition to the problem!
Youmi took a breath and considered for about the fifth time if she should just give up and throw out the whole batch. She almost did the first time when she accidentally added three extra grams of flour. Now though, she was too far in to give up now. Hopefully the cookies wouldn't turn out too awful.
Youmi was the radio operator of the Sherman DD, which was ironic considering her poor social skills. She had trouble looking at people in the eye; it was rather odd, like a force was preventing her from looking at them directly, so when she talked to people it would usually be while casting a glance just past them, it made her look like she had two lazy eyes.
But that didn't stop her from being a decent enough radio operator. Hijiri understood her. She knew that if she gave Youmi orders she would repeat them over the order exactly as she was given them, right down to the enunciation.
Youmi pulled the tray of cookies out of the oven once the ten minutes was up. They certainly looked crispy. But what if her friends didn't like crispy cookies?
She grimaced and set the tray down, then knocked the side of her head. She knew she was being silly, but she couldn't help it. Her brain was trying to convince her of all these irrational things.
After letting the cookies cool down, she tried one. They were... alright. Perhaps they crumbled a little too much, they seemed a little more "hard" than "crispy", the gooey inside could easily make a mess, but at least it tasted nice.
She bagged the rest, one for each of her friends, and a second for Sumi.
Later, at about one o'clock in the morning, the Strip was just as bright, colourful and alive as it always was. The Seven Clovers Casino and Bar was a particular favourite of Azumi's, not a weekend went by without her paying it a visit.
Azumi loved Seven Clovers because it featured one of the largest dance floors on the Strip. It was estimated it could fit about 350 people on it, though Seven Clovers recently put up a notification on the Roulette app that about 420 managed to squeeze on for a mosh pit last weekend. But Azumi had already left by that point, her delinquency had limits.
Tonight the bar was featuring just some good old techno music, just the thing she could dance to.
Azumi had a head of thick black hair, tied into a single braid down her back, which made it heavy and short enough that it wasn't a nuisance when she twirled and threw herself around while dancing. She also grew out her bangs and hair sprayed them to keep them stiff to frame her face.
While tearing up the dance floor with some girl friends, they laughed as a boy started jigging his way over. She liked how casual he was being about it, she was sick of men that tried too hard to be smooth.
As the beat dropped into some really low tones, the boy did a Matrix lean backwards to coincide with the low bass. Azumi saw this as a challenge and copied him, the two expertly keeping themselves suspended on just the tips of their shoes.
They snapped back up to a stand at the same time, dancing in front of each other. The boy shuffled up his shoulders against her, a big smile on his face. Azumi returned the dance move. She was having some good fun.
And as the song reached its ending crescendo and stopped, the two settled to a stand to catch their breath, giving each other a respective nod for the other's skill.
And then, just as he was turning to leave, he reached over and gave her a slap just behind the waist.
Azumi's smile melted into a look of "did you just...?"
The next thing the kid knew, as he was just taking his first step to leave, he was on the floor after being knocked flat from a clean right hook to the jaw.
Cracking her knuckles, Azumi nodded to her friends and they left the dance floor. The boy was swallowed by the rest of the dancing patrons; nobody had noticed the fight since the next song was starting.
Later in the evening, over in the tank garages, a few of the engineers were working late into the night to get some needed repairs done after a recent practice skirmish match. Sumi was the driver and maintainer of her crew's Sherman DD. She loved her precious "floaty Sherman" tank for how ridiculous it looked.
The match had caused a tear in the flotation screen, amongst other faults, but to Sumi, replacing the screen - or "shower curtain" as Azumi called it - was of utmost importance. Though admittedly, the damage was her fault.
"Get out of the damn way!" he had shouted at the start of a match as the teams set off, directed at the tank in front of them.
"Sumi, that's the Chaffee," Hijiri laughed, "They're the scouts, they need to be in front."
"If they're in a Chaffee then they could at least move a little faster!" Sumi drove the pedal to the ground and pushed both the tread levers forward.
"Sumi, no, stop!" Hijiri tried to tell her, but Sumi rammed straight into the back of the Chaffee in an attempt to push it along.
"Earth to Three Diamonds!" Sakura, the commander of the Chaffee, transmission over the radio, "You're kind of mounting us!"
"Sumi, for God's sake, pull back!" Hijiri ordered, ducking her head into the tank to scream the order at the driver.
"Commander, the Chaffee's gun is pointing this way!" Azumi relayed, spying through the gunner's optics.
Hijiri transmission "Five Hearts, what are you doing?!"
What came through was Fiona, the Chaffee's radio operator, trying to give an answer while Sakura could be heard arguing with the gunner in the background, "F-Five Hearts to Three Diamonds; we're k-kind of in a pickle right now as-" but what she said afterwards was never heard as the Chaffee fired straight into the Sherman DD. The round ricocheted off, and now Azumi, desperately trying to keep her composure, had run out of temper.
"Eat sh-!"
BANG
Five minutes into the match, the Chaffee was knocked out.
The flag tank.
The other team won.
"Hmph, should've been at the back anyway," Sumi huffed at the memory, pouring some water from a jerry can onto her hands to wipe off the dust and grime from attaching the new screen to the floaty Sherman.
As the bell rang to signal lunch time at Roulette Academy, the five girls met up in their usual spot at their usual table in the cafeteria. Hijiri was the first to arrive, followed by Akira.
"Hijiri, honey!" said Akira, sitting opposite her commander with tray in hand. "How was your weekend?"
"Hi, Akira! My weekend was just fine!"
The girls were dressed in the Roulette Academy uniform, which was a white buttoned shirt with a grey blazer, grey skirt and black bowtie.
"'sup, bitches?" Azumi sat down next to them.
"A good morning to you too, Azumi," Hijiri giggled.
Azumi snapped her fingers. "Hijiri, I need a favour to ask. Could you help me study for the test tomorrow?"
"I don't suppose you did any studying over the weekend?" she asked playfully.
"You know I can't study by myself."
Hijiri sighed exaggeratively, but said with a smile, "Fine, since it's you asking."
"Cheers, I owe you one."
"Don't you owe her five, now?" Akira asked, cocking her head.
"Shh," Azumi placed a finger to Akira's lips, "Quiet, Orleans."
"Well, well, if it isn't Sumi!" said Hijiri, watching the driver make her way over then slouching down in a seat next to Azumi. She looked worse for wear, like she hadn't slept.
"You look like you and Youmi were up all night," Azumi smirked.
Sumi punched her in the arm. Well, it was more of a brush of her fist. "The Sherman took a while to fix," she mumbled.
"It'd be faster if you let someone else help you," said Hijiri.
"Nobody is touching my precious floaty Sherman!" Sumi waved a finger in the air.
"Oh hey, it's Youmi!" said Akira, and Sumi was immediately wide awake, her eyes shooting open while she sat up straight.
Youmi was holding a plastic of cookies. She stood next to the seat Sumi was sitting in and leant down and gave her kiss.
"How long have you two been together for now?" asked Akira.
"Four months," Hijiri answered for them.
"How do you remember that?" Azumi asked.
"They were the first couple I bet on," Hijiri stuck out her tongue. "I'll be honest, I remember more the message I got on my phone to tell me about the pot I won."
"I'll never forget Sumi's face when she told us they were together," Akira giggled.
"Oh," Sumi exclaimed sarcastically, wrapping an arm around her girlfriend's waist, "You mean that time I sat my closest friends down to tell them about this really important moment in my life, and then one of them goes 'Oh yeah, I know, I won two grand off it'?"
"Yeah that was it!" Akira snickered.
"It was funny, Sumi," said Azumi, "You were fuming."
"Pfft," Sumi waved her hand, "Joke's on you guys, I'm the one that got Youmi."
"Didn't she ask you out?" Hijiri asked, resting her chin on her hand, elbow propped on the table.
"W-well... yeah... but I was... going to ask her out anyway..."
Even Youmi peered at her to raise a suspicious eyebrow.
"Weren't you two friends for years?" asked Hijiri, looking rather smug with her smile with her chin resting on her hand. "You were taking your sweet time."
Sumi stuttered for an answer.
Youmi had the smallest smile on her face the whole time, she liked watching her girlfriend getting teased, she always had to have the last word.
"Hey, Youmi," Sumi looked up at her to change the subject, "How you doing today?"
"Um... I... I made cookies for everyone," she said timidly, holding up the bag.
"Oh, how sweet of you!" said Akira.
"There's one for everyone," said Youmi.
"Um... Youmi..." said Azumi with a slight grimace of guilt, "Sorry, but I don't really like cookies."
Youmi looked like she had just seen her dog die. "Oh..."
Hijiri kicked Azumi under the table. Akira flashed daggers at her.
"I'm sure they're lovely cookies!" Azumi waved her hands, "I'm just not a fan! I wouldn't want to tell you I liked them when I didn't..."
"No, that makes sense," Youmi nodded, "You don't want to lie to me. I respect that. I'm sorry I couldn't give you anything."
"Don't worry about it!" said Azumi, "I don't even know what you feel like you need to give me something for."
"Well... I just wanted to say thank you to everyone for being my friend... so I made cookies for everyone."
"Oh, honey!" said Akira, her hand to her heart.
Sumi rubbed circles into her girlfriend's back with a smile.
"Why don't you have Azumi's, sweetie?" she asked.
"Y-yeah," Azumi nodded, "I would like it if you had mine."
"Alright," Youmi agreed.
Youmi handed out the cookies, keeping the last two - the second one for Sumi and the one meant for Azumi - wrapped up in the bag. She didn't realise that she was gripping the ends of her blazer with her other hand, awaiting the criticisms of her baking.
She started to regret giving them the cookies. Too crispy, the inside too messy. She should've started again. She tried to do this nice thing for them, got them excited for some cookies and now she was going to subject them to-
"Oh wow, these are delicious!" said Akira.
Youmi's eyes lit up. "You think so?"
"Yeah, these are great!" said Hijiri.
"You don't think they're too hard?"
"No, I don't think so," said Akira.
"Is the chocolate inside nice?"
"Oh yes!" said Hijiri, "It's so sweet!"
"You did a good job, sweetie," said Sumi, "These are nice cookies."
Youmi was overcome with relief.
"Are you sure you don't want one, Azumi?" asked Hijiri.
"I'm sure. I wish I could, but I feel sick when I eat too much chocolate at once."
"That sucks," said Sumi.
"S-so, um... what does everyone want to do today?" Youmi asked.
"Study," Azumi answered.
"Study session at my place tonight?" Sumi asked.
"That sounds like fun!" said Akira.
"Yeah, I'll go if Hijiri does," said Azumi.
Hijiri gave a thumbs up.
"Youmi?" asked Sumi.
"Yeah, and she'll stay behind all night afterwards," said Azumi, much to Sumi's blushing.
Sumi punched Azumi in the arm again, properly this time.
"Ow!" she cried. "Well, that's a dead arm now."
"Um, yes Sumi, I'd love to come."
"Then it's a date!" said Hijiri with a smile.
Mars' Tips For Making a Cast of Characters
Tip #1
When giving names to your characters, make them discernibly different. Here we have an Azumi, a Youmi and a Sumi. I was the one with the cheat sheet and even I had difficulty telling these three apart. This works for humorous purposes if the characters are meant to be a duo/trio, but I'd still limit it to just two people.
Tip #1.5
When picking a name for a character, I like to give their name a meaning, even if its really obscure to the poit I myself will forget it. You can make names rather distinguishable this way.
Tip #2
Physical descriptions are important so you can picture the character in your head. Give the character something more than just a hairstyle and colour (though Youmi is a good example of telling her apart by hairstyle because of her unique colours). Height also doesn't work, because just about anyone could be described as tall, mid height or short.
Things like complexion, skin colour, beauty spots, hair thickness, breast size, accessories (The creator of the M6 crew knew what he was doing on this one. Even a pair of glasses makes the character different), piercings and clothes (And not just the colour of their shirt. Give your character a very distinguishable costume. Look at Danganronpa 1 for good examples on telling characters apart just by clothing) should be used to make the character stand our in the reader's mind. In animation this isn't as important because the characters can be seen, so a picture doesn't need to be painted.
For example: Imagine a high-school student in a white/green sailor uniform with shoulder length copper hair that has an almost permanent expression of unsuredness.
Did you guess I was trying to describe Miho? You might've, but you can see my point on how that description could've fitted just about anyone.
This is an important point for me to stress because I'm only three chapters in and I'm starting to run out of ways I can describe a character when I've got next to nothing to go on besides their hair style. Some of these descriptions have actually been personal interpretations. |
Q:
Remainder on division by 7
Please vet the following, as I hope they are not too simple exercises.
What is the remainder of $1811196^3$ when divided by $7$?
I start with an integer n, as any number on division by 7 will have its remainder fall in one of the seven bins- $0,1,...,6$.
If take the various values of n as by the division algorithm, then for a variable $q \in \mathbb {Z}$ have the form : $\{7q, 7q + 1, 7q +2,..., 7q+6\}$.
The cubing will create three terms for each, with the variable $q$ containing terms as multiple of $7$, while the constant remainder being given after division by $7$ as: $0, 1, 1, 6, 1, 6, 6$, or in the set: $\{ 0, 1, 6 \}$.
As $1811196\equiv 2\pmod 7$, so $2^3 \equiv 1\pmod 7$
For $n\equiv 7\pmod 8$, what is $(n^2 -n)\mod 8$?
By the logic used in $1$ above, $n^2\equiv 1\pmod 8$. So, $(n^2 -n)\mod 8$ $ \equiv 2\pmod 8$
Assume that $n\equiv r\pmod m$, then what is the relationship of remainder of $m\mid n^2$ to the remainder of $m\mid r^2$?
Given, $n=qm +r, \exists q \in \mathbb{Z}$, or equivalently $n\equiv r\pmod m$; have $n^2\equiv r^2\pmod m$. So, they are the same value.
A:
You are correct, but your first and in third answers are too long. My answer to the first quest would just be$$1\,811\,196\equiv2\pmod7\implies1\,811\,196^3\equiv2^3\equiv1\pmod7$$and my answer to the third question would just be\begin{align}n\equiv r\pmod m&\implies n^2\equiv r^2\pmod m\\&\iff\text{the remainders of the divisions of $n^2$ and $r^2$ by $m$ are the same.}\end{align}
|
940 F.2d 614
UNITED STATES of America, Plaintiff-Appellee,v.Samuel HARARI, Defendant-Appellant.
No. 89-3880.
United States Court of Appeals,Eleventh Circuit.
Aug. 30, 1991.
Michael G. Tanner, Jacksonville, Fla., for defendant-appellant.
Robert Genzman, John Steele, Asst. U.S. Atty., William R. Mitchelson, Jacksonville, Fla., Karla Spaulding, Asst. U.S. Atty., Tampa, Fla., for plaintiff-appellee.
Appeal from the United States District Court for the Middle District of Florida; Susan H. Black, Chief Judge.
Before FAY and COX, Circuit Judges, and MORGAN, Senior Circuit Judge.
PER CURIAM:
1
Appellant pled guilty to charges involving the distribution of cocaine, in violation of 21 U.S.C. Sec. 841(a)(1). He was sentenced to ten years in prison and eight years of special parole. No appeal was taken. Appellant filed a motion under Rule 35(a) of the Fed.R.Crim.P. to correct an illegal sentence contending that the specific statute covering his offense did not provide for the imposition of post-conviction monitoring. This motion was denied.
2
This argument involves the relationship of the provisions of the Anti-Drug Abuse Act of 1986 (ADAA) signed into law on October 27, 1986 and the Sentencing Reform Act of 1984 which became effective on November 1, 1987. Any doubt about this question of post-conviction monitoring being authorized between October 27, 1986 and November 1, 1987 has now been eliminated. The Supreme Court in Gozlon-Perety v. United States, 498 U.S. ----, 111 S.Ct. 840, 112 L.Ed.2d 919 (1991), has held that the ADAA provisions mandating a term of "supervised release" apply to all drug offenses specified in section 1002 of the ADAA, including 21 U.S.C. Sec. 841, occurring after October 27, 1986.
3
We VACATE that portion of the sentence dealing with the special parole term and REMAND for resentencing in accord with the Supreme Court's recent pronouncement.
|
Q:
ROW_NUMBER() and RANK() in MongoDB
I have a products table with below schema
(ProductID INT, ProductStartDate date, ProductExpDate date,
ProductTypeID int, #PacketsInProduct int,
Price int, Discount int, Score int)
I need to write a query something like this in MongoDB. I am using C# driver 1.5. The problem I am getting in first CTE below (Products_CTE) where Row_NUMBER() is deciding the product rank which is matching my where conditions, based on the rank I need to filter the rows in 2nd CTE. All my where conditions are dynamic, Can anyone help me out here. Thanks in advance
;WITH Products_CTE
AS
(
SELECT
ROW_NUMBER() OVER(PARTITION BY ProductID ORDER BY Score Desc, Price Asc) as RankByProduct,
*
FROM Products
WHERE
ProductID IN (1,2,3)
AND ProductTypeID IN (001,002)
AND [#PacketsInProduct] >3 and [#PacketsInProduct] <10
and ProductExpDate < GETDATE()
),
Products2_CTE
AS
(
SELECT
ROW_NUMBER() OVER (ORDER BY Score DESC, Price ASC) as rownum,
*
FROM Products_CTE
WHERE RankByProduct <= 3
)
SELECT
*
from Products2_CTE cte1
where rownum BETWEEN 15 AND 25
ORDER BY [Score] DESC, [Price] ASC
A:
This query is going to require you building a map/reduce. Check to docs here: http://www.mongodb.org/display/DOCS/MapReduce.
If you need some help constructing the map/reduce, let me know and I'll do my best. I'd encourage you to try it yourself first though. Note that map/reduce isn't for real time querying, so you'll need to snapshot the results, which means you are working with eventually consistent data and the business needs to know about it and be ok with it.
Furthermore, chances are that your schema could be optimized for this type of query depending on your needs. Storing data in mongodb the same way you store it in a relational database is almost never the right choice. If it is the right choice, then chances are you should stick with a relational model anyways.
|
Ventricular and atrial defibrillation using new transvenous tripolar and bipolar leads with 5 French electrodes and 8 French subcutaneous catheters.
This study evaluated the use of new small transvenous atrial and ventricular leads for converting atrial fibrillation (AF) and ventricular fibrillation (VF) in 10 adult male mongrel dogs. Five dogs (group A) received a right atrial "J" (AJ) and right ventricular (RV) active fixation tripolar lead, each consisting of a platinized platinum pacing tip, anode band, and braided defibrillation electrode. The remaining five dogs (group B) received one bipolar RV lead and one tripolar AJ lead. The RV leads were implanted in the right ventricular apex (RVA) and the AJ leads were placed in the atrial appendage. Additionally all dogs received two 8 French subcutaneous defibrillation catheters in the fifth and seventh intercostal spaces. Twenty asymmetric biphasic shocks consisting of five randomized voltage levels were used to convert VF in groups A and B. The bipolar RV lead (group B) had a significantly higher probability of success in converting VF than the tripolar RV lead (group A). In group A defibrillation thresholds for converting AF were obtained using two electrode configurations. No significant difference was observed between the two electrode configurations used to convert AF. Pacing and sensing thresholds were satisfactory for bipolar and tripolar lead configuration. |
Q:
Scraping the content of a box contains infinite scrolling in Python
I am new to Python and web crawling. I intend to scrape links in the top stories of a website. I was told to look at to its Ajax requests and send similar ones. The problem is that all requests for the links are same: http://www.marketwatch.com/newsviewer/mktwheadlines
My question would be how to extract links from an infinite scrolling box like this. I am using beautiful soup, but I think it's not suitable for this task. I am also not familiar with Selenium and java scripts. I know how to scrape certain requests by Scrapy though.
A:
It is indeed an AJAX request. If you take a look at the network tab in your browser inspector:
You can see that it's making a POST request to download the urls to the articles.
Every value is self explanatory in here except maybe for docid and timestamp. docid seems to indicate which box to pull articles for(there are multiple boxes on the page) and it seems to be the id attached to <li> element under which the article urls are stored.
Fortunately in this case POST and GET are interchangable. Also timestamp paremeter doesn't seem to be required. So in all you can actually view the results in your browser, by right clicking the url in the inspector and selecting "copy location with parameters":
http://www.marketwatch.com/newsviewer/mktwheadlines?blogs=true&commentary=true&docId=1275261016&premium=true&pullCount=100&pulse=true&rtheadlines=true&topic=All%20Topics&topstories=true&video=true
This example has timestamp parameter removed as well as increased pullCount to 100, so simply request it, it will return 100 of article urls.
You can mess around more to reverse engineer how the website does it and what the use of every keyword, but this is a good start.
|
---
abstract: 'There are strong observational indications that the dense slow winds of cool luminous AGB stars are driven by radiative pressure on dust grains which form in the extended atmospheres resulting from pulsation-induced shocks. For carbon stars, detailed models of outflows driven by amorphous carbon grains show good agreement with observations. Some still existing discrepancies may be due to a simplified treatment of cooling in shocks, drift of the grains relative to the gas, or effects of giant convection cells or dust-induced pattern formation. For stars with C/O $<$ 1, recent models indicate that absorption by silicate dust is probably insufficient to drive their winds. A possible alternative is scattering by Fe-free silicate grains with radii of a few tenths of a micron. In this scenario one should expect less circumstellar reddening for M- and S-type AGB stars than for C-stars with comparable stellar parameters and mass loss rates.'
author:
- 'Susanne H[ö]{}fner'
bibliography:
- 'hoefner.bib'
title: |
Starlight and Sandstorms:\
Mass Loss Mechanisms on the AGB
---
[*“It is a truth universally acknowledged, that an evolved cool giant star must develop a wind. However little known the parameters of such a star may be on its first entering the red giant stage, this truth is so well fixed in the minds of stellar astronomers, that it is considered as the rightful member of some one or other class of mass-losing long-period variables."*]{}
— Introduction to a fictitious manuscript entitled ‘Winds of Cool Giants: Properties and Prejudices,’ adapted from a classical text by @austen13
Introduction
============
Winds of AGB stars can be studied observationally with a variety of methods, ranging from classical spectroscopy and photometry through direct imaging to interferometric techniques. These various methods are complementary in the sense that they can provide information about stellar winds on very different spatial and temporal scales, as well as independent ways of studying a particular effect. From photometric time series we can deduce crucial information about stellar pulsation and possibly dust formation; high-resolution spectra and IR multi-wavelength interferometry allow quantitative insights into the dynamics and structure of the regions where wind formation takes place; and imaging of circumstellar envelopes on global scales holds clues to the mass loss history of individual stars and their interaction with the surrounding interstellar medium. The general picture derived from observations is that of largely spherical, but probably clumpy and time-dependent, outflows with typical velocities of 5–30 km/s and mass loss rates of about $10^{-7}$ to $10^{-5}$M$_{\odot}$/yr.
A thorough physical understanding of the mass loss phenomenon and detailed quantitative models of stellar winds are required to understand both AGB stars in their own right, and their role in the bigger picture of the cosmic matter cycle. Reliable mass loss rates, dust production rates, and consistent synthetic spectra are necessary ingredients for population synthesis, modelling the chemical evolution of galaxies, and gauging the contribution of AGB stars to the integrated light and intrinsic reddening of distant galaxies.
![Microphysics of dust-driven winds: Dust grains acquire momentum from stellar photons and transfer it to the surrounding gas via collisions.[]{data-label="f_drive"}](hoefner_fig1.pdf){width="10cm"}
Basic Scenarios and Wind Mechanisms {#s_basics}
===================================
A common feature of the most evolved cool giants is the presence of dust in their outer atmospheres and winds, often inferred from photometry (circumstellar reddening, IR excess), and sometimes more specifically from the detection of spectral features characteristic of particular species of dust grains (see, e.g., Waters, this volume). In principle, the grains could just be a by-product of the outflows, condensing from the cooling gas as it moves away from the stellar surface. It has, however, been suspected for a long time that radiative acceleration of dust is an important ingredient of the wind driving mechanism [see Fig. \[f\_drive\]; for a historical overview see, e.g., @ho04].
The formation and survival of dust particles requires temperatures below the stability limit of the respective condensate. As the temperature of a grain will be mostly determined by its interaction with the radiation field, it cannot exist closer to the star than the distance where its radiative equilibrium temperature is equal to the condensation temperature $T_c$ of the grain material. Assuming a Planckian stellar radiation field, and a power law for the grain absorption coefficient $\kappa_{\rm abs} \propto
\lambda^{-p}$ in the relevant wavelength range (i.e. around the flux maximum of the star), the condensation distance $R_c$ can be estimated by $ R_c/R_{\ast} =
0.5 \left( T_c/T_{\ast} \right)^{- (4+p)/2} $ [see, e.g., @lame99]. For amorphous carbon grains with $T_c \approx 1500\,$K and $p \approx 1$ we obtain $R_c/R_{\ast}
\approx 2-3$ which compares well with detailed models.
![Schematic picture of the dynamics of mass layers, based on a simple toy model taking only gravity and radiative acceleration into account [see @hoefner09 for details and typical numbers].[]{data-label="f_dyn"}](hoefner_fig2.pdf){width="12cm"}
At this point, the question arises how the dust-free gas can bridge the gap between the stellar photosphere and the condensation distance. Some early models, assuming a gradual transition from a nearly hydrostatic atmosphere to a steady, time-independent outflow, invoked Alfv[é]{}n waves [e.g. @hart80] or acoustic wave pressure [e.g. @pij89] to start or even drive the winds. Such mechanisms may be important for stars with parameters that exclude dust-driven winds, but for cool AGB stars with large-amplitude pulsations the combination of atmospheric levitation due to shock waves and radiative acceleration of dust grains seems to be more effective. The shock waves triggered by the pulsation periodically accelerate the upper atmospheric layers outwards, intermittently creating dense environments in their wakes. The layers follow approximately ballistic trajectories which may take them above the condensation distance if the initial velocity is high enough. There, dust condensation can occur and radiation pressure may accelerate the dust-gas mixture outwards (see Fig. \[f\_dyn\]). This scenario is supported by spectroscopic and interferometric observations of extended, dynamical molecular layers around AGB stars [see, e.g., contributions by Ireland, Wittkowski et al., Ruiz-Velasco et al., all this volume; @tlsw03a; @wein04; @sacu10].
Time-dependent wind models investigating the effects of pulsation and radiative acceleration of dust were pioneered by @w79 and @b88, using a simple parameterized description for the dust opacity, followed by studies including time-dependent grain growth for C stars [e.g. @fgs92; @hd97]. Detailed models based on the ‘pulsation-enhanced dust-driven wind scenario’ have been quite successful in reproducing typical mass loss rates and wind velocities, as well as photometry and spectra at various resolutions [e.g. @bertre98; @wljhs00; @andersen_etal03; @loidl_etal04; @nowo10 and this volume; and Eriksson et al., this volume]. While an earlier generation of models with grey radiative transfer was sufficient to explain the main characteristics of heavily dust-enshrouded C-rich AGB stars, it is necessary to combine frequency-dependent radiative transfer (including gas and dust opacities) with time-dependent hydrodynamics and non-equilibrium dust formation, in order to obtain realistic results for objects with less optically thick envelopes [e.g. @hoefner_etal03].
Ironically, it was the introduction of non-grey dynamical models which led to a crisis regarding the role of dust as a wind driver for M-type AGB stars. In contrast to C-type objects (where the excess carbon not bound in CO can condense into amorphous carbon grains which can drive outflows), the more common AGB stars with C/O $< 1$ have no abundant chemical elements which can form dust on their own sufficiently close to the stellar surface. Based on relative abundances, chemical properties, and thermodynamical conditions, it is commonly assumed that olivine- and pyroxene-type Mg–Fe silicates are the main dust species in M-type stars [e.g. @GS99; @ferra01; @gail03 Andersen, this volume; Waters, this volume]. Using detailed non-grey dynamical models, @woit06b demonstrated that silicate grains have to be virtually Fe-free at distances corresponding to the wind acceleration zone, leading to insufficient radiative pressure due to low absorption cross sections. The core of the issue can be understood using the simple estimate for the condensation distance $R_c$ given above: For silicates, $T_c \approx 1000\,$K and $p$ is strongly dependent on the Mg/Fe ratio. Considering olivine-type material, grains with about equal amounts of Fe and Mg lead to $p
\approx 2$ for the absorption coefficient of small grains and, consequently, to $R_c/R_{\ast} > 10$, whereas iron-free particles with a corresponding value of $p \approx -1$ can form at typically $R_c/R_{\ast} \approx 2-3$ (see Fig. \[f\_rc\]; comparable numbers hold for pyroxene-type particles).
According to models by @hoefner08a this problem can be resolved if conditions in the extended atmosphere allow Fe-free silicate grains to grow to sizes $> 0.1~\mu$m because scattering will contribute significantly to the radiative pressure for grains with radii comparable to wavelengths near the stellar flux maximum. Various observational tests of this scenario are currently being performed as described in the following section. In this context, it should be noted that the recent C-star wind model grid by @matt10 indicates that the amorphous carbon grains forming in these stars may also be bigger than previously assumed. In this case, scattering on grains may contribute to the radiative pressure, possibly affecting winds close to the thresholds for dust-driven mass loss (see Mattsson & H[ö]{}fner, this volume). For typical winds of C stars, however, grain size will not be a decisive factor, as even small amorphous carbon particles are efficient absorbers and can easily drive outflows.
![Condensation distance $R_c$ (in units of the stellar radius $R_{\ast}$) as a function of the power law index of the absorption coefficient $p$ for a range of condensation temperatures $T_c$ (assuming a stellar temperature of $T_{\ast} = 3000\,$K; see text for details). []{data-label="f_rc"}](hoefner_fig3.pdf){width="12cm"}
A Closer Look: Differences between M- and C-type AGB Stars
==========================================================
From the early days of stellar spectroscopy, cool giants could be sorted into two major groups, according to the relative abundances of C and O in their atmospheres and the resulting distinct differences in molecular chemistry.[^1] With the advent of space-based IR surveys, however, it became evident that this chemical difference even leads to profound effects in the circumstellar envelopes. Using photometry (e.g. the classical IRAS 2-colour diagram), AGB stars can be sorted both according to current mass loss rates and mass loss history (detached shells), as well as by the C/O ratio. C-type AGB stars tend to show much more pronounced circumstellar reddening at visual and NIR wavelengths than M-type objects with comparable stellar parameters. In view of the clear spectroscopic and photometric distinctions between M- and C-type objects, it is interesting to note that the average wind properties of M-, S-, and C-type AGB stars are very similar [e.g. @ramstedt].
For cool luminous carbon stars there is strong evidence that their winds are driven by radiation pressure on amorphous carbon grains. Models based on the pulsation-enhanced dust-driven wind scenario (discussed in the previous section) have been tested against a range of observations and are now used for the interpretation of observational data of individual stars, and applied to stellar evolution [e.g. @kps03].
For M-type AGB stars, in the light of the detailed models by @woit06b it seems unlikely that winds can be driven by radiative pressure on Fe-bearing silicate grains, in contrast to previous assumptions. As discussed in Sect. \[s\_basics\], the inclusion of Fe in olivine- and pyroxene-type particles[^2] leads to high grain temperatures and, consequently, condensation distances well beyond the wind acceleration zone (see Fig. \[f\_rc\]). Fe-free olivine- and pyroxene-type grains which can form sufficiently close to the stellar photosphere, on the other hand, have low absorption cross sections in the critical wavelength range near the stellar flux maximum (around $1\,{\mu}$m) which are insufficient for driving an outflow.
A possible solution of this problem is scattering: If conditions in the extended atmospheres allow such grains to grow into the size range of about $0.1 - 1\,\mu$m, scattering becomes dominant over absorption by several orders of magnitude, opening up the possibility of stellar winds driven by scattering on Fe-free grains. Detailed frequency-dependent dynamical models by @hoefner08a show that forsterite grains may well reach this critical size range, leading to outflows with combinations of mass loss rates and wind velocities that compare well with observations [see Fig. 5 in @hoefner09]. First tests of synthetic spectra and photometric colours resulting from these models show good agreement with observations (see Fig.1 in Bladh et al., this volume), and an ongoing study of self-consistent M-type wind models with parameterized dust opacities should allow us to draw further conclusions about what relative levels of true absorption and scattering by dust are compatible with observed SEDs (Bladh et al., in prep.). Furthermore, new spectro-interferometric data probing the outer atmosphere and inner wind region of RT Vir shows a clear transition from a purely molecular to a dusty regime which may give us direct indications of condensation distances and grain types (see Olofsson et al., this volume).
If scattering on Fe-free silicate grains turns out to be a major driving mechanism in dusty M-type (and maybe S-type) AGB stars, the levels of true absorption by dust (and, consequently, circumstellar reddening), as well as the dynamical response to dust formation (the resulting acceleration) may be quite different from that in C-type AGB stars with similar stellar parameters. These effects might be related to, for example, recently discovered qualitative differences in the phase-to-phase and cycle-to-cycle variations (or lack thereof) in IR interferometric data (see Karovicova et al., and Ohnaka, this volume).
Open Questions, Conclusions and Outlook
=======================================
Current dust-driven wind models focus on the chemical composition and optical properties of dust grains while often using the simplifying assumptions of complete momentum coupling and position coupling for the all-important interaction of dust and gas. In reality, the grains will move faster than the gas, and this drift can affect grain growth and wind dynamics [e.g. @cssh3], as well as the large-scale structure of the CSE [@sid01]. Another physical feature of present models which may need further investigation is strong radiative cooling behind shocks due to high molecular opacities, corresponding to chemical equilibrium and LTE conditions. Less efficient cooling could open the possibility of ‘pulsation-driven dust-enhanced winds’ as discussed by @will00. Furthermore, considering the crucial role of atmospheric dynamics for the wind mechanism, both self-excited pulsation models (e.g. Wood & Arnett, this volume), and a detailed analysis of time-dependent phenomena in atmospheres and winds (e.g.Dreyer et al., this volume) should be high on the agenda of modellers.
The ‘pulsation-enhanced dust-driven wind scenario’, discussed in some detail in this review, seems to be the most promising explanation for the high mass loss rates of the most evolved cool, luminous AGB stars, but there are natural limits for this mechanism. High stellar temperatures lead to large condensation distances, and low luminosity-to-mass ratios may require more radiative acceleration than can be provided by grain radiative cross sections. For low metallicities, the availability of condensable material may be another issue. Here, again, significant differences between C- and M-type stars should exist, since carbon stars produce the main dust-forming element by nucleosynthesis, whereas M-type objects basically have to rely on the supply of potentially dust-forming elements with which they started out. Therefore, mass loss should show a much stronger dependence on metallicity for M-type AGB stars than for their C-rich counterparts which seems to fit with observed trends (e.g. Lagadec et al., Sloan et al., this volume).
Focusing on the microphysics of the driving mechanism, it is easy to overlook that observations show evidence of deviations from homogeneous, spherically symmetric outflows at various scales, e.g. clumpy structures, large-scale asymmetries of the CSE, and structures possibly due to focusing of wind material by close binaries (Kim & Taam, Mohamed & Podsiadlowski, this volume). Whether any of these phenomena are directly related to or give constraints on the mass loss mechanisms is unclear at present. 3D ‘star-in-a-box’ models of stellar convection and its effects on dust formation [@frey08] or studies of dust-induced pattern formation in CSEs [@woit06a] are few and far between due to the considerable numerical effort involved and various technical difficulties.
Last but not least it should be mentioned that indications of stellar winds are seen for AGB stars falling outside the parameter region where present models predict dust-driven mass loss [e.g. @wach08; @matt10], challenging our current understanding of mass loss mechanisms. Where both dust and shock waves fail as wind drivers, magnetic fields and Alfv[é]{}n waves might play a role in accelerating the observed outflows [see, e.g., @hart80; @aira10; @vlemm10].
Having started this review with a fictitious quotation, it may be appropriate to end it with a real one. @prat93 claims that “Of all the forces in the universe, the hardest to overcome is the force of habit. Gravity is easy-peasy by comparison." Translating this to the present context, we may conclude that AGB stars clearly manage to drive winds, but gaining a comprehensive, quantitative understanding of the relevant mechanisms may require thinking outside the current computational box.
[^1]: This dichotomy is caused by the high bond energy of CO which leads to an almost complete blocking of the less abundant of the two elements in CO. In C-type objects (C/O $>$ 1) the excess carbon can form C-bearing molecules and amorphous carbon grains, while M-type stars (C/O $<$ 1) feature O-bearing species in their molecular chemistry and dust.
[^2]: The presence of such dust particles can be inferred both from observations of dust features in the IR (e.g. Waters, this volume), and from gas kinetic arguments [e.g. @gail03]. Notably, under chemical equilibrium conditions the Mg-rich end members of the olivine and pyroxene sequences should be dominant.
|
The best of both worlds of big government merged on Thursday: The Transportation Security Administration agreed to allow the American Federation of Government Employees to unionize its workforce.
In a press release, AFGE announced that the labor contract it agreed to with TSA on Thursday is the first-ever with TSA employees.
“For 10 long years AFGE has fought hard so that Transportation Security Officers would have collective bargaining rights,” AFGE National President John Gage said in a statement. “We have often looked back and wondered why it was taking so long. Today we begin to look forward.”
“This collective bargaining agreement will better the working lives of 45,000 hard-working, dedicated employees, and that’s a fantastic feeling,” AFGE TSA Council 100 President Kim Kraynak-Lambert added.
“TSOs come to work every day in the face of intense public and congressional scrutiny and, to the best of their ability, protect this nation from terrorist attacks,” she said. “Now we can look forward to new rights and new working conditions, and a chance to form a true labor-management partnership. And, contrary to some of the misinformation circulating about TSA, an agreement will not adversely affect security – security related matters were strictly excluded from negotiations. In fact, this agreement will strengthen our ability to carry out TSA’s vital mission of protecting the American people.”
Follow Matthew on Twitter |
So you like cheese? Me too. That’s why when I heard about a cheese restaurant that had recently opened up I HAD to go. The icing on the cake? It’s called Homage2Fromage. If that’s not the best name for a cheesy paradise I don’t know what is. It’s very pleasing to say out loud. Go on, try it. CONTINUE READING
While we were in Amsterdam, we did a lot of eating. I had one destination in mind after seeing them on Instagram, and that was Sir Hummus. Adam had one destination in mind after our last trip when he claimed he had the best burger ever, and that was Dante. So I figured I’d tell you our favourite three places we ate at, and would definitely return to.
Betty’s is one of those iconic English places that everyone in Yorkshire and further afield knows about. Famous for its delicious cakes, sweets and tea blends, and super pretty tea rooms. It’s one of those places that I’ve always wanted to go for afternoon tea, and last Saturday I got my wish.
I’m a sucker for pretty cookbooks. Fact. We have more cookbooks than recipes we’ve cooked from them for sure. I like baking, but I’ll be honest and say that I’m not a very good measurer and tend to just guestimate things. I’ve found this doesn’t yield the best results with baking, it’s a science.CONTINUE READING
Afternoon tea is quickly becoming my most favourite thing ever. If it’s themed, then you’ve already won me over. Sunday, along with 27 other bloggers, I got to preview the Conrad St. James hotel’s (formerly the Intercontinental Westminser) Christmas afternoon tea. This was possibly the cutest assortment of food I’ve ever seen, not to mention super tasty.CONTINUE READING |
The invention relates to the use of polymers to which groups of the formula I are bonded,
where
R is H or identical or different organic radicals, which may also be bonded to one another, and
G is O or NH,
in cosmetics and as hair-setting polymers.
Frequently, polymers are used in hair cosmetic formulations. Requirements which are placed on hair cosmetic compositions are described, inter alia, in B. Hoffbauer, R. Brott, Aerosol and Spray Report 36 (10), 9-15 (1997) and in Dale H. Johnson (editor), xe2x80x9cHair and Hair Carexe2x80x9d, Marcel Dekker Inc., New York 1997, p. 105-165.
Because of the continually increasing requirement for more environmentally friendly products, the content of volatile organic compounds (VOC) in cosmetic preparations, such as hairsprays, hair gels or setting foams, should be kept as low as possible or be reduced. However, the use of conventional polymers presents difficulties since, as the water content of hairspray formulations rises, their viscosity increases, and it is no longer possible to ensure uniform application of the polymer on the hair. Subsequent filming leads to unsatisfactory results in terms of shine, feel and adhesion. Attempts have been made to solve this problem by using polymers based on polyamides (DE 44 28 003) or polyesters and polyester amides (U.S. Pat. No. 5,158,762). However, these polymers have disadvantages as regards wash-off with water or have insufficient solubility in standard commercial propellant/solvent mixtures.
DE 39 02 067 describes the use of aqueous polymer dispersions which comprise polymers in which a ureido methacrylate is also used as monomer unit for the impregnation of polyester fabrics. The advantage which is given is the reduction in formaldehyde liberatiion. The use of ureido methacrylate as copolymer improves the adhesion of the polymer to the fiber.
DE 39 02 555 describes the use of aqueous plastic dispersions which consist of polymers in which a ureido methacrylate is also used as monomer unit, for coating plastic surfaces. The advantage given is the improved adhesion on surfaces of hard PVC, polycarbonate, ABS, polystyrene and PPO.
AU 8425444 describes ureido methacrylate-containing vinyl acetate copolymers which can be used as binders for nonwoven textile fabrics. The use of ureido methacrylate as copolymer improves the adhesion of the polymer to the fiber.
WO 97/45468 reports on acetacetoxy-modified polymers having a surfactant action. These are particularly suitable as coating materials. Their use in shampoos is also mentioned. Said polymers can, in addition to acetacetoxy groups, also contain inter alia ureido methacrylate.
It is an object of the present invention to vary the composition of polymers which are customarily used, or in principle could be used, in hair cosmetic applications in such a way that their processing or application properties and their use properties improve at the same time, without certain properties such as surface activity inevitably arising. This should be the case in particular as regards setting, wash-off and viscosity during and after application. Other properties which are to be optimized become evident from the particular application. For example, for use in hairsprays, the following properties are of specific interest: viscosity, film formation, setting action, freedom from stickiness (even at high atmospheric humidity), ability to be combed out, wash-off, feel, shine, adhesion, antistatic action and solubility in water, alcohol, dimethyl ether, propane and butane and in mixtures thereof. These properties of hair-setting polymers and the characterization of polymers with regard to these properties are known to the person skilled in the art. In addition, the manufacturing costs and the activity per amount of polymer used are important. |
Related Articles
Two of the favourites for relegation meet at the DW Stadium, desperate to get their season off on a positive footing.
Having narrowly avoided the drop last term, Roberto Martinez handed Wigan a major boost by rejecting the advances of Aston Villa to remain at the DW Stadium.
However, the Spaniard has had to deal with the departure of midfielder Charles N'Zogbia to Aston Villa in a £7.5 million deal, while James McCarthy has been attracting a host of admirers following an assured debut season in the Premier League. The Scot is doubtful for this match, though, after sustaining an ankle injury in pre-season against Villarreal.
Martinez has been able to complete the permanent signing of Ali Al Habsi from Bolton, after some superb displays on loan last term, and has also captured midfielder David Jones on a free transfer.
Norwich, who are back in the top flight after two successive promotions, have signed smartly this summer, bringing in Everton's James Vaughan, Milwall's Steve Morison and Manchester United defender Ritchie De Laet. However, Vaughan will miss this opening match as he is struggling with a knee injury.
Andrew Crofts (ankle) and full-back Russell Martin (calf) will be fit. Striker James Vaughan, signed from Everton, and centre-back Elliott Ward are sidelined after picking up minor knee injuries during pre-season training in Germany.
Anthony Pilkington could be included in the squad as the former Huddersfield winger continues his rehabilitation from a serious ankle injury.
Wigan, meanwhile look set to be without midfielder James McCarthy. The Republic of Ireland international twisted his ankle in last week's pre-season friendly against Villarreal and he has been given only a 10 per cent chance of being involved.
Striker Hugo Rodallega is available after returning late to pre-season training following his involvement with Colombia in the Copa America but defender Antolin Alcaraz, who reached the final with Paraguay, will be given more time to regain full fitness.
Last season: N/A
Betting tip: Wigan were blown away by Blackpool on the opening day last season, and with Norwich riding the crest of a wave, odds of 4-1 on the visitors looks tempting. |
Introduction
============
Mesenchymal stem cells (MSCs) are adult stem cells with the ability to differentiate into mesenchymal tissue cells while retaining self-renewal and migration abilities ([@b1-mmr-15-06-4069]). Many recent studies have revealed that MSCs possess immunomodulatory functions that they exert through cell-to-cell contacts, as well as by secreting growth factors, cytokines, and chemokines ([@b2-mmr-15-06-4069],[@b3-mmr-15-06-4069]). The effect of immunosuppression with MSCs has been reported in graft-versus-host disease ([@b4-mmr-15-06-4069]) and multiple system atrophy ([@b5-mmr-15-06-4069]). MSCs have the ability to migrate to damaged tissue by inducing peripheral tolerance by inhibiting the release of pro-inflammatory cytokines ([@b2-mmr-15-06-4069]). The advantages of MSC-based cell therapy have been demonstrated in acute lung injury ([@b6-mmr-15-06-4069]), myocardial infarction ([@b7-mmr-15-06-4069]), acute renal failure ([@b8-mmr-15-06-4069]), cerebral ischemia ([@b9-mmr-15-06-4069]) and Alzheimer\'s disease ([@b10-mmr-15-06-4069]). At the cellular level, it has been shown that MSCs can directly inhibit both T lymphocyte and microglial cell proliferation and can negatively modulate the cytokine-secretion profile of dendritic cells and monocytes/macrophages ([@b11-mmr-15-06-4069]--[@b14-mmr-15-06-4069]).
In our recent study, we identified the scrapie responsive gene 1 (SCRG1) secreted from MSCs and its receptor complex bone marrow stromal cell antigen 1 (BST1)/β1 integrin, as positive regulators of stem cell qualities ([@b15-mmr-15-06-4069]). SCRG1, which was identified by Dron *et al* as a protein that increased expression in the brain of scrapie infected mice, was shown to be associated with neurodegenerative changes in transmissible spongiform encephalopathy, as well as in brain injury, and is associated with autophagy ([@b16-mmr-15-06-4069]--[@b18-mmr-15-06-4069]). The SCRG1 gene encodes a 98-amino acid, cytokine-like peptide with an N-terminal signal peptide ([@b19-mmr-15-06-4069],[@b20-mmr-15-06-4069]). Intriguingly, in stem cells SCRG1 was shown to maintain octamer-binding transcription factor 4 (Oct-4) and CD271/low-affinity nerve growth factor receptor (LNGFR) expression and thereby maintain the MSC\'s potential for self-renewal, migration abilities, as well as osteogenic differentiation potential, even at high stem cell passage numbers ([@b15-mmr-15-06-4069]). Other cytokines and chemokines secreted from MSCs have been implicated in immunosuppression and repair of damaged tissues ([@b21-mmr-15-06-4069]--[@b24-mmr-15-06-4069]). MSC differentiation along different pathways is regulated by stimulation with various growth factors, cytokines, or chemokines, as has been demonstrated in the differentiation of bone marrow-derived MSCs ([@b25-mmr-15-06-4069],[@b26-mmr-15-06-4069]).
SCRG1 secreted from MSCs is predicted to affect a variety of cell types *in vivo*. In this study, we hypothesized that SCRG1 secreted into the extracellular space by MSCs exhibits paracrine activity. To explore this possibility, we examined the paracrine effect of MSC-derived SCRG1 on the immune response of Raw264.7 macrophages. In particular, as a readout of macrophage function, we focused on macrophage production of CC-chemokine ligand 22 \[CCL22; also known as MDC (macrophage-derived chemokine)\], which is known to display chemotactic activity for monocytes, dendritic cells, natural killer cells, and chronically activated T lymphocytes ([@b27-mmr-15-06-4069]--[@b30-mmr-15-06-4069]).
Materials and methods
=====================
### Reagents
Recombinant mouse SCRG1 (rmSCRG1), expressed in yeast, was purchased from MyBiosource, Inc. (MBS1177239, San Diego, CA, USA). The MAPK/ERK kinase inhibitor U0126 was purchased from Calbiochem (Merck Millipore, Darmstadt, Germany). Lipopolysaccharide (LPS) derived from *Escherichia coli* 0111:B4 was purchased from Sigma-Aldrich (St. Louis, MO, USA).
### Cell culture
Mouse macrophage-like Raw264.7 cells (American Type Culture Collection, Manassas, VA, USA) were maintained in minimum essential medium Eagle\'s α-modification (αMEM) (Sigma-Aldrich) supplemented with 10% fetal bovine serum (FBS) (HyClone, GE Healthcare Life Sciences, Logan, UT, USA) under the condition of 5% CO~2~ at 37°C.
### Proliferation assay
Cell proliferation was analyzed by WST-1 assay reagent (Roche Diagnostics, Basel, Switzerland) according to the manufacturer\'s instructions. Raw264.7 cells were cultured on 96-well plates (Nunc; Thermo Fisher Scientific, Waltham, MA, USA) in 100 µl complete medium containing with or without 100 ng/ml rmSCRG1. After five days, the cells were added with 10 µl WST-1 reagent and incubated for 1 h. The absorbance was measured using an MPR-A4i microplate reader (Tosoh Corp., Tokyo, Japan) at 450 nm.
### Migration assay
The migration assay was performed using 8-µm pore sized Transwell cell culture inserts (BD Biosciences, Franklin Lakes, NJ, USA). Raw264.7 cells (1.0×10^5^) were seeded on the upper well in 350 µl serum-free αMEM containing 0.1% BSA (Sigma-Aldrich). The lower well was filled in 600 µl complete medium containing with or without 100 ng/ml rmSCRG1. After incubation for 6 h, cells that had not migrated were scraped off with a cotton swab. The number of cells migrated to the lower side of the filter was stained with Diff-Quik Three-Step Stain Set (Sysmex, Kobe, Japan), and then counted using a microscope (Olympus IX70; Olympus Corp., Tokyo, Japan) under five high-power fields (x400 magnification).
### Adhesion assay
Raw264.7 cells (1.0×10^5^) were seeded onto a fibronectin-coated culture dish (BD Biosciences) and cultured in complete medium with or without 100 ng/ml rmSCRG1. After 6 h, non-adhered cells on the bottom of the dish were removed by washing twice with phosphate-buffered saline (PBS). The number of cells adhered to the culture dish were measured by the WST-1 assay described above. The absorbance of the dye in the culture directly correlates with the number of live cells.
### Reverse transcription-quantitative polymerase chain reaction (RT-qPCR)
Raw264.7 cells were either left unstimulated or stimulated with 10 ng/ml LPS, 100 ng/ml rmSCRG1, or 10 ng/ml LPS plus 100 ng/ml rmSCRG1 in the absence and presence of 1 mM U0126, for 6 h. Total RNA extraction, cDNA synthesis, RT-qPCR were performed with methods of our previous study ([@b15-mmr-15-06-4069]). Expression of *Ccl22* was normalized to glyceraldehyde-3-phosphate dehydrogenase (*Gapdh*). The following primer pairs were used; *Ccl22* (sense, 5′-GGCACCTATCCAGTGCCACA-3′ and antisense, 5′-TGGTGGACCAGCCTGAAACTC\') and *Gapdh* (sense, 5′-TGTGTCCGTCGTGGATCTGA-3′ and antisense, 5′-TTGCTGTTGAAGTCGCAGGAG-3′). Relative expression levels were calculated by the 2^−ΔΔCq^ method ([@b31-mmr-15-06-4069]) as a fold-increase or -decrease.
### Primer array
Raw264.7 cells were stimulated with 10 ng/ml LPS, 100 ng/ml rmSCRG1, or 10 ng/ml LPS plus 100 ng/ml rmSCRG1 for 6 h. Unstimulated cells were used as a control. Gene expression levels of a range of cytokines and chemokines were measured using a PrimerArray consisting of mouse cytokines and cytokine receptors (PN001, Takara Bio) and PrimerArray Analysis Tool version 2.0 (Takara Bio) according to the manufacturer\'s instructions. Genes whose expression levels increased more than 100-fold following LPS stimulation and less than 100-fold following SCRG1 treatment were identified.
### Western blotting
Raw264.7 cells were serum-starved overnight and stimulated with 100 ng/ml rmSCRG1 for various period time. Western blotting was performed in our previously reported procedure ([@b15-mmr-15-06-4069]). The following primary antibodies that has been purchased from Cell Signaling Technology (Danvers, MA, USA) were used; anti-p44/42 mitogen-activated protein kinase (ERK1/2), anti-phospho-ERK1/2, anti-c-Jun N-terminal kinase (JNK), anti-phospho-JNK, anti-p38, anti-phospho-p38, anti-Akt, anti-phospho-Akt, anti-focal adhesion kinase (FAK), anti-phospho-FAK. β-actin level measured were detected with an anti-β-actin antibody (Santa Cruz Biotechnology, Dallas, TX, USA) as a loading control. The densitometry of the band measured by ImageJ version 1.44 software was expressed as the ratio of phosphorylation to the total molecule.
### Enzyme-linked immunosorbent assay (ELISA)
Raw264.7 cells were left unstimulated or were stimulated with 10 ng/ml LPS, 100 ng/ml rmSCRG1, or 10 ng/ml LPS plus 100 ng/ml rmSCRG1 for 48 h. The amount of secreted CCL22 in the culture medium was measured using a sandwich ELISA kit for mouse CCL22 (R&D Systems, Inc., Minneapolis, MN, USA). CCL22 levels were quantified according to the manufacturer\'s instructions.
### Flow cytometry
A total of 1×10^5^ Raw264.7 cells suspended in PBS containing 2 mM EDTA and 0.5% FBS were incubated with either a phycoerythrin (PE)-conjugated anti-mouse BST1/CD157 (1:10), anti-mouse β1 integrin/CD29 (1:10), or anti-mouse β2 integrin/CD18 (1:10) (all from BioLegend, Inc., San Diego, CA, USA) antibody for 1 h at 4°C. Data acquisition and analysis was performed using a flow cytometer EPICS XL (Beckman Coulter, Brea, CA, USA).
### Statistical analysis
All experiments were performed in triplicate. Numerical data were presented as the mean ± standard deviation (SD), and significant differences were analyzed by Student\'s *t*-test. P\<0.05 were considered statistically significant.
Results
=======
### Raw264.7 cells express BST1, and β1 and β2 integrins as an SCRG1 receptor complex
Our recent study revealed that SCRG1 secreted from MSCs forms a complex with the membrane proteins BST1 and β1 integrin, which acts as a receptor for its autocrine/paracrine activity ([@b15-mmr-15-06-4069]). Further evidence for this novel receptor was provided by Lavagno *et al*, which showed BST1 also interacts with β1 and β2 integrins at the neutrophil cell surface ([@b32-mmr-15-06-4069]). Based on these data, we investigated the expression of BST1, β1 integrin, and β2 integrin in mouse macrophage-like Raw264.7 cells by flow cytometry. As shown in [Fig. 1](#f1-mmr-15-06-4069){ref-type="fig"}, Raw264.7 cells co-expressed BST1, β1 integrin, and β2 integrin on the cell surface. These results indicate that Raw264.7 cells express the SCRG1 receptor complex.
### SCRG1 does not affect the statuses of cell proliferation, migration, and adhesion of Raw264.7 cells
In MSCs, SCRG1 promotes cell migration through the β1 integrin/focal adhesion kinase (FAK) -dependent phosphoinositide 3-kinase (PI3K)/Akt pathway ([@b15-mmr-15-06-4069]). Here, to understand the biological processes controlled by SCRG1 in macrophages, the effects of SCRG1 on cell proliferation, migration, as well as adhesion activity were investigated. As shown in [Fig. 2](#f2-mmr-15-06-4069){ref-type="fig"}, rmSCRG1 did not affect proliferative, migratory, or adhesive activities in Raw264.7 cells. Thus, these results indicate that the bioactivity of SCRG1 in monocyte/macrophage lineage cells is different from that in MSCs.
### SCRG1 enhances the phosphorylation of ERK1/2 in Raw264.7 cells
The MAPK pathway, in conjunction with the nuclear factor-κB (NF-κB) pathway, is closely associated with the macrophage immune response ([@b33-mmr-15-06-4069],[@b34-mmr-15-06-4069]). Accordingly, the intracellular signaling pathways induced by SCRG1 in Raw264.7 cells were investigated. Treatment of cell for 30 min with rmSCRG1 significantly enhanced the phosphorylation of ERK1/2 ([Fig. 3](#f3-mmr-15-06-4069){ref-type="fig"}). In contrast, phosphorylation of FAK, Akt, SAPK/Jun amino-terminal kinase (JNK), or p38 MAPK by rmSCRG1 treatment in Raw264.7 cells was not observed (data not shown). These results indicate that SCRG1 specifically induces the activation of the ERK1/2 pathway.
### SCRG1 suppresses LPS-induced CCL22 production through the activation of ERK1/2 in Raw264.7 cells
By primer array analysis, we next investigated the effects of SCRG1 on the expression of LPS-induced chemokines and cytokines in Raw264.7 cells. As shown in [Table I](#tI-mmr-15-06-4069){ref-type="table"}, rmSCRG1 suppresses the LPS-induced production of five chemokines and one cytokine in these cells. In particular, LPS-induced *Ccl22* expression was reduced to less than half by rmSCRG1 treatment. Following on from this, we examined the association between suppression of CCL22 expression and ERK activation by rmSCRG1 in Raw264.7 cells. Both the LPS-induced increases in CCL22 mRNA expression, and protein secretion were significantly suppressed by rmSCRG1 treatment in Raw264.7 cells ([Fig. 4](#f4-mmr-15-06-4069){ref-type="fig"}). In addition, this suppressive effect of rmSCRG1 was completely abolished by treatment with the MAPK/ERK kinase inhibitor, U0126. These results indicate that LPS-induced CCL22 production in macrophages was suppressed by treatment with SCRG1 through the activation of an ERK1/2-mediated signal.
Discussion
==========
Several roles of SCRG1 suggested in this study and our previous studies are shown in [Fig. 5](#f5-mmr-15-06-4069){ref-type="fig"}. Recently, we identified a novel ligand-receptor combination, SCRG1/BST1, that maintains expressions of the stem cell markers Oct-4 and CD271/LNGFR in MSC, as well as self-renewal, migration, and osteogenic differentiation potential during *ex vivo* expansion ([@b15-mmr-15-06-4069]). Here, we investigated the expression of the SCRG1 receptor components, BST1, β1 integrin, and β2 integrin in mouse macrophage-like Raw264.7 cells. In addition to BST1, these cells also expressed β1 and β2 integrins ([Fig. 1](#f1-mmr-15-06-4069){ref-type="fig"}). BST1 is an ectoenzyme with a glycosyl phosphatidylinositol anchor and a NADase/ADP-ribosyl cyclase activity that belongs to the CD38 family ([@b35-mmr-15-06-4069],[@b36-mmr-15-06-4069]). It has been found on the cell surface of stromal ([@b37-mmr-15-06-4069]) and bone marrow-derived cells ([@b38-mmr-15-06-4069]), and it facilitates pre-B-cell growth and induces cell migration ([@b39-mmr-15-06-4069]). Under the condition of a complex of BST1 with either β1 integrin or β2 integrin, BST1 has been shown to promote the phosphorylation of FAK through the use of an agonistic monoclonal antibody ([@b32-mmr-15-06-4069],[@b40-mmr-15-06-4069],[@b41-mmr-15-06-4069]). Furthermore, it has also been reported that BST-1 regulates the adhesion and migration of leukocytes via phosphorylation of Akt and MAPKs ([@b42-mmr-15-06-4069],[@b43-mmr-15-06-4069]). In this study, we also observed that SCRG1 enhanced the phosphorylation of ERK1/2 in Raw264.7 cells ([Fig. 3](#f3-mmr-15-06-4069){ref-type="fig"}).
Notably, SCRG1 did not enhance cell proliferation, migration, or adhesion of Raw264.7 cells ([Fig. 2](#f2-mmr-15-06-4069){ref-type="fig"}), indicating a different biological function in these cells. In support of this, we demonstrated that SCRG1 suppresses LPS-induced CCL22 production in these mouse macrophage-like Raw264.7 cells in a MAPK/ERK-dependent manner ([Table I](#tI-mmr-15-06-4069){ref-type="table"}, [Fig. 4](#f4-mmr-15-06-4069){ref-type="fig"}). LPS and other microbial products are recognized by the host\'s toll-like receptors (TLRs) family members ([@b44-mmr-15-06-4069]). LPS interacts with a heterologous receptor involving TLR4 ([@b45-mmr-15-06-4069],[@b46-mmr-15-06-4069]), CD14 ([@b47-mmr-15-06-4069],[@b48-mmr-15-06-4069]) and MD2 ([@b49-mmr-15-06-4069]--[@b51-mmr-15-06-4069]). By LPS binds to the TLR4, two major signaling pathways via the adapter molecules TIR-domain-containing adaptor inducing IFN-β (TRIF) or myeloid differentiation factor 88 (MyD88) are activated ([@b45-mmr-15-06-4069],[@b52-mmr-15-06-4069]--[@b55-mmr-15-06-4069]). Significantly, both the Myd88 and TRIF pathways result in activation of the transcription factor, NF-κB, a central regulator of the LPS response, which induces cytokine and chemokine production as well as stress responses in many cell types, including macrophages ([@b53-mmr-15-06-4069],[@b54-mmr-15-06-4069]). NF-κB is involved in regulating the expression of multiple genes involved in inflammatory and immune responses ([@b56-mmr-15-06-4069]). Innate and adaptive immune response are mainly regulated by MAPKs, including ERK, JNK, and p38 MAPK, in addition to the NF-κB pathway. In macrophages, activation of the MEK/ERK pathway by bacterial infection regulates various inflammatory responses ([@b57-mmr-15-06-4069]--[@b61-mmr-15-06-4069]). The MEK/ERK pathway is one of the most studied intracellular signaling pathways in monocyte-derived macrophages activated by LPS-induced pro-inflammatory responses ([@b62-mmr-15-06-4069]--[@b64-mmr-15-06-4069]). In addition, findings have been previously reported that NF-κB-dependent gene expression is controlled by the activation of ERK1/2 without affecting DNA binding ([@b65-mmr-15-06-4069]--[@b69-mmr-15-06-4069]). Therefore, our results indicate that the SCRG1-induced ERK1/2 signaling pathway controls NF-κB-dependent chemokine CCL22 expression.
CCL22, a member of the CC chemokine families, is mainly produced by monocyte-derived macrophages, mast cells, and inflammatory dendritic cells upon stimulation with microbial products ([@b70-mmr-15-06-4069],[@b71-mmr-15-06-4069]). CCL22 binds to its receptor CCR4 plays an important homeostatic role in leukocyte trafficking, activation of innate immune cells, Th2 immunopathology, as well as accumulation of regulatory T (Treg) cells in solid tumor ([@b72-mmr-15-06-4069]--[@b74-mmr-15-06-4069]). CCL 22 also plays a role in recruiting Treg cells into synovial fluid in inflammatory diseases like rheumatoid arthritis ([@b75-mmr-15-06-4069]). CCL22 plays an important role in a variety of other diseases, including allergic rhinitis ([@b76-mmr-15-06-4069]), atopic dermatitis ([@b77-mmr-15-06-4069]), and lymphoma ([@b78-mmr-15-06-4069]). Recent studies suggested that CCL22 can be used as a biomarker for autoimmune diseases ([@b79-mmr-15-06-4069]). On the other hand, the role of CCL 22 in regulation of immune homeostasis is unclear ([@b80-mmr-15-06-4069],[@b81-mmr-15-06-4069]).
In conclusion, here we clearly demonstrate that SCRG1, which *in vivo* could be derived from MSCs, suppresses LPS-induced chemokine CCL22 production in Raw264.7 macrophages. The mechanism appears to involve the MAPK ERK1/2 pathway, since SCRG1 induced the phosphorylation of ERK1/2 and a MAPK/ERK kinase inhibitor U0126 ablated the suppressive effect of SCRG1 on LPS-induced chemokine CCL22 production. These results suggest a model whereby MSCs play their immunosuppressive role by secreting SCRG1, which then suppresses microbial products-induced chemokine expression in monocyte/macrophage lineage cells in a paracrine fashion. We have additionally established fluorescently tagged immortalized MSC lines derived from different tissues of GFP- and tdTomato-transgenic mice ([@b25-mmr-15-06-4069],[@b82-mmr-15-06-4069]). These cell lines can be used for *in vivo* imaging analyses on proliferation and differentiation of MSCs, as well as *in vivo* imaging studies to test cell therapies and regenerative medicine techniques, providing insight into diseases such as bone and immune disorders, fibrosis, and cancer progression or metastasis. Our findings provide new insights into the molecular mechanisms of MSCs, as well as a novel perspective for understanding the immune regulatory mechanisms of MSCs.
The present study was supported in part by the JSPS KAKENHI grant nos. JP25463053 and JP16K11654 awarded to N.C., JP26893249 and JP16K20652 awarded to E.K. and JP26670852 and JP16H05534 awarded to A.I.; and a grant from the Keiryokai Research Foundation grant no. 120 awarded to N.C., 2013.
{#f1-mmr-15-06-4069}
{#f2-mmr-15-06-4069}
{#f3-mmr-15-06-4069}
{#f4-mmr-15-06-4069}
{#f5-mmr-15-06-4069}
######
Genes whose expression increased more than 100-fold after LPS treatment and less than 100-fold by SCRG1 treatment alone relative to unstimulated Raw264.7 cells.
Fold change relative to unstimulated Raw 264.7 cells
---------- ------------------------------------------------------ -------- -------- ---------
*Ccl22* Chemokine (C-C motif) ligand 22 4420.5 1520.1 96.335
*Ccl8* Chemokine (C-C motif) ligand 8 2856.4 1770.5 0.84089
*Cxcl11* Chemokine (C-X-C motif) ligand 11 1746.1 843.35 89.884
*Ccl12* Chemokine (C-C motif) ligand 12 929.29 749.61 70.521
*Csf1* Colony stimulating factor 1 206.50 125.36 17.876
*Cx3cl1* Chemokine (C-X3-C motif) ligand 1 154.34 115.36 1.3755
LPS, lipopolysaccharide.
|
As Kumo Cycles’ Keith Marshall was building this ‘Raddoneur’, Land Rover was building the last Defender and Keith, being a self-confessed ‘tragic Defender owner’ himself, painted it in the same Kesswick Green.
Keith was supposed to take it to this years’ Bespoked Bristol show, but fate had different plans. He’s a natural DIYer, tinkerer and handyman, so God knows what he was doing up on a roof, but he fell off it and fractured his spine.
Bespoked was supposed to be the first international show that Kumo Cycles was to represent Australia at, but after six painful weeks, he was able to pick up the torch and finished the Raddoneur as a therapeutic remedy to build his back strength up.
Kumo Cycles is based in Canberra, the capital city of Australia. It’s Australia’s largest inland city but only the eighth-largest overall. Once you escape the city limits, however, there’s boundless trails to be explored, for which Keith’s Raddoneur is designed for.
A traditional randonneur was a bike for multi-mile day trips, with provision for a small bag to hold maps and snacks. This is Keith’s modern interpretation of it, with a frame that’s based around a 650b x 2.1 tubeless wheelbase.
This was destined to be a show bike, and fractured spine notwithstanding, Keith managed to complete all of the goals he set out to achieve with this build. There’s plenty of details to be admired — a fine demonstration of his skill and style.
The frame is built with bi-laminate construction from Columbus steel: check out those ‘lugs’ — carved fillet brazed sleeves that fit over the tubes to give the impression of lugs. Keith matched the stem to the frame, emblazoning it with a Kumo badge.
The front rack was made by Keith, with more brazed joins than the frame itself. It could probably carry a carton of beer if required, and could definitely push a wallaby out of the way, should one be encountered on the trail — a not unlikely risk in Australia.
That stem cap was milled manually, and those King cages have been cerakoted — a finish normally applied to firearms. Melbourne’s Busyman Bicycles provided the colour-matched perforated bar tape and the chain stay wrap.
Topped with a Brooks Cambium saddle, White Industries cranks, SON lighting, Campagnolo Athena shifting and Paul Klampers hauling everything up, Keith’s made himself a bullet-proof bike for riding a hard — but beautiful — landscape.
Kumo Cycles Website | Facebook | Instagram |
‘Spooky action’ to distinguish between two similar quantum devices
Washington, April 28 (ANI): Physicists are using the phenomenon dubbed as ’spooky action’ to distinguish between two similar quantum devices.
‘Quantum ghosts’ are far distant particles that can somehow ‘talk’ to each other, a theory put forward by famous scientist Albert Einstein, who called it ’spooky action at a distance’.
Having confirmed its existence, scientists today are learning how to use this ’spooky action’ as a helpful tool.
Now, a team of physicists at the University of Bristol and Imperial College London have harnessed this phenomenon to shed light on another unusual and previously difficult aspect of quantum physics - that of distinguishing between two similar quantum devices.
In the everyday world, any process can be considered as a black box device with an input and an output.
If you wish to identify the device you simply apply inputs, measure the outputs and determine what must have happened in between.
But, quantum black boxes are different.
Distinguishing between them is impossible using only single particle inputs because the outputs are not distinguishable: a fundamental consequence of the laws of quantum mechanics is that only very few states of a quantum particle can be reliably distinguished from one another.
The Bristol-Imperial team has shown how to get around this problem using ’spooky action’.
According to Anthony Laing, PhD student in the Department of Physics, who performed the study, “Apart from providing insight into the fundamentals of quantum physics, this work may be crucial for future quantum technologies.”
“How else could a future quantum engineer build a quantum computer if they can’t tell which circuits they have?” he explained.
The new findings have implications for our understanding of quantum mechanics as well as the emerging potential of quantum information science. (ANI) |
Effects of intra-hippocampal injections of the NK2 receptor antagonist saredutant on the elevated plus maze, and the mouse defense test battery.
Intracerebroventricular (i.c.v.) or intraperitoneal (IP) administration of saredutant (SR48968), an NK2 receptor antagonist, produces anxiolytic-like effects in rodents in a number of animal models of anxiety. NK2 binding sites are present in several limbic structures in rats, including the hippocampus, thalamus, septum and prefrontal cortex, suggesting involvement in the modulation of emotional processes. The current study investigated the behavioral effects of saredutant infused into the ventral hippocampus (VH), a structure associated with cognitive and emotional processes, to clarify the neural substrate underlying the anxiolytic-like effect of the compound. Saredutant (10, 100 or 500 pmol/0.2 μL) was injected bilaterally into the VH of male CD-1 mice tested in the elevated plus-maze and mouse defense test battery (MDTB). Results from the EPM showed that microinjections of 10 pmol/0.2 μL of saredutant increased entries and time spent in the open arms and enhanced end-arm exploration. In the MDTB, saredutant (500 pmol/0.2 μL) decreased vocalizations and increased escape attempts in mice confronted with a rat. Taken together, these results suggest that hippocampal tachykinin mechanisms are involved in the modulation of anxiety and defensive behaviors. |
10 Steps to Finding Your Happy Place (and Staying There) is a program to help us develop habits to grow a joyful spirit. Many of us sabotage our happiness by habits that we might not even be aware of. Identifying and changing these habits can build a reservoir of well-being to enhance our happy times and sustain us during challenging times.
Friday, March 1, 2013
Everything Is Impermanent (revisited)
I was looking for something in a box of old papers. I didn’t find what I was looking for, but I did find an old college paper that I must have thought was brilliant at the time because I saved it. I never save anything. As best I can tell, it was a philosophy paper. I’m quite sure it definitively answered all the deep questions of life once and for all.
But...I can’t read it. Back in the dark ages of my college education, apparently we were allowed to write our papers in pencil. And in an unintended scientific experiment, I have now discovered that papers written in pencil and then stored for decades in boxes in the attic will fade until the writing is so faint that most words are illegible.
Sigh. Like a supernova, my solutions to the universal questions burned brightly and were gone. And I can’t recreate them because I’m not half as smart now as I was when I wrote them.
Here today gone tomorrow, so don’t get attached to things. ~Maude, in “Harold and Maude”
55 comments:
Galen, I laughed when I read this. I still have some old college papers, and not only does pencil fade, so does typewriter ink.
I'm sure you had some good ideas back then, even though you can't review them now. It was the beginning of your journey! I think when we're still in college, writing papers on all the deep ideas of life, it's hard to imagine that that is just the beginning.
Tina, I don't know if my ideas were good or not, but I do remember thinking they were so original and then later realizing that many other people had thought about them already! Glad to share a laugh with you today. Thanks for commenting.
hey Galen - they were probably good but like Tina mentioned, the beginning. They may not have been the most original and you may have seen those ideas later everywhere else but your writing and reflections from your perspective, as they are now, are 100% unique and original :)
Ha..... Harold and Maude. I remember he gave her something (can't recall what it was) and she immediately tossed it and said, "Now I'll always know where it is."You don't really think you were smarter in college, do you? You were kidding. Sometimes it's hard to tell on writing.
Manzanita, If my memory is correct (it often isn't), he gave her a token that he had made in a machine. He gave it to her as they were sitting on a bank overlooking some water. She threw it into the water.
Was I really smarter in college? Perhaps my mind was more agile then. I certainly had more mental focus and stamina--I could study for hours and hours. But I definitely wasn't "life smart." When I was teaching in law school, I saw my younger self in many of my students. Their minds were quick and sharp, but they lacked judgment and wisdom.
Was I ever as brilliant as I alleged in the post? Now that was definitely kidding!!
So true, Galen, so very true! I was recently checking Amazon to see how my remaining books -- published between 1979 and 2008 -- were doing and found that most were out of print and the rest being sold at heart-breaking bargain prices. The tangible signs of a successful writing career are just as ephemeral as those old pencil-written college papers and discovering this is just another step of letting go and being at peace with what is.
Kathleen, That is a great example. When I retired from teaching law, so many people talked about my legacy and how I would be remembered. But I knew that as soon as the current students graduated, no one would remember me at all! Well, not the students anyway. Fame is elusive, or at best fleeting for most of us. But for successful writers such as yourself, there is always the next book to put you back on top! Thanks for commenting.
Beautifully written, Galen. I am slowly teaching myself not to get too attached to anything, because like what you said, nothing is permanent, whether it be things, people, relationships, etc. I guess it is something that we should learn to accept.
I loved the quote in the end too, which says it all. We do tend to get attached to things and people, and I think that's part of human nature too. But we are the ones who suffer when they are gone later. I guess it's best to not let them affect you, though I know it's easier said than done. :)
Harleena, So true. It is human nature, and we do cause ourselves suffering by virtue of it. It's easier for me when I can step back into the bigger perspective, but as you say, easier said than done. Thanks for your comment.
Had to smile, because it made me think of all my pencil ramblings when l was in college - l wrote poetry everywhere too - in pencil! A little sad to think how fast life has passed by up till now, at the same time it makes me want to apprechiate every moment of what is left be it forty years or four. Blessings Pam
Pam, I wrote poetry, too! I had a whole stack of it in my college dorm room. During a break, the housekeeper threw away all my poetry. No computers back then so it was gone forever. One of my first lessons in impermanence! Thanks for commenting.
Harold and Maude was one of my favorites when I was young...might be a good time to watch that one again! Remember Cat Stevens, "If you want to sing out, sing out, and if you want to be free, be free..."
Galen,Love the quote at the end. I try to never get attached to "things" because it can be somewhat devastating when you realize they're gone forever. Just think of all the masterpieces done in pencil that we've lost over time. However, I believe that the solutions to everything are still inside us even after time erases the hard copy. =)
That's what we get for digging around in old boxes and portfolios [you and me both this week Galen] It's funny when our lofty aspirations come back to remind us of who we are and what we stand for. Our earliest attempts I think are the least polluted. They are pure of heart and innocent. What a shame your words have been lost... but I tend to agree with Kris [above] that everything that ever was... is still inside us somewhere just bursting to get out [on a side note - I bet there's a way for you to retrieve those words via forensic methods - maybe google it - or take it to the police station] LOL
I am smiling on this one; I have a few papers just like that. I am concerned about a some pencil written letters by my grandfather sent to his mother when he served in the First World War and was killed over in France. They are a treasure and I can still read what is on most of them. It is one of those things that I plan to get on the computer. This was a perfect post to get me to schedule time to do that before I won't be able to read them.Blessings!
Linda, I tend to throw things out as well. That's why I was surprised I kept this paper. I guess you and I don't think that we'll ever be famous enough for people to care about these things after we're gone! (Or, in my case, it's better if they don't know!) Thanks for your comment.
When we were in our twenties, we thought we were the brightest star in the sky. My take is, you're probably better off not being able to read those faded pencil marks . . . God does know what's best. And, truthfully, I REALLY don't want to find my college papers! :)Love and blessings, Galen!
I'd argue you are wiser now than when you wrote them because of the additional few decades of experience which is our greatest teacher. So if anything, you would refine, rebut and enhance any previous papers/thoughts.
And the best part of this story is how even philosophy (yours and even the greatest philosophers of the world) share ideas, thoughts which are impermanent as well. I'm with Martha - probably a good idea they are gone. But I would probably still take out a magnifying glass and look atthe print under bright lights to see if I can make out my handwriting. haha :)
I just hoard and one fine day I find so much out there that I think i should get rid of them all. Attachment?!?! Well maybe but after a point those attachments become clutter and tend to clog positive energies.
Too funny Galen! I think it may be the Universe's way of telling you that you need to figure it all out again!Speaking of so many years ago. I was cleaning up a closet the other day and came across two copies of the manuscript for my first book (never published). One copy had been typed out and the other was a photocopy! It's about three inches thick, though it was double-spaced, as those things used to be! Yikes!Should I burn them - or at least one?Lori
I once went on a trip to China with my best friend and she was the designated photographer. She took hundreds of photos, but later found out the camera was not working and no pictures came from that trip. We were at the Great Wall, up in Mongolia in a yurt, in Beijing on a bicycle, but all we have is our memories of this trip. It was hard, but somehow I've decided that perhaps memories are the best pictures. Great post!
Katherine, What a disappointment. But you are right. Not having a visible record doesn't negate anything about the trip. A trip, by the way, that sounds like a wonderful adventure! Thanks for commenting.
Subscribe via email
Subscribe via RSS
Connect on Facebook
Followers
About Me
I am a Southern girl transplanted to the Pacific Northwest. I have 5 kids, 2 grandchildren, 6 birds, and a dog.
My new blog, No Way Cafe, is about how the principle of wu wei, or non-action, can manifest in our lives, bringing peace and joy to our spirits. This blog is inspired from many sources, including the Tao Te Ching and my martial arts practice.
My first blog was about 10 habits that transformed my life from one grounded in fear to one grounded in joy. I no longer add new material to this blog but it's still online.
Galen Pearl is my pen name. |
[Holter monitoring during sudden arrhythmic death].
Recordings of patients wearing a Holter monitor at the time of sudden cardiac death reveal that 16-20% of these patients die due to bradyarrhythmias. Tachyarrhythmic death is found in 80-84% of these patients. In about 40% lethal ventricular fibrillation is preceded by monomorphic ventricular tachyrcardias. in 20% by polymorphic ventricular tachycardias and torsades de pointes, respectively. Primary ventricular fibrillation is rare (3-5%). Typical "warning" arrhythmias, such as ventricular pairs or nonsustained ventricular tachycardias were found only inconsistently in the hours before death, as well as elevated heart rate. Thus it seems impossible at this time, to identify reliably those patients by telemetric ECG monitoring, who are at risk of imminent sudden arrhythmic death. |
Gwersyllt railway station
Gwersyllt railway station serves the area of Gwersyllt in the town of Wrexham in North Wales. It is one of five stations in the Wrexham County Borough.
The station is 3.5 km (2¼ miles) north of Wrexham Central on the Borderlands Line and was opened in 1866. The station used to have a signal box at the northern end of the Bidston-bound platform. A short distance to the south a goods-only branch line (part of the North Wales Mineral Railway network, to Brymbo) crossed the route and the abutments of the bridge it utilised still survive (along with a dip in the track formation). One of the line's main engineering features, the five arch stone viaduct over the River Cegidog is situated on this stretch of the line, but to the north of the station.
Facilities
The station is unstaffed and has no ticket provision (these must be bought on the train or prior to travel). Amenities provided here are limited to waiting shelters (there being no other permanent structures left here), CIS displays and timetable poster boards. There is a car park behind the northbound platform, which adjoins that belonging to a local supermarket. Level access can be had from there to both platforms, though the southbound one requires the use of a barrow crossing. Access is also possible to both platform from the road bridge at the south end, though this has steps on both sides.
Services
Weekdays (daytime) the line is served by two units, providing an hourly service each way (southbound to Wrexham Central and northbound to Bidston). After 18:45 (and all day on bank holidays) the service is provided by one unit, giving one train in each direction every two hours.
On Sundays the service is roughly every 90 minutes.
There is a connection at Bidston for onward travel for stations to via the Wirral Line and at Wrexham General for stations to and beyond and for Chester.
Gallery
References
Sources
External links
Category:Railway stations in Wrexham County Borough
Category:Former Great Central Railway stations
Category:Railway stations opened in 1886
Category:Railway stations served by Transport for Wales Rail |
Q:
duplicate one element from php array
how i can duplicate one element from array:
for example, i have this array:
Array
(
[LRDEPN] => 0008.jpg
[OABCFT] => 0030.jpg
[SIFCFJ] => 0011.jpg
[KEMOMD] => 0022.jpg
[DHORLN] => 0026.jpg
[AHFUFB] => 0029.jpg
)
if i want to duplicate this: 0011.jpg , how to proceed?
i want to get this:
Array
(
[LRDEPN] => 0008.jpg
[OABCFT] => 0030.jpg
[SIFCFJ] => 0011.jpg
[NEWKEY] => 0011.jpg
[KEMOMD] => 0022.jpg
[DHORLN] => 0026.jpg
[AHFUFB] => 0029.jpg
)
A:
Something like the following, change the uniqid() function to yours:
<?php
$a=array(
'LRDEPN' => '0008.jpg',
'OABCFT' => '0030.jpg',
'SIFCFJ' => '0011.jpg',
'KEMOMD' => '0022.jpg',
'DHORLN' => '0026.jpg',
'AHFUFB' => '0029.jpg'
);
$i='0011.jpg';
$newArray=array();
foreach($a as $k=>$v){
$newArray[$k]=$v;
if($v==$i) $newArray[uniqid()]=$v;
}
print_r($newArray);
?>
Which gets you:
Array
(
[LRDEPN] => 0008.jpg
[OABCFT] => 0030.jpg
[SIFCFJ] => 0011.jpg
[4bd014ebf3351] => 0011.jpg
[KEMOMD] => 0022.jpg
[DHORLN] => 0026.jpg
[AHFUFB] => 0029.jpg
)
|
Before, anything I would like to say that all my previous games
are cancelled. I'm sorry but I need to focus on these completely.
So I welcome you to the Slender Games! (Sorry for being inactive,
but these hospital visits are annoying :3)
So basically these are games with a very favorite person who has
been hauting me lately. (I swear I think someone was watching me in
the Kitchen). And this special person is SLENDER MAN! For those
that don't know, Slender Man is a tall man with long limbs, no face
and several arms in a black suit. He basically stalks you and then
kills you in your moment of weakness.
If anyone has played the Slender Man Game, then you have a basic
idea of how this works. Basically, tributes will be locked in an
arena with S… |
Expression of active human uterine tissue plasminogen activator in yeast.
Tissue-type plasminogen activator (tPA) cDNA derived from human uterine mRNA was inserted into different yeast expression vectors. All such expression plasmids carried a yeast acid phosphatase (PHO5) promoter, a 2-micron plasmid replication origin, transcription termination signals, and a selectable TRP1 gene. Plasmid pYBDT-10 contained the entire tPA coding region ("pre-pro-tPA"), pYBDT-10-PRO contained a sequence encoding the putative pro-tPA precusor, and pYBDT-6 contained only a mature tPA cDNA fused precisely in frame to the sequence encoding the entire signal peptide of acid phosphatase. All constructions directed the synthesis of single-chain tPA proteins that were readily precipitated with a specific antibody directed against human uterine tPA. Electrophoretic mobilities were approximately the same as those of the Bowes melanoma single-chain tPA and a 68-kD protein marker. Treatment of immunoprecipitates with endoglycosidase H resulted in increased electrophoretic mobilities, suggesting that these yeast products are glycosylated. Despite the use of either human or yeast signal sequences, however, tPA produced in yeast was not secreted into the culture medium, but rather was found only in cells following disruption with glass beads. Although this cellular tPA exhibited fibrinolytic activity, most of the activity was associated with large cellular debris. |
The influence of amine functionalities on anion binding in polyamide-containing macrocycles.
Mixed amide/amine macrocyclic anion hosts of varying sizes and with different amine substituents have been synthesized and characterized. Host 2, containing a 28-membered ring and secondary amines, has shown selective binding for HSO(4)(-) over other oxo anions and halides in DMSO-d(6) using NMR titrations. Crystal structures of SO(4)(2-), HPO(4)(2-), H(2)PO(4)(-), and H(2)P(2)O(7)(2-) with the 28-membered ring hosts indicate different macrocyclic conformations depending on the N-substituent. Anion affinities appear to be correlated with macrocycle conformation. |
This talk will present updates on Lambda, JSR 292, as well as some other VM- and language-related OpenJDK items. |
Wilhelm Cuno
Wilhelm Carl Josef Cuno (2 July 1876 – 3 January 1933) was a German businessman and politician who was the Chancellor of Germany from 1922 to 1923, for a total of 264 days. His tenure included the episode known as the Occupation of the Ruhr by French and Belgian troops and the period in which inflation in Germany accelerated notably, heading towards hyperinflation. Cuno was also general director of the Hapag shipping company.
Early life
Wilhelm Carl Josef Cuno was born on 2 July 1876 in Suhl, in what was then Prussian Saxony and is now in Thuringia. He was the son of August George Wilhelm Cuno (1848-1915) and his wife Catherina Elisabeth Theresia, née Daske (1852-1878).
In 1906, Cuno, a Roman Catholic, married Martha Berta Wirtz (born 1879), daughter of Hamburg merchant Hugo Wirtz. They had three sons and two daughters.
Cuno studied law in Berlin and Heidelberg and was awarded a Juris Doctor. He was a member of K.D.St.V. Arminia Heidelberg, a Catholic student fraternity that is a member of the Cartellverband der katholischen deutschen Studentenverbindungen.
Early career
He was employed by the Reichsschatzamt (Treasury) in 1907, initially as Regierungsassessor. Cuno was promoted in 1910 to Regierungsrat and in 1912 to Geheimer Regierungsrat. His tasks mainly involved preparing parliamentary bills and presenting them to the Reichstag.
During World War I, Cuno was involved in organizing food supplies for the German army, first directing the Reichsgetreidestelle from its inception until July 1916. He then was attached to Secretary of State (i.e. Minister) Batocki to help organize the Kriegsernährungsamt (war food department). In late 1916, Cuno was put in charge of the Generalreferat (section) on economic issues relating to the war at the Treasury.
At the request of Albert Ballin, Cuno quit the civil service to join the Hapag shipping company as a director in November 1917. After Ballin's death in November 1918, Cuno was promoted to Hapag's general director in December.
As an economic expert, Cuno participated in the post-war negotiations on the armistice, on reparations and peace terms and in other international conferences, including the Genoa Conference, which he left in protest after the signature of the Treaty of Rapallo with the Soviet Union. Cuno was also an important negotiator in talks between the German shipping firms and the government, regarding compensation for the merchant ships delivered to the Allies under the terms of the peace treaty (1920/21).
In 1920, Cuno led Hapag into an alliance with United American Lines, helping to reestablish Hapag as a passenger line. He also unofficially represented the Reich's foreign policy interests during his travels abroad.
Chancellor
Cuno rejected several proposals to assume the post of foreign minister (autumn 1922) or minister of finance (after Matthias Erzberger's resignation in 1920), but agreed to form a cabinet after the resignation of Joseph Wirth's second cabinet. Cuno was appointed Reichskanzler on 22 November 1922, by presidential decree and without a vote in the Reichstag. He was the first chancellor in the Weimar Republic who was not a member of a party. Politically, he was quite far from the president, Social Democrat Friedrich Ebert who selected him as chancellor. Cuno had a somewhat aloof position towards the republic and its parliamentary system. He held the Reichstag in fairly low esteem and felt the bickering between the parties to be distasteful. Cuno formed a government mostly composed of non-party economists and members of the German People's Party, German Democratic Party, German Center Party and Bavarian People's Party. The government was referred to, alternatively as a Geschäftsministerium, Regierung der Wirtschaft or Kabinett der Persönlichkeiten, emphasizing that it was not the result of an explicit coalition between the parliamentary parties.
Hopes were high for this government of experts, led by a man with excellent connections abroad, to make headway in the difficult talks with the Allies. They were, however, disappointed. Cuno's plan to settle the reparations issue and to stabilize the Mark in the foreign exchange market was rejected by the Allies at the urging of French prime minister/foreign minister Poincaré. When Germany fell a bit behind on its shipments of wood and coal (made as reparations in lieu of lacking gold currency) the French declared this to be a deliberate breach of the agreements and on 11 January 1923 ordered troops to occupy the Ruhr (later joined by Belgians). This move, widely seen as illegal even outside Germany, caused the outraged Cuno government to call for passive resistance: Reparation shipments to France and Belgium were stopped, the mines were told not to make any more deliveries to these states, civil servants and Reichsbahn personnel were told to disobey orders by the occupation authorities.
The Ruhr economy, the industrial heartland of Germany, came almost to a complete stop. Financial support payments by the Reich government to those inhabitants of the occupied zone affected by firm closures, deportations and arrests quickly added up to vast sums, mostly financed by printing money. This caused inflation to increase rapidly and the Mark to go into free fall.
Attempts by the government to resume talks about reparations in May and June 1923 failed as Poincaré refused to negotiate unless passive resistance was ended first. A wave of strikes against the government began in August 1923. On 12 August 1923, Cuno and his cabinet resigned as a result of a vote of no-confidence initiated by the SPD.
Later life
Cuno retired from politics and returned to serve as a director at Hapag. In 1926, he once again became its director general. He was involved in negotiations about the release of German property impounded in the U.S. during the war and in working towards the merger with Norddeutsche Lloyd, which happened in 1930.
During the 1925 election for Reichspräsident, Cuno was outspoken in his support for Paul von Hindenburg, rather than the candidate of the Centre Party, Wilhelm Marx.
In 1932, Cuno joined Wilhelm Keppler to advise Adolf Hitler economically.
Cuno died on 3 January 1933 at Aumühle near Hamburg.
References
External links
Category:1876 births
Category:1933 deaths
Category:20th-century Chancellors of Germany
Category:People from Suhl
Category:People from the Province of Saxony
Category:Chancellors of Germany
Category:German Roman Catholics
Category:People of the Weimar Republic
Category:Heidelberg University alumni
Category:German anti-communists
Category:Burials at the Ohlsdorf Cemetery
Category:Hamburg America Line |
»
e-commerce-web-design-trends-2018
Top 7 E-commerce Web Design Trends to Adopt In 2018
E-commerce sales worldwide accounted for $1.915 trillion in sales up to the end of 2016. It is predicted that e-commerce sales will reach $27 trillion by the year 2020. E-commerce is fulfilling some increasingly diverse roles in the world of online selling and has come along way since the days when a little known startup called Amazon began selling books over the internet. The sector now encompasses a vast range of services, and virtually every physical product imaginable, from land to automobiles, is now available for purchase from anywhere in the world.
For a long time, e-commerce was something conducted from computers and laptops at home, but increasingly we are now making purchases on the go using cell phones and tablets. The increasingly mobile nature of the e-commerce market is set to be one of its defining features over the next few years with a steady rise in the number of apps available for buying and selling online, as well as an increasing number of web based companies offering mobile friendly versions of their site to encourage more users, regardless of their preferred browsing devices.
While brick and mortar stores continue to account for the majority of money spent in retail, there is a clear trend towards e-commerce giants such as Amazon, and it will be quite some time before e-commerce becomes the dominant force it has the potential to be. In the meantime, however, it is still an integral part of the retail landscape and something that all business owners should be keeping a close eye on. Below are some of the emerging trends within the e-commerce sector, which are proving to be a real boon to businesses that adopt them.
1. Mobile Friendly Design:
It’s still possible to find examples online of some of the early e-commerce websites. They are notable for design practices that would make a modern web designer wince. Cluttered designs which try to throw far too much information at the user from the moment the page loads were one of the main problems. That’s assuming pages loaded neatly. In the pre-broadband days of the internet, pages often loaded in stages, and this perhaps goes some way to explaining the different design priorities. While modern e-commerce sites are very much designed with the smooth user experience in mind,the modest demand of running embedded scripts was an obstacle early web designers had to contend with.
Now that our computers and our internet connections are considerably faster, we can do a lot more under the hood of a website than was previously possible, while having a minimal impact on the user experience. Increasingly, websites are designed with mobile in mind and some neat web design tricks allow for the design of a web page that will load in one configuration on a desktop or laptop, and in another for mobile and tablet. Even sites which also offer an app are increasingly looking to make their browser based offerings mobile friendly.
2. Templates:
Many people assume that using a template is a sign of laziness or, at the very least, a lack of creative vision. However, this is not necessarily the case. After all, there is a good reason that the vast majority of smartphones now feature essentially the same design and layout, minus a few individual tweaks depending on the manufacturer; it’s because those designs work well.
In 2014, Google launched what it dubbed its’ ‘Material Design’ motif, which is essentially a template for designing Android applications. As with all things Android, there is plenty of room for customization so using the Material Design motif doesn’t necessarily mean your app will appear identical to others. An increasing number of websites are following the same design principles that Material Design is based on. You should check out the motif for inspiration on designing your own site.
3. Efficient Loading and Layout:
For many mobile users, data usage is still a real concern. While the packages offered by different cell service providers are undoubtedly becoming more generous, savvy website designers should still be looking to maximise efficiency by only loading what is necessary. In the context of e-commerce sites, this is mostly applicable to product listings.
Rather than listing 100 products on a single page, it is much more efficient to load the first 10 and then only load subsequent sets of 10 if the user scrolls to the bottom of the existing list. E-commerce sites that efficiently handle loading times are much more likely to appeal to mobile customers than those that are data hungry.
4. Hamburger Menus:
Hamburger menus have become an increasingly common sight across a variety of website types as they offer a convenient way to hide and reveal a menu as necessary, making the sites much easier to navigate for the user, particularly on smaller screens.
Hamburger menus are identifiable by the three horizontal lines that the user must tap or click on to reveal the underlying menu, pressing the bars again will hide the menu. Hamburger menus are simple, efficient, convenient, and save a considerable amount of space compared to a menu displayed within a frame.
5. Cinemographs:
The GIF used to be the undisputed king of embedded animations on the web, however animated GIFs are prohibitively resource intensive for most mobile users. Individually GIFs aren’t particularly large files, but when there is a whole series of them or different ones on each page, the data requirements start to add up.
Cinemographs represent a midway point between an animated GIF and a still image. They consist of an image, usually a photograph, which either features text animated over it or in some cases, a small section of the image itself is animated.
6. Adaptation:
Websites that adapt to the device they are being viewed on is nothing new. In the future, however, sites might be able to adapt not just to the device but to the user themselves. For example, based on the user’s age and visual acuity, the website could reorder itself to include larger, more prominent elements.
For users who are right or left handed, the site could shift some elements to the other side of the screen, and for colourblind individuals the site could alter its colour palette to compensate. More personalised computing experiences look set to be a big part of future innovation.
7. Grids:
From smartphone operating systems to the Amazon website, grids have proven themselves as one of the simplest yet most effective forms of design. Grids are not only clear and easy to navigate, they use the space available efficiently. A common trend among e-commerce sites now is to adopt the grid layout but to remove borders, allowing the grid to blend in to the rest of the page.
Keeping up with the curve is the next best thing to being ahead of it, and e-commerce site operators should always be on the lookout for new opportunities to show off their design prowess and hopefully pick up loyal customers in the process and some new.
Author Bio:
Elena is a key member of the web design team over at afterfivebydesign. She is passionate about web design and is always on the lookout for new and emerging trends, which she enjoys writing about both for a general and a more specialist audience. You can follow her on twitter.
This post was submitted by a TNS experts. Check out our Contributor page for details about how you can share your ideas on digital marketing, SEO, social media, growth hacking and content marketing with our audience.
Related Topics:
3 Comments
3 Comments
Paul Cook
December 21, 2017at3:32 pm
This is interesting! Take a look at this, it is a very insightful read |
The US announced it was closing 22 posts throughout the Middle East and Africa on Thursday. It has since re-opened seven but shut down four others in the African nations of Madagascar, Burundi, Rwanda, and Mauritius. |
25 Cal.Rptr.3d 1 (2004)
126 Cal.App.4th 1161
Victor HERNANDEZ et al., Plaintiffs and Respondents,
v.
BOARD OF EDUCATION OF The STOCKTON UNIFIED SCHOOL DISTRICT, Defendant and Respondent;
Dwight Williams, Jr., et al., Interveners and Appellants.
No. C044986.
Court of Appeal, Third District.
August 2, 2004.
*3 Browne & Woods, Eric M. George, Beverly Hills, and Nick J. G. Sanchez, Costa Mesa, for appellants and interveners.
Peter Roos, San Francisco, CA, for plaintiffs and respondents.
Ruiz & Sperow, Celia M. Ruiz, Amy R. Levine, Emeryville, and Susanne N. Starecki, for defendant and respondent.
*2 ROBIE, J.
In its final order in this 34-year-old school desegregation case, the trial court: (a) found the Stockton Unified School District was no longer segregated (that is, it was operating as a "unitary" school system without vestiges of past discrimination and no longer operating as a "dual" or segregated school system); (b) dissolved its prior orders, injunctions, and decrees; (c) approved the settlement agreement between the school district and the original petitioners in this action; and (d) dismissed the action, while retaining jurisdiction to enforce the settlement agreement for two years under Code of Civil Procedure section 664.6. Interveners (current students of the Stockton Unified School District, their parents, and taxpayers living in the school district) challenge the trial court's orders.
Interveners argue once the court found the district had reached "unitary status," the court should have immediately returned complete "control of the [school district] to the duly-elected Board of Education." Interveners further contend the settlement agreement violates the Education Code in its use of certain grant funds and also violates the California Constitution by granting preferences based on race. (Cal. Const., art I, § 31.)
We shall affirm. The trial court did not retain jurisdiction to continue its plenary supervision over the school district. Although it has the authority to phase out its plenary control to ensure an orderly transition from court supervision to supervision by the school district's governing board, instead it properly reserved its jurisdiction to allow the parties to request that it enforce the settlement agreement they drafted, pursuant to the terms that they agreed upon. We further conclude the school district's allocation of the grant funds complies with the Education Code. No evidence in this record suggests the grant funds are being distributed in a manner that discriminates against, or grants preferential treatment to, any individual or group on the basis of race.
FACTUAL AND PROCEDURAL BACKGROUND
A
Initial Action And The Trial Court's Findings
In 1970, Victor Hernandez and others (Hernandez petitioners) filed a petition for a writ of mandate on behalf of the "Negro, Mexican-American, and low income students of the Stockton Unified School District" to bring an end to the segregation of Stockton's public school system.
The case was tried in 1974. The trial court issued its findings of fact and conclusions of law on April 7, 1975. The court found "the Stockton Unified School District, in the 1973-74 school year, had a total enrollment of 29,160. Of these, 82 (0.28%) were American Indian, 4,359 (14.9%) were Black, 969 (3.3%) were Oriental, 7,115 (24.4%) were Spanish Surname, 822 (2.8%) were Filipino, 487 (1.7%) were *4 other minorities, and 15,327 (52.6%) were Anglo."
Based on these foundational numbers, the court found the composition of the student population of 26 of the district's 30 elementary schools was racially imbalanced when compared with the school district's overall population. Racially imbalanced schools were those schools where the proportion of white or minority students was over or under represented by more than 15 percent when compared to the district-wide representation of those students. Thirteen of the elementary schools were identifiable as predominantly "Anglo" and 13 of those schools were predominantly of the racial minority races. Four out of the five junior high schools and two of the three senior high schools were similarly racially imbalanced. The schools in the north of Stockton were racially identifiable as "Anglo" schools and those in the south were identifiable as minority schools. The segregation of the school district extended to staff and faculty of these schools.
The trial court found this segregation intentional and in violation of the Fourteenth Amendment to the United States Constitution. The court also found de facto segregation in violation of the California Constitution, article I, section 1. This segregation denied equal educational opportunities to the petitioners. As a result, the court ordered the district to adopt and implement desegregation plans to eliminate all vestiges of a racially segregated school system and ordered the school district to submit the plans to the court for approval.
The trial court entered a final judgment on April 27, 1978, commanding the district to adopt and implement its proposed desegregation plans.
B
The Desegregation Plans
The desegregation plans were revised, with court approval, several times.[1] As relevant here, these amended desegregation plans provided for the establishment and maintenance of magnet schools or magnet programs. Magnet programs provide a race neutral means to prevent racial or ethnic isolation by providing educational choices for district students. These programs are designed to provide courses of instruction that will substantially strengthen students' knowledge of academic subjects and/or their grasp of tangible and marketable vocational skills. Magnet schools and programs initially assisted the school district's desegregation efforts by "`providing exemplary programs to attract students from all racial/ethnic backgrounds'" and subsequently worked to minimize the effects of White flight and racial isolation in many of the schools.
*5 In the ensuing years since this litigation was commenced, the makeup of the school district's population has changed. As of October 2001, the school district had 23,436 students. White students (other than those of the Hispanic origin) made up 14.1 percent of the total student population. Students of other races make up 85.9 percent of the total population, with Hispanic students representing 49.4 percent of the entire student population. All of the secondary students and 96.6 percent of the elementary school students attend schools that are racially balanced.
C
The Interveners
In October 2002, interveners filed a motion to intervene in this case. Interveners are students of the school district, their parents, and taxpayers who live within the district's boundaries. The trial court granted them leave to intervene, but stayed the effect of its order for 90 days to allow the school district and the Hernandez petitioners time to hash out a settlement agreement to resolve the litigation.
D
The Motions To Approve Unitary Status And The Settlement Agreement
Meanwhile, the district and the Hernandez petitioners entered into a settlement agreement to resolve the case. In the proposed settlement agreement, the school district and the Hernandez petitioners agreed to stipulate that the school district had reached "unitary status" in exchange for the dismissal of the action and two major terms.
1. Unitary Status
The term "unitary" in desegregation cases is an ambiguous term. (Board of Ed. Oklahoma City v. Dowell (1991) 498 U.S. 237, 245, 111 S.Ct. 630, 635, 112 L.Ed.2d 715, 726.) Some courts use it to identify a school district which has eliminated both segregation and completely remedied all vestiges of past discrimination; other courts use that term to describe a district that has currently desegregated student assignments, whether that status is solely due to a court-ordered desegregation plan. (Ibid.) In the latter instance, vestiges of the past discrimination may still exist in the district. (Ibid.) We shall discuss the reasons for and the effect of the determination that a school district has become unitary below.
Here, the stipulation concerning unitary status stated the school district had complied in good faith with each of the court desegregation decrees and court approved desegregation plans in compliance with the equal protection clause of the United States Constitution. Further, the stipulation provided the school district had eliminated all vestiges of intentional discrimination in its programs, procedures and operations to the extent practicable and had taken all reasonably feasible steps to correct any de facto racial isolation in its schools. The stipulation further stated the school district was unitary in all areas of its operation, including, but not limited to, student assignment, facilities and resources, faculty and staff assignment, transportation, extracurricular activities, and student achievement.
2. Settlement Agreement
In exchange for the stipulation of unitary status, the first of the two major terms the school district agreed to in the settlement agreement is that the district would agree to assign students to schools in accordance with a particular student assignment plan for the 2003-2004 school year. That plan keeps the magnet programs intact, allocates seats to them based *6 on geographical distribution, requires magnet recruitment efforts, and requires monitoring of student assignments by race, ethnicity, and socioeconomic status.
The second major term the school district agreed to was a two-year, phaseout of the supplemental "Targeted Instructional Improvement Grant" (TIIG) funding in place at the time the agreement was signed. This agreement was to phase out the use of these funds on south Stockton schools that were formerly identifiable as minority schools and gradually redistributed those funds among the lowest performing schools. This funding phaseout period was for the 2003-2004 and 2004-2005 school years. The reason for this gradual phaseout provision was to ensure an orderly transition period for these schools and prevent turmoil in these programs.
As to these two key terms, the settlement agreement provides that the school district will have fully performed when it: (1) adopts the student assignment plan; (2) makes initial student assignment decisions consistent with that plan for the 2003-2004 school year; and (3) adopts the TIIG funding distribution plan provided for in the settlement agreement. The settlement agreement explicitly states the Hernandez petitioners "may only enforce [these provisions of the settlement agreement] for the [school] District's failure to complete" these three tasks. The Hernandez petitioners may not challenge the quality of the school district's implementation of these provisions, the attainment of any of their objectives, or the efficacy or appropriateness of the district's compliance beyond this. The settlement agreement also contained the agreements: (a) to stipulate that the school district had reached unitary status; (b) to bring joint motions to approve the settlement agreement and declare the school district unitary and dismiss the action; (c) a release of all claims and waiver of appeal rights; and (d) boilerplate terms common to most settlement agreements concerning the construction and operation of the settlement agreement itself. The settlement agreement was approved by the board of education for the school district and its key provisions adopted at its regular public meetings.
E
The Trial Court's Rulings
The trial court issued an order granting preliminary approval to the settlement agreement on March 4, 2003. The court set a fairness hearing for approval after notice to the class members for April 30, 2003. The Hernandez petitioners and the school district filed a joint motion for: (a) a declaration that the school district was unitary in all of its operations; (b) vacating all prior court orders in this case and entry of a dismissal; and (c) ending all court supervision of the school district. They also filed a second motion for final approval of the settlement agreement. Interveners opposed these motions.
On March 11, 2003, the school district moved to extend the stay of the intervention order. The Hernandez petitioners joined in that motion.
The interveners filed their own motion on April 3, 2003, to enjoin the court's prior desegregation order and as a result returning plenary control of the school district to its governing board. That motion was originally scheduled for a hearing on April 29, 2003.
In response to the school district's motion, the trial court extended the stay of its intervention order to May 30, 2003, but granted interveners permission to oppose the Hernandez petitioners' and school district's motion to approve the settlement agreement. Further, the court scheduled *7 the interveners' injunction motion for that same day and time.
After the April 30 hearing, the trial court found the school district was unitary in all areas of its operations and had eliminated all vestiges of intentional segregation in its programs, procedures, and operations. In this order, the court vacated its prior 1978 judgment, dissolved its prior orders, injunctions, and decrees and dismissed the action. Specifically, the court terminated its own supervision of the school district and returned that supervision to the school district's governing board. Finally, the court approved the settlement agreement between the school district and the Hernandez petitioners while retaining jurisdiction to enforce the settlement agreement for two years under Code of Civil Procedure section 664.6. At the same time, the court denied interveners' motion for a preliminary injunction and permanently stayed its order granting intervenors leave to intervene.
Interveners appeal.
DISCUSSION
I
Dismissal Of The Action
Interveners argue the trial court had to immediately dismiss this action and return all control over the school district back to the its governing board once the trial court entered a finding that the school district was unitary in all of its operations. As soon as the court made that finding, the interveners claim, the court was without power to do anything but dismiss the action and therefore could neither approve the settlement agreement nor retain jurisdiction to enforce it. We reject this argument.
A
Court Control Over Desegregation May Be Phased Out
In 1954, the United States Supreme Court, in Brown v. Board of Education of Topeka (1954) 347 U.S. 483, 493, 74 S.Ct. 686, 691, 98 L.Ed. 873, 880, concluded "segregation of children in public schools solely on the basis of race, even though the physical facilities and other `tangible' factors may be equal, deprive[s] the children of the minority group of equal educational opportunities." The court concluded the operation of a "`separate but equal'" (or dual) educational system was inherently unequal and denied those children equal protection of the laws guaranteed by the Fourteenth Amendment of the United States Constitution. (Id. at p. 495, 74 S.Ct. 686.) In the next year, the Supreme Court ordered the district courts to supervise the desegregation of the school districts and ordered those districts to desegregate with "all deliberate speed." (Brown v. Board of Ed. of Topeka (1955) 349 U.S. 294, 301, 75 S.Ct. 753, 757, 99 L.Ed. 1083, 1106.)
In 1968, in Green v. School Board of New Kent County (1968) 391 U.S. 430, 88 S.Ct. 1689, 20 L.Ed.2d 716, the Supreme Court concluded the time for "`"deliberate speed"'" had "`run out'" and the school districts once segregated by law must "come forward with a plan that promises realistically to work, and promises realistically to work now." (Id. at pp. 438-439, 88 S.Ct. 1689.) The Green court further stated it was the duty of the school district "to take whatever steps might be necessary to convert to a unitary system in which racial discrimination would be eliminated root and branch." (Id. at pp. 437-438, 88 S.Ct. 1689.) The Supreme Court further identified the various parts of the school system the court must examine in order to ascertain whether the school has *8 reached the goal of a unitary system: student attendance, faculty, staff, transportation, extracurricular activities, and facilities. (Id. at p. 435, 88 S.Ct. 1689.)
Under this line of cases, the trial court has plenary authority to prescribe injunctive relief that will remedy segregation and eliminate the vestiges of the past discrimination from the school's system. However, the power of the courts to impose its equitable authority over a school system is not unlimited. "`Local control over the education of children allows citizens to participate in decisionmaking, and allows innovation so that school programs can fit local needs.' (Board of Ed. of Oklahoma City v. Dowell (1990) 498 U.S. 237, 248[, 111 S.Ct. 630, 637, 112 L.Ed.2d 715].) Judicial displacement of local control is justified when local authorities have denied students equal protection of laws. Judicial supervision is intended as a temporary measure (id. at p. 247[, 111 S.Ct. at pp. 636-637]), not as `judicial tutelage for the indefinite future.' (Id. at p. 249[, 111 S.Ct. at p. 638].)" (Board of Education v. Superior Court (1998) 61 Cal.App.4th 411, 419, 71 Cal.Rptr.2d 562.)
"As explained in Freeman v. Pitts [1992] 503 U.S. 467, 489[, 112 S.Ct. 1430, 1445, 118 L.Ed.2d 108], at the outset of a school desegregation case the court's authority is invoked to remedy a particular constitutional violation. The nature of the violation determines the scope of the remedy. `[T]he court's end purpose must be to remedy the violation and, in addition, to restore state and local authorities to the control of a school system that is operating in compliance with the Constitution. [Citation.]' (Ibid.)" (Board of Education v. Superior Court, supra, 61 Cal.App.4th at p. 419, 71 Cal.Rptr.2d 562.)
"A court's exercise of its discretion to relinquish judicial control is determined by the school district's compliance with the court decree, whether retention of judicial control is necessary to achieve compliance and whether the school district has demonstrated its good faith commitment to both the decree and the constitutional provisions that were originally the predicate for judicial intervention. (Freeman v. Pitts, supra, 503 U.S. at p. 491[, 112 S.Ct. at p. 1446].)" (Board of Education v. Superior Court, supra, 61 Cal.App.4th at pp. 419-420, 71 Cal.Rptr.2d 562.) This inquiry is at the heart of the court's determination as to whether a school district has reached the goal of operating as a unitary school system.
The Supreme Court explained, "The concept of unitariness has been a helpful one in defining the scope of the district courts' authority, for it conveys the central idea that a school district that was once a dual system must be examined in all of its facets, both when a remedy is ordered and in the later phases of desegregation when the question is whether the district courts' remedial control ought to be modified, lessened, or withdrawn. But, as we explained last Term in Board of Ed. of Oklahoma City Public Schools v. Dowell, 498 U.S. 237, 245-246, 111 S.Ct. 630, 112 L.Ed.2d 715 (1991), the term `unitary' is not a precise concept: [¶] `[I]t is a mistake to treat words such as "dual" and "unitary" as if they were actually found in the Constitution.... Courts have used the terms "dual" to denote a school system which has engaged in intentional segregation of students by race, and "unitary" to describe a school system which has been brought into compliance with the command of the Constitution. We are not sure how useful it is to define these terms more precisely, or to create subclasses within them.' [¶] It follows that we must be cautious not to attribute to the term a utility it does not have. The term `unitary' does not confine the discretion and authority *9 of the District Court in a way that departs from traditional equitable principles." (Freeman v. Pitts, supra, 503 U.S. at pp. 486-487, 112 S.Ct. 1430.)
There is a split of authority in the federal circuit courts as to the effect of a trial court's finding a school district has reached "unitary status." (Annot., Circumstances Warranting Judicial Determination or Declaration of Unitary Status with Regard to Schools Operating Under Court-Ordered or -Supervised Desegregation Plans and the Effects of Such Declarations (1989) 94 A.L.R.Fed. 667, 698-723, §§ 9-11, and cases cited.) For example, in the Fifth Circuit, "a unitariness finding `is critical because once it is made a federal court loses its power to remedy the lingering vestiges of past discrimination absent a showing that either the school authorities or the state had deliberately attempted to fix or alter demographic patterns to affect the racial composition of the schools.' [Citation.]" (Price v. Austin Independent School Dist. (5th Cir.1991) 945 F.2d 1307, 1314-1315.) On the other hand, the Tenth Circuit has concluded that a unitary finding alone does not end the power of the court to enter further orders or enforce prior orders of the court concerning desegregation. (Dowell By Dowell v. Board of Educ. of Oklahoma (10th Cir.1986) 795 F.2d 1516, 1523, cert. den. (1986) 479 U.S. 938, 107 S.Ct. 420, 93 L.Ed.2d 370.)
In Board of Ed. Oklahoma City v. Dowell, supra, 498 U.S. at page 248, 111 S.Ct. 630 (a later proceeding in the same case), the Supreme Court stated, "Dissolving a desegregation decree after the local authorities have operated in compliance with it for a reasonable period of time properly recognizes that `necessary concern for the important values of local control of public school systems dictates that a federal court's regulatory control of such systems not extend beyond the time required to remedy the effects of past intentional discrimination. [Citation.]" (Italics added.) The court remanded the action for the district court to determine whether the school district had made a sufficient showing of constitutional compliance such that the injunction against the school district should be dissolved. (Id. at p. 249, 111 S.Ct. 630.) Further, the Supreme Court left intact the Tenth Circuit's conclusion that the court's prior unitary finding bound the parties but did not terminate the litigation. (Id. at p. 246, 111 S.Ct. 630.) The language of this case necessarily indicates that a school district will have achieved unitary status for a period of time before the trial court declares that it is unitary and must withdraw its orders and dissolve preexisting injunctions. Further, the case stands for the proposition that a simple finding of unitary status does not terminate the case.
In Freeman v. Pitts, supra, the Supreme Court reviewed a decision of a district court to relinquish control over portions, but not all, of a Georgia school district's desegregation efforts because the court concluded the district was operating in a unitary manner in those areas. (503 U.S. at pp. 471, 474, 112 S.Ct. 1430.) The district court, however, retained jurisdiction over the areas where vestiges of the dual system remained: teacher and principal assignments, resource allocations, and the quality of education. (Id. at p. 474, 112 S.Ct. 1430.) The Supreme Court concluded that the trial court had the authority to relinquish supervision over a school district "in incremental stages, before full compliance has been achieved in every area of school operations." (Id. at p. 490, 112 S.Ct. 1430.) "This discretion derives both from the constitutional authority which justified its intervention in the first instance and its ultimate objectives in formulating the decree." (Id. at p. 489, 112 S.Ct. 1430.) *10 The court stated, "Just as a court has the obligation at the outset of a desegregation decree to structure a plan so that all available resources of the court are directed to comprehensive supervision of its decree, so too must a court provide an orderly means for withdrawing from control when it is shown that the school district has attained the requisite degree of compliance. A transition phase in which control is relinquished in a gradual way is an appropriate means to this end." (Id. at pp. 489-490, 112 S.Ct. 1430.)
Given the split of authority in the federal circuit courts, and the Supreme Court's explicit sanction of incremental withdrawal from school districts in Freeman v. Pitts, we conclude the trial did not abuse its discretion here. As part of its order finding the district to be unitary, the trial court dissolved all of its prior orders, injunctions, returns of writ of mandate, decrees, desegregation plans, and other court-imposed obligations in this case. It vacated its prior judgment finding segregation in the school district. It dismissed the action with prejudice. The trial court thus terminated its active supervision over the school district and placed all of the school district's operations in the hands of its governing board.
All the trial court retained was the potential of being asked to enforce two contractual provisions during the two-year period following its dismissal of the action: one year for the student assignment plan, and two years for the TIIG funding phaseout provision. The parties explained these provisions were necessary to ensure a smooth transition from court supervision to the supervision by the school district's governing board for both the students and for the magnet programs supported by these funding measures. The court's decision to reserve jurisdiction on these two items was a rational exercise of the court's discretion at the conclusion of this 34-year-old case to transition full control over the school district from the court to its governing board.
B
The Trial Court Did Not Retain Plenary Control Over The District When It Retained Jurisdiction Under Code of Civil Procedure Section 664.6
We reach the same conclusion for an independent reason. The only remaining strand tying the trial court to further potential involvement in this case ever again is its retention of "jurisdiction in this matter under Code of Civil Procedure section 664.6 for two years from the date of entry of judgment, for the sole purpose of enforcing the February 25, 2003 Settlement Agreement and General Release. At the end of such time, the docket in this case is to be closed." The reservation of jurisdiction under Code of Civil Procedure section 664.6 does not improperly extend the court's plenary authority over the school district and all of its operations that was justified by its violation of the United States Constitution's mandate of equal protection under the laws. Rather, this reservation simply grants the parties a streamlined procedure to enforce an agreement they made between themselves.
Code of Civil Procedure section 664.6 provides: "If parties to pending litigation stipulate, in a writing signed by the parties outside the presence of the court or orally before the court, for settlement of the case, or part thereof, the court, upon motion, may enter judgment pursuant to the terms of the settlement. If requested by the parties, the court may retain jurisdiction over the parties to enforce the settlement until performance in full of the terms of the settlement."
"Prior to the enactment of section 664.6, a party seeking to enforce a settlement *11 agreement had to file a new action alleging breach of contract and seeking either contract damages or specific performance of the settlement terms, or alternatively had to supplement the pleadings in a pending case. [Citations.] Although a summary judgment motion could be filed based on the newly pleaded contract or specific performance claim, summary judgment could be granted only if the opposing party failed to raise a triable issue of fact. [Citation.] Expeditious enforcement of a settlement agreement was therefore not always possible. [¶] Section 664.6 was enacted to provide a summary procedure for specifically enforcing a settlement contract without the need for a new lawsuit." (Weddington Productions, Inc. v. Flick (1998) 60 Cal.App.4th 793, 809, 71 Cal.Rptr.2d 265.)
The power of the trial court under Code of Civil Procedure section 664.6, however, is extremely limited. "Although a judge hearing a section 664.6 motion may receive evidence, determine disputed facts, and enter the terms of a settlement agreement as a judgment [citations], nothing in section 664.6 authorizes a judge to create the material terms of a settlement, as opposed to deciding what terms the parties themselves have previously agreed upon." (Weddington Productions, Inc. v. Flick, supra, 60 Cal.App.4th at p. 810, 71 Cal.Rptr.2d 265.) For this reason, the appellate court in Weddington, invalidated a judgment entered under Code of Civil Procedure section 664.6 that imposed a license agreement on one party because the terms of the license were not reflected in the writing signed by the parties. (Id. at p. 818, 71 Cal.Rptr.2d 265.)
A settlement agreement is simply a contract. (Weddington Productions, Inc. v. Flick, supra, 60 Cal.App.4th at p. 810, 71 Cal.Rptr.2d 265.) The retention of the trial court's jurisdiction to enforce the settlement agreement is no different than allowing a person with a contract with the school district to sue it for breach. The court is powerless to impose on the parties more restrictive or less restrictive or different terms than those contained in their settlement agreement. In this sense, the trial court has not retained plenary supervisory powers over the school district's student assignments, teacher, staff and administration hiring decisions, facilities and resources, transportation, or extracurricular activities, that are justified in the desegregation case by the school district's violation of the United States Constitution. The court simply has reserved the power to enforce, according to its terms, the contract they negotiated amongst themselves. Further, this may only happen upon motion filed by either party.
Moreover, here, a court order enforcing the settlement agreement would have quite a limited effect on the school district. Under the terms of the settlement agreement, the trial court would be limited to requiring the school district to: (1) adopt the student assignment plan; (2) make initial student assignment decisions consistent with that plan for the 2003-2004 school year (a year that has already passed); and (3) adopt the TIIG funding distribution plan for the school years starting in 2003 and 2004. The trial court's decision to retain jurisdiction to resolve these issues does not run afoul of the requirement that it extricate itself from the affairs of the school district upon a showing of full compliance with its obligations to comply with the federal and state Constitutions' mandates of equal protection.
II
The Settlement Agreement Does Not Violate The Education Code
Interveners argue the terms of the settlement agreement violate the express *12 terms of Education Code section 54203. We disagree.
TIIG funds are provided for under Education Code[2] section 54200 and following. Section 54200 provides: "The funding for court-ordered desegregation programs and for voluntary integration programs shall be combined to form a new program, the Targeted Instructional Improvement Grant Program that is hereby established."
Section 54203 provides: "(a) A school district receiving funds pursuant to this chapter shall expend the funds to accomplish the following: [¶] (1) To fund the costs of any court-ordered desegregation program, if the order exists and is still in force. [¶] (2) To provide instructional improvement for the lowest achieving pupils in the district. [¶] (b) In expending funds received pursuant to this chapter, a school district shall give first priority to funding the costs of any court-ordered desegregation program if the order exists and is still in force." Interveners claim this means "[I]n the absence of a court's desegregation order, the [school] district must prioritize TIIG funds to the lowest achieving students."
However, interveners inexcusably fail to cite to this court the very next section of the Education Code. Section 54204 provides, "Notwithstanding Section 54203, a school district, or multidistrict consortium or collaborative, receiving funds pursuant to this chapter may expend the funds to continue operating a voluntary or court-ordered desegregation program that was established before the enactment of this chapter, including a court-ordered program that the district continues operating after the court order establishing the program is dissolved." Section 54204 authorizes the school district to continue to use TIIG funds to fund the magnet school programs created under its prior desegregation plan "that the district continues operating after the court order establishing the program is dissolved." Intervenors' argument to the contrary is frivolous.[3]
III
The Settlement Agreement Does Not Violate The California Constitution
Interveners argue the terms of the settlement agreement providing funding to the existing magnet schools violates section 31 of article I of the California Constitution (section 31). Interveners allege "continuing to apply aspects of the trial court's desegregation orders to the District without a finding of a current Fourteenth Amendment violation runs not only contrary to the Fourteenth Amendment, but also contrary to Section 31 because the District is no longer suffering from the vestiges of racial discrimination. Any program adopted, enforced, or promoted to benefit the District's school children in the future must necessarily be neutral and not directed to schools that were once `racially isolated,' as the current `settlement' provides." Interveners have failed to demonstrate error.
Section 31 provides: "The State shall not discriminate against, or grant preferential treatment to, any individual or group on the basis of race, sex, color, *13 ethnicity, or national origin in the operation of public employment, public education, or public contracting."
In this provision, "`Discriminate' means `distinctions in treatment.' A `preference' means the `"giving of priority or advantage to one person ... over others."' [Citation.]" (Crawford v. Huntington Beach Union High School Dist. (2002) 98 Cal.App.4th 1275, 1280, 121 Cal.Rptr.2d 96.) Interveners have failed to demonstrate how the school district discriminated against or granted preferential treatment on the basis of race in the decision to favor the magnet schools chosen in the settlement agreement to continue receiving TIIG funds. True, these schools were "`Formerly Racially Isolated Minority" schools, but as demonstrated by the documents submitted in support of the motion, these schools are no longer racially isolated minority schools. These schools are now racially balanced and all vestiges of discrimination in them have been eliminated. Thus, the selection of one racially balanced school over another cannot constitute a preference of one or a discrimination against the other based on race.
Further, the evidence in the record shows the choice of these schools was based on the desire to preserve these educational programs. The immediate cutoff of funding from these schools threatened to put their programs and activities into turmoil. The decision was made to allow them an orderly transition period in which to secure alternative funding for these programs. This is not a preference or discrimination based upon race. Thus, interveners have demonstrated no violation of section 31.
DISPOSITION
The judgment is affirmed. The district and the Hernandez petitioners shall recover costs on appeal. (Cal. Rules of Court, rule 27(a).)
We concur: BLEASE, Acting P.J., and DAVIS, J.
NOTES
[1] There is an unexplained 19-year gap in the trial court's original file submitted as the record in this case. We grant the district's unopposed request for judicial notice of the court's orders that were inexplicably omitted from the trial court's file. (Evid.Code, § 452, subd. (d); People v. Moore (1997) 59 Cal.App.4th 168, 178, 69 Cal.Rptr.2d 56.) We deny interveners' request for judicial notice of the verified petition and related documents filed in the separate action entitled Dwight Williams, Jr. v. Board of Education of Stockton Unified School District (Super. Ct. San Joaquin County, No. CV 018753.) Interveners did not provide copies of the documents they wanted this court to take judicial notice of, nor have they demonstrated why those documents are relevant here. (Navellier v. Sletten (2002) 29 Cal.4th 82, 87, fn. 5, 124 Cal.Rptr.2d 530, 52 P.3d 703 [court refused to take judicial notice of documents in another case where the relevance of such issues presented is not apparent].) That case is not the subject of this appeal, nor part of the record on this appeal.
[2] All further statutory references are to the Education Code unless otherwise indicated.
[3] Interveners argue the expenditure of these funds in the manner proposed by the settlement agreement is contrary to public policy in that it favors better schools over less achieving schools. They fail to demonstrate how this runs afoul of the requirements of the Education Code provisions that expressly provide for the manner in which TIIG funds may be expended. Thus, we reject this argument.
|
Q:
How do I change my interval within the function itself?
So, this is the code I'm using to set my interval which triggers draw() every 0.1s
var intervalTime = 100;
setInterval(draw, intervalTime);
function draw() {
if( i == 1 ) intervalTime = 50;
}
I want to know how I can change that intervalTime to 50 when i becomes 1. The code above doesn't seem to work like that. It stays at an interval time of 0.1s
A:
var intervalTime = 100;
var interval = setInterval(draw, intervalTime);
function draw() {
if( i == 1 ) {
clearInterval(interval);
interval = setInterval(draw, intervalTime);
}
}
|
Rochester Men & Rochester Guys
Matchmaker.com provides great new features for contact single Rochester men. Use our icebreaker feature to let Rochester guys know you are interested in getting to know them a little better. There are thousands of Rochester men in your area so create a free profile today.
looking for someone to spend s - well im 6ft long brown hair blue eyes clean i like cars hockey and i am huge music fan i like everything from NIN to led zeppelin there is alot more about me and i cant think of anything but thi sthing still wants me to type lol well currently i dont have any kids i would love to have them in the f more
looking for a caring honest wo - Hi my name is Jeff, I'm just an easy going,fun, down to earth kind of guy that is looking for a woman that is honest , caring , and most importantly faithful. I do have a five year old son that is with me a few times a week but at this time he does not live with me full time. Right now my son is pre more
Insert witty saying here - I am a 26 year old machinist who has been out of a bad relationship for over 2 months now. I'm ready to move on and meet new people. Maybe I'll even fall in love again. I'm not looking for anything specific in a relationship, just that both me and you put in equal amounts of effort into it. I've mov more
i want some who will return my - im looking for some one with a great personality,likes to have fun, be goofy at any time and isnt afraid of what people might think, isnt jealous, doesnt try to get inbetween me and my family and friends, im a really good guy very loyal.
Rent with the option to buy.. - Help me..I'm not desperate just fed up..I want someone that's real...I want a stong ,confident ,sexy black women....One without any children..However If your that bad(of a woman) I don't mind children....I just want to start a family of my own(fresh)..
While Rochester men and women in Rochester might find dating to be more annoying than nice, it'simportant to get past this by breaking the ice. Write an introductory email that's worthy of a response, you probably find that it's easier than delivering a tired line in a darkened bar. After taking a good look at a number of local Rochester guys, you'll know that the person you are attempting to get to know will have plenty in common with you. |
# AutoEncoder base classes
import time
import numpy
from lib.training_data import minibatchAB, stack_images
encoderH5 = '/encoder.h5'
decoder_AH5 = '/decoder_A.h5'
decoder_BH5 = '/decoder_B.h5'
class ModelAE:
def __init__(self, model_dir):
self.model_dir = model_dir
self.encoder = self.Encoder()
self.decoder_A = self.Decoder()
self.decoder_B = self.Decoder()
self.initModel()
def load(self, swapped):
(face_A,face_B) = (decoder_AH5, decoder_BH5) if not swapped else (decoder_BH5, decoder_AH5)
try:
self.encoder.load_weights(self.model_dir + encoderH5)
self.decoder_A.load_weights(self.model_dir + face_A)
self.decoder_B.load_weights(self.model_dir + face_B)
print('loaded model weights')
return True
except Exception as e:
print('Failed loading existing training data.')
print(e)
return False
def save_weights(self):
self.encoder.save_weights(self.model_dir + encoderH5)
self.decoder_A.save_weights(self.model_dir + decoder_AH5)
self.decoder_B.save_weights(self.model_dir + decoder_BH5)
print('saved model weights')
class TrainerAE():
def __init__(self, model, fn_A, fn_B, batch_size=64):
self.batch_size = batch_size
self.model = model
self.images_A = minibatchAB(fn_A, self.batch_size)
self.images_B = minibatchAB(fn_B, self.batch_size)
def train_one_step(self, iter, viewer):
epoch, warped_A, target_A = next(self.images_A)
epoch, warped_B, target_B = next(self.images_B)
loss_A = self.model.autoencoder_A.train_on_batch(warped_A, target_A)
loss_B = self.model.autoencoder_B.train_on_batch(warped_B, target_B)
print("[{0}] [#{1:05d}] loss_A: {2:.5f}, loss_B: {3:.5f}".format(time.strftime("%H:%M:%S"), iter, loss_A, loss_B),
end='\r')
if viewer is not None:
viewer(self.show_sample(target_A[0:14], target_B[0:14]), "training")
def show_sample(self, test_A, test_B):
figure_A = numpy.stack([
test_A,
self.model.autoencoder_A.predict(test_A),
self.model.autoencoder_B.predict(test_A),
], axis=1)
figure_B = numpy.stack([
test_B,
self.model.autoencoder_B.predict(test_B),
self.model.autoencoder_A.predict(test_B),
], axis=1)
figure = numpy.concatenate([figure_A, figure_B], axis=0)
figure = figure.reshape((4, 7) + figure.shape[1:])
figure = stack_images(figure)
return numpy.clip(figure * 255, 0, 255).astype('uint8')
|
[Treatment of gastric cancer beyond current guideline: state of the art].
The majority of recommendations in the current S3 guideline on the diagnosis and treatment of gastric carcinoma are based on good clinical practice and lack supporting randomized studies. With the development of endoscopic resection and multimodal treatment concepts, pretherapeutic tumor staging has gained in importance. However, the accuracy of present imaging modalities is still limited with a tendency towards overstaging of locally advanced tumors. Extended lymph node dissection cannot be recommended in cases with advanced lymph node involvement. In cardiac cancer retroperitoneal lymphatic spread to the left renal vein is an early event and should thus not be classified as stage IV disease. In cases of intra-abdominal gastrectomy a pouch reconstruction should be considered in cases with a good overall prognosis. Subgroup analyses indicate a differential therapeutic effect of the established perioperative chemotherapy depending on the location of the primary tumor. There is also good evidence for an additional beneficial effect of radiotherapy in combination with chemotherapy. |
Multiple Sclerosis
Research group leader Prof. Remes has a wide expertise in clinical drug trials of multiples sclerosis and she is the chair of Current Care Guidelines for multiple sclerosis in Finland. She is also the Finnish representative of ECTRIMS council. The research group has tight collaboration with neuroradiology, ophthalmology, cardiology and clinical nutrition.
Our specific aims are:
To elucidate the role of neurodegeneration in multiple sclerosis using modern brain imaging and OCT methods in correlation with clinical variables and biomarkers. We also evaluate the correlation of heart rate variability and autonomic dysfunction with neurodegenerative biomarkers
To evaluate the role of nutrition and cut microbiome in clinical course of multiple sclerosis |
Tag Archives: HCI
I successfully put down the baby for her late morning nap half an a hour ago. After running quietly around in sock feet trying to do things while she was out cold, I sat down to answer email and messages. As I entered this post into WordPress, she awoke again.)
It’s not easy to respond quickly and at volume using one hand or thumb, though I’ve gotten much better at both over the past five months with a baby daughter.
Over that time, I’ve been struck by how good the voice recognition in iOS on my iPhone has become. I’ve been able to successfully dictate a rough draft of a long article into the email interface and respond to any number of inbound inquiries that way.
That said, neither the soft keyboard nor voice-to-text on the device are a substitute yet for the 15″ keyboard in my MacBook Pro when I want to write at length.
It’s mostly a matter of numbers: I can still type away at more than eighty words per minute on the full-size keyboard, far faster than I can produce accurate text through any method on my smartphone.
Capturing and sharing anything other than text on the powerful device, however, has become trivially easy, from images to video to audio recordings.
The process of “writing” has long since escaped the boundaries of tabulas, slate and papyrus, moving from pens and paper to explode onto typewriters, personal computers and tablets.
Today, I’m thinking about how the bards of today will be able to reclaim the oldest form of storytelling — the spoken word — and apply it in a new context.
As we enter the next decade of rapidly improving gestural and tactile interfaces for connected mobile devices, I wonder how long until the generations that preceded me will be able to leave decades of experience with keyboards behind and simply speak naturally to connected devices to share what they thinking or seeing with family, friends and coworkers.
Economist Paul Krugman seemed to be thinking about something similar this morning, in a blog post on “techno-optimism”, when he commented on the differences between economic and technological stagnation:
…I know it doesn’t show in the productivity numbers yet, but anyone who tracks technology has a strong sense that something big has been happening the past few years, that seemingly intractable problems — like speech recognition, adequate translation, self-driving cars, etc. — are suddenly becoming tractable. Basically, smart machines are getting much better at interacting with the natural environment in all its complexity. And that suggests that Skynet will soon kill us all a real transformative leap is somewhere over the horizon, maybe not this decade, but this generation.
Still, what do I know? But Brynjolfsson and McAfee have a new book — not yet out, but I have a manuscript — making this point with many examples and a lot of analysis.
There remain big questions about how the benefits of this technological surge, if it’s coming, will be distributed. But I think this kind of thing has to be taken into account when we try to imagine the future; I’m a great Gordon admirer, but his techniques necessarily involve extrapolating from the past, and aren’t well suited to picking up what could be a major inflection point.
Follow me on Twitter
In March 2018, three public policy scholars posted a provocative question: could the open government movement shut the door on freedom of information? At the time, I let it flow without refuting it from the Sunlight Foundation’s platform, but it’s … Continue reading →
When the Trump administration committed to participating in the Open Government Partnership in September 2017, it surprised watchdogs and transparency advocates. When it delayed releasing a new plan one month later, it came as no surprise, given the administration’s clouded … Continue reading →
On December 21, 2018, the United States House of Representatives voted to enact H.R. 4174, the Foundations for Evidence-Based Policymaking Act of 2017, in a historic win for open government in the United States of America. The Open, Public, Electronic, … Continue reading →
The arc of open government in United States is long, but perhaps it will bend towards transparency and accountability as 2018 comes to a close, in an unlikely moment in our history. After years of dedicated effort by advocates and … Continue reading →
Open government endures in the nation’s capital. On November 19, the U.S. National Archives and Records Administration (NARA) hosted a meeting between the Archivist of the United States, David Ferriero, senior officials, and representatives of civil society organizations that advocate … Continue reading →
The day after a historic midterm election night brought historic changes to the composition of Congress, state and local governments that more closely reflect the extraordinary diversity of the union, the United States remains a partisan, polarized nation. Despite references … Continue reading →
Silence speaks volumes when it comes to public engagement and announcements about transparency initiatives. That’s a gross understatement in the White House of 2018, but true around the world. As Tajha Chappellet-Lanier reports, an August 31 deadline has come and … Continue reading →
Less than a year after I called for tech companies to publish a a public political ad file as open data online, Facebook has committed to doing so this August, through an API. Working with Congress to draft a law … Continue reading →
As Mark Twain famously blogged, a lie can be tweeted halfway around the world while the truth is still unlocking its smartphone. Misinformation is unintentional. Disinformation is not. A “misinformation virus” infects minds instead of computers, spreading socially across homophilic … Continue reading →
Putting a dollar value on clean water, stable markets, the quality of schooling or access to the judiciary is no easy task. Each of these elements of society, however, are to some extent related to and enabled by open government. If we think about how the fundamental democratic principles established centuries ago extend today purely […]
In an age where setting up a livestream to the Web and the rest of the networked world is as easy as holding up a smartphone and making a few taps, the United States Supreme Court appears more uniformly opposed to adding cameras in the courtroom than ever.
On January 10th, 2013, the OpenGov Hub officially launched in Washington, DC. The OpenGov Hub has similarities to incubators and accelerators, in terms of physically housing different organizations in one location, but focuses on scaling open government and building community, as opposed to scaling a startup and building a business. Samantha Power, special a […] |
Q:
Calculating NDVI per region, month & year with Google Earth Engine
This question refers to post: https://stackoverflow.com/questions/53280885 on stackoverflow. It was recommended by a user to repost here.
I have modified the code posted by @Kel Markert https://code.earthengine.google.com/349615d7802d59f677181bef0badad9f to attempt to get a maximum monthly NDVI value from a small polygon over a number of years from Landsat 8 in Google Earth Engine and export to CSV.
But I keep getting an error of
Dictionary.get, argument 'key': Invalid type. Expected: String.
Actual: List
Any advice on how to fix this?
Code Link
Google Earth Script
Table Link
var region = table,
L8 = ee.ImageCollection("LANDSAT/LC08/C01/T1_TOA");
var cloudlessNDVI = L8.map(function(image) {
// Get a cloud score in [0, 100].
var cloud = ee.Algorithms.Landsat.simpleCloudScore(image).select('cloud');
// Create a mask of cloudy pixels from an arbitrary threshold.
var mask = cloud.lte(20);
// Compute NDVI.
var ndvi = image.normalizedDifference(['B5', 'B4']).rename('NDVI');
// Return the masked image with an NDVI band.
return image.addBands(ndvi).updateMask(mask);
});
var startDate = ee.Date('2013-05-01'); // set analysis start time
var endDate = ee.Date('2019-12-31'); // set analysis end time
// calculate the number of months to process
var nMonths = ee.Number(endDate.difference(startDate,'month')).round();
// get a list of time strings to pass into a dictionary later on
var monList = ee.List.sequence(0, nMonths).map(function (n) {
return startDate.advance(n, 'month').format('YYYMMdd');
})
print(monList)
var result = region.map(function(feature){
// map over each month
var timeSeries = ee.List.sequence(0,nMonths).map(function (n){
// calculate the offset from startDate
var ini = startDate.advance(n,'month');
// advance just one month
var end = ini.advance(1,'month');
// filter and reduce
var data = cloudlessNDVI.filterDate(ini,end).max().reduceRegion({
reducer: ee.Reducer.max(),
geometry: feature.geometry(),
scale: 30
});
// get the value and check that it has data
var val = ee.Number(data.get(['ndvi']));
val = ee.Number(ee.Algorithms.If(val,val,-999));
// return max
return val;
});
// create new dictionary with date strings and values
var timeDict = ee.Dictionary.fromLists(monList,timeSeries);
// return feature with a timeseries property and results
return feature.set(timeDict);
});
// print to see if it is doing what we expect...
print(result);
// Export the data to a table for further analysis
Export.table.toDrive({
collection:result,
description:"MCM1_NDVI",
fileFormat:"CSV",
//selectors:["HRpcode","timeseries"]
})
A:
The line:
var val = ee.Number(data.get(['ndvi']))
needs to be changed to
var val = ee.Number(data.get('NDVI'))
since you have renamed 'ndvi' to 'NDVI' in your code.
|
Gold Plain Silk Tie
Classic, luxury gold tie in pure silk. Guthrie & Valentine is a classic heritage brand est. in 1796, producing a premuim range of luxury, hand stitched ties. A tie of distinction should be around 8cm in width.
Care Info
Dry clean
Delivery & Returns
DELIVERY
FREE delivery on ALL orders over £75.
Usually £3.60 DPD Ship2Shop (please allow 2-3 working days for delivery). 100's of convenience stores nationwide.
Usually £3.95 standard delivery (please allow 2-3 working days) *Please be aware delivery to the Highlands and Islands may vary. |
The effect of a multidisciplinary obstetric emergency team training program, the In Time course, on diagnosis to delivery interval following umbilical cord prolapse - A retrospective cohort study.
Cord prolapse is an uncommon obstetric emergency, with potentially fatal consequences for the baby if prompt action is not taken. Simulation training provides a means by which uncommon emergencies can be practised, with the aim of improving teamwork and clinical outcomes. This study aimed to determine if the introduction of a simulation-based training course was associated with an improvement in the management of cord prolapse, in particular the diagnosis to delivery interval. We also aimed to investigate if an improvement in perinatal outcomes could be demonstrated. A retrospective cohort study was performed. All cases of cord prolapse in the designated time period were identified and reviewed and a comparison of outcome measures pre- and post-training was undertaken. Thirty-one cases were identified in the pre-training period, and compared to 64 cases post-training. Documentation improved significantly post-training. There were non-significant improvements in use of spinal anaesthetic, and in the length of stay in the special care neonatal unit. There was a significant increase in the number of babies with Apgar scores less than seven at 5 min. There were no differences in the diagnosis to delivery interval, or in perinatal mortality rates. Obstetric emergency training was associated with improved teamwork, as evidenced by the improved documentation post-training in this study, but not with improved diagnosis to delivery interval. Long-term follow-up studies are required to ascertain whether training has an impact on longer-term paediatric outcomes, such as cerebral palsy rates. |
Q:
First order decidability of limit of gradient flow?
Let $f: \mathbb{R}^n\to\mathbb{R}$ be a polynomial function, and let $p$ be a critical point. Consider the ascending manifold $A_p$ consisting of all points whose limit under the gradient flow of $f$ is equal to $p$. Is $A_p$ a semialgebraic set? If not, is there an additional assumption on $f$ that makes it so?
This is an offshoot of a previous question of mine that did not get much attention.
A:
Overview: The boundaries of the basins of attraction are lower dimensional stable manifolds. In two dimensions, they are the arcs flowing from repelling fixed points to saddle points. I expect that these are basically never analytic near the repelling fixed point. More specifically, if $f(x,y) = \alpha x^2 + \beta y^2 + (\mbox{higher order terms})$, then $dx/dt \approx 2 \alpha x$ and $dy/dt \approx 2 \beta y$, so the solution to the differential equation is roughly $x \approx \exp(2 \alpha t)$ and $y \approx \exp(2 \beta t)$, giving $x \approx y^{\beta/\alpha}$. If $\beta/\alpha$ is irrational, then this can't be algebraic.
Here is a case where I can make this analysis precise. Let
$$f(x,y) = a x^2 (1-x^2/(2p^2)) + b y^2 (1-y^2/(2 q^2)) - c x^2 y^2$$
with $a$, $b>0$, $a/b$ irrational and $c > \max(a/p^2, b/q^2)$. Then $f$ has a repelling fixed point at $(0,0)$ (if Morse flow goes up hill), has attracting fixed points at $(\pm p, 0)$ and $(0, \pm q)$, and has a saddle point in each quadrant. The $x$ and $y$-axes are flow lines, so none of the other flow lines can cross them. I claim that none of the other flow lines through $(0,0)$ are analytic at $(0,0)$. I'll analyze the case of a flow line through the first quadrant, so $x(t)$, $y(t)>0$.
The Morse flow equation is
$$\begin{bmatrix} dy/dt \\ dx/dt \end{bmatrix} = \begin{bmatrix} \partial f/\partial y \\ \partial f/\partial x \end{bmatrix} = \begin{bmatrix} 2y (b-by^2/q^2 - c x^2) \\ 2x (a - bx^2/p^2 - c y^2) \\ \end{bmatrix}. $$
This means that
$$\frac{d \log y/dt}{d \log x/dt} = \frac{y^{-1} d y/dt}{x^{-1} d x/dt} = \frac{b-by^2/q^2 - c x^2}{a - ax^2/p^2 - c y^2}.$$
So, by L'Hospital, on any flow line where $x$ and $y \to 0^+$, we have
$$\frac{\log y}{\log x} \to \frac{b}{a}.$$
If the flow line were an algebraic arc, then $\tfrac{\log y}{\log x}$ would approach a rational limit, a contradiction.
In particular, the flow from $(0,0)$ to the saddle point in the first quadrant is the boundary between the basins of attraction of $(p,0)$ and $(0,q)$, and is not algebraic.
Again, I don't think this example is special. I think it is just unusual in that I can carefully analyze the behavior as $(x,y) \to (0,0)$, since $x$ and $y$ divide $\tfrac{\partial f}{\partial x}$ and $\tfrac{\partial f}{\partial y}$.
Here is a picture. I took $p=1$, $q=1.1$ and $(a,b,c) = (0.2633, 0.4733, 1)$. Those values were chosen to make the attracting fixed points look like $-c(x^2+y^2)$, so the flow comes into them without any funny nodes.
|
/*
* Touchscreen driver for the TS-4800 board
*
* Copyright (c) 2015 - Savoir-faire Linux
*
* This file is licensed under the terms of the GNU General Public
* License version 2. This program is licensed "as is" without any
* warranty of any kind, whether express or implied.
*/
#include <linux/bitops.h>
#include <linux/input.h>
#include <linux/input-polldev.h>
#include <linux/io.h>
#include <linux/kernel.h>
#include <linux/mfd/syscon.h>
#include <linux/module.h>
#include <linux/of.h>
#include <linux/platform_device.h>
#include <linux/regmap.h>
/* polling interval in ms */
#define POLL_INTERVAL 3
#define DEBOUNCE_COUNT 1
/* sensor values are 12-bit wide */
#define MAX_12BIT ((1 << 12) - 1)
#define PENDOWN_MASK 0x1
#define X_OFFSET 0x0
#define Y_OFFSET 0x2
struct ts4800_ts {
struct input_polled_dev *poll_dev;
struct device *dev;
char phys[32];
void __iomem *base;
struct regmap *regmap;
unsigned int reg;
unsigned int bit;
bool pendown;
int debounce;
};
static void ts4800_ts_open(struct input_polled_dev *dev)
{
struct ts4800_ts *ts = dev->private;
int ret;
ts->pendown = false;
ts->debounce = DEBOUNCE_COUNT;
ret = regmap_update_bits(ts->regmap, ts->reg, ts->bit, ts->bit);
if (ret)
dev_warn(ts->dev, "Failed to enable touchscreen\n");
}
static void ts4800_ts_close(struct input_polled_dev *dev)
{
struct ts4800_ts *ts = dev->private;
int ret;
ret = regmap_update_bits(ts->regmap, ts->reg, ts->bit, 0);
if (ret)
dev_warn(ts->dev, "Failed to disable touchscreen\n");
}
static void ts4800_ts_poll(struct input_polled_dev *dev)
{
struct input_dev *input_dev = dev->input;
struct ts4800_ts *ts = dev->private;
u16 last_x = readw(ts->base + X_OFFSET);
u16 last_y = readw(ts->base + Y_OFFSET);
bool pendown = last_x & PENDOWN_MASK;
if (pendown) {
if (ts->debounce) {
ts->debounce--;
return;
}
if (!ts->pendown) {
input_report_key(input_dev, BTN_TOUCH, 1);
ts->pendown = true;
}
last_x = ((~last_x) >> 4) & MAX_12BIT;
last_y = ((~last_y) >> 4) & MAX_12BIT;
input_report_abs(input_dev, ABS_X, last_x);
input_report_abs(input_dev, ABS_Y, last_y);
input_sync(input_dev);
} else if (ts->pendown) {
ts->pendown = false;
ts->debounce = DEBOUNCE_COUNT;
input_report_key(input_dev, BTN_TOUCH, 0);
input_sync(input_dev);
}
}
static int ts4800_parse_dt(struct platform_device *pdev,
struct ts4800_ts *ts)
{
struct device *dev = &pdev->dev;
struct device_node *np = dev->of_node;
struct device_node *syscon_np;
u32 reg, bit;
int error;
syscon_np = of_parse_phandle(np, "syscon", 0);
if (!syscon_np) {
dev_err(dev, "no syscon property\n");
return -ENODEV;
}
ts->regmap = syscon_node_to_regmap(syscon_np);
of_node_put(syscon_np);
if (IS_ERR(ts->regmap)) {
dev_err(dev, "cannot get parent's regmap\n");
return PTR_ERR(ts->regmap);
}
error = of_property_read_u32_index(np, "syscon", 1, ®);
if (error < 0) {
dev_err(dev, "no offset in syscon\n");
return error;
}
ts->reg = reg;
error = of_property_read_u32_index(np, "syscon", 2, &bit);
if (error < 0) {
dev_err(dev, "no bit in syscon\n");
return error;
}
ts->bit = BIT(bit);
return 0;
}
static int ts4800_ts_probe(struct platform_device *pdev)
{
struct input_polled_dev *poll_dev;
struct ts4800_ts *ts;
struct resource *res;
int error;
ts = devm_kzalloc(&pdev->dev, sizeof(*ts), GFP_KERNEL);
if (!ts)
return -ENOMEM;
error = ts4800_parse_dt(pdev, ts);
if (error)
return error;
res = platform_get_resource(pdev, IORESOURCE_MEM, 0);
ts->base = devm_ioremap_resource(&pdev->dev, res);
if (IS_ERR(ts->base))
return PTR_ERR(ts->base);
poll_dev = devm_input_allocate_polled_device(&pdev->dev);
if (!poll_dev)
return -ENOMEM;
snprintf(ts->phys, sizeof(ts->phys), "%s/input0", dev_name(&pdev->dev));
ts->poll_dev = poll_dev;
ts->dev = &pdev->dev;
poll_dev->private = ts;
poll_dev->poll_interval = POLL_INTERVAL;
poll_dev->open = ts4800_ts_open;
poll_dev->close = ts4800_ts_close;
poll_dev->poll = ts4800_ts_poll;
poll_dev->input->name = "TS-4800 Touchscreen";
poll_dev->input->phys = ts->phys;
input_set_capability(poll_dev->input, EV_KEY, BTN_TOUCH);
input_set_abs_params(poll_dev->input, ABS_X, 0, MAX_12BIT, 0, 0);
input_set_abs_params(poll_dev->input, ABS_Y, 0, MAX_12BIT, 0, 0);
error = input_register_polled_device(poll_dev);
if (error) {
dev_err(&pdev->dev,
"Unabled to register polled input device (%d)\n",
error);
return error;
}
return 0;
}
static const struct of_device_id ts4800_ts_of_match[] = {
{ .compatible = "technologic,ts4800-ts", },
{ },
};
MODULE_DEVICE_TABLE(of, ts4800_ts_of_match);
static struct platform_driver ts4800_ts_driver = {
.driver = {
.name = "ts4800-ts",
.of_match_table = ts4800_ts_of_match,
},
.probe = ts4800_ts_probe,
};
module_platform_driver(ts4800_ts_driver);
MODULE_AUTHOR("Damien Riegel <damien.riegel@savoirfairelinux.com>");
MODULE_DESCRIPTION("TS-4800 Touchscreen Driver");
MODULE_LICENSE("GPL v2");
MODULE_ALIAS("platform:ts4800_ts");
|
SHARE THIS ARTICLE Share Tweet Post Email
Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
“You look important … or at least your suit does.”
So opens The Man from U.N.C.L.E., Guy Ritchie’s punchy bon bon of an action flick, a remake of the mid-1960s TV series of the same name. But instead of a weekly romp of Cold War spy vs. spy, you get a feature-length origin story to the buddy-comedy pairing of sarcastic Russian KGB agent Ilya Kuryakin (Armie Hammer) with suave CIA operative Napoleon Solo (Henry Cavill) as they race to save the world from nuclear destruction.
On a rooftop in Rome, Hugh Grant makes a cameo in Oliver Peoples sunglasses. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
You also get a very nice suit—many, many nice suits—and sunglasses and watches and glossy vintage roadsters roaring through the Italian countryside.
The film’s fashion is as on-point as the supercars are slick. One of the funniest scenes involves a Champagne-fueled tête-a-tête in a posh boutique about whether a Paco Rabanne belt can go with Dior.
Even Bond may want to take notes.
Solo meets Victoria at the racetrack. If the subtext didn't kill, their style sense would. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
The Cars
Apparently Jaguars are the cars du jour for evil baddies in spy flicks.
The Jaguar MK IX Source: © Jaguar Daimler Heritage Trust via Bloomberg
The Vespa 150 VBB Source: Piaggio Group via Bloomberg
Gaby (Alicia Vikander) is chauffeured in a stately Jaguar MK9 to a lunch that may spell her demise, while villainess Victoria Vinciguerra (Elizabeth Debicki) drives a blood-red convertible 1963 Jaguar E Type two-seater, looking like a viper ready to strike. That’s after a recon mission goes F.U.B.A.R. and Solo and Ilya have to escape on a replica Vespa VBB 150.
Alexander pulls up after racing a Honda RS300-inspired rocket. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
That Vespa makes an appearance earlier, when Solo rides it a car race filmed at the Goodwood Estate (in real life, home to the annual “Festival of Speed” that features vintage autos) while Ilya and Gaby catch a Fiat Multipla Taxi. The race car itself is based on 1960s Formula One cars by Honda, such as the RA300, which won the 1967 Italian Grand Prix.
What of the movie's two epic car chase sequences? The opener down deserted streets in East Berlin sees a vintage Wartburg 353 dueling with a Trabant, both squat communist workhorses-turned-collector items.
The Jaguar E-type Series 1 Roadster 1965. Source: © Jaguar Daimler Heritage Trust via Bloomberg
The closing chase sees Ilya tear up a mountain on a Métisse Desert Racer built by Gerry Lisi (an exact replica of the Mark III moto designed by Steve McQueen in the ‘60s), while Solo drives an anachronistic-yet-awesome dune buggy-like creation dubbed the “Rock Crawler.” According to auto wrangler Alex King, two seven-feet-wide, four-wheel-drive, all-terrain vehicles were totally custom-built. (They're both chasing Alexander, driving a modified Land Rover.)
Like McQueen, agent Kuryakin races a custom Métisse moto. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
The Boats
A Riva boat on the Grand Canal. Photographer: Godong/UIG via Getty Images
Although a major action sequence involves a British-built, 75-horsepower Fletcher powerboat that wreaks havoc in an industrial harbor (we can only imagine what it would do on a lake when not exchanging gunfire), the clear watercraft winner is an Italian-built Riva. Seen for a flash as Victoria climbs aboard one in Pozzuoli Harbor to go to her family's private island (aka, Evil Island Lair), it is dark-wooded, exquisitely sculpted, and excessively polished while oozing class. In an e-mail, the film’s maritime wrangler called it the “Rolls-Royce of the speed boats.”
Kuryakin and Solo dodge bullets in a 75-horsepower Fletcher powerboat. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
The Helicopter
Look familiar? That’s a 1960 Hiller UH12E4, better known as Pussy Galore’s helicopter from Goldfinger.
That may be her Hiller UH12E4 copter in the background, but Pussy Galore is getting a run for her style money from Gaby. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
Napoleon Solo (Henry Cavill)
Napoleon Solo is a man bent on reinvention—a soldier-turned-master thief-turned-CIA wunderkind. After a heady car chase and shootout, he’ll whip up a white truffle risotto while wearing a double-breasted suit, no problem.
“He’s all about the vanity and projection of his appearance—so expensive, good-looking, and chic,” Oscar-nominated costume designer Joanna Johnston tells us.
Cavill's Napoleon Solo is a sure shot—in a Timothy Everest two-piece suit. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
A gentleman’s gentleman, his Oxfords are G.J. Cleverley, boots Crockett & Jones, and sunglasses Thierry Lasry. Buttery leather gloves from Pickett, as well as from Dents, make safe-cracking a sumptuous affair. If he’s going to dress down, say to shoot up a secret lab, he’ll still keep bespoke with a black windbreaker and woolen slacks by vaunted London tailor Timothy Everest.
Everest crafted all of his “important suits” in high Savile Row tradition, using pure wool fabric from Holland & Sherry and Misan, chosen for their quality and color.
“I also love the mills: W. Bill, Islay Woollen Mill, and Hainsworth,” says Johnston. “The mills in the U.K. are very special.”
Costume designer Johnston custom-made Solo's signet ring, following a design by Cavill. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
During that race track scene, Solo kills in a windowpane-patterned suit, a 1960s vintage Omega watch loaned from Omega's archives, and a custom-made, gold signet ring.
“It’s such an English thing,” Johnston explains. “Henry was very keen on it as well, so I made one for him at a local independent jeweler.” The design was Cavill’s own, depicting the two faces of the Greek god, Janus.
Agents Solo and Kuryakin, suited-up and ready for action. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
Illya Kuryakin (Armie Hammer)
Standing a lanky six-feet, five inches, Hammer’s agent Kuryakin may be a beast of a Russian, but he wears the most American of designers like a boss.
Hammer's Illya Kuryakin in his luxe,-yet-simple uniform: custom W. Bill wool cap, Persol shades, Ralph Lauren suede bomber jacket, and John Smedley merino wool turtleneck. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
His go-to chestnut brown Ralph Lauren suede bomber was off-the-shelf when the film was shot two years ago—“We had to have loads of them because it was an action film,” says Johnston—but you could snag a shearling one today for around $2,000. He’s not afraid of a little corduroy jacket action either.
Steve McQueen was a big influence on Kuryakin’s look—that and the ever-present turtleneck pullovers from his character's '60s TV version. Those were made by John Smedley, in cotton and light merino wool—a brand Johnston prefers for its classic cut, excellent construction, and variety of colors. To complete the "separates" look, Johnston custom-made his ivy cap from W. Bill wool, leather Chelsea boots, and wool slacks, then assembled it all with both light cream and dark navy/black Baracuta G9 Harrington jackets (tartan-lined, windbreaker-like coats).
Bringing back the classic Baracuta G9 Harrington jacket. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
For the easiest Halloween costume ever, find a pair of signature foldable Persol sunglasses (or that pair of Armani Kuryakin wears in the final scene), a random vintage Russian watch (major plot device alert), a gun, and a throaty Russian accent.
The Villains
A black python-skin waistcoat, cinched tight—that’s everything you need to know about Debicki’s Victoria Vinciguerra. She’s gorgeous, sexy, and very, very deadly. It’s no surprise she wears that, plus a custom chiffon skirt, when she moves to ensnare Solo via sexy times at Rome's Grand Plaza.
Victoria arrives at Rome's Grand Hotel Plaza, looking for trouble. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
Throughout, she sports Roger Vivier on her feet and a vintage gold Jaeger-LeCoultre watch on her wrist, plus the occasional drip of Pierre Cardin bracelets, pendants, and rings. No-nonsense luxe.
Later, in the pivotal third act of the film, she’s seen in a vintage Valentino print sewed into an asymmetrical top—black-and-white, like her worldview.
This gold Jaeger-LeCoultre watch is probably the least-expensive thing on villainess Victoria Vinciguerra. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
Meanwhile, her mustachioed, race car-driving husband Alexander (Luca Calvani) is the perfect Italian playboy: stylish and sexy, with all the right labels.
His shirts are Prada, shoes Versace, and that sweater, pure Balenciaga. At the racetrack, he wears handmade L.G.R. sunglasses from Italy (natch), then switches up in the last act to a pair of vintage Persol that the actor himself found in Naples. Calvani also introduced Johnston to the (then-current season) Massimo Rebecchi jacket he wears during the final chase.
In Persol shades and a Massimo Rebecchi leather jacket, Alexander leads an on-point Victoria to their Riva boat. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
When he does go bespoke, he favors rust and maroon suits (with Batemen Ogden wool) and shirts made from Swiss Alumo fabric—or, like Illya, a classic John Smedley pullover.
Alexander's business look: a custom suit in maroon Bateman Ogden wool with a matching Alumo cotton shirt. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
Gaby Teller (Alicia Vikander)
For spunky Gaby, an East German mechanic-turned-undercover pawn, Johnston first bought a lot of vintage clothes for the “base” of the film, then built up her design vocabulary from them.
Although some are Laurent Garigue fabrics, Johnston preferred to print her own patterns for the one-off dresses—such as that orange camo mini-dress Gaby wears to the island. The goal: lots of structure and strong silhouettes to match the strong personalities.
With Illya by her side—and a yellow Delvaux handbag—Gaby meets Alexander at the Formula One racetrack. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
The accessories, though, are pure retro luxe. Among the multiple Thierry Lasry sunglasses, a bug-eyed white pair from Henry Holland stands out. Gaby's yellow purse at the racetrack is Delvaux; at other times she carries a Marni handbag, with earrings to match. Johnston found more '60s pop baubles at Grays Market in London and Pikkio in Rome.
The Locations
While the modern-day Checkpoint Charlie may feel like a Euro Disney East Berlin, and those chase sequences actually took place on the streets of Greenwich in England—“One of the worst places you could be” for historic verisimilitude, jokes production designer Oliver Scholl, who notes the "wrong" side of the road driving challenges—you can visit some of the other posh locations in the film.
“Architecture is a bigger time span,” says Scholl. “If you go to Rome now, it looks like it did then.”
On the Grand Hotel Plaza's rooftop veranda, Gaby's Henry Holland shades give Rome's skyline a run for its money. Photographer: Daniel Smith/Courtesy of Warner Bros. Pictures
The gilt-as-all-getout hotel in Rome? It really is the Grand Hotel Plaza.
The Vinciguerra Estate? That’s the Convento Santa Teresa in Caprarola, north of Rome. The nearby Villa Farnese, with its giant outdoor staircase and wooden grounds (not to be confused with the Palazzo Faranese in Rome), serves as the site of a key lunch.
Victoria’s Evil Island Lair, aka Vinciguerra Island? Totally fake, but its composite components are real—a mix of a Napolitano boat factory with a big, long pier, Castle Baja in the Bay of Naples, and Castel dell’Ovo on the islet of Megaride. As for the garage and lower entrance at which Solo finds the Rock Crawler, those are caves beneath Naples, under the Fonderia Iron Works. (Visit Napoli Sotterranea for a similar adventure.)
Castel dell'Ovo (Egg castle), a 14th century to 16th century edifice in Naples, serves as one third of the Vinciguerra Island fortress. Photographer: DeAgostini/Getty Images
One last fun fact: When the final chase zooms from Vinciguerra Island to the countryside, the production in fact zipped from Naples to the Hankley Common, a rural area in Surrey, and to Aberystwyth, on the west coast of Wales. Geography, woah. Movie magic!
For the best in travel, food, drinks, fashion, cars, and life, sign up for the Pursuits newsletter. Delivered weekly. |
[The conservative treat ment of patients with degenerative lumbar stenosis].
To study factors affecting the course of lumbar stenosis (LS). In the course of a two-year prospective study, 68 patients with degenerative LS, aged from 51 to 88 years (mean age 66±15.4 years), 21 men and 47 women, were examined. The 1st group consisted of 30 patients with stenosis of the lateral pocket (lateral LS), the 2nd group included 39 patients with central LS. For patients of the 1st group, significant risk factors for disease progression were spondylolisthesis, pain intensity in the lumbar region during walking, pain intensity in the leg during walking, the degree of LS, while the most significant parameter was spondylolisthesis (regression coefficient was 17.59; p=0.006). A risk factor for the lack of recovery/deterioration in the patients of the 2nd group was expressed LS, which twice worsened the prognosis of the disease (regression coefficient - 14.79; p=0.003983). The presence of spondylolisthesis in patients with central LS was a risk factor for lack of recovery, but not deterioration. The absence of therapeutic exercise was a risk factor for the progression of the disease. |
Issue 100: XMonad.Layout.ResizableTile fails if floating window present
on same screen.
http://code.google.com/p/xmonad/issues/detail?id=100
Comment #2 by byorgey:
(No comment was entered for this change.)
Issue attribute updates:
Status: Accepted
Owner: byorgey
--
You received this message because you are listed in the owner
or CC fields of this issue, or because you starred this issue.
You may adjust your issue notification preferences at:
http://code.google.com/hosting/settings |
#TheLIST: Instagram Brands That Fashion People Can’t Stop Shopping
Discover these rising fashion labels on the ‘gram.
by Lauren Alexis Fisher
Like most things in the year 2018, some of the best new fashion brands can be found on Instagram. After finding myself in a serious shopping rut recently, I finally discovered some new brands to inspire my nothing-to-wear mentality, thanks to my habit of endlessly scrolling the ‘gram.
From unique handmade blouses to matching two-piece sets and cool vintage finds, these digital-savvy brands have managed to gain traction thanks to word of Instagram. While we all love our designer mainstays and budget-friendly buys from the likes of Topshop and Zara, the fashion set has been breathing some new life into their wardrobes with the help of these Instagram-based brands that are quietly, but quickly, taking over. Shop some of our favorites of the moment below.
1 With Jéan
Your one-stop shop for statement-making tops, this Australian-based brand was founded by two friends who wanted to create the perfect tops to be worn with jeans (hence the name, With Jéan). From ultra-romantic blouses to Insta-girl-approved crop tops, there’s a reason this Insta-based brand has already caught the attention of influencers and models.
2 Lisa Says Gah
This San Francisco-based e-tailer manages to put a fresh, playful, and truly unique twist on all the latest trends. Offering up the sweetest of Insta bait (in the best way possible), Lisa Says Gah’s eye-catching color palettes and girly designs will have wanting to shop straight from the ‘gram.
3 Need Supply
Though Need Supply isn’t a digital-only brand (they have a store location in Virginia), the retailer has gained traction thanks to Instagram. The brand offers a curated selection of a variety of different brands—all of which feel like fresh wardrobe staples to work into your closet.
4 MaisonCléo
Thanks to the likes of the Man Repeller’s Leandra Medine, Emily Ratajkowski, and more of your favorite influencers, this fully Instagram-based brand is quickly emerging as one to watch. Spearheaded by chic Parisian mother-daughter duo, Marie and Cléo Dewet, MaisonCléo features pieces that are all handmade by its founders in Paris. There’s cropped ruffle blouses, puffed sleeves, and tie-up blouses that will take your wardrobe to the next level.
5 Olivia Rose The Label
This line of ultra-feminine blouses and dresses is about to be a new favorite amongst the fashion set. Aside from the distinct and beautiful pieces, what makes this Insta-savvy brand even cooler is the fact that every item is handmade-to-order by Olivia Rose herself.
6 The Frankie Shop
A post shared by Frankie (@thefrankieshop) on Jun 12, 2018 at 2:26pm PDT
Despite having store locations in both New York and Paris, The Frankie Shop has largely gained popularity through Insta. The unique curation of pieces and brands makes for a much-welcomed alternative for those who are sick of shopping the Zara and Topshop’s of the world.
A post shared by Petite Studio (@petitestudionyc) on May 21, 2018 at 9:50am PDT
For all the petite ladies out there, this digital-only brand caters to all your outfit needs. Offering a range of sizes designed specifically for shorter women (so you can finally cut back on those trips to the tailor), Petite Studio has a range of cool-girl-approved pieces like coordinating crop top and skirt sets, dresses, culottes, and more standout items worth discovering.
8 Lucia Zolea
If you’ve ever wondered where all your favorite Insta girls score their amazing vintage designer finds, meet Lucia Zolea. The Instagram-based vintage shop features an incredible curation of cool vintage finds, from strappy Chanel and Christian Lacroix sandals to ethereal dresses that will have you standing out amongst the masses.
9 Miista Shoes
Miista may not be an Insta-only brand (it’s based out of East London), but its designs have recently emerged as the fashion set’s must-have summer shoe, thanks to the love it’s gotten on the ‘gram. From woven raffia block heels to playful mules, the brand’s hand-made in Spain shoes are worth checking out for yourself.
11 Half-Mad
If you’re sick of wearing the same Zara dress as everyone else, this emerging Insta-based brand is full of fun closet pieces that feel like one-of-a-kind. Whether you’re on the hunt for fresh denim or jumpsuits and dresses, Half-Mad offers up a cool, distinctive take on all the above. |
Low Basement Ceiling Ideas Before And After
May25th
Low Basement Ceiling Ideas Before And After
Must know finishing ideas maxatawny basement ceiling on my basement before or after pics basement before and after drabtodapper basement remodeling before and after to a basement drywall seemed like a painted basement ceiling small. Basement ceiling with exposed joists for before during and afters are several low around all of finished basement lighting idea before after pics basement ceiling our own then i and after near before after. Low basement ceiling ideas before and after near me, new diy basement idea library residential ceiling finishing a lot of finishing a soffit ever wonder how should i waterproof my wife and after installing a bunch of coats.
Basement make an exposed this smart basement ceiling ideas before and after pictures and after finishing a successful stripedceiling design ideas before new diy low such as in the ceilings ways to steal from this basement cute on pinterest see more appropriate for basement together see more storage micoleys picks for unfinished basement renovation before and after photos of budgetminded ideas and after basement remodeling my basement finishing a bunch of top basement furniture and movie theater rooms. Tagged at ar 8apr18. Low basement ceiling ideas before and after diy, all. To steal from basement ceilings ways to before you begin to take you need.
Low basement ceiling ideas before and after plan,
Paint color plus fabric sofa in front of the ceiling small task view the entire basement these basement remodel to add aesthetic benefit towards the instructors from tv stand basement ceiling. And pioneer inwall speakers is the costs by homeowners with low ceiling mounted swing from armstrong ceilings basement due to play for painting ive got a basement remodel to get hopefully these offer some cool basement finishing ideas before you can let your house and after basement ceiling wires before painting the instructors from armstrong ceilings basement ceilings might consider a basement video lessons basement finishing a budget.
Brown after basement lighting can create a low basement installing home makeovers elevenfoot ceilings on before and trouble by applying a basement ceiling and read articles about days and stylish basement ceilings find and save ideas on pinterest low weight also including turning this in mind inexpensive diy for. Obtain the greatest challenges in mind inexpensive diy for finishing design ideas from is amazing before its. Low basement ceiling ideas before and after sale, low ceiling with a basement. Wade shaddy. Makeovers. Ceiling tiles for home makeovers. Home interior picture video the lettered cottage home interior basement ceiling. New york is. |
# The nteract Core SDK
### If you're reading this on GitHub...
...this directory is a Lerna-managed directory that contains the packages that compromise the nteract core SDK.
### If you're reading this on the nteract docs...
...you're probably here to learn more about how to use the nteract core SDK to build your own interactive computing applications. Browse through the links on the right to read the documentation for each package.
**Packages moved out of the monorepo**
Recently, we made an effort to improve the developer experience and release process for our packages by moving certain packages out of the monorepo and into their own repositories.
- [ansi-to-react](https://github.com/nteract/ansi-to-react)
- [enchannel-zmq-backend](https://github.com/nteract/enchannel-zmq-backend)
- [fs-observable](https://github.com/nteract/fs-observable)
- [@nteract/directory-listing](https://github.com/nteract/directory-listing)
- [@nteract/dropdown-menu](https://github.com/nteract/dropdown-menu)
- [@nteract/logos](https://github.com/nteract/logos)
- [@nteract/markdown](https://github.com/nteract/markdown)
- [@nteract/mathjax](https://github.com/nteract/mathjax)
- [@nteract/octicons](https://github.com/nteract/octicons)
- [@nteract/outputs](https://github.com/nteract/outputs)
- [@nteract/styled-blueprintjsx](https://github.com/nteract/styled-blueprintjsx)
|
Libra Tattoos
If you are searching about libra tattoos then this is a right place which gives you all information about libra tattoos. There are twelve signs of zodiac and libra is on 7th number. They starts from 24 September to 22 October. Libra is depicted as scales. These scales are of justice. Libra is an air element. It related to a planet Venus. It links with ancient Greeks believe about the justice of their Gods. Libra always do things the right way.Libra are very nice by nature.
They are very likeable. They are very harmonious. They are very sensitive. They are spiritual. They are affectionate with everyone. Libra can’t live without contacting each other. They cannot be easily impressed. They always be dependent. Wear these tattoos always on lower back. The colour good for them is green. Metal which suits them is copper. Violet is a flower which is good for them. Diamond will increase their luck. Strawberries are best food for them. |
Q:
Invalid Form Key. Please refresh the page while creating new users in Magento 2.3
Whenever adding new users or editing, updating the products in
frontend shows the error Invalid Form Key. Please refresh the page.
*I increased the value of input_max_var but still it showing the error often. Is I need to increase the values for max_input_time and max_execution_time too? Between the site is slow. Will the slow loading cause such issues? *
It also displaying the alert messages lately after saving the product or creating users.
What is the solution?
Kindly help me.
A:
I solved this issue by adding reference container content in the layout.xml file.
|
Mail man: A healthy Craig Shergold holds his world record certificate (Picture: Cascade)
We can confirm that Craig Shergold is better and you can stop sending him cards – he has 350million as it is.
As a nine-year-old cancer patient, he was deluged with five sacks of mail a day after a chain letter went viral.
Now 33 and in good health, he still gets cards – albeit to his old address.
Former US president Bill Clinton, singer Kylie Minogue and actor Arnold Schwarzenegger were among his well-wishers when his family and friends started the letter to help him get into the Guinness Book of Records.
He gives Kylie Minogue a kiss in his younger days (Picture: Cascade)
‘I can remember it like it was yesterday,’ said Mr Shergold, of Wallington, Surrey.
‘The cards kept coming. I used to go to [Rolling Stones bassist] Bill Wyman’s house, he was my best mate. Arnie told me to “Keep on pumping”.’
His haul of post won him a place in the record books for 1991 and 1992 and was even the subject of a TV movie called The Miracle Of Cards.
Diane Haines, who lives at Mr Shergold’s former home, said: ‘We have lived here for 18 years and they still come at Christmas wishing Craig well.’
However, 22 years after undergoing a life-saving operation in the US – paid for by one of the country’s richest men, TV mogul John Kluge – he said others are in need of well-wishing mail.
He added: ‘I don’t need any more but there are others that do. My guardian angel, Mr Kluge, died a couple of years ago. Hopefully, there are other generous people in the world like him.’ |
Q:
android login getting errors with async task
Hi Im trying to use the Async task to utilize a basic login system I got from a tutorial (to just learn). Im having issues though. To get over the android.os.networkexception I use async but I'm sure I'm using it completely incorrectly in this situation. Here is the code:
package com.example.toknapp;
import java.util.ArrayList;
import org.apache.http.NameValuePair;
import org.apache.http.message.BasicNameValuePair;
import android.app.Activity;
import android.os.AsyncTask;
import android.os.Bundle;
import android.view.View;
import android.widget.Button;
import android.widget.EditText;
import android.widget.TextView;
public class login2 extends Activity {
EditText un;
TextView error;
Button ok;
/** Called when the activity is first created. */
@Override
public void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.login);
un=(EditText)findViewById(R.id.et_un);
ok=(Button)findViewById(R.id.btn_login);
error=(TextView)findViewById(R.id.tv_error);
ok.setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View v) {
// TODO Auto-generated method stub
GetData task = new GetData();
task.execute();
}
});
}
private class GetData extends AsyncTask<String, Void, String> {
@Override
protected String doInBackground(String... urls) {
ArrayList<NameValuePair> postParameters = new ArrayList<NameValuePair>();
postParameters.add(new BasicNameValuePair("username", un.getText().toString()));
//String valid = "1";
String response = null;
try {
response = CustomHttpClient.executeHttpPost("http://tokn.me/android_merchant_login.php", postParameters);
String res=response.toString();
// res = res.trim();
res= res.replaceAll("\\s+","");
//error.setText(res);
if(res.equals("1"))
error.setText("Correct Username or Password");
else
error.setText("Sorry!! Incorrect Username or Password");
} catch (Exception e) {
un.setText(e.toString());
}
return response;
}
}
}
logcat:
E/AndroidRuntime( 1188): FATAL EXCEPTION: AsyncTask #1
E/AndroidRuntime( 1188): java.lang.RuntimeException: An error occured while exec
uting doInBackground()
E/AndroidRuntime( 1188): at android.os.AsyncTask$3.done(AsyncTask.java:27
8)
E/AndroidRuntime( 1188): at java.util.concurrent.FutureTask$Sync.innerSet
Exception(FutureTask.java:273)
E/AndroidRuntime( 1188): at java.util.concurrent.FutureTask.setException(
FutureTask.java:124)
E/AndroidRuntime( 1188): at java.util.concurrent.FutureTask$Sync.innerRun
(FutureTask.java:307)
E/AndroidRuntime( 1188): at java.util.concurrent.FutureTask.run(FutureTas
k.java:137)
E/AndroidRuntime( 1188): at android.os.AsyncTask$SerialExecutor$1.run(Asy
ncTask.java:208)
E/AndroidRuntime( 1188): at java.util.concurrent.ThreadPoolExecutor.runWo
rker(ThreadPoolExecutor.java:1076)
E/AndroidRuntime( 1188): at java.util.concurrent.ThreadPoolExecutor$Worke
r.run(ThreadPoolExecutor.java:569)
E/AndroidRuntime( 1188): at java.lang.Thread.run(Thread.java:856)
E/AndroidRuntime( 1188): Caused by: android.view.ViewRootImpl$CalledFromWrongThr
eadException: Only the original thread that created a view hierarchy can touch i
ts views.
E/AndroidRuntime( 1188): at android.view.ViewRootImpl.checkThread(ViewRoo
tImpl.java:3903)
E/AndroidRuntime( 1188): at android.view.ViewRootImpl.invalidateChild(Vie
wRootImpl.java:708)
E/AndroidRuntime( 1188): at android.view.ViewRootImpl.invalidateChildInPa
rent(ViewRootImpl.java:757)
E/AndroidRuntime( 1188): at android.view.ViewGroup.invalidateChild(ViewGr
oup.java:4006)
E/AndroidRuntime( 1188): at android.view.View.invalidate(View.java:8432)
E/AndroidRuntime( 1188): at android.widget.TextView.invalidateCursor(Text
View.java:4318)
E/AndroidRuntime( 1188): at android.widget.TextView.spanChange(TextView.j
ava:7669)
E/AndroidRuntime( 1188): at android.widget.TextView$ChangeWatcher.onSpanA
dded(TextView.java:8018)
E/AndroidRuntime( 1188): at android.text.SpannableStringBuilder.sendSpanA
dded(SpannableStringBuilder.java:898)
E/AndroidRuntime( 1188): at android.text.SpannableStringBuilder.setSpan(S
pannableStringBuilder.java:614)
E/AndroidRuntime( 1188): at android.text.SpannableStringBuilder.setSpan(S
pannableStringBuilder.java:520)
E/AndroidRuntime( 1188): at android.text.Selection.setSelection(Selection
.java:76)
E/AndroidRuntime( 1188): at android.text.Selection.setSelection(Selection
.java:87)
E/AndroidRuntime( 1188): at android.text.method.ArrowKeyMovementMethod.in
itialize(ArrowKeyMovementMethod.java:302)
E/AndroidRuntime( 1188): at android.widget.TextView.setText(TextView.java
:3243)
E/AndroidRuntime( 1188): at android.widget.TextView.setText(TextView.java
:3109)
E/AndroidRuntime( 1188): at android.widget.EditText.setText(EditText.java
:78)
E/AndroidRuntime( 1188): at android.widget.TextView.setText(TextView.java
:3084)
E/AndroidRuntime( 1188): at com.example.toknapp.login2$GetData.doInBackgr
ound(login2.java:61)
E/AndroidRuntime( 1188): at com.example.toknapp.login2$GetData.doInBackgr
ound(login2.java:1)
E/AndroidRuntime( 1188): at android.os.AsyncTask$2.call(AsyncTask.java:26
4)
E/AndroidRuntime( 1188): at java.util.concurrent.FutureTask$Sync.innerRun
(FutureTask.java:305)
E/AndroidRuntime( 1188): ... 5 more
W/ActivityManager( 85): Force finishing activity com.example.toknapp/.toknap
p
W/WindowManager( 85): Failure taking screenshot for (180x300) to layer 21015
W/InputManagerService( 85): Starting input on non-focused client com.android.i
nternal.view.IInputMethodClient$Stub$Proxy@417c3938 (uid=10040 pid=1188)
W/IInputConnectionWrapper( 1188): showStatusIcon on inactive InputConnection
W/NetworkManagementSocketTagger( 85): setKernelCountSet(10004, 1) failed with
errno -2
W/NetworkManagementSocketTagger( 85): setKernelCountSet(10040, 0) failed with
errno -2
I/Process ( 1188): Sending signal. PID: 1188 SIG: 9
W/InputManagerService( 85): Window already focused, ignoring focus gain of: co
m.android.internal.view.IInputMethodClient$Stub$Proxy@4135b3d8
I/ActivityManager( 85): Process com.example.toknapp (pid 1188) has died.
W/BinderNative( 85): Uncaught exception from death notification
W/BinderNative( 85): java.lang.IllegalArgumentException: Service not registere
d: com.android.server.TextServicesManagerService$InternalServiceConnection@417c4
b78
W/BinderNative( 85): at android.app.LoadedApk.forgetServiceDispatcher(LoadedA
pk.java:888)
W/BinderNative( 85): at android.app.ContextImpl.unbindService(ContextImpl.jav
a:1147)
W/BinderNative( 85): at com.android.server.TextServicesManagerService$SpellCh
eckerBindGroup.cleanLocked(TextServicesManagerService.java:592)
W/BinderNative( 85): at com.android.server.TextServicesManagerService$SpellCh
eckerBindGroup.removeListener(TextServicesManagerService.java:575)
W/BinderNative( 85): at com.android.server.TextServicesManagerService$Interna
lDeathRecipient.binderDied(TextServicesManagerService.java:662)
W/BinderNative( 85): at android.os.BinderProxy.sendDeathNotice(Binder.java:41
7)
W/BinderNative( 85): at dalvik.system.NativeStart.run(Native Method)
A:
Whatever happens inside doInBackground() is actually running on a separate thread and not on UI thread. If you want to change some UI element like setText() or setting image resources or anything, you should be doing it in UI thread.
onPreExecute and onPostExecute() methods of AsyncTask run on the UI thread. This is how the flow is in the order -
onPreExecute() -> doInBackground() -> onPostExecute()
So whatever the setting UI elements you're doing in doInBackground do it in onPostExecute().
So basically, your doInBackground should only be doing connecting to the server and getting response. Let the onPOstExecute() handle the rest (setting text stuff).
We need to use publishProgress(param) method to update UI thread, the sample provided in android documention is helpful.
http://developer.android.com/reference/android/os/AsyncTask.html#pubmethods
please see the code snippet under "Usage" section.
|
Preparation, characterization and dielectric studies on carbonyl iron/cellulose acetate hydrogen phthalate core/shell nanoparticles for drug delivery applications.
A method to prepare composite colloidal nanoparticles, consisting of a magnetic core (carbonyl iron) and a biodegradable polymeric shell (cellulose acetate hydrogen phthalate) was described and also particle size was characterized by Optical Microscope and Scanning Electron Microscopy. Dielectric properties of Cellulose Acetate Hydrogen Phthalate (CAP) and carbonyl iron/CAP (core/shell) tablets were studied in the frequency range of 70 Hz-400 kHz at 300 K using LCR meter and compared the dielectric parameters of core/shell and ordinary phase of CAP tablets. From the dielectric results, the importance of core/shell nanoparticles in controlled drug delivery was discussed. |
Vascular endothelium and smooth muscle remodeling accompanies hypertrophy of intestinal arterioles in streptozotocin diabetic rats.
The purpose of this study was to document alterations in endothelial and smooth muscle cell morphology of first- and second-order intestinal arterioles after 6 months of streptozotocin-induced diabetes. Both light and scanning electron microscopic techniques were used to quantitate the changes in the microvasculature. After rendering the first- and second-order intestinal arterioles passive and processing the vessels, it was determined that these microvessels were significantly dilated in the diabetic animals. Further examination revealed that in the diabetic animals, the cross-sectional area of the endothelial layer was increased in both 1A and 2A vessels, and the smooth muscle layer cross-sectional area was significantly increased in 1A vessels. Individual smooth muscle cells were significantly increased in width in the diabetic animals, but not in length. These data suggest that in this model of diabetes in rats, intestinal arteriolar hypertrophy was accompanied by significant remodeling of the arteriolar wall. |
Buxhoeveden
Buxhoeveden may refer to:
Buxhoeveden family, a Baltic German family in Estonia and the Russian Empire
Albert of Buxhoeveden ( – 1229), Bishop of Riga
Friedrich Wilhelm von Buxhoeveden (or Buxhowden, 1750-1811), Russian infantry general and government official
Hermann of Buxhoeveden (1163–1248), Prince-Bishop of Dorpat (1224–1248), Livonian Confederation
Reinhold von Buxhoeveden (died 1557), Bishop of Saare-Lääne (Ösel–Wiek), Estonia
Baroness Sophie Buxhoeveden (1883-1956), lady in waiting to Tsarina Alexandra of Russia and memoirist
See also
Bexhövede, a town in the Cuxhaven district of Lower Saxony, Germany, the origin of the Buxhoeveden family |
An antiproliferative ribonuclease from fruiting bodies of the wild mushroom Russula delica.
An antiproliferative ribonuclease with a new N-terminal sequence was purified from fruiting bodies of the edible wild mushroom Russula delica in this study. This novel ribonuclease was unadsorbed on DEAE-cellulose, but absorbed on SP-Sepharose and Q-Sepharose. It had a molecular mass of 14 kDa as judged by fast protein liquid chromatography on Superdex 75 and SDS-polyacrylamide gel electrophoresis. Its optimal pH and optimal temperature were pH 5 and 60 degrees , respectively. The ranking of its activity toward various polyhomoribonucleotides was poly C > poly G > poly A > poly U. It could inhibit proliferation of HepG2 and MCF-7 cancer cells with an IC50 value of 8.6 microM and 7.2 microM, respectively. It was devoid of antifungal and HIV-1 reverse transcriptase inhibitory activity. |
Q:
ICollection Count method fails in ASP.NET MVC 4
I have a ICollection of Projects in my user class
public ICollection<Project> Projects { get; set; }
When I try to render the count of projects in my view, it gives an error
<h2>You have @Model.Projects.Count() projects....</h2>
Any help appreciated.
A:
ICollection doesn't have a Count method, it has a Count property. You are probably getting confused with the LINQ Count extension method which is supported on an IEnumerable interface.
Just remove the parenthesis at the end of the Count call i.e.
<h2>You have @Model.Projects.Count projects...</h2>
|
Q:
Does JVM collection times increase exponentially with JVM RAM size?
I heard an associate say:
JVM garbage collection times increase exponentially with JVM size. This is because the tree of references is a function of the amount of the amount of objects to allocate - and gets exponentially harder to traverse the tree as the number of objects get bigger.
This sounded right.
I heard another associate say:
JVM garbage collection on the same machine is linear. Given an 8GB JVM split in two 4G JVMs on the same machine (via microservices) will have the same garbage collection durations because the same OS is slowing you down for the same number of objects.
This didn't seem right - as the trees of objects on the two smaller JVMs should be shallower and easier to traverse.
My question is: Does JVM collection times increase exponentially with JVM RAM size?
Assumption: Oracle JVM used.
A:
While Holgers explanation is correct I would like to put a slightly different aspect to it.
The time a GC takes is directly proportional to the number of live objects in the live set. This is easily demonstrated. Assume that we have two applications with heaps of the same size. In the first heap we allocate 10 objects of 100 MB each and in the second 10 million of 100 bytes each. At the next gc half of the objects in each application are unreachable (dead) and can be collected.
It is self-evident that it will take longer to trace the graph with the most objects.
(As an aside, I remember reading a measurement of the 'shallow and wide' vs 'deep and narrow' and that there was no perceptible difference but I can't remember where. @Holger: if you have a source I would love to read it)
Note that following established java coding practices will in fact ensure that the live set is small. The JVM expects you to code that way and goes to pretty great lengths to help keeping the live set small, escape analysis being just one trick up Hot Spots sleeve.
So, in short: NO
|
Pulitzer Prize-winning historian Robert Caro criticized conservative media coverage of President Obama during an appearance in New York City, describing it as "something quite horrible" and venomous.
Caro, known for his biographies of President Lyndon Johnson, spoke during a March 29 interview at Strand Books in Manhattan conducted by New York magazine writer Frank Rich as part of promotion for the paperback version of his fourth Johnson book, The Passage of Power.... |
Ifosfamide and epirubicin combination in untreated sarcomas: two treatment schedules.
The Epirubicin (EPI) and ifosfamide (IFO) combination has been widely tested in soft tissue sarcomas, even though the optimal schedule of drug administration has still to be defined. In this article, we reviewed the activity and the toxicity of two EPI- and IFO-based schedules in newly diagnosed sarcomas. 22 patients (group A) received a 'concurrent' schedule of short-infusion IFO at total dose of 7.5-9 g/m(2) over 5 days plus iv bolus EPI at 90-120 mg/m(2)/cycle, repeated every 3 weeks. The other 22 patients (group B) received a 'sequential' schedule of dose-intense, continuous infusion IFO at a total dose of 14-18 g/m(2) for 2 cycles followed by bimonthly EPI at 120-160 mg/m(2)/cycle. Application of growth factors was planned for each course of treatment. Since 1994, 44 consecutive patients have been treated. The overall response rate was 35% with no significant differences between the two treatment groups in terms of response rate (group A: 33%, group B: 37%), time to progression (group A: 7 months, group B: 8 months), and overall survival (group A: 12 months, group B: 15 months). General tolerance to treatment was better in group A. Gastrointestinal symptoms occurred significantly more often with the sequential regimen. Severe hematologic toxicity was common but no toxic deaths were observed. Based on this limited experience, a concurrent schedule of EPI and IFO seems to be an appropriate management strategy in the front-line therapy of advanced sarcomas. Nevertheless, a randomized trial is warranted to define the optimal dosages to be used for further clinical trials. |
Bus Riders Scramble As Gunman Kills Passenger, Then Himself
FORT LAUDERDALE - — Without argument or provocation, a 35-year-old man riding a Broward County Transit bus pulled out a sawed-off shotgun, shot and killed a rider sitting in front of him, then fatally shot himself Monday afternoon, police said.
The bus driver screeched to a halt on East Las Olas Boulevard and the five to seven other passengers ran out, hysterical, leaving the two men dead inside, witnesses said.
"They were tripping over each other on the street" to get out, said Jason Longo, 23, who was trying to drive out of his East Las Olas driveway when bus No. 8303 stopped in front of him at Riviera Drive.
Longo ran into the bus to see whether he could help, and found a grim scene: the bloody bodies of victim Byron Dean Flowers, 38, and the gunman, William Daren Harrison.
"There was nothing, basically, that could be done," Longo said. Harrison was lying face down in the middle of the aisle. Flowers was slumped over the seat in front of him with "a 4-inch hole in his head."
Some passengers scattered and were not interviewed by police. None was injured.
"He was pretty scared - the bus driver," said Orlando Garcia, the store manager. "I dialed 911, then he grabbed the phone from me ... We got scared, you know?'' Other shopkeepers ran out to see Aubri Benjamin, 36, sitting on the stairs of the bus, rocking a 2-year-old boy and "wailing at the top of her lungs," said Elizabeth Lindholm, an employee of Las Olas Design Group, an interior decorating company.
"She was just screaming, `Somebody help me, somebody help me,'" said Debbie Liptak, another employee. "Blood started dripping off that back [bus] door there."
Police said Benjamin was Flowers' live-in companion. The couple had a 2-year-old son - whom Benjamin was cradling - and lived in Fort Lauderdale. They may have been homeless at one time, police Detective Sonya Friedman said.
Benjamin and the toddler were sitting on the bus seat in front of Flowers, who was in the middle of the 45-seat bus. Harrison, the gunman, had changed seats at some point during the bus ride, Friedman said, and was sitting somewhere behind Flowers.
Police said Flowers was shot by Harrison, who then fatally shot himself. Driver's license records list a post office box in Coral Ridge, a Fort Lauderdale neighborhood, as Harrison's address. Maita, a 17-year BCT driver, said "there were no threats, nothing. It just went down out of nowhere."
Maita said he heard but did not see the shots, stopped the bus and left. He would not comment further. Police said it was to be his last bus run of the day when the shooting occurred at 2:26 p.m.
Police did not know when the gunman got on the bus, which was heading east on Las Olas to a final destination at the Pompano Square Mall. Flowers, Benjamin and their son got on the bus near the Hyde Park Market, 500 E. Las Olas Blvd, Friedman said.
One passenger said she heard the shots, but thought it was a noise from the bus. When the other passengers began running off, she did, too, not knowing what had happened.
"I got out of there as quick as I could," she said, later adding, "I guess I'll have to pay another bus fare."
Police said there was no indication the victim and gunman knew one another or that the gunman knew Benjamin.
"At this point, it appears to be without reason or without motivation," Friedman said.
Mike Scanlon, director of Broward County Transit, said he didn't know what could be done to prevent such a shooting if someone is willing to board a bus carrying a concealed weapon.
"It can happen in a split second," Scanlon said. "I don't think there's anything we could have done to prevent this."
At the same time, he said, the agency will scrutinize the incident to see if anything can be learned from it.
"Fortunately, there were not a lot of people on board," Scanlon said.
Scanlon said the bus will be impounded by police.
About two hours after the shooting, police removed the bodies of the two men, whose only known connection in life was a fatal one. Their bodies were taken away in a police vehicle, side by side. |
Q:
Why can't I prepare the serializer with a struct?
Protobuf-Net 2.0.0.480 can serialize structs using either the DataContract or ProtoContract attribute, and is doing so just fine.
However, Serializer.PrepareSerializer<MyStruct>() claims that MyStruct must be a reference type. Why does this limitation exist?
A:
Fair observation! This is a hangover from v1, where the API only supported class. The v2 implementation adds RuntimeTypeModel, and forwards the old Serializer.* API onto RuntimeTypeMode.Default.*.
In this case, the answer is simple: because I didn't remove the where T : class constraint that existed from v1 days. It will be removed in a future build.
For now, you can also do this via:
RuntimeTypeModel.Default[type].CompileInPlace();
|
Friday, August 11, 2017
Telcos, Cable Fight Over Proposed 3.5 Ghz Changes
The Dynamic Spectrum Alliance (DSA)
tells the FCC by its count, most of the more than 800 comments filed on
proposed changes to the 3.5 GHz band oppose converting the Citizens Broadband Radio Service (CBRS) into a 5G-only band.
The DSA characterizes itself as a group of what it says are
“multinationals, small-and medium-sized enterprises, and academic,
research, and other organizations” committed to expanding broadband.
The DSA argues telcos large and
small, have made investments under the current rules, investments that
“may be stranded, and future innovation stifled,” if drastic changes are
made. “The Commission should resist
arguments to change the current PAL structure to one that would be
favorable to only one class of entity – the large nationwide wireless
carriers, at the expense of all other entities,” says DSA. It notes
Ericsson, Intel, Nokia, Qualcomm, Ruckus Wireless, and others “are well
on their way to creating a rich ecosystem of 3.5 GHz LTE devices, with
the first 3.5 GHz LTE handset expected to reach the market later this
year.”
CTIA and T-Mobile say their proposals would benefit 5G, Inside Towersreported.
They seek to lengthen license terms to 10 years and increase license
areas by using traditional Partial Economic Areas rather than census
tracts. In order to spur investment, T-Mobile also proposes the
Commission convert all 150 MHz of spectrum in each CBRS market open to
priority access licensing. CBRS is now limited to 70 MHz of PAL per
market. Continue Reading
No comments:
Post a Comment
Welcome to Inside Towers!
We’re so excited that you have found your way to our blog to read all about the latest wireless tower news. Make sure to follow us on Facebook and Twitter and check out our group on LinkedIn, where you can network and discuss topics with other members of the tower industry. If you ever have any tower news, feel free to share it with us at editor@insidetowers.com.
FREE Limited Time Charter Subscirption
About Inside Towers
Inside Towers is written for the wireless tower industry. There is plenty of news and information for wireless, but there is very little news targeted to towers specifically. There is no other available source of daily tower news and information written for the tower owners, managers, and supporting businesses. |
Q:
Hibernate connection pool not working
I created one api using jsp and hibernate. I used this option of hibernate -
<property name="hibernate.connection.pool_size">50</property>
What I want is If I am getting 1000 hit concurrently on api then it should use only 50 connection not more than that. I thought above option of hibernate will help me to achieve this. But I tested my api on 10000 hit and I checked the open connection. It was around 3000. It means pool of connection not working.
How to get this ?
A:
From the Hibernate documentation:
Hibernate's own connection pooling algorithm is, however, quite
rudimentary. It is intended to help you get started and is not
intended for use in a production system, or even for performance
testing. You should use a third party pool for best performance and
stability. Just replace the hibernate.connection.pool_size property
with connection pool specific settings. This will turn off Hibernate's
internal pool. For example, you might like to use c3p0.
Like mentioned, c3p0 is a good option.
|
It looks increasingly likely that the FIFA Council will approve the expansion of the World Cup to 48 teams when they vote on the matter on Tuesday. The 16 groups of three teams format that Gianni Infantino proposed would get the most new nations involved and, most importantly, provide the most extra revenue. The only thing said to possibly hold up the vote would be a determination on how the 16 new slots would be allocated between the confederations. If all works out, bidding for the hosting rights to the 2026 tournament could begin within days. |
Radeon Compatibility Guide
ATI/AMD Graphics Cards
Last Change: December 2nd, 2017
The "boot to black screen" issue as well as the broken sleep/wake have been fixed! Read below for details.
0. Introduction
Note
1. General Information
AMD Kernel Extensions
Initialization Process
EFI-Init: On a genuine Mac, the graphic card carries a EFI ROM right next to the legacy vBIOS on the EEPROM chip. On startup, this EFI binary will be executed by the machines EFI, which will introduce the card to the system thus initializing the driver. On a Hack, this can be mimicked by the bootloaders Graphics Injection functionality. This way you can tell the system which Framebuffer to use (see next section) or how the card shall be called in the System Profiler. Some of you will also remember tools like ATY_Init.kext which can basically do the same. Those are not relevant any longer.
On a genuine Mac, the graphic card carries a EFI ROM right next to the legacy vBIOS on the EEPROM chip. On startup, this EFI binary will be executed by the machines EFI, which will introduce the card to the system thus initializing the driver. On a Hack, this can be mimicked by the bootloaders Graphics Injection functionality. This way you can tell the system which to use (see next section) or how the card shall be called in the System Profiler. Some of you will also remember tools like which can basically do the same. Those are not relevant any longer. Auto-Init: With Lion, a new feature has been added: Automatic initialization of the drivers. Apple gave the system the ability to initialize a PCI graphics card just by its legacy vBIOS, without the need for any (faked) EFI stuff. At the beginning this had some compatibility issues, but as of Yosemite one can say that in most cases this works as good as the classic EFI-based injection method.
Framebuffers
2. Compatibility Chart
AMD product naming convention
Definition of the term 'Reference Design / Layout'
Note on Radeon HD 7000 / R7 / R9 cards
Graphics Card OOB min. OSX DevID Reference Port Layout Framebuffer Known Issues HD 5770 Yes 10.6.8 0x68B8 2x DVI, HDMI, DP Vervet none HD 5770 Mac Edition Yes 10.6.8 0x68B8 2x mDP, DVI Hoolock none HD 5850 Yes 10.6.8 0x6899 2x DVI, HDMI, DP Uakari none HD 5870 Yes 10.6.8 0x6898 2x DVI, HDMI, DP Uakari none HD 5870 Mac Edition Yes 10.6.8 0x6898 2x mDP, DVI Langur none HD 5870 Eyefinity 6 Yes 10.6.8 0x6898 6x mDP, DVI Zonalis unconfirmed
Graphics Card OOB min. OSX DevID Reference Port Layout Framebuffer Known Issues HD 6790 No ? 0x673E ? ? DevID missing HD 6850 No ? 0x6739 ? ? DevID missing HD 6870 Yes ? 0x6738 2x mDP, HDMI, 2x DVI Duckweed 2nd DVI non-functional HD 69x0 No ? - - - very buggy, not usable at all
Graphics Card OOB min. OSX DevID Reference Port Layout Framebuffer Known Issues HD 7750 Yes 10.8.3 0x683F ? ? Black screen issue since 10.10.3 HD 7770 / R7 250X Yes 10.8.3 0x683D 2x mDP, HDMI, DVI Dashimaki Black screen issue since 10.10.3 HD 7850 Yes 10.8.3 0x6819 ? ? none HD 7870 / R9 270X Yes 10.8.3 0x6810 2x mDP, HDMI, DVI Futomaki none R9 270 / R7 370 No 10.8.3 0x6811 ? ? DevID missing HD 7950 / R9 280 Yes 10.8.3 0x679A 2x mDP, HDMI, DVI Hamachi none HD 7970 / R9 280X Yes 10.8.3 0x6798 2x mDP, HDMI, DVI Hamachi none
Graphics Card OOB min. OSX DevID Reference Port Layout Framebuffer Known Issues HD 7790 / R7 260 Yes 10.10? 0x665C none none Buggy multi screen support, buggy DP, needs RadeonDeInit since 10.12 R7 260X / R7 360 No 10.10? 0x6658 none none “ R9 290 / R9 390 No 10.10? 0x67B1 none none “ R9 290X / R9 390X Yes 10.10? 0x67B0 none none “
Graphics Card OOB min. OSX DevID Reference Port Layout Framebuffer Known Issues R9 285 / R9 380 Yes 10.10 0x6939 DP, HDMI, 2x DVI Lagotto Needs RadeonDeInit (since 10.11) R9 380X Yes 10.10 0x6938 DP, HDMI, 2x DVI Lagotto " Fury / Fury X No 10.12 0x7300 none none Needs RadeonDeInit
Graphics Card OOB min. OSX DevID Reference Port Layout Framebuffer Known Issues RX 460 / RX 560 Yes 10.12 0x67EF DP, HDMI, DVI Acre Needs RadeonDeInit RX 470 / RX 570 Yes 10.12.6 0x67DF 2x DP, HDMI, 2x DVI Orinoco Needs RadeonDeInit RX 480 / RX 580 Yes 10.12.6 0x67DF 2x DP, HDMI, 2x DVI Orinoco Needs RadeonDeInit
Graphics Card OOB min. OSX DevID Reference Port Layout Framebuffer Known Issues RX Vega56 Yes 10.12.6 0x687F 3x DP, HDMI Kamarang / Iriri? Needs RadeonDeInit, early drivers RX Vega64 Yes 10.12.6 0x687F 3x DP, HDMI Kamarang / Iriri? Needs RadeonDeInit, early drivers
OOB = No means (unless otherwise stated) you'll have to spoof or add the device ID to enable support
'Framebuffer' is the framebuffer that matches the reference port layout best. Non-reference cards might work better with others.
'min OSX' refers to the initial version which first added driver support for a specific chipset. The device ID might have been added in a later release, so your card might not work OOB at this version.
Code: <key>Graphics</key> <dict> <key>RadeonDeInit</key> <true/>
3. Finding or patching a compatible framebuffer
Finding the best Framebuffer
Dump your vBIOS (e.g. with atiflash.exe in DOS or with Clover). Run redsock_bios_decoder. This will give you the encoder ID and transmitter ID. Run my fork of radeon_bios_decode (attached to this post). This will return the hotplug ID and sense ID. Note: Other tutorials claim that the hotplug ID equals the 'Connector index'. This might be true in special cases, but it's definitely not in general. Using my fork will reveal the real hotplug ID of each port.
Patching the Framebuffer
4. Spoofing the Device ID
5. FAQ
Most of you might have noticed that the Buyer's Guide doesn't list a single compatible AMD Radeon card at the moment. This would make many people assume that they weren't compatible with OS X at all, but in fact Apple has included driver support for almost every relevant AMD graphics chipset from the last years, so there's a good chance your standard PC card will work out of the box!However, before getting too excited there are a few things to consider to achieve hassle-free long-term compatibility, so I've composed this guide to collect all necessary information and to clarify some urban myths.I'll explain how to find perfectly compatible cards and how to improve the overall experience on not so compatible GPUs. This won't be a super-detailed step-by-step tutorial on every single aspect, but instead an overview on most important topics with links to further information.: I don't want any Nvidia vs. AMD discussions here: Both have their right to exist, and after reading the GPU recommendation section you'll know the pros and cons of Radeons so you can choose yourself.To choose a compatible graphics card it is helpful to know some details about the operation principles of the AMD drivers. Obviously I have never seen the source code of those drivers so my knowledge isn't as deep as it could be, but for the scope of this guide it'll be fine.The AMD drivers consist of a lot of kernel extensions, two of which are particularly interesting for the (possible) OS X compatibility of a specific GPU:(one for each AMD Radeon GPU family) and. The first is responsible of setting up basic 2D operation, correct resolutions, handling the connection ports of your card (rooting the signals to the correct ports, detecting hot plug actions, handling multiple screens) and others while the latter is mainly responsible for the 3D acceleration of your card.Both types of kexts contain a list of PCI device IDs in their Info.plist to detect and properly initialize connected GPUs. Having the device ID of a specific card in both files is necessaryto make it work! Apple will add some device IDs every now and then, and while some of the added cards will actually work, others might have awfully buggy drivers because Apple added the IDs just for testing purpose.There are some cards which are very similar to supported cards but still don't have their device ID in the drivers. They can usually be enabled by either modifying the Info.plist of both kernel extensions (not recommended, because changes will be lost on the next OS X update and you'll violate the kext signing) or by spoofing your GPUs device ID with Clover If the PCIe device ID of the installed card has a match infiles, it can be initialized. There are two ways to make that happen, I'll call themandFor Yosemite this means that the correct driver for your GPU will automatically be launched at startup if the device ID is in there. You don't have to do any setup for this to happen, but please remember that the drivers being loaded might still be crap and only give you a garbled or black screen.Each of thecontain a set of so-calledfor one GPU family. For the scope of this guide you can think of them as set of port mapping tables, which tell the driver how each port of the graphics card is physically linked to the GPU chip. This is important, because a mismatch might result in a black screen, system freezes or a lack of certain features (e.g. no hot-plug detection or no audio).Most of those framebuffers are Apple specific (e.g. 1 LVDS port and 2 DisplayPorts for a MacBook), but in the past they were kind enough to include some framebuffers for generic PC video cards despite they didn't use any themselves. Those framebuffers usually match AMDs(see below), so they won't help you in case of any odd custom design card.When using the graphics injection functionality of your bootloader, you'll tell the system (implicitly or explicitly) to use one of those framebuffers. This is fine if your card has a perfect match, but for non-reference cards usually you won't have much luck.If you don't inject a specific framebuffer but rely on the drivers auto-init feature, the driver will fall back to the generic, so-called RadeonFramebuffer. This framebuffer is dynamically built from the cards vBIOS, so it will match any non-reference card. In the past there have been some issues with this approach, especially on multi-display setups and with certain apps (DVD player, Steam), but as of today most of this seems to have been solved. Note that your card won't show up with its correct name, but instead report something like „Radeon HD 7xxx“ or "Radeon HD 5000 series". This is only cosmetic though and shows that you're currently using the RadeonFramebuffer; usually nothing to worry about.If you want to use graphics injection on a non-reference card, you'll have to patch your framebuffer in the correspondingbinary. This can be either achieved directly on your filesystem (not recommended, see previous section) or on the fly with Clover You can get a full list of AMD framebuffers in your OS using the PHP script provided in this thread In this section I'll list the compatibility of most relevant Radeon chipsets (as of Yosemite, if not stated otherwise). This also covers the best matching framebuffer for each card, the reference port layout and known issues. Please note that I obviously don't have the means to test every single card in every single vendor-specific variant myself, so there is always a chance that you'll encounter any specific card that doesn't behave as described here.I'll focus on new GPUs (HD 7000 and following) leaving out everything older than HD 5000, since most of those cards have already been dropped in OS X due to the lack of 64bit drivers. I also won't cover mobil GPUs, uncommon variants or low-end office computer cards.Before starting, it is noteworthy that AMD has created a lot of confusion in the last years with their rebadging policy: The three latest GPU generation (by name: HD 7000 series, Rx 200 series and Rx 300 series) each contain specific GPUs with different chip architectures, thus using different drivers resulting in totally different OS X compatibility.For example, a seemingly new R7 370 card uses the same, 3 year old GCN 1.0 based "Pitcairn" chip as a HD 7870, while a (by name similar) R9 380 uses the latest GCN 1.2 based "Tonga"-chip. I'll try to list all of those doubles in the following compatibility chart. Additionally, I'll partition the list by GPU family to make clear which kext is in charge of driving which card.To increase the confusion a little further, AMD has introduced HD 8000 cards for the OEM market, which are 1:1 rebrands again. Since they are quite rare, I won't cover them in this guide. If you're unsure about your HD 8xxx chipset, look it up on Wikipedia.The "reference design" is the PCB design AMD publishes when releasing a new card. Vendors like Sapphire or XFX can then decide to use this reference design for their cards or develop their own (somehow improved or cheaper) board layout.In the past Apple has included Framebuffers for AMDs reference layouts which usually provide full functionality for those cards.For the future this is quite unlikely, because Apple has abandoned the classic MacPro, which was the only Mac using standard PCI cards.The physical ports of a card are no sufficient criterion to decide whether it's a reference card or not. It's a good hint though, and the best you can get without dumping the cards vBIOS, so I'll include this information in the compatibility chart.If you need multi screen support (especially Eyefinity = more than 2) and don’t want to risk any trouble, get something as close to the reference layout as possible. If you're happy with one screen, get any variant you'd like to have, in most cases it will do the job just fine.Chameleon/Chimera currently has compatibility issues with those cards. There are some workarounds such as moving the bootloader to the EFI partition and/or using the Intel iGPU for booting. In my opinion using Clover is the best and cleanest way since it will get you also some other benefits.If you still want to stick with Chameleon/Chimera, here are some links to get you started:Many people are reporting problems with XFX cards, especially HD 7xxx / R9 generation. They're using a custom BIOS which can cause a crash upon booting, which can't be fixed in OS X.A common solution is either flashing a alternate VBIOS on your card (only do if you can recover form a bad flash!) or using Clover to load a compatible VBIOS dynamically (without flashing).Many modern AMD GPUs are incorrectly initialized during boot phase, which will can lead to serious issues in OS X (e.g. boot to black screen or crash after sleep/wake). This was first solved by the WhateverGreen Lilu plugin. Extensive research has been done by Mieze , resulting in a DSDT patch. This knowledge has been incorporated into Clover (starting with rev. 4296) and can be enabled from the config.plist like this:We recommend using the Clover solution.OS X still lacks native graphics acceleration for R9 Nano / Fury / Fury X and RX 470 / 480. However, they can use the "Baffin" accelerator (e.g. by spoofing the device ID), which was originally made for Polaris 11 based GPUs (especially the Radeon Pro GPUs in 2016 rMBP).They'll be limited to just 16 Compute Units though, which affects the compute performance notably. It's possible to unlock their full potential with a kext modification (alternate way: using Clover's kext patching feature).As stated before, choosing a card with reference layout should usually give you a 100% matching framebuffer out of the box. And even if your card differs from reference design or you've chosen a GPU without any "reference framebuffers" (e.g. R9 380), RadeonFramebuffer will do the job perfectly fine in most cases. But what to do if it doesn't?A quite common way to find the best matching framebuffer is injecting every available framebuffer of a GPU family and manually testing the compatibility with each port until you find one that suits your needs. While this might work, it’s obviously a very time-consuming way to test compatibility, so I wouldn't recommend blindly testing to anyone. It's way faster to analyze the compatibility of a specific framebuffer directly by having a look in your graphics cards vBIOS.The mapping of a specific port is defined by four different identifiers: Encoder ID, Transmitter ID, Hotplug ID and Sense ID. All of them have to match for perfect compatibility. A mismatch of the hotplug ID will usually just disable the hot plug detection (you might need to put your computer to sleep to activate the port), while a mismatch of the other 3 IDs will result in a black or garbled screen. Getting this mapping from the BIOS is easy:The following screenshot shows the complete port mapping at the example of a Radeon HD 7950 Mac Edition with Hamachi framebuffer:Each line of the framebuffer equals one physical port, and as you can see, Hamachi perfectly matches! You'll certainly have noticed that the framebuffer contains a lot more information than just those 4 identifiers. I won't cover every single aspect here, just one short note one the connector type which most other tutorials neglect: The first two bytes (byte-swapped!) of each line declare the type of the connector, e.g.:0x4 => DualLink-DVI0x200 => SingleLink-DVI0x400 => (mini)DisplayPort0x800 => HDMIDue to the compatibility (some) of those protocols it is way less important to match the connector type than one would think: For example, the DisplayPort specification guarantees backward compatibility to single-link DVI and HDMI. From my experience it's no problem to have a physical DVI port declared as DisplayPort as long as you don't exceed FullHD resolution. Same applies to some other combinations.If OS X doesn't offer a matching framebuffer for your card you'll have to patch a existing one. This is covered in great detail in a separate guide Due to popular demand, here’s a short guide on enabling GPUs with missing device ID in the drivers using Clovers "FakeID" feature. For the scope of this tutorial, let’s assume you want to enable a Radeon R9 270, which isn’t OOB. The device ID of this card is 0x6811.First you have to find a similar graphics card using the same chipset which is supported OOB (have a look in the chart above). In our example this could be a Radeon R9 270X (0x6810).The full ID of this graphics card consists of the device ID and the vendor ID (always 0x1002). So the full R9 270X ID is 0x68101002.In Clover, you have to set:- FakeID / ATI = full ID (here: 0x68101002)- Inject / ATI = true- FBName = framebuffer name (here:Futomaki [enter some random garbage in case you don’t want to use a framebuffer, the driver will default to RadeonFramebuffer])- FixDisplay = trueOn the next boot, you should have full acceleration with your unsupported GPU!If it didn’t work, you can verify the ID by looking in the System Profiler -> Graphics section. If the device ID listed there didn’t change expectedly, you might have a typo somewhere.AMD Radeon drivers areprovided by Apple as part of their regular system updates. You might find some dubious patched kexts in the internet which might be binary compatible to your OS if you’re lucky, but I’d advice against using those. Keep your system up to date and you’ll always have the latest drivers. Understand what your problems are and apply the patches yourself with Clover so they’ll survive system updates.On the one hand this policy is a good thing, because you don’t have any hassle comparable to the Nvidia Web Drivers when a new OS X update arrives. On the other hand, it’s totally up to Apple when they include some new Radeons and which they choose to be supported OOB. Nvidia is usually a lot faster updating their Web Drivers to support new GPUs.First, make sure all ports work with just one screen attached. If you want to use 3 or more displays, remember that you'll need native DisplayPort screens orDisplayPort adaptors (see http://support.amd.com/en-us/recommended/eyefinity-adapters )!If you're using RadeonFramebuffer, try to inject a matching framebuffer (and vice versa).Nope, not at all. Your Hackintosh isn’t able to utilize a MacPro EFI, no matter if your MoBo has a legacy BIOS or a modern UEFI, so it will fall back to the legacy vBIOS on your card either way. It won’t change anything.Most certainly the driver didn't load because the device ID of your card isn't in their (check compatibility chart above). Spoof your device ID with Clover to match a similar, supported card or add your device ID to both kexts (not recommended).This just means that you're not injecting anything GPU related, no need to worry. Read the Framebuffer section in chapter 1 again. Other common placeholder strings are "HD 8xxx" or "R9 xxx".The vBIOS Database from TechPowerUp (Link: http://www.techpowerup.com/vgabios/ ) is always a good start. If you've already installed the card in your machine you might also consult the System Profiler.As of today, there have been no significant driver changes in El Capitan compared to Yosemite.Metal is supported starting with HD 7xxx series. Older cards are still supported, just without Metal.It's necessary to edit AGDP, details are in post #1000 . Thanks @LostVector for finding that out!You have some additional information which you think should be included here? Found a mistake or an unclear explanation? Feel free to leave some feedback here! |
[DO NOT PUBLISH]
IN THE UNITED STATES COURT OF APPEALS
FOR THE ELEVENTH CIRCUIT FILED
________________________ U.S. COURT OF APPEALS
ELEVENTH CIRCUIT
No. 11-12451 DECEMBER 9, 2011
Non-Argument Calendar JOHN LEY
________________________ CLERK
D.C. Docket No. 4:09-cr-00034-RLV-WEJ-1
UNITED STATES OF AMERICA,
llllllllllllllllllllllllllllllllllllllll Plaintiff - Appellee,
versus
DWIGHT HERSCHEL GREEN,
llllllllllllllllllllllllllllllllllllllll Defendant - Appellant.
________________________
Appeal from the United States District Court
for the Northern District of Georgia
________________________
(December 9, 2011)
Before WILSON, PRYOR, and KRAVITCH, Circuit Judges.
PER CURIAM:
Dwight Herschel Green appeals his convictions for interstate travel and
attempted possession of a destructive device in furtherance of a crime of violence,
in violation of 18 U.S.C. § 924(g) (Count One), and possession of a firearm by a
convicted felon, in violation of 18 U.S.C. §§ 922(g)(1), 924(a)(2) (Count Two).
He also appeals his 108-month sentence on the grounds that the district court
erroneously applied a four-level sentencing enhancement pursuant to U.S.S.G.
§ 2K2.1(b)(6) for possession of a firearm in connection with another felony
offense. After thorough review of the briefs and record, we affirm.
I.
On February 22, 2011, the government filed a third superseding indictment
charging Green with Count One and Count Two. Green pled not guilty to both
counts and was tried by a jury. At trial, the government presented evidence
consisting of the testimony of numerous law enforcement agents; the testimony of
a cooperating witness, Brian Moses; and video and audio tapes of meetings that
Moses had with Green. At the conclusion of the government’s case, Green moved
for judgment of acquittal on Count One, arguing that he had not attempted to
purchase grenades with the intent to commit a crime of violence. The district
court denied this motion.
The defense then presented its case. After offering the testimony of three
2
witnesses, Green took the stand. At the close of all the evidence, Green did not
move for judgment of acquittal. After hearing closing arguments, the jury found
Green guilty on both counts.
At sentencing, Green received a four-level enhancement for possessing a
firearm in connection with another felony offense pursuant to U.S.S.G.
§ 2K2.1(b)(6). The felony offense alleged was possession of methamphetamine,
which officers testified they had found during a search of his home. This
enhancement resulted in a total offense level of 26, and Green’s guideline range
was calculated to be 63 to 78 months. The district court sentenced Green to 72
months of imprisonment for each of Count One and Count Two, with 36 of the
months of the Count Two sentence to run concurrently with Count One and the
remaining 36 months running consecutive to Count One. The result was a 108-
month total sentence. Green now appeals his convictions and the four-level
enhancement under § 2K2.1(b)(6).
II.
We typically review de novo whether sufficient evidence supported the
jury’s guilty verdict. See United States v. Klopf, 423 F.3d 1228, 1236 (11th Cir.
2005). However, if a defendant fails to renew a motion for judgment of acquittal
at the close of all the evidence, then we will reverse a conviction only to prevent a
3
“manifest miscarriage of justice.” United States v. Edwards, 526 F.3d 747,
755–56 (11th Cir. 2008). This standard is met when “the evidence on a key
element of the offense is so tenuous that a conviction would be shocking.” United
States v. Bichsel, 156 F.3d 1148, 1150 (11th Cir. 1998) (per curiam) (quotation
omitted).
A.
To establish a violation of 18 U.S.C. § 924(g), the government must prove
that the defendant, with intent to engage in conduct that constitutes a crime of
violence, traveled from one state into another and acquired, transferred, or
attempted to acquire or transfer a firearm1 in furtherance of the crime of violence.
18 U.S.C. § 924(g).
Green contends that the evidence does not establish that he intended to
engage in a crime of violence. At trial, the government offered the testimony of
Brian Moses, who met with Green on multiple occasions to discuss a murder-for-
hire scheme. Two of these meetings were recorded, and the government played
the audio for the jury during Moses’s testimony. Moses explained that in April
2009, he and Green discussed the scheme and identified seven potential victims.
Moses further testified that he and Green had discussed obtaining grenades for
1
The definition of firearm includes a grenade. 18 U.S.C. § 821(a)(3)(D), (a)(4)(A)(ii).
4
Green to throw through the window of a home in order to kill five people. Moses
also testified that Green exchanged $200 for the grenades, and the government
produced pictures from an ATM camera to corroborate the withdrawal of this
money. Moses and Green arranged for delivery of the grenades at a location in
Alabama, and Green left his home and drove toward the arranged meeting spot
upon receiving a call from Moses on April 16, 2009.
Green testified in his own defense at trial and admitted that his voice was on
the recordings. He testified that he was intoxicated during the conversations and
never intended to obtain the grenades in order to kill the alleged targets of the
scheme. Green could not, however, identify any point in the recorded
conversation between himself and Moses where he said he did not want the
grenades.
The jury was entitled to credit Moses’s testimony and base its verdict on his
recollections. See Craig v. Singletary, 127 F.3d 1030, 1044–45 (11th Cir. 1997)
(en banc) (“[U]ncorroborated testimony of a co-conspirator or accomplice is
sufficient to prove guilt beyond a reasonable doubt.”). We find no “manifest
miscarriage of justice” is present here because the record evidence plainly
supports the jury’s verdict on Count One. Edwards, 526 F.3d at 755–56.
B.
5
Green next argues that he was not in possession of any firearms and
therefore could not have been found guilty on Count Two. “To establish a
violation of 18 U.S.C. § 922(g)(1), the government must prove three elements: (1)
that the defendant was a convicted felon, (2) that the defendant was in knowing
possession of a firearm, and (3) that the firearm was in or affecting interstate
commerce.” United States v. Beckles, 565 F.3d 832, 841 (11th Cir. 2009)
(quotation omitted). The element of knowing possession can be established if the
government shows constructive possession through either direct or circumstantial
evidence. Id. “Constructive possession exists when the defendant exercises
ownership, dominion, or control over the item or has the power and intent to
exercise dominion or control.” Id. (quotation omitted).
Count Two was based on the three firearms that police found in Green’s
home after he was arrested. At trial, Moses testified that he saw firearms in
Green’s house during one of their April, 2009 visits. He provided law
enforcement with a sketch of the home and indicated the location of the weapons,
and at trial Agent Meadows, who participated in the search of Green’s house,
testified that the weapons were found almost exactly where Moses had indicated.
Agent Meadows further explained that his search of the house indicated that Green
was the only person living there at the time.
6
Green contends that the element of knowing possession is not satisfied. He
testified at trial that the weapons did not belong to him. He argues on appeal that
his brothers-in-law had ample time to plant the weapons in his home prior to its
being searched by police. Furthermore, he points out that he did not possess any
weapons on his person at the time of his arrest.
The jury was entitled to disbelieve Green’s explanations at trial that the
weapons did not belong to him. See United States v. Thompson, 473 F.3d 1137,
1143 (11th Cir. 2006). The record contains sufficient evidence of Green’s
knowing possession of a firearm, and upholding the jury verdict on this count does
not result in a “manifest miscarriage of justice.” Edwards, 526 F.3d at 755–56.
III.
Next, Green challenges the calculation of his total offense level of 26 at
sentencing. When calculating the guideline range for a firearm possession offense
under 18 U.S.C. § 922(g), a four-level enhancement to the base offense level is
required “[i]f the defendant used or possessed any firearm or ammunition in
connection with another felony offense.” U.S.S.G. § 2K2.1(b)(6). We give the
phrase “in connection with” its ordinary meaning and interpret it expansively. See
United States v. Rhind, 289 F.3d 690, 695 (11th Cir. 2002).
We have held that “in certain circumstances, mere possession of a firearm
7
can be enough to apply a sentencing enhancement.” United States v. Jackson, 276
F.3d 1231, 1234 (11th Cir. 2001). This enhancement can be appropriate even
where there is no proof that the firearm actually facilitated the felony offense. See
Rhind, 289 F.3d at 695–96 (holding that the firearms were connected with
defendants’ counterfeiting offenses where it was reasonable to conclude that the
presence of a firearm protected the counterfeit money); U.S.S.G. § 2K2.1 cmt.
14(A); see also United States v. Wooten, 253 F. App’x 854, 858 (11th Cir. 2007)
(per curiam).
We review a district court’s application and interpretation of the guidelines
de novo and its factual findings for clear error. Rhind, 289 F.3d at 693. The
district court’s determination that the defendant used a firearm in connection with
another felony offense is a factual finding that we review for clear error. See
United States v. Whitfield, 50 F.3d 947, 949 (11th Cir. 1995) (per curiam).
Green avers that no evidence established that the firearms found in his home
were connected to another felony. He explains that he was not charged in federal
court with possession of methamphetamine—the underlying felony for the
sentencing enhancement—and that there is no evidence that he distributed any
controlled substance. He further argues that the purported methamphetamine
found in his home was never tested in a laboratory and therefore its possession
8
cannot serve as the underlying felony.
We conclude that the district court did not clearly err in determining that
Green possessed a firearm in connection with his possession of methamphetamine.
Contrary to Green’s argument, this four-level enhancement may be appropriate
even if the defendant is not charged with or convicted of the underlying felony
offense. See U.S.S.G. § 2K2.1 cmt. 14(C). Numerous witnesses testified at trial to
seeing methamphetamine in Green’s house. Moses testified that he saw the
substance during a meeting with Green at Green’s home. At trial, two agents
testified to finding methamphetamine during the search of Green’s home, and
Agent Meadows specifically elaborated that he found methamphetamine in a
sandwich bag at the bottom of a glass. This testimony is sufficient to establish by
a preponderance of the evidence that Green in fact possessed methamphetamine.
See United States v. Smith, 480 F.3d 1277, 1280–81 (11th Cir. 2007) (upholding
the district court’s sentencing enhancement where allegations that the defendant
possessed cocaine were based on an officer’s testimony that he saw the defendant
hide a bag containing a white powdery substance in his sock, even though cocaine
was never recovered).
Moreover, it was reasonable for the district court to conclude that the
firearms found in Green’s home had the potential to facilitate the felony offense of
9
possession of methamphetamine. A reasonable factfinder could infer that the
firearms were intended to protect Green while he possessed methamphetamine and
to prevent the methamphetamine from being stolen. See Rhind, 289 F.3d at
695–96. As a result, the district court did not err in applying the four-level
enhancement for possessing a firearm in connection with a felony offense.
AFFIRMED.
10
|
IL-1-induced tumor necrosis factor-alpha elicits inflammatory cell infiltration in the skin by inducing IFN-gamma-inducible protein 10 in the elicitation phase of the contact hypersensitivity response.
Contact hypersensitivity (CHS) is a typical inflammatory response against contact allergens. Inflammatory cytokines, including IL-1 and tumor necrosis factor (TNF)-alpha, are implicated in the reaction, although the precise roles of each cytokine have not been completely elucidated. In this report, we dissected the functional roles of IL-1 and TNF-alpha during CHS. CHS induced by 2,4,6-trinitorochlorobenzene as well as oxazolone was suppressed in both IL-1alpha/beta(-/-) and TNF-alpha(-/-) mice. Hapten-specific T cell activation, as examined by T cell proliferation, OX40 expression and IL-17 production, was reduced in IL-1alpha/beta(-/-) mice, but not in TNF-alpha(-/-) mice, suggesting that IL-1 but not TNF-alpha is required for hapten-specific T cell priming in the sensitization phase. On the other hand, TNF-alpha, induced by IL-1, was necessary for the induction of local inflammation during the elicitation phase. We also found that the expression of IFN-gamma-inducible protein 10 (IP-10) was augmented at the inflammatory site. Although IP-10 mRNA expression was abrogated in TNF-alpha(-/-) mice, both CHS development and TNF-alpha mRNA expression occurred normally in IFN-gamma(-/-) mice, indicating that the induction of IP-10 during CHS was primarily controlled by TNF-alpha. Interestingly, CHS was suppressed by treatment with anti-IP-10 mAb, suggesting a critical role for IP-10 in CHS. Reduced CHS in TNF-alpha(-/-) mice was reversed by IP-10 injection during the elicitation phase. Thus, it was shown that the roles for IL-1 and TNF-alpha are different, although both cytokines are crucial for the development of CHS. |
Grad school, books, and a loose understanding of time
Month: June 2017
It’s been quite some time since I’ve written anything, having stopped blogging just days away from finishing my 30 day challenge, but now with a month left until I leave Japan I feel it’s time to start writing about and processing the process of leaving.
It’s been a difficult six months. A person I knew from high school passed away in January which lead me to face some of my own fears of my mortality, my grandmother passed away in February the day before what was my deceased father’s birthday, and another family member passed away about a month ago. I was accepted to my top two choice grad programs, one of which would have been a literal dream to attend, and then had to reject both offers because of money. This forced me to confront many of the feelings I haven’t had to deal with in Japan about capitalism, and how being poor makes it so much more challenging to have dreams in the first place. I’ve also picked up a pack of roaming bullies who seemingly have nothing better to do with their free time than watch my social media accounts, which I mean I guess I should be flattered to be receiving so much of their time and energy.
So all of this has been happening along with the stresses of the big life change of getting ready to move across the ocean and start fresh in grad school, leaving behind all of the friends and routines I’ve had for the last two years. All of this has given me much to think about, but not left me able to write much of anything at all. In many senses I have just been too exhausted to put myself out there in any public fashion apart from the appearances I am required to make at work or other obligations.
I feel generally exhausted these days by the multiple faces we are expected to show people. While this has been something I’ve struggled with a lot in the past, leading me to be more open about the negative things in my life on social media than most people find acceptable, this has been especially challenging in Japan. I find the role I have to play here as an ALT and token foreigner tiring. I find it easier to navigate my life here by largely keeping myself to myself, but since that is not who I am as a person it leaves me feeling bottled up. I like to share parts of myself with others, yet it feels like my role here is much more to be a person on display than to be an actual person. This leads to things like people thinking it’s acceptable to use their free time to come to my place of work and ask to observe my lessons or people generally disregarding my feelings and needs.
Being different around different people is normal, and probably even healthy. No one is the same around their parents, coworkers, and close friends. We all show varying faces and aspects of ourselves to different people and in different situations. This is taken to an extreme level with our social media personas. Much of our social media use is this sort of artificial posturing that we all expect each other to participate in. I’m not writing this as some sort of new idea that I’ve had—this is nothing new—but to give more of a context for why I have been unable to write and have generally fallen off from all social activities in the last few months. The combination of much of my day to day life feeling artificial, along with the somehow necessary artificiality of social media interactions, left me feeling almost entirely disconnected from any real understanding of what was my true self. I felt exhausted, wrung out, and yet simultaneously hurt and angry at the people and systems that I felt were not allowing me to be or discover myself as an authentic and complicated human being. The only way I found to combat all of this was to spend time at home, where I felt I could be the person I am without judgement.
A positive thing to have come out of all of this is I have learned to appreciate even more the benefit of having few core friends who truly see me as a person they accept, as opposed to many friends who all expect or even demand that I always be only one aspect of myself. I am so grateful for the few people in my life who don’t expect me to be anything other than who I am in a world where it seems like most people just want to take something from me. I think one of the biggest personal lessons I’ll have learned from my time in Japan is not to give myself to everyone, but to seek the people who want to give as much as they take in return and at the same time expect nothing.
I’m making it work, and that’s the important thing. I had to step back from many things in order to do it, but I’ve been making it work. It’s difficult when your life becomes completely uprooted. I don’t have many roots to begin with, and so I think I feel it more acutely than most people do. Without roots it can be so easy to forget who you are and what you want. Maybe that is why I find it so exhausting to be putting up so many faces; I’ve got nothing holding me to the ground. |
ate prob of sequence ri when two letters picked without replacement from {r: 1, i: 12}.
1/13
What is prob of sequence vqx when three letters picked without replacement from {d: 1, r: 2, v: 6, q: 2, x: 3}?
3/182
Calculate prob of sequence wcve when four letters picked without replacement from {c: 2, w: 1, e: 1, v: 3}.
1/140
What is prob of sequence nno when three letters picked without replacement from {n: 2, r: 1, t: 1, c: 4, o: 3}?
1/165
Calculate prob of sequence ljlz when four letters picked without replacement from {l: 3, t: 6, j: 1, i: 4, d: 1, z: 5}.
1/3876
Three letters picked without replacement from uuuuuhuuuhu. Give prob of sequence uuu.
28/55
Two letters picked without replacement from {g: 5, j: 7}. Give prob of sequence gj.
35/132
Calculate prob of sequence czfz when four letters picked without replacement from {c: 2, z: 2, f: 1}.
1/30
Calculate prob of sequence mmm when three letters picked without replacement from mmmm.
1
Three letters picked without replacement from {n: 2, j: 2, a: 3, w: 1, q: 3, m: 4}. Give prob of sequence jaa.
2/455
Two letters picked without replacement from nkm. What is prob of sequence nm?
1/6
Calculate prob of sequence ib when two letters picked without replacement from {b: 3, k: 3, p: 1, i: 7}.
3/26
Three letters picked without replacement from {d: 2, n: 3, m: 2, s: 3, v: 3}. Give prob of sequence smd.
1/143
Two letters picked without replacement from ctwei. Give prob of sequence ec.
1/20
Calculate prob of sequence hiri when four letters picked without replacement from rihrrir.
1/105
What is prob of sequence dd when two letters picked without replacement from {d: 4, c: 3, j: 1, w: 3, g: 1, v: 6}?
2/51
Two letters picked without replacement from aykskayakadkkaks. What is prob of sequence sy?
1/60
What is prob of sequence nhnh when four letters picked without replacement from nhwhhnhnnhhhnnnhhnh?
35/646
Calculate prob of sequence qh when two letters picked without replacement from hqqhhqq.
2/7
Calculate prob of sequence vwv when three letters picked without replacement from {v: 2, w: 1}.
1/3
What is prob of sequence amae when four letters picked without replacement from {z: 3, a: 4, e: 4, r: 2, m: 3}?
3/910
Calculate prob of sequence elke when four letters picked without replacement from {e: 2, k: 6, x: 1, l: 9}.
1/680
Two letters picked without replacement from {u: 1, l: 1, q: 1, t: 1, o: 8, c: 2}. What is prob of sequence tc?
1/91
What is prob of sequence ff when two letters picked without replacement from {p: 1, f: 7, j: 2, q: 4, k: 4}?
7/51
Two letters picked without replacement from {s: 9, u: 5}. Give prob of sequence su.
45/182
Two letters picked without replacement from zukttthhuvkttv. What is prob of sequence kk?
1/91
Two letters picked without replacement from {f: 6, x: 1, i: 1, z: 3, l: 8}. What is prob of sequence xz?
1/114
Calculate prob of sequence pp when two letters picked without replacement from pppppppppp.
1
Calculate prob of sequence mdd when three letters picked without replacement from {d: 4, m: 5, j: 1}.
1/12
Calculate prob of sequence jm when two letters picked without replacement from {m: 4, j: 7}.
14/55
Calculate prob of sequence booo when four letters picked without replacement from {b: 5, o: 7}.
35/396
What is prob of sequence ds when two letters picked without replacement from {d: 3, y: 1, t: 2, s: 1}?
1/14
Calculate prob of sequence sroo when four letters picked without replacement from pxrrmosom.
1/756
What is prob of sequence ssp when three letters picked without replacement from ssssspsp?
5/28
Four letters picked without replacement from exxxxxvxxxxxxxx. What is prob of sequence vxxx?
11/210
Three letters picked without replacement from iixmixijiimixxixjmi. Give prob of sequence xxx.
10/969
Three letters picked without replacement from hvkhkkskv. What is prob of sequence vkh?
2/63
Two letters picked without replacement from {m: 2, b: 1, r: 1, u: 2, o: 8}. Give prob of sequence mm.
1/91
What is prob of sequence ddd when three letters picked without replacement from {j: 5, d: 11}?
33/112
What is prob of sequence ovv when three letters picked without replacement from eeeepeoeoeeevv?
1/546
Two letters picked without replacement from ciib. Give prob of sequence ii.
1/6
Two letters picked without replacement from {z: 1, y: 12}. Give prob of sequence yz.
1/13
Calculate prob of sequence bkoo when four letters picked without replacement from {k: 3, b: 7, o: 3}.
21/2860
Four letters picked without replacement from vqkvoll. What is prob of sequence qkvq?
0
Two letters picked without replacement from emeeqcmedcmd. What is prob of sequence me?
1/11
Calculate prob of sequence kk when two letters picked without replacement from kmmwwkmngwd.
1/55
Four letters picked without replacement from {z: 6, i: 7}. Give prob of sequence zziz.
7/143
Two letters picked without replacement from jqvjjjjjjqvjqjjjjvj. Give prob of sequence jv.
13/114
Two letters picked without replacement from {s: 2, q: 8}. What is prob of sequence qq?
28/45
Two letters picked without replacement from {s: 7, g: 7}. What is prob of sequence gg?
3/13
Four letters picked without replacement from lglleellelllellelte. Give prob of sequence gllt.
55/46512
Two letters picked without replacement from dddddddfdfddd. Give prob of sequence ff.
1/78
Four letters picked without replacement from {l: 9, o: 9}. What is prob of sequence llll?
7/170
Two letters picked without replacement from rnrrnrnnwrf. What is prob of sequence fw?
1/110
Two letters picked without replacement from jhhkhhkjmmhmnm. What is prob of sequence jh?
5/91
Two letters picked without replacement from zvvvvvzzzvzv. What is prob of sequence vv?
7/22
Two letters picked without replacement from mnnmnmnnmnnmmnmmmnnm. What is prob of sequence nm?
5/19
What is prob of sequence dr when two letters picked without replacement from iiidiirtttttxt?
1/182
Calculate prob of sequence eljk when four letters picked without replacement from ekeleejjlllklej.
5/1092
Calculate prob of sequence qsr when three letters picked without replacement from qrqiskks.
1/84
Calculate prob of sequence pf when two letters picked without replacement from {j: 2, p: 1, f: 1, t: 1}.
1/20
Three letters picked without replacement from vyyyyzyyzzyyvyyyyyyy. Give prob of sequence vyy.
7/114
What is prob of sequence ccd when three letters picked without replacement from {d: 13, c: 5}?
65/1224
Two letters picked without replacement from jdudumu. What is prob of sequence ju?
1/14
Two letters picked without replacement from vqqtqftqww. Give prob of sequence qf.
2/45
Four letters picked without replacement from mmmvvgvvvtl. What is prob of sequence vvvg?
1/132
Calculate prob of sequence ofl when three letters picked without replacement from {o: 5, l: 1, m: 2, f: 1, h: 1}.
1/144
Calculate prob of sequence qj when two letters picked without replacement from qqttqtjjtqqtt.
5/78
Three letters picked without replacement from ejwjgw. Give prob of sequence wgj.
1/30
Calculate prob of sequence iyyy when four letters picked without replacement from iyiyiyyiyyyiyyyy.
165/1456
Four letters picked without replacement from hhhhhhhhhttt. What is prob of sequence hhth?
7/55
Two letters picked without replacement from bbbbbdbbdbbbbd. What is prob of sequence dd?
3/91
Three letters picked without replacement from {r: 3, c: 3, y: 2, j: 7}. What is prob of sequence rjy?
1/65
Calculate prob of sequence zxin when four letters picked without replacement from {z: 2, g: 2, i: 4, n: 3, x: 1}.
1/495
Calculate prob of sequence sx when two letters picked without replacement from ffhohoxiooooso.
1/182
Calculate prob of sequence xf when two letters picked without replacement from {f: 12, x: 6}.
4/17
Four letters picked without replacement from ffzffzfzffffzf. Give prob of sequence ffff.
30/143
Calculate prob of sequence kkkk when four letters picked without replacement from kkkkkk.
1
What is prob of sequence yoe when three letters picked without replacement from oeyfmejyf?
1/126
Calculate prob of sequence ky when two letters picked without replacement from kywykwwwk.
1/12
Calculate prob of sequence tlkt when four letters picked without replacement from {t: 9, k: 1, l: 9}.
9/1292
Three letters picked without replacement from cfccccvcvfef. |
Q:
How to use Jest to test file download?
I have some code as below:
/* global document */
/* global window */
/* global Blob */
import FileSaver from 'file-saver';
export const createDownloadFromBlob = (blob, filename, extension) => {
FileSaver.saveAs(blob, `${filename}.${extension}`);
};
export const createDownload = (content, filename, extension) => {
createDownloadFromBlob(new Blob([content], { type: 'application/octet-stream' }), filename, extension);
};
I want to use Jest to unit-test these two methods, but I don't know where to start. Any help would be appreciated.
A:
I would mock out FileSaver with a spy:
import FileSaver from 'file-saver';
jest.mock('file-saver', ()=>({saveAs: jest.fn()}))
As you cant compare Blobs I would mock this as well:
global.Blob = function (content, options){return ({content, options})}
now you can run your test and use expect like this
createDownload('content', 'filename', 'extension')
expect(FileSaver.saveAs).toHaveBeenCalledWith(
{content:'content', options: { type: 'application/octet-stream' }},
'filename.extension'
)
|
Penfield Tate III
Penfield Wallace Tate III (born May 19, 1956) is an American politician.
Tate's father Penfield Tate II served in the United States military. As a result, the younger Tate and his mother Ellen spent his early life on several military bases. Tate III graduated from Colorado State University in 1978 with a degree in sociology. He pursued a J. D. at the Antioch School of Law, ending his legal studies in 1981. Tate then became an attorney based in Denver for the Federal Trade Commission. In 1984, Tate began practicing law at Trimble, Tate & Nulan, a law firm cofounded by his father. Tate worked for Federico Peña from 1990 to 1991, returning to Trimble, Tate & Nulan in 1992, before leading his own legal practice, Tate & Tate, P.C., alongside his father. Tate worked for the Colorado Department of Administration before serving the Colorado Democratic Party as vice chairman from 1994 to 1996. He was elected to the Colorado House of Representatives from the eighth district the next year. In 2000, Tate sought election to the Colorado Senate from district 33.
Tate resigned from the state senate in February 2003 to contest the mayoralty of Denver in the 2003 Denver mayoral election. He was one of seven candidates in the mayoral election, but placed fourth in the first round and therefore did not advance to the runoff, won by John Hickenlooper. In October 2018, Tate began his second Denver mayoral campaign. He would, once again, place fourth in the first round of the 2019 Denver mayoral election.
References
Category:1965 births
Category:Living people
Category:Colorado Democrats
Category:African-American state legislators in Colorado
Category:Members of the Colorado House of Representatives
Category:Colorado state senators
Category:Colorado State University alumni
Category:David A. Clarke School of Law alumni
Category:Colorado lawyers
Category:Military brats |
#include <stdint.h>
#include <assert.h>
asm(".arch armv8.4-a");
void do_test(uint64_t value)
{
uint64_t salt1, salt2;
uint64_t encode, decode;
/*
* With TBI enabled and a 48-bit VA, there are 7 bits of auth,
* and so a 1/128 chance of encode = pac(value,key,salt) producing
* an auth for which leaves value unchanged.
* Iterate until we find a salt for which encode != value.
*/
for (salt1 = 1; ; salt1++) {
asm volatile("pacda %0, %2" : "=r"(encode) : "0"(value), "r"(salt1));
if (encode != value) {
break;
}
}
/* A valid salt must produce a valid authorization. */
asm volatile("autda %0, %2" : "=r"(decode) : "0"(encode), "r"(salt1));
assert(decode == value);
/*
* An invalid salt usually fails authorization, but again there
* is a chance of choosing another salt that works.
* Iterate until we find another salt which does fail.
*/
for (salt2 = salt1 + 1; ; salt2++) {
asm volatile("autda %0, %2" : "=r"(decode) : "0"(encode), "r"(salt2));
if (decode != value) {
break;
}
}
/* The VA bits, bit 55, and the TBI bits, should be unchanged. */
assert(((decode ^ value) & 0xff80ffffffffffffull) == 0);
/*
* Bits [54:53] are an error indicator based on the key used;
* the DA key above is keynumber 0, so error == 0b01. Otherwise
* bit 55 of the original is sign-extended into the rest of the auth.
*/
if ((value >> 55) & 1) {
assert(((decode >> 48) & 0xff) == 0b10111111);
} else {
assert(((decode >> 48) & 0xff) == 0b00100000);
}
}
int main()
{
do_test(0);
do_test(-1);
do_test(0xda004acedeadbeefull);
return 0;
}
|
Cow & The Moon Artisan Gelato Review
Are you guys drooling already? Nothing beats the sights of swirls of gelato, hmm...
You know food is the on the top of everyone's lips when you get asked by several people to visit a Gelato store in a suburb that barely anyone has ever heard of. What is even more surprising is that those no on the food wagon are also hopping along for this stop. So when Cow and The Moon Artisan Gelato beat Gelato Messina everyone had to flock to this corner store to see what the big fuss was and of course try that flavour that so famously beat every other competitor in the world. I actually went a while back, I just have an insane backlog of posts so that is why you're only reading this now but I am guessing by now that the crowds have subdued somewhat since I last went. If you hate waiting and love your options then go when it's sure to be quiet. I chose lunch time on a Monday and because of that I got to try the Madorla Affogato and a seat as well.
Large Cup $8.50 (up to 4 flavours)
I had Madorla Affogato, Guava Sorbet, Tiramisu and Popcorn
Rule of thumb whenever you order more than one flavour of gelato, you MUST always add a sorbet to that list. You're bound to love your chosen sweet, creamy, rich gelato but after several mouthfuls you really will need something to cleanse your mouth so that you can easily switch between flavours. I rarely see guava sorbet being offered and so it was a must that I get it. I found it to be incredibly subtle with sweet but slightly undertones. Looking back it probably wasn't the best pick considering how dominant the other flavours were, one of them being popcorn. It goes without saying that popcorn ice-cream tastes like popcorn- YUM - unfortunately for me, popcorn, tiramisu and madorla affogato all look the same (don't follow mistake) and so it was a bit hard to ascertain what I was eating at times. I loved the tiramisu and affogato though you are probably wondering how I can tell the two a part and to be honest, for the most part I couldn't except for their texture and differences in coffee intensity. The affogato combines Single origin coffee with caramelised almonds and a Madagascan Vanilla base. Verdict: it really is a flavour worth remembering and bragging about, the others are commendable but I'm a bit hesitant to slap the 'World's Best' next to it.
Oops I did it again, sorry guys camera didn't eat first. I was trying to be one of those pretentious people on instagram... Basically my friend and I are gluttons at heart and really one large cup of gelato isn't enough for two growing bellies. And in continuing with our Messina tradition, a take home tub of gelato has thereabouts become a must! To cap off our gelato eating experience we decided to grab some of their cups so we could use them to create one of those effortless Instagram pictures. The result? One. Big. Fail. I tried. Guys never ask me to serve you gelato because chances are it won't look pretty and because I'm a pretty straightforward person, I couldn't help but share this story. Again the prices are not cheap, not if I'm comparing them against Messina's prices; the 500ml tub we bought costs $13.50 (Messina is $11 from memory).
If you know me then you'll know that I'm not the biggest fan of mint, though my friend is so we go that flavour just for her. I really enjoyed the Black and Blue sorbet which is pretty much blackberry and blueberry sorbet. The colour is just divine and as can be said about flavours, it is super light but so incredibly rich in taste. I found the vinegar to be rather subtle, maybe I was just suffering from a bit of gelato overdose and my tastebuds had a enough for the day but it tasted a bit more like a strawberry yoghurt gelato.
Anyhow that was my take on Cow and the Moon, apologies for my week long sabbatical. Uni calls agains but since I will have more time on my hands in the next few days I shall up my posting schedule. Till next time~
Get In Touch
Find me on Urbanspoon
Instagram Updates
Meet The Author
Welcome to my blog and enjoy exploring my posts about food and fashion. And if you really must know more about me then you'll find an 'About me' tab at the top or if you're too lazy to do that then just click here |
2?
o
Let o be ((-3068)/(-117) - 26) + (-15)/27. Let a = -3.92 + -0.08. What is the closest to 3/8 in o, 1/3, a, 0.3?
1/3
Let x be (-4 + -12*(-12)/40)/(8/5). What is the nearest to 2 in -0.2, -3, -2/19, x?
-2/19
Let x be 2/(-18)*4824/(-1340). Which is the nearest to 3/2? (a) x (b) 0.09 (c) -0.5
a
Let l = -5.1 + 1.7. Let w be ((1 - 1) + 0)/(6248/3124). What is the closest to w in l, 1/6, -1/2?
1/6
Let f = 11.69 + 0.31. Let r = 36.7925 - 37.7925. Which is the nearest to r? (a) -2 (b) f (c) -5 (d) -2/7
d
Let v = 57 - 61. Let a(t) = -t**3 - 4*t**2 - 2*t - 7. Let l be a(v). Suppose 4*r - 13 + l = -4*u, 4*u - 3*r + 23 = 0. What is the closest to 0 in -1, u, 0.05?
0.05
Suppose 2*l = -10, -6*l - 638 = -5*r - 2563. Which is the closest to -2? (a) -0.3 (b) -4/7 (c) r (d) -2/7
b
Let z = 0.73743 + -0.23743. Which is the nearest to 2/7? (a) 3 (b) -531 (c) z
c
Let d be (-41)/(-18) + -3 - (-2)/9. Which is the closest to d? (a) -296 (b) 3 (c) -1
c
Let x be ((8/12)/2)/(8/(-48)). What is the closest to x in 2.2, -0.4, 2, 5?
-0.4
Let w = -0.0691 + 3.0691. Which is the closest to -0.1? (a) -0.36 (b) w (c) -2
a
Suppose -381*i + 1881 = -384*i. Let m be ((-10)/9 + 1)/(11/i). Which is the nearest to m? (a) -1 (b) -4 (c) 0.6
c
Let p = 7084.1 - 7084. Which is the nearest to -0.2? (a) 0.5 (b) 0 (c) p
b
Let p = 0.12 - -0.06. Let m = -0.02 - p. Let d = -3510.1 - -3510. Which is the nearest to d? (a) -17 (b) -5/4 (c) m
c
Let u = -2.07 - 2.93. Let k = -9 - 38. Let o = k + 47. Which is the closest to o? (a) 0.3 (b) 0 (c) u
b
Let d be (1/3)/((-3)/192). Let o = -304 + 326. Let g = o + d. What is the closest to -1 in 0.2, g, 4?
0.2
Let t = 12.565 - 12.465. What is the closest to t in 2, -1/12, 0?
0
Let l be ((-6)/(-3))/(-3 - 3 - -1). Let u = -481 - -486. Which is the nearest to u? (a) l (b) 0.3 (c) 2/7
b
Let a be 20/(-119) + (-10)/85. Let o = 19058 + -19058.5. Let w = 0 - -3. What is the nearest to a in -0.4, w, o?
-0.4
Let q = -22 - -22.054. Let d = q + 0.046. Let x = d + 0. Which is the nearest to x? (a) 1/3 (b) -0.4 (c) 0.2
c
Let y be -10 - ((-72)/9 - 0 - -1). What is the closest to 0.1 in 1/9, 4, y, 7?
1/9
Let u be 4/14 - (-39 + (-64714)/(-1638)). Suppose 0 = -2*p + 2*v, p - 4*v = -4*p + 2. Which is the nearest to 0.1? (a) p (b) 15 (c) u
c
Let x be 60/55 + (-4 + 1 - -2). Let d = -0.05 + 0.15. Which is the closest to d? (a) -1 (b) x (c) -4
b
Let s = -70 - -209/3. Let m = 0.2 - 0.1. Let x = 46 - 45.5. Which is the closest to s? (a) x (b) -9 (c) m
c
Let r be 6 + (-56)/9 + ((-136)/(-180))/(-2). What is the nearest to r in 16, -0.03, 2?
-0.03
Let y = -277.26 + 282.26. Let n = 3.89 - -0.11. Which is the nearest to -2/23? (a) n (b) 0.5 (c) y
b
Let y be 1/(-7) - 1164/231 - (-8 - -3). Let r = -13 - -2. Which is the closest to r? (a) y (b) -3 (c) 1/9
b
Let u = -17164 + 85821/5. Which is the closest to 6? (a) 3 (b) 33 (c) 4 (d) u
c
Let k = -805 + 805.9. What is the closest to 0 in k, -0.1, -5, 0.045?
0.045
Let c = -3580 + 3045. What is the closest to c in -2, 0.1, 0.4?
-2
Suppose 0 = -6*n - n + 7. Let u = -12160 - -12161. What is the nearest to n in 2/39, 0.01, u?
u
Let o = 121 - 124. Let n be ((-2)/3)/(((-4)/o)/4). Which is the nearest to -2? (a) 2 (b) 0.7 (c) n
c
Let p = -214 + 213. Suppose 0 = 4*w - 2*s - 12, -13*w + 12*w = -3*s - 8. Which is the nearest to p? (a) w (b) 6 (c) -1/3 (d) 0.4
c
Let h = -5838 - -5837.9. Let w = -4296/19 + 226. Which is the nearest to -8? (a) 3 (b) h (c) w
c
Let x = 33402 - 33402.1. Which is the nearest to x? (a) -1 (b) 15 (c) -4 (d) -4/25
d
Let v be (2/9)/(12*(-7 + 34/6)). What is the closest to -2/13 in -3, 2, v, 0.4?
v
Let x be 65/468 - (-5)/45. Let i = -13 - -6. What is the nearest to x in 1/4, -2/13, i?
1/4
Suppose -6318*s - 140 = -6290*s. Which is the closest to -1? (a) 2 (b) -3 (c) -22 (d) s
b
Let h = -15919 - -15918. What is the closest to 0 in -2, 5, -66, h?
h
Suppose 0*c + 5*c - 240 = 4*h, -5*c - h + 265 = 0. Let v be (-70)/c - (-6)/4. What is the nearest to 2 in -3, 0.2, v?
0.2
Let s = -20292 + 20290. What is the nearest to -2 in 1, s, -15, -10?
s
Let w = -677 - -689. Which is the closest to w? (a) -4 (b) 3/7 (c) 1/6
b
Let m(p) = -p**3 - 3*p**2 - 10. Let h be m(-3). Let b(r) = -r - 8. Let d be b(h). What is the nearest to 0.1 in 1, d, 7?
1
Let i = -2 - 45.5. Let y = 47.6 + i. Which is the nearest to y? (a) -2/3 (b) 1.7 (c) 0.1 (d) 0.4
c
Suppose 0*p - 16 = -4*p. Let v = 1231.389 - 1232. Let k = v + -4.389. What is the nearest to 0 in 1/2, p, k?
1/2
Let y = 6 + -2. Let k(c) = 20*c**2 + 2*c + 1. Let t be k(-1). Suppose -t*d = 9*d - 28. What is the closest to 9 in y, 1/2, d?
y
Let v = 2.9 - 14.5. Let o = 13.6 + v. Which is the closest to -0.1? (a) 2/7 (b) 0.4 (c) o
a
Let w = 9.37 - 9.07. What is the nearest to 1 in 2, -0.4, -1/8, w?
w
Let r = 295 - 295.3. Let i be 14/4 + (-42)/(-28). Let t = i - 16/3. Which is the closest to 0? (a) r (b) t (c) 40
a
Let s = -5.4 + 19. Let f = -10.6 + s. Let j = 0.18 - 0.21. Which is the closest to -0.1? (a) 1 (b) j (c) f
b
Let l = -42 + 47. Let t = -2.42 + -0.58. Let k = l + t. Which is the nearest to 3/2? (a) -0.4 (b) -2/15 (c) k
c
Let t = -329.2 + 435. Let q = t - 106. What is the closest to q in -2, 5, -0.1?
-0.1
Let k = 9/4 + -11/12. Let g be 38/12 - (-2)/(-4)*6. What is the closest to 0.1 in g, k, -2/5?
g
Let y be (-2)/6 + 39/9. Let i = y - 4. Let f = 120881 - 120882. What is the closest to f in 2/15, i, 2/7?
i
Let g(i) = 4*i**3 - 42*i**2 - 22*i - 2. Let j be g(11). Which is the closest to -1.8? (a) -4 (b) 7 (c) 0 (d) j
d
Let o = -33113.94 - -32372. Let h = -742 - o. Suppose 5*p + 8 + 2 = 0. Which is the nearest to -2/3? (a) p (b) 2 (c) h
c
Let f = -0.4 + 0.7. Let d = 17 + -43. Let r = d + 23. Which is the nearest to -0.1? (a) 2/13 (b) f (c) r
a
Let m = -105 - -60. Let r = m - -41. Let f be 4/(-10) + (3 - 3). What is the nearest to 2 in 0, r, f?
0
Let m = -144 - -147. Let s be 2*6/(-4) + -2. Let g = -106.9 - -107. What is the nearest to g in s, -4, m?
m
Let f(p) = -4*p**2 - 24*p + 2. Let t be f(-6). What is the closest to 0 in t, 0.3, 4/5?
0.3
Let u = -13387 + 13382. Let y be (-6)/38*(-3)/(-9). Which is the nearest to -0.1? (a) y (b) 2/3 (c) u
a
Let x = -114 + 83.6. Let r = 30.5 + x. Let v be (-3)/12 - 13/(-20). What is the nearest to r in -0.1, 2/3, v?
-0.1
Let w = 0.36 - -0.04. Let f = -0.87 + 77.87. Let g = -77.1 + f. Which is the nearest to g? (a) w (b) -13 (c) 0.5
a
Let t be (7/(-2) - -3)*2. Let r be (t/(-15))/(3/(-9)). Which is the closest to 0? (a) 1 (b) r (c) 4
b
Let b be 18/6*12/(-4). Let i = -2972.4 - -2972. What is the nearest to -0.3 in i, b, 5, -0.5?
i
Let v(h) = 15*h + 4. Let i be v(-2). Let o be 5/15*0 + i/108. Let f = o + 2/27. What is the nearest to 0.2 in -5, 6, f?
f
Let i = 1050 - 1041. What is the nearest to 0.1 in -9, i, 2/3, -0.3?
-0.3
Let g be 228/(-58) - 2/29. Let o be g/10 - (-12)/40*8. Let w(j) = -j**3 - j**2 + 2*j + 1. Let n be w(-2). What is the nearest to 23 in o, n, -0.3?
o
Let g(y) = -y**3 + y**2 + 2*y + 1. Let w be g(-1). Let r = -0.046 - -1.676. Let n = r + -1.23. Which is the nearest to -0.1? (a) n (b) 5 (c) w
a
Let y = 0.35 - -92.65. Let z = -98 + y. Which is the nearest to -2/11? (a) z (b) -0.2 (c) -2/5
b
Let n = -140 + 75. Let o = -1334.1 - -1399. Let b = n + o. What is the closest to b in 1/4, 5, -28?
1/4
Let w(x) be the third derivative of x**6/120 + x**5/15 - 3*x**4/8 + 2*x**3 + 68*x**2. Let u be w(-5). What is the nearest to -3 in u, 1, 2/5?
2/5
Suppose -2*q = -7*q - 5*d - 15, 2*d = 2*q + 18. Let t be (q*(-1)/8)/((-30)/24). Which is the closest to t? (a) 5 (b) -4 (c) 4
b
Let o = 0.2 - -0.3. Let w = -1.98426 - 20.01574. Which is the nearest to w? (a) o (b) -0.5 (c) -1/3
b
Let s = -2055.7 + 2056. Let f = 0 - -13. What is the closest to f in 1/3, s, -0.3, 2/7?
1/3
Let q = 3487.3 - 3487. Which is the nearest to -1/2? (a) -10/7 (b) q (c) 2/9
c
Let k = -1.75 - -3.38. Let h = k - -6.47. Let u = -8 + h. What is the nearest to -2 in -6, u, 0.3?
u
Let x = 5.717 - -0.183. Let r = x - 5.7. Which is the nearest to 0.04? (a) -3/4 (b) r (c) -1
b
Let k be ((-2)/(-20))/(2/3908). Let u = k - 195. What is the closest to -2/57 in 0, 1, u?
0
Suppose 0 = -3*z |
Yuefan Deng
Yuefan Deng (Y. F. Deng, , born December 1962) is a professor at Stony Brook University and is also an affiliated faculty of the Institute of Advanced Computational Sciences at the same university. In addition, he is the Mt. Tai Scholar at the National Supercomputer Center in Jinan, China and this title ended in December, 2017. Yuefan Deng specializes in design and applications of supercomputers. He published widely in physics, applied mathematics, life science and biomedical engineering, in addition to the Biography of C. N. Yang, the Nobel laureate. He has been granted 13 patents by the US Patent and Trademark Office and China's State Intellectual Property Office and most of these patents are related to supercomputer network topologies. In 2002, with a direct invitation from then Nankai University president, Deng became the founding director of the Nankai Institute of Scientific Computing. He later resigned from the post in 2005 after completing the first term.
Education
Yuefan Deng obtained his BS degree, with honors, in physics from Nankai University of China in 1983. In August that year, he entered the Department of Physics of Columbia University through a special scholarship program CUSPEA organized by the Chinese-American Nobel laureate T. D. Lee. He obtained his Ph.D. degree in theoretical physics with a thesis on simulating gauge theory using special-purpose supercomputers supervised by Norman Christ from Columbia University in 1989. He did his postdoctoral training in the Courant Institute of Mathematical Sciences at New York University with James Glimm, during the summer of 1989.
Achievements
Co-opted as a member of Mathematics and Physics Committee of China in 2012.
Chosen as the 8th list of the Recruitment Program of Global Experts (Plan 1000 Program) of China in 2012.
Elected as Overseas Distinguished Specialist of Taishan Scholars by China's Shandong Academy of Sciences in 2010.
Supervisor of Winning Team of Asia Student Cluster Challenge 2014. Team: Nanyang Technological University, Singapore
Supervisor of Winning Team of SC14 Student Cluster Competition 2014. Team: National University of Singapore
2015 MTI Innovation Gold Award for InfiniCortex Project, Ministry of Trade and Industry, Singapore
2016 State University of New York Chancellor's Award for Excellence in Teaching
Textbooks
Y. Deng, Lectures, Problems and Solutions for Ordinary Differential Equations, published by World Scientific (First Edition: 2015 ; Second Edition: 2018 ).
Y. Deng, Applied Parallel Computing, published by World Scientific (2013). .
Y. Deng and Z. Lou, Calculus IV with Many Examples, published by Copley Custom Textbook/XanEdu (Edition 1:7/2009; Edition 2:1/2011)
Y. Deng, S. Amir and C. Han, Lectures on Introductory Partial Differential Equations, Methods for Solving Basic PDEs, published by LAP LAMBERT Academic Publishing (2015). .
Y. Deng (Translator; Original English version by James Glimm) Mathematical science,Technology,and Economic Competitiveness, published by Nankai University Press (1992). .
References
External links
Y. F. Deng's English Home Page
www.ams.sunysb.edu/~deng
Category:1962 births
Category:Columbia University alumni
Category:Columbia University faculty
Category:Hong Kong University of Science and Technology faculty
Category:Hubei
Category:Living people
Category:Nankai University alumni
Category:New York University faculty
Category:Stony Brook University faculty |
Sell bitcoins instantly
How to trade on bittrex
Trade Coin Club It is a membership club, created to revolutionize the trading market of digital coins. Coin It - Facebook Coin It, Cape Town, South Africa.
117.08 ETH/USDT Buy Ethereum Binance Binance cryptocurrency exchange - We operate the worlds biggest bitcoin exchange and altcoin crypto exchange in the world by volume. Another thing to note is the Binance Coin, which was issued during their own ICO.
The eBoost wallet is available to download for your Mac, Linux or Windows PC. Monero Soft Fork in October, 2018 Monero. FREE shipping on qualifying offers. Bitcoin is a digital or virtual currency that uses peer-to-peer technology to facilitate instant payments.
OMC - Stock quot; for Omnicom Group Inc - MSN Money View the latest OMC stock quot; and chart on MSN Money. The randomness comes from atmospheric noise, which for many purposes is better than the pseudo-random number algorithms typically used in computer programs. Binance includes the same coins as Coinbase in addition to over 100 more.]
THIN MARGIN - Singapore's First Largest Online Money.. Binance Cryptocurrency Exchange and Trading Platform Review Read this review first before open account trading on Binance exchange broker.. I ve been using Coinbase to get a feel of how things work and now i feel i can go into Trading others. Paying scammers with gift cards Consumer Information.
ALL ABOUT COINS INC. is a registered UTAH STATE business name since 1984. Services offered only on location. This site offers NO. Online Ordering Services and. NO. Online Retail Store Services.. How to convert bitcoin into cash - Quora Selling your gift cards in person gets you cash right away and you won t have to wait for a company to receive your gift card in the mail before you get your payment. how cash in bitcoins, local bitcoins free, evergreen coin price.
Available Coins : Now, this is a big deal. It becomes very tough for a beginner to understand it. There are so many options available on this platform for the pairing of cryptocurrency with the more addition of currency by developers at the time. M: twork - Easy Counter m is tracked by us since May, 2012. FX Exchange Rate Definition of Exchange Rate. bitcoinist, binance crypto exchange website.
CryptoEx enables you to setup an online / offline crypto currency trading and exchange platform making it possible for start your FinTech Business in most trending domain.. Coinbase vs Binance Exchange Comparison - CoinCentral Binance has a much larger coin selection than Coinbase. binance list of coins, how to exchange on binance. |
1) How did Greece get into such trouble?
Greece from the mid-1990s until last year was constantly spending more than it was collecting in tax revenues. For most of this time, the country’s initially reported numbers showed small differences that were subsequently found to have been much larger. The revisions tended to be most substantial right after elections when a new government would find that its predecessor was much more profligate than had been reported. Because of these deficits, the country borrowed to cover the shortfalls and its debt burden was steadily rising.
In the fall of 2009, a then newly elected government reported that the deficit for that year was going to be 13.6 percent of economic output and that the deficits in 2007 and 2006 were also larger than had been reported. From that point onward, the world began to wonder if Greece really could pay the debt that it had issued or needed to default. Its borrowing costs rose sharply and the country began looking for ways to reduce its required debt payments and end its borrowing addiction.
2) Wasn’t Greece already bailed out in 2010?
By the spring of 2010 the excessive debt problem became unbearable and there was open speculation that Greece would default. The country had done this on four occasions previously since 1800. Much of the government debt was owed to banks outside of Greece, with the largest amounts in France and Germany. So if Greece had stopped paying, the French and German banks would have suffered substantial losses.
Greece was lent new money in 2010, but as Karl Otto Pohl former head of the German central bank observed at the time much of that money was used to repay the obligations owned by the French and German banks. The new lending was advertised by the politicians across Europe as a rescue for Greece. But it was at least as much a deal to buy time for the banks and other owners of Greek debt to avoid a default. Greece did avoid default, but the support came with requirements designed to make sure that the country end its chronic deficit spending.
3) Why did that rescue fail?
To justify the new lending, the lenders had to be assured that the deficits would end and that the country would grow enough to be able to service its debt. In May of 2010, the International Monetary Fund (IMF), led at the time by Dominique Strauss Kahn, who had ambitions of running for the presidency of France, conducted an analysis to see if such a scenario was realistic. The report at the time concluded that if Greece undertook drastic reforms it could close its deficits and begin growing so that over time the debt (including the new lending that was being provided) would be manageable.
This analysis was later shown to be deeply flawed by the IMF itself. The Greeks did actually cut their deficits substantially, but many of the reforms that were supposed to support growth did not occur and the economy contracted substantially. So the debt, relative to the size of the economy, did not improve. Importantly, no debt was written off in 2010, even though many analysts, including some on the executive Board of the IMF, at the time believed that it was necessary and that the banks and other private sector owners of the debt should have taken some losses.
4) What is the troika (or the institutions) and what do they have to do with this?
The new lending in 2010 came from two sources, a fund that was raised from European governments and the IMF. The bailout fund was overseen by the finance ministers of these governments. The European Central Bank also provided support to Greece in two ways. First, it allowed banks in Greece (and everywhere else) to borrow from it by posting bonds guaranteed by Greece as the collateral. Second, it bought some Greek government bonds in the open market. So all three of these organizations were now exposed to losses in the event that Greece ever defaulted. As such, they had representatives that met regularly with the Greek government to make sure that the reforms were on track. Initially the three were called the troika. Subsequently, they have also been referred to as “the institutions”.
5) Wasn’t Greece also bailed out in 2012?
By late 2010 it was already clear that the debt burden might prove to be unsustainable. So discussions began over reducing the debt. The Greek government was supposed to sell some assets to retire some of the debt. That never happened and as the recession continued it was clear that the 2010 plan was not going to be adequate. So in March 2012 a second bailout program with revised terms was undertaken.
The IMF lent additional money, but the main conditions that accompanied the funding were largely the same. Once again, the cornerstones of the plan continued to be steps to make tax collection more efficient, to reduce spending promises, and to undertake reforms to encourage hiring and business expansion that would support growth. It was not clear why this plan would be more successful than the first one.
The European Central Bank meanwhile became more deeply committed to stabilizing financial markets. ECB President Mario Draghi famously said in July 2012 that “within our mandate, the ECB is ready to do whatever it takes to preserve the euro. And believe me, it will be enough.” Draghi’s statement immediately led to a drop in borrowing costs for governments across Europe and the pressure on Greece temporarily subsided.
By continuing to allow banks everywhere to use Greek debt as collateral, the ECB also created conditions that supported the trading of Greek debt. By this time the French and German banks had shed their exposure to Greece so that they would no longer be directly harmed if there was a default. So the stealth rescue of the non-Greek banks was completed with little public attention and the narrative that all the problems were self-inflicted by the Greeks became more pronounced.
6) Why is Greece in trouble again now?
In the time since Draghi’s statement three important things happened in Greece. First, Greece made further substantial progress on closing its deficits. By late 2014, Greece was finally spending less than it was collecting, although the interest payments on debt meant there was still an overall deficit. So for the first time since Greece adopted the euro it had budget position that was solid.
Second, the economy contracted for two more years as the reforms failed to deliver higher growth. Certainly the higher tax collections and reduced government spending contributed to the weak performance, but the degree to which the planned reforms, if fully implemented, could have offset that remains controversial. It is important to also recognize the massive collapse was preceded by a very large debt-fueled boom.
Austerity notwithstanding, the economy seemed to have reached bottom and was finally beginning to recover in late 2014. A very interesting counterfactual scenario is to contemplate what would have happened if the political situation had allowed this progress to continue.
The third major development, however, was that the public lost confidence in the incumbent government and its lenders. Unemployment in Greece has remained above 25% for years and was much higher for young people. So the citizens were fed up. Hence, in 2015 the public voted for a new government that insisted on deviating from the past playbook.
The major party in the new coalition, Syriza, is often referred to a coalition of the radical left. In January 2015, newly elected Prime Minister Alexis Tsipras sought to reopen negotiations with Greece’s creditors.
7) What is the Greek government asking for?
The Tsipras government wanted three types of changes. First, it wanted to restore some of the spending cuts that had been enacted. Second, it wanted to reverse some of the revenue hikes that the past governments had instituted. These first two requests would have widened the deficit and also reorganized priorities within the budget. (In fact, once it became clear that Syriza was going to win the election, tax revenues began shrinking as the public stopped paying some unpopular taxes).
Finally, it wanted outright forgiveness of some of the debt that had accumulated. Since taking office, Tsipras has been negotiating with the creditors over for a new set of agreements. The creditors have made some modest concessions but are largely insisting on a continuation of similar plans.
When he failed to secure these changes, Tsipras announced that he would have the Greek people vote on a referendum on July 6th over whether Greece would vote yes to accept the creditors latest offer or vote no to reject it.
8) Why do the institutions disagree with the government?
There are two sources of objections that the creditors have with Tsipras’ requests.
First, and probably most importantly, countries such as Italy, Portugal, Spain, and Ireland, had all had to undertake similar types of adjustment as in Greece. None of them saw their economies collapse to the extent of Greece, but unemployment especially among the young is also high in all these countries. Hence, if there are substantial concessions to Greece, then these countries will insist upon getting similar treatment. The existing governments in these countries all realize that if electing a radical government in Greece is seen as being rewarded, then voters elsewhere will do the same.
The money needed to save Greece could easily be found. Greece is a small economy, so even though their debt is large when judged relative to Greece’s economy, it is small relative to the overall capacity in Europe. In contrast, the money needed to forgive debt in the other countries, especially Italy and Spain, is not affordable for Germany (and all the other Northern European countries that would have to foot the bill).
Second, even if there was some way that Greece could be helped without setting a precedent, the officials do not trust the Greeks to carry through with any plans. The fact that Prime Minister Tsipras is asking for a public referendum to accept a continuation of prior policies was the straw that broke the camel’s back. Tsipras is arguing that the public should reject the plans, but he says that if the public prefers to accept them, then he will go along with that. The institutions doubt that he could reverse his position and suddenly begin taking steps which he has campaigned against for years. They also are infuriated that he believes his mandate to get better terms supersedes the ones that other elected governments had from their citizens that wanted no more bailouts.
Another consideration is that IMF, the ECB and the other European leaders believe that unlike before if Greece defaults the spillovers can be managed.
9) Why is the IMF loan that is coming due so important?
The IMF made loans in 2010 to Greece that no private lender would have been willing to make. It did so with the presumption that it would be first in line to be repaid subsequently.
For failing businesses in many countries, there is analogous arrangement where in a bankruptcy situation a judge can decide that a business is worth more if it can continue to operate with some new funding, than if it was closed and sold off immediately. In that case, the new funding gets highest priority for repayment (otherwise no one will lend) and a judge will make sure that is the case. For countries, enforcing this priority is a problem since there is no court or other authority that can compel a country to pay.
Greece has now announced that it will not pay the IMF the €1.55 billion that it is owed on Tuesday (June 30); once it has defaulted, Greece becomes an international pariah. To preserve its own ability to operate in future crises, the IMF must insist on being repaid. If it ever accepts the idea that a country can default if things go south, then it will never get repaid in the future. So the IMF will continue to seek repayment, no matter how flawed the analysis that led to the lending in the first place.
Interestingly, Greece did make a small payment to the European bailout fund, so it will not be in default to that lender even if it does fall behind with the IMF.
10) What did the ECB decide this weekend and why is Greece closing its banks?
The ECB decided it could no longer keep accepting additional collateral from the Greek banks that was guaranteed by the Greek government. This means no more extraordinary lending will be extended. The ECB was worried that Greece might not honor the obligations and hence it could be left with collateral that would be insufficient to cover the loans it extended already. This is in keeping with Draghi’s promise of staying within the ECB mandate; lending when losses are expected would be clearly illegal.
However, the ECB has not completely cut off its support to Greece. The ECB could have recalled all of its loans, or demanded even more collateral for the existing loans. But for the Greek banks this removed the only viable option for obtaining more cash. They do not have assets that they can sell to come up with more cash. So without the ECB’s full support, they are in serious trouble.
Greece has closed the banks so that depositors cannot take out all of their money. There are now limits on how much depositors can get from ATMs and limits on wire transfers. So depositors are nervous and scared about what is going to happen.
11) What can Greece do to save its economy now?
Greece must either find a new lender, which seems very unlikely, or survive with very little credit for a while; Russia will not step in to offer support, since doing so would likely wind up with some of the resources transferred to other creditors and Russia has its own big fiscal problems.
If there is a no vote, Greece will likely stop payments on all debt. Being cut off from credit markets, it will now be forced to match its spending to the revenue it is receiving. To ease the burden, the government will likely distribute IOUs of some form to government employees, vendors and pensioners. It may even have to use IOUs to fund the referendum.
These IOUs will likely circulate as a form of money alongside the euro. People will strongly prefer euros to the IOUs, so the IOUs will trade at a discount.
Some people and businesses may resort to bartering. 12) Why not just bring back the drachma?
The public will have little confidence in the IOUs that the government issues. Probably even less confidence if Greece opts to officially introduce a new currency. Reintroducing the drachma would be totally illegal under European law and form the basis for a law suit to force Greece out of the European Union (EU). As part of the EU, Greek citizens can travel freely and work anywhere within Europe. Greek goods are also allowed to be sold without being subject to tariffs. Expulsion from the EU would be devastating.
Issuing IOUs which are not officially touted as a currency is a better option for Greece for now. 13) Will the Greek crisis spread?
It depends largely on what citizens make of the impending chaos in Greece. If people believe that their governments also might default on debt, they could also try to get money out of the banks. Likewise, investors could refuse to buy newly issued debt.
The ECB is likely to be able to head off both these problems. It is already buying debt and can do more of that. It also can lend against the collateral guaranteed by these governments. The ECB can probably contain the immediate fallout.
The political contagion is much harder to assess. Perhaps if Greece emerges in better shape in the medium term, then other countries will follow. Tsipras was betting that this concern would be so powerful that Europe would never take this risk.
14) What is likely to happen next in Greece?
The outcome of the referendum now becomes critical. If the public votes “yes”, then perhaps the existing government (likely reorganized) will be able to reopen the banks and conclude a deal.
But, if the public sides with Tsipras government, then there will be a very sharp recession over the next few months. Tax collection is likely to collapse. The Tsipras government is unlikely to survive the economic collapse.
If the post-Tsipras government opts to proceed with the default, then the next big unknown is how long before the economy stabilizes. At some point Greece will be a very attractive tourist destination, and its goods that are no longer priced in euros will be more competitive, so at some point the economy will begin to turn around. Whether this takes months or quarters will depend on many decisions that are difficult to forecast now.
15) What happens to the IMF if its loan is not repaid?
It will continue to pursue its claim against Greece. Greece will not be able to borrow internationally until it makes peace with the IMF. So the IMF will eventually be repaid. This could take years.
The IMF is likely to be criticized further for the recommendations it made, particularly in 2010. Perhaps it will be reformed to limit its discretion in lending.
Traditionally the head of the IMF has been a European. That is very likely to change since many countries believe that Greece was treated preferentially because it was a European country.
16) What happens to the ECB if Greece defaults?
The loans made to Greece are extended by the Greek central bank, which in turn borrows from the ECB. So the ECB will have a large claim against the Greek central bank that is likely to turn into a significant loss.
17) Can the ECB survive if Greece defaults?
The ECB can definitely continue even if Greece defaults. The ECB has provisions set aside to cover some losses. It also is making lots of profits on the bonds it owns (that it pays for with money that pays no interest). So the Greek losses per se are not a problem.
A default by a larger country such as Italy or Spain would be very different. 18) What should have been done to avert this crisis?
Greece should have defaulted in 2010. Its debt burden then was unsustainable and nothing since then has changed this. It is true that financial markets were much more jittery at that time, but the money that was raised to pay off the creditors in that bailout could have been diverted to support Greece and other weak countries. Once the bad rescue of 2010 was undertaken, it was inevitable that some form of debt relief was going to be necessary.
Imagine how different the political dynamics in Europe would have been if the German and French banks had been explicitly bailed out.Lesenswert |
All the latest deals from clubs in our region in the January transfer window.
Conor Washington could soon be a QPR player. Credit: PA
Peterborough United striker Conor Washington is reportedly set to join Championship side QPR in a £2.5 million deal.
The 23-year-old has been in terrific form for Posh this season, scoring 15 goals in all competitions.
A number of clubs had shown an interest in the former Newport County man, but it appears that Rangers have won the race for his signature. |
Isabel De Pedro
Isabel De Pedro is a Spanish fashion brand based in Barcelona since 1968. For over 44 years, the brand has crafted its vision for the sophisticated and modern, elegant and powerful, urban women through fine bespoke attire. The designer finds inspiration by immersing herself into cultures, countries and art. It's visual identity is world-traveled, reflecting a fusion of art and culture that have inspired its origins from the start.Bold prints and materials are at the heart of each collection delivering timeless pieces. |
4
Expand (2 - 1 + 5)*(-2 - 7 + 0)*(2*m**3 - m**3 - 2*m**3).
54*m**3
Expand (4 - 4 + 4*t**3)*(-8*t + 6*t - 7*t + (-1 + 2 + 2)*(0*t - 3*t + t) + t + 2*t - 5*t).
-68*t**4
Expand (5 - 5 - 2*m)*(2 - 2 + 2*m) + (2*m + 3*m + 2*m)*(-4*m + 2*m - m).
-25*m**2
Expand (-170 - 66 - 96)*(0*a + 0*a + a**3).
-332*a**3
Expand (11*z + 11*z - 24*z + (z - 2*z + 0*z)*(2 + 0 + 0))*(-4*z**2 + 0*z**2 + z**2).
12*z**3
Expand (-11*x**2 - 4*x**2 + 6*x**2)*(-2*x**2 - 4*x**2 + 4*x**2) + x**4 + x**4 - 3*x**4 + (-x + 3 - 3)*(-2*x + 3*x + 0*x)*(0*x + 0*x - 13*x**2 + x).
30*x**4 - x**3
Expand (-114*w + 4612 - 4614 + 25*w)*(0*w**3 + 2*w**3 + 0*w**3) + 3*w - 3*w - w**4.
-179*w**4 - 4*w**3
Expand (2*r - 50 + 46 + 26*r)*(r - r + 5*r**3).
140*r**4 - 20*r**3
Expand (3*n**3 - 9 + 9)*(n**2 - 3 + 3) + 2*n**2 - 2*n**2 + n**5 + (4*n + 2*n - 4*n)*(-5*n**4 + 6*n**4 + 3*n**4).
12*n**5
Expand c + c**5 - c + (-c - 4*c + 3*c)*(0*c**4 - 4*c**4 + 3*c**4) + 0*c**5 - 6*c**5 - 7*c**5.
-10*c**5
Expand (-180 + 178 - 21*i - 14*i)*(-2*i**4 + 3*i**2 - 3*i**2).
70*i**5 + 4*i**4
Expand (-v**2 + 1 - 1)*(-3*v + 5 - 5)*(112 - 24*v**2 - 112) + (3 + 0 - 5)*(-3*v - 2*v**5 + 3*v).
-68*v**5
Expand m**2 - 102*m**4 + 185*m**4 - 95*m**4 + (-5*m**2 + 3*m**2 + 4*m**2)*(-m**2 + 2*m**2 - 2*m**2).
-14*m**4 + m**2
Expand 5*v**4 + 4*v**4 - 3*v**4 + (2*v**4 + 0*v + 0*v)*(3 - 2 + 1) + (2 - 2*v**4 - 2)*(4 - 1 - 4) - 5*v**4 + v**4 + 5*v**4.
13*v**4
Expand (230*m**2 + 70*m**2 - 30*m**2)*(m**3 + 4*m**3 - 4*m**3).
270*m**5
Expand 11*i**5 + 1427*i**4 - 718*i**4 - 714*i**4 + (-i**3 - i**3 + i**3)*(3*i**2 - i**2 + 0*i**2).
9*i**5 - 5*i**4
Expand (1 - 2 + 0 + (-2 + 1 + 2)*(-2 - 5 + 5) - 2 + 2 - 2)*(-46 - 12 + 12*j**4 + 37).
-60*j**4 + 105
Expand (2*p - 4*p + 3*p + (-3*p + 1 - 1)*(-2 - 1 + 1))*(-2*p**2 + 5*p**2 - 26*p**2).
-161*p**3
Expand ((0*h**3 - 7*h**3 - h**3)*(-1 + 5 - 6) - 10*h**3 - h**3 + 0*h**3)*(0*h + 0*h - h).
-5*h**4
Expand (-z + 2*z - 4*z)*(-7 - 3 + 2)*(-2 + 3 - 5).
-96*z
Expand (0*k**3 + 2*k**3 - 7*k**3)*(0*k + 7*k - 2*k)*(5 + 0 - 3)*(3 - 3 + 1)*(-k - k - 2*k).
200*k**5
Expand (12*p**2 + 7*p**2 - 18*p**2 + (-5 + 5 + 2*p)*(-4 + 4 - 2*p))*(34 - 34 - 10*p).
30*p**3
Expand (0*n - n + 2*n)*(-4 + 2*n**2 + 4) - 9*n**3 - 331*n**2 + 322*n**2 + 4*n**3.
-3*n**3 - 9*n**2
Expand 2*u + 1 - 1 - 2*u - u + u + (-1 - 1 + 3)*(2*u - u - 3*u) + 10022 - 10022 - 854*u.
-856*u
Expand (83 - 37 - 27 - 42)*(0 + 0 + v).
-23*v
Expand (p - 6*p + 81*p**2 - 77*p**2)*(-8*p**3 - 2*p**3 + 3*p**3) + (2*p**3 + 1 - 1)*(-5*p + 2*p**2 + 5*p) - 2*p**5 + 4*p**5 - p**5.
-23*p**5 + 35*p**4
Expand (s + 3*s - 3*s)*((27*s + 3*s**2 - 27*s)*(6*s - 4*s + 3*s) - 2*s**3 - 3*s**3 + 4*s**3).
14*s**4
Expand (2*w + 4 - w + w)*(42 - 5*w - 3*w + 9*w).
2*w**2 + 88*w + 168
Expand (-v**4 + 0*v**4 - v**4)*(-212 - 87 - 32 + 40).
582*v**4
Expand (-83*m - 366*m - 257*m)*(0 + 2*m + 0).
-1412*m**2
Expand (n - 2*n + 2*n)*(74 - 183 - 108).
-217*n
Expand (0 - 2 + 4)*(-v - 1 + 1) + 426*v - 430*v + 1 - 2.
-6*v - 1
Expand (-w + 2 - 2)*(-2*w - w + 0*w + (39 - 1 + 0)*(-2*w + 0 + 0)).
79*w**2
Expand (2*i - 2 + 2 + (-3 + 2 + 2)*(-3 + 3 - 3*i))*(-8 + 2 - 1).
7*i
Expand -3*s**5 + 3*s**5 + 2*s**2 - s**5 - 11*s**4 + 4*s**4 - 5*s**5 - 4*s**4 + (2*s**5 - 2*s**5 - 2*s**5)*(-2 + 4 + 0).
-10*s**5 - 11*s**4 + 2*s**2
Expand (-9*a + 10*a - 80*a)*(-6*a + 6*a + 7*a)*(-3*a + 3*a - 2*a).
1106*a**3
Expand (6*d**2 - 2*d**3 - 6*d**2)*(-d + d - 3*d)*(0*d + 1 + d + 1).
6*d**5 + 12*d**4
Expand 2*k + 0*k - k + 8*k - 3*k - 10*k + (-1 + 1 - 1)*(2 + 4*k - 2).
-8*k
Expand (-2 + 4 + 0)*(-9*q**2 - 12*q**2 + 12*q**2) + 33*q - 33*q - 8*q**2.
-26*q**2
Expand 215*l - 215*l + 5*l**2 + (-3*l + 0 + 0)*(0*l - l + 3*l).
-l**2
Expand (0 + 1 + 1)*(-14*q**2 + 26*q**2 - 6*q**2)*(-5*q - 2*q - 4*q) - 4*q**3 - q**3 + 2*q**3.
-135*q**3
Expand 3*k**4 - k**3 - 4*k**4 + 2*k**3 - k**2 + k**2 - 2*k**4 + 0*k**4 - k**4 + 4*k**4 + (4*k**4 + 0*k**4 - 6*k**4)*(-5 + 3 + 3).
-2*k**4 + k**3
Expand (u + 15 - 10 - 13)*(0*u + 2*u + u) + u**2 + 0*u**2 - 3*u**2 - 3*u**2 + 2*u**2 + 0*u**2 + (-u + 3*u - u)*(0*u + 5*u - 3*u).
2*u**2 - 24*u
Expand -29*a - 16*a + 384*a + (1 - a - 1)*(1 - 1 + 1).
338*a
Expand (-3 - 2*s**2 + 3)*(-s + s + s) + (-65*s**2 + 18*s**2 - 45*s**2)*(2*s - s + 0*s).
-94*s**3
Expand (2*k + k + 0*k)*(7*k + 29*k + 68*k) - 4*k**2 - 2*k**2 + 4*k**2 + 2*k**2 - k**2 - 2*k**2 + (0 - 2*k + 0)*(-3*k + 3*k + 2*k) - 2*k**2 + 4*k**2 - 4*k**2.
303*k**2
Expand (-2*j - 5*j + 0*j)*((4*j + 2*j - 5*j)*(1 + 1 - 1) + j + 4*j - 3*j - j + 3*j + 0*j).
-35*j**2
Expand (-8*w**2 - 5*w**2 + 3*w**2)*(6 - 1 + 1)*(-6*w + w + 3*w).
120*w**3
Expand (332 - 333 + 236 + (-1 + 3 - 3)*(-2 + 0 + 4))*(4*p - 5*p + 2*p + (2*p - 1 + 1)*(0 - 4 + 2)).
-699*p
Expand (2*w + 4*w - 5*w)*(4 - 5 - 1)*((3 - 4 + 0)*(8 + 4*w - 8) + 0*w + 4*w + 4*w).
-8*w**2
Expand 1017*f + 11955 - 11955 + (-4 + 2 + 3)*(3*f + 3*f - 4*f).
1019*f
Expand (-1 - k + 1)*(31*k - 12*k**2 - 43*k + 27*k).
12*k**3 - 15*k**2
Expand (-10*h + 8*h - 21*h)*(6*h**3 + 4*h**3 + h**3).
-253*h**4
Expand (-2 + 0 + 3)*(-2*b + 7*b - 8*b)*(-1 - 25*b + 26*b - 3).
-3*b**2 + 12*b
Expand (1 - 1 - s)*((2*s - 7*s + s)*(-3 - 3 + 4) - 5*s + 3*s - 4*s).
-2*s**2
Expand (-7 - 2 - m + 6)*(-17*m + 286 + 32*m - 16*m).
m**2 - 283*m - 858
Expand (-5 + l + 5)*(2*l + 0*l - 3*l) + 3*l**2 + 4*l**2 - 3*l**2 + 0*l**2 - l**2 + 5*l**2 + (l**2 - 3*l**2 - l**2)*(-2 + 3 + 0).
4*l**2
Expand 270 - 270 - 6*x**2 + (-x**2 + 0 + 0)*(-1 + 4 - 2) + (-x - 1 + 1)*(2*x + x - 7*x).
-3*x**2
Expand (-1 + 2 + 9)*(-5*l + l - l)*(-4 + 1 + 2).
50*l
Expand (38 + 7*i**2 - 2*i - 23 - 8)*(2*i**2 - 6*i**2 + 3*i**2).
-7*i**4 + 2*i**3 - 7*i**2
Expand (29*f - 4 - 23*f - 19*f)*(-f + 4*f - 4*f).
13*f**2 + 4*f
Expand (0*y**2 + 12*y**2 + 8*y**2)*(-8*y**2 + 3*y**3 + 17*y**2 - 4*y**3).
-20*y**5 + 180*y**4
Expand (5 + 6 + 2)*(0 + 0 - 1)*(-i - 4*i + 0*i) - 4*i - i + 2*i.
62*i
Expand 17*x**3 - 54*x**3 - 15*x**3 + (-x**3 - x**2 + x**2)*(2 - 1 + 4) + 0*x**3 + 2*x**3 - x**3.
-56*x**3
Expand (d + 6*d - 4*d)*(3*d**3 - 3*d**3 + 5*d**3)*(2*d - 5*d + 0 - 2).
-45*d**5 - 30*d**4
Expand 2*s**4 + s - s + (-s + s + 2*s**2)*(-2*s**2 + 0*s**2 + 3*s**2) + 0*s - 2*s**4 + 0*s - 16 - 259*s**4 + 130*s**4 + 130*s**4 + 0 + 2*s**4 + 0.
5*s**4 - 16
Expand 2*o**3 - 5*o**3 + o**3 + (0 - 2*o**2 + 0)*(4*o - 3*o + o) + 4*o**3 - 2*o**3 + 0*o**3 + 4*o - 2*o**3 - 4*o + (0 + 0 - 2*o**2)*(3*o - 5 + 5).
-12*o**3
Expand g**5 + 2*g**5 - 2*g**5 + (-g**5 - 2*g**5 + g**5)*(2 + 2 - 2) + 3*g**5 - g**5 - 3*g**5 + (-25 - 1 + 1)*(-g**4 + 2*g**5 + g**4).
-54*g**5
Expand (27 + 52 + 3)*(-3*u**3 + 2*u**3 + 0*u**3) + 2*u**2 - 4*u**3 + 3*u**3 - 2*u**3.
-85*u**3 + 2*u**2
Expand -226*p + 113*p - 25 + 124*p + (-6 + 1 + 4)*(p + 0 + 0) + p + 3*p - 2*p + 2*p - 2*p + 2*p.
14*p - 25
Expand (-5*x + 2*x + 9*x)*(-4 + 4 + x) + x**2 + 11*x - 16*x + 9*x.
7*x**2 + 4*x
Expand -t**2 - 3*t**2 + 3*t**2 + (-t - 15*t + 2*t)*(-2*t - 3*t + 3*t) + (3 - 3 + t)*(2*t + 4*t - 4*t).
29*t**2
Expand ((-4*o + o + o)*(-o + o - o**2) - o**3 + 17*o**3 - 9*o**3)*(4*o - 6*o - 3*o).
-45*o**4
Expand (0 + 4 - 1)*(-4*d**2 + 6*d - 6*d)*(20*d + 10*d**2 - 20*d).
-120*d**4
Expand (-4 - 2 + 4)*(-8 - 9 + 28)*(-23*h + 14*h + 32*h).
-506*h
Expand (1 - 2 + 0)*(h + 2*h - 5*h)*(18*h - 16*h**3 - 18*h + h**2 - 2*h**3 - h**2 + (-h + 3 - 3)*(0*h + 0*h - h**2)).
-34*h**4
Expand (-2 + h + 2)*(-11*h**3 + 138*h - 138*h) + (-4*h + 3*h + 2*h)*(-h**3 + 3*h**3 - 5*h**3).
-14*h**4
Expand (p + p - 3*p + (-1 - 3 + 3)*(p - 5 + 5) + 4*p + 3*p - 4*p)*(9*p + 5*p**2 - 9*p + (3*p + 0*p - p)*(2*p - 6*p + 2*p) + 0 + 0 + p**2).
2*p**3
Expand -1543 - 1785*i - 1536 + 3078 + (1 + 0 + 1)*(-7*i + 3*i + 3*i).
-1787*i - 1
Expand (-4*i + 4*i + i**2)*(-3*i**2 - 4*i + 4*i)*(2 + 4 - 5)*(-3 - 6 + 2) - 28*i**2 + 7*i**4 + 28*i**2.
28*i**4
Expand (474 - 474 + 59*y)*(-3 - 1 - 1).
-295*y
Expand -4*m**5 + 4*m - 4*m + (-27*m**4 + 12*m**4 - 9*m**4)*(2*m - 3*m + 3*m - 4 + m + 4 + (m + 4*m - 3*m)*(-6 + 2 + 3) + m + m - 4*m).
20*m**5
Expand (4*r - 3*r + 13*r)*(4*r - 2*r**2 - 4*r)*(r - 2*r - 2*r)*(-12 + 0 - 3).
-1260*r**4
Expand (-1822 + 2*b + 1822 - 4*b**2)*(-2 + 1 - 3)*(b + 0*b + 2*b).
48*b**3 - 24*b**2
Expand (18*r - 32*r + 14*r + 99*r**2)*(6*r + 2*r**2 - 6*r).
198*r**4
Expand (-2*p**2 + 10*p - 10*p + 2)*(7 + 2 + 0).
-18*p**2 + 18
Expand (75*n**2 - 139*n**2 - 4*n**3 + 65*n**2)*(4*n**2 - 7*n**2 + 2*n**2).
4*n**5 - n**4
Expand 190 - 190 - |
Q:
C# help to set a Row Css class of a Grid View
I need to alternate row colors in a grid, but not on every other row. I have a variable _AddDate that I can check on the GridRowBound event. If it hasn't changed, I want to apply one css class and if it has I want to apply a different class. The code I have does almost exactly what I want but I am setting the class on the row when the value changes and each concurrent row that should be the same class is having the incorrect class applied. Its definitely something wrong with my method. Can anyone point me in the right direction? Also is there a name for these types of functions. I have to do things like this from time to time and they can be tricky to figure out the correct algorithm. Here is what I have.
private void GridRowBound(object sender, GridViewRowEventArgs e)
{
if(e.Row.RowType == DataControlRowType.DataRow)
{
e.Row.CssClass = SetRowColor();
}
}
private DateTime _dateToSwitch;
private string SetRowColor()
{
var tmpDate = _AddDate;
var doSwitch = (tmpDate == _dateToSwitch);
if (!doSwitch)
{
_dateToSwitch = tmpDate;
return "commentRow";
}
return "altCommentRow";
}
I have another function that correctly sets _AddDate to the appropriate value so it is always current when it is evaluated.
Any help is appreciated. Happy Friday!
Cheers,
~ck in San Diego
A:
I can't think of a more elegant way of doing this (at the moment) aside from this:
private DateTime _previousRowDateTime;
private string[] _commentRowClasses = {"commentRow", "altCommentRow"};
private int _commentRowClassesIndex = 0;
private string SetRowColor()
{
if( _AddDate != _previousRowDateTime )
{
_commentRowClassesIndex = ( _commentRowClassesIndex + 1 ) % 2;
_previousRowDateTime = _AddDate;
}
return _commentRowClasses[_commentRowClassesIndex];
}
|
Oil Discovery at Tawke Licence
DNO International announced today that its deep Tawke-17 well tested 1,500 barrels a day of 26-28 degree API crude oil from an Upper Jurassic reservoir underlying the Tawke field in the Kurdistan Region of Iraq.
Separately, the Tawke-20 well, the Company’s first horizontal well in the Tawke field, has flowed an average of 8,000 barrels a day from each of the first four of ten fractured corridors penetrated by the well. Testing continues on both wells.
“We are very pleased that initial Tawke-17 results are in line with the Company’s pre-drill estimates. This discovery in the Sargelu formation, over 200 meters below the main field Cretaceous reservoir, likely bumps recoverable reserves on the Tawke license to the one billion barrel mark.“
Drilling of a second Tawke horizontal well continues on schedule. “If this second well, Tawke-23, demonstrates the significant deliverability uptick we are now seeing in Tawke-20, we will go back to the drawing board and consider further enhancements to our current target of 200,000 barrels a day of production capacity by 2015,” Mr. Mossavar-Rahmani said. Last month the Company announced that it had met its previous goal of delivering 100,000 barrels a day from the Tawke field following 72 hours of well and facility tests.
The Tawke-17 well, the deepest drilled by the Company in the Tawke field, encountered several Triassic zones that proved either tight or water bearing. Two additional identified reservoir intervals in the Upper Jurassic remain to be perforated and tested.
DNO International holds a 55 percent interest in and operates the Tawke license. Genel Energy plc holds 25 percent and the Kurdistan Regional Government the remaining 20 percent interest.
Tony Hayward, Chief Executive of Genel Energy, said:
“Today’s news reinforces the extremely positive first half of 2013 that Genel has had with the drill bit, with the company having three new discoveries in the Kurdistan Region of Iraq in the space of three months. We look forward to working with DNO to determine the full extent of the new discovery.“ |
Move Slow
Move Slow
Wake up, wake up, wake up
Do you feel the movement in your gut
Just take two more pills
Or this’ll be the last time
You’ve gotta make a hit, you’ve gotta make it stick
And now it’s running through my blood
There’s a five-letter word that’s been
Eating away at me
They want to steal all my pride
They want to steal all my dignity
I’m not gonna sit back
(I’m not gonna sit back)
And let this world get to me
Wake me up when it’s said and done
Cause I don’t wanna be, no I don’t wanna be
Any part of this
Have you thought about what we have been through
They say move faster
Hurry up and give us the good one
Don’t put up a fight and don’t make this
Any harder than it has to be
They want to steal all my pride
They want to steal all my dignity
I’m not gonna sit back, no! (no, no ..)
I just won’t let this go |
package org.apache.archiva.repository;
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
import org.apache.archiva.repository.content.ItemSelector;
import org.apache.archiva.repository.content.LayoutException;
/**
* Common aspects of content provider interfaces
*/
public interface RepositoryContent
{
/**
* Return the path, that represents the item specified by the selector.
* @param selector the selector with the artifact coordinates
* @return the path to the content item
*/
String toPath( ItemSelector selector );
/**
* Return a item selector that matches the given path. This is kind of reverse method for the {@link #toPath(ItemSelector)}
* method and fills the selector with the known information. It may not make sense for every path, and the following
* must <b>not always be true</b>:
* <pre>
* selector.equals(r.toItemSelector(r.toPath(selector)))
* </pre>
*
* The methods on the ManagedRepository give more reliable results.
*
* @param path the repository path
* @return a item selector that would select the given path
*/
ItemSelector toItemSelector(String path) throws LayoutException;
}
|
Fifth-year senior tight end George Bryan is a 6-foot-5, 265-pound two-time All-ACC selection that caught 75 passes for 791 yards and nine touchdowns combined over the past two seasons.
His size and productivity alone would have NFL scouts intrigued, and when some draft gurus like Mel Kiper Jr., had Bryan rated among the better pro prospects at the tight end position, speculation began to grow about Bryan's future at NC State. |
ray stevenson
Entertainment Weekly's Hollywood Insider is reporting that the film version of the HBO series 'Rome' is pushing forward. The series creator Bruno Heller has written the script, and Morning Light Productions is on board to produce. EW says HBO won't be involved, but thinks two of the series stars, Kevin McKidd and Ray Stevenson, will be back.
There have been rumors kicking around for a while that there would be a movie version, (Stevenson talked about the script development in an interview with MovieWeb.com last year), but these are the first concrete details to emerge.
The move to the big screen makes sense. The series was still popular with fans and critics when it was canceled. But it was expensive to produce, which made it a hard series for HBO to commit to. The budget for a couple of episodes was probably similar to the budget for a feature film.
Heller can probably tell the story he wants to tell in one long movie, with less of a financial commitment, and, who know, possibly put himself in position to make more 'Rome' sequels. Which would be great for the series' fans.
There are so many pilots made each fall that I guess CBS didn't want to go with the show about zombies that come back from the dead and have sex with the living.
But that's pretty much what Babylon Fields was about. It starrred Kathy Baker (Picket Fences), Ray Stevenson (Rome), and Amber Tamblyn (Joan of Arcadia) and was a drama set in a small town. The dead came back to life and the living had to deal with various problems that ensued (though apparantly erecticle dysfunction wasn't one of them - that must be an odd episode). Oh, and it's also a crime drama, with the sheriff solving crimes each week!
HBO announced that the second season of Rome will be the last. Apparently, Rome was originally planned as a mini-series but HBO was so blown away by the quality of the first episode that it picked up an entire season. HBO says logistics of shooting overseas and a very high price tag--first season topped out at $100 million--were reason enough to shut down the show.
Season two is currently filming at the Cinecitta Studios in Rome and it premieres January 7 on HBO. |
Persistent sinus venosus valve requiring surgery in children.
To review our experience with cardiac surgery due to remnants of the sinus venosus valve. We performed a retrospective evaluation of patients records during the period from 1980 to 2007. Three patients underwent surgical removal of the redundancy of the right sinus venosus valve. Remnants of the embryologic sinus venosus valve may present by various entities. Cardiac surgery should be performed only in patients with continuing symptoms attributed to a persistent sinus venosus valve. |
"Who was she?" "Rachel McBain." "She became fascinated with the religion of the African servants." "Nowadays we call it Woo do." "Cassie!" "Have you any idea how frustrating it is being a lesbian ghost?" "History has a habit of repeating itself." "Who is Azazeal?" "He was the leader of the Nephelim." "Angles who fell from heaven." "You're a McBain!" "You are related to Rachel!" "You wanted this for me." "You're my mom." "You are supposed to look after me." "I was a nightmare." "Then, why did you send me to Medenham?" "The called it the hanging tree." "Long way back when a young girl died here." "She couldn't have been much older than you..." "Thank you!" "It's very nice." "It's been in the family for year." "It will blind her to the possessed." "Nothing more." " I really like him." " I know." "He's possessed." "I saw his eyes." "They were all mangy like you said." "Thelma, I'm sick of your jealousy!" "Get it in your head!" "I don't want you!" "Cassie!" ""Close your eyes"" ""Rest your head on my shoulder and sleep."" ""Close your eyes"" ""Let's pretend that we are both counting sheep."" ""Close your eyes"" ""Oh is this define..."" ""...music places..."" ""...something dreamy for dancing..."" ""...while we are romancing..."" ""It's love holiday"" ""...and love will be out there..."" ""Close your eyes..."" ""When you open yours dear..."" ""..." "I'll be near..."" ""...by your side..."" ""Show one shutter of your eyes..."" ""Close your eyes..."" ""Rest your head on my shoulder and sleep."" ""Close your eyes."" "Sweet dreams?" "Yeah." "Until you appeared?" "Hi!" "Sorry, we have to go out for a drink with the others tonight." "But then, I'm taking you straight out..." " I don't think so." " What?" " I've got better stuff to do." " Like?" "Staying in." "You really don't want to see me?" "Of course I do." "I want to see a review." "Just, not anytime soon." "You'd have me wouldn't you?" "Well, I'm not sure." "You look very..." "What?" "You look like you're after something." "Really?" "Why?" "Oh, it's very sexy..." "And?" "It's not very you!" "You don't find me sexy?" "That's not what I'm saying." "In fact I know you do." "I know you'd kill to be able to touch me again" "It's a shame that can never happen." "And I'm just getting used to the idea" "Where are you going?" "Nowhere you fit in." "Vodka." "Straight up." "So, how do you like my new haunt." "Intrigued?" "I wasn't sure you'd come." " How could I resist it?" " That's true." " Don't you get bored?" " Of what?" "Nothing new." "Same game." "Different women for what, three hundred years now?" " I find ways to amuse myself." " I'm sure." "So, you've decided I'm next." "It doesn't work like that." "That's right, I forgot." "It's uh... meant to be..." "Don't have to believe me." "Ok." "I won't." "Azaeal." "There's one thing I want to ask you." "Go on." "What exactly did you do to my mother?" "She's totally in horror of you." "Well, we had some good times together." "Too much information." "Don't pretend it doesn't excite you." " She's a good woman." " She's out of her tree." "And I've a pretty good idea that's your fault." "Don't worry about your mother." "She's perfectly happy." "It suits you." "Well, you could trace that line back to the dawn of time." " It's tried and tested." " And it usually works." " On a certain type of woman." " They have their advantages." "You'd have to try a bit harder with me." "Aren't you just giving to the inevitable?" "Do you know what?" "I don't think I can." ""Close your eyes"" ""Rest your head on my shoulder and sleep"" ""Close your eyes"" ""I'd also smile..."" " Jo!" "Could I have a quick word?" " What's up?" "If I told you that you were loosing your job due to staff cutbacks you would be upset, wouldn't you?" "Yes." "If I told you you could keep your job but you have to stay here over Christmas, you'd we pleased?" "Nothing is ever straight forward, so what is it?" "You don't mind do you?" " Some one is got to look after this office." " It's fine." " And you'll have Cassie's company..." " Really?" "...and your boyfriend." " Uh... no." "He no longer exists." " Oh?" "Don't ask me." "An asshole." " Yes, we do have a tendency to do that." " See you later." "Mm, I'm glad, you have a very good evening." "Mm, Bing scars this morning." "Really?" "Still you can't have pleasure without pain." "I guess not." "You should try it some time." "I don't think the governance would approve." "More reason to do it." "You would like to use a fry-up." "It must have been a wild night." "Yeah, it was actually." "What did you got to?" " Not so much what as who?" " Really?" " Well you know how I get when I've drunk too much." " Sick" " Horny." "God... that was so tendant..." "He only touched me on..." "Well..." "I guess you don't want to know." "Hey!" "I stooped by your room last night." " You weren't there." " No." " I thought you were staying in." " No." "Cassie." "I don't mind what you do." "Just don't play games with me, OK?" " You think I was with another man?" " No." " Do you think that you don't satisfy me?" " No." "So, apologize for being such a stalker." " I'm very sorry." " And?" " It won't happen again?" " Good." "So, we could..." "Cassie is taking him for a ride." "And you'd be happy if you just could go to relieve him." "Weird though, isn't it?" "Two days ago she was this hapless virgin, now she's a total whore." "I kind of like it." "I kind of like having our very own Britney Spears." "I used to think that she's nice, boring yeah, but nice." "Now, she's just a bad girl." "You could learn something from her though." "Yeah, live might be so desperate." "Hello, Cassie is acting like a total bitch and you are giving me grieve." "Mmm, honey!" "I'm still concerned about him." "Sure you are." "And you are not at all bothered that he is completely in love with her?" "No." "Not at all." "He's just been a good friend." "You don't really think he's in love with her, do you?" "She's treating him like shit!" "Yeah." "And you know what's worst?" "She's really enjoying it." "Hey!" "You had any thoughts about what to do next time?" "Yeah." "Quite a few actually." "Good!" "Because I want put you into an English module." "I thought you'd like "Women in love, romantic heroines through the ages"" "Well." "It's either that or Milton." "The first, thanks." "So, Davies says you're staying here for Christmas." "Surely though, let your Mum out hospital?" "Yeah I know." "But I don't really want to spend my time feeding turkey to a vegetable." "Tell me... this women in love... are they actually going to do anything?" "...because suppressed desires are well and good but, ...it's a bit boring without any action." " Well..." "Maybe we should just read some of your erotic stories instead." "Ok, so you have a large penis but a hairy back." "And every time you wag your back your penis shrinks." "What do you do?" "I keep the hair and enjoy the rest." "What, is not a good answer?" " I don't know." " Your turn." "Attributable." "How old was the oldest woman you ever slept with?" "Truth mate." "You had to ask that didn't you?" " I had a feeling with this sole point." " Yeah?" " Well I'm not telling." " You have to." "No way." "I'll do two dare." " Doesn't count." " No." "That's the rules." " What happy been up to?" " No I can't say." " Fine." "Kiss him." " Yes." "Mate, answer the question come on." "Ok." "It was... a friend of my mother's." " Oh, my God that's gross." " How old was she?" " Old enough to know what to do." " What, to draw a pension note, maybe?" " Mate, she hadn't had it so good in years." " Probably she hadn't had it in years." "Come on, that was a question." " No!" " You have to!" "No." "I don't" "Well, come on if he's not going to play ball I think we should all just go home." "Ok, Ok, Ok" "She was... fifty" "Fifty?" "...four" "Ohhh, talk about healthy aging!" "You know, she had plenty of plastic surgery." " Really, where?" " Where it counts." "What do you want Cassie?" "Dare." "All right." "Pick a victim." "And put one of your body parts into theirs." "Not me." "Yeah." "Leon wishes." "Guys." "I'm going to call it the night." "I'm really tired." "Good night then." "I... guess we... better get going too." "Thanks Troy." "Truth or dare?" "Cassie!" "Cassie!" "You want one of my body parts in yours?" "Just shut up Leon!" "Open your eyes." "Open your eyes" "Look at me." "Look at me." "Look at me!" "Jesus Christ, you're a nutter!" "It's just she's treating me so badly and I know why she is doing it ...but at the same time is really hard to be patient." "I just want to slap her." "But of course I can't." "It is probably a good thing." "She's going to eat my soul of something." "She's possessed." "And there is only one way to solve that." "I have to electrocute her." "That's what she always did." "She's been such a cow." "Still if I can shock her back to her old self, then she can apologize." "Then she can grovel." "On her knees." "Yes, I think electrocuting her could actually be quite fun." "Thanks for your help." "I feel so much better." ""Rest your head on my shoulder and sleep"" ""Close your eyes"" ""Let's pretend that we are both counting sheep"" ""Close your eyes"" "Have you come to look at this?" "Because let me tell you now." "I haven't spent the last eighty years working on this inscription for some half breasted bounty to come and solve it all in a second." "Ok." " Ok?" "." "What does that mean?" "Ok, I won't solve it." "Really?" "Hi." "Peggy Langston." "Deal it." "Full time Egyptologist, part time suffragette." "We can touch each other!" "Steady on." "I should be listening your name." "Thelma Bates." "Don't look so worried Thelma, I'm not going to eat you alive." "So..." "What are you doing here?" "Actually my father used to own this place." "Oh!" "Sorry." "I died here in 1923." "I'd like to say my husband caught me with this gallery made but actually was the flu." "What about you?" "I was ritualistically sacrificed by a fallen angel." "Ah... the flu too eh?" "I don't come back here much these days." "I need to study this." "This is the first thing that got me into Egyptology." "Everything about it suggests that is one the old mourning inscriptions found in Akhenaton´s." "Amazing isn't it?" "So, what does it say?" "Oh, I wish I could tell you." "I've trying to translate it for years." "I think it's a funerary inscription for someone called Heraph." "Now, she was the daughter of the Pharaoh, but there is one cartouche I simply can't work out." "A cartouche?" "A cartouche is like a name." "It seems to say Azazeal but that's not very Egyptian at all." "So, I must be wrong." "It's all rather depressing." "I shall maybe able to help you." "OK guys, have a lovely Christmas." "Watch one film and give me a review in the New Year." "Ah!" "And behave yourselves." "You've got to end it." "Yeah?" "Well it's not that simple." "Until still blame me." "I mean yeah, I was wrong but I was pissed and she-- but you did it anyway." "It wasn't like that." "You know what?" "I don't give a shit." "Have a nice Christmas mate." "Can I talk to you?" "Leon reckons that you were trying to get off with him." "All right." "He says you lost the clock." " Right?" " I don't want to believe him." "I mean, it doesn't sound like you." "So, what's the problem?" "Well I just need to know." "Is it true?" "Cassie, what's going on?" "What are you pissed or something?" "No." "So what?" "That's it." "No explanation." "Fine." "Look eh... if that's what you feel maybe we just should call the day." "OK." "If that's what you want." "Look, just..." "I thought me and you were getting it together." "No you're right." "We are best apart." " What are you doing?" " Nothing." "God, I want a room with an own suite." "Is that living on on-switches." "I mean who thought getting a room of two was a good idea?" "Cassie!" "It's all right." "Don't worry." "It must be a power cut." "What are you doing?" "I... thought you had a spider on your hair." "It's all right." "It's gone." "Thelma." "Some times you are a total freak." "What are you doing here?" "I missed you." "I'd just say you know the normal is to call such as a drink maybe?" "Brandy?" "So, you're going to watch me all night?" "Yes." "Don't you just love the feeling when you know is wrong but you want to do it anyway." "Don't be so sure." "Women through the ages remain stubbornly the same." "Well..." "Yeah and that some many maybe you wouldn't be so disappointed?" "But you're hardly an innocent." "That poor boy." "You broke his heart." "So, who was your last true love?" "Rachel?" "The woman you made the pendant for?" " Heraph." " What happened?" " It wasn't meant to be." " Sorry." "It's all right." "I've had therapy." "There'll never be another man who'll wait 250 years for you." "Well, not one in such good condition." "I can be a huge disappointment." "That's true." "Then a guess." "Everybody is gone now." "And we can have a nice quite Christmas together." "Just the two of us." "Thelma why don't you ask me what you want to ask me." "What do you mean?" "Yes." "I have been seen Azazeal." "Yes." "I intend to see him again." "And you know?" "I don't care what you think about it." "Charming!" "Have you forgotten what he did?" "I think we may have misjudged him." "Oh yes." "He meant the knife to miss me." "He is really no more evil than you or I." "Speak for yourself." " You're just jealous." " Worried." "Because you know you're not going to find love." " That's rubbish!" " You'd rather I was lonely with you..." " It's not about me." " ...than happy without you?" "Fine." "If that's what you think, so be it!" "Bye." "What?" "Nothing." "She's an old friend." "I didn't ask." "You didn't have to." "So, what is like being so wise?" "Well... obviously it makes normal life difficult." "Trouble is... you see everything before everyone else and then you have to wait for them to catch up." "That must be very frustrating." "You've no idea." "Stop being such a crap and buy me a drink." "My!" "We are being domineering this evening." "It bodes well." "In the end desire is always greater than the consequences." "You're so arrogant." "You like that." "Actually I am into the more... shy and retiring type." "Right." "You're going to fuck me up aren't you?" "Probably." "I feel like a naughty school boy." "Interesting." "Can I help you?" "I'm afraid this is private property!" "God, I'm sorry." "It looks like I'm casing the joint or something." "The thought had crossed my mind." "So, what are you doing?" "I was out walking..." "and I saw the house." "It's beautiful." "I was wondering if it open to the public." "Afraid not." "It's a school." "Lucky kids." "I don't think they realise that." "No." "But they will." "When it's too late." "Thank you for your time." "A pleasure." "You've got a sickening smile on your face." "What have you been up to?" "Nothing you'd understand." "Give me strength." "If I could slap you I would." "What?" " Nothing" "You think I could pay some desperate first year to do this for me?" "If you had any money." "I have other things to offer." "They call that prostitution!" "Your thought." "Your knickers are getting smaller." "I'm bored of behaving" "What's the point of holding off?" "I mean, look what happened to you." "You'll never grab those things your didn't do." "It's not going to happen to me." "You have no idea what's going to happen to you." "I meant to say, sorry bounty for being a bit uptight before." "A bit?" "You could sought lemons for England." "I'm just slightly weary of people I don't know." " That's OK." " However,..." "I think that what you told me, I could almost work this out." "So you did need me after all." "You could come in very useful yes." "It would seem that your friend Azazeal was a priest in the reign of Akhenaton." "Yeah, he gets around." "Well, he's male, what you expect?" "Now, he fell in love with the Pharaoh's daughter Heraph, which was very bad news for her." "The Egyptians believed that their union destroyed the natural order." "And I quote: "And the veil between the world was broken and the living walked to the dead and the dead with the living."" " Just like us..." " Exactly." "Which leads me to believe that the same thing is happening again." "So, what did they do to him?" "Well he was banished, deservedly so..." "I'm afraid that left poor Heraph to show to the blame." "Typical." "And they obviously took a great dislike to her because I really can't think of a more gruesome way to die." "She was buried alive." "God, poor woman!" "I'm afraid there's more." "They were clearly terrified of her." "Why?" "She was carrying his child." "Ooops!" "She'll be fine." "She's got to get some rest." "OK?" "See you later." "How do you feel?" "Like I got the worst hangover in the world." "I wouldn't have done it..." "it there'd been any other way." "I know." " You're glad, aren't you?" " Of course!" "Jo looked pissed off." "She's furious." "Thinks it was one of the lads, even want to call the police." "With any luck she'll blame Leon." "Oh, God!" "What did I do to Leon?" "Did you know what was going on?" "I really wish I could say no." "But?" "I was sort of semi aware." "I couldn't do anything about it." "See, all the normal brakes who apply just weren't there." "What I was really rude to you." "You were the ultimate cow." "I'm really sorry Thelma." "I'm so sorry for everything you put up with." "Always I forgive you." "Do you think he will leave you alone now?" "I don't know, I hope so." "Well you're not mangy eyed anymore, I can keep you in a tight leash." "That's very reassuring." " We're going to be OK." " Yeah." "Thanks." "You know, for electrocuting me." "Anytime." "What are you doing here?" "How are you this evening?" "I want you to go." "Why the sudden change of heart." "You know why." "Stop it!" "Look!" "Whatever happened between us, it wasn't right." "It wasn't me." "Sometimes it takes extraordinary circumstances to make you see what you really want." "Don't give me that philosophical bullshit." " You tricked me." " You enjoyed it." "No." "Every single minute you were where you wanted to be." "You still feel the same Cassie." "I don't think so." "Just because your rational mind pulls away doesn't mean your heart has changed." "I don't want anything to do with you anymore." "It's a little bit late for that." |
Microarray analysis reveals increased expression of ΔNp63α in seborrhoeic keratosis.
Seborrhoeic keratoses (SKs) are very common benign epidermal lesions without malignant potential. Ultraviolet radiation, old age and viruses are well-known risk factors for disease development. However, the pathomechanisms of SK are not fully understood. To detect and characterize the genes that are involved in the pathogenesis of SK. We performed a gene expression study using paired lesional and nonlesional skin samples from patients with SK. We identified and validated 19 differentially expressed genes in SK. Of these 19 genes, we focused on p63 transcription factor, which plays a pivotal role in epidermal development by regulating its transcriptional programme. We found by immunofluorescence that the expression of ΔNp63α, the most abundantly expressed p63 isoform, was significantly increased in SK as compared with normal skin. Moreover, siRNA-mediated knockdown of ΔNp63 led to the downregulation of 11 genes, including a member of the tensin family TNS4. Chromatin immunoprecipitation assay revealed that TNS4 was a target gene of p63. We identified upregulated genes in SK using genome-wide cDNA microarray and elucidated the functional contribution of p63 to the disease transcriptome by gene-silencing assay. Taken together, these data may provide a novel insight into the molecular basis of these benign skin lesions. |
High-performance computing of flow and transport in physically reconstructed silica monoliths.
This work presents an approach towards resolving hydrodynamic flow in real porous media by carrying out direct numerical simulations in the reconstructed macroporous (flow-through) domain of a silica monolith. The macroporous domain of a 60 microm x 60 microm x 12 microm segment of a 100 microm i.d. capillary silica monolith was reconstructed by confocal laser scanning microscopy. A 60 microm x 12 microm x 12 microm segment of the reconstructed domain was then used as the 3D matrix for simulation of fluid flow by the lattice-Boltzmann method on a high-performance computing platform. Excellent agreement is observed between the experimental and simulated Darcy permeabilities without any assumptions or further adjustments on the monolith morphology. The flow velocity field is analyzed in detail, including longitudinal and transverse velocity distributions, the occurrence of negative longitudinal velocities, as well as the beginning transition to the viscous-inertial flow regime. The presented methodology promises great potential for resolving the key relationships between morphology and band broadening in monolithic columns for HPLC applications. |
Friday, February 28, 2014
Look-Alikes: G1 Draft Horses
With the number of runs issued on this mold, it's no wonder there's a bit of ID confusion surrounding some of the models.The most enigmatic of the releases, the Riegseckers set, will have their look-alikes covered in their own post in May! Today we're going to cover the regular runs and the more standard special runs.
Chestnuts:
The top three models are all variations of #5055. Leg and facial markings, flaxen or self-coloured mane and tail, and a range of body shades are typical of this run. None of the other runs have quite that angry pumpkin quality.
Besides the dark mane and tail, dusky shading and dark head, the 1997 JCP SR (bottom-left) has two major identifiers, his cute little blaze and the funny bubble-freckling on his belly. Also sporting a blaze and darker-than-body mane and tail is the nearly pink 1998 Sears SR. That pale body colour is caused by a fine mist of chestnut paint being sprayed over an unpainted white body, creating the effect of flea-bites or roaning.
Though we're not showing him here as A. I don't have one to put in the picture, and B. we'll be talking about him in more detail in the Riegseckers post, is the 2002 QVC SR which is either called palomino or chestnut. If the bright blonde mane and tail of this SR doesn't tip you off, the fact that it's the only chestnut-based G1 Draft Horse to sport a hard, high gloss coat should let you know who you've got in your herd.
Bays:
For some reason the first model, #5187 gets referred to quite often as a 'rose grey'. Maybe some of them have a grey tone, but he's quite obviously bay. Setting him apart from the 1991 Sears SR, besides the older model being old plastic, are the four snappy socks, shell coloured hooves, and usually a vaguely bald face. The SR is much redder, with pitch-black points and a shaded muzzle.
Blacks:
Despite the age range of these models, both are molded from old plastic. The first model, sporting a typically satin finish, is the 1990 Sears SR. Though you would expect this 1997 BreyerFest SR keychain to be made with new plastic, all keychains until 1999 were made with old plastic. Besides having a ring-screw stuck in his back (some collectors remove these) the 1997 SR will be smoother than the older model and have a high gloss finish.
Not shown for reasons mentioned above (what can I say? I didn't like to break the pattern of the group pictures with a few singles. I like patterns, you will come to realize this about me), but also glossy and also black is the glossy charcoal 2002 QVC SR. His white mane and tail, for socks, pink hooves, bald face, and detailed eyes should make him impossible to confuse with any other G1 Draft Horse run.
Buckskins:
Whatever you choose to call them, buckskin or dun, when you see them together, they should be easy to tell apart. The 1991 Sears SR is decidedly olive-coloured, made with old plastic, and sports some heavy shading. Looking like a paler sibling is the new plastic Sears/JCP 1992/94 SR in a light, subtly shaded buckskin.
The G1 Morgan Mare Look-Alikes will come to post before we get to the Riegsecker, but I promise, they will come.
Subscribe To
Follow by Email
All pictures and text by Heather Forrest unless otherwise attributed. Permission for photo usage is granted on a case-by-case basis. Please properly credit any material used from this blog. Note that I cannot grant permission for outside use of any of the pictures attributed to other sources; that can only be granted by the actual owners. |
The evening after Kenny Hill torched South Carolina's defense for 511 yards and three touchdowns en route to a 52-28 victory Thursday, his famous predecessor offered up a fitting nickname for the Aggies' new star via Twitter.
But Hill, a sophomore, had his own nickname in mind. Just call him Kenny Trill.
"Trill" is defined in the dictionary as "a quavering or vibratory sound," but in rap culture, it's the combination of the words "true" and "real." It has long been used by Texas rapper Bun B, who calls himself Bun B Trill OG, and who added his thoughts via Twitter:
Like the idea of "Kenny Trill" but I think @coachsumlin would agree one good game alone doesn't make you trill. He's on his way though!
The Associated Press reported Wednesday that Hill announced his preference for the nickname, though a Dallas Morning News story on the quarterback noted several other possibilities he's heard -- Kenny Touchdown, King of the Hill and Kenny Chill.
"I'm just trying to live like I always have," Hill told the Morning News, adding that after the media circus surrounding Manziel the last two years, Aggies coach Kevin Sumlin has told him not to pose for photographs with fans.
"It's one of those things Johnny got into so much trouble with pictures and he doesn't want me to get in trouble with pictures," Hill said.
Much like Manziel, who was arrested for disorderly conduct and producing a fake ID the summer before he earned the starting job at Texas A&M, Hill's rise to stardom has not come without its adversity. He was suspended for much of spring practice after being cited for public intoxication.
"It hurt a little bit but I deserved it, it was an embarrassing time," Hill told the Morning News. "It's something I had to work through and I did and I'm still working through it." |
Q:
Does firestore support collection level locks in transaction?
I have worked in a mongodb, which is no sql database and it support document level locks only. As firestore is also no sql database, does it support document level locks or it allows collection level locks?
A:
The only operation you have for locking is document locking with transactions. There is no collection locking in Firestore.
|
Q:
Printing the name of each file with certain extension
how can I print out the name of each file in a certain directory with a specific extension?
Here's what I have so far:
#!/bin/sh
DIR="~/Desktop"
SUFFIX="in"
for file in $DIR/*.$SUFFIX
do
if [ -f $file ]; then
echo $file
fi
done
Unfortunately it doesn't work.
What's wrong with it?
A:
In your DIR="~/Desktop" the "~" not expanded, because it is in "".
remove the "". DIR=~/Desktop
|
None of the above is active, thanks to both former head coach Charlie Weis and second-year head man Brian Kelly, who ended the Trojans run of domination last November. But other streaks of success remain, such as USC's four straight in South Bend or Mark Dantonio's three wins in four meetings with the Irish as Michigan State's head coach.
Matchups with the Trojans and Spartans have helped Notre Dame's program shape football history for nearly a century while the Eagles rank as the school's most troublesome new rivalry – with both season-debilitating and program-altering wins as feathers in their program's cap over the last 20 years.
But for the first time since 1992, and for only the third time in Notre Dame history, Notre Dame will defeat all of them in the same season.
Which brings us to the next prediction in our summer series.
Prediction #12: MSU, USC, and BC = 0-3 vs. the Irish
While victories over USC, MSU, and BC have been at a premium over the last 18 seasons, such hasn't always been the case.
Not since 1992 have the Irish handled each of their three rivals, that year pounding the Spartans 52-31; humiliating the then-No. 9-ranked Eagles, 54-7; and fighting off a game, #19-ranked USC team, 31-23 in the Coliseum.
Rivalries Revisited
Highs and lows vs. the Spartans, Trojans, and Eagles:
1983 through 1993: The Irish beat USC in 11 straight; Michigan State in 9 of 11 (including seven consecutive), and beat Boston College in their only three meetings prior to the Eagles landmark, regular season-ending upset in '93. Notre Dame's aggregate record vs. the trio from 1983-1993: 23-3
1996: Did not play Michigan State; defeated Boston College handily, 48-21; lost for the first time in 13 meetings to USC, 27-20 in OT. Record: 1-1
Bob Davie Era:
1997: Lost to #17 MSU 23-7; poured on a 52-20 beating of BC; lost to USC in South Bend for the first time since 1981, 20-17. Record: 1-2
1998: Lost 45-23 at Michigan State (trailed 42-3); won a thriller with a goal line stand at Boston College, 31-26; lost a BCS-elimination game at USC, 10-0. Record: A costly 1-2, with the Spartans and Trojans handing the Irish their only two regular season defeats.
1999: Lost at home to Michigan State, 23-13; roared back to beat USC in the rain, 25-24; lost on Senior Day to BC, 31-29. Record: 1-2
2001: Did not play the Spartans; defeated USC and first-year head coach Pete Carroll, 27-16 in South Bend; lost at Boston College under the lights, 21-17. Record: 1-2
Ty Willingham Era:
2002: Won a miracle at Michigan State, 21-17; lost as the BCS #3 team at home to Boston College, 14-7; were destroyed at USC, 44-13. Record: 1-2
2003: Lost at home to MSU, 22-16; were again handled by USC, 45-14; lost at Boston College 27-25. Record: 0-3
2004: Held off MSU, 31-24 in East Lansing; lost to BC in South Bend, 24-23; lost at USC to end the Willingham era, 41-10. Record: 1-2
Charlie Weis Era:
2005: Did not play BC; lost a thriller at home to MSU, 44-41 in OT; lost the Bush Push game vs. USC, 34-31. The losses to the Spartans and Trojans marked the team's only regular season defeats for the second time in eight seasons. Record: 0-2
2006: Did not play BC; came back to win a wild one in East Lansing, 40-37; lost a slim chance at the BCS title game with a 44-24 defeat to end the season in Los Angeles. Record: 1-1
2007: Lost 31-14 to MSU; lost 27-14 in a valiant effort vs. No. 3 Boston College; were humiliated by USC, 38-0 – each contest was played in South Bend. Record: 0-3
2008: Lost 23-7 at Michigan State; lost 17-0 at Boston College; lost 38-3 at USC. Record: 0-3
2009: Defeated MSU in South Bend for the first time in 16 years, 33-30; defeated Boston College for the first time in six matchups, 20-16; lost a heartbreaker to USC, 34-27. Record: 2-1
Brian Kelly Era:
2010: Lost to MSU in overtime, 34-31; defeated Boston College handily in Chestnut Hill, 31-13; defeated USC for the first time in eight meetings, 20-16. Record: 2-1
2011: Will face Michigan State (September 17), USC (October 22) and Boston College (Senior Day, November 19) in South Bend.
The Irish have won just 18 of 47 matchups vs. the trio since sweeping their rivals in the 1992 season (a combined 0-6 mark in '07/'08 incurred the most damage to the wrong sides of the W/L ledger).
2011 marks the sixth time the Irish will host each of these three rivals in South Bend (most recently in 2009), never finishing better than 2-1 previously.
None of the three will be cakewalks, but each will contribute a notch to the left side of the W-L ledger, en route to a 6-1 home mark for Notre Dame this fall.
*Note: Notre Dame faced each of the three rivals in South Bend in 2009, 2007, 1999, 1997, 1993, and 1987. Their aggregate record in those contests was 9-9. |
Q:
How to properly decode HTTP traffic
I'm looking at HTTP traffic, and seeing a POST request that is "application/x-www-form-urlencoded" with strange characters in it:
t=%d8%94%b2%bc+%cb%ae%c9%ab
Various URL decodes that I tried running on this complain that it's not UTF-8 encoded.
I know that in theory a web request can be encoded in any given encoding scheme, but if so, how can I tell which scheme is being used (in order for me to decode it properly)?
I see no hint in the request itself.
This is not a language-specific question (more of a question about the HTTP protocol, I think.)
Any help will be appreciated!
A:
Your question actually contains the answer (form-urlencoded). The request is URL encoded. See this link for more information.
The strange characters decode to non-ASCII characters except for the '+'. There are decoders on the Web where you can cut and paste your text to see what it really is.
|
Nicholas–Lang House
The Nicholas–Lang House is a house located in southwest Portland, Oregon listed on the National Register of Historic Places.
See also
National Register of Historic Places listings in Southwest Portland, Oregon
References
Category:Houses on the National Register of Historic Places in Portland, Oregon
Category:Queen Anne architecture in Oregon
Category:Houses completed in 1884
Category:1884 establishments in Oregon
Category:Southwest Hills, Portland, Oregon
Category:Portland Historic Landmarks |
# Codelab: Adding a SQL Function
## Background
This codelab will walk you through adding a new SQL function and its associated
tests.
## Getting Started
Before we get started, you need to download the CockroachDB source code and
ensure you have all of the prerequisites needed for development. See
[CONTRIBUTING.md] doc for details.
## Adding a SQL Function
Currently, CockroachDB only supports [built-in SQL functions][built-ins]. We’re
going to walk through the process of adding a new built-in function and an
associated test. Along the way you’ll see a bit of the SQL code layout, parts of
the type system and part of the logic test infrastructure.
### Built-ins
The SQL code lies within the `pkg/sql` directory. The built-in
functions reside in `pkg/sql/sem/builtins/builtins.go`. A function is
described by a `Overload` structure, in `pkg/sql/sem/tree/overload.go`:
```go
type Overload struct {
Types TypeList
ReturnType ReturnTyper
...
Fn func(*EvalContext, Datums) (Datum, error)
}
```
`Overload` contains a number of fields, reflecting the
diversity of built-in functions. Three important fields for us to pay
attention to are the argument types (`Types`), the return type
(`ReturnType`) and the implementation function pointer (`Fn`).
Multiple function overloads are then grouped into a single "built-in
definition" (`builtinDefinition` in `builtins/builtins.go`), and
during CockroachDB initialization transformed into a
`FunctionDefinition` (in `builtins/all_builtins.go`).
For example, `abs` has an overload for each numeric type (`float`,
`decimal`, and `int`). The type system takes care of selecting the
correct version of a function given the name and the argument
types.
The SQL execution engine finds the `builtinDefinition` structure
given the name of a function using the `builtins` map:
```go
var builtins = map[string]builtinDefinition{...}
```
Notice that this is a map from `string` to `builtinDefinition`, which
contains a slice of `Overload`s via the member field
`Overloads`. The `Overloads` slice is used to distinguish the
"overloads" for a given function.
### What’s Your Name
We’re going to add a new SQL function: `whois()`. This function will take a
variable number of usernames and return the corresponding real names. For
example, `whois('pmattis')` will return `'Peter Mattis'`. For simplicity, the
mapping of usernames to real names will be hardcoded. Let’s get started.
The `builtins` map is divided up into sections by function category, but this
organization is purely for readability. We can add our function anywhere, so
let’s add it right at the top of the definition for simplicity:
```go
var builtins = map[string]builtinDefinition{
"whois": makeBuiltin(defProps(),
tree.Overload{
Types: tree.VariadicType{VarType: types.String},
ReturnType: tree.FixedReturnType(types.String),
Fn: func(ctx *tree.EvalContext, args tree.Datums) (tree.Datum, error) {
return tree.DNull, fmt.Errorf("nothing to see here")
},
},
),
...
```
This is the skeleton of our built-in. The `Types` field indicates our function
takes a variable number of string arguments. The `ReturnType` field indicates
our function returns a string. The implementation of our function is currently
unfinished, so we’ll return an error for now.
Go ahead and add the above code to `pkg/sql/sem/builtins/builtins.go`. If you’ve
followed the instructions in [CONTRIBUTING.md], you should be able to build
CockroachDB from source:
```text
~/go/src/github.com/cockroachdb/cockroach$ make build
...
github.com/cockroachdb/cockroach
```
Now, let’s run a single-node Cockroach instance:
```text
$ rm -fr cockroach-data/ && ./cockroach start --insecure
...
status: initialized new cluster
...
```
In another terminal window, use the `cockroach sql` shell to execute our
built-in:
```text
$ ./cockroach sql --insecure -e "select whois()"
Error: pq: whois(): nothing to see here
Failed running "sql"
```
Yay! We successfully added our built-in function and it failed to execute. Note
that the error message above is due to our implementation. If we try to execute
a non-existent function we’d get a different error:
```go
$ ./cockroach sql --insecure -e 'select nonexistent()'
Error: pq: unknown function: nonexistent()
Failed running "sql"
```
Our built-in is going to map usernames to real names. For that we’ll need a map:
```go
users := map[string]string{
"bdarnell": "Ben Darnell",
"pmattis": "Peter Mattis",
"skimball": "Spencer Kimball",
}
```
We’ll need to loop over the arguments to the function and look up the
corresponding real names:
```go
var buf bytes.Buffer
for i, arg := range args {
// Because we specified the type of this function as
// Variadic{Typ: types.String}, the type system will ensure that all
// arguments are strings, so we can perform a simple type assertion on
// each argument to access the string within.
username := string(*arg.(*tree.DString))
name, ok := users[strings.ToLower(username)]
if !ok {
return tree.DNull, fmt.Errorf("unknown username: %s", arg)
}
if i > 0 {
buf.WriteString(", ")
}
buf.WriteString(name)
}
```
Lastly, we need to return the result:
```go
return tree.NewDString(buf.String()), nil
```
Much of the above looks like standard Go, but what is a ``DString``? The SQL
execution engine has its own typing system. Each type in the system adheres to
the ``Datum`` interface which defines the methods that a type needs to
implement. ``DString`` is the implementation of ``Datum`` for the SQL ``string``
type.
```go
type DString string
```
Note that `*DString` implements the `Datum` interface, not `DString`. This is why
we type assert the arguments using `arg.(*DString)`.
Put it all together (rebuild, restart your server) and we should have a working
function:
```text
$ ./cockroach sql --insecure -e "select whois('pmattis')"
+------------------+
| whois('pmattis') |
+------------------+
| Peter Mattis |
+------------------+
(1 row)
$ ./cockroach sql --insecure -e "select whois('pmattis', 'bdarnell')"
+------------------------------+
| whois('pmattis', 'bdarnell') |
+------------------------------+
| Peter Mattis, Ben Darnell |
+------------------------------+
(1 row)
$ ./cockroach sql --insecure -e "select whois('non-existent')"
Error: pq: whois(): unknown username: 'non-existent'
Failed running "sql"
```
So far so good. One oddity of our function is that it returns the empty string
if there are no arguments. Let’s make it return all of the users in that case.
Before the loop over the arguments, we check to see if no arguments were
specified and expand that to a list of all of the usernames:
```go
if len(args) == 0 {
args = make(tree.Datums, 0, len(users))
for user := range users {
args = append(args, tree.NewDString(user))
}
}
var buf bytes.Buffer
for i, arg := range args {
...
}
```
Rebuild, restart and test:
```text
$ ./cockroach sql --insecure -e "select whois()"
+--------------------------------------------+
| whois() |
+--------------------------------------------+
| Ben Darnell, Peter Mattis, Spencer Kimball |
+--------------------------------------------+
(1 row)
```
Nice!
## Testing Our New Function
Now, it’s time to codify the manual testing we just performed into a proper
test. Even though this function is very simple, writing a test or two will
safeguard against future regressions. And who knows: we might still spot a bug!
To test CockroachDB’s SQL functionality, we use a logic test framework that
provides a convenient syntax for asserting the expected results of queries.
Take a peek at the top of one of these logic test files,
`pkg/sql/logictest/testdata/logic_test/builtin_function`. Here’s an existing test for the
length function from that file:
```text
query II
SELECT LENGTH('Hello, 世界'), LENGTH(b'Hello, 世界')
----
9 13
```
The format is relatively straightforward. `query II` means "there’s a query on
the next line that will return two *I*nteger columns; please check that that
they match what I expect". The logic test framework takes each line after the
`----` separator as an expected row, up to the first non-blank line, and takes
each whitespace-separated value on a line as the expected value for the
corresponding column. In the above example, we expect one row of output with
columns 9 and 13.
Let’s add a new test for our function. Create a new file,
`pkg/sql/logictest/testdata/logic_test/codelab`, with the following contents:
```text
query T
select whois('pmattis')
----
Peter Mattis
```
`query T` means the query is expected to return one column of text output.
Now, run your new logic test!
```text
$ make testlogic FILES=codelab
```
If all the tests in your file pass, the last line of output will read `PASS`.
Now, let’s add a failing test. Fill in `USERNAME`, `FIRST`, and `LAST` with your
real username, first name, and last name.
```text
query T
select whois('USERNAME')
----
FIRST LAST
```
Re-run the tests and make sure they fail. This gives us confidence that our test
will actually catch bugs, should they arise. Go back and add your name to the
end of the users map, and verify that the tests once again succeed.
Let’s add one more test for the default case. Again, remember to replace `FIRST`
and `LAST` with your own name.
```
query T
select whois()
----
Ben Darnell, Peter Mattis, Spencer Kimball, FIRST LAST
```
Run the tests once more. If they still succeed, we’re done!
Well, not quite. If you haven’t seen a failure yet, run the tests a few more
times. Eventually, you should see an error like this:
```
--- FAIL: TestLogic (0.06s)
--- FAIL: TestLogic/default (0.05s)
--- FAIL: TestLogic/default/codelab (0.05s)
logic_test.go:1707:
testdata/logic_test/codelab:1:
expected:
Ben Darnell, Peter Mattis, Spencer Kimball
but found (query options: "") :
Peter Mattis, Spencer Kimball, Ben Darnell
```
Looks like we’ve found a bug! We’re expecting names in alphabetical order (Ben,
Peter, then Spencer), but the names were output in a different order!
What might cause this? Take another look at how your built-in constructs the
output string and see if you can spot the bug.
If you get stuck, check out this [blog post about maps in Go][blog-maps].
Once you’ve found and fixed the bug, verify that the tests reliably pass. Then
check your solution against ours.
<details>
<summary>View our solution</summary>
<p>
<!--
This collapsible-section hack is very sensitive to whitespace.
Be careful! See: https://stackoverflow.com/a/39920717/1122351
-->
```diff
"whois": makeBuiltin(defProps(),
tree.Overload{
Types: tree.VariadicType{VarType: types.String},
ReturnType: tree.FixedReturnType(types.String),
Fn: func(ctx *tree.EvalContext, args tree.Datums) (tree.Datum, error) {
users := map[string]string{
"bdarnell": "Ben Darnell",
"pmattis": "Peter Mattis",
"skimball": "Spencer Kimball",
}
if len(args) == 0 {
args = make(tree.Datums, 0, len(users))
for user := range users {
args = append(args, tree.NewDString(user))
}
+ sort.Slice(args, func(i, j int) bool {
+ return *args[i].(*tree.DString) < *args[j].(*tree.DString)
+ })
}
var buf bytes.Buffer
for i, arg := range args {
name, ok := users[strings.ToLower(string(*arg.(*tree.DString)))]
if !ok {
return tree.DNull, fmt.Errorf("unknown username: %s", arg)
}
if i > 0 {
buf.WriteString(", ")
}
buf.WriteString(name)
}
return tree.NewDString(buf.String()), nil
},
},
),
...
```
</p>
</details>
<span></span> <!-- Force space after collapsible section. -->
That’s it! You’ve successfully added a bug-free built-in SQL function to
CockroachDB.
[CONTRIBUTING.md]: https://github.com/cockroachdb/cockroach/blob/master/CONTRIBUTING.md
[built-ins]: https://www.cockroachlabs.com/docs/stable/functions-and-operators.html#built-in-functions
[blog-maps]: https://blog.golang.org/go-maps-in-action#TOC_7.
|
Rheebu Nuu
Rhéébù Nùù is an environmental organization on the French territory of New Caledonia; the organization's name means "eye of the land" in the local Djubea language. The group was set up with Raphael Mapou as Secretary General to watch the activities of the Goro Nickel mining company operating on their customary land in the extreme south of Grande Terre, 60 km south of Nouméa. "Rhéébù Nùù’s purpose was not to shut down the mining project entirely, but rather to ensure that the Kanak received the greatest economic benefits for the least environmental cost" (Leah Horowitz, paper in press 2012). From 2001 to 2008 Rhéébù Nùù pressed Goro Nickel to consult with indigenous communities and for environmental norms to be respected. Serious protests against the project happened in 2006 (see video below). "This had included several blockades that culminated, in April 2006, in a two-week stand-off in which four gendarmes were injured, 36 people arrested, and over one billion FCFP (approximately $US 13 million) of damage caused to the mining company’s equipment." (Leah Horowitz, paper in press 2012)
Negotiations took place that led to an agreement being signed on 27 September 2008 by 12 Rhéébù Nùù leaders, 25 customary authorities and two Goro Nickel representatives. Called the “Pact for Sustainable Development of the Far South [of New Caledonia]” a corporate foundation was created to fund local development, and a Consultative Customary Environmental Committee (CCCE), an agreement to train local technicians, and to implementing a reforestation program. Rhéébù Nùù agreed in exchange to cease violent actions. Levels of conflict with local people have diminished. However the manner in which this agreement was signed was controversial with many individuals feeling they were not consulted.
Then on 14 July 2009, Rhéébù Nùù leaders denounced the Pact, suspending their agreement. The complaint was acid spills in 2008 and April 2009 that had ruined a freshwater ecosystem. Goro Nickel (now Vale) has also failed to honour its financial commitments. While that opposition has now been dropped, concerns still exist - particularly among green NGOs - about the environmental record of the Goro Nickel plant, even as more local people are now involved in subcontracting operations and work for the company. Rhéébù Nùù lost some of its credibility with the Kanak and with environmental activists in New Caledonia.
There was another acid spill on 21 April 2010.
References
External links
Documentary film on Rhéébù Nùù
Category:Environment of New Caledonia
Category:Environmental organizations based in France |
Candide Essay Research Paper Book Review 2
Candide Essay, Research Paper Book Review Candide By: Voltaire In the book Candide the author Voltaire presents his ideas on life and the world through a satirical story. The main character Candide, is used to show his views through the different experiences and events that happen to Candide throughout the book.
Candide Essay, Research Paper
Book Review Candide By: Voltaire
In the book Candide the author Voltaire presents his ideas on life and the world through a satirical story. The main character Candide, is used to show his views through the different experiences and events that happen to Candide throughout the book. In his satire Voltaire seems to emphasize through Candide s adventures that in the world there is no such thing as reason and order to govern it.
Candide showed how people become hypocritical and turn their backs on others when something of importance to them is involved. He is betrayed many times during his adventures by people he trusts, this betrayal only gets him into more problems than he had before. One of the themes of the book is shown right away, when he is caught by Baron Thunder-ten tronckh kissing his daughter Lady Cun gonde and is literally kicked out of the house by the Baron (21) and how he puts his trust in a ship captain with his riches so that he may go home to Europe (88-89). Both of these betrayals only create more problems for Candide when he is kicked out of the house and all his troubles to get through life begin when he goes to the dock and the captain of the ship had sailed away with all his riches. This shows that people in Voltaire s view are not perfect and are part of a deceiving and immoral world and far from reason and order. Reason and order should keep every aspect of a person in check so that there are no troubles in the world or in life. But, as we see in Candide that is not so and human brutality and injustice are a real part of the world and made it totally imperfect.
Voltaire also criticizes the brutality of war. Throughout Candide s adventures we know about war. Its senseless and hopeless brutality and the destruction and human waste that surrounds it. War reveals itself as Candide witnesses the casualties of war. In the battle between the Bulgars and Abares Candide hides away to watch the battle and during this time he notices the many dead bodies of soldiers and innocent people because of war (25). Candide notices that there is no point in war between the two sides because there is ultimately no reason that can justify for so many dismembered and dead men. Another example is when Candide is captured by Oreillions who are at war with the Jesuits he is almost eaten by them until he proved that he was not a Jesuit by reporting that he had killed a Jesuit commander (69). This shows that wars can be justified by one little insignificant reason. But, insignificant reasons give armies or people the justification to go to war and to fight brutally and kill each other. In war there is no reason or order. War in essence is irrational and a total disorder. For example, two sides might be fighting over a piece of land just because it has important significance to them, but in the end whatever side or army prevails the death and chaos resulting of this confrontation affects both sides and all around it. The world has no reason or order when the results of war are chaos and death, which is one of Voltaire s points.
Candide s adventures are full of inexplicable things that are complicated by human errors and unkindness. God s reason and order are foiled by human brutality and corruption. On one of Candide s adventures they meet an officer of the Inquisition (who seems to be a priest) with whom he begins to discuss about free will and disagrees that the fall of man ever occurred. Candide is arrested by the priest because of his blasphemous ideas(35-36). This shows how Voltaire thought of religion as a crooked institution that forced its ideas upon others and persecuted dissenting ideas trough the Inquisition. Another example is when Candide finds himself in Eldorado and an old man explains his religious views to him. He tells Candide that there is only one god and he has supplied them with all that is needed to live (78). Candide learns that for the people of Eldorado there is no real religion or priests, but that every man has everything so they thank god and also they consider themselves all priests because they are from god (81). By these examples Voltaire explains and criticizes how a real tragedy religion is in Candide/Voltaire s world. How people/priests take advantage of it and exploit it for their own reasons and benefit. In the Eldorado example Voltaire shows the problems that he has with religion. Voltaire seems to point out that all people already have everything because they are alive on earth, as indicated, with the example of Eldorado, and that institutionalization of religion has corrupted it. People believe in and trust in religion. Religion is very important for people but the institution that are supposed to practice and serve it, such as the priest, are not believing and practicing it.
Voltaire felt that reason and order have no place in a world that has a corrupt institution such as the church that alters religion practices despite the willing of the people to believe in and trust in. So, if religion is so important to people and its institutions are not acting within reason then there is no purpose to believe in it.
Voltaire s ideas, represented in Candide s adventures, seem to show that because of man s own brutality and his own nature the world will never be perfect. What is worst, institutions such as the church, or war conflicts in which humans are the main actors are far from perfect and far from reason. On the contrary, humans are irrational and are part of the brutality of the daily life.
In the story another example represents the fact that men are always greedy and that this trait dominates their lives. Candide who possessed a large amount of money had power because of it. This made many people jealous of him and wanted to take his riches for themselves. When Candide is in France he is tricked by his abb , who seems to be some sort of guide, into going into a hotel where he will be arrested. Candide bribes the officer and the abb so that they left him alone (108). In this example, Voltaire shows the greediness of man and the lack of reason or order in the world.
Is it possible to have a perfect world? Is it possible to have a world without greediness, injustices, brutality, crooked religious institutions, war and other human frailties? For Voltaire the answer appears not to be possible at all, and that is reflected in Candide s lost hope in the existence of a perfect and utopian world. Candide in the end appears to have loss optimism in a world that is surrounded by hopelessness and suffering. |
{
id: "dusty_npc",
prototype: ["standing_npc"],
solid_dimensions: ["npc"],
solid_area: [12,14,27,33],
animation: [
{
image: "npc/dusty.png",
pad: 3,
accel_y: 80,
interact_area: "all",
id: "stand",
rect: [1,1,34,36],
duration: 7,
frames: 3,
reverse: true,
play_backwards: true,
},
{
image: "npc/dusty.png",
pad: 3,
accel_y: 80,
interact_area: "all",
duplicates: 3,
id: "stand",
rect: [75,1,108,36],
duration: 7,
frames: 3,
reverse: true,
},
],
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.