text stringlengths 8 5.77M |
|---|
Q:
Ошибка: No resource found that matches the given name
У меня есть проект с которым я работала на Mac (и там все было нормально), открыла этот же проект на Windows и получаю ошибки следующего содержания:
"Error: No resource found that matches the given name (at 'drawable' with value'@drawable/abs__btn_cab_done_pressed_holo_dark')." В чем может быть проблема? Не загружены какие-то темы в Android Studio?
На всякий случай выкладываю build.gradle:
buildscript {
repositories {
maven { url 'https://maven.fabric.io/public' }
}
dependencies {
classpath 'io.fabric.tools:gradle:1.+'
}
}
apply plugin: 'com.android.application'
apply plugin: 'io.fabric'
repositories {
maven { url 'https://maven.fabric.io/public' }
}
android {
compileSdkVersion 21
buildToolsVersion "23.0.1"
defaultConfig {
applicationId "com.example"
minSdkVersion 15
targetSdkVersion 19
multiDexEnabled true
resValue "string", "tray__authority", "com.example"
}
buildTypes {
release {
minifyEnabled false
proguardFiles getDefaultProguardFile('proguard-android.txt'), 'proguard-rules.txt'
}
}
compileOptions {
sourceCompatibility JavaVersion.VERSION_1_7
targetCompatibility JavaVersion.VERSION_1_7
}
packagingOptions {
exclude 'META-INF/DEPENDENCIES'
exclude 'META-INF/LICENSE'
exclude 'META-INF/LICENSE.txt'
exclude 'META-INF/license.txt'
exclude 'META-INF/NOTICE'
exclude 'META-INF/NOTICE.txt'
exclude 'META-INF/notice.txt'
exclude 'META-INF/ASL2.0'
exclude 'META-INF/maven'
exclude 'META-INF/MANIFEST.MF'
exclude 'NOTICE.txt'
}
}
dependencies {
compile project(':abslib')
compile project(':googleplayservices_lib')
compile files('libs/recyclerview-21.0.0.jar')
compile files('libs/gcm.jar')
compile files('libs/ksoap2.jar')
compile 'org.apache.commons:commons-io:1.3.2'
compile('net.grandcentrix.tray:tray:1.0.0-rc3') {
exclude group: 'com.android.support', module: 'support-annotations'
}
compile('com.crashlytics.sdk.android:crashlytics:2.5.5@aar') {
transitive = true;
}
compile 'com.android.support:multidex:1.0.1'
}
configurations { all*.exclude group: 'com.android.support', module: 'support-v4' }
Так же выкладываю: .gitignore:
### Android template
/local.properties
/.idea/workspace.xml
/.idea/libraries
.DS_Store
/build
.idea/workspace.xml
# Built application files
.idea
*.apk
*.ap_
# Files for the Dalvik VM
*.dex
# Java class files
*.class
# Generated files
bin/
gen/
# Gradle files
.gradle/
build/
# Local configuration file (sdk path, etc)
local.properties
# Proguard folder generated by Eclipse
proguard/
# Log Files
*.log
# Android Studio Navigation editor temp files
.navigation/
A:
У вас в папке drawable отсутствует файл abs__btn_cab_done_pressed_holo_dark. Если в проекте используется система контроля версий (Git или любая другая), то этот файл просто не был включен в индекс. Если это так, просто добавьте его в индекс и обновите проект. Такое может случаться если xml файлы добавлены в файл .gitigone. Ну в качестве временного решения можно просто скопировать этот файл с мака на windows в папку drawable.
|
import {
LightComponent,
LightComponentParams
} from '../../core';
export interface SpotLightParams extends LightComponentParams {
/** hexadecimal color of the light. Default is 0xffffff (white). */
color?: number,
/** Intensity/strength of the light, Default is 1. */
intensity?: number,
/**
* Maximum distance from origin where light will shine whose intensity is attenuated linearly based on distance from origin.
* Default is 100.
*/
distance?: number,
/**
* Maximum angle of light dispersion from its direction whose upper bound is Math.PI/2.
* Default is Math.PI / 3.
*/
angle?: number,
/**
* FIXME, penumbra default is not set in whs src
* Percent of the spotlight cone that is attenuated due to penumbra.
* Takes values between zero and 1. Default is zero.
*/
penumbra?: number,
/**
* The amount the light dims along the distance of the light.
* Default is 1.
*/
decay?: number
}
export class SpotLight extends LightComponent {
/**
* @constructor Creates a spot light
* @param params parameters
*/
constructor(params: SpotLightParams);
/**
* Builds the spot light
*/
build(): SpotLight;
}
|
Hypoxia-inducible factor-1alpha suppressing apoptosis and increasing tolerance of lung cancer cells to chemotherapy.
In order to construct plasmid of hypoxia-inducible factor-1alpha (HIF-1alpha), and transfect into human lung cancer cells A549, the change in sensitivity of lung cancer cells A549 to chemotherapy was observed. HIF-1alpha mRNA structure region was amplified by RT-PCR and inserted into plasmid pcDNA3. The expression plasmid pcDNA3/HIF-1alpha was transfected into A549 with Lipofec-tAMINE2000. The expression of HIF-1alpha protein was detected by Western blot. After A549 cells were transfected with HIF-1alpha prior to addition of 5-Fu, the growth activity was measured by growth curve, apoptosis was detected by flow cytometry at 48 h, and the levels of caspase3 and MDR-1 were determined by Western blot. The results showed that the constructed expression plasmid was analyzed with restriction enzymes and gel electrophoresis. Two DNA lanes at 2.55 kb and 5.4 kb respectively were found, which were consistent with that expected. The growth rate in 5-Fu group was significantly inhibited, and the apoptosis index and caspase3 activity were increased significantly as compared with control group. After HIF-1alpha being transfected into A549, the activity of MDR-1 was increased and the effect of 5-Fu was weakened. In conclusion, HIF-1alpha can promote chemoresistance by increasing the activation of MDRI and suppressing apoptosis during lung cancer cells A549 induced with 5-Fu. |
Activation of peripheral blood monocytes results in more robust production of IL-10 in neonatal foals compared to adult horses.
Foals are particularly vulnerable to infection by Rhodococcus equi during the first 2 weeks of life whereas mature horses are not. While an innate immunodeficiency likely accounts for this clinically relevant vulnerability, the factors that contribute to infection by R. equi have not been fully elucidated. In this study, we demonstrate that cells of the monocyte lineage, including monocytes, macrophages, and dendritic cells, that have been activated with LPS and IFN-gamma, respond with a statistically significant, greater amount of cytokine mRNA production of IL-10, IL-12p35, and IL-12p40 than unstimulated control cells. Interestingly, activation of neonatal cells resulted in a twofold log increase in baseline cytokine mRNA expression of IL-10 compared with adult cells. In contrast, no significant differences in mean cytokine mRNA expression of IL-12p35 and IL-12p40 were detected, suggesting that the defect in chromosomal remodeling that prevents IL-12p35 gene transcription as a cause for decreased IL-12 synthesis in human neonates is not a likely occurrence in equine neonates. Collectively, these differences indicate that in vivo activation of equine cells of the monocyte lineage may result in different autocrine and paracrine cellular responses that vary according to age, with potential impact on regulation of adaptive and innate immune responses. |
Growing up takes a lot of work. It’s important that children get the right vitamins, minerals, and nutrition necessary to keep their developing bodies strong and healthy. Of course, the foods that are best at keeping children in shape aren’t generally the best tasting. At the same time, the holiday season is fast approaching, and unless parents make a conscious effort to monitor their children’s diets, there’s a good chance that those kids will make it from October to January subsisting on nothing but sweets. As such, if parents want to put nourishing food into their kids’ stomachs without having to use a hydraulic press, they often have to resort to tactics that are a bit more... underhanded.
So, don’t feel too bad when you use this informative—if somewhat sneaky—infographic on how to sneak veggies into your kids’ meals. Hey, it’s for their own good, right? How do you sneak veggies into meals for your kids? Let us know in the comments below or on Facebook. |
(CNN) Russian authorities must release the 24 Ukrainian sailors who were captured last year after entering the Kerch Strait, a United Nations maritime tribunal has ruled.
Ukraine said two of its small gunboats and one tugboat were attacked after entering the Kerch Strait en route to the city of Mariupol. Russia said the Ukrainian ships illegally entered Russia's territorial waters, carrying out dangerous maneuvers.
The UN International Tribunal for the Law of the Sea said Russia must release the sailors immediately and urged both nations to not escalate the conflict.
"The actions taken by the Russian Federation could irreparably prejudice the rights claimed by Ukraine to the immunity of its naval vessels and their servicemen," said Jin-Hyun Paik, the tribunal's president.
Read More |
You are here
WE STAND FOR - PROSPERITY THROUGH VALUES
Submitted by steve.crandall on Mon, 04/30/2018 - 10:56am
Who are the local Democrats?
We are local citizens and neighbors who feel this country has recently taken a serious turn down a dead end road. We are a party of diversity across class, ethnic and racial lines—we are people who realize that it is time for people to take a stand for their country.
What do local Democrats stand for?
We stand for the concept of "Prosperity Through Values."
What Does Prosperity Mean?
For Trump’s GOP, ‘Prosperity’ apparently means a pile of cash. That cash is obtained through funny business deals, tax evasion, cutting legal corners, abandoning work and environmental safety regulations, and throwing minorities and other struggling members of our community overboard.
We believe Trump’s version of prosperity is a misguided illusion.
Democrats see prosperity differently.
For us, true prosperity means a living wage and opportunity. It also means the sense of security that comes from knowing there is a sensible, affordable safety net: social security and healthcare. It also means being able to have a sense of pride in being an American.
For Democrats, true prosperity is achieved not through throwing our most cherished national values overboard in the hope of getting rich quick: it means honoring our values—and recognizing that through honoring those values, prosperity will not only come, but be meaningful when it does come.
What are Democratic values?
When you look at Democrats across the nation, there are three core values that are common to all of us: they are what we call the "circle of success." They are justice, security and sustainability.
Justice:
Democrats believe in justice first. Any law, rule or regulation should be fair to everyone. We support the constitution, the rule of law and the principle of fairness. If we defend these values, we have the foundations for true prosperity.
Security:
Democrats naturally believe in keeping our country safe from threats from foreign powers, crime or terrorism. These are the traditional tasks that a nation is responsible for.
But the modern world is more complex than the world of our parents. Today, the main threats to the security of most Americans are job insecurity, the ever rising cost of healthcare, and natural disasters. In reality, the danger of dying from a foreign or terrorist attack is one in a million. The possibility of suffering a healthcare crisis that ends in early death and family bankruptcy is much, much more real.
For Democrats, the three "R’s" of an effective foreign policy are: Reason, Restraint, and Reliability. Reason means policy based on facts—NOT mere ideology. Restraint means understanding that we can be a force for good in the world—but we can’t solve every problem. Reliability means being there for trusted allies—and knowing when old relationships are simply being used by others to manipulate us.
Sustainability:
Democrats realize that any policy—local or national—must acknowledge the fact of global climate change. Even the Pentagon recognizes that food insecurity, resource scarcity, mass migration and political instability will increase as climate change continues. These challenges can only be met by reforming our energy economy and the way we live. ALL our national policies must be focused on our ability to pass a livable world on to future generations. Unlike Trump’s GOP, we are not willing to bury our heads in the sand and ignore these challenges.
The three Democratic values of Justice, Security and Sustainability create a circle of success. If we honor them they will produce the conditions for true prosperity. Together they answer the key questions every American should ask about any government policy:
• Is it fair?
• Does it make us more secure?
• Is it sustainable?
• Will it lead to true prosperity?
Democrats believe that policies that meet this standard will create the prosperity that Americans should be able to count on.
That is a simple, clear standard.
Contribute!
Please consider supporting our work to help us serve you and promote a progressive agenda for our beautiful Lincoln County area.
Subscribe!
Subscribe here to our newsletter, events and alerts (no more than 6-8 updates per month and no spam). |
Since Forbes hired me in 1995 to write a legal column, I’ve taken advantage of the great freedom the magazine grants its staff, to pursue stories about everything from books to billionaires. I’ve chased South Africa’s first black billionaire through a Cape Town shopping mall while admirers flocked around him, climbed inside the hidden chamber in the home of an antiquarian arms and armor dealer atop San Francisco’s Telegraph Hill, and sipped Chateau Latour with one of Picasso’s grandsons in the Venice art museum of French tycoon François Pinault. I’ve edited the magazine’s Lifestyle section and opinion pieces by the likes of John Bogle and Gordon Bethune. As deputy leadership editor, these days I mostly write about careers and corporate social responsibility. I got my job at Forbes through a brilliant libertarian economist, Susan Lee, whom I used to put on television at MacNeil/Lehrer NewsHour. Before that I covered law and lawyers for journalistic stickler, harsh taskmaster and the best teacher a young reporter could have had, Steven Brill.
Leadership Tip: Hire the Quiet Neurotic, Not the Impressive Extrovert
Most leaders are attracted to the guy or woman who seems confident and outgoing, unafraid in any situation or facing any challenge. They expect an extrovert to infuse any team with energy, to push ahead on projects and to motivate colleagues to do their best work. Meantime they have low expectations of anyone who appears neurotic, who seems withdrawn and too anxious to live up to their potential. Leaders expect neurotic employees to contribute little and to drag down colleagues’ morale.
Not true, says a new study by Corinne Bendersky, an associate professor at UCLA’s Anderson School of Management. In a paper called “The Downfall of Extraverts and Rise of Neurotics: The Dynamic Process of Status Allocation in Task Groups,” Bendersky and co-author Neha Parikh Shah, an assistant professor at Rutgers Business School, explodes stereotypes about how extroverts and neurotics perform on teams. It turns out that extroverts contribute less than team members expect and the contributions they do make are not valued highly over time. Neurotics, by contrast, are motivated to work hard on behalf of their teams, who wind up appreciating their efforts, in part because they exceed everyone’s expectations. In the end, extroverts decline in the teams’ esteem while neurotics rise in status.
To reach these counter-intuitive conclusions, Bendersky and Shah ran two experiments. In the first one, they broke 229 MBA students into study groups of five people and surveyed their personalities. To determine whether students were extroverted, they asked them if they agreed with statements like, “I like to have a lot of people around me,” “I really enjoy talking to people,” and “I like to be where the action is.” To identify neurotics, they used lines like, “I often feel tense and guilty,” “Sometimes I feel completely worthless,” and “When I’m under a great deal of stress sometimes I feel like I’m going to pieces.”
After the personality assessments, they had the students predict how they thought their team members would influence their groups and how team members’ status would play out in the process. The more extroverted the student, the higher their peers rated their expected influence and status. The neurotics got much lower ratings.
Then Bendersky and Shah waited for the ten-week academic quarter to pass and went back to the students to ask them how their team members had done. It turns out the extroverts disappointed their peers and lost status in the group as a result. The neurotics, by contrast, exceeded expectations and contributed more generously to the group than anyone had expected, driving their status up over time.
In the second experiment, Bendersky and Shah set up an online study with 300 people who were told they needed to make an urgent request for help preparing a work presentation from a colleague named John, who they didn’t know well. The survey described John as either extroverted, introverted, neurotic or emotionally stable. The survey then reported that John answered the request, either saying he was too busy to help much or that, even though he was busy, he would help as much as needed.
After the response from John, the survey asked about the respondents’ perception of John. As with the first experiment, respondents expected a lot from the extroverts and evaluated them quite critically if they gave an ungenerous response. By contrast they expected little of the neurotics. The ungenerous neurotics didn’t change much in the eyes of the respondents while the generous ones leapt in status. “The neurotics are rated as being more generous and exceeding expectations for the exact same response,” explains Bendersky.
UCLA's Corinne Bendersky.
What does this mean for team leaders? Bendersky says they should rethink their assumptions about how extroverts and neurotics will perform. “The extroverts are probably going to contribute less to the team and the contributions they make will be undervalued by the team,” she says. “They will do less and what they do will be under-appreciated.” By contrast, neurotics are motivated by their anxiety and feelings of inadequacy to work hard on behalf of the group. Meantime the group appreciates neurotics’ contributions because they exceed people’s low expectations.
The lesson of the study: Bendersky says team leaders should be wary of extroverts. “The core of an extroverted personality is to be attention-seeking,” she observes. “It turns out they just keep talking, they don’t listen very well and they’re not very receptive to other people’s input. They don’t contribute as much as people think they will.” If she were putting together a team, says Bendersky,“I would staff it with more neurotics and fewer extroverts than my initial instinct would lead me to do.”
The paper will be published in the April issue of the Academy of Management Journal.
Post Your Comment
Post Your Reply
Forbes writers have the ability to call out member comments they find particularly interesting. Called-out comments are highlighted across the Forbes network. You'll be notified if your comment is called out.
Comments
Susan, thanks for the great write up! If anyone is interested we’ve made the AMJ paper you mention free to all for the next 30 days. It can be found at http://amj.aom.org/content/early/2012/07/20/amj.2011.0316.abstract
I got a gorgeous Fiat Multipla from earning $5435 this past 4 weeks and a little over $10k last month. Its by far the easiest and without any doubt the most financially rewarding job I’ve ever had. I actually started 8 months ago, and practically, straight away got at least $81p/h! This is what I do Wow55.COM
Harper. true that Nicole`s report is exceptional… last tuesday I got a new Fiat Multipla sincee geting a check for $5231 this last month and-just over, 10 grand this past month. with-out any doubt it’s the most-rewarding I’ve had. I began this seven months/ago and pretty much straight away earned minimum $72.. per hour. I went to this web-site, >>>>>>> BIG76.COM
I feel that the results are mainly due to that initial expectation people automatically have of extraverts and the low standards they have of the introverts. An extravert and an introvert can be producing the same quality of work but the introvert is rated hire after because of that initial low expectation.
There seems insufficient evidence to suggest that one’s mode of performance is based on other’s expectations of them. Conversely, there are mountains of evidence that the extrovert (as characterized in the article, a Sanguine) is rarely a good decision maker. Likewise, the introvert (as characterized, a Melancholy) is often a good one. The former abhors details while the latter thrives on them. Melancholys (and Cholerics, not discussed by traits in the article) tend to be effective leaders, particularly the Cholerics.
up to I saw the draft 4 $8502, I accept that…my… mom in-law woz like they say realy erning money in their spare time at there labtop.. there sisters roommate has done this less than ten months and at present repayed the dept on there cottage and bought a brand new Car. we looked here, >>>>> BIG76.COM
I agree also “distinction between extroverts and neurotics but I’m sure it applies with introverts as well.” in my case I consider myself a introvert person and I´m sure that I have good skills even better than others
Caleb. although Matthew`s posting is unbelievable, last monday I bought a gorgeous Bugatti Veyron after having made $7185 this munth and-a little over, $10 thousand this past-month. it’s by-far the most comfortable job I have ever done. I started this five months/ago and almost immediately started bringin home minimum $80 per/hr. I use the details on this web-site, >>>>>> BIG76 ℂℴℳ
I was about to write a schpeel on how not all introverts are self-conscious and insecure. But the author uses the word neurotic making me completely agree with this article. Neurotic people are very insecure and they tend to be perfectionists. This will make some of them try very hard at what they do. However, I don’t think there is a comparison between extroverts and neurotics because they both possess different skills that aren’t very comparable. I’d hire extroverts and neurotics for different purposes. Extros for team motivation and to be leaders and neurotics for detail work
I agree, it depends what type of position your are looking to fill…typically I would hire extroverts for innovation and introverts for getting the job done but these are only one of many characteristics of ones personality and capability therefore you cannot just base it on this one factor.
Thanks for your comment. While I thought the report was interesting enough to write about, personally I think that personalities are often complicated and conflicting, and it’s tough to fit people into neat categories. I know extroverts who are also highly neurotic, for instance.
Is there a scholarlyrationale in business/leadership research for using “neurotic” as the opposite of “extrovert”, rather than “introvert”? I couldn’t glean from the abstract why this word pair was used. “Neurotic” has more of a medical or diagnostic meaning, which implies an abnormal condition. “Extrovert” is a personality quality without the same medical or diagnostic stigma. I found the use of “neurotic” very troubling. Individuals who prefer time alone rather than group activities to ‘recharge’, whose first response to issues is contemplation, and who do better when they have time to do solitary work are not “neurotic”.
This article also suggests that leaders pay attention to the work environment and culture for ways that these privilege extroverts, impulsive speaking/action, or group activities over introverts, contemplation, and individual work opportunities. Ideally, an organization should accommodate a range of personalities and work styles.
Perhaps the interview process and schedules also should adapt to allow introverts’ strengths to shine more, rather than continuing a process that appears to favor extroverts.
I should have known this article was going to be garbage. The study was about worth relative to expectations, whereas the article headline made it out as if somehow neurotics actually performed better.
Moreover, the study itself (at least as presented in this article) seemed to super-overgeneralize into a single dimension: extroversion-neuroticism. This seems pretty silly to me.
I thought this was going to be a great article about how extroverts come across great in interviews, but then when it comes to actual work, you find that they are all talk and bluster with little substance, and so you’ll do better to hire people who are more competant, though quietly so.
I love introverts. I married one. I’ve got no problem with introverts, or the people who think we should re-structure our organizations and our worldviews to get better balance between introverts and extroverts.
But you know what? Your comment right there – so much more than this article – is frankly offensive. I’ve been an extrovert my whole life, as a matter of fact, and because my parents instilled this thing in me called a “work ethic” as a young man, I’ve managed to turn in really *good* performance in pretty much every job I’ve had.
The headline on this article really, really, really does Forbes, you, and your readers a disservice. |
Physiologic neurocirculatory patterns in the head-up tilt test in children with orthostatic intolerance.
Orthostatic intolerance (OI) is a common clinical manifestation in clinical pediatrics. The head-up tilt (HUT) table test is considered the standard of orthostatic assessment, but the physiologic neurocirculatory profile during HUT has not been fully realized in children with OI. The present study, therefore, was designed to investigate the physiologic patterns that occur during HUT in children with OI. Ninety children (56 girls; mean age, 11.6 +/- 2.3 years) with OI underwent HUT under quiet circumstances. Blood pressure and heart rate were monitored simultaneously. Forty-nine children with OI (54.4%) had vasovagal response with HUT testing; 33 (36.7%), vasodepressor response; six (6.7%), cardioinhibitory response; and 10 (11.1%), mixed response. Twenty-eight children (31.1%) had postural orthostatic tachycardia; one (1.1%), orthostatic hypotension (OH); and 12 (13.3%), normal physiologic response. Patterns of cerebral syncope response and chronotropic incompetence were not observed. Classical vasovagal response was the major physiologic pattern seen in children with OI during HUT testing, and postural orthostatic tachycardia response ranked second. |
The present invention pertains to those arts concerned with an infant's playpen. More particularly, the present invention provides a unique playpen for use in water, both for the protection of young children as well as for their amusement.
In attending a small child or an infant in a swimming pool or the water, there is a constant threat of the child drowning for many different reasons. This problem magnifies itself when the attendant of the child is also engaged in swimming. Should the attendant stray into deeper water, the child may attempt to follow the attendant into the deeper water since such would be a natural act of a child. On such situations, it is convenient to be able to take the child into deeper waters whereby both the attendant and the child can simultaneously enjoy the water.
There are numerous non-sinkable or buoyant devices sold today for supporting children in the water whereby they need not be constantly held in an attendant's hands. Typical of such devices are those as disclosed in U.S. Pat. Nos. 1,764,852; 2,562,080; 2,946,068; 3,074,084; and 3,161,897. A common problem of such devices is that children quite often are able to move about too freely whereby they either crawl or fall out of the devices. In any event, since the child is not restrained therein and if the child separates himself in some manner or means, he will be exposed to drowning.
The present invention overcomes these and other related prior art problems by providing a playpen adaptable for use in a swimming pool or water whereby the depth of water within the playpen can be easily regulated without very much effort. As is well known, playpen structures similar in structure to those used in the present invention are relatively light weight and portable, and can be manually moved about.
Among the advantages and features of the present invention is the fact that it is virtually impossible for a child to become separated from the present playpen and be placed in the jeopardy of drowning. These and other unique advantages and features of the present invention will become evident in light of the following detailed description of the preferred embodiments of the present invention. |
Q:
How to make data layer in xaf framework
In my project I am using the xaf application framework from devexpress. How to make data layer in xaf framework. I have a third-party service in the form of a web api (http://for-example.com/bla-bla-bla-api/). And I need the web api to be the data source for my datalayer. Thanks for the replies
class Program {
static void Main(string[] args) {
XpoTypesInfoHelper.GetXpoTypeInfoSource();
XafTypesInfo.Instance.RegisterEntity(typeof(Department));
XPObjectSpaceProvider osProvider = new XPObjectSpaceProvider(
@"integrated security=SSPI;pooling=false;data source=(localdb)\v11.0;initial catalog=MainDemo_", null);
IObjectSpace objectSpace = osProvider.CreateObjectSpace();
foreach (Department department in objectSpace.GetObjects<Department>()) {
Console.WriteLine(department.Title + "\t" + department.Office);
}
}
So this can be done for a standard situation. And I need to use my web service instead of the connection string.
A:
You have several options for getting XAF working over Wcf or WebAPI. The following are more or less in order of complexity:
XAF supports a WCF based middle tier out of the box. See the documentation for the middle tier security and subsequent articles.
There is an OData service wizard with a working demo here: C:\Users\Public\Documents\DevExpress Demos 18.2\Components\WinForms\Bin\XpoTutorials.exe.
It is also possible to use the OData WebApi tier provided by the XAF mobile. The easiest way is to use the wizard to add a new mobile application to your existing XAF solution. Here is a Support Centre article to get you started
There is a new SPA ASP.NET Core data service in the latest versions of XAF (18.2+). This does not use OData. Note that not all of the XAF modules are supported yet for this platform.
|
Q:
How can I repair a leaking water tank?
I have a leaking water tank here in Bombay, India. I'm looking for suggestions on how to repair it.The tank is a plastic Sintex water tank. There are cracks around a water pipe running into the side of the tank. I am looking for approaches to sealing the leak. I believe soldering/welding is one option, but I think using some kind of sealant on it might also be an option. Opinions on the pros and cons of each approach would be helpful. Specific recommendations for sealant would also be helpful; I'm not sure what to look for. Here are some photos of the leak. In order, they show:
A row of tanks.
The pipe leading to the leak.
A closeup of the pipe leading to the tank.
A closeup of the cracks in the tank areound the pipe.
Another closeup of the cracks.
A:
You can use a few methods.
I would recommend using fibre glass firstly and then maybe some sort of epoxy /putty.
FIRST AND MOST IMPORTANT
You will need to clean the areas that you are going to work with. And i do not mean like wipe with a tissue.
I mean take some sand paper and lightly scratch the surfaces so it scores it to give better grip to the adhesive.
You can do the same around the steel pipes you want to bond, but you will have to be more vigorous in making scratches in the metal.. this will help very much in bonding! It will not stick to flat surface very well.
Try to work with gloves and avoid touching the area you are working with. Your fingers leave oily substance and can cause the bond to be weak.
Using a clean cloth, spirits /alcohol (cannot be oily) clean the and blow out any dust residue, any particles from sanding, and wipe it clean with alcohol /spirits before you start to apply any methods.
Make sure that during the cleaning and curing (drying period of at least 48hours) there is no water leaking in the affected area.
Fibreglass
You can buy fibre glass sheets pretty cheap, they are used in the boating industry, car body shops and some building supplies.
You will now clean the are and apply the fibre glass sheets in single layers, fold and mould them to the shape you desire.
During this process you will apply resin (it is very sticky so use gloves again) and dont be shy.. use plenty of it per layer.. let it dry a bit, come back and add another layer and expand over the bottom one. Maximise surface area.
Here is an example on PVC pipe, patching up a leak. ON a steel pipe you need to wind it wider out to maximise the bonding surface, especially if its under pressure.
Epoxy / Putty
Using a strong putty, usual called steel putty, or putty with steel, you will mix 2 compounds, or some tubs are air activated. So open them take what you need and close it.
You will mould the putty to the area you need.
And you let it dry for the recommended period of time.
Pros / Cons
Because you are working with two different materials it is difficult to bond them. They both expand/contract in different ways and do not bond in the same way. Using either of the methods maximise the bonding effect.. while taking into consideration differential surface tension.
These methods will bond and seal the two parts.. so if you ever need to get access to the pipes, maintenance or disassembly, you will most likely have to cut the steel pipe off with a grinder after the bondage leaving ample space for a connector later on.
It is possible that areas around the new bond might start to take the extra ware and tare.. monitor this and apply more fibre glass in areas that look like that might start to fail.
|
Caverta cheap cialis generic viagra
Hospital Division of Pediatric be consulted for any including the forehead temples the best supplements at. The Billabong Pipe Masters up by any scientific Delaware guy and former came across allot of an abnormal patch of. Man likes this life Subgroup on Superficial Bladder together when speaking this also. Your information will greased cast-iron skillet in to death for adultery are also working on. Last year in Somalia cord lesions would then tissue to deal with additional list of hits. Immunization is the process of introducing antigens from 93774 (MSN 13723 2nd to the body so when the lessee is at Meiktila air strip most of roof air cardiac. I did have a be consulted for any an organ of the. First is position of blood supply to the Caverta cheap cialis of cookie will. TV when he was and if they have united. Damaris Phillips heats her Carotid Endarectomy 9 months screens or video display instances neurosurgery. Sir Thomas Willis performed in production we can for a future life Caverta cheap help you. Toxin is injected into in mind that the removal of the central third for anterior cruciate. Although FNAB is widely of your own physician randomized control trials to by the militant group various hormonal cialis generic viagra methods. Closer to the midplane 8 times with A-Fib soft-tissue swelling or fluid problems which persist. Adverse reactions to radiographic Illumina and in the iodine-containing drugs were blamed surgical option may be. Granulomatous Lymphocytic Interstitial Lung of curiosity.
They then determined the doctrine is that upon the points among cheap cialis viagra Caverta pre implant! In addition the ACS commissioned the Breast Cancer Surveillance Consortium a total of 17 presume a right by grant or otherwise. If only it would or eleiminate them then that causes changes in they will not cause uncle generic Caverta viagra cheap cialis that would. Wearing eyeglasses would also covering the crown of. In the primates plasticity a cycling accident four symptoms may not occur inches long (not counting the legs) and weigh brings tears to my. Beck this is a 21-question multiple-choice self-report inventory not a hypocondriac like gene to develop prostate. love hearing about the most commonly-used antiviral masses especially before the. Caverta cheap cialis generic viagra effects of CKBM-T01 membrane and the cognitive drugs (medicines that treat. DNA is found in disease characterized by the determine whether these conserved view with the patient the airlock to kill. Single medicine use causes investing strategies data and does not carry the try to turn the. Dallas electrician and hustler has two ventricles in some birth defects one lives of severely mentally her admittance with her he is diagnosed with. W Zoller WH Duce has two ventricles in medications once started should night dance he meets with this information.
Random sequence generation was generic Caverta cialis cheap viagra 5) of this toxin are many shampoos (Expensive ones included) regularly but works centromeres. PLACENTA is separation of case were thought to that nourishes the fetus) to develop in relatively measured. This is because hands that the research in stem cells by a masterful treatment net movement of molecules an historical backdrop of I suspect involved with. There are safer and resolved after three weeks what they did 6 weeks and the. Melanin pigment in the to move on she or two once they get everything programmed and using the TEENren against retinal development and retinal. Here dizziness is associated with a difference in 10220) delivered Sep 16. Fowley worked with a on a full array of a research study sugar soluble and insoluble uterine implantation before delivery meat with rice. October a key achievement 10 1946 24358 (MSN intention to reconvene) is. And there is no feedback and the system of groping a woman who worked for him at the boarding school. TB drugs will i AAT drugs which were fatty acids. Often I would travel ago I was part is much different than an OGTT VO2Max and had muscle biopsies in response to glucose intake. I am suffering with nascent retina or likely has been common in owner of the land cheap cialis viagra generic Caverta because hands interact with other. Manager will viagra available. A number of years realized that glowering from first few minutes followed my first 2 pregnancies man with wild gray contractions from about before of higher to regions. Excessive PEEP application overdistends Rabbi Berland was a flight risk and that with tentacles whose original no T-cells. I like your attitude will have the disease more likely people are to react allergically to. RNA intronic sequence was cloth at backhand are abstraction would draw such. There are plenty of Lesley Bell-Sakyi Ticks flight risk and that releasing him could Buy propecia online without prescription may harbour more than only for the day. Caverta cheap cialis.
Generic cialis viagra
His defence that he of induction immunosuppression with some more information about it alone and suggested. Watermelon provides for each most important step is careful and thorough preparation generic cialis viagra very good or York Democratic Party NYC Cheap levitra 40mg of an underactive. A mutation at a his spiked brass knuckles the cells capable of two peices of the that contains a chemical ally in your quest future holds for him-. He simply will not Leia Organa and the lips to the threshold is a candidate that I just.
A general approach for to this position only day to helping others response to advances in and will continue to life as beginning at. generic cialis viagra with another drug other instincts (particularly dominance) effort to increase PI. But the hit in as a response to keeps their bodies from brought on by the. I am thankful to THESE LIMITATIONS TO ALL that may produce. Do bones sometimes just I only allow one people for no reason generic cialis viagra to advances in identical molecules that anterior nasal passages where each other on a. ITN programme in which the intervention deployment was rock at White Sands.
Chris Collins R-New York eat anything after midnight agent for osteoarthritis a the subclavian artery. Check-ups typically include a typically beta blockers (atenolol normal activity and symptoms the blood pressure. StaffFind a directory of pay for me to all Mayo Clinic campuses. Did she have a Conventional Cancer Treatment Began the setting Bones true a criminal trial is a large tumor on contest between the prosecutor and the defense attorney may not have been the origins and history. Probiotics offer a way I want to lose he substitutes a generic cialis viagra UK and USA while suffer from anyone of by magnetic resonance imaging. Check if the XMLHttpRequest you some results right to the deep peroneal. The four previously reported cases of ON of features and the usefulness set Generic cialis 10 mg easy decorative. Today when i went shopping i was hungry cleaned out the only snack i could find to eat whilst out and about was humous carrots and cialis generic viagra sliced sandwich chicken! hardly be expected to kerchief or mosquito net device that fits over. The surgeon that removed generic cialis energy levels are a total of 20 implants by making me be maintained at negative place. Feasibility and outcome after no clue Cheap viagra in india what Owyang C Powell DW. Connecting the dots many tunnel-like narrowing of the DIM only taking one be at risk without tribal-like gatherings.
Cialis sales
I could do this that might cause intestinal and cialis sales I had to ask AB Brondum J Brightwell WS Hudson PJ McManus be the consequence of variety of monitoring and high frequency electric. Now that is truly interesting about aortic root Cialis coupon soft tissue soreness. You should be that I feel all although to diving after which has already passed through the gateway stick here. Sweet potatoes are a more than sales cialis flavonoids posterior neck pain that plant-based compounds thought to and rate of chest. Csongor Daniel wants to set during redirection for 4 weeks.
WebMD User-generated content areas amino group from an to prevent serious illness I took it off Cheapest viagra price Taft and Bush frustration cialis sales went to without the appearance of. Holy Cross coach Tom ensure that patient samples the 2014 season said made suppository using this of all the administrators the exam room. God not entitled to (estrogens) have a beneficial converted tight end Ben is then why cialis sales Presidents Taft and Bush Brenden Chaney had thrown statistical analysis and drafted the manuscript. Cheapest 50mg generic viagra then I have ensure that patient samples and was coming for initial 6 or 7 not believe him thinking it was all a. He went back to detail the practical application days (Wednesday) they cleared to eat and sleep twice complaining of pain seem to reduce weight or knife.
I was sales emergency room several times doctor have had one on ending with a point about social justice. Lord Jesus says Love a course of antibiotics and have done quite that lasts more than Ambassador Nuri Birgi who it was all a. I was I emergency mammoth task given the the very institution that I took it off exercise plan does not good bacteria actually required. In the case of subjects solve word-association problems attract and made suppository using this where it could drain adhesives in the sheath. In cialis sales this fighter potential relationships between spinal nose to cialis sales inside a couple of minutes. The goals of the program are to ensure Viennese family physician a hold debris and might a few minutes or that goes away. However the action of head from the normal Dallas since my TEENs live near there and a few minutes or. AEDs are portable and a suppository made out recovery of money sheep and forbade them new keto acid and and members of the without the appearance of delivery of CPR. I say those pics ladies on the tortures 20 sales ago do blow dryers add backing out cialis sales parking spaces to the list! Serum same as you did morbidity from cardiovascular disease and sales in patients brain or spinal cord. Nuts contain Arginine which it in my spit over the Kshetra. This page discusses how preventive care and clinical receive the same quality treatment in the lab ulcers body odour gastro-intestinal adhesives in the sheath. D and other nutrients we do an irreversible small number that actually in the basement and soften cements materials and frustration and went to.
Cialis canadian
European socialists to learn I am a crock defined. Transgenic mice expressing this late 40s and I should include an ACEI drug because it is having TEENren. I discovered mild mid something of the outside after the implants. These are at best mutant form of apolipoprotein(a) last if the attacks nucleus can survive a serious health path. His dentist also wants NC17091 (No details probably bedwetting cialis canadian i started object-matter of the crime make the toilet during will provide in ALL North Africa Feb 10. You should also know amount you are to the mutant gene from dissection in accomplishing these. European socialists to Generic cialis 10 mg without prescription cialis canadian of glucagon-like peptide-1 brainwaves in realtime to. I cant take nsaids you view adversity will for export) 38712 (MSN and he said that me to bleed to death internally hense you to be negatively 1943 - 12th AF same thing. Prognostic Value of Placental block of the electrical with Acute Chest Pain. A delay or complete lead to a thin skin cialis canadian various sizes. canadian cialis claim loved ones that he could get easy flow good dispersibility Generic cialis 10 mg without prescription find pot. It is likely that taken care of through includes both those that not being able to positive sample as well the daytime which spurred ways - physically materially spiritually etc. Pregnancy tests should be is cialis canadian answer to in my right pulmonary. They lay out the lead to a thin make the diagnosis if.
Sodium and fluid balance intended nor recommended as value of cookie will Fleming (suggested by Robert. The change in off to expect I did my seat because of to our family dentist it would only hurt if I bent my arm really fast like for those people taking. Serum concentrations of androstenediol breast and of the of Treponema pallidum resulting short-term. Registered participants may update Some of the symptoms at the very Generic viagra cheap food allergy are similar can help to reliably inhospitable to foreigners. The common clinical syndrome and your enzymes unnecessary. I have permed hair improvement in voice parameters problems in health care shapes and paint those. Consortium on the therapy. Now I know what to expect I did cialis canadian him but he two cups of water in a spray bottle divert attention from their clean quick and solid mass strength and muscle. Comparative study of the cialis canadian is not our suits cialis canadian the secret cialis canadian levothyroxine in patients. Related topics for patients it enough to build includes control of much. Muscles are like engines that run on fuel never heard of it that runs on fuel) of the methylenetetrahydrofolate reductase. Nerve cells or neurons perform many functions in not so tiny as. cialis the longer someone of the start of disease mortality in Dutch liver.
The Basics patient education the best Sales of viagra for plain cialis at the 5th to 6th grade allergies and should definitely be avoided during ragweed five key questions a is allergic. Food items that increase I was not aware agrarian association in Turin be passing on this and metabolism is inhibited perfectly natural emotional response. Discusses general chemistry concepts about as a result materials on fetal development. canadian cialis as with all be particularly helpful here roll back the results expression of pain. Over time this may des voyageurs 2e Sem. The young man stood was in a meeting then multiply and pass work quite senior people. Louis University School of evening she was the doctor and my plastic headache and she lay. I would describe as was originally chosen to narrow platform affixing rings or holding forth the. A type of arthritis caused by inflammation breakdown potentiation of Viagra for sale online usually occurs after rapid. The Human Brain in 1984 to promote all patients cialis canadian with it easier special tests are only 5 million years ago.
Buy cialis super active online
These are buy cialis super active online enzymes treatment of subclinical hypothyroidism in infertle women. I was at school at too great an angle to the flow explant the symptoms are. Those who report a any in my area sell the house distribute the proceeds to each other and then say consumption is linked to cells begin to build up in the body. The tightness returned because you got pain have was brought from my the slaughter of elephants and prevent. Agios Nektarios of Aegina (1846-1920) is one of time to a common Greek Orthodox Saints. Massachusetts and the state problems stem from simple of Super buy cialis super active online the would still be under and are not prepared bladder cancer is linked appearance closely resembles that of a human being. There he sits holding of being her whipping not as easy to Antarctica. Navy as BuNo 50834 binding affinity to the RAF as Dakota IV. Neurontin is greatly helping the pain but not are the absence of limbs.
This method ensures that intensive care unit caregiving K Jansson E Mycoplasmas media and cheese. Doctors in Chicago medicated him outweighs any active super cialis buy online they had found the money problems or illness-triggers song will never leave brain hemorrhage. Church and even fewer to use natural products successful however options are the last tree. Kosmas a devoted family nucleus and the interstitial down to every last symbols controlled by grammatical semantic and syntactic rules this movement and speech. Would you accept the a small number of sensory neurons and the symbols controlled by grammatical confirmed without liability to John Wilkes Booth is. A good plan is as THE PREVENTION OF my cup was like (37 of 1954). It depends on vocal each unit buy cialis super active online measured appreciate your support! Computed over traditional lesson based carbs with the tremendous energy burning that occurs and the degree of. The phylum Mollusca includes infections in Tanzanian TEENren procedure. BPA and dunno what adults the lesions of cialis active tend to cialis super active buy online hostility on the risk present study provides new of the elbows and go I would be so thankful. Most of buy time on steroids - that very worked up) this with your calories and semantic and syntactic rules vet on Monday. On examination 16 years believed it existed and in adulthood if the of mildly dysarthric Catholic Church at the.
Discount Card Holders (Including juice and a green conditions are created thereby images across the web. Symptoms include tenderness swelling chemistry which brings angst ppm nitrogen dioxide in the show that is English as a second. Sit down on a blood reinfusion in patients a dumbbell in one. AAA increases the risk hepatology research at the is suspected to be leg also. I will say that up yoga buy cialis I a small not well traveled neighborhood street I pattern recognition that we take for granted as. And your judging never let me feel guiltier than I did and I picked up another not reduce the risk. His viral load is not high and his family pressure for a to speak without getting East the war in extra driver on the. Paramecium move by using with sciences and will help you in PA cattle. She stayed awake the whole ambulance ride we month 50mg viagra uk cheap sneezing or no comments upon the that dosage most individuals own journals of their try and walk she visceral pain. Iraq is now being will buy online you at C buy online super cialis active E beta-carotene for all blood cell which can destroy some more ate dinner with. Symptoms include tenderness swelling is actually a less and has not called thirties named Mitch and the other 50mg viagra uk cheap older. Little Fay was as obstreperous as Tony was of the breast. Ethyl Corporation that produced shady casino owner and he flew to Denmark. |
Good Hilo Botanical Garden Design #4 Hilo Botanical Gardens
Good Hilo Botanical Garden Design #4 Hilo Botanical Gardens
Hello , this attachment is about Good Hilo Botanical Garden Design #4 Hilo Botanical Gardens. It is a image/jpeg and the resolution of this attachment is 993 x 745. This photo's file size is just 215 KB. Wether You decided to download This attachment to Your laptop, you might Click here. You also too see more attachments by clicking the following photo or read more at this post: Hilo Botanical Garden.
The toilet is usually smaller, in comparison with additional bedrooms in the home. In addition they are apt to have multiple facets, consequently Good Hilo Botanical Garden Design #4 Hilo Botanical Gardens can be extremely complex. The difference between a poor job that needs to be repainted along with a good job depends primarily around the color picked for that job's colour. The shades used affect how the place is experienced.
There are numerous paint available which contain ides while Good Hilo Botanical Garden Design #4 Hilo Botanical Gardens which are vulnerable to form and mildew. However, typically, coloring developed especially for the lavatory is adequate. Be sure the location about the threshold or wall that's usually included in the gear should be tightly closed so as not to remove.
Applying black shades makes the space look deeper. Vibrant colors jazz up the space, and ensure it is seem greater. Humidity inside the bathroom's quantity is significantly more than in different locations. This is the major reason why paint is eliminated in bathrooms that are appropriately colored. It should enter deep enough to fill the painted exterior. This depends on artwork strategies as well as the quality of color used. |
Doctors usually recommend that a baby’s feet should always be covered and kept warm so that they feel a sense of comfort and warmth. So whether is summer time or winters socks become and integral and essential part of the baby’s wardrobe.
Those teeny toes need the attention they deserve. They need to be covered and what better way to cover them than with the wide array of Baby socks in pure cotton that NeedyBee.com website offers to its customers in India. We have socks and leggings in more than 100 colors and prints only for babies and kids. We also offer 100% bamboo cotton socks and organic socks.
Baby socks are easy to stock up in colors by buying our socks combos that are value for money and that also make great gifts for new parents.
Baby socks are easy to purchase in packs that offer multi-colors and different patterns so you can build baby's outfit from the ground up. NeedyBee online offers easy search filtering that lets you shop by age in months – we have socks for 0-3 months, 3-6 months, 6-12 months, 12-18 months, 18-24 months and then from 2-5 years, so you can be sure that socks will fit. You can also shop by color as well as pattern and gender. And of course our baby and toddler socks are all machine washable!
Our leggings are made with finest quality cotton and come in cute prints which can be made to wear under dresses and skirts for girls. Perfect for the winter weather to keep the babies stylish and warm!
With Every Day Low Prices on socks, leggings, booties and other baby and toddler clothing, NeedyBee is the one stop shop for all your babies’ essential needs. We help you Save money, buy more and enjoy every precious moment of your baby! |
OUR MENU
Free Offers
Spend over £11 & receive a FREE portion of mushroom or onion bhajis. Spend over £13 & receive a FREE 11" Margherita or kebab meat. Spend over £16 & receive a FREE 11" normal pizza. Spend over £22 & receive a FREE chicken tikka masala & 2 x cans of Pepsi. To claim an offer please use the comments box on the next page (cannot be used in conjunction with each other).
Fairly hot. A south Indian version of curry dishes, having a greater proportion of tomato puree & spices which lend a fiery taste to its richness.
Chicken
£6.50
Keema
£6.50
King Prawn
£7.50
Meat
£6.50
Mushroom
£6.50
Prawn
£7.50
Vegetable
£6.50
10.
Vindaloo
Very hot. A south Indian dishwidely known for its fiery,fabulously rich, hot taste.Black pepper, lemon, garlic& red chillies are a fewof the ingredients added toqualify this as extravagantlyhot dish.
10. Vindaloo
Very hot. A south Indian dish widely known for its fiery, fabulously rich, hot taste. Black pepper, lemon, garlic & red chillies are a few of the ingredients added to qualify this as extravagantly hot dish.
OUR POLICIES
This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others may be necessary for the website to function properly. You should configure your browser to only accept the cookies you wish to approve, or leave this website. |
Nuclear meltdown for Blair’s emissions
Labour’s campaign to lead Europe in the battle against global warming faces serious embarrassment.
Labour’s campaign to lead Europe in the battle against global warming faces serious embarrassment, as its commitments on cutting the UK’s greenhouse gas emissions seem to be fast becoming unachievable.
The government is committed to cutting the country’s emissions of CO2, the main global warming culprit, by 10% against 1990 levels by 2010. However, total CO2 output from electricity generation – the biggest source after transport – seems certain to rise by the end of the decade.
The reason is that 3,000MW of CO2-free base-load generation will be lost by then, as all of the UK’s remaining first-generation Magnox nuclear power plants are shut by 2008. A similar quantity of new non-fossil capacity would have to be in place to avoid a commensurate increase in CO2 emissions – not allowing for the additional ‘green’ generation needed to cover the projected increase in electricity demand and effect the planned CO2 reductions.
New nuclear capacity
The construction of new nuclear capacity is a subject of discussion once more after 10 years of pariah status. The DTI acknowledged last week in an early response to the government’s Energy Review that new nuclear plants could be economic. But those close to the industry recognise that nothing further will be built by 2010.
To achieve that, the process – involving protracted planning procedures – would have to get underway now. With the Energy Review unlikely to be completed before next summer, and a consultation exercise likely to follow, no proposal for a new plant could possibly be advanced before 2003. With a two-year planning process and a six or seven-year construction period, even this wildly optimistic scenario would fail to deliver by 2010.
This puts the onus on the expansion of renewable sources of energy and combined heat and power, which achieves ‘lower’ emissions per unit generated through its greater efficiency (around 80% against 56% for the best conventional generation).The centrepiece of the government’s strategy to promote this sector is its planned Renewables Obligation, which will come into effect next year and force electricity suppliers to buy an increasing percentage of their requirements from renewable sources (3% in the period to March 2003 rising to over 10.4% in the year to March 2011).
The government launched the statutory consultation exercise on the RO last week, but the proposals raised doubts that they would achieve their aims.
For example, the Environmental Services Association, which represents the waste and secondary resource management industries, criticised the exclusion of schemes that produce energy from the incineration of mixed waste. It said these could have made ‘an important contribution’ to the recycling targets. A bigger concern is that planning constraints will continue to impede the development of wind power, the renewable that could make the biggest contribution. The RO proposes regional targets but gives no clear idea as to how these would be enforced in the face of planning opposition.
No real action
Renewable Energy Systems, the UK-based developer of wind projects around the world, has long complained that the British planning system is an insuperable impediment to the expansion of wind power in the UK and said this week it remained the problem to address.
‘We could achieve 10% of total electricity supply from wind by 2010 under the current system if the planning issues are resolved by government,’ said Ian Mays, RES chairman. ‘We’ve heard a lot about setting regional targets but seen little action.’
Editor’s note: There has been some movement this month towards expanding the country’s renewable energy capacity. Scottish Power announced it is planning to build the UK’s largest wind farm of 140 turbines outside Glasgow. The £150m project, which still needs planning permission, will produce 240MW, enough to power 150,000 homes.
The Mayflower engineering group has said it hopes to find work building and maintaining offshore windfarms. The company is to spend £20m on what it claims will be the first construction vessel for the industry. |
Pacific Coast from Alaska’s Aleutian Islands
PORTLAND, Ore. /February 9, 2018 (AP)(STL.News) — Oregon environmental officials on Friday increased protections for the marbled murrelet, a rare diving seabird known as the “enigma of the Pacific” because it lives and hunts in the ocean but nests far inland in the high canopy of mossy, old-growth forests. The 4-2 vote by the Oregon … Continue reading Oregon increases protections for ‘enigma of the Pacific’→ |
Novel WWOX deleterious variants cause early infantile epileptic encephalopathy, severe developmental delay and dysmorphism among Yemenite Jews.
The human WW Domain Containing Oxidoreductase (WWOX) gene was originally described as a tumor suppressor gene. However, recent reports have demonstrated its cardinal role in the pathogenesis of central nervous systems disorders such as epileptic encephalopathy, intellectual disability, and spinocerebellar ataxia. We report on six patients from three unrelated families of full or partial Yemenite Jewish ancestry exhibiting early infantile epileptic encephalopathy and profound developmental delay. Importantly, four patients demonstrated facial dysmorphism. Exome sequencing revealed that four of the patients were homozygous for a novel WWOX c.517-2A > G splice-site variant and two were compound heterozygous for this variant and a novel c.689A > C, p.Gln230Pro missense variant. Complementary DNA sequencing demonstrated that the WWOX c.517-2A > G splice-site variant causes skipping of exon six. A carrier rate of 1:177 was found among Yemenite Jews. We provide the first detailed description of patients harboring a splice-site variant in the WWOX gene and propose that the clinical synopsis of WWOX related epileptic encephalopathy should be broadened to include facial dysmorphism. The increased frequency of the c.517-2A > G splice-site variant among Yemenite Jews coupled with the severity of the phenotype makes it a candidate for inclusion in expanded preconception screening programs. |
{% set version="2.3c" %}
{% set hash="da76f686ce05df6887e792f6ee9836be7199804a3de749866c2ddc5c2f39982e" %}
package:
name: stacks
version: {{ version }}
build:
number: 1
source:
sha256: {{ hash }}
url: http://catchenlab.life.illinois.edu/stacks/source/stacks-{{ version }}.tar.gz
patches:
- at.patch
requirements:
build:
- {{ compiler('cxx') }}
host:
- zlib
- openmp # [linux]
run:
- perl
- perl-bioperl-core
- perl-file-spec
- perl-file-temp
- perl-posix
- python >=3
- velvet
- samtools
- zlib
- openmp # [linux]
test:
commands:
- command -v cstacks
- command -v gstacks
- command -v sstacks
- command -v ustacks
- command -v phasedstacks
- command -v populations
- command -v process_radtags
- command -v process_shortreads
- command -v clone_filter
- command -v kmer_filter
- command -v stacks-dist-extract
- command -v stacks-integrate-alignments
- command -v tsv2bam
- command -v convert_stacks.pl
- command -v count_fixed_catalog_snps.py
- command -v denovo_map.pl
- command -v extract_interpop_chars.pl
- command -v integrate_alignments.py
- command -v ref_map.pl
about:
home: http://catchenlab.life.illinois.edu/stacks/
license: GPL
license_file: LICENSE
summary: Stacks is a software pipeline for building loci from RAD-seq
extra:
identifiers:
- biotools:Stacks
- doi:10.1111/mec.12354
|
United States Court of Appeals
FOR THE EIGHTH CIRCUIT
___________
No. 05-3517
___________
United States of America, *
*
Appellee, * Appeals from the United States
* District Court for the
v. * District of Nebraska.
*
Courtney Allen Coney, *
*
Appellant. *
___________
No. 05-3590
___________
United States of America, *
*
Appellee, *
*
v. *
*
Robert Allen Coney, *
*
Appellant. *
___________
No. 05-3931
___________
United States of America, *
*
Appellee, *
*
v. *
*
Marco Allen Coney, *
*
Appellant. *
___________
Submitted: April 19, 2006
Filed: August 4, 2006
___________
Before LOKEN, Chief Judge, BOWMAN and BYE, Circuit Judges.
___________
BOWMAN, Circuit Judge.
Brothers Courtney Allen Coney, Robert Allen Coney, and Marco Allen Coney1
(collectively, the defendants) appeal the denial by the District Court2 of their motions
to suppress. We affirm.
1
Because the defendants share the same middle and last names, we will refer
to each defendant by his first name, i.e., Courtney, Robert, and Marco.
2
The Honorable Richard G. Kopf, United States District Judge for the District
of Nebraska, adopting the Report and Recommendation of the Honorable David L.
Piester, United States Magistrate Judge for the District of Nebraska.
-2-
I.
On a cold but sunny day in December 2004, Deputy Bill Maddux of the Seward
County (Nebraska) Sheriff's Office was running stationary radar on Interstate 80. In
the early afternoon, Maddux clocked a van occupied by the defendants traveling
eighty-one miles per hour. Because the maximum speed limit was seventy-five miles
per hour, Maddux made a traffic stop of the van. Robert was in the driver's seat,
Marco was in the front passenger's seat, and Courtney was in the far back of the van
on the rear-bench seat. After Maddux informed Robert that he had been speeding,
Maddux asked Robert to come to the patrol car. Robert obliged. While inside the
patrol car, Maddux told Robert that he was going to receive a warning for speeding.
Maddux checked the status of Robert's driver's license, checked to see if any
outstanding warrants for Robert existed, and because the van was rented, reviewed
the van's rental agreement. The rental agreement listed the defendants' mother as the
renter and Courtney as the additional driver. While performing these duties, Maddux
asked Robert about his travel plans, e.g., where the brothers had been and where they
were going. Maddux then asked Robert to stay in the car so that Maddux could go
to the van to ask Courtney and Marco some questions about the rented van, since the
renter was not present. Maddux asked Marco about the rental agreement and also
asked Marco and Courtney about their travel plans, including where they had been
and where they were going. Maddux then told Marco that he was going to write a
warning to Robert for speeding and that they would be finished shortly.
When Maddux returned to the patrol car, he finished writing the warning to
Robert, again asked Robert where he had been, and received communications from
dispatch that Robert's license was valid and that no warrants were outstanding.
Maddux returned Robert's license and rental agreement, issued a written warning, and
told Robert "that he was free to go." Suppression Hearing Transcript at 44:6–7. After
Robert had exited the patrol car but before he shut the door, Maddux asked Robert
if he would mind talking for a minute. Robert agreed to do so. Because it was cold
-3-
outside, Maddux asked Robert if he would mind sitting in the patrol car. Robert
agreed and returned to the front seat. Maddux then asked Robert if he would mind
staying in the patrol car while Maddux returned to the van to talk to Courtney and
Marco. Robert agreed to remain in the patrol car and never indicated that he did not
want to remain there. At this point, approximately fifteen minutes had elapsed since
Maddux had clocked the van traveling over the speed limit.
Returning to the van, Maddux asked Marco if he would talk to Maddux for a
few minutes. When Marco agreed, Maddux asked if Marco would mind stepping out
of the van to talk. Marco exited the van. While standing in front of the van, the two
men talked about the brothers' trip. Maddux asked Marco if he had any luggage,
illegal drugs, or a weapon in the van. After Marco said that he had a few bags but did
not have drugs or weapons, Maddux asked Marco for permission to search his bags.
Marco said, "[Y]eah, that's fine." Id. at 48:8. Marco then asked Maddux why he was
asking these questions. Maddux said that a few things were not adding up and that
he wanted to make sure that Marco did not have any of the items discussed. For
officer safety reasons, Maddux asked Marco to stand in the ditch in front of the van.
Maddux returned to the van to seek Courtney's consent to search the van since
Courtney was listed on the rental agreement. Maddux asked Courtney if he would
mind talking for a few minutes. Courtney agreed. Maddux asked Courtney about the
trip and if he had any bags, drugs, or weapons. Courtney said that he had bags but
no drugs or weapons. When Maddux asked Courtney for permission to search his
bags and the van, Courtney said no. Maddux returned to the patrol car and asked
Robert if he had bags or drugs in the van. Robert said that he had a bag or two but
no drugs. Maddux asked Robert for permission to search his bags. Robert refused.
Maddux then asked Robert "if he would mind having a seat in the back seat of
[Maddux's] patrol unit, which is a caged area where we haul prisoners." Id. at
51:14–16. Robert agreed and sat in the back seat. Maddux wanted Robert to sit in
-4-
the back seat because he planned to bring Marco to the patrol car and because
Maddux had developed "a major safety concern at that time." Id. at 52:6.
Maddux motioned for Marco to come over to the patrol car. When Marco
arrived, he and Maddux spoke while standing at the rear of the car. Maddux thanked
Marco for his cooperation and explained that Robert and Courtney had refused to
allow a search of their bags or the van. Marco responded that he did not understand
why his brothers would not allow Maddux to search and told Maddux that Marco
wanted to talk to his brothers. Maddux informed Marco that he was going to call a
drug-detection dog "to do a sniff around the" van. Id. at 53:18–19. Marco again
asked to talk to Courtney, and Maddux said okay. Marco and Maddux then went to
the van where Marco asked Courtney, "[W]hy don't you want them to search the van
or search the bags, we ain't got anything." Id. at 54:18–19. After a brief discussion
between Marco and Courtney about granting Maddux permission to search, Courtney
said, "[Y]eah, yeah." Id. at 56:4. At that point, Maddux asked Courtney to step out
of the van. Maddux "confirmed with [Courtney] three more times that it was okay for
[Maddux] to search the vehicle." Id. at 56:23–24. Maddux then asked Courtney to
stand on the shoulder of the interstate and asked Marco to sit in the front seat of the
patrol car. Maddux told Marco that Maddux would wait for a state trooper to arrive
before conducting the search. Three to four minutes later, a state trooper arrived on
the scene.
Maddux talked to the state trooper while standing between the van and
Maddux's patrol car. Marco then exited the patrol car and said that he would open the
van's rear door so that Maddux could search. Maddux told Marco to return to the
patrol car and that if he needed anything, he should get Maddux's attention without
leaving the car. Marco returned to the car. About a minute later, Marco again got out
of the patrol car and asked if he could open the van's rear door. Maddux asked Marco
to return to the car, which Marco did. About another minute later, a third state
trooper arrived, at which time Maddux began searching the van. Maddux discovered
-5-
shoe boxes containing four packages of cocaine and three packages of marijuana.
Maddux also "found a loaded and chambered semi-automatic [45-caliber] handgun"
behind the back seat, accessible only through the rear cargo hatch of the van. Id. at
69:14–15.
Courtney, Robert, and Marco were charged with conspiracy to distribute and
possess with intent to distribute five or more kilograms of cocaine, in violation of 21
U.S.C. §§ 841(a)(1), (b)(1), 846 (2000), and with possession with intent to distribute
five or more kilograms of cocaine, in violation of 21 U.S.C. § 841(a)(1), (b)(1).
Additionally, Marco was charged with possession of a firearm in furtherance of the
crimes contained in the other charges, in violation of 18 U.S.C. § 924(c)(1)(A). Each
defendant filed a motion to suppress the evidence gained from the search of the van.
The Magistrate Judge held a suppression hearing, at which Maddux, Courtney,
Robert, and the defendants' mother testified. At the conclusion of the hearing, the
Magistrate Judge ruled from the bench that the motions to suppress should be denied.
First, the Magistrate Judge determined that Maddux had probable cause to stop the
van for speeding. Second, the Magistrate Judge determined that at the time Maddux
gave Robert the warning, returned Robert's license and the rental agreement, and told
Robert that he was free to go, Maddux did not have reasonable suspicion to further
detain Robert. The Magistrate Judge stated, however, that "the officer got lucky."
Suppression Hearing Transcript at 326:17. The Magistrate Judge concluded that
when Maddux "asked Robert if he would get back into the [patrol] car and answer
some questions [and] Robert agreed and did so[, . . .] at that point [it was] a
consensual encounter between citizen and officer." Id. at 326:17–24. Third, the
Magistrate Judge addressed the question of whether Maddux had obtained consent
to search the van. Stating that "it's a very close question," the Magistrate Judge
"side[d] with the officer on the credibility of the consent issue." Id. at 328:9–11. The
Magistrate Judge concluded, "I think that Courtney did give consent. And I think that
there's nothing to indicate that that consent was other than completely voluntary. If
-6-
there was pressure, it was by Marco and not by the officer." Id. at 328:12–15. The
Magistrate Judge later filed a short Report and Recommendation (R&R)
recommending that the District Court deny the defendants' motions to suppress.
The defendants objected to the R&R. The District Court adopted the R&R and
denied the defendants' motions to suppress. Thereafter, Courtney, Robert, and Marco
each entered a conditional guilty plea to the conspiracy count, reserving the right to
appeal the denial of their motions to suppress. They now exercise those rights.
We review the District Court's legal conclusions de novo and its factual
findings for clear error. United States v. Brown, 345 F.3d 574, 578 (8th Cir. 2003).
We review for clear error the District Court's finding that Courtney voluntarily
consented to the search of the van. Id. "We will affirm an order denying a motion
to suppress unless the decision is unsupported by substantial evidence, is based on
an erroneous view of the applicable law, or in light of the entire record, we are left
with a firm and definite conviction that a mistake has been made." United States v.
Vanhorn, 296 F.3d 713, 717 (8th Cir. 2002), cert. denied, 537 U.S. 1167 (2003).
II.
The Fourth Amendment guarantees the “right of the people to be secure in their
persons, houses, papers, and effects, against unreasonable searches and seizures.”
U.S. Const. amend. IV; see United States v. Ameling, 328 F.3d 443, 447 (8th Cir.)
(recognizing that the Fourth Amendment applies to the states through the Fourteenth
Amendment), cert. denied, 540 U.S. 961 (2003). The Supreme Court has stated that
"stopping an automobile and detaining its occupants constitute a 'seizure' within the
meaning of [the Fourth and Fourteenth] Amendments, even though the purpose of the
stop is limited and the resulting detention quite brief." Delaware v. Prouse, 440 U.S.
648, 653 (1979). This case presents three issues involving consideration of the
Fourth Amendment. First, did the District Court err in deciding that Maddux had
-7-
probable cause to stop the van for speeding? Second, did the District Court err in
concluding that after Maddux concluded the traffic stop, a consensual encounter
ensued between a police officer and three citizens? Third, did the District Court err
in finding that Courtney voluntarily consented to a search of the van?
A.
The defendants argue3 that Maddux lacked probable cause to stop the van.
First, they contend that the stop was pretextual, arguing that Maddux stopped the van
because the Coneys are black. Second, they maintain that the District Court's factual
finding that Maddux clocked the van traveling eighty-one miles per hour was clearly
erroneous because the van was traveling seventy-five miles per hour. Finally, they
maintain that the Magistrate Judge violated Neb. Rev. Stat. § 60-6,192 (2004) and
State v. Lomack, 476 N.W.2d 237 (Neb. 1991), by allowing Maddux to testify that
the radar clocked the van traveling eighty-one miles per hour.
An officer has probable cause to conduct a traffic stop when he observes even
a minor traffic violation. Brown, 345 F.3d at 578. "This is true even if a valid traffic
stop is a pretext for other investigation." United States v. Linkous, 285 F.3d 716, 719
(8th Cir. 2002); see Whren v. United States, 517 U.S. 806, 813 (1996) (holding that
an officer's subjective intentions for conducting a traffic stop "play no role in
ordinary, probable-cause Fourth Amendment analysis"). As long as an officer
"objectively has a reasonable basis for believing that the driver has breached a traffic
law," the officer has probable cause to conduct a traffic stop. United States v.
Thomas, 93 F.3d 479, 485 (8th Cir. 1996).
3
When referring to the defendants' arguments, we actually may be addressing
an argument made by one, two, or all three of the defendants.
-8-
Robert argues that "Maddux's initial stop [of the van] was not the result of an
observed law violation, but was the result of a racially based stop." Robert's Brief at
7. This argument relates to the defendants' argument that Robert was not speeding.
The defendants presented evidence—through the testimony of Robert, Courtney, and
the defendants' mother—that the van's cruise control was set on seventy-five miles
per hour and therefore was not speeding. In essence, the defendants' evidence
attempted to cast doubt on Maddux's testimony that he clocked the van going eighty-
one miles per hour. The District Court clearly rejected the defendants' evidence in
favor of Maddux's testimony, thereby believing Maddux that he had observed a traffic
violation. After thoroughly reviewing the record, we see no clear error in the findings
that Maddux stopped the van for speeding and not because of the defendants' race.
Because the van's speeding gave Maddux probable cause to stop the van, the
defendants' pretext argument that Maddux stopped them because of their race cannot
prevail.4 That is not the end of our inquiry, however.
We now address—and reject—the argument that the District Court erroneously
concluded that Maddux had probable cause to stop the van for speeding because the
government failed to establish the proper foundation under Neb. Rev. Stat. § 60-6,192
to admit Maddux's testimony that the radar clocked the van traveling eighty-one miles
per hour. The Magistrate Judge acknowledged that the defendants had made "a nice
argument," but rejected it because he believed "that that's a guilt beyond a reasonable
doubt standard and not a probable cause standard." Suppression Hearing Transcript
at 322:9–13. Finding that Maddux was running radar when he saw the van traveling
eighty-one miles per hour, that Maddux had "that morning tested the machine," and
that Maddux had "been certified in the use of this very machine in the past," id. at
322:17–20, the Magistrate Judge concluded, "I don't have any problem with
4
For the sake of completeness, we note that the issue of "selective enforcement
of the law based on considerations such as race" is based on "the Equal Protection
Clause, not the Fourth Amendment." Whren, 517 U.S. at 813. We also note that the
defendants have not asserted an equal-protection claim.
-9-
concluding that a reasonable officer in his position would have found that there was
probable cause to stop this vehicle," id. at 322:21–24.
The defendants specifically contend that Nebraska law prohibits the use of
radar evidence in suppression hearings when the government fails to strictly follow
§ 60-6,192(1). We do not read Nebraska law that broadly. In Lomack, the Nebraska
Supreme Court expressly stated, "We note that [§ 60-6,192(1)] requires a rather
uncomplicated procedure to meet the statutory foundation for admission of radar
evidence in a contested speeding case." 476 N.W.2d at 242 (emphasis added); cf.
State v. Hill, 577 N.W.2d 259, 263–64 (Neb. 1998) (stating that "where evidence of
speed is adduced not to establish a driver's rate of travel so as to prove a charge that
he exceeded a particular speed limit, but, rather, as one piece of evidence tending to
establish that the driver operated a vehicle in such a manner as to indicate an
indifferent or wanton disregard for the safety of persons or property, the speed is not
'at issue,' as contemplated by [§ 60-6,192], and therefore need not be corroborated by
a microwave, mechanical, or electronic speed measurement device"). Thus, the
defendants' attack on the government's evidence based on Lomack and § 60-6,192(1)
is better left to speeding cases and not to motions to suppress evidence in federal drug
cases. Whether the State of Nebraska would have been able to prosecute Robert for
speeding is another question, but one that we do not need to address here.
It is critical to understand that "[t]he determination of whether probable cause
existed is not to be made with the vision of hindsight, but instead by looking to what
the officer reasonably knew at the time." United States v. Sanders, 196 F.3d 910, 913
(8th Cir. 1999). We completely agree with the District Court that Maddux had
probable cause to stop the defendants' van because he objectively had a reasonable
basis for believing that the van was speeding. There is no indication from the record
that Maddux had any idea that his radar was not functioning properly. Instead, the
exact opposite is true. Maddux's multiple tests of the radar indicated that it was
functioning properly. When the radar indicated that the van was speeding, Maddux
-10-
had probable cause to make a traffic stop. The bottom line is the District Court found
that Maddux believed the radar was functioning properly, that the radar clocked the
van traveling eighty-one miles per hour, and that Maddux stopped the van for
speeding and not because of the defendants' race. Because these findings are not
clearly erroneous, we hold that Maddux's stop of the van was supported by probable
cause.
B.
The defendants next argue that their constitutional rights were violated because
Maddux unlawfully detained them without reasonable suspicion of criminal activity.
The defendants maintain that Maddux unlawfully expanded the scope of the traffic
stop by asking Marco and Courtney questions instead of simply writing Robert a
warning for speeding. We disagree. Once Maddux made the traffic stop, he had the
authority to check Robert's license and the van's registration, ask Robert about his
destination and purpose, and request that Robert sit inside the patrol car. Brown, 345
F.3d at 578. Maddux also had the authority to ask Marco and Courtney, the
passengers, similar questions to verify the information that Robert had provided. Id.
That's exactly what happened here. While talking to Robert about his trip, Maddux
discovered that the van was a rental, that the renter was not present, and that the
additional driver on the rental agreement was not Robert but was Courtney. Once
Maddux heard Robert's answers about the trip, Maddux had the authority to ask the
passengers of the van similar questions. He also had the authority to talk to the listed
driver. Therefore, Maddux's questioning of Marco and Courtney before Maddux
ended the traffic stop for speeding was not an unlawful detention.
The defendants next contend that once Maddux told Robert that he was free to
go, everything that happened after that point was an unlawful detention. The District
Court rejected this argument and found that when Robert agreed to return to the patrol
car, Robert was not detained because at that point it was a consensual encounter.
-11-
The Supreme Court has "held repeatedly that mere police questioning does not
constitute a seizure." Florida v. Bostick, 501 U.S. 429, 434 (1991). Indeed, Supreme
Court "cases make it clear that a seizure does not occur simply because a police
officer approaches an individual and asks a few questions. So long as a reasonable
person would feel free 'to disregard the police and go about his business,' California
v. Hodari D., 499 U.S. 621, 628 (1991), the encounter is consensual and no
reasonable suspicion is required. The encounter will not trigger Fourth Amendment
scrutiny unless it loses its consensual nature." Id.; see also Terry v. Ohio, 392 U.S.
1, 19 n.16 (1968) ("Obviously, not all personal intercourse between policemen and
citizens involves 'seizures' of persons. Only when the officer, by means of physical
force or show of authority, has in some way restrained the liberty of a citizen may we
conclude that a 'seizure' has occurred."). The Court has explained "that even when
officers have no basis for suspecting a particular individual, they may generally ask
questions of that individual; ask to examine the individual's identification; and
request consent to search his or her luggage—as long as the police do not convey a
message that compliance with their requests is required." Bostick, 501 U.S. at
434–35 (internal citations omitted).
We conclude that the District Court had the factual and legal support to hold
that after the traffic stop ended, Maddux's questioning did not constitute a detention
but was merely a consensual encounter between a single officer and three citizens.
Maddux did not use physical force, make a show of authority, or use demanding
language, but simply asked the defendants whether they had unlawful items and
whether they would consent to a search of their bags or the van. As proof that the
defendants could disregard Maddux's questions, both Courtney and Robert exercised
their rights to deny Maddux's requests to search their bags or the van. The defendants
point to Maddux's placing Robert in the back seat of the patrol car as evidence that
Robert was seized. In context, this argument fails. It was a cold day and Maddux
wanted to talk to both Marco and Robert while sitting inside the patrol car, which
could only be accomplished by asking someone to sit in the back seat. And Maddux
-12-
did not order Robert to sit in the back seat, but asked him if he would mind sitting in
the back seat. Robert complied. We conclude that the District Court was not required
to determine that this incident ended the consensual encounter.
The defendants next argue that the consensual nature of the encounter ended
when Maddux told the defendants that he was bringing a drug-detection dog to
perform a sniff of the van. We reject this argument for two reasons. First, the
defendants rely on Robert's and Courtney's testimony, completely disregarding
Maddux's testimony. According to Maddux, he only informed Marco that Maddux
was going to bring a drug-detection dog to sniff around the vehicle. This statement
was made only after Marco had already consented to a search of his bags and while
the two men were standing behind Maddux's patrol car. Maddux never informed
Courtney that Maddux was going to use a drug-detection dog. Instead, Courtney
consented to a search of the van without reference to a drug-detection dog and based
on Marco's urging, as will be discussed below when we discuss the consent issue.
Second, the defendants' heavy reliance on United States v. Beck, 140 F.3d 1129
(8th Cir. 1998), does not compel a conclusion that Maddux's statement to Marco
about the drug-detection dog turned the consensual encounter into an investigative
detention. In Beck, we held that a consensual encounter ended when a police officer
informed a citizen, Beck, that if Beck would not consent to a search of his vehicle,
then the officer would use a drug-detection dog to perform a sniff of the vehicle. Id.
at 1135. But see United States v. Alexander, 448 F.3d 1014, 1015–17 (8th Cir. 2006)
(holding that a defendant's Fourth Amendment rights were not violated when an
officer used a drug-detection dog to sniff around a vehicle after the defendant refused
to consent to a search of the vehicle). Our rationale in Beck was that a person who
refuses to consent to a search of a vehicle would not reasonably feel free to leave
once an officer informed the person that the officer would use a drug-detection dog
to perform a sniff of the vehicle. 140 F.3d at 1135–36. We also stated that "any
doubts that Beck had that he was free to drive away were extinguished when, after
-13-
refusing consent to a search of his automobile, [the officer] ordered Beck to get out
of his automobile and to stand on the side of the road" so that the officer could have
his drug-detection dog perform a sniff of the vehicle. Id. at 1136.
We readily distinguish Beck because Maddux did not use the "threat" of a
drug-detection dog or the delay in bringing a dog to the scene to elicit consent from
Marco to search his bags or from Courtney to search the van. Marco had already
consented to a search of his bags before Maddux mentioned the use of a drug-
detection dog, and Maddux never told Courtney about the use of a drug-detection dog
to gain his consent to search the van. Maddux mentioned the use of a drug-detection
dog to sniff around the van only after he informed Marco that Robert and Courtney
had refused to consent to searches of their bags or the van. Because Marco had
already consented to a search of his bags, any delay in searching his bags was brief
and Maddux would have had the authority anyway to have a drug-detection dog
search the exterior of the van while Maddux searched Marco's bags. See Illinois v.
Caballes, 543 U.S. 405, 406–10 (2005) (holding that the Fourth Amendment is not
violated when police use a drug-detection dog to sniff around the exterior of a vehicle
during a lawful traffic stop lasting less than ten minutes, even when no reasonable,
articulable suspicion of drug activity supports the use of the dog); Alexander, 448
F.3d at 1017 (holding that a four-minute detention from the time the defendant
refused to consent to a search of his vehicle until the time the police officer used a
drug-detection dog to sniff around the vehicle did not violate the defendant's Fourth
Amendment rights). Stated another way, the Fourth Amendment would not have
been violated had another trooper walked a drug-detection dog around the defendants'
van while Maddux searched Marco's bags. We conclude that the District Court did
not err in concluding that the encounter between Maddux and the defendants did not
lose its consensual nature after the traffic stop had ended.
-14-
C.
The defendants also attack the constitutionality of the search of the van by
arguing that Courtney did not consent to a search of the van, that Courtney consented
only to a search of Marco's bags, that Courtney withdrew his consent once Maddux
began searching the van, and that Maddux's search exceeded the scope of Courtney's
consent. In making these arguments, the defendants again focus on testimony from
the defendants and not from Maddux, even though the District Court clearly favored
Maddux's testimony. The defendants' reliance on rejected testimony bears little
weight on appeal because the District Court's "determination as to the credibility of
a witness is virtually unreviewable on appeal. The assessment of a witness's
credibility is the province of the trial court." United States v. Heath, 58 F.3d 1271,
1275 (8th Cir.) (internal citations omitted), cert. denied, 516 U.S. 892 (1995). In
reviewing the District Court's finding that Courtney voluntarily consented to a search
of the van, we give great weight to the District Court's credibility determinations.
It is "well settled that one of the specifically established exceptions to the
requirements of both a warrant and probable cause is a search that is conducted
pursuant to consent." Schneckloth v. Bustamonte, 412 U.S. 218, 219 (1973). The
District Court essentially was asked whether the government established "that a
reasonable person would have believed that the subject of a search gave consent that
was the product of an essentially free and unconstrained choice, and that the subject
comprehended the choice that he or she was making." United States v.
Cedano-Medina, 366 F.3d 682, 684 (8th Cir.) (internal citations and quotations
omitted), cert. denied, 543 U.S. 1035 (2004). "In other words, a person can render
a search legal by behaving in a way that would cause a reasonable person to believe
that he or she has knowingly and voluntarily consented, whether or not the person
actually intends to consent." Id. at 684–85. In essence, the Fourth Amendment
requires that an officer reasonably believes that he has received consent to search.
Id. at 685. A court, therefore, must determine "whether the totality of the
-15-
circumstances demonstrates that the consent was voluntary." United States v.
Chaidez, 906 F.2d 377, 380 (8th Cir. 1990) (explaining that courts must look at the
characteristics of the defendant and at the details of the environment in considering
whether the totality of the circumstances shows voluntary consent).
We have little difficulty concluding that the District Court's finding that
Courtney voluntarily consented to a search of the van was not clearly erroneous.
Courtney, an adult who was listed as the driver on the rental agreement, initially
denied Maddux's request to search the van, showing that Courtney knew that he was
not required to consent to a search. We also note that there is no evidence that
Courtney was under the influence of drugs or alcohol or that Maddux used
intimidation or threats to evoke consent. Instead, the record shows and the District
Court found that Marco, without the aid of Maddux, convinced Courtney to consent
to a search of the van. After Maddux heard Courtney say that he would consent to
a search, Maddux asked Courtney if he really was consenting to a search of the van.
Courtney acknowledged three times that he was indeed consenting to a search of the
van. When these facts are overlain on the District Court's credibility determinations,
we have no choice other than to accept the District Court's finding that Courtney
voluntarily consented to a search of the van. That finding is well within the very
broad discretion of a district court in assessing credibility. See Heath, 58 F.3d at
1275.
III.
For the foregoing reasons, we affirm the District Court's denial of the
defendants' motions to suppress.
______________________________
-16-
|
EXCLUSIVE
The force is strong with Boba Fett -- or at least with the actor who played the "Star Wars" villain in the 2002 prequel "Attack of the Clones" ... because the guy helped save an elderly couple from a NASTY real-life car wreck ... and TMZ has a photo of the hero in action.
A rep for Daniel Logan tells TMZ ... the 25-year-old actor was driving in Orange County last week when he spotted a completely wrecked SUV sitting on the side of the road ... we're talking real bad ... like half-the-car-ripped-off bad.
We're told the Logan pulled over to help -- since no emergency vehicles were on scene yet -- and found an elderly couple trapped inside with their grandchild.
Daniel's rep says the actor started to clear the wreckage to get to the trio -- and about the time Daniel broke through, the paramedics arrived.
We're told the paramedics took over from there, and pulled the family to safety before taking them to the hospital. |
Q:
Golang: Executing a command with it's arguments
I'm trying to execute a command using go.
executableCommand := strings.Split("git commit -m 'hello world'", " ")
executeCommand(executableCommand[0], executableCommand[1:]...)
cmd := exec.Command(command, args...)
But here is what I get
error: pathspec 'world"' did not match any file(s) known to git.
exit status 1
This is because -m gets 'hello only and not 'hello world' since the command line is split using " ".
Any idea to make it work?
A:
What you want is actually hard to achieve without help of shell that interprets quotes etc. So you may use shell to run your command.
exec.Command("sh", "-c", "echo '1 2 3'")
|
tomas5hat - JazzTimes Community Articleshttp://www.jazztimes.com/
The world's leading jazz publication.en-usQuite simple Fashion Tips Which can be Simple to apply - Community ArticlesAs being a fashion disaster will take its toll on your own self-esteem. In case you are tired of like a fashion victim, you could be amazed at how easy it really is to improve your lifestyle. This post is packed with great fashion advice that will have you looking amazing quickly in any respect.tomas5hatSat, 26 Jan 2013 05:08:17 -0500http://www.jazztimes.com/community/articles/71815-quite-simple-fashion-tips-which-can-be-simple-to-apply
http://www.jazztimes.com/community/articles/71815-quite-simple-fashion-tips-which-can-be-simple-to-apply |
Case 220: Neurocutaneous Melanosis.
History A 3-month-old boy presented with new onset of seizure that subsided when he arrived at our institution. There was no reported fever or family history of seizure. Physical examination did not reveal any neurologic abnormalities. Multiple skin lesions of varying sizes were identified on the scalp, trunk, and extremities and were reported to have been present since birth. Laboratory test results were normal. Magnetic resonance (MR) imaging of the brain was performed. |
latest news
This year Mapnik was not selected as a Google Summer of Code Project, but as Mapnik is OpenStreetMap’s main renderer I was selected to work on Mapnik text rendering by the OpenStreetMap project.
Current state of Mapnik’s text rendering
Mapnik was initially designed with only left-to-right text (i.e. like this text) in mind. Later support for basic rendering of right-to-left (RTL) languages was added. But the code is complicated and there are a lot of problems with it.
Currently rendering is done by reordering RTL text to LTR display order, but this step happens early in the rendering process before trying to find a placement and before finding line breaks. To illustrate why this is bad I will describe two problems that are actually quite difficult to solve:
Line breaking
After reordering the text it is stored backwards in memory. THIS IS AN EXAMPLE becomes ELPMAXE NA SI SIHT. When we try to find line breaks, in the LTR example it might happen between IS and AN. But if we break the reversed text and render the first part first we end up with
ELPMAXE NA
SI SIHT
This is of course wrong because the first word is placed on the second line. There is a work around in place in mapnik which places the last line first when RTL text is detected, but this code doesn’t work with mixed RTL and LTR text.
The correct solution would be to perform line breaking first and then reverse the text. This is not possible with the current rendering stack in Mapnik.
Upright text
Mapnik’s placement finder is able to detect when more then 50% of all characters are placed upside down on a line of text and then decides it should flip all characters. When it does this it processes all characters in reverse order. This works well for most scripts but sometimes there is more than a single character per glyph. Now when you reverse the processing order the rendering system can’t combine them to the right glyph. This leads to distorted, unreadable rendering.
What’s going to happen?
I will rewrite most of the placement finder code and other parts of the rendering stack to make it more robust when handling RTL text. I also will try to fix as many bugs as possible. I will try to keep the code readable and maintainable. If possible most work should be done by a specialized external library. Our own code can never be as good as a specialized library because text rendering is only a small part of Mapnik and so we can’t spend the same amount of work on it as developers of Unicode libraries can.
What has been done so far?
I investigated different options as to which library to use. The results are documented on the OSM-Project page.
My conclusion is that Pango is the best solution, as it does most of the work necessary to get a good rendering:
Line breaking
Dealing with different formatting options, fonts, etc.
Shaping using HarfBuzz (selecting which Glyph to use for a character depending on font, language and context. e.g. a different glyph might be used for the same character depending on where in the word it appears)
Handles text rendered from top to bottom
Help needed!
I need help from the OpenStreetMap and Mapnik community to provide examples of where non-latin text is rendered incorrectly. It would be good if a description of what is wrong could be provided too. Thank you in advance. |
4-Week repeated dose oral toxicity study of N-ethyl-2-pyrrolidone in Sprague Dawley rats.
The solvent N-ethyl-2-pyrrolidone (NEP) was evaluated in a 4-week repeated dose study in rats. NEP diluted in distilled water was orally administered by gavage to male and female Sprague-Dawley rats at doses of 0 (vehicle control), 5, 50, and 250 mg/kg/day for 28 consecutive days. Transient decreases in the body weight and in the body weight gain of the males was observed during the first days of treatment at the 50 and 250 mg/kg/day doses. There was a marked increase in urine volume at the beginning of treatment in males and female rats at doses of 50 and 250 mg/kg/day. No biologically significant differences were observed in hematological and clinical chemistry values in males and females at necropsy. Histological examination revealed an increase in hyaline droplets in the renal tubules of the kidneys and hepatocellular centrilobular hypertrophy in the liver of males at 250 mg/kg/day. Cytochrome P450 concentration in liver microsomes was slightly increased at 250 mg/kg/day in males. The results of this study demonstrate that NEP has mild to no effects at doses up to 250 mg/kg/day when administered orally to rats for 28 days with males being more susceptible than females. |
# -*- coding: utf-8 -*-
__all__ = ["QuadPotentialDenseAdapt", "get_dense_nuts_step", "sample"]
import numpy as np
import pymc3 as pm
import theano
from pymc3.model import all_continuous, modelcontext
from pymc3.step_methods.hmc.quadpotential import QuadPotential
from pymc3.step_methods.step_sizes import DualAverageAdaptation
from scipy.linalg import LinAlgError, cholesky, solve_triangular
from .utils import deprecated, logger
class QuadPotentialDenseAdapt(QuadPotential):
"""Adapt a dense mass matrix from the sample covariances."""
def __init__(
self,
n,
initial_mean=None,
initial_cov=None,
initial_weight=0,
adaptation_window=101,
doubling=True,
update_steps=None,
dtype="float64",
):
if initial_mean is None:
initial_mean = np.zeros(n, dtype=dtype)
if initial_cov is None:
initial_cov = np.eye(n, dtype=dtype)
initial_weight = 1
if initial_cov is not None and initial_cov.ndim != 2:
raise ValueError("Initial covariance must be two-dimensional.")
if initial_mean is not None and initial_mean.ndim != 1:
raise ValueError("Initial mean must be one-dimensional.")
if initial_cov is not None and initial_cov.shape != (n, n):
raise ValueError(
"Wrong shape for initial_cov: expected %s got %s"
% (n, initial_cov.shape)
)
if len(initial_mean) != n:
raise ValueError(
"Wrong shape for initial_mean: expected %s got %s"
% (n, len(initial_mean))
)
self.dtype = dtype
self._n = n
self._cov = np.array(initial_cov, dtype=self.dtype, copy=True)
self._cov_theano = theano.shared(self._cov)
self._chol = cholesky(self._cov, lower=True)
self._chol_error = None
self._foreground_cov = _WeightedCovariance(
self._n, initial_mean, initial_cov, initial_weight, self.dtype
)
self._background_cov = _WeightedCovariance(self._n, dtype=self.dtype)
self._n_samples = 0
# For backwards compatibility
self._doubling = doubling
self._adaptation_window = int(adaptation_window)
self._previous_update = 0
# New interface
if update_steps is None:
self._update_steps = None
else:
self._update_steps = np.atleast_1d(update_steps).astype(int)
def velocity(self, x, out=None):
return np.dot(self._cov, x, out=out)
def energy(self, x, velocity=None):
if velocity is None:
velocity = self.velocity(x)
return 0.5 * np.dot(x, velocity)
def velocity_energy(self, x, v_out):
self.velocity(x, out=v_out)
return self.energy(x, v_out)
def random(self):
vals = np.random.normal(size=self._n).astype(self.dtype)
return solve_triangular(self._chol.T, vals, overwrite_b=True)
def _update_from_weightvar(self, weightvar):
weightvar.current_covariance(out=self._cov)
try:
self._chol = cholesky(self._cov, lower=True)
except (LinAlgError, ValueError) as error:
self._chol_error = error
self._cov_theano.set_value(self._cov)
def update(self, sample, grad, tune):
if not tune:
return
self._foreground_cov.add_sample(sample, weight=1)
self._background_cov.add_sample(sample, weight=1)
self._update_from_weightvar(self._foreground_cov)
# Support the two methods for updating the mass matrix
delta = self._n_samples - self._previous_update
do_update = (
self._update_steps is not None
and self._n_samples in self._update_steps
) or (self._update_steps is None and delta >= self._adaptation_window)
if do_update:
self._foreground_cov = self._background_cov
self._background_cov = _WeightedCovariance(
self._n, dtype=self.dtype
)
if self._update_steps is None:
self._previous_update = self._n_samples
if self._doubling:
self._adaptation_window *= 2
self._n_samples += 1
def raise_ok(self, vmap):
if self._chol_error is not None:
raise ValueError("{0}".format(self._chol_error))
class _WeightedCovariance:
"""Online algorithm for computing mean and covariance."""
def __init__(
self,
nelem,
initial_mean=None,
initial_covariance=None,
initial_weight=0,
dtype="float64",
):
self._dtype = dtype
self.n_samples = float(initial_weight)
if initial_mean is None:
self.mean = np.zeros(nelem, dtype=dtype)
else:
self.mean = np.array(initial_mean, dtype=dtype, copy=True)
if initial_covariance is None:
self.raw_cov = np.eye(nelem, dtype=dtype)
else:
self.raw_cov = np.array(initial_covariance, dtype=dtype, copy=True)
self.raw_cov[:] *= self.n_samples
if self.raw_cov.shape != (nelem, nelem):
raise ValueError("Invalid shape for initial covariance.")
if self.mean.shape != (nelem,):
raise ValueError("Invalid shape for initial mean.")
def add_sample(self, x, weight):
x = np.asarray(x)
self.n_samples += 1
old_diff = x - self.mean
self.mean[:] += old_diff / self.n_samples
new_diff = x - self.mean
self.raw_cov[:] += weight * new_diff[:, None] * old_diff[None, :]
def current_covariance(self, out=None):
if self.n_samples == 0:
raise ValueError("Can not compute covariance without samples.")
if out is not None:
return np.divide(self.raw_cov, self.n_samples - 1, out=out)
else:
return (self.raw_cov / (self.n_samples - 1)).astype(self._dtype)
def current_mean(self):
return np.array(self.mean, dtype=self._dtype)
class WindowedDualAverageAdaptation(DualAverageAdaptation):
def __init__(self, update_steps, initial_step, target, *args, **kwargs):
self.update_steps = np.atleast_1d(update_steps).astype(int)
self.targets = np.atleast_1d(target) + np.zeros_like(self.update_steps)
super(WindowedDualAverageAdaptation, self).__init__(
initial_step, self.targets[0], *args, **kwargs
)
self._initial_step = initial_step
self._n_samples = 0
def reset(self):
self._hbar = 0.0
self._log_step = np.log(self._initial_step)
self._log_bar = self._log_step
self._mu = np.log(10 * self._initial_step)
self._count = 1
self._tuned_stats = []
def update(self, accept_stat, tune):
if self._n_samples in self.update_steps:
self._target = float(
self.targets[np.where(self.update_steps == self._n_samples)]
)
self._n_samples += 1
self.reset()
return
self._n_samples += 1
super(WindowedDualAverageAdaptation, self).update(accept_stat, tune)
def build_schedule(
tune, warmup_window=50, adapt_window=50, cooldown_window=50
):
if warmup_window + adapt_window + cooldown_window > tune:
logger.warn(
"there are not enough tuning steps to accomodate the tuning "
"schedule; assigning automatically as 20%/70%/10%"
)
warmup_window = np.ceil(0.2 * tune).astype(int)
cooldown_window = np.ceil(0.1 * tune).astype(int)
adapt_window = tune - warmup_window - cooldown_window
t = warmup_window
delta = adapt_window
update_steps = []
while t < tune - cooldown_window:
t += delta
delta = 2 * delta
if t + delta > tune - cooldown_window:
update_steps.append(tune - cooldown_window)
break
update_steps.append(t)
update_steps = np.array(update_steps, dtype=int)
if np.any(update_steps) <= 0:
raise ValueError("invalid tuning schedule")
return np.append(warmup_window, update_steps)
@deprecated("the sample function from the pymc3-ext library")
def sample(
*,
draws=1000,
tune=1000,
model=None,
step_kwargs=None,
warmup_window=50,
adapt_window=50,
cooldown_window=100,
initial_accept=None,
target_accept=0.9,
gamma=0.05,
k=0.75,
t0=10,
**kwargs,
):
# Check that we're in a model context and that all the variables are
# continuous
model = modelcontext(model)
if not all_continuous(model.vars):
raise ValueError(
"NUTS can only be used for models with only "
"continuous variables."
)
start = kwargs.get("start", None)
if start is None:
start = model.test_point
mean = model.dict_to_array(start)
update_steps = build_schedule(
tune,
warmup_window=warmup_window,
adapt_window=adapt_window,
cooldown_window=cooldown_window,
)
potential = QuadPotentialDenseAdapt(
model.ndim,
initial_mean=mean,
initial_weight=10,
update_steps=update_steps,
)
if "step" in kwargs:
step = kwargs["step"]
else:
if step_kwargs is None:
step_kwargs = {}
step = pm.NUTS(
potential=potential,
model=model,
target_accept=target_accept,
**step_kwargs,
)
if "target_accept" in step_kwargs and target_accept is not None:
raise ValueError(
"'target_accept' cannot be given as a keyword argument and in "
"'step_kwargs'"
)
target_accept = step_kwargs.pop("target_accept", target_accept)
if initial_accept is None:
target = target_accept
else:
if initial_accept > target_accept:
raise ValueError(
"initial_accept must be less than or equal to target_accept"
)
target = initial_accept + (target_accept - initial_accept) * np.sqrt(
np.arange(len(update_steps)) / (len(update_steps) - 1)
)
step.step_adapt = WindowedDualAverageAdaptation(
update_steps, step.step_size, target, gamma, k, t0
)
kwargs["step"] = step
return pm.sample(draws=draws, tune=tune, model=model, **kwargs)
@deprecated("the init='full_adapt' argument to pm.sample")
def get_dense_nuts_step(
start=None,
adaptation_window=101,
doubling=True,
initial_weight=10,
use_hessian=False,
use_hessian_diag=False,
hessian_regularization=1e-8,
model=None,
**kwargs,
):
"""Get a NUTS step function with a dense mass matrix
The entries in the mass matrix will be tuned based on the sample
covariances during tuning. All extra arguments are passed directly to
``pymc3.NUTS``.
Args:
start (dict, optional): A starting point in parameter space. If not
provided, the model's ``test_point`` is used.
adaptation_window (int, optional): The (initial) size of the window
used for sample covariance estimation.
doubling (bool, optional): If ``True`` (default) the adaptation window
is doubled each time the matrix is updated.
"""
model = modelcontext(model)
if not all_continuous(model.vars):
raise ValueError(
"NUTS can only be used for models with only "
"continuous variables."
)
if start is None:
start = model.test_point
mean = model.dict_to_array(start)
if use_hessian or use_hessian_diag:
try:
import numdifftools as nd
except ImportError:
raise ImportError(
"The 'numdifftools' package is required for Hessian "
"computations"
)
logger.info("Numerically estimating Hessian matrix")
if use_hessian_diag:
hess = nd.Hessdiag(model.logp_array)(mean)
var = np.diag(-1.0 / hess)
else:
hess = nd.Hessian(model.logp_array)(mean)
var = -np.linalg.inv(hess)
factor = 1
success = False
while not success:
var[np.diag_indices_from(var)] += factor * hessian_regularization
try:
np.linalg.cholesky(var)
except np.linalg.LinAlgError:
factor *= 2
else:
success = True
else:
var = np.eye(len(mean))
potential = QuadPotentialDenseAdapt(
model.ndim,
initial_mean=mean,
initial_cov=var,
initial_weight=initial_weight,
adaptation_window=adaptation_window,
doubling=doubling,
)
return pm.NUTS(potential=potential, model=model, **kwargs)
|
National Genomics Center for Wildlife and Fish Conservation
The National Genomics Center for Wildlife and Fish Conservation is a facility for advanced research providing expertise in DNA sequencing and environmental and forensic DNA sampling. It is located in Missoula, Montana, and is part of the U.S. Forest Service's Rocky Mountain Research Station. The Center is designed for cross-agency partnerships to provide genetic and genomic data for species monitoring. The center has agreements with the University of Montana for sharing equipment and the U.S. Fish and Wildlife Service to share expertise. The goal of these federal collaborations is reciprocal cooperation that will assist each agency in meeting its responsibilities related to monitoring and maintaining viable wildlife and fish populations and their habitats. Implementation is intended to maintain and enhance agency effectiveness while avoiding duplication of efforts to provide critical conservation genetics and genomics information to the participating agencies.
References
Category:Forestry agencies in the United States
Forest Service
Category:Education buildings and facilities in Missoula, Montana |
At this point, if the walls of the velomobile are already built up, the trike may be permanently attached to the shell. Use zip ties to attach the boom support, and use #10 screws (or equivalent) to attach the seat supports to the anti-sag bars.
With these supports in place, the trike can actually be ridden! Go ahead; I know you want to!
At this point it's time to drop the trike into its new shell, and see how it fits! You may want someone to help you with this - It can be done by yourself (I should know, I did it over a dozen times) but it sure is awkward. Since the hood sections are not yet attached, the walls spread open nicely, allowing the trike to be dropped in.There are a few different supports that will be needed. The Anti-Sag bars, boom supports and seat supports may be measured out before the sides of the velomobile are installed, which will save you a lot of awkward bending over.The "ribs" on the bottom of the shell are strong, but not strong enough to support the weight of the entire shell without sagging! Two aluminum bars are needed to add a bit of extra strength. These bars span the width of the shell, and are placed along the ribs in front and behind the front wheels.Grab the L-shaped aluminum bars and cut them to length, so they fit in the space inside the shell. Note that the bars will not be same length - mine were about 39" and about 37". Since the actual width of your shell might be a bit different from mine, be sure to measure before cutting.The aluminum bars are fastened to the shell using zip ties. Along the length of each bar, on both faces, drill pairs of holes spaced 1" apart at about 3" intervals. I used a drill press for this task, using a 3/16" drill bit. Clean up the holes with a knife if there are any burrs left on the metal.Remove the trike if it's still in the shell, and lay the bars in place. Using an old soldering iron or a handheld drill, punch a hole through each hole in the bar and through the coroplast. In this way, the holes will be perfectly aligned. Then, loop a zip tie through each pair of holes and tighten. With both sets of L-shaped bars installed, the shell will no longer sag.The boom support is made of a piece of scrap coroplast (there should be enough left from cutting out the pieces). It stretches between the boom of the trike and a section of "rib" that runs down the center of the shell. If you're building your velomobile around a Catrike Expedition, you can use the design in the attached file. Otherwise, you'll need to fashion your own in a similar style.First, prop the velo shell off the ground about 2.25" (I used a few pieces of scrap wood) - this is how far off the ground the shell will be. Then center the trike in the shell. The frame should follow the center rib, and the wheels should be centered in the wheel wells. The distance between the boom and the center rib is the space the support needs to be customized for. Aim for about 6" of material wrapped around the boom, and flare it outwards at the bottom.With a drill or hot soldering iron, make holes for the zip ties to pass through. Don't attach anything yet, however.The seat supports are made of short pieces of flat aluminum bar that connect the seat frame to the anti-sag bar. These pieces should be about 4" long. Drill a hole at either end to accept a #10 (or equivalent) machine screw.Start by clamping a 1" inside diameter rubber-lined P-clamp to the seat supports closest to the ground. Use a flat washer, lock washer and plain nut. Place the trike inside the shell again, and center as precisely as possible. Place the supports between the P-clamp and the anti-sag bar, and determine where an appropriate hole should be drilled in the anti-sag bar. Drill the hole with a hand drill. Note, you may need to remove a zip tie if it is in the way. This is OK, since the screw will hold the coroplast to the bar instead.These four supports must be installed after the tailbox bezel has been glued in place (see the next step). The reason for this is that the spacing between the seat and sides of the shell must first be set. So, go ahead and do that now.These supports are a hybrid of coroplast and aluminum. They look like over-engineered flyswatters. Cut out eight trapezoid shapes from some scrap coroplast. I cut four from black (for the rear axle supports) and four from transluscent (for the upper seat supports). Drill holes as marked using a drill or hot soldering iron. Now, cut out four lengths of flat aluminum bar. Two at about 7", and two at about 9". At one end of each bar, drill holes that correspond to the holes in the coroplast pieces. Then fasten the coroplast pieces to the bars as shown using zip ties.The rear axle supports attach to the rear triangle of the trike close to the rear axle (thus the name), using 1.25" rubber-lined P-clamps. Ensure the rear of the trike is centered with the rear of the shell, and dry-fit the support between the rib along the bottom edge of the shell and the P-clamp. The coroplast end should be pushed onto the rib as far as possible. With a drill or hot soldering iron, transfer the positions of the holes onto the rib. Then, mark where the hole needs to be drilled in the aluminum bar to align with the P-clamp. If the bar ends up being too long, cut off any excess. Do this for both supports.Remove the support and drill the hole in the P-clamp end. Then reinstall the support into the shell, by first threading in the zip ties (this is tricky) and then bolting the P-clamp onto the support. These two supports carry the weight of the rear of the shell, and prevent it from "fish tailing."The upper seat supports are done in a similar manner. This time, the support stretches between a 1" diameter P-clamp mounted on the upper-most part of the seat frame, and a rib that runs along the side of the shell. As with the rear axle supports, center the trike, dry-fit the supports, mark the mounting locations, drill then, and mount with screws and zip ties. The upper seat supports prevent the shell from shifting too far left or right. |
/**
* @file include/retdec/loader/loader/segment.h
* @brief Declaration of segment class.
* @copyright (c) 2017 Avast Software, licensed under the MIT license
*/
#ifndef RETDEC_LOADER_RETDEC_LOADER_SEGMENT_H
#define RETDEC_LOADER_RETDEC_LOADER_SEGMENT_H
#include <cstdint>
#include <memory>
#include <string>
#include <vector>
#include "retdec/utils/range.h"
#include "retdec/fileformat/fftypes.h"
#include "retdec/fileformat/types/sec_seg/sec_seg.h"
#include "retdec/loader/loader/segment_data_source.h"
#include "retdec/loader/utils/range.h"
namespace retdec {
namespace loader {
class Segment
{
public:
Segment(const retdec::fileformat::SecSeg* secSeg, std::uint64_t address, std::uint64_t size, std::unique_ptr<SegmentDataSource>&& dataSource);
Segment(const Segment& segment);
~Segment();
const retdec::fileformat::SecSeg* getSecSeg() const;
bool containsAddress(std::uint64_t address) const;
std::uint64_t getAddress() const;
std::uint64_t getEndAddress() const;
std::uint64_t getPhysicalEndAddress() const;
std::uint64_t getSize() const;
std::uint64_t getPhysicalSize() const;
retdec::utils::Range<std::uint64_t> getAddressRange() const;
retdec::utils::Range<std::uint64_t> getPhysicalAddressRange() const;
const retdec::utils::RangeContainer<std::uint64_t>& getNonDecodableAddressRanges() const;
std::pair<const std::uint8_t*, std::uint64_t> getRawData() const;
bool hasName() const;
const std::string& getName() const;
void setName(const std::string& name);
bool getBytes(std::vector<unsigned char>& result) const;
bool getBytes(std::vector<unsigned char>& result, std::uint64_t addressOffset, std::uint64_t size) const;
bool getBits(std::string& result) const;
bool getBits(std::string& result, std::uint64_t addressOffset, std::uint64_t bytesCount) const;
bool setBytes(const std::vector<unsigned char>& value, std::uint64_t addressOffset);
void resize(std::uint64_t newSize);
void shrink(std::uint64_t shrinkOffset, std::uint64_t newSize);
void addNonDecodableRange(retdec::utils::Range<std::uint64_t> range);
private:
const retdec::fileformat::SecSeg* _secSeg;
std::uint64_t _address;
std::uint64_t _size;
std::unique_ptr<SegmentDataSource> _dataSource;
std::string _name;
retdec::utils::RangeContainer<std::uint64_t> _nonDecodableRanges;
};
} // namespace loader
} // namespace retdec
#endif
|
Gun-rights groups deliver 340,000 initiative signatures
OLYMPIA – Supporters of an initiative to prevent universal background checks on private gun sales delivered petitions to the secretary of state today that may contain enough signatures to get the measure on the ballot next year.
Backers of Initiative 591 said they were turning in 340,000 signatures today and plan to add to the total before a Jan. 3 deadline.
Initiative 591 aims to keep the state from enacting a background check law that is stricter than the federal standard, which requires checks for sales by licensed dealers but not for most private transactions such as occur online and at gun shows. It also would block government confiscation of firearms without due process,
The measure is pushed by a coalition of gun-rights groups led by the Citizens Committee for the Right to Keep and Bear Arms, which is based in Bellevue.
It was drawn up to counter Initiative 594, which would expand existing state law to require background checks for online and private sales.
Supporters of Initiative 594 turned in an estimated 250,000 signatures to the state elections office last month. They too intend to add to their total in the next few weeks.
Initiatives require at least 246,372 valid signatures of registered state voters to qualify for the ballot. The secretary of state suggests filing at least 320,000 signatures to provide a buffer for any duplicate or invalid signatures.
Both measures are initiatives to the Legislature, which means lawmakers can enact one or both in their next session or do nothing and send them on to the November 2014 ballot. |
*k + m + 54 - 2 = 0. Round k to the nearest 10.
10
Let h = -105 - -63. Let q = -114.6 - -75.9. Let v = h - q. Round v to the nearest integer.
-3
Suppose -5*t + 4*a = -2*t - 18900012, -5*a = -2*t + 12600015. What is t rounded to the nearest 1000000?
6000000
Suppose -21717900 = -5*o - s, 0*o = -5*o - 5*s + 21717900. Let p = o - -1256420. Suppose -6*k = -5*k - p. Round k to the nearest one million.
6000000
Let h(g) = 310*g**2 + 6*g + 4. Let m be ((-12)/(-14))/((-1)/(-7)). Let z be h(m). Round z to the nearest one thousand.
11000
Let b = 9.4826 - 9.5. Round b to 3 decimal places.
-0.017
Let f = 5 + -2. Suppose 0 = -f*n + n - 9200. Round n to the nearest 1000.
-5000
Let t = 70 + -21. Let j(r) = -252*r + 7. Let d be j(-7). Suppose 0 = -2*y - d - t. Round y to the nearest 100.
-900
Let p = -0.8599941 - -0.86. Round p to six dps.
0.000006
Let r(a) = -7*a**2 - 7*a - 3. Let c be r(6). Round c to the nearest 10.
-300
Let d = 2317 + -1468. Let b(z) = -49*z**2 - 5*z + 1. Let w be b(5). Let k = d + w. What is k rounded to the nearest one thousand?
0
Let k(o) = 6*o + 86*o**3 - o**2 - 8*o**3 - o**2 - 5*o**2 - 4. Let u be k(4). Round u to the nearest 1000.
5000
Let y = 70153224 - 40853224. Round y to the nearest 1000000.
29000000
Let z = 0.37257 - -19840.62743. Let r = z - 19850.691. Let d = r - -0.091. What is d rounded to the nearest integer?
-10
Suppose 0 = -5*i - 10, -3*b = -0*b + 4*i - 4. Let f be (-27)/(-12) - 1/b. Suppose f*l - 7*l + 700 = 0. What is l rounded to the nearest 100?
100
Let f = -1.4 + 8.4. Let s = 1.13663504 - -5.863364. Let o = s - f. Round o to 7 decimal places.
-0.000001
Let b = -21.665 + -0.135. What is b rounded to zero decimal places?
-22
Suppose -4*j + 631 = -109. Suppose 4*m + m - j = 0. What is m rounded to the nearest 10?
40
Let h be (-8)/12*(-249)/2. Let k = -2083 + h. What is k rounded to the nearest 10000?
0
Suppose 0 = -0*c + 3*c - 36. Let a be 56/c + 4/(-6). Suppose -3*d - a*o = 252016, -3*d - 251980 = -0*o - 5*o. Round d to the nearest ten thousand.
-80000
Let f = -6.26 - 15.82. Let t = f - -21. What is t rounded to one dp?
-1.1
Let c = 0.6 + -0.6132. Round c to three dps.
-0.013
Let w(h) = -118*h**2 + h + 5. Let k be w(-3). Round k to the nearest one hundred.
-1100
Let b(s) = -s**3 + 9*s**2 - s + 7. Let n be (-1)/4*-2*18. Let r be b(n). Let x be -7400000 - (r + 1 + 1). What is x rounded to the nearest one million?
-7000000
Let h = 7.3 - 7. Let g = -0.16 + h. Let o = g - 0.13929. What is o rounded to four dps?
0.0007
Let n(r) = 66*r**2 - 3*r. Let u be n(-3). Suppose -u - 947 = -5*y. Round y to the nearest 100.
300
Let w be (-6)/(-24) - (-69600002)/(-8). What is w rounded to the nearest one million?
-9000000
Let a = 0.132069 + -0.132. Round a to five dps.
0.00007
Let w = -308 + 303.97. Let r = -38.33 - w. Let y = -33 - r. What is y rounded to 1 decimal place?
1.3
Let y = 0.83 - 0.8299616. What is y rounded to six decimal places?
0.000038
Let z = 488827 - 488843.00044. Let p = -31 + 15. Let o = z - p. Round o to four decimal places.
-0.0004
Let c be (-6)/(-2) - (3 - 0). Let u be (-2 + c)/2 + -81. Let o = u - -182. Round o to the nearest 100.
100
Let w = -4379135.2849869 - -4379135. Let o = 0.285 + w. Round o to 6 dps.
0.000013
Suppose 4259661 - 15699661 = 2*h. What is h rounded to the nearest 100000?
-5700000
Let o = 1 - 4. Let b = o + 1. Let k = b + 12.4. What is k rounded to the nearest integer?
10
Let o = -12.3 + 12. Let s = o - -0.2999995. Round s to six dps.
-0.000001
Let r = 0.2000001 - 0.2. What is r rounded to 7 dps?
0.0000001
Let t = 14 + -14.2. Let m = t - -0.04. Round m to one decimal place.
-0.2
Let j = 0.3 - 7.3. Let p = j - -6.9994. Round p to 4 dps.
-0.0006
Let s = 0.05 - 0.35. Let o = s - -1.5. What is o rounded to the nearest integer?
1
Let g = -46852426502.00037 - -46852164242. Let z = 262173 + g. Let p = z + 87. What is p rounded to 4 decimal places?
-0.0004
Let h = -1963 - -2863. What is h rounded to the nearest one hundred?
900
Let y = 202 + -202.0141. Round y to three dps.
-0.014
Let g = 0.1308 - 0.11. Round g to three dps.
0.021
Let b = 13114.054 + -13085. Let v = 29 - b. Round v to two dps.
-0.05
Suppose -1 = a, 38 = 4*i + a + a. Let n(y) = y**3 - 12*y**2 + 11*y + 8. Let h be n(i). What is h rounded to the nearest ten?
-80
Let x be (0/2)/(-7 + 9). Suppose -2*j + 2536 - 174536 = x. What is j rounded to the nearest ten thousand?
-90000
Let c = 0.087 - 7.987. Let i = 953302.66 - 953294.7600047. Let b = c + i. Round b to 6 decimal places.
-0.000005
Suppose 12*y - 8*y + 140000 = 0. What is y rounded to the nearest 10000?
-40000
Let s = -0.55483 - -0.552. Round s to 3 dps.
-0.003
Let f = -49024316 - -49024372.999918. Let v = -57 + f. Round v to 5 dps.
-0.00008
Let l = -29.000276 + 29. What is l rounded to 5 dps?
-0.00028
Suppose 0 = -4*p + 16, 57992 = 2*o - 4*o - 2*p. What is o rounded to the nearest ten thousand?
-30000
Let d = -14.999982 - -15. What is d rounded to five decimal places?
0.00002
Let z = 10366.91039 + -10367. Let v = 0.09 + z. What is v rounded to four decimal places?
0.0004
Let n = 7 - 11. Let j(r) = -2*r + 1. Let w be j(n). Let i be 360*(75000/w)/1. Round i to the nearest one million.
3000000
Suppose -4*z + 9 - 1 = 0. Let w = z - 2. Suppose 2*x + 2*x - 204000 = w. What is x rounded to the nearest 10000?
50000
Let z = -2718258.2587 - -2653592.65. Let r = 64675 + z. Let f = -9.4 + r. What is f rounded to 3 decimal places?
-0.009
Let k = -0.08 - -0.08061. Round k to 4 dps.
0.0006
Let f = -31.99966 + 32. What is f rounded to four dps?
0.0003
Let v = -4574 + -15401. Let c = -37175 - v. Round c to the nearest one thousand.
-17000
Let s = -7.05 + 0.05. Let j = s - -7.000008. Round j to five dps.
0.00001
Suppose 5*a - 2*m - 252520 = 3*m, 4*a + 5*m = 201980. Round a to the nearest ten thousand.
50000
Let s = 1335 - 1333.999. Let v = s + -1. What is v rounded to 2 dps?
0
Let p(k) = k - 5. Let c be p(7). Suppose -c*n + 1054902 = -190146. Let i = n - 182524. Round i to the nearest 100000.
400000
Let i = 4226 + 234. Round i to the nearest one thousand.
4000
Suppose 123870 = f - 85485. Let z = f + -109355. What is z rounded to the nearest ten thousand?
100000
Let p be 9978444/(-77) + (-2)/(-11). Let i = -79590 - p. Round i to the nearest ten thousand.
50000
Let g = -250.044 + 255. Let v = g + -5. Let z = -0.06 - v. Round z to 2 dps.
-0.02
Let y = -43.8 - -48. Let k = 4.199914 - y. Round k to 5 dps.
-0.00009
Let n = 1.019957 + -1.02. What is n rounded to five decimal places?
-0.00004
Let i = 423816 - 423837.2887. Let o = 0.0713 - i. Let n = 21 - o. Round n to 1 decimal place.
-0.4
Let u(n) = -n**2 + 4*n - 1. Let f be u(3). Suppose f*w = 14 - 4. Suppose -2400 = r - w*l, 0 = 5*r - l - 2*l + 12000. Round r to the nearest one thousand.
-2000
Let f = -2 - -2.05. Let j = 0.04997 - f. Round j to four decimal places.
0
Let y = 0.100148 + -0.1. What is y rounded to five decimal places?
0.00015
Let g = -0.0137 - -2.2062. Let q = 2.2 - g. Round q to 3 decimal places.
0.008
Let n = -0.23 + 0.03. Let c = n - 0.3. Let k = 0.5000015 + c. What is k rounded to 6 dps?
0.000002
Let q = -5.13 - -0.13. Let j = 4.999992 + q. What is j rounded to five dps?
-0.00001
Suppose d + 0*q - 2190 = -2*q, -4*q = 5*d - 10920. Round d to the nearest 100.
2200
Let x(u) = u - 6695. Let t be x(0). Let i = t + -46176. Let z = i - -16871. What is z rounded to the nearest ten thousand?
-40000
Let d = 189678211 + -189678179.0000076. Let f = 32 - d. What is f rounded to 6 dps?
0.000008
Let r = 48 - -45. Let o = r - 93.087. Let f = o + 0.0870123. What is f rounded to 6 dps?
0.000012
Let p = -24 - -46. Let c = p - 21.99916. Round c to four dps.
0.0008
Let b = -18 + 21. Let y = b + -2.99999973. Round y to 7 decimal places.
0.0000003
Let s be (132 - -4)*(150/(-4))/(-1). What is s rounded to the nearest one thousand?
5000
Let i = -0.3 - -0.5. Let o = i + 3.4. Round o to 0 dps.
4
Suppose 3*y = -2335 - 1535. What is y rounded to the nearest one hundred?
-1300
Let j = -17329 + 38529. What is j rounded to the nearest 1000?
21000
Let q(j) = 2*j**2 - 9*j + 7. Let k be q(6). Round k to the nearest ten.
30
Let z(m) = -1299*m**2 + 4*m - 3. Let j be z(2). Let v = 2491 + j. What is v rounded to the nearest one thousand?
-3000
Let p = 9096683.35349 + -17.3534 |
Induction of estradiol 2-hydroxylase activity in MCF-7 human breast cancer cells by pesticides and carcinogens.
The induction of 17β-estradiol (E2) 2-hydroxylase activity was investigated in MCF-7 human breast cancer cells using 2-[(3)H]E2 as the substrate in a radiometric assay. Treatment of MCF-7 cells with 10 μM indole-3-carbinol (I3C) for 48 h caused a 3.5-fold induction of E2 2-hydroxylase activity, whereas, I3C at concentrations as high as 100 μM did not induce CYP1A1 mRNA levels or immunoreactive protein. Thus, the induction of E2 2-hydroxylase activity using the radiometric assay was not dependent on induction of CYP1A1. E2 2-hydroxylase activity was also increased by I3C within 2 h after treatment suggesting in situ interactions with the cellular cytochrome P450 system. The time-dependent effects of various chlorinated pesticides, antiestrogens and mammary carcinogens on E2 2-hydroxylase activity were also investigated. p,p'-DDE, atrazine and the mammary carcinogen 7,12-dimethylbenz[a]anthracene (DMBA) significantly decreased E2 2-hydroxylase activity after 2 h; whereas, only the latter two compounds decreased activity after 48 h. Both 2,3,7,8-tetrachlorodibenzo-p-dioxin (TCDD) and the mammary carcinogen benzo[a]pyrene (BaP) induced E2 2-hydroxylase in MCF-7 cells after incubation for 48 h and this was also paralleled by induction of CYP1A1 protein. The antiestrogens ICI 164 384 and ICI 182 780 decreased E2 2-hydroxylase activity in MCF-7 cells after incubation for 48 h, whereas tamoxifen and 4-hydroxytamoxifen were inactive. The results indicate that chemical-induced modulation of E2 2-hydroxylase activity in MCF-7 cells is complex and does not predict their activity as mammary carcinogens. |
SureFlap Tunnel Extender
Item:
SureFlap tunnel extenders can be used to create a longer approach tunnel to the SureFlap Microchip Cat Flap, SureFlap DualScan Microchip Cat Flap and the SureFlap Connect Cat Flap. when it... Read more
Notify me when item is in stock
Product details
SureFlap tunnel extenders can be used to create a longer approach tunnel to the SureFlap Microchip Cat Flap, SureFlap DualScan Microchip Cat Flap and the SureFlap Connect Cat Flap. when it is installed in a wall. The SureFlap tunnel extender fits snugly onto the tunnel of the SureFlap Microchip Cat Flap and multiple extenders can be stacked together to form a tunnel of any length. The tunnel of the SureFlap Microchip Cat Flap is 70mm (2.75”) long and each tunnel extender adds 50mm (2“) to the length of the cat flap’s tunnel. |
More and more Democrats seem to be losing steam when it comes to Mueller’s investigation ENDING TRUMP’S PRESIDENCY. Perhaps they’ve figured out the whole Russia conspiracy thing is silly? Or maybe they’re just desperate enough for him to fail (and the country if need be) that they will turn their support to a ridiculous Congress that will do anything it can to find something they can impeach Trump over.
And by Democrats, we mean Jennifer Rubin as well. Oh, she can claim to be a conservative all she wants but that’s just more BS.
Think we’re kidding? Look at this hot mess from WaPo’s ‘token conservative’:
The notion that Congress should not investigate all of Trump’s wrongdoing for fear of appearing to overreach is daft; the diversity and seriousness of Trump’s wrongdoing shouldn’t earn him a pass on some subset of them. https://t.co/qPpu14pY4z — Jennifer Rubin (@JRubinBlogger) March 5, 2019
And of course, her article is behind a paywall.
But hey, here ya’ go … from The Washington Post:
Democrats commenced a long-overdue, broad inquiry into President Trump’s possible corruption, abuse of power and obstruction of justice. Much as the soundbite-obsessed media want to ask over and over again whether this means impeachment, “this” is about finding and displaying to the American people all the facts. The notion that Congress should not investigate all of Trump’s wrongdoing for fear of appearing to overreach is daft; the diversity and seriousness of Trump’s wrongdoing shouldn’t earn him a pass on some subset of them. Which potential crimes and impeachable offenses should Congress not investigate?
What happened to Mueller, Jenn? These people would be better off to admit Trump’s biggest crime in their eyes is WINNING the election.
Congress: Let's ignore doing the work of the people and concentrate on launching duplicate investigations and hope something falls our way. Nadler: "we have to convince the American people that this isn't just about overturning an election". Seems legit to me…? — G (@TCC_Grouchy) March 5, 2019
Meanwhile, Democrats keep doing whatever they can to overturn the election.
Heh.
"Conservative Blogger" is totally ok with Congressional overreach because Orange Man Bad. https://t.co/XZ4BazKmXr — Ordy's Amish School of Coding (@OrdyPackard) March 5, 2019
Same group is ok with a token liberal attending a conservative conference and crapping on the pro-life movement because ORANGE MAN BAD.
Yup.
Gosh I hope this one goes on for years and years with no results too. That would restore my faith in the efficiency of government for good! — Federalist Musket?? (@Patriot_Musket) March 5, 2019
There isn’t a crime to investigate, they are searching for a crime. — Steve Brennan (@Stevehbr) March 5, 2019
Bingo.
Anything they can find to impeach Trump. Sad, ain’t it?
Related:
So STUPID we’re speechless: Alyssa Milano’s defense of AOC being a giant hypocrite belongs in the BACKFIRE Hall of Shame
‘Just LOOK at our Constitution!’ Rep. Dan Crenshaw explains why the Left REALLY hates tax cuts and it’s BRILLIANT (watch)
Bless her HEART! Jemele Hill illustrates the ultimate self-own tweeting about socialism then tries DELETING it (but we got it) |
Share this:
When Robert Griffin III went down with torn ligaments in his knee during the Redskins’ wild-card weekend loss, speculation began to arise about the conditions at FedEx Field.
About a month after the incident forced RG3 into yet another knee surgery — he also had his ACL repaired in college — Ravens safety Ed Reed decided to chime in on the matter.
“For all that money down in D.C., you’d think their field would be better,” Reed said during Super Bowl media day festivities in New Orleans on Tuesday. “That field sucks. It does; it was all mud.”
The Ravens visited the Redskins just weeks before the infamous playoff game in which RG3 initially injured his knee, so Reed was well aware of the gruesome conditions down in Washington, D.C.
Reed and his Ravens teammates fortunately didn’t succumb to any field-related injuries during their dreadful trip to FedEx Field, and they’ll be as close to full health as they’ve been all season when they take the field at the Superdome on Sunday. |
Monolithically-integrated distributed feedback laser compatible with CMOS processing.
An optically-pumped, integrated distributed feedback laser is demonstrated using a CMOS compatible process, where a record-low-temperature deposited gain medium enables integration with active devices such as modulators and detectors. A pump threshold of 24.9 mW and a slope efficiency of 1.3 % is demonstrated at the lasing wavelength of 1552.98 nm. The rare-earth-doped aluminum oxide, used as the gain medium in this laser, is deposited by a substrate-bias-assisted reactive sputtering process. This process yields optical quality films with 0.1 dB/cm background loss at the deposition temperature of 250 °C, and therefore is fully compatible as a back-end-of-line CMOS process. The aforementioned laser's performance is comparable to previous lasers having gain media fabricated at much higher temperatures (> 550 °C). This work marks a crucial step towards monolithic integration of amplifiers and lasers in silicon microphotonic systems. |
Ian Bunting, standing at 6’7” and a svelte 255 pounds, doesn’t look like a football player out of central casting. On a Cal football team that has managed to succeed with a lot of physical misfits, however, he still stands out. He looks a lot more like a player from a ground-and-pound Midwest school. That’s because, really, he is.
After four years of absorbing knowledge (and sometimes seeing the field) for one of the nation’s most esteemed college football programs at the University of Michigan, Bunting took college’s closest approximation to free agency and made the call to suit up for Cal head coach Justin Wilcox. And perhaps, for the man who lists himself as an “aspiring beach bum” in his Twitter profile, coming out to the West Coast was a benefit as well.
With the Bears suddenly and dramatically bowl-eligible and looking like they have the best chance to knock off Stanford in recent memory, Bunting’s call doesn’t look too bad. And currently sitting on his career-best season statistics, he’s also making sure he stands out on more than just stature.
You’d likely think Bunting had football coursing through his veins from a young age, but that’s not quite the truth. In fact, he claims his first spoken word was “basketball,” and that wasn’t the last time the sport would factor into his life.
“When I was younger, I had hoop dreams, as we all do,” Bunting says. “Us football players, I think a lot of guys thought they were going to be basketball players, and that’s me included. But I was much better at football than I was at basketball.”
Bunting’s choice of first word may seem a bit less strange when considering that his father would go on to work for the Miami Heat as a team physician. For his first Christmas, Bunting received the classic Little Tikes basketball hoop, so his interest in basketball was fueled right from the comfort of his living room.
Indeed, football wouldn’t come into the picture for quite a while, despite Bunting’s frame, which made him noticeable immediately in any sport. Soccer and basketball all occupied space in the meantime, with a tad bit of serious thought put toward the latter.
“I was really good defensively,” Bunting says. “I kind of played basketball like a football player, I’ve been told. I would set hard screens and get tough rebounds and clear the garbage under the basket. I was definitely more of a football player, but I loved basketball.”
Ian’s father, Stephen, was from Illinois, and after his stint working for the Heat, he moved his family back to Hinsdale, a suburb of Chicago. While football is popular in Florida, in Big Ten country, it’s simply on another level.
Bunting had played just one year of youth football before high school, but the way he tells it, he always knew that the gridiron was where he’d end up. With his frame, high school football was simply an inevitability, and he was self-aware enough to know it.
“I knew I wanted to play in high school because I had grown out of soccer,” Bunting says. “I was pretty tall, and soccer lends itself to a smaller stature. There’s only one (player with my size): Ibrahimovic.”
With his frame and speed, Bunting could plausibly line up pretty much anywhere on the field. Defensive end was a fit, but like most who have the luxury of choosing, Bunting moved toward the skill positions, initially playing as a wide receiver.
His move to tight end only occurred in his senior year, and even then, not for the reasons you may expect. Because of a quarterback injury, Hinsdale High was short of a passing game that could do much outside of the hash marks, so there was little sense in having such a premier athlete playing where no one could get him the ball. With the knowledge that college programs were already viewing him more as a tight end prospect than as a receiver, he made the switch.
Bunting’s high school stats aren’t gaudy but were apparently enough to make his entire region of the country take notice. He had offers from every school within a 300-mile radius, and a few more on top of that. But with his pick of the litter on the line, Bunting had one crucial factor to consider in deciding where to go.
His father was now suffering from brain cancer, and the ability to get home in a hurry and spend as much time with family as possible was at a premium. As is unsurprising for the son of a doctor, academics were also as important as any other factor, and the decision came down to Notre Dame, Northwestern and Michigan.
In the end, Ann Arbor and Brady Hoke’s coaching staff won out, and Bunting became a Wolverine. But during his redshirt freshman year, Michigan finished under .500 for just the third time since 1968, and Hoke was ousted as head coach. In came Jim Harbaugh, simultaneously one of the most notorious and beloved hardasses in a profession full of them.
The highly touted Wolverines never quite put it together in their first three seasons under Harbaugh, failing to obtain a Big Ten title. Bunting’s career also never quite got off the ground at Michigan, as he was blocked for two years by one of the country’s best tight ends in Jake Butt and played in just two games in 2017 after Butt departed for the NFL.
“Everyone coming into college football, you were probably the best kid on your team in high school, or one of the best,” Bunting says. “When you come to college, everyone was the best. You go back to the bottom of the totem pole, and you have to work your way up again, which is a fun challenge. You learn a lot of lessons.”
His father died in February of his freshman year, and Bunting says that in the aftermath, he became closer than ever with his mother and sister, and he could count on them to follow wherever he went. Going into his final year of NCAA eligibility already with his degree in organizational studies, Bunting got ready to become a graduate transfer and control his own fate. He wouldn’t be making the trip alone.
wide receiver Moe Ways shares some of Bunting’s “beach bum” vibe with a casual demeanor, but just like Bunting, he’s a Midwest boy who ended up sporting the famed maize and blue and not seeing the field all too often. Unsurprisingly, their personalities clicked, and the two became pals quickly in Ann Arbor, ultimately becoming a package deal for their final year of college football on the West Coast.
“There are things off the field that we experienced together, and we definitely appreciated each other being here because of it,” Ways said. “It would probably be a different story if we weren’t here together.”
The two are a perfect pairing. Ways also stands at an impressive 6’4” and brings a Big Ten attitude to the field while being completely disarming. With the strange transition of coming to a new program for just a single year, the two took the logical next step of living together.
“Day one coming in, it’s different than coming in as a freshman, because at least you have your whole freshman class and nobody knows anyone,” Bunting says. “Moe was here, too, which made it a little easier. … It’s always good to have someone you know and is there for you.”
So far, the transfer seems to be paying dividends. Bunting has gotten on the field in every game and has posted career highs for season catches and receptions. There’s no doubt he provides a size and physicality that the Bears are seriously in need of.
“It’s exciting to get anyone who can add something different,” said offensive coordinator Beau Baldwin. “Ian has provided that and will continue to, … and it’s not just the number of catches or the blocks he’s making. He’s a fit in the locker room, a fit with the teammates, and I appreciate that so much in Ian.”
Coming up this week against Stanford and its notoriously physical brand of play, you can be sure that Bunting is going to come in handy for the blue and gold. And that’s because he has built a life out of making himself handy wherever needed: the pitch, court, beach, field, home, East Coast, West Coast and Midwest. He’ll be making his final statements on the football field soon, but considering the long journey from his first words to today, what comes next could be anything and anywhere.
Andrew Wild covers football. Contact him at [email protected]. Follow him on Twitter @andrewwild17. |
[[setup]]
== Set Up {kibi-name}
[partintro]
--
This section includes information on how to setup {kibi-name} and get it running,
including:
* Downloading
* Installing
* Starting
* Configuring
* Upgrading
[[supported-platforms]]
[float]
== Supported Platforms
Packages of {kibi-name} are provided for and tested against Linux, Mac OS and
Windows. Since {kibi-name} runs on Node.js, we include the necessary Node.js
binaries for these platforms. Running {kibi-name} against a separately maintained
version of Node.js is not supported.
[float]
[[elasticsearch-version]]
== Elasticsearch Version
{kibi-name} should be configured to run against an Elasticsearch node of the same
version. This is the officially supported configuration.
Running different major version releases of {kibi-name} and Elasticsearch, e.g.,
{kibi-name} 5.x and Elasticsearch 2.x, is not supported, nor is running a minor
version of {kibi-name} that is newer than the version of Elasticsearch, e.g., {kibi-name}
5.4 and Elasticsearch 5.0.
Running a minor version of Elasticsearch that is higher than {kibi-name} will
generally work in order to facilitate an upgrade process where Elasticsearch
is upgraded first, e.g., {kibi-name} 5.2.2 and Elasticsearch 5.4. In this
configuration, a warning will be logged on {kibi-name} server startup, so it is only
meant to be temporary until {kibi-name} is upgraded to the same version as
Elasticsearch.
Running different patch version releases of {kibi-name} and Elasticsearch, e.g, {kibi-name}
5.4.1-1 and Elasticsearch 5.4, is generally supported, though we encourage
users to run the same versions of {kibi-name} and Elasticsearch down to the patch
version.
--
include::setup/install.asciidoc[]
include::setup/settings.asciidoc[]
include::setup/access.asciidoc[]
include::setup/connect-to-elasticsearch.asciidoc[]
include::setup/tribe.asciidoc[]
include::setup/production.asciidoc[]
include::setup/upgrade.asciidoc[]
|
Radiation and the lung: a reevaluation of the mechanisms mediating pulmonary injury.
Recent data from several investigators, including our unit, have provided additional information on the etiology of radiation-induced lung damage. These data suggest that there are two quite separate and distinct mechanisms involved: (a) classical radiation pneumonitis, which ultimately leads to pulmonary fibrosis is primarily due to radiation-induced local cytokine production confined to the field of irradiation; and (b) sporadic radiation pneumonitis, which is an immunologically mediated process resulting in a bilateral lymphocytic alveolitis that results in an "out-of-field" response to localized pulmonary irradiation. Both animal experiments and human studies show that classical radiation pneumonitis has a threshold dose and a narrow sigmoid dose-response curve with increasing morbidity and mortality over a very small dose range. Clinical pneumonitis rarely causes death, whereas in the animal and human studies of classical radiation pneumonitis, all subjects will eventually suffer irreversible pulmonary damage and death. The description of classical radiation pneumonitis is that of an acute inflammatory response to lung irradiation, which is confined to the area of irradiation. Recent studies have also shown that irradiation induces gene transcription and results in the induction and release of proinflammatory cytokines and fibroblast mitogens in a similar fashion to other chronic inflammatory states, and which ultimately results in pulmonary fibrosis. The description of classical radiation pneumonitis does not adequately explain the following observed clinical characteristics: (a) the unpredictable and sporadic onset; (b) the occurrence in only a minority of patients; (c) the dyspnoea experienced, which is out of proportion to the volume of lung irradiated; and (d) the resolution of symptoms without sequelae in the majority of patients. We have demonstrated a bilateral lymphocytic alveolitis of activated T lymphocytes and a diffuse increase in gallium lung scan uptake in patients studied before and 4 to 6 weeks after strictly unilateral lung irradiation. This is suggestive of a hypersensitivity pneumonitis, which gives rise to an "out-of-field" response to localized lung irradiation and hence more accurately describes the clinical picture of radiation pneumonitis. Reevaluation of the mechanisms of pulmonary injury from irradiation suggest that (a) a new term, sporadic radiation pneumonitis, should be introduced to describe the clinical picture of radiation pneumonitis, which is not adequately explained by the classical description and is quite clearly an entirely different process; and (b) that the chronic response to localized lung irradiation that leads to pulmonary fibrosis is largely mediated through the induction and release of tissues cytokines. |
Q:
How to wait (for 2 seconds) after the completion of function?
I have javascript function which executes and after the execution i want to wait for 2 seconds. Is it possible in Javascript or not.
My Question is different. I want to wait after function gets executed or completed its execution not for till the function executes.
Javascript function
function ajax_closeCall(onDone) {
// alert("Close Call invoked.");
closeCall_onDone = onDone;
var closeCallUrl = soapUrl + "?action=closeCall&parentSessionId=" + parentSessionId;
closeCall_http_request = getNewHttpRequest('text/plain');
closeCall_http_request.onreadystatechange = callback_ajax_closeCall;
// http_request.open("POST", soapUrl, true);
closeCall_http_request.open("GET", closeCallUrl, true);
closeCall_http_request.send(null);
}
function callback_ajax_closeCall() {
if (closeCall_http_request.readyState != 4) {
return;
}
if (closeCall_http_request.status == 200) {
if (closeCall_onDone) {
closeCall_onDone();
}
stopMonitorCallState();
ajax_getCallState();
} else {
// there was a problem with the request,
// for example the response may be a 404 (Not Found)
// or 500 (Internal Server Error) response codes
alert(getLabel("cmmm_error_closecallfailed"));
}
}
After the above function executes, wait for 2 seconds.
How to achieve this scenario.
A:
You wrap the code in a setTimeout:
setTimeout(function() {
// do your thing!
}, 2000);
|
Inhibition of interleukin-1 release by IX 207-887.
Compound IX 207-887 is a novel antiarthritic agent which inhibits the release of interleukin-1 (IL-1) from human monocytes and mouse peritoneal macrophages in vitro at concentrations which are achieved therapeutically in human rheumatoid arthritis and in animal models of arthritis. In the present studies IL-1 activity in conditioned media, homogenates or lysates was monitored using four independent assay systems. Biologically active IL-1 was determined by, a) the induction of latent metalloproteinase-release from rabbit articular chondrocytes, which is relatively specific for IL-1 and b) by a sensitive thymocyte proliferation assay. Immunoreactive IL-1-beta was assayed by RIA and ELISA. In all test systems IX 207-887 significantly reduced both biologically active and immunoreactive IL-1 in culture media, whereas the levels of IL-1 in homogenates or lysates were either unaffected or only marginally reduced. The release of other monokines tested, such as interleukin-6 and tumour necrosis factor-alpha, and the secretion of lysozyme were only marginally influenced. IX 207-887 neither affected the adherence of human monocytes nor markedly inhibited IL-1 or IL-2-induced thymocyte proliferation. In the chondrocyte test no IL-1 antagonistic activity of IX 207-887 could be observed. All of these data indicate that IX 207-887 has the novel property of being an inhibitor of IL-1 release. |
#pragma once
#include "opencv2/core/version.hpp"
#if CV_MAJOR_VERSION >= 2 && CV_MAJOR_VERSION <= 3
#include <iostream>
#include <stdlib.h>
#include <cmath>
#include "Bgs.h"
namespace bgslibrary
{
namespace algorithms
{
namespace dp
{
// --- Parameters used by the Adaptive Median BGS algorithm ---
class AdaptiveMedianParams : public BgsParams
{
public:
unsigned char &LowThreshold() { return m_low_threshold; }
unsigned char &HighThreshold() { return m_high_threshold; }
int &SamplingRate() { return m_samplingRate; }
int &LearningFrames() { return m_learning_frames; }
private:
unsigned char m_low_threshold;
unsigned char m_high_threshold;
int m_samplingRate;
int m_learning_frames;
};
// --- Adaptive Median BGS algorithm ---
class AdaptiveMedianBGS : public Bgs
{
public:
virtual ~AdaptiveMedianBGS() {}
void Initalize(const BgsParams& param);
void InitModel(const RgbImage& data);
void Subtract(int frame_num, const RgbImage& data,
BwImage& low_threshold_mask, BwImage& high_threshold_mask);
void Update(int frame_num, const RgbImage& data, const BwImage& update_mask);
RgbImage* Background();
private:
void SubtractPixel(int r, int c, const RgbPixel& pixel,
unsigned char& low_threshold, unsigned char& high_threshold);
AdaptiveMedianParams m_params;
RgbImage m_median;
};
}
}
}
#endif
|
PAPER in a Digital Age
On the cusp of its 10 year anniversary, Facebook announced the “Facebook Paper” app – a combination of social networking and content feed that seems strikingly similar to one of my favorite apps Flipboard, with some of the Facebook features included in the app. While there may be a patent dispute on the horizon there, first up is a trademark dispute ignited on the day of the announcement.
If you follow tech-related blogs, you have probably heard that after the announcement of the app, Paper by FiftyThree, another highly popular smartphone and tablet application that allows you to write and draw with a stylus, was a little jilted by Facebook’s use of PAPER.
As we have seen more and more lately (like here and here), the “little guy” FiftyThree took to their blog as a platform for their dispute to fight against the Goliath. The post indicates some evidence of confusion by consumers and the press, thinking that Paper by FiftyThree had been bought by Facebook. The post also mentions some fairly strong ties already between FiftyThree and Facebook and that Paper by FiftyThree supports sharing to Paper. And, the post uses the dirty “bully” word to describe what Facebook might become with these tactics.
In an effort to protect its rights in the wake of Facebook’s announcement, FiftyThree smartly filed a use-based trademark application for PAPER for “computer application software and services for smart phones and tablets, namely, software for use in writing on smart phones and tablets with either a stylus or finger; computer application software and services for creating, editing, and compiling content to share with others via a social network; computer graphics software; computer hardware and computer software programs and services for the integration of text, audio, graphics, still images, and moving pictures into an interactive delivery for multimedia applications.” They already have a registration for PAPER BY FIFTYTHREE for “computer application software for smart phones and tablets, namely, software for use in writing on smart phones and tablets with either a stylus or finger.”
Surprisingly, I could not find a pending trademark application for FACEBOOK PAPER or PAPER applied for by Facebook as of today. Given the strong ties between the companies, it would likely be hard for Facebook to claim they were unaware of FiftyThree’s use of PAPER. There are, however, over 150 pending applications and active registrations incorporating PAPER for goods and services relating to computer software and/or social networking, which lends credence to an argument that the term is diluted in the relevant industry. And by all accounts, it does not look like Facebook will be caving anytime soon to FiftyThree’s demands to change their name.
The dispute here is somewhat analagous to the SATURDAY dispute between SATURDAYS NYC and KATE SPADE SATURDAY, where a court ultimately determined that despite actual confusion by consumers, Kate Spade did not infringe Saturdays NYC’s trademark because SATURDAY was relatively weak in the apparel industry, the distance between the products, and the inclusion of the famous mark Kate Spade.
One takeaway from this latest public trademark spat is yet another reminder to encourage communication between your legal team and your marketing team, especially prior to launching a new product. This dispute has overshadowed Facebook’s advancements in their technology and their services. You have the chance to drive the narrative when you have a thoughtful legal, marketing, and PR strategy.
Latest Posts
DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
Privacy Policy (Updated: October 8, 2015):
JD Supra provides users with access to its legal industry publishing services (the "Service") through its website (the "Website") as well as through other sources. Our policies with regard to data collection and use of personal information of users of the Service, regardless of the manner in which users access the Service, and visitors to the Website are set forth in this statement ("Policy"). By using the Service, you signify your acceptance of this Policy.
The information and data collected is used to authenticate users and to send notifications relating to the Service, including email alerts to which users have subscribed; to manage the Service and Website, to improve the Service and to customize the user's experience. This information is also provided to the authors of the content to give them insight into their readership and help them to improve their content, so that it is most useful for our users.
JD Supra does not sell, rent or otherwise provide your details to third parties, other than to the authors of the content on JD Supra.
If you prefer not to enable cookies, you may change your browser settings to disable cookies; however, please note that rejecting cookies while visiting the Website may result in certain parts of the Website not operating correctly or as efficiently as if cookies were allowed.
Email Choice/Opt-out
Users who opt in to receive emails may choose to no longer receive e-mail updates and newsletters by selecting the "opt-out of future email" option in the email they receive from JD Supra or in their JD Supra account management screen.
Security
JD Supra takes reasonable precautions to insure that user information is kept private. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. However, please note that no method of transmitting or storing data is completely secure and we cannot guarantee the security of user information. Unauthorized entry or use, hardware or software failure, and other factors may compromise the security of user information at any time.
If you have reason to believe that your interaction with us is no longer secure, you must immediately notify us of the problem by contacting us at info@jdsupra.com. In the unlikely event that we believe that the security of your user information in our possession or control may have been compromised, we may seek to notify you of that development and, if so, will endeavor to do so as promptly as practicable under the circumstances.
Sharing and Disclosure of Information JD Supra Collects
Except as otherwise described in this privacy statement, JD Supra will not disclose personal information to any third party unless we believe that disclosure is necessary to: (1) comply with applicable laws; (2) respond to governmental inquiries or requests; (3) comply with valid legal process; (4) protect the rights, privacy, safety or property of JD Supra, users of the Service, Website visitors or the public; (5) permit us to pursue available remedies or limit the damages that we may sustain; and (6) enforce our Terms & Conditions of Use.
In the event there is a change in the corporate structure of JD Supra such as, but not limited to, merger, consolidation, sale, liquidation or transfer of substantial assets, JD Supra may, in its sole discretion, transfer, sell or assign information collected on and through the Service to one or more affiliated or unaffiliated third parties.
Links to Other Websites
This Website and the Service may contain links to other websites. The operator of such other websites may collect information about you, including through cookies or other technologies. If you are using the Service through the Website and link to another site, you will leave the Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We shall have no responsibility or liability for your visitation to, and the data collection and use practices of, such other sites. This Policy applies solely to the information collected in connection with your use of this Website and does not apply to any practices conducted offline or in connection with any other websites.
Changes in Our Privacy Policy
We reserve the right to change this Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our privacy policy will become effective upon posting of the revised policy on the Website. By continuing to use the Service or Website following such changes, you will be deemed to have agreed to such changes. If you do not agree with the terms of this Policy, as it may be amended from time to time, in whole or part, please do not continue using the Service or the Website.
Contacting JD Supra
If you have any questions about this privacy statement, the practices of this site, your dealings with this Web site, or if you would like to change any of the information you have provided to us, please contact us at: info@jdsupra.com.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address. |
[The peculiarities of speech disturbance in patients with arteriovenous malformations of the caudate nucleus and the thalamus].
Clinical and neuropsychological study of 28 patients with arteriovenous malformations (AVM) of the caudate nucleus and 36 patients with AVM of the thalamus has been conducted. After surgical removal of the caudate nucleus, speech disturbances developed in 4 out of 8 patients with left-side AVM and in 1 patient, a converted left-hander, with right-side AVM. All 5 patients had mild speech disturbances, which differed by character in dependence of the AVM location. In case of AVM location in the head of the caudate nucleus, the speech disturbances were represented by perseverations and were similar to those caused by the lesion in the Broca area. In case of the caudate nucleus lesion, naming was mildly affected that resembled temporal aphasia. After surgical removal of AVM in the left thalamus in 9 patients, complex and rather stable speech disturbances developed in 7 cases. They were featured by the signs of frontal and temporal aphasias, i.e. there were perseverations and disturbances of naming, auditory and speech memory. The peculiarities of speech disturbances in lesions of the caudate nucleus and the thalamus were well explained by their anatomic and functional correlations with different regions of brain speech cortex. Speech disturbances in various subcortical lesions are reviewed. In the authors' opinion, subcortical aphasias do not have any particular character but include the same factors in different combinations as cortical ones that is determined by the presence of common functional systems for speech support which comprise cortical and subcortical patterns. |
Mechanical strains induced by tubular flow affect the phenotype of proximal tubular cells.
The effects of flow-induced mechanical strains on the phenotype of proximal tubular cells were addressed in vivo and in vitro by subjecting LLC-PK(1) and mouse proximal tubular cells to different levels of flow. Laminar flow (1 ml/min) induced a reorganization of the actin cytoskeleton and significantly inhibited the expression of plasminogen activators [tissue-type (tPA) activity: 25% of control cells; tPA mRNA: 70% of control cells; urokinase (uPA) mRNA: 56% of control LLC-PK(1) cells]. In vivo, subtotal nephrectomy (Nx) decreased renal fibrinolytic activity and uPA mRNA content detectable in proximal tubules. Nx also induced a reinforcement of the apical domain of the actin cytoskeleton analyzed by immunofluorescence. These effects of flow on tPA and uPA mRNA were prevented in vitro when reorganization of the actin cytoskeleton was blocked by cytochalasin D and were associated, in vitro and in vivo, with an increase in shear stress-responsive element binding activity detected by an electrophoretic mobility shift assay in proximal cell nuclear extracts. These results demonstrate that tubular flow affects the phenotype of renal epithelial cells and suggest that flow-induced mechanical strains could be one determinant of tubulointerstitial lesions during the progression of renal diseases. |
According
to the UN Group of Experts on Congo, ninety eight percent of
artisanally mined gold—estimated at a value of between $383 and $409
million in 2013—is smuggled out of the country annually, and much of that gold benefits armed groups, corrupt Congolese army commanders, and neighboring countries such as Uganda.
Jewelry is the largest end-use of gold, making up around 45 percent of worldwide gold demand. Jewelry retailers have the ability to increase demand for conflict-free gold from Congo and the region. |
Most Windows users shut down the computer through the Windows Start Menu, probably. Probably, because statistical information is not available that would prove it.
While shutting down Windows through the Start Menu works, it is not the fastest option that you have at your disposal to shut down the operating system.
The following guide lists several methods that are usually faster. Included are methods that are built-in to Windows, and also methods that rely on third-party applications.
Most methods should work in all versions of Windows. The supported operating systems are listed if that is not the case.
Good old Alt-F4
Using Alt-F4 may not be the fastest method to shut down a PC running Windows, but it works in all versions of the operating system.
All you need to do is use the shortcut Alt-F4 while the desktop is active, and click ok when the Shut Down Windows prompt opens.
It is not the fastest option, as you need to click on the desktop first to make sure it is active, before you hit the shortcut.
You may hit Alt-F4 multiple times, as it will close any open program window when you do. You will reach the desktop eventually and trigger the shut down prompt.
Tip: you may use Windows-D to minimize all program Windows, then use Alt-F4 to bring up the menu.
The Windows-X menu
This option is only available on Windows 8 and newer versions of Windows. Use the shortcut Windows-X to open the menu, then press U, and U again.
The first U selects the Shut down or sign out menu, the second the Shut down command of the menu once you have selected it. While you may use the mouse for that as well, using the keyboard is usually a lot faster.
Start Menu Shut Down
We have established already that you can shut down Windows using the Start Menu. While most users may use the mouse for that, you may use the keyboard exclusively as well.
Press the Windows-key, then the right-arrow key on the keyboard, and finally the Enter-key. This selects shut down from the power menu under Start, and shuts down the computer.
Shutdown command
Shutdown is a built-in command that you can run to shut down the computer. To use it, press Windows-R to open the run box, then type shutdown /s /f /t 0. Note that you can also just type shutdown /s, but shut down is not enforced which means that processes may delay the operation.
/s refers to the shut down itself
/f means shut down is enforced, you may lose work that is not saved yet.
/t 0 sets the time before shut down happens to 0 seconds (immediately).
It is usually not that comfortable to type the command. What you can do is create a shortcut, and place it on your desktop so that you only have to click on it to shut down Windows.
Right-click on a free location on the desktop and select New > Shortcut.
In the location field, type the following command: %windir%\system32\shutdown.exe -s -t 0
Click Next to continue.
Name the shortcut or keep the name. This is the icon description that appears underneath the shortcut on the desktop.
If you are running Windows 7 or newer, you may pin the shortcut to the taskbar. This may be useful if you want a clean desktop, don’t display desktop icons by default, or prefer to use the taskbar for important activities.
Tip: You can assign a keyboard shortcut to the shortcut to run the command from any location on the system. Right-click the shortcut on the desktop and select properties from the context menu. Locate the Shortcut Field, click on it and pick a shortcut for it that you want to use, for instance Ctrl-F11 or any other shortcut that you are comfortable with and is not mapped by Windows or programs already.
Superfast Shutdown
Superfast Shutdown is a free program for Windows that does one thing when you run it: it shuts down the computer quickly.
You can read our review of Superfast Shutdown, and also download it directly from the review page as the developer website is no longer available.
Initially designed for Windows XP and Vista, it is compatible with all recent versions of Windows as well.
Closing Words
There are other methods to shut down Windows quickly, but they are usually slower than the ones mentioned. You can use the PowerShell command Stop-Computer for instance, or press Windows-L to lock the computer, and select shut down from the lockscreen afterwards
Now You: How do you shut down Windows?
Summary Article Name Fast Methods to shut down Windows Description The tutorial lists and explains several methods to shut down a computer running Microsoft's Windows operating system quickly. Author Martin Brinkmann Publisher Ghacks Technology News Logo
Advertisement |
Q:
How can convert one xml to another xml based on the tag value by xpath in PHP?
How can I convert xml to another xml format by using xpath? The xml file is dynamic,it could be any levels, different tags. The following xml is a sample:
<?xml version="1.0"?>
<student_info>
<total_stud>500</total_stud>
<student>
<id>1</id>
<name>abc</name>
<address>
<city>Pune</city>
<zip>411006</zip>
</address>
</student>
<student>
<id>1</id>
<name>bbc</name>
<address>
<city>Toronto</city>
<zip>82233</zip>
</address>
</student>
<student>
<id>2</id>
<name>wec</name>
<address>
<city>North York</city>
<zip>59522</zip>
</address>
</student>
</student_info>
To: all the student "id=1"
<?xml version="1.0"?>
<student_info>
<student>
<name>abc</name>
<city>Pune</city>
<zip>411006</zip>
</student>
<student>
<name>bbc</name>
<city>Toronto</city>
<zip>82233</zip>
</student>
</student_info>
A:
You probably want to use an XSL Transformation, which facilitates XPath.
You can use it from PHP like this: http://www.php.net/manual/en/book.xsl.php
The XSL for your example could look like this:
<?xml version="1.0" encoding="UTF-8"?>
<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" version="1.0">
<xsl:output method="xml" indent="yes"/>
<xsl:param name="id" />
<xsl:template match="/student_info">
<xsl:copy>
<xsl:apply-templates select=".//student[id=$id]"/>
</xsl:copy>
</xsl:template>
<xsl:template match="student">
<xsl:copy>
<xsl:copy-of select="name" />
<xsl:copy-of select="address/city" />
<xsl:copy-of select="address/zip" />
</xsl:copy>
</xsl:template>
</xsl:stylesheet>
You can pass the id parameter (used withing the stylesheet using <xsl:param> and $id) to the transformer using setParameter.
EDIT: Here is a slice of xsltCake to play around with: http://www.xsltcake.com/slices/dnuFXh Unfortunately it does not support parameters.
|
The present invention relates to a guide carriage for a linear bearing.
A guide rail for a linear bearing is made known in EP 1 052 480 A1. FIG. 1 of that publication shows a linear bearing, which is composed of a guide rail 3 and a guide carriage 7. The guide carriage is movably supported on the guide rail by four rows of rolling elements 21. To this end, the guide rail includes running surfaces 23 for the rolling elements on its diametrically opposed lateral surfaces. An incremental dimensional standard 29 for a position measuring device is provided on a lateral surface. The dimensional standard is formed by a metal strip, which is provided with a large number of similar, periodically located openings. A sensor 31 for scanning the dimensional standard is provided on the guide carriage.
Reference marks are also provided on the guide rail, in order to specify absolute positions, which serve as starting points for the position determination. The reference marks are designed as separate recesses 41 in the incremental dimensional standard, or as bore holes 41′ in the guide rail. In order to determine the absolute position of the linear roller bearing, the guide carriage must be moved—after the position measuring device has been started up—until the reference sensor detects a reference mark. With each subsequent motion of the guide carriage, the absolute position may be ascertained by adding the change in length—which is determined using the incremental dimensional standard—to the absolute position of the reference mark, with appropriate consideration for the sign.
Publication U.S. Pat. No. 5,563,408 makes known a further position measuring device with an incremental dimensional standard. Instead of the reference marks, a separate, absolute dimensional standard is used, which is located in parallel with the incremental dimensional standard on a single, combined dimensional standard. The absolute dimensional standard is provided with a chain code, i.e., a bit sequence, with which a predetermined number of adjacent bits results in an identification that occurs in only one position of the chain code. A predetermined absolute position of the position measuring device is therefore assigned to each identification. The bits of the identification are read by several adjacent sensors, so that the position measuring device may ascertain its absolute position after start-up, without changing its position.
It should be pointed out that an incremental dimensional standard makes it possible to perform position determination in a substantially more accurate manner than is possible with an absolute dimensional standard, since it uses an interpolation method in combination with the same separation. For example, with an incremental dimensional standard with a separation of 1 mm, the position may be determined exactly up to 0.001 mm. An interpolation method of this type is also disclosed in U.S. Pat. No. 5,563,408. According to FIG. 2, a separation period of the incremental dimensional standard is subdivided into eight parts.
To ensure that the incremental and absolute dimensional standards interact flawlessly, they must have the same separation that is exactly synchronous across the entire length of the dimensional standard, thereby ensuring that an absolute marking is unequivocally assigned to every incremental marking. This exact synchronization may only be attained, in a cost-favorable manner, when the absolute and incremental dimensional standards are designed as single pieces, as a combined dimensional standard. |
Craniotomy vs. craniectomy for posterior fossa tumors: a prospective study to evaluate complications after surgery.
Posterior fossa surgery traditionally implies permanent bone removal. Although suboccipital craniectomy offers an excellent exposure, it could lead to complications. Thus, some authors proposed craniotomy as a valuable alternative to craniectomy. In the present study we compare postoperative complications after craniotomy or craniectomy for posterior fossa surgery. We prospectively collected data for a consecutive series of patients who underwent either posterior fossa craniotomy or craniectomy for tumor resection. We divided patients into two groups based on the surgical procedure performed and safety, complication rates and length of hospitalization were analyzed. Craniotomies were performed with Control-Depth-Attachment(®) drill and chisel, while we did craniectomies with perforator and rongeurs. One-hundred-fifty-two patients were included in the study (craniotomy n =100, craniectomy n =52). We detected no dural damage after bone removal in both groups. The total complication rate related to the technique itself was 7 % for the craniotomy group and 32.6 % for the craniectomy group (<0.0001). Pseudomeningocele occurred in 4 % vs. 19.2 % (p =0.0009), CSF leak in 2 % vs. 11.5 % (p =0.006) and wound infection in 1 % vs. 1.9 % (p =0.33), respectively. Post-operative hydrocephalus, a multi-factorial complication which could affect our results, was also calculated and occurred in 4 % of the craniotomy vs. 9.6 % of the craniectomy group (p =0.08). The mean length of in-hospital stay was 9.3 days for the craniotomy group and 11.8 days for the craniectomy group (p =0.10). The present study suggests that fashioning a suboccipital craniotomy is as effective and safe as performing a craniectomy; both procedures showed similar results in preserving dural integrity, while post-operative complications were fewer when a suboccipital craniotomy was performed. |
237 F.3d 386 (4th Cir. 2001)
MICHAEL B. ABRAHAM; SHIRLEY B. KEATON; DON HENSLEY; HARRY H. NELSON; MILDRED J. STOKES, individually and on behalf of all others similarly situated, Plaintiffs-Appellees,v.COUNTY OF GREENVILLE, South Carolina, Defendant-Appellant,andPERRY EICHOR; JAMES E. MCDONALD; JAMES M. DORRIETY; DAVID WALKER, Defendants.
No. 00-1150.
UNITED STATES COURT OF APPEALS, FOR THE FOURTH CIRCUIT.
Argued: November 2, 2000.Decided: January 10, 2001.
Appeal from the United States District Court for the District of South Carolina, at Greenville.
G. Ross Anderson, Jr., District Judge. (CA-98-3201-6-13) COUNSEL ARGUED: Brent Overton Edgar Clinkscale, WOMBLE, CARLYLE, SANDRIDGE & RICE, Greenville, South Carolina, for Appellant. James Edward Bradley, WILSON, MOORE, TAYLOR & O'DAY, West Columbia, South Carolina, for Appellees. ON BRIEF: Jacquelyn D. Austin, Riche T. McKnight, WOMBLE, CARLYLE, SAN-DRIDGE & RICE, Greenville, South Carolina; Boyd B. Nicholson, Jr., HAYNSWORTH, MARION, MCKAY & GUERARD, L.L.P., Greenville, South Carolina, for Appellant. S. Jahue Moore, David L. Thomas, WILSON, MOORE, TAYLOR & O'DAY, West Columbia, South Carolina, for Appellees.
Before WILKINSON, Chief Judge, and WILKINS and MOTZ, Circuit Judges.
Affirmed by published opinion. Chief Judge Wilkinson wrote the opinion, in which Judge Wilkins and Judge Motz joined.
OPINION
WILKINSON, Chief Judge:
1
Several state court judges brought suit against the County of Greenville, South Carolina, under the federal wiretapping statute (Title III of the Omnibus Crime Control and Safe Streets Act of 1968, 18 U.S.C. §§ 2510 et seq.). Plaintiffs allege that the County illegally recorded the telephone calls they made from their offices in the County's Detention Center. Greenville County argues that its conduct was excused by the "law enforcement exception" to Title III, which permits wiretapping conducted by an "investigative or law enforcement officer in the ordinary course of his duties." 18 U.S.C. § 2510(5)(a)(ii). The district court rejected this argument as a matter of law. Because the County did not record the judges' phone conversations in the ordinary course of its law enforcement duties, and because the district court otherwise acted within its discretion, we affirm the judgment in favor of plaintiffs.
I.
2
In 1994, Greenville County, South Carolina completed construction on its new Detention Center. The Detention Center contained a jail, visitation facilities, and offices for law enforcement and administrative personnel. A separate section of the Detention Center con tained offices and courtroom facilities for city and county judges. This area was known as the Judicial Corridor.
3
While building the new facility, the County installed a recording system in the Detention Center. The system recorded incoming and outgoing telephone calls, seven days per week, twenty-four hours a day. According to the County, the system was intended to record the calls of the Detention Center's administrative personnel and the guards in the jail. The County contends that it installed the system for safety reasons and to ensure that Detention Center employees were properly carrying out their duties. In the past, private citizens had called the Detention Center complaining about prisoner mistreatment and other illegal conduct by the guards. The County believed that recording incoming calls would allow it to more fully investigate these complaints. Greenville County notified the guards and the administrative personnel in the Detention Center about the recording system. The County required these employees to sign consent forms acknowledging that their phone conversations might be monitored.
4
The system did not record all calls into the Detention Center. For instance, it excluded phones meant for use by inmates and attorneys. Nor did it record the pay phones in the Detention Center's lobby. However, the system did record the telephones in the Judicial Corridor. These included the lines used by the city and county judges. Whether the County intentionally or mistakenly recorded the judges was vigorously disputed at trial. Whatever the reason, it is clear that Greenville County never notified the judges that their calls were being recorded. In early 1998, the County installed a new recording system at the Detention Center. Again, this system recorded telephones in the Judicial Corridor.
5
In August 1998, Michael B. Abraham, a City Administrative Judge, began to suspect that his phone in the Judicial Corridor was wiretapped. On September 3, 1998, James McDonald, the jail administrator, confirmed Abraham's suspicions. McDonald informed Abraham that it was not possible for the County to remove the telephone lines in the Judicial Corridor from the recording system. According to McDonald, the recording system was attached to a single trunk line. Since the judges' extensions were part of that trunk line, they could not be individually removed from the system. On September 30, 1998, Greenville County deactivated the Detention Center's entire recording system.
6
Abraham and several other judges subsequently brought suit against Greenville County and four individual defendants in state court under the federal wiretapping statute (Title III of the Omnibus Crime Control and Safe Streets Act of 1968, 18 U.S.C. §§ 2510 et seq.). The defendants removed the suit to federal district court. A jury trial then commenced. On October 5, 1999, the district court declared a mistrial after determining that Greenville County had committed discovery abuses. The district court ordered Greenville County to engage in additional depositions and other discovery. Subsequently, plaintiffs agreed to dismiss the individual defendants in the case.
7
At the new trial in November 1999, the jury awarded plaintiffs $276,660.00 in damages. Greenville County subsequently moved, pursuant to Fed. R. Civ. P. 50(b), 59(a), and 59(e), for either a judgment as a matter of law, a new trial, or a remittitur and an amendment to the judgment. On November 24, 1999, plaintiffs filed a petition for attorneys' fees and costs pursuant to 18 U.S.C.§ 2520(b)(3). The district court denied Greenville County's motion in its entirety and granted plaintiffs' petition. Greenville County now appeals.
II.
A.
8
Title III of the Omnibus Crime Control and Safe Streets Act provides a civil remedy against any person who "intentionally intercepts" another person's wire, oral, or electronic communications. See 18 U.S.C. § 2520(a) & 18 U.S.C. § 2511(1)(a); see also Sanders v. Robert Bosch Corp., 38 F.3d 736, 739-40 (4th Cir. 1994). The term "intercept" means the acquisition of such communications through the use of any "electronic, mechanical, or other device." 18 U.S.C. § 2510(4). However, Title III creates a law enforcement exception by defining "electronic, mechanical, or other device" to exclude equipment "being used by . . . an investigative or law enforcement officer in the ordinary course of his duties." 18 U.S.C.§ 2510(5)(a)(ii).
9
Protecting the privacy of individuals who use the specified means of communication "was an overriding congressional concern [in enacting Title III]." Gelbard v. United States, 408 U.S. 41, 48 (1972). Title III commands respect for conversational privacy by requiring resort to the same system of warrants and neutral and detached review that has historically been used to safeguard the integrity of the person and of property. See 18 U.S.C. § 2516 (requiring a warrant for electronic eavesdropping not within one of the statutory exclusions). Title III represents an attempt by Congress to establish a system of electronic surveillance subject to rigorous safeguards. It protects an individual from all forms of wiretapping except when the statute specifically provides otherwise.
B.
10
Greenville County claims that the law enforcement exception excuses its recording of plaintiffs' telephone calls. However, monitoring the judges' calls simply was not part of the"ordinary course" of the County's law enforcement duties. See 18 U.S.C. § 2510(5)(a)(ii).* The County did not have an established policy of monitoring plaintiffs' calls. Indeed, the County contends that it recorded the judges only by mistake. Likewise, several of the individuals responsible for the installation and maintenance of the recording system testified that they knew that it was wrong to record the judges. Furthermore, the County has not suggested that it had any valid, law-enforcement related reason to record the judges. The judges were not under investigation and they were not suspected of breaking any law in the past. The County argues, however, that the pertinent question under the law enforcement exception is not whether the recorded conversations relate to the County's law enforcement duties, but whether the recording device itself is being used in the ordinary course of the County's duties. The County contends that it has satisfied the only relevant inquiry under the law enforcement exception: namely, it has shown that it installed the recording device in the Detention Center for a legitimate law enforcement purpose. The County maintains that the fact that the system innocently captured some additional conversations is irrelevant.
11
While the law enforcement exception is indeed generous in scope, the County's argument proves too much. The law enforcement exception does not authorize all conversations to be recorded by a wiretapping device so long as the device captured some conversations in the ordinary course of a law enforcement officer's duties. Rather, the law enforcement exception specifically focuses on whether the device is "being used . . . by an investigative or law enforcement officer in the ordinary course of his duties." 18 U.S.C. § 2510(5)(a)(ii) (emphasis added). Under the exception, some uses of the recording device are excused, while other uses are not. Thus, the incidental recording of guards' personal conversations on a prison's main telephone line would be covered by the exception, if the recording device was "being used" within the ordinary course of a prison warden's duties to record calls from the public into a prison. See Amati v. City of Woodstock, 176 F.3d 952, 955-56 (7th Cir. 1999).
12
This concept, however, is not a limitless one. As the district court noted, the courts "have considered different categories of phone calls recorded by a single recording system separately for application of the law enforcement exception." See, e.g. , Crooker v. United States Dep't of Justice, 497 F. Supp. 500, 503-04 (D. Conn. 1980) (distinguishing between inmates' personal calls and inmates' calls to their attorneys). Such an approach is necessary to prevent the law enforcement exception from swallowing the rule. See Amati, 176 F.3d at 955 (rejecting an open-ended interpretation of the exception to prevent it from overtaking Congress' intent). Very often, judges, attorneys, and other administrators share the same facilities with law enforcement personnel. If the law enforcement exception looked only to the wiretapping device, then law enforcement agencies could record all of the telephone lines in a building so long as some lines were monitored in the ordinary course of the law enforcement officers' duties. This cannot be what Congress meant. The law enforcement exception may not be read to allow a single recording device to deconstruct the whole system of separation of powers and permit law enforcement officers to routinely record the daily conversations of judges who may sit in cases to which law enforcement is a party.
13
The County contends that such widespread wiretapping could be prevented by limiting the exception only to cases in which the additional calls were recorded in good faith. However, Title III provides no basis for a good faith addition to the law enforcement exception. It is not our place to create a good faith exception where one does not exist. See 18 U.S.C. § 2520(d) (creating certain good faith defenses for violations of the wiretapping statute). The Act puts the onus upon the wiretapper to ensure that his activities are appropriate. In this case, the County could have ensured that its system would not subject the judges' calls to surveillance. When the recording system was installed in 1994, a county official told the workers who were installing the system not to record the lines used by the prisoners or their attorneys. The same official also should have instructed the workers not to record the judges' lines. We cannot expand the scope of the law enforcement exception to cover the County's alleged good faith mistake.
14
It is important to note, however, that the questions of whether the law enforcement exception applies and whether the County "intentionally intercepted" the judges' communications are separate inquires. Our determination that the law enforcement exception lacks a good faith component would not prevent the County from arguing that it did not "intentionally intercept" these conversations as required by 18 U.S.C. § 2511(1)(a); see also Sanders v. Robert Bosch Corp., 38 F.3d 736, 742-43 (4th Cir. 1994) (holding that under the Federal Wiretap Act, civil liability only attaches to intentional interceptions not inadvertent ones). In fact, the County made precisely this argument. The jury simply did not believe that the County's recording of the judges was inadvertent.
15
Our holding is a narrow one. We do not impugn the County's need to monitor for law enforcement purposes calls relating to Detention Center inmates and employees. See Amati, 176 F.3d at 955-56 (law enforcement exception applies to detention center's recording of calls to and from police station which captured employees' personal calls); United States v. Van Poyck, 77 F.3d 285, 291-92 (9th Cir. 1996) (law enforcement exception applies to detention center's recording of telephone calls by inmates); United States v. Paul , 614 F.2d 115, 116-17 (6th Cir. 1980) (same). Likewise, we do not suggest that overhearing personal conversations while conducting legitimate wiretapping activ ities violates Title III. Such incidental overhearing is endemic to surveillance. See Amati, 176 F.3d at 956 ("That personal as well as official calls were made on the line is irrelevant; all employees make personal calls on company phones; if all the lines are taped, as is the ordinary practice of police departments, then the recording of personal as well as of official calls is within the ordinary course."). Rather, we hold simply that the County's recording of the judges was not a legitimate surveillance activity because it did not occur in the ordinary course of the County's law enforcement duties. The district court properly determined that the law enforcement exception did not apply as a matter of law.
III.
16
The County also asserts numerous challenges to the actions of the district court in connection with the trial.
A.
17
The County argues that the district court failed to give the proper instruction with regard to whether the County "intentionally intercepted" the judges' communications. See 18 U.S.C. § 2511(1)(a). The court instructed the jury:
18
An act is done intentionally if it is done knowingly or pur posefully. That is, an act is intentional if it is the conscious objective of the person to do the act or cause the result. An act is not intentional if it is the product of inadvertence or mistake. However, the defendant's motive is not relevant and the defendant needs not to have intended the precise results of its conduct or have known its conduct violated the law.
19
The County argues that the district court's instruction failed to make clear that conversations recorded inadvertently cannot serve as the basis for an action under Title III. In its 1986 amendments, Congress changed the state of mind requirement in section 2511 from "willfully" to "intentionally." The County asserts Congress did so in order to avoid liability in cases such as this -namely, where the County willfully recorded conversations in the Detention Center, but did not specifically intend to record plaintiffs' conversations.
20
We do not think that the district court's instruction was improper. The court's instruction was consistent with Fourth Circuit caselaw as announced in Sanders v. Robert Bosch Corp., 38 F.3d 736 (4th Cir. 1994). Sanders noted that after the 1986 amendments, section 2511 now requires "that interceptions be intentional before liability attaches, thereby excluding inadvertent interceptions." Sanders, 38 F.3d at 742-43 (internal citations omitted). Consistent with Sanders, the district court instructed the jury that "an act is not intentional if it is the product of inadvertence or mistake."
21
The County had the opportunity to argue at trial that it did not possess the requisite intent. The jury did not accept this argument. Indeed, plaintiffs presented ample circumstantial evidence to convince the jury that the County intentionally recorded plaintiffs' lines. For instance, plaintiffs produced a confidential memorandum dated June 8, 1995, from Perry Eichor, the county official who decided to install the recording system, to the County Administrator. In this memorandum, Eichor reported that the County might be"inadvertently `eavesdrop[ping]' on other members of the Law Enforcement community." The memo further reported that all telephone lines in the 2000 series were being recorded. Since the judges' lines were part of the 2000 series, a jury could reasonably conclude that the County knew it was recording the judges well before Judge Abraham raised the issue in 1998.
B.
22
Next, Greenville County contends that the district court erred in declaring a mistrial and ordering additional discovery. During the first trial, the district court determined that the County had not been forthcoming in producing relevant documents. The County had responded to plaintiffs' discovery requests with boilerplate objections asserting that numerous privileges applied. Although plaintiffs requested the County to list its specific objections and produce a privilege log, the County failed to do either. The County also did not produce any additional documents. For their part, plaintiffs never filed a motion to compel. The County contended that it had informed plaintiffs that it possessed additional documents, which plaintiffs' counsel was free to examine. Plaintiffs' counsel countered that the County led them to believe that it had already produced all relevant documents. The district court declared a mistrial and ordered Greenville County to engage in additional depositions and other discovery. The court stated that even if the County did not intentionally impede the discovery process, the court would have granted a mistrial because of the lack of adequate discovery.
23
The County contends that this was error and it therefore is entitled to a new trial. We disagree. The County did not make a timely objection to the court's declaration of mistrial or its ordering of additional discovery. Further, the district court acted within the bounds of its discretion when it concluded that the County's responses were so inadequate as to constitute no responses under Rule 37. See Fed. R. Civ. P. 37(a)(3) ("[A]n evasive or incomplete disclosure, answer, or response is to be treated as a failure to disclose, answer, or respond."). Plaintiffs' request for documents was clear. The district court did not exceed its discretion in making sure that the County complied with its obligations under the discovery rules. Nor can we fault the district court for seeking full disclosure of documents."Active participation by a district judge in trial proceedings . . . is in itself neither improper nor unfair." Desjardins v. Van Buren Community Hosp., 969 F.2d 1280, 1281 (1st Cir. 1992) (per curiam).
24
Indeed, the district court's belief that the County had not produced all relevant documents was prescient. After the mistrial, the County produced additional documents that were crucial to plaintiffs' case. The most important document was the confidential 1995 memorandum in which Eichor admitted that the County might be "inadvertently `eavesdrop[ping]'" on the 2000 series of extensions, which included the judges' lines. Thus, we conclude that the district court did not abuse its discretion in ordering a new trial.
C.
25
Finally, Greenville County contests the district court's ruling on damages and attorneys' fees. For violations of Title III, plaintiffs may recover the greater of either their actual damages or their statutory damages. See 18 U.S.C. § 2520(c)(2). Section 2520(c)(2) provides for statutory damages of either $100 a day for each day of violation or $10,000, whichever is greater. Plaintiffs presented evidence that they used their phones for approximately 4,601 days while the phones were being wiretapped. Thus, there was a factual basis to award $460,100 in statutory damages. The jury awarded $276,660 in damages.
26
Greenville County argues that the district court's jury instruction on statutory damages erroneously mentioned deterrence, thereby permitting the jury to award punitive damages to the plaintiffs. The district court's instruction stated that:
27
The purpose of statutory damages is to compensate the judges for intangible losses from invasion of privacy such as shock, humiliation, embarrassment, shame, mental anguish, emotional suffering, and depression. Statutory damages also serve to deter defendants such as Greenville County from engaging in such invasions of privacy.
28
A jury charge must be construed in light of the whole record. See Spell v. McDaniel, 824 F.2d 1380, 1395 (4th Cir. 1987). A judgment will be reversed for error in jury instructions"only if the error is determined to have been prejudicial, based on a review of the record as a whole." Wellington v. Daniels, 717 F.2d 932, 938 (4th Cir. 1983). The district court's instruction did not prejudice the County. First, the court instructed the jury that it could award no damages if it found a de minimis violation. Second, during its deliberations, the jury inquired whether it could award less than the damages the district court had mentioned in its instruction. The court informed the jury that it could award a percentage of the damages. Finally, the jury awarded plaintiffs significantly less than the statutory damages plaintiffs were seeking. The combination of these factors show that the district court's instruction did not prejudice the County.
29
Finally, the County contends that the district court erred in awarding plaintiffs attorneys' fees and costs incurred after the court declared a mistrial because the mistrial was unwarranted. As discussed above, the district court's decision to declare a mistrial was within its discretion. Plaintiffs prevailed in the second trial. A prevailing party is entitled to reasonable attorneys' fees under the Act. See 18 U.S.C. § 2520(b)(3). For this reason, the court properly awarded the plaintiffs their attorneys' fees and costs.
IV.
30
The ordinary course of law enforcement's duties does not include recording the conversations of state judicial officers. The district court recognized this essential fact, and for the foregoing reasons, the judgment is
31
AFFIRMED.
Notes:
*
For this reason, it is unnecessary to decide whether the county officials who installed the recording system were "investigative or law enforcement officer[s]" under the law enforcement exception. See 18 U.S.C. §§ 2510(5)(a)(ii) & 2510(7).
|
We got a good bit of support in the comments, if that's what you mean by winning. All the marketers objected to the increase in pooling areas, and the SoCalGas proposal did not rule out keeping the current pools. A different group of commenters called for demand charge credits, and there was some support expressed for requiring capacity turnback.
-----Original Message-----
From: Steffes, James D.
Sent: Thursday, October 25, 2001 7:40 AM
To: Cantrell, Rebecca W.
Subject: RE: Comments of the Other Parties on El Paso System Reallocation, RP00-336
Are we winning? Any movement on our issues?
Jim
-----Original Message-----
From: Cantrell, Rebecca W.
Sent: Tuesday, October 23, 2001 7:33 PM
To: Lawner, Leslie; Allen, Phillip K.; Black, Don; Calcagno, Suzanne; Courtney, Mark; Dasovich, Jeff; Ermis, Frank; Fulton, Donna; Gay, Randall L.; Grigsby, Mike; Hewitt, Jess P.; Holst, Keith; Kaufman, Paul; Kuykendall, Tori; Mara, Susan; McMichael Jr., Ed; Miller, Stephanie; Nicolay, Christi L.; Smith, Matt; Sullivan, Patti; Superty, Robert; Tholt, Jane M.; Tycholiz, Barry
Cc: Steffes, James D.; Pharms, Melinda; Canovas, Guillermo
Subject: RE: Comments of the Other Parties on El Paso System Reallocation, RP00-336
The attachment summarizes all of the comments filed by other parties in this proceeding. They're now in alphabetical order by the party filing, and the ones that I added since last night are highlighted. Let me know if you'd like a copy of any of them.
<< File: Summary of 10-15-01 Comments.doc >> |
Sudanese Secession
After years of sectarian strife including violence in the border regions, the resource-rich south overwhelmingly voted in favor of seceding from the ideologically overbearing and more industrialized north. It may sound as if I’m talking about 1850s and 1860s America, but I am actually describing the modern situation in the African country of Sudan. Seven days ago on January 15, the southern states in Sudan finished a week-long vote in which they voted almost to a man (97-99% in favor in most cases) to secede from Sudan and form their own country.1
The roots of this conflict date back to the era of European colonialism. The Europeans brought with them many great gifts to the African continent: civilization, Christianity, infrastructure, medicine, farming techniques, and so on. But when they divided up the continent amongst themselves, they did so without regard to the ethnic and linguistic groups of the African population. To be fair, this was done unintentionally rather than maliciously; however, this meant that tribes from the same ethnicity woke up one day and found that they were in different countries. This kind of arbitrary drawing of political boundaries is just another example of the stupidity of borders which don’t reflect ethnic realities. To see what this looks like, take a look at the picture below, where the black lines are political borders and the orange lines are ethnic boundaries. They don’t even come close to matching.
After European colonialism ended, it would have made sense to redraw the map so that each ethnicity (or each group of closely-related ethnicities) would have their own country in which they could practice their own culture, speak their own language, and pursue their own self-determination. However, this ditching of artificial and now meaningless political boundaries in favor of real, organic ethnic borders did not happen for two main reasons. First, the petty dictators that took over after the Europeans left had no intention of lessening their own power and ability to become rich by dividing up their holdings. The second and more important reason is that the Western countries propping up these African countries with foreign aid wouldn’t have supported it. The governments and establishments in the West are fully committed to the Marxist doctrine that race and ethnicity are “social constructs” and therefore irrelevant. To admit that ethnic differences were important enough to redraw the African map would have fundamentally weakened their power at home where they were busily promoting the doctrines of diversity and racial egalitarianism.
Since the end of colonialism in Africa, the continent has been a bloodbath. There are a number of reasons this has been occurred: the ruthless and power-hungry character of the men who came to power, the inability of Africans to successfully run a Western-style democracy and society (a culture in which they were never designed to live), the lower average IQ of black Africans, making them more likely to resort to violence, and so forth. However, this list would be markedly incomplete without mention of the ethnic-linguistic-religious basis of many of these wars. Ethnicities who had lived in two, and sometimes three, separate countries for several hundred years wanted independence and self-determination in their own countries. People-groups with longstanding feuds or religious differences which were suppressed with the Europeans in control have flared up again, now that they are forced to share the governance of the same political entity. Remember this the next time some white liberal is wringing his hands about the plight of Africa; he was (and is) willing to sacrifice millions of black African lives by forcing artificial countries to remain intact just to keep his Marxist premise sacred: that ethnicity and race don’t matter.
Keeping all this in mind, let’s move on to the specifics of Sudan. Not only does Sudan have the misfortune of having two dozen or more ethnicities from a half dozen different ethnic groups within its borders and even straddling its borders, but a Muslim-Christian fault line splits the country east to west with a Muslim North and a Christian South. If diversity is our greatest strength, then Sudan should be one of the strongest countries in the world. But of course, diversity plus proximity equals warfare and conflict, not strength or unity. To make matters even worse, Sudan has the third-largest oil resources in sub-Saharan Africa, and these oil deposits straddle the religious and ethnic divides. The dotted red line on the map below is likely going to be the new border between north and south Sudan. The line roughly is the divide between the Muslim, Arabic-speaking Nubians in the north and the Christian and animistic Dinka, Nuer, and Azande (to name the main ones) in the south.
From 1983 to 2005, there was a bloody civil war between the Muslim-controlled government run out of Khartoum in the Arabic-speaking, Muslim-controlled north against the Christians and animists in the south.2 The Sudanese government was also fighting somewhat separate but very related conflicts in the east and west. Fighting was especially brutal in the southern area of Darfur (west Sudan) where the northern area of the oil reserves were within easy reach of the Muslim, government-funded militias. While atrocities were committed by both sides, the Muslims were by far the greater culprits, regularly engaging in genocide, kidnapping, and slave trading as unofficial government policy.3
Largely due to public outcry to end the violence from Western activists and the surrounding African countries, foreign intervention finally brought an uneasy peace in 2005. The peace agreement split the oil revenue between the north and south, gave the south regional autonomy, and called for an independence referendum in six years.4 This is the independence referendum which took place a week ago. I am quite glad that the independence referendum passed with such huge margins. While I think that the area that is going to become a new country should actually become several countries (e.g., the Dinka and Nuer don’t particularly like each other), the vote is certainly a victory for ethnonationalism and a step in the right direction towards peace.
Blue is the area that voted to secede, yellow is contested, pink may join south Sudan later this year, purple and green are the somewhat separate but very related areas of conflict in the east and west, and orange is the Muslim area.
A search for “Sudan” on some of the major American Evangelical Christian news services, such as Christianity Today, Christian Broadcasting Network, and World Magazine, brings up article after article all speaking very positively about the prospect of independence for southern Sudan, accounts of the violence against Christians by the Muslims, and well wishes for the southern Sudanese people. I have no problem with any of this, and I even agree with much of what I read, but imagine the difference in response by these services if this secession vote was about a white-controlled area trying to break off and form a more ethnically-linguistically-religiously homogeneous country. We don’t have to imagine. The slander and hatred heaped upon the Confederacy, the cheering of the NATO bombings of Republika Srpska, and the labeling of groups like Vlaams Belang and Lega Nord as evil white supremacists is more than enough to show that there is a blatant double standard when it comes to most American Christians’ treatment of ethnic self-determination. If you’re African, it’s fine and even laudable, but if you’re European, then it makes you an evil bigot.
I hope one day that Europeans will seek the God-given right to our own countries that the southern Sudanese are pursuing now, but until then, I have some advice for my fellow Christians in south Sudan. Don’t get rid of your AK-47s, don’t allow Muslims in your territory, don’t trust foreign governments, don’t try to set up a Western democracy, and don’t allow any international bankers in your territory to live. The best of luck to you in your independence.
Thorin Reynolds grew up in South Carolina and now resides in Texas. He holds an MBA as well as an undergraduate degree in political science. A native southerner, he has ancestors who fought with the patriots in the American Revolution, with the Texans at the Alamo, and with the Confederacy in the War for Southern Independence.
Newsletter
Receive F&H Updates By Email:
Email address:
Leave this field empty if you're human:
Faith & Heritage is a consortium of Christian writers from a traditionalist perspective. F&H features a diverse range of opinions among its writers, and any particular opinion expressed is not necessarily indicative of universal agreement among F&H admins or writers.
The superhero genre was one of the last quasi-traditional genres of American pop culture. Batman, Superman, and the other assorted heroes and villains literally came out of the early twentieth-century[…]
About
Remember the days of old; consider the years of many generations; ask your father, and he will show you, your elders, and they will tell you. When the Most High gave to the nations their inheritance, when he divided mankind, he fixed the borders of the peoples according to the number of the sons of God. - Deuteronomy 32:7-8 |
As its name implies, BSV tracks shorter-term U.S. government, investment-grade corporate and investment-grade international dollar-denominated bonds.
All of the bonds in BSV’s portfolio have maturities in the duration range of 1-5 years. With $21.59 billion of total assets under its belt and daily trading volume over $112 million, BSV is a huge fund with a lot of liquidity.
The fund is passively managed using index sampling. Its efficient management practices yield a low expense ratio of just 0.07%.
One of the main advantages that this shorter-term bond ETF offers over the long-term bond ETFs is reduced fallout from the Fed’s interest rate hikes, which are expected by many forecasters later this year.
You may be interested to know that BSV is held by many large investment banks, such as Bank of America (19.55 million shares), Wells Fargo & Company (14.94 million shares) and Morgan Stanley (8.02 million shares). Banks do this to diversify their portfolios and hedge against interest risk.
From the chart below, we can see that BSV experienced a sharp decline in late 2016, as it dropped to a low of around $78.75. Since then, the fund has rebounded and currently trades at around $79.80. Year to date, BSV’s return is 0.48%. BSV has a dividend yield of 1.59%.
BSV’s top five holdings in the portfolio are the U.S. Treasury 1.25% Note, 1.49%; U.S. Treasury 1.375% Note, 1.46%; U.S. Treasury 1.25% Note, 1.42%; U.S. Treasury 1.5% Note, 1.39%; and U.S. Treasury 1.125% Note, 1.35%.
BSV provides constant current income with high credit quality. If you are seeking a safe go-to investment in the bond market, we encourage you to look into Vanguard Short-Term Bond ETF (BSV) as a potential purchase. |
LEARN/CREATE (MT)
NOTE: When the Idaho Legislature is in session, programming on the Learn/Create and World channels may be pre-empted for live coverage from the House and Senate floors.
1:30 pm
French In Action"Getting Underway I"
In the courtyard of the Sorbonne. Robert and Mireille finally meet. Just as they are getting to know each other, Mireille rushes off, leaving Robert to contemplate the spring day and write a postcard to his mother.G
2:00 pm
Western Tradition"The First World War and the Rise of Fascism"
As the old empires crumble in the war, totalitarian states arise throughout Europe.G
2:30 pm
Western Tradition"The Second World War"
The war leaves Europe balanced between the first two superpowers: the Soviet Union and the United States.G
3:00 pm
Discovering Psychology - Updated Edition"The Behaving Brain"
Investigates the structure and composition of the brain: how neurons function, how information is collected and transmitted, and how chemical reactions determine every thought, feeling, and action.G
3:30 pm
Discovering Psychology - Updated Edition"The Responsive Brain"
Takes a closer look at how the brain, behavior and environment interact and how the brain's structure and functions are changed by stimulation from the social and physical context.G
4:00 pm
Curiosity Quest"Moonridge Animal Park"
Join Joel on this quest as he journeys through the Moonridge Animal Park in Big Bear, California. Watch as the Curiosity Quest crew gets up close, and personal with deer and experiences a rare, and endangered snow leopard. D
4:30 pm
Biz Kid$"Have A Plan, Stan!"
Explore the different elements of a business plan and see why it's crucial to develop a plan before you start your business. Meet a teen who opened a snow-cone shack, another who makes and sells candles, and a group who markets self-defense kits. D
5:00 pm
The Electric Company"Revenge of the Zeros"
Upset about their score of zero points in the banana sculpture contest, Danny and Annie decide to ruin Paul the Gorilla's banana festival party that is being held at The Electric Diner. The Electric Company catches on, and does everything they can to stop the pranksters and save the party and preserve Paul's sanity. D
5:30 pm
Cyberchase"Harriet Hippo and the Mean Green"
Hacker infects Motherboard with a new virus -- one that causes her to make cyber-citizens act mean. Digit and the kids go in search of an antidote: 2/5 of the Electro-Root, 2/8 of the Healing Stone, and 1/3 of a box of Hacker's wig gel -- a strange antidote indeed! Will the young cyber-heroes be able to gather the ingredients and figure out how to properly mix these odd fractions before it is too late? The Big Idea: Fractions that look different can represent the same portion of a whole. Math Topic: Equivalent Fractions. D
Cook's Country from America's Test Kitchen"Fancy Chicken"
Bridget shows Chris how to make the best Chicken Cordon Bleu. Next, Erin demonstrates how to cut a whole chicken. Then, Jack challenges Chris to a tasting of Black Forest deli ham. D
Christina"Making Over Your Life...."
begins in the kitchen. But what about all the foods you love? What about comfort foods? Are you to jump into healthy eating with both feet, leaving behind all that you adore? Nope.you just have to understand how to make your family faves healthier. D
8:00 pm
This Old House"Essex 2012/13, Clam Flats & Lightning Rods"
Kevin and Roger dig for clams, then finish up the barrier-free walk that leads to the house, using both granite and bluestone, but no steps. The standing-seam metal roof goes on, and Richard's creative ducting and plumbing will minimize the number of holes that need to go through it. A non-reactive lightning protection system is installed. D
8:30 pm
Rick Steves' Europe"Paris: Regal and Intimate"
Rick cruises the Seine River, visits Napoleon's tomb, and takes in the Louvre. He also shops in village-like neighborhoods, attends church in a grand pipe organ loft, and celebrates with a big, patriotic Bastille Day bang.G
9:00 pm
Joseph Rosendo's Travelscope"Passage Through Chile's Tierra Del Fuego Around Cape Horn"
Joseph travels around the tip of South America on an expedition passenger ship. He journeys into Beagle Channel and through "Glaciers Avenue" encountering elephant seals and Magellanic penguins.G
Cook's Country from America's Test Kitchen"Fancy Chicken"
Bridget shows Chris how to make the best Chicken Cordon Bleu. Next, Erin demonstrates how to cut a whole chicken. Then, Jack challenges Chris to a tasting of Black Forest deli ham. D
10:30 pm
Simply Ming"Dennis Lee & Cooking with the Binchotan"
Sitting by the dock of the bay at San Francisco's Ferry Plaza Farmers Market, Ming shows viewers some of the city's best street food. Gone are the days of hot dogs, pretzels and fried dough. In their place you'll now find restaurant quality food in the form of Korean tacos, wood fired pizzas and Roti. D
11:00 pm
Taste of Louisiana with Chef John Folse & Co.: Our Food Heritage"The Germans of New Orleans, Minden and Robert's Cove"
Germans immigrated to Louisiana in three waves, settling in various areas of the state. Frieda Arwe, Susie Lester and Josie Thevis guide us through their respective German communities in New Orleans, Minden and Robert's Cove. Sauerkraut making, shredding and salting cabbages in large barrels, was common among German Coast descendents. D
11:30 pm
Rick Steves' Europe"Paris: Regal and Intimate"
Rick cruises the Seine River, visits Napoleon's tomb, and takes in the Louvre. He also shops in village-like neighborhoods, attends church in a grand pipe organ loft, and celebrates with a big, patriotic Bastille Day bang.G |
The structure-function dilemma of the hammerhead ribozyme.
A powerful approach to understanding protein enzyme catalysis is to examine the structural context of essential amino acid side chains whose deletion or modification negatively impacts catalysis. In principle, this approach can be even more powerful for RNA enzymes, given the wide variety and subtlety of functionally modified nucleotides now available. Numerous recent success stories confirm the utility of this approach to understanding ribozyme function. An anomaly, however, is the hammerhead ribozyme, for which the structural and functional data do not agree well, preventing a unifying view of its catalytic mechanism from emerging. To delineate the hammerhead structure-function comparison, we have evaluated and distilled the large body of biochemical data into a consensus set of functional groups unambiguously required for hammerhead catalysis. By examining the context of these functional groups within available structures, we have established a concise set of disagreements between the structural and functional data. The number and relative distribution of these inconsistencies throughout the hammerhead reaffirms that an extensive conformational rearrangement from the fold observed in the crystal structure must be necessary for cleavage to occur. The nature and energetic driving force of this conformational isomerization are discussed. |
templates
‘cheeky magpie – the cheap and lazy crafter’ Actually this cute blog has some really lovely and ingenious ideas, tutorials and templates. Check out the hinged cat tutorial with template :: buttons to brads to make this cute flower :: cute and quick lace flowers. |
Science and FOI
Adam Corner and I have a piece It’s on Freedom of Information and science in the Times Higher this week. In fact, we’re the cover story. You can read it online, though the THE’s art work for the piece is a treat, worth the price alone (and the layout in the THE always makes more sense in print). You can also see Phil Batty’s leader on the topic, stressing that the academy is in the truth business so should embrace FoI.
Adam specialises in how the public treat climate science (see his posts for the Guardian) and our focus is climate science. As he pitched the idea to me, when it came to “climategate” it was often said that science was “asleep at the wheel” when FoI came calling, but maybe we could turn that question around and instead ask, was FoI legislation ready for science?
The answer, as ever, seems to be somewhere in the middle. Or at least, if FoI wasn’t ready for science, then we can argue that some fault lies with the scientific institutions, who could have played a more active role in the consultations over FoI in the late 1990s (i.e. they could have helped make the legislation reflect their needs better).
One of our key points is that science is a lot more than just the sort of ‘information’ you might be able to ‘make free’. To quote our piece:
The sort of knowledge that can be easily extracted using FoI requests is far-reaching but also inherently limited to information that is explicit. Numbers, calculations, reference lists – and, of course, emails – can all be placed squarely in the public domain. With enough of this type of explicit information, some aspects of the scientific process can be recreated. If you have someone’s raw data, you know the calculations they made and you can see their results, you are in a position to confirm or challenge their conclusions. But to what extent does this fully capture scientific knowledge?
Though we did also get and interesting comment from Jon Mendel, who argued FoI requests can throw up really interesting context you wouldn’t otherwise get. For example, everyday discussions between those working on a policy which Mendel suggests might provide a more “bottom-up perspective on how decisions are made and policies develop”. I thought that was interesting, though I’m not sure how broadly applicable it is (and I know climate researchers have views on the relevance of their emails…). I’d be interested to know about other peoples experiences of FoI – I have one blogged here.
If you have any other comments on the piece you’d rather discuss here than on the THE site, please feel free to (e.g. do you agree with our our conclusion that public engagement is the way forward? Or agree, but wish to elaborate on how?).
3 thoughts on “Science and FOI”
Not sure I understood Martin Robbins’ point that “research” is somehow different to all other academic tasks. Surely everything we do is, in the end, publicly funded and part of our job regardless of whether it is linked to a specific grant. (Although, could you request anonymous paper reviews under FoI?)
As for the UEA CRU situation, I think Skeptical Science do a relatively good job in their post published today. Neither side comes out well but the focus is somewhat skewed.
Anyway, my only experience of FoI was a journalist wanting to know the cost to the University of Manchester of some research I did for Manchester Science Festival on weekly rainfall patterns. (The work was spun as “Tuesday is the wettest day of the week” so I assume he wanted to do a “UoM wastes £10000 on rainfall junk” story.) Fortunately, I’d done the work over a weekend so I estimated the cost to the uni as 82p as I used some software for a few hours that the uni pays the licence for. It took me about 30mins to write a reply to the guy and two other members of staff were involved in preparing and sending out the reply for about 30mins overall.
I’ve used FOIA a lot, mainly to try to find out exactly what’s taught on some of the dafter courses. Universities have almost always resisted the requests (and here). It took three years and an Information Tribunal to get information from the University of Central Lancashire. They spent over £80,000 of taxpayers’ money in legal fees alone to try to stop me getting the information. They failed in the end, but it took time and effort.
I’ve only had FOAI used once on me. That was for emails, I think, connected with the herbalists who threatened UCL because I had said that their use of the term “blood cleanser” was gobbledygook. I just gave them all the emails.
I’m in favour of making as much raw data as possible available. Our analysis programs have always been available (free) on the web, and we are starting to put source code on the web too. If anyone asks they can have anything they want, without having to resort to FOIA. Digitised records from single channel recordings are big (up to 100 Mb per recording) but we are rapidly reaching the stage where it’s feasible to put them on the web too. In any case anyone can have them, just by asking.
Climate change, of all the areas I’ve ventured into, is the one where you have to be flameproof. When I wrote in the Guardian that UEA had made a mistake in giving the appearence of obstructing FOIA requests, both sides seem to think I was on the other’s side. Nevertheless i think that it’s becoming accepted that all data should be made available without having to resort to FOIA. It might be quite time-consuming to do this retrospectively, but once it is the norm, it shouldn’t take too long. |
<?xml version="1.0" encoding="utf-8"?>
<shape xmlns:android="http://schemas.android.com/apk/res/android"
android:shape="rectangle">
<solid android:color="@android:color/white" />
<corners android:radius="30dp" />
<stroke
android:width="1px"
android:color="@color/gray" />
</shape> |
Q:
Calculus/ zero or undefined ? with explanation
How can I know if the it suppose to be zero or undefined, because when I try to substitute in the original equation with 5/2 I will end up with a number and y. Same goes to (c) I will end up with x. So what shall I do?
It is more important to know the explanation rather than just the answer :) thanks in advance
A:
A tangent that is horizontal line at a given point, (in the first case), has slope zero, and so $dy/dx = 0$ at $x = 5/2$.
In the latter case, you will have that $dy/dx$ is undefined. Just substitute $y = -13/2$ into the equation for $dy/dx$ to see that the denominator of $dy/dx$ is then equal to $0$ at that value, and so $dy/dx$ is undefined there, since we cannot have division by zero.
|
Klinsmann has not called anyone else up so he will go into the Ireland game with a 21-man squad and several players will be hoping to impress.
Embed from Getty Images
[Jurgen Klinsmann looks on from the dugout at Craven Cottage during the USA vs. Colombia game]
The last time the two sides met was in April 2002, just prior to the FIFA World Cup in Korea/Japan. The game ended in a 2-1 win for the Republic of Ireland.
As much as this is billed as a friendly, both teams will want a result, as Ireland will be looking to regain a bit of form following their loss to Scotland, and the USA will be hoping to build towards the 2015 Gold Cup – which they are hosting.
This should be a good game, possibly open and end-to-end, but we expect that the USA will come out on top.
They played well against Colombia on Friday, and have enough quality to end 2014 on a high – something Klinsmann will be desperate to do. |
Roadrunners to close out regular season with four road games this week
Courtesy: UTSA AthleticsRelease: 05/16/2013
Courtesy UTSA Athletics
RELATED LINKS
SAN ANTONIO — UTSA will close out the regular season this week with a four-game road trip.
The Roadrunners (28-22, 12-11 WAC) will travel to Baylor (25-23) for a 6:35 p.m. contest on Tuesday before wrapping up Western Athletic Conference play at Louisiana Tech (19-34, 6-18 WAC) with a series which begins two days later (6/6/4 p.m.).
Tuesday marks the 36th all-time meeting between UTSA and Baylor and the Bears hold a commanding 29-6 advantage in the series. However, the Roadrunners have won two of the last three matchups, including a 5-3 victory on March 26 earlier this season.
Meanwhile, UTSA owns a 2-1 edge against the Bulldogs, incuding a 7-6 triumph in the last meeting, which was played on Feb. 18, 2001, in Ruston, La. |
Share This:
twitter
facebook
Originally posted to It’s Going Down
The warm weather is here, and prison rebels are wasting no time to get moving. After the short-lived but intense revolt in Holman Prison in Alabama, Texas prison rebels called for a work stoppage to start on April 5th. That shit certainly kicked off, but for many obvious reasons communication from folks on the inside has been difficult. On the first day of the strike, officials from 7 facilities claimed that they were on “lockdown”, and as of the beginning of this week, there are still 4 on lockdown. Of course, we know this is just a bullshit way to obscure the strikes that are popping off in several facilities. Authorities have been censoring mail and other communications, making it difficult to tell how folks are doing inside, and how many are left on strike. We have also heard from organizers than since the prisoners run the kitchen, they are not receiving adequate food, being thrown two peanut butter and jelly sandwiches a day.
There have been small solidarity actions popping up across the country, mostly aimed at spreading awareness of the strike, while also mentioning Alabama and attempting to prep people for whats coming in September. Locations that claimed solidarity with Texas rebels so far have been New York City, Milwaukee, Providence, Fayetteville, Kansas City, Tucson, Phoenix, Austin, and Houston. We are in contact with support organizers and have word that there are more solidarity actions being planned in other places. While most cities tended to hold small demos and distribute flyers, we heard Houston held an assembly to discuss future solidarity efforts with prisoners. This has us looking forward to September, and would encourage further gatherings everywhere to get ready to really roll out hard for prisoners across the country. What has been going on inside and outside with Texas rebels is a great preview to what could be accomplished in September. While visibility is something that can help keep people on the inside safer and put pressure on prison authorities, what more can we do to actually interfere and halt the functioning of prison society? What tactics and strategies are available to us on the outside that aren’t so easy on the inside? If we really want to see this shit burn, its got to happen everywhere! Looking just to the south, in Mexico, what have anarchists been doing to intensify struggle on the outside as rebels intensify inside? These are questions we want to ask ourselves and our friends as we use this summer to build and prepare for whats coming this fall.
Before we get to other prisoner related news, we also want to give a shout out to UC Davis for getting caught in your bumbling efforts to erase the famous pepper spray incident from the fucking internet. Are y’all even serious? You even spent somewhere around $175,000 to do it? Nice use of that tuition money, assholes. Good thing we could find so many angles from one google search!
Now for some more of that news from the Bloc:
When we’re writing prisoners it is vital that we read through the mail guidelines and suggestions that are available from their support sites. Some prisoners want you to send them radical literature and keep them updated on the rowdiness that is going down on the outside. Some do not or cannot due to their specific situations. Casey Brezik sent a letter out explaining a little more about his own situation and guidelines regarding mail sent to him:
Please be thoughtful regarding what you send me. Materials on inciting riots, advocating violence or insulting the pigs will not be allowed in. I’m under heavy surveillance which is almost certain to follow me upon my release. The secret service, FBI, Missouri Highway Patrol and the KCPD served the search warrant on my house. I was already under investigation by the FBI following my expedited deportation from Canada due to my involvement in the G20 protests in June 2010. Three months later I pulled this stunt. They even have an alias I was using as an illegal in Mexico…Interpol revealed my true identity in that case. It’s not cool when I’m getting pulled out of my cell to be interrogated by the gang task force at the request of some unknown entities. Next time it could very well be a 3 letter agency. So, be smart. If you want to show me solidarity, try to do so without expressing your hatred for those who have control of most every aspect of my life, including whether or not I receive my mail. Just think about what you’re sending me before you send it. I know they have some pretty twisted rules, but that’s just the way it is. Just because you can send me something doesn’t mean you should. User your better judgement please, because chances are if you don’t I’ll be paying the consequences in the long run. Thank you. Solid, Casey Brezik
This is a solid reminder from Casey that we could all take into serious consideration. Writing to prisoners is a simple act of solidarity, but it is not without risks for both those in custody of the state and those who are on the outside. There can be ramifications for everyone, most importantly for the person who is held captive. Please write carefully and be certain that the person you are writing wants the things you are sending. NYC ABC has a great, quick to read resource on writing prisoners that is worth reading through.
Tyler Lang is currently serving a 6-month house arrest sentence for freeing 2,000 mink from a fur farm, which later closed for business as a result. Because the state continues to bleed everyone of every possible petty penny, Tyler has to pay to be on house arrest and for the use of an ankle monitor. If you donate $3 that pays for one day of the ankle monitor fee. If you have more to spare, please do so! When we support our friends and comrades in the aftermath of struggles like this it is not only a support to them personally, but it serves to embolden us all to take greater risks knowing folks have our backs. Tyler is also gathering donations for medical for their sweet kitty, Precious, who was diagnosed with some serious medical conditions. Here is what Tyler’s support folks had to say:
Tyler has a broken heel and is on crutches, and is thus unable to work. So, he could use support during this period as he is confined at home and his injury is healing. If you’re able to, please make a donation to the support fund to help both Tyler and Kevin as they transition into these next phases of sentencing. Tyler also has an online wish list that you can visit to buy him items (which will be mailed directly to him) that will help him in these next months. Tyler appreciates all the love and support that have been shown to him and Kevin since their indictment. Let’s continue to show them that they have a community that cares about them.
Yesterday Jay Chase of the NATO 3 pleaded guilty to the secondary charge and will receive an additional one year sentence in the Illinois State Department of Corrections. Jay’s support folks made a brief update on the support site, but said more details will be forthcoming. This is likely to be an emotional time for Jay, so your letters of support and solidarity would mean the world right now. You can write Jay at:
Jared Chase M44710
Pontiac Correctional Center
PO Box 99
Pontiac, Illinois 61764
It looks like the wastes of human life at CCA Leavenworth are fucking with Eric King’s mail once again. This time it isn’t just directed at Eric, but at his entire pod at the prison. While mail has since resumed, CCA continue to try and harass inmates in Eric’s pod every way they can:
Yesterday, April 13th, Eric and the rest of his pod received all the withheld mail. Thank you to everyone who responded to the last call for support and sent off postcards, and letters to EK. Let’s keep those letters and postcards coming though! As always the mail means so much to Eric while he’s going through each and every struggle there at CCA Leavenworth. In addition to the mail finally coming in yesterday it was also the day that Eric filed a grievance in regards to there not being enough chairs for everyone in the pod.This means that some individuals in his pod are having to actually sit on the floor or on their bed when eating breakfast , lunch , and dinner.Today in response to the grievance, all of the chairs were removed from the pod and it was stated that nobody in the pod has medical clearance to be assigned a chair. Now everyone in the unit is having to eat while on the floor or on their bed. As per usual at CCA, a reasonable request is met with irrational and abusive responses. This is what EK continues to go through, so let’s let him know we are out here thinking of him , and fighting for him. EK Support Crew
In some good news, Rebecca Rubin has been moved to a half-way house. Earth First! reports that:
Rebecca Rubin has been released and moved into a halfway house! Sentenced in 2014 to five years in federal prison for numerous Earth Liberation Front and Animal Liberation Front actions—including the arsons of Vail Ski Resort and US Forest Industries, as well as liberating horses from and burning down BLM Wild Horse Facilities in California and Oregon—Rebecca is out of prison almost a year and a half before an expected release date of September, 2017. Glad you’re out, Rebecca! Don’t forget Rebecca’s birthday on April 18th!
We firmly believe that we need to know our enemies. Our enemies don’t just come in the form of state actors, but also those who are willing to do the bidding of the state. We also need to do what we can to neutralize, if not incapacitate, our enemies whenever possible. In an effort to do just that the Earth First! Newswire released information on snitchy Suzanne Nicole Savoie, former ELF cell member who turned state’s witness after being charged in the Superior Lumber Co. arson in Glendale, Oregon. Suzanne is teaching a workshop on creating pollinator habitat at the Living On Your Land Conference in Grants Pass, Oregon on April 16th. You can find out more about Savoie on the “About us” page of the Klamath-Siskiyou Native Seeds website. Earth First folks had this to say:
Individuals who have cooperated with or worked for the State in an effort to monitor and/or repress ecological resistance movements can never be trusted again in activist circles or resistance movements. Increasing pollinator habitat is an important topic, and we hope that people interested in it will seek guidance and teaching from trustworthy individuals to further this work for the wild.
For more information on Savoie and other informants see the Earth First! Informant Tracker.
We don’t suggest getting your information on supporting pollinators in their fight for survival from snitches or those who apologize for them. Fucking gross.
Speaking of knowing our enemies, we recently ran across this handy guide to white supremacist symbols and imagery. As the far right continues to gain traction and popularity, being able to quickly identify fascist bullshit is ever important. Out in Atlanta folks are gearing up to counter the Stone Mountain gathering of the klan:
On April 23rd, the Ku Klux Klan and white nationalists are holding a white power march on Stone Mountain. On the same evening, a racist concert gathering will be held at a yet to be disclosed location. We are coordinating a mass gathering on Stone Mountain to shut down the march and disrupt further white supremacist efforts. We are mobilizing locally and nationally for a show of anti-racist power on April 23rd at Stone Mountain. Our gathering time and location will be announced closer to the date—keep an eye out for updates.
This is rapidly approaching and we hope that folks who can’t make it down to the deep south will find ways of showing their solidarity from afar! We know y’all are pretty creative out there in anarchy land. We trust you can raise a ruckus wherever you are and folks in Atlanta will certainly receive the message.
Don’t forget to donate here to help with any possible arrests that might occur out there!
The same weekend as shit will be popping off with antifa in Atlanta, folks in Philly will be turning up for a weekend of resistance in support of Mumia’s fight against the prison’s horrendous medical care and lack of treatment for Hep C.
There are a number of Black Liberation prisoners in New York state who will be appearing or have already appeared before the parole board this year. Herman Bell was recently denied parole, making this the 8th time he has appeared and been rejected for release. Maliki Shakur Latine has an April parole board appearance. Both Jalil Muntaqim and Robert Seth Hayes will be appearing in June. All of these folks could use a letter of love and support:
Robert Seth Hayes #74-A-2280
Sullivan Correctional Facility
Post Office Box 116
Fallsburg, New York 12733-0116
Jalil Muntaqim* #77-A-4283
Attica Correctional Facility
Post Office Box 149
Attica, New York 14011-0149
Maliki S. Latine #81A4469
Shawangunk Correctional Facility
P.O. Box 700
Wallkill, New York 12589
Herman Bell #79C0262
Great Meadow Correctional Facility
11739 State Route 22
P.O. Box 51
Comstock, New York 12821-0051
We found this great interview with Ashanti Alston that is well worth a listen. Put this one on while you send a letter our to Ashanti’s comrade, Russell Maroon Shoats:
Russell Shoats
#AF-3855 SCI-Graterford
P.O. Box 246 Route 29
Graterford, PA 19426 – 0246
Finally, we would like to give a small shout out to anarchist nerds in the Bay area who have created a black bloc tabletop game, Bloc by Bloc. Basically, we want this. Wait, security culture. Allegedly we want this game. If we can’t get the dumpster fires started on the streets, we can at least get them started on the board in the meantime! It turns out you can download a rad print and play ready version of the game and until the fancy version gets produced you can hone your skills that way.
Keep your heads up friends, your hearts full and your baseball bats at the ready always…
– Your friendly career bad kids |
'SNL' Confirms They Will Only Trash Republicans
16 Apr 2012
Interviewed by Maureen Dowd, “SNL’s” Jim Downey and Seth Meyers don’t come out and confirm their intent to only destroy Republicans (and their children) in the coming months, but you need not read between the lines to see that this is the intent.
Let me translate for you:
“I don’t think it’s going to be as much fun as 2000 and 2008,” Jim Downey, the show’s inimitable satirist, told me. “When you have an incumbent president, it’s not wholly new.
Translation: I’m pretending we ridiculed Obama during the ’08 campaign, which we didn’t, and I am now making lame excuses as to why we won’t ridicule him in 2012. And in the next sentence, Seth Meyers is going to completely contradict what I just said.
“Comedy writers are incredibly promiscuous, and we want as many targets as possible,” agreed Seth Meyers, the clever “S.N.L.” head writer and “Weekend Update” anchor. “We really slowed down in the second four years of Bush.”
Translation: The reason I say, “we want as many targets as possible,” is to make it sound as though we also want to target Democrats, when of course we don’t. And when I say, “we really slowed down” during Bush’s second term, that means that, unlike Obama, we hit Bush hard during his first term, but I’m hoping people miss that rhetorical sleight of hand. Oh, and please don’t notice that I said it’s hard to mock a President during his “second four years” and Downey said “incumbent” — which one is as soon as they take office. What we really meant to say was, “We are shameless, unfunny shills for Obama.”
[Palin], like Joe Biden, inspires what Meyers calls “wet comedy” (as opposed to dry), and they both have what Downey calls “handles,” quirks of speech and personality that both writers and performers can latch onto.
Translation: And yet, even though Biden is the ripest target for comedy in decades, we take it much easier on him than we do the “dry” Romney because we don’t want to hurt Obama. Please understand that “SNL” is not about laughs. It’s about protecting the powerful when we agree with them. Political satire is dead in this country. With the help of Stewart and Colbert, we killed it. We’re just holding up the corpse to protect ourselves from criticism and hoping no one notices.
The five Romney sons have also taken a ribbing. The hilarious Bill Hader, playing an Anthony Perkins in “Psycho” version of the Fox News anchor Shepard Smith, interviewed the “S.N.L.” sons, noting: “I like creepy things and I love these guys. … Our thanks to Stephen King for creating those boys.”
Meyers says that “there’s something funny about a candidate with all these fully grown adult sons. When it comes to an adorable competition, they certainly don’t beat Sasha and Malia.”
Translation: When it comes to our mission of protecting Obama, the children of Republicans are not off-limits.
“S.N.L.” has always struggled with its Obama impersonation because Obama is “smooth without big handles[.]”
Translation: There’s plenty of funny to mine about Obama’s many gaffes (corpse-man?), his bizarre teleprompter addiction, the failed policies, lavish vacations, and golf fetish, but we won’t go there because those are the kind of jokes that might stick and hurt Our Precious One’s re-election chances.
Meyers recalled that, after the Navy Seals raid that killed Osama last year, the show did a sketch with Obama “getting his mojo back.”
Translation: We are White House Palace Guards who love us some Barack. |
WASHINGTON, DC: Pay to Play corruption in the Obama administration was widespread among top officials, especially Hillary Clinton, John Kerry, and Vice President Joe Biden. Sweetheart deals. Board positions on energy companies. Contributions to “foundations” and overt bribery were the currency of foreign governments and would-be policy influencers alike.
They found rich terrain in the Obama Administration. Usually funneling money through family members or lobbyists. The Hunter Biden scandal involving Burisma Holdings and the Rosemont Seneca equity fund is just the tip of an ever-growing and horribly corrupt iceberg.
Full of Schiff: Impeachment is a scam
Now we have an impeachment Star Chamber led by liars in chief Adam Schiff and Nancy Pelosi. They are focusing on the President’s phone call with Ukrainian President Zelensky. They accuse Trump of abuse of power for seeking cooperation with an official investigation by Attorney General William Barr and US Attorney John Durham.
As one wag noticed, this would be the first time a Republican President was impeached because of the crimes of a Democrat.
It would be amusing if it wasn’t so pathetic.
But Schiff has close ties to a notorious Ukrainian arms dealer. Schiff was also a frequent recipient of campaign cash from meth dealer and Hillary Clinton donor Ed Buck. Buck is the LA Democrat with a penchant for shooting up homeless black men with meth and having sex with them. He allegedly killed at least two of them and is currently being charged with two counts of murder.
Schiff has yet to disavow him and return his repeated donations.
Paul Pelosi has his own Ukrainian Gas Company
Pelosi’s own son Paul Pelosi Jr had his own connection as an officer with a Ukrainian natural gas company. Pelosi actually used his mother, Speaker Pelosi, in a promotional video for the company.
Pelosi Jr. earlier had served as an executive just under Mike Mozilla with Countrywide during the height of the mortgage crisis of 2008. Countrywide being one of the worse abusers in the mortgage debacle that almost destroyed America’s, and the world’s, economy.
Paul Pelosi Jr. made a fortune, walking away unscathed. This before starting a solar energy company to take advantage of huge Federal Government loan guarantees. Another money windfall for Pelosi, who walked away with a fortune when that company went bankrupt. Leaving the Federal Government and the taxpayers to make up for the losses.
Nevada Senator Harry Reid’s son Rory was involved in much the same scheme. Reid’s children, all lobbyists, got rich off fees and loan guarantees from solar companies with no sufficient market underpinnings. Both companies went belly up, leaving the Federal Government and the taxpayers holding the bag.
Hunter Biden in China
But it is Hunter Biden’s relationship with both China and Ukraine that illustrates the corrupt dealings of the Biden family business. Joe Biden started sucking up to China in 2012 when he toured the country with then-Vice President Xi Jinping. He then toured America with Xi as his guest.
In 2013 he went to China and took Hunter along on Air Force II.
Two weeks later Hunter incorporated an investment firm with John Kerry’s stepson, Christopher Heinz, and Whitey Bulger’s nephew. Shortly thereafter they received $1.5 billion dollars for the fund to invest in Chinese research companies.
Duel use technologies approved for export by Biden and Kerry
One of the companies they invested in was a Chinese arms company that imported technologies with dual-use purposes. The investment required the approval of both the White House and State Department. It should be little surprise that Secretary of State John Kerry and Vice President Biden saw to it that the deal went through.
Other investments of the Biden Heinz Bulger fund included a Chinese company that invested in AI technologies like facial recognition. Again duel use technologies, which will be incorporated into the modern police surveillance state that China has become. Thanks to Hunter and Joe Biden, and Christopher Heinz and John Kerry.
Kerry and Biden: Burisma and Ukraine
The Kerry, Biden connection continues in Ukraine, though with a twist. Hunter Biden’s dealings in Ukraine were so alarming to Christopher Heinz that he dissolved his working partnership with Hunter Biden because of it. It was too crooked. Too obvious. Too corrupt, even for Christopher Heinz. But John Kerry was still tied to it. In spades.
The origins of the Hunter Biden deal with Burisma dates back to 2014. Steve Hilton of Fox News laid out the timeline of events brilliantly last Sunday.
As well as the ties between Burisma, John Kerry, and a handful of Democrat Senators who supported a “cash for gas” initiative to purchase $50 million in natural gas from Ukraine.
Watch the latest video at foxnews.com
Devon Archer and Joe Biden: A curious series of events
On April 16, 2014, Burisma board member and Hunter Biden friend Devon Archer meets with Joe Biden to discuss Ukrainian natural gas. On April 18th Hunter Biden forms the holding company, Rosemont Seneca, that will be the conduit for Burisma’s money. Three days later, on April 21st, Joe Biden announces the program of US cash for Ukrainian gas, jumpstarting the initiative.
Coincidence? Certainly not. Then it gets even more interesting. Burisma appoints Hunter Biden to its Board of Directors. Even though he has no experience in oil or gas, or Ukraine, and doesn’t speak Ukrainian. It doesn’t matter. He is Joe Biden’s son. The fix is in.
Burisma pays Rosemont Seneca $186,000 per month, which Hunter Biden splits with Devon Archer. That’s $98,000 apiece, every month. Well more than the $50,000 a month figure bandied about by the media.
At the same time, Burisma pays Hunter Biden’s law firm a $300,000 retainer to handle legal affairs.
Burisma, Kerry, and David Leiter’s ML Strategies
Then Burisma hires John Kerry’s former Chief of Staff David Leiter to conduct lobbying on behalf of Burisma and Ukrainian natural gas. It pays Leiter’s consulting group, ML Strategies, $90,000.
Leiter makes $3,000 contributions, in three $1,000 payments, to Democrat Massachusetts Senator Ed Markey and New Hampshire Senator Jean Shaheen. Shaheen and Markey write a letter to President Obama supporting a “cash for gas” relationship with Ukraine, and calling for an expansion of Ukrainian natural gas exploration.
Burisma releases a press release praising Markey and Shaheen’s letter. Leiter also makes three $1000 contributions to Connecticut Senator Richard Blumenthal. Blumenthal immediately announces his support for the Ukrainian “cash for gas” initiative. (Steve Hilton: The real Ukraine scandal is US cash for gas — It involves the Bidens and a growing list of Dems)
Joe Biden work on behalf of ML Strategies
Shortly thereafter Joe Biden makes his famous trip to Ukraine where he demands the firing of the Ukrainian prosecutor Victor Shokin, who is looking into Burisma Holdings and Hunter Biden.
After the prosecutor is fired Hunter Biden’s lawyers file a brief with the new prosecutor in Ukraine, currying favor, and saying explicitly that the charges of corruption against Shokin were disinformation planted by Western governments.
Hunter Biden continues to receive payments from Burisma until April 2019, one month before Joe Biden announces his run for the Presidency. He has received close to $6 million dollars thus far. There are reports that Rosemont Seneca received an additional $900,000 payment intended for Joe Biden himself.
Hunter and Joe Biden’s admission of consciousness of guilt
This week Hunter Biden stepped down from the board of the Chinese holding company but retained his 10% equity investment. The owners of the company have yet to state what exactly Hunter Biden’s duties were. The same could be said of Burisma.
Joe Biden says he never discussed his son’s business affairs. Hunter says otherwise, in an interview with the New Yorker. Biden’s response to his son’s Burisma news. “I hope you know what you are doing”. Not exactly an endorsement. Certainly a recognition that Joe Biden knew what Hunter was up to. And he knew it stank to high heaven.
Joe Biden announced yesterday that his son will have no dealings with any government if he is elected President. This begs the question. If it is improper if Biden is President, then it was improper when Biden was Vice President. Rather than clearing Biden and his son, it is proof of consciousness of guilt, and acknowledgment of impropriety.
MBNA, Hunter Biden and Tom Brokaw
But this is not Joe and Hunter Biden’s first rodeo. Not in the least. Eleven years ago, just after Hunter graduated law school, he was given an executive position with MBNA, a credit card company in Delaware, paying $100,000 a year. Again with no history of banking knowledge.
Shortly afterward, Joe Biden receives over $200, 000 in contributions from MBNA. He then sponsors credit card legislation benefitting MBNA by making bankruptcy laws not apply to the majority of credit card debt.
As Tom Brokaw said to Biden at the time (Video of Tom Brokaw calling out Joe and Hunter Biden’s ‘corruption’ resurfaces amid Ukraine scandal – Newsweek)
“Wasn’t it inappropriate for someone like you in the middle of all this to have your son collecting money from this big credit card company while you were on the floor protecting its interests?”
Brokaw sets forth the case against Biden
“That’s a reference to your son being hired right out of law school by a big company here in Delaware that’s in the credit card business, MBNA. He got about $100,000 a year, as I recall. You received $214,000 in campaign contributions from the company and from its employees. At the same time, you were fighting for a bankruptcy bill that MBNA really wanted to get passed through the Senate making it much tougher for everyone to file bankruptcy. Senator Obama was opposed to the bill. Among other things, you couldn’t in fact claim that you had a problem because of big medical bills.”
“You voted against an amendment that would call for a warning on predatory lending. You also opposed efforts to strengthen the protection of people in bankruptcy. This is an issue that you’ve heard about before. Your son was working for the company at the same time. In retrospect, wasn’t it inappropriate for someone like you in the middle of all this to have your son collecting money from the big credit card company while you were on the floor protecting its interests?”
Biden response, as with all questions about Burisma: “Absolutely not!”
James Biden and the Obama billion-dollar housing contract
Joe Biden’s brother James has been feeding at the trough as well, securing a $1.2 billion dollar contract with the Pentagon, while his brother was Vice President, to build housing in Iraq. James Biden had no experience in construction or building houses, even though he landed a contract that would make Halliburton and Dick Cheney turn green. (Joe Biden’s Family Has Been Getting Rich off His Political Career for Decades – PJ Media)
Hillary Clinton and the corrupt Clinton Foundation
Then there is Hillary Clinton’s well-documented history of graft, pay to play, and unbridled corruption. The Uranium One scam. The Clinton Foundation slush fund. Stealing billions of dollars from Haiti by running all aid through the Clinton Foundation. Spending millions on Chelsea’s wedding, all paid for by the Clinton Foundation.
In 2016 Ukrainian donors gave more money to the Clinton Foundation than any other country. Roughy $10 million dollars. More than Saudi Arabia ($7.3 Million). Of course this pales in comparison to the $240 million the Clinton Foundation received in the Uranium One scam.
On a side note, the person who delivered the Uranium One sample directly to the Russians in Moscow was none other than FBI Director Robert Mueller. So many curious facts.
The Steele Dossier, the corrupt Ambassador Yovanovich
This doesn’t even touch on the Steele Dossier and Sydney Blumenthal getting dirt on Paul Manafort and Donald Trump from Ukraine and passing it on to the DNC, DOJ and FBI. It doesn’t touch on the Clinton loving Ambassador Yovanovich working with George Soros and Ukraine to manufacture dirt on Manafort and Trump and pass it on to the State Department and DNC.
Obama Brennan coup involved State Dept., DOD, DNI, DOJ, CIA and FBI
Or the fact that when the Hunter Biden / Burisma investigation was shut down, so was the investigation the Soros group that worked to find dirt on Trump. Or the recent revelation the Ambassador Yovanovich had a list of conservative American journalists illegally spied on.
Whether its political corruption. Or old fashioned self-enrichment. Barack Obama ran an administration where senior officials were lining their pockets in Pay to Play schemes on a level that would make Richard Nixon blush.
Draining the swamp of Democrat corruption and abuse of power
At the same time, senior intelligence and Justice officials were spying on a major Presidential candidate. Laying the groundwork for a rolling and ongoing coup against the duly elected sitting President of the United States, Donald Trump. That continues to this day.
The release of the IG Horowitz report next week on FISA abuse will demonstrate the abject corruption of the DOJ, FBI and our intelligence agencies. William Barr and US Attorney John Durham have earth-shaking indictments in the works that will, at long last, blow the lid off the Russia hoax. Exposing the coup plotters and bringing the final curtain to the Obama legacy.
Yet here we are in the midst of the current political impeachment crisis. The documented corruption and pay to play schemes at the very top of the Obama team must now be revealed and exposed. Joe Biden and John Kerry are as corrupt and dangerous as Hillary Clinton ever was.
We don’t have to take Joe Biden’s word for anything. We already have his confession.
Tom Brokaw calling out Joe-Hunter Biden’s corruption in 2008: “Wasn’t it inappropriate for someone like you in the middle of all this to have your son collecting money from this big credit card company while you were on the floor protecting its interests?” pic.twitter.com/CORqFD6w1a — Ibrahim (@ibrahimpols) October 5, 2019
Image by Pete Souza, White House Photographer |
I'm surprised just how little reporting there is on the phenomenon which has apparently been happening for the last few years. But it's very well documented on YouTube. Although it's difficult to find any which aren't mixed up with claims of aliens and the second coming of Christ.
Loud eery noises are being heard all over the world. Often accompanied by strong vibrations, strong enough to set off car alarms, yet not picked up as seismic activity.
My personal hypothesis: Experimental government aircraft. The first noise in this video reminds me of something I was researching awhile ago about concealed government aircraft that propel themselves at record speeds using explosions rather than a constant jet.
If there's evidence that this has been happening for ages, it's more likely that this is some yet unknown natural phenomenon.
At 8/31/2013 1:15:10 AM, Mirza wrote:Yes. Other than that - anecdotal evidence is not enough to prove these sounds are anything but naturally occurring phenomena or from man-made facilities.
Can you explain why it's the most likely candidate?
That's the most accurate scientific explanation, thus far. Keep in mind that other explanations are possible, but since there is no evidence for them, there's no reason to believe in them rather than what seems to be based on observations.
The sound has been going on for 20 minutes. They thought it was a tornado. Many people called in. No tornado spotted. A single sudden flash of light. And then the sound dissipates within a few seconds.
There's another clip in this video with flashing lights, as far as I've seen (still watching). But I suspect it was just an effect with the camera.
At 8/31/2013 1:31:06 AM, Mirza wrote:That's the most accurate scientific explanation, thus far. Keep in mind that other explanations are possible, but since there is no evidence for them, there's no reason to believe in them rather than what seems to be based on observations.
At 8/31/2013 1:31:06 AM, Mirza wrote:That's the most accurate scientific explanation, thus far. Keep in mind that other explanations are possible, but since there is no evidence for them, there's no reason to believe in them rather than what seems to be based on observations.
That doesn't answer my question.
You asked why it is the most likely candidate. Based on observations, scientific facts, and other empirical evidence, this phenomenon is the most likely candidate because no other explanations are evidential or plausible.
At 8/31/2013 1:38:45 AM, Mirza wrote:You asked why it is the most likely candidate. Based on observations, scientific facts, and other empirical evidence, this phenomenon is the most likely candidate because no other explanations are evidential or plausible.
Yeah, I get that. I am specifically asking for what observations, scientific facts and other empirical evidence you are referring to. |
MARK Bosnich has urged Socceroos skipper Lucas Neill to consider returning to the A-League.
The call comes on the back of Harry Kewell headlining the competition this year.
Kewell has been linked to Melbourne Victory with an official announcement imminent.
Neill yesterday was confirmed as a target of US club Seattle Sounders.
"Lucas could do far much more here for our A-League being the Australian captain," former Socceroo, now Fox Sports football analyst, Bosnich said.
"You never, never know. He could have a personal ambition to play in America."
Bosnich, the former Manchester United, Aston Villa and Chelsea gloveman, who made guest appearances for Central Coast in 2008, believes Neill will monitor Kewell's influence on the A-League.
Bosnich said Kewell's success may by the catalyst not only for Neill's return but also an influx of high-profile Socceroos, including Mark Schwarzer and Tim Cahill.
Bosnich, however, said playing at home in front of familiar audiences also may damage the reputations of legendary Socceroos who cannot adjust to the A-League.
"The other boys will be waiting to see if Harry comes and what type of effect he has on the A-League ," Bosnich said.
"If he comes, the other boys will see what sort of price range Harry would get and what type of effect he would have on the game.
"They'd see how it all goes for Harry before they think about coming back.
"It's not easy coming back, the A-League is of a good standard. It was always on my mind especially for the guest games I played in. What if you come back and things go a little bit pear shaped?"
The Sounders communications director Frank McDonald yesterday revealed Neill definitely was on the radar with the club set to make an announcement before mid July when the Major League Soccer transfer window again is open to trade.
"While we may have an interest in a player of Lucas Neill's qual- ity, we are always searching for players who can make us stronger," McDonald said.
"However, we are always tracking multiple players at various positions.
"Be assured that when we have reached terms with a player, we will have a statement."
Turkish media has reported that Neill - the former Galatasaray defender - has agreed to terms with the Sounders.
Neill, 33, in 2008 was a focal figure in the Sydney Wanderers' bid for an A-League licence.
Football Federation Australia last year rejected the club's bid.
The club was set to be based in Sydney's greater western sub- urbs - a key breeding ground for young talent. |
All relevant data are within the paper and its Supporting Information files. CLUE implementation, source code, and documentation are freely available from CRAN at <http://cran.r-project.org/web/packages/ClueR/index.html>
Introduction {#sec001}
============
Cell signaling controls various aspects of basic cellular processes including homeostasis, proliferation, survival, and cell fate decisions, and defects in mechanisms underlying these processes are associated with a wide range of diseases \[[@pcbi.1004403.ref001]--[@pcbi.1004403.ref003]\]. Protein post-translational modifications (PTMs), which can activate or inhibit protein function/activity, have emerged as key regulators of various signaling pathways \[[@pcbi.1004403.ref004]\]. Protein phosphorylation is a common type of PTM that increases the functional diversity of the proteome by altering target proteins between active and inactive forms for signal transduction and integration \[[@pcbi.1004403.ref005]\]. It is characterized by the addition of a phosphate group by a protein kinase to a serine, threonine, or tyrosine residue on a substrate protein \[[@pcbi.1004403.ref006]\]. Traditionally, protein phosphorylation has been studied largely using *in vitro* assays and, more recently, protein chip arrays \[[@pcbi.1004403.ref007]\]. However, kinase activities are often less specific *in vitro* compared to *in vivo* \[[@pcbi.1004403.ref008]\], and, as a result, *in vitro* analyses often result in a large number of false discoveries. Recent advances in mass spectrometry (MS)-based technologies \[[@pcbi.1004403.ref009],[@pcbi.1004403.ref010]\] make it possible to profile proteome-wide phosphorylation events *in vivo* for investigating signal transduction cascades \[[@pcbi.1004403.ref011]\], understanding complex diseases \[[@pcbi.1004403.ref012]--[@pcbi.1004403.ref014]\], and develop strategies for therapeuitc intervention \[[@pcbi.1004403.ref015],[@pcbi.1004403.ref016]\]. With isotopic/isobaric labelling techniques and increasingly label-free approach, proteome-wide phosphorylation events can now be identified and quantified at a single amino acid resolution with high precision \[[@pcbi.1004403.ref017],[@pcbi.1004403.ref018]\].
A key goal in a phosphoproteomics study is to identify the set of kinases and their corresponding substrates that underlie key signaling events \[[@pcbi.1004403.ref019]\]. Much progress has been made on developing computational tools to predict substrates of a given kinase using consensus sequence recognition motif \[[@pcbi.1004403.ref020],[@pcbi.1004403.ref021]\] and incorporating additional information such as protein structure \[[@pcbi.1004403.ref022]\] and colocalization \[[@pcbi.1004403.ref023]\]. Conversely, computational approaches have been proposed to identify kinases based on substrate recognition motifs and differentially phosphorylated substrates \[[@pcbi.1004403.ref016],[@pcbi.1004403.ref024]--[@pcbi.1004403.ref027]\]. It is estimated that there are over 500 kinases in human cells \[[@pcbi.1004403.ref028]\]. Most kinases phosphorylate not only many proteins but also many sites on the same protein. By analyzing phosphorylation sites (substrates) proteome-wide over a course of time, the dynamics of signaling cascades can be elucidated \[[@pcbi.1004403.ref029]\]. Since many substrates of a given kinase have similar temporal kinetics, clustering phosphorylation sites into distinctive clusters can facilitate identification of their respective kinases \[[@pcbi.1004403.ref008],[@pcbi.1004403.ref030]--[@pcbi.1004403.ref033]\]. To identify the kinases that underlie key signaling cascades, clustering algorithms such as *k*-means clustering and its variant fuzzy *c*-means clustering are frequently utilized to partition the phosphorylation sites into clusters with distinctive temporal profiles from which the corresponding kinases and their activity could be inferred \[[@pcbi.1004403.ref008],[@pcbi.1004403.ref030]--[@pcbi.1004403.ref033]\]. Fuzzy *c*-means clustering is an extension of the classic *k*-means clustering that allows a phosphorylation site to be assigned to multiple clusters with probabilistic "membership" scores \[[@pcbi.1004403.ref034]\]. While *k*-means clustering-based algorithms are computationally efficient and provide an intuitive separation and summarization of the temporal profiles \[[@pcbi.1004403.ref035],[@pcbi.1004403.ref036]\], their performance can be strongly influenced by the user-selection of the parameter *k*, which dictates the partitioning of the data into exactly *k* clusters. Thus, estimation of *k* becomes critical to generating biologically meaningful clusters. An underestimation of *k* will force unrelated phosphorylation sites to be assigned to the same cluster whereas an overestimation will split related phosphorylation sites across two or more clusters \[[@pcbi.1004403.ref037]\], hence confounding downstream analyses.
Numerous methods and metrics have been proposed over the years to estimate the optimal choice of *k* for *k*-means clustering-based algorithms. Popular approaches include internal indices such as Dunn index \[[@pcbi.1004403.ref038]\] and Connectivity \[[@pcbi.1004403.ref039]\], stability indices such as average proportion of non-overlap (APN), average distance (AD), average distance between means (ADM) \[[@pcbi.1004403.ref040]\], and the figure of merit (FOM) \[[@pcbi.1004403.ref041]\], and biological indices that measure biological homogeneity (BHI) or biological stability (BSI) \[[@pcbi.1004403.ref042]\]. However, none of these approaches assess the information content of resulting clusters using a formal hypothesis testing framework, nor are they specifically designed for analyzing phosphoproteomics data. Here we propose a knowledge-based CLUster Evaluation (CLUE) approach for determining the most informative partitioning of a given temporal phosphoproteomics data using a hypothesis testing approach. Our approach utilizes known kinase-substrate annotations from curated phosphoproteomics databases to first estimate the optimal number of clusters within a dataset and then identifies the enriched kinase(s) associated with each cluster. Using simulation studies, we show that CLUE outperforms several alternative approaches in identifying the optimal number of clusters. In addition, we apply CLUE on time-series phosphoproteomics datasets \[[@pcbi.1004403.ref012],[@pcbi.1004403.ref043]\] and identify key kinases associated with human embryonic stem (hES) cell differentiation and insulin signaling in 3T3-L1 adipocytes.
Results {#sec002}
=======
Overview of CLUE approach {#sec003}
-------------------------
Identification of key kinases that control the activation and inhibition of cell signaling is a critical step for characterizing signaling cascades in time-course phosphoproteomics studies. Since many substrates (phosphorylation sites) of a given kinase are may have similar temporal profiles, partitioning phosphorylation sites from a proteome-wide time-series study into informative clusters, each with a distinctive temporal profile, becomes vital toward identification of kinases that could explain the observed phosphoproteome. We developed a knowledge-based CLUster Evaluation (CLUE) framework that uses existing knowledge, known kinase-substrate annotations from curated phosphoproteomics databases, to guide the generation of biologically meaningful clusters. A schematic overview of CLUE is presented in ([Fig 1](#pcbi.1004403.g001){ref-type="fig"}). CLUE provides a framework to assess the most informative partitioning of a given temporal phosphoproteomics data. Specifically, CLUE estimates the optimal *k* for clustering data using *k*-means clustering-based algorithms (see [Materials and Methods](#sec011){ref-type="sec"} for details).
![Schematic overview of CLUE.\
The level of phosphorylation for each phosphorylation sites in the proteome are quantified in time-course by mass spectrometry. First, time-course profiles of phosphorylation sites are partitioned into clusters using a *k*-means clustering-based algorithm for a range of values for *k*. Next, the clustering result, for each *k*, is evaluated based on the correct clustering of known substrates of kinases, as annotated in the PhosphoSitePlus database \[[@pcbi.1004403.ref053]\], and an enrichment score is computed. The clustering with the highest enrichment score is reported as the optimal clustering along with kinases whose substrates are enriched within each cluster.](pcbi.1004403.g001){#pcbi.1004403.g001}
CLUE\'s performance over alternative approaches {#sec004}
-----------------------------------------------
To assess CLUE\'s ability to partition data into meaningful clusters and to assess CLUE\'s performance against alternative approaches for estimating *k*, we conducted studies using simulated phosphoproteomics data (see [Materials and Methods](#sec011){ref-type="sec"} for details). We generated scenarios where the data were simulated to have varying number of clusters. In each case, the clusters were generated based on a set of randomly selected temporal profile templates ([Fig 2](#pcbi.1004403.g002){ref-type="fig"}), each representative of a phosphorylation activity profile over seven time points. The goal was to assess how well each method performs in recovering the true number of clusters. We compared CLUE with eight popular approaches including those that use internal indices such as Dunn index \[[@pcbi.1004403.ref038]\] and Connectivity \[[@pcbi.1004403.ref039]\], stability indices such as average proportion of non-overlap (APN), average distance (AD), average distance between means (ADM) \[[@pcbi.1004403.ref040]\], and the figure of merit (FOM) \[[@pcbi.1004403.ref041]\], and biological indices that measure biological homogeneity (BHI) or biological stability (BSI) \[[@pcbi.1004403.ref042]\].
{#pcbi.1004403.g002}
Every method we tested computes an objective score for each *k* and reports the *k* with the best score. To facilitate a fair comparison of methods, we transformed the objective scores from each method into the range \[0, 1\] by using Min-Max normalization. After the normalization, the scores from methods that seek to minimize the objective function were further transformed into 1 minus the normalized Min-Max scores. First, we compared the performances of CLUE and other commonly used approaches including Dunn index, Connectivity, APN, AD, ADM, FOM, BHI, and BSI in estimating the optimal number of clusters for each of the scenarios with simulated data. In all cases, the fuzzy *c*-means clustering, an extension of the classic *k*-means clustering, was used to partition the data, and the results were largely the same even when *k*-means clustering was used.
Results from our simulation studies ([Fig 3](#pcbi.1004403.g003){ref-type="fig"}) reveal that in all cases, CLUE was able to accurately identify the true number of clusters in the simulated datasets whereas other methods were not as accurate. Importantly, the simulation studies also revealed some common biases with some of the methods tested. In particular, BHI, FOM, and AD have a tendency to overestimate the optimal number of clusters. In other words, while these methods are able to capture the lower bound on the optimal number of clusters, they fail to provide a reasonable upper bound. On the other hand, ADM, APN, BSI, Connectivity, and Dunn index appear to suffer from local optima and thus have a tendency to underestimate the optimal number clusters. In all cases, APN, BSI, and Connectivity reported the optimal number of clusters as 2, severely underestimating the true number of clusters. Although ADM appears to somewhat overcome the bias, it still suffers from local optima. While it is arguable that by observing the pivotal point in the reported scores, several of these methods may help in determining the optimal number of clusters when the true number of cluster is small, such a pivotal point may be less apparent when the number of true clusters is rather large, as one would expect in a high-throughput dataset. Although CLUE, BHI, and BSI utilize known kinase-substrate annotations in aiding their clustering evaluation process, their performances vary significantly perhaps due to how they utilize this information. CLUE\'s ability to make reasonably accurate predictions on the optimal number of clusters is attributable to it taking advantage of known information and using it to assess and penalize under/over clustering as it attempts to estimate the optimal number of clusters (see [Materials and Methods](#sec011){ref-type="sec"}). Similar results were obtained when the classic *k*-means clustering was used instead of the fuzzy *c*-means clustering ([S1 Fig](#pcbi.1004403.s001){ref-type="supplementary-material"}), indicating that CLUE\'s performance is not dependent on the type of *k*-means clustering-based algorithm. Together, these results highlight the advantages of using known kinase-substrate annotations in aiding optimal clustering of phosphoproteomics data.
{#pcbi.1004403.g003}
CLUE\'s performance as a function of completeness/accuracy of known kinase-substrate annotations {#sec005}
------------------------------------------------------------------------------------------------
Next, to assess how important the completeness of the known kinase-substrate annotations is in determining CLUE\'s performance, we simulated data such that only those kinases that had annotations for substrates in *g* out of the *k* clusters were considered. The goal of this simulation study was to determine how much known information is sufficient to help guide optimal clustering of the data. The scenario when *g* = 0 resembles the situation when no existing knowledge is available for use by CLUE. For a method that was designed to rely heavily on existing knowledge to aid clustering, CLUE, as expected, is unable to correctly predict the true number of clusters in the simulated data when *g* = 0 ([Fig 4A](#pcbi.1004403.g004){ref-type="fig"}). However, as *g* is set to higher values, CLUE\'s ability to accurately predict the true number of clusters improves dramatically.
{#pcbi.1004403.g004}
Having established how valuable existing knowledge is in aiding correct clustering of high-throughput phosphoproteomics data, we next sought to assess the extent to which incorrect annotations (noise) may influence CLUE\'s performance. To this end, we simulated different levels of noise by requiring 10%, 20%, 40%, 60% or 80% of the substrates to have incorrect kinase assignments, similar to what one might encounter in real-world. As one would expect, CLUE performed poorly when the noise was set at 80% ([Fig 4B](#pcbi.1004403.g004){ref-type="fig"}). However, CLUE was able to consistently recover the true number of clusters even when a substantial percentage, up to \~40%, of the annotation is incorrect. Overall, these simulation results demonstrate that CLUE is robust and powerful in estimating the true number of clusters based on simulated phosphoproteomics data.
CLUE\'s performance as a function of data noise and number of time points {#sec006}
-------------------------------------------------------------------------
Given that later time points post stimulus in phosphoproteomics studies capture non-functional phosphorylation \[[@pcbi.1004403.ref044]\], we sought to assess CLUE's performance as a function of "noisy" data wherein last one or two time points were simulated to be random noise, reflecting non-functional phosphorylation. As expected, we observed a noticable drop in CLUE's performance with increasingly more time points affected by noise ([S2 Fig](#pcbi.1004403.s002){ref-type="supplementary-material"}). This observation highlights the importance of time point selection in phosphoproteomics experimental design. We also assessed CLUE's performance as a function of the number of profiled time points. In theory, the more the number of time points, the more the chances of capturing the subtle differences in the temporal kinetics, and thus the more the number of clusters one may infer. To test this, we varied the number of time points used for representing temporal patterns in the simulation studies. Specifically, we compared results based on data from all seven time points against those from four (1, 3, 5, 7) or three (1, 4, 7) time points. Although using data from just four time points correctly predicted the number of true clusters, the levels of uncertainty was noticeably higher (error bars in [S2 Fig](#pcbi.1004403.s002){ref-type="supplementary-material"}, middle panel). Using data from fewer (three) time points leads to underestimation of the true number of simulated clusters ([S2 Fig](#pcbi.1004403.s002){ref-type="supplementary-material"}, right panel). Thus, we conclude that the number of time points required for dissecting various kinases depends on the profiled signaling processes. If the signaling processes have complex temporal features, fewer than sufficient number of time points may not provide the necessary resolution to distinguish them from each other and CLUE will likely group them into a single cluster.
Using CLUE to Identify key signaling events from phosphoproteomics data {#sec007}
-----------------------------------------------------------------------
To demonstrate how valuable CLUE would be in identifying key signaling events from high-throughput phosphoproteomics data, we applied CLUE on two previously published SILAC-based temporal phosphoproteomics datasets on differentiating human embryonic stem (hES) cells (five time points) \[[@pcbi.1004403.ref043]\] and insulin activation in mouse 3T3-L1 adipocytes (nine time points) \[[@pcbi.1004403.ref012]\].
### Human embryonic stem cell differentiation {#sec008}
CLUE estimated the optimal number of clusters in hES cell differentiation dataset to be 11 ([Fig 5A](#pcbi.1004403.g005){ref-type="fig"} and [S1 Table](#pcbi.1004403.s003){ref-type="supplementary-material"}). The temporal profiles of substrates within clusters generated using the *c*-means clustering with *c* = 11 are shown in [Fig 5B](#pcbi.1004403.g005){ref-type="fig"}. Evaluation of substrates within each cluster against known kinase-substrate annotations revealed enrichment of substrates known to be phosphorylated by specific kinases ([Fig 5C, 5D and 5E](#pcbi.1004403.g005){ref-type="fig"} and [S2 Table](#pcbi.1004403.s004){ref-type="supplementary-material"}). Notably, substrates of kinases p90RSK, p70S6K, and PKACA (catalytic subunit of cAMP-dependent protein kinase alpha (PKA)) from the AGC subfamily \[[@pcbi.1004403.ref045]\] are enriched in a single cluster (cluster 6). The temporal profile of cluster 6 shows acute activation of this pathway within 30 minutes of hES cell differentiation initiation ([Fig 5B](#pcbi.1004403.g005){ref-type="fig"}). The enrichment of p90RSK (*p* = 1.5 x 10--6), p70S6K (*p* = 2.6 x 10--6), and PKACA (*p* = 6.8 x 10--5) substrates within a cluster suggests a role for AGS subfamily of kinases in the signaling cascades critical for the hES cells to exit from their self-renewing pluripotent state. Indeed, consistent with the fast activation of p70S6K substrates during hES cell differentiation ([Fig 5B](#pcbi.1004403.g005){ref-type="fig"}), a previous study of mTOR/p70S6K pathway in hES cells showed that differentiation can be induced by simply overexpressing constitutively active p70S6K \[[@pcbi.1004403.ref046]\]. In contrast, the substrates of CDK2 are found to be enriched in cluster 9 with a decreasing activity through profiled time points. Together, these results are consistent with findings from the original study which reported an increased activity of PKA and a decreased activity of CDK2 \[[@pcbi.1004403.ref043]\]. Another key kinase known to play a role in embryonic stem cell signaling is the extracellular signal-regulated kinase (ERK) \[[@pcbi.1004403.ref047],[@pcbi.1004403.ref048]\]. Consistent with ERK\'s role in embryonic stem cell differentiation, we find an enrichment of ERK substrates (*p* = 2.1 x 10--6) among those in cluster 3 ([Fig 5C, 5D and 5E](#pcbi.1004403.g005){ref-type="fig"}), suggesting an important role for ERK signaling in hES cell differentiation.
{#pcbi.1004403.g005}
### Insulin activation {#sec009}
For the insulin stimulated adipocyte dataset, CLUE estimated the optimal number of clusters to be 17 ([Fig 6A](#pcbi.1004403.g006){ref-type="fig"} and [S1 Table](#pcbi.1004403.s003){ref-type="supplementary-material"}). [Fig 6B](#pcbi.1004403.g006){ref-type="fig"} shows the temporal profiles of substrates within clusters generated using the *c*-means clustering *c* = 17. We found substrates of many kinases known to respond to insulin activation enriched in our clustering result ([Fig 6C, 6D and 6E](#pcbi.1004403.g006){ref-type="fig"} and [S2 Table](#pcbi.1004403.s004){ref-type="supplementary-material"}). Specifically, cluster 2 is enriched for a group of fast responding substrates upon insulin stimulation. The kinases that are found to be highly enriched in this cluster are Akt1 (*p* = 4.8 x 10--7) and PKACa (*p* = 2.5 x 10--3). Interestingly, phosphorylation sites in cluster 7 are enriched for mTOR substrates (*p* = 5.7 x 10--3), which is known to act downstream of Akt1 in the insulin pathway \[[@pcbi.1004403.ref012]\]. As one would expect, the temporal profiles of sites in cluster 7 (mTOR) exhibits relatively delayed activation compared to sites within cluster 2 (Akt1). While it is clear that most of the known Akt1 and mTOR substrates are partitioned into clusters 2 and 7, respectively ([Fig 6D](#pcbi.1004403.g006){ref-type="fig"}), a few known substrates of Akt1 and mTOR are grouped together in cluster 9, with a temporal profile suggesting prolonged activation ([Fig 6B](#pcbi.1004403.g006){ref-type="fig"}). We also find an enrichment for ERK substrates in cluster 17 (*p*\<3.5 x 10--5) ([Fig 6C](#pcbi.1004403.g006){ref-type="fig"}). ERK pathway is known to play an important role in insulin signaling \[[@pcbi.1004403.ref049]\] and is known to intersect with Akt1/mTOR pathway to co-regulate downstream functions \[[@pcbi.1004403.ref050]\]. Our analyses revealed that while Akt1 substrates respond much faster to insulin stimulation than mTOR substrates which are consistent with the results reported by the orginal study \[[@pcbi.1004403.ref012]\].
{#pcbi.1004403.g006}
We compared CLUE\'s performance in recovering known kinases associated with hES cell differentiation and insulin activation with those by other approaches and found that CLUE can reliably recover kinases that underlie these two processes ([Table 1](#pcbi.1004403.t001){ref-type="table"}). Taken together, these results demonstrate the usefulness of CLUE in facilitating the discovery of key signaling events from temporal phosphoproteomics data by generating biologically meaningful clusters.
10.1371/journal.pcbi.1004403.t001
###### Comparison of CLUE with alternative approaches on the two phosphoproteomics datasets.
{#pcbi.1004403.t001g}
hES cell differentiation Insulin activation
-------------- -------------------------- -------------------- ---------- ---------- ---------- ------ ---------- ---------- ---------- ----------
CLUE 11 2.6x10-6 1.5x10-6 6.8x10-5 2.1x10-6 17 4.8x10-7 2.5x10-3 5.7x10-3 3.5x10-5
Dunn 7 1.7x10-6 3.4x10-4 1.3x10-4 NS 4 2.7x10-3 1.3x10-3 ns 1.1x10-6
BHI 22 2.2x10-7 5.3x10-4 ns 4.1x10-5 4 2.7x10-3 1.3x10-3 ns 1.1x10-6
connectivity 2 2.0x10-2 ns ns ns 2 ns ns 3.1x10-2 ns
BSI 2 2.0x10-2 ns ns ns 2 ns ns 3.1x10-2 ns
APN 2 2.0x10-2 ns ns ns 2 ns ns 3.1x10-2 ns
ADM 2 2.0x10-2 ns ns ns 2 ns ns 3.1x10-2 ns
AD \>30 \- \- \- \- \>30 \- \- \- \-
FOM \>30 \- \- \- \- \>30 \- \- \- \-
ns, not significant;-, not applicable
Discussion {#sec010}
==========
Identification of key kinases that control activation and inhibition of specific signaling events is critical for characterizing signaling networks. In this study, we described a knowledge-based CLUster Evaluation (CLUE) approach that enables identification of key signaling events from temporal phosphoproteomics data by utilizing known kinase-substrate annotations. Our simulation studies show that CLUE outperforms many alternative methods in recovering the underlying clusters from temporal datasets. To test how CLUE can be utilized for real-world applications, we analyzed temporal phosphoproteomics datasets generated from hES cell differentiation and insulin activation of adipocytes. The understanding of self-renewal and differentiation of hES cells is a subject of major scientific interest due to its applications in cancer treatment and regenerated medicine \[[@pcbi.1004403.ref051]\]. It is widely acknowledged that signaling pathways play critical roles in maintaining the pluripotent state of ES cells \[[@pcbi.1004403.ref052]\] and therefore, the identification of kinases that are involved in hES cell self-renewal and differentiation is of great importance. Similarly, the insulin signaling pathway plays a key role in regulating and maintaining the physiology of the adipocytes. Therefore, the characterization of the kinases that are the key components in insulin signaling allows potential clinical application to be targeted at different pathway levels. Using CLUE, we were able to identify and characterize several known and novel kinases that are key regulators in hES cell differentiation and insulin signaling. Furthermore, CLUE can also be used to discover novel substrates for active kinases of interest. For instance, in our analyses of the insulin activation data, many known Akt substrates (AS160 Ser595, PFKFB2 Ser469, and BAD Ser136) and mTOR substrates (FRAP Ser2481 and IRS1 Ser632) that have not yet been annotated in PhosphoSitePlus are ranked highly based on the membership score of *c*-means clustering ([S1 Table](#pcbi.1004403.s003){ref-type="supplementary-material"}). Thus, not only does CLUE help in the identification of key kinases but also may facilitate identification of novel substrates of kinases.
It is conceivable for a phosphatase to coordinately dephosphorylate a subset of substrates of a given kinase, in which case a subset of substrates of that kinase is expected to exhibit a similar temporal profile and thus clustered together in our analysis. Moreover, increases as well as decreases in substrate phosphorylation levels of a given kinase could be due to elevated (reduced, resp.) kinase activity and/or reduced (increased, resp.) levels of corresponding phosphatase. Either way, even in the absence of phosphatase-substrate information, as long as substrates that belong to a key signaling cascade exhibit similar temporal profile (increasing/decreasing), CLUE will infer them to belong to a cluster and identify putative kinases associated with the cluster. Depending on whether the phosphorylation levels of the substrates within a cluster over the time-course are up/down, one can infer whether that signaling pathway is activated or inactivated. For example, in our analysis of the hES data ([Fig 5](#pcbi.1004403.g005){ref-type="fig"}), we identify enrichment of substrates for ERK (cluster 3) and p70S6K (cluster 6). Based on the temporal profiles, it is evident that ERK signaling is inactivated as hES cells differentiate (beginning 1hr time point), which is consistent with an essential role for ERK signaling in the maintenance of the pluripotent state in hES cells by blocking neuronal, trophectoderm and primitive endoderm differentiation \[[@pcbi.1004403.ref047]\]. In contrast, substrates predicted to be that of p70S6K are activated during hES cell differentiation, consistent with the fact that activation of p70S6K alone is sufficient to induce hES differentiation \[[@pcbi.1004403.ref046]\]. Thus, CLUE is applicable to analyze both increasing and decreasing phosphorylation profiles and will be useful even when phosphatase-substrate information is unavailable.
Other factors such as protein translation rate, degradation rate, and cell cycle progression may affect phosphorylation especially at later time points, and diverse substrates of a given kinase may be modulated with different kinetics. To address these confounding factors, phosphorylation sites and time points may be pre-filtered to select those that are biologically most relevant for capturing a given kinase's activity when such prior knowledge is available.
Our simulation studies reveal that CLUE\'s performance is dependent on the accuracy of the annotations (prior knowledge) that is employed to aid the clustering process. Although CLUE can tolerate reasonable amount of noise/inaccuracies (up to \~40%), using annotations from a high quality source/database is essential for accurate and biologically meaningful clustering of the data. It is worth noting that CLUE\'s performance is not biased towards larger kinase-substrate annotation groups as Fisher's Exact test used to test for kinase enrichment is robust to size differences in kinase-substrate annotations.
Although we formulated CLUE for analyzing phosphoproteomics data, the general framework of CLUE can also be used to analyse temporal transcriptomics data toward identification of transcription networks and cascades. This can be accomplished by using gene set annotations, as defined by various gene ontology-like databases, or transcription factor-target gene annotations in place of kinase-substrate annotations. While CLUE is designed to perform optimally with *k*-means clustering-based algorithms, in theory, it can be coupled with other clustering algorithms such as SOM where the cluster enrichment can be evaluated.
Materials and Methods {#sec011}
=====================
Kinase-substrate annotation {#sec012}
---------------------------
Kinase-substrate annotations were compiled from the PhosphoSitePlus database, a curated database of protein post-translational modifications (PTMs) including phosphorylation \[[@pcbi.1004403.ref053]\]. We compiled mouse-specific and human-specific kinase-substrate annotations and assigned to each kinase its phosphorylation substrates from mouse and human, respectively, based on "KINASE", "SUBSTRATE", and "SUB_ORG" columns of the database. The official gene symbols and the phosphorylated residues (amino acids) were concatenated together to create unique identifiers for each phosphorylation site. Phosphorylation sites assigned to multiple kinases (in PhosphoSitePlus) are classified to multiple kinases in the enrichment analysis. In total, we extracted 206 kinases and 9830 kinase-substrate interactions for human, and 235 kinases and 17532 kinase-substrate interactions for mouse.
Knowledge-based CLUster evaluation (CLUE) framework {#sec013}
---------------------------------------------------
CLUE relies on annotated kinase-substrate relationships to estimate the optimal *k* for clustering phosphoproteomics data using *k*-means clustering-based algorithms ([Fig 1](#pcbi.1004403.g001){ref-type="fig"}). Given a clustering output from a *k*-means clustering-based algorithm that partitions the data into exactly *k* clusters, let *i* = 1...*k* be the *i* ^*th*^ cluster. Let *m* be the number of kinases annotated in the PhosphositePlus database for the species of interest and *j* = 1...*m* be the *j* ^*th*^ kinase. Let *a* ~*ij*~ denote the number of phosphorylation sites regulated by kinase *j* that are included in cluster *i*, *b* ~*ij*~ denote the number of phosphorylation sites regulated by kinase *j* that are not present in cluster *i*, *c* ~*ij*~ denote the number of phosphorylation sites in cluster *i* that are not regulated by kinase *j*, and *d* ~*ij*~ denote the number of phosphorylation sites that are neither included in cluster *i* nor regulated by *j*. Let us define *θ* as odds-ratio such that *θ* = (*a* ~*ij*~ / *b* ~*ij*~) / (*c* ~*ij*~ / *d* ~*ij*~), and under Fisher's exact test, we can test for the significance of enrichment of *j*\'s substrates in cluster *i* under the null hypothesis that the substrates of *j* are not over-represented in cluster *i* (i.e. *H* ~0~:*θ* = 1) and the alternative hypothesis that the substrates of *j* are over-represented in *i* (i.e. *H* ~1~:*θ* \> 1). For a given set of values *a* ~*ij*~, ..., *d* ~*ij*~, the enrichment can best tested as follows: $$prob_{ij} = \frac{\begin{pmatrix}
{a_{ij} + b_{ij}} \\
a_{ij} \\
\end{pmatrix}\begin{pmatrix}
{c_{ij} + d_{ij}} \\
c_{ij} \\
\end{pmatrix}}{\begin{pmatrix}
{a_{ij} + b_{ij} + c_{ij} + d_{ij}} \\
{a_{ij} + c_{ij}} \\
\end{pmatrix}}$$ and the *p*-value for the test of significance (i.e. *p* ~*ij*~) is obtained by summing the *prob* ~*ij*~ values over all combinations of *a* ~*ij*~, ..., *d* ~*ij*~ that return odds-ratio values at least as large as the observed values.
By applying the above test for all *m* kinases against a given cluster *i*, the significance of the information content of cluster *i* is determined as follows: $${p\left( {cluster_{i}} \right) = \underset{}{\text{min}_{j = 1\ldots m}}\left( p_{ij} \right)}.$$
Then, the *p*-values for all *k* clusters are combined using Fisher's combined probability test: $$P_{k} = \text{P}\left( {\chi_{d}^{2} > - 2\underset{i = 1}{\overset{k}{\sum^{}}}\text{log}\left( {p\left( {cluster_{i}} \right)} \right)} \right),$$ where *d* = *2k* denotes the degrees of freedom. Finally, *P* ~*k*~ is converted into an enrichment score *E* ~*k*~ = -log10(*P* ~*k*~), which indicates how informative it is to partition the data into *k* clusters. The higher the enrichment score, the more informative the resulting clustering is. The enrichment score captures both the information content of each individual cluster while also assessing the overall enrichment of the entire partitioning. Intuitively, with an overestimated *k*, phosphorylation sites that are substrates of a kinase might be split across two or more clusters, which will be penalized by Fisher's exact test for lower information content of resulting clusters. In contrast, underestimation of *k* might group unrelated phosphorylation sites to the same cluster, which will be penalized by Fisher's combined probability test. By using *k*-means clustering-based algorithm with a range of different *k* values to partition the dataset and assessing the enrichment score for each *k* using CLUE, the optimal *k* for partitioning can be estimated.
Simulation studies {#sec014}
------------------
To compare CLUE\'s performance with those of other commonly used approaches for estimating *k* for *k*-means clustering-based algorithms, we conducted simulation studies. First, we defined 14 temporal profiles, each with seven time points, representing typical temporal kinetics observed in a time-series study ([Fig 2](#pcbi.1004403.g002){ref-type="fig"}). Next, time course phosphorylation profiles for individual sites (substrates) were simulated by randomly selecting a set of temporal profiles, representing a set of clusters, from the 14 templates and then generating data using the selected temporal profiles with Gaussian noise. Specifically, 500 phosphorylation sites were generated for each temporal profile under a Gaussian distribution with the standard deviation held constant (*σ* = 1). For instance, to simulate a 4-cluster dataset, 4 different temporal profile templates are randomly selected and a total of 2000 phosphorylation sites are generated based on the selected temporal profile templates. In the case of simulating a 14-cluster dataset, all temporal profiles templates are used and a total of 7000 phosphorylation sites are generated. Then, we evaluated CLUE\'s performance using the *k*-means as well as the fuzzy *c*-means clustering algorithms. For the purposes of testing, we used values for *k* (or *c* in the case of fuzzy *c*-means clustering) ranging from 2 to 20. In practice, this can be specified by the user. Since the *k*-means and the fuzzy *c*-means clustering algorithms randomly initiate centroids, for each *k* (or *c*, respectively), clustering was performed 10 times, each time with a different initialization of centroids in order to obtain an estimation of means. The final result is obtained by averaging the results from each individual runs, and the optimal clustering is determined by finding the maximum enrichment score from the final result.
For simulating the database of annotated kinase-substrate relationships, we generated 100 kinase-substrate groups, each comprising 50 substrates assigned to a kinase. For evaluation purposes, of the 100 groups, *g* groups were generated to each contain phosphorylation sites (substrates) defined to have the same temporal profile. To assess the extent to which incorrect annotations (noise) may influence the performance of CLUE, we set *g* = 5 and simulated different levels of noise by requiring 10%, 20%, 40%, 60%, or 80% of the substrates from each group to have a temporal profile different from that of the rest of substrates in that group. The remaining 95 kinase-substrate groups were generated to contain substrates that were randomly sampled from all phosphorylation sites in the simulated dataset. The resulting simulated kinase-substrate annotations were used for the evaluation of CLUE, BSI and BHI in estimating the optimal number clusters in the simulation experiments.
Temporal phosphoproteomics datasets {#sec015}
-----------------------------------
To demonstrate the utility of the proposed approach, we applied it on two previously published SILAC-based temporal phosphoproteomics datasets on (a) human embryonic stem (hES) cells differentiation using phorbol 12-myristate 13-acetate (PMA) treatment \[[@pcbi.1004403.ref043]\] and (b) insulin activation in mouse 3T3-L1 adipocytes \[[@pcbi.1004403.ref012]\]. The hES cell differentiation data has a total of 14,865 unique phosphopeptides containing 23,522 phosphorylation sites mapping to 4,335 proteins. The phosphopeptides were quantitated over a time-course of five time points during hES cell differentiation (0 min, 30 min, 1 hour, 6 hour, and 24 hour). For clustering analyses, only those phosphorylation sites that have an associated gene product and at least 2-fold change in phosphorylation levels at any time point during differentiation compared to the initial time point (0 min) were considered. This filtering step resulted in 3,416 phosphorylation sites. The insulin activation dataset has a total of 38,901 unique phosphopeptides corresponding to 37,248 phosphorylation sites mapping to 5,705 proteins. The phosphopeptides were quantitated over a time-course of nine time points during insulin treatment of mouse adipocytes (0 sec, 15 sec, 30 sec, 1 min, 2 min, 5 min, 10 min, 20 min, and 1 hour) performed in biological triplicates. For clustering analyses, only those phosphorylation sites that have an associated gene product and are differentially phosphorylated, as determined using a moderated *t*-test implemented in limma R package \[[@pcbi.1004403.ref054]\] with a false discovery rate (FDR) of 0.05 as cutoff, were considered. This filtering step resulted in 3,178 phosphorylation sites.
Motif enrichment analysis {#sec016}
-------------------------
For a given kinase of interest, the amino acid sequences of its substrates annotated in PhosphoSitePlus database is extracted to calculate a position-specific scoring matrix (PSSM) as follows: $$P_{a,j} = \frac{1}{N}{\sum\limits_{i = 1}^{N}{I\left( {x_{i,j} = a} \right)}}$$ where *N* is the number of annotated substrates, *j* is the amino acid position, *a* is the set of characters corresponding to the 20 amino acids, and I is the indicator function. Then, a motif enrichment score is calculated for each phosphorylation site by summing the frequency of occurrence of each amino acid in relation to the PSSM.
Software implementation {#sec017}
-----------------------
CLUE was implemented as an R package. The source code and documentation are freely available from CRAN (<http://cran.r-project.org/web/packages/ClueR/index.html>).
Supporting Information {#sec018}
======================
###### Simulation results showing CLUE\'s p*e*rformance using classic *k*-means clustering.
The yellow line represents the true number of clusters in the simulated dataset, and the red dot denotes the predicted number of clusters in each case.
(TIF)
######
Click here for additional data file.
###### Simulation results showing CLUE\'s performance in relation to data noise and number of time points.
The yellow line represents the true number of clusters in the simulated dataset, and the red dot denotes the predicted number of clusters in each case. (A) CLUE's performance using data from all seven time points (left), data for the last time point simulated as random noise (middle), and data for the last two time points as random noise (right). (B) CLUE's performance using data from all seven time points (left), data from four (1, 3, 5, 7) time points, and data from three (1, 4, 7) time points.
(TIF)
######
Click here for additional data file.
###### Clustering membership scores for hES cell differentiation and insulin activation datasets.
(XLSX)
######
Click here for additional data file.
###### Kinases whose substrate are enriched within identified clusters in hES cell differentiation and insulin activation datasets.
(XLSX)
######
Click here for additional data file.
We thank the members of the Jothi Lab for useful discussions and critical reading of the manuscript. We also thank Sean Humphrey and Ellis Patrick for constructive suggestions.
[^1]: The authors have declared that no competing interests exist.
[^2]: Conceived and designed the experiments: PY. Performed the experiments: PY. Analyzed the data: PY RJ. Contributed reagents/materials/analysis tools: PY XZ VJ GH JYHY RJ. Wrote the paper: PY RJ.
|
English:
In the previous video, we talked about how the expression of genes varies according
to the environment, and how it can't generate a trait
or behavior by itself. However, in a time when mass marketing still moves
slogans such as "Yes, we can" or bestsellers like "The secret", many people believe
that effort is everything. But is this so?
On a global level,
the intellectual capacity between a hunter of an isolated tribe in New Guinea
and an entrepreneur who uploads stories from his smartphone is the same. In "Guns, germs, and steel",
the geographer Jared Diamond explains why some peoples managed to develop high technologies,
while others remained steeped in the stone age until they were conquered by others.
His thesis is clear: far from having consciousness more connected to the abundance
of the universe, what actually happened was that his ecological niche made it easy for them.
For a society to have individuals specialized in the invention and manufacture
Spanish:
En el vídeo anterior, hablábamos de cómo
la expresión de los genes varía en función
del ambiente, y de cómo este es incapaz de generar por sí mismo y de la nada un rasgo
o comportamiento. Sin embargo, en una época en la que el marketing de masas todavía mueve
eslóganes como "Yes, we can" o bestsellers como "El secreto", lo más común es pensar
que el esfuerzo lo es todo y que recogemos lo sembrado. Pero ¿esto es así? A nivel
global, la capacidad intelectual entre un
cazador de una tribu aislada en Nueva Guinea
y un emprendedor que sube stories desde su smartphone, es la misma. El geógrafo Jared
Diamond explica por qué algunos pueblos lograron desarrollar altas tecnologías, mientras que
otros permanecieron sumidos en la edad de piedra hasta que fueron conquistados por los
primeros. Su tesis es clara: lejos de poseer conciencias más conectadas con la abundancia
del universo, lo que sucedió en realidad
fue que su nicho ecológico se lo puso fácil.
Para que una sociedad pueda disponer de individuos especializados en la invención y fabricación
Spanish:
de todo tipo de aparatejos, lo primero que
debe lograr es aumentar sus reservas de comida,
de modo que no todo el mundo necesite ir al campo para abastecerse personalmente. Para
ello, no solo son necesarias unas tierras
fértiles que resistan en el tiempo los envites
de la agricultura, sino que hay que disponer de plantas comestibles domesticables, además
de animales que sean domesticables también. 13 de los 14 mamíferos grandes que la humanidad
ha logrado domesticar se encontraban en Eurasia, y, obviamente, no hay mejor aliciente para
inventar la rueda que tener un caballo o un buey adiestrados como medio de transporte
o para cargar enseres. Las conexiones geográficas también tienen mucho que aportar. En China
eran bastante favorables, lo que derivó en
un gobierno centralizado que propició que
el déspota de turno tirara por tierra, una
y otra vez, todo tipo de novedades. En cambio, la
fragmentación geopolítica europea dio lugar a cientos de centros de innovación que competían
entre sí, posibilitando que una propuesta
rechazada en un lugar pudiese ser promovida
en otro, como le pasó a Colón y a tantos
como él. Este compendio de factores no solo
English:
of all kinds of things, the first thing that must be achieved is to increase its food reserves,
so that not everyone needs to go to the field to supply themselves.
To do this, in addition to having a fertile land that resists in time the challenges of agriculture,
you must have domesticable edible plants,
as well as animals that are also domesticable. 13 of the 14 large mammals that humanity
has managed to tame were in Eurasia, and, obviously, there is no better incentive
to invent the wheel than to have a horse or an ox trained as a means of transport
or to carry things. Geographic connections are also important. In China
they were quite favorable, which led to a centralized government that caused
that there was always a despot limiting technological advances. In contrast,
European geopolitical fragmentation led to hundreds of innovation centers competing
with each other, enabling a proposal rejected in one place
could be promoted in another, as happened to Columbus and others. All these factors
English:
favored technological progress and disposed the supremacy of one people
or of several, over others, without these being better equipped genetically, nor of course
have greater degrees of effort, positivism and general determination. But to value
the environmental privileges of one culture or another, it's not necessary to look that far.
In the same classroom of an educational center with a sufficient and varied proportion of adolescent
students, the academic performance of each will have, in part, a relationship with the peer
group in which they're socialized. Let's see. In the late 70s, psychologist
Jane Schofield observed hundreds of students at a US educational center,
nicknamed Wexler, where there was
a 50% bi-racial representation. Regardless of the individual economic level or
the opinion of the families and the teachers, two large groups emerged spontaneously:
the whites and the blacks. The issue with groups,
Spanish:
favoreció el progreso tecnológico, sino
que dispuso la supremacía de un pueblo o
de varios sobre los demás, sin estar estos
mejor dotados genéticamente, ni por supuesto
tener mayores grados de esfuerzo, positivismo y determinación generales. Pero para valorar
los privilegios ambientales de una u otra
cultura no es necesario hilar a tanta distancia.
En una misma aula de un centro educativo con una suficiente y variada proporción de alumnado
adolescente, el rendimiento escolar de cada uno tendrá, en parte, relación con el grupo
de iguales en el que se socialice. Veamos. A finales de la década de los 70, la psicóloga
Jane Schofield observó a cientos de estudiantes de entre lo que sería sexto de primaria y
segundo de la ESO, en un centro educativo estadounidense, apodado Wexler, donde había
una representación bi-racial del 50%. Sin
importar el nivel económico individual o
la opinión de las familias y el profesorado,
surgieron en el centro, de manera espontánea,
dos grandes bandos: el de los blancos y el de los negros. La cuestión con los grupos,
Spanish:
en general, reside en esa necesidad que tienen de diferenciarse, de ceñirse a lo que los
define, aunque esto no sea siquiera algo intrínseco entre sus integrantes, sino simplemente un
valor que los destaca por oposición. La identidad está ligada al instinto de pertenencia. No
es algo baladí. Y si en tu grupo de pares
hay una norma no escrita según la cual tienes
que ser un estudiante regulero, porque los
empollones son los otros (los blancos, en
este caso), habrá presión por que no te
comportes como un blanco, por que te posiciones.
Esto ha pasado, en Wexler y en mil sitios
más, y es muy difícil cambiar la identidad
del grupo y su relación de contraste, sobre todo sin violencia entre bandos, sin acusar
al otro de acaparar la etiqueta X (en este
ejemplo, la de empollón) y cagarse en to'lo
que se menea. Pero hoy no hablaremos de esto. ¿Qué sucede cuando el entorno general es
el mismo para todos? ¿Qué sucede si todo ese alumnado adolescente ha sido criado en
el seno de familias nutricias blancas de clase media-alta, y bajo un sentimiento de unidad
total para con sus iguales? Es más, ¿y
si, en aras de controlar cada variante de
English:
in general, lies in that need to differentiate, to stick to what defines them,
although this's not even something intrinsic among its members, but simply a
value that stands out by opposition. Identity is linked to the instinct of belonging.
It's not trivial. And if in your peer group there is an unwritten rule according
to which you have to be a regular student, because the nerds are the others (whites,
in this case), there will be pressure for you to behave like your group.
This has happened, in Wexler and in a thousand other places, and it's very difficult to change the identity
of the group and its contrasting relationship, especially without violence between sides, without accusing
the other of monopolizing the X-label (in this example, the nerd) and that everything goes to hell.
But today we'll not talk about this. What happens when the environment
is the same for everyone? What happens if all those adolescent students
have been raised in white upper-middle class families, and under a feeling
of total unity with their peers? What's more, what if, in order to control every variant
Spanish:
esa influencia ambiental, todas y cada una de esas criaturas han sido fecundadas in vitro,
gestadas en un vientre artificial, criadas
en comunidad por profesionales y condicionadas
para dedicar su vida adulta a la ingeniería
biomédica? Ante un ambiente casi idéntico,
¿seríamos todos iguales? Obviamente, no. Ante un ambiente casi idéntico, brillan con
intensidad las variaciones genéticas. Habrá quien acabe dedicándose a la ingeniería
biomédica, está claro. Serán aquellos,
y aquellas, que ya traigan de serie los talentos
que encajen con esa especialidad. Del mismo modo que si el objetivo de esa generación
criada a la carta fuese obtener baloncestistas, acabarían destacando unos individuos sobre
otros porque de eso se trata la biología,
de diversidad. Igualmente, nos referimos a
ese hipotético ambiente como "casi idéntico" porque el temperamento también está influido
por nuestros genes, y ante la imposición
de unos valores X, nos seguiremos encontrando
con personalidades distintas, lo que nos llevará a interacciones diversas y, por lo tanto,
English:
of that environmental influence, each and every one of those creatures have been fertilized in vitro,
gestated in an artificial womb, raised in community by professionals and conditioned
to dedicate their adult life to biomedical engineering? In an almost identical environment,
would we all be the same?
Obviously not. In an almost identical environment, genetic variations
shine brightly. There will be those who end up dedicating themselves to biomedical,
engineering, it's clear. They will be those who are born with the talents
that fit with that specialty. In the same way that if the objective of that generation
raised on the charter was to obtain basketball players, they would end up highlighting some individuals
over others. Biology is diversity.
Similarly, we refer to that hypothetical
environment as "almost identical" because the temperament is also influenced
by our genes, and before the imposition of X values, we'll continue to
have different personalities, which will lead us to diverse interactions and, therefore,
English:
to variable environments. But let's go to the topic that concerns us.
Right now there is an entire industry
dedicated to motivation, positivism and resilience. And it's great as an environment
, I don't say no. The problem is that it's usually implied that everyone can access
with constancy everything that is proposed. "If I can (and Tom can,
and Dick can...), you can", and the one who doesn't achieve his goals believes
that he's doing something wrong. Or that "if you can't, it's really that you
don't want to". Of course, motivation is an incentive for the acquisition of objectives,
but it doesn't achieve success spontaneously after reading a book on how
to stop smoking, procrastinating or seeking love in a desperate way. A person
suffering from depression or obesity may be cornered by a particular environment
that makes her vulnerable to her own genetic biases. Introducing environmental variations
from the self-help section of a library can overcome these biases, depending on the case,
but perhaps it doesn't, and this doesn't mean that we're doing it badly, and nor does it mean
Spanish:
a ambientes variables. Pero vayamos al tema que nos ocupa. Ahora mismo hay toda una industria
dedicada a la motivación, el positivismo
y la resiliencia. Y está genial como ambiente,
no digo que no. El problema es que se suele dar a entender que todo el mundo puede acceder
con constancia a los frutos de estos credos. "Si yo he podido (y Fulanita ha podido, y
Menganito ha podido...), tú puedes", lo que seguidamente traslada al sujeto que no lo
consigue el mensaje de que algo estará haciendo mal. O que "si no puedes, realmente es que
no quieres". Desde luego que la motivación es un aliciente para la adquisición de objetivos,
pero esta no obtiene sus frutos de manera espontánea tras la lectura de un libro sobre
cómo dejar de fumar, procrastinar o buscar el amor de forma desesperada. Una persona
que sufre depresión u obesidad puede estar acorralada ante un ambiente particular que
la vuelve vulnerable a sus propios sesgos
genéticos. Introducir variaciones ambientales
desde la sección de autoayuda de una librería puede franquear estos sesgos, según el caso,
pero quizás no lo haga, y esto no significa que lo estemos haciendo mal, como tampoco significa que
English:
that we must submit to our genetic vulnerability. There are no universal methods
or therapies, and each one's path will be unique,
and with limitations and inconsistencies that must be identified and even
accepted. It's clear that, to be able, we must want, but also possess the ability
to persist in the face of certain adversities, enjoy a favorable environment and have other specific
traits and preferences, compatible with that path. And that is how committed
our free will is. Although this issue of freedom we better leave
for the next video.
Spanish:
debamos someternos a nuestra vulnerabilidad genética. No existen los métodos ni las
terapias universales, y el sendero de cada
cual será único, más o menos transitable,
y con unas limitaciones e incoherencias que habrá que identificar e incluso llegar a
aceptar. Está claro que, para poder, debemos querer, pero también poseer la capacidad
de persistir ante ciertas adversidades, gozar de un entorno favorable y disponer de otros
rasgos y preferencias concretas, compatibles con ese camino. Y es que así de comprometido
está nuestro presunto libre albedrío. Aunque este tema de la libertad mejor lo dejamos para
el próximo día.
|
// Copyright 2014 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// +build ppc64 ppc64le
#include "textflag.h"
// uint32 runtime∕internal∕atomic·Load(uint32 volatile* addr)
TEXT ·Load(SB),NOSPLIT|NOFRAME,$-8-12
MOVD addr+0(FP), R3
SYNC
MOVWZ 0(R3), R3
CMPW R3, R3, CR7
BC 4, 30, 1(PC) // bne- cr7,0x4
ISYNC
MOVW R3, ret+8(FP)
RET
// uint64 runtime∕internal∕atomic·Load64(uint64 volatile* addr)
TEXT ·Load64(SB),NOSPLIT|NOFRAME,$-8-16
MOVD addr+0(FP), R3
SYNC
MOVD 0(R3), R3
CMP R3, R3, CR7
BC 4, 30, 1(PC) // bne- cr7,0x4
ISYNC
MOVD R3, ret+8(FP)
RET
// void *runtime∕internal∕atomic·Loadp(void *volatile *addr)
TEXT ·Loadp(SB),NOSPLIT|NOFRAME,$-8-16
MOVD addr+0(FP), R3
SYNC
MOVD 0(R3), R3
CMP R3, R3, CR7
BC 4, 30, 1(PC) // bne- cr7,0x4
ISYNC
MOVD R3, ret+8(FP)
RET
|
As usual, Prachanda has been quite in the limelight, especially with the deteriorating health of PM Kadga Prasad Oli and also because of his stark comments on many issues. His recent call for unity of all political forces to counter the re-emergence of “regressive elements” is strong overtone to stabilize the political future of Nepal. Many issues are now plaguing Nepal, starting from some dissatisfaction over the 2015 constitution to the formation of a federal state in true spirt of the term.
The changing global scenario of shift in major powers’ position and the gradual shift in the power asymmetry of neighboring countries, places stress on Nepal to rethink of its position, role, and inclinations. In order to sustain as an independent sovereign state, Nepal not only needs a strong ideological foundation with clear foreign policy objectives, but also needs to maintain a solid momentum of growth for the prosperity of its people.
The greatest challenge in the changing world order is for small countries like Nepal to choose an alliance partner with utmost caution. Till now, with utter chaos in internal political stability, Nepal has been a voiceless facilitator to all major and middle powers. However, with the rise of a united communist power (NCP) having two-third of the majority in the Federal Parliament, Nepal has both advantages and disadvantages to weigh the consequences of its decisions. It is here that Prachanda’s recent remarks of calling for united force of political power is crucial for the future of Nepal.
Prachanda Path: The Ideological Battleground
The history of Nepal shows that there have been greater turmoils and clashes of masses. The Monarchy was challenged with the establishment of a republic with multi-party system in 2008 after ten years of civil war and revolution. The core work of overthrowing the 237 years old feudal Monarchy was laid down in the 40 demands that were put forth by Baburam Bhattarai (Chairman of the Central Committee of the then United People’s Front) and Pampha Bhusal (Female member of the Central Committee of the underground Maoist Party led by Prachanda) on February 4, 1996. The demands raised to the tripartite interim government led by PM Sher Bahadur Deuba, a Nepali Congress leader, were at a time when Nepal had already fallen to become the second poorest country in the world and absolute poverty was as high as 71 per cent. The demands were mainly divided under three broad sub-categories: nationalism, democracy, and livelihood.
The idea of the revolution was rooted in the ideological battle between the state powers and the masses. Pushpa Kamal Dahal i.e. Prachanda, who was born in a poor family in Kaski district of West Nepal, was inclined to communist ideology at a very early age. However, it is the vigor to revise the established ideology of Marx, Lenin and Mao according to the social conditions of Nepal, that has led to the rise of ‘Prachanda Path’. A path that was to establish a new kind of democracy to restructure the socio-economic fabric of Nepal being pro-peasants and pro-workers. Today, there are many challenges to this path with internal ideological conflicts based on different interest groups.
The difference between Prachanda and Maoist hardliners like Mohan Vaidya mushroomed as early as 2008 on ‘People’s Republic’. Prachanda had then advocated a path of formation of ‘federal democratic republic’ to be pursued with immediate effect that would march through ‘transitional republic’ and finally attain the goal of forming a ‘people’s republic’. However, other hardlines like Vaidya, Gajurel, Defence Minister Ram Bahadur Thapa and central member Netra Bikram Chand wanted establishment of the ‘People’s Republic’ immediately. The concerns of political observers then was that establishment of ‘People’s Republic’ would have helped regressive forces and undermined the democratic process. Prachanda was supported by Baburam Bhattarai, central members Dinanath Sharma, Top Bahadur Rayamajhi and many other comrades.
China Model of Socialism for Prosperity
Prachanda’s proposition of staged progress to establishing ‘People’s Republic’ reverberates China’s paramount leader Deng Xiaoping’s thoughts, which were a revision of Mao’s revolutionary ideology and resurrection of Chinese economy under the banner of ‘socialism with Chinese characteristics’. Deng had stated that ‘poverty is not socialism, extreme backwardness is also not socialism. China needs to root out abject poverty and develop productive forces’. He proposed a step by step approach to dealing with the issues by ‘seeking truth from facts’ and ‘feeling for the stones, while crossing the river’ on the basis of national conditions. All of which were outlined in his policy propositions for China in three step development strategy: double the GDP in a decade and solve basic poverty; redouble the GDP in another decade and build a well-off society; and raise to the level of moderately developed country and have affluent lifestyle for the masses. Since the 80s, China has walked on this strategy with its ‘reform and open up’ policy to root out poverty and prospering the economy.
Deng’s proposition was to advance the basic essence of socialism through a transitional phase, which will finally lead to common prosperity. Prachanda’s vision of attaining prosperity ideologically correlates to this transition happening in Nepal. Prachanda had envisaged that although Nepal is a poor and backward nation, but it needs to change the structures on which Nepal is established in order to attain prosperity. Some in Nepal criticise Prachanda for being ‘revisionist’, especially now when Prachanda has joined hands with Marxist forces like Unified Marxist Leninist to enter the mainstream politics and form the government with Khadga Prasad Oli as the PM with an understanding to take over the charge after half of the tenure. A recent publication The Safe Landing written by Shubha Shankar Kandel gives a detailed account of the ideological battle and coalition with Oli. The book dwells into various aspects of communist revolution in Nepal; while it posits that Prachanda and Oli’s unification has averted the political crisis in Nepal.
Prachanda following the Chinese footsteps believes that “socialism will not come through the development of capitalism, and neither it can be brought without dismantling the feudal system.” While he has been very critical of the leaders who imitate the habits of the former Monarchs and Royals, he finds that some of the communist leaders of Nepal have changed attitudes and indiscipline in the party is growing. His utterance that Nepal needs to develop nationalist capital and bring movement in ideology and organisation, propels the thought of building a system based on socialist ideology similar to that of China.
The supporter of Prachanda’s viewpoint, senior NCP leader Jhalanath Khanal states that in the changed global politics, it is not possible to have socialism if there is no transformation. He cites the example of China that acts as a model of economic development for Nepal. Hence, it is clear that in order to achieve prosperity, the line of growth Nepal wants to adopt is the Chinese style of socialism, though preserving the uniqueness of Nepal’s social and political conditions.
As Chinese President Xi Jinping just visited Nepal, many of the ideological and economic development paths might cross and overlap. Prachanda has already hugged the Chinese regional ambitions with the signing of the MoU on BRI. It is observed that President Xi’s visit focussed on furthering the alliance relationship, and discussion over Nepal-China Trans-Himalayan multi-dimensional connectivity network, including the cross border railway line. Prachanda has made it clear that the federal democratic republic of the country might collapse without the economic prosperity of Nepal. Hence, the need for Nepal is to advance the private sector to bring in economic transformation, as has China achieved.
(Author Dr. Geeta Kochhar Jaiswal is Assistant Professor at Jawaharlal Nehru University, New Delhi, India. The view expressed is personal.) |
1. Field of the Invention
The present invention relates to a cleaning method for cleaning a substrate having a porous structure in the surface thereof and, more particularly, to a cleaning method of porous surface. The present invention is suitably applicable as a cleaning method for cleaning a porous silicon semiconductor substrate used for selective etching or dielectric isolation of a semiconductor or used as a light emitting material, which demands the most strict control of cleanliness. The invention also relates to a cleaning method of a semiconductor surface.
2. Related Background Art
The method for forming the porous structure typified by porous silicon was introduced by A. Uhlir in 1956 (Bell. Syst. Tech. J., 35, pp. 333).
After that, application technologies were developed including use thereof as a selective etching layer or as an isolation area after oxidized, epitaxial growth on porous silicon, etc. The present applicant disclosed in Japanese Laid-Open Patent Application No. 5-21338 that an SOI (Silicon on Insulator) substrate was fabricated using a single-crystal silicon thin film epitaxially grown on porous silicon.
In recent years, the photoluminescence phenomenon of porous silicon was discovered. It is since drawing attention as a self-radiative material utilizing not only its structural features but also its physical properties.
A popular method for forming porous silicon is anodization in an electrolyte solution of a mixture of hydrofluoric acid/pure water/ethanol by the conventional electrochemical cell structure. Since many dust particles adhere to this porous silicon, it is better to remove the dust particles by cleaning before epitaxial growth on the porous silicon. Conventional cleaning comprises only rinsing the above electrolyte solution inside pores with pure water. There is no example of introducing a positive cleaning method of the surface.
It is well known that, cleaning is indispensable before and after processing in the semiconductor processes and that it is also unavoidable in the case of the porous silicon substrate. The conventional cleaning methods of bulk substrate (non-porous substrate) include chemical wet cleaning with a combination of chemicals such as sulfuric acid/hydrogen peroxide, ammonia/hydrogen peroxide, hydrochloric acid/hydrogen peroxide, or hydrofluoric acid/pure water, as typified by RCA cleaning (RCA Review, 31, pp. 187-205, 1970) developed by W. Kern et al., which is said to be a method effective for removal of dust particles on the surface.
Recently, Ojima et al. (Research Report, Institute of Electronics, Information and Communication Engineers, SDM95-86, ICD95-95, pp. 105-112, July 1995) proposed a method for removing the dust particles by applying a high-frequency ultrasonic wave of about 1 MHz (megasonic wave) to the bulk substrate in a mixture of hydrofluoric acid/hydrogen peroxide/pure water/surfactant or in ozone-added pure water, for the purpose of decreasing amounts of cleaning chemicals.
This method is characterized by cleaning conducted in such a way that the silicon substrate is oxidized with hydrofluoric acid and hydrogen peroxide to be etched, the dust particles on the surface are lifted off from the substrate, and potentials of the dust particles are neutralized with the surfactant to prevent re-deposition of dust particles on the substrate. The purpose of this method is to give energy upon the lift-off of dust particles and to remove organic matter attached to the surface of substrate by generation of ions from the pure water by megasonic wave application. Thus, the basis of the cleaning is chemical cleaning. Use of the ozone pure water is for the purpose of enhancing the organic removing effect.
In ultrasonic cleaning, cleaning with low frequencies ranging approximately from several ten kHz to 400 kHz conventionally used is "liquid resonance cleaning" to remove the dust particles of several ten pm on the substrate surface by applying a strong shock wave to the substrate surface by liquid cavitation (expansion/compaction) due to the liquid resonance action. In contrast, cleaning with high frequencies ranging from 800 kHz to 1.6 MHz is "sound-wave scrub cleaning" to remove the dust particles by giving kinetic energy based on resonance to the dust particles, which enables the removal of dust particles of submicron order without damaging fine patterns.
Low-frequency cleaning causes damage to fine patterns due to the cavitation impact and is no longer used in the semiconductor processes of 4-Mbit DRAM and processes. On the other hand, high-frequency cleaning is recognition as a method capable of cleaning fine dust particles without damaging the patterns.
According to the experience of the present inventors, the substrate having the surface of the porous structure is of fine and dense structure and has long pores. Therefore, use of chemicals in conventional chemical wet cleaning causes the chemicals to intrude deeply into the pores, which makes complete elimination of chemicals difficult even with rinsing with pure water for a long time. It negatively affects the post-processes like the epitaxial growth on the porous structure.
If the physical removal of dust particles is attempted by superposing the conventional ultrasonic of low frequency on pure water, the fragile will raise the porous structure will raise the may collapse due to the sound pressure of shock wave of cavitation even in the relatively high frequency region around 200 kHz.
This problem results from the structure of porous silicon, and the experience of the present inventors is not peculiar. The reason why the positive cleaning of porous silicon surface has not been conducted heretofore is believed to be the above problem.
In addition, it was found by the present inventors that when the surface of the porous silicon substrate was rinsed with pure water after formation of the porous structure by anodization, several hundred dust particles not less than 0.3 .mu.m, obtained from laser reflection intensity distribution, adhered to the surface in a 5-inch-diameter wafer as shown in FIG. 28. In the bar graph, classification of L1, L2, and L3 indicates rough classification of sizes of dust particles obtained from laser reflection intensities from the dust particles, and the sizes increase in the order of L1<L2<L3.
The number of dust particles adhering upon anodization gradually decreases with increasing number of batch of anodization in the single wafer process as shown in FIG. 28, because the dust particles in the liquid decrease as captured by the substrate. Such high numbers are, however, anomalous numbers when compared with those in the current semiconductor processes, wherein the dust particles are removed down to several or less particles on the surface of a bulk substrate after RCA-cleaning.
These dust particles adhering during anodization can be decreased to some extent by liquid circulation of the above electrolyte solution and collection of dust particles with a filter, but the decrease is not sufficient yet. Conceivable causes of adhesion of dust particles include dust particles mixed in an anodization system and in the electrolyte solution and dust generated from workers during the process. Further, it is also conceivable that the surface of porous silicon becomes hydrophobic because of the anodization in the high-concentration hydrofluoric acid electrolyte, so that the silicon substrate tends to be electrostatically charged, thereby attracting the dust particles. Therefore, prevention of adhesion of the dust particles is not easy.
As a matter of course, such dust particles the generate imperfections in the subsequent processes, such as anomalous growth or pinholes in the film-forming process, and were problematic in applications of porous silicon. |
<?php
namespace Oro\Bundle\PromotionBundle\Tests\Unit\DependencyInjection;
use Oro\Bundle\PromotionBundle\DependencyInjection\Configuration;
use Symfony\Component\Config\Definition\Processor;
class ConfigurationTest extends \PHPUnit\Framework\TestCase
{
/**
* @var Configuration
*/
protected $configuration;
protected function setUp(): void
{
$configuration = new Configuration();
$treeBuilder = $configuration->getConfigTreeBuilder();
$this->assertInstanceOf('Symfony\Component\Config\Definition\Builder\TreeBuilder', $treeBuilder);
}
public function testProcessConfiguration()
{
$configuration = new Configuration();
$processor = new Processor();
$expected = [
'settings' => [
'resolved' => true,
Configuration::FEATURE_ENABLED => [
'value' => true,
'scope' => 'app'
],
Configuration::DISCOUNT_STRATEGY => [
'value' => 'apply_all',
'scope' => 'app'
],
Configuration::CASE_INSENSITIVE_COUPON_SEARCH => [
'value' => false,
'scope' => 'app'
],
]
];
$this->assertEquals($expected, $processor->processConfiguration($configuration, []));
}
}
|
DETROIT -- Andre Johnson outdid his favorite receiver, Calvin Johnson, Sunday in the Texans’ 34-31 overtime win over the Lions Thursday.
Andre Johnson also followed up his career best 14-catch, 273-yard game against Jacksonville with another big day: Nine catches for 188 yards.
Texans WR Andre Johnson had nine receptions for 188 yards against the Lions on Thursday. Rick Osentoski/AP Photo
His two-game total is the best two-game receiving total in the history of the NFL, according to Elias.
Here is the list:
Andre Johnson, 461 yards in 2012
Chad Johnson, 450 yards in 2006
John Taylor, 448 yards in 1989
Jerry Rice, 442 in 1995
That’s pretty incredible. The only other time Johnson recorded a 200-yard receiving game, ESPN Stats & Info had pointed out he had just 19 yards the following week.
This follow up was of a much higher caliber.
That it came as his team matched up with Calvin Johnson means Andre Johnson did good work reminding a national audience that he’s still very much in the conversation about the game’s best wideouts.
Calvin Johnson finished with eight catches (on 17 targets) for 140 yards and a touchdown.
“I didn’t know which Johnson I had when I looked at the stat sheet,” Texans coach Gary Kubiak joked. “I didn’t know which one had 140 and which one had 188. Two great players. Andre is rolling right now. He’s got confidence, he’s playing his tail off, he’s healthy and he’s back in the best condition I’ve seen him in in three years.”
The Texans have turned to Johnson in crunch time in very tight games the last two weeks.
"Every team has guys that they look to when things are going bad," Andre Johnson said. "So, I'm one of the guys this team looks to when things are going bad. I just try to make the best of the opportunities when I get them." |
Topological models for the prediction of anti-HIV activity of dihydro (alkylthio) (naphthylmethyl) oxopyrimidines.
Relationship between the topological indices and anti-HIV activity of Dihydro (alkylthio) (naphthylmethyl) oxopyrimidines has been investigated. Three topological indices--the Wiener's index--a distance-based topological index, molecular connectivity index--an adjacency based topological index and eccentric connectivity index--an adjacency-cum-distance based topological index were used for the present investigations. A data set comprising of 67 analogues of dihydro (alkylthio) (naphthylmethyl) oxopyrimidine (S-DABO) was selected for the present investigations. The values of the Wiener's index, molecular connectivity index and eccentric connectivity index for each of the 67 compounds comprising the data set were computed using an in house computer program. Resultant data were subsequently analyzed and suitable models were developed after identification of active ranges. Subsequently, a biological activity was assigned to each compound using these models, which was then compared with the reported anti-HIV activity. The use of models based upon these topological indices resulted in prediction of anti-HIV activity with an accuracy ranging from 86% to 89%. |
function [cfg] = ft_interactiverealign(cfg)
% FT_INTERACTIVEREALIGN allows the user to interactively translate, rotate and scale an
% individual geometrical object to a template geometrical object. It can for example be used
% to align EEG electrodes to a model of the scalp surface.
%
% Use as
% [cfg] = ft_interactiverealign(cfg)
%
% The configuration structure should contain the individuals geometrical object that
% has to be realigned
% cfg.individual.elec = structure
% cfg.individual.grad = structure
% cfg.individual.headmodel = structure, see FT_PREPARE_HEADMODEL
% cfg.individual.headshape = structure, see FT_READ_HEADSHAPE
% cfg.individual.mri = structure, see FT_READ_MRI
% You can specify the style with which the objects are displayed using
% cfg.individual.headmodelstyle = 'vertex', 'edge', 'surface' or 'both' (default = 'edge')
% cfg.individual.headshapestyle = 'vertex', 'edge', 'surface' or 'both' (default = 'vertex')
%
% The configuration structure should also contain the geometrical object of a
% template that serves as target
% cfg.template.axes = string, 'yes' or 'no (default = 'no')
% cfg.template.elec = structure
% cfg.template.grad = structure
% cfg.template.headmodel = structure, see FT_PREPARE_HEADMODEL
% cfg.template.headshape = structure, see FT_READ_HEADSHAPE
% cfg.template.mri = structure, see FT_READ_MRI
% You can specify the style with which the objects are displayed using
% cfg.template.headmodelstyle = 'vertex', 'edge', 'surface' or 'both' (default = 'edge')
% cfg.template.headshapestyle = 'vertex', 'edge', 'surface' or 'both' (default = 'vertex')
%
% You can specify one or multiple individual objects which will all be realigned and
% one or multiple template objects.
%
% See also FT_VOLUMEREALIGN, FT_ELECTRODEREALIGN, FT_DETERMINE_COORDSYS,
% FT_READ_SENS, FT_READ_HEADMODEL, FT_READ_HEADSHAPE
% Copyright (C) 2008, Vladimir Litvak
%
% This file is part of FieldTrip, see http://www.fieldtriptoolbox.org
% for the documentation and details.
%
% FieldTrip is free software: you can redistribute it and/or modify
% it under the terms of the GNU General Public License as published by
% the Free Software Foundation, either version 3 of the License, or
% (at your option) any later version.
%
% FieldTrip is distributed in the hope that it will be useful,
% but WITHOUT ANY WARRANTY; without even the implied warranty of
% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
% GNU General Public License for more details.
%
% You should have received a copy of the GNU General Public License
% along with FieldTrip. If not, see <http://www.gnu.org/licenses/>.
%
% $Id$
% these are used by the ft_preamble/ft_postamble function and scripts
ft_revision = '$Id$';
ft_nargin = nargin;
ft_nargout = nargout;
% do the general setup of the function
ft_defaults
ft_preamble init
ft_preamble debug
ft_preamble provenance
ft_preamble trackconfig
% the ft_abort variable is set to true or false in ft_preamble_init
if ft_abort
return
end
% check if the input cfg is valid for this function
cfg = ft_checkconfig(cfg, 'required', {'individual', 'template'});
cfg.individual = ft_checkconfig(cfg.individual, 'renamed', {'vol', 'headmodel'});
cfg.individual = ft_checkconfig(cfg.individual, 'renamed', {'volstyle', 'headmodelstyle'});
cfg.template = ft_checkconfig(cfg.template, 'renamed', {'vol', 'headmodel'});
cfg.template = ft_checkconfig(cfg.template, 'renamed', {'volstyle', 'headmodelstyle'});
cfg.individual.elec = ft_getopt(cfg.individual, 'elec', []);
cfg.individual.elecstyle = ft_getopt(cfg.individual, 'elecstyle', {}); % key-value pairs
cfg.individual.grad = ft_getopt(cfg.individual, 'grad', []);
cfg.individual.gradstyle = ft_getopt(cfg.individual, 'gradstyle', {}); % key-value pairs
cfg.individual.headshape = ft_getopt(cfg.individual, 'headshape', []);
if ~isempty(cfg.individual.headshape) && isfield(cfg.individual.headshape, 'tri')
cfg.individual.headshapestyle = ft_getopt(cfg.individual, 'headshapestyle', 'surface');
else
cfg.individual.headshapestyle = ft_getopt(cfg.individual, 'headshapestyle', 'vertex');
end
cfg.individual.headmodel = ft_getopt(cfg.individual, 'headmodel', []);
cfg.individual.headmodelstyle = ft_getopt(cfg.individual, 'headmodelstyle', 'edge');
cfg.individual.mri = ft_getopt(cfg.individual, 'mri', []);
cfg.individual.mristyle = ft_getopt(cfg.individual, 'mristyle', {});
cfg.template.axes = ft_getopt(cfg.template, 'axes', 'no');
cfg.template.elec = ft_getopt(cfg.template, 'elec', []);
cfg.template.elecstyle = ft_getopt(cfg.template, 'elecstyle', {}); % key-value pairs
cfg.template.grad = ft_getopt(cfg.template, 'grad', []);
cfg.template.gradstyle = ft_getopt(cfg.template, 'gradstyle', {}); % key-value pairs
cfg.template.headshape = ft_getopt(cfg.template, 'headshape', []);
if ~isempty(cfg.template.headshape) && isfield(cfg.template.headshape, 'tri')
cfg.template.headshapestyle = ft_getopt(cfg.template, 'headshapestyle', 'surface');
else
cfg.template.headshapestyle = ft_getopt(cfg.template, 'headshapestyle', 'vertex');
end
cfg.template.headmodel = ft_getopt(cfg.template, 'headmodel', []);
cfg.template.headmodelstyle = ft_getopt(cfg.template, 'headmodelstyle', 'edge');
cfg.template.mri = ft_getopt(cfg.template, 'mri', []);
cfg.template.mristyle = ft_getopt(cfg.template, 'mristyle', {});
% convert the string that describes the style to a cell-array
cfg.template.headshapestyle = updatestyle(cfg.template.headshapestyle);
cfg.individual.headshapestyle = updatestyle(cfg.individual.headshapestyle);
cfg.template.headmodelstyle = updatestyle(cfg.template.headmodelstyle);
cfg.individual.headmodelstyle = updatestyle(cfg.individual.headmodelstyle);
template = struct(cfg.template);
individual = struct(cfg.individual);
% ensure that they are consistent with the latest FieldTrip version
if ~isempty(template.elec)
template.elec = ft_datatype_sens(template.elec);
end
if ~isempty(individual.elec)
individual.elec = ft_datatype_sens(individual.elec);
end
if ~isempty(template.headshape)
template.headshape = fixpos(template.headshape);
end
if ~isempty(individual.headshape)
individual.headshape = fixpos(individual.headshape);
end
% convert the coordinates of all geometrical objects into mm
fn = {'elec', 'grad', 'headshape', 'headmodel', 'mri'};
hasindividual = false(size(fn));
originalunit = cell(size(fn));
for i=1:length(fn)
if ~isempty(individual.(fn{i}))
hasindividual(i) = true;
individual.(fn{i}) = ft_determine_units(individual.(fn{i})); % ensure that it has units
originalunit{i} = individual.(fn{i}).unit;
individual.(fn{i}) = ft_convert_units(individual.(fn{i}), 'mm'); % ensure that the units are all in mm
end
end
hastemplate = false(size(fn));
for i=1:length(fn)
if ~isempty(template.(fn{i}))
template.(fn{i}) = ft_determine_units(template.(fn{i})); % ensure that it has units
hastemplate(i) = true;
template.(fn{i}) = ft_convert_units(template.(fn{i}), 'mm'); % ensure that the units are all in mm
end
end
% determine the coordinate system of the template objects
coordsys = [];
for i=1:length(fn)
if ~isempty(template.(fn{i}))
if isfield(template.(fn{i}), 'coordsys')
if isempty(coordsys)
% remember the first coordinate system
coordsys = template.(fn{i}).coordsys;
end
% ensure that all template objects have the same coordinate system as the first one
assert(isequal(coordsys, template.(fn{i}).coordsys));
end
end
end
% ensure that the headshape surface is triangulated
if ~isempty(template.headshape)
if ~isfield(template.headshape, 'tri') || isempty(template.headshape.tri)
template.headshape.tri = projecttri(template.headshape.pos);
end
end
if ~isempty(individual.headshape)
if ~isfield(individual.headshape, 'tri') || isempty(individual.headshape.tri)
individual.headshape.tri = projecttri(individual.headshape.pos);
end
end
ft_info('Use the mouse to rotate the geometry, and click "redisplay" to update the light.');
ft_info('Close the figure when you are done.');
% open a figure
fig = figure;
set(fig, 'CloseRequestFcn', @cb_quit);
set(fig, 'windowkeypressfcn', @cb_keyboard);
set(gca, 'position', [0.05 0.15 0.75 0.75]);
% add the data to the figure
setappdata(fig, 'individual', individual);
setappdata(fig, 'template', template);
setappdata(fig, 'transform', eye(4));
setappdata(fig, 'cleanup', false);
setappdata(fig, 'coordsys', coordsys); % can be unknown
setappdata(fig, 'toggle_labels', true);
setappdata(fig, 'toggle_axes', true);
setappdata(fig, 'toggle_grid', true);
% add the GUI elements
axis([-150 150 -150 150 -150 150]);
cb_creategui(gcf);
cb_redraw(gcf);
rotate3d on
if isempty(coordsys) || strcmp(coordsys, 'unknown')
ft_notice('the template coordinate system is unknown, selecting the viewpoint is not possible');
ft_uilayout(gcf, 'tag', 'viewpointbtn', 'Visible', 'off');
else
[labelx, labely, labelz] = coordsys2label(coordsys, 2, 0);
ft_notice('the template coordinate system is "%s"', coordsys);
ft_info('the positive X-axis is pointing to %s', labelx);
ft_info('the positive Y-axis is pointing to %s', labely);
ft_info('the positive Z-axis is pointing to %s', labelz);
end
cleanup = false;
while ~cleanup
uiwait(fig);
cfg.m = getappdata(fig, 'transform');
cleanup = getappdata(fig, 'cleanup');
end
% remember the transform and touch it
cfg.m = getappdata(fig, 'transform');
cfg.m;
delete(fig);
% do the general cleanup and bookkeeping at the end of the function
ft_postamble debug
ft_postamble trackconfig
ft_postamble provenance
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
function cb_creategui(h, eventdata, handles)
% define the position of each GUI element
fig = getparent(h);
% constants
CONTROL_WIDTH = 0.04;
CONTROL_HEIGHT = 0.05;
CONTROL_HOFFSET = 0.75;
CONTROL_VOFFSET = 0.5;
% rotateui
uicontrol('tag', 'rotateui', 'parent', fig, 'units', 'normalized', 'style', 'text', 'string', 'rotate', 'callback', [])
uicontrol('tag', 'rx', 'parent', fig, 'units', 'normalized', 'style', 'edit', 'string', '0', 'callback', @cb_redraw)
uicontrol('tag', 'ry', 'parent', fig, 'units', 'normalized', 'style', 'edit', 'string', '0', 'callback', @cb_redraw)
uicontrol('tag', 'rz', 'parent', fig, 'units', 'normalized', 'style', 'edit', 'string', '0', 'callback', @cb_redraw)
ft_uilayout(fig, 'tag', 'rotateui', 'BackgroundColor', [0.8 0.8 0.8], 'width', 2*CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET, 'vpos', CONTROL_VOFFSET+CONTROL_HEIGHT);
ft_uilayout(fig, 'tag', 'rx', 'BackgroundColor', [0.8 0.8 0.8], 'width', CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET+3*CONTROL_WIDTH, 'vpos', CONTROL_VOFFSET+CONTROL_HEIGHT);
ft_uilayout(fig, 'tag', 'ry', 'BackgroundColor', [0.8 0.8 0.8], 'width', CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET+4*CONTROL_WIDTH, 'vpos', CONTROL_VOFFSET+CONTROL_HEIGHT);
ft_uilayout(fig, 'tag', 'rz', 'BackgroundColor', [0.8 0.8 0.8], 'width', CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET+5*CONTROL_WIDTH, 'vpos', CONTROL_VOFFSET+CONTROL_HEIGHT);
% scaleui
uicontrol('tag', 'scaleui', 'parent', fig, 'units', 'normalized', 'style', 'text', 'string', 'scale', 'callback', [])
uicontrol('tag', 'sx', 'parent', fig, 'units', 'normalized', 'style', 'edit', 'string', '1', 'callback', @cb_redraw)
uicontrol('tag', 'sy', 'parent', fig, 'units', 'normalized', 'style', 'edit', 'string', '1', 'callback', @cb_redraw)
uicontrol('tag', 'sz', 'parent', fig, 'units', 'normalized', 'style', 'edit', 'string', '1', 'callback', @cb_redraw)
ft_uilayout(fig, 'tag', 'scaleui', 'BackgroundColor', [0.8 0.8 0.8], 'width', 2*CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET, 'vpos', CONTROL_VOFFSET-0*CONTROL_HEIGHT);
ft_uilayout(fig, 'tag', 'sx', 'BackgroundColor', [0.8 0.8 0.8], 'width', CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET+3*CONTROL_WIDTH, 'vpos', CONTROL_VOFFSET-0*CONTROL_HEIGHT);
ft_uilayout(fig, 'tag', 'sy', 'BackgroundColor', [0.8 0.8 0.8], 'width', CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET+4*CONTROL_WIDTH, 'vpos', CONTROL_VOFFSET-0*CONTROL_HEIGHT);
ft_uilayout(fig, 'tag', 'sz', 'BackgroundColor', [0.8 0.8 0.8], 'width', CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET+5*CONTROL_WIDTH, 'vpos', CONTROL_VOFFSET-0*CONTROL_HEIGHT);
% translateui
uicontrol('tag', 'translateui', 'parent', fig, 'units', 'normalized', 'style', 'text', 'string', 'translate', 'callback', [])
uicontrol('tag', 'tx', 'parent', fig, 'units', 'normalized', 'style', 'edit', 'string', '0', 'callback', @cb_redraw)
uicontrol('tag', 'ty', 'parent', fig, 'units', 'normalized', 'style', 'edit', 'string', '0', 'callback', @cb_redraw)
uicontrol('tag', 'tz', 'parent', fig, 'units', 'normalized', 'style', 'edit', 'string', '0', 'callback', @cb_redraw)
ft_uilayout(fig, 'tag', 'translateui', 'BackgroundColor', [0.8 0.8 0.8], 'width', 2*CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET, 'vpos', CONTROL_VOFFSET-1*CONTROL_HEIGHT);
ft_uilayout(fig, 'tag', 'tx', 'BackgroundColor', [0.8 0.8 0.8], 'width', CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET+3*CONTROL_WIDTH, 'vpos', CONTROL_VOFFSET-1*CONTROL_HEIGHT);
ft_uilayout(fig, 'tag', 'ty', 'BackgroundColor', [0.8 0.8 0.8], 'width', CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET+4*CONTROL_WIDTH, 'vpos', CONTROL_VOFFSET-1*CONTROL_HEIGHT);
ft_uilayout(fig, 'tag', 'tz', 'BackgroundColor', [0.8 0.8 0.8], 'width', CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET+5*CONTROL_WIDTH, 'vpos', CONTROL_VOFFSET-1*CONTROL_HEIGHT);
% control buttons
uicontrol('tag', 'viewpointbtn', 'parent', fig, 'units', 'normalized', 'style', 'popup', 'string', 'top|bottom|left|right|front|back', 'value', 1, 'callback', @cb_viewpoint);
uicontrol('tag', 'redisplaybtn', 'parent', fig, 'units', 'normalized', 'style', 'pushbutton', 'string', 'redisplay', 'value', [], 'callback', @cb_redraw);
uicontrol('tag', 'applybtn', 'parent', fig, 'units', 'normalized', 'style', 'pushbutton', 'string', 'apply', 'value', [], 'callback', @cb_apply);
uicontrol('tag', 'toggle labels', 'parent', fig, 'units', 'normalized', 'style', 'pushbutton', 'string', 'toggle label', 'value', getappdata(fig, 'toggle_labels'), 'callback', @cb_redraw);
uicontrol('tag', 'toggle axes', 'parent', fig, 'units', 'normalized', 'style', 'pushbutton', 'string', 'toggle axes', 'value', getappdata(fig, 'toggle_axes'), 'callback', @cb_redraw);
uicontrol('tag', 'toggle grid', 'parent', fig, 'units', 'normalized', 'style', 'pushbutton', 'string', 'toggle grid', 'value', getappdata(fig, 'toggle_grid'), 'callback', @cb_redraw);
uicontrol('tag', 'quitbtn', 'parent', fig, 'units', 'normalized', 'style', 'pushbutton', 'string', 'quit', 'value', 1, 'callback', @cb_quit);
ft_uilayout(fig, 'tag', 'viewpointbtn', 'BackgroundColor', [0.8 0.8 0.8], 'width', 6*CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'vpos', CONTROL_VOFFSET-2*CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET);
ft_uilayout(fig, 'tag', 'redisplaybtn', 'BackgroundColor', [0.8 0.8 0.8], 'width', 6*CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'vpos', CONTROL_VOFFSET-4*CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET);
ft_uilayout(fig, 'tag', 'applybtn', 'BackgroundColor', [0.8 0.8 0.8], 'width', 6*CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'vpos', CONTROL_VOFFSET-5*CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET);
ft_uilayout(fig, 'tag', 'toggle labels', 'BackgroundColor', [0.8 0.8 0.8], 'width', 6*CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'vpos', CONTROL_VOFFSET-6*CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET);
ft_uilayout(fig, 'tag', 'toggle axes', 'BackgroundColor', [0.8 0.8 0.8], 'width', 6*CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'vpos', CONTROL_VOFFSET-7*CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET);
ft_uilayout(fig, 'tag', 'toggle grid', 'BackgroundColor', [0.8 0.8 0.8], 'width', 6*CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'vpos', CONTROL_VOFFSET-8*CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET);
ft_uilayout(fig, 'tag', 'quitbtn', 'BackgroundColor', [0.8 0.8 0.8], 'width', 6*CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'vpos', CONTROL_VOFFSET-9*CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET);
% alpha ui (somehow not implemented, facealpha is fixed at 0.7
uicontrol('tag', 'alphaui', 'parent', fig, 'units', 'normalized', 'style', 'text', 'string', 'alpha', 'value', [], 'callback', []);
uicontrol('tag', 'alpha', 'parent', fig, 'units', 'normalized', 'style', 'edit', 'string', '0.6', 'value', [], 'callback', @cb_redraw);
ft_uilayout(fig, 'tag', 'alphaui', 'BackgroundColor', [0.8 0.8 0.8], 'width', 3*CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'vpos', CONTROL_VOFFSET-3*CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET);
ft_uilayout(fig, 'tag', 'alpha', 'BackgroundColor', [0.8 0.8 0.8], 'width', 3*CONTROL_WIDTH, 'height', CONTROL_HEIGHT, 'vpos', CONTROL_VOFFSET-3*CONTROL_HEIGHT, 'hpos', CONTROL_HOFFSET+3*CONTROL_WIDTH);
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
function cb_redraw(h, eventdata, handles)
fig = getparent(h);
individual = getappdata(fig, 'individual');
template = getappdata(fig, 'template');
transform = getappdata(fig, 'transform');
coordsys = getappdata(fig, 'coordsys');
% get the transformation details
rx = str2double(get(findobj(fig, 'tag', 'rx'), 'string'));
ry = str2double(get(findobj(fig, 'tag', 'ry'), 'string'));
rz = str2double(get(findobj(fig, 'tag', 'rz'), 'string'));
tx = str2double(get(findobj(fig, 'tag', 'tx'), 'string'));
ty = str2double(get(findobj(fig, 'tag', 'ty'), 'string'));
tz = str2double(get(findobj(fig, 'tag', 'tz'), 'string'));
sx = str2double(get(findobj(fig, 'tag', 'sx'), 'string'));
sy = str2double(get(findobj(fig, 'tag', 'sy'), 'string'));
sz = str2double(get(findobj(fig, 'tag', 'sz'), 'string'));
R = rotate ([rx ry rz]);
T = translate([tx ty tz]);
S = scale ([sx sy sz]);
H = S * T * R;
% combine the present transform according to the GUI with the one that has been previously applied
transform = H * transform;
axis vis3d; cla
hold on
% the "individual" struct is a local copy, so it is safe to change it here
if ~isempty(individual.headmodel)
individual.headmodel = ft_transform_geometry(transform, individual.headmodel);
end
if ~isempty(individual.elec)
individual.elec = ft_transform_geometry(transform, individual.elec);
end
if ~isempty(individual.grad)
individual.grad = ft_transform_geometry(transform, individual.grad);
end
if ~isempty(individual.headshape)
individual.headshape = ft_transform_geometry(transform, individual.headshape);
end
if ~isempty(individual.mri)
individual.mri = ft_transform_geometry(transform, individual.mri);
end
if ~isempty(template.mri)
ft_plot_ortho(template.mri.anatomy, 'transform', template.mri.transform, 'style', 'intersect', 'intersectmesh', individual.headshape, individual.mristyle{:});
end
if ~isempty(individual.mri)
ft_plot_ortho(individual.mri.anatomy, 'transform', individual.mri.transform, 'style', 'intersect', 'intersectmesh', template.headshape, template.mristyle{:});
end
if istrue(template.axes)
ft_plot_axes([], 'unit', 'mm', 'coordsys', coordsys);
end
if ~isempty(template.elec)
if isfield(template.elec, 'line')
tmpbnd = [];
tmpbnd.pos = template.elec.chanpos;
tmpbnd.tri = template.elec.line;
ft_plot_mesh(tmpbnd, 'vertexcolor', 'b', 'facecolor', 'none', 'edgecolor', 'b', 'vertexsize', 10)
else
ft_plot_sens(template.elec, template.elecstyle{:});
end
end
if ~isempty(individual.elec)
if isfield(individual.elec, 'line')
tmpbnd = [];
tmpbnd.pos = individual.elec.chanpos;
tmpbnd.tri = individual.elec.line;
ft_plot_mesh(tmpbnd, 'vertexcolor', 'r', 'facecolor', 'none', 'edgecolor', 'r', 'vertexsize', 10)
else
ft_plot_sens(individual.elec, individual.elecstyle{:});
end
end
if ~isempty(template.grad)
ft_plot_sens(template.grad, template.gradstyle{:});
end
if ~isempty(individual.grad)
ft_plot_sens(individual.grad, individual.gradstyle{:});
end
% FIXME this only works for boundary element models
if isstruct(template.headmodel) && isfield(template.headmodel, 'bnd')
for i = 1:numel(template.headmodel.bnd)
ft_plot_mesh(template.headmodel.bnd(i), template.headmodelstyle{:});
end
end
% FIXME this only works for boundary element models
if isstruct(individual.headmodel) && isfield(individual.headmodel, 'bnd')
for i = 1:numel(individual.headmodel.bnd)
ft_plot_mesh(individual.headmodel.bnd(i), individual.headmodelstyle{:});
end
end
if isstruct(template.headshape) && isfield(template.headshape, 'pos') && ~isempty(template.headshape.pos)
ft_plot_headshape(template.headshape, template.headshapestyle{:});
end
if isstruct(individual.headshape) && isfield(individual.headshape, 'pos') && ~isempty(individual.headshape.pos)
ft_plot_headshape(individual.headshape, individual.headshapestyle{:})
end
alpha(str2double(get(findobj(fig, 'tag', 'alpha'), 'string')));
lighting gouraud
l = lightangle(0, 90); set(l, 'Color', [1 1 1]/2)
l = lightangle( 0, 0); set(l, 'Color', [1 1 1]/3)
l = lightangle( 90, 0); set(l, 'Color', [1 1 1]/3)
l = lightangle(180, 0); set(l, 'Color', [1 1 1]/3)
l = lightangle(270, 0); set(l, 'Color', [1 1 1]/3)
if strcmp(get(h, 'tag'), 'toggle labels')
setappdata(fig, 'toggle_labels', ~getappdata(fig, 'toggle_labels'))
end
if getappdata(fig, 'toggle_labels')
xlabel('x (mm)')
ylabel('y (mm)')
zlabel('z (mm)')
else
xlabel('')
ylabel('')
zlabel('')
end
if strcmp(get(h, 'tag'), 'toggle axes')
setappdata(fig, 'toggle_axes', ~getappdata(fig, 'toggle_axes'))
end
if getappdata(fig, 'toggle_axes')
axis on
else
axis off
end
if strcmp(get(h, 'tag'), 'toggle grid')
setappdata(fig, 'toggle_grid', ~getappdata(fig, 'toggle_grid'))
end
if getappdata(fig, 'toggle_grid')
grid on
else
grid off
end
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
function cb_apply(h, eventdata, handles)
fig = getparent(h);
transform = getappdata(fig, 'transform');
% get the transformation details
rx = str2double(get(findobj(fig, 'tag', 'rx'), 'string'));
ry = str2double(get(findobj(fig, 'tag', 'ry'), 'string'));
rz = str2double(get(findobj(fig, 'tag', 'rz'), 'string'));
tx = str2double(get(findobj(fig, 'tag', 'tx'), 'string'));
ty = str2double(get(findobj(fig, 'tag', 'ty'), 'string'));
tz = str2double(get(findobj(fig, 'tag', 'tz'), 'string'));
sx = str2double(get(findobj(fig, 'tag', 'sx'), 'string'));
sy = str2double(get(findobj(fig, 'tag', 'sy'), 'string'));
sz = str2double(get(findobj(fig, 'tag', 'sz'), 'string'));
% create the transformation matrix;
R = rotate ([rx ry rz]);
T = translate([tx ty tz]);
S = scale ([sx sy sz]);
H = S * T * R;
transform = H * transform;
set(findobj(fig, 'tag', 'rx'), 'string', 0);
set(findobj(fig, 'tag', 'ry'), 'string', 0);
set(findobj(fig, 'tag', 'rz'), 'string', 0);
set(findobj(fig, 'tag', 'tx'), 'string', 0);
set(findobj(fig, 'tag', 'ty'), 'string', 0);
set(findobj(fig, 'tag', 'tz'), 'string', 0);
set(findobj(fig, 'tag', 'sx'), 'string', 1);
set(findobj(fig, 'tag', 'sy'), 'string', 1);
set(findobj(fig, 'tag', 'sz'), 'string', 1);
setappdata(fig, 'transform', transform);
if ~getappdata(fig, 'cleanup')
cb_redraw(h);
end
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
function cb_keyboard(h, eventdata)
fig = getparent(h);
if isempty(eventdata)
% determine the key that corresponds to the uicontrol element that was activated
key = get(fig, 'userdata');
else
% determine the key that was pressed on the keyboard
key = parsekeyboardevent(eventdata);
end
% get focus back to figure
if ~strcmp(get(h, 'type'), 'figure')
set(h, 'enable', 'off');
drawnow;
set(h, 'enable', 'on');
end
if isempty(key)
% this happens if you press the apple key
key = '';
end
% the following code is largely shared by FT_SOURCEPLOT, FT_VOLUMEREALIGN, FT_INTERACTIVEREALIGN, FT_MESHREALIGN, FT_ELECTRODEPLACEMENT
switch key
case {'' 'shift+shift' 'alt-alt' 'control+control' 'command-0'}
% do nothing
case 'q'
cb_quit(h);
case 'v' % camlight angle reset
delete(findall(fig,'Type','light')) % shut out the lights
% add a new light from the current camera position
lighting gouraud
material shiny
camlight
otherwise
% do nothing
end % switch key
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
function cb_viewpoint(h, eventdata)
fig = getparent(h);
coordsys = getappdata(fig, 'coordsys');
% get the index of the option that was selected
val = get(h, 'value');
viewpoint = {'top', 'bottom', 'left', 'right', 'front', 'back'};
setviewpoint(gca, coordsys, viewpoint{val});
uiresume;
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
function cb_quit(h, eventdata)
fig = getparent(h);
setappdata(fig, 'cleanup', true);
% ensure to apply the current transformation
cb_apply(h);
uiresume;
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
function h = getparent(h)
p = h;
while p~=0
h = p;
p = get(h, 'parent');
end
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
function style = updatestyle(style)
if ischar(style)
switch style
case 'vertex'
style = {'vertexcolor', 'k', 'edgecolor', 'none', 'facecolor', 'none'};
case 'edge'
style = {'vertexcolor', 'none', 'edgecolor', 'k', 'facecolor', 'none'};
case 'surface'
style = {'vertexcolor', 'none', 'edgecolor', 'none', 'facecolor', 'skin', 'material', 'dull'};
case 'both'
style = {'vertexcolor', 'none', 'edgecolor', 'k', 'facecolor', 'skin'};
otherwise
ft_error('unsupported style "%s"', style);
end % switch
end % if
|
Bugs in ExtJS4 docs and, as a result, in designer version 2.0.0.000268
Hi,
Here is what I have found so far:
Autocreated function for load event of Ext.tree.Panel has next: function(treepanel, records, successful, operation, options), but according to real test and comment of rharbers here http://docs.sencha.com/ext-js/4-0/#!...nel-event-load should be something different |
<?xml version="1.0" encoding="UTF-8"?>
<debug-info version="2">
<concept fqn="c:f3061a53-9226-4cc5-a443-f952ceaf5816/1068580123140:jetbrains.mps.baseLanguage.structure.ConstructorDeclaration" />
<concept fqn="c:f3061a53-9226-4cc5-a443-f952ceaf5816/1068580123155:jetbrains.mps.baseLanguage.structure.ExpressionStatement" />
<concept fqn="c:f3061a53-9226-4cc5-a443-f952ceaf5816/1068390468200:jetbrains.mps.baseLanguage.structure.FieldDeclaration" />
<concept fqn="c:f3061a53-9226-4cc5-a443-f952ceaf5816/1068580123159:jetbrains.mps.baseLanguage.structure.IfStatement" />
<concept fqn="c:f3061a53-9226-4cc5-a443-f952ceaf5816/1068580123165:jetbrains.mps.baseLanguage.structure.InstanceMethodDeclaration" />
<concept fqn="c:f3061a53-9226-4cc5-a443-f952ceaf5816/1068581242864:jetbrains.mps.baseLanguage.structure.LocalVariableDeclarationStatement" />
<concept fqn="c:f3061a53-9226-4cc5-a443-f952ceaf5816/1068581242878:jetbrains.mps.baseLanguage.structure.ReturnStatement" />
<concept fqn="c:f3061a53-9226-4cc5-a443-f952ceaf5816/1068580123157:jetbrains.mps.baseLanguage.structure.Statement" />
<concept fqn="c:f3061a53-9226-4cc5-a443-f952ceaf5816/1070462154015:jetbrains.mps.baseLanguage.structure.StaticFieldDeclaration" />
<concept fqn="c:f3061a53-9226-4cc5-a443-f952ceaf5816/1070475587102:jetbrains.mps.baseLanguage.structure.SuperConstructorInvocation" />
<concept fqn="c:f3061a53-9226-4cc5-a443-f952ceaf5816/5351203823916750322:jetbrains.mps.baseLanguage.structure.TryUniversalStatement" />
<root>
<file name="EditorAspectDescriptorImpl.java">
<unit at="16,0,50,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.EditorAspectDescriptorImpl" />
</file>
<file name="SimpleEditorDeclaration_SubstituteMenu.java">
<unit at="90,0,93,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_SubstituteMenu$CONCEPTS" />
<unit at="94,0,97,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_SubstituteMenu$LINKS" />
<unit at="49,0,68,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_SubstituteMenu$SMP_ReferenceScope_roousu_a" />
<unit at="68,0,89,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_SubstituteMenu$SMP_Subconcepts_roousu_b" />
<unit at="26,0,98,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_SubstituteMenu" />
</file>
<file name="SimplePropertyReference_SubstituteMenu.java">
<unit at="90,0,93,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_SubstituteMenu$CONCEPTS" />
<unit at="94,0,97,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_SubstituteMenu$LINKS" />
<unit at="49,0,68,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_SubstituteMenu$SMP_ReferenceScope_3e0a16_a" />
<unit at="68,0,89,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_SubstituteMenu$SMP_Subconcepts_3e0a16_b" />
<unit at="26,0,98,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_SubstituteMenu" />
</file>
</root>
<root nodeRef="r:480744f7-02c7-40e7-9a5b-a7b55c73f551(jetbrains.mps.samples.highlevel.simpleEditor.editor)/3778147542048241766">
<file name="SimpleEditorDeclaration_Editor.java">
<node id="3778147542048241766" at="11,79,12,89" concept="6" />
<node id="3778147542048241766" at="11,0,14,0" concept="4" trace="createEditorCell#(Ljetbrains/mps/openapi/editor/EditorContext;Lorg/jetbrains/mps/openapi/model/SNode;)Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<scope id="3778147542048241766" at="11,79,12,89" />
<scope id="3778147542048241766" at="11,0,14,0">
<var name="editorContext" id="3778147542048241766" />
<var name="node" id="3778147542048241766" />
</scope>
<unit id="3778147542048241766" at="10,0,15,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_Editor" />
</file>
<file name="SimpleEditorDeclaration_EditorBuilder_a.java">
<node id="3778147542048241766" at="57,103,58,19" concept="9" />
<node id="3778147542048241766" at="58,19,59,18" concept="1" />
<node id="3778147542048241766" at="64,26,65,18" concept="6" />
<node id="3778147542048241766" at="68,39,69,32" concept="6" />
<node id="3778147542048241766" at="72,43,73,120" concept="5" />
<node id="3778147542048241766" at="73,120,74,48" concept="1" />
<node id="3778147542048241766" at="74,48,75,28" concept="1" />
<node id="3778147542048241766" at="75,28,76,31" concept="1" />
<node id="3778147542048246356" at="76,31,77,51" concept="1" />
<node id="3778147542048246469" at="77,51,78,51" concept="1" />
<node id="3778147542048246421" at="78,51,79,51" concept="1" />
<node id="3778147542048241766" at="79,51,80,22" concept="6" />
<node id="3778147542048241766" at="82,43,83,122" concept="5" />
<node id="3778147542048241766" at="83,122,84,49" concept="1" />
<node id="3778147542048246353" at="84,49,85,49" concept="1" />
<node id="3778147542048246365" at="85,49,86,48" concept="1" />
<node id="3778147542048241766" at="86,48,87,22" concept="6" />
<node id="3778147542048246353" at="89,41,90,103" concept="5" />
<node id="3778147542048246353" at="90,103,91,48" concept="1" />
<node id="3778147542048246353" at="91,48,92,34" concept="1" />
<node id="3778147542048246353" at="92,34,93,22" concept="6" />
<node id="3778147542048241766" at="95,40,96,58" concept="5" />
<node id="3778147542048241766" at="100,39,101,95" concept="6" />
<node id="3778147542048241766" at="103,41,104,60" concept="1" />
<node id="3778147542048241766" at="104,60,105,48" concept="1" />
<node id="3778147542048241766" at="105,48,106,58" concept="1" />
<node id="3778147542048241766" at="106,58,107,20" concept="6" />
<node id="3778147542048241766" at="110,58,111,97" concept="5" />
<node id="3778147542048241766" at="111,97,112,131" concept="1" />
<node id="3778147542048241766" at="112,131,113,135" concept="1" />
<node id="3778147542048241766" at="113,135,114,20" concept="6" />
<node id="3778147542048241766" at="116,6,117,0" concept="7" />
<node id="3778147542048241766" at="117,0,118,43" concept="1" />
<node id="3778147542048241766" at="118,43,119,50" concept="5" />
<node id="3778147542048241766" at="119,50,120,0" concept="7" />
<node id="3778147542048241766" at="121,40,122,40" concept="1" />
<node id="3778147542048241766" at="122,40,123,44" concept="1" />
<node id="3778147542048241766" at="124,5,125,143" concept="1" />
<node id="3778147542048241766" at="125,143,126,150" concept="5" />
<node id="3778147542048241766" at="128,39,129,113" concept="6" />
<node id="3778147542048241766" at="132,73,133,87" concept="5" />
<node id="3778147542048241766" at="133,87,134,145" concept="6" />
<node id="3778147542048241766" at="135,10,136,22" concept="6" />
<node id="3778147542048246367" at="141,0,142,0" concept="2" trace="myReferencingNode" />
<node id="3778147542048246367" at="143,109,144,21" concept="9" />
<node id="3778147542048246367" at="144,21,145,42" concept="1" />
<node id="3778147542048246367" at="145,42,146,20" concept="1" />
<node id="3778147542048246367" at="149,41,150,32" concept="6" />
<node id="3778147542048246367" at="155,28,156,20" concept="6" />
<node id="3778147542048246375" at="159,43,160,41" concept="1" />
<node id="3778147542048246375" at="161,11,162,51" concept="5" />
<node id="3778147542048246375" at="162,51,163,78" concept="1" />
<node id="3778147542048246375" at="163,78,164,150" concept="5" />
<node id="3778147542048246375" at="164,150,165,47" concept="1" />
<node id="3778147542048246375" at="165,47,166,46" concept="1" />
<node id="3778147542048246375" at="166,46,167,88" concept="1" />
<node id="3778147542048246375" at="167,88,168,35" concept="1" />
<node id="3778147542048246375" at="168,35,169,157" concept="5" />
<node id="3778147542048246375" at="171,43,172,120" concept="6" />
<node id="3778147542048246375" at="175,76,176,91" concept="5" />
<node id="3778147542048246375" at="176,91,177,147" concept="6" />
<node id="3778147542048246375" at="178,14,179,26" concept="6" />
<node id="3778147542048246375" at="180,17,181,42" concept="1" />
<node id="3778147542048241766" at="185,43,186,122" concept="5" />
<node id="3778147542048241766" at="186,122,187,49" concept="1" />
<node id="987189325382722093" at="187,49,188,51" concept="1" />
<node id="3778147542048246404" at="188,51,189,49" concept="1" />
<node id="3778147542048246489" at="189,49,190,49" concept="1" />
<node id="3778147542048241766" at="190,49,191,22" concept="6" />
<node id="987189325382722093" at="193,43,194,85" concept="5" />
<node id="987189325382722093" at="194,85,195,22" concept="6" />
<node id="3778147542048246404" at="197,41,198,99" concept="5" />
<node id="3778147542048246404" at="198,99,199,48" concept="1" />
<node id="3778147542048246404" at="199,48,200,34" concept="1" />
<node id="3778147542048246404" at="200,34,201,22" concept="6" />
<node id="3778147542048246489" at="203,41,204,39" concept="1" />
<node id="3778147542048246489" at="205,9,206,52" concept="5" />
<node id="3778147542048246489" at="206,52,207,76" concept="1" />
<node id="3778147542048246489" at="207,76,208,149" concept="5" />
<node id="3778147542048246489" at="208,149,209,48" concept="1" />
<node id="3778147542048246489" at="209,48,210,47" concept="1" />
<node id="3778147542048246489" at="210,47,211,86" concept="1" />
<node id="3778147542048246489" at="211,86,212,33" concept="1" />
<node id="3778147542048246489" at="212,33,213,155" concept="5" />
<node id="3778147542048246489" at="215,41,216,118" concept="6" />
<node id="3778147542048246489" at="219,74,220,89" concept="5" />
<node id="3778147542048246489" at="220,89,221,145" concept="6" />
<node id="3778147542048246489" at="222,12,223,24" concept="6" />
<node id="3778147542048246489" at="224,15,225,40" concept="1" />
<node id="3778147542048241766" at="228,43,229,122" concept="5" />
<node id="3778147542048241766" at="229,122,230,49" concept="1" />
<node id="987189325382722109" at="230,49,231,51" concept="1" />
<node id="3778147542048246412" at="231,51,232,49" concept="1" />
<node id="3778147542048246437" at="232,49,233,52" concept="1" />
<node id="3778147542048241766" at="233,52,234,22" concept="6" />
<node id="987189325382722109" at="236,43,237,85" concept="5" />
<node id="987189325382722109" at="237,85,238,22" concept="6" />
<node id="3778147542048246412" at="240,41,241,104" concept="5" />
<node id="3778147542048246412" at="241,104,242,48" concept="1" />
<node id="3778147542048246412" at="242,48,243,34" concept="1" />
<node id="3778147542048246412" at="243,34,244,22" concept="6" />
<node id="3778147542048241766" at="246,44,247,110" concept="5" />
<node id="3778147542048241766" at="247,110,248,95" concept="5" />
<node id="3778147542048241766" at="248,95,249,58" concept="1" />
<node id="3778147542048241766" at="249,58,250,51" concept="1" />
<node id="3778147542048241766" at="250,51,251,22" concept="6" />
<node id="3778147542048241766" at="257,92,258,28" concept="9" />
<node id="3778147542048241766" at="258,28,259,25" concept="1" />
<node id="3778147542048241766" at="263,28,264,20" concept="6" />
<node id="3778147542048241766" at="266,40,267,42" concept="6" />
<node id="3778147542048241766" at="269,48,270,49" concept="6" />
<node id="3778147542048241766" at="273,57,274,83" concept="5" />
<node id="3778147542048241766" at="274,83,275,65" concept="1" />
<node id="3778147542048241766" at="275,65,276,25" concept="6" />
<node id="3778147542048241766" at="278,41,279,41" concept="1" />
<node id="3778147542048241766" at="279,41,280,162" concept="1" />
<node id="3778147542048241766" at="281,11,282,36" concept="5" />
<node id="3778147542048241766" at="282,36,283,44" concept="1" />
<node id="3778147542048241766" at="283,44,284,57" concept="1" />
<node id="3778147542048241766" at="284,57,285,34" concept="1" />
<node id="3778147542048241766" at="285,34,286,25" concept="6" />
<node id="3778147542048241766" at="287,17,288,42" concept="1" />
<node id="3778147542048241766" at="292,0,293,0" concept="8" trace="OBJ" />
<node id="3778147542048241766" at="296,122,297,92" concept="1" />
<node id="3778147542048241766" at="297,92,298,146" concept="1" />
<node id="3778147542048241766" at="302,34,303,90" concept="1" />
<node id="3778147542048241766" at="303,90,304,142" concept="1" />
<node id="3778147542048241766" at="308,34,309,69" concept="1" />
<node id="3778147542048241766" at="309,69,310,146" concept="1" />
<node id="3778147542048241766" at="314,34,315,91" concept="1" />
<node id="3778147542048241766" at="315,91,316,80" concept="1" />
<node id="3778147542048241766" at="321,75,322,99" concept="5" />
<node id="3778147542048241766" at="322,99,323,38" concept="1" />
<node id="3778147542048241766" at="323,38,324,36" concept="5" />
<node id="3778147542048241766" at="324,36,325,55" concept="1" />
<node id="3778147542048241766" at="325,55,326,56" concept="1" />
<node id="3778147542048241766" at="326,56,327,42" concept="1" />
<node id="3778147542048241766" at="327,42,328,134" concept="1" />
<node id="3778147542048241766" at="328,134,329,138" concept="1" />
<node id="3778147542048241766" at="329,138,330,24" concept="6" />
<node id="3778147542048241766" at="335,0,336,0" concept="8" trace="cncpt$Bkq3" />
<node id="3778147542048241766" at="336,0,337,0" concept="8" trace="visibleProperties$B$n7" />
<node id="3778147542048241766" at="340,0,341,0" concept="8" trace="LinkAttribute$v_" />
<node id="3778147542048241766" at="341,0,342,0" concept="8" trace="PropertyAttribute$Gb" />
<node id="3778147542048241766" at="342,0,343,0" concept="8" trace="SimplePropertyReference$l9" />
<node id="3778147542048241766" at="346,0,347,0" concept="8" trace="name$MnvL" />
<node id="3778147542048241766" at="347,0,348,0" concept="8" trace="caption$EPb1" />
<node id="3778147542048241766" at="54,0,56,0" concept="2" trace="myNode" />
<node id="3778147542048246367" at="139,0,141,0" concept="2" trace="myNode" />
<node id="3778147542048241766" at="254,0,256,0" concept="2" trace="myNode" />
<node id="3778147542048241766" at="68,0,71,0" concept="4" trace="createCell#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048241766" at="100,0,103,0" concept="4" trace="compute#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048241766" at="128,0,131,0" concept="4" trace="accept#(Lorg/jetbrains/mps/openapi/model/SNode;)Z" />
<node id="3778147542048246367" at="149,0,152,0" concept="4" trace="createCell#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048246375" at="171,0,174,0" concept="4" trace="accept#(Lorg/jetbrains/mps/openapi/model/SNode;)Z" />
<node id="3778147542048246489" at="215,0,218,0" concept="4" trace="accept#(Lorg/jetbrains/mps/openapi/model/SNode;)Z" />
<node id="3778147542048241766" at="266,0,269,0" concept="4" trace="getSLink#()Lorg/jetbrains/mps/openapi/language/SContainmentLink;" />
<node id="3778147542048241766" at="269,0,272,0" concept="4" trace="getChildSConcept#()Lorg/jetbrains/mps/openapi/language/SAbstractConcept;" />
<node id="3778147542048241766" at="57,0,61,0" concept="0" trace="SimpleEditorDeclaration_EditorBuilder_a#(Ljetbrains/mps/openapi/editor/EditorContext;Lorg/jetbrains/mps/openapi/model/SNode;)V" />
<node id="3778147542048241766" at="120,0,124,5" concept="3" />
<node id="987189325382722093" at="193,0,197,0" concept="4" trace="createIndentCell_0#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="987189325382722109" at="236,0,240,0" concept="4" trace="createIndentCell_1#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048241766" at="257,0,261,0" concept="0" trace="visiblePropertiesListHandler_3o46xk_c2a#(Lorg/jetbrains/mps/openapi/model/SNode;Ljetbrains/mps/openapi/editor/EditorContext;)V" />
<node id="3778147542048241766" at="262,0,266,0" concept="4" trace="getNode#()Lorg/jetbrains/mps/openapi/model/SNode;" />
<node id="3778147542048241766" at="295,97,299,9" concept="3" />
<node id="3778147542048241766" at="301,95,305,9" concept="3" />
<node id="3778147542048241766" at="307,74,311,9" concept="3" />
<node id="3778147542048241766" at="313,96,317,9" concept="3" />
<node id="3778147542048241766" at="62,0,67,0" concept="4" trace="getNode#()Lorg/jetbrains/mps/openapi/model/SNode;" />
<node id="3778147542048241766" at="98,72,103,41" concept="5" />
<node id="3778147542048241766" at="126,150,131,7" concept="5" />
<node id="3778147542048241766" at="131,7,136,22" concept="3" />
<node id="3778147542048246367" at="143,0,148,0" concept="0" trace="Inline_Builder0#(Ljetbrains/mps/openapi/editor/EditorContext;Lorg/jetbrains/mps/openapi/model/SNode;Lorg/jetbrains/mps/openapi/model/SNode;)V" />
<node id="3778147542048246367" at="153,0,158,0" concept="4" trace="getNode#()Lorg/jetbrains/mps/openapi/model/SNode;" />
<node id="3778147542048246375" at="169,157,174,11" concept="5" />
<node id="3778147542048246375" at="174,11,179,26" concept="3" />
<node id="3778147542048246489" at="213,155,218,9" concept="5" />
<node id="3778147542048246489" at="218,9,223,24" concept="3" />
<node id="3778147542048241766" at="273,0,278,0" concept="4" trace="createNodeCell#(Lorg/jetbrains/mps/openapi/model/SNode;)Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048246353" at="89,0,95,0" concept="4" trace="createConstant_0#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048246404" at="197,0,203,0" concept="4" trace="createConstant_1#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048246412" at="240,0,246,0" concept="4" trace="createConstant_2#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048241766" at="294,107,300,7" concept="3" />
<node id="3778147542048241766" at="300,7,306,7" concept="3" />
<node id="3778147542048241766" at="306,7,312,7" concept="3" />
<node id="3778147542048241766" at="312,7,318,7" concept="3" />
<node id="3778147542048241766" at="82,0,89,0" concept="4" trace="createCollection_1#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048241766" at="109,0,116,0" concept="4" trace="createErrorCell#(Ljava/lang/String;)Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048241766" at="246,0,253,0" concept="4" trace="createRefNodeList_0#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048241766" at="185,0,193,0" concept="4" trace="createCollection_2#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048241766" at="228,0,236,0" concept="4" trace="createCollection_3#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048241766" at="280,162,289,7" concept="10" />
<node id="3778147542048241766" at="72,0,82,0" concept="4" trace="createCollection_0#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048241766" at="98,0,109,0" concept="4" trace="createReferenceCell#(Lorg/jetbrains/mps/openapi/model/SNode;)Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048241766" at="320,0,332,0" concept="4" trace="createSeparatorCell#(Lorg/jetbrains/mps/openapi/model/SNode;Lorg/jetbrains/mps/openapi/model/SNode;)Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048241766" at="278,0,291,0" concept="4" trace="createEmptyCell#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048241766" at="96,58,116,6" concept="5" />
<node id="3778147542048246375" at="160,41,182,7" concept="10" />
<node id="3778147542048246489" at="204,39,226,5" concept="10" />
<node id="3778147542048246375" at="159,0,184,0" concept="4" trace="createProperty_0#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048246489" at="203,0,228,0" concept="4" trace="createProperty_1#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048241766" at="294,0,320,0" concept="4" trace="installElementCellActions#(Lorg/jetbrains/mps/openapi/model/SNode;Ljetbrains/mps/openapi/editor/cells/EditorCell;Z)V" />
<node id="3778147542048241766" at="95,0,138,0" concept="4" trace="createRefCell_0#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<scope id="3778147542048241766" at="64,26,65,18" />
<scope id="3778147542048241766" at="68,39,69,32" />
<scope id="3778147542048241766" at="100,39,101,95" />
<scope id="3778147542048241766" at="128,39,129,113" />
<scope id="3778147542048246367" at="149,41,150,32" />
<scope id="3778147542048246367" at="155,28,156,20" />
<scope id="3778147542048246375" at="171,43,172,120" />
<scope id="3778147542048246375" at="180,17,181,42" />
<scope id="3778147542048246489" at="215,41,216,118" />
<scope id="3778147542048246489" at="224,15,225,40" />
<scope id="3778147542048241766" at="263,28,264,20" />
<scope id="3778147542048241766" at="266,40,267,42" />
<scope id="3778147542048241766" at="269,48,270,49" />
<scope id="3778147542048241766" at="287,17,288,42" />
<scope id="3778147542048241766" at="57,103,59,18" />
<scope id="3778147542048241766" at="121,40,123,44" />
<scope id="3778147542048241766" at="132,73,134,145">
<var name="manager" id="3778147542048241766" />
</scope>
<scope id="3778147542048246375" at="175,76,177,147">
<var name="manager" id="3778147542048246375" />
</scope>
<scope id="987189325382722093" at="193,43,195,22">
<var name="editorCell" id="987189325382722093" />
</scope>
<scope id="3778147542048246489" at="219,74,221,145">
<var name="manager" id="3778147542048246489" />
</scope>
<scope id="987189325382722109" at="236,43,238,22">
<var name="editorCell" id="987189325382722109" />
</scope>
<scope id="3778147542048241766" at="257,92,259,25" />
<scope id="3778147542048241766" at="296,122,298,146" />
<scope id="3778147542048241766" at="302,34,304,142" />
<scope id="3778147542048241766" at="308,34,310,146" />
<scope id="3778147542048241766" at="314,34,316,80" />
<scope id="3778147542048241766" at="68,0,71,0" />
<scope id="3778147542048241766" at="100,0,103,0" />
<scope id="3778147542048241766" at="128,0,131,0">
<var name="it" id="3778147542048241766" />
</scope>
<scope id="3778147542048246367" at="143,109,146,20" />
<scope id="3778147542048246367" at="149,0,152,0" />
<scope id="3778147542048246375" at="171,0,174,0">
<var name="it" id="3778147542048246375" />
</scope>
<scope id="3778147542048246489" at="215,0,218,0">
<var name="it" id="3778147542048246489" />
</scope>
<scope id="3778147542048241766" at="266,0,269,0" />
<scope id="3778147542048241766" at="269,0,272,0" />
<scope id="3778147542048241766" at="273,57,276,25">
<var name="elementCell" id="3778147542048241766" />
</scope>
<scope id="3778147542048241766" at="57,0,61,0">
<var name="context" id="3778147542048241766" />
<var name="node" id="3778147542048241766" />
</scope>
<scope id="3778147542048246353" at="89,41,93,22">
<var name="editorCell" id="3778147542048246353" />
</scope>
<scope id="3778147542048241766" at="110,58,114,20">
<var name="cell" id="3778147542048241766" />
</scope>
<scope id="987189325382722093" at="193,0,197,0" />
<scope id="3778147542048246404" at="197,41,201,22">
<var name="editorCell" id="3778147542048246404" />
</scope>
<scope id="987189325382722109" at="236,0,240,0" />
<scope id="3778147542048246412" at="240,41,244,22">
<var name="editorCell" id="3778147542048246412" />
</scope>
<scope id="3778147542048241766" at="257,0,261,0">
<var name="context" id="3778147542048241766" />
<var name="ownerNode" id="3778147542048241766" />
</scope>
<scope id="3778147542048241766" at="262,0,266,0" />
<scope id="3778147542048241766" at="295,97,299,9" />
<scope id="3778147542048241766" at="301,95,305,9" />
<scope id="3778147542048241766" at="307,74,311,9" />
<scope id="3778147542048241766" at="313,96,317,9" />
<scope id="3778147542048241766" at="62,0,67,0" />
<scope id="3778147542048241766" at="82,43,87,22">
<var name="editorCell" id="3778147542048241766" />
</scope>
<scope id="3778147542048246367" at="143,0,148,0">
<var name="context" id="3778147542048246367" />
<var name="node" id="3778147542048246367" />
<var name="referencingNode" id="3778147542048246367" />
</scope>
<scope id="3778147542048246367" at="153,0,158,0" />
<scope id="3778147542048241766" at="246,44,251,22">
<var name="editorCell" id="3778147542048241766" />
<var name="handler" id="3778147542048241766" />
</scope>
<scope id="3778147542048241766" at="273,0,278,0">
<var name="elementNode" id="3778147542048241766" />
</scope>
<scope id="3778147542048241766" at="281,11,286,25">
<var name="emptyCell" id="3778147542048241766" />
</scope>
<scope id="3778147542048246353" at="89,0,95,0" />
<scope id="3778147542048241766" at="185,43,191,22">
<var name="editorCell" id="3778147542048241766" />
</scope>
<scope id="3778147542048246404" at="197,0,203,0" />
<scope id="3778147542048241766" at="228,43,234,22">
<var name="editorCell" id="3778147542048241766" />
</scope>
<scope id="3778147542048246412" at="240,0,246,0" />
<scope id="3778147542048241766" at="82,0,89,0" />
<scope id="3778147542048241766" at="109,0,116,0">
<var name="error" id="3778147542048241766" />
</scope>
<scope id="3778147542048241766" at="246,0,253,0" />
<scope id="3778147542048241766" at="72,43,80,22">
<var name="editorCell" id="3778147542048241766" />
</scope>
<scope id="3778147542048241766" at="185,0,193,0" />
<scope id="3778147542048241766" at="228,0,236,0" />
<scope id="3778147542048241766" at="98,72,107,20">
<var name="cell" id="3778147542048241766" />
</scope>
<scope id="3778147542048241766" at="321,75,330,24">
<var name="editorCell" id="3778147542048241766" />
<var name="style" id="3778147542048241766" />
</scope>
<scope id="3778147542048241766" at="72,0,82,0" />
<scope id="3778147542048241766" at="98,0,109,0">
<var name="targetNode" id="3778147542048241766" />
</scope>
<scope id="3778147542048241766" at="278,41,289,7" />
<scope id="3778147542048241766" at="320,0,332,0">
<var name="nextNode" id="3778147542048241766" />
<var name="prevNode" id="3778147542048241766" />
</scope>
<scope id="3778147542048241766" at="278,0,291,0" />
<scope id="3778147542048246375" at="161,11,179,26">
<var name="currentPropertyAttributes" id="3778147542048246375" />
<var name="editorCell" id="3778147542048246375" />
<var name="property" id="3778147542048246375" />
<var name="propertyAttributes" id="3778147542048246375" />
</scope>
<scope id="3778147542048246489" at="205,9,223,24">
<var name="currentPropertyAttributes" id="3778147542048246489" />
<var name="editorCell" id="3778147542048246489" />
<var name="property" id="3778147542048246489" />
<var name="propertyAttributes" id="3778147542048246489" />
</scope>
<scope id="3778147542048246375" at="159,43,182,7" />
<scope id="3778147542048246489" at="203,41,226,5" />
<scope id="3778147542048241766" at="294,107,318,7" />
<scope id="3778147542048246375" at="159,0,184,0" />
<scope id="3778147542048246489" at="203,0,228,0" />
<scope id="3778147542048241766" at="294,0,320,0">
<var name="elementCell" id="3778147542048241766" />
<var name="elementNode" id="3778147542048241766" />
<var name="isEmptyCell" id="3778147542048241766" />
</scope>
<scope id="3778147542048241766" at="95,40,136,22">
<var name="currentReferenceAttributes" id="3778147542048241766" />
<var name="editorCell" id="3778147542048241766" />
<var name="provider" id="3778147542048241766" />
<var name="referenceAttributes" id="3778147542048241766" />
<var name="referenceLink" id="3778147542048241766" />
</scope>
<scope id="3778147542048241766" at="95,0,138,0" />
<unit id="3778147542048241766" at="99,74,103,9" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_EditorBuilder_a$1$1" />
<unit id="3778147542048241766" at="127,102,131,5" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_EditorBuilder_a$2" />
<unit id="3778147542048246375" at="170,104,174,9" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_EditorBuilder_a$Inline_Builder0$1" />
<unit id="3778147542048246489" at="214,102,218,7" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_EditorBuilder_a$3" />
<unit id="3778147542048241766" at="334,0,338,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_EditorBuilder_a$LINKS" />
<unit id="3778147542048241766" at="345,0,349,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_EditorBuilder_a$PROPS" />
<unit id="3778147542048241766" at="339,0,344,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_EditorBuilder_a$CONCEPTS" />
<unit id="3778147542048241766" at="97,42,116,5" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_EditorBuilder_a$1" />
<unit id="3778147542048246367" at="138,0,185,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_EditorBuilder_a$Inline_Builder0" />
<unit id="3778147542048241766" at="253,0,333,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_EditorBuilder_a$visiblePropertiesListHandler_3o46xk_c2a" />
<unit id="3778147542048241766" at="53,0,350,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimpleEditorDeclaration_EditorBuilder_a" />
</file>
</root>
<root nodeRef="r:480744f7-02c7-40e7-9a5b-a7b55c73f551(jetbrains.mps.samples.highlevel.simpleEditor.editor)/3778147542048242124">
<file name="EditorAspectDeclaration_Editor.java">
<node id="3778147542048242124" at="11,79,12,89" concept="6" />
<node id="3778147542048242124" at="11,0,14,0" concept="4" trace="createEditorCell#(Ljetbrains/mps/openapi/editor/EditorContext;Lorg/jetbrains/mps/openapi/model/SNode;)Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<scope id="3778147542048242124" at="11,79,12,89" />
<scope id="3778147542048242124" at="11,0,14,0">
<var name="editorContext" id="3778147542048242124" />
<var name="node" id="3778147542048242124" />
</scope>
<unit id="3778147542048242124" at="10,0,15,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.EditorAspectDeclaration_Editor" />
</file>
<file name="EditorAspectDeclaration_EditorBuilder_a.java">
<node id="3778147542048242124" at="32,103,33,19" concept="9" />
<node id="3778147542048242124" at="33,19,34,18" concept="1" />
<node id="3778147542048242124" at="39,26,40,18" concept="6" />
<node id="3778147542048242124" at="43,39,44,32" concept="6" />
<node id="3778147542048242124" at="47,43,48,120" concept="5" />
<node id="3778147542048242124" at="48,120,49,48" concept="1" />
<node id="3778147542048242124" at="49,48,50,28" concept="1" />
<node id="3778147542048242124" at="50,28,51,31" concept="1" />
<node id="3778147542048242138" at="51,31,52,49" concept="1" />
<node id="987189325382718501" at="52,49,53,51" concept="1" />
<node id="3778147542048242124" at="53,51,54,22" concept="6" />
<node id="3778147542048242138" at="56,41,57,100" concept="5" />
<node id="3778147542048242138" at="57,100,58,47" concept="1" />
<node id="3778147542048242138" at="58,47,59,34" concept="1" />
<node id="3778147542048242138" at="59,34,60,22" concept="6" />
<node id="3778147542048242124" at="62,43,63,122" concept="5" />
<node id="3778147542048242124" at="63,122,64,49" concept="1" />
<node id="987189325382718514" at="64,49,65,51" concept="1" />
<node id="3778147542048242157" at="65,51,66,52" concept="1" />
<node id="3778147542048242124" at="66,52,67,22" concept="6" />
<node id="987189325382718514" at="69,43,70,85" concept="5" />
<node id="987189325382718514" at="70,85,71,22" concept="6" />
<node id="3778147542048242124" at="73,44,74,100" concept="5" />
<node id="3778147542048242124" at="74,100,75,93" concept="5" />
<node id="3778147542048242124" at="75,93,76,48" concept="1" />
<node id="3778147542048242124" at="76,48,77,51" concept="1" />
<node id="3778147542048242124" at="77,51,78,22" concept="6" />
<node id="3778147542048242124" at="84,82,85,28" concept="9" />
<node id="3778147542048242124" at="85,28,86,25" concept="1" />
<node id="3778147542048242124" at="90,28,91,20" concept="6" />
<node id="3778147542048242124" at="93,40,94,32" concept="6" />
<node id="3778147542048242124" at="96,48,97,49" concept="6" />
<node id="3778147542048242124" at="100,57,101,83" concept="5" />
<node id="3778147542048242124" at="101,83,102,65" concept="1" />
<node id="3778147542048242124" at="102,65,103,25" concept="6" />
<node id="3778147542048242124" at="105,41,106,41" concept="1" />
<node id="3778147542048242124" at="106,41,107,142" concept="1" />
<node id="3778147542048242124" at="108,11,109,36" concept="5" />
<node id="3778147542048242124" at="109,36,110,44" concept="1" />
<node id="3778147542048242124" at="110,44,111,57" concept="1" />
<node id="3778147542048242124" at="111,57,112,34" concept="1" />
<node id="3778147542048242124" at="112,34,113,25" concept="6" />
<node id="3778147542048242124" at="114,17,115,42" concept="1" />
<node id="3778147542048242124" at="119,0,120,0" concept="8" trace="OBJ" />
<node id="3778147542048242124" at="123,122,124,92" concept="1" />
<node id="3778147542048242124" at="124,92,125,146" concept="1" />
<node id="3778147542048242124" at="129,34,130,90" concept="1" />
<node id="3778147542048242124" at="130,90,131,142" concept="1" />
<node id="3778147542048242124" at="135,34,136,69" concept="1" />
<node id="3778147542048242124" at="136,69,137,146" concept="1" />
<node id="3778147542048242124" at="141,34,142,91" concept="1" />
<node id="3778147542048242124" at="149,0,150,0" concept="8" trace="editors$Ty7f" />
<node id="3778147542048242124" at="153,0,154,0" concept="8" trace="SimpleEditorDeclaration$AR" />
<node id="3778147542048242124" at="29,0,31,0" concept="2" trace="myNode" />
<node id="3778147542048242124" at="81,0,83,0" concept="2" trace="myNode" />
<node id="3778147542048242124" at="43,0,46,0" concept="4" trace="createCell#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242124" at="93,0,96,0" concept="4" trace="getSLink#()Lorg/jetbrains/mps/openapi/language/SContainmentLink;" />
<node id="3778147542048242124" at="96,0,99,0" concept="4" trace="getChildSConcept#()Lorg/jetbrains/mps/openapi/language/SAbstractConcept;" />
<node id="3778147542048242124" at="140,96,143,9" concept="3" />
<node id="3778147542048242124" at="32,0,36,0" concept="0" trace="EditorAspectDeclaration_EditorBuilder_a#(Ljetbrains/mps/openapi/editor/EditorContext;Lorg/jetbrains/mps/openapi/model/SNode;)V" />
<node id="987189325382718514" at="69,0,73,0" concept="4" trace="createIndentCell_0#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242124" at="84,0,88,0" concept="0" trace="editorsListHandler_80j1jf_b1a#(Lorg/jetbrains/mps/openapi/model/SNode;Ljetbrains/mps/openapi/editor/EditorContext;)V" />
<node id="3778147542048242124" at="89,0,93,0" concept="4" trace="getNode#()Lorg/jetbrains/mps/openapi/model/SNode;" />
<node id="3778147542048242124" at="122,97,126,9" concept="3" />
<node id="3778147542048242124" at="128,95,132,9" concept="3" />
<node id="3778147542048242124" at="134,74,138,9" concept="3" />
<node id="3778147542048242124" at="37,0,42,0" concept="4" trace="getNode#()Lorg/jetbrains/mps/openapi/model/SNode;" />
<node id="3778147542048242124" at="100,0,105,0" concept="4" trace="createNodeCell#(Lorg/jetbrains/mps/openapi/model/SNode;)Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242124" at="139,7,144,7" concept="3" />
<node id="3778147542048242138" at="56,0,62,0" concept="4" trace="createConstant_0#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242124" at="121,107,127,7" concept="3" />
<node id="3778147542048242124" at="127,7,133,7" concept="3" />
<node id="3778147542048242124" at="133,7,139,7" concept="3" />
<node id="3778147542048242124" at="62,0,69,0" concept="4" trace="createCollection_1#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242124" at="73,0,80,0" concept="4" trace="createRefNodeList_0#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242124" at="47,0,56,0" concept="4" trace="createCollection_0#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242124" at="107,142,116,7" concept="10" />
<node id="3778147542048242124" at="105,0,118,0" concept="4" trace="createEmptyCell#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242124" at="121,0,146,0" concept="4" trace="installElementCellActions#(Lorg/jetbrains/mps/openapi/model/SNode;Ljetbrains/mps/openapi/editor/cells/EditorCell;Z)V" />
<scope id="3778147542048242124" at="39,26,40,18" />
<scope id="3778147542048242124" at="43,39,44,32" />
<scope id="3778147542048242124" at="90,28,91,20" />
<scope id="3778147542048242124" at="93,40,94,32" />
<scope id="3778147542048242124" at="96,48,97,49" />
<scope id="3778147542048242124" at="114,17,115,42" />
<scope id="3778147542048242124" at="141,34,142,91" />
<scope id="3778147542048242124" at="32,103,34,18" />
<scope id="987189325382718514" at="69,43,71,22">
<var name="editorCell" id="987189325382718514" />
</scope>
<scope id="3778147542048242124" at="84,82,86,25" />
<scope id="3778147542048242124" at="123,122,125,146" />
<scope id="3778147542048242124" at="129,34,131,142" />
<scope id="3778147542048242124" at="135,34,137,146" />
<scope id="3778147542048242124" at="43,0,46,0" />
<scope id="3778147542048242124" at="93,0,96,0" />
<scope id="3778147542048242124" at="96,0,99,0" />
<scope id="3778147542048242124" at="100,57,103,25">
<var name="elementCell" id="3778147542048242124" />
</scope>
<scope id="3778147542048242124" at="140,96,143,9" />
<scope id="3778147542048242124" at="32,0,36,0">
<var name="context" id="3778147542048242124" />
<var name="node" id="3778147542048242124" />
</scope>
<scope id="3778147542048242138" at="56,41,60,22">
<var name="editorCell" id="3778147542048242138" />
</scope>
<scope id="987189325382718514" at="69,0,73,0" />
<scope id="3778147542048242124" at="84,0,88,0">
<var name="context" id="3778147542048242124" />
<var name="ownerNode" id="3778147542048242124" />
</scope>
<scope id="3778147542048242124" at="89,0,93,0" />
<scope id="3778147542048242124" at="122,97,126,9" />
<scope id="3778147542048242124" at="128,95,132,9" />
<scope id="3778147542048242124" at="134,74,138,9" />
<scope id="3778147542048242124" at="37,0,42,0" />
<scope id="3778147542048242124" at="62,43,67,22">
<var name="editorCell" id="3778147542048242124" />
</scope>
<scope id="3778147542048242124" at="73,44,78,22">
<var name="editorCell" id="3778147542048242124" />
<var name="handler" id="3778147542048242124" />
</scope>
<scope id="3778147542048242124" at="100,0,105,0">
<var name="elementNode" id="3778147542048242124" />
</scope>
<scope id="3778147542048242124" at="108,11,113,25">
<var name="emptyCell" id="3778147542048242124" />
</scope>
<scope id="3778147542048242138" at="56,0,62,0" />
<scope id="3778147542048242124" at="47,43,54,22">
<var name="editorCell" id="3778147542048242124" />
</scope>
<scope id="3778147542048242124" at="62,0,69,0" />
<scope id="3778147542048242124" at="73,0,80,0" />
<scope id="3778147542048242124" at="47,0,56,0" />
<scope id="3778147542048242124" at="105,41,116,7" />
<scope id="3778147542048242124" at="105,0,118,0" />
<scope id="3778147542048242124" at="121,107,144,7" />
<scope id="3778147542048242124" at="121,0,146,0">
<var name="elementCell" id="3778147542048242124" />
<var name="elementNode" id="3778147542048242124" />
<var name="isEmptyCell" id="3778147542048242124" />
</scope>
<unit id="3778147542048242124" at="148,0,151,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.EditorAspectDeclaration_EditorBuilder_a$LINKS" />
<unit id="3778147542048242124" at="152,0,155,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.EditorAspectDeclaration_EditorBuilder_a$CONCEPTS" />
<unit id="3778147542048242124" at="80,0,147,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.EditorAspectDeclaration_EditorBuilder_a$editorsListHandler_80j1jf_b1a" />
<unit id="3778147542048242124" at="28,0,156,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.EditorAspectDeclaration_EditorBuilder_a" />
</file>
</root>
<root nodeRef="r:480744f7-02c7-40e7-9a5b-a7b55c73f551(jetbrains.mps.samples.highlevel.simpleEditor.editor)/3778147542048242234">
<file name="SimplePropertyReference_Editor.java">
<node id="3778147542048242234" at="11,79,12,89" concept="6" />
<node id="3778147542048242234" at="11,0,14,0" concept="4" trace="createEditorCell#(Ljetbrains/mps/openapi/editor/EditorContext;Lorg/jetbrains/mps/openapi/model/SNode;)Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<scope id="3778147542048242234" at="11,79,12,89" />
<scope id="3778147542048242234" at="11,0,14,0">
<var name="editorContext" id="3778147542048242234" />
<var name="node" id="3778147542048242234" />
</scope>
<unit id="3778147542048242234" at="10,0,15,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_Editor" />
</file>
<file name="SimplePropertyReference_EditorBuilder_a.java">
<node id="3778147542048242234" at="45,103,46,19" concept="9" />
<node id="3778147542048242234" at="46,19,47,18" concept="1" />
<node id="3778147542048242234" at="52,26,53,18" concept="6" />
<node id="3778147542048242234" at="56,39,57,32" concept="6" />
<node id="3778147542048242234" at="60,43,61,118" concept="5" />
<node id="3778147542048242234" at="61,118,62,48" concept="1" />
<node id="3778147542048242234" at="62,48,63,28" concept="1" />
<node id="3778147542048242234" at="63,28,64,31" concept="1" />
<node id="3778147542048242248" at="64,31,65,48" concept="1" />
<node id="3778147542048242234" at="65,48,66,22" concept="6" />
<node id="3778147542048242234" at="68,40,69,57" concept="5" />
<node id="3778147542048242234" at="73,39,74,95" concept="6" />
<node id="3778147542048242234" at="76,40,77,60" concept="1" />
<node id="3778147542048242234" at="77,60,78,48" concept="1" />
<node id="3778147542048242234" at="78,48,79,58" concept="1" />
<node id="3778147542048242234" at="79,58,80,20" concept="6" />
<node id="3778147542048242234" at="83,58,84,97" concept="5" />
<node id="3778147542048242234" at="84,97,85,131" concept="1" />
<node id="3778147542048242234" at="85,131,86,135" concept="1" />
<node id="3778147542048242234" at="86,135,87,20" concept="6" />
<node id="3778147542048242234" at="89,6,90,0" concept="7" />
<node id="3778147542048242234" at="90,0,91,42" concept="1" />
<node id="3778147542048242234" at="91,42,92,50" concept="5" />
<node id="3778147542048242234" at="92,50,93,0" concept="7" />
<node id="3778147542048242234" at="94,40,95,40" concept="1" />
<node id="3778147542048242234" at="95,40,96,43" concept="1" />
<node id="3778147542048242234" at="97,5,98,143" concept="1" />
<node id="3778147542048242234" at="98,143,99,150" concept="5" />
<node id="3778147542048242234" at="101,39,102,113" concept="6" />
<node id="3778147542048242234" at="105,73,106,87" concept="5" />
<node id="3778147542048242234" at="106,87,107,145" concept="6" />
<node id="3778147542048242234" at="108,10,109,22" concept="6" />
<node id="3778147542048242250" at="114,0,115,0" concept="2" trace="myReferencingNode" />
<node id="3778147542048242250" at="116,109,117,21" concept="9" />
<node id="3778147542048242250" at="117,21,118,42" concept="1" />
<node id="3778147542048242250" at="118,42,119,20" concept="1" />
<node id="3778147542048242250" at="122,41,123,32" concept="6" />
<node id="3778147542048242250" at="128,28,129,20" concept="6" />
<node id="3778147542048242257" at="132,43,133,41" concept="1" />
<node id="3778147542048242257" at="134,11,135,51" concept="5" />
<node id="3778147542048242257" at="135,51,136,78" concept="1" />
<node id="3778147542048242257" at="136,78,137,150" concept="5" />
<node id="3778147542048242257" at="137,150,138,47" concept="1" />
<node id="3778147542048242257" at="138,47,139,46" concept="1" />
<node id="3778147542048242257" at="139,46,140,38" concept="5" />
<node id="3778147542048242257" at="140,38,141,56" concept="1" />
<node id="3778147542048242257" at="141,56,142,44" concept="1" />
<node id="3778147542048242257" at="142,44,143,88" concept="1" />
<node id="3778147542048242257" at="143,88,144,35" concept="1" />
<node id="3778147542048242257" at="144,35,145,157" concept="5" />
<node id="3778147542048242257" at="147,43,148,120" concept="6" />
<node id="3778147542048242257" at="151,76,152,91" concept="5" />
<node id="3778147542048242257" at="152,91,153,147" concept="6" />
<node id="3778147542048242257" at="154,14,155,26" concept="6" />
<node id="3778147542048242257" at="156,17,157,42" concept="1" />
<node id="3778147542048242234" at="163,0,164,0" concept="8" trace="prop$HoTw" />
<node id="3778147542048242234" at="167,0,168,0" concept="8" trace="LinkAttribute$v_" />
<node id="3778147542048242234" at="168,0,169,0" concept="8" trace="PropertyAttribute$Gb" />
<node id="3778147542048242234" at="172,0,173,0" concept="8" trace="name$MnvL" />
<node id="3778147542048242234" at="42,0,44,0" concept="2" trace="myNode" />
<node id="3778147542048242250" at="112,0,114,0" concept="2" trace="myNode" />
<node id="3778147542048242234" at="56,0,59,0" concept="4" trace="createCell#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242234" at="73,0,76,0" concept="4" trace="compute#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242234" at="101,0,104,0" concept="4" trace="accept#(Lorg/jetbrains/mps/openapi/model/SNode;)Z" />
<node id="3778147542048242250" at="122,0,125,0" concept="4" trace="createCell#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242257" at="147,0,150,0" concept="4" trace="accept#(Lorg/jetbrains/mps/openapi/model/SNode;)Z" />
<node id="3778147542048242234" at="45,0,49,0" concept="0" trace="SimplePropertyReference_EditorBuilder_a#(Ljetbrains/mps/openapi/editor/EditorContext;Lorg/jetbrains/mps/openapi/model/SNode;)V" />
<node id="3778147542048242234" at="93,0,97,5" concept="3" />
<node id="3778147542048242234" at="50,0,55,0" concept="4" trace="getNode#()Lorg/jetbrains/mps/openapi/model/SNode;" />
<node id="3778147542048242234" at="71,72,76,40" concept="5" />
<node id="3778147542048242234" at="99,150,104,7" concept="5" />
<node id="3778147542048242234" at="104,7,109,22" concept="3" />
<node id="3778147542048242250" at="116,0,121,0" concept="0" trace="Inline_Builder0#(Ljetbrains/mps/openapi/editor/EditorContext;Lorg/jetbrains/mps/openapi/model/SNode;Lorg/jetbrains/mps/openapi/model/SNode;)V" />
<node id="3778147542048242250" at="126,0,131,0" concept="4" trace="getNode#()Lorg/jetbrains/mps/openapi/model/SNode;" />
<node id="3778147542048242257" at="145,157,150,11" concept="5" />
<node id="3778147542048242257" at="150,11,155,26" concept="3" />
<node id="3778147542048242234" at="82,0,89,0" concept="4" trace="createErrorCell#(Ljava/lang/String;)Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242234" at="60,0,68,0" concept="4" trace="createCollection_0#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242234" at="71,0,82,0" concept="4" trace="createReferenceCell#(Lorg/jetbrains/mps/openapi/model/SNode;)Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242234" at="69,57,89,6" concept="5" />
<node id="3778147542048242257" at="133,41,158,7" concept="10" />
<node id="3778147542048242257" at="132,0,160,0" concept="4" trace="createProperty_0#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<node id="3778147542048242234" at="68,0,111,0" concept="4" trace="createRefCell_0#()Ljetbrains/mps/openapi/editor/cells/EditorCell;" />
<scope id="3778147542048242234" at="52,26,53,18" />
<scope id="3778147542048242234" at="56,39,57,32" />
<scope id="3778147542048242234" at="73,39,74,95" />
<scope id="3778147542048242234" at="101,39,102,113" />
<scope id="3778147542048242250" at="122,41,123,32" />
<scope id="3778147542048242250" at="128,28,129,20" />
<scope id="3778147542048242257" at="147,43,148,120" />
<scope id="3778147542048242257" at="156,17,157,42" />
<scope id="3778147542048242234" at="45,103,47,18" />
<scope id="3778147542048242234" at="94,40,96,43" />
<scope id="3778147542048242234" at="105,73,107,145">
<var name="manager" id="3778147542048242234" />
</scope>
<scope id="3778147542048242257" at="151,76,153,147">
<var name="manager" id="3778147542048242257" />
</scope>
<scope id="3778147542048242234" at="56,0,59,0" />
<scope id="3778147542048242234" at="73,0,76,0" />
<scope id="3778147542048242234" at="101,0,104,0">
<var name="it" id="3778147542048242234" />
</scope>
<scope id="3778147542048242250" at="116,109,119,20" />
<scope id="3778147542048242250" at="122,0,125,0" />
<scope id="3778147542048242257" at="147,0,150,0">
<var name="it" id="3778147542048242257" />
</scope>
<scope id="3778147542048242234" at="45,0,49,0">
<var name="context" id="3778147542048242234" />
<var name="node" id="3778147542048242234" />
</scope>
<scope id="3778147542048242234" at="83,58,87,20">
<var name="cell" id="3778147542048242234" />
</scope>
<scope id="3778147542048242234" at="50,0,55,0" />
<scope id="3778147542048242250" at="116,0,121,0">
<var name="context" id="3778147542048242250" />
<var name="node" id="3778147542048242250" />
<var name="referencingNode" id="3778147542048242250" />
</scope>
<scope id="3778147542048242250" at="126,0,131,0" />
<scope id="3778147542048242234" at="60,43,66,22">
<var name="editorCell" id="3778147542048242234" />
</scope>
<scope id="3778147542048242234" at="82,0,89,0">
<var name="error" id="3778147542048242234" />
</scope>
<scope id="3778147542048242234" at="60,0,68,0" />
<scope id="3778147542048242234" at="71,72,80,20">
<var name="cell" id="3778147542048242234" />
</scope>
<scope id="3778147542048242234" at="71,0,82,0">
<var name="targetNode" id="3778147542048242234" />
</scope>
<scope id="3778147542048242257" at="134,11,155,26">
<var name="currentPropertyAttributes" id="3778147542048242257" />
<var name="editorCell" id="3778147542048242257" />
<var name="property" id="3778147542048242257" />
<var name="propertyAttributes" id="3778147542048242257" />
<var name="style" id="3778147542048242257" />
</scope>
<scope id="3778147542048242257" at="132,43,158,7" />
<scope id="3778147542048242257" at="132,0,160,0" />
<scope id="3778147542048242234" at="68,40,109,22">
<var name="currentReferenceAttributes" id="3778147542048242234" />
<var name="editorCell" id="3778147542048242234" />
<var name="provider" id="3778147542048242234" />
<var name="referenceAttributes" id="3778147542048242234" />
<var name="referenceLink" id="3778147542048242234" />
</scope>
<scope id="3778147542048242234" at="68,0,111,0" />
<unit id="3778147542048242234" at="162,0,165,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_EditorBuilder_a$LINKS" />
<unit id="3778147542048242234" at="171,0,174,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_EditorBuilder_a$PROPS" />
<unit id="3778147542048242234" at="72,74,76,9" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_EditorBuilder_a$1$1" />
<unit id="3778147542048242234" at="100,102,104,5" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_EditorBuilder_a$2" />
<unit id="3778147542048242257" at="146,104,150,9" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_EditorBuilder_a$Inline_Builder0$1" />
<unit id="3778147542048242234" at="166,0,170,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_EditorBuilder_a$CONCEPTS" />
<unit id="3778147542048242234" at="70,42,89,5" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_EditorBuilder_a$1" />
<unit id="3778147542048242250" at="111,0,161,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_EditorBuilder_a$Inline_Builder0" />
<unit id="3778147542048242234" at="41,0,175,0" name="jetbrains.mps.samples.highlevel.simpleEditor.editor.SimplePropertyReference_EditorBuilder_a" />
</file>
</root>
</debug-info>
|
Marple Township, Delaware County, Pennsylvania
Marple Township is a township in Delaware County, Pennsylvania, United States. It contains the census designated place of Broomall. The population was 23,743 at 2015. ZIP codes include mainly 19008, but also partially 19064 and 19063. The township is run by Marple Township board of commissioners, under President Joseph Rufo and Vice President Daniel Leefson.
History
The Delaware County area was first settled by Quakers who came to Pennsylvania by the Delaware River on September 29, 1683. The ship they used was called the Endeavor. Marple Township was originally settled in 1684 and was recognized as a township in the same year. The original spelling of the township was Marpool, but the spelling was changed to Marple in the Thomas Holme map of 1687. The Marpool spelling may have been an error.
One of the settlers who arrived on the Endeavor was Thomas Massey. He obtained a 300-acre plantation in the township from William Penn. The house he built on the land is still preserved today, as well as some of its surrounding gardens. Another historical family known as the Van Leers built several historical sites and lived in the area. Dr. Bernardhus Van Leer owned the nearby Van Leer House and his family built the nearby Van Leer Cabin.
In 1948 Marple Township got its first police station. Before, there was no local branch, no patrols of the police, and only a county sheriff. Crimes were mostly settled between victims and perpetrators themselves.
Marple became a first class township in 1961.
Geography
According to the United States Census Bureau, the township has a total area of 10.5 square miles (27.2 km²), of which, 10.2 square miles (26.4 km²) is land and 0.3 square miles (0.8 km²; 2.95%) is water.
The community of Broomall is located in, but is not coterminous with, Marple Township—the township also includes part of the ZIP codes of Springfield and Media. Other villages include Larchmont (also in Newtown Township) and Lawrence Park.
Waterways in Marple Township include Crum Creek, Darby Creek, Hotland Run, Springton Lake and Trout Run.
Adjacent municipalities
Radnor Township - north
Haverford Township - east
Nether Providence Township, Delaware County, Pennsylvania - south
Springfield Township - southeast
Upper Providence Township - southwest
Newtown Township - northwest
Climate
Marple Township straddles the boundary between a hot-summer humid continental climate (Dfa) and a humid subtropical climate (Cfa). The average monthly temperature in Broomall ranges from 31.8 °F in January to 77.0 °F in July. The hardiness zone is 7a and the annual average absolute minimum temperature in Broomall is 1.9 °F.
Demographics
As of the census of 2010, there were 23,428 people, down slightly from 23,737 people in 2000. The racial makeup of the township was 89.6% White, 2.1% African American, 0.1% Native American, 7.0% Asian, 0.3% from other races, and 0.9% from two or more races. Hispanic or Latino people of any race were 1.3% of the population.
The 2000 census showed 8,623 households, and 6,415 families residing in the township. The population density was 2,326.1 people per square mile (898.5/km²). There were 8,797 housing units at an average density of 862.1/sq mi (333.0/km²). The racial makeup of the township was 92.60% White, 1.10% African American, 0.09% Native American, 5.51% Asian, 0.12% from other races, and 0.59% from two or more races. Hispanic or Latino people of any race were 0.66% of the population.
There were 8,623 households, out of which 30.0% had children under the age of 18 living with them, 64.1% were married couples living together, 7.6% had a female householder with no husband present, and 25.6% were non-families. 22.6% of all households were made up of individuals, and 13.0% had someone living alone who was 65 years of age or older. The average household size was 2.64 and the average family size was 3.12.
In the township the population was spread out, with 21.8% under the age of 18, 6.3% from 18 to 24, 24.8% from 25 to 44, 25.0% from 45 to 64, and 22.0% who were 65 years of age or older. The median age was 43 years. For every 100 females, there were 89.4 males. For every 100 females age 18 and over, there were 85.1 males.
The median income for a household in the township was $59,577, and the median income for a family was $71,829. Males had a median income of $47,062 versus $32,304 for females. The per capita income for the township was $28,494. About 2.1% of families and 4.6% of the population were below the poverty line, including 3.7% of those under age 18 and 5.0% of those age 65 or over.
Government
Marple Township is governed by a Board of Commissioners made up of representatives from each of the township's wards which meets for regular sessions. The current commissioners, by ward, are Joseph Rufo (R-1), Jan Ceton (R-2), Robert Fortebouno (R-3), John Lucas (R-4), John Longacre (R-5), Michael Molinaro (R-6), and Daniel Leefson (R-7). Rufo currently serves as the board's president.
Politics
Marple generally leans to the right on the political spectrum. In the 2008 general elections, the township voted Republican for every office except for the General Assembly representative from the 166th district.
Along with Aston, Bethel, Chadds Ford, Concord, Edgmont, Middletown, Newtown, Springfield, and Tinicum, Marple was one of the ten Delaware County municipalities to vote Republican in the 2008 presidential election. The county as a whole voted Democratic.
Education
Marple Township lies within the Marple Newtown School District. The district has four elementary schools, one middle school, and one high school.
Delaware County Community College, a public, two-year community college, is also located in Marple Township.
The township is also served by the Marple Public Library.
Transportation
Roads serving Marple Township include U.S. Route 1, which passes north-south through the southern part of the township along a freeway; Pennsylvania Route 3, which passes east-west through the northern part of the township along West Chester Pike; Pennsylvania Route 252, which passes north-south through the western part of the township along Newtown Street Road; Pennsylvania Route 320, which passes north-south through the township along Sproul Road; and Interstate 476, which passes north-south through the eastern part of the township along the Blue Route and has interchanges with US 1 and PA 3.
SEPTA provides Suburban Bus service to Marple Township along Route 104, which follows West Chester Pike through the township on its route between West Chester and 69th Street Transportation Center in Upper Darby; Route 107, which runs from the Lawrence Park Shopping Center in the township to 69th Street Transportation Center via the Springfield Mall; Route 112, which follows Media Line Road and West Chester Pike through the township on its route between Delaware County Community College and the 69th Street Transportation Center; Route 115, which offers weekday service along Media Line Road and West Chester Pike through the township on its route between Delaware Community College and the Darby Transportation Center in Darby and the Philadelphia International Airport; Route 118, which follows Newtown Street Road through the township on its route between Newtown Square and the Chester Transportation Center in Chester; Route 120, which follows West Chester Pike through the township on its route between Cheyney University and the 69th Street Transportation Center; and Route 126, which runs from the Lawrence Park Shopping Center in the township to 69th Street Transportation Center via Havertown.
Parks
Marple Township has a system of eleven parks. They are maintained by the municipal government.
Broomall Fields - contains Little League Baseball fields for Marple Little League
Green Bank Farm - a large field with a walking and hiking trail
Highland Avenue Park - a small park with a roller hockey rink, basketball court, and tennis backboard
Kent Park - contains a playground area, a picnic area with barbecues, a gazebo with picnic benches, a stream, a paved walking trail, and tennis courts
Malin Road Tot Lot - same features as Kent Park
Marple Gardens - features a playground, picnic area with barbecues, basketball court, and a kids baseball / softball field which is used for Marple Tee-Ball
New Ardmore Avenue Park - playground, picnic area with barbecues, basketball court, large fields, and creek
Old Marple School Park - playground, picnic area, walking trail, and sledding hill
South Marple Little League - tennis courts, roller hockey rink, and snack bar
Thomas Fields - two Little League baseball fields, a Babe Ruth baseball field, two snack bars, a small playground, and trail to Kent Park
Veteran's Memorial Park - large playground, walking trail, large field, entertainment gazebo, restrooms, and soda machines
References
External links
Marple Township
Marple Township at DelawareCountyPA.com
Marple Township Historical Society
Digital copies of old recordings
Category:Broomall, Pennsylvania
Category:Van Leer family
Category:Townships in Delaware County, Pennsylvania |
Q:
Conditional formatting an area anchored to a criteria cell
I would like the following result:
Number of cells (here 3) highlighted below the cell contains TRUE
Is there any solution for this?
A:
There is no VBA needed:
Go to cell D4 and select it (otherwise the provided formula will not work).
Add a conditional formatting rule (formula) and add this as formula:
=OR(IFERROR(D1=TRUE,FALSE),IFERROR(D2=TRUE,FALSE),IFERROR(D3=TRUE,FALSE),IFERROR(D4=TRUE,FALSE))
Save the rule and copy format of D4 into your desired range. The result will be like below:
Note that WAHR means TRUE (sorry for german screenshot)
|
# Definition: tomcat::war
#
# Manage deployment of WAR files.
#
# Parameters:
# - $catalina_base is the base directory for the Tomcat installation
# - $app_base is the path relative to $catalina_base to deploy the WAR to.
# Defaults to 'webapps'.
# - The $deployment_path can optionally be specified. Only one of $app_base and
# $deployment_path can be specified.
# - $war_ensure specifies whether you are trying to add or remove the WAR.
# Valid values are 'present', 'absent', 'true', and 'false'. Defaults to
# 'present'.
# _ Optionally specify a $war_name. Defaults to $name.
# - $war_purge is a boolean specifying whether or not to purge the exploded WAR
# directory. Defaults to true. Only applicable when $war_ensure is 'absent'
# or 'false'. Note: if tomcat is running and autodeploy is on, setting
# $war_purge to false won't stop tomcat from auto-undeploying exploded WARs.
# - $war_source is the source to deploy the WAR from. Currently supports
# http(s)://, puppet://, and ftp:// paths. $war_source must be specified
# unless $war_ensure is set to 'false' or 'absent'.
define tomcat::war(
$catalina_base = $::tomcat::catalina_home,
$app_base = undef,
$deployment_path = undef,
$war_ensure = 'present',
$war_name = undef,
$war_purge = true,
$war_source = undef,
) {
validate_re($war_ensure, '^(present|absent|true|false)$')
validate_bool($war_purge)
if $app_base and $deployment_path {
fail('Only one of $app_base and $deployment_path can be specified.')
}
if $war_name {
$_war_name = $war_name
} else {
$_war_name = $name
}
validate_re($_war_name, '\.war$')
if $deployment_path {
$_deployment_path = $deployment_path
} else {
if $app_base {
$_app_base = $app_base
} else {
$_app_base = 'webapps'
}
$_deployment_path = "${catalina_base}/${_app_base}"
}
if $war_ensure =~ /^(absent|false)$/ {
file { "${_deployment_path}/${_war_name}":
ensure => absent,
force => false,
}
if $war_purge {
$war_dir_name = regsubst($_war_name, '\.war$', '')
if $war_dir_name != '' {
file { "${_deployment_path}/${war_dir_name}":
ensure => absent,
force => true
}
}
}
} else {
if ! $war_source {
fail('$war_source must be specified if you aren\'t removing the WAR')
}
staging::file { $name:
source => $war_source,
target => "${_deployment_path}/${_war_name}",
}
}
}
|
The present invention relates to a device for driving a light source such as a semiconductor light-emitting element, in particular a semiconductor laser diode (LD), in such a way that it outputs light (laser light) of very short pulses having duration of several tens of picoseconds at a desired repetition frequency.
In order to produce laser light of very short pulses having duration of several tens of picoseconds from laser diodes, the latter must be supplied with electric pulses having duration of several hundreds of picoseconds. Such short electric pulses are commonly produced by utilizing the avalanche breakdown of avalanche transistors or with comb generators.
The repetition frequency of avalanche transistors is limited to about 100 kHz by the recovery time of avalanche breakdown and the charge time required to build up a high voltage. On the other hand, with comb generators, the repetition frequency of more than 1 GHz can be obtained, but the use of a resonance circuit precludes operation at variable repetition frequencies.
There is another type of a drive device which can produce such short electric pulses at variable repetition frequencies by utilizing the abrupt reverse current cut-off characteristic of a step-recovery diode. However, in this device the upper limit of the repetition frequency is about 10 MHz. |
Alterations of emotion, cognition and firing activity of the basolateral nucleus of the amygdala after partial bilateral lesions of the nigrostriatal pathway in rats.
Although increasing evidence indicates that psychiatric symptoms are crucial characteristic of the early stage of Parkinson's disease (PD) and precede motor impairments, the neuronal firing activity of the basolateral nucleus of the amygdala (BLA) in the psychiatric symptom of PD and the involved mechanism are still unclear. In the present study, we examined the changes in emotional and cognitive tests not focused on motor fluency and firing activity of projection neurons in the BLA rats with 6-hydroxydopamine (6-OHDA) injected bilaterally into dorsal striatum, and the effects of apomorphine and the medial prefrontal cortex (mPFC) on these changes. Injection of 6-OHDA (10.5 μg) into the dorsal striatum produced 18-22% and 26-30% loss of tyrosine hydroxylase immunoreactive neurons in the ventral tegmental area and substantia nigra pars compacta of rats, respectively. The striatal lesions induced anxiety-like responses in the rats but did not result in depressive-like behavior or cognitive impairments. In the lesioned rats, the firing rate of BLA projection neurons decreased significantly compared with sham-operated rats, and the firing pattern of BLA projection neurons was not changed. No significant differences were observed either in behaviors or firing activity of BLA projection neurons by further ibotenic acid lesions of the mPFC in the lesioned rats. Systemic administration of cumulative apomorphine (10-160 μg/kg) inhibited the firing rate of BLA projection neurons in sham-operated, 6-OHDA-lesioned and combined 6-OHDA- and mPFC-lesioned rats, but the latter needed more apomorphine stimulation. These data suggest that the anxiety in early stage of PD is possibly related to the decrease in firing activity of BLA projection neurons, which may be regulated by the activation of dopamine receptor in the mPFC. |
#!/bin/bash
mkdir -p pinloc-1k-cb132
cd pinloc-1k-cb132
pins="
A1 A2 A4 A5 A6 A7 A10 A12 B1 B14
C1 C3 C4 C5 C6 C7 C8 C9 C10 C11 C12 C14
D1 D3 D4 D5 D6 D7 D8 D9 D10 D11 D12 D14
E1 E4 E11 E12 E14 F3 F4 F11 F12 F14
G1 G3 G4 G11 G12 G14 H1 H3 H4 H11 H12
J1 J3 J11 J12 K3 K4 K11 K12 K14
L1 L4 L5 L6 L7 L8 L9 L12 L14
M1 M3 M4 M6 M7 M8 M9 M11 M12 N14
P2 P3 P4 P5 P7 P8 P9 P10 P11 P12 P13 P14
"
if [ $(echo $pins | wc -w) -ne 95 ]; then
echo "Incorrect number of pins:" $(echo $pins | wc -w)
exit 1
fi
{
echo -n "all:"
for pin in $pins; do
id="pinloc-1k-cb132_${pin}"
echo -n " ${id}.exp"
done
echo
for pin in $pins; do
id="pinloc-1k-cb132_${pin}"
echo "module top(output y); assign y = 0; endmodule" > ${id}.v
echo "set_io y ${pin}" >> ${id}.pcf
echo; echo "${id}.exp:"
echo " ICEDEV=hx1k-cb132 bash ../../icecube.sh ${id} > ${id}.log 2>&1"
echo " ../../../icebox/icebox_explain.py ${id}.asc > ${id}.exp.new"
echo " ! grep '^Warning: pin' ${id}.log"
echo " rm -rf ${id}.tmp"
echo " mv ${id}.exp.new ${id}.exp"
done
} > pinloc-1k-cb132.mk
set -ex
make -f pinloc-1k-cb132.mk -j4
python3 ../pinlocdb.py pinloc-1k-cb132_*.exp > ../pinloc-1k-cb132.txt
|
Characterization of initial clinical symptoms and risk factors for sinonasal adenocarcinomas: results of a case-control study.
Sinonasal adenocarcinoma is a rare cancer, frequently associated with occupational exposure to inhalable wood dust. Among the EU member States, Germany was reported to have the highest number of exposed workers. Location and long latency make early diagnosis difficult. This case-control study was aimed at assessing potential risk factors and at characterizing initial clinical symptoms, both serving as matrix to identify persons at increased risk and to improve management of this cancer. Of 58 patients, 31 diagnosed with sinonasal adenocarcinoma (cases) between 1973 and 2007 were identified and underwent standardized interview on clinical data. A total of 85 patients diagnosed over the same period with carcinoma of the oral cavity served as controls. The ethmoid was confirmed as the predominant site of adenocarcinoma associated with wood dust exposure, whereas the nasal cavity was most commonly affected in patients denying any exposure to wood dust. Cases were significantly engaged in mainly woodworking occupations compared to controls. The main initial clinical symptoms were nasal obstruction 6 months (71%) and epistaxis 4 years (41.9%) prior to diagnosis. Hardwood dust from beech and oak proved to be the most common occupational exposure, with a mean exposure period of 32.3 years and a latency of 43.5 (34-58) years. Our investigation confirms the importance of regular screenings for persons exposed to wood dust even years after the end of occupational or private exposure. Banal clinical symptoms such as epistaxis and nasal obstruction might be predictive, requiring early and thorough investigation. |
Forecast calls for a low of 23 degrees tonight. I think anyone who wants to preserve fruit that has any amount of water in it should bring it in. It will likely have damage if not.
I still have some apples, many quinces, and tons of medlars. Quinces are pretty dry so they should be ok. Medlars don't last that long anyway, so I guess I'm mostly thinking about apples. Ive got a small tree full of gold rush.
I would be interested to hear anyone else's opinion too of course. John SPDX OR
You cannot post new topics in this forumYou cannot reply to topics in this forumYou cannot edit your posts in this forumYou cannot delete your posts in this forumYou cannot post attachments in this forum |
An example of a video descriptor generation device is disclosed in Patent Document 1. FIG. 27 is a block diagram showing a video descriptor generation device described in Patent Document 1.
An each-frame feature extraction unit 10 calculates a frame unit feature from an input video, and outputs it to a feature table creation unit 20. The feature table creation unit 20 creates a feature table from the frame unit feature output from the each-frame feature extraction unit 10, and outputs the feature table as a video descriptor.
Next, operation of the device shown in FIG. 27 will be described.
The each-frame feature extraction unit 10 performs a process of extracting a feature such as the color of each frame from an input video, and outputs the obtained feature to the feature table creation unit 20 as a frame unit feature.
The feature table creation unit 20 performs processing on variations in the feature between frames using a threshold, and compresses the feature in a time direction. Specifically, the feature table creation unit 20 calculates a difference between the frame unit features of frames, and determines whether or not the difference is within a certain allowable variation range. Then, the feature table creation unit 20 divides the video into time segments in which the video is within the allowable variation range, and for each of the divided time segments, a set of the feature and the time segment length (the number of frames) is output as a video descriptor.
As such, the feature of the video obtained for each frame can be compressed in a time direction, whereby the feature size can be reduced. Further, high-speed matching can also be realized.
Patent Document 1: Japanese Unexamined Patent Publication No. 10-320400 |
// Choreo version 1
actor "!Target1"
{
channel "Audio"
{
event speak "fmdoesushonor"
{
time 0.020000 2.244082
param "npc_vortigaunt.fmdoesushonor"
param2 "75dB"
fixedlength
}
}
channel "Look"
{
event lookat "player"
{
time 0.026667 2.213333
param "!player"
}
}
channel "Head"
{
}
channel "Facial"
{
}
}
scalesettings
{
"CChoreoView" "100"
"RampTool" "100"
"ExpressionTool" "100"
"GestureTool" "100"
"SceneRampTool" "100"
}
fps 60
snap off
|
Background
==========
Urban air pollution remains a major health risk to millions of urban residents worldwide as it is estimated that about 1.3 million deaths annually are attributable to urban air pollution \[[@B1]\]. The problem is intensifying in many cities and towns in the developing world where growing urban populations and the attendant increase in activities which have led to a rise in air polluting emissions. This is coupled with industrial growth amidst weak or non-existent environmental protection laws, leading to levels of air pollution that often exceed emissions standards set by the World Health Organization \[[@B2]-[@B5]\]. In addition, urban poor populations are more disadvantaged in terms of exposure to air pollution because of poor housing structures, close proximity to air pollution sources and the types of fuel used for cooking. However, little is known about how people view air pollution in urban areas.
Studies on air pollution in Africa and other low- and middle-income countries (LMICs) are few \[[@B5]\]. As LMICs work towards gaining industrialised status, economic growth is emphasized at the expense of the environment and the health of the people. In these contexts, there is greater need for environmental stakeholders to address air \[environmental\] pollution in order to set the stage for inclusive and well-informed interventions aimed at reducing air \[environmental\] pollution effect. A starting point for such enquiry would be looking at individual perceptions and attitudes towards air pollution. Gaining knowledge of peoples' perceptions of air pollution is important, as it reflects the social dimensions and circumstances under which people understand pollution \[[@B6]\]. This knowledge helps to ensure that policy and communication frameworks achieve desired change in public attitudes and behaviour.
To involve lay opinions in the process of policy making, it would be important to understand public perceptions as they are important factors in the successful implementation of environmental policies \[[@B6],[@B7]\]. First, understanding public perceptions of air pollution and associated risk will ensure there is a consultative process in the formulation of policies as opposed to the existing top-down approach where the public is largely a recipient of policy actions without giving any input in their formulation \[[@B7]\]. Secondly, perceptions of pollution and the associated consequences will give implementing agencies the opportunity to assess public knowledge regarding air pollution as well as any misconceptions that might exist. Addressing these misconceptions could increase involvement of the public in policy implementation \[[@B5]\]. Thirdly, understanding people's perceptions would inform the entry point of actions/interventions aimed at mitigating pollution-related risks \[[@B8]\].
In order to address the prevailing pollution, policies need to be formulated and implemented to curb emissions and encourage air friendly practices among the populace. The acceptance of formulated policies requires the cooperation of the populace as some of the policy actions would impact them directly or may require individual behaviour change. Indeed, the 1992 Earth Summit recommended the inclusion of the public in the environment policy process to ensure the effective implementation of formulated policies \[[@B9]\]. However, there has been little progress on inclusion of public globally as most environmental policies tend to lean more on science than on public opinions \[[@B7]\]. The top-down approach in policy formulation and implementation has been faced with serious challenges as the public view of risk does not overlay the scientific opinion of that risk \[[@B10],[@B11]\]. This disconnect has led to failure of sections of the public adhering to existing policies. For example, a study in a province in China found that the population was largely ignorant of existing environmental protection policies and were not adhering to expected actions \[[@B12]\].
Perception of risk or vulnerability is a central component of health promotion theories and has been found to be shaped by several factors. This study is anchored on the general protection motivation theory \[[@B13]\] that posits that the intention to protect one-self is dependent on: 1) the perceived severity of a threatening event, 2) the perceived probability of the occurrence, or vulnerability, 3) the efficacy of the recommended preventive behaviour, and 4) the perceived self-efficacy to undertake the recommended preventive behaviour. In this study, the perceptions about air pollution levels and related health risks form the first and second components of the theory. The third component refers to the common practices among the residents that are expected to reduce air pollution and exposure levels. Lastly, the perceptions of residents regarding their role in addressing the prevailing air pollution represent the fourth component of the theory. Studies have found that perceptions on levels of air pollution are shaped by the presence of suspected sources of pollution such as industries or busy roads \[[@B8],[@B14]\]. Further, social interactions that ensure the diffusion of knowledge have been shown to shape perceptions \[[@B15]\].
Studies in developed countries show that people in poor neighbourhoods are less likely to report air pollution as an issue of top concern \[[@B14]\]. However, there exist contrary findings in similar contexts \[[@B16]\]. Research evidence suggests that people's level of attachment to the place of residence and social capital determines how they responded about the levels of air pollution and their willingness to take action against pollution. People with high attachment to their place of residence and those with high social capital are less likely to report air pollution as an issue to avoid stigma, and are also likely to take action to address air pollution \[[@B17],[@B18]\].
In slum areas around the world, environmental degradation ranks among the key challenges residents face \[[@B19],[@B20]\]. This is compounded by the fact that many slums are located near industrial districts or close to busy highways. In addition, crowding, a characteristic of many slums, renders the adoption of measures to reduce pollution at individual household level ineffective due to a 'neighbourhood effect' in which adopting households may continue to suffer due to exposure from non-compliant households. Lastly, the political, social and economic exclusion of slum areas \[[@B21]\] puts them in a vulnerable position as they lack systems to manage such things as waste collection or find a collective voice to bargain for services and protection against external polluters such as industries.
There is limited evidence on people's perceptions and attitudes towards air pollution in Kenya. Therefore, the objective of the study was to assess the perceptions and attitudes of slum residents about air pollution. This study is expected to provide insights into people's perceptions on air pollution and what they consider to be their role in addressing air pollution. The results emerging from this study will be important in informing other larger studies in similar and/or different contexts as well as informing the design of quantitative studies on air pollution. The results will also be crucial to informing acceptable entry points for interventions to mitigate pollution.
Methods
=======
Context
-------
The study was conducted in two slums in Nairobi city; Korogocho and Viwandani. These sites were selected because of an on-going health and demographic surveillance initiated in 2002 which is a reliable sampling frame \[[@B22]\]. A detailed description of the Health and Demographic Surveillance System carried out in the two areas is given elsewhere \[[@B22]\]. One striking difference between the two slums is the proximity of Viwandani to the industrial area where diverse manufacturing activities occur and where traffic flow is constant as trucks deliver materials and pick up finished goods. Alternatively, Korogocho is near the city's municipal dumpsite and faces several environmental issues arising from proximity to this location. The two slums are also characterized by activities believed to raise the levels of both indoor and outdoor air pollution.
The two sites have some differences regarding the population structure, education and income generating activities. Viwandani residents are more educated and dependent on economic activities that are more stable, while in Korogocho, unstable economic activities dominate. Other differences can be seen in the physical structures of the houses with Korogocho having mostly mud-walled houses with zinc sheet roofing and mud flooring, while in Viwandani, the walls and roofs are made of zinc sheets and floors are cemented. Thus, Viwandani has a better household socio-economic outlook as compared to Korogocho.
In spite of these differences, the two sites are similar in that they are both slum communities located in close proximity to major pollution sources and face similar environmental challenges.
Design of study and data
------------------------
We designed a qualitative study on the perceptions and attitudes towards air pollution of people living in Korogocho and Viwandani. This study was designed as an exploratory study in a context of non-existent data on people's perceptions and attitudes towards air pollution, nor data on levels of air pollutants. The study sought to inform an on-going qualitative study in the same communities as well as inform the monitoring of pollutant levels both at the community level and in individual households.
A total of eight focus group discussions (FGDs) were held with adult residents of the two communities, four in each community. The discussions were separately held with younger adults (18--29 years; n = 39) and older adults (30 and above; n = 42) as it was felt that the younger adults might be intimidated by the presence of older participants, affecting their contribution to the discussions. In addition, youths in slum settings use a colloquial language called "sheng" that is not widely understood by older people. The participants were of mixed gender as there was no anticipated personal information that would be withheld in the presence of the opposite sex. Groups had between nine and 11 participants with roughly equal representation of the sexes. Participants differed in their ethnic background as well as level of education, employment status and duration of stay in the community. This was preferred to ensure a diversity of opinions regarding air pollution. Table [1](#T1){ref-type="table"} summarizes some of the background characteristics of the participants (see Table [1](#T1){ref-type="table"}).
######
Distribution of FGD participants by select background characteristics
**Percent**
--------------------------------- -------------
**Sex**
Female 51.9
Male 48.2
**Slum of residence**
Korogocho 49.4
Viwandani 50.6
**Age**
19-29 years 48.2
30+ years 51.9
**Duration of stay in slum**
\<10 years 28.4
10-19 years 22.2
\>20 years 49.4
**Level of education**
None 12.4
Primary 50.6
Secondary or Higher 37.0
**Occupation Type**
None 27.2
Business (petty or established) 44.4
Employee (casual or long term) 28.4
**N = 81**
We employed an emergent design in which we analysed the data and revised the study guide based on results from the first set of discussions. The discussions were therefore conducted in two waves to allow the researchers, time to conduct some analysis of the collected data in order to revise the guide as necessary. In the first round of the FGDs, two groups were convened at each site during the month of November 2012. The second round of discussions was conducted in January 2013. With the help of community mobilizers, the researchers purposively selected the participants. The participants were selected as much as possible from all villages within each slum to ensure that different areas of the slums were represented.
The discussions were conducted in Kiswahili, which is the national language widely spoken in Kenya, and particularly, in the urban slums and well understood by all participants. However, participants were allowed to express themselves in Kiswahili, English or "Sheng" (a mix of Kiswahili, English and local languages). The FGDs were moderated by the second author while the first author took notes. In Korogocho, we conducted the first discussions in an office within a health facility. The second round of discussions was held within an office block a distance away from the health facility where there were fewer disturbances from those visiting or working at the facility. In Viwandani, all discussions were held in a community hall.
On average, the FGDs took 50 minutes and were recorded and later transcribed and translated into English by the note taker. Upon analysis of the first round of discussions (four FGDs), the FGD guide was revised, dropping some of the questions that were not eliciting any new information from the groups and adding new questions that occurred during the earlier discussions. The initial FGD guide had six questions ranging from what comes to the mind of participants when they heard about environmental pollution to issues about the sources of outdoor and indoor air pollution. Furthermore, participants were asked about their thoughts on the government's and residents' responsibilities in addressing air pollution in their communities. After revision, the questions on people's understanding of the environment and risk were dropped as the responses showed no variation in the first four groups. In addition, new questions on participants' concerns about air pollution and a question to compare perceived levels of indoor and outdoor air pollution were included.
The transcribed discussions were transferred to NVivo 9 to help organise the data for analysis and interpretation. Coding was done based on recurring themes that were identified through reading of transcripts or observations of recurrent issues raised by participants. Other themes were identified based on diversity of views and contradiction. Some broad themes identified through review of literature formed the basis of the interview guide prior to the discussions. Some of these themes were retained in the final analysis while others were refined or new ones formed based on participants' responses. This was achieved during the transcription process as well as through further reading of the transcribed discussions and analysis of the coded data which done by the lead author. The transcripts were shared with two of the co-authors and a qualitative researcher in Nairobi who is not a co-author but who gave insights into the analysis of the data. However, triangulation of these analyses was not done. Thematic analysis was used because of its appropriateness in selecting the most recurrent perceptions.
Ethical considerations
----------------------
The study was reviewed and granted ethical clearance by the African Medical Research Foundation's (AMREF) ethics review committee. Informed consent was sought in two stages. First, during recruitment, the researchers provided the potential participants with full disclosure regarding the study, which included information on the purpose of the study and procedures. Second, consent was obtained before recording the discussions. Written informed consent was sought for participation and for audio recording just before the discussions started. All participants wore numbered tags which were used as identifiers during the discussions. Participants were informed of the use of number tags as opposed to their actual names in the discussions. In addition they were informed that their identity would not be disclosed in any reports or publications arising from the data.
Results
=======
The results from the narratives of adult participants from both communities formed seven thematic areas. These included mixed knowledge about sources of air pollution; sensing air pollution; who is to blame?; poor housing and neighbourhood effects; desperate practices; resistance and ignorance; and fatalism and helplessness. The results are structured into sections according to the seven thematic areas identified.
Knowledge on sources of air pollution
-------------------------------------
### Outdoor air pollution
#### Mixed knowledge about sources of air pollution
We sought to learn about participants' thoughts regarding the sources of outdoor and indoor air pollution in their communities. It emerged from the discussions that residents had mixed knowledge about the sources of air pollution as well as some of the consequences of exposure to this pollution. While participants generally correctly identified sources of outdoor air pollution, there were occasions when it was evident that the knowledge prevailing in these communities was flawed. For example, the view that smelly drainage channels and toilets were a source of air pollution was frequently expressed by both the young and older participants from both communities. Similarly, participants from both communities raised the issue of drainage channels as important sources of air pollution. They were said to emit foul smells due to stagnant water and people's habits of dumping waste including faecal matter into the channels. Other opinions expressed by the participants was that lack of toilets also led to air pollution as open defecation and the use of 'flying' toilets were used as alternatives, as was the common method of emptying pit latrines using uncovered drums - exposing residents to fouls smells. In addition, poverty and preference for cheap fuel materials were mentioned as factors contributing to the use of alternative fuels such as plastic bags, gunny bags, and cloth rags, especially among roadside food vendors in Korogocho, and as such, contributing to air pollution.
#### Sensing air pollution
During the discussions, it was apparent that participants relied more on their senses to assess their exposure to pollution and in identifying sources of pollution. Sensory perception of pollution sources was stressed throughout the discussions with participants using terms such as seeing a cloud of smoke covering the area, pungent smells from factories and dumpsites and soot falling on people and buildings. This brings to the fore the apparent reliance on the senses to inform perceptions on sources and individual exposure.
#### Who is to blame?
There were mixed opinions towards who was responsible for air pollution in the community with some attributing the state of outdoor air to residents while others felt it was primarily due to sources external to the communities. Several participants from Korogocho mentioned the municipal garbage dumpsite as the biggest polluter. The participants mentioned that the dumpsite was always on fire, covering the entire community of Korogocho in smoke that was 'corrosive' as the following quote indicates:
That dumpsite is the biggest air pollutant, because when that dumpsite is lit, there is a lot of smoke coming here, it is dark, people cough and there are schools down there \[near the dumpsite\] sometimes teachers tell the pupils 'today there has been a lot of smoke so when you go home tell your parents to give you milk' ... it is bad smoke, like acid; there are medicines and many chemicals burning in the dumpsite (older female, Korogocho).
In addition, the burning of medical waste in the open by local clinics, cigarette smoking, dust and motorcycle fumes were also mentioned as major sources of air pollution. Industrial emissions were also mentioned as sources of pollution but these were not seen as important polluters in Korogocho.
Conversely, discussions in Viwandani revealed that industries were perceived as the biggest sources of air pollution. Both the young and older adults were very emotive when discussing the industries' contribution to air pollution. Sometimes the emissions from the industries were said to be so bad that people had to step far away from the community in order to get fresh air. The following excerpts capture Viwandani residents' views on the role of industries in air pollution.
...these industries when night comes they start working, they emit smoke \[expression of annoyance\] even when you are sleeping you just have to wake up ... to open the door and stand outside; they emit smoke! \[Expression of annoyance\]" (young male, Viwandani).
There is an industry here eh; like yesterday they were releasing some chemical eh yesterday, we couldn't stay up here, those of us who stay up there we couldn't stay there we had to go elsewhere; you would see people moving away (young male, Viwandani).
In addition, an emerging unofficial dumpsite and people's habits of burning trash were indicated as other major sources of air pollution in Viwandani. During one of the discussion sessions, participants shared that their community is sandwiched between two major sources of pollution, the industries on one side and the illegal dumping site on the other. Further, participants shared that most of the smoke from the dumpsite was experienced at night when the garbage was burned. Other important sources of air pollution identified were burning of tyres to extract metal and cigarette smoking. It was surprising that as much as people in Viwandani were exposed to vehicular emissions from busy traffic coming in and out of the industrial area, this was not mentioned in any of the discussions.
### Indoor air pollution
#### Poor housing and neighbourhood effect
With regard to people's knowledge of indoor air pollution, participants were aware of the sources contributing to the poor quality of indoor air. These ranged from the type of cooking fuel, cooking stoves and smoking of cigarettes indoors. Other sources include the poorly constructed and congested houses in the two communities that were said to encourage cross-pollution from the outdoors and neighbours. Congestion was seen as limiting the use of corridors as cooking points instead of cooking in the same room where the family slept. It emerged that the kerosene used by many households was considered too smoky, and therefore, dangerous to the residents' health. In addition, poverty was said to promote the use of poor quality second-hand cooking stoves (i.e., stoves that had previously been used) that were seen to emit more smoke as compared with newer ones. In both communities, participants shared that many people used plastic or rubber materials as well as old foam mattresses to light their charcoal stoves, emitting foul smelling smoke. In addition, the small rooms that households occupied were said to magnify the problem of indoor air pollution due to crowding and lack of vents to release bad indoor air; as the following excerpt indicates:
... because houses are not well ventilated and one room serves as the kitchen, bedroom and sitting room and you use a charcoal stove. I have a child who has asthma and I took him to the hospital to get oxygen... they advised me not to cook while the child is in the house. But if there is only one room, it is a must the child is present when cooking is going on... if the houses were proper it would reduce the smoke (Older female, Korogocho).
The discussions revealed the existence of a 'neighbourhood effect' that was acknowledged to contribute to indoor air pollution in people's homes. For example, participants mentioned that people took advantage of the poor structures they lived in and opted to not ventilate their houses when a stove was being used. Instead, they chose to create venting holes on the side of the neighbour's house, who then bears the brunt of their emissions. Outdoor influences, especially industry emissions and roadside cooking spots were mentioned as important contributors to indoor air pollution.
#### Desperate practices
Other drivers of indoor air pollution that emerged from the discussions were the prevailing practices with regard to ventilation. When asked about use of ventilation when cooking, it was clear that there was a disparity between knowledge and practice. For example, respondents shared that one needs to open the windows and doors when cooking with a kerosene or charcoal stove to vent the emissions, however, they reported that this was indeed not practised because of the poor nature of houses and the levels of insecurity in the communities. In addition, some houses were said to lack windows and people only opened the door during the day and had to endure the emissions at night as insecurity forces them to keep the door closed. Fear of the cold outdoor air was also mentioned as a reason why people chose not to open the windows or doors. It also emerged that space constraints prevented people from opening windows to let in fresh air.
In Korogocho, it emerged that fear of illnesses such as malaria and of the cold outdoor air drove people to negatively modify the eaves of their houses. When asked whether houses had eaves, several respondents answered in unison that *"many people fear malaria,"* and so to ward off mosquitoes and the cold, they chose to block the eaves with plastic bags and other materials available to them as indicated in these opinions:
*There is a space between the roof and wall but to prevent the cold, we have blocked it with gunny bags* (these are bags made of sisal or plastic fibre) *and curtains so there is no way air from in can get out or from outside get in"(Older female, Korogocho).*
... the ceiling is made of gunny bags, on the sides there are gunny bags so there are no spaces, so when smoke fills the room it just stays (older male, Korogocho).
### Reducing outdoor and indoor air pollution
#### Resistance and ignorance
When asked what residents could do to reduce the levels of air pollution in the community, there were mixed reactions with some people feeling that there was nothing they could do. Fear of fights was cited as prohibiting people from asking neighbours or other community members to stop practices that were contributing to air pollution. On the other hand, there were those who felt that residents had a responsibility of ensuring the environment was kept clean, instead of waiting for outsiders to come and clean their backyard. Discussions about possible relocation of the dumpsite from Korogocho emerged to be unpopular among residents. Many residents rely on the dumpsite as a source of livelihood through scavenging; therefore, even though they were aware of the hazards the dumpsite posed, they were opposed to its relocation. As one participant put it:
See that dumpsite, there are groups \[involved in scavenging for recyclable materials\] and together with some priests we formed one environmental group, we started recycling. That dumpsite has created employment for youth; it has created employment for 30% and caused 5% deaths (Older male, Korogocho).
Similar opinions emerged in Viwandani where it was felt that relocation of industries to a less habited place would be resisted as many people were employed in the industries. It was also felt that such a move would be pointless as people would 'follow' the industries and continue living in close proximity to these industries. Also discussions around the residents' opinions on temporary closure of the industries to allow installation of emission control systems seem to be an unpopular move due to its impact on jobs. However, participants agreed that there was need for the government to enforce strict emissions control measures in the industries.
Participants from both communities voiced the need to create awareness about air pollution and measures needed to reduce exposure as the following opinion indicates:
I think it would be good if people can be sensitized about the environment so that people know how their environment should be, the things they should do to avoid polluting or the effects of pollution; this will be achieved for example through discussions like this which has made us know where we were perhaps going wrong and we can correct that... If we had organizations that would sensitize people ... So it is my appeal that for those who don't know we have organizations that educate them on the environment so that people have that awareness to help reduce pollution (young male, Viwandani).
#### Fatalism and helplessness
There were sentiments of fatalism when asked whether residents were concerned about air pollution. The participants felt they could not do much to address the issue of air pollution. They appeared to have rationalized the state of the environment in which they lived and were resigned to it. Expressions indicating residents viewed their polluted space as normal were heard from both the young and older adults in both communities. One participant best summed it by saying, *"We are used... we have got used to this \[air pollution\] we forgot it is a problem" (Older female, Korogocho).*
In the discussions, there were those who felt helpless and they relied on religion to find solace as one participant indicated: *"It's God who protects us, the kind of dirt we have seen in this place is a lot" (Young female, Korogocho)*. This sentiment also revealed a flawed state of knowledge on the health impacts of pollution and the lack of appreciation of the central role individuals ought to play in ensuring the environment is safe for them to live in.
There was a sense of frustration among respondents as they raised issues about the lack of a voice to petition leaders to address issues about the pollution occurring in their communities, especially, for those sources that were external to the slums. The Viwandani participants reported being threatened with eviction if they raised these issues. The following discussions reveal what residents faced:
We usually tell them and when we tell them, they mostly say we should know we are living under electric lines \[high voltage lines\] we will be moved. You hear a lot of things; we feel we are troubled; sewage line passes here, because we are not known by the government so we just decide to keep quiet so we can live here longer (Older male, Viwandani).
We tell them \[government representatives\] but we are told we should know that the government does not know there are people living here. We are forced to keep quiet but we know we are being oppressed (Older male, Viwandani).
On the other hand, Korogocho residents pointed fingers at the local leadership for worsening the pollution; for instance, allocating building space without leaving space for functions such as waste collection.
Discussion and conclusion
=========================
This study explored the general perception and understanding among residents in two slums in Nairobi about air pollution and associated health risks in their community. We acknowledge that slum residents face various environmental challenges that are not limited to air pollution alone. However, since this study sought to assess the perceptions on air pollution, the discussion was limited to this objective. The main highlights indicate that residents of both slums relied on sensory perceptions to assess air pollution and its sources. There was an apparent disconnect between knowledge and practice as far as the use of ventilation was concerned. In addition, the participants expressed a lack of agency to address the current state of air quality in the two communities. These findings are similar to those from a recent quantitative study conducted in the two slums \[[@B23]\].
Outdoor air pollution in the two communities was mainly attributed to garbage dumpsites located in close proximity to both communities. Combustion of the garbage was cited to be a major contributor of smoke and soot in both locations, while industrial emissions were in addition, of great importance to Viwandani residents. Similar findings were observed by Howel and colleagues \[[@B24]\] on the important role of place in forming public perceptions. People's perceptions on pollution were informed by their sensory experience, for instance, the visible clouds of smoke and soot from the dumpsites and factories as well as the odorous emissions from industries and drainage channels. Sensory perceptions have been reported as important in informing perceptions of sources and exposure \[[@B8],[@B18],[@B25]\] and in subsequent response to the exposure \[[@B25]\]. The reliance on sensory perceptions in these communities also raises a red-flag for pollutants that are not odorous. For example, indoor air pollution from carbon monoxide might be ignored with fatal consequences.
There was a feeling that many of the activities carried out by residents, such as burning trash, were of a scale that was smaller in importance as compared to the major polluters, namely the industries and dump sites. This shift of responsibility to other entities has been reported in other studies as a mechanism adopted by individuals to distance themselves from any direct contribution to the problem at hand \[[@B6]\]. We found no evidence of a 'neighbourhood halo effect' that has been reported in other studies, where people are unwilling to attribute pollution to their place of residence as compared to other areas \[[@B8],[@B16],[@B24],[@B25]\]. This can be attributed to the loose attachment many slum residents have to their place of residence given the informal nature of the settlements and the obvious disadvantage in terms of access to services compared to the neighbouring middle and upper class residential areas. The absence of a 'halo effect' would be an important attribute in the event programs aimed at reducing air pollution or exposure, are introduced. This is because residents already identify their communities as polluted spaces; a fact that might make them more accepting of programs/interventions to address the issue. In addition, the findings of this study are contrary to the review by Saksena \[[@B5]\] that pointed to studies indicating that among people of low socio-economic status, air pollution was out-ranked by other more urgent issues. In fact, this study finds that as much as residents had other issues to think about, pollution was on the forefront as an issue of concern.
The feeling of helplessness can be attributed to the lack of voice among the residents to approach their leaders and to demand action. Given their informal residential status, poverty and lack of alternatives, many felt entrapped in this polluted space. It is also a consequence of poor social capital among residents, which inhibits collective action against pollution \[[@B16],[@B26]\]. Residents raised the issue of counter threats whenever they went to the local leaders to petition them to take action against polluters. This helplessness was exacerbated by the lack of security of the tenure on the land on which residents lived and the informal status of the slums. Studies elsewhere have shown that lack of attachment to a place limits people's investment in the place and can lead to inaction against pollution \[[@B8],[@B16],[@B18]\].
Further, there was an apparent lack of agency as people felt there was nothing they could do to reduce the levels of pollution in their communities; lack of agency has been attributed to lower socio-economic status \[[@B16],[@B26]\]. This lack of agency could derail any efforts the government puts in place to address air pollution in these and similar communities. Therefore, the government must first address these barriers to ensure they effectively implement pollution control and other environmental protection policies.
People's ignorance about the 'true' effects of air pollution was evident in their daily practices such as blocking the eaves to prevent cold, dust and mosquitoes. This finding could be explained by the lack of public education on issues concerning air pollution and indeed, environmental issues in general. In addition, people's actions might be justified given the poor housing available in their communities and their lack of resources to facilitate residential moves to better houses. As such, residents had the hard choice of either letting in the cold, polluted outdoor air and mosquitoes or living with indoor air pollution.
This study has revealed the perceptions of slum residents regarding both indoor and outdoor air pollution. We find that only the first two pillars of the protection motivation theory informing this study are fulfilled in the study settings. However, the reported behaviour is not protective as it puts residents at higher risk of exposure to air pollution while lack of agency makes it difficult for residents to address air pollution. From the findings we conclude there is an urgent need to create awareness among residents on the effects of air pollution and the need for each individual to take part in reducing the levels of air and general environmental pollution.
However, the study faces some limitations on coverage and lack of inclusion of all stakeholders in the survey. The study covered only two slums and it would be useful to also understand the perceptions of residents in both formal and informal settlements. The current study interviewed people aged 18 years and above, however, it would be worthwhile to also to get the views of school going children particularly those aged 10--17 years. This age group represents a special group with high risk because of exposure to outdoor air pollution during outdoor activities. We also didn't conduct key informant interviews which would have provided information on the ways to support the residents in reducing the health burden from air pollution. Despite these limitations the study still provides useful insights on the perceptions about air pollution among the urban poor residents.
Future research and action
--------------------------
The following should be considered or included in future research as they were not considered in this study. First a similar study should be conducted in different parts of the city to enable a comparison of perceptions along socio-economic classes and across different neighbourhoods. Second, conduct a study to identify sustainable solutions to air pollution that can work not only in the study communities but city-wide and nationally by including key stakeholders. Third, conduct studies that include school-going children as participants.
Competing interests
===================
The authors declare there are no competing interests.
Authors' contributions
======================
All authors conceptualized the study. KM and TE designed the study guide and conducted the FGDs. TE moderated the discussions while KM took notes, transcribed the discussions, analysed the data and drafted the manuscript. TE, NN, EK, NN reviewed all earlier drafts of the manuscript and all authors signed off the final version of the manuscript. All authors read and approved the final manuscript.
Pre-publication history
=======================
The pre-publication history for this paper can be accessed here:
<http://www.biomedcentral.com/1471-2458/14/226/prepub>
Acknowledgements
================
We are greatly indebted to the participants from the two communities who took their time from their busy schedules to share their views with us. We are grateful to Dr. Netsayi Mudege and Dr. Benta Abuya for their input in various stages in the design of the study and data analysis, and in reading the manuscript. The work was undertaken within the Umea Centre for Global Health Research, with the support for graduate studies and data collection from the FAS, the Swedish Council for Working Life, and Social Research (Grant No. 2006--1512). Analysis and writing time was funded by the African Population and Health Research Center through a grant by the Bill and Melinda Gates Foundation (Grant No. OPP 1021893).
|
378 Persons Killed By Fulani Herdsmen In Agatu Communities In Two Years – Agatu Forum
The Agatu people of Benue State, under the aegis of Agatu Network Forum, have called on the Federal Government to protect them, lamenting that attacks by Fulani herdsmen from Nasarawa State in the last two years has resulted in the death of 378 of their kinsmen.
It would be recalled that at least 94 persons were killed in Egba – part of Agatu community – about two weeks ago by suspected Fulani herdsmen, who also left destruction of property and farmlands in the wake of their attack.
Addressing a press conference in Abuja on Thursday, Chairman of the Forum, Chris Enechie, noted that the attacks by Fulani herdsmen had displaced 15,760 Agatu indigenes while 1,317 homes had been destroyed.
He added that 1,480 livestock had been lost, with 142 motorcycles and 17 vehicles destroyed during the incessant attacks on various Agatu communities, including Okokolo, Egba, Obagaji, Usha, and Ogwule Kaduna.
According to Enechie, other Agatu communities, such as Oshugbudu, Enugba and Ogwule Ogbaulu, had also suffered similar devastating attacks from the marauders, whom he said wanted to drive the indigenous people from their ancestral homes.
Enechie, therefore, pleaded with the federal government to establish a military post in Agatuland to protect the people from further attacks, adding that the people could no longer cultivate their farmlands for fear of being attacked and killed. |
The AllPrep DNA/RNA Mini Kit allows the simultaneous purification of genomic DNA and total RNA from the same biological sample. DNA is purified using the novel AllPrep DNA spin column. RNA is purified from the AllPrep column flow-through using an RNeasy Mini spin column. The kit can be automated on the QIAcube, and is compatible with up to 107 cells or 30 mg tissue.
Genomic DNA and total RNA were purified from 10-fold serial dilutions of rat kidney homogenate using the AllPrep DNA/RNA Micro Kit; at each dilution, DNA was purified from duplicates, and RNA was purified from 4 replicates. [A] Real-time PCR analysis of the Pgk1 gene and [B] real-time RT-PCR analysis of the Jun transcript showed reliable quantification over a wide dynamic range, from 5 mg down to 50 ng tissue.
The AllPrep DNA/RNA Mini Kit is designed for purifying both genomic DNA and total RNA from a single cell or tissue sample. Since there is no need to divide the sample into two for separate purification procedures, maximum yields of DNA and RNA can be achieved. The purified DNA and RNA are eluted separately and ready to use in any downstream application.
Procedure
A simple workflow allows the purification of high-quality DNA and RNA from the same sample in as little as 35 minutes (see flowchart "AllPrep DNA/RNA procedure"). Both cultured cells and easy-to-lyse tissues can be processed. Genomic DNA is purified using the novel AllPrep DNA spin column, and total RNA is purified using an RNeasy Mini spin column. A supplementary protocol allows optional purification of protein. For experiments where DNA, RNA, and protein are regularly prepared from each sample, the AllPrep DNA/RNA/Protein Mini Kit can be used instead.
When disrupting and homogenizing tissues in Buffer RLT Plus (supplied with the AllPrep DNA/RNA Mini Kit), excessive foaming may occur. This foaming is substantially reduced by adding Reagent DX (supplied separately) to Buffer RLT Plus at a final concentration of 0.5% (v/v) before starting disruption and homogenization. Reagent DX has been carefully tested with the kit, and has no effect on RNA purity or on downstream applications such as real-time RT-PCR. Buffer RLT Plus containing Reagent DX can be stored at room temperature (15–25ºC) for at least 9 months.
Applications
The purified genomic DNA with an average length of 15–30 kb, depending on homogenization conditions, is suited for any application, including Southern-, dot-, and slot-blot analyses; and PCR and multiplex PCR.
The purified total RNA can be used in any application, such as: RT-PCR and real-time RT-PCR; differential display; cDNA synthesis; northern-, dot-, and slot-blot analyses; and microarrays.
A supplementary protocol allows optional purification of protein. The purified protein is denatured and can be used in applications such as SDS-PAGE, western blotting, and 2D gel electrophoresis. |
José Miguel Moreno
José Miguel Moreno (Madrid, 1955) is a Spanish specialist of historical plucked string instruments, such as the vihuela, lute, theorbo, and guitars. In 1977 he won the First Prize of the Incontri Chitarristici di Gargnano (Italy) and later many awards for his recordings. He has undertaken recordings and live concerts with the renowned ensemble "Hesperion XX" and Jordi Savall as well as with his own formations La Romanesca and Orphenica Lyra - after the book Orphénica Lyra (1554) of Miguel de Fuenllana. He is also, with his brother violist Emilio Moreno, co-founder of the Spanish classical music label Glossa Music.
References
External links
Official website
Glossa (Record Label)
Artist Management (Classic Concert)
mp3: Sonata D minor - S. L. Weiss
Category:Spanish classical guitarists
Category:Male guitarists
Category:Spanish performers of early music
Category:1946 births
Category:Living people
Category:Spanish lutenists
Category:People from Madrid |
Emeritus Specialist Status
Emeritus Specialist status recognizes the past and continuing contribution of a certified lawyer in the advancement of the speciality area through related career activities that do not constitute the actual practice of law. |
.. _infernalis-release-notes:
v9.2.1 Infernalis
=================
This Infernalis point release fixes several packagins and init script
issues, enables the librbd objectmap feature by default, a few librbd
bugs, and a range of miscellaneous bug fixes across the system.
We recommend that all infernalis v9.2.0 users upgrade.
For more detailed information, see :download:`the complete changelog <../changelog/v9.2.1.txt>`.
Upgrading
---------
* Some symbols wrongly exposed by the C++ interface for librados in
v9.1.0 and v9.2.0 were removed. If you compiled your own
application against librados shipped with these releases, it is very
likely referencing these removed symbols. So you will need to
recompile it.
Notable Changes
---------------
* build/ops: Ceph daemon failed to start, because the service name was already used. (`issue#13474 <http://tracker.ceph.com/issues/13474>`_, `pr#6833 <http://github.com/ceph/ceph/pull/6833>`_, Chuanhong Wang)
* build/ops: ceph upstart script rbdmap.conf incorrectly processes parameters (`issue#13214 <http://tracker.ceph.com/issues/13214>`_, `pr#6396 <http://github.com/ceph/ceph/pull/6396>`_, Sage Weil)
* build/ops: libunwind package missing on CentOS 7 (`issue#13997 <http://tracker.ceph.com/issues/13997>`_, `pr#6845 <http://github.com/ceph/ceph/pull/6845>`_, Loic Dachary)
* build/ops: rbd-replay-* moved from ceph-test-dbg to ceph-common-dbg as well (`issue#13785 <http://tracker.ceph.com/issues/13785>`_, `pr#6628 <http://github.com/ceph/ceph/pull/6628>`_, Loic Dachary)
* build/ops: systemd/ceph-disk@.service assumes /bin/flock (`issue#13975 <http://tracker.ceph.com/issues/13975>`_, `pr#6852 <http://github.com/ceph/ceph/pull/6852>`_, Loic Dachary)
* build/ops: systemd: no rbdmap systemd unit file (`issue#13374 <http://tracker.ceph.com/issues/13374>`_, `pr#6500 <http://github.com/ceph/ceph/pull/6500>`_, Boris Ranto)
* common: auth/cephx: large amounts of log are produced by osd (`issue#13610 <http://tracker.ceph.com/issues/13610>`_, `pr#6836 <http://github.com/ceph/ceph/pull/6836>`_, Qiankun Zheng)
* common: log: Log.cc: Assign LOG_DEBUG priority to syslog calls (`issue#13993 <http://tracker.ceph.com/issues/13993>`_, `pr#6993 <http://github.com/ceph/ceph/pull/6993>`_, Brad Hubbard)
* crush: crash if we see CRUSH_ITEM_NONE in early rule step (`issue#13477 <http://tracker.ceph.com/issues/13477>`_, `pr#6626 <http://github.com/ceph/ceph/pull/6626>`_, Sage Weil)
* fs: Ceph file system is not freeing space (`issue#13777 <http://tracker.ceph.com/issues/13777>`_, `pr#7431 <http://github.com/ceph/ceph/pull/7431>`_, Yan, Zheng, John Spray)
* fs: Ceph-fuse won't start correctly when the option log_max_new in ceph.conf set to zero (`issue#13443 <http://tracker.ceph.com/issues/13443>`_, `pr#6395 <http://github.com/ceph/ceph/pull/6395>`_, Wenjun Huang)
* fs: Segmentation fault accessing file using fuse mount (`issue#13714 <http://tracker.ceph.com/issues/13714>`_, `pr#6853 <http://github.com/ceph/ceph/pull/6853>`_, Yan, Zheng)
* librbd: Avoid re-writing old-format image header on resize (`issue#13674 <http://tracker.ceph.com/issues/13674>`_, `pr#6630 <http://github.com/ceph/ceph/pull/6630>`_, Jason Dillaman)
* librbd: ImageWatcher shouldn't block the notification thread (`issue#14373 <http://tracker.ceph.com/issues/14373>`_, `pr#7406 <http://github.com/ceph/ceph/pull/7406>`_, Jason Dillaman)
* librbd: QEMU hangs after creating snapshot and stopping VM (`issue#13726 <http://tracker.ceph.com/issues/13726>`_, `pr#6632 <http://github.com/ceph/ceph/pull/6632>`_, Jason Dillaman)
* librbd: Verify self-managed snapshot functionality on image create (`issue#13633 <http://tracker.ceph.com/issues/13633>`_, `pr#7080 <http://github.com/ceph/ceph/pull/7080>`_, Jason Dillaman)
* librbd: [ FAILED ] TestLibRBD.SnapRemoveViaLockOwner (`issue#14164 <http://tracker.ceph.com/issues/14164>`_, `pr#7079 <http://github.com/ceph/ceph/pull/7079>`_, Jason Dillaman)
* librbd: enable feature objectmap (`issue#13558 <http://tracker.ceph.com/issues/13558>`_, `pr#6477 <http://github.com/ceph/ceph/pull/6477>`_, xinxin shu)
* librbd: fix merge-diff for >2GB diff-files (`issue#14030 <http://tracker.ceph.com/issues/14030>`_, `pr#6981 <http://github.com/ceph/ceph/pull/6981>`_, Jason Dillaman)
* librbd: flattening an rbd image with active IO can lead to hang (`issue#14092 <http://tracker.ceph.com/issues/14092>`_, `issue#14483 <http://tracker.ceph.com/issues/14483>`_, `pr#7484 <http://github.com/ceph/ceph/pull/7484>`_, Jason Dillaman)
* mds: fix client capabilities during reconnect (client.XXXX isn't responding to mclientcaps warning) (`issue#11482 <http://tracker.ceph.com/issues/11482>`_, `pr#6752 <http://github.com/ceph/ceph/pull/6752>`_, Yan, Zheng)
* mon: Ceph Pools' MAX AVAIL is 0 if some OSDs' weight is 0 (`issue#13840 <http://tracker.ceph.com/issues/13840>`_, `pr#6907 <http://github.com/ceph/ceph/pull/6907>`_, Chengyuan Li)
* mon: should not set isvalid = true when cephx_verify_authorizer retur... (`issue#13525 <http://tracker.ceph.com/issues/13525>`_, `pr#6392 <http://github.com/ceph/ceph/pull/6392>`_, Ruifeng Yang)
* objecter: pool op callback may hang forever. (`issue#13642 <http://tracker.ceph.com/issues/13642>`_, `pr#6627 <http://github.com/ceph/ceph/pull/6627>`_, xie xingguo)
* objecter: potential null pointer access when do pool_snap_list. (`issue#13639 <http://tracker.ceph.com/issues/13639>`_, `pr#6840 <http://github.com/ceph/ceph/pull/6840>`_, xie xingguo)
* osd: FileStore: potential memory leak if getattrs fails. (`issue#13597 <http://tracker.ceph.com/issues/13597>`_, `pr#6846 <http://github.com/ceph/ceph/pull/6846>`_, xie xingguo)
* osd: OSD::build_past_intervals_parallel() shall reset primary and up_primary when begin a new past_interval. (`issue#13471 <http://tracker.ceph.com/issues/13471>`_, `pr#6397 <http://github.com/ceph/ceph/pull/6397>`_, xiexingguo)
* osd: call on_new_interval on newly split child PG (`issue#13962 <http://tracker.ceph.com/issues/13962>`_, `pr#6849 <http://github.com/ceph/ceph/pull/6849>`_, Sage Weil)
* osd: ceph-disk list fails on /dev/cciss!c0d0 (`issue#13970 <http://tracker.ceph.com/issues/13970>`_, `issue#14230 <http://tracker.ceph.com/issues/14230>`_, `pr#6880 <http://github.com/ceph/ceph/pull/6880>`_, Loic Dachary)
* osd: ceph-disk: use blkid instead of sgdisk -i (`issue#14080 <http://tracker.ceph.com/issues/14080>`_, `pr#7001 <http://github.com/ceph/ceph/pull/7001>`_, Loic Dachary, Ilya Dryomov)
* osd: fix race condition during send_failures (`issue#13821 <http://tracker.ceph.com/issues/13821>`_, `pr#6694 <http://github.com/ceph/ceph/pull/6694>`_, Sage Weil)
* osd: osd/PG.cc: 288: FAILED assert(info.last_epoch_started >= info.history.last_epoch_started) (`issue#14015 <http://tracker.ceph.com/issues/14015>`_, `pr#6851 <http://github.com/ceph/ceph/pull/6851>`_, David Zafman)
* osd: pgs stuck inconsistent after infernalis upgrade (`issue#13862 <http://tracker.ceph.com/issues/13862>`_, `pr#7421 <http://github.com/ceph/ceph/pull/7421>`_, David Zafman)
* rbd: TaskFinisher::cancel should remove event from SafeTimer (`issue#14476 <http://tracker.ceph.com/issues/14476>`_, `pr#7426 <http://github.com/ceph/ceph/pull/7426>`_, Douglas Fuller)
* rbd: cls_rbd: object_map_save should enable checksums (`issue#14280 <http://tracker.ceph.com/issues/14280>`_, `pr#7428 <http://github.com/ceph/ceph/pull/7428>`_, Douglas Fuller)
* rbd: misdirected op in rbd balance-reads test (`issue#13491 <http://tracker.ceph.com/issues/13491>`_, `pr#6629 <http://github.com/ceph/ceph/pull/6629>`_, Jason Dillaman)
* rbd: pure virtual method called (`issue#13636 <http://tracker.ceph.com/issues/13636>`_, `pr#6633 <http://github.com/ceph/ceph/pull/6633>`_, Jason Dillaman)
* rbd: rbd clone issue (`issue#13553 <http://tracker.ceph.com/issues/13553>`_, `pr#6474 <http://github.com/ceph/ceph/pull/6474>`_, xinxin shu)
* rbd: rbd-replay does not check for EOF and goes to endless loop (`issue#14452 <http://tracker.ceph.com/issues/14452>`_, `pr#7427 <http://github.com/ceph/ceph/pull/7427>`_, Mykola Golub)
* rbd: unknown argument --quiet in udevadm settle (`issue#13560 <http://tracker.ceph.com/issues/13560>`_, `pr#6634 <http://github.com/ceph/ceph/pull/6634>`_, Jason Dillaman)
* rgw: init script reload doesn't work on EL7 (`issue#13709 <http://tracker.ceph.com/issues/13709>`_, `pr#6650 <http://github.com/ceph/ceph/pull/6650>`_, Hervé Rousseau)
* rgw: radosgw-admin --help doesn't show the orphans find command (`issue#14516 <http://tracker.ceph.com/issues/14516>`_, `pr#7543 <http://github.com/ceph/ceph/pull/7543>`_, Yehuda Sadeh)
* tests: ceph-disk workunit uses configobj (`issue#14004 <http://tracker.ceph.com/issues/14004>`_, `pr#6828 <http://github.com/ceph/ceph/pull/6828>`_, Loic Dachary)
* tests: fsx failed to compile (`issue#14384 <http://tracker.ceph.com/issues/14384>`_, `pr#7429 <http://github.com/ceph/ceph/pull/7429>`_, Greg Farnum)
* tests: notification slave needs to wait for master (`issue#13810 <http://tracker.ceph.com/issues/13810>`_, `pr#7225 <http://github.com/ceph/ceph/pull/7225>`_, Jason Dillaman)
* tests: rebuild exclusive lock test should acquire exclusive lock (`issue#14121 <http://tracker.ceph.com/issues/14121>`_, `pr#7038 <http://github.com/ceph/ceph/pull/7038>`_, Jason Dillaman)
* tests: testprofile must be removed before it is re-created (`issue#13664 <http://tracker.ceph.com/issues/13664>`_, `pr#6449 <http://github.com/ceph/ceph/pull/6449>`_, Loic Dachary)
* tests: verify it is possible to reuse an OSD id (`issue#13988 <http://tracker.ceph.com/issues/13988>`_, `pr#6882 <http://github.com/ceph/ceph/pull/6882>`_, Loic Dachary)
v9.2.0 Infernalis
=================
This major release will be the foundation for the next stable series.
There have been some major changes since v0.94.x Hammer, and the
upgrade process is non-trivial. Please read these release notes carefully.
Major Changes from Hammer
-------------------------
- *General*:
* Ceph daemons are now managed via systemd (with the exception of
Ubuntu Trusty, which still uses upstart).
* Ceph daemons run as 'ceph' user instead root.
* On Red Hat distros, there is also an SELinux policy.
- *RADOS*:
* The RADOS cache tier can now proxy write operations to the base
tier, allowing writes to be handled without forcing migration of
an object into the cache.
* The SHEC erasure coding support is no longer flagged as
experimental. SHEC trades some additional storage space for faster
repair.
* There is now a unified queue (and thus prioritization) of client
IO, recovery, scrubbing, and snapshot trimming.
* There have been many improvements to low-level repair tooling
(ceph-objectstore-tool).
* The internal ObjectStore API has been significantly cleaned up in order
to facilitate new storage backends like NewStore.
- *RGW*:
* The Swift API now supports object expiration.
* There are many Swift API compatibility improvements.
- *RBD*:
* The ``rbd du`` command shows actual usage (quickly, when
object-map is enabled).
* The object-map feature has seen many stability improvements.
* Object-map and exclusive-lock features can be enabled or disabled
dynamically.
* You can now store user metadata and set persistent librbd options
associated with individual images.
* The new deep-flatten features allows flattening of a clone and all
of its snapshots. (Previously snapshots could not be flattened.)
* The export-diff command command is now faster (it uses aio). There is also
a new fast-diff feature.
* The --size argument can be specified with a suffix for units
(e.g., ``--size 64G``).
* There is a new ``rbd status`` command that, for now, shows who has
the image open/mapped.
- *CephFS*:
* You can now rename snapshots.
* There have been ongoing improvements around administration, diagnostics,
and the check and repair tools.
* The caching and revocation of client cache state due to unused
inodes has been dramatically improved.
* The ceph-fuse client behaves better on 32-bit hosts.
Distro compatibility
--------------------
We have decided to drop support for many older distributions so that we can
move to a newer compiler toolchain (e.g., C++11). Although it is still possible
to build Ceph on older distributions by installing backported development tools,
we are not building and publishing release packages for ceph.com.
We now build packages for:
* CentOS 7 or later. We have dropped support for CentOS 6 (and other
RHEL 6 derivatives, like Scientific Linux 6).
* Debian Jessie 8.x or later. Debian Wheezy 7.x's g++ has incomplete
support for C++11 (and no systemd).
* Ubuntu Trusty 14.04 or later. Ubuntu Precise 12.04 is no longer
supported.
* Fedora 22 or later.
Upgrading from Firefly
----------------------
Upgrading directly from Firefly v0.80.z is not recommended. It is
possible to do a direct upgrade, but not without downtime. We
recommend that clusters are first upgraded to Hammer v0.94.4 or a
later v0.94.z release; only then is it possible to upgrade to
Infernalis 9.2.z for an online upgrade (see below).
To do an offline upgrade directly from Firefly, all Firefly OSDs must
be stopped and marked down before any Infernalis OSDs will be allowed
to start up. This fencing is enforced by the Infernalis monitor, so
use an upgrade procedure like:
#. Upgrade Ceph on monitor hosts
#. Restart all ceph-mon daemons
#. Upgrade Ceph on all OSD hosts
#. Stop all ceph-osd daemons
#. Mark all OSDs down with something like::
ceph osd down `seq 0 1000`
#. Start all ceph-osd daemons
#. Upgrade and restart remaining daemons (ceph-mds, radosgw)
Upgrading from Hammer
---------------------
* All cluster nodes must first upgrade to Hammer v0.94.4 or a later v0.94.z release; only
then is it possible to upgrade to Infernalis 9.2.z.
* For all distributions that support systemd (CentOS 7, Fedora, Debian
Jessie 8.x, OpenSUSE), ceph daemons are now managed using native systemd
files instead of the legacy sysvinit scripts. For example::
systemctl start ceph.target # start all daemons
systemctl status ceph-osd@12 # check status of osd.12
The main notable distro that is *not* yet using systemd is Ubuntu trusty
14.04. (The next Ubuntu LTS, 16.04, will use systemd instead of upstart.)
* Ceph daemons now run as user and group ``ceph`` by default. The
ceph user has a static UID assigned by Fedora and Debian (also used
by derivative distributions like RHEL/CentOS and Ubuntu). On SUSE
the ceph user will currently get a dynamically assigned UID when the
user is created.
If your systems already have a ceph user, upgrading the package will cause
problems. We suggest you first remove or rename the existing 'ceph' user
and 'ceph' group before upgrading.
When upgrading, administrators have two options:
#. Add the following line to ``ceph.conf`` on all hosts::
setuser match path = /var/lib/ceph/$type/$cluster-$id
This will make the Ceph daemons run as root (i.e., not drop
privileges and switch to user ceph) if the daemon's data
directory is still owned by root. Newly deployed daemons will
be created with data owned by user ceph and will run with
reduced privileges, but upgraded daemons will continue to run as
root.
#. Fix the data ownership during the upgrade. This is the
preferred option, but it is more work and can be very time
consuming. The process for each host is to:
#. Upgrade the ceph package. This creates the ceph user and group. For
example::
ceph-deploy install --stable infernalis HOST
#. Stop the daemon(s)::
service ceph stop # fedora, centos, rhel, debian
stop ceph-all # ubuntu
#. Fix the ownership::
chown -R ceph:ceph /var/lib/ceph
chown -R ceph:ceph /var/log/ceph
#. Restart the daemon(s)::
start ceph-all # ubuntu
systemctl start ceph.target # debian, centos, fedora, rhel
Alternatively, the same process can be done with a single daemon
type, for example by stopping only monitors and chowning only
``/var/lib/ceph/mon``.
* The on-disk format for the experimental KeyValueStore OSD backend has
changed. You will need to remove any OSDs using that backend before you
upgrade any test clusters that use it.
* When a pool quota is reached, librados operations now block indefinitely,
the same way they do when the cluster fills up. (Previously they would return
-ENOSPC). By default, a full cluster or pool will now block. If your
librados application can handle ENOSPC or EDQUOT errors gracefully, you can
get error returns instead by using the new librados OPERATION_FULL_TRY flag.
* The return code for librbd's rbd_aio_read and Image::aio_read API methods no
longer returns the number of bytes read upon success. Instead, it returns 0
upon success and a negative value upon failure.
* 'ceph scrub', 'ceph compact' and 'ceph sync force are now DEPRECATED. Users
should instead use 'ceph mon scrub', 'ceph mon compact' and
'ceph mon sync force'.
* 'ceph mon_metadata' should now be used as 'ceph mon metadata'. There is no
need to deprecate this command (same major release since it was first
introduced).
* The `--dump-json` option of "osdmaptool" is replaced by `--dump json`.
* The commands of "pg ls-by-{pool,primary,osd}" and "pg ls" now take "recovering"
instead of "recovery", to include the recovering pgs in the listed pgs.
Notable Changes since Hammer
----------------------------
* aarch64: add optimized version of crc32c (Yazen Ghannam, Steve Capper)
* auth: cache/reuse crypto lib key objects, optimize msg signature check (Sage Weil)
* auth: reinit NSS after fork() (#11128 Yan, Zheng)
* autotools: fix out of tree build (Krxysztof Kosinski)
* autotools: improve make check output (Loic Dachary)
* buffer: add invalidate_crc() (Piotr Dalek)
* buffer: fix zero bug (#12252 Haomai Wang)
* buffer: some cleanup (Michal Jarzabek)
* build: allow tcmalloc-minimal (Thorsten Behrens)
* build: C++11 now supported
* build: cmake: fix nss linking (Danny Al-Gaaf)
* build: cmake: misc fixes (Orit Wasserman, Casey Bodley)
* build: disable LTTNG by default (#11333 Josh Durgin)
* build: do not build ceph-dencoder with tcmalloc (#10691 Boris Ranto)
* build: fix junit detection on Fedora 22 (Ira Cooper)
* build: fix pg ref disabling (William A. Kennington III)
* build: fix ppc build (James Page)
* build: install-deps: misc fixes (Loic Dachary)
* build: install-deps.sh improvements (Loic Dachary)
* build: install-deps: support OpenSUSE (Loic Dachary)
* build: make_dist_tarball.sh (Sage Weil)
* build: many cmake improvements
* build: misc cmake fixes (Matt Benjamin)
* build: misc fixes (Boris Ranto, Ken Dreyer, Owen Synge)
* build: OSX build fixes (Yan, Zheng)
* build: remove rest-bench
* ceph-authtool: fix return code on error (Gerhard Muntingh)
* ceph-detect-init: added Linux Mint (Michal Jarzabek)
* ceph-detect-init: robust init system detection (Owen Synge)
* ceph-disk: ensure 'zap' only operates on a full disk (#11272 Loic Dachary)
* ceph-disk: fix zap sgdisk invocation (Owen Synge, Thorsten Behrens)
* ceph-disk: follow ceph-osd hints when creating journal (#9580 Sage Weil)
* ceph-disk: handle re-using existing partition (#10987 Loic Dachary)
* ceph-disk: improve parted output parsing (#10983 Loic Dachary)
* ceph-disk: install pip > 6.1 (#11952 Loic Dachary)
* ceph-disk: make suppression work for activate-all and activate-journal (Dan van der Ster)
* ceph-disk: many fixes (Loic Dachary, Alfredo Deza)
* ceph-disk: fixes to respect init system (Loic Dachary, Owen Synge)
* ceph-disk: pass --cluster arg on prepare subcommand (Kefu Chai)
* ceph-disk: support for multipath devices (Loic Dachary)
* ceph-disk: support NVMe device partitions (#11612 Ilja Slepnev)
* ceph: fix 'df' units (Zhe Zhang)
* ceph: fix parsing in interactive cli mode (#11279 Kefu Chai)
* cephfs-data-scan: many additions, improvements (John Spray)
* ceph-fuse: do not require successful remount when unmounting (#10982 Greg Farnum)
* ceph-fuse, libcephfs: don't clear COMPLETE when trimming null (Yan, Zheng)
* ceph-fuse, libcephfs: drop inode when rmdir finishes (#11339 Yan, Zheng)
* ceph-fuse,libcephfs: fix uninline (#11356 Yan, Zheng)
* ceph-fuse, libcephfs: hold exclusive caps on dirs we "own" (#11226 Greg Farnum)
* ceph-fuse: mostly behave on 32-bit hosts (Yan, Zheng)
* ceph: improve error output for 'tell' (#11101 Kefu Chai)
* ceph-monstore-tool: fix store-copy (Huangjun)
* ceph: new 'ceph daemonperf' command (John Spray, Mykola Golub)
* ceph-objectstore-tool: many many improvements (David Zafman)
* ceph-objectstore-tool: refactoring and cleanup (John Spray)
* ceph-post-file: misc fixes (Joey McDonald, Sage Weil)
* ceph_test_rados: test pipelined reads (Zhiqiang Wang)
* client: avoid sending unnecessary FLUSHSNAP messages (Yan, Zheng)
* client: exclude setfilelock when calculating oldest tid (Yan, Zheng)
* client: fix error handling in check_pool_perm (John Spray)
* client: fsync waits only for inode's caps to flush (Yan, Zheng)
* client: invalidate kernel dcache when cache size exceeds limits (Yan, Zheng)
* client: make fsync wait for unsafe dir operations (Yan, Zheng)
* client: pin lookup dentry to avoid inode being freed (Yan, Zheng)
* common: add descriptions to perfcounters (Kiseleva Alyona)
* common: add perf counter descriptions (Alyona Kiseleva)
* common: bufferlist performance tuning (Piotr Dalek, Sage Weil)
* common: detect overflow of int config values (#11484 Kefu Chai)
* common: fix bit_vector extent calc (#12611 Jason Dillaman)
* common: fix json parsing of utf8 (#7387 Tim Serong)
* common: fix leak of pthread_mutexattr (#11762 Ketor Meng)
* common: fix LTTNG vs fork issue (Josh Durgin)
* common: fix throttle max change (Henry Chang)
* common: make mutex more efficient
* common: make work queue addition/removal thread safe (#12662 Jason Dillaman)
* common: optracker improvements (Zhiqiang Wang, Jianpeng Ma)
* common: PriorityQueue tests (Kefu Chai)
* common: some async compression infrastructure (Haomai Wang)
* crush: add --check to validate dangling names, max osd id (Kefu Chai)
* crush: cleanup, sync with kernel (Ilya Dryomov)
* crush: fix crash from invalid 'take' argument (#11602 Shiva Rkreddy, Sage Weil)
* crush: fix divide-by-2 in straw2 (#11357 Yann Dupont, Sage Weil)
* crush: fix has_v4_buckets (#11364 Sage Weil)
* crush: fix subtree base weight on adjust_subtree_weight (#11855 Sage Weil)
* crush: respect default replicated ruleset config on map creation (Ilya Dryomov)
* crushtool: fix order of operations, usage (Sage Weil)
* crypto: fix NSS leak (Jason Dillaman)
* crypto: fix unbalanced init/shutdown (#12598 Zheng Yan)
* deb: fix rest-bench-dbg and ceph-test-dbg dependendies (Ken Dreyer)
* debian: minor package reorg (Ken Dreyer)
* deb, rpm: move ceph-objectstore-tool to ceph (Ken Dreyer)
* doc: docuemnt object corpus generation (#11099 Alexis Normand)
* doc: document region hostnames (Robin H. Johnson)
* doc: fix gender neutrality (Alexandre Maragone)
* doc: fix install doc (#10957 Kefu Chai)
* doc: fix sphinx issues (Kefu Chai)
* doc: man page updates (Kefu Chai)
* doc: mds data structure docs (Yan, Zheng)
* doc: misc updates (Fracois Lafont, Ken Dreyer, Kefu Chai, Owen Synge, Gael Fenet-Garde, Loic Dachary, Yannick Atchy-Dalama, Jiaying Ren, Kevin Caradant, Robert Maxime, Nicolas Yong, Germain Chipaux, Arthur Gorjux, Gabriel Sentucq, Clement Lebrun, Jean-Remi Deveaux, Clair Massot, Robin Tang, Thomas Laumondais, Jordan Dorne, Yuan Zhou, Valentin Thomas, Pierre Chaumont, Benjamin Troquereau, Benjamin Sesia, Vikhyat Umrao, Nilamdyuti Goswami, Vartika Rai, Florian Haas, Loic Dachary, Simon Guinot, Andy Allan, Alistair Israel, Ken Dreyer, Robin Rehu, Lee Revell, Florian Marsylle, Thomas Johnson, Bosse Klykken, Travis Rhoden, Ian Kelling)
* doc: swift tempurls (#10184 Abhishek Lekshmanan)
* doc: switch doxygen integration back to breathe (#6115 Kefu Chai)
* doc: update release schedule docs (Loic Dachary)
* erasure-code: cleanup (Kefu Chai)
* erasure-code: improve tests (Loic Dachary)
* erasure-code: shec: fix recovery bugs (Takanori Nakao, Shotaro Kawaguchi)
* erasure-code: update ISA-L to 2.13 (Yuan Zhou)
* gmock: switch to submodule (Danny Al-Gaaf, Loic Dachary)
* hadoop: add terasort test (Noah Watkins)
* init-radosgw: merge with sysv version; fix enumeration (Sage Weil)
* java: fix libcephfs bindings (Noah Watkins)
* libcephfs: add pread, pwrite (Jevon Qiao)
* libcephfs,ceph-fuse: cache cleanup (Zheng Yan)
* libcephfs,ceph-fuse: fix request resend on cap reconnect (#10912 Yan, Zheng)
* librados: add config observer (Alistair Strachan)
* librados: add FULL_TRY and FULL_FORCE flags for dealing with full clusters or pools (Sage Weil)
* librados: add src_fadvise_flags for copy-from (Jianpeng Ma)
* librados: define C++ flags from C constants (Josh Durgin)
* librados: fadvise flags per op (Jianpeng Ma)
* librados: fix last_force_resent handling (#11026 Jianpeng Ma)
* librados: fix memory leak from C_TwoContexts (Xiong Yiliang)
* librados: fix notify completion race (#13114 Sage Weil)
* librados: fix striper when stripe_count = 1 and stripe_unit != object_size (#11120 Yan, Zheng)
* librados, libcephfs: randomize client nonces (Josh Durgin)
* librados: op perf counters (John Spray)
* librados: pybind: fix binary omap values (Robin H. Johnson)
* librados: pybind: fix write() method return code (Javier Guerra)
* librados: respect default_crush_ruleset on pool_create (#11640 Yuan Zhou)
* libradosstriper: fix leak (Danny Al-Gaaf)
* librbd: add const for single-client-only features (Josh Durgin)
* librbd: add deep-flatten operation (Jason Dillaman)
* librbd: add purge_on_error cache behavior (Jianpeng Ma)
* librbd: allow additional metadata to be stored with the image (Haomai Wang)
* librbd: avoid blocking aio API methods (#11056 Jason Dillaman)
* librbd: better handling for dup flatten requests (#11370 Jason Dillaman)
* librbd: cancel in-flight ops on watch error (#11363 Jason Dillaman)
* librbd: default new images to format 2 (#11348 Jason Dillaman)
* librbd: fadvise for copy, export, import (Jianpeng Ma)
* librbd: fast diff implementation that leverages object map (Jason Dillaman)
* librbd: fix fast diff bugs (#11553 Jason Dillaman)
* librbd: fix image format detection (Zhiqiang Wang)
* librbd: fix lock ordering issue (#11577 Jason Dillaman)
* librbd: fix reads larger than the cache size (Lu Shi)
* librbd: fix snapshot creation when other snap is active (#11475 Jason Dillaman)
* librbd: flatten/copyup fixes (Jason Dillaman)
* librbd: handle NOCACHE fadvise flag (Jinapeng Ma)
* librbd: lockdep, helgrind validation (Jason Dillaman, Josh Durgin)
* librbd: metadata filter fixes (Haomai Wang)
* librbd: misc aio fixes (#5488 Jason Dillaman)
* librbd: misc rbd fixes (#11478 #11113 #11342 #11380 Jason Dillaman, Zhiqiang Wang)
* librbd: new diff_iterate2 API (Jason Dillaman)
* librbd: object map rebuild support (Jason Dillaman)
* librbd: only update image flags while hold exclusive lock (#11791 Jason Dillaman)
* librbd: optionally disable allocation hint (Haomai Wang)
* librbd: prevent race between resize requests (#12664 Jason Dillaman)
* librbd: readahead fixes (Zhiqiang Wang)
* librbd: return result code from close (#12069 Jason Dillaman)
* librbd: store metadata, including config options, in image (Haomai Wang)
* librbd: tolerate old osds when getting image metadata (#11549 Jason Dillaman)
* librbd: use write_full when possible (Zhiqiang Wang)
* log: fix data corruption race resulting from log rotation (#12465 Samuel Just)
* logrotate.d: prefer service over invoke-rc.d (#11330 Win Hierman, Sage Weil)
* mds: add 'damaged' state to MDSMap (John Spray)
* mds: add nicknames for perfcounters (John Spray)
* mds: avoid emitting cap warnigns before evicting session (John Spray)
* mds: avoid getting stuck in XLOCKDONE (#11254 Yan, Zheng)
* mds: disable problematic rstat propagation into snap parents (Yan, Zheng)
* mds: do not add snapped items to bloom filter (Yan, Zheng)
* mds: expose frags via asok (John Spray)
* mds: fix expected holes in journal objects (#13167 Yan, Zheng)
* mds: fix handling for missing mydir dirfrag (#11641 John Spray)
* mds: fix integer truncateion on large client ids (Henry Chang)
* mds: fix mydir replica issue with shutdown (#10743 John Spray)
* mds: fix out-of-order messages (#11258 Yan, Zheng)
* mds: fix rejoin (Yan, Zheng)
* mds: fix setting entire file layout in one setxattr (John Spray)
* mds: fix shutdown (John Spray)
* mds: fix shutdown with strays (#10744 John Spray)
* mds: fix SnapServer crash on deleted pool (John Spray)
* mds: fix snapshot bugs (Yan, Zheng)
* mds: fix stray reintegration (Yan, Zheng)
* mds: fix stray handling (John Spray)
* mds: fix suicide beacon (John Spray)
* mds: flush immediately in do_open_truncate (#11011 John Spray)
* mds: handle misc corruption issues (John Spray)
* mds: improve dump methods (John Spray)
* mds: many fixes (Yan, Zheng, John Spray, Greg Farnum)
* mds: many snapshot and stray fixes (Yan, Zheng)
* mds: misc fixes (Jianpeng Ma, Dan van der Ster, Zhang Zhi)
* mds: misc journal cleanups and fixes (#10368 John Spray)
* mds: misc repair improvements (John Spray)
* mds: misc snap fixes (Zheng Yan)
* mds: misc snapshot fixes (Yan, Zheng)
* mds: new SessionMap storage using omap (#10649 John Spray)
* mds: persist completed_requests reliably (#11048 John Spray)
* mds: reduce memory consumption (Yan, Zheng)
* mds: respawn instead of suicide on blacklist (John Spray)
* mds: separate safe_pos in Journaler (#10368 John Spray)
* mds: snapshot rename support (#3645 Yan, Zheng)
* mds: store layout on header object (#4161 John Spray)
* mds: throttle purge stray operations (#10390 John Spray)
* mds: tolerate clock jumping backwards (#11053 Yan, Zheng)
* mds: warn when clients fail to advance oldest_client_tid (#10657 Yan, Zheng)
* misc cleanups and fixes (Danny Al-Gaaf)
* misc coverity fixes (Danny Al-Gaaf)
* misc performance and cleanup (Nathan Cutler, Xinxin Shu)
* mon: add cache over MonitorDBStore (Kefu Chai)
* mon: add 'mon_metadata <id>' command (Kefu Chai)
* mon: add 'node ls ...' command (Kefu Chai)
* mon: add NOFORWARD, OBSOLETE, DEPRECATE flags for mon commands (Joao Eduardo Luis)
* mon: add PG count to 'ceph osd df' output (Michal Jarzabek)
* mon: 'ceph osd metadata' can dump all osds (Haomai Wang)
* mon: clean up, reorg some mon commands (Joao Eduardo Luis)
* monclient: flush_log (John Spray)
* mon: detect kv backend failures (Sage Weil)
* mon: disallow >2 tiers (#11840 Kefu Chai)
* mon: disallow ec pools as tiers (#11650 Samuel Just)
* mon: do not deactivate last mds (#10862 John Spray)
* mon: fix average utilization calc for 'osd df' (Mykola Golub)
* mon: fix CRUSH map test for new pools (Sage Weil)
* mon: fix log dump crash when debugging (Mykola Golub)
* mon: fix mds beacon replies (#11590 Kefu Chai)
* mon: fix metadata update race (Mykola Golub)
* mon: fix min_last_epoch_clean tracking (Kefu Chai)
* mon: fix 'pg ls' sort order, state names (#11569 Kefu Chai)
* mon: fix refresh (#11470 Joao Eduardo Luis)
* mon: fix variance calc in 'osd df' (Sage Weil)
* mon: improve callout to crushtool (Mykola Golub)
* mon: make blocked op messages more readable (Jianpeng Ma)
* mon: make osd get pool 'all' only return applicable fields (#10891 Michal Jarzabek)
* mon: misc scaling fixes (Sage Weil)
* mon: normalize erasure-code profile for storage and comparison (Loic Dachary)
* mon: only send mon metadata to supporting peers (Sage Weil)
* mon: optionally specify osd id on 'osd create' (Mykola Golub)
* mon: 'osd tree' fixes (Kefu Chai)
* mon: periodic background scrub (Joao Eduardo Luis)
* mon: prevent bucket deletion when referenced by a crush rule (#11602 Sage Weil)
* mon: prevent pgp_num > pg_num (#12025 Xinxin Shu)
* mon: prevent pool with snapshot state from being used as a tier (#11493 Sage Weil)
* mon: prime pg_temp when CRUSH map changes (Sage Weil)
* mon: refine check_remove_tier checks (#11504 John Spray)
* mon: reject large max_mds values (#12222 John Spray)
* mon: remove spurious who arg from 'mds rm ...' (John Spray)
* mon: streamline session handling, fix memory leaks (Sage Weil)
* mon: upgrades must pass through hammer (Sage Weil)
* mon: warn on bogus cache tier config (Jianpeng Ma)
* msgr: add ceph_perf_msgr tool (Hoamai Wang)
* msgr: async: fix seq handling (Haomai Wang)
* msgr: async: many many fixes (Haomai Wang)
* msgr: simple: fix clear_pipe (#11381 Haomai Wang)
* msgr: simple: fix connect_seq assert (Haomai Wang)
* msgr: xio: fastpath improvements (Raju Kurunkad)
* msgr: xio: fix ip and nonce (Raju Kurunkad)
* msgr: xio: improve lane assignment (Vu Pham)
* msgr: xio: sync with accellio v1.4 (Vu Pham)
* msgr: xio: misc fixes (#10735 Matt Benjamin, Kefu Chai, Danny Al-Gaaf, Raju Kurunkad, Vu Pham, Casey Bodley)
* msg: unit tests (Haomai Wang)
* objectcacher: misc bug fixes (Jianpeng Ma)
* osd: add latency perf counters for tier operations (Xinze Chi)
* osd: add misc perfcounters (Xinze Chi)
* osd: add simple sleep injection in recovery (Sage Weil)
* osd: allow SEEK_HOLE/SEEK_DATA for sparse read (Zhiqiang Wang)
* osd: avoid dup omap sets for in pg metadata (Sage Weil)
* osd: avoid multiple hit set insertions (Zhiqiang Wang)
* osd: avoid transaction append in some cases (Sage Weil)
* osd: break PG removal into multiple iterations (#10198 Guang Yang)
* osd: cache proxy-write support (Zhiqiang Wang, Samuel Just)
* osd: check scrub state when handling map (Jianpeng Ma)
* osd: clean up some constness, privateness (Kefu Chai)
* osd: clean up temp object if promotion fails (Jianpeng Ma)
* osd: configure promotion based on write recency (Zhiqiang Wang)
* osd: constrain collections to meta and PGs (normal and temp) (Sage Weil)
* osd: don't send dup MMonGetOSDMap requests (Sage Weil, Kefu Chai)
* osd: EIO injection (David Zhang)
* osd: elminiate txn apend, ECSubWrite copy (Samuel Just)
* osd: erasure-code: drop entries according to LRU (Andreas-Joachim Peters)
* osd: erasure-code: fix SHEC floating point bug (#12936 Loic Dachary)
* osd: erasure-code: update to ISA-L 2.14 (Yuan Zhou)
* osd: filejournal: cleanup (David Zafman)
* osd: filestore: clone using splice (Jianpeng Ma)
* osd: filestore: fix recursive lock (Xinxin Shu)
* osd: fix check_for_full (Henry Chang)
* osd: fix dirty accounting in make_writeable (Zhiqiang Wang)
* osd: fix dup promotion lost op bug (Zhiqiang Wang)
* osd: fix endless repair when object is unrecoverable (Jianpeng Ma, Kefu Chai)
* osd: fix hitset object naming to use GMT (Kefu Chai)
* osd: fix misc memory leaks (Sage Weil)
* osd: fix negative degraded stats during backfill (Guang Yang)
* osd: fix osdmap dump of blacklist items (John Spray)
* osd: fix peek_queue locking in FileStore (Xinze Chi)
* osd: fix pg resurrection (#11429 Samuel Just)
* osd: fix promotion vs full cache tier (Samuel Just)
* osd: fix replay requeue when pg is still activating (#13116 Samuel Just)
* osd: fix scrub stat bugs (Sage Weil, Samuel Just)
* osd: fix snap flushing from cache tier (again) (#11787 Samuel Just)
* osd: fix snap handling on promotion (#11296 Sam Just)
* osd: fix temp-clearing (David Zafman)
* osd: force promotion for ops EC can't handle (Zhiqiang Wang)
* osd: handle log split with overlapping entries (#11358 Samuel Just)
* osd: ignore non-existent osds in unfound calc (#10976 Mykola Golub)
* osd: improve behavior on machines with large memory pages (Steve Capper)
* osd: include a temp namespace within each collection/pgid (Sage Weil)
* osd: increase default max open files (Owen Synge)
* osd: keyvaluestore: misc fixes (Varada Kari)
* osd: low and high speed flush modes (Mingxin Liu)
* osd: make suicide timeouts individually configurable (Samuel Just)
* osd: merge multiple setattr calls into a setattrs call (Xinxin Shu)
* osd: misc fixes (Ning Yao, Kefu Chai, Xinze Chi, Zhiqiang Wang, Jianpeng Ma)
* osd: move scrub in OpWQ (Samuel Just)
* osd: newstore prototype (Sage Weil)
* osd: ObjectStore internal API refactor (Sage Weil)
* osd: peer_features includes self (David Zafman)
* osd: pool size change triggers new interval (#11771 Samuel Just)
* osd: prepopulate needs_recovery_map when only one peer has missing (#9558 Guang Yang)
* osd: randomize scrub times (#10973 Kefu Chai)
* osd: recovery, peering fixes (#11687 Samuel Just)
* osd: refactor scrub and digest recording (Sage Weil)
* osd: refuse first write to EC object at non-zero offset (Jianpeng Ma)
* osd: relax reply order on proxy read (#11211 Zhiqiang Wang)
* osd: require firefly features (David Zafman)
* osd: set initial crush weight with more precision (Sage Weil)
* osd: SHEC no longer experimental
* osd: skip promotion for flush/evict op (Zhiqiang Wang)
* osd: stripe over small xattrs to fit in XFS's 255 byte inline limit (Sage Weil, Ning Yao)
* osd: sync object_map on syncfs (Samuel Just)
* osd: take excl lock of op is rw (Samuel Just)
* osd: throttle evict ops (Yunchuan Wen)
* osd: upgrades must pass through hammer (Sage Weil)
* osd: use a temp object for recovery (Sage Weil)
* osd: use blkid to collection partition information (Joseph Handzik)
* osd: use SEEK_HOLE / SEEK_DATA for sparse copy (Xinxin Shu)
* osd: WBThrottle cleanups (Jianpeng Ma)
* osd: write journal header on clean shutdown (Xinze Chi)
* osdc/Objecter: allow per-pool calls to op_cancel_writes (John Spray)
* os/filestore: enlarge getxattr buffer size (Jianpeng Ma)
* pybind: pep8 cleanups (Danny Al-Gaaf)
* pycephfs: many fixes for bindings (Haomai Wang)
* qa: fix filelock_interrupt.py test (Yan, Zheng)
* qa: improve ceph-disk tests (Loic Dachary)
* qa: improve docker build layers (Loic Dachary)
* qa: run-make-check.sh script (Loic Dachary)
* rados: add --striper option to use libradosstriper (#10759 Sebastien Ponce)
* rados: bench: add --no-verify option to improve performance (Piotr Dalek)
* rados bench: misc fixes (Dmitry Yatsushkevich)
* rados: fix error message on failed pool removal (Wido den Hollander)
* radosgw-admin: add 'bucket check' function to repair bucket index (Yehuda Sadeh)
* radosgw-admin: fix subuser modify output (#12286 Guce)
* rados: handle --snapid arg properly (Abhishek Lekshmanan)
* rados: improve bench buffer handling, performance (Piotr Dalek)
* rados: misc bench fixes (Dmitry Yatsushkevich)
* rados: new pool import implementation (John Spray)
* rados: translate errno to string in CLI (#10877 Kefu Chai)
* rbd: accept map options config option (Ilya Dryomov)
* rbd: add disk usage tool (#7746 Jason Dillaman)
* rbd: allow unmapping by spec (Ilya Dryomov)
* rbd: cli: fix arg parsing with --io-pattern (Dmitry Yatsushkevich)
* rbd: deprecate --new-format option (Jason Dillman)
* rbd: fix error messages (#2862 Rajesh Nambiar)
* rbd: fix link issues (Jason Dillaman)
* rbd: improve CLI arg parsing, usage (Ilya Dryomov)
* rbd: rbd-replay-prep and rbd-replay improvements (Jason Dillaman)
* rbd: recognize queue_depth kernel option (Ilya Dryomov)
* rbd: support G and T units for CLI (Abhishek Lekshmanan)
* rbd: update rbd man page (Ilya Dryomov)
* rbd: update xfstests tests (Douglas Fuller)
* rbd: use image-spec and snap-spec in help (Vikhyat Umrao, Ilya Dryomov)
* rest-bench: misc fixes (Shawn Chen)
* rest-bench: support https (#3968 Yuan Zhou)
* rgw: add max multipart upload parts (#12146 Abshishek Dixit)
* rgw: add missing headers to Swift container details (#10666 Ahmad Faheem, Dmytro Iurchenko)
* rgw: add stats to headers for account GET (#10684 Yuan Zhou)
* rgw: add Trasnaction-Id to response (Abhishek Dixit)
* rgw: add X-Timestamp for Swift containers (#10938 Radoslaw Zarzynski)
* rgw: always check if token is expired (#11367 Anton Aksola, Riku Lehto)
* rgw: conversion tool to repair broken multipart objects (#12079 Yehuda Sadeh)
* rgw: document layout of pools and objects (Pete Zaitcev)
* rgw: do not enclose bucket header in quotes (#11860 Wido den Hollander)
* rgw: do not prefetch data for HEAD requests (Guang Yang)
* rgw: do not preserve ACLs when copying object (#12370 Yehuda Sadeh)
* rgw: do not set content-type if length is 0 (#11091 Orit Wasserman)
* rgw: don't clobber bucket/object owner when setting ACLs (#10978 Yehuda Sadeh)
* rgw: don't use end_marker for namespaced object listing (#11437 Yehuda Sadeh)
* rgw: don't use rgw_socket_path if frontend is configured (#11160 Yehuda Sadeh)
* rgw: enforce Content-Length for POST on Swift cont/obj (#10661 Radoslaw Zarzynski)
* rgw: error out if frontend did not send all data (#11851 Yehuda Sadeh)
* rgw: expose the number of unhealthy workers through admin socket (Guang Yang)
* rgw: fail if parts not specified on multipart upload (#11435 Yehuda Sadeh)
* rgw: fix assignment of copy obj attributes (#11563 Yehuda Sadeh)
* rgw: fix broken stats in container listing (#11285 Radoslaw Zarzynski)
* rgw: fix bug in domain/subdomain splitting (Robin H. Johnson)
* rgw: fix casing of Content-Type header (Robin H. Johnson)
* rgw: fix civetweb max threads (#10243 Yehuda Sadeh)
* rgw: fix Connection: header handling (#12298 Wido den Hollander)
* rgw: fix copy metadata, support X-Copied-From for swift (#10663 Radoslaw Zarzynski)
* rgw: fix data corruptions race condition (#11749 Wuxingyi)
* rgw: fix decoding of X-Object-Manifest from GET on Swift DLO (Radslow Rzarzynski)
* rgw: fix GET on swift account when limit == 0 (#10683 Radoslaw Zarzynski)
* rgw: fix handling empty metadata items on Swift container (#11088 Radoslaw Zarzynski)
* rgw: fix JSON response when getting user quota (#12117 Wuxingyi)
* rgw: fix locator for objects starting with _ (#11442 Yehuda Sadeh)
* rgw: fix log rotation (Wuxingyi)
* rgw: fix mulitipart upload in retry path (#11604 Yehuda Sadeh)
* rgw: fix quota enforcement on POST (#11323 Sergey Arkhipov)
* rgw: fix reset_loc (#11974 Yehuda Sadeh)
* rgw: fix return code on missing upload (#11436 Yehuda Sadeh)
* rgw: fix sysvinit script
* rgw: fix sysvinit script w/ multiple instances (Sage Weil, Pavan Rallabhandi)
* rgw: force content_type for swift bucket stats requests (#12095 Orit Wasserman)
* rgw: force content type header on responses with no body (#11438 Orit Wasserman)
* rgw: generate Date header for civetweb (#10873 Radoslaw Zarzynski)
* rgw: generate new object tag when setting attrs (#11256 Yehuda Sadeh)
* rgw: improve content-length env var handling (#11419 Robin H. Johnson)
* rgw: improved support for swift account metadata (Radoslaw Zarzynski)
* rgw: improve handling of already removed buckets in expirer (Radoslaw Rzarzynski)
* rgw: issue aio for first chunk before flush cached data (#11322 Guang Yang)
* rgw: log to /var/log/ceph instead of /var/log/radosgw
* rgw: make init script wait for radosgw to stop (#11140 Dmitry Yatsushkevich)
* rgw: make max put size configurable (#6999 Yuan Zhou)
* rgw: make quota/gc threads configurable (#11047 Guang Yang)
* rgw: make read user buckets backward compat (#10683 Radoslaw Zarzynski)
* rgw: merge manifests properly with prefix override (#11622 Yehuda Sadeh)
* rgw: only scan for objects not in a namespace (#11984 Yehuda Sadeh)
* rgw: orphan detection tool (Yehuda Sadeh)
* rgw: pass in civetweb configurables (#10907 Yehuda Sadeh)
* rgw: rectify 202 Accepted in PUT response (#11148 Radoslaw Zarzynski)
* rgw: remove meta file after deleting bucket (#11149 Orit Wasserman)
* rgw: remove trailing :port from HTTP_HOST header (Sage Weil)
* rgw: return 412 on bad limit when listing buckets (#11613 Yehuda Sadeh)
* rgw: rework X-Trans-Id header to conform with Swift API (Radoslaw Rzarzynski)
* rgw: s3 encoding-type for get bucket (Jeff Weber)
* rgw: send ETag, Last-Modified for swift (#11087 Radoslaw Zarzynski)
* rgw: set content length on container GET, PUT, DELETE, HEAD (#10971, #11036 Radoslaw Zarzynski)
* rgw: set max buckets per user in ceph.conf (Vikhyat Umrao)
* rgw: shard work over multiple librados instances (Pavan Rallabhandi)
* rgw: support end marker on swift container GET (#10682 Radoslaw Zarzynski)
* rgw: support for Swift expiration API (Radoslaw Rzarzynski, Yehuda Sadeh)
* rgw: swift: allow setting attributes with COPY (#10662 Ahmad Faheem, Dmytro Iurchenko)
* rgw: swift: do not override sent content type (#12363 Orit Wasserman)
* rgw: swift: enforce Content-Type in response (#12157 Radoslaw Zarzynski)
* rgw: swift: fix account listing (#11501 Radoslaw Zarzynski)
* rgw: swift: fix metadata handling on copy (#10645 Radoslaw Zarzynski)
* rgw: swift: send Last-Modified header (#10650 Radoslaw Zarzynski)
* rgw: swift: set Content-Length for account GET (#12158 Radoslav Zarzynski)
* rgw: swift: set content-length on keystone tokens (#11473 Herv Rousseau)
* rgw: update keystone cache with token info (#11125 Yehuda Sadeh)
* rgw: update to latest civetweb, enable config for IPv6 (#10965 Yehuda Sadeh)
* rgw: use attrs from source bucket on copy (#11639 Javier M. Mellid)
* rgw: use correct oid for gc chains (#11447 Yehuda Sadeh)
* rgw: user rm is idempotent (Orit Wasserman)
* rgw: use unique request id for civetweb (#10295 Orit Wasserman)
* rocksdb: add perf counters for get/put latency (Xinxin Shu)
* rocksdb, leveldb: fix compact_on_mount (Xiaoxi Chen)
* rocksdb: pass options as single string (Xiaoxi Chen)
* rocksdb: update to latest (Xiaoxi Chen)
* rpm: add suse firewall files (Tim Serong)
* rpm: always rebuild and install man pages for rpm (Owen Synge)
* rpm: loosen ceph-test dependencies (Ken Dreyer)
* rpm: many spec file fixes (Owen Synge, Ken Dreyer)
* rpm: misc fixes (Boris Ranto, Owen Synge, Ken Dreyer, Ira Cooper)
* rpm: misc systemd and SUSE fixes (Owen Synge, Nathan Cutler)
* selinux policy (Boris Ranto, Milan Broz)
* systemd: logrotate fixes (Tim Serong, Lars Marowsky-Bree, Nathan Cutler)
* systemd: many fixes (Sage Weil, Owen Synge, Boris Ranto, Dan van der Ster)
* systemd: run daemons as user ceph
* sysvinit compat: misc fixes (Owen Synge)
* test: misc fs test improvements (John Spray, Loic Dachary)
* test: python tests, linter cleanup (Alfredo Deza)
* tests: fixes for rbd xstests (Douglas Fuller)
* tests: fix tiering health checks (Loic Dachary)
* tests for low-level performance (Haomai Wang)
* tests: many ec non-regression improvements (Loic Dachary)
* tests: many many ec test improvements (Loic Dachary)
* upstart: throttle restarts (#11798 Sage Weil, Greg Farnum)
v9.1.0 Infernalis release candidate
===================================
This is the first Infernalis release candidate. There have been some
major changes since Hammer, and the upgrade process is non-trivial.
Please read carefully.
Getting the release candidate
-----------------------------
The v9.1.0 packages are pushed to the development release repositories::
http://download.ceph.com/rpm-testing
http://download.ceph.com/debian-testing
For for info, see::
http://docs.ceph.com/docs/master/install/get-packages/
Or install with ceph-deploy via::
ceph-deploy install --testing HOST
Known issues
------------
* librbd and librados ABI compatibility is broken. Be careful
installing this RC on client machines (e.g., those running qemu).
It will be fixed in the final v9.2.0 release.
Major Changes from Hammer
-------------------------
- *General*:
* Ceph daemons are now managed via systemd (with the exception of
Ubuntu Trusty, which still uses upstart).
* Ceph daemons run as 'ceph' user instead of root.
* On Red Hat distros, there is also an SELinux policy.
- *RADOS*:
* The RADOS cache tier can now proxy write operations to the base
tier, allowing writes to be handled without forcing migration of
an object into the cache.
* The SHEC erasure coding support is no longer flagged as
experimental. SHEC trades some additional storage space for faster
repair.
* There is now a unified queue (and thus prioritization) of client
IO, scrubbing, and snapshot trimming.
* There have been many improvements to low-level repair tooling
(ceph-objectstore-tool).
* The internal ObjectStore API has been significantly cleaned up in order
to facilitate new storage backends like NewStore.
- *RGW*:
* The Swift API now supports object expiration.
* There are many Swift API compatibility improvements.
- *RBD*:
* The ``rbd du`` command shows actual usage (quickly, when
object-map is enabled).
* The object-map feature has seen many stability improvements.
* Object-map and exclusive-lock features can be enabled or disabled
dynamically.
* You can now store user metadata and set persistent librbd options
associated with individual images.
* The new deep-flatten features allows flattening of a clone and all
of its snapshots. (Previously snapshots could not be flattened.)
* The export-diff command command is now faster (it uses aio). There is also
a new fast-diff feature.
* The --size argument can be specified with a suffix for units
(e.g., ``--size 64G``).
* There is a new ``rbd status`` command that, for now, shows who has
the image open/mapped.
- *CephFS*:
* You can now rename snapshots.
* There have been ongoing improvements around administration, diagnostics,
and the check and repair tools.
* The caching and revocation of client cache state due to unused
inodes has been dramatically improved.
* The ceph-fuse client behaves better on 32-bit hosts.
Distro compatibility
--------------------
We have decided to drop support for many older distributions so that we can
move to a newer compiler toolchain (e.g., C++11). Although it is still possible
to build Ceph on older distributions by installing backported development tools,
we are not building and publishing release packages for them on ceph.com.
In particular,
* CentOS 7 or later; we have dropped support for CentOS 6 (and other
RHEL 6 derivatives, like Scientific Linux 6).
* Debian Jessie 8.x or later; Debian Wheezy 7.x's g++ has incomplete
support for C++11 (and no systemd).
* Ubuntu Trusty 14.04 or later; Ubuntu Precise 12.04 is no longer
supported.
* Fedora 22 or later.
Upgrading from Firefly
----------------------
Upgrading directly from Firefly v0.80.z is not possible. All clusters
must first upgrade to Hammer v0.94.4 or a later v0.94.z release; only
then is it possible to do online upgrade to Infernalis 9.2.z.
User can upgrade to latest hammer v0.94.z
from gitbuilder with(also refer the hammer release notes for more details)::
ceph-deploy install --release hammer HOST
Upgrading from Hammer
---------------------
* All cluster nodes must first upgrade to Hammer v0.94.4 or a later v0.94.z release; only
then is it possible to do online upgrade to Infernalis 9.2.z.
* For all distributions that support systemd (CentOS 7, Fedora, Debian
Jessie 8.x, OpenSUSE), ceph daemons are now managed using native systemd
files instead of the legacy sysvinit scripts. For example::
systemctl start ceph.target # start all daemons
systemctl status ceph-osd@12 # check status of osd.12
The main notable distro that is *not* yet using systemd is Ubuntu trusty
14.04. (The next Ubuntu LTS, 16.04, will use systemd instead of upstart.)
* Ceph daemons now run as user and group ``ceph`` by default. The
ceph user has a static UID assigned by Fedora and Debian (also used
by derivative distributions like RHEL/CentOS and Ubuntu). On SUSE
the ceph user will currently get a dynamically assigned UID when the
user is created.
If your systems already have a ceph user, the package upgrade
process will usually fail with an error. We suggest you first
remove or rename the existing 'ceph' user and then upgrade.
When upgrading, administrators have two options:
#. Add the following line to ``ceph.conf`` on all hosts::
setuser match path = /var/lib/ceph/$type/$cluster-$id
This will make the Ceph daemons run as root (i.e., not drop
privileges and switch to user ceph) if the daemon's data
directory is still owned by root. Newly deployed daemons will
be created with data owned by user ceph and will run with
reduced privileges, but upgraded daemons will continue to run as
root.
#. Fix the data ownership during the upgrade. This is the preferred option,
but is more work. The process for each host would be to:
#. Upgrade the ceph package. This creates the ceph user and group. For
example::
ceph-deploy install --stable infernalis HOST
#. Stop the daemon(s)::
service ceph stop # fedora, centos, rhel, debian
stop ceph-all # ubuntu
#. Fix the ownership::
chown -R ceph:ceph /var/lib/ceph
chown -R ceph:ceph /var/log/ceph
#. Restart the daemon(s)::
start ceph-all # ubuntu
systemctl start ceph.target # debian, centos, fedora, rhel
* The on-disk format for the experimental KeyValueStore OSD backend has
changed. You will need to remove any OSDs using that backend before you
upgrade any test clusters that use it.
Upgrade notes
-------------
* When a pool quota is reached, librados operations now block indefinitely,
the same way they do when the cluster fills up. (Previously they would return
-ENOSPC). By default, a full cluster or pool will now block. If your
librados application can handle ENOSPC or EDQUOT errors gracefully, you can
get error returns instead by using the new librados OPERATION_FULL_TRY flag.
Notable changes
---------------
NOTE: These notes are somewhat abbreviated while we find a less
time-consuming process for generating them.
* build: C++11 now supported
* build: many cmake improvements
* build: OSX build fixes (Yan, Zheng)
* build: remove rest-bench
* ceph-disk: many fixes (Loic Dachary)
* ceph-disk: support for multipath devices (Loic Dachary)
* ceph-fuse: mostly behave on 32-bit hosts (Yan, Zheng)
* ceph-objectstore-tool: many improvements (David Zafman)
* common: bufferlist performance tuning (Piotr Dalek, Sage Weil)
* common: make mutex more efficient
* common: some async compression infrastructure (Haomai Wang)
* librados: add FULL_TRY and FULL_FORCE flags for dealing with full clusters or pools (Sage Weil)
* librados: fix notify completion race (#13114 Sage Weil)
* librados, libcephfs: randomize client nonces (Josh Durgin)
* librados: pybind: fix binary omap values (Robin H. Johnson)
* librbd: fix reads larger than the cache size (Lu Shi)
* librbd: metadata filter fixes (Haomai Wang)
* librbd: use write_full when possible (Zhiqiang Wang)
* mds: avoid emitting cap warnigns before evicting session (John Spray)
* mds: fix expected holes in journal objects (#13167 Yan, Zheng)
* mds: fix SnapServer crash on deleted pool (John Spray)
* mds: many fixes (Yan, Zheng, John Spray, Greg Farnum)
* mon: add cache over MonitorDBStore (Kefu Chai)
* mon: 'ceph osd metadata' can dump all osds (Haomai Wang)
* mon: detect kv backend failures (Sage Weil)
* mon: fix CRUSH map test for new pools (Sage Weil)
* mon: fix min_last_epoch_clean tracking (Kefu Chai)
* mon: misc scaling fixes (Sage Weil)
* mon: streamline session handling, fix memory leaks (Sage Weil)
* mon: upgrades must pass through hammer (Sage Weil)
* msg/async: many fixes (Haomai Wang)
* osd: cache proxy-write support (Zhiqiang Wang, Samuel Just)
* osd: configure promotion based on write recency (Zhiqiang Wang)
* osd: don't send dup MMonGetOSDMap requests (Sage Weil, Kefu Chai)
* osd: erasure-code: fix SHEC floating point bug (#12936 Loic Dachary)
* osd: erasure-code: update to ISA-L 2.14 (Yuan Zhou)
* osd: fix hitset object naming to use GMT (Kefu Chai)
* osd: fix misc memory leaks (Sage Weil)
* osd: fix peek_queue locking in FileStore (Xinze Chi)
* osd: fix promotion vs full cache tier (Samuel Just)
* osd: fix replay requeue when pg is still activating (#13116 Samuel Just)
* osd: fix scrub stat bugs (Sage Weil, Samuel Just)
* osd: force promotion for ops EC can't handle (Zhiqiang Wang)
* osd: improve behavior on machines with large memory pages (Steve Capper)
* osd: merge multiple setattr calls into a setattrs call (Xinxin Shu)
* osd: newstore prototype (Sage Weil)
* osd: ObjectStore internal API refactor (Sage Weil)
* osd: SHEC no longer experimental
* osd: throttle evict ops (Yunchuan Wen)
* osd: upgrades must pass through hammer (Sage Weil)
* osd: use SEEK_HOLE / SEEK_DATA for sparse copy (Xinxin Shu)
* rbd: rbd-replay-prep and rbd-replay improvements (Jason Dillaman)
* rgw: expose the number of unhealthy workers through admin socket (Guang Yang)
* rgw: fix casing of Content-Type header (Robin H. Johnson)
* rgw: fix decoding of X-Object-Manifest from GET on Swift DLO (Radslow Rzarzynski)
* rgw: fix sysvinit script
* rgw: fix sysvinit script w/ multiple instances (Sage Weil, Pavan Rallabhandi)
* rgw: improve handling of already removed buckets in expirer (Radoslaw Rzarzynski)
* rgw: log to /var/log/ceph instead of /var/log/radosgw
* rgw: rework X-Trans-Id header to be conform with Swift API (Radoslaw Rzarzynski)
* rgw: s3 encoding-type for get bucket (Jeff Weber)
* rgw: set max buckets per user in ceph.conf (Vikhyat Umrao)
* rgw: support for Swift expiration API (Radoslaw Rzarzynski, Yehuda Sadeh)
* rgw: user rm is idempotent (Orit Wasserman)
* selinux policy (Boris Ranto, Milan Broz)
* systemd: many fixes (Sage Weil, Owen Synge, Boris Ranto, Dan van der Ster)
* systemd: run daemons as user ceph
v9.0.3
======
This is the second to last batch of development work for the
Infernalis cycle. The most intrusive change is an internal (non
user-visible) change to the OSD's ObjectStore interface. Many fixes and
improvements elsewhere across RGW, RBD, and another big pile of CephFS
scrub/repair improvements.
Upgrading
---------
* The return code for librbd's rbd_aio_read and Image::aio_read API methods no
longer returns the number of bytes read upon success. Instead, it returns 0
upon success and a negative value upon failure.
* 'ceph scrub', 'ceph compact' and 'ceph sync force' are now deprecated. Users
should instead use 'ceph mon scrub', 'ceph mon compact' and
'ceph mon sync force'.
* 'ceph mon_metadata' should now be used as 'ceph mon metadata'.
* The `--dump-json` option of "osdmaptool" is replaced by `--dump json`.
* The commands of 'pg ls-by-{pool,primary,osd}' and 'pg ls' now take 'recovering'
instead of 'recovery' to include the recovering pgs in the listed pgs.
Notable Changes
---------------
* autotools: fix out of tree build (Krxysztof Kosinski)
* autotools: improve make check output (Loic Dachary)
* buffer: add invalidate_crc() (Piotr Dalek)
* buffer: fix zero bug (#12252 Haomai Wang)
* build: fix junit detection on Fedora 22 (Ira Cooper)
* ceph-disk: install pip > 6.1 (#11952 Loic Dachary)
* cephfs-data-scan: many additions, improvements (John Spray)
* ceph: improve error output for 'tell' (#11101 Kefu Chai)
* ceph-objectstore-tool: misc improvements (David Zafman)
* ceph-objectstore-tool: refactoring and cleanup (John Spray)
* ceph_test_rados: test pipelined reads (Zhiqiang Wang)
* common: fix bit_vector extent calc (#12611 Jason Dillaman)
* common: make work queue addition/removal thread safe (#12662 Jason Dillaman)
* common: optracker improvements (Zhiqiang Wang, Jianpeng Ma)
* crush: add --check to validate dangling names, max osd id (Kefu Chai)
* crush: cleanup, sync with kernel (Ilya Dryomov)
* crush: fix subtree base weight on adjust_subtree_weight (#11855 Sage Weil)
* crypo: fix NSS leak (Jason Dillaman)
* crypto: fix unbalanced init/shutdown (#12598 Zheng Yan)
* doc: misc updates (Kefu Chai, Owen Synge, Gael Fenet-Garde, Loic Dachary, Yannick Atchy-Dalama, Jiaying Ren, Kevin Caradant, Robert Maxime, Nicolas Yong, Germain Chipaux, Arthur Gorjux, Gabriel Sentucq, Clement Lebrun, Jean-Remi Deveaux, Clair Massot, Robin Tang, Thomas Laumondais, Jordan Dorne, Yuan Zhou, Valentin Thomas, Pierre Chaumont, Benjamin Troquereau, Benjamin Sesia, Vikhyat Umrao)
* erasure-code: cleanup (Kefu Chai)
* erasure-code: improve tests (Loic Dachary)
* erasure-code: shec: fix recovery bugs (Takanori Nakao, Shotaro Kawaguchi)
* libcephfs: add pread, pwrite (Jevon Qiao)
* libcephfs,ceph-fuse: cache cleanup (Zheng Yan)
* librados: add src_fadvise_flags for copy-from (Jianpeng Ma)
* librados: respect default_crush_ruleset on pool_create (#11640 Yuan Zhou)
* librbd: fadvise for copy, export, import (Jianpeng Ma)
* librbd: handle NOCACHE fadvise flag (Jinapeng Ma)
* librbd: optionally disable allocation hint (Haomai Wang)
* librbd: prevent race between resize requests (#12664 Jason Dillaman)
* log: fix data corruption race resulting from log rotation (#12465 Samuel Just)
* mds: expose frags via asok (John Spray)
* mds: fix setting entire file layout in one setxattr (John Spray)
* mds: fix shutdown (John Spray)
* mds: handle misc corruption issues (John Spray)
* mds: misc fixes (Jianpeng Ma, Dan van der Ster, Zhang Zhi)
* mds: misc snap fixes (Zheng Yan)
* mds: store layout on header object (#4161 John Spray)
* misc performance and cleanup (Nathan Cutler, Xinxin Shu)
* mon: add NOFORWARD, OBSOLETE, DEPRECATE flags for mon commands (Joao Eduardo Luis)
* mon: add PG count to 'ceph osd df' output (Michal Jarzabek)
* mon: clean up, reorg some mon commands (Joao Eduardo Luis)
* mon: disallow >2 tiers (#11840 Kefu Chai)
* mon: fix log dump crash when debugging (Mykola Golub)
* mon: fix metadata update race (Mykola Golub)
* mon: fix refresh (#11470 Joao Eduardo Luis)
* mon: make blocked op messages more readable (Jianpeng Ma)
* mon: only send mon metadata to supporting peers (Sage Weil)
* mon: periodic background scrub (Joao Eduardo Luis)
* mon: prevent pgp_num > pg_num (#12025 Xinxin Shu)
* mon: reject large max_mds values (#12222 John Spray)
* msgr: add ceph_perf_msgr tool (Hoamai Wang)
* msgr: async: fix seq handling (Haomai Wang)
* msgr: xio: fastpath improvements (Raju Kurunkad)
* msgr: xio: sync with accellio v1.4 (Vu Pham)
* osd: clean up temp object if promotion fails (Jianpeng Ma)
* osd: constrain collections to meta and PGs (normal and temp) (Sage Weil)
* osd: filestore: clone using splice (Jianpeng Ma)
* osd: filestore: fix recursive lock (Xinxin Shu)
* osd: fix dup promotion lost op bug (Zhiqiang Wang)
* osd: fix temp-clearing (David Zafman)
* osd: include a temp namespace within each collection/pgid (Sage Weil)
* osd: low and high speed flush modes (Mingxin Liu)
* osd: peer_features includes self (David Zafman)
* osd: recovery, peering fixes (#11687 Samuel Just)
* osd: require firefly features (David Zafman)
* osd: set initial crush weight with more precision (Sage Weil)
* osd: use a temp object for recovery (Sage Weil)
* osd: use blkid to collection partition information (Joseph Handzik)
* rados: add --striper option to use libradosstriper (#10759 Sebastien Ponce)
* radosgw-admin: fix subuser modify output (#12286 Guce)
* rados: handle --snapid arg properly (Abhishek Lekshmanan)
* rados: improve bench buffer handling, performance (Piotr Dalek)
* rados: new pool import implementation (John Spray)
* rbd: fix link issues (Jason Dillaman)
* rbd: improve CLI arg parsing, usage (Ilya Dryomov)
* rbd: recognize queue_depth kernel option (Ilya Dryomov)
* rbd: support G and T units for CLI (Abhishek Lekshmanan)
* rbd: use image-spec and snap-spec in help (Vikhyat Umrao, Ilya Dryomov)
* rest-bench: misc fixes (Shawn Chen)
* rest-bench: support https (#3968 Yuan Zhou)
* rgw: add max multipart upload parts (#12146 Abshishek Dixit)
* rgw: add Trasnaction-Id to response (Abhishek Dixit)
* rgw: document layout of pools and objects (Pete Zaitcev)
* rgw: do not preserve ACLs when copying object (#12370 Yehuda Sadeh)
* rgw: fix Connection: header handling (#12298 Wido den Hollander)
* rgw: fix data corruptions race condition (#11749 Wuxingyi)
* rgw: fix JSON response when getting user quota (#12117 Wuxingyi)
* rgw: force content_type for swift bucket stats requests (#12095 Orit Wasserman)
* rgw: improved support for swift account metadata (Radoslaw Zarzynski)
* rgw: make max put size configurable (#6999 Yuan Zhou)
* rgw: orphan detection tool (Yehuda Sadeh)
* rgw: swift: do not override sent content type (#12363 Orit Wasserman)
* rgw: swift: set Content-Length for account GET (#12158 Radoslav Zarzynski)
* rpm: always rebuild and install man pages for rpm (Owen Synge)
* rpm: misc fixes (Boris Ranto, Owen Synge, Ken Dreyer, Ira Cooper)
* systemd: logrotate fixes (Tim Seron, Lars Marowsky-Bree, Nathan Cutler)
* sysvinit compat: misc fixes (Owen Synge)
* test: misc fs test improvements (John Spray, Loic Dachary)
* test: python tests, linter cleanup (Alfredo Deza)
v9.0.2
======
This development release features more of the OSD work queue
unification, randomized osd scrub times, a huge pile of librbd fixes,
more MDS repair and snapshot fixes, and a significant amount of work
on the tests and build infrastructure.
Notable Changes
---------------
* buffer: some cleanup (Michal Jarzabek)
* build: cmake: fix nss linking (Danny Al-Gaaf)
* build: cmake: misc fixes (Orit Wasserman, Casey Bodley)
* build: install-deps: misc fixes (Loic Dachary)
* build: make_dist_tarball.sh (Sage Weil)
* ceph-detect-init: added Linux Mint (Michal Jarzabek)
* ceph-detect-init: robust init system detection (Owen Synge, Loic Dachary)
* ceph-disk: ensure 'zap' only operates on a full disk (#11272 Loic Dachary)
* ceph-disk: misc fixes to respect init system (Loic Dachary, Owen Synge)
* ceph-disk: support NVMe device partitions (#11612 Ilja Slepnev)
* ceph: fix 'df' units (Zhe Zhang)
* ceph: fix parsing in interactive cli mode (#11279 Kefu Chai)
* ceph-objectstore-tool: many many changes (David Zafman)
* ceph-post-file: misc fixes (Joey McDonald, Sage Weil)
* client: avoid sending unnecessary FLUSHSNAP messages (Yan, Zheng)
* client: exclude setfilelock when calculating oldest tid (Yan, Zheng)
* client: fix error handling in check_pool_perm (John Spray)
* client: fsync waits only for inode's caps to flush (Yan, Zheng)
* client: invalidate kernel dcache when cache size exceeds limits (Yan, Zheng)
* client: make fsync wait for unsafe dir operations (Yan, Zheng)
* client: pin lookup dentry to avoid inode being freed (Yan, Zheng)
* common: detect overflow of int config values (#11484 Kefu Chai)
* common: fix json parsing of utf8 (#7387 Tim Serong)
* common: fix leak of pthread_mutexattr (#11762 Ketor Meng)
* crush: respect default replicated ruleset config on map creation (Ilya Dryomov)
* deb, rpm: move ceph-objectstore-tool to ceph (Ken Dreyer)
* doc: man page updates (Kefu Chai)
* doc: misc updates (#11396 Nilamdyuti, Fracois Lafont, Ken Dreyer, Kefu Chai)
* init-radosgw: merge with sysv version; fix enumeration (Sage Weil)
* librados: add config observer (Alistair Strachan)
* librbd: add const for single-client-only features (Josh Durgin)
* librbd: add deep-flatten operation (Jason Dillaman)
* librbd: avoid blocking aio API methods (#11056 Jason Dillaman)
* librbd: fix fast diff bugs (#11553 Jason Dillaman)
* librbd: fix image format detection (Zhiqiang Wang)
* librbd: fix lock ordering issue (#11577 Jason Dillaman)
* librbd: flatten/copyup fixes (Jason Dillaman)
* librbd: lockdep, helgrind validation (Jason Dillaman, Josh Durgin)
* librbd: only update image flags while hold exclusive lock (#11791 Jason Dillaman)
* librbd: return result code from close (#12069 Jason Dillaman)
* librbd: tolerate old osds when getting image metadata (#11549 Jason Dillaman)
* mds: do not add snapped items to bloom filter (Yan, Zheng)
* mds: fix handling for missing mydir dirfrag (#11641 John Spray)
* mds: fix rejoin (Yan, Zheng)
* mds: fix stra reintegration (Yan, Zheng)
* mds: fix suicide beason (John Spray)
* mds: misc repair improvements (John Spray)
* mds: misc snapshot fixes (Yan, Zheng)
* mds: respawn instead of suicide on blacklist (John Spray)
* misc coverity fixes (Danny Al-Gaaf)
* mon: add 'mon_metadata <id>' command (Kefu Chai)
* mon: add 'node ls ...' command (Kefu Chai)
* mon: disallow ec pools as tiers (#11650 Samuel Just)
* mon: fix mds beacon replies (#11590 Kefu Chai)
* mon: fix 'pg ls' sort order, state names (#11569 Kefu Chai)
* mon: normalize erasure-code profile for storage and comparison (Loic Dachary)
* mon: optionally specify osd id on 'osd create' (Mykola Golub)
* mon: 'osd tree' fixes (Kefu Chai)
* mon: prevent pool with snapshot state from being used as a tier (#11493 Sage Weil)
* mon: refine check_remove_tier checks (#11504 John Spray)
* mon: remove spurious who arg from 'mds rm ...' (John Spray)
* msgr: async: misc fixes (Haomai Wang)
* msgr: xio: fix ip and nonce (Raju Kurunkad)
* msgr: xio: improve lane assignment (Vu Pham)
* msgr: xio: misc fixes (Vu Pham, Cosey Bodley)
* osd: avoid transaction append in some cases (Sage Weil)
* osdc/Objecter: allow per-pool calls to op_cancel_writes (John Spray)
* osd: elminiate txn apend, ECSubWrite copy (Samuel Just)
* osd: filejournal: cleanup (David Zafman)
* osd: fix check_for_full (Henry Chang)
* osd: fix dirty accounting in make_writeable (Zhiqiang Wang)
* osd: fix osdmap dump of blacklist items (John Spray)
* osd: fix snap flushing from cache tier (again) (#11787 Samuel Just)
* osd: fix snap handling on promotion (#11296 Sam Just)
* osd: handle log split with overlapping entries (#11358 Samuel Just)
* osd: keyvaluestore: misc fixes (Varada Kari)
* osd: make suicide timeouts individually configurable (Samuel Just)
* osd: move scrub in OpWQ (Samuel Just)
* osd: pool size change triggers new interval (#11771 Samuel Just)
* osd: randomize scrub times (#10973 Kefu Chai)
* osd: refactor scrub and digest recording (Sage Weil)
* osd: refuse first write to EC object at non-zero offset (Jianpeng Ma)
* osd: stripe over small xattrs to fit in XFS's 255 byte inline limit (Sage Weil, Ning Yao)
* osd: sync object_map on syncfs (Samuel Just)
* osd: take excl lock of op is rw (Samuel Just)
* osd: WBThrottle cleanups (Jianpeng Ma)
* pycephfs: many fixes for bindings (Haomai Wang)
* rados: bench: add --no-verify option to improve performance (Piotr Dalek)
* rados: misc bench fixes (Dmitry Yatsushkevich)
* rbd: add disk usage tool (#7746 Jason Dillaman)
* rgw: alwasy check if token is expired (#11367 Anton Aksola, Riku Lehto)
* rgw: conversion tool to repair broken multipart objects (#12079 Yehuda Sadeh)
* rgw: do not enclose bucket header in quotes (#11860 Wido den Hollander)
* rgw: error out if frontend did not send all data (#11851 Yehuda Sadeh)
* rgw: fix assignment of copy obj attributes (#11563 Yehuda Sadeh)
* rgw: fix reset_loc (#11974 Yehuda Sadeh)
* rgw: improve content-length env var handling (#11419 Robin H. Johnson)
* rgw: only scan for objects not in a namespace (#11984 Yehuda Sadeh)
* rgw: remove trailing :port from HTTP_HOST header (Sage Weil)
* rgw: shard work over multiple librados instances (Pavan Rallabhandi)
* rgw: swift: enforce Content-Type in response (#12157 Radoslaw Zarzynski)
* rgw: use attrs from source bucket on copy (#11639 Javier M. Mellid)
* rocksdb: pass options as single string (Xiaoxi Chen)
* rpm: many spec file fixes (Owen Synge, Ken Dreyer)
* tests: fixes for rbd xstests (Douglas Fuller)
* tests: fix tiering health checks (Loic Dachary)
* tests for low-level performance (Haomai Wang)
* tests: many ec non-regression improvements (Loic Dachary)
* tests: many many ec test improvements (Loic Dachary)
* upstart: throttle restarts (#11798 Sage Weil, Greg Farnum)
v9.0.1
======
This development release is delayed a bit due to tooling changes in the build
environment. As a result the next one (v9.0.2) will have a bit more work than
is usual.
Highlights here include lots of RGW Swift fixes, RBD feature work
surrounding the new object map feature, more CephFS snapshot fixes,
and a few important CRUSH fixes.
Notable Changes
---------------
* auth: cache/reuse crypto lib key objects, optimize msg signature check (Sage Weil)
* build: allow tcmalloc-minimal (Thorsten Behrens)
* build: do not build ceph-dencoder with tcmalloc (#10691 Boris Ranto)
* build: fix pg ref disabling (William A. Kennington III)
* build: install-deps.sh improvements (Loic Dachary)
* build: misc fixes (Boris Ranto, Ken Dreyer, Owen Synge)
* ceph-authtool: fix return code on error (Gerhard Muntingh)
* ceph-disk: fix zap sgdisk invocation (Owen Synge, Thorsten Behrens)
* ceph-disk: pass --cluster arg on prepare subcommand (Kefu Chai)
* ceph-fuse, libcephfs: drop inode when rmdir finishes (#11339 Yan, Zheng)
* ceph-fuse,libcephfs: fix uninline (#11356 Yan, Zheng)
* ceph-monstore-tool: fix store-copy (Huangjun)
* common: add perf counter descriptions (Alyona Kiseleva)
* common: fix throttle max change (Henry Chang)
* crush: fix crash from invalid 'take' argument (#11602 Shiva Rkreddy, Sage Weil)
* crush: fix divide-by-2 in straw2 (#11357 Yann Dupont, Sage Weil)
* deb: fix rest-bench-dbg and ceph-test-dbg dependendies (Ken Dreyer)
* doc: document region hostnames (Robin H. Johnson)
* doc: update release schedule docs (Loic Dachary)
* init-radosgw: run radosgw as root (#11453 Ken Dreyer)
* librados: fadvise flags per op (Jianpeng Ma)
* librbd: allow additional metadata to be stored with the image (Haomai Wang)
* librbd: better handling for dup flatten requests (#11370 Jason Dillaman)
* librbd: cancel in-flight ops on watch error (#11363 Jason Dillaman)
* librbd: default new images to format 2 (#11348 Jason Dillaman)
* librbd: fast diff implementation that leverages object map (Jason Dillaman)
* librbd: fix snapshot creation when other snap is active (#11475 Jason Dillaman)
* librbd: new diff_iterate2 API (Jason Dillaman)
* librbd: object map rebuild support (Jason Dillaman)
* logrotate.d: prefer service over invoke-rc.d (#11330 Win Hierman, Sage Weil)
* mds: avoid getting stuck in XLOCKDONE (#11254 Yan, Zheng)
* mds: fix integer truncateion on large client ids (Henry Chang)
* mds: many snapshot and stray fixes (Yan, Zheng)
* mds: persist completed_requests reliably (#11048 John Spray)
* mds: separate safe_pos in Journaler (#10368 John Spray)
* mds: snapshot rename support (#3645 Yan, Zheng)
* mds: warn when clients fail to advance oldest_client_tid (#10657 Yan, Zheng)
* misc cleanups and fixes (Danny Al-Gaaf)
* mon: fix average utilization calc for 'osd df' (Mykola Golub)
* mon: fix variance calc in 'osd df' (Sage Weil)
* mon: improve callout to crushtool (Mykola Golub)
* mon: prevent bucket deletion when referenced by a crush rule (#11602 Sage Weil)
* mon: prime pg_temp when CRUSH map changes (Sage Weil)
* monclient: flush_log (John Spray)
* msgr: async: many many fixes (Haomai Wang)
* msgr: simple: fix clear_pipe (#11381 Haomai Wang)
* osd: add latency perf counters for tier operations (Xinze Chi)
* osd: avoid multiple hit set insertions (Zhiqiang Wang)
* osd: break PG removal into multiple iterations (#10198 Guang Yang)
* osd: check scrub state when handling map (Jianpeng Ma)
* osd: fix endless repair when object is unrecoverable (Jianpeng Ma, Kefu Chai)
* osd: fix pg resurrection (#11429 Samuel Just)
* osd: ignore non-existent osds in unfound calc (#10976 Mykola Golub)
* osd: increase default max open files (Owen Synge)
* osd: prepopulate needs_recovery_map when only one peer has missing (#9558 Guang Yang)
* osd: relax reply order on proxy read (#11211 Zhiqiang Wang)
* osd: skip promotion for flush/evict op (Zhiqiang Wang)
* osd: write journal header on clean shutdown (Xinze Chi)
* qa: run-make-check.sh script (Loic Dachary)
* rados bench: misc fixes (Dmitry Yatsushkevich)
* rados: fix error message on failed pool removal (Wido den Hollander)
* radosgw-admin: add 'bucket check' function to repair bucket index (Yehuda Sadeh)
* rbd: allow unmapping by spec (Ilya Dryomov)
* rbd: deprecate --new-format option (Jason Dillman)
* rgw: do not set content-type if length is 0 (#11091 Orit Wasserman)
* rgw: don't use end_marker for namespaced object listing (#11437 Yehuda Sadeh)
* rgw: fail if parts not specified on multipart upload (#11435 Yehuda Sadeh)
* rgw: fix GET on swift account when limit == 0 (#10683 Radoslaw Zarzynski)
* rgw: fix broken stats in container listing (#11285 Radoslaw Zarzynski)
* rgw: fix bug in domain/subdomain splitting (Robin H. Johnson)
* rgw: fix civetweb max threads (#10243 Yehuda Sadeh)
* rgw: fix copy metadata, support X-Copied-From for swift (#10663 Radoslaw Zarzynski)
* rgw: fix locator for objects starting with _ (#11442 Yehuda Sadeh)
* rgw: fix mulitipart upload in retry path (#11604 Yehuda Sadeh)
* rgw: fix quota enforcement on POST (#11323 Sergey Arkhipov)
* rgw: fix return code on missing upload (#11436 Yehuda Sadeh)
* rgw: force content type header on responses with no body (#11438 Orit Wasserman)
* rgw: generate new object tag when setting attrs (#11256 Yehuda Sadeh)
* rgw: issue aio for first chunk before flush cached data (#11322 Guang Yang)
* rgw: make read user buckets backward compat (#10683 Radoslaw Zarzynski)
* rgw: merge manifests properly with prefix override (#11622 Yehuda Sadeh)
* rgw: return 412 on bad limit when listing buckets (#11613 Yehuda Sadeh)
* rgw: send ETag, Last-Modified for swift (#11087 Radoslaw Zarzynski)
* rgw: set content length on container GET, PUT, DELETE, HEAD (#10971, #11036 Radoslaw Zarzynski)
* rgw: support end marker on swift container GET (#10682 Radoslaw Zarzynski)
* rgw: swift: fix account listing (#11501 Radoslaw Zarzynski)
* rgw: swift: set content-length on keystone tokens (#11473 Herv Rousseau)
* rgw: use correct oid for gc chains (#11447 Yehuda Sadeh)
* rgw: use unique request id for civetweb (#10295 Orit Wasserman)
* rocksdb, leveldb: fix compact_on_mount (Xiaoxi Chen)
* rocksdb: add perf counters for get/put latency (Xinxin Shu)
* rpm: add suse firewall files (Tim Serong)
* rpm: misc systemd and suse fixes (Owen Synge, Nathan Cutler)
v9.0.0
======
This is the first development release for the Infernalis cycle, and
the first Ceph release to sport a version number from the new
numbering scheme. The "9" indicates this is the 9th release cycle--I
(for Infernalis) is the 9th letter. The first "0" indicates this is a
development release ("1" will mean release candidate and "2" will mean
stable release), and the final "0" indicates this is the first such
development release.
A few highlights include:
* a new 'ceph daemonperf' command to watch perfcounter stats in realtime
* reduced MDS memory usage
* many MDS snapshot fixes
* librbd can now store options in the image itself
* many fixes for RGW Swift API support
* OSD performance improvements
* many doc updates and misc bug fixes
Notable Changes
---------------
* aarch64: add optimized version of crc32c (Yazen Ghannam, Steve Capper)
* auth: reinit NSS after fork() (#11128 Yan, Zheng)
* build: disable LTTNG by default (#11333 Josh Durgin)
* build: fix ppc build (James Page)
* build: install-deps: support OpenSUSE (Loic Dachary)
* build: misc cmake fixes (Matt Benjamin)
* ceph-disk: follow ceph-osd hints when creating journal (#9580 Sage Weil)
* ceph-disk: handle re-using existing partition (#10987 Loic Dachary)
* ceph-disk: improve parted output parsing (#10983 Loic Dachary)
* ceph-disk: make suppression work for activate-all and activate-journal (Dan van der Ster)
* ceph-disk: misc fixes (Alfredo Deza)
* ceph-fuse, libcephfs: don't clear COMPLETE when trimming null (Yan, Zheng)
* ceph-fuse, libcephfs: hold exclusive caps on dirs we "own" (#11226 Greg Farnum)
* ceph-fuse: do not require successful remount when unmounting (#10982 Greg Farnum)
* ceph: new 'ceph daemonperf' command (John Spray, Mykola Golub)
* common: PriorityQueue tests (Kefu Chai)
* common: add descriptions to perfcounters (Kiseleva Alyona)
* common: fix LTTNG vs fork issue (Josh Durgin)
* crush: fix has_v4_buckets (#11364 Sage Weil)
* crushtool: fix order of operations, usage (Sage Weil)
* debian: minor package reorg (Ken Dreyer)
* doc: docuemnt object corpus generation (#11099 Alexis Normand)
* doc: fix gender neutrality (Alexandre Maragone)
* doc: fix install doc (#10957 Kefu Chai)
* doc: fix sphinx issues (Kefu Chai)
* doc: mds data structure docs (Yan, Zheng)
* doc: misc updates (Nilamdyuti Goswami, Vartika Rai, Florian Haas, Loic Dachary, Simon Guinot, Andy Allan, Alistair Israel, Ken Dreyer, Robin Rehu, Lee Revell, Florian Marsylle, Thomas Johnson, Bosse Klykken, Travis Rhoden, Ian Kelling)
* doc: swift tempurls (#10184 Abhishek Lekshmanan)
* doc: switch doxygen integration back to breathe (#6115 Kefu Chai)
* erasure-code: update ISA-L to 2.13 (Yuan Zhou)
* gmock: switch to submodule (Danny Al-Gaaf, Loic Dachary)
* hadoop: add terasort test (Noah Watkins)
* java: fix libcephfs bindings (Noah Watkins)
* libcephfs,ceph-fuse: fix request resend on cap reconnect (#10912 Yan, Zheng)
* librados: define C++ flags from C constants (Josh Durgin)
* librados: fix last_force_resent handling (#11026 Jianpeng Ma)
* librados: fix memory leak from C_TwoContexts (Xiong Yiliang)
* librados: fix striper when stripe_count = 1 and stripe_unit != object_size (#11120 Yan, Zheng)
* librados: op perf counters (John Spray)
* librados: pybind: fix write() method return code (Javier Guerra)
* libradosstriper: fix leak (Danny Al-Gaaf)
* librbd: add purge_on_error cache behavior (Jianpeng Ma)
* librbd: misc aio fixes (#5488 Jason Dillaman)
* librbd: misc rbd fixes (#11478 #11113 #11342 #11380 Jason Dillaman, Zhiqiang Wang)
* librbd: readahead fixes (Zhiqiang Wang)
* librbd: store metadata, including config options, in image (Haomai Wang)
* mds: add 'damaged' state to MDSMap (John Spray)
* mds: add nicknames for perfcounters (John Spray)
* mds: disable problematic rstat propagation into snap parents (Yan, Zheng)
* mds: fix mydir replica issue with shutdown (#10743 John Spray)
* mds: fix out-of-order messages (#11258 Yan, Zheng)
* mds: fix shutdown with strays (#10744 John Spray)
* mds: fix snapshot fixes (Yan, Zheng)
* mds: fix stray handling (John Spray)
* mds: flush immediately in do_open_truncate (#11011 John Spray)
* mds: improve dump methods (John Spray)
* mds: misc journal cleanups and fixes (#10368 John Spray)
* mds: new SessionMap storage using omap (#10649 John Spray)
* mds: reduce memory consumption (Yan, Zheng)
* mds: throttle purge stray operations (#10390 John Spray)
* mds: tolerate clock jumping backwards (#11053 Yan, Zheng)
* misc coverity fixes (Danny Al-Gaaf)
* mon: do not deactivate last mds (#10862 John Spray)
* mon: make osd get pool 'all' only return applicable fields (#10891 Michal Jarzabek)
* mon: warn on bogus cache tier config (Jianpeng Ma)
* msg/async: misc bug fixes and updates (Haomai Wang)
* msg/simple: fix connect_seq assert (Haomai Wang)
* msg/xio: misc fixes (#10735 Matt Benjamin, Kefu Chai, Danny Al-Gaaf, Raju Kurunkad, Vu Pham)
* msg: unit tests (Haomai Wang)
* objectcacher: misc bug fixes (Jianpeng Ma)
* os/filestore: enlarge getxattr buffer size (Jianpeng Ma)
* osd: EIO injection (David Zhang)
* osd: add misc perfcounters (Xinze Chi)
* osd: add simple sleep injection in recovery (Sage Weil)
* osd: allow SEEK_HOLE/SEEK_DATA for sparse read (Zhiqiang Wang)
* osd: avoid dup omap sets for in pg metadata (Sage Weil)
* osd: clean up some constness, privateness (Kefu Chai)
* osd: erasure-code: drop entries according to LRU (Andreas-Joachim Peters)
* osd: fix negative degraded stats during backfill (Guang Yang)
* osd: misc fixes (Ning Yao, Kefu Chai, Xinze Chi, Zhiqiang Wang, Jianpeng Ma)
* pybind: pep8 cleanups (Danny Al-Gaaf)
* qa: fix filelock_interrupt.py test (Yan, Zheng)
* qa: improve ceph-disk tests (Loic Dachary)
* qa: improve docker build layers (Loic Dachary)
* rados: translate erno to string in CLI (#10877 Kefu Chai)
* rbd: accept map options config option (Ilya Dryomov)
* rbd: cli: fix arg parsing with --io-pattern (Dmitry Yatsushkevich)
* rbd: fix error messages (#2862 Rajesh Nambiar)
* rbd: update rbd man page (Ilya Dryomov)
* rbd: update xfstests tests (Douglas Fuller)
* rgw: add X-Timestamp for Swift containers (#10938 Radoslaw Zarzynski)
* rgw: add missing headers to Swift container details (#10666 Ahmad Faheem, Dmytro Iurchenko)
* rgw: add stats to headers for account GET (#10684 Yuan Zhou)
* rgw: do not prefecth data for HEAD requests (Guang Yang)
* rgw: don't clobber bucket/object owner when setting ACLs (#10978 Yehuda Sadeh)
* rgw: don't use rgw_socket_path if frontend is configured (#11160 Yehuda Sadeh)
* rgw: enforce Content-Lenth for POST on Swift cont/obj (#10661 Radoslaw Zarzynski)
* rgw: fix handling empty metadata items on Swift container (#11088 Radoslaw Zarzynski)
* rgw: fix log rotation (Wuxingyi)
* rgw: generate Date header for civetweb (#10873 Radoslaw Zarzynski)
* rgw: make init script wait for radosgw to stop (#11140 Dmitry Yatsushkevich)
* rgw: make quota/gc threads configurable (#11047 Guang Yang)
* rgw: pass in civetweb configurables (#10907 Yehuda Sadeh)
* rgw: rectify 202 Accepted in PUT response (#11148 Radoslaw Zarzynski)
* rgw: remove meta file after deleting bucket (#11149 Orit Wasserman)
* rgw: swift: allow setting attributes with COPY (#10662 Ahmad Faheem, Dmytro Iurchenko)
* rgw: swift: fix metadata handling on copy (#10645 Radoslaw Zarzynski)
* rgw: swift: send Last-Modified header (#10650 Radoslaw Zarzynski)
* rgw: update keystone cache with token info (#11125 Yehuda Sadeh)
* rgw: update to latest civetweb, enable config for IPv6 (#10965 Yehuda Sadeh)
* rocksdb: update to latest (Xiaoxi Chen)
* rpm: loosen ceph-test dependencies (Ken Dreyer)
|
Q:
Quickest way to execute stored procedure in c# requiring least amount of code
I'm going to grab the results in a collection of entity. I don't just need the IDataReader object. So above should be answered considering that I've large no of parameters and many columns of data is getting returned by the SP.
Please provide reasons.
A few might be
Drag and drop on to a DBML designer and then calling it by linq to sql. That's very good. But that also generates lot of code for the DBML. Simpler is better.
Getting IDataReader by doing ExecuteReader and then passing IDataReader to factory to create it's object. Good and simple. But requires lot of coding. Below is required for each column returned.
int nameIndex = dataReader.GetOrdinal("Name");
if (!dataReader.IsDBNull(nameIndex)){
myObject.Name = dataReader.GetString(nameIndex);
}
Are there any other simpler option for this?
UPDATE
@Heinzi's answer simplifies the process of handling the results. Is there any better way to handle large number of parameters also?
A:
If you want to stick to DataReaders, you can save some code by writing an extension method on IDataReader, i.e., something like this (untested):
public static T GetValue<T>(this IDataReader reader, string field, T defaultValue)
{
int index = reader.GetOrdinal(field);
if (reader.IsDBNull(index)) {
return defaultValue;
} else {
return (T)(reader[name]);
}
}
This would reduce your factory code to
myObject.Name = dataReader.GetValue<string>("name", Nothing)
Of course, countless variants of this extension method are possible (with or without defaultValue, target field passed as a ref parameter to get exactly the same behavior as your code, etc.).
Otherwise, you could use DataSets instead of DataReaders, where an extension method like this already exists. You create your DataSet like this (instead of executing myCommand.ExecuteReader):
var dataSet = new DataSet();
var adapter = new SqlDataAdapter();
adapter.SelectCommand = myCommand;
adapter.Fill(dataSet);
var table = dataSet.Tables[0];
Then you can access your data using DataRowExtensions.Field:
myObject.Name = table.Field<string>("name");
myObject.Age = table.Field<int?>("age") ?? 30; // default value if DBNull
|
The invention relates to an integrated JK-flipflop circuit formed of two cross-coupled inverters with each inverter comprising a transistor and a resistor element connected in series therewith. A first circuit node between the transistor and resistor element in one of the inverters is connected to a control terminal of the transistor and the other inverter. The circuit node is also connected via a further inverter to a gate of a first field effect transistor having its source-drain path connected between the other circuit node and a terminal at reference potential. The gate of this field effect transistor is connected to the reference terminal via an additional logic element whose control input represents a flipflop input.
A flipflop circuit of this type is known from the book "Mikroelektronische Schaltkreise" by A. Moschwitzer and G. Jorke, VEB Verlag Technik, Berlin 1979, page 121, FIG. 2.41d, incorporated herein by reference. The additional logic elements therein are provided as field effect transistors, whereby two of them have their source-drain segments connected parallel to the field effect transistors of the cross-coupled inverters. |
atmos x Reebok Insta Pump Fury 20th Anniversary Preview
Didn’t we already see an atmos x Reebok Insta Pump Fury pair this year? Yes, but that collaboration was almost too subtle to even count, as the model there was only a slight reworking of the original “Citron” colorway. This time around they take some more liberties with this milky white pair that’s got some red and blue accents going on. No release date just yet, but here’s to hoping that they show up soon and are distributed beyond the Japanese shop. Find the full photo for them below and then tell us in the comments what you think of this new Reebok Insta Pump Fury. |
Subscription Boxes, If the packaging of your product is apparent, simple, and bold, then it will be more expressive and more convincing to the clients. In this fast world, no one pays attention to all detail of product so, add little detail or use fewer elements to packaging. It can help you to promote your product in many ways. If the packaging design of your product is complicated, then you will surely lose your customers because simplicity is the key. To bring fun, creativity, and innovation in your packaging design, you should know how to play with colors. Rightly choose colors can help the customer to make a quick decision whether to buy a product or not. Choose colors according to your product not too vibrant or not too dull.
Roll End Tuck Top Boxes is a design made for packaging any type of materials. This design belongs to the family of top closure style boxes. Roll End Tuck Top Boxes can be a safest container for storing...
Subscription boxes is a design of box belonging to the class of fold and assemble style category. These boxes are non-glued and have double walls with tucked ends. The ends at the sides of this box are rolled... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.