text stringlengths 8 5.77M |
|---|
package model
import (
"fmt"
"regexp"
"github.com/kubernetes-incubator/kube-aws/pkg/api"
)
type EtcdCluster struct {
api.EtcdCluster
Network
region api.Region
nodeCount int
}
func NewEtcdCluster(config api.EtcdCluster, region api.Region, network Network, nodeCount int) EtcdCluster {
return EtcdCluster{
EtcdCluster: config,
region: region,
Network: network,
nodeCount: nodeCount,
}
}
func (c EtcdCluster) Region() api.Region {
return c.region
}
func (c EtcdCluster) NodeCount() int {
return c.nodeCount
}
func (c EtcdCluster) DNSNames() []string {
var dnsName string
if c.GetMemberIdentityProvider() == api.MemberIdentityProviderEIP {
// Used when `etcd.memberIdentityProvider` is set to "eip"
dnsName = fmt.Sprintf("*.%s", c.region.PublicComputeDomainName())
}
if c.GetMemberIdentityProvider() == api.MemberIdentityProviderENI {
if c.InternalDomainName != "" {
// Used when `etcd.memberIdentityProvider` is set to "eni" with non-empty `etcd.internalDomainName`
dnsName = fmt.Sprintf("*.%s", c.InternalDomainName)
} else {
dnsName = fmt.Sprintf("*.%s", c.region.PrivateDomainName())
}
}
return []string{dnsName}
}
func (c EtcdCluster) LogicalName() string {
d := regexp.MustCompile(`\.`)
return fmt.Sprintf("Etcd%s", d.ReplaceAllString(c.EtcdCluster.MajorMinorVersion(), `dot`))
}
|
Not far from the northern end of London Bridge, in the capital’s historic centre, you’ll find a short street called ‘Philpot Lane.’
Named after Sir John Philpot (Lord Mayor of London between 1378-1379), Philpot Lane links Eastcheap and Fenchurch Street.
It is also home to London’s tiniest public statue; ‘The Two Mice Eating Cheese.’
These two small fellows can be found half-way up a building which sits on the south-eastern corner of Philpot Lane, just by the junction with Eastcheap.
Details of who created these critters, and when they were placed here are pretty much non-existent. However, one thing is certain- these two wee mice are a memorial to two builders who died nearby…
The builders in question were working on ‘The Monument’; a towering column which stands on the junction of Fish Street Hill and Monument Street, about 400 ft. away from Philpot Lane.
Built between 1671-77, the Monument was designed to commemorate the Great Fire of London, which had destroyed a vast part of the City a few years before.
Its architect was one of London’s finest; the incredible Sir Christopher Wren. Testament to Sir Wren’s genius, the Monument, to this day, remains the tallest, isolated stone column in the world.
*
At some point during the Monument’s construction, the two builders mentioned earlier sat down to enjoy their packed-lunch of bread and cheese.
Clearly having a head for heights, the two men- who were sound friends by all accounts- were content to sit at their workplace; perched on a high scaffold (in those days of course, health and safety was unheard of. Workers on the Monument weren’t even required to wear hard-hats and hi-vis jackets!)
However, something was amiss… one of the men’s sarnies had been nibbled away to almost nothing!
For some reason, the victim of this food theft immediately blamed his mate sitting beside him and a fight broke out- not wise when you’re poised so high up.
Trading punches, the unfortunate pair lost their footing and plunged to the ground, both being killed instantly.
It was only later, after similar disappearances of bread and cheese, that the real culprits were discovered:
An infestation of tiny mice.
*
So small is the sculpture of Mice Eating Cheese, that it can be quite a headache to find! If you’re interested in seeing it for yourself, I’ve circled it in the image below, courtesy of ‘Google Maps.’ |
Nearly half of LGBTQ employees in the U.S. are closeted at work, down slightly from a decade ago, according to a report released this week by the Human Rights Campaign Foundation.
The organization surveyed 804 LGBTQ respondents and 811 non-LGBTQ respondents this year and found that 46 percent of lesbian, gay, bisexual, transgender and queer workers are still closeted in the workplace, down from 50 percent in 2008. The survey also found that 50 percent of non-LGBTQ workers reported there were no openly LGBTQ people at their company.
“While LGBTQ-inclusive corporate policies are becoming the norm, LGBTQ workers too often face a climate of bias in their workplace,” Deena Fidas, director of the Human Rights Campaign’s Workplace Equality Program and a co-author of the report, said in a statement.
A new report found that a workplace environment that is not LGBTQ-inclusive can have a negative impact on engagement, retention and turnover. iStockphoto / Getty Images
The survey results found that the top four reasons for LGBTQ employees' choosing not to reveal their sexual orientation or gender identity were: the possibility of being stereotyped (38 percent); the possibility of making people feel uncomfortable (36 percent); the possibility of losing connections or relationships with coworkers (31 percent); and the fear colleagues may think they are attracted to them just because they are LGBTQ (27 percent).
Devin Hemachandra, 23, a software engineer in Cincinnati, came out at his current company less than a year ago, but said he had been closeted at a number of previous jobs.
“Even though I was fortunate to have worked in places that explicitly stated that they do not discriminate based on sexual orientation, I was still afraid to come out to my co-workers, because of how I might be treated,” he told NBC News. “I don't believe any of them would have harassed and shown any abuse toward me, but I didn't want the good existing relations I had with them to deteriorate.”
Hemachandra also noted that Ohio is one of 27 states that does not have a statute protecting LGBTQ employees from private workplace discrimination.
Chantal Ridlon, a high school teacher in Connecticut, a state that does have LGBTQ employment protections, said she hesitated to come out to her colleagues as lesbian for fear of how they would react. She finally came out in the past year, and said the experience has been a mixed bag.
“I don’t feel like anyone is discriminating,” she said, “just judging.” She used to be married to a man before she came out, so she got “switch-hitter” types of comments, she added.
The Human Rights Campaign Foundation also found about 20 percent of queer workers report that co-workers have told them to dress more feminine or more masculine.
The report also found that a workplace environment that is not LGBTQ-inclusive can have a negative impact on engagement, retention and turnover.
“LGBTQ employees are still avoiding making personal and professional connections at work because they fear coming out — and that hurts not only that employee, but the company as a whole,” Fidas said. “Even the best-of-the-best private sector employers with top-rated policies and practices must do more to nurture a climate of inclusion for all.”
The report concludes with recommendations for senior leaders, mid-level managers, and individuals, including “ask yourself what informed your earliest impressions and beliefs about LGBTQ identity and how you express that at work” and “equip teams with a vocabulary around spotting unconscious bias and talking to each other and you as their manager around experiences of unconscious bias.”
FOLLOW NBC OUT ON TWITTER, FACEBOOK AND INSTAGRAM |
DigiByte (DGB) is a public, decentralized blockchain that is up to 40x faster than Bitcoin. DigiBytes are digital cryptocurrency assets that can be sent over the DigiByte Blockchain. These transactions are recorded on an immutable ledger that is decentralised across thousands of devices around the world. Digibyte is an interesting example of how not all cryptocurrencies ‘take-off’ in the way …
Hashflare was the best response to the growing demand for cloud mining services. Up until that point, their mother company exclusively offered only hosted mining contracts. Propelled by the professional hardware made by HashCoins, HashFlare has the right tool for the job, regardless of your expertise level in the world of cryptocurrency mining. Apart from the mining hardware, their parent … |
Citation of any reference in this section or any section hereof is not to be construed as an admission that such reference is available as prior art to this invention.
Controlled expression of transgenes or of target endogenous genes is essential for success of many genetic therapies. Constitutive expression of transgenes has often resulted in down-regulation of effector systems and/or cellular toxicity in animal studies (see, e.g., Efrat et al., 1995, Proc. Natl. Acad. Sci. USA 92, 3576-3580).
The expression of endogenous eukaryotic genes is often regulated by, for example, metabolic, hormonal, or environmental signals. In order to mimic natural physiological expression patterns with transgenes, and to minimize interactions with human gene regulation signals, binary promoter/transactivator configurations of heterologous origin which respond to heterologous stimuli have been developed in recent years. However, many exogenous stimuli which modulate these artificial mammalian regulons have proven to be incompatible with human therapeutic use due to cytotoxicity or undesired side effects (Baim et al., 1991, Proc. Natl. Acad. Sci. USA 88, 5072-5076; Braselmann et al., 1993, Proc. Natl. Acad. Sci. USA 90, 1657-1661; No D. et al., 1996, Proc. Natl. Acad. Sci. USA 93, 3346-3351; Rivera et al., 1996, Nat. Medicine 2, 1028-1032; Suhr et al., 1998, Proc. Natl. Acad. Sci. USA 95, 7999-8004; Wang et al., 1994, Proc. Natl. Acad. Sci. USA 91, 8180-8184; Fussenegger et al., 2000. Nat. Biotech. 18, 1203-1208).
Two systems have had some success for regulation of expression of transgenes in mammalian cells. In particular, the streptogramin-regulated mammalian expression system and the tetracycline-regulated mammalian expression system have avoided some of the problems associated with previous efforts. Streptogramin-regulated systems and tetracycline-regulated systems are described in U.S. Pat. Nos. 5,888,981; 5,866,755; 5,789,156; 5,654,168; and 5,650,298; PCT application no. WO 00/65080, to name just a few examples. However, the tetracycline-regulated system can fail to achieve the desired regulatory effects like low leakyness under repressed conditions or maximum expression in the induced state.
Moreover, gene therapy strategies often require independent control of multiple different transgenes or sets of transgenes which are cotranscribed in a multicistronic configuration. For example, many tissue expansion and ex vivo gene therapy scenarios require a two-step process beginning with expression of growth-promoting genes to enable expansion of grafted tissues in culture, followed by induction of growth suppressors to prevent tumorigenic behavior of treated cells after reimplantation. Sustained proliferation control is also required for stem cell-based technologies currently evaluated for eventual cell and tissue replacement therapy, since stem cells are tumorigenic (Rossant et al., 1999, Nat. Biotechnol. 17, 23-24; Solter et al., 1999, Science 283, 1468-1470). A second, independent gene regulation system could be used in such cells for pharmacologic control of one or several secreted therapeutic proteins, such as insulin, to enable titration of circulating proteins into the therapeutic range or adapt expression to optimal daily dosing regimes.
There is, therefore, a need for new mammalian gene regulation systems that employ modern, therapeutically proven antibiotics as controlling agents, and which can be used in combination with the tetracycline and/or streptogramin regulation systems, with minimal interaction between either tetracycline control or streptogramin control, or both, and the new control modality. However, dual-regulated expression technology is not sufficient to enable construction of complex artificial regulatory networks and cascades required for more sophisticated multigene interventions in next-generation human therapies and biopharmaceutical manufacturing. A novel mammalian gene regulation system that is independent of the streptogramin and tetracycline-regulated systems is needed to enable the regulation of such complex networks and cascades. |
This product is prepared as per traditional Ayurvedic standards. This means the micro pulverized powder of the herb impregnates with its own juice or decoction by trituration (bhavna). The trituration accentuates hidden medicinal properties of the herb and to ensure that the herb, as soon as administered, is absorbed quickly at the cell level. Subtlety should be the quality by virtue of which a product can penetrate in to the smallest capillary and channels of the biological system.
This product is concentrated extract form (Not just simple bulk herb powder) Extract enhances potency, efficacy and health benefits to a great extent.
Ghee - Pure
As a dietary supplement it act as a Rasayana (Rejuvenator) for human beings. It lubricates and moistens the body tissues.
Ayurvedic Concept
Pure Ghee has sattvic (Healthy) property that improves the healthy state of mind. It also helps to balance the problems related to Vata (Air) and Pitta (Fire), Doshas (Humours). It acts as a rejuvenator for body.
What is Ghee
Ghee is a gelatinious form of butter without water content, lactose and other milk solids. It is prepared by gently heating the butter until it becomes a clear golden liquid. It is a natural 100% pure ghee made from cow’s milk.
Uses as per Ayurveda
Helps to maintain healthy state of mind.
Helps to distribute the fats equally in body.
It helps in lubrication & moistening the body tissues.
Helps to maintain good health, vitality and longevity of life.
It helps to support healthy vision, voice, intelligence and brain function.
Helps to loose up the natural toxins and expel them from the body.
Helps to enhance the quality and quantity of semen in males, ovum (Egg) in females and immunity of body.
For Best Results
Herbs Forever provides, Ghee made of pure butter of non-hormonal milk that does not contain any unnatural ingredient from origination to final process. This ghee comes directly from India, where 80 percent of the population is vegetarian. |
Newcastle United 3-0 Manchester United.
I am fucking annoyed. I mean after the debacle against Blackburn we respond with this? In less than a week we went from having a chance to steal a lead on Manchester City to being three points behind and -11 on goal difference. We didn’t deserve to lose three-nil last night, but we didn’t deserve anything either. I remember thinking throughout the game: ‘This is Manchester United, we are going to still win, we don’t give up”, but bar Rooney’s shot cleared off the line we had absolutely nothing.
Why is it, that our front six either all play well, or all play terrible? Is there something in the fucking water? It seems as one minute there drinking bloody holy water next minute there all bloody hungover on whiskey. I thought Wayne Rooney’s punishment was harsh for having a meal after boxing day, but after seeing his useless performance last night SAF was dead right, again. One thing SAF isn’t right on, however, is our squad. We need a bloody midfielder. Actually no, we need two bloody midfielders. And I am not talking about this pish-posh ‘Attacking Midfielders’ or wingers who are handy in midfielder, I am talking about two predominate central midfielders. Luka Modric and Cheik Tiote for example. Put those two players together and teams would be soiling their pants just reading the team sheet.
We our heavily reliant on Rooney to come up with the goods. Look at the 2008 team, Rooney was Ronaldo’s sidekick. A brilliant sidekick yes, but he allowed Ronaldo to be brilliant and when he wasn’t, Rooney would step in. Rooney has Nani to sidekick him, but your never quite sure with Nani. Ashley Young, Antonio Valencia, Javier Hernandez, Danny Welbeck and Dimitar Berbatov are all very good players, but they aren’t world class. Let’s compare this class to the 2008 one:
Goal: Van der Saar vs David de Gea or Anders Lindegaard – I think both of our keepers are very good, I think de Gea will be great, but Van der Saar wins this hands down. 2008
Defence: Brown-Vidic-Ferdinand-Evra vs Valencia/Jones/Smalling/Rafael/Fabio -Vidic-Ferdinand-Evra – On the surface looks pretty similar, but we haven’t had a settled back four all season. Patrice and Rio have declined and Vidic is out for the season. 2008
Midfield: Hargreaves-Scholes-Carrick vs Carrick-Cleverley – Carrick has actually gotten back to his best in the last few months, but Cleverley isn’t Scholes and we haven’t replaced Hargreaves. 2008
Forwards: Ronaldo-Tevez-Rooney vs Nani-Rooney-Hernandez-Young – Ronaldo, Tevez and Rooney were frightening that season, and while on their day our current forwards are breathtaking, they lack 2008’s consistency. They don’t have Ronaldo either. 2008
So 2008 team wins convincingly. But, like I said before our team is in transition. However, I can’t honestly seeing them reaching 2008’s standard without some much needed investment. Ravel Morrison, Paul Pogba and Ryan Tunnicliffe aren’t ready to play 40+ games a season for the first team yet. They won’t be for awhile. It’s bollux to think if we sign a player they won’t progress, absolutely tosh. If there good enough, they’ll get into the team. Look at Jack Wilshere, he got into an Arsenal team with Cesc Fabregas and Samir Nasri already covering his position.
It’s annoying to think right now, we have two fit midfielders who are actually central midfielders. We are only going to get one more back this season when Cleverley returns, we have to hope that Fletcher comes back at all. I know it’s difficult to sign someone in January, but it’s not impossible. This time last year West Ham signed Demba Ba – who destroyed us last night. We might have to pay a bit extra, but if the Glazers are true to their word, this should be no problem at all. Our club pumps in a staggering amount of money, surely we can indulge ourselves? Seeing Ji-Sung Park and Rafael on Saturday was diabolical.
Despite all the negatives, I still think were going to beat City on Sunday. Funny old game isn’t it?
Advertisements
Rate this:
Share this:
Like this:
Related
About ryandunny
Hello hello ryandunny here! I am a young man from Ireland and after one boring day inside i decided to persue a small interest of mine...blogging. So I've decided to post my views to the world and to see how it goes I've also made a few soccer videos for YouTube and just type ryandunny into YouTube and you should find some of my videos!
If you want to get to know me better and ask me some question add my email/messanger ryandonovan16@hotmail.com |
The U.S. still believes that Iran is not on the verge of building a nuclear weapon, despite comments by Israel's defense minister that Washington has changed its assessment.
A National Security Council spokesman confirmed Friday the U.S. government continues to assess that Iran is not on the verge of achieving a nuclear weapon, and believes there is time to continue diplomatic efforts to dissuade it from doing so.
Israeli Defense Minister Ehud Barak told Israel Radio on Thursday that a new U.S. intelligence report brings Washington's assessment closer to the Israeli intelligence community's view that the Islamic Republic has made "significant" progress toward military nuclear capability.
Barak was commenting in response to a question about a report by the Israeli newspaper Haaretz earlier Thursday. The report said President Barak Obama had received a new National Intelligence Estimate report echoing the Israeli assessment of Iran's progress toward nuclear weapons capability.
Haaretz on Friday quoted an unnamed "senior Israeli official" as saying that due to the Iranian nuclear threat, the "sword at our throat is a lot sharper than the sword at our throat before the Six-Day War" in 1967, one of the four times Israel fought the armies of its Arab neighbors.
The Israeli newspaper Yedioth Ahronoth said Friday that Barak and Prime Minister Benjamin Netanyahu would like to attack Iran's nuclear sites before the U.S. election in November but that the top officials of Israel's military and intelligence agencies all oppose attacking Iran at this time.
The West suspects Iran wants to build nuclear weapons. Iranian officials have in the past threatened to wipe Israel off the face of the Earth. Israel has hinted at an attack if diplomatic efforts and sanctions fail to eliminate Iran's nuclear ambitions. |
Featured Links
In this Section
Current Students
While the resources linked to this page demonstrate the vibrant and wonderful community here at UST School of Law, they only tell part of the story. From our inception, motivated by our unique mission and vision, UST School of Law has focused on creating an experience that acknowledges the importance of each member of our community. Both our students and visitors to our community frequently comment on the amazing atmosphere we have built. Many of our current students comment that their experience here “just feels right.”
Building the type of community we want has been very intentional. Our staff is committed to assisting and supporting you on your journey to the legal profession. We offer significant resources in academic support that allow you to perform at your very best. Should you encounter personal difficulty during your time in law school, we have outstanding personal counseling services. Our Office of Career and Professional Development will help you identify your individual career calling and work with you to create and execute a plan to the jobs you desire.
Our student government has a strong collaborative relationship with our administration. Together, student government and the administration focus on making sure our law school is the best possible student experience it can be. We have nearly 50 student clubs and organizations ranging from affinity groups to student groups organized around shared career interests or shared personal interests. As you seek to balance your law school work load with personal health, there are several opportunities for intramural sports, and opportunities to use university health services.
While we have the staff and services to meet your needs, the most important aspect of our community is our warm and supportive student body. We believe that law is about relationships. It is a social profession. Our students begin modeling that behavior from day one of orientation and continue through graduation. The University of St. Thomas School of Law is a community that cares about who you are and how we can support getting you to where you want to be. We look forward to meeting each of you during your time in law school, and to working with you to ensure you have a fantastic experience here. |
Sadomasochistic Representations in a Rage Murderer: An Integrative Clinical and Forensic Investigation.
This study used the Adult Attachment Interview (AAI), and the Rorschach Inkblot Method (RIM; Rorschach, 1921/1942) to investigate the personality structure and internal dynamics of a rage murderer. Contrasting AAI and Rorschach findings, interpreted within an attachment-oriented framework, suggested the presence of a borderline spectrum, dual personality organization, characterized by a split between a more benign, overcontrolled upfront, and a self, fused by sexualized urges and sadistic rage. I present inferences regarding the murder and discuss issues related to future violence risk and treatment. |
Acute hepatitis C: high rate of both spontaneous and treatment-induced viral clearance.
Acute hepatitis C virus infection accounts for approximately 20% of cases of acute hepatitis today. The aim of this study was to define the natural course of the disease and to contribute to the development of treatment strategies for acute hepatitis C virus. The diagnosis of acute hepatitis C virus in 60 patients was based on seroconversion to anti-hepatitis C virus antibodies or clinical and biochemical criteria and on the presence of hepatitis C virus RNA in the first serum sample. Fifty-one of 60 (85%) patients presented with symptomatic acute hepatitis C virus. In the natural (untreated) course of acute symptomatic hepatitis C (n = 46), spontaneous clearance was observed in 24 patients (52%), usually within 12 weeks after the onset of symptoms, whereas all asymptomatic patients (n = 9) developed chronic hepatitis C. The start of antiviral therapy (interferon-alpha with or without ribavirin) beyond 3 months after the onset of acute hepatitis induced sustained viral clearance in 80% of treated patients. The management of acute hepatitis C has to take into account the high rate of spontaneous viral clearance within 12 weeks after the onset of symptomatic disease. Treatment of only those patients who remain hepatitis C virus RNA positive for more than 3 months after the onset of disease led to an overall viral clearance (self-limited and treatment induced) in 91% of patients, and unnecessary treatment was avoided in those with spontaneous viral clearance. Patients with asymptomatic acute hepatitis C virus infection are unlikely to clear the infection spontaneously and should be treated as early as possible. |
BATWOMAN #17 VAR ED
DC COMICS
MAY180483
(W) Marguerite Bennett (A) Fernando Blanco (CA) Michael Cho
SRP: $3.99
Kate Kane's latest assignment is leaving her cold-it's a cold case that forces her to team up with GCPD Detective Renee Montoya, and which, as usual, has Gotham City running out of time. Is this the start of a beautiful crime-fighting partnership? No spoilers, but expect sparks and punches to fly! |
"The thing is, Mrs. Uchiha, I am weird, I am really bizarre, like extinct species bizarre, it's crazy, but for some odd reason," She barked a laugh, "With some miracle, your son loves me, and I love him, too, I don't know what that changes for you, but that's the truth, and the only truth I know." AU MATURE CONTENT SASUSAKU RATED M
It's been seven years since the Akatsuki took over, but in the dark underbelly of Konoha's criminal underworld a silent war is still raging. As the heirs of the city's fallen leaders are picked off one by one in a bloody rebellion, Uchiha Sasuke returns with vengeance in his heart for the one who betrayed his family. SasuSaku, mobster!AU
Geishas are forbidden to love. Shinobis are obliged to hide their feelings. But when her emerald eyes meet his onyx gaze, they feel like they knew each other from a long time. Loving in times of war is always troublesome. [SasuSaku, AU, Era of the Warring Kingdoms]
She was a dove in chains. Hidden away in a tower and left to rot, without hope or dreams of salvation. She didn't mind however, because she'd rather be his prisoner than his loyal subject. SasuSaku, Dark.
"I need you to help me with something," Sasuke said calmly, staring Sakura straight in the eye. She smiled and held out her hand for him to take. She knew he wouldn't take it, but the gesture had to mean something to her former teammate. "Whatever it is, Sasuke, I'll help you." "I need you..." He turned his head away and folded his arms. "To help me rebuild the Uchiha clan."
Perfect. Inject him with serum number nine." The man with the black hair scratched his chin and looked at the male in the bed. "Study his reactions and report back to me with the results." "Yes sir." "And Kabuto, don't let him escape this time."
The war is over and Sasuke has paid for his sins, and travelled. Now, he is back and ready to complete a task for the previous Hokage. Sasuke will reveal the secrets of the sharingan, and allow a study to be done on his eyes. He has one condition - Sakura must be the medic that he works with. Unfortunately, they haven't spoken in almost 2 years.. (rewrite/almostcanon)
Sasu/Saku. From the beginning of their relationship, Sakura never failed to thank Sasuke for every little gesture that he made. It took a while for him to realize that the reason she did it was because, the moment she accepted to be his wife and give him all that she had left to give, she honestly never expected to receive anything in return.
Reduced manpower had crippled the hidden villages' operation after the war. It was the most auspicious time to marry and pop out ninja babies. Unfortunately for Sakura, Sasuke's engaged to Hyuuga Hinata. (Sasusaku Vignettes)
When first he laid eyes upon her, he thought her the very personification of spring. He watches, from the depths of shadow; waiting to steal her away from the land of the living. Waiting to make her Queen of the Dead. Hades/Persephone retold. SasuSaku.
— an anthology of 500-word drabbles, one for each of the months in which they, little by little, fall in love. o12/o12: some would call it destiny — and it is your choice if you believe it to be. sasusaku. au.
The war is over, and like Konoha, Team 7 has rebuilt itself from the ground up. Everything has changed, but Sasuke and Sakura remain much the same. Eleven years, she thinks, is a long time to be in love. SasuSaku.
AU. In holy matrimony, it is said that you will always speak the truth and confess to your spouse for support and earning trust from your soulmate. However, he had just never gotten around to tell her his real job. They always did say that keeping secrets for so long can bite you in the ass. SasuSaku.
She remembers how a year ago the streets were still safe. She didn't need to cover her face in fear of being recognized. He was an assassin and fallacy in her existence, and she loved it nonetheless. She, on the other hand, was more than met the eye. SasuSaku mobster!AU
Christmas Fic. AU. Sasu/Saku. Sakura had known she would have a horribly busy day from the moment she realized she couldn't find clean clothes to wear; she just never imagined it to be so full of... surprises.
They say 'man makes plans and God laughs'. If that's true then God must derive a vast deal of entertainment from Haruno Sakura. Either that, or maybe he just hated her, she wasn't sure yet. Rated for language, ecchi-ness and eventual romance.
"Honor to the soldier and sailor everywhere, who bravely bears his country's cause. Honor, also, to the citizen who cares for his brother in the field and serves, as he best can, the same cause." Because they've always been different and very much the same, and this is how they find their way back to each other. SasuSaku
/SasuSaku/ He had no right to show up at her door and wait for her the way that he did, with no apologies or explanations ready to spill from his lips. He had no right to act like he had never done anything wrong… like he hadn't burned her heart to ashes. In those three years he was gone, she had never forgiven him for doing this to her. Oneshot. Naruto: The Last!setting.
[AU] How do you ask if hand jobs are a normal part of the routine? Her first day at a new airline and already she's screwing up. Flight attendant, Miss Sakura Haruno. Reporting for duty. Or booty, I don't know. [One-Shot] [Lime] [SasuSaku]
In zombieland the only thing that matters is to be rational. When Sakura grows overly attached to a group of survivors she throws all of her little rules out the window. How will her throwing away everything she knew effect her chance of survival? And much more important. The groups survival. R&R, AU! SasuSaku! Angst, Tragedy, Mystery, Humor and drama also involved.
She's a doctor cherishing every bit of life. He's an assassin from a secretive elite organization. She knew nothing about his job until the one night things took a turn he hadn't expected... SASUSAKU... Rated M for safety... PLEASE R&R!
That girl she used to be shattered when he left. In its place is the promise to her village to kill him, the emotional scarring of a failed mission, and the determination to rely on no one but herself. All of that will be tested when Sasuke comes back, demanding her help.
/SasuSaku/ "No, you listen! We live in a real world, come back to it. You're hated by the village, untrusted and guarded. The council is still debating whether they should keep you, kill you or banish you. I'm one of the most trusted kunoichi of this village, a medic nin, and they would not stand the mere thought of me being with you. They will kill you if ever we do this, Sasuke."
Every time he wanted to apologize, she would reply, "We were too young, we were too selfish and you were too lost." It had taken two words to shatter their bond. But it took many more to heal it. SasuSaku
/SasuSaku/ She loved him best like this—when he made love to her in the morning. When they were only half awake, when he was at his most earnest, his most tender, his most vulnerable and in love. Oneshot.
After receiving information of the Mizukage's pregnancy issues, Tsunade decides to send her best disciple Sakura, together with her former team-mates Naruto and Sasuke, to help. The only problem is that the convent Mei Terumi is resting at is girls only. Time for Naruto's Sexy no Jutsu to become useful. SasuSaku / NaruHina
/SasuSaku/ Naruto's grin was far too sly to his liking. His eyes narrowed in warning, and after a moment of staring, he snapped, "What the hell are you looking at me like that for, dobe?" The blonde's grin widened, and he snickered. "Oh, you totally know why," he said, wiggling his eyebrows. ONESHOT.
/SasuSaku/ She almost found it ironic that Sasuke, who dedicated more than half of his life to avenge his family because he loved them so fiercely, would find himself having a lack of romantic attraction to anyone as soon as he would find peace. Or so she thought. ONESHOT.
1 day. 24 hours. 1,440 minutes. 86,400 seconds. Choose however you prefer to call it. Being able to appreciate what you have in each moment is what matters; because no day is the same as another. (A SasuSaku One-shot)
CH.5: SASUSAKU-Home. Sakura reflects on the aftermath of war with a midnight swim in the lake and is joined by the one person she had build walls to keep out. Will she be able to find the healing her heart sorely needs? - LEMONAID is now a collection of SasuSaku/ItaSaku anthology oneshots. -
When an old friend commits suicide during his stay at a psychiatric treatment facility, Sasuke infiltrates as a patient to find out what went wrong. But there are more secrets in the Restricted Ward than he's ready to hear. It's enough to drive you crazy. AU
What happens when a mysterious man saves Sakura from a horde of sex-crazed men in the darkness of night? What will her decision to follow this man lead to? She is in for the biggest adventure of her life, and it's not a good one. M for sex, violence, foul language and other mature subjects. First SasuSaku story!
HIATUS. She thought she had it all but Haruno Sakura was doomed from the start. She was like a moth to the flame, powerless to resist the pull of something, someone, greater than herself. And like a moth, she would be burned.
She was new in town and the moment she met him she knew she was in trouble. Everything about him screamed corruption and annoyance. The moment he met her, he spun her into his web and soon Sakura finds a world of lies, drama and love while on the run for her life. Mafia! SasuxSaku. AU Rated M!
A doctor in reality. A sexpert in virtual reality. Haruno Sakura posts her sexcapades and gives advice on sex on her online blog using the pseudonym Rosy. Meanwhile, after years of absence, an old, important childhood friend returns and brings along scarring memories. Alternate Universe. SasuSaku. WARNING: FREQUENT PROFANITY AND EXPLICIT CONTENT.
(AU Post-War) They don't immediately revert to their old ways because the old ways didn't work anyway. And learning and re-learning and un-learning things have always been the hardest part of the challenge.
/SasuSaku/ Sasuke's a famous writer who definitely loves anonymity; Sakura's the new kid who's absolutely obsessed with his works. What'll happen to Sasuke's life when he accidentally crosses paths with her? To Erin.
Clans throughout the shinobi nations are being slaughtered left and right. When Sasuke and his team go to put a stop to this mysterious murderer, they encounter the first survivor of the massacres, a mysterious pink haired girl with an unusual tattoo. Set in the Naruto world, but AUish. Sasusaku.
"Find me a girl who doesn't like me for my looks and then we'll talk." Sasuke Uchiha is about to realise that love waits for no man, and that it can, quite literally, bump into you when you least expect it. Sasusaku AU
Vampires and demons rule,while the humans are at the bottom.Sasuke,a stoic vampire prince meets Sakura,a kind hearted slave.He forms a bond to her that drives his senses wild with hunger and passion.Her beating heart keeps him alive;she's his life line.
After 5 years of taking the advance university course in America and becoming a successful doctor, Sakura is forced to go to an old high school reunion. Running from one flame to another, she tries everything she can to avoid falling in love with Sasuke again. Things get heated when her ex shows up and decides to rattle everyones' cage. Main pairing: SasuSaku
When Team Seven finally stops somewhere with a washer and dryer, Sakura decides she's going to wash everything she has with her—including the clothes on her back. She soon finds out that Sasuke had the same plan. Post-canon SasuSaku. One-shot.
AU. Sasu/Saku. She — an innocent girl, ready to do anything in order to achieve her dreams. He — a very important drug trafficker, ready to do anything in order to keep his business working. They fall in love. If only it were that easy.
It was the same thing every night for the past two weeks. Every night, Sakura would have the same dream that never failed to make her blood run cold or have her wake up screaming, but it also made her feel alive and even happy! What did it mean? Was it a dream, or was it a nightmare?
Team Seven plays cards for shots. The game changes when Naruto passes out and Sakura suggests upping the ante. Written for the SasuSaku Headcanons prompt "The Mystery: Does Sasuke wear boxers, briefs, or a fundoshi?" Post-canon SasuSaku. One-shot.
"What is it that you are looking for?" his smile widened. He didn't expect less from Sakura. Sasuke could see her flaring anger, the way her eyes turned a dark shade of green. "I'm here to take back what belongs to Me." initiated Sasuke. "There is nothing here that belongs to you!" spit back Sakura, she stood from her desk and slammed her hands on the desk. " Mr. Whoeveryouare!"
After an accident,Sakura is forced to become the assistant of famous international model,Sasuke Uchiha.He's the rich handsome Adonis,she's the smart middle class girl next door.He makes fun of her,she insults his ego.Looks like Sasuke's met his match!
"Nightmares." She rolled her eyes, thinking of how stupid that sounded. "I know." He looked at her. Sakura's mouth gaped a little. She turned to look at him while clutching the sheet a little tighter. "Y-you know?" She whispered.
It's simply Uchiha DNA and Haruno Sakura just can't get enough of it. When Team Seven is sent on a simple retrieval mission to the Land of Lightning, no one expected their innocent Cherry Blossom to act like this but...then again...they had never seen her on a seduction mission. Not until now they hadn't. SasuSaku One-shot. Lemon!
Sakura is the daughter of a wealthy doctor, Sasuke is the son of the owner of a big time company. Their parents agree to an arranged marriage. What happens when they meet for the first time at a rave trying to forget about their parents controlling them? Rated M for language and lemon. I DON'T OWN NARUTO! I'm just using my guttered mind to write fan fiction. Complete! SasuSaku R&R!
A mission gone wrong brings her into the hands of her worst nightmare. A mission gone wrong brings her into the hands of someone who wants her with a burning passion. With chaos and entropy rampaging unchecked their fates become intertwined as love and hate spiral out of control. SasuSaku, lemons, violence, swearing, character death! Rated M!
Sakura is delivering medical supplies and comes across a sick Sasuke. This is a moment in time just before Itachi's death and the curse of hatred, and also looks at Sasuke's inner feelings. Weaves into the main story, no events have been compromised. M for mature thought patterns. Reviews appreciated! Written in response to a fic request. ONE SHOT
A repost of a story I wrote a long time ago. "Married …The word feels like bile on my tongue when I say it, and gave and gives me a headache when I think it … Sasuke and I … a married couple." Marriage with Sasuke is not as Sakura imagined. Rated M for dark themes. SasuSaku
Naruto is sick of watching his teammates remain oblivious to their aggressive love. What's Naruto to do in this situation? Why become their matchmaker of course! SasuSaku, comedy and romance! Rated M for Swearing, Lemons and some violence!
There they stand, faces an inch or so apart. The Sharingan is swirling dangerously as emerald orbs glare back unfalteringly. Sasuke's hand is wrapped familiarly around Sakura's throat. Her hand is pressing strongly against his alabaster skin, her chakra scalpel scraping against his jugular as he squeezes his hand. "Are you going to kill me Sa-ku-ra." He taunts menacingly.-WAR TIME
SASUSAKU request. Sakura is on a solo mission and during her trip she has to rest in an abandoned village overnight. There she confronts a demon-like creature. Note*: This fic can also be found on my personal Tumblr Blog (sakura-shinigami) as well as my DeviantART account (kuroshitsuji1)
When she slips out of a bed, Sasuke doesn't look at her. His back is facing her, his face turned to the wall, eyes tightly closed. The smell of watermelons lingers some more, before it too, fades away.
"It's simple. Catch me and I'll reward you." Sasuke shifted his head so he was whispering in her sensitive ear, the vauge movement causing icy shivers to travel up her spine. "But if I catch you... you'll be begging that I didn't." "So Sakura, catch me if you can." Lemon chapter 10
Collection of SasuSaku Month stories for 2012. July 18: Sasuke's sleep is disturbed by an unexpected visitor. Post-canon. July 19: A messenger-nin gets a mission that could make or break his career, or so he thinks. Post-canon. DOUBLE UPDATE!
Do you know the story of Andromeda? Her father was King Cepheus, whose country was being ravaged by storms. In the end, he decided the only way to appease the gods was to sacrifice his daughter to a hideous sea monster. So they chained her, naked, to a rock but the sea monster didn't get her. Just when it seemed he was the only solution to her fathers problems, she rescued.
Christmas Fic. Sasu/Saku. One way or another, Sasuke has always managed to avoid being brought back to Konoha. But what happens when Sakura realizes that, just like any other man, he has a certain weakness?
Sakura's working in a night club called "Sharingan" in order to pay for college tuition, but her *bump* into Sasuke in the hall of her first day of work will forever alter what's in store for her. lemons/smut. R&R! SasuSaku
/SasuSaku/ He was at a loss, and wondered if he could last alone until tomorrow. He wondered how in the world Sakura could ever leave him alone like this, two young kids and no one guaranteed to help him. Oneshot.
They had been ambushed more than once on this damned mission, so when Sakura finds herself alone with Sasuke, the last thing she expects is for him to ambush her with his kisses and his naughty, wandering hands. SasuSaku. Post-War.
It was just supposed to be a one-night stand but who knew it would only take them seven days to become engaged. "You need a woman in your life Sasuke." "I do have one." Sakura's face was marred with shock, "You do? who is it?" he returned her gaze, "You."
AU. Sasu/Saku. When her father told her she would have to marry a guy she knew nothing about, just because that was the best for their family, she knew she couldn't say no, just like she knew she wouldn't be happy. She just never imagined it to be that bad.
SasuSaku smut, lemons, and anything else you can think of like that. Kiba's dare to Sasuke to 'do it' with Sakura turns into something of a wild adventure full of tears, love, laughs, and life. WARNING: EXTREME ADULT CONTENT! SasuSaku
He watched her every move, her every shiver, her every breath. No matter where she turned, he was there, claiming her, dominating her, possessing her. Now if he could only get her to talk about her troubled past and why she shuts everyone out from her world. School Fic! AU! SasuSaku! Rated M for mature content!
SasuSaku. One-shot. She says she'll marry him, when he asks her. "I won't bother you like I did when we were genin," she jokes, smiling. "Unless you wish otherwise, it'll be like I'm not even there." And when she tells him not to worry, it's the very thing he does.
When Sakura said he'd need to make a few changes in his life for health reasons, Sasuke was less than enthusiastic. But with Sakura lending a hand, change might not be so bad. Post-canon SasuSaku. One-shot.
Sasuke Uchiha is a twenty four year old ANBU who wants to do something fun for his birthday with his wife, it's been a while, yet she refuses and says she doesn't feel well, she continues to hide a secret and he will get to the bottom of it. Summary sucks, story is better. For Sasuke's birthday! R&R please!
"I'm not having sex with you." she whispered. Sasuke pulled her against him. He bent down, his breath coming out in puffs over her ear. "Why not?...No one can pleasure you like I can." One shot. Sasusaku.
It's Halloween in Konoha and Sasuke challenges Sakura to a game. Sakura and Sasuke finally get the treat they've been waiting for all these years after. SasuSaku! One-shot! Rated M for swearing, and a lemon!
Sakura dies in a car accident and Sasuke is left dealing with her death in a unique, probably very unhealthy way. Sasusaku. AU. Kind of a sequel to Muse but you can still understand this story if you haven't read that story.
Sasuke is a writer with terrible case of writer's block. He turns to drugs to lighten up his dull world but when he meets a certain pink-haired intern, he has just the shock of inspiration he needs. M for language and lemons. AU.
Sakura and Sasuke are in love-it's just that they don't know it. "There is enough lust in here to cut with a knife. Why can't they admit they love each other already and skip to the naughty part?" SasuSaku OneShot PREVIOUSLY TITLED LUST.
Sakura finds an old necklace and wishes for a certain guy to love her in return. Read to find out how far her wish gets out of control when the rookie 12 boys can't stop fighting over her! "I swear! Nothing ever goes right! I just wanted Sasuke dammit!" SasuSaku, One shot, rated M for swearing, a bit of fighting, Sasuke's possessiveness and a lemon!
Sasuke made Sakura a deal she simply couldn't refuse. In exchange he could promise her the safety of the Hidden Leaf but what would she have to give up in return? Is she willing to go as far as to help him complete the last of his goals?
The very same night Sasuke had left her on a bench, her whole life was thrown upside down. "My leaving hurt you", he scoffed and she shook her head with a sigh, "You'll never learn, it was nothing about you. Shut up and let me tell my story". SasuSaku
03: "So where were we Sakura?" He asked her playfully, his lips grazing on her neck ready to nip her smooth skin. He was answered by a wail from the girl that helplessly pushed him away while turning into a shade of his favorite food... /NekoProblemLime/
Setting out on one of the most difficult missions of his life, Sasuke knew he'd need some highly skilled teammates. When the Hokage appointed Sakura and Karin to assist him, he had to wonder what she was thinking. Post-canon SasuSaku. One-sided SasuKarin.
Sakura has been alone for six long months. With only the Dead for company, how was she to know that salvation was only at the other end the gun pointed directly at her head. Have fun, and Welcome the Hell SasuSaku
SasuSaku. An ancient law in Konoha permits people from prominent clans to buy people who aren't from clans at all. Unfortunately, Sakura just refused to believe it until her mentor confirmed that, yes, she was now owned by Uchiha Sasuke.
When the woman he loves is about to leave on a life-changing mission, will Sasuke be able to stop her? Do true feelings matter to a shinobi? A gift fic for Kaze and Kiba. Post-canon SasuSaku. One-shot.
Sasu/Saku. Sasuke had never taken Sakura for granted. No, there was more to his reasoning than that. He had never wanted her next to him, true. But that was because he was afraid—afraid to lose her. Afraid to live through his worst nightmare all over again.
Sakura finds Sasuke again in Wind Country five years after the war, when he is supposed to be dead and she is supposed to be beyond caring. Neither have been very good at meeting expectations. — SasuSaku
When Sakura decided to go all out on the term liberation, things really heated up. In reality, she was just out of clean underwear. SasuSaku. Co-authored by cutecrazyice, xfucktheglasses, and Unicorn Paige.
It was on her seventeenth birthday when Sakura finally decided to move on from her so-called everlasting love with the one and only remaining Uchiha of Konoha. And then, on her eighteenth, Sasuke decided he wanted her back. SasuSaku
Years after his return to Konoha, it seems all Sasuke's friends are getting married. When he makes the mistake of complaining about the ANBU guards that must accompany him to every wedding, Sasuke gets saddled with something far scarier: Sakura.
Sasuke groans and start moving. Sakura could do nothing but comply, her own lust taking over. He is holding her waist as Sakura bounces up and down on Sasuke. Sasuke feels a heightened pleasure at the fact that their coupling is hidden behind her skirt.
Sakura has been asked by Kakashi for a certain favor, one involving her old classmate Sasuke Uchiha. She of course refuses but friends can be annoyingly persistent when they want to be. Honestly hasn't anyone heard of minding their own business?
"Don't you want to find out if the Uchiha brothers are well endowed?""I lost interest after Itachi.""The Sakura I know would jump at the chance to explore Sasuke's genes in a heart beat""Urgh, now I have a picture of Uchiha Sasuke naked in my head!"
"Increases the production of milk within the breasts' glands with…what?" Naruto hissed, silently scanning the rest of the description on the bottle.He released the Uchiha, allowing him to snatch the offending object out of the shocked mans grasp. "Idiot"
"He's one of our most wanted criminals, reserved for high class officers to arrest. Haruno is merely middle class. Just the fact that Sasuke Uchiha is requesting her to take on his arrest does not entitle that we should heed to his wants."
But it was that smirk that made me realize that it was definitely the same Sasuke regardless of his godlike body. He was still his ignorant, cocky, completely amazing self... the only thing that had changed was the fact that he chose to sit beside me. AU
"You smell delicious…" He said. His voice was too much. I had to see who it was. I turned and saw his eyes, crimson red with three spinning tomoes. It was all I could see now. Sasusaku 3-shot! CH 3 LEMON! READ AND REVIEW! 1st FANFIC! Give it a chance!
Years after his desertion, Haruno Sakura realizes that she and Uchiha Sasuke never did have an ending. But on a stormy, rainy night, as she hangs on the verge of death, she realizes that they never had a beginning either.
When Sasuke barrows Itachi's phone to sex Sakura things get out of hand. What he doesn't know is that Naruto also asked Sakura if he could barrow her phone to sext Hinata. Two phones, two boys and one cruel turn of fate. R&R
/SasuSaku/ Over the years that Sasuke has been gone, Sakura has developed a weak heart. Her life's flashing before her eyes, but she wants to spend one more winter with the man she loves before she leaves. Character death. Oneshot.
It was an innocent swim. She didn't expect it to lead to that. Sasuke crept closer to the lake, anticipating an enemy. Instead, it was Sakura-naked in the moonlight. An ordinary escort mission couldn't have gone more right. Co-authored by Kaze and Kiba. Post-canon SasuSaku. One-shot.
Under pressure from his advisors, Otokage Uchiha Sasuke must find a matriarch to carry on his bloodline. When Team Hawk returns with a flawless beauty, he can't believe their choice for him is a woman he hasn't seen in almost eight years...SasuSaku.
Summary: "Sasuke-kun, where are you taking me?" He smirked, pure devious intent. "To a drive in my car." "Oooohhh…" A moan was heard in the distance. "Mmmmm…" Naruto turned to his companion. "Hey… Kiba… Did you hear that…?" ONESHOT. SMUT. SASUSAKU
Naively manipulated into believing his death may be imminent, Naruto starts to enforce his will while he's still alive… much to Sasuke and Sakura's dismay. Slightly AU since Sasuke has returned. Rated for language and lemon SasuSaku
Haruno is a maid in Uchiha's household. Who's madly in love with Uchiha Sasuke. But not only does she wears glasses, is shy, short and ugly, Uchiha comes home with another woman. Is 'I love you... Sakura' the last words of this story? Or the beginning?
She's his prisoner. He'll do whatever he wants with her, then everyone knows he'll throw her away like an old raggedy Ann. Except that she's his china doll. He loves her more than she'll ever get to know. She's his forever. She's his everything. For Rain!
Everything was going just fine, his hand was on her breast, her lips on his, the passion lingering in the air... until a certain dobe had to shout out, "Teme! Get your filthy hand away from my sister's chest!"
He had never been appealed to torturing Women, he was an Uchiha and a proud one too. But when the aforementioned torture includes a moaning Sakura with her mouth closing and opening in pleasure, he just could not resist.
As he tied the laces, he wondered what she was doing. And finally, when he saw her again, the buzzing stopped and he knew that he belonged no where else but beside her, and that's when she decided to speak her mind, "Oooh, Sasuke-kun you bad boy! I like".
"How do I treat hypothermia?" Sasuke asked, hands on his hips. Sakura was glad she didn't giggle out loud at the fact Uchiha Sasuke had to play nurse. Slightly AU, SasuSaku, Lemon. Bonus Chapter added!
R&R "Someone is going to lay down on the floor and close their eyes. I'm going to place two pieces of popcorn somewhere on their body. But before I put the pieces on them, I'll blind fold one of you and then you'll have to find the popcorn."
He visits her everyday, watching her spend the rest of her life in a hospital bed. And he goes home everyday, snorting cocaine with a new woman with green eyes and a pink wig whose name in this game is Sakura. SasuSaku
R&R "Patrick did it to SpongeBob!" "That was because SpongeBob was flexible! Little teme three isn't flexible yet! You have to wait until he's older!" Naruto scolded, glaring at the little onyx orbed boy who only glared back.
R&R "Don't leave me." He whispered. For once letting her in. Telling her what he wanted. What he needed. And she smiled as she nodded her head. Knowing. Obliging. "I won't let go. This I swear." Sakura murmured, closing her eyes.
She told him to find a new habit to de-stress himself and he did, he would kiss her when he found himself frustrated or in a pickle but as days went by, she started noticing those moments became suddenly too frequent... "Sasuke-kun!"
Takes place after the war on Konoha. Sakura is assigned a mission to assassinate Kabuto and retrieve Sasuke. However, things take a downturn and he winds up taking her to Kirigakure to revive the Uchiha clan. SasuSaku. Lemons later. R&R
"We belong together. I will find you. Even if I have to force you to fall back in love with me." What do you do when you no longer feel safe in your house, and with every step you take, you feel a burning stare? "I can't give him what he wants"
I've learned one thing:one drunken night can get you in a shitload of trouble. 'Oh, and servant girl, a glass of water will do when we get home.' 'I don't think we should exchange nicknames' Honestly...sasuksaku AU rated M now for angelatmidnight! REVIEW
"The heart dies a slow death, shedding each hope like leaves... Until one day there are none. No hopes. Nothing remains." - SasuSaku. Things are happening in Sakura's life, how will she deal with it? Sakura centric.
What the hell? Was it me... or was Sasuke-kun wearing pink panties? I'll go ask him, "Sasuke, you're wearing PINK PANTIES." "Shut up. It was a dare." Now wait a minute, those look like.. "THOSE ARE MINE YOU JERK!" "Yeah Sakura."
All I knew is that he could do what only a few other could and come out succesful. He could Sing, he was hot, he could play the guitar, he was hot and he could cook? Oh did I mention he was hot? yeah, he's my boyfriend
Shocking news and moving plans always deserve good celebration right? "Sasuke-kun, grab a condom quick!" -sigh- "Sakura, I-" "No no no, I love dearly and all, but I don't want to live my life as an episode of '16 and pregnant!"
Sakura is the hot girl of the school and Sasuke...the nerd that wears glasses and that everyone makes fun of? What happens when she comes to school early and discovers that the know-it-all is...hot! Well, make the stotic guy like her! Lemons. -Requested-
The first time is always the worst... always the most unbearable... not for Sakura Haruno's case. When a relic from her past suddenly appears with one sole intention...RAPE! What will she do to stop him! Please R&R!
She was ordered to be captured for a reason. She meets him again and things took a turn no one ever expected. The only way for them to get through things is to do it together...sasusaku...lemons in some chap. R&R.
Tenshi: a brothel that kidnaps girls and forces them into prostitution. Sakura's mission: rescue the girls and shut down Tenshi. But what happens when she comes across the one person she never expected to see again? SasuSaku
SasuSaku Smut-fic! Sasuke takes Sakura to the cinema to see the movie based on her favorite book. But why does he have sex in mind as he does it? And what's a certain sensei's addiction got to do with it? R&R
AU If he could learn to love another, and earn her love in return, then the curse would be lifted. If not, he would be doomed to remain a demon for all time. As the years passed, he lost all hope. For who could ever learn to love a Beast? SasuSaku
R&R "Yes you can. I can't hold you anymore Sasuke, but she can. I can't cuddle you when you have a bad dream anymore, but she can. She will love you to death and give you everything she has. And I know, over time, you'll be able to do the same."
Sasuke Uchiha has yet to return to Konoha after Madara has been defeated and his time is running out. Sakura does all that she can for him, but fears that everything she has may not be enough. A story dealing with Sasuke's return. SasuSaku.
She was weak for him; he knew it. He would exploit her weakness and use it for all its worth. But what about her? What about the consequences? Sasuke forgot just how strong she truly was. SasuSaku, language, minor lemon, blood/violence, etc
On their anniversary, Sakura learns that Sasuke was cheating on her. The next day she is found dead. How does Sasuke react to the loss of loved one and how does he deal with the tragic surprise that may send him over the edge?
“Let me give you some advice, when you encounter a one night stand—it’s a sign that it’s going to be more than just a one night stand,” his words sounded wise until he continued talking. “But then again, it could mean absolutely nothing too!" //SasuSaku//
Only a few people know that Sakura has leukemia, so what happens when Sasuke wants to know why she's always bleeding and/or bruised? Meanwhile, everyone who knows tries to keep this a secret from him, until Sakura tells them it's the right time. Sasusaku
COMPLETE! He told her in the most straight-forward way possible that he didn't love her. So why did she sleep with him? "Yes, Sakura. I lied." ONESHOT! SasuSaku. Warnings: A small slice of lemon, potential bashing of Sasuke and Sakura's moral values.
Sasuke you have to tell somebody about this!" Sakura exclaimed. "I can't, and you can't either, promise me you won't tell." Sakura looked into his eyes and nodded. She regretted that promise; when Sasuke ran off, she fell to her knees crying.
In the world of the rich... everyone has a dark secret. There's the mob, murders, sluts and guns... and then there's her, she wasn't what he expected to encounter. Be warned now there is slight Sas/Kar in this... but it won't last XP
15 years has passed since he left Konoha. While in a village market he finds himself in a small shop were an old woman gives him a special stone that is meant to give someone a view at a life they could have had.....SasukeXSaukra......Lemons....
Naruto loses control.With no options left,Tsunade orders Sakura to help recede the Kyuubi. The effect leaves her comatose for a year. When she awakes she must deal with the changes that have occurred – starting with the return of a specific Uchiha.SasuSak
/SasuSaku/ He would have wanted to kill them. He would have wanted to kill her. But the memories that reflected in his mind made the task impossible. And now he was finding himself helping the people he was intending to kill in the first place.
I'm yours Sasukekun. It was a phrase she repeated to him every night they spent together. It was the only way he'd complete the intimate act, the only way she could be connected to him again. SasuSaku A different kind of love story...
Uchiha Sasuke, professional assassin, known to kill victims in the blink of an eye without a trace of emotion. And he's never failed his reputation. But what if the target he's supposed to kill, is the woman he's fallen in love with? SasuSaku NaruHina
This is Drink 1 of my Lemon Squeezed collection, this chapter is a SasuSaku lemon, it is about how Sasuke is trying to distract Sakura from writing her new story, will it work? DONT READ IF YOU DONT LIKE LEMONS
/SasuSaku/ "I don't care if I throw my life away. If that's what it takes to make your life a little happier, and that this is exactly what you need to fulfill your dreams... then I don't care. Anything and everything for you, Sasuke-kun."
Sasuke and Sakura, stuck in a building during Earth Hour. Will they be able to resolve their problems and will those emotional tension turn into something good? AU SasuSaku collegefic. Rating might change to M soon
He recognized the symbol in the middle of the bracelet- it was an uchiwa fan, that was for sure. But what un-settled him was the symbol surrounding it. Another clan symbol. The Haruno circle. SasuSaku.
Complete. AU from 309 onwards. Following a botched mission, Sakura is made a slave by Sound, a position that could very well alter the future…especially concerning a certain familiar missing-nin. SasuSaku.
Sakura was only 5 when her parents were slaughtered before her very eyes by vampires.It was then that she was brought to the Organization,a secret society of vampire slayers.Now 17 and a full member she is paired up with the best and possibly worst partne
Sakura is eighteen and much stronger. After rouge ninja invaded Konoha, her parents were brutally murdered and she vowed revenge. She hasnt seen old friends in three years, so when they return, old passions will sure to be rekindled.
When Naruto and Sasuke were found near death, Sakura healed them, and put her in a whole new light before Sasuke. Considering his options, this new pathway could be the best thing he'd ever wanted. Lemon one-shot. SasuSaku *is bad at summaries*
I was nineteen. I had just passed my Jounin exam. And then I met him..."You conceited, stuckup, selfish, pathetic excuse of a man!" Unfortunately it took four years and a war for us to fall in love. SasuSaku. EDIT: First chapter now available in Vietnamese! Check out my profile for the link.
Tears seeped through tightly closed eyes, lining thick eyelashes and it all went unnoticed by the only man she could ever love, she really was a slave to him in every way. Inspired by Nightwish .:SasuSaku, NejiSaku, AU:.
SEQUEL TO: A Painful Secret. Sakura made a choice to move in with her art teacher, Hatake Kakashi, after he revealed that he knew her mother. However, her choice made a devasting impact on the boy she loves and his family. Will they ever forgive her?
SasuSaku - Sakura Haruno is an average high school senior at Konoha High, but this pink-haired teen has a secret that leaves her bruised every night. Can a mysterious new student pry that secret out of her and protect her from her pain?
/SasuSaku/ As her mask started to fall, Sasuke couldn't help but stare at the pink hair falling out of the hair tie and the mask's grasp. He caught a glimpse of those pained emerald eyes, and his eyes became wide with shock, his heart skipping a beat. He couldn't bring himself to believe it.
Based off the song 'Competition' by Dragonette. It started as a girls' night out. Then Sasuke and that girl come in. As Sakura shows that girl she is a nuisance to Sasuke and her, he loves Sakura and that Sakura was Sasuke's 'mistress' all long. SasuSaku.
Sakura didn’t feel too comfortable inside that smelly, narrow locker. It would have been different if she wouldn’t be stuck though. Of course that stupid locker wouldn’t open from the inside... Sakura's stuck inside Sasuke's locker! fluffy/humor
When he left Konoha, she was at his side. He, the master, her, his slightly reclusive mistress. Five years later, Sakura struggles to handle her two small boys and their father's ever growing lust. *Note* I've ran into a block in this story*
She simply stared, certain as his grip slacked that he’d quit this little tantrum and let go. But his hand only left her wrist in order to travel up and tangle itself in her hair, bringing her lips to his in a crushing kiss. One-shot; SasuSaku
SasuSaku. Every year Ino made a bet with Sakura that whoever had the better Valentine’s Day would be able to rub it in the other’s face. Every year Sakura had been the butt of all of Ino’s jokes. She knew this year was going to be different. Blaze's fic.
Sakura wakes up in a strange place to find out she's been kidnapped, and worse, she's been sold to some wealthy ninja. Soon she finds out the ninja is Orochimaru, and then she's only a birthday present for a certain young man. How will she ever get home?
Sequel to Last Day in the Office. Sakura has been keeping a special secret from her husband for his present. With all the passionate heat that's been going on between them, Sasuke doesn't suspect a thing...sasusaku...lemon.
“If I can’t have you,” he smiled raising his hands, making slow hand signs, “then the Uchiha can’t either,” he cackled as he took a breath and spit out flames around the kitchen, igniting the wooden walls. Read and Review!
Its been so long since i've touched you everywhere, since i kissed every inch of your skin. Stay with me tonight and remind me why i love you so much, let me feel your hands in my hair and the warmth of your mouth on mine. I want to feel you Sakura S.US.H
What happens if Sasuke wants Sakura after he has been away for 4 years? What if she's first not so happy about it? But Sasuke is having big plans! [Sasusaku] Read the AN pls, it's important! [new story] M rating starts in chapter 5. Until then it's T rate
semi-AU. What the hell are you waiting for, Uchiha? I failed my mission, and you rubbed that fact in my face already, so kill me now…! Won't that make you happy? Make you feel content, seeing my blood prettify that outfit of yours?
[SasuSaku, Oneshot, Complete] The actions are empty and void of any feeling, but to her, it’s almost enough, after all, right now, he is looking at her, only at her. Sakura is twentysix, and she is broken.
SasuSaku What happens when Sasuke is 'Simon' in a game of Simon Says with Sakura? Well, it's obvious Sakura would go through living hell, or will she? Rated M for Lemon and Language Summary Sux, Story is very good
I explain the title inside. Summary now...Sasuke is back for three years, but not talking to anyone. One night he has nightmares, and Sakura walks. She hears him, walks in and tries to comfort him...Rated M just to be safe. DEATH FICONESHOT. SasuSaku
His hips rolled against hers. Heat spread through her entire body as if he were fire itself. She could feel his hardened length against her stomach, the wetness between her legs burning......... SasuxSaku... lemon
Sakura's birthday is coming! Sasuke is planning to propose her! Unfortunately, the last heir of the Uchiha clan has a severe talking dyslexia! How's that birthday going to turn out? Rated for mentioning sexual situation [Oneshot] [SasuSaku]
She was always there. Whether in my presence or not. No matter what, she was always there somehow. I started to realize that because she was always there, I could never forget whom she is, no matter how much time passed. [SasuSaku]
Meet Uchiha Sasuke, the hottest playboy in Konoha High. Meet new student Haruno Sakura, a former playgirl who quickly regains her title. But, after an "accidental" encounter, will things start to heat up? SasuSaku.
He’s as cold and bitter as winter, she’s as warm and sweet as spring. Inevitably winter will always melt into spring, that's what she had always dreamed of. But...is that the case for Uchiha Sasuke and Haruno Sakura? -SasuSaku THREEshot-
He was a lady magnet and uses his looks to get info. She uses her body to attract her male targets. Now, a little bet brings them closer. Could these two learn how to love when they keep toying with feelings? AUOOC SasuSaku
AU SasuSaku Haruno Sakura, a daughter of the leader of Japan, is in danger. Her father hires a bodyguard, who is actually a part of the Yakuza who is after her. However, what can you do if you start falling for the target? Contains Lime or more...
SasuSaku . Sasuke is back in Konoha! Not to stay but to fight for Orochimaru, who has wiped Sasuke’s memory. What will happen when he comes across his wife, Sakura while in battle? Can she get him to remember his past? One Shot.
He realizes how fun and delicious restoring his clan is, that he forgets that he does this to restore his clan. They both know she wants him to forget, and he finds himself not regretting it. She was always annoying that way. SasuSaku.
A few years after the manga: Sasuke managed to kill his brother, but there is no feeling of relief. He uses Sakura to fill the emptiness within his heart in a way she did not expect. Rating just to be safe. Sasuke x Sakura FINISHED! |
Pet dogs have a habit of sitting by doors and windows waiting for absent owners to return. Most people would think nothing of this. But having studied the phenomenon, Rupert Sheldrake, scientist turned science outcast, is convinced there is only one explanation: dogs know when their owners are coming home, and they know because they are telepathic.
Telepathy has been Sheldrake’s big idea for two decades. He believes that dogs, birds, humans, even termites carry invisible “morphic” fields through which their ancestors pass on habits, customs, even IQ points, down the generations. Dogs that Know when their Owners are Coming Home is his latest book on the subject. Here, Sheldrake claims to provide further evidence for animal telepathy from interviews with hundreds of pet owners and animal trainers, and from his own experiments with a 10-year-old terrier called Jaytee.
Nobody has replicated Sheldrake’s findings. And most scientists view morphic fields as at best a bit of imaginative fun rather than serious science. But Sheldrake has clearly struck a chord with the public. His books sell; teachers invite him into schools where he shows children how to carry out their own DIY telepathy experiments. Even New Scientist has run one. And the more critics attack Sheldrake, the more his popularity seems to grow.
So what are we to make of this former Cambridge don? A refreshing force for democracy in science, who exposes its institutions as clubs for the narrow-minded? Or a well-intentioned pseudoscientist, who legitimises beliefs in the paranormal? To look for clues, New Scientist visited Sheldrake at his home in north London’s leafy Hampstead.
Why do so many people think their cats and dogs can read their minds?
More than half the dog owners we surveyed think their dogs can read their minds or pick up their thoughts, and over a third of the cat owners. I think so many people claim their animals can read their minds because sometimes their pets do read their minds, they are picking up their intentions. The most dramatic examples are to do with dogs knowing when their owners are returning home. When an owner is 20 miles away an animal can’t be reading subtle cues in their owner’s behaviour, or body language. And in our experiments (see “Smart pet”) we’ve eliminated all the other normal things that the dogs might be responding to, such as routine, familiar car sounds, people at home knowing when their owners will return.
How can you tell whether a dog knows that their owner is coming home? I can hear scientists questioning whether you could quantify this.
You can quantify it. What we do is videotape the door or window where the dog usually waits and then we simply quantify the amount of time it sits there. I get all the tapes analysed by somebody who doesn’t know the details of the experiment. Sometimes the dog will go to a window for other reasons, like barking at passing dogs or cats, or sometimes they just sit there because it’s sunny. In fact, the results are highly significant even if you include the visits to sit in the sunshine, and even more significant if you eliminate these visits.
In your new book, you suggest pets could be used to predict earthquakes. Is there any evidence for this?
Animals sometimes display unusual behaviour before earthquakes. These premonitions are non-telepathic phenomena and could be explained in terms of electrical changes or minor tremors the animals pick up. In the 1970s, China trained its citizens to look out for such behaviour in animals and to report them to the authorities. In my book, I quote the case of the Haicheng earthquake, which took place on 4 February 1975 in the evening. Throughout January, more than 20 species of animal such as cattle, dogs and chickens, showed signs of fear. The authorities combined this with seismological records and decided to evacuate the city on the morning before the earthquake struck.
The Chinese haven’t been 100 per cent successful using animals. They’ve missed some earthquakes. But they continue to make successful predictions. People in the Western seismological community haven’t considered this evidence. They see earthquakes as an engineering problem, a physics problem, a geology problem, which animals have nothing to do with.
Could animals be used to predict earthquakes, say, in California?
Yes, by asking people to monitor animal behaviour. The Internet and modern telecommunications mean this is now feasible on a scale never before possible. You’d need to set up an easy to remember number, say, 1-800 petquake, for people to call if their animal behaved unusually. You could feed the information into a computerised map which would glow if there were lots of calls from a particular region. The system could involve millions of people. Unusual behaviour could be associated with impending thunderstorms, or firework displays. But if it was in a seismically prone area and there was no other reason for the surge, then it could be a sign of an impending earthquake. Quite apart from its utility, it would be a wonderful example of participatory science.
Is there any way of knowing whether changes in animal behaviour take place at other times, but may not be noticed?
It’s not an insuperable problem to deal with selective memory. That’s why we videotape the dogs who seem to know when their owners are coming home. We can see exactly what they do, when they do it. In the case of the 1-800 petquake idea, there would no doubt be a steady trickle of false alarms and probably some hoax calls as well and people would think their cat looked restless when it was just sick. But you would have a full record of all the calls that came in, you would also have a full record of earthquakes, so you could look at the data to see if you get a surge of calls in an area where an earthquake later strikes.
Which other animals have you observed?
We’ve done experiments with parakeets that know when their owners are coming home. Cats have proved rather more elusive because they don’t always wait in the same place. When it’s a fine day they’ll wait outside on the doorstep, if it’s a cold day they’ll wait inside on the boiler. I haven’t got sophisticated surveillance equipment, so cats are harder to work with.
How far down the evolutionary scale do you think telepathy goes? Can a goldfish be telepathic?
So far, all the impressive cases are with mammals and birds. I haven’t a shred of evidence that there are any abilities of this kind in fish. Termites, bees and wasps could also be telepathic. Some people who keep snakes and other reptiles-tortoises and terrapins-claim their animals seem to anticipate when they are going to be fed at non-routine times, but I haven’t got any clear evidence that there’s any telepathic involvement. I placed an appeal in a magazine called Reptilian International to contact snake owners to try to find more instances. If you ask that kind of question of dog or cat owners you get hundreds of answers, many cases. In the Reptilian appeal, there was a deafening silence
You claim telepathy is a consequence of morphic fields. What are these?
Morphic fields are a kind of bond within species. There are many kinds of bonds, such as those between a mother cat and her kitten. I have proposed that these bonds are real connections, which link individuals even when they are apart. Human social groups such as families inherit a collective memory through morphic fields. One example of this is the habits, beliefs and customs of ancestors, which influence the behaviour of present generations.
If telepathy exists, why are humans so bad at it?
Well, to me it’s an open question. All the surveys I’ve done show that, on the whole, women are better than men, and children are often better than adults. Modern, urban humans of the educated kind are obviously not very good. Educated people , if they believe in telepathy, feel they can’t admit it in public. People in traditional, non-Western societies are far better at these things, at least according to anecdotal accounts. Unfortunately there are very few traditional societies left.
What would it be about Western urban living that would dumb down our telepathic skills?
One reason is that telephones and televisions make telepathy less important. You’ve got simpler, more direct and more reliable technological means of achieving distant communication. In the modern world, the place to look for telepathy is in connection with telephone calls. Lots of people report the sensation of knowing when a friend or other person is about to call them. I don’t think this is merely a coincidence. And the latest thing is telepathic e-mails, where you become aware of someone’s intention to send you an e-mail. I am starting to get a lot of anecdotes from people about telepathic e-mails.
Your work is frequently criticised by other scientists. Why is this so?
The work I do excites very strong prejudices. In some cases it’s a knee-jerk thing where they haven’t actually read the paper. The criticisms I have had from some people are often extraordinarily ill-informed. There is a whole set of taboos about what you can and can’t do in science. There’s no doubt that things such as telepathy have been on the taboo list for a long time.
What is the harshest thing anyone has ever said about you?
In 1981, John Maddox, the editor of Nature, compared my book, A New Science of Life, unfavourably to Mein Kampf and said it was “the best candidate for burning there has been for many years”. He was trying to put what I was doing beyond the pale of science.
It is sometimes said that Maddox made you famous.
In retrospect, I think that he did me a good turn.
A lot of people make jokes about morphic resonance.
Yes, particularly in New Scientist.
How do you feel about that?
Making jokes doesn’t bother me particularly. The sceptical response of science is nothing new to me. What does bother me is the closed-mindedness on the part of people who trained that science is an open-minded inquiry. I started thinking about these ideas when I was a don at Cambridge. I tried to run them past my friends and colleagues and most of them were quite prepared to discuss them but in a completely jocular way. No one would take them seriously. So if I said, I’ve got to go and make a phone call, they’d say: “Why bother, use morphic resonance, ha, ha!”. |
“I HAVE A THING FOR DOCTORS. ESPECIALLY YOUR KIND.” Doesn’t take long for the reader to realize just how seriously messed-up the world created by TogaQ and Kichiku Neko (a.k.a. “Guilt/Pleasure”) is in their “mature content” yaoi manga In These Words (Digital Manga). Following a brief text piece describing a handsome young’s kidnapping and imprisonment at the hands of a sadistic stalker, we’re shown the first of several graphic scenes featuring a bound male being taunted and sexually mistreated by a mysterious figure. When our hero Asano Katsuya wakes from what we learn is but one of many recent nightmares, we don’t know if the sordid scene we’ve just witnessed is mere imagining, a premonition or a posttraumatic flashback.
Our bespectacled protagonist is a psychiatrist who recently helped the police capture a grisly sado-sexual serial killer with twelve known victims to his name. Now said killer, Shinohara Keiji, is only willing to talk to the man who profiled him, so Asano is sent to an isolated undercover holding facility that resembles the Bates Mansion to grill Shinohara. There, interviewer and subject engage in a back-and-forth with the killer growing more grotesquely flirtatious toward the shrink. Though all twelve of his victims were sadistically abused by their captor, none were sexually assaulted. Given the opportunity, Shinohara brazenly states, he would have his way with Asano, though.
As this disturbing relationship builds, In These Words regularly flashes to its captivity scenes which steadily grow more explicit. The focus remains primarily on our two-man cast, though two other male figures -- youngish cop Shibata and burly guard Iwamoto -- fulfill basic horror tale secondary roles. (If you guess one of ‘em won’t make it to the end of the first volume, then you know your serial killer horror.) The book’s heavily gray-scaled art (the credits don’t clarify which of our two collaborators actually did the illustrating) gives the whole tale a fifties noir flavor, while the attention to character nuance during the interrogation scenes is particularly strong. There are no cartoonish fillips in the main story, though the book amusingly appends a series of cutesy “chibi” gag strips to the book to keep things from ending on too solidly grim a note.
Still, the book definitely is not for younger readers or anyone who might be upset by panels depicting clear digital penetration. The first volume -- which features our hero holding onto a bleeding skull in an “Alas, poor Yorick” pose on its cover -- ends with the promise/threat that the dreadful scenes we’ve already glimpsed will be doubled down in later books. “Guilt/Pleasure” for those who consider Titus Andronicus the entertainment equal of Hamlet.
If this blog does not discuss a specific political issue or event, it is not because this writer finds said event politically inconvenient to acknowledge - it's simply because he's scatterbrained and irresponsible. |
Don't Pay the Hackers
Those who follow security news may have noticed a disturbing trend. Late last year, we learned that Uber paid attackers US$100,000 to keep under wraps their stealth of the personal information of 50 million Uber riders. More recently, we learned that Hancock Health paid approximately $55,000 in bitcoin to bring hospital systems back online.
While these headlines certainly are attention-grabbing, the payment of ransoms is potentially even more common than it might appear on the surface. We know, for example -- from watching the transactions occurring in the bitcoin wallet used as a payment repository for WannaCry -- that the attackers behind that event made about $140,000 in total from their attacks.
We've seen surveys, such as a
2016 survey from IBM that found that 70 percent of businesses impacted by ransomware paid the criminals.
We've seen articles in the trade press about organizations stockpiling cryptocurrency in the event of ransomware -- and, in some cases, explicit instructions from some in the security community about how to do so.
From this, a nascent trend is apparent: Organizations are paying attackers. They are paying them in high-dollar one-off transactions to keep quiet or recover from individual attacks -- and they are paying them in "low and slow" smaller amounts from multiple sources that add up in aggregate.
There are a few reasons why this is undesirable, both for the industry generally and for the organizations doing the paying. However, these downsides can be hard to see when the pressure is on to recover from a specific event.
It's human nature to want to pay and just have the problem go away (as someone might perceive it) -- but in this case, giving in to human nature may not be in the organization's long-term best interest.
With this in mind, it is important for practitioners to know the downsides to paying an attacker in this way, and what they can do now to steer the conversation the way they want it to go when faced with an actual attack scenario.
Why Not Just Pay It?
It is a natural reaction to be tempted to pay. It is, in fact, human nature. After all, consider that a ransomware event or breach can have dire ramifications in a few different ways (financial and otherwise).
For a hospital or health system, for example, accessing clinical applications can be a matter of literal life and death, as inability to access certain clinical systems or patient data can compromise patient care (and thereby potentially patient health and safety.)
Even when life or death isn't directly at stake, though, the idea that "if we just pay, the problem will just go away" can be compelling when weighed against months -- or in some cases, years -- of negative press coverage, heightened regulatory scrutiny, public breach disclosure, possible lawsuits, and dozens of other negative outcomes.
There are a few things you should consider, however, if you're thinking payment is the easy way out.
First, law enforcement agencies generally recommend against it. Their logic is sound, since there's no guarantee that the attacker will follow through, and you will set yourself up for future attacks. In other words, it's possible that after paying the attacker, you'll get nothing in return. Further, by paying the ransom, you'll make yourself known as a soft target -- one that is profitable to exploit -- so when the attackers go looking for a firm to target in their next campaign, chances are good you'll be at the top of the list.
Beyond these reasons, there are other potential long-term impacts associated with payment of a ransom or payment to hide attacker activity -- such as the potential negative marketing and bad press associated with the public learning about it.
Both Uber and Hancock (the examples cited above) have been covered in the press (in unflattering terms) based on such payments.
Likewise, there are many security-minded folks out there who likely will use public knowledge of payment to an attacker as part of their decision-making about the services they use (that is, they might look to your competitors if they feel you're not a responsible steward of their data). So, while it is human nature to find payment compelling (this is a main reason underlying attackers' methods), it is almost never the optimal path.
Closing the Door
Many practitioners will tell you to apply the "just say no" principle to the question of payment vs. nonpayment. This a bit shortsighted, however, and it doesn't account either for nuance or human nature.
Believe it or not, not paying -- or maybe better stated "closing the door on the possibility of payment" -- takes some planning.
For example, consider the hospital example cited earlier. If patients' lives are on the line because of inability to access a given system, is arguing that "nonpayment is the way to go" the responsible path? It isn't. Safety in that case (i.e., saving a life) trumps all else. In a situation like that, "just say no" is as ineffective as it is trite.
Instead, the most effective way to approach this is to do the planning, discussion and arguing now, so that you are prepared if an actual event should occur. The specifics of what you'll cover likely will vary from one organization to the next. At a minimum, though, they should cover two distinct areas.
First, you should prepare for the discussions about payment vs. non-payment. An effective way to defuse controversy in advance of an actual attack scenario is to conduct a table-top planning exercise that involves all the personnel (including management) that will participate during an actual event.
Invariably, in the course of tabletop planning or a dry run, someone will suggest payment; if they don't, deliberately introduce it. This lets you introduce the concept of payment vs. nonpayment, butt heads about it now (the discussion is often contentious), and come to a resolution about the response path prior to the actual event occurring.
Second, you should look for and plan around pressure points that might occur. For example, in the context of a hospital or health system, you might wish to bolster business continuity and resumption efforts now so that you won't be in the position where payment to an attacker is the only way to ensure patient safety. The point is, you'll want to think these areas through carefully now to head the issue off at the pass.
None of this is exactly rocket science. However, judging by the trends that we're seeing in the behavior of organizations paying attackers, these are useful questions and strategies for security pros to revisit with their teams and with their organizations.
Ed Moyle is Director of Thought Leadership and Research for
ISACA. His extensive background in computer security includes experience in forensics, application penetration testing, information security audit and secure solutions development. |
Bucs safety Andrew Adams said it was "very nerve-wracking" being without a team after the Giants cut him in September. "You know you're a good football player. Why are you watching games on Sunday and not playing? It's a little demoralizing..." |
RATIONALE: Antiviral drugs such as zidovudine and ganciclovir act against viruses and may be an effective treatment for HIV. Interleukin-2 may stimulate a person's white blood cells to kill lymphoma cells. Combining these treatments may be effective in treating AIDS-related primary central nervous system lymphoma.
PURPOSE: Phase II trial to study the effectiveness of combining zidovudine, ganciclovir, and interleukin-2 in treating patients who have AIDS-related primary central nervous system lymphoma.
Determine the safety and toxicity of zidovudine, interleukin-2, and ganciclovir in patients with AIDS related primary central nervous system lymphoma.
Determine the response rate and overall survival of these patients treated with this regimen.
OUTLINE: This is a multicenter study.
Induction therapy: Patients receive zidovudine (AZT) IV and ganciclovir IV over 1 hour every 12 hours on days 1-14. Patients also receive interleukin-2 (IL-2) IV every 12 hours on days 1-14 and a combination antiretroviral therapy consisting of nucleoside reverse transcriptase inhibitors (one of which must be AZT), nonnucleoside reverse transcriptase inhibitors, and protease inhibitors. AZT and ganciclovir treatment continues for an additional 7 days if partial response is achieved.
Maintenance therapy: Patients receive IL-2 subcutaneously 3 times a week for 6 months. Patients also receive oral ganciclovir 3 times a day and combination antiretroviral therapy (AZT allowed, but not required). Treatment continues in the absence of disease progression or unacceptable toxicity.
Patients are followed monthly for 1 year, every 3 months for 2 years, and then every 6 months thereafter.
PROJECTED ACCRUAL: A total of 10-30 patients will be accrued for this study.
Eligibility
Ages Eligible for Study:
18 Years and older
Genders Eligible for Study:
Both
Accepts Healthy Volunteers:
No
Criteria
DISEASE CHARACTERISTICS:
HIV positive
Diagnosis of central nervous system lymphoma by one of the following means:
Brain biopsy
Thallium spectroscopy scan in conjunction with CT scan or MRI after failing to improve with at least 2 weeks of antitoxoplasmosis therapy
No major hepatic dysfunction as evidenced by encephalopathy, ascites, or varices
Renal:
Creatinine clearance at least 60 mL/min
Other:
No prior other malignancy within the past 5 years except carcinoma in situ of the cervix, basal cell carcinoma of the skin, or Kaposi's sarcoma not requiring systemic therapy
No active uncontrolled infection except HIV or Epstein Barr virus
No known allergy to E. coli derived products
Fertile patients must use effective contraception
PRIOR CONCURRENT THERAPY:
Biologic therapy:
Not specified
Chemotherapy:
Not specified
Endocrine therapy:
Concurrent corticosteroids allowed
Radiotherapy:
Not specified
Surgery:
Not specified
Contacts and Locations
Choosing to participate in a study is an important personal decision. Talk with your doctor and family members or friends about deciding to join a study.
To learn more about this study, you or your doctor may contact the study research staff using the Contacts provided below.
For general information, see Learn About Clinical Studies.
Please refer to this study by its ClinicalTrials.gov identifier: NCT00006264 |
Tag: millennials
I finally read Joel Stein’s Time magazine piece on the Millennial Generation, called “The Me Me Me Generation.” For the record, unlike some of my Millennial cohorts I hate “selfies” (the term and the thing it describes), I don’t feel entitled to a great job right out of school, and I don’t sleep next to my phone. But I don’t think the article deserved all of the antipathy it received from the blogosphere. I thought it was a fair if slightly fogeyish and surface-level assessment of overall generational characteristics. The problems my generation struggles with — like narcissism and a sense of entitlement — are so noticeable largely because of the times we live in, with everything more public and social technology more widespread. You don’t think the Baby Boomers would have peppered Instagram with pictures from Woodstock? or that Gen-Xers would have had entire Spotify playlists dedicated to their collection of sad and angsty ballads? The manifestations of narcissism by young people today merely belie the human condition that plagues all humankind: We’re selfish creatures, no matter how old we are or how many Twitter followers we have.
The combination of the influence of technology and how we collectively were reared — being told how special we were by over-protective helicopter parents — also contributes to how we are currently growing into adulthood. Generally speaking, we’re able to postpone full emergence into adulthood and still live with our parents because (a) we can and our parents don’t seem to mind (or at least don’t say so), and (b) because the economy sucks and has changed so much that traditional jobs and careers aren’t as feasible anymore. The Boomers were anxious to get out of the house and their parents were eager for them to leave, so naturally the way things are done now clashes with the way of the past. Welcome to The Present Reality.
Having said that, we can’t abdicate responsibility for making choices about our lives. We don’t have to live with our parents or check Facebook ten times a day or start a YouTube channel to get famous, but we do anyway (well, not me, but the collective We certainly do). And that doesn’t just go for Millennials: Facebook usage is declining among younger people because their parents (Boomers! shakes fist) have slowly taken over. Magazine columnists can try to pin the narcissism epidemic on young people all they want, but when I go to restaurants nowadays I see just as many if not more parents on their phones than younger people. We can’t simply blame the times and the technology for our behavior, because we’re human beings with the capacity to choose whether to succumb to societal forces or to instead carve our own path, peer pressure be damned.
I think we’ll be all right. Like generations before us, we have a great opportunity to make things better. That will involve some pushing back against the political and cultural acrimony that has characterized the Boomers’ ascendency and reign, but every generation has had to clean up the messes of its predecessors. We Millennials will inevitably make mistakes, and our kids will have been formed by them in some way, for better or for worse. Let’s just hope it’s for the better.
Previously published in the North Central Chronicle on April 23, 2010. The PDF version of this article as it originally appeared in the Chronicle is at the end of the story.
Antonia and Brian bought a wedding planning book for $14. But sometime later Antonia’s maid of honor bought them a $4 wedding planning book as a gift.
They returned the $14 book.
Such is the way of things when college students are trying to get married.
Once commonplace, young marriage has now become the exception to the rule of waiting to get married until after college, when couples can achieve financial stability and emotional maturity before diving into a lifetime commitment. Data from the 2000 U.S. Census shows that the average age at first marriage for American women was 26, up from 21.5 in 1970. The average for men also jumped: from 23.5 in 1970 to 27.8 in 2000. Yet many of these Millennials – young adults reared by overprotective Baby Boomer parents in an increasingly “me first” culture – are still choosing to buck the trend of postponing marriage until their late 20s and take the very unselfish step of getting married during their already stressful college years.
So what’s the motivation? Most young people today don’t expect to get married during college, so the desire to get hitched and to hell with the statistics goes beyond finances or merely settling down earlier than usual. According to four students from North Central College in Naperville, Ill. – all at different points of the engagement-wedding-marriage path – it’s about what feels right.
Brian, a junior engaged to Antonia (Tone), a senior, said he didn’t expect to get married until after college. “But then Tone happened,” he said.
The thought of getting married didn’t weird to him at all. “I just couldn’t imagine being with anyone else. Why wait until later when I could just do it now?”
Angie, a junior married for seven months, felt the same way when she got engaged during her freshman year. “Ryan and I knew we were going to get married,” she said, “but I always thought we would have a longer engagement. Even right when we got engaged, the initial date of the wedding was after I was graduated from college. That lasted about two weeks. We thought, logistically, why wait?”
Aileen, also a junior, expected to follow the common path toward marriage. “I thought I was going to be mid-to-late 20s, established with whatever I was doing. I never thought I was going to get married young.” But she found herself engaged at 18 to a man 12 years older than her. The age difference, though, was never an issue. “We just wanted to get married. It was a natural thing, no questioning it or anything.”
Marriage to these college students was not something they took on with the same assumptions and concerns their parents had before getting married a generation ago. They’re getting married because they want to – and because they can do it relatively easily with the safety net their parents provide. This doesn’t mean they think a lifelong marriage will be easy; it simply shows that true love and its aroma were too great for them to ignore.
“I think that for us you can’t take faith out of the equation because we knew that God wanted us to be together,” Antonia said. “Obviously we were a little apprehensive as to when, but after praying and being with each other, we know we want to do this after I graduate.”
Angie echoed the reliance on faith. “It definitely played a part in our relationship from the start,” she said. “I think because of the faith we share, as a couple we were years beyond most couples at our age. Maturity-wise I think we grew up a lot. It really grounded us in the things that really matter.”
But getting engaged, it seems, is the simplest part of the whole ordeal. The reaction from friends and family is where the sparks start to fly.
Angie’s parents had also married young, so the news to them was surprising but still exciting. They did, however, want to make sure she didn’t drop out of school. “That was a priority because they knew it was important to me and they didn’t want me to lose sight of that,” Angie said. The reaction from her classmates was considerably more mixed. Getting engaged as a freshman was unusual, making her nervous about what people would think. “Most people were nice about it,” she said. “But I did get some pretty rude responses. I had one student walk up to me and say, ‘So are you engaged?’ I said, yeah, I am. I was kind of nervous to tell him. But he was like, ‘Wow. Why? Are you serious? Why would you do that?’ And it just killed me.”
Aileen encountered similar apprehension. “My parents were a little apprehensive about it, only because I am young,” she said. “Other than that, the response was pretty nice. Everyone was excited.” Yet the age difference was always an issue, though not to her. “With the connection we had I never really though it necessary to care about that. My mom was OK with it because my grandparents were 11 years apart, so she was like, ‘Hell, what’s another two years? It really doesn’t matter.’”
Brian and Antonia received a lot of support, making them wonder about people’s true feelings about their engagement. “To be honest I wish we’d had more skepticism,” Brian said. “Everyone was just like, ‘Oh, awesome!’ and were super supportive. I would have appreciated more honesty because not everyone would have felt that way. I was shocked at how much support we got.”
Antonia said she’s gotten more pushback, almost a year after the engagement, from an unlikely source: her professors. “I’ve heard, ‘You’re going to be married forever. Do you know what you’re doing to yourself?’ And I’m like, ‘Yeah, I realize that. That’s why we’re getting married.’”
Those voices of doubt were not unreasonable. Statistics on the fate of young marriages tell a dreary tale: the New York Times reported on studies that show teenage marriages today are two to three times more likely to end in divorce than marriages between people 25 years of age and older. Another study from the Centers for Disease Control and Prevention found that 48 percent of those who marry before 18 are “likely to divorce within 10 years, compared with 24 percent of those who marry after age 25.”
Knowing the odds against young marriages turning out successfully yet still diving in anyway shows a confidence in the institution of marriage and in each other these young betrothed have that previous generations did not. These students were worried for other reasons, like how to pay for a wedding and start a life together without having yet established a career. “Weddings are expensive,” Aileen said. “Plus, I have to pay my own way through college – that’s all on my shoulders. Financial stability is going to be an issue for both of us, but I really never think of problems. If they come up, they come up.”
Angie was less worried about the money than her fate as a college student. In the months leading up to the wedding, she worried she would become disconnected from school and have to drop all the things she loved doing. “ButRyan and I sat down and talked about it andwe decided that if I wasn’t doing all these things that I’m doing, I wouldn’t be myself,” she said. “I wouldn’t be the woman that he married.” Still, she did wonder. “‘Should we wait? Maybe we should have held off for another two years. Is it really that big of a deal?’ I definitely had those questions.”
Even with the doubts swirling, they still need to plan a wedding. How do they do it as full-time students with jobs and class and extra-curriculars filling their days?
“It got really stressful,” Angie said. She was getting married a month and fifteen days after classes ended, but was also the female lead in the school’s production of Romeo and Juliet. “I just didn’t have time to focus on the wedding. I didn’t even touch my invitations; I picked them out and my parents did it all for me. They were saints.”
But is the marriage worth it? Is getting married before you’re even allowed to rent a car worth the late nights and doubting loved ones and the chance you’ll end up another divorce statistic?
Angie was unequivocal. “The last seven months have proved all my worries false,” she said. “Since we’ve been married I’ve never questioned it. We definitely made the right decision.”
Click here for a PDF of this story as it originally appeared in the Campus section of the North Central Chronicle. |
Q:
How to fetch YUV stream or bytes array using DirectX?
Hi i am creating a sample application using DirectX.
I am following a sample application here:http://www.codeproject.com/KB/directx/directxcapture.aspx
Can anybody suggest where do we get frames???
i cant understand the sample its working but how???
when i click on Start a file is created with zero bytes
when i press Stop some bytes are written to this file.
but where do we get frames and bytes array?
I need to fetch them for conversion.
I am trying to debug but cant get.
Can anybody provide some idea or help
thanks in advance.
A:
Finally i got it to work
now i am able to obtain yuv data and store the contents in an avi file.
I followed this:
http://www.codeproject.com/KB/directx/directxcapture.aspx
|
---
abstract: 'A number of recent results in Euclidean Harmonic Analysis have exploited several adjacent systems of dyadic cubes, instead of just one fixed system. In this paper, we extend such constructions to general spaces of homogeneous type, making these tools available for Analysis on metric spaces. The results include a new (non-random) construction of boundedly many adjacent dyadic systems with useful covering properties, and a streamlined version of the random construction recently devised by H. Martikainen and the first author. We illustrate the usefulness of these constructions with applications to weighted inequalities and the BMO space; further applications will appear in forthcoming work.'
address: 'Department of Mathematics and Statistics, P.O.B. 68 (Gustaf Hällströmin katu 2), FI-00014 University of Helsinki, Finland'
author:
- Tuomas Hytönen
- Anna Kairema
title: Systems of dyadic cubes in a doubling metric space
---
Introduction
============
The standard system of dyadic cubes, $$\mathscr{D}:=\{2^{-k}\big([0,1)^n+m\big):k\in{\mathbb{Z}},m\in{\mathbb{Z}}^n\},$$ plays an indispensable role in Harmonic Analysis on the Euclidean space ${\mathbb{R}}^n$. The fundamental properties of these cubes are that any two of them are either disjoint or one is contained in the other, and that the cubes of a given size partition all space. Also, the cubes are not too far away from balls, which are usually more natural objects from the geometric point of view.
Accordingly, there has been interest in constructing analogues of dyadic cubes in more general metric spaces, to provide tools for Analysis in such settings. The first results in this direction, as far as we know, are due to G. David [@David88], Appendix A; see also [@David91], Appendix I. A more comprehensive construction was provided by M. Christ [@Christ90], in the full generality of Coifman–Weiss spaces of homogeneous type [@CW71], and this has become the standard reference on the topic. In addition to the basic geometric properties expected from the cubes, Christ also obtained a certain smallness of the boundary condition (in terms of an underlying doubling measure), which has turned out useful in applications to singular integrals. A more elementary construction, without addressing the boundary control but nevertheless sufficient for many purposes, was provided by E. Sawyer and R. L. Wheeden [@SW92]. Some further variants have been considered by other authors [@ABI; @KRS].
Meanwhile, new developments in ${\mathbb{R}}^n$ have seen the need to consider not just one but several adjacent dyadic systems. Two types of constructions are of particular interest here. On the one hand, there are the *random dyadic systems* due to F. Nazarov, S. Treil and A. Volberg [@NTV:Cauchy], Section 4, $$\mathscr{D}(\omega):=\Big\{2^{-k}\big([0,1)^n+m\big)+\sum_{j>k}2^{-j}\omega_j:k\in{\mathbb{Z}},m\in{\mathbb{Z}}^n\Big\},\qquad
\omega=(\omega_j)_{j\in{\mathbb{Z}}}\in\Omega:=(\{0,1\}^n)^{{\mathbb{Z}}},$$ where $\Omega$ is equipped with the natural product probability measure. The randomization provides a powerful way of controlling edge effects, even when the space is equipped with a non-doubling measure, by proving that any given point $x\in{\mathbb{R}}^n$ has a small probability of ending up close to the boundary of a randomly chosen cube. These random dyadic systems have been instrumental in the development of the non-doubling theory of singular integrals [@NTV:Cauchy; @NTV:Tb] and its applications to analytic capacity [@Tolsa:Painleve; @Volberg:03] as well as sharp one-weight [@Hytonen:A2; @HPTV] and two-weight [@LSUT:Hilbert; @NTV:Hilbert] inequalities for classical singular integrals. A version of such random cubes in metric spaces, starting from Christ’s construction, was recently obtained by the first author and H. Martikainen [@HM09], to study singular integrals in metric spaces with non-doubling measures.
On the other hand, there is a *non-random choice* of just boundedly many dyadic systems, say $$\mathscr{D}^{t}:=\{2^{-k}\big([0,1)^n+m+(-1)^k t\big):k\in{\mathbb{Z}},m\in{\mathbb{Z}}^n\},\qquad t\in\{0,\tfrac13,\tfrac23\}^n,$$ which have the following useful property: for every ball $B$, there exists a cube $Q$ in at least one of the $\mathscr{D}^{t}$ such that $B\subseteq\tfrac{9}{10} Q$ while $\operatorname{diam}(Q)\leq C\operatorname{diam}(B)$. These adjacent systems have been exploited, e.g., in the work of C. Muscalu, T. Tao and C. Thiele [@MTT:02; @MTT:03] on multi-linear operators, and very recently by M. Lacey, E. Sawyer and I. Uriarte-Tuero [@LSUT:08] on two-weight inequalities. We are not aware of the precise original occurrence of this latter set of systems: Lacey et al. ([@LSUT:08], Section 2.2) attribute them to J. Garnett and P. Jones; Muscalu et al. ([@MTT:02], Section 5) to M. Christ, at least what comes to the observation on $B\subseteq\tfrac{9}{10} Q$. T. Mei [@Mei03] has shown that a similar conclusion can be obtained with just $n+1$ (rather than $3^n$) cleverly chosen systems $\mathscr{D}^{t}$.
The goals of the present paper are two-fold. First, we recall and streamline the construction of the Christ-type dyadic cubes in a metric space, including the recent randomized version $\mathscr{D}(\omega)$ from [@HM09]. Second, we provide a metric space version of the non-random choice of boundedly many dyadic systems $\mathscr{D}^t$, with the property that any $B$ is contained in some $Q\in\bigcup_t\mathscr{D}^t$ with $\operatorname{diam}(Q)\leq C\operatorname{diam}(B)$, which is a completely new result. We even combine the two constructions, yielding a random family of adjacent dyadic systems $\mathscr{D}^t(\omega)$.
We have strived for a reasonably comprehensive and transparent presentation, including some results which could be found elsewhere. In the hope of making the paper a useful reference, we have tried to make the statements of our theorems easily applicable as “black boxes”, but also paid attention to the details of the proofs. As in ${\mathbb{R}}^n$, where the open ($2^{-k}((0,1)^n+m)$), half-open ($2^{-k}([0,1)^n+m)$) and closed ($2^{-k}([0,1]^n+m)$) dyadic cubes each serve their different purpose, we also present (as in [@HM09]) a unified construction of three related systems of open, half-open and closed cubes. While this may not be the absolute shortest route to the half-open cubes alone (for which one should probably consult the recent paper of A. Käenmäki, T. Rajala and V. Suomala [@KRS]), we find the properties of the open and closed cubes proven on the way to be useful as well.
The basic idea behind the construction of several adjacent dyadic systems is from [@HM09]: New centre points for the cubes of sidelength $\delta^k$ (where $\delta>0$ is a small parameter playing the role of the constant $\tfrac12$ in the classical Euclidean dyadic system) are chosen among the old centre points of the (one level smaller) cubes of sidelength $\delta^{k+1}$. In the non-probabilistic selection, instead of doing this randomly, we need to do it in a “clever” way. The basic *conflict* to avoid is two new centres getting too close to each other. This is achieved by equipping the points with suitable *labels*, which help us in avoiding these conflicts. As it turns out, this philosophy can also be used to simplify the original random construction from [@HM09], where originally the conflicts were first allowed among the new centre points, and yet another selection process was needed to remove some of them, thereby yielding the final points. This simplification already proved useful in the consideration of vector-valued singular integrals by the random cubes method by Martikainen [@Henri:10], and it is expected to be of interest elsewhere. A particular feature of the new selection process is a natural one-to-one correspondence between the old and new cubes, which was not present, when some of the new centres were first removed; thus the original cubes may be used as an index set for the new cubes, a technical property which was much exploited in some of the recent Euclidean applications [@Hytonen:A2; @HPTV].
As an illustration of the use of the new adjacent dyadic systems, we provide easy extensions of two results in Euclidean harmonic analysis to metric spaces $X$ with a doubling measure $\mu$: First, Buckley’s theorem [@Buckley:93] on the sharp weighted norm of the Hardy–Littlewood maximal operator, $${\|Mf\|_{L^p(w)}}\leq C{\|w\|_{A_p}}^{1/(p-1)}{\|f\|_{L^p(w)}},
\qquad{\|w\|_{A_p}}:=\sup_B\Big(\fint_B w{\,\mathrm{d}}\mu\Big)\Big(\fint_B w^{-1/(p-1)}{\,\mathrm{d}}\mu\Big)^{p-1},$$ where the supremum is over all metric balls in $X$, and $C$ only depends on $X$, $\mu$ and $p\in(1,\infty)$. Second, the representation of ${\operatorname{BMO}}(\mu)$ as an intersection of finitely many dyadic BMO spaces, extending the Euclidean result in [@Mei03].
In extending Buckley’s theorem, we follow the Euclidean approach due to Lerner [@Lerner:08]. A noteworthy feature of our argument is the circumvention of the use of the Besicovitch covering theorem, an essentially Euclidean device used in Lerner’s original proof, by the trivial covering properties exhibited by the adjacent dyadic systems. We believe that this displays a more general principle of avoiding the Besicovitch theorem and thereby allowing extensions of other Euclidean results to metric spaces.
Note that only these applications, but not the construction of the cubes as such, depends on the existence of a doubling measure $\mu$ on $X$; for the cubes, we only need the weaker geometric doubling property that any ball of radius $r$ can be covered by at most $A_1$ (a fixed constant) balls of radius $\tfrac12 r$. Further applications will be considered in a forthcoming paper by the second author.
Definition and construction of a dyadic system
==============================================
Set-up
------
Let $\rho$ be a quasi-metric on the space $X$, i.e., it satisfies the axioms of a metric except for the triangle inequality, which is assumed in the weaker form $$\rho(x,y)\leq A_0\big(\rho(x,z)+\rho(z,y)\big)$$ with a constant $A_0\geq 1$. The quasi-metric space $(X,\rho)$ is assumed to have the following *(geometric) doubling property*: There exists a positive integer $A_1\in {\mathbb{N}}$ such that for every $x\in X$ and for every $r>0$, the ball $B(x,r):=\{y\in X:\rho(y,x)<r\}$ can be covered by at most $A_1$ balls $B(x_i,r/2)$.
Until further notice, no other properties of the quasi-metric space $(X,\rho)$ will be required; in particular, we do not assume any measurability of $X$. Some of the arguments are valid even without the assumption of geometric doubling.
Set $a_1:=\log_2 A_1$. The following properties are easy to check; cf. [@Framework Lemmas 2.3 and 2.5]:
1. Any ball $B(x,r)$ can be covered by at most $A_1\delta^{-a_1}$ balls of radius $\delta r$ for any $\delta\in(0,1]$.
2. \[it:disjoint\] Any ball $B(x,r)$ contains at most $A_1\delta^{-a_1}$ centres $x_i$ of pairwise disjoint balls $B(x_i,\delta r)$.
3. \[it:countable\] Any disjoint family of balls in $X$ is at most countable.
4. \[it:separated\] If $x,y\in X$ have $\rho (x,y)\geq r$, then the balls $B(x,r/(2A_0))$ and $B(y,r/(2A_0))$ are disjoint.
A subset $\Omega\subseteq X$ is *open* if for every $x\in\Omega$ there exist ${\varepsilon}>0$ such that $B(x,{\varepsilon})\subseteq\Omega$. A subset $F\subseteq X$ is *closed* if its complement is open. The usual proof of the fact that $F\subseteq X$ is closed, if and only if it contains its limit points, carries over to the quasi-metric spaces. However, some balls $B(x,r)$ may fail to be open. (E.g., consider $X=\{-1\}\cup[0,\infty)$ with the usual distance between all other pairs of points except $\rho(-1,0):=\frac12$. Then $B(-1,1)=\{-1,0\}$ does not contain any ball of the form $B(0,{\varepsilon})$, and hence cannot be open.)
\[thm:cubes\] Suppose that constants $0<c_0\leq C_0 <\infty$ and $\delta \in (0,1)$ satisfy $$\label{parameter;conditions}
12A_0^3 C_0\delta \leq c_0.$$ Given a set of points $\{z^k_{\alpha}\}_{\alpha}$, $\alpha\in \mathscr{A}_k$, for every $k\in{\mathbb{Z}}$, with the properties that $$\label{ehdot}
\rho(z_{\alpha}^k,z_{\beta}^k)\geq c_0\delta^k\quad(\alpha\neq\beta),\qquad
\min_{\alpha}\rho(x,z^k_{\alpha})<C_0\delta^k\quad\forall\,x\in X,$$ we can construct families of sets $\tilde{Q}^k_{\alpha}\subseteq {Q}^k_{\alpha}\subseteq\bar{Q}^k_{\alpha}$ — called open, half-open and closed *dyadic cubes* — such that: $$\label{eq:open-closed}
\tilde{Q}^k_{\alpha}\text{ and }\bar{Q}^k_{\alpha}\text{ are the interior and closure of }Q^k_{\alpha};\\$$ $$\label{eq:nested}
\text{if }\ell\geq k\text{, then either }Q^{\ell}_{\beta}\subseteq Q^k_{\alpha}\text{ or }Q^k_{\alpha}\cap Q^{\ell}_{\beta}=\varnothing;$$ $$\label{eq:cover}
X=\bigcup_{\alpha}Q^k_{\alpha}\quad\text{(disjoint union)}\quad\forall k\in{\mathbb{Z}};$$ $$\label{eq:contain}
B(z^k_{\alpha},c_1\delta^k)\subseteq Q^k_{\alpha}\subseteq B(z^k_{\alpha},C_1\delta^k)=:B(Q^k_{\alpha})\text{, where $c_1:=(3A_0^2)^{-1}c_0$ and $C_1:=2A_0C_0$};$$ $$\label{eq:monotone}
\text{if }k\leq\ell\text{ and }Q^{\ell}_{\beta}\subseteq Q^k_{\alpha}\text{, then }B(Q^{\ell}_{\beta})\subseteq B(Q^k_{\alpha}).$$ The open and closed cubes $\tilde{Q}^k_{\alpha}$ and $\bar{Q}^k_{\alpha}$ depend only on the points $z^{\ell}_{\beta}$ for $\ell\geq k$. The half-open cubes $Q^k_{\alpha}$ depend on $z^{\ell}_{\beta}$ for $\ell\geq\min(k,k_0)$, where $k_0\in{\mathbb{Z}}$ is a preassigned number entering the construction.
To some extent, this combines the benefits of the alternative constructions of Christ and Sawyer–Wheeden: on the one hand, we obtain dyadic cubes on all length scales (rather than from a given level up), as in Christ’s construction, and we also obtain an exact partition of the space (rather than up to measure zero) as in Sawyer and Wheeden. The fact that things would be slightly simpler if we started from a fixed finest level of partition, like Sawyer and Wheeden, is reflected by the dependence of the half-open cubes also on the points of the coarser scales once we go past the preassigned threshold level $k_0$.
The proof consists of several steps.
\[lem:partial;order\] Under the assumptions of Theorem \[thm:cubes\], there is a partial order $\leq$ among the pairs $(k,\alpha)$ such that:
- if $\rho(z^{k+1}_{\beta},z^k_{\alpha})<(2A_0)^{-1}c_0\delta^k$ then $(k+1,\beta)\leq(k,\alpha)$;
- if $(k+1,\beta)\leq(k,\alpha)$ then $\rho(z^{k+1}_{\beta},z^k_{\alpha})<C_0\delta^k$;
- for every $(k+1,\beta)$, there is exactly one $(k,\alpha)\geq(k+1,\beta)$, called its *parent*;
- for every $(k,\alpha)$, there are between $1$ and $M$ pairs $(k+1,\beta)\leq(k,\alpha)$, called its *children*;
- there holds $(\ell,\beta)\leq(k,\alpha)$ if and only if $\ell\geq k$ and there are $(j+1,\gamma_{j+1})\leq(j,\gamma_j)$ for all $j=k,k+1,\ldots,\ell-1$, for some $\gamma_k=\alpha,\gamma_{k+1},\ldots,\gamma_{\ell-1},\gamma_{\ell}=\beta$; then $(\ell,\beta)$ and $(k,\alpha)$ are called one another’s *descendant* and *ancestor*, respectively.
Indeed, these properties essentially define $\leq$: Given a point $(k+1,\beta)$, check whether there exists $\alpha$ such that $\rho(z^k_{\alpha},z^{k+1}_{\beta})<(2A_0)^{-1}c_0\delta^k$. If one exists, it is necessarily unique by and we decree that $(k+1,\beta)\leq(k,\alpha)$. If no such good $\alpha$ exists, choose any $\alpha$ for which $\rho(z^k_{\alpha},z^{k+1}_{\beta})<C_0\delta^k$ (at least one such $\alpha$ exists by ) and decree that $(k+1,\beta)\leq(k,\alpha)$. (From and the geometric doubling property, it follows readily that the index sets $\mathscr{A}_k$, $k\in {\mathbb{Z}}$, are countable. By assuming that the countable number of indices $\alpha$ are taken from ${\mathbb{N}}$, we could choose the smallest $\alpha$, thereby eliminating the arbitrariness of this choice in the construction.) In either case, we decree that $(k+1,\beta)$ is not related to any other $(k,\gamma)$, and finally we extend $\leq$ by transitivity to obtain a partial ordering.
It only remains to check the claim concerning the number of children. If $(k+1,\beta)\leq (k,\alpha)$, we have $\rho(z_\alpha^{k},z_\beta^{k+1})<C_0\delta^k$, but also $\rho(z_\beta^{k+1},z^{k+1}_{\gamma})\geq c_0\delta^{k+1}$ for any $\gamma\neq\beta$. Thus the geometric doubling property implies that there can be at most boundedly many, say $M$, such $(k+1,\beta)$. Conversely, for $(k,\alpha)$, there exists at least one $(k+1,\beta)$ with $\rho(z_\alpha^{k},z_\beta^{k+1})<C_0\delta^{k+1}\leq(2A_0)^{-1}c_0\delta^k$, and thus $(k+1,\beta)\leq(k,\alpha)$, so there is at least one child.
With the partial order defined, it is possible to formulate the rest of the construction, although proving all the stated properties needs some more work. As a preliminary version, we define for every $k\in {\mathbb{Z}}$ and every $\alpha$ $$\hat{Q}^k_{\alpha}:=\{z^{\ell}_{\beta}\colon (\ell,\beta)\leq(k,\alpha)\} .$$ Then $$\bar{Q}^k_{\alpha}:=\overline{\hat{Q}^k_{\alpha}},$$ the closure of $\hat{Q}^k_{\alpha}$, and $$\tilde{Q}^k_{\alpha}:=\Big(\bigcup_{\beta\neq\alpha}\bar{Q}^k_{\beta}\Big)^c.$$ It is clear from the definition that these depend only on $z^{\ell}_{\beta}$ for $\ell\geq k$.
In the following section we prove:
\[prop:cubes\] Suppose that for every $k\in {\mathbb{Z}}$ we have a set of points with properties and constants that satisfy as in Theorem \[thm:cubes\]. Then the cubes $\tilde{Q}^k_{\alpha}$ and $\bar{Q}^k_{\alpha}$ satisfy: $$\label{eq:interior-closure}
\tilde{Q}^k_{\alpha}\text{ and }\bar{Q}^k_{\alpha}\text{ are one another's interior and closure, respectively};$$ $$\label{eq:nested-prelim}
\text{for }\ell\geq k\text{, there holds }\tilde{Q}^{\ell}_{\beta}\subseteq\tilde{Q}^k_{\alpha}\text{ if $(\ell,\beta)\leq(k,\alpha)$, and }
\tilde{Q}^{\ell}_{\beta}\cap\bar{Q}^k_{\alpha}=\bar{Q}^{\ell}_{\beta}\cap\tilde{Q}^k_{\alpha}=\varnothing\text{ else};$$ $$\label{eq:closed-cover}
X=\bigcup_{\alpha}\bar{Q}^k_{\alpha}\quad\text{(possibly with overlap)}\quad\forall k\in{\mathbb{Z}};$$ $$\label{eq:contain-prelim}
(i)\quad B(z^k_{\alpha},c_1\delta^k)\subseteq\tilde{Q}^k_{\alpha},\qquad (ii)\quad\bar{Q}^k_{\alpha}\subseteq B(z^k_{\alpha},C_1\delta^k);$$ $$\label{eq:monot-prelim}
\text{if }(\ell,\beta)\leq(k,\alpha)\text{ then }B(z^{\ell}_{\beta},C_1\delta^{\ell})\subseteq B(z^{k}_{\alpha},C_1\delta^k).$$ Moreover, $$\label{eq:unionOfClosed}
\bar{Q}^k_{\alpha}=\bigcup_{\beta:(\ell,\beta)\leq(k,\alpha)}\bar{Q}^{\ell}_{\beta}\qquad\forall k\leq\ell.$$
Assuming this result, which contains the essence of Theorem \[thm:cubes\], we can complete the proof of the Theorem by the following lemma:
\[lem:finalise\] Assuming Proposition \[prop:cubes\], we can construct $Q^k_{\alpha}$ which satisfy the assertions of Theorem \[thm:cubes\].
Here it is convenient to assume that the pairs $(k,\alpha)$ are parameterized by $\alpha\in{\mathbb{N}}$ for each $k\in{\mathbb{Z}}$. For the given threshold level $k=k_0$, we define recursively $${Q}^{k_0}_0:=\bar{Q}^{k_0}_0,\qquad
{Q}^{k_0}_{\alpha}:=\bar{Q}^{k_0}_{\alpha}\setminus\bigcup_{\beta=0}^{\alpha-1}{Q}^{k_0}_{\beta},\quad\alpha\geq 1.$$ By construction, it is clear that the ${Q}^{k_0}_{\alpha}$ are pairwise disjoint and satisfy $$\label{eq:between}
\bar{Q}^{k_0}_{\alpha}\supseteq Q^{k_0}_{\alpha}\supseteq\bar{Q}^{k_0}_{\alpha}\setminus\bigcup_{\beta\neq\alpha}\bar{Q}_{\beta}^{k_0}
\supseteq\tilde{Q}^{k_0}_{\alpha}\setminus(\tilde{Q}^{k_0}_{\alpha})^c=\tilde{Q}^{k_0}_{\alpha},\qquad
\bigcup_{\beta=0}^{\alpha}{Q}^{k_0}_{\beta}=\bigcup_{\beta=0}^{\alpha}\bar{Q}^{k_0}_{\beta}\underset{\alpha\to\infty}{\longrightarrow} X.$$
For $k<k_0$ we define $${Q}^k_{\alpha}:=\bigcup_{\beta:(k_0,\beta)\leq(k,\alpha)}{Q}^{k_0}_{\beta}.$$ Then clearly $Q^k_{\alpha}\subseteq\bar{Q}^k_{\alpha}$, these partition $X$ for a fixed $k$, and holds for all $k\leq\ell\leq k_0$. Finally, $$(Q^k_{\alpha})^c=\bigcup_{\beta:(k_0,\beta)\not\leq(k,\alpha)}{Q}^{k_0}_{\beta}
\subseteq\bigcup_{\gamma\neq\alpha}\bigcup_{\beta:(k_0,\beta)\not\leq(k,\gamma)}\bar{Q}^{k_0}_{\beta}
=\bigcup_{\gamma\neq\alpha}\bar{Q}^k_{\gamma}=(\tilde{Q}^k_{\alpha})^c,$$ so that $\tilde{Q}^k_{\alpha}\subseteq Q^k_{\alpha}$.
For $k>k_0$, we proceed by induction as follows. Suppose that the cubes ${Q}^{\ell}_{\alpha}$, $\ell\leq k-1$, are already defined as required. For every $\alpha$, consider the finitely many $(k,\beta)\leq(k-1,\alpha)$, and relabel them temporarily with $\beta=0,1,\ldots$ (up to some finite number). Then define $${Q}^k_0:={Q}^{k-1}_{\alpha}\cap\bar{Q}^k_0,\qquad
{Q}^k_{\beta}:={Q}^{k-1}_{\alpha}\cap\bar{Q}^k_{\beta}\setminus\bigcup_{\gamma=0}^{\beta-1}{Q}^k_{\gamma},\quad
\beta\geq 1.$$ Disjointness is clear, and as in we get $\bar{Q}^k_{\beta}\supseteq Q^k_{\beta}\supseteq Q^{k-1}_{\alpha}\cap\tilde{Q}^k_{\beta}\supseteq \tilde{Q}^{k-1}_{\alpha}\cap\tilde{Q}^k_{\beta}=\tilde{Q}^k_{\beta}$, and $$\bigcup_{\beta:(k,\beta)\leq(k-1,\alpha)}{Q}^k_{\beta}
={Q}^{k-1}_{\alpha}\cap\bigcup_{\beta:(k,\beta)\leq(k-1,\alpha)}\bar{Q}^k_{\beta}={Q}^{k-1}_{\alpha}.$$ This easily implies and in all the remaining cases.
Finally, $\Rightarrow$ and $\Rightarrow$ are clear from $\tilde{Q}^k_{\alpha}\subseteq Q^k_{\alpha}\subseteq \bar{Q}^k_{\alpha}$. To see that $\Rightarrow$, observe that if $k\leq\ell$ and $Q^{\ell}_{\beta}\subseteq Q^k_{\alpha}$, then and imply that $(\ell,\beta)\leq(k,\alpha)$, and thus can be used.
We work with several adjacent sets of cubes, as stated. Given a system of dyadic points, the preliminary cubes $\hat{Q}_{\alpha}^{k}$ determine the open cubes $\tilde{Q}_{\alpha}^{k}$ and the closed cubes $\bar{Q}_{\alpha}^{k}$ unambiguously but not the half-open cubes $Q_{\alpha}^{k}$ as their construction involves selection. If we know the final half-open cubes $Q_{\alpha}^{k}$ as point sets, they determine the open cubes $\tilde{Q}_{\alpha}^{k}$ and the closed cubes $\bar{Q}_{\alpha}^{k}$ unambiguously as these are nothing but the set of interior points and the closure respectively. The family of the preliminary cubes $\hat{Q}_{\alpha}^{k}$, however, is not uniquely determined by the point sets $Q_{\alpha}^{k}$. But usually we think that the cubes $Q_{\alpha}^{k}$ carry the information of their centre point $z^k_\alpha$ and generation $k$ as well. The ideology here is the very same as when defining a metric ball.
Existence of dyadic points {#existence;dyadicpoints}
--------------------------
Consider a maximal collection of points $x_\alpha^{k}\in X$ satisfying the two inequalities $$\rho(x_{\alpha}^k,x_{\beta}^k)\geq c_0\delta^k\quad(\alpha\neq\beta),\qquad
\min_{\alpha}\rho(x,x^k_{\alpha})<C_0\delta^k\quad\forall\,x\in X$$ with constants $c_0=1=C_0$. It follows from the maximality argument that such a point set exists for any given $\delta\in (0,1)$ and every $k\in {\mathbb{Z}}$. From the first condition and the geometric doubling property it follows that a minimum in the second condition is indeed attained. Note that we may, of course, choose maximal point sets in such a way that given a fixed point $x_0\in X$, for every $k\in {\mathbb{Z}}$, there exists $\alpha$ such that $x^k_\alpha = x_0$. Finally, we may choose $\delta$ such that the restriction (\[parameter;conditions\]) introduced in Theorem \[thm:cubes\] holds.
Verification of the properties
==============================
This section contains the proof of Proposition \[prop:cubes\], which consists of the more technical aspects of Theorem \[thm:cubes\]. Suppose that for every $k\in {\mathbb{Z}}$ we have a set of points with properties (\[ehdot\]) and constants that satisfy (\[parameter;conditions\]) as in Theorem \[thm:cubes\]. Recall that $c_1:=(3A_0^2)^{-1}c_0$ and $C_1:=2A_0C_0$. We start with simple inclusion properties.
\[lem:descendant\] If $(\ell,\beta)\leq (k,\alpha)$, then $\rho (z_\alpha^{k},z_\beta^{\ell})< C_1\delta^{k}$.
Consider the chain $$(k,\alpha)=(k, \gamma_0)\geq(k+1, \gamma_1)\geq \ldots\geq (k+(\ell-k), \gamma_{\ell-k})=(\ell,\beta)$$ with $ \rho (z_{\gamma_i}^{k+i},z_{\gamma_{i+1}}^{k+i+1})\leq C_0\delta^{k+i}$ for all $i\in \lbrace 0, \ldots , l-k-1 \rbrace$. By iterating the triangle inequality, $$\begin{split}
\rho (z_\alpha^{k},z_\beta^{\ell})
& \leq \sum_{i=0}^{k-\ell-1} A_0^{i+1}\rho(z_{\gamma_i}^{k+i},z_{\gamma_{i+1}}^{k+i+1}) \\
& \leq \sum_{i=0}^{k-\ell-1} A_0^{i+1}C_0\delta^{k+i}<\frac{A_0 C_0\delta^k}{1-A_0\delta}\leq 2A_0C_0\delta^k.\qedhere
\end{split}$$
We have $\bar{Q}^k_{\alpha}\subseteq B(z^k_{\alpha},C_1\delta^k)$, and also $B(z^{\ell}_{\beta},C_1\delta^k)\subseteq B(z^k_{\alpha},C_1\delta^k)$ for all $(\ell,\beta)\leq(k,\alpha)$.
For the first inclusion, let $x\in\bar{Q}^k_{\alpha}$; hence it is a limit of some $x_r\in\hat{Q}^k_{\alpha}$, $r\in{\mathbb{Z}}_+$. If $x_r=z^k_{\alpha}$ infinitely often, then also $x=z^k_{\alpha}$, and there is nothing to prove. Otherwise, infinitely many $x_r$ are of the form $z^\ell_\beta$ for some $(\ell,\beta)=(\ell(r),\beta(r))\leq(k+1,\gamma)=(k+1,\gamma(r))\leq(k,\alpha)$, and then $$\label{eq:compu}
\begin{split}
\rho(z^k_{\alpha},x)
&\leq A_0\rho(z^k_{\alpha},z^{k+1}_{\gamma})+A_0^2\rho(z^{k+1}_{\gamma},z^{\ell}_{\beta})+
A_0^2\rho(z^{\ell}_{\beta},x) \\
&\leq A_0 C_0\delta^k + A_0^2\cdot 2A_0C_0\delta^{k+1}+A_0^2 \rho(x_r,x) \\
&< A_0 C_0\delta^k+\tfrac12A_0C_0\delta^{k}+\tfrac12A_0 C_0\delta^{k}
=2A_0C_0\delta^k,
\end{split}$$ for such $x_r$ with $r\geq r_0$, since $\ell\geq k+1$ and $4A_0^2\delta\leq 1$.
The inclusion between the balls is clear if $\ell=k$, so let again $(\ell,\beta)\leq(k+1,\gamma)\leq(k,\alpha)$. Let $x\in B(z^{\ell}_{\beta},C_1\delta^{\ell})$. As in , we deduce (now using $\rho(z^{\ell}_{\beta},x)\leq C_1\delta^{\ell}$ instead of $\rho(z^{\ell}_{\beta},x)=\rho(z^{\ell}_{\beta},x_r)$) that $$\rho(z^k_{\alpha},x)
< A_0 C_0\delta^k+A_0^2\cdot 2A_0C_0\delta^{k+1}+A_0^2 \cdot C_1\delta^{\ell}\leq 2A_0C_0\delta^k.\qedhere$$
\[closed:union\] For any $\Lambda$, $\bigcup_{\alpha\in\Lambda}\bar{Q}^k_{\alpha}$ is the closure of $\bigcup_{\alpha\in\Lambda}\hat{Q}^k_{\alpha}$; in particular, this union is closed. Hence the open cubes $\displaystyle \tilde{Q}^k_{\alpha}:=\Big(\bigcup_{\gamma\neq\alpha}\bar{Q}^k_{\gamma}\Big)^c$ are indeed open sets.
Let $k\in{\mathbb{Z}}$ be fixed. It is clear that each $\bar{Q}^k_{\alpha}$, $\alpha\in\Lambda$, is a subset of the closure of $\bigcup_{\alpha\in\Lambda}\hat{Q}^k_{\alpha}$. From the geometric doubling property and the inclusion $\hat{Q}^k_{\alpha}\subseteq B(z^k_{\alpha},C_1\delta^k)$, it follows readily that a bounded set can intersect at most finitely many different $\hat{Q}^k_{\alpha}$. Hence, if a convergent, thus bounded, sequence of points $x_r$ belong to $\bigcup_{\alpha\in\Lambda}\bar{Q}^k_{\alpha}$, then they belong to some sub-union with a finite $\Lambda_1\subseteq\Lambda$ in place of $\Lambda$. A union of finitely many closed sets is closed, so also the limit of the sequence $(x_r)$ must belong to the same union. Thus all limit points of $\bigcup_{\alpha\in\Lambda}\hat{Q}^k_{\alpha}$ belong to $\bigcup_{\alpha\in\Lambda}\bar{Q}^k_{\alpha}$.
\[lemma:closedcovering\] For all $k,\ell\in{\mathbb{Z}}$ with $\ell>k$, we have $$X=\bigcup_{\alpha}\bar{Q}^k_{\alpha},\qquad\bar{Q}^k_{\alpha}=\bigcup_{\beta:(\ell,\beta)\leq(k,\alpha)}\bar{Q}^{\ell}_{\beta}.$$
The union $\bigcup_{\alpha}\hat{Q}^k_{\alpha}$ contains the points $z^{\ell}_{\beta}$ with $\ell\geq k$ and $\beta$ arbitrary, which are dense in $X$ by . Hence the closure of this union is $X$, but it is also equal to $\bigcup_{\alpha}\bar{Q}^k_{\alpha}$ by Lemma \[closed:union\].
We turn to the second identity, first with $\ell=k+1$. It is clear that $$\hat{Q}^k_{\alpha}=\{z^k_{\alpha}\}\cup\bigcup_{\beta:(k+1,\beta)\leq(k,\alpha)}\hat{Q}^{k+1}_{\beta};$$ hence by taking closures with the help of Lemma \[closed:union\], $$\bar{Q}^k_{\alpha}=\{z^k_{\alpha}\}\cup\bigcup_{\beta:(k+1,\beta)\leq(k,\alpha)}\bar{Q}^{k+1}_{\beta}.$$ Since the cubes $\bar{Q}^{k+1}_{\beta}$ cover all $X$, it is clear that $z^k_{\alpha}\in\bar{Q}^{k+1}_{\beta}\subseteq B(z^{k+1}_{\beta},C_1\delta^{k+1})$ for some $\beta$, and we only need to check that $(k+1,\beta)\leq(k,\alpha)$. But this follows, using $4A_0^2 C_0\delta\leq c_0$, from $$\rho(z^k_{\alpha},z^{k+1}_{\beta})<C_1\delta^{k+1}=2A_0 C_0\delta\cdot\delta^k\leq\frac{c_0}{2A_0}\delta^k.$$ The case of a general $\ell>k$ follows by an $(\ell-k)$-fold iteration of the identity for $\ell=k+1$.
\[lem:ballInside\] $\bar{Q}^k_{\beta}\subseteq B(z^k_{\alpha},c_1\delta^k)^c$ for $\beta\neq\alpha$.
By Lemma \[lemma:closedcovering\], we need to show that $\bar{Q}^{k+1}_{\gamma}\subseteq B(z^k_{\alpha},c_1\delta^k)^c$ for all $(k+1,\gamma)\leq(k,\beta)$. If not, then $\bar{Q}^{k+1}_{\gamma}\subseteq B(z^{k+1}_{\gamma},C_1\delta^{k+1})$ and $B(z^k_{\alpha},c_1\delta^k)$ have a common point $x$; whence $$\begin{split}
\rho(z^{k+1}_{\gamma},z^k_{\alpha})
&\leq A_0\rho(z^{k+1}_{\gamma},x)+A_0\rho(x,z^k_{\alpha})
<A_0 C_1\delta^{k+1}+A_0 c_1\delta^k \\
&=(2A_0^2 C_0\delta+\frac{c_0}{3A_0})\delta^k
\leq(\frac{c_0}{6A_0}+\frac{c_0}{3A_0})\delta^k=\frac{c_0}{2A_0}\delta^k,
\end{split}$$ by $12A_0^3 C_0\delta\leq c_0$, and this implies that $(k+1,\gamma)\leq(k,\alpha)$, a contradiction with $\alpha\neq\beta$.
If $\ell\geq k$, then $\tilde{Q}^{\ell}_{\beta}\subseteq\tilde{Q}^k_{\alpha}$ for $(\ell,\beta)\leq(k,\alpha)$, or $\tilde{Q}^{\ell}_{\beta}\cap\bar{Q}^k_{\alpha}=\bar{Q}^{\ell}_{\beta}\cap\tilde{Q}^k_{\alpha}=\varnothing$ otherwise. Moreover, $\hat{Q}^k_{\alpha}\subseteq\tilde{Q}^k_{\alpha}\subseteq\bar{Q}^k_{\alpha}$ and $B(z^k_{\alpha},c_1\delta^k)\subseteq\tilde{Q}^k_{\alpha}$.
Let first $(\ell,\beta)\leq(k,\alpha)$. Then $$(\tilde{Q}^k_{\alpha})^c
=\bigcup_{\gamma\neq\alpha}\bar{Q}^k_{\gamma}
=\bigcup_{\gamma\neq\alpha}\bigcup_{\eta:(\ell,\eta)\leq(k,\gamma)}\bar{Q}^{\ell}_{\eta}
=\bigcup_{\eta:(\ell,\eta)\not\leq(k,\alpha)}\bar{Q}^{\ell}_{\eta}
\subseteq\bigcup_{\eta\neq\beta}\bar{Q}^{\ell}_{\eta}
=(\tilde{Q}^{\ell}_{\beta})^c;$$ hence $\tilde{Q}^{\ell}_{\beta}\subseteq\tilde{Q}^k_{\alpha}$. By Lemma \[lem:ballInside\], we have $$B(z^{\ell}_{\beta},c_1\delta^{\ell})^c\supseteq\bigcup_{\eta\neq\beta}\bar{Q}^{\ell}_{\eta}=(\tilde{Q}^{\ell}_{\beta})^c;$$ thus $z^{\ell}_{\beta}\in B(z^{\ell}_{\beta},c_1\delta^{\ell})\subseteq\tilde{Q}^{\ell}_{\beta}\subseteq\tilde{Q}^k_{\alpha}$. This gives both $\hat{Q}^k_{\alpha}\subseteq\tilde{Q}^k_{\alpha}$ and $B(z^k_{\alpha},c_1\delta^k)\subseteq\tilde{Q}^k_{\alpha}$.
To see that $\tilde{Q}^k_{\alpha}\subseteq\bar{Q}^k_{\alpha}$, observe from Lemma \[lemma:closedcovering\] that $X=\bigcup_{\alpha}\bar{Q}^k_{\alpha}=\bar{Q}^k_{\alpha}\cup\Big(\bigcup_{\beta\neq\alpha}\bar{Q}^k_{\beta}\Big)$, so that $$\tilde{Q}^k_{\alpha}=\Big(\bigcup_{\beta\neq\alpha}\bar{Q}^k_{\beta}\Big)^c\subseteq\bar{Q}^k_{\alpha}.$$
Let then $(\ell,\beta)\not\leq(k,\alpha)$, and thus $(\ell,\beta)\leq(k,\gamma)$ for some $\gamma\neq\alpha$. By what was already proven, $\tilde{Q}^{\ell}_{\beta}\subseteq\tilde{Q}^k_{\gamma}\subseteq(\bar{Q}^k_{\alpha})^c$, and (taking closures) $\bar{Q}^{\ell}_{\beta}\subseteq\bar{Q}^k_{\gamma}\subseteq\bigcup_{\eta\neq\alpha}\bar{Q}^k_{\eta}=(\tilde{Q}^k_{\alpha})^c$.
\[lem:closure\_interior\] The cubes $\bar{Q}^k_{\alpha}$ and $\tilde{Q}^k_{\alpha}$ are each other’s closure and interior.
From $\hat{Q}^k_{\alpha}\subseteq\tilde{Q}^k_{\alpha}\subseteq\bar{Q}^k_{\alpha}$ and the fact that $\bar{Q}^k_{\alpha}$ is the closure of $\hat{Q}^k_{\alpha}$, it is clear that it is also the closure of $\tilde{Q}^k_{\alpha}$.
Concerning the interior, it is clear that the open set $\tilde{Q}^k_{\alpha}\subseteq\bar{Q}^k_{\alpha}$ is a subset of the interior of $\bar{Q}^k_{\alpha}$. For the other direction, observe that $\hat{Q}^k_{\beta}\subseteq\tilde{Q}^k_{\beta}\subseteq(\bar{Q}^k_{\alpha})^c$ for all $\beta\neq\alpha$; hence $$\overline{(\bar{Q}^k_{\alpha})^c}\supseteq\overline{\bigcup_{\beta\neq\alpha}\hat{Q}^k_{\beta}}
=\bigcup_{\beta\neq\alpha}\bar{Q}^k_{\beta}=(\tilde{Q}^k_{\alpha})^c.$$ Thus the interior of $\bar{Q}^k_{\alpha}$, which is the complement of $\overline{(\bar{Q}^k_{\alpha})^c}$, is a subset of $(\tilde{Q}^k_{\alpha})^{cc}=\tilde{Q}^k_{\alpha}$.
Adjacent dyadic systems {#sec:adjacent}
=======================
In this section we will prove the following theorem.
\[thm:adjacent;systems\] Given a set of reference points $\{x^k_\alpha \},k\in {\mathbb{Z}}, \alpha\in\mathscr{A}_k$, suppose that constant $\delta\in (0,1)$ satisfies $96A_0^6\delta\leq 1$. Then there exists a finite collection of families $\mathscr{D}^t$, $t = 1, 2, \ldots , K=K(A_0, A_1, \delta) <\infty$, where each $\mathscr{D}^t$ is a collection of dyadic cubes, associated to dyadic points $\{z^k_\alpha \},k\in {\mathbb{Z}}, \alpha\in\mathscr{A}_k$, with the properties – of Theorem \[thm:cubes\]. In addition, the following property is satisfied: $$\label{property:ball;included}
\hspace*{-0.145cm}\text{for every ball $B=B(x,r)\subseteq X$, there exists $t$ and $Q\in \mathscr{D}^t$ with }
B\subseteq Q\text{ and } \operatorname{diam}(Q)\leq Cr.$$ The constant $C<\infty$ in only depends on the quasi-metric constant $A_0$ and parameter $\delta$.
We will also prove the following variant of Theorem \[thm:adjacent;systems\]:
\[prop:adjacent;systems\] Given a fixed point $x_0\in X$, there exists a finite collection of families $\mathscr{D}^t$, $t = 1, 2, \ldots , K=K(A_0, A_1, \delta) <\infty$, where each $\mathscr{D}^t$ is a collection of dyadic cubes with the properties – of Theorem \[thm:cubes\], and the property (\[property:ball;included\]) of Theorem \[thm:adjacent;systems\] is satisfied. In addition, the following property is satisfied: For every $t = 1, 2, \ldots , K$, for every $k$, there exists $\alpha$ such that $x_0=z^k_\alpha$, the center point of $Q^k_\alpha\in \mathscr{D}^t$.
Reference dyadic points
-----------------------
Recall from \[existence;dyadicpoints\] that for every $k\in {\mathbb{Z}}$ there exists a point set $\{ x^k_\alpha\}_{\alpha\in\mathscr{A}_k}$ such that $$\rho(x_{\alpha}^k,x_{\beta}^k)\geq \delta^k\quad(\alpha\neq\beta),\qquad
\min_{\alpha}\rho(x,x^k_{\alpha})<\delta^k\quad\forall\,x\in X.$$ We will refer to the set $\{x^k_\alpha \}_{k,\alpha}$ of dyadic points as the set of *reference points*.
Suppose that $\delta\in (0,1)$ satisfies $96A_0^6\delta\leq 1$, and set $c_0:=(4A_0^2)^{-1}$. In particular, $\delta<c_0$ and $$\label{def;b0}
\frac{1}{2A_0^2}-\delta >\frac{1}{2A_0^2}-c_0=c_0.$$
\[konflikti\] Reference points $x_{\alpha}^k$ and $x_{\beta}^k$, $\alpha\neq\beta$, of same generation are *in conflict* if $$\rho(x_{\alpha}^k,x_{\beta}^k,)< c_0\delta^{k-1}.$$
Reference points $x_{\alpha}^k$ and $x_{\beta}^k$, $\alpha\neq\beta$, of same generation are *neighbours* if there occurs a conflict between their children. More precisely, the points $x_{\alpha}^k$ and $x_{\beta}^k$, $\alpha\neq\beta$, are neighbours if there exist points $(k+1,\gamma)\leq(k,\alpha)$ and $(k+1, \sigma)\leq(k,\beta)$ such that $\rho(x_{\gamma}^{k+1},x_{\sigma}^{k+1})< c_0\delta^{k}$.
Recall from \[lem:partial;order\] that due to the doubling property, a dyadic point can have at most $M$ children (a constant independent of the point). By similar arguments, also the number of neighbours of a dyadic point is bounded from above by a fixed constant, say $L$.
Labeling of the reference points {#definition:labels}
--------------------------------
Fix $k\in {\mathbb{Z}}$. We label the reference points $x_{\alpha}^{k}$ of generation $k$ as follows: Begin with some index pair $(k,\alpha)$ and label it with number $0$. Then, for every $(k,\beta)$, $\beta\neq \alpha$, check whether any of its neighbours (boundedly many) already have a label. If not, label it with number $0$. Otherwise, pick the *smallest* positive integer not yet in use among the neighbours. As the number of neighbours a point can have is bounded above by constant $L$, every point $x^k_\alpha$ gets a *primary label* ${\operatorname{label}}_1(k,\alpha):=\ell$ not bigger than $L$. Furthermore, we have the following: if $(k,\alpha)$ and $(k,\beta)$, $\alpha\neq\beta$, have the same label $\ell\in \{0, \ldots ,L\}$, they are not neighbours.
Next we label the reference points $x_{\gamma}^{k+1}$ of the following generation $k+1$ with duplex labels: If ${\operatorname{label}}_1(k,\alpha)=\ell$, each of its children $(k+1,\beta)\leq (k,\alpha)$ (boundedly many) gets a different *duplex label* ${\operatorname{label}}_2(k+1,\beta):=(\ell,m), m=m(\beta)\in\{1,2,\ldots ,M \}$. Then we have the following: if $(k+1,\gamma)$ and $(k+1,\sigma)$, $\gamma\neq\sigma$, have the same primary label $\ell\in \{0, \ldots ,L\}$, they are not in conflict.
We next define new dyadic points $z^k_\alpha$ of generation $k$ by selecting them from the set of reference points of generation $k+1$. We will first allow this selection with only little restriction and then consider a more specific choice.
\[general:rule\] For every $k\in{\mathbb{Z}}$, pick $\ell=\ell_k\in \{ 0, \ldots ,L\}$ which we refer to as the master label. For every $\alpha$, check if ${\operatorname{label}}_1(k,\alpha)=\ell$. If so, pick any $(k+1,\beta)\leq (k,\alpha)$ and declare that $(k,\alpha)\searrow (k+1,\beta)$ and $(k,\alpha)\not\searrow (k+1,\gamma)$ for every $\gamma\neq \beta$. Also decree that $z^k_\alpha:=x^{k+1}_\beta$.
Otherwise, pick some $(k+1,\beta)\leq (k,\alpha)$ with $\rho(x^{k+1}_\beta,x^k_\alpha)<\delta^{k+1}$ (such a child always exists) and declare that $(k,\alpha)\searrow (k+1,\beta)$ and $(k,\alpha)\not\searrow (k+1,\gamma)$ for every $\gamma\neq \beta$. Also decree that $z^k_\alpha:=x^{k+1}_\beta$. Note that, by construction, every $(k,\alpha)$ is related to some $(k+1,\beta)$ by the relation $\searrow$ but it may or may not be related to any $(k-1,\sigma)$.
The point sets obtained from the reference points by the general selection rule have the distribution property of Theorem \[thm:cubes\]:
\[dyadic\_points\] Set $c_0:=(4A_0^2)^{-1}$ and $C_0:=2A_0$. Let $\{z^k_\alpha\}$ be the set of new dyadic points obtained by the general selection rule from the reference points. Then, for every $k\in {\mathbb{Z}}$ we have $$\label{distribution;points}
\rho (z_\alpha^k, z_\beta^k)\geq c_0\delta^k, \, \alpha\neq \beta ,$$ and for every $x\in X$ and every $k\in {\mathbb{Z}}$ we find $\alpha$ such that $$\label{distribution;point}
\rho (x,z_\alpha^k)< C_0\delta^k .$$
Let us fix $k\in {\mathbb{Z}}$ and $\ell=\ell_k\in \{ 0, \ldots ,L\}$. By the general selection rule, $z_\alpha^k=x_{\gamma}^{k+1}$ and $z_\beta^k=x_{\sigma}^{k+1}$ for some reference points $x_{\gamma}^{k+1}$ and $x_{\sigma}^{k+1}$. First assume that at least one of the reference points $x_{\alpha}^{k}$ and $x_{\beta}^{k}$ has primary label different from the master label $\ell$. We may, without loss of generality, assume that ${\operatorname{label}}_1(k,\alpha)\neq \ell$. This implies $\rho(z_{\alpha}^{k},x_{\alpha}^k)<\delta^{k+1}$. Since $(k+1,\sigma)$ is not a child of $(k,\alpha)$, we have $\rho(z_{\beta}^{k},x_{\alpha}^k)\geq (2A_0)^{-1}\delta^{k}$. Thus, $$(2A_0)^{-1}\delta^{k}\leq \rho(z_{\beta}^{k},x_{\alpha}^k)\leq A_0\rho(x_{\alpha}^k,z_{\alpha}^{k})+A_0\rho(z_{\alpha}^{k},z_{\beta}^k)\leq A_0\delta^{k+1}+A_0\rho(z_{\alpha}^{k},z_{\beta}^k),$$ or equivalently, by (\[def;b0\]), $$\rho(z_{\alpha}^{k},z_{\beta}^k)\geq \frac{1}{A_0}\left( \frac{\delta^k}{2A_0}-A_0\delta^{k+1}\right) =\left(\frac{1}{2A_0^2}-\delta \right)\delta^k >c_0\delta^k .$$ Otherwise, both $x_{\alpha}^{k}$ and $x_{\beta}^{k}$ have primary label $\ell$. In this case, the points $x_{\alpha}^k$ and $x_{\beta}^k$ are not neighbours and there is no conflict between their children. The first assertion follows.
Fix $x\in X$. There exists $\alpha$ such that $\rho (x,x_{\alpha}^k)<\delta^k$ where $x_{\alpha}^k$ is a reference point. Point $z_{\alpha}^k$ is a child of $x_{\alpha}^k$ thus, $\rho(x_{\alpha}^k,z_{\alpha}^k)<\delta^k$. It follows that $$\rho (x,z_{\alpha}^k)\leq A_0\rho (x,x_{\alpha}^k)+A_0\rho (x_{\alpha}^k,z_{\alpha}^k)< A_0\delta^k+A_0\delta^k = 2A_0\delta^k .$$
\[spesific;rule\] Fix $(\ell,m)\in \{0, \ldots ,L\}\times \{1, \ldots ,M\}$. For every index pair $(k,\alpha)$, check whether there exists $(k+1,\beta)\leq (k,\alpha)$ with label pair $(\ell,m)$. If so, decree that $z^k_\alpha:=x_\beta^{k+1}$. Otherwise, pick some $(k+1,\beta)\leq (k,\alpha)$ with $\rho(x_{\beta}^{k+1},x_{\alpha}^k)<\delta^{k+1}$ and decree $z_\alpha^k:=x_\beta^{k+1}$.
Note that the specific selection rule is more precise than the general selection rule. Indeed, in case a reference point has primary label same as the master label $\ell$, we do not just choose any child but the one with duplex label $(\ell,m)$ (if one exists). Thus, it is a special case of the general selection rule. In particular, the point sets obtained from the reference points by the specific selection rule satisfy the distribution properties of Lemma \[dyadic\_points\].
Let $\varphi$ be a bijection $\{0, \ldots ,L\}\times \{1, \ldots ,M\}\to \{1, \ldots ,K\}\subset {\mathbb{N}}$, $(\ell,m)\mapsto t$. We identify $t=\varphi(\ell ,m)$ with $(\ell,m)$. Each $t$ gives rise to a set $\{^t\!z_\alpha^k : k\in {\mathbb{Z}}, \alpha\in \mathscr{A}_k\}$ of new dyadic points associated with the duplex label $(\ell,m)=t$. Note that, by repeating the specific selection rule for every ordered pair of labels $(\ell,m)$, Lemma \[dyadic\_points\] and Theorem \[thm:cubes\] complete the proof of the first part of Theorem \[thm:adjacent;systems\]. We denote by $\mathscr{D}^t$ the family of dyadic cubes $Q^k_\alpha ={} ^t\! Q^k_\alpha$ corresponding to the point set $\{^t\!z_\alpha^k : k\in {\mathbb{Z}}, \alpha\in \mathscr{A}_k\}$, $t=1,\ldots, K$.
The collection of dyadic families $\mathscr{D}^t$, $t=1,\ldots, K$, obtained by repeating the specific selection rule with all the choices of $(\ell ,m)$ further have the following property:
\[prop;cubeandball\] For every ball $B=B(x,r)\subseteq X$ there exist an integer $t$ and a dyadic cube $Q\in \mathscr{D}^t$ such that $$B\subseteq Q\quad\text{and}\quad \operatorname{diam}(Q)\leq C\,r,$$ where $C=C(A_0,\delta)$ is a constant independent of $x$ and $t$.
Note that the proof will show that for $r$ with $\delta^{k+2}< r \leq \delta^{k+1}$, we may assume that the containing cube $Q\in \mathscr{D}^t$ is of generation $k$. Further, $\rho(x,z_\alpha^k)<\delta^{k+1}$ where $z_\alpha^k$ denotes the center of $Q$. Also note that this is the second part of Theorem \[thm:adjacent;systems\].
Fix $B(x,r)\subseteq X, r>0$, and pick $k\in {\mathbb{Z}}$ so that $\delta^{k+2}< r \leq \delta^{k+1}$. There exists a reference point $x_\beta^{k+1}$ with duplex label, say $(\ell,m)$, such that $$\rho (x,x_\beta^{k+1})<\delta^{k+1} .$$ Let $\alpha$ be the unique index for which $(k+1,\beta)\leq (k,\alpha)$. Then $x_{\beta}^{k+1}={} ^t\!z_{\alpha}^{k}$ which is a new dyadic point of generation $k$ in the system $\mathscr{D}^t$, $t=(\ell,m)$. We will prove that $B(x,r)\subseteq B({} ^t\!z_\alpha^{k},c_1\delta^{k})$ where $c_1=(3A_0^2)^{-1}c_0=(12A_0^4)^{-1}$. Indeed, suppose $y\in B(x,r)$. Then $$\rho (y,{} ^t\!z_\alpha^{k})\leq A_0\rho(y,x)+A_0\rho(x,{} ^t\!z_\alpha^{k})<A_0r+A_0\delta^{k+1}\leq 2A_0\delta^{k+1} \leq c_1\delta^{k},$$ since $24A_0^5\delta \leq 1$. Thus, $y\in Q:={} ^tQ^{k}_\alpha\in \mathscr{D}^t$, $t=(\ell,m)$. For the diameter of $Q$ we get $$\operatorname{diam}(Q)\leq \operatorname{diam}\big(B({} ^t\!z_\alpha^{k},C_1\delta^{k})\big) \leq 2A_0C_1\delta^{k} =\frac{2A_0C_1}{\delta^{2}}\delta^{k+2}\leq Cr,$$ with $C:=2A_0C_1\delta^{-2} = 8A_0^3\delta^{-2}$.
Given $x_0\in X$, recall from \[existence;dyadicpoints\] that the set of reference points can be chosen in such a way that for every $k\in {\mathbb{Z}}$ there exists $\alpha$ such that $x^k_\alpha =x_0$. Fix $(\ell,m)\in \{0, \ldots ,L\}\times \{1, \ldots ,M\}$. For every $k$, begin with $x_0=x^k_\alpha$ and decree that $z^k_\alpha :=x_0$. For every $\beta\neq \alpha$, choose the new points $z^k_\beta$ by the specific selection rule, as defined earlier.
Note that the specific selection rule with a distinguished point is again a special case of the general selection rule. It is not, however, a special case of the specific selection rule. Hence, we need to verify that the dyadic systems, obtained by repeating the specific selection rule with a distinguished point with all the choices of $(\ell,m)$ also satisfy the assertions of Lemma \[prop;cubeandball\]:
\[dyadic\_points\_x0\] Given a fixed point $x_0\in X$, there exist finitely many point sets $\{ z^k_\alpha \}_{k, \alpha}$ such that each of them satisfy the assertions of Lemma \[dyadic\_points\] and further have the property that for every $k\in {\mathbb{Z}}$ there exists $\alpha$ such that $z^k_\alpha =x_0$. In addition, the family of dyadic systems defined by these new dyadic points has the property of Lemma \[prop;cubeandball\].
Note that the proof will show that for $r$ with $\delta^{k+2}< r \leq \delta^{k+1}$, we may assume that the containing cube $Q\in \mathscr{D}^t$ is of generation $k-1$. Further, $\rho(x,z_\alpha^k)<2A_0\delta^{k}$ where $z_\alpha^k$ denotes the center point of $Q$. Also note that Lemma \[dyadic\_points\_x0\] completes the proof of Proposition \[prop:adjacent;systems\].
The assertions of Lemma \[dyadic\_points\] are clear, since we are still in the regime of the general selection rule. We consider the assertion of Lemma \[prop;cubeandball\]. Fix a ball $B=B(x,r)$ in $X$ with $\delta^{k+2}<r\leq \delta^{k+1}$. There exists a reference point $x^{k+1}_\beta$ such that $\rho(x,x^{k+1}_\beta)<\delta^{k+1}$.
Assume first that $x^{k}_\alpha = x_0$ for the unique $(k,\alpha)\geq (k+1,\beta)$. Then also $x^{k-1}_\gamma=x_0$ for the unique $(k-1,\gamma)\geq (k,\alpha)$ implying that $^t\!z^{k-1}_\gamma=x_0$ by the specific selection rule with a distinguished point with every $t=(\ell,m)$. Take $y\in B(x,r)$. Then $$\begin{split}
\rho(y,{} ^t\!z^{k-1}_\gamma) &=\rho(y,x_0)\leq A_0^2\rho(y,x)+A_0^2\rho(x,x^{k+1}_\beta)+A_0\rho(x^{k+1}_\beta,x_0)<A_0^2r+A_0^2\delta^{k+1}+A_0\delta^{k}\\
&\leq \big(2A_0^2\delta^2+A_0\delta)\delta^{k-1}
\leq\left(2A_0^2\frac{1}{24^2A_0^{10}}+A_0\frac{1}{24 A_0^5}\right)\delta^{k-1}<\frac{1}{12A_0^4}\delta^{k-1}=c_1\delta^{k-1}
\end{split}$$ since $24A_0^5\delta \leq 1$ and $c_1=(3A_0^2)^{-1}c_0=(12A_0^4)^{-1}$. Thus, $y\in Q:={} ^tQ^{k-1}_\gamma$ for any $t$. For the diameter of $Q$ we have $$\operatorname{diam}(Q)\leq \operatorname{diam}\big(B({} ^t\!z_\gamma^{k-1},C_1\delta^{k-1})\big) \leq 2A_0C_1\delta^{k-1} =\frac{2A_0C_1}{\delta^{3}}\delta^{k+2}\leq Cr,$$ with $C:=2A_0C_1\delta^{-3} = 8A_0^3\delta^{-3}$.
If $x^{k}_\alpha \neq x_0$ for $(k,\alpha)\geq (k+1,\beta)$, then the new dyadic point ${} ^t\!z^{k}_{\alpha}$ is chosen among the $x^{k+1}_{\sigma}$ with $(k+1,\sigma)\leq(k,\alpha)$ exactly as in the specific selection rule (without a distinguished point). Thus, the reference point $x^{k+1}_\beta={}^t\!z^k_\alpha$ for $t={\operatorname{label}}_{2}(k+1,\beta)$, and the proof is completed by same argument as in Lemma \[prop;cubeandball\].
Random dyadic systems
=====================
In this section we will prove the following theorem, originally from [@HM09]. The present contribution consists of a detailed and streamlined construction of the underlying probability space $\Omega$, the details of which already turned out helpful in an application to singular integrals in [@Henri:10].
\[thm:section5\] Given a set of reference points $\{x^k_\alpha \},k\in {\mathbb{Z}}, \alpha\in\mathscr{A}_k$, suppose that constant $\delta\in (0,1)$ satisfies $96A_0^6\delta\leq 1$. Then there exists a probability space $(\Omega ,{\mathbb{P}})$ such that every $\omega\in \Omega$ defines a dyadic system $\mathscr{D}(\omega)=\{Q^k_\alpha (\omega)\}_{k, \alpha}$, related to new dyadic points $\{z^k_\alpha (\omega)\}_{k,\alpha}$, with the properties – of Theorem \[thm:cubes\]. Further, the probability space $(\Omega,{\mathbb{P}})$ has the following properties: [ $$\begin{aligned}
\label{ProbSpace:one}
\quad \Omega &=&\prod_{k\in {\mathbb{Z}}}\Omega_k; \quad \omega =(\omega_k)_{k\in {\mathbb{Z}}}\in \Omega \text{ with coordinates $\omega_k\in \Omega_k$ which are independent};\\
\quad z^k_\alpha(\omega) &=& z^k_\alpha (\omega_k)\label{ProbSpace:three};\end{aligned}$$]{} $$\label{ProbSpace:two}
\hspace*{-3cm}\text{if $(k+1,\beta)\leq (k,\alpha)$, then } {\mathbb{P}}(\{\omega\in \Omega\colon z^k_\alpha(\omega)=x^{k+1}_\beta \})\geq \tau_0>0.$$
In this chapter we will construct a probability space $(\Omega,{\mathbb{P}})$ by randomizing the choice of new dyadic points from the reference points with respect to all the possible degrees of freedom. The properties – can, however, be obtained with much less randomness. We will return to this in Section \[sec:adjRandom\].
We will first state the following theorem which presents the general properties of all the random dyadic systems with the properties –. For the slightly different random systems originally constructed in [@HM09], the property below was already established; its consequences stated as and were observed and applied in [@HLYY].
\[probabilistic:statements\] Given a set of reference points $\{x^k_\alpha \},k\in {\mathbb{Z}}, \alpha\in\mathscr{A}_k$, suppose that constant $\delta\in (0,1)$ satisfies $144A_0^8\delta\leq 1$. Suppose $(\Omega,{\mathbb{P}})$ is any probability space such that every $\omega\in \Omega$ defines a dyadic system $\mathscr{D}(\omega)=\{Q^k_\alpha (\omega)\}_{k, \alpha}$, related to new dyadic points $\{z^k_\alpha (\omega)\}_{k,\alpha}$, with the properties – of Theorem \[thm:cubes\]. Suppose further that the space $(\Omega ,{\mathbb{P}})$ has the properties – of Theorem \[thm:section5\]. Then the following probabilistic statements hold:
For every $x\in X, \tau>0$ and $k\in {\mathbb{Z}}$, $$\label{property:prob;small}
{\mathbb{P}}\big( \{\omega\in \Omega\colon x\in \bigcup_{\alpha}\partial_{\tau\delta^k}Q^k_\alpha (\omega) \} \big) \leq C_2\tau^\eta
\text{ for some $C_2,\eta >0$},$$ where $$\partial_\varepsilon Q:=\{x\in \bar{Q}\colon \rho(x,\tilde{Q}^c)\leq \varepsilon \},\; \varepsilon>0;$$
For every $x\in X$, $$\label{property:prob;zero}
{\mathbb{P}}\big( \{\omega\in \Omega\colon x\in \bigcup_{k,\alpha}\partial Q^k_\alpha (\omega) \} \big) =0;$$
Given a positive $\sigma$-finite measure $\mu$ on $X$, $$\label{property:measure;zero}
\mu \big( \bigcup_{k,\alpha}\partial Q^k_\alpha (\omega) \big) =0 \text{ for a.e. $\omega\in \Omega$}.$$
The probability space {#prob;space}
---------------------
Keeping with the fixed set $\{x^k_\alpha\}$, $k\in {\mathbb{Z}}$, $\alpha\in \mathscr{A}_k$, of reference points, we randomize the construction of new dyadic points from them. This amounts to formalizing the underlying space of all possible choices of new dyadic points allowed by the general selection rule, and then defining a natural probability measure on this space. The underlying probability space $\Omega$ will be formed by countable products and unions of finite probability spaces as follows: $$\begin{aligned}
\Omega := \prod_{k\in {\mathbb{Z}}}\Omega_k; \qquad
\Omega_k: =\bigcup_{\ell_k\in \{0,\ldots ,L \} }
\Big(\{\ell_k\}\quad &\times\prod_{\alpha\in \mathscr{A}_k\atop {\operatorname{label}}_1(k,\alpha)=\ell_k} \{\gamma\colon (k+1,\gamma)\leq (k,\alpha)\} \\
&\times \prod_{\alpha\in \mathscr{A}_k\atop {\operatorname{label}}_1(k,\alpha)\neq\ell_k}
\{\gamma\colon \rho(x^{k+1}_\gamma,x^k_\alpha)<\delta^{k+1}\}\Big).\end{aligned}$$
For the finite sets $\{\gamma\colon (k+1,\gamma)\leq (k,\alpha)\}$ and $\{\gamma\colon \rho(x^{k+1}_\gamma,x^k_\alpha)<\delta^{k+1}\}$, we use the $\sigma$-algebras consisting of all sub-sets. The $\sigma$-algebra $\mathscr{G}_k$ of the set $\Omega_k$ is the $\sigma$-algebra generated by these sets. We will further consider $$\mathscr{H}_k:= \Big\{ \prod_{j<k}\Omega_j\times G_k \times \prod_{j>k}\Omega_j\colon G_k\in \mathscr{G}_k\Big\} ,\qquad k\in{\mathbb{Z}}.$$ Then $\sigma$-algebra $\mathscr{H}$ of $\Omega$ is the one generated by the $\sigma$-albegras $\mathscr{H}_k$.
The points $\omega\in\Omega$ admit the natural coordinate representation $\omega=(\omega_k)_{k\in{\mathbb{Z}}}$, where moreover $$\omega_k=(\ell_k;\omega_{k,\alpha}:\alpha\in\mathscr{A}_k)\in\Omega_k,$$ where $\ell_k\in\{0,\ldots,L\}$ and each $\omega_{k,\alpha}\in\mathscr{A}_{k+1}$ satisfies $(k+1,\omega_{k,\alpha})\leq(k,\alpha)$, as well as $\rho(x^{k+1}_{\omega_{k,\alpha}},x^k_\alpha)<\delta^{k+1}$ if ${\operatorname{label}}_1(k,\alpha)\neq\ell_k$.
We define a probability ${\mathbb{P}}$ on $\Omega$ by requiring the coordinates $\omega_k$ to be independent and distributed as follows: First, $${\mathbb{P}}(\ell_k=\ell)=\frac{1}{L+1}\qquad \forall\, \ell=0,\ldots,L.$$ Second, given the master label $\ell_k$, the subcoordinates $\omega_{k,\alpha}$, $\alpha\in\mathscr{A}_k$, are again independent, with distribution $$\begin{aligned}
{\mathbb{P}}(\omega_{k,\alpha} &=\beta |\ell_k=\ell) \\
&=\begin{cases}
[\#\{ \gamma\colon (k+1,\gamma)\leq (k,\alpha)\}]^{-1}\quad \forall (k+1,\beta)\leq (k,\alpha), &\text{if } {\operatorname{label}}_1(k,\alpha)=\ell_k, \\
[\#\{ \gamma\colon \rho(x^{k+1}_\gamma ,x^k_\alpha)<\delta^{k+1}\}]^{-1}\quad \!\!\forall(k+1,\beta):\rho(x^{k+1}_\beta ,x^k_\alpha)<\delta^{k+1}, &\text{if } {\operatorname{label}}_1(k,\alpha)\neq \ell_k.
\end{cases}\end{aligned}$$
Note that there is an obvious one-to-one correspondence between the coordinates $\omega_k\in\Omega_k$ and the admissible choices of the relation $\searrow$ between index pairs on levels $k$ and $k+1$, subject to the general selection rule. This relation in turn uniquely determines the new dyadic points $z^k_{\alpha}=z^k_{\alpha}(\omega_k)$ for the given level $k\in{\mathbb{Z}}$, and thus the choice of $\omega=(\omega_k)_{k\in{\mathbb{Z}}}$ uniquely determines the new dyadic points $z^k_{\alpha}=z^k_{\alpha}(\omega)$ on all levels $k\in{\mathbb{Z}}$. By a random choice of the new dyadic points, we understand the new dyadic points $z^k_{\alpha}(\omega)$, where $\omega\in\Omega$ is distributed according to the probability ${\mathbb{P}}$.
Once the points $z^k_{\alpha}(\omega)$ are chosen, they uniquely determine the relation $\leq_{\omega}$ between the index pairs $(k,\alpha)$ (not to be confused with the original relation $\leq$, which is in general not the same); recall that it is possible to make the choice of $\leq_{\omega}$ in such a way that it only depends on the dyadic points without any arbitrariness. Then the points $z^k_{\alpha}(\omega)$ and the relation $\leq_{\omega}$ together determine the new dyadic cubes $Q^k_{\alpha}(\omega)$ as a function of $\omega\in\Omega$, and their random choice corresponds to the random choice of $\omega$ according to the law ${\mathbb{P}}$.
It is evident, by Lemma \[dyadic\_points\], that for every $\omega\in\Omega$, the dyadic system $\mathscr{D}(\omega)$ satisfies the properties – of Theorem \[thm:cubes\].
Note that by construction, for every $(k+1,\beta)\leq (k,\alpha)$, $${\mathbb{P}}(\{\omega\in \Omega\colon z^k_\alpha(\omega)=x^{k+1}_\beta\})\geq [(L+1)\#\{\gamma\colon (k+1,\gamma)\leq (k,\alpha)\}]^{-1}\geq [(L+1)M]^{-1}=:\tau_0>0.$$ This completes the proof of Theorem \[thm:section5\].
A technical lemma
-----------------
Before turning to a more thorough investigation of the random dyadic cubes as just defined, we provide a technical lemma, which has nothing to do with the randomness, but is a general property of all dyadic systems. However, we will only make use of this lemma in the randomized context, which is the reason of including it in this section. Roughly speaking, the lemma states that in order to reach the boundary of a cube from its centre, along a direct line of ancestry of dyadic points, one needs to make jumps of non-trivial size at every step. This result goes back to Christ [@Christ90], and appeared as part of the proof of his Lemma 17. Christ’s lemma concerned the smallness of the boundary region of the dyadic cubes with respect to an underlying doubling measure; the technical intermediate result is valid even without the presence of a measure, and we will apply it to get analogous smallness results for the boundary with respect to the probability ${\mathbb{P}}$ defined above.
\[lem:technical\] Suppose that constants $0<c_0\leq C_0 <\infty$ and $\delta \in (0,1)$ satisfy $18A_0^5C_0\delta \leq c_0$. Let $\{z^k_{\alpha}\}_{k,\alpha}$ be a set of points as in Theorem \[thm:cubes\]. Given $N\in{\mathbb{Z}}_+$ and $\tau >0$, suppose that $12A_0^4\tau\leq c_0\delta^N$. Let $x\in\bar{Q}^k_{\alpha}$ with $\rho(x,(\tilde{Q}^k_{\alpha})^c)<\tau\delta^k$. For all chains $$(k+N,\sigma)=(k+N,\sigma_{k+N})
\leq\ldots\leq (k+1,\sigma_{k+1})\leq (k,\sigma_k)$$ such that $x\in\bar{Q}^{k+N}_{\sigma}$, there holds $\rho(z^j_{\sigma_j},z^i_{\sigma_i})\geq{\varepsilon}_1\delta^j$, ${\varepsilon}_1:=(12A_0^4)^{-1}c_0$, for all $k\leq j<i\leq k+N$.
Let $(k,\alpha)$ be fixed and consider $x\in \bar{Q}_\alpha^k$ with $\rho(x,(\tilde{Q}^k_{\alpha})^c)<\tau\delta^k$ for some $\tau >0$. Let $(j,\sigma_j)$ be the intermediate pairs as in the assertion, and abbreviate $z^j:=z^j_{\sigma_j}$ for $k\leq j\leq k+N$. Suppose for contradiction that $\rho(z^j,z^i)<{\varepsilon}_1\delta^j$ for some $k\leq j<i\leq k+N$. There are two possibilities: $\sigma_k=\alpha$ or not.
First assume $\sigma_k=\alpha$ (i.e. the chain travels in $Q_\alpha^k$). Then, as $x\in\bar{Q}^{k+N}_{\sigma}\subset\bar{Q}^{i}_{\sigma_i}$, also $x\in B(z^i,C_1\delta^i)$ for $(i,\sigma_i)\geq (k+N,\sigma)$. We also have $B(z^j,c_1\delta^j)\subseteq\tilde{Q}^j_{\sigma_j}\subseteq\tilde{Q}_\alpha^k$, and so it follows that $$\begin{split}
c_1\delta^j\leq\rho(z^j,(\tilde{Q}_\alpha^k)^c)
&\leq A_0\rho(x,(\tilde{Q}_\alpha^k)^c)+A_0^2\rho(x,z^i)+A_0^2\rho(z^i,z^j) \\
&< A_0\tau\delta^k+A_0^2 C_1\delta^i+A_0^2{\varepsilon}_1\delta^j
\leq \frac{1}{4}c_1\delta^{N+k}+\frac{1}{3}c_1\delta^{i-1}+\frac{1}{4}c_1\delta^{j}
\leq c_1\delta^j,
\end{split}$$ since $c_1:=(3A_0^2)^{-1}c_0$, $C_1:=2A_0C_0$, $4A_0^2\tau\leq c_1\delta^N$, $3A_0^2 C_1\delta\leq c_1$ and $4A_0^2{\varepsilon}_1\leq c_1$, and this is a contradiction.
If $\sigma_k\neq\alpha$ (and the chain travels outside $Q_\alpha^k$), we have $x\in\bar{Q}^{k+N}_{\sigma}\subseteq\bar{Q}^k_{\sigma_k}$ and $\rho(x,(\tilde{Q}^k_{\sigma_k})^c)=0<\tau\delta^k$. Thus we are in the identical situation as before but with $\sigma_k$ in place of $\alpha$. Hence the same conclusion applies.
The proof of Theorem \[probabilistic:statements\]
-------------------------------------------------
From now on, assume $(\Omega,{\mathbb{P}})$ is a probability space with the properties – of Theorem \[thm:section5\], and that $144A_0^8\delta\leq 1$.
For $\varepsilon >0$, we denote $$\partial_{\varepsilon}Q:=\{x\in \bar{Q}\colon \rho(x,\tilde{Q}^c)\leq \varepsilon \}.$$
We mention that if the space $(X,\rho)$ supports a doubling measure $\mu$, Lemma \[lem:technical\] has the following consequence [@Christ90 Lemma 17]: For every $\varepsilon >0$ there exists $\tau \in (0,1]$ such that for every dyadic cube $Q_\alpha^k$, $$\mu(\partial_{\tau\delta^k}Q^k_{\alpha})<{\varepsilon}\mu(Q^k_{\alpha}).$$ Here, we are concerned with the following probabilistic analogue:
\[lem:boundary\] For a given $x\in X$ and $\tau>0$ and a fixed $k\in {\mathbb{Z}}$, there holds $${\mathbb{P}}\Big(\Big\{ \omega\in \Omega\colon x\in \bigcup_{\alpha}\partial_{\tau\delta^k}Q^k_\alpha(\omega) \Big\} \Big)\leq C_2\tau^{\eta}$$ for some constants $C_2,\eta>0$.
Reduction
---------
We consider the event $$E= \Big\{ \omega\in \Omega\colon x\in \bigcup_{\alpha}\partial_{\tau\delta^k}Q^k_\alpha(\omega) \Big\} .$$ First note that for every $x\in X$ and $k\in {\mathbb{Z}}$, there exists a finite set $A=A_k(x)$ of indices such that if $x\in \bar{Q}^k_\alpha(\omega)$ for any $\omega\in \Omega$, it follows that $\alpha\in A_k(x)$. Moreover, $\# A_k(x)\leq C<\infty$ where $C$ is independent of $x$ and $k$. Indeed, if $x\in \bar{Q}^k_\alpha(\omega)$ we have $\rho(x,z^k_\alpha(\omega))<C_1\delta^k$, and thus $$\rho(x,x^k_\alpha)\leq A_0\rho(x,z^k_\alpha(\omega))+A_0\rho(z^k_\alpha(\omega),x^k_\alpha) <A_0(C_1+1)\delta^k,$$ since $\rho(z^k_\alpha(\omega),x^k_\alpha)<\delta^k$ by the choice of $z^k_\alpha(\omega)$. By the geometric doubling property, the ball $B(x,A_0(C_1+1)\delta^k)$ can contain at most boundedly many centres $x^k_\alpha$ of the disjoint balls $$B(x^k_\alpha,(2A_0)^{-1}\delta^k).$$
In particular, if $x\in \bigcup_{\alpha}\partial_{\tau\delta^k}Q^k_\alpha(\omega) $, then $x\in \bigcup_{\alpha\in A_k(x)}\partial_{\tau\delta^k}Q^k_\alpha(\omega) $ where $\# A_k(x)\leq C<\infty$ and $C$ is independent of $x$ and $k$. Since the closed dyadic cubes of any generation $k+N$ cover $X$, it follows that $$\begin{split}
E &= \Big\{ \omega\in \Omega\colon x\in \Big(\bigcup_{\alpha}\partial_{\tau\delta^k}Q^k_\alpha(\omega)\Big) \cap \Big(\bigcup_{\sigma}\bar{Q}^{k+N}_\sigma(\omega)\Big)\Big\}\\
& =\Big\{ \omega\in \Omega\colon x\in
\Big(\bigcup_{\alpha\in A_k(x)}\partial_{\tau\delta^k}Q^k_\alpha(\omega)\Big) \cap \Big(\bigcup_{\sigma\in A_{k+N}(x)}\bar{Q}^{k+N}_\sigma(\omega)\Big) \Big\}\\
&=\Big\{ \omega\in \Omega\colon x\in
\bigcup_{\alpha\in A_k(x)\atop \sigma\in A_{k+N}(x)} \Big(\partial_{\tau\delta^k}Q^k_\alpha(\omega) \cap \bar{Q}^{k+N}_\sigma(\omega)\Big) \Big\}.
\end{split}$$ Here the union is bounded, and we have $${\mathbb{P}}(E)\leq \sum_{\alpha\in A_k(x)\atop \sigma\in A_{k+N}(x)}{\mathbb{P}}\left(\left\{ \omega\in \Omega\colon x\in \partial_{\tau\delta^k}Q^k_\alpha(\omega)\cap \bar{Q}^{k+N}_\sigma(\omega) \right\} \right).$$ Thus, in order to prove Lemma \[lem:boundary\], it suffices to prove that $${\mathbb{P}}\left(\left\{ \omega\in \Omega\colon x\in \partial_{\tau\delta^k}Q^k_\alpha(\omega)\cap \bar{Q}^{k+N}_\sigma(\omega) \right\} \right)\leq C_2\tau^{\eta}$$ for some constants $C_2,\eta>0$ with fixed $x\in X$, $\tau>0$, $N\in {\mathbb{N}}$, $k\in {\mathbb{Z}}$, $\alpha$ and $\sigma$.
We first state the following basic probability lemma, which we have included for the convenience of readers less experienced with conditional expectations; this is essentially the only place where probabilistic reasoning beyond standard measure theory will be needed.
\[lem:conditional;exp\] Let $\{\mathscr{F}_j\}$, $j=1, \ldots , k$, be a finite collection of $\sigma$-algebras and suppose that $\mathscr{F}_{j+1}\subseteq\mathscr{F}_j$ and $A_j\in\mathscr{F}_j$ for all $j$. Then $${\mathbb{E}}\prod_{j=1}^{k-1}\chi_{A_j}={\mathbb{E}}{\mathbb{E}}_{\mathscr{F}_{k}}\chi_{A_{k-1}}{\mathbb{E}}_{\mathscr{F}_{k-1}}\chi_{A_{k-2}}\ldots
{\mathbb{E}}_{\mathscr{F}_{2}}\chi_{A_{1}}$$ where ${\mathbb{E}}_{\mathscr{F}_j}[\,\cdot\,]:={\mathbb{E}}[\; \cdot \; \vert \mathscr{F}_j]$ denotes the conditional expectation given $\mathscr{F}_j$.
By the properties of conditional expectation, see for example [@williams], §9.7, $${\mathbb{E}}\Big(\prod_{j=1}^{k-1}\chi_{A_j}\Big)
={\mathbb{E}}\, \Big({\mathbb{E}}_{\mathscr{F}_{k}} \Big[\prod_{j=1}^{k-1}\chi_{A_j}\Big]\Big) .$$ First we use the so-called Tower Property: Since $\mathscr{F}_{k}\subseteq \mathscr{F}_{k-1}$, there holds $$\label{first;step}
{\mathbb{E}}_{\mathscr{F}_{k}} \Big[\prod_{j=1}^{k-1}\chi_{A_j}\Big]
= {\mathbb{E}}_{\mathscr{F}_{k}} \Big[{\mathbb{E}}_{\mathscr{F}_{k-1}}\Big[\prod_{j=1}^{k-1}\chi_{A_j}\Big]\Big] .$$ Secondly, the fact that $\chi_{A_{k-1}}$ is $\mathscr{F}_{k-1}$-measurable implies that $$\label{second;step}
{\mathbb{E}}_{\mathscr{F}_{k-1}}\Big[\prod_{j=1}^{k-1}\chi_{A_j}\Big]
= \chi_{A_{k-1}}{\mathbb{E}}_{\mathscr{F}_{k-1}} \Big[\prod_{j=1}^{k-2}\chi_{A_j}\Big] .$$ We now repeat steps and $k-1$ times to conclude that $${\mathbb{E}}\Big(\prod_{j=1}^{k-1}\chi_{A_j}\Big) =
{\mathbb{E}}\big({\mathbb{E}}_{\mathscr{F}_k}[\chi_{A_{k-1}}{\mathbb{E}}_{\mathscr{F}_{k-1}}[\chi_{A_{k-2}}\ldots
\chi_{A_{2}}{\mathbb{E}}_{\mathscr{F}_{2}}[\chi_{A_1}]\ldots]\big).\qedhere$$
Fix $x\in X$ and $k\in {\mathbb{Z}}$. Given $\tau\in(0,(4A_0^2)^{-1}c_1)$, pick the unique $N\in{\mathbb{N}}:=\{0,1,\ldots \}$ so that $c_1\delta^{N+1}< 4A_0^2\tau\leq c_1\delta^N$. (Since any probability is at most $1$, the claim is of course true for any $\eta$ when $\tau\geq (4A_0^2)^{-1}c_1$, taking large enough $C_2$.) Note that, in particular, $12A_0^4\tau \leq c_0\delta^N$ since $c_1:=(3A_0^2)^{-1}c_0$. Also note that, by the assumption $144A_0^8\delta\leq 1$, we have $18A_0^5C_0\delta\leq c_0$ since $c_0=(4A_0^2)^{-1}$ and $C_0=2A_0$. Thus, the parameter assumptions of Lemma \[lem:technical\] hold. By the reduction in \[reduction\], it suffices to consider the event $$E_{\alpha,\sigma}:=\Big\{ \omega\in \Omega\colon x\in \partial_{\tau\delta^k}Q^k_\alpha(\omega)\cap \bar{Q}^{k+N}_\sigma(\omega) \Big\}$$ for fixed $\alpha$ and $\sigma$.
Let $\sigma=:\sigma_{k+N}$. For every $j=k, k+1,\ldots ,k+N-1$, let us denote $$A_j:=\{\omega\in \Omega \colon \rho(z^j_{\sigma_j}(\omega),z^{j+1}_{\sigma_{j+1}}(\omega))\geq\varepsilon_1\delta^j \text{ for } (j,\sigma_j)\geq_{\omega} (j+1,\sigma_{j+1})\geq_{\omega}(k+N,\sigma)\}$$ where $\varepsilon_1:=(2A_0)^{-2}c_1$ is the constant from Lemma \[lem:technical\]. Note that the sets $A_j$ only depend on the choice of points of levels from $k+N$ to $j$ and, by , the choice of these points only depend on $\Omega_j$ for $j=k, k+1,\ldots ,k+N-1$. By Lemma \[lem:technical\], it particularly holds that $$E_{\alpha,\sigma}\subseteq \bigcap_{j=k}^{k+N-1}A_j .$$ Let us denote by $$\mathscr{F}_j := \sigma \Big(\mathscr{H}_i\colon i\geq j \Big),$$ the $\sigma$-algebra generated by the class of subsets of $\Omega$ with the points of level $i\geq j$ fixed. Note that $$A_j\in \mathscr{F}_j\text{ for every $j=1, \ldots ,N$ and } \mathscr{F}_{j+1}\subseteq \mathscr{F}_{j}\text{ for every }j=k,\ldots, k+N-1.$$ By Lemma \[lem:conditional;exp\], we have $$\label{eq:the;chain}
\begin{split}
{\mathbb{P}}(E_{\alpha ,\sigma}) & ={\mathbb{E}}(\chi_{E_{\alpha ,\sigma}})\leq {\mathbb{E}}\Big(\prod_{j=k}^{k+N-1}\chi_{A_j}\Big)\\
& ={\mathbb{E}}{\mathbb{E}}_{\mathscr{F}_{k+N}}\chi_{A_{k+N-1}}{\mathbb{E}}_{\mathscr{F}_{k+N-1}}\chi_{A_{k+N-2}}\ldots
{\mathbb{E}}_{\mathscr{F}_{k+1}}\chi_{A_{k}} .
\end{split}$$ We first calculate $${\mathbb{E}}_{\mathscr{F}_{k+1}} [\chi_{A_k}] = {\mathbb{P}}( A_k\vert \mathscr{F}_{k+1} ) .$$ Note that for a given index pair $(k+1,\sigma_{k+1})$, there always exists a reference point $x^{k+1}_\gamma$ such that $\rho(x^{k+1}_\gamma,z^{k+1}_{\sigma_{k+1}}(\omega))<\delta^{k+1}<\varepsilon_1\delta^k$. On the other hand, by , there is a positive probability $\tau_0$ that $x^{k+1}_\gamma=z^k_{\gamma}(\omega)$. Thus, for a given index pair $(k+1,\sigma_{k+1})$, there is a positive probability that the pair $(k,\sigma_k)$ for which $(k,\sigma_k)\geq_\omega (k+1,\sigma_{k+1})$ satisfies $\rho(z^{k}_{\sigma_{k}},z^{k+1}_{\sigma_{k+1}})<\varepsilon_1\delta^k$. Since the negation for the event $A_k$ with given $\mathscr{F}_{k+1}$ is that for some index pair $(k+1,\sigma_{k+1})$, the parent is within the distance $\varepsilon_1\delta^k$, we conclude with $$\label{third;step}
{\mathbb{E}}_{\mathscr{F}_{k+1}} \chi_{A_k} = {\mathbb{P}}( A_k\vert \mathscr{F}_{k+1} )\leq 1-\tau_0 ,\quad \tau_0>0.$$ Further, we have by the above, monotonicity and linearity $$\label{fourth;step}
{\mathbb{E}}_{\mathscr{F}_{k+2}}\Big[\chi_{A_{k+1}}{\mathbb{E}}_{\mathscr{F}_{k+1}} \chi_{A_k}\Big]
\leq {\mathbb{E}}_{\mathscr{F}_{k+2}}\Big[\chi_{A_{k+1}}(1-\tau_0) \Big] =(1-\tau_0){\mathbb{E}}_{\mathscr{F}_{k+2}}[\chi_{A_{k+1}}]$$ since $1-\tau_0$ is a constant. We now proceed backwards and travel from the end of the chain in repeating the steps in and $N-1$ times. Each time the term ${\mathbb{E}}_{\mathscr{F}_{k+i}} \chi_{A_i}$, $i=1, \ldots , N$ is estimated from above by constant $1-\tau_0\in (0,1)$, which can then be relocated by equation . What is obtained is the following: $${\mathbb{P}}(E_{\alpha,\sigma})\leq (1-\tau_0)^{N} <C_2\tau^\eta$$ with $C_2:=4A_0^2(c_1\delta)^{-1}$ and $\eta:=\log (1-\tau_0)/\log \delta>0$.
\[cor:pb;bdr:zero\] For $x\in X$, $${\mathbb{P}}\Big(\Big\{ \omega\in \Omega\colon x\in \cup_{\alpha ,k}\partial Q^k_\alpha(\omega) \Big\} \Big)=0.$$
Recall from that the cubes $\bar{Q}^k_\alpha$ and $\tilde{Q}^k_\alpha$ are the interior and closure of $Q^k_\alpha$, respectively. Thus, $$\partial Q^k_\alpha=\bar{Q}^k_\alpha \setminus \tilde {Q}^k_\alpha= \bar{Q}^k_\alpha\cap (\tilde {Q}^k_\alpha)^c \subseteq \{x\in\bar{Q}^k_\alpha\colon \rho(x,(\tilde {Q}^k_\alpha)^c)=0 \}.$$ It follows that, for any $\tau>0$ there holds $$\partial Q^k_\alpha\subseteq \{x\in\bar{Q}^k_\alpha\colon \rho(x,(\tilde {Q}^k_\alpha)^c)\leq \tau\delta^k \}=\partial_{\tau\delta^k}Q^k_\alpha.$$ Thus, $$\Big\{ \omega\in \Omega\colon x\in \cup_{\alpha}\partial Q^k_\alpha(\omega) \Big\}\subseteq
\Big\{ \omega\in \Omega\colon x\in \cup_{\alpha}\partial_{\tau\delta^k} Q^k_\alpha(\omega) \Big\} ,$$ and consequently, by Lemma \[lem:boundary\], $${\mathbb{P}}\Big(\Big\{ \omega\in \Omega\colon x\in \cup_{\alpha}\partial Q^k_\alpha(\omega) \Big\}\Big)\leq
{\mathbb{P}}\Big(\Big\{ \omega\in \Omega\colon x\in \cup_{\alpha}\partial_{\tau\delta^k} Q^k_\alpha(\omega) \Big\}\Big) \leq C_2\tau^\eta .$$ Thus, by passing $\tau$ to zero we obtain $${\mathbb{P}}\Big(\Big\{ \omega\in \Omega\colon x\in \cup_{\alpha}\partial Q^k_\alpha(\omega) \Big\}\Big)=0.$$ Finally, $${\mathbb{P}}\Big(\Big\{ \omega\in \Omega\colon x\in \cup_{\alpha ,k}\partial Q^k_\alpha(\omega) \Big\}\Big)\leq \sum_{k}{\mathbb{P}}\Big(\Big\{ \omega\in \Omega\colon x\in \cup_{\alpha}\partial Q^k_\alpha(\omega) \Big\}\Big)=0.$$
Assume that $\mu$ is a positive $sigma$-finite measure on $X$. Then $$\label{boundary:zero}
\mu\left( \cup_{\alpha ,k}\partial Q^k_\alpha (\omega) \right) = 0\quad\text{for a.e. $\omega\in\Omega$}.$$ In particular, given $\mu$ we may choose $\omega\in \Omega$ such that holds.
For a fixed $\omega\in\Omega$, denote $$B_\omega:=\bigcup_{\alpha ,k}\partial Q^k_\alpha (\omega),$$ and for a fixed $x\in X$, denote $$B^x:=\{\omega\in\Omega\colon x\in B_\omega \}.$$ By Fubini’s Theorem, $$\begin{split}
\int_{\Omega}\mu(B_\omega)\,d{\mathbb{P}}(\omega) &= \int_{\Omega}\int_{X}\chi_{B_\omega}(x)\,d\mu(x)d{\mathbb{P}}(\omega) \\
&=\int_{X}\int_{\Omega}\chi_{B^x}(\omega)\,d{\mathbb{P}}(\omega) d\mu(x)
=\int_{X}{\mathbb{P}}(B^x)\, d\mu(x)=0
\end{split}$$ since ${\mathbb{P}}(B^x)=0$ by Corollary \[cor:pb;bdr:zero\]. The assertion follows.
Random adjacent dyadic systems {#sec:adjRandom}
==============================
In this section we will prove the following theorem.
\[thm:section6\] Given a set of reference points $\{x^k_\alpha\}_{k,\alpha}$, suppose that constant $\delta\in (0,1)$ satisfies $144A_0^8\delta\leq 1$. Then there exists a probability space $(\Omega ,{\mathbb{P}})$ such that every $\omega\in \Omega$ defines a family of dyadic systems $(\mathscr{D}^t(\omega))_{t=1}^{K}$ where each $\mathscr{D}^t(\omega)=\{^tQ^k_\alpha (\omega)\}_{k, \alpha}$, related to new dyadic points $\{^tz^k_\alpha (\omega)\}_{k,\alpha}$, satisfies the properties (\[eq:open-closed\])–(\[eq:monotone\]) of Theorem \[thm:cubes\]. Further, [ $$\begin{aligned}
\text{for every $\omega\in \Omega$,}& (\mathscr{D}^t(\omega))_{t=1}^{K}& \text{satisfies the property of Lemma~\ref{prop;cubeandball};} \\
\text{$\quad\quad$for every $t\in \{1,\ldots ,K \}$,}& (\mathscr{D}^t(\omega))_{\omega\in \Omega}& \text{satisfies the properties (\ref{ProbSpace:one})--(\ref{ProbSpace:two}) of Theorem~\ref{thm:section5}}.\label{eq:forallt}\end{aligned}$$]{}
Notice that the statement of this result makes no reference to randomness but the proof does, and it is not clear how to prove something like this without the help of randomization. In more classical set-ups, similar conclusions could be reached with the help of strongly Euclidean devices like rotations; cf. [@MMNO], Theorem 2 and its proof.
One immediate application of such a construction is the following.
Given a set of reference points $\{x^k_\alpha\}_{k,\alpha}$, suppose that constant $\delta\in (0,1)$ satisfies $144A_0^8\delta\leq 1$. Let $\mu$ be a positive $\sigma$-finite measure on $X$. Then the finite collection of adjacent dyadic systems $\mathscr{D}^t$, $t=1,\ldots,K$, as in Theorem \[thm:adjacent;systems\], may be chosen to satisfy the additional property that $$\mu(\partial Q)=0\qquad\forall Q\in\bigcup_{t=1}^K\mathscr{D}^t.$$
Let $\mathscr{D}^t(\omega)$ be the random adjacent systems guaranteed by Theorem \[thm:section6\]. By and of Theorem \[probabilistic:statements\], we have that $$\forall t\in\{1,\ldots,K\},\text{ for a.e. }\omega\in\Omega,\quad\mu\Big(\bigcup_{Q\in\mathscr{D}^t(\omega)}\partial Q\Big)=0.$$ Since there are only finitely many choices of $t$, we can reverse the order of “$\forall t$” and “for a.e. $\omega\in\Omega$” above, and then it suffices to choose any $\omega\in\Omega$ outside the event of probability zero implicit in the “a.e.”, and take $\mathscr{D}^t:=\mathscr{D}^t(\omega)$ for this chosen $\omega\in\Omega$.
The probability space {#the-probability-space}
---------------------
We define a probability space $\Omega$ by setting $$\Omega:=\prod_{k\in {\mathbb{Z}}} \Omega_k,\qquad \Omega_k:=\{1,2,\ldots ,K\}.$$ The points $\omega\in\Omega$ admit the natural coordinate representation $\omega=(\omega_k)_{k\in {\mathbb{Z}}}$ where $\omega_k\in \{1,2,\ldots ,K\}$.
We define a probability ${\mathbb{P}}$ on $\Omega$ by requiring the coordinates $\omega_k$ to be independent and distributed with equal probabilities $${\mathbb{P}}(\omega_k=T)=\frac{1}{K}\quad\forall\, T=1,2,\ldots ,K.$$ Given $\omega_k=T_k$, define a permutation of $(1,2,\ldots ,K )$ by $$\pi_k(t):=t+T_k\quad (\!\!\!\!\!\!\mod K),\quad t=1,2,\ldots ,K.$$ Given $T_k,t\in\{ 1,2,\ldots ,K\}$, they together define an ordered pair $\pi_k(t)=(\ell_k(t) ,m_k(t))$ via the bijection $\varphi$ introduced in \[spesific;rule\]. We define the new dyadic points $\{^t\!z^k_\alpha\}_{\alpha}$ of generation $k$ as follows. For every $(k,\alpha)$, check whether there exists $(k+1,\beta)\leq (k,\alpha)$ such that ${\operatorname{label}}_2(k+1,\beta)=\pi_k(t)$. If so, decree $^t\!z^k_\alpha :=x^{k+1}_\beta$. Otherwise, pick any $(k+1,\beta)\leq (k,\alpha)$ with $\rho(x^{k+1}_\beta,x^k_\alpha)<\delta^{k+1}$ and decree $^t\!z^k_\alpha :=x^{k+1}_\beta$. (We could, for example, choose the nearest child of $x^k_\alpha$ and eliminate the arbitrariness of this choice.)
The choice of $\omega=(\omega_k)$ then uniquely determines the permutation $\pi_k$ on every level $k$ which in turn determines a family of new dyadic points $^t\!z^k_\alpha(\omega)= \,^t\!z^k_\alpha(\omega_k)=z^k_\alpha (\pi_k(t))$ for each $t=1,\ldots ,K$.
Once the points $^t\!z^k_{\alpha}(\omega_k)$, $t=1,\ldots K$, are chosen, they uniquely determine the relation $\leq_{\omega,t}$ between the index pairs $(k,\alpha)$. Then, for every $t=1,\ldots,K$, the points $^t\!z^k_{\alpha}(\omega_k)$ and the relation $\leq_{\omega,t}$ together determine the new dyadic cubes $^t\!Q^k_\alpha(\omega_k)$, and their random choice corresponds to the random choice of $\omega$ according to the law ${\mathbb{P}}$. Note that the choice of the new dyadic points $^t\!z^k_\alpha(\omega)=z^k_\alpha (\pi_k(t))$ coincides with the specific selection rule defined in \[spesific;rule\].
It is evident, by Lemma \[dyadic\_points\] in view of \[spesific;rule\], that for every $\omega\in\Omega$ and every $t=1,\ldots K$, the dyadic system $\mathscr{D}^t(\omega)$ satisfies the properties – of Theorem \[thm:cubes\]. We may complete the proof of Theorem \[thm:section6\] by the following lemma:
For every $\omega\in \Omega$, the family $(\mathscr{D}^t(\omega))_{t=1}^{K}$ satisfies the property of Lemma \[prop;cubeandball\]. For every $t=1,\ldots ,K$, $(\mathscr{D}^t(\omega))_{\omega\in \Omega}$ satisfies the properties (\[ProbSpace:one\])–(\[ProbSpace:two\]) of Theorem \[thm:section5\].
Suppose $\omega\in\Omega$, $\omega=(\omega_k)_{k\in {\mathbb{Z}}}$, and let $\pi_k$ be the permutation defined by $T_k:=\omega_k$. Going back to the proof of Lemma \[prop;cubeandball\], it suffices to prove that for every $(k+1,\beta)$, there holds $x^{k+1}_\beta={}^t\!z^k_\alpha$ for $(k,\alpha)\geq (k+1,\beta)$ and some $t=1,\ldots ,K$. But this is clear since ${\operatorname{label}}_2(k+1,\beta)=:t=\pi_k(t-T_k)$ where $t-T_k$ is defined modulo $K$. By construction, $^t\!z^k_\alpha=x^{k+1}_\beta$, and the first assertion follows.
With fixed $t\in\{ 1,\ldots ,K\}$ and $(k+1,\beta)\leq (k,\alpha)$, there is a positive probability $\tau_0= 1/K$ that $\pi_k(t)=s$ for $s={\operatorname{label}}_2(k+1,\beta)$. Thus, $${\mathbb{P}}(\{\omega\in\Omega\colon ^t\!z^k_\alpha(\omega)=x^{k+1}_\beta\}) ={\mathbb{P}}(\{\omega\in\Omega\colon \pi_k(t)={\operatorname{label}}_2(k+1,\beta) \})=\tau_0>0,$$ and hence, (\[ProbSpace:two\]) of Theorem \[thm:section5\] holds. The other properties follow directly from the construction of $(\Omega,{\mathbb{P}})$. The second assertion follows.
By the construction of the probability space $(\Omega ,{\mathbb{P}})$, while the random choice of new dyadic points is independent on different levels, on a given level $k$ it only depends on the choice of $\omega_k$. Thus, the choice of points $\{^t\!z^k_\alpha\}_\alpha$ is not independent. By slightly changing the construction of $\Omega_k$, we may obtain independence also among the choice of non-neighbouring points on the same level: We define a probability space $\Omega$ by setting $$\Omega:=\prod_{k\in {\mathbb{Z}}} \Omega_k,\qquad \Omega_k:=\{1,2,\ldots ,K\}\times \prod_{\alpha\in\mathscr{A}_k}\{1,2,\ldots ,M_{k,\alpha}\},$$ where $M_{k,\alpha}:=\# \{\gamma\colon (k+1,\gamma)\leq (k,\alpha)\}$, the number of children of reference point $(k,\alpha)$.
The points $\omega\in\Omega$ again admit the natural coordinate representation $\omega=(\omega_k)_{k\in {\mathbb{Z}}}$. Moreover, $\omega_k=(T_k,m_{k,\alpha}\colon \alpha\in \mathscr{A}_k)\in \Omega_k$ where $T_k\in \{1,\ldots ,K \}$ and $m_{k,\alpha}\in \{1,\ldots ,M_{k,\alpha}\}$.
We define a probability ${\mathbb{P}}$ on $\Omega$ by requiring the coordinates $\omega_k$ to be independent and distributed as follows. First, $${\mathbb{P}}(T_k=T)=\frac{1}{K}\quad \forall\, T=1,2,\ldots ,K.$$ Second, the subcoordinates $m_{k,\alpha}$ are again independent with distribution $${\mathbb{P}}(m_{k,\alpha}=m)=\frac{1}{M_{k,\alpha}}\quad \forall\, m=1,2,\ldots ,M_{k,\alpha}.$$ Given $\omega_k=(T_k,m_{k,\alpha}\colon \alpha\in\mathscr{A}_k)$, we define the new dyadic points as follows. First, $T_k$ defines a cyclic permutation $\pi_k$ of $(1,2,\ldots ,K )$ as before. Then, for every $t=1,\ldots, K$ and $(k,\alpha)$, check whether there exists $(k+1,\beta)\leq (k,\alpha)$ such that $${\operatorname{label}}_2(k+1,\beta)=(\operatorname{pr}_1(\pi_k(t)),\operatorname{pr}_2(\pi_k(t))+m_{k,\alpha}\; (\!\!\!\!\!\!\mod M_{k,\alpha})).$$ If so, decree $^t\!z^k_\alpha :=x^{k+1}_\beta$. Otherwise, pick any $(k+1,\beta)\leq (k,\alpha)$ with $\rho(x^{k+1}_\beta,x^k_\alpha)<\delta^{k+1}$ and decree $^t\!z^k_\alpha :=x^{k+1}_\beta$. (We could again choose, for example, the nearest child of $x^k_\alpha$ and eliminate the arbitrariness of this choice.)
Applications
============
Set-up
------
Let $(X,\rho)$ be a quasi-metric space and suppose that $\mu$ is a positive Borel-measure on $X$ satisfying the doubling condition $$\label{def:doubling}
\mu(2B)\leq C\mu(B)\quad\text{for all balls $B$}.$$ Note that if $\mu$ satisfies the above doubling condition then $0<\mu(B)<\infty$ for all balls $B$. Let us state the following well-known lemma.
\[prop;balls;measures\] For every $x\in X$ and $0<r\leq R$ we have $$\frac{\mu(B(x,R))}{\mu (B(x,r))}\leq C_\mu \left(\frac{R}{r}\right)^{c_\mu}$$ where $c_\mu=\log_2C_\mu$ and $C_\mu$ is the smallest constant satisfying .
There is an immediate sequel to dyadic cubes:
\[cor;balls;measures\] There exists a constant $C\geq 1$ such that for every dyadic cube $Q$ there holds $\mu (B_Q)\leq C\mu (Q)$, where $B_Q \supseteq Q$ is the containing ball of $Q$ as in . Conversely, given a ball $B:=B(x,r)$, there exists a dyadic system $\mathscr{D}^t$ and a dyadic cube $Q_B\in \mathscr{D}^t$ such that $B\subseteq Q_B$ and $\mu(Q_B)\leq C\mu(B)$.
Given a dyadic cube $Q$ and a ball $B(x,r)$, consider the balls $B(x_{\alpha}^k, c_1\delta^k)\subseteq Q^k_\alpha \subseteq B(x_{\alpha}^k, C_1\delta^k)=:B_Q$ from Theorem \[thm:cubes\] and the cube $Q_B$ from Lemma \[prop;cubeandball\] with $B(x,r)\subseteq Q_B \subseteq B(x, Cr)$. The assertion follows readily from Lemma \[prop;balls;measures\].
Maximal operators
-----------------
Let $\omega$ be a weight on $X$, i.e. $\omega\geq 0$ and $\omega\in L^1_{{\operatorname{loc}}}(X,\mu)$. Given a measurable set $E$, denote $\omega (E):=\int_{E}\omega\,d\mu$. Define *weighted Hardy–Littlewood maximal operator* $M_\omega$ by $$\label{operator}
M_\omega f(x)=\sup_{B\ni x}\frac{1}{\omega(B)}\int_{B}{\lvertf\rvert}\,\omega d\mu, \quad f\in L^1_{{\operatorname{loc}}}(X,\mu), x\in X,$$ where the supremum is over all balls $B$ containing $x$. We drop the subscript $\omega$ in $M_\omega$ if $\omega\equiv 1$.
Given a weight $\omega$ and $p>1$, set $\sigma =\omega^{-1/(p-1)}$. We say that $\omega$ satisfies the $A_p$-condition and denote $\omega\in A_p$ if $$\| \omega \|_{A_p} := \sup_{B}\frac{\omega(B)\sigma(B)^{p-1}}{\mu(B)^p}<\infty .$$ Note that $\omega\in A_p$, if and only if $\sigma\in A_{p'}$ where $1/p+1/p'=1$.
By the fundamental result of B. Muckenhoupt, the classical Hardy–Littlewood maximal operator $M$ is bounded on $L^p_\omega$, $1<p<\infty$, if and only if $\omega\in A_p$. In this section, we will provide a quantitative formulation of this well-known result on the metric space $(X,\mu)$.
Let $\mathscr{D}^t$ denote any fixed dyadic grid of cubes $Q^k_\alpha, k\in {\mathbb{Z}},\alpha\in \mathscr{A}_k$ constructed in Section \[sec:adjacent\]. We define the *weighted dyadic maximal operator* $M^{\mathscr{D}^t}_\omega$ by $$\label{def;dyadicoperator}
M^{\mathscr{D}^t}_\omega\!\! f(x)=\sup_{Q\ni x}\frac{1}{\omega(Q)}\int_{Q}{\lvertf\rvert}\, \omega d\mu , \quad f\in L^1_{{\operatorname{loc}}}(X,\mu), x\in X ,$$ where the supremum is over all dyadic cubes $Q\in \mathscr{D}^t$ containing $x$.
By a well-known fact, see for example [@williams], Theorem 14.11, the dyadic maximal operators $M^{\mathscr{D}^t}_\omega$ are bounded on $L^p_\omega$, $1<p<\infty$, uniformly in all weights $\omega$: For $1<p<\infty$ there holds $$\label{sharp:ineq;dyadic}
\| M^{\mathscr{D}^t}_\omega \!\! f\|_{L^p_\omega}\leq p'\, \| f\|_{L^p_\omega}$$ for all $f\in L^p_\omega$.
We further consider the closely related *sharp maximal operator* $M^\#$ defined by $$M^\# f(x):=\sup_{B \ni x}\frac{1}{\mu(B)}\int_{B}{\lvertf-f_B\rvert}\, d\mu, \quad f\in L^1_{{\operatorname{loc}}}(X,\mu), x\in X,$$ where the supremum is over all balls containing $x$, and we have used the notation $$f_E:=\frac{1}{\mu(E)}\int_{E}{\lvertf\rvert}\,d\mu,$$ for the integral average of $f$ over a bounded measurable set $E$, $\mu(E)>0$. Further define the *dyadic sharp maximal operator* $M^\#_{\mathscr{D}^t} f$ by $$M^\#_{\mathscr{D}^t} f(x):=\sup_{Q \ni x}\frac{1}{\mu(Q)}\int_{Q}{\lvertf-f_Q\rvert}\, d\mu, \quad f\in L^1_{{\operatorname{loc}}}(X,\mu), x\in X,$$ where the supremum is over all dyadic cubes $Q\in \mathscr{D}^t$ containing $x$.
We will first show the equivalence between the classical operators $M$ and $M^\#$ and their dyadic counterparts:
\[prop:equiv;operators\] Let $f\in L^1_{{\operatorname{loc}}}(X,\mu)$. We have the pointwise estimates $$\begin{aligned}
M^{\mathscr{D}^t}\!\!f(x)\leq CMf(x)\qquad\text{and}\qquad
Mf(x) \leq C\sum_{t=1}^{K}M^{\mathscr{D}^t}\!\!f(x); \label{lemma;one}\\
M^\#_{\mathscr{D}^t}f(x)\leq CM^\# f(x)\qquad\text{and}\qquad
M^\# f(x) \leq C\sum_{t=1}^{K}M^\#_{\mathscr{D}^t}f(x) \label{lemma;two}\end{aligned}$$ where both of the first inequalities hold for every $t=1,\ldots ,K$ and the constant $C\geq 1$ is independent of $f$.
Fix $t$ and assume $x\in Q, Q\in \mathscr{D}^t$. Let $B\supseteq Q$ be the containing ball of $Q$ as in . Then $\mu(B)\leq C\mu(Q)$ by Lemma \[cor;balls;measures\], and thereby $$\begin{aligned}
\frac{1}{\mu(Q)}\int_{Q}{\lvertf-f_Q\rvert}\,d\mu
& \leq\frac{1}{\mu(Q)}\int_{Q}{\lvertf-f_B\rvert}\,d\mu +\left\vert f_B -f_Q\right\vert\\
& \leq \frac{2}{\mu(Q)}\int_{Q}{\lvertf-f_B\rvert}\,d\mu \leq \frac{2C}{\mu(B)}\int_{B}{\lvertf-f_B\rvert}\,d\mu \\
& \leq 2C M^\# f(x).\end{aligned}$$ The first inequality in follows by taking a supremum over all dyadic cubes in $\mathscr{D}^t$ containing $x$. Also the first inequality in follows by putting $f_B=f_Q=0$ in the above and making the obvious simplifications.
For the reverse inequalities, consider ball $B\ni x$ and let $Q=Q(t)$ be the dyadic cube as in Lemma \[prop;cubeandball\] with $B\subseteq Q$ and $\mu(Q)\leq C\mu(B)$. By repeating the argumentation above with the roles of $B$ and $Q$ interchanged we may conclude with $$\begin{aligned}
\frac{1}{\mu(B)}\int_{B}{\lvertf-f_B\rvert}\,d\mu & \leq 2C M^\#_{\mathscr{D}^t}f(x)\leq 2C\sum_{t=1}^{K} M^\#_{\mathscr{D}^t}f(x) .\end{aligned}$$ The second inequality in follows again by taking a supremum over all balls containing $x$. Also the second inequality in follows as earlier.
The sharp weighted norm of the Hardy–Littlewood maximal operator
----------------------------------------------------------------
As to illustrate the use of the new adjacent dyadic systems constructed in Section \[sec:adjacent\], we will provide an easy extension of the Buckley’s theorem [@Buckley:93] on the sharp dependence of $\| M\|_{L^p_\omega}$ on $\| \omega\|_{A_p}$ in Muckenhoupt’s theorem for Hardy–Littlewood maximal function to metric spaces $X$ with a doubling measure $\mu$:
Let $1<p<\infty$. Then $${\|Mf\|_{L^p_w}}\leq C{\|w\|_{A_p}}^{1/(p-1)}{\|f\|_{L^p_w}},$$ where the constant $C$ depends only on $X,\mu$ and $p$.
By Proposition \[prop:equiv;operators\], it suffices to prove the analogous estimate for the dyadic maximal operator $M^{\mathscr{D}^t}\!\!$. We follow the Euclidean approach due to Lerner [@Lerner:08] with the deviation that we will utilize the universal maximal function estimate instead of the corresponding result for the centred maximal operator which, in the Euclidean case, is a well-known consequence of the Besicovich covering theorem — a powerful classical tool generally unavailable in abstract metric spaces. We repeat the details for the reader’s convenience.
Suppose $0\leq \omega\in L^1_{{\operatorname{loc}}}(X,\mu)$. Denote $\sigma =\omega^{-1/(p-1)}$ and $$A_p(Q):=\frac{\omega(Q)\sigma(Q)^{p-1}}{\mu(Q)^p}.$$ Fix $t$ and suppose $x\in Q, Q\in\mathscr{D}^t$. We have $$\begin{aligned}
\frac{1}{\mu(Q)}\int_{Q}{\lvertf\rvert}\, d\mu &= A_p(Q)^{\frac{1}{p-1}}\left[ \frac{\mu (Q)}{\omega(Q)}\left( \frac{1}{\sigma(Q)}\int_{Q}{\lvertf\rvert}\, d\mu\right)^{p-1}\right]^{\frac{1}{p-1}}\\
& \leq \| \omega\|_{A_p}^{\frac{1}{p-1}}
\left[ \frac{1}{\omega(Q)}\int_{Q}\left( \frac{1}{\sigma(Q)}\int_{Q}{\lvertf\sigma^{-1}\rvert}\, \sigma d\mu\right)^{p-1}d\mu\right]^{\frac{1}{p-1}}\\
& \leq \| \omega\|_{A_p}^{\frac{1}{p-1}}
\left[ \frac{1}{\omega(Q)}\int_{Q}\Big(M^{\mathscr{D}^t}_\sigma(f\sigma^{-1})(x) \Big)^{p-1}d\mu(x)\right]^{\frac{1}{p-1}}\\
& \leq \| \omega\|_{A_p}^{\frac{1}{p-1}}
\left[ \frac{1}{\omega(Q)}\int_{Q}\Big([M^{\mathscr{D}^t}_\sigma(f\sigma^{-1})]^{p-1}\omega^{-1}\Big)\omega d\mu\right]^{\frac{1}{p-1}},\end{aligned}$$ and hence, $$M^{\mathscr{D}^t}\!\!f(x)\leq \| \omega\|_{A_p}^{\frac{1}{p-1}}
M^{\mathscr{D}^t}_\omega\Big([M^{\mathscr{D}^t}_\sigma(f\sigma^{-1})]^{p-1}\omega^{-1}\Big)(x)^{\frac{1}{p-1}}.$$ Therefore, since $p/(p-1)=p'$ and $\sigma =\omega^{-1/(p-1)}$, the above estimate together with the universal maximal function estimate implies that $$\begin{aligned}
\|M^{\mathscr{D}^t}\!\! f \|_{L^p_\omega}& \leq
\| \omega\|_{A_p}^{\frac{1}{p-1}}
\Big\| M^{\mathscr{D}^t}_\omega\Big([M^{\mathscr{D}^t}_\sigma(f\sigma^{-1})]^{p-1}
\omega^{-1}\Big)\Big\|^{\frac{1}{p-1}}_{L^{p'}_\omega}\\
&\leq \| \omega\|_{A_p}^{\frac{1}{p-1}} p^{\frac{1}{p-1}}\;
\| [M^{\mathscr{D}^t}_\sigma(f\sigma^{-1})]^{p-1}\omega^{-1}\|_{L^{p'}_\omega}^{\frac{1}{p-1}}\\
& = \| \omega\|_{A_p}^{\frac{1}{p-1}} p^{\frac{1}{p-1}}\;
\| M^{\mathscr{D}^t}_\sigma(f\sigma^{-1})\|_{L^{p}_\sigma}\\
&\leq \| \omega\|_{A_p}^{\frac{1}{p-1}} p^{\frac{1}{p-1}}p'\;
\| f\sigma^{-1}\|_{L^{p}_\sigma}\\
& =\| \omega\|_{A_p}^{\frac{1}{p-1}} p^{\frac{1}{p-1}}p'\;
\| f\|_{L^{p}_\omega}.\qedhere\end{aligned}$$
Functions of bounded mean oscillation
-------------------------------------
Recall that *the classical ${\operatorname{BMO}}(\mu)$ space* is the set of equivalence classes of functions $f\in L_{{\operatorname{loc}}}^1(X,\mu)$, modulo additive constants, such that the $L^1$-averages $$\frac{1}{\mu(B)}\int_{B} {\lvertf-f_B\rvert}\, d\mu,\qquad f_B:=\frac{1}{\mu(B)}\int_{B}{\lvertf\rvert}\,d\mu,$$ are bounded (uniformly in $B$). The non-negative real number $$\label{def;BMO}
\| f \|_{{\operatorname{BMO}}}:= \underset{B}\sup \frac{1}{\mu(B)}\int_{B} {\lvertf-f_B\rvert}\, d\mu <\infty,$$ where the supremum is over all balls, is then called the ${\operatorname{BMO}}$-norm of $f$.
For every $t= 1, \ldots , K$, we define a *dyadic ${\operatorname{BMO}}(\mu)$ space* ${\operatorname{BMO}}_{\mathscr{D}^t}$ as the set of equivalence classes of functions $f\in L^1_{{\operatorname{loc}}}(X,\mu)$, modulo additive constants, such that $$\|f\|_{{\operatorname{BMO}}_{\mathscr{D}^t}}:=\underset{Q\in\mathscr{D}^t}\sup\frac{1}{\mu(Q)}\int_{Q} {\lvertf-f_Q\rvert}\, d\mu<\infty,\qquad f_Q:=\frac{1}{\mu(Q)}\int_{Q}{\lvertf\rvert}\,d\mu,$$ where the supremum is over all dyadic cubes $Q\in\mathscr{D}^t$. The quantity $\|f\|_{{\operatorname{BMO}}_{\mathscr{D}^t}}$ is then the dyadic ${\operatorname{BMO}}$-norm of $f$.
The relationship between the two kinds of ${\operatorname{BMO}}$ spaces has been studied in the Euclidean setting in [@Garnett] and [@Mei03].
As a second illustration of the use of the new adjacent dyadic systems, we provide a representation of ${\operatorname{BMO}}(\mu)$ as an intersection of finitely many dyadic ${\operatorname{BMO}}(\mu)$ spaces. This extends the Euclidean result, which was explicitly stated by T. Mei [@Mei03], but already implicit in some earlier work; cf. [@Mei03], Remark 6. A related result in metric spaces was also proven by Caruso and Fanciullo [@CF].
\[prop:bmo\] Suppose $(X,\rho)$ is a quasi-metric space and $\mu$ is a positive Borel-measure on $X$ with the doubling property . There exist constants $C>0$ and $C'>0$ depending only on $X$ and $\mu$ such that for every $f\in L_{{\operatorname{loc}}}^1(X,\mu)$, there holds $$C\|f \|_{{\operatorname{BMO}}_{\mathscr{D}^t}}\leq \|f \|_{{\operatorname{BMO}}}\leq C' \sum_{t=1}^{K} \|f \|_{{\operatorname{BMO}}_{\mathscr{D}^t}}$$ where the first estimate holds for every $t=1,\ldots ,K$. Thus, $${\operatorname{BMO}}(\mu)=\displaystyle\bigcap_{t=1}^{K}{\operatorname{BMO}}_{\mathscr{D}^t}(\mu)$$ with equivalent norms.
This is an immediate corollary of Proposition \[prop:equiv;operators\].
It is a well-known fact that both the classical and dyadic ${\operatorname{BMO}}(\mu)$ spaces satisfy the John–Nirenberg inequality. The proof for the dyadic version is slightly easier. One may represent the space ${\operatorname{BMO}}^p(\mu)$ as an intersection of finitely many dyadic spaces ${\operatorname{BMO}}^p_{\mathscr{D}^t}$, $p>1$, as stated in Proposition \[prop:bmo\]. With this representation, one may derive the John–Nirenberg inequality and the exponential integrability of ${\operatorname{BMO}}(\mu)$ functions from their dyadic counterparts, thereby avoiding some technicalities in the proof.
[10]{}
Hugo Aimar, Ana Bernardis, and Bibiana Iaffei. Comparison of [H]{}ardy-[L]{}ittlewood and dyadic maximal functions on spaces of homogeneous type. , 312(1):105–120, 2005.
Stephen M. Buckley. Estimates for operator norms on weighted spaces and reverse [J]{}ensen inequalities. , 340(1):253–272, 1993.
A. O. Caruso and M. S. Fanciullo. B[MO]{} on spaces of homogeneous type: a density result on [C]{}-[C]{} spaces. , 32(1):13–26, 2007.
Michael Christ. A [$T(b)$]{} theorem with remarks on analytic capacity and the [C]{}auchy integral. , 60/61(2):601–628, 1990.
Ronald R. Coifman and Guido Weiss. . Lecture Notes in Mathematics, Vol. 242. Springer-Verlag, Berlin, 1971. tude de certaines int[é]{}grales singuli[è]{}res.
Guy David. Morceaux de graphes lipschitziens et intégrales singulières sur une surface. , 4(1):73–114, 1988.
Guy David. , volume 1465 of [*Lecture Notes in Mathematics*]{}. Springer-Verlag, Berlin, 1991.
John B. Garnett and Peter W. Jones. B[MO]{} from dyadic [BMO]{}. , 99(2):351–371, 1982.
Tuomas Hytönen. The sharp weighted bound for general [Calderón-Zygmund]{} operators. , to appear.
Tuomas Hyt[ö]{}nen. A framework for non-homogeneous analysis on metric spaces, and the [RBMO]{} space of [T]{}olsa. , 54(2):485–504, 2010.
Tuomas Hytönen, Suile Liu, Dachun Yang, and Dongyong Yang. Boundedness of [Calderón-Zygmund]{} operators on non-homogeneous metric measure spaces. , to appear.
Tuomas Hytönen and Henri Martikainen. Non-homogeneous [$Tb$]{} theorem and random dyadic cubes on metric measure spaces. , to appear.
Tuomas Hytönen, Carlos Pérez, Sergei Treil, and Alexander Volberg. Sharp weighted estimates of the dyadic shifts and [$A_2$]{} conjecture. Preprint, arXiv:1010.0755, 2010.
Antti Käenmäki, Tapio Rajala, and Ville Suomala. Existence of doubling measures via generalised nested cubes. , to appear.
M. T. Lacey, E. T. Sawyer, and I. Uriarte-Tuero. A characterization of two weight norm inequalities for maximal singular integrals. , to appear.
M. T. Lacey, E. T. Sawyer, and I. Uriarte-Tuero. A two weight inequality for the [Hilbert]{} transform assuming an energy hypothesis. Preprint, arXiv:1001.4043, 2010.
Andrei K. Lerner. An elementary approach to several results on the [H]{}ardy-[L]{}ittlewood maximal operator. , 136(8):2829–2833, 2008.
Henri Martikainen. Vector-valued non-homogeneous [$Tb$]{} theorem on metric measure spaces. Preprint, arXiv:1004.3176, 2010.
J. Mateu, P. Mattila, A. Nicolau, and J. Orobitg. B[MO]{} for nondoubling measures. , 102(3):533–565, 2000.
Tao Mei. B[MO]{} is the intersection of two translates of dyadic [BMO]{}. , 336(12):1003–1006, 2003.
C. Muscalu, T. Tao, and C. Thiele. The bi-[C]{}arleson operator. , 16(1):230–277, 2006.
Camil Muscalu, Terence Tao, and Christoph Thiele. Multi-linear operators given by singular multipliers. , 15(2):469–496 (electronic), 2002.
F. Nazarov, S. Treil, and A. Volberg. Cauchy integral and [C]{}alderón-[Z]{}ygmund operators on nonhomogeneous spaces. , (15):703–726, 1997.
F. Nazarov, S. Treil, and A. Volberg. The [$Tb$]{}-theorem on non-homogeneous spaces. , 190(2):151–239, 2003.
Fedor Nazarov, Sergei Treil, and Alexander Volberg. Two weight estimate for the [Hilbert]{} transform and corona decomposition for non-doubling measures. Preprint, arXiv:1003.1596, 2005/2010.
E. Sawyer and R. L. Wheeden. Weighted inequalities for fractional integrals on [E]{}uclidean and homogeneous spaces. , 114(4):813–874, 1992.
Xavier Tolsa. Painlevé’s problem and the semiadditivity of analytic capacity. , 190(1):105–149, 2003.
Alexander Volberg. , volume 100 of [*CBMS Regional Conference Series in Mathematics*]{}. Published for the Conference Board of the Mathematical Sciences, Washington, DC, 2003.
David Williams. . Cambridge Mathematical Textbooks. Cambridge University Press, Cambridge, 1991.
|
Gender Differences in the Toxicokinetics of Triptolide after Single- and Multiple-dose Administration in Rats.
Triptolide is a natural compound extracted from the traditional Chinese medicine Tripterygium wilfordii Hook F with distinguishing pharmacological activities and evident toxicities. We reported previously that 28 continuous days of oral administration of triptolide in rats resulted in gender dimorphic profiles in toxicities. To better understand this issue, the toxicokinetics of triptolide was observed in this study. Rats of both sexes were administered 400 μg/kg triptolide either as a single dose or multiple doses for 28 days. Triptolide concentrations in rat plasma were determined using high performance liquid chromatography-tandem mass spectrometry (LC-MS/MS). The plasma concentration-time curve and toxicokinetic parameters revealed gender differences after single and repeated triptolide administration, including significantly higher area under the plasma concentration-time curve (AUC0-∞) and peak plasma concentration (Cmax), lower clearance rate (CL) and longer terminal elimination half-life (t1/2) of triptolide in females, and lower drug exposure levels and greater CL in males. The gender differential disposition of triptolide may be the cause of increased toxicity in females. Moreover, auto-inhibition of metabolism and the resulting increase in drug exposure were observed after repeated dosing. The AUC0-∞ of triptolide was increased 6-fold in females and 2-fold in males, while the CL of triptolide was significantly decreased by 84% in females and 55% in males. These results indicated that gender-related differences existed in the toxicokinetics of triptolide and long-term oral administration of triptolide resulted in drug accumulation, which might account for the gender differences in the toxicities of triptolide. |
out replacement from xxvhvixwhvivvxvvvx?
2/153
Two letters picked without replacement from bbbbbbbbcbbb. What is prob of picking 1 b and 1 c?
1/6
Three letters picked without replacement from oodjjomndj. What is prob of picking 2 d and 1 o?
1/40
What is prob of picking 2 t when two letters picked without replacement from tnnttttnttttntnttttt?
21/38
What is prob of picking 1 f and 1 d when two letters picked without replacement from {x: 11, d: 2, q: 1, r: 3, f: 1}?
2/153
What is prob of picking 1 m and 1 t when two letters picked without replacement from {j: 2, y: 1, m: 1, t: 2}?
2/15
Three letters picked without replacement from phpwbhjblplh. Give prob of picking 1 p, 1 b, and 1 h.
9/110
Calculate prob of picking 3 p when three letters picked without replacement from {h: 4, p: 14}.
91/204
Four letters picked without replacement from jljjlljljljll. What is prob of picking 1 j and 3 l?
42/143
Calculate prob of picking 2 x when two letters picked without replacement from lxwxxxxfrrwxxxrxxflf.
9/38
Two letters picked without replacement from {e: 1, r: 5, y: 5, w: 1, h: 3}. What is prob of picking 1 y and 1 e?
1/21
What is prob of picking 1 v, 1 k, 1 n, and 1 c when four letters picked without replacement from {v: 2, c: 3, k: 4, n: 2}?
8/55
What is prob of picking 2 e when two letters picked without replacement from elwiileelie?
6/55
Calculate prob of picking 1 m and 1 v when two letters picked without replacement from jjmjmjjvmmmvmjmmm.
9/68
Four letters picked without replacement from bzzzxpzrrbxzww. Give prob of picking 2 z and 2 w.
10/1001
What is prob of picking 1 s and 1 y when two letters picked without replacement from guoduggusygy?
1/33
Calculate prob of picking 2 g and 2 u when four letters picked without replacement from {s: 1, g: 3, u: 4}.
9/35
What is prob of picking 1 c and 1 j when two letters picked without replacement from crcwjrr?
2/21
Calculate prob of picking 2 x when two letters picked without replacement from cccoccxococxoo.
1/91
Calculate prob of picking 2 a and 1 v when three letters picked without replacement from vaneavanovvv.
3/44
Calculate prob of picking 1 q and 1 f when two letters picked without replacement from fqqfqqqf.
15/28
What is prob of picking 2 s when two letters picked without replacement from sssggsogog?
2/15
Three letters picked without replacement from zzzllz. What is prob of picking 1 z and 2 l?
1/5
Two letters picked without replacement from {h: 2, p: 1, z: 8, d: 2, i: 7}. What is prob of picking 1 p and 1 z?
4/95
Two letters picked without replacement from lffiffjifniifflf. What is prob of picking 2 f?
7/30
Calculate prob of picking 1 p, 1 j, and 1 h when three letters picked without replacement from {p: 5, h: 9, j: 1, t: 1, i: 1}.
9/136
Calculate prob of picking 2 n when two letters picked without replacement from tttnttttn.
1/36
What is prob of picking 2 r when two letters picked without replacement from mmrrrrrmmmmrrmrr?
3/10
Two letters picked without replacement from cnccnnn. Give prob of picking 1 c and 1 n.
4/7
What is prob of picking 1 k and 1 a when two letters picked without replacement from aakbbbaabb?
4/45
What is prob of picking 1 f, 2 a, and 1 q when four letters picked without replacement from nyfafnyqyyyakya?
2/455
Calculate prob of picking 1 j, 1 b, and 1 h when three letters picked without replacement from {j: 2, b: 1, p: 2, h: 1}.
1/10
Two letters picked without replacement from {k: 8, c: 4, y: 1, f: 7}. Give prob of picking 2 c.
3/95
Two letters picked without replacement from {l: 4, r: 9, c: 1, m: 1}. Give prob of picking 1 l and 1 r.
12/35
Calculate prob of picking 1 p and 1 k when two letters picked without replacement from kkppkppp.
15/28
Two letters picked without replacement from cchcccchhccccchccc. What is prob of picking 2 h?
2/51
What is prob of picking 2 b and 2 l when four letters picked without replacement from bllbbbb?
2/7
Three letters picked without replacement from ttwppttpppppttpsppp. Give prob of picking 1 w, 1 s, and 1 t.
2/323
Two letters picked without replacement from {g: 3, a: 2, h: 4, s: 2}. Give prob of picking 2 g.
3/55
Calculate prob of picking 1 g and 1 x when two letters picked without replacement from {g: 2, w: 1, x: 1, m: 4}.
1/14
Calculate prob of picking 1 b and 2 j when three letters picked without replacement from jjjjjjjjjjbjjbjjjjjj.
51/190
Two letters picked without replacement from {k: 1, g: 4, d: 2, j: 2}. What is prob of picking 1 k and 1 g?
1/9
Four letters picked without replacement from hpphhpphhhhhphppppph. What is prob of picking 4 h?
14/323
Three letters picked without replacement from nnnnnananna. What is prob of picking 3 a?
1/165
Two letters picked without replacement from {p: 2, v: 2, k: 5, d: 4, o: 1}. What is prob of picking 1 p and 1 d?
8/91
Three letters picked without replacement from {y: 4, u: 15}. What is prob of picking 3 y?
4/969
What is prob of picking 1 p, 1 z, 1 x, and 1 b when four letters picked without replacement from bzzbpxbbb?
5/63
Calculate prob of picking 2 n and 1 s when three letters picked without replacement from {s: 1, n: 5, x: 14}.
1/114
What is prob of picking 1 c and 1 l when two letters picked without replacement from mglmlmc?
2/21
Calculate prob of picking 1 o, 1 a, 1 p, and 1 b when four letters picked without replacement from {s: 2, p: 4, a: 1, b: 2, o: 3}.
8/165
What is prob of picking 4 j when four letters picked without replacement from hhhhhhjhhnhnjjjhhhj?
5/3876
Calculate prob of picking 1 a and 1 y when two letters picked without replacement from {a: 2, y: 1, u: 1, i: 4}.
1/14
What is prob of picking 1 r, 1 p, and 1 x when three letters picked without replacement from {p: 1, r: 1, d: 2, h: 1, n: 1, x: 1}?
1/35
Two letters picked without replacement from {u: 2, p: 1, q: 2}. What is prob of picking 1 p and 1 q?
1/5
Four letters picked without replacement from {v: 5, d: 9}. Give prob of picking 4 d.
18/143
Calculate prob of picking 1 p and 2 a when three letters picked without replacement from aeepappeeeaee.
9/286
Three letters picked without replacement from paevaeeeeapepapppp. Give prob of picking 1 v and 2 p.
7/272
Two letters picked without replacement from ykkyokknx. Give prob of picking 1 y and 1 n.
1/18
Three letters picked without replacement from {n: 1, s: 1, q: 6, v: 1}. Give prob of picking 1 s and 2 q.
5/28
Four letters picked without replacement from {p: 2, q: 2, v: 1, f: 1, s: 4, w: 2}. What is prob of picking 1 p, 1 f, and 2 s?
4/165
What is prob of picking 1 j and 1 p when two letters picked without replacement from bjjbbpjpjjjjpjjp?
3/10
What is prob of picking 1 k and 1 w when two letters picked without replacement from enowk?
1/10
What is prob of picking 3 p and 1 y when four letters picked without replacement from {o: 1, p: 3, y: 6, n: 2}?
2/165
Two letters picked without replacement from {l: 2, p: 2, i: 3, v: 8}. Give prob of picking 1 p and 1 i.
2/35
Calculate prob of picking 2 f when two letters picked without replacement from uufuufufufuf.
5/33
What is prob of picking 1 j and 1 x when two letters picked without replacement from xxxjj?
3/5
Two letters picked without replacement from {v: 4, k: 3, a: 2}. Give prob of picking 2 a.
1/36
Calculate prob of picking 1 f and 1 z when two letters picked without replacement from {z: 1, f: 17}.
1/9
What is prob of picking 2 r, 1 p, and 1 h when four letters picked without replacement from {d: 2, p: 1, r: 3, j: 3, h: 1, b: 1}?
1/110
What is prob of picking 1 r and 1 p when two letters picked without replacement from rpprrpzz?
9/28
Calculate prob of picking 1 w and 1 n when two letters picked without replacement from {a: 1, v: 2, n: 7, w: 2}.
7/33
Calculate prob of picking 2 k when two letters picked without replacement from ooookkokko.
2/15
Three letters picked without replacement from {m: 3, w: 1}. Give prob of picking 1 w and 2 m.
3/4
Three letters picked without replacement from iiiiiiiiiieiiii. Give prob of picking 2 i and 1 e.
1/5
What is prob of picking 2 k and 2 t when four letters picked without replacement from kkxtuxttxxxxxtxt?
1/182
Four letters picked without replacement from {e: 2, j: 2, t: 4, h: 8}. Give prob of picking 4 h.
1/26
Four letters picked without replacement from {c: 1, l: 1, k: 1, j: 2, b: 1, q: 2}. Give pro |
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE TS>
<TS version="2.1" language="it" sourcelanguage="en">
<context>
<name>TestGui::UnitTest</name>
<message>
<location filename="../../UnitTest.ui" line="16"/>
<source>FreeCAD UnitTest</source>
<translation>FreeCAD UnitTest</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="31"/>
<source>Failures and errors</source>
<translation>Avarie ed errori</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="47"/>
<source>Description</source>
<translation>Descrizione</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="82"/>
<source>&Start</source>
<translation>&Inizia</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="85"/>
<source>Alt+S</source>
<translation>Alt+I</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="114"/>
<source>&Help</source>
<translation>&Aiuto</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="117"/>
<source>F1</source>
<translation>F1</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="127"/>
<source>&About</source>
<translation>&Informazioni su</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="130"/>
<source>Alt+A</source>
<translation>Alt+I</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="140"/>
<source>&Close</source>
<translation>&Chiudi</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="143"/>
<source>Alt+C</source>
<translation>Alt+C</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="161"/>
<source>Idle</source>
<translation>Inattivo</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="168"/>
<source>Progress</source>
<translation>Avanzamento</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="197"/>
<source>Remaining:</source>
<translation>Rimanente:</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="214"/>
<source>Errors:</source>
<translation>Errori:</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="231"/>
<source>Failures:</source>
<translation>Avarie:</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="248"/>
<source>Run:</source>
<translation>Eseguiti:</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="258"/>
<source>Test</source>
<translation>Test</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="270"/>
<source>Select test name:</source>
<translation>Seleziona il nome del test:</translation>
</message>
</context>
<context>
<name>TestGui::UnitTestDialog</name>
<message>
<location filename="../../UnitTestImp.cpp" line="164"/>
<source>Help</source>
<translation>Aiuto</translation>
</message>
<message>
<location filename="../../UnitTestImp.cpp" line="164"/>
<source>Enter the name of a callable object which, when called, will return a TestCase.
Click 'start', and the test thus produced will be run.
Double click on an error in the tree view to see more information about it, including the stack trace.</source>
<translation>Inserire il nome di un oggetto richiamabile che, quando richiamato, restituisca un TestCase. Per eseguire il test fare clic su 'Inizia'.
Fare doppio clic su un errore nell'albero per visualizzare maggiori informazioni, inclusa la cronologia.</translation>
</message>
<message>
<location filename="../../UnitTestImp.cpp" line="176"/>
<source>About FreeCAD UnitTest</source>
<translation>Informazioni su FreeCAD UnitTest</translation>
</message>
<message>
<location filename="../../UnitTestImp.cpp" line="176"/>
<source>Copyright (c) Werner Mayer
FreeCAD UnitTest is part of FreeCAD and supports writing Unit Tests for ones own modules.</source>
<translation>Copyright (c) Werner Mayer
FreeCAD UnitTest fa parte di FreeCAD e supporta la scrittura di Unit test per i propri moduli.</translation>
</message>
</context>
</TS>
|
// Copyright 2016 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef COMPONENTS_URL_PATTERN_INDEX_URL_PATTERN_H_
#define COMPONENTS_URL_PATTERN_INDEX_URL_PATTERN_H_
#include <iosfwd>
#include "base/macros.h"
#include "base/optional.h"
#include "base/strings/string_piece.h"
#include "components/url_pattern_index/proto/rules.pb.h"
#include "url/third_party/mozilla/url_parse.h"
class GURL;
namespace url_pattern_index {
namespace flat {
struct UrlRule; // The FlatBuffers version of UrlRule.
}
// The structure used to mirror a URL pattern regardless of the representation
// of the UrlRule that owns it, and to match it against URLs.
class UrlPattern {
public:
enum class MatchCase {
kTrue,
kFalse,
};
// A wrapper over a GURL to reduce redundant computation.
class UrlInfo {
public:
// The |url| must outlive this instance.
UrlInfo(const GURL& url);
~UrlInfo();
base::StringPiece spec() const { return spec_; }
base::StringPiece GetLowerCaseSpec() const;
url::Component host() const { return host_; }
private:
// The url spec.
const base::StringPiece spec_;
// String to hold the lazily computed lower cased spec.
mutable std::string lower_case_spec_owner_;
// Reference to the lower case spec. Computed lazily.
mutable base::Optional<base::StringPiece> lower_case_spec_cached_;
// The url host component.
const url::Component host_;
DISALLOW_COPY_AND_ASSIGN(UrlInfo);
};
UrlPattern();
// Creates a |url_pattern| of a certain |type| and case-sensitivity.
UrlPattern(base::StringPiece url_pattern,
proto::UrlPatternType type = proto::URL_PATTERN_TYPE_WILDCARDED,
MatchCase match_case = MatchCase::kFalse);
// Creates a WILDCARDED |url_pattern| with the specified anchors.
UrlPattern(base::StringPiece url_pattern,
proto::AnchorType anchor_left,
proto::AnchorType anchor_right);
// The passed in |rule| must outlive the created instance.
explicit UrlPattern(const flat::UrlRule& rule);
~UrlPattern();
proto::UrlPatternType type() const { return type_; }
base::StringPiece url_pattern() const { return url_pattern_; }
proto::AnchorType anchor_left() const { return anchor_left_; }
proto::AnchorType anchor_right() const { return anchor_right_; }
bool match_case() const { return match_case_ == MatchCase::kTrue; }
// Returns whether the |url| matches the URL |pattern|. Requires the type of
// |this| pattern to be either SUBSTRING or WILDCARDED.
//
// Splits the pattern into subpatterns separated by '*' wildcards, and
// greedily finds each of them in the spec of the |url|. Respects anchors at
// either end of the pattern, and '^' separator placeholders when comparing a
// subpattern to a subtring of the spec.
bool MatchesUrl(const UrlInfo& url) const;
private:
// TODO(pkalinnikov): Store flat:: types instead of proto::, in order to avoid
// conversions in IndexedRuleset.
proto::UrlPatternType type_ = proto::URL_PATTERN_TYPE_UNSPECIFIED;
base::StringPiece url_pattern_;
proto::AnchorType anchor_left_ = proto::ANCHOR_TYPE_NONE;
proto::AnchorType anchor_right_ = proto::ANCHOR_TYPE_NONE;
MatchCase match_case_ = MatchCase::kTrue;
DISALLOW_COPY_AND_ASSIGN(UrlPattern);
};
// Allow pretty-printing URLPatterns when they are used in GTest assertions.
std::ostream& operator<<(std::ostream& out, const UrlPattern& pattern);
} // namespace url_pattern_index
#endif // COMPONENTS_URL_PATTERN_INDEX_URL_PATTERN_H_
|
Brag blog showing off things we have made
Menu
Super Easy
My daughter is in her high school marching band this year. I know how to sew. Therefore, I got to hem all the uniforms, how awesome!
You can see by the photo above that this school needs new uniforms. That’s not fringe guys, it’s a frayed collar. 😦
But we are in one of the poorest areas of the US, and the money is just not in the budget for new uniforms. So we are trying to squeeze a couple more years out of these, knowing that it may very well be way more than a couple more years.
The good news is this: These are very high-quality, traditional band uniforms. The pants are like bib overalls, so we don’t have to re-do the waistbands every year. The fabric is a heavyweight wool, which generally cleans up well and is extremely sturdy.
So even in my exhausted state, and with my tenuous skills, taking care of these hems was pretty straightforward and (dare I say it?) fun.
I was lucky enough to have a team of volunteers that pinned the pants and jackets to the right lengths. I brought my sewing machine to the band room. For complicated and ridiculous reasons, I did not have access to my iron and ironing board for most of this hemming project. But I am counting on the dry cleaners to cover for me.
The uniforms have been stored for several months, and they are really, really dirty and stained. I suspect that’s also a budget issue. I didn’t want anyone to start crying, so I didn’t ask.
The wearer of these pants has a real name, but I just call him “Crime Scene” now. He had a blister explode during the last parade and, being male, he didn’t know he needed to tell someone. Now he knows!
I chose stitch #13 on my sewing machine, which is the hem stitch.
Here’s what it looks like close up. I have a special hemstitch presser foot for my machine, but it was with the iron. Drama, drama! The special presser foot makes it a little easier, but is not strictly necessary.
I don’t often use the hem stitch on my sewing machine because I’m a slob. So whenever I use this, or any other special stitch, it takes me an embarrassingly long time to figure out how. This time was especially fun because I had been moving furniture the first half of the day and so I was wiped out. Plus I had an audience. Of course, everyone was very nice, but they didn’t know me at all and so I’m sure they were all wondering if I had any idea what I was doing. I don’t blame them – I was wondering the same thing myself. It’s OK though. The first hem is always like that, and then it’s easy.
Here I’ve got it in the machine correctly, ready to go. I’l pretend that I didn’t fold it wrong about 20 times before I got to this point. I’ll also pretend that I didn’t have to rip out a few incorrect hems and then take a short catnap on the floor to clear my brain. Yep, I’m a pro!
Most of the stitches go in the flipped-up part of the pants, with the needle jogging to the left and catching just one stitch in the pants, then heading back over to the flipped-up part for a few stitches.
Here’s a closeup.
You can see that this hem has a serged finish. Other pants had a hem tape finish.
I used several different approaches to hemming the pants, depending on how deep the hems were. This hem was fairly narrow, so I just flipped it up and hemmed it.
Here’s one with hem tape. I had to just barely fold this one under.
Most of the pants had about a 4 inch hem, so I was able to do a “normal” hem. That means I folded the hem twice so that no raw/serged/taped edge was showing on the wrong side of the pants.
Here’s what the finished hem looks like when you start to unfold it.
And here’s what it looks like when you smooth it out. It will look even better once the dry cleaner takes over and presses the heck out of those pants.
Then I went in and finished off the hems. Right along the outside seam, there is a stripe in school colors with about a million layers. I didn’t even try to sew that by machine. It was better to add a few hand stitches, otherwise I would certainly have broken a whole bunch of needles and probably hurt myself and maybe cried.
There were a couple of pairs of pants with seriously enormous hems. Side note…any time you buy or make a regular pair of pants, you can fit the hem to your body and kind of chop off all the extra fabric. But you can’t do that with band pants, because maybe next year you’ll need to let all that hem out, and you can’t if you’ve chopped it off. Also because if you cut off the extra fabric, your uniform manager will kill you.
As long as I’m discussing violence in band, let’s just mention iron on hem tape, shall we? Don’t use it. Just don’t. That’s because if someone needs to let the hem out next year, the tape will make a nasty sticky mess and your uniform manager will kill you. It’s fine for your own pants. Do whatever you want on your own pants, but don’t use the iron-on hem adhesive on your band pants.
OK, back to the topic at hand – enormous hems. By enormous, I mean that I had to shorten the pants by about 12 inches. These band pants are straight legged, but even so, a 12 inch hem is a problem. That’s because when designers design pants, they allow a little more room around the knee so that you can actually bend your legs. But when you are trying to attach the bottom of your pants to where most people have the knees of their pants, the rolled-up part of the pants is going to be much narrower than the part you are attaching it to. Go ahead and try a normal hem if you like, then come back here and let me know how it went. 🙂
It was a mess, wasn’t it? Desperate times call for desperate measures, and so here’s how I hemmed those pants that were 12 inches too long.
I didn’t use the sewing machine. I folded the hem up twice . (More than that and it would have looked like a fat doughnut at the bottom of the pants.) Then I hand stitched the hem in just four places – at each seam, and halfway between seams. Then I put some safety pins in the pockets for those students, because I know what teenagers are like. They’re going to have to be careful, and take their shoes off before they put their pants on. I might not mention the shoes part, except I have a couple of teenagers, and so I know.
Here’s what it looks like when the hem is done. It looks good, but it’s a pretty delicate hem. I hope the kids are careful!
Well, that’s it for the pants hems. But as long as I had all the pants out and was fooling around with them, I examined the crotches.
The above is a crotch seam in good repair. Most of the pants were like this, but not all of them. I checked them all because this is the kind of repair a kid might not notice until it is too late. Nobody wants to march with their undies showing!
This one was looking a little dicey.
Even though the pants fabric is not stretchy, I chose a stretch stitch because it is very strong.
Then I just ran over the seam to make sure it wouldn’t come apart during a performance. It only takes a minute, and I think it’s completely worth it.
Hey, I’m tired of pants. Let’s move on to jackets!
The jackets were a lot less complicated.
I decided to stitch the jackets by hand, because look at these linings! Unlike the outer fabric on the uniforms, the linings are just very thin, slippery polyester. I mean, they’re linings, right? But they’re starting to shred a bit in places. I thought if I used sturdy-but-harsh techniques (like anything involving the sewing machine), they would completely fall apart. Wherever I found holes like this, I put in a few hand stitches to sort of darn them shut and hopefully, buy us another year or two.
So I just rolled up the sleeves, pressed them (I had my iron back – yaaay!) and hand-stitched like this.
I tucked in the lining a bit as I went along so that I wouldn’t be left with a huge old sag.
And that’s it!
I know if you have by some miracle stumbled across my little blog, you were probably looking for information on how to hem your own band uniform, so I understand that you’ve got a band that you love. But if you’ve got a few of extra bucks and you’d like to blow them on a worthy cause, please consider helping my daughter’s band out with their new uniforms. You can see that they need them! Here’s a link. Thank you!
I had some chunky brown mystery yarn and a leftover bit of something soft and chunky and blue. Even though my feet were sweating buckets, I felt the need to crochet some warm slippers. I know, I’m sick that way.
Then I held a strand of the brown chunky yarn together with some fuzzy stuff and made another pair.
I used an old-fashioned “no pattern” type of pattern. (magic ring, 6 sc for first round, 12 sc for second round, sc around for awhile, then make the opening and keep crocheting until the slipper is a little shorter than my foot. Then sew up the heel. Sorry, that’s as detailed as it gets for me.)
I was able to use up some scraps of yarn, and I’m sure in a few months, I will be very glad for some warn slippers!
I grew up in New Ulm, Minnesota, a small town with a strong Bohemian/German sort of heritage. Church dinners were awesome – pork roast, sauerkraut, massive lead balls/potato dumplings, schmierkuchen. Yum, yum, yum! Fast forward a few years: kraut is my comfort food.
So when I make a reuben sandwich, it’s all about the kraut. For me, the meat and cheese on a reuben sandwich is only there to keep the bread from getting soggy. I don’t eat meat these days, so I substitute a slice or two of homemade mustard seitan. I’ll post that later.
My sandwich must have something creamy though, because I like creamy things, and creamy things act as a barrier to the bread so it doesn’t get too soggy.
My favorite sandwich dressing
Lots of people use thousand island salad dressing in a reuben. I like that, but sometimes I think it’s too spicy or something and it takes away from the main focus of the sandwich, which is the sauerkraut. This is the dressing I like to use. You can call it a recipe if you like, but it’s not much of a recipe.
It says to eat it within three days of opening, but it usually takes us a couple of weeks and we haven’t gotten food poisoning or anything like that. If I were a better person, I would freeze little portions in an ice cube tray, but I’m pretty lazy.
My daughter is vegan, so she does not eat regular mayo. She doesn’t eat vegan mayo either because she doesn’t like it. I made sandwiches for her one time using silken tofu and a little olive oil instead of mayo, but she wouldn’t touch them with a ten foot pole. She really doesn’t like most vegetables, or anything that reminds her of meat, or anything “weird.” What can I say? She has lots of smoothies! OK, I’m all off topic here.
Next time I make the seitan, I’ll take some photos and give you the recipe.
Like this:
It’s concert time again, and this time my son is in the band too. I threw a little bag together for him with a scrap of upholstery velvet. I turned it inside-out so the velvety side could cradle the stand and (in theory) keep it from getting all scratched up. I made the handles out of some webbing.
In my free time (ha ha!) maybe I’ll add a button or snap or a little velcro, but this will get him to school today and the concert tonight just fine.
Like this:
With all the talk of violence yesterday, I thought it best to add a little bit of Porky to our project. I used some little bits of roving that we had. I like using the roving. It’s easier to poke than the sweater seam trimmings. But the seam trimmings are nice too. They are less subtle, more dramatic.
I’ve been wanting to try needle felting for a while now. I bought a felting kit a few months ago. My daughter tried it out right when it arrived, but she wasn’t into it.
I had a couple of sweaters that I bought at the thrift store. They had some holes, but that’s OK because I bought them for the wool.
I washed them in hot and then dried them on the hottest setting. Then I cleaned out the lint trap and dried them again. Wow, those sweaters shrunk!
I picked out a nice big piece of sweater and some contrasting trimmed-off seams from another sweater. I got out the kit and figured out how to put the needle together and started fooling around. After about a minute, maybe less, my daughter came and took over. Look at her hands flying around.
Between the two of us, we broke three needles in about five minutes. Rookies!
She casually mentioned that she thought serial killers probably enjoyed needlework because they get to stab stuff, and they get lots of practice, which maybe improves their aim. So I casually went over and locked up the knives.
She has got to cut back on those mystery books!
I saw where this was going, so I went to the computer and ordered another one of those kits. And a few more needles. Then I saw that someone had ordered some yarn (purple!) and I got that all ready to go. Then back to the kitchen and I poked wool while my daughter got herself a bedtime snack.
We stabbed and stabbed and this is what the sweater looked like at bed time.
I thought the third thingie from the right needed a little more curl, so I cut a bit more sweater.
I just set it down where I wanted it and poked it in there a bunch of times. I like being able to wing it a bit. I guess I prefer some things in life without a pattern.
We’ll work on this some more tomorrow. I guess we’ll have to decide soon what we are making. I thought maybe a pillow or a little bag.
I stopped by a rummage sale the other day and picked up the most awful pair of earrings I have ever seen. Here they are: CPK earrings!
They were completely dirty, maybe a little bit chewed-on, and one of them was broken. But they only cost me a quarter. I bought them just for the experience of it!
My daughter and I decided some crafts were in order.
I cut the top off the earring that wasn’t already broken, and that left a little white spot on top of her head.
A little red nail polish took care of that.
You’ll have to (please) excuse our blurry photos. Were were laughing so hard, we couldn’t hold the camera steady.
All better! Well, not exactly all better, more like a little better. After the polish dried, we scrubbed the dirt off.
We had some cheap little containers we bought at the dollar store.
We put some contact cement on the lids and on the feet of the dolls. Then we waited a few minutes so they would get tacky. Tacky like sticky, I mean. The CPKs were already tacky like cheesy!
Then we stuck the dolls onto the lids and let them dry for a few hours.
We put some nail polish tiny glitter into the cups. It didn’t look tacky enough, so we also dumped in some regular big glitter.
Then we filled the cups with water.
We put contact cement around the edge of the cups…
…and around the lids too. We waited a few minutes until they got tacky. Same joke, but I’m too lazy to type it again.
Then we stuck the lids on and waited for the glue to dry.
Wow! How glamorous! How exciting! How…interesting.
But look what happened a couple of days later. Looks like the glue holding the dolls to the lids dissolved in the water. Now we have Cabbage Patch Glitter Snow Globes with Unconscious Girls, how excellent!
My daughter’s girl scout service unit is decorating a tree at the mall tomorrow, and she is supposed to bring a couple of homemade ornaments. Do you think these look homemade enough??
I didn’t drink enough coffee yesterday. So I got a splitting headache. I should have had a little something with caffeine late in the afternoon, but I thought I was too busy. So then it got horrible right around 7:00, which is too late for caffeine. But I had some anyway because I didn’t want to cry in front of everyone.
That means I was up after I normally would have been zonked. So I made a little bracelet. Tadaa!
I’m going to sell this one. I’ve got it on eBay now, and so it will be on Bonanza for a little less tomorrow.
What have YOU been making?
Like this:
Well, the good news is that I finished a crochet project, and it’s very…interesting. The bad news is that I don’t know what I should do with this thing.
I have this enormous stash of Spark A Doodle yarn. I love this stuff! It’s so very, very soft. And sparkly. It would probably be completely tacky if it weren’t so doggone soft.
So I was fooling around and fooling around and I decided to add a row of fluffy Spark A Doodle to the edge of a sheer red scarf I had lying around. The scarf had a problem with the hem, and so I figured if I covered it with fluff, that would be good.
I sewed around the edge of the scarf with some plain yarn so that I would have somewhere to crochet the Spark A Doodle. Then I added a row of Spark A Doodle in single crochet. But somehow, the edge of the scarf and the crocheted fluffy stuff don’t quite match up in terms of stretchiness and that sort of thing. So sometimes it looks like a sexy red jellyfish.
It looks a little more normal in this photo, but I think you can still see the problem.
When it’s tied around the neck, it looks like this. Hmm, a little strange,
What the heck, I’m going to wear it anyway! I’m calling it my sexy jellyfish scarf, and I dare you to make one too!
My daughter and I had a few minutes at the end of the day and she was feeling crafty, so we knocked out a couple of memory wire bracelets. I chose some glass beads that were purplish and greenish and goldish. She chose some plastic beads that were sparkly green and gray/blue pearls. She is a faster beader than her mother. When we ran out of time, she was already done and I was not, so I clipped the wire and ended it early.
When I conned her into posing for a photo, she wanted to cover her hands because her nails were not at their best. I just laughed. Her skin is so beautiful and she doesn’t even know it! She looked at the photo when we were done and wondered why I had so many splotches and wrinkles on my hand. I told her it was because I was 46. The awesome thing is that I know in another 40 years, I may look at this photo and think how young my hands looked. We never miss it until it’s gone! |
Archibald's Adventures Lite: Best game Review
Archibald's Adventures Lite has 338 reviews. Enter your email below and we'll notify you when new reviews are added, so you can comment, share or remove the reviews. This is great for monitoring your apps or the competition's apps |
This subproject is one of many research subprojects utilizing the resources provided by a Center grant funded by NIH/NCRR. The subproject and investigator (PI) may have received primary funding from another NIH source, and thus could be represented in other CRISP entries. The institution listed is for the Center, which is not necessarily the institution for the investigator. Aim of this subproject is to determine the feasibility of comparision of breast images obtained with DOT and PET. |
Currency Converter
SGD – Singapore Dollar (S$)
The Singapore dollar is the official currency of Singapore. Its symbol is normally shown as $, although S$ is also used to avoid confusion with other dollar currencies. Its currency code is SGD. The dollar is fiat money and is considered the second-best currency for long-term investors (just after the New Zealand dollar). The most popular Singapore dollar exchange is with the Indian rupee. The dollar’s conversion factor has 6 significant digits.
Beware of bad exchange rates.Banks and traditional providers often have extra costs, which they pass to you by marking up the exchange rate. Our smart tech means we’re more efficient – which means you get a great rate. Every time. |
. Let z be v(-39). Let i = z - f. Is i composite?
True
Suppose -22*f = -29*f + 37135. Suppose f = -0*a + a. Suppose -40*r + a = -35*r. Is r a composite number?
False
Suppose -p + 4*n = 6, -n + 125 = 144*p - 149*p. Is (p - -24)/((-2)/691) a prime number?
True
Let u(g) = -g**2 + 6. Let a be u(-2). Suppose -a*y + 6 = 4*y. Is (y/2)/(20/5960) a prime number?
True
Suppose 0*l + 3*l - 54 = 0. Let i be ((-6)/(-4))/(l/(-24)). Is (i - -4)/(-4 - 1530/(-381)) a composite number?
False
Let j(x) be the third derivative of 1/2*x**5 + 0 + 1/8*x**4 + 0*x - 21*x**2 + 2*x**3. Is j(-7) composite?
True
Suppose 0 = -t + k + 171254, 33*t - 171266 = 32*t + 5*k. Is t a composite number?
False
Let z = 350638 - 210656. Is z composite?
True
Suppose 0 = 23*q - 17*q - 24. Suppose 4*v + 3970 = i, -q*v + 6 = -2*v. Let o = i + -2447. Is o a prime number?
False
Let h(o) = -2*o + 25. Let m be h(-7). Let t = 60 - m. Is (1088 + -1)/(22 - t) a composite number?
False
Let v(u) = 124*u**2 + 6*u - 4. Let g be v(1). Suppose 69699 = 129*x - g*x. Is x composite?
True
Let n(o) = 2*o**3 - 54*o**2 + 2. Let m be n(27). Suppose z = w, 6 = z + m. Suppose -5*s - 2*t + 1266 = 0, -2*t + t = -w*s + 1018. Is s a prime number?
False
Let u be (-383)/((-355)/(-175) - (-1 + 3)). Let v be (0 - 3)/(-1) + u. Is (14/(-12))/(-7) + v/(-12) a prime number?
True
Let b(k) = 8563*k**2 - 4*k + 167. Is b(6) prime?
True
Suppose -6*d = -4*d - 872. Suppose 6*x = -2*h + 4*x + 440, -x = 2*h - d. Let o = h + -137. Is o prime?
True
Suppose 813*u + g + 1487346 = 817*u, -2*g = 4*u - 1487352. Is u a prime number?
True
Suppose 5*p - 2118260 = -5*t, 16*p - 2277836 = t + 4500545. Is p a composite number?
False
Let p(b) = -1392*b + 467. Is p(-17) a composite number?
True
Let n = -98253 + 1228244. Is n a composite number?
False
Let q be (-3 - -2)*(9 + 4)*-22. Suppose -6*c = -2*c - 2436. Let d = c - q. Is d prime?
False
Suppose 11 = -5*n + 36. Suppose n*d = -h + 18241, -3*h + 7*h = -2*d + 7282. Is d a prime number?
False
Let r(x) = x**3 - x**2 + 7*x + 11. Let b be r(5). Let o = 149 - b. Suppose 5047 = 4*i + o*i. Is i a prime number?
False
Let j(v) = 43*v**3 - 8*v**2 - 27*v - 83. Is j(14) a composite number?
False
Let a = 26565 - -41002. Is a composite?
False
Let d be (-9220)/(-40) + 1/(-2). Let f = d + 161. Is f composite?
True
Suppose -3560175 = 7918*z - 7963*z. Is z prime?
False
Suppose 0 = 30*x - 22*x - 27624. Suppose -8*r + x = -4*r + w, -2*r + 2*w = -1724. Is r a prime number?
True
Let f = -42 - -45. Let q(w) = 0*w**f + 6*w + 0*w**3 - 15*w**2 + w**3 - 4*w**3 + 7. Is q(-7) composite?
True
Let x(r) = 21*r**2 - 10*r - 7. Let s be x(-7). Suppose -31*c - v - 1020 = -28*c, -2*c - v = 681. Let h = c + s. Is h composite?
True
Let y = -251 + 255. Suppose 6*l - 1602 = 3*l + 5*r, r = y*l - 2119. Is l a prime number?
False
Suppose -2*c + 13 = 2*l + 11, 0 = 2*c - l - 14. Suppose -c*g + 13678 + 957 = 0. Is g composite?
False
Is 9/(-6) - (7442418/(-248))/(3/2) prime?
False
Suppose 0 = -6*s + 279 - 75. Suppose -37*g + 435 = -s*g. Is g prime?
False
Let y(x) = 5451*x + 4. Let d be y(3). Let w = -11360 + d. Is w composite?
True
Let z(b) = -4*b**3 - 18*b**2 - 23*b + 16. Let g(n) = n**3 - n - 1. Let d(p) = 5*g(p) + z(p). Is d(20) composite?
False
Suppose 396148 = 3*n - b, 29*n - 27*n - b = 264097. Is n a prime number?
False
Suppose -11*z + 33762 + 45768 = 0. Suppose -6*k + 4*k + z = 2*x, -2*x - 5*k = -7242. Is x a prime number?
False
Let m be (332 + -15 - 6/4)*-24. Let x = m - -15859. Is x composite?
False
Let o(l) = -l**2 - 11*l + 15. Let p be o(-12). Suppose -8*g + 700 = -p*g. Suppose 0 = r + 3*h - g + 9, 5*r - h - 607 = 0. Is r prime?
False
Let j(w) be the first derivative of 357*w**2 + 187*w - 48. Is j(13) prime?
False
Is (17339500/(-750))/((-4)/6) a prime number?
True
Suppose 0 = 74*q - 53*q - 9268329. Is q composite?
False
Suppose -68*t + 20923 = -61*t. Let m = t + -606. Is m a prime number?
True
Let g(c) = -c**3 - 16*c**2 + c + 14. Let u be g(-16). Let k(o) = 111*o**2 + 4. Let v be k(u). Suppose 4*a + d - 368 = -3*d, -5*a = d - v. Is a prime?
True
Suppose -4 = -u, -10 = -6*r + 8*r - 3*u. Let c be 362 - ((-1)/r - -4). Suppose 3144 = 5*k + c. Is k a composite number?
False
Suppose -11*p - 27*p = -36714765 - 9685857. Is p a composite number?
True
Suppose 6*a - 306 + 360 = 0. Let f(b) = -137*b + 46. Is f(a) a prime number?
True
Let j(m) = -m. Let c(k) = k**2 + 13*k - 21. Suppose 4 = -2*s + 2*l + 8, -5*l = 5*s. Let u(f) = s*c(f) + 2*j(f). Is u(-19) composite?
False
Suppose 6*w + 466 - 1888 = 0. Let h be (-2 + w/6)*508/5. Suppose -2*d + h = 4*d. Is d a composite number?
True
Let f be (-7)/70*2 + 21/5. Is 14029*(24/f)/6 a prime number?
True
Let k = -1004 - -2110. Let z(t) = 5*t**2 + 124*t - 21. Let g be z(-25). Suppose 4*i = b - k, 0 = g*b + i - 208 - 4301. Is b composite?
True
Let x = 125914 - -97215. Is x a prime number?
True
Suppose -4549700 = -7*k + 3*k - 4*f, -5*k = 4*f - 5687120. Let a be ((-1)/(12/8))/(4/k). Is 1/((-22)/a) - (-18)/99 prime?
False
Let y(i) be the second derivative of 133*i**3 + 158*i**2 + 138*i. Is y(5) prime?
False
Suppose 17*x - 12*x = 10. Is 0 - (x - 1)/((-1)/2357) prime?
True
Suppose -z - 9 = 5*t, -7*z + 3*t = -11*z - 2. Is ((-370440)/16)/(-15) - z/2 a composite number?
False
Let c be ((-56284)/(-3))/(-3 + 40/12). Suppose -11*o = 11371 - c. Is o prime?
False
Suppose 18750 = 11*p - 175378. Suppose -5*x - 3*d = d - 22061, p = 4*x + 4*d. Is x a composite number?
True
Let b = -67054 + 668197. Is b composite?
True
Let r(f) = -3991*f - 23. Let h be r(-2). Is (h/42)/((-3)/12*-2) a prime number?
True
Let w(s) = s**3 - s**2 + 2*s - 36. Let k be w(0). Let c be 1/(-3) - 8832/k. Suppose -4*v = -5*z + 889, -z + c = 5*v + 44. Is z a prime number?
True
Let q = -8005 + 21619. Let v = q + -4321. Is v a composite number?
False
Suppose 0*q = -q + 6, -4*x = 3*q - 102030. Is x composite?
True
Let a = 91 + -55. Suppose -v + a = 5*v. Let w(x) = x**3 - x**2 - 2*x - 5. Is w(v) a prime number?
True
Let v = -464708 + 718465. Is v a prime number?
False
Let j(o) = 2159*o - 8. Let a be j(4). Suppose -4*p + a = -4508. Suppose 33*n = 29*n + p. Is n a prime number?
True
Let f(i) = -6 - 27*i**3 - 31*i**3 + i**2 + 1 + 62*i**3 + 10*i. Is f(4) prime?
True
Let j(q) = 711*q + 2884. Is j(53) a prime number?
False
Let k = -28425 - -46544. Is k a composite number?
False
Let m(y) = 5*y - 6. Let z be m(2). Suppose -3*q + 37 = 5*b - 6*q, 3*b + 1 = -z*q. Suppose -2*k - 2*o + 0*o = -338, -4*k + b*o = -649. Is k prime?
False
Let l(i) = -i**3 + 11*i**2 + 17*i + 88702. Is l(0) prime?
False
Suppose 30 = -34*u + 40*u. Suppose -u*x + 765423 = 22*x. Is x prime?
True
Suppose -3*t + 5*m - 13 = 0, 0 = -3*t - 2*m + 12 + 10. Let g = 377 + -370. Suppose -4*o + g*b = t*b - 229, -2*o + 3*b = -113. Is o composite?
True
Let l(d) = -2*d**3 - 19*d**2 + 10*d + 19. Let o = 206 + -224. Is l(o) a composite number?
False
Let z(p) = -2*p**2 - 2*p + 61 - 3*p**2 - 2*p - 5*p + p**3. Is z(18) composite?
False
Let m(j) = 4*j**2 + 21*j - 44. Let r be m(17). Let y = 2322 + r. Is y a composite number?
True
Let y = 525 + -427. Let x = 186 - 99. Let i = x + y. Is i a composite number?
True
Let x = -261 - -182. Let k = -86 - x. Is ((5012/(-4))/k)/(0 + 1) a composite number?
False
Suppose 70 = 8*f - 18. Suppose 3*i - 16 = f. Suppose -96 = -5*t + i. Is t composite?
True
Let h = -42 - -45. Suppose h*z + 170 + 65 = 2*b, 5*b - 3*z - 583 = 0. Suppose -379 = -v - b. Is v a composite number?
False
Let z(u) = 29*u**2 + 8*u - 10. Let b be (5 + -2)/(3/(-9)). Is z(b) prime?
True
Let g(y) = -309*y**3 - y**2 - 4*y - 7. Suppose 4*c + 4 = 0, 2*p - 5*c - 37 = -2*p. Suppose -4*l + 4*b = -l + 14, 2*b = 2*l + p. Is g(l) composite?
True
Let i = 13 + -10. Suppose -12 = -i*h - 0. Suppose 5*o - 6838 = -2*j, -h*o + 9030 + 1213 = 3*j. Is j composite?
True
Suppose 2*s - 6 = 2*p, 3*p - 5*s + 7*s = 6. Suppose -3*r + 220 + 791 = p. Is r a composite number?
False
Suppose 2*c - 4 = 5*f, 5*c + f - 5*f - 10 = 0. Suppose 38 + 4 = -c*x. Is -1307*x/(-6)*-2 composite?
True
Suppose 3*j = 0, 5*b + 3*j = -589 + 9. Suppose -a + 24*l = 21*l - 751, 5*a + l = 3755. Let y = b + a. Is y composite?
True
Let v = 304220 + -83119. Is v composite?
False
Let i be (-20)/(-80) - (-474)/(-8). Let c = 38 - i. Is c composite?
False
Suppose 4*r - 3*o = |
Bad ecstasy blamed on 20 Vic overdoses
An accused drug dealer remains behind bars after 20 people, including a teenager, overdosed on a suspected bad batch of ecstasy along a popular Melbourne party strip.
The 30-year-old CBD man faced an out of sessions court hearing on Sunday afternoon and was remanded to reappear at Melbourne Magistrates' Court on Monday.
Police arrested the man at 4am on Sunday and he was charged with trafficking MDMA and possessing the proceeds of crime.
He was allegedly pointed out to staff at a club after a woman overdosed.
"A lady overdosed at a nightclub and one of her friends identified the male and he was subsequently arrested by police," Detective Senior Sergeant David Newman told reporters outside St Kilda police station on Sunday.
"With the nature of drug dealing I would say there would be others involved."
Police believe the same batch of MDMA may have caused 20 overdoses around the Chapel Street entertainment precinct since Friday and they fear more cases could be identified over the coming days and weeks. |
Beckel: Hillary Could Crush Trump ‘From Jail’
Wednesday night on CNN, political commentator Bob Beckel said that Democratic presidential front-runner Hillary Clinton could beat Republican presidential front-runner Donald Trump even if she ends up in prison as a result of the FBI investigation into her handling of classified material on an unsecured email server in her home, during her tenure as secretary of state.
Beckel said “In the end, the best-selling Halloween mask this October will be Donald Trump’s face. You go onto a college campus and mention Donald Trump, and people flee for the wood work. Remind me I said this. She will crush him. I mean she could crush him from jail.” |
Q:
Tzar Balay Chaim- Killing Pests?
Are you allowed to kill flies and other pests (mice, mosquitoes, etc.) or would that go under the prohibition of Tzar Balay Chaim?
A:
Reb Moshe in Iggras Moshe (חושן משפט חלק ב' סימן מ''ז) says if it is disgusting and or the creature ruins food,or mosquitoes who bother the person the answer is YES. Reb Moshe in an Illustration of his Tzidkus (righteousness) adds of course you should try not do it by hand instead with fly traps and the like because killing by hand desensitizes you and ruins your character. He brings the Ohr Hachaim Hakodsh (דברים י"ג י"ח) who says that even the person who kills for the Beis Din and a Shochet needs a special protection against this provided by the Torah because he is directly involved in doing a Mitzvah but here where he is just ridding himself of a bother he should try his utmost not to do it by hand.
|
# Translation of Odoo Server.
# This file contains the translation of the following modules:
# * delivery
#
# Translators:
# Rivo Zängov <eraser@eraser.ee>, 2020
# Martin Trigaux, 2020
# Wanradt Koell <wanradt@gmail.com>, 2020
# Arma Gedonsky <armagedonsky@hot.ee>, 2020
# Maidu Targama <m.targama@gmail.com>, 2020
# Egon Raamat <egon@avalah.ee>, 2020
# Eneli Õigus <enelioigus@gmail.com>, 2020
# Martin Aavastik <martin@avalah.ee>, 2020
# Helen Sulaoja <helen@avalah.ee>, 2020
# Algo Kärp <algokarp@gmail.com>, 2020
#
msgid ""
msgstr ""
"Project-Id-Version: Odoo Server 13.0\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2019-10-07 07:12+0000\n"
"PO-Revision-Date: 2019-08-26 09:09+0000\n"
"Last-Translator: Algo Kärp <algokarp@gmail.com>, 2020\n"
"Language-Team: Estonian (https://www.transifex.com/odoo/teams/41243/et/)\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: \n"
"Language: et\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
#. module: delivery
#: code:addons/delivery/models/sale_order.py:0
#, python-format
msgid " (Estimated Cost: %s )"
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_quant_package_weight_form
msgid "(computed:"
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.choose_delivery_carrier_view_form
msgid "<i class=\"fa fa-arrow-right mr-1\"/>Get rate"
msgstr ""
#. module: delivery
#: code:addons/delivery/models/delivery_carrier.py:0
#, python-format
msgid ""
"<p class=\"o_view_nocontent\">\n"
" Buy Odoo Enterprise now to get more providers.\n"
" </p>"
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_form
msgid ""
"<span class=\"o_warning_text\">Test</span>\n"
" <span class=\"o_stat_text\">Environment</span>"
msgstr ""
"<span class=\"o_warning_text\">Test</span>\n"
" <span class=\"o_stat_text\">Environment</span>"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_form
msgid "<span class=\"text-danger\">No debug</span>"
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_form
msgid "<span class=\"text-success\">Debug requests</span>"
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_form
msgid ""
"<span class=\"text-success\">Production</span>\n"
" <span class=\"o_stat_text\">Environment</span>"
msgstr ""
"<span class=\"text-success\">Production</span>\n"
" <span class=\"o_stat_text\">Environment</span>"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.report_delivery_document2
#: model_terms:ir.ui.view,arch_db:delivery.report_shipping2
msgid "<strong>Carrier:</strong>"
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.report_delivery_document2
msgid "<strong>HS Code</strong>"
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.report_package_barcode_delivery
msgid ""
"<strong>Shipping Weight:</strong>\n"
" <br/>"
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.report_delivery_document2
msgid "<strong>Tracking Number:</strong>"
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.report_delivery_document2
#: model_terms:ir.ui.view,arch_db:delivery.report_shipping2
msgid ""
"<strong>Weight:</strong>\n"
" <br/>"
msgstr ""
#. module: delivery
#: model:ir.model.fields,help:delivery.field_delivery_carrier__integration_level
msgid "Action while validating Delivery Orders"
msgstr "Action while validating Delivery Orders"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__active
msgid "Active"
msgstr "Aktiivne"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.choose_delivery_carrier_view_form
msgid "Add"
msgstr "Lisa"
#. module: delivery
#: code:addons/delivery/models/sale_order.py:0
#: code:addons/delivery/wizard/choose_delivery_carrier.py:0
#, python-format
msgid "Add a shipping method"
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_order_form_with_carrier
msgid "Add shipping"
msgstr ""
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__amount
msgid "Amount"
msgstr "Summa"
#. module: delivery
#: model:ir.model.fields,help:delivery.field_delivery_carrier__amount
msgid ""
"Amount of the order to benefit from a free shipping, expressed in the "
"company currency"
msgstr ""
"Amount of the order to benefit from a free shipping, expressed in the "
"company currency"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_search
msgid "Archived"
msgstr "Arhiveeritud"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__available_carrier_ids
msgid "Available Carriers"
msgstr ""
#. module: delivery
#: model:ir.model.fields.selection,name:delivery.selection__delivery_carrier__delivery_type__base_on_rule
msgid "Based on Rules"
msgstr "Reeglipõhine hind"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_stock_picking__weight_bulk
msgid "Bulk Weight"
msgstr "Põhiosa kaal"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__can_generate_return
msgid "Can Generate Return"
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_picking_withcarrier_out_form
msgid "Cancel"
msgstr "Tühista"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__carrier_id
#: model:ir.model.fields,field_description:delivery.field_product_packaging__package_carrier_type
#: model:ir.model.fields,field_description:delivery.field_stock_picking__carrier_id
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_form
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_search
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_tree
msgid "Carrier"
msgstr "Tarnija"
#. module: delivery
#: model:ir.model.fields,help:delivery.field_choose_delivery_carrier__carrier_id
msgid "Choose the method to deliver your goods"
msgstr ""
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__company_id
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_package__company_id
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__company_id
msgid "Company"
msgstr "Ettevõte"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_price_rule_form
msgid "Condition"
msgstr "Tingimus"
#. module: delivery
#: model:ir.model,name:delivery.model_res_partner
msgid "Contact"
msgstr "Kontakt"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__display_price
msgid "Cost"
msgstr "Kulu"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__country_ids
msgid "Countries"
msgstr "Riigid"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__create_uid
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_package__create_uid
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__create_uid
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__create_uid
msgid "Created by"
msgstr "Loonud"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__create_date
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_package__create_date
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__create_date
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__create_date
msgid "Created on"
msgstr "Loomise kuupäev"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__currency_id
msgid "Currency"
msgstr "Valuuta"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__partner_id
msgid "Customer"
msgstr "Klient"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__debug_logging
msgid "Debug logging"
msgstr "Debug logging"
#. module: delivery
#: model:ir.model.fields,help:delivery.field_res_partner__property_delivery_carrier_id
#: model:ir.model.fields,help:delivery.field_res_users__property_delivery_carrier_id
msgid "Default delivery method used in sales orders."
msgstr ""
#. module: delivery
#: model_terms:ir.actions.act_window,help:delivery.action_delivery_carrier_form
msgid "Define a new delivery method"
msgstr ""
#. module: delivery
#: model:ir.ui.menu,name:delivery.menu_delivery
msgid "Delivery"
msgstr "Transport"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_search
msgid "Delivery Carrier"
msgstr "Delivery Carrier"
#. module: delivery
#: model:ir.model,name:delivery.model_choose_delivery_carrier
msgid "Delivery Carrier Selection Wizard"
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_price_rule_form
msgid "Delivery Cost"
msgstr "Tarnekulu"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__delivery_message
#: model:ir.model.fields,field_description:delivery.field_sale_order__delivery_message
msgid "Delivery Message"
msgstr "Delivery Message"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__name
#: model:ir.model.fields,field_description:delivery.field_res_partner__property_delivery_carrier_id
#: model:ir.model.fields,field_description:delivery.field_res_users__property_delivery_carrier_id
#: model:ir.model.fields,field_description:delivery.field_sale_order__carrier_id
msgid "Delivery Method"
msgstr "Tarneviis"
#. module: delivery
#: model:ir.model,name:delivery.model_choose_delivery_package
msgid "Delivery Package Selection Wizard"
msgstr "Delivery Package Selection Wizard"
#. module: delivery
#: model:ir.actions.act_window,name:delivery.action_delivery_packaging_view
#: model:ir.ui.menu,name:delivery.menu_delivery_packagings
#: model_terms:ir.ui.view,arch_db:delivery.product_packaging_delivery_tree
msgid "Delivery Packages"
msgstr "Pakendid"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_package__delivery_packaging_id
#: model_terms:ir.ui.view,arch_db:delivery.product_packaging_delivery_form
msgid "Delivery Packaging"
msgstr "Tarnepakendid"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__delivery_price
msgid "Delivery Price"
msgstr ""
#. module: delivery
#: model:ir.model,name:delivery.model_delivery_price_rule
msgid "Delivery Price Rules"
msgstr "Delivery Price Rules"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__product_id
msgid "Delivery Product"
msgstr "Tarnitav toode"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_sale_order__delivery_rating_success
msgid "Delivery Rating Success"
msgstr "Delivery Rating Success"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_sale_order__delivery_set
msgid "Delivery Set"
msgstr ""
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_sale_order__recompute_delivery_price
#: model:ir.model.fields,field_description:delivery.field_sale_order_line__recompute_delivery_price
msgid "Delivery cost should be recomputed"
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_form
msgid "Destination Availability"
msgstr "Sihtkohad"
#. module: delivery
#: model:ir.model.fields,help:delivery.field_delivery_carrier__sequence
msgid "Determine the display order"
msgstr ""
"\n"
"Määrake kuvamise järjekord"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.choose_delivery_carrier_view_form
#: model_terms:ir.ui.view,arch_db:delivery.choose_delivery_package_view_form
msgid "Discard"
msgstr "Loobu"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__display_name
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_package__display_name
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__display_name
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__display_name
msgid "Display Name"
msgstr "Näidatav nimi"
#. module: delivery
#: model:ir.actions.act_window,name:delivery.act_delivery_trackers_url
msgid "Display tracking links"
msgstr ""
#. module: delivery
#: model_terms:ir.actions.act_window,help:delivery.action_delivery_carrier_form
msgid ""
"Each carrier (e.g. UPS) can have several delivery methods (e.g.\n"
" UPS Express, UPS Standard) with a set of pricing rules attached\n"
" to each method."
msgstr ""
"Each carrier (e.g. UPS) can have several delivery methods (e.g.\n"
" UPS Express, UPS Standard) with a set of pricing rules attached\n"
" to each method."
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__prod_environment
msgid "Environment"
msgstr "Keskkond"
#. module: delivery
#: code:addons/delivery/models/delivery_carrier.py:0
#: code:addons/delivery/models/delivery_grid.py:0
#, python-format
msgid "Error: this delivery method is not available for this address."
msgstr "Viga: see tarnimsviis pole kasutusel sellele aadressile"
#. module: delivery
#: model:ir.model.fields,help:delivery.field_delivery_carrier__invoice_policy
msgid ""
"Estimated Cost: the customer will be invoiced the estimated cost of the shipping.\n"
"Real Cost: the customer will be invoiced the real cost of the shipping, the cost of the shipping will be updated on the SO after the delivery."
msgstr ""
#. module: delivery
#: model:ir.model.fields.selection,name:delivery.selection__delivery_carrier__invoice_policy__estimated
msgid "Estimated cost"
msgstr ""
#. module: delivery
#: model:ir.model.fields,help:delivery.field_sale_order__carrier_id
msgid "Fill this field if you plan to invoice the shipping based on picking."
msgstr "Fill this field if you plan to invoice the shipping based on picking."
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_form
msgid ""
"Filling this form allows you to filter delivery carriers according to the "
"delivery address of your customer."
msgstr ""
"Selle vormi täitmine lubab teil filtreerida saadetise kohaleviijaid "
"vastavalt teie kliendi aadressile."
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__fixed_price
#: model:ir.model.fields.selection,name:delivery.selection__delivery_carrier__delivery_type__fixed
msgid "Fixed Price"
msgstr "Fikseeritud hind"
#. module: delivery
#: model:delivery.carrier,name:delivery.free_delivery_carrier
#: model:product.product,name:delivery.product_product_delivery
#: model:product.template,name:delivery.product_product_delivery_product_template
msgid "Free delivery charges"
msgstr "Tasuta kohaletoimetus"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__free_over
msgid "Free if order amount is above"
msgstr "Tasuta, kui summa on suurem kui"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__return_label_on_delivery
msgid "Generate Return Label"
msgstr ""
#. module: delivery
#: model:ir.model.fields.selection,name:delivery.selection__delivery_carrier__integration_level__rate
msgid "Get Rate"
msgstr "Get Rate"
#. module: delivery
#: model:ir.model.fields.selection,name:delivery.selection__delivery_carrier__integration_level__rate_and_ship
msgid "Get Rate and Create Shipment"
msgstr "Get Rate and Create Shipment"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_search
msgid "Group By"
msgstr "Grupeerimine"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_product_product__hs_code
#: model:ir.model.fields,field_description:delivery.field_product_template__hs_code
msgid "HS Code"
msgstr "HS kood"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_product_packaging__height
msgid "Height"
msgstr "Kõrgus"
#. module: delivery
#: model:ir.model.constraint,message:delivery.constraint_product_packaging_positive_height
msgid "Height must be positive"
msgstr "Height must be positive"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__id
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_package__id
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__id
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__id
msgid "ID"
msgstr "ID"
#. module: delivery
#: model:ir.model.fields,help:delivery.field_delivery_carrier__free_over
msgid ""
"If the order total amount (shipping excluded) is above or equal to this "
"value, the customer benefits from a free shipping"
msgstr ""
"If the order total amount (shipping excluded) is above or equal to this "
"value, the customer benefits from a free shipping"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_form
msgid "Install more Providers"
msgstr "Installi rohkem teenusepakkujaid"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__integration_level
msgid "Integration Level"
msgstr "Integration Level"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__invoicing_message
msgid "Invoicing Message"
msgstr ""
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__invoice_policy
msgid "Invoicing Policy"
msgstr "Arvelduse meetod"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_stock_picking__is_return_picking
msgid "Is Return Picking"
msgstr ""
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_sale_order_line__is_delivery
msgid "Is a Delivery"
msgstr "Is a Delivery"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier____last_update
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_package____last_update
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier____last_update
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule____last_update
msgid "Last Modified on"
msgstr "Viimati muudetud (millal)"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__write_uid
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_package__write_uid
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__write_uid
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__write_uid
msgid "Last Updated by"
msgstr "Viimati uuendatud (kelle poolt)"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__write_date
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_package__write_date
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__write_date
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__write_date
msgid "Last Updated on"
msgstr "Viimati uuendatud (millal)"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_product_packaging__length
msgid "Length"
msgstr "Pikkus"
#. module: delivery
#: model:ir.model.constraint,message:delivery.constraint_product_packaging_positive_length
msgid "Length must be positive"
msgstr "Length must be positive"
#. module: delivery
#: model:ir.model.fields,help:delivery.field_delivery_carrier__debug_logging
msgid "Log requests in order to ease debugging"
msgstr "Log requests in order to ease debugging"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__margin
msgid "Margin"
msgstr "Marginaal"
#. module: delivery
#: model:ir.model.constraint,message:delivery.constraint_delivery_carrier_margin_not_under_100_percent
msgid "Margin cannot be lower than -100%"
msgstr "Margin cannot be lower than -100%"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_form
msgid "Margin on Rate"
msgstr "Marginaal"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_product_packaging__max_weight
msgid "Max Weight"
msgstr "Max Weight"
#. module: delivery
#: model:ir.model.constraint,message:delivery.constraint_product_packaging_positive_max_weight
msgid "Max Weight must be positive"
msgstr "Max Weight must be positive"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__max_value
msgid "Maximum Value"
msgstr "Maksimumväärtus"
#. module: delivery
#: model:ir.model.fields,help:delivery.field_product_packaging__max_weight
msgid "Maximum weight shippable in this packaging"
msgstr "Maximum weight shippable in this packaging"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__name
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_form
msgid "Name"
msgstr "Nimi"
#. module: delivery
#: model:ir.model.fields.selection,name:delivery.selection__product_packaging__package_carrier_type__none
msgid "No carrier integration"
msgstr "No carrier integration"
#. module: delivery
#: code:addons/delivery/models/delivery_grid.py:0
#, python-format
msgid "No price rule matching this order; delivery cost cannot be computed."
msgstr "No price rule matching this order; delivery cost cannot be computed."
#. module: delivery
#: model:delivery.carrier,name:delivery.normal_delivery_carrier
#: model:product.product,name:delivery.product_product_delivery_normal
#: model:product.template,name:delivery.product_product_delivery_normal_product_template
msgid "Normal Delivery Charges"
msgstr "Tavalised kohaltoimetamistasud"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.delivery_tracking_url_warning_form
msgid "OK"
msgstr "OK"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__operator
msgid "Operator"
msgstr "Operaator"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__order_id
msgid "Order"
msgstr "Ost"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.choose_delivery_package_view_form
msgid "Package"
msgstr "Pakend"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_product_packaging__shipper_package_code
msgid "Package Code"
msgstr "Package Code"
#. module: delivery
#: code:addons/delivery/models/stock_picking.py:0
#, python-format
msgid "Package Details"
msgstr "Pakendi detailid"
#. module: delivery
#: code:addons/delivery/wizard/choose_delivery_package.py:0
#, python-format
msgid "Package too heavy!"
msgstr ""
#. module: delivery
#: model:ir.model,name:delivery.model_stock_quant_package
#: model:ir.model.fields,field_description:delivery.field_stock_picking__package_ids
msgid "Packages"
msgstr "Pakid"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_package__picking_id
msgid "Picking"
msgstr "Noppimine"
#. module: delivery
#: model:ir.model.fields.selection,name:delivery.selection__delivery_price_rule__variable__price
#: model:ir.model.fields.selection,name:delivery.selection__delivery_price_rule__variable_factor__price
msgid "Price"
msgstr "Hind"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_price_rule_form
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_price_rule_tree
msgid "Price Rules"
msgstr "Price Rules"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_form
msgid "Pricing"
msgstr "Hinnastamine"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__price_rule_ids
msgid "Pricing Rules"
msgstr "Pricing Rules"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.sale_order_portal_content_inherit_sale_stock_inherit_website_sale_delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_picking_withcarrier_out_form
msgid "Print Return Label"
msgstr ""
#. module: delivery
#: model:ir.model,name:delivery.model_product_packaging
msgid "Product Packaging"
msgstr "Toote pakendamine"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_sale_order_line__product_qty
msgid "Product Qty"
msgstr "Toote kogus"
#. module: delivery
#: model:ir.model,name:delivery.model_product_template
msgid "Product Template"
msgstr "Toote mall"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__delivery_type
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__delivery_type
#: model:ir.model.fields,field_description:delivery.field_stock_picking__delivery_type
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_search
msgid "Provider"
msgstr "Varustaja"
#. module: delivery
#: model:ir.model.fields.selection,name:delivery.selection__delivery_price_rule__variable__quantity
#: model:ir.model.fields.selection,name:delivery.selection__delivery_price_rule__variable_factor__quantity
msgid "Quantity"
msgstr "Kogus"
#. module: delivery
#: model:ir.model.fields.selection,name:delivery.selection__delivery_carrier__invoice_policy__real
msgid "Real cost"
msgstr ""
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_stock_picking__return_label_ids
msgid "Return Label"
msgstr ""
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__get_return_label_from_portal
msgid "Return Label Accessible from Customer Portal"
msgstr ""
#. module: delivery
#: model:ir.model,name:delivery.model_stock_return_picking
msgid "Return Picking"
msgstr "Tagastuskorje"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__list_base_price
msgid "Sale Base Price"
msgstr "Sale Base Price"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__list_price
msgid "Sale Price"
msgstr "Müügihind"
#. module: delivery
#: model:ir.model,name:delivery.model_sale_order
msgid "Sales Order"
msgstr "Müügi tellimus"
#. module: delivery
#: model:ir.model,name:delivery.model_sale_order_line
msgid "Sales Order Line"
msgstr "Müügitellimuse rida"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.choose_delivery_package_view_form
msgid "Save"
msgstr "Salvesta"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_picking_withcarrier_out_form
msgid "Send to Shipper"
msgstr "Send to Shipper"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__sequence
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__sequence
msgid "Sequence"
msgstr "Järjestus"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_sale_order__is_all_service
msgid "Service Product"
msgstr ""
#. module: delivery
#: model:ir.model.fields,help:delivery.field_delivery_carrier__prod_environment
msgid "Set to True if your credentials are certified for production."
msgstr "Set to True if your credentials are certified for production."
#. module: delivery
#: code:addons/delivery/models/stock_picking.py:0
#, python-format
msgid ""
"Shipment sent to carrier %s for shipping with tracking number %s<br/>Cost: "
"%.2f %s"
msgstr ""
"Shipment sent to carrier %s for shipping with tracking number %s<br/>Cost: "
"%.2f %s"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_stock_picking__carrier_price
msgid "Shipping Cost"
msgstr "Shipping Cost"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_picking_withcarrier_out_form
msgid "Shipping Information"
msgstr "Tarneinfo"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_carrier__carrier_id
msgid "Shipping Method"
msgstr ""
#. module: delivery
#: model:ir.actions.act_window,name:delivery.action_delivery_carrier_form
#: model:ir.model,name:delivery.model_delivery_carrier
#: model:ir.ui.menu,name:delivery.menu_action_delivery_carrier_form
#: model:ir.ui.menu,name:delivery.sale_menu_action_delivery_carrier_form
#: model_terms:ir.ui.view,arch_db:delivery.res_config_settings_view_form
msgid "Shipping Methods"
msgstr ""
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_package__shipping_weight
#: model:ir.model.fields,field_description:delivery.field_stock_quant_package__shipping_weight
msgid "Shipping Weight"
msgstr "Shipping Weight"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.report_package_barcode_small_delivery
msgid "Shipping Weight:"
msgstr "Shipping Weight:"
#. module: delivery
#: model:ir.model.fields,help:delivery.field_product_product__hs_code
#: model:ir.model.fields,help:delivery.field_product_template__hs_code
msgid ""
"Standardized code for international shipping and goods declaration. At the "
"moment, only used for the FedEx shipping provider."
msgstr ""
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__state_ids
msgid "States"
msgstr "Maakonnad"
#. module: delivery
#: model:ir.model,name:delivery.model_stock_move
msgid "Stock Move"
msgstr "Laoliikumine"
#. module: delivery
#: model:delivery.carrier,name:delivery.delivery_carrier
#: model:product.product,name:delivery.product_product_delivery_poste
#: model:product.template,name:delivery.product_product_delivery_poste_product_template
msgid "The Poste"
msgstr ""
#. module: delivery
#: model:ir.model.fields,help:delivery.field_delivery_carrier__get_return_label_from_portal
msgid ""
"The return label can be downloaded by the customer from the customer portal."
msgstr ""
#. module: delivery
#: model:ir.model.fields,help:delivery.field_delivery_carrier__return_label_on_delivery
msgid "The return label is automatically generated at the delivery."
msgstr ""
#. module: delivery
#: code:addons/delivery/models/delivery_carrier.py:0
#, python-format
msgid "The shipping is free since the order amount exceeds %.2f."
msgstr ""
#. module: delivery
#: code:addons/delivery/wizard/choose_delivery_carrier.py:0
#, python-format
msgid "The shipping price will be set once the delivery is done."
msgstr ""
#. module: delivery
#: code:addons/delivery/wizard/choose_delivery_package.py:0
#, python-format
msgid ""
"The weight of your package is higher than the maximum weight authorized for "
"this package type. Please choose another package type."
msgstr ""
#. module: delivery
#: code:addons/delivery/models/delivery_grid.py:0
#, python-format
msgid "There is no matching delivery rule."
msgstr ""
#. module: delivery
#: model_terms:ir.actions.act_window,help:delivery.action_delivery_carrier_form
msgid ""
"These methods allow to automatically compute the delivery price\n"
" according to your settings; on the sales order (based on the\n"
" quotation) or the invoice (based on the delivery orders)."
msgstr ""
"These methods allow to automatically compute the delivery price\n"
" according to your settings; on the sales order (based on the\n"
" quotation) or the invoice (based on the delivery orders)."
#. module: delivery
#: model:ir.model.fields,help:delivery.field_delivery_carrier__margin
msgid "This percentage will be added to the shipping price."
msgstr "See protsent lisandub saatmise hinnale"
#. module: delivery
#: model:ir.model.fields,help:delivery.field_stock_quant_package__weight
msgid "Total weight of all the products contained in the package."
msgstr ""
#. module: delivery
#: model:ir.model.fields,help:delivery.field_stock_quant_package__shipping_weight
msgid "Total weight of the package."
msgstr ""
#. module: delivery
#: model:ir.model.fields,help:delivery.field_stock_picking__shipping_weight
msgid ""
"Total weight of the packages and products which are not in a package. That's"
" the weight used to compute the cost of the shipping."
msgstr ""
#. module: delivery
#: model:ir.model.fields,help:delivery.field_stock_picking__weight
msgid "Total weight of the products in the picking."
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.delivery_tracking_url_warning_form
msgid "Trackers URL"
msgstr ""
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_picking_withcarrier_out_form
msgid "Tracking"
msgstr "Jälgimine"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_stock_picking__carrier_tracking_ref
msgid "Tracking Reference"
msgstr "Tracking Reference"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_stock_picking__carrier_tracking_url
msgid "Tracking URL"
msgstr "Tracking URL"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.sale_order_portal_content_inherit_sale_stock_inherit_website_sale_delivery
msgid "Tracking:"
msgstr ""
#. module: delivery
#: model:ir.model,name:delivery.model_stock_picking
msgid "Transfer"
msgstr "Ülekanne"
#. module: delivery
#: model:product.product,uom_name:delivery.product_product_delivery
#: model:product.product,uom_name:delivery.product_product_delivery_normal
#: model:product.product,uom_name:delivery.product_product_delivery_poste
#: model:product.template,uom_name:delivery.product_product_delivery_normal_product_template
#: model:product.template,uom_name:delivery.product_product_delivery_poste_product_template
#: model:product.template,uom_name:delivery.product_product_delivery_product_template
msgid "Units"
msgstr "Ühikud"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.choose_delivery_carrier_view_form
msgid "Update"
msgstr "Uuenda"
#. module: delivery
#: code:addons/delivery/models/sale_order.py:0
#: model_terms:ir.ui.view,arch_db:delivery.view_order_form_with_carrier
#, python-format
msgid "Update shipping cost"
msgstr ""
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__variable
msgid "Variable"
msgstr "Muutuja"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_price_rule__variable_factor
msgid "Variable Factor"
msgstr "Muutuja faktor"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_stock_picking__volume
#: model:ir.model.fields.selection,name:delivery.selection__delivery_price_rule__variable__volume
#: model:ir.model.fields.selection,name:delivery.selection__delivery_price_rule__variable_factor__volume
msgid "Volume"
msgstr "Ruumala"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_stock_move__weight
#: model:ir.model.fields,field_description:delivery.field_stock_picking__weight
#: model:ir.model.fields,field_description:delivery.field_stock_quant_package__weight
#: model:ir.model.fields.selection,name:delivery.selection__delivery_price_rule__variable__weight
#: model:ir.model.fields.selection,name:delivery.selection__delivery_price_rule__variable_factor__weight
#: model_terms:ir.ui.view,arch_db:delivery.view_picking_withcarrier_out_form
msgid "Weight"
msgstr "Kaal"
#. module: delivery
#: model:ir.model.fields.selection,name:delivery.selection__delivery_price_rule__variable__wv
#: model:ir.model.fields.selection,name:delivery.selection__delivery_price_rule__variable_factor__wv
msgid "Weight * Volume"
msgstr "Kaal * Maht"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_stock_picking__shipping_weight
msgid "Weight for Shipping"
msgstr "Weight for Shipping"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_picking_withcarrier_out_form
msgid "Weight for shipping"
msgstr ""
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_choose_delivery_package__weight_uom_name
#: model:ir.model.fields,field_description:delivery.field_stock_picking__weight_uom_name
#: model:ir.model.fields,field_description:delivery.field_stock_quant_package__weight_uom_name
msgid "Weight unit of measure label"
msgstr "Kaalu mõõtühiku silt"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_product_packaging__width
msgid "Width"
msgstr "Laius"
#. module: delivery
#: model:ir.model.constraint,message:delivery.constraint_product_packaging_positive_width
msgid "Width must be positive"
msgstr "Width must be positive"
#. module: delivery
#: code:addons/delivery/models/stock_picking.py:0
#, python-format
msgid ""
"You are shipping different packaging types in the same shipment.\n"
"Packaging Types: %s"
msgstr ""
"You are shipping different packaging types in the same shipment.\n"
"Packaging Types: %s"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.delivery_tracking_url_warning_form
msgid "You have multiple tracker links, they are available in the chatter."
msgstr ""
#. module: delivery
#: code:addons/delivery/models/stock_picking.py:0
#, python-format
msgid ""
"Your delivery method has no redirect on courier provider's website to track "
"this order."
msgstr ""
"Your delivery method has no redirect on courier provider's website to track "
"this order."
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__zip_from
msgid "Zip From"
msgstr "Postiindeks alates"
#. module: delivery
#: model:ir.model.fields,field_description:delivery.field_delivery_carrier__zip_to
msgid "Zip To"
msgstr "Postiindeks kuni"
#. module: delivery
#: model_terms:ir.ui.view,arch_db:delivery.view_delivery_carrier_form
msgid "e.g. UPS Express"
msgstr "nt UPS ekspress"
|
Non-alcoholic liver steatosis, also called fatty liver, is due to excessive fat accumulation in hepatocytes and is the most common liver disease affecting 10-30% of the general population. Fatty liver is also regarded as a component of metabolic syndrome, and is associated with insulin resistance, obesity, and diabetes. Nearly 35% of patients with fatty liver develop chronic inflammation, fibrosis, and eventual liver failure and there is no effective treatment for fatty liver disease. Therefore, it is imperative to understand the molecular mechanisms underlying the development of fatty liver. Our preliminary studies demonstrate that the damage-specific DNA binding protein 1 (DDB1) E3 ligase plays a crucial role in the development of high-fat diet (HFD)-induced fatty liver. In particular, we discovered that liver DDB1 protein levels were elevated under obese conditions. Liver-specific deletion of Ddb1 protects mice from the HFD-induced fat accumulation and selectively suppresses glycolytic and lipogenic gene expression in the liver. In primary mouse hepatocytes, Ddb1 knockdown represses de novo lipogenesis rate, reduces triglyceride content, and blocks the activity of a key regulator of lipogenesis, carbohydrate responsive- element binding protein (ChREBP). At the mechanistic level, we uncovered evidence that DDB1 indirectly regulates the ChREBP protein O-GlcNAcylation and stability by degrading O-GlcNAcase (OGA) through ubiquitination. Although DDB1 has been well-studied in the context of DNA damage response as a critical component of the CUL4A E3 ligase complex, its metabolic actions remain unknown. Based upon the preliminary data, we hypothesize that DDB1 E3 ligase contributes to the development of fatty liver by activating ChREBP-mediated hepatic lipogenesis. To test this hypothesis, we propose three inter- connected specific aims. Aim 1: Determine whether the DDB1 E3 ligase promotes de novo lipogenesis and contributes to obesity-associated fatty liver via ChREBP. Aim 2: Test whether DDB1 E3 ligase promotes O- GlcNAcylation and stability of ChREBP via degrading OGA protein in obesity. Aim 3: Investigate how the AMPK pathway mediates nutritional regulation of hepatic DDB1 expression during the obesity development. This proposal seeks an in-depth understanding of the metabolic role of DDB1 E3 ligase. Specifically, we anticipate identifying how DDB1 E3 ligase regulates de novo lipogenesis in the liver and induces fatty liver through ChREBP. Accomplishment of these research objectives should reveal fundamental mechanisms by which nutrient excess leads to fat accumulation and provide potential novel therapeutic avenues to treat fatty liver disease. |
Q:
Debian Buster, Apache2.4, PHP 7.3 FPM / FCGID, vHost, running scripts with different users per vHost
I'm pretty much lost at the moment. I'm fairly new to Linux and Server Administration, so please don't kill me, if I missed obvious things (I'm sure I did)
situation is as follows:
Goal:
I'm trying to setup a Webserver (Apache 2.4 on Debian Buster/10) with
different vHosts which have different directories.
PHP (PHP 7.3)
scripts in those directories should be executed by a certain user who
differs from vHost to vHost
What I tried:
setting up fastcgi through an old tutorial Debian-8 fastcgi vHost Php vHost Tutorial | which failed due to the fact that Debian Buster/10 doesn't have said module, now they seem to use fcgid, php-fpm worked, but PHP enviroment vars where still
Server API FPM/FastCGI
USER www-data
HOME /var/www
then I tried a different Tutorial Apache Debian and fcgid in german which changed the enviroment vars of PHP to:
PATH /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin (without SuexecUserGroup set)
or
PATH /usr/local/bin:/usr/bin:/bin (with SuexecUserGroup set)
Server API CGI/FastCGI
PHPRC /etc/php7.3/cgi
PWD /var/www/domain_path
I'm not sure if that is what I want, 'cause the USER and HOME vars are gone and I'm not sure if all of the bin paths should be there except maybe /usr/local/bin?
I also tried to use mpm-itk module mpm-itk tutorial but that didn't work at all (php file was not served at all), maybe a permission problem, but maybe it's not even what I want.
I'm really lost for now, because I can't figure out how to do this... maybe someone can point me in the right direction or explain where I'm f*in' up (besides lack of knowledge)
Thanks!
EDIT: One of the tutorials is in german
A:
second tutorial Apache, Debian, and fcgid (german) worked - checked with php's get_current_user()
|
639 F.Supp.2d 127 (2009)
UNITED STATES of America
v.
Richard DUCRAN, Defendant.
Criminal No. 09-30002-MAP.
United States District Court, D. Massachusetts.
July 14, 2009.
Steven H. Breslow, Michelle L. Dineen Jerrett, United States Attorney's Office, Springfield, MA, for United States of America.
Joan M. Williams, Northampton, MA, for Defendant.
MEMORANDUM AND ORDER WITH REGARD TO GOVERNMENT'S MOTION TO COMPEL NOTICE BY DEFENDANT OF ALIBI (Docket No. 24)
NEIMAN, United States Magistrate Judge.
Before the court is the Government's motion to compel Richard Ducran ("Defendant"), pursuant to Fed.R.Crim.P. 12.1(a), to produce a notice of alibi as to certain uncharged conduct in which Defendant is alleged to have engaged. In pursuing this motion, the Government is well aware of this court's decision in United States v. Gilbert, 188 F.R.D. 176 (D.Mass.1999), which denied a similar request, but asserts that the circumstances in the instant matter are distinguishable. The court has considered the Government's arguments and is not persuaded. Accordingly, the Government's motion will be denied.
I. BACKGROUND
Defendant has been charged, by indictment, with a felony punishable by more than one year in prison, i.e., a violation of 18 U.S.C. § 2113(a) and (d) with respect to an attempted robbery of the Bank of Western Massachusetts in Holyoke on May 3, 2008. The Government also believes that Defendant participated in armed robberies of three other banks and intends to offer evidence thereof at Defendant's trial pursuant to Fed.R.Evid. 404(b). Such evidence, the Government asserts, includes surveillance footage, the testimony of a cooperating individual, photo array identification, and telephone and bank records. This same evidence, the Government states, has been provided to Defendant. Presently at issue is the Government's request to compel notice of alibi with respect to the three uncharged robberies. In light of the court's decision in *128 Gilbert, Defendant has declined to give such notice.[1]
II. DISCUSSION
As was true in Gilbert, the court does not believe that the Government's request with respect to what it acknowledges is "uncharged conduct" falls within the rubric of Fed.R.Crim.P. 12.1(a), even as amended in 2002. Rule 12.1(a) provides essentially as it did in Gilbert:
(1) Government's Request. An attorney for the government may request in writing that the defendant notify an attorney for the government of any intended alibi defense. The request must state the time, date, and place of the alleged offense.
(2) Defendant's Response. Within 10 days after the request, or at some other time the court sets, the defendant must serve written notice on an attorney for the government of any intended alibi defense. The defendant's notice must state:
(A) each specific place where the defendant claims to have been at the time of the alleged offense; and
(B) the name, address, and telephone number of each alibi witness on whom the defendant intends to rely.
Thus, neither the references in Rule 12.1(a) to an "alleged offense" or an "intended alibi defense" nor the rule's spirit requires Defendant to respond to "uncharged conduct." As stated in Gilbert, "[d]efining `offense' beyond the criminal acts charged in the indictment, as the Government seeks, would allow the Government to discover information it is not entitled to and, arguably, border on a violation of Defendant's right to remain silent under the Fifth Amendment to the United States Constitution." Id., 188 F.R.D. at 178. "Simply put, the Government's suggested interpretation of an `offense' could cause much mischief." Id.
To begin with, the court's legal exposition in Gilbert has equal resonance now:
The plain language of Rule 12.1(a) makes clear Congress' intent that a request for alibi information be particular as to the time, date and place of an alleged criminal act and, therefore, that the term "offense" does not include uncharged conduct. "When, as now, the plain language of a [rule] unambiguously reveals its meaning, and the revealed meaning is not eccentric, courts need not consult other aids to ... construction." United States v. Meade, 175 F.3d 215, 219 (1st Cir.1999) (citing Salinas v. United States, 522 U.S. 52, [57-58], 118 S.Ct. 469, 139 L.Ed.2d 352 (1997)). "From time to time, however, courts (perhaps manifesting a certain institutional insecurity) employ such secondary sources as a means of confirmation." Id. (citing cases). Here, as in Meade, "such an exercise removes any lingering doubt." Id.
It is clear from the context of the federal rules that "offense" as stated in Rule 12.1(a) is the conduct charged in the indictment. See Rule 7(a)[ (1)(B) ("An offense ... must be prosecuted by an indictment if it is punishable ... by imprisonment for more than one year.") ] (emphasis added); Rule 7(c)(1) [("The indictment or information must be a plain, concise, and definite written statement of the essential facts constituting the offense charged.") ] (emphasis *129 added). The advisory committee's notes to Rule 12.1 similarly assume that the rule is targeted at crimes alleged in the indictment. For example, as the 1975 advisory committee's note explains, once a defendant responds to the Government's demand for notice of an alibi defense, the Government "must then provide the defendant with a list of the witnesses who will place the defendant at the scene of the alleged crime and those witnesses who will be used to rebut the defendant's alibi witnesses." (emphasis added). The word "crime" is used similarly in other parts of the note.
Further, ... "alibi' means `that at the time of commission of crime charged in the indictment, defendant was at a different place so remote or distant or under such different circumstances that he could not have committed the offense.'" (Def.'s Opp'n and Mem. of Law in Opp'n to Gov't's Mot. for Notice of Alibi to Uncharged Offenses ("Def.s Opp'n") at 2 (quoting BLACK'S LAW DICTIONARY) (4th ed.) (emphasis added).) The Merriam-Webster On-Line Dictionary similarly defines alibi as "the plea of having been at the time of the commission of an act elsewhere than at the place of commission." (Id. at 2-3.) Clearly, a "plea" is made to a charged, not an uncharged, offense. See generally Fed.R.Crim.P. 11.
... [A]lso ..., although the word "alibi" first originated in 1743, (Def.'s Opp'n at 3 (citing Merriam-Webster On-Line Dictionary)), ... references to "the alibi exception" [can be found] in 2 Pollack & Maitland, The History of English Law Before the Time of Edward I at 614-615, 618 (2nd ed. 1952). Thus, ... even in the time before Edward I, the alibi was an exception to the plea, "I am not guilty," that is, a plea to a charged offense. (Def.'s Opp'n at 3.) As the First Circuit noted in a different context, quoting Felix Frankfurter, "`if a word is obviously transplanted from another legal source, whether the common law or other legislation, it brings the old soil with it.'" Bercovitch v. Baldwin School, Inc., 191 F.3d 8, 11 (1st Cir.1999) (quoting Felix Frankfurter, Some Reflections on the Reading of Statutes, 47 Colum. L. Rev. 527, 537 (1947)).
Gilbert, 188 F.R.D. at 178-79 (alterations added). Cf. State v. Horenberger, 119 Wis.2d 237, 349 N.W.2d 692, 693 (1984) (notice of alibi pursuant to state statute did not require defendant to disclose whereabouts at the time of the planning of an armed robbery because the planning stage was not charged as a crime).
The Government takes no issues with these legal principles. Nonetheless, the Government claims that the instant matter is distinguishable from Gilbert. For example, the Government argues that it has provided Defendant extensive discovery relating to the three robberies, including the date, time and place where they occurred. "If the defendant is permitted to withhold information respecting an alibi for the three uncharged robberies, and attempts at trial to introduce such evidence," the Government asserts, "the government likely would need additional time to conduct further investigation, resulting in a potential delay in trial and ultimately the administration of justice in this case." (Gov't's Mot. to Compel Notice by Def. of Alibi Evidence ¶ 13.) The Government also argues that Defendant's Fifth Amendment protections, with which the court was concerned in Gilbert, would not be jeopardized since Defendant would not be compelled to offer an alibi defense at trial. The court is not persuaded.
First, the court is unaware whether any evidence of these three additional robberies, as they may relate to Defendant, has *130 ever been presented to a grand jury or, worse, presented and rejected. Obviously, Defendant has not had to enter a plea with regard to such uncharged conduct and has the right to remain silent with respect thereto. If individuals in Defendant's position had to provide an alibi for all wrongs or acts in which they may have engaged, the Government would be able to obtain discovery well beyond its rights under Rule 12.1(a).
Second, it is not at all certain that the Government's 404(b) evidence will even be entered into evidence at Defendant's trial. Rule 404(b) provides that "[e]vidence of other crimes, wrongs or acts" may be admissible for such purposes as "proof of motive, opportunity, intent, preparation, plan, knowledge, identity, or absence of mistake or accident." Fed.R.Evid. 404(b). Pursuant to the rule itself, however, such evidence "is not admissible to prove the character of a person in order to show action in conformity therewith." Id. And while such evidence may be admitted for the other purposes delineated, the trial court must first determine if the evidence has some "special" probative value. United States v. Morris, 700 F.2d 427, 431 (1st Cir.1983). This test combines the requirements of Rule 404(b) with the balancing test of Rule 403, which provides that "evidence may be excluded if its probative value is substantially outweighed by the damage of unfair prejudice, confusion of the issues, or misleading the jury, or by considerations of undue delay, waste of time, or needless presentation of cumulative evidence." Fed.R.Evid. 403. See United States v. Oppon, 863 F.2d 141, 146 (1st Cir.1988). Accordingly, the Government's attempt to obtain a notice of alibi with respect to such 404(b) evidence, while possibly admissible, see United States v. Guerrero, 524 F.3d 5, 14 (1st Cir.2008); United States v. Martinez-Cintron, 136 F.Supp.2d 14, 17 (D.P.R.2001), is still speculative.
Third, it is hard to imagine how the Government would be prejudiced if its motion is denied. Were Defendant to offer evidence of an alibi with respect to the uncharged offenses, as the Government seeks, the Government would be obligated, in turn, to provide information with respect to each witness the Government intends to rely on to establish Defendant's presence at the scene of the alleged offenses and each Government rebuttal witness to Defendant's alibi defense. See Fed.R.Crim.P. 12.1(b)(1). See generally Wardius v. Oregon, 412 U.S. 470, 93 S.Ct. 2208, 37 L.Ed.2d 82 (1973) (discussing reciprocity issues in matters of discovery of alibi evidence). Here, it appears, the Government claims that it already has enough to rebut any "alibis" which place Defendant away from the scenes of the uncharged crimes.
Fourth, given the fact that "[t]he only matters required to be specially pleaded by a defendant are notice of alibi, [Rule] 12.1, or of intent to rely on insanity, as a defense, [Rule] 12.2," Mathews v. United States, 485 U.S. 58, 65, 108 S.Ct. 883, 99 L.Ed.2d 54 (1988), the logical, or perhaps illogical, extension of the Government's present argument in that a defendant would also have to give notice of a defense of insanity to the uncharged "alleged offense" as well. This, of course, would spawn unwanted mini-trials within the trial for the charged offense.
In sum, "the Government's attempt to squeeze into Rule 12.1(a) possible Rule 404(b) evidence ... would expand the rule beyond its breaking point." Gilbert, 188 F.R.D. at 179. In the court's opinion, "the underlying purpose of the rule`to prevent unfair surprise to the prosecution,' 1975 advisory committee's notedoes not apply to evidence of prior bad acts ... for *131 which the Government bears the burden of proof." Id. Indeed, as was true in Gilbert, "[t]he Government itself is unable to provide any case law in support of its expanded definition" and "cases in the First Circuit which discuss a defendant's obligation to give notice of an alibi defense have concerned only crimes charged in an indictment." Id. (citing, e.g., United States v. Portela, 167 F.3d 687 (1st Cir.1999); United States v. Levy-Cordero, 156 F.3d 244 (1st Cir.1998); United States v. Levy-Cordero, 67 F.3d 1002 (1st Cir.1995); United States v. de la Cruz-Paulino, 61 F.3d 986 (1st Cir.1995); Bowling v. Vose, 3 F.3d 559 (1st Cir.1993); United States v. Quesada-Bonilla, 952 F.2d 597 (1st Cir. 1991)). That has remained true since Gilbert was decided. See, e.g., United States v. Llinas, 373 F.3d 26 (1st Cir.2004); United States v. Nelson-Rodriguez, 319 F.3d 12 (1st Cir.2003).
III. CONCLUSION
For the reasons stated, the Government's motion is DENIED.
NOTES
[1] While the Government's formal request for notice of alibi appears to concern only one of the uncharged robberies, the Government made known at a status conference that it was seeking such notice with regard to each of the uncharged offenses and its motion reflects that position. The court, therefore, has treated the Government's request as applying to all three uncharged robberies.
|
ARSAT-2
ARSAT-2 is a geostationary communications satellite operated by ARSAT and built by the Argentine company INVAP. It was launched from French Guiana alongside Sky Muster satellite using an Ariane 5ECA rocket on September 30, 2015 at 20:30hs UTC, becoming the 400th satellite to be launched by Arianespace. It is licensed to be located at 81° West longitude geostationary slot. ARSAT-2 is the second geostationary satellite built in Argentina, after ARSAT-1. Structurally and mechanically it is a copy of the ARSAT-1, the only difference being the payload and thus it has different antenna configuration.
Payload
ARSAT-2 payload was supplied by. It consists of both Ku band and C band sections.
The Ku band has 20 physical transponders. Of those, sixteen have a 36 MHz bandwidth and four have 72 MHz. Thus the satellite has a maximum capacity of 864 MHz Ku or 24 transponder equivalent. A deployable antenna and a fixed Gregorian antenna.
The C band section has a single deployable antenna that is fed by six physical transponders. Four have 72Mhz of bandwidth and the other two have 88 MHz. The total available C Band bandwidth is thus 464 MHz (or 12.9 transponder equivalent).
See also
ARSAT-1
ARSAT-3
Nahuel 1A
References
External links
SATÉLITES ARSAT
Category:Satellites of Argentina
Category:Satellites using the ARSAT bus
Category:Spacecraft launched in 2015
Category:2015 in Argentina |
Over the past few years, Walter Masocha (below), a former lecturer at Scotland’s Stirling University, became leader of the Agape for All Nations Church, a religion of his own creation.
And he used his authority to molest a young girl and assault another woman:
During the trial the schoolgirl now 16, said she regarded Masocha as her “spiritual father”, and like many people in the church called him “Dad”. She said in late 2013 she was with other girls in an upstairs games room when Masocha came in and waved her over. She said: “He placed his hand round my lower back, and moved his hand down until he got to my underwear, and he sort of pinged my underwear. “He repeatedly pinged my underwear, ran his hand down my bottom, and grabbed and pinched my bottom.”
That’s not all:
In another incident, when she was 13 or 14, she said Masocha had been sitting down at his home, very close to her, advising her about school when he suddenly said, “You’ll always be mine”, and kissed her on the lips.
She wasn’t his only victim:
The deaconess, a 32-year-old mother-of-four, was also told The Prophet had been “trying to remove ‘something’ from her genitals”. … On another occasion said she had once gone to his office for prayer with a stomach complaint. She said: “He said he was going to pray it away. He touched my tummy, then his hand went down my body, onto my private parts.
All of this is horrific and traumatic. Surely he would get a severe punishment for assault and molestation?
Not even close.
Sheriff Kenneth McGowan, after acknowledging these crimes, let Masocha off the hook with only 250 hours of community service and a spot on the sex offenders’ registry for a single year.
Just wait till you hear his reasoning:
Sheriff McGowan said the law required courts only to impose custodial sentences when no other disposal was appropriate. … “The criminal justice social work report has assessed you as suitable for a community-based disposal, and in addition you have already suffered a spectacular fall from grace.”
Yes, his life is so hard that his reputation is ruined… and isn’t that punishment enough? Sure, his victims will be mentally scarred for life, but… but… his reputation!
The Deaconess was in shock after the “punishment” was handed down:
The 32-year-old deaconess – a mother of four who cannot be named – said she was in “total shock” about the sentence. “He molested me and now he walks free,” she said tearfully. “So many other women who he has attacked will now not come forward because they are scared of what may happen. “These women will think, what is the point? “I do not know what planet this is but it is wrong.”
If the man wasn’t a preacher, is there any doubt he’d be in jail right now?
(Thanks to Brian for the link)
|
Who should Attend?
This free webinar will be available for up to 1,000 participants. We anticipate attendees to be individuals providing recovery coaching services, and others with a vested interest in advancing recovery supports for people with substance use disorders. These parties include:
people in recovery from mental illness, addiction, or both who provide peer support services;
family members;
students in recovery ;
researchers and educators;
supervisors and administrators of peer support services and behavioral health systems
providers of other services for individuals in recovery (primary health care, housing, employment, etc.); and
policymakers.
Description
While medication-assisted treatment (MAT) for opioid use disorders has been part of the addiction treatment landscape since the 1970s, many questions persist regarding how to best deliver services and supports to people with opioid use disorders who use medications (naloxone, buprenorphine, and methadone) to support their recovery. Research suggests that peer recovery coaching is beneficial for people in recovery from substance use disorders (Bassuk, Hanson, Greene, Richard, & Laudet, 2016). Yet most peer recovery coach training programs do not provide sufficient information to prepare coaches to successfully support people using medication as part of their recovery plans. Peer recovery coaches may leave training with inaccurate or incomplete information, or misconceptions and negative biases about medication-assisted treatment, hampering their ability to provide effective recovery coaching for people who use medication-assisted treatment.
This 90-minute virtual training event will include a 60-minute presentation focusing on the knowledge and skills that can help peer recovery coaches support people using medication-assisted treatment for opioid use disorders. Participants will learn about common misconceptions and biases, the medications used to treat opioid use disorders, and recovery support strategies used by peer recovery coaches. The remaining 30 minutes will be dedicated to questions, answers, and discussion.
Webinar participants will be able to:
explore their own beliefs, biases, and knowledge about recovery pathways that include medications for opioid use disorders;
explain the benefits of medication-assisted treatment for people with opioid use disorders; and
describe at least five key recovery support strategies that can be used by peer recovery coaches to assist people with opioid use disorders who use medication-assisted treatment.
BRSS TACS Webinar Series
BRSS TACS webinars are recorded, closed captioned, and available for viewing at your convenience. Visit the BRSS TACS webinars page to access the archived webinars.
Please note: CEU’s will not be available; however, we do offer certificates of completion upon request |
Back to School Immunizations
What if your child suffers from certain food allergies found in these vaccines?
As we approach the beginning of the school year and it is time to finalize registration for schools and day cares, it may be time to think about booster shots. For kids with egg allergies, there are often questions about MMR vaccines and flu vaccines, as these two shots are often cultured in eggs. According to the Center of Disease Control and the American Academy of Pediatrics, egg allergy is not a contraindication to these vaccines. The MMR vaccine, even in children with severe egg allergies, can usually be safely administered. Additionally, results from a study presented by the American College of Allergy, Asthma and Immunology show that most people with egg allergies can safely receive the flu vaccine, including children with severe egg allergy. The benefits of the flu vaccine typically outweigh the risks, especially in those kids with asthma, to avoid complications of the flu. Individuals allergic to eggs should still continue to receive these vaccines from an experienced physician who is familiar with reactions to vaccines.
However, for kids with gelatin allergies, like that found in Jell-O, there are also questions about MMR, Varicella (chicken pox), influenza and DTaP (diphtheria, tetanus and pertussis) as gelatin is added as a heat stabilizer to many of these vaccines. It should be noted that allergic reactions to MMR vaccine are far more likely due to the gelatin in the vaccine rather than residual egg proteins. Essentially, any person who has experienced an allergic reaction after eating gelatin food products (Jell-O) should not be given any of the above vaccines without further testing prior to it being administered. However, as in the case with egg-containing vaccines in egg-allergic people, gelatin-containing vaccines may be able to be given to gelatin-allergic people under the direct supervision of a physician.
Another common childhood vaccine is hepatitis B, which is synthesized by Saccharomyces cerevisiae, otherwise known as common baker’s yeast--used for making bread. It is advised that any person who has experienced an allergic reaction after eating food products containing baker’s yeast should not be give hepatitis B vaccine without discussing this further with your physician or allergist.
Food Allergy Prevention in Infants
In 2015, The New England Journal of Medicine published the findings from the landmark Learning Early About Peanut Allergy (LEAP) study. This was the first randomized trial to study early allergen introduction as a food allergy prevention strategy. The LEAP study showed that early introduction of peanut-
containing foods to infants at high risk of developing peanut allergy led to an 81% relative risk reduction in the development of peanut allergy. In January 2017, the American Academy of Pediatrics, along with the NIH, NIAD, and AAAAI changed their recommendations and now advocate for early introduction of peanut. While most infants are encouraged to eat peanut starting at about 6 months of age, infants who are at high risk of developing a peanut allergy should be evaluated by their pediatrician (to have IgE blood test done) or by their allergist (to have skin prick testing or blood test done). Is your child “high risk”? The literature defines “high risk” as infants who have “severe eczema, egg allergy, or both”. Those with mild eczema (meaning they do not need to use a topical steroid cream) and those with egg allergy are strongly encouraged to be tested by their pediatrician or allergist, as the guidelines recommend that they introduce peanut between 4-6 months. Once peanut is introduced, it should be kept in the infant’s diet regularly, which means about 3 days per week, ideally until 5 years of age.
It is important to note that whole peanuts and peanut butter pose a choking hazard to infants. Age appropriate options to introduce peanut include: |
There are countless different approaches to strength training and bodybuilding.
From classic 5×5 style programs to 5 day per week ‘bro splits’, you can always find a new routine to try out… along with hordes of fanboys cockfighting about why their methods are best.
But, as anyone with a few years of weightlifting experience under their belt knows, pretty much any of these approaches can be effective and yield you great results… assuming its fits your lifestyle and you can stick to it and stay consistent.
In this article I want to make the argument why high frequency, low volume full body training might be a superior alternative for YOU.
Bonus: and get a proven step-by-step routine to quickly pack on mass and get stronger.
#1: You Get to Lift More Often
A typical setup for this type of training would be alternating between two full body workouts (lifting every other day). For example:
Workout 1: squats, bench press, bent over rows, curls, tricep extensions, leg raises
Workout 2: deadlifts, overhead press, weighted chin-ups, lateral delt raises, decline sit-ups
This is the high frequency component of this style of training. And the great thing about this is that you get to lift more often. Sure, maybe not as often as a 5 day per week bodybuilding split, but more often than the typical 3 day per week full body split.
I don’t know about you, but I fucking love lifting (I’m talking about squatting, deadlifting, pressing, rowing, and lifting real weight… NOT that shoulder day and arm day bullshit). I hate having to take the 2 day break you get with most 3 or 4 day per week routines. And that’s why this setup works great for me.
#2: Shorter Workouts
Check out the video above for an example of a short 30 minute workout for mass…
Look, as much as I love lifting weights and hitting the gym, I’m a busy guy. I run a business. I have friends. I have hobbies. I like girls. And cultivating each of these things demands time.
I simply can’t afford to spend 2 hours in the gym… not without sacrificing something else.
Because you’re lifting full body every other day, however, you don’t have to. In fact, it’s actually a lot more effective to have shorter workouts with this setup. I usually spend about 45 minutes per workout in the gym. Instead of doing 5 heavy sets of 5, or 4 heavy sets of 6, I typically perform just ONE heavy set of 5 (with a series of warm up sets leading up to it).
This is the low volume component of this type of training, and it’s so crucial because it makes it easy to fit your workout into your day-to-day schedule. And the truth is that staying consistent, and avoiding missing workouts, is probably the most important factor is achieving sustainable long term results.
#3: Better Results (Muscle and Strength)
Okay, let’s talk about why high frequency, low volume training is actually great for getting you results.
Studies show that when you lift weights, rates of muscle protein synthesis (MPS) inside your body are raised for about 36 hours. This is significant because your body is only in an anabolic state when rates of MPS exceed rates of muscle protein breakdown (MPB). This means that your body has the best shot of building new muscle for 36 hours after you hit the gym.
Because you’re doing full body workouts that target all of your major muscle groups, the rates of MPS are constantly being raised throughout your entire body. You take advantage of this fact by resting, eating, and recovering during this time period… not jamming in more workouts that are likely to elevate your levels of MPB and compromise this natural response.
Some may argue that the low volume component of this type of training could potentially limit your ability to build muscle, and that some people need more volume to see gains. In response to this I would say 2 things:
First, even though the volume is low on each individual training day, you’re still training your full body every other day, and so the total volume and workload for the week won’t be as low as you might expect.
Second, because you’re only doing one heavy set per workout, you’ll be able to use a heavier weight than would be possible if you were doing several heavy sets in a row. This higher intensity also makes up for some of volume you’re missing out on.
In fact, studies show that moderate volume training routines promote better strength gains than high volume ones. Of course, the exact definition of what differentiates moderate from high volume isn’t crystal clear, but this still shows that there IS a point at which adding volume can hinder your gains.
#4: You Feel Better (No Need to Deload)
Because your training loads are lower on a day-to-day basis, you’re far less likely to experience the ‘burn out’ effects that can come with high volume training. This is because your body has the chance to fully recover in between each and every workout (and avoid accumulating fatigue).
You see, when you follow a high volume workout program, it can become necessary to take periodic deloads, where you significantly drop the volume and intensity of your workouts every 2 or 3 months. Failing to do so can prevent you from recovering from these periods of ‘overreaching’… and continuing to ignore this needed recovery time has been documented to negatively affect strength levels and even lead to other symptoms like extreme fatigue and depression.
With high frequency, low volume training you completely avoid this trap. You get to feel awesome all of the time. And you don’t have to worry about if and when you need a deload.
So… Is This Training for YOU?
So, is low volume, high frequency training 100% optimal for everyone? No, of course not.
But given the benefits we covered above, I’d say that it’s a great fit for most modern men… men who love to work out and grow stronger, but don’t want it to detract from the rest of their busy lives.
I know it’s worked wonders for me. |
Q:
How to remove extra in WordPress?
I'm new to wordpress and currently developing a theme on it. I have noticed that Wordpress adds <p> tags all over the page. Do you know any plugin or a workaround to avoid this?
A:
Add this to your functions.php, this should give the result you're looking for:
remove_filter('the_content', 'wpautop');
|
Q:
What is the difference between the blackness of a Black Hole and the blackness of a Black Body?
Light cannot escape the gravitational pull of the black hole and hence the 'black hole' is black.
Any object that is black in color, absorbs all wavelengths of light and reflects none. So it appears black.
Could someone explain the key difference between these two phenomena ?
A:
A black body is a system that does not reflect photons. A black body can only emit photons, which is often fabricated as a hot cavity with a small hole. A razor blade can also approximate a black body if the sharp edge is smaller than the wavelength of photons of interest and is at a temperature so short wavelength photons are not significantly present. A black body then has a small reflectivity relative to the emissivity $r(\lambda)~<<~\epsilon(\lambda)$ for wavelengths of interest. An ideal black body has zero reflectivity for all wavelengths.
A black hole absorbs anything, including photons that reach it. It has zero reflectivity. Even if a photon entering a black hole reaches a mirror that is right at the event horizon, since the mirror has $z~\rightarrow~\infty$ the photon is not reflected back. The black hole also interacts with the quantum vacuum, in that virtual quanta across the horizon becomes an entangled pair of a negative energy quanta entering the black hole and a positive energy quanta that escapes to "infinity." This is a bit of heuristic, but it helps us see that a black hole losses a bit of mass and that mass escapes. The low energy form of this is of course photons, which have zero mass gap. As a result a black hole is about the most ideal black body in the universe.
|
Sixteen years on: has quality of care for rural and non-compensable traumatic brain injury clients improved?
This review focuses on two factors that influence client access to care following head injury. These factors, namely the degree of rurality of a client's home town and the funding model to which they are allocated, are discussed in light of the results of the 'Head Injury Impact Project'. National and international publications, anecdotal reports and clinical experience illustrating current practices in care provision both nationally and internationally are then described. Finally, future research is proposed investigating perceived variations in access to services according to location, funding and other factors. |
"The Lessons I've Learned" - My Story On Trust
Before you guys start reading this article, I would just like to say that this is the most personal piece of writing I've ever completed. I know I announced this article last week, apologies for the delay as I kept on adding new life moments to it and it finally got done now. This article is going to be about my life, the happy moments, the traumas, the heartache, the trust gained and lost and about everything else pertaining to love.
A Little About Me
Before we begin, I would like to introduce myself a little better, to try and sort of take off that mask I have on. I am one of the two founders of Relationship Rules. As you all know, we are two guys (ages 25 and 26), I'm the one who's 25 years old (I write all of the articles and some of the rules) and me and my best friend thought of creating this page out of the sheer need to share our experiences with everyone and label them simply as "rules". Now for the sake of the policy me and my friend made together, we sadly can't reveal our identities so I'm not going to name any names in this article. Again, this article is very personal to me, it was very painful putting all of it in words so if it seems a little immature at some point I apologize in advance, I'll try keeping it as professional as possible.
You guys can call me "A", because that's the letter my name starts with. I'm a med-school dropout, never had any interest in medicine or becoming a doctor. I always used to dream of having an IT business and I loved designing (I also design all the artwork for the page). So during the middle of my fourth year, I dropped out and started a small company from scratch. Then I met "Z", my best friend and co-founder of Relationship Rules, we both started from humble beginnings and now own a huge IT business with multinational partners. This story begins when I first got into med-school and I fell in love with this senior of mine, my first love. Let's begin. |
Nitrile vibrations as reporters of field-induced phase transitions in 4-cyano-4'-pentylbiphenyl (5CB).
4-Cyano-4'-pentylbiphenyl (5CB) is a liquid crystal forming compound with a terminal nitrile group aligned with the long axis of the molecule. Simulations of condensed-phase 5CB were carried out both with and without applied electric fields to provide an understanding of the Stark shift of the terminal nitrile group. A field-induced isotropic-nematic phase transition was observed in the simulations, and the effects of this transition on the distribution of nitrile frequencies were computed. Classical bond displacement correlation functions exhibit a ∼2.3 cm(-1) red-shift of a portion of the main nitrile peak, and this shift was observed only when the fields were large enough to induce orientational ordering of the bulk phase. Distributions of frequencies obtained via cluster-based fits to quantum mechanical energies of nitrile bond deformations exhibit a similar ∼2.7 cm(-1) red-shift. Joint spatial-angular distribution functions indicate that phase-induced anticaging of the nitrile bond is contributing to the change in the nitrile spectrum. |
At the Queensland Resources Council lunch held on November 1st, in Brisbane, a journalist from the UK’s Channel 4 News stood up and asked a question of the Prime Minister, Scott Morrison:
“Given the efforts that other nations are making to reduce their carbon emissions, and given the places like the great barrier reef are, we know, under threat from climate change……. “
Halfway through her question, precisely after she mentions climate change, a single loud moaned ‘boooo’ rings out in the Brisbane Convention and Exhibition Centre. She continues.
“Your own government has issued multiple reports saying that climate changes poses the greatest threat to the reef. How can Australia justify opening new coal mines at this time, in the Galilee basin?”
As she finishes, the entire room breaks out into a loud chorus of angry discontent. The same low and loud moan as before, but this time emitted from hundreds men, who are each one over-filled glass of white wine away from hurling chunks of coal at the woman who dared mention what happens when the product they pull from the ground is burnt.
Theatrically, Prime Minister Scott Morrison (no stranger to threatening people with chunks of coal) comes to the rescue. “Because we have the best mining industry in the world!”, he weirdly responded. Australia has the highest coal exports of any country in the world; so being very good at mining kind of makes the question more salient, not less.
When Morrison delivered his very motivational-coach-at-corporate-retreat reply, the moans turn to relieved, roaring cheers, and you can’t see the audience, but I’m guessing they punched the air, high-fived each other and took hearty bites out of the coal chunks like they were fresh green apples.
That moment was a mile marker. These men felt okay loudly shaming a journalist who mentioned climate change. It wasn’t a private event. It was live-streamed nationally. It was a marker of power and confidence.
It’s odd to see this confidence, given support for decarbonisation has hit new heights, coal mining and burning remain deeply unpopular and a few months ago, the world’s biggest climate mobilisation hit the streets. Things aren’t looking up for them. So why do they feel no shame in collectively booing a journalist asking about climate change?
The way fossil fuels are defended has changed
In the past few months, it feels like Australia has seem something of an acceleration towards authoritarian crack-downs on climate protest. Scott Morrison proposed, in his QR Council speech, a ban on pressuring the companies that provide services to coal companies (say, a bank that lends money to a mining project) to not do that.
It’s a key component in modern climate activism. Corporations have failed, comprehensively, to take any meaningful action to reduce emissions. So have governments. Disrupting the flow of cash works. Fossil fuel companies have enjoyed the capability to displace the harm related to their products onto society, instead of paying for it themselves, and they are not reacting well to seeing that advantage erode.
Protests that focus on disruption and non-violent civil disobedience have been met with increasingly harsh responses from police and politicians, too. In Queensland, it seems extremely likely that evidence used to justify harsher laws for this type of protest was fabricated. At the recent Extinction Rebellion protests in Melbourne, a Guardian journalist filmed a police officer threatening to trample protesters with a horse.
This week, protests at a mining conference in Melbourne featured a police officer punching a woman in the back of the head and another police officer repeatedly hitting a woman with a baton (who had her hands up in defence).
A police officer who’d been posting alt-right memes on his Facebook page (and who had called climate change a ‘hoax’) flashed a white supremacist hand sign at a Chinese protester who had ‘immigrant’ on her shirt.
Another had a sticker on his uniform that said ‘Eat a dick, Hippys (sic)’. One video shows a police officer repeatedly punching a man who was already restrained and immobile on the ground.
Footage shows police grabbing a Channel 7 journalist and hurling him in random directions, as he stumbles around, bewildered and trying, pointlessly, to do the right thing. There are many videos of capsicum spray being deployed wildly into crowds, including towards journalists, one of whom wrote:
If you’ve never had the experience of being pepper sprayed before, all I can say is that’s it’s immeasurably worse than I ever imagined. What ensued in the moments after I was sprayed was an unbearable sensation of feeling like someone had lit a match on my skin before shoving it in my eyes. It took me at least 5 minutes to regain my sight, but even at the time of writing this—nearly 8 hours later, my vision is still blurry and my skin still burns”
What is incredibly clear is that there was a very significant, heightened sense of violence from the police at the scene. They wouldn’t have felt comfortable plastering stickers onto their uniform taunting the protesters if their minds weren’t already in a place of aggression and violence.
There is a demand for what is being supplied. Politicians and Australia’s media outlets have been agitating for increased acts of physical violence directed towards climate protesters, alongside more standard calls for excessive punishment and authoritarian crackdowns:
2019 is very different to 2009. There is widespread public support for climate action, alongside increasing frustration at those kicking the policy can down the road. The only pathway available, then, to sustain the fossil fuel industry is the use of government power to intervene in public speech – cracking down on boycotts and protest.
It is happening in energy markets, too. The government is actively figuring out how to use intervention to squeeze more life out of decaying coal assets, alongside tentative plans to underwrite new coal-fired power generation.
The long-running idea that climate deniers and fossil fuel supporters tend to be libertarians who love free markets was a little topsy-turvy. The ideology was a means to a fossil fuelled end.
Today, a free, democratic society openly and loudly says that the industries that extract fossil fuels ought to stop, because doing that hurts people. The free market says solar and wind are the cheapest options for new-build energy. Today, ‘freedom’ doesn’t automatically result in public support for coal, or new coal mines and power stations. The ideology doesn’t give the right answer, so it’s time to ditch the ideology.
Authoritarianism, force, coercion and violence are far more likely to lend support for new coal. So we’ll see more of that, in ratcheting escalations, to both silence public protest against fossil fuels, and to force investment in new mines and machines.
That room of mining men at the Queensland Resources Council luncheon were booing and cheering with unrestrained intensity because they had just found out the leader of the country realises the value of coercion and intimidation just as much as they do.
First published at Ketan Joshi’s Energy, science and technology blog. Reproduced with permission. |
#!/usr/bin/env python3
#
# Copyright (c) 2014-present, Facebook, Inc.
#
# This source code is licensed under the MIT license found in the
# LICENSE file in the root directory of this source tree.
#
from builtins import object
import click
from openr.cli.commands import kvstore, lm
from openr.cli.utils import utils
from openr.cli.utils.options import breeze_option
from openr.cli.utils.utils import parse_nodes
class LMCli(object):
def __init__(self):
self.lm.add_command(LMLinksCli().links, name="links")
self.lm.add_command(LMAdjCli().adj, name="adj")
self.lm.add_command(
SetNodeOverloadCli().set_node_overload, name="set-node-overload"
)
self.lm.add_command(
UnsetNodeOverloadCli().unset_node_overload, name="unset-node-overload"
)
self.lm.add_command(
SetLinkOverloadCli().set_link_overload, name="set-link-overload"
)
self.lm.add_command(
UnsetLinkOverloadCli().unset_link_overload, name="unset-link-overload"
)
self.lm.add_command(SetLinkMetricCli().set_link_metric, name="set-link-metric")
self.lm.add_command(
UnsetLinkMetricCli().unset_link_metric, name="unset-link-metric"
)
self.lm.add_command(SetAdjMetricCli().set_adj_metric, name="set-adj-metric")
self.lm.add_command(
UnsetAdjMetricCli().unset_adj_metric, name="unset-adj-metric"
)
self.lm.add_command(VersionCli().version, name="version")
self.lm.add_command(BuildInfoCli().build_info, name="build-info")
@click.group()
@click.pass_context
def lm(ctx): # noqa: B902
""" CLI tool to peek into Link Monitor module. """
pass
class LMLinksCli(object):
@click.command()
@click.option(
"--only-suppressed",
default=False,
is_flag=True,
help="Only show suppressed links",
)
@click.option("--json/--no-json", default=False, help="Dump in JSON format")
@click.pass_obj
def links(cli_opts, only_suppressed, json): # noqa: B902
""" Dump all known links of the current host """
lm.LMLinksCmd(cli_opts).run(only_suppressed, json)
class LMAdjCli(object):
@click.command()
@click.option("--json/--no-json", default=False, help="Dump in JSON format")
@click.pass_obj
def adj(cli_opts, json): # noqa: B902
""" Dump all formed adjacencies of the current host """
nodes = parse_nodes(cli_opts, "")
lm.LMAdjCmd(cli_opts).run(nodes, json)
class SetNodeOverloadCli(object):
@click.command()
@click.option("--yes", is_flag=True, help="Make command non-interactive")
@click.pass_obj
def set_node_overload(cli_opts, yes): # noqa: B902
""" Set overload bit to stop transit traffic through node. """
lm.SetNodeOverloadCmd(cli_opts).run(yes)
class UnsetNodeOverloadCli(object):
@click.command()
@click.option("--yes", is_flag=True, help="Make command non-interactive")
@click.pass_obj
def unset_node_overload(cli_opts, yes): # noqa: B902
""" Unset overload bit to resume transit traffic through node. """
lm.UnsetNodeOverloadCmd(cli_opts).run(yes)
class SetLinkOverloadCli(object):
@click.command()
@click.argument("interface")
@click.option("--yes", is_flag=True, help="Make command non-interactive")
@click.pass_obj
def set_link_overload(cli_opts, interface, yes): # noqa: B902
""" Set overload bit for a link. Transit traffic will be drained. """
lm.SetLinkOverloadCmd(cli_opts).run(interface, yes)
class UnsetLinkOverloadCli(object):
@click.command()
@click.argument("interface")
@click.option("--yes", is_flag=True, help="Make command non-interactive")
@click.pass_obj
def unset_link_overload(cli_opts, interface, yes): # noqa: B902
""" Unset overload bit for a link to allow transit traffic. """
lm.UnsetLinkOverloadCmd(cli_opts).run(interface, yes)
class SetLinkMetricCli(object):
@click.command()
@click.argument("interface")
@click.argument("metric")
@click.option("--yes", is_flag=True, help="Make command non-interactive")
@click.pass_obj
def set_link_metric(cli_opts, interface, metric, yes): # noqa: B902
"""
Set custom metric value for a link. You can use high link metric value
to emulate soft-drain behaviour.
"""
lm.SetLinkMetricCmd(cli_opts).run(interface, metric, yes)
class UnsetLinkMetricCli(object):
@click.command()
@click.argument("interface")
@click.option("--yes", is_flag=True, help="Make command non-interactive")
@click.pass_obj
def unset_link_metric(cli_opts, interface, yes): # noqa: B902
"""
Unset previously set custom metric value on the interface.
"""
lm.UnsetLinkMetricCmd(cli_opts).run(interface, yes)
class SetAdjMetricCli(object):
@click.command()
@click.argument("node")
@click.argument("interface")
@click.argument("metric")
@click.option("--yes", is_flag=True, help="Make command non-interactive")
@click.pass_obj
def set_adj_metric(cli_opts, node, interface, metric, yes): # noqa: B902
"""
Set custom metric value for the adjacency
"""
question_str = (
"Are you sure to override metric "
"for adjacency {} {} ?".format(node, interface)
)
if not utils.yesno(question_str, yes):
return
lm.SetAdjMetricCmd(cli_opts).run(node, interface, metric, yes)
nodes = parse_nodes(cli_opts, "")
kvstore.ShowAdjNodeCmd(cli_opts).run(nodes, node, interface)
class UnsetAdjMetricCli(object):
@click.command()
@click.argument("node")
@click.argument("interface")
@click.option("--yes", is_flag=True, help="Make command non-interactive")
@click.pass_obj
def unset_adj_metric(cli_opts, node, interface, yes): # noqa: B902
"""
Unset previously set custom metric value on the node.
"""
question_str = "Are you sure to unset metric " "for adjacency {} {} ?".format(
node, interface
)
if not utils.yesno(question_str, yes):
return
lm.UnsetAdjMetricCmd(cli_opts).run(node, interface, yes)
nodes = parse_nodes(cli_opts, "")
kvstore.ShowAdjNodeCmd(cli_opts).run(nodes, node, interface)
class VersionCli(object):
@click.command()
@click.option("--json/--no-json", default=False, help="Dump in JSON format")
@click.pass_obj
def version(cli_opts, json): # noqa: B902
"""
Get OpenR version
"""
lm.VersionCmd(cli_opts).run(json)
class BuildInfoCli(object):
@click.command()
@click.option("--json/--no-json", default=False, help="Dump in JSON format")
@click.pass_obj
def build_info(cli_opts, json): # noqa: B902
"""
Get build information from running version of Open/R
"""
lm.BuildInfoCmd(cli_opts).run(json)
|
Photo : Getty
Big news today: Centrist Democrats are not so sure about this Alexandria Ocasio-Cortez gal. Have you heard? You probably haven’t heard this four thousand times since she won her primary last summer, so let’s talk about it again, just in case you didn’t hear.
The Hill ran a piece today proclaiming that moderate Senate Democrats “see Ocasio-Cortez as [a] weak spokeswoman for [the] party,” and “more of a sideshow than [a] meaningful statement about the future of their party.” It quoted Sens. Jeanne Shaheen (NH), Doug Jones (AL), Joe Manchin (WV), and Jon Tester (MT), all of whom expressed various criticisms and concerns about Ocasio-Cortez. The most common: That she’s a “flavor of the month,” and that she risks turning the Democrats into a Tea Party of the left.
The piece also quoted defeated ex-senators Joe Donnelly and Claire McCaskill, who lost after running as centrists in their states. They criticized Ocasio-Cortez for not doing the “hard work” and potentially endangering Democrats’ 2020 chances. And it quoted Rep. Alcee Hastings, a Florida Democrat who is notorious for supporting the payday loan industry, saying of Ocasio-Cortez that “no matter how far you rise, that’s just how far you will ultimately get your comeuppance.”
A weird thing to say about someone in your own party, you might think—her “comeuppance?” For what? Supporting Medicare for All? Being good at Twitter? Defeating a long-time incumbent in a safe Democratic seat? (Actually, yes, that last one.)
But it’s not really surprising that conservative Democrats don’t like Ocasio-Cortez’s politics, because her politics are different to theirs. The unexamined assumption of all these pieces is that because both AOC and the quoted moderates are Democrats, they must share the same goals or basic ideology, and that simply isn’t true. America’s two-party system means it’s inevitable that people with only the slightest ideological resemblance to one other will end up in the same Big Tent. Alexandria Ocasio-Cortez wants everyone to have healthcare because she sees it as a human right; Claire McCaskill doesn’t. That isn’t a minor disagreement over approaches towards the same goal. It’s a fundamental difference in ideology. She believes that taxing the rich to pay for social programs for the poor is good; they do not.
It’s equally unsurprising, too, that this difference in their ideology would lead centrist Democrats to tell the press as often as they can that Ocasio-Cortez’ ideology is dangerous and misguided and will lead the party into peril in districts like theirs, which she couldn’t possibly understand. Of course they want the press to write about that; they want their tepid ideology to dominate the party. They want to win this intra-party battle.
The question, then, is why the media keeps giving them opportunities to do this. I guess it’s fine to get these centrist Dems on the record about her, but how many opportunities to do that do they need? The Hill, for example, went back to Joe Donnelly and Claire McCaskill, who have already made their views about Ocasio-Cortez very clear. We already know what they think! What does it add to ask them again?
In fact, versions of this story keep getting written even about different leftist candidates. Look at this story from Politico in February 2016 about Bernie Sanders (emphasis mine) :
“You need to start asking him questions about his plans and his background,” said Sen. Jeanne Shaheen (D-N.H.). Ask “how he’s going to address foreign policy and national security, how he’s going to pay for his higher education and health care proposals. There are a lot of unanswered questions.” [...] For months Sen. Claire McCaskill (D-Mo.) seemed to be the only Democratic senator who would say what much of the caucus was thinking: That Sanders is unelectable in a general election and has not been fully vetted by the voters. Now, she says, more and more lawmakers will be speaking out.
Or this Politico piece from 2015 (emphasis mine) :
And they fear the stronger he gets, the more he’ll pull Clinton to the left, hurting her chances in the general election. “I just hope they don’t move Hillary so far left that people believe she is out of the realm,” said Sen. Joe Manchin, a moderate West Virginia Democrat who supports Clinton. “I’ve seen bases move people.” “No,” Sen. Bill Nelson said when asked if he was excited about Sanders’ candidacy.
We get it. We got it then and we get it now: Centrist Democrats who rose to power with the support of the financial industry, health insurance and pharmaceutical companies, and coal companies do not like the people who offer a different vision for the party, one where corporate money doesn’t determine which policies are seen as possible. Of course Democrats who lost by running a campaign indistinguishable from a 1990s Republican are incapable of imagining a party dominated by people offering actually bold policies that people like ( Medicare for All, for instance, is supported by about 70 percent of Americans).
There are a lot of other things that insidery DC outlets that love these stories could do instead. They could w rite a totally different story, or at least press conservative Democrats to admit that they have ideological differences with Ocasio-Cortez instead of maintaining this faux concern for the Future of the Party. If nothing else, they could find any way to stop doing PR for the centrist wing of the Democratic Party and giving them multiple extended opportunities to say the same things over and over about how her policies will play in the heartland. It is very, very boring. |
package io.hydrosphere.mist.master
import cats.{Eval, Now}
import com.typesafe.config.ConfigFactory
import io.hydrosphere.mist.master.models.{ContextConfig, RunMode}
import org.scalatest.{FunSpec, Matchers}
import scala.concurrent.duration._
class MistConfigSpec extends FunSpec with Matchers {
it("parse context settings") {
val cfg = ConfigFactory.parseString(
"""
|context-defaults {
| downtime = Inf
| streaming-duration = 1 seconds
| max-parallel-jobs = 20
| precreated = false
| spark-conf = { }
| run-options = "--opt"
| worker-mode = "shared"
| max-conn-failures = 5
|}
|
|context {
|
| foo {
| spark-conf {
| spark.master = "local[2]"
| }
| }
|}
""".stripMargin)
val settings = ContextsSettings(cfg)
settings.contexts.get("foo") shouldBe Some(ContextConfig(
name = "foo",
sparkConf = Map("spark.master" -> "local[2]"),
downtime = Duration.Inf,
maxJobs = 20,
precreated = false,
runOptions = "--opt",
workerMode = RunMode.Shared,
streamingDuration = 1.seconds,
maxConnFailures = 5
))
}
it("should auto configure host") {
val cfgS =
"""mist.cluster.host = "0.0.0.0"
|mist.cluster.public-host = "auto"
|mist.http.host = "0.0.0.0"
|mist.http.public-host = "auto"
|mist.log-service.host = "auto"
|mist.log-service.public-host = "5.5.5.5"
""".stripMargin
val cfg = ConfigFactory.parseString(cfgS)
val masterConfig = MasterConfig.parseOnly("", MasterConfig.resolveUserConf(cfg))
val auto = MasterConfig.autoConfigure(masterConfig, Now("1.1.1.1"))
auto.cluster.host shouldBe "0.0.0.0"
auto.cluster.publicHost shouldBe "1.1.1.1"
auto.http.publicHost shouldBe "1.1.1.1"
auto.http.host shouldBe "0.0.0.0"
auto.logs.publicHost shouldBe "5.5.5.5"
}
}
|
Gallery
Listing Agent
Listed By
Request more information
Thank you for the email, we'll get back to you shortly
Name (required)Email Address (required)Questions/Comments
Description
This nicely wooded combination of 3 lots gives 14.56 acres of nature and privacy with its own pond. Approximately 6 miles west of I-95. County zoning is Open Rural, so your options are plenty. Amelia Island is approx. 20 miles away. No Deeded Covenants and Restrictions. This listing includes parcel number 40-3N-25-1250-0002-0000 and 40-3N-25-1250-0003-0000 |
Tescalcin expression contributes to invasive and metastatic activity in colorectal cancer.
We reported previously that tescalcin (TESC) levels were higher in tissue and serum from colorectal cancer (CRC) patients and suggested that TESC was a potential oncotarget in CRC. The aim of this study was to investigate the function of TESC in CRC invasion and metastatic potential. TESC expression was knocked down in CRC cells using small interfering RNA (siRNA). The expression of TESC siRNA reduced cell migration and invasion by inhibiting matrix metalloprotease (MMP) and the epithelial-mesenchymal transition (EMT) pathway. RT-PCR and Western blot analysis showed that TESC siRNA induced E-cadherin. Consistently, TESC overexpression in HCT116 (HCT/TESC) cells enhanced cell migration and invasion by activating MMP and the EMT pathway and reducing E-cadherin. The formation of liver metastatic nodules in vivo was strongly increased in mice injected with HCT/TESC cells compared with that in mice injected with HCT/mock cells. This study demonstrates that TESC is involved in cell migration, invasion, and EMT during CRC tumor invasion. These results implicate TESC as a metastatic mediator and provide a biological rationale for the adverse prognosis associated with elevated TESC expression in human CRC. |
Latino Daily News
Mexico Wins Under-17 World Soccer Cup! (VIDEO)
The junior world cup hosts, Mexico, beat Uruguay 2-0, at the same stadium where the National Team won the Gold Cup last week!
Over 105,000 people showed up at the famed Estadio Azteca on Sunday evening in Mexico City to watch the Under-17 World Cup final, where Mexico defeated Uruguay 2-0 with goals from Antonio Briseño in the 31st minute and Giovani Casillas in second-half complimentary time.
Briseño beat the goalie chipping the ball in, after a head pass into the area, an epic play you should watch below. Casillas scored two minutes into stoppage time, scoring on a counterattack as Uruguay pressed sometimes up to 8 men in defense for tie goal that never came.
Julio Gómez was named the best player of the cup, taking home the golden ball. The silver ball went to Espericueta and the bronze, went to Fierro - all Mexican players.
The bronze cleat went to Adryan (Brazil), who scored 5 times; silver went to Samed Yesil (Germany), with six, and the golden cleat went to Souleymane Coulibaly (Ivory Coast), who scored nine times. The golden glove went to Uruguayan goalie Jonathan Cubero. |
Copyright © 2013 by W. Scott McAndless
ce or perhaps even later. The Gospel of Luke and the Gospel of Matthew have a great deal in common. They share much of the same material on the life and sayings of Jesus though they organize it somewhat differently. As far as we can understand from a study of the two texts, both Gospels were written independently (with neither making any reference to, nor apparently even having any knowledge of, the other) towards the end of the first centuryor perhaps even later.
Both gospels were written anonymously—with no names attached. It didn’t take the church very long to decide that they must have been written respectively by Matthew, one of Jesus’s twelve apostles, and Luke, an associate of Paul. But that is just tradition. The truth of the matter is that we really have no idea who might have written these books. All we have to help us to understand the interests, concerns and theological agendas of these two authors is what we find in the words they wrote, and it is better not to read anything into what they have written based on church tradition. I will continue to refer to these authors using the names that tradition gave them for the sake of convenience, but please keep in mind that the Matthew and Luke I am talking about are, in fact, figures of mystery whose true identities we may never know.
A deep study of the two gospels has led to a significant scholarly consensus that they shared common literary sources for much of their material. In particular, the theory has been put forward and generally accepted that they both used the Gospel of Mark (or perhaps an early version of it) as a source and that they also shared another major source that no longer exists apart from its traces in these two gospels. This other theoretical source is commonly called the “Q Gospel.”
The Infancy Gospel of James, but they were written later and were undoubtedly dependant on these two gospels.) Because of these shared sources, parallels abound in the texts of these two gospels. But the birth narratives are quite different. Only these two authors attempted any sort of account of the birth of Jesus. (Of course, there are other non-canonical accounts of the birth of Jesus, such as, but they were written later and were undoubtedly dependant on these two gospels.) When Matthew and Luke came to write their gospels, their primary source materials likely made no more than passing references to the birth of Jesus, if they said anything at all. Both of them felt the need to include a story of the birth of Jesus anyway.
This would have made perfect sense to them. They naturally assumed that anyone as extraordinary as Jesus who had done and said such remarkable things and who had sparked such a powerful movement must have had an extraordinary birth. This was a common way of thinking in the ancient world. Once individuals, such as Alexander the Great, Julius Caesar and Caesar Augustus, rose to great prominence, people naturally began to think and speculate on the extraordinary conceptions and births that they must have had.
But a fascination with Jesus’s birth must have developed relatively late. In fact, it doesn’t seem to have been a point of interest at all in the earliest Christians writings such as the letters of the Apostle Paul. The Gospel of Mark also says nothing about it. So when Matthew and Luke began their accounts of the nativity, they could only draw from very sketchy source material at best. This seems evident from the fact that they actually only agree on a few select details in their narratives while they actually differ substantially in other matters.
There are three main points of agreement between the two stories: the location of Jesus’s birth, the names of his parents and the virginal state of his mother. There are three main points of agreement between the two stories: theof Jesus’s birth, theof his parents and theof his mother.
Both gospels agree that Jesus was born at Bethlehem in Judea. This is actually quite extraordinary given that, when they were written, anyone who knew anything about Jesus knew that he was actually from the village of Nazareth in far distant Galilee. The other gospels and earliest Christian writings betray no knowledge that Jesus was from Bethlehem. The Gospel of John even makes a point of insisting on Jesus’s origins from Nazareth despite the fact that this appears to be a very negative thing: Both gospels agree that Jesus was born at Bethlehem in Judea. This is actually quite extraordinary given that, when they were written, anyone who knew anything about Jesus knew that he was actually from the village of Nazareth in far distant Galilee. The other gospels and earliest Christian writings betray no knowledge that Jesus was from Bethlehem. The Gospel of John even makes a point of insisting on Jesus’s origins from Nazareth despite the fact that this appears to be a very negative thing:
Philip found Nathanael and said to him, “We have found him about whom Moses in the law and also the prophets wrote, Jesus son of Joseph from Nazareth.” Nathanael said to him, “Can anything good come out of Nazareth?”
Later on, this same gospel records a significant controversy over Jesus’s origins from Galilee:
When they heard these words, some in the crowd said, “This is really the prophet.” Others said, “This is the Messiah.” But some asked, “Surely the Messiah does not come from Galilee, does he? Has not the scripture said that the Messiah is descended from David and comes from Bethlehem, the village where David lived?” So there was a division in the crowd because of him. Some of them wanted to arrest him, but no one laid hands on him.
As it recounts such stories, the Gospel of John has a perfect opportunity to address the readers directly (as it does in other places) and explain that, though Jesus grew up in Nazareth, he had actually been born in Bethlehem, which would surely answer both Nathaniel’s and the crowd’s objections to Jesus. The fact that it does not do so is a strong indication that any story about a birth in Bethlehem was not well known, if known at all, in the early church. Or it could even mean that, if there was such a tradition and John was aware of it, he was actively disputing its accuracy.
So it is rather interesting that both Matthew and Luke seem to have independently come to believe that Jesus was born in Bethlehem. Nevertheless, it is really not very hard to explain how that could have happened. There is a very clear Old Testament prophecy (explicitly cited in Matthew 2:6 and likely also in mind in the above passage from the Gospel of John) which had created an expectation in some quarters that the Messiah, when he came, would come from Bethlehem because it was the city where King David had been born:
But you, O Bethlehem of Ephrathah,
who are one of the little clans of Judah,
from you shall come forth for me
one who is to rule in Israel,
whose origin is from of old,
from ancient days.
must have come from Bethlehem whether or not they had any evidence that he had been born there. This agreement is easily explained, therefore, despite the fact that there is no indication that either evangelist had any reference to a birth in Bethlehem in his source material. Because of this clear prophecy, it is quite likely that both evangelists would have believed that Jesushave come from Bethlehem whether or not they had any evidence that he had been born there. This agreement is easily explained, therefore, despite the fact that there is no indication that either evangelist had any reference to a birth in Bethlehem in his source material.
Matthew and Luke also agree on the identity of Jesus’s parents: Mary and Joseph. They would have had Mary’s name from their common source, the Gospel of Mark, where she is named, along with Jesus’s brothers but, strangely, without any mention of a father: Matthew and Luke also agree on the identity of Jesus’s parents: Mary and Joseph. They would have had Mary’s name from their common source, the Gospel of Mark, where she is named, along with Jesus’s brothers but, strangely, without any mention of a father:
On the sabbath he began to teach in the synagogue, and many who heard him were astounded. They said, “Where did this man get all this? What is this wisdom that has been given to him? What deeds of power are being done by his hands! Is not this the carpenter, the son of Mary and brother of James and Joses and Judas and Simon, and are not his sisters here with us?” And they took offense at him.
So it is not at all surprising that the two evangelists should agree on the name of Jesus’s mother, but their agreement on the name of the father is a little harder to explain since he is not mentioned in Mark and likely not in the Q Gospel either. I would suggest that these two Gospel writers shared another source or tradition that identified Jesus’s father as Joseph. This does not seem unlikely because, even though Mark does not name a father, the Gospel of John, which was likely written somewhat later than Matthew and Luke, but that also used some of its own separate source material, does give Jesus’s name as “Jesus son of Joseph from Nazareth.”
In the Gospel of Matthew, it is made abundantly clear that Mary was a virgin when Jesus was conceived and that she continued in that state until she gave birth to him. The Lucan story seems to affirm the same thing, though not so clearly. J. A. Fitzmyer has argued that, “When [Luke’s] account is read in and for itself—without the overtones of the Matthean annunciation to Joseph—every detail of it could be understood of a child to be born to Mary in the usual way.” In the Gospel of Matthew, it is made abundantly clear that Mary was a virgin when Jesus was conceived and that she continued in that state until she gave birth to him. The Lucan story seems to affirm the same thing, though not so clearly. J. A. Fitzmyer has argued that, “When [Luke’s] account is read in and for itself—without the overtones of the Matthean annunciation to Joseph—every detail of it could be understood of a child to be born to Mary in the usual way.” But most scholars who have looked at the question have come to the conclusion that the underlying assumption of a virginal conception is there in Luke as well.
So I would not hesitate to say that Matthew and Luke agree on the virginity of Mary. This is a remarkable agreement because it is an idea that is unlikely to have come from their primary source material. It is not even a question that comes up in the Gospel of Mark unless it is a concern that could be read into Mark’s failure to name a father for Jesus, which seems unlikely. And, unlike the matter of the Messiah being born in Bethlehem, there is no clear Old Testament prophecy that requires that the Messiah be born of a virgin.
virgin): Matthew relates the virgin birth to a passage from the prophet Isaiah (which he cites in the Septuagint translation that contains the keyword):
All this took place to fulfill what had been spoken by the Lord through the prophet:
“Look, the virgin shall conceive and bear a son,
and they shall name him Emmanuel,”
which means, “God is with us.”
Matthew uses this passage to explain why Jesus had to be born of a virgin—because it had been prophesied. It helps him to come to a deeper understanding of the meaning of the incarnation of the Christ which he sees as a way in which “God is with us.”
Many would argue today that Matthew has misinterpreted that prophecy in Isaiah by taking it out of context and relying on a defective Greek translation. They would suggest that, in the context of the original passage in the original language, the prophet was actually speaking about a child that would be born to a young woman in the king’s household in his own day. But that matters little to Matthew, who obviously believes that much of what he reads in the Old Testament refers directly to the life and acts of Jesus.
Luke, when he grapples with the meaning of the virgin birth, doesn’t seem to have the Isaiah passage in mind at all. He certainly doesn’t mention it. He seems to be drawing rather on the stories from Genesis of Abraham and Sarah and their struggle to conceive a child despite Sarah’s infertility. When Mary is told by the angel Gabriel that she will conceive, her reaction is to say, “How will this be… since I am a virgin?” Her response is reminiscent of the response of Sarah who is told in the Book of Genesis that she will conceive and have a child despite the fact that she is very old and post-menopausal. Sarah also expresses incredulity in the face of a prediction of a conception that seems impossible, although the particular reason for the impossibility in her case is quite different.
Luke also seeks inspiration from the story of Hannah, the mother of the prophet Samuel—another woman who struggled to conceive a child. Mary’s song that celebrates her expectation of the birth of her son has many parallels to the song of Hannah:
The Song of Hannah
My heart exults in the Lord ;
my strength is exalted in my God.
My mouth derides my enemies,
because I rejoice in my victory.
The bows of the mighty are broken,
but the feeble gird on strength. Those who were full have hired themselves out for bread, but those who were hungry are fat with spoil. The barren has borne seven, but she who has many children is forlorn. The Lord kills and brings to life; he brings down to Sheol and raises up. The Lord makes poor and makes rich; he brings low, he also exalts. He raises up the poor from the dust; he lifts the needy from the ash heap, to make them sit with princes and inherit a seat of honour.
The Song of Mary
My soul magnifies the Lord,
and my spirit rejoices in God my Saviour,
for he has looked with favour on the lowliness of his servant.
Surely, from now on all generations will call me blessed;
for the Mighty One has done great things for me,
and holy is his name.
His mercy is for those who fear him
from generation to generation.
He has shown strength with his arm;
he has scattered the proud in the thoughts of their hearts.
He has brought down the powerful from their thrones,
and lifted up the lowly;
he has filled the hungry with good things,
and sent the rich away empty.
Luke is clearly trying to come to grips with the unexpected and improbable pregnancy of Mary and he does so by reflecting on the unexpected and improbable pregnancies of women like Sarah and Hannah in the Old Testament. Of course, Mary’s case is unique because the reason why her pregnancy is unexpected is quite different from the reasons why Sarah and Hannah were not expected to have children. Sarah shouldn’t have had a child because she was too old, Hannah, because she was infertile, while Mary should not have become pregnant because she was a virgin. The reasons are different but there is a common theme of miraculous conception that runs through all three stories. Luke must have seen enough similarities between these three women to convince him that these Old Testament stories had been placed there to help him to explain a virgin birth.
So the two evangelists turn to very different Old Testament scriptures to understand the virginity of Mary and what it means. This suggests to me that they each have a puzzling piece of information that they are trying to understand. That is to say that they both have a piece of tradition—a teaching that has been passed down to them from the earlier church—that indicates that Jesus was born of a virgin and they are trying to comprehend it.
The New Testament writers often turned to important Old Testament stories to help them process and understand the things that happened to Jesus, and that is what Matthew and Luke do here. But they turn to quite different places: Matthew turns to the Prophet Isaiah while Luke turns to the Book of Genesis and to 1 Samuel.
Points of Disagreement That is why I think that Matthew and Luke are indeed drawing on an established early Christian tradition regarding the virginity of Mary. This point of agreement is very significant because it indicates that the church (or at least certain parts of it) very early on accepted a view of the conception and birth of Jesus that would have been really quite shocking to Jewish sensibilities. Although the notion of gods fathering children on human mothers was quite common in Greek myths and legends, the Jews had never told such stories about their God.
In effect, we have three primary points on which these two evangelists agree. Obviously, these agreements are very important and meaningful, but we should not ignore the points on which they diverge. Unfortunately, these differences are not all that easy for us to see because we are in the habit of harmonizing these two accounts. Christian tradition has, for almost two thousand years, easily integrated the two birth narratives to the point that, when we think of the nativity, we automatically place Mary, Joseph and the baby at the manger surrounded by angels and shepherds (all elements from Luke’s story). We also add the Magi approaching with their gifts and the star shining overhead (from Matthew’s gospel). When we forget all those centuries of tradition and simply read Matthew’s gospel as if we’d never heard of anything that happens in Luke’s, and vice versa, we realize just how different these two stories really are. I see ten major points of divergence. In effect, we have three primary points on which these two evangelists agree. Obviously, these agreements are very important and meaningful, but we should not ignore the points on which they diverge. Unfortunately, these differences are not all that easy for us to see because we are in the habit of harmonizing these two accounts. Christian tradition has, for almost two thousand years, easily integrated the two birth narratives to the point that, when we think of the nativity, we automatically place Mary, Joseph and the baby at the manger surrounded by angels and shepherds (all elements from Luke’s story). We also add the Magi approaching with their gifts and the star shining overhead (from Matthew’s gospel). When we forget all those centuries of tradition and simply read Matthew’s gospel as if we’d never heard of anything that happens in Luke’s, and vice versa, we realize just how different these two stories really are. I see ten major points of divergence.
Both Matthew and Luke were faced with a problem as they wrote their birth narratives. They knew very well that Jesus was from Nazareth in Galilee. Anyone who knew anything about Jesus knew that. But they also knew that, if he was the Messiah, he had to be from Bethlehem just like it said in the Book of Micah. So they each had to explain how Jesus of Nazareth came to be born in far off Bethlehem. Both evangelists were able to deal with this problem, but they dealt with it in very different ways. Both Matthew and Luke were faced with a problem as they wrote their birth narratives. They knew very well that Jesus was from Nazareth in Galilee. Anyone who knew anything about Jesus knew that. But they also knew that, if he was the Messiah, he had to be from Bethlehem just like it said in the Book of Micah. So they each had to explain how Jesus of Nazareth came to be born in far off Bethlehem. Both evangelists were able to deal with this problem, but they dealt with it in very different ways.
Luke’s solution we have already discussed. Luke says that Mary and Joseph were originally from Nazareth, he calls it “their own town,” and explains that they just happened to be in Bethlehem temporarily at the time of Jesus’s birth because they had travelled there to register during the census.
the house, they saw the child with Mary his mother; and they knelt down and paid him homage.” Matthew’s solution is quite different. If you simply forget everything that you have ever read in the Gospel of Luke (not to mention every Christmas pageant you have ever seen) and read Matthew’s story at face value, it is quite clear that he is operating under the assumption that both Mary and Joseph are from Bethlehem. It is their hometown and they even have a house there that they share once they are married and where the Magi visit them: “On entering, they saw the child with Mary his mother; and they knelt down and paid him homage.”
Matthew has the opposite problem of Luke. He must explain why this couple who are from Bethlehem end up raising Jesus in the little village of Nazareth. This he does very handily in the following passage:
When Herod died, an angel of the Lord suddenly appeared in a dream to Joseph in Egypt and said, “Get up, take the child and his mother, and go to the land of Israel, for those who were seeking the child’s life are dead.” Then Joseph got up, took the child and his mother, and went to the land of Israel. But when he heard that Archelaus was ruling over Judea in place of his father Herod, he was afraid to go there. And after being warned in a dream, he went away to the district of Galilee. There he made his home in a town called Nazareth, so that what had been spoken through the prophets might be fulfilled, “He will be called a Nazorean.”
As far as Matthew is concerned, Joseph isn’t from Nazareth at all. He only ends up there because it seems to be a good place to escape the notice of Archelaus, and because it was required in order to fulfil a prophecy. Matthew fails to explain why the family would have been safer under the jurisdiction of Herod Antipas, who was also a son of Herod the Great, in Galilee, and so his explanation is far from ideal.
One gospel writer says that Mary and Joseph were from Nazareth and just happened to be staying temporarily in Bethlehem when Jesus was born while the other assumes they were from Bethlehem and only raised Jesus in Nazareth to establish a new life away from one of Herod’s sons. This is the first and greatest contradiction between the two nativity stories and it cannot be easily overcome. There are many more.
Both Matthew and Luke give a list of the ancestors of Jesus. Matthew traces his lineage back to Abraham and Luke goes all the way back to Adam. They agree on the very important point that, as Messiah, Jesus is a direct descendant of King David. This information was found in their source material. The Gospel of Mark refers to Jesus as the “son of David.” Both Matthew and Luke give a list of the ancestors of Jesus. Matthew traces his lineage back to Abraham and Luke goes all the way back to Adam. They agree on the very important point that, as Messiah, Jesus is a direct descendant of King David. This information was found in their source material. The Gospel of Mark refers to Jesus as the “son of David.” In addition, there seems to have been a very clear expectation among many Jews, based on Old Testament prophecy, that the Messiah, when he came, would be a descendant of David in some sense.
Although they both make this all-important connection between Jesus and David in their genealogies, they do it through different ancestors. The genealogies do not correspond at all through several generations. Here is how the two accounts differ in the crucial generations:
Line of descent according to Matthew 1:6-16:
David, Solomon, Rehoboam, Abijah, Asaph, Jehoshaphat, Joram, Uzziah, Jotham, Ahaz, Hezekiah, Manasseh, Amos, Josiah, Jechoniah, Salathiel, Zerubbabel, Abiud, Eliakim, Azor, Zadok, Achim, Eliud, Eleazar, Matthan, Jacob, Joseph, Jesus
Line of descent according to Luke 3:23-32:
David, Nathan, Mattatha, Menna, Melea, Eliakim, Jonam, Joseph, Judah, Simeon, Levi, Matthat, Jorim, Eliezer, Joshua, Er, Elmadam, Cosam, Addi, Melchi, Neri, Shealtiel, Zerubbabel, Rhesa, Joanan, Joda, Josech, Semein, Mattathias, Maath, Naggai, Esli, Nahum, Amos, Mattathias, Joseph, Jannai, Melchi, Levi, Matthat, Heli, Joseph, Jesus
The lists are so glaringly different that the contradictions cannot be ignored. Down through many centuries, therefore, attempts have been made at harmonizing the two genealogies. The most popular solution is to say that one gospel (usually Matthew) is giving the ancestors of Joseph while the other (usually Luke) is giving those of Mary. It is not, however, a very plausible explanation. Ancient Mediterranean society was extremely patrilineal—tracing descent exclusively through males—so it seems very unlikely that either gospel writer would have departed from the normal manner of recording a genealogy without clearly indicating what he was doing.
son in law of Heli” or, “Jesus was supposedly the son of Joseph but actually the grandson of Heli,” but neither of these translations is grammatically possible. Arguments have been made that, when Luke writes, “[Jesus] was the son (as was thought) of Joseph son of Heli,” what he actually means is “Joseph was theof Heli” or, “Jesus wasthe son of Joseph but actually the grandson of Heli,” but neither of these translations is grammatically possible.
It is also worth noting that at no point in his gospel does Luke suggest that Mary was a descendant of David. It is Joseph who is “descended from the house and family of David.” In fact, Luke even suggests that Mary is connected to a different tribe from David, who came from the tribe of Judah. At least, he says that Mary was a close relative of Elizabeth who was “a descendant of Aaron” in the tribe of Levi. It seems rather unlikely, therefore, that Luke thought that Mary was a descendant of David.
A more complex solution is to propose that the two genealogies are different because one traces direct descent while the other traces descent through adoption as was sometimes required by Hebrew law, particularly the law of levirate marriage. This theory has found little support in modern times. The most popular modern theory is to say that “Matthew gives the legal line of descent from David, stating who was the heir to the throne in each case, but Luke gives the actual descendants of David in the branch of the family to which Joseph belonged.” This really solves little because it still leaves us with two contradictory lists that cannot be reconciled. This indicates that, if Matthew and Luke have any literary record at all beyond Old Testament genealogies, they have two different and completely contradictory lists. Any attempt to harmonize the two will be a futile exercise.
There are more significant differences between these two genealogies than just the contradictions between specific names. The two lists are very different in terms of underlying meaning as well. The list that Matthew offers includes not only King David but also many of his royal descendants who also ruled over the Kingdom of Judah. With such a list, he is making the point that Jesus is the heir to the entire royal line of Judah, not just to David. This is probably a part of Matthew’s overall effort to emphasise the kingliness of Jesus throughout his gospel.
But Luke’s genealogy names no kings other than David. This gives his list a different tone. He seems to be recounting the history of a very different family—a fairly normal Jewish family that just happens to have one very illustrious ancestor. I suspect that Luke is thinking of Joseph as belonging to a less successful branch of David’s family. They were not the ones who went onto great things but rather the ones who stayed behind in Bethlehem and continued to live on and farm the land that they inherited from Jesse, David’s father.
This would also be the same land that is featured in the Book of Ruth—the land on which Ruth gleans during harvest time and where she meets her future husband, Boaz, whom Luke lists as the great-grandfather of King David. The family that Luke is thinking of may have lived on this famous piece of land but he still sees them as the poor rural cousins of the powerful kings who ruled in Jerusalem—forgotten and left in obscurity for generations until that line of kings had failed and their time finally came.
So, with his genealogy, Luke places the emphasis on Jesus’s humble origins—an emphasis that certainly fits with his presentation of Jesus as a humble man, friend of the poor and lowly.
As we have already noted, in Matthew’s Gospel, the political shadow of Herod the Great looms large. He seems to have absolute power of life and death over all the people. In Luke’s gospel, Herod has no influence over events at all and the only power we hear of is the power of Rome. As we have already noted, in Matthew’s Gospel, the political shadow of Herod the Great looms large. He seems to have absolute power of life and death over all the people. In Luke’s gospel, Herod has no influence over events at all and the only power we hear of is the power of Rome.
There is, I suggest, a contradiction in dating. This is a very controversial point of difference and I will look more deeply into this question in a future chapter, but I will simply posit for now that a simple, straightforward reading of each gospel without reference to the other will lead to the conclusion that they are saying that Jesus was born at a different time. The difference is about a decade. There is, I suggest, a contradiction in dating. This is a very controversial point of difference and I will look more deeply into this question in a future chapter, but I will simply posit for now that a simple, straightforward reading of each gospel without reference to the other will lead to the conclusion that they are saying that Jesus was born at a different time. The difference is about a decade.
In Luke’s narrative, Jesus is famously born into abject poverty and laid in a manger because of a lack of adequate housing. The idea seems to be that this poverty is temporary and is a result of the extraordinary travelling associated with the census. Nevertheless, the lowly social position of Jesus at his birth has important symbolic meaning to the author of this gospel and introduces a theme that will be developed through the rest of his story of Jesus’s life and ministry. In Luke’s narrative, Jesus is famously born into abject poverty and laid in a manger because of a lack of adequate housing. The idea seems to be that this poverty is temporary and is a result of the extraordinary travelling associated with the census. Nevertheless, the lowly social position of Jesus at his birth has important symbolic meaning to the author of this gospel and introduces a theme that will be developed through the rest of his story of Jesus’s life and ministry.
Matthew makes no mention of such poverty. On the contrary, the family lives in a house in Bethlehem and they receive precious gifts of gold, frankincense and myrrh from the magi. They have sufficient wealth (perhaps because of the gifts) to make a sudden trip to Egypt and when they return from there they have enough financial independence to make their home in Nazareth, a place of their own choosing.
In Luke’s Gospel, the news of the imminent birth of the Messiah is given exclusively to Mary by an angel who appears to her while she is awake. In Luke’s Gospel, the news of the imminent birth of the Messiah is given exclusively to Mary by an angel who appears to her while she is awake. In the Gospel of Matthew it is Joseph who receives the announcement from an angel in a dream. There is, in this, a minor point of agreement, the annunciation of the birth by an angel. This agreement, together with certain similarities in the angelic message between the two gospels, has led Raymond Brown to suggest that there was a “basic pre-gospel annunciation tradition that each evangelist used in his own way.” Brown is saying that he thinks there was a tradition circulating in the early church that the birth of Jesus had been announced beforehand by an angel and that Luke and Matthew both heard it independently and incorporated it into their stories in different ways.
This is a very intriguing idea. But it does not change the fact that the two annunciation stories, as we have them, are very different. Not only is the announcement made to two different people, but it is also made at two significantly different times. According to Luke, Mary receives the news before she has even conceived the child while Matthew says that Joseph receives the news much later when the pregnancy has progressed enough to cause a public scandal and yet Joseph has apparently not heard anything from Mary or her family about the announcement that, according to Luke, had been made to Mary months earlier.
This dissimilarity between the two gospels is more than just a matter of who was told what by whom and when. It marks a major difference between how these two writers are telling their story. In his account, Matthew makes Joseph his central character. Joseph is not just the one who receives the messages but also the one who takes all of the initiative. He decides to take Mary as his wife, he takes the family to Egypt and he is the one who decides that they should settle in Nazareth after the death of Herod the Great. Mary, for her part, says nothing and does nothing in Matthew’s account apart from being pregnant and bearing a child. Joseph is the one who understands what is going on and who acts accordingly.
all that is said and attends to what happens and she ponders all of it in her heart. All of this is fairly turned around in the Gospel of Luke where the story is much more focussed on Mary, her feelings and her decisions. She is the one who chooses to submit to God’s plan for her by saying, “Here am I, the servant of the Lord; let it be with me according to your word.” She is the one who treasures
Joseph, in the Gospel of Luke, says nothing and does nothing except go up from Nazareth to Bethlehem because he belongs to the house and lineage of David. There is no indication at all in Luke’s account that Joseph even knows what is going on. You might well expect, given the extraordinary means by which Luke says that Mary conceived her child, that Joseph should at least ask a few questions or lodge a few complaints, but, if he did, Luke certainly shows no interest in his concerns.
And so the existence of these two very different annunciation stories underlines the very different approaches that Matthew and Luke have taken to their accounts.
In both Gospels, Mary and Joseph are first introduced as two people who are engaged to be married. According to Matthew’s account, the engagement lasts until the point when Mary’s pregnancy begins to show which in turn creates something of a public scandal. In both Gospels, Mary and Joseph are first introduced as two people who are engaged to be married. According to Matthew’s account, the engagement lasts until the point when Mary’s pregnancy begins to show which in turn creates something of a public scandal. At this point, upon receiving a message from God in a dream, Joseph takes her as his wife, but has no marital relations with her until she has borne a son. It would appear that Matthew is saying the couple were married at least a few months before the birth.
to whom he was engaged and who was expecting a child.” Luke tells the story a little bit differently. He introduces Mary initially as “a virgin engaged to a man whose name was Joseph.” And then, approximately nine months later, just before the birth of Jesus, he again refers to the couple not as married but as still engaged to be married: “He went to be registered with Mary,and who was expecting a child.” Luke gives no indication at all of when Mary and Joseph might have been married, but he strongly implies that it was not until after Jesus was born.
This does seem to be a contradiction, though, perhaps, we need not make too much of it. It seems likely that in first century Palestine the line between engagement and marriage could be somewhat blurry at times. The engagement was likely the more serious of the two as it was the moment when pledges were given and promises made. An engagement, once established, could not be broken without it being considered a divorce, as Matthew indicates in his account of Joseph’s moral dilemma. The marriage itself was more of an opportunity to celebrate the fact of the wife taking up residence in her husband’s home and the physical consummation of the union as is evidenced in a number of Jesus’s parables and sayings. It is why both evangelists put the emphasis on the couple’s engagement rather than on the marriage.
It would seem that neither evangelist is overly concerned with the date of the wedding. They are far more concerned with making it quite clear that there were no sexual relations between Mary and Joseph prior to the birth of Jesus because this is, for them, the essential theological point in the account. In fact, they both agree that the couple is betrothed and yet has not consummated its relationship. Luke works under the straightforward assumption that a betrothal that is not yet consummated is not yet a marriage, while Matthew finds it possible for the couple to be married and yet to have no marital relations. So, in effect, they are both saying the same thing but using different words because each has a different understanding of what marriage means and where the line between betrothal and marriage is drawn.
One of these things does not belong here. Therefore the differing descriptions of Mary and Joseph’s marital status do not necessarily constitute a contradiction between the two gospel accounts. This is a case where they could both be correct according to their own definitions. The confusion does seem to indicate, nevertheless, that there was no established tradition about the marital status of this couple when these evangelists came to write their accounts. Therefore the differing descriptions of Mary and Joseph’s marital status do not necessarily constitute a contradiction between the two gospel accounts. This is a case where they could both be correct according to their own definitions. The confusion does seem to indicate, nevertheless, that there was no established tradition about the marital status of this couple when these evangelists came to write their accounts.
In both gospels the birth of Jesus is accompanied by heavenly messages. But the mode of communication differs sharply. Luke tells of angels who deliver their messages directly to Mary and, later, to a group of shepherds. Communication from God always comes directly by means of these heavenly messengers. In both gospels the birth of Jesus is accompanied by heavenly messages. But the mode of communication differs sharply. Luke tells of angels who deliver their messages directly to Mary and, later, to a group of shepherds. Communication from God always comes directly by means of these heavenly messengers.
In Matthew’s Gospel, however, God communicates only through dreams. Twice an angel appears to Joseph in a dream, and once the Magi receive a message in a dream. This difference in modes of communication is surely not insignificant. There is a very big difference between a message received while you are awake and fully aware and a message received in your sleep. For one thing, dreams always require interpretation in the Biblical tradition which would seem to make them a less certain way of communicating. That Matthew only speaks of one type of communication while Luke only speaks of the other indicates that they are approaching the event of the birth from quite different angles.
In Matthew’s Gospel, God also communicates, though even more indirectly, through the appearance of a star. This heavenly sign, however, must also be interpreted much like a dream and apparently only the Magi are able to discern the meaning in its appearance (though, of course, the magi inadvertently pass the information on to King Herod with tragic results). The star, despite our continued insistence on placing it above the manger, does not appear and is not mentioned in Luke’s Gospel.
We certainly have two very different groups of people visiting the child Jesus in the two gospels. On the one hand, in Luke’s Gospel, we have poor shepherds. Shepherds were considered to be on the very lowest rung of society. They were dirty, unkempt and generally shunned by the rest of society. Their attendance at the manger soon after the birth certainly adds to the humbleness of the family’s circumstances and helps Luke to make clear the lowliness of the birth of the messiah. We certainly have two very different groups of people visiting the child Jesus in the two gospels. On the one hand, in Luke’s Gospel, we have poor shepherds. Shepherds were considered to be on the very lowest rung of society. They were dirty, unkempt and generally shunned by the rest of society. Their attendance at the manger soon after the birth certainly adds to the humbleness of the family’s circumstances and helps Luke to make clear the lowliness of the birth of the messiah.
In the Gospel of Matthew, on the other hand, the only visitors to the child who are mentioned are wise and learned Magi from a distant country. They must also be extremely wealthy men to be able to make such a long journey in response to a sign they have seen in the sky. Whatever point Matthew is trying to make by mentioning these visitors, it is certainly a very different one than Luke is making by talking about the shepherds.
Both Matthew and Luke make a large number of both direct and indirect Biblical references in their accounts of Jesus’s birth. Matthew tends to make the references quite overtly while Luke can be much more subtle. Both Matthew and Luke make a large number of both direct and indirect Biblical references in their accounts of Jesus’s birth. Matthew tends to make the references quite overtly while Luke can be much more subtle.
This is only to be expected because we know that the early church had a strong tendency to turn to Old Testament prophecies and narratives to understand and interpret the things that Jesus said and did. What we call the Old Testament today was the only Bible that they had. It was the place to which they naturally turned to find answers to anything that puzzled them in the traditions that came down to them. Interpretations of Old Testament passages that illustrated the life of Jesus must have been widely shared and discussed in the early church. They were used at the basis of teaching, instruction and preaching. This means that it is significant that these two gospel writers turn to quite different parts of their Bible to understand Jesus’s birth and they never turn to the same passages. This would seem to indicate that, when they came to write, there were no fixed traditions regarding which Old Testament passages applied to the birth of the Messiah.
I won’t give an exhaustive list of all the Biblical images that are used in the two gospels, but here are a few key examples:
Old Testament Imagery in Matthew:
· Herod’s slaughter of the innocents in Bethlehem has many parallels to the story of the birth of Moses and Pharaoh’s attempts to kill him. (Exodus 2:1-10)
· The Magi and the gifts that they bring are connected to the prophecies of Isaiah 60:1-6: “A multitude of camels shall cover you, the young camels of Midian and Ephah; all those from Sheba shall come. They shall bring gold and frankincense, and shall proclaim the praise of the Lord .” The Magi and the gifts that they bring are connected to the prophecies of Isaiah 60:1-6: “A multitude of camels shall cover you, the young camels of Midian and Ephah; all those from Sheba shall come. They shall bring gold and frankincense, and shall proclaim the praise of the.”
· The appearance of the guiding star is likely connected to the “star prophecy” in Numbers 24:17: “A star shall come out of Jacob, and a scepter shall rise out of Israel.”
· The virgin birth is explained by and connected to the promise of the coming of Emmanuel by a reference to Isaiah 7:14.
· Joseph’s dreams and his interpretations of them are very reminiscent of the story of another Joseph, the son of Jacob, and his dreams in the Old Testament. (Genesis 37 ff.) The parallels between the two Josephs even extend to them both having the same father, Jacob.
Old Testament Imagery in Luke:
· Joseph’s return to his ancestral home is connected, I will argue, to the command to celebrate the jubilee in Leviticus 25.
· The key role for the shepherds puts us in mind of prophecies such as the one found in Jeremiah 23:1-8
· The virgin birth (and the birth of John the Baptist) is related to the stories of a number of women in the Old Testament who had difficulty having children—especially Sarah and Hannah. Mary’s song of praise in Luke is remarkably close to Hannah’s song in 1 Samuel 2:1-10.
· The story of the visit of the Angel Gabriel to Mary and his announcement that she will have a son contains many parallels to the account of the visit of three angels to Abraham and Sarah in Genesis 18.
When you look at the nativity stories in this way, you begin to realize that they disagree with one another far more frequently than they agree, although, it must be acknowledged that many of these differences are not direct contradictions. Saying that the announcement of the birth of Jesus was made to Mary, for example, does not mean that an announcement could not have also been made to Joseph. Whether they are contradictions or not, there is no denying that the two evangelists tell quite different stories—different in tone, in emphasis and in content. When you look at the nativity stories in this way, you begin to realize that they disagree with one another far more frequently than they agree, although, it must be acknowledged that many of these differences are not direct contradictions. Saying that the announcement of the birth of Jesus was made to Mary, for example, does not mean that an announcement could not have also been made to Joseph. Whether they are contradictions or not, there is no denying that the two evangelists tell quite different stories—different in tone, in emphasis and in content.
What we have tended to do throughout Christian history is to try to paper over these differences. It is possible, if you really push, to overcome some of these differences and force the birth stories to harmonize with each other. For example, some will argue that you can account for the couple living in a house when the magi arrive in Matthew’s gospel by saying that a lot of time has passed (perhaps up to two years) since the birth in the manger that Luke’s gospel speaks of, and that the couple has managed to arrange for some permanent housing in the interim. Of course, such a harmonization fails to explain why the couple remained in Bethlehem after the child was born if they only went there briefly to be registered during the census.
Nevertheless, it would seem that, if you push and twist the accounts in certain ways, you can make them harmonize to a certain extent. Perhaps that is fine for some. My problem with such harmonization attempts is this: even if you could make all of these differences go away by pushing and twisting what the individual gospel writers say, you would definitely lose something in the process. You would have distorted your original texts and made them say things that the writers never intended. To accomplish such a feat, you would need to decide that the harmonized account you are aiming for is more important than what each individual evangelist is trying to say. You would lose their distinctive voices.
We are incredibly blessed to have these two nativity stories. They have been left for us by the early church as resources for us to use to learn what it means that Jesus of Nazareth came to live among us and to show us the true nature of the love of God. For that reason we cannot afford to diminish their power. We must be willing to read these texts just as they are and not impose some artificial harmony on them. |
1. Field of the Invention
When phenol is manufactured by cleavage of cumene hydroperoxide, a rough phenol is obtained, which has to be rectified by hydrodistillation or by extractive distillation. In either process, two distillation columns are used. In the upstream (or first) column, at the top, are separated foreign matters, mostly a light cut, consisting of mesityl oxide, hydroxyacetone, cumene, alpha-methylstyrene, 2-methyl-benzofuran and other organic substances, which are present (as impurities) in the pure phenol; and in the downstream (or second) column, the pure phenol is distilled. The purge obtained from the top of the first column contains phenol, in a concentration from 20% to 90% by weight, usually from 50% to 80% by weight. The phenol contained in the purge of the first column can be recovered, as is known, by salification with a strong base, for instance, caustic soda; with the resulting sodium phenate, remaining dissolved in the aqueous phase, subsequently acidified with an acid such as H.sub.2 SO.sub.4, H.sub.2 CO.sub.3 or other similar acids, thereby containing free phenol. To obtain a complete (or substantially complete) shifting of phenol to the aqueous phase, in the form of a salt, it is necessary to operate with an excess of base and, when NaOH is used as a base, the excess usually amounts to a quantity ranging from 1% to 30% of the maximum amount convertible to sodium phenate. Therefore, consumption of base is a considerable burden of the known process.
2. Discussion of the Prior Art
European patent No. 28522 suggests, as an alternative process, the recovery of phenol from the purge of the first column by means of steam distillation. However, in this suggested process the costs connected with the use of steam are quite dear and are not neglectable.
As a matter of principle, it would be possible to recover phenol by means of an extraction with H.sub.2 O this expedient would allow the avoidance of the use of NaOH or steam and the resultant disadvantages associated with each. However, the distribution coefficient of phenol between the aqueous and organic phases in the purge of the first column would require the feeding of a considerable water amount to the plant, which would result in an increase of the power (and reactants) consumption. In this case, the cost, on the whole, would be even higher than the cost arising from the recovery by means of salification with NaOH.
The applicants have now found a method which permits the recovery of phenol from the rectification purge in a very simple manner and with yields similar to those obtainable by use of salification with NaOH or from the steam distillation processes described above, while avoiding any consumption of NaOH or of steam. |
Now Commenting On:
Rockies' relief corps soars, then slips
Rockies' relief corps soars, then slips
Email
Print
By Corey Brock
/
MLB.com |
DENVER -- The blame was laid at the feet of the closer on Monday, which fair or unfair, is essentially how the drill goes when you're in such a high leverage situation, under the watchful eyes of so many with so much on the line.
"It's kind of a thankless job," Colorado reliever Joe Beimel said. "You're expected to do your job every day but when you don't, it's so glaringly obvious to everyone.
"It's just part of the job. In that role, it's all about how you bounce back. Unfortunately ... we don't have any games left to bounce back for."
The Rockies got alternatively good and bad performances from a bullpen that got plenty of work in the four games of the National League Division Series that ended with the Phillies scoring three runs in the ninth inning for a series-clinching 5-4 victory at Coors Field on Monday.
Huston Street, so good, so productive in his role as closer for the Rockies, allowed three runs in the ninth inning right after Colorado had victimized the Philadelphia bullpen. The key blow was a game-tying, two-run double by Ryan Howard with two outs.
Jayson Werth then singled in the go-ahead run as the Phillies advanced to an NL Championship Series date Thursday with the Los Angeles Dodgers.
"I've seen it ... God, it didn't feel good," said Street, who in the immediate aftermath watched video of the ninth inning. "The pitch to Howard, was it a good pitch? No, it wasn't my best pitch. It wasn't at the knees, painted, but it was down and it was out. He's a good hitter."
Howard said, "I hoped that he would make a mistake and leave something up over the middle, and just try to drive it and get a double."
Said Street: "I take full responsibility for there not being a Game 5 and not keeping us alive, not giving the guys a chance. We obviously proved throughout the season that we had a chance."
For the Rockies, as Beimel pointed out, there are no games left to bounce back, just more or less an empty feeling, a longing of what nearly was Monday.
ONE TAXED BULLPEN
The Rockies got a lot of mileage out of their bullpen in the NLDS, as their relievers had to try to rescue the team after three short outings by starting pitchers.
Pitcher
G
IP
R
Beimel
3
0.2
0
Belisle
2
2.0
0
Betancourt
3
2.1
1
Contreras
2
2.0
1
Daley
1
1.0
0
Marquis
1
1.0
0
Morales
4
2.2
0
Street
3
2.2
4
Totals
14.1
6
"I kept thinking I was one good pitch away from getting out of it ... that's what I kept on telling myself," said Street, standing in front of his locker and answering questions.
"It's a massive disappointment."
Colorado manager Jim Tracy leaned on his bullpen in the series, as Ubaldo Jimenez, the starter on Monday, was the only starting pitcher in the four games to last past the fifth inning. Jimenez allowed two runs in seven innings, giving the Rockies a chance.
As Tracy said before the start of Game 4, "The leash, so to speak, it's short," pointing to the shorter amount of rope he was willing to, able to, give his starting pitchers in such a critical series with so much on the line.
The game Monday, in a sense, was essentially a microcosm of the series for the Rockies bullpen. After Jimenez left, Tracy went to hard-throwing left-hander Franklin Morales, who got one out and walked three in the eighth inning.
Rafael Betancourt, who struck out three in a scoreless inning in Game 3, entered on Monday and got Pedro Feliz to pop up to shortstop Troy Tulowitzki on the first pitch and then got Carlos Ruiz to ground out to Tulowitzki to end the inning.
The Rockies scored three runs in the bottom of the eighth inning for a 4-2 lead before handing the ball over to Street, who had 35 saves in the regular season in 37 opportunities.
Street struck out pinch-hitter Greg Dobbs to start the inning, before allowing a single to Jimmy Rollins. Rollins advanced to second base when Shane Victorino reached on a fielder's choice. Two outs, one runner on and a two-run lead.
It seemed safe enough.
Chase Utley then worked a walk, laying off several close pitches during a six-pitch at-bat, giving Howard a chance. Street went after Howard with four, four-seam fastballs, he took two for balls and fouled off another before one-hopping a ball off the right-field wall that scored Victorino and Utley to tie the game.
Werth followed with an RBI single to center field on a slider and the Phillies had the lead once again.
"He's a good hitter," Street said of Werth. "I probably could have located the pitch better.
"In the playoffs, it's all about execution."
Corey Brock is a reporter for MLB.com. This story was not subject to the approval of Major League Baseball or its clubs. |
Q:
What needs to be done to make multiple screen support for Javascript happen?
As I was wondering about the multi-monitor/screen support of javascript i found the follwing stackexchange questions relevant for the topic:
2013 - 40k views: window.open() on a multi-monitor/dual-monitor system - where does window pop up?
2014 - 10 k views: window.open on second monitor
2016 - 42 views: How to show a webpage onto another monitor connected to it on click of a button?
2008 - 11 k views: Testing for multiple screens with javascript
2017 - ~1k views: https://webmasters.stackexchange.com/questions/103269/auto-open-fullscreen-on-another-monitor
Quite a few of the questions and answers revolve around the missing option of handling multiple screens with javascript. Security and technical reasons are named to account for the non-existence of such a feature.
On the other hand a few thousand views show that there is interest in the topic and people have tried work-arounds for many years.
So i second I want to automate that process so as soon as they load the first address, a second window automatically pops up on the second monitor and fullscreens itself. This is internal only and will be expected behaviour. from the webmasters.stackexchange question and i would like to know what needs to be done to get this feature?
E.g. would the HTML standard have to be changed see e.g. question from 2014 on code project - would the browser vendors have to do something? Would there be a need for a Javascript addition to e.g. What information can we access from the client? And what would be the actions to get a solution up and running?
And by the way - if you think this is off-topic how would I have to change my question so that it won't be closed. I am very serious about this - there is a need behind this that I have seen quite a few times already.
A:
Since Version 66 of Chrome it is possible to use the Presentation API
There is a W3C Draft for it since 2019-04
The Example at
https://googlechrome.github.io/samples/presentation-api/
will work in Chrome 66+ and given an error message
ReferenceError: PresentationRequest is not defined (Your browser may not support this feature.)
for other browsers when clicking presentationRequest.start().
On Chrome 66+ a selection dialog appears
and after picking the desired screen is used in full screen mode.
|
#!/bin/sh -eux
if [ "$AUTOLOGIN" != "true" ] && [ "$AUTOLOGIN" != "1" ] ; then
exit
fi
# Generate /etc/kcpassword. It contains an encrypted password and allows to run
# the next command without a password prompt.
python /private/tmp/set_kcpassword.py "vagrant"
# Enable the autologin for the 'vagrant' user
/usr/bin/defaults write /Library/Preferences/com.apple.loginwindow autoLoginUser "vagrant"
|
Vertebrate vitellogenesis: molecular model for multihormonal control of gene regulation.
The stimulation of yolk protein synthesis by estrogen is a characteristic of female non-mammalian vertebrates; in mammals, however, vitellogenesis has been suppressed as a corollary of the evolution of viviparity. It is our hypothesis that progesterone has a dual role in this phylogenetic trend; a) to inhibit myometrial contraction and thus set the stage for internal development of embryos and associated placentation, b) to inhibit yolk protein synthesis as placentation became an efficient direct supply of nutrients to the fetus. We have presented evidence that in the reptiles, the central vertebrate group from which the ancestors of modern mammals evolved, the control of yolk protein synthesis is complex, involving both pituitary and ovarian steroids (estradiol, testosterone and progesterone). This system provides an excellent model for the multihormonal contents of gene regulation involving both + and - controls. |
Cryptococcal glucuronoxylomannan delays translocation of leukocytes across the blood-brain barrier in an animal model of acute bacterial meningitis.
In bacterial meningitis, neurological damage is associated with a high influx of polymorphonuclear leukocytes (PMN) into the brain. Previous data suggest that the capsular component of the fungus C. neoformans, glucuronoxylomannan (GXM), interferes with PMN-migration into the cerebrospinal fluid (CSF). Therefore, a rabbit model of bacterial meningitis was treated intravenously with GXM. This resulted in (1) a reduction of PMN in the CSF at 6 h (P=0.05), (2) reduced peak TNF-alpha concentrations in the CSF, and (3) diminished tissue inflammation and intravascular margination of PMN in GXM-treated animals. Thus, GXM may represent a novel adjuvant anti-inflammatory agent in bacterial meningitis. |
Stereotyped responses of rats to two 2-halogenoergolines: 2-bromo-alpha-ergocryptine and lergotrile.
Stereotyped responses to apomorphine, 2-bromo-alpha-ergocryptine (BEC) and lergotrile were compared in naive animals and after various pretreatments. Lergotrile was about half as effective as apomorphine in naive rats, while BEC produced intense stereotyped reactions only after pretreatment with p-chlorophenylalanine. Inhibitors of catecholamine biosynthesis (alpha-methyltyrosine and alpha-methyldopa) only impaired the response to BEC. Haloperidol, a dopamine antagonist, blocked the lergotrile-induced stereotypy within a few minutes, but had a rather slow effect on the response to BEC. It is concluded that lergotrile mainly activates dopamine receptors directly, similar to apomorphine. BEC, however, has a predominantly indirect effect, stimulating the formation and subsequent release of both dopamine and 5-hydroxytryptamine. The relationship of this difference in mechanism to the differences in structure is discussed. |
Sports news from Los Angeles and beyond
With only three days left before players were due to report for their training-camp physicals, restricted free agent Bobby Ryan and the Ducks agreed on a five-year, $25.5-million deal that ended a long and tedious negotiating process.
[Updated at 10:57 a.m.: According to figures from capgeek.com, which confirms a
report from ESPN's E.J. Hradek, Ryan will be paid $3.25 million in the
first season of his new deal (2010-11) and $5,562,500 each of the last
four seasons.]
The key element is that Ryan, 23, will be paid less on an average annual basis than Ryan Getzlaf and Corey Perry, who have seniority -- and a Stanley Cup title. Ryan's salary cap will be $5.1 million annually; Getzlaf and Perry will each average $5.325 million in the three seasons that each has left on his respective contract.
That was a key element for both sides: recognizing Ryan's value after he scored 66 goals the last two seasons but still respecting Getzlaf's and Perry's status and experience. And the Ducks didn't want all three players becoming free agents at the same time, a potential cap-busting situation.
According to CapGeek.com, Ryan's contract is evenly distributed at $5.1 million per year.
Ryan turned down a five-year, $25-million offer earlier this summer, and talks slowed for weeks, but the deal was done Tuesday. |
.ad {
margin-bottom: 30px;
}
|
BCW (Burson Cohn & Wolfe), a leading global communications agency, today announced that Larry Koffler has joined as Executive Vice President, Managing Director in the agency’s Brand Solutions Practice in New York. “Larry has had an extraordinary career leading integrated communications programs that bridge brand, corporate and purpose for some of the world’s most iconic brands and organizations,” said Chris Foster, President, North America, BCW. “His award-winning experience across a wide variety of industries will be invaluable to clients – and in particular purpose-driven clients – that need powerful programs that exceed expectations and drive meaningful results.
It also helps that interest rates have been falling (at least on the higher end of the yield curve), making dividend stocks yet more interesting. What do the long-term prospects look like for the company? OK, so what are some of the stocks that pay dividends that may, well, trim them?
Sir Martin Sorrell, who founded and led London-based advertising giant WPP for three decades, stepped down amid allegations he used company funds to pay for prostitutes. “All these people are powerfully associated with the firms they lead,” said Cary Cooper, professor of organizational psychology at Alliance Manchester Business School in the U.K. “The era of the unaccountable CEO, unable to separate himself — for it is so frequently he — from the corporation is not the leadership needed for 21st-century organizations to flourish,” said Kate Cooper, head of research, policy and standards at the Institute of Leadership and Management in London.
Accenture’s (ACN) Interactive segment provides marketing-related services to its clients. It entered into the practice of digital ad-buying last year and became a potential threat to ad agencies such as Omnicom (OMC) and WPP (WPP). In the short time since then, Accenture has managed to win clients such as HP (HPQ) and Radisson Hotel Group to manage their digital media operations.
NEW YORK, Dec. 13, 2018 /PRNewswire/ -- Michael Houston, Worldwide CEO of Grey Group, today announced that Adrian Rossi is joining Grey London as Creative Chairman, a new position. He will report to John Patroulis, Worldwide Chief Creative Officer of Grey. Vicki Maguire continues in her role as Chief Creative Officer of Grey London.
WPP PLC Chief Executive Mark Read set out his vision for a turnaround on Tuesday, a strategy he hopes will make the world’s largest advertising company better-positioned to contend with the rapidly changing marketing landscape. The company plans to simplify its structure and increase investments in creativity and technology as it aims to deliver organic growth—an important industry measure—in line with its peers by the end of 2021. Mr. Read also said the company plans to reduce its workforce of 134,000 people by 3,500, or about 2.5%, as it pursues annual savings of £275 million ($345 million) by the end of 2021.
Stocks that moved substantially or traded heavily Tuesday: WPP PLC, up $1.25 to $52.38 The advertising and marketing giant announced a major restructuring that will include shedding 3,500 jobs. General ...
The strategy reflects a new vision for WPP as a leader in creativity and technology. It incorporates a simpler, improved offer designed to capture the opportunities of a changing marketplace, and a streamlined structure built around the needs of clients. It also includes additional investments in creativity, technology and talent to enhance WPP’s proposition to clients and drive top-line growth.
It's just a smaller one than investors might reasonably have expected. Based on predicted earnings, a brief analysis suggests that would boost the 2022 operating profit margin from the 13 percent that analysts currently expect to closer to 15 percent. Compare that with archrival Publicis Groupe SA, which announced its own savings plan in March that is both bigger and faster. The French firm expects to reduce costs by 450 million euros ($512 million) by the end of 2020.
Read is trying to win over investors with a promise to make the world’s biggest ad group a sector leader in technology and creativity and will present the strategy to investors in London starting at 12:30 p.m. local time.
PLC (WPP.LN) said Tuesday that it will simplify its structure as the world’s largest advertising holding company pursues annual savings of 275 million pounds ($348.1 million) by the end of 2021, adding that it will prioritize dividends over buy-backs over the next three years. The London-based company said it expects to incur GBP300 million in restructuring costs over the next three years as it tries to make a break from its unwieldy structure and be better positioned to react quickly to client needs.
(Bloomberg) -- WPP Plc Chief Executive Officer Mark Read will put online ad technology and data intelligence at the heart of a turnaround plan for the world’s biggest advertising group on Tuesday in his most detailed strategy update since the departure of company founder Martin Sorrell.
First bullet of release dated December 4, 2018 should read: Ghana’s President Nana Akufo-Addo is Sub-Saharan Africa’s most followed leader on Instagram with 431,000 followers... (instead of 431 million). Indian Prime Minister Narendra Modi is the most followed world leader on Instagram with 14.8 million followers.
Shane Atchison will serve as the North America chief executive of Wunderman Thompson. Seth Solomons, the current CEO of North America at Wunderman, will move into another role at WPP, Mr. Read said in ...
Based on the fact that hedge funds have collectively under-performed the market for several years, it would be easy to assume that their stock picks simply aren’t very good. However, our research shows this not to be the case. In fact, when it comes to their very top picks collectively, they show a strong ability […]
took over less than three months ago and began looking to bolster its lackluster creative agencies. WPP said in September that it was uniting Young & Rubicam with VML. The latest move will create an agency called Wunderman Thompson with more than 20,000 people in 90 markets, WPP said Monday.
WPP plc is merging two more of its units. The marketing services company (NYSE: WPP) announced Monday that two of its New York-based subsidiaries — Wunderman and J. Walter Thompson — will combine. The new entity, dubbed Wunderman Thompson, will provide creative, data, commerce, consulting and technology services at a global scale.
WPP (WPP) today announced that Wunderman and J. Walter Thompson will unite to form Wunderman Thompson, a creative, data and technology agency built to inspire growth for its clients. The new organization will be distinctively positioned as a provider of end-to-end solutions – through creative, data, commerce, consulting and technology services – at a global scale. Wunderman and J. Walter Thompson share many core clients, who will now have simpler access to the expertise of both agencies. |
Despite a national obsession with weight loss, Americans continue to get heavier. There are numerous contributing factors, including increased portion sizes, greater fast food availability, and decreased daily activity. Obesity is often emphasized from a cosmetic perspective, but we are developing an increasing understanding of the clinical and economic ramifications of obesity for the individual, for employers, and for society. For morbidly obese individuals who have failed at traditional weight loss methods, bariatric surgery seems to be an effective way to reduce the burden of excess weight.
Health plans, however, are backing away from providing the coverage, mainly because of the frequency and the cost of complications, even with the increased prevalence of morbid obesity and the popularity of the surgery. This growing popularity will result in continued pressure on health plans to provide the coverage.
To meet this pressure, health plans can develop a benefit coverage strategy that makes business sense and balances adequate coverage with cost control. This can be accomplished primarily by reducing the complications from the surgery and avoiding the adverse selection often associated with this type of benefit. The fastest growing obese population in the U.S. is adults under 65 with morbid obesity. Furthermore, the prevalence of morbid obesity is increasing much faster than obesity in general.
Between 1986 and 2000, the prevalence of an individual with a body mass index of >= 40 (self-reported) quadrupled from about 1 in 200 adult Americans to 1 in 50, according to a study in the Archives of Internal Medicine. The prevalence of a BMI of 50 or greater increased by a factor of 5, from about 1 in 2000 to 1 in 400, according to that study.
Morbid obesity is defined as an individual with a BMI of >= 40 with no other risk factors or a BMI of >= 35 with one or more risk factors. BMI is the standard measurement used to determine overweight and obesity.
The BMI
An individual's BMI is weight (in kilograms) divided by the square of the individual's height (in meters). An individual with a BMI of 25 or greater is considered overweight. The risk factors considered for determination of obesity are diabetes, hypertension, asthma, and cardiomyopathy.
Popularity of bariatric surgery
Despite the numerous weight loss products and programs on the market, many nonsurgical long-term weight loss attempts are not successful for a large number of people. A National Institute of Health expert panel found that 90 percent to 95 percent of people regain one-third to two-thirds of lost weight within a year and all of it within five years.
For morbidly obese individuals, bariatric surgery seems to be an effective response to the burden of excessive weight. Studies have reported that bariatric surgery results in effective post-operative weight loss in morbidly obese patients and a resolution or improvement in diabetes, hyperlipidemia, hypertension, and obstructive sleep apnea for a significant percentage of those patients who suffer from these diseases, according to a study in the Journal of the American Medical Association. The weight loss outcomes have ramifications for the patient's future health, quality of life, and medical health care costs.
Growing demand
Demand for bariatric surgery is growing and will continue to grow because of the increased percentage of the population that is morbidly obese and needs effective treatment, and because of heightened publicity: Several celebrities, such as the entertainers Al Roker, Carney Wilson, and Roseanne Barr, have had the surgery.
The American College of Physicians recently issued a guideline recommending surgery as a treatment option for the morbidly obese. This should further increase the popularity of the benefit.
Not all people who are morbidly obese will qualify for bariatric surgery, since some will fail to meet other surgical criteria (e.g., psychological profile). Nor do all of the severely obese desire surgery. However, the number of bariatric surgeries performed in the U.S. doubled between 2000 and 2003, and it is reasonable to assume that the incident rate will continue to increase.
The Centers for Medicare & Medicaid Services (CMS), the nation's single largest health care payer, has determined that though there are benefits to bariatric surgery, it is not clear how Medicare enrollees who undergo the procedure would fare. CMS is considering whether to expand coverage. It already covers weight loss surgery to alleviate serious obesity related to conditions like diabetes. Most Medicare patients who get coverage for the surgery are younger, disabled patients, according to the American Obesity Association.
Precertification criteria
Health plan coverage varies. Most plans that cover the surgery have precertification criteria that appear to be adapted from the National Institutes of Health (NIH) criteria. Some national plans, such as Aetna, cover bariatric surgery under certain conditions, as listed under the clinical policy on their Web sites. Health Partners and Anthem both cover some type of the surgery. However, other plans, such as Cigna, do not cover this procedure under many of their benefit plan designs. Blue Cross Blue Shield of Florida stopped covering gastric bypass surgery at the end of 2004, citing safety as the primary concern.
Health plans that back away from providing coverage for bariatric surgery do so primarily because of concern about safety and cost. The 30-day mortality rate after gastric bypass surgery is estimated to be 2 percent, according to a study in the Journal of American College of Surgeons. The perioperative mortality rate ranges, according to various studies, from 0.4 percent to 1 percent. The surgery itself is expensive, and the cost of complications increases the overall cost of the benefit. This is one of the reasons that health plans are reconsidering coverage of these surgeries.
A recent JAMA study showed that 20 percent of patients were readmitted in the first year after surgery, 18 percent in the second, and 15 percent in the third.
Reasons for readmission
The most common reasons for readmissions are gastric revision, ventral hernia repair, wound infection, small bowel obstruction, and hypovolemia. The study reported mean charges of $33,672 for the gastric surgery and $20,651 for hospitalizations in the three years after surgery. Added to the cost from complications, there is the cost of plastic surgery that is usually required because of the large amount of weight loss. This can occur three to five years after surgery.
The popularity of bariatric surgery is likely to continue, and employers and health plans will be pressured to provide this benefit. Health plans wishing to meet this demand will need to develop a strategy to provide a benefit that makes business sense and balances coverage and cost. This can be done by minimizing the complication rate and developing other strategies for controlling costs.
Anything that can improve the complication rate will lead to reductions in the total cost of the benefit, which in turn increases the likelihood of coverage being offered and improves the outcome for the patient.
The use of centers of excellence for bariatric surgeries has been shown to have a significant effect on the rate of complications. Studies show that facilities performing bariatric surgery have a wide range of costs and that centers performing a high volume of specialized surgeries often have improved outcomes.
Recent work done in Pennsylvania looked at the relationship between complications and the number of bariatric surgeries a physician performs in a year. Researchers found that physicians who perform more than 100 gastric bypass surgeries in a year have a lower risk of adverse outcomes than those who perform fewer than 10. Adverse outcomes were defined as death, nonroutine hospital transfer, or one or more postoperative complications.
The study found an overall risk of adverse outcomes of 17.4 percent. For high volume surgeons, this risk was reduced to 14 percent; low volume surgeons had a 28 percent risk.
By identifying centers of excellence for bariatric surgeries and offering financial incentives in the form of lower copayments to help steer patients to these facilities, the cost from complications can be minimized and the patient's risk reduced significantly.
Adverse selection
When given a choice, an individual will always select what is most advantageous to him. A problem arises if the insurance carrier has not anticipated and budgeted for that choice. If an individual is interested in bariatric surgery and one of his options is a plan with unlimited coverage and no controls on utilization, he is likely to choose that option.
The result can be utilization and cost much greater than budgeted. To provide an affordable bariatric surgery benefit, it is imperative an insurance company anticipate and budget accordingly.
Some potential methods of avoiding adverse selection, according to an issue brief by the National Business Group on Health, are:
Step therapy: The individual is required to participate in step therapy over a period, usually six months, to identify appropriate candidates for surgery. Step therapy involves the individual "stepping" through a number of increasingly aggressive treatments before becoming eligible for surgery, which is the most aggressive. Examples of step therapy before surgery include completion of patient education and nutritional counseling sessions; psychological assessment and behavior modification; and weight loss to demonstrate some change in eating habits.
Required period of service prior to surgery: A person must be an employee of the company for a specified period before becoming eligible for coverage. These waiting periods may range from two to five years. This helps ensure that this benefit is provided for those employees who have a degree of company longevity, because the health benefit was not the primary reason for employment. To ensure consistency in benefit applications, employers might use a length of employment that is consistent with the period used for vesting in a retirement plan.
Education: The individual receives substantial educational resources and consultations with physicians who can offer unbiased information on various surgical and nonsurgical weight-control therapies. The aim of this is to encourage attempts at noninvasive and less costly therapies first.
Significant patient cost sharing: The surgery and related services are subject to higher cost sharing (e.g., to the 50 percent level), or a benefit-dollar cap of $10,000 or $20,000 to limit cost and utilization and to ensure commitment and personal accountability. This is to improve compliance and long-term outcomes. An increased copayment for surgery can deter unmotivated patients from seeking surgery; however, it may also have the negative impact of deterring valid surgical candidates whose clinical condition would improve but who cannot afford a large copayment.
Required post-surgical waiting period: The individual must remain employed by the company that provided the benefit for a specified period of time in order to receive coverage. This is not popular among employers, possibly because of administrative and potential legal difficulties, such as reclaiming paid claims amounts after termination.
Reasonable coverage
Bariatric surgery is very expensive and risky to the patient. It has a high rate of complications, which adds to the cost and the risk, and often requires plastic surgery in the years after surgery. Yet it is possible to provide reasonable coverage for bariatric surgery by designing it in a thoughtful manner to maximize benefits for all.
The author is a consulting actuary in Milliman's New York City office. She focuses on health insurance and managed care. Her clients include health plans, commercial insurers, providers, educational institutions, and trade unions.
Managed Care's Prospects in the Health Reform Era
Princeton’s Uwe Reinhardt, PhD, renowned health care economist, sits down with Managing Editor Frank Diamond to discuss the economic effects of the Affordable Care Act, wellness programs, and the state of health care in the United States in general. |
I am a big supporter of the format that a TV series’ follows. I love how it has evolved in the last few years and I firmly believe it’s currently surpassing movies in terms of quality and acting.
I also wrote an article, a few months ago, where I explained why, according to me, this phenomenon was actually taking place. The fact that many Hollywood actors are moving to the small screen and acting in different TV series must be, for this reason alone, the explanation for the change in the quality of television and a possible consequence for the big screen.
It is this perspective which is the premise to what I am going to write about.
Last week I wrote about the darker side of Marvel’s Cinematic Universe, represented by darker comic TV series like Daredevil and Jessica Jones.
All that writing about why superheroes should get their own series made me think.
So here are my reasons why (if there are any) at least some major Marvel’s superheroes should be brought to the small screen.
When I think about Daredevil, I can’t help but feel personally involved in all the matters related to the blind vigilante. This feeling of being part of something originally alien to you is what made me fell in love in the first place with the obscure world of TV.
Like Breaking Bad and many others I have had the pleasure to binge-watch, Netflix’s Marvel series have the ability to hook you from the start and never let you go. The televisual format also helps characters get their own in depth analysis and the character-evolution we all praise the writers for. Something like this simply will never happen in movies and the answer is as easy as it looks: time.
Yesterday, I went back home after spending two and a half hours in the Empire Cinema in Leicester Square to experience the IMAX feeling of the galactic fight of man vs god, day vs night… Yes you got it, it was Batman v Superman.
153 minutes isn’t an unusual showing time for movies anymore and what left me unsatisfied was that, even after all that screening of superheroes doing superhero’s stuff, I still felt like I didn’t know neither Bruce Wayne’s Batman, nor Clark Kent’s Superman at all.
That is why TV series are genuinely better.
However, it must be said that not every show which is currently airing on TV is satisfying enough to reach Breaking Bad’s level. Especially when we talk about super powered men.
I follow almost every superhero series, from Arrow to The Flash and from Agents of S.H.I.E.L.D. to Jessica Jones. Even if the quality of the shows are pretty high, most of them fail to reach a coherent and satisfying narration that differs from the “freak-of-the-week” style.
Netflix’s comic experiments are doing something slightly different.
Daredevil’s first season was entirely built on the attempt from Matt Murdock to track down Wilson Fisk and to put an end to his rise through the ranks.
The simplicity of one season one main villain. That’s how superheroes’ narrative should be constructed.
Superhero stories have always been about fragmentation and deep paths assembled step by step just like in comic books where each narrative arch is composed by many issues. From this viewpoint, making one-shot superhero movies doesn’t really make much sense.
I immediately started thinking which hero/antihero, within the Marvel Cinematic Universe currently on the big screen, would be more suitable to get his own show.
Who would be a better fit in the dark environment of Daredevil’s Manhattan?
Peter Parker would.
Bear with me: Wilson Fisk aka Kingpin is one major villain that associates with both Daredevil and Spider-Man. Peter Parker has history with him and, after all the major developments of Daredevil’s second season, it seemed natural to me that the two of them would eventually end up being enemies.
Daredevil also reveals that after the events of the first season, many people inside Manhattan have decided to become vigilantes as well (The Punisher and Jessica Jones).
This key change would easily explain the existence of Spider-Man. And since the first known appearance of Peter Parker is set to happen inside Captain America: Civil War, it seems too good an opportunity to let it pass.
The chance of having Peter Parker join the Netflix side of the Marvel Universe is a golden opportunity. The chance at having a proper back story be told in full and have different scenarios already triggered through other shows and films would signify an even bolder SpiderMan movie in the distant future.
Such a drastic move would actually highlight the business of Netflix’s superheroes thanks to Marvel’s most famous character. And it will bring an extremely loyal audience from the video streaming service directly into theatres to keep following Spidey’s adventures.
I know this all sounds like the ultimate nerd’s dream but, since the evolution of the small screen and the possibilities that such a medium can still offer, I definitely believe in adapting as many superheroes as possible into the TV world.
And if not a proper show, then at least to join Daredevil in the same way The Punisher entered the second season. |
SOUTHERN CALIFORNIA REGIONAL BASKETBALL CHAMPIONSHIPS
BOYS
OPEN DIVISION
Quarterfinals, Wednesday, 7 p.m. unless noted
#1 Sierra Canyon, bye
#5 Corona Centennial at #4 Harvard-Westlake
#6 Rancho Christian at #3 Etiwanda, 8 p.m.
#2 Mater Dei, bye
DIVISION I
First round, Tuesday, 7 p.m.
#1 St. John Bosco, bye
#9 Westchester at #8 Ribet Academy
#12 Fairfax at #5 Windward
#13 Chaminade at #4 San Diego Torrey Pines
#14 Renaissance Academy at #3 San Diego Cathedral
#11 JSerra at #6 Santa Clarita Christian
#10 Riverside Poly at #7 San Diego St. Augustine
#15 Damien at #2 St. Anthony
DIVISION II
First round, Tuesday, 7 p.m. unless noted
#16 Carlsbad at #1 St. Francis
#9 Birmingham at #8 Poway
#12 Oxnard at #5 Bonita
#13 Solana Beach Santa Fe Christian at #4 Hesperia
#14 Salesian at #3 El Cajon Foothills Christian
#11 El Cajon Christian at #6 Eastvale Roosevelt
#10 Chula Vista Mater Dei at #7 King/Drew, 8 p.m.
#15 Hillcrest at #2 San Diego Parker
DIVISION III
First round, Tuesday, 7 p.m. unless noted
#16 El Camino Real at #1 Shadow Hills
#9 Santa Maria St. Joseph at #8 Bakersfield, 8 p.m.
#12 Washington at #5 Arroyo Grande
#13 Keppel at #4 Taft
#14 Adelanto at #3 Oceanside El Camino
#11 Burbank Providence at #6 San Diego County San Marcos
#10 Price at #7 San Diego, 8 p.m.
#15 Fountain Valley at #2 Gardena
DIVISION IV
First round, Tuesday, 7 p.m.
#16 Visalia Redwood at #1 Aquinas
#9 Coronado at #8 Narbonne
#12 Montclair at #5 Bakersfield Christian
#13 Summit at #4 Oakwood
#14 Yeshiva at #3 St. Pius X-St. Matthias
#11 Calexico at #6 San Diego University City
#10 View Park at #7 San Diego San Ysidro
#15 Bakersfield Independence at #2 Palisades
DIVISION V
First round, Tuesday, 7 p.m.
#16 Dymally at #1 Eastside
#9 Banning at #8 Valley Torah
#12 Escondido Classical Academy at #5 Arrowhead Christian
#13 Trinity Classical at #4 San Fernando
#14 Sierra Vista at #3 Delano
#11 Maywood at #6 Fowler
#10 Vistamar at #7 Bishop Diego
#15 Cathedral City at #2 Los Angeles Roosevelt
GIRLS
OPEN DIVISION
Quarterfinals, Wednesday, 7 p.m. unless noted
#1 La Jolla Country Day, bye
#5 Corona Centennial at #4 Etiwanda, 6 p.m.
#6 Sierra Canyon at #3 Windward
#7 Long Beach Poly at #2 Mater Dei
DIVISION I
First round, Tuesday, 7 p.m.
#1 San Diego Cathedral, bye
#9 Chula Vista Bonita Vista at #8 Orangewood Academy
#12 Marlborough at #5 Troy
#13 North Torrance at #4 Harvard-Westlake
#14 Carlsbad La Costa Canyon at #3 Lynwood
#11 El Cajon Christian at #6 King
#10 Fairmont Prep at #7 West Torrance
#15 San Diego Westview at #2 Rosary
DIVISION II
First round, Tuesday, 7 p.m. unless noted
#16 Mira Costa at #1 Long Beach Wilson
#9 Arroyo Grande at #8 San Clemente
#12 Granada Hills at #5 La Jolla Bishop’s
#13 San Diego Serra at #4 Santa Monica
#14 El Camino Real at #3 Bakersfield, 6 p.m.
#11 Los Angeles Hamilton at #6 Chula Vista Mater Dei
#10 Crean Lutheran at #7 Bishop Amat
#15 San Marcos Mission Hills at #2 Palisades, 6 p.m.
DIVISION III
First round, Tuesday, 7 p.m.
#1 Santa Maria Righetti, bye
#9 West Covina at #8 Spring Valley Mount Miguel
#12 Legacy at #5 San Luis Obispo Mission Prep
#13 San Diego Lincoln at #4 Paloma Valley
#14 Taft at #3 Peninsula
#11 Porterville at #6 Eisenhower
#10 Poway at #7 Viewpoint
#15 Westchester at #2 Burbank Burroughs
DIVISION IV
First round, Tuesday, 7 p.m.
#16 Artesia at #1 Lancaster
#9 Los Angeles CES at #8 Arvin
#12 San Diego Point Loma at #5 Sherman Oaks Notre Dame
#13 Ganesha at #4 Xavier Prep
#14 Los Angeles Marshall at #3 La Salle
#11 Chula Vista Otay Ranch at #6 Campbell Hall
#10 Paramount at #7 Carson
#15 Eagle Rock at #2 Ontario Christian
DIVISION V
First round, Tuesday, 7 p.m. unless noted
#16 Monroe at #1 San Jacinto Valley Academy
#9 San Bernardino at #8 San Diego Hoover
#12 Verdugo Hills at #5 Rubidoux
#13 Santa Ana Calvary Chapel at #4 East Bakersfield
#14 Vista del Lago at #3 King/Drew, 6 p.m.
#11 Central City Value at #6 San Diego, 6 p.m.
#10 Bishop Diego at #7 San Diego Madison
#15 Strathmore at #2 Pasadena Marshall
Notes: Regional quarterfinals (Div. I-V), Thursday, 7 p.m. at higher seeds; regional semifinals (all divisions), Saturday, 6 p.m at higher seeds; regional finals, Mar. 10, 7 p.m. at higher seeds. State championships, March 13-14 at Golden 1 Center, Sacramento.
NORTHERN CALIFORNIA REGIONAL BASKETBALL CHAMPIONSHIPS
BOYS
OPEN DIVISION
Quarterfinals, Wednesday, 7 p.m.
#1 Sacramento Sheldon, bye
#5 San Jose Bellarmine at #4 Dublin
#3 Oakland Bishop O’Dowd, bye
#2 San Jose Mitty, bye
DIVISION I
First round, Tuesday, 7 p.m. unless noted
#16 Modesto Christian at #1 San Francisco Riordan
#9 Fairfield Vanden at #8 Fresno Clovis West
#12 San Ramon Dougherty Valley at #5 Atherton Menlo-Atherton, 8 p.m.
#13 Fresno San Joaquin Memorial at #4 Concord De La Salle
#14 Rocklin at #3 Richmond Salesian, 8 p.m.
#11 San Leandro at #6 Sacramento Grant
#10 San Mateo Serra at #7 Moraga Campolindo
#15 Fresno Clovis North at #2 Sacramento Capital Christian
DIVISION II
First round, Tuesday, 7 p.m. unless noted
#16 Rocklin Whitney at #1 Livermore Granada
#9 Stockton St. Mary’s at #8 Clovis East
#12 Atherton Menlo at #5 Oakland Tech, 8 p.m.
#13 Piedmont at #4 Stockton Weston Ranch
#14 Alameda at #3 Atherton Sacred Heart Prep
#11 Carmichael Jesuit vs. #6 Ross Branson at College of Marin, 8 p.m.
#10 Richmond De Anza at #7 Mountain View St. Francis
#15 Danville San Ramon Valley at #2 Vallejo St. Patrick-St. Vincent, 8 p.m.
DIVISION III
First round, Tuesday, 7 p.m. unless noted
#16 Vacaville Wood at #1 Palo Alto, 8 p.m.
#9 Modesto Central Catholic at #8 Chico Pleasant Valley, 8 p.m.
#12 San Francisco Lowell at #5 San Francisco Sacred Heart Cathedral, 8 p.m.
#13 Half Moon Bay at #4 Albany St. Mary’s, 8 p.m.
#14 Redwood City Sequoia at #3 Tuolumne County Sonora
#11 Palo Cedro Foothill at #6 Salinas Palma
#10 Kentfield Marin Catholic at #7 Carmel
#15 Fresno Bullard at #2 San Francisco St. Ignatius
DIVISION IV
First round, Tuesday, 7 p.m.
#16 Santa Cruz at #1 San Francisco Stuart Hall
#9 Redding University Prep at #8 Stockton Brookside Christian
#12 San Francisco Urban at #5 San Mateo Hillsdale
#13 Galt Liberty Ranch at #4 Fresno Hoover
#14 Oakland vs. #3 San Francisco University at Kezar Pavilion (San Francisco)
#11 San Jose Santa Teresa at #6 Merced Golden Valley
#10 Clear Lake at #7 Kingsburg
#15 El Dorado Union Mine at #2 San Francisco Lincoln
DIVISION V
First round, Tuesday, 7 p.m.
#16 Durham at #1 Arbuckle Pierce
#9 Fresno Christian at #8 San Andreas Calaveras
#12 Oroville at #5 East Palo Alto Eastside Prep
#13 Mt. Shasta at #4 Gilroy Christopher
#14 Nicolaus East Nicolaus at #3 San Anselmo San Domenico
#11 Jackson Argonaut at #6 Gridley, 8 p.m.
#10 Denair at #7 Pacifica Pacific Bay Christian
#15 Los Molinos at #2 Sacramento Bradshaw Christian
GIRLS
OPEN DIVISION
Quarterfinals, Wednesday, 7 p.m.
#1 San Jose Mitty, bye
#5 Santa Rosa Cardinal Newman at #4 Stockton St. Mary’s
#3 Fresno Clovis West, bye
#2 Alameda St. Joseph Notre Dame, bye
DIVISION I
First round, Tuesday, 7 p.m. unless noted
#16 San Jose Valley Christian at #1 Richmond Salesian, 6 p.m.
#9 Danville San Ramon Valley at #8 Antelope
#12 Granite Bay at #5 Los Altos Hills Pinewood
#13 Folsom at #4 Orinda Miramonte
#14 San Francisco St. Ignatius at #3 Fresno Clovis North
#11 Sacramento McClatchy at #6 Brentwood Heritage
#10 Atherton Menlo at #7 El Dorado Hills Oak Ridge
#15 Clovis Buchanan at #2 Oakland Bishop O’Dowd
DIVISION II
First round, Tuesday, 7 p.m. unless noted
#16 Mountain View St. Francis at #1 Oakland Tech, 6 p.m.
#9 Sacramento Christian Brothers at #8 Fremont American
#12 San Jose Lynbrook at #5 Fresno San Joaquin Memorial
#13 Santa Rosa Montgomery at #4 Elk Grove Laguna Creek
#14 San Jose Presentation at #3 Loomis Del Oro
#11 Alameda at #6 San Francisco Sacred Heart Cathedral, 6 p.m.
#10 Atherton Sacred Heart Prep at #7 San Leandro
#15 Merced at #2 Clovis
DIVISION III
First round, Tuesday, 7 p.m. unless noted
#16 San Francisco Lick-Wilmerding at #1 Atherton Menlo-Atherton, 6 p.m.
#9 Folsom Vista del Lago at #8 Aptos
#12 Kentfield Marin Catholic at #5 Portola Valley Woodside Priory
#13 San Mateo Aragon at #4 Vallejo St. Patrick-St. Vincent, 6 p.m.
#14 Los Gatos at #3 Auburn Placer
#11 Novato San Marin at #6 Palo Alto, 6 p.m.
#10 Hayward Moreau at #7 Fairfield Vanden
#15 San Jose Leland at #2 Albany St. Mary’s, 6 p.m.
DIVISION IV
First round, Tuesday, 7 p.m. unless noted
#16 San Francisco Lowell at #1 Colfax
#9 Caruthers at #8 Half Moon Bay
#12 Placerville El Dorado at #5 Chico Pleasant Valley, 6 p.m.
#13 San Francisco Washington at #4 Millbrae Mills
#14 Oakland at #3 Hanford
#11 Hanford Sierra Pacific at #6 Salinas Notre Dame
#10 Redding Enterprise at #7 Cloverdale
#15 Chico at #2 Jackson Argonaut
DIVISION V
First round, Tuesday, 7 p.m. unless noted
#16 Le Grand at #1 Cottonwood West Valley
#9 Upper Lake at #8 Portola
#12 Oakland Head-Royce at #5 San Andreas Calaveras
#13 Garden Valley Golden Sierra at #4 Redding University Prep
#14 Colusa at #3 Watsonville Monte Vista Christian
#11 Durham at #6 Gridley, 6 p.m.
#10 Hughson at #7 Wheatland
#15 Stockton Holt vs. #2 Ross Branson at College of Marin, 6 p.m.
Notes: Regional quarterfinals (Div. I-V), Thursday, 7 p.m. at higher seeds; regional semifinals (all divisions), Saturday, 6 p.m at higher seeds; regional finals, Mar. 10, 7 p.m. at higher seeds. State championships, March 13-14 at Golden 1 Center, Sacramento. |
For the past couple of days I saw Taco Bell trending, majority of the people tweeting were thin/skinny. All of them discussing their Taco Bell loyalty and saying how much they love it and eat it A LOT.
Meanwhile a fat person is accused every day of being fat because people assume that a fat person eats to much fast food. The fucking irony of it al!!
But this is common. Every where I frequent thin people post their favorite thing from some fast food place and no one bats an eyelash, their other thin buds join in on the fiesta of fast food orgasms.
I mean mainly thin people are used in fast food commercials for Pete’s sake because the powers that be want to continue promoting this skewed inaccurate message that “Hey they’re thin so they probably don’t eat that often and most of the time eat healthy” whereas using a person of size in a fast food commercial would have people thinking “Oh God I better slack on the Taco Bell before I look like that”.
Thin privilege is being able to be or publicly say you are a constant consumer of fast food but still have the general public and doctors believe you are healthy and eat a balanced diet. |
Lil’ Kim traveled across the country to show her loyalty for her friend Floyd Mayweather, Jr. The Queen Bee was in the courtoom as the boxing champ faced a judge in his domestic violence case in Las Vegas on Friday. Mayweather, who plead guilty, will have until June 1 to turn himself in to serve a 90-day jail sentence. Wearing high-heeled boots and holding a designer bag, Kim spoke briefly to the cameramen on her way out of the courthouse.
Kim and Floyd have become great friends recently and the rapper spent part of her holiday vacation hanging with him, 50 Cent, and other members of the Money Team. According to TMZ, Kim is putting her career on hold for the boxer while he deals with his case, canceling New Year’s Eve appearances and delaying her EP so she can be by his side. |
[Effect of certain chemicals on DNA synthesis and distribution in human transplantable gastrointestinal tumors].
beta-Spectrophotometry and cytophotometry were used to study the effect of 8 chemopreparations on the synthesis and distribution of DNA in human strains of colonic carcinoma (CC-I and CC-II), gastric carcinoma (GC) and liver carcinoma (LC) transplanted to thymectomized mice. Irrespective of no distinct correlation between clinical manifestations of the action of chemopreparations estimated from the tumor size in mice and the number and distribution pattern of DNA, the change in the latter two parameters indicates the tumor response to the chemopreparation. |
Q:
NoSuchMethodError: org.jboss.logging.Logger.debugf
I'm trying to make a stack Spring + Spring Data + Log4J2 work.
Unfortunately, when deploying the artefact on My Glassfish 4.1 Server, the following error occurs :
org.springframework.beans.factory.BeanCreationException: Error creating bean with name 'entityManagerFactory' defined in class com.canal.config.spring.ContextConfig: Instantiation of bean failed; nested exception is org.springframework.beans.factory.BeanDefinitionStoreException: Factory method [public javax.persistence.EntityManagerFactory com.canal.config.spring.ContextConfig.entityManagerFactory()] threw exception; nested exception is java.lang.NoSuchMethodError: org.jboss.logging.Logger.debugf(Ljava/lang/String;I)V
at org.springframework.beans.factory.support.ConstructorResolver.instantiateUsingFactoryMethod(ConstructorResolver.java:601)
at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.instantiateUsingFactoryMethod(AbstractAutowireCapableBeanFactory.java:1113)
at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.createBeanInstance(AbstractAutowireCapableBeanFactory.java:1008)
at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.doCreateBean(AbstractAutowireCapableBeanFactory.java:505)
at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.createBean(AbstractAutowireCapableBeanFactory.java:476)
at org.springframework.beans.factory.support.AbstractBeanFactory$1.getObject(AbstractBeanFactory.java:302)
at org.springframework.beans.factory.support.DefaultSingletonBeanRegistry.getSingleton(DefaultSingletonBeanRegistry.java:229)
at org.springframework.beans.factory.support.AbstractBeanFactory.doGetBean(AbstractBeanFactory.java:298)
at org.springframework.beans.factory.support.AbstractBeanFactory.getBean(AbstractBeanFactory.java:193)
at org.springframework.beans.factory.support.DefaultListableBeanFactory.preInstantiateSingletons(DefaultListableBeanFactory.java:725)
at org.springframework.context.support.AbstractApplicationContext.finishBeanFactoryInitialization(AbstractApplicationContext.java:757)
at org.springframework.context.support.AbstractApplicationContext.refresh(AbstractApplicationContext.java:480)
at org.springframework.web.servlet.FrameworkServlet.configureAndRefreshWebApplicationContext(FrameworkServlet.java:663)
at org.springframework.web.servlet.FrameworkServlet.initWebApplicationContext(FrameworkServlet.java:535)
at org.springframework.web.servlet.FrameworkServlet.initServletBean(FrameworkServlet.java:489)
at org.springframework.web.servlet.HttpServletBean.init(HttpServletBean.java:136)
at javax.servlet.GenericServlet.init(GenericServlet.java:244)
at org.apache.catalina.core.StandardWrapper.initServlet(StandardWrapper.java:1583)
at org.apache.catalina.core.StandardWrapper.load(StandardWrapper.java:1382)
at org.apache.catalina.core.StandardContext.loadOnStartup(StandardContext.java:5704)
at org.apache.catalina.core.StandardContext.start(StandardContext.java:5946)
at com.sun.enterprise.web.WebModule.start(WebModule.java:691)
at org.apache.catalina.core.ContainerBase.addChildInternal(ContainerBase.java:1041)
at org.apache.catalina.core.ContainerBase.addChild(ContainerBase.java:1024)
at org.apache.catalina.core.StandardHost.addChild(StandardHost.java:747)
at com.sun.enterprise.web.WebContainer.loadWebModule(WebContainer.java:2286)
at com.sun.enterprise.web.WebContainer.loadWebModule(WebContainer.java:1932)
at com.sun.enterprise.web.WebApplication.start(WebApplication.java:139)
at org.glassfish.internal.data.EngineRef.start(EngineRef.java:122)
Caused by: org.springframework.beans.factory.BeanDefinitionStoreException: Factory method [public javax.persistence.EntityManagerFactory com.canal.config.spring.ContextConfig.entityManagerFactory()] threw exception; nested exception is java.lang.NoSuchMethodError: org.jboss.logging.Logger.debugf(Ljava/lang/String;I)V
at org.springframework.beans.factory.support.SimpleInstantiationStrategy.instantiate(SimpleInstantiationStrategy.java:188)
at org.springframework.beans.factory.support.ConstructorResolver.instantiateUsingFactoryMethod(ConstructorResolver.java:590)
... 69 more
Caused by: java.lang.NoSuchMethodError: org.jboss.logging.Logger.debugf(Ljava/lang/String;I)V
at org.hibernate.internal.NamedQueryRepository.checkNamedQueries(NamedQueryRepository.java:149)
at org.hibernate.internal.SessionFactoryImpl.checkNamedQueries(SessionFactoryImpl.java:764)
at org.hibernate.internal.SessionFactoryImpl.(SessionFactoryImpl.java:495)
at org.hibernate.boot.internal.SessionFactoryBuilderImpl.build(SessionFactoryBuilderImpl.java:444)
at org.hibernate.jpa.boot.internal.EntityManagerFactoryBuilderImpl.build(EntityManagerFactoryBuilderImpl.java:802)
at org.springframework.orm.jpa.vendor.SpringHibernateJpaPersistenceProvider.createContainerEntityManagerFactory(SpringHibernateJpaPersistenceProvider.java:60)
at org.springframework.orm.jpa.LocalContainerEntityManagerFactoryBean.createNativeEntityManagerFactory(LocalContainerEntityManagerFactoryBean.java:343)
at org.springframework.orm.jpa.AbstractEntityManagerFactoryBean.afterPropertiesSet(AbstractEntityManagerFactoryBean.java:318)
at com.canal.config.spring.ContextConfig.entityManagerFactory(ContextConfig.java:52)
at com.canal.config.spring.ContextConfig$$EnhancerBySpringCGLIB$$db0b8696.CGLIB$entityManagerFactory$0()
at com.canal.config.spring.ContextConfig$$EnhancerBySpringCGLIB$$db0b8696$$FastClassBySpringCGLIB$$bca83b68.invoke()
at org.springframework.cglib.proxy.MethodProxy.invokeSuper(MethodProxy.java:228)
at org.springframework.context.annotation.ConfigurationClassEnhancer$BeanMethodInterceptor.intercept(ConfigurationClassEnhancer.java:312)
at com.canal.config.spring.ContextConfig$$EnhancerBySpringCGLIB$$db0b8696.entityManagerFactory()
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:497)
at org.springframework.beans.factory.support.SimpleInstantiationStrategy.instantiate(SimpleInstantiationStrategy.java:166)
... 70 more
My pom.xml is :
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd">
<modelVersion>4.0.0</modelVersion>
<groupId>com.springapp</groupId>
<artifactId>advance</artifactId>
<packaging>war</packaging>
<version>1.0-SNAPSHOT</version>
<name>advance</name>
<properties>
<java.version>1.8</java.version>
<springframework.version>4.2.1.RELEASE</springframework.version>
<log4j.version>2.4</log4j.version>
<javaee.version>7.0</javaee.version>
</properties>
<dependencies>
<dependency>
<groupId>org.springframework</groupId>
<artifactId>spring-core</artifactId>
<version>${springframework.version}</version>
<exclusions>
<!-- Utilise Log4J à la place du logger par défaut -->
<exclusion>
<groupId>commons-logging</groupId>
<artifactId>commons-logging</artifactId>
</exclusion>
</exclusions>
</dependency>
<dependency>
<groupId>org.springframework</groupId>
<artifactId>spring-web</artifactId>
<version>${springframework.version}</version>
<exclusions>
<!-- Utilise Log4J à la place du logger par défaut -->
<exclusion>
<groupId>commons-logging</groupId>
<artifactId>commons-logging</artifactId>
</exclusion>
</exclusions>
</dependency>
<dependency>
<groupId>org.springframework</groupId>
<artifactId>spring-webmvc</artifactId>
<version>${springframework.version}</version>
<exclusions>
<!-- Utilise Log4J à la place du logger par défaut -->
<exclusion>
<groupId>commons-logging</groupId>
<artifactId>commons-logging</artifactId>
</exclusion>
</exclusions>
</dependency>
<!-- Log4J2 Dependance -->
<dependency>
<groupId>org.apache.logging.log4j</groupId>
<artifactId>log4j-api</artifactId>
<version>${log4j.version}</version>
</dependency>
<dependency>
<groupId>org.apache.logging.log4j</groupId>
<artifactId>log4j-core</artifactId>
<version>2.4</version>
</dependency>
<!-- Bridge Log Spring vers Log4J -->
<dependency>
<groupId>org.apache.logging.log4j</groupId>
<artifactId>log4j-jcl</artifactId>
<version>${log4j.version}</version>
</dependency>
<dependency>
<groupId>org.springframework</groupId>
<artifactId>spring-tx</artifactId>
<version>3.2.8.RELEASE</version>
</dependency>
<dependency>
<groupId>org.springframework</groupId>
<artifactId>spring-jdbc</artifactId>
<version>3.2.8.RELEASE</version>
</dependency>
<dependency>
<groupId>org.springframework.data</groupId>
<artifactId>spring-data-jpa</artifactId>
<version>1.9.0.RELEASE</version>
</dependency>
<dependency>
<groupId>javax</groupId>
<artifactId>javaee-api</artifactId>
<version>${javaee.version}</version>
<scope>provided</scope>
</dependency>
<dependency>
<groupId>org.hibernate</groupId>
<artifactId>hibernate-entitymanager</artifactId>
<version>5.0.1.Final</version>
</dependency>
</dependencies>
<build>
<finalName>${artifactId}</finalName>
<plugins>
<plugin>
<groupId>org.apache.maven.plugins</groupId>
<artifactId>maven-compiler-plugin</artifactId>
<version>3.3</version>
<configuration>
<source>${java.version}</source>
<target>${java.version}</target>
</configuration>
</plugin>
</plugins>
</build>
</project>
Does anyone have a clue ?
A:
hibernate-entitymanager brought in jboss-logging as a dependency, but it is not the most up-to-date version and does not have that method implemented. It looks like you do not need jboss-logging, so try excluding it:
<dependency>
<groupId>org.hibernate</groupId>
<artifactId>hibernate-entitymanager</artifactId>
<version>5.0.1.Final</version>
<exclusions>
<exclusion>
<groupId>org.jboss.logging</groupId>
<artifactId>jboss-logging</artifactId>
</exclusion>
</exclusions>
</dependency>
Or if it turns out that you need jboss-logging for hibernate, then add a later version of jboss-logging as an additional dependency.
<dependency>
<groupId>org.jboss.logging</groupId>
<artifactId>jboss-logging</artifactId>
<version>3.3.0.Final</version>
</dependency>
A:
I had a similar issue, I was able to fix it by creating a glassfish-web.xml file in the WEB-INF directory. The contents of the file are shown below:
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glassfish-web-app PUBLIC "-//GlassFish.org//DTD GlassFish Application Server 3.1 Servlet 3.0//EN" "http://glassfish.org/dtds/glassfish-web-app_3_0-1.dtd">
<glassfish-web-app>
<class-loader delegate="false"/>
</glassfish-web-app>
This ensures that glassfish does not load it's internal libraries, but libraries from your project.
A:
The method org.jboss.logging.Logger.debugf is only available in the jboss-logging version 3.3.0, if you have this dependency in your project also you have to check that your GlassFish server also have the same version. I had the same error message and I solved it replacing the jboss-logging.jar at the glassfish installation folder because this jar is a previous version and it does not have the needed method. For example, I have the jar in the following path:
C:\Program Files\glassfish-4.1.1\glassfish\modules\jboss-logging.jar
I deleted the old jar and I put the new jar with same name but with the version 3.3.0. Just restart the GlassFish server and it will take the new jar version and that's all.
|
I've been using SSH to connect to a IBM i system. They recently upgraded they're operating system to 7.1. Zend Studio was working fine after the upgrade, but then all of sudden stopped working with the following error:
I'm having this issue again. All of a sudden my I'm getting the Failed to connect SSHD on [ip address] and I can't connect to my system. I tried re-starting sshd on the ibm i. I also disconnected and re-connected in Zend Studio, but no luck. NETSTAT *CNN shows that SSH is in listen mode. I'm not sure what else to try??
I know you've already solved this, but this might be useful for others: make sure the qusrwrk subsystem is running. If not, enter this on the command line: STRSBS SBSD(QUSRWRK). Then try restarting sshd. I haven't used Zend Studio with V7R1 yet, but I know this is a prerequisite for V6R1. |
[Clinical evaluation of platelet antagonists on the ex vivo inhibitory effects of platelet aggregation].
It is necessary in clinical to establish the effects of new substances for the primary and secondary prevention of thrombotic illnesses. We measured maximum aggregation after addition of collagen (F.C. 1.7 micrograms/ml) or ADP (F.C. 1.7 mumol/l) in 41 patients without drug treatment, 91 with ticlopidine, 22 with aspirin (ASA); 82-750 mg, 13 with ASA 81 mg, 20 with ticlopidine 100 mg and ASA 81 mg, 13 with cilostazol, 25 with flurbiprofen, 19 with nifedipine and evaluated the ex vivo effect of platelet antagonists. ASA inhibited remarkably collagen-induced platelet aggregation compared with other drugs, but there was significant (p less than 0.01 for 0.5 mumol/l ADP; p less than 0.02 for 1.0 mumol/l ADP) increase of primary aggregation induced by low dose of ADP in 14 healthy volunteers. While ticlopidine only significantly reduced ADP-induced platelet aggregation and we couldn't find dose dependency of ticlopidine (100-300 mg/day) on inhibitory effects of ADP or collagen-induced platelet aggregation. Our results indicate that the administration of one tablet of aspirin for pediatrics (aspirin 81 mg/tab) together with ticlopidine 100 mg is suitable for reduction of platelet aggregation. |
Last night some goats were released into a temporary pasture on John Street in DUMBO, where they basked in the setting sun for perhaps the last time. The goats got to graze at John Street Pasture today, where visitors were allowed to pet them, and they were supposed to be there until 6 p.m. tonight. But alas, they were just spotted being herded into this Halal Truck.
We contacted organizers involved with the pasture (which was artist Andrea Reynosa's contribution to this FOODshed show), and will update when we hear back. It's unclear what their fate is, but the truck bears the logo for Madani Halal, which lists goats as one of their products, boasting that they are grass fed to give them a more "earthy and organic flavor."
A tipster tells us that one goat managed to escape when The Man tried to load him into the van and was subsequently spotted running down the streets of DUMBO.
UPDATE, 5:15 p.m.: The goat that got away was captured.
Dead goat walking. (Photo courtesy of RB)
We dropped by the site, where organizers refused to say what was next for the goats. We also spoke to some disappointed locals who had come by to see them. Jamie Pessin was there with her 5-year-old son Noah, and told us, "This is very sad. [To her 5-year-old son Noah] I promised you goats and there are no goats! Somebody posted only 20 minutes ago that there would be goats here until 6 o'clock!" [Ahem.] They're probably already in Queens:
GOOD UPDATE! 7:45 p.m.: Brooklyn Grange has sent us this statement: “All goats, even dairy goats, are eventually slaughtered for meat production. This is the nature of our food system and one of the issues that this project set out to highlight. The 5 goats in our installation are being donated to a local educational farm, and will continue to live a happy life at pasture for years to come. Madani Halal has been a great partner on this project—they helped source and transport the goats for us, and they are an excellent local business specializing in sustainable meat distribution and processing here in New York City." So... they've got a few more years.
UPDATE, 7/11: Some more info on the fate of the goats can be found here.
Additional reporting from Scott Heins. |
Throwback to 2004: Ronnie O’Sullivan Top Gear video
We know this goes back a few years, 2004 in fact but snooker ace and car fanatic, Ronnie O’Sullivan took part in the popular Top Gear series.
O’Sullivan had the long hair, was often unpredictable on and off the table and it was also the year he won his second world title.
Ronnie was at the top of his game on the snooker table, but off the table he was in a very dark place.
He was the perfect candidate for Britain’s favourite show….Top Gear
Ronnie O’Sullivan Top Gear video
Ronnie O’Sullivan Top gear challenge: The snooker star does a good lap around in the reasonably priced car and comes in at 1:47.
He is then challenged to a race against the stig with a twist. The stig does a lap of the circuit in a Mercedes-Benz SL500, while O’Sullivan must play a 4 red frame of snooker. The one that finishes first wins. Check out the video to see who won.
More recently in 2015 when the BBC sacked Jeremy Clarkson, O’Sullivan came out and told the press that he’d love the job himself.
“I’d love to have the Top Gear job. I said to my agent when the job came up; ‘I want it’, but whether I’m equipped to do it, I don’t know. I’d definately be up for it. I don’t want to follow in Jeremy Clarkson’s footsteps though….”
Clarkson, Hammond and May were subsequently replaced by a replacement panel which included Matt Le Blanc and Chris Evans to name a couple. The new format was a flop and BBC were forced to look at the future of the show.
As for Ronnie O’Sullivan? Well lets just say he’s not as unpredictable as he once was, but still has his moments here and there. He has since committed to playing snooker into his 50’s, and has become a very good pundit on Eurosport snooker.
Hi im Charlotte. Currently a web development manager for the Rapid Media group which controls snookercentral.com. Along with development of large websites i also manage and maintain social media accounts.
Charlotte McGarrigle
Hi im Charlotte. Currently a web development manager for the Rapid Media group which controls snookercentral.com. Along with development of large websites i also manage and maintain social media accounts. |
const User = require('../models/user.js');
/**
* 根据用户名列表查找用户列表
* @param {Array} names 姓名数组
* @returns {Array} users 用户数组
*/
exports.getUsersByNames = async(names) => {
if (!names) {
return [];
}
return await User.findAll({
where: {
name: names,
},
});
};
exports.getUserById = async(id) => {
if (!id) {
return [];
}
return await User.findById(id);
};
exports.getUserByEmail = async(email) => {
if (!email) {
return {};
}
return await User.findOne({
where: {
email: email
}
});
};
exports.getUserByName = async(name) => {
if (!name) {
return {};
}
return await User.findOne({
where: {
name: name
}
});
};
exports.createUser = async(user) => {
if (!user) {
return {};
}
return await User.create(user);
};
exports.updateUser = async(id, info) => {
if (!id || !info) {
return {};
}
return await User.update(
info,
{
where: {id: id}
});
};
exports.addIntegration = async(id, integration)=> {
if (!id || !integration) {
return {};
}
let user = await User.findById(id);
return await User.update(
{
integration: integration + user.integration,
},
{
where: {id: id}
});
} |
Many share the hope that today’s troubled urban centers can be transformed into tomorrow’s smart cities. At a recent conference, “Smart Utilities: A Bridge to Smart Cities of the Future,” co-sponsored by Suez and Wharton’s Initiative for Global Environmental Leadership (IGEL), some early pioneers in this effort shared their experiences and thoughts.
Rather than tackle individual projects piecemeal, as so many cities have done, Philadelphia’s Office of Innovation and Technology (OIT) decided to create a roadmap that would guide and ensure long-term coordination of its wide-ranging projects.
Utilities are among those embracing the promise of smart technology by collecting and sharing data with customers. They — and others providing critical services to cities, campuses and industry — are using human and machine intelligence to capitalize on the data pouring in from these smart systems. And they are finding ways to save money by sharing resources and collaborating.
Few of the methods traditionally used to finance infrastructure projects are of much help when it comes to funding smart city initiatives. Fortunately, creative new approaches are being pioneered by cities, utilities, investors and businesses across the country.
Jennifer is Program Director with the Institute of Nuclear Host Communities and works for the economic development agency that serves the region surrounding Entergy Corporation’s Vermont Yankee nuclear power plant. The plant closed in 2014 and is now in the process of decommissioning.
Saqib is a reporter with E&E News who has written at length about Vermont Yankee and the legacy of nuclear plant closures.
February 13, 2018
Nuclear power plants pump millions of dollars into local economies. As the rate of nuclear retirements accelerates, will surrounding communities find a way forward?
A growing number of U.S. nuclear power plants are threatened with early retirement as the combination of rising operating costs, and low electricity prices, have eroded the nuclear industry’s profits. The reactors are often the economic life blood of the mostly rural communities where they’re located. When they close, many good paying jobs, and generous funding for school and community services disappear. And, unlike most one-company towns, nuclear host communities are burdened with a legacy of nuclear waste that can create barriers to redevelopment.
Guests Jennifer Stromsten, Program Director with the Institute of Nuclear Host Communities, and Saqib Rahim, an E&E News reporter who’s written extensively on nuclear plant closures, discuss community efforts to navigate the closure of the Vermont Yankee nuclear station in southern Vermont. They also look at the impact that the ongoing storage of nuclear waste at the site is having on efforts to redevelop, and initiatives at the state and national level to give communities more say in the decommissioning process and, by extension, control over their path forward.
The Energy Policy Now podcast, now in its second season, offers insights from Penn experts, industry and policy leaders on the energy industry and its relationship to environment and society.
Featuring Daniel Raimi is a senior research associate at Resources for the Future, where he focuses on energy and climate policy. He also teaches energy policy at the Gerald R. Ford School of Public Policy at the University of Michigan, and is a faculty affiliate at the University of Michigan Energy Institute.
January 17th, 2018
The view of Americans on the environmental and economic implications of fracking continues to be sharply divided a decade after the shale revolution began. But the author of a new book, The Fracking Debate, finds more nuanced perspectives in wellhead communities.
The shale revolution in the United States is now more than a decade old. In the intervening years, energy companies have tapped vast, previously uneconomical oil and natural gas resources through a suite of technologies, including hydraulic fracturing, commonly called fracking, and horizontal drilling. The results have been dramatic. Today the U.S. is a leading producer of oil, and the top global supplier of natural gas.
But the shale revolution has also bred controversy as the country has struggled to balance fracking’s economic and environmental impacts. Those for and against fracking have often gone to great lengths to promote their views. Along the way, previously quiet communities, from Pennsylvania to North Dakota, have struggled to accommodate waves of drilling rigs and energy workers.
Guest Daniel Raimi spent several years traveling the country to get to know the communities where fracking takes place. His travels led to a new book, The Fracking Debate: The Risks, Benefits, and Uncertainties of the Shale Revolution. In it Raimi seeks to relate the perspective of communities, and citizens, on fracking’s front lines, and provide unbiased answers to some of the biggest questions surrounding fracking.
The Energy Policy Now podcast, now in its second season, offers insights from Penn experts, industry and policy leaders on the energy industry and its relationship to environment and society.
You can’t solve a problem you don’t understand. Raising awareness, sharing information and cultivating interest about indoor air quality are important tools for building design professionals to exploitat the start of the design process to achieve optimal indoor air conditions from the start of a project through building occupancy.
Getting people to break habits is extremely difficult. Paul Scialla, Founder and CEO at Delos explains, “Our built environments can shape our habits, regulate our sleep-wake cycle, drive us toward healthy and unhealthy choices, and passively influence our health through the quality of our surroundings. We spend 90% of our time indoors, and by incorporating a variety of healthy design, construction and operations strategies through evidence-based programs such as the WELL Building Standard, we have a profound opportunity to advance human health, well-being and productivity for everyone.”
Occupant health is a clear economic incentive. In 2007, a study by Mudarri and Fisk estimated that annual costs of asthma attributable to dampness and mold exposure in homes were between $2.1-4.8 billion. By 2014, studies in the health sector revealed reductions in mortality rates, bloodstream infection rates, and medicine consumption in green hospitals, compared to conventional hospitals, indicating that some of these effects could occur because of improved IAQ. Fewer sick days, reduced employee turnover, and fewer medical errors are compelling incentives to design spaces that incorporate evidence based research findings.
MATERIALS MATTER
Consumer products and building materials emit dangerous gases like VOCs, Formaldehyde and Carbon Dioxide, influencing indoor air quality. Many of these types of compounds were not present half a century ago. According to the EPA, examples of consumer products and building materials that are also sources of indoor air pollution include office furniture, flooring, paints and coating, adhesives and sealants, wall coverings, office equipment, wood products, textiles, and insulation. In 2010, the World Health Organization established guidelines for maximum thresholds of Formaldehyde at .08 ppm, though there are few guidelines for other gases, environmental conditions and particulate matter (the WHO only first identified particulate matter as an indoor pollutant in 2006, explicitly recognizing the limited availability of resources). Indoor air quality (IAQ) is enhanced by using materials that have negligible carcinogenic or chemical emissions, are installed with minimal VOC-producing compounds, offer moisture resistance, and require simple, non-toxic cleaning methods and products. Today, more consumer products and building materials are being studied and certified as low chemical-emitting materials in an effort to control and achieve good indoor air quality. But is this enough?
ENERGY BUNNIES
One premise for green building design is its impact in the energy sector. Today buildings account for 41% of US energy consumption, with nearly half of that usage coming from the commercial sector. Designers have control over energy consumption and indoor air quality factors such as materials, systems, ventilation, the environmental control scheme, and layout. In 2016, the percentage of firms with over 60% green certified projects reached 18 % and is estimated to triple to 37% by 2018. Under LEED standards, Gold Rated buildings earning 39 points are estimated to reduce environmental impact by 50 percent, while Platinum Rated buildings earning 52 points are estimated to reduce environmental impact by almost 70 percent.
VENTILATION MATTERS
Historically the connection between buildings as repositories and gateways of resource flow and air pollution was difficult to measure. In office buildings, over 1/2 of end use energy expenditures come from heating, ventilating and cooling. One of the challenges with flushing ventilation, bringing in outside air at night when the building is unoccupied to cool down the building or remove heat, is the re-introduction of outdoor pollutants and generation of new pollutants. The reaction between outdoor air and indoor materials is a break in equilibrium at the surface of materials causing the emissions of new pollutants, otherwise absorbed by building structures. Well-ventilated work spaces proved to have lower levels of CO2 correlating with decreased levels of worker anxiety and increased levels of productivity. More specific findings in support of the mounting evidence demonstrating the relationship between Indoor Air Quality & productivity tells us there is 61% higher cognitive functioning in green buildings that meet occupant health and energy efficiency standards set by LEED and 100% higher cognitive functioning in buildings with twice the ventilated air rate required for LEED certification (+Green Plus Buildings).
“…heightened levels of Carbon Dioxide over the course of a school year can have detrimental physical effects on children’s developing respiratory system.”
According to Bruce White, Vice President of Airthinx, Inc. “We are starting to see, and have a clearer picture of the health effects of indoor contaminants like PM 1, PM 2.5, PM 10, CO2, CH2O, VOC’s on building occupants. We see from recent studies out of Harvard, Berkeley, Johns Hopkins, USGBC & IWBI, what elevated levels of CO2 alone can do to students and building occupants. Specifically, in children, elevated levels of CO2 can cause wheezing and levels over 1,000 ppm can result in a 10-20% increases in days away from school. That alone affects the school not only in lower test scores, but also in funding from the US Department of Education on attendance levels. More importantly, the prolonged exposure to heightened levels of Carbon Dioxide over the course of a school year can have detrimental physical effect on children’s’ developing respiratory system.”
HOLISTIC APPROACH
A poor indoor environment causes occupant discomfort, health problems and poor performance. Building system performance directly impacts maintenance frequency, equipment life, and energy usage. Understanding the process and possible IAQ endpoints (moisture control, drainage, ductwork protection, HVAC production, use of low VOC building materials, minimum ventilation) encourages improved building design. For example, a life cycle assessment (LCA) addresses the impact of a product through all of its life stages. By executing sustainable design in architecture, there is an opportunity for long-term value through modifiable building systems over the life-cycle instead of least-cost investments.
The impacts of evidence based design, a once value added anomaly, are now a requirement for competitive practice. Occupants heightened exposure to the availability of data & metrics, conditions them to demand more assured outcomes on expensive building projects. Architects are in a position to make collective and informed choices that will have a broad impact in the aggregate, such as advising about emission testing protocols to ensure test results can be translated into real world use cases. For example, under LEED, designers can earn up to 15 points for implementing indoor air quality measures.
SMART SENSORS
When considering the options available for indoor air quality management, the exclusive reliance on cleaning the air with filtration systems may not be enough. Air filtration cleaning method results rest on the assumption that ‘dirty’ contaminants are eliminated. Rather, the systems selectively remove some pollutants but not others, and generate new pollutants when the systems are not properly maintained. A reliable counterpart and solution is continuous monitoring of air quality levels in any infrastructure, preserving the integrity of the measurements, producing never before seen analytics and information, and creating better indoor environments, everywhere in the world. In this way, space planning can be more intuitive and give future projects a greater chance of success.
Building a collective understanding of the indoor air quality problem and its ecosystem, creates opportunities to make informed decisions and inspires actions to transform indoor spaces.
Mr. Valentine Lehr, of Lehr Engineering in New York weighs in, “As a consulting design engineer, I am aware that the best intentions and latest technology often fail when needed maintenance and constant monitoring are neglected. At the heart of this is the cost and effort of monitoring these systems and validating proper operation, both tasks which require human input. Further, while devices to monitor air content have been available, these are usually singularly specific, expensive and need frequent calibration. In that regard, the Airthinx monitor is a significant development and improvement. It’s low cost, easy installation, ability to monitor multiple potential contaminants and ease of integration with BMS and specialized monitoring/alarm centers allows for an unprecedented number of devices to be installed, and the original design intent to be fully maintained, assuring high IAQ.”
The solution, developed by Netronix’s IoT platform, guarantees the highest standards of security, reliability, and scalability of the network, and enables quick deployment of devices in commercial, retail & residential buildings with simple, affordable integration into any built environment. Each Airthinx IAQ device has nine built-in sensors (PM 1, PM 2.5, PM 10, CO2, CH2O, VOCs, Temperature, Humidity, & Pressure), measuring air quality with industrial accuracy, at a fraction of the cost, making air quality monitoring financially feasible at room level.
“Its low cost, easy installation, ability to monitor multiple potential contaminants and ease of integration with BMS and specialized monitoring/alarm centers allows for an unprecedented number of devices to be installed, and the original design intent to be fully maintained, assuring high IAQ.”
The advantage of a portable device that fits in the palm of a hand with data available instantaneously from a mobile phone, iPad or desktop is accessibility to information, anytime, anywhere.
Being a billionaire has afforded Sir Richard Branson many opportunities in life, but after decades of disrupting some of the world’s biggest industries, his latest passion projects have less to do with flying planes and mobile phones and more to do with saving the world. As employees of Virgin Atlantic and Delta (Virgin’s partner airline), we were fortunate to be able to see Richard at the Authors@Wharton Speaker Series yesterday, and were once again reminded of what an entrepreneurial spirit and compassion for the environment and human rights can do to change the world.
Having recently experienced the devastation of Irma on his Necker Island residence, climate change literally hit Richard, his family, and his employees with the strength of a hurricane. But rather than dwell on the negative, he spoke of rebuilding infrastructures throughout the islands to come back better than ever before, and views climate change as ‘one of the great opportunities for this world’, encouraging the business sector and entrepreneurs globally to tackle the issues of global warming.
When asked by host, Professor Adam Grant, what his next venture will be, Sir Richard emphasized that he’s setting his sights on the future, focusing on non-profit initiatives to tackle carbon emissions, global human rights, and creating sustainable fuels, just to name a few. Now, you might think that a mogul with three airlines in the Virgin portfolio which guzzle fuel crossing oceans and continents and saving the environment shouldn’t necessarily be in the same sentence, however Richard and his Virgin Group are achieving just that. Just take a look at some highlights from the 2017 Virgin Sustainability Report:
8% reduction on total aircraft emissions from 2015 to 2016
Continuation of partnership with LanzaTech to create the world’s first commercially viable, low carbon jet fuel from waste carbon gases
Installation of solar energy powering an entire secondary school campus and two water systems in Kenya
Review and refresh of Virgin’s Responsible Supplier Policy based on international standards of human rights
Announcement of a further investment in efficient aircraft with 12 A350-1000s to become part of our fleet from 2019
Yesterday, we were reminded of what a cool boss we have. We’ve been fortunate to work for and with a man whose vision and compassion could one day further revolutionize the way people travel, consume energy and communicate, as he’s already done for decades. For the young entrepreneurs of tomorrow, who were able to see Richard speak, we hope some of them heard his rallying cry and will join him in changing the world.
This week the Kleinman Center for Energy Policy honored former EPA Administrator Gina McCarthy with its annual Carnot Prize in celebration of her contributions to environmental policy and to securing a sustainable energy future during her tenure with the EPA. While visiting the Center McCarthy sat down with the Energy Policy Now podcast to discuss the direction of the EPA under current Administrator Scott Pruitt, likely legal challenges to Pruitt’s effort to roll back the Clean Power Plan, and the larger issue of climate denial in Washington.
The Energy Policy Now podcast, now in its second season, offers insights from Penn experts, industry and policy leaders on the energy industry and its relationship to environment and society.
Internet of Things (IoT) platform provider Netronix, Inc. and Airthinx Inc. a leader of indoor air quality monitoring, are working together to provide cities around the world with a low cost cloud based solution designed to monitor air quality across schools, universities, hospitals and work spaces. The advantages of cloud based solutions are mapping, tracking, identification of pollutants, measurement of pollutants, data analytics using historical trends, and data mining. Cities stand to benefit from ubiquitous long term monitoring and management of air quality, in real time with instantaneous data available for quick city wide propagation, like geo-mapping incident reports of high pollution areas.
ConventionalMethods
Municipalities are hard pressed to find low cost solutions. Conventional methods for collecting indoor air quality data relied heavily on expensive stationary devices. In the United States, for example, the federal government has a network of sensors on towers monitoring particulate matter. The cost of each sensor is $100,000. While in Edinburgh, the city had a single station monitoring PM 2.5 as of 2013. Thus data is collected from only a few instruments but is representative of a broad geographic area.
InterimSolutions
Moving away from conventional methods, many cities are implementing short term initiatives as first steps towards smart city transformation. In 2014, Chicago deployed 50 nodes mounted on lampposts developed with Argonne National Library and the Chicago Department of Innovation and Technology. Barcelona deployed a smart lighting system with embedded air quality sensors that relay information to city agencies and the public as part of their smart city initiative costing in total $230 million. Boston, Los Angeles, and Miami installed park benches equipped with a solar panel that channel electricity via USB ports to charge. Denver in partnership with Google and the Environmental Defense Fund (EDF) attached mobile sensors to cars throughout a city, collecting 150 million data points over 750 hours of driving time, creating a street level air quality map of the city. Dublin fitted 30 bikes with air sensors measuring carbon dioxide, carbon monoxide, smoke, and particulates.
Last year, London attached air quality sensors to ten pigeons to monitor air quality over three days of flights. Louisville gave 300 local residents a sensor that fits on top of their inhaler, tracking locations of inhaler use to help residents manage asthma, collecting 5,400 data points over the 13 months, and identifying hotspots with high inhaler use in order to pinpoint areas with particularly bad air quality.
PhiladelphiaTransforms
Philadelphia begins the smart city transformation process with its most recent initiative to release open data from city departments. Mayor Kenney also points to ownership and accessibility of light poles and city buildings which can accommodate sensors and wireless access points spread throughout the city. With institutional players like Drexel, Penn, Wharton, CHOP & Comcast, the infrastructure to implement smart city solutions is in place.
Dr. Nasis, founder and CEO of Netronix, Inc. and faculty member of electrical & computer engineering at Drexel, shares insight into the transformation process. “A smart city is a segment of IoT. Many have looked at the smart city as a vertical market on its own, when actually it is a horizontal market with many verticals below it, such as safety, environmental, healthcare, energy, and transportation.”
In the environmental vertical, cities can monitor air quality, water quality and weather. Across the safety vertical, meters already exist that detect gunshots to determine the precise location of the incident helping address crime prevention. Energy, another vertical, can be optimized in street lighting and power plants to keep consumption down. And in the transportation vertical, parking, bus, and traffic can be monitored to enhance quality of life.
‘Many have looked at the smart city as a vertical market on its own, when actually it is a horizontal market with many verticals below it.’
A significant challenge of smart cities is having the tools to address compatibility within and between each vertical. Dr. Nasis cites a “holistic approach, rather than filling in the holes.” The smart parking meter experiment is an IoT solution but also an example of ‘filling in the holes.’ Without an overarching smart city horizontal in place, the initiative did not work. Dr. Nasis concludes, “for a successful smart city, each vertical and the needs of each vertical must be defined, and that requires systemic planning.”
Netronix Ventures, LLC, a subsidiary of Netronix, based out of Philadelphia, aims to start up 100 companies in the next decade using Netronix’s IoT platform. Smart city solutions can be developed in record time, saving 75 percent of the time and costs associated with the development and production of devices and services using conventional methods.
InformationGap
The IoT is about sharing things, interacting, and learning. An information gap leads to a certain kind of decision making. A smart platform creates opportunities to make more informed choices when investing in the city. The smart part is how you collect and make use of the intelligence. By breaking the information gap, the result is a better understanding, more thorough assessment of exposure, heightened awareness, and a complete picture of the data.
Today, the means for large scale and rapid deployment of tens of thousands of devices transforms air quality monitoring and facilitates the collection of quantitative data in any infrastructure. As a direct result of the IoT, a new paradigm emerges in air quality monitoring leading to the much-needed democratization of air quality data. Knowing about the quality of the air you breathe or the water you drink pushes people to take social responsibility.
FinancialFeasibility
A significant cost to a smart city transformation is the installation process. 70 percent of city officials say budget constraints are the greatest barrier to adopting smart city solutions. In many cities, a complete overhaul poses a lofty price tag associated with the redesign of buildings and infrastructure. A cloud based solution with deployment of IoT enabled devices eliminates the once costly installation, configuration and calibration associated with industry reference instruments.
Such a significant reduction in overhead and cost per unit lowers the price of the device to a fraction of industrial reference instruments. Cities benefit from investment because there is no need to redesign infrastructure in order to adopt IAQ solutions as part of a widespread smart city plan. One incentive is real time data that anticipates future needs. For example, with built in GPS, the locations of sensors take into account the points in the city with the most exposure to air quality hazards, protecting city dwellers and workers. The data can also be reviewed by a team to determine appropriate next steps. Monitoring air quality becomes financially feasible at room level in any infrastructure.
SmartSensors
But even with such advancements, few sensors produce reliable enough data to be used in studies or by regulations. In comparison to static monitoring, continuous monitoring enhances high temporal-spatial resolution and variability of air pollution, which so far has been difficult to address. These characteristics, the level of accuracy, precision and identification of microscopic particles in the air, are distinguishing characteristics of air quality monitors in the market. The ability to continuously monitor air quality levels in any infrastructure while preserving the integrity of the measurements, and producing never before seen analytics and information, creates better indoor environments, everywhere in the world.
Dr. Vasileios Nasis will be presenting at the Wharton IGEL & SUEZ Conference – Smart Utilities: Bridge to Smart Cities of the Future on September 27.
September 19, 2017
Can tightly regulated coal mining help undo decades worth of environmental damage caused by the coal industry? A Pennsylvania DEP official, and a mining executive, discuss efforts to remediate water and land in the state’s Anthracite coal region.
Pennsylvania’s economy has long been tied to its coal industry. In the 19th century the state’s pioneering coal companies fueled America’s industrial revolution, and thousands of mining sites opened over the decades that followed. Yet, over a century later, many of Pennsylvania’s coal mines have closed as the resource’s primacy has waned.
John Stefanko, Deputy Secretary for the Office of Active and Abandoned Mine Operations at Pennsylvania’s DEP, and Greg Driscoll, Chief Executive of Blaschak Coal Company, look at the environmental damage that remains after mines have been abandoned, and on cooperation between today’s coal industry, and regulators, to clean up some of that damage. The focus is on the Anthracite coal industry of Northeastern Pennsylvania, where the remains of a once large coal industry attempts to find profits, while bearing costs for cleaning up the damage of past decades.
John Stefanko is Deputy Secretary for the Office of Active and Abandoned Mine Operations at Pennsylvania’s Department of Environmental Protection.
Greg Driscoll is President and Chief Executive Officer of Blaschak Coal company in Mahanoy City, Pennsylvania.
The Energy Policy Now podcast, now in its second season, offers insights from Penn experts on the energy industry and its relationship to environment and society.
By John Paul MacDuffie
September 5th, 2017
The electric vehicle market has become the center of attention for the automotive industry, with overwhelming demand for Tesla’s new, more affordable Model 3 EV as just the latest sign of market enthusiasm. Yet many perennial EV challenges remain, notably high costs and scarce charging infrastructure. And nationally, support for EV’s has become more fragmented and, quite possibly, politicized.
In the latest episode of the Kleinman Center’s Energy Policy Now podcast, Wharton management professor and automotive expert John Paul MacDuffie offers insights into the EV market’s growth trajectory, and talks about the likelihood of the market reaching a tipping point. In the process he tells what recent developments, such as recent announcements from France and the UK to ban gas and diesel car sales within a generation, could indicate for global EV market growth.
The Energy Policy Now podcast, now in its second season, offers insights from Penn experts on the energy industry and its relationship to environment and society.
President Trump is moving forward with his campaign pledge to roll back environmental protections, most notably with his late March executive order instructing EPA administrator Scott Pruitt to withdraw the Clean Power Plan. In the latest episode of the Kleinman Center for Energy Policy’s podcast series, Energy Policy Now, Penn law professor Cary Coglianese takes a look at the multiple legal and political tools the Trump administration is using to reduce protections, including executive orders, defunding of agencies with environmental oversight, and use of the previously obscure Congressional Review Act. Coglianese lays out the challenges each strategy will face, and the potential for regulations to be rolled back or to endure.
Closely tied to the issue of climate change is the economic outlook of the electric utility industry, which is increasingly tasked with the role of enabling the transition to clean power, yet will face lower electricity demand as a result. In a second new episode, former Pennsylvania Consumer Advocate Sonny Popowsky takes a look at the challenge that distributed energy presents to electric utilities’ profitability. Popowsky, who is an advisory board member of the Kleinman Center, also explores the costs to consumers that could result from efforts to balance the growth of rooftop solar, energy efficiency and related technologies with the need to maintain a power grid that equitably serves all. |
Wojcik contributed to all three Bradley scores with an assisit and two goals including the game-winning goal in overtime to play a key role in the Brave's 3-2 win over Northwestern in the first round of the NCAA Tourney. He also scored Bradley's lone goal in their 3-1 loss to California in the second round of play.
Tim Kreutz - RS Junior - Forward - Michigan State
Kreutz tallied his fourth game-winning goal and ninth of the season out of a free-kick with a double assist from Kevin Cope and Adam Montague in the second overtime period to give the Spartans the edge they needed to top Louisville 1-0. Cope sent a ball into the box that Montague flicked to Kreutz who deposited it just inside the left post.
Coco Navarro - Freshman - Forward - Marquette
Navarro's game-winning goal with twenty-five seconds remaining in the first overtime period enabled Marquette to defeat Akron 1-0 and secured the program's first ever win in NCAA Tourney play. The goal was set up when senior Adam Lysak played a back-heel pass to defender Paul Dillon who lofted a cross into the top of the six-yard box that Navarro side-volleyed into the back of net.
Miguel Gonzalez - Senior - Forward - Seattle University
Gonzalez helped engineer what may have been the the biggest upset in the first round of play in the 2013 NCAA Tournament when he scored from ten and twenty-five yards out to lead the Redhawks to a 2-1 come from behind win in Omaha over Creighton. Seattle's historical season in which they earned their first berth in the NCAA Tourney at the Division I level came to an end when they were defeated 4-2 by Washington in the second round of play.
Leo Stolz - Junior - Midfielder - UCLA
Stolz was again the catalyst for the Bruins with three assists in UCLA's 4-0 win over Elon in the second round of the NCAA Tourney. Victor Chavez scored twice for UCLA and Joe Sofia and Aaron Simmons each added a single goal. The number one seeded Bruins advance to the Sweet Sixteen and will host a very good Connecticut team.
Ricky Greensfelder - RS Freshman - Midfielder - Wake Forest
Greensfelder's first-career goal proved to be the game-winning goal in Wake Forest's 2-1 win over a very determined Navy team. Greensfelder also assisted on teammate Sean Okoli's goal. The game-winner came off the left foot of Greensfelder after receiving a nice cross from teammate Chris Duvall. Wake Forest advances to the Sweet Sixteen to face number three seeded Notre Dame.
Eric Bird - Junior - Midfielder - Virginia
Bird continues to make things happen for the Cavaliers. He drove a header into the back of the net out of a corner kick put in play by teammate sophomore Scott Thomsen and assited along with teammate Patrick Foss in junior Ryan Zinkhan's first half goal out of a free kick. Bird has scored a total of seven times so far this season. Virginia advances to the Sweet Sixteen and will host #9 seeded Marquette in what looks to be a very interesting matchup.
Alec Sundly - Senior - Midfielder - California
Sundly was the catalyst in Californa's 3-1 win over the Bradley Braves scoring twice and contributing the assist on teammate Steve Birnbaum's goal. Seth Casiple and Connor Hallisey contributed the helpers on Sundly's goals. California gets back in the win column and improves to 13-4-2. The Golden Bears advance to the Sweet Sixteen where they will host Coastal Carolina.
Shawn McLaws - Junior - Defender - Coastal Carolina
McLaws anchored a bend but don't break Coastal Carolina backline that contained a multi-dimensional Charlotte offense to enable the Chanticleers to secure a 1-0 win over the 49ers to earn the right to advance to the Sweet Sixteen to tangle with #4 seeded California. Coastal Carolina out of the Big South Conference ups their record to date to 19-4-0.
Andrew O'Malley - Senior - Defender - Notre Dame
The Fighting Irish captain was a key part of a Notre Dame defense that shutout Wisconsin 4-0 to advance to the Sweet Sixteen in NCAA Tournament play. O'Malley and his teammates improve their record to 13-1-6 overall and will now host fellow ACC member Wake Forest on Sunday, December 1 in what should be a very competive match.
Drew Hutchins - Senior - Goalkeeper - Stanford
Hutchins did a little bit of everything to help Stanford advance past LMU in penalty kicks in the first round of the NCAA Tourney. He pushed forward in the closing seconds of the match and assisted on teammate Zach Batteer's last second goal that sent the match into overtime. During the shootout he converted a penalty kick and made two big saves. Hutchins also recorded the shutout in goal in Stanford's 1-0 win over C.S. Northridge in the second round to send the Cardinal into the Sweet Sixteen. |
Ayalon
said in an interview on Army Radio
that there were no Mossad agents
operating in the United
States.
October 3, 2002
Israeli
official denies report that Mossad followed 9/11
terrorists
By Agencies and Ha'aretz
Service
ISRAELI ambassador to the U.S. Danny
Ayalon on Thursday rejected a report
published by the German newspaper Die
Zeit, according to which Israeli Mossad
agents tracked the perpetrators of the September
11 terror attacks for an extended period of
time, and passed over information on them to the
CIA and the U.S. administration.
Ayalon said in an
interview on Army Radio that there were no
Mossad agents operating in the United
States.
According to the Die Zeit report,
which is to be published Friday, the CIA ignored
the information on the terrorists and deported
the Mossad agents.
The agents rented an apartment in Florida in
December 2000, close to the apartments of
Mohammed Atta and Marwan al
Shehhi, both of whom were aboard the planes
that crashed into the World Trade Center.
According to the paper, the agents followed
Atta and al Shehhi, discovered that they were
taking flying lessons at the Florida Airman
flight school and passed the information on to
the U.S. administration. |
MAC Future Face Collection for Spring 2011
M∙A∙C forges ahead with a three-in-one force: Powder, Foundation and Tinted Moisturizer altogether. First, Studio Careblend/Pressed Powder blurs the line between skincare and makeup, with a pressed texture that beautifies as it benefits. Gives a sheer to medium, smooth, even coverage for a flawlessly soft and even tone with caring, comforting properties. Studio Fix Fluid and Studio Moisture Tint SPF 15 shade extensions fill in all the gaps. A broad, all-inclusive shade range means M∙A∙C Artists can cover everybody, one beautiful conquest at a time. Call your clients most in need of convincing, and watch what happens!
Q: What is so unique about the coverage and finish the Studio Careblend Pressed Powder provides? Can it be used alone or should it be used layered with other products?
Studio Careblend Pressed Powder provides sheer to medium coverage with perfect skin adhesion that helps to create a more flawless, refined look to skin. Studio Careblend Pressed Powder’s versatility allows users to apply it alone, over moisturized skin, atop foundation to set, or simply to touch up and perfect skin throughout the day.
Q: What are the Skincare benefits of the new Studio Careblend Pressed Powders?
Studio Careblend Pressed Powder has a super comfortable, weightless cream-like feel on skin, thanks to our unique botanical complex that consists of Safflower Seed Oil, Meadowfoam Seed Oil, Shea Butter, Olive Oil and Lecithin. This “Comfort Complex” helps contribute not only to the beautiful skin adhesion and flawless finish look, but it also ensures that the powder will be non-drying, non-powdery and extremely comfortable to wear for all skin types.
Q: What are some of the technologies used to develop this product make it stand out?
This is truly a modern, next generation pressed powder. It is formulated with a combination of micronized treated pigments and luxurious ultra fine Venetian particles and worked in a special Crosspolymer and other ingredients to give the most luxurious glide and application with amazing, undetectable skin adhesion – looks like flawless skin, not pressed powder! Then, with the addition of the botanical “Comfort Complex,” we help the skin to feel its best and look its best, without the dry, chalky look of powders from generations past.
Q: M•A•C is known for testing our new products backstage at Fashion Weeks – what was the reaction from our artists to the Studio Careblend Pressed Powders?
The reaction from our Sr. Artists and M.A.C PRO Team backstage during fashion week in NY, London, Milan and Paris has been amazing! They love the luxurious feel and ultra smooth, non-powdery looking application they get… Finally, a Powder that looks like silky skin! |
29 Ill.2d 367 (1963)
194 N.E.2d 308
THE PEOPLE OF THE STATE OF ILLINOIS, Defendant in Error,
v.
RED BUSH, Plaintiff in Error.
No. 37506.
Supreme Court of Illinois.
Opinion filed November 26, 1963.
*368 EUGENE M. RUARK, of Chicago, appointed by the court, for plaintiff in error.
WILLIAM G. CLARK, Attorney General, of Springfield, and DANIEL P. WARD, State's Attorney, of Chicago, (FRED G. LEACH and E. MICHAEL O'BRIEN, Assistant Attorneys General, and ELMER C. KISSANE and MATTHEW J. MORAN, Assistant State's Attorneys, of counsel,) for the People.
Judgments affirmed.
Mr. CHIEF JUSTICE KLINGBIEL delivered the opinion of the court:
*369 The grand jury of the criminal court of Cook County returned three indictments against the defendant, Red Bush, each charging him with murder. He was tried by the court without a jury on an indictment charging him with the murder of his wife, Grace Bush, and after a finding of guilty it was stipulated that the evidence which had been heard in that case could be considered by the court on the other two indictments, which charged the defendant with the murders of William Ostler and Claude Colville. The court entered findings of guilty on these two indictments and the defendant was sentenced on each indictment to a term of 199 years, with the sentences to run concurrently. We have issued a writ of error to review the judgments of conviction.
The defendant contends that the evidence was insufficient to establish his guilt beyond a reasonable doubt, and in the alternative, argues that he was guilty of the crime of manslaughter rather than murder. William Johnson testified that he met the defendant in Cincinnati, Ohio, on January 11, 1961. The defendant told him that he wanted to purchase a gun but was unable to do so because he had no identification. Johnson and the defendant went to Newport, Kentucky, where Johnson purchased a gun with money furnished by the defendant. At the time of the purchase the seller gave Johnson a receipt and Johnson gave this receipt to the defendant, who purchased shells for the gun. Johnson and the defendant then came to Chicago by bus and went to the home of the defendant's mother. On January 15, Johnson went with the defendant to an apartment where the defendant's wife lived. The defendant went up the stairs with the gun in his hand and Johnson followed him. The defendant entered an apartment on the second floor and Johnson heard the defendant say, "That's the fellow I want to see," and heard a man inside the apartment say, "I don't want you here. I'm not scared of your gun." Johnson heard two shots and when he stepped to the door he saw a man falling to the floor. Johnson left and went back to the *370 defendant's mother's home. On cross-examination it was brought out that Johnson had been indicted as a result of this shooting but that the charges had been dropped.
Ichija Tanaka testified that at the time of the shooting he was in the bedroom of the apartment. Mrs. Bush, Colville and Ostler were in another room, which was separated from the bedroom by a curtain. Tanaka heard the doorbell ring and heard Colville say, "Get out". He then heard shots and heard Mrs. Bush say, "Oh, Red!" Tanaka fled from the apartment and returned in 10 or 15 minutes. Upon his return he saw that Colville and Ostler were dead and Mrs. Bush was in a critical condition.
Officer John Coughlin testified that he arrested the defendant several hours after the shootings in the basement of his mother's home. The defendant told the officer that his name was Johnson. The officer searched the defendant and found the receipt which had been given at the time the gun had been purchased. The defendant was taken to the hospital where Mrs. Bush was being treated in the emergency room. She was asked to identify the defendant and she said "Yes, that's my husband, Red. He shot me and the other two men." The defendant remained silent at the time of this accusation.
Officer Walter Anderson testified that he searched the basement where the defendant was arrested and found the gun and some cartridges. Another officer testified as to an alleged dying declaration by Mrs. Bush, but his testimony was ultimately ruled inadmissible. Another officer testified to a second alleged dying declaration and this testimony was likewise ruled inadmissible. This officer also testified that Mrs. Bush accused the defendant of shooting her and the other men and that the defendant remained silent.
The defendant testified that he had been separated from his wife for about 3 months prior to the shooting and had been living in Ohio. In January his wife called him and told him that she was sorry for what she had done and asked the *371 defendant to come and take her home. The defendant testified that on January 11 Johnson told the defendant that he wanted to buy a gun and he went with Johnson to Newport, Kentucky, where Johnson bought a gun. The defendant testified that he did not purchase any shells and that Johnson kept the gun. The defendant told Johnson that he was going to Chicago to pick up his wife and offered to pay Johnson's fare to Chicago and back if he would go along and help with the children. When they arrived in Chicago they went to the defendant's mother's house where they stayed for several days. On the 15th the two men went to the apartment where Mrs. Bush was living. Johnson stayed outside and the defendant went upstairs and knocked on the door of the apartment. Mrs. Bush admitted him to the apartment and then sat down on Ostler's lap and Ostler kissed her. The defendant started to leave the apartment and someone hit him in the back of the neck. The defendant testified that he did not have a gun in his possession when he went to the apartment. According to the defendant he remembered nothing which had occurred from the time he was hit on the back of the neck until he woke up in the county jail. On cross-examination he was asked whether he remembered making any statement to the police and he testified that he did not remember making any statements. He was asked about the receipt which was found in his possession and he testified that Johnson had given him the receipt at the time the gun was purchased and that he had placed the receipt in his wallet.
In rebuttal, officer Orville Anderson testified that the defendant had told him that he saw Johnson draw a gun in the apartment and that the defendant wrestled with Johnson. The defendant told the officer that the gun was discharged when he and Johnson were struggling. Another officer also testified that the defendant had made a statement blaming Johnson for the shooting.
The defendant contends that Johnson's testimony is unworthy *372 of belief because of his self-interest in implicating the defendant in order to escape prosecution. It was brought out at the trial that Johnson had been indicted in connection with the shootings and that the charges had been dropped. The alleged self-interest of Johnson was therefore brought to the attention of the trial judge, who determined that Johnson's testimony was more worthy of belief than that of the defendant. The defendant also argues that no adverse inference should be drawn from the fact that the defendant remained silent in the face of his wife's accusation and argues that there is no evidence in the record that the defendant heard the statement. Direct proof that a defendant heard an accusation is seldom possible, and determination of this fact must be made from the surrounding circumstances. Whether the accusation was heard and whether the circumstances were such that a response would normally be made, are questions for the trial judge to determine. People v. Homer, 8 Ill.2d 268, 273.
The defendant further urges that the rebuttal testimony was improper since the defendant did not deny making the statements but only testified that he did not remember making them. Where a witness is asked concerning the making of statements at variance with his testimony and states that he does not remember making such statements it is competent to prove by way of impeachment that the statements were made. (People v. Preston, 341 Ill. 407, 419.) The statements made by the defendant to the officers shortly after the crime, in which he attempted to place the blame upon Johnson, were inconsistent with his testimony at the trial that he remembered nothing after the blow on the back of his neck, and were therefore properly admitted.
The defendant also argues that the statements were inadmissible because they were obtained during a period of illegal detention. This issue is not properly before us, for no such claim was made in the trial court. However, even if the claim were available on review, it could not be sustained. *373 In the first place, the statements in question were exculpatory in nature and were not confessions. Furthermore, the claim is based upon the Federal rule set forth in McNabb v. United States, 318 U.S. 332, 87 L.ed. 819, and Mallory v. United States, 354 U.S. 449, 1 L.ed.2d 1479, which we have declined to follow. People v. Stacey, 25 Ill.2d 258.
It is also urged that the gun was improperly admitted in evidence. Johnson identified the gun as the one purchased by the defendant in Kentucky and the gun was found in the basement where the defendant was hiding. In our opinion the gun was sufficiently identified and was properly admitted in evidence. The defendant also contends that the gun was obtained as the result of an illegal search. This contention was not advanced at the trial and cannot be considered on review. We are satisfied from a review of all of the evidence that the defendant's guilt was established beyond a reasonable doubt.
In support of the defendant's alternative claim that the killings amounted to manslaughter instead of murder, the defendant argues at some length that where a husband kills an adulterous spouse and her paramour when he discovers them in a compromising situation, sufficient provocation exists to make the homicide manslaughter rather than murder. Numerous authorities from other jurisdictions are cited in support of this claim. We find it unnecessary to decide the issue raised by the defendant, for the facts do not support the argument. The evidence showed that the defendant purchased the gun four days before the shootings and that he entered the apartment with a gun in his hand. This evidence of premeditation is inconsistent with the defendant's claim that he killed his wife and the other men in the sudden heat of passion engendered by finding his wife in the apartment with the other men.
The defendant also contends that he was deprived of due process of law by reason of the fact that evidence of all *374 three killings was introduced in the defendant's separate trials for the murder of one person. In similar cases evidence of other deaths has been held admissible on a trial for murder where it appeared that the evidence of the other deaths was inseparable from the evidence in the case on trial. (People v. Weger, 25 Ill.2d 370, 382; People v. Ciucci, 8 Ill.2d 619, 625.) The defendant argues, however, that in these cases there was no proof that evidence of the other crimes influenced the jury in determining the punishment. The defendant points out that in the present case the trial judge stated that in view of the fact that the defendant had killed three people the court would follow the State's recommendation of 199 years. The judge also remarked that because of the 3 deaths the defendant was fortunate to escape the death penalty. The defendant urges that "fundamental unfairness" resulted from the fact that the sentence was influenced by evidence of the 3 deaths in each separate case. We cannot agree. Even if evidence of the other deaths had not been admitted at the trial, the court would have had the right to consider this evidence at a hearing in aggravation. (Cf. People v. Seger, 405 Ill. 222, 231.) We find no prejudicial error in the fact that evidence of all three killings was introduced in each separate trial.
Finally, the defendant contends that he was represented at his trial by incompetent appointed counsel. In support of this charge the defendant claims that his attorney should not have permitted the defendant to waive his right to trial by jury. The record shows that the defendant was sufficiently advised of his rights to a jury trial and that he knowingly waived this right. The choice was therefore the defendant's own and cannot be made the basis for a charge that his counsel was incompetent. Furthermore, even if it could be said that the election to waive a jury trial was made in reliance upon counsel's advice, there is nothing in the record to show that the defendant was in any way prejudiced by the waiver of a jury trial. The defendant also contends *375 that his attorney improperly permitted the second and third indictments to be tried by stipulated evidence before the same judge who had heard the first case. A stipulation of evidence does not indicate incompetence of counsel. (People v. Hare, 25 Ill.2d 321, 324.) Nothing could have been gained by requiring each witness to testify again on the second and third indictments. The defendant argues that because the judge had already found him guilty in the first case, and the evidence in the other cases was identical, the judge was bound to find him guilty in the other two cases. While this may be true, we are of the opinion that no prejudice resulted in view of the fact that the evidence of the defendant's guilt was overwhelming. The defendant also contends that the sentences in the second and third cases were excessive because the judge had heard the evidence in the first case. The penalty imposed on the second and third charges was the same as that on the first and we cannot agree that the defendant was prejudiced by the procedure which was followed.
We are satisfied from a review of the record that the defendant received a fair trial and that his guilt was established beyond a reasonable doubt. The judgments of the criminal court of Cook County are affirmed.
Judgments affirmed.
|
N-terminal peptide of type III procollagen: a marker for the development of hepatic veno-occlusive disease after BMT and a basis for determining the timing of prophylactic heparin.
We have studied the kinetics of the N-terminal peptide of type III procollagen (NP3P) after BMT as a marker for the development of hepatic fibrosis in veno-occlusive disease (VOD). Four patients with clinically apparent VOD were retrospectively assayed and demonstrated a very high NP3P level. NP3P was also prospectively monitored at the beginning of conditioning and every week (8 patients) or every other day (14 patients) from the day of BMT (day 0) to day +28. Before conditioning the NP3P level (15.5 +/- 5.5 ng/ml) was twice normal and increased during the course of BMT in patients without VOD (21 ng/ml; range 6-35 ng/ml). In four patients who experienced VOD, the NP3P level exceeded 40 ng/ml by day 0 in two. The early rise of NP3P indicates that it is a valuable marker for the development of VOD before it becomes clinically apparent. These data suggest that VOD develops during preparation for BMT and that prophylaxis should therefore be started at this time. |
For some years now I have argued that the academic study of contemporary antisemitism has been badly compromised by the growing politicisation of the subject. Back in September 2008, in an op-ed piece for Ha’aretz, I wrote:
Practically the entire business of studying and analyzing current anti-Semitism has been hijacked and debased by people lacking any serious expertise in the subject, whose principal aim is to excoriate Jewish critics of Israel and to promote the ‘anti-Zionism = anti-Semitism’ equation.
A number of institutions, supposedly tasked with undertaking serious research on antisemitism, have contributed to this situation. One of the foremost of these is the Yale Initiative for the Interdisciplinary Study of Anti-Semitism (YIISA), established in 2006, and I had it in my sights when I wrote my op-ed.
On 7 June Yale University announced that YIISA would not continue beyond the end of this academic year. Donald Green, Director of the Institution for Social and Policy Studies where YIISA was housed, said in a statement that YIISA generated little scholarly work that earned publication in highly regarded journals, and its courses attracted few students. For all who genuinely support the principle of the objective, dispassionate study of contemporary antisemitism, the imminent demise of YIISA should come as welcome news.
Unsurprisingly, organizations that have contributed to the debasement of serious antisemitism research are not happy. The Anti-Defamation League’s National Director, Abe Foxman, said:
Especially at a time when anti-Semitism continues to be virulent and anti-Israel parties treat any effort to address issues relating to anti-Zionism and anti-Semitism as illegitimate, Yale’s decision is particularly unfortunate and dismaying . . . it leaves the impression that the anti-Jewish forces in the world achieved a significant victory.
The American Jewish Committee said it was surprised and saddened by the decision. AJC’s Executive Director, David Harris, warned: ‘If Yale now leaves the field, it will create a very regrettable void’.
Foxman and Harris were relatively measured in comparison with the report in the New York Post headed ‘Yale’s gift to antisemitism’. The writer claimed that Yale ‘almost certainly [decided on closure] because YIISA refused to ignore the most virulent, genocidal and common form of Jew-hatred today: Muslim anti-Semitism.’ She also added: ‘Some suggest that Yale feels it can act with impunity because, earlier this spring, one of YIISA’s most powerful backers died; without his money and influence, the school can rid itself of a politically inconvenient nuisance.’
YIISA’s funders are not revealed by the institution so it’s possible that closure may have something to do with the withdrawal of funds, though the story may just be a rumour set running by those who suspect an anti-Israel agenda at work. But whatever the specific reason, it was obvious from YIISA’s inception that it would promote the notion of the ‘new antisemitism’, focus heavily on criticism of Israel and prioritise the issue of Muslim antisemitism.
Among the first papers presented at YIISA seminars were those by Dr David Hirsh (2005), a sociologist at Goldsmiths, University of London and founder of Engage, a website dedicated to opposing the boycott of Israel, Professor Shalom Lappin (2007), professor of computational linguistics at Kings College, University of London, and Professor Irwin Cotler (2006), professor of law at McGill University and a former Minister of Justice and Attorney General of Canada. All three are well-known for their highly politicised approaches to current antisemitism.
Hirsh’s paper was essentially a continuation of his political battles with the anti-Zionist left over the issue of boycotting Israel, which he claimed was an expression of antisemitism. Lappin’s academic work is not in the field of antisemitism yet he was regarded by YIISA as a proper person to present a paper that linked modern anti-Israel sentiment in the UK with centuries-old English antisemitism and claimed that the political class in contemporary Britain had abandoned the Jews – and this was written at a time when, in Prime Minister Tony Blair and his government, Jews in Britain had never had a more pro-Jewish and pro-Israel national political leadership. Cotler has probably done more than anyone to popularize the notion of the ‘new antisemitism’ having been responsible for coining the phrase ‘Israel is the Jew among the nations’. His paper, effectively an exercise in sophisticated hasbara (propaganda for Israel), likened the current situation to the 1930s and developed a framework for identifying forms of criticism of Israel as antisemitic.
The director of YIISA, Dr Charles Small, an academic with little experience of antisemitism research, had clearly put down a marker that Israel was going to be the central concern of YIISA. Had that concern manifested itself in scholarly papers objectively posing fundamental questions about the relationship between anti-Zionism and antisemitism, the nature of discourse about Israel, the relationship between Israel’s policies and antisemitism worldwide and so on, YIISA might have had an academic raison d’être. But inviting as speakers in the first few years people whose so-called ‘research’ was undertaken essentially to provide backing for preconceptions arrived at for political reasons, signalled that YIISA was to be a major centre for the further corruption of academic antisemitism studies. Not all who have given seminar papers or lectures at YIISA have been quite as blatantly partisan as my three first examples, though one or two have been worse. (A list of some of those exemplifying YIISA’s approach can be found at the foot of this post.*)
YIISA’s approach was fully exposed when it announced its first major conference, ‘Global Antisemitism: A Crisis of Modernity’, to take place in August 2010. A huge, 3-day jamboree, with 4 breakout sessions twice-a-day and 3 or 4 keynote lectures/plenary events each day, the conference was attended by many genuine scholars of antisemitism presenting bona fide academic papers, but a full panoply of participants attesting to the ‘new antisemitism’ agenda of YIISA was present. In May Small had already confirmed that ‘The largest number of papers, and therefore reflecting the greatest concern, address contemporary antisemitism and the demonization of Israel and those associated or made to be associated with Israel.’ There was a whole session devoted to the bogus concept of Jewish self-hatred, a keynote lecture by Itamar Marcus, a leader of the settler movement on the West Bank, titled ‘The central role of Palestinian antisemitism in creating the Palestinian identity’ and the conference opened with a speech by the Director for Combating Antisemitism at Israel’s Ministry of Foreign Affairs. The demonization of left-liberal Jewish critics of Israel and of Palestinians, the promotion of a Zionist-centric approach to antisemitism, the distortion and exaggeration of Arab and Palestinian sympathy for antisemitism, the presence of presenters from NGO Monitor, Palestinian Media Watch and MEMRI – all of these elements of the ‘culture’ of the programme fundamentally undermined YIISA’s claim to academic respectability.
It’s obvious from the size of the conference and the scale of YIISA’s activity that the organization was very well funded. And as is the case with much of academia, scholars as well as self-styled experts and researchers follow the money. Who would doubt the credentials and orientation of a research outfit based at such a prestigious university as Yale? The extensive advisory and management structure, packed with well-known names, testifies to the pulling power YIISA had. But of course, the composition of these bodies largely reflected the Israel-focused orientation of the initiative.
Some academics who attended the 2010 conference or who accepted invitations to present papers within the framework of YIISA’s seminar series knew perfectly well what the place was about and deplored what it stood for. But a few I spoke to felt that they could not ignore the Yale centre, that it would not be good for their careers if they declined the organization’s invitations. Their view was that they could avoid compromising themselves by sticking closely to their research topics and not getting hijacked into inadvertently endorsing YIISA’s politics. I don’t doubt that this is what they did. They guarded their personal integrity. But they could not avoid their names being used as another brick in the wall of publicity being constructed by the operation.
Thee is no doubt that the closure of YIISA, which it seems will take effect within a month or two, will leave a large hole in the international network of institutes, think-tanks, agencies and committees that have so successfully propagated the notion of the ‘new antisemitism’, helping to redefine antisemitism in such a way that, as I put it in my September 2008 Ha’aretz op-ed:
to warrant the charge of anti-Semitism, it is sufficient to hold any view ranging from criticism of the policies of the current Israeli government, to denial of Israel’s right to exist – without having to subscribe to any of the elements which historians have traditionally regarded as constituting an anti-Semitic view. And it puts out of bounds the perfectly legitimate discussion of whether increased anti-Semitism is a result of Israel’s actions.
YIISA’s cheerleaders in the commentariat are certainly unhappy. Ben Cohen, who set up and ran the Z-Word Blog for the AJC – a site, now defunct, devoted to ferreting out anti-Zionism and purportedly exposing the antisemitic tendencies of anti-Zionists, especially Jewish ones – questions the motives of the Yale officials responsible for taking the decision to cut YIISA adrift, implying that they don’t understand what antisemitism is all about and that they have handed a victory to Arab extremists and virulent anti-Zionists. He admits that YIISA’s approach was not ‘value-free’, but expresses bewilderment as to why it was singled out when ‘Any dispassionate survey of the social sciences reveals that there is precious little “value-free” research going on anywhere.’ This is an astonishing statement. Even if it were true, it doesn’t make YIISA’s politically compromised approach acceptable – two wrongs don’t make a right.
In ‘Yale, Jews and double-standards’, the Jerusalem Post columnist Caroline Glick is convinced that the Yale decision was political and she sniffs a conspiracy. Dependent on Arab money, Yale gave into Arab pressure she argues. While she rightly says that ‘discourse on anti- Semitism has been corrupted by politics’, she is blind to the fact that it’s institutions like YIISA that have been responsible for the corruption of the subject. She would have us believe that it’s anti-Jewish prejudice that’s at the root of the problem, ‘ part of the anti-Jewish turn that so many universities are taking’. And she makes no attempt to justify YIISA’s existence on the grounds that it’s undertaking objective research. On the contrary, she admits that YIISA was part of the fightback against anti-Israel and anti-Zionist pressure in academia and in student life on campuses. Therefore the Yale authorities’ decision was ‘unfair’. Echoing Ben Cohen, she says that objective academic assessment of YIISA is impossible because the academic and intellectual worlds are biased against the open discussion of Palestinian and Muslim antisemitism. Perhaps she hasn’t read YIISA’s mission statement, which stresses academic objectivity. Sold to Yale as a bona fide academic institution, it hardly then seems reasonable to blame Yale for judging it on that basis. And neither Glick nor Cohen dispute the fact that its academic output was not up to scratch.
The wider issue raised by YIISA’s imminent closure is whether it’s a watershed moment representing a rolling back of the politicisation of academic antisemitism research. I doubt very much whether the UK Universities and College Union’s decision to distance itself from the EUMC ‘working definition’ of antisemitism can be linked to it, although the vote brought to public attention that the EUMC’s successor body, the Fundamental Rights Agency, has in effect dropped the definition – a potentially damaging blow to the lifespan of the ‘working definition’. But the demise of the Z-word blog is perhaps a sign of the times since the AJC is not an organization that would normally give up on such an enterprise after such a relatively short period. It likes to be seen to be engaged in political work for the long term. (Z-word claims it still exists as part of The Propagandist website, a ‘magazine . . . for political junkies, thinking conservatives and the anti-fascist left’, but it’s just one stream of comment on the site.)
More significant, although it’s not in the US, is the example set by the establishment of the Pears Institute for the Study of Antisemitism at Birkbeck, University of London. Its Director, Professor David Feldman, an eminent expert on Jewish history, is taking a rigorously objective academic approach to his task, while not in any way ignoring the complex interconnections between contemporary antisemitism, Israel, Islam, Islamophobia, racism in general and policy questions. Feldman has won plaudits across the academic world for his stance, which gives the lie to the arguments of Cohen and Glick that antisemitism cannot be studied dispassionately and value-free. And while the Pears Institute is not in the US, the international nature of the field of contemporary antisemitism research means that what Feldman does could have a very significant impact beyond the shores of the UK. With YIISA out of the picture and Pears at Birkbeck looking very secure, some sanity may now return to the discipline.
I say ‘may’ because the combined forces of those institutions and groups which have a vested interest in maintaining the ‘new antisemitism’-based politicised approach to the subject are very strong. YIISA was important, but the ship sails on with the Israeli government and the entire political right-wing in Israel blowing a powerful wind into its sails. And it’s not impossible that American Jewish funders will try to persuade Yale to change its mind, or get the money together to transfer YIISA to another institution, or set it up as in independent body.
I am by no means alone in having smelled a rat when YIISA came on the scene. I already quoted from Mondoweiss. The Magnes Zionist blog also knew the score. In a post on 9 June Jerry Haber cuts to the quick:
The moral of this story? Take an important phenomenon which is worthy of study and have it hijacked by people with an ideological agenda, who organize conferences that revel in Islamaphobia and rightwing Zionism, mixing mediocre academics and non-academics with serious scholars, all of whom have axes to grind – in short, trivialize anti-Semitism in order to silence critics of Israel – and sooner or later, God willing, real academics will write it off as an embarrassment.
16 Responses to Antisemitism Research Just Improved: Yale’s ‘Initiative’ for Studying Antisemitism is Axed
Anthony, thanks for this excellent and comprehensive account of the tactics of pro-Zionist academia. Their attempts to stamp out valid criticism of Israel has become so overblown, and attempt its confaltion with Anti-Semitism is backfiring, andt already seems to be imploding with the cancellation of this odious Yale initiative.
The answer to the nasty, well-funded hasbara apparatus is to continue with quiet determination and presentation of the facts. Israel’s tactics and brazen misdemeanors are her own downfall, and the message
of her criminality is now even easier to perceive. Even avowed Israel supporters like David Cameron and William Hague can’t help but take a stand on critical issues like the JNF and settlements -for which they receive furious odium from the Melanie camp, who expect total loyalty to Israel, whatever it does.
So you would, then, presumably question the capacity of Noam Chomsky (a linguist), Edward Said (a literary scholar), and Jacqueline Rose (a literary academic), inter alia, to write cogently and in a rigorous scholarly mode on historical and political issues.
The case of your YIISA paper and these examples are not the same. Said and Rose may well write about historical and political issues, but they do so largely by drawing inspiration and insight from the fields in which they are experts. But I have had occasion to conclude that when they slip too far into the mode of writing history, they sometimes trip themselves up because they don’t have sufficient historical expertise.
As for Chomsky, first–and this would apply equally to Said and Rose–writing about current political issues is largely a matter of expressing an opinion and then backing it up–usually but not always–with evidence. Something which anyone may do and legitimately feel qualified to do, on the level at which they choose to do it. Second, I haven’t read much Chomsky and I’m not a great fan of what I have read. But I do recall feeling that his grasp of historical processes and ways of thinking was sometimes weak.
An appropriate parallel with professor-of-computational-linguistics-Lappin delivering a paper on antisemitism in Britain at a dedicated, academic, antisemitism research centre is trained-as-historian-with-20+-years-expertise-in-contemporary-antisemitism-Lerman delivering a paper on some aspect of computational linguistics at a dedicated, academic, computational linguistics research centre.
Not acceptable is it? Or are you saying historical research and analysis combined with the study of manifestations of contemporary antisemitism is something that anyone can do?
Let us pass over the question of your scholarly or academic credentials, such as they are. This is not actually the issue here. In proper scientific and scholarly discourse one addresses the arguments presented rather than the background or identity of the person proposing these arguments. Instead, you have chosen to make your criticisms ad hominem. You have also seriously misrepresented the views that I expressed in my paper. I did not claim that Britain’s current “political class” or previous government was anti-Jewish or anti-Israel. I offered an extended historical study of anti-semitism in public life in Britain, and I suggested that certain tropes and themes that had entered contemporary mainstream British political discourse could be understood as at least partly conditioned by this tradition. Israel was actually not a major issue in the paper, except to the extent that anti-Zionism can, and occasionally does serve as a vehicle for the expression of hostility to Jews as a people (a widely acknowledged fact among scholar of anti-Semitism spanning a wide variety of political views on Israel, but a fact to which you are strangely obtuse). You also indulge in smear by association in suggesting that I am involved in advocacy of right wing Israeli government policies. You are well aware of the fact that this is grossly untrue, and that I have expressed strong public opposition to Israeli government policies and actions over many years, and in numerous published forums. It is entirely legitimate to disagree on important political issues and to express one’s disagreement forcefully. It is not legitemate to deliberately distort one’s adversary’s views and to engage in character assassination. Such conduct would not be permitted in a serious scholarly debate. Despite your pretension to expertise in scholarship in at least one area, you seem strangely unfamiliar with the normal conventions of scholarly debate. Packaging poorly argued propaganda and acrimonious personal attacks as reasoned criticism is a particularly distasteful piece of self-indulgence.
Firstly, your comments about Z Word are ridiculous. Why didn’t you just send a bloody email to ask me, or anyone associated with Z Word, why it joined The Propagandist? The reason is pretty simple: I no longer work for AJC and I wanted Z Word to be part of a bigger site with more traffic. Simple as that. But no, you’d rather engage in some frankly silly speculation about AJC giving up on the struggle against anti-Zionism.
Secondly, you clumsily distort what I said about “value-free” research. My point is that much social science research incorporates a value system – in YIISA’s case, it is the recognition that antisemitism is a social problem. Examining its causes, its consequences and its influences necessitates analysis of its mutations, including anti-Zionism. Even if you do not accept (as I do) that anti-Zionism is a form of antisemitism, you’re not seriously going to argue that anti-Zionism is never antisemitism?
Thirdly, neither Caroline Glick nor I conceded that YIISA’s output was academically “not up to scratch.” Again, this is your feverish imagination working overtime. I specifically said that YIISA published some excellent papers and ran an exciting seminar series! Might I suggest that one factor behind your display of schadenfreude is your absence from the speaker list?
Wonderful piece this. I especially like the title but the content looks very thorough.
It’s a good question whether the UCU’s ditching of the EUMC bogus definition and the axing of YIISA represent a trend but I certainly hope they do.
I’m not so sure whether the demise of the Z-word blog is particularly relevant to the issue though. Ben Cohen no longer works for the AJC but presumably the blog was approved by others at the AJC who don’t seem in a hurry to replace it. But is it relevant to the infiltration of academic research on antisemitism by Israel advocates?
First, on Z-word. I stand corrected. If you tell me it was your choice to move it from AJC, I of course accept your explanation. But you put words into my mouth: I never said that AJC was ‘giving up on the struggle against anti-Zionism’. When I speculated that ‘it was perhaps a sign of the times’, I was referring to ‘the rolling back of the politicisation of antisemitism research’, and the possibility that AJC itself might now be seeing the politicisation as unhelpful. And since I worked closely with AJC back in the 1990s over a 5-year period, and have followed its doings ever since, I reserve the right to speculate on the motives for its actions.
Second, on ‘value-free research’, I don’t distort what you mean at all. I quote directly from what you say. But what you do in your gloss on the issue (in your response) is, in my view, completely misunderstand where a ‘value system’ comes in to the question of research on antisemitism. It’s there at the outset, in any bona fide scholar, in the form of a fundamental rejection of what antisemitism stands for. I would not trust a scholar who started out from the assumption that ‘I’m approaching this subject from a neutral standpoint, not making any judgement about whether antisemitism is right or wrong’. But the good scholar says: ‘I’ve made my views clear: now, however, I can proceed to research and analyse in as dispassionate a manner as possible.’ The value-system doesn’t come in the form of seeing antisemitism as a ‘social problem’: practically all social science involves investigating ‘problems’. You can frame something as a problem without making a value judgement about it.
And of course its mutations and forms and manifold expressions have to be examined, including where antisemitism takes the form of anti-Zionism. That you can even ask me the question as to whether I would ever ‘argue that anti-Zionism is never antisemitism’ shows you can’t have read anything I’ve written about the subject.
Third, your paragraph that begins ‘This is an unfair comparison’ gives the distinct impression that you concede that the academic quality of YIISA work was not of a high quality but that there is an excuse for it. Namely, that the subject is not approved of in political science departments, that it goes against the grain—a kind of Cinderella subject—and therefore it’s understandable that YIISA was not yet producing work of the quality of a subject you believe is more universally acceptable like agrarian studies.
In order to produce this explanation you make various assumptions, about ‘howls of disapproval’ for example, that I find very questionable.
But then you provide as your first example of ‘did produce some’—again, a comment that sounds like you’re really saying ‘did produce some, but not very much’—the Hirsh paper, which I briefly criticise in my post. If that paper had been submitted to me by an undergraduate, I would have given it back with the following instructions: ‘Start again, curb your verbosity, cut out the value-laden attacks on people for whom you clearly have an animus, work out precisely what questions you want to ask and proceed on the basis of a clearly worked-out structure. And no more than 30 pages maximum. There are some good ideas here, but they’re just not thought through.’ I haven’t read the other examples you give, but I have read the Lappin and Cotler papers and I could give you equally strong reasons why they are academically weak. As for Glick, while it’s true that she talks about ‘cutting edge research’ and ‘800 pages of scholarly research material’, frankly this sounds like she’s reading from YIISA press releases and her actual examples are highly problematic. And then she produces the same dubious argument that you use: that the criteria for judgement are ok for any other subject but the one YIISA was studying.
Finally, you demean yourself by resorting to snide speculation about my reasons for being critical of YIISA. In all frankness, had I been invited to give a paper at a YIISA seminar, I would have accepted, even knowing that the orientation of YIISA was fundamentally at odds with some of my ways of approaching the subject and some of my conclusions. I have always been ready to engage with people who disagree with me. Sadly, I can’t say that the other way round. But since I saw from very early on that YIISA was contributing to the damaging politicisation of antisemitism research, I knew that I would not be invited to speak, and I was quite content with that.
I’ve been wondering whether to post a reply to Shalom Lappin’s diatribe. On the one hand, why bother to take seriously the writing of someone who has revealed himself to be a fantasist. On the other, by leaving it standing on my blog without response I may inadvertently give anyone who happens upon this exchange the idea that I have conceded by default. So, for the record:
Checking the veracity of his accusations against me is a simple matter:
1. I criticised the arguments in his paper and whether he had sufficient expertise to write it. I did not attack ‘the person’ but appealed to reason.
2. In my critique of his paper, I never said that he claimed that ‘Britain’s current “political class” or previous government was anti-Jewish or anti-Israel.’
3. Israel was definitely a ‘major issue’ in the paper. It seems most odd to deny this fact. At least be ready to stand by your own argument.
4. He seems never to have read anything I’ve written about the relationship between anti-Zionism and antisemitism. I have always acknowledged that ‘anti-Zionism can, and occasionally does serve as a vehicle for the expression of hostility to Jews as a people’ (see my Ha’aretz op-ed of 12 September 2008 for example).
5. It’s nonsense to say that I ‘indulge in smear by association in suggesting that’ he is ‘involved in advocacy of right-wing Israeli government policies’. If he means by this that I’m suggesting that simply speaking at a seminar or conference at YIISA an individual is involved in such activity, I would be smearing some close friends of mine who went to YIISA. As I responded to Ben Cohen above, I would have spoken at YIISA myself had I been invited and would therefore have been smearing myself. Absurd.
6. I did not distort his views (he gives no evidence) or engage in character assassination.
7. If he wishes to question my credentials as an expert on antisemitism, I have no problem with that, but using words about me like ‘poorly argued propaganda’, ‘acrimonious personal attacks’, and ‘particularly distasteful piece of self-indulgence’ is surely a transgression of ‘the normal conventions of scholarly debate’, of which he so falsely accuses me.
Thank you for an excellent background account of developments surrounding YIISA.
As regards the UCU’s motion to dissociate itself from the EUMC ‘working definition’, it may be of interest to point out that just one day after that vote an article appeared, written by myself and Sue Blackwell, in which this definition figures rather prominently. The article is NOT an instance of anti-semitism research, but an academic linguistic study of the development over time of the words ‘anti-semitic’ and ‘anti-semitism’ in dictionary definitions and in public discourse as they appear in large collections of texts (‘corpora’) and the World-Wide Web. You can find the article here:
The fact that this appeared just one day after th UCU debate was entirely serendipitous (but nice, all the same!): in fact we wrote the article more than two years ago and presented it at a corpus linguistics conference in Lancaster (UK). That it took so long to appear is entirely due to the peer review process that followed, and the editors doing a rather thorough job preparing the papers that came out of the conference for publication.
Here’s part of our Abstract:
“Some words are loaded with connotative associations that make them highly sensitive elements in public discourse, especially political and legal discourse. This is certainly the case with the words ‘anti-semitic’ and ‘anti-semitism’.
While ‘Semites’ and ‘semitic’ were originally used to refer to a broad ethnic category that included both Arabs and Jews, their derivatives ‘anti-semitic’ and ‘anti-semitism’ came to be applied, from first use, almost exclusively to people of Jewish ethnicity or religion, meaning roughly ‘hatred of / hostility towards Jews’. In some quarters over the past few decades there has been a further semantic shift, involving an extension of the meaning of anti-semitism to include criticism of, or hostility towards, the state of Israel. This paper traces these semantic shifts both in evolving dictionary definitions and in public discourse as evidenced in the Bank of English and the World-Wide Web.”
Antony, you are exactly right: the antisemitism research environment has greatly improved. As someone who teaches the history of antisemitism in the West, I deplore the way in which the “new antisemitism” requires me to spend the first two or three weeks of my course deconstructing it before I can get on with the real stuff. So thanks for this.
I have a question you might be able to help with. If you’re teaching the history of antisemitism somewhere in N. America, is it the case, as defenders of YIISA allege, that there is a negative attitude to research and teaching contemporary antisemitism in N. American university political science departments? It sounds rather far-fetched to me, especially since a strong pro-Israel atmosphere still prevails. Also, if you look at the UK, antisemitism is supposed to be much more prevalent than in N. America, and yet I’m pretty certain that good teaching and research on contemporary antisemitism would have no difficulty finding a university home, as long as there was outside funding attached to the proposal. Any thoughts?
The answer is very simple. Instead of antisemitism being a phenomenon which has persisted and mutated for about 2000 years, it is actually better understood as a response to the actions of Jews – i. e. :
” One is the state of Israel, its ideology of racial supremacy and its subsequent crimes committed against the Palestinians.”
and also
“The widespread bias and subservience to the Israeli cause in the Western media”
Anthony, as someone who attended the conference and who has written quite a bit about this issue, I think this post does get things just about right. The problem is that this area in the study of antisemitism has become a minefield. And I am not wholly sure that your views are above the fray. This debate about the so-called “new antisemitism” has degenerated into a dialogue of the deaf that proceeds as a fight to to the death on both sides. For my views, see: https://umdrive.memphis.edu/jjudaken/public/publications/PoP%20New%20Antisemitism.pdf?uniq=-5aa3.
On the whole, I agree that YIISA was more of an advocacy group and less of an academic institute than it purported to be. But part of the “objectivity” that you call for is about getting the facts right. Since you were not at the conference yourself, you don’t know (or don’t directly indicate) that there was a minority voice at the conference where a group that included David Feldman, David Hirsh, Robert Fine, Lars Rensmann, Sebastian Voight, and Lara Trubowitz among others were wrestling with these issues at the margins of the conference and so it was not without its critics even there. Moreover, Hirsh’s views in particular are not as unbalanced as you depict them here. And a number of the people you suggest YIISA’s views were not at the conference: no Michael Oren, no Dershowitz, no Wistrich, no Kuntzel, among others. This is a pregnant list of names. Their views were patently in evidence, but they were not. So if this was just intended as a list of the “new antisemitism” theorist, then fair enough–they are its outstanding spokesmen.
In should be added that in addition to David Feldman’s efforts, Scott Ury, who has recently replaced Dina Porat as Head of the Stephen Roth Center for the Study of Antisemitism and Racism is equally committed to the same academic discussion of the subject. Perhaps the times they are a changin’.
But I remain skeptical. I believe it is going to worse before it gets better because as the blog indicates, “Context is everything.” And the context is on quicksand and the next couple of years in the Arab-Israeli conflict are going to be difficult and may be some of the most tragic yet. More than anything it is this context and comparative and historically sensitive frameworks that is missing from both sides in this rhetorical warfare.
The caveats aside then, I do think the post captures both the problems with the current discussion of contemporary antisemitism and with YIISA.
Jonathan: For some inexplicable reason WordPress treated your comment as spam so it was not automatically posted at the time you wrote it. I only just noticed this a few minutes ago and ‘unspammed’ it and posted it.
So this is a belated thank you for your comments, which are very interesting and helpful. Perhaps I should first clear up points where you feel that I have not been in possession of the facts. Yes, I was not at the conference (not exactly my fault) so I knew nothing about the group you describe which, at the margin of the conference, was wrestling with the issues I raised. I am indeed pleased to hear that this occurred and in a sense I’m not surprised since I knew from the provisional participants list that YIISA put on its website before the conference took place that people like yourself and David Feldman, who I know are strong advocates of the kind of non-partisan, scholarly approach to the study of contemporary antisemitism that I have always argued for, would be attending. I could not imagine that you, David etc. would have remained unconcerned about some of the sessions, papers, speakers and so on.
But as for the list of names I included as a * footnote, I never said that these were participants in the conference. I took these names from the section of YIISA’s website that lists all the people who presented papers in the YIISA seminar series or gave lectures in the course of YIISA’s yearly programme. As you say, they are very much representative of people who propagate the ‘new antisemitism’ notion and YIISA hosted them.
As for your comment that you’re ‘not so sure that my views are above the fray’, that seems to me rather a polite way of putting it. I don’t think my views are above the fray. I think very few people’s views on this are above the fray, even if they would like to think they are. Don’t forget, I have engaged in work in this area largely from the perspective of running a policy think tank that has a mandate to carry out research in a political context that it wishes to influence, not from an academic position at a university. And from quite early on–the mid-1990s–I have been making the point about doing our best to leave ideology and political views to one side for the greater good of getting objective work done on current antisemitism. As I saw the situation getting even worse after 2001, I made even more of a point of speaking out, as much as I was able to, on this problem. But even as I have been speaking out, I have tried, in any work I have done on current antisemitism, to practice what I preached and research and write as objectively as possible. If I have been more strident in remarks I’ve made about the ‘minefield’ problem than has been deemed reasonable, all I can say is that I have had to endure bucketsfull of ordure from people demonising me and my views over the last 6 to 8 years–people who constantly misrepresent what I’ve said and written and have insulted me and even my family–and therefore in relation to all of that, I frankly think I’ve been incredibly restrained and will remain so.
On the crucial question of the future, I’m afraid I tend to agree with your assessment. It’s good that you reminded me of the replacement of Dina Porat at the Stephen Roth Institute–when I heard about it at the time and was told good things about her replacement, I also wondered whether this was a turning of the tide. Unfortunately, there have been too many developments since, particularly emanating from Israel–from certain institutes and think tanks and from the policy orientation towards the exploitation and manipulation of antisemitism of the present government–that make it clear to me that the ‘advocacy’ tendency (to put it rather politely) in the study of current antisemitism has a lot of life left in it.
I was greatly encouraged to see that Deborah Lipstadt accepted the reasons Yale gave for closing YIISA. That gave me hope. But reading the comments on her Forward article made my heart sink. If they say such things to her of all people, what hope is there for anyone who wants to talk sense in this debate. And yet, I’m also hugely impressed by the way things are shaping up at the Pears Institute under David Feldman. Perhaps this is the place where a very strong strain of the kind of research and discussion on contemporary antisemitism–embracing your ‘context and comparative and historically sensitive frameworks’ point–that is so sorely needed can be developed and can have an international influence. We shall see. |
Candy Cane Lane, Duboistown
Candy Cane Lane is the name given to the 200 block of Summer Street in Duboistown in the U.S. state of Pennsylvania when it is decorated for Christmas from Thanksgiving to The Epiphany each year. In 2007 Candy Cane Lane celebrated its fiftieth anniversary and was honored with a parade and a proclamation by the mayor of the borough proclaiming the month of "December as Candy Cane Lane month forever more in DuBoistown".
Location
Duboistown is a borough in Lycoming County, Pennsylvania, which is about northwest of Philadelphia and east-northeast of Pittsburgh. Duboistown is between the West Branch Susquehanna River to the north and Bald Eagle Mountain to the south. The city of Williamsport lies to the north of Duboistown across the river, the borough of South Williamsport is east, and Armstrong Township is to the west and south.
Summer Street runs north–south in Duboistown, with Winter Street to the west and Spring Street to the east. Summer Street is only two blocks long and the 200 block, between Euclid Avenue (which is also Pennsylvania Route 654) to the north and Highland Avenue to the south. The 200 block of Summer Street is the part of the street known as Candy Cane Lane.
Fiftieth anniversary
Candy Cane Lane was first decorated for Christmas in 1957. On December 9, 2007, the borough of Duboistown celebrated the fiftieth anniversary of Candy Cane Lane with a parade and proclamation. The parade featured thirty units, including floats, fire and police vehicles, marching bands, local politicians and celebrities, and people dressed as elves, Dugout (the Little League Baseball mascot), Frosty the Snowman, Santa and Mrs. Claus. A celebration followed in the Duboistown Fire Hall.
The 200 block of Summer Street has only thirteen houses on it: five on the west side and eight on the east. All of these house are heavily decorated for the holidays with lights and figures. The proclamation for the fiftieth anniversary of Candy Cane Lane specifically recognized six residents of Summer Street who have lived there the entire fifty years. Borough mayor Lou Plankenhorn’s proclamation officially declared the month of "December as Candy Cane Lane month forever more in DuBoistown".
Candy Cane Lane is a popular destination for sightseers between Thanksgiving and Epiphany. On Christmas Eve traffic backs up on Euclid Avenue as people wait to drive up the street. A visit to Candy Cane Lane is an important Christmas tradition for many area families. Even after Christmas, Summer Street is often referred to as "Candy Cane Lane" locally.
References
External links
https://web.archive.org/web/20131217225832/http://www.mountainhomemag.com/2013/12/the-miracle-on-candy-cane-lane/
See also
Category:Streets in Pennsylvania
Category:Geography of Lycoming County, Pennsylvania
Category:Christmas in the United States
Category:Tourist attractions in Lycoming County, Pennsylvania |
The hypothesis will be tested that the catalytic power of enzymes originates in biologically co-evolved interactions between enzyme-derived and substrate-derived structures specific to the catalytic transition state interactions which are either absent or weakened in reactant and intermediate states. These actions should be strongest with the "evolutionarily anticipated" enzyme/substrate combinations and disabled to some extent with "unnatural" substrates or mutant enzymes. Enzymes from three classes will be studied: serine proteases, pyruvate decarboxylase and lactate dehydrogenases. Proton inventories with substrates of increasing peptide chain length will be determined to test for multiproton catalysis by the Asp-i02-Asn mutant of trypsin, which will reveal whether the multiproton catalysis is or is not produced by the charge-relay system. Depending on the results, other mutant trypsins may also be studied. The temperature dependence of the solvent isotope effect for chymotrypsin, trypsin, elastase and subtilisin will be measured to deduce the degree to which "physical" steps and "chemical" steps determine the rate, and to probe for the importance of quantum tunneling in enzymic acid-base catalysis. With pyruvate decarboxylase, trapping of the carbanion intermediate will be used to determine intrinsic isotope effects for the decarboxylation step and an accurate free energy diagram will be constructed. The interaction with the enzyme of the substrate-like inhibitors HCOCOOH and CO(COOH)2 will be studied kinetically and by solvent isotope effects. Lactate dehydrogenases from psychrophilic, mesophilic and thermophilic bacteria will be studied by primary and secondary isotope-effect methods to determine how the amino-acid sequence changes arising from thermal adaptation are reflected in transitionstate structure and in the relative rats of individual steps. Solvent isotope effects will probe the importance of electrophilic catalysis of hydride transfer and substrate isotope effects the role of tunneling. A mutant of the thermophilic enzyme will also be examined. The results of these studies should eventually be useful in designing effectors to inhibit or activate enzymes. |
St John the Baptist Cathedral, Norwich
The Cathedral Church of St John the Baptist is the Roman Catholic cathedral of the city of Norwich, Norfolk, England.
History
The cathedral, located on Unthank Road, was constructed between 1882 and 1910 to designs by George Gilbert Scott, Jr. as a parish church dedicated to John the Baptist, on the site of the Norwich City Gaol. The funds for its construction were provided by Henry Fitzalan-Howard, 15th Duke of Norfolk. He funded it as a generous gift to the Catholics of Norwich as a sign of thanksgiving for his first marriage to Lady Flora Abney-Hastings.
In 1976, it was consecrated as the cathedral church for the newly erected Diocese of East Anglia and the seat of the Bishop of East Anglia. In 2014, for the first time since 1558, a Pontifical High Mass was celebrated in this episcopal see's cathedral.
It is the second largest Roman Catholic cathedral in England, the largest being Westminster Cathedral. It is one of two cathedrals in the city of Norwich, the other being the Church of England Cathedral Church of the Holy and Undivided Trinity, begun in the Norman style in 1096.
Resources
Just off the south aisle of the cathedral is the Duckett Library. It was named after Canon Richard Duckett who was rector of the church from 1876 to 1910. It was opened on 22 February 2012. People need to become a member of the library to join, and that membership is available to all the cathedral's congregation. It has 3,000 religious publications and is staffed by volunteers.
Also, within the cathedral ground is the Narthex. It opened in March 2010 and is the cathedral's visitor centre. It comprises an Education and Interpretation Gallery, a shop, a refectory with outdoor patio, a function hall, licensed bar and community garden.
Parish
The cathedral's parish also covers Holy Apostles Church, West Earlham, in a suburb of Norwich and it also offers a Sunday evening Mass at St Mark's, the Church of England parish church of Lakenham.
Interior
References
External links
St John the Baptist Cathedral homepage
History, description and images (Simon Knott, norfolkchurches.co.uk, accessed 29 October 2012)
Image of the cathedral (accessed 24 September 2007)
Floor plan of the cathedral (accessed 23 August 2017)
Narthex opens March, 2010
Roman Catholic Cathedral of St John the Baptist, Norwich (British Listed Buildings)
Interior view at Google Maps
Category:Churches in Norwich
Norwich
Category:Roman Catholic churches in Norfolk
Category:Roman Catholic Diocese of East Anglia
Category:Grade I listed cathedrals
Norwich
Category:Roman Catholic churches completed in 1910
Category:20th-century Roman Catholic church buildings in the United Kingdom |
President Trump Donald John TrumpBubba Wallace to be driver of Michael Jordan, Denny Hamlin NASCAR team Graham: GOP will confirm Trump's Supreme Court nominee before the election Southwest Airlines, unions call for six-month extension of government aid MORE's chief economic adviser, Larry Kudlow, is pushing back on reports of tension between Trump and John Kelly John Francis KellyMORE, saying on Sunday that the president has only positive things to say about the White House chief of staff.
"I've been on the job five days. John Kelly has been great to me. He is in charge. He is operating on a much-improved process. Every time the president and I talk and that subject comes up, the president has nothing but good things to say about Gen. Kelly," Kudlow told CNN's Jake Tapper on "State of the Union."
ADVERTISEMENT
"I don't personally think this is a real story," he continued.
"Trump tweeted on it and doesn't seem like he is pushing Kelly out. Kelly has been great to me," he said.
Reports emerged Saturday that Kelly "blew up" at the president and threatened to step down from his White House post last month. However, a senior administration official told Axios that Kelly was “venting frustration,” and referring to his comments as a threat was “probably too strong.”
Sources told The Hill in a report last week that Kelly's influence in the White House has faded in recent months.
The Wall Street Journal reported that Trump ignored Kelly’s recommendation to fire Environmental Protection Agency chief Scott Pruitt, who has been embroiled in a series of scandals related to spending.
— This report was updated at 9:43 a.m. |
Validating affinities for ion-lipid association from simulation against experiment.
Understanding biological membranes at physiological conditions requires comprehension of the interaction of lipid bilayers with sodium and potassium ions. These cations are adsorbed at palmitoyl-oleoyl-phosphatidylcholine (POPC) bilayers as indicated from previous studies. Here we compare the affinity of Na(+) and K(+) for POPC in molecular dynamics (MD) simulations with recent data from electrophoresis experiments and isothermal calorimetry (ITC) at neutral pH. NaCl and KCl were described using GROMOS or parameters matching solution activities on the basis of Kirkwood-Buff theory (KBFF), and K(+) was also described using parameters by Dang et al., all in conjunction with the Berger parameters for the lipids and the SPC water model. Apparent binding constants of GROMOS-Na(+) and KBFF-K(+) are the same within error and in good agreement with values from ITC. Although these force fields yield the same number of bound ions per number of lipids for Na(+) and K(+), they give a larger number of Na(+) ions per surface area compared to K(+), in agreement with the electrophoresis experiments, because Na(+) causes a stronger reduction in the area per lipid than K(+). The intrinsic binding constants, on the other hand, are reproduced by Dang-K(+) but overestimated by GROMOS-Na(+) and KBFF-K(+). That no ion force field reproduces the intrinsic and the apparent binding constant simultaneously arises from the fact that in MD simulations, implicitly meant to mimic neutral pH, pure PC is usually modeled with zero surface charge. In contrast, POPC at neutral conditions in experiment carries a low but significant negative surface charge and is uncharged only at acidic pH as indicated from electrophoretic mobilities. Implications for future simulation and experimental studies are discussed. |
Pressure-regulated biosynthesis of cytochrome bd in piezo- and psychrophilic deep-sea bacterium Shewanella violacea DSS12.
The genes of cytochrome bd-encoding cydAB were identified from a deep-sea bacterium Shewanella violacea DSS12. These showed significant homologies with known cydAB gene sequences from various organisms. Additionally, highly conserved regions that are important for the enzymatic function were also conserved in cydA of S. violacea. Based on the results, transcriptional analysis of cydAB operon and cydDC operon (required for assembly of cytochrome bd) of S. violacea in microaerobic condition was performed under the growth condition of various pressures. The gene of cydA was expressed even under the condition of atmospheric pressure and its expression was enhanced with pressurization. On the other hand, the expression of cydC was strongly depressed under the condition of atmospheric pressure compared with the case under high pressure. It appeared spectrophotometrically that loss of cytochrome bd in S. violacea under atmospheric pressure shown in previous study is caused mainly by the loss of cydDC. Further, under the growth condition of atmospheric pressure, either less amount or no d-type cytochrome was expressed compared with the case of high-pressure condition even if the organism was grown under alkaline condition or in the presence of uncoupler, which are the inducible condition of d-type cytochrome in Escherichia coli. These results suggested that the significant amount of d-type cytochrome expression is specific event under the growth condition of high pressure. |
---
abstract: |
Let $T$ be an arbitrary $L^2$ bounded Calderón–Zygmund operator, and $T_{\natural}$ its maximal truncated version. Then it satisfies the following bound for all $p\in(1,\infty)$ and all $w\in A_p$: $$\|T_{\natural}f\|_{L^p(w)}
\leq C_{T,p}[w]_{A_p}^{1/p}\big([w]_{A_\infty}^{1/p'}+[w^{1-p'}]_{A_\infty}^{1/p}\big)\|f\|_{L^p(w)}.$$
address:
- 'Department of Mathematics and Statistics, P.O.B. 68 (Gustaf Hällströmin katu 2b), FI-00014 University of Helsinki, Finland'
- 'School of Mathematic, Georgia Institute of Technology, Atlanta GA 30332, U.S.A.'
author:
- 'Tuomas P. Hytönen'
- 'Michael T. Lacey'
bibliography:
- 'weighted.bib'
title: 'The $A_p$–$A_\infty$ inequality for general Calderón–Zygmund operators'
---
Introduction
============
For a weight $w$ with a non-negative density a.e., denote $$\begin{split}
A_p(w,Q): &=\frac{w(Q)}{|Q|}\Big(\frac{w^{1-p'}(Q)}{|Q|}\Big)^{p-1},\qquad p\in(1,\infty),\\
A_\infty(w,Q) &:=\frac{1}{w(Q)}\int_Q M(w1_Q), \\
[w]_{A_p} &:=\sup_Q A_p(w,Q),\qquad p\in(1,\infty].
\end{split}$$
We prove the following theorem:
\[thm:ApAinfty\] Let $T$ be an arbitrary $L^2$ bounded Calderón–Zygmund operator, and $T_{\natural}$ its maximal truncated version. Then it satisfies the following bound for all $p\in(1,\infty)$ and all $w\in A_p$: $$\|T_{\natural}f\|_{L^p(w)}
\leq C_{T,p}[w]_{A_p}^{1/p}\big([w]_{A_\infty}^{1/p'}+[w^{1-p'}]_{A_\infty}^{1/p}\big)\|f\|_{L^p(w)}.$$
We refer the reader to the cited papers for a definition of an ‘$L^2$ bounded Calderón–Zygmund operator, and its maximal truncated version.’ This result improves and generalizes the following weighted inequalities previously known for arbitrary Calderón–Zygmund operators:
- The $A_p$ conjecture for untruncated operators, obtained in [@Hytonen:A2]: $$\|Tf\|_{L^p(w)}\leq C_{T,p}\big([w]_{A_p}+[w]_{A_p}^{1/(p-1)}\big)\|f\|_{L^p(w)},\qquad p\in(1,\infty).$$
- Its extension to maximal truncations, and to a preliminary form of the mixed $A_p$–$A_\infty$ bounds in [@HLMORSU]: $$\|T_{\natural}f\|_{L^p(w)}
\leq C_{T,p}\big([w]_{A_p}^{1/p}[w]_{A_\infty}^{1/p'}+[w]_{A_p}^{1/(p-1)}\big)\|f\|_{L^p(w)},\qquad p\in(1,\infty).$$
- The case $p=2$ of the Theorem for untruncated operators, from [@HytPer]: $$\|T f\|_{L^2(w)}
\leq C_{T}[w]_{A_2}^{1/2}\big([w]_{A_\infty}^{1/2}+[w^{-1}]_{A_\infty}^{1/2}\big)\|f\|_{L^2(w)}.$$
The bound of Theorem \[thm:ApAinfty\] was previously proven in [@Lacey:ApAinfty] for a restricted class of distinguished Calderón–Zygmund operators, including the Hilbert, Riesz and Beurling transforms; the Theorem as stated was also conjectured there.
The present proof consists of elaborating on the themes of the previous papers. As in [@Lacey:ApAinfty], Lerner’s local oscillation formula from [@Lerner:formula] is used to reduce the estimation of a dyadic shift operator to related positive operators of the form $$f\mapsto\sum_{Q\in\mathscr{Q}}1_Q\fint_{Q^{(i)}}f,$$ where $\mathscr{Q}$ is an appropriately sparse collection of dyadic cubes and $Q^{(i)}$ is the $i$th ancestor of $Q$. In [@Lacey:ApAinfty], these operators were further dominated by simpler positive operators previously studied in [@LSU:positive]. The novelty of the present contribution consists of studying the new operators as above directly on their own right. In fact, we observe that these operators are not so new after all; they are just special cases of dyadic shifts of complexity $i$, but with a positive kernel. So we are in a position to apply the results for general shifts from [@HLMORSU], where their weighted $L^p$ estimates were reduced to certain testing conditions. Now, these testing conditions simplify radically in the positive kernel case, and this simplification gives us the additional advantage to verify the sharper mixed bounds as stated.
The method of proof, which goes via the dual-weight formulation, provides the following two-weight generalization, where $$A_p(w,\sigma;Q):=\frac{w(Q)}{|Q|}\Big(\frac{\sigma(Q)}{|Q|}\Big)^{p-1},\qquad [w,\sigma]_{A_p}:=\sup_Q A_p(w,\sigma;Q).$$
Let $T$ be an arbitrary $L^2$ bounded Calderón–Zygmund operator, and $T_{\natural}$ its maximal truncated version. Then it satisfies the following bound for all $w,\sigma\in A_\infty$: $$\|T_{\natural}(f\sigma)\|_{L^p(w)}
\leq C_{T,p}[w,\sigma]_{A_p}^{1/p}\big([w]_{A_\infty}^{1/p'}+[\sigma]_{A_\infty}^{1/p}\big)\|f\|_{L^p(\sigma)}.$$
For the same class of distinguished operators as mentioned above, Lerner [@Lerner:ApAr] has recently established a different type of a mixed $A_p$–$A_r$ bound, using the product-type weight constant $$[w]_{A_p^{\alpha}A_r^{\beta}}:=\sup_Q A_p(w,Q)^{\alpha}A_r(w,Q)^{\beta},$$ which is smaller that $[w]_{A_p}^{\alpha}[w]_{A_r}^{\beta}$ in that only one supremum, rather than independent ones over the two factors above, is involved. He proves that $$\|T_{\natural}f\|_{L^p(w)}\leq C_{T,p,r}[w]_{A_p^{1/(p-1)}A_r^{1-1/(p-1)}}\|f\|_{L^p(w)},\qquad 2\leq p<r<\infty,$$ and shows by examples that this is incomparable with our bound. A ultimate conjecture generalizing both results would be the following: $$\|T_{\natural}f\|_{L^p(w)}\leq C_{T,p}\big([w]_{A_p^{1/p}A_\infty^{1/p'}}+[w^{1-p'}]_{A_{p'}^{1/p'}A_\infty^{1/p}}\big)\|f\|_{L^p(w)},\qquad 1<p<\infty.$$
The present proof does not seem to allow product-type weight constants as here; on the technical level, the difficulty is in a pigeonholing construction, which consists of “freezing” the local $A_p$ constant $$A_p(w,Q)=\frac{w(Q)}{|Q|}\Big(\frac{w^{1-p'}(Q)}{|Q|}\Big)^{p-1}.$$ Once we also freeze the ratio $w(Q)/|Q|$, it follows that also the ratio $w^{1-p'}(Q)/|Q|$, too, is automatically under control. This would not be the case, had we frozen the product $A_p(w,Q)^{\alpha}A_r(w,Q)^{\beta}$ instead, for then there would still be two independent measure ratios $w^{1-p'}(Q)/|Q|$ and $w^{1-r'}(Q)/|Q|$ (or $\int_Q M(w1_Q)\big/w(Q)$ if $r=\infty$) around.
Reduction to positive dyadic shifts
===================================
Let $\mathscr{D}$ be the collection of dyadic cubes in $\mathbb{R}^d$. For $Q\in\mathscr{D}$, we write $\ell(Q)=|Q|^{1/d}$ for its side-length, and $Q^{(1)}$ for its parent: the unique dyadic cube such that $\ell(Q^{(1)})=2\ell(Q)$ and $Q^{(1)}\supset Q$. The dyadic ancestors are defined inductively: $Q^{(i)}:=Q^{(i-1)}$.
The following definitions are taken from Section 2 of [@HLMORSU].
Let $Q\in\mathscr{D}$ be a dyadic cube. A *generalized Haar function* associated to $Q$ is a linear combination of the indicator functions of its dyadic children: $$h_{Q}=\sum_{\substack{Q'\in\mathscr{D}\\ (Q')^{(1)}=Q}}c_{Q^{\prime }}1_{Q^{\prime }}.$$ We say $h_{Q}$ is a *Haar function* if in addition $\int h_{Q}=0$, that is, a Haar function is orthogonal to constants on its support.
\[d.haarShift\] For integers $(m,n) \in \mathbb Z _+ ^2 $, we say that a linear operator $ \mathbb S $ is a *(generalized) Haar shift operator of complexity type $ (m,n)$* if $$\label{e.mn}
\mathbb S f (x) = \sum_{Q \in \mathcal D}\mathbb{S}_Q f(x)
= \sum_{Q \in \mathcal D}\quad\sideset {} { ^ {(m,n)}} \sum_{\substack{Q',R'\in \mathcal D\\ Q',R'\subset Q }}
\frac { \langle f, h ^{Q'} _{R'} \rangle} {\lvert Q\rvert } k^{R'} _{Q'}(x)$$ where
- in the second sum, the superscript $ ^{(m,n)}$ on the sum means that in addition we require $ \ell (Q') = 2 ^{-m} \ell (Q)$ and $ \ell (R')= 2 ^{-n} \ell (Q)$,
- the function $ h ^{Q'} _{R'}$ is a (generalized) Haar function on $ R'$, and $ k ^{R'} _{Q'}$ is one on $ Q'$, with the normalization that $$\label{e.normal}
\lVert h ^{Q'} _{R'}\rVert_{\infty }\leq 1,\qquad \lVert k ^{R'} _{Q'}\rVert_{\infty } \leq 1 \,,$$
- on the unweighted $L^2$ space, the operator satisfies $\|\mathbb{S}f\|_{L^2}\leq\|f\|_{L^2}$.
We say that the *complexity* of $ \mathbb S $ is $ \kappa := \max (m,n,1)$.
A generalized Haar shift thus has the form$$\mathbb{S}f\left( x\right) =\sum_{Q\in \mathcal{ D}}\frac{1}{\left\vert
Q\right\vert }\int_{Q}s_{Q}\left( x,y\right) f\left( y\right) dy=\int_{\mathbb{R}^{n}}K_{\mathbb S}\left(x,y\right) f\left( y\right) dy,$$where $s_{Q}$, the kernel of the component $\mathbb{S}_Q$, is supported on $Q\times Q$ and $\left\Vert s_{Q}\right\Vert
_{\infty }\leq 1$. It is easy to check that $$|K_{\mathbb{S}}(x,y)|\lesssim\frac{1}{|x-y|^d}.$$ The role of *positive* dyadic operators is essential in this note.
Thanks to the representation of an $L^2$ bounded Calderón–Zygmund operator established in [@Hytonen:A2], our main Theorem follows from this one. (For more details on this reduction, see section 2 of [@HLMORSU].)
\[p.shift\] Let $ \mathbb S $ be a generalized Haar shift operator of complexity $ \kappa $, and $ 1<p< \infty $. It holds that $$\| \mathbb S_{\natural}f\|_{L^p(w)}
\leq C_{p} \kappa ^2 [w]_{A_p}^{1/p}\big([w]_{A_\infty}^{1/p'}+[w^{1-p'}]_{A_\infty}^{1/p}\big)\|f\|_{L^p(w)}.$$
We note that any polynomial dependence on complexity $ \kappa $ is sufficient to conclude our paper.
The application of Lerner’s formula [@Lerner:formula] to Haar shift operators is well-known, see [@CMP-ERAMS], [@CMP], [@Lerner:Ap], [@Lacey:ApAinfty]. But all previous applications have given bounds that are exponential in $ \kappa $. Lerner’s formula gives the pointwise bound $$|f-m_f(Q_0) |
\lesssim M^{\#}_{1/4;Q_0}f+\sum_{k,j}\omega_{2^{-d-2}}(f;(Q^{k}_j)^{(1)}) 1_{Q^k_j},$$ where the various quantities are defined as follows: $$\begin{gathered}
\label{e.w}
\omega _{\lambda } (\phi ; Q) :=
\inf _{c\in \mathbb R } \bigl( (\phi - c )1_{Q} \bigr) ^{\ast} (\lambda \lvert Q\rvert ) \,,
\\\label{e.localSharp}
M ^{\sharp} _{\lambda; Q } \phi (x)
:= \sup _{Q'\subset Q} 1_{Q'} \omega_{\lambda } (\phi , Q')\,, \end{gathered}$$ and $ m_f(Q_0)$ is a median of $ f$ restricted to $ Q_0$, a possibly non-unique real number such that $$\max\bigl\{ \lvert \{ x \in Q_0 \;:\; f(x)>m_f(Q_0) \}\rvert,\
\lvert \{ x \in Q_0 \;:\; f(x)<m_f(Q_0) \}\rvert \bigr\} \le \tfrac 12 \lvert Q_0\rvert.$$ In addition, $ \phi ^{\ast} $ denotes the non-increasing rearrangement, so that if $ \phi $ is supported on $ Q$, $ \phi ^{\ast} (\lambda \lvert Q\rvert )$ is the $ \lambda ^{\textup{th}}$ percentile of $ \phi $. Importantly, defining $\Omega_k:=\bigcup_j Q^k_j$ as a disjoint union, it holds that $\Omega_{k+1}\subset\Omega_k$ and $|Q^k_j\cap\Omega_{k+1}|\leq\tfrac12|Q^k_j|$.
Let $f$ be bounded with bounded support, and $Q_N\to\mathbb{R}^d$. Since $f\in L^2$, we have $\mathbb{S}_{\natural}f\in L^2$, hence $m_{Q_N}(\mathbb{S}_{\natural}f)\to 0$, and finally $1_{Q_N}(\mathbb{S}_{\natural}f-m_{\mathbb{S}_{\natural}f}(Q_N))\to \mathbb{S}_{\natural}f$ pointwise. By Fatou’s lemma and Lerner’s formula (applied to $Q_N$ in place of $Q_0$), then $$\begin{split}
\int_{\mathbb{R}^d}(\mathbb{S}_{\natural}f)^p w
&\leq\liminf_{N\to\infty}\int_{Q_N}|\mathbb{S}_{\natural}f-m_{\mathbb{S}_{\natural}f}(Q_N)|^p w \\
&\lesssim\liminf_{N\to\infty}\Big(\int_{Q_N}(M^{\#}_{1/4;Q_N}f)^p w \\
&\qquad +\int_{Q_N}\Big[\sum_{k,j}1_{Q^k_j}\omega_{2^{-d-2}}(\mathbb{S}_{\natural}f;(Q^k_j)^{(1)})\Big]^p w\Big).
\end{split}$$
If $\mathbb{S}$ has complexity $\kappa$, then $$\omega_{\lambda}(\mathbb{S}_{\natural}f;Q)
:=\inf_c (1_Q(\mathbb{S}_{\natural}f-c))^*(\lambda|Q|)
\lesssim \kappa \fint_{Q^{(0)}}|f| +
\sum_{i=1}^{\kappa}\fint_{Q^{(i)}}|f|.$$
We have $$\begin{split}
1_Q\mathbb{S}_{\natural}f
&:=1_Q\sup_{\epsilon<\upsilon}\Big|\sum_{\epsilon\leq\ell(Q')\leq\upsilon}\mathbb{S}_{Q'} f\Big| \\
&\phantom{:}\leq1_Q\sup_{\epsilon<\upsilon}\Big|\sum_{\substack{\epsilon\leq\ell(Q')\leq\upsilon \\ Q'\subseteq Q}}\mathbb{S}_{Q'} f\Big|
+1_Q\sum_{Q':Q\subsetneq Q'\subseteq Q^{(\kappa)}}|\mathbb{S}_{Q'} f| \\
&\qquad +1_Q\sup_{\epsilon<\upsilon}\Big|\sum_{\substack{\epsilon\leq\ell(Q')\leq\upsilon \\ Q'\supsetneq Q^{(\kappa)}}}\mathbb{S}_{Q'} f\Big|.
\end{split}$$ The last term is a constant (say, $c_Q$) times $1_Q$. Hence $$1_Q|\mathbb{S}_{\natural}f-c_Q|
\leq 1_Q\mathbb{S}_{\natural}(1_Q f)+1_Q\sum_{i=1}^{\kappa}\fint_{Q^{(i)}}|f|.$$ It follows that $$\begin{split}
\inf_c(1_Q(\mathbb{S}_{\natural}f-c))^*(\lambda|Q|)
&\leq(1_Q(\mathbb{S}_{\natural}f-c_Q))^*(\lambda|Q|) \\
&\leq(\mathbb{S}_{\natural}(1_Q f))^*(\lambda|Q|)+\sum_{i=1}^{\kappa}\fint_{Q^{(i)}}|f|,
\end{split}$$ where finally $$(\mathbb{S}_{\natural}(1_Q f))^*(\lambda|Q|)
\leq\frac{1 }{\lambda|Q|}\|\mathbb{S}_{\natural}(1_Q f)\|_{L^{1,\infty}}
\lesssim\frac{\kappa }{|Q|}\|1_Q f\|_1=\kappa\fint_Q|f|.$$
The lemma implies in particular that $$\begin{aligned}
M^{\#}_{1/4;Q_N}(\mathbb{S}_{\natural}f)
\lesssim \sup_{Q\subseteq Q_N}\kappa 1_Q \fint_{Q}|f|+
\sum_{i=1}^{\kappa}\fint_{Q^{(i)}}|f|
\leq 2\kappa Mf,\end{aligned}$$ and hence $$\int_{Q_N}M^{\#}_{1/4;Q_N}(\mathbb{S}_{\natural}f)^p w
\lesssim\kappa^p\int (Mf)^p w
\lesssim\kappa^p[w]_{A_p}[w^{1-p'}]_{A_\infty}\int|f|^p w$$ by the mixed bound for the maximal operator from [@HytPer]. This bound is of the correct form.
Let us write $\mathscr{Q}:=\{Q^k_j:k,j\in\mathbb{N}\}$. It remains to consider $$\sum_{Q\in\mathscr{Q}} 1_Q\omega_{2^{-d-2}}(\mathbb{S}_{\natural}f;(Q)^{(1)})
\lesssim\sum_{Q\in\mathscr{Q}}1_Q\Big(\kappa\fint_{Q^{(1)}}|f|+\sum_{i=2}^{\kappa+1}\fint_{Q^{(i)}}|f|\Big),$$ where further, for each $i=1,\ldots,\kappa+1$, $$\sum_{Q\in\mathscr{Q}}1_Q\fint_{Q^{(i)}}|f|
=\sum_{Q\in\mathscr{D}}\Big(\sum_{\substack{Q'\in\mathscr{Q}\\ (Q')^{(i)}=Q}}1_{Q'}\Big)\fint_Q|f|
=:\sum_{Q\in\mathscr{D}}\chi_Q^{(i)}\fint_Q|f| =:\mathbb{S}^{(i)}|f|.$$
Here $\mathbb{S}^{(i)}$ is a *positive* generalized dyadic shift of complexity $i$: each $\mathbb{S}^{(i)}_Q f=\chi_Q ^{(i)}\fint_Q f$ is a positive operator with kernel $|Q|^{-1}\chi^{(i)}_Q\otimes 1_Q$. (We have not yet checked the $L^2$ boundedness, though, which is not automatic in the noncancellative case.)
It hence suffices to show that $$\label{e.toShow}
\int (\mathbb{S}^{(i)}f)^p w\lesssim i^p\cdot [w]_{A_p}([w]_{A_\infty}^{p-1}+[w^{1-p'}]_{A_\infty})\int f^p w,$$ where $f\geq 0$. This supplies our quadratic in complexity bound in Proposition \[p.shift\] above. This bound to be proven might look just as bad as what we started with, but the positivity gives us a significant advantage.
A two-weight inequality for positive dyadic shifts
==================================================
We recall the two-weight inequality for maximal truncations of general shifts:
\[t.HLMORSU\] Let $\mathbb{S}$ be a generalized dyadic shift of complexity $\kappa$. Then $$\|\mathbb{S}_{\natural}(f\sigma)\|_{L^p(w)}
\lesssim\{\kappa\mathfrak{M}_p+\mathfrak{N}_p+\mathfrak{T}_p\}\|f\|_{L^p(\sigma)},$$ where $\mathfrak{M}_p,\mathfrak{N}_p,\mathfrak{T}_p$ are the constants from the following three estimates, where $$\mathbb{L}f(x):=e^{i\vartheta(x)}\sum_{{\varepsilon}(x)\leq\ell(Q)\leq\upsilon(x)}\mathbb{S}_Q f(x)$$ ranges over all possible linearizations of $\mathbb{S}_{\natural}$: $$\begin{split}
\|M( &f\sigma) \|_{L^p(w)} \leq\mathfrak{M}_p\|f\|_{L^p(\sigma)}, \qquad
\|1_Q\mathbb{L}^*(1_Q gw)\|_{L^{p'}(\sigma)}\leq\mathfrak{T}_p w(Q)^{1/p'}\|g\|_{\infty} \\
&\Big(\int_{Q_0}\sup_{Q\subset Q_0}1_Q\Big[\frac{1}{w(Q)}\int_Q|\mathbb{L}^*(1_Q g w)|\sigma\Big]^p w\Big)^{1/p}
\leq\mathfrak{N}_p\sigma(Q_0)^{1/p}\|g\|_{\infty}.
\end{split}$$
We now prove:
Let $\mathbb{S}$ be a positive dyadic shift of complexity $\kappa$. Then $$\|\mathbb{S}(f\sigma)\|_{L^p(w)}
\lesssim\{\kappa\mathfrak{M}_p+\mathfrak{S}_p+\mathfrak{S}_p^*\}\|f\|_{L^p(\sigma)},$$ where $\mathfrak{M}_p$ is as above, and $\mathfrak{S}_p,\mathfrak{S}_p^*$ are the constants from the following two estimates: $$\|1_Q\mathbb{S}(1_Q \sigma)\|_{L^{p}(w)}\leq\mathfrak{S}_p \sigma(Q)^{1/p},\qquad
\|1_Q\mathbb{S}^*(1_Q w)\|_{L^{p'}(\sigma)}\leq\mathfrak{S}_p^* w(Q)^{1/p'}.$$
In fact, we check that $\mathfrak{N}_p\lesssim\mathfrak{S}_p$ and $\mathfrak{T}_p\leq\mathfrak{S}_p^*$ for positive shifts. The key point is that when $\mathbb{S}$ is a positive shift, any linearization $\mathbb{L}$ satisfies $|\mathbb{L}^*g|\leq\mathbb{S}^*|g|$ pointwise. From this, it is immediate that $$\begin{split}
\|1_Q\mathbb{L}^*(1_Q gw)\|_{L^{p'}(\sigma)}
&\leq\|1_Q\mathbb{S}^*(1_Q |g|w)\|_{L^{p'}(\sigma)} \\
&\leq\|1_Q\mathbb{S}^*(1_Q w)\|_{L^{p'}(\sigma)}\|g\|_{\infty}
\leq\mathfrak{S}_p^*w(Q)^{1/p'}\|g\|_{\infty},
\end{split}$$ and thus $\mathfrak{T}_p\leq\mathfrak{S}_p^*$.
If $\mathbb{S}$ is a positive shift, then $$\mathfrak{N}_p\lesssim\mathfrak{S}_p.$$
Let $\|g\|_{\infty}\leq 1$. We have $$\int_Q|\mathbb{L}^*(1_Q g w)|\sigma
\leq\int_Q \mathbb{S}^*(1_Q w)\sigma
=\int_Q\mathbb{S}(1_Q\sigma)w
\leq\int_Q\mathbb{S}(1_{Q_0}\sigma)w,$$ and hence $$1_Q\Big[\frac{1}{w(Q)}\int_Q|\mathbb{L}^*(1_Q g w)|\sigma\Big]^p
\leq 1_Q\Big[\frac{1}{w(Q)}\int_Q \mathbb{S}(1_{Q_0} \sigma)w \Big]^p
\leq 1_Q M_w(1_{Q_0}\mathbb{S}(1_{Q_0}\sigma))^p,$$ where $M_w$ is the dyadic maximal operator with respect to the measure $w$. Finally, $$\Big(\int_{Q_0} M_w(1_{Q_0}\mathbb{S}(1_{Q_0}\sigma))^p w\Big)^{1/p}
\lesssim\Big(\int_{Q_0}\mathbb{S}(1_{Q_0}\sigma)^p w\Big)^{1/p}
\leq\mathfrak{S}_p\sigma(Q_0)^{1/p}.\qedhere$$
The fact that we deduce a positive-operator result from one for singular operators is somewhat unusual. One could obviously give a direct proof of the Corollary, but this would be only somewhat simpler than the proof of the Theorem \[t.HLMORSU\], and certainly much harder than the above deduction based on the Theorem.
The unweighted boundedness of the particular shifts $\mathbb{S}^{(i)}$
======================================================================
We now return to the question of unweighted $L^2$ boundedness of the particular positive shifts $$\mathbb{S}^{(i)}f=\sum_{Q\in\mathscr{Q}}\chi_Q^{(i)}\fint_Q f,\qquad\chi_Q^{(i)}:=\sum_{\substack{Q'\in\mathscr{Q}\\ (Q')^{(i)}=Q}}1_{Q'}$$ arising from the application of Lerner’s formula to general shifts. This proposition will show that $ c i ^{-1} \mathbb S ^{(i)}$ fulfills the requirements of the definition of a generalized Haar shift.
When $\mathscr{Q}=\{Q^k_j:k,j\in\mathbb{N}\}$ are the cubes from Lerner’s formula, we have for $p\in(1,\infty)$, $$\|\mathbb{S}^{(i)}f\|_{L^p}\lesssim i\|f\|_{L^p}.$$
This could be done in a variety of ways. One possibility is to apply the two-weight result in the case that $w\equiv\sigma\equiv 1$. Then $\mathfrak{M}_p\lesssim 1$ by the usual maximal inequality. Let us drop the superscript $(i)$ for simplicity in the subsequent analysis. As for $\mathfrak{S}_p$, we have $$1_Q \mathbb{S}(1_Q)
=\sum_{R\subseteq Q}\chi_R +\sum_{R\supsetneq Q}1_Q\chi_R\frac{|Q|}{|R|}
\leq \sum_{R\subseteq Q}\chi_R+1.$$ Here, $$\sum_{R\subseteq Q}\chi_R=\sum_{k=0}^{\infty} 1_{\bigcup\mathscr{Q}_k(Q)},$$ where $\mathscr{Q}_0(Q)$ is the collection of the maximal $Q'\in\mathscr{Q}$ with $(Q')^{(i)}\subseteq Q$, and inductively $\mathscr{Q}_{k}(Q)$ is the collection of the maximal $Q'\in\mathscr{Q}$ strictly contained in some $Q''\in\mathscr{Q}_{k-1}(Q)$. From the properties of Lerner’s cubes, we have $$\Big|\bigcup\mathscr{Q}_{k}(Q)\Big|\leq 2^{-1}\Big|\bigcup\mathscr{Q}_{k-1}(Q)\Big|\leq\ldots\leq 2^{-k}|\bigcup\mathscr{Q}_{0}(Q)\Big|\leq 2^{-k}|Q|,$$ and hence $$\Big\|\sum_{R\subseteq Q}\chi_R\Big\|_p \leq \sum_{k=0}^{\infty} \Big|\bigcup\mathscr{Q}_k(Q)\Big|^{1/p}\lesssim|Q|^{1/p}.$$
We turn to $\mathfrak{S}_p^*$. First, $$\mathbb{S}^*g=\sum_{Q\in\mathscr{D}} 1_Q\fint_Q\chi_Q f,$$ and hence $$1_Q\mathbb{S}^*(1_Q)
=\sum_{R\subseteq Q} 1_R\fint_R\chi_R+\sum_{R\supsetneq Q} 1_Q\frac{1}{|R|}\int_Q\chi_R
\leq \sum_{R\subseteq Q} 1_R\fint_R\chi_R+1.$$ Estimating the first term by duality with $f\in L^p$, we have $$\begin{split}
\int\Big(\sum_{R\subseteq Q} 1_R\fint_R\chi_R\Big)f
&=\int\sum_{R\subseteq Q}\chi_R\fint_R f \\
&\leq\int\Big(\sum_{R\subseteq Q}\chi_R \Big)Mf
\lesssim\Big\|\sum_{R\subseteq Q}\chi_R \Big\|_{p'}\|Mf\|_{p}
\lesssim|Q|^{1/p'}\|f\|_{p}
\end{split}$$ by the previous part of the proof and the maximal theorem.
The testing constants $\mathfrak{S}_p$ and $\mathfrak{S}_p^*$ in the two-weight case
====================================================================================
In this section we provide an estimate of the testing constants $$\mathfrak{S}_p:=\sup_Q\frac{\|1_Q\mathbb{S}(1_Q\sigma)\|_{L^p(w)}}{\sigma(Q)^{1/p}},\qquad
\mathfrak{S}_p^* :=\sup_Q\frac{\|1_Q\mathbb{S}^*(1_Q w)\|_{L^{p'}(\sigma)}}{w(Q)^{1/p'}}$$ for an arbitrary (not necessarily positive) dyadic shift $\mathbb{S}$ of complexity $\kappa$. But recall that these are only known to dominate the $L^p$ norm bounds of $\mathbb{S}$ in the special case of positive shifts (or, by different methods, general shifts but only for $p=2$). For the application to or main results, we are ultimately interested in the special case that $\mathbb{S}=\mathbb{S}^{(i)}$.
Let us fix a cube $Q_0$ and the (by now usual) decomposition of its subcubes: Let $\mathscr{K}$ be one of the $\kappa+1$ subcollections of $$\label{e.sepScales}
\{Q\subseteq Q_0:\log_2\ell(Q)\equiv\lambda\mod\kappa+1\},$$ and $$\mathscr{K}^a:=\{Q\in\mathscr{K}: 2^a\leq\Big(\frac{w(Q)}{|Q|}\Big)^{1/p}\Big(\frac{\sigma(Q)}{|Q|}\Big)^{1/p'}<2^{a+1}\Big\},$$ where $$2^a\leq [w,\sigma]_{A_p}^{1/p}:=\sup_Q \Big(\frac{w(Q)}{|Q|}\Big)^{1/p}\Big(\frac{\sigma(Q)}{|Q|}\Big)^{1/p'}.$$ Let $\mathscr{P}^a=\bigcup_{n=1}^{\infty}\mathscr{P}^a_n\subseteq\mathscr{K}^a$ be the principal cubes such that $\mathscr{P}^a_0$ consists of all maximal cubes in $\mathscr{K}^a$, and $\mathscr{P}^a_n$ consists of all maximal $P'$ contained in some $P\in\mathscr{P}^a_{k-1}$ with the estimate $$\frac{\sigma(P')}{|P'|}>2\frac{\sigma(P)}{|P|}.$$ For $Q\in\mathscr{K}^a$, let $\Pi(Q)$ be the minimal principal cube containing it, and $$\mathscr{K}^a(P):=\{Q\in\mathscr{K}^a:\Pi(Q)=P\}.$$
For general shifts (and even their maximal truncations), the following distributional estimate is known; see [@HLMORSU] Section 10 in the $A_p$ setting. We remark that the proof is substantially easier in the non-negative case, the only case we actually need for our main results.
For any dyadic shift of arbitrary complexity, we have $$w\Big(|\mathbb{S}_{\mathscr{K}^a(P)}(\sigma)|>t\frac{\sigma(P)}{|P|}\Big)\lesssim e^{-ct}w(P),\qquad P\in\mathscr{P}^a,$$ where $c$ is a dimensional constant.
The following estimate completes the verification of the testing conditions.
Let $\mathbb{S}$ be a dyadic shift of complexity $\kappa$. Then $$\|1_Q\mathbb{S}(1_Q\sigma)\|_{L^p(w)}\lesssim(1+\kappa)\big([w,\sigma]_{A_p}[\sigma]_{A_\infty}\sigma(Q)\big)^{1/p}$$
We write $$1_Q\mathbb{S}(1_Q\sigma)
=\sum_{R\subseteq Q}\mathbb{S}_R(\sigma)+1_Q\sum_{R\supsetneq Q}\mathbb{S}_R(1_Q\sigma),$$ where the second term satisfies $$\Big|1_Q\sum_{R\supsetneq Q}\mathbb{S}_R(1_Q\sigma)\Big|
\leq 1_Q\sum_{R\supsetneq Q}\frac{\sigma(Q)}{|R|}\leq 1_Q\frac{\sigma(Q)}{|Q|}$$ and $$\Big\|1_Q\frac{\sigma(Q)}{|Q|}\Big\|_p =w(Q)^{1/p}\frac{\sigma(Q)}{|Q|}\leq[w,\sigma]_{A_p}^{1/p}\sigma(Q)^{1/p}.$$ The first term we write as $$\sum_{R\subseteq Q}\mathbb{S}_R(\sigma)
=\sum_{\lambda=0}^{\kappa}\sum_{a:2^a\leq[w,\sigma]_{A_p}^{1/p}}\sum_{P\in\mathscr{P}^a}\mathbb{S}_{\mathscr{K}^a(P)}(\sigma),$$ where the dependence of the quantities on the parameter $\lambda$ from is suppressed. For $P\in\mathscr{P}^a$, define the set $$P_j^a:=\Big\{|\mathbb{S}_{\mathscr{K}^a(P)}(\sigma)|\in \frac{\sigma(P)}{|P|}(j,j+1]\Big\}\subseteq P.$$ By the distributional estimate, we have $w(P_j^a)\lesssim e^{-cj}w(P)$. Then $$\Big\|\sum_{R\subseteq Q}\mathbb{S}_R(\sigma)\Big\|_{L^p(w)}
\leq\sum_{\lambda=0}^{\kappa}\sum_{a}\sum_{j=0}^{\infty}(j+1)
\Big\|\sum_{P\in\mathscr{P}^a}1_{P^a_j}\cdot\frac{\sigma(P)}{|P|}\Big\|_{L^p(w)},$$ and $$\begin{split}
\Big\|&\sum_{P\in\mathscr{P}^a} 1_{P^a_j}\cdot\frac{\sigma(P)}{|P|}\Big\|_{L^p(w)}
=\Big(\int\Big[\sum_{P\in\mathscr{P}^a}1_{P^a_j}(x)\cdot\frac{\sigma(P)}{|P|}\Big]^p w(dx)\Big)^{1/p} \\
&\overset{(*)}{\lesssim} \Big(\int \sum_{P\in\mathscr{P}^a}1_{P^a_j}(x)\cdot\Big[\frac{\sigma(P)}{|P|}\Big]^p w(dx)\Big)^{1/p}
=\Big(\int \sum_{P\in\mathscr{P}^a}w(P^a_j)\cdot\Big[\frac{\sigma(P)}{|P|}\Big]^p\Big)^{1/p} \\
&\lesssim \Big(\int \sum_{P\in\mathscr{P}^a}e^{-cj}w(P)\cdot\Big[\frac{\sigma(P)}{|P|}\Big]^p\Big)^{1/p}
\leq 2^a\Big(e^{-cj}\sum_{P\in\mathscr{P}^a}\sigma(P)\Big)^{1/p} \\
&\overset{(**)}{\lesssim} 2^a\Big(e^{-cj}[\sigma]_{A_\infty}\sigma(Q)\Big)^{1/p},
\end{split}$$ where we in $(*)$ the fact that the numbers $\frac{\sigma(P)}{|P|}$, for $P\owns x$ with a fixed $x$, form a super-exponential sequence (so that their $\ell^1$ and $\ell^p$ norms a comparable) and in $(**)$ an estimate for the principal cubes in terms of $[\sigma]_{A_\infty}$ from [@HytPer].
Now we can simply sum up $$\begin{split}
\Big\|\sum_{R\subseteq Q}\mathbb{S}_R(\sigma)\Big\|_{L^p(w)}
&\leq\sum_{\lambda=0}^{\kappa}\sum_{a:2^a\leq[w,\sigma]_{A_p}^{1/p}}\sum_{j=0}^{\infty}(j+1)
\Big\|\sum_{P\in\mathscr{P}_a} 1_{P^a_j}\cdot\frac{\sigma(P)}{|P|}\Big\|_{L^p(w)} \\
&\lesssim\sum_{\lambda=0}^{\kappa}\Big(\sum_{a:2^a\leq[w,\sigma]_{A_p}^{1/p}}2^a\Big)\Big(\sum_{j=0}^{\infty}(j+1)2^a e^{-cj/p}\Big)[\sigma]_{A_\infty}^{1/p}\sigma(Q)^{1/p} \\
&\lesssim(\kappa+1)[w,\sigma]_{A_p}^{1/p}[\sigma]_{A_\infty}^{1/p}\sigma(Q)^{1/p}.\qedhere
\end{split}$$
|
I had to laugh when I read Willamette Week’s irreverent interpretation of candidates’ responses to our arts and culture questionnaire. Writer Corey Pein did some pretty funny paraphrasing. Commissioner Candidate Ed Garren, for example, said in our survey, "As a psychotherapist, I have provided significant mental health services to persons in the arts, musicians, actors, and production persons." But what he was really saying, according to WW, was, "You people are crazy."
WW also called our survey (or rather, the candidates' responses to it) “perhaps the single most revealing document produced by Portland's City Hall races, so far.”
http://wweek.com/wwire/?p=11487
Although I notice that Sho still hasn't answered the survey. Hmmm. Oh well. No matter. I'm off to put the finishing touches on my costume for Saturday night. |
module RocketJob
module Subscribers
class Worker
include RocketJob::Subscriber
attr_reader :supervisor
def initialize(supervisor)
@supervisor = supervisor
end
def kill(server_id:, worker_id:, wait_timeout: 3)
return unless my_server?(server_id)
worker = locate_worker(worker_id)
return unless worker
worker.shutdown!
worker.join(wait_timeout)
worker.kill
logger.info "Killed"
end
def stop(server_id:, worker_id:)
return unless my_server?(server_id)
worker = locate_worker(worker_id)
return unless worker
worker.shutdown!
logger.info "Stopped Worker: #{worker_id}"
end
def thread_dump(server_id:, worker_id:)
return unless my_server?(server_id)
worker = locate_worker(worker_id)
return unless worker
logger.info "Thread dump Worker: #{worker_id}"
logger.backtrace(thread: worker.thread) if worker.thread && worker.alive?
end
private
def my_server?(server_id)
server_id == supervisor.server.id
end
def locate_worker(worker_id)
return unless worker_id
worker = supervisor.worker_pool.find(worker_id)
return unless worker&.alive?
worker
end
end
end
end
|
Q:
BPL en Delphi con FLAG "Link With Runtime Link Package" en False
Tengo un proyecto que usa una BPL desarrollada por mi sobre Delphi Rio o Delphi Tokyo.
Con el FLAG "Link With Runtime Link Package" en TRUE el proyecto compila, pero con el Flag en FALSE no compila porque no encuentra las unidades de la BPL.
Al compilar con el Flag en False, pretendo que el ejecutable incluya las BPL's, si no debo distribuir las BPL's propias y de Delphi con el ejecutable.
Gracias
A:
Para que tu proyecto compile sin utilizar la BPL en tiempo de corrida, debes incluir la ruta dónde tienes las unidades dentro del library path, para que el compilador sea capaz de encontrarlas y enlazarlas dentro de tu ejecutable.
Al compilador puedes darle:
Los fuentes (.pas) de las unidades o
DCU's de las unidades, siempre que sean compatibles con la versión del compilador.
Para ello, puedes hacerlo a nivel global (es lo más común si el BPL contiene componentes propios).
En el menú, Tools > Options > Language > Delphi Options > Library > Library path incluye la ruta de la carpeta donde tengas los archivos mencionados.
También puedes hacerlo dentro de las opciones del proyecto, si no quieres que estas unidades estén disponibles para otros proyectos.
|
Citrus fruits being procured under MIS
A spokesman of the State Government said here that Market Intervention Scheme being implemented for the year 2012-13 for procurement of citrus fruits i.e. Kinnow, orange, Malta and Galgal. He said that the scheme would be operational from 20th November, 2012 to 15th February, 2013. He said that procurement upto 500 MT of Kinnow, Malta, Orange and 100 MT Galgal would be made under MIS this year.
He said that the procurement price for ‘B’ Grade Kinnow, Malta and Orange would be Rs. 6 per kg and for ‘C’ grade it would be Rs. 5.50 per kg. He said that the procurement price for galgal would be Rs. 4.50 per kg. He said that Rs. 2.65 per kg would be handling charges for Kinnow, Malta, Orange and Rs. one per kg for Galgal.
Spokesman said that HPMC, HIMFED and H.P. Agro Industries Corporation would be the authorized agencies for procurement. He said that 54 procurement centres would be opened in different parts of citrus fruit growing areas of the State which can be increased, if required.
The News Himachal seeks to cover the entire demographic of the state, going from grass root panchayati level institutions to top echelons of the state. Our website hopes to be a source not just for news, but also a resource and a gateway for happenings in Himachal. |
A second application by Clean Power Properties Ltd for a larger scheme was rejected last week.
The decision was welcomed by Halfway Community Council secretary Liisa Hepworth.
She said: “It is with much relief to report that the planning committee unanimously rejected the planning application following planning officers recommendation to refuse.
“With more than 7000 objections, including from elected officials and many more signatures on a petition, they should now hear the strong and many voices of the community and South Lanarkshire Council and take their plans elsewhere.
“There is no doubt Clean Power Properties will appeal it so it is not over yet.
Read More
“We are trying to raise awareness too because people might not know a lot about this because it is in the Blantyre area. But we are only three miles away from the planned incinerator.”
Demonstrators, including Blantyre community council, were campaigning against the ‘toxic triangle’ of waste incinerators in the town, Polmadie, which already has planning permission and Coatbridge, which was refused by North Lanarkshire Council two months ago.
As Liisa pointed out, Halfway community council expect Clean Power Properties to appeal the local authority’s decision. However, Councillor Margaret Ferrier said they have no intention of giving up and will be ready for any subsequent challenges.
Read More
Councillor Ferrier added: “I am delighted that we got past the first hurdle.
“ When people feel strongly about an issue such as this a campaign can gather momentum and planning decisions can be influenced.
“I am very proud of all of the communities and community councils for collectively standing up and fighting against this proposed waste incinerator. We know that Clean Power Ltd will no doubt appeal this decision. |
Mercure Hotel Köln Junkersdorf am Stadion disposes 145 modern rooms, equipped with air conditioning, radio, TV and telephone. Furthermore 6 conference rooms with up to 136 square metres complete the offer of the hotel.With a private and a public car park (10 Euro/24 hours) there are enough parking spaces available.
Visit the restaurant "Olive Tree" with its "Bistro" atmosphere and its lobby bar. Enjoy a glass of wine and the variety of Mediterrean and regional dishes or choose one of the legendary cocktail creations and try a snack at the lobby bar.
Hotel Köln Junkersdorf am Stadion is located on the western outskirts of the city. Take the tram and you will reach the heart of Cologne after two stops or after a 12 minutes walk. The hotel provides always the right place for visitors of various interests - at close quarters are located a lot of resident companies, the stadium and the Jahnwiesen. In shortness you can also reach diverse museums, the opera of Cologne and the big pleasure grounds of Phantasialand. |
Deep Learning Could Automate TSA Screeners - icinnamon
https://medium.com/synapse-blog/ai-outperforms-certified-xray-operators-972932086f2e
======
sgautam
Hi all- I'm the CTO and Co-founder of Synapse Technology. Happy to answer
questions about our tech & product!
p.s. We're hiring CV engineers for our Perception Team. Shoot me a note at
sims[at]syntechcorporation.com if you're interested in solving hard problems
with state-of-the-art methods in object detection, domain adaptation,
incremental learning, and the like!
------
rkwasny
Should we just keep the government shut and replace it with AI?
~~~
icinnamon
You joke, but there are certain aspects that could be made far more efficient
and accurate with AI.
|
/* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* Copyright 2012 The MITRE Corporation *
* *
* Licensed under the Apache License, Version 2.0 (the "License"); *
* you may not use this file except in compliance with the License. *
* You may obtain a copy of the License at *
* *
* http://www.apache.org/licenses/LICENSE-2.0 *
* *
* Unless required by applicable law or agreed to in writing, software *
* distributed under the License is distributed on an "AS IS" BASIS, *
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. *
* See the License for the specific language governing permissions and *
* limitations under the License. *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
#include <openbr/plugins/openbr_internal.h>
using namespace cv;
namespace br
{
/*!
* \ingroup transforms
* \brief Crops about the specified region of interest.
* \author Josh Klontz \cite jklontz
*/
class CropTransform : public UntrainableTransform
{
Q_OBJECT
Q_PROPERTY(int x READ get_x WRITE set_x RESET reset_x STORED false)
Q_PROPERTY(int y READ get_y WRITE set_y RESET reset_y STORED false)
Q_PROPERTY(int width READ get_width WRITE set_width RESET reset_width STORED false)
Q_PROPERTY(int height READ get_height WRITE set_height RESET reset_height STORED false)
BR_PROPERTY(int, x, 0)
BR_PROPERTY(int, y, 0)
BR_PROPERTY(int, width, 0)
BR_PROPERTY(int, height, 0)
void project(const Template &src, Template &dst) const
{
dst = Mat(src, Rect(x, y, width < 1 ? src.m().cols-x-abs(width) : width, height < 1 ? src.m().rows-y-abs(height) : height)).clone();
}
};
BR_REGISTER(Transform, CropTransform)
} // namespace br
#include "imgproc/crop.moc"
|
Running a Mayoral Campaign is 'Grueling,' Professor Tuman Says
Tuesday, February 13, 2018
SAN FRANCISCO CHRONICLE -- “Make no mistake: When you’re supposed to be doing a job representing your district, and you’re now running for a larger office, the larger office is going to get your attention,” said San Francisco State University communications professor Joe Tuman, who ran unsuccessfully for Oakland mayor in 2010 and 2014.
Running a citywide campaign for mayor is grueling, Tuman said. Breed and Kim will have to constantly appear at fundraisers, debates, neighborhood meetings and endorsement events.
That leaves almost no time for the candidates to serve their constituents, Tuman said. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.