text
stringlengths
8
5.77M
Joseph Henry "T Bone" Burnett doesn’t actually have a desk in his office at the Capitol Records Tower in Hollywood, but a symbolic résumé of his long career can be gleaned from the artwork on the walls. Framed Alpha Band posters from the late ’70s represent his (mostly abandoned) career as a recording artist. A painting by John Mellencamp is a tip-off to his subsequent legacy as one of the most celebrated producers of the era, with career-redefining albums by Elvis Costello, Elton John and Robert Plant & Alison Krauss among the dozens he has helmed. Photographs by director Wim Wenders point to yet a third career, as a film composer and music supervisor especially known for Joel and Ethan Coen films like O Brother, Where Art Thou? and Inside Llewyn Davis, along with the TV series Nashville (executive-produced by his wife, Callie Khouri) and True Detective. His Oscar and 11 Grammys? At home in a closet. As ever, Burnett, 67, has no shortage of high-­profile projects in the can, including the upcoming PBS documentary American Epic, a history of regional recording in the ’20s and ’30s, produced in collaboration with Jack White and Robert Redford. He’s taking on more roles still, like leading his own Capitol Label Group imprint, Electromagnetic (first signing: Los Angeles band Mini Mansions), as well as developing multi­media ideas for the other Capitol labels. But there’s little chance of these executive functions turning Burnett into "a suit" -- even if he was one of the first guys in rock’s post-counterculture era to start donning formal wear full time. How has your focus shifted since you teamed up with Capitol? One new thing is publishing -- I made a deal with Spirit Music to publish young songwriters and help place things for people in film and TV. And [Capitol chairman/CEO] Steve Barnett and I are ­working closely -- he’s as good as the very best people I’ve worked with in the record business. It reminds me a lot of working with [legendary label heads] Lenny Waronker and Mo Ostin in the ’80s at Warner Bros. I’m spending a lot of time looking at ­developing shows and films based around music, working on vehicles for any of the artists there. For the last 20 years or so, you’ve kind of been the king of movie music supervisors, although you’ve obviously been very selective about what you’ve done. I started that really back in the 1980s, when it was clear that with CDs, the record companies had essentially released masters of the product they were selling. With vinyl records you had a twentieth century/almost-nineteenth century machine to press it all up, but with CDs anyone could reproduce them at quality infinitely. So it was clear they had opened up Pandora’s box. So to speak! No plug intended, you know. [Laughs] So I started getting into visual media and more or less got out of the record business at that point, because it was clear that there were rough seas ahead. Now I’m very interested in the record business, because I feel we’ve come out of it before the other businesses have. I think there are several forward-thinking people now at record companies interested in investing in artists in the twenty-first century. I recognize the sharing economy as an important factor of modern life, and it could possibly be what we’re left with in the wake of the end of Darwinian capitalism. But for the meantime, we’re certainly at the end of an age where art led our civilization for centuries. And the idea of investing in the arts as the way forward is still important. And so I’ve been spending a lot of time looking for ways to build platforms for young artists to be seen and heard. God, that’s a seriously long answer, huh? In 2013, you had a quote about Silicon ­Valley’s effect on the music business: "We should go up there with pitchforks and ­torches." Are there any recent developments you have found encouraging? I think so. In the first quarter of this year, the record industry was up 14 perent. And that’s from streaming. And streaming is the future. You know, there was a time in 1986 or ‘87, about when The Beatles’ CDs came out, that I said from the stage of McCabe’s, “In the future we won’t have albums and cassettes and we won’t even have CDs. We’ll just have devices that pull down music from the satellite.” And it’s been clear that this has been coming since then, and it’s finally arrived. The promise of that, in the past, when we first started talking about what’s now called streaming, was that as soon as a stream happened, the money could be divided among the creators, instantly. That was a very utopian ideal. That part of automation hasn’t been coded yet. You know, starting with the Gutenberg press, until the world wide web, we lived in a copy society -- a society that made mechanical reproductions that could be produced and sold infinitely at high quality. So we’re moving from that to a system where there’s one copy that everyone has access to. And in that system, every time that copy is accessed, it is a transaction. We need a new field of what I would call transaction rights, so when a (stream) takes place, a small payment goes to the actual creators, rather than into a black box and divided according to what keeps another entity running. If we do that, the democratizing process that’s been much publicized about the Internet can actually begin to take place. Because what’s actually happened through the world wide web is, in the last system, there was an 80/20 rule. Eighty percent of the money was made by 20 percent of the acts. Now it’s the 99/1 rule: Ninety-nine percent of the money is made by one percent of the acts. So the process of implementing the Internet has led to the opposite of democratization. So that’s something that I’m looking at, regarding Silicon Valley, and I think it’s something that reasonable men can all agree on. I think streaming is the right model for the future -- it obviously is. A lot of habits are changing fast. HBO is going to streaming. Netflix has been probably the most incredible story of the last 10 years. But I agree with Taylor Swift: A laborer is worthy of his wages. I do think it was interesting to watch a 25-year-old woman face down Apple. That was encouraging. Because that’s where the power lies: in the artists. There was a very well-orchestrated campaign against Metallica when Lars (Ulrich) came out and said “Somebody’s gonna be making a lot of money from this, but it’s not gonna be the musicians.” I think it’s clear now that the audience is saying, “Yeah, that’s right: musicians should be paid.” For a long time we would hear: “The market has spoken.” And I would respond, “Yes, and it will speak again.” And now it is, and in an interesting way… The artists will build back up a culture out of the ashes of the Internet. That’s a guarantee. It won’t be the technologists. The whole way of looking at it, is being replaced with a new set of metrics. We’ll see how it shakes out. The good people are good, and people who aren’t as good just aren’t as good. I still like that old… I only got a taste of the time when everybody used to play piano around the house all the time. My mom did a little bit when I was a kid and my aunt did quite a bit when I was with her. And they were really good; they could entertain. That came from a time when people entertained themselves, before the media, before the age of mechanical reproduction. Now it could be that it’ll all turn into people making YouTube videos and that’s all anybody watches because we’re drowned in it, and then we’re an idiocracy. Then Mike Judge becomes the prophet of truth and doom. It could go that way. But I like the idea of there being really inspiring people that lead the séance. As a producer, you had an image as the guy who worked with heritage acts. Lately you’ve done Striking Matches, Mini ­Mansions, Secret Sisters and Rhiannon Giddens, all of whom are under 40. Is that intentional? Well, you want to do the right thing by people, and it’s tough to put out a record these days for the heritage artists, as you say. If I can get a handle on it, that’s rewarding to collaborate with a veteran when we can make something together that’s vibrant and vital. But you have to create something powerful to cause somebody to buy this new record rather than one of the 30 other records [by the artist] they have, and especially in this singles environment we have at the moment.. Short of a real clear vision, it can be disappointing for the person. And it’s disappointing for me, certainly. I feel like there are records dying over the counter that are selling 10 percent of what they would have sold in the good old days. So I don’t want to set somebody up for disappointment and waste a lot of time and money if it’s not going to turn into something really wonderful for them. Especially somebody who’s been doing it a long time -- a lifer. As for the kids, it wasn’t a conscious decision. Some of the other projects I was doing, like Inside Llewyn Davis, brought a lot of younger people in and led to other things. I’d been following the Punch Brothers for years. And Striking Matches, those kids are flat-out good. They inspired me with their musicianship and their tone, and they just absolutely go get after it. And if you can help frame something for a young act, you can set them up for long runs. I’ve done that several times in the past, where I was around at the beginning of an act and helped frame them, like Los Lobos or the BoDeans or Counting Crows or Gillian Welch. The other thing is, if you’re going to be in the record business or even the entertainment business… When I was a kid, there weren’t a lot of 70-year-old people selling music. Maybe Jimmy Durante might have sold a couple of records one time or something. [Laughs] And also… the older people aren’t even interested in making records that often. It’s a lot of work and focus. Jerry Lee Lewis and I were talking about doing a record, and I came up with this crazy-great playlist for him. Like “Tower of Song” by Leonard Cohen: Read that lyric and think of Jerry Lee singing it, and you can see he would absolutely murder it. But, you know, he’s just too old to learn it. It’s too many words! There’s a great old story that’s hung around Capitol. When Sinatra was recording there, one time they had arranged “If You Could Read My Mind” by Gordon Lightfoot for the session, and Sinatra turned over the page and looked at it and said “Too many words” and dropped the page to the side. And they went to the next song. Are you doing a follow-up to The Diving Board, the record you produced for Elton John? We just finished a new Elton record that’s ­beautiful. It’s a very upbeat rock’n’roll record. That last album was a particular group of very personal material; this is broadcasting. That one was a parlor record; this is a festival. Were you happy with the New Basement Tapes project, where Elvis Costello, Marcus Mumford, Jim James and others wrote and ­recorded new music for unreleased Bob Dylan lyrics from 1967? Well, I’m thrilled with the way the recording sessions came out. That project was one of the most extraordinary events of my life, and I feel like it’s still a work in progress. We got five people that didn’t know each other together for 10 days and wrote and recorded 45 new songs. It was epic, and I don’t think that really came across yet. There’s a film we’re editing now that I think may end up being the definitive version of that whole event, a concert film we shot at the Montalban, where everybody backed each other up with a vengeance. It was a one-time, one-night-only show, and Marcus Heiny, who has done some stuff with us at Capitol before and has done a lot of stuff with Mumford and Sons, came and filmed it. It was guerrilla filmmaking, to be sure. I mean, we decided to do it that morning, practically. That show was really the fruit of the whole experience. By the way, there are another 20-some-odd songs that we haven’t released yet, and we might put out another album of that stuff next year. I look forward to being a steward of all of that material over the next several years. Let’s talk about True Detective. People ­obsessed over the fact that you’re using ­different verses from the Leonard Cohen theme song for each episode and what that might mean. There are so many reasons. One is, to me, “Never Mind” is the song of the century so far, coming from one of the wisest men in our culture. Probably most of the people who watch True Detective would never have heard that song, so I look at it as an extraordinary gift to the audience. It feels very much like Los Angeles right now: beautiful, dark, brooding, dangerous, covert. The reason the lyrics change is just because there are a lot of important lyrics in the song that all apply, and we’re doing our best to play the whole song for people. There’s another piece that we used in the (sixth) episode: the second movement of Harmonielehre, the [1985] John Adams symphony, one of the most important works of 20th century minimalism. It crazily applied to this place and this world. I can tell you, just as a hint, if you read about what the second movement of Harmonielehre is about, you’ll see… Everything’s woven together very tightly. There’s been a lot of thought put into every one of these things. True Detective is a show in which, however your credit reads, you’re essentially handling two different functions: composer and music supervisor. Is that more rewarding than just doing one or the other? Yeah, that’s the best. I’m actually doing three roles, because I’m composing score, and then composing songs, and then choosing music for different scenes as source music. So you can break it down into three roles if you want to. Watching over the music for the show [in its entirety] is the most rewarding because you can move the tone around and it’s just the most complete experience. But it’s also incredibly great working with a great composer (while acting as music supervisor). Gabrielle Yared is a fantastic composer. Danny Elfman taught me so much. He’s got a beautiful way of looking at putting image and music together. You’re aware of the backlash against the show’s second season? That started last year, by the way. Everybody knew that was coming, the big backlash. This is a very difficult show this year. I notice people are having a hard time understanding… I’ve heard criticisms of the show, and almost all of them are “This is all clichés, and I can’t understand anything that’s going on.” [Laughs] Which is a beautiful dichotomy. I do think this is an ideal show to watch all at once. And I think people will be rewarded when they get to the end. Certainly what Nick’s doing is a 21st century form of literature at this point. Here’s the down side of the world wide web: People just say the same thing and rewrite the same joke over and over. We don’t want artists who the hive mind tells them what to do. The audience wants to be surprised and inspired. But there is an aspect of modern life where some members of the audience think that, even when it comes to dramatic presentations, there’s a joystick they’ve got their hand on. Your wife is still in charge of Nashville. You had some harsh words for ABC after you stepped down as music supervisor on the series. Have you paid attention to what your successor, Buddy Miller, has done? Not at all. [Laughs.] But Callie seems very happy with how he has kept things going. There’s a volume of work with that show that, first of all… When Callie’s home, we’re happy to not talk about work. I work from an immersive place: I get so immersed in what I’m doing that I can’t take phone calls and I just live in that sphere that we create, sealed off from the world. While I was doing the show, I was sealed off for that. And now… You’re happy to not have to think about it? Yeah, really happy. You know, there’s an old saying that no marriages survive television. Well, ours has survived television! And will. You had some harsh words for the network when you left Nashville, and yet you’ve continued with TV. Is the difference just in avoiding dealing directly with networks? These things will take over your whole life if you let ‘em. They do 22 shows a year (with Nashville). There’s not enough time to do 22 shows in a year. There’s just not that much time. It’s miraculous it even gets done at all. And after you’ve worked weeks and months to get to a certain point, there is an element of corporate America that can be very capricious. But television’s (becoming) kind of a nice thing now that it’s been surrounded by the Internet. That’s all changing, too. Here’s the thing I’ve decided. I’m in a place in my life that I have turned over a new leaf. I’m determined now to be affable at all times. And I spent my whole life as a freelance poet keeping my head above water in a corporate world. And I had to fight and I had to be tough, and it’s been an incredible ride. But at this point, I don’t want to fight anymore. So here’s what I want to do now: I want to be kind. I know this is a weird thing to say in an interview. So I’m only going to do things that I can do under my own power. And if I’m doing it under my own power, then I’ll take whatever comes, for better or worse.
[Intra-osseus hemorrhagic lesions in congenital afibrinogenemia. A new case (author's transl)]. Congenital afibrinemia is a rare disease, transmitted by an autosomal recessive mode, and due to deficient fibrinogen. Osseous involvement is exceptional, since only 2 cases have been reported. We describe a third case. The roentgenographic features are well limited radiolucent lesions, arising in the medullary space, and slightly expanding. These lesions are related to fibrous cysts, resulting from intraosseous hemorrhages. Spontaneous resolution may occur: the absence of fibrin deposits and blood clot probably favours resorption.
A majority of people in the state oppose the use of bioengineered technology, according to University of Vermont researchers. SAN FRANCISCO — Results from a University of Vermont study showed no evidence that attitudes toward bioengineered ingredients/genetically modified organisms (G.M.O.s) are strengthened, either positively or negatively, due to a desire for labels indicating a food product contains bioengineered ingredients/G.M.O.s. The study was presented July 27 at the annual conference of the Agricultural and Applied Economics Association in San Francisco. Jane Kolodinsky, Ph.D., author of the study and chair of the Department of Community Development and Applied Economics at the University of Vermont. “When you look at consumer opposition to the use of G.M. technologies in food and account for the label, we found that overall the label has no direct impact on opposition,” said Jane Kolodinsky, Ph.D., author of the study and chair of the Department of Community Development and Applied Economics at the University of Vermont. “This is not what I hypothesized based on the reasoning behind the introduction of The Safe and Accurate Food Labeling bill. We didn’t find evidence that the label will work as a warning.” The Vermont Agricultural Experiment Station funded the University of Vermont study, Dr. Kolodinsky said. The study involved the five years of 2003, 2004, 2008, 2014 and 2015. It included 2,012 responses to a representative, statewide survey of Vermont residents. On average across all five years of the study, 60% of Vermonters reported being opposed to the use of bioengineered technology in food production and 89% desired labeling of food products containing bioengineered ingredients. The numbers increased after 2003. In 2015, 63% were opposed to the use of bioengineered technology in food production and 92% desired labeling of food products containing bioengineered ingredients. The study’s analysis predicted how different demographic groups will react to labeling, Dr. Kolodinsky said. For some demographic groups, confidence in bioengineered technology is predicted to go up with labels, but in other demographic groups, confidence is predicted to go down. None of the impacts is greater than 3 percentage points either way, she said. The state of Vermont has a labeling law, Act 120, scheduled to go into effect July 1, 2016. It will require food intended for humans and offered for retail sale in Vermont to be labeled as genetically engineered if it is produced entirely or in part from genetic engineering. The Safe and Accurate Food Labeling Act of 2015 (H.R. 1599), if it becomes law, could prevent Vermont’s law from going into effect. The U.S. House of Representatives on July 23 of this year approved H.R. 1599, which aims to provide national uniformity regarding the labeling of food derived from genetically engineered plants and to prevent a patchwork of conflicting state or local labeling laws that supporters believe threatens to interfere with interstate and foreign commerce.
/* * Created by K. Suwatchai (Mobizt) * * Email: k_suwatchai@hotmail.com * * Github: https://github.com/mobizt * * Copyright (c) 2020 mobizt * * */ #include <Arduino.h> #include <FirebaseJson.h> void setup() { Serial.begin(115200); Serial.println(); Serial.println(); FirebaseJson json1; FirebaseJsonArray arr1; arr1.set("[0]/int", 123); arr1.set("[0]/double", 456.789); arr1.set("[0]/string", "Hello World!"); arr1.set("[0]/bool", true); arr1.set("[1]/int", 876); arr1.set("[2]/[1]/string", "done"); arr1.set(4, "What's up"); FirebaseJson json2; json2.set("Hi/myInt", 200); json2.set("Hi/myDouble", 0.0023); json2.set("This/is/[2]/[3]", "Me"); json2.set("That/is", false); arr1.set(6, json2); FirebaseJsonData jsonObj; String jsonStr; json1.set("anotherNode/data/[0]", "How are you?"); json1.set("anotherNode/data/[2]", arr1); json1.get(jsonObj, "anotherNode/data/[2]", true); Serial.println("-------------------------"); json1.toString(jsonStr, true); Serial.println(jsonStr); Serial.println("-------------------------"); Serial.println(jsonObj.stringValue); Serial.println("-------------------------"); json1.remove("anotherNode/data/[0]"); json1.toString(jsonStr, true); Serial.println(jsonStr); Serial.println("-------------------------"); json1.set("anotherNode/data/[6]/That/is", "my house"); json1.get(jsonObj, "anotherNode/data/[6]/That/is", true); Serial.println(jsonObj.stringValue); Serial.println("-------------------------"); json1.toString(jsonStr, true); Serial.println(jsonStr); } void loop() { }
<?php /** * LICENSE: The MIT License (the "License") * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * https://github.com/azure/azure-storage-php/LICENSE * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * * PHP version 5 * * @category Microsoft * @package MicrosoftAzure\Storage\Tests\Unit\Common\Internal\Authentication * @author Azure Storage PHP SDK <dmsh@microsoft.com> * @copyright 2016 Microsoft Corporation * @license https://github.com/azure/azure-storage-php/LICENSE * @link https://github.com/azure/azure-storage-php */ namespace MicrosoftAzure\Storage\Tests\Unit\Common\Internal\Authentication; use GuzzleHttp\Psr7\Request; use GuzzleHttp\Psr7\Uri; use MicrosoftAzure\Storage\Tests\Mock\Common\Internal\Authentication\SharedAccessSignatureAuthSchemeMock; use MicrosoftAzure\Storage\Tests\Framework\TestResources; /** * Unit tests for SharedAccessSignatureAuthScheme class. * * @package MicrosoftAzure\Storage\Tests\Unit\Common\Internal\Authentication * @author Azure Storage PHP SDK <dmsh@microsoft.com> * @copyright 2016 Microsoft Corporation * @license https://github.com/azure/azure-storage-php/LICENSE * @link https://github.com/azure/azure-storage-php */ class SharedAccessSignatureAuthSchemeTest extends \PHPUnit\Framework\TestCase { public function testConstruct() { $mock = new SharedAccessSignatureAuthSchemeMock(TestResources::SAS_TOKEN); $this->assertEquals(TestResources::SAS_TOKEN, $mock->getSasToken()); $mock = new SharedAccessSignatureAuthSchemeMock('?' . TestResources::SAS_TOKEN); $this->assertEquals(TestResources::SAS_TOKEN, $mock->getSasToken()); } /** * @expectedException \InvalidArgumentException */ public function testConstructFromInvalidSASToken() { $mock = new SharedAccessSignatureAuthSchemeMock('?' . TestResources::SAS_TOKEN . '?foo=bar'); $this->assertEquals(TestResources::SAS_TOKEN, $mock->getSasToken()); } public function testSignRequest() { // Setup $mock = new SharedAccessSignatureAuthSchemeMock(TestResources::SAS_TOKEN); $uri = new Uri(TestResources::URI2); $request = new Request('Get', $uri, array(), null); $expected = new Uri(TestResources::URI2 . '&' . TestResources::SAS_TOKEN); // Test $actual = $mock->signRequest($request)->getUri(); $this->assertEquals($expected, $actual); } }
Q: Dependency injection in Spring. not convenient regarding to prototype scope Spring's DI works fine for singleton scope bean. However, regarding to prototype scope it is not convenient if the prototype bean itself will inject other beans. The thing is for prototype bean, I would like to create them using new keyword of Java with runtime constructor arguments which is hard to be statically described in XML bean configuration. Using new keyword makes the prototype bean out of Spring container, it is impossible to use Spring DI in them of course. I am wondering how people solve problem like this? Of course I can use AspectJ to do myself injection as a compensation. But having two injection mechanisms is not an elegant solution to me. A: Mark you prototype bean with @Configurable
Drivers skid on it, then crash into cars, fences and garden walls. Fire trucks and buses get stuck on it. And a neighbor asked a navigation app to remove it as a shortcut because of its dangers. Now Baxter Street in Echo Park, one of the steepest roads in Los Angeles, is about to get a makeover. Los Angeles transportation officials announced several changes Friday to the notorious street and others nearby to mitigate what they called “a major safety concern for residents, emergency vehicle access and those using the roadway.” The narrow road has a 33% grade, the third steepest in Los Angeles and 10th in the nation. In recent years, navigation apps have directed more drivers to Baxter Street to avoid traffic jams along nearby Glendale Boulevard. But the apps don’t tell drivers how treacherous the road can be, especially in rainy weather. After numerous complaints, Los Angeles City Councilman Mitch O’Farrell and the city Department of Transportation organized two community meetings about the issue. “I share in the frustration of residents with drivers utilizing narrow, hillside residential streets for cut-through traffic, especially one as steep as Baxter,” O’Farrell said in a statement. “I want to thank LADOT for working with my office and residents on a solution, and I ask for your patience as we implement these changes and grow accustomed to them.” Officials plan to install street signs marking the changes as early as 8 a.m. Tuesday. O’Farrell has asked Los Angeles police to increase patrols to enforce the new restrictions and help motorists get used to them. The changes are: Baxter Street between Allesandro Street and North Alvarado Street will be converted to a one-way street going west. Baxter Street between North Alvarado Street and Lake Shore Avenue will be converted to a one-way street going east. Fargo Street between Allesandro Street and North Alvarado Street will be converted to a one-way street going west. Cove Avenue between Cerro Gordo Street and Lake Shore Avenue will be converted to a one-way street going east. Two stop signs will be added to Lake Shore Avenue at Baxter Street, making the intersection a four-way stop. Right turns will be restricted from Alvarado Street onto Baxter Street between 4 p.m. and 7 p.m. Monday through Friday. Temporary no-parking signs will be installed in the area as a safety precaution as early as 8 a.m. Tuesday. teresa.watanabe@latimes.com Twitter: @TeresaWatanabe
Q: Page.Validate vs Page.IsValid What is the difference between Page.Validate and Page.IsValid? I read some articles about that Page.Validate method is fired automatically by controls that have the CausesValidation property set to true(Which is default value for Button control). Page.IsValid property tells you whether the validation succeeded or not. But Which one is better? what was the relation between us? A: Page.Validate is a method, Page.IsValid is a property. The former forces validation of one or all validation-groups (if no group is specified), the latter returns the result of this validation. You don't need to call Page.Validate manually if the control that caused the postback has CausesValidation set to true(default). Q: Why would you want to force validation on serverside at all or why would you want to set CausesValidation to false? A: Sometimes you don't want to force validation on clientside always but only under certain conditions that are checked on serverside. Or you want to combine multiple validation-groups.
Press Releases Posted on November 26, 2013 MARYVILLE, Nov. 26 – U.S. Senator Lamar Alexander (R-Tenn.), the senior Republican on the Senate health committee, today released the following statement on the Supreme Court’s announcement that it will review a mandate in Obamacare that requires business owners to offer employees reproductive services that violate the institutions’ religious beliefs: “Requiring business owners to defy the basic tenets of their faiths shows a disturbing disregard for the Constitution’s protections of religious freedom, and I hope the Supreme Court agrees.”
Q: Get output from program into Ruby processing I am using the Ruby processing library. I would like to pipe output from a program into my code. For example, echo "hello" | rp5 run receiver.rb. In a normal program, I know I can accomplish this with while $stdin.gets puts $_ puts "Receiving!" end And I know that in processing, the program loops through the draw function continuously. So I tried this code, but it did not work, since it freezes on the line puts $stdin.gets. So I know it must be a problem with the pipes not matching up, so I'm going to try using named pipes so that there is no confusion. def setup puts "setting up" end def draw puts "drawing" puts $stdin puts $stdin.gets puts "after gets" while $stdin.gets puts $_ puts "Receiving!" end puts "done drawing" end Any suggestion would be appreciated. I'm running Ubuntu 12.04. A: Yep, the name pipes worked. Check out this example to get you started and make sure you have the latest version of JRuby loaded.
[Natural history of gastric cancer linked to Helicobacter pylori]. Gastric carcinogenesis is related to inflammatory reaction induced by Helicobacter pylori infection. Infection is involved in pathogenesis of both histological types of gastric cancer, intestinal or diffuse. In the first type, cancer is the last step of successive alterations of the gastric mucosa (atrophy, intestinal metaplasia, dysplasia). In the second type, cancer occurs faster due to chromosomic alterations related to oxidative stress. Inflammation and consequently cancer risk are modulated by bacterial virulence and by the immunologica responsiveness of the host. Helicobacter pylori eradication should be proposed to high risk patients: first degree relatives of patients having gastric cancer, patients with preneoplastic lesions. Cancer prevention is more effective when eradication is performed before occurrence of preneoplastic lesions. When preneoplastic lesions are present, eradication decreases but not suppresses the risk of cancer. Therefore periodic follow up with gastroscopy and biopsies should be planned in these patients.
Wiskott-Aldrich Syndrome (WAS) is an X-linked immunodeficiency disorder with dermatologic, hematologic and immunologic manifestations. The WAS gene ha been identified and, except for its association with Nck and Cdc42, very little is known about the biological function of its protein product WASP. Elucidation of the function of WASP is critical for understanding the molecular basis of the pathology of WAS. Using the yeast two hybrid system we have identified a novel gene, WIP (WASP- Interacting Protein), whose protein products interact with WASP. WIP displays homology to the yeast protein verprolin which is involved in maintaining the integrity of the cytoskeleton. Preliminary studies show that WIP associates with Nck. More importantly, overexpression of a truncated form of WIP containing the WASP-interacting domain causes disruption of actin stress fibers in CHO cells and a decrease in the microvilli in the human B cell line BJAB lymphocytes. We propose to: (1) Characterize WIP and perform a structural analysis of WIP-WASP interaction. We will a) determine the cellular localization of WIP; b) identify the domains and amino acid residues of WIP and WASP that are important for their interaction; c) investigate the association of WIP with WASP, Nck and Cdc42 in a multimeric complex and e) examine the interaction of WIP and WASP-related proteins. (2) Examine the structure and function of WIP with the cytoskeleton. We will a) examine the effect of overexpression of WIP and WIP mutants on the cytoskeleton; b) investigate the interaction of WIP with cytoskeletal proteins and c) determine if WIP complements verprolin deficient yeast. (3) Examine the role of WIP in signal transduction. We will a) analyze WIP phosphorylation and b) examine the interaction with rho GTPases, and the Nck associated enzymes PAK65 and PRK2. (4) Generate and analyze mice deficient in WIP. We will a) determine the organization of the murine WIP gene, b) generate and analyze WIP deficient mice. The results of the proposed studies should provide insights into the function of WIP and into the molecular pathology of the Wiskott-Aldrich syndrome.
#!/bin/bash aclocal autoheader automake --add-missing --copy --foreign autoconf
INTRODUCTION {#s1} ============ Thousands of students, residents, faculty, and other professionals travel around the world every year to work on global health issues---some for short-term assignments, conferences, or workshops and others for extended periods. Many of them travel through established organizations, programs, and universities that have existing resources dedicated to risk management or protocols for safety and security. This is often not the case, however, for learners and faculty from independent programs or higher-education organizations, or for those linked to post-graduate programs in the medical field---namely residency programs. Most residency programs are affiliated with universities or medical schools that have experience providing resources for global travelers or have well-established academic partners and sites internationally. Many other programs, however, are independent and loosely affiliated, or they are linked to smaller institutions, community-based hospitals, faith-based organizations, and hospital systems that lack institutional risk management experience, partnerships, and resources. Even among those programs and institutions who understand and value the need to properly prepare travelers for work in other countries, their plans for safety, security, and risk management may be lax or even absent.[@B1]^,^[@B2] The critical need to safeguard the security of the global health trainees and practitioners, particularly those who do not have institutional backing, is falling through the cracks. Many global health-related programs lack institutional risk management experience, partnerships, and resources to properly prepare travelers for work in other countries. RISKS AND CHALLENGES {#s2} ==================== Students, residents, and faculty who travel for global health-related work---whether for clinical care, public health, research, development, training, or other purposes---may be exposed to various risks including infectious diseases,[@B3]^--^[@B6] road traffic accidents and injuries,[@B7]^--^[@B9] conflict-related violence, and deliberate attacks. Violent attacks are of particular concern because prevention and management require considerable institutional planning and resources---but it is also an area that often lacks forethought and attention. For those with mental health issues, the stress of travel itself, combined with the pressures of separation from known environments, cultural differences and expectations, and adjustment to different housing and the local environment, may exacerbate existing conditions.[@B10] Risks to Personal Safety in the Context of Violence {#s2.1} --------------------------------------------------- Violence against foreigners (e.g., petty robbery, sexual violence, and carjacking) has always been a concern. Some health care professionals believe that their profession shields them from attacks, but they may be upset to know that attacks *specifically* targeting health care providers are increasing, particularly in conflict zones, but also in post-conflict and non-conflict zones.[@B11]^--^[@B15] Acts of violence targeting health care providers violate international humanitarian laws[@B16] and have caused innumerable losses, prompting an outcry among those who believe in medical neutrality.[@B17]^--^[@B19] Between 2012 and 2014, of all armed violence incidents against the health care system, the majority of the targets were health care facilities, followed by medical transports.[@B20] Attacks *specifically* targeting health care providers are increasing, particularly in conflict zones, but also in post-conflict and non-conflict zones. Increasingly, the primary motivation of many violent attacks is political. One study estimated a 55% increase in politically motivated attacks between 2004 and 2008.[@B21] The authors of the study concluded that \"even though many organizations make considerable efforts to dissociate themselves from political actors and project an image of neutrality ... organizations are being attacked not just because they are perceived to be cooperating with Western political actors, but because they are perceived as wholly a part of the Western agenda.\"[@B21] In Mali and Burkina Faso in late 2015 and early 2016, al Qaeda terrorists killed nearly 50 people from various parts of the world in a series of coordinated attacks targeting hotels frequented by businesspeople and foreigners, and injured many more. These attacks brought to light the potential dangers to national and international health and development workers regardless of the purpose of their visit or work. These kinds of attacks are worrisome even to the most experienced and savvy global health professionals.[@B22]^,^[@B23] No longer can those engaged in global health work expect to stay safe even in locations outside of direct service sites such as hotels, malls, and conference centers. Some major international organizations have updated safety security protocols and now require training for their staff.[@B23] Personal safety is an integral component of guidelines created by the Working Group on Ethics Guidelines for Global Health Training to introduce trainees and others involved in global health to ethical issues that may arise during short-term training experiences abroad.[@B24] The Association of Medical Education in Europe also addresses the issue of personal safety among its undergraduate medical students, acknowledging the crucial importance of risk management for those students who study internationally.[@B25] These guidelines, however, do not include safety and security measures in the context of conflict, political, or terrorism-related violence. The U.S. Peace Corps requires all Peace Corps Volunteers to participate in up to 12 weeks of intensive preservice training in their country of service, which covers risks associated with serving abroad, coping with unwanted attention, promoting country-specific strategies and best practices to manage risks, and identifying emergency plans.[@B26] Insufficient Resources and Barriers to Improvement {#s2.2} -------------------------------------------------- Some smaller programs with partial or no security risk management systems have access to resources through membership organizations, such as InterAction\'s minimum operating security standards and training course for security management.[@B27] However, many students, staff, and faculty engaged in global health do not have the backing of international health and development organizations, or even universities, with established safety and security planning, protocols, and dedicated staff. Smaller organizations face many barriers in improving preparedness for safety and security, such as lack of capacity and funding. Common barriers that smaller organizations face in improving preparedness for safety and security may include: General lack of awareness of safety and security threats depending on the region, political stability, practice setting, type of work expected, and residential settingNo independently developed institutional safety and security protocolsLack of capacity to develop and manage safety and security programsLack of funding to create a training and support infrastructureLack of information on the effectiveness of existing security trainingLack of funding for security training by outside or independent companies that specialize in security trainingLack of knowledge of existing standardized protocols used by other organizations and programs, such as InterAction\'s minimum operating security standards[@B28]No access to credible and timely security risk and threat assessmentLack of guidance about whether individuals with certain profiles or characteristics (health, or otherwise) should be advised not to go to certain locations. Lack of Pre-Departure Training {#s2.3} ------------------------------ Few published articles exist that document safety and security training as part of pre-departure preparations for students, residents, or faculty involved in global health work abroad.[@B29]^--^[@B31] Even fewer studies document whether programs have any impact on mitigation of adverse events. One study concluded that \"medical students are often poorly prepared for the ... safety dilemmas they encounter during these electives\" based on a survey of 23 medical students returning from international study.[@B32] Another study, focusing on accidents among medical students studying abroad, mentioned that there is often a lack of advice on personal safety issues.[@B33] A Canadian study of medical school faculty also noted gaps in pre-departure planning and concluded that reviews of health and safety should be mandatory for all international electives.[@B34] A few studies have documented student satisfaction with health and safety training, but they lack details about what safety training their programs covered.[@B35]^,^[@B36] Gender Differences {#s2.4} ------------------ Some studies have noted gender differences in security risks and training. For example, a study using the Security in Numbers Database looked at the risk profile of 1,361 staff members affected in 615 security incidents and found that women were targeted more frequently for petty crime and sexual assault.[@B37] Men, however, were more likely to be involved in violent encounters---and more likely to be killed or injured.[@B38] Another study of security perceptions among NGO workers around the world found that a greater proportion of men than women received security training.[@B39] WHAT CAN BE DONE {#s3} ================ Global health institutions and programs of all types and sizes can plan more carefully for the safety and security of students, residents, and faculty with the help of existing resources and the guidance provided in this article. We aim to offer a way forward for sponsor organizations (that is, the institutions and programs that send travelers abroad), with specific actions to take and questions to ask to increase awareness and prompt conversations about this topic, while recognizing that host (in-country) organizations also bear responsibility for risk management. Global health institutions and programs of all types and sizes can plan more carefully for the safety and security of students, residents, and faculty with the help of existing resources and the guidance provided in this article. According to the United Nations Office for Disaster Risk Reduction (UNISDR), being fully prepared includes \"a sound analysis of disaster risks and good linkages with early warning systems, and includes such activities as contingency planning, stockpiling of equipment and supplies, the development of arrangements for coordination, evacuation and public information, and associated training and field exercises. These must be supported by formal institutional, legal, and budgetary capacities.\"[@B40] The following sections cover some of the aspects of being fully prepared to send students and faculty on global health rotations. Emergency Management Planning {#s3.1} ----------------------------- When planning for emergency management, it is helpful to consider the following 4 phases[@B40]^,^[@B41]: **Mitigation:** refers to activities that may help prevent or reduce the chances of an emergency from happening, or to reduce the harmful effects of unavoidable emergencies**Preparedness:** consists of strengthening individual and institutional capacities to effectively anticipate, respond to, and recover from hazardous events or conditions**Response:** details what actions to take during an emergency to save lives, reduce health impacts, ensure public safety and basic needs, and prevent further harm or damage**Recovery:** refers to activities carried out after the emergency to return to a safer environment or to normal operations Organizations should consider each of the 4 phases as they create their overall safety and security plans, including strategies and policies as well as individual and institutional responsibilities---from what the ultimate individual beneficiary (student, resident, faculty member) should know, to what protocol should be developed by organizations and programs, to setting national or specialty- and discipline-specific standards for security and safety and sharing resources among various stakeholders. Organizations should consider each of the following 4 phases in their emergency management planning: (1) mitigation, (2) preparedness, (3) response, and (4) recovery. Specific Actions to Take at All Levels {#s3.2} -------------------------------------- To overcome some of the common barriers faced by organizations, we propose a checklist of specific actions for institutions and individuals at all levels ([Table](#tabU1){ref-type="table"}). The list of actions is divided into 6 core elements: (1) institutional commitment, (2) trainee and faculty participation, (3) safety and security assessment and analysis, (4) risk and hazard prevention, (5) safety training, and (6) program evaluation. These actions can serve as a conversation starter for those engaged in global health programming and can jumpstart the process of developing a comprehensive safety and security plan. ###### Checklist of Specific Actions for Developing Safety and Security Plans Core Element Suggested Actions --------------------------------------------- ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Institutional commitment Ensure that safety and security are institutional prioritiesIdentify a safety and security champion or team and an institutional liaisonCreate a mission statement related to security, specifically related to the institution\'s commitment to the safety and security of the students and staffEstablish goals and objectives for the global health programIdentify what resources and institutional support are needed to ensure the security of staff and studentsCreate open communication avenues with leadership on security and safety during international travel Trainee and faculty participation Secure and mandate full participation from all trainees and facultyEstablish a culture of expecting safety and securityConsider requiring participants to sign safety and security pledges Safety and security assessment and analysis Create processes and procedures to continuously monitor and evaluate risks and assess threats at destination sitesConduct an initial assessment of safety and security at destination sites and update these assessments regularlyCreate incident reporting protocolsCreate databases for reporting incidents (e.g., injuries, accidents, incidents and near misses, police reports, daily logs)Consider identifying trainee and faculty safety and security profiles (e.g., related medical, cultural, and psychological profiles) and an algorithm for matching individuals to appropriate destination, training, and work sites Risk and hazard prevention Create processes and programs to mitigate and control known hazards (e.g., physical changes to compounds such as gates, fences, barriers, window bars, and improved lighting)Create and implement communication response and recovery procedures and protocolsAssess what supplies and kits are needed at various work locations, lodgings, and health or medical work sitesIdentify partners that provide travel insurance and evacuation servicesEnsure travelers have received appropriate immunizations and required medicationsInform travelers about what to do if they become ill at the destination siteWork with the local organizations where faculty and students are placed to ensure they also have safety and security plans in placeEnsure that trainees and faculty have received appropriate immunizations and have all recommended medications and medical supplies (e.g. malaria prophylaxis, for travelers\' diarrhea, HIV PEP-kits, gloves, syringes, etc.) Safety training Provide pre-departure travel safety and security training to all staff (whether they travel or not) involved, in classrooms, hands-on workshops, or onlineConsider having access to trauma-informed care for returning travelers who may need itProvide training in risk recognition and control, and what to do in an emergencyProvide a written safety and security plan to all travelers that includes all policies and proceduresMake sure security policies address country-specific issues as well as problems that may arise among team members, such as sexual assaultProvide frequent opportunities to discuss safety and security concerns, practice skills, and demonstrate competency Program evaluation Create mechanisms for recordkeeping and accurate logging of injuries, illnesses, fatalities, incidents, assaults, hazards, corrective actions, interventions, and trainingCreate protocols for regular assessment of incident severity, and identify trends, patterns, and methods of addressing incidentsContinuously monitor and modify methods of risk assessment, intervention, and training needs to identify deficiencies and opportunities for improvementDesign surveys and post-travel debriefing for all returning staffCreate success measures and outcomes and work on tracking successful implementationIf feasible, request outside consultation from law enforcement or safety and security expertsBeyond checking whether safety and security training programs exist, assess the quality and effectiveness of the programs We propose a list of specific actions for institutions and individuals at all levels to help jumpstart the process of developing a comprehensive safety and security plan. Individual Responsibility {#s3.3} ------------------------- Travelers themselves must be prepared before departure, understand the risks, plan for emergencies, and understand their roles and responsibilities in emergencies. It is the duty of supervisors and program directors to ensure that students, residents, and faculty are empowered to ask questions---and that host institutions (e.g., schools, agencies, programs, facilities) are prepared to answer them. Questions that prospective travelers should consider asking their host *and* sponsoring institution: What are you doing to enhance my safety and security?What are the threats I may face where I am going?What safety and security questions should I ask?How do I find out if now is the right time to go?What should I look out for (regarding safety and security protocols) when selecting a small organization to travel with?What should I look for in regard to food and lodging?What are the communication procedures should problems arise?Are there added services and costs for enhanced safety measures?Should I engage in safety and security training with an outside group?Should I purchase travelers insurance?Does my health insurance cover conditions encountered abroad?Should I purchase security evacuation insurance? Are there protocols for medical evacuation?What security responsibilities will be required of me?What incidents have you had in the past and how did you handle them?What safety and security protocols are in place in case of an unexpected event? The U.S. Department of State issues travel warnings and alerts online to assist travelers with travel plans to any country in the world (see <https://travel.state.gov/content/passports/en/alertswarnings.html>). For example, travel warnings are issued when there are unstable government conditions, civil war, ongoing intense crime or violence, or terrorist attacks, while travel alerts are for short-term events such as election seasons when strikes and demonstrations are likely to happen and health alerts such as disease outbreaks. It also hosts a free service called \"Smart Traveler Enrollment Program\" (STEP) that allows U.S. citizens and nationals traveling abroad to enroll their trip with the nearest U.S. Embassy or Consulate (see <https://step.state.gov/step>/). The service provides travelers important information about safety conditions in the destination country and helps the U.S. Embassy, family, and friends contact the traveler in an emergency. The U.S. Centers for Disease Control and Prevention provides a host of travel resources on its website, including information about vaccinations (see <http://wwwnc.cdc.gov/travel/page/resources-for-travelers>). CONCLUSION {#s4} ========== As the number of students, residents, and faculty engaged in global health grows, we need to promote a serious dialogue on the topic of safety and security abroad. We must exchange ideas and best practices, conduct joint research, and learn from each other and from organizations with a proven track record of ensuring the safety and security of their staff. A recent webinar by the Consortium of Universities for Global Health addressed some of these issues and is a welcome step in the right direction (<http://www.cugh.org/events/rules-road-global-health-safety-and-security-deploying-students-staff-and-clinicians-overseas>). However, more needs to be done. We urge global health program directors of all disciplines and specialties to take this issue very seriously. We encourage all health profession education organizations, specialty societies, and global health organizations to start synchronizing preparedness efforts and create unified protocols, manuals, checklists, standardized security procedures, or best practices and share them freely with those who lack the capacity to create their own. We also call on global health and health profession education conference organizers to make this issue a routine part of their call for proposals. Additionally, researchers and scholars should be encouraged to collect and publish case reports, develop best practice recommendations, and design studies looking at the effectiveness of safety plans and security training for the global health workforce at large. Small portions of this manuscript were included in the following presentation: Eastman A, Mishori R. Violence towards health care workers in conflict and non-conflict global health settings: current trends, operating environment, and situational awareness. Presented at: AAFP Annual Global Health Workshop; 2015 Oct; Denver, CO. **Peer Reviewed** **Competing Interests:** None declared. **Cite this article as:** Mishori R, Eastman A, Evert J. Improving the safety and security of those engaged in global health traveling abroad. Glob Health Sci Pract. 2016;4(4):522--528. <http://dx.doi.org/10.9745/GHSP-D-16-00203>
City may add more land to redevelopment areas Vista may double the size of its redevelopment areas – land designated as blighted because of deteriorating infrastructure, city code violations or crime – to encompass nearly 40 percent of the city. The Planning Commission voted unanimously Tuesday night to approve a preliminary boundary change. A public hearing on a final plan for the redevelopment area is scheduled before the City Council sometime in June. In the meantime, the city will hold town-hall meetings in January and May to listen to residents' opinions on the proposed boundary change and what it might mean for them. “There's a lot of opportunities in Vista for redevelopment,” said Jeff Zinner, Vista's redevelopment and housing manager. “In order for us to accomplish our redevelopment goals, this is something that we need to undertake.” Vista's median household income of $63,162 is the second-lowest among North County cities, according to the San Diego Association of Governments, and finding the money to fix streets and other infrastructure can be a challenge. Cities declare redevelopment areas as a way to raise funds to fix blight, using what is known as “tax increment” to pay for projects. The increment is the additional property tax collected in a redevelopment area over time. “It's kind of a win-win,” Zinner said. “If we do redevelopment, we actually create more revenue to do more redevelopment.” Some of the areas included in the proposed new boundaries are Vista's oldest sections – including Townsite, a predominantly Latino neighborhood – with deteriorating roads, patchwork sidewalks, no streetlights and unsightly overhead power lines. In some cases, new developments stand next to older commercial strips or vacant lots that would be within the new boundaries. Twenty years ago, Vista established its redevelopment areas, sweeping about 19 percent of the city, or 2,100 acres, into the boundaries. Now, projects such as Vista Village and the Vista Business Park stand in some of those places. The new boundaries would add an additional 18 percent, or 1,900 acres, of the city. With the change, Vista could use redevelopment funds to install sidewalks, curbs, gutters, and streetlights in older residential neighborhoods and upgrade commercial corridors that have been slow to develop, Zinner said. “In some areas, the boundaries were too narrow or too shallow to do larger-scale, feasible development,” Zinner said. “Expanding the project area gives us an opportunity to enhance our redevelopment efforts.” At Tuesday's meeting, Planning Commissioner Nick Ashcraft said he was surprised to see so many residential areas included in the proposal. Commission Chairman John Aguilera asked whether more areas could be added. As the plan develops and heads to the council in June, the city plans to have a “project area committee,” consisting of possibly nine community members, to serve as an advisory group. The council is expected to consider that proposal next week. Among its responsibilities, the committee would assess environmental studies of the redevelopment area, and advise the council on issues such as whether eminent domain should be used.
#include "RecoTracker/Record/interface/MultiRecHitRecord.h" #include "FWCore/Framework/interface/eventsetuprecord_registration_macro.h" EVENTSETUP_RECORD_REG(MultiRecHitRecord);
New York Times columnist Paul Krugman writes that regardless of the election outcome, the Republican Party will remain wedded to the issues that propelled the rise of GOP nominee Donald Trump. After all, what we learned during the Republican primary was that the party’s base doesn’t care at all about what the party establishment says: Jeb Bush (remember him?), the initial insider choice, got nowhere despite a giant war chest, and Mr. Rubio, who succeeded him as the establishment favorite, did hardly better. Nor does the base care at all about supposed conservative principles like small government. What Republican voters wanted, instead, were candidates who channeled their anger and fear, who demonized nonwhites and played into dark conspiracy theories. (Even establishment candidates did that — never forget that Mr. Rubio accused President Obama of deliberately hurting America.) Just in case you had any doubts about that political reality, a Bloomberg poll recently asked Republicans whose view better matched their own view of what the party should stand for: Paul Ryan or Donald Trump. The answer was Mr. Trump, by a wide margin. This lesson hasn’t been lost on Republican politicians. Even if Mr. Trump loses bigly, they’ll know that their personal fortunes will depend on maintaining an essentially Trumpist line. Otherwise they will face serious primary challenges and/or be at risk of losing future elections when base voters stay home.
Q: How to align the legend box to the middle of legend title in ggplot2? By default the legend box/key is aligned to the left of the legend title. Since I have quite long legend title, I want to align it to the center instead. I have tried theme and guide_legend without any success. Any suggestion would be appreciated. Thanks! Data df <- structure(list(Flow = c(0.992762, 0.802408, 0.9826, 0.754863, 0.174542, 0.056777), Coef = c(0.62, 0.49, 0.38, 0.59, 0.25, 0.67 ), VeryLongLegendTitle = c(4.47680710313542, 18.8500193246859, 5.82742564783431, 23.3217237977105, 13.0155332302148, 88.4960885143824 )), class = "data.frame", row.names = c(NA, -6L), .Names = c("Flow", "Coef", "VeryLongLegendTitle")) Code library(ggplot2) p1 <- ggplot(df, aes(x = Flow, y = Coef, color = VeryLongLegendTitle)) + xlab(NULL) + scale_x_continuous(limits = c(0.0, 1.0), breaks = c(0.25, 0.75)) + geom_point(size = 2, alpha = 0.8) + theme_bw(base_size = 14) + theme(axis.text.x = element_text(angle = 0, vjust = 0.5)) p1 p1 + theme(legend.title.align = 0.5) p1 + theme(legend.title = element_text(hjust = 0.5)) p1 + guides(color = guide_legend(title.hjust = 0.5)) Plot A: Borrow the solution from this workaround library(ggplot2) library(gtable) library(grid) long1 <- ggplot(df, aes(x = Flow, y = Coef, color = VeryLongLegendTitle)) + xlab(NULL) + scale_x_continuous(limits = c(0.0, 1.0), breaks = c(0.25, 0.75)) + geom_point(size = 2, alpha = 0.8) + theme_bw(base_size = 14) + theme(axis.text.x = element_text(angle = 0, vjust = 0.5)) # extract legend g <- ggplotGrob(long1) grobs <- g$grobs legend_index <- which(sapply(grobs, function(x) x$name) == "guide-box") legend <- grobs[[legend_index]] # extract guides table guides_index <- which(sapply(legend$grobs, function(x) x$name) == "layout") guides <- legend$grobs[[guides_index]] # add extra column for spacing # guides$width[5] is the extra spacing from the end of the legend text # to the end of the legend title. If we instead distribute it 50:50 on # both sides, we get a centered legend guides <- gtable_add_cols(guides, 0.5*guides$width[5], 1) guides$widths[6] <- guides$widths[2] title_index <- guides$layout$name == "title" guides$layout$l[title_index] <- 2 # reconstruct legend and write back legend$grobs[[guides_index]] <- guides g$grobs[[legend_index]] <- legend grid.newpage() grid.draw(g) Created on 2018-03-18 by the reprex package (v0.2.0).
I can't imagine living somewhere that donair pizza wasn't a thing. Yet in parts of Canada you can't get good donair pizza! As my first Year of Donair post, let's take a moment to celebrate some donair pizza.
featured SINGAPORE, Aug 3- Noble Group Ltd, Asia's biggest commodity trader, said it has been approached by a number of parties about potential financing and investment options and refuted rumours that it would not be able to fund a $735 million bond redemption due this week. Singapore- listed Noble has been grappling with waning investor confidence this year after being... More The House has passed and sent to President Barack Obama a bill raising the lending authority for the Small Business Administration's biggest loan program, known as the 7 program. The bill, passed earlier by the Senate, raises the lending limit to $23.5 billion. Last year, the SBA didn't approach the limit until September, but Congress raised the ceiling before it... LONDON, July 28- Cerberus, the private equity firm named after the mythical three-headed dog guarding the gates of Hades, is leading a charge by U.S. investors who are snapping up European loans at knockdown prices. New York- based Cerberus Capital Management has bought more than 27 billion euros of European loans in the last 2-1/ 2 years, acting along with rivals... General Motors decided to replace Ally with its current in-house financing arm, General Motors Financial Co Inc, for subsidized leases on Buick, GMC and Cadillac vehicles, beginning February. The company reported a net income of $182 million, a loss of $2.22 on a per share basis, compared with a year-ago profit of $323 million, or 54 cents per share. Lee Lum, 36, had pleaded guilty to wire fraud. Lee Lum was a partner in the New Jersey leasing company, which would obtain loans for its clients through a financing firm, prosecutors said. From October 2011 through May 2012, Lee Lum forged clients' signatures on loan documents and submitted them to the financing company. SHANGHAI, July 27- The China Securities Financial Corporation returned some of the funds it borrowed from commercial banks intended to stabilise the stock market ahead of schedule, three people in the banking industry with direct knowledge told Reuters. The news comes after Chinese markets posted their worst performance since 2007 on Monday, as investors... The Small Business Administration's 7 loan reached the limit set by Congress on the amount of money it can guarantee in a fiscal year. At midday Thursday, the agency reached the $18.75 billion limit set by Congress on the amount of 7 loans it can guarantee in a fiscal year, with more than two months to go before the year ends Sept. 30. Congress must raise the 7 ceiling... WASHINGTON, July 23- The U.S. Small Business Administration said it reached the $18.75 billion cap for its main loan guarantee program on Thursday, forcing it to halt the funding of new loans with more than two months left in the fiscal year. U.S. Senate Small Business Committee Chairman David Vitter, a Republican, told SBA Administrator Maria Contreras-Sweet in a... WASHINGTON, July 23- The U.S. Small Business Administration said it reached the $18.75 billion cap for its main loan guarantee program on Thursday, forcing it to halt the funding of new loans with more than two months to go in the current fiscal year. SBA spokesman Miguel Ayala said the capacity for fiscal 2015 was exceeded by stronger-than-anticipated demand... The Small Business Administration's biggest lending program is on hold after the SBA ran out of money for loan guarantees. The agency on Thursday reached the $18.75 billion limit set by Congress on the amount of loans it can back in a fiscal year. That could happen if Congress raises the ceiling on the program, which backs what are called 7 loans. MUMBAI, July 23- With only a tiny share of the world's fastest-growing major smartphone market, Apple Inc is stepping up its push into India, with a first targeted TV advertising campaign, expanded retail network and promotional financing schemes. For years, India has been a low priority for Apple as spending power is weaker than in China, where the company's... WASHINGTON, July 22- The banking arm of Discover Financial Services agreed to pay $18.5 million in consumer refunds and penalties on Wednesday to settle allegations of illegal practices tied to its student loan servicing business, a U.S. regulator said. The Consumer Financial Protection Bureau said that Discover Bank overstated the minimum amounts due on... Congress would have to approve any increase in the lending authority. SBA Administrator Maria Contreras-Sweet last month asked Congress to raise the limit to $22.5 billion. Nydia Velazquez, D- N.Y., the most senior Democrat on the House Small Business Committee was introducing a bill that would raise the lending limit to $23.5 billion, and warned that without an... Executives from both JPMorgan Chase& Co. and Wells Fargo& Co. told investors last week, when posting earnings, that they were increasingly concerned about loans to oil and gas companies. Texas bank Comerica Inc on Friday set aside about three times as much money to cover bad loans as analysts had expected, sending the regional bank's shares lower by more than 6... HONG KONG/ BEIJING, July 20- A plan to raise 100 billion yuan via short-term bills by China Securities Finance Corp, the state-backed institution that provides margin financing and liquidity to the market, has been delayed, four sources familiar with the matter told Reuters on Monday. Reuters could not reach China Securities Finance Corp for comment. A&P, which was founded in 1859 by George Huntington Hartford and George Gilman, began operations as the Great American Tea Co. Its first store, on Vesey Street in Manhattan, sold coffee, tea and spices at low prices, according to its website. The grocer has received debtor-in-possession financing of $100 million from Fortress Credit Corp, court documents show. *China's corporate debt 160 pct of GDP, twice U.S. level. HONG KONG, July 19- Beijing may have averted a crisis in its stock markets with heavy-handed intervention, but the world's biggest corporate debt pile- $16.1 trillion and rising- is a much greater threat to its slowing economy and will not be so easily managed. Corporate China's debts, at 160 percent of GDP, are... HONG KONG/ BEIJING, July 17- China's central bank will inject $48 billion into the country's biggest policy lender, China Development Bank Corp, two sources with direct knowledge of the matter told Reuters on Friday, as China steps up reforms at its policy banks to fight an economic slowdown. Set up in 1994, CDB is responsible for financing China's large... SAO PAULO, July 16- The auction on Friday of a concession to build and operate an estimated 7 billion reais power transmission line in Brazil is not expected to attract many participants, due to limited financing for Brazilian companies, according to consultants and company officials. "It is a lot of money, and since financing in Brazil these days is really scarce,... The bank had been ready to increase Emergency Liquidity Assistance after Athens approved the bailout deal but it first needs to ensure that Greece has the temporary financing to repay a 3.5 billion euro plus interest payment due to the ECB on Monday. Uncertainty over Greece, the longer term viability of the currency block and persistent suggestions from...
259 Md. 479 (1970) 270 A.2d 645 THE MACKE COMPANY v. PIZZA OF GAITHERSBURG, INC. ET AL. [No. 44, September Term, 1970.] Court of Appeals of Maryland. Decided November 10, 1970. *481 The cause was argued before HAMMOND, C.J., and BARNES, FINAN, SINGLEY, SMITH and DIGGES, JJ. James S. McAuliffe, Jr., and William J. Rowan, III, with whom were Heeney, McAuliffe & McAuliffe on the brief, for appellant. John C. Tracey for appellees. SINGLEY, J., delivered the opinion of the Court. The appellees and defendants below, Pizza of Gaithersburg, Inc.; Pizzeria, Inc.; The Pizza Pie Corp., Inc. and Pizza Oven, Inc., four corporations under the common ownership of Sidney Ansell, Thomas S. Sherwood and Eugene Early and the same individuals as partners or proprietors (the Pizza Shops) operated at six locations in Montgomery and Prince George's Counties. The appellees had arranged to have installed in each of their locations cold drink vending machines owned by Virginia Coffee Service, Inc., and on 30 December 1966, this arrangement was formalized at five of the locations, by contracts for terms of one year, automatically renewable for a like term in the absence of 30 days' written notice. A similar contract for the sixth location, operated by Pizza of Gaithersburg, Inc., was entered into on 25 July 1967. On 30 December 1967, Virginia's assets were purchased by The Macke Company (Macke) and the six contracts were assigned to Macke by Virginia. In January, 1968, the Pizza Shops attempted to terminate the five contracts having the December anniversary date, and in February, the contract which had the July anniversary date. Macke brought suit in the Circuit Court for Montgomery County against each of the Pizza Shops for damages for breach of contract. From judgments for the defendants, Macke has appealed. The lower court based the result which it reached on two grounds: first, that the Pizza Shops, when they contracted with Virginia, relied on its skill, judgment and *482 reputation, which made impossible a delegation of Virginia's duties to Macke; and second, that the damages claimed could not be shown with reasonable certainty. These conclusions are challenged by Macke. In the absence of a contrary provision — and there was none here — rights and duties under an executory bilateral contract may be assigned and delegated, subject to the exception that duties under a contract to provide personal services may never be delegated, nor rights be assigned under a contract where delectus personae was an ingredient of the bargain.[1] 4 Corbin on Contracts § 865 (1951) at 434; 6 Am.Jur.2d, Assignments § 11 (1963) at 196. Crane Ice Cream Co. v. Terminal Freezing & Heating Co., 147 Md. 588, 128 A. 280 (1925) held that the right of an individual to purchase ice under a contract which by its terms reflected a knowledge of the individual's needs and reliance on his credit and responsibility could not be assigned to the corporation which purchased his business. In Eastern Advertising Co. v. McGaw & Co., 89 Md. 72, 42 A. 923 (1899), our predecessors held that an advertising agency could not delegate its duties under a contract which had been entered into by an advertiser who had relied on the agency's skill, judgment and taste. The six machines were placed on the appellees' premises under a printed "Agreement-Contract" which identified the "customer," gave its place of business, described the vending machine, and then provided: "TERMS "1. The Company will install on the Customer's premises the above listed equipment and will maintain the equipment in good operating order and stocked with merchandise. "2. The location of this equipment will be such *483 as to permit accessibility to persons desiring use of same. This equipment shall remain the property of the Company and shall not be moved from the location at which installed, except by the Company. "3. For equipment requiring electricity and water, the Customer is responsible for electrical receptacle and water outlet within ten (10) feet of the equipment location. The Customer is also responsible to supply the Electrical Power and Water needed. "4. The Customer will exercise every effort to protect this equipment from abuse or damage. "5. The Company will be responsible for all licenses and taxes on the equipment and sale of products. "6. This Agreement-Contract is for a term of one (1) year from the date indicated herein and will be automatically renewed for a like period, unless thirty (30) day written notice is given by either party to terminate service. "7. Commission on monthly sales will be paid by the Company to the Customer at the following rate: * * *." The rate provided in each of the agreements was "30% of Gross Receipts to $300.00 monthly [,] 35% over [$]300.00," except for the agreement with Pizza of Gaithersburg, Inc., which called for "40% of Gross Receipts." We cannot regard the agreements as contracts for personal services. They were either a license or concession granted Virginia by the appellees, or a lease of a portion of the appellees' premises, with Virginia agreeing to pay a percentage of gross sales as a license or concession fee or as rent, see Charlotte Coca-Cola Bottling Co. v. Shaw, 232 N.C. 307, 59 S.E.2d 819 (1950) and Herbert's Laurel-Ventura, Inc. v. Laurel Ventura Holding Corp., 58 Cal. App.2d 684, 138 P.2d 43, 46-47 (1943), and were assignable by Virginia unless they imposed on Virgina duties *484 of a personal or unique character which could not be delegated, S & L Vending Corp. v. 52 Thompkins Ave. Restaurant, Inc., 274 N.Y.S.2d 697, 26 App.Div.2d 935 (1966). The appellees earnestly argue that they had dealt with Macke before and had chosen Virginia because they preferred the way it conducted its business. Specifically, they say that service was more personalized, since the president of Virginia kept the machines in working order, that commissions were paid in cash, and that Virginia permitted them to keep keys to the machines so that minor adjustments could be made when needed. Even if we assume all this to be true, the agreements with Virginia were silent as to the details of the working arrangements and contained only a provision requiring Virginia to "install * * * the above listed equipment and * * * maintain the equipment in good operating order and stocked with merchandise." We think the Supreme Court of California put the problem of personal service in proper focus a century ago when it upheld the assignment of a contract to grade a San Francisco street: "All painters do not paint portraits like Sir Joshua Reynolds, nor landscapes like Claude Lorraine, nor do all writers write dramas like Shakespeare or fiction like Dickens. Rare genius and extraordinary skill are not transferable, and contracts for their employment are therefore personal, and cannot be assigned. But rare genius and extraordinary skill are not indispensable to the workmanlike digging down of a sand hill or the filling up of a depression to a given level, or the construction of brick sewers with manholes and covers, and contracts for such work are not personal, and may be assigned." Taylor v. Palmer, 31 Cal. 240 at 247-48 (1866). See also Devlin v. Mayor, Aldermen and Commonalty of the City of New York, 63 N.Y. 8, at 17 (1875). Moreover, *485 the difference between the service the Pizza Shops happened to be getting from Virginia and what they expected to get from Macke did not mount up to such a material change in the performance of obligations under the agreements as would justify the appellees' refusal to recognize the assignment, Crane Ice Cream Co. v. Terminal Freezing & Heating Co., supra, 147 Md. at 588. In support of the proposition that the agreements were for personal services, and not assignable, the Pizza Shops rely on three Supreme Court cases, Burck v. Taylor, 152 U.S. 634, 14 S.Ct. 696, 38 L.Ed. 578 (1894); Delaware County Comm'rs v. Diebold Safe & Lock Co., 133 U.S. 473, 10 S.Ct. 399, 33 L.Ed. 674 (1890); and Arkansas Valley Smelting Co. v. Belden Mining Co., 127 U.S. 379, 8 S.Ct. 1308, 32 L.Ed. 246 (1888), all of which were cited with approval by our predecessors in Tarr v. Veasey, 125 Md. 199, 207, 93 A. 428 (1915). We find none of these cases persuasive. Burck held that the contractor for the state capitol in Texas, who was prohibited by the terms of his contract from assigning it without the state's consent, could not make a valid assignment of his right to receive three-fourths of the proceeds. In Delaware County, Diebold Safe and Lock, which was a subcontractor in the construction of a county jail, was barred from recovering from the county commissioners for its work on the theory that there had been a partial assignment of the construction contract by the prime contractor, which had never been assented to by the commissioners. This result must be limited to the facts: i.e., to the subcontractor's right to recover under the assignment, and not to the contractor's right to delegate. See Taylor v. Palmer and Devlin v. Mayor, Aldermen and Commonalty of the City of New York, both supra. Arkansas Valley, which held invalid an attempt to assign a contract for the purchase of ore, is clearly distinguishable, because of a contract provision which stipulated that payment for the ore was to be made after delivery, based on an assay to be made by the individual purchaser named in the contract. The court concluded that this was a confidence imposed *486 in the individual purchaser's credit and responsibility and that his rights under the contract could not be transferred to another. Tarr v. Veasey involved a situation where duties were delegated to one person and rights assigned to another and our predecessors held the rights not to be assignable, because of the parties' intention that duties and rights were interdependent. We find more apposite two cases which were not cited by the parties. In The British Waggon Co. & The Parkgate Waggon Co. v. Lea & Co., 5 Q.B.D. 149 (1880), Parkgate Waggon Company, a lessor of railway cars, who had agreed to keep the cars "in good and substantial repair and working order," made an assignment of the contract to British Waggon Company. When British Waggon Company sued for rent, the lessee contended that the assignment had terminated the lease. The court held that the lessee remained bound under the lease, because there was no provision making performance of the lessor's duty to keep in repair a duty personal to it or its employees. Except for the fact that the result has been roundly criticized, see Corbin, supra, at 448-49, the Pizza Shops might have found some solace in the facts found in Boston Ice Co. v. Potter, 123 Mass. 28 (1877). There, Potter, who had dealt with the Boston Ice Company, and found its service unsatisfactory, transferred his business to Citizens' Ice Company. Later, Citizens' sold out to Boston, unbeknown to Potter, and Potter was served by Boston for a full year. When Boston attempted to collect its ice bill, the Massachusetts court sustained Potter's demurrer on the ground that there was no privity of contract, since Potter had a right to choose with whom he would deal and could not have another supplier thrust upon him. Modern authorities do not support this result, and hold that, absent provision to the contrary, a duty may be delegated, as distinguished from a right which can be assigned, and that the promisee cannot rescind, if the quality of the performance remains materially the same. *487 Restatement, Contracts § 160 (3) (1932) reads, in part: "Performance or offer of performance by a person delegated has the same legal effect as performance or offer of performance by the person named in the contract, unless, (a) performance by the person delegated varies or would vary materially from performance by the person named in the contract as the one to perform, and there has been no * * * assent to the delegation * * *." In cases involving the sale of goods, the Restatement rule respecting delegation of duties has been amplified by Uniform Commercial Code § 2-210 (5), Maryland Code (1957, 1964 Repl. Vol.) Art. 95B § 2-210 (5), which permits a promisee to demand assurances from the party to whom duties have been delegated. See also, "The Uniform Commercial Code and Contract Law: Some Selected Problems," 105 U. of Pa. L.R. 837, at 913-16 (1957); Noblett v. General Electric Credit Corp., 400 F.2d 442 (10th Circ., 1968), cert. denied 393 U.S. 935, 89 S.Ct. 295, 21 L.Ed.2d 271 (1968). As we see it, the delegation of duty by Virginia to Macke was entirely permissible under the terms of the agreements. In so holding, we do not put ourselves at odds with Eastern Advertising Co. v. McGaw, supra, 89 Md. 72, for in that case, the agreement with the agency contained a provision that "the advertising cards were to be `subject to the approval of Eastern Advertising Company as to style and contents'", at 82, which the court found to import that reliance was being placed on the agency's skill, judgment and taste, at 88. Having concluded that the Pizza Shops had no right to rescind the agreements, we turn to the question of damages. The assessment of damages for loss of profits following the breach of an executory contract has been a relatively recent development, Prescon Corp. v. Savoy Constr. *488 Co., 259 Md. 52, 267 A.2d 222 (1970); American Motor Inns, Inc. v. A.W.L. Advertising Agency, Inc., 253 Md. 654, 254 A.2d 191 (1969); Stuart Kitchens, Inc. v. Stevens, 248 Md. 71, 234 A.2d 749 (1967); M & R Contractors & Builders, Inc. v. Michael, 215 Md. 340, 138 A.2d 350 (1958); Evergreen Amusement Corp. v. Milstead, 206 Md. 610, 112 A.2d 901 (1955); J.A. Laporte Corp. v. Pennsylvania-Dixie Cement Corp., 164 Md. 642, 165 A. 195 (1933). Under the concept of "foreseeability" enunciated by Hadley v. Baxendale, 9 Ex. 341, 156 Eng. Rep. 145 (1854), which was followed in United States Telegraph Co. v. Gildersleve, 29 Md. 232 (1868), in order to recover unrealized profits a plaintiff had to show that the breach of contract caused the loss and that the loss of profits was in the contemplation of the parties and the probable result of a breach. Some of the early American cases superimposed a test of certainty on the concept of foreseeability. See, for example, Griffin v. Colver, 16 N.Y. 489, 69 Am. Dec. 718 (1858), which was cited with approval in United States Telegraph, supra. In the last hundred years, however, courts have modified the rule that anticipated profits were not an element of damages because of their inherent uncertainty, see "Speculative Profits as Damages for Breach of Contract," 46 Harv.L.Rev. 696 (1933), and have turned from the requirement of "certainty" to a more flexible test of "reasonable certainty." See Restatement, Contracts § 311 (1932); 11 Williston on Contracts § 1345 (3d ed. 1968) at 231; 5 Corbin on Contracts § 1020 (1964) at 124. This Court, speaking through Judge Horney in M & R Contractors & Builders, Inc. v. Michael, supra, 215 Md. 340, said: "Courts have modified the `certainty' rule into a more flexible one of `reasonable certainty'. In such instances, recovery may often be based on opinion evidence, in the legal sense of that term, from which liberal inferences may be drawn. *489 Generally, proof of actual or even estimated costs is all that is required with certainty. "Some of the modifications which have been aimed at avoiding the harsh requirements of the `certainty' rule include: (a) if the fact of damage is proven with certainty, the extent or the amount thereof may be left to reasonable inference; (b) where a defendant's wrong has caused the difficulty of proving damage, he cannot complain of the resulting uncertainty; (c) mere difficulty in ascertaining the amount of damage is not fatal; (d) mathematical precision in fixing the exact amount is not required; (e) it is sufficient if the best evidence of the damage which is available is produced; and (f) the plaintiff is entitled to recover the value of his contract as measured by the value of his profits. McCormick, Damages, Sec. 27 (1935)." at 348-49. To recover direct profits in a case such as this, the measure of damages is the difference between what it would have cost Macke to perform and what it would have received had the Pizza Shops not repudiated, M & R Contractors & Builders, Inc. v. Michael, supra, 215 Md. at 346; J.A. Laporte Corp. v. Pennsylvania-Dixie Cement Corp., supra, 164 Md. at 648. We can understand why the court below was "not satisfied that the claim for damages [was] shown with reasonable certainty, since it [was] based upon conjecture." Macke attempted to prove damages by the testimony of two witnesses. The first was Arnold Harlem, the general manager of Macke's Chesapeake area, in which the Pizza Shops were located. His testimony related to gross sales figures for the cold drink vending machines at the six locations for the month of January, 1968, when the machines were still under Macke's control. He produced a computer print-out (which was not introduced in evidence) in support of his statement that Macke's cost of *490 goods for January 1968 was 23.62% of gross sales. From this testimony, it might have been possible to extrapolate what Macke's profit would have been on five of the machines for the 11 months commencing 1 February 1968 and ending 31 December 1968 and on one of the machines for the period February 1968 to 24 July 1968 when the Virginia agreements respectively ended, assuming that cold drink sales in the Pizza Shops remained uniform during the year, as Mr. Harlem said they did, and that cost of goods did not vary. No such extrapolation was introduced in evidence, but one had been supplied in answer to an interrogatory. For some unaccountable reason, it projected sales and profits for 10 months only, included the Gaithersburg location for five months, which, for reasons to be developed, should not have been included at all, and failed to reflect that five of the agreements provided for an increase in commission rates from 30% to 35% on gross receipts in excess of $300 in any month. Macke then called Thomas S. Sherwood, one of the individual defendants, as an adverse witness. He testified, without objection, to the commissions received by five of the Pizza Shops during the calendar year 1967, and by the sixth shop, at Gaithersburg, for the last five months of that year. Based on this testimony, Macke's counsel prepared, and submitted to the court, a "Memorandum of Damages Claimed," an extrapolation of 1967 figures intended to show profits lost in 1968. The fact that the projection from Harlem's testimony showed lost profits of $5,286.80,[2] and the extrapolation from Sherwood's testimony showed lost profits of $9,047.00[3] was surely enough to give the lower court pause. Factually, the situation was not dissimilar from that in Prescon Corp. v. Savoy Constr. Co., supra, 259 Md. 52, at 55, where the plaintiff attempted to establish a prima facie case of lost profits by having its vice president testify from a computer print-out which was never introduced *491 in evidence. The opinion in Prescon, delivered more than six months after the trial of the case before us, was, of course, not available to the trial court. In Prescon, we affirmed the judgment as to liability, but remanded the case so that additional evidence could be taken on the question of damages. There is ample authority for the proposition that loss of profits may be projected from past performance, Tucson Federal Savings & Loan Ass'n v. Aetna Investment Corp., 74 Ariz. 163, 245 P.2d 423 (1952); Kay Petroleum Corp. v. Piergrossi, 137 Conn. 620, 79 A.2d 829 (1951); Eastman Kodak Co. of New York v. Southern Photo Materials Co., 273 U.S. 359, 47 S.Ct. 400, 71 L.Ed. 684 (1927), assuming, of course, that past performance has continued long enough to be the best evidence of damage which is available, Eastman Kodak Co. of New York v. Southern Photo Materials Co., supra. We cannot agree with the lower court's conclusion that the claim for damages could not be shown with reasonable certainty because it was based on conjecture. For this reason, we propose to remand the case in order that damages may properly be assessed. On remand, the court may wish to take several factors into consideration. First, it seems clear to us that no damages should be allowed with respect to the repudiation of the agreement covering the vending machine at 16523 North Frederick Road, Gaithersburg. The uncontroverted testimony of the Pizza Shop's manager established that the agreement covering this machine was breached in January, 1968 by Macke's failure to stock and service the machine. Then, too, the record is deficient as regards Macke's duty to mitigate damages. Harlem's testimony as to what disposition was made of the vending machines removed from the Pizza Shops was vague and inconclusive. It may well be that the machines were placed at other locations prior to the time when the agreements would have expired by their terms, and this, of course, may have to be taken into account in assessing damages, subject, however, to the limitation that gains made by Macke could *492 not have been made, save for the breach. M & R Contractors & Builders, Inc. v. Michael, supra, 215 Md. at 355; 5 Corbin, supra §§ 1039, 1041 at 241, 256; McCormick, Handbook on the Law of Damages, § 41 (1935) at 151. Finally, it is not an implausible inference that Macke's machines were replaced in the Pizza Shops by comparable machines provided by another concern. If this is the case, a more appropriate measure of damages might be that grounded on the five Pizza Shops' actual experience for the period February through December 1968, rather than one based on extrapolating profits from the results experienced in the year 1967 or in January 1968, particularly in the light of testimony that the seating capacity of one or more of the shops may have been altered in 1967 and the conflicting testimony as to whether cold drink sales remain constant in pizza shops. Authority for the use of a defendant's future earnings as an appropriate method of determining lost profits may be found in Pace Corp. v. Jackson, 155 Tex. 179, 284 S.W.2d 340 (1955); Sinclair Refining Co. v. Jenkins Petroleum Process Co., 289 U.S. 689, 53 S.Ct. 736, 77 L.Ed. 1449 (1933). The appellees make two other points which can be summarily disposed of. The first is that the agreements were terminable at any time on 30 days' notice. A careful examination of the agreements shows that this was simply not the case, despite the fact that the president of Virginia and the Pizza Shops may have thought so. The second point is that the assignments were invalidated by Virginia's failure to comply with the provisions of the U.C.C. relating to bulk transfers, Code Art. 95B, Subtitle 6. The short answer to this is that the Pizza Shops were not creditors in the context of their relationships with Virginia, since they had control of the machines and were accountable to Virginia for their contents. Additionally, see U.C.C. § 6-102 (3) and Official Comment to this subsection, indicating that the primary thrust of the bulk transfer provisions of the U.C.C. is directed at enterprises *493 whose principal business is the sale of merchandise from stock. Judgment reversed as to liability; judgment entered for appellant for costs, on appeal and below; case remanded for a new trial on the question of damages. NOTES [1] Like all generalizations, this one is subject to an important exception. Uniform Commercial Code § 9-318 makes ineffective a term in any contract prohibiting the assignment of a contract right: i.e., a right to payment. Compare Restatement, Contracts § 151 (c) (1932). [2] The correct total should have been $5,386.80. [3] This figure included Gaithersburg for seven months.
Q: grails spring-security plugin secures all controllers instead of just ones with @Secured annotation I'm following the tutorials to use springsecurity authentication plugin. I am using grails version 2.3.8 and spring-security-core:2.0-RC2. It worked as expected to create the HelloWorld controller with the Secured annotation: package basicauthdemo import grails.plugin.springsecurity.annotation.Secured class HelloController { @Secured(['ROLE_USER']) def index() { render "Hello World" } } and then be presented with a login screen. My question is that when I created another controller without the @Secured annotation. I still get the login screen when navigating to that controller. Spring security is now in charge of all access to my controllers as I can see from the filter-mapping in the generated web.xml: <filter-mapping> <filter-name>springSecurityFilterChain</filter-name> <url-pattern>/*</url-pattern> <dispatcher>ERROR</dispatcher> <dispatcher>REQUEST</dispatcher> </filter-mapping> How to tell the plugin to allow open access to some controllers and not others? I thought that this would be determined by presence of @Secured annotation but that only defines the role with permissions for the controller. A: According to the documentation for Spring Security Core plugin the default behavior is pessimistic lockdown ... then any URL that has no request mappings (an annotation, entry in controllerAnnotations.staticRules or interceptUrlMap, or a Requestmap instance) will be denied to all users. I highly recommend reading that particular section of the documentation to see how to configure the plugin for your use. Typically this will be modifying the default value of rejectIfNoRule and configuring the appropriate staticRules.
Globally-Optimized Local Pseudopotentials for (Orbital-Free) Density Functional Theory Simulations of Liquids and Solids. The accuracy of local pseudopotentials (LPSs) is one of two major determinants of the fidelity of orbital-free density functional theory (OFDFT) simulations. We present a global optimization strategy for LPSs that enables OFDFT to reproduce solid and liquid properties obtained from Kohn-Sham DFT. Our optimization strategy can fit arbitrary properties from both solid and liquid phases, so the resulting globally optimized local pseudopotentials (goLPSs) can be used in solid and/or liquid-phase simulations depending on the fitting process. We show three test cases proving that we can (1) improve solid properties compared to our previous bulk-derived local pseudopotential generation scheme; (2) refine predicted liquid and solid properties by adding force matching data; and (3) generate a from-scratch, accurate goLPS from the local channel of a non-local pseudopotential. The proposed scheme therefore serves as a full and improved LPS construction protocol.
, 57, -41, 0, -1 in descending order. 57, 4, 0, -1, -41 Sort 2, 1, 7, -5, -1, -15. -15, -5, -1, 1, 2, 7 Put 2/5, 9, 1/10319 in increasing order. 1/10319, 2/5, 9 Sort 4336, 0.06, -3 in increasing order. -3, 0.06, 4336 Sort 203, 33, 5, -40 in increasing order. -40, 5, 33, 203 Sort 5, -11, -45. -45, -11, 5 Sort -25, 2, 9, -3, -18, -1 in increasing order. -25, -18, -3, -1, 2, 9 Sort -4/3, 2, -0.4, 0.4, 2/11 in increasing order. -4/3, -0.4, 2/11, 0.4, 2 Sort -1.046, 2, -1/2. -1.046, -1/2, 2 Put 5, 21, 22, -4, 72 in descending order. 72, 22, 21, 5, -4 Sort -0.5, -1, -2.39, 0.3, 0 in descending order. 0.3, 0, -0.5, -1, -2.39 Sort 351, -0.3, -1.13. -1.13, -0.3, 351 Put -2857, 4, -2, 1 in decreasing order. 4, 1, -2, -2857 Sort -3, -5, -177, -1, 0 in ascending order. -177, -5, -3, -1, 0 Put 3/32, -1/2132, 2 in decreasing order. 2, 3/32, -1/2132 Sort -128/5, -1/2, 0.2, 4, 0.1. -128/5, -1/2, 0.1, 0.2, 4 Sort 1, 11, -5, -689, -3. -689, -5, -3, 1, 11 Put -5306, 59, -5 in descending order. 59, -5, -5306 Sort -32, 66, 0.1, 2 in decreasing order. 66, 2, 0.1, -32 Put -5, -2837, -0.6 in descending order. -0.6, -5, -2837 Sort 10, 92, 9, -1, 0, 1. -1, 0, 1, 9, 10, 92 Sort 8, 21, -0.5, -4, -2/143 in ascending order. -4, -0.5, -2/143, 8, 21 Sort 2/5, 48.4, -3, -114, -1 in descending order. 48.4, 2/5, -1, -3, -114 Sort -3, 4, 110067 in increasing order. -3, 4, 110067 Sort 64, -4, 944 in increasing order. -4, 64, 944 Sort 0.03, 0.1, 6.11, 0.5, 0 in descending order. 6.11, 0.5, 0.1, 0.03, 0 Put -377, 244, 1, -1 in decreasing order. 244, 1, -1, -377 Sort 1, -4, -103020 in decreasing order. 1, -4, -103020 Sort -7/13, -2150, 0.5 in increasing order. -2150, -7/13, 0.5 Put -1, -4, 13382, -5, 7 in ascending order. -5, -4, -1, 7, 13382 Sort 0.07206, -0.083, 0.05 in decreasing order. 0.07206, 0.05, -0.083 Sort 19, 3, 1, -3, 63, 0. -3, 0, 1, 3, 19, 63 Sort 5, 14, 2, 138, 3 in descending order. 138, 14, 5, 3, 2 Put -3, 7, -2, -5, 57 in descending order. 57, 7, -2, -3, -5 Put -1/41, 4, 179.3 in ascending order. -1/41, 4, 179.3 Put 0.2, -6048, 2/11, -2 in decreasing order. 0.2, 2/11, -2, -6048 Put -3, 1, -213, 0 in ascending order. -213, -3, 0, 1 Sort 89, 10, 12 in decreasing order. 89, 12, 10 Put -14, 5, -2, -18 in descending order. 5, -2, -14, -18 Put 0.0267, 0.04, 3, 4, -0.1 in descending order. 4, 3, 0.04, 0.0267, -0.1 Sort 5, -0.1, -2, -0.4, 1/3, -68608 in decreasing order. 5, 1/3, -0.1, -0.4, -2, -68608 Put -1/6, 19, -6472, 0.02 in increasing order. -6472, -1/6, 0.02, 19 Sort -1/10, 40, 1/2, -2/13 in increasing order. -2/13, -1/10, 1/2, 40 Put -9, -7620, 5, -4, 0 in increasing order. -7620, -9, -4, 0, 5 Sort -6/11, -1/6, 0.164, 0 in decreasing order. 0.164, 0, -1/6, -6/11 Sort -33, 5, -208, 2, -1/4. -208, -33, -1/4, 2, 5 Sort -24/17, -2, 5, 2. -2, -24/17, 2, 5 Put -59906, 2, -4, 0 in decreasing order. 2, 0, -4, -59906 Sort -3, -6, 3, 2, -77 in increasing order. -77, -6, -3, 2, 3 Sort 22, -59, 3, 10. -59, 3, 10, 22 Sort 1, -4, -24371 in ascending order. -24371, -4, 1 Sort -4, -5936, 3 in increasing order. -5936, -4, 3 Sort -185, -1, 11, -7 in descending order. 11, -1, -7, -185 Sort 5, 17, -1, -18. -18, -1, 5, 17 Sort -20, -1.8, 0.03 in descending order. 0.03, -1.8, -20 Put 2.53, -0.3, 13 in decreasing order. 13, 2.53, -0.3 Sort 2/9, 3, -0.3, -7, 102/373, 0 in decreasing order. 3, 102/373, 2/9, 0, -0.3, -7 Put -1, -3, 5, -10, -84 in decreasing order. 5, -1, -3, -10, -84 Sort -6, -8, 3, 4, -4 in ascending order. -8, -6, -4, 3, 4 Sort 20, -643, -4, 1 in ascending order. -643, -4, 1, 20 Put 0.3, -5, 2, 84, 10 in decreasing order. 84, 10, 2, 0.3, -5 Sort -4, -1, -5, -34, -25, -2 in decreasing order. -1, -2, -4, -5, -25, -34 Put -0.5, 0.1, 162, -1, -3/16 in decreasing order. 162, 0.1, -3/16, -0.5, -1 Sort 53, -22, -5, -11 in ascending order. -22, -11, -5, 53 Sort -10/9, 2, 1, -48/19 in decreasing order. 2, 1, -10/9, -48/19 Sort 0.5, 0, -1/2, 102, -2/5. -1/2, -2/5, 0, 0.5, 102 Put 5/243, -0.1, 1 in descending order. 1, 5/243, -0.1 Sort -991, 13, -39 in increasing order. -991, -39, 13 Sort -4, 2, -2/97, 1/3, -2/7 in descending order. 2, 1/3, -2/97, -2/7, -4 Put -27, 74, -13, 3 in ascending order. -27, -13, 3, 74 Put 0.57, -3/2, -0.2, 12, 0.161 in ascending order. -3/2, -0.2, 0.161, 0.57, 12 Sort -5, 4, -313, -4, -21. -313, -21, -5, -4, 4 Sort 4, -17, 5, 8, 27 in decreasing order. 27, 8, 5, 4, -17 Put 3951, -3, 5, 8 in descending order. 3951, 8, 5, -3 Sort -12, -3, -13, -1, -4, 18 in ascending order. -13, -12, -4, -3, -1, 18 Put -22, 526, -3 in increasing order. -22, -3, 526 Sort -162, 4, -16, 9 in increasing order. -162, -16, 4, 9 Sort -5, 1, 4, -7583, 5, 2 in descending order. 5, 4, 2, 1, -5, -7583 Sort 10/7, 4, 20/7, -2/3, -2/9 in descending order. 4, 20/7, 10/7, -2/9, -2/3 Sort -39.1, -55, -0.2, 0, -2, 2. -55, -39.1, -2, -0.2, 0, 2 Sort -1, -4/15, -3, 0.08, -2. -3, -2, -1, -4/15, 0.08 Sort 3, -420, -4, -1, 9 in descending order. 9, 3, -1, -4, -420 Put -0.2, 5, 1/7, 302, 1/4, -2 in ascending order. -2, -0.2, 1/7, 1/4, 5, 302 Put 0, -29404, -4 in ascending order. -29404, -4, 0 Sort -3, -2400, 76 in descending order. 76, -3, -2400 Sort 3/14, 0.14, 2, 1/8, -9, -4 in increasing order. -9, -4, 1/8, 0.14, 3/14, 2 Sort -3, -25, 231, 6 in decreasing order. 231, 6, -3, -25 Sort 4, -68, -661, 1, 3. -661, -68, 1, 3, 4 Sort -2/21, 1/57, -4 in ascending order. -4, -2/21, 1/57 Put 46, -29, 3, -2, -19, 4 in increasing order. -29, -19, -2, 3, 4, 46 Put -3, 7702, -1 in decreasing order. 7702, -1, -3 Sort -147, 122, 5. -147, 5, 122 Put -12, 9, 5, 1, 16 in increasing order. -12, 1, 5, 9, 16 Sort -8, -55, 22. -55, -8, 22 Put 3, -46, -3, -43, 1, -2 in increasing order. -46, -43, -3, -2, 1, 3 Put -3, 1741, 4, 5 in decreasing order. 1741, 5, 4, -3 Sort 4, -0.2, -2/11, 0.05, -403. -403, -0.2, -2/11, 0.05, 4 Put 5, 1, 4, -533, -0.14 in ascending order. -533, -0.14, 1, 4, 5 Put 74, 11, -77/10, -0.1 in decreasing order. 74, 11, -0.1, -77/10 Sort 10, 18, 0, 31. 0, 10, 18, 31 Sort 21, -194, 14, -4, 2 in ascending order. -194, -4, 2, 14, 21 Put 26, -2, 8403 in ascending order. -2, 26, 8403 Sort 10, -2, -6528 in decreasing order. 10, -2, -6528 Put 3/8, -0.3, 55, 1/5 in ascending order. -0.3, 1/5, 3/8, 55 Put -4, -77, -17, -1 in descending order. -1, -4, -17, -77 Sort -3, -1, 2, 3897 in ascending order. -3, -1, 2, 3897 Sort -18869, -5, -4, -1, 2. -18869, -5, -4, -1, 2 Sort -57, -0.3, -1, 7, -1/5. -57, -1, -0.3, -1/5, 7 Put 11, 4, 3.1, 1/3, 125, -4 in descending order. 125, 11, 4, 3.1, 1/3, -4 Put 3, 5, -0.4, -57, 0.22, -2 in ascending order. -57, -2, -0.4, 0.22, 3, 5 Put 5, 1, 12, -299 in descending order. 12, 5, 1, -299 Sort 5.8, 5, -79, 2, 0.5. -79, 0.5, 2, 5, 5.8 Sort -4, 1141, -8 in decreasing order. 1141, -4, -8 Sort 0.03, -29, -0.13, 4, 13/2, 1 in decreasing order. 13/2, 4, 1, 0.03, -0.13, -29 Put -5, -506, 4, -7, -1 in descending order. 4, -1, -5, -7, -506 Sort 23, -58, -20 in ascending order. -58, -20, 23 Sort 167, 0, -5, 5.6 in descending order. 167, 5.6, 0, -5 Put -2, 442, 3, -8, -14 in increasing order. -14, -8, -2, 3, 442 Sort 0, 22, 105, 4 in increasing order. 0, 4, 22, 105 Sort -1, 1, -238, -5, -4 in descending order. 1, -1, -4, -5, -238 Sort -98, 0, -4, -2, 2 in decreasing order. 2, 0, -2, -4, -98 Put -1, 4, -5559 in descending order. 4, -1, -5559 Put 3, -1, 0.7, -1/7, -0.14 in decreasing order. 3, 0.7, -0.14, -1/7, -1 Sort -23, -4, -1, -1218, -2 in descending order. -1, -2, -4, -23, -1218 Sort -7, -3, -4, 3, 98. -7, -4, -3, 3, 98 Sort 1.349, 34, -12 in descending order. 34, 1.349, -12 Sort 1, 58, 5, -11 in decreasing order. 58, 5, 1, -11 Put -90, 3, -1, 4, 87 in decreasing order. 87, 4, 3, -1, -90 Sort -29, 64, 3, -2, 2 in decreasing order. 64, 3, 2, -2, -29 Sort 1, -3, -505, -6 in decreasing order. 1, -3, -6, -505 Sort 3/2, -1, -69.8, -0.13 in ascending order. -69.8, -1, -0.13, 3/2 Put -5, 0.02, -136, 3, -2 in descending order. 3, 0.02, -2, -5, -136 Sort -3.2, 3/8, 4/9, -1, -0.4, 0.4 in decreasing order. 4/9, 0.4, 3/8, -0.4, -1, -3.2 Sort 4, -71, -5735 in increasing order. -5735, -71, 4 Sort -4, 0, 8, 3332, 4, 1 in increasing order. -4, 0, 1, 4, 8, 3332 Sort 0.4, -27, -2, 1, 0.85. -27, -2, 0.4, 0.85, 1 Put 23438, -5, -7 in decreasing order. 23438, -5, -7 Put 48, -2/11, 18, 4, 13 in ascending
Q: Grab table value in html using php This is my code and it is inside table tags. It grabs data from my database and put it in table. My database also has auto increment column named id. What I want to do is when I click the cross icon that is in anchor, I will get the id for that column. I tried putting the value of $row['id'] in an input type='hidden' but had no success with it. Another idea I has is making an anchor id=".$row['id']." so every icon has a unique id pertaining to the id for that line. Though I don't if it is good. I can't check because I have no idea how to get an element's id so I can check. And I don't know how to pass this value to php. <?php $varSQL = "SELECT empNum, empName FROM tool.users"; $result = mysql_query($varSQL, $Con); while ($row = mysql_fetch_assoc($result)){ echo "<tr>"; echo "<td>".$row['empNum']."</td>"; echo "<td>".$row['empName']."</td>"; echo "<a href='#'><img src='icons/cross.ico' alt='Delete' height='16' width='16'></a></td>"; echo "</tr>"; } ?> A: You can use data attribute - echo "<a href='#'><img src='icons/cross.ico' alt='Delete' data-rowid='" . $row['id'] . "' class='cross-icon' height='16' width='16'></a></td>"; Also added a class to be be used as selector(Not required for all cases). And with jquery access them when the icon is click - $('.cross-icon').on('click', function() { var id = $(this).data('rowid'); }) Fiddle Example For hidden fields there is no need of jQuery - <input type="hidden" name="id" value="<?php echo $row['id']?>" Or pass it as query string - href='page-to-redirect.php?id=<?php echo $row["id"]?>'
In this activity, children use common craft materials and ultraviolet (UV)-sensitive beads to construct a person (or dog or imaginary creature). They use sunscreen, foil, paper, and more to test materials that might protect UV Kid from being exposed...(View More) to too much UV radiation. Includes background for facilitators. This activity is part of the "Explore!" series of activities designed to engage children in space and planetary science in libraries and informal learning environments.(View Less) Learners will weigh themselves on scales modified to represent their weights on other worlds to explore the concept of gravity and its relationship to weight. They consider how their weights would be the highest of all the planets while standing on...(View More) Jupiter, but their mass remains the same no matter where in the solar system they are. They compare the features of different planets to determine which characteristics cause a planet to have more or less gravity. This activity is part of Explore! Jupiter's Family Secrets, a series designed to engage children in space and planetary science in libraries and informal learning environments.(View Less) This is a demonstration about the density of the planets. Learners will compare the relative sizes and masses of scale models of the planets as represented by fruits and other foods. They will then dunk the "planets" in water to highlight the fact...(View More) that even a large, massive planet - such as Saturn - can have low density. They discuss how a planet's density is related to whether it is mainly made up of rock or gas. This activity is part of Explore! Jupiter's Family Secrets, a series designed to engage children in space and planetary science in libraries and informal learning environments.(View Less) Learners will model the gravitational fields of planets on a flexible surface. Children place and move balls of different sizes and densities on a plastic sheet to develop a mental picture of how the mass of an object influences how much effect it...(View More) has on the surrounding space. This activity is part of Explore! Jupiter's Family Secrets, a series designed to engage children in space and planetary science in libraries and informal learning environments.(View Less) This is an activity about mission planning. Learners will use the roles of a navigation team, spacecraft, comet, Earth, and Sun to simulate how mission planners design a spacecraft/comet rendezvous. This activity requires at least four active...(View More) participants and a large open space. Includes mathematics extensions.(View Less) This is a lesson about detecting ice on the permanently shadowed craters of Mercury and the Moon. Learners will consider what might be in that ice and will examine why the polar regions of Earth, Mercury and the Moon are colder than elsewhere on the...(View More) planets. Activities include small group miming, speaking, drawing, and/or writing. This is the lesson 12 of 12 in the unit, Exploring Ice in the Solar System.(View Less) This is a lesson about the field of astrobiology, the study of life in the universe, and ice as a preservative for evidence of life. Learners will consider the relationship between ice and life as they investigate the conditions required for life to...(View More) exist and sustain itself. They will study the impact of freezing on microbes and life processes and will learn about extremophiles, organisms that live in extreme conditions. Activities include small group miming, speaking, drawing, and/or writing. This is lesson 8 of 12 in the unit, Exploring Ice in the Solar System.(View Less) This is a lesson about infrared radiation. Learners will investigate invisible forms of light as they conduct William Herschel's experiment and subsequent discovery of infrared radiation. They will construct a device to measure the presence of...(View More) infrared radiation in sunlight, explain that visible light is only part of the electromagnetic spectrum of radiation emitted by the Sun, follow the path taken by Herschel through scientific discovery, explain why we would want to use infrared radiation to study Mercury and other planets, and explain how excess infrared radiation is a concern for the MESSENGER mission. This is activity 1 of 4 at the Grade 5-8 band of "Staying Cool."(View Less) This is a lesson about planet formation. Learners will observe and describe differentiated samples in the Meteorite Sample Disk (or photographs), conduct experiments to model the separation of light and heavy materials within a planetary body,...(View More) relate meteorites to the core, mantle and crust of asteroids, and model the break-up of differentiated planetary bodies to expose the interior layers. Materials lists, and advanced preparation and procedural tips are included. This is lesson 11 of 19 in Exploring Meteorite Mysteries.(View Less)
API === Entry Points ------------ .. currentmodule:: datashader **Canvas** .. autosummary:: Canvas Canvas.line Canvas.points Canvas.raster Canvas.trimesh Canvas.validate .. currentmodule:: datashader **Pipeline** .. autosummary:: Pipeline Edge Bundling ------------- .. currentmodule:: datashader.bundling .. autosummary:: directly_connect_edges hammer_bundle Glyphs ------ .. currentmodule:: datashader.glyphs **Point** .. autosummary:: Point Point.inputs Point.validate .. currentmodule:: datashader.glyphs **Line** .. autosummary:: Line Line.inputs Line.validate Reductions ---------- .. currentmodule:: datashader.reductions .. autosummary:: any count count_cat by first last m2 max mean min mode std sum summary var Transfer Functions ------------------ .. currentmodule:: datashader.transfer_functions **Image** .. autosummary:: Image Image.to_bytesio Image.to_pil .. currentmodule:: datashader.transfer_functions **Images** .. autosummary:: Images Images.cols .. currentmodule:: datashader.transfer_functions **Other** .. autosummary:: dynspread set_background shade spread stack Definitions ----------- .. currentmodule:: datashader .. autoclass:: Canvas .. autoclass:: Pipeline .. currentmodule:: datashader.bundling .. autoclass:: directly_connect_edges .. autoclass:: hammer_bundle .. currentmodule:: datashader.glyphs .. autoclass:: Point .. autoclass:: Line .. currentmodule:: datashader.reductions .. autoclass:: any .. autoclass:: count .. autoclass:: count_cat .. autoclass:: first .. autoclass:: last .. autoclass:: m2 .. autoclass:: max .. autoclass:: mean .. autoclass:: min .. autoclass:: mode .. autoclass:: std .. autoclass:: sum .. autoclass:: summary .. autoclass:: var .. automodule:: datashader.transfer_functions :members:
The last of the original founders of the notorious Pirate Bay BitTorrent site is in custody in Thailand ahead of an expected extradition to Sweden. 36-year old Fredrik Neij was arrested on Monday at the border with Laos reportedly wearing the exact same shirt he is wearing in a wanted poster. He has been a wanted man for several years after fleeing Sweden while out on bail, following a 2009 conviction for copyright infringement offences. While no extradition deal exists between Sweden and Thailand, officials said they were working with Thai authorities to bring him back to his home country, according to The Local. Another original founder of the popular share site, Gottfrid Svartholm Warg, had also fled to Asia. He failed to attend an appeal hearing in Sweden in 2010, prompting an international arrest warrant being issued. In 2012, he was extradited from Cambodia to Denmark to face unrelated charges of hacking offences, resulting in a conviction and a three and a half year sentence in Denmark. Peter Sunde was arrested in may in Sweden after he had also been on the run for two years. Carl Lundstroem was also sentenced to a year in prison as a "site financier". The Pirate Bay was founded in 2003 and is still publicly enemy number one for the entertainment and software industries. After numerous failed attempts to shut it down, the industry and law enforcement have turned to blocking its use in selected countries, but the blocks are useless against scores of proxies that pop up all the time, as well as other censorship-circumvention measures.
This call is the initiative of a group of researchers: Antoine Bozio (Ecole d’économie de Paris, IPP), Thomas Breda (CNRS, Ecole d’Economie de Paris), Julia Cagé (Sciences Po Paris), Lucas Chancel (Ecole d’économie de Paris et Iddri), Elise Huillery (Université Paris-Dauphine), Camille Landais (London School of Economics), Dominique Méda (Université Paris-Dauphine), Thomas Piketty (Ecole des hautes études en sciences sociales, Ecole d’économie de Paris), Emmanuel Saez (University of California, Berkeley) and Tancrède Voituriez (Iddri). It was first published in French on january 25 2017. The goals of the candidates standing in the presidential primary elections launched by the left must be judged on the relevance of their proposals, their impact on the recovery of economic activity and employment in France, and their effect on social cohesion in the country. The economic and fiscal policy adopted during François Hollande’s five-year term of office has prevented France from engaging in the dynamics of strong and sustainable economic recovery. The choice made in 2012 to forcibly impose an increase in taxes and reduce deficits in a period of recession killed any hope of growth. The numerous warnings launched in this respect remained unanswered. Those who bear the responsibility for this disastrous policy and who claim to have had no part in it must be held to account today. In the ongoing debates in the primaries, discussions are crystallizing around a new issue: a basic income (in French sometime referred to as a « revenu universel » or « revenu de base »). Benoît Hamon is faced with the accusation that he is incompetent to govern because he introduced this proposal. According to his critics, the introduction of a basic income would mean bankruptcy for France. The accusation is easily made but over-hasty. Economically and socially, a basic income can be both relevant and innovative. It could be quite the reverse of the fiscal and budgetary choices made in 2012 and in particular the incredibly complex and inefficient tax credit for competitivity and employment, not to mention the exoneration of overtime which even the right wing has abandoned and Manuel Valls would like to bring back today. Properly designed and defined, the basic income can be a structuring element in a new foundation for our social model. Young people and low wages Some would like to circumvent the discussion by referring to the huge cost of 300 or 400 billion Euros. But this hypothetical assessment is strictly meaningless. Benoît Hamon has never said that he intended to pay 600 Euros per month to 50 million adults. On the contrary, he explicitly referred to the fact that the new system could be resource-tested and would only apply to wages below 2000 Euros, with amounts which would not be the same for all (Libération, 5 January 2017). De facto, it would not make much sense to pay 600 Euros per month to people earning 2000 Euros or 5000 Euros per month and then immediately deduct the equivalent amount by increasing their taxes. It is time to clarify this once and for all to ensure that the discussion finally focuses on the right questions. In real terms, the question of a basic income concerns primarily young people and low wage-earners. This poses serious questions which deserve to be given sound answers. But these answers do exist. A basic income must be built stage by stage. Its introduction at the start of the next five-year period, for those between the ages of 18 and 25, is likely to boost the autonomy of our young people and to act as a response to what today constitutes the conditions for obtaining a further qualification and starting a working life. The practical arrangements remain to be defined, in particular the age from which parental incomes are no longer taken into consideration and, of course, the counterparts in terms of study programmes and career plans. We could, for example, take the system set up in Denmark where, from the age of 18, everyone has access to sixty months of a basic income which he or she is free to use as they like to finance basic training or vocational education. Instead of denigrating a priori this question of a future, conservatives on both the left and the right would be well advised to take a look at what is going on elsewhere. Linking the question of a basic income with fiscal reform For low wage earners, the real issue is that of the link between a basic income with that of tax reform and a fair wage. At present, an employee earning the minimum wage is paid 1150 Euros net per month, after the deduction of 310 Euros for the CSG (Contribution sociale generalisée) and social contributions from a gross salary of 1460 Euros. If he or she makes an application, several months later they are entitled to an activity bonus of 130 Euros per month (or approximately 1550 Euros per annum for a single person). This system is absurd: it would be infinitely preferable, for a similar budgetary cost, to deduct 130 Euros less at the source and raise the net salary by an equivalent amount. In our opinion, this is how the basic income should function. For all those who are in steady employment, supplementary income should be paid in the most automatic and universal manner possible, that is, directly on their pay-slip, in the same way as social contributions, the CSG and income tax are deducted at source. The result would be an immediate rise in net minimum wage from1130 Euros net to 1280 Euros net; this could reach 1400 Euros net at the end of the five-year period. This is the genuine re-valorisation of labour which we require. Let’s think this through together and consider the material conditions for its implementation instead of rejecting a priori the project of a minimum wage for all. A project of this sort would be economically credible and socially adventurous. Contrary to the allegations of those who confuse solidarity and farniente, the establishment of this basic income would be to the benefit of the re-valorisation of labour and low wages; it would ensure a genuine right to higher education and vocational training and an automatic increase in the net lower wages.
22 June 2010 Against immaterialism: A rebuttal of esoteric metaphysics In his article ‘It’s Immaterial’ (New Humanist magazine, May/June 2010), Hindu Council UK director and trained scientist Jay Lakhani becomes the umpteenth person to attempt the impossible: reconciling unprovable, faith-based religion with testable, evidence-based science. More specifically, it is the ideas of non-theistic esoteric Hinduism that Lakhani puts forward as a replacement for what he scoldingly calls the ‘materialist paradigm’. “It has long seemed to me,” Lakhani writes, “that the paradigm which now needs to be challenged is that of materialism, that worldview that everything and everyone is essentially just a product of little bits of matter.” With this line, Lakhani takes his place amongst the ranks of discontents revolting against the reductionist, secular, Western (and thus automatically disreputable) idea of a purely physical universe governed by discoverable laws. But first a digression on the definition of ‘materialism’ – and its converse – for the purpose of my rebuttal. It’s true that not everything that exists is comprised of matter. Our current knowledge of wave/particle relationships and non-material forces (like gravity) attest to this. Nonetheless, these non-material forces are physical; that is, they can be observed and quantified with the aid of sophisticated tools, whether mechanical or mathematical. Thus I take the term ‘materialism’ to be synonymous with ‘physicalism’, the idea that the universe is comprised of only physical things. As for the term ‘immaterial’, Lakhani’s article makes it clear that he equates the word with any phenomena that is to some extent untouchable by us and our science. Let me reiterate: anything can be considered ‘physical’ if it can be observed and measured, even if it can’t be directly touched or seen with the naked eye. An immaterial thing however, in this context, is something that cannot be reliably captured by either our senses or our equipment, because only faith or intuition is up to the task. I’m not going to wrestle with Lakhani over the physics, since he's undoubtedly far more conversant than I in quantum mechanics and relativity theory. I will instead contest his philosophical arguments on the nature of consciousness and life. Still, I take issue with Lakhani’s portrayal of quantum physics as a mystical theatre of activity that defies human comprehension. After all, one doesn’t have to be a physicist to see that even quantum level activity is measurable and probable, not totally arbitrary or random. Why? Because if it were totally unpredictable, then knowledge in quantum mechanics and theory will never progress! Quantum physicists might as well clear out their labs and get themselves reassigned to other research departments if the mysteries of their field are as insoluble – because ungraspable – as Lakhani seems to suggest. One warning sign that someone is about to jump out of the plane of reason without a parachute is when they embrace the word ‘esoteric’ as something that confers value or status. Invoking esoterica as explanation is simply shorthand for “I don’t actually know what I’m talking about, but my pretensions bestow an aura of authority and respectability upon me.” Lakhani thinks that by subscribing to a set of fuzzy ideas espoused by men who lived a long, long time ago (the further back in time, the more esoteric cred), he has access to wisdom unattainable by those of us who have our feet firmly planted on solid, material ground. Lakhani writes: Esoteric Hinduism maintains that “When Brahman shudders, the world of appearance comes into being”. The subject/object divide, too, is part of this appearance. Such stuff would be written off as poetry if it were not so incredibly close to what quantum and consciousness are revealing. In making such claims, Lakhani and his fellow enthusiasts of esoteric woo-woo are actually applying after-the-fact reasoning to make their case. It is far more likely that the gurus who uttered such profound statements were indeed being poetic. Metaphorical. Going on a hunch. But it just so happens that several centuries later, with the aid of powerful scientific instruments and complex mathematics, physicists make discoveries that any esoterica devotee could then rig to fit the vague, ambiguous proclamations of their revered wise men. Hindsight coupled with personal bias makes a nifty retrofitting tool. People see what they want to see, as Lakhani aptly demonstrates when he writes: For me as a scientist and a Hindu the resonance I discover between science and esoteric Hinduism is thrilling because this points the way to convergence, economy and elegance. Lakhani believes that this resonance serves as an explanatory link between what science has discovered and what it hasn’t (because of its stubborn refusal to accept immaterial explanations, obviously). If there’s a piece of the puzzle missing in a certain field, whether “quantum, consciousness or the unique characteristic of life”, it’s because “none of them sits well within the paradigm of materialism,” he argues. This brings us to another area of enquiry over which Lakhani casts his esoteric net: consciousness. It’s a loaded word that gets bandied about a lot by both materialists and immaterialists, the latter deploying it as a supposed trump card against purely physical explanations of the human mind. The immaterialist goes, “Hah, you materialists may have learnt a lot about how the brain creates language, thoughts, emotions, sensations, dreams, memories, imagination and all the rest of it, but how do you explain consciousness?” Unfortunately for him, our immaterialist has made what philosophy nerds call a ‘categorical error’. Here’s an analogy to illustrate why the immaterialist isn’t making any sense. Imagine your friend has asked you to go find her a football team. So off you go and get yourself a goalkeeper, defenders, strikers, wingers, midfielders and even a coach. You present them to your friend, who then goes on to say, “Well, I can see that you’ve got a goalkeeper, defenders, strikers, wingers, midfielders and a coach, but where’s the football team?” Your friend has mistakenly categorised the concept ‘football team’ as a component similar to the parts that actually make up the team i.e. the different players. The immaterialist who challenges scientists to show him how consciousness arises from the brain is mistaking consciousness for one of the parts that constitute it (thoughts, emotions, sensations etc.), parts that the clever folks in the cognitive sciences are learning more and more about every day. Materialists like philosopher Daniel Dennett and psychologist Steven Pinker have put forward a far more persuasive and intelligible conception of consciousness because they don’t resort to airy-fairy explanations that don’t actually explain anything. But because they stick to data-supported hypotheses (like the computational model of consciousness Lakhani scoffs at) instead of using esoteric buzzwords like ‘essence’ or ‘being’, immaterialists are unimpressed. Another feature common to faith-based systems of thought is teleology, the belief that everything in existence was designed for a purpose and strives towards a goal. Lakhani shows that he’s a card-carrying teleologist with this pronouncement: Evolution is not random but directed. Directed by the quest of consciousness to find greater expression. Despite there being an embarrassingly ample amount of supporting evidence, Lakhani rejects the ‘materialist’ theory of evolution via natural selection. His Hindu sensibilities are offended by the notion that evolution is merely “an outcome of random mutations in the genes that sit well with the changing environment.” Here’s his alternative theory: Evolution and life itself are nothing but the struggle of consciousness to find greater and better expression in the material realm. In a single living cell this shows up as rudimentary cognition; in the human frame consciousness finds its greatest expression. This is why we have evolved so rapidly from a single cell to this complex being. What a relief! And here I thought we were simply an amazingly lucky accident in an uncaring universe. It’s easy to see why teleology appeals to a large swathe of the human species. Better to be comforted by fictions than terrified by truths. In dismissing one physicist’s bloated theory, Lakhani mentions Occam (and thus implicitly his famous razor), yet the irony is that any immaterial metaphysics practically begs to be cut off by the eponymous razor. Could anything be more superfluous than a non-physical ‘essence’ serving as a gap-filler (like God) for those mysteries yet unsolved by the ‘materialist paradigm’ Lakhani finds so lacking? The simple fact is that a materialist explanation is the most economical, elegant and effective way for us to make sense of everything that did exist, does exist and will exist. Anything extraneous is just decorated froth on top of the coffee; pretty, but dispensable. Esotericists like to remind us that the human mind is fallible in understanding and limited in scope. They are of course correct, yet – with science as its main instrument – this fallible and limited thing called the human mind has succeeded in piercing a thousand and more secrets of the universe. The difference between an esotericist and a rational person committed to reason and logic is that the latter is quite comfortable with not knowing all the answers to the potentially innumerable questions. The believer in mystical knowledge and immaterial forces however displays an almost desperate need for certitudes in life, the universe and everything. His desire for any explanation has him appealing to the dubious authority of ancient mystics and their vague words, people who were ignorant of all the knowledge we have since acquired through our application of reason, logic and the scientific method of enquiry in a strictly materialist paradigm.
Q: Slow down image transition on background image with jQuery I have created a simple background slideshow using CSS and jQuery. You can see it here and the code is below. http://codepen.io/anon/pen/PwrNyN This works fine, however I find the current transition into another image too quick and abrupt, and would like to slow this down, so the change is more graceful. Is this possible to do? HTML <div class="header"> <h1>This is some texst</h1> <div> jQuery var images=new Array( 'http://farm3.static.flickr.com/2610/4148988872_990b6da667.jpg', 'http://farm3.static.flickr.com/2597/4121218611_040cd7b3f2.jpg', 'http://farm3.static.flickr.com/2531/4121218751_ac8bf49d5d.jpg' ); var nextimage=0; doSlideshow(); function doSlideshow(){ if(nextimage>=images.length){nextimage=0;} $('.header') .css('background-image','url("'+images[nextimage++]+'")') .fadeIn(3000,function(){ setTimeout(doSlideshow,3000); }); } A: Just add to .header this: transition: background-image .5s ease-in-out;
Myelin basic protein and human coronavirus 229E cross-reactive T cells in multiple sclerosis. Multiple sclerosis (MS) is an inflammatory demyelinating neurological disease in which autoreactive T lymphocytes sensitized to myelin components of the central nervous system are postulated to contribute to pathogenesis. The possible relevance of molecular mimicry between a human coronavirus and the myelin basic protein component of myelin in the generation of this autoimmune reaction was evaluated. Myelin basic protein- and virus-reactive T-cell lines were established from 16 MS patients and 14 healthy donors and shown to be mostly CD4+. In contrast to healthy donors, several T-cell lines isolated from MS patients showed cross-reactivity between myelin and coronavirus antigens. Overall, 29% of T-cell lines from MS patients (10 donors) but only 1.3% of T-cell lines from normal control subjects (2 donors) showed an HLA-DR-restricted cross-reactive pattern of antigen activation after in vitro selection with either myelin basic protein or human coronavirus strain 229E antigens. Moreover, reciprocal reactivities were only observed in MS patients (4 donors). This establishes molecular mimicry between a common viral pathogen, such as this human coronavirus, and myelin as a possible immunopathological mechanism in MS and is consistent with the possible involvement of more than one infectious pathogen as an environmental trigger of disease.
Reporting on crime takes a careful mind and a swift touch. It also requires precise language. As I mentioned in last week’s column, crime falls under the umbrella of breaking news. Most of our crime reporting comes from press releases sent by the Mendocino County Sheriff’s Office or the Ukiah Police Department, unless we happen to hear sirens and tune in to the scanner (which is how we come to report on most accidents). Crime releases are always taken by a reporter with a grain of salt, since we know that what we’re reading is only a report, often a mixture of an officer’s experience and an eyewitness account from the accuser, the accused or both. This is why we are careful to always use words like “allegedly,” “reportedly,” “is accused of,” and, most importantly, “arrested on suspicion of” instead of “arrested for,” as that implies guilt. We also do this to follow the American justice system’s rule: innocent until proven guilty. Only after someone is formally charged with a crime by the District Attorney do we drop the “accused of” and change it to “charged with.” And only after the accused person submits a guilty plea do we say, “admitted to.” Historically, those two instances would be dealt with by a reporter whose beat is the local courts, but, with shrinking newsrooms across the country, local crime reporters are being asked to wear both hats. Many crime reports come while we are away from our desks, say after 5 p.m. or on a weekend, so we’re not always able to respond right away. However, with a time-sensitive event, say a car chase or a murder, we jump and get as many details as we can. Many readers looking for crime news enjoy our Daily Digest, which we admit, can be humorous. Those are compiled from police logs and booking logs from the jail, and we do keep an eye out for interesting things that the UPD is asked to respond to on a daily basis. Our rule for jail bookings is to publish every felony, as well as DUI and domestic violence arrests. We sometimes get complaints about publishing names in the Daily Digest, or pleas not to publish a name, but since arrests and bookings are public record (and easy to find) we can and do print them. Traditionally, the goal of publishing crime logs has been to notify the public of wrongdoing in their community in the interest of safety. Every once in a while, we get the opportunity for a crime scoop, like the story we broke on the marijuana raid in Willits last week. Although our relationship with law enforcement is mostly us bugging them for more details, and them mulling over how much they should give us, this instance was a great stroke of transparency on behalf of the Sheriff’s Office and its marijuana eradication team. Of course, they did so because they wanted an outlet to the public on the real and growing issue of harmful and irresponsible environmental practices in growing pot; nearly all the estimated 25 gardens had been diverting water, and most had been loosening up soil. This partnership on an important issue or trend is what we look forward to in crime reporting, being let behind the caution tape and taking a peek into how exactly our tax-payer-funded law enforcement agencies deal with dangerous situations in the name of the law and public safety. On the flip side, reporters must be careful to not punish the accused with what they write or insinuate guilt before it’s proven, as that responsibility lies with the justice system.
EDITORIAL: End exemption for schools, motels on sprinkler systems Loading Photo Galleries ... Back-to-back infernos in the past week at a motel in Point Pleasant Beach and a school in Edison are fresh, tragic reminders of the need to end the grandfather clause that exempts the state's motels, schools and other buildings constructed before 2006 from having to install sprinkler systems. The Mariner's Cove Motor Inn fire in Point Pleasant Beach took four lives last week. And while no lives were lost in the fire at the James Monroe Elementary School in Edison over the weekend, the building burned to the ground. At an approximate cost of $3 per square foot to install such systems, this should not be beyond the reach of those small-business owners of motels, nor of school districts. If it is, the state should supply grants or low-interest loans to assist them. How many tragedies must happen before the state Legislature is moved to act? Nothing was done following the Seaside Park and Seaside Heights boardwalk fire last year, either, in which the lack of sprinkler systems was a major contributor to its devastating spread. The time for excuses is over. More than 200 motels along the Jersey Shore and hundreds statewide are not required to have fire sprinklers under a state law that exempted them from having to provide the life-saving equipment. The state Uniform Fire Code has mandated that schools, motels with more than two stories and other commercial buildings have sprinkler systems only since 2006. Older buildings, such as the Mariner's Cove Motor Inn, were not required to be retrofitted at that time. Neither were existing New Jersey school buildings. In Edison, the James Monroe School was built in the early 1960s, and the school district has not built a new school since 1972, according to Board of Education President Gene Maeroff. As a result, most of the buildings lack sprinkler systems. That can't be very comforting to parents. New Jersey has been here before. After the 2000 Seton Hall University dorm fire that killed three students and injured dozens of others, legislation was adopted to require fire sprinklers on campuses statewide. Since then, there have been no dorm fire fatalities in the state, even though there have been 20 fires, said David Kurasz, executive director of the New Jersey Fire Sprinkler Advisory Board. Sprinklers work. The state cannot turn its back on very real dangers in an effort to seem business friendly or regulation averse. Ocean County lawmakers should take the lead in working to revoke the grandfather clause that allowed the tragedies in Point Pleasant Beach and Edison to happen and provide money in the form of grants or loans for those small businesses that cannot afford to install fire suppression systems. To continue to ignore these ongoing and growing risks to citizens and students throughout the state is unacceptable. The state needs to act immediately. The question is not "Will there be another fire?" but "When will the next fire come and how many will die?" ADVERTISEMENT ADVERTISEMENT ADVERTISEMENT Email this article EDITORIAL: End exemption for schools, motels on sprinkler systems Back-to-back infernos in the past week at a motel in Point Pleasant Beach and a school in Edison are fresh, tragic reminders of the need to end the grandfather clause that exempts the state's motels, A link to this page will be included in your message. Real Deals Sales, coupons, circulars and more from your favorite Jersey Shore area retailers.
// ------------------------------------------------------------------------------------------------- // Copyright (c) Microsoft Corporation. All rights reserved. // Licensed under the MIT License (MIT). See LICENSE in the repo root for license information. // ------------------------------------------------------------------------------------------------- using System; using System.Collections.Generic; using System.Linq; using System.Net; using System.Net.Http; using System.Text; using Hl7.Fhir.Model; using Hl7.Fhir.Rest; using Hl7.Fhir.Validation; using Microsoft.Health.Fhir.Client; using Microsoft.Health.Fhir.Core.Extensions; using Microsoft.Health.Fhir.Tests.Common; using Microsoft.Health.Fhir.Tests.Common.FixtureParameters; using Microsoft.Health.Fhir.Tests.E2E.Common; using Microsoft.Health.Test.Utilities; using Xunit; using Task = System.Threading.Tasks.Task; namespace Microsoft.Health.Fhir.Tests.E2E.Rest { [HttpIntegrationFixtureArgumentSets(DataStore.All, Format.All)] public class CreateTests : IClassFixture<HttpIntegrationTestFixture> { private readonly TestFhirClient _client; public CreateTests(HttpIntegrationTestFixture fixture) { _client = fixture.TestFhirClient; } [Fact] [Trait(Traits.Priority, Priority.One)] public async Task GivenAResource_WhenPostingToHttp_TheServerShouldRespondSuccessfully() { using FhirResponse<Observation> response = await _client.CreateAsync(Samples.GetDefaultObservation().ToPoco<Observation>()); Assert.Equal(HttpStatusCode.Created, response.StatusCode); Assert.NotNull(response.Headers.ETag); Assert.NotNull(response.Headers.Location); Assert.NotNull(response.Content.Headers.LastModified); Observation observation = response.Resource; Assert.NotNull(observation.Id); Assert.NotNull(observation.Meta.VersionId); Assert.NotNull(observation.Meta.LastUpdated); Assert.Equal($@"W/""{observation.Meta.VersionId}""", response.Headers.ETag.ToString()); TestHelper.AssertLocationHeaderIsCorrect(_client, observation, response.Headers.Location); TestHelper.AssertLastUpdatedAndLastModifiedAreEqual(observation.Meta.LastUpdated, response.Content.Headers.LastModified); DotNetAttributeValidation.Validate(observation, true); } [Theory] [InlineData(2)] [InlineData(5)] [HttpIntegrationFixtureArgumentSets(DataStore.CosmosDb)] public async Task GivenALargeResource_WhenPostingToHttp_ThenServerShouldRespondWithRequestEntityTooLarge(int dataSizeMb) { var poco = Samples.GetDefaultPatient().ToPoco<Patient>(); StringBuilder largeStringBuilder = new StringBuilder(); // At ~2mb the document makes it into the Upsert Stored Proc and fails on create // At 5mb the request is rejected by CosmosDb with HttpStatusCode.RequestEntityTooLarge for (int i = 0; i < 1024 * 1024 * dataSizeMb; i++) { largeStringBuilder.Append('a'); } poco.Text.Div = $"<div>{largeStringBuilder.ToString()}</div>"; var exception = await Assert.ThrowsAsync<FhirException>(() => _client.CreateAsync(poco)); Assert.Equal(HttpStatusCode.RequestEntityTooLarge, exception.StatusCode); } [Fact] [Trait(Traits.Priority, Priority.One)] public async Task GivenAResourceWithIdAndMeta_WhenPostingToHttp_TheServerShouldRespondSuccessfullyWithUpdatedContents() { Observation originalResource = Samples.GetDefaultObservation().ToPoco<Observation>(); originalResource.Id = Guid.NewGuid().ToString(); originalResource.Meta = new Meta { VersionId = Guid.NewGuid().ToString(), LastUpdated = DateTimeOffset.UtcNow, }; using FhirResponse<Observation> response = await _client.CreateAsync(originalResource); Assert.Equal(HttpStatusCode.Created, response.StatusCode); Assert.NotNull(response.Headers.ETag); Assert.NotNull(response.Headers.Location); Assert.NotNull(response.Content.Headers.LastModified); Observation observation = response.Resource; Assert.NotNull(observation.Id); Assert.NotNull(observation.Meta.VersionId); Assert.NotNull(observation.Meta.LastUpdated); Assert.NotEqual(originalResource.Id, observation.Id); Assert.NotEqual(originalResource.Meta.LastUpdated, observation.Meta.LastUpdated); Assert.NotEqual(originalResource.Meta.VersionId, observation.Meta.VersionId); TestHelper.AssertLocationHeaderIsCorrect(_client, observation, response.Headers.Location); TestHelper.AssertLastUpdatedAndLastModifiedAreEqual(observation.Meta.LastUpdated, response.Content.Headers.LastModified); DotNetAttributeValidation.Validate(observation, true); } [Fact] [Trait(Traits.Priority, Priority.One)] public async Task GivenALocationResourceWithPosition_WhenPostingToHttp_TheServerShouldRespondSuccessfully() { Location originalResource = Samples.GetJsonSample("Location-example-hq").ToPoco<Location>(); using FhirResponse<Location> response = await _client.CreateAsync(originalResource); Assert.Equal(HttpStatusCode.Created, response.StatusCode); } [Fact] [Trait(Traits.Priority, Priority.One)] public async Task GivenAnUnsupportedResourceType_WhenPostingToHttp_TheServerShouldRespondWithANotFoundResponse() { using FhirException ex = await Assert.ThrowsAsync<FhirException>(() => _client.CreateAsync("NotObservation", Samples.GetDefaultObservation().ToPoco<Observation>())); Assert.Equal(HttpStatusCode.NotFound, ex.StatusCode); } [Fact] [Trait(Traits.Priority, Priority.One)] public async Task GivenUnsetContentType_WhenPostingToHttp_TheServerShouldRespondWithAUnsupportedMediaTypeResponse() { var result = await _client. HttpClient.PostAsync("Observation", new StringContent("Content!")); Assert.Equal(HttpStatusCode.UnsupportedMediaType, result.StatusCode); } [Fact] [Trait(Traits.Priority, Priority.One)] public async Task GivenAnUnsupportedContentType_WhenPostingToHttp_TheServerShouldRespondWithAUnsupportedMediaTypeResponse() { var result = await _client.HttpClient.PostAsync("Observation", new FormUrlEncodedContent(new KeyValuePair<string, string>[0])); Assert.Equal(HttpStatusCode.UnsupportedMediaType, result.StatusCode); } [Fact] [Trait(Traits.Priority, Priority.One)] public async Task GivenAnInvalidResource_WhenPostingToHttp_TheServerShouldRespondWithBadRequestResponse() { // An empty observation is invalid because it is missing fields that have a minimum cardinality of 1 using FhirException ex = await Assert.ThrowsAsync<FhirException>(() => _client.CreateAsync(new Observation())); Assert.Equal(HttpStatusCode.BadRequest, ex.StatusCode); } [Theory] [MemberData(nameof(AllXssStrings))] [Trait(Traits.Priority, Priority.One)] public async Task GivenAResource_WhenPostingToHttpWithMaliciousUrl_TheServerShouldHandleRequest(string code) { using FhirResponse<Observation> response = await _client.CreateAsync($"Observation?{code}", Samples.GetDefaultObservation().ToPoco<Observation>()); // Status should always be created in these tests Assert.Equal(HttpStatusCode.Created, response.StatusCode); Assert.NotNull(response.Headers.ETag); Assert.NotNull(response.Headers.Location); Assert.NotNull(response.Content.Headers.LastModified); } [Fact] [Trait(Traits.Priority, Priority.One)] public async Task GivenAResource_WhenPostingToHttpWithMaliciousId_TheServerShouldThrowBadRequestOrNotFound() { var observation = Samples.GetDefaultObservation() .UpdateId("' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--") .ToPoco<Observation>(); var exception = await Assert.ThrowsAsync<FhirException>(async () => await _client.UpdateAsync(observation)); Assert.Equal(HttpStatusCode.BadRequest, exception.StatusCode); } [Theory] [MemberData(nameof(HandledXssStrings))] [Trait(Traits.Priority, Priority.One)] public async Task GivenAResource_WhenPostingToHttpWithMaliciousNarrative_TheServerShouldHandleRequest(string code) { var observation = Samples.GetDefaultObservation().ToPoco<Observation>(); observation.Text = new Narrative { Status = Narrative.NarrativeStatus.Generated, Div = $"<div>{code}</div>", }; using FhirResponse<Observation> response = await _client.CreateAsync(observation); Assert.Equal(HttpStatusCode.Created, response.StatusCode); Assert.NotNull(response.Headers.ETag); Assert.NotNull(response.Headers.Location); Assert.NotNull(response.Content.Headers.LastModified); } [Theory] [MemberData(nameof(BadRequestXssStrings))] [Trait(Traits.Priority, Priority.One)] public async Task GivenAResource_WhenPostingToHttpWithMaliciousNarrative_TheServerShouldBlockRequest(string code) { var observation = Samples.GetDefaultObservation().ToPoco<Observation>(); observation.Text = new Narrative { Status = Narrative.NarrativeStatus.Generated, Div = $"<div>{code}</div>", }; // Xml can't even serialize these broken fragments if (_client.Format != ResourceFormat.Xml) { var exception = await Assert.ThrowsAsync<FhirException>(() => _client.CreateAsync(observation)); Assert.Equal(HttpStatusCode.BadRequest, exception.StatusCode); } } /// <summary> /// Malicious Url Data Source /// </summary> /// <remarks> /// These examples from https://www.owasp.org/index.php/OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors /// </remarks> public static IEnumerable<object[]> HandledXssStrings() { return new List<object> { "%3cscript src=http://www.example.com/malicious-code.js%3e%3c/script%3e", "\\x3cscript src=http://www.example.com/malicious-code.js\\x3e\\x3c/script\\x3e", "'%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e'", "' having 1=1--", "' SELECT name FROM syscolumns WHERE id = (SELECT id FROM sysobjects WHERE name = tablename')--", "'+or+'1'='1", }.Select(x => new[] { x }); } public static IEnumerable<object[]> BadRequestXssStrings() { return new List<object> { // Any string with a tag should result in a bad request "<script src=http://www.example.com/malicious-code.js></script>", "http://www.example.com/>\"><script>alert(\"XSS\")</script>&", "<img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)>", ">%22%27><img%20src%3d%22javascript:alert(%27%20XSS%27)%22>", "<IMG SRC=\"jav &#x0D;ascript:alert(<WBR>'XSS');\">", "<?xml version=\"1.0\" encoding=\"ISO-8859-1\"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('gotcha');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>", }.Select(x => new[] { x }); } public static IEnumerable<object[]> AllXssStrings() { return HandledXssStrings().Concat(BadRequestXssStrings()); } } }
Yesterday, Family Research Council President Tony Perkins responded to the news that the Department of Education will investigate 55 colleges and universities for “mishandling sexual assault claims” by claiming that contraception distribution “leads to tyranny.” Speaking on his “Washington Watch” program, Perkins lamented “the sexualization that is taking place in our culture in general but on college campuses.” “Contraception is made available as if it were candy which sends a message, well it’s there, it must be there for a reason, and then we’re surprised when — this is not justification, it’s wrong, we are all responsible for our actions — but we’re surprised when people act on these outside factors that they are surrounded by,” Perkins said. “It leads to tyranny.” Perkins told a caller that people are trying to “jettison the moral law and live by an arbitrary standard that is put in place by government.”
Receive Money Saving Offers Enter your email address to receive our best deals and other store updates. By adding this item to your Wish List, you will be notified automatically via email when this item is back in stock. Our Sales staff cannot forecast price or availability of Wish List items. Calls or emails about this item will not receive a response. "Internet Purchases Only" "Not a Retail Store Stock Item" This item is viewable at our retail store in LEXINGTON, KY. It may be on display and is available for immediate purchase and pick-up. Free Shipping Offer only applies to specially marked items. And does not include optional shipping insurance. This places a “Reserve Order” for an out of stock item. By doing this, you are reserving both the current advertised price and your position in line to receive the item from our next available shipment. We do not guarantee your wait time. However, if your item is still not available after 90 days, and you no longer wish to wait, you may request a full refund. Canceling a “Reserve Order” within the first 90 days will result in a 10% cancellation fee. Springfield XDM9384CBNJ XD(M) Compact 11+1 40S&W **Mouse over image above to zoom any area, or click on image to zoom the entire image. *Please Note!! Many of our pictures are stock photos provided to us by the manufacturer and do not necessarily represent the actual item being purchased. Please verify this picture accurately reflects the product described by the title and description on this page before you place your order. Springfield is currently no longer shipping items with the XD gear. Moving beyond comfort and fit, Springfield Armory® explores new territory in tactile response. With the introduction of The (M) Factor™, Springfield's reputation in ergonomics, intuitive operation, and handling is taken to a whole new level. Advances in manufacturing allow Springfield to take the XD(M)® series to a whole new level in precision.With an incredible attention to detail, no handgun company approaches precision engineering like Springfield Armory®. The same spirit of innovation that fueled the success of the XD® is now captured in the all new XD(M)® line of polymer pistols. From subtle influences to industry firsts, the XD(M)® series pushes the boundaries on what a polymer pistol should be.Usually, handgun customization is an after-market decision. With the XD(M)®, you get more personalized choices for a custom fit right out of the case. Great shooting and feeling pistol. I put some glo does on it, and love it. Perfect balance of weight, accuracy and capacity. Highly recommend. Reviewed By: nathan l on 03/03/2015 Rating: 4 of 5 Stars! gun shoots good and is accurate it is going to make a good conceal carry gun for my self Reviewed By: Roger D on 03/17/2014 Rating: 5 of 5 Stars! great gun accurate and easy to conceal it is my second one of these and i can say very durable i carry it while archery hunting and it does not scratch going through briar buds is very quick on delivery and easy to deal with highly recommend
Monday, October 25, 2010 But now that I’ve gotten things at least sorted, I wanted to thank you for your support and love for Ragnar Las Vegas. You are a dear, cherished, wonderful friend (still!). And NOW (you lucky lady) I will tell you about the run. Wasatch Back was a very empowering experience for me. It made me feel like I could actually maybe be a runner (although we’re still using that term very loosely). As far as my running goes, I came away from Las Vegas with some goals for my own progress in terms of distance and speed. But Las Vegas for me was mostly about Briana, which was completely unexpected. When Spencer realized last week that he would not be able to run, he suggested we have Taylor take his place. Then he said (with Bri sitting there), “Or Briana could do it.” Both Spencer and I immediately jumped on that, knowing how empowering and fun Ragnar had been for both of us. However, the truth was that since Spencer is a strong runner, he had a tough runner position. But when Bri said that she might be interested, we both kinda downplayed the difficulty while playing up her strength and ability to really conquer this. During Bri’s first leg she had some tough hills. At about Mile 1.5 she came up to where we were ready to support her, and she looked MAD! She said (and I will laugh about this forever, but it wasn’t funny for her), “This is about as flat as my chest!” I ran with her for a bit, and she cried a bit. I told her she was strong. She said she was going to kill your mom because NOT anyone can run a mile. We both laughed a little, and she started a downhill stretch. I told her that the next two miles were downhill, then she had a mile of uphill, and the last mile was downhill. I also told her that Mary Kay and Rich both thought they could take over the remainder of her leg if she wanted them to. By the time we’d gotten that far, she was feeling calmer. We agreed to meet at the bottom of the hill in 2 miles. When we met there, she was good. I asked her if she wanted us to meet her at the end of the next uphill mile, and she said, “No, I think I can do it from here. I’ll see you at the end.” She was wiped out and very like me in that she didn’t want to talk to anyone at the end of her run. But it gave her some power, and she rocked her second run (which was around 4 miles). She did lots of walking, of course, but she did the distance. After our van was finished with Leg 2, we went to a hotel room we had gotten, and we all pulled out our sleeping bags and sacked out everywhere. We got about 3 hours of sleep there. When we woke, Bri was nearly instantly in tears and she told me everything hurt and she didn’t know how in the world she was going to do another 6+ miles. I told her not to worry about it because we could all pitch in and do the distance for her. Immediately after that, however, everyone started talking about how tired they were and how everything ached and how they were dreading Run #3. I worried like crazy about Briana. Our Van 2 had a very difficult night, so we had an extra hour to wait at the exchange, and there were three runners before Briana, so she slept like the dead in the back of the van for another couple of hours. When she woke up, she was feeling so much better. She got some food in her and started preparing for her run (her choice, as I gave her the option again). Her last leg was on dirt/rock road. It was tough running, but it was flat. We met her at Mile 1.5 and Mile 3, and she was good. When we met her at 4.5, she was hurting mentally. She asked me how much farther, and I told her I thought it was about 1.5 miles, maybe a bit more. She said, “I can do that.” It was actually a full two miles, but she did it. When we were at the exchange, we could see her way out there, and once she saw the exchange she ran all the way in. There was another team there, and we asked them to make a bridge with us. They were very sweet about it, and they also provided a tp finish line for her to cross. We all yelled and yelled, and I want to cry when I think about the kind support those strangers gave to our runner, who may have had no business being in the race at all. I gave Bri as much support as I could through all her runs because she was kinda mad at her dad while in the heat of the moment. But when she finished, he was immediately by her side, and she laid her head on his shoulder while he told her how strong and wonderful she was. She told me after Leg 1 that she didn’t think Ragnar was as fun as we had made it sound. But after she was breathing again after her last leg, I grinned at her and said, “Determined enough to run a half.” She grinned back and said, “Not stupid enough to run a full.” We are in training for a half marathon in the spring. And Briana has a Ragnar shirt and a medal to show to the world how cool and strong and capable she is. I am very grateful. And proud. Love to people who make us more than we think we are and more to you (a two-fer!) Aundrea P.S. Our team name was “Top Run” (my brilliant idea), and it was really fun. We yelled and texted movie quotes at each other through the race; Mary Kay bought these glow sticks at the dollar store that we waved like we were on a runway; and Stacy lent us the Top Gun soundtrack, which we blasted intermittently throughout the course. So. Much. Fun. At the finish line we all wore our Top Run shirts (I’ll post pix later) and our Aviators. We were very cool. (Who knew when I saw Top Gun 400 times as a teenager that it would be such a huge part of something I did in my 40’s?) 5 comments: There are no words for how proud I am of you. I was proud of your mom last time, but this time it's all about you. You are so strong and amazing and I'm inspired! Also I'm glad your last leg was more like my chest than your own..... Just sayin'. Love to people who make you proud and more and more to you! (a hard-core two-fer)Amy Dear Aundrea, Someday I hope I understand just how much this means to you. Because if I can love my kids like you love yours I will be the kind of mom I want to be. Love to incredible mothers everywhere, and more to you!Amy PS How did it go for YOU? PPS When's the half? (you know what I'm thinking, right?) Wow...I have chills! It was so great seeing you guys even if it was for just a little bit. :)Running is such a great sport cause it pushes your limits and helps you to know what you can do.I am so proud of BOTH of you!Congrats!!! :)
Q: What are the pros of using traits over abstract classes? Can someone please explain traits in Scala? What are the advantages of traits over extending an abstract class? A: The short answer is that you can use multiple traits -- they are "stackable". Also, traits cannot have constructor parameters. Here's how traits are stacked. Notice that the ordering of the traits are important. They will call each other from right to left. class Ball { def properties(): List[String] = List() override def toString() = "It's a" + properties.mkString(" ", ", ", " ") + "ball" } trait Red extends Ball { override def properties() = super.properties ::: List("red") } trait Shiny extends Ball { override def properties() = super.properties ::: List("shiny") } object Balls { def main(args: Array[String]) { val myBall = new Ball with Shiny with Red println(myBall) // It's a shiny, red ball } } A: This site gives a good example of trait usage. One big advantage of traits is that you can extend multiple traits but only one abstract class. Traits solve many of the problems with multiple inheritance but allow code reuse. If you know ruby, traits are similar to mix-ins A: package ground.learning.scala.traits /** * Created by Mohan on 31/08/2014. * * Stacks are layered one top of another, when moving from Left -> Right, * Right most will be at the top layer, and receives method call. */ object TraitMain { def main(args: Array[String]) { val strangers: List[NoEmotion] = List( new Stranger("Ray") with NoEmotion, new Stranger("Ray") with Bad, new Stranger("Ray") with Good, new Stranger("Ray") with Good with Bad, new Stranger("Ray") with Bad with Good) println(strangers.map(_.hi + "\n")) } } trait NoEmotion { def value: String def hi = "I am " + value } trait Good extends NoEmotion { override def hi = "I am " + value + ", It is a beautiful day!" } trait Bad extends NoEmotion { override def hi = "I am " + value + ", It is a bad day!" } case class Stranger(value: String) { } Output : List(I am Ray , I am Ray, It is a bad day! , I am Ray, It is a beautiful day! , I am Ray, It is a bad day! , I am Ray, It is a beautiful day! )
1. Introduction {#sec1-ijerph-14-00025} =============== In recent years a great deal of research has focused on the influence of resettlement factors on the mental health of refugees resettling in developed countries. However, little empirical work on refugee mental health has addressed the gendered nature of stressors and sources of resilience. This study seeks to address this gap in knowledge by investigating the role of gender in moderating and mediating the influence of various sources of distress and resilience among current and former Afghan refugees residing in Alameda County (California, USA). Research has shown that refugees experience high levels of trauma and loss \[[@B1-ijerph-14-00025],[@B2-ijerph-14-00025]\] and refugees resettling in developed countries are at greater risk of depressive and anxiety disorders, including PTSD, as compared to natives or labor migrants \[[@B3-ijerph-14-00025],[@B4-ijerph-14-00025],[@B5-ijerph-14-00025]\]. Recent research utilizing ecological or psycho-social perspectives acknowledges the importance of war traumas and trauma-based therapies, and adds a focus on the losses and stressful conditions refugees experience while seeking asylum and adjusting in a new society \[[@B6-ijerph-14-00025],[@B7-ijerph-14-00025],[@B8-ijerph-14-00025]\]. This focus is supported by a number of studies finding that, net of traumatic pre-migration and transit-related experiences, daily resettlement or post-migration stressors and sources of resilience explain a substantial part of the variation in current levels of distress in refugee populations \[[@B9-ijerph-14-00025],[@B10-ijerph-14-00025],[@B11-ijerph-14-00025]\]. Previous studies have found a variety of factors that negatively affect mental health, including but not limited to: acculturation \[[@B12-ijerph-14-00025]\] and cultural adjustment challenges (including language acquisition) \[[@B13-ijerph-14-00025]\]; loss of social support from one's ethnic community \[[@B14-ijerph-14-00025]\]; family conflict \[[@B15-ijerph-14-00025]\]; unemployment and financial hardships \[[@B16-ijerph-14-00025]\]; legal migration status and conflict with immigration officials \[[@B17-ijerph-14-00025]\]; and, ethnic discrimination \[[@B18-ijerph-14-00025],[@B19-ijerph-14-00025]\]. Conversely, factors supportive of higher resilience and positive mental health among conflict-affected populations include a sense of coherence, strong family and social networks (from same ethnic communities), coping, as well as religion and belief systems \[[@B20-ijerph-14-00025]\]. Findings from the studies described above parallel previous studies of Afghan refugees consolidated in a recent systematic review showing high rates of depression, PTSD, and psychosomatic symptoms as influenced by similar post-resettlement factors, with women showing higher vulnerability \[[@B21-ijerph-14-00025],[@B22-ijerph-14-00025]\]. However, as mentioned, few researchers have investigated the gendered nature of stressors and sources of resilience \[[@B23-ijerph-14-00025]\], and we found no studies that addressed this issue for Afghans. This study seeks to address this gap in the literature using data from a cross-sectional survey of current and former Afghan refugees, developed through informants and preliminary qualitative interviews of Afghans residing in Alameda County, California. Many of the resettlement stressors raised by informants and subjects in qualitative interviews during survey development were highly gendered. These included reports of family conflicts over women adopting non-traditional roles, suppression or marginalization of women who are "moving too fast" to expand their roles, status-loss among middle and upper class males who struggled to transfer their credentials and professional credibility in the USA, and intergenerational tensions over Afghan adolescents and young adults' (especially daughters') perceived excessive "Americanization" and disregard of Afghan culture, especially around dating and sexuality, much of which parallels Lipson and Omidian's \[[@B24-ijerph-14-00025]\] ground-breaking research with Afghan refugees. Of course, many of these are sources of stress for other immigrant groups \[[@B25-ijerph-14-00025],[@B26-ijerph-14-00025]\], but we believe they may be particularly influential for Afghans because of substantial differences between the gender and sexual orders of Afghanistan and the USA, and because of the increased vulnerability of Afghan refugees who have experienced significant traumas \[[@B27-ijerph-14-00025]\], have family members and friends in danger in Afghanistan, and who are distressed by the continuing wars and strife in Afghanistan \[[@B28-ijerph-14-00025]\]. Much work on gender and migration focuses on the disruption of "traditional" or "patriarchal" gender roles and balances of power faced by migrants entering host societies with liberalized or more egalitarian gender orders. Landmark studies caution against simplistic immigrant acculturation theories that model gender change as based on immigrants assimilating egalitarian gender roles or norms of host societies \[[@B29-ijerph-14-00025],[@B30-ijerph-14-00025],[@B31-ijerph-14-00025]\]. Hondagneu-Sotelo's \[[@B30-ijerph-14-00025]\] study of Mexican-Americans migrants in Redwood City, CA found that gender role expansion for many men and women was caused by family stage migration patterns that separated spouses and pressured them to develop skills outside of their gender spheres. Kibria's study \[[@B29-ijerph-14-00025]\] of Vietnamese refugees in Philadelphia emphasized gender differences in institutional opportunities in the host society that altered the gender balance of power within families and communities to increase women's power, but that did *not* lead to the adoption of gender egalitarian beliefs (acculturation). Similarly, a recent study of Syrian refugees in Lebanon found high unemployment among the husbands and the expansion of women's public and economic roles. Under these conditions, some women reported losing their sense of femininity and greater stress from an increased workload, while a few reported feeling empowered by their expanded roles. Some Syrian men reported shame about not providing for and protecting their families, and some informants reported increased angry outbursts, physical violence and abuse towards women and children by Syrian men unable to perform their roles \[[@B32-ijerph-14-00025]\]. In her study of transnational Mexican families Hirsch \[[@B31-ijerph-14-00025]\] highlighted generational changes in *both the sending and receiving communities* that contributed to the erosion of patriarchal sexual and intimate relationships between spouses and the growth of a more egalitarian regime of "trust" among younger generations in both locations. These and other studies encourage researchers to avoid essentializing the gender orders of sending and receiving societies, focus on how gender and generational power relations are influenced by diverse conditions of migration and resettlement, be attuned to the complexity of acculturation processes, avoid one-sided cultural determinism, and recognize the influence of transnational ties and flows. In this study we seek to recognize the complexity of gendered influences on refugee resettlement by exploring ways gender mediates or moderates the influence of a range of potential stressors and sources of resilience on levels of distress that Afghans experience during resettlement in northern California. Our analysis tests for the effects of several variables previously shown to influence distress levels of immigrant and refugee groups. These include perceived discrimination, employment status, non-family social support, English ability, civic engagement, intimate and extended family ties, dissonant acculturation, and gender ideology. We examine the influence of gender on these factors and expect to find that gender will moderate the influence of English ability, family ties, dissonant acculturation, and gender ideology. Additionally, we expect gender will moderately mediate the influence of employment and English ability on levels of distress. Hypotheses ---------- ### Hypothesis 1: Women Will Report Higher Levels of Distress than Men Across a wide range of social positions and conditions, women report higher levels of distress \[[@B33-ijerph-14-00025]\]. Previous work on refugees and Afghan refugees has found this same pattern \[[@B21-ijerph-14-00025],[@B22-ijerph-14-00025]\]. ### Hypothesis 2: Gender Will Moderate the Effect of English Ability on Levels of Distress. English Ability Will Be More Strongly and Negatively Associated with Distress for Women than for Men Beiser and Hou \[[@B34-ijerph-14-00025]\], found that for Southeast Asians, 10 years after relocating to Canada, low English ability was associated with depression for women but not men. They hypothesized that this reflects how English ability limits access to employment more for women than men (female-typed jobs more often require English competence) and that low English ability is associated with social isolation for women more than for men. We believe similar processes may be working for Afghan women in Alameda County, and add that social isolation and low English skills may be a self-reinforcing cycle for Afghan women more than men partly because of gender roles and power dynamics that encourage some women to stay in the home. ### Hypothesis 3: Gender Will Moderate the Effect of Gender Ideology on Levels of Distress Such That Non-Traditional Women and Traditional Men Will Experience Higher Levels of Distress Das Gupta \[[@B26-ijerph-14-00025]\] found that among high SES Asian Indian immigrants in the northeastern USA, both men and women with egalitarian views on gender had higher levels of anxiety. She suggested this may be because they were being marginalized by co-ethnics for threatening a strong cultural ideal of Indian women as chaste, pure, and family oriented. Our expectations that gender moderates the effect of gender ideology (traditional v. egalitarian views on gender roles) and family ties are informed by this study, but also by research on the gender order in Afghanistan and gender tensions among Afghans in the USA, and qualitative interviews about Afghan men's difficulties enacting traditional gender roles in the USA. It is important to note that solid majorities of Afghan women and men in northern California support more equal gender roles and expanding women's roles. Many first-generation Afghans in the USA lived in Kabul prior to leaving and identify with urban modernity, including greater gender equality. In qualitative interviews, some discussed fleeing Afghanistan to escape the social repression of women during Taliban rule. We believe the desire for gender equality registered in our survey is genuine, but that it coexists with pockets of gender traditionalism and substantial gender segregation organizationally, occupationally, and domestically, and with sanctions against women who violate these boundaries \[[@B35-ijerph-14-00025]\]. We further hypothesize that egalitarian ideals coexist with more patriarchal "bottoms" to their gender ideologies \[[@B36-ijerph-14-00025]\] that reflect a gender order in Afghanistan which often include stronger gender segregation (e.g., "purdah" practiced by many Pashtun's to prevent women from having contact with non-family males) and male authority, including an emphasis on male moral authority \[[@B37-ijerph-14-00025],[@B38-ijerph-14-00025],[@B39-ijerph-14-00025]\]. Thus, we hypothesize that many egalitarian Afghan women face resistance from partners, other family members, and community members that limit them from enacting egalitarian role identities, contributing to higher levels of distress. Traditionally oriented women may be better able to enact gender role identities that are consistent with their beliefs, and for some women (e.g., employed, active in public spheres) adapting a traditional gender ideology may be part of a "transitional" strategy that reduces stressful conflicts associated with more egalitarian practices \[[@B29-ijerph-14-00025],[@B36-ijerph-14-00025],[@B40-ijerph-14-00025]\]. Conversely, we hypothesize that men with traditional gender ideologies are likely to be more distressed because they are less able to enact gender role identities that fit their ideology while more egalitarian men may be less distressed because they have downgraded the importance of enacting provider or moral authority roles. Fully enacting provider roles has been challenging for many first generation Afghan men in our sample. Many Afghan men have had to accept less skilled, lower status, and lower paying work than they were qualified or were on track for in Afghanistan and/or have struggled, often with limited success, to get their credentials recognized or supplemented in their profession. Of the 104 Afghan men age 65 or under in this study, 11.6% were unemployed, 15.4% were working less than 25 h a week, 4.8% were retired, 11.5% were disabled, and 1.9% were 'keeping house'. Of the 67 men age 65 and under who were employed, 47.8% said their job did not allow them to use their training, experience, and abilities and only 35.8% said their job utilized their training and skills. Thus, we expect that both employed and unemployed men benefit from an egalitarian gender ideology. ### Hypotheses 4: Gender Will Moderate the Effect of Family Ties on Levels of Distress Such That Family Ties Will Be a Stronger Source of Resilience for Women than for Men and 4a: For Men, Extended Family Ties Will Be Least Buffering or a Source of Distress Our expectation on gender moderating the influence of family ties is closely related to the struggles Afghan men have faced enacting traditional provider, protector, and moral authority roles and to informants' reports of conflicts and stressors related to extended family ties. As just mentioned, many Afghan men struggle to enact provider roles, and they may experience conflicts with wives who are expanding their gender roles, and/or experience tensions with their children related to dissonant acculturation that they interpret as challenging their moral authority. Under these conditions family ties may not serve as a buffer for some men, or they may even be stressful reminders of their "failures" and frustrations in the occupational sphere or in carrying out their culturally important roles as moral leaders in the family \[[@B37-ijerph-14-00025],[@B39-ijerph-14-00025]\]. Supporting our hypothesis, Dalgard and Thapa \[[@B41-ijerph-14-00025]\] found that among "non-Western immigrants" (from the Middle East, Africa, the Indian subcontinent, and the rest of Asia) to Norway, marriage was protective for women, but not for men. They also reported that non-Western immigrants in Norway have very high rates of unemployment (34%), perhaps reflecting conditions where men in this population had difficulty performing expected roles. In addition, some young adult informants reported high levels of conflict between fathers and uncles and that in the jostling for status within extended families, some men are reminded of their failure to perform expected roles, making extended family interactions stressful. Thus, we hypothesize that extended family ties may even be a source of distress for men. Conversely, we expect that family ties will have a robust buffering effect for Afghan women. Possessing nuclear and extended family ties allows women to enact traditional roles that continue to be highly valued in this Afghan community. Family ties provide them opportunities to enact important gender role identities without reinforcing the shame that some men may experience. To be clear, we do *not* expect that women in 'traditional' homemaker roles will have the lowest levels of distress. On the contrary, we expect that employment is a robust source of resilience for women and men. ### Hypothesis 5: Gender Will Moderate the Effect of Dissonant Acculturation on Levels of Distress. Dissonant Acculturation Will Be More Strongly and Negatively Associated with Distress for Men than for Women Portes and Rumbaut's \[[@B42-ijerph-14-00025]\] conception of dissonant acculturation emphasizes acculturation gaps between parents and children as potential stressors. We did not find studies that identified gender differences in the influence of dissonant acculturation on distress. Nevertheless, we expect dissonant acculturation to be associated with greater distress for Afghan men because an acculturation gap constitutes men's failure to protect the virtue of their children (especially daughters) and to enforce cultural/moral standards in their children, both salient father role identities for many Afghan men. This may have been reflected in separate focus groups of Afghan men and women when we raised issues of their children becoming too "Americanized". Both men and women complained strongly about losing control of their children, but in contrast to the women the men linked this more to a sense of cultural loss. At one point in the men's interview they collectively agreed they were "dinosaurs" and in explaining what this meant several men talked of cultural extinction and loss that was missing from women's complaints. We hypothesize that expressions of cultural loss associated with dissonant acculturation reflect men's loss of status and moral authority. It may also be that women are less distressed by dissonant acculturation because they recognize that the acculturation gap is a consequence of living in a society with opportunities for role expansion that they value. ### Hypothesis 6: Gender Will Partially Mediate Employment-Distress and English Ability-Distress Relationships In addition to testing for the moderating effects of gender we will run tests of its mediating effects. We expect women will have lower rates of employment and English competence, and that gender, English ability, and employment will be associated with distress. Thus, we expect gender to partially mediate the employment-distress and English ability-distress relationships. 2. Materials and Methods {#sec2-ijerph-14-00025} ======================== 2.1. Participants and Procedures {#sec2dot1-ijerph-14-00025} -------------------------------- Inclusion criteria for this cross-sectional study entailed being of Afghan ancestry, originally resettled in the USA as refugee or under conditions of duress, and being an adult over the age of 18. Using the ancestry and birthplace questions in the 2005--2009 American Community Survey to match the time of our survey we estimate that 88,556 people of Afghan ancestry lived in the U.S at the time of our survey of which approximately 40% resided in California. Of the Afghans in California, 55.1% live in five contiguous counties running from the eastern San Francisco Bay Area to the Central Valley (Alameda, Contra Costa, Santa Clara, Sacramento, San Joaquin). Our sample was taken from Alameda County, which has by far the largest Afghan population of those five counties \[[@B43-ijerph-14-00025]\]. Recruitment took place between November 2007 and May 2008 using a combination of non-random and random sampling techniques through eight organizations or programs serving the local Afghan community. These included two mosques whose members were mostly Afghan, a cultural organization for a particular ethnic group and an organization that aided recent arrivals working to establish residency or citizenship. The other four programs/organizations provided opportunities for socialization, social support, and various services such as health screening, assistance navigating social service or medical bureaucracies, rent and food assistance, and referrals to mental health services. Participants were recruited by representatives of the different organizations. If the organization had a basis for developing a sampling frame we created the list and selected participants at random. Slightly over half (50.2%) of the sample was created this way. In some instances, this was not possible so we sampled purposively to create a representative gender and age balance. One of the eight organizations was added near the end to improve ethnic balance. We purposively selected organizations to insure each wave of migration was well represented. The research, survey design, and signed consent process were approved by the Institutional Review Board at the lead author's university. The survey of primarily fixed-choice questions was constructed by the first two authors aided by a team of Afghan informants and community leaders, and from insights gained in our preliminary qualitative research with Afghan refugees and their adult children as well as Afghan and non-Afghan social service providers exploring the social, cultural, medical, and mental health needs and challenges of Afghans in Alameda County. Many measures were developed or adapted based on this research and in some instances topics and standard measures (e.g., family conflict) were avoided because informants indicated responses would not be valid. Informants encouraged us to limit the number of questions on traumatic experiences causing us to limit somewhat items on pre-resettlement traumas. After piloting an English version of the survey with Afghans fluent in English, two Dari translations and a Dari-in-English transliteration were produced by two bilingual Afghan educators and a graduate student with training in social science research methods. Differences were reconciled in conference with the lead author, a bilingual 2nd generation researcher with social science training, and two bilingual 1st generation informants (one with social science training) to produce exactly matching Dari and Dari-in-English versions. The latter version was used by interviewers fluent but not literate in Dari. This survey was pre-tested by conducting 20 interviews leading to final changes based on feedback from interviewees and interviewers. The survey was then computerized using Computer Aided Personal Interviewing software to improve coding accuracy and reliability of skip sequences \[[@B44-ijerph-14-00025]\]. Interviewers were matched by gender, and, when deemed necessary, by ethnic group (e.g., Tajik, Pashtun). 2.2. Measures {#sec2dot2-ijerph-14-00025} ------------- ### 2.2.1. Dependent Variable {#sec2dot2dot1-ijerph-14-00025} The dependent variable in our analyses is the 24-item Talbieh Brief Distress Inventory (TBDI) which was designed and validated as a general measure of distress among immigrants \[[@B45-ijerph-14-00025]\]. TBDI draws 11 questions from the Psychiatric Epidemiology Research Interview Demoralization Scale and 13 items from the Brief Symptom Inventory that include items related to obsessiveness, hostility, sensitiveness, depression, anxiety, and paranoid ideation. Items are based on a one-month recall period where respondents are asked to indicate the degree of discomfort caused by each item with response choices ranging from 0 = "not at all" to 4 = "extremely". Mean scores range from 0--4 with higher scores indicative of higher severity of distress. For our sample TBDI demonstrated strong internal reliability (Cronbach's α = 0.960). While we acknowledge that the TBDI has not been used as widely as measures developed for, or validated with refugee populations, items within the TBDI indeed mirror items from the HSCL's anxiety and depression subscales. Also, the choice to use this measure provides a broader account of distress that is not solely limited to anxiety and depression given its subscales that tap into symptoms associated with hostility, paranoid ideation, etc., that likely manifest in traumatized populations. The scale demonstrated good face validity when presented to key informants in the Alameda County area, and we tested the scale in our pilot and pretest before fully implementing it. ### 2.2.2. Independent Variables {#sec2dot2dot2-ijerph-14-00025} The primary moderator and mediator variable is gender which was recorded as a binary variable in this study (1 = male, 0 = female). Core control variables were age in years, education, employment status, and English ability. Education is a four category variable measuring the highest level of education achieved in Afghanistan, the USA, or some other country (ranging from 0 = "less than high school" to 3 = "4-year college degree or higher"). Employment status is a binary variable (1 = currently employed part-time or full-time, 0 = not employed). A small number of respondents who were attending school (*n* = 11) were counted as employed for this variable. English ability is the mean score of three items on self-rated ability in speaking, writing, and reading English (ranging from 0 = "Not at all" to 4 = "Very fluent"). The English ability scale demonstrated excellent reliability in this sample (Cronbach's α = 0.973). Other independent variables included perceived discrimination, civic engagement, dissonant acculturation, family ties, non-family support, pre-resettlement traumas, and gender ideology. *Perceived discrimination* is the mean score of four equally weighted items including two standard questions about personal experiences of discrimination, one asking if they experienced discrimination in any of several various contexts and the other on perception of how fairly Afghan job-seekers are treated. Two other items were developed through preliminary research to focus on experiences and perceived threats after the events of 9/11. Perceived discrimination has a Cronbach's α of 0.557. While somewhat low, it is acceptable because different dimensions of discrimination were measured. *Family ties* is a summated index of three yes/no items: Is the respondent married and living with his/her spouse? Is one or more other family members living in their household? Do they see 10 or more other family members (not in household) on at least a monthly basis (extended family ties)? Cronbach's α for this variable is a very low 0.189. Nevertheless, combining these items is justified because the index captures different intimate and extended family ties that are likely to provide substantial emotional or practical support and/or opportunities to enact gender role identities. We thus treat this variable as multidimensional and conducted additional tests on the influence of both extended and intimate family ties. *Non-family support* is a single binary item asking it the respondent has a friend he/she can rely on when in need of help. *Dissonant acculturation* is a summated index made up of four items. It includes two questions on dating that, based on interviews of young adult Afghans, reflect important acculturation gaps; a question on conflict with their children over them becoming too "Americanized"; and a question on how worried they are that their children will fail to maintain their Afghan culture and identity. The first dating question asked if it is ok for Afghan children in high school to go on mixed-gender group dates and the second question asks if it is ok for Afghan children to date people of the opposite sex after completing high school. USA dating practices are particularly distressing for many Afghan parents and many are aware that Afghan youth and young adults often hide their intimate relationships and premarital sexual intimacy from parents. The first three items are binary items and the last one on how much they worried that their children will fail to maintain their Afghan culture and identity was coded 0 = not worried, 1 = somewhat worried, 2 = worried a lot. We effectively weighted this item double the other three items because it is a more global measure that we felt deserved more weight. Two of the other items were on the same issue (dating), and we wanted to weigh the "conflict over Americanization" item less because of modest validity concerns about respondents disclosing family conflicts. Cronbach's α was a modest 0.526 for this index because it includes three somewhat separate dimensions: views on dating that conflict with USA culture, general fear of cultural loss, and conflict with child over their Americanization. *Pre-resettlement trauma* is a summated index of 11 "yes/no" items on respondents' traumatic experiences encountered in Afghanistan or while fleeing. These included items such as, "Were any close friends or family members killed or missing during the wars or coups?" "Did you witness someone being killed or seriously injured?" "Was your life threatened during wars and coups in Afghanistan?" and "Did you live in a refugee camp after fleeing Afghanistan?" Cronbach's α = 0.749 for this index. *Civic engagement* is a summated index of four yes/no items asking respondents if they are a USA citizen, if they voted in the 2006 election, if they volunteered in an organization serving Afghans in the past year, and if they volunteered in another civic organization in the past year (not serving Afghans). Cronbach's α = 0.541 for this variable. *Gender ideology* is a single binary item from NORC's General Social Survey that informants said would be well understood and would capture salient ideals about gender roles. The respondent is asked which type of marriage they would prefer and the two choices describe a traditional division of labor where the husband provides household income and the wife cares for the home and family and an egalitarian marriage where these responsibilities are shared equally. Those who selected the traditional marriage description were coded 1 and the others (including a few who volunteered 'not sure') were coded 0. 2.3. Data Analysis {#sec2dot3-ijerph-14-00025} ------------------ We used SPSS version 24.0 (IBM, Armonk, NY, USA) for all data analysis. We handled missing data by replacing with means scores for respondents who answered at least 21 of 24 TBDI items and three of four perceived discrimination items, dropping those without 21 of 24 or three or four, respectively, from the analysis. For other variables cases were dropped for missing items, except we imputed values for two of the 11 items for 48 cases in pre-resettlement traumas (missing due to interviewer or computer error) using predicted values from models that regressed the item score on the remaining trauma items, gender, age, employment status, and education. We believe this solution for the missing pre-resettlement items only slightly affected the results because there was comparatively little variation in these two items. Almost seven in eight (87.1%) had experienced "life threatening situations", while less than one in seven (13.9%) were "captured, imprisoned, or held hostage". Pearson's *r* between the 9-item index and the 11 item index is 0.987. When it made analytical sense, we treated "don't know" responses as "no". For example, two respondents who said they "don't know" if they have a close friend they can rely on were treated as not having a close friend. The sample size for regressions ranged from 241 to 250 (We ran the ten regressions in Tables 2 and 3 with pre-resettlement trauma, discrimination, TBDI variables that excluded cases with any missing values. This reduced the sample size significantly, ranging from 185 to 241. The pattern of significant relationships remained the same with a few exceptions. Overall, our interpretations remain the same. Employment in Model 1 changed from marginally significant to significant at *p* \< 0.05 (*p* = 0.049). Gender in Model 6 changed from *p* \< 0.05 to *p* \< 0.01. In Model 7 dissonant acculturation went from marginally to non-significant (*p* = 0.109). In Model 8 gender changed from significant at *p* \< 0.05 to marginally significant (*p* = 0.069). The two most important changes were in Models 9 and 10. In Model 9 English × gender went from significant at *p* \< 0.05 to marginally significant (*p* = 0.053). In Model 10, pre-resettlement trauma explained substantially more variance. Adding the version of this variable without imputed missing values for two items explained an additional 9.2% of the variance compared to 6.8% of added explained variance reported in Table 3. The R^2^*~adjusted~* for Model 10 also increased from 42.1% to 43.3%. When added to this model, pre-resettlement trauma × gender was not significant at *p* \< 0.10. We also ran Model 10 with a nine item pre-settlement trauma index that dropped the two items with a large number of missing cases and the additional explained variance was also higher (8.3%) than reported Model 10 in Table 3. Thus, it is likely that we modestly underestimated the influence of pre-settlement trauma in the reported Model 10.). Pearson, Spearman, and point-biserial correlations, were used to examine relationships between continuous, ordinal, and categorical independent variables and the dependent variable (TBDI). To test our hypotheses, stepwise multiple regression analyses explaining TBDI scores were used, consisting of 10 ordinary least squares (OLS) regression models organized hierarchically. In Step 1 we entered four socio-demographic variables as core controls; Step 2 added gender to assess its independent influence; and Step 3 added six key explanatory variables, thus constituting our full model of resettlement factors without gender interactions. Steps 4--7 each add to Model 3 one gender interaction term (e.g., English ability × gender in Model 4). We report only interaction terms significant at *p* \< 0.10. We relaxed the *p* \< 0.05 standard to *p* \< 0.10 for interactions because of concern about Type II errors with our relatively small sample size and to identify possible moderators for future studies. Each of these interactions are plotted or graphed in [Figure 1](#ijerph-14-00025-f001){ref-type="fig"}, [Figure 2](#ijerph-14-00025-f002){ref-type="fig"}, [Figure 3](#ijerph-14-00025-f003){ref-type="fig"} and [Figure 4](#ijerph-14-00025-f004){ref-type="fig"}. Model 8 drops two non-significant independent variables from Model 3 (core controls are kept regardless of significance levels) and Model 9 then adds all (three) of the statistically significant interaction terms to Model 8. Model 9 is thus our most parsimonious full model focusing on resettlement stressors and sources of resilience. Model 10 adds pre-resettlement traumas to create our full parsimonious model. 3. Results {#sec3-ijerph-14-00025} ========== 3.1. Socio-Demographic Characteristics {#sec3dot1-ijerph-14-00025} -------------------------------------- [Table 1](#ijerph-14-00025-t001){ref-type="table"} reports percentages for categorical variables and means, standard deviations and ranges for continuous variables. A sample of 259 Afghans participated in this study. Our sample was on average 48.75 (SD = 15.86) years of age and slightly more likely to be female (51.4%) with a majority possessing a high school diploma (29%) or lower (31%), and 25.1% holding a 4-year college degree or higher. Overall, 41.3% were employed (28.5% of women and 69.5% of men age 65 and younger), with moderate levels of English ability (M = 2.03, SD = 1.29), and year of arrival ranging from 1979 to 2008 (M = 1993, SD = 8.06). Average TBDI scores indicate that distress occurs at low to moderately high levels (M = 1.21, SD = 0.99). 3.2. Bivariate Analyses {#sec3dot2-ijerph-14-00025} ----------------------- The far right column of [Table 1](#ijerph-14-00025-t001){ref-type="table"} reports Pearson correlations, Spearman's rho, or point-biserial correlations and significance levels between the independent variables and the dependent variable (TBDI). With the exception of the 'year of arrival' variable, the core controls (age, education, employment, and English ability) have bivariate relationships with TBDI that are significant at *p* \< 0.05 (two-tailed). Being younger, highly educated, employed, and possessing greater English competence are associated with lower levels of distress. Among the other explanatory variables English ability is negatively associated with TBDI scores and perceived discrimination, dissonant acculturation, and pre-resettlement traumas are positively associated with TBDI at *p* \< 0.05. 3.3. Multivariate Analyses {#sec3dot3-ijerph-14-00025} -------------------------- ### 3.3.1. Hypothesis 1: Effect of Gender on TBDI {#sec3dot3dot1-ijerph-14-00025} Moving to our regressions, in Model 1 ([Table 2](#ijerph-14-00025-t002){ref-type="table"}) we see that the four controls explain 8.2% of the variance (adjusted R^2^), with English ability (*p* \< 0.05) and employment status (*p* \< 0.10) both negatively associated with distress. Model 2 adds gender, which explains an additional 1.8% of the variance with men having lower levels of distress than women (*p* \< 0.05). This finding supports hypothesis 1 that women report higher levels of distress. Model 3 adds the remaining six independent variables, which combined explain another 15.2% of the variance. Having more family ties lowers distress levels, while experiencing discrimination and dissonant acculturation increase levels of distress. Based on standardized betas, discrimination and family ties are the strongest factors influencing distress levels. With these additional independent variables gender continues to be significantly related to TBDI (*p* \< 0.01), further confirming hypothesis 1. ### 3.3.2. Hypothesis 2: Gender Moderates Effect of English Ability on TBDI {#sec3dot3dot2-ijerph-14-00025} We then, in separate models, added to Model 3 a gender interaction term one at a time for employment, English ability, discrimination, family ties, non-family support, civic engagement, dissonant acculturation, traditional gender ideology, and pre-resettlement trauma. Models 4 through 7 report the results of the four interaction terms that were significant at *p* \< 0.10. The gender interaction terms for employment, discrimination, non-family support, civic engagement, and pre-resettlement traumas were not significant. Model 4 shows that, with control and independent variables, the English ability × gender interaction is significant at *p* \< 0.05 explaining an additional 1.6% of the variance in TBDI. [Figure 1](#ijerph-14-00025-f001){ref-type="fig"} plots this interaction, showing that English ability lowers distress levels for women more than for men, supporting hypothesis 2. Moving from low to high English ability reduces women's predicted TBDI scores nearly 6/10 of a point on this four-point index, while for men increasing English ability only decreases predicted TBDI scores by 1/10 of a point. ### 3.3.3. Hypothesis 3: Gender Moderates Effect of Gender Ideology on TBDI {#sec3dot3dot3-ijerph-14-00025} Model 7 ([Table 3](#ijerph-14-00025-t003){ref-type="table"}) shows that the traditional gender ideology × gender interaction is significant at *p* \< 0.001. Adding this interaction term explains a substantial additional 6.6% of the variance. [Figure 2](#ijerph-14-00025-f002){ref-type="fig"} graphs this interaction showing that traditional men have higher levels of distress than egalitarian ones, while the reverse is true for women. With controls, more egalitarian women's TBDI scores are over 6/10 of a point higher than scores for traditional women. Traditional men's TBDI scores are over 4/10 of a point higher than their more egalitarian counterparts. This pattern strongly supports hypothesis 5. ### 3.3.4. Hypotheses 4 and 4a: Gender Moderates the Effect of Family Ties on TBDI; Extended Family Ties Are Least Buffering or a Source of Distress for Men {#sec3dot3dot4-ijerph-14-00025} Model 5 shows that the family ties × gender interaction is significant at *p* \< 0.001. Adding this interaction term explains an additional 5.4% of the variance. [Figure 3](#ijerph-14-00025-f003){ref-type="fig"} plots this interaction, showing that increasing family ties substantially lowers predicted distress levels for women, while for men more family ties increases predicted distress levels slightly. Moving from low to high family ties reduces women's predicted TBDI scores over 8/10 of a point, but increases men's predicted TBDI scores by over 1/10 of a point. This pattern strongly supports Hypothesis 3. The family ties variable includes both intimate (marriage, other family members living in the household) and extended family ties. We tested which of these was most influential in this gender interaction. Separate regressions and plots for intimate and extended family ties (not shown) found that for men extended family ties actually *increase* predicted TBDI scores by just over 4/10 of a point, while intimate family ties have no influence on their distress levels. This supports hypothesis 4a that extended family ties would be most stressful for men. For women, intimate family ties reduce women's distress levels the most, but extended family ties also lower their TBDI scores. ### 3.3.5. Hypothesis 5: Gender Moderates the Effect of Dissonant Acculturation on TBDI {#sec3dot3dot5-ijerph-14-00025} Model 6 shows that, as expected, the dissonant acculturation × gender interaction is marginally significant at *p* \< 0.10 (*p* = 0.071). In [Figure 4](#ijerph-14-00025-f004){ref-type="fig"} we see that moving from lowest to highest levels of dissonant acculturation increases men's predicted TBDI scores by nearly 5/10 of a point, while women's increases just under 1/10 of a point. This finding fits the expected pattern, but only marginally supports Hypothesis 4. Model 8 presents our most parsimonious model of resettlement factors that does not include the gender interactions. Model 8 removes the non-significant "non-family support" and "civic engagement" variables from Model 3 while explaining the same amount of variance in TBDI as Model 3 (R^2^*~adjusted~* = 23.5%). Model 9 shows that adding three gender interaction terms (English × gender, family ties × gender, and traditional gender ideology by gender) explains an additional and *quite substantial* 12.1% of the variance in TBDI. This suggests that gendered aspects of resettlement factors are quite influential in explaining levels of distress among Afghan refugees in Alameda County. We planned on including in Model 9 gender interaction terms that were significant at *p* \< 0.10. When included with the other gender interactions, dissonant acculturation × gender was not significant at *p* \< 0.10, while the other three gender interactions are significant at *p* \< 0.05 or better. Exploratory regressions that added gender interaction terms incrementally to models with dissonant acculturation suggest that the influence of gender ideology × gender most overlaps with dissonant acculturation × gender. Model 9 is our most parsimonious model relying on resettlement factors to explain distress. It explains over 1/3 of the variance in distress levels in this population (R^2^*~adjusted~* = 35.3%). Model 10 adds "pre-resettlement trauma" to Model 9. It shows that with the other control and independent variables and interaction terms, pre-resettlement trauma explains an additional and substantial 6.8% of the variance in TBDI scores. With the exceptions of dissonant acculturation and English ability, whose influence declines by about 1/3 in both instances, adding pre-settlement trauma changes little in the other factors' relationships with TBDI. It is noteworthy and worthy of further investigation that the resettlement factors most collinear with pre-resettlement traumas in explaining distress levels are acculturation variables. With pre-resettlement trauma included, Model 10 explains 42.1% of the variance in levels of distress (adjusted R^2^). ### 3.3.6. Hypothesis 6: Gender Mediates the Effects of Employment Status and English Ability on TBDI {#sec3dot3dot6-ijerph-14-00025} We also conducted tests of the mediating role of gender in relationships between independent variables and levels of distress, including employment status, English ability, civic engagement, dissonant acculturation, traditional gender ideology, family ties, and non-family support. For each test variable, we conducted OLS hierarchical regressions explaining distress, first including the test variable with the four controls, not including gender (three controls for employment and English ability). We then added gender and compared the unstandardized beta for the test variable in the two models. If the beta was reduced significantly we tested to see if the test, control (gender), and dependent variables had significant associations (*p* \< 0.05) with each other. Gender did not strongly reduce any test variables' relationships with distress, but gender did moderately reduce the regression coefficient for the employment-TBDI relationship by 38% (−0.329 to −0.204). As we saw in [Table 1](#ijerph-14-00025-t001){ref-type="table"}, gender and employment are both associated with distress (*p* \< 0.001), and in addition men were much more likely to be employed than women (*p \<* 0.001). Controlling for gender did not change any other variables' regression coefficients more than 10%, including English ability, which was contrary to our expectations. Thus, overall, gender does not play a substantial role in mediating the effects of the stressors and sources of resilience for Afghans in this study, but does modestly mediate the effects of employment. In summary, Hypotheses 1 that women will report higher levels of distress is confirmed, and Hypotheses 2--5 on the moderating effects of gender on English ability, family ties, dissonant acculturation, and gender ideology were supported by our tests, although the support for dissonant acculturation × gender was marginal. Our hypotheses on the mediating effects of gender were modestly confirmed for employment, but not for English ability. 4. Discussion {#sec4-ijerph-14-00025} ============= A strong body of research has emphasized the gender structuring of migration experience and the restructuring of gender relations through migration \[[@B46-ijerph-14-00025]\], but little research on resettlement stressors and mental health of refugees has used this gender lens. To address this gap in the literature we examined the moderating and mediating effects of gender on various sources of distress among a cross-sectional sample of Afghans residing in Alameda County, California. For three variables (family ties, English ability, and gender ideology) gender significantly and robustly moderates levels of distress, and for a fourth variable (dissonant acculturation) the gender interaction was marginally significant. Our data showed that having intimate and extended family ties has little correlation with men's distress levels, but is strongly associated with lower levels of distress for women. Likewise, greater English ability is associated with lower distress for women, but not men. In terms of gender ideology, traditionally oriented women and egalitarian men have lower levels of distress. And experiencing greater dissonant acculturation increases distress for men, but not women. The influence of gender as a moderating variable adds substantially to our understanding of the sources of distress and resilience for Afghans in our sample. Adding three gender interaction terms to our parsimonious model of direct effects explains a quite substantial additional 12.1% of the variance in distress levels. This suggests that gender moderating effects on sources of distress for refugee populations should be tested for more widely, perhaps especially where significant differences exist in the gender orders of sending and receiving countries. We also tested gender as a mediating variable for the same explanatory factors and found that gender modestly mediates the employment-distress relationship, but does not substantially mediate any of the other variables' relationships with distress. We believe the gender differences in the influence of resettlement stressors and sources of resilience reflect the effects of (often traumatized) migrants coming from a society with stronger gender segregation and more divided gender roles, navigating a society where these patterns are not sustainable \[[@B35-ijerph-14-00025],[@B47-ijerph-14-00025]\]. Afghan men's role identities are tied to protecting and providing for family members and to instilling/upholding moral standards within the family \[[@B48-ijerph-14-00025]\]. Thus, family ties may not have protective benefits for men when they are unable to enact important roles associated with those ties. Strikingly, we found that regular contact with a large extended family is positively associated with higher levels of distress for men. This is particularly concerning and worthy of further investigation. Relatedly, dissonant acculturation may be associated with greater distress for men because a large acculturation gap constitutes their failure to enact role identities of protecting the virtue of their children (especially daughters) and to instill cultural standards in their children. While women in our sample actually score higher than men on the dissonant acculturation index (*p* \< 0.05), an acculturation gap does not necessarily prevent women from enacting salient role identities. The striking gender difference in the influence of gender ideology on distress also fits the "performing salient role identities" perspective \[[@B49-ijerph-14-00025],[@B50-ijerph-14-00025]\]. It may be that men with traditional gender ideologies are less able to enact one or more gender role identities that fit their ideology while more egalitarian men have shifted their role identities to fit current conditions. This would reduce stress directly and indirectly by reducing their levels of dissonant acculturation. Supporting the latter, we found that, controlling for age, gender, education, and employment status, men's predicted dissonant acculturation scores were 7/10 of a point higher for those with a traditional gender ideology than their non-traditional counterparts (*p* \< 0.05). Afghan women with an egalitarian gender ideology may experience greater frustration when partners, other family members, or community members prevent them from enacting egalitarian role identities or greater resistance and stigma when they do. For example, egalitarian women who are unemployed may experience more frustration with this position and egalitarian women who are employed may experience greater tension or conflict. Conversely, unemployed women with a traditional ideology may experience less frustration because their ideal is aligned with their current position, and employed women with a traditional ideology may experience less stress because they are effectively denying that they are challenging the dominant gender order \[[@B29-ijerph-14-00025],[@B36-ijerph-14-00025]\]. Our analysis here is grounded in a view that a rather strong difference exists between the 'top' and the 'bottom' of the prevailing gender ideology in this Afghan community \[[@B36-ijerph-14-00025]\]. While egalitarian gender ideologies are associated with greater distress for women, we should recall that the egalitarian practice of paid employment is a source of resilience for women---the employment × gender interaction was not significant at *p* \< 0.10. The relative autonomy of the influence of gender ideology from enacted roles was highlighted when we looked more closely at responses to the employment question. We found that women who selected "keeping house" had much higher levels of distress than those who were employed. Thus, we do not conclude that Afghan women in the USA are better off pursuing a strategy of gender traditionalism. Rather, our findings, taken together, suggest that the disruption of a traditional gender order among Afghans in exile has been the source of considerable distress for both men and women, and that finding ways to reduce gender related stressors may be an important key for addressing mental disorders among this population. In this regard, we believe that Bellinger's \[[@B51-ijerph-14-00025]\] intervention built around guiding refugee couples to recognize changes in gender roles they are or will be experiencing, and then renegotiating roles is a promising approach. The focus on gender change through individual couple's therapy can be expanded to include collective or community-based interventions. We believe it is crucial to develop such interventions in symmetrical dialogue with a wide range of community members, including many who have experienced gendered stressors personally. And a la Hirsch \[[@B31-ijerph-14-00025]\], interventions should recognize and incorporate changes and struggles over the gender order in Afghanistan and within Islam, and be grounded in a critique of the West vs. Islam/Afghan binary around gender that structures much discussion about Afghan and Muslim gender relations. We also believe that directly addressing masculinities as possible sources of stress among men may be helpful as El-Masri et al. \[[@B32-ijerph-14-00025]\] suggest. Though not our focus, our findings point to a need for more diverse measures of acculturation in this line of research. Many studies use unidimensional measures such as host language ability as the sole or primary measure of acculturation, utilizing an implicit or explicit assimilationist model of acculturation \[[@B52-ijerph-14-00025]\]. Our findings on the gendered influence of English ability and the influence of dissonant acculturation warrant future research with Afghans and other refugee groups that explores the complexity of acculturation processes and echo Birman and Tran's \[[@B12-ijerph-14-00025]\] study which provides a more variegated understanding of the nature and influence of acculturation processes. We must also note the strength of perceived discrimination and pre-resettlement stressors in explaining current distress levels. In our full model (Model 10), not counting variables with interaction terms, these variables are the two most influential in explaining TBDI, based on standardized betas. The former highlights the importance of the mode of incorporation on refugee mental health. Not surprisingly, the stereotyping, exclusion, and surveillance faced by Afghans takes a mental health toll. We believe this finding suggests that Afghans may benefit from interventions similar to the one evaluated by Goodkind et al. \[[@B53-ijerph-14-00025]\] that tailor interventions and advocacy in careful dialogue with clients and provide opportunities for symmetric cultural exchanges with members of the host society. Future work should more closely examine the nexus of identity, discrimination, dissonant acculturation, and mental health among refugees, especially those who are Muslim or facing other strong ethnic/racial stereotypes or are arriving in a country that has intervened in their country \[[@B54-ijerph-14-00025]\]. The strong relationship of pre-resettlement stressors on TBDI also deserves exploration in future studies, especially given that about 60% of respondents arrived in the USA ten or more years ago. Limitations ----------- Several limitations may have influenced the results obtained. First, although when possible we randomly selected from client or membership lists of the organizations helping us, it appears that our sample modestly overrepresents unemployed women, and less educated and older (ages 60--69), first generation Afghans (we compared our sample to the sample of adult Afghans in the 2005--2009 American Community Survey; details available upon request.). Secondly, because of cost considerations we were not able develop a Pashto version of the survey. Although we achieved a good ethnic balance in our sample, we excluded, with one exception noted above, the small number of Afghans in Alameda County who speak Pashto, but not Dari. We believe this category of Afghans is primarily Afghan women with high gender traditionalism and perhaps greater social isolation. Thirdly, because our study is cross-sectional in design we cannot attribute causation to the patterns uncovered. For example, we think that dissonant acculturation adds stress and feelings of loss to men's lives that over time contributes to their levels of distress, but it is also possible that high levels of distress contribute to cultural reification that heightens feelings of distance and contributes to conflict with children over their failure to retain Afghan norms, thus increasing levels of dissonant acculturation. This illustrates the pressing need for panel studies following recently arrived refugees for a number of years measuring a range of sources of resilience and distress at different times. Fourthly, we did not have adequate data to fully address gendered correlates of distress related to pre-resettlement vulnerabilities and sources of resilience, or selection processes influencing which Afghans were able to migrate to the USA For example, our measure of family ties includes the item "married, living with spouse" whose reference category for women is essentially female headed households. Thus, "gender × family ties" registers the influence of female headed households (e.g., widows, which greatly outnumber widowers) which may in turn reflect policies that select for women with high pre-migration levels of distress and vulnerabilities. An analysis of family ties comparing the influence of each item on women's distress levels and the non-significant "gender × pre-resettlement traumas" regression term reported above suggest modest unmeasured gendered pre-resettlement sources of current distress levels. However, we cannot rule out these kinds of pre-resettlement effects on current levels of distress and thus, we may be overemphasizing explanations that focus on resettlement factors. The panel studies just mentioned should include upstream measures that more fully capture the vulnerabilities and sources of resilience of newly arriving refugees. Another similar example involves addressing problems with conceptualizing English ability as a measure of "acculturation". We challenged this view and argued for the importance of richer measures of acculturation, but may have retained its shadow by limiting English ability to a "resettlement" source of resilience. Yet many Afghan women (and men) in the study probably learned or began learning English in Afghanistan. For women in this study, English ability may in part register being traditional or non-traditional in Afghanistan, and the conditions and resources associated with this difference. Thus, our Beiser-inspired explanation of gender's moderating effect on English ability may, again, be biased towards focusing on resettlement factors and explanations. Finally, related to the previous concern, future research should be designed to better measure ways that gender influences levels of distress differently for refugees than for immigrants. For example, in the USA, refugees, but not most immigrants, are eligible for income supports that are greater for female headed households. These supports may provide refugee women beneficial levels of security not afforded to immigrants, but may also accentuate or lengthen the influence of patriarchal gender roles and boundaries from the sending country. For example, it is quite possible that the low rate of employment among women in our study fits this pattern. Thus, some part of the employment effect for women in our study may be a gendered influence of government supports available to refugee women. An important strength of our work lies in our dialogic approach to survey construction that relied heavily on informants and qualitative research to identify sources of distress and develop valid measures. Survey construction also benefitted from previous research on this population and refugee mental health that was richly informed by theories of gender relations and changing gender orders \[[@B35-ijerph-14-00025],[@B46-ijerph-14-00025]\]. Future work should use more detailed measures for gender ideology and dissonant acculturation, and include measures of gender role identities and gendered practices that will allow a richer analysis of patterns of gender identities, beliefs, and practices and their relationships to distress. 5. Conclusions {#sec5-ijerph-14-00025} ============== This study examined the moderating and mediating effects of gender on various sources of distress and resilience among a cross-sectional sample of Afghans residing in the Alameda County, California. We found that gender moderated the effects of four factors on levels of distress (gender ideology, family ties, English ability, and dissonant acculturation), the influence of these gender interaction terms is substantial, and the pattern of relationships fits a population of traumatized migrants whose gender order has been disrupted moving from a society with more divided gender roles and greater paternal authority, adapting to a society where these patterns are not sustainable. Future research should investigate the relationships we identified in greater depth in a longitudinal and multimethod design that allows researchers to better understand the complex processes and patterns of acculturation, shifting role identities, and gender change among newly arriving Afghans and similar populations as they adapt to and integrate into their new society. Efforts to assist such populations adapt to their host societies should inform new arrivals of changes in the gender order they are or will be experiencing, and facilitate opportunities to reflect on these changes and renegotiate gender roles in ways that are grounded in their complex cultural influences and identities. Many people, organizations, and programs contributed greatly to carrying out the research this study is based on. We wish to thank Mizgon Ansari, Sohaila Azimi, Seema Faizi, Nadia Faizi, Nurges Gheyaszada, Bruce Green, Sahar Haghihat, Marjan Hazrati, Abdul Wali Jabarkhel, Ali Mardanzai, Waheed Momand, Omar Nassery, Hamid Nekrawesh, Timor Noori, Rona Popal, Mohammad Qayoumi, Abdul Ghafar Safa, Qari Safiullah Samady, Farid Younos, Mizgon Zahir Darby, and Ahmad Zamani. Special thanks to Marjan Hazrati, project coordinator extraordinaire. We also thank the leaders of Afghan and International Refugees Support Services, Afghan Coalition, Afghan Cultural Society, Afghan Senior Group, Afghan Elderly Association, Afghan Health Partnership Program, Ibrahim Khalilulah Islamic Center, and Masjid Muhajireen. We also thank Rose Wong and Duke Austin for helpful comments on an early version of this paper and anonymous reviewers for IJERPH whose comments and suggestions improved the final version. Carl Stempel led the study, conducted the analyses, wrote the first and final drafts of the paper. Nilofar Sami helped construct the survey, train interviewers, and edited the first draft of the paper, Marius Koga contributed to writing the first draft and edited the final draft, Qais Alemi helped rewrite the final draft, wrote sections of the literature review, and edited the final version. Valerie Smith helped on survey construction and edited the final version. Aida Shirazai edited the final version. The authors declare no conflict of interest. The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results. ![English by Gender Explaining Distress.](ijerph-14-00025-g001){#ijerph-14-00025-f001} ![Traditional Gender Ideology by Gender Explaining Distress.](ijerph-14-00025-g002){#ijerph-14-00025-f002} ![Family Ties by Gender Explaining Distress.](ijerph-14-00025-g003){#ijerph-14-00025-f003} ![Dissonant Acculturation by Gender Explaining Distress.](ijerph-14-00025-g004){#ijerph-14-00025-f004} ijerph-14-00025-t001_Table 1 ###### Descriptive statistics: dependent, control, independent variables, and bivariate relationships with dependent variable (*n* = 259). Variables Statistics ------------------------------------- ------------ --------- ------- ------------ ------------------ Talbieh Distress Inventory (TBDI) 251 1.21 0.99 0--4 1.0 \*\*\*^,b^ Age in years 259 48.75 15.68 18--84 0.13 \*^,b^ Gender  Male 126 (48.6) −0.25 \*\*\*^,d^  Female ^a^ 133 (51.4) Education  Less than high school 83 (32.0) 1.32 1.17 0--3 −0.22 \*\*^,c^  High school diploma 75 (29.0)  AA, some college, technical degree 36 (13.9)  Bachelor's Degree or Higher 65 (25.1) Employment status  Employed (or student) 107 (41.3) −0.27 \*\*\*^,d^  Not Employed ^a^ 152 (58.7) English ability 259 2.03 1.29 0--4 −0.30 \*\*\*^,b^ Year Arrived in USA 257 1993.51 8.06 1979--2008 0.10 ^b^ Perceived Discrimination 247 0.68 0.56 0--2 0.27 \*\*\*^,b^ Family ties 259 1.68 0.81 0--3 −0.17 \*\*^,b^ Non-family Support  Yes 180 (69.5) −0.03 ^d^  No ^a^ 79 (30.5) Dissonant Acculturation 257 1.27 1.11 0--5 0.20 \*\*^,b^ Gender Ideology  Traditional 64 (24.8) −0.02 ^d^  Not Traditional ^a^ 194 (75.2) Civic engagement 259 1.27 1.11 0--4 −0.09 ^b^ Pre-resettlement traumas 254 5.57 2.44 0--11 0.49 \*\*\*^,b^ Notes: ^a^ = reference category; ^b^ = Pearson's r; ^c^ = Spearman's rho; ^d^ = Point-biserial r; \* *p* \< 0.05; \*\* *p* \< 0.01; \*\*\* *p* \< 0.001. ijerph-14-00025-t002_Table 2 ###### Resettlement factors and factors moderated by gender explaining psychological distress (TBDI). Model 1 Model 2 Model 3 Model 4 Model 5 --------------------------- -------------- -------------- -------------- -------------- ------------------ -------------- -------------- -------------- -------------- -------------- (Constant) 1.74 (0.27) 1.62 (0.28) 1.60 (0.31) 1.71 (0.32) 2.16 (0.330) Age −0.00 (0.00) −0.02 0.00 (0.01) 0.03 0.00 (0.01) 0.01 0.00 (0.01) −0.00 −0.00 (0.00) −0.05 Employed −0.28 (0.15) −0.14 ^‡^ −0.18 (0.16) −0.09 −0.16 (0.15) −0.08 −0.16 (0.15) −0.08 −0.28 (0.14) −0.14 ^‡^ Education −0.04 (0.06) −0.05 −0.02 (0.06) −0.02 0.01 (0.06) 0.01 0.03 (0.06) 0.04 0.04 (0.06) 0.05 English Ability −0.17 (0.06) −0.19 \* −0.13 (0.06) −0.18 \* −0.12 (0.05) −0.17 \* −0.22 (0.07) −0.32 \*\* −0.10 (0.05) −0.13 ^‡^ Gender (Male) ^a^ −0.30 (0.14) −0.15 \* −0.33 (0.13) −0.17 \*\* −0.74 (0.22) −0.38 \*\* −1.33 (0.27) −0.69 \*\*\* Discrimination 0.58 (0.11) 0.33 \*\*\* 0.56 (0.11) 0.32 \*\*\* 0.53 (0.10) 0.30 \*\*\* Family ties −0.28 (0.07) −0.23 \*\*\* −0.25 (0.07) −0.21 \*\*\* −0.50 (0.09) −0.43 \*\*\* Non-family Support −0.11 (0.13) −0.05 −0.13 (0.12) −0.06 −0.12 (0.12) −0.06 Civic Engagement −0.02 (0.06) −0.03 −0.01 (0.06) −0.01 −0.03 (0.06) −0.04 Dissonant Acculturation 0.08 (0.04) 0.13 \* 0.09 (0.05) 0.14 \* 0.07 (0.04) 0.11 ^‡^ Trad. Gender Ideology ^b^ −0.05 (0.13) −0.02 −0.07 (0.13) −0.03 −0.06 (0.13) −0.03 English × Gender 0.19 (0.09) 0.30 \* Family Ties × Gender 0.61 (0.14) 0.62 \*\*\* R^2^ 0.097 \*\*\* 0.115 \*\*\* 0.267 \*\*\* 0.282 \*\*\* 0.321 \*\*\* Adjusted R^2^ 0.082 \*\*\* 0.097 \*\*\* 0.232 \*\*\* 0.245 \*\*\* 0.285 \*\*\* ΔR^2^ 0.018 \* 0.152 \*\*\* 0.016 \* ^c^ 0.054 \*\*\* ^c^ *F-statistic* ΔR*^2^* 4.80 7.99 5.02 ^c^ 18.42 ^c^ Notes: ^‡^ *p* \< 0.10; \* *p* \< 0.05; \*\* *p* \< 0.01; \*\*\* *p* \< 0.001 References: ^a^ = female; ^b^ = egalitarian or not sure. Explained variance: ^c^ = ΔR^2^ for adding interaction term to Model 3. ijerph-14-00025-t003_Table 3 ###### Resettlement factors and factors moderated by gender explaining psychological distress (TBDI). Model 6 Model 7 Model 8 Model 9 Model 10 --------------------------- ---------------- -------------- --------------- -------------- -------------- -------------- -------------- -------------- -------------- -------------- (Constant) 1.79 (0.33) 1.72 (0.30) 1.55 (0.30) 2.23 (0.30) 1.40 (0.33) Age 0.000 (0.01) −0.001 0.00 (0.00) 0.01 0.00 (0.00) 0.00 −0.00 (0.00) −0.05 −0.00 (0.00) −0.04 Employed −0.20 (0.15) −0.100 −0.22 (0.14) −0.11 −0.18 (0.14) −0.09 −0.33 (0.14) −0.17 \* −0.32 (0.13) −0.16 \* Education 0.01 (0.056) 0.01 0.01 (0.05) 0.01 0.00 (0.06) 0.00 0.05 (0.05) 0.06 0.07 (0.05) 0.08 English Ability −0.113 (0.054) −0.16 \* −0.12 (0.05) −0.17 \* −0.13 (0.05) −0.18 \* −0.18 (0.06) −0.26 \*\* −0.12 (0.06) −0.17 ^‡^ Gender (Male) ^a^ −0.60 (0.204) −0.31 \* −0.60 (0.14) −0.31 \*\*\* −0.31 (0.13) −0.16 \* −1.78 (0.30) −0.92 \*\*\* −1.62 (0.29) −0.83 \*\*\* Discrimination 0.57 (0.107) 0.33 \*\*\* 0.62 (0.10) 0.35 \*\*\* 0.56 (0.10) 0.32 \*\*\* 0.53 (0.10) 0.30 \*\*\* 0.42 (0.09) 0.24 \*\*\* Family ties −0.28 (0.07) −0.24 \*\*\* −0.28 (0.07) −0.24 \*\*\* −0.28 (0.07) −0.23 \*\*\* −0.45 (0.08) −0.38 \*\*\* −0.41 (0.08) −0.35 \*\*\* Non-family Support −0.10 (0.12) −0.05 −0.086 (0.12) −0.04 Civic Engagement −0.03 (0.06) −0.03 −0.01 (0.06) −0.01 Dissonant Acculturation 0.02 (0.05) 0.04 0.07 (0.04) 0.11 ^‡^ 0.08 (0.04) 0.13 \* 0.06 (0.04) 0.10 ^‡^ 0.04 (0.03) 0.07 Trad. Gender Ideology ^b^ −0.07 (0.13) −0.03 −1.93 (0.41) −0.85 \*\*\* −0.07 (0.13) −0.03 −0.70 (0.18) −0.31 \*\*\* −0.61 (0.17) −0.27 \*\*\* English × Gender 0.16 (0.08) 0.25 \* 0.15 (0.08) 0.23 \* Family Ties × Gender . 0.53 (0.14) 0.54 \*\*\* 0.49 (0.13) 0.50 \*\*\* Disson. Accult. × Gender 0.12 (0.07) 0.190 ^‡^ Gender Ideol. × Gender 1.21 (0.25) 0.89 \*\*\* 1.11 (0.24) 0.40 \*\*\* 0.99 (0.23) 0.36 \*\*\* Pre-resettlement Trauma 0.12 (0.02) 0.30 \*\*\* R^2^ 0.277 \*\*\* 0.333 \*\*\* 0.264 \*\*\* 0.385 \*\*\* 0.452 \*\*\* Adjusted R^2^ 0.239 \*\*\* 0.298 \*\*\* 0.235 \*\*\* 0.353 \*\*\* 0.421 \*\*\* ΔR^2^ 0.010 ^‡^ ^c^ 0.066 \*\*\* 0.121 \*\*\* 0.068 \*\*\* *F-statistic* ΔR^2^ 2.87 ^c^ 22.98 15.14 28.47 Notes: ^‡^ *p* \< 0.10; \* *p* \< 0.05; \*\* *p* \< 0.01; \*\*\* *p* \< 0.001 References: ^a^ = female; ^b^ = egalitarian or not sure. Explained variance: ^c^ = ΔR^2^ for adding interaction term to Model 3.
West Rushville, Ohio West Rushville is a village in Fairfield County, Ohio, United States. The population was 134 at the 2010 census. History A post office called West Rushville was established in 1842, and remained in operation until 1996. The village was named after nearby Rush Creek. Geography West Rushville is located at (39.762762, -82.448436). According to the United States Census Bureau, the village has a total area of , all land. Demographics 2010 census As of the census of 2010, there were 134 people, 51 households, and 38 families living in the village. The population density was . There were 62 housing units at an average density of . The racial makeup of the village was 97.0% White and 3.0% from two or more races. Hispanic or Latino of any race were 0.7% of the population. There were 51 households of which 39.2% had children under the age of 18 living with them, 52.9% were married couples living together, 11.8% had a female householder with no husband present, 9.8% had a male householder with no wife present, and 25.5% were non-families. 21.6% of all households were made up of individuals and 11.8% had someone living alone who was 65 years of age or older. The average household size was 2.63 and the average family size was 3.00. The median age in the village was 36 years. 29.1% of residents were under the age of 18; 8.9% were between the ages of 18 and 24; 28.4% were from 25 to 44; 24.7% were from 45 to 64; and 9% were 65 years of age or older. The gender makeup of the village was 50.7% male and 49.3% female. 2000 census As of the census of 2000, there were 132 people, 49 households, and 38 families living in the village. The population density was 2,174.2 people per square mile (849.4/km²). There were 50 housing units at an average density of 823.6 per square mile (321.8/km²). The racial makeup of the village was 99.24% White, and 0.76% from two or more races. Hispanic or Latino of any race were 3.03% of the population. There were 49 households out of which 49.0% had children under the age of 18 living with them, 61.2% were married couples living together, 10.2% had a female householder with no husband present, and 22.4% were non-families. 20.4% of all households were made up of individuals and 12.2% had someone living alone who was 65 years of age or older. The average household size was 2.69 and the average family size was 3.05. In the village, the population was spread out with 31.1% under the age of 18, 9.1% from 18 to 24, 31.8% from 25 to 44, 19.7% from 45 to 64, and 8.3% who were 65 years of age or older. The median age was 33 years. For every 100 females there were 100.0 males. For every 100 females age 18 and over, there were 97.8 males. The median income for a household in the village was $43,125, and the median income for a family was $56,500. Males had a median income of $28,125 versus $30,000 for females. The per capita income for the village was $16,257. There were 5.0% of families and 6.2% of the population living below the poverty line, including 15.2% of under eighteens and none of those over 64. Buildings West Rushville is home to the Fairfield Union Local School District Administrative Office. References Category:Villages in Fairfield County, Ohio Category:Villages in Ohio
--- abstract: 'We consider the links between consistent and approximate descriptions of the quantum-classical systems, i.e. systems are composed of two interacting subsystems, one of which behaves almost classically while the other requires a quantum description.' author: - 'V.I. Gerasimenko' title: 'ON EVOLUTION EQUATIONS OF QUANTUM-CLASSICAL SYSTEMS' --- 1.1cm 2.1cm The aim of this work is to consider the links between consistent and approximate descriptions of the quantum-classical systems [@Kap]-[@GEP], i.e. systems are composed of two interacting subsystems, one of which behaves almost classically while the other requires a quantum description. The formulation of a quantum-classical dynamics has attracted considerable interests for the last decade [@Kap], and as is well known, many conceptual difficulties arise in making this. It will be shown that mixed quantum-classical dynamics is described by the quantum-classical Heisenberg equation for the evolution of observables or by the quantum-classical Liouville equation for the evolution of states [@Kap],[@Proc],[@Ger1]-[@Ger3]. These systems can be described by the self-consistent Hamilton and Schrödinger equations set only as an uncorrelated approximation. A description of quantum-classical systems is formulated in terms of two sets of objects: observables and states. The mean value (mathematical expectation) of observables defines a duality between observables and states and as a consequence there exist two approaches to the description of the evolution. An observable $A(X,\hat{X})$ of a quantum-classical system is a function of canonical variables $X$ characterizing classical degrees of freedom and non-commuting self-adjoint operators $\hat{X}$ satisfying canonical commutation relations [@Ger1],[@Ger3]. For instance, the Hamiltonian of a quantum-classical system has the structure $$\begin{aligned} \label{H} H(X,\hat{X})= H_c(X)\hat{I}+ H_q(\hat{X})+ H_{\mathrm{int}}(X,\hat{X}),\end{aligned}$$ where $\hat{I}$ is a unit operator, $H_c, H_q, H_{\mathrm{int}}$ are correspondingly, the Hamiltonian of the classical, quantum degrees of freedom and their interaction. Further, as an example, we will consider a one-dimensional system consisting of two interacting classical and quantum particles (with unit masses). In this case $$\begin{aligned} H_c(X)=\frac{1}{2}\,p^2,\,\,\, H_q(\hat{X})=\frac{1}{2}\,\hat{p}^2, \,\,\, H_{\mathrm{int}}(X,\hat{X})=\Phi(q,\hat{q}),\end{aligned}$$ where $p,q$ are canonical variables of a classical particle, $\hat{q},\hat{p}$ are self-adjoint operators satisfying canonical commutation relations and the function $\Phi$ is an interaction potential. The mean value of the observable $A(X,\hat{X})$ at time instant $t\in\mathbb{R}$ is defined by the positive continuous linear functional on the space of observables which can be defined in two different ways $$\begin{aligned} \label{average} \langle A \rangle(t)&&=\int dX \,\mathrm{Tr}\, A(t,X,\hat{X})D(0,X,\hat{X})=\\ &&=\int dX \,\mathrm{Tr}\, A(0,X,\hat{X})D(t,X,\hat{X}),\nonumber\end{aligned}$$ where $A(0,X,\hat{X})$ is an observable at the initial instant $t=0$, $D(0,X,\hat{X})$ is the density operator depending on classical canonical variables and $\int dX \,\mathrm{Tr}\, D(0,X,\hat{X})=1$. The evolution of observables $A(t)=A(t,X,\hat{X})$ is described by the initial-value problem of the quantum-classical Heisenberg equation $$\begin{aligned} \label{H-N1} &&\frac{\partial}{\partial t}A(t)=\mathcal{L}A(t),\\ &&A(t)|_{t=0}=A(0),\nonumber\end{aligned}$$ where the generator $\mathcal{L}$ of this evolution equation depends on the quantization rule of a quantum subsystem. In the case of the Weyl quantization it has the form [@Ger1],[@Ger3] $$\begin{aligned} \label{komyt} &&\mathcal{L}A(t)=-\frac{i}{\hbar}\big[A(t),H\big]+ \frac{1}{2}\big(\big\{A(t),H\big\}-\big\{H,A(t)\big\}\big),\end{aligned}$$ where $H=H(X,\hat{X})$ is the Hamiltonian, $[\,.\,,.\,]$ is a commutator of operators and $\{\,.\,,.\,\}$ is the Poisson brackets. For some other quantization rules the operator $\mathcal{L}$ is defined in [@Ger1],[@Ger3]. In the case of a one-dimensional system consisting of two interacting classical and quantum particles in the configuration representation expression has a form $$\begin{aligned} \big(\mathcal{L}A\big)(q,p;\xi,\xi')=&&-\frac{i}{\hbar}\big(-\frac{\hbar^2}{2}(-\Delta_{\xi}+\Delta_{\xi'})+ \big(\Phi(\xi-q)-\Phi(\xi'-q)\big)\big)\,A(q,p;\xi,\xi') +\\ &&\,+\,\big(\,p\frac{\partial}{\partial q}-\frac{\partial}{\partial q}\big(\Phi(\xi-q)-\Phi(\xi'-q)\big) \frac{\partial}{\partial p}\,\big)\,A(q,p;\xi,\xi'),\end{aligned}$$ where $A(q,p;\xi,\xi')$ is a kernel of the operator $A(X,\hat{X})$ in the configuration representation, and in the Wigner representation it is as follow $$\begin{aligned} \big(\mathcal{L}A\big)(x_1,x_2)&& =\sum\limits_{j=1}^2 p_j\frac{\partial}{\partial q_j}A(x_1,x_2)-\frac{\partial}{\partial q_1}\Phi(q_1-q_2) \frac{\partial}{\partial p_1}A(x_1,x_2)+\\ &&+\frac{i}{2\pi\hbar}\int d\eta d\xi \, e^{i(p_2-\xi)\eta}\,\big(\Phi \big(q_1-(q_2-\frac{\hbar}{2}\eta)\big)-\Phi \big(q_1-(q_2+\frac{\hbar}{2}\eta)\big)\big)\,A(x_1,q_2,\xi) ,\end{aligned}$$ where $x_i\equiv(q_i,p_i)\in\mathbb{R}\times\mathbb{R}$ and $A(x_1,x_2)$ is a symbol of the operator $A(X,\hat{X})$. Usually the evolution of a quantum-classical system is described, in the framework of evolution of states (the Schrödinger picture of evolution), by the initial-value problem dual to , namely, the quantum-classical Liouville equation [@Kap],[@Ger1],[@Ger3] $$\begin{aligned} \label{F-N1} &&\frac{\partial}{\partial t}D(t)=-\mathcal{L}D(t),\\ &&D(t)|_{t=0}=D(0).\nonumber\end{aligned}$$ First, let us construct the self-consistent field approximation of this equation. For that we introduce the marginal states of classical and quantum subsystems correspondingly $$\begin{aligned} \label{MC} &&D(t,X) = \mathrm{Tr}\,D(t,X,\hat{X}),\\ \label{MQ} &&\hat{\rho}(t) = \int dX \,D(t,X,\hat{X})\end{aligned}$$ and the correlation operator of classical and quantum subsystems $$\begin{aligned} \label{C} &&g(t,X,\hat{X})= D(t,X,\hat{X})- D(t,X)\,\hat{\rho}(t).\end{aligned}$$ If we assume that at any instant of time there are no correlations between classical and quantum particles, i.e. it holds $g(t,X,\hat{X})=0$, then in such an uncorrelated approximation we derive from a self-consistent equations set of the Liouville and von Neumann equations for marginal states , of classical and quantum subsystems $$\begin{aligned} \label{L-L} &&\frac{\partial}{\partial t}D(t,X)=\big\{H_c(X)+\mathrm{Tr}\,H_{\mathrm{int}}(X,\hat{X})\,\hat{\rho}(t)\,,\,D(t,X)\big\},\\ \label{L-N} &&i\hbar\frac{\partial}{\partial t}\hat{\rho}(t) =\big[H_q(\hat{X})+\int dX H_{\mathrm{int}}(X,\hat{X})\,D(t,X)\,,\,\hat{\rho}(t)\big]\end{aligned}$$ with initial data $$\begin{aligned} &&D(t)|_{t=0}=D(0), \\ &&\hat{\rho}(t)|_{t=0}=\hat{\rho}(0).\end{aligned}$$ We note that the initial-value problem of equations , describes the evolution of all possible states of quantum-classical systems if correlations between classical and quantum particles are neglected (the self-consistent field approximation). This type of approximation can not be treated as the mean-field approximation since we consider finitely many particles while the mean-field approximation assumes the transition to the thermodynamic limit, i.e. it has a sense for infinitely many particles. Rigorous results about the mean-field limit of dynamics of quantum many-particle systems in the framework of evolution of observables and states are given in [@Ger4]. Let at the initial instant the states of quantum and classical subsystems be pure states, i.e. $$\begin{aligned} \label{in} &&D(0,X)=\delta\big(X-X_0\big),\\ &&\hat{\rho}(0,\xi,\xi')=\Psi_0(\xi)\Psi^{*}_0(\xi'),\nonumber\end{aligned}$$ where $\delta(X-X_0)$ is a Dirac measure, $X_0$ is the phase space point in which we measure observables of classical subsystem, $\hat{\rho}(0,\xi,\xi')$ is a kernel (a density matrix) of marginal density operator in the configuration representation, which is the projector operator on the vector $\Psi_0\in L^2$. We remark that the problem how to define a pure state of the whole quantum-classical system is an open problem. Then in the configuration representation the initial-value problem of equations , is an equivalent to the initial-value problem of a self-consistent set of the Hamilton and Schrödinger equations $$\begin{aligned} \label{H-S1} &&\frac{\partial}{\partial t}X(t) =\big\{X(t)\,,\,H_c(X)+\int d\xi \,H_{\mathrm{int}}(X;\xi,\xi)\,|\Psi(t,\xi)|^2\big\},\\ \label{H-S2} &&i\hbar\frac{\partial}{\partial t}\Psi(t,\xi)=\int d\xi'\big(H_q(\xi,\xi')+ H_{\mathrm{int}}(X(t);\xi,\xi')\big)\Psi(t,\xi')\end{aligned}$$ with initial data $$\begin{aligned} && X(t)|_{t=0}=X,\\ && \Psi(t,\xi)|_{t=0}=\Psi_0(\xi).\end{aligned}$$ For example, in the case of a one-dimensional system consisting of two interacting classical and quantum particles (with unit masses) equations , get the form $$\begin{aligned} \label{ex} &&\frac{d^2}{d t^2}Q(t)= -\, \frac{\partial}{\partial Q(t)}\int d\xi \, \Phi(Q(t)-\xi)\, |\Psi(t,\xi)|^2 ,\nonumber\\ &&i\hbar \frac{\partial}{\partial t}\Psi(t,\xi)= - \frac{\hbar^2}{2}\frac{\partial^2}{\partial \xi^2}\Psi(t,\xi)+ \Phi(Q(t)-\xi)\Psi(t,\xi)\nonumber\end{aligned}$$ with initial data ($X\equiv(q,v)$) $$\begin{aligned} &&Q(t)|_{t=0}=q, \quad \frac{d}{d t}Q(t)|_{t=0}=v,\\ &&\Psi(t,\xi)|_{t=0}=\Psi_0(\xi),\end{aligned}$$ where $\Phi(|Q(t)-\xi|)$ is a two-body interaction potential, $Q(t)$ is a position at the instant $t$ of a classical particle in the space. Such a self-consistent set of the Newton and Schrödinger equations is usually used for the description of the evolution of states of quantum-classical systems. Now we consider the description of a quantum-classical system in the uncorrelated approximation between classical and quantum particles in the framework of evolution of observables (the Heisenberg picture of evolution). Assume that a quantum-classical system is in an uncorrelated pure state , i.e. $$\begin{aligned} \label{ups} && D(0,X;\hat{X})=\delta\big(X-X_0\big)P_{\Psi_0},\end{aligned}$$ where $P_{\Psi_0}\equiv (\Psi_0,\,.\,)\Psi_0$ (or in Dirac notation: $P_{\Psi_0}\equiv |\Psi_0\rangle\langle\Psi_0|$) is a one-dimensional projector onto a unit vector ${\Psi_0}$ from a Hilbert space. In the configuration representation a kernel of operator has the form $$\begin{aligned} &&D(0,X;\xi,\xi')=\delta\big(X-X_0\big)\Psi_0(\xi)\Psi^{*}_0(\xi').\end{aligned}$$ Then according to in this approximation the evolution of the canonical observables of quantum and classical particles is described by the Heisenberg equations set $$\begin{aligned} \label{L-Ho} \label{L-Ho1} &&\frac{\partial}{\partial t}X(t)\hat{I}= \big\{X(t)\hat{I}\,,\, H_c(X)\hat{I}+ H_{\mathrm{int}}(X,\hat{X})\big\},\\ \label{L-Ho2} &&i\hbar\frac{\partial}{\partial t}\hat{X}(t)= \big[\hat{X}(t)\,,\, H_q(\hat{X})+ H_{\mathrm{int}}(X,\hat{X})\big]\end{aligned}$$ with initial data $$\begin{aligned} && X(t)|_{t=0}=X,\\&& \hat{X}(t)|_{t=0}=\hat{X}.\end{aligned}$$ For example, in the case of a one-dimensional system consisting of two interacting classical and quantum particles equations , can be rewritten for pairs of canonically conjugated variables $X(t)=\big(Q(t),P(t)\big)$ and $\hat{X}(t)=\big(\hat{Q}(t),\hat{P}(t)\big)$ in the following form $$\begin{aligned} \label{QC-h1} &&\frac{d}{d t}Q(t)=P(t),\\ &&\frac{d}{d t}P(t)\hat{I}= - \frac{\partial}{\partial Q(t)}\Phi(Q(t),\hat{Q}(t)),\\ &&\frac{d}{d t}\hat{Q}(t)=\hat{P}(t),\\ &&\frac{d}{d t}\hat{P}(t)= - \Phi'(Q(t),\hat{Q}(t)),\end{aligned}$$ where the function $\Phi'$ is the derivative of the function $\Phi$. These equations can also be rewritten similar to , as equations in the configuration representation. In the Wigner representation they take the following fascinating form $$\begin{aligned} \label{QC-h1} &&\frac{d}{d t}Q_1(t)=P_1(t),\\ &&\frac{d}{d t}P_1(t)= - \frac{\partial}{\partial Q_1(t)}\Phi(Q_1(t)-Q_2(t)),\\ &&\frac{d}{d t}Q_2(t)=P_2(t),\\ &&\frac{d}{d t}P_2(t)= - \frac{\partial}{\partial Q_2(t)}\Phi(Q_1(t)-Q_2(t))\end{aligned}$$ with initial data $$\begin{aligned} && X_1(t)|_{t=0}=x_1,\,\,\, X_2(t)|_{t=0}=x_2,\end{aligned}$$ where $X_i(t)\equiv\big(Q_i(t),P_i(t)\big),\, i=1,2$, and $X_2(t)\equiv\big(Q_2(t),P_2(t)\big)$ are symbols of the operators $\hat{X}(t)=\big(\hat{Q}(t),\hat{P}(t)\big)$. We note that in this representation a symbol of uncorrelated pure state defines by the following Wigner function $$\begin{aligned} &&D(0,x_1,x_2)=(2\pi)^{-1} \delta\big(x_1-x_0\big)\int d\xi\, \Psi_0\big(q_2+\frac{1}{2}\hbar\,\xi\big) \Psi^{*}_0\big(q_2-\frac{1}{2}\hbar\,\xi\big)e^{-i\xi p_2}\end{aligned}$$ and mean value of an observable is given by the following functional $$\begin{aligned} \langle A \rangle(t)=(2\pi\hbar)^{-1}\int dx_1 dx_2\, A(t,x_1,x_2)\,D(0,x_1,x_2).\end{aligned}$$ In summary, mixed quantum-classical dynamics is described by the quantum-classical Heisenberg equation in the framework of the evolution of observables or by the quantum-classical Liouville equation in the framework of the evolution of states. A quantum-classical system can be described by the self-consistent Hamilton and Schrödinger equations set or by the self-consistent Hamilton and Heisenberg equations set and state only in an uncorrelated approximation [@Ger2],[@Ger3]. \[sec:TeXbooks\] R. Kapral, Annu. Rev. Phys. Chem. **57**, 1239 (2006). G. Ciccotti, D. Coker and R. Kapral, *Quantum Dynamics of Complex Molecular Systems*,\ Eds., D. A. Micha and I. Burghardt (Springer, 2007), p. 275. V.I. Gerasimenko and D.Ya. Petrina, Theor. Math. Phys. **42**, 88 (1980). V.I. Gerasimenko, Preprint 80–92P, Kiev: Inst. Theor. Phys. (1980). V.I. Gerasimenko, Reports of Acad. Sci. Ukrainian SSR. **10**, 65 (1981). V.I. Gerasimenko, Theor. Math. Phys. **50**, 77 (1982). V.I. Gerasimenko, V.Z. Enolski and D.Ya. Petrina, Doklady Akad. Nauk USSR, **315**, 75 (1990). V.I. Gerasimenko, arXiv:0908.2797v1 (2009).
Solid-State Conversion Synthesis of Advanced Electrocatalysts for Water Splitting. Electrolytic water technology is promising for sustainable energy utilization, but the lack of efficient electrocatalysts retards its application. The intrinsic activity of electrocatalysts is determined by its electronic structure, whereas the apparent activity can be further optimized by reasonable design on micro-/nanostructures of electrocatalysts. The core goal of electrocatalytic research is to reveal the relationship between the structure and performance of electrocatalysts, which is also the basis of reasonable design and construction of efficient electrocatalysts. Traditional synthetic methods, namely bottom-up and top-down routes, usually induce the change of different structural parameters at the same time. The solid-state conversion strategy, which is converts solid precursors into target materials through chemical reactions, has been widely adopted to produce materials with precisely controllable structures. In this Minireview, we focus on recent advances in the solid-state conversion synthesis of water-splitting electrocatalysts. First, the basis of solid-state conversion chemistry is introduced. Then, the specific methods of precise control of electronic structure by solid-state conversion and the relationship between electronic structure and performance are summarized. Based on the understanding of the electronic structure-performance relationship, synergistic regulation of electronic structure and micro-/nanostructures by solid-state conversion to achieve the copromotion of intrinsic activity and apparent activity are described. Finally, the remaining challenges in this field are discussed, and future research directions are proposed as well.
This week, the Ukrainian government revealed that they are working on a policy document on Crimea's 'reintegration' into Ukraine, and would be discussing it with Kiev's partners abroad. Commenting on the plans, which in a bizarre twist may also involve China, political scientist Dmitri Zhuravlev said that they seem to be nothing but hot air. On Thursday, Vadim Chernysh, the head of Ukraine's Ministry of Temporarily Occupied Territories, told the Ukrainskaya Pravda newspaper that the cabinet of ministers is preparing an action plan for Crimea's 'reintegration' into Ukraine. Chernysh stressed that this document "will be discussed with the public and with our international partners," and that Kiev would need about a month to develop it. News of the draft document follows an intense Ukrainian political and media discussion about the possibility of China helping Kiev take Crimea back from Russia. Such discussions began last week, after Ukrainian President Petro Poroshenko met with Chinese President Xi Jinping on the sidelines of the Davos economic forum. Xi told Poroshenko that China would like to "play a constructive role in promoting a political resolution to the crisis" in Ukraine, which Ukrainian officials and pundits took to mean that Beijing would help Ukraine gain control over the Donbass and perhaps even Crimea. A few Russian officials soon responded to Kiev's lofty ambitions. On Thursday, Senator Alexei Pushkov tweeted that President Poroshenko "understands perfectly well that there will be no 'reintegration' of Crimea. This idea, and the odd appeal to the leader of China are needed for another reason: to create the myth that the subject is still relevant." Порошенко понимает:"реинтеграции" Крыма не будет. И эта затея,и странное обращение к главе КНР нужны для другого: создать миф, что тема жива — Алексей Пушков (@Alexey_Pushkov) 26 января 2017 г. © AFP 2020 / VIKTOR DRACHEV People dance in celebration of the results of the referendum on Crimea's status in Sevastopol, March 16, 2014. Crimean authorities organized a referendum on the peninsula's status in March 2014, a few weeks after the Euromaidan coup d'état in Kiev overthrew the country's elected government. With over 80% turnout, over 96% of the peninsula's residents voted to break off from Ukraine and rejoin Russia. Shortly thereafter, Crimea formally requested to join the Russian Federation. Moscow accepted. Kiev and many Western powers have refused to recognize the legitimacy of the referendum, and introduced sanctions against Moscow and beefed up the NATO presence on Russia's borders. Asked to comment on Kiev's recent diplomatic maneuvers, Dr. Dmitri Zhuravlev, director of the Institute of Regional Problems, told Radio Sputnik that Kiev has absolutely no hope of finding any assistance from Beijing on the Crimean issue. "Poroshenko's appeal to Xi Jinping for support on Crimea is in some sense just a fit of hysteria, because Poroshenko has very likely lost all hope of appealing to the United States on this issue," the political scientist said. "He does not expect to receive the kind of understanding from Donald Trump that he got from Barack Obama. Still, Poroshenko wants there to be some kind of counterweight to Russia. Whether China is willing to become a counterweight for Ukraine's confrontation with Russia is another question altogether." After all, Zhuravlev recalled, "China is a very pragmatic country. They act on the basis of their own interests. Beijing obviously doesn't have any great interest in seeing Crimea join Ukraine. Therefore, China will not comment on Poroshenko's statements; they can't even imagine responding to such statements. And if Poroshenko continues to insist, he will be told that China is 'focusing'" on the issue. As for Kiev's draft action plan to 'reintegrate' Crimea, Zhuravlev emphasized that this was too little more than empty rhetoric. "This isn't so much an initiative, as it is empty talk about 'how good it would be for Crimeans to become part of Ukraine'. Kiev's problem is that Crimea has already been part of Ukraine, and Crimeans have a very hard time separating such rhetoric from their memory of life in Ukraine. Crimea under Ukraine was treated like a stepchild. Kiev conducted itself poorly toward Crimea and its population ever since [Ukraine gained] independence" in 1991. "I remember the period when Crimea was an autonomous republic – when authorities in Kiev only used the peninsula's economy, but did nothing to promote its development. I saw with my own eyes the condition of the sanatoriums in Yalta. This is the kind of thing a piece of paper can't do anything about, because facts and personal experience are more important than any words," the analyst concluded.
Q: A List of Graphs on Small Vertex Sets? I am preparing for the exam of a first year introductory course on Graph Theory. 50% of the paper unfortunately consists multiple choice questions which are at times tricky. They do not necessarily test your computation skills or theory but just familiarity in general with known graphs. That is, my teacher likes to test us on the number of different graphs (under isomorphism) on a given vertex set satisfying given conditions. A sample question would be how many different trees can be drawn on 4 vertices (2). This one is rather easy compared to some others and I constantly tend to overlook certain graphs. Is there a list of drawn graphs with certain properties that I can just have a look at? Certainly don't intend to memorise it. Just to look through before the paper. Like the list on Wikipedia for Small Abelian Groups. What I am looking for would be something like this: For $|V(G)| = 4;$ There are x regular graphs, y trees, z self-complementary graphs etc.. with illustrations. Any help is appreciated.. A: Yes, there are plenty such resources. This is the most useful one I know. Moreover, I suggest you review important properties of graphs and the relationships between these properties. Usually, you'll be able to just "see" one of these properties, and then deduce the others by knowing the relationships/bounds. You need to know the relationships between all of the following: Chromatic Number Independence Number Maximal Degree Clique Number Ramsey Number Diameter You should also look at important bounds, like Brooks' theorem, Moore's bound, the Handshaking Lemma, Cayley's Theorem, etc. Also, never forget the Petersen Graph. If there is any single graph you should know inside-out, it is this one.
“The Iranian nuclear issue has become the main pillar of the regime’s legitimacy,” said Mustafa el-Labbad, an Iran expert in Cairo. “So Ahmadinejad is putting it in the center of the scene in order to conceal the internal differences and huge domestic challenges they face.” It is not at all clear how much uranium has been enriched or whether Iran has the capacity to transform that into either weapons-grade fuel or even into the fuel rods necessary for running the medical research reactor it says it aims to supply. The Obama administration dismissed the idea that Iran had the capacity to enrich uranium to weapons grade. The White House press secretary, Robert Gibbs, said, “Iran has made a series of statements” that were “based on politics, not on physics,” The Associated Press reported. Mr. Ahmadinejad’s speech, delivered from a platform decorated with flowers, was heard by a largely sympathetic crowd that had been bused in from around the country to celebrate the most important political celebration of the year. The day is similar to the Fourth of July in the United States or Bastille Day in France, and like those holidays it is steeped in myth and symbolism. Both the opposition and the government hoped to control the message of the day. The opposition leaders, Mir Hussein Moussavi and Mehdi Karroubi, had called on their supporters to fill the streets, though they had not offered a clear plan. The government provided little room for the opposition to gain traction. It sent thousands of security officers into Azadi Square the night before to intimidate the opposition and, if necessary, block it from participating. Those who attended the rally disappeared in a sea of government supporters.
/* eslint-disable react/sort-comp */ import React, {PureComponent} from 'react'; import reactDecorator from '../../.storybook/react-decorator'; import DataList from '@jetbrains/ring-ui/components/data-list/data-list'; import Selection from '@jetbrains/ring-ui/components/data-list/selection'; import {moreLessButtonStates} from '@jetbrains/ring-ui/components/data-list/item'; import mock, {moreItems} from '@jetbrains/ring-ui/components/data-list/data-list.mock'; export default { title: 'Components/DataList', decorators: [reactDecorator()], parameters: { notes: 'A component for rendering interactive hierarchical tables.' } }; export const basic = () => { class DataListDemo extends PureComponent { expandedItems = new Set(); isItemCollapsible = item => item.collapsible && item.items && item.id > 10; isItemCollapsed = item => !this.expandedItems.has(item.id); getChildren = item => { const collapsible = this.isItemCollapsible(item); const collapsed = this.isItemCollapsed(item); return (collapsible && collapsed) || !item.items ? [] : item.items; }; state = { data: mock, selection: new Selection({ data: mock, isItemSelectable: item => item.selectable, getChildren: this.getChildren }) }; moreExpandableItems = new Set([mock[0].id]); moreExpandedItems = new Set(); itemMoreLessState = item => { if (this.moreExpandableItems.has(item.id)) { return this.moreExpandedItems.has(item.id) ? moreLessButtonStates.LESS : moreLessButtonStates.MORE; } else { return moreLessButtonStates.UNUSED; } }; onItemMoreLess = (item, more) => { if (more) { this.moreExpandedItems.add(item.id); item.items = item.items.concat([...moreItems]); } else { this.moreExpandedItems.delete(item.id); item.items = item.items.slice(0, item.items.length - moreItems.length); } const data = this.state.data; this.setState({data: [...data]}); }; onSelect = selection => { this.setState({selection}); }; itemFormatter = item => { const items = this.getChildren(item); const collapsible = this.isItemCollapsible(item); const collapsed = this.isItemCollapsed(item); const onCollapse = () => { this.expandedItems.delete(item.id); const data = this.state.data; this.setState({data: [...data]}); }; const onExpand = () => { this.expandedItems.add(item.id); const data = this.state.data; this.setState({data: [...data]}); }; return { ...item, items, collapsible, collapsed, onCollapse, onExpand }; }; render() { return ( <DataList data={this.state.data} selection={this.state.selection} onSelect={this.onSelect} itemFormatter={this.itemFormatter} onItemMoreLess={this.onItemMoreLess} itemMoreLessState={this.itemMoreLessState} /> ); } } return <DataListDemo/>; }; basic.storyName = 'basic';
In his visionary writings in the 19th century, American psychologist James ([@B4]) wrote about attention describing it in part as: ""...the taking possession of the mind, in clear and vivid form, one out of what seem several simultaneously possible objects or trains of thought."" Over the course of the ensuing century, especially in the past 60 years, researchers investigating the mechanisms of attention have identified important behavioral and neural correlates of attention, which include the findings that attention influences the processing of sensory stimuli by improving perception and performance for attended stimuli versus unattended stimuli (e.g., Cherry, [@B1]; Posner, [@B7]), and that such effects can involve changes in sensory-neural signals early in the sensory hierarchy for auditory (e.g., Hillyard et al., [@B3]), visual (e.g., Van Voorhis and Hillyard, [@B8]) and somatosensory (e.g., Desmedt and Robertson, [@B2]) stimuli. However, as James\' quote makes it clear, selective attention not only involves selecting between competing external signals, but also acting to select between internal and external signals, and perhaps as well between competing internal signals held in short- or long-term memory stores. I recall vividly that my late father George H. Mangun, a biochemist, could withdraw almost completely from the welter of our living room when my brother, sister and I were engaged in childhood mischief and mayhem. When he was focused on a difficult scientific problem, we had to physically leap on him to capture his attention. I asked him about this once, in amazement of his formidable mental sound-proofing, and he told me that he perfected the skill in college in order to study without being distracted. As a child I was not wholly convinced, but as an attention researcher (and a parent of two young boys myself!), I now understand the powerful nature of the human attention system for modulating sensory processing. Surprisingly, in contrast to work on the effects of attention on sensory inputs, very little work has addressed how attention can be turned inward to select from purely mental representations. There is no doubt that this paucity of research has to do with the simple fact that it is challenging to develop reliable measures of mental representations in the first place, and still harder to measure how such representations may be affected by other cognitive factors such as momentary attention. Nobre et al. ([@B6]), building on their and others\' earlier work, have conducted a very interesting study that does just this; they have investigated, using behavioral and physiological measures, the effects of attention on representations held in one form of mental store -- visual short term memory (VSTM). VSTM is a short-term (a few seconds) limited-capacity store of visual information (e.g., Zhang and Luck, [@B9]). Nobre et al. ([@B6]) investigated whether the retrieval of information from VSTM could be influenced by focused attention. The authors utilized a paradigm similar to those used in studies of the effects of covert selective attention on vision using predictive precues (e.g., Mangun and Hillyard, [@B5]). However, instead of precuing the location to which attention should be directed in future, the authors used retrodictive cues (spatial retro-cues) that indicated the location of a relevant target in an array presented in the past (1--2 s previously) with 100% probability. In comparison to neutral retro-cues that gave no information about the likely location in the array of the relevant item, performance to indicate whether a subsequently presented probe stimulus had in fact been anywhere in the array was improved with the spatial retro-cues. Importantly, the spatial retro-cues were found to increasingly benefit the observers when the number of items in the array increased. Recordings of event-related potentials (ERPs) also revealed brain potentials related to search in VSTM. Nobre et al. ([@B6]) found a brain potential and labeled it the N3~RS~, which showed systematic changes in amplitude and duration that mirrored the behavioral findings during search. Interestingly, the ERP covaried with the degree of search required during the neutral retro-cue trials in which subjects did not benefit from retrodictive spatial cues. Overall, the findings add support to the idea that voluntary attention can influence internal mental processing, like search through VSTM. Models that argue for immutable storage of VSTM are not compatible with the findings. However, the research suggests that William James\' introspections on attention are as rich as they appear at first reading, and that the focus of the *mind\'s eye* can be turned inward, to affect internal mental processes, as well as outward to modulate the processing of sensory inputs from the world around us.
Q: Getting web page title from setWebViewClient? i am using webview in my android app. i want to get title of current page shown in webview. i am using following code to do that webView.setWebViewClient(new WebViewClient(){ public void onPageFinished(WebView view, String url) { TextView t=(TextView)findViewById(R.id.title); t.setText(view.getTitle()); } } This code works but not always. Sometimes it doesn't show the title. sometimes it shows title of previous page. Whats wrong here?? A: The WebChromeClient will give you the web page title faster than the WebViewClient webview.loadUrl("https://www.google.co.in/"); webview.setWebChromeClient(new WebChromeClient() { @Override public void onReceivedTitle(WebView view, String sTitle) { super.onReceivedTitle(view, sTitle); if (sTitle != null && sTitle.length() > 0) { title.setText(sTitle); } else { title.setText("Web Page"); } } });
Article content Foreign Affairs Minister Stéphane Dion says Canada will be more constructive in its diplomatic dealings with Iran and Russia, but that caution and assertiveness will remain central to its approach. In an interview with the Citizen on Wednesday, Dion said the new Liberal government also won’t shy away from criticizing either Israel or the Palestinians when it comes to actions that threaten Middle East peace. And he wouldn’t rule out Canada running for a seat at the United Nations Security Council. We apologize, but this video has failed to load. tap here to see other videos from our team. Try refreshing your browser, or Canada ready to re-engage with Russia, Iran, despite differences, Dion says Back to video “I cannot tell you when we will ask to come back to the council,” he said. “But it is certainly something that we need to consider because the world needs Canada to be at the core of the decision-making process.” One of Prime Minister Justin Trudeau’s first promises after last month’s election was that Canada would have a more “compassionate and constructive voice in the world” under the Liberals after a decade of Conservative rule. As Trudeau’s new foreign affairs minister, it will be up to Dion to implement that vision.
The University of Oklahoma is kicking off the “Year of Diversity” by trying to shame students into admitting their “privilege.” The Gallogly College of Engineering website states the school will “celebrate diversity” through events that “enhance awareness of the issues faced by underrepresented members of our engineering community and promote GCoE’s inclusive climate that is welcoming of all differences.” Therefore, the school has taken the initiative to place “footprints” around engineering buildings that attempt to shame people for not acknowledging their “privilege” and for the fact that African Americans are not choosing to earn Ph.D.s in engineering: “Year of Diversity” action committee member and director of the School of Industrial and Systems Engineering, Randa Shehab, confirmed the text of the footprints to MRCTV. Although one of the footprints states it’s an individual’s “fault” for not acknowledging his or her privilege, the school states the footprints are designed to “prompt healthy dialogue and conversation.” It is unclear how a footprint instructing people to feel guilty for having “privilege” will prompt a “healthy dialogue” and be part of a “inclusive climate that is welcoming of all differences.” It is also unclear how a footprint stating only “1.5% of all engineering Ph.D. [sic] awarded went to African Americans in the U.S. last year” will make more black people want to earn engineering doctorates. The footprints appear to use text from the American Society for Engineering Education’s “Year of Action on Diversity.” The footprints are allegedly placed up around the Carson Engineering Center, Felgar Hall, and the Devon Energy Hall. In addition to placing footprints around campus in an attempt to shame high-achieving engineering students, the “Year of Diversity” will also include events such as a “Spring Festival of Diversity.” The “Year of Diversity” appears to be part of the College of Engineering’s Diversity & Inclusion program.
Senate GOP Leaders Release Wish List For Calif. Budget SACRAMENTO (CBS/AP) — After months of talks but no real progress, negotiations over solving California’s budget deficit appear to be stalled after Republican lawmakers released a list of 53 policy changes and budget reforms. They say getting those changes is their price for obtaining enough GOP support to call a special election. Gov. Jerry Brown wants voters to decide whether to extend increases to certain taxes enacted two years ago as part of his plan to close the shortfall. But the GOP wish list, released more than 2 1/2 months after Brown released his budget proposal, angered Democratic legislative leaders, who called it overreaching. On the list, pension cuts for current and former employees, ending the 10-year system for teachers facing layoffs and a hard cap on future state spending, KNX 1070’s Ed Mertz reports.
Lightweight Trash Tongs These handy, lightweight tongs will save you time and eliminate the need to bend over to pick up trash. These tongs are made of lightweight, durable aluminum tubing for long-term use and the rubberized hand grip provides extra padding for comfort. 36"L. Weighs 1 lb. USA made.
Links Monday, April 06, 2015 Practicing Mindfulness Guided Meditation by: Purpose Fairy All of us unless you are sitting on a mountain top away from everyone have stressful situations and things we have to face on a daily basis. The one thing I can tell you after 17 years of practicing meditation is we need this time for ourselves. Here is a great 10 minute meditatation that can help you. I would suggest wearing headphones, light some candles, incense and just relax for the next 10 minutes! Do this daily for a month and see how your life transforms. Love you all! Jeremy Here is a note from the Purpose Fairy which is the source for this blog: Click Here “Feelings, whether of compassion or irritation, should be welcomed, recognized, and treated on an absolutely equal basis; because both are ourselves. The tangerine I am eating is me. The mustard greens I am planting are me. I plant with all my heart and mind. I clean this teapot with the kind of attention I would have were I giving the baby Buddha or Jesus a bath. Nothing should be treated more carefully than anything else. In mindfulness, compassion, irritation, mustard green plant, and teapot are all sacred.”~ Thích Nhất Hạnh, The Miracle of Mindfulness Today I wanted to share with you a guided meditation that will help you pay more attention to, and see clearer whatever is happening in your life. It will not eliminate life’s pressures, but it can help you with the way you respond to them in a calmer manner. Practicing mindfulness will allow you to be fully present in your life and work, and improve the quality of your life. Before you begin, remember to first, find a quiet place where you won’t be disturbed for the next 10 minutes. Second, find a comfortable position to sit – it can be on a chair, crossed legged or on your knees, or lay down and when you’re ready, press play. Once the meditation session is over, you can share your experience with all of us by commenting below. Jeremy McDonald has had a deep passion for human dynamics throughout his life and has spent his adult life studying concepts of healing, mindfulness, consciousness and many others. Jeremy is formally trained in Adult Learning theories and has worked as a Corporate Trainer for a number of years. He has also been a public speaker for the past 20 years helping others find their full potential in life. He strives to be the constant student realizing life is only happening to it's fullest when we are expanding our growth and knowledge. We are all teachers and students and this relationship is a flow between the two...Follow him on – Facebook: @JeremyMcDonaldLLG, Twitter: @Lamplightgroup,
Quarterback is a clear need for a handful of NFL teams—the Giants, the Dolphins and the Broncos, to name a few. But which team could surprise us and draft a passer? In 2017, Chicago shocked the NFL by trading up to draft QB Mitchell Trubisky with the second overall pick, just weeks after the team signed QB Mike Glennon to a three-year, $45 million deal with a guaranteed $18.5 million over three years in free agency. Last year there weren’t any unexpected quarterback moves made in the first round, but this year could be different. After the musical chairs of free agency ended, there are still many teams in need of quarterbacks—but not immediately. The Giants need to draft Eli Manning’s heir sooner rather than later. Tennessee and Tampa Bay both have quarterbacks on expiring deals. Miami, Washington (because Alex Smith’s future is uncertain) and Denver all have bridge quarterbacks, but are searching for a franchise quarterback. One scout I spoke to said there will be one or two first-round-caliber quarterbacks still available in the second half of the first round, which opens up the quarterback possibilities to teams picking outside of the top ten in this draft. I polled several scouts and agents around the NFL to find out which teams they think may surprise draft a quarterback. Here’s the list of teams (in alphabetical order) that came up most often: Cincinnati Bengals The Bengals drafting a quarterback wouldn’t be much of a surprise after team owner Mike Brown said at the NFL owners meeting that he would not consider extending quarterback Andy Dalton’s contract (which runs through 2020) before this season. According to the Cincinnati Enquirer, Brown said, “I think it's a good year for [Dalton] to show like he can, like we think he will. After he re-establishes himself we would want to get together with him and see if we can extend it. I think Andy is a good player and that he will rebound off last year. He was hurt. We lost so many other pieces. It fell apart, but if he's healthy and we stay healthy enough, I have confidence in him.” The Bengals have the No. 11 pick, which is in the range to get a top QB. Cincinnati’s first-year head coach Zac Taylor came up in the league as a quarterbacks coach, so he may have his eye on a rookie who he can mold in his own image. Taylor has expressed support for Dalton, but the Bengals came up most often in this poll, so they are a team to keep an eye on. Detroit Lions One scout posed the question—can the team really win it all with Matthew Stafford? The Lions haven’t won a playoff game since 1991, and while the roster is weak in many areas, it’s natural to question how much falls on Stafford. But also consider that the team wasn’t willing to trade Stafford to the Dolphins before last season for a first-round pick and more. Detroit’s roster has a lot of holes, and the Lions could pull in a decent haul of picks for their No. 8 pick if they put out some feelers to trade back—watch for them to trade down with a team desperate to get into the top ten. New England Patriots The Patriots’ roster has many holes—left tackle, tight end and defensive end are more pressing needs—but it’s not out of the question for New England to possibly draft a quarterback if the right player is still there at the No. 32. More likely, the Patriots will use a late-round pick on a quarterback, someone like North Dakota State’s Easton Stick, who led North Dakota State to three FCS titles, or Boise State’s Brett Rypien, who I’ve heard has a few teams interested in him. Oakland Raiders One scout originally mentioned Oakland, and then took it back, saying coach Jon Gruden won’t take a quarterback because he hates young quarterbacks. This is a good point about Gruden, but I still think there’s a real chance Gruden’s desire to remake a team in his own image will outweigh his dislike of inexperienced quarterbacks. As Albert Breer reported, the Raiders are doing their work on the top quarterbacks in this draft, hosting Dwayne Haskins and Kyler Murray for workouts. And the Oakland staff has already spent a significant amount of time with Missouri quarterback Drew Lock while coaching him at the Senior Bowl. Seattle Seahawks Even with Russell Wilson on the roster, Seattle keeps tabs on the draft’s quarterbacks. This year the team interviewed Kyler Murray at the scouting combine. Last year general manager John Schneider attended Josh Allen’s pro day at Wyoming, and two years ago, the Seahawks were very interested in Patrick Mahomes. Seattle is currently in negotiations with Wilson’s camp to extend his contract—the QB gave the Seahawks a self-imposed deadline of April 15, not wanting to extend negotiations into the beginning of the offseason program. But Breer reported that Wilson will still be at the workouts whether or not he has a deal. However if there’s a quarterback whom Seattle likes still available in the second half of the first round, the Seahawks may go in that direction. Tampa Bay Buccaneers New head coach Bruce Arians has spoken out with his support of Jameis Winston, but the 25-year old quarterback is entering the final year of his five-year contract. Winston has struggled on the field with inconsistency and turnovers, and his record off the field is equally spotty, which makes it easy to see Tampa Bay picking a quarterback if there’s a guy they like in this draft. Will Winston take a real step forward in 2019? It may be easier for the Bucs to just move on without him. The Bucs pick fifth overall, which puts them in a good position to get a quarterback. OTHER NEWS The pro day circuit has officially concluded, and now we enter the phase of the pre-draft process where most teams will hold local pro days at their facilities. Prospects who played at colleges near the NFL team are invited to work out. These are helpful because the team does not have to use one of their 30 allotted visits on these local prospects and can use that visit on a prospect who is not in the area. Question or comment? Email us at talkback@themmqb.com
Community detection in networks with positive and negative links. Detecting communities in complex networks accurately is a prime challenge, preceding further analyses of network characteristics and dynamics. Until now, community detection took into account only positively valued links, while many actual networks also feature negative links. We extend an existing Potts model to incorporate negative links as well, resulting in a method similar to the clustering of signed graphs, as dealt with in social balance theory, but more general. To illustrate our method, we applied it to a network of international alliances and disputes. Using data from 1993-2001, it turns out that the world can be divided into six power blocs similar to Huntington's civilizations, with some notable exceptions.
Gudy 870 vs Gudy 831 (Gudy O vs Gudy V) Gudy adhesives, both 831 and 870, are exceptional double-sided mounting adhesives. These acid-free dry mount tapes are great for mounting prints, bookcloth, paper, you name it. Both options are applied by hand, without the need for heat or laminators. Just press and peel the liner to apply. The difference between the 830 and 870 can be boiled down to the weight and strength of each. Watch this quick video for a visual of each: The Gudy 870 (also known as Gudy O) is an incredibly thin adhesive film, which virtually has no thickness. This means that you can adhere two objects without adding any visible thickness and without a gummy edge. The lack of substance does make it more difficult to apply, but it certainly has its uses and it is quite strong when applied. Requires careful handling. Adhesive will pickup and bead up easily if touched, handled too quickly, or not burnished down fully. The Gudy 831 (also known as Gudy V) is still a very thin adhesive, but is essentially two pieces of Gudy 870 with a thin paper carrier sandwiched in the middle. This carrier gives the adhesive more substance and body on its own. It is easier to work with, and stronger. Both the Gudy 870 and Gudy 831 have their own pros and cons, and different applications where both excel.
Q: Unable to send percent character "%" in the SMS body in Kannel I have kannel installed on my Server and I am using it to connect to an SMS Gateway using SMPP. When I am trying to send an SMS with "%" the SMS is not sent. But without "%" it works fine. Thanks I have found a solution by converting the message to HTML using urlencode($message) Cheers ^_^ A: I believe kannel is XML and as such, you must escape a percentage %. Try replacing % with &#37;
More people live in China than any other country, and in 2010 it surpassed the United States as the largest car market on Earth. As the popularity of automobiles grows, China's infrastructure has struggled to keep pace. The result is -- like anywhere else in the world -- traffic jams. Yet traffic jams in China are not always brief hiccups during the evening commute. In fact, the worst jams in China, while rare, can last for days.
recursive-include docs * recursive-include util * recursive-include skins * recursive-include examples * include LICENSE.txt include README include weewx.conf exclude **/junk*
Speaker Hughes and Sen. Dabakis strike a deal over the inland port, but will SLC agree to it? SALT LAKE CITY -- At a news conference on Utah's Capitol Hill, House Speaker Greg Hughes and Sen. Jim Dabakis joked with each other about how they found common ground and came up with some ideas to help restart negotiations over the inland port. Judging from the reaction in the crowd, they were the only ones laughing. Before a packed room made up of members of the Salt Lake City Council, community, environmental activists and lawmakers blindsided by the closed-door talks, Speaker Hughes and Sen. Dabakis, D-Salt Lake City, outlined their ideas to reach a deal between the legislature and Salt Lake City over the inland port. The inland port, which has been called the biggest economic development project in state history, will be built in Salt Lake City's Northwest Quadrant. It's where UPS has opened a massive hub, and Amazon is building a fulfillment center. The inland port would be a combination of air, road and rail to create an import-export center. Salt Lake City has argued that residents would foot the bill for infrastructure improvements, but get none of the tax benefits. Mayor Jackie Biskupski has also expressed fears the legislature is just grabbing land that belongs to the city. After they argued about it on a Sunday morning TV show appearance, the two said they got to talking and came up with some ideas. "Honestly, this is how public policy happens," Speaker Hughes told the crowd. "You’ve got to find that common ground." Sen. Dabakis pointed out the Utah State Legislature passed a bill creating an inland port authority with very little of what Salt Lake City wanted in it. The governor signed it, but pledged to call a special session if lawmakers could reach a new deal with the city. After that, negotiations stalled. "The port is going to come and the process now has led us to a nasty place," Sen. Dabakis said. Those ideas include: Dedicated affordable housing money. A bigger cut for Salt Lake City when it comes to tax revenue. More environmental protections, including train cars carrying coal being covered and wetland protections near the Great Salt Lake. An agreement to keep the Salt Lake City International Airport under city control and not the state. Sen. Dabakis emphasized these were the ideas of he and Speaker Hughes, not anyone else. Others were fuming they were never involved in the closed-door talks, including the lawmakers who actually represent that area. "I would have liked to have been at the table," said Rep. Sandra Hollins, D-Salt Lake City. "He doesn’t represent that district. I represent that district and I have been the one listening to to my constituents." Sen. Luz Escamilla, D-Salt Lake City, who represents the west side of the city, said she was not happy with Sen. Dabakis conducting closed-door talks and called his news conference "more of a show." "The irony is that Sen. Dabakis has been so critical for the last six years about the Republicans in the majority party making deals without transparency, without open meetings and look what just happened today!" she said of her colleague. Sen. Dabakis insisted he was speaking for the people he represents in his district. "To all of you, I’m getting all your texts and emails and calling me names and doing things and you weren’t involved in the process or whatever," he said, addressing his critics at the news conference. "This is how we kind of move forward." Some have questioned the political ambitions of both men. Speaker Hughes appointed himself to the Inland Port Authority Board, citing his institutional knowledge of the project. He has been contemplating a run for governor. Sen. Dabakis has been rumored to be considering challenging Mayor Biskupski next year. "It is not related to this at all," Speaker Hughes said of his future plans. "If I was running for mayor, I’d run away from this issue, believe me," Sen. Dabakis jumped in. "I want the city involved!" Some members of the Salt Lake City Council found out details just ahead of the news conference. Community activists like former Salt Lake City Councilwoman Deeda Seed complained that issues like air quality were not being considered. "If we’re going to find solutions, personalities aside, am I supposed to call everybody and get ‘em all at the table?" he asked. "Yes!" she responded. Sen. Dabakis told her and other community activists to get involved with the legislature by "cajoling and begging." For their part, Salt Lake City leaders appeared open to discussing the ideas presented. Mayor Biskupski's deputy chief of staff, David Litvak, said what was said today is better than what the legislature passed but the "devil is in the details." "Poplar Grove, Glendale, they should not have to compromise on fire services or police services or other public services in order to provide services to the Northwest Quadrant," he said. The mayor's office would not rule out a potential lawsuit over the bill passed by the legislature. Salt Lake City Council Chairwoman Erin Mendenhall said she believed Sen. Dabakis' efforts were ultimately helpful. "I think this is helpful because the conversation was not happening between the city and the state in any productive way," she told FOX 13. "Here we are being invited back to the table." Gov. Gary Herbert's office said it was keeping an eye on the talks. "We appreciate all efforts to find solutions. If the city and the legislature can find ways to improve the inland port law, our office is eager to move forward," Herbert spokesman Paul Edwards said.
var acornToEsprima = require("acorn-to-esprima"); var assign = require("lodash.assign"); var pick = require("lodash.pick"); var Module = require("module"); var path = require("path"); var parse = require("babylon").parse; var t = require("babel-types"); var tt = require("babylon").tokTypes; var traverse = require("babel-traverse").default; var estraverse; var hasPatched = false; function createModule(filename) { var mod = new Module(filename); mod.filename = filename; mod.paths = Module._nodeModulePaths(path.dirname(filename)); return mod; } function monkeypatch() { if (hasPatched) return; hasPatched = true; var eslintLoc; try { // avoid importing a local copy of eslint, try to find a peer dependency eslintLoc = Module._resolveFilename("eslint", module.parent); } catch (err) { try { // avoids breaking in jest where module.parent is undefined eslintLoc = require.resolve("eslint"); } catch (err) { throw new ReferenceError("couldn't resolve eslint"); } } // get modules relative to what eslint will load var eslintMod = createModule(eslintLoc); var escopeLoc = Module._resolveFilename("escope", eslintMod); var escopeMod = createModule(escopeLoc); // npm 3: monkeypatch estraverse if it's in escope var estraverseRelative = escopeMod; try { var esrecurseLoc = Module._resolveFilename("esrecurse", eslintMod); estraverseRelative = createModule(esrecurseLoc); } catch (err) {} // contains all the instances of estraverse so we can modify them if necessary var estraverses = []; // monkeypatch estraverse estraverse = estraverseRelative.require("estraverse"); estraverses.push(estraverse); assign(estraverse.VisitorKeys, t.VISITOR_KEYS); // monkeypatch estraverse-fb var estraverseFb = eslintMod.require("estraverse-fb"); estraverses.push(estraverseFb); assign(estraverseFb.VisitorKeys, t.VISITOR_KEYS); // ESLint v1.9.0 uses estraverse directly to work around https://github.com/npm/npm/issues/9663 var estraverseOfEslint = eslintMod.require("estraverse"); if (estraverseOfEslint !== estraverseFb) { estraverses.push(estraverseOfEslint); assign(estraverseOfEslint.VisitorKeys, t.VISITOR_KEYS); } // monkeypatch escope var escope = require(escopeLoc); var analyze = escope.analyze; escope.analyze = function (ast, opts) { opts.ecmaVersion = 6; opts.sourceType = "module"; var results = analyze.call(this, ast, opts); return results; }; // monkeypatch escope/referencer var referencerLoc; try { referencerLoc = Module._resolveFilename("./referencer", escopeMod); } catch (err) { throw new ReferenceError("couldn't resolve escope/referencer"); } var referencerMod = createModule(referencerLoc); var referencer = require(referencerLoc); if (referencer.__esModule) { referencer = referencer.default; } // monkeypatch escope/pattern-visitor var patternVisitorLoc; var patternVisitorMod; var patternVisitor; try { patternVisitorLoc = Module._resolveFilename("./pattern-visitor", escopeMod); patternVisitorMod = createModule(patternVisitorLoc); patternVisitor = require(patternVisitorLoc); if (patternVisitor.__esModule) { patternVisitor = patternVisitor.default; } } catch (err) { // When eslint uses old escope, we cannot find pattern visitor. // Fallback to the old way. } // reference Definition var definitionLoc; try { definitionLoc = Module._resolveFilename("./definition", referencerMod); } catch (err) { throw new ReferenceError("couldn't resolve escope/definition"); } var Definition = require(definitionLoc).Definition; // if there are decorators, then visit each function visitDecorators(node) { if (!node.decorators) { return; } for (var i = 0; i < node.decorators.length; i++) { if (node.decorators[i].expression) { this.visit(node.decorators[i]); } } } // iterate through part of t.VISITOR_KEYS var visitorKeysMap = pick(t.VISITOR_KEYS, function(k) { return t.FLIPPED_ALIAS_KEYS.Flow.concat([ "ArrayPattern", "ClassDeclaration", "ClassExpression", "FunctionDeclaration", "FunctionExpression", "Identifier", "ObjectPattern", "RestElement" ]).indexOf(k) === -1; }); var propertyTypes = { // loops callProperties: { type: "loop", values: ["value"] }, indexers: { type: "loop", values: ["key", "value"] }, properties: { type: "loop", values: ["value"] }, types: { type: "loop" }, params: { type: "loop" }, // single property argument: { type: "single" }, elementType: { type: "single" }, qualification: { type: "single" }, rest: { type: "single" }, returnType: { type: "single" }, // others typeAnnotation: { type: "typeAnnotation" }, typeParameters: { type: "typeParameters" }, id: { type: "id" } }; function visitTypeAnnotation(node) { // get property to check (params, id, etc...) var visitorValues = visitorKeysMap[node.type]; if (!visitorValues) { return; } // can have multiple properties for (var i = 0; i < visitorValues.length; i++) { var visitorValue = visitorValues[i]; var propertyType = propertyTypes[visitorValue]; var nodeProperty = node[visitorValue]; // check if property or type is defined if (propertyType == null || nodeProperty == null) { continue; } if (propertyType.type === "loop") { for (var j = 0; j < nodeProperty.length; j++) { if (Array.isArray(propertyType.values)) { for (var k = 0; k < propertyType.values.length; k++) { checkIdentifierOrVisit.call(this, nodeProperty[j][propertyType.values[k]]); } } else { checkIdentifierOrVisit.call(this, nodeProperty[j]); } } } else if (propertyType.type === "single") { checkIdentifierOrVisit.call(this, nodeProperty); } else if (propertyType.type === "typeAnnotation") { visitTypeAnnotation.call(this, node.typeAnnotation); } else if (propertyType.type === "typeParameters") { for (var l = 0; l < node.typeParameters.params.length; l++) { checkIdentifierOrVisit.call(this, node.typeParameters.params[l]); } } else if (propertyType.type === "id") { if (node.id.type === "Identifier") { checkIdentifierOrVisit.call(this, node.id); } else { visitTypeAnnotation.call(this, node.id); } } } } function checkIdentifierOrVisit(node) { if (node.typeAnnotation) { visitTypeAnnotation.call(this, node.typeAnnotation); } else if (node.type === "Identifier") { this.visit(node); } else { visitTypeAnnotation.call(this, node); } } function nestTypeParamScope(manager, node) { var parentScope = manager.__currentScope; var scope = new escope.Scope(manager, "type-parameters", parentScope, node, false); manager.__nestScope(scope); for (var j = 0; j < node.typeParameters.params.length; j++) { var name = node.typeParameters.params[j]; scope.__define(name, new Definition("TypeParameter", name, name)); } scope.__define = function() { return parentScope.__define.apply(parentScope, arguments); }; return scope; } // visit decorators that are in: ClassDeclaration / ClassExpression var visitClass = referencer.prototype.visitClass; referencer.prototype.visitClass = function(node) { visitDecorators.call(this, node); var typeParamScope; if (node.typeParameters) { typeParamScope = nestTypeParamScope(this.scopeManager, node); } // visit flow type: ClassImplements if (node.implements) { for (var i = 0; i < node.implements.length; i++) { checkIdentifierOrVisit.call(this, node.implements[i]); } } if (node.superTypeParameters) { for (var k = 0; k < node.superTypeParameters.params.length; k++) { checkIdentifierOrVisit.call(this, node.superTypeParameters.params[k]); } } visitClass.call(this, node); if (typeParamScope) { this.close(node); } }; // visit decorators that are in: Property / MethodDefinition var visitProperty = referencer.prototype.visitProperty; referencer.prototype.visitProperty = function(node) { if (node.value && node.value.type === "TypeCastExpression") { visitTypeAnnotation.call(this, node.value); } visitDecorators.call(this, node); visitProperty.call(this, node); }; // visit flow type in FunctionDeclaration, FunctionExpression, ArrowFunctionExpression var visitFunction = referencer.prototype.visitFunction; referencer.prototype.visitFunction = function(node) { var typeParamScope; if (node.typeParameters) { typeParamScope = nestTypeParamScope(this.scopeManager, node); } if (node.returnType) { checkIdentifierOrVisit.call(this, node.returnType); } // only visit if function parameters have types if (node.params) { for (var i = 0; i < node.params.length; i++) { var param = node.params[i]; if (param.typeAnnotation) { checkIdentifierOrVisit.call(this, param); } else if (t.isAssignmentPattern(param)) { if (param.left.typeAnnotation) { checkIdentifierOrVisit.call(this, param.left); } } } } // set ArrayPattern/ObjectPattern visitor keys back to their original. otherwise // escope will traverse into them and include the identifiers within as declarations estraverses.forEach(function (estraverse) { estraverse.VisitorKeys.ObjectPattern = ["properties"]; estraverse.VisitorKeys.ArrayPattern = ["elements"]; }); visitFunction.call(this, node); // set them back to normal... estraverses.forEach(function (estraverse) { estraverse.VisitorKeys.ObjectPattern = t.VISITOR_KEYS.ObjectPattern; estraverse.VisitorKeys.ArrayPattern = t.VISITOR_KEYS.ArrayPattern; }); if (typeParamScope) { this.close(node); } }; if (patternVisitor) { patternVisitor.prototype.SpreadProperty = function (node) { this.visit(node.argument); }; } // visit flow type in VariableDeclaration var variableDeclaration = referencer.prototype.VariableDeclaration; referencer.prototype.VariableDeclaration = function(node) { if (node.declarations) { for (var i = 0; i < node.declarations.length; i++) { var id = node.declarations[i].id; var typeAnnotation = id.typeAnnotation; if (typeAnnotation) { checkIdentifierOrVisit.call(this, typeAnnotation); } if (id.type === "ObjectPattern") { // check if object destructuring has a spread var hasSpread = id.properties.filter(function(p) { return p._babelType === "SpreadProperty" || p._babelType === "RestProperty"; }); // visit properties if so if (hasSpread.length > 0) { for (var j = 0; j < id.properties.length; j++) { this.visit(id.properties[j]); } } } } } variableDeclaration.call(this, node); }; function createScopeVariable (node, name) { this.currentScope().variableScope.__define(name, new Definition( "Variable", name, node, null, null, null ) ); } referencer.prototype.TypeAlias = function(node) { createScopeVariable.call(this, node, node.id); var typeParamScope; if (node.typeParameters) { typeParamScope = nestTypeParamScope(this.scopeManager, node); } if (node.right) { visitTypeAnnotation.call(this, node.right); } if (typeParamScope) { this.close(node); } }; referencer.prototype.DeclareModule = referencer.prototype.DeclareFunction = referencer.prototype.DeclareVariable = referencer.prototype.DeclareClass = function(node) { if (node.id) { createScopeVariable.call(this, node, node.id); } var typeParamScope; if (node.typeParameters) { typeParamScope = nestTypeParamScope(this.scopeManager, node); } if (typeParamScope) { this.close(node); } }; } exports.parse = function (code) { try { monkeypatch(); } catch (err) { console.error(err.stack); process.exit(1); } return exports.parseNoPatch(code); } exports.parseNoPatch = function (code) { var opts = { sourceType: "module", strictMode: true, allowImportExportEverywhere: false, // consistent with espree allowReturnOutsideFunction: true, allowSuperOutsideMethod: true, plugins: [ "flow", "jsx", "asyncFunctions", "asyncGenerators", "classConstructorCall", "classProperties", "decorators", "doExpressions", "exponentiationOperator", "exportExtensions", "functionBind", "functionSent", "objectRestSpread", "trailingFunctionCommas" ] }; var ast; try { ast = parse(code, opts); } catch (err) { if (err instanceof SyntaxError) { err.lineNumber = err.loc.line; err.column = err.loc.column; // remove trailing "(LINE:COLUMN)" acorn message and add in esprima syntax error message start err.message = "Line " + err.lineNumber + ": " + err.message.replace(/ \((\d+):(\d+)\)$/, ""); } throw err; } // remove EOF token, eslint doesn't use this for anything and it interferes with some rules // see https://github.com/babel/babel-eslint/issues/2 for more info // todo: find a more elegant way to do this ast.tokens.pop(); // convert tokens ast.tokens = acornToEsprima.toTokens(ast.tokens, tt, code); // add comments acornToEsprima.convertComments(ast.comments); // transform esprima and acorn divergent nodes acornToEsprima.toAST(ast, traverse, code); // ast.program.tokens = ast.tokens; // ast.program.comments = ast.comments; // ast = ast.program; // remove File ast.type = 'Program'; ast.sourceType = ast.program.sourceType; ast.directives = ast.program.directives; ast.body = ast.program.body; delete ast.program; delete ast._paths; acornToEsprima.attachComments(ast, ast.comments, ast.tokens); return ast; }
Articles in this section 01. Update TaroWorks in Salesforce Introduction This article details the step-by-step instructions for installing the TaroWorks 4.4 managed package into Salesforce.com. Once you've completed the steps in this article, your field officers will receive a notification to upgrade TaroWorks on their mobile device upon their next sync. Log in as System Administrator (Customize Application and Modify All Data permissions enabled) If you have any questions please submit a ticket to taroworks@support.org. Update TaroWorks in Salesforce Click the latest TaroWorks 4.4.X Salesforce Managed Package Installation Link for a Production Instance on the TaroWorks Release Page.Note:For a Sandbox Instance, use the corresponding link. If you are installing into a sandbox the word 'sandbox' will be in the upper right hand corner. The page below will load. Click Install for Specific Profiles. **IMPORTANT** For Access Level, Select the TaroWorks Partner User access for the TaroWorks Partner User profile and TaroWorks User access for the TaroWorks User profile. Note:If you use any custom profiles for TaroWorks users, you can also map these security permission to those profiles as well, depending on whether it is a front-end (TaroWorks Partner User) or back-end (TaroWorks User) user. Scroll back to the top and click the Upgrade button. You will receive an email with the Subject, "Package TaroWorks Install Successful" when the installation is complete.
HOME POLICY REGULATION EU – NEW ANTI-MONEY LAUNDERING LAWS FOR BITCOIN EXCHANGES AND WALLETS? The European Commission has drafted a proposal to further regulate Bitcoin companies to prevent terrorist financing and money laundering. In the wake of the recent terrorist attacks within the European Union on the one hand and the Panama Papers on the other, the European Commission has presented a draft that aims to change the current anti-money laundering and know your customer regulations. The draft aims to amend EU Directive 2015/849 and Directive 2009/101/EC. Both are EU directives which deal with the prevention of money laundering and terrorist financing. Bitcoin news companies bear the brunt The new law will put crypto exchanges and wallet providers under the new Anti-Money Laundering Act and the KYC regulations. In the near future, these Bitcoin news laws could be strengthened to force users of crypto currencies to identify themselves voluntarily. Various Bitcoin news platforms that sell debit cards will also fall under the new law. With this draft, the Commission wants to create an error-free protection against money laundering and KYC regulations, which can enter into force in every member country without great effort. Bitcoin Exchanges and Wallet providers will then be obliged to implement all necessary anti-gender laundering and KYC regulations as prescribed. These Altcoin platforms will then be required by law to report suspicious transactions to the appropriate government. Bitcoin formula technology gets away with it So much for the negative consequences for Bitcoin formula. Blockchain companies have a reason to be pleased, however, as the document also stresses the importance of Bitcoin formula developments for companies and governments. Furthermore, it is emphasized that this draft should not have negative consequences for research in the context of Distributed Ledger Technology. The draft presents some measures to make it difficult for terrorists to take advantage of certain loopholes in the current regulations. It also wants to increase the transparency of financial transactions for both individuals and corporations. According to the draft, activities such as cash payments, trade in cultural artefacts, the use of Bitcoin, other crypto currencies and anonymous debit cards are possibilities to finance terrorism. The European Commission has prepared this document together with various stakeholders within the EU. EU member states, representatives of the European Parliament, representatives of traditional payment systems, crypto exchanges, wallet providers, other representatives of the crypto currency community, stakeholders of the banking sector and representatives of Fintech companies, financial intelligence units such as the BKA, the European Data Protection Supervisors and various organisations representing consumers were interviewed prior to the draft. Since the attacks in Paris, some EU member states have called for stricter regulation of crypto currencies. So the current draft does not come as a surprise. Nevertheless, the consequences for the Bitcoin industry should be kept in mind. The document in its entirety can be read here. Comment by the author (Philipp Giese): To me this draft, especially if one wants to justify it with the acts of violence of the last days, seems to be similar to the other big proposals of the brand “stricter regulation regarding killer games”. In the end, it misses the point. Finally, interesting is the benevolent attitude regarding blockchain technology and DLT, which cuts into the classic “Bitcoin no, DLT yes” notch. Afraid of the summer slump? As temperatures rise, so does the anticipation of your long-awaited leisure time. After a little vacation and relaxation, your fingers quickly itch again to become active and to look for a meaningful occupation? We’ve picked out a few ways for you to get to grips with the topic of blockchain and crypto currencies during the summer. The Frankfurt School Blockchain Center and the German Tech Entrepreneurship Center jointly organize the “Crypto Startup School”. Over the course of a week, participants have the opportunity to gain insights into relevant topics during lectures, network with others and develop their own ICO business model in a group project. In addition, the three best Bitcoin formula projects receive prize money and can bring their ICO project to life ASTRATUM and the ADG jointly run the three-day “Blockchain Summer School 2018” (BSS18). The aim of the Bitcoin formula programme is to provide participants with solid theoretical knowledge and, in particular, practical knowledge, to develop blockchain use cases, to teach the basics for developing their own strategy or concept and not a scam, in order to be able to assess entrepreneurial decisions or investment opportunities. The one-week summer school in Utrecht offers both theoretical background and practical experience with blockchain applications. Participants will gain insights into the history of blockchain technology and learn concepts such as mining, smart contracts, virtual identity and more. In addition, practical applications are discussed, for example in sectors such as finance, logistics, education and health. The course is aimed at students and interns interested in the theory and practice of blockchains. Students can get credited according to the Bitcoin trader system The two-week course “Blockchain Tech” is offered as part of the Summer School CuriousU. In this course the relevant concepts around the Bitcoin trader Blockchain technology are to be mediated. The participants should be able to survive the Bitcoin trader hype and judge for themselves whether the application of blockchain technology makes sense or not. “Blockchain Tech” is structured as a technical course and includes (interactive) lectures and tutorials for practical experience as well as collaborative project work. Knowledge of computer science and computer science is recommended. Facebook has revised its advertising policies regarding crypto currencies and blockchain so that crypto advertising, with the exception of ICOs and binary options, is permitted again. The news has led to many rumors in the social media, as some see much more in this resolution than just a small change in advertising policy. So how are the rumors to be classified and what implications might they have for the crypto market and its users? The behavior of Bitcoin profit was and is quite understandable In order to counter the mass of dubious ICO advertising including Bitcoin profit snowball systems, the Internet giant pulled the rip cord in January of this year and temporarily issued a general advertising ban for the entire crypto economy: https://www.geldplus.net/en/bitcoin-profit-review/ A short time later, Google, Twitter and Instagram joined in and also decided on a no-crypto ads policy. Quite a few had supported this policy, as it had helped to slow down the inflation of scam ICOs and insubstantial crypto products. The downside, on the other hand, was that serious players have also fallen under censorship. If, for example, a state university wanted to advertise its own blockchain event, this was prevented, as was advertising for snowball systems – exceptions, if any, were difficult to obtain. A situation that cannot be tolerated in the long run, as Facebook itself admits. The guidelines have now been revised accordingly so that companies can now again place crypto advertising if their application is approved. A Like for the Bitcoin profit From now on, applications must be submitted to Facebook if you want to place Bitcoin profit advertisements. Although the applications are paperless, not much information is expected from the advertising Bitcoin profit companies – a deliberate hurdle, as Rob Leathern, Product Management Director at Facebook, says: “Within the restrictions, not everyone who intends to advertise will be able to do so. It is unclear how strictly the administrators and algorithms will evaluate and process applications. The processing time is also unknown so far. If the procedure proves to be practicable and not too costly, this could at least temporarily be a decent compromise between Wild West and censorship. But it’s equally conceivable that the whole process and application criteria will look completely different in a few weeks’ time. Is Facebook leading the herd? When Facebook issued the crypto advertising ban in January, Google, Twitter and Instagram followed suit with their own anti-crypto advertising guidelines. This raises the question of whether the other Internet companies will now also relax their policy in line with Facebook. Numerous such posts can be read on Twitter: Even if official statements are still missing and these are speculations of various people, it is obvious that the other players Facebook will not simply leave the crypto advertising field. Even if ICOs and binary options, which make up a considerable part of the crypto advertising budget, should be left out, the advertising of crypto exchanges alone would generate decent income – money that even the Silicon Valley giants are reluctant to miss out on. What does this mean for the crypto market? When the Facebook crypto advertising ban was announced in January and Google followed suit in March, the crypto market reacted with a correction. Of course, other external factors may also have played a role here, but the impulse of the announcement of the resolutions tended to have a negative effect on prices. Conversely, a relaxation of the crypto advertising policy should have a positive effect on the crypto market. After all, the Internet giants reach several billion people who now come into contact with the crypto economy through advertising of any kind. Thus, even people with Bitcoin & Co. who previously had no or only a few points of contact are confronted – a clear hint towards mainstream adaptation. Nevertheless, the question of independence arises in this context. Where does consumer protection stop and where does censorship begin? Can Facebook really be trusted to provide a largely fair and independent assessment The digital currency Bitcoin is currently booming again, but the purchase or sale still throws big question marks on the forehead of some users. How do I buy Bitcoins, where do I buy Bitcoins and above all how do I buy Bitcoins most securely are probably the most frequently asked questions that we currently receive. At the beginning of the Bitcoin boom, the European Bitcoin exchanges dominated the market. But times have changed. More and more European stock exchanges and brokers are taking the floor and offering their services for the European market. One of these exchanges or brokers is the Dutch company Anycoin Direct*. On the German side, buying and selling Bitcoins is very easy. A large selection of digital currencies for the Bitcoin trader Anycoin Direct offers its Bitcoin trader, customers the opportunity to buy and sell Bitcoin as well as other currencies (Altcoins). The portfolio of the exchange includes a considerable number of currencies. In addition to the well-known Altcoins Ether (Ethereum), Litecoin, ZCash, Monero and Dash, these also include Gulden and Feathercoin. Check it out: https://www.geldplus.net/en/bitcoin-trader-review/ In an interview with BTC-ECHO, Managing Director Bram Celeen answered the question as to which features make Anycoin Direct stand out: “Anycoin Direct’s focus is on security, speed and easy and user-friendly trading. Anycoin Direct allows users to purchase any type of digital currency within 5 minutes. After the user has made a purchase and instructed payment, the coins are credited to the specified account (wallet) immediately upon receipt of payment.” The following payment methods for crypto trader are available on Anycoin Direct: Giropay, Sofort- und SEPA-Überweisung (Germany) iDEAL (Netherlands) EPS (Austria) or Bancontact (Belgium) If you have any questions about the crypto trader purchase process or suggestions in the meantime, live support is available to all users here: https://www.geldplus.net/en/crypto-trader-review/. A detailed tutorial for the purchase of Bitcoin on Anycoin can be found here. About Anycoin Direct Anycoin Direct was founded on 01.07.2014 by Bram Celeen (Customer Support & Administration), Lennert Vlemmings (Security & Business Relations) and Julian van der Wijst (Programmer) and initially operated for one year under the name Bitplaats exclusively in the Netherlands and Belgium. But just as quickly as Bitcoin was spreading in Europe, the young company also wanted to grow and expand. So it was time for a new coat of paint – Bitplaats became Anycoin Direct and today every citizen in the Single Euro Payment Area (SEPA) can trade their digital currencies quickly and securely with Anycoin Direct. Anycoin Direct is an interesting European Bitcoin/Altcoin broker with great potential. Above all, we like the wide range of products, the fast checkout process, the friendly team and the easy trading very much. But convince yourselves right away. Since mid-May, the share price has been in a downward channel whose resistance was tested on 21 May but not breached. Support for this downward channel was tested on 23 and 29 May. Currently, the price is trying to test the resistance further and is dancing around the exponential moving average EMA50. The Ripple price fell this week Furthermore, the exponential moving average EMA50 represents a barrier for the price. Currently, the price is trying to test the resistance of the existing downward channel. Overall, the assessment according to the chart is rather bullish. The immediate support is at 0.45 Euro, the next resistance at 0.54 Euro. In mid-May, Ripple entered a previously stable downward channel. The price tried to overcome this channel twice, but so far the exponential moving average EMA50 has been confirmed as impenetrable resistance. Currently, the price is dancing around this EMA50 and is aiming for another test of the downlink channel. It remains to be seen whether the rebranding of the XRP logo and the associated differentiation between the company Ripple and the digital currency XRP will give the price wings. The MACD (second panel from above) is positive and rising: the MACD line (blue) is above the signal (orange). Regarding the MACD, the bullish divergence between MACD and price development that has been going on for weeks is also noticeable. The RSI is at 54 and thus bullish Overall, the situation is bullish according to the price, trend and indicators. Support and Resistance The first support level is 0.45 Euro and is described by the downward channel support. The next support level is 0.39 Euro on the same level as the plateau at the beginning of April. The first resistance at 0.54 Euro is described by the EMA100. If the price can break through this level, the next resistance of 0.60 Euro will be at the level of the maximum price reached on 21 May.
<!doctype linuxdoc system> <article> <title>Linux Meta-FAQ <author>Michael K. Johnson &lt;johnsonm@redhat.com&gt; <date>v4.7, 25 October 1997 <abstract> This is the Meta-FAQ for Linux. It is mainly a list of valuable sources of information. Check these sources out if you want to learn more about Linux, or have problems and need help. </abstract> <sect>Introduction <p><descrip> <tag/What is Linux?/ Linux is an independent implementation of the POSIX operating system specification, with SYSV and BSD extensions, that has been written entirely from scratch (this means it looks and acts just like Unix). It has no proprietary code in it. Linux is freely distributable under the GNU General Public License. Linux works on IBM PC compatibles with an ISA or EISA bus (including local bus variants VLB and PCI) and a 386 or higher processor. Some Amiga and Atari computers with MMU's are also supported. This means 68020 with an external MMU, 68030, 68040, or 68060. Support for the Digital Alpha is now stable. Red Hat and Craftworks have Alpha distributions of Linux. Support for Sparc is stable, and Red Hat Linux is available for Sparc. Support for PowerPC is in development for multiple platforms, including Nubus and PCI Macintosh, Motorola Powerstack, IBM 830 and 850, and other platforms. Support for ARM, StrongARM, and MIPS is in various stages of completion, but don't hold your breath. Read comp.os.linux.announce instead. See the Linux INFO-SHEET for more technical information on these ports, and the Hardware Compatibility HOWTO for more exact hardware requirements. The Linux kernel is written by Linus Torvalds &lt;torvalds@transmeta.com&gt; and other volunteers. Most of the programs running under Linux are generic Unix freeware, many of them from the GNU project. <tag/The Linux INFO-SHEET/ More specific technical information on Linux. Includes pointers to information on the various ports, a feature list, information about how to get Linux, and more. <tag/The Linux HOWTO's/ These are somewhat like FAQ's, but instead of answering common questions, they explain how to do common tasks, like ordering a release of Linux, setting up print services under Linux, setting up a basic UUCP feed, etc. See <url url="http://sunsite.unc.edu/LDP/HOWTO/HOWTO-INDEX.html"> or <url url="ftp://sunsite.unc.edu/pub/Linux/docs/HOWTO/"> for the definitive versions of all the HOWTO's. Other sites with up-to-date copies of the HOWTOs are ftp.cc.gatech.edu and tsx-11.mit.edu. In addition, there are many short, free-form documents called "mini-HOWTOs". These documents cover very specific subjects, such as BogoMIPS or Color-ls. These are available at <url url="ftp://sunsite.unc.edu/pub/Linux/docs/HOWTO/mini/"> and at <url url="http://sunsite.unc.edu/LDP/HOWTO/HOWTO-INDEX.html">. <tag/Linux newsgroups/ There are several Usenet newsgroups for Linux. It is a good idea to follow at least comp.os.linux.announce if you use Linux. comp.os.linux.announce is moderated by Lars Wirzenius. To make submissions to the newsgroup, send mail to linux-announce@news.ornl.gov. You may direct questions about comp.os.linux.announce to Lars Wirzenius &lt;wirzeniu@iki.fi&gt; The newsgroup comp.os.linux.announce is a moderated newsgroup for announcements about Linux (new programs, bug fixes, etc). The newsgroup comp.os.linux.answers is a moderated newsgroup to which the Linux FAQ, HOWTO documents, and other documentation postings are made. The newsgroup comp.os.linux.setup is an unmoderated newsgroup for discussion of issues and problems involved in setting up Linux systems. The newsgroup comp.os.linux.admin is an unmoderated newsgroup for discussion of administration of Linux systems. The newsgroup comp.os.linux.development.system is an unmoderated newsgroup specifically for discussion of Linux <bf/kernel/ development. The only application development questions that should be discussed here are those that are intimately associated with the kernel. All other development questions are probably generic Unix development questions and should be directed to a comp.unix group instead, unless they are very Linux-specific applications questions, in which case they should be directed at comp.os.linux.development.apps. The newsgroup comp.os.linux.development.apps is an unmoderated newsgroup specifically for discussion of Linux-related applications development. It is not for discussion of where to get applications for Linux, nor a discussion forum for those who would like to see applications for Linux. The newsgroup comp.os.linux.hardware is for Linux-specific hardware questions. The newsgroup comp.os.linux.networking is for Linux-specific networking development and setup questions. The newsgroup comp.os.linux.x is for Linux-specific X Windows questions. The newsgroup comp.os.linux.misc is an unmoderated newsgroup for any Linux discussion that doesn't belong anywhere else. In general, <bf/do not/ crosspost between the Linux newsgroups. The <bf/only/ crossposting that is appropriate is an occasional posting between one unmoderated group and comp.os.linux.announce. The whole point of splitting the old comp.os.linux group into many groups was to reduce traffic in each. Those that do not follow this rule will be flamed without mercy... <tag/Other newsgroups/ Do not assume that all your questions are appropriate for a Linux newsgroup just because you are running Linux. Is your question really about shell programming under any unix or unix clone? Then ask in comp.unix.shell. Is it about GNU Emacs? Then try asking in gnu.emacs.help. Also, if you don't know another group to ask in, but think there might be, politely ask in your post if there is another group that would be more appropriate for your question. At least the groups comp.unix.{questions,shell,programming,bsd,admin} and comp.windows.x.i386unix should be useful for a Linux user. <tag/The World-Wide Web/ Greg Hankins &lt;gregh@cc.gatech.edu&gt; maintains the home WWW page for the Linux project. The URL is <url url="http://sunsite.unc.edu/LDP/"> <tag/Linux Journal/ A magazine called <em/Linux Journal/ was launched several years ago. It includes articles intended for almost all skill levels, and is intended to be helpful to all Linux users. Subscriptions are &dollar;22 in the U.S., &dollar;27 in Canada and Mexico, and &dollar;32 elsewhere around the world, all payable in U.S. funds. Subscription inquiries can be sent via email to subs@ssc.com or faxed to (U.S.) 1-206-782-7191 or mailed to Linux Journal, PO Box 85867, Seattle, WA 98145-1867 USA. SSC has a PGP public key if you wish to send your credit card number via encrypted email: finger info@ssc.com <tag/The Linux Software Map/ Information on free software available for Linux can be found in the Linux Software Map, which can be found at <url url="http://www.execpc.com/~lsm/"> </descrip> <sect>Getting Linux <sect1>Linux FTP sites <p> A more complete list of Linux FTP sites is in the Linux INFO-SHEET, which can always be found at <url url="http://sunsite.unc.edu/LDP/HOWTO/INFO-SHEET.html"> The most important sites are listed here; please see the INFO-SHEET for a site nearer to you (there are many mirrors). <!-- \noindent\begin{tabular}{lll} {\bf Textual name} & {\bf Numeric address} & {\bf Linux directory} \\\hline tsx-11.mit.edu & 18.86.0.44 & /pub/linux \\ sunsite.unc.edu & 152.2.22.81 & /pub/Linux \\ ftp.kernel.org & 206.184.214.34 & /pub/linux \\ \end{tabular} --> <tscreen><verb> textual name numeric addr Linux directory ======================= ============== =============== tsx-11.mit.edu 18.86.0.44 /pub/linux sunsite.unc.edu 152.2.22.81 /pub/Linux ftp.kernel.org 206.184.214.34 /pub/linux </verb></tscreen> These sites are the main ``home'' sites for Linux where most uploads take place. There are many mirror sites; please use the closest (network-wise) site to you. <sect1>Linux on physical media <p> Linux is distributed on physical media, mainly CD-ROM, by several commercial vendors. Please read the distribution HOWTO, posted regularily to comp.os.linux.announce, and available at <url url="http://sunsite.unc.edu/LDP/HOWTO/Distribution-HOWTO.html"> <sect1>AFS <p> Linux is available over AFS by mounting the volume project.linux from sipb.mit.edu <sect1>Commercial networks <p> Compu&dollar;erve has some Linux archives. <sect1>Mailservers and such <p> Sunsite offers ftp-mail service --- mail &lt;ftpmail@sunsite.unc.edu&gt;. <sect>Linux distributions <p> Linux is distributed by its author only as a kernel. Other people have put together ``distributions'' that pair the Linux kernel with utilities and application software to make a complete working package. There are several distributions of Linux, which are available at various sites. Sunsite mirrors many of the distributions at <url url="ftp://sunsite.unc.edu/pub/Linux/distributions/">. The most commonly-recommended freely-available distributions are Red Hat <url url="http://www.redhat.com"> and Debian <url url="http://www.debian.org">. These are available for free over the internet, and are also sold on CD-ROM. There are other distributions of Linux as well. Most commercial distributors of Linux advertise in <em/Linux Journal/. <sect>Linux mailing-lists <p> Used mostly for discussion between developers of new features and testers of pre-release versions. See addresses in the FAQ. Send mail to majordomo@vger.rutgers.edu with the single word <tt/help/ in the body of the message , and you will get mail explaining how to subscribe to the many Linux mailing lists there. Save this mail, as it tells you how to unsubscribe from the lists, and if you post annoying messages to the list complaining about not being able to get off the list (because you didn't follow instructions and save the mail telling you how to unsubscribe), you will likely be flamed for wasting international bandwidth and money. <sect>Documentation for various programs <p> Many programs come with some sort of documentation, often in a file called README or something similar. It is a VERY good idea to read them with care. It is boring to see (and answer) questions that are answered in the documentation. Most programs also have ``man pages''; use the command <tt/man programname/ to get documentation on a program named <tt/programname/. To get help using the man program, use <tt/man man/. Most distributions put other documentation about programs in the directory /usr/doc/; your distribution should include documentation on how to access that documentation. <sect>More Documentation <p> The Linux Documentation Project is working on a lot of documentation. Already, over 3000 pages of book-style documentation has been released to the general public, and another 2000 or so printed pages of man pages have also been released, with more to follow. Check <url url="http://sunsite.unc.edu/LDP/"> for documents written by the LDP. <sect>Keeping track of current releases <p> Important new releases, programs, and ports are usually announced in comp.os.linux.announce. <sect>This Document <p> The latest version of this document should always be available from <url url="http://sunsite.unc.edu/LDP/HOWTO/META-FAQ.html"> <sect>Legalese <p> Trademarks are owned by their owners. Satisfaction not guaranteed. No warranties about this document. Void where prohibited. The content of this document is placed in the public domain, but if you quote it, please be polite and attribute your source. Lars Wirzenius &lt;wirzeniu@iki.fi&gt; wrote the first version of this document; it is now maintained by Michael K. Johnson &lt;johnsonm@redhat.com&gt;. Mail me if you have any questions about this document. </article>
Absolute configuration of lippifoliane and africanane derivatives. The absolute configuration of naturally occurring lippifoliane derivatives isolated from the widely used plant Lippia integrifolia was assigned by analysis of the circular dichroism data in combination with density functional theory minimum energy molecular models of (1S,4R,6S,9S,10R)-lippifolian-1-ol-5-one (1), (4R,9S,10R)-lippifoli-1(6)-en-5-one (2), and (4S,9S,10R)-lippifoli-1(6)-en-4-ol-5-one (3) and application of the octant rule for saturated ketone 1 and the helicity rules for alpha,beta-unsaturated ketones 2 and 3. The results were reinforced by the anomalous dispersion effect observed in the X-ray diffraction analysis of (4S,9S,10R)-4,10,11-tribromo-10,11-seco-lippifoli-1(6)-en-5-one (4) prepared from 2. The biogenetic relationships between lippifolianes 1-3 and africanane derivatives 7-9 and 13 isolated from the same species, together with chiroptical data for africananes isolated from the Hepaticae family, complete a stereochemical scenario in relation to the absolute configuration of africananes from L. integrifolia.
Surgical Aspects of Recurrent Inguinal Hernia in Adults. Surgeons occasionally encounter a case of recurrent hernia in adult patients after the primary repair, and these cases are challenging to manage appropriately. This study was conducted to describe the clinical nature of recurrent inguinal hernia, compare the results of management, and identify the relationship between the specific risk factors and the occurrence of recurrent hernia. Retrospectively reviewed 58 patients who underwent the inguinal herniorrhaphy for recurrent hernia in a single institution. Analyzed clinical characteristics of recurrent hernia and tried to verify the relationship between smoking, obesity, and occurrence of recurrent hernia. Recurrent inguinal hernia was 13.5 per cent of all hernia repairs in the study period. Most of the recurrence was the first event (74.1%) and showed an interval to recurrence with a mean duration of 40.7 months. There was no significant difference in procedure time, development of postoperative complications, and duration of hospital stay according to the procedure. Compromise of smoker and overweight was significantly higher in the recurrent group (P < 0.05). Surgeons should be aware of the increased risk for recurrence in adult inguinal hernia patients when they smoke or are overweight (body mass index ≥ 25 kg/m2), also it needs to follow-up during the adequate period.
function _extends() { _extends = Object.assign || function (target) { for (var i = 1; i < arguments.length; i++) { var source = arguments[i]; for (var key in source) { if (Object.prototype.hasOwnProperty.call(source, key)) { target[key] = source[key]; } } } return target; }; return _extends.apply(this, arguments); } function _slicedToArray(arr, i) { return _arrayWithHoles(arr) || _iterableToArrayLimit(arr, i) || _unsupportedIterableToArray(arr, i) || _nonIterableRest(); } function _nonIterableRest() { throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method."); } function _unsupportedIterableToArray(o, minLen) { if (!o) return; if (typeof o === "string") return _arrayLikeToArray(o, minLen); var n = Object.prototype.toString.call(o).slice(8, -1); if (n === "Object" && o.constructor) n = o.constructor.name; if (n === "Map" || n === "Set") return Array.from(n); if (n === "Arguments" || /^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(n)) return _arrayLikeToArray(o, minLen); } function _arrayLikeToArray(arr, len) { if (len == null || len > arr.length) len = arr.length; for (var i = 0, arr2 = new Array(len); i < len; i++) { arr2[i] = arr[i]; } return arr2; } function _iterableToArrayLimit(arr, i) { if (typeof Symbol === "undefined" || !(Symbol.iterator in Object(arr))) return; var _arr = []; var _n = true; var _d = false; var _e = undefined; try { for (var _i = arr[Symbol.iterator](), _s; !(_n = (_s = _i.next()).done); _n = true) { _arr.push(_s.value); if (i && _arr.length === i) break; } } catch (err) { _d = true; _e = err; } finally { try { if (!_n && _i["return"] != null) _i["return"](); } finally { if (_d) throw _e; } } return _arr; } function _arrayWithHoles(arr) { if (Array.isArray(arr)) return arr; } import * as React from 'react'; import raf from 'raf'; import { useForm as useRcForm } from 'rc-field-form'; import scrollIntoView from 'scroll-into-view-if-needed'; /** * Always debounce error to avoid [error -> null -> error] blink */ export function useCacheErrors(errors, changeTrigger, directly) { var cacheRef = React.useRef({ errors: errors, visible: !!errors.length }); var _React$useState = React.useState({}), _React$useState2 = _slicedToArray(_React$useState, 2), forceUpdate = _React$useState2[1]; var update = function update() { var prevVisible = cacheRef.current.visible; var newVisible = !!errors.length; var prevErrors = cacheRef.current.errors; cacheRef.current.errors = errors; cacheRef.current.visible = newVisible; if (prevVisible !== newVisible) { changeTrigger(newVisible); } else if (prevErrors.length !== errors.length || prevErrors.some(function (prevErr, index) { return prevErr !== errors[index]; })) { forceUpdate({}); } }; React.useEffect(function () { if (!directly) { var timeout = setTimeout(update, 10); return function () { return clearTimeout(timeout); }; } }, [errors]); if (directly) { update(); } return [cacheRef.current.visible, cacheRef.current.errors]; } export function toArray(candidate) { if (candidate === undefined || candidate === false) return []; return Array.isArray(candidate) ? candidate : [candidate]; } export function getFieldId(namePath, formName) { if (!namePath.length) return undefined; var mergedId = namePath.join('_'); return formName ? "".concat(formName, "_").concat(mergedId) : mergedId; } export function useForm(form) { var _useRcForm = useRcForm(), _useRcForm2 = _slicedToArray(_useRcForm, 1), rcForm = _useRcForm2[0]; var wrapForm = React.useMemo(function () { return form || _extends(_extends({}, rcForm), { __INTERNAL__: {}, scrollToField: function scrollToField(name) { var options = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {}; var namePath = toArray(name); var fieldId = getFieldId(namePath, wrapForm.__INTERNAL__.name); var node = fieldId ? document.getElementById(fieldId) : null; if (node) { scrollIntoView(node, _extends({ scrollMode: 'if-needed', block: 'nearest' }, options)); } } }); }, [form, rcForm]); return [wrapForm]; } export function useFrameState(defaultValue) { var _React$useState3 = React.useState(defaultValue), _React$useState4 = _slicedToArray(_React$useState3, 2), value = _React$useState4[0], setValue = _React$useState4[1]; var frameRef = React.useRef(null); var batchRef = React.useRef([]); var destroyRef = React.useRef(false); React.useEffect(function () { return function () { destroyRef.current = true; raf.cancel(frameRef.current); }; }, []); function setFrameValue(updater) { if (destroyRef.current) { return; } if (frameRef.current === null) { batchRef.current = []; frameRef.current = raf(function () { frameRef.current = null; setValue(function (prevValue) { var current = prevValue; batchRef.current.forEach(function (func) { current = func(current); }); return current; }); }); } batchRef.current.push(updater); } return [value, setFrameValue]; }
Running Late to Work? It May Not Matter If you were a little late to the office this morning, you may not need to stress about it too much. A new study indicates a lot of bosses are so sure that employees are working and checking emails before they come in that clock-watching is swiftly becoming a thing of the past. In a study of 1,000 US and European workers, data-protection company Mozy found almost three-quarters of employers now give mobile devices like smartphones to their teams, which empower workers to get things done wherever they happen to be. As a result, 73 percent of bosses trust their people are working long before they get to the office, so coming in about a half-hour late doesn’t send anyone into a panic. What’s more, most of those managers let employees work at home about a quarter of the time. It’s probably just as well since a standard 9-5 routine is now often considered an antiquated novelty. The Mozy study also found that, thanks to remote access, most people start checking their business email at 7:42 a.m., arrive at the office at 8:18 a.m. and leave at 5:48 p.m. — but they don’t actually disconnect from work fully until 7:19 p.m.
The Route to Infinity Price: $125 THE ROUTE TO INFINITY Technique 80 Lectures As L. Ron Hubbard explained, “Technique 80 is the To Be or Not To Be Technique.” With that, he unveiled the crucial foundation on which ability and sanity rest: the being’s capacity to make a decision. Here, then, is the anatomy of “maybe,” the Wavelengths of ARC, the Tone Scale of Decisions, and the means to rehabilitate a being’s ability To Be …almost anything.Read More buy $125 Quantity Language Free Shipping Currently eligible for free shipping. In Stock Ships within 24 hours Format: Compact Disc Lectures: 7 MORE ABOUT THE ROUTE TO INFINITY You actually control, command and create time. So as you go up the Tone Scale, you’re not asking for anything to survive against a span of time. You want something to be and to be does not include time. —L. Ron Hubbard What are the capabilities of a theta being? Just how powerful is a being who cannot die, who natively is not even a part of the physical universe? What forces, in the span of the whole track, could be responsible for bringing that vital being down to such a state that he would think he was a body? The year was 1952 and he moved from Wichita, Kansas, to Phoenix, Arizona, opening the first Office of L. Ron Hubbard. There, on the edge of the desert at the base of Camelback Mountain, he began the first instruction of Scientology at what was to be the center of Scientology activities for many years. Here was the nucleus of what would become the first worldwide organization, The Hubbard Association of Scientologists. The month was May and Mr. Hubbard had just completed his research with the first E-Meter, isolating and detailing the key incidents and implants on the whole track. And so came the need for and development of an auditing technique far in advance of previous procedures only addressing the current life. He released his discoveries in what were quite literally open-air lectures, given nightly amid the orange groves, providing the most highly advanced procedure to date: Technique 80. Rather than looking through all the tangle and confusion in the preclear’s bank, L. Ron Hubbard had discovered a new approach: “Technique 80 is the practice of beingness on each dynamic successively, and the practice of beingness on a dynamic until you can be that whole dynamic.” In these lectures, he bridges the gap between the current scene and the ideal. Prepare yourself for an expansion of causative beingness across all of your dynamics. Technique 80 is your route to infinity. In the accompanying guide you will find diagrams, scales and even the Dianetic Jingles given to students by Mr. Hubbard during the concluding lecture and of which he later wrote: “If you can decipher these, you’ll know everything there is to know.”
Aging Strikes the Self-Face Advantage in Featural Processing. Background/Study Context: The face is the most distinctive physical feature of a person. Previous work has shown that one's own face (self-face) is advantageous in perception. Here the authors investigate how aging influences the configural and featural processing of self-face. Older and young adults searched for their own faces and faces of strangers (Experiment 1) or acquaintances (Experiment 2) among distractor faces. The configural and featural processing of faces was assessed with face inversion in Experiment 1 and with changes in point of view in Experiment 2. Experiment 1 revealed a robust self-face advantage for upright faces in both young and older adults. A similar advantage was observed for inverted faces in young but not in older adults. Experiment 2 revealed a self-face advantage in older adults regardless of the point of view; in young adults, however, the self-face advantage only emerged for frontal view faces. The present study shows that older adults have a self-face advantage in configural but not in featural processing. The authors suggest that the impairment in featural processing in older adults is likely the result of age-related changes in perceptual experience.
Deception Inside Deception: The Alleged Sarin Gas Attack Seymour Hersh, America’s most famous investigative reporter, has become persona non grata in the American Propaganda Ministry that poses as a news media but only serves to protect the US government’s war lies. Among his many triumphs Hersh exposed the American My Lai massacre in Vietnam and the Abu Ghraib torture prison run by the Americans in Iraq. Today his investigative reports have to be published in the London Review of Books or in the German Media. From Hersh’s latest investigative report, we learn that President Trump makes war decisions by watching staged propaganda on TV. The White Helmets, a propaganda organization for jihadists and the “Syrian opposition,” found a gullible reception from the Western media for photographs and videos of alleged victims of a Syrian Army sarin gas attack on civilians in Khan Sheikhoun. Trump saw the photos on TV and despite being assured by US intelligence that there was no Syrian sarin gas attack, ordered the US military to strike a Syrian base with Tomahawk missiles. Under international law this strike was a war crime, and it was the first direct aggression against Syria by the US which previously committed aggression via proxies called “the Syrian opposition.” Reporting on his sources, Hersh writes: “In a series of interviews, I learned of the total disconnect between the president and many of his military advisers and intelligence officials, as well as officers on the ground in the region who had an entirely different understanding of the nature of Syria’s attack on Khan Sheikhoun. I was provided with evidence of that disconnect, in the form of transcripts of real-time communications, immediately following the Syrian attack on April 4.” The belief that sarin gas was involved in the attack comes from what appears to be a gas cloud. Hersh was informed by US military experts that sarin is oderless and invisible and makes no cloud. What appears to have happened is that the explosion from the air attack on ISIS caused a series of secondary explosions that produced a toxic cloud formed by fertilizers and chlorine disinfectants that were stored in the building that was hit. US officials spoke with Hersh, because they are distrubed that President Trump based a war decision on TV propaganda and refused to listen to the detailed counter-assessments of his intelligence and military services. A national security source told Hersh: “Everyone close to him knows his proclivity for acting precipitously when he does not know the facts. He doesn’t read anything and has no real historical knowledge. He wants verbal briefings and photographs. He’s a risk-taker. He can accept the consequences of a bad decision in the business world; he will just lose money. But in our world, lives will be lost and there will be long-term damage to our national security if he guesses wrong. He was told we did not have evidence of Syrian involvement and yet Trump says: ‘Do it.”’ Concerns about Trump’s purely emotional reaction to TV propaganda persist. Hersh reports that a senior national security adviser told him: “The Salafists and jihadists got everything they wanted out of their hyped-up Syrian nerve gas ploy” (the flare up of tensions between Syria, Russia and America). The issue is, what if there’s another false flag sarin attack credited to hated Syria? Trump has upped the ante and painted himself into a corner with his decision to bomb. And do not think these guys are not planning the next faked attack. Trump will have no choice but to bomb again, and harder. He’s incapable of saying he made a mistake.” I do not doubt Sy Hersh’s integrity. I accept that he has accurately reported what he was told by US officials. My suspicions about this story do not have to do with Hersh. They have to do with what Hersh was told. Hersh’s report puts Trump in a very bad light, and it puts the military/security complex, which we know has been trying to destroy Trump, in a very good light. Moreover, the story strikes me as inconsistent with the subsequent attack on the Syrian fighter-bomber by the US military. If the Tomahawk attack on the Syrian base was unjustified, what justified downing a Syrian war plane? Did Trump order this attack as well? If not, who did? Why? If national security advisers gave Trump such excellent information about the alleged sarin gas attack, completely disproving any such attack, why was he given such bad advice about shooting down a Syrian war plane, or was it done outside of channels? The effect of the shootdown is to raise the chance of a confrontation with Russia, because Russia’s response apparently has been to declare a no-fly zone over the area of Russian and Syrian operations. How do we know that what Hersh was told was true? What if Trump was encouraged to order the Tomahawk strike as a way of interjecting the US directly into the conflict? Both the US and Israel have powerful reasons for wanting to overthrow Assad. However, ISIS, sent to do the job, has been defeated by Russia and Syria. Unless Washington can somehow get directly involved, the war is over. The story Hersh was given also serves to damn Trump while absolving the intelligence services. Trump takes the hit for injecting the US directly into the conflict. Hersh’s story reads well, but it easily could be a false story planted on him. I am not saying that the story is false, but unless we learn more, it could be. What we do know is that the story given to Hersh by national security officials is inconsistent with the June 26 White House announcement that the US has “identified potential preparations for another chemical attack by the Assad regime.” The White House does not have the capability to conduct its own foreign intelligence gathering. The White House is informed by the national security and intelligence agencies. In the story given to Hersh, these officials are emphatic that not only were chemical weapons removed from Syria, but also that Assad would not use them or be permitted by the Russians to use them even if he had them. Moreover, Hersh reports that he was told that Russia fully informed the US of the Syrian attack on ISIS in advance. The weapon was a guided bomb that Russia had suppied to Syria. Therefore, it could not have been a chemical weapon. As US national security officials made it clear to Hersh that they do not believe Syria did or would use any chemical weapons, what is the source for the White House’s announcement that preparations for another chemical attack by the Assad regime have been identified? Who lined up UN ambassador Nikki Haley and the UK Defence Minister Michael Fallon to be ready with statements in support of the White House announcement? Haley says: “Any further attacks done to the people of Syria will be blamed on Assad, but also on Russia & Iran who support him killing his own people.” Fallon says: “we will support” future US action in response to the use of chemical weapons in Syria. How clear does an orchestration have to be before people are capable of recognizing the orchestration? The intelligence agencies put out the story via Hersh that there were no chemical attacks, so what attacks is Niki Haley speaking about? A reasonable conclusion is that Washington’s plan to use ISIS to overthrow Syria and then start on Iran was derailed by Russian and Syrian military success against ISIS. The US then tried to partition Syria by occupying part of it, but were out-manuevered by the Russians and Syrians. This left direct US involvement as the only alternative to defeat. This direct US military involvement began with the US attack on the Syrian military base and was followed by shooting down a Syrian war plane. The next stage will be a US-staged false flag chemical attack or alleged chemical attack, and this false flag, as has already been announced, will be the excuse for larger scale US military action against Syria, which, unless the Russians abandon Syria, means conflict with Russia, Iran, and perhaps China.http://russia-insider.com/en/politics/us-military-put-alert-washington-waiting-excuse-attack-syria-russian-senator/ri20238
Tuesday’s Tumblr of the day: Animals talking in all caps If there’s one thing that guarantees a reblog on Tumblr it’s a post of a kitten or cute animals. You can’t not stop and stare at this cute panda, uh? On ANIMALS TALKING IN ALL CAPS, Justin Valmassoi, the creator, takes photos of animals and adds hilarious captions imagining the little animal in real life human situations.
Does permissive hypoxaemia during extracorporeal membrane oxygenation cause long-term neurological impairment?: A study in patients with H1N1-induced severe respiratory failure. The Extracorporeal Life Support Organisation accepts permissive hypoxaemia in adult patients during extracorporeal membrane oxygenation (ECMO). The neurological long-term outcome of this approach has not yet been studied. We investigated the prevalence of brain lesions and cognitive dysfunction in survivors from the Influenza A/H1N1 2009 pandemic treated with permissive hypoxaemia during ECMO for severe acute respiratory distress syndrome (ARDS). Our hypothesis was that this method is reasonable if tissue hypoxia is avoided. Long-term follow-up study after ECMO. Karolinska University Hospital, Sweden, from October 2012 to July 2013. Seven patients treated with ECMO for severe influenza A/H1N1-induced ARDS were studied 3.2 years after treatment. Blood lactate concentrations were used as a surrogate for tissue oxygenation. Neurocognitive outcome was studied with standardised cognitive tests and MRI of the brain. Cognitive functioning and hypoxic brain lesions after permissive hypoxaemia during ECMO. The observation period was the first 10 days of ECMO or the entire treatment period if shorter than 10 days. Eleven of 13 patients were still alive 3 years after ECMO. We were able to contact seven of these patients (mean age 31 years), who all agreed to participate in this study. Mean ± SD peripherally measured arterial saturation during the observation period was 79 ± 10%. Full-scale Intelligence Quotient was within one standard deviation or above from the mean of a healthy population in five patients, and was 1.5 SD below the mean in one patient. In one other patient, it could not be determined because of a lack of formal education. Memory functioning was normal in all patients. MRI showed no changes related to cerebral hypoxia. Permissive hypoxaemia during ECMO might not negatively affect long-term cognitive outcome if adequate organ perfusion is maintained. at Clinicaltrials.gov NCT01763060.
It is often desirable or necessary to input an energy beam at an angle to an optical axis of a focusing objective system. The reflected beam from the sample often needs to be collected. Since reflection occurs according to Snell's Law, the reflected energy must be collected at the same angle to the sample as the angle of incidence. In visual imaging systems, to accurately view detail of a sample plane without distortion, the viewing system must be situated near normal to the sample. These conditions dictate that the incident and the reflected beams co-exist in space such that they are co-axial or near co-axial. In order to separate these beams, a beam splitter is used. The most simple form of a beam splitter is a refractive beam splitter employing a partially reflective mirror that redirects the beam at substantially a right angle into a focusing system and then to the sample which then transmits part of a reflected beam back through the focusing system, beam splitter and onto a detector. A beam splitter of this type is theoretically limited to an efficiency of 25% because half of the input beam is lost on the initial reflection and half of the remaining beam is lost when the beam is transmitted through the beam splitter. This type of beam splitter also may introduce chromatic aberrations into the reflected beam. The refractive beam splitter, however, has the advantage of having a very simple construction. Another means for splitting an input energy beam involves off-axis paraboloids, ellipsoids or spherical mirrors. These off-axis systems have means for directing the beam to a focusing mirror which focuses the beam onto a sample. Energy reflected from the sample is focused by a second mirror and directed to a detector through whatever optical arrangement is chosen. These systems have the disadvantage of introducing substantial distortions of the visual image, a phenomenon that is particularly troublesome at high magnifications. Off-axis systems are also not suitable for applications where it is desirable to mask part of the image being sent to the detector. Finally, complex mirror arrangements may be created that illuminate the sample and recreate an undistorted image of the sample that may be used by a detector. These complex mirror arrangements, while producing an adequate optical path, involve considerable mechanical complexity and expense in manufacture. Moreover, complex systems involve complex problems of alignment of the optical components. Finally, these systems are generally not compact, making for a system that is cumbersome, complex and difficult to maintain in optical alignment. Present beam splitters generally do not provide an economical and accurate method of redirecting an image beam at an angle to the optical axis of an infrared microscopic imaging system. This problem is particularly acute in connection with obtaining infrared spectra of extremely small size samples where it is necessary to mask the image received by the detector.
To link to the entire object, paste this link in email, IM or documentTo embed the entire object, paste this HTML in websiteTo link to this page, paste this link in email, IM or documentTo embed this page, paste this HTML in website CONSTITUTION OF THE STATE OF TENNESSEE Whereas the people of the Territory of the United States, south of the river Ohio, having the right of admission into the General Government as a Member State thereof, consistent with the constitution of the United States, and the act of cession of the State of North-Carolina, recognizing the Ordinance for the government of the territory of the United States north west of the river Ohio, by their delegates and representatives in convention assembled did on the sixth day of February in the year of our Lord One thousand seven hundred and ninety six, Ordain and establish a constitution or form of government, and mutually agreed with each other to form themselves into a free and independent State by the name of “The State of Tennessee; And whereas the General Assembly of said State of Tennessee pursuant to the third section of the tenth Article of the Constitution, by an act passed on the twenty seventh day of November in the year of our Lord one thousand eight hundred and thirty three entitled “An act to provide for the calling of a Convention” did authorize and provide for the election by the people of delegates and representatives, to meet at Nashville in Davidson County, on the third monday in May in the year of our Lord one thousand eight hundred and thirty four, for the purpose of revising and amending (or changing) the Constitution’: We therefore the Delegates and Representatives of the People of the State of Tennessee elected and in convention assembled, in pursuance of the said act of Assembly have ordained and established the following ----“Amended Constitution and form of government for this State which we recommend to the people of Tennessee for their ratification ---- That is to say Article 1st Declaration of rights. Section 1st That all power is inherent in the people, and all free governments are founded on their authority, and instituted for their peace, safety and happiness; for the advancement of those ends, they have at all times, an unalienable and indefeasible right to alter, reform, or abolish the government in such manner as they may think proper. Section 2nd That government being instituted for the common benefit, the doctrine of non-resistance against arbitrary power and oppression, is absurd, slavish, and destructive of the good and happiness of Mankind. of the good and happiness of Mankind. 3rd That all men have a natural and indefeasible right to worship Almighty God according to the dictates of their own conscience; that no man can, of right, be compelled to attend, erect or support any place of worship, or to maintain any minister against his consent; that no human authority can, in any case, whatever, control or interfere with the rights of conscience; And that no preference shall ever be given, by law, to any religious establishment or mode of worship. Sec. 4. That no religious test shall ever be required as a qualification to any office or public trust under this State. Sec. 5. That elections shall be free and equal. Sec. 6. That the right of trial by Jury shall remain inviolate. Sec. 7. That the people shall be secure in their persons, houses, papers and possessions, from unreasonable searches and seizures; and that general warrants, whereby an officer may be commanded to search suspected places, without evidence of the fact committed, or to seize any person or persons not named, whose offences are not particularly described and supported by evidence, are dangerous to liberty and ought not to be granted. Sec. 8. That no free man shall be taken, or imprisoned, or disseized of his freehold, liberties or privileges, or outlawed, or exiled, or in any manner destroyed, or deprived of his life, liberty, or property, but by the judgment of his peers, or the law of the land. Sec. 9. That in all criminal prosecutions, the accused hath a right to be heard by himself and his counsel; to demand the nature and cause of the accusation against him, and to have a copy thereof; to meet the witnesses face to face; to have compulsory process for obtaining witnesses in his favor; and in prosecutions by indictment, or presentment, a speedy public trial, by an impartial jury of the County or District in which the crime shall have been committed; and shall not be compelled to give evidence against himself. Sec. 10. That no person shall, for the same offence, be twice put in jeopardy of life or limb. Sec. 11. That laws made for the punishment of facts committed previous to the existence of such laws, and by them only declared criminal, are contrary to the principles of a free government; wherefore no ex post facto law shall be made. Sec. 12. That no conviction shall work corruption of blood or forfeiture of estate. The estate of such persons as shall destroy their own lives, shall descend or vest as in the case of natural death. If any person be Killed by Casualty, there shall be no forfeiture in consequence thereof. Sec. 13. That no person arrested or confined in jail, shall be treated with unnecessary rigor. Sec. 14. That no freeman shall be put to answer any criminal charge, but by presentment, indictment, or impeachment. Sec. 15. That all prisoners shall be bailable by sufficient surities, unless for capital offences, when the proof is evident, or the presumption great. And the privilege of the writ of habeas corpus shall not be suspended, unless when in case of rebellion or invasion, the public safety may require it. Sec. 16. That excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted. Sec. 17. That all courts shall be open; and every man, for an injury done him in his lands, goods, person or reputation, shall have remedy by due course of law, and right and justice administered without sale, denial, or delay. Suits may be brought against the State in such manner, and in such courts, as the Legislature may by law direct. Sec. 18. That the person of a debtor, where there is not strong presumption of fraud, shall not be continued in prison, after delivering up his estate for the benefit of his creditor or creditors, in such manner as shall be prescribed by law. Sec. 19. That the printing presses shall be free to every person who undertakes to examine the proceedings of the Legislature, or of any branch or officer of Government; and no law shall ever be made to restrain the right thereof. The free communication of thoughts and opinions, is one of the invaluable rights of man, and every citizen may freely speak, write, and print, on any subject, being responsible for the abuse of that liberty. But in prosecutions for the publication of papers, investigating the official conduct of officers or men in public capacity, the truth thereof may be given in evidence; and in all indictments for libels, the jury shall have a right to determine the law and the facts, under the direction of the Court, as in other criminal cases. Sec. 20. That no retrospective law, or law impairing the obligation of contracts, shall be made. Sec. 21. That no man’s particular services shall be demanded, or property taken, or applied to public use, without the consent of his representatives, or without just compensation being made therefor. Sec. 22. That perpetuities and monopolies are contrary to the genius of a free State, and shall not be allowed. Sec. 23. That the citizens have a right, in a peaceable manner, to assemble together, for their common good, to instruct their representatives, and to apply to those invested with the powers of government, for redress of grievances, or other proper purposes, by address or remonstrance. Sec. 24. That the sure and certain defence [i.e.defense] of a free people, is a well regulated Militia: And, as standing armies in time of peace are dangerous to freedom, they ought to be avoided, as far as the circumstances and safety of the community will admit; and that in all cases the military shall be Kept in strict subordination to the civil authority. Sec. 25. That no citizen of this State, except such as are employed in the Army of the United States, or Militia in actual service, shall be subjected to corporeal punishment under the martial law. Sec. 26. That the free white men of this State have a right to Keep and to bear arms for their common defence [i.e. defense]. Sec. 27. That no soldier shall in time of peace, be quartered in any house without the consent of the owner; nor in time of war, but in a manner prescribed by law. Sec. 28. That no citizen of this State shall be compelled to bear arms, provided he will pay an equivalent, to be ascertained by law. Sec. 29. That an equal participation of the free navigation of the Mississippi is one of the inherent rights of the citizens of this State: it cannot, therefore, be conceded to any prince, potentate, power, person or persons whatever. Sec. 30. That no hereditary emoluments, privileges, or honors, shall ever be granted or conferred in this State. CONSTITUTION OF THE STATE OF TENNESSEE Whereas the people of the Territory of the United States, south of the river Ohio, having the right of admission into the General Government as a Member State thereof, consistent with the constitution of the United States, and the act of cession of the State of North-Carolina, recognizing the Ordinance for the government of the territory of the United States north west of the river Ohio, by their delegates and representatives in convention assembled did on the sixth day of February in the year of our Lord One thousand seven hundred and ninety six, Ordain and establish a constitution or form of government, and mutually agreed with each other to form themselves into a free and independent State by the name of “The State of Tennessee; And whereas the General Assembly of said State of Tennessee pursuant to the third section of the tenth Article of the Constitution, by an act passed on the twenty seventh day of November in the year of our Lord one thousand eight hundred and thirty three entitled “An act to provide for the calling of a Convention” did authorize and provide for the election by the people of delegates and representatives, to meet at Nashville in Davidson County, on the third monday in May in the year of our Lord one thousand eight hundred and thirty four, for the purpose of revising and amending (or changing) the Constitution’: We therefore the Delegates and Representatives of the People of the State of Tennessee elected and in convention assembled, in pursuance of the said act of Assembly have ordained and established the following ----“Amended Constitution and form of government for this State which we recommend to the people of Tennessee for their ratification ---- That is to say Article 1st Declaration of rights. Section 1st That all power is inherent in the people, and all free governments are founded on their authority, and instituted for their peace, safety and happiness; for the advancement of those ends, they have at all times, an unalienable and indefeasible right to alter, reform, or abolish the government in such manner as they may think proper. Section 2nd That government being instituted for the common benefit, the doctrine of non-resistance against arbitrary power and oppression, is absurd, slavish, and destructive of the good and happiness of Mankind. of the good and happiness of Mankind. 3rd That all men have a natural and indefeasible right to worship Almighty God according to the dictates of their own conscience; that no man can, of right, be compelled to attend, erect or support any place of worship, or to maintain any minister against his consent; that no human authority can, in any case, whatever, control or interfere with the rights of conscience; And that no preference shall ever be given, by law, to any religious establishment or mode of worship. Sec. 4. That no religious test shall ever be required as a qualification to any office or public trust under this State. Sec. 5. That elections shall be free and equal. Sec. 6. That the right of trial by Jury shall remain inviolate. Sec. 7. That the people shall be secure in their persons, houses, papers and possessions, from unreasonable searches and seizures; and that general warrants, whereby an officer may be commanded to search suspected places, without evidence of the fact committed, or to seize any person or persons not named, whose offences are not particularly described and supported by evidence, are dangerous to liberty and ought not to be granted. Sec. 8. That no free man shall be taken, or imprisoned, or disseized of his freehold, liberties or privileges, or outlawed, or exiled, or in any manner destroyed, or deprived of his life, liberty, or property, but by the judgment of his peers, or the law of the land. Sec. 9. That in all criminal prosecutions, the accused hath a right to be heard by himself and his counsel; to demand the nature and cause of the accusation against him, and to have a copy thereof; to meet the witnesses face to face; to have compulsory process for obtaining witnesses in his favor; and in prosecutions by indictment, or presentment, a speedy public trial, by an impartial jury of the County or District in which the crime shall have been committed; and shall not be compelled to give evidence against himself. Sec. 10. That no person shall, for the same offence, be twice put in jeopardy of life or limb. Sec. 11. That laws made for the punishment of facts committed previous to the existence of such laws, and by them only declared criminal, are contrary to the principles of a free government; wherefore no ex post facto law shall be made. Sec. 12. That no conviction shall work corruption of blood or forfeiture of estate. The estate of such persons as shall destroy their own lives, shall descend or vest as in the case of natural death. If any person be Killed by Casualty, there shall be no forfeiture in consequence thereof. Sec. 13. That no person arrested or confined in jail, shall be treated with unnecessary rigor. Sec. 14. That no freeman shall be put to answer any criminal charge, but by presentment, indictment, or impeachment. Sec. 15. That all prisoners shall be bailable by sufficient surities, unless for capital offences, when the proof is evident, or the presumption great. And the privilege of the writ of habeas corpus shall not be suspended, unless when in case of rebellion or invasion, the public safety may require it. Sec. 16. That excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted. Sec. 17. That all courts shall be open; and every man, for an injury done him in his lands, goods, person or reputation, shall have remedy by due course of law, and right and justice administered without sale, denial, or delay. Suits may be brought against the State in such manner, and in such courts, as the Legislature may by law direct. Sec. 18. That the person of a debtor, where there is not strong presumption of fraud, shall not be continued in prison, after delivering up his estate for the benefit of his creditor or creditors, in such manner as shall be prescribed by law. Sec. 19. That the printing presses shall be free to every person who undertakes to examine the proceedings of the Legislature, or of any branch or officer of Government; and no law shall ever be made to restrain the right thereof. The free communication of thoughts and opinions, is one of the invaluable rights of man, and every citizen may freely speak, write, and print, on any subject, being responsible for the abuse of that liberty. But in prosecutions for the publication of papers, investigating the official conduct of officers or men in public capacity, the truth thereof may be given in evidence; and in all indictments for libels, the jury shall have a right to determine the law and the facts, under the direction of the Court, as in other criminal cases. Sec. 20. That no retrospective law, or law impairing the obligation of contracts, shall be made. Sec. 21. That no man’s particular services shall be demanded, or property taken, or applied to public use, without the consent of his representatives, or without just compensation being made therefor. Sec. 22. That perpetuities and monopolies are contrary to the genius of a free State, and shall not be allowed. Sec. 23. That the citizens have a right, in a peaceable manner, to assemble together, for their common good, to instruct their representatives, and to apply to those invested with the powers of government, for redress of grievances, or other proper purposes, by address or remonstrance. Sec. 24. That the sure and certain defence [i.e.defense] of a free people, is a well regulated Militia: And, as standing armies in time of peace are dangerous to freedom, they ought to be avoided, as far as the circumstances and safety of the community will admit; and that in all cases the military shall be Kept in strict subordination to the civil authority. Sec. 25. That no citizen of this State, except such as are employed in the Army of the United States, or Militia in actual service, shall be subjected to corporeal punishment under the martial law. Sec. 26. That the free white men of this State have a right to Keep and to bear arms for their common defence [i.e. defense]. Sec. 27. That no soldier shall in time of peace, be quartered in any house without the consent of the owner; nor in time of war, but in a manner prescribed by law. Sec. 28. That no citizen of this State shall be compelled to bear arms, provided he will pay an equivalent, to be ascertained by law. Sec. 29. That an equal participation of the free navigation of the Mississippi is one of the inherent rights of the citizens of this State: it cannot, therefore, be conceded to any prince, potentate, power, person or persons whatever. Sec. 30. That no hereditary emoluments, privileges, or honors, shall ever be granted or conferred in this State. Copyright While TSLA houses an item, it does not necessarily hold the copyright on the item, nor may it be able to determine if the item is still protected under current copyright law. Users are solely responsible for determining the existence of such instances and for obtaining any other permissions and paying associated fees that may be necessary for the intended use.
A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever. This invention relates generally to electronic appliance controls and, more particularly, to reconfigurable control systems for electronically controlled appliances. At least some known appliances include an electronic appliance control that is programmed by a manufacturer i.e., originally programmed. An appliance owner desiring to upgrade an electronic appliance control has had little choice but to replace the entire appliance. However, replacing the appliance in order to obtain the benefits of an upgraded electronic control and/or upgraded programming for the control is typically not cost effective. In one aspect, a method for changing a control program that controls at least some operations of an appliance is provided. The appliance includes at least one electronic control that executes the control program. The method includes connecting the electronic control to a communication device configured to communicate with at least one user device via a network. The method also includes changing the control program via the user device and the network. In another aspect, a method for operating an appliance controlled by a dedicated appliance controller interfacing with an appliance communication controller is provided. The appliance communication controller is configured to interpret and transmit control data for operating the appliance to the dedicated appliance controller. The appliance communication controller is connected to a modem. The method includes establishing a communication link with the appliance communication controller using the modem and supplying control data to the appliance communication controller using the communication link. In yet another aspect, a communication interface for operating an appliance controlled by a dedicated appliance controller is provided. The interface includes an appliance communication controller interfacing with the dedicated appliance controller and an external host controller interfacing with the appliance communication controller and configured to receive control data from an operator.
Monday, September 15, 2008 Have to hat-tip the Standard for this one, since it was one of their posts that gave me the idea for it. Not that I'm endorsing their post, mind you - as a partisan site for Labour, there's (always) too much spin in their analysis for my liking. For example, they list mentioning Helen Clark having no children as "dirty"campaigning, because it's nothing to do with her policies or political persona; well, that played OK only until Clark made Bradford's s59 bill a govt one by whipping her MPs to vote in favour. As soon as she decided she had the right to arrange my childrearing habits, her total lack of experience in the field became relevant to the argument. Anyway, that's a side issue. I read the post at the Standard and thought of the bleating taking place on right-wing blogs (eg, this one!) about the "smear" campaign against Sarah Palin, as compared to the supposed free ride Obama's had from the media. I think there's a useful example here of the difference between negative campaigning and smear campaigning. Negative campaigning is a standard and legitimate aspect of electoral contests. Apart from highlighting your own good points, there's value in highlighting your opponent's bad points. Of course, the bad points you highlight ought to be either a legitimate matter of opinion, or things you can back up with evidence. If you stray beyond those limits, you're into smear campaigning. So, let's have a look at the "smear" campaign currently running against Sarah Palin (the one supposedly being carried out by the biased, liberal media) and compare it to the one against Obama, which wasn't featured at all in the, clearly, blatantly biased liberal media. Against Palin: She's under investigation for trying to get a state trooper involved in a dispute with a member of her family sacked. She lied when she said she told Congress "thanks, but no thanks" for funding for the "bridge to nowhere." One of her first acts as mayor of Wasilla was to ask the Librarian the procedure for getting offensive books removed from the library. She claimed per diem travel expenses for nights spent at home. Far from being a fiscal conservative, she left Wasilla with large debts it didn't have when she took office. Against Obama: He's apparently a Muslim. (For those thinking "so what?", in Redneck-World this is right up there with "he's a pederast.") He supposedly has a background as an extremist. He may not even be American, as there's this bizarre story about his birth certificate being fake. Indeed it's true, the media have run with all the Palin "smears," but none of the Obama ones. Confirmed, then? Unspeakable media bias? Er, no. Have a look through those lists. The Palin one consists of actual events of the kind you expect the media to take an interest in. The Obama one consists of some infantile rumours peddled by the loony fringe of American right-wing bloggers, with nothing in the way of evidence to back them up. It would be astounding if the media did pursue any of them, and it's astounding Palin is still a candidate after the list she's piled up. How about feminists abusing Palin? Shouldn't they be giving credit to the Republicans for putting a woman on the ticket? Again, no - not really. Jessica Valenti explains why: Never mind that Palin talks about her teen daughter's decision to keep her child while awaiting the chance to take that choice away from American women. Don't worry about how Palin cut funding for a transitional home for teenage mothers. And forget that, under Palin's mayoralty, women in Wasilla, Alaska, were forced to pay for their own rape kits to the tune of up to $1,200. We're not supposed to care about these issues because - say Republicans - we should just be happy that there's a woman on the ticket. The McCain campaign is cynically trying to recreate the excitement that surrounded Hillary Clinton's candidacy, believing that all women want is ... another woman. Ungrateful or what? But the killer punch comes further down: ...the same people who moaned that women - those darn feminists, especially - were only supporting Hillary because of her gender are now screaming to the rafters because they're not supporting Palin for the same reason. That's what makes Republicans pulling the feminist card that much more insulting - the stunning hypocrisy. The McCain touting himself as the person who will put a woman in the White House is the same man who joked that Chelsea Clinton is "so ugly" because "her father is Janet Reno". Ouch. And you know what? Reading that crack about lezzos from McCain (and if you want to argue whether he actually made it, check the original 1998 story), who could not be put in mind of the constant shit sprayed by right-wingers about accused lezzos Clark and Simpson? Birds of a feather, alright. I see you conveniently left out Obama's connections to (and the deals he's profited from) dodgy developers. His record of getting opponents in Chicago politics disqualified rather than running against them, The large number of muslim supporters who are contributing to his campaign from overseas (illegal), his connection to a racist preacher and "mentor" which he only disavowed after it became widely publicised etc etc.There's plenty more.So you quote a few of the more outlandish slurs against Obama and carefully cherry-pick a few things about Palin which may have some substance. (Although two of those have been adequately anwsered in any case)This is a dishonest post PM. Watching the left in action reminds me of my first week-end in Australia. One of the locals bought a slab of Emu Bitter and invited me over to 'watch the Dings.' He had a family of Italian migrants living behind his place and their various antics provided the afternoon's entertainment - for free. Such is the left as it goes about that which it does best - losing unlosable elections. The facts of the matter are that the smears against Palin are false...There's no investigation, then? Who is that's subpoena'd Palin's husband to appear before it, in that case? The Anglican Synod, perhaps? If you're going to post lies on my comments thread, at least make them plausible lies. KG: yes, I missed all of those ones. You do realise, the fact you regard these kind of rumours as ugly leftist smear tactics when they're used against Palin kind of reduces their efficacy against Obama? As an example, "his connection to a racist preacher and "mentor" is basically a matter of opinion - it either bothers you or it doesn't. Just like Palin being a hick-town redneck with an oversupply of religious fervour either bothers you or it doesn't. It's a matter of personal opinion - "smear" tactics don't come into it. QUOTING YOU: "...they list mentioning Helen Clark having no children as "dirty" campaigning, because it's nothing to do with her policies or political persona anyway, that's a side issue." To the contrary, it's EVERYTHING to do with both her persona and her policies; childless by choice, rumoured to be gay, and absolutely on record as being opposed to marriage - all attitudes that have negatively infected (a word I use deliberately) the entire social fabric of this country, through their pernicious effects on government behaviour and legislation. And it's not a side issue, it's absolutely the central underlying polemic of the coming election, which can be summarised thus: are we going to continue with a nanny state run by a barren, humourless auntie figure, or are we going to MAN UP? PM, there is the little point that the usual accusation with regard to the Library books isn't that Palin asked about how to ban books, she is accused of banning books, burning them, and trying to burn the librarian (joke). Very few people ever get pilloried for asking about it first. In a different vein, the issue with the Trooper, he was accused of Tasering a 10 year old, a lot of people might have wanted to see him fired for that. The entire context is not quoted. For Obama, the "community Trust" he is fond of mentioning as an example of his experience, it is not mentioned in the MSM exactly what ACORN is involved in, like voter enrollment fraud, and other light hearted exercises in democracy. Face, we don't get an even handed approach, and this time around, despite the claims from the left, the Republicans are mostly on the receiving end of the "official" smears. Out in the blogosphere, its a free for all though. I've just been up north for the day, so feel a little tired.As on of our bloggers, PM is free to say what he wants, and I enjoy and welcome his contributions, even when he is wrong or I disagree with them. I think PM has been reading too many leftist blogs for the dirt on Sarah Palin. There again, I read mny righty ones too. The taser story has been well exposed now. I tihnk Ed Snack covered it all. Ed Snack: bloggers are carrying out ugly, lying smear campaigns against both candidates, sure. However, the issues I'm addressing in this post are: 1. Bloggers can hardly bleat about a smear campaign against Palin if they've been busy participating in one against Obama. Stands to reason, doesn't it? 2. Right-wingers have promoted the view that the smears against Obama have been carried only by bloggers, but the mainstream media have been active participants in smear campaigns against Palin. I've only seen the mainstream media actual stories about Palin, and pointed that out.
/* * Copyright 2002-2012 the original author or authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * https://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.springframework.web.servlet; /** * Provides additional information about a View such as whether it * performs redirects. * * @author Rossen Stoyanchev * @since 3.1 */ public interface SmartView extends View { /** * Whether the view performs a redirect. */ boolean isRedirectView(); }
1. Introduction {#sec1} =============== Natural products from plants, marine organisms, and microorganisms are important sources for discovery of new drug candidates and illustration for their exquisite biological activity.^[@ref1],[@ref2]^ 8-O-4′ neolignans are important natural products that showed antifungal,^[@ref3],[@ref4]^ anti-inflammatory,^[@ref5]^ antitumor,^[@ref6]^ antioxidant,^[@ref7]^ anti-HIV-1,^[@ref8]^ inhibitory of self-induced Aβ aggregation, and neuroprotective activities.^[@ref9]^ Naturally occurring 8-O-4′ neolignans have been isolated from *Myristica fragrans*,^[@ref10]^*Virola surinamensis*,^[@ref11]^*V. carinate*,^[@ref12]^*V. pavonis*,^[@ref13]^*Illicium difengpi*,^[@ref5]^ and *Crataegus pinnatifida*.^[@ref9]^ Due to the diverse bioactivity and limited sources for this kind of secondary metabolite from natural origin, a series of synthetic work for 8-O-4′ neolignans has been conducted.^[@ref3],[@ref7],[@ref14]^ In the progress of our project to discover novel antimicrobial agents from terrestrial plants, the EtOAc partition of *Clematis lasiandra* Maxim was studied. *C. lasiandra* is a perennial herbaceous plant distributed widely in the north and south slopes of Qin Mountains, Shaanxi province of China.^[@ref15]^ Our previous studies on the *n*-BuOH partition from 70% EtOH extract led to identification of four new cytotoxic triterpenoid saponins,^[@ref16]^ two new phenolic glycosides, and one new lignanoid glycoside.^[@ref17]^ Triterpenoid saponins and phenolic glycosides were cytotoxic constituents for this species, while lignanoid glycosides can be recognized as nontoxic agent, since they just showed weak cytotoxicity. Thus, we try to evaluate the isolated (±) 8-O-4′ neolignans (**1**--**6**) for their antibacterial activity. Herein, we report the experimental details for isolation and structural elucidation of four new (±) 8-O-4′ neolignans (**1**--**4**) and two known analogs (±) pinnatifidanin BV (**5**) and (±) pinnatifidanin BVI (**6**) ([Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}), as well as their antibacterial activity against three plant pathogenic bacteria *P. syringae* pv. *actinidiae*, *R. solanacearum,* and *E. carotovora*. ![Chemical structures of compounds 1--6 from *Clematis lasiandra*.](ao0c02339_0001){#fig1} 2. Results and Discussion {#sec2} ========================= Compound **1** was isolated as a yellow oil. The molecular formula of **1** was established as C~22~H~30~O~7~ based on the HRESIMS of its quasi-molecular ion at *m/z* 429.1869 \[M + Na\]^+^ (calcd for C~22~H~30~O~7~Na, 429.1889). The ^1^H NMR spectrum of **1** showed six aromatic proton signals at δ~H~ 6.91 (1H, d, *J* = 2.0 Hz), 6.70 (1H, d, *J* = 8.2 Hz), and 6.61 (1H, dd, *J* = 8.2, 2.0 Hz), along with δ~H~ 6.75 (1H, d, *J* = 2.0 Hz), 6.73 (1H, d, *J* = 8.0 Hz), and 6.79 (1H, dd, *J* = 8.0, 2.0 Hz), indicating two ABX system aromatic rings ([Table [1](#tbl1){ref-type="other"}](#tbl1){ref-type="other"}). A 1,2,3-propane-triol moiety and a 3-propanol moiety were established by the COSY correlations from H-8 \[δ~H~ 4.27 (1H, m)\] to H-7 \[δ~H~ 4.46 (1H, d, *J* = 6.4 Hz,)\] and H~2~--9 \[δ~H~ 3.82 (1H, m) and 3.84 (1H, m)\], together with correlations from H~2~--8′ \[δ~H~ 1.78 (2H, m)\] to H~2~--7′ \[δ~H~ 2.58 (2H, m)\] and H~2~--9′ \[δ~H~ 3.53 (2H, t, *J* = 6.5 Hz)\]. Additionally, an ethoxy group at δ~H~ 3.41 (2H, m, H~2~--1″) and 1.16 (3H, t, *J* = 7.0 Hz, H~3~--2″) attached to the aliphatic chain at C-7 (δ~C~ 81.9) and two methoxy group singlets at δ~H~ 3.78 (3H, s, 3-OCH~3~) and 3.75 (3H, s, 3′-OCH~3~) attached to the aromatic rings at C-3 (δ~C~ 148.9) and C-3′ (δ~C~ 151.8), respectively, were established by HMBC correlations of H~2~--1″/C-7, 3-OCH~3~/C-3, and 3′-OCH~3~/C-3′ ([Figure [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"}). The ^13^C NMR spectrum of **1** showed 22 carbon signals. Aside from one ethoxy and two methoxy groups, the remaining 18 carbons including 12 aromatic and six aliphatic carbons were attributed to two phenyl propanoid units on the basis of HMBC correlations from H-7 to C-2, C-6, C-8, and C-9 and from H~2~--7′ to C-2′, C-6′, C-8′, and C-9′. Moreover, the correlation of H-8 and C-4′ in its HMBC spectrum confirmed that the two phenyl propanoid units formed an 8-O-4′ system neolignan. ![Key ^1^H-^1^H COSY and HMBC correlations of compounds 1 and 3.](ao0c02339_0002){#fig2} ###### ^1^H NMR (500 MHz) and ^13^C NMR (125 MHz) Data of Compounds 1--4 in CD~3~OD[a](#t1fn1){ref-type="table-fn"}   **1** **2** **3** **4** ----------- ------- -------------------- ------- ------------------------- ------- --------------------- ------- -------------- 1 131.9   131.8   132.4   131.6   2 112.5 6.91 d (2.0) 112.3 6.97 d (1.9) 112.3 6.90 d (1.8) 112.2 6.89 d (1.8) 3 148.9   149.1   148.9   148.9   4 147.4   147.5   115.7 6.76 d (1.8) 115.7 6.76 d (1.8) 5 119.5 6.70 d (8.2) 119.4 6.92 d (8.0) 147.2   147.2   6 121.8 6.61 dd (8.2, 2.0) 121.5 6.82 dd (8.0, 1.9) 121.7 6.76 d (1.8) 121.8 6.76 d (1.8) 7 81.9 4.46 d (6.4) 82.6 4.53 d (5.9) 82.0 4.60 d (5.9) 83.9 4.49 d (5.8) 8 85.9 4.27 m 86.5 4.26 td (5.9, 5.9, 4.0) 86.8 4.15 m 86.8 4.15 m 9 62.3 3.82 m 62.4 3.63 dd (11.7, 4.0) 62.2 3.90 dd (12.1, 4.7) 62.2 3.88 m     3.84 m   3.42 m   3.65 m   3.63 m 1' 137.9   137.8   139.7   139.8   2' 114.2 6.75 d (2.0) 114.2 6.83 d (2.0) 107.1 6.50 brs 107.0 6.50 brs 3' 151.8   151.8   154.3   154.3   4' 147.3   148.2   135.0   135.1   5' 115.7 6.73 d (8.0) 116.0 6.77 d (8.1) 154.3   154.3   6' 122.1 6.79 dd (8.0, 2.0) 121.9 6.69 dd (8.1, 2.0) 107.1 6.50 brs 107.0 6.50 brs 7' 32.6 2.58 m 32.7 2.62 m 33.4 2.62 m 33.4 2.62 m 8' 35.5 1.78 m 35.5 1.81 m 35.4 1.82 m 35.4 1.82 m 9' 62.2 3.53 t (6.5) 62.3 3.56 t (6.5) 61.4 3.56 t (6.5) 61.3 3.56 t (6.5) 1" 65.4 3.41 m 65.7 3.42 m 65.6 3.43 m     2" 15.6 1.16 t (7.0) 15.6 1.13 t (7.0) 15.6 1.18 t (7.0)     3-OCH~3~ 56.4 3.78 s 56.5 3.82 s 56.5 3.83 s 56.4 3.83 s 7-OCH~3~             57.3 3.26 s 3'-OCH~3~ 56.5 3.75 s 56.6 3.83, s 56.6 3.75 s 56.6 3.76 s 5'-OCH~3~         56.6 3.75 s 56.6 3.76 s Assignments aided by HSQC, ^1^H-^1^H COSY, and HMBC experiments. For 8-O-4′ neolignans, the chemical shift difference between H-9a and H-9b (Δδ~H9a--H9b~) in CD~3~OD has been reported as an accurate and concise approach to determine the relative configuration of H-7 and H-8.^[@ref18]^ A small chemical shift difference of H-9a and H-9b (Δδ~H9a--H9b~ = 0.02) as shown in [Figure [3](#fig3){ref-type="fig"}](#fig3){ref-type="fig"} determined the *erythro* configuration of C-7 and C-8 for **1**. 8-O-4′ neolignans usually existed in the form of enantiomer mixtures because of their biosynthetic properties based on previous studies.^[@ref9],[@ref19]^ Compared with similar 8-O-4′ neolignans, the small optical rotation (−8.1) and subtle Cotton effects in the ECD spectrum demonstrated that **1** should be a mixture of enantiomers.^[@ref9],[@ref19]^ The attempt to purify the racemic mixtures by chiral HPLC was unsuccessful due to the limited amount of sample. Thus, compound **1** with an *erythro* configuration was elucidated and named as (±) lasiandranin A. ![Chemical shift differences of H-9a and H-9b for compounds 1--4 in CD~3~OD (red for *erythro*; blue for *threo*).](ao0c02339_0003){#fig3} Compound **2** displayed the same molecular formula of C~22~H~30~O~7~ based on the quasi-molecular ion peak at *m/z* 429.1895 \[M + Na\]^+^ (calcd for C~22~H~30~O~7~Na, 429.1889) in its positive HRESIMS. The NMR spectroscopic data were similar to those of **1**, suggesting that **2** was an isomer of **1**, and they shared the same planar skeleton. A significant chemical shift difference of H-9a and H-9b (Δδ~H9a--H9b~ = 0.21) demonstrated the *threo* configuration of C-7 and C-8 for **2** ([Figure [3](#fig3){ref-type="fig"}](#fig3){ref-type="fig"}). The small optical rotation (−4.1) and subtle Cotton effects in the ECD spectrum demonstrated that **2** should be a mixture of enantiomers.^[@ref9],[@ref19]^ Thus, the structure of **2** with a *threo* configuration was determined and named as (±) lasiandranin B. Compound **3** was obtained as a yellow oil. Its molecular formula was determined as C~23~H~32~O~8~ on the basis of a quasi-molecular ion peak at *m/z* 459.1973 \[M + Na\]^+^ (calcd for C~23~H~32~O~8~Na, 459.1995) in the positive HRESIMS. In the ^1^H NMR spectrum, compound **3** showed five aromatic protons at δ~H~ 6.90 (1H, d, *J* = 1.8 Hz), 6.76 (2H, d, *J* = 1.8 Hz), and 6.50 (2H, brs), revealing the presence of a 1,3,5-trisubstituted and 1,3,4,5-tetrasubstituted aromatic ring. A 1,2,3-propane-triol moiety and a 3-propanol moiety were established by COSY correlations from H-8 \[δ~H~ 4.15 (1H, m)\] to H-7 \[δ~H~ 4.60 (1H, d, *J* = 5.9 Hz)\] and H~2~--9 \[δ~H~ 3.90 (1H, d, *J* = 12.1, 4.7 Hz) and 3.65 (1H, m)\], along with correlations from H~2~--8′ \[δ~H~ 1.82 (2H, m)\] to H~2~--7′ \[δ~H~ 2.62 (2H, m)\] and H~2~--9′ \[δ~H~ 3.56 (2H, t, *J* = 6.5 Hz)\]. Furthermore, ethoxy group signals at δ~H~ 3.43 (2H, m, H~2~--1″) and 1.18 (3H, t, *J* = 7.0 Hz, H~3~--1″) attached to the aliphatic chain at C-7 (δ~C~ 82.0) and three methoxy group signals at δ~H~ 3.83 (3H, s, 3-OCH~3~) and 3.75 (6H, s, 3′/5′-OCH~3~) attached to the aromatic rings at C-3 (δ~C~ 148.9) and C-3′/C-5′ (δ~C~ 154.3) were established by HMBC correlations ([Figure [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"}). The ^13^C NMR spectrum of **3** showed 23 carbon signals. Except for one ethoxy and three methoxy groups, the remaining 18 carbons including 12 aromatic and six aliphatic carbons were attributed to two phenyl propanoid units on the basis of HMBC correlations from H-7 to C-2, C-6, C-8, and C-9, and from H~2~--7′ to C-2′, C-6′, C-8′, and C-9′. Moreover, the HMBC correlation from H-8 to C-4′ confirmed that the two phenyl propanoid units in **3** formed an 8-O-4′ neolignan. The *threo* relative configuration of **3** was deduced by its chemical shift difference of H-9a and H-9b (Δδ~H9a--H9b~ = 0.25). The small optical rotation (−2.9) and subtle Cotton effects in the ECD spectrum demonstrated that **3** should be a mixture of enantiomers.^[@ref9],[@ref19]^ Accordingly, the structure of **3** with a *threo* relative configuration was determined and named as (±) lasiandranin C. Compound **4** showed a molecular formula of C~22~H~30~O~8~ based on the quasi-molecular ion peak at *m/z* 445.1812 \[M + Na\]^+^ (calcd for C~22~H~30~O~8~Na, 445.1838) in its positive HRESIMS. The NMR spectral data of **4** were almost identical to those of **3**, except for one ethoxy group at C-7 that was replaced by a methoxy group. HMBC correlation from the methoxy group singlet at δ~H~ 3.26 (3H, s, 7-OCH~3~) to C-7 (δ~C~ 83.7) indicated the above deduction. The relative configuration of **4** was determined as *threo* based on the significant chemical shift difference of H-9a and H-9b (Δδ~H9a--H9b~ = 0.25). The similar optical rotation (−3.0) and subtle Cotton effects in the ECD spectrum demonstrated that **4** should be a mixture of enantiomers.^[@ref9],[@ref19]^ Thus, the structure of **4** with a *threo* relative configuration was determined and named as (±) lasiandranin D. The NMR data of **5** and **6** were similar to those of known compounds, pinnatifidanin BV and pinnatifidanin BVI, by comparison of their spectral data with the literature.^[@ref5]^ The chemical shift difference of H-9a and H-9b for **5** (Δδ~H9a--H9b~ = 0.02) and **6** (Δδ~H9a--H9b~ = 0.21) demonstrated that they possessed an *erythro* and *threo* relative configuration, respectively. Comparison of Cotton effects in the ECD spectra for compounds **1--6** demonstrated that **5** and **6** were also enantiomer mixtures. Thus, **5** with an *erythro* relative configuration of (±) pinnatifidanin BV and **6** with a *threo* relative configuration of (±) pinnatifidanin BVI were determined. Furthermore, the literature reported that the coupling constant of H-7 in CDCl~3~ (*J*~7,8~≤5.0 Hz for *erythro*, *J*~7,8~≥8.0 Hz for *threo*) could be used to determine the relative configuration of H-7 and H-8 for 8-O-4′ neolignans.^[@ref18]^ The ^1^H-NMR data were also measured in CDCl~3~ to verify the relative configuration of compounds **1--6** ([Table [2](#tbl2){ref-type="other"}](#tbl2){ref-type="other"}). Interestingly, there was no regulation and significant difference for their coupling constant of H-7 and H-8 (*J*~7,8~ ranges from 6.3 to 7.5 Hz) in CDCl~3~ due to the substitution of the methoxy or ethoxy group at C-7. Reconsideration of the coupling constant of H-7 and H-8 in CD~3~OD demonstrated that **1** and **5** were *erythro* configurations with *J*~7,8~ about 6.4 Hz, while **2--4** and **6** were *threo* configurations with *J*~7,8~ about 5.9 Hz. The above information confirmed that Δδ~H9a--H9b~ is an accurate way to determine the relative configuration of H-7 and H-8 for 8-O-4′ neolignans, while the coupling constant of H-7 should be used cautiously when methoxy or ethoxy groups are substituted at C-7 for 8-O-4′ neolignans. ###### Values of *J*~7,8~ (Hz) for Compounds 1--6 in CD~3~OD and CDCl~3~ solvents **1** **2** **3** **4** **5** **6** ---------- -------- -------- -------- -------- -------- -------- CD~3~OD d, 6.4 d, 5.9 d, 5.9 d, 5.8 d, 6.3 d, 5.9 CDCl~3~ d, 7.5 d, 7.3 d, 6.6 d, 6.3 d, 7.1 d, 7.4 Compounds **1**--**6** were evaluated for their in vitro antibacterial activity against three plant pathogenic bacteria *P. syringae* pv. *actinidiae*, *R. solanacearum,* and *E. carotovora* by agar and broth dilution methods. MIC was defined as the lowest concentration showing no visible bacterial growth after incubation time. The results of the MIC values are shown in [Table [3](#tbl3){ref-type="other"}](#tbl3){ref-type="other"}. Compounds **1**--**6** exhibited stronger antibacterial activity against *R. solanacearum* with the MIC values of 25--50 μg/mL, and they showed relatively lower activity against *P. syringae* pv. *actinidiae* with the MIC values of 50--100 μg/mL. However, they were inactive to *E. carotovora* with MIC values more than 200 μg/mL. The results indicated that the plant pathogenic bacterium *R. solanacearum* was the most sensitive species to be controlled by this series of compounds. Furthermore, compounds **1** and **5** characterized at the common *erythro* relative configuration showed stronger antibacterial activity against *R. solanacearum* and *P. syringae* pv. *actinidiae* than compounds **2**--**4** and **6** with the characterized *threo* relative configuration, indicating that *threo* configuration may be important for 8-O-4′ neolignans against plant pathogenic bacteria. However, opposite results verified that *threo* 8-O-4′ neolignans were considered to be more active than their *erythro* ones in their cytotoxic activities.^[@ref5]^ It is hard to determine which configuration is more important for their antifungal activities against different dermatophytes.^[@ref3]^ The above information demonstrated that bioactivity for 8-O-4′ neolignans may be related closely to their absolute configuration. ###### MIC Values (μg/mL) of Compounds 1--6 against Plant-Pathogenic Bacteria In Vitro strain **1** **2** **3** **4** **5** **6** streptomycin sulfate ----------------------------------------- ------- ------- ------- ------- ------- ------- ---------------------- *Pseudomonas syringae* pv. *actinidiae* 50 100 100 100 50 100 12.5 *Ralstonia solanacearum* 25 50 50 50 25 50 12.5 *Erwinia carotovora* \>200 \>200 \>200 \>200 \>200 \>200 200 3. Conclusions {#sec3} ============== In summary, four new 8-O-4′ neolignans with a methoxy or ethoxy group substituted at C-7, namely, (±) lasiandranins A--D (**1**--**4**), and two known ones (±) pinnatifidanin BV (**5**) and (±) pinnatifidanin BVI (**6**) were identified from the whole plants of *C. lasiandra*. These 8-O-4′ neolignans were evaluated for their antibacterial activity against three plant pathogenic bacteria *P. syringae* pv. *actinidiae*, *R. solanacearum,* and *E. carotovora* by agar and broth dilution methods. The antibacterial activity assay presented in this study indicated that compounds **1** and **5** could be potential to be developed as antibacterial agents to control plant pathogenic bacteria *R. solanacearum*. However, as 8-O-4′ neolignans were minimal constituents from *C. lasiandra*, systematic studies on secondary metabolites from the genus *Clematis* or a synthetic work for this type of neolignan should be considered for their source to control plant pathogenic bacteria. 4. Materials and Methods {#sec4} ======================== 4.1. General {#sec4.1} ------------ Specific rotations were measured with a Perkin-Elmer 343 polarimeter (PerkinElmer, Waltham, USA). UV and electronic circular dichroism (ECD) spectra were recorded on a ZF-2 spectrometer (Shanghai Anting Electrical Instrument Co. Ltd., Shanghai, China) and Jasco-J-715 spectropolarimeter (Jasco Europe S.R.L, Cremella, Italy), respectively. The HRESIMS spectra were obtained with a Thermo Fisher Scientific Q-TOF mass spectrometer (Thermo Fisher Scientific, Waltham, USA). 1D and 2D NMR spectral experiments were performed in CD~3~OD with a Bruker AVANCE-500 NMR spectrometer (Bruker BioSpin GmbH, Rheinstetten, Germany) with tetramethylsilane (TMS) as an internal standard. Separations and purifications were performed by column chromatography (CC) on silica gel H (10--40 μm, Qingdao Marine Chemical Inc., Qingdao, China) and a Sephadex LH-20 (GE Inc., USA). HPLC was carried out on a Shimadzu LC-10ATVP liquid chromatograph equipped with a SPD-10ADVP (UV-vis) detector (Shimadzu, Kyoto, Japan) at 206 nm using a YMC-Pack R&D ODS-A column (250 × 10 mm i.d., 5 μm, YMC Co., Ltd. Japan) for semi-preparation. TLC detection was achieved by spraying the silica gel plates (Qingdao Marine Chemical Inc., Qingdao, China) with 20% H~2~SO~4~ in EtOH followed by heating. 4.2. Plant Material {#sec4.2} ------------------- The whole plants of *Clematis lasiandra* Maxim were collected in the north of Qin Mountain, Shaanxi Province of China in September 2009 and were identified by Prof. Ji-Tao Wang from Shaanxi University of Chinese Medicine. A voucher specimen (No. 20090904) was deposited in the Department of Pharmacy, Xijing Hospital, Fourth Military Medical University, Xi′an, Shaanxi, PR China. 4.3. Extraction and Isolation {#sec4.3} ----------------------------- The air-dried whole plants of *C*. *lasiandra* (7.2 kg) were ground and then extracted with 70% EtOH (3 × 56 L) under reflux at room temperature. The concentrated EtOH extract (1.4 kg) was suspended in H~2~O and then partitioned successively with petroleum ether (3 × 6 L), EtOAc (3 × 6 L), and *n*-BuOH (5 × 6 L), respectively. The EtOAc extract (80.3 g) was separated into 16 fractions (Fr. A--P) on a silica gel column using a stepwise gradient elution of petroleum ether--EtOAc (100:1, 50:1, 30:1, 15:1, 10:1, 5:1, and 1:1) and then eluted with CHCl~3~--MeOH (1:1) to give Fr. Q. Fr. Q (4.7 g) was subjected to CC over a silica gel column using a step gradient elution of CHCl~3~--MeOH (10:1, 7:1, 5:1, 3:1, and 1:1) to give 11 subfractions (Fr. Q~1~ -- Fr. Q~11~). Fr. Q~2~ (342 mg) was eluted with CHCl~3~--MeOH (1:1) on the Sephadex LH-20 to remove pigments and then was further purified by semi-preparative HPLC using MeOH--H~2~O (40,60) as the mobile phase at a flow rate of 2.0 mL/min to afford compounds **1** (6.1 mg, *t*~R~ = 70.2 min), **2** (4.8 mg, *t*~R~ = 74.3 min), **3** (3.9 mg, *t*~R~ = 62.0 min), **4** (2.6 mg, *t*~R~ = 49.7 min), **5** (5.0 mg, *t*~R~ = 38.4 min), and **6** (2.7 mg, *t*~R~ = 40.5 min). ### 4.3.1. (±) Lasiandranin A (**1**) {#sec4.3.1} Yellow oil; \[*α*\]^25^~D~ -- 8.1 (*c* 0.06, MeOH); ECD (CH~3~OH): -- 0.9 (228 nm), + 1.0 (237); UV (CH~3~OH) λ~max~ (log ε): 206 (3.24) nm, 233 (1.12) nm, 282 (0.51) nm; ^1^H NMR (500 MHz, CD~3~OD) and ^13^C NMR (125 MHz, CD~3~OD) data see [Table [1](#tbl1){ref-type="other"}](#tbl1){ref-type="other"}; HRESIMS *m/z* 429.1869 \[M + Na\]^+^ (calcd for C~22~H~30~O~7~Na, 429.1889). ### 4.3.2. (±) Lasiandranin B (**2**) {#sec4.3.2} Yellow oil; \[*α*\]^25^~D~ -- 4.1 (*c* 0.08, MeOH); ECD (CH~3~OH): -- 0.4 (228 nm), + 0.9 (237 nm); UV (CH~3~OH) λ~max~ (log ε): 206 (3.12) nm, 234 (0.94) nm, 282 (0.47) nm; ^1^H NMR (500 MHz, CD~3~OD) and ^13^C NMR (125 MHz, CD~3~OD) data see [Table [1](#tbl1){ref-type="other"}](#tbl1){ref-type="other"}; HRESIMS *m/z* 429.1895 \[M + Na\]^+^ (calcd for C~22~H~30~O~7~Na, 429.1889). ### 4.3.3. (±) Lasiandranin C (**3**) {#sec4.3.3} Yellow oil; \[*α*\]^25^~D~ -- 2.9 (*c* 0.08, MeOH); ECD (CH~3~OH): -- 0.7 (228 nm), + 0.8 (237 nm); UV (CH~3~OH) λ~max~ (log ε): 203 (1.38) nm, 232 (0.35) nm, 282 (0.20) nm; ^1^H NMR (500 MHz, CD~3~OD) and ^13^C NMR (125 MHz, CD~3~OD) data see [Table [1](#tbl1){ref-type="other"}](#tbl1){ref-type="other"}; HRESIMS *m/z* 459.1973 \[M + Na\]^+^ (calcd for C~23~H~32~O~8~Na, 459.1995). ### 4.3.4. (±) Lasiandranin D (**4**) {#sec4.3.4} Yellow oil; \[*α*\]^25^~D~ -- 3.0 (*c* 0.06, MeOH); ECD (CH~3~OH): + 0.5 (228 nm); UV (CH~3~OH) λ~max~ (log ε): 206 (2.40) nm, 232 (0.61) nm, 282 (0.30) nm; ^1^H NMR (500 MHz, CD~3~OD) and ^13^C NMR (125 MHz, CD~3~OD) data see [Table [1](#tbl1){ref-type="other"}](#tbl1){ref-type="other"}; HRESIMS *m/z* 445.1812 \[M + Na\]^+^ (calcd for C~22~H~30~O~8~Na, 445.1838). 4.4. Microorganisms and Media {#sec4.4} ----------------------------- Microorganisms of *Pseudomonas syringae* pv. *actinidiae*, *Ralstonia solanacearum*, and *Erwinia carotovora* were provided by College of Plant Protection, Northwest A&F University. The nutrient agar (NA) medium was composed of pepton (10 g), beef extract (3 g), NaCl (5 g), agar (15 g), and distilled water (1 L). Luria--Bertani (LB) broth consisted of yeast (5 g), tryptone (10 g), NaCl (10 g), and distilled water (1 L). The cryopreserved strains were inoculated on a NA solid medium, cultivated at 37 °C for 24 h, and placed in a refrigerator at 0--4 °C for further use. A single colony was picked from the activated strain, inoculated into the LB broth medium, and cultured on a shaker with a speed of 200 r/min for 12 h at 37 °C. The obtained bacterial solution was diluted with a spectrophotometer to 1 × 10^5^--1 × 10^7^ CFU/mL for use. 4.5. Antibacterial Assays {#sec4.5} ------------------------- The antibacterial activities of the isolated compounds were evaluated with the agar and broth dilution methods.^[@ref20],[@ref21]^ The assays were carried out in 96-well microtiter plates. Compounds were dissolved in DMSO with the desired concentration of 40 mg/mL. Twofold serial dilutions of the compounds with the concentration ranging from 12.5 to 200 μg/mL were conducted by adding 2 μL of the test compounds to sterile 96-well plates containing 98 μL of inoculated LB medium with the density of the target bacteria of 1 × 10^6^ CFU/mL. The final concentration of DMSO in the assay did not exceed 1%. The agricultural streptomycin sulfate was used as positive control, and the drug-free solution was used as blank control. The microtiter plates were incubated at 30 °C, except for *P. syringae* pv. *actinidiae* at 25 °C, for 24 to 48 h. Iodonitrotetrazolium chloride (INT) was used as the staining agent for bacteria. Each treatment was replicated three times. The Supporting Information is available free of charge at [https://pubs.acs.org/doi/10.1021/acsomega.0c02339](https://pubs.acs.org/doi/10.1021/acsomega.0c02339?goto=supporting-info).HRESIMS, ^1^H NMR, ^13^C NMR, HSQC, HMBC, and COSY spectra in CD~3~OD of compounds **1--4**. ^1^H NMR and ^13^C NMR in CD~3~OD of compounds **5--6**. UV, ECD, and ^1^H NMR (CDCl~3~) spectra of compounds **1--6** ([PDF](http://pubs.acs.org/doi/suppl/10.1021/acsomega.0c02339/suppl_file/ao0c02339_si_001.pdf)) Supplementary Material ====================== ###### ao0c02339_si_001.pdf ^§^ N.H. and L.H. contributed equally. N.H. and L.H. performed the isolation and bioassay work with the help of Y.L., J.L., X.T., and D.K. X.T. designed the study and prepared the manuscript. All authors discussed the results and commented on the manuscript at all stages. The research work was financially supported by the National Key R&D Program of China (2017YFD0201105), the National Natural Science Foundation of China (31870331), and the Natural Science Foundation of Shaanxi Province, China (2017JM3015). The authors declare no competing financial interest. The authors thank Mr. Hongli Zhang and Ms. Luqi Li for measurement of NMR and HRESIMS, respectively.
Humphrey Visual Field The Humphrey visual field is a diagnostic test to measure visual fields, or perimetry. The Humphrey visual field test measures the entire area of peripheral vision that can be seen while the eye is focused on a central point. During this test, lights of varying intensities appear in different parts of the visual field while the patient's eye is focused on a certain spot. The perception of these lights is charted and then compared to results of a healthy eye at the same age of the patient to determine if any damage has occurred. This procedure is performed in about 20 minutes and is effective in diagnosing and monitoring glaucoma. Patients with glaucoma will undergo this test on a regular basis to determine the progress of the disease. The Humphrey visual field test can also be used to detect conditions within the optic nerve of the eye, and certain neurological conditions as well.
Outcome of a failed percutaneous transluminal dilation. One hundred and ninety-eight TLD failures have been analyzed from a total experience of 631 balloon dilations over the past five years. The clinical status of patients after a failure was generally the same as before the treatment. The morbidity was low and in no situation was limb loss directly attributable to the procedure. The early results of operation after a failure are similar to those found in patients who have not had a prior dilation. We conclude that TLD is a relatively safe procedure and may be considered as an alternative to surgical treatment in selected instances.
A water-soluble PEGylated RGD-functionalized bisbithiophenyl diketopyrrolopyrrole as a photoacoustic sonophore. Photoacoustic imaging presents an innocuous imaging modality with good penetration depth and resolution. To use this modality for detection and imaging of pathological sites, new imaging probes need to be developed to enhance the contrast over endogenous sonophores. These contrast agents should specifically bind to the site of interest, be non-toxic and be cleared renally if applied intravenously. Small organic dyes with absorption in the near infrared spectrum often exhibit good photoacoustic response. However, such dyes are often not water soluble or they are cytotoxic. Here, we present a novel PEGylated sonophore based on diketopyrrolopyrrole (DPP), which overcomes these limitations and can be functionalized with desired biological recognition motifs using thiol-yne click chemistry. Proof of concept is demonstrated by functionalizing the DPP-based probe with an RGD peptide, resulting in specific binding to endothelial (HUVEC) cells and an efficient photoacoustic response.
Intragastric infusion of rikkunshito (kampo) induces proximal stomach relaxation in conscious dogs. Abnormal proximal gastric relaxation is one of the causes of functional dyspepsia. The purpose of this study is to use a barostat in conscious dogs to determine the effects of rikkunshito, which is considered to have beneficial effects on functional dyspepsia, on the proximal stomach. Eight beagles were used. A gastrocutaneous fistula and force transducers were surgically implanted in the middle corpus and gastric antrum and duodenum, respectively. After a recovery period, a plastic bag was inserted through the gastrocutaneous fistula and the proximal stomach was distended using a barostat. First, four dogs were used to investigate the pressure-volume relation in the fasted and postprandial phases. Second, the stomachs of four different dogs were continuously distended at minimal distending pressure +2 mmHg, and 5 min later were infused with warmed liquid rikkunshito (2 g/20 mL) or water through the gastrocutaneous fistula. Finally, changes in the proximal gastric volume and gastrointestinal motility were observed. The proximal stomach was significantly more pliable in the postprandial phase than in the fasted phase. The proximal gastric volume increased immediately after liquid infusion under constant pressure in both phases and duodenal motility was accelerated. The effect of rikkunshito was significantly greater and lasted longer than that of water. No significant difference between the effects during the fasted or postprandial phase and no change in the gastric antrum motility were observed when rikkunshito was infused. These results indicate that rikkunshito accelerates duodenal motility and relaxes the proximal stomach.
2.Cream butter and brown sugar together until light and fluffy. Set aside. 3. Mix dry ingredients together in large bowl 4. Cut butter or lard into cubes and put in flour mixture. Cut into flour mixture using a pastry cutter until crumbly. Make a well in the middle of the bowl. 5. Slowly add milk 1/4 cup at a time. You may not need to use all the milk, please don't add it all at once! You want just enough liquid to hold the dough together. Once combined, knead the dough in the bowl a few times to ensure it's fully mixed. 6. Move the dough to floured counter or cutting board and roll out to 1/2 inch thickness, roughly a 10X10 inch square. Spread butter and sugar mixture evenly on dough - spreading right out to the edges. 7. Tightly roll the dough into a log and slice into 1 inch pieces. 8. Place a few inches apart from each other on a parchment lined baking tray and bake for 15-20 minutes. 9.While buns are baking prepare a second cookie sheet with parchment paper. Once buns are done baking, place second tray over the first and flip them over on the clean tray. Leave a Reply. Welcome To Bushel &A Peck! Hi, I'm Amy-Lyn! I am the lady behind this here blog! I live in the sticks with my animals, my super handsome husband, and my​ 3 amazing kids! Here you'll find things from recipes (gluten-free, paleo, and strait up junk food!), DIY ideas, thoughts on raising a son with autism, and whatever else pops into my brain! : ) Read more about me by clicking here!
Mechanisms of specific immunotherapy: current knowledge. Induction of specific unresponsiveness (tolerance) in peripheral T cells by IL-10 and/or TGF-beta and recovery by cytokines from the tissue microenvironment represent two key steps in specific immunotherapy of allergy and natural exposure to allergens in healthy individuals. IL-10 and TGF-beta elicit tolerance in T cells and thereby control the suppression and development of antigen-specific immunity. Both cytokines also play an important role on the generation of a non-inflammatory IgG4 and IgA type of allergen--specific antibodies during the course of specific immunotherapy. Histamine plays an important role in upper and lower airway inflammation. In addition to its well-characterized effects in the acute inflammatory and allergic responses, histamine regulates several aspects of antigen-specific immune response development. Histamine affects the maturation of dendritic cells and alters their T cell polarizing capacity. Histamine regulates antigen specific Th1 and Th2 cells as well as related antibody isotype responses. Histamine and four different known histamine receptors (HR) display a very complex system and their expression changes according to the stage of cell differentiation as well as microenvironmental influences.
Does anyone have an Emerson red badge for sale or better? Only the badge...NOT a Junior..Preferably the one with the pyramid.-I have a blue one to trade or whatever happens. The red one would fit better on my color choice for this complete refurbished Emerson. I forgot to say that it's a 16" fan with aluminum base and the bullet rear cover and the badge itself is 1 7/8-2" diameter. I updated to show a better representation of this model (The model# is under tape right now as paint cures). It was apparently used as a hammer or plow part as it was in shambles and I had to recreate, mold, and do minor home machining of several parts, so I could not preserve it as original. This is not my fan, but a borrowed image.Thanks for looking, anyway...
Laminates are made by coating sheets of paper with melamine-aldehyde resin and other sheets with phenol-aldehyde resin and drying and partially curing the sheets in ovens. Stacks are formed with a melamine-aldehyde treated overlay sheet on top, a melamine-aldehyde treated print sheet next, then typically about seven phenol-aldehyde treated sheets. The stacks are then cured under heat and pressure in a press at about 800 to 1200 psi to produce the laminate. The speed at which laminates can be made is largely determined by the amount of time required to cure the slowest-curing resin. Until now, the slowest-curing resin was the phenol-aldehyde resin. However, it has recently been discovered that water soluble carbonates and bicarbonates will accelerate the curing of phenol-aldehyde resins without adverse effects. A full description of the accelerated phenol-aldehyde resins is given in my copending application, Ser. No. 363,774, filed of even date, now U.S. Pat. No. 3,897,589, titled "Laminate Made With Accelerated Melamine-Aldehyde Resin And Accelerated Phenol-Aldehyde Resin And Method Of Making It," and incorporated herein by reference. Since the discovery of those accelerated phenol-aldehyde resins the melamine-aldehyde resin is now the slowest-curing resin. Efforts have been made to accelerate the curing of melamine-aldehyde resins, but many of the compounds which have accelerated the curing have also produced adverse side effects which render them unacceptable. These adverse side effects include sticking to the pressing plates, failure to pass a hot water-hot wax test, delamination during a 2 hour water boil test, lack of resin stability during storage, and various other effects.
Q: I want to use awk to delete every nth line starting at line 27 I have a large text file, it has a header that has 27 lines. I want to keep the header in the new file, but then on line 28 where the data starts I only want to keep every 10th line. So my new file will look just like my original file where it will include 27 lines of header, but instead of all of the data being there only every 10th line will be included in the new file. Ive been trying use 'awk', ive also tried 'sed' i can get it to give me every 10th line, but i can't get it to include the lines of header, i.e. start on line 28 and then give every 10th line A: Could you please try following. awk 'FNR<=27{print;next} ++count%10==0{print;count=""}' Input_file Or in case you want to make it more generic, so adding variables here, one could change variables values here and get as per need results too. awk -v lines_till_print="27" -v nth_line_print="10" ' FNR<=lines_till_print{ print next } ++count%nth_line_print==0{ print count="" } ' Input_file
Q: TFS2015 - Refresh work items after work item template change I'm using TFS 2015 Power Tools for Visual Studio 2015. I've added a new State to the work item workflow and updated the transitions accordingly. I can see that the workflow is updated for newly created items. But is it possible to update my existing work items with the new workflow? I have hundreds of work items and I want them to use the new workflow for them. A: Based on my test, the new workflow will also effect on the existing work items. Please note that the existing work items must be in the team project which you applied the new workflow and match the specific work item type. If the new State does not appear on the existing work items, then just try below items: Edit WIT in web portal: Refresh the web page Edit WIT in VS: Refresh on Team Explorer (Work Items Panel ) Restart the Visual Studio Then try it again.
Nottingham Forest Rumours Archive January 30 2011 30 Jan 2011 23:15:25 Nottingham Forest Rumours I am not a forest fan but follow them closely as I go to school in Nottingham and many of my friends are forest fans. I do have a connection with a senior forest executive but this has not come from him just thought I'd tell u fir future reference when I speak with him. However, I have just read that Paul konchesky may be on his way to forest on loan until the end of the season as a deal to fulham fell through due to fulham being unable to offload Carlos salcido. Like I said unfortunately no source other than the times but thought I'd let u guys know. Fred 30 Jan 2011 22:38:45 Nottingham Forest Rumours Heard Wilson is heading to us now, fee of £250,000, good luck to you Forrest, but your manager ain't good enough to follow in Cloughie's footsteps 30 Jan 2011 22:24:40 Nottingham Forest Rumours FACT my wife is prof thompsons secretary at qmc private clinic 2 slots been booked by forest monday for scans and blood tests also asked for 3rd appointment slot to be left open in case its required.All slots booked under mr arthur . Believable0Unbelievable0 30 Jan 2011 16:19:59 Nottingham Forest Rumours Just read a Times (from 2007) report saying that ND, since taking over the club in 1999, has pumped over £32m of his own money into the club. I'd guess that by now that number has probably risen to about £60. I know that he reduced the debt that Forest had from £25 to about £8 a few years back. No mean feat. I'm guessing as well that he probably gets TAX relief by using Nottingham Forest as loss making company. Personally, i wish he'd back Billy more in the transfer market as spending a few million more now will generate £££MM in the next few months, if we get promoted. 30 Jan 2011 15:59:16 Nottingham Forest Rumours "If Forest owed ND 26 million in may 2006. how come as of May 2010 Forest owe him 60 million. Is the club really running at such a loss.? Truth is ND is a money man and he sets his loan repayments above the bank of england base rate, for him Forest is not an investment. its an earner." What's the point of writing that crap? Two seconds of research will tell you it's rubbish. Forest have never paid ND a penny, even in wages. He loans the club money so that THEY don't need to pay tax on it. They are losing 4-5 million a year because they pay good wages to attract the sort of players who give them a chance of promotion. Why don't you take your whinging to Meadow lane or prideless park? At least there it would be justified. Believable0Unbelievable0 30 Jan 2011 14:22:39 Nottingham Forest Rumours The reason nffc owe ND all this money is simple really. imagine you go overdrawn at the bank. you then are charged interest. so every month you pay just the interest, without ever repaying your overdraft. but to pay the interest you actually loan the money from the bank. so the amount you owe gets more and more. Ya get me? Believable0Unbelievable0 30 Jan 2011 14:03:58 Nottingham Forest Rumours If Forest owed ND 26 million in may 2006. how come as of May 2010 Forest owe him 60 million. Is the club really running at such a loss.?? Truth is ND is a money man and he sets his loan repayments above the bank of england base rate, for him Forest is not an investment. its an earner. Believable0Unbelievable0 30 Jan 2011 13:53:33 Nottingham Forest Rumours Think the point the person was making is that footballers don't want an interview they want a cotract and signing on fee. glad your interview went well with MA. but there is no doubt he has contributed in the total mis-management of Forest, i know Shaun Derry and i know the interview story is true about him at least. The fact we have players running out of contract is nothing new, it has always happened with MA/ ND in charge. 30 Jan 2011 13:14:09 Nottingham Forest Rumours Think the point the person was making is that footballers don't want an interview they want a cotract and signing on fee. glad your interview went well with MA. but there is no doubt he has contributed in the total mis-management of Forest, i know Shaun Derry and i know the interview story is true about him at least. The fact we have players running out of contract is nothing new, it has always happened with MA/ ND in charge. Des Lyttle, Steve Chettle, Mark Crossley, Andy Gray, Riccy Scimeca, Believable0Unbelievable0 30 Jan 2011 09:21:53 Nottingham Forest Rumours I am not a fan of Mark Arthur and I have been interviewed by him. . About 7 years ago I went for a job in the commercial sales team and I was interviewd by Mark Athur. I can tell you, despite what people think of him, the interview was a pleasurable experience and he meerly seeks to know what you know about Forest. Are you going for the money, or do you have a burning ambition. With respect to ND, if you look at the accounts you'll see a 0% interest rate
Research Feed The total value of the U.S. tennis economy grew by 2.1 percent last year to a total of $6.19 billion, according to data from the Tennis Industry Association’s annual Economic Index, created to evaluate the total worth of the U.S. tennis industr...
This archived news story is available only for your personal, non-commercial use. Information in the story may be outdated or superseded by additional information. Reading or replaying the story in its archived form does not constitute a republication of the story. SALT LAKE CITY — Utah tourism ads use scenic views of slick rock and mountain lakes to lure visitors to the Beehive State from around the globe. Once here though, some are more amazed by what they see after the sun drops below the horizon. Goblin Valley and Dead Horse Point State Parks recently received certification as International Dark Sky Parks. They joined a growing list of spots in the state to receive the honor including Capitol Reef and Canyonlands National Parks, Natural Bridges and Hovenweep National Monuments and Weber County's North Fork Park. Now, many other state parks intend to follow suit. Fourteen more are under consideration by the International Dark Sky Association. Park managers see dark skies as a resource in need of protection. They consider the silvery, starry views a rare commodity which more scarce by the day. "It's so important to preserve these areas where you can still see these deep dark skies," said Justina Parsons-Bernstein, Recreation Interpretation Resource Manager for Utah State Parks and Recreation. International Dark Sky Association certification though isn't a sure thing. "Applications usually take two years," Parsons-Bernstein said. Parks seeking the honor not only have to show they have a lack of overbearing illumination, but they also need to work at educating visitors about the effects of light pollution and are encouraged to install downward-pointing light fixtures. In exchange, park staff hope to reap benefits in the form of increased stargazer tourism. "It will absolutely be a draw," Parsons-Bernstein said. "The more we get to be known as this giant dark sky preserve, you bet it will be a huge economic boom to the Utah tourism industry." In some ways, Utah is uniquely positioned to claim an identity as the country's dark sky capital. A mix of topography, weather and low population density play in the state's favor, especially when compared to other places in the eastern United States. "For the best views of night skies, you need to be high, dry and away from urban areas, " Parsons-Bernstein said. "How much of Utah does that describe? A lot of it." On Wednesday, a representative from the International Dark Sky Association paid a visit to five parks on the Wasatch Back. Dr. John Barentine wanted to see if Wasatch Mountain, Jordanelle, East Canyon, Rockport or Deer Creek State Park warrant inclusion on the organization's inventory of places with stellar nighttime views. Those parks all have to contend with glow from nearby cities, but Barentine said that doesn't necessarily disqualify them. Starry skies in the desert of southern Utah. Photo credit: Dave Cawley, KSL Newsradio "There's something very valuable about these urban-adjacent parks in that you have a large number of people in the Salt Lake City area who have ready access to all these state parks out here," Barentine said. "It's important that some of the dark sky parks be located within short distance of cities to maximize the number of people who can come and see what that's like." The goal, in the eyes of IDA, is to have people take those experiences back to their home communities. There, they can advocate for more intelligent use of outdoor lighting. Barentine admits it's an evolving field, in need of ongoing research. That's where partnerships with organizations like the National Park Service and Utah State Parks and Recreation come into play. "Trying to develop best practices with them to manage it just in the same way you'd manage a park for air and water quality," Barentine said. Utah has 43 state parks in total. Over a quarter of them are currently chasing dark sky certification. They include Fremont Indian, Steinaker, Red Fleet, Quail Creek, Gunlock, Coral Pink Sand Dunes and Gooseneck State Park, in addition to the parks on the Wasatch Back. Related Stories: Goblin Valley joins elite group of dark sky parks Goblin Valley State Park recently joined a prestigious group of outdoor recreational areas by being designated as an International Dark Sky Park. Barentine said the effort shows Utahns recognize the value of what they have, even if they live in the heart of the city. "The awareness here is better than it is in much of the rest of the country. It's connected to Utah's position in the West and I think just a more general appreciation of the outdoors and the value of nature," Barentine said. "It's a very different attitude than we encounter in the eastern U.S., for example." × Photos
Saturday, 20 February 2010 You know when you've been Tozered! There has been a lot of exciting stuff coming out of Canada over the last week with the Winter Olympics getting underway. However, you'll be hard pressed to find something more stirring than these paragraphs from A W Tozer, surely Canada's finest writer of the last generation. Tozer was churning out gold medal books when John Arnott & the Toronto Airport Vineyard church were still in short trousers! This week I picked up Tozer's classic 'Whatever Happened to Worship?' to supplement our own 21st Century Worshippers series. He still sounds such a fresh note in our generation & saves us from the self obsessesd deceit that we were the first to discover these timeless truths. 'It is true that a great number of us think that worship is something that we do when we go to church. We call it God's house. We have dedicated it to Him, so we continue with the confused idea that it must be the only place where we can worship Him. We come to the Lord's house made out of brick & wood & lined with carpeting. We are used to hearing the call to worship:'The Lord is in His Holy Temple - let us all kneel before Him.'''That is on Sunday & that is in church. Very nice! But Monday morning comes soon. The Christian layman goes to his office. The Christian teacher goes to the classroom. The Christian mother is busy with duties in the home. On Monday as we go about our different duties & tasks, are we aware of the presence of God?''The Lord desires still to be in His Holy Temple wherever we are. He wants the continuing love, delight & worship of His children, wherever we work. Is it not a beautiful thing for a businessman on a Monday morning to enter his office with an inner call to worship? 'The Lord is in my office - let all the world be silent before Him.'' Tozer manages to sum up in a few paragraphs the huge culture change that we are trying to walk through as the 21st Century Church: That we can worship in all of life, not just in our gathered communities; That we really do carry His presence with us wherever we go.Tozer saw 5 decades ago the kind of narrow Christianity that our compartmentalised & self centred lives would lead to - why not let him gently sting us back into line with a rebuke? 'If you cannot worship the Lord in the midst of your responsibilities on Monday, it is not very likely that you were worshipping Him on Sunday!' Ouch - You know when you've been Tozered!
Q: Cognito User Pool AuthorizerId cannot be set in API Gateway Cloudformation I successfully deployed a Cognito User Pool and used it to authenticate against a Method that I set up to proxy to my API in API gateway, and now I'm creating a Cloudformation template of the same stack. Using Cloudformation, I set up my API Gateway and the Authorizer that uses my User Pool. Works fine. when I try to deploy a Method that uses the Authorizer, it fails saying: Invalid authorizer ID specified. Setting the authorization type to CUSTOM or COGNITO_USER_POOLS requires a valid authorizer. This is the relevant part of the Cloudformation stack: TestMethod: Type: AWS::ApiGateway::Method Properties: RestApiId: !Ref RestApi ResourceId: !Ref TestResource HttpMethod: POST AuthorizationType: COGNITO_USER_POOLS AuthorizerId: !Ref ApiAuthorizer Integration: Type: HTTP_PROXY IntegrationHttpMethod: POST Uri: https://api.example.com/test ApiAuthorizer: Type: "AWS::ApiGateway::Authorizer" Properties: AuthorizerResultTtlInSeconds: 300 IdentitySource: method.request.header.Authorization Name: CognitoDefaultUserPoolAuthorizer ProviderARNs: - !ImportValue DefaultUserPool::Arn RestApiId: !Ref RestApi Type: "COGNITO_USER_POOLS" The Authorizer deploys fine and I can see its ID in Cloudformation, and the method deploys fine without authorisation added to it. The same problem happens if I state the ID directly instead of referencing the Authorizer. The Authorizer docs for Cloudformation say that a Ref! should return the ID, so I'm really puzzled as to what's going on here. Seems like a bug to me but maybe I'm missing something? A: AWS have fixed this now. It works as per my original posted example.
'use strict'; // startegies to get the list of apps to compare module.exports = { SIMILAR: 'similar', // listed as similar in google play COMPETITION: 'competition', // top apps of the targetted kws CATEGORY: 'category', // top apps of the category ARBITRARY: 'arbitrary', // based on an arbitrary list of app ids KEYWORDS: 'keywords', // based on a list of seed keywords SEARCH: 'search' // based on search suggestion keywords };
// Copyright 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. package org.chromium.components.find_in_page; import android.graphics.Rect; /** * Java equivalent to the C++ FindNotificationDetails class * defined in components/find_in_page/find_notification_details.h */ public class FindNotificationDetails { /** How many matches were found. */ public final int numberOfMatches; /** Where selection occurred (in renderer window coordinates). */ public final Rect rendererSelectionRect; /** * The ordinal of the currently selected match. * * Might be -1 even with matches in rare edge cases where the active match * has been removed from DOM by the time the active ordinals are processed. * This indicates we failed to locate and highlight the active match. */ public final int activeMatchOrdinal; /** Whether this is the last Find Result update for the request. */ public final boolean finalUpdate; public FindNotificationDetails(int numberOfMatches, Rect rendererSelectionRect, int activeMatchOrdinal, boolean finalUpdate) { this.numberOfMatches = numberOfMatches; this.rendererSelectionRect = rendererSelectionRect; this.activeMatchOrdinal = activeMatchOrdinal; this.finalUpdate = finalUpdate; } }
// Copyright 2014 The Flutter Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. // @dart = 2.8 import 'package:flutter/foundation.dart'; import 'package:flutter/material.dart'; import 'package:flutter/widgets.dart'; import 'package:flutter_test/flutter_test.dart'; void main() { test('Element diagnostics json includes widgetRuntimeType', () async { final Element element = _TestElement(); final Map<String, Object> json = element.toDiagnosticsNode().toJsonMap(const DiagnosticsSerializationDelegate()); expect(json['widgetRuntimeType'], 'Placeholder'); expect(json['stateful'], isFalse); }); test('StatefulElement diagnostics are stateful', () { final Element element = StatefulElement(const Tooltip(message: 'foo')); final Map<String, Object> json = element.toDiagnosticsNode().toJsonMap(const DiagnosticsSerializationDelegate()); expect(json['widgetRuntimeType'], 'Tooltip'); expect(json['stateful'], isTrue); }); group('Serialization', () { final TestTree testTree = TestTree( properties: <DiagnosticsNode>[ StringProperty('stringProperty1', 'value1', quoted: false), DoubleProperty('doubleProperty1', 42.5), DoubleProperty('roundedProperty', 1.0 / 3.0), StringProperty('DO_NOT_SHOW', 'DO_NOT_SHOW', level: DiagnosticLevel.hidden, quoted: false), DiagnosticsProperty<Object>('DO_NOT_SHOW_NULL', null, defaultValue: null), DiagnosticsProperty<Object>('nullProperty', null), StringProperty('node_type', '<root node>', showName: false, quoted: false), ], children: <TestTree>[ TestTree(name: 'node A'), TestTree( name: 'node B', properties: <DiagnosticsNode>[ StringProperty('p1', 'v1', quoted: false), StringProperty('p2', 'v2', quoted: false), ], children: <TestTree>[ TestTree(name: 'node B1'), TestTree( name: 'node B2', properties: <DiagnosticsNode>[StringProperty('property1', 'value1', quoted: false)], ), TestTree( name: 'node B3', properties: <DiagnosticsNode>[ StringProperty('node_type', '<leaf node>', showName: false, quoted: false), IntProperty('foo', 42), ], ), ], ), TestTree( name: 'node C', properties: <DiagnosticsNode>[ StringProperty('foo', 'multi\nline\nvalue!', quoted: false), ], ), ], ); test('default', () { final Map<String, Object> result = testTree.toDiagnosticsNode().toJsonMap(const DiagnosticsSerializationDelegate()); expect(result.containsKey('properties'), isFalse); expect(result.containsKey('children'), isFalse); }); test('subtreeDepth 1', () { final Map<String, Object> result = testTree.toDiagnosticsNode().toJsonMap(const DiagnosticsSerializationDelegate(subtreeDepth: 1)); expect(result.containsKey('properties'), isFalse); final List<Map<String, Object>> children = result['children'] as List<Map<String, Object>>; expect(children[0].containsKey('children'), isFalse); expect(children[1].containsKey('children'), isFalse); expect(children[2].containsKey('children'), isFalse); }); test('subtreeDepth 5', () { final Map<String, Object> result = testTree.toDiagnosticsNode().toJsonMap(const DiagnosticsSerializationDelegate(subtreeDepth: 5)); expect(result.containsKey('properties'), isFalse); final List<Map<String, Object>> children = result['children'] as List<Map<String, Object>>; expect(children[0]['children'], hasLength(0)); expect(children[1]['children'], hasLength(3)); expect(children[2]['children'], hasLength(0)); }); test('includeProperties', () { final Map<String, Object> result = testTree.toDiagnosticsNode().toJsonMap(const DiagnosticsSerializationDelegate(includeProperties: true)); expect(result.containsKey('children'), isFalse); expect(result['properties'], hasLength(7)); }); test('includeProperties with subtreedepth 1', () { final Map<String, Object> result = testTree.toDiagnosticsNode().toJsonMap(const DiagnosticsSerializationDelegate( includeProperties: true, subtreeDepth: 1, )); expect(result['properties'], hasLength(7)); final List<Map<String, Object>> children = result['children'] as List<Map<String, Object>>; expect(children, hasLength(3)); expect(children[0]['properties'], hasLength(0)); expect(children[1]['properties'], hasLength(2)); expect(children[2]['properties'], hasLength(1)); }); test('additionalNodeProperties', () { final Map<String, Object> result = testTree.toDiagnosticsNode().toJsonMap(const TestDiagnosticsSerializationDelegate( includeProperties: true, subtreeDepth: 1, additionalNodePropertiesMap: <String, Object>{ 'foo': true, }, )); expect(result['foo'], isTrue); final List<Map<String, Object>> properties = result['properties'] as List<Map<String, Object>>; expect(properties, hasLength(7)); expect(properties.every((Map<String, Object> property) => property['foo'] == true), isTrue); final List<Map<String, Object>> children = result['children'] as List<Map<String, Object>>; expect(children, hasLength(3)); expect(children.every((Map<String, Object> child) => child['foo'] == true), isTrue); }); test('filterProperties - sublist', () { final Map<String, Object> result = testTree.toDiagnosticsNode().toJsonMap(TestDiagnosticsSerializationDelegate( includeProperties: true, propertyFilter: (List<DiagnosticsNode> nodes, DiagnosticsNode owner) { return nodes.whereType<StringProperty>().toList(); }, )); final List<Map<String, Object>> properties = result['properties'] as List<Map<String, Object>>; expect(properties, hasLength(3)); expect(properties.every((Map<String, Object> property) => property['type'] == 'StringProperty'), isTrue); }); test('filterProperties - replace', () { bool replaced = false; final Map<String, Object> result = testTree.toDiagnosticsNode().toJsonMap(TestDiagnosticsSerializationDelegate( includeProperties: true, propertyFilter: (List<DiagnosticsNode> nodes, DiagnosticsNode owner) { if (replaced) { return nodes; } replaced = true; return <DiagnosticsNode>[ StringProperty('foo', 'bar'), ]; }, )); final List<Map<String, Object>> properties = result['properties'] as List<Map<String, Object>>; expect(properties, hasLength(1)); expect(properties.single['name'], 'foo'); }); test('filterChildren - sublist', () { final Map<String, Object> result = testTree.toDiagnosticsNode().toJsonMap(TestDiagnosticsSerializationDelegate( subtreeDepth: 1, childFilter: (List<DiagnosticsNode> nodes, DiagnosticsNode owner) { return nodes.where((DiagnosticsNode node) => node.getProperties().isEmpty).toList(); }, )); final List<Map<String, Object>> children = result['children'] as List<Map<String, Object>>; expect(children, hasLength(1)); }); test('filterChildren - replace', () { final Map<String, Object> result = testTree.toDiagnosticsNode().toJsonMap(TestDiagnosticsSerializationDelegate( subtreeDepth: 1, childFilter: (List<DiagnosticsNode> nodes, DiagnosticsNode owner) { return nodes.expand((DiagnosticsNode node) => node.getChildren()).toList(); }, )); final List<Map<String, Object>> children = result['children'] as List<Map<String, Object>>; expect(children, hasLength(3)); expect(children.first['name'], 'child node B1'); }); test('nodeTruncator', () { final Map<String, Object> result = testTree.toDiagnosticsNode().toJsonMap(TestDiagnosticsSerializationDelegate( subtreeDepth: 5, includeProperties: true, nodeTruncator: (List<DiagnosticsNode> nodes, DiagnosticsNode owner) { return nodes.take(2).toList(); }, )); final List<Map<String, Object>> children = result['children'] as List<Map<String, Object>>; expect(children, hasLength(3)); expect(children.last['truncated'], isTrue); final List<Map<String, Object>> properties = result['properties'] as List<Map<String, Object>>; expect(properties, hasLength(3)); expect(properties.last['truncated'], isTrue); }); test('delegateForAddingNodes', () { final Map<String, Object> result = testTree.toDiagnosticsNode().toJsonMap(TestDiagnosticsSerializationDelegate( subtreeDepth: 5, includeProperties: true, nodeDelegator: (DiagnosticsNode node, DiagnosticsSerializationDelegate delegate) { return delegate.copyWith(includeProperties: false); }, )); final List<Map<String, Object>> properties = result['properties'] as List<Map<String, Object>>; expect(properties, hasLength(7)); expect(properties.every((Map<String, Object> property) => !property.containsKey('properties')), isTrue); final List<Map<String, Object>> children = result['children'] as List<Map<String, Object>>; expect(children, hasLength(3)); expect(children.every((Map<String, Object> child) => !child.containsKey('properties')), isTrue); }); }); } class _TestElement extends Element { _TestElement() : super(const Placeholder()); @override void performRebuild() { // Intentionally left empty. } @override bool get debugDoingBuild => throw UnimplementedError(); } class TestTree extends Object with DiagnosticableTreeMixin { TestTree({ this.name, this.style, this.children = const <TestTree>[], this.properties = const <DiagnosticsNode>[], }); final String name; final List<TestTree> children; final List<DiagnosticsNode> properties; final DiagnosticsTreeStyle style; @override List<DiagnosticsNode> debugDescribeChildren() => <DiagnosticsNode>[ for (final TestTree child in children) child.toDiagnosticsNode( name: 'child ${child.name}', style: child.style, ), ]; @override void debugFillProperties(DiagnosticPropertiesBuilder properties) { super.debugFillProperties(properties); if (style != null) properties.defaultDiagnosticsTreeStyle = style; this.properties.forEach(properties.add); } } class TestDiagnosticsSerializationDelegate implements DiagnosticsSerializationDelegate { const TestDiagnosticsSerializationDelegate({ this.includeProperties = false, this.subtreeDepth = 0, this.additionalNodePropertiesMap = const <String, Object>{}, this.childFilter, this.propertyFilter, this.nodeTruncator, this.nodeDelegator, }); final Map<String, Object> additionalNodePropertiesMap; final List<DiagnosticsNode> Function(List<DiagnosticsNode> nodes, DiagnosticsNode owner) childFilter; final List<DiagnosticsNode> Function(List<DiagnosticsNode> nodes, DiagnosticsNode owner) propertyFilter; final List<DiagnosticsNode> Function(List<DiagnosticsNode> nodes, DiagnosticsNode owner) nodeTruncator; final DiagnosticsSerializationDelegate Function(DiagnosticsNode node, TestDiagnosticsSerializationDelegate delegate) nodeDelegator; @override Map<String, Object> additionalNodeProperties(DiagnosticsNode node) { return additionalNodePropertiesMap; } @override DiagnosticsSerializationDelegate delegateForNode(DiagnosticsNode node) { if (nodeDelegator != null) { return nodeDelegator(node, this); } return subtreeDepth > 0 ? copyWith(subtreeDepth: subtreeDepth - 1) : this; } @override bool get expandPropertyValues => false; @override List<DiagnosticsNode> filterChildren(List<DiagnosticsNode> nodes, DiagnosticsNode owner) { return childFilter != null ? childFilter(nodes, owner) : nodes; } @override List<DiagnosticsNode> filterProperties(List<DiagnosticsNode> nodes, DiagnosticsNode owner) { return propertyFilter != null ? propertyFilter(nodes, owner) : nodes; } @override final bool includeProperties; @override final int subtreeDepth; @override List<DiagnosticsNode> truncateNodesList(List<DiagnosticsNode> nodes, DiagnosticsNode owner) { return nodeTruncator != null ? nodeTruncator(nodes, owner) : nodes; } @override DiagnosticsSerializationDelegate copyWith({int subtreeDepth, bool includeProperties}) { return TestDiagnosticsSerializationDelegate( includeProperties: includeProperties ?? this.includeProperties, subtreeDepth: subtreeDepth ?? this.subtreeDepth, additionalNodePropertiesMap: additionalNodePropertiesMap, childFilter: childFilter, propertyFilter: propertyFilter, nodeTruncator: nodeTruncator, nodeDelegator: nodeDelegator, ); } }
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <meta charset="utf-8"> <title>Vuejs Video Conferencing using RTCMultiConnection</title> <meta name="viewport" content="width=device-width, initial-scale=1.0, minimum-scale=1.0"> <link rel="shortcut icon" href="/demos/logo.png"> <link rel="stylesheet" href="/demos/stylesheet.css"> <script src="/demos/menu.js"></script> </head> <body> <header> <a class="logo" href="/"><img src="/demos/logo.png" alt="RTCMultiConnection"></a> <a href="/" class="menu-explorer">Menu<img src="/demos/menu-icon.png" alt="Menu"></a> <nav> <li> <a href="/">Home</a> </li> <li> <a href="/demos/">Demos</a> </li> <li> <a href="https://www.rtcmulticonnection.org/docs/getting-started/">Getting Started</a> </li> <li> <a href="https://www.rtcmulticonnection.org/FAQ/">FAQ</a> </li> <li> <a href="https://www.youtube.com/playlist?list=PLPRQUXAnRydKdyun-vjKPMrySoow2N4tl">YouTube</a> </li> <li> <a href="https://github.com/muaz-khan/RTCMultiConnection/wiki">Wiki</a> </li> <li> <a href="https://github.com/muaz-khan/RTCMultiConnection">Github</a> </li> </nav> </header> <h1> Vuejs Video Conferencing using RTCMultiConnection <p class="no-mobile"> Multi-user (many-to-many) video chat using mesh networking model. </p> </h1> <section class="make-center"> <input type="text" id="room-id" value="abcdef" autocorrect=off autocapitalize=off size=20> <button id="open-room">Open Room</button> <button id="join-room">Join Room</button> <button id="open-or-join-room">Auto Open Or Join Room</button> <div id="vue-app"> <todo-item v-for="item in videosList" v-bind:todo="item" v-bind:key="item.id"> </todo-item> </div> <div id="room-urls" style="text-align: center;display: none;background: #F1EDED;margin: 15px -10px;border: 1px solid rgb(189, 189, 189);border-left: 0;border-right: 0;"></div> </section> <script src="/dist/RTCMultiConnection.min.js"></script> <script src="/node_modules/webrtc-adapter/out/adapter.js"></script> <script src="/socket.io/socket.io.js"></script> <script src="https://cdn.jsdelivr.net/npm/vue/dist/vue.js"></script> <script> // ...................................................... // .......................UI Code........................ // ...................................................... document.getElementById('open-room').onclick = function() { disableInputButtons(); connection.open(document.getElementById('room-id').value, function() { showRoomURL(connection.sessionid); }); }; document.getElementById('join-room').onclick = function() { disableInputButtons(); connection.join(document.getElementById('room-id').value); }; document.getElementById('open-or-join-room').onclick = function() { disableInputButtons(); connection.openOrJoin(document.getElementById('room-id').value, function(isRoomExist, roomid) { if (isRoomExist === false && connection.isInitiator === true) { // if room doesn't exist, it means that current user will create the room showRoomURL(roomid); } }); }; // ...................................................... // ..................RTCMultiConnection Code............. // ...................................................... var connection = new RTCMultiConnection(); // by default, socket.io server is assumed to be deployed on your own URL connection.socketURL = '/'; // comment-out below line if you do not have your own socket.io server // connection.socketURL = 'https://rtcmulticonnection.herokuapp.com:443/'; connection.socketMessageEvent = 'video-conference-demo'; connection.session = { audio: true, video: true }; connection.sdpConstraints.mandatory = { OfferToReceiveAudio: true, OfferToReceiveVideo: true }; // https://www.rtcmulticonnection.org/docs/iceServers/ // use your own TURN-server here! connection.iceServers = [{ 'urls': [ 'stun:stun.l.google.com:19302', 'stun:stun1.l.google.com:19302', 'stun:stun2.l.google.com:19302', 'stun:stun.l.google.com:19302?transport=udp', ] }]; Vue.component('todo-item', { props: ['todo'], template: '<video controls autoplay playsinline :srcObject.prop="todo.srcObject" :muted="todo.muted" :id="todo.id"></video>' }) var vueApp = new Vue({ el: '#vue-app', data: { videosList: [] } }) connection.autoCreateMediaElement = false; connection.onstream = function(event) { vueApp.videosList.push({ id: event.streamid, srcObject: event.stream, muted: event.type === 'local' }); }; connection.onstreamended = function(event) { var newList = []; vueApp.videosList.forEach(function(item) { if(item.id !== event.streamid) { newList.push(item); } }); vueApp.videosList = newList; }; // .................................. // ALL below scripts are redundant!!! // .................................. function disableInputButtons() { document.getElementById('room-id').onkeyup(); document.getElementById('open-or-join-room').disabled = true; document.getElementById('open-room').disabled = true; document.getElementById('join-room').disabled = true; document.getElementById('room-id').disabled = true; } // ...................................................... // ......................Handling Room-ID................ // ...................................................... function showRoomURL(roomid) { var roomHashURL = '#' + roomid; var roomQueryStringURL = '?roomid=' + roomid; var html = '<h2>Unique URL for your room:</h2><br>'; html += 'Hash URL: <a href="' + roomHashURL + '" target="_blank">' + roomHashURL + '</a>'; html += '<br>'; html += 'QueryString URL: <a href="' + roomQueryStringURL + '" target="_blank">' + roomQueryStringURL + '</a>'; var roomURLsDiv = document.getElementById('room-urls'); roomURLsDiv.innerHTML = html; roomURLsDiv.style.display = 'block'; } (function() { var params = {}, r = /([^&=]+)=?([^&]*)/g; function d(s) { return decodeURIComponent(s.replace(/\+/g, ' ')); } var match, search = window.location.search; while (match = r.exec(search.substring(1))) params[d(match[1])] = d(match[2]); window.params = params; })(); var roomid = ''; if (localStorage.getItem(connection.socketMessageEvent)) { roomid = localStorage.getItem(connection.socketMessageEvent); } else { roomid = connection.token(); } document.getElementById('room-id').value = roomid; document.getElementById('room-id').onkeyup = function() { localStorage.setItem(connection.socketMessageEvent, document.getElementById('room-id').value); }; var hashString = location.hash.replace('#', ''); if (hashString.length && hashString.indexOf('comment-') == 0) { hashString = ''; } var roomid = params.roomid; if (!roomid && hashString.length) { roomid = hashString; } if (roomid && roomid.length) { document.getElementById('room-id').value = roomid; localStorage.setItem(connection.socketMessageEvent, roomid); // auto-join-room (function reCheckRoomPresence() { connection.checkPresence(roomid, function(isRoomExist) { if (isRoomExist) { connection.join(roomid); return; } setTimeout(reCheckRoomPresence, 5000); }); })(); disableInputButtons(); } // detect 2G if(navigator.connection && navigator.connection.type === 'cellular' && navigator.connection.downlinkMax <= 0.115) { alert('2G is not supported. Please use a better internet service.'); } </script> <footer> <small id="send-message"></small> </footer> <script src="https://www.webrtc-experiment.com/common.js"></script> </body> </html>
They've got them in Southlake, they've got them in Richardson, and now they'll get them in downtown Dallas: Cinnaholic, the award-winning gourmet cinnamon roll chain that just happens to also be vegan, is opening its first branch in Dallas proper. It'll go into the 1700 Pacific building, with an anticipated opening in November. Cinnaholic is the California-based chain that rose to fame after its appearance on the TV show Shark Tank. They do "custom" cinnamon rolls, with more than 30 frosting flavors and nearly two dozen toppings. You select a frosting such as maple or Irish cream, then add toppings like fresh berries, nuts, or gingersnap cookies. Everything is dairy-free, lactose-free, egg-free, and cholesterol-free, making Cinnaholic vegan-friendly. The company was founded in 2009 by baker Shannon Radke and her husband, Florian, in Berkeley, California. They've since opened franchised shops in Las Vegas, San Diego, and more. Although Cinnaholic's products are vegan, that's almost secondary, Florian says. "If you go into our store in Berkeley, we don't have a sign that says it's a vegan cinnamon roll," he says. "Our big thing is that we're the first and only custom gourmet cinnamon roll shop, with frosting flavors and toppings. We're like a Cold Stone Creamery for cinnamon rolls." Local franchisees AB and Elisa Tiffee have taken a slow and steady approach. The first branch opened in Southlake in 2015, followed in 2016 by a second branch in Richardson, next door to Alamo Drafthouse in the Richardson Heights shopping center. The downtown branch will be two doors down from Starbucks, next-door to the Smoothie King. It'll be part of the underground tunnels network but has a street-facing entry in the courtyard at the intersection of Elm and Akard Streets. It'll observe prototypical downtown hours, IE weekdays during the daytime only, catering to the worker population. "We're excited to bring the concept to downtown Dallas," Elisa Tiffee says.