text
stringlengths
8
5.77M
Martin Dorbek Martin Dorbek (born 21 January 1991) is an Estonian professional basketball player. He is currently playing for BC Kalev/Cramo. He comes from basketball family: father Allan Dorbek is a basketball coach, brothers Erik Dorbek and Karl-Peeter Dorbek are both Estonian champions. Another basketball player Gert Dorbek is Allan's uncle's descendant. Club career Martin Dorbek started his basketball career in BC Kalev/Cramo youth system and went on to make his debut in Korvpalli Meistriliiga at the age of 17 with Kuremaa SK. After a season with bottom-finished club he rejoined BC Kalev/Cramo, but played only episodic role in their disappointing third place appearance in the 2009-2010 KML season. Since 2010 he has been playing for BC Rakvere Tarvas, with whom he reached the Estonian Cup and Baltic League Challenge Cup finals in 2011 and 2012, respectively and claimed his second KML bronze medal in addition to personal achievements as he was chosen to the All-KML Defensive teams two years in a row. BC Kalev/Cramo On June 18, 2012 it was announced that Dorbek will return from a loan spell and play for BC Kalev/Cramo. International career In 2011, after successful breakthrough season he was included in the shortlist of Estonia national basketball team and also Estonian U20 team. With the latter, they managed to get promoted to the FIBA Europe Under-20 Championship A division, defeating Belgium U20 on their way to the final, only to lose to strong Georgian team. Honours Club Korvpalli Meistriliiga: 2015–16, 2016–17, 2017–18, 2018–19 Estonian Basketball Cup: 2015, 2016 Individual KML Best Defender: 2013 Career statistics Domestic leagues External links Profile at basket.ee Profile at bbl.net Profile at bctarvas.ee References Category:1991 births Category:Living people Category:BC Kalev/Cramo players Category:Estonian men's basketball players Category:Korvpalli Meistriliiga players Category:Basketball players at the 2015 European Games Category:European Games competitors for Estonia Category:Rapla KK players Category:BC Rakvere Tarvas players Category:Sportspeople from Tallinn Category:Guards (basketball)
Q: Do you still bracket your photos? Do you find that bracketing your photos is still in general a good practice, or has photo editing software greatly reduced the need for this? How To Bracket (Why You Should) Bracket Your Important Photos A: I'll put it this way: I've often regretted not bracketing, but rarely regretted bracketing. Meters still make errors, and data which exceeds the dynamic range of the sensor is gone forever, regardless of post-processing software. I recommend bracketing any images which have complex lighting or any particularly important images, certainly until you understand very well how your meter behaves in the situation. The alternative is chimping and checking the histogram, which provides immediate feedback but slows the shoot and is prone to error (as the histogram shows data processed as if for JPEG even if you're shooting raw). A: Bracketing still has its uses, and is encouraged for HDR images (High dynamic range). It remains the case that it is better to get things right in-camera, but using tools like the histogram that most cameras (at least those that support brakecting) can be useful to tell whilst you're there and see if you've got the exposure right, which does reduce the need for bracketing. A: I've tried bracketing once, and was annoyed about all the extra pictures. It wasted a lot of my shooting space and cost me a lot of time in postprocessing, filtering the images. Now I pay way more attention to get my exposure right on set, so I'll don't have extra work in postprocessing. There had been some rare occassions where I would like an additional underexposed image, but for me these are not worth the extra space needs and work.
HepG2 human hepatoma cells express multiple cytokine genes. Although cytokines are known to be involved in the regulation of a variety of hepatocellular functions, hepatocytes themselves are generally considered only targets but not producers of these important mediators. In order to investigate whether cells of hepatocellular linages are a potential source of various regulatory cytokines we have estimated the multiple cytokine gene expression in the culture of well differentiated human HepG2 hepatoma cells using RT-PCR. Our findings demonstrate that HepG2 cells express mRNAs for interferon gamma (IFN-gamma), tumour necrosis factor alpha (TNF-alpha), transforming growth factor beta (TGF-beta), macrophage colony-stimulating factor (M-CSF), oncostatin-M (OSM), intercellular adhesion molecule (ICAM-1), interleukin 4 (IL-4), IL-5, IL-7, IL-10, IL-11, IL-12 and IL-6 receptor (IL-6R). At the same time the expression of IL-1, IL-2, IL-3, IL-6, CD40 ligand and IL-2R genes was not detected. It was concluded that hepatocytes are potential producers of a variety of cytokines, some of them being able to regulate hepatocellular functions directly, while others are important regulators of leukocyte activity. Thus, on the one hand, hepatocytes may express autoregulatory cytokines and on the other hand, influence the functions of other liver cells like Kupffer, Ito or endothelial cells. Due to their large amount, liver parenchymal cells could be an important source of sytemically acting pro- and anti-inflammatory and other regulatory cytokines.
[NOTE: The following article is a press release issued by the aforementioned network and/or company. Any errors, typos, etc. are attributed to the original author. The release is reproduced solely for the dissemination of the enclosed information.] GIBBS AND HIS TEAM INVESTIGATE AN ABANDONED MARINE HELICOPTER FOUND IN THE MIDDLE OF A CROP CIRCLE, ON "NCIS," TUESDAY, OCT. 12 "Vanished" -- The NCIS team is called in to investigate when a perfectly functioning Marine helicopter is found in the middle of a crop circle, on NCIS, Tuesday, Oct. 12 (8:00-9:00 PM, ET/PT) on the CBS Television Network. James Whitmore, Jr. directed the episode from a script by George Schenck and Frank Cardea. The first job for Gibbs and the team is to find the two pilots missing from the Marine Cobra helicopter. After locating the co-pilot, who thought their scheduled training flight had been canceled, the team continues its search for the pilot amid reports from nearby town people who say they saw strange lights the night the chopper landed. While many, including Abby, are convinced the area has been visited by aliens, Gibbs discovers the truth lies in the town's secret history.
You’re here. I’m Ready. Let’s Do This. My passion is coaching driven, creative, socially conscious women to reconnect with themselves for greater presence in their lives, peace in their hearts and power in the world. As a coach, my job is to create a safe space for you to share, feel and reconnect in a way that awakens you, lightens you and inspires you for the life you want to create. You’re a mission-drive woman with a highly developed streak of bad-assery. You get sh*t done, power through, suck it up and work hard. You’re goal-oriented and when you say you’re gonna do something, you f*cking do it. And the problem is you’re so busy accomplishing, meeting expectations, holding things together and keeping others happy that you’ve somehow lost YOU, lost balance and the ability to listen to your intuition. You’ve been so focused on building a “successful” life that you’ve forgotten to check in and see if this is actually the life you want. So tell me, when did you decide everything else was more important than YOU? When did you start living life by external markers of success and happiness rather than what you honestly value? In our coaching together you’ll learn how to drop the shoulds and have tos. You’ll let go of needing to look a certain way, be a certain way, meet everyone’s expectations, and keep up appearances. You’ll learn how to approach yourself with deep care and compassion. You’ll rediscover beautiful parts of you long ignored and master the ability to prioritize your feelings, your needs and your voice. Our work together will give you the tools to slow down, drop the “I’m fine” routine, and open your heart to trust your deepest knowing of who you are to create the fully present, open-hearted life you crave. I work deeply and intimately with my clients both one-on-one and in groups. One on One Honestly, I'm amazed and what came out during our session. In just one hour Jamie got to the heart of my concerns and gave me a realistic and do-able list of action items to work through. I feel so much better, like I have something to hold onto and now know where I'm going. - Robin Mock Insight. Direction. Action. This is an immediate way to get straight-up, open-hearted guidance to clear what's clouding your brain and create a game plan for the journey ahead. You feel lost and are looking for answers. On the outside life “looks good” and on the inside there’s a disconnect. Your relationship is off. Work is running you ragged. You’re dissatisfied with your body. Nothing ever feeling like it’s good enough. Particularly YOU. You want insight. Clarity. Understanding. But most of all, you want relief and tools to move you forward. Before our session you’ll fill out an assessment which will tell me exactly where start and what needs attention. During our session we’ll dive deep, ask big questions, open your eyes and heart to what’s really happening and bang out a list of specific, actionable recommendations to get you moving forward. By the time our session is over you’ll feel clear, light, seen and inspired to explore your new tools and practices that’ll bring you closer to the full YOU. You’re ready to face what doesn’t feel right in your life and take your understanding of YOU to the next level. You may have done personal development work before but now things are at a breaking point. You want to get over the self-doubt. The judgement. The anger. The fear. The struggle. You want to feel focused and aligned in your life, free in your choices, brave enough to make change and at peace with where you are now. Together we’ll laugh, cry, dig deep and discover the many beautiful and messy sides of you waiting to come out. We’ll give you permission to trust your intuition and follow her lead. (Even when it’s scary.) We’ll inspire you to voice your truth in any situation. (Think relationships, work, family etc.) We’ll find and cultivate the compassionate, soulful YOU that’s eager to live her most authentic life. Before our first session you’ll fill out an assessment which will tell me exactly where we need to start and what needs attention. What this program includes: An in-depth assessment of where you are now, what behaviors are working, what’s keeping you stuck and where you want to go. 3-5 post-session recommendations that keep your new lessons top of mind. Specific tools and methods to use in between sessions to practice your new way of being. Two 60 minute phone sessions a month. Email support in between sessions. You hate to admit it too because you love food and you care about your health. You get excited to look at menus. Enjoy eating your greens. Fantasize about dinner while munching lunch. Food is also terrifying because you can’t always control yourself around it and worry what your eating “f*ck ups” will do to your body. Believe me, I get it. When it comes to eating there’s one question you never ask: “What does my body want in this moment?” Reality Check: “Healthy” eating, though wonderful in theory, can be a total mind fuck when you’re always trying to get your food and body RIGHT. And what I’ve seen from my years of coaching health-conscious women is there is no permission to listen, which leads to a pile of confusion between how you feel, how you look, what you want to eat and what you think you should eat. Are you ready to finally get over your food sh*t? Sign up to be the first to know when Just F*cking Eat It runs in Spring 2016. First Steps Such a great launching point for digging deeper into more mindful living. Thank you Jamie. - Mary Purcell A self-paced 10 day digital experience to get you settled in your skin and present in your life. You set a goal to be more “in the moment” AND your mind still races. You want to stop worrying and over preparing and find you’re always thinking 10 steps ahead. You say things like, “I’m trying to be more present” and then get sucked into instagram and emails. You want to feel engaged in your life and somehow it all seems like it’s flying by and you’re too busy managing it to BE in it. Here’s the deal. You have the capacity to settle into your skin and BE in your life. This course can help. What is it? Get Present is a course for people who think, “I need to slow down”, “I want to be more patient and less reactive”, “I want to worry less” and “I want to feel connected” AND have a really tough time making it a reality. When does it start? Get Present is a 10 day self-paced online course. You have the materials forever and class starts the moment you sign up. What does each day include? An inspirational lesson to create presence no matter what’s going on in your life A guided meditation to get you grounded An instructional video (if you prefer to see rather than read) Writing prompts and questions for easy exploration One simple Get Present action to incorporate into your day A song to set the mood What am I going to learn exactly? After coaching hundreds of clients over 7 years I’ve noticed a theme among them all, no matter the topic of our sessions. They all want to get present in their lives. They want to be present enough to handle a difficult conversation. They want to get present with their broken heart, with their truth, with the desire to cultivate self kindness, or the simple need to slow down and spend more time with their kids. Get Present gives you the tools to settle into yourself; to be here now with what you’re feeling, thinking and experiencing so you can do the same for others. On each day of Get Present, we’ll incorporate a new tool. They are: Pause Write Walk Dance Love Savor Laugh Pray Listen Share If you need to do more of ANY of these 10, this course is for you. Think of Get Present as a sweet daily reminder of how to BE HERE NOW; a way to give yourself the time you’ve been dying to take. This isn’t magic but rather an easy to follow structure of the simple steps to create the connected life you want.
Global Biofertilizers market to surpass USD 1.66 billion mark by 2022 Changing consumer trends towards organic food consumption coupled with growing requirement for high agricultural production to match the needs of rising population are some of the factors predicted to promote the demand for biofertilizers over the next few years. Biofertilizers market worth USD 535.8 million in 2014, is predicted to exceed USD 1.66 billion mark by 2022, growing at a CAGR of 13.2% over the period of 2015-2022. Growing environmental concerns along with a shift in trend towards the use of bio-based products to reduce greenhouse emissions are predicted to drive the industry growth over the coming eight years. Biofertilizers find their use in soil treatment and seed treatment applications. For instance, its use in agriculture helps in decomposing organic residues and promotes the plant growth. Furthermore, environmental legislations passed by the EU and EPA to prevent the use of synthetic fertilizers owing to loss of nitrogen in underground water are predicted to boost biofertilizers market size. Owing to its ecofriendly features, biofertilizers have become very popular in Europe and North America. Spain biofertilizers market size, by product, 2012-2022 (USD Million) Soil treatment applications segment is predicted to grow significantly at a rate of 12.5% over the forecast timeframe driven by the growing use of biofertilizer for improving the fertility of soil resulting in high crop yield. Seed treatment applications segment contributing 65% towards the overall revenue share in 2014, is predicted to witness a significant growth over the forecast period. Biofertilizers adds macronutrients like sulfur, phosphorous, and nitrogen in seed treatment applications to increase the nutritional contents of vegetables, crops, and fruits. Phosphate solubilizing biofertilizers market is predicted to register a CAGR of 13% over the period of 2015-2022, owing to the acceptance of organic farming routes. For example, bacteria like aspergillums, bacillus, and pseudomonas are primarily used to provide phosphorous macronutrients to plants. The nitrogen fixing biofertilizers market which contributed more than 75% towards the overall revenue in 2014, is predicted to witness a substantial growth over the forecast timeline due to its growing use in soil and seed treatment applications. For instance, bacterium like azospirillum brasilense, azotobacter, and rhizobium are mainly used for nitrogen fixation in soil and seed treatment applications. Asia Pacific biofertilizers market is predicted to grow at a rate of 13.5% over the forecast timeline owing to the growth of agriculture sector in Malaysia, China, Pakistan, and India. Furthermore, rising government support for implementing new techniques of farming to increase the crop yield is predicted to boost the demand for biofertilizers in these regions. North America biofertilizers market which contributed over 30% of the overall revenue in 2014, is anticipated to witness a noticeable growth over the forecast timeline driven by favorable attitude towards agriculture in countries like U.S. and Canada coupled with increasing use of bio-based products in farming.
--- abstract: 'A laser beam directed at a mirror attached onto a flexible mount extracts thermal energy from its mechanical Brownian motion by Doppler effect. For a normal mirror the efficiency of this Doppler cooling is very weak and masked by laser shot-noise. We find that it can become really efficient using a Bragg mirror at the long wavelength edge of its band stop. The opposite effect opens new routes for optical pumping of mechanical systems: a laser pointing at a Bragg mirror and tuned at its short wavelength edge induces amplification of the vibrational excitation of the mirror leading eventually to its self-oscillation. This new effects rely on the strong dependency of the Bragg mirror reflectivity on the wavelength.' author: - 'K.Karrai' - 'I.Favero' - 'C.Metzger' date: 19 June 2007 title: Doppler controlled dynamics of a mirror attached to a spring --- Radiation pressure and even electromagnetic fluctuation of the vacuum are known to affect the dynamics of mirrors attached to a spring [@a; @b] but less is known about relativistic effects of light on such macroscopic mechanical oscillators. Recent results show that opto-mechanical couplings can be exploited in a deformable Fabry-Perot arrangement to cool down or enhance the mechanical fluctuations of spring loaded tiny mirrors [@c]. This effect exploits the fact that inside a Fabry-Perot cavity the photon-pressure reacts to any change in the mirror position with a time delay given by the cavity photon storage time [@c; @d; @e; @f; @g]. These cavity effects, and notably the cavity laser cooling, have much analogy with Doppler cooling of atoms yet they do not require relativistic effects for their interpretation. In this work we describe a mechanism for true Doppler modified dynamics of a mirror thermally and mechanically anchored to a spring. Without the use of any cavity, this mechanism could allow to set optically the mirror into a regime of mechanical self-oscillation, simply by pointing a laser at it. A laser beam at wavelength and power P illuminates the mirror of reflectivity R($\lambda$) as schematized in fig. 1. The radiation pressure acting on a moving mirror varies in proportion to the Doppler shift. We show here that because of this dynamics, the Brownian fluctuation of the suspended mirror looses its energy to the electromagnetic field. We found that the efficiency of Doppler cooling can be much increased using a mirror with a large and negative gradient of R($\lambda$). We also show that an amplification of the vibrational excitation can be reached for positive large enough gradient of R($\lambda$). Large gradient of reflectivity are usually found at the edges of the band-stop of a Bragg mirror. ![(a) Schematics of a mirror of reflectivity R($\lambda$) and mass m mechanically attached and thermally anchored to a spring of rigidity K. The friction mechanisms internal to the spring are responsible for losses of mechanical energy at a rate $\Gamma$. A laser of power P is directed at the mirror from the left. (b) Schematics of the reflectivity wavelength dependency of a Bragg mirror. The gradients of R are maximized at the edges $\lambda_{B}$ and $\lambda_{R}$ of the mirror band stop. []{data-label="resonance_combs"}](Fig1.eps){width="9cm"} The movable mirror of mass m is subject to a force Fph due to radiation pressure. Its position x and velocity v of the center of mass of the mirror obey the Newton’s equation of motion, namely m(dv/dt)+ m$\Gamma$v +Kx = $F_{ph}$ + $F_{th}$. The Langevin force $F_{th}$ is introduced here in order to account for the Brownian fluctuation of the center mass of the mirror coupled to a thermal bath at temperature T. The damping rate $\Gamma$ of the mirror mechanical fluctuation is a factor characteristic of the spring holding the mirror. The momentum transferred to the mirror per photon is given by $\hbar$($k_{0}$-$k_{R}$). Here the incoming photons have their wave vector $k_{0}$ = 2$\pi$/$\lambda$ and the reflected ones have $k_{R}$ oriented in the opposite direction. In the reference frame of the laboratory, when the mirror moves away from the light source, the reflected photons have their momentum reduced by Doppler effect such $k_{R}$ = -$k_{0}$(1-2v/c). The radiation pressure is given by the rate of photon momentum transfer to the mirror and is also reduced by Doppler effect such that $F_{ph}$ = RdN/dt $\hbar$($k_{0}$-$k_{R}$) where dN/dt is the number of impinging photon per unit time. The dependency of the radiation pressure on v is $F_{ph}$ = 2R(dN/dt)$\hbar$$k_{0}$(1-v/c) and by making use of the laser power P = $\hbar$$k_{0}$c(dN/dt) it is also $F_{ph}$ = (2RP/c)(1-v/c). In addition, when the mirror reflectivity is a function of $\lambda$ as it is the case for a Bragg mirror operated near its band-stop edge, R also depends on the mirror velocity through the Doppler effect. In this case, we expand R\[$\lambda$(v/c)\] in the experimentally relevant limit of v/c $\ll$ 1. To the first order in k, the reflectivity is R(v/c) $\simeq$ $R_{0}$+(v/c)$\lambda$(dR/d$\lambda$), so in the same way, to the first order in v/c the radiation pressure is $F_{ph}$ $\simeq$ (2$R_{0}$P/c)\[1-v/c+(v/c)($\lambda$/$R_{0}$)(dR/d$\lambda$)\]. Using this expression in the equation of motion and grouping the velocity terms together we obtain an effective Newton equation of motion m(dv/dt) + m$\Gamma_{eff}$v + Kx = $F_{ph,0}$ + $F_{th}$ with a constant radiation pressure $F_{ph,0}$ = 2$R_{0}$P/c and a Doppler modified damping rate $$\Gamma_{eff}/\Gamma = 1+(2R_{0}P/mc^{2}\Gamma)[1-(\lambda/R_{0})(dR/d\lambda)]$$ The constant force $F_{ph,0}$ only shifts the average position of the center of mass and will be ignored in solving the effective equation of motion. For dR/d$\lambda$ $\leq$ 0, the optical contribution to the effective dissipation term $\Gamma_{eff}$ takes energy away from the mechanical Brownian fluctuation and turns it irreversibly into electromagnetic energy through Doppler effect. This amounts to cooling of the Brownian fluctuations of the mirror. We now determine the temperature of the vibrational motion of the mirror. For a harmonic oscillator the equipartition theorem links the temperature to the time averaged amplitude $\langle xx^{*}\rangle$ of the Brownian fluctuation, namely (1/2)$k_{B}$$T_{eff}$ = (1/2)K$\langle xx^{*}\rangle$. In experimental conditions it is not the temporal dependency $x(t)$ but rather its spectral distribution $x_{\omega}$ which is typically measured. The spectrum $x_{\omega}$ is in fact a Fourier transform of $x(t)$. A mathematically convenient property of Fourier transformation is that the time averaged value $\langle x(t)x^{*}(t)\rangle$ term equals the frequency averaged value $\langle x_{\omega}x_{\omega}^{*}\rangle$. In Fourier space the Newton’s effective equation is (-m$\omega^{2}$+im$\Gamma_{eff}$$\omega$+K)$x_{\omega}$ = $F_{th,\omega}$, from which we obtain the spectrum $x_{\omega}$ = ($F_{th,\omega}$/m)/(-$\omega^{2}$+i$\Gamma_{eff}$$\omega$+K/m). Here for a non-absorbing mirror, the spectral decomposition $F_{th,\omega}$ of the thermal fluctuation driving force does not depend on the light and is evaluated from the situation in dark. A reasonable guess about the nature of the driving force $F_{th,\omega}$ is that there is no preferred frequency for the thermal fluctuations in the range of the mirror mechanical vibrational frequencies. This is reasonable at vibrational mechanical frequency much lower compared to typical phonon frequencies with high density of phonon modes within the mirror material (THz). Within this approximation we assume the spectral power density $S_{th}$ in thermal excitation of the mirror to be frequency independent, such that for any given frequency window d the amplitude of the thermal driving force obeys $F_{th,\omega}F^{^{*}}_{th,\omega}$ = $S_{th}$d$\omega$. Using the expression of $x_{\omega}$ given above we obtain after some algebra (1/2)K$\langle x_{\omega}x_{\omega}^{*}\rangle$ = $\pi$$S_{th}$/(4m$\Gamma_{eff}$). The left hand side this equation is (1/2)$k_{B}$T$_{eff}$ as prescribed by the equipartition theorem and we end up with (1/2)$k_{B}$T$_{eff}$ = $\pi$$S_{th}$/(4m$\Gamma_{eff}$). Since the spectral power density $S_{th}$ is not light dependent, in dark we also have 1/2$k_{B}$T = $\pi$$S_{th}$/(4m$\Gamma$). Comparing both expressions we obtain T/T$_{eff}$=$\Gamma_{eff}$/$\Gamma$, showing that an increase in $\Gamma_{eff}$ leads to cooling. This conclusion is premature because so far we ignored the effect of photon shot noise. For a given laser intensity we need to include the fundamental shot-noise power fluctuation that induces a corresponding shot-noise in the radiation pressure and hence driving an additional vibrational fluctuation or an added vibrational temperature. This added fluctuation could counteract the Doppler cooling. This fluctuation force $F_{shot}$ is very much analogous to $F_{th}$ but is proportional to square root of the laser power. Here $F_{shot,\omega}$$F^{^{*}}_{shot,\omega}$ = $S_{shot}$d$\omega$ with a frequency independent power density $S_{shot}$=(2$R_{0}$/c)$^{2}$(Ph$\nu$)/2$\pi$ where h$\nu$ is the photon energy. Assuming no correlation between the Brownian and shot noise, we obtain the new prescription (1/2)KT$_{eff}$ = $\pi$($S_{th}+S_{shot}$)/(4m$\Gamma_{eff}$) leading to the expression for the effective vibrational temperature: $$T_{eff} = (T+pT_{phot})/(1+p(1-\nabla R))$$ where we defined i) the unitless reduced laser power p = 2$R_{0}$P/(m$c^{2}$$\Gamma$), ii) the reflectivity gradient $\nabla$R = ($\lambda$/$R_{0}$)(dR/d$\lambda$) and iii) an effective photon temperature $k_{B}$T$_{phot}$ = $R_{0}$h$\nu$/2. The power dependent term in the denominator originates from the Doppler effect while the one in the numerator is due to the photon shot-noise. We see that for a mirror with a constant reflectivity dR/d$\lambda$ = 0, the Doppler effect tends to lower the effective temperature while the shot noise terms increases it. For such a mirror, the condition T$_{eff}$ $<$ T, namely for cooling is only possible when T$_{phot}$ $<$ T or $R_{0}$h$\nu$/2 $<$ $k_{B}$T. For visible or near-infrared photons and for high reflectivity mirrors $R_{0}$ $\sim$ 1, this condition cannot be satisfied at room temperature. For a mirror with a large and negative reflectivity gradient however, such that $\nabla$R $<$ 0, Doppler cooling of the vibrational mode becomes possible when T$_{phot}$/(1-$\nabla$R) $<$ T or $R_{0}$h$\nu$/\[2(1-$\nabla$R)\] $<$ $k_{B}$T. This gives a stringent condition for the reflectivity gradient. At room temperature using 1 eV photons on a mirror with $R_{0}$ $\sim$ 0.5, namely for T$_{phot}$ = 2900 K, the condition on the reflectivity gradient would be -$\nabla$R $>$ 8.7. Experimentally this can be obtained using a Bragg reflector and a photon wavelength tuned at the higher wavelength-edge of the band-stop of the reflectivity (fig. 1b). Values as high and negative as ($\lambda$/$R_{0}$)(dR/d$\lambda$) = -$10^{5}$ are in fact within experimental reach in the visible and near infrared [@i]. Doppler cooling saturates using large enough laser power at T$_{min}$ = T$_{phot}$/(1-$\nabla$R). With the numerical example above this would be 29 mK. Another interesting aspect of Bragg mirrors is that they offer also the opportunity to set the gradient $\nabla$R positive enough to reach $\Gamma_{eff} \leq 0$ in equation (1). In this regime the mirror gains energy and starts to self-oscillate under the illumination of a CW laser. It enters possibly in a regime of nonlinear dynamics similar to the one predicted by F. Marquardt and coworkers [@g] for deformable Fabry-Perot cavities. This effect would be interesting to demonstrate in this context of cavity-less system. The gain condition implies using a laser power large enough so that P/$\Gamma$ $>$ m$c^{2}$/\[2$R_{0}$($\nabla$R-1)\]. The energy term P/$\Gamma$ represents the laser power averaged over a mechanical relaxation time constant 1/$\Gamma$. This energy is compared to m$c^{2}$, the relativistic energy of the mirror so we anticipate already the Doppler induced optomechanic might be very weak for macroscopic mirrors. We recently prepared a gold mirror (dR/d$\lambda$ $\sim$ 0) mounted on silicon nano-lever [@h] with a mass in the $10^{-15}$ Kg range. For such a mirror and for $R_{0}$ $\sim$ 0.5, the condition for self-oscillation would be reached when P/$\Gamma$ $>$ 90/($\nabla$R-1). Using a damping rate $\Gamma$ $\sim$ 10 sec$^{-1}$ and $\nabla$R $\sim$ $10^{5}$ this would imply using laser power of 90 mW in order to enter a regime of self-oscillation. In order to increase the Doppler effect we see from eq. (2) that one needs to decrease the mass m. For a Bragg mirror, this can only be done within bounds because photons probe the material periodicity within a finite penetration depth. The mass cannot arbitrarily reduced by thinning the material, at some point the reflectivity and its gradient will degrade. Also the lateral dimensions of the reflector cannot be reduced much less than the diffraction limit \[8\]. In the visible range we anticipate that the smallest masses would be in the $10^{-15}$ Kg range. Now we compare the strength of Doppler-cooling with cavity cooling established in ref [@c; @d; @e; @f]. A Fabry-Perot cavity of length L separating the mirrors and finesse F$>$1 stores electromagnetic energy with a typical ring-down time-constant $\tau$ $\sim$ (F/$\pi$)$\tau_{0}$ where $\tau_{0}$ = L/c is the photon time of flight across the cavity. $\tau$ is the typical time the cavity needs to build or loose energy upon a sudden change in laser power or in mirror separation. The photon pressure acting on the mirrors is proportional to the stored power so that the force acting on the mirror near a cavity resonance is not only enhanced by the cavity but also retarded with respect to the mirror separation fluctuation. Retarded terms amounts to velocity dependent force terms similarly to the Doppler effect discussed above. For a cavity with at least one of the two mirrors mounted on a spring, this retarded effect induces an optical modification of the mechanical damping rate and consequently a modification of the vibrational temperature the same way developed above. In order to cool the vibrational fluctuations of the mirror, it is necessary to detune slightly the laser wavelength to the red with respect to the cavity resonance [@c; @d; @e; @f]. Optimum detuning $\delta$$\{L/\lambda\}$ is obtained on the maximum slope of the dependency of electromagnetic energy stored in the cavity with respect to wavelength or mirror separation. This is the case when $\delta$$\{L/\lambda\}$ = -1/(g$\sqrt{3}$). The reverse effect, namely opto-mechanical excitation, is obtained for blue detuning. We establish the extremal effective temperatures $$T_{eff} \simeq (T+pgT_{phot})/[1\pm p(L/\lambda)g^{3}/(g^{2}\omega_{0}^{2}\tau_{0}^{2}+1)]$$ Where g = 2F/$\pi$ is proportional to the cavity finesse F. The sign depends on the side of the detuning with respect to a cavity resonance. For a given vibrational frequency $\omega_{0}$ = $(K/m)^{1/2}$ it turns out that optimal cooling (or pumping) is obtained at the condition $\omega_{0}\tau$ $\sim$ 1. In expressing equation (3) we made the reduced power p = 2$R_{0}$P/m$c^{2}$$\Gamma$ appear explicitly in order to make a direct comparison with Doppler cooling. The term in the denominator is usually much larger than unity and we see that cooling efficiency using cavity effects can be made stronger by a factor as large as g$^{3}$(L/$\lambda$) than Doppler cooling. Already for a finesse as low as g = 10 and for a length L = 20 000 $\lambda$, the cavity cooling can be made $10^{7}$ more efficient than direct Doppler cooling and this considering equal mirror masses, laser powers and damping rates. The use of large finesses allows a significant amplification of laser cooling but at the same time imposes that the moving mirror be part of a Fabry-Perot cavity and this is not always convenient. We stress however the fact that all models derived so far describing cavity cooling do not include relativistic effects. While mimicking it, cavity cooling cannot be interpreted as Doppler cooling. For completeness we introduced Doppler effect in our formalism of cavity cooling and found that it gives rise to corrections to the cooling efficiency that are small for cavity finesses g $\gg$ 1 [@j]. We finish this letter on an estimation of the cooling power involved with Doppler effect. In dark, the mechanical fluctuation dissipates its thermal energy $k_{B}$T/2 per mechanical degree of freedom and this at a rate $\Gamma$. The dissipated power is there-fore ($k_{B}$T/2)$\Gamma$ and is in equilibrium with the power that feeds the fluctuation. When the mirror reflects the laser light, the effective vibrational mode end-temperature is T$_{eff}$. When the vibrational mode is cooled down to a temperature T$_{eff}$, the steady state heat-load in the mirror is ($k_{B}$T$_{eff}$/2)$\Gamma$. Consequently in order to maintain a temperature T$_{eff}$, the optical cooling extracts energy from the fluctuations of the mirror position at a rate P$_{cooling}$ = $k_{B}$(T-T$_{eff}$)$\Gamma$/2 which is always smaller than $k_{B}$T$\Gamma$/2. So the maximum cooling power is $k_{B}$T$\Gamma$/2 both for Doppler and cavity cooling. This is in the range of $10^{-18}$ Watts at room temperature for $\Gamma$ in the $10^{3}$ sec$^{-1}$ range. This might appear as a very weak cooling power but it can be efficient enough to cool the lowest energy vibrational modes of an elastically suspended mirror since such modes are generally weakly coupled to the thermal bath. In conclusion, we presented a simple formalism for laser Doppler cooling of the center mass fluctuation of a mirror attached to a spring. This effect is very weak but can become sizeable when the mirror reflectivity is made to depend strongly on the photon wavelength. We also showed that effective temperature obtained through cavity cooling, in a formalism that does not include Doppler effect, mimics direct Doppler cooling but with a cavity amplification factor which is proportional to the third power of the cavity finesse and can easily reach ten orders of magnitudes. The reciprocal effect of Doppler cooling, namely Doppler optical pumping of the mirror motion, was also predicted. Interestingly enough, we showed that the use of an appropriate Bragg mirror should allow overcoming the shot noise limit and use directly the Doppler effect to set the mirror motion into self-oscillation. This could provide a very simple and non-invasive method to optically pump the motion of tiny mechanical resonators. We thank Joel Chevrier, Yann Tissot and Hans Limberger for stimulating discussions. The DFG grant NOMS KA 1216/2-1 supported the contribution of C. Metzger. The Alexander Von Humboldt foundation supported I. Favero. V. B. Braginsky, A. B. Manukin, [*Measurements of weak forces in Physics experiments*]{}, University of Chicago Press, (1977). H. B. Chan, V. A. Aksyuk, R. N. Kleiman, D. J. Bishop, Federico Capasso, Science [**291**]{}, 1941 (2001). C. Metzger and K. Karrai, Nature [**432**]{}, 1002 (2004). O. Arcizet, P. F. Cohadon, T. Briant, M. Pinard, A. Heidmann, Nature [**444**]{}, 71 (2006). S. Gigan, H. R. Böhm, M. Paternostro, F. Blaser, G. Langer, J. B. Hertzberg, K. C. Schwab, D. Bäuerle, M. Aspelmeyer, A. Zeilinger, Nature [**444**]{}, 67 (2006). A. Schliesser, P. Del’Haye, N. Nooshi, K. J. Vahala, T. J. Kippenberg, Phys. Rev. Lett. [**97**]{}, 243905 (2006). F. Marquardt, J. G. E. Harris, S. M. Girvin, Phys. Rev. Lett. [**96**]{}, 103901 (2006). I. Favero, C. Metzger, S. Camerer, D. König, H. Lorenz, J. P. Kotthaus, K. Karrai, Appl. Phys. Lett. [**90**]{}, 041101 (2007). Y. Tissot, H. Limberger, private communication. C. Metzger, I. Favero, K. Karrai, unpublished.
Pocky & Rocky 2 Pocky & Rocky 2, released in Japan as , is a shoot 'em up video game developed and published by Natsume in Japan and North America, and published in PAL regions by Ocean Software for the Super NES video game console. It is the sequel to Pocky & Rocky. Gameplay The game is played in a top-down view, featuring many elements from classic shoot 'em up games but giving the player free eight-directional movement. Player one controls the main protagonist, Pocky, who attacks by throwing o-fuda talismans (referred to as "cards" in English versions). Pocky can pick up items to improve her attack power and new clothes to protect herself from damage, as well as throw player 2's character and use magic. Player 2 assumes a supporting role as one of Pocky's friends each possessing a unique attack and unlimited lives. If there is no second player, the supporting character will be CPU controlled. Pocky can use Player 2's character as a utility in various ways. Using "magic", she can force herself into her partner's mind and control their body for a short time, enabling unique abilities depending on who she possesses. Additionally, she can throw her partner at enemies to attack, doing massive damage to the enemy but temporarily killing the thrown character. This exploitation of player 2 is a departure from the previous game, in which player 1 and Player 2 had similar powers and were equally valuable. Characters Pocky Pocky is the main character, and is always controlled by player 1. She is a shrine maiden who attacks by throwing talismans and swinging a purification rod. Though dutiful and good-natured, her chaotic brand of teamwork frequently involves more pain than intended. Rocky Rocky the Tanuki (called a raccoon in English versions) is Pocky's friend and one of Player 2's selectable characters. He attacks by throwing leaves. When magically possessed by Pocky, he gains the ability to find hidden treasures. Rocky was one of the main protagonists from the original Pocky & Rocky. Bomber Bob Bomber Bob is one of Player 2's selectable characters. He is a large and powerful man who attacks by hurling heavy spiked balls a short distance in front of him. When using magic, he gains the ability to lift rock obstacles. His relationship to Pocky is not explained. When thrown at a boss he creates a large Japanese character that hurts those to enter it. Little Ninja Little Ninja is one of Player 2's selectable characters. She attacks by throwing shurikens and can use a katana at close range. When using magic, she gains the ability to open locked chests without need of a key. When thrown at a boss she creates a pillar of fire. Tengy Tengy is a Tengu, and the first character to join Pocky's team. He is not selectable from the beginning of a level, but player 2 can assume control of him by switching characters mid-level. Tengy throws bouncing leaves, and using magic allows him to fly over some obstacles. He strongly resembles the tengu enemies from the original Pocky and Rocky. When thrown at a boss he creates a large stream of energy. Scarecrow Scarecrow is a suave scarecrow who thinks himself to be very cool and handsome, and the second character to join Pocky's team. He is not selectable from the beginning of a level but player 2 can assume control of him by switching characters mid-level. He attacks by throwing sickles that boomerang back to him, and using magic transforms him into a pogo stick. When thrown at a boss he creates a pillar of blue and white energy. Digger Digger is a mole who joins Pocky's team to avoid losing face in front of his friends. He is not selectable from the beginning of a level, but player 2 can assume control of him by switching characters mid-level. He attacks by summoning other moles. When using magic, Digger can travel underground. When thrown at a boss he creates a pillar of darkness that originates from a hole that he stares out of menacingly. Ottobot Ottobot is a powerful flying robot, and the fourth to join Pocky's team. He is not selectable from the beginning of a level, but player 2 can assume control of him by switching characters mid-level. He attacks using missiles, and gains both the abilities to fly and lift heavy objects when using magic. When thrown at a boss he creates a large explosion that acts similarly to Bomber Bob's special move. Reception The four reviewers of Electronic Gaming Monthly gave the game a rave, praising the additional characters with unique abilities, the graphics, and the gameplay design. Though one of the reviewers voiced dislike for the fact that the other characters act as mere subordinates to Pocky, they gave it a unanimous score of 8 out of 10. GamePro likewise praised the additional characters with the new strategy they add, the graphics, and the cute design. They particularly noted that "Even the tiniest animals and items display precise detail." References Category:1994 video games Category:Natsume (company) games Category:Ninja video games Category:Ocean Software games Category:Pocky & Rocky Category:Super Nintendo Entertainment System games Category:Super Nintendo Entertainment System-only games Category:Video game sequels Category:Video games developed in Japan Category:Video games scored by Hiroyuki Iwatsuki Category:Video games scored by Kinuyo Yamashita Category:Video games featuring anthropomorphic characters Category:Video games set in feudal Japan
Philanthropy is about more than tax credits We usually talk about philanthropy and charitable donations in December, as the income tax deadline for the charitable-donation tax credit approaches. However, a few things have compelled me lately to provide a mid-year reminder that, although Dollars and Sense talks about money all year long, it's not the money that's important, it's what it can do for you, your family and your community. We had the honour and pleasure of attending a dinner this week at the new Canadian Museum for Human Rights, the house local and national philanthropy built. The event was held to present an international humanitarian award to Moe Levy, executive director of the Asper Foundation and one of the two people (with Gail Asper) most responsible for the museum dream becoming a reality. This is the first Canadian national museum ever built outside of the National Capital Region, and the first national museum built in 45 years. It is impossible to overstate this accomplishment, and it has been achieved here in Winnipeg. That's no coincidence. More than 65 individuals, corporations and institutions provided gifts in excess of $1 million to make this happen, and many, many other people have given what they can to help. This is a huge philanthropic inspiration, and the museum will be a huge draw for visitors to our city. However, in Manitoba, that's just one example of the tremendous community spirit and generosity of our citizens, always near the top in Canada in terms of donations, volunteerism and helping our neighbours. There are many organizations in our province that need our continued help and support. While some people have money to donate, for which they can receive a generous tax credit, other people donate equally important support by volunteering their time, expertise and goodwill. On the money side, a quick reminder every $100 donated to a registered charity will net you a tax credit of about $45 combined on your federal and provincial tax returns, after your first $200 of donations in that year. There is a smaller credit on the first $200 each year. This means combining all annual donations on one spouse's tax return is wise. If this will be your first year claiming a charitable-donation credit, there is an extra tax incentive. The government recently implemented a first-time donor's "super credit" for the 2013 to 2017 tax years, on up to $1,000 of total donations. This gives you back an extra $25 credit on each $100 donation up to $1,000, starting from the first dollar of donations that year. So, if you are a first-timer, maximize that credit. Another painless way to donate may be with appreciated securities, such as company shares or mutual funds. If these have gone up in value since you purchased them, a sale will require you to declare a capital gain, and pay tax on half of that gain. However, if you instead donate the shares or mutual fund units directly to a charity "in-kind" (rather than selling), then you get the full tax credit for the donation, and you can ignore the capital gain. With Winnipeg Harvest recently becoming the second largest "city" in Manitoba, child poverty at a record level and all of the other needs in our community, your support is needed more than ever. The Winnipeg Foundation is holding an information session on May 20 at 1:30 p.m. at the Norwood Hotel, if you want to learn more about donations and planned giving. *** On a personal note, I have to brag a bit about our son, who provided me some added inspiration this past week. We were talking about things such as donations and travel, and he said, point blank, that we should enjoy our money any way we want, and not think about leaving him anything. When he declared, with a distinct tone of pride, "We will make our own... Don't worry about us," I have to admit to being a very proud parent. Now, get out there and enjoy "spring." David Christianson, BA, CFP, R.F.P., TEP, CIM is a financial planner and adviser with Christianson Wealth Advisors, a Vice President with National Bank Financial Wealth Management, and author of the book Managing the Bull, A No-Nonsense Guide to Personal Finance. You can comment on most stories on winnipegfreepress.com. You can also agree or disagree with other comments. All you need to do is be a Winnipeg Free Press print or e-edition subscriber to join the conversation and give your feedback.
**(-6)*u**(6/11)/u)**(-41) assuming u is positive. u**(2911/11) Simplify (n/(n*n*n*n**(2/3)/n*n))**(-1/11)*(n**2)**47 assuming n is positive. n**(3110/33) Simplify ((x*x**(-3/7)/x)**(-17))**(-12/11) assuming x is positive. x**(-612/77) Simplify ((s**(4/9)/s)/(s*s**(-1/6)))**(-2) assuming s is positive. s**(25/9) Simplify f**(1/16)/(f**(-17)/f) assuming f is positive. f**(289/16) Simplify t/t**11*t*t*t*(t*t/t**(-22))/t*t assuming t is positive. t**17 Simplify ((h*h*h**10)/(h/(h*(h*h*h*h/((h/(h/(((h*h*h**(-1/3))/h*h)/h)))/h*h*h)*h*h)/h)))**(-2/193) assuming h is positive. h**(-92/579) Simplify ((s*s**(2/3))/s)**(-4/17)/((s*s**9)/s**(-1/6)) assuming s is positive. s**(-351/34) Simplify q**(3/2)/(((q*q/q**(-4/3))/q)/q)*q**(2/23)/q**(-2/5) assuming q is positive. q**(451/690) Simplify (a**3/a**(-2/9))**(1/79) assuming a is positive. a**(29/711) Simplify (w**1/w)**49*(w*w*w**(-3/7))/w**(-8) assuming w is positive. w**(67/7) Simplify w**(1/4)*w/(w/(w*w**(8/3))*w) assuming w is positive. w**(35/12) Simplify (f/(f**(-4)*f))/(f/(f*f**(-1/4)/f))*(f/f**1)**(-15) assuming f is positive. f**(11/4) Simplify (p**0)**(-2/45)/(p/(p/(p**(-2/5)*p)))**(-26) assuming p is positive. p**(78/5) Simplify (n**(2/3)/n**(-2/19))/(n**(-1))**40 assuming n is positive. n**(2324/57) Simplify m/m**(-7)*m*m*m**(-18)*m assuming m is positive. m**(-7) Simplify d**(-8)*d**16 assuming d is positive. d**8 Simplify k**5/(k/(k/(k*k**(-1))))*k**(-4/5)/(k**(-1/10)*k) assuming k is positive. k**(33/10) Simplify (x*(x/x**(-2/5))/x)**16/((x/((((x/(x**(-4)*x))/x)/x*x)/x))/x**(-1/3)) assuming x is positive. x**(346/15) Simplify (u**(2/9)*u**8)/(u/(u/u**(-2/3)))**(2/17) assuming u is positive. u**(1270/153) Simplify (((f*(f/f**(-2/35))/f)/f*f*f)/f**(-6/13))**(-3/4) assuming f is positive. f**(-1719/910) Simplify r*r/(r**(1/25)*r)*r**(-13) assuming r is positive. r**(-301/25) Simplify (t**0)**(-10)/(t**(1/4)*t)**(2/5) assuming t is positive. 1/sqrt(t) Simplify (q**4/q)/(q*q*((q**5/q)/q)/q*q)*q**4*q**4 assuming q is positive. q**6 Simplify (h**(-8/7)/h)**(-11) assuming h is positive. h**(165/7) Simplify (k**(-2/25)*k)**(1/14) assuming k is positive. k**(23/350) Simplify (o/(o**(-12)*o))**(-29) assuming o is positive. o**(-348) Simplify (j**(-1/5)*j**(-5))/((j*j**(-1/5)/j)/j*j*j*j**(3/7)) assuming j is positive. j**(-45/7) Simplify f**(18/7)/((f/((f**(-30)/f)/f))/f) assuming f is positive. f**(-206/7) Simplify (j*j/(j*(j*j/(j**(3/8)/j)*j)/j)*j)/((j*j**(-26))/j) assuming j is positive. j**(203/8) Simplify (w**(-9))**5 assuming w is positive. w**(-45) Simplify (n**(1/22)*n)**(-45) assuming n is positive. n**(-1035/22) Simplify (m**(-1/3)/m)/m*m*m**4 assuming m is positive. m**(8/3) Simplify u**(-4)*u*u/(u*u**(5/7))*u assuming u is positive. u**(-19/7) Simplify ((q/((q*q**10*q*q)/q))/q*q*q*q*q**(-5/4)*q)/(q*q*q/((q*(q*q**0*q)/q)/q)*q)**(-21) assuming q is positive. q**(215/4) Simplify ((k/(k*k**(3/8)))/k*k**(5/4))/(k**0)**5 assuming k is positive. k**(-1/8) Simplify (f/f**(-2/7)*f/f**3)**(5/3) assuming f is positive. f**(-25/21) Simplify (t*t**(2/9)/t*t)**40*(t**0)**23 assuming t is positive. t**(440/9) Simplify (b**1*b)/((b/(b**(-31)/b)*b)/b*b) assuming b is positive. b**(-32) Simplify (b*b*b**(-2/7)*b/(b*b*b*(b*b**(-3/5))/b))/((b/((b/(b/b**8))/b*b*b*b*b))/(b*b**(-8)/b)) assuming b is positive. b**(81/35) Simplify ((g**1/g*g)**(1/51))**(1/4) assuming g is positive. g**(1/204) Simplify (n**(-2/7)/n*n)**42*(n**(-5)*n)/(n/(n/n**(2/9)*n)) assuming n is positive. n**(-137/9) Simplify ((p*p**(1/4)/p*p)/p)**29/(p**(-4)*p*p**(-3)) assuming p is positive. p**(53/4) Simplify ((c**0/c)**(-6/19))**(-17) assuming c is positive. c**(-102/19) Simplify (g**(7/2)/(g*g**6*g))/(g**(-5/2)/g*g**(-2/3)) assuming g is positive. g**(-1/3) Simplify i**(-2/3)*i**(1/4)*(i**(-1/3))**32 assuming i is positive. i**(-133/12) Simplify x*x**(-1/4)*x/(x**(-1/4)/x) assuming x is positive. x**3 Simplify ((q*q**(-7)/q*q)**(1/40))**(-2/29) assuming q is positive. q**(3/290) Simplify ((c/c**(-3))/c*c)/(c*c**1*c)*(c**(2/3)/c)/(c/c**7) assuming c is positive. c**(20/3) Simplify (i*i*(i/((i/((i/i**0*i)/i))/i))/i)/(i**(2/15)*i)*(i**(1/5)/i)/(i*(i**(2/23)/i*i)/i) assuming i is positive. i**(338/345) Simplify (p**(-2/9)*p*p/p**(2/7))/(p*p**(1/3)*p)**(-50) assuming p is positive. p**(7444/63) Simplify (q*q*q**(5/2))**(-33) assuming q is positive. q**(-297/2) Simplify ((f*f/f**(1/3)*f)**(-22/7))**(-5) assuming f is positive. f**(880/21) Simplify (((z**(-3)/z)/z*z)/(z**(-3/8)*z))/(z**1)**43 assuming z is positive. z**(-381/8) Simplify (((t*((t*t*t/(t/((t/(t**(6/7)*t*t))/t))*t)/t*t)/t)/t*t)/t**(4/7))/(t*t/t**(-7/4)*t*t**(-1)) assuming t is positive. t**(-117/28) Simplify b**(-21/4)*b*b/(b*b/((b*b*(b*b**(2/59))/b)/b)) assuming b is positive. b**(-995/236) Simplify (w/w**(-14/5))/(w*w/w**24) assuming w is positive. w**(129/5) Simplify (((y*y**(-1/2))/y)**(3/2))**15 assuming y is positive. y**(-45/4) Simplify (m*m**4*m*m/m**2)**(2/43) assuming m is positive. m**(10/43) Simplify (g**(-5)*g/(g/(g**6*g))*g)**(-34) assuming g is positive. g**(-102) Simplify (n**(1/4))**(-11) assuming n is positive. n**(-11/4) Simplify (k*k**1)**(-3)/(k**(-2/5)/(k*k**0)) assuming k is positive. k**(-23/5) Simplify k/k**(-1/26)*k*k*k**14*k assuming k is positive. k**(469/26) Simplify ((k*k/k**8)/(k**(-4)*k))**(4/41) assuming k is positive. k**(-12/41) Simplify (y**(-5)/(y*y/y**5*y))/((((y/y**(1/6)*y)/y)/y)/(y*y**(-1/4))) assuming y is positive. y**(-25/12) Simplify (j**(2/3)/j**(1/8))/((j**0*j)/j)**(4/5) assuming j is positive. j**(13/24) Simplify (j*j/(j/(j/j**(-12)*j*j)))/j**(26/5) assuming j is positive. j**(54/5) Simplify ((i**(1/2)*i)**(6/13))**(1/16) assuming i is positive. i**(9/208) Simplify (n**2/n)/(n*n**8)*n/n**(-6/5)*n**9/n assuming n is positive. n**(11/5) Simplify (n**0)**(18/13) assuming n is positive. 1 Simplify g**(-4)*g**(-2/17)*g/((g**(-1/3)*g)/g)*g*g*(g**(2/3)*g)/g assuming g is positive. g**(-2/17) Simplify (w**(-2)/((w**(-3)/w)/w))**(-15) assuming w is positive. w**(-45) Simplify t/t**10*(t/(t*t**(-7/5)))/t*(t**2)**(-35) assuming t is positive. t**(-393/5) Simplify c*c**(-2/59)*c*c/(c*c**24) assuming c is positive. c**(-1300/59) Simplify (r**(1/2))**(4/7)*r**(-6)*r*r**4*r*r assuming r is positive. r**(9/7) Simplify ((r*(r*r/r**(-1))/r)/r)/((r**(-1/2)*r*r)/r)*r**(-2/9)*r*(r*r**(7/3))/r assuming r is positive. r**(83/18) Simplify j*j**(5/3)*j*j*(j*j/(j**(-10)*j))/j*(j**(-2))**50 assuming j is positive. j**(-256/3) Simplify a**24*a**(-2/39) assuming a is positive. a**(934/39) Simplify ((l**(-2/3)*l)/l**4)/(l**(-8)/(l*l*l*l/(l/(l*((l**4*l)/l)/l)))) assuming l is positive. l**(34/3) Simplify (b/b**(11/5))/b**35 assuming b is positive. b**(-181/5) Simplify c*c**(-3)*((c*c**10)/c)/c assuming c is positive. c**7 Simplify (i/(i*i/(i**(12/5)/i*i)*i))**(-37) assuming i is positive. i**(-74/5) Simplify (t**1)**(-31/3)*t**(-3)/t*t/t**(-5) assuming t is positive. t**(-25/3) Simplify (r**(1/8)/r*r/r**(-8/3))/((r**5*r)/r**(-4/5)) assuming r is positive. r**(-481/120) Simplify (k**(2/3)*k*k)/k**(13/3) assuming k is positive. k**(-5/3) Simplify (h*h**24/h)/(h**(-10/7)/h) assuming h is positive. h**(185/7) Simplify ((l*l**(-1))/l*(l/(l*l**(-3)))/l)/(l*l/(l**(-7)/l)*(((l**(5/3)*l)/l)/l)/l) assuming l is positive. l**(-26/3) Simplify ((w/(w**(-4/5)/w*w))/w)/w**(-2) assuming w is positive. w**(14/5) Simplify m/(m*m**(-2/13)/m)*m*m**21/m assuming m is positive. m**(288/13) Simplify k*k**(-12)*k**(-13) assuming k is positive. k**(-24) Simplify (x*(x/x**(-1/2))/x*x*x**(-1)/x)**(2/41) assuming x is positive. x**(1/41) Simplify u**4/u**4*u*(u*u**(-2/5))/u*u*u**4*u assuming u is positive. u**(33/5) Simplify m**(-18)/(m/(m/(m*m**16*m))) assuming m is positive. m**(-36) Simplify (o**(-1)*o*(o**(-3/2)/o*o*o)/o)**(-3/22) assuming o is positive. o**(9/44) Simplify (s**(-3))**9 assuming s is positive. s**(-27) Simplify q**(2/9)*q/(q*q*q**(1/14))*q assuming q is positive. q**(19/126) Simplify ((n*n/(((n**4/n)/n)/n)*n)/(((n/((n**(-5)*n*n)/n*n))/n)/n*n))/((n*n*n/((n*n*n*n**(-1/12)*n*n)/n)*n*n*n*n)/(n/(n/(n**(3/4)/n)))) assuming n is positive. n**(-13/3) Simplify (s*s*s*s*s**(3/13))/(s/(s/(s/s**(-2/17)*s))*s) assuming s is positive. s**(246/221) Simplify (((o/o**(-5)*o)/o)**(-20))*
Professional Development for Early Years Community Developers The updated Early Years Community Development Institute (EYCDI) Professional Development Handbook is designed to highlight the knowledge and skills that are required in one’s role as an early years community developer. “Early years community developers work with communities to support families with young children by promoting the importance of the early years and facilitating community partnerships that make a positive difference for children.” The guide reflects the wide scope of work done and the guiding principles behind the work. The guide offers role definitions, guiding principles, areas of knowledge, and required skills for five separate components of the work: Leadership (involving both personal leadership and community leadership): “a function of knowing yourself, having a vision that is well communicated, and building trust among colleagues. It is a process that involves mobilizing, influencing and guiding others.” Building and Strengthening Community Collaboratives: “growing and sustaining local and/or regional multi-agency, multi-discipline, cross-cultural community collaboratives who work together to improve services, supports and opportunities for very young children and their families.” Community Awareness, Engagement and Education: “to actively and meaningfully learn from ad share information with different segments of the community to enhance knowledge, skills and behaviours that promote optimum child development opportunities.” Research and Accountability: “the use of and participation in research to analyze situations, explore options, understand possible outcomes and is then able to justify decisions from a sound knowledge base.” Understanding Political Context and Influencing Public Policy: “a critical component of early years development because it addresses the broad influences on children in society.” The site also provides links to webinars on topics ranging from engaging specific communities to helping children and families thrive. Share this page with a friend: This publication was produced by Frog Hollow Neighbourhood House with funding from the Public Health Agency of Canada. The opinions expressed in this publication are those of the authors/researchers and do not necessarily reflect the official views of the Public Health Agency of Canada or Frog Hollow Neighbourhood House.
Q: Comparing comma separated values from two columns of two different tables I want to compare the values of two columns (diff table) having comma separated values of two different Oracle tables. I want to find rows that match with all values (NAME1 all values should match with NAME2 values). Note: The comma separated values are in different order. Example: T1: ID_T1 NAME1 =================================== 1 ASCORBIC ACID, PARACETAMOL, POTASSIUM HYDROGEN CARBONATE 2 SODIUM HYDROGEN CARBONATE, SODIUM CARBONATE ANHYDROUS, CITRIC ACID 3 CAFFEINE, PARACETAMOL PH. EUR. 4 PSEUDOEPHEDRINE HYDROCHLORIDE,DEXCHLORPHENIRAMINE MALEATE T2: ID_T2 NAME2 ================================= 4 POTASSIUM HYDROGEN CARBONATE, ASCORBIC ACID, PARACETAMOL 5 SODIUM HYDROGEN CARBONATE, SODIUM CARBONATE ANHYDROUS 6 PARACETAMOL PH. EUR.,CAFFEINE 7 CODEINE PHOSPHATE, PARACETAMOL DC 8 DEXCHLORPHENIRAMINE MALEATE, DEXTROMETHORPHAN HYDROBROMIDE 10 DEXCHLORPHENIRAMINE MALEATE, PSEUDOEPHEDRINE HYDROCHLORIDE MY RESULT should only show the matching row based on ALL NAME Matches in both tables. ID_T1 ID_T2 MATCHING NAME ================================== 1 4 POTASSIUM HYDROGEN CARBONATE, ASCORBIC ACID, PARACETAMOL 3 6 PARACETAMOL PH. EUR.,CAFFEINE 4 10 PSEUDOEPHEDRINE HYDROCHLORIDE,DEXCHLORPHENIRAMINE MALEATE Tried with REGEXP_SUBST but wasn't able to make it work. I used the below code to parse the values: SELECT REGEXP_SUBSTR (NAME1, '[^,]+', 1, ROWNUM) FROM T1 CONNECT BY ROWNUM <= LENGTH (NAME1) - LENGTH (REPLACE (NAME, ',')) + 1 A: You could get the table(s) into first normal form and then compare the compounds that are stored in each row. A starting point could be: {1} Tokenize each row, and write the tokens into a new table. Give each token its original ID plus a 3-letter prefix, indicating which table the token came from. {2} Group the rows of the new ("normalized") table by ID, and perform a LISTAGG(). Perform a self join, and find matching "token groups". {1} Tokenize, create table as select (CTAS) create table tokens as select ltrim( -- ltrim() and rtrim() remove leading/trailing spaces (blanks) rtrim( substr( N.wrapped , instr( N.wrapped, ',', 1, T.pos ) + 1 , ( instr( N.wrapped, ',', 1, T.pos + 1 ) - instr( N.wrapped, ',', 1, T.pos ) ) - 1 ) ) ) token , N.id from ( select ',' || name1 || ',' as wrapped, 'T1_' || to_char( id_t1 ) as id from t1 -- names wrapped in commas, (table)_id union all select ',' || name2 || ',' , 'T2_' || to_char( id_t2 ) from t2 ) N join ( select level as pos -- (max) possible position of char in an existing token from dual connect by level <= ( select greatest( -- find the longest string ie max position (query T1 and T2) ( select max( length( name1 ) ) from t1 ) , ( select max( length( name2 ) ) from t2 ) ) as pos from dual ) ) T on T.pos <= ( length( N.wrapped ) - length( replace( N.wrapped, ',') ) ) - 1 ; The inspiration to tokenize without using CONNECT BY came from this SO answer. The contents of the TOKENS table will look something like this: SQL> select * from tokens ; TOKEN ID ASCORBIC ACID T1_1 SODIUM HYDROGEN CARBONATE T1_2 CAFFEINE T1_3 PSEUDOEPHEDRINE HYDROCHLORIDE T1_4 PARACETAMOL T1_100 sodium hydroxide T1_110 POTASSIUM HYDROGEN CARBONATE T2_4 SODIUM HYDROGEN CARBONATE T2_5 PARACETAMOL PH. EUR. T2_6 CODEINE PHOSPHATE T2_7 DEXCHLORPHENIRAMINE MALEATE T2_8 DEXCHLORPHENIRAMINE MALEATE T2_10 PARACETAMOL T2_200 ... {2} GROUP BY, LISTAGG, self join select S1.id id1 , S2.id id2 , S1.tokengroup_T1 , S2.tokengroup_T2 from ( select substr( id, 4, length( id ) - 3 ) id , listagg( token, ' + ' ) within group ( order by token ) tokengroup_T1 from tokens group by id having substr( id, 1, 3 ) = 'T1_' ) S1 join ( select substr( id, 4, length( id ) - 3 ) id , listagg( token, ' + ' ) within group ( order by token ) tokengroup_T2 from tokens group by id having substr( id, 1, 3 ) = 'T2_' ) S2 on S1.tokengroup_T1 = S2.tokengroup_T2 ; -- result ID1 ID2 TOKENGROUP_T1 TOKENGROUP_T2 4 10 DEXCHLORPHENIRAMINE MALEATE + PSEUDOEPHEDRINE HYDROCHLORIDE DEXCHLORPHENIRAMINE MALEATE + PSEUDOEPHEDRINE HYDROCHLORIDE 110 210 potassium carbonate + sodium hydroxide potassium carbonate + sodium hydroxide 1 4 ASCORBIC ACID + PARACETAMOL + POTASSIUM HYDROGEN CARBONATE ASCORBIC ACID + PARACETAMOL + POTASSIUM HYDROGEN CARBONATE 3 6 CAFFEINE + PARACETAMOL PH. EUR. CAFFEINE + PARACETAMOL PH. EUR. When doing things this way, you can get the substances into (alphabetical) order, and you can also pick a "delimiter" that you like (we have used '+') here. ALTERNATIVE If all that is no use to you, or you think this is too complicated, then you could try using TRANSLATE(). In this case, I'd recommend stripping all spaces/blanks from your dataset (in a query - not altering the original data!) like so: Query select id1, id2 , name1, name2 from ( select id_t1 id1 , id_t2 id2 , T1.name1 name1 , T2.name2 name2 from T1 join T2 on translate( replace( T1.name1, ' ', '' ), replace( T2.name2, ' ', '' ), '!' ) = translate( replace( T2.name2, ' ', '' ), replace( T1.name1, ' ', '' ), '!' ) ) ; Result ID1 ID2 NAME1 NAME2 2 5 SODIUM HYDROGEN CARBONATE, SODIUM CARBONATE ANHYDROUS, CITRIC ACID SODIUM HYDROGEN CARBONATE, SODIUM CARBONATE ANHYDROUS 3 6 CAFFEINE, PARACETAMOL PH. EUR. PARACETAMOL PH. EUR.,CAFFEINE 100 10 PARACETAMOL, DEXTROMETHORPHAN, PSEUDOEPHEDRINE, PYRILAMINE DEXCHLORPHENIRAMINE MALEATE, PSEUDOEPHEDRINE HYDROCHLORIDE 110 210 sodium hydroxide, potassium carbonate sodium hydroxide, potassium carbonate NOTE: I've added the following rows to your sample data: -- T1 110, 'sodium hydroxide, potassium carbonate' -- T2 210, 'sodium hydroxide, potassium carbonate' 211, 'potassium hydroxide, sodium carbonate' I found that it is easy to use TRANSLATE() in a way that gives you "false positives" ie the substances with ids 110, 210, and 211 will appear to "match". (In other words: I don't think this is the right tool for this job.) DBFIDDLE here (follow the link to see the sample tables and queries).
FactoryBot.define do factory :standup do title { Faker::Company.name } to_address { Faker::Internet.email } end end
Q: go build works but go test does not Below is my project structure: /user/home/go/src/github.com/my_go_proj /main.go /mypackage /service.go /service_test.go GOPATH points to /user/home/go cd /user/home/go/src/github.com/my_go_proj go build ---> This works and creates the `my_go_proj` executable. go test ? github.com/my_go_proj [no test files] go test github.com/my_go_proj/mypackage go build gopkg.in/tomb.v2: no buildable Go source files in FAIL github.com/my_go_proj/mypackage [build failed] go test ./... ? github.com/my_go_proj [no test files] go build gopkg.in/tomb.v2: no buildable Go source files in FAIL github.com/my_go_proj/mypackage [build failed] How do I run go test to run the service_test.go test inside mypackage? Update: updated the behaviour for go test ./... A: The problem was with the directory structure. My project source should be in $GOPATH. But it was inside $GOPATH/src. Incorrect /user/home/go/src/github.com/my_go_proj Correct /user/home/go/github.com/my_go_proj
Q: How to return XML in ASP.NET This is a very basic question. I'm just on my mission to learn ASP.NET (C#). I've done classic ASP and PHP before. For this project I have ASP.NET 2.0 at my hands. I have a Web Form that has a jqGrid Datagrid that I want to feed XML data via AJAX. jqGrid is not the problem here, though. The "problem" is the approach that I should take to generate the XML. How do I do that in ASP.NET? Do I create a new Web Form that generates that data? Do I use a new Web Service (that would not return the XML I need, would it?)? Do I somehow put a function in the existing Web Form that shows the table? If so, how? After that decision is made: How do I output the XML? I don't want to use any XML components of ASP.NET, because it's just plain, simplistic XML with one record after each other. Using System.Xml would be too much overhead to be justified here. <?xml version='1.0' encoding='utf-8'?> <rows> <page>1</page> <total>25</total> <records>3</records> <row id='1'> <cell>Row 1, Column 1</cell> <cell>Row 1, Column 2</cell> <cell>Row 1, Column 3</cell> </row> <row id='2'> <cell>Row 2, Column 1</cell> <cell>Row 2, Column 2</cell> <cell>Row 2, Column 3</cell> </row> <row id='3'> <cell>Row 3, Column 1</cell> <cell>Row 3, Column 2</cell> <cell>Row 3, Column 3</cell> </row> </rows> From my previous experience with the other scripting languages, I'd just like to print out a stream of XML tags (Response.Write). Will I go to hell if I do so in ASP.NET? A: Using System.Xml (or System.Xml.Linq) would be less overhead in terms of getting it right than hand-coding Response.Write and making sure you quote everything you need to, sort out the encoding etc. Why would you want to reinvent the wheel? Create a new ashx instead of aspx page, create the appropriate XmlDocument/XDocument and write that to the response, having set the content type appropriately. See this article for an example creating an RSS feed. It's the same type of thing as I do on my site to generate RSS from the database - using LINQ to XML this creates the whole document in a single (admittedly large, but readable) statement. Then it's just a case of setting the content type and calling context.Response.Write(doc). Very simple. A: Another solution to using a full blown XmlDocument/Linq in the ashx is to use the XmlWriter, sort of a halfway solution between hand crafting the xml as a string and using a dom. Something like: StringBuilder query = new StringBuilder(); using (XmlWriter xmlWriter = XmlWriter.Create(query)) { xmlWriter.WriteStartElement("rows"); xmlWriter.WriteElementString("page", "1"); foreach(...) { xmlWriter.WriteStartElement("rows"); xmlWriter.WriteAttributeString("row", "1"); foreach(...) { xmlWriter.WriteElementString("cell", "Row 1, Column 1"); } xmlWriter.WriteEndElement(); } xmlWriter.WriteEndElement(); }
{ "Logging": { "LogLevel": { "Default": "Warning", "System": "Warning", "Microsoft": "Warning" } }, "ServiceSettings": { "Uri": "", "CartBaseUri": "api/ShoppingCart", "CartRecordBaseUri": "api/ShoppingCartRecord", "CategoryBaseUri": "api/Category", "CustomerBaseUri": "api/Customer", "ProductBaseUri": "api/Product", "SearchBaseUri": "api/Search", "OrdersBaseUri": "api/Orders", "OrderDetailsBaseUri": "api/OrderDetails" } }
Q: Selecting element with selenium python issue I am using this code but I cannot select the input field. from selenium import webdriver from selenium.webdriver.common.keys import Keys driver = webdriver.Chrome() driver.get("https://10fastfingers.com/multiplayer") input("Start : ") a = "b" inputfield = driver.find_element_by_xpath("//input[@type='text']") inputfield.click() while a == "b": try: word = driver.find_element_by_xpath("//span[@class='highlight']") inputfield.send_keys(word.text) inputfield.send_keys(Keys.SPACE) except: print("Finish") a = "c" input field element; <input type="text" autofocus="autofocus" autocapitalize="none" autocorrect="off"> A: As the page takes some time to load, you should apply explicit wait on the element so that the script waits until the element is present on the page. You can do it like: from selenium import webdriver from selenium.webdriver.common.keys import Keys from selenium.webdriver.support.ui import WebDriverWait from selenium.webdriver.common.by import By from selenium.webdriver.support import expected_conditions as EC driver = webdriver.Chrome() driver.get("https://10fastfingers.com/multiplayer") input("Start : ") a = "b" driver.switch_to.frame(driver.find_element_by_tag_name('iframe')) inputfield = WebDriverWait(driver, 20).until(EC.presence_of_element_located((By.XPATH, "//input[@type='text']"))) inputfield.click()
Roentgenographic skeletal injury patterns in parachute jumping. A total of 90,000 parachute jumps made during a 1 year period resulted in 615 (0.68%) injuries secondary to jumping. Of these 615 cases, 70 jumpers (0.08%) had 71 skeletal injuries as confirmed by roentgenographic examination. Forty-one (57.7%) of the 71 injuries involved the ankle, and 12 (16.9%) were compression fractures of the thoracolumbar spine. The remaining injuries were distributed as follows: shoulder, six (8.5%); calf, six (8.5%); pelvis, 3 (4.2%); foot, two (2.8%); and thigh, one (1.4%). The various mechanisms leading to these injuries are presented.
Kinsale, Cork County - Radio Stations Genre City Language Country Kinsale, Cork County - Radio Stations on your iPhone, iPad, iPod Touch, Android, Blackberry, and other app-enabled mobile phones. Get in touch via the Contact Us below if you're interested in these apps. Also, find the top new songs, playlists, and music on our website!
Removal of lead(II) and cadmium(II) from aqueous solutions using grape stalk waste. The sorption of lead and cadmium from aqueous solutions by grape stalk waste (a by-product of wine production) was investigated. The effects of the contact time, pH of the solution, ionic medium, initial metal concentration, other metal ions present and ligands were studied in batch experiments at 20 degrees C. Maximum sorption for both metals was found to occur at an initial pH of around 5.5. The equilibrium process was described well by the Langmuir isotherm model, with maximum grape stalk sorption capacities of 0.241 and 0.248 mmol g(-1) for Pb(II) and Cd(II), respectively, at pH around 5.5. Kinetic studies showed good correlation coefficients for a pseudo-second-order kinetic model. The presence of NaCl and NaClO(4) in the solution caused a reduction in Pb and Cd sorption, the latter being more strongly suppressed. The presence of other metals in the uptake process did not affect the removal of Pb, while the Cd uptake was much reduced. HCl or EDTA solutions were able to desorb lead from the grape stalks completely, while an approximately 65% desorption yield was obtained for cadmium. From the results obtained it seems that other mechanisms, such as surface complexation and electrostatic interactions, must be involved in the metal sorption in addition to ion exchange.
Japanese big boobs tits Smoking hot women nude I know this to be true because it happened to me, from total scratch I had never written for money before in my life until I did this technique. Faith is the theological virtue by which we believe in God and all that he has revealed to us and that the Church proposes for our belief because God is Truth itself. Before playtime each day, they plan a role for themselves during an imaginary trip to the beauty shop, barber shop or library, represented by play structures along the walls. Katia nude pics. Japanese big boobs tits. Not only did she check my phone but actually sent text messages from my phone while i was asleep to a number which she thought was a co-worker I was involved with. But attention from one woman in a committed relationship does nothing for an emotional unstable male, but make him even MORE insecure. Full Story More UNT News UNT rehabilitation and addiction faculty member honored by national association DENTON UNTTexas - Rachita Sharma, instructor and clinical coordinator in the University of North Texas' Department of Rehabilitation and Health Services, has received the President's Award from the National Association of Multicultural Rehabilitation Concerns. It is hardly a con- solation to female victims of male brutality that men's aim is not to eliminate all women. It supposes he knows his business, so he decided to bring cash with him for good purchase instead of make a bank transfer, he said it was easy and faster in that way. He was not too pleased with the cruelty and unprincipledness that was cooling her eyes when Katerina talked about the emotional side of their life. Imagine while I was with Hermione all the time waiting for, when she finally ceases to crack about studying and about her books. Ask yourself how long it would take you to get over something you feared greatly. Irene does not love Horace Vandergelder and declares that she will wear an elaborate hat to impress a gentleman "Ribbons Down My Back". Back to Usagi, who has decided to sneak into the grounds of Rose Mansion and spy on the seminar from a tree. This opportunity is set for those people who were thinking of how to become rich and famous as a Son Of Doom of the great Illuminati contact us now and be fully Initiated so we can tell you the nearest branch you can worship, come now to get In Touch with Wealth and Power there is nothing to fear about, we disclose it openly as because of those interested who has not gotten opportunity to join this is why we sent agents for Recruitment. Difficult, if not impossible to change, as it is a part of someone's psychological identity. I told you that the journalist will hit the Dark Lord and was right, Scott finished his speech in a satisfied tone and looked at me with an expressive look. The Commission believes firms may have senior compliance personnel perform this task. Video lesbian trib. Here's a book with a fun and inventive answer to the question, "Where did the dinosaurs go. It can be a petition for pardon or also a humble and trusting petition for all our needs either spiritual or material. Tiger woods women nude Hot naked disney stars 185 Sexy girl birthday images Xxx college pussy Beautiful girl giving a blowjob Katia nude pics I am so full of regret over the past that sometimes it makes me so angry and bitter at myself. I follow all the wonderful events, products and I get to lead the meditation nights!. Instead of ideology, vision, and cohesion structuring such a party, we now see Act driven by desperation, bitter rivalries, free-flowing allegations, infighting and dirty tricks. Susan ward tits. Block the person from contacting you on the site Cease contact immediately, do not engage in messaging with them, and don't look back If the person has already engaged in what could be criminal activity, gather all data on how to locate and identify them and report it to the proper authorities. A journalist can get angry, and then he will release another article about the Lord that he does not like. Except that the amount of power it takes to actually change, modify, or upgrade anything worthwhile is beyond his abilities. This way you know that bringing home your new pet will be more of a minor adjustment period, rather than an agonizing project. Encore Theme: One of the most Successful Players thriving in the global Banking and Finance Services Space Breakneck advancements in technology has redefined the functions in Banking and. But did not understand that refusing to show fear, only strengthens the anger of her husband. Remembering how many times for today his son finished in her holes, Natasha laughed, assuring that tonight Dima will be fast asleep. Print MediaThe Arts in Public EducationAre the arts a necessary thing in public education or are they not worth the time and money needed. In some ways you may even sympathize with him and believe his neighbors have no business getting so overly emotional regarding his decision. Let's hurry forward, otherwise it will block the course behind itself. Tom Sherbourne is a lighthouse keeper on Janus Rock off the western coast of Australia and had served as on officer in WWI. The last story in the series startled me with one of the most redemptive scenes of Christ-like love that I have read. FIRMLY IMPLANTED in my mind is the image of Hot Tuna as an amazingly good, all electric jam band. Japanese big boobs tits. Isabella rossellini lesbian. I am going on to train to be a Journalist, I have a lovely husband who cares for me loves me, and would not leave me and she can have a lovely house furnished out of pity because his parents feel guilty for the way he has treated her but I will always have the one thing she will never ever have a stable, trustworthy relationship without insecurity, money cannot buy that can it?. A short story by the Orange Prize-winning author Chimamanda Ngozi Adichie Chimamanda Ngozi Adichie The Observer Two women caught up in a violent street riot take shelter in an abandoned shop. Even so, the trio is definitely interested in more than simply helping out with the wedding but can they win Melody over.
Why are you not “more” abundant? Why do you think you’re not more abundant? Why are you not making the money you want? I used to wonder and worry about this too, to be honest, a lot. A whole lot. I knew I had a gift, and knew my stuff, in fact, I even trusted my expertise. And people with less knowledge and expertise were doing it. Why wasn’t I? And then I had my breakthrough moment. I got it. You can’t make more money – or attract wealth and abundance into your life – if you have this one belief: “You don’t deserve it”. Yep, you don’t make more money because somewhere you don’t believe you deserve it. You may be convinced you do. You may be protesting right now; “That’s not true, I think I deserve it!” Notice the word think here, you think you have. But thinking is an intellectual process, which is not the level at which beliefs get resolved. But until you have separated your true self from your false beliefs, your fear, and reprogrammed your subconscious mind, you will fail at some level. This “I don’t deserve it”, or “I’m not worthy of it” or “I’m not good enough” presupposition is the foundation of your limiting beliefs that keep you tied to your financial situation. Here are some disguises of this self-limiting belief that is blocking you from realizing your financial dreams right now: You tell yourself you’re “fine” with your finances. You don’t think it’s possible given your situation. You think money is evil, or bad or non-spiritual. You think money will turn you into someone you don’t want to be. Or it will somehow change you. You believe you’ll lose friends, who may buy into any of the previous beliefs. (And I have – I had to feel the loss yes, and ask myself how good a friend could they really have been?) You feel guilty about wanting money and abundance. You’re stuck in playing the blame game. It’s so and so’s fault. You’re scared because what if you are successful and make money, and you’re still unhappy. You think maybe you’re just a dissatisfied kind of person. You think you’re not resourceful enough, you’re just not good at it. Or you don’t know how to make more money but you won’t get expert support and guidance. You think you should be able to do it on your own. I have excellent news, though. These self-limiting beliefs come from your ego, your fear, your programming. Not the core of you, the truth of you. And our power always lies in the truth. And it’s true, the truth will set us free… My breakthrough was a decision. I decided I was worth it, just that, simple, but not easy. I decided. I realized that no fairy Godmother was ever going to come and wave her magic wand and I’d know I was worthy. No benevolent soul was ever going to believe in me enough for me to believe I was worthy, or enough or lovable. Only I could do that. It was my job and my responsibility. That meant deciding I was worth the abundance I visualized, and that I am capable of creating it while staying true to my core values which for me are non-negotiable. This meant stepping out of my comfort zone. A lot. Taking fearless action, being willing to listen to my heart, not my head. I’ve had to take chances and risk failure and learn to deal with success. At times I’ve been terrified, wanted to quit, felt all alone, but it’s been so worthwhile. To embrace freedom and fully accept responsibility for the life I’m creating. To honour my souls two greatest callings – for growth and contribution. To embrace freedom and say yes to me, to life. To contribute to women reaching their freedom and success, joy and fulfilment. To partner with them in going from feeling trapped to being free. This is my passion, and my purpose, this gives my life meaning. “It is not what we get. But who we become, what we contribute … that gives meaning to our lives.” – Tony Robbins.
UPDATE Monday, Sept. 16, 2019: Gov. Kate Brown signed the bill. The Oregon House on Wednesday passed a hate crime bill that would make the offense a felony and require statewide documentation of reported incidents. Senate Bill 577 now heads to Gov. Kate Brown’s desk. She is expected to sign it. The House voted 59-0 to pass the bill, with one lawmaker excused. It won bipartisan support in the state Senate last week. The bill also changes the name of the charge from “intimidation’’ to bias crime and adds gender identity as a protected class. It marks the first major changes to Oregon’s 1981 intimidation statute, which many called outdated. The bill resulted from a task force that Oregon Attorney General Ellen Rosenblum convened last summer to identify gaps in the investigation of hate-related crimes and support for victims. People who report encounters that don’t rise to a hate crime that can be prosecuted will be referred to local services, a hate crimes hotline or a hate crimes response coordinator in the state Department of Justice. The bill also would require all police agencies to better document reports of alleged hate crimes, even if they don’t result in arrests, and share that material with the state Criminal Justice Commission. District attorneys’ offices would have to track their hate crime caseloads and report to the state who is prosecuted, who is convicted, the sentences issued and rates of recidivism. Rep. Jennifer Williamson, D-Portland, said passing the legislation would serve as an appropriate tribute just over 30 years after the killing of Mulugeta Seraw, a 28-year-old Ethiopian immigrant who was surrounded and bludgeoned to death with a baseball bat by three skinheads on a Southeast Portland street on Nov. 13, 1988. Rep. Janelle Bynum, D-Clackamas, said she didn’t need data to know that hate crimes occur in Oregon. “You can ask any black or brown person on any corner, ‘Do hate crimes exist?’ They’ll tell you in an instant these crimes exist. They’re happening every day,’’ she said. Bynum said she hopes there’s funding to make sure police and victim advocates respond quickly and effectively to those who report the crimes. The bill calls for up to $201,380 in federal grant money and $46,453 from the general fund to support the Justice Department’s victim services division. It also provides $235,476 for the state Criminal Justice Commission. The money will support the hiring of a hate crimes coordinator in the Justice Department, a research analyst for the state justice commission and allow for law enforcement training. -- Maxine Bernstein Email at mbernstein@oregonian.com Follow on Twitter @maxoregonian Visit subscription.oregonlive.com/newsletters to get Oregonian/OregonLive journalism delivered to your email inbox.
CableTV.com Recommends DIRECTV for your TV service Wouldn’t it be great if there was a simple and fast way to compare cable companies and other paid television services available in your area? The data from independent consumer surveys can help. The research shows that DIRECTV is ranked as the best TV service provider out of all the satellite TV or cable companies in Niles, MI. It can be surprisingly difficult to determine which is the best cable company in Niles, MI. Finding a well-priced package is always a priority, but you also need to consider other important details, like the quantity and quality of the channels being offered. Major national networks are usually available regardless of your location, but smaller channels that are available in neighboring towns may not be included with comparable TV packages in Niles. But with the right premium package, you’ll get all the channels you need, allowing you to easily watch your favorite shows, the hottest movies, and full coverage of your and Detroit Lions games. We’ve compiled data about the highest rated providers available in Niles—including info on channel selections, premium features, and more—so you’ll be able to find the service that best fits your needs. Customer service and dependability are just as important as channel selection when it comes to finding the right TV provider. That’s why CableTV.com includes both of these factors in their ratings of Niles TV providers. By following our recommendations for the best cable company in Niles, MI, you can easily find a superior TV package that meets your demands and comes with excellent customer service. CableTV.com Recommends Internet Service from AT&T Internet The ratings are in, and of all the Internet service providers available in Niles, MI, AT&T Internet ranks ahead of the competition.When CableTV.com ranks Internet providers in Niles, MI, one of the first things we evaluate are the providers’ speeds. The providers who top the list tend to deliver speeds that match or outdo Michigan’s average speed of 29 Mbps. However, it’s important to remember that Internet providers often offer different speeds in different locations. That’s why you should always make sure that the company you choose offers the speeds that you need in your area. Start Saving with a Bundle Does saving $100 or more every year on your cable TV package and Internet service sound good to you? Take a look at some of the Internet and TV bundles available in Niles to get an idea of what you could save. When you get your services from the same company, TV and Internet bundles can save you a bundle. CableTV.com will Show you the Best Deals on TV and Internet services If you’re looking for information to compare TV provider options in Niles, MI, look no further than CableTV.com. Choosing the right Internet and TV services can be a daunting process, especially in Niles. But with the insight and ratings provided by CableTV.com, it’s easier than ever to choose your TV provider. So whether you need access to customer reviews, special packages details, info on promotional offers, and pricing data—you can get it all with CableTV.com. CableTV.com Recommends XFINITY TV from Comcast for your TV service Wouldn’t it be great if there was a simple and fast way to compare cable companies and other paid television services available in your area? The data from independent consumer surveys can help. The research shows that XFINITY TV from Comcast is ranked as the best TV service provider out of all the satellite TV or cable companies in Niles, MI. It can be surprisingly difficult to determine which is the best cable company in Niles, MI. Finding a well-priced package is always a priority, but you also need to consider other important details, like the quantity and quality of the channels being offered. Major national networks are usually available regardless of your location, but smaller channels that are available in neighboring towns may not be included with comparable TV packages in Niles. But with the right premium package, you’ll get all the channels you need, allowing you to easily watch your favorite shows, the hottest movies, and full coverage of your and Detroit Lions games. We’ve compiled data about the highest rated providers available in Niles—including info on channel selections, premium features, and more—so you’ll be able to find the service that best fits your needs. Customer service and dependability are just as important as channel selection when it comes to finding the right TV provider. That’s why CableTV.com includes both of these factors in their ratings of Niles TV providers. By following our recommendations for the best cable company in Niles, MI, you can easily find a superior TV package that meets your demands and comes with excellent customer service. The ratings are in, and of all the Internet service providers available in Niles, MI, DishNET Satellite Internet ranks ahead of the competition.When CableTV.com ranks Internet providers in Niles, MI, one of the first things we evaluate are the providers’ speeds. The providers who top the list tend to deliver speeds that match or outdo Michigan’s average speed of 29 Mbps. However, it’s important to remember that Internet providers often offer different speeds in different locations. That’s why you should always make sure that the company you choose offers the speeds that you need in your area. Start Saving with a Bundle Does saving $100 or more every year on your cable TV package and Internet service sound good to you? Take a look at some of the Internet and TV bundles available in Niles to get an idea of what you could save. When you get your services from the same company, TV and Internet bundles can save you a bundle. CableTV.com will Show you the Best Deals on TV and Internet services If you’re looking for information to compare TV provider options in Niles, MI, look no further than CableTV.com. Choosing the right Internet and TV services can be a daunting process, especially in Niles. But with the insight and ratings provided by CableTV.com, it’s easier than ever to choose your TV provider. So whether you need access to customer reviews, special packages details, info on promotional offers, and pricing data—you can get it all with CableTV.com.
// NeL - MMORPG Framework <http://dev.ryzom.com/projects/nel/> // Copyright (C) 2010 Winch Gate Property Limited // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU Affero General Public License as // published by the Free Software Foundation, either version 3 of the // License, or (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see <http://www.gnu.org/licenses/>. #include "std3d.h" #include "nel/3d/surface_light_grid.h" #include "nel/misc/common.h" #include "nel/3d/ig_surface_light.h" #include "nel/misc/fast_floor.h" #include "nel/3d/light_influence_interpolator.h" #include "nel/3d/point_light_named.h" #include "nel/3d/scene_group.h" using namespace NLMISC; #ifdef DEBUG_NEW #define new DEBUG_NEW #endif namespace NL3D { // *************************************************************************** CSurfaceLightGrid::CSurfaceLightGrid() { /* *********************************************** * WARNING: This Class/Method must be thread-safe (ctor/dtor/serial): no static access for instance * It can be loaded/called through CAsyncFileManager for instance * ***********************************************/ Width= 0; Height= 0; } // *************************************************************************** void CSurfaceLightGrid::serial(NLMISC::IStream &f) { /* *********************************************** * WARNING: This Class/Method must be thread-safe (ctor/dtor/serial): no static access for instance * It can be loaded/called through CAsyncFileManager for instance * ***********************************************/ (void)f.serialVersion(0); f.serial(Origin); f.serial(Width); f.serial(Height); f.serial(Cells); } // *************************************************************************** void CSurfaceLightGrid::getStaticLightSetup(NLMISC::CRGBA sunAmbient, const CVector &localPos, std::vector<CPointLightInfluence> &pointLightList, uint8 &sunContribution, CIGSurfaceLight &igsl, NLMISC::CRGBA &localAmbient) const { // Get local coordinate to the grid. float xfloat= (localPos.x - Origin.x) * igsl.getOOCellSize(); float yfloat= (localPos.y - Origin.y) * igsl.getOOCellSize(); sint wCell= Width-1; sint hCell= Height-1; // fastFloor: use a precision of 256 to avoid doing OptFastFloorBegin. sint wfixed= wCell<<8; sint hfixed= hCell<<8; sint xfixed= NLMISC::OptFastFloor(xfloat * 256); sint yfixed= NLMISC::OptFastFloor(yfloat * 256); clamp(xfixed, 0, wfixed); clamp(yfixed, 0, hfixed); // compute the cell coord, and the subCoord for bilinear. sint xCell, yCell, xSub, ySub; xCell= xfixed>>8; yCell= yfixed>>8; clamp(xCell, 0, wCell-1); clamp(yCell, 0, hCell-1); // Hence, xSub and ySub range is [0, 256]. xSub= xfixed - (xCell<<8); ySub= yfixed - (yCell<<8); // Use a CLightInfluenceInterpolator to biLinear light influence CLightInfluenceInterpolator interp; // Must support only 2 light per cell corner. nlassert(CSurfaceLightGrid::NumLightPerCorner==2); nlassert(CLightInfluenceInterpolator::NumLightPerCorner==2); // Get ref on array of PointLightNamed. CPointLightNamed *igPointLights= NULL;; if( igsl._Owner->getPointLightList().size() >0 ) { // const_cast, because will only change _IdInfluence, and // also because CLightingManager will call appendLightedModel() igPointLights= const_cast<CPointLightNamed*>(&(igsl._Owner->getPointLightList()[0])); } // For 4 corners. uint x,y; uint sunContribFixed= 0; uint rLocalAmbientFixed= 0; uint gLocalAmbientFixed= 0; uint bLocalAmbientFixed= 0; uint wLocalAmbientFixed= 0; for(y=0;y<2;y++) { for(x=0;x<2;x++) { // Prepare compute for PointLights. //------------- // get ref on TLI, and on corner. const CCellCorner &cellCorner= Cells[ (yCell+y)*Width + xCell+x ]; CLightInfluenceInterpolator::CCorner &corner= interp.Corners[y*2 + x]; // For all lights uint lid; for(lid= 0; lid<CSurfaceLightGrid::NumLightPerCorner; lid++) { // get the id of the light in the ig uint igLightId= cellCorner.Light[lid]; // If empty id, stop if(igLightId==0xFF) break; else { // Set pointer of the light in the corner corner.Lights[lid]= igPointLights + igLightId; } } // Reset Empty slots. for(; lid<CSurfaceLightGrid::NumLightPerCorner; lid++) { // set to NULL corner.Lights[lid]= NULL; } // BiLinear SunContribution. //------------- uint xBi= (x==0)?256-xSub : xSub; uint yBi= (y==0)?256-ySub : ySub; uint mulBi= xBi * yBi; sunContribFixed+= cellCorner.SunContribution * mulBi; // BiLinear Ambient Contribution. //------------- // If FF, then take Sun Ambient => leave color and alpha To 0. if(cellCorner.LocalAmbientId!=0xFF) { CPointLight &pl= igPointLights[cellCorner.LocalAmbientId]; // take current ambient from pointLight CRGBA ambCorner= pl.getAmbient(); // Add with sun this one? if(pl.getAddAmbientWithSun()) ambCorner.addRGBOnly(ambCorner, sunAmbient); // bilinear rLocalAmbientFixed+= ambCorner.R * mulBi; gLocalAmbientFixed+= ambCorner.G * mulBi; bLocalAmbientFixed+= ambCorner.B * mulBi; // increase the weight influence of igPointLights wLocalAmbientFixed+= 256 * mulBi; } } } // interpolate PointLights. interp.interpolate(pointLightList, xSub/256.f, ySub/256.f); // Final SunContribution sunContribution= sunContribFixed>>16; // Final Ambient Contribution of Ambient Lights CRGBA tempAmbient; tempAmbient.R= rLocalAmbientFixed>>16; tempAmbient.G= gLocalAmbientFixed>>16; tempAmbient.B= bLocalAmbientFixed>>16; // must interpolate between SunAmbient and tempAmbient uint uAmbFactor= wLocalAmbientFixed>>16; // Blend, but tempAmbient.r/g/b is already multiplied by weight. localAmbient.modulateFromuiRGBOnly(sunAmbient, 256 - uAmbFactor); localAmbient.addRGBOnly(localAmbient, tempAmbient); } } // NL3D
Crystal structure and magnetic properties of Cr3Te5O13Cl3. A new chromium tellurite oxochloride, Cr3Te5O13Cl3, has been prepared by solid-state reaction and the crystal structure was determined by single crystal X-ray diffraction. The compound crystallizes in the non-centrosymmetric space group P2(1)2(1)2(1) with the unit cell a = 4.90180(10) Å, b = 17.3394(2) Å, c = 17.5405(2) Å, Z = 4, R1 = 0.0282. The Cr(3+) ions have octahedral [CrO6] oxygen coordination, the Te(4+) ions have one sided [TeO3] and [TeO3Cl] coordinations. The [CrO6] octahedra are edge sharing and form chains extending along [100]. These are connected by corner sharing [TeO3] and [TeO3Cl] groups to form layers parallel to (110). The layers are connected by weak interactions in between Te(4+) in the layers and Cl(-) ions located in between. The compound undergoes antiferromagnetic ordering at ~34 K with a Weiss constant of -230 K. Isothermal magnetization measurements reveal a critical field of about 0.25 T above which the magnetization versus field changes from linear to a Brillouin-like saturation behaviour. The frustration ratio amounts to ~6.8 indicative of sizable competing antiferromagnetic spin-exchange interaction. The dielectric constant ε (6 kHz) amounts to ~7.9 and decreases by about 1% on cooling from 50 K to liquid helium temperatures.
Dimensions of self-concept of pregnant unwed teens. The study examined the self-esteem of pregnant teens enrolled in a program designed to maximize their chances of completing school. The Culture Free Self-Esteem Inventory (Battle, 1981) and the Coopersmith (1981) Self-Esteem Inventory were completed by the teens. The mean score of the group on the Culture Free Total Self Scale was below average in comparison to the norm.
Guy Is Cosplaying As Preston Garvey In Fallout 76 Things have been a little grim for Fallout 76 since (and even before) launch, so some fans are trying to make their own fun with the game. Like RpTheHotrod, who is running around the wastelands of West Virginia pretending to be Fallout 4's Preston Garvey, defender of Settlements. Shame there aren’t any actual settlements in Fallout 76. Or many people who will hear this, since without push-to-talk most folks are playing the game muted. But he’s out there havin’ fun, and that’s all we can ask of those braving the post-apocapyptic wastelands of 2018. In the wake of community and political pressure following the livestreaming of the horrific terrorist attacks at Christchurch on Friday, Australian ISPs have started blocking some sites used to rehost footage of the livestream, including the infamous 8chan image board.
Natal and neonatal teeth: a systematic review of prevalence and management. The purpose of this systematic review was to identify and review the literature concerning natal and neonatal teeth. The literature search was conducted using several databases. Specific terms were used in the search, which includes articles from 1950 to 2011, supplementary searching by hand was also used. Relevant studies were selected according to predetermined inclusion criteria. Studies meeting the inclusion criteria were only found with regards to prevalence and management of natal and neonatal teeth. Prevalence ranged from near 0 to 1:10 while extraction or maintenance of teeth comprised the management options. There is significant need for further research, under specific scientific preconditions, to provide an evidence-based treatment for patients and to determine the prevalence of natal and neonatal teeth more precisely.
<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE stylesheet SYSTEM "dactyl://content/dtd"> <!-- Header {{{1 --> <xsl:stylesheet version="1.0" xmlns="http://www.w3.org/1999/xhtml" xmlns:html="http://www.w3.org/1999/xhtml" xmlns:dactyl="http://vimperator.org/namespaces/liberator" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:exsl="http://exslt.org/common" xmlns:regexp="http://exslt.org/regular-expressions" xmlns:str="http://exslt.org/strings" extension-element-prefixes="exsl regexp str"> <xsl:output method="xml" indent="no"/> <!-- Variable Definitions {{{1 --> <!-- Process Overlays {{{1 --> <xsl:template name="splice-overlays"> <xsl:param name="elem"/> <xsl:param name="tag"/> <xsl:for-each select="ancestor::*/dactyl:overlay/*[@insertbefore=$tag]"> <xsl:apply-templates select="." mode="overlay"/> </xsl:for-each> <xsl:choose> <xsl:when test="ancestor::*/dactyl:overlay/*[@replace=$tag] and not($elem[@replace])"> <xsl:for-each select="ancestor::*/dactyl:overlay/*[@replace=$tag]"> <xsl:apply-templates select="." mode="overlay-2"/> </xsl:for-each> </xsl:when> <xsl:otherwise> <xsl:for-each select="$elem"> <xsl:apply-templates select="." mode="overlay-2"/> </xsl:for-each> </xsl:otherwise> </xsl:choose> <xsl:for-each select="ancestor::*/dactyl:overlay/*[@insertafter=$tag]"> <xsl:apply-templates select="." mode="overlay"/> </xsl:for-each> </xsl:template> <xsl:template match="dactyl:tags[parent::dactyl:document]|dactyl:tag" mode="overlay"> <xsl:call-template name="splice-overlays"> <xsl:with-param name="tag" select="substring-before(concat(., ' '), ' ')"/> <xsl:with-param name="elem" select="self::node()"/> </xsl:call-template> </xsl:template> <xsl:template match="*[dactyl:tags]" mode="overlay"> <xsl:call-template name="splice-overlays"> <xsl:with-param name="tag" select="substring-before(concat(dactyl:tags, ' '), ' ')"/> <xsl:with-param name="elem" select="self::node()"/> </xsl:call-template> </xsl:template> <xsl:template match="dactyl:*[@tag and not(@replace)]" mode="overlay"> <xsl:call-template name="splice-overlays"> <xsl:with-param name="tag" select="substring-before(concat(@tag, ' '), ' ')"/> <xsl:with-param name="elem" select="self::node()"/> </xsl:call-template> </xsl:template> <!-- Process Inclusions {{{1 --> <xsl:template name="include"> <xsl:param name="root-node" select="."/> <xsl:param name="overlay" select="concat('dactyl://help-overlay/', $root-node/@name)"/> <!-- Ridiculous three-pass processing is needed to deal with - lack of dynamic variable scope in XSL 1.0. --> <!-- Store a copy of the overlay for the current document. --> <xsl:variable name="doc"> <dactyl:document> <xsl:copy-of select="document($overlay)/dactyl:overlay"/> <xsl:copy-of select="$root-node/node()"/> </dactyl:document> </xsl:variable> <xsl:call-template name="parse-tags"> <xsl:with-param name="text" select="concat($root-node/@name, '.xml')"/> </xsl:call-template> <xsl:apply-templates select="exsl:node-set($doc)/dactyl:document/node()[position() != 1]" mode="overlay"/> </xsl:template> <xsl:template match="dactyl:include" mode="overlay-2"> <div dactyl:highlight="HelpInclude"> <xsl:call-template name="include"> <xsl:with-param name="root-node" select="document(@href)/dactyl:document"/> </xsl:call-template> </div> </xsl:template> <xsl:template match="@*|node()" mode="overlay"> <xsl:apply-templates select="." mode="overlay-2"/> </xsl:template> <xsl:template match="@*[starts-with(local-name(), 'on')]|*[local-name() = 'script']" mode="overlay-2"/> <xsl:template match="@*|node()" mode="overlay-2"> <xsl:copy> <xsl:apply-templates select="@*|node()" mode="overlay"/> </xsl:copy> </xsl:template> <!-- Root {{{1 --> <xsl:template match="/"> <!-- Ridiculous three-pass processing is needed to deal with - lack of dynamic variable scope in XSL 1.0. --> <xsl:variable name="doc1"> <xsl:call-template name="include"> <xsl:with-param name="root-node" select="dactyl:document"/> </xsl:call-template> </xsl:variable> <xsl:variable name="root" select="exsl:node-set($doc1)"/> <!-- Store a cache of all tags defined --> <xsl:variable name="doc2"> <dactyl:document> <xsl:attribute name="document-tags"> <xsl:text> </xsl:text> <xsl:for-each select="$root//@tag|$root//dactyl:tags/text()|$root//dactyl:tag/text()"> <xsl:value-of select="concat(., ' ')"/> </xsl:for-each> </xsl:attribute> <xsl:copy-of select="$root/node()"/> </dactyl:document> </xsl:variable> <xsl:variable name="root2" select="exsl:node-set($doc2)/dactyl:document"/> <html dactyl:highlight="Help"> <head> <title><xsl:value-of select="/dactyl:document/@title"/></title> <script type="text/javascript" src="resource://dactyl-content/help.js"/> </head> <body dactyl:highlight="HelpBody"> <xsl:apply-templates select="$root2/node()|$root2/@*" mode="help-1"/> </body> </html> </xsl:template> <!-- Table of Contents {{{1 --> <xsl:template name="toc"> <xsl:param name="level" select="1"/> <xsl:param name="context"/> <xsl:param name="toc"/> <xsl:variable name="tag" select="concat('h', $level)"/> <xsl:variable name="lasttag" select="concat('h', $level - 1)"/> <xsl:variable name="nodes" select="$toc/*[ local-name() = $tag and not(preceding::*[local-name() = $lasttag][position() = 1 and not(.=$context)])]"/> <xsl:if test="$nodes"> <ol level="{$level}" dactyl:highlight="HelpOrderedList"> <xsl:for-each select="$nodes"> <li> <a> <xsl:if test="@tag"> <xsl:attribute name="href"><xsl:value-of select="concat('#', substring-before(concat(@tag, ' '), ' '))"/></xsl:attribute> </xsl:if> <xsl:apply-templates select="node()[not(self::dactyl:strut)]" mode="help-1"/> </a> <xsl:call-template name="toc"> <xsl:with-param name="level" select="$level + 1"/> <xsl:with-param name="context" select="."/> <xsl:with-param name="toc" select="$toc"/> </xsl:call-template> </li> </xsl:for-each> </ol> </xsl:if> </xsl:template> <xsl:template match="dactyl:toc" mode="help-2"> <xsl:variable name="TOC"> <context/> <xsl:for-each select="following::dactyl:h1|following::dactyl:h2|following::dactyl:h3|following::dactyl:h4|following::dactyl:h5"> <xsl:copy-of select="."/> </xsl:for-each> </xsl:variable> <xsl:variable name="toc" select="exsl:node-set($TOC)"/> <xsl:if test="//dactyl:toc[1 and self::*]"> <div dactyl:highlight="HelpTOC"> <h2><!--L-->Contents</h2> <xsl:if test="@start"> <xsl:call-template name="toc"> <xsl:with-param name="level" select="number(@start)"/> <xsl:with-param name="toc" select="$toc"/> </xsl:call-template> </xsl:if> <xsl:if test="not(@start)"> <xsl:call-template name="toc"> <xsl:with-param name="toc" select="$toc"/> </xsl:call-template> </xsl:if> </div> </xsl:if> </xsl:template> <!-- Items {{{1 --> <xsl:template match="dactyl:strut" mode="help-2"> <div style="clear: both"/> </xsl:template> <xsl:template match="dactyl:item" mode="help-2"> <div dactyl:highlight="HelpItem"> <xsl:apply-templates select="dactyl:tags|dactyl:spec|dactyl:strut" mode="help-1"/> <xsl:if test="not(dactyl:description/@short)"> <hr style="border: 0; height: 0; margin: 0; width: 100%; float: right;"/> <xsl:if test="dactyl:type|dactyl:default"> <div dactyl:highlight="HelpOptInfo"> <xsl:apply-templates select="dactyl:type|dactyl:default" mode="help-1"/> <div style="clear: both;"/> </div> </xsl:if> </xsl:if> <xsl:apply-templates select="dactyl:description" mode="help-1"/> <div style="clear: both;"/> </div> </xsl:template> <!-- <xsl:template match="dactyl:item/dactyl:spec[position() = last()]" mode="help-2"> <div style="clear: both;"/> <div dactyl:highlight="HelpSpec"><xsl:apply-templates mode="help-1"/></div> </xsl:template> --> <xsl:template match="dactyl:default[not(@type='plain')]" mode="help-2"> <xsl:variable name="type" select="preceding-sibling::dactyl:type[1] | following-sibling::dactyl:type[1]"/> <span dactyl:highlight="HelpDefault"> <xsl:copy-of select="@*[not(starts-with(local-name(), 'on'))]"/> <xsl:text>(default: </xsl:text> <xsl:choose> <xsl:when test="$type = 'string'"> <span dactyl:highlight="HelpString" delim="'"><xsl:apply-templates mode="help-1"/></span> </xsl:when> <xsl:when test="contains($type, 'list') or contains($type, 'map')"> <span dactyl:highlight="HelpString" delim=""><xsl:apply-templates mode="help-1"/></span> <xsl:if test=". = ''"><!--L-->(empty)</xsl:if> </xsl:when> <xsl:otherwise> <span> <xsl:attribute name="dactyl:highlight"> <xsl:choose> <xsl:when test="$type = 'boolean'">Boolean</xsl:when> <xsl:when test="$type = 'number'">Number</xsl:when> <xsl:when test="$type = 'charlist'">String</xsl:when> </xsl:choose> </xsl:attribute> <xsl:apply-templates select="node()" mode="help-1"/> </span> </xsl:otherwise> </xsl:choose>)</span> </xsl:template> <!-- Tag Definitions {{{1 --> <xsl:template match="dactyl:item/dactyl:tags[position() = last()]" mode="help-2"> <div style="clear: right"/> <xsl:call-template name="parse-tags"> <xsl:with-param name="text" select="."/> </xsl:call-template> </xsl:template> <xsl:template match="dactyl:tags" mode="help-2"> <xsl:call-template name="parse-tags"> <xsl:with-param name="text" select="."/> </xsl:call-template> </xsl:template> <xsl:template match="@tag[parent::dactyl:p]" mode="help-2"> <xsl:call-template name="parse-tags"> <xsl:with-param name="text" select="."/> </xsl:call-template> <div style="clear: right"/> </xsl:template> <xsl:template match="dactyl:tag|@tag" mode="help-2"> <xsl:call-template name="parse-tags"> <xsl:with-param name="text" select="."/> </xsl:call-template> </xsl:template> <xsl:template name="parse-tags"> <xsl:param name="text"/> <div dactyl:highlight="HelpTags"> <xsl:for-each select="str:tokenize($text)"> <a id="{.}" dactyl:highlight="HelpTag"><xsl:value-of select="."/></a> </xsl:for-each> </div> </xsl:template> <!-- Tag Links {{{1 --> <xsl:template name="linkify-tag"> <xsl:param name="contents" select="text()"/> <xsl:variable name="tag" select="$contents"/> <xsl:variable name="tag-url" select=" regexp:replace(regexp:replace(regexp:replace($tag, '%', 'g', '%25'), '#', 'g', '%23'), ';', 'g', '%3B')"/> <a style="color: inherit;"> <xsl:if test="not(@link) or @link != 'false'"> <xsl:choose> <xsl:when test="@link and @link != 'false'"> <xsl:attribute name="href">dactyl://help-tag/<xsl:value-of select="@link"/></xsl:attribute> </xsl:when> <xsl:when test="contains(ancestor::*/@document-tags, concat(' ', $tag, ' '))"> <xsl:attribute name="href">#<xsl:value-of select="$tag-url"/></xsl:attribute> </xsl:when> <xsl:otherwise> <xsl:attribute name="href">dactyl://help-tag/<xsl:value-of select="$tag-url"/></xsl:attribute> </xsl:otherwise> </xsl:choose> </xsl:if> <xsl:value-of select="$contents"/> </a> </xsl:template> <xsl:template match="dactyl:o" mode="help-2"> <span dactyl:highlight="HelpOpt"> <xsl:call-template name="linkify-tag"> <xsl:with-param name="contents" select='concat("&#39;", text(), "&#39;")'/> </xsl:call-template> </span> </xsl:template> <xsl:template match="dactyl:pref" mode="help-2"> <a href="http://kb.mozillazine.org/{text()}" dactyl:highlight="HelpOpt" >'<xsl:apply-templates select="@*|node()" mode="help-1"/>'</a> </xsl:template> <xsl:template match="dactyl:t" mode="help-2"> <span dactyl:highlight="HelpTopic"> <xsl:call-template name="linkify-tag"/> </span> </xsl:template> <xsl:template match="dactyl:k" mode="help-2"> <span dactyl:highlight="HelpKey"> <xsl:call-template name="linkify-tag"/> </span> </xsl:template> <xsl:template match="dactyl:kwd" mode="help-2"> <span dactyl:highlight="HelpKeyword"> <xsl:apply-templates select="@*|node()" mode="help-1"/> </span> </xsl:template> <xsl:template match="dactyl:k[@name]" mode="help-2"> <span dactyl:highlight="HelpKey"> <xsl:call-template name="linkify-tag"> <xsl:with-param name="contents" select="concat('&lt;', @name, '>', .)"/> </xsl:call-template> </span> </xsl:template> <xsl:template match="dactyl:k[@mode]" mode="help-2"> <span dactyl:highlight="HelpKey"> <xsl:call-template name="linkify-tag"> <xsl:with-param name="contents" select="concat(@mode, '_', text())"/> </xsl:call-template> </span> </xsl:template> <xsl:template match="dactyl:k[@mode and @name]" mode="help-2"> <span dactyl:highlight="HelpKey"> <xsl:call-template name="linkify-tag"> <xsl:with-param name="contents" select="concat(@mode, '_', '&lt;', @name, '>', .)"/> </xsl:call-template> </span> </xsl:template> <!-- HTML-ish elements {{{1 --> <xsl:template match="dactyl:dl" mode="help-2"> <xsl:apply-templates select="@tag" mode="help-1"/> <dl> <column style="{@dt}"/> <column style="{@dd}"/> <xsl:for-each select="dactyl:dt"> <tr> <xsl:apply-templates select="." mode="help-1"/> <xsl:apply-templates select="following-sibling::dactyl:dd[1]" mode="help-1"/> </tr> </xsl:for-each> </dl> </xsl:template> <xsl:template match="dactyl:link" mode="help-2"> <a> <xsl:choose> <xsl:when test="not(@topic)"/> <xsl:when test="regexp:match(@topic, '^([a-zA-Z]+:|[^/]*#|/)', '')"> <xsl:attribute name="href"><xsl:value-of select="@topic"/></xsl:attribute> </xsl:when> <xsl:otherwise> <xsl:attribute name="href"><xsl:value-of select="concat('dactyl://help-tag/', @topic)"/></xsl:attribute> </xsl:otherwise> </xsl:choose> <xsl:if test="regexp:match(@topic, '^[a-zA-Z]+:', '') and not(starts-with(@topic, 'mailto:') or starts-with(@topic, 'chrome:') or starts-with(@topic, 'resource:') or starts-with(@topic, 'dactyl:'))"> <!-- A regexp does not work for the second test here ↑. :( --> <xsl:attribute name="rel">external</xsl:attribute> </xsl:if> <xsl:apply-templates select="@*|node()" mode="help-1"/> </a> </xsl:template> <xsl:template match="dactyl:hl" mode="help-2"> <span dactyl:highlight="{@key}"><xsl:apply-templates select="@*|node()" mode="help-1"/></span> </xsl:template> <xsl:template match="dactyl:h" mode="help-2"> <em><xsl:apply-templates select="@*|node()" mode="help-1"/></em> </xsl:template> <xsl:template match="dactyl:em | dactyl:tt | dactyl:p | dactyl:dt | dactyl:dd | dactyl:ol | dactyl:ul | dactyl:li | dactyl:h1 | dactyl:h2 | dactyl:h3 | dactyl:h4" mode="help-2"> <xsl:element name="{local-name()}"> <xsl:apply-templates select="@*|node()" mode="help-1"/> </xsl:element> </xsl:template> <xsl:template match="dactyl:code" mode="help-2"> <pre dactyl:highlight="HelpCode"><xsl:apply-templates select="@*|node()" mode="help-1"/></pre> </xsl:template> <!-- Help elements {{{1 --> <xsl:template match="dactyl:a" mode="help-2"> <span dactyl:highlight="HelpArg">{<xsl:apply-templates select="@*|node()" mode="help-1"/>}</span> </xsl:template> <xsl:template match="dactyl:oa" mode="help-2"> <span dactyl:highlight="HelpOptionalArg">[<xsl:apply-templates select="@*|node()" mode="help-1"/>]</span> </xsl:template> <xsl:template match="dactyl:deprecated" mode="help-2"> <p style="clear: both;"> <xsl:apply-templates select="@*" mode="help-1"/> <span dactyl:highlight="HelpWarning"><!--L-->Deprecated:</span> <xsl:text> </xsl:text> <xsl:apply-templates select="node()" mode="help-1"/> </p> </xsl:template> <xsl:template match="dactyl:note" mode="help-2"> <p style="clear: both;"> <xsl:apply-templates select="@*" mode="help-1"/> <div style="clear: both;"/> <span dactyl:highlight="HelpNote"><!--L-->Note:</span> <xsl:text> </xsl:text> <xsl:apply-templates select="node()" mode="help-1"/> </p> </xsl:template> <xsl:template match="dactyl:warning" mode="help-2"> <p style="clear: both;"> <xsl:apply-templates select="@*" mode="help-1"/> <div style="clear: both;"/> <span dactyl:highlight="HelpWarning"><!--L-->Warning:</span> <xsl:text> </xsl:text> <xsl:apply-templates select="node()" mode="help-1"/> </p> </xsl:template> <xsl:template match="dactyl:default" mode="help-2"> <span dactyl:highlight="HelpDefault">(default:<xsl:text> </xsl:text><xsl:apply-templates select="@*|node()" mode="help-1"/>)</span> </xsl:template> <!-- HTML-ify other elements {{{1 --> <xsl:template match="dactyl:ex" mode="help-2"> <span dactyl:highlight="HelpEx"> <xsl:variable name="tag" select="str:tokenize(text(), ' [!')[1]"/> <a href="dactyl://help-tag/{$tag}" style="color: inherit;"> <xsl:if test="contains(ancestor::*/@document-tags, concat(' ', $tag, ' '))"> <xsl:attribute name="href">#<xsl:value-of select="$tag"/></xsl:attribute> </xsl:if> <xsl:apply-templates mode="help-1"/> </a> </span> </xsl:template> <xsl:template match="dactyl:se" mode="help-2"> <xsl:variable name="nodes" xmlns="&xmlns.dactyl;"> <html:span style="display: inline-block;"> <ex>:set</ex> <xsl:text> </xsl:text> <link> <xsl:if test="@link != 'false'"> <xsl:attribute name="topic">'<xsl:value-of select="@opt"/>'</xsl:attribute> </xsl:if> <hl key="HelpOpt"><xsl:value-of select="@opt"/></hl> </link> <xsl:choose> <xsl:when test="@op and @op != ''"><xsl:value-of select="@op"/></xsl:when> <xsl:otherwise>=</xsl:otherwise> </xsl:choose> <xsl:copy-of select="@*[not(starts-with(local-name(), 'on'))]|node()[local-name() != 'script']"/> </html:span> </xsl:variable> <xsl:apply-templates select="exsl:node-set($nodes)" mode="help-1"/> </xsl:template> <xsl:template match="dactyl:set" mode="help-2"> <xsl:variable name="nodes"> <code xmlns="&xmlns.dactyl;"> <se opt="{@opt}" op="{@op}" link="{@link}"> <xsl:copy-of select="@*[not(starts-with(local-name(), 'on'))]|node()[local-name() != 'script']"/> </se> </code> </xsl:variable> <xsl:apply-templates select="exsl:node-set($nodes)" mode="help-1"/> </xsl:template> <xsl:template match="dactyl:description | dactyl:example | dactyl:spec" mode="help-2"> <div> <xsl:if test="self::dactyl:description"><xsl:attribute name="dactyl:highlight">HelpDescription</xsl:attribute></xsl:if> <xsl:if test="self::dactyl:example"><xsl:attribute name="dactyl:highlight">HelpExample</xsl:attribute></xsl:if> <xsl:if test="self::dactyl:spec"><xsl:attribute name="dactyl:highlight">HelpSpec</xsl:attribute></xsl:if> <xsl:apply-templates select="@*|node()" mode="help-1"/> </div> </xsl:template> <xsl:template match="dactyl:type" mode="help-2"> <a dactyl:highlight="HelpType"> <xsl:choose> <xsl:when test="contains(ancestor::*/@document-tags, concat(' ', ., ' '))"> <xsl:attribute name="href">#<xsl:value-of select="."/></xsl:attribute> </xsl:when> <xsl:when test="not(. = 'boolean' or . = 'number' or . = 'string')"> <xsl:attribute name="href">dactyl://help-tag/<xsl:value-of select="."/></xsl:attribute> </xsl:when> </xsl:choose> <xsl:apply-templates select="@*|node()" mode="help-1"/> </a> </xsl:template> <xsl:template match="dactyl:str" mode="help-2"> <span dactyl:highlight="HelpString"> <xsl:apply-templates select="@*|node()" mode="help-1"/> </span> </xsl:template> <xsl:template match="dactyl:xml-block" mode="help-2"> <div dactyl:highlight="HelpXMLBlock"> <xsl:apply-templates mode="xml-highlight"/> </div> </xsl:template> <xsl:template match="dactyl:xml-highlight" mode="help-2"> <div dactyl:highlight="HelpXMLBlock"> <xsl:apply-templates mode="xml-highlight"/> </div> </xsl:template> <!-- Plugins {{{1 --> <xsl:template name="info"> <xsl:param name="label"/> <xsl:param name="link" select="@href"/> <xsl:param name="nodes" select="node()"/> <xsl:param name="extra"/> <div dactyl:highlight="HelpInfo"> <div dactyl:highlight="HelpInfoLabel"> <xsl:value-of select="$label"/>: </div> <span dactyl:highlight="HelpInfoValue"> <a> <xsl:if test="$link"> <xsl:attribute name="href"><xsl:value-of select="$link"/></xsl:attribute> </xsl:if> <xsl:copy-of select="exsl:node-set($nodes)"/> </a> <xsl:copy-of select="exsl:node-set($extra)"/> </span> </div> </xsl:template> <xsl:template match="dactyl:author[@email]" mode="help-2"> <xsl:call-template name="info"> <xsl:with-param name="label" select="'Author'"/> <xsl:with-param name="extra"> <xsl:text> </xsl:text><a href="mailto:{@email}"></a> </xsl:with-param> </xsl:call-template> </xsl:template> <xsl:template match="dactyl:author" mode="help-2"> <xsl:call-template name="info"> <xsl:with-param name="label" select="'Author'"/> </xsl:call-template> </xsl:template> <xsl:template match="dactyl:license" mode="help-2"> <xsl:call-template name="info"> <xsl:with-param name="label" select="'License'"/> </xsl:call-template> </xsl:template> <xsl:template match="dactyl:plugin" mode="help-2"> <xsl:call-template name="info"> <xsl:with-param name="label" select="'Plugin'"/> <xsl:with-param name="nodes"> <span><xsl:value-of select="@name"/></span> </xsl:with-param> </xsl:call-template> <xsl:if test="@version"> <xsl:call-template name="info"> <xsl:with-param name="label" select="'Version'"/> <xsl:with-param name="link" select="''"/> <xsl:with-param name="nodes"> <span><xsl:value-of select="@version"/></span> </xsl:with-param> </xsl:call-template> </xsl:if> <xsl:apply-templates mode="help-1"/> </xsl:template> <!-- Special Element Templates {{{1 --> <xsl:template match="dactyl:logo" mode="help-1"> <span dactyl:highlight="Logo"/> </xsl:template> <!-- Process Tree {{{1 --> <xsl:template match="@*[starts-with(local-name(), 'on')]|*[local-name() = 'script']" mode="help-2"/> <xsl:template match="@*|node()" mode="help-2"> <xsl:copy> <xsl:apply-templates select="@*|node()" mode="help-1"/> </xsl:copy> </xsl:template> <xsl:template match="@*|node()" mode="help-1"> <xsl:apply-templates select="." mode="help-2"/> </xsl:template> <!-- XML Highlighting (xsl:import doesn't work in Firefox 3.x) {{{1 --> <xsl:template name="xml-namespace"> <xsl:param name="node" select="."/> <xsl:if test="name($node) != local-name($node)"> <span dactyl:highlight="HelpXMLNamespace"> <xsl:value-of select="substring-before(name($node), ':')"/> </span> </xsl:if> <xsl:value-of select="local-name($node)"/> </xsl:template> <xsl:template match="*" mode="xml-highlight"> <span dactyl:highlight="HelpXMLTagStart"> <xsl:text>&lt;</xsl:text> <xsl:call-template name="xml-namespace"/> <xsl:apply-templates select="@*" mode="xml-highlight"/> <xsl:text>/></xsl:text> </span> </xsl:template> <xsl:template match="*[node()]" mode="xml-highlight"> <span dactyl:highlight="HelpXMLTagStart"> <xsl:text>&lt;</xsl:text> <xsl:call-template name="xml-namespace"/> <xsl:apply-templates select="@*" mode="xml-highlight"/> <xsl:text>></xsl:text> </span> <xsl:apply-templates select="node()" mode="xml-highlight"/> <span dactyl:highlight="HelpXMLTagEnd"> <xsl:text>&lt;/</xsl:text> <xsl:call-template name="xml-namespace"/> <xsl:text>></xsl:text> </span> </xsl:template> <xsl:template match="dactyl:escape | dactyl:escape[node()]" mode="xml-highlight"> <span dactyl:highlight="HelpXMLText"> <xsl:apply-templates mode="help-1"/> </span> </xsl:template> <xsl:template match="@*" mode="xml-highlight"> <xsl:text> </xsl:text> <span dactyl:highlight="HelpXMLAttribute"> <xsl:call-template name="xml-namespace"/> </span> <span dactyl:highlight="HelpXMLString"> <xsl:value-of select="regexp:replace(., '&quot;', 'g', '&amp;quot;')"/> </span> </xsl:template> <xsl:template match="comment()" mode="xml-highlight"> <span dactyl:highlight="HelpXMLComment"> <xsl:value-of select="."/> </span> </xsl:template> <xsl:template match="processing-instruction()" mode="xml-highlight"> <span dactyl:highlight="HelpXMLProcessing"> <xsl:value-of select="."/> </span> </xsl:template> <xsl:template match="text()" mode="xml-highlight"> <span dactyl:highlight="HelpXMLText"> <xsl:value-of select="regexp:replace(., '&lt;', 'g', '&amp;lt;')"/> </span> </xsl:template> </xsl:stylesheet> <!-- vim:se ft=xslt sts=4 sw=4 et fdm=marker: -->
Keep up with new strains, products, trends, and deals with Leafly’s curated cannabis newsletter. Please enter a valid email address and try again. By submitting this form, you will be subscribed to news and promotional emails from Leafly and you agree to Leafly’s Terms of Service and Privacy Policy. You can unsubscribe from Leafly email messages anytime. New Strains Alert: Purple People Eater, Diamond Socks, Bloo’s Kloos, and More This week’s New Strains Alert is part old school and part new school genetics, many of which were submitted by Leafly users. These cannabis strains illustrate how we, the cannabis community, appropriate parts of our history—whether from television or music, art or science, we pay homage to the green giants whose shoulders we stand upon. Leafly is growing thanks to you: the farmer, the scientist, the lawyer, the activist, the outspoken, the patient, the connoisseur. With the 4th of July behind us and 710 in front of us, the cannabis community has plenty of reasons to keep celebrating. Cheers! Colorado Seed Inc. pays homage to new school and old school genetics in Cello Sweet OG. This cross combines DJ Short’s Flo, a living cannabis virtuoso, and Secret Garden OG, CO Seed’s Kush bomb, to create a connoisseur-quality strain with potency and dimension. With effects that range from cerebral to sedative, this strain contains movements like a symphony, rising into a meditative mind with a decrescendo into full-body relaxation. Bloo’s Kloos is a playful indica with a carefree buzz that encourages laughter. This three-way cross of Larry OG, Blueberry, and Northern Lights imbues Bloo's with earthy and fruity terpenes that turn sweet when consumed. Created by Mr. Mack out of Las Vegas, this strain leaves the mind clear and the body free of aches and pains. Diamond Socks, named for the dense layer of trichomes coating the plant (and a juicy reggae track), is an invigorating hybrid with roots in a rare strain of Hawaiian Silverback. The structure and growth pattern is indicative of its Kush genetics, leading to a handsome yield and aromatic floral overtones. Hit this mid-range flower for a buzz that is active in the mind and relaxed in the body. This strain is another Hawaiian rarity stabilized and transplanted by Colorado Seed Inc. Purple People Eater is the lanky indica-dominant cross of (Lapis Mnt. Indica x GDP) x (Afghan x Purple Urkle) that has been known to produce green and purple buds that smell pungent and earthy. These multifaceted buds are herbaceous with a flavor of sweet grape. Enjoy this strong sedative at the end of the day to soothe physical discomfort and restlessness. Mekamika Haze won Best Sativa at the 2015 Amsterdam Unity Cup. This pure landrace sativa supposedly hails from the Amazon and shares genetics with another mysterious strain, Mango Rossa (Manga Rosa from Brazil). The bright, lanky sativa is a challenge to grow, but attentive farmers are rewarded with beautiful buds that smell of tropical citrus and mango with pungent, earthy undertones. Frisian Duck is a structurally unique strain developed by Dutch Passion. Its genetics were bred over several generations of Frisian Dew x Duckfoot. The genetics from Duckfoot (named for its oddly shaped leaves that resemble duck feet) allows this plant to hide in plain sight, making it ideal for outdoor grows. Frisian Duck is also rather hardy and able to thrive in harsh growing conditions. Expect pepper and pine on the nose with buds that vary in appearance from light blue to purple. Secret Garden OG is a Colorado Seed Inc. masterpiece. This OG strain is incredibly relaxing and dedicated to Kush fans everywhere. The blend of Lavender parentage against a Ghost OG Moonshine x Rug Burn OG foretells the weight this strain applies to muscles throughout the body. With a unique aroma that leans toward the therapeutic, Secret Garden OG offers a cozy sense of well-being that extends to mood elevation and pain relief. By submitting this form, you will be subscribed to news and promotional emails from Leafly and you agree to Leafly's Terms of Service and Privacy Policy. You can unsubscribe from Leafly email messages anytime.
TBS Caipirinha 2 PNP Flying Wing. At Only 93cm The TBS Caipirinha 2 PNP Is The Take Anywhere Flying Wing. Up To 90 Mins Flight Time From This Strong Lightweight EPP Flying Wing. Includes All The Parts Needed To Fly, Just Add Battery & Radio TBS Caipirinha 2 PNP Flying Wing. At Only 93cm The TBS Caipirinha 2 PNP Is The Take Anywhere Flying Wing. Up To 90 Mins Flight Time From This Strong Lightweight EPP Flying Wing. Includes All The Parts Needed To Fly, Just Add Battery & Radio The ImmersionRC Vortex 250 Pro system can be customised with different colours, this Black kit allows you to add coloured parts to your Vortex for a custom look. There might also be times where you will have a need to replace a few parts after a few hard landings, this set of parts are also the most common parts which are replaced.
A bare-breasted statue (not pictured) is being called "lewd" by Utah parents who want their neighbor to remove the sculpture from his yard. CC BY: Gideon April 18, 2011 ADVERTISEMENT A feud is brewing in a Utah neighborhood, where angry parents are trying to get the city to force a neighbor to remove a statue of a bare-breasted woman from his yard. "It's lewd and there's so many little children under 8," one woman told a local newspaper. (See a photo of the statue here.) North Ogden City Manager Ed Dickie says that the local government's hands are tied, and that the statue's owner has the right to keep his art where it is. Is a little artistic nudity harmless, even in a neighborhood packed with kids? The town is wise to butt out: The government can't regulate art, or taste, says the Standard-Examiner in an editorial. So the city manager did exactly the right thing by telling the folks in the neighborhood to work this out among themselves. "These types of disagreements are usually cooled once opposing sides sit down, talk things out, and discover they're not as different as they think.""Stone nude in North Ogden" Tacky or not, the man has a right to his statue: This semi-nude goddess is "not my taste in garden decor," says Jessica Oberay, a neighbor of the statue owner, as quoted by ABC 4. But even if this statue leaves parents blushing and kids giggling, it's art. And art is about freedom of expression. That trumps angry parents every time."Nude statue upsets residents"
The imaging of a point-type light source onto a detector is a general problem in optical metrology. If light of all colors is to have the most equal propagation times possible, the light path must run through only a limited distance in refractive material. This is particularly important if the process is carried out in the blue region or even in the near-UV region and a time window Δt≦100 fs (fs=10−15 s) is to be cut out across all colors simultaneously. Such arrangements are required in ultrafast spectroscopy. One typical example that may be mentioned is the so-called optical Kerr switch, which is used in time-resolved fluorescence spectroscopy and in Raman spectroscopy. Another example is the so-called “fluorescence upconversion” for the simultaneous observation of all relevant wavelengths. The present invention relates in particular to all types of optical spectroscopy, including in conjunction with microscopy, which aim to achieve sub-picosecond time resolution of measurement light, be this spontaneously emitted light or transmitted light, preferably using an optical switch, wherein the latter is arranged between two crossed polarizers for the purpose of effective functioning. The cancellation ratio ε=T∥/T⊥ of the first polarizer to the subsequent polarizer (“analyzer”; T∥,⊥=transmission of the parallel or perpendicular setting) defines the signal-to-noise ratio (S/N), i.e. the sensitivity of the respective measurement. The highest level of cancellation, εGLP>106, can be achieved with Glan polarizers (GLPs). These function as a result of birefringence in calcite crystals; their thickness is in principle approximately the same size as the width of the entry window, and the light beams may differ from the window normal in an acceptance angle of only up to ±2.5°. Glan polarizers are therefore used only in the parallelized beam path. If a lot of light is to be collected, the parallelized beam diameter is naturally large, and so too then is the thickness of the calcite to be traversed, which limits time resolution and simultaneity. FIG. 2 analyses by how many picoseconds the light follows (lags behind) a reference pulse at 400 nm in the case of different wavelengths. For this it has been assumed that a 10 mm GLP is traversed. It can be seen that the spectral region from 320 nm to 450 nm which is of interest in biology is spread over a time window of 2.0 ps. For a time window of considerably <1 ps, therefore, the conventional type of GLP cannot be used. The arrangements which are customary at present therefore use so-called wire grid polarizers (WGPs), the glass substrate of which may be less than 1 mm thick. However, the cancellation ratio thereof is only approximately εWGP≈103-104, three orders of magnitude below the cancellation that can be achieved with GLPs. The sensitivity of a polarization-dependent measurement is accordingly lower. For example, the S/N of time-resolved fluorescence spectroscopy using a Kerr switch is limited mainly by this shortcoming. The observation of rapidly changing colors, be it during absorption or fluorescence measurements, is a frequently recurring measurement task. “Rapidly” in this connection means a time resolution of as far as possible less than 100 fs. In a fluorescence measurement (cf. L. Zhao et al., PCCP 7, 1716, 2005), a WGP, followed by a GLP, is used in order to suppress undesired background.
Dance therapy in patients with chronic heart failure: a systematic review and a meta-analysis. To see whether dance therapy was more effective than conventional exercise in exercise capacity and health-related quality of life (HRQOL) in patients with chronic heart failure. Systematic review and meta-analysis. We searched MEDLINE, Cochrane Controlled Trials Register, EMBASE, SPORT Scielo, CINAHL (from the earliest date available to August 2013) for randomized controlled trials (RCTs), examining effects of dance therapy versus exercise and/or dance therapy versus control on exercise capacity (VO2peak), and quality-of-life (QOL) in chronic heart failure. Two reviewers selected studies independently. Weighted mean differences (WMDs) and 95% confidence intervals (CIs) were calculated, and heterogeneity was assessed using the I(2) test. Two studies met the study criteria (62 dance therapy patients, 60 exercise patients and 61 controls patients). The results suggested that dance therapy compared with control had a positive impact on peak VO2 and HRQOL. Dance therapy resulted in improvement in: peak VO2 peak weighted mean difference (4.86 95% CI: 2.81 to 6.91) and global HRQOL standardized mean differences (2.09 95% CI: 1.65 to 2.54). Non-significant difference in VO2 peak and HRQOL for participants in the exercise group compared with dance therapy. No serious adverse events were reported. Dance therapy may improve peak VO2 and HRQOL in patients with chronic heart failure (CHF) and could be considered for inclusion in cardiac rehabilitation programmes.
Download raw source Delivered-To: john.podesta@gmail.com Received: by 10.25.24.31 with SMTP id o31csp966399lfi; Thu, 19 Feb 2015 21:48:05 -0800 (PST) X-Received: by 10.68.57.228 with SMTP id l4mr13909153pbq.43.1424411283126; Thu, 19 Feb 2015 21:48:03 -0800 (PST) Return-Path: <podesta@law.georgetown.edu> Received: from mail1.bemta7.messagelabs.com (mail1.bemta7.messagelabs.com. [216.82.254.110]) by mx.google.com with ESMTPS id z10si19383530par.206.2015.02.19.21.48.02 for <john.podesta@gmail.com> (version=TLSv1.2 cipher=RC4-SHA bits=128/128); Thu, 19 Feb 2015 21:48:03 -0800 (PST) Received-SPF: none (google.com: podesta@law.georgetown.edu does not designate permitted sender hosts) client-ip=216.82.254.110; Authentication-Results: mx.google.com; spf=none (google.com: podesta@law.georgetown.edu does not designate permitted sender hosts) smtp.mail=podesta@law.georgetown.edu Return-Path: <podesta@law.georgetown.edu> Received: from [216.82.254.83] by server-14.bemta-7.messagelabs.com id 38/CC-02769-E8AC6E45; Fri, 20 Feb 2015 05:47:58 +0000 X-Env-Sender: podesta@law.georgetown.edu X-Msg-Ref: server-15.tower-197.messagelabs.com!1424411277!6788267!1 X-Originating-IP: [141.161.191.74] X-StarScan-Received: X-StarScan-Version: 6.13.4; banners=-,-,- X-VirusChecked: Checked Received: (qmail 10133 invoked from network); 20 Feb 2015 05:47:58 -0000 Received: from unknown (HELO LAW-CAS1.law.georgetown.edu) (141.161.191.74) by server-15.tower-197.messagelabs.com with AES256-SHA encrypted SMTP; 20 Feb 2015 05:47:58 -0000 Resent-From: <podesta@law.georgetown.edu> Received: from mail6.bemta12.messagelabs.com (216.82.250.247) by LAW-CAS1.law.georgetown.edu (141.161.191.74) with Microsoft SMTP Server id 14.3.210.2; Fri, 20 Feb 2015 00:47:56 -0500 Received: from [216.82.249.179] by server-6.bemta-12.messagelabs.com id 29/7D-03161-C8AC6E45; Fri, 20 Feb 2015 05:47:56 +0000 X-Env-Sender: scstone5@hotmail.com X-Msg-Ref: server-10.tower-44.messagelabs.com!1424411274!8513100!1 X-Originating-IP: [65.55.111.79] X-SpamReason: No, hits=0.2 required=7.0 tests=FORGED_HOTMAIL_RCVD, HTML_30_40,HTML_MESSAGE X-StarScan-Received: X-StarScan-Version: 6.13.4; banners=-,-,- X-VirusChecked: Checked Received: (qmail 22109 invoked from network); 20 Feb 2015 05:47:55 -0000 Received: from blu004-omc2s4.hotmail.com (HELO BLU004-OMC2S4.hotmail.com) (65.55.111.79) by server-10.tower-44.messagelabs.com with AES256-SHA encrypted SMTP; 20 Feb 2015 05:47:55 -0000 Received: from BLU181-W1 ([65.55.111.71]) by BLU004-OMC2S4.hotmail.com over TLS secured channel with Microsoft SMTPSVC(7.5.7601.22751); Thu, 19 Feb 2015 21:47:54 -0800 X-TMN: [ASJcEmJ/rDGIW/Qkxhex/RcmCOIFOe3j] X-Originating-Email: [scstone5@hotmail.com] Message-ID: <BLU181-W1EA57E8B3502D3524F981892A0@phx.gbl> Content-Type: multipart/alternative; boundary="_c5ffde23-6591-4273-821c-4b52d994373b_" From: Sean Stone <scstone5@hotmail.com> To: Steve Bassett <prg@paradigmresearchgroup.org> CC: "podesta@law.georgetown.edu" <podesta@law.georgetown.edu> Subject: RE: Podesta Date: Thu, 19 Feb 2015 21:47:53 -0800 Importance: Normal In-Reply-To: <SNT004-MC4F278i7M4B000190bf@SNT004-MC4F27.hotmail.com> References: <BLU436-SMTP1243AD7D6F5303CA6FC314F892D0@phx.gbl>,<SNT004-MC4F278i7M4B000190bf@SNT004-MC4F27.hotmail.com> MIME-Version: 1.0 X-OriginalArrivalTime: 20 Feb 2015 05:47:54.0965 (UTC) FILETIME=[C5D3E050:01D04CD0] --_c5ffde23-6591-4273-821c-4b52d994373b_ Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable I'm actually here until Saturday=2C doing a pilot of a Buzzsaw spin-off for= RT. Had a fascinating meeting with Bob Boyce today=2C who worked at Montauk and= Groom Lake. He won't speak publicly either=2C but he would like to reconn= ect with Edgar Mitchell. I will connect you with the lady he is staying wi= th - Lorie Peters Lauthier=2C who is quite familiar with the work you're do= ing... Best=2CSean This e-mail and its attachments may contain Harbinger Entertainment proprie= tary information=2C which is PRIVILEGED=2C CONFIDENTIAL=2C or subject to CO= PYRIGHT belonging to Harbinger Entertainment. This e-mail is intended solel= y for the use of the individual or entity to which it is addressed. If you = are not the intended recipient of this e-mail=2C or the employee or agent r= esponsible for delivering this e-mail to the intended recipient=2C you are = hereby notified that any dissemination=2C distribution=2C copying=2C or act= ion taken in relation to the contents of and attachments to this e-mail is = STRICTLY PROHIBITED and may be UNLAWFUL. If you have received this e-mail i= n error=2C please notify the sender immediately and permanently delete the = original and any copy of this e-mail and any printout. > Date: Thu=2C 19 Feb 2015 19:47:00 -0500 > To: scstone5@hotmail.com > From: prg@paradigmresearchgroup.org > Subject: Podesta > CC: podesta@law.georgetown.edu >=20 >=20 > >Hey=2C Steve. Are you in DC? If so I'm here for a couple days. Did you=20 > >get my text about John Podesta? >=20 > Yes=2C I have been in DC for a several months. > There is no chance Podesta would do Buzzsaw. He doesn't do any such=20 > shows. He wouldn't do RT. > The only contact info I have for him since he has now left the Center=20 > for American Progress is his Georgetown U. email address. May not be acti= ve. > podesta@law.georgetown.edu >=20 >=20 > BTW=2C noted that Tyrel is getting some quality RT time subbing for Abby.= Cool. >=20 > How long are you in DC? >=20 >=20 = --_c5ffde23-6591-4273-821c-4b52d994373b_ Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable <html> <head> <style><!-- .hmmessage P { margin:0px=3B padding:0px } body.hmmessage { font-size: 12pt=3B font-family:Calibri } --></style></head> <body class=3D'hmmessage'><div dir=3D'ltr'>I'm actually here until Saturday= =2C doing a pilot of a Buzzsaw spin-off for RT.<div><br></div><div>Had a fa= scinating meeting with Bob Boyce today=2C who worked at Montauk and Groom L= ake. =3BHe won't speak publicly either=2C but he would like to reconne= ct with Edgar Mitchell. =3BI will connect you with the lady he is stay= ing with - Lorie Peters Lauthier=2C who is quite familiar with the work you= 're doing...</div><div><br></div><div>Best=2C</div><div>Sean<br><div><br><f= ont style=3D"font-family:Avenir=3Bfont-size:12px=3Bcolor:rgb(153=2C 153=2C = 153)=3B">This e-mail and its attachme</font><font style=3D"font-family:Aven= ir=3Bfont-size:12px=3Bcolor:rgb(153=2C 153=2C 153)=3B">nts may contain Harb= inger Entertainment proprietary information=2C which is PRIVILEGED=2C CONFI= DENTIAL=2C or subject to COPYRIGHT belonging to =3B</font><span style= =3D"line-height:17.040000915527344px=3Bfont-family:Avenir=3Bfont-size:12px= =3Bcolor:rgb(153=2C 153=2C 153)=3B">Harbinger Entertainment. =3B</span>= <font style=3D"font-family:Avenir=3Bfont-size:12px=3Bcolor:rgb(153=2C 153= =2C 153)=3B">This e-mail is intended solely for the use of the individual o= r entity to which it is addressed. If you are not the intended recipient of= this e-mail=2C or the employee or agent responsible for delivering this e-= mail to the intended recipient=2C you are hereby notified that any dissemin= ation=2C distribution=2C copying=2C or action taken in relation to the cont= ents of and attachments to this e-mail is STRICTLY PROHIBITED and may be UN= LAWFUL. If you have received this e-mail in error=2C please notify the send= er immediately and permanently delete the original and any copy of this e-m= ail and any printout.</font><br><br><div>>=3B Date: Thu=2C 19 Feb 2015 19= :47:00 -0500<br>>=3B To: scstone5@hotmail.com<br>>=3B From: prg@paradig= mresearchgroup.org<br>>=3B Subject: Podesta<br>>=3B CC: podesta@law.geo= rgetown.edu<br>>=3B <br>>=3B <br>>=3B >=3BHey=2C Steve. Are you in = DC? If so I'm here for a couple days. Did you <br>>=3B >=3Bget my text = about John Podesta?<br>>=3B <br>>=3B Yes=2C I have been in DC for a sev= eral months.<br>>=3B There is no chance Podesta would do Buzzsaw. He does= n't do any such <br>>=3B shows. He wouldn't do RT.<br>>=3B The only con= tact info I have for him since he has now left the Center <br>>=3B for Am= erican Progress is his Georgetown U. email address. May not be active.<br>&= gt=3B podesta@law.georgetown.edu<br>>=3B <br>>=3B <br>>=3B BTW=2C not= ed that Tyrel is getting some quality RT time subbing for Abby. Cool.<br>&g= t=3B <br>>=3B How long are you in DC?<br>>=3B <br>>=3B <br></div></di= v></div> </div></body> </html>= --_c5ffde23-6591-4273-821c-4b52d994373b_--
Blue Exorcist - The Movie (2012) Rin and his friends, along with the rest of True Cross Academy Town, are in the midst of preparing for a festival that is celebrated only once every 11 years. While the barriers protecting the city from demon intrusions are being repaired, Rin and his twin brother Yukio are sent to the scene of an exorcism as reinforcements. Things take a turn for the worse and as they attempt to salvage their mis
In vivo protection of diisopropylphosphorofluoridate (DFP) poisoning by three bis-quaternary 2 -(hydroxyimino) -N -(pyridin-3-yl) acetamide derivatives in Swiss mice. This study reports efficacy of three bis pyridinium derivatives of 2-(hydroxyimino)- N-(pyridine-3-yl) acetamide in terms of survival, reactivation of brain and serum acetylcholinesterase (AChE) activity in diisopropylphosphorofluoridate (DFP) intoxicated Swiss albino male mice. LD50 of DFP (3.9 mg/kg, s.c.) and new oximes, HNK-102, HNK-106, HNK-111, (282.8, 35.0 and 35.0 mg/kg respectively, i.m.) was determined. Various doses of DFP and oximes as treatment doses with atropine (10 mg/kg, i.p.) were used to determine protection index (PI). For time dependent maximum AChE inhibition, two doses of DFP (0.20 and 2.0 LD50) were chosen. At optimized time i.e. Sixty minutes, IC50 value was calculated as 0.249 and 0.017 LD50 of brain and serum AChE, respectively. Shift of DFP induced brain AChE IC50 curves to right was observed at 0.20 LD50 treatment dose of oximes with respect to 2-PAM. These findings propose that new HNK series of oximes are effective antidote, compared to that of 2-PAM in vivo.
Q: If $A$ has a positive Lebesgue measure then there exist subsets which are not measurable I was thinking if there is a solution to this problem without trying to explicitly create Vitali sets in $A$. Does anyone have any ideas? A: We do not explicitly need to produce a Vitali subset of $A$, but the existence of Vitali sets is all that we need: Theorem. Any set $A\subseteq\mathbb R$ that is not of Lebesgue measure zero has a subset that is not measurable. To see this, note first that if $A$ itself is nonmeasurable, we are done. Assume now that $A$ is measurable. Let $V$ be a Vitali set contained in $[0,1]$, that is, $V\subset[0,1]$ and, for any real $x$, $(x+\mathbb Q)\cap V$ is a singleton. Note that $$ A=\bigcup\{A\cap(q+V)\mid q\in\mathbb Q\}. $$ Now, either one of the sets $A\cap(q+V)$ is nonmeasurable (and we are done), or else they are all measurable, but then all of them have measure zero, and therefore so does $A$: The point is that $A\cap(q+V)$ is measurable iff $(-q+A)\cap V$ is measurable, in which case both have the same measure, but any measurable subset of a Vitali set must be null. This is the usual argument: If $\{r_i\mid i\in\mathbb N\}$ enumerates $\mathbb Q\cap[0,1]$, and $B\subseteq V$ is measurable, then (letting $\lambda$ denote Lebesgue measure) we have that $\lambda(B+r)=\lambda(B)$ for any $r$ but also $$ \sum_i\lambda(B+r_i)=\lambda\bigl(\bigcup_i(B+r_i)\bigr)\le\lambda([0,2])=2. $$ A: I don't think the Vitali construction is useful here. Instead, I'd use the other (Bernstein's?) method of constructing a nonmeasurable set. We need two facts: There are only $2^{\aleph_0}$ closed sets of real numbers. Every closed set of positive measure (in fact every uncountable Borel set but we don't need that) has cardinality $2^{\aleph_0}$. Let $A$ be a set of positive measure. Using the above facts, a straightforward transfinite induction will serve to construct two disjoint sets $B,C\subseteq A$, each of which has nonempty intersection with every closed subset of $A$ which has positive measure. (If you want to, you can just as easily construct a pairwise disjoint family of $2^{\aleph_0}$ such sets instead of only two.) It is easy to see that $B$ and $C$ are nonmeasurable. ($B$ can't have positive measure because it doesn't contain a closed set of positive measure; $A\setminus B$ can't have positive measure for the same reason. Since $A$ has positive measure, this means that $B$ is nonmeasurable.)
Exercise therapy for spondyloarthritis: a systematic review. To evaluate the effects of therapeutic exercise on pain, stiffness, quality of life, physical function, disease activity, health-related fitness and cardiovascular risk factors in adults with spondyloarthritis (SpA). Electronic databases (Cochrane Central Register of Controlled Trials, EMBASE, MEDLINE/PubMed, PEDro, AMED, CINAHL) were systematically searched from inception to October 2013 using medical subject headings and keywords. This was supplemented by searching conference abstracts and a hand search of reference lists of included studies. Randomised and quasi-randomised studies of adults with SpA in which at least one of the comparison groups received an exercise intervention were included. Outcomes of interest were pain, stiffness, quality of life, physical function and disease activity. Secondary outcomes were health-related fitness and cardiovascular risk factors. Two reviewers independently screened studies for inclusion. Methodological quality was assessed by two reviewers using the Cochrane risk of bias tool and the PEDro scale. Twenty-four studies, involving 1,498 participants, were included. Meta-analyses were not undertaken due to clinical heterogeneity, and this review focuses on qualitative synthesis. Moderate evidence supports exercise interventions in improving physical function, disease activity and chest expansion compared to controls; there is low-level evidence of improved pain, stiffness, spinal mobility and cardiorespiratory function. Supervised group exercise yields better outcomes than unsupervised home exercise. The addition of aerobic components to flexibility programmes improves cardiorespiratory outcomes, but not cardiovascular risk factors. The most effective exercise protocol remains unclear. Current evidence suggests that therapeutic exercises are beneficial for adults with ankylosing spondylitis; effects on other SpA subtypes are unknown.
More to click... Lemonade is yummy! Most people like sweet things. Sweetness is detected by the presence of certain molecules – and if you have a slice of lemon in your drink, its bitterness comes from molecules in the lemon too. Receptor cells on your taste buds are looking out for the different taste molecules and if they detect them, they’ll send the information to your brain. Do you like salt and vinegar on your chips? Saltiness and sourness come from types of molecules called salts and acids. Receptors on the taste buds are so sensitive, they can detect the tiniest amounts. So easy on the salt! Thanks for clicking through from the Fun Kids newsletter Using the Fun Kids Website Hello, please go grab Mum, Dad or another grown up to have a read through this. Hi Mum/Dad! We use little files - cookies - that we store on your computer to help personalise our website and allows us to keep track of how you use it. Also, some of the people who help us with the site, to show things like videos or adverts, might do the same. We have a privacy policy that lists all of these people. We only ask for specific personal information when you contact us or enter competitions, we never share this without your agreement.
A sixth-century Irish headache cure and its use in a south German monastery. Medieval headache treatment is largely unknown. Medieval incantations against headache enumerate bodily organs to be protected. One 8th-century Latin hymn from Lake Constance using this device is addressed to St. Aid "mechprech", who has been identified as Aed Mac Bricc, Bishop of Killare, 6th century. This Irish Saint inspired unusual legends by some rather unorthodox activities: He abducted a young girl as hostage while his inheritance was withheld, but at the same time was seen surrounded by angels. He prayed for a nun who was pregnant and made the pregnancy vanish by a miracle, and he replaced the severed heads of maids, men and horses, creating a new spring as a by-product of this operation. Already at his birth his head had hit a stone, leaving a hole in the stone which collected rainwater that cured all ailments. In our own time, such "bullaun stones" are still believed to cure headache in Ireland. According to the legends collected by Plummer and Colgan, St. Aed Mac Bricc was well known for his power to cure headaches. He relieved St. Brigid's headache when she was suffering many miles away, but his most impressive cure was in convincing a headache sufferer that the patient's headache could actually be transferred own head. The headache hymn or incantation is intended to repeat Aed's unique miracle.
TALKIN’ ’BOUT A (R)EVOLUTION | Bears may be common to in the Castro, but chimps take over the Golden Gate bridge in ‘Rise of the Planet of the Apes.’ Andy Serkis’ masterful monkey business is the 800-lb. gorilla in the room making ‘Apes’ worth a look The 1968 film Planet of the Apes was sci-fi at its low-tech best: A human astronaut crash-lands on a world run by talking monkeys in the Iron Age of their society — brutal, feudal, violent. It’s like a Roman sword-and-sandal movie that begins on a spaceship. It’s grimly futuristic and innately visceral, and even today, long after you’ve learned the Big Reveal (the planet is Earth in the future, post nuclear winter), addictively watchable nonsense. Well, Rise of the Planet of the Apes got the nonsense part right, but a few things else as well, though those seem lucked upon. Unlike its progenitor, it’s a Science Gone Mad sci-fi extravaganza, Frankensteinien in its concept of good intentions unregulated by consequences. (To be fair, it’s a fitting update: During the Cold War, we worried about The Bomb; today, anthrax and genetically engineered chemical warfare are far more frightening.) A scientist (James Franco) hopes to develop a drug to cure Alzheimer’s (from which, coincidentally, his dad, John Lithgow, suffers!) but his soulless big pharma employer won’t back him. So James experiments on his own with a genetically superior chimp named Caesar, inventing a miracle drug which contains a supervirus the human body can’t kill off and ruin its therapeutic benefits. (Let’s not get too far ahead of ourselves.) The science scenes, complete with the money-grubbing boss, are about as bad as lazy sci-fi gets (think Splice), and much of the plotting feels recycled from every primate-loving movie from King Kong to Project X. (There are also more chimps in one facility in this movie than are probably in every zoo in North America.) But you soon realize how little all that matters when Andy Serkis gets to do his thing. Serkis played Gollum in the Lord of the Rings films, and Kong in the remake of King Kong — not in a costume, but in a motion-capture suit that precisely reflects his movements, including facial expressions, and converts them into CGI reality. (All the apes in the film are digital.) That means the chimps seem far more human than their masters, with genuine emotions and personalities that rarely register on the cookie-cutter villains. It’s weird to realize you’re rooting for the species that will eventually enslave us. The result is that Franco eventually becomes irrelevant plot-wise, as Rise moves from the category of beauty-of-nature film to Scarface Meets X-Men: Caesar’s so smart, he methodically develops an army of chimps to follow him. (I kept expecting him to say to Franco, “Never ask me about my business.”) Rise isn’t great , but it is entertaining and will probably piss off creationists to no end. That, along with Serkis’ remarkable FX-enhanced performance, is reason enough to see it. This article appeared in the Dallas Voice print edition August 9, 2011.
"Overreacting" considered harmful - bconway http://raganwald.posterous.com/overreacting-considered-harmful ====== molbioguy I used to think that words were just words, logical things with defined meanings. I have come to understand that there really are "poisonous" words; words, phrases, attitudes that absolutely have impacts well beyond their dictionary definitions and the speaker's likely intent. If you include these things when conversations are tense or critical, the situation is likely to destabilize and get worse. Making the conversation "safe" and non-threatening is very important. Steering away from emotional arguments and focusing on facts is also key. All of this is harder to do in any text message or email as well, as body language and other social cues are unavailable. Added: This comes up a lot in employer - employee conversations. If you want your team to function efficiently, you really have to create a safe environment for comments and discussion. ~~~ unalone > I used to think that words were just words, logical things with defined > meanings. Well, they are! But those defined meanings are different for everybody who has a history with the word, and oftentimes you don't know that history going in. The problem with "straight white male" privilege, speaking as a straight white male myself, is that there are words which have _enormous_ baggage for one group or another, yet I've simply never had to deal with such baggage myself. That's where the overreacting canard comes from, and I don't think raganwald fully empathizes with this in his post. Some people simply don't understand why somebody might have a reason to be worked up about a particular issue _because they've never had to care about that issue in their life_. I don't just hear "you're overreacting" from people who can't comprehend that people have bad days sometimes. In fact, assuming that the only reason a situation might be personally charged is because somebody had a bad day can be just as frustrating: it really sucks, I've learned, to be "forgiven" for your bad mood when the forgiver has said something truly offensive. What's difficult, but also truly necessary, is to be able to understand _why_ somebody's reacted the way they have – to be willing to admit to yourself that even if something you said didn't seem egregious to _you_ , that you might have crossed a line somehow that you simply haven't learned to notice. A lot of people forget that in any human-to-human interaction, the logical endpoints are the humans. Language, as all aspects of communication, is human- oriented; using it like it's a logical end unto itself is like trying to use Python phrases in a C script. ~~~ raganwald Excellent, thank you. ------ Millennium I disagree with the assertion that it's impossible to overreact without "deliberately" exaggerating for effect. People overreact all the time without meaning to. Anyone who works with children can tell you that putting things into perspective is a learned skill: we are born overreactors, every one of us. Going too far is, as it turns out, the natural thing to do. ~~~ raganwald I have two children. My five year-old recently was tired and hungry, and had a fit when presented with a croissant to eat because it was slightly crushed where I held it too tightly. Overreacting? Well, that is what I would call an inappropriate reaction, and of course it's part of my job as a parent to provide some guidance. But it's still 100% the genuine emotion of the moment, and for that reason I'm not going to use the word "overreacting" with a child or an adult. I'm going to say (as I said, roughly) "I understand this isn't what you'd like, however..." Which is roughly what I'd say to an adult too. ~~~ Millennium This holds that "genuine" emotional reactions are all equally valid. What makes rage over a slightly-crushed croissant a valid emotional response? There is also a question of what makes the "genuine" qualifier necessary. It presupposes the idea of an emotional response that is not genuine: what would this mean? What would a "false" emotional response look like, to the one feeling it (and are they truly feeling it at all?) or to others? ~~~ DanBC > This holds that "genuine" emotional reactions are all equally valid. What > makes rage over a slightly-crushed croissant a valid emotional response? It was from a five year old. Children haven't learnt how to regulate their emotions. That's part of the job of parenting. ~~~ Millennium That makes it genuine, certainly. Maybe even understandable. But does that mean it's valid? ------ edanm This is a post about word-usage, specifically saying that the word "overreacting" is not a good word to use in conversation, because it carries a lot of emotional baggage and doesn't foster productive conversations. Funny enough for a post about word-usage, I only understood this point after reading half of it. I think this post should've started with this sentence (from the OP, posted as a comment in this thread): "Let me get the thesis of the post out of the way first. The post asserts that the word 'overreacting' is unproductive to discussion." Having said that, I agree with the post and think it makes a very good point. ~~~ raganwald Overly clever author is overly clever. Thank you. ~~~ edanm I was just about to edit my comment to make sure you'd take it in the right spirit (constructive feedback). I should never have doubted you raganwald. ------ F_J_H Another really unhelpful thing to say in these situations is the variant "Calm down". ~~~ raganwald You're being too sensitive about this. ~~~ danielweber What about when a guy has problems checking things into source control and starts throwing things around the office? What about the a guy gets a call from his home monitoring system and starts yelling that his house has burned to the ground? What about a guy who shouts "you aren't my manager and you never will be" to a coworker? I made none of those up. They all happened, from 3 different people. (At the same company, for that matter.) Some people really do overreact and really do need to calm down. The failure for those people to be removed led everyone else to leave. ~~~ aredridel Did telling them so ever help? ------ kstenerud You're ignoring the subtext of the hypothetical tweet. By asking "where are the caramel colored men?", you are implying that there SHOULD be men, which further implies that it's the organizer's fault that there are not. I'd be pretty surprised if such a tactless comment did not offend. ~~~ raganwald In my hypothetical story, she was offended (I used the word "pissed"). And if you agree that this is reasonable, I think this make smy point stronger, that the word "overreacting" is not helpful in having a productive discussion. The end-goal of a productive discussion doesn't have to be me convincing her that there should have been a tall, handsome Canadian on the podium. Perhaps the end-goal could have been her convincing me that I need to see this from a new perspective. Either way, the word "overreacting" is not a good start. That's my thesis. ------ TeMPOraL A million times yes! I find the "overreacting" word incredibly annoying. What it basically amounts to is: "I don't care about you, your feelings or your opinion; I know better and I'm not going to have a rational conversation about it". It's an ugly thing to say, it changes the conversation from discussing objective reality to discussing the validity of someone's emotions. It's a very nasty and saddening kind of dismissal. I can't help but to think less of a person who uses this in a conversation. ------ jrogers65 Your sentiments on overreacting aside, why does it matter what gender or skin colour the speakers have? If they are qualified and best of class then they should be the ones speaking, no? Should we also invite granite rocks to presentations so that they are equally represented? ~~~ raganwald It may not matter at all. Why should there be "Tall, Canadian, Caramel Privilege?" ~~~ jrogers65 I don't really understand where you're going with this. If the best speakers happen to be Asian females then what is the problem, exactly? There is not one caucasian person in the top 10 fastest 100m sprinters (<http://www.toptens.com/sports-track-sprinters/>). Do you believe that this is somehow problematic? Genes and gene expression affect neurotransmitter levels and neurotrophic factors which, in turn, affect cognitive performance - just as Jamaicans and Africans are on average better at sprinting than English and French natives. Particular genetic groupings are going to fare better at task X, not too badly at task Y and terribly at task Z. This is not privilege, it is reality. [http://www.webmd.com/parenting/news/20110809/genes-play- big-...](http://www.webmd.com/parenting/news/20110809/genes-play-big-role-in- intelligence) ~~~ jacalata Are you suggesting that the genetic grouping of white males is scientifically accepted as being a better ruby conference speaker than non-white or non-male people? ~~~ jrogers65 I believe that we're talking about Asian women being at the top of whatever field the conference referenced in the blog post was about. ~~~ jacalata right, I was thinking of the actual incidents that (I assume) prompted this blog post. So you can re-state my question as, "are you arguing that it is likely that Asian women are genetically superior to non-Asian or male people in that field?". ~~~ jrogers65 Well yeah, that's what I'm arguing. Asian women are going to, on average, do better in field X than individuals from other genetic groupings - just as Jamaican men excel at sprinting. Another example: > Different studies have found different results, but most have found above- > average verbal and mathematical intelligence in Ashkenazi Jews, along with > below-average spatial intelligence. Some studies have found IQ scores > amongst Ashkenazi Jews to be a fifth to one full standard deviation above > average in mathematical and verbal tests. [http://en.wikipedia.org/wiki/Ashkenazi_Jewish_intelligence#D...](http://en.wikipedia.org/wiki/Ashkenazi_Jewish_intelligence#Does_a_group_difference_in_intelligence_exist.3F) ~~~ jacalata ok. So to tie this back to the real world examples that came up recently - is there similar evidence for white guys in Ruby? ------ olgeni "At last, the conference drama overshadowed the Rails drama and everybody lived happily ever after."
Comments The Flash Director Says Cyborg Isn’t In The Film Yesterday, Variety reported that Ray Fisher would be reprising his role as Cyborg in The Flash, which stars Ezra Miller and is set to speed into theatres in 2018. It made perfect sense, too, given that various members of the Justice League are starting to show up in each other’s films now that we’re in the process of building up to Zack Snyder’s highly anticipated team up flick. However, it appears that Variety’s report may have been a bit premature, as The Flash director Rick Famuyiwa has called their intel into question: With no confirmation from Warner Bros. one way or the other, it’s hard to tell who to believe here. Variety is usually a pretty reliable source, and Famuyiwa could just be toying with us in hopes of not having the surprise spoiled. Then again, the initial report could be wrong. At this stage, we just don’t know. As we mentioned before though, Cyborg appearing in The Flash wouldn’t surprise us at all, and even if he doesn’t end up making a cameo, it’d be foolish not to expect at least one of the JL members to show up here. After all, both Batman V Superman and Suicide Squad featured surprise appearances and we’re willing to be that Famuyiwa’s film will as well.
This is how Republicans lost the House Rep. Pelosi celebrates new Democratic majority in the House Nancy Pelosi spoke to supporters on November 6, 2018 after it was clear that Democrats would win enough seats in the House of Representatives to retake the majority. By Up Next Nancy Pelosi spoke to supporters on November 6, 2018 after it was clear that Democrats would win enough seats in the House of Representatives to retake the majority. By It was special election day in Pennsylvania’s 18th Congressional District, and the Republican candidate was missing. Never mind that national Republicans were spending millions on the Pittsburgh-area race, desperate to avoid a humiliating defeat in a district that President Donald Trump had won by nearly 20 percentage points. As Republican Rick Saccone’s watch party got underway that March night, according to three sources with direct knowledge, his own campaign couldn’t find him. “We had panicked calls from our folks in the state being like, ‘We can’t find him.’ We were like, ‘Yeah, we have an hour left until he loses,’” said one senior GOP official heavily involved in the national House fight. “It was fitting. At that point, we could just laugh and have a nice little encapsulation of the campaign.” It was just one seat. But Republicans would later recognize it as the beginning of the end. “Rick Saccone was a terrible candidate, but he was still a harbinger of things to come,” said Mark Harris, a Pittsburgh-based GOP strategist. “The suburban wipeout he experienced repeated itself across the country on Tuesday.” This is the behind-the-scenes story of the race for the House. It is based on interviews with more than 30 Republican and Democratic officials intimately involved in the midterm campaign, who described a battle marked by sudden strategic recalculations, Republican finger-pointing and persistent, if private, Democratic anxiety. This reporting revealed that the GOP’s acute panic about 2018 began as early as the weekend of Trump’s inauguration. Internal Democratic data, which has not previously been reported, showed a path to a wholesale realignment of the political parties by summer. And even as Democrats tried to focus their campaigns on pocketbook issues, behind the scenes they were also preparing for Trump’s late push on immigration. Ultimately, Conor Lamb’s victory in that western Pennsylvania district offered a template for the eventual Democratic takeover, as a telegenic, well-funded Marine Corps veteran with no voting record and a profile independent of the national Democratic Party beat out a GOP politician who couldn’t keep up in fundraising. Even in a conservative district, Lamb managed to capitalize on anti-Trump sentiment without fully alienating Republican voters. “Everything became about Donald Trump,” said retiring GOP Rep. Ryan Costello of Pennsylvania. “And we did not find a way to assert a separate identity as a Congress, or more in particular, for those members in competitive districts. “We became victims,” he added, “of the 2016 election.” IT BEGAN EARLY Don’t do town halls. It was advice bordering on directive. And it came from National Republican Congressional Committee officials within the first three weeks following Trump’s inauguration, according to two senior GOP officials closely involved in the House fight. On that January weekend, Republican members of Congress were starting to panic. Anti-Trump women’s marches and other protests were happening across the country, with thousands of people taking to the streets. Spooked members, watching this unfold, hounded GOP leaders including NRCC Chairman Steve Stivers, demanding to know how the party planned to handle the anger on the left. The decision of many members to follow party staffers’ private town hall guidance infuriated their constituents. But GOP officials feared “terrible visuals,” and advised that members do events at VFW halls and hospitals instead — places where protesters would look bad for showing up. Members who insisted on doing town halls received tips such as: don’t enter and exit through the same door; make sure that there’s security, and that attendees are from the district; have someone hold the microphone, in case questions get out of hand. Soon, Republicans had another problem. Rep. Lynn Jenkins of Kansas announced that she wouldn’t seek reelection, the first incumbent from a potentially competitive seat to do so. That kicked off a retirement season that would put dozens of previously safe Republican seats into jeopardy. And it was still only January. Of 2017. “The most decisive moment of the campaign happened in the off year, when an avalanche of Republican incumbents decided to retire,” said John Ashbrook, a seasoned Republican strategist closely involved in the midterm fight. “It’s much, much harder to defend a seat with a brand new candidate in a wave election, than it is to defend an incumbent.” In March 2017, a third problem came into sharp relief: the Republican base was apathetic, and it was Congress’s fault. House Republicans had abruptly pulled a vote on a bill to repeal Obamacare, reneging on a core promise that helped power their GOP majorities in the first place. The damage was immediately clear to insiders. In a special election in Kansas unfolding at that time, according to Republicans watching that race, they lost a net of 16 percentage points on the generic ballot — overnight. Later GOP efforts to make good on their pledge to repeal the health care law would fail, too, further demoralizing their base. And as early as January, Democrats saw that their base’s unbridled enthusiasm would allow the party to compete for dozens of once-unexpected districts. The Democratic Congressional Campaign Committee announced it was targeting 59 seats as potential pickup opportunities. The group’s announcement sparked skepticism, even from within the Democratic Party. “I had a former colleague of mine email me and say to me, ‘I really respect you, think you’re going to do a phenomenal job, and you may have just given yourself enough rope to hang yourself,’” said Dan Sena, executive director of the DCCC. But the aggressive posture was considered necessary by DCCC officials, who wanted to build a much larger battlefield in 2018 than they did in 2016, when House Democrats gained only six seats. To them, the only way the party could succeed amid the chaos of a Trump presidency — and the ever-shifting political environment it produced — was to recruit and support as many quality candidates in as many competitive seats as possible, in the hopes of building multiple paths to victory. “One of the things we learned from ‘16 in particular is [Trump] can shake the snow globe at any point in time,” Sena said. “And as things fall back down to earth, you need a strategy that can really withstand that as all those pieces come back down. “We wanted a strategy that is much larger and much bigger than the building has done before and the Democratic Party has done before,” he added. The DCCC would eventually expand its target list to more than 100 seats. LAMB REWRITES PLAYBOOK Even as Democratic confidence grew over the summer and into the fall of 2017, many of the party’s most senior strategists were still cautious, harboring doubts that would weigh heavily throughout the campaign. Democrats had momentum, despite falling short in a Georgia special election runoff. But a majority of battleground seats still ran through Republican territory where many voters had never backed a Democrat for federal office. “I don’t think that anybody had a doubt that we would pick up seats in the House. But early on, the level of confidence that we’d win a majority was not that high,” said Mike Bocian, a Democratic pollster. “We thought it was possible, and we were hopeful, but we were not sitting there with tremendous confidence.” Then came the scandal that paved the way for Lamb in Pennsylvania. After reports surfaced that Tim Murphy, the conservative congressman from Pennsylvania’s 18th district, had an affair and had encouraged the woman involved to seek an abortion during a pregnancy scare, Murphy announced on Oct. 5 that he would resign. The next month, in an upset, Saccone became the GOP’s nominee for the special election. Republicans were unenthused by Saccone, whose sluggish fundraising and scraggly mustache irritated operatives and members of Congress (the mustache, Republicans say, even came up as a negative in focus groups). But they had a plan: tie Lamb to national Democrats and play up the newly passed tax bill, a two-pronged approach they intended to deploy across the country. Lamb threw a wrench in the first part of their strategy by telling local newspapers on Jan. 8, 2018, that he wouldn’t support Nancy Pelosi as the House Democrats’ leader. Publicly rebuking the polarizing House minority leader, a face of the party and prolific Democratic fundraiser, was a significant risk. But Lamb upped the ante again on Feb. 26 when, in a direct-to-camera ad, he said, “I’ve already said on the front page of the newspaper that I don’t support Nancy Pelosi.” Lamb’s fundraising did not dry up — far from it — and some Republicans now concede that his approach to distancing himself from the national party worked. It would be copied nearly verbatim in races from Ohio to North Carolina throughout the rest of the cycle, as candidates felt similarly emboldened to break with D.C. Democrats. “He said, ‘Hey, I’m not 100 percent in the tank for my side. Know how you know that? I’m not with Pelosi, I don’t support her liberal bulls***. But I also don’t support everything those right-wingers say. We’ll fight the establishment on both sides, together,’” said Andy Surabian, a Republican strategist and former White House official. “Boom. That’s a winning message. That, to me, explains the strength of a lot of these Democrat candidates.” “The process of Pennsylvania 18 is emblematic of this cycle,” added Corry Bliss, the executive director of the super PAC aligned with House GOP leadership, Congressional Leadership Fund. “A member of Congress disgraces himself and is rightfully forced to resign. Then we get saddled with a nominee who is a total embarrassment, and we have to bang our heads against the wall trying to get him elected.” For Democrats who saw parallels between Lamb and many of their other first-time candidates with military backgrounds, Lamb became a case study for the whole election, proof of the potency of so many prized Democratic recruits with compelling biographies. “We were excited about PA-18 because it was an unforeseen way to do a test run of our existing strategy, and see what we could achieve with a good message on health care, a good message on the tax bill, and a fresh-faced veteran,” said Meredith Kelly, the DCCC’s communications director. But what also excited DCCC officials about his victory was how little the GOP-backed tax law appeared to help Saccone. TAX CUT COUNTDOWN After the tax law passed, Democrats publicly predicted electoral disaster for the GOP. But in private, they feared that voters would start to see a larger paycheck and credit Republicans for a strong economy. Sena emphasized that Democrats had been especially concerned about the tax law when it was still being debated in Congress, when they feared its benefits might be slanted more toward the middle class. But even after passage, DCCC officials still warned campaigns that the law would become more popular, and during their Monday meetings before the law took effect, the committee’s leadership would remind themselves when people would start to see a bump in their take-home pay. “We had a countdown clock,” Sena said. “When do people actually see it in their paychecks for the first time?” “There was this moment very early on about, once people have money in their pockets, what’s going to happen to the generic? What happens to everything?” But DCCC officials breathed a sigh of relief when Republicans shifted away from ads about the tax law during the Saccone-Lamb race, turning their message to other issues. Democratic strategists would later argue that the GOP’s attempts to repeal the Affordable Care Act had convinced voters — even before they tried to cut taxes — that Republicans were there to support the wealthy, not the middle class. “Here’s how toxic Republicans are right now: They managed to give people money and f*cked it up anyway,” said Ian Russell, a former senior official at the DCCC now working as a strategist on House races. Republicans strongly dispute that, and indeed many GOP candidates continued to talk about the tax bill in the final days of the campaign, on TV and in campaign appearances. It’s just that they kept getting overshadowed by Trump. The GOP narrowly lost Pennsylvania 18 on March 13. (Saccone, in an interview, didn’t recall his campaign struggling to find him.) But the GOP’s problems weren’t over. On April 11, the House GOP’s biggest retirement of the cycle was announced. Speaker Paul Ryan wouldn’t be seeking reelection either. SUBURBAN STRATEGY SOLIDIFIES For Republicans, summer 2018 highlighted a central tension of the Trump era: good economic news, overshadowed by a barrage of negative headlines. “If the election were in June, we would have kept the House,” Bliss said. “The numbers were good, the economy was good. Then we had a summer of shit.” There was the controversial Trump administration policy of separating families at the border, and the Helsinki summit where Trump appeared deferential to Russian leader Vladimir Putin. Later in the summer, there were indictments of former Trump campaign chair Paul Manafort, and of longtime Trump lawyer Michael Cohen. The bad news wasn’t all about the president, either. One June day, Bliss was at a board meeting, discussing improving Republican prospects. When he walked out of the meeting, he learned that former New York City Mayor Michael Bloomberg planned to spend $80 million on an effort to help deliver Democrats the House (in the final weeks of the campaign, the name that scared Republicans most was Bloomberg, who was in fact putting staggering sums into House races across the map). “That was a perfect example of, nothing’s been easy this cycle,” Bliss said. “It’s been one step forward, two steps back.” For Democrats, meanwhile, it was a summer of suburban opportunity. But it hadn’t always looked that way. Democrats once expected a battle against a “three-headed trident,” as Sena put it, of GOP legislative accomplishments: a tax bill, an infrastructure package and a repeal of Obamacare. (Only the tax law actually materialized.) And despite Hillary Clinton’s strength with moderate, well-educated suburbanites in 2016, some Democrats doubted they could win over those longtime Republican voters down-ticket. That skepticism began to wear off for officials at House Majority PAC, a super PAC with close ties to Pelosi, when it partnered with the Democratic consulting firm Global Strategy Group to conduct a series of conversations with suburban voters who had previously voted for House Republicans but were open to Democrats in 2018. The group had held online discussions with 25 suburban voters followed by in-person focus groups with a similar set of mostly white, college-educated voters in Orange County, Calif., and the Minneapolis suburbs. Even though participants liked some of Trump’s policies and generally credited him for the strong economy, his abrasive style bothered them. “Money can’t buy you class,” one female participant commented. But to take full advantage of the opening the president provided, Democrats also realized they couldn’t rely on anti-Trump messages alone — a change from the party’s strategy in 2016. “Everyone was going to come to their own conclusions about Trump, and nothing we were going to say was going to be the decider in that conclusion,” said Matt Canter, a Democratic operative who worked on the research. They found that these voters would be receptive to messages about protections for people with pre-existing conditions and higher premiums for older Americans — which the AARP branded the “age tax.” And they saw an opening to cast the tax bill as benefiting only the wealthiest Americans and contributing to a growing deficit. The dual focus allowed Democrats to talk about pocketbook issues on their terms, avoiding a larger argument about a growing economy that these targeted suburban voters generally considered strong. These themes would become staples of ads from Democratic outside groups and candidates throughout the campaign. Even liberal groups not normally focused on health care, such as the League of Conservation Voters, were including the issue in ads. House Majority PAC stayed in touch with a network of more than a dozen outside groups with a weekly phone call as it attempted to coordinate messages and spending. “The two moments that mattered were health care and taxes,” said Charlie Kelly, House Majority PAC’s executive director. “Because Trump does what Trump does. It’s just all noise.” By early summer, Democrats were running ahead of or even with Republicans in House Majority PAC’s polling in GOP-held suburban districts across the country, from Colorado to Illinois to Virginia. “All these places kind of solidified, and it was like, wow, this suburban stuff is real,” Kelly said. Democrats concluded that the GOP’s controversial legislative push, combined with constant White House drama, overshadowed Republican efforts to take credit for the strong economy. “If you go to a restaurant and you see the chef chasing around a rat, does it really matter what he puts in front of you?” Sena said. “There’s too much chaos.” By the end of the summer, once-cautious Democrats were starting to believe they were on track to win a majority. MONEY MOVES IN Even Democratic officials didn’t expect their candidates to raise as much cash as they did. The fundraising surge — some candidates were raising more than $3 million in a quarter, sums unprecedented for House candidates — allowed many Democrats to hit the airwaves in August and early September, defining themselves ahead of a coming barrage of Republican attacks. Through September, DCCC officials say they saw negative opinions of Democratic candidates rise much more slowly than their GOP counterparts despite the negative ads, in part because — as Lamb had months earlier — they had the money to run TV ads defending their record. Republicans watching the Lamb race in his newly redrawn Pennsylvania district said that even against Rep. Keith Rothfus, a Republican better-regarded than Saccone, Lamb’s negatives weren’t moving much. (House candidates usually don’t respond to specific attacks in part because they normally have a limited budget.) “They unambiguously lost September,” said Russell, the former DCCC official. Meanwhile, the Republican blame game was already underway. In Washington, the questioning of the NRCC’s spending decisions grew heated. Sometimes, the drama got personal. Operatives and members of Congress privately questioned Stivers’ decision to hire a college friend with relatively little national experience to run the NRCC’s independent expenditure arm. They dinged him for not traveling enough. They vented about the money as Democrats posted astronomical cash hauls. As Election Day arrived, knives were out for the NRCC. Stivers did not agree to be interviewed for this story. Bliss, of Congressional Leadership Fund, had his own detractors. Some Republicans thought CLF officials were too quick to dismiss— publicly or privately — candidates they were no longer supporting, from Mike Bishop in Michigan to Greg Gianforte, the Montana congressman who assaulted a reporter. And Democrats accused his organization of being too eager to take credit for completing basic campaign work. “They tie their shoes, they’re proud of it,” said Kelly, executive director of the super PAC aligned with Pelosi. “I mean, that’s a bunch of silliness, right? They get out of bed, they’re proud of it. These are all just sort of things we do day-to-day. I made toast. It was hard. I’m the best.” CLF allies say Bliss and his team have significant accomplishments to tout: namely, the organization announced Friday that they have raised $160 million, a haul that’s more than three times the size of its 2016 total. By the end of the cycle, no party committee or outside group had spent more on the 2018 campaign than CLF. “CLF is doing God’s work,” said Costello, the retiring Pennsylvania Republican, pointing to their efforts on “grassroots voter contact and data work.” Yet nothing seemed to be blunting Democratic momentum. And then a September surprise landed. KAVANAUGH BLUNTS MOMENTUM Despairing messages flew across private Slack conversations, ricocheting around Republican operative circles and pinging strategists at the GOP’s national headquarters for House races. Christine Blasey Ford was testifying a few blocks away before the Senate Judiciary Committee, delivering what Republicans saw, in that moment, as an effective and devastating blow to Brett Kavanaugh’s nomination to the Supreme Court. He’s going to have to withdraw, campaign operatives both in and out of the NRCC building worried to each other. This will sink us. And then Kavanaugh started to speak. As his angry denials of sexual misconduct sent Twitter ablaze, staffers inside the NRCC building started to clap and cheer. When he finished his opening statement, applause erupted in the committee’s large central workspace, where staffers from different departments sat watching the televised proceedings. And when Sen. Lindsey Graham of South Carolina delivered his defense of Kavanaugh, someone whooped, “Yes, Lindsey!” Within a week, the GOP saw its numbers tick up in internal polls, as Republicans grew more energized and some swing voters felt newly uneasy with Democrats. “If they’d been on the fence questioning whether or not to be activated this cycle, watching Democrats’ behavior, watching someone they agreed with ideologically come under attack by a bunch of 2020 wannabes — it instantly invigorated them,” said NRCC press secretary Jesse Hunt. And over the subsequent weeks, Trump’s approval rating, and GOP fortunes, would rise — from Mia Love’s Utah district to a spate of Texas House seats where both sides were spending millions, according to Republicans watching internal numbers. A late-summer internal poll for Republican candidate Mark Harris, running in a Charlotte, N.C.,-area seat, had him down seven percentage points and losing unaffiliated voters. Soon after the Kavanaugh hearing the race was tied and he was up with those voters. And after writing off Republican Rep. Rod Blum and cancelling planned ad spending in Iowa’s First Congressional District, the DCCC was forced to hit to the airwaves there a few weeks after the hearing. Trump’s campaign travel was also heating up, keeping a newly awakened GOP base energized and furious at what they called the Democratic “mob.” It added to Democrats’ discomfort. “When he’s out there, it pushes people to their 2016 corners, and it’s a helpful thing in a lot of places,” said Canter, the Democratic operative. “He’s always going to be able to make things about him.” Many Democrats argued that the poll movement, especially in seats where Trump performed relatively well in 2016, was inevitable, reflecting Republican-leaning voters who were simply coming home. Still, some believed Kavanaugh helped nudge them in that direction. “Some of that is natural, but I think it’s also probably true that Kavanaugh sped up some of that process and crystalized it for some people,” said Guy Cecil, chairman of the Democratic super PAC Priorities USA Action. “It just made it a more partisan environment.” On Oct. 12, House Majority PAC’s internal analytics model — developed with the Democratic firm Civis Analytics — showed Democrats had an 82 percent chance of winning the majority. By Oct. 17, the odds had fallen to 73 percent. ‘MOBS’ TO MAIL BOMBS Even as Republicans revelled in the improving mid-October poll numbers, some operatives had a nagging sense that the post-Kavanaugh bump wasn’t sustainable in such a rapidly evolving news environment. According to Trump, that came true on Oct. 26. “Republicans are doing so well in early voting, and at the polls, and now this ‘Bomb’ stuff happens and the momentum greatly slows — news not talking politics,” he wrote on Twitter, after a series of Democratic leaders and CNN were targeted with pipe bombs. The news that week would only grow darker, culminating the next day in the most deadly anti-Semitic act in American history: the murder of 11 people at a Pittsburgh synagogue. The country was sharply divided and deeply rattled as Election Day neared, and there were political consequences for the sense that the nation was on the wrong track. “The last week was a reminder of just the displeasure with our politics,” Costello said. “If that’s the case, who do you blame it on, the president and the party in power, or not?” As Bliss had said, for Republicans, the theme of 2018 was one step forward, two steps back. Meanwhile, Republican candidates in the top 60 races were getting outspent in the final week by $27 million, according to a memo Bliss wrote to donors the Friday before Election Day. “Four days from Election Day, Republicans are facing many unknowns and a green wave of Democratic spending,” he wrote. “After the Kavanaugh hearings, surveys showed the best environment for Republicans in more than a year. It is impossible to know how events of the last two weeks have impacted the improving environment.” Democrats one week out were again confident: the wariness from early and mid-October had mostly vanished, replaced by a conviction that they would win the House majority as polls showed improvement. By Nov. 1, House Majority PAC’s internal analytics showed Democrats had a 90 percent chance of victory, the party’s best odds of the fall campaign, according to data shared with McClatchy. (On Aug. 1, the model had put the chances of a Democratic takeover at just 60 percent.) LET TRUMP BE TRUMP Democrats did not run a flawless campaign in 2018. Highly touted candidates such as Amy McGrath in Kentucky’s 6th Congressional District and Aftab Pureval in Ohio’s 1st Congressional District committed errors that damaged their campaigns. Some strategists complained that the DCCC and House Majority PAC spent too much money for too long in left-leaning districts such as Virginia’s 10th and Colorado’s 6th. And other operatives grumbled that the party erred by not focusing more on Trump. But by the end of the campaign, the DCCC’s strategy of expanding the number of battlegrounds paid off, with new possibilities opening up in strong Republican territory in South Carolina’s 1st and Pennsylvania’s 16th districts, keeping Republicans on defense on an ever-expanding map. CLF even had to make a late play in Alaska, in a seat no one had expected to be competitive. Republicans adopted a scattershot approach to their messaging in the race’s final weeks — their ads included attacks on a caravan of migrants, liberal “mobs,” taxes, single-payer health care and Pelosi. But Democratic candidates in the country’s most competitive seats allowed Trump to rage while they stayed relentlessly focused on health care and taxes, the two issues they vowed to emphasize when the year began. Sena said the DCCC had nonetheless prepared extensively for Trump’s late-campaign immigration pivot, convinced the president would turn to it to motivate his base. The group shared polling memos with campaigns, rehearsed how candidates would talk about it, and some of the individual campaigns even developed possible ads ahead of time that would respond to Trump’s attacks. But it was clear by the end of the campaign that Trump’s immigration attacks wouldn’t be enough to derail their push toward a majority. TURNING TO 2020 Rick Saccone eventually showed up at his campaign watch party. He would lose narrowly to Lamb hours later. “President Trump won that district, but he was running against far-left Hillary Clinton,” Saccone said. “I was running against a guy who tried to be like me.” And on Tuesday, Democrats across the country indeed won in red districts as they, like Lamb, emphasized biography — and health care — over their party ID, while benefiting from a country seeking a check on Trump. “Frankly, the template is not to say too much, lead with your bio, don’t identify yourself as a Nancy Pelosi Democrat, and keep your head down,” said Costello, the retiring Pennsylvania Republican who followed the Lamb-Saccone race closely. In the coming days, Democrats with their eyes on the 2020 presidential campaign will debate whether that template applies to candidates jockeying to take on Trump himself. But more immediately, the focus turns to Congress. Veteran Democratic strategist Jesse Ferguson said the party’s newfound majority means the GOP can’t repeal the Obamacare or prevent investigations into the Trump White House. “With Democrats in control of the House,” he said, “repeal is dead and oversight is alive.”
Please log in or Register now for free or Choose your profile * Email * A valid e-mail address. All e-mails from the system will be sent to this address. The e-mail address is not made public and will only be used if you wish to receive a new password or wish to receive certain news or notifications by e-mail. Password Username * Sign up to our newsletters Higher education updates from the THE editorial team World University Rankings news Student newsletters Send me special offers and marketing info from THE and selected partners A report from the BBC’s fact checking series, Reality Check, dared to ask the question “universities: is free speech under threat?”. The writers claimed that a freedom of information request sent to 120 universities revealed that, since 2010, only six speakers have been banned after complaints. Sixteen universities, we are told, have received complaints about speakers in that period and nine events have been cancelled. Universities UK also expressed a sanguine view of free speech, noting that universities organise thousands of events every year that pass off without incident. The reporters are aware that the numbers of speakers banned are small but that some critics think that there could be a “big problem”. They say that the figures are not exhaustive, adding that “they may not capture more informal complaints”. This is a sensible caveat by the reporters, and is to be welcomed. However the quantitative method adopted by Reality Check virtually guaranteed that they would fail to find evidence of a problem that we and many others believe is real and pressing. The problem is that universities and students’ unions systemically strike the balance against freedom of speech and in favour of questionable notions of student welfare. If we want to take a useful look at this problem, we will have to scrutinise the quality of decisions made by unions and universities. Were they fair? Were they reasonable? The reality check needed for this “reality check” is that the views of universities and their representative body should not be given undue weight, especially at a time when new free speech guidance is being drafted by the Office for Students. It is important to say that they are not lying – they simply do not see when they are undermining free speech. When they impose values and codes of behaviour on staff and students, a breach of them can lead to formal and informal disciplinary acts. Many speakers are indeed invited to universities but they are for the most part uncontroversial speakers. A better question to ask of universities and the National Union of Students is not who they banned but “which controversial speakers did you invite?”. The message that a few bans sends out is “don’t invite controversial speakers”. We believe that this is not just because of the fear of protests and violence. We are among those critics who believe that universities avoid inviting speakers because they fear giving emotional offence to students. There is a problem on many campuses. That is why we are working with student groups across the UK that are making freedom of speech happen on our campuses. These include the Aberdeen Life Ethics Society, a pro-life group seeking to promote open-minded, pluralistic debate about the ethics of abortion. It has been denied affiliation with the Aberdeen University Students’ Association, and thus vital access to funds and premises. Or take the Liberate the Debate (LtD) society at the University of Sussex, which recently held a talk by Rupert Soames, CEO of Serco, which manages Yarl’s Wood Immigration Removal Centre. Threats of disruption, at this and previous LtD events, imposed potentially unsustainable security costs on the society – money that may well be wasted if the protestors succeed in getting the talk canned altogether. In many cases the cost of event security is being transferred to student societies – thus imposing on them a financial obligation to facilitate free speech, rather than the union or the university. There is another reason to be vigilant for any lapses in free speech: while those student officers responsible for restrictive policies that chill free speech are few, they are influential and could in the future be considerably more so, especially if they transition into local or Westminster politics. We cannot let even minor lapses go, because their consequences could sound the death knell for free speech in wider society. We believe in taking an open mind to both the successes and setbacks of campus free speech. Doing so could result in sharing overlapping concerns expressed by those who take a politicised, exaggerated view of campus free speech. We must be fearless in identifying failures to protect free speech, and we must be indifferent to the fact that doing so could mean sharing the concerns of the right-wing press about “snowflakes”, or of the left-wing press about the Prevent strategy. The defence of free speech is too serious an issue for anyone to worry about the company they keep. For these reasons, Academics for Academic Freedom and Speakers’ Corner Trust have partnered up to build a network of student free speech societies and debating groups. The purpose of the Free Speech Network is to get information from the coalface about what is happening on our campuses, to advise students how to navigate restrictive policies imposed by universities, and to put them in touch with sympathetic academics who can help. We believe that a united front can advocate more powerfully for the free, fair debate that makes a university degree an experience worth having (and, indeed, worth paying for). We are emphatically not setting out to moan or scaremonger. We want to know about the good things that are happening on campus – the talks that do go ahead, the students’ unions that cooperate rather than quash – as well as the restrictions. This is the front line of the fight for freedom of speech in the UK. The university campus is where free thinking will either thrive or falter. If you would like to join the Free Speech Network, or find out more, please get in touch.
Pre_GI: SWBIT SVG BLASTP Query: NC_011274:4385039 Salmonella enterica subsp. enterica serovar Gallinarum str. 287/91Lineage: Salmonella enterica; Salmonella; Enterobacteriaceae; Enterobacteriales; Proteobacteria; BacteriaGeneral Information: Salmonella gallinarum is the causative agent of Fowl typhoid, a severe systemic disease of poultry. This group of Enterobactericiae have pathogenic characteristics and are one of the most common causes of enteric infections (food poisoning) worldwide. They were named after the scientist Dr. Daniel Salmon who isolated the first organism, Salmonella choleraesuis, from the intestine of a pig. The presence of several pathogenicity islands (PAIs) that encode various virulence factors allows Salmonella spp. to colonize and infect host organisms. There are two important PAIs, Salmonella pathogenicity island 1 and 2 (SPI-1 and SPI-2) that encode two different type III secretion systems for the delivery of effector molecules into the host cell that result in internalization of the bacteria which then leads to systemic spread. General Information: This organsim is a sulfur-oxidizing bacterium isolated isolated from estuarine mud in the Netherlands. Sulfur-oxidizing bacterium. Sulfurimonas denitrificans, formerly Thiomicrospira denitrificans, is a denitrifying chemolithoautotroph that uses sulfide or thiosulfate and nitrate or nitrite as the electron donor and acceptor. This organism has been identified in hydrothermal vent areas and from oilfields and may play a role in the cycling of sulfur in these environments.
Q: How to display category name in product page? I'm using Magento 2, I want to display the category name of the product on the product page. <?php /** * Copyright © 2015 Magento. All rights reserved. * See COPYING.txt for license details. */ // @codingStandardsIgnoreFile /** * Product view template * * @var $block \Magento\Catalog\Block\Product\View */ ?> <?php $objectManager = \Magento\Framework\App\ObjectManager::getInstance(); $category = $objectManager->get('Magento\Framework\Registry')->registry('current_category');//get current category //echo $category->getId(); echo $category->getname(); ?> <?php $_helper = $this->helper('Magento\Catalog\Helper\Output'); ?> <?php $_product = $block->getProduct(); ?> <div><span><?php echo $category->getId();?></span></div> <div class="product-add-form"> <form action="<?php /* @escapeNotVerified */ echo $block->getSubmitUrl($_product) ?>" method="post" id="product_addtocart_form"<?php if ($_product->getOptions()): ?> enctype="multipart/form-data"<?php endif; ?>> <input type="hidden" name="product" value="<?php /* @escapeNotVerified */ echo $_product->getId() ?>" /> <input type="hidden" name="selected_configurable_option" value="" /> <input type="hidden" name="related_product" id="related-products-field" value="" /> <?php echo $block->getBlockHtml('formkey')?> <?php echo $block->getChildHtml('form_top'); ?> <?php if (!$block->hasOptions()):?> <?php echo $block->getChildHtml('product_info_form_content'); ?> <?php else:?> <?php if ($_product->isSaleable() && $block->getOptionsContainer() == 'container1'):?> <?php echo $block->getChildChildHtml('options_container') ?> <?php endif;?> <?php endif; ?> <?php if ($_product->isSaleable() && $block->hasOptions() && $block->getOptionsContainer() == 'container2'):?> <?php echo $block->getChildChildHtml('options_container') ?> <?php endif;?> <?php echo $block->getChildHtml('form_bottom'); ?> </form> </div> <script> require([ 'jquery', 'Magento_Catalog/js/price-box' ], function($){ var priceBoxes = $('[data-role=priceBox]'); priceBoxes = priceBoxes.filter(function(index, elem){ return !$(elem).find('.price-from').length; }); priceBoxes.priceBox({'priceConfig': <?php /* @escapeNotVerified */ echo $block->getJsonConfig() ?>}); }); </script> A: Try this at app/design/frontend/Theme/Package/Magento_Catalog/templates/product/view/form.phtml <?php $objectManager = \Magento\Framework\App\ObjectManager::getInstance(); $category = $objectManager->get('Magento\Framework\Registry')->registry('current_category');//get current category echo $category->getId(); echo $category->getName(); ?>
Q: jquery each loop check if at least one field has been filled Let's say that I have an HTML structure like this: <input type="text" name="input_1" class="required" value="" /> <input type="text" name="input_2" class="required" value="" /> <input type="text" name="input_3" class="required one" value="" /> <input type="text" name="input_4" class="required one" value="" /> <input type="text" name="input_5" class="required" value="" /> As you can see each text field above has the class required but there are two of them that also have the class one. What I wanna do is to iterate over these text fields and check if they are not empty but for the ones that have the class one, at least one of them is required (not both at the same time). If I iterate over the input with class required, how do I check if at least one of the inputs with class one has been filled (within the same loop)? Thank you A: You can do: var oneIsFilled = false; $(":text.required").each(function() { if ($(this).hasClass("one") { if (this.value.length > 0) oneIsFilled = true; } });
Q: Ember-notify giving error can't read property "Service" of undefined I am using ember-notify ember-notify in my ember-cli project. import { Component, inject } from 'ember'; export default Component.extend({ notify: inject.service('notify'), actions: { sayHello() { this.get('notify').info('Hello there!'); } } }); I just copied the same example code from documentation. But I am getting error 'cannot read property "service" of undefined' for line notify: inject.service('notify'), I've installed this addon and did a npm install as well. A: Just do Ember.inject notify: Ember.inject.service('notify')
Frog Level (Bussey, Arkansas) Frog Level is a historic house in rural Columbia County, Arkansas. Built in 1852-54 by William Frazier, an Irish immigrant, this two-story wood frame house is one of a handful of surviving antebellum plantation houses in southwestern Arkansas. It is located on the north side of County Road 148, a short way west of County Road 27S, west of Magnolia. The house has two rooms on each floor, and a two-story temple portico extending across its front. This portico is supported by two sets of four columns, one set for each level of the porch. The house was given its name not long after its construction, due to the large number of frogs in the area. The house was listed on the National Register of Historic Places in 1972. See also National Register of Historic Places listings in Columbia County, Arkansas References Category:Houses on the National Register of Historic Places in Arkansas Category:Houses completed in 1852 Category:Houses in Columbia County, Arkansas Category:Plantation houses in Arkansas Category:National Register of Historic Places in Columbia County, Arkansas Category:1852 establishments in Arkansas
Q: What is the Maximum Likelihood Estimator of $f(x;\theta) = \frac{3\theta x^{3\theta -1}}{(1+x^{3})^{\theta +1}} $ $f(x;\theta) = \frac{3\theta x^{3\theta -1}}{(1+x^{3})^{\theta +1}}, x>0, \theta>0 $ I came up with FOC: $ \hat{\theta} = \frac{1}{-3\log(x)+\log(1+x^3)} $ Is this correct? Thanks:-) I took log's and then derivative = 0. A: Here is the derivation for general case of $N$ i.i.d. samples: $$\begin{align*} \hat{\theta}=\underset{\theta}{\text{argmax}}\prod_{n=1}^Nf(x_n;\theta)=\underset{\theta}{\text{argmax}}\sum_{n=1}^N\text{log}f(x_n;\theta) \end{align*}$$ $$\begin{align*} \sum_{n=1}^N\text{log}f(x_n;\theta) &= \sum_{n=1}^N\text{log}(3\theta x_n^{3\theta -1})-\text{log}(1+x_n^3)^{1+\theta},\\ &=\sum_{n=1}^N \text{log}(3)+\text{log}(\theta)+(3\theta -1)\text{log}x_n-(1+\theta)\text{log}(1+x_n^3),\\ \frac{\partial \sum_{n=1}^N\text{log}f(x_n;\theta)}{\partial \theta} &= \frac{N}{\theta}+\sum_{n=1}^N 3\text{log}x_n-\text{log}(1+x_n^3)=0,\\ \hat{\theta} &= \frac{N}{\sum_{n=1}^N \text{log}(1+x_n^3) - 3\text{log}x_n} \end{align*}$$ The special case $N=1$ would be: $$\begin{align*} \hat{\theta} &= \frac{1}{\text{log}(1+x^3) - 3\text{log}x} \end{align*}$$
Q: File name is creating with space in perl? in perl scripting i am giving name of a file as input to create a file in my folder. I have written following code for that but the thing is its creating extra space between filename and its extension like myfile .txt How to slve this?? code is print"file name="; $file=<STDIN>; open($f, "+>>$file.txt") or die "Couldn't open file $file.txt, $!"; Input: myfile Output: in current folder am seeing myfile .txt instead of myfile.txt what is the solution for this??? A: You have to remove the linefeed at the end of your line: Try: print"file name="; $file=<STDIN>; chomp $file; open($f, "+>>$file.txt") or die "Couldn't open file $file.txt, $!";
Q: Array has 1 value, how do I break up this large string? My php array has an Array with 1 value. Yet the string is rather large with whitespace. I can't explode it as its a single value. How can I break at that whitespace to put it in a table? When I try to explode example: $explode_output = explode(' ',$counts); print_r($explode_output); I get the following result Array ( [0] => 893 717 601 576 602 309 926 684 653 204 485 708 341 369 3 39 728 638 556 3 1011 639 476 593 672 773 307 738 587 505 539 467 683 610 760 841 721 734 431 793 867 491 586 581 577 414 299 235 ) Because I want to put this in a table with each string value on a unique row, my efforts of using the following didn't work. "<pre>" .$output. "</pre>" The above code separates the array/string by whitespace but I can seen put loop them in a unique rows within a table. I thought I needed to explode the array/sting but the single value lists the entire string. Any help would be awesome. A: You can easily explode it with explode() function: $data =Array ( [0] => 893 717 601 576 602 309 926 684 653 204 485 708 341 369 3 39 728 638 556 3 1011 639 476 593 672 773 307 738 587 505 539 467 683 610 760 841 721 734 431 793 867 491 586 581 577 414 299 235 ) $exp_data = explode(" ",$data[0]); for($i=0;$i<count($exp_data);$i++) { echo "<tr><td>".$exp_data[$i]."</td></tr>"; } A: $array = Array ( [0] => 893 717 601 576 602 309 926 684 653 204 485 708 341 369 3 39 728 638 556 3 1011 639 476 593 672 773 307 738 587 505 539 467 683 610 760 841 721 734 431 793 867 491 586 581 577 414 299 235 ) $newArray = explode(" ",$array[0] ); A: You can remove the spaces and explode it into array using preg_split method in PHP. It's similar to split() method, but it accepts regular expression. The below code can even split strings which contains one or more spaces between them $yourArray = Array ("893 717 601 576 602 309 926 684 653 204 485 708 341 369 3 39 728 638 556 3 1011 639 476 593 672 773 307 738 587 505 539 467 683 610 760 841 721 734 431 793 867 491 586 581 577 414 299 235"); $arrayOfStrings = preg_split('/\s+/', $yourArray[0]); echo "<table>"; for($i=0;$i<count($arrayOfStrings );$i++) { echo "<tr><td>".$arrayOfStrings [$i]."</td></tr>"; } echo "</table>"; In your table you can now loop over the $arrayOfStrings.
Interactive mobile phone services provide information and entertainment to users. For example, YES, Inc. runs a service in which anyone with a mobile phone can identify, rate, share, and buy any song that has played on a radio station in the last 24 hours. In operation, a caller dials 888-YES-8888 on his mobile phone to connect to an interactive voice response system. The caller then states the name of the station and the time that the song was played to hear a sample of the song as well as information about the artist, track, and album. Callers are able to rate and buy the song. Stations receive feedback regarding how their audience likes individual songs.
Synthesis and biological activity of certain 1,2,3-triazole carboxamide nucleosides related to bredinin and pyrazofurin. 5-Hydroxy-1-(beta-D-ribofuranosyl)-1,2,3-triazole-4-carboxamide (II) has been prepared by direct glycosylation of the trimethylsilyl derivative of 5-hydroxy-1,2,3-triazole-4-carboxamide (IV). The use of trimethylsilyltrifluoromethane sulfonate as a catalyst and 1-O-acetyl-2,3,5-tri-O-benzoyl-beta-D-ribofuranose in acetonitrile gave a 95% yield of a 1:1 mixture of V and VI as blocked nucleosides which were readily separated on a silica gel column. The synthesis of II was also achieved by the cycloaddition of 2,3,5-tri-O-benzoyl-beta-D-ribofuranosyl azide with ethyl malonamate. II shows significant antiviral activity against herpes and measles virus in vitro.
INTRODUCTION {#cesec10} ============ Internal hemipelvectomy consists of a resection of bone segments and compromised tissues of the pelvic girdle, preserving the femoral vascular-nervous bundle and the sciatic nerve, and in this way making it possible to preserve the lower limb of the patient[@bib1]. This procedure is split into four types according to the Enneking classification. Type I consists of resection of the ileum, which may or may not include the gluteal muscles, type II is periacetabular resection, which may or may not include the hip joint, type III consists of resection of the ischium and pubis, and type IV consists of resection of the whole hemipelvis[@bib1], [@bib2], [@bib3], [@bib4], [@bib5], [@bib6] ([Figure 1](#fig1){ref-type="fig"}). We report eight cases of patients diagnosed with tumors of the pelvic girdle, three of which were chondrosarcomas, two Ewing\'s sarcomas, one pleomorphic sarcoma, one chondromyxoid fibroma and one radioinduced osteosarcoma. All patients underwent internal hemipelvectomy by the same team of oncological surgeons of Juiz de Fora, MG. The study in question was approved by the Research Ethics Committee of the Oncology Institute. CASE REPORT {#cesec20} =========== Between November 2003 and December 2009, eight patients diagnosed with pelvic tumors underwent internal hemipelvectomy. Six patients were female and two were male. The patients had a mean age of 31.12 years (11-48). The histological types found were chondrosarcoma, Ewing\'s sarcoma, pleomorphic sarcoma, chondromyxoid fibroma, and radioinduced osteosarcoma. All patients in question had an indication for internal hemipelvectomy. An inverted Y incision was performed in only one patient. In the others, we made an inverted V incision ([Figure 2](#fig2){ref-type="fig"}). The procedure involves extensive tissue detachment to release the femoral vascular-nervous bundle and the sciatic nerve ([Figure 3](#fig3){ref-type="fig"}). All patients underwent ligature of the epigastric and circumflex veins and arteries in order to decrease the risk of injury. Bone was resected with a gigli saw or power saw. Vigorous hemostasis was then performed prior to the placement of a suction drain. None of the patients underwent prosthesis placement ([Figure 4](#fig4){ref-type="fig"}). The histology and types of surgery performed are shown in [Table 1](#tbl1){ref-type="table"}. Free surgical margins (R0 resection) were obtained in six patients (75%) and positive margins (R1 resection) were observed in two (25%). Five patients are disease-free and two patients died, one due to pulmonary metastasis and the other due to locoregional recurrence. One patient is receiving treatment for pulmonary metastasis. The follow-up of patients, as well as the types of adjuvant and neoadjuvant treatment they have undergone, are shown in [Table 2](#tbl2){ref-type="table"}. DISCUSSION {#cesec30} ========== The main histological types of pelvic tumors are chondrosarcoma in adults, osteosarcoma in adolescents and youth, and Ewing\'s sarcoma in children[@bib1], [@bib5], which is in agreement with our sample ([Figure 5](#fig5){ref-type="fig"}). Obtaining surgical margins similar to that of a classic amputation, the lack of tumor involvement in the femoral vascular-nervous bundle and the sciatic nerve, preserving partial function of the lower limb, and the patient having favorable life expectancy and medical conditions, are essential factors for performing internal hemipelvectomy. This procedure is contraindicated in cases of local recurrence after conservative surgery of the limbs, in tumors that extend posteriorly through the sacroiliac joint, in tumors with great infiltrative potential, and those that extend to the thigh[@bib2]. From one to three months after surgery, an area of fibrosis will form at the site of surgical resection, providing stability and support to the pelvic girdle, which will ensure that the patient has the ability to walk again using the operated limb, first with the help of a walker, which in time will become unnecessary. The preservation of the sciatic and femoral nerve, and sacral filaments guarantee the maintenance, at least in part, of certain movements of the lower limb related to the surgery, such as extension and flexion of the thigh and leg, dorsiflexion, and plantar flexion. The main prognostic factor for patients with tumors of the pelvic girdle who have undergone the surgery in question is the type of surgical margins obtained. R0 resections interfere directly in patient morbidity and mortality, increasing their survival or even providing its cure[@bib1], [@bib3], [@bib4]. Other prognostic factors are the degree of tumor differentiation, histology of the tumor, presence or absence of distant metastasis, and if surgery was performed within appropriate oncologic principles. A 27% incidence of disease recurrence after surgical treatment has been reported in the literature[@bib1]. Only one of our patients had locoregional recurrence (12.5%). Intra- and postoperative bleeding, flap ischemia, deep vein thrombosis, infections, sciatic neuritis, and others are significant complications in internal hemipelvectomy. The literature shows a 50% incidence in the rates of complications caused by surgery[@bib1], which was not found in our patients. Internal hemipelvectomy is an adequate therapeutic alternative in certain cases of pelvic tumors and should be considered whenever possible, since, according to Lopes et al[@bib1], this procedure has a low recurrence rate comparable to other radical resections. In addition, it preserves the lower limb, positively influencing their quality of life. Study conducted at the Oncology Institute -- Juiz de Fora, MG. ![Types of internal hemipelvectomy.](gr1){#fig1} ![Operative wound of a patient who underwent left internal hemipelvectomy 100 days ago. Incision was made in inverted V.](gr2){#fig2} ![Photo of the internal hemipelvectomy surgery showing the preservation of the femoral vascular-nervous bundle anteriorly and of the sciatic nerve posteriorly.](gr3){#fig3} ![X-ray of a patient previously submitted to right internal hemipelvectomy. Enneking II + III resection.](gr4){#fig4} ![Computed tomography of the pelvis showing a pelvic tumor on the right. The histological diagnosis was compatible with the grade of the chondrosarcoma.](gr5){#fig5} ###### Histological types of pelvic girdle tumors diagnosed and types of internal hemipelvectomy performed. Patients Age/Sex Histological type Date of surgery Type of surgery ---------- ----------- --------------------------- ------------------ ------------------- **1** 11/male Ewing (July/2004) Left I.H. I **2** 13/female Ewing (September/2006) Left I.H. II+III **3** 36/female Pleomorphic sarcoma (May/2005) Left I.H. III **4** 37/male Chondrosarcoma grade III (March/2009) Left I.H. II+III **5** 43/female Chondrosarcoma grade I (November/2003) Left I.H. II+III **6** 48/female Chondrosarcoma grade III (August/2008) Right I.H. II+III **7** 48/female Chondromyxoid fibroma (November/2009) Left I.H. I **8** 13/female Radioinduced osteosarcoma (December/2009) Right I.H. III I.H.: Internal hemipelvectomy. ###### Types of adjuvant and neoadjuvant treatment and follow-up of patients. Patients Neoadjuvant treatment Adjuvant treatment Disease-free Locoregional recurrence Distant metastases ---------- ------------------------ ----------------------------- ----------------- ------------------------- -------------------- **1** Chemo w/IFO + VP/VADIC Chemo w/IFO + VP/VADIC Death July/2008 No Lung and bones **2** Chemo w/IFO + VP/VADIC Chemo w/IFO + VP/VADIC Yes No No **3** No Chemo w/IFO + ADM and Radio No No Lung **4** No Chemo w/IFO + ADM and Radio Yes No No **5** No No Yes No No **6** No Chemo w/IFO + ADM and Radio Death June/2009 Yes No **7** No No Yes No No **8** No Chemo w/TOPO + CTX Yes No No
Q: JQuery toggleClass parent and children I'm just getting to know Javascript and JQuery and I can't figure this out: Is there a shorter way for this: $(".toggle").click(function(){ $(this).parent().toggleClass("collapsed"); $(this).parent().children().toggleClass("collapsed"); $(this).parent().next(".abcContent").toggle(0); I'm glad I got it to work after all but surely this isn't how it's done properly... I want to toggle the parent class (abcTitle) including its children (i.e. button). <div class="abcTitle"> <div class="abcButton toggle"></div> <h4 class=toggle>Title</h4><div class="sortable"></div> </div> <div class="abcContent">Content</div> Thanks for enlightening me! For clarification here's some relevant CSS .abcButton { background-image:url(minus.png); } .abcButton.collapsed { background-image:url(plus.png); } .abcTitle { border-top-left-radius:14px; } .abcTitle.collapsed { border-bottom-left-radius:14px; } So basically a click on either abcButton or H4 is supposed to trigger the collapse of abcContent while adding class .collapsed to both abcButton and abcTitle. (Btw, If I could figure out how to exclude <div class="sortable"></div> from the click function I could just make abcTitle my click handler with no need to seperate abcButton and h4) A: You should cache, or chain, your jQuery object; $(this).parent() is being calculated 3 times. $(".toggle").click(function(){ var self = $(this).parent(); self.toggleClass("collapsed"); self.children().toggleClass("collapsed"); self.next(".abcContent").toggle(0); You shouldn't need to add the collapsed class to your children elements; you CSS should work out that the elements are collapsed from the fact the parent has the class of collapsed. div.abcTitle h4 { /* Styles when the element is shown */ } div.abcTitle.collapsed h4 { /* Styles when the element is collapsed */ } You can probably guarantee that the next element will always be the abcContent, so you shouldn't need to worry about selecting the next element. If you are toggling a number of elements, it'll be better to use the delegate or live methods, which utilize the event bubbling mechanisms of JavaScript; the event handler is only bound to one element, rather than all of them, increasing performance. Having said all of that, a better solution might be as follows: $(document).delegate('.toggle', 'click', function () { $(this).parent().toggleClass('collapsed').next().toggle(); });
2009 . which is after all the very crisis of a wild self-preservation. when it loses any relation to others. the imagines of the crowd and power. By subjectivity I do not mean the subjectivity of thought. Nevertheless. that is. a wild survival. from experiences of the real. and which you call in your terminology the moment of survival. which does not tie thinking in advance to the approved rules of the sciences and does not respect the boundaries imposed by the division of labour. For a thinker like myself. moreover. with which you are concerned? Downloaded from http://the. points to this. Adorno: I think so too. however. is enormously sympathetic to me-but I mean by subjectivity the point of departure from the subjects under investigation. the reader cannot quite shake off the feeling that in the development of your book the imagination-the representation of these concepts or facts. analysis would say. whether he calls himself a philosopher or a sociologist.2 Da~d Robens longer convinced of some of his results and must oppose some of his special theories. there is a methodological problem which is important for our intention of determining the place of your thinking.com at UNIV CALIFORNIA IRVINE on December 3. in relation to the images. I believe that our agreement here is not by chance but points to what has become acute in the crisis of the contemporary situation. of self-preserving reason and discovered in the process that this principle of self-preservation which finds its first classic formulation in the philosophy of Spinoza. the concept of invisible crowds. which plays a major role for you.sagepub. just as I would. the situation of survival in the exact sense that this motif of self-preservation. But for the way he tackled things. is what I would call the subjectivity of your approach. put more sharply. that is. what strikes me first of all about your book. the basic concepts you employ-crowds and power-ultimately from real conditions. I would like to register that there is a very strong contact between us. I still have the deepest respect. is transformed into a destructive force. not so very differently from Freud. I am very conscious that you derive. the two go together-iS in fact of a greater significance than they are themselves: for instance. and what is-if I may say so openly-something of a scandal. Adorno: Precisely at this point which you just raised. You did not know our work and we did not know yours. from real crowds and real powers. the point of departure from forms of representation (Vorstellungsweisen). when it becomes as it were "wild". the subjectivity of the author-on the contrary: precisely the freedom of a subjectivity. Canetti: I am pleased to hear that your own thinking has led to similar results and that the fact of our independence adds to their cogency. And I would like to put the really simple question to you to give our listeners a clearer idea of what is actually involved-how do evaluate the real significance of crowds and of power or the bearers of power in relation to the inner representation. On the other hand. In the Dialectic of Enlightenment Horkheimer and I analyzed the problem of self-preservation. about which I would perhaps like to say something briefly: for anyone who has occupied himself with religions. I stress that crowds always want to grow. We know the role that the idea of the devil. A medieval Cistercian abbot. I think that the individual human being feels threatened by others and has for this reason an anxiety about being touched by something unknown. All human beings have experienced this. There are countless examples of the human belief that the whole air is filled by these spirits. I think this is a very concrete approach. we need only recall that in the modern world we also know such invisible crowds. I talk about the feeling of eqUality within the crowd and many other things which I do not want to mention now.Elias Canetti: Discussion with Theodor W. stated that when he closed his eyes he sensed devils around him as thick as dust. Devils are thought to occur in endless crowds. it starts from a concrete experience which everybody knows from the crowd. What is remarkable is that this fear disappears completely in the crowd. that these spirits occur in massed forms-this carries over into our universal religion. It is a really important paradox. At this moment the individual no longer fears contact with others. Here I would like to say that invisible crowds only appear in the short chapter 14 of my book.sagepub. The concept of the book is. Human beings only lose their fear of being touched when they stand closely packed together in a crowd. I would not for this reason regard them as unreal. Then in chapter 14 I come to the concept of invisible crowds. as real as it can be. I speak of open and closed crowds. which is preceded by 13 other chapters. His fear of being touched reverses into the opposite. There are very many testimonies in the Middle Ages. Now. like to become part of the crowd. that this compulsion to grow is decisive for them. since these people do in fact believe in these crowds. when they are surrounded on all sides by other human beings. After all we all believe in the Downloaded from http://the. and especially with primitive religions. which human beings cannot actually see. and that he seeks to protect himself by all means from being touched by the unknown by creating distances around himself. but they are perhaps just as dangerous and aggressive and are feared by us just as much. These invisible crowds playa major role in religions and in the conceptions of believers. that you try not to jostle against others. We need only think of the spirits which play such a role in primitive religions. so that they no longer know who is pressing against them. Adorno 3 Canetti: I would like to take some time to answer this question. by striving not to come into too close contact with other human beings. for them they are something wholly real. of angels played in Christendom. I believe. In spite of all preventative measures human beings never lose completely their fear of being touched. in the following chapters I examine other aspects of the real crowd. I believe that one of the reasons why people like to become a crowd. 2009 . that you do not like being jostled by others.com at UNIV CALIFORNIA IRVINE on December 3. is the relief they feel at this reversal of the fear of being touched. in which I deal with the real crowd very intensively. Richelin. it is very striking the extent to which these religions are peopled by crowds. You refer to my concept of invisible crowds. I begin with what I call the fear of being touched. In order to understand this fully. They are no longer devils. I think. that a certain primacy of the imaginative. And for that reason I would say. By crowd symbols I understand collective units. which can be everywhere. Only very few people have looked in a microscope and actually seen them but we all assume that we are threatened by millions of bacilli. heaps of many kinds. let us say. wheat. I believe that you would concede that we can speak here of a kind of reality of these invisible crowds. the forest. define themselves as English or French or German at the beginning of a war. Canetti: No. (Adomo: Absolutely!) When human beings who identify themselves With a nation at an acute moment of national existence. I have arrived at the establishment of a concept. We cannot jump over our own shadow. Downloaded from http://the. And this has an extremely powerful effect in their minds and is of the greatest importance for their actions. the treasure. I certainly would not say that. Now these are surely units which actually exist. These would be invisible crowds. Adomo: Please excuse the pedantry of an epistemologist in my reply. which seems important to me: the concept of crowd symbols. the ocean.com at UNIV CALIFORNIA IRVINE on December 3. these imagines possess as collective entities a direct reality.4 David Roberts existence of bacilli. which does not yet distinguish so strictly between reality and representation. and their real existence does not mean that they have become objectively real. perhaps go this far with me in seeing the undeniable effectivity of such crowd symbols. heaps of the harvested. The fact that in archaic thinking. of the transposition into the world of representation is dominant with you in relation to drastic unmediated reality. Nevertheless. In order to give a practical example. in primitive thinking no distinction is yet made between the imagination of such djinns. namely that these images. present in the individual. To these units belong representations like fire. according to what you have said so far. I would say that these crowd symbols had decisive importance for the formation of national consciousness. comparable for example with the reality of the masses in modern mass SOCiety. there is a difference between primitive consciousness. You would. 2009 . since I do not believe-this is perhaps not unimportant for clarifying your intentions-I do not believe that you espouse the position represented by Klages on the one hand and by Oskar Goldberg at the other extreme. then they think of a crowd or a crowd symbol as that to which they relate.sagepub. and our representation of them plays an important role. which in a certain sense I would call real. which are always there. First of all. and the developed Western consciousness which rests in fact on this separation. they are used in the mind of the individual as crowd symbols. or whatever spirits it may be. which tells us in God's name that the world is not peopled by spirits.-for example. which admittedly do not consist of human beings but which are nevertheless felt as crowds. It is necessary to explore these individual symbols and show why they have this function and what Significance they acquire in this function. I would not hesitate for a moment.Elias Canetti: Discussion with Theodor W. which is your primary concern no less than mine. even if in a hidden way. But may I also say: even after this explanation. for example. should lead anyone to think that the real meaning of crowds is not decisive and above all important for me. even in these forms of domination and tyrannization of the masses consideration of the real interest of the masses and of their real existence always asserted itself. the weight. that in the course of a investigation over many years I had arrived at other aspects of the crowd.com at UNIV CALIFORNIA IRVINE on December 3. who has experienced first wars. A contemporary of the events of the last 50 years since the outbreak of World War One. in a wider sense social-psychological. Or are the real. as a crowd symbol you have hit on something really essential. Adorno 5 Adorno: Here I agree with you completely.sagepub. always latently p0ssessed what the sociologist Arkadi Gurland has called a compromise character. I think that with your discovery of the forest. in your conception of society and the crowd. Downloaded from http://the. This fact is the starting point of my whole investigation. it seems to me that such categories represent a real advance. which is especially important. cannot help feeling the necessity under the pressure of these events of trying to come to terms with the question of crowds. that is to say. simply the enormous pressure exerted by the gigantic numbers of human beings (even though the organization of society simultaneously supports and hinders the preservation of life)-is not the pressure of these real masses on political decision-making more important for contemporary society than these imaginary. the significance of the real masses is incomparably greater. matters to which you refer? Let us not forget that it turned out that even movements. that is. I would in fact go as far as to say that the dictatorships we have experienced are made up entirely of crowds. the actual masses. I consider these things eminently fruitful. which were apparently extreme dictatorships without any democratic consideration for popular opinion. and without the deliberate artificial excitation of ever larger crowds. already transposed into the imagination. I would of course say that the value. 2009 . in which the concept of the symbol is not by chance central. What really concerns me-to which you could perhaps reply-is this: how do you actually evaluate. as an imago. this real weight of the masses in relation to the whole realm of the symbolic? Canetti: Yes. then revolutions. the power of dictatorships would be completely unthinkable. such as Fascism and National Socialism. that without the growth of crowds. inflations and then fascist dictatorship. What I would like to ask you is something very simple and straightforward-a question also to be put analogously to psychoanalytically oriented social theory-namely whether you believe that these symbols are really crucial for the problematic of contemporary society. it still remains the case that your interest is directed to categories which have already been internalized. I would be very disappointed if the fact. Compared with the somewhat bare archaic symbols we find in Freud and on the other hand the somewhat arbitrary archetypes ofjung. as you quite rightly recognize. To this extent I think there exists a connection between the growing symbolic significance of these things and their reality. comes from the fact that we are no longer dealing with the original circumstances in which they were effective. I would say. It is not possible to investigate the crowd only as it appears today. and what is invoked from a distant past no longer possesses any truth but is transformed into a kind of poison through its untruth in the present.sagepub. not in the sense of compromise but of the Hegelian concept of mediation. 2009 . and then by Freud. I would say perhaps that one of the essential points-a point which always recurs when we consider crowds today-are the archaic elements we find in them. It seems to me that the fatal. is not directly what it once was.e Bon in his Psychology of Crowds.com at UNIV CALIFORNIA IRVINE on December 3. It is presumably only through the growth of these two correlative categories that human beings have come to resign themselves to their own disempowerment. has been repeatedly recognized in the tradition of modern social psychology-first of all by Gustave I. of the deeply entwined categories. even though it appears clearly enough and in multiple form. should be assumed: precisely the real pressure. especially when they are short-Circuited. deadly threatening colouring which concepts like leader or crowd so readily take on today. However. where he described precisely these archaiC. I would like to stress a nuance: and that is. where these internalized categories acquire a bodily meaning and are completely identified with. If I may make a theoretical point. I do not know whether you agree with me that one must pay special attention to these archaic elements as something particularly important. in my opinion. The symbolic significance of these categories has thus also increased. has increased to such an extent that the resistance. The archaism. I believe it is also important to derive it from what has long been there and has often appeared in different forms. who in his. the self-assertion of the individual has become infmitely difficult. by giving them meaning as something numinous. perhaps even irrational and therefore holy. which emerges in crowd formation. a kind of result. but is now. irrational modes of behaviour in crowds and then derived them from the somewhat problematic and vague category of suggestion. it would be that a kind of mediation. where I would correct you in terms of my position. made up of the real situation of human beings and of the world of images. But by and large I would agree with you.6 David Robens Adorno: This seems to me of fundamental importance for a proper understanding of your intention. Canetti: There is much that needs to be said here about the details. what then returns under pressure. very significant short work Group Psychology and Analysis of the Ego set out to underpin Downloaded from http://the. now they are invoked as it were. namely the symbolic and the irrational. to which they recur or even regress. crowds and power. such that human beings retreat as it were back into archaic phases of their psychic world. Adorno: I would of course agree with you. The famous models in the ethnological literature for such small groups are the bands of the Australian aborigines. they do not want them to escape. we need to introduce a new concept. First of all I would like to go back to the question of the form which the crowd takes in primitive societies. What is striking is that out of these bands. which removes him from the group. 20. One kind of these bands is for example the hunting pack. This situation. under certain conditions of life. several must come together in order to hunt down this animal. cannot lead to the crowd formations which we know today.Elias Canetti: Discussion with Theodor W.sagepub. perhaps for the first time. At first they try to hold back. Adorno 7 Le Bon's description of crowds with a genetic-psychological derivation. is already there in early societies: when one pack fights against another. if you could indicate the specific differences of your own theory to these authors. which reconciles him Canetti: Downloaded from http://the. where there were precious few persons? I am glad that you brought this up. when a member is torn from them through death. who wander in search of food. small excited groups form. Packs occur in societies which consist of small groups. I think. or the appearance of a large number of animals is involved. They want to hunt down as many as pOSSible. indeed enormous dimensions. in the interest of a topological determination of your thinking. which have a powerful goal and seek this goal with great energy and in extreme excitement. and this brings us to the war pack. 2009 . 30 human beings. to keep the dying person in the group. then something emerges which we know now from war in sharply increased. some of only 10. For this reason they come together and set out to hunt the one or many animals. as it is quite clear that primitive SOCieties. is what I have called. which consist of only very few persons. a lamenting pack. Since you stand in dispute with this after all very considerable tradition of social thought-to which the American sociologist McDougall also belongs-it would be good. Here. The third form. however. The second pack-which is also obvious-is the one directed against another pack. The concept of the hunting pack is so evident that we do not need to say much about it. which is closely related to the state of excitement of our modern crowds but which is different in that it is limited as opposed to the unlimited growth of our crowds. There is a very large animal which individuals cannot master. and by the pack I mean a small group of human beings in a special state of exCitement. they could disappear again or a time of drought could return and there would be very few animals. which is not so evident. Where there are two packs which threaten each other.com at UNIV CALIFORNIA IRVINE on December 3. Canetti: Adorno: I have been wanting to raise this very question: can we even speak of crowds in primitive SOCieties. then the group usually comes together to take cognizance in some way of this death. I speak of the pack. When a small group loses a member. when he has died they will turn to some rite. but determined by a series of qualitative aspects because it is related to the model concept of the pack. perhaps more from religions than from the very mild form which it now takes socially. where it appears as production. That naturally goes back to the early example of the hunting pack. which prevents him from becoming a dangerous enemy of the group. however. but it must be added that the first three have a kind of archaic effect. Everything connected with this I term increase packs. which have a purely archaic character. as if it were only a matter of numbers. It is not only an archaic form but has undergone qualitative changes. The increase pack. I believe it is important-I do not know how far you would agree-to distinguish sharply the forms of the pack. and when one speaks of the importance of the relations of prodUction. but that there is an interdependence between them.sagepub. has transformed itself. when people suddenly attack a person (Adomo: a pogrom pack!). All these connected phenomena I term lamenting packs. Now we come to the forth form of the pack. Of these categories of the pack the first three are very clear. and it also seems to me that their effect reaches into our time. they could hunt more. always wanted to be more. I think it is important to stress this. from those which have entered modern life and have become a really contemporary part of our life. intensmed and higher developed stage of hunting-lament and what you call increase. It was of course completely dependent on changes in the relations of production. These four forms of the pack seem to me to be firmly established. There is something essential here: for you the concept of the crowd is not a purely quantitative concept.com at UNIV CALIFORNIA IRVINE on December 3. as is often the case today. The hunting pack has become the lynch mob in our modern world. it is all too familiar. If they were more. who existed in very small numbers. 2009 . to such an extent that we do not recognize it in our society. It plays an enormous role in Christendom and in other religions. We know war. even though the more orga- Downloaded from http://the. We know lament. Adomo: Let me try to express the core of what you said. As Stefan George put it in a well known poem: your number is itself sacrilege. which is perhaps the most interesting for us: human beings. Hunting pack and war pack merge with each other. such as hunting. warwhich is a somewhat more rational. We know cases of lynchings. whereas the sacrilege does not lie in the number but in these qualitative aspects which you have emphasised. If they were more. then I believe we think above all of everything which relates to the increase pack. they could maintain themselves better against another group attacking them. Increase does not only mean increase of human beings but also the increase of the animals and plants from which they live. as it shows how superficial the current phrases about the age of the masses and so on are. There are innumerable rites and ceremonies which serve increase.8 David Roberts with his fate. I think they can be demonstrated in many ways. although you would surely agree with me that they cannot be statically separated from each other so Simply. There are innumerable very important ceremonies and there is scarcely a people on earth which does not know them. Canetti: If I may interject. We have to conSider that the commandment to increase. Nevertheless. Adomo: Exactly! This is. of a state and an organized religion as compared with natural conditions? Downloaded from http://the. Adomo: But isn't this a very late stage of an already organized. of property which can be handed down. which equates the number of descendants with the number of locusts as something to be wished. that is. inherited-only at this point can it become a commandment to create heirs. may your sons and nephews follow in endless line. We have here the large number. above all Judaism and Catholicism. I have a certain difficulty with the concept of the increase pack. institutionalized SOCiety. who will take over this property. 0. there is a poem about locusts.Elias Canetti: Discussion with Theodor W. defended itself. join. The wings of the locusts say: unite. unity. the continuity of the descendents. that is fetishized. To be honest. I would like to present two: In the Shi-King. I think. One has to assume that in primitive stages of the development of humanity-I am thinking for instance of the construction of a stage of hetaerism-the question of human increase was given no value. the enormity of their number is exactly what one wishes for one's descendents. 0. I would like to read it to you: The wings of the locusts say: join.sagepub. I would then like to say something about what I see as very fruitful in this category of increase. That the locusts are used here as a symbol for the descendents is particularly remarkable. I would rather be inclined to say that this commandment to increase is of historical origin and is tied to the category of property. It would be interesting if you could first say something about this. Only when there is something like property. may your sons and nephews be for ever one.com at UNIV CALIFORNIA IRVINE on December 3. yes!) It was a question of exacting revenge on a person who had perhaps committed a murder. briefly: I am convinced that the war pack emerged originally from the hunting pack. the classical songbook of the Chinese. This poem is short. represents the negation of the latter's immediacy. three wishes for the descendents. (Adomo: emerged. as the whole will to increase seems to me a bit problematic. that this commandment occurs precisely in those religiOns which are distinguished from the mythical or magical natural religions. unite. set off in order to revenge this murder. to which the murderer belonged. which we have in the great religions. a second pack was formed and we already have the model of the war pack. which I have collected. compared with what we could call the spontaneous hunting pack. because locusts were of course feared. the general opinion of ethnology on this point. If the group. Adorno 9 nized war pack. 2009 . Canetti: Of the great number of examples. As a result this urge to increase appears as secondary not as primary. and so a group formed. that must be preserved. gets up.. In the following night more of these sons fall from his armpits. and he sends his sons to find bandicoots. which are suddenly generated in gigantic masses. But there is also the opposed element. notices that he is surrounded by an enormous number of bandicoots. The Shi-King is very old. The relation between these bandicoots and his sons is very interesting. Today at any rate it appears to be the case that the idea of increase-which has of course clear and familiar civilizational and economic grounds-is both desired and feared. I believe that we can speak here of a very strong urge to increase. the amorphous multiplicity of forms. he has been sleeping for an eternity. which were published only some 15 years ago. and it seems to me hardly possible any more to separate the primary and the secondary. He sits up. This is especially interesting because it concerns totemic myths. is represented lying at the bottom of a pond in eternal sleep. then later a large number of sons are generated from him.10 David Robens This could perhaps be said. feels hungry. cooks it in the fierce sun and eats it-eats.) That is perhaps true. old Korora. but . of bandicoots and of sons. which senses the dan- Downloaded from http://the. Thus he produced food and also his own sons. The human beings. And so it continues every night. I want to tell one of them. The sun rises. Many similar traditions could be added to this myth. This applies to single individuals and families as well as peoples and humanity as a whole. it presumes a highly developed and indeed developed hierarchical society.sagepub. Finally 50 sons emerge together from his armpits. (Adorno: Adorno: Canetti: I would say here that we are dealing with something very ambivalent-it would take us far afield and I don't think we can discuss this fully here. There is certainly an archaic element which pulls in the direction of the manifold. and this totem Signifies that bandicoots and human beings. and in general it doesn't really help in these questions to ask what is primary and derived. He is the ancestral father of the bandicoot totem.com at UNIV CALIFORNIA IRVINE on December 3. changes shape and becomes a human being. he grabs in all directions. who grows and is recognized by him as his son the following morning. 2009 . are so to speak the younger brothers of these bandicoots. The one feeds on the other. All the same. who belong to this totem. one of the creatures which has originated from him. are related in the closest fashion. He lies down to sleep and that night a bull roarer falls from his armpit. And that is why I would like to give you another example. One could call him a crowd mother. his human sons. cook and live from. It is his first son. since he is composed. But he is still asleep. one could say. which they catch. seizes one of these bandiCOOts. the father. We have here a kind of double increase: first he is the ancestor of the bandicoots. It is about the origin of the bandicoot totem and it says: the ancestor of the bandicoot totem. that is.. One day an enormous number of bandicoots come out of his navel and armpits and he is completely surrounded by them. The younger Strehlow recorded them among the Aranda. like me. But I would like to broach an issue in your theory of increase which appears very fruitful. in part surely imaginary. Downloaded from http://the. in the whole unconscious. the question of the difference between our approach and your theories about the crowd and those of Le Bon and Freud. We probably could not understand why this culture of production for the sake of production flourishes everywhere on earth. That is why I consider your viewpoint altogether productive. the institutions in which humanity lived and still lives. Adorno 11 ger to its survival in the present forms of organization and beyond that is plagued by the doubt. that is. which is their own product. it has become fetishized. It already occurs with the ancient Persians and it is also to be found among peoples with a strong tendency to increase. that every additional human being on the horizon is at the same time a threat to the survival of the rest. That this question is not asked. seems to me to indicate that this apparatus of production can mobilize enormous libidinal energies in the masses. May I come back to the question which I put to you earlier and to which your have not as yet responded. Otherwise how could the simple objection fail to be raised: why should we produce more and more when what is produced in reality has long been sufficient to satisfy our needs. the increase of goods. Adorno: In this ambivalence there is certainly the deep consciousness. that under present conditions the apparatus of prodUction.com at UNIV CALIFORNIA IRVINE on December 3. which are after all well known. Canetti: If I may add something: this idea of an overfilled earth is also very old and mythical. archaic inheritence we have.Elias Canetti: Discussion with Theodor W. one is inclined not to place this urge or will to increase at the beginning. 2009 . that is. You show in one part of your book that production. on the one hand that all possible life has the right to exist. even if. and thereby the whole relations of prodUction. are in reality dragged along by the machine. which it can use for its own constant and ultimately very problematic expansion. Now with an economic theory of society one can give rational or pseudo-rational grounds why this has happened. given the forms. but on the other hand. however distant.sagepub. can only keep itself going by creating ever new circles of purchasers for its products-a remarkable reversal of the primary and the secondary. Your theory fills a very good function here. if it did not appeal so strongly to something in human subjectivity. independent of the different political systems. This ambivalence has not only psychological but equally real grounds. who always emphasized this desire for increase. whether our old earth will be able to feed the measureless increase of humankind. for whom supposedly this is all there. In general the fruitfulness of a theory lies to a large extent in the minute differences which separate it from related theories. with the result that human beings. as you do. has become a kind of self-purpose today or as I would say. There are. It is extremely important in an army that five persons can be split off by a command. The flight crowd is still in a crowd state. The crowds he describes are really the crowds which arise only in quite specific situations such as conflagrations. People in one place are suddenly threatened by .com at UNIV CALIFORNIA IRVINE on December 3. Sometimes. it can become a crowd.. like a fleeing herd. You will rightly object that lynching crowds are incited by demagogues . quite consistently from his standpoint.sagepub. but in principle an army is not at all in my sense a crowd. Canetti: Downloaded from http://the. Adorno: Le Bon is not actually a theory. which is not yet panic and is still a unity. to whom the crowd relates. The direction is: away from danger! All the same. which can be indiVidually explained and which are very important. however.12 Da~d Robens Canetti: Perhaps you will permit me to stress more the differences between Freud's theory and mine. a flight crowd. Adorno: That of course is connected with the theory of the primal father.. He always sees a single individual. Another aspect. That he selects two hierarchically structured-let us call them groups-in order to explain his crowd theory.. I do not regard the crowd as hierarchically structured.. Canetti: In relation to Freud. here I think we must distinguish between a flight crowd and a panic crowd. as I find . when they all flee together. one is the church and the other the army. theatre fires and similar occasions and which are not prototypical for the concept of the crowd as such. It has a direction. I believe that the lynching crowd does not always have a leader. An army is a collection of human beings. who are held together by a specific structure of command in such a way that they cannot become a crowd. A description of a relatively narrow phenomenon. seems to me very characteristic for him. 300 can be deployed as a unit somewhere else. Canetti: Adorno: No. I agree that it would be better to discuss Freud rather than Le Bon. An army is not a crowd for me.. which I would emphasize as an important difference. and here I think you will agree with me. there are some observations to be made: Freud speaks of two concrete crowds. rather a description. in the moment of flight or perhaps of a very violent attack. is that Freud actually only speaks of crowds which have a leader. It is thus quite significant that Freud exemplifies his theory through the army. has no leader. at certain moments. An army can be split at any time. the father of the horde. 2009 . also crowds of quite a different kind: for instance.. Panic is a breaking apart of the crowd when each individual simply wants to save his own life. This he conceives as the decomposition of the crowd. The flight crowd. it shows quite explicit crowd phenomena. neglecting essential historical modifications. Everything is in commotion. Only then perhaps will we be able to have clearer ideas about identification. and what really occurs between a model and the person who follows a model. As a result his social psychology remains somewhat abstract. a genetic interpretation of I. let alone a leader. I fully agree that army and church cannot simply be subsumed under the concept of the crowd. which they want to enjoy together in a state of joy and excitement. leads him time and again to the invariant fundamental quanta of the unconscious. one can't even talk of a direction. there are others. This was already the case during the pogroms of the Crusades.sagepub. You were surely rather surprised that such a large pan of my book is devoted to the problems of metamorphosis. there are still funher objections. It is actually a commentary or an interpretation. There is above all the question of the concept of identification. I believe there is a lynching crowd before and beyond these directed. Adorno 13 Adomo: Above all in history it has always been the case that precisely lynching crowds were not spontaneous but manipulated.e Bon's.e Bon's phenomenology of the crowd.com at UNIV CALIFORNIA IRVINE on December 3. You won't find it in my whole presentation of the crowd. I try to do without identification. Freud says at many places in his work when talking of identification that it is the question of an exemplary model. not really clear. I have really made it my task to investigate all aspects of metamorphosis completely afresh. 2009 . rather they are reactions.Elias Canetti: Discussion with Theodor W. Nevenheless. Adomo: He worked from it. I consider this concept to be insufficiently reflected. for the very reason that Freud's basic tendency to replace the theory of society by individual psychology extended to the collectivity. leader-related crowds. This is an example which has nothing to do with a leader.e Bon's description. You will recall that I also presented the feast crowd. in which the archaic crowd aspect. too imprecise. Canetti: I would also say: even if we take this restricted case of the crowd. I believe. in order to be able to determine what a model actually is. of the child for example identifying with his father and wanting to be like his father. But what really happens in this relation to the model has never been shown exactly. There are other examples. The second volume will contain much more on metamorphosis. reactive formations. too dependent on I. Now this is certainly right. Canetti: That is certainly correct. which Freud had in mind is also Downloaded from http://the. As long as this is not the case I am inclined to avoid the whole concept of identification. Adomo: Your critique seems to me to be extremely fruitful and correct in many points. Freud's concept of the crowd is. I have mentioned only a few points. which Freud sought to explain according to I. The father is the model. It is a question of a gathering of people and of a great amount of harvest produce. It would be good if in conclusion if you could say a few words about your theory of the command. However commands are given. I believe that the threat from an animal. as Freud thought during the First World War. A lion in search of prey announcing itself through its roar causes other animals to flee. May I draw your attention to a very Significant work on the feast by the French cultural anthropologist Roger Caillois. then we can see that precisely socalled crowd phenomena cannot be cOl1ceived simply as primary manifestations of the archaic crowd. This is very important. which feeds on other animals. in which he attributes the feast to a reactive formation. however distantly. Commands are conveyed without human beings perhaps being aware that they are also receiving a death threat. This seems to me to be the germ of the command. since this model has been employed and has become intrinsic to our SOCiety. And through the execution of death sentences. (Adorno: Every execution is directed to those who are not executed). even making a duty of precisely what is otherwise forbidden. immediate physical violence. And if we take this further. but essentially negated and contained by hierarchy and a certain kind of rationality. If I may say something else. which is of course the inseparable corollary of the crowd theory. what made the greatest impression on me in your book is something which belongs less to the theory of the crowd than to the theory of power. Willingly. The warning is given.com at UNIV CALIFORNIA IRVINE on December 3. to mention a furCanetti: Downloaded from http://the. the threat of annihilation. barbaric societies. And then. In this sense what you would call the feast crowds would also be an historically dynamic and not a primary phenomenon. leads to their flight. I think that only when we are clearly aware that society. to a reversal of hierarchically strict rites within very rigid. that is.14 David Roberts present. As far as the feast is concerned. can we fully grasp the frightful interlocking of survival. has as part of its substance the threat of death. but consist of reactive formations. and of death. namely your theory of the command. and thus the self-preservation of human beings itself. It is originally a flight command. as you call it. if you do not do what is demanded of you. it is certainly quite right that we cannot speak of leadership here. They can only assure their own institutional survival by reversing their rules and by allowing in certain exceptional situations. common to most societies. the threat of death stands behind them. in the way that you have formulated it. 2009 . regressions to social stages which are actually no longer compatible with the present. although it can't be condensed to a few words: I derive the command-biologically-from the flight command. as it developed later and became a very important institution for us. which seems to me to be so eminendy enlightening and essential because you spell out-and here I would like to recall our Dialectic of Enlightenment-what otherwise largely disappears behind the facade of SOCiety.sagepub. then what is happening in this execution will happen to you. the command always regains its frightfulness. I mean that behind all socially approved and expected forms of behaviour there stands. by naming as it were the magiC chann of this spell which has bewitched human beings. examination of the command led me to see that the command can be divided into what constitutes its propelling force. which I call the sting of command. 2009 . to do again what has been done to one. Adorno 15 ther point. It is obvious to what consequences that leads. your book is striving-if I have understood you correctly-to serve this purpose.com at UNIV CALIFORNIA IRVINE on December 3. We would like to thank Hanser Verlag and Suhrkamp Verlag for permisSion to translate. and another part. Human beings want to free themselves from these stings. Die gespaltene Zukunft (Hanser Verlag. they feel oppressed by these stings. because he is suffocating from his stings of command. That is particularly important. Translated by David Roberts This 1962 radio discussion was published in Canetti. and it remains in the person who carries it out. so that it might one day be possible to escape from this spell. the sting of this command remains in him and this sting is completely unchanging. above all because it expresses in a very original and unconventional way that the threat of direct violence lives on in all mediations. which leads to its execution. Nietzsche's wonderful idea. Downloaded from http://the. Every attempt to extract oneself from this sphere is caught in the spell of this mythical cycle. its content. its motor energy. perhaps he doesn't think about it. in order to be able to get rid of their stings. and they often seek situations. They are all there in them and they all want to come to light again through a kind of reversal. It is simply a fact that every human being who lives in society is full of stings of whatever kind. However. By naming it. Perhaps he doesn't know it. by naming this spell in your book.Elias Canetti: Discussion with Theodor W. This sting has exactly the form of the command. refers exactly to the state of affairs of which you speak. They can amount to so many that the individual is driven to quite monstrous deeds. that human beings must be redeemed from revenge.sagepub. 1972). A person who carries out a command is not happy about it. Adorno: This is something extraordinarily thought-provoking. Human beings can store up stings and these may come from commands which they received 20 or 30 years ago. which represent an exact reversal of the original situation of command.
1. Technical Field This invention relates to automated warehouse systems and more particularly to a tote pan and rack structure for a small parts or mini-load storage and retrieval system. 2. Information Disclosure Statement Heretofore others have devised small parts or mini-load warehousing systems wherein tote pans are slid into and out of rack compartments at opposite sides of an aisle by an extractor mechanism. Some such systems are disclosed in U.S. Pat. No. 3,809,259 issued May 7, 1974 to George R. Pipes; U.S. Pat. No. 3,883,008 issued May 13, 1975 to John A. Castaldi and U.S. Pat. No. 4,010,855 issued Mar. 8, 1977 to Joseph F. Smith wherein an extractor mechanism on a crane carriage has a finger engagable with a lip or bracket at the lower front portion of the tote pan to slide it into or out of a rack storage compartment at either side of an aisle. The problem of wear due to sliding the tote pan has been recognized and alleviated to some extent by material selection and provision of replaceable wear strips such as nylon strips 42 in before mentioned U.S. Pat. No. 3,809,259. In the portable tray cart shown in U.S. Pat. No. 3,721,349, downward projections on the tray rim cooperate with notches in support rails on the portable cart to releasably retain the tray in place on the cart. A rimmed storage pan is shown in U.S. Pat. No. 3,448,870 issued June 10, 1969 to J. R. Gallo et al. A tote pan with reverse bend lips with apertures cooperating with vertical projections on lift forks of a lift truck is illustrated and described in U.S. Pat. No. 3,918,600 issued Nov. 11, 1975 to G. T. Lyon. A relatively open storage rack is shown in U.S. Pat. No. 2,894,641 issued July 14, 1959 to L. E. Edwards, Jr. wherein pallets are supported on rails supported on vertical supports reinforced by horizontally disposed channels.
Offer curve In economics and particularly in international trade, an offer curve shows the quantity of one type of product that an agent will export ("offer") for each quantity of another type of product that it imports. The offer curve was first derived by English economists Edgeworth and Marshall to help explain international trade. The offer curve is derived from the country's PPF. We describe a Country named K which enjoys both goods Y and X. It is slightly better at producing good X, but wants to consume both goods. It wants to consume at point C or higher (above the PPF). Country K starts in Autarky at point C. At point C, country K can produce (and consume) 3 Y for 5 X. As trade begins with another country, and country K begins to specialize in producing good X. When it produces at point B, it can trade with the other country and consume at point S. We now look at our Offer curve and draw a ray at the level 5 Y for 7 X. When full specialization occurs, K then produces at point A, trades and then consumes at point T. The price has reduced to 1 Y for 1 X, and the economy is now at equilibrium. References Salvatore, Dominick. "International Economics." John Wiley & Sons, Inc, 2001. Category:International economics Category:Microeconomics Category:Economics curves
--- abstract: 'To construct non-trivial biharmonic maps between two Riemannian manifolds $(M^m,g)$ and $(N^n,h)$, P. Baird and D. Kamissoko (cf. [@BK]) introduced to reduce the equations into an ordinary differential equation by conformal change of a metric $g$ by a $C^{\infty}$ function $f$. However in this paper, in the case that $(M^m,g)$ is the standard Euclidean space, we show that the ODE has no global positive solution for every $m\geq 5$, and on the contrary, there exist both global positive solutions and also periodic positive solutions in the case $m=3$. As their applications, we show that, in the cases of $m=3$, for two product Riemannian manifolds $(M^3,g)=({{\mathbb R}}\times \sigma,ds^2\times g_{\Sigma})$ of the line and a surface, $(N^n,h)=({{\mathbb R}}\times P^{n-1}, ds^2\times g_P)$ of the line and a Riemannian manifold, there exist functions $f$ on $M$ satisfying that every product harmonic map of $(M^3,g)$ into $(N,n,h)$ whose line component is non-constant, is biharmonic but not harmonic from $(M^3,g)$ into $(N^n,h)$.' address: - ' Graduate School of Mathematics, Nagoya University, Furocho, Chikusaku, Nagoya, 464-8602, Japan ' - ' Institute for International Education, Tohoku University, Kawauchi 41, Sendai, 980-8576, Japan ' author: - Hisashi Naito - Hajime Urakawa title: Conformal change of Riemannian metrics and biharmonic maps --- [^1] Introduction ============ Harmonic maps play a central role in variational problems and geometry. They are critical points of the energy functional $E(\varphi)=\frac12\int_M \Vert d\varphi\Vert^2 {{v_g}}$ for smooth maps $\varphi$ of $(M,g)$ into $(N,h)$, and the Euler-Lagrange equation is that the tension field $\tau(\varphi)$ vanishes. By extending the notion of harmonic maps, in 1983, J. Eells and L. Lemaire [@EL1] introduced the bienergy functional $$E_2(\varphi)=\frac12\int_M \vert\tau(\varphi)\vert^2{{v_g}}.$$ After G.Y. Jiang [@J] studied the first and second variation formulas of $E_2$, whose critical maps are called biharmonic maps, there have been extensive studies in this area (for instance, see [@CMP], [@I], [@II], [@LO], [@LO2], [@MO1], [@O1], etc.). It is clear that the biharmonicity derives from harmonicity. In the compact case, a harmonic map is a minimum of the bienergy functional, therefore a critical point, i.e., it is biharmonic. In the non-compact case, from the biharmonic equation $\tau(\varphi)=0$ implies $\tau_2(\varphi)=0$. One of most important problems on biharmonic maps is to construct biharmonic maps which are not harmonic (cf. [@BK], [@CMP], [@IIU], [@J], [@MO1], [@O1]). P. Baird and D. Kamissoko [@BK] raised an interesting idea to produce a biharmonic but not harmonic map of $(M,\widetilde{g})$ into $(N,h)$ with conformal change of $g$ into $\widetilde{g}$, by a factor of $C^{\infty}$ function $f$, and they reduced to problem to the existence of non-trivial positive solutions of the ordinary differential equation on $f$: $$\label{eq:0} f^2 f'''-2 \frac{m+1}{m-2} f f' f''+\frac{m^2}{(m-2)^2} {f'}^3=0,$$ and gave some interesting examples biharmonic maps. However, they did not reach to a final answer on the very interesting and important existence problem of global solutions of the ODE (\[eq:0\]). In this paper, we give a final and complete answer to this problem. Our conclusion is the following: If $\dim M \ge 5$, there is NO global solution of this ODE (\[eq:0\]) (cf. Theorem \[theorem:7:1\]), and if $\dim M=3$, $4$, there exists a global solution $f$ of (\[eq:0\]) (cf. Theorem \[theorem:7:1\]). Furthermore, there is NO periodic solution of (\[eq:0\]) (cf. Theorem \[theorem:case3:3\]). Our method of proof is to analyze the solutions of (\[eq:0\]) based on the comparison theorem for the ordinary differential inequality (cf. Lemma \[lemma:6:1\]). In case of $\dim M = 8$, the ODE (\[eq:0\]) is related to the Jacobi’s elliptic function, hence by using analysis on the poles and zeros of the Jacobi’s elliptic function and the energy equality (cf. Proposition \[proposition:6:2\] and Lemma \[lemma:7:2\]), we obtain the non-existence result of global solutions of (\[eq:0\]). In case of $\dim M \ge 5$, by using the energy inequality (Lemma \[lemma:7:2\]), we also obtain the non-existence result of global solutions of (\[eq:0\]). Finally, we show \[theorem:introduction:1\] Assume $m = 3$, $4$, for a given harmonic map $\varphi \colon (\Sigma^{m-1},g)\rightarrow (P,h)$, let us define $\widetilde{\varphi} \colon {{\mathbb R}}\times \Sigma^{m-1}\ni (x,y)\mapsto (ax+b,\varphi(y))\in {\mathbb R}\times P$ where $a$ and $b$ are constants, and define also $\widetilde{f}(x,y) {\mathrel{\mathop:}=}f(x)$ ($(x,y)\in {{\mathbb R}}\times \Sigma^{m-1}$), where $f$ is the solution of the ODE (\[eq:0\]). Then, 1. In the case $m=3$, the mapping $\widetilde{\varphi} \colon ({{\mathbb R}}\times \Sigma^2,\widetilde{f}^2 g) \rightarrow ({{\mathbb R}}\times P,h)$ is biharmonic, but not harmonic if $a\not=0$. 2. In the case $m=4$, the mapping $\widetilde{\varphi} \colon ({{\mathbb R}}\times \Sigma^3,\frac{1}{\cosh x} g) \rightarrow ({{\mathbb R}}\times P,h)$ is biharmonic, but not harmonic if $a\not=0$. Outline of this paper is as follows: After preparing the basic materials, we show several formulas under conformal change of Riemannian metrics, and derive (\[eq:0\]) by a different manner as P. Baird and D. Kamissoko ([@BK]) in Sections 3, 4 and 5. In Section 5, we also construct an 2nd order non-linear ODE (\[eq:5:6\]) from (\[eq:0\]) by using the Cole-Hopf transformation $u=f'/f$. In Section 6, we show our main tools to analyze the solutions of (\[eq:5:6\]), the comparison theorem of the ordinary differential inequalities (cf. Lemma \[lemma:6:1\]), the analysis of the poles and zeros of the Jacobi’s elliptic functions (cf. Proposition \[proposition:6:2\]), and the energy inequality for (\[eq:5:6\]) (cf. Lemma \[lemma:7:2\]). In Section 7, we show main results of this paper, the non-existence and existence of solutions of (\[eq:5:6\]) and hence them of (\[eq:0\]) by using the energy inequality and the comparison theorem. Finally, in Section 8, we show applications to constructions of biharmonic, but not harmonic maps between the product manifolds whose dimension of the domain manifold $M$ is 3 or 4 (cf. Theorem 1.1, Theorem \[theorem:9:1\]). Preliminaries ============= In this section, we prepare materials for the first and second variation formulas for the bienergy functional and biharmonic maps. Let us recall the definition of a harmonic map $\varphi\colon (M,g)\rightarrow (N,h)$, of a compact Riemannian manifold $(M,g)$ into another Riemannian manifold $(N,h)$, which is an extremal of the [*energy functional*]{} defined by $$E(\varphi)=\int_Me(\varphi){{v_g}}$$ where $e(\varphi) {\mathrel{\mathop:}=}\frac12\vert d\varphi\vert^2$ is called the energy density of $\varphi$. That is, for any variation $\{\varphi_t\}$ of $\varphi$ with $\varphi_0=\varphi$, $$\label{eq:preliminaries:1} \left. \frac{d}{dt} \right|_{t=0} E(\varphi_t) = -\int_{M}h(\tau(\varphi),V){{v_g}}=0,$$ where $V\in \Gamma(\varphi^{-1}TN)$ is a variation vector field along $\varphi$ which is given by $ V(x)=\left.\frac{d}{dt}\right|_{t=0}\varphi_t(x)\in T_{\varphi(x)}N, $ $(x\in M)$, and the [*tension field*]{} is given by $ \tau(\varphi) = \sum_{i=1}^m B(\varphi)(e_i,e_i)\in \Gamma(\varphi^{-1}TN), $ where $\{e_i\}_{i=1}^m$ is a locally defined frame field on $(M,g)$, and $B(\varphi)$ is the second fundamental form of $\varphi$ defined by $$\label{eq:preliminaries:2} \begin{aligned} B(\varphi)(X,Y) &=(\widetilde{\nabla}d\varphi)(X,Y) \\ &=(\widetilde{\nabla}_X d\varphi)(Y) \\ &=\overline{\nabla}_X(d\varphi(Y))-d\varphi(\nabla_X Y) \\ &={}^N\!\nabla_{\varphi_{\ast}(X)}d\varphi(Y) -\varphi_{\ast}(\nabla_X Y), \end{aligned}$$ for all vector fields $X$, $Y \in {{\mathfrak X}}(M)$. Furthermore, $\nabla$, and ${}^N\!\nabla$, are connections on $TM$, $TN$ of $(M,g)$, $(N,h)$, respectively, and $\overline{\nabla}$, and $\widetilde{\nabla}$ are the induced ones on $\varphi^{-1}TN$, and $T^{\ast} M\otimes \varphi^{-1}TN$, respectively. By (\[eq:preliminaries:1\]), $\varphi$ is harmonic if and only if $\tau(\varphi)=0$. The second variation formula is given as follows. Assume that $\varphi$ is harmonic. Then, $$\label{eq:preliminaries:3} \left. \frac{d^2}{dt^2} \right|_{t=0} E(\varphi_t) =\int_{M}h(J(V),V){{v_g}}$$ where $J$ is an elliptic differential operator, called [*Jacobi operator*]{} defined on $\Gamma(\varphi^{-1}TN)$ given by $$\label{eq:preliminaries:4} J(V)=\overline{\Delta}V-{{\mathcal R}}(V),$$ where $\overline{\Delta}V=\overline{\nabla}^{\ast}\overline{\nabla}V$ is the [*rough Laplacian*]{} and ${{\mathcal R}}$ is a linear operator on $\Gamma(\varphi^{-1}TN)$ given by $ \RR V= \sum_{i=1}^m R^{\!N}(V,d\varphi(e_i))d\varphi(e_i), $ and $R^{\!N}$ is the curvature tensor of $(N,h)$ given by $ R^{\!N}(U,V)W={}^N\!\nabla_U{}^N\!\nabla_V W -{}^N\!\nabla_V{}^N\!\nabla_U W-{}^N\!\nabla_{[U,V]}W$ for $U$, $V$, $W \in {{\mathfrak X}}(N)$. J. Eells and L. Lemaire proposed ([@EL1]) polyharmonic ($k$-harmonic) maps and Jiang studied ([@J]) the first and second variation formulas of biharmonic maps. Let us consider the [*bienergy functional*]{} defined by $$\label{eq:preliminaries:5} E_2(\varphi)=\frac12\int_M\vert\tau(\varphi)\vert ^2{{v_g}}$$ where $\vert V\vert^2=h(V,V)$, $V\in \Gamma(\varphi^{-1}TN)$. Then, the first and second variation formulas are given as follows. \[theorem:preliminaries:1\] $$\label{eq:preliminaries:6} \left. \frac{d}{dt} \right|_{t=0} E_2(\varphi_t) =-\int_{M}h(\tau_2(\varphi),V){{v_g}}$$ where $$\label{eq:preliminaries:7} \tau_2(\varphi)=J(\tau(\varphi))=\overline{\Delta}\tau(\varphi)-{{\mathcal R}}(\tau(\varphi)),$$ $J$ is given in (\[eq:preliminaries:4\]). \[definition:preliminaries:2\] A smooth map $\varphi$ of $M$ into $N$ is said to be [*biharmonic*]{} if $\tau_2(\varphi)=0$. Formulas under conformal change of Riemannian metrics ===================================================== In this section, we show several formulas under conformal changes of the domain Riemannian manifold $(M,g)$. Let $(M,g)$ and $(N,h)$ be two Riemannian manifolds, and $\varphi\colon M\rightarrow N$, a $C^{\infty}$ map from $M$ into $N$. We denote the [*energy functional*]{} by $$\label{eq:3:1} E_1(\varphi:g,h) {\mathrel{\mathop:}=}\frac12 \int_M\vert d\varphi\vert_{g,h}{}^2{{v_g}}$$ where $\vert d\varphi\vert_{g,h}^2$ is twice of the energy density of $\varphi$, i.e., $$\vert d\varphi\vert_{g,h}{}^2 {\mathrel{\mathop:}=}\sum_{i=1}^m h(\varphi_{\ast}e_i,\varphi_{\ast}e_i),$$ and $\{e_i\}_{i=1}^m$ is a local orthonormal frame field on $(M,g)$. For a positive $C^{\infty}$ function on $M$, we consider the conformal change of the Riemannian metric on $M$, $\widetilde{g} {\mathrel{\mathop:}=}f^{2/(m-2)} g$, where $m=\dim M>2$. Then, we have (cf. [@EF]) that $$\begin{aligned} \vert d\varphi\vert_{\widetilde{g},h}{}^2 &=f^{-2/(m-2)} \vert d\varphi\vert_{g,h}{}^2, \label{eq:3:2} \\ v_{\widetilde{g}}&=f^{m/(m-2)}{{v_g}}. \label{eq:3:3}\end{aligned}$$ Thus, we have ([@EF p.161]) that $$\label{eq:3:4} E_1(\varphi:\widetilde{g},h) =\frac12\int_M f \vert d\varphi\vert_{g,h}{}^2{{v_g}}.$$ Let us consider the [*bienergy functional*]{} defined by $$\label{eq:3:5} E_2(\varphi:g,h) {\mathrel{\mathop:}=}\frac12\int_M\vert\tau_g(\varphi)\vert_{g,h}{}^2{{v_g}}$$ where $$\label{eq:3:6} \tau_g(\varphi) {\mathrel{\mathop:}=}\sum_{i=1}^m \left\{{}^{N}\!\nabla_{\varphi_{\ast}e_i}\varphi_{\ast}e_i-\varphi_{\ast}(\nabla^g_{e_i}e_i) \right\}\in \Gamma(\varphi^{-1}TN)),$$ ${}^{N}\!\nabla$, $\nabla^g$ are the Levi-Civita connections of $(N,h)$, $(M,g)$, respectively. We first see that $$\label{eq:3:7} \begin{aligned} \nabla^{\widetilde{g}}_X Y = \nabla^g_X Y &+\frac{1}{m-2} \left\{ f^{-1}(X f)Y +f^{-1}(Y f)X \vphantom{-g(X,Y) f^{-1}\sum_{i=1}^m (e_if)e_i,} \right. \\ & \left. -g(X,Y) f^{-1}\sum_{i=1}^m (e_if)e_i, \right\} \end{aligned}$$ for all $X,Y\in {{\mathfrak X}}(M)$. Then, we have $$\label{eq:3:8-10} \begin{aligned} \tau_{\widetilde{g}}(\varphi) &=f^{-2/(m-2)} \tau_g(\varphi) +f^{-m/(m-2)} \varphi_{\ast}(\nabla^g f) \\ &=f^{2/(2-m)} \left\{ \tau_g(\varphi)+f^{-1}\varphi_{\ast}(\nabla^g f) \right\}\\ &=f^{m/(2-m)} {\operatorname{div}}_g(f d\varphi), \end{aligned}$$ where $\nabla^g f {\mathrel{\mathop:}=}\sum_{j=1}^m(e_j f) e_j\in {{\mathfrak X}}(M)$ for $f\in C^{\infty}(M)$, and $$\begin{aligned} {\operatorname{div}}_g(d\varphi)& {\mathrel{\mathop:}=}\sum_{i=1}^m (\widetilde{\nabla}_{e_i}d\varphi)(e_i) =\sum_{i=1}^m \left\{ \widetilde{\nabla}_{e_i}(d\varphi(e_i)) -d\varphi(\nabla_{e_i}e_i) \right\}\\ &=\sum_{i=1}^m \left\{ {}^N\!\nabla_{\varphi_{\ast}(e_i)}d\varphi(e_i) -\varphi_{\ast}(\nabla_{e_i}e_i) \right\}. \end{aligned}$$ Here, recall that $\widetilde{\nabla}$ is the induced connection on $\varphi^{-1}TN \otimes T^{\ast}M$ from ${}^{N}\!\nabla$ and $\widetilde{g}$, and we have $$\label{eq:3:11} f^{m/(2-m)} {\operatorname{div}}_g(f d\varphi) =f^{m/(2-m)} d\varphi(\nabla^g f) +f^{2/(2-m)}\tau_g(\varphi).$$ Therefore, it holds (cf. [@EF]) that $\varphi \colon (M,\widetilde{g})\rightarrow (N,h)$ is harmonic if and only if $$\label{eq:3:12} f \tau_g(\varphi)+\varphi_{\ast}(\nabla^g f)=0.$$ Summing up the above, we have \[lemma:3:1\] The Euler-Lagrange equation of the energy functional $E_1(\varphi:\widetilde{g},h)$ is given by $$\begin{aligned} \tau(\varphi:\widetilde{g},h) &=f^{2/(2-m)} \left\{ \tau(\varphi:g,h)+\varphi_{\ast}(\nabla^g\log f) \right\} \label{eq:3:13} \\ &=f^{m/(2-m)} {\operatorname{div}}_g(f d\varphi). \label{eq:3:14} \end{aligned}$$ Thus, $\varphi \colon (M,\widetilde{g})\rightarrow (N,h)$ is harmonic if and only if ${\operatorname{div}}_g(f d\varphi)=0$. Next, we compute the Euler-Lagrange equation of the [*bienergy functional*]{}: $$E_2(\varphi:\widetilde{g},h)= \frac12\int_M \vert \tau_{\widetilde{g}}(\varphi) \vert_{\widetilde{g},h}{}^2 v_{\widetilde{g}}.$$ It is known (cf. [@J]) that $$\label{eq:3:15} \begin{aligned} \tau_2(\varphi:\widetilde{g},h) =&J_{\widetilde{g}}(\tau_{\widetilde{g}}(\varphi)) \\ =&\overline{\Delta}_{\widetilde{g}}(\tau_{\widetilde{g}}(\varphi))-{{\mathcal R}}_{\widetilde{g}}(\tau_{\widetilde{g}}(\varphi)) \\ =& -\sum_{i=1}^m \left\{ \overline{\nabla}_{\widetilde{e_i}} (\overline{\nabla}_{\widetilde{e_i}} \tau_{\widetilde{g}}(\varphi)) -\overline{\nabla} _{\nabla^{\widetilde{g}}_{\widetilde{e_i}}\widetilde{e_i}}\tau_{\widetilde{g}}(\varphi) \right\} \\ &- \sum_{i=1}^m R^{\!N}(\tau_{\widetilde{g}}(\varphi), \varphi_{\ast}\widetilde{e_i}) \varphi_{\ast}\widetilde{e_i}, \end{aligned}$$ where $\overline{\nabla}$ is the induced connection on $\varphi^{-1}TN$ from the Levi-Civita connection ${}^N\!\nabla$ on $TN$ of $(N,h)$, and $\{\widetilde{e_i}\}_{i=1}^m$ is the local orthonormal frame field on $(M,\widetilde{g})$ given by $\widetilde{e_i} {\mathrel{\mathop:}=}f^{-1/(m-2)}e_i$ $(i=1,\cdots,m)$. We first calculate $J_{\widetilde{g}}(V)$, $(V\in \Gamma(\varphi^{-1}TN))$ given by definition as $$\begin{aligned} \label{eq:3:16} J_{\widetilde{g}}(V) &{\mathrel{\mathop:}=}\overline{\Delta}_{\widetilde{g}}(V)-{{\mathcal R}}_{\widetilde{g}}(V)\nonumber\\ &= -\sum_{i=1}^m \left\{ \overline{\nabla}_{\widetilde{e_i}} (\overline{\nabla}_{\widetilde{e_i}} V) -\overline{\nabla} _{\nabla^{\widetilde{g}}_{\widetilde{e_i}}\widetilde{e_i}}V \right\} - \sum_{i=1}^m R^{\!N}(V, \varphi_{\ast}\widetilde{e_i}) \varphi_{\ast}\widetilde{e_i}.\end{aligned}$$ \[lemma:3:2\] The Jacobi operator with respect to $\widetilde{g}$ is $$\label{eq:3:17} J_{\widetilde{g}}(V)= f^{2/(2-m)}J_g(V)-f^{m/(2-m)}\overline{\nabla}_{\nabla^g f}V,\quad (V\in \Gamma(\varphi^{-1}TN)).$$ \[cf. [[@YLOu pp.135-136]]{}\] \[lemma:3:3\] For all $f\in C^{\infty}(M)$, $V\in \Gamma(\varphi^{-1}TN)$, real numbers $p$ and $q$, we have $$\begin{aligned} J_g(f V) &= (\Delta_g f) V-2\overline{\nabla}_{\nabla^g f}V+f J_g V, \label{eq:3:23} \\ \nabla^g f^p &= p f^{p-1} \nabla^g f, \label{eq:3:24} \\ (\nabla^g f)f^q &= q f^{q-1} \vert \nabla^g f\vert_g{}^2, \label{eq:3:25} \\ \Delta_g f^p &= p f^{p-1} \Delta_g f-p(p-1) f^{p-2} \vert\nabla^g f\vert_g{}^2. \label{eq:3:26} \end{aligned}$$ \[lemma:3:4\] The bienergy tension field $\tau_2(\varphi:\widetilde{g},h)$ is given by $$\begin{aligned} &\tau_2(\varphi:\widetilde{g},h) {\mathrel{\mathop:}=}J_{\widetilde{g}}(\tau_{\widetilde{g}}(\varphi)) \\ &= \left\{ -\frac{4}{(2-m)^2} f^{2m/(2-m)} \vert \nabla^g f\vert_g^2 +\frac{2}{2-m} f^{(2+m)/(2-m)} \Delta_g f \right\} \tau_g(\varphi) \\ &-\frac{6-m}{2-m} f^{(2+m)/(2-m)} \overline{\nabla}_{\nabla^g f}\tau_g(\varphi) +f^{4/(2-m)} J_g(\tau_g(\varphi)) \\ &+ \left\{ -\frac{m^2}{(2-m)^2} f^{(-2+3m)/(2-m)} \vert\nabla^g f\vert_g^2 +\frac{m}{2-m} f^{2m/(2-m)} \Delta_g f \right\} \varphi_{\ast}(\nabla^g f) \\ &-\frac{2+m}{2-m} f^{2m/(2-m)} \overline{\nabla}_{\nabla^g f}\varphi_{\ast}(\nabla^g f) +f^{(2+m)/(2-m)} J_g (\varphi_{\ast}(\nabla^g f)). \end{aligned}$$ By a direct computation, we have Lemmas \[lemma:3:1\], \[lemma:3:2\], \[lemma:3:3\] and \[lemma:3:4\]. The proofs are omitted. Thus, we have immediately \[corollary:3:5\] The bienergy tension field is $$\begin{aligned} &f^{2m/(m-2)} \tau_2(\varphi:\widetilde{g},h) = \left\{ -\frac{4}{(m-2)^2} \vert \nabla^g f\vert_g{}^2 -\frac{2}{m-2} f \Delta_g f \right\} \tau_g(\varphi) \\ &-\frac{m-6}{m-2} f \overline{\nabla}_{\nabla^g f}\tau_g(\varphi) +f^2 J_g(\tau_g(\varphi)) \\ &+f^{-1} \left\{ -\frac{m^2}{(m-2)^2} \vert\nabla^g f\vert_g{}^2 -\frac{m}{m-2} f \Delta_g f \right\} \varphi_{\ast}(\nabla^g f) \\ &+\frac{m+2}{m-2} \overline{\nabla}_{\nabla^g f}\varphi_{\ast}(\nabla^g f) +f J_g (\varphi_{\ast}(\nabla^g f)). \end{aligned}$$ Therefore, we have also \[corollary:3:6\] $\varphi:(M,\widetilde{g})\rightarrow (N,h)$ is biharmonic if and only if $$\label{eq:3:30} \begin{aligned} &\tau_2(\varphi:\widetilde{g},h) =0 \\ &\Longleftrightarrow \\ & \left\{ -\frac{4}{(m-2)^2} \vert \nabla^g f\vert_g{}^2 -\frac{2}{m-2} f \Delta_g f \right\} f\tau_g(\varphi) \\ &\quad -\frac{m-6}{m-2} f^2 \overline{\nabla}_{\nabla^g f}\tau_g(\varphi) +f^3 J_g(\tau_g(\varphi)) \\ &\quad\quad+ \left\{ -\frac{m^2}{(m-2)^2} \vert\nabla^g f\vert_g{}^2 -\frac{m}{m-2} f \Delta_g f \right\} \varphi_{\ast}(\nabla^g f) \\ &\qquad\quad+\frac{m+2}{m-2} f \overline{\nabla}_{\nabla^g f}\varphi_{\ast}(\nabla^g f) +f^2 J_g (\varphi_{\ast}(\nabla^g f)) =0. \end{aligned}$$ Reduction of constructing proper biharmonic maps {#sec:4} ================================================ In this section, we formulate our problem to construct proper biharmonic maps. A biharmonic map is said to be [*proper*]{} if it is not harmonic. Let $(M,g)$, $(N,h)$ be two compact Riemannian manifolds. In the following we always assume that $m=\dim (M)\leq 3$. Eells and Ferreira [@EF] showed that, > *for each homotopy class ${\mathcal H}$ in $C^{\infty}(M,N)$, there exist a Riemannian metric $\widetilde{g}$ which is conformal to $g$, and a $C^{\infty}$ map $\varphi\in {\mathcal H}$ such that $\varphi$ is a harmonic map from $(M,\widetilde{g})$ into $(N,h)$.* We do not assume, in general, that $M$ and $N$ are compact. Let us consider the following problem. > \[problem:1\] For each homotopy class ${\mathcal H}$ in $C^{\infty}(M,N)$, do there exist a Riemannian metric $\widetilde{g}$ which is conformal to $g$, and a $C^{\infty}$ map in ${\mathcal H}$ such that $\varphi \colon (M,\widetilde{g}) \rightarrow (N,h)$ is a [*proper biharmonic*]{} map, that is, $\tau_2(\varphi,\widetilde{g},h)=0$ and $\tau(\varphi,\widetilde{g},h) \not=0$ ? By regarding the above Eells and Ferreira’s result, we fix a harmonic map $\varphi: (M,g)\rightarrow (N,h)$, that is, $\tau(\varphi)=0$. Then, let us consider the following problem: > \[problem:2\] Does there exist a positive $C^{\infty}$ function $f$ on $M$ such that, for $\widetilde{g}=f^{2/(m-2)} g$, $\varphi \colon (M,\widetilde{g})\rightarrow (N,h)$ is [*proper biharmonic*]{}, that is, $\tau_2(\varphi,\widetilde{g},h)=0$ and $\tau(\varphi,\widetilde{g},h)\not=0$. To concern Problem \[problem:2\], we have \[theorem:4:1\] Assume that $\varphi \colon (M,g)\rightarrow (N,h)$ is harmonic. For a positive $C^{\infty}$ function $f$ on $M$, let us define $\widetilde{g}=f^{2/(m-2)} g$, a Riemannian metric conformal to $g$. Then, 1. \[item:theorem:4:1:1\] $\varphi \colon (M,\widetilde{g})\rightarrow (N,h)$ is harmonic if and only if $\varphi_{\ast}(\nabla^g f)=0$. 2. \[item:theorem:4:1:2\] $\varphi \colon (M,\widetilde{g})\rightarrow (N,h)$ is biharmonic if and only if the following holds: $$\label{eq:4:1} \begin{aligned} -&\left\{ \frac{m^2}{(m-2)^2} \vert\nabla^g f\vert_g{}^2+\frac{m}{m-2} f (\Delta_g f) \right\} \varphi_{\ast}(\nabla^g f) \\ &+\frac{m+2}{m-2} f \overline{\nabla}_{\nabla^g f} \varphi_{\ast}(\nabla^g f)+f^2 J_g(\varphi_{\ast}(\nabla^g f))=0. \end{aligned}$$ For (\[item:theorem:4:1:1\]), due to (\[eq:3:13\]) or (\[eq:3:14\]) in Lemma \[lemma:3:1\], we have $$\label{eq:4:2} \tau(\varphi:\widetilde{g},h)=f^{2/(2-m)} \tau(\varphi:g,h)+f^{m/(2-m)} \varphi_{\ast}(\nabla^g f),$$ which implies that (\[item:theorem:4:1:1\]). For (\[item:theorem:4:1:2\]), in Corollary \[corollary:3:6\], substituting $\tau_g(\varphi)=0$ into (\[eq:3:30\]), we have immediately (\[eq:4:1\]). We have immediately \[corollary:4:2\] Let $\varphi=\operatorname{id}\colon (M,g) \rightarrow (M,g)$ be the identity map. For a positive $C^{\infty}$ function $f$ on $M$, let us define $\widetilde{g}=f^{2/(m-2)} g$. Then, 1. \[item:corollary:4:2:1\] $\varphi=\operatorname{id}\colon (M,\widetilde{g})\rightarrow (M,g)$ is harmonic if and only if $f$ is a constant. 2. \[item:corollary:4:2:2\] $\varphi=\operatorname{id}\colon (M,\widetilde{g})\rightarrow (M,g)$ is biharmonic if and only if $$\label{eq:4:3} \begin{aligned} -&\left\{ \frac{m^2}{(m-2)^2} \vert\nabla^g f\vert_g{}^2+\frac{m}{m-2} f (\Delta_g f) \right\} \nabla^g f \\ &+\frac{m+2}{m-2} f \overline{\nabla}_{\nabla^g f} \nabla^g f+f^2 J_g(\nabla^g f)=0, \end{aligned}$$ which is equivalent to $$\label{eq:4:4} \begin{aligned} -&\left\{ \frac{m^2}{(m-2)^2} \vert X \vert_g{}^2+\frac{m}{m-2} f (\Delta_g f) \right\} X \\ &+\frac{m+2}{m-2} f {\nabla}_X X +f^2 (\overline{\Delta}^g(X)-\rho(X))=0, \end{aligned}$$ where $X=\nabla^g f\in {{\mathfrak X}}(M)$, $\rho(X) {\mathrel{\mathop:}=}\sum_{i=1}^m R^g(X,e_i)e_i$, is the Ricci tensor of $(M,g)$, and $\overline{\Delta}^g(X) {\mathrel{\mathop:}=}-\sum_{i=1}^m(\nabla^g_{e_i}\nabla^g_{e_i}X-\nabla^g_{\nabla^g_{e_i}e_i}X)$ is the rough Laplacian on ${{\mathfrak X}}(M)$, respectively. (\[eq:4:3\]) and (\[eq:4:4\]) follow from (\[eq:4:1\]), and the formula $J_g(V)=\overline{\Delta}^g(V)-\rho(V)$ $(V\in {{\mathfrak X}}(M))$, for the identity map. The identity map of the Euclidean space ======================================= Let us consider the $m$ dimensional Euclidean space $(M,g)=({{\mathbb R}}^m,g_0)$ with the standard coordinate $(x_1,\cdots,x_m)$ $(m\geq 3)$. In this case, let us take a positive $C^{\infty}$ function $f=f(x_1,\cdots,x_m)\in C^{\infty}({{\mathbb R}}^m)$. Let $X=\nabla^g f=\sum_{i=1}^m f_{x_i}\frac{\partial}{\partial x_i}$, where we denote $f_{x_i}=\frac{\partial f}{\partial x_i}$. Then, since $$\label{eq:5:1} \left\{ \begin{aligned} \rho&=0,\\ \Delta_g f&=-\sum_{i=1}^m f_{x_ix_i},\\ \vert X\vert_g{}^2&=\sum_{i=1}^m f_{x_i}{}^2, \\ \nabla^g_X X&=\sum_{i=1}^m\bigg\{ \sum_{j=1}^m f_{x_j} f_{x_ix_j} \bigg\}\frac{\partial}{\partial x_i},\\ \overline{\Delta}^g(X)&= \sum_{j=1}^m \Delta_g(f_{x_j}) \frac{\partial}{\partial x_j}, \end{aligned} \right.$$ the equation (\[eq:4:3\]) is reduced to the following: $$\label{eq:5:2} \begin{aligned} -&\left\{ \frac{m^2}{(m-2)^2} \sum_{i=1}^m f_{x_i}{}^2 +\frac{m}{m-2} f (\Delta_g f) f_{x_j} \right\} \\ &+f^2 \Delta_g(f_{x_j})+\frac{m+2}{m-2} \sum_{i=1}^m f_{x_i} f_{x_ix_j}=0 \quad (\forall j=1,\cdots,m). \end{aligned}$$ If we consider $f=f(x_1,\cdots,x_m)=f(x)$, $x=x_1$, then, the equation (\[eq:5:2\]) is equivalent to the following ODE: $$\tag{\ref{eq:0}} f^2 f'''-2 \frac{m+1}{m-2} f f' f'' +\frac{m^2}{(m-2)^2} (f')^3=0.$$ In the cases $m=3$, $m=4$, (\[eq:0\]) becomes $$\begin{aligned} {3} f^2 f'''-8 f f' f''+9 (f')^3&=0&\qquad&(m=3), \label{eq:5:4} \\ f^2 f'''-5 f f' f''+4 (f')^3&=0&\qquad&(m=4). \label{eq:5:5}\end{aligned}$$ Our problem is reduced to find a positive $C^{\infty}$ solution of (\[eq:0\]). In order to analyze (\[eq:0\]), we put $u=f'/f$, then the equation (\[eq:0\]) is reduced to the equation: $$\label{eq:5:6} u''+\frac{m-8}{m-2} u u'-\frac{2(m-4)}{(m-2)^2} u^3=0.$$ Then, we obtain immediately \[proposition:5:1\] If a positive $C^{\infty}$ solution $f$ of (\[eq:0\]) on ${{\mathbb R}}$, then $u= f'/f$ satisfies (\[eq:5:6\]). Conversely, for every $C^{\infty}$ solution $u$ of (\[eq:5:6\]) on ${{\mathbb R}}$, then $ f(t) = C \exp\left(\int^t u(s) \,ds\right) $ is a positive solution of (\[eq:0\]) for every positive constant $C$. Behavior of solutions of the ODE ================================ Due to Proposition \[proposition:5:1\], our problem is reduced to analyse (\[eq:5:6\]). To do it, we need the following two lemmas. \[lemma:6:1\] Assume that a real valued function $F$ on ${{\mathbb R}}$ satisfies the Lipshitz condition, i.e., there exists a positive number $L>0$ such that $ \vert F(p)-F(q)\vert\leq L\vert p-q\vert, $ we have 1. \[item:lemma:6:1:1\] Two real valued functions $u$ and $v$ defined on the interval $[0,\epsilon)$ for some positive number $\epsilon>0$ satisfy that $$\left\{ \begin{aligned} u'(t)&\geq F(u(t)),\\ v'(t)&=F(v(t)),\\ u(0)&=v(0), \end{aligned} \right.$$ then it holds that $ u(t)\geq v(t) $ for any $t > 0$. 2. \[item:lemma:6:1:2\] Conversely, if $u$ and $v$ satisfy that $$\left\{ \begin{aligned} u'(t)&\leq F(u(t)),\\ v'(t)&=F(v(t)),\\ u(0)&=v(0), \end{aligned} \right.$$ then it holds that $ u(t)\leq v(t) $ for any $t > 0$. Next, we have to prepare Jacobi’s ${{\mathbf{sn}}}$-function. \[proposition:6:2\] 1. \[item:proposition:6:2:1\] The solution of the initial value problem of the ordinary differential equation $$\label{eq:6:8} (y')^2=1-y^4, y(0)=0, y'(0)>0$$ is given by the Jacobi’s elliptic function $y(t)={{\mathbf{sn}}}({{i\,}},t)$. 2. \[item:proposition:6:2:2\] The function $y(t)={{\mathbf{sn}}}({{i\,}},t)$ is real valued in $t\in {{\mathbb R}}$, and pure imaginary valued in $t\in {{i\,}}{{\mathbb R}}$. 3. \[item:proposition:6:2:3\] The function $y(t)$ is a double periodic function in the whole complex plane ${{\mathbb C}}$ with the two periods $4K$ and $2{{i\,}}K'$, where $K>0$ and $K'>0$ are given by $$\begin{aligned} K &{\mathrel{\mathop:}=}K(k)=\int^{\pi/2}_0\frac{dx}{\sqrt{1-k^2 \sin^2x}}, \label{eq:6:9}\\ K'&{\mathrel{\mathop:}=}K(k'),\quad k'{\mathrel{\mathop:}=}\sqrt{1-k^2}, \label{eq:6:10} \end{aligned}$$ and it has the only one zeros at $2n K+2m{{i\,}}K'$, and has the only poles at $2n K+(2m+1){{i\,}}K'$, where $m$ and $n$ run over the set of all integers. 4. \[item:proposition:6:2:4\] In particular, it has no pole in the real axis, and has no zero on the imaginary axis except $0$. Furthermore, it has poles on the two lines through the origin with angles $\pm\pi/4$ in the complex plane ${{\mathbb C}}$. For (\[item:proposition:6:2:1\]) we have to see the function $y(t)={{\mathbf{sn}}}({{i\,}},t)$ solves (\[eq:6:8\]). Let us recall (cf. 281 Elliptic Functions, [@M pp. 873–876]) the elliptic integral of the first kind $u(k,\varphi)$ with modulus $k$ given by $$\label{eq:6:11} u(k,\varphi)=\int^{\varphi}_0 \frac{d\psi}{\sqrt{1-k^2 \sin^2\psi}},$$ and its inverse function is the amplitude function $\varphi={{\mathbf{am}}}(k,u)$. By differentiating (\[eq:6:11\]), we have $$\label{eq:6:12} \frac{d}{d\varphi}u(k,\varphi) =\frac{1}{\sqrt{1-k^2 \sin^2\varphi}}.$$ Then, we have $$\label{eq:6:13} {{\mathbf{sn}}}(k,t)=\sin({{\mathbf{am}}}(k,t)),$$ which implies immediately that $$\label{eq:6:14} \begin{aligned} \frac{d}{dt}{{\mathbf{sn}}}(k,t) &= \left( \frac{d}{dt}{{\mathbf{am}}}(k,t) \right) \cos ({{\mathbf{am}}}(k,t)) \\ &= \left( \frac{d}{dt}{{\mathbf{am}}}(k,t) \right) \sqrt{1-\sin^2({{\mathbf{am}}}(k,t))} \\ &= \sqrt{1-k^2\sin^2({{\mathbf{am}}}(k,t))} \sqrt{1-{{\mathbf{sn}}}^2(k,t)} \\ &= \sqrt{(1-k^2{{\mathbf{sn}}}^2(k,t))(1-{{\mathbf{sn}}}^2(k,t))}. \end{aligned}$$ Here, we put $k={{i\,}}= \sqrt{-1}$ in (\[eq:6:14\]), we have $$\label{eq:6:15} \frac{d}{dt}{{\mathbf{sn}}}({{i\,}},t) = \sqrt{1-{{\mathbf{sn}}}^4({{i\,}},t)},$$ that is, the function $y(t)={{\mathbf{sn}}}({{i\,}},t)$ is a solution of the differential equation of (\[eq:6:8\]). Since ${{\mathbf{sn}}}({{i\,}},0)=\sin({{\mathbf{am}}}({{i\,}},0))$ and ${{\mathbf{am}}}({{i\,}},0)=0$, we have ${{\mathbf{sn}}}({{i\,}},0)=0$. To get $y'(0)>0$, we only notice that, if we denote as the usual manner $$\begin{aligned} {{\mathbf{cn}}}(k,t)&{\mathrel{\mathop:}=}\cos ({{\mathbf{am}}}(k,t))), \\ {{\mathbf{dn}}}(k,t)&{\mathrel{\mathop:}=}\sqrt{1-k^2 {{\mathbf{sn}}}^2(k,t)}, \end{aligned}$$ it holds that $$\begin{aligned} &\frac{d}{dt}{{\mathbf{sn}}}(k,t)={{\mathbf{cn}}}(k,t) {{\mathbf{dn}}}(k,t), \label{eq:6:16} \\ \label{eq:6:17} &\begin{aligned} \left. \frac{d}{dt} \right|_{t=0} {{\mathbf{sn}}}(k,t) &={{\mathbf{cn}}}(k,0) {{\mathbf{dn}}}(k,0) \\ &=\cos({{\mathbf{am}}}(k,0)) \sqrt{1-k^2{{\mathbf{sn}}}^2(k,0)}=1, \end{aligned} \end{aligned}$$ that is, $y'(0)>0$. We have (\[item:proposition:6:2:1\]). For (\[item:proposition:6:2:2\]), ${{\mathbf{am}}}(k,t)$ is real valued if $t\in {{\mathbb R}}$ by definition of ${{\mathbf{am}}}(k,t)$, and then ${{\mathbf{sn}}}(k,t)$ and ${{\mathbf{cn}}}(k,t)$ are also real valued if $t\in {{\mathbb R}}$. On the other hand, since $${{\mathbf{sn}}}(k,{{i\,}}x)= {{i\,}}\frac{{{\mathbf{sn}}}(k',x)}{{{\mathbf{cn}}}(k',x)} \quad (k'=\sqrt{1-k^2}),$$ the function ${{\mathbf{sn}}}(k,t)$ is pure imaginary valued if $t\in {{i\,}}{{\mathbb R}}$. For (\[item:proposition:6:2:3\]) and (\[item:proposition:6:2:4\]), write $K'=- \tau K$ with $\tau\in {{\mathbb C}}$. Then $q {\mathrel{\mathop:}=}e^{{{i\,}}\pi \tau} =e^{-{{i\,}}\pi (K'/K)}$ can be written by using some series of real numbers, $\{a_{\ell}\}_{\ell=0}^{\infty}$, as $$q^{1/4} = \left( \frac{k}{4} \right)^{1/2} \left( \sum_{\ell=0}^{\infty}a_{\ell} k^{2 \ell} \right).$$ Thus, $q^{1/4}\in {{i\,}}^{1/2} {{\mathbb R}}$ when $k={{i\,}}$, which implies that $q$ is a negative real number. Thus, it holds that $K'/K=1$. It is known that all the poles of ${{\mathbf{sn}}}(k,x)$ are $2n K+{{i\,}}(2m+1)K'$, and by $K=K'$, ${{\mathbf{sn}}}(k,x)$ has poles on the lines through the origin with angles $\pm \pi/4$. The other properties are well known. By Proposition \[proposition:6:2\], we have \[proposition:6:3\] For every positive integers $A$ and $C$, and a real number $a$, all the solutions of both the ordinary differential equations $$\begin{aligned} v'(t)&=\sqrt{A v(t)^4+C},\quad v(0)=a, \label{eq:6:18} \\ v'(t)&=\sqrt{A v(t)^4-C},\quad v(0)=a, \quad(\text{with } A a^4>C), \label{eq:6:19} \end{aligned}$$ are explosive within finite time. That is, there exist positive real numbers $T_0>0$ and $T_1>0$ depending on $A$, $C$ and $a$ such that the existence intervals of solutions of (\[eq:6:18\]) or (\[eq:6:19\]) are $(-T_0,T_1)$. Let $y(t) {\mathrel{\mathop:}=}{{\mathbf{sn}}}({{i\,}},t)$, and $w(t){\mathrel{\mathop:}=}- {{i\,}}^{3/2}y({{i\,}}^{1/2} t)$. Then, we have $ w' = -\i^{3/2+1/2} y' = y'(\i^{1/2}t) $ and also $$w'(t)^2 = y'({{i\,}}^{1/2}t)^2 = 1-y({{i\,}}^{1/2} t)^4 = 1+w(t)^4$$ since $ w(t)^4=(-\i^{3/2})^4y(\i^{1/2}t)^4=\i^6y(\i^{1/2}t)^4=-y(\i^{1/2}t)^4. $ Thus, $$w(t) {\mathrel{\mathop:}=}-{{i\,}}^{3/2} {{\mathbf{sn}}}({{i\,}},{{i\,}}^{1/2} t)$$ is a solution of $$(w')^2=1+w^4.$$ By the same way, if we put $ z(t) \defeq \i y(\i t), $ then $$(z')^2={{i\,}}^2 (y')^2=-(1-y^4)=y^4-1=z^4-1.$$ Thus, $$z(t) {\mathrel{\mathop:}=}{{i\,}}{{\mathbf{sn}}}({{i\,}},{{i\,}}t)$$ is a solution of $$(z')^2=z^4-1.$$ Therefore, any solution of (\[eq:6:18\]) or (\[eq:6:19\]) can be obtained by $v(t) := k w(\ell t + t_0)$ or $v(t) := k z(\ell t + t_0)$ for some constants $k$, $\ell > 0$ and some $t_0 \in {{\mathbb R}}$, where $$w(t) = -{{i\,}}^{3/2} {{\mathbf{sn}}}({{i\,}},{{i\,}}^{1/2} t), \quad z(t)={{i\,}}{{\mathbf{sn}}}({{i\,}},{{i\,}}t).$$ By Proposition \[proposition:6:2\] (\[item:proposition:6:2:4\]), both the obtained solutions have poles, so that solutions of (\[eq:6:18\]) and (\[eq:6:19\]) are explosive at finite time. \[remark:6:4\] Every solution of $$(v')^2=1-v^4,\quad \vert v(0)\vert^4<1$$ exists on the whole line $t\in {{\mathbb R}}$. This fact follows from the fact that the poles of ${{\mathbf{sn}}}(k,t)$ do not exist on the whole real line ${{\mathbb R}}$ (cf. Proposition \[proposition:6:2\]). The following lemma plays essential roles in the existence and non-existence result of global solutions of (\[eq:0\]), and shows behavior of the energy of solution of (\[eq:7:1\]). \[lemma:7:2\] Let $u$ be a solution of ODE $$u''(t) = A u(t) u'(t) + B (u(t))^3,$$ and we define $e$ and $g_k$ as $$\begin{aligned} e(u(t)) &= \frac{1}{2}(u'(t))^2 - \frac{B}{4}(u(t))^4, \\ g_k(u(t)) &= u'(t) + k (u(t))^2, \end{aligned}$$ Moreover we assume $k$ is a real solution of $$\label{eq:7:2:0} 2k^2 + k A - B = 0,$$ then, we have $$\begin{aligned} \label{eq:7:2:1} \frac{d}{dt} e(u(t)) &=Au(t)(u'(t))^2, \\ \label{eq:7:2:2} \frac{d}{dt} g_k(u(t)) &= (A + 2k)u(t) g_k(u(t)). \end{aligned}$$ Moreover we may write $$\label{eq:7:2:3} g_k(u(t)) = g_k(u(0)) \exp \left( (A + 2k) \int_0^t u(s)\,ds \right).$$ Differentiating $e(u(t))$ by $t$, we have $$\frac{d}{dt}e(u(t)) = u' u''- B u^3 u'= A u(u')^2,$$ so we have (\[eq:7:2:1\]), immediately. Differentiating $g_k(u(t))$ by $t$, we have $$\frac{d}{dt}g_k(u(t)) = u''+ 2k u u' = u((A + 2k) u' + Bu^2).$$ If $k$ satisfies $2k^2 + A k - B = 0$, we have (\[eq:7:2:2\]). Non-existence and existence of global solutions of the ODE ========================================================== Main result ----------- In this section, we will show \[theorem:7:1\] Let $m\geq 3$. Then, we have 1. \[item:theorem:7:1:1\] In the case $m\geq 5$, there exists no $C^{\infty}$ global solution $u$ of (\[eq:5:6\]) on the whole real line ${{\mathbb R}}$. 2. \[item:theorem:7:1:2\] In the case of $m=4$, every solution $u$ of (\[eq:5:6\]) is of the form $u(t)=-b \tanh(b t + c)$ for constants $b$ and $c$. 3. \[item:theorem:7:1:3\] In the case of $m=3$, every solution $u$ (\[eq:5:6\]) with $u(0)=0$ and $u'(0) \not= 0$ is a global bounded solution on the whole line $t\in{{\mathbb R}}$. The proof of Theorem \[theorem:7:1\] is very long, so we should divide Theorem \[theorem:7:1\] into several theorems as follows: The part (\[item:theorem:7:1:1\]) of Theorem \[theorem:7:1\] consists of three theorems, Theorem \[theorem:case8:2\], \[theorem:case7:1\] and \[theorem:case9:1\]. And (\[item:theorem:7:1:2\]) in Theorem \[theorem:7:1\] corresponds to Theorem \[theorem:case4:1\], and (\[item:theorem:7:1:3\]) in Theorem \[theorem:7:1\] corresponds to Theorem \[theorem:case3:2\]. First, we write the ODE (\[eq:5:6\]) as $$\label{eq:7:1} u''=A u u'+B u^3,$$ where the relations of values or signs of $A=-\frac{m-8}{m-2}$ and $B=\frac{2(m-4)}{(m-2)^2}$ are given in the following table: [l | c | c | c | c | c]{} & $m=3$ & $m=4$ & $m=5,6,7$ & $m=8$ & $m\geq 9$\ $A$ & $+$ & $+$ & $+$ & $0$ & $-$\ $B$ & $-$ & $0$ & $+$ & $+$ & $+$\ In the case of $m = 3$, we also have $A^2 + 8B > 0$. The case of $A=0$ and $B>0$ $(m=8)$ ----------------------------------- In this case, due to (\[eq:7:2:1\]) of Lemma \[lemma:7:2\], we have immediately \[lemma:case8:1\] Assume that $A=0$ and $B>0$. If $u$ is a solution of (\[eq:7:1\]), then $e(u(t))$ is constant along the solution $u$, that is, $$\label{eq:case8:1:1} u'(t)^2-\frac{B}{2}u(t)^4=u'(0)^2-\frac{B}{2} u(0)^4 {=\mathrel{\mathop:}}2e_0.$$ Then, we obtain \[theorem:case8:2\] In the case that $A=0$ and $B>0$, the equation (\[eq:7:1\]) has no global solutions defined on the whole line ${{\mathbb R}}$ except only the trivial solution $u(t)\equiv 0$. Hence the equation (\[eq:0\]) has no global solutions on ${{\mathbb R}}$ except only the trivial solutions $f(t) \equiv C$. Let $I = [0, T)$ be a maximal interval to exists the solution of (\[eq:7:1\]) with the initial value $u(0)$, $u'(0)$. Assume $u(0) = 0$ and $u'(0) > 0$ ($u(0) = 0$ and $u'(0) < 0$), then there exists a positive number $\delta > 0$ such that $u(t) > 0$ and $u'(t) > 0$ ($u(t) < 0$ and $u'(t) < 0$) for $t \in (0, \delta)$, respectively. On the other hand, assume $u(0) > 0$ and $u'(0) = 0$ ($u(0) < 0$ and $u'(0) = 0$), then there exists a positive number $\delta > 0$ such that $u(t) > 0$ and $u'(t) > 0$ ($u(t) < 0$ and $u'(t) < 0$) for $t \in (0, \delta)$, respectively, since $u''(t) = B (u(t))^3$ and $B > 0$. Hence, we may assume that $u(0) u'(0) \not= 0$ and $u(t)$ ($u'(t)$) has the same sign as $u(0)$ ($u'(0)$) for any $t \in I$, respectively. First we assume that $e_0 \not= 0$ and $u'(0) \not= 0$. In this case, by (\[eq:case8:1:1\]), we may show that $u$ satisfies the ODE: $$\label{eq:case8:1:2} \begin{aligned} &u'(t) = +\sqrt{\frac{B}{2}(u(t))^4 + e_0}, \quad \text{ if } u'(0) > 0, \\ &u'(t) = -\sqrt{\frac{B}{2}(u(t))^4 + e_0}, \quad \text{ if } u'(0) < 0, \end{aligned}$$ with $ \frac{B}{2}(u(0))^2 + e_0 = (u'(0))^2 > 0. $ By Proposition \[proposition:6:3\], the maximal interval to exists the solution of (\[eq:case8:1:2\]) $I = [0, T)$ is finite. Next, we assume that $e_0 = 0$ and $u'(0) \not= 0$. In this case, $u$ satisfies $$\label{eq:case8:1:3} (u'(t))^2= \frac{B}{2} (u(t))^4.$$ The ODE (\[eq:case8:1:3\]) is easily solved, and the solution is $$u(t) = \frac{u(0)}{1 \pm \sqrt{(B/2)} u(0) t}.$$ We note that the solution blows up in finite time unless $u(0) = 0$, implying $u \equiv 0$. Finally, by the definition of $e_0$, $e_0 = u'(0) = 0$ implies $u(0) = 0$ and $u \equiv 0$. The case of $A>0$ and $B>0$ ($5 \le m \le 7$) {#section:case_of_7} --------------------------------------------- \[proposition:case7:4\] Under the condition $A>0$ and $B>0$, solutions of ODE (\[eq:7:1\]) with initial values $u'(0) \ge 0$ blow up in finite time. First, we assume $u(0) > 0$ and $u'(0) > 0$. Let $I = [0, T)$ be the maximal interval of existence for the solution $u$ that satisfies $u(t) > 0$, $u'(t) > 0$. Since $u''(t) = A u'(t) u(t) + B (u(t))^3 > 0$, for any $t \in I$, we obtain $u(t) > 0$ and $u'(t) > 0$. Therefore, by Lemma \[lemma:7:2\], $e(u(t))$ is monotone increasing. That is, $e(u(t)) > e(u(0)) {=\mathrel{\mathop:}}e_0$ for $t \in I$, and the solution $u$ satisfies $$u'(t) > \sqrt{\frac{B}{4}(u(t))^4 + e_0}.$$ Hence the solution $u$ blows up in finite time, by Lemma \[lemma:6:1\] and Proposition \[proposition:6:3\]. In case of $u(0) = 0$ and $u'(0) > 0$, since there exists a positive number $\delta > 0$ such that $u(t) > 0$, $u'(t) > 0$ for $t \in (0, \delta)$, we may assume $u(t) > 0$ and $u'(0) > 0$, and the solution blows up in finite time. In case of $u(0) > 0$ and $u'(0) = 0$, since $u''(0) = B(u(0))^3 > 0$, there exists a positive number $\delta > 0$ such that $u(t) > 0$, $u'(t) > 0$ for $t \in (0, \delta)$. Therefore we may also assume $u(t) > 0$ and $u'(0) > 0$, and the solution blows up in finite time. Finally, in case of $u(0) < 0$ and $u'(0) \ge 0$, define $v(t) = -u(-t)$, then $v$ also satisfies the ODE (\[eq:7:1\]) with same $A$ and $B$, and we have $v(0) > 0$, $v'(0) \ge 0$. Therefore $v$ also blows up in finite time. If $A > 0$ and $B > 0$, the quadratic equation (\[eq:7:2:0\]) has two real solutions $k_-$ and $k_+$ satisfying $k_- < 0 < k_+$, and $A_{k-} < 0 < A_{k+}$, where $A_k = A + 2k$. \[proposition:case7:5\] Under the condition $A>0$ and $B>0$, solutions of ODE (\[eq:7:1\]) with initial values $u'(0) < 0$ and $g_{k+}(u(0)) \le 0$ blow up in finite time. If $u(0) = 0$ and $g_{k+}(u(0)) = 0$, then $u'(0) = 0$, hence we may assume either $u(0)$ or $g_{k+}(u(0))$ is not zero. If $u(0)$ satisfies $g_{k+}(u(0)) = 0$, then, by (\[eq:7:2:3\]), we obtain $g_k(u(t)) \equiv 0$, i.e., $$\label{eq:case7:5:1} u'(t) = -k_+ (u(t))^2, \quad t > 0, \quad k_+ > 0.$$ The ODE (\[eq:case7:5:1\]) is easily solved, and the solution is $$u(t) = \frac{u(0)}{1 + k_+ u(0) t}.$$ Therefore, if $u(0) > 0$, then the solution blows up in finite time $T = -1/(k_+ u(0))$. If $u(0) < 0$, consider the backward solution (i.e., consider $v(t) = -u(-t)$), then we also obtain similar result. Next we assume $u(0) < 0$ and $g_{k+}(u(0)) < 0$. Let $I = [0, T)$ be the maximal interval of existence for the solution $u$ that satisfies $u(t) < 0$, $u'(t) < 0$ and $g_{k+}(u(t)) < 0$. Assume there exists $T > 0$ such that $u$ satisfies either $u(T) = 0$, $u'(T) = 0$ or $g_{k+}(u(T)) = 0$. Since $u'(t) < 0$ for $t \in I$, $u$ is monotone decreasing, and then we obtain $u(T) < u(0) < 0$. Moreover, since $u(t) < 0$ for $t \in I$, we also obtain $g_{k_+}(u(t)) < 0$ for $t \in I$, by (\[eq:7:2:3\]). Thus we have $g_{k_+}(u(T)) < 0$, which implies $u'(T) < - k_+ (u(T))^2 < 0$. Therefore $u(t) < 0$, $u'(t) < 0$ and $g_{k+}(u(t)) < 0$ hold provided the solution exists. Since for any $t > 0$, $g_{k+}(u(t)) < 0$, we obtain that $$u'(t) < -k_+ (u(t))^2, \quad t > 0, \quad k_+ > 0, \quad u(0) < 0.$$ Therefore, by Lemma \[lemma:6:1\]. the solution $u$ satisfies $ u(t) < \frac{u(0)}{1 + k_+ u(0) t}, $ and blows up within $T < -1/(k_+u(0))$. If $u(0) = 0$, since $u'(0) < 0$, there exists a positive number $\delta > 0$ such that $u(t) < 0$, $u'(t) < 0$, $g_{k_+}(u(t)) < 0$ for any $t \in (0, \delta)$. Hence we may prove a blowing up phenomena within finite time for this case. Finally, in case of $u(0) > 0$, define $v(t) = -u(-t)$, we may apply the above arguments. \[proposition:case7:6\] Under the condition $A>0$ and $B>0$, solutions of ODE (\[eq:7:1\]) with initial values $u'(0) < 0$ and $g_{k+}(u(0)) > 0$ blow up in finite time. If $u(0) > 0$ and $u'(0) < 0$, considering $v(t) = -u(-t)$, then we have $v(0) < 0$, $v'(0) < 0$ and $g_{k+}(v(0)) > 0$ so we may assume $u(0) < 0$ without loss of generality. By similar arguments in Proposition \[proposition:case7:5\], $u(t) < 0$, $u'(t) < 0$ and $g_{k+}(u(t)) > 0$ hold provided the solution exists. Since $g_{k+}(u(t)) < g_{k+}(u(0)) {=\mathrel{\mathop:}}g_0$ provided that the solution exists, we obtain $$u'(t) < g_0 -k_+ (u(t))^2, \quad g_0 > 0, \quad k_+ > 0, \quad u(0) < 0.$$ The ODE $v'(t) = g_0 - k_+ (v(t))^2$ is well-known logistic equation, and the solution $v$ blows up to $-\infty$ within positive finite time provided $g_0 - k_+(v(0))^2 < 0$. Since $g_0 - k_+(u(0))^2 = u'(0) < 0$, by Lemma \[lemma:6:1\], $u$ blows up in finite time. \[theorem:case7:1\] In the case that $A>0$ and $B>0$, the equation (\[eq:7:1\]) has no global solutions defined on the whole line ${{\mathbb R}}$ except only the trivial solution $u(t)\equiv 0$. Hence the equation (\[eq:0\]) has no global solutions on ${{\mathbb R}}$ except only the trivial solutions $f(t) \equiv C$. In case of $u'(0) \ge 0$, use Proposition \[proposition:case7:4\], in case of $u'(0) < 0$ and $g_{k+}(u(0)) \le 0$, use Proposition \[proposition:case7:5\], and in case of $u'(0) < 0$ and $g_{k+}(u(0)) > 0$, use Proposition \[proposition:case7:6\], we obtain the claim of Theorem \[theorem:case7:1\]. The case of $A<0$ and $B>0$ ($m \ge 9$) --------------------------------------- \[theorem:case9:1\] In the case that $A<0$ and $B>0$, the equation (\[eq:7:1\]) has no global solutions defined on the whole line ${{\mathbb R}}$ except only the trivial solution $u(t)\equiv 0$. Hence the equation (\[eq:0\]) has no global solutions on ${{\mathbb R}}$ except only the trivial solutions $f(t) \equiv C$. Let $u$ be a solution of (\[eq:7:1\]), and $v(t) = u(-t)$, then $v$ satisfies $v''(t) = -Av(t)v'(t) + B(v(t))^3$. Therefore the claim is easily obtained by Theorem \[theorem:case7:1\]. The case $A>0$ and $B=0$ $(m=4)$ -------------------------------- Rewriting (\[eq:7:1\]) as $u''(t) = (A/2) (u(t)^2)'$ and integrating this equation, we obtain the following proposition. \[theorem:case4:1\] In case of $A>0$ and $B=0$, all global solutions of (\[eq:7:1\]) are given by $u(t) = -b \tanh(b t + c)$, where $b$ and $c$ are constants. Hence all global solutions of (\[eq:0\]) are given by $f(x) = a/\cosh(b x + c)$, where $a > 0$. Integrating $u''(t) = (A/2) (u(t)^2)'$, we have $u'(t) = (A/2)(u(t)^2 + C)$, where $C {\mathrel{\mathop:}=}(2/A) (u'(0) - (A/2) u(0)^2)$. Assume $C < 0$ and $|u(0)| < \sqrt{|C|}$, then we easily obtain that $$\label{eq:proposition:case4:1:1} u(t) = - \sqrt{|C|} \tanh\left((A_C/2)t - \operatorname{arcth}\left(\frac{u(0)}{\sqrt{|C|}}\right)\right),$$ where $A_C {\mathrel{\mathop:}=}A\sqrt{|C|}$, and (\[eq:proposition:case4:1:1\]) is defined on whole line ${{\mathbb R}}$. In case of $m = 4$, $A$ is equal to $2$, and $A_C = \sqrt{|C|}$, hence we may write $$\label{eq:proposition:case4:1:2} u(t) = - b \tanh(b t + c).$$ Since the solution $f$ of (\[eq:0\]) is given by $ f(x) = \exp\left(\int_0^x u(t)\,dt\right), $ by (\[eq:proposition:case4:1:2\]), we obtain $$f(x) = \frac{a}{\cosh(b x + c)}.$$ If $C < 0$ and $|u(0)| > \sqrt{|C|}$, the solution is given by $$u(t) = -\sqrt{|C|} \frac{\sqrt{|C|}\tanh(A_C t) - u(0)}{\sqrt{|C|} - u(0)\tanh(A_C t)}.$$ However, the denominator will attains the zero at $t = -(2/A_C)\operatorname{arcth}(\sqrt{|C|}/u(0))$, hence this type of solution is not globally defined. If $C > 0$, the solution is given by $$u(t) = \sqrt{C} \frac{\sqrt{C}\tan(A_C t) + u(0)}{\sqrt{C} - u(0)\tan(A_Ct)},$$ hence this type of solution is not globally defined. In case of $C = 0$ and $u'(0)^2 \not= 0$, the solution is given by $ u(t) = \frac{-u(0)}{(A/2) u(0) t - 1}, $ hence this type of solution is also not globally defined. \[remark:case4:2\] In case of $u'(0)^2 = 0$ and $u(0)^2 = -C$, the solution is stationary. The case $A>0$, $B<0$ and $A^2 + 8B \ge 0$ $(m=3)$ -------------------------------------------------- \[proposition:case3:1\] Under the condition $A>0$ and $B<0$, assume the initial value satisfies $u(0) \le 0$ and $u'(0) < 0$. Then there exists $T > 0$ such that the solution of ODE (\[eq:7:1\]) with the initial value exists on $[0, T]$ and it satisfies $u(T) < 0$ and $u'(T) = 0$. If $u(0) = 0$ and $u'(0) < 0$, there exists a positive number $\delta > 0$ such that $u(t) < 0$ and $u'(t) < 0$ for $t \in (0, \delta)$, hence we may assume $u(0) < 0$, $u'(0) < 0$ without loss of generality. Let $I = [0, T)$ be the maximal interval of existence for the solution $u$ that satisfies $u(t) < 0$ and $u'(t) < 0$. If $t \in I$, then $u$ is monotone decreasing and $u''(t) = Au(t)u'(t) + B(u(t))^3 > B (u(t))^3 > B(u(0))^3 > 0$, hence $u'$ is monotone increasing and $e(u(t))$ is monotone decreasing. Assume $t \in I$, we have $(1/2)(u'(t))^2 + (|B|/4)(u(t))^4 = e(u(t)) < e(u(0))$, therefore $u$ and $u'$ is bounded. Moreover for any $t \in I$, by using $u''(t) > B(u(t))^3 > B(u(0))^3$, we obtain $$0 > u'(t) > u'(0) + t B (u(0))^3.$$ Since $u'(0) < 0$ and $B (u(0))^3 > 0$, there exists $0 < T < -u'(0)/(B(u(0))^3)$, such that $u'(T) = 0$. Moreover $u'(t) < 0$ for any $t \in (0, T)$, we obtain $u(T) \le u(t) < u(0)$. \[proposition:case3:2\] Under the condition $A>0$, $B < 0$ and $A^2 + 8B \ge 0$, let $k_1$ and $k_2$ are real solutions of (\[eq:7:2:0\]) with $k_2 \le k_1 < 0$, and assume the initial value satisfies $u(0) \le 0$, $u'(0) \ge 0$ and $g_{k_1}(u(0)) < 0$. Then the solution of ODE (\[eq:7:1\]) with the initial value exists on $[0, \infty)$ and it satisfies $u(t) \to 0$ and $u'(t) \to 0$ as $t \to \infty$. If $u'(0) = 0$, since $u''(0) = A u'(0)u(0) + B(u(0))^3 = B (u(0))^3 > 0$, there exists a positive number $\delta > 0$ such that $u(t) < 0$, $u'(t) > 0$, $g_{k_1}(u(t)) < 0$ for $t \in (0, \delta)$. Hence we may assume $u(0) < 0$, $u'(0) > 0$ and $g_{k_1}(u(0)) < 0$ without loss of generality. Let $I = [0, T)$ be the maximal interval of existence for the solution $u$ that satisfies $u(t) < 0$, $u'(t) > 0$ and $g_{k_1}(u(t)) < 0$. By Lemma \[lemma:7:2\], $g_{k_1}(u(t))$ is always negative while the solution exists. If $u(T) = 0$, then we obtain $g_{k_1}(u(T)) = u'(T) + k_1(u(T))^2 = u'(T) < 0$. This contradicts to $u'(t) > 0$ for $t \in I$. Therefore, $u(t) < 0$ while the solution exists. If $u'(T_1) = 0$ for some $T_1 > 0$, then we obtain $u''(T_1) = B(u(T_1))^3 \ge 0$, since $u''(t) = A u(t) u'(t) + B(u(t))^3$, $u'(T_1) = 0$, $u(T_1) \le 0$ and $B < 0$. Hence $u'$ is non-decreasing on $(T_1 - \delta, T_1)$ for some $\delta > 0$. This contradicts to $u'(T_1 - \delta) > 0$. Therefore $u(t) < 0$, $u'(t) > 0$ and $g_{k_1}(u(t)) < 0$ hold provided the solution exists. Now assume $t \in I$, by $g_{k_1}(u(t)) < 0$, we have $$u'(t) < -k_1 (u(t))^2, \quad u(0) < 0.$$ By Lemma \[lemma:6:1\], we obtain $$u(0) < u(t) < \frac{u(0)}{1 + k_1 u(0) t} < 0,$$ and the solution exists on $[0, \infty)$, since $k_1u(0) > 0$. In particular, we obtain $$\int_0^t u(s)\,ds = \int_0^t \frac{u(0)}{1 + k_1 u(0) s}\,ds = \frac{1}{k_1} \log\left|1 + k_1 u(0) t\right| \to -\infty,$$ as $t\to\infty$. Hence we obtain that $$g_\infty = \lim_{t\to\infty} g_{k_1}(u(t)) = g_{k_1}(u(0)) \lim_{t\to\infty} \exp \left( A_{k_1} \int_0^t u(s)\,ds \right) = 0.$$ On the other hand, since $u(t) < 0$ and $u$ is monotone increasing, there exists $u_\infty \le 0$ such that $u(t) \to u_\infty$, and $u'(t) \to 0$ ($t \to \infty$). Therefore using $g_\infty = k_1 u_\infty^2$, we obtain $u_\infty = 0$. \[theorem:case3:2\] In the case that $A>0$, $B < 0$ and $A^2 + 8B \ge 0$, there exist global solutions of (\[eq:7:1\]) on whole real line ${{\mathbb R}}$ satisfying $u(t) \to 0$, $u'(t) \to 0$ ($t \to \pm \infty$). Hence there exist positive global solutions of (\[eq:0\]) on ${{\mathbb R}}$ satisfying $f(t) \to C$ ($t\to\pm\infty$). Let the initial condition satisfy $u(0) = 0$ and $u'(0) < 0$, then, by Proposition \[proposition:case3:1\], there exists $T > 0$ such that the solution exists on $[0, T]$ and it satisfies $u(T) < 0$ and $u'(T) = 0$. If $u(T) < 0$ and $u'(T) = 0$, then we have $g_{k_1}(u(T)) = k_1(u(T))^2 < 0$. Hence, by using time-shift $t \mapsto t - T$, and Proposition \[proposition:case3:2\], the solution satisfies $u(T) < 0$ and $u'(T) = 0$ extends to $[T, \infty)$, and it satisfies $u(t) \to 0$ and $u'(t) \to 0$ ($t \to \infty$). Therefore, we obtain the solution on $[0, \infty)$ with the initial value $u(0) = 0$ and $u'(0) < 0$. Consider the backward solution of the ODE, we may easily prove that the solution extends on the whole real line ${{\mathbb R}}$, and it satisfies $u(t) \to 0$ and $u'(t) \to 0$ ($t \to -\infty$). \[theorem:case3:3\] Under the condition $A>0$, $B < 0$ and $A^2 + 8B \ge 0$, the equation (\[eq:7:1\]) admits no non-trivial periodic solutions. Hence the equation (\[eq:0\]) admins no positive non-trivial periodic solutions. Assume that the equation (\[eq:7:1\]) admits a non-trivial periodic solution $u$. If $u$ satisfies $u'(t) > 0$ or $u'(t) < 0$ for any $t \in {{\mathbb R}}$, then $u$ must be a monotone function which never occurs because $u$ is periodic. Hence we obtain that there exists $T > 0$ such that $u'(T) = 0$. Moreover if there exists $T > 0$ such that $u'(T) = u(T) = 0$, then $u$ is trivial. Therefore, we may assume that there exists $T > 0$ such that $u'(T) = 0$ and $u(T) \not= 0$. If $u(T) > 0$, considering $v(t) = -u(-t)$, we may assume $u(T) < 0$ without loss of generality. By Proposition \[proposition:case3:2\], $u$ should satisfy $u(t) \to 0$ as $t \to \infty$. Hence $u$ is not periodic. Remarks ------- By above arguments, we also obtain that if the quadratic equation (\[eq:7:2:0\]) has real solutions $k_1$, $k_2$ and they have same sign, then there exist global bounded solutions of (\[eq:7:1\]), and if they have different sign, then there exist no global solutions of (\[eq:7:1\]). On contrary, we conjecture that under the condition $A^2 + 8 B < 0$ (i.e., (\[eq:7:2:0\]) has no real solutions), all solutions of (\[eq:7:1\]) are periodic. If $A = 0$, the equation (\[eq:7:1\]) can be written $u'' = -\kappa^4 u^3$, Solutions of this equation are written as $u(t) = C {{\mathbf{sn}}}(i, C\kappa (t+t_0))$ by using Jacobi’s sn, and it is well-known that they are periodic (cf. Remark \[remark:6:4\]). For $A \not= 0$, numerical experiments support this conjecture (see Figure \[fig:case\_of\_3:2\]). However set $A = (8-m)/(m-2)$, $B = 2(m-4)/(m-2)^2$, then $A^2 + 8B = m^2/(m-2)^2$, therefore, there are no real numbers $m$ satisfying the condition $A^2 + 8 B < 0$. Finally, we note that we use classical Runge-Kutta method (Figures \[fig:case\_of\_8:1\], \[fig:case\_of\_7:1\], \[fig:case\_of\_9:1\], \[fig:case\_of\_4:1\] and \[fig:case\_of\_3:1\]), and Gauss method of order 6 (Figure \[fig:case\_of\_3:2\]) as numerical integrators (cf. [@Heirer]). Biharmonic maps between product Riemannian manifolds ==================================================== Finally, we give nice applications. Let us consider the product Riemannian manifolds, $M {\mathrel{\mathop:}=}{{\mathbb R}}\times \Sigma^{m-1}$, and $N {\mathrel{\mathop:}=}{{\mathbb R}}\times P$, respectively, where ${{\mathbb R}}$ is a line with the standard Riemannian metric $g_1$, $\Sigma^{m-1}$ is an $(m-1)$-dimensional manifold with a Riemannian metric $g_2$ $(m=3,4)$, and $P$ is a manifold with Riemannian metric $h_2$, respectively. Let us take the product Riemannian metrics $g=g_1+g_2$ on $M$, and $h=g_1+h_2$ on $N$, respectively. Then, for every smooth map $\varphi=(\varphi_1,\varphi_2) \colon M\rightarrow N$, with $\varphi_1 \colon {{\mathbb R}}\rightarrow {{\mathbb R}}$, and $\varphi_2 \colon \Sigma^2\rightarrow P$, the tension field $\tau(\varphi)$ is given as $$\tau(\varphi)=(\tau(\varphi_1),\tau(\varphi_2))\in \Gamma(\varphi^{-1}TN)= \Gamma(\varphi_1^{-1}T{\mathbb R}\times \varphi_2^{-1}TN).$$ Thus, $\varphi$ is harmonic if and only if both (1) $\varphi_1 \colon ({{\mathbb R}},g_1)\rightarrow ({{\mathbb R}},g_1)$ is harmonic, and (2) $\varphi_2 \colon (\Sigma^{m-1},g_2)\rightarrow (P,h_2)$ is harmonic. Notice that all the harmonic maps $\varphi_1 \colon ({{\mathbb R}},g_1)\rightarrow ({{\mathbb R}},g_1)$ are affine functions ${{\mathbb R}}\ni x\mapsto ax+b\in {{\mathbb R}}$ for some constants $a$ and $b$. Now we define a conformal Riemannian metric $\widetilde{g}=\widetilde{f}^{2/(m-2)}g$ with $\widetilde{f}(x,y)=f(t)$ ($t=x\in {{\mathbb R}}$, $y\in \Sigma^{m-1}$). Then, we can easily calculate that $$\begin{aligned} \nabla^g f &=f'\,\frac{\partial}{\partial t},\\ \varphi_{\ast}(\nabla^g f) &=\varphi_1{}_{\ast}(f'\frac{\partial}{\partial t})=a f'\frac{\partial}{\partial t},\\ \Delta^g f &=-f'',\\ \overline{\nabla}_{\nabla^g f} \varphi_{\ast}(\nabla^g f) &=a f''f' \frac{\partial}{\partial t},\\ J_g(\varphi_{\ast}(\nabla^g f)) &=-a f''' \frac{\partial}{\partial t}. \end{aligned}$$ For a harmonic map $\varphi=(\varphi_1,\varphi_2) \colon (M,g)=({{\mathbb R}}\times\Sigma^{m-1},g)\rightarrow (N,h)= ({{\mathbb R}}\times P,h)$, it holds that $\varphi \colon (M,\widetilde{g}) \rightarrow (N,h)$ is harmonic if and only if $\varphi_{\ast}(\nabla^g f)=a f'\frac{\partial}{\partial t}=0$ if and only if $f(t)$ is constant in $t=x$ or $\varphi_1$ is a constant. Therefore, we obtain The above mapping $\varphi\colon (M,\widetilde{g})\rightarrow (N,h)$ is a biharmonic map if and only if the mapping $\varphi_1\colon {{\mathbb R}}\rightarrow {{\mathbb R}}$ is a constant or it satisfies the ODE (\[eq:0\]). Thus, we obtain the following theorem which answers our Problem in the Section \[sec:4\], in the case of the (non-compact) product Riemannian manifolds, and the product harmonic maps. \[theorem:9:1\] For every harmonic map $\varphi \colon (\Sigma^{m-1},g)\rightarrow (P,h)$, let us define $\widetilde{\varphi} \colon {{\mathbb R}}\times \Sigma^{m-1}\ni (x,y)\mapsto (ax+b,\varphi(y))\in {{\mathbb R}}\times P$ $(m=3,4)$, where $a$ and $b$ are constants. Then, 1. In the case $m=3$, the mapping $\widetilde{\varphi} \colon ({{\mathbb R}}\times \Sigma^2,\widetilde{f}^2 g)\rightarrow ({{\mathbb R}}\times P,h)$ is biharmonic, but not harmonic if $a\not=0$. 2. In the case $m=4$, the mapping $\widetilde{\varphi} \colon ({{\mathbb R}}\times \Sigma^3,\frac{1}{\cosh x} g) \rightarrow ({{\mathbb R}}\times P,h)$ is biharmonic, but not harmonic if $a\not=0$. [99]{} P. Baird and D. Kamissoko, *On constructing biharmonic maps and metrics*, Ann. Global Anal. Geom. **23** (2003), 65–75. B.-Y. Chen, *Some open problems and conjectures on submanifolds of finite type*, Soochow J. Math. **17** (1991), 169–188. R. Caddeo, S. Montaldo, and P. Piu, *On biharmonic maps*, Global differential geometry: the mathematical legacy of [A]{}lfred [G]{}ray ([B]{}ilbao, 2000), Contemp. Math., vol. 288, Amer. Math. Soc., Providence, RI, J. Eells and M. J. Ferreira, *On representing homotopy classes by harmonic maps*, Bull. London Math. Soc. **23** (1991), 160–162. J. Eells and L. Lemaire, *Selected topics in harmonic maps*, CBMS Regional Conference Series in Mathematics, vol. 50, Published for the Conference Board of the Mathematical Sciences, Washington, DC, 1983. E. Hairer, C. Lubich, and G. Wanner, *Geometric numerical integration*, second ed., Springer Series in Computational Mathematics, vol. 31, Springer-Verlag, Berlin, 2006. P. Hartman, *Ordinary Differential Equations*, John Wiley & Sons, Inc., New York-London-Sydney, 1964. T. Ichiyama, J. Inoguchi, and H. Urakawa, *Classifications and isolation phenomena of bi-harmonic maps and bi-[Y]{}ang-[M]{}ills fields*, Note Mat. **30** (2010), 15–48. J. Inoguchi, *Submanifolds with harmonic mean curvature vector field in contact 3-manifolds*, Colloq. Math. **100** (2004), 163–179. S. Ishihara and S. Ishikawa, *Notes on relatively harmonic immersions*, Hokkaido Math. J. **4** (1975), 234–246. G. Y. Jiang, *[$2$]{}-harmonic maps and their first and second variational formulas*, Chinese Ann. Math. Ser. A **7** (1986), no. 4, 389–402, (the English translation by H. Urakawa, 2007). S. Kobayashi and K. Nomizu, *Foundations of differential geometry. [V]{}ol. [I]{} and [II]{}*, John Wiley & Sons, Inc., New York-London-Sydney, 1963, 1969. E. Loubeau and C. Oniciuc, *The index of biharmonic maps in spheres*, Compos. Math. **141** (2005), 729–745. E. Loubeau and C. Oniciuc, *On the biharmonic and harmonic indices of the Hopf map*, Trans. Amer. Math. Soc., **359** (2007), 5239–5256. The Mathematical Society of Japan, Mathematics Encyclopedia, 4th edition, 2007, Iwanami, Tokyo. S. Montaldo and C. Oniciuc, *A short survey on biharmonic maps between [R]{}iemannian manifolds*, Rev. Un. Mat. Argentina **47** (2006), 1–22 (2007). C. Oniciuc, *On the second variation formula for biharmonic maps to a sphere*, Publ. Math. Debrecen **61** (2002), 613–622. S. Ouakkas, *Biharmonic maps, conformal deformations and the [H]{}opf maps*, Differential Geom. Appl. **26** (2008), 495–502. Y.-L. Ou, *On conformal biharmonic immersions*, Ann. Global Anal. Geom. **36** (2009), 133-142. [^1]: Supported by the Grant-in-Aid for the Scientific Research, (C) No. 21540207 and (C) No. 22540075, Japan Society for the Promotion of Science.
using Miki.API.Cards.Objects; using ProtoBuf; using System; using System.Collections.Generic; namespace Miki.API.Cards { public delegate int GetCardValue(int totalValue, CardHand hand); [ProtoContract] public class CardManager { [ProtoMember(1)] protected Dictionary<ulong, CardHand> hands = new Dictionary<ulong, CardHand>(); [ProtoMember(2)] protected CardSet deck = new CardSet(); public CardHand AddPlayer(ulong userid) { if (!hands.ContainsKey(userid)) { CardHand hand = new CardHand(); hands.Add(userid, hand); return hand; } return null; } public CardHand GetPlayer(ulong userId) { hands.TryGetValue(userId, out CardHand value); return value; } public void DealAll() { foreach (CardHand h in hands.Values) { h.AddToHand(deck.DrawRandom()); } } public void DealTo(ulong userid) { if (hands.TryGetValue(userid, out CardHand hand)) { DealTo(hand); } throw new InvalidOperationException("Your hand does not exist."); } public void DealTo(CardHand hand) { hand.AddToHand(deck.DrawRandom()); } } }
Q: Rule of fail2ban not working when the request is from the brute force attack I have a situation where some IP from moldova try everyday discover my basic auth credentials with some type of brute force attack. However I have a rule with fail2ban that should avoid this situation. And it works when I try with a VPN. Example of request that trigger fail2ban after three attempts. My requests 2016/07/14 15:10:54 [error] 13937#0: *55700 user "engineer" was not found in "/usr/local/nginx/.htpasswd", client: 146.185.31.214, server: localhost, request: "GET / HTTP/1.1", host: "www.mysite.pt" The problem is that, the request from the hacker IP will not trigger the fail2ban, and I don't know why. The only difference is the referrer: as you can see. 2016/07/14 01:54:31 [error] 13913#0: *42558 user "engineer" was not found in "/usr/local/nginx/.htpasswd", client: 194.28.112.51, server: localhost, request: "GET / HTTP/1.1", host: "www.mysite.pt", referrer: "http://www.mysite.pt/ /etc/fail2ban/filter.d/nginx-http-auth.conf [Definition] failregex = ^ \[error\] \d+#\d+: \*\d+ user "\S+":? (password mismatch|was not found in ".*"), client: <HOST>, server: \S+, request: "\S+ \S+ HTTP/\d+\.\d+", host: "\S+"\s*$ ^ \[error\] \d+#\d+: \*\d+ no user/password was provided for basic authentication, client: <HOST>, server: \S+, request: "\S+ \S+ HTTP/\d+\.\d+", host: "\S+"\s*$ ignoreregex = [nginx-http-auth] enabled = true filter = nginx-http-auth port = http,https logpath = /usr/local/nginx/localhost-error.log maxretry = 3 So the question is why my requests trigger the rule, and the requests from the attacker not? Excerpt from the log: 2016/07/14 01:54:27 [error] 13917#0: *42529 user "mts" was not found in "/usr/local/nginx/.htpasswd", client: 194.28.112.51, server: localhost, request: "GET / HTTP/1.1", host: "www.mysite.pt", referrer: "http://www.mysite.pt/" 2016/07/14 01:54:27 [error] 13917#0: *42530 user "mts" was not found in "/usr/local/nginx/.htpasswd", client: 194.28.112.51, server: localhost, request: "GET / HTTP/1.1", host: "www.mysite.pt", referrer: "http://www.mysite.pt/" 2016/07/14 01:54:28 [error] 13917#0: *42531 user "telecomadmin" was not found in "/usr/local/nginx/.htpasswd", client: 194.28.112.51, server: localhost, request: "GET / HTTP/1.1", host: "www.mysite.pt", referrer: "http://www.mysite.pt/" 2016/07/14 01:54:28 [error] 13917#0: *42532 user "telecomadmin" was not found in "/usr/local/nginx/.htpasswd", client: 194.28.112.51, server: localhost, request: "GET / HTTP/1.1", host: "www.mysite.pt", referrer: "http://www.mysite.pt/" 2016/07/14 01:54:28 [error] 13917#0: *42533 user "mgts" was not found in "/usr/local/nginx/.htpasswd", client: 194.28.112.51, server: localhost, request: "GET / HTTP/1.1", host: "www.mysite.pt", referrer: "http://www.mysite.pt/" 2016/07/14 01:54:28 [error] 13917#0: *42534 user "mgts" was not found in "/usr/local/nginx/.htpasswd", client: 194.28.112.51, server: localhost, request: "GET / HTTP/1.1", host: "www.mysite.pt", referrer: "http://www.mysite.pt/" 2016/07/14 01:54:28 [error] 13917#0: *42535 user "admin" was not found in "/usr/local/nginx/.htpasswd", client: 194.28.112.51, server: localhost, request: "GET / HTTP/1.1", host: "www.mysite.pt", referrer: "http://www.mysite.pt/" 2016/07/14 01:54:28 [error] 13917#0: *42536 user "admin" was not found in "/usr/local/nginx/.htpasswd", client: 194.28.112.51, server: localhost, request: "GET / HTTP/1.1", host: "www.mysite.pt", referrer: "http://www.mysite.pt/" 2016/07/14 01:54:29 [error] 13917#0: *42539 user "kyivstar" was not found in "/usr/local/nginx/.htpasswd", client: 194.28.112.51, server: localhost, request: "GET / HTTP/1.1", host: "www.mysite.pt", referrer: "http://www.mysite.pt/" A: Not sure if the following it too generic for you (if so, please post a comment accordingly), but your given regex doesn't match the host: ... value of the log generated by the attacker, specifically the / inside there. You could try out this instead: failregex = ^ \[error\] \d+#\d+: \*\d+ user "\S+":? (password mismatch|was not found in ".*"), client: <HOST>, server: \S+, request: "\S+ \S+ HTTP/\d+\.\d+", host: ".*"$ ^ \[error\] \d+#\d+: \*\d+ no user/password was provided for basic authentication, client: <HOST>, server: \S+, request: "\S+ \S+ HTTP/\d+\.\d+", host: ".*"$
# Copyright (c) 2006, 2014, Oracle and/or its affiliates. All rights reserved. # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; version 2 of the License. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA IF(WIN32) SET(localstatedir "C:\\\\mysql\\\\data\\\\") SET(ini_file_extension "ini") ELSE() SET(localstatedir "${MYSQL_DATADIR}") SET(prefix "${CMAKE_INSTALL_PREFIX}") SET(libexecdir "${CMAKE_INSTALL_PREFIX}/${INSTALL_SBINDIR}") SET(bindir "${CMAKE_INSTALL_PREFIX}/${INSTALL_BINDIR}" ) SET(sbindir "${libexecdir}") SET(datadir "${MYSQL_DATADIR}") SET(CC ${CMAKE_C_COMPILER}) SET(CXX ${CMAKE_CXX_COMPILER}) SET(CFLAGS ${CMAKE_C_FLAGS}) SET(CXXFLAGS ${CMAKE_CXX_FLAGS}) SET(MYSQLD_USER "mysql") SET(ini_file_extension "cnf") SET(HOSTNAME "hostname") ENDIF() # XXX: shouldn't we just have variables for all this stuff and centralise # XXX: their configuration in install_layout.cmake? IF(WIN32) SET(inst_location ${INSTALL_DOCREADMEDIR}) ELSE() SET(inst_location ${INSTALL_SUPPORTFILESDIR}) ENDIF() FOREACH(inifile my-huge my-innodb-heavy-4G my-large my-medium my-small) CONFIGURE_FILE(${CMAKE_CURRENT_SOURCE_DIR}/${inifile}.cnf.sh ${CMAKE_CURRENT_BINARY_DIR}/${inifile}.${ini_file_extension} @ONLY) INSTALL(FILES ${CMAKE_CURRENT_BINARY_DIR}/${inifile}.${ini_file_extension} DESTINATION ${inst_location} COMPONENT IniFiles) ENDFOREACH() IF(UNIX) SET(prefix ${CMAKE_INSTALL_PREFIX}) FOREACH(script mysqld_multi.server mysql-log-rotate binary-configure config.medium.ini config.small.ini config.huge.ini ndb-config-2-node.ini) CONFIGURE_FILE(${CMAKE_CURRENT_SOURCE_DIR}/${script}.sh ${CMAKE_CURRENT_BINARY_DIR}/${script} @ONLY ) IF(script MATCHES ".ini") SET(comp IniFiles) SET(permissions OWNER_READ OWNER_WRITE GROUP_READ WORLD_READ) ELSE() SET(comp Server_Scripts) SET(permissions OWNER_READ OWNER_WRITE OWNER_EXECUTE GROUP_READ GROUP_EXECUTE WORLD_READ WORLD_EXECUTE) ENDIF() INSTALL(FILES ${CMAKE_CURRENT_BINARY_DIR}/${script} DESTINATION ${inst_location} COMPONENT ${comp} PERMISSIONS ${permissions}) ENDFOREACH() IF(INSTALL_SUPPORTFILESDIR) INSTALL(FILES magic DESTINATION ${inst_location} COMPONENT SupportFiles) ENDIF() INSTALL(FILES mysql.m4 DESTINATION ${INSTALL_SHAREDIR}/aclocal COMPONENT Development) CONFIGURE_FILE(MySQL-shared-compat.spec.sh ${CMAKE_CURRENT_BINARY_DIR}/MySQL-shared-compat.spec @ONLY) CONFIGURE_FILE(mysql.spec.sh ${CMAKE_CURRENT_BINARY_DIR}/mysql.spec @ONLY) CONFIGURE_FILE(mysql.spec.sh ${CMAKE_CURRENT_BINARY_DIR}/mysql-${VERSION}.spec @ONLY) CONFIGURE_FILE(MySQL-shared-compat.spec.sh ${CMAKE_CURRENT_BINARY_DIR}/MySQL-shared-compat.spec @ONLY) SET(bindir ${prefix}/${INSTALL_BINDIR}) SET(sbindir ${prefix}/${INSTALL_SBINDIR}) SET(scriptdir ${prefix}/${INSTALL_SCRIPTDIR}) SET(libexecdir ${prefix}/${INSTALL_SBINDIR}) SET(pkgdatadir ${prefix}/${INSTALL_MYSQLSHAREDIR}) CONFIGURE_FILE(${CMAKE_CURRENT_SOURCE_DIR}/mysql.server.sh ${CMAKE_CURRENT_BINARY_DIR}/mysql.server @ONLY) INSTALL(FILES ${CMAKE_CURRENT_BINARY_DIR}/mysql.server DESTINATION ${inst_location} COMPONENT SupportFiles PERMISSIONS OWNER_READ OWNER_WRITE OWNER_EXECUTE GROUP_READ GROUP_EXECUTE WORLD_READ WORLD_EXECUTE) ENDIF() IF(APPLE) FOREACH(resource Info.plist Description.plist StartupParameters.plist preflight postflight) CONFIGURE_FILE(${CMAKE_CURRENT_SOURCE_DIR}/MacOSX/${resource}.sh ${CMAKE_CURRENT_BINARY_DIR}/MacOSX/${resource} ESCAPE_QUOTES @ONLY) ENDFOREACH(resource) FOREACH(resource MySQLCOM StartupItem.Description.plist StartupItem.postinstall ReadMe.txt StartupItem.Info.plist) CONFIGURE_FILE(${CMAKE_CURRENT_SOURCE_DIR}/MacOSX/${resource} ${CMAKE_CURRENT_BINARY_DIR}/MacOSX/${resource} COPYONLY) ENDFOREACH(resource) ENDIF()
BRENTWOOD (KDKA) — Two pit bulls are being quarantined after authorities say they attacked a Brentwood police officer, sending him to the hospital with injuries. The officer was responding to a call about a dog roaming in the 2700-block of Pyramid Street. He encountered what he called an aggressive pit bull. Recognizing the location and the dog, he attempted to get the animal back in its backyard. “As he was nearing the backyard of the property, a second dog at the property attacked the officer, biting him on the leg,” Sgt. Matthew Delallo, of Brentwood Police said. “When the second dog attacked the officer, the first dog attacked the officer. Two pit bulls were attacking at the same time.” Each dog had one of his legs. The officer fell and fired his gun, scaring off the animals. By then, more than half a dozen officers had responded to the scene. With the help of a water hose, officers were able to corral the dogs inside a makeshift area, keeping them on the property. Frank Johnson, the owner of the dogs says he was not at home when all of this was going on and is upset that his dogs were taken away. “I want them to give me my dogs back and I want them to leave me alone,” he said. “This is the fourth time that they have tried to take my dogs from me.” Johnson has twice been cited because of habitual barking by his dogs, and twice his dogs have bitten someone. But Johnson says the bites came only after a stranger approached his pets. “My dogs ain’t no danger to the community,” said Johnson. The dogs are in quarantine and police say the courts will decide if Johnson gets them back. The police officer who was attacked was taken to a local hospital where he was treated and released. The dogs were taken to Ferree Kennels in McKeesport.
Allogeneic bone marrow transplantation for Hodgkin's and non-Hodgkin's lymphoma. We studied 23 consecutive patients, median age 34 years, with relapsed or resistant aggressive lymphoma who underwent allogeneic BMT at the UCLA Medical Center Bone Marrow Transplantation Unit from 1 November 1984 to 30 March 1993. All patients were < 50 years of age and had sibling donors who were matched at the HLA-A, B and DR loci. Nine patients had Hodgkin's disease (HD) and 14 had non-Hodgkin's lymphoma (NHL); three of these had low grade histology and 11 had intermediate or high grade lymphoma histology. After a median follow-up of 34 months, eight patients are alive, seven without recurrent lymphoma. Five patients had early deaths. The disease-free survival for the entire group is 26% with an overall survival of 29%. There was no difference in survival rate on the basis of disease or histology. Comparing preparative regimens containing TBI to those without there was no difference in survival rate (P = 0.35). Neither age nor sex was a significant determinant of outcome (P = 0.63 and 0.36, respectively). Disease status at the time of transplantation proved to be the important determinant of outcome. Patients transplanted with chemotherapy sensitive disease (n = 9), defined as a partial or complete response to salvage chemotherapy, had a survival rate of 42%, which was significantly better than those who had refractory disease at transplantation (n = 14), who had a survival rate of 21% (P = 0.006). However, this small, but significant fraction of patients with refractory disease was curable. Thus, our data demonstrate that allogeneic bone marrow transplantation is an effective means of treatment for relapsed or aggressive Hodgkin's and non-Hodgkin's lymphoma.
A newly amended state House bill, advanced by the state House Natural Resources Committee today, would allow Children's Hospital to purchase the shuttered New Orleans Adolescent Hospital for $29 million. Children's agreed to lease the property in January but balked at the terms of the agreement, which required that it reopen NOAH as a child and adolescent psychiatric hospital.? [ Read more ]
Q: Why doesn't Perl 6's try handle a non-zero exit in shell()? This try catches the exception: try die X::AdHoc; say "Got to the end"; The output shows that the program continues: Got to the end If I attempt it with shell and a command that doesn't exit with 0, the try doesn't catch it: try shell('/usr/bin/false'); say "Got to the end"; The output doesn't look like an exception: The spawned command '/usr/bin/false' exited unsuccessfully (exit code: 1) in block <unit> at ... line ... What's going on that this makes it through the try? A: The answer is really provided by Jonathan Worthington: https://irclog.perlgeek.de/perl6-dev/2017-04-04#i_14372945 In short, shell() returns a Proc object. The moment that object is sunk, it will throw the exception that it has internally if running the program failed. $ 6 'dd shell("/usr/bin/false")' Proc.new(in => IO::Pipe, out => IO::Pipe, err => IO::Pipe, exitcode => 1, signal => 0, command => ["/usr/bin/false"]) So, what you need to do is catch the Proc object in a variable, to prevent it from being sunk: $ 6 'my $result = shell("/usr/bin/false"); say "Got to the end"' Got to the end And then you can use $result.exitcode to see whether it was successful or not.
Police ask for help finding missing hospital patient Chicago police have issued a missing persons alert for a 56-year-old man who suffers from seizures. Elton Kelly, who also goes by Calvin, walked out of Mount Sinai Hospital at 1550 S. California Ave.--where he was a patient--about 4 p.m. on Thursday, according to police. Kelly is black, 5 feet 9 inches tall, weighing 196 pounds, with brown eyes and graying black hair. He was wearing a white t-shirt with a coffee mug on it, and green, red, and white plaid shorts, according to the alert. He was also carrying a State of Illinois identification card. He has a scar behind his left ear. Police could not provide more detailed information about when Kelly left the hospital or if he had family that was being notified of his disappearance. Police said they only had one photograph of Kelly available. Anyone who has seen Kelly is urged to call Area One special victims unit at 312-747-8385.
Due to the lapse in appropriations, Department of Justice websites will not be regularly updated. The Department’s essential law enforcement and national security functions will continue. Please refer to the Department of Justice’s contingency plan for more information. Justice News Broward Resident Pleads Guilty To Participating in a Jamaica Based Lottery Scheme A Broward County resident pled guilty today, before United States District Judge William J. Zloch, for her involvement in a Jamaica based telemarketing fraud scheme Wifredo A. Ferrer, United States Attorney for the Southern District of Florida, and Delany De-Leon Colon, Acting Inspector in Charge, United States Postal Inspection Service (USPIS), Miami Division, made the announcement. Elizabeth Gonzalez, 25, of Hollywood and Miami Gardens, pled guilty to conspiracy to commit wire fraud, in violation of Title 18, United States Code, Section 1349. Gonzalez is scheduled to be sentenced by U.S. District Judge William J. Zloch on July 27, 2016 at 11:00 a.m. Gonzalez faces a maximum statutory sentence of twenty years in prison. According to the information presented in Court, beginning in or about September 2015, Gonzalez’s co-conspirators are alleged to have contacted elderly victims in the United States and falsely informed them that they had won a lottery prize. The co-conspirators told victims they had to pay several thousand dollars in taxes and fees, in order to collect their purported lottery winnings. The co-conspirators then allegedly instructed the victims on how to send the money, and to whom, including sending wire transfers to Gonzalez. In December 2015 and January 2016, Gonzalez received nine separate wire transfers from various telemarketing lottery fraud victims in California, Connecticut, New York and North Carolina. The defendant’s husband, Delroy Drummond, was previously convicted of conspiracy to commit wire and mail fraud for his role in a Jamaican based telemarking fraud scheme that involved some of the alleged victims of Gonzalez’s fraud scheme (Case No. 16-60023-CR-WPD). Drummond is scheduled to be sentenced on May 31, 2016 at 1:15 p.m. by U.S. District Judge William P. Dimitrouleas. Mr. Ferrer commended the investigative efforts of USPIS, U.S. Immigration and Customs Enforcement's Homeland Security Investigations (ICE-HSI), Miami Field Office, U.S. Marshals Service, Broward County Drug Task Force and the Miami-Dade Police Department Economic Crimes Bureau. This case is being prosecuted by Assistant United States Attorney Randy Katz.
Tumor mutational burden: an emerging biomarker for cancer immunotherapy {#Sec1} ======================================================================= Immunotherapy with immune checkpoint inhibitors targeting cytotoxic T lymphocyte associated 4 (CTLA-4) or programmed cell death 1 (PD-1) or its ligand (PD-L1) can provide important clinical benefit to patients affected by multiple cancers, most notably lung cancer \[[@CR1], [@CR2]\], melanoma \[[@CR3]\], renal cancer \[[@CR4]\] and urothelial carcinoma \[[@CR5]\]. However, only a fraction of patients currently treated by immune checkpoint inhibitors derive benefit from it, while a minority of them suffers from severe side effects. Given the significant cost and non-negligible toxicity of these therapies, the identification of strategies to adequately select those patients most likely to show a favorable response is recognized as an urgent medical need. A few potential biomarkers have been identified up to now, such as PD-L1 gene expression, microsatellite instability (MSI), mismatch repair deficiency (dMMR), POLE or JAK1/2 mutations, immune cell infiltration, IFNγ expression, tumor mutational burden (TMB) or neoantigen burden \[[@CR6], [@CR7]\]. TMB is a measure of the total amount of somatic coding mutations in a tumor and it is currently investigated as a potential biomarker in non-small cell lung carcinoma (NSCLC) \[[@CR8]--[@CR10]\]. Accumulating evidence, however, suggests its potential usefulness also in melanoma \[[@CR8], [@CR11]--[@CR14]\], urothelial cancer \[[@CR5], [@CR15], [@CR16]\], mismatch-repair deficient colorectal tumors \[[@CR17]\] and other cancer types \[[@CR18]\]. Its pattern and distribution is highly variable across different cancer types, with over 1000-fold difference between cancer types with the lowest mutational burden and those with the highest mutational burden, such as those associated with DNA environmental damage, i.e. by exposure to tobacco smoke or UVs \[[@CR19], [@CR20]\]. Increased TMB was also observed in tumors with defects in DNA mismatch repair and DNA replication or in tumors characterized by microsatellite instability, as in colorectal cancer \[[@CR21], [@CR22]\]. Highly mutated tumors are more likely to produce abundance of tumor-specific mutant epitopes, which may function as neoantigens recognized as non-self by the immune system. Therefore, increased activation of immune cells by treatment with immune checkpoint inhibitors may lead to improved immune-mediated tumor-cell clearance and clinical response in these tumors (Fig. [1](#Fig1){ref-type="fig"}). A significant association between neoantigen production and immune-mediated clinical response was indeed observed in several studies \[[@CR9], [@CR11], [@CR14], [@CR23]\]. Measurement of this neoantigen production, though, is expensive and time-consuming. Tumor neoantigens can be generated by mutations or by gene fusions, especially out-of-frame fusions. Although some pipelines have recently been developed for the identification of neoantigens derived from gene fusions \[[@CR24]\], most research up to now has estimated overall neoantigen load based only on somatic nonsynonymous coding mutations, called by Whole Exome Sequencing (WES). Briefly, somatic nonsynonymous coding mutations are identified by WES and, if RNA sequencing is also available, only mutations occurring in expressed genes are retained. Peptides containing selected mutations are then identified in silico and the efficiency of their presentation to the immune system may be evaluated by mass spectrometry or by algorithms that consider their predicted affinity to the MHC class I complex and patient-specific HLA class I alleles \[[@CR14], [@CR25]\]. In comparison with overall neoantigen load, TMB is easier to measure and correlates with it. Although not all mutations can give rise to tumor immunogenic peptides, their number influences the amount of neoantigens potentially produced. High TMB correlates with long-term clinical benefit from immune checkpoint inhibitors in patients with melanoma \[[@CR14]\], NSCLC \[[@CR9], [@CR26]--[@CR28]\] and urothelial carcinoma \[[@CR5], [@CR15], [@CR16], [@CR29]\]. In addition to that, patients with mismatch repair (MMR) deficient tumors are more responsive to immunotherapy, probably due to their high tumor mutational burden \[[@CR17]\]. Therefore, although not always capable to explain the clinical benefit alone, TMB is a good approximation for neoantigen load assessment \[[@CR14]\], is technically less challenging and less expensive and may represent a better suited predictive biomarker for immunotherapy response.Fig. 1Tumor mutational burden as immunotherapy biomarker. Interaction between tumor mutational burden, neoantigen production and immune checkpoints. Hyper-mutated tumors (bottom) are more likely than hypo-mutated tumors (top) to generate tumor-specific peptides (neoantigens) recognized by the immune system. However, immune surveillance can be restrained by simultaneous high expression of PD-L1, which delivers a suppressive signal to T cells. PD-L1/PD-1 interaction and other immune checkpoints can be inhibited by immune checkpoint inhibitors, restoring immune response TMB may also represent a relevant prognostic biomarker. In BRCA-1/2 mutated ovarian cancers, TMB correlates with improved overall survival \[[@CR30], [@CR31]\]. In breast cancer patients, tumors with high TMB and favorable immune-infiltrate ("hot tumors") are associated with prolonged survival \[[@CR32]\]. Consistently, basal cell carcinoma, which is characterized by very high TMB, presents with slow growth rates and rare metastases. Although not definitively demonstrated, we can speculate that this less aggressive phenotype may be due to hypermutation, which would trigger, via increased neoantigen production, a more effective immune response of the host \[[@CR33]\]. Quantification of tumor mutational burden from gene panels: "yes we can" {#Sec2} ======================================================================== Initial studies showing a correlation between TMB and enhanced response to immunotherapy were based on WES datasets for TMB quantification \[[@CR9], [@CR14], [@CR17]\]. WES allows a direct measurement of TMB, yet it remains unsuitable as routine technology in clinical practice, because expensive, labor-intensive and time-consuming. Therefore, several studies explored the possibility to provide equally accurate and clinically predictive TMB estimates from targeted enrichment sequencing, using various gene panels (Table [1](#Tab1){ref-type="table"}, Additional file [1](#MOESM1){ref-type="media"}: Table S1).Table 1Overview of the main published studies on TMB quantification from gene panelsReferenceGene panel (version)Cancer typeStudy designStudy IDICITMB cutoff (mut/Mb)Method of TMB cutoff determinationTMB predictive valueClinical outcomeN patientsRosenberg, 2016 \[[@CR5]\]FM1 (v3)urothelial carcinoma (metastatic or locally advanced)trial (single-arm, phase 2)NCT02108652PD-(L)1NANANAORR315Balar, 2017 \[[@CR16]\]FM1±urothelial carcinoma (metastatic)trial (single-arm, phase 2)NCT02108652PD-(L)1Q3 (\> = 16)distributionNAOS123Powles, 2018 \[[@CR15]\]FM1±urothelial carcinoma (metastatic)trial (randomized, phase 3)NCT02302807PD-(L)1Q2 (9.65)distributionNAOS931Kowanetz, 2016 \[[@CR27]\]FM1 (v3)NSCLCtrial (randomized, phase 2)NCT01903993PD-(L)1Q1, Q2 (9.9), Q3distributionNAPFS, OS, ORR454trial (single-arm, phase 2)NCT02031458trial (single-arm, phase 2)NCT01846416Gandara, 2018 \[[@CR61]\] ^a^FM1 bTMB assayNSCLCtrial (randomized, phase 2)NCT01903993PD-(L)1\> = 14positive and negative percentage agreement with the orthogonally validated FM1NAPFS, OS259trial (randomized, phase 3)NCT02008227Hellmann, 2018 \[[@CR50]\]FM1 CDxNSCLCtrial (randomized, phase 3)NCT02477826combo\> 10based on NCT02659059NAPFS1004Rizvi, 2018 \[[@CR42]\]MSK-IMPACT (v1, v2, v3)NSCLCtrial (randomized, phase 1)NCT01295827PD-(L)1Q2 (7.4)distributionAUC = 0.601 (DCB)DCB, PFS240Ready, 2019 \[[@CR28]\]FM1 CDxNSCLCtrial (non-randomized, phase 2)NCT02659059combo10ROCAUC (95% CI) = 0.73 (0.62--0.84); TPR (95% CI) = 0.78 (0.63--0.93); FPR (95% CI) = (0.62 (0.49--0.73)ORR98Wang, 2019 \[[@CR49]\] ^a^NCC-GP150NSCLCobservational (cohort)NAPD-(L)16 (tot mut)best cutoff from in silico analysis on Rizvi 2015 WESNAPFS, ORR50Johnson, 2016 \[[@CR12]\]FM1 (v2, v3)melanomaobservational (retrospective)NAPD-(L)1\< 3.3, 3.3--23.1, \> 23.1ROCNAPFS, OS, ORR65Chalmers, 2017 \[[@CR22]\]FM1 (v1, v2, v3, v4), FM1 Hemevarious locally advanced or metastatic solid tumorsobservational (retrospective)NANA\> 20NANANA102, 292Goodman, 2017 \[[@CR18]\]FM1 (v1, v2, v3)various locally advanced or metastatic solid tumorsobservational (cohort, retrospective)NCT02478931PD-(L)1, CTLA-4, high-dose IL2 or combo\< 6, 6--19, \> 19Foundation Medicine official reportsNAPFS, OS, ORR151Khagi, 2017 \[[@CR44]\] ^a^Guardant360various solid tumorsobservational (cohort, retrospective)NCT02478931PD-(L)1, CTLA-4, combo or othermean (\> 3 VUS)distributionNAPFS, OS, ORR69Zehir, 2017 \[[@CR73]\]MSK-IMPACT (v1, v2)various primary and metastatic solid tumorsobservational (cohort, prospective)NCT01775072NA\> 13.8distribution (median TMB +  2 × IQR_TMB)NANA10, 945Samstein 2019 \[[@CR43]\]MSK-IMPACT (v3)bladderobservational (cohort, prospective)NCT01775072PD-(L)1, CTLA-4 or combo17.6distribution (top 20%)NAOS, PFS, DCB214breast5.945breast ER+6.824breast ER-4.421unknown primary14.290colorectal52.2110esophagogastric8.8126glioma5.9117head and neck10.3138melanoma30.7321NSCLC13.8350renal cell carcinoma5.9151*ORR* Objective Response Rates, *DCB* Durable Clinical Benefit, *OS* Overall Survival, *PFS* Progression-Free Survival, *FM1* Foundation Medicine's FoundationOne (*v1*: 185 genes, *v2*: 236 genes, *v3*: 315 genes, *v4*: 405 genes, *Heme*: 405 genes, *CDx*: 324 genes); ±: version not specified; *MSK-IMPACT v1* 341 genes, *v2*: 410 genes, *v3* 468 genes, *NSCLC* non-small cell lung cancer, *ER* Estrogen Receptor, *VUS* variants of unknown significance, *PD-(L)1* anti-PD-1 or anti-PD-L1, *CTLA-4* anti-CTLA-4, *combo* combined anti-PD-1/PD-L1 + anti-CTLA-4, *Q1-Q4* quartiles, ^a^: TMB quantification from bloodEach study is described reporting gene panel, cancer type, study design, study ID (on [ClinicalTrials.gov](http://clinicaltrials.gov)), immune checkpoint inhibitor treatment (ICI), proposed TMB cutoff, method for TMB cutoff determination, outcome analyzed to evaluate TMB clinical utility. AUC, TPR (True Positive Rate) and FPR (False Positive Rate) are provided, when available, as a measure of TMB predictive value for immunotherapy responder classification The main challenge for accurate panel-based TMB quantification is the ability to extrapolate the global mutational burden from the narrow sequencing space targeted by a gene panel. In silico analyses were performed to test the concordance between panel-based and WES-based TMB, which is considered the reference for TMB quantification. Publicly available WES datasets were downsampled to the subset of genes targeted in the panel under consideration and TMB values from such simulated gene panels were compared with TMB values from the original WES (Additional file [7](#MOESM7){ref-type="media"}: Figure S1), finding high correlation between the two (Additional file [2](#MOESM2){ref-type="media"}: Table S2, Additional file [8](#MOESM8){ref-type="media"}: Figure S2). Most of these in silico analyses were performed using publicly available WES datasets from TCGA, with the exception of the Oncomine Tumor Mutation Load Assay or NovoPM and CANCERPLEX gene panels, for which WES datasets from COSMIC or from other sources were used. Regardless, similar correlation values were reported for the different gene panels tested (Additional file [2](#MOESM2){ref-type="media"}: Table S2, Additional file [8](#MOESM8){ref-type="media"}: Figure S2). For some of these gene panels (FoundationOne, Trusight170, Oncomine Tumor Mutation Load Assay, Oncomine Comprehensive Assay V3 and MSK-IMPACT gene panels), an empirical approach was also used to test the concordance between panel-based and WES-based TMB quantification, based on matched sequencing by gene panel and WES of the same tumor sample and comparison of matched TMB values (Additional file [3](#MOESM3){ref-type="media"}: Table S3, Additional file [9](#MOESM9){ref-type="media"}: Figure S3). Accuracy of panel-based TMB quantification is influenced by statistical sampling effects and small panels provide less precise TMB estimates \[[@CR22], [@CR34]--[@CR36]\]. It was demonstrated that TMB values from the FoundationOne gene panel, which targets 1.1 Mb of genomic space, are similar to those from WES, whereas accuracy drops importantly when sequencing less than 0.5 Mb \[[@CR22]\]. Another study simulated sequencing of theoretical gene panels of different sizes and identified 1.5 to 3 Mb as the best suited targeted genomic size to confidently estimate TMB \[[@CR35]\]. Moreover, the deviation between WES- and panel-based TMB appears more relevant for samples with low to moderate underlying TMB levels, compared to samples with high TMB \[[@CR22], [@CR35], [@CR36]\]. Another retrospective study on a commercial panel of 248 genes likewise cautions against small gene panels which would lead to TMB overestimation \[[@CR37]\]. Besides the accuracy of panel-based TMB quantification, it is critical to assess its capability to discriminate between immunotherapy responders and non-responders, as previously observed for WES-based TMB. Several exploratory analyses demonstrated that panel-based TMB, as simulated in silico by downsampling a WES dataset to only include genes targeted by the FoundationOne gene panel, associates with immunotherapy response \[[@CR8], [@CR26]\] or with signatures of immune checkpoint activation \[[@CR38]\]. Comparable results were observed in similar in silico analyses for other gene panels, such as the Trusight170 \[[@CR39], [@CR40]\] or MSK-IMPACT \[[@CR26]\] (Additional file [4](#MOESM4){ref-type="media"}: Table S4). Notably, direct measurement of TMB from the Oncomine Tumor Load Assay shows that this panel-based TMB value allows to classify colorectal cancer cases based on their MSI status \[[@CR39], [@CR41]\]. Since in this cancer type MSI positively correlates with immunotherapy response, this is a further, yet indirect evidence, of the capability to predict immunotherapy response, using a panel-based TMB estimate. Most importantly, a few clinical studies demonstrated that TMB directly estimated using gene panels is higher in those patients who benefit more from immune checkpoint blockade treatment, thus providing "real-life" evidence for its potential clinical predictive value (Fig. [2](#Fig2){ref-type="fig"}, Additional file [5](#MOESM5){ref-type="media"}: Table S5). A direct association with immunotherapy response was shown for the MSK-IMPACT \[[@CR42], [@CR43]\] and the Guardant360 gene panels \[[@CR44]\] but most of the reported studies utilized the FoundationOne gene panel (Fig. [2](#Fig2){ref-type="fig"}, Additional file [5](#MOESM5){ref-type="media"}: Table S5). In particular, in the CheckMate 227 trial, NSCLC patients with high TMB (\> 10 mutations per Mb, measured by FoundationOne) presented increased progression-free survival after combined anti-CTLA-4 plus anti-PD-1/PD-L1 therapy \[[@CR45]\]. Interestingly, TMB was predictive of anti-PD-L1 monotherapy response in NSCLC (POPLAR trial, \[[@CR27]\]) and metastatic urothelial carcinoma patients \[[@CR5], [@CR15], [@CR16]\], independently from the PD-L1 expression status. Analysis of archival tumor samples from melanoma patients treated by anti-PD-1/PD-L1 monotherapy also showed superior response rates, progression-free survival and overall survival in high TMB cases \[[@CR12]\]. Moreover, a retrospective study on 151 patients across diverse tumor types showed that cancer patients with higher TMB, benefit more from anti-PD-1/PD-L1, anti-CTLA-4 or high dose IL2 monotherapy \[[@CR18]\]. The same was not observed for combined anti-PD-1/PD-L1 plus anti-CTLA-4 therapy but the available number of samples may be too small to draw conclusions \[[@CR18]\].Fig. 2TMB association with progression-free survival. Forest plot of hazard ratios (HR) comparing progression-free survival (PFS) between patients with high or low TMB, as indicated in the "Comparison" column. If not specified otherwise, TMB is reported as number of mutations per Mb. All patients were treated with immune checkpoint inhibitors (*ICI*). Bars represent the 95% confidence intervals. Size of the box is proportional to precision. Reference to the study and the analyzed cancer type are also reported together with the log-rank *p*-value. *Q1-Q4*: quartiles; *VUS*: variants of unknown significance. *\**: TMB quantified from blood; *\*\**: Cox proportional hazards model adjusted for age, gender, disease stage and prior therapy by ipilimumab Need for standardization of TMB quantification and reporting {#Sec3} ============================================================ Despite the increasing number of studies showing the potential clinical relevance of panel-based TMB as a predictive biomarker for immunotherapy response, its use in the clinical setting is currently limited by the absence of standard methods of quantification and the lack of a robust and universal cutoff to identify immunotherapy responders. Panel-based TMB quantification is influenced by various experimental factors affecting library construction and sequencing, by the pipeline used to call mutations and by the capability to extrapolate TMB values from the restricted genomic space sampled by gene panels to the whole genome (Fig. [3](#Fig3){ref-type="fig"}a). Experimental factors (e.g. tumor purity or sequencing depth) and the variant calling pipeline (e.g. the variant calling algorithm and the method to remove germline variants) can significantly affect the number of called somatic mutations and have a similar impact on both panel-based and WES-based TMB quantification. Indeed, the adoption of a well-documented standard pipeline was already claimed for WES analyses as an urgent need to allow data interoperability between different platforms \[[@CR46]\]. The same applies to panel sequencing for TMB quantification. In this context, an important factor investigated for its influence on the number of called somatic variants is the method chosen to identify and remove germline variants. Indeed, since only somatic mutations can potentially produce tumor neoantigens recognized as non-self by the immune system, it is important to remove germline variants in TMB quantification. It was observed that the use of an in silico method for somatic variant calling instead of matched tumor-normal samples, leads to increased false positive somatic variants, which has an important influence on the accuracy of TMB quantification, especially for small gene panels \[[@CR34]\]. To avoid this, it was proposed to perform TMB quantification using only high-confidence regions \[[@CR47]\] (e.g. regions of the genome, devoid of potential systematic biases or structural variants, where mutations can be confidently called), as defined by Zook et al. \[[@CR48]\]. It was also observed that increased somatic false positives are generated by the in silico germline filtering method for patients with non-caucasian ancestry compared to caucasian patients, as the former are less represented in public databases used for germline variant filtering \[[@CR34]\]. The use of ExAC, the largest and more representative public germline WES database, in addition to dbSNP and 1000 Genomes, is recommended to reduce this difference \[[@CR34]\].Fig. 3Differences in the workflow for panel-based TMB quantification. **a**. Overview of the factors influencing panel-based TMB quantification. Several variables in library construction, sequencing and in the pipeline to call mutations influence panel-based TMB quantification. Furthermore, panel-based TMB quantification is influenced by differences in the bioinformatic method to extrapolate global TMB from mutations identified in the narrow genomic region targeted by the gene panel. **b**. Differences across various studies in panel-based TMB quantification: gene panel technical specifications, preanalytical factors and the bioinformatics workflow used to extrapolate from the genomic space targeted by gene panels global TMB are described. *FM1*: Foundation Medicine's FoundationOne panel (v1: 185 genes, v2: 236 genes, v3: 315 genes, v4: 405 genes); *NA:* not available; *±*: algorithm developed by Sun et al. for in silico removal of germline variants \[[@CR74]\] In addition to these factors, which similarly influence WES- and panel-based analyses, panel-based TMB quantification also requires to extrapolate the number of somatic coding mutations observed in the targeted genomic space to the number that would be observed across the whole genome. Extrapolation methods may differ for various choices in variant filtering, such as removal of known cancer mutations or synonymous mutations (Fig. [3](#Fig3){ref-type="fig"}b). Standard gene panels are commonly enriched in known cancer genes, which are more likely to be mutated in a tumor and expectedly enriched in mutations. Therefore, it was proposed to remove known cancer variants of targeted genes when performing TMB quantification, to avoid overestimation of TMB when extrapolating it across the whole genome \[[@CR12], [@CR22]\]. Buchhalter et al., showed that removal of cancer mutational hotspots slightly decreases the number of high TMB tumors identified but does not change the general picture \[[@CR35]\]. However, the importance of this filtering, routinely performed only for Foundation Medicine panels, depends on panel size and composition: some gene panels may be larger and less enriched in cancer genes by including, for example, pharmacogenomic variants. As for synonymous mutations, it is claimed that, although not biologically meaningful, their inclusion may reduce sampling noise and improve the approximation of TMB across the whole genome. Indeed, several works compared TMB quantification with or without synonymous variants and observed that, when including synonymous variants, panel-based TMB shows increased correlation with WES-based TMB values \[[@CR35], [@CR49]\] and stronger association with clinical response \[[@CR9]\]. Starting from the above observations, we can infer that some recommendations to build a standardized and robust analysis pipeline for TMB quantification are starting to emerge at least for the following points: i. germline variants can be most efficiently identified and removed by matched normal sequencing and, if this is not possible, the largest available germline variant databases should be used for in silico filtering, especially for non-caucasian ancestries; ii. TMB extrapolation to the whole genome is accurately performed by counting all somatic mutations, including synonymous mutations, to enlarge the sampling space and better approximate global TMB across the whole genome. As already mentioned, panel-based TMB quantification is affected by the genomic size targeted by the panel and by its gene composition. Notably, gene panels tested up to now widely differ for number of targeted genes (from 73 to 710) and size (from 0.39 to 2.8 Mb of targeted genomic space) (Additional file [1](#MOESM1){ref-type="media"}: Table S1). These considerations raise the question of how to convert TMB estimates between different gene panels to allow cross-platform comparability. Indeed, although the majority of studies correlating TMB to immunotherapy response are currently based on FoundationOne, several other types of gene panels exist and the offer is steadily increasing (Additional file [1](#MOESM1){ref-type="media"}: Table S1). Moreover, we still need to standardize the conversion of the reference WES-based TMB values to panel-based TMB, since the lower sequencing coverage and higher sequencing depth of gene panels, as compared to WES, may lead to decreased accuracy of TMB values and increased sensitivity in variant calling. For cross-panels or panel-to-WES TMB conversion, an in silico approach was proposed, where TMB distributions derived from two different technologies were interpolated and aligned and TMB cutoffs were mapped across distributions \[[@CR38]\]. However, a consensus on a standard method to convert TMB values is still missing. Not surprisingly, in this heterogeneous landscape a robust TMB cutoff to discriminate between immunotherapy responders and non-responders is still to be defined. Moreover, the adopted cutoffs sometimes differ across different studies on the same gene panel (Table [1](#Tab1){ref-type="table"}). Up to now, the TMB cutoff of 10 mutations per Mb, measured by the FoundationOne gene panel and found to best discriminate between responders and non-responders to immunotherapy in NSCLC patients, is the only one which has been validated in a separate further study \[[@CR28], [@CR50], [@CR51]\]; this cutoff was also observed, but not yet validated, in melanoma \[[@CR38]\] and in metastatic urothelial carcinoma \[[@CR15]\] (Table [1](#Tab1){ref-type="table"}). Interestingly, these cancer types present a TMB distribution similar to that of NSCLC \[[@CR52]\]. Indeed, due to the diversity of TMB distribution across different cancer types, the adoption of cancer-specific TMB cutoffs was proposed \[[@CR35], [@CR43]\]. TMB cutoff was initially most commonly established using distribution-based stratification, which can be heavily influenced by outliers, while it is now often identified based on statistically sound methods, such as ROC curves. In the future, the use of ROC curves as a common method of TMB cutoff determination will greatly help to converge to a robust TMB cutoff and will facilitate comparison across different platforms. The heterogeneity in experimental and analytical protocols, in the extrapolation of panel-based TMB values and in gene panel technical specifications is currently limiting the potential use of TMB in a clinical setting (Fig. [3](#Fig3){ref-type="fig"}). For this reason, a common standard for TMB quantification and a consensus on a clinically useful TMB cutoff are urgently needed. Some efforts in this sense are ongoing by the Quality Assurance Initiative Pathology (QuIP) in Germany (<https://quip.eu>) and by the European Society of Pathology. Moreover, in the US, governmental organizations, health-sector industries, several NGS gene panel manufacturers and academic institutions set up a TMB Harmonization Working Group (<https://www.focr.org/tmb>) and planned a 3-phase project for TMB harmonization. In the first phase, they performed in silico analyses of publicly available TCGA data to identify sources of variability in TMB quantification between WES and gene panels. Recently concluded, this work established that panel-based TMB is comparable between different gene panels for TMB values ranging 0 to 40 mutations per Mb, that it strongly correlates with WES-based TMB and it is possibly influenced by the type of cancer under investigation. It also found that the observed variance across gene panels stems from their different gene composition and technical specifications, as well as from the bioinformatic pipeline adopted \[[@CR53]\]. The second step of the project empirically validates TMB estimates from different gene panels by mapping them to WES-based TMB values, used as a gold standard, whereas the last step will define best practices for TMB use as immunotherapy biomarker in clinical routine. Following preliminary results on the influence of the bioinformatic workflow and of gene panel size and composition on TMB quantification, the working group recommends the use of gene panels larger than 1 Mb and the standardization of the bioinformatic algorithms, in addition to standardization of sample processing. Moreover, it suggests the inclusion of actionable genes, genes associated with mutagenesis and negative predictors of response in these gene panels and the alignment of panel-based TMB values to WES-based ones to allow interoperability across different assays \[[@CR54]\]. TMB quantification beyond tissue biopsies and current gene panels {#Sec4} ================================================================= Most studies on TMB as a predictive biomarker for immunotherapy response were performed on bioptical or surgical specimens from solid tumors. Since obtaining tissue biopsies may be challenging and invasive for patients, it would be critical for the clinical routine to assess TMB using cell-free DNA (cfDNA) from blood, which includes circulating tumor DNA (ctDNA), as a surrogate specimen to biopsy. High throughput molecular profiling of ctDNA remains technically challenging but increasing efforts are being made in this direction. A few studies previously investigated the feasibility of WES on ctDNA and highlighted some inherent limitations, such as the low amount of available ctDNA, which reduces sensitivity, or ctDNA being more associated with metastases rather than with primary tumors \[[@CR55]--[@CR59]\]. In one of the largest studies attempting optimization of WES-based TMB quantification from liquid biopsy, WES was performed in parallel on DNA from tissue biopsies and on cfDNA from liquid biopsies of 32 metastatic patients and comparable sequencing depth and coverage were obtained \[[@CR60]\]. Performance of variant detection was dependent on the fraction of tumor DNA within the analyzed cfDNA, as previously described. In those samples positive for the presence of ctDNA, variant detection sensitivity of cfDNA-WES compared to tDNA-WES was 94%, regardless of the tumor type (2 cholangiosarcoma and 19 lung, 5 head and neck, 2 prostate, 2 colorectal, 1 breast and 1 bladder cancer were analyzed). Most importantly, in ctDNA positive samples, TMB values from WES on liquid biopsies were robust and consistent with those from WES on tissue biopsies, which demonstrates for the first time the feasibility of TMB quantification from liquid biopsies, using WES. More recently, it was demonstrated that targeted enrichment sequencing by gene panels is another valid approach for TMB quantification from liquid biopsies. In particular, Gandara et al. developed, tested and analytically validated a novel gene panel for TMB quantification from blood \[[@CR61]\]. The panel is based on hybridization-capture enrichment and targets 394 genes, corresponding to 1.1 Mb of genomic space (Fig. [3](#Fig3){ref-type="fig"}). Its clinical utility was evaluated via a retrospective study on 259 NSCLC samples from patients treated with immunotherapy or chemotherapy in the OAK and POPLAR clinical trials. Blood-derived TMB (bTMB) calculated using this novel gene panel correlated well with tissue-derived TMB (tTMB) measured by FoundationOne. Moreover, measured TMB was found to be significantly associated with response to anti-PD-L1 immunotherapy in the POPLAR trial and this was further confirmed on patient samples from the OAK trial. A prospective validation is also currently ongoing in the BFAST trial (NCT03178552) on advanced and metastatic NSCLC patients. Interestingly, it was observed that the capability of TMB, as measured by this panel, to predict anti-PD-1/PD-L1 immunotherapy response is independent from PD-L1 expression levels \[[@CR61]\]. One of the main pitfalls of the panel, though, is its limit of detection, defined as a minimum of 1% tumor content in at least 20 ng of cell-free DNA input, and its dependency on the overall tumor burden, which influences the likelihood of detecting ctDNA. The exclusive use of single nucleotide variants (SNVs) for TMB quantification represents another limitation, although future versions of the algorithm are planned to be released, which will also use indels. The commercial Guardant360 and GuardantOMNI gene panels were also designed for blood-based TMB quantification \[[@CR62]\]. Their limit of detection was defined as a minimum of 0.3% tumor content in at least 5 ng of cell-free DNA input. They were validated in silico by subsetting TCGA WES datasets to only include genes targeted by the panels. Panel accuracy in TMB quantification was then evaluated by correlation of TMB values obtained from the simulated gene panels with those from WES. Their predictive value was similarly evaluated in silico on 30 lung cancer samples with matched information on immunotherapy response. The performance showed by TMB from the simulated gene panel in responder identification was comparable to that of WES-based TMB (Additional file [4](#MOESM4){ref-type="media"}: Table S4). The Guardant360 panel was further tested in a small retrospective study on 69 patients with various tumor types \[[@CR44]\]. No comparison with tissue-based TMB has been reported yet, but a significant correlation between high blood-derived TMB measured by Guardant360 and immunotherapy response was observed \[[@CR44]\]. Finally, a further gene panel for bTMB quantification was recently developed in China. Consistency between panel-based bTMB values and WES-based tTMB values, tested in silico and empirically by matched blood and tissue samples, was comparable to that of the panels described above. Similar results were also found for its predictive value, based on in silico analyses. Interestingly, the authors also raised the issue of the different frequency of oncogenic driver mutations, such as EGFR or KRAS, between Asian and white population. For this reason, they compare TCGA WES-based TMB with panel-based TMB with or without inclusion of EGFR and/or KRAS mutations. Although similar results are yielded, the raised issue is an important point to be further investigated in panel-based TMB quantification \[[@CR49]\]. TMB quantification from liquid biopsies suffers from ctDNA detection limits, which also depend on tumor size and number of cancer cells, but these results encourage to further explore and more extensively validate this approach. Besides new technologies to estimate TMB from liquid biopsies, another significant step towards routine use of TMB in clinical practice is TMB quantification from an even smaller set of genes than in targeted enrichment gene panels. Although panel size is known to affect accuracy of TMB quantification, the use of a highly customized set of genes may represent a valid and even less expensive approach. In this view, Lyu et al., proposed a computational framework to assess the best and smallest subset of genes necessary to estimate TMB as a biomarker for lung adenocarcinoma \[[@CR63]\]. They were able to identify a model of only 24 genes which predicted in silico immunotherapy response with 93% specificity and 85% sensitivity and they suggested that other small custom sequencing gene panels may be designed in a cancer-specific way to assess TMB with further reduced costs. Future perspectives and recommendations {#Sec5} ======================================= TMB is one of the most rapidly developing biomarkers for immunotherapy response, with about 37 ongoing clinical trials currently registered in [ClinicalTrials.gov](http://clinicaltrials.gov) that use TMB as stratification biomarker \[[@CR64]\]. Several gene panels were recently optimized to estimate TMB at reduced sequencing costs, and emerging evidence supports the feasibility of TMB quantification from liquid biopsies. However, harmonization in TMB quantification and reporting remains the main challenge for the near future: standard procedures are required to allow interoperability between different gene panels, compare results across studies and define a universal cutoff to confidently identify patients most likely to benefit from immunotherapy. Even an accurate TMB value is an imperfect predictor of immunotherapy response and further studies are needed to enhance its value as clinically useful immunotherapy biomarker. TMB is used as an approximation of neoantigen burden, upon the assumption that the higher the mutational burden, the higher the probability for immunogenic peptides to be generated, which leads to stronger immune response upon inhibition of immune checkpoints. Interestingly, neoantigen clonality, in addition to the overall amount of neoantigens, influences immunotherapy response in NSCLC patients \[[@CR65]\]. In particular, tumors enriched in clonal neoantigens (e.g. present in all tumor cells) are more sensitive to immune checkpoint inhibitors than tumors enriched in subclonal neoantigens (e.g. present only in a subset of tumor cells), in advanced NSCLC and melanoma patients \[[@CR65]\]. Indeed, clonality of produced neoantigens seems to be associated with a more effective immune surveillance. On the other hand, enrichment in subclonal neoantigens may activate T cells against only a subset of tumor cells, leading to less effective tumor control. Based on these observations, it would be interesting to investigate if information on mutation clonality (e.g. variant allele frequency) improves the predictive power of TMB. Evaluation of mutation clonality from gene panels is not trivial though: the reduced genomic space targeted by gene panels may not be representative of the overall clonal architecture and the mutations sampled herein may not be those generating neoantigens. Interestingly, McGranahan et al. observed a relationship between subclonal mutations and mutational signatures associated with alkylating agents and, in NSCLC, between clonal mutations and mutational signatures associated with smoking \[[@CR65]\]. Mutational signatures associated with smoking were also found to be significantly associated with high tumor mutational burden and with response to immunotherapy \[[@CR9]\]. Therefore, although the extraction of mutational signatures from gene panels may be hampered by the small number of sampled mutations, these observations suggest that they may prove helpful to infer neoantigen clonality and enhance TMB predictive value. Integration of TMB with other potential immunotherapy biomarkers represents another promising way to refine prediction of immunotherapy responders. For example, TMB, defects in DNA mismatch-repair pathway and the MSI status all are measures of genomic instability that can provide indirect assessment of tumor antigenicity, whereas PD-L1 expression, immune cell infiltration and inflammatory signatures represent biomarkers of the T cell-inflamed tumor microenvironment. Therefore, their integration can refine prediction of immunotherapy outcome by combining information on tumor complexity and on the immune response. Indeed, emerging evidence suggests that, at least in NSCLC, TMB and PD-L1 expression are independent predictors and TMB may complement or even outperform PD-L1 expression \[[@CR10], [@CR26], [@CR50], [@CR66]\]. Moreover, it was observed that most tumors with high MSI also present elevated TMB, whereas the opposite does not hold true. The combination of TMB with MSI and PD-L1 expression in gastrointestinal tumors significantly improved the identification of immunotherapy responders \[[@CR67]\]. In another study, it was observed that TMB is an independent predictor and only weakly correlates with T cell-inflamed gene expression profiles (GEP) or PD-L1 expression. Thus, TMB and T cell-inflamed GEP were jointly used to identify immunotherapy responders: patients with both high TMB and high T cell-inflamed GEP were those with the highest objective response rates on tumors from four KEYNOTE clinical trials across 22 cancer types. Similarly, in melanoma patients, a response score based on the combination of TMB, infiltration of CD8+ T cells and gene expression profiles for PD-L1, CD8 and a set of 394 immune genes demonstrated higher sensitivity and similar specificity than each biomarker alone \[[@CR68]\]. To date, the FoundationOne and Guardant360 gene panels allow to measure both TMB and MSI but no other potential immunotherapy biomarker. Moreover, they do not provide the user any combinatorial model to integrate them. Although further validation in prospective clinical studies is required for all these potential biomarkers, several observations suggest that simultaneous profiling of both TMB and other immunotherapy biomarkers currently under investigation may represent the next step forward in the design of new gene panels for clinical use. The Friends and QuIP initiatives for TMB harmonization recommended to include as much relevant genetic and molecular information as possible in these panels, to avoid the need to re-biopsy the patient for further information. In line with this recommendation, we propose to also include in gene panels for TMB quantification other potential immunotherapy biomarkers but also negative predictors of immunotherapy response \[[@CR69], [@CR70]\] and variants predisposing to adverse reaction to immunotherapy \[[@CR71], [@CR72]\]. These and other recommendations which emerge from the studies reviewed here, including the one from the TMB Harmonization Working Group, are summed up in Additional file [6](#MOESM6){ref-type="media"}: Table S6. Additional files ================ {#Sec6} Additional file 1:**Table S1.** Technical specifications of gene panels used or proposed for TMB quantification. For each gene panel, it is reported the type of cancer and sample for which it was designed, the enrichment method, the targeted sequencing size (Genomic space) and the number of targeted genes (\# genes). (XLSX 6 kb) Additional file 2:**Table S2.** In silico analysis of the correlation between panel-based and WES-based TMB. Correlation between panel-based and WES-based TMB, considered the gold standard value, is used to estimate the accuracy of panel-based TMB quantification. Panel-based TMB quantification was simulated in silico using a subset of WES which only contains genes targeted by the panel. (XLSX 11 kb) Additional file 3:**Table S3.** Empirical analysis of the correlation between panel-based and WES-based TMB. Correlation between panel-based and WES-based TMB, considered the gold standard value, is used to estimate the accuracy of panel-based TMB quantification. Correlation analysis is performed on TMB values calculated for samples with matched panel and whole exome sequencing. (XLSX 6 kb) Additional file 4:**Table S4.** In silico analysis of TMB association or predictive value for immunotherapy response. These analyses were performed on panel-based TMB values simulated in silico using a subset of WES which only contains genes targeted by the panel. The table reports measures of TMB association with immunotherapy response (odds ratios, hazard ratios and corresponding *p*-values), differences in TMB distribution between responders and non-responders (Mann-Whitney U and Fisher's *p* values) and measures of TMB predictive value (AUC, specificity, sensitivity). (XLSX 9 kb) Additional file 5:**Table S5.** Empirical analysis of TMB association or predictive value for immunotherapy response. These analyses were performed on panel-based TMB values, directly calculated by panel sequencing. The table reports measures of TMB association with immunotherapy response (odds ratios, hazard ratios and corresponding p-values), differences in TMB distribution between responders and non-responders (Mann-Whitney U, unpaired Student's t and Fisher's test p values) and measures of TMB predictive value (AUC, specificity, sensitivity). We also specify how patients were stratified ("Comparison"), the method used to determine TMB cutoff, the cohort considered for the analysis (if different cohorts were analyzed in the study), the type of immunotherapy, cancer type and number of patients. (XLSX 19 kb) Additional file 6:**Table S6.** Proposed recommendations for consistent TMB quantification and reporting. We report recommendations formulated by the TMB Harmonization Working Group (<https://www.focr.org/tmb>) as well as indications emerging from the studies reviewed in this work. (XLSX 24 kb) Additional file 7:**Figure S1.** Visual representation of the method used for in silico analyses on TMB quantification accuracy and on association or predictive value for immunotherapy response. In silico analyses are based on simulations of panel performance, wherein TMB is calculated using a subset of WES which only contains genes targeted by the panel. Accuracy of TMB quantification from the simulated gene panel is evaluated by comparison with WES-based TMB, used as gold reference, with correlation analysis. The clinical predictive value of TMB estimated from the simulated panel is evaluated based on its association with clinical values measuring immunotherapy response. (PDF 55 kb) Additional file 8:**Figure S2.** In silico analysis of the correlation between panel-based and WES-based TMB. Correlation between panel-based and WES-based TMB, considered the gold standard value, is used to estimate the accuracy of panel-based TMB quantification. Panel-based TMB quantification was simulated in silico using a subset of WES which only contains genes targeted by the panel. The bubble plot shows on the x axis the correlation coefficients and on the y axis the gene panel and the cancer type. Bubble size represents the number of data points used in the analysis and the color corresponds to the reference study. (PDF 259 kb) Additional file 9:**Figure S3.** Empirical analysis of the correlation between panel-based and WES-based TMB. Correlation between panel-based and WES-based TMB, considered the gold standard value, is used to estimate the accuracy of panel-based TMB quantification. Correlation analysis is performed on TMB values calculated for samples with matched panel and whole exome sequencing. The bubble plot shows on the x axis the correlation coefficients and on the y axis the gene panel and the cancer type. Bubble size represents the number of data points used in the analysis and the color corresponds to the reference study. (PDF 155 kb) ACC : Adrenocortical carcinoma AUC : Area under the curve BLCA : Bladder urothelial carcinoma BRCA : Breast invasive carcinoma CESC : Cervical squamous cell carcinoma and endocervical adenocarcinoma cfDNA : Circulating free DNA CHOL : Cholangiosarcoma COADREAD : Colon adenocarcinoma CRC : Colorectal cancer ctDNA : Circulating tumor DNA DLBC : Lymphoid neoplasm diffuse large B-cell lymphoma ESCA : Esophageal carcinoma FDA : Food and Drug Administration GBM : Glioblastoma GEP : Gene expression profile HLA : Human Leukocyte Antigen HNSC : Head and neck squamous cell carcinoma KICH : Kidney chromophobe KIRC : Kidney renal clear cell carcinoma KIRP : Kidney renal papillary cell carcinoma LAML : Acute myeloid leukemia LGG : Brain lower grade glioma LIHC : Liver hepatocellular carcinoma LUAD : Lung adenocarcinoma LUSC : Lung squamous carcinoma Mb : Megabase mCRPC : Metastatic castration-resistant prostate cancer MESO : Mesothelioma MHC : Major histocompatibility complex MMR : Mismatch repair MSI : Microsatellite instability NSCLC : Non-small cell lung cancer ORR : Objective response rates OS : Overall survival OV : Ovarian serous cystadenocarcinoma PAAD : Pancreatic adenocarcinoma PCPG : Pheochromocytoma and paraganglioma PFS : Progression free survival PRAD : Prostate adenocarcinoma ROC : Receiver operating characteristic SARC : Sarcoma SCLC : Small cell lung cancer SKCM : Skin cutaneous melanoma SNV : Single nucleotide variant STAD : Stomach adenocarcinoma TCGA : The cancer genome atlas TCR : T cell receptor TGCT : Testicular germ cell tumors THYM : Thymoma TMB : Tumor mutational burden UCEC : Uterine corpus endometrial carcinoma UCS : Uterine carcinosarcoma UVM : Uveal melanoma WES : Whole exome sequencing **Publisher's Note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. We thank all researchers, clinicians and organizations working in this field for their contributions and we apologize to those whose work we did not report or cite. LF designed, wrote and revised the manuscript. PGP, SG and LM revised the manuscript. All authors read and approved the final manuscript. LF work was supported by the Italian Ministry of Health (Ricerca Corrente, "Alleanza Contro il Cancro" - ACC network). Not applicable. Not applicable. Not applicable. LF, SG, PGP, and LM declare that they have no competing interest.
Today I had some ideas for my game related to cellular automata that involved pattern matching. I googled, and found Matchure. It might be a great pattern matcher, but the syntax and the amount of macro trickery makes me feel uncomfortable. In an attempt to write one that relies only on functions, I made this. Update: This is now a cute project-in-a-gist that can be used as a checkout dependency in Leiningen and Cake.
Treatment of old neglected dislocations of the AC-joint with residual instability and/or secondary osteoarthrosis. Resection arthroplasty of the AC joint was performed in 42 cases of osteoarthrosis and residual instability of traumatic origin including 26 shoulders with horizontal instability of more than half of the width of the clacicula and lesions of the deltotrapezoid fascial complex (Rockwood type II: 7; type III: 9; type IV: 17; type V: 9). 23 cases were treated with a sole Weaver-Dunn procedure. 26 cases with horizontal instability and lesions of the deltotrapezoid fascia (Rockwood IV and V type) were treated in 7 cases with the standard Weaver-Dunn procedure and in 19 cases with a modified Weaver-Dunn procedure in combination with a coracoclavicular (3 × 1) and acromio-clavicular (1 × 1) 1 mm PDS string augmentation and double breasting fascioplasty of the deltotrapezoid complex. Successful results (in Patte-Score) after a minimum follow-up of 2 years (mean: 32 months) were reached in 88,4 % of cases with only Weaver/Dunn procedure with a significant difference of good and excellent results in the horizontally stable group (93.8 %) versus the horizontally unstable group (57.2 %). In the group with horizontal instability and Weaver-Dunn procedure and complex additional stabilization with fascioplasty and PDS augmentation, 89,5 % excellent and good results were found. Cases with horizontal instability (type Rockwood IV and V) seem to be overrepresented among patients with failed conservative treatment. Resection arthroplasty with ligament transposition after Weaver/Dunn gives excellent results in posttraumatic osteoarthrosis with mainly vertical and moderate horizontal instability. In cases with advanced horizontal instability after Rockwood IV and V injuries, almost equal results can be reached by an additional coracoclavicular and acriomioclavicular PDS augmentation with deltotapezoid fascioplasty.
//===-- sanitizer/asan_interface.h ------------------------------*- C++ -*-===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// // // This file is a part of HWAddressSanitizer. // // Public interface header. //===----------------------------------------------------------------------===// #ifndef SANITIZER_HWASAN_INTERFACE_H #define SANITIZER_HWASAN_INTERFACE_H #include <sanitizer/common_interface_defs.h> #ifdef __cplusplus extern "C" { #endif // Libc hook for program startup in statically linked executables. // Initializes enough of the runtime to run instrumented code. This function // should only be called in statically linked executables because it modifies // the GOT, which won't work in regular binaries because RELRO will already // have been applied by the time the function is called. This also means that // the function should be called before libc applies RELRO. // Does not call libc unless there is an error. // Can be called multiple times. void __hwasan_init_static(void); // This function may be optionally provided by user and should return // a string containing HWASan runtime options. See asan_flags.h for details. const char* __hwasan_default_options(void); void __hwasan_enable_allocator_tagging(void); void __hwasan_disable_allocator_tagging(void); // Mark region of memory with the given tag. Both address and size need to be // 16-byte aligned. void __hwasan_tag_memory(const volatile void *p, unsigned char tag, size_t size); /// Set pointer tag. Previous tag is lost. void *__hwasan_tag_pointer(const volatile void *p, unsigned char tag); // Set memory tag from the current SP address to the given address to zero. // This is meant to annotate longjmp and other non-local jumps. // This function needs to know the (almost) exact destination frame address; // clearing shadow for the entire thread stack like __asan_handle_no_return // does would cause false reports. void __hwasan_handle_longjmp(const void *sp_dst); // Set memory tag for the part of the current thread stack below sp_dst to // zero. Call this in vfork() before returning in the parent process. void __hwasan_handle_vfork(const void *sp_dst); // Libc hook for thread creation. Should be called in the child thread before // any instrumented code. void __hwasan_thread_enter(); // Libc hook for thread destruction. No instrumented code should run after // this call. void __hwasan_thread_exit(); // Print shadow and origin for the memory range to stderr in a human-readable // format. void __hwasan_print_shadow(const volatile void *x, size_t size); // Print one-line report about the memory usage of the current process. void __hwasan_print_memory_usage(); /* Returns the offset of the first byte in the memory range that can not be * accessed through the pointer in x, or -1 if the whole range is good. */ intptr_t __hwasan_test_shadow(const volatile void *x, size_t size); int __sanitizer_posix_memalign(void **memptr, size_t alignment, size_t size); void * __sanitizer_memalign(size_t alignment, size_t size); void * __sanitizer_aligned_alloc(size_t alignment, size_t size); void * __sanitizer___libc_memalign(size_t alignment, size_t size); void * __sanitizer_valloc(size_t size); void * __sanitizer_pvalloc(size_t size); void __sanitizer_free(void *ptr); void __sanitizer_cfree(void *ptr); size_t __sanitizer_malloc_usable_size(const void *ptr); struct mallinfo __sanitizer_mallinfo(); int __sanitizer_mallopt(int cmd, int value); void __sanitizer_malloc_stats(void); void * __sanitizer_calloc(size_t nmemb, size_t size); void * __sanitizer_realloc(void *ptr, size_t size); void * __sanitizer_reallocarray(void *ptr, size_t nmemb, size_t size); void * __sanitizer_malloc(size_t size); #ifdef __cplusplus } // extern "C" #endif #endif // SANITIZER_HWASAN_INTERFACE_H
Q: What is the proportion of edible meat in whole live mussels? The price of one kilo of mussels (blue mussels) here in my town is around 60–70 SEK (9–11 USD). I think that makes a large enough portion for two people, but when checking if all of them are alive and when cleaning them, the price runs higher. I'm interested in what the price per kilo of the edible part (the muscle) of the mussels are. In one mussel, how much by weight is shell and how much is muscle? A: The Tourism PEI site says that one pound of mussels is 20-25 mussels, about one cup of meat, and that you can serve one person that for a main meal or two people for an appetizer. The Food and Agriculure Organization of the United Nations says: One bushel of whole mussels should yield from 6 to 9 pounds of cooked meats. Percentage yield by weight may range from about 8 per cent to as high as 20 per cent of the whole mussels. Finally, this is 500g of mussels (my lunch in Brussels on a hot day - my companion has the same): And this is how I can remember it was 500g: A: It depends on where you live, and what type of mussel you are eating The blue mussel popular in Europe and North Pacific typically has an uncooked meat ratio of 25% to total weight, and 20% when cooked The New Zealand Greenshell mussel (available flash frozen in Europe) typically has an uncooked meat ratio 55%, and 50% when cooked Around US$2 per Kg. These will vary by season and supplier of course A: I can't tell you about price since I was given a kilogram of blue Scottish mussels but I can tell you about the meat % of total. I had guessed it would be about 20% but I was wrong. I weighed the shells next day using the local supermarket's digital scales & the result was only 428g so the meat was a massive 572g ~ 57% meat. I recommend them.
Q: Elasticsearch plugin I understand what is Elasticsearch, but have no clue on how to write a plugin for Elasticsearch. Can any one tell me the guidelines for writing plugins to Elasticsearch. A: Found.no (an Elasticsearch hosting service) has a very good writeup on the Elasticsearch plugin development process. It's as detailed as I've seen out there and is fairly recent (Sept 2013) so should be reasonably up to date. If I was going to build a plugin from scratch that's where I would start: https://www.found.no/foundation/writing-a-plugin/ The other is to dig around in other plugins on Github: https://github.com/mobz/elasticsearch-head https://github.com/elasticsearch/elasticsearch-river-twitter Lists of other plugins: http://www.elasticsearch.org/guide/en/elasticsearch/reference/current/modules-plugins.html Between the tutorial and looking at all the source code out there you should have a solid foundation.
The present invention relates to cosmetic compositions containing a thickened or structured liquid and in particular to such compositions containing an antiperspirant and/or deodorant active. Topically applied antiperspirant compositions are in widespread use throughout much of the world, in order to enable their users to avoid or minimise visible wet patches on their skin, especially in axillary regions. Antiperspirant formulations have been applied using a range of different applicators, including aerosols, roll-ons, pump sprays, sticks and mushroom applicators, in accordance with the individual preferences of consumers. In some parts of the world, sticks are especially popular. The term stick traditionally indicates a bar of solid material which was usually housed within a dispensing container and which retains its integrity whilst being applied, ie a firm stick. When a portion of a firm stick is drawn across the skin surface, a film of the stick composition is transferred onto the skin surface. Although the stick has the appearance of a solid article, the material forming the stick usually comprises a structured liquid phase such that a film of the material is readily transferred onto another surface upon contact under pressure. More recently, the term has been applied to soft solids, which have an apparent solid form during storage, but which flow under mild pressure or shear, so that in use they can be extruded through an aperture or apertures onto a dispensing surface. Soft solids retain their shape for at least 30 seconds after extrusion under such non-shear/low stress conditions from a container, but if subjected to high shear or stress, their structure is destroyed and no more than a minor fraction of the structure can be reformed within a period of about 24 hours when the shear/stress is removed. There are typically three classes of antiperspirant sticks, namely suspension sticks, emulsion sticks and solution sticks. Suspension sticks contain a particulate antiperspirant active material suspended in a structured carrier. Emulsion sticks normally comprise an emulsion of an oil phase and a hydrophilic phase containing the antiperspirant active in solution, the continuous phase being structured. In some emulsion sticks, the continuous phase is an oil phase. In solution sticks, the antiperspirant is typically dissolved in the liquid carrier phase which is structured. The liquid phase in a solution stick can comprise water and/or a water-miscible organic solvent. The three categories can be applied to sticks of both firm and soft solids compositions. Conventionally, many sticks have been structured using naturally occurring or synthetic waxes, of which typical examples include stearyl alcohol, and hydrocarbon waxes or silicone waxes. waxes are widely available, and by suitable selection of the waxes themselves and their concentrations in the formulation can effectively obtain either a soft solid or a firm solid. Thus, for example, wax-structured sticks are described in an article in Cosmetics and Toiletries, 1990, vol. 105, p75-78. Wax-thickened creams are described in U.S. Pat. No. 5,102,656 (Kasat.) However, and although the disadvantage is not mentioned in either of the above-identified references, it has been observed that wax structured compositions tend to leave visible white deposits on application to human skin, and the deposits can also be transferred onto clothing by physical contact with the skin. A significant, and possibly growing, proportion of consumers of antiperspirants have indicated displeasure at visible deposits. Accordingly, the antiperspirant industry, including the instant inventors, is devoting considerable time and resources to finding means to ameliorate or overcome the customer perception of white deposits. Amongst the class of naturally occurring waxes which have been used or contemplated for use in thickening or structuring an oily liquid phase of an antiperspirant or deodorant composition, animal-derived waxes include beeswax, and vegetable-derived waxes include candelilla wax and carnauba wax. Each of these waxes comprises in general terms a mixture of a) esters, often including an alkyl moiety of at least 8 carbons length derivable from a fatty acid or fatty alcohol, and/or an aromatic hydrocarbon moiety, b) non-esterified fatty acids, c) non-esterified fatty alcohols, d) non-gaseous hydrocarbons and e) resins. The proportions of the wax constituents varies depending on the particular wax selected, and to a lesser extent on their geographical location where they are produced and the time of year. Various disadvantages have been attributed to the incorporation of naturally occurring waxes, including in particular beeswaxes, such as the disadvantage of variation in properties of the waxes arising from their natural variation in constitution and also the disadvantage arising from the presence of the non-esterified acids and/or alcohols in the wax mixtures. Accordingly, in a number of disclosures, some waxes have been subjected to chemical processes to increase their esters content, prior to their incorporation in a cosmetic formulation. For example, in U.S. Pat. No. 5,176,902, a coloured cosmetic stick is obtained by incorporating a wax which had been esterified with a C1-60 mono or polyhydric alcohol to convert all naturally present C12-60 fatty acids into their respective esters. In J Kokai 58-092605 there is described the production of a modified beeswax in which free acids are esterified. The product was stated to have excellent pigment dispersibility, e.g. in a massage cream. In EPA-319062 and U.S. Pat. No. 4,948,584, Koster Keunen describe a process for modifying beeswax by removing free acids. The resultant product has self-emulsifying characteristics. None of those publications mention the visible white residue of structured or thickened antiperspirant or deodorant compositions and in consequence give no teaching on how to ameliorate or solve the problem. However, the principle reason for incorporating a wax in a formulation is often to structure or thicken a carrier fluid forming a firm or soft solid. It is advantageous to identify waxes which have a superior ability to structure or thicken a carrier fluid. For example, only a smaller proportion of the wax is needed to achieve a desired extent of thickening or structuring, thereby increasing the options on the producer of cosmetic compositions to vary the remaining constituents. Moreover, the inventors recognised that waxes can be now implicated in at least contributing to the visibility of deposits on skin, and so they concluded that visible deposits may be observable to a lesser extent if less wax were needed. Cosmetic compositions thickened or structured using polysiliconyl modified beeswaxes have been described in WO 98/09609 and using hexanediol-behenyl beeswaxes in WO 98/09712. However, in the course of their present investigations, the present inventors have found that the capability of derivatives of beeswax to thicken or structure an antiperspirant or deodorant carrier fluid varies, depending on the nature of the modification. Thus, for example, polysiliconyl-modified beeswaxes and fatty acid esterification of free fatty acids in beeswaxes (as in the production of hexanediol-behenyl beeswaxes) have both been observed to produce materials having a relatively poor structuring capability. Consequently, a pre-treatment of beeswaxes does not necessarily result in the modified beeswax having an effective structuring capability. One class of stick which has been contemplated for antiperspirant or deodorant application comprises an emulsion stick. Such sticks comprise a continuous phase in which droplets of a second liquid phase are dispersed, normally referred to as a disperse phase. The continuous phase is one of hydrophobic or aqueous, and the disperse phase constitutes the other. The antiperspirant or deodorant active is conveniently incorporated within the aqueous phase. The hydrophobic phase can be structured by incorporation of wax structurants, these being materials which typically are solid at ambient temperatures, but which melt or dissolve or disperse into the oils constituting the hydrophobic phase at elevated temperatures, for example selected between 60 and 120xc2x0 C., depending on the choice of oil and wax. When the mixture of wax structurant and oil cools to below its setting temperature, the oil phase solidifies. When formulating emulsion sticks, there are a number of factors to be taken into account. Some of the factors are antagonistic. One of the first and very important factor relates to the respective proportions of the two phases. The antiperspirant salts have finite solubility in the aqueous phase, so that antiperspirant efficacy potentially increases as the proportion of the aqueous phase increases. However, any increase in the proportion of aqueous phase in the formulation results in a corresponding decrease in the space available to the hydrophobic phase. In conjunction with the choice of its constituent oil or oils, this affects the ability of the hydrophobic phase to provide a strong supporting continuous phase, and hence the strength and integrity of the stick. Moreover, it affects the ability of that phase to contain beneficial hydrophobic constituents. Waxes have been commonly used or proposed for use in structuring anhydrous formulations, in which a particulate antiperspirant is suspended in an oil phase, but much less attention has been given to their use to structure emulsion sticks. The market for underarm products is constantly evolving as consumers"" tastes and lifestyles change. One attribute of underarm formulations to which consumers have paid considerable attention in recent years is the extent to which the formulation is visible on the skin, either shortly after application or subsequently throughout the following day. This is commonly referred to as visible deposits. Waxes and antiperspirant salts can give rise to visible deposits on human skin, so that in line with current consumer preferences, it would be desirable to be able to reduce or ideally eliminate them. A related attribute relates to the visibility of the formulation on any clothing, either occurring in the course of its application to the skin or by subsequent transfer by contact of the skin with the clothing. Likewise, it would be desirable to reduce or ideally eliminate visible deposits on clothing. Some oils are effective carriers for distributing antiperspirant or deodorant actives on the skin, but have little effect on visible deposits. Various other oils can ameliorate the appearance of visible deposits, but the space available for such oils in emulsions is constrained by the proportion occupied by the aqueous phase. The effect of the oils on the ease with which a firm emulsion stick can be formulated has been mentioned herein before. A further factor relates to the variation in sensory attribute of emulsion sticks made using different oils. Thus, for example, the formulation have a high drag on passage across the skin or they can show a filmy deposit on the skin. They can appear to be sticky when in the dispensing container or on application to the skin, or they feel greasy. The prior art contains various publications disclosing sticks containing an aqueous component. Thus, for example U.S. Pat. No. 4,265,878 exemplifies a formulation containing substantially no non-volatile oil. The formulation exhibits high visible deposits. U.S. Pat. No. 5,162,378 discloses emulsions containing an aqueous phase, but without a non-volatile oil. Like ""878, it provides no teaching on the problems associated with formulations containing non-volatile oils and how to solve them. U.S. Pat. No. 4,704,271 discloses formulations containing a high proportion of disperse aqueous phase, a continuous phase containing a low proportion of non-volatile oil and a high ratio of volatile to non-volatile oils, structured with stearyl alcohol. This formulation has an intrinsically high level of visible deposits from its active and structurant which is reduced to only a limited extent. WO 98/17238 exemplifies emulsion formulations containing non-volatile oils that are free from volatile silicones. Consequently, it is silent as to the constraints relating to formulations which desire to contain both such constituents and the benefits from containing both of them in selected proportions. EP-A-0291334 circumvents the use of waxes by employing a liquid crystal phase to structure the product. Accordingly, it provides no teaching concerning the provision of wax-structured emulsions containing both a volatile silicone and a non-volatile oil. EP-A-0281288 exemplifies an antiperspirant formulation in which an oil phase containing only a small proportion of a non-volatile oil is structured with stearyl alcohol. Such a formulation exhibits a high drag and indeed also has a relatively high visible deposit. Accordingly, it does not provide teaching on how to address such issues. EP-A-0295071 discloses emulsion sticks employing a disperse phase based on a polyhydric alcohol, which can also contain a minor proportion of water. Propylene glycol is exemplified in a 4:1 weight ratio to water in the disperse phase. Sticks which are based on propylene glycol as the principal lipophobic constituent typically exhibit stickiness. It is an object of the present invention to provide a thickened or structured antiperspirant composition which ameliorates or overcomes simultaneously the disadvantage of visible deposits whilst employing a wax having superior structuring capability. It is a further object of certain preferred embodiments to provide an emulsion stick formulated employing a wax having superior structuring capability and exhibiting a desirable combination of sensory attributes, stick integrity and reduction of visible deposits. According to a first aspect of the present invention, there is provided an antiperspirant composition comprising an antiperspirant active, a liquid carrier and a structurant or thickener for the carrier characterised in that the structurant or thickener comprises an organic wax having a melting point of from 40 to 90xc2x0 C. of which at least 60% of the weight of the wax is provided by at least one aliphatic ester satisfying the formula: CH3xe2x80x94(CH2)nxe2x80x94Oxe2x80x94COxe2x80x94(CH2)mxe2x80x94CH3 in which n is from 9 to 39 and m is from 0 to 35. By the employment of a wax meeting the criteria of selection of the chemical constitution of the specified constituent and its employment as the greater part of the wax, the goal can be attained of employing a wax which ameliorates the disadvantage of visible deposits whilst offering effective structuring capability. In compositions according to the present invention, an essential constituent of the thickening/structuring wax is an ester in accordance with the general formula: CH3xe2x80x94(CH2)nxe2x80x94Oxe2x80x94COxe2x80x94(CH2)mxe2x80x94CH3 in which n is from 9 to 39 and m is from 0 to 35. The selected ester, or, more normally, mixtures of esters satisfying the general formula, can comprise, if desired, up to 100% of the wax, with the remainder of the wax being satisfied by beeswax or one or more constituents thereof or by a secondary waxy structurant or thickener. In many embodiments, the proportion of the selected ester is at least 70% by weight, preferably at least 80% by weight and most desirably at least 90% by weight of the wax. It is desirable that the wax employed herein comprises at most no more than a small proportion of free carboxylic acid and hydrocarbons. Preferably, the wax contains no more than about 4% and particularly no more than about 2% by weight non-esterified carboxylic acid. It is highly desirable that the content of hydrocarbons in the wax is less, and indeed much less than in a conventional beeswax, particularly is less than 5% by weight and especially from 0 to 2% by weight of the wax. Within the general formula for the ester, a range of preferred esters comprises those in which n is selected within the range of 14 to 24 and especially 16-20 together with m being selected in the range of 14 to 24 and especially 16 to 20. In second range of preferred esters within the general formula, n is selected in the range of 18 to 38 and m is either 0 or 1. It will be understood that mixtures of esters within each preferred range or mixtures of one preferred range of esters with the other can be employed. Convenient mixtures include a mixture of a wax comprising esters of n=14 to 20 and m=14 to 20 with a wax comprising esters of n=16 to 20 and m=14 to 20 or preferably 16 to 20. Esters in accordance with the formula given herein can be obtained by a conventional esterification reaction carried under conventional reaction conditions described in the literature for reaction between an alcohol having the chain length appropriate to provide xe2x80x9cnxe2x80x9d in the ranges specified above and a carboxylic acid having a chain length appropriate to yield xe2x80x9cmxe2x80x9d in the ranges specified above. The wax is employed herein normally within the range of from 2 to 25% by weight, based on the composition. Where a firm solid composition is desired, the wax proportion is normally at least 5% by weight, and is often selected in the range of from 6 to 15% by weight of the composition. Where a soft solid composition is desired, the wax proportion is normally below 5%, and particularly from 2 to 4% by weight. It will be understood that when the wax is employed at or near the boundary, i.e. in the region of 5%, the resultant material may be a soft solid or a firm solid having relatively low hardness in a standard sphere indentation test. An essential constituent of antiperspirant compositions is an antiperspirant active. Antiperspirant actives, are preferably incorporated in an amount of from 0.5-60%, particularly from 5 to 30 or 40% and especially from 10 to 30 or 35%. Antiperspirant actives for use herein are often selected from astringent active salts, including in particular aluminium salts, zirconium salts and mixed aluminium-zirconium salts, including for each both inorganic salts and organic salts and complexes. Preferred astringent salts include aluminium, zirconium and aluminium-zirconium halides and halohydrate salts, such as chlorohydrates. Preferred aluminium salts include aluminium halohydrates having the general formula Al2(OH)xQy.wH2O in which Q represents chlorine, bromine or iodine, x is from 2 to 5 and x+y=6, x and y being either integers or non-integers and w represents a variable amount of hydration, which may be zero. Some especially preferred halohydrate salts comprise activated aluminium chlorohydrates such as those described in EP-A-6739 (Unilever NV et al), the contents of which specification is incorporated herein by reference. Activated salts retain their enhanced activity and are advantageously employed in substantially anhydrous formulations, i.e. formulations which do not contain a distinct aqueous phase. Some activated salts can also retain their enhanced activity in hydrous formulations too. A range of zirconium salts which can be employed desirably in antiperspirant compositions herein is represented by the following empirical general formula: ZrO(OH)2nxe2x88x92nzBz.wH2O in which z is an integer or non-integer in the range of from 0.9 to 2.0, n is the valency of B, 2xe2x88x92nZ is at least 0, B is selected from the group consisting of halides, including chloride, sulphamate, sulphate and mixtures thereof and w represents a variable amount of hydration, which may be zero. In preferred zirconium salts B represents chloride and z lies in the range of from 1.5 to 1.87. In practice, such zirconium salts are usually not employed by themselves, but as a component of a combined aluminium and zirconium-based antiperspirant, the aluminium component normally being selected in accordance with the above-mentioned formula for halohydrates. Especially desirable salts comprise mixed aluminium-zirconium chlorohydrates, optionally activated. It will be recognised that the above-identified formulae for aluminium and zirconium salts are empirical and encompass compounds having co-ordinated and/or bound water in various quantities as well as polymeric species and mixtures and complexes. In particular, zirconium hydroxy salts often represent a range of salts having various amounts of the hydroxy group. Antiperspirant complexes based on the above-mentioned astringent aluminium, zirconium and aluminium/zirconium salts can desirably be employed in the present invention. Preferably, aluminium halohydrate and/or zirconium chlorohydrate materials are complexed. The complex often employs a carboxylic acid or carboxylate group, and advantageously an aminoacid. Examples of suitable aminoacids include dl-tryptophane, dl-xcex2-phenylaniline, dl-valine, dl-methionine and xcex2-aniline, and preferably glycine which satisfies the formula CH3(NH2)CO2H. It is highly desirable to employ complexes of a combination of aluminium halohydrates and zirconium chlorohydrates together with aminoacids such as glycine, such as those disclosed in U.S. Pat. No. 3,792,068 (Luedders et al). Certain of those Al/Zr complexes are commonly called ZAG in the literature. ZAG actives generally contain aluminium, zirconium and chloride with an Al/Zr ratio in the range of 2 to 10, especially 2 to 6, a ratio of (Al-Zr)/Cl in the range of 2.1 to 0.9 and a variable amount of an amino acid, particularly glycine. Actives of this preferred type are available from Westwood, Summit and Reheis. In some formulations, it is particularly preferably to employ activated ZAG complexes which can be produced by the process disclosed in U.S. Pat. No. 5,486,347 (Callaghan et al). Other actives which can be utilised comprise aluminium lactates, borate cross-linked aluminium salts, and astringent titanium salts, for example those described in GB 2299506A. Yet other actives includes chlorlinergenics, antihistamines and antiandrenerics. The proportion of solid antiperspirant salt in the composition normally includes the weight of any water of hydration and any complexing agent that may also be present. However, when the antiperspirant salt is dissolved in aqueous solution, its weight excludes any water present. In some embodiments of the present invention, the antiperspirant salts is employed herein in particulate form, and particularly in compositions which do not comprise an aqueous or hydrophilic phase. Such compositions are conveniently referred to as anhydrous or substantially anhydrous. The particle size of antiperspirant salts in such compositions often falls within the range of 1 to 200 xcexcm with a mean particle sizes often from 3 to 20 xcexcm, such as when conventional barrels are filled using conventional cast processes. Both larger and smaller mean particle sizes can also be contemplated such as from 20 to 50 xcexcm or 0.1 to 3 xcexcm. In other embodiments, the antiperspirant active can be employed in solution form, for example where the composition comprises a polar phase, normally comprising water and/or a water-miscible solvent. In such embodiments, the concentration of antiperspirant active in solution (in the disperse polar phase) is often in the range of from 3 to 60%, based on solely the polar phase, particularly from 10% or 20% up to 55% or 60% of that phase. The third essential constituent of the composition is a liquid carrier, often in a proportion of from 30 to 95% of the composition, and particularly from 40 to 90%. The carrier that is incorporated in compositions herein comprises one or more materials that is liquid at which the composition is used and can be gelled or otherwise structured by the structurant to provide a firm or extrudable solid at that use temperature, which conventionally is residential ambient, which is usually below 40xc2x0 C. and in many instances below 30xc2x0 C. and often at least 15xc2x0 C. The carrier can be hydrophobic or a mixture of both hydrophobic and hydrophilic, the latter normally being in the form of an emulsion. It is particularly desirable that the carrier herein contains sufficient hydrophobic material to produce a continuous phase in which a discontinuous hydrophilic phase or particulate phase can be dispersed. The twin gellant system of the present invention is suited especially to gelling a hydrophobic medium and can also structure a dispersed oil phase, should that be present. The hydrophobic carrier liquid may have some volatility or contain volatile constituents but generally its vapour pressure will be less than 4 kPa at 25xc2x0 C., so that it can be described as an oil or mixture of oils. More specifically, it is desirable that at least 80% by weight of the hydrophobic carrier liquid should consist of materials having a vapour pressure not above 4 kPa at 25xc2x0 C. One class of carriers that is particularly desirable herein is hydrophobic and comprises liquid silicones, in order to promote good sensory properties at the time of use of the formulation. Preferably at least a major fraction of the silicone carrier is constituted by at least one volatile polyorganosiloxane, i.e. liquid materials having a measurable vapour pressure at ambient conditions (about 20 to 25xc2x0 C.). Typically the vapour pressure of volatile silicones lies in the range of from 1 or 10 Pa to 2 kPa at 25xc2x0 C. Volatile polyorganosiloxanes can be linear or cyclic or mixtures thereof. Preferred cyclic siloxanes include polydimethylsiloxanes and particularly those containing from 3 to 9 silicon atoms and preferably not more than 7 silicon atoms and most preferably from 4 to 6 silicon atoms, otherwise often referred to as cyclomethicones. Preferred linear siloxanes include polydimethylsiloxanes containing from 3 to 9 silicon atoms. The volatile siloxanes normally by themselves exhibit viscosities of below 1xc3x9710xe2x88x925 m2/sec (10 centistokes), and particularly above 1xc3x9710xe2x88x927 m2/sec (0.1 centistokes), the linear siloxanes normally exhibiting a viscosity of below 5xc3x9710xe2x88x926 m2/sec (5 centistokes). The volatile silicones can also comprise branched linear or cyclic siloxanes such as the aforementioned linear or cyclic siloxanes substituted by one or more pendant xe2x80x94Oxe2x80x94Si(CH3)3 groups. Examples of commercially available silicone oils include oils having grade designations 344, 345 244, 245 and 246, (from Dow Corning Corporation) Silicone 7207 and Silicone 7158 (from Union Carbide Corporation) and SF1202 (from General Electric [US]). Volatile silicones are often present in the composition in a proportion of up to 80% particularly from 10 to 70% and in a number of instances from 20 to 60%. The hydrophobic carrier employed in compositions herein can alternatively or additionally comprise non-volatile silicone oils, which include polyalkyl siloxanes, polyalkylaryl siloxanes and polyethersiloxane copolymers. These can suitably be selected from dimethicone and dimethicone copolyols. Commercially available non-volatile silicone oils include Dow Corning 556 and Dow Corning 200 series having a viscosity of at least 50 centistokes. Non-volatile silicones are often present in not more than about 30% by weight of the composition, and preferably from 1 to 15% by weight. In many instances, when a non-volatile silicone oil is present, its weight ratio to volatile silicone oil is chosen in the range of from 1:3 to 1:40. Silicon-free hydrophobic organic carriers can be incorporated in the invention compositions in addition to or instead of liquid silicones, i.e. from 0 to 100% of the hydrophobic carrier liquids. Such silicon-free hydrophobic organic carrier materials can include liquid aliphatic hydrocarbons such as mineral oils or hydrogenated polyisobutene, often selected to exhibit a low viscosity. Further examples of liquid hydrocarbons comprise polydecene and isoparaffins containing at least 10 carbon atoms and often in the region of up to 30 carbons. Other suitable hydrophobic carriers comprise liquid aliphatic or aromatic esters, as a fraction of the water-immiscible carrier, desirably not more than 20% and in many instances less than 10% of the weight of the water-immiscible carrier. Suitable aliphatic esters contains at least one long chain alkyl group, such as esters derivable from C1-C20 alkanols esterified with a C8 to C22 alkanoic acid or C6 to C10 alkanedioic acid. The alkanol and acid moieties or mixtures thereof are preferably selected such that they have a melting point of below 20xc2x0 C. Suitable esters include isopropyl myristate, lauryl myristate, isopropyl palmitate, diisopropyl sebacate and diisopropyl adipate. Suitable liquid aromatic esters, preferably have a melting point of below 20xc2x0 C., including fatty alkyl benzoates. Examples of such esters include suitable C8 to C18 alkyl benzoates or mixtures thereof. Further instances of suitable hydrophobic carriers comprise liquid aliphatic ethers derivable from at least one fatty alcohol, such as myristyl ether derivatives e.g. PPG-3 myristyl ether or lower alkyl ethers of polyglycols such as PPG-14 butyl ether. The proportion of ether in a formulation according to the present invention is often selected in the range of from 0 to 40% w/w and in some formulations particularly from 1 to 30% w/w. Yet other suitable hydrophobic carriers comprise liquid aliphatic alcohols containing at least 10 carbon atoms which are liquid at 20xc2x0 C. Examples of such alcohols include branched chain alcohols such as ethylhexyl alcohol, octyldodecanol and isostearyl alcohol. The proportion of the alcohol in a formulation according to the present invention is often selected in the range of from 0 to 40% w/w and particularly from 1 to 30% w/w. The total proportion of non-silicone hydrophobic carrier(s) is often chosen in the range of from 0 to 80% and particularly from 5 to 70% by weight of the carrier. Mixtures of hydrophobic non-silicone organic carriers can be employed. If oxygen-containing silicon-free hydrophobic organic liquids are employed, they desirably constitute not more than 70% by weight of the hydrophobic carrier. Lower proportions of the hydrophobic phase, ranging up to for example 20, 30 or 35% in total by weight are more likely. Mixtures of silicone and non-silicone carriers can suitably be employed herein, in any weight ratio, and in a number of tested embodiments the ratio lies in the range of from 20:1 to 1:20. The carrier or mixture of carrier employed in the present invention can be and in many effective compositions is anhydrous, i.e. contain no free water, by employing solely one or more hydrophobic carriers. Alternatively, if desired, the composition can comprise a hydrophilic carrier, such as in particular water and/or a water-miscible organic solvent such as an alcoholic water-miscible solvent, in addition to a hydrophobic carrier, such as those indicated hereinbefore. Compositions containing both a hydrophobic and a hydrophylic carrier normally have one of them as a disperse phase. Formulations containing a disperse phase in practice would often further comprise an emulsifying surfactant, such as an anionic, cationic, zwitterionic and/or nonionic surfactant. In emulsions herein, the disperse phase, including any material dissolved therein, normally constitutes from 5 to 80% of the weight of the composition and in many embodiments up to 65% by weight and in such or other embodiments preferably at least 25% by weight by weight. The continuous phase containing structurant therefor provides the weight balance of the composition, such as from 20 to 95% by weight. The emulsions herein normally comprises a water in oil emulsion, i.e. the disperse phase is the hydrophylic phase . Where an emulsion is employed, it can be convenient to prepare an emulsion as a separate step before it is mixed with the remaining constituents of the composition. The emulsion in many instances incorporates one or more emulsifiers, which often are non-ionic. The proportion of emulsifier or emulsifier system, i.e. combination of emulsifiers, in the emulsion is often selected in the range of from 0.1 to 10% w/w, and in many instances from 0.25 to 5% w/w. Most preferred is an amount of from 0.1 or 0.25% up to 3% w/w. It is desirable to employ an emulsifier or emulsifier system providing an overall HLB value in a range of from 2 to 10 and preferably from 3 to 8. It may be convenient to employ an emulsifier system employing in combination an emulsifier having an HLB value above a desired overall value and one having an HLB value below the desired value. By employing the two emulsifiers together in appropriate ratios, it is readily feasible to attain a weighted average HLB value that promotes the formation of an emulsion. Many suitable emulsifiers are nonionic ester or ether emulsifiers comprising a polyoxyalkylene moiety, especially a polyoxyethylene moiety, often containing from about 2 to 80, and especially 5 to 60 oxyethylene units, and/or contain a polyhydroxy compound such as glycerol or sorbitol or other alditols as hydrophilic moiety. The hydrophilic moiety can contain polyoxypropylene. The emulsifiers additionally contain a hydrophobic alkyl, alkenyl or aralkyl moiety, normally containing from about 8 to 50 carbons and particularly from 10 to 30 carbons. The hydrophobic moiety can be either linear or branched and is often saturated, though it can be unsaturated, and is optionally fluorinated. The hydrophobic moiety can comprise a mixture of chain lengths, for example those deriving from tallow, lard, palm oil sunflower seed oil or soya bean oil. Such non-ionic surfactants can also be derived from a polyhydroxy compound such as glycerol or sorbitol or other alditols. Examples of emulsifiers include ceteareth-10 to xe2x88x9225, ceteth-10-25, steareth-10-25, and PEG-15-25 stearate or distearate. Other suitable examples include C10-C20 fatty acid mono, di or tri-glycerides. Further examples include C18-C22 fatty alcohol ethers of polyethylene oxides (8 to 12 EO). The co-emulsifiers, which typically have a low HLB value, and often of from 2 to often comprise mono or possibly fatty acid diesters of polyhydric alcohols such as glycerol, sorbitol, erythritol or trimethylolpropane. The fatty moiety is often from C14 to C22 and is saturated in many instances, including cetyl, stearyl arachidyl and behenyl. Examples include monoglycerides of palmitic or stearic acid, sorbitol mono or diesters of myristic palmitic or stearic acid, and trimethylolpropane monoesters of stearic acid. A particularly desirable class of emulsifiers comprises dimethicone copolymers, namely polyoxyalkylene modified dimethylpolysiloxanes. The polyoxyalkylene group is often a polyoxyethylene (POE) or polyoxypropylene (POP) or a copolymer of POE and POP. The copolymers often terminate in C1 to C12 alkyl groups. Suitable emulsifiers are widely available under many tradenames including Abil(trademark), Arlacel(trademark), Brij(trademark), Cremophor(trademark), Dehydrol(trademark), Emerest(trademark), Lameform(trademark), Quest PGPH(trademark), Pluronic(trademark), Prosorine(trademark), Span(trademark), Tween(trademark), SF 1228, DC3225C and Q2-5200. The hydrophilic carrier normally comprises water and can comprise one or more water soluble or water miscible liquids in addition to or replacement for water. The proportion of water in an emulsion according to the present invention is often selected in the range of up to 60%, and particularly from 5 to 40%. Some of the water may be introduced as a solvent for the antiperspirant active. One class of water soluble or water-miscible solvents comprises short chain monohydric alcohols, e.g. C1 to C4 and especially ethanol or isopropanol, which can impart a deodorising capability to the formulation. A further class of hydrophilic liquids comprises di or polyols, preferably having a melting point of below 40xc2x0 C., or which are water miscible. Examples of di or polyols include glycol, 1,2 propylene glycol, 1,3 butylene glycol, hexylene glycol, diethylene glycol, dipropylene glycol 2-ethoxyethanol, diethylene glycol monoethylether and triethyleneglycol monomethylether. Especially preferred polyols comprise glycerol or sorbitol and related compounds which are capable also of acting as a humectant. The proportion of a mono, di or polyol in the formulation is often selected in the range of up to 15%, and in a number of instances from 0.5 to 12%, conveniently up to about 5% and preferably from about 0.2 to 3%. In certain preferred embodiments of the present invention, the compositions are in the form of emulsions in which the continuous phase comprises from 10 to 35% volatile silicone oil, and from 5 to 15% non-volatile hydrophobic oil, the disperse phase comprises from 40 to 75%, the antiperspirant or deodorant active comprises from 1 to 35%, the wax structurant comprises from 7 to 25%, the emulsifier comprises from 0.1 to 10%, and the composition preferably contains up to 5% insoluble particulate materials, % s being by weight based on the composition. By the employment of a composition of constituents selected within the ranges specified immediately hereinabove for such preferred embodiments, it is possible to produce an antiperspirant or deodorant emulsion stick exhibiting a combination of two or more beneficial properties, from the list of avoiding or ameliorating visible deposits, avoiding or ameliorating filmy deposits, avoiding or ameliorating drag, avoiding or ameliorating stickiness, and improving or retaining consumer-acceptable glide, whilst continuing to enjoy an acceptable stick hardness. In other words, it is possible to produce a stick from an emulsion which is structured using the invention wax and which exhibits a number of attributes which are well liked by consumers. The relative proportions of the aqueous and oil phases in said preferred embodiments are carefully chosen so as to achieve a balance of properties. The proportion of the aqueous phase is normally within the range of from 30 to 70% by weight, taking into account any material present which is dissolved in or forms a single phase with water. Preferably, the aqueous phase constitutes not more than 65 wt % of the composition and in many desirable embodiments is in the range of from 45 to 60 wt %. Many favoured compositions contain in the region of 50 wt % aqueous phase. The content of water in the aqueous phase of said preferred embodiments is often from 40 to 75 wt % of the phase, and often not more than 65 wt %. In practice, the proportion of water is often from 20 to 40 wt % of the composition and in many instances from 24 to 36 wt %. The presence of a significant proportion of water in an emulsion is commonly expected to be perceived by the consumer as having wet and cooling attributes. However, and surprisingly, the instant emulsion sticks of the preferred embodiments have been perceived to resemble anhydrous sticks in those attributes. The aqueous phase in an emulsion commonly contains, in addition to water, the antiperspirant or water-soluble deodorant. The proportion of such materials is usually at least 0.5 wt %, often at least 2 wt %, and in many instances at least 5 wt % and in the same or other instances is up to 30 wt %. The antiperspirant is preferably present in said preferred embodiments in an amount of at least 10 wt % and in many preferred emulsions between 20 and 25 wt %. It can be desirable to incorporate in said preferred emulsion embodiments a minor proportion of a C2 to C6 dihydric or polyhydric aliphatic alcohol, for example in a proportion of up to half the weight of water in the aqueous phase. Normally, the proportion of such a di or polyhydric alcohol is from 0 to 15 wt %, and especially from 3 to 12 wt % of the emulsion. Examples of preferred dihydric or polyhydric alcohols include propylene glycol, glycerol or sorbitol. By restricting to incorporation of only a minor proportion of such alcohols, it is possible to further constrain the extent of cooling arising from the aqueous phase and the extent of evaporation and concomitant appearance of visible deposits, without the composition suffering from undue stickiness or other negative sensory attributes that can arise from employing such compounds in an emulsion as the major fluid constituent of the lypophobic phase. Some particularly preferred emulsions contain from 3 to 10 wt % glycerol. Although one of the benefits of the emulsions of the instant invention is that the emulsions do not exhibit great cooling, the extent of cooling can be controlled by incorporating a chosen proportion of a volatile monohydric aliphatic alcohol such as ethanol or isopropanol, for example selected in the range of up to 5 wt %, eg at least 0.1 wt %. Many particularly preferred formulations within the class of preferred embodiments, however, are free from volatile alcohols. The hydrophobic carrier liquids employed in said preferred embodiments of the invention emulsions comprise a mixture of a volatile silicone oil and a non-volatile oil, the proportions of the two constituents being selected within prescribed ranges. In said preferred embodiments, the proportion of volatile silicone oil is preferably not higher than 25 wt % and often within the range of from 10 to 20 wt %. The proportion of non-volatile oil is preferably at least 8 wt % and in many instances is not more than 12 wt %. It is desirable to consider not only the absolute proportion of the oils in the emulsion, but also their relative proportions. Preferably, the volatile silicone oil is present in a weight ratio to the non-volatile oil of at least 1:1 and especially at least 5:4. The ratio is preferably not higher than 3:1 and more preferably not higher than 2:1. By carefully considering the ratio as well as the absolute proportions of the volatile silicone and non-volatile oils, it is possible to combine the benefits of reducing visible deposits, and simultaneously avoiding excess drag and greasiness for the emulsion. It is further desirable to consider their ratio to the materials which contribute to visible deposits, such as any astringent salt (eg the antiperspirant salt) and/or the wax structurant. It is preferable for the weight ratio of antiperspirant salt to non-volatile oil in the preferred embodiments to be selected within the range of from 1:1 to 4:1 and especially from 2:1 to 10:3, whilst retaining the absolute proportion of the non-volatile oil within the proportions described hereinabove. In selecting the non-volatile oils for use in said preferred embodiments, it is desirable to consider the various non-volatile oils described hereinbefore, including particularly the non-volatile silicone oils, liquid aliphatic hydrocarbons and aromatic esters. Other non-volatile oils which can be considered to provide a fraction of the non-volatile constituent for example up to 30% wt of that constituent for lower melting point waxes, such as those at up to 65 C, but possibly at least a major fraction for higher melting point waxes such as those at 70 C or higher, may comprise aliphatic ester oils containing at least one long chain alkyl group, such as esters derivable from C1-C20 alkanols esterified with a C8 to C22 alkanoic acid or C6 to C10 alkanedioic acid. The alkanol and acid moieties or mixtures thereof are preferably selected such that they have a melting point of below 20xc2x0 C. Suitable esters include isopropyl myristate, lauryl myristate, isopropyl palmitate, diisopropyl sebacate and diisopropyl adipate. Other classes of such non-volatile oils like the aliphatic esters include aliphatic branched fatty alcohol oils containing at least 12 and preferably up to 30 carbons, such as isostearyl alcohol or octyldodecanol and liquid aliphatic ethers derivable from at least one fatty alcohol, such as myristyl ether derivatives e.g. PPG-3 myristyl ether or lower alkyl ethers of polyglycols such as PPG-14 butyl ether. It is desirable to include in invention compositions and especially in emulsions at least one particulate insoluble material of small particle size, preferably in a proportion of up to 5 wt %, and particularly from 1 to 5 wt %. Such insoluble materials can be inorganic, such as talc, finely divided silica or clay. Alternatively, the material can be small particulate solid hydrocarbons such as finely divided polyethylene. The presence of such a constituent can improve the glide of the stick. In suspension formulations, this material can be in addiiton to any particulate antiperspirant salt. Optional ingredients in the invention compositions can include disinfectants, for example at a concentration of up to about 10% w/w. Suitable deodorant actives can comprise deodorant effective concentrations of antiperspirant metal salts, deoperfumes, and/or microbicides, including particularly bactericides, such as chlorinated aromatics, including biguanide derivatives, of which materials known as Igasan DP300(trademark), Triclosan(trademark), Triclorban(trademark) and Chlorhexidine warrant specific mention. A yet another class comprises biguanide salts such as available under the trademark Cosmosil(trademark). Other optional ingredients include wash-off agents, often present in an amount of up to 10% w/w to assist in the removal of the formulation from skin or clothing. Such wash-off agents are typically non-ionic surfactants such as esters or ethers containing a C8 to C22 alkyl moiety and a hydrophilic moiety which can comprise a polyoxyalkylene group (POE or POP) and/or a polyol. A further optional constituent of the formulations comprises one or more secondary structurants which can be employed in addition to the ester (the primary structurant). The amount of such secondary structurants in the formulation is often 0, and usually not more than 15% of the formulation. It is commonly not greater than the amount of the primary structurant. It will be recognised that in many of the preferred embodiments in the form of emulsions, such a secondary structurant is either not present or is not needed. The secondary structurants employable herein can be non-polymeric or polymeric. Non-polymeric structurants, sometimes referred to as gellants, can be selected from fatty acids or salts thereof, such as stearic acid or sodium stearate or 12-hydroxystearic acid. Other suitable gellants can comprise dibenzylidene alditols, e.g. dibenzylidene sorbitol. Further suitable gellants can comprise lanosterol, selected n-acyl amino acid derivatives, including ester and amide derivatives, such as N-lauroyl glutamate dibutylamide, which gellants can be contemplated in conjunction with hydroxystearic acid or an ester or amide derivative thereof. Still further gellants include amide derivatives of di or tribasic carboxylic acids, such as alkyl N,Nxe2x80x2 dialkylsuccinamides, e.g. dodecyl N,Nxe2x80x2-dibutylsuccinamide. Stearyl alcohol and/or a natural plant or animal derived wax or similar synthetic waxes can be employed, if desired, as secondary structurant. In some embodiments, the secondary structurant comprises candellila wax or esterified candellila wax, obtainable by esterifying pendant carboxylic acid group or groups in the wax with an fatty alcohol, preferably containing from 12 to 36 carbons, and especially containing from 16 to 24 carbon atoms. The weight ratio of primary wax to secondary candellila or esterified candellila wax is conveniently up to 1:4, and in a number of instances at least 10:1, such as 3:1, 1:1 and 1:3. Such combinations tend to demonstrate stick hardness that is greater than for corresponding formulations employing candellila wax alone as the structurant. Polymeric structurants which can be employed can comprise organo polysiloxane elastomers such as reaction products of a vinyl terminated polysiloxane and a cross linking agent or alkyl or alkyl polyoxyalkylene-terminated poly(methyl substituted) or poly(phenyl substituted) siloxanes. A number of polyamides have also been disclosed as structurants for hydrophobic liquids. If the composition comprises an aqueous phase, this phase can be structured by polyacrylamides, polyacrylates or polyalkylene oxides. Preferably, the formulations herein, including the preferred emulsion embodiments, are substantially free from solid fatty alcohols, typically water-insoluble, and often containing from 12 to 30 carbons, such as stearyl alcohol or behenyl alcohol, for example below 2 wt % and especially below 0.5 wt %. The compositions herein can also incorporate one or more cosmetic adjuncts conventionally contemplatable for antiperspirant solids or soft solids. Such cosmetic adjuncts can include skin feel improvers, such as talc or finely divided polyethylene, for example in an amount of up to about 10% w/w; skin benefit agents such as allantoin or lipids, for example in an amount of up to 5% w/w; colours; skin cooling agents other than the already mentioned alcohols, such as menthol and menthol derivatives, often in an amount of up to 2% w/w. A commonly employed adjunct comprises a perfume, which is normally present at a concentration of from 0 to 4% and in many formulations from 0.25 to 2%. The compositions described herein can be produced by conventional processes for making suspension or emulsion solids or soft-solids. Thus, according to a further aspect of the present invention there is provided process for the production of an antiperspirant stick comprising the steps of: 1. incorporating into a liquid carrier an organic wax having a melting point of from 40 to 90xc2x0 C. of which at least 60% of the weight of the wax is provided by at least one aliphatic ester satisfying the formula: CH3xe2x80x94(CH2)nxe2x80x94COxe2x80x94(CH2)mxe2x80x94CH3 in which n is from 9 to 39 and m is from 0 to 35, in an amount sufficient to thicken or structure the carrier to produce an extrudable solid or a solid, 2. rendering the structurant-containing mixture mobile at an elevated temperature 3. mixing the liquid carrier with an antiperspirant active, steps 2 and 3 being conducted either before after or simultaneously with step 1 to form a structurant-containing mixture 4. introducing the mobile mixture into a dispensing container and 5. cooling or permitting the mobile mixture to cool to a temperature at which it is thickened or structured. A convenient process sequence for suspension antiperspirant formulations comprises first mixing the wax with the carrier at a temperature that is high enough to melt the wax. Thereafter, particulate antiperspirant active can be blended with the carrier solution and the blend introduced, at a temperature that is often 5 to 10xc2x0 C. above its setting temperature into its dispensing container, such as a barrel using suitable filling processes and is cooled or allowed to cool to ambient. A suitable process for making emulsion antiperspirant formulations comprises forming a mobile mixture of the wax and the hydrophobic carrier, for example as in preparation of a suspension stick. Separately, an aqueous or hydrophilic phase is prepared, by introduction of antiperspirant active into the phase (if necessary, since such actives can conveniently be supplied in aqueous solution). The solution is preferably heated to a temperature similar to that of the oil phase and the phases are thereafter mixed. Alternatively, the hydrophylic phase can be introduced into the oil phase with gentle heating of the mixture and at a rate which maintains the elevated temperature of the mixture. The mixture is thereafter filled/cooled in a similar manner to that for suspension sticks. The preferred emulsion embodiments can be made by the following process; forming a hydrophobic mixture by mixing a volatile silicone oil, a non-volatile oil and a wax structurant at an elevated temperature or bringing the mixture to the elevated temperature at which the structurant melts or is dissolved or dispersed in the oils, thereby forming a mobile hydrophobic mixture, simultaneously or sequentially forming an aqueous phase containing water soluble or miscible constituents, shear mixing the mobile hydrophobic mixture with the aqueous phase in the presence of an emulsifier, and any insolble particulate materials thereby forming an emulsion comprising a hydrophobic continuous phase and a disperse aqueous phase, cooling or permitting the emulsion to cool to a temperature at which a solid is formed by the structurant structuring the continuous phase, characterised in that the continuous phase comprises from 10 to 35% volatile silicone oil, and from 5 to 15% non-volatile hydrophobic oil, the disperse phase comprises from 40 to 75%, the antiperspirant or deodorant active comprises from 0.5 to 35%, the wax structurant comprises from 7 to 25%, the emulsifier comprises from 0.1 to 10%, the composition preferably contains up to 5% insoluble particulate materials, % s being by weight based on the composition. The emulsion formulations described herein can be made by any of the processes hitherto described or used for making antiperspirant emulsions containing a high internal phase volume, such as at least 40 wt % internal phase. One suitable process comprises 1. incorporating into the wax into a mixture of the volatile silicone and non-volatile oil in an amount sufficient to thicken or structure the oil phase, 2. rendering the structurant-containing mixture mobile at an elevated temperature, steps 1 and 2 being conducted in sequence or simultaneously 3. obtaining an aqueous solution of the antiperspirant or deodorant, optionally containing an emulsifier, 4. mixing the mobile material produced in step 2 with the aqueous solution of step 3 in the presence of an emulsifier and with shear to form an emulsion at an elevated temperature 5. introducing the emulsion whilst still mobile mixture into a dispensing container and 6. cooling or permitting the emulsion to cool to a temperature at which it solidifies. In step 2, it is highly desirable to maintain the mixture at the chosen elevated temperature until the wax has been completely dispersed thoughout the oil phase and at a temperature which is often 5 to 10xc2x0 C. above the melting point of the highest melting wax. In step 3, it is often convenient to introduce an emulsifier into a pre-formed solution containing the antiperspirant salt, but in other instances, a solid antiperspirant can be dissolved in the aqueous phase. The step is often carried out at elevated temperature or the solution is heated to elevated temperature before being mixed in step 4 with the mobile oil phase. The aqueous phase is often heated to within 20xc2x0 C. of the oil phase. In step 4, the two liquid phases are mixed together under shear conditions and in the presence of an emulsifier. By so doing, droplets of the dispersed phase are obtained. This step is carried out at a temperature maintained above the solidification temperature of the formulation, and is often selected in the range of from about 50 to 70xc2x0 C., depending on its constituents. In step 5, the mobile emulsion in step 4 is introduced into stick dispensers, often called barrels. This can be carried out using conventional cast methods, or alternatively an injection moulding technique may be employed as described in PCT application no PCT/EP 99/07249. Likewise, the mobile suspension produced iun step 3 of the suspension route can be injected under pressure into barrels, preferably at a temperature within the range of 3xc2x0 C. about the regular setting temperature of the formulation. In step 6, the dispensers containing the mobile emulsion are either subjected to forced cooling, for example by being passed though a cooling tunnel or may be simply allowed to cool in ambient air, for example if they have been filled in step 5 (or step 4 in the suspension route) by an injection moulding technique that is operated within 3xc2x0 C. of the normal setting temperature of the formulation. The compositions herein are suitable for applying topically to human skin, and particularly antiperspirant compositions to axillae, thereby reducing observable perspiration. Thus, according to a third aspect of the present invention, there is provided a method for preventing or reducing perspiration on human skin comprising topically applying to the skin an antiperspirant composition comprising an antiperspirant active, a liquid carrier and a structurant which comprises an organic wax having a melting point of from 40 to 90xc2x0 C. of which at least 60% of the weight of the wax is provided by at least one aliphatic ester satisfying the formula: CH3xe2x80x94(CH2)nxe2x80x94Oxe2x80x94COxe2x80x94(CH2)mxe2x80x94CH3 in which n is from 9 to 39 and m is from 0 to 35. It is particularly desirable to apply topically the particularly preferred antiperspirant or deodorant emulsion composiitons, namely those comprising a continuous phase which comprises from 10 to 35% volatile silicone oil, and from 5 to 15% non-volatile hydrophobic oil, from 40 to 75% of ta disperse aqueous phase which contains from 1 to 35% of an antiperspirant or deodorant active, from 7 to 25% of a wax structurant, from 0.1 to 10% of an emulsifier, and preferably contains up to 5% insoluble particulate materials, %s being by weight based on the composition. Having described the invention in general terms, specific embodiments thereof will be described more fully by way of example only. In preliminary trials, mixtures of each of the following hydrophobic oils were formed with 10% by weight of each the specified waxes and heated to elevated temperature at which all the wax had melted, and then permitted to cool to ambient temperature. Oilsxe2x80x94volatile silicones, Phenyl trimethicone, polyphenyl methoxysiloxane, isostearyl alcohol, octyl methoxycinnamate, PPG-14 Butylether, C12-15 alkylbenzoate, mineral oil. Waxesxe2x80x94K62, K66, K69, K82H and K82N The resultant materials were all opaque gels which ranged from the softest, which was soft/hard through to the hardest, which was very hard.
Tag: per-capita output From 1900 to 1980, 70–80 percent of the global production of goods and services was concentrated in Europe and America, which incontestably dominated the rest of the world. By 2010, the European–American share had declined to roughly 50 percent, or approximately the same level as in 1860. In all probability, it will continue to fall and may go as low as 20–30 percent at some point in the twenty-first century. This was the level maintained up to the turn of the nineteenth century and would be consistent with the European–American share of the world’s population. In other words, the lead that Europe and America achieved during the Industrial Revolution allowed these two regions to claim a share of global output that was two to three times greater than their share of the world’s population simply because their output per capita was two to three times greater than the global average. All signs are that this phase of divergence in per capita output is over and that we have embarked on a period of convergence.
The Divided Laing, Arcola Theatre RD “Ronnie” Laing was a typically eccentric 1960s guru. A Scottish psychiatrist who was one of the leading lights of the anti-psychiatry movement, his 1960 classic The Divided Self helped a whole generation to a deeper understanding of mental illness and especially the experience of psychosis. This new drama, by theatre writer and critic Patrick Marmion, is an exploration of an imaginary episode in his life, and is staged on the occasion of the 50th anniversary of the Philadelphia Association, a therapeutic collective which Laing co-founded, and of his experimental asylum at Kingsley Hall in London’s Bromley-by-Bow. It’s 1970, and Laing and his collective are doing their best to help the troubled and the mad. Instead of using the hammer blows of strong medication, shock treatment and lobotomies, they are trying to listen to their patients, and keep them safe. As well as the loquacious Laing, the therapists include David Cooper (a South African anti-psychiatrist), Aaron Esterson (Laing’s Glaswegian collaborator), Joe Berke (an American therapist) and Mary Barnes (a nurse and former patient). Although their breakthrough method of immersive therapy is radical and has had some good results, they are not very popular with the local community, some of whom are afraid of the presence of mentally sick people in the neighbourhood. So as they face eviction from Kingsley Hall, their problems begin to spiral. Reason is definitely not helped by a bout of furious drug-taking and alcohol abuse during which Laing (shaman or charlatan?) and Cooper (dickhead or dopehead?) grapple with fantasises of sexuality and spiritual urges. As they get high, Marmion’s play itself takes off and lands on more and more imaginative and mystical planes, with the real conflict between Laing’s anarchic gospel of love and Esterson’s more straight vision of medical care taking centre stage. Then, whoosh, we’re off into more weird and wonderful dreams and memories, with reality bending as Laing’s mother and his imaginary pregnant partner pop into the story. Since Laing has been vilified and mocked in the past quarter of a century, it’s great to see a play that recaptures the spirit of his project, and shows both his considerable charisma and his radical ideas (many of which sound very reasonable when compared to the drug regimes now routinely used to treat most patients in an era of cutbacks). He was certainly a bit of a hippy, but he was a humane doctor too. Subtitled “The Two Ronnies”, this drama is a comic caper that reminded me of the 1970s plays of Snoo Wilson, with a touch of the wit of Terry Johnson’s Hysteria and a dash of the politics of David Edgar’s Mary Barnes. The passionate discussions reminded me strongly of a time when everything seemed possible, in daily life as much as in psychiatry. In the second half, Ronnie Laing splits into two people — “This head isn’t big enough for both of us!” — with his alter-ego offering a counterfactual history of the anti-psychiatry movement from 1970 to 2015, as the play time travels to the present! But although the main theme is all about the best way of treating mental illness, Marmion cleverly includes other insights: about Laing’s family life, the conflict between personal affections and public career, and the way that what gurus fear most is betrayal by their closest colleagues. The comparisons with Jesus are neatly underlined. As is the conflict between charismatic leaders and their followers. At the same time, the play’s last 20 minutes meander a bit, as if the playwright can’t quite bear to let go of his characters. And the issue of eviction from Kingsley Hall is dropped soon after its introduction. Despite this, Michael Kingsbury’s vigorous production has three thoroughly convincing and enjoyable performances from Alan Cox as the mercurial Laing, Oscar Pearce as the irrepressible Cooper and Kevin McMonagle as the more serious Esterson. Good support comes also from Laura-Kate Gordon (Mary), James Russell (Joe) and Amiera Darwish (Ronnie’s partner). This is both a warm tribute to a now under-rated thinker and an evening of fun and insights.
/**************************************************************************** ** ** Copyright (C) 2016 The Qt Company Ltd. ** Contact: https://www.qt.io/licensing/ ** ** This file is part of the documentation of the Qt Toolkit. ** ** $QT_BEGIN_LICENSE:BSD$ ** Commercial License Usage ** Licensees holding valid commercial Qt licenses may use this file in ** accordance with the commercial license agreement provided with the ** Software or, alternatively, in accordance with the terms contained in ** a written agreement between you and The Qt Company. For licensing terms ** and conditions see https://www.qt.io/terms-conditions. For further ** information use the contact form at https://www.qt.io/contact-us. ** ** BSD License Usage ** Alternatively, you may use this file under the terms of the BSD license ** as follows: ** ** "Redistribution and use in source and binary forms, with or without ** modification, are permitted provided that the following conditions are ** met: ** * Redistributions of source code must retain the above copyright ** notice, this list of conditions and the following disclaimer. ** * Redistributions in binary form must reproduce the above copyright ** notice, this list of conditions and the following disclaimer in ** the documentation and/or other materials provided with the ** distribution. ** * Neither the name of The Qt Company Ltd nor the names of its ** contributors may be used to endorse or promote products derived ** from this software without specific prior written permission. ** ** ** THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ** "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT ** LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR ** A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT ** OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, ** SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT ** LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, ** DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY ** THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT ** (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE ** OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." ** ** $QT_END_LICENSE$ ** ****************************************************************************/ //! [0] QFrame frame: frame.setFrameStyle(QFrame::HLine | QFrame::Sunken); //! [0] //! [1] QFrame frame: frame.setFrameStyle(QFrame::Box | QFrame::Raised); //! [1] //! [2] QFrame frame: frame.setFrameStyle( QFrame::Panel | QFrame::Sunken); //! [2] //! [3] QFrame frame: frame.setFrameStyle(QFrame::WinPanel | QFrame::Raised); //! [3] //! [4] QFrame frame: frame.setFrameStyle(QFrame::Box | QFrame::Plain); //! [4] //! [5] QFrame frame: frame.setFrameStyle(QFrame::HLine | QFrame::Sunken); //! [5] //! [6] QFrame frame: frame.setFrameStyle(QFrame::Box | QFrame::Raised); //! [6] //! [7] QFrame frame: frame.setFrameStyle( QFrame::Panel | QFrame::Sunken); //! [7] //! [8] QFrame frame: frame.setFrameStyle(QFrame::WinPanel | QFrame::Raised); //! [8] //! [9] QFrame frame: frame.setFrameStyle(QFrame::Box | QFrame::Plain); //! [9]
@comment $NetBSD: PLIST,v 1.1 2015/05/08 11:27:39 wiz Exp $ share/texmf-dist/doc/fonts/ebgaramond-maths/README share/texmf-dist/doc/fonts/ebgaramond-maths/ebgaramond-maths.pdf share/texmf-dist/doc/fonts/ebgaramond-maths/ebgaramond-maths.tex share/texmf-dist/doc/fonts/ebgaramond-maths/manifest.txt
There's something about Dupieux's characters and style of filming that somehow got me back into liking quirky, camp-bordering-on-surreal situations and interactions, in the vein of an updated David Lynch. Dupieux's recipe succeeds in creating alternative-functioning worlds that even the characters in it fully embrace, without questioning its abnormal, alien mechanics. Definitely a director to keep an eye on. A fascinating and perfectly episodic effort from Quentin Depieux, who is turning into one of my favorite dark comedy filmmakers as of late. Full of a comedically deft cast of weirdos, and minor plot points that can lead to something hilarious, stranger, or even horrifying, but are only shown in small, clever bursts (specifically its ending), Wrong Cops is aimless, but has an imagination absolutely worth picking at. I lasted 35mins of this. After being under-whelmed but still intrigued by WRONG I thought I'd give this one a chance. Duplieux favours an absurdist approach with little regard for payoff. Unfortunately it all comes across as lazy or as though the director doesn't care about the world he is creating and so neither did I, unable to invest in his creation. 1 star
Exempt Property North Carolina General Statutes allow for certain types of property to be exempt from taxation if they meet the requirements specified by the statutes. Any owner claiming this relief, with the exception of the U.S. Government, the State of North Carolina, and the counties and municipalities of the State, must file an application for exemption. To request an application for exemption, please call our office at (910) 592-8146. The completed application must be filed with the Tax Department during the regular listing period, which is from January 1 through January 31 each year. Examples of property exempt from taxation are: Real and personal property used for religious purposes (NCGS 105-278.3) Real and personal property used for educational purposes (NCGS 105-278.4) Real and personal property of religious educational assemblies used for religious and educational purposes (NCGS 105-278.4) Real and personal property used for charitable purposes (NCGS 105-278.6) Military ExemptionMilitary service members, who are currently on active duty in North Carolina with a home of record in another state, may not be subject to personal property and registered motor vehicle taxes in North Carolina. For exemption on personal property tax bills, such as mobile homes, boats, and unlicensed vehicles, return the tax bill along with a copy of the Leave & Earnings Statement (LES) that was issued closest to the January 1 prior to the date of the tax bill.To receive an exemption on a registered motor vehicle bill, return the tax bill along with a copy of the Leave & Earnings Statement (LES) that was issued during the same time period the vehicle was registered in North Carolina. Please note that the active duty service member's name must appear on the title of the vehicle. Military spouses may also qualify for exemption on personal property and registered motor vehicles if their home of record is the same as the service member's. To receive an exemption, return a copy of the bill along with the appropriate LES as stated above. In addition, military spouses must provide a copy of their current military I.D. card and a copy of one of the following out of state items: driver's license, voter registration card or most current state tax return. Disabled Veteran ExemptionA motor vehicle owned by a disabled veteran may be exempt from taxation if the following criteria are met: The vehicle is altered with special equipment to accommodate a service-connected disability The alteration was completed at the expense of the U.S. Government through a grant under Title 38 A disabled veteran may also qualify for a tax relief exclusion on their primary residence. Please view the Tax Relief Programs portion of this website for additional information.
Bsnl telecom operator introduce monsoon offer for prepaid customer How we get Monsoon Offer for bsnl subscriber in India The magnification find the maintenance for is manageable going on for all prepaid recharges including the Rs 186, Rs 429, Rs 485, Rs 666, and Rs 999 tariff plans. Additionally, they have the funds for has with been elongated to special tariff vouchers which associate uphill Rs 187, Rs 333, Rs 349, Rs 444, and Rs 448 plans. The BSNL Monsoon Offer was introduced as well as in June this year for a time of 60 days. The daily data limit of the Rs 189 position goes happening to 3GB which initially offered single-handedly 1GB of data every one of hours of hours of daylight for a period of 30 days. Similarly, the Rs 444 tariff aspire is offering to occur to 6GB data per day for a validity mature of 60 days, which originally offered 4GB data every one of hours of daylight. All the above mentioned BSNL prepaid plans, contiguously the data serve plus have the funds for doing local and STD calls upon every part of networks without any FUP and in addition to 100 SMS every share of the day.
I mean, there’s the special kids, one of whom is severely disabled. And then there’s my three-legged dog. And my parents, who both have end-stage, life-threatening diseases. And then there’s my son’s school, where I feel the need to volunteer. And then there’s the babysitting. And the dogsitting. And blogging (hey, I actually get paid for some of it, yo). And the regular “mommy” stuff. And the special “mommy” stuff. Yep, nothing going on. So what does one do when there’s nothing going on in one’s life? Why, HOME IMPROVEMENT, of course! So. Carpets. Steaming. Know how I do lots of that? And know how I had my parent’s evil attack dog for like, weeks at a time this year? Well, evil little dog has an evil little secret. He pees. Everywhere. On everything. Like, constantly marks. Honestly, he behaves fine and is quite snuggly and cute and stuff. But he pees everywhere. Including on carpet. And I have enough carpet cleaning to do with Bugaboo, no? My sister was kind enough to give me a reprieve from the dog a few weeks ago because it was getting BAD with me dog sitting and him being all passive-aggressive/passive-dominant and peeing and marking and stuff. He wasn’t getting along with the dogs. And I know he peed and I’d clean it up. Except I didn’t realize how much he was peeing everywhere. And a few weeks later we were noticing an odor. There’s no mistaking his pee, see. We know the smell. And the odor got worse and worse. I would shampoo the carpet and a few days later the smell would be back. So I’d shampoo it more. And use different stuff. And try hotter water. And it would be great for a few days and then the smell would be back. And all this time I was begging for new floors. Like, anything but carpeting because HELLO! BUGABOO! And the Guy I Live With said I was out of my mind. New floors cost tons o’dough. And we didn’t have tons o’dough. And besides, the new floors would just get ruined by our resident dogs, Daisy and Bristol. And Bugaboo. Mostly Bugaboo. A few weeks went by. The smell got worse and worse. I’d shampoo. It came back. That’s when I realized he had been peeing on furniture. ON LOTS OF FURNITURE. Now, we knew he did this at my parents’ house and we ended up pulling up the floors, putting down new carpeting, redrywalling and replacing their recliners. I don’t know why it didn’t occur to me he’d do it at my house. And he didn’t just pick one spot. He peed on the shoe cabinet, where the boys sit and put their shoes on in the morning. He peed on wall corners. On the piano bench and piano. On the dry sink and table and and chairs and wine rack in the dining room. On the leather couch. Everywhere. And some of it? Completely ruined. Like, had to throw-out ruined. Like, it’s-breaking-my-heart-and-I-want-to-cry ruined. Including the piano. So last night, we started ripping up the carpets down to the subfloor. And we’re going to replace them with something room by room as the paychecks allow. We also have to replace trim (he peed on that) and had to get rid of half the furniture in the Living and Dining Rooms (he peed on that, too). It’s killing me. At least we’re getting new floors. But I seriously want to strangle that dog and I AM THE CRAZY DOG LADY. In the meantime, we’re pulling up carpet staples. THOUSANDS OF THEM. And removing trim. And finding evidence of even more hideousness. More than I thought was possible in my built-in-the-eighties-and-it-shows house. Just feast your eyes on this: And underneath what I thought was the original cornflower blue carpet was another eighties atrocity: DUSTY ROSE! But wait! There’s more! The wall paper I so dilligently peeled off last year (cornflower blue and dusty rose flowers, ducks, heart, BLARGH!)? When we pulled off the trim we found, you guessed it, Cornflower blue wallpaper with dusty rose stripes! But hey, at least it wasn’t seafoam green and peach like the rest of the eighties, right? I just got eighties-country. Great. What a surprise! Cornflower blue and dusty rose! Again! And again! I love finding shiz like this when we do home improvement. It was almost as much fun as the mold and leaking we found when we did our bathroom! Almost. Anyways, dearest readers, what atrocities have you come across whilst attempting weekend warrior status? Do tell… 10 thoughts on “Because I Have Absosmurfly Nothing Going on in my Life…” You mean like the cream wallpaper with the blue stripes and dusty rose hearts that is still in my powder room? Then, like you there was the shower. I chipped the grout out to remove a broken tile and the wall came off with it. And speaking of doggy home improvement, mine have been working on removing the window sills, one nibble at at time. For Thanksgiving last year I trimmed off the chewed up wood, sanded it and painted it white so it was not so obvious. Now there are white slivers everywhere. The puppies are 2 years old. Knock it off already! We had pine knots not primed and used to replace parts of old house molding. Under the blue cloud wall paper with inspirational quote border, painted paneling. I was afraid to find out what was behind the paneling. I had a kitchen with rose marbled wallpaper. We never got around to finding out what was under it. Sad thing is it wasn’t an 80’s relic. It was brand new in 2004 when we bought the house. We bought an old Victorian. I’m over it. Glad we’re back to renting until retirement. It is amazing how a few colors will date a house – because personally, I don’t think the 80’s were all that long ago (yes, I know, I’m showing my age!) Sorry to read about all the pee-damage. I don’t have near the amount you do, but all of mine is from my soon-to-be 9-year-old. He pretty much stays with pee-ing on my bedroom carpet and on the sides of my mattress and boxsprings which aren’t covered with a waterproof cover. When I get a new set (hopefully soon) will will be putting BOTH pieces in zip-up plastic so they are ENTIRELY covered. I need to pull up the carpet, but will probably need to live with subflooring for a while. This post had me thinking. When we were looking to buy a house last, I swear every house has a pink, teal, or pink and teal bathroom in it somewhere. Many had that fake grass glued to the front porch in either blue or the green. Almost all of the foreclosures we looked at had brand new windows, but poor electrical and often leaky roofs. […] worst part about all of this is their dog. You remember the killer-attack-dog, Cujo? The little, destructive scamp of a dog? Yes. Well, he belonged to my Dad. Mom isn’t in the physical condition to take care […]
Q: Finding minimum value using XPath 1.0 does not work I am trying to find the minimum value in a certain element from an XML document (it's actually a HTML table that is translated to XML). However, this does not work as intended. The query is similar to the one used in How can I use XPath to find the minimum value of an attribute in a set of elements?. It looks like this: /table[@id="search-result-0"]/tbody/tr[ not(substring-before(td[1], " ") > substring-before(../tr/td[1], " ")) ] Executed on the example XML <table class="tablesorter" id="search-result-0"> <thead> <tr> <th class="header headerSortDown">Preis</th> <th class="header headerSortDown">Zustand</th> </tr> </thead> <tbody> <tr> <td width="45px">15 CHF</td> <td width="175px">Ausgepack und doch nie gebraucht</td> </tr> <tr> <td width="45px">20 CHF</td> <td width="175px">Ausgepack und doch nie gebraucht</td> </tr> <tr> <td width="45px">25 CHF</td> <td width="175px">Ausgepack und doch nie gebraucht</td> </tr> <tr> <td width="45px">35 CHF</td> <td width="175px">Ausgepack und doch nie gebraucht</td> </tr> <tr> <td width="45px">14 CHF</td> <td width="175px">Gebraucht, aber noch in Ordnung</td> </tr> <tr> <td width="45px">15 CHF</td> <td width="175px">Gebraucht, aber noch in Ordnung</td> </tr> <tr> <td width="45px">15 CHF</td> <td width="175px">Gebraucht, aber noch in Ordnung</td> </tr> </tbody> </table> the query returns the following result: <tr> <td width="45px">15 CHF</td> <td width="175px">Ausgepack und doch nie gebraucht</td> </tr> ----------------------- <tr> <td width="45px">14 CHF</td> <td width="175px">Gebraucht, aber noch in Ordnung</td> </tr> ----------------------- <tr> <td width="45px">15 CHF</td> <td width="175px">Gebraucht, aber noch in Ordnung</td> </tr> ----------------------- <tr> <td width="45px">15 CHF</td> <td width="175px">Gebraucht, aber noch in Ordnung</td> </tr> Why are there more nodes returned than one? There should only be exactly one node returned as there is only a single minimum. Does anybody see what's wrong with the query? It should only return the node containing the 14 CHF. Results obtained using http://xpath.online-toolz.com/tools/xpath-editor.php A: TML has already pointed out why your current path expression does not work, but has not suggested a working alternative. The reason is simple, as @Tomalak has said: I agree with Mathias. This actually is impossible in XPath 1.0 without changing the input XML. I add this answer to elaborate on the way you'd have to preprocess your XML before searching for the minimum amount of CHF. And remember: This is so complicated because you asked for a solution in XPath 1.0. With XPath 2.0, your problem could be solved with a single path expression. XML Design I think that your question illustrates why XML design is actually essential when working with XML. Why? Because your problem boils down to the following: Your XML is designed in a way that makes it difficult to manipulate the content. More precisely, in a td element like this: <td width="45px">15 CHF</td> There is an amount (as a number) and a currency, both in the text node of the td element. If your XML input was designed in a more clever or canonical way, it would look like: <td width="45px" currency="CHF">15</td> See the difference? Now, different kinds of content are clearly separated from each other. XPath Revised Assuming that in the newly designed XML, the only content of a tr/td[1] element is the number, the XPath expression by Pavel Minaev that you used can be made to work: /table[@id="search-result-0"]/tbody/tr[not(td[1] > ../tr/td[1])][1] XML Result (tested with the tool you use) <tr> <td width="45px">14</td> <td width="175px">Ausgepack und doch nie gebraucht</td> </tr> Why does Pavel's expression not work, simply because I add substring-before? You found part of the answer yourself already. It has to do with how sequences of items are handled in XPath 1.0 functions. substring-before() is an XPath 1.0 function that expects two arguments, both of them strings. And, most importantly, if you define a sequence of strings as the first argument of substring-before(), only the first string will be processed, the others will be ignored. Pavel's answer, adapted to this question: tr[not(td[1] > ../tr/td[1])][1] Relies on the fact that the second part of the expression, ../tr/td[1], finds all first td child elements of all tr elements of tbody. There is no function involved, and there is nothing wrong with a sequence as the operand of >. If we need substring-before() because the text content is actually both a number (that we want) and a currency (that we'd like to ignore), we have to wrap it around both parts of the expression: tr[not(substring-before(td[1],' ') > substring-before(../tr/td[1],' '))][1] No problem on the left side of >, because there is only one td[1] for the current tr. But on the right, there is a sequence of nodes, namely ../tr/td[1]. Sadly, substring-before() is only capable of processing the first of them. See the answer by @TML for the consequences of that. A: In the meantime I decided to use XSLT instead. This is the style sheet that I came up with: <?xml version="1.0" encoding="UTF-8"?> <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns="http://www.w3.org/1999/xhtml"> <xsl:output method="text" omit-xml-declaration="yes" indent="no" encoding="UTF-8"/> <xsl:strip-space elements="*"/> <xsl:template match="//table[@id=\'search-result-0\']/tbody"> <ul> <xsl:for-each select="tr/td[@width=\'45px\']"> <xsl:sort select="substring-before(., \' \')" data-type="number" order="ascending"/> <xsl:if test="position() = 1"> <xsl:value-of select="substring-before(., \' \')"/> </xsl:if> </xsl:for-each> </ul> </xsl:template> <xsl:template match="text()"/> <!-- ignore the plain text --> </xsl:stylesheet>
// *************************************************************************** // * // * Copyright (C) 2010 International Business Machines // * Corporation and others. All Rights Reserved. // * Tool: com.ibm.icu.dev.tool.cldr.LDML2ICUConverter.java // * Source File:<path>/common/main/my_MM.xml // * // *************************************************************************** my_MM{ MeasurementSystem:int{1} Version{"2.0.41.23"} }
Demand for help sign of economic ills Published August 23. 2014 4:00AM Those who run the region's food pantries are seeing more local residents than ever regularly coming in for free food. The stark conclusion drawn from this is that in a relatively wealthy region of one of the wealthiest states in the country, there is an astounding amount of need that appears to be growing. Here is just a bit of the evidence: St. Vincent DePaul Place in Norwich now regularly distributes food to double the number of clients it had just a few years ago. The Gemma E. Moran United Way/Labor Food Center launched its mobile food pantry program in May 2013 with three sites that served about 200 households, but in September, it will launch its 12th mobile pantry and expects to provide some 24,000 meals monthly throughout the region. There are now mobile pantry stops in towns such as Salem and Stonington - places where some might be surprised to discover that many neighbors struggle to provide food for their families. While the sheer numbers increase, the profile of those who need food also broadens. Many are from families with two wage-earners. Many are single. Many are veterans. Many had their unemployment benefits run out and simply can't find a job. Many are accessing food pantries for the first time in their lives. Some 19,000 residents live below the poverty line in the region, but many more whose incomes fall above the poverty threshold still struggle to heat and light their houses, keep cars running, pay for health care and feed and clothe their children. The region is blessed with programs helping those who struggle and generous residents who donate money, time and food to keep these programs robust. Besides food distribution sites ranging from the Pawcatuck Neighborhood Center to the Shoreline Soup Kitchens and Pantries, there are numerous meal sites, the mobile pantries and emergency shelters. In addition, free summer food programs feed many children in towns such as Groton, New London and Norwich, enabling students to return to a new school year well-nourished, focused, energized and ready to learn. None of this is enough. Hunger is not just about food. It's about jobs that don't exist or pay too little. It's about a lack of affordable housing. It's about health care and prescription medication costs so high that some who are ill must choose between medicine and food. It's about inadequate public transportation. Both the state and national economy continue to add jobs. But many people work in jobs that don't pay enough to meet today's high cost of living. Middle-income families find themselves slipping toward the ranks of the poor as wage increases fail to keep up with inflation. In this coming election for state and federal offices, voters deserve a serious debate about how to get the economy moving and rebuild the middle class. Instead they are likely to get a steady diet of simplistic attack ads providing no political nourishment. Food pantry operators say they would like nothing better than to be put out of business for lack of need and most of those who queue for food say they would prefer to earn enough to buy their own. Elected officials and community leaders must not only have serious discussions about ending hunger amid the plenty, but must also actually take steps to restore self-sufficiency to so many struggling families.
On Oct. 17, PenAir Flight 3296 overran the runway in a Saab 2000 at Dutch Harbor — resulting, according to the National Transportation Safety Board, in one death and four injuries. This was the first commercial aircraft accident in Dutch Harbor in more than a decade and garnered national attention. PenAir flies under Part 121 of the Federal Aviation Regulations, the same regulations that govern large air carriers such as Alaska Airlines and Delta. Passenger fatalities in Part 121 aircraft are extremely rare; this was only the second in the U.S. in the past 10 years. PenAir operations into Dutch Harbor were suspended shortly after the crash. As the focus of the investigation moves from the aircraft and flight crew to the company’s operations and procedures, questions will be raised about the recent dramatic changes in PenAir’s ownership and management. Many Alaskans are aware that PenAir went through bankruptcy and was sold in October 2018. It is now majority-owned by the same Manhattan-based private equity investment firm that owns Ravn Air Group, and operates as a member of Ravn with shared management positions. (For example, Brian Whilden is listed as the Senior Vice President of Safety for Ravn and President of PenAir.) Flight 3296 is the 19th accident involving Ravn Air Group members since 2008. Thus, as much as the Dutch Harbor crash is about the new PenAir, it is also about the continuing air safety saga that is Ravn and what that company’s issues mean to Alaska’s aviation industry and the flying public. PenAir first flew into Dutch Harbor in 1963 with company founder Orin Seybert at the controls. In the years that followed, the company operated multiple aircraft into the former World War II airfield, culminating with the Saab 340 and ultimately, to best accommodate the demands of its capacity purchase agreement with Alaska Airlines, the Saab 2000. (The agreement involves Alaska Airlines’ purchase from PenAir of certain flights, or “capacity,” between Anchorage and Dutch Harbor at a specified rate.) The 2000 is not the largest aircraft to fly into Dutch Harbor; both Alaska Airlines and MarkAir operated 737-200s. Reeve Aleutian Airways, which pioneered civilian operations into the field, also operated a variety of aircraft over the years — some on the original gravel runway — including the DC-3, C-46, YS-11 and Lockheed Electra. The common concern for all these companies was the relatively short landing distance — the paved runway is 4,500 feet long — and the unpredictable winds. As one former Reeve pilot explained to me recently, “If the wind was from the east and north, we did not even dispatch into Dutch.” (All pilots spoke to me on the condition of anonymity due to professional concerns.) Stiff winds and training requirements After a failed first attempt and go-around on Runway 13, Flight 3296 lost control while landing with a tailwind of 20 knots. (The archived winds at 5:30 p.m. show direction 240 degrees at 17 knots, at 5:35 p.m. direction 290 degrees at 9 knots and at 5:40 p.m., the time of the accident, direction 310 degrees at 20 knots.) The flight crew’s decision-making and flight training concerning the wind immediately came under the spotlight. Reeve, MarkAir and PenAir all had specific pilot training and standards for Dutch Harbor, and for good reason. “The alternates are not necessarily good,” said one former PenAir pilot with thousands of hours of experience in both the airport and aircraft. “The weather could be bad there also. The further you go down the (Aleutian) chain, the fewer options you have and that is why PenAir used to have so many safety measures in place.” “Local knowledge matters a lot in Dutch,” he continued, “it has a reputation for a reason.” MarkAir’s 737s were weight-limited, and all of the companies required special sign-offs from check airmen for pilot-in-command (PIC). PenAir also had a “captains only” rule for takeoffs and landings and a 300-hour minimum in-aircraft as PIC requirement. According to former and current PenAir pilots, this has changed under the new ownership. A page dated April 25, 2019, from the PenAir Operations Manual, states that the 300-hour PIC minimum may be waived if a company check airman who has flown with the pilot provides a letter of recommendation and the Chief Pilot approves the exception. It is unknown publicly how much Saab 2000 flight time the captain of Flight 3296 had at the time of the crash, but it is an area of investigation, and any letters providing an exception to that 300-hour PIC minimum will be looked at very carefully. The questions surrounding the 300-hour PIC minimum keep the emphasis on pilot training and operational oversight, a critical difference from Ravn’s recent attempts to turn the public’s focus to the aircraft itself. At a town hall meeting in Unalaska on Oct. 25, Dave Pflieger, Ravn CEO and president, stated that the company would “need to go through a multifaceted process to ensure it is safe to land Saabs in Unalaska before they can return to service there.” Such comments come as a surprise to those who know PenAir safely operated the Saab 2000 in and out of Dutch Harbor seven days a week — often multiple times a day — since May 2016. As another former PenAir Saab 2000 pilot explained to me, training and proper risk assessment about Dutch Harbor were always what mattered most prior to the company’s sale. “... there were no new captains flying with new co-pilots permitted into special airports,” he stressed. “The 300-hour minimum limit was standard for years, plus PenAir pilots had to fill out special risk assessment forms for Dutch Harbor.” As to the aircraft itself, there was little ambiguity as to how to handle the Saab 2000. “There were stringent tailwind limitations that could not be exceeded,” he said. Both former PenAir pilots emphasized that before the ownership change, company dispatchers conducted an assessment of landing performance for the total weight of the aircraft, including airport headwinds and tailwinds, prior to departure. In flight, the pilots would recalculate that performance based on current conditions at Dutch Harbor. It is unknown if this was done for Flight 3296. A circuitous path of ownership Pilot training questions always lead back to company operations and oversight which, in the case of PenAir, requires a trip through the byzantine path that is Ravn Air’s corporate history. It starts with the 2008 merger of Hageland Aviation and Frontier Flying Service, during which a corporation, HoTH Inc., was formed by the Hajdukovichs, Twetos and Hagelands. In 2009, the newly named Frontier Alaska purchased Part 121 operator Era Aviation and promptly rebranded itself as Era Alaska. In 2014, to avoid contentious name associations with Era Helicopters, Era Alaska rebranded as Ravn Alaska. Era Aviation’s name formally changed to Corvus Airlines and Frontier and Hageland began flying under Ravn Connect. Then came a financial crunch, and in May 2015, a Delaware-based corporation, the Ravn Air Group, was formed. In August of that year, J.F. Lehman Co. announced it had acquired a majority stake in Ravn Air Group, alongside W Capital Partners, another equity firm from New York, and the Hajdukovich family. By December 2015, Ravn Air Group was listed as 100% owners of HoTh Inc.; Lehman was now majority owner of Frontier, Hageland and Corvus. By September 2017, no Hajdukovich held a management position in Ravn, and the family was referred to in a press release as holding only a “minority interest." Then, in October 2018, the bankruptcy court approved PenAir’s purchase by a new company, Peninsula Aviation Services, over state concerns regarding issues of safety and decreased competition. Peninsula Aviation Services, which also purchased the name “PenAir,” is 100% owned by HoTH Inc. Ravn Air Group now had four air carriers. All roads lead back to one company and that company dominates Alaska’s aviation environment in numerous ways, not all of them good. The list of Frontier Alaska/Era Alaska/Ravn Alaska/Ravn Air Group accidents and incidents is, frankly, staggering. In August 2008, a Piper Navajo crashed in Aniak and a Cessna 207 crashed in Kongiganek, and in October 2008, a Cessna 208 crashed in Bethel. In February 2009, a Navajo crashed in Nome, and in March, a Navajo crashed in Buckland. In January 2011, a Cessna 208 crashed in Kipnuk; in November 2011, a Cessna 207 crashed in Kwigillingok. In November 2012, a DeHavilland Dash 8 suffered an uncontrolled 5,000-foot descent over Soldotna, and in December 2012, a Cessna 208 crashed in Meykoryuk. In May 2013, a Cessna 207 crashed in Newtok; in October 2013, a Beech 1900 crashed in Homer; in November 2013, a Cessna 208 crashed in St. Marys and a Beechcraft 1900 crashed in Deadhorse. In April 2014, a Cessna 208 crashed in Kwethluk; in May 2014, a Cessna 208 crashed in Aniak. In August 2016, a Cessna 208 crashed in Russian Mission; and in October 2016, a Cessna 208 crashed in Togiak. In April 2018, a Cessna 208 crashed in Atqasuk; in October 2018 a Beechcraft 1900 crashed in Gambell. And in October 2019, the Saab 2000 crashed in Dutch Harbor. The bottom line Obviously, there is a lot to Ravn’s corporate and accident history to process. But the main point is this: Through all of its name changes and ownership upheavals, as it transformed from an Alaskan-owned company to one that primarily belongs to a couple of New York City equity firms, the most appalling constant in Ravn’s operation is that its planes have crashed. In villages and towns, in the Bush and on the road system, in everything from the Cessna 207 to the Beech 1900, Ravn Air has crashed. PenAir operated thousands of Saab 2000 flights in and out of Dutch Harbor, but after owning and operating the airline barely a year, Ravn’s drama has added the 2000 to its list of wrecks. A fatality accident in a Part 121 passenger carrier is now yet another part of Alaska’s air safety record. And this accident is, of course, Ravn Air. Again. There is no doubt that Ravn Air Group operates more daily flights than any other aviation company in Alaska. But size does not excuse its repeated crashes nor suggest that Ravn’s significance to the state’s transportation system grants it leniency from regulatory standards. Thirty-nine people have been killed and injured under its corporate flag since 2008; seven of them have been killed since J.F. Lehman became majority owners. Perhaps it is time Ravn management stopped looking at planes and pilots — six of whom died working for the company — and instead consider the responsibility of their own corporate policies, actions and decision-making in this ongoing air safety catastrophe. Colleen Mondor is the author of “The Map of My Dead Pilots: The Dangerous Game of Flying in Alaska.” Find her at chasingray.com or on Twitter @chasingray.
We should have Chandigarh Capital Region on the lines of NCR: Pawan Bansal PAWAN Kumar Bansal, Congress MP and candidate for the Lok Sabha election, favours creation of a Chandigarh Capital Region, on the lines of the National Capital Region around Delhi, for integrated planning and development of the city and surrounding areas. Bansal, who is eying a fourth consecutive term in the Lok Sabha, and a fifth overall, came up with the suggestion at an Idea Exchange programme held at The Indian Express office. Elaborating on the idea, Bansal said, “Chandigarh is a small city, spread across a 114 sq kilometre area. So you cannot have every possible thing here. Chandigarh was not intended to be, and it is not a mega city. The suburbs, the adjoining satellite towns of Panchkula and Mohali combine to make it a mega town. Therefore, there are certain aspects of planning that have to be taken care of, keeping in view the Tricity. The proposed Metro fits in that.’’ As for improving the local administration, Bansal said he would work towards having a metropolitan council for Chandigarh, on the pattern of the one which Delhi had before it became a state. The metropolitan council, which will be above the municipal corporation, would consist of a chief executive councillor and three executive councillors. All executive authority should rest with this council, except in the subjects of law and order, higher education and tertiary healthcare as well as the Master Plan for the entire territory where there is a need to enter into negotiations with other states. Functions that require involvement of the three governments of Punjab, Haryana and Chandigarh should remain with the UT Administration, he said. If this was not possible, Bansal said he would work for a mayor-in-council system where the mayor, unlike now, is the chief executive, with two executive councillors assisting him. Asked why this could not be achieved in the past, Bansal said that this was due to Parliament not functioning properly. The MP said that though a lot had been done during his tenure, there were several development works that he wanted to get done in Chandigarh.
Contact Us Crypto Four Corners - BEK Encounter During a recent follow-up investigation, in connection with the Ultraterrestrial Assault Case, Crypto Four Corner's JC Johnson and his colleague Jack Cary encountered something that neither can explain. The incident occurred in the high desert around Gallup, New Mexico.Click Here to Visit Article
package ws import ( "encoding/binary" "fmt" "io" ) // Errors used by frame reader. var ( ErrHeaderLengthMSB = fmt.Errorf("header error: the most significant bit must be 0") ErrHeaderLengthUnexpected = fmt.Errorf("header error: unexpected payload length bits") ) // ReadHeader reads a frame header from r. func ReadHeader(r io.Reader) (h Header, err error) { // Make slice of bytes with capacity 12 that could hold any header. // // The maximum header size is 14, but due to the 2 hop reads, // after first hop that reads first 2 constant bytes, we could reuse 2 bytes. // So 14 - 2 = 12. bts := make([]byte, 2, MaxHeaderSize-2) // Prepare to hold first 2 bytes to choose size of next read. _, err = io.ReadFull(r, bts) if err != nil { return } h.Fin = bts[0]&bit0 != 0 h.Rsv = (bts[0] & 0x70) >> 4 h.OpCode = OpCode(bts[0] & 0x0f) var extra int if bts[1]&bit0 != 0 { h.Masked = true extra += 4 } length := bts[1] & 0x7f switch { case length < 126: h.Length = int64(length) case length == 126: extra += 2 case length == 127: extra += 8 default: err = ErrHeaderLengthUnexpected return } if extra == 0 { return } // Increase len of bts to extra bytes need to read. // Overwrite first 2 bytes that was read before. bts = bts[:extra] _, err = io.ReadFull(r, bts) if err != nil { return } switch { case length == 126: h.Length = int64(binary.BigEndian.Uint16(bts[:2])) bts = bts[2:] case length == 127: if bts[0]&0x80 != 0 { err = ErrHeaderLengthMSB return } h.Length = int64(binary.BigEndian.Uint64(bts[:8])) bts = bts[8:] } if h.Masked { copy(h.Mask[:], bts) } return } // ReadFrame reads a frame from r. // It is not designed for high optimized use case cause it makes allocation // for frame.Header.Length size inside to read frame payload into. // // Note that ReadFrame does not unmask payload. func ReadFrame(r io.Reader) (f Frame, err error) { f.Header, err = ReadHeader(r) if err != nil { return } if f.Header.Length > 0 { // int(f.Header.Length) is safe here cause we have // checked it for overflow above in ReadHeader. f.Payload = make([]byte, int(f.Header.Length)) _, err = io.ReadFull(r, f.Payload) } return } // MustReadFrame is like ReadFrame but panics if frame can not be read. func MustReadFrame(r io.Reader) Frame { f, err := ReadFrame(r) if err != nil { panic(err) } return f } // ParseCloseFrameData parses close frame status code and closure reason if any provided. // If there is no status code in the payload // the empty status code is returned (code.Empty()) with empty string as a reason. func ParseCloseFrameData(payload []byte) (code StatusCode, reason string) { if len(payload) < 2 { // We returning empty StatusCode here, preventing the situation // when endpoint really sent code 1005 and we should return ProtocolError on that. // // In other words, we ignoring this rule [RFC6455:7.1.5]: // If this Close control frame contains no status code, _The WebSocket // Connection Close Code_ is considered to be 1005. return } code = StatusCode(binary.BigEndian.Uint16(payload)) reason = string(payload[2:]) return } // ParseCloseFrameDataUnsafe is like ParseCloseFrameData except the thing // that it does not copies payload bytes into reason, but prepares unsafe cast. func ParseCloseFrameDataUnsafe(payload []byte) (code StatusCode, reason string) { if len(payload) < 2 { return } code = StatusCode(binary.BigEndian.Uint16(payload)) reason = btsToString(payload[2:]) return }
Monday, 7 July 2014 Akeno Hayabusa 1/72 Finished another one! This time it was a real pain. Again a very old and bad kit by LS. Removed all the pimples, a.k.a rivets, didn't bother myself with the absent cockpit and tried to make the movable parts less prominent. Basically I wanted to experiment with the camouflage and learnt valuable lessons which I will apply to a bigger Hayabusa in 1/48. AND it took me only about a month on & off. 1 comment: Anonymous said... I really enjoyed those LS Oscars. Quick and easy, I built over a dozen of them for various camouflages and sentai insignia. I do note though that the model is a Ki-43-I, with the two-bladed prop, but the box illustrated is the Ki-43-II.1108 Contact Feel free to send us your Japanese model airplane photos, short articles, research, questions or whatever (Japanese Aviation related) you would like to see posted. Email us and we'll post it for you. Emailarawasi_g2@hotmail.com Welcome - Please Read Before Posting Comments To post your comment just click on "comments" at the bottom of each posting. A pop-up displays a box where you can write your comment once you ignore the Google Username and Password boxes and go to "Name/URL". All comments are moderated and therefore will not appear immediately.
Comparative study of elderly inpatients clinically diagnosed with community-acquired pneumonia, with or without radiological confirmation. To compare clinical and radiological aspects, as well as aspects regarding the course of the disease, of elderly inpatients clinically diagnosed with community-acquired pneumonia, with or without radiological confirmation. A total of 141 patients over the age of 60 were retrospectively studied. Radiological findings corroborated the clinical diagnosis in 45 patients, whereas, in 96 patients, radiology did not correlate with the clinical suspicion. The signs, symptoms, treatment, and outcomes of these two groups were compared. The findings of the study suggest that there were no significant differences between the groups according to the criteria analyzed. The prevalence of chest X-rays compatible with pneumonia in patients suspected of the disease was slightly higher than 30%. Having low specificity in the elderly, the clinical diagnosis of community-acquired pneumonia should be used with caution. In view of the small number of patients studied, further studies on this topic are needed in order to confirm the findings.
Kathleen Long 1896 – 1968 From 1900 Kathleen had her first piano lessons and a private education in Bury St Edmunds living with her aunt, Jessie Long. 1910 saw her beginning her studies at the Royal College of Music where she won scholarships for piano, being a pupil of Professor Herbert Sharpe. In 1976 she was awarded her ARCM in piano teaching and performance. Her first public recital was given in 1919 at the Aeolian Hall, in London. In i920 she was invited to teach at the College. In a farewell article, on her retirement in 1964 (Royal College Magazine, vol. 61), Gordon Stewart wrote: I first got to know her playing from records of Mozart’s C minor piano concerto, K. 491. I scraped an introduction to her through a friend of mine . . . I had my first lessons in her Bulstrode Street flat whose main room had as principal ornament an Epstein Virgin and Child. She was then engaged in recording the Fauré Ballade and Françaix Concertino. I knew before I went to her of her reputation as a player of Mozart, Schumann and French music. At a time when a few only of Mozart’s piano concertos were performed, Kathleen Long was pioneering others, and made the first recordings of four of them: K.414, 449, 450 and 503. The B flat, K. 450 . . . shows the qualities that distinguish her playing: immense feeling, controlled by the style of the music, great variety of tone-colour, clarity of thought. She is one of the few English pianists who has played regularly with two famous French ensembles – the Loewenguth Quartet, and the Pasquier Trio. She was one of the first pianists to broadcast she played at many National Gallery concerts during the war (one a few hours after being bombed out of her Kensington flat, wearing a borrowed dress). She has played at the Carnegie Hall, New York, also in Canada and South Africa. She says that the greatest musical pleasure of her life was the group of concerts she gave with the ‘cellist Casals – his last appearance in this country in 1946. In her teaching she insists on a good tone – good fingers . . . she persuades you to a wide repertory and is delighted to help with modem pieces, since she has always made a point of playing new music herself. She will coach you admirably in chamber music (or accompaniment, which is really the same thing), for she is a wonderful chamber music player . . . not by any means reticent or retiring, but always listening, aware, alive. These characteristics of hers are fused with a vitality which belies the health worries that have been her lot, ultimately causing her retirement from College, and which she shrugs off with the most amazing good humour. Getting to know her has meant coming to love her dearly, for she is as great a person as she is a performer. Concert Club connections Three news items appeared about her in the 1942 BFP: CEMA Concert at Bury Kathleen Long should have been the solo pianist on Friday, and many were looking forward with pleasurable anticipation to this return visit to her native town. She is, however, undertaking an important tour abroad at the request of a Government Department . . . her place being taken by the Russian pianist Nina Milkina. Home from her tour overseas, she took part in chamber music at the Aeolian Hall on Saturday as a member of the English Ensemble – an admirable group of musicians (according to The Times critic) – who played piano quartets, Mozart in E flat and Brahms, Op. 60 and the Schubert ‘Trout’ quintet. . . He notes that the pianist is the life and soul of the Ensemble, and in the Mozart sets an example in crisp, clear phrasing, which in some instances might have been more fully followed by the string players. The playing of the Brahms Scherzo was outstanding and was a performance which reminded one of the great days of chamber music performance in London. Kathleen Long in Iceland As she recounted it to the Daily Telegraph, her ‘tour’ involved travelling by sea in a war-time convoy to Reykjavik for several recitals and broadcasts. Finding the Icelandic people very friendly, she had also met Pall Isolfsson, a local organist who had taught (until the Nazi regime intervened) at the Thomas-Schule in Leipzig in the 1930s. Miss Long found his playing of Bach notable for magnificent rhythm, absolute precision and clarity. Similar comments were frequently made about her own Bach interpretations. In Aprll 1943 the BFP reported that she had had a great reception on visiting her native town: . . . the Feoffment School Hall being filled with a most appreciative audience to hear a programme extending over an hour which covered a range of at least a dozen composers . . . although she was a little tired in view of the fact that this was her eighth concert in ten days! She confirmed comments made to us showing that the war has brought a revival of interest in classical music everywhere . . . We were especially pleased to find César Franck’s Prelude, Choral and Fugue in her repertoire at Bury – in a brilliant performance which gained for her an ovation, and was followed by the presentation of a lovely spray of flowers by Miss Wormald. In March 1944 she shared a Club recital with Janet Howe, mezzo-soprano: . . . whose voice was a bit too strong for the Feoffment Hall. Again in April 1944 the BFP reported that: It was thrilling to see the Athenaeum packed . . . for the Music Lovers’ Concert given by the Boyd Neel Orchestra and Kathleen Long. The outstanding work undoubtedly was Mozart’s Piano Concerto No. 14 in E flat. The opening is full of life and high spirits, and was given with freshness and spontaneity which thrilled. Mozart’s slow movements contain some of the finest gems of the musical art, and the second movement here is one of his most beautiful. The last movement is quite original in form. Kathleen Long naturally had a great reception, and at the conclusion of a brilliant rendering, the pianist, orchestra and conductor had a deserved ovation. In the second part of the programme, the pianist again appeared, this time more in the part of the continuo rather than as soloist, the work chosen being the Concerto Grosso by Bloch, the Geneva-born American-naturalised composer (b.1880) whose music is so distinctly Jewish. The movements include Prelude, Dirge, a charming Pastorale and fugue, leading to a brilliant Finale. The work was well presented and revealed the capacity of the orchestra and pianist for really vigorous playing, as well as for the more subdued work which was demanded during the evening. By now, she had accepted the position of Hon. President of the Music Lovers’ Concert Club and gave concerts almost annually in Bury. Ours was not the only provincial music club where she was known and appreciated – in March 7946, the local Stroud Journal contained a review of a Celebrity Concert: . . . given by the distinguished pianist, Kathleen Long. The large and appreciative audience listened entranced to a well-balanced programme ranging from the classical works of Bach and Scarlatti to works by modern French composers. The faultless technique of this great artist was admirably displayed in the beautiful rendering of the Bach Partita in B flat and in a group of Sonatas by Scarlatti. The principal work was the B minor Sonata of Chopin. Here she was at her best . . . the lovely tone of the melodic passages and the vigour of the bravura left the audience in no doubt as to her mastery of the instrument. To mark the Schubert 150th Anniversary in 1947, she joined two soloists (soprano, Margaret Ritchie and clarinettist, Frederick Thurston) to perform The Shepherd on the Rock at the University Music School in Downing Place, Cambridge. She appeared locally at the Athenaeum in February 1949 in a joint recital with a distinguished soprano, ‘. . . the programme ranged from Byrd to Ravel and was presented with pleasing informality. Sophie Wyss sang songs by Byrd, Purcell, Lully, Rameau, Schubert, Wolf, Mahler and Fauré. The singer chose to share her artistic enjoyment with the audience – the intimate quality enhanced the unsophisticated appeal of lieder and ballad. Kathleen Long revealed the highest command of the accompanist’s art, and gave three groups of piano solos, Rameau, Scarlatti and Schumann’s Fantasia, Op.77.’ A note from the 1950 – 1951 Music Lovers’ Concert Club brochure reads, ‘This fine pianist needs little introduction to audiences in Bury. She has been described by the Daily Telegraph and the Manchester Guardian as, “one of the finest classical pianists in this country – a pianist of whom this country should be proud”. Although she has made a reputation as a Mozart player, she is in no sense a specialist and has done much to make known the best modern works of British, French and German schools and has won high praise and approval from most well-known composers including Maurice Ravel, Arnold Bax, Ralph Vaughan Williams, Ernest Bloch, Frank Bridge and John Ireland, many of whom have entrusted her with the first performances of their works. She has played in America, Canada, Holland, France, Belgium, Germany, Portugal and Iceland. She has made numerous records for DECCA and HMV.’ In the 1950s, the French Academy were the first to honour her as an internationally known artist. They made her an Honorary Member of the Acadámie de France, presenting her with the Palmes d’Or for her services to French music. This was in recognition of her war-time music broadcasts from the BBC in London, and also those from European continental radio stations during the post-war period. In 1954 the Royal College of Music awarded her an Honorary FRCM to mark more than 30 years on their teaching staff. In the 1957 Birthday Honours she was awarded the CBE for her services to music. In the early 1960s her health and eyesight deteriorated and she began to consider moving to Bury, eventually retiring to Whiting Street (near enough for lunch at the Masons’ Arms, as she admitted to her many local friends). At the AGM of the Club in 1965 she played a crucial role in her capacity as President, by agreeing to take the Chair. This meeting involved both the Club’s change of name and also its move to a new venue – the Theatre Royal, about which she nevertheless expressed her reservations. In May 1965, Kathleen Long gave a concert at Ickworth in aid of research into polio and other crippling diseases. Moving her piano into the Rotunda, she played a programme of works by Bach, Scarlatti, Chopin, Schumann, Debussy and Fauré. ‘My concert at Ickworth will be an informal one and I shall be playing as if I was in my own studio.’ Her Steinway piano was the one used by Rachmaninoff for his London concerts. Having been in her London house since the bombing of 1940, it was now in her home in Whiting Street. Many local music-lovers still recall hearing her practising as they walked past, others remember the after-concert parties she used to hold while living there. In May 1966 she gave a recital in St Mary’s Church in aid of the NSPCC. She opened with Beethoven’s ‘Tempest’ Sonata Op. 31, No. 2, followed by four Scarlatti sonatas, some Chopin items, and Ravel’s Ondine (from Gaspard de la nuit). Following an interval she played the Prokofiev Sonata in one movement, and ended with a Schubert Laendler. ‘This is the artist giving herself a very short encore and, it is hoped, sending the audience away in peace,’ the programme noted. She had told an interviewer in 1950 that Ondine had been taught her by the composer himself, ‘a dried up little man’ to whom she was introduced one afternoon by the novelist Arnold Bennett, an erstwhile London neighbour with whom she used to enjoy playing duets. On 4 December 1967 her Theatre Royal invitation recital was broadcast by the BBC; this proved to be her last – she died at Cambridge Station on 20 March 1968. hr March 1968 obituaries appeared in The Times, The Guardian and other national papers. The BFP included the announcement, ‘A Requiem Mass will be held at St Edmund’s Roman Catholic Church on Monday morning and will be followed by burial at the Borough Cemetery.’Harrison Oxley recollects the occasion, as he was ‘privileged to play the organ . . . choosing music from the Requiems of Mozart and Fauré.’ Postscript In the late 1980s, it was pointed out to the then Chairman and Secretary of the Bury Concert Club that her grave was by now indistinguishable. They circulated an appeal in 1990 to members of the Club and others whom they knew among her friends and professional colleagues, and commissioned a memorial to be cut, which the Club continues to insure up to the present day. KATHLEEN LONG C.B.E PIANIST 7 JULY 1896 – 20 MARCH 1968 The image of Kathleen Long is from a painting by Guy Worsdell (1908-1978) which is owned by the Royal Academy of Music. Every effort has been made to contact the copyright holders to seek permission to use this image.
Gaimin’s recent collaboration with Chainlink will allow the blockchain-powered gaming platform to securely and reliably integrate real world-data into its applications, as well as interact with popular non-blockchain infrastructure. This allows developers to connect with external resources, enables new gaming functionalities, and ultimately enhances the overall user experience. Manchester, United Kingdom: Gaimin.io announced today their intent to integrate Chainlink’s flagship oracle technology into the Gaimin platform. This milestone is a significant move for Gaimin that will accelerate the on-going development of its blockchain-powered gaming platform. “This is an important collaboration towards enhancing the functionality available to developers on the Gaimin platform. Integration of Chainlink’s market-leading oracle technology is a further example of our intention to assure that our platform offers the optimum user experience for gamers,” said Buki Ben Natan, CTO at Gaimin. Gaimin is a decentralized computing platform that aims to become the “Uber” of processing power – passively monetizing a gamer’s high powered computer resources when not in use and rewarding them with the purchasing power to fund their gaming experience. Chainlink is a decentralized oracle network that reliably and securely connects smart contracts to data and networks outside the native blockchains they run on (off-chain). Gaimin and Chainlink will explore the implementation of new gaming use cases, which include: ● Building time-based smart contracts for “peer-to-peer renting” of digital gaming assets ● Facilitating tournaments and challenges between users via smart contracts that trigger based on off-chain gaming data ● Establishing accurate, real-time pricing for transactions of in-game digital assets using reliable sourcing of native token price information ● Connection to off-chain databases that provide machine learning algorithms to improve GPU monetization results for gamers. The rapidly expanding number of node operators, ecosystem projects, data providers, and infrastructure tools has turned Chainlink into the most vibrant oracle ecosystem on the market by a substantially large margin. While DeFi has seen the largest growth on Chainlink thus far, gaming is a market where Chainlink is seeing an accelerating influx of new users. Chainlink recently integrated with BET Protocol for e-sports, Blocklords for strategy games, Gamedex for digital collectibles, and more. The applications integrating Chainlink are increasing on a near-daily basis, with 60+ integrations in the last five months. That’s about one integration approximately every 2.5 days, a quite impressive feat. Chainlink has also announced on-going work with major enterprise players, such as SWIFT, Oracle, and Google. This important news comes after another significant week for Gaimin, which includes a trip to South Korea to attend the World Blockchain Summit MARVELS Busan 2020. CMO Andrew Faridani was a keynote speaker and panel member, discussing the importance of controlled regulation to allow the development of blockchain technology. “We see great potential in next-generation gaming applications built using data-driven blockchain infrastructure. We’re excited to help Gaimin optimize the computing resources of gamers using trusted data feeds secured by Chainlink’s decentralized oracle networks.” Daniel Kochis, Global Head of Partnerships on Chainlink In addition to the trip to South Korea, accomplishments for Gaimin include: ● An MOU with the Korea esports Industry Association, dedicated to creating connections between European and Asian gamers ● A sell-out of the first three IEO’s, and fourth IEO with Probit exchange ● First funding stage reached To learn more about developments and updates, please visit https://chain.link and https://gaimin.io About Chainlink If you’re a developer and want to connect your smart contract to existing data and infrastructure outside the underlying blockchain, reach out to us here! We can help you quickly and securely launch your data-enabled application or Chainlink Price Reference Data Contract on mainnet today. You can also visit the developer documentation or join the technical discussion onDiscord. Learn more by visiting the Chainlink website or follow us on Twitter or Reddit. Chainlink is a decentralized oracle network that enables smart contracts to securely access off-chain data feeds, web APIs, and traditional bank payments. It is well known for providing highly secure and reliable oracles to large enterprises (Google, Oracleand SWIFT) and leading smart contract development teams such as Polkadot/Substrate, Synthetix, Loopring, Aave, OpenLaw,Etherisc, Conflux, and many others.
Q: How to get an amount of open trades in MQL5 I want to get the amount of open trades in MQL5 on a demo account during strategy testing. PositionsTotal() and OrdersTotal() always return 0 even if there are open trades. The solution suggested here does not work. Any help will be appreciated. A: The problem occurred when running the code in the Metatrader 5 downloaded from Metaquotes' website. Running the same code in a Metatrader 5 instance from a forex broker resolved the issue.
A mobile broadband product may be connected to a computer to enable a computing device (computer, personal digital assistant, and various mobile terminals) to realize mobile network access. Because data transmission is performed through radio signals, the mobile broadband product generally has a built-in antenna. The antenna is fixedly electrically connected to a Printed Circuit Board Assembly (PCBA), and always individually occupies a considerably large part of space in the mobile broadband product to ensure the performance of the antenna. A general layout of an antenna in a conventional mobile broadband product is as shown in FIG. 1. Generally, an antenna 2 is individually set on an end of a casing of the mobile broadband product, and is set in parallel to a PCBA in the casing of the mobile broadband product, so that the antenna 2 is not shielded by a PCBA 1, thus protecting the performance of the antenna. Because the antenna individually occupies a considerably large part of space, the volume of the mobile broadband products with this structure cannot be reduced, which affects the portability.