text
stringlengths
8
5.77M
Hepatic arterial buffer response: pathologic evidence in non-cirrhotic human liver with extrahepatic portal vein thrombosis. Increase in hepatic arterial flow in response to reduced portal flow (hepatic arterial buffer response) has been demonstrated experimentally and surgically. We provide pathologic evidence for hepatic arterial buffer response in non-cirrhotic patients with extrahepatic portal vein thrombosis and elucidate the histopathologic spectrum of non-cirrhotic portal vein thrombosis. Liver biopsies and resections from non-cirrhotic patients with extra-hepatic portal vein thrombosis were retrieved. Morphologic features, extent of CD34 staining, outer diameters, luminal diameters and wall thickness of hepatic arteries cut in cross-section and outer diameters of cross-sectioned paired bile ducts were compared with age- and gender-matched controls. There were 12 male and 9 female patients. Measurements of 280 and 193 arteries from patients and controls, respectively, demonstrated statistically significant (P<0.05) arterial dilatation (increase in percentage of arterial lumen to outer diameter) and arterial wall thinning in resection specimens of non-cirrhotic patients with extra-hepatic portal vein thrombosis. Subtle and/or focal dilatation of central veins, portal veins and sinusoids; focal trabecular thinning/thickening and mild ductular reaction were common findings in both the patient and control groups. Diffuse and obvious changes, and portal vein absence or attenuation were seen only in the patient group. Capillarization of sinusoids was not seen on CD34 stain. Two patients showed significant ductular reaction, one of who developed biliary strictures on follow-up. Hepatic arterial dilatation and wall thinning in non-cirrhotic patients with portal vein thrombosis provide pathologic evidence of hepatic arterial buffer response in the human liver. Obvious and diffuse sinusoidal dilatation and absence or attenuation of portal veins are highly suggestive of extrahepatic portal vein thrombosis in non-cirrhotic patients with portal hypertension. Periportal shunt vessels, hypervascular portal tracts, muscularized portal veins, large thick-walled or dilated arteries aid diagnosis but are rare findings. Normal or near-normal biopsies do not rule out portal vein thrombosis.
Molecular cloning of bovine viral diarrhea viral sequences. Bovine viral diarrhea virus (BVDV) genomic RNA was identified as a 12.5-kb single-stranded RNA molecule in both infected bovine embryonic kidney cells (BEK-1) and partially purified virions. BVD virion RNA was partially purified and used as a template for cDNA synthesis. BVDV-specific cDNA sequences were molecularly cloned and shown to hybridize to infected cell RNA but not to uninfected cell RNA or DNA. A single RNA species of 12.5 kb, representing the viral RNA genome, was detected in infected cells. A preliminary map of the BVDV specific cDNA clones was constructed and five major, nonoverlapping families were observed, accounting for approximately one-half of the viral genome.
Q: How to move a Qt stylesheet to an external file but keep it compiled in resources? My Qt application has a large stylesheet with lots of margins, pixels and other stuff directly based on and related to drawing and graphics. I would be happy to give all that stuff to the designer, but the stylesheet is kept within the .ui file which is not convenient for the designer; she'd prefer to see a separate file and edit it using her usual tools. What I want is moving the stylesheet to an external .qss file, adding that file to the program resources and linking it to the .ui file, so the stylesheet would be compiled and used by the widget automatically, and the application wouldn't have to keep the stylesheet file and load it at runtime. How to achieve that? A: Copy all your styles into a file and rename it to something like stylesheet.qss Then include it in your qrc file as a new resource item. You can simply do this by editing your qrc file, if you already have one. Refer documentation on how to add a new resource. Then modify your code like this to read the content of the qss file at run time and apply styles to your application. int main(int argc, char *argv[]) { QApplication a(argc, argv); QFile file(":/stylesheet.qss"); if(file.open(QIODevice::ReadOnly | QIODevice::Text)) { a.setStyleSheet(file.readAll()); file.close(); } MainWindow w; w.show(); return a.exec(); } Note: when you do a change in the stylesheet.qss, you have to compile the qrc file for changes to take effect. A: I set the stylesheet when the application is run from an external file. Also, for the designer we added a button to 'reload stylesheet'. This way the designer can modify the file and try the changes immediately. For example: QFile styleFile("stylesheet.qss"); styleFile.open(QFile::ReadOnly); QByteArray bytes = styleFile.readAll(); QApplication *app = (QApplication*)QApplication::instance(); app->setStyleSheet(newStyleSheet);
A strong concept and refined detailing bring unity to this second-floor living space. The owners, a photographer and his wife, asked Jay Serrao, AIA, to create a lively kitchen, dining area, and living room that would flex for entertaining. Unlike politics, architecture has second acts. This original kitchen was outdated, extremely dark, and cut off from the rest of the house, says Ralph Cunningham, but it's reincarnated as a light-filled space with a felicitous floor-plan flow. Two language barriers confronted architect Frederick Stelle when he began renovating this lakefront house in Zurich, Switzerland. A German-speaking Swiss associate in his office solved the obvious one. But the existing visual expressions were more difficult to sort through. Can you really squeeze a family of four and their Aspen accoutrement into an 1,100-square-foot condominium renovation? No problem, says architect Scott Lindenau. Well, the masonry block construction, low ceilings, and paucity of windows were a conundrum, but you wouldn't know it by the...
New Transformers 2 Trailer Rocks Hard Share New Transformers 2 Trailer Rocks Hard New HD footage from Transformers: Revenge of the Fallen rocks hard and throws a few cryptic story clues into the mix for good measure. In the sequel spot, Shia LaBeouf, as Sam Witwicky, pulls apart an insect and later warns a civilian, "You don't hide, you run!" Makes sense. Story nuances aside, the clip offers a huge helping of fiery explosions from director Michael Bay. The master pyrotechnician splashes the screen with cometlike entities that assail planet Earth and revisits the desert settings from the first Transformers movie to show bots bounding across an arid wasteland.
381 F.2d 379 VIRGINIA ELECTRIC AND POWER COMPANY, Appellant,v.SYSTEM COUNCIL NO. U-1, INTERNATIONAL BROTHERHOOD OF ELECTRICAL WORKERS, AFL-CIO, Appellee.VIRGINIA ELECTRIC AND POWER COMPANY, Appellee,v.SYSTEM COUNCIL NO. U-1, INTERNATIONAL BROTHERHOOD OF ELECTRICAL WORKERS, AFL-CIO, Appellant. No. 11299. No. 11300. United States Court of Appeals Fourth Circuit. Argued June 22, 1967. Decided July 18, 1967. Appeals from the United States District Court for the Eastern District of Virginia, at Richmond; John D. Butzner, Jr., Judge. Francis V. Lowden, Jr., Richmond, Va. (George D. Gibson and Paul M. Thompson, and Hunton, Williams, Gay, Powell & Gibson, Richmond, Va., on brief), for Virginia Electric & Power Co. W. Cullen Mac Donald, Norfolk, Va. (Henry E. Howell, Jr., and Howell, Anninos & Daugherty, Norfolk, Va., on brief), for the Brotherhood. Before HAYNSWORTH, Chief Judge, and BRYAN and CRAVEN, Circuit Judges. PER CURIAM: 1 For the reasons stated by him in open court, we think the District Judge properly ordered enforcement of the arbitrator's award, but denied an award of attorneys' fees to the Union. In this court, the case is in the same posture; the employer's contention is not so lacking in substance as to warrant our taxing to it the Union's attorneys' fees. 2 Affirmed.
Q: How to initialize 2d array which is created by post method of form I having a form which having one field of categories. User can select 0 or more then 1 categories(using checkboxes). These categories are stored in cats variable or i am getting number of selected categories by <input type="checkbox" name="cats[]" id="3" value="1"> 1 $num=count($_POST['cats']); Problem is that when no category is selected that time no cats array is initialized so returns an error. So question is that in case of no category selection value of $num becomes 0 and value of $_POST['cats'][0]="No category" A: if(empty($_POST['cats'])){ $num=0; $_POST['cats'][0]="No category"; } However, you should avoid modifying the $_POST Array on your own, copy the content prior to another array and modify this.
PIXI.CRT = function(width, height, texture) { PIXI.AbstractFilter.call( this ); this.passes = [this]; var d = new Date(); var dates = [ d.getFullYear(), // the year (four digits) d.getMonth(), // the month (from 0-11) d.getDate(), // the day of the month (from 1-31) d.getHours()*60.0*60 + d.getMinutes()*60 + d.getSeconds() ]; this.uniforms = { iResolution: { type: 'f3', value: { x: width, y: height, z: 0 }}, iMouse: { type: 'f3', value: { x: 0, y: 0, z: 0 }}, iGlobalTime: { type: 'f', value: 1 }, iDate: { type: 'f4', value: dates }, iChannel0: { type: 'sampler2D', value: texture, wrap: 'repeat' } }; this.fragmentSrc = [ "precision mediump float;", "uniform vec3 iResolution;", "uniform float iGlobalTime;", "uniform float iChannelTime[4];", "uniform vec4 iMouse;", "uniform vec4 iDate;", "uniform vec3 iChannelResolution[4];", "uniform sampler2D iChannel0;", "// add any extra uniforms here", "vec3 sample( sampler2D tex, vec2 tc )", "{", "vec3 s = pow(texture2D(tex,tc).rgb, vec3(2.2));", "return s;", "}", "vec3 blur(sampler2D tex, vec2 tc, float offs)", "{", "vec4 xoffs = offs * vec4(-2.0, -1.0, 1.0, 2.0) / iResolution.x;", "vec4 yoffs = offs * vec4(-2.0, -1.0, 1.0, 2.0) / iResolution.y;", "vec3 color = vec3(0.0, 0.0, 0.0);", "color += sample(tex,tc + vec2(xoffs.x, yoffs.x)) * 0.00366;", "color += sample(tex,tc + vec2(xoffs.y, yoffs.x)) * 0.01465;", "color += sample(tex,tc + vec2( 0.0, yoffs.x)) * 0.02564;", "color += sample(tex,tc + vec2(xoffs.z, yoffs.x)) * 0.01465;", "color += sample(tex,tc + vec2(xoffs.w, yoffs.x)) * 0.00366;", "color += sample(tex,tc + vec2(xoffs.x, yoffs.y)) * 0.01465;", "color += sample(tex,tc + vec2(xoffs.y, yoffs.y)) * 0.05861;", "color += sample(tex,tc + vec2( 0.0, yoffs.y)) * 0.09524;", "color += sample(tex,tc + vec2(xoffs.z, yoffs.y)) * 0.05861;", "color += sample(tex,tc + vec2(xoffs.w, yoffs.y)) * 0.01465;", "color += sample(tex,tc + vec2(xoffs.x, 0.0)) * 0.02564;", "color += sample(tex,tc + vec2(xoffs.y, 0.0)) * 0.09524;", "color += sample(tex,tc + vec2( 0.0, 0.0)) * 0.15018;", "color += sample(tex,tc + vec2(xoffs.z, 0.0)) * 0.09524;", "color += sample(tex,tc + vec2(xoffs.w, 0.0)) * 0.02564;", "color += sample(tex,tc + vec2(xoffs.x, yoffs.z)) * 0.01465;", "color += sample(tex,tc + vec2(xoffs.y, yoffs.z)) * 0.05861;", "color += sample(tex,tc + vec2( 0.0, yoffs.z)) * 0.09524;", "color += sample(tex,tc + vec2(xoffs.z, yoffs.z)) * 0.05861;", "color += sample(tex,tc + vec2(xoffs.w, yoffs.z)) * 0.01465;", "color += sample(tex,tc + vec2(xoffs.x, yoffs.w)) * 0.00366;", "color += sample(tex,tc + vec2(xoffs.y, yoffs.w)) * 0.01465;", "color += sample(tex,tc + vec2( 0.0, yoffs.w)) * 0.02564;", "color += sample(tex,tc + vec2(xoffs.z, yoffs.w)) * 0.01465;", "color += sample(tex,tc + vec2(xoffs.w, yoffs.w)) * 0.00366;", "return color;", "}", "//Credit: http://stackoverflow.com/questions/4200224/random-noise-functions-for-glsl", "float rand(vec2 co){", "return fract(sin(dot(co.xy ,vec2(12.9898,78.233))) * 43758.5453);", "}", "vec2 curve(vec2 uv)", "{", "uv = (uv - 0.5) * 2.0;", "uv *= 1.1;", "uv.x *= 1.0 + pow((abs(uv.y) / 5.0), 2.0);", "uv.y *= 1.0 + pow((abs(uv.x) / 4.0), 2.0);", "uv = (uv / 2.0) + 0.5;", "uv = uv *0.92 + 0.04;", "return uv;", "}", "void main(void)", "{", "vec2 q = gl_FragCoord.xy / iResolution.xy;", "vec2 uv = q;", "uv = mix( curve( uv ), uv, 0.5 );", "vec3 oricol = texture2D( iChannel0, vec2(q.x,q.y) ).xyz;", "vec3 col;", "float x = sin(0.1*iGlobalTime+uv.y*21.0)*sin(0.23*iGlobalTime+uv.y*29.0)*sin(0.3+0.11*iGlobalTime+uv.y*31.0)*0.0017;", "float o =2.0*mod(gl_FragCoord.y,2.0)/iResolution.x;", "x+=o;", "col.r = 1.0*blur(iChannel0,vec2(x+uv.x+0.0009,uv.y+0.0009),1.2).x+0.005;", "col.g = 1.0*blur(iChannel0,vec2(x+uv.x+0.000,uv.y-0.0015),1.2).y+0.005;", "col.b = 1.0*blur(iChannel0,vec2(x+uv.x-0.0015,uv.y+0.000),1.2).z+0.005;", "col.r += 0.2*blur(iChannel0,vec2(x+uv.x+0.0009,uv.y+0.0009),2.25).x-0.005;", "col.g += 0.2*blur(iChannel0,vec2(x+uv.x+0.000,uv.y-0.0015),1.75).y-0.005;", "col.b += 0.2*blur(iChannel0,vec2(x+uv.x-0.0015,uv.y+0.000),1.25).z-0.005;", "float ghs = 0.05;", "col.r += ghs*(1.0-0.299)*blur(iChannel0,0.75*vec2(x-0.01, -0.027)+vec2(uv.x+0.001,uv.y+0.001),7.0).x;", "col.g += ghs*(1.0-0.587)*blur(iChannel0,0.75*vec2(x+-0.022, -0.02)+vec2(uv.x+0.000,uv.y-0.002),5.0).y;", "col.b += ghs*(1.0-0.114)*blur(iChannel0,0.75*vec2(x+-0.02, -0.0)+vec2(uv.x-0.002,uv.y+0.000),3.0).z;", "col = clamp(col*0.4+0.6*col*col*1.0,0.0,1.0);", "float vig = (0.0 + 1.0*16.0*uv.x*uv.y*(1.0-uv.x)*(1.0-uv.y));", "vig = pow(vig,0.3);", "col *= vec3(vig);", "col *= vec3(0.95,1.05,0.95);", "col = mix( col, col * col, 0.3) * 3.8;", "float scans = clamp( 0.35+0.15*sin(3.5*iGlobalTime+uv.y*iResolution.y*1.5), 0.0, 1.0);", "float s = pow(scans,0.9);", "col = col*vec3( s) ;", "col *= 1.0+0.0015*sin(300.0*iGlobalTime);", "col*=1.0-0.15*vec3(clamp((mod(gl_FragCoord.x+o, 2.0)-1.0)*2.0,0.0,1.0));", "col *= vec3( 1.0 ) - 0.25*vec3( rand( uv+0.0001*iGlobalTime), rand( uv+0.0001*iGlobalTime + 0.3 ), rand( uv+0.0001*iGlobalTime+ 0.5 ) );", "col = pow(col, vec3(0.45));", "if (uv.x < 0.0 || uv.x > 1.0)", "col *= 0.0;", "if (uv.y < 0.0 || uv.y > 1.0)", "col *= 0.0;", "float comp = smoothstep( 0.1, 0.9, sin(iGlobalTime) );", "// Remove the next line to stop cross-fade between original and postprocess", "col = mix( col, oricol, comp );", "gl_FragColor = vec4(col,1.0);", "}"]; } PIXI.CRT.prototype = Object.create( PIXI.AbstractFilter.prototype ); PIXI.CRT.prototype.constructor = PIXI.CRT; // Object.defineProperty(PIXI.CRT.prototype, 'iGlobalTime', { // get: function() { // return this.uniforms.iGlobalTime.value; // }, // set: function(value) { // this.uniforms.iGlobalTime.value = value; // } // }); var game = new Phaser.Game(800, 600, Phaser.AUTO, 'phaser-example', { preload: preload, create: create, update: update, render: render }); function preload() { game.load.image('texture', 'wip/filters/tex07.jpg'); } var filter; var sprite; function create() { sprite = game.add.sprite(0, 0, 'texture'); sprite.width = 800; sprite.height = 600; filter = new PIXI.CRT(sprite.width, sprite.height, sprite.texture); sprite.filters = [filter]; } function update() { // filter.iGlobalTime = game.time.totalElapsedSeconds(); // filter.uniforms.iMouse.value.x = game.input.x; // filter.uniforms.iMouse.value.y = game.input.y; } function render() { }
The 20-year-old white nationalist who plotted to attack a local Jewish Community Center in Ohio has been charged with transmitting threatening communications via interstate commerce — with additional charges likely incoming over the next few weeks. James Reardon Jr., a self-described white nationalist who attended the deadly 2017 Unite the Right rally in Charlottesville, Virginia, was taken into custody earlier in August after police in New Middletown, Ohio, were alerted to his social media activity. It included an Instagram video of Reardon shooting a semi-automatic rifle with the caption “Police identified the Youngstown Jewish Family Community Center as local white nationalist Seamus O’Reardon.” When police and the FBI raided Reardon’s house, they found two AR-15-style rifles, ammunition, a gas mask, and body armor. “This is a person that has declared himself as a white nationalist,” New Middletown Police Chief Vincent D’Egidio said at the time. “With the hate crimes and everything else going on, we wanted to make sure we do our part to make sure this person was taken off the streets very quickly.” In announcing the charges on Thursday, Justin Herdman, the U.S. attorney for the Northern District of Ohio, used the opportunity to deliver a stinging rebuke of the white nationalist ideology to which Reardon and others subscribe. “Now, let me speak generally to those who are advocates for white supremacy or white nationalism. I am talking directly to you,” Herdman said. “The Constitution protects your right to speak, your right to think and your right to believe. If you want to waste the blessings of liberty by going down a path of hatred and failed ideologies, that is your choice…. “Your right to free speech does not automatically mean that people will agree with you. In fact, you have a God-given and inalienable right to be on the losing end of this argument,” he continued. “What you don’t have, though, is the right to take out your frustration and failure in the political arena by resorting to violence. You don’t have any right to threaten the lives and well-being of our neighbors…. “Threatening to kill Jewish people. Gunning down innocent Latinos on a weekend shopping trip. Planning and plotting to perpetrate murders in the name of a nonsense racial theory. Sitting to pray with God-fearing people who you execute moments later. Those actions don’t make you soldiers. They make you cowards. Law enforcement does not go to war with cowards who break the law. We arrest them and send them to prison.” On the same day as Herdman made his statement, the U.S. attorney’s office in Ohio also announced guilty pleas for a pair who had plotted to carry out a mass shooting at a bar in Toledo. Elizabeth Lecron and co-conspirator Vincent Armstrong had for almost a year plotted to use guns and improvised explosives to carry out an attack. The two reportedly were obsessed with the Columbine shooters as well as the white supremacist mass murderer Dylann Roof, who slaughtered nine people in a predominantly black church in Charleston, South Carolina, in 2015. In the wake of the shootings in El Paso, Texas, and Dayton, Ohio, earlier this month, FBI Director Christopher Wray ordered the agency to conduct its own threat assessments to help local law enforcement identify potential mass shooters and prevent similar kinds of attacks by far-right extremists. At least a dozen people have been arrested over the last month for making threats against people, ranging from fellow classmates to religious or racial minorities.
Proton pumping in growing part of maize root: its correlation with 14-3-3 protein content and changes in response to osmotic stress. The spatial pattern of mitotic activity, cell elongation, rate of H+ fluxes, and 14-3-3 protein content were determined in Zea mays roots. We found that the regions along the apical part of the growing root conversely differ in their proton pumping activity. Higher rate of H+ efflux coincides with higher growth rate and correlates with increased 14-3-3 protein content in membrane preparations. The segment consisting of the root cap and the apical part of the meristem exerts net inward proton pumping, which can be inverted under fusicoccin treatment or osmotic stress. In the latter case, this inversion is accompanied by accumulation of 14-3-3 protein in plasma membranes. The results obtained highlight 14-3-3 protein as an obvious candidate for the fine regulation of plasma membrane H+-ATPase in root apex.
Site Mobile Navigation After El Bulli, Spain Looks Forward Chefs, clockwise, from top left, Ferran Adrià and his team at El Bulli; Quique Dacosta at his eponymous restaurant; Carme Ruscalleda at Sant Pau; and Nandu Jubany at Can Jubany.Credit Robin Townsend/European Pressphoto Agency (Adrià); Denis Doyle for The New York Times (Dacosta); Charlie Mahoney for The New York Times (Ruscalleda) and Lourdes Segade for The New York Times EL BULLI, currently the most influential restaurant in the world, will serve its last dinner on July 30. The next morning, Spain’s chefs will wake up to a radically changed universe. Picture an armada without a flagship, a solar system without a sun, and that is what high-end Spanish cuisine will look like in the absence of El Bulli. In a single generation, it helped transform Spain from a culinary backwater to a world leader, and Ferran Adrià’s cocina de vanguardia (the term he and other chefs prefer to “molecular gastronomy”) became a global obsession among young chefs. Food as performance art, transformed through wizardry and wit, is now seen as the signature style of modern Spanish restaurants. As Antoní Gaudí transformed the country’s architecture and Pedro Almodóvar its cinema, Mr. Adrià redefined its cuisine. Although many chefs contributed to Spain’s gastronomic revolution, especially Juan Mari Arzak, Santi Santamaría and Andoni Luis Aduriz, it was the sustained daring and smart marketing of Mr. Adrià himself that kept the bar rising. “It is impossible to say too much about his influence,” said Carme Ruscalleda, a chef in Catalonia who has six Michelin stars to her name, more than any other woman in the world. (She spoke in Catalan; some interviews were conducted through an interpreter.) “He was the first one to tell the chefs of Spain we could think for ourselves.” Tourists from all over the world now come to Spain for the food, drawn by the mystique of El Bulli, even though only a few hundred managed to eat there each year. Many chefs fear that the closing of El Bulli will combine with European economic woes to create a general plunge in culinary tourism. “I don’t think it’s a good situation,” said Josep Roca, one of the brothers who own Can Roca, a destination restaurant north of Barcelona. “I am afraid that without El Bulli, a certain energy will disappear from the restaurant scene here.” But amid the worry, it is also dawning on chefs that the Adrià monopoly on the international press may finally be broken. “The cuisine of El Bulli and Ferran Adrià has been so huge that it eclipses whatever is beside it,” said Quique Dacosta, an avant-garde chef in Valencia. During the El Bulli era, millions of euros in private and public funds became available to promote Spanish gastronomy. “Now other chefs will have more opportunities, occupying the spaces that El Bulli and Ferran Adrià will leave,” said Rafael Ansón, the president of the Royal Spanish Academy of Gastronomy, an umbrella group for the country’s multiple culinary promotion and education programs. Now that El Bulli is going dark (Mr. Adrià says it will operate as a culinary research foundation, at least until 2014), where in Spain will the world’s spotlight shine? Who will be the new darling of the gastro-tourists? Many chefs, including Mr. Dacosta (known for his edible landscapes), Josean Martínez Alija (famous for groundbreaking work with vegetables) and Ms. Ruscalleda, are contenders. One group plans to keep pushing the boundaries of cuisine with new technologies and global ingredients. Another group is vigorously digging into the roots of Spanish cuisine for traditions that they can elevate, through refinement and innovations, to three-star status. It is a given that cocina de vanguardia will continue. It is already visible in virtually every high-end restaurant in Spain, and even in modest cafes and tapas bars. At Si Us Plau, a beachfront cafe not far from El Bulli in the Mediterranean resort town of Roses, the sherry vinegar sprinkled over a plain green salad is gelatinized into tiny, bouncy bubbles. Inside the Boqueria market in Barcelona, Quim Márquez Durán runs a tiny lunch counter, frying the top-quality ingredients stacked on the stalls around him: eggs, artichokes, tiny fish and squid. These days, even his traditional desserts like natilla (cinnamon custard) or mel y mato, soft cheese with honey, are put through a nitrous oxide charger and foamed, à la Adrià. Not so long ago, any ambitious chef in Spain had to go abroad for culinary education, learning to cook the French dishes that tourists and moneyed Spaniards expected in elegant restaurants. “There truly was no such thing as Spanish haute cuisine,” said the culinary historian Claudia Roden, who has just published an exhaustive cookbook called “The Food of Spain.” Ms. Roden cited piquillo peppers as a good illustration of Spain’s modern culinary emergence. Red peppers stuffed with salt cod is a traditional dish in many parts of the country. In a luxury restaurant in 1970, the dish would have been cooked Continental style: blanketed with béchamel and cheese. In the 1980s, once chefs like Juan Mari Arzak and Pedro Subijana introduced the lightened, French nouvelle cuisine to Spain, the pepper’s bright red flesh took center stage, perhaps filled with minutely diced vegetables and set in a pool of puréed herbs. From the 1990s to today, chefs focused on whimsy and technology, transforming the piquillo into a crisp wrapper for a ripe banana; or the pepper itself might be foamed and used to stuff a sphere of salt cod, turning the original dish inside out. And yet, young chefs like Mr. Dacosta, whose eponymous restaurant is in the province of Valencia, are already exploring new media for cuisine. He is the creator of Oyster Guggenheim Bilbao, a single oyster, heated over juniper wood and draped in a film of edible titanium-silver alloy that mirrors the surfaces of Frank Gehry’s museum. Eating his Animated Forest is supposed to evoke the soil and flora of a Mediterranean woodland. Paco Morales, the young chef at the nearby Hotel Ferrero, takes a shimmering, jellied tomato water and scatters it with local herbs and shavings of raw vegetables, evoking a Market in a Dish. Andoni Luis Aduriz, the influential chef at Mugaritz, has coined a term to describe the effect of these edible landscapes: technomotion, a fusion of technology and emotion. (The word “food” is not represented.) “It consists in finding the inspiration in a landscape, and embodying the taste, aroma and sometimes the emotion the place contributed to you,” Mr. Dacosta said. Mr. Alija, chef at the Guggenheim Bilbao’s new restaurant Nerua, has cured endives with quicklime and stuffs tiny tomatoes with green herbs, surrounding them with a clear golden broth that is the essence of capers. He serves a single white asparagus spear with a gel of cardamom and orange. Like most avant-garde Spanish chefs, he is fluent in the language of ultra-serious artspeak, describing his food as “harmony among space, tastes, smells and textures, distilling the essences of each product.” Another group has embraced the serious perfectionism of la cocina vanguardia, but not its alien flavors and occasionally unsatisfying weirdness. Nandu Jubany, Victor Arguinzoniz and Mari Carmen Veléz are leaders in a regresar a las raíces (return to roots), using local ingredients and traditional techniques, but refined to an extraordinary level. As in France and Japan, these Spanish chefs are increasingly worshiping at the altar of terroir: the tiny aromatic Aranjuez strawberries grown outside Madrid, the chickpeas of Fuentesaúco, Atlantic mussels harvested off Galicia. They are not anti-technology culinary Luddites (though there are still plenty of those in Spain). They are practicing the new cocina de producto, ingredient-driven cuisine, in which the raw materials are paramount, pristine and always recognizable. Mr. Arguinzoniz, a chef so in touch with the earth that he even makes his own charcoal, has devoted decades to cooking over fire in the Basque country, where grilling is almost a local religion. Once a forest ranger, and entirely self-taught as a chef, he has developed equipment and methods for grilling unlikely ingredients like caviar, whole egg yolks and baby eels. Each mouthful at the elegant Asador Etxebarri — even during dessert — is infused with the taste of fire, but it never becomes monotonous. The salty rasp of a seared steak tastes different from the smokiness in a goat-milk ice cream; wood ash adds crunch to the sea salt in smoked butter. “I do not pretend to break with tradition,” he said. “I am no revolutionary. What broadens my horizons is the day by day, and this is wonderful.” At Can Jubany in Catalonia, Nandu Jubany has embraced the farm-restaurant model, growing asparagus, tomatoes, peas, herbs and calçots (the Spanish allium that is between a scallion and a leek in size) and raising cows, chicken and ducks. “My eggs are always the perfect shape, spherified in a series, inside a machine called a chicken,” he said, grinning as he showed off the walled garden outside the restaurant. His food is extremely refined but full of pleasure, often traditional dishes reimagined, like grilled whole pea pods with botifarra, a soft blood sausage, and rice with tiny espardenyes, Mediterranean sea cucumbers. The flavors are clear and concentrated, and rarely more than four to a plate. The roots of Mari Carmen Veléz, the chef at La Sirena in Alicante, reach not into land but into the Mediterranean: she has worked with seafood since childhood, at her parents’ fish stall. She is famous for suffusing traditional dishes like suquets and arroces with flavor, using tradition rather than technology: for example, concentrated stocks, long marination and emulsions like alioli, made with egg yolks instead of the hydrocolloids favored by the techno-motion crowd. A loud voice of the back-to-the-land movement was silenced in February by the death of Santi Santamaría, the popular Catalan chef of the three-Michelin-starred Can Fabes in Sant Celoni. Mr. Santamaría was virtually the only Spanish chef to openly challenge Mr. Adrià’s work — calling it unhealthy and, far worse in Spain, dishonorable — in an ideological feud that made headlines for years. According to Colman Andrews, Mr. Adrià’s biographer, the clash had roots in the Franco regime, when Catalan language and culture were violently suppressed and Mr. Santamaría got his start cooking at underground political meetings. Later, he remained dedicated to preserving Catalan tradition even as Mr. Adrià expanded his palate to include the world. Xavier Pellicer, who has both traditional and avant-garde credentials and was trained by Mr. Santamaría, has taken over the kitchen at Can Fabes. He is already stirring the pot with creations like a crab crème brûlée with a lid of caramelized sugar and black pepper. One chef (perhaps the only one) who transcends the rivalries and cliques among Spanish chefs is Carme Ruscalleda, a self-taught, self-employed 58-year-old. Her restaurant on the coast north of Barcelona, Sant Pau, has three Michelin stars; her restaurant in Tokyo, a precise copy of the original, has two; Moments, her restaurant in Barcelona, has one. Although she is little known outside Spain, within it she is respected as a true artist and fierce perfectionist. “With 70 employees, strict organization is necessary,” she said. “And I am far more strict with the young people, because they have to learn that ‘good enough’ is not good enough.” She comes by her ingredient-driven cuisine honestly: she grew up working in her parents’ vegetable market in the town where she was born, still lives and cooks. No chef in Spain has closer ties to local farmers and fishermen; her sources are the Mediterranean and Maresme, one of the country’s most ancient, fertile and diverse agricultural areas. Her food is delicate and minimal, seasonal, and enhanced by the tiny watercolor portraits she makes of each dish, which are printed on the menu. (“We always told her she was really Japanese, even before we opened a restaurant there,” her son, Raúl Balam, said teasingly.) But dishes like a gorgeous, lightly jelled Mondrian made from green almonds, red peppers and olives, and a juicy chunk of roasted foal (horsemeat is not unusual on local menus) are jammed with flavor. Mr. Balam is a thoughtful and driven chef in his own right. In charge of the kitchen at Moments, he is eager to execute his own dishes, but also feels responsible for maintaining the high culinary stature of his family and his country. “Even with three stars, you cannot relax,” he said. “You have to pretend that there is a fourth star, or else there is nowhere to go but down.” Whether Spain will descend from the dizzying heights that it has reached during the El Bulli era remains to be seen, but the language of cuisine, both on the plate and on the page, has been transformed by it. When asked whether the faltering Spanish economy will continue to sustain expensive and experimental cuisine in the future, Mr. Dacosta’s answer was characteristic: “What is expensive? What is experimental? What is the future?” Where To Find The Newer Faces Chefs mentioned in the accompanying article, and where they cook. The telephone dialing code for Spain is 34.
Articles Posted in US Court of Appeals for the Third Circuit The Passaic County Sheriff’s Office hired Tundo and Gilgorri as corrections officers on a trial basis. They were often absent and were frequently reprimanded for insubordination and incompetence. They were fired as part of a mass layoff before they had completed their 12-month trial period. Months later, Passaic County needed more employees. The Civil Service Commission created lists of former officers whom it might rehire, including Tundo and Gilgorri. Passaic County tried to remove the two from the lists based on their work history. The Commission blocked this attempt, restored them to the eligible list, and ordered Passaic County to place them in “a new 12-month working test period.” Passaic County then offered to rehire the two and asked them to complete a re-employment application, which asked them to agree not to sue Passaic County. They refused to complete the application. The Commission then removed them from the list. The Third Circuit affirmed the summary judgment rejection of their 42 U.S.C. 1983 due process claims. The Commission has many ways to take anyone off its lists and did not promise that the two would stay on the lists nor constrain its discretion to remove them. Because there was no mutually explicit understanding that they would stay on the lists, the men had no protected property interest in doing so. View "Tundo v. County of Passaic" on Justia Law In 2013, Philadelphia police found drugs and a gun in an apartment that they thought was Randall’s. They arrested Randall. The Philadelphia District Attorney’s Office charged him but dropped all the charges in August 2015. When he was arrested in Philadelphia, he was already on probation in New Jersey and Delaware County, Pennsylvania. Hearing about his arrest, both jurisdictions issued detainers for him. After dropping the charges, Pennsylvania released Randall into New Jersey’s custody. He remained in custody, first in New Jersey and then in Delaware County, until December 24, 2015. On December 26, 2017, Randall sued the Philadelphia Law Department and the police officers who had arrested him under 42 U.S.C. 1983. The district court dismissed Randall’s claims as time-barred. The Third Circuit affirmed, rejecting Randall’s “continuing-violation” argument. Section 1983 borrows the underlying state’s statute of limitations for personal-injury torts. In Pennsylvania, that period is two years. When a Section 1983 claim accrues is a matter of federal law, under which a malicious-prosecution claim accrues when criminal proceedings end in the plaintiff’s favor. For Randall, that happened in August 2015, so he had until August 2017 to file his suit unless something tolled the statute of limitations. The continuing-violation doctrine focuses on continuing acts, not continuing injury. No Philadelphia defendant detained Randall beyond August 2015. View "Randall v. Philadelphia Law Department" on Justia Law Piasecki was convicted of 15 counts of possession of child pornography and was sentenced to three years’ probation. Pennsylvania sex offenders were then subject to “Megan’s Law” registration requirements. While Piasecki pursued appellate relief, that law expired and was replaced with the Sex Offender Registration and Notification Act (SORNA) to “bring the Commonwealth into substantial compliance with the federal Adam Walsh Child Protection and Safety Act of 2006,” which applied retroactively to Megan’s Law registrants. SORNA had increased registration and reporting requirements. Among other restrictions, Piasecki was required to register in-person every three months for the rest of his life and to appear, in-person, at a registration site if he were to change his name, address, employment, student status, phone number, or vehicle ownership. As a Tier III SORNA registrant, he could petition a court to exempt him from the requirements after 25 years. Piasecki was only subject to the SORNA restrictions when he filed his 28 U.S.C. 2254 habeas petition, challenging his conviction. His probation and conditions of supervision had expired. Reversing the district court, the Third Circuit held that Piasecki was “in custody pursuant to the judgment of a State Court,” as required for jurisdiction. SORNA’s registration requirements were sufficiently restrictive to constitute custody and were imposed pursuant to the state court judgment of sentence. View "Piasecki v. Court of Common Pleas, Bucks County" on Justia Law The 2011 Virgin Islands Economic Stability Act (VIESA) sought to reduce government spending by reducing payroll while continuing to provide necessary public services. VIESA offered some of the government’s most expensive employees (with at least 30 years of credited service) $10,000 to chose to retire within three months. Those declining to retire had to contribute an additional 3% of their salary to the Government Employees Retirement System starting at the end of those three months. Two members of the System with over 30 years of credited service who chose not to retire claimed that the 3% charge violated federal and territorial laws protecting workers over the age of 40 from discrimination based on their age. The Third Circuit found the provision valid because it did not target employees because of their age under the Supreme Court’s 1993 decision in Hazen Paper Co. v. Biggin; its focus on credited years of service entitles the government to the Age Discrimination in Employment Act of 1967 (ADEA)’s reasonable-factor-other-than-age defense. The Third Circuit concluded that the Virgin Islands Supreme Court would deem the provision consistent with existing territorial anti-discrimination statutes. View "Bryan v. Government of the Virgin Islands" on Justia Law When McKinney was granted tenure in 1974, his employment was governed by University Policies that provide that tenured faculty can be terminated only “for cause” and provide yearly salary raises for faculty who perform satisfactorily or meritoriously. Any salary increase for “maintenance” or merit becomes part of the base contract salary. No explicit provisions govern salary decreases; the Policy provides procedures to address complaints about salary decisions and requires that a faculty member “judged unsatisfactory” be informed of specific reasons related to teaching ability, achievements in research and scholarship, and service. In McKinney’s 2010 and 2011 reviews, Dean Keeler expressed concern about declining enrollment in McKinney’s classes, poor student evaluations, and a stagnant research agenda, but granted standard 2.0% and 1.5% maintenance increases. In 2012, McKinney ranked last among the Grad School faculty and was rated “less than satisfactory.” McKinney’s salary was increased by 0.5%. He was told that if his performance did not improve, he could receive a salary reduction. McKinney again ranked last in the 2013 review. Dean Keeler reduced his salary by 20%. McKinney sued, alleging that the University unconstitutionally deprived him of his property interest in his base salary. Reversing the district court, the Third Circuit concluded that he had no such property interest. The Policy language is not sufficient to give McKinney a “legitimate expectation” in the continuance of his base salary. The appeal provisions and the three-tiered rating structure indicate that salaries are subject to “possible annual adjustments,” and that McKinney had no more than a “unilateral expectation of receiving [his] full salary,” View "McKinney v. University of Pittsburgh" on Justia Law Patterson, an African-American male and a longtime Pennsylvania Liquor Control Board (PLCB) employee, arrived at an Eddystone, Pennsylvania PLCB-run store to inquire about the store’s operating condition. Patterson identified himself to the assistant manager as a PLCB maintenance worker and asked whether the store’s electricity and plumbing were in working order or if the store might otherwise need repairs. The assistant manager became “very rude.” Patterson exited the store, entered his state-owned van, reported the assistant manager to his foreman over the phone, then drove toward another PLCB store in Newtown Square. En route, Patterson was stopped by the police and questioned about “robbing” the Eddystone store. An officer informed Patterson that the Eddystone assistant manager had called to report a “black guy” in a “state van” who was trying to “rob her store.” Patterson sued the PLCB, alleging race discrimination and violations of the Fourteenth Amendment’s Equal Protection Clause, 42 U.S.C. 1983. The district court dismissed, finding that the PLCB was entitled to Eleventh Amendment sovereign immunity. The Third Circuit affirmed, employing a three-factor test to determine PLCB’s sovereign immunity status: whether the payment of the judgment would come from the state; what status the entity has under state law; and what degree of autonomy the entity has. View "Patterson v. Pennsylvania Liquor Control Board" on Justia Law Adams, a resident and member of the State Bar of Delaware, wanted to be considered for a state judicial position. Following the announcement of several judicial vacancies, Adams considered applying but ultimately chose not to because the announcement required that the candidate be a Republican. Because Adams was neither a Republican nor a Democrat, he concluded that any application he submitted would be futile. Adams challenged the Delaware Constitution's provision that effectively limits service on state courts to members of the Democratic and Republican parties, citing Supreme Court precedent: A provision that limits a judicial candidate’s freedom to associate (or not to associate) with the political party of his choice is unconstitutional. The governor responded that because judges are policymakers, there are no constitutional restraints on his hiring decisions. The Third Circuit ruled in favor of Adams, concluding that judges are not policymakers because whatever decisions judges make in any given case relates to the case under review and not to partisan political interests. The portions of Delaware’s constitution that limit Adams’s ability to apply for a judicial position while associating with the political party of his choice violate his First Amendment rights. View "Adams v. Governor of Delaware" on Justia Law Newark police officers forcibly entered and searched the apartment of Roman’s girlfriend. They arrested Roman, who was present in the apartment after they found drugs in a common area that was shared by multiple tenants. Roman was imprisoned for over six months and indicted for various drug offenses. The New Jersey Superior Court found the search to be unlawful and the charges were dropped. Roman sued the City of Newark and various police officers under 42 U.S.C. 1983, alleging that the city had a pattern or practice of constitutional violations and failed to train, supervise, and discipline its officers. He also pleaded an unlawful search claim against the officers and contends they are liable for false imprisonment and malicious prosecution. The district court dismissed all of the claims as inadequately pled and held the city did not have an ongoing practice of unconstitutional searches and arrests. The Third Circuit vacated in part. While most of Roman’s claims do not withstand dismissal, he adequately alleged that the Police Department had a custom of warrantless searches and false arrests. He also sufficiently pled that the Department failed to train, supervise, and discipline its officers, specifically with respect to “the requirements of [the] Fourth Amendment and related law.” View "Estate of Roman v. Newark" on Justia Law Goldstein was arrested for involvement in a kidnapping scheme. Prosecutors obtained a court order under the Stored Communications Act,18 U.S.C. 2703(d), compelling Goldstein’s cell phone carrier to turn over his CSLI. CSLI metadata is generated every time a cell phone connects to the nearest antenna; service providers retain a time-stamped record identifying the particular antenna to which the phone connected, which can provide a detailed log of an individual’s movements. Section 2703(d) does not require a showing of probable cause to obtain CSLI but only requires “specific and articulable facts showing that there are reasonable grounds to believe” that the CSLI is relevant and material. The district court denied a motion to suppress. Goldstein was convicted. The Third Circuit affirmed, holding that Section 2703(d) complied with the Fourth Amendment because cell phone users have no reasonable expectation of privacy in their CSLI. The Third Circuit granted rehearing after the Supreme Court’s "Carpenter" holding, that “an individual maintains a legitimate expectation of privacy in the record of his physical movements as captured through CSLI” and that the government’s collection of CSLI requires a showing of probable cause under the Fourth Amendment. The Third Circuit then held that the government violated Goldstein’s Fourth Amendment rights when it acquired his CSLI but nonetheless upheld the admission of Goldstein’s CSLI because the government was acting under an objectively reasonable good faith belief that obtaining CSLI under Section 2703(d) was constitutional. View "United States v. Goldstein" on Justia Law In 2008, St. Croix residents Bryan, Beberman, and Francis took a Caribbean cruise aboard the Adventure of the Seas, stopping at several foreign ports before returning. to the United States. Some of the stops are known sources of narcotics. When they reboarded the ship in Puerto Rico, a can of shaving powder in Francis’s bag spilled over an officer for U.S. Customs and Border Protection (CBP). The travelers claim that the officers' subsequent actions were retaliation for their laughing at that incident. The officers found nothing unlawful in their bags, but made a notation in the Treasury Enforcement Communications System (TECS) database that Francis had appeared “disoriented and nervous” and that it took him some time to state his employment. That database contained entries from 2000, 2004, and 2006 linking Bryan and Francis to suspicion of drug smuggling. Officers searched their cabins but found no contraband. The three travelers asserted Bivens claims against the officers for allegedly violating their Fourth Amendment rights and tort claims against the government under the Federal Tort Claims Act (FTCA). The Third Circuit affirmed summary judgment in favor of the officers and the government. The officers are entitled to qualified immunity and the government is shielded from liability under the FTCA’s discretionary function exception. View "Bryan v. United States" on Justia Law
We noticed that you're using an unsupported browser. The TripAdvisor website may not display properly.We support the following browsers:Windows: Internet Explorer, Mozilla Firefox, Google Chrome. Mac: Safari. So nice place for relax and to be immersed on the nature. Rooms are so good and all the staff is really friendly and make feel you at home. So good to stay and really that's the place to visit in Friuli. We had a little trouble spotting the accommodation as the roadside sign is rather small. We drove past a couple of times. Warm greeting at reception. Plenty of parking spaces. Rooms quite spacious, Overall ambiance was very rustic as restored building has a lot of...More This accommodation must be one of the best kept secrets in the region. We had a memorable 2 night stay in a beautifully restored, 13th century farmhouse. Quiet surroundings amongst a large kiwi farm. Plentiful and tasty breakfast, with local, organic produce and a variety...More Date of stay: September 2016 Thank 12marina04 About Description Looking for a place to stay in Aquileia? Then look no further than Agriturismo Sant'Egidio, a budget friendly farmhouse that brings the best of Aquileia to your doorstep. …More While in Aquileia be sure to experience nearby seafood restaurants such as La Capannina, La Colombara, or Antica Aquileia Ristorante Pizzeria. Should time allow, Distilleria Aquileia (1.2 km), Basilica di Aquileia (1.0 km), and Museo Archeologico Nazionale di Aquileia (1.2 km) are some popular attractions that are within walking distance. We’re sure you’ll enjoy your stay at Agriturismo Sant'Egidio as you experience everything Aquileia has to offer. Less
"Last season on "Alias. "" "I'm approaching the finish line of a 30-year odyssey." "I won't let anyone else take the final steps for me." "Listen to me, you son of a bitch." "You have been a plague on my life." "You repulse me." "Every time I sat listening to your lies, all I could do was fantasize about slashing your throat." "Drop it!" "Syd." "Why are you wearing that ring?" "Since that night..." "You've been missing for almost two years." "There was a fire at your apartment." "Will survived, but you..." "They found remains." "The DNA was a match." "You were dead." "You were dead." "And you got married." "I did." "They asked me to come to Hong Kong." "The agency thought it would be best if you were reintroduced by someone from your life before." "They could have sent my father." "He's CIA." "He's from my life before." "I can't answer that." "I chose not to stay with the CIA after your death." "You're not with the agency?" "No." "I'm a teacher." "This is gonna take me awhile." "They want me to bring you back." "You can imagine what kind of investigation's being called." "Hell of a way to wake up." "How much time do I have before I have to go?" "They said they want you back as..." "I don't know who the hell you are, but you are not Vaughn!" "Tell me who you're working for!" "Is it Sloane?" "Tell me you're working for Sloane!" "Don't..." "Don't..." "You're safe." "You're at the Stafford Naval Hospital." "You're home again." "Sydney, there are no words to make this easy." "It was Vaughn who came for you in Hong Kong." "And what he told you was the truth." "Dixon, what happened to me?" "We don't know." "Where's my father?" "Or my mom?" "Have you heard from her since Mexico City?" "Vaughn said Will's alive." "If there was a fire in my apartment, if he thought I was dead, how did Will survive?" " And where is he?" " Sydney..." "And Francie, is she dead?" " Did they find her body?" " You have a million questions." "I have more than a million questions." "I wish I only had a million questions!" " Be patient." " I can't be patient." "I woke up like it was one night." "I have a scar on my stomach I have never seen." "Two years have passed, and I need to be patient?" "I deserve to know what happened to the people in my life!" "Where the hell is Kendall?" "Kendall is not the director of our division anymore." "I am." "Almost six months now." "Congratulations." "How you feeling?" "I'm okay." "You look great." "You lost weight." "Oh, thanks." "Yeah." "I gave up all the foods I enjoy." "I'm miserable, but I look really good." "We got something." "I need just a minute." "Excuse me." " I'm sorry to be all cryptic." " It's okay." "I get it." "We received a transmission from Mr. Kingsley." "He got the package and the decoy." "He's on schedule, aboard a train to Avignon." "We received intel The Covenant may be moving to intercept Kingsley and get the chip." " And we can't reach Kingsley?" " No, he's radio silent." "But we have a lead, an address outside of Paris, a possible outpost for The Covenant." "Contact the SNCF." "Have them stop the train at the next station and recheck Kingsley's ticket." "He'll know to make contact." "And get a team in prep." "I want to raid this outpost." "I have to get back." "Dixon, I want to see my dad." "What is the big deal?" "Your father's in prison." "National Security Council has had him in solitary for almost a year." "Their policy, without exception, is that he is to have no visitors." "Aah!" "Mr. Kingsley, you know what I want." "Give it to me, and I make your death painless." "One more time." "My shoe." "My left shoe." "Not what I wanted." "What?" "You okay?" "Syd?" "I think I know." "Oh, my God." "I think I know where I was." "There are so many new people." "I don't know anyone here." "Just give it time." "Excuse me." "Excuse me, hello?" "Hi." "Sydney, I'm Marshall Flinkman." "I work here." "Tech Design and Operation here." "Marshall, of course I know who you are." "Oh, thank God." "Sydney, it is so amazing to see you." "I can't even really..." "Actually, I wrote a poem." ""I've lost my keys." "Where are they?"" " Sydney." " Carrie." "Welcome back." "Oh." " You're pregnant." " Oh, yeah." "Yeah." "I am." "I wonder who the father is." " Are you guys married, too?" " No." "We're not married." "We're not even engaged." "But we're talking about getting married." "Not really." "She just has an issue with wedlock." "Syd, Dixon's expecting us." "If you need anything, just ask." ""I've lost my keys." "Where are they?"" "That's a metaphor." "We'd like to hear about what happened last night." "I had a memory, a vivid memory of the interior of the building where I was being held." "I know that it was in Paris, and I remember the faces of at least three of my captors." "Mr. Weiss' report says you recall overhearing voices, names, including Mr. Kingsley?" "This is Robert Lindsey." "He's our NSC liaison." "Yes." "So far that's all I remember." "It sounds like the group we're looking for is the one that was holding our girl." "Last night there was a mass murder on a passenger train." "Among the dead was a CIA asset, Scott Kingsley." "Kingsley did work for us." "He designed an aircraft, a spy drone, that could fly undetected by radar." "Kingsley was en route to Avignon to deliver the schematics." "They were stolen." "This drone can be converted into a delivery system." "Biological weapons, chemical." "I get it." "This group." "We know almost nothing about them." "They refer to themselves as "The Covenant. "" "We have some intelligence identifying one of their outposts." "We believe this is where they've taken the chip." "We're sending a team to Paris to raid the building." "Look familiar?" "Yes." "See, we're going in with or without you." "Without you, we're blind." "You might recognize details we wouldn't see otherwise." "I'm personally of the mind that sending you into the field so soon after your recovery is asinine." "Well, you might ask yourself how much you want to apprehend these killers." "Do not question my resolve." "What you are suggesting is premature." "Listen to what I'm suggesting." "I've experienced trauma myself." "Return to the field prematurely." "It's as dangerous as not being trained at all." "Excuse me." "I'm standing right here." "I think I might be helpful in Paris." "But I will not even consider going unless you help me first." "I want to see my father right now." "Miss Bristow, just so we're clear," "I have no intention of doing your father one single favor." "Ever." "That said, it's not your fault he's your father." "And I'm not without a heart, as you will come to see." "I'll get you in this one time." "Thanks." "Sweetheart, you look so beautiful." "They told me you were charged with resisting authority." "Yes." "Dad, I don't understand." "I became obsessed with your death, with finding those responsible." "And at a certain point in my pursuit, I needed help." "So I contacted the one person I believed I could trust, given the circumstances." "Your mother." "You were working with mom?" "At the time, she was number six on the CIA's Most Wanted list." "The National Security Council, primarily Robert Lindsey..." " Have you met him?" " Yes." "He discovered I was collaborating with your mother, so he threatened me." "Questioned my allegiance to this country." "He chose to make an example of me." "An NSC power play." "Here we are." "I was told you have a memory." "That you believe you were being held in Paris." "It's an anti-eavesdrop device." "I got it from Marshall." "We have 90 seconds." "Dad, I don't remember a thing." "I read Dixon's lips when he was outside my hospital room." "I made it up to get leverage, and they want me on a mission." " Leverage for what?" " To see you." "They told me I couldn't see you, and I needed to." "I don't know if I can explain what it's like waking up and having everything be different." "My friends are gone." "I have no job, no home, and Vaughn's married." " You're in prison, and..." " Vaughn's what?" "He got married." "Michael Vaughn is just a boy who was never good enough for you anyway." "Sydney, listen to me." "My investigation into your death became more disturbing than I expected." "You must continue my work and find what happened to you." " Do you understand me?" " Yes." "The only way is by getting your CIA clearance restored, having access to my files, getting out in the field." "I don't think I can do this without you." "We both know that's not true, and you have no choice anyway." "The CIA, I am certain, is dubious about your return." "You must get them to trust you again." "If they learn you are bluffing about your memory, it's over." "Dad, what did you mean, the investigation was disturbing?" "Sydney, I knew you were alive." "I made a discovery that you need..." "You probably know this, but I love you." "I love you, too." "The object of tonight's mission is to find and retrieve the microchip." "Also, to acquire any intel about The Covenant, who we believe is in possession of this chip." "We've had the building under surveillance." "It appears to be abandoned, but no guarantees." "You've all met Agent Bristow." "She was held prisoner in this building." "So while I will be leading the operation, we will take into consideration any warnings and insights that Agent Bristow has to offer." "Any questions?" "Let's go." "Hey, you all right?" "Yeah." "Move, move, move!" "Base, we're in position." "Any last-minute fun?" "We've got no activity outside the building, and thermal imaging shows the interior to be clean." " Good to hear." " Anything from Mountaineer?" "Hey, any of this look familiar?" "Not yet." " Negative." " Roger that." "Retriever, move on your call." "Okay, let's keep an eye out for tripwires." "Watch your back." "Let's move." "Alpha team, no sign of hostiles in quadrant two." "Heading east down quadrant six corridor." "Hallway clear." "Heading towards quadrant three." "Alpha team, hallway clear." "Building appears to be abandoned." "Hey, you remember this?" " Base to retriever." " Go, base." "We're picking up some company." "Quadrant 16, heading 2:00." "Retriever to team, be alert for a possible hostile." "Quadrant 16 headed toward quadrant 9." "Retriever, we're seeing activity." "I'm counting three, now five additionals." "We have five potential hostiles." "Let's get ready to engage." "Base, we're under attack." "We're under attack!" "Fall back now!" " Fall back now!" " Go, go, go!" "There are two more of them." "Quadrant six." "All agents abort." "Fall back now." "Let's split up and take them from behind." "Okay." "Go!" "Come on, Morris." "Stay with me." "Come on." " Are you okay?" " Yeah, go get him." "They're dead." "All of them." "Oh, my God, Weiss." "If I told the truth, this might not have happened." "What are you talking about?" "I've never been here before." "The dream I had..." "I just..." "I needed to regain the CIA's trust." "And now the team's dead." "Syd, this operation was on whether you came or not." "And if you hadn't, I'd be dead, too." "I don't know what to do." "I..." "Everything's wrong." "Everything is upside down." " We got to get home." " I can't go back!" "Robert Lindsey hates my father." "He doesn't trust me." "He wanted results from this." "He wanted the chip." "If I go back, he'll pull my clearance." "I'll never be able to help my father." "What are you thinking?" "This was obviously an ambush." "Those gunmen work for The Covenant." "The one who was gonna kill you, I saw his face." "If I can make a positive I.D., that could lead to the chip." " Leverage." " To do what?" "To get my father out of custody." "To recover what was stolen from the CIA." "To make sure these men didn't die for nothing." "I'm gonna need a contact." "A freelancer, not with the CIA." "Someone with resources." "All my names are two years old." "You're not gonna like my suggestion." "You should go see Arvin Sloane." "What?" "Sloane negotiated a pardon after your death." "He's now a consultant for the CIA." "Yeah, he now runs a world health organization in Zurich." "Omnifam." "Listen to me." "We never had this conversation." "After the gunfight, I disappeared." " You never saw me again." " So what are you gonna do?" "Syd?" "Excuse me." "Miss?" "Miss, you can't go in there!" "It's okay." "We're fine." "Hello, Sydney." "There's a group the CIA has targeted." "They call themselves The Covenant." "They've stolen something I need to get back." "I've made a visual I.D. Of one of their members." "I need to put a name to his face." "You're gonna help me find him." "You must be in real trouble to come to me for assistance." "His name is Gordei Volkov." "He's a former Russian MVD, a high-class hit man." "You just happen to have his file sitting on your desk?" "I had it ready because I was expecting you." "Sydney, I know you've gone rogue and that your father is being held in solitary." "And based on my experience with you," "I would say you're looking for a way to win his freedom." "Am I right?" "Sydney, just try and remember the bond that we had between us, you and I." "I loved you like a daughter." "I loved you." "And even you would admit there were times..." "I would see it in your eyes." "You looked at me like I was your..." "Where have I been the last two years?" "I know it was you!" "What did you do to me?" " Do you believe in redemption?" " Not for you, no." "We've helped to feed over 31/2 million children worldwide." "We do research." "Our work on cancer has the potential to save millions of lives, Sydney." "So much has changed since you've been gone." "Remember the Rambaldi device?" "A machine designed 500 years ago by a prophet." "All I did was bring the pieces together and have it assembled." "And when I turned it on, it delivered a message, as I suspected it would." "I wasn't prepared for what it said." "The message was just one word, one simple word." ""Peace. "" "The epiphany I had at that moment..." "Suddenly I saw all the mistakes I made, the pain that I had inflicted on the world, the people I loved." "So I chose right then and there to give information to the CIA, with which they were able to dismantle over two dozen terrorist cells." "I don't know how you convinced the CIA that you're trustworthy." "Why don't you check my files?" "I know you too well." "I don't buy any of it." "Allô?" "Allô." "Merci." "No, signora." "Allô?" "I tried to reach over two dozen contacts." "You're the only one still active." "Thank you for coming." "Of course." "Forgive me if I look shocking to you, but I was believing you were dead." "I was, but now I'm not." "This is why I love our business." "I need some information." "I hope I can help you." "Gordei Volkov." "Lindsey." "I just got a call from the D.O.J." "You had Sydney Bristow listed as an enemy of the state?" "Mr. Dixon, your operative ran." "Sydney Bristow is a fugitive." "This is why I did not want to send her out." "Given her condition, we should be helping her." "I hate to pull rank, but the Department of Justice is my jurisdiction, blindly trusting Sydney..." "I never suggested we blindly trust anyone, but classifying her in this way makes her a target." "Then make a suggestion." "I suggest that we use our resources to locate her." "Oh, she'll be located." "I want her back in this office alive." "Volkov has a meeting scheduled for tomorrow night in Prague." "I have the address." "He's supposed to be delivering something." "What it is, I do not know." "Perhaps it is your thing." "Do you know what he drives?" "A sedan, armored, of course, with a protective detail." "Sydney, if you want to stop that car, you will need backup." "No, I don't." "But I will need clothes." "# Throw your hands up #" "# Throw your hands up #" "# Ladies and gentlemen #" "# Throw your hands up #" "# Chocolate starfish #" "# Gonna keep on rollin', baby #" "# Throw your hands up #" "# Back up, back up, tell me what you gonna do now #" "# Breathe in, now breathe out, hands up, now hands down #" "# Back up, back up, tell me what you gonna do now #" "# Keep rollin', rollin', rollin', rollin' #" "# Keep rollin', rollin', rollin', rollin' #" "# Keep rollin', rollin', rollin', rollin' #" "# Keep rollin', rollin' #" "# Ooh #" "# I'm in love, I'm in love, I'm in love, I'm in love #" "# I'm in love #" "# Ooh #" "# I feel love, I feel love, I feel love, I feel love #" "# I feel love #" "# I feel lo-o-o-o-ve #" "# I feel lo-o-o-o-ve #" "# I feel love #" "# I feel #" "# Love #" "# Love #" "# Love #" "# I feel #" "Sydney." "I have the plans for the drone." "If you want them back, get the NSC to release my father immediately." "Excuse me." "I won't be blackmailed by a fugitive." "Did you really think you could come in here and threaten me?" " Yeah." " What the hell are you doing?" "I want it in writing that today Jack Bristow is to be released." "Mr. Dixon, talk to her." "I'm addressing you, Mr. Lindsey." "I want that "get out of jail free" card for my father, or these are gone." "This is ridiculous." "Mr. Dixon, please provide Mr. Lindsey with a pen." "I got my own pen, and there's not a chance I'm using it." "It's your call." "5..." " This is insane." " 4..." "Mr. Lindsey, she will destroy those plans." "3... 2... 1." "Fine." "Thank you." "B" " R-I-S-T-O-W." "I know how to spell your name." "# The most as you'll ever go #" "# Is back where you used to know #" "# If grown-ups could laugh this slow #" "I came by to see how you were." "Are you kidding me?" "No, I just wanted to make sure you're..." "You didn't come here to see how I am." "You came to see how you are, because you know what you did." "You want to make sure you're okay." "I buried you." "Consider that for one second..." "Don't use rational thought as a defense with me, not after all you and I have seen." "Vaughn, you and I live and breathe madness every day on the job." "There is no rational thought." "I can't pretend to have a conversation about anything else with you." "What it comes down to is faith." "What I was hoping you would say is," ""I gave up on us." "I lost faith. "" "But what you came here for was closure, and there is not a chance you are getting that from me." "I'm not gonna say I understand." "I'm not gonna sympathize with you and tell you how hard it must be for you." "But you want to know how I am?" "I am horrible." "Vaughn, I am ripped apart." "And not because I lost you, but because if it had been me," "I would have waited." "I would have found the truth." "I wouldn't have given up on you." "And now I realize what an absolute waste that would have been." "# You saved your own special friend #" "# 'Cause here you need something to hide her in #" "# And you stay inside that foolish grin #" "# When every day now secrets end #" "# And then again, years may go by #" "# Years may go by #" "Thank you." "# Years may go by #" "# Years may go by #" "There's something I need to show you." "Not here." "Almost a year after your apparent death," "I was on an operation." "One of the men I was tracking was this man, Andrian Lazarey." "Russian diplomat." "I've never seen him before." "This was from a hidden camera that I placed." "This is how I knew you were alive." "You don't recall that man at all?" "No." "No!"
The present invention relates generally to management of man made structures such as building and facilities and specifically to automated means of said management. Building and facilities management personnel and owners need an easy way to manage all aspects of their properties. Conventional systems allow management of certain aspects (e.g. climate control) of a facility but do not presently allow management of all aspects of a facility either individually or in the aggregate. Accordingly, it is desirable to provide a system and method to allow monitoring and control of every aspect of a facility by providing an easy to use computer interface. The present invention facilitates, by an easy to use “point and click” computer interface, space management, project delivery management, operations management and capital asset management thus simplifying, utilization, programming, design, construction, operations, planned maintenance, user requested needs, repairs, retrofits upgrades, improvements, replacements, and space planning. The invention also simplifies due diligence studies, condition assessment of properties, testing and repair programming, preparation of cost estimates, project program management, construction documents, construction management, construction, management & training, information technology (it) management, storage, and hardware & training. In operation, all or part of any aspects or characteristics of a facility (i.e. any man made structure) or group of facilities are measured, collected, and/or input into a computer database or computer memory. Thus, all characteristics may be grouped or filtered and viewed by intuitive graphical and/or textual interfaces. These characteristics can be manipulated in real time or simply observed to gain understanding. For example, a user who owns or manages several office buildings may view energy usage in real time. The usage may be expressed in units of energy or the cost of the energy. Having a thorough knowledge of the energy usage of individual as well as aggregate properties can allow users to make informed purchases of energy. Deregulation of utilities allows bulk purchases of energy. Understanding the energy usage of properties can help decisions to purchase off peak energy. Another example illustrates viewing a building by temperature zone (the area controlled by a given thermostat). The user can identify areas where energy is being unnecessarily used. Another example illustrates a user viewing all electrical motors by size (horsepower), age, location, or energy usage (kWhrs). The user can preclude problems by early diagnosis of need of replacement or preventive maintenance. The invention can provide a database of motor dealers or repair facilities matched to the motors. The user can place orders online for new equipment or order repair services. The invention allows users to view actual Arial or street view photographs of buildings. In contrast, buildings can be viewed as virtual images using colors to distinguish given characteristics such as areas (e.g. shipping and receiving, lobby, offices, etc.) The invention provides a way to view complete, and up date, building schematics (drawings). The drawings can be viewed by electrical, mechanical, architectural, plumbing, etc. Doing so is advantageous and can assist in the addition or repair of equipment, law enforcement, or firemen, to name a few. The invention can provide a complete inventory of all equipment. The equipment may be categorized. For example, energy using equipment vs. furniture. The equipment can be subcategorized and further sorted and grouped by energy used, type of energy, capital cost, and operational cost. The invention is advantageous in that equipment can be viewed in multiple buildings. The age of the equipment, as well as other historical data, can be viewed. Thus, users may take advantage of bulk discounts by identifying equipment needing replacement and order larger quantities. Other benefits include cost savings, asset lifecycle modeling, accountability, transparency, accessible via internet or wireless networks, custom tailored to meet client needs, can easily switch between properties saving time and costs, integrates all the building management functions such as leasing, work orders, operations, repair and maintenance into one click easy to use tool, the program is tailored to meet customers buildings, requirements and needs, the facility management tool is engineered for each customer to manage their daily information needs in a “click easy” format using interactive 3d virtual graphics with 24/7 access either on site or remotely via internet or other types of networks (cellular, wwan, wlan, etc.). One example of a preferred embodiment (this example is for illustrative purposes and as such is only one of many uses) of the present invention comprises a property management company having a user that logs in to a website using name, password and/or other parameters. Upon login, the user is presented with an account list. An “Asset list” and “Asset map” are provided for each account. The Asset map comprises a graphical geographic map with indicators or flags showing each location for each company. Geographic regions (e.g. Midwest) are color coded. The user may click on a region. The Asset list comprises textual listings of “regions”, “facilities”, and “buildings” for a given account. Each account represents a different company. Each company has multiple locations. Each location can have multiple buildings that can be manufacturing or process facilities. The user clicks (the definition of “clicks” or “click” as used herein is defined as, in addition to dictionary and normal usage, as using the mouse or similar input device on a computer relative to a graphical user interface to create a software event) on one account thereby causing the asset map and asset list to show locations and buildings for that account. The map displays textual information about each flag on mouse-over. The term “mouse-over” is defined as, in addition to dictionary and ordinary meanings, as the graphical image of the mouse cursor moving over a region of the graphical user interface. The user may click on either one of the flags of the map or the textual listings of buildings or locations. By using the above method, the user eventually selects a specific site which may have several buildings. The user may then view site specific information in textual or graphic form. The graphical form comprises actual photos or graphical renderings. The user may graphically manipulate the image by using the mouse to rotate, zoom, or pan the image. Thus, different sides or sections of a building may be viewed. The user may click on any exterior facade of the building to display specific information. The user may zoom in and through walls to display inner rooms and equipment. The user may click on any piece of equipment, wall, or other structure to display information. Information that is displayed comprises physical characteristics, maintenance, proposals, reports, drawings (schematics, or other), projects (e.g. motor replacement), funding sources or any other information deemed important. The user may modify the data displayed or add new data or delete existing data.
1. Introduction {#sec1-1} =============== Depth-resolved microscopy shows great promise in the fields of biology and medicine. The ability to optically scan through layers of cells makes available histological information that would otherwise be obtained only through tissue biopsy. Experiments in depth-resolved tissue spectroscopy and imaging have shown that confocal and multiphoton fluorescence and harmonic generation microscopy techniques can effectively be used in cancer detection and diagnostics \[[@r1]--[@r3]\]. Efforts have been made to incorporate these techniques into fiber probes for clinical application \[[@r4]--[@r7]\]. Scan speed is an important factor in *in vivo* microscopic imaging to reduce motion artifacts introduced by the sample movement. In a typical point-scanning depth-resolved microscope, the lateral dimensions are scanned using galvanometer mirror scanners at line rates of several kHz. Miniaturized MEMS scanners and piezo-electric scanners have been used for lateral scanning in miniature, flexible fiber probes \[[@r5]--[@r7]\]. The axial dimension in a typical microscope is scanned either by moving the sample relative to the output optics of the system or by moving a lens within the optical system. Because of the necessary movement of a bulk object, axial scanning is typically much slower than lateral scanning in a conventional microscope. There are currently several techniques for higher speed depth-resolved axial scanning. For table-top multiphoton microscopy, a second, identical objective focused onto a small mirror may be placed optically conjugate to the main objective and sample. The mirror may be translated axially at high speed due to its small size, resulting in an axial scan of the focus on the sample \[[@r8]\]. Another method is to place a deformable mirror or spatial light modulator conjugate to the back focal plane of the imaging objective for arbitrary beam pointing and focusing \[[@r9]\]. These techniques are effective, although expensive and complicated. More importantly, since electronics and mechanical moving parts are required near the sample, they cannot be readily miniaturized or incorporated into a flexible fiber probe. While high speed axial scanning is routinely achieved in optical coherence tomography (OCT) fiber probes \[[@r10]\], OCT does not provide the chemical specificity and spectral information offered by confocal and multiphoton techniques. The temporal focus in a simultaneous spatial and temporal focusing (SSTF) setup can be remotely scanned by modulating the group delay dispersion (GDD) of the excitation pulse at the proximal end of a delivery fiber \[[@r11]--[@r13]\]. No moving parts or electronics are required at the distal end. However, previous demonstrations of axial scanning with SSTF are either at too slow a scanning speed or too small an axial scanning range for practical application. In Durst *et al.* \[[@r13]\], GDD tuning is achieved by moving bulk glass prisms on translation stages, severely limiting the maximum scanning speed. In Du *et al.* \[[@r14]\], acousto-optic deflectors are used to achieve high-speed GDD tuning. However, the small GDD tuning range limits the axial scanning range to only a small fraction of the axial resolution (i.e., axial full width half maximum). In this paper, we present high speed, chemically specific, large range axial scans of mouse tissue using GDD tuning in an SSTF setup. The technique we report is enabled by a novel dispersion modulation device based on a folded grating pair and a piezo-bimorph mirror. The large GDD tuning range (over 5x10^5^ fs^2^) provided by the dispersion modulation device allows for a large axial scan range, with over 16 independently resolvable depth sections at a scan speed of 200Hz. The excitation pulses are delivered through a single-mode fiber, demonstrating the potential for future integration in a miniaturized fiber probe. 2. Simultaneous spatial and temporal focusing {#sec1-2} ============================================= SSTF is a multiphoton technique in which a diffraction grating is imaged onto the sample, creating a wide-field, temporal focus ([Fig. 1b](#g001){ref-type="fig"} Fig. 1Experimental setup for remote axial scanning. The group delay dispersion (GDD) of a femtosecond pulse is modulated by (a) a piezo-bimorph mirror in a folded 4-f grating pair setup. The GDD modulated pulse is coupled into a single-mode optical fiber. The output of the fiber undergoes (b) simultaneous spatial and temporal focusing (SSTF), in which a grating is imaged onto the sample forming a wide-field temporal focus. The sample emission is collected by the PMT detector assembly and correlated with the piezo-drive voltage.) \[[@r11],[@r12]\]. The grating separates the spectral components of the pulse in space, causing the pulse width to vary as a function of axial position. For a transform-limited pulse, the minimum pulse width is recovered at the image plane of the system. Away from the image plane the pulse width broadens quickly. Because two-photon response is inversely proportional to the pulse width, an effective temporal focus is created at the image plane, providing axial confinement of the signal. Axial scanning of the temporal focus by changing the GDD of the excitation pulse was experimentally shown and theoretically explained by Durst *et al.* \[[@r13]\]. The axial two-photon response of a SSTF system is given approximately by: T P E ( z ) = C \[ 1 \+ ( f − z \+ β Ω 2 z R z R ) 2 \] 1 / 2 with z R = 2 f 2 k ( s 2 \+ α 2 Ω 2 ) where C is a constant, *f* is the focal length of the objective lens, 2*β* is the GDD of the excitation, $\sqrt{2\ln 2}\Omega$ is the full width half maximum (FWHM) of a Gaussian excitation spectrum, *k* is the mean magnitude of the excitation wave vector, and *s* and *α*Ω are the monochromatic and full-spectrum spot sizes at the back aperture of the objective lens. The two-photon signal is axially confined, with a FWHM given by $2\sqrt{3}\mspace{2mu} z_{\text{R}}$. The position of the two-photon signal peak varies with the GDD. It can be shown from [Eq. (1)](#e1){ref-type="disp-formula"} that the displacement of the peak, Δ*z*, is given by Δ z = β Ω 2 z R By modulating the GDD of the excitation pulse, the temporal focus may be scanned over a range determined by the optical parameters of the system and the total available GDD. 3. Group delay dispersion modulation with a piezo bimorph mirror {#sec1-3} ================================================================ To effectively use SSTF in an axial scanning setup, a method of modulating GDD over a large range at high speed is required. Typical methods for dispersion tuning include prism pairs and grating pairs \[[@r15],[@r16]\], but their tuning speed is limited by the mechanical translation of these bulky optical elements. Electronically adjustable devices, such as acousto-optic modulators (AOMs) \[[@r17]\], spatial light modulators (SLMs) \[[@r18]\], and deformable mirrors \[[@r19],[@r20]\], can achieve programmable and high-speed dispersion tuning. These programmable devices can generate spectral phase of nearly arbitrary shape but at a high cost and with a limited GDD tuning range. In addition, their ability to generate higher-order dispersion is unnecessary, since tuning of the second-order group-delay dispersion is sufficient for remote axial scanning. We demonstrate a GDD tuning device using a single piezo-bimorph mirror at the Fourier plane of a 4-f grating pair setup. Piezo bimorphs assume a quadratic shape with an applied voltage, allowing for large curvatures with high-speed electronic control \[[@r21],[@r22]\]. While pulse shaping using a piezo bimorph with multiple electrodes to independently address multiple sectors of the actuator has been demonstrated in the past \[[@r23]\], the use of a single piezo bimorph not only makes the device cost-effective but also provides large quadratic curvatures (i.e., GDD tuning range), avoiding both fabrication complexity and stroke limitations of multi-element deformable mirrors. Our device is low cost, robust (high damage threshold), high speed, and has a large GDD tuning range of more than 10^5^ fs^2^ over a broad range of wavelengths. The experimental setup of the GDD tuning device is shown in [Fig. 1 (a)](#g001){ref-type="fig"}. A ruled diffraction grating (1800 lines/mm) spectrally separates the beam from a mode-locked Ti:Sapphire laser (*λ*~0~ = 775 nm, Δ*λ* = 8 nm), which is then collimated by a spherical lens with a focal length of 30 cm. At the focal plane of the collimating lens, we place a piezo bimorph (T220-A4-503X, Piezo Systems, Inc.). The center of the piezo bimorph is fixed, allowing it to bend both forwards and backwards. A 380-micron thick pre-polished silicon wafer (University Wafer) is coated with gold to serve as a reflecting mirror, and it is mounted onto the piezo bimorph with double-sided Scotch tape as spacers. The piezo bimorph is driven by a function generator combined with a linear amplifier. The bending of the piezo bimorph can be described by \[[@r21],[@r22],[@r24]\]: y = − 3 d 31 2 T 2 V x 2 where *y* is the axial displacement of the piezo, *x* is the lateral position of the piezo with respect to the optical axis, *V* is the applied voltage, *d*~31~ is the piezoelectric coefficient, and *T* is the total thickness of the piezo. The difference in path length traveled by an individual monochromatic component is 2*y* due to the double pass configuration. The grating maps the individual frequency components, *ω*, to distinct lateral positions, such that for small spectral bandwidth, *x* = *α*~D~*ω*. The quadratic path length difference is then mapped to quadratic spectral phase, or GDD: 2 k y = 1 2 GDD   ω 2 = 1 2 GDD ( x α D ) 2 where *k* is the wavevector corresponding to the center wavelength *λ*~0~. From [Eqs. (4)](#e4){ref-type="disp-formula"} and 5, the GDD at a driving voltage *V* is then: GDD = − 12 π λ 0 d 31 α D 2 T 2 V [Equation (6)](#e6){ref-type="disp-formula"} shows that both normal and anomalous dispersions can be obtained in the same setup by changing the sign of the drive voltage. For example, for typical values *V* = 100 V, *d*~31~ = 1.9x10^−10^ m/V, *T* = 0.51 mm, *α*~D~ = 2.84x10^−16^ m/Hz, and *λ*~0~ = 775 nm, the corresponding GDD will be 2.8x10^5^ fs^2^. To determine the GDD imposed on the pulse experimentally, we measure the pulse width of the beam exiting the folded grating pair using an interferometric second-order autocorrelator. The nonlinear element is a GaAsP photodiode. The beam is coupled out of the GDD device with a 50/50 beam splitter. A 100-fs pulse can be broadened to 4.2 ps by varying the drive voltage between +/− 100V ([Fig. 2](#g002){ref-type="fig"} Fig. 2(a) Plot of measured GDD versus piezo-drive voltage. (b)-(d) Second-order interferometric autocorrelation traces of a 100 fs pulse at piezo drive voltages of (b) 100 V, (c) −10 V, (d) −100 V.). Assuming a sech^2^ shape of the spectrum, the piezo-bimorph mirror produces a GDD of +/− 2.5x10^5^ fs^2^, varying approximately linearly with voltage, and agreeing well with theory ([Eq. (6)](#e6){ref-type="disp-formula"}. The device can be modulated at rates up to 100 Hz with no reduction in tuning range. The tuning range increases beyond 100 Hz as the piezo-bimorph mirror approaches its mechanical resonance (160 Hz), though we did not operate the device in this regime in order to prevent mechanical damage. 4. Axial scanning SSTF through a fiber {#sec1-4} ====================================== We use the GDD tuning device described above to perform remote axial scanning through a single mode fiber with SSTF. The experimental setup is shown in [Fig. 1](#g001){ref-type="fig"}. The Ti:Sapphire laser is tuned to 755nm with spectral bandwidth of 8.5nm (full width half maximum). After the dispersion tuning device ([Fig. 1a](#g001){ref-type="fig"}) the pulse is coupled into an air-core photonic bandgap fiber (Crystal Fibre, AIR-6-800), which has a nominal zero-dispersion wavelength of 754nm. The output of the fiber is collimated and incident on a 1200 lines per mm diffraction grating at 65 degrees such that the first-order diffraction angle of the center wavelength is normal to the plane of the grating. The diffracted beam is collimated by a spherical lens with a 40-cm focal length, and refocused onto the sample with an objective lens. Emission from the sample is reflected by a dichroic mirror and detected by a photomultiplier tube (PMT). A function generator provides a sinusoidal signal used to modulate the piezo-bimorph mirror and to provide a trigger for photon counting of the PMT signal. The PMT signal is then correlated with the piezo-drive voltage, which is proportional to the change of GDD in the system and thereby the axial displacement of the temporal focus ([Eqs. (3)](#e3){ref-type="disp-formula"} and (6)). Because the temporal focus scans both forward and backward in one voltage cycle, the axial scan rate is twice the modulation rate of the GDD. The triggering setup allows multiple axial scans to be averaged in real time to improve the signal-to-noise ratio. A cover slip coated with a 0.5-micron film of fluorescent dye (Rhodamine B) is used as a test sample to calibrate the system. The sample is placed on a translation stage, and can be stepped axially through the temporal focus. The two-photon fluorescence signal is measured vs. the piezo-drive voltage for a number of fixed sample positions ([Fig. 3a](#g003){ref-type="fig"} Fig. 3a) GDD axial scans of a Rhodamine B film of 0.5µm thickness. Two-photon fluorescence signal is plotted against the piezo-drive voltage. The film is moved 50µm between scans. b) Mapping of temporal focus position and relative two-photon signal strength to piezo-drive voltage.). Since the peak of each GDD scan corresponds to the sample position, the axial scan traces in [Fig. 3](#g003){ref-type="fig"} allow us to generate a mapping between the piezo-drive voltage and the position of the temporal focus setup ([Fig. 3b](#g003){ref-type="fig"}). From this mapping we also extract the range and resolution of the remote scanning. We were able to extend the voltage range to +/−160V before two-photon signal strength dropped by more than a factor of two. This loss in signal is due largely to the range limit of remote axial scanning using SSTF, which was predicted in previous theoretical work \[[@r13]\], as well as variation in coupling efficiency into the single-mode fiber, measured to have a root-mean-square variation of about 10% over this voltage range. The data shown in [Fig. 3](#g003){ref-type="fig"} was taken with an objective lens with a nominal focal length of 8 mm. We measure an axial scan range of 360 µm with a resolution of 22 µm (FWHM). These results show that approximately 16 independently resolvable axial sections can be obtained in our setup. As shown in previous theoretical work, larger or smaller ranges, and correspondingly higher or lower resolutions, may be obtained by changing the focal length of the objective lens \[[@r13]\]. For example, with a nominally 18-mm focal length objective lens, we measure an axial scan range of 1450 µm with a resolution of 75 µm. With a nominally 3-mm focal length objective lens, we measure an axial scan range of 60 µm with a resolution of 3.8 µm. To demonstrate feasibility in a biological sample, we perform axial scans of excised mouse skin. The multiphoton spectral signal of mouse skin is well characterized by Palero and Gerritson *et al.* \[[@r25]\]. The first fifteen to twenty microns of tissue comprise the epidermis, where multiphoton signal is dominated by intrinsic autofluorescence of cellular molecules, such as keratin and NADPH, in the 450 nm to 600 nm range. Beneath the epidermis is the dermis, which is primarily composed of structural proteins such as collagen and elastin fibers which give a strong second harmonic signal at one half the excitation wavelength (377.5 nm for excitation at 755 nm). In this experiment we use a nominally 2.7-mm focal length water-immersion objective. The excitation wavelength is 755 nm and the pulse width is approximately 100 fs. The incident average power is 72 mW. We collect the signal with two separate PMT channels, one covering the 355 nm -- 400 nm range targeting second harmonic generation, and the other covering the 500 nm -- 650 nm range targeting autofluorescence. Remote axial scanning is performed by leaving the sample stationary and scanning the temporal focus by modulating the GDD. The thin film characterization data is used to generate a position axis from the piezo-drive voltage and to correct for variations in the two-photon response at different positions of the temporal focus. For comparison, we also acquire an axial scan of the tissue by mechanically stepping the sample through a stationary temporal focus with a translation stage. The results are shown in [Fig. 4](#g004){ref-type="fig"} Fig. 4Axial scans of mouse skin. Axial scan taken by moving the sample through the temporal focus with a translation stage is shown in (a). Axial scans by GDD modulation at 10 Hz and 200 Hz are shown in (b) and (c). The 500 nm to 650 nm channel shown is in red. The peak is produced by autofluorescence in the epidermis. The 355 nm to 400 nm channel is shown in blue. The signal is strongest in the deeper, fibrous tissue of the dermis, producing second harmonic generation.. An axial scanning speed of 200 Hz is achieved ([Fig. 4c](#g004){ref-type="fig"}), sufficient for overcoming motion artifacts for future *in vivo* imaging of live tissues. The epidermis and dermis are clearly seen in the autofluorescence and second harmonic channels respectively, separated by about 20 microns. The GDD scans faithfully reproduce the stage scan ([Fig. 4a](#g004){ref-type="fig"}), demonstrating that remote axial scanning using GDD tuning in an SSTF setup is equivalent to a mechanical sample scan. 5. Discussion and conclusion {#sec1-5} ============================ In this experiment, the axial scan speed was limited to 200 Hz by the mechanical resonance of the piezo bimorph, measured to be 160 Hz. The resonant frequency can be increased significantly by reducing the size of the piezo-bimorph mirror, allowing for faster scan speeds. The ultimate limitation on the scan speed is imposed by the brightness of the sample, i.e., the desired signal-to-noise ratio of the axial scan trace. As shown in our results, an adequate signal-to-noise ratio can be obtained with an axial scan rate between 10 and 200 Hz. Because a wide-field focus is necessary for SSTF to achieve a large axial scan range, the two-photon response is significantly smaller for a given excitation pulse than that for a conventional point focus. The reduction in signal generation rate is partially made up for by the increased integration time. A typical point-scanning system has a pixel dwell time on the order of 10 µs or less, whereas a SSTF system with 10 axially resolved points scanned at 100 Hz has a pixel dwell time of 1 ms, one hundred times larger. Additionally, because the focal spot in SSTF is much larger than that of a point focus, more excitation power may be delivered to the sample without causing nonlinear photodamage. Therefore, the average excitation power may be increased to further improve the signal-to-noise ratio of the axial scan. We note that one-photon absorption in the near IR (e.g., 800 nm) is typically small in biological samples. For example, optical trappings over several seconds with approximately 100 mW average power are routinely used with minimal sample damage \[[@r26],[@r27]\]. In contrast, a tenth of a second or less is sufficient for one axial scan. In special circumstances where linear absorption is a concern, the signal-to-noise ratio can be improved by increasing the excitation pulse energy without increasing the average excitation power (i.e., by reducing the repetition rate). The lateral width of the wide-field focus is dependent upon the spot size of the excitation beam on the diffraction grating and its demagnification onto the sample. A larger wide-field focus results in greater sample coverage and a longer available axial scan range, but results in decreased two-photon excitation. A smaller wide-field focus increases the two-photon excited signal over a narrower, more specific region of the sample, but reduces the available axial scan range before significant reduction in signal occurs. A more complete discussion of the impact of the lateral width can be found in Durst *et al.* \[[@r13]\]. In this experiment, the spot size on the diffraction grating was kept near 3 mm, resulting in wide-field foci of approximately 20 µm, 60 µm, and 140 µm on the sample for the objective lenses used. This choice is a trade-off between signal strength and the available axial scanning range. We believe that the demonstrated remote axial scanning technique is best suited in a passive, flexible fiber probe for multiphoton excitation of axially resolved fluorescence and harmonic generation, bridging the gap between imaging optical endoscopes and non-imaging fiber optic probes. It has all the desirable attributes of a passive fiber probe but with added axial sectioning capability. As shown previously in depth-resolved tissue spectroscopy and imaging \[[@r1]--[@r3]\], the addition of axial sectioning to a conventional fiber probe will undoubtedly improve its diagnostic capability. The collection efficiency of such a probe can be enhanced through the use of large mode area or double-clad fibers \[[@r6]\], allowing for high collection efficiency throughout the depth of focus as the focal plane is scanned. A dichroic mirror placed at an appropriate angle after the grating can redirect the two-photon signal into such a fiber without affecting the excitation beam. In summary, we have demonstrated high speed, large range, chemically specific multiphoton axial scanning of excised mouse skin through a single-mode fiber using SSTF. Because scanning is achieved by modulating GDD on the proximal end of the fiber, this technique may be implemented in a passive multiphoton fiber probe capable of producing high speed axial scans *in vivo* with no moving parts or electronics at the distal end. Such a remote scanning multiphoton probe can be an excellent compliment to existing OCT probes. An integrated SSTF and OCT passive fiber probe can be used to obtain both one-photon reflectance and two-photon fluorescence and harmonic generation signal, potentially enhancing its diagnostic capability. This work was made possible by National Institutes of Health (NIH) grant R21CA129648. The authors would like to thank Dr. Warren Zipfel for useful discussions and for generously lending equipment.
The Commons rejected proposals to keep protections for child refugees in the redrafted EU withdrawal agreement bill.Alf Dubs, the Labour peer who originally campaigned for the protection back in 2016, called it a "betrayal of Britain's humanitarian tradition"."It is very disappointing that the first real act of the new Boris Johnson government is to kick these children in the teeth," he said."It is a betrayal of Britain's humanitarian tradition and will leave children who are very vulnerable existing in danger in northern France and in the Greek islands."MPs voted 348 to 252 against the amendment, which had previously been accepted by Theresa May’s government.It guaranteed the right of unaccompanied child refugees to be reunited with their families living in the UK after Brexit.People online decried the vote, calling the decision "inhumane".One Twitter user wrote: "Christ what a spiteful selfish little country we’ve become.""Makes me feel ashamed to be British," another user added."Where is the care and compassion? Tories vote down plans to help unaccompanied child refugees. So very sad and heartless. The new, cruel Conservative Government. A bad day when the UK turns its back on child refugees. What has gone wrong?"Labour leadership hopeful Sir Keir Starmer and Lord Dubs had written to Tory MPs calling on them to vote against the prime minister's "disgraceful" change."Johnson's decision to tear up the commitment to family reunion for unaccompanied refugee children after Brexit is a disgrace," Starmer wrote on Twitter."Tory MPs should take a moral stance and force the Government to rethink its approach on this vital issue."In the Commons chamber, SNP home affairs spokeswoman Joanna Cherry urged the Government to accept the proposals."Right now, across Europe, there are thousands of unaccompanied children living in the most desperate circumstances, many of whom are separated from their families," she addressed MPs."And legal family reunion is a lifeline to these children who would otherwise risk their lives in dinghies or in the back of lorries in order to reach a place of safety with their family."For the government to seek to remove those protections now risks causing panic amongst refugee families currently separated in Europe with potentially tragic consequences," she added.Brexit minister Robin Walker has said the Government is committed to supporting child refugees."This Government is fully committed both to the principle of family reunion and to supporting the most vulnerable children. Our policy has not changed," Walker told MPs."We will also continue to reunite children with their families under the Dublin Regulation during the implementation period." The government's decision comes at a time where millions of refugee children are suffering across the world.In Syria's Yarmouk camp, dozens of Palestinian children between the ages of 10 and 16 were arrested following accusations that they had torn down a picture of dictator Bashar al-Assad, as the community fears torture in detention.Hundreds of Uighur children are both refugees and orphaned in Turkey after their parents travelled to China to visit family, never to be heard from again as Beijing forces over one million Muslims into internment camps.Amnesty launched a campaign urging the home secretary to reunite refugee families, and call on the British government to allow child refugees in the UK the right to sponsor their close family. This is essential so that they can "rebuild their lives together and help them integrate in their new community"."Expand who qualifies as family, so that young people who have turned 18 and elderly parents can join their family in the UK," the group said."Reintroduce legal aid for refugee family reunion cases so people who have lost everything have the support they need to afford and navigate the complicated process of being reunited with their families."As Johnson continues to push through Brexit, fractures within the UK are becoming clearer.In Scotland, the Holyrood parliament voted to reject the UK government's EU withdrawal bill, and the Scottish government urged MPs to withhold consent over legislation they described as "uniquely offensive to Scottish democracy". The Scottish government's Brexit secretary, Michael Russell, told MSPs on Wednesday afternoon: "England and Wales voted to leave and are leaving. Northern Ireland will have its own arrangements for a closer alignment and the right to decide their own future. "Scotland alone of the four nations voted to remain but is being forced to leave with no special arrangements or say over its future relationship with the European Union.” Both Scotland and Wales voted against giving legislative consent to the withdrawal agreement, though it is seen as a symbolic, rather than practical move.
All You Need to Know Brewery: Fat Head’s Brewery Style: IPA ABV: 7.5% Cost: $6.00 (12oz) Glassware: Tulip, Spiegelau Temp: 50°F Availability: Year Round Purchased@: Capone’s Bottle Shop Quick Take: This is like a battle between East and West Coast IPAs with the bitter, hoppy East winding up victorious. I normally like my IPAs to have a better fruit/malt presence with balanced bitterness, but I can’t fault the bitter-is-better crowd if this is one of their favs. For me, a solid IPA that I will have again any time, but at $6 a bottle, I won’t be going out of my way to add this to my regular drinking beers. Brew Facts: The hops used in Head Hunter are simply Columbus, Simcoe, and Centennial, which goes to show it’s not the complexity of a beer’s hop profile, but how the brewer uses them. Head Hunter also won two silvers and a bronze in various competitions. Fat Head started as a craft beer tap house in 1992 and only started brewing their own beers in 2009, with a location in Pittsburgh, two in Ohio, and one soon to open in Portland, Oregon. Appearance: Crystal clear amber with a few bubbles wiggling to the surface. A fluffy white head cropped up and left clusters of large bubble islands. It settled to a thin white film. No haze, no proteins, just crystal clear amber, like carbonated, melted gold. Toast the sun and admire. Aroma: The aroma here is a real treat for lovers of tropical fruit IPAs. Pineapple, grapefruit and resiny goodness fill the nostrils. There is a citrusy/lemon and pine bite that gives a sharp end to the nose. Very fruit forward with some sweet, malty undertones. Inhale and think about the flavors waiting for you. Taste/Mouth Feel: This has a fizzy carbonation, but still very drinkable. The mouth feel has some body, but doesn’t get any where near syrupy (definitely the right choice here). For as fruit forward the aroma is, the taste reveals in bitterness. Initial taste is pineapple and pine, which mixes with a heavy hand of bitter. It leaves a deep, pine tar bitterness on the tongue and in the throat. Malt sweetness is toned down and only a background element, not a featured player. After a few sips, it settles into a cycle of submerging your taste buds in IBU rich hop, dipping down to a light malt sweet back bone and ramping back up to a rippy bitter finish. It is a touch floral/soapy but no more than a hint. It does have a few fruity elements of a West Coast IPA, but the heart is the bitter-forward, IBU-centric brews of the East Coast. Head Hunter also has an interesting trait that I haven’t come across before. Instead of hiding the ABV, it takes a modest 7.5% and somehow boosts it, making for a boozy warmth. Final Thoughts: Head Hunter really surprised me, defying the expectations set by the aroma. This is like a battle between East and West Coast IPAs with the bitter, hoppy East winding up victorious. The fruity citrus and malt are wrapped up and dominated by a warm blanket of hoppy bitterness to make a metaphorical beer burrito. I normally like my IPAs to have a better fruit/malt presence with balanced bitterness, but I can’t fault the bitter-is-better crowd if this is one of their favs. For me, a solid IPA that I will have again any time, but at $6 a bottle, I won’t be going out of my way to add this to my regular drinking beers. Now possibly home brewing a clone…that’s a different matter.
on • I love 80’s toys because they contain my first real memory of using my imagination to adventure in a galaxy far, far away. When I was four years old, my family and I were living in a tiny one room apartment known around town as the “roach motel”. Thanks to my Mother, who didn’t want her son to comprehend the gravity of our impoverished situation, I was introduced to a strange visitor from another planet who could make tall leaps in a single bound. His name was Superman, courtesy of Kenner’s Super Powers. The popular action figure line of D.C. Comics heroes was launched in 1984 with the third and final series released in 1986. The yellow and blue star packaging of the collection stood out in every toy aisle. The figures were 3 ¾ inch scale with a trigger action response when the arms or legs were squeezed and came with a mini comic book featuring the character you were taking home. There were also play sets and vehicles derived from the source material and created specifically for the line. Playing with these wonderful toys filled many of my days and nights. Over time, there were new additions made to my super powered roster, including Batman, Flash, Aquaman and The Joker. We could never find the Robin figure and I didn’t care to have Wonder Woman as a part of my collection because she is a girl and girls have cooties. The Batmobile was the crown jewel of my collection. I didn’t realize it at the time, but my Mother was so happy that she could get this for me. We could barely afford the figures, so being able to get such an iconic accessory was a big deal. I recently purchased a new one on eBay because I discarded the original as a teenager, thinking I was Kool Moe Dee or something. The new one is displayed proudly in my office with Superman in the driver’s seat and Green Lantern riding shotgun. This year marks the 30th anniversary of Super Powers and the Mattel toy company has released several 6″ versions that are painted to match their vintage counterparts. I really want to get the Superman figure, but there is no yellow “S” shield on the back of the cape (even though it’s on the original figure). This is a geeky pet peeve of mine that is holding me back from making the purchase, but I know I’ll cave at some point. Even now, in my mid-thirties, I find myself waltzing down the toy aisle and looking at the contemporary toy offerings on the shelves. Super Powers will always have a special place in my heart because to me they were a touching gift from my parents that introduced me to the comic book genre that I’ve had nearly a lifelong passion for. The kid in me has a loud and commanding voice and I hope that never ends. I hope you’ve enjoyed reading my sonnet to a joyous past. Categories: The Collective
23 So.3d 896 (2009) STATE of Louisiana v. Christina HERRERA. No. 2009-KK-1783. Supreme Court of Louisiana. December 18, 2009. *897 PER CURIAM. Writ Granted. The trial court erred in granting the defense motion to suppress. A law enforcement officer may approach any person and ask simple questions without a requirement of reasonable suspicion of criminal activity. State v. Sherman, 05-0779, p. 7 (La.04/04/06), 931 So.2d 286, 291. Mere communications between officers and citizens implicate no Fourth Amendment concerns where there is no coercion or detention. Id. An officer's request for identification does not turn the encounter into a forcible detention unless the request is accompanied by an unmistakable show of official authority indicating to the person that he or she is not free to leave. I.N.S. v. Delgado, 466 U.S. 210, 216, 104 S.Ct. 1758, 1762, 80 L.Ed.2d 247 (1984); Sherman, 05-0779 at 7, 931 So.2d at 291. The distinction between a permissible encounter and a seizure was set forth in Florida v. Royer, 460 U.S. 491, 497, 103 S.Ct. 1319, 1324, 75 L.Ed.2d 229 (1983). The Court held that "law enforcement officers do not violate the Fourth Amendment by merely approaching an individual on the street or in another public place, by asking him if he is willing to answer some questions, by putting questions to him if the person is willing to listen, or by offering in evidence in a criminal prosecution his voluntary answers to such questions...." Id. The Court also noted that a permissible encounter is not converted into a seizure by "the fact that the officer identifies himself as a police officer, without more...." Id. In this case, as the defendant walked toward the police officer on a train *898 station platform, the officer identified himself, displayed his badge, and asked the defendant if she would voluntarily speak with him. There was no coercion, and she was free to decline. After receiving her consent, he asked to see her ticket, which he viewed and returned. He then asked if he could inspect her luggage. She freely agreed to these requests. The consensual encounter did not rise to the level of a seizure or even an investigatory stop. Accordingly, the ruling of the trial court, granting the defendant's motion to suppress is reversed, and the motion is hereby denied. This case is remanded for further proceedings.
Thinktank says since 2010 child poverty has risen twice as fast as official figures show Britain’s poorest 30% of households saw an end to their post financial crash recovery last year as inflation and cuts to in-work benefits outweighed wage rises to leave them as much as £150 worse off. The Resolution Foundation, an independent thinktank, said its audit of income and poverty levels for 2017-2018 found that income growth slowed for all households last year. Universal credit IT system 'broken', whistleblowers say Read more However, the lowest 30% of households found their incomes going backwards by between £50 and £150, widening the gap with middle and higher-income earners, who saw a modest rise in their living standards once benefit changes were taken into account. The report comes at a time when the government faces accusations that cutbacks to tax credits are pushing low-income families into poverty while the successor, universal credit, is technically flawed, leading to long delays and miscalculated payments. The thinktank said the drop in incomes for the poorest was modest at 0.3% but the impact was greater after a weak recovery in wages over the previous decade. A typical middle-income household saw a rise of only 0.9%, although this was the weakest since 2012, and a marked slowdown from the 1.6% rise in 2016-17, and the 2.5% average in the 10 years before the financial crisis. The top 30% of households also widened the gap with the poorest 30% but incomes at the top only rose by 0.4%. “With the middle pulling away from the bottom, child poverty is projected to have increased last year by around 3%,” the report read. “This was driven by benefit cuts that particularly hit low-income families, including the 3% real-terms fall in the value of tax credits and child benefit.” The thinktank said a wide-ranging review of child poverty showed it fell further than official figures show in the New Labour years until 2010, taking thousands more children out of poverty than previously believed, and has risen more sharply during the period of austerity over the past eight years. “Child poverty actually fell from 3 million in 1998-99 to around 1.6 million in 2010-2011 – rather than falling from 3.3 million to 2.3 million, with half a million more children taken out of poverty than official surveys suggest,” the report read. “This means the target to halve child poverty between 1998 and 2010 was almost met, rather than being missed by 600,000 children as previously thought.” Sign up to the daily Business Today email or follow Guardian Business on Twitter at @BusinessDesk Since 2010 child poverty has been rising twice as fast since as official figures show, it said. “The proportion of children in poverty has actually grown by 21% between 2011 and 2016, rather than 11%, in part because the growth is from a lower base. This has been driven by a longer-term rise in children living in poor working families, up from 30% to 39% since 2003-2004,” the report read. Adam Corlett, a senior economic analyst at the foundation, said: “Reducing child poverty has been a goal of politicians from all parties in recent decades. But our analysis shows that child poverty is likely to have risen last year and that rises since 2010 have been underestimated in official government data.”
ISAF Sailing World Cup - Melbourne was an absolutely huge and wildly successful event at St Kilda over the past week, with more than 400 boats competing in both the Olympic and Invited Classes. There were also over 200 volunteers involved with making this regatta a great one for the sailors. The 470 and Laser classes had the opportunity for a shakedown from Saturday 5 December to Monday 7 December. Mordialloc Sailing Club and Port Melbourne Yacht Club conducted the 470 Australian Championship and a Laser Warm Up Regatta off St Kilda. Many of the competitors also took the opportunity to train on the event waters over the weekend. The official World Cup on-water events kicked off on Monday 7 December, with the Bill Bell School Sprint Sailing Series conducted by Yachting Victoria and RMYS in St Kilda Harbour. There were 16 races held in frustrating conditions, as the wind dropped out frequently and changed direction for every race! Thirteen teams participated, with Woodleigh School taking out Division 1 and Albert Park College winning Division 2. Tuesday 8 December was a day off for most competitors, which is just as well as it was seriously windy. Many of the sponsors, officials, event organisers and journalists enjoyed the 300-person 'Road to Rio' function at Encore that evening: this included a sumptuous dinner, some very St Kilda entertainment of drag queens and dancing boys, and two great Q&A sessions with Andrew Plympton & Leon Wiegard (both previous AFL club chairmen and current sport administrators) as well as a fantastic group of Olympic athletes from various disciplines. Racing for the Olympic Classes commenced on Wednesday 9 December, with a beautiful day of sailing had by all competitors. The Invited Classes started the following day, Thursday 10 December, which was equally fantastic and allowed St Kilda to show off its best assets of sun, sand, and sea to our visitors. Friday 11 December saw a complete change of weather, with chilly and strong breezes from the west with light showers. The Couta Boat Challenge unfortunately had to be cancelled due to the high winds at the time of their start. The Olympic and Invited Classes were sent out for racing in a relative lull and most courses managed one race; however, they were then blown back to the beach by up to 42 knot gusts flying through all seven courses. Many of the older competitors were standing in the water off the beach helping the younger sailors retrieve their boats, which was great to see. There were a number of boats with mast damage due to capsizes in shallow water, and so a lot of fixes were required before the next day's racing. The one positive was the huge number of competitors and families crammed into the Olympic Bar for shelter - it was great to see the place buzzing! The conditions on Saturday 12 December were back to what one would expect in Melbourne in summer, with all classes catching up on missed racing from Friday. This was a very long day on the water for most of the competitors, the last of which were back on the beach around 6pm. The medal races for the Olympic Classes were all held on Sunday 13 December, with the Stadium course set up as close as possible to St Kilda Pier and the breakwater. This provided ideal viewing for spectators, who were lined up along the pier and on the grassy knoll just off the beach. There was plenty of breeze in the middle of the day to get everyone around, with very short and close racing and some new Olympians selected for Rio on the day. There was also racing for all of the Invited Classes out on the other courses, which only suffered a short delay before the sea breeze kicked in around 11am. Medals for all classes were presented on the stage on Pier Lawn. RMYS members did a great job in the always-huge and seriously competitive Optimist fleet. Event Junior Ambassador Linus Talacko finished an excellent 18th in the Gold Fleet, with other members finished in the Silver fleet - Hugo MacMillan in 23rd, Matthew Walker in 26th, Charlie Langdon in 49th, Freddie Langdon in 50th and Finn Keyes-Tilley in 52nd. Congratulations to all. RMSTA also ran very successful Discover Sailing events in the harbour all week, with several schools and many individuals having their first taste of sailing alongside some of the sport's best competitors. Hopefully this will introduce some new members and course participants to the club. The organisers were thrilled with how well the change to the new venue went, and the feedback from competitors and volunteers was overwhelmingly positive. RMYS would like to thank all of the club volunteers who gave up their time and took leave from work to assist us with this amazing event. They were: Scott Allbutt,David Allen, Roger Byrne, Peter Chapman, David Croke, Julie Davis, Tom Ely, Ross Flood, Roger Hatten, Louise Kavanagh, Dennis Livingston, Tony Lukeman, Lee McRae, Amanda Molyneaux, Michael Morse, Bruce Rogers, Peter Roome, Sabina Rosser, Terry Swalwell and Marc Tracy. If we have forgotten anyone, we apologise and please let us know. And a special thanks to Damo, Joel, and Kuki for working so hard before and during the event to make sure everything went smoothly for the event organisers, volunteers, and competitors.
"What are they talking about? Is something wrong?" Information sharing during the second stage of labor. Twenty postpartal women were shown videotapes of their second stage labors and simultaneously interviewed. During separate interviews, their 25 caregivers were also shown the videotapes and interviewed. The interviews were analyzed for major themes, one of which was sharing information during labor. Although women and caregivers appeared to agree about what information laboring women require and how it should be given, caregiver perceptions of the quality of their information giving were more positive than mothers' perceptions. Many women wanted more informational support, especially in alleviating unvoiced fears about their baby's health.
6 Top Tips to Cool Down an Overheating Laptop Laptops nowadays are more powerful and compact than ever, but these features can also bring about a serious problem — excessive heat. Laptop overheating has become one of the most common and troublesome issues for laptop users. It is possible that you are dealing with one now. There are several signs that show your laptop is or about to be overheating. First, certain areas of your laptop are so hot that you may not be able to place your hand on them for a long time. Besides, the fan of your laptop is emitting whirring noise as it is struggling to cool your laptop down. In the meantime, your computer runs much more slowly than before, and there would be error messages popping up or lines showing up on the screen. In some cases, your laptop will get BSOD (Blue Screen of Death) or just shut down itself all of a sudden. You should take immediate actions if your laptop is overheating, or your laptop will suffer from further damage. These are the methods that are useful for fixing your laptop overheating issue. 1) Restart your computer Sometimes a laptop overheating issue exists just for the time being. There may be files or programs using too much system resources temporarily. Or you have used your laptop to perform some heavy tasks for too long. Your computer needs rest. A simple restart of your laptop will sort everything out. This method is effective for temporary overheating. If you have tried restarting your laptop and the problem persists, you need to perform the methods below. 2) Ensure sufficient cooling One highly possible culprit of laptop overheating is insufficient cooling. You will need to rule out anything that can keep your laptop from getting adequate cooling. Try putting your laptop at a cool area. An air-conditioned room is an ideal place to keep your laptop cool. The vents of your computer are supposed to be cleaned and cleared. The dirt covering these vents will prevent the air from flowing in and out, and therefore results in high temperature. You will also need to place your laptop on a hard and flat surface that will be less likely to block the airflow. Soft surfaces like quilt or sofa can stop the proper airflow of your laptop and lead to overheating or, even worse, fire. If you can afford one, it is recommended that you buy a laptop cooler. It places additional fans on the bottom of your laptop and help it get enough cool air. 3) Update drivers Drivers are programs that monitor the hardware on your computer. Faulty or outdated drivers can cause various hardware issues, including overheating. You should update drivers regularly to get rid of all these troubles. Driver Easy will automatically recognize your system and find the correct drivers for it. You don’t need to know exactly what system your computer is running, you don’t need to risk downloading and installing the wrong driver, and you don’t need to worry about making a mistake when installing. You can download and install your drivers by using either Free or Pro version of Driver Easy. But with the Pro version it takes only 2 clicks (and you get full support and a 30-day money back guarantee): b) Run Driver Easy and hit Scan Now button. Driver Easy will then scan your computer and detect any problem drivers. c) Click on the Update button next to each device to download the latest and correct driver for this device. You can also hit Update All button at the bottom right to automatically update all outdated or missing drivers on your computer (this requires the Pro version — you will be prompted to upgrade when you click on Update All). 4) End tasks with high resource usage Your laptop overheating issue may also result from applications or programs that are using up your system resources and put heavy burden on your computer. These applications have excessive high CPU or disk usage. Sometimes a simple reboot of your laptop can solve these problems (as mentioned in method 1). But if it can’t you should look into Task Manager and identify every program that causes trouble. a) Right click on the empty space of the taskbar at the bottom. Then select Task Manager. b) On the Processes tab in Task Manager window, you can see a list of processes (programs or applications) running along with their system resource usage status. You should check the CPU and Memory (and Disk as well if you are using Windows 10) status and see if any of them continuously stays at an unusual high level. If that’s true scroll down to find which task is over-using these resources. Task Manager in Windows 10Task Manager in Windows 7 c) If you have found a program with high CPU, memory or disk usage, you need to find a way to calm it down. The proper method to do this is to note their names and search them on the Internet. Use Google to find out what exactly they are and find an appropriate solution to stop them from using too much system resources. 5) Reduce the CPU clock speed If you are an advanced laptop user, you may have overclocked your CPU to seek for higher performance. But an overclocked CPU is usually the culprit of laptop overheating issues. If you have just overclocked your CPU and your laptop is burning now, just undo the recent actions you have taken. Set your CPU clock speed back to default and everything will go back to normal. 6) Troubleshoot physical issues If the methods above would not help you, you may need to prepare your tools to troubleshoot problems inside your laptop. One of the most common cause of overheating is the dirt inside your laptop. Open the cover of your laptop, check the inside carefully, and clean the dust out of there. When necessary, open the heat sink so that you can thoroughly clean your laptop. You may also need to replace the faulty parts of your laptop. Check and see whether the battery, the RAM, or the hard drive of your laptop is giving out heat. They may be too old if they are overheating. If you have a new part, you can try replacing the old one with it and see if the problem resolves. If your laptop is still under warranty, it is strongly recommended that you leave all the jobs above to the manufacturer of your laptop. You can contact them and ask for further assistance. They will help you have your laptop repaired or replaced. Share with your friends and families and help them with similar problems!
Q: Certificate Authentication I am currently working on deploying a website for staff to use remotely and would like to make sure it is secure. I was thinking would it be possible to set up some kind of certificate authentication where I would generate a certificate and install it on their laptop so they could access the website? I don't really want them to generate the certificates themselves though as that could easily go wrong. How easy / possible is this and how do I go about doing it? A: What you are looking to do is called two way ssl authentication How to implement it is going to vary based on your web server. Apache Guide
Q: heatmap.2 and color key tick marks I've made a heatmap in R using heatmap.2 and the only thing I can't figure out is how to control the presence and labeling of tick marks on the color key. I have an example below. What I would like to do is have tick marks at the beginning and end of the color key to indicate the range of values (in this case 0-1), rather than 6 tick marks with labels at 0, 0.4 and 0.8. I'm sure there is a simple way to control this but I can't seem to find it. library('gplots') data <- c(0, 0.1, 0.1, 0.2, 0.2, 0.7, 0.7, 0.8, 1) matr <- matrix(data, 3, 3) heatmap.2(matr, trace="none", density.info="none") EDIT: The only fix I can find is to directly change heatmap.2 itself to accept additional arguments as this seems to be hardcoded (in my case I want to add a min and max range for the color key). Original heatmap.2 heatmap.2 <-function (...) { ... lv <- pretty(breaks) # line 362 ... } Changed to: heatmap.2 <-function (..., xMin = NULL, xMax = NULL, ...) { ... if(is.null(xMin)) lv <- pretty(breaks) else lv <- c(xMin, xMax) ... } A: The "key.xtickfun" argument is what you want. Pass a function to this argument that returns a named list whose elements will be passed to the "axis" function. In the function, I get "breaks" from the parent frame (the gplots environment), make them pretty, and keep only the first and last break, which are the min and max. Then, return a list with "at" and "labels". "at" is the values returned from the scale01 function (also from the parent frame) called on the breaks. "labels" are the labels, which should be the breaks themselves. heatmap.2(matr, trace="none", density.info="none", key.xtickfun = function() { breaks = pretty(parent.frame()$breaks) breaks = breaks[c(1,length(breaks))] list(at = parent.frame()$scale01(breaks), labels = breaks) })
Jeff Bezos Is Not Just The World’s Richest Man, as Owner of the Washington Post He is not Just Breaking News, He is Reinventing Journalism Bezos May Have Saved The Free Press (TA NEWS) Jeff Bezos is about to announce that he has purchased the iconic Public Health Service tower on Beacon Hill and will retask it as the home for the “Pacific Post Intelligencer” as the Pacific rim him of the Washington Post. . Bezos has also completed of purchased of the Post Intelligencer and will move its iconic globe and eagle logo to the top of the refurbished tower. As the Internet devastated traditional media, we were left with the ugly world of Fox News with its alternative reality and the confusing hope of the now failed model of a news aggressors, led by the Huffington Post. TV News was taken over by the entertainment divisions of Disney at al and local news papers fired staff, shrinking into irrelevance as wrappers for Wednesday’s food ads. Then came Jeff Bezos. Four years ago, now the world’s richest man, Mr. Bezos bought the Post for the fore sale price of $250 million. This is peanuts for Bezos. His motivations are not known but the results are historic. For some time the Washington Post logo with the caption “Breaking News” pops up on my phone or on the screens of CNN, MSNBC and … yes even FOX. And, I am now a PAID subscriber! Although privately held, it appears that the Post under Mr. Bezos is actually making money ! And, it has done this by expanding its staff of writers, reporters and journalists under Martin Baron, the former editor of The Boston Globe memorably portrayed in the film “Spotlight.” Last month, according to figures from comScore, The Post had 78.7 million unique users and 811 million digital page views, trailing only CNN and The New York Times among news organizations. “The published numbers speculating about our subscription and ad revenue have so underestimated the reality that it’s comical,” The Post’s chief revenue officer, Jed Hartman, told me this week. “Our digital ad revenue is in the solid nine figures,” that is, in excess of $100 million. This year, he added, “we’ll have our third straight year of double-digit revenue growth.” Of course not all the credit goes to the real billionaire. The scandals surrounding Faux billionaire Trump have certainly fed the Post’ subscription drive. Post editor Martin Baron, however,m describes a strategy that undoubtedly goes well beyond TRUMPGATE. So. my question is when is Mr. B going to buy Seattle’s iconic Public Health Hospital and retask it as the Pacific Post Intelligencer?
*On February 7, 2020, this report was posted online as an*MMWR *Early Release.* In December 2019, a cluster of cases of pneumonia emerged in Wuhan City in central China's Hubei Province. Genetic sequencing of isolates obtained from patients with pneumonia identified a novel coronavirus (2019-nCoV) as the etiology ([@R1]). As of February 4, 2020, approximately 20,000 confirmed cases had been identified in China and an additional 159 confirmed cases in 23 other countries, including 11 in the United States ([@R2],[@R3]). On January 17, CDC and the U.S. Department of Homeland Security's Customs and Border Protection began health screenings at U.S. airports to identify ill travelers returning from Wuhan City ([@R4]). CDC activated its Emergency Operations Center on January 21 and formalized a process for inquiries regarding persons suspected of having 2019-nCoV infection ([@R2]). As of January 31, 2020, CDC had responded to clinical inquiries from public health officials and health care providers to assist in evaluating approximately 650 persons thought to be at risk for 2019-nCoV infection. Guided by CDC criteria for the evaluation of persons under investigation (PUIs) ([@R5]), 210 symptomatic persons were tested for 2019-nCoV; among these persons, 148 (70%) had travel-related risk only, 42 (20%) had close contact with an ill laboratory-confirmed 2019-nCoV patient or PUI, and 18 (9%) had both travel- and contact-related risks. Eleven of these persons had laboratory-confirmed 2019-nCoV infection. Recognizing persons at risk for 2019-nCoV is critical to identifying cases and preventing further transmission. Health care providers should remain vigilant and adhere to recommended infection prevention and control practices when evaluating patients for possible 2019-nCoV infection ([@R6]). Providers should consult with their local and state health departments when assessing not only ill travelers from 2019-nCoV-affected countries but also ill persons who have been in close contact with patients with laboratory-confirmed 2019-nCoV infection in the United States. As part of CDC's Emergency Operations Center activation, CDC personnel assist state and local health departments with the evaluation of 2019-nCoV PUIs. Public health laboratories were not yet conducting 2019-nCoV testing during the period covered by this report, while awaiting Food and Drug Administration emergency use authorization for the test. (The authorization occurred on February 4[\*](#FN1){ref-type="fn"}). Therefore, all testing was conducted at CDC. A call center was staffed by a team of physicians and nurses 24 hours per day. During January 17--31, criteria used to determine whether a person was considered to be a PUI included presence of fever and symptoms of lower respiratory tract illness (e.g., cough or difficulty breathing) in addition to epidemiologic risk. Epidemiologic risk factors included history of travel from Wuhan City, close contact with a patient with laboratory-confirmed 2019-nCoV infection, or close contact with an ill PUI. Given the evolving understanding of 2019-nCoV epidemiology, testing was recommended for some persons who did not strictly meet the PUI definition, based on clinical discretion. For clinical inquiries that resulted in 2019-nCoV testing, real-time reverse transcription polymerase chain reaction testing was conducted at CDC using methods developed specifically to detect 2019-nCoV ([@R7]). For this report, CDC reviewed inquiries regarding potential 2019-nCoV PUIs received by CDC through January 31, 2020, from state and local health departments, health care providers, and airport health screening personnel. Information was compiled from call logs and PUI forms to assess source of inquiry, PUI demographic data (including age and sex), clinical information, epidemiologic risk factors, and 2019-nCoV test results. To allow for delays in specimen shipping and testing, data for PUIs for whom an initial inquiry was received during January 2020 were collected through February 4, 2020. During January 2020, approximately 30 CDC physicians and nurses responded to inquiries regarding approximately 650 persons. Testing was recommended for 256 persons ([Figure](#F1){ref-type="fig"}) across 34 jurisdictions (the jurisdictions included states, the District of Columbia, Puerto Rico, and the U.S. Virgin Islands) and was completed for 210 persons. Testing of PUIs was not always performed because alternative diagnoses were made, or symptoms resolved. Among inquiries resulting in testing, six (3%) persons were identified through airport screening, 178 (85%) in a health care setting, and 26 (12%) through contact tracing ([Table](#T1){ref-type="table"}). Among 178 persons identified in a health care setting, the type of setting was reported for 125 (70%), including 79 (63%) who were evaluated at an emergency department or hospital, 22 (18%) at a student clinic, and 24 (19%) in other outpatient care settings. A total of 115 (55%) persons tested were male, and median age was 29 years (interquartile range = 21--49 years). Seventeen (8%) were health care workers, and 48 of 129 persons with available information were reported to be college students. ![Number of persons for whom 2019 novel coronavirus (2019-nCoV) testing was recommended, by date of initial inquiry (N = 256) --- United States, January 2020[\*](#FN1){ref-type="fn"}^,†^ \<Fig_Large\>\</Fig_Large\>\ \* Confirmed cases were reported as of January 31, 2020.\ ^†^ Public announcements of a confirmed 2019-nCoV case in the United States were made on the following dates: Jan 21, Jan 24, Jan 26, Jan 27 (two cases), Jan 30, and Jan 31.](mm6906e1-F){#F1} ###### Clinical characteristics and epidemiologic risk factors among persons tested for 2019 novel coronavirus (2019-nCoV) infection (N = 210) --- United States, January 2020 Characteristic Completed 2019-nCoV testing
No.\* (%) ---------------------------------------------------------------------------------------------------- --------------------------------------- **Demographics** **Age group (yrs), median (IQR)** 29 (21--49) \<5 10 (5) 5--17 8 (4) 18--49 138 (66) 50--64 46 (22) ≥65 4 (2) **Male sex** 115 (55) **Clinical features** **Signs or symptoms** Subjective fever or measured temperature ≥100.4°F (≥38.0°C) 143 (68) Cough or shortness of breath 189 (90) **Clinical Course** Hospitalized 42 (20) Admitted to ICU 4 (2) Died^†^ 1 (\<1) **Setting where patient identified** Airport screening 6 (3) Health care setting 178 (85) Contact tracing^§^ 26 (12) **Epidemiologic risk category** Travel from China^¶^ 148 (70) Close contact with an ill laboratory-confirmed 2019-nCoV patient or a PUI in the United States\*\* 42 (20) Travel from China and close contact identified^††^ 18 (9) Other risk^§§^ 2 (\<1) **Abbreviations:** ICU = intensive care unit; IQR = interquartile range; PUI = person under investigation. \* Numbers might not sum to total because of missing data. ^†^ For this person, testing was negative for 2019-nCoV, and an alternative cause of death was established. ^§^ Additional persons who were being followed through contact tracing but initially sought treatment at a health care setting are not included in this category. ^¶^ Includes 113 persons who traveled from Wuhan City and 35 who traveled from areas of China outside Wuhan within 14 days of symptom onset. \*\* Includes 33 persons who were close contacts of an ill laboratory-confirmed 2019-nCoV patient and nine who were close contacts of PUIs. All contacts occurred within 14 days of symptom onset. ^††^ Includes four persons who traveled from Wuhan City and were close contacts of an ill laboratory-confirmed 2019-nCoV patient, 11 who traveled from Wuhan City and were close contacts of PUIs, and three who traveled from China and were close contacts of a PUI. ^§§^ Had possible contact with a laboratory-confirmed 2019-nCoV patient and were therefore tested. All 210 persons who were tested were symptomatic: 143 (68%) had subjective fever or a measured temperature ≥100.4°F (≥38°C), and 189 (90%) had cough or shortness of breath. Upper respiratory tract symptoms (i.e., sore throat, rhinorrhea, or congestion) were common and were present in nine persons who did not have cough or shortness of breath. Thirty persons were reported to test positive for another respiratory viral pathogen, including influenza or respiratory syncytial virus. Forty-two (20%) patients were hospitalized, and four (2%) were admitted to an intensive care unit. One patient was deceased at the time of notification; testing for this person was negative, and an alternative cause of death was established. Travel-related risk was identified for 148 (70%) persons, 42 (20%) had close contact with ill patients with laboratory-confirmed 2019-nCoV infection or PUIs, 18 (9%) had both travel- and contact-related risks, and two (\<1%) had possible contact with a laboratory-confirmed 2019-nCoV patient and were therefore tested. Among the 210 persons tested, 11 (5%) were found to have 2019-nCoV infection. Nine of these persons had traveled to Wuhan City; two persons had not traveled but had been in close contact with patients with laboratory-confirmed 2019-nCoV in the United States. All were symptomatic with fever (subjective or measured) or cough. Discussion ========== Quickly identifying persons at risk for 2019-nCoV is critical to slowing the potential spread of 2019-nCoV in the United States. This report describes CDC's current approach to facilitating recommended diagnostic testing of persons who might have 2019-nCoV infection. In response to the emergence of 2019-nCoV in China during a time of rapidly evolving understanding of the epidemiology and clinical presentation of 2019-nCoV infection, CDC has provided consultation regarding persons suspected of being at risk for 2019-nCoV to public health officials and health care providers throughout the United States. Epidemiologic risk factors among the 210 persons tested for 2019-nCoV were not limited to travel: 20% of PUIs tested had not recently traveled to China but reported close contact with a person being evaluated for 2019-nCoV infection. Because person-to-person transmission is expected to continue, and as further travel restrictions are implemented, it is likely that the proportion of PUIs with such contact risk in the United States will increase among all persons evaluated for 2019-nCoV. CDC mobilized early in the response and state and local health departments similarly increased capacity to provide clinical consultation regarding 2019-nCoV. The collection of clinical and epidemiologic data that described characteristics of persons tested for 2019-nCoV helped to inform changes to criteria for PUI evaluation. On January 31, 2020, CDC published updated PUI guidance ([@R8]) in response to the evolving global epidemiology of 2019-nCoV, including the rapid geographic expansion and documentation of person-to-person transmission ([@R9]). Updated guidance emphasizes 2019-nCoV testing for symptomatic persons in close contact with patients with laboratory-confirmed 2019-nCoV infection, persons returning from Hubei province in addition to Wuhan City, and persons from mainland China requiring hospitalization because of fever and lower respiratory tract illness. Additional refinements to this approach likely will be needed in the future as understanding of 2019-nCoV epidemiology continues to improve. The findings in this report are subject to at least three limitations. First, the number of clinical inquiries received by CDC does not represent all inquiries received by health departments. Second, because the primary objective of this effort was to guide a timely public health response, some clinical and epidemiologic risk factor data might be incomplete. Finally, given the limited available epidemiologic information early in the outbreak, to provide some latitude for clinical decision-making regarding diagnostic testing, the PUI definition was not strictly applied in all cases. A coordinated national effort to diagnose 2019-nCoV among persons at high risk for infection is important to facilitate appropriate management and limit transmission in the United States. CDC's website provides guidance for health care professionals on evaluating persons for 2019-nCoV ([@R10]). Clinicians should maintain a high index of suspicion for possible 2019-nCoV illness not only among persons with fever and lower respiratory tract illness who report travel from China in the past 14 days but also symptomatic persons who have had close contact with patients with laboratory-confirmed 2019-nCoV infection. Clinicians should consult their local and state health departments when they suspect possible 2019-nCoV illness to facilitate diagnosis and aid prevention efforts. ###### Summary What is already known about this topic? --------------------------------------- During a 2020 outbreak of novel coronavirus (2019-nCoV) infection, CDC provided consultation to public health officials and health care providers evaluating persons at risk for 2019-nCoV infection. What is added by this report? ----------------------------- During January 2020, CDC responded to clinical inquiries regarding approximately 650 persons in the United States and tested 210 for 2019-nCoV, one fifth of whom reported no recent travel-related risk but had close contact with a 2019-nCoV patient or a person under investigation for 2019-nCoV in the United States. What are the implications for public health practice? ----------------------------------------------------- Health care providers should remain vigilant regarding possible 2019-nCoV exposure not only among returning travelers, but also among persons in close contact with 2019-nCoV patients in the United States. Laboratory and Epidemiology Task Forces; state and local health department partners; Chris Edens, Jessica Leung, Michael Wellman, CDC; David Hyung Won Oh, Tufts University School of Medicine, Boston, Massachusetts; Sean Stapleton, Cornell University College of Veterinary Medicine, Ithaca, New York; Emily Trautner, Emory University School of Medicine, Atlanta, Georgia. <https://www.fda.gov/news-events/press-announcements/fda-takes-significant-step-coronavirus-response-efforts-issues-emergency-use-authorization-first>. All authors have completed and submitted the International Committee of Medical Journal Editors form for disclosure of potential conflicts of interest. No potential conflicts of interest were disclosed.
Heart rate variability in patients with thalassemia major. Cardiac dysfunction, including congestive heart failure and fatal arrhythmia, is a frequent cause of death among children with thalassemia major (TM). Autonomic nervous system activity typically is measured by a series of cardiovascular autonomic function tests, but these tests are unsuitable for young patients because they are invasive or complex. Heart rate variability assessment is a technique that measures the beat-to-beat variability in R-R intervals. This variability reflects changes in autonomic activity and their impact on cardiovascular function. This study examined 32 patients with TM to evaluate heart rate variability (HRV) in a preclinical phase of cardiac involvement. The study patients showed no evidence of heart failure or signs of peripheral or autonomic neuropathy. All HRV parameters were significantly reduced in the TM patient group compared with the control group. The results of this study can be interpreted as evidence of early cardiac autonomic neuropathy in young thalassemic patients. Therefore, all TM patients should be screened using HRV analysis for that complication.
Ziv-aflibercept combined with intravitreal steroid for management of peripheral exudative haemorrhagic chorioretinopathy. Peripheral exudative haemorrhagic chorioretinopathy (PEHCR) is considered a variant of polypoidal choroidal vasculopathy. It may have varried presentations and systemic associations. We present a case of PEHCR which dramatically responded to intravitreal steroid and ziv-aflibercept injection. This case not only highlights the promising role of combination therapy with intravitreal steroids and ziv-aflibercept but also the need to look for any associated systemic comorbidity.
MANCHESTER, N.H.— The political market is rendering two unambiguous trend lines: Mike Bloomberg's TV monopoly is fueling his surge into the top tier of Democratic presidential rivals, and cash-strapped Joe Biden is crashing. State of play: The billionaire and former New York mayor is achieving a critical mass in national polls and capturing the attention of the media, establishment Democrats (and Republicans) and the betting market. And the former vice president is dropping in those same metrics. The big picture: Bernie Sanders and Pete Buttigieg are the candidates to beat today in New Hampshire — but beneath the surface, the Bloomberg and Biden trends are the ones to watch. State polling and our conversations with voters and campaigns show Biden at risk of finishing here as low as fifth, behind Elizabeth Warren and Amy Klobuchar. That could imperil the firewall he's always counted on from black voters in the South Carolina primary at the end of this month. Bloomberg, who jumped in the race late, is skipping the first four states to focus on Super Tuesday and beyond. A Quinnipiac University poll out Monday found "Biden no longer dominates on the key question of electability," with 27% of national Democratic or Dem-leaning voters giving Biden the best chance of beating President Trump — a steep drop from 44% just two weeks ago. Sanders was second with 24%. Bloomberg was third with 17% — up from 9% in late January, and ahead of Buttigieg, Warren and Klobuchar. Among black primary voters, the poll found Biden's lead has dropped to 27% from 51% in December, with Bloomberg jumping to the second spot, at 22%, slightly ahead of Sanders. Meanwhile, the oddsmakers see Bloomberg in second among Democrats right now, behind Sanders. Biden has tanked in the PredictIt online market, where his shares cost 43¢ on Jan. 8 and now go for 11¢. Bernie goes for 48¢, Mike for 28¢ and Pete is 14¢. By the numbers: As Axios' Stef Kight and Alexi McCammond have reported, in Q4 Bloomberg outspent his Democratic rivals and Trump combined — and that's only going to grow. What we're hearing: At a closing rally Monday night at St. George Greek Orthodox Cathedral in Manchester, N.H., Biden told hundreds of supporters and potential supporters that he's the candidate Trump fears most. But several in the audience who admire Biden and his policies said they're still undecided and had questions about his energy and electability after watching him in debates and after his disappointing results in Iowa. "Anyone who can beat the current president, that's what I'm trying to gauge" said Tony Tortorici, 55. "And someone relatively centrist." He said he was leaning toward Buttigieg or Amy Klobuchar because he wants "more youthful ideas" and Biden "doesn't seem as energized as I would like." Rachel Chase, 44, said for her "it's between Biden and Bloomberg" because "I think they both have the most likelihood of beating Trump." She said she still leans Biden but has a growing unease. "When he first came out, I thought he was going to be an easy in" but now "it just doesn't seem that way. I worry in these debates, whether he'll be able to do well against Trump." One sign of hope for Bloomberg: Will Nickerson, 68, came to a Buttigieg rally in Milford, New Hampshire, just to see what it was like. He was a Republican for most of his life — except for the time he voted for Obama in 2008 — and he supported John Kasich in 2016. This year, he’s got his eye on Bloomberg. “Celebrity matters,” he said of what it would take to beat Trump. “At least Bloomberg can go toe-to-toe with Trump in terms of resources.” Biden deputy campaign manager Kate Bedingfield told reporters Monday morning that if this were the World Series, "I would say this is Game 2 and we're going all the way to Game 7." She acknowledged Biden is "the underdog" in New Hampshire, but said the campaign is confident that "we have the resources that we need to compete" through Super Tuesday and beyond. She said many Democrats have the “perception” that “Bloomberg is trying to buy his way to the nomination.” Between the lines: Money is a big X factor in the Democratic contest, but it cuts both ways. Wins fuel donations — that's helping Sanders and Buttigieg. Losses shake donor confidence. Biden needs money to keep going. The self-funded Bloomberg is immune from those forces. But with an anti-billionaire message at the core of Sanders' campaign, it's an open question whether the same wealth that has propelled Bloomberg's unorthodox candidacy could be an inherent disqualifier for too many primary voters. Go deeper: Bloomberg's Super Tuesday splurge
Cut me loose, mongoose The parking reserved for doctors was jammed with sparkly Mercs, BMWs and Audis. There was also a Toyota Corolla. Probably belonged to one of them Cuban doctors who come over here and take all our jobs. And our women. Bloody Cubans. I had to park a fair distance from the entrance. Hospitals are designed that way deliberately. The longer your walk, the more exercise you get. And they don’t even charge you for it. The medical profession is full of good and kind people with nothing but your best interests at heart. Speaking of which, mine was pounding savagely by the time I reached the sliding doors. Not from the 50m walk, as you might expect, but out of frustration from waiting for my 78-year-old father to catch up. When we got out of the car, he kept dropping his walking stick. “What’s happening,” I said. “You got dropsy?” He gave me the lazy eye. “Actually, yes,” he said. Turns out that dropsy is the old-time name for oedema, an accumulation of fluid in the tissue. In his case, the legs. I like to think I laughed out of nervous tension and not because there’s something wrong with me. The bottoms of his jeans are constantly damp. He drinks a glass of water and it comes out of his calves. That’s pretty hilarious when you think about it. But it gets better. His legs only leak because mongooses keep scratching him. For the last couple of years, a Durban North posse has been coming around for two meals a day. They get fish, peanuts, bananas and home-baked bread. They eat better than I do. They don’t sit on the veranda table waiting politely to be fed, like the monkeys do, but stampede into the house – up to thirty at a time – looking for my father. In the kitchen, they gather around his feet squeaking and squabbling like a furry invasion force armed with tiny teeth and insatiable appetites. If he goes to sit down, they swarm all over him. Anyone’s legs would leak if they were set upon by rampaging hordes of carnivorous mammals using their claws as crampons. I have never wanted to be a doctor. Sick people get on my nerves. I want to slap them and tell them it’s all in their head. This only really works for mental patients, though. Obviously I’m excluding myself, here. When I’m sick, I expect teams of attractive brow-moppers and solicitous murmurers working in shifts to attend to me. This is unlikely to happen and I have consequently given my body strict instructions to not fall seriously ill until I have found someone who is prepared to love me in sickness and in health without insisting on invoking the vows that inevitably sabotage the chances of it ever happening. “Hurry up, you old bastard,” I said, as my father shuffled towards the entrance. He smiled through his beard. It might have been gas. “Old bastard” was a term of endearment used by my mother who died nearly five years ago. They were married for 55 years. I doubt she meant it as a term of endearment. The day before, he had an appointment with the anaesthetist – or what might have been the anaesthetist’s assistant. Her report, emailed to my father later that day and copied to the relevant doctors, described him as “a pleasant gentleman, emaciated and unkempt”. My mother would’ve disagreed with the pleasant part and I disagreed with the emaciated bit, but I was baffled by the unkempt remark. I thought he looked pretty smart, even if he did smell faintly of monkey poo. Was there perhaps something in the medical handbooks that dealt with matters of a sartorial nature? Of course he looked dishevelled. An hour earlier, he’d been covered in mongooses. Sure, he cuts his own hair and hasn’t brushed it in 25 years, but Einstein’s hair was also a hot mess. The old bastard has been a structural engineer for nearly half a century. He has built bridges, buildings and hospitals across KwaZulu-Natal. He can quote Shakespeare, understands the ancient Greeks and knows his way around thermals when strapped into a glider. Unkempt, my ass. So through the sliding doors we went. He mumbled something about crossing the threshold from free will to destiny but I was having none of that nonsense and told him to pick up the pace. We had to get to the cafeteria before it filled up with people coming to visit the doomed. He’s a vegetarian and the menu was limited. I told him to start eating meat because time was against us. Well, not so much me. Although we never can be sure. But if I was going to have a heart attack, I couldn’t have chosen a better spot to have it in. My sister was with us. She’s done a lot to keep him company and look after him, but then she knocked over her cappuccino and instantly we were back to nine years old, shouting at each other and interrupting my father who was telling us how he had calculated the cost of the operation against his projected time left to live and had wrestled with the decision to … we didn’t understand what he was talking about. Neither of us inherited his maths brain, my feet were soaked in coffee and my sister had somehow found a way to blame me for the spillage. Then he was called to give blood, and by blood I mean money. For the next half an hour, he filled out forms and handed over his credit card. The cost of the hospital stay alone was horrendous. But not as horrendous as his decision, a few months earlier, to cancel his medical aid because they had increased the premium by what he deemed an unacceptable amount. My father doesn’t like to feel ripped off. It’s one of the reasons he interacts only with monkeys and mongooses. Off to the surgical ward, then. Five beds to a room. It was like a backpackers for sick people. Truth is, only sick people would charge those prices in the first place. How about we treat the greed disease first? Oh, look. I’ve just stumbled upon the cure for the world. And moving on. A woman arrived, wheeling something that looked like hand luggage. She assembled it and began probing his heart beat with some kind of wand. It was like an ultrasound. Nobody should have to see and hear their father’s heart beating on a screen. Or even see their father with his shirt off. It was all deeply unnatural and I had to turn away. I used those precious few moments to check if anyone in the hospital was on Tinder. They weren’t. I wonder what the surgeons are thinking tonight. There will be two of them. One is removing a kidney, one will be doing something unspeakable with the intestines. I have no idea if they’ll be doing it simultaneously or taking turns to stab and slice. At the cafeteria, I thought of offering one of my kidneys. When the bill arrived, I took care of it. Dad was so grateful that I decided not to mention the kidney. I’d be very worried if I were a surgeon with someone’s life in my hands tomorrow. I doubt I’d be able to sleep. I would toss and turn and eventually pass out just before dawn and then a hadeda would wake me up and I’d get to the hospital still a bit drunk and embarrass myself by accidentally lopping off a perfectly healthy lung. It happens. The old curmudgeon fed and watered me for eighteen years and bailed me out more than once, in every sense. I hope he wakes up.
Which team has the best chance to win Super Bowl XLVII? (Associated Press/US Presswire) Senior Sports Illustrated writer Peter King dials in to chat with Rich following one of the greatest weekends in NFL playoff history. The Hall of Fame sportswriter found himself in the enviable position of attending both the Falcons last minute comeback win over the Seahawks on Sunday and the Ravens thrilling double overtime win over Peyton Manning and the Denver Broncos on Saturday. King managed to spend time spent time with players from all four squads following the two contests and shares some of the insights he gathered in what was a spectacular weekend of NFL football. Up next is actor Rob Lowe, who last year around this time made headlines across the National Football League with a tweet about a certain (former) Colt quarterback and retirement rumors. Rich dials up Lowe to discuss the incident and to get the big time Indy fans take on Andrew Luck’s first season and find out how Lowe and his two boys are doing in the post-Manning era as Colts fan. The star of “Parks and Recreation” lets Rich in on a little more credible NFL related news this time around. Lowe and some of his NBC cast mates recently hit up Lucas Oil Stadium and shot a few scenes for this week’s upcoming “Parks and Recreation”episode with Reggie Wayne, Jim Irsay and the aforementioned Andrew Luck. You can tune in to see their cameo appearance this Thursday, January 17th at 8:30pm ET on NBC… Read → Mike Silver joins The Rich Eisen Podcast to discuss the controversial finish between the Seahawks and Packers on Monday Night Football (Ric Tapia/NFL) Yahoo! Sports NFL columnist Mike Silver dials in to The Rich Eisen Podcast to chat with Rich about the officiating debacle on the Monday Night Football contest between the Packers and Seahawks. Silver was at Century Link Field for the game and found himself front and center on the media coverage after being seen talking to a befuddled Aaron Rodgers moments after the controversial Russell Wilson … Read → Guests for part 2 include the MVP of Super Bowl XLV, as Packers quarterback Aaron Rodgers phones in to talk with Rich about the big Week 3 matchup against his NFC North divisional rival, the Chicago Bears. Rodgers also gives his thoughts on Cowboys quarterback Tony Romo’s gritty Week 2 performance in San Fran as he played with cracked ribs and a punctured lung. Up after Rodgers is the Emmy-nominated actor from the CBS drama The Good Wife as Josh Charles comes in-studio to sit down with Rich and chat about his beloved Baltimore Ravens and his disdain for the organization that packed up a Mayflower truck in the middle of the night and skipped town. If Charles’ voice sounds familiar to NFL fans, there’s good reason, he is also the voice of the spectacularly produced series by NFL Films called A Football Life. Part 2 of A Football Life: Bill Belichick airs this Thursday at 10p.m .ET on NFL Network, and the series continues throughout the season highlighting some of the legends of the game. And finally, the podcast ends with the crew doing some house cleaning and Rich getting called out by the fellas for what we’ll call ‘a breach of etiquette’. Be sure to listen all the way through because this is where the show needs your input. Check out NFL.com/richeisen to answer our poll questions for this week and help us settle some of the issues discussed on today’s show. Also, be sure to watch the TV version of the podcast that airs Thursday at 4:30p.m. ET on NFL Network. As always, enjoy and thanks for listening. Read → Rich Eisen's Top 10 Interviews Unbelievably, after a four-year run, this is the last-ever incarnation of “The Rich Eisen Podcast.” Frequently, in this business, shows like this don’t end at the host’s request or behest. Usually, shows named after the host come to an abrupt close when the host is shown the door by security while holding office belongings in a cardboard box. Thankfully, the reason why I’m shuttering this podcast after four wonderful years is because it’s turning into a daily three-hour TV show airing on DirecTV’s Audience Channel No. 239 and streaming live on the latest venture brought to you by NFL Media, the NFL Now app. NFL Now is also the home to the video archive of the show, which will also be available in audio podcast form on Podcast One as well as iTunes and virtually every other place you’ve been able to download this program over its lifespan. Best of all for our listeners, NFL Now is internationally available too. It’s truly exciting news for your humble host and my podcast compadres Chris Law and Chris Brockman, who are traveling with the show’s move to a bigger and broader platform. I started this podcast at the outset of the 2010 season because I thought there was a space in which to connect with the NFL Network fan base and have a conversation about the NFL and the entertainment world in one sitting. And I was rewarded with four years of stupendous football chatter involving fascinating figures from the gridiron and guests from across the TV, movie and music spectrum. Best yet, it did in fact get me closer to myriad football fans worldwide. I can not thank you enough for your passionate listenership. Please follow the show with us into the new horizon. We could not have done it without you. Thanks again and, as always, enjoy this listen.
Key inflammatory pathways underlying vascular remodeling in pulmonary hypertension. Independent of the underlying cause, pulmonary hypertension (PH) remains a devastating condition that is characterized by limited survival. Cumulating evidence indicates that in addition to a dysbalance of mediators regulating vascular tone and growth factors promoting vascular remodeling, failure to resolve inflammation and altered immune processes play a pivotal role in the development and progression of PH. Here, we highlight the role of key inflammatory pathways in the pathobiology of vascular remodeling and PH, and discuss potential therapeutic interventions that may halt disease progression or even reverse pulmonary vascular remodeling. Perivascular inflammation is present in all forms of PH, and inflammatory pathways involve numerous mediators and cell types including macrophages, neutrophils, T cells, dendritic cells, and mast cells. Dysfunctional bone morphogenic protein receptor 2 (BMPR2) signaling and dysregulated immunity enable the accumulation of macrophages and other inflammatory cells in obliterative vascular lesions. Regulatory T cells (Tregs) were shown to be of particular relevance in the control of inflammatory responses. Key cytokines/chemokines include interleukin-6, functioning via classic or trans-signaling, macrophage migratory inhibitory factor (MIF), but also other mediators such as neutrophil-derived myeloperoxidase. The expanding knowledge on this topic has resulted in multiple opportunities for sophisticated therapeutic interventions.
*2 + m and give y. -1 Rearrange 53*h + 17*h + 84*h to w + p*h and give p. 154 Rearrange -60 - 3*c + 13 - 5*c - 11*c + 21*c to g*c + s and give s. -47 Rearrange -2*t + 93 - 41 - 46 + 7*t**2 to the form s + o*t + w*t**2 and give w. 7 Express 12*l**4 + 22 - 11*l**4 - l**2 + 135 as f + k*l**2 + i*l**4 + u*l + g*l**3 and give i. 1 Rearrange 318 - 601 - 357 - o**2 to t*o + y*o**2 + v and give v. -640 Rearrange -v**2 + 5*v**2 + v - 2*v**3 + v**2 + 2*v**4 - 23 + 4*v**3 + 19 to s*v + o*v**3 + r*v**4 + a*v**2 + l and give a. 5 Rearrange -13*g**4 + g**4 + g**3 - 9*g + 8*g - 124 + 123 to v*g**4 + t*g + i*g**3 + d + p*g**2 and give t. -1 Express 12*o**4 - 192*o**3 + 0*o**2 + 10 + 194*o**3 - 2*o**2 as q*o**4 + m*o**2 + h*o + n + l*o**3 and give l. 2 Rearrange (-2 + 3 + 2)*((x - x + x)*(-3 - 3 + 4) - 3*x + 0*x + 4*x) + (11*x + 104*x - 5*x)*(-2 + 5 - 5) to the form j*x + v and give j. -223 Express 166*a + 159*a - 326*a + 38 + 149 as k*a + j and give k. -1 Rearrange 10*n**2 + 2522*n + 2 - 2524*n + 7*n**3 - 8*n**3 to t + a*n**2 + r*n**3 + y*n and give a. 10 Express 1 + 1089*t - 992*t + 419*t in the form v + n*t and give n. 516 Express (4*u - 8*u - 4*u + (-5 + 4 - 1)*(3*u + 0*u - 2*u))*(0*u + 0*u - 4*u) as k*u**2 + r + c*u and give k. 40 Rearrange -8*h + 494 + 39*h**2 + 10*h - 40*h**2 to the form i*h**2 + o*h + v and give o. 2 Express -21*l**3 - 62*l + 114*l - 59*l as q*l + u*l**3 + c*l**2 + r and give q. -7 Rearrange -2*f - 1 - 34*f**2 + 12*f**2 - f**4 + 25*f**2 to b*f**3 + p + t*f + w*f**4 + c*f**2 and give w. -1 Express (3*s**3 - 65*s**2 + 64*s**2 + 2*s**3)*(13*s - 7*s - s) in the form l*s**3 + o + i*s**4 + f*s + k*s**2 and give i. 25 Express 87*k + 170*k + 34 - 34 in the form n + w*k and give w. 257 Express -r**3 + 344050*r + 3*r**4 - 1 - 344050*r - 381*r**2 in the form x*r + g*r**3 + z + d*r**2 + k*r**4 and give g. -1 Rearrange 2*n**4 + 1 + 7*n**2 + 37*n**3 - 4*n + 2 - 37*n**3 - n**2 to y*n**4 + h*n + k + o*n**2 + l*n**3 and give o. 6 Rearrange -5*x**3 - 31 + 4*x**2 + x**2 - x**4 + 4*x**3 + 0*x**2 + 0*x**2 to a*x**3 + r*x**4 + k*x**2 + n + m*x and give r. -1 Express -24686*a**2 + 24694*a**2 - 12*a**3 + 2*a**3 + a in the form r*a + z + g*a**3 + f*a**2 and give r. 1 Express 107 + 115 - 278*w**2 - w - 224 as q + x*w + z*w**2 and give x. -1 Rearrange 306*m**3 - 4*m - 481*m**3 + 326*m**3 to r*m + o*m**3 + h*m**2 + z and give r. -4 Express 11646 - 83*v - 11646 in the form o*v + w and give o. -83 Rearrange 235*r - 42 + 131 - 461*r + 225*r to a*r + i and give i. 89 Rearrange 67*x + 38*x + 36*x - 10*x to t + d*x and give d. 131 Rearrange 11 - 4*t + 31*t**2 + 28*t**2 + 27*t**2 - 84*t**2 to the form i*t + a + r*t**2 and give i. -4 Rearrange (11 - 4 + 4)*(7*w + 7*w**2 + 4*w + 10 - 12*w) to t*w**2 + q*w + g and give g. 110 Express (5 - 4 - 2 + (5 - 1 - 3)*(-5 + 4 - 1) + (0 - 4 + 2)*(-3 + 2 + 2))*(2 - 51*y**2 + 20*y**2 + 22*y**2) as x*y + u*y**2 + w and give w. -10 Rearrange (-12 + 29 - 3)*(h + 4*h - h)*(-h - 1 + 1) + (-2 + 2*h + 2)*(-h - 3*h + 2*h) - 3*h**2 + 0*h**2 + 4*h**2 to y*h**2 + z*h + l and give y. -59 Rearrange 21*v**3 - 25 + 4 - 4*v**3 to o*v + q*v**2 + l*v**3 + x and give x. -21 Express 16 + 14*t - 26*t + 6*t + 8*t as y*t + d and give y. 2 Rearrange u - 1 - 2*u**3 + 1 + (3*u**2 + 0*u**2 + 2*u**2)*(336 - 39*u - 336) to the form h*u + x*u**2 + s + c*u**3 and give h. 1 Express (-3*u**2 + 12 - 12)*(-107*u - 121*u**2 + 107*u) in the form h*u**3 + w*u**4 + a + y*u + r*u**2 and give w. 363 Rearrange -1124*s + 840*s + 1686*s + 954*s to the form w + u*s and give u. 2356 Express 42 - 131*i**3 - 129*i**3 + 33 + 258*i**3 as j*i + o*i**2 + s + z*i**3 and give s. 75 Express (1 - 1 - 1)*(q**2 - 3*q**2 + 0*q**2) - 27 - 32*q**2 + 27 - 2*q in the form z + o*q + s*q**2 and give z. 0 Rearrange -2*s + 225 - 225 + 80*s**3 to the form n*s**3 + u*s**2 + o + y*s and give n. 80 Express (2*j - 2 + 2)*(3 - 1 - 4) + 11 + 16*j - 11 + 0*j - 2*j - j as n*j + p and give n. 9 Rearrange (5*z - 4*z + 0*z)*(-2*z + 2*z + 2*z) + 5*z**2 - 4*z**2 - 4*z**2 + (0 + 1 + 0)*(1064 - 121*z**2 - 1064) to the form q*z + t*z**2 + h and give t. -122 Express (-9*g**2 - 13*g**2 + 3*g**2)*(0*g + 0*g + 2*g) - 2*g**3 + 6*g - 6*g - 6*g**2 as u*g**2 + w + y*g + o*g**3 and give u. -6 Express c - 2*c + 2*c - c - 5*c + 5*c + (-3 + 3 - c)*(2 + 2 - 3) - 2*c + 1 + 98 - 64 in the form t*c + o and give o. 35 Rearrange -2*p + p + 4*p + 0 + 0 - 2*p + (-p - p + 0*p)*(-44 - 11 + 15) to the form j*p + n and give j. 81 Rearrange -3*d - 5*d + 9*d - 2 + (8 - d - 8)*(-2 - 5 + 1) to the form p*d + h and give h. -2 Express -380*t - 95*t - 335*t in the form s + j*t and give j. -810 Rearrange -d**2 + d**4 + 4*d**4 + 3 + 12*d**3 + 3*d**4 + 0*d**2 - 6*d**4 to the form t*d**3 + x*d + p*d**2 + w + v*d**4 and give w. 3 Rearrange 4*f**2 - 4*f**3 + f**3 + f**2 + f**2 - f + 2*f**3 to c + p*f**2 + x*f + l*f**3 and give l. -1 Express 11 - 1 - 2 - 124*p - 13 in the form w*p + k and give w. -124 Express -59*l**3 + 14 - 68*l**2 + 68*l**2 - 12 - 2*l as m*l + c*l**3 + x + b*l**2 and give m. -2 Express 0*l**2 + 18*l + 2*l**2 - 6*l**2 - 14*l + 2*l**2 as x + a*l**2 + b*l and give a. -2 Express 9 - 12 + 5 - 16*j as x*j + v and give v. 2 Express (g - 4 + 4)*(5*g - 4*g - 2*g)*(-123 + 123 - 24*g)*(-2 + 1 + 4) in the form d + l*g**3 + r*g**2 + q*g and give l. 72 Express -18*q + 141*q + 19*q as h + s*q and give s. 142 Rearrange (-18*s + 5*s - 7*s)*(-3 + 3 + 7390*s - 7389*s - 54*s**2) to the form l*s**3 + z + b*s**2 + i*s and give l. 1080 Rearrange -392*k - 355*k - 168*k - 166*k to q*k + j and give q. -1081 Express (-3 + 0 + 0)*((-q - 2*q + 4*q)*(-1 + 0 + 2) + 3*q + 2*q - 3*q) + 3 - 2 - 3*q + 0 as r*q + m and give r. -12 Rearrange (3*v - 3*v + v)*(3*v + 2*v - 3*v)*(24 + 14*v - 48 - 2) to w + u*v**2 + l*v**3 + k*v and give l. 28 Express -1094*o**4 - 32 + 32 - 8*o + 1095*o**4 + o**2 in the form u*o + w + d*o**3 + s*o**2 + l*o**4 and give l. 1 Express 269*h - 4*h**2 - 250*h - 6*h**2 as f*h**2 + l + p*h and give p. 19 Express 0*m**2 + 8*m**2 - 766 + 767 + 3*m**4 - 2*m**3 as y*m**3 + b*m**2 + k*m + o + z*m**4 and give o. 1 Rearrange 37*x**2 + x - 25*x - 32*x**2 to the form w*x + t + r*x**2 and give r. 5 Express (0 + 3 - 1)*(-2*k**4 + 5*k**4 - 2*k**4) + 150*k**4 + 272*k**4 + 2*k**4 in the form p + s*k**4 + v*k**2 + q*k**3 + z*k and give s. 426 Rearrange 38*a - 6*a**4 - 2*a**2 + 5232 - 2620 - 4*a**4 - 2613 to the form j*a + i*a**4 + z*a**3 + r + b*a**2 and give b. -2 Rearrange -6*w**3 + 8*w + 42232 - 42234 + w**3 to h*w**2 + l*w**3 + d*w + q and give l. -5 Rearrange (62 - 19 - 21)*(21 + 2*o - o - 3*o) + 2*o - o - 2*o to f*o + r and give r. 462 Express -393 + 552 - 288 - t - t**2 in the form h*t + u*t**2 + v and give h. -1 Express s - 2*s**3 + 18*s - 7*s - 3*s - 8*s + 67 in the form t + n*s**2 + h*s**3 + b*s and give b. 1 Rearrange -109 + q**3 + 113 + 12*q**2 - 10*q**2 + 2*q**4 to the form d + k*q**2 + i*q**4 + j*q + s*q**3 and give s. 1 Rearrange 51*z**2 + 33*z**2 - 20*z**2 to the form x*z**2 + q*z + f and give x. 64 Rearrange (j**2 + 3*j**2 - 5*j**2)*(9*j + 34 + 9 - 13*j) to the form b*j**3 + u + q*j + x*j**2 and give b. 4 Rearrange (-25*o + 45*o - 674*o)*(-o**2 + 0*o + 0*o) to the form r*o**2 + h + w*o**3 + c*o and give w. 654 Rearrange -106 - 209*c + 210 - 42*c - 105 to the form y*c + t and give t. -1 Rearrange (-285*o**2 + 40*o**2 - 9 + 9 - 664*o**2)*(1 - 2 + 0) to d*o**2 + f*o + w and give d. 909 Rearrange (l**2 + 3*l**2 - 2*l**2)*(4 - 4 + 24)*(-l - 3*l + 2*l) - 21*l**3 - 8 + 8 to r*l + z*l**3 + u + f*l**2 and give z. -117 Rearrange -d**2 - d**4 - 9 + 30*d**3 + 8 + d**2 - 2*d to m*d**2 + i + h*d + j*d**3 + t*d**4 and give h. -2 Express 14*v**2 + 4*v + 170*v**3 - 168*v**3 - 21*v**2 - 30*v**2 as i*v**3 + q + o*v**2 + x*v and give i. 2 Express 10 - 6 - 11*w**4 - 9*w**4 - w**3 + w + 17*w**4 as b*w**3 + t + n*w**4 + l*w + u*w**2 and give t. 4 Express -42*s**4 - 403*s**2 + s**3 - 10*s + 43*s**4 - 4 + 405*s**2 as o*s**2 + l*s + d*s**3 + x + y*s**4 and give l. -10 Express (1216 - 425 - 11)*(1 + 0 + 1 - 2*w**2)*(2*w - 2*w + 2*w) as z*w**2 + g*w**3 + u + x*w and give g. -3120 Express (11 + 18 + 22 + 13)*(k + 0*k - 2*k)*(-3*k**2 + 5*k**2 - 6*k**2) in the form a*k**2 + y*k + l*k**3 + c and give l. 256 Rearrange (3 - 41656*f - 2 + 41675*f - f**2)*(3*f - 3*f + 2*f) to z +
Therapy assessment in prostate cancer using choline and PSMA PET/CT. While PET with non-FDG tracers (mainly choline and Ga-PSMA) has commonly been used for restaging in men with biochemically recurrent prostate cancer, as well as for primary staging, it is only recently that a few preliminary studies have addressed the possible use of PET for monitoring the response to systemic therapy of metastatic disease, especially innovative treatments such as abiraterone and enzalutamide. This article aims to evaluate the role of PET imaging with different non-FDG radiotracers for assessment of therapy in advanced prostate cancer patients.
It is often said that Washington, DC is filled with a bunch of nerds dominated by psychopaths. Others say that politics is simply Hollywood for ugly people. These are usually said in a joking manner and often uttered after coming back from a young professional happy hour here in the swamp. Perhaps the most soulless congregation of folks ever assembled can be found at those kind of events. But it turns out that a recent study showing the population density of psychopaths could confirm anecdotal suspicions that these two areas of American life have more in common than either would like to admit. A report conducted by Ryan Murphy at Southern Methodist University found that Connecticut contained the most psychopaths per capita followed quickly by California. New Jersey and New York followed next. But our nation's capital by far had the highest level of psychopathic behavior than anywhere in the country. As Newsmax notes, “Added in the study was Washington, D.C., which ‘had a psychopathy level far higher' than any state, according to the report – albeit because it is a small, entirely urban area and not as geographically diverse as a state. "The presence of psychopaths in District of Columbia is consistent with the conjecture found in Murphy [2016] that psychopaths are likely to be effective in the political sphere," Murphy concluded in his study. (emphasis added) Murphy analyzed "levels of big five personality traits (extroversion, agreeableness, conscientiousness, neuroticism, and openness to experience) in each state," to carry out his research. "Boldness corresponds to low neuroticism and high extraversion, meanness corresponds to low agreeableness, and disinhibition corresponds to low conscientiousness," Murphy wrote. Turns out our nation's capital attracts these kind of characters in a major way. "The District of Columbia is measured to be far more psychopathic than any individual state in the country, a fact that can be readily explained either by its very high population density or by the type of person who may be drawn a literal seat of power (as in Murphy 2016)," the report says. (emphasis added) Northeast states overall contained the most psychopaths of any region. But, it is a little discomforting that the two areas of American life that impact us each day - entertainment and federal government - contain so many psychos.
NEW DELHI: The communications and IT minister Ravi Shankar Prasad has said ' Digital India ' initiative of the government is a $1 trillion business opportunity across IT and IT enabled services, telecom and electronics manufacturing.At the FICCI Frames 2016 Media & Entertainment Industry Conclave in Mumbai Prasad said Prime Minister Narendra Modi 's campaign to empower the citizens of India digitally will provide a business opportunity of $400 billion for electronics manufacturing including mobile phones, solar panels and so on.He added that another $350 billion opportunity will be presented by the IT and ITES sector and the communication services will provide business opportunity of another $250 billion."The aspirational urge of Indians is driving the digital world in a phenomenal way. And the government's job is to create an enabling eco-system for its growth." Prasad said.Speaking about various other Modi government's initiatives including Skill India, Stand-Up India, Aadhaar roll out, Make in India and Smart Cities, Prasad asid all thse initiative involved enormous use of digital technology.
805 F.Supp.2d 1236 (2011) FORT LANE VILLAGE, L.L.C., Plaintiff, v. TRAVELERS INDEMNITY COMPANY OF AMERICA, Defendant. Case No. 1:10-CV-37-TC. United States District Court, D. Utah, Northern Division. July 27, 2011. *1237 L. Miles Lebaron, Jacob D. Briggs, Lebaron & Jensen PC, Layton, UT, for Plaintiff. Jennifer H. Mastrorocco, Gary L. Johnson, Richards Brandt Miller Nelson, Salt Lake City, UT, for Defendant. ORDER AND MEMORANDUM DECISION TENA CAMPBELL, District Judge. Fort Lane Village LLC (a commercial property owner and property management company) has sued its insurance company, Travelers Casualty Insurance Company of America, for coverage of fire damage that destroyed a vacant home in Layton in October 2009. Travelers denied coverage based on a provision of the policy excluding damages resulting from vandalism occurring at a time when the insured building had been vacant for more than 60 days before the event occurred. Fort Lane asserts claims for breach of contract (for failure to pay the property damage claim), breach of the implied covenant of good faith and fair dealing (bad faith claim), negligence (failing to investigate whether the policy would provide proper coverage for the property), and unjust enrichment (premiums paid but no claim paid). Travelers moves for summary judgment on all four claims. In defense against Fort Lane's insurance coverage claim, Travelers contends that arson is included in the unambiguous term "vandalism," and that, even viewing the evidence in a light most favorable to Fort Lane, the evidence does not support any theory of causation for the fire other than arson. Travelers also contends that Fort Lane's tort and contract claims fail as a matter of law. Fort Lane filed a cross motion for partial summary judgment, in which Fort Lane addresses only the policy interpretation issue, contending that arson does not fall within the definition of "vandalism." Based on a close reading of the Policy's language and applicable case law, the court finds that Fort Lane Village's interpretation of the Policy is correct as a matter of law and so GRANTS Fort Lane Village's Motion for Partial Summary Judgment. However, Travelers is entitled to summary judgment on Fort Lane Village's claims for negligence, breach of the implied covenant of fair dealing, and unjust enrichment. Accordingly Defendant Travelers' Motion for Summary Judgment is GRANTED IN PART AND DENIED IN PART.[1] FACTUAL BACKGROUND[2] In January 2007, Fort Lane requested that Travelers add the property (208 East Gentile Street, Layton, Utah, which is adjacent *1238 to a shopping mall owned by Fort Lane) to Fort Lane's business owner's property and casualty insurance policy ("Policy"). At the time the request was submitted, the building on the property was occupied, as Fort Lane represented to Travelers. (See Fort Lane's Commercial Policy Change Request (Ex. 2 to Travelers' Combined Mem.) (listing property tenants as Wilde Arrow and Izatt Photo).) According to Fort Lane, the property was not actually added to the Policy until December 2008. (See Fort Lane's Mem. Opp'n (Docket No. 39) at 4 (stating fact without providing supporting cite).) Fort Lane renewed the Policy at the beginning of each succeeding policy period, the latest being February 1, 2009, through February 1, 2010. Beginning in May 2008, and continuing until at least 60 days before the fire, the building was vacant. Fort Lane never told Travelers that the building was vacant. Travelers never independently confirmed whether the insured property was occupied. On October 20, 2009, a fire destroyed the building. At the time of the fire, Fort Lane had paid all premiums due on the Policy. After the fire, Fort Lane submitted a notice of loss to Travelers. Travelers then hired fire inspector Jerry Thompson to perform an origin and cause inspection and issue a report on the cause of the fire. Mr. Thompson determined—after examining the property, police and fire reports, and interviewing Layton City Fire Marshal Dean Hunt—that the fire was "human caused." (See Affidavit of Jerry Thompson (Ex. 5 to Travelers' Combined Mem.) ¶¶ 9-10.) In his report, he stated: No known accidental ignition sources, including electrical and natural gas utilities were observed within the structure. The structure had been vacant for a year or longer and the utilities had been turned "off" for approximately the same amount of time. The fire patterns clearly indicate that the southeast corner bedroom, which was totally destroyed by fire, was one of the rooms of origin. Evidence of several other small non-connecting fires in the hallway and in another bedroom was observed. Fire Marshal Hunt indicated that for over a year there have been problems with either transients or juveniles entering, staying overnight and then leaving the structure. Evidence of vandalism was observed and it was apparent that the vandalism has continued to occur over a long period of time. Those individuals have not been identified by the local police or fire department. There had been plans by the city to have the house demolished. My findings agree with those of Fire Marshal Hunt that this was a human caused fire set by person or persons unknown. (Thompson Aff. ¶ 9 (emphasis added) (quoting from his report).) In a November 20, 2009 letter to Fort Lane, Travelers denied coverage for the loss for the following reason: We have completed our investigation and have carefully considered the evidence concerning the loss.... It has been determined that the fire that occurred at 208 E. Gentile in Layton Utah was the result of vandalism and malicious mischief. Unfortunately, damages resulting from this cause are specifically excluded by the terms of the policy when the building has been vacant for more than 60 days. (Denial Letter, Ex. E to Travelers' Combined Mem. (Docket No. 20).) The Policy provision upon which Travelers relied, Section A.5.d., states in its entirety as follows: We will not pay for any loss or damage caused by any of the following, even if they are Covered Causes of Loss, if the building where loss or damage occurs *1239 has been "vacant" for more than 60 consecutive days before that loss or damage occurs: (1) Vandalism; (2) Sprinkler Leakage, unless you have protected the system against freezing; (3) Building glass breakage; (4) Discharge or leakage of water; (5) "Theft"; or (6) Attempted "theft". With respect to Covered Causes of Loss other than those listed in Paragraphs (1) through (6) above, we will reduce the amount we would otherwise pay for the loss or damage by 15%. (Policy Section A. ("Coverage") 5. ("Limitations") d. (Ex. 4 to Travelers' Combined Mem.) (emphasis added).) During briefing of the motions for summary judgment, Travelers submitted the affidavit of Mr. Thompson, who quoted from his report and added the following opinion: "Based on the evidence I examined in the course of my investigation, and my experience gained in years of investigating different fires, in my opinion, the fire which destroyed the Property was caused by vandalism." (Thompson Aff. ¶ 10.) ANALYSIS No genuine dispute of material facts exist, and the court may rule as a matter of Utah law. A. The Policy's Exclusionary Provision Does Not Bar Coverage of the Fire Damage. 1. Standards of Interpretation Under Utah law,[3] the interpretation of an insurance contract is a question of law. Bear River Mut. Ins. Co. v. Williams, 153 P.3d 798, 800 (Utah Ct.App. 2006). When interpreting an insurance contract, the court must read the policy as a whole in an attempt to harmonize and give effect to all of its provisions. First Am. Title Ins. Co. v. J.B. Ranch, 966 P.2d 834, 836 (Utah 1998). If the policy language at issue is ambiguous, the court must liberally construe the language in favor of the insured. S.W. Energy Corp. v. Continental Ins. Co., 974 P.2d 1239, 1242 (Utah 1999). But if the language is not ambiguous, "the court must construe it according to its plain and ordinary meaning," First Am. Title, 966 P.2d at 836, and no presumption in favor of coverage arises. S.W. Energy, 974 P.2d at 1242. A policy may be ambiguous if it is unclear, omits terms, or is capable of two or more plausible meanings. However, policy terms are not necessarily ambiguous simply because one party seeks to endow them with a different interpretation according to his or her own interests. To be contrary, the proposed interpretation must be plausible and reasonable in light of the language used. Id. (internal citations and quotation marks omitted). See also Saleh v. Farmers Ins. Exch., 133 P.3d 428, 432-33 (Utah 2006) (re-articulating factors to use when determining whether a proposed interpretation is "plausible," and noting that the alternative interpretation must be "`based upon the usual and natural meaning of the language used and may not be the result of a forced or strained construction'" and "must be more than a conjecture but may be less than a certainty"). Travelers has the burden of proving that the Policy exclusion applies here. E.g., LDS Hosp. v. Capitol Life Ins. Co., 765 P.2d 857, 859 (Utah 1988). 2. The term "vandalism," when read in the context of the entire Policy, is ambiguous. The parties do not dispute that Policy Section A.5.d bars payment of claims when the building has been vacant for more than 60 days and the cause of loss is vandalism. The issues are (1) whether the *1240 term "vandalism" (not defined in the Policy) is ambiguous; and (2) whether "vandalism" includes arson. Fort Lane contends that the term "vandalism" is ambiguous when one considers other provisions in the Policy. Specifically, it maintains that the Policy distinguishes between "vandalism" and "fire" as two different types of covered causes of loss, and so it maintains that loss as a result of fire is a different covered loss. Furthermore, Fort Lane contends that there is more than one possible theory of causation, even considering Mr. Thompson's Origin and Cause Report. Fort Lane downplays the value of the expert report, stating that it does not rule out an accident as the cause of the fire: The report does not conclude that the fire was intentional or that it was arson,[[4]] only that it was a "human caused fire set by person or persons unknown." This conclusion does not necessarily follow based upon the information Mr. Thompson provides to support his conclusion, especially since Mr. Thompson does not conclude what the cause of the fire was; only that he thought it was human caused. (Fort Lane's Mem. Opp'n (Docket No. 39) at 2.) Then, Fort Lane suggests other possible scenarios: Possibilities that involve humans but that are not explored by Mr. Thompson could include but are not limited to, a cigarette that was not properly put out, a carelessly dropped cigarette or match, that a transient or juvenile started a fire to keep warm, and didn't put it out properly, or that sparks or coals from a fire started in a container were kicked or otherwise spread from the container. Mr. Thompson does not state that any accelerant was used, or that there was fuel strategically placed at the scene indicating that someone was trying to burn the house down. (Id.) Fort Lane does not present evidence of an expert opining on the issue of whether the fire was intentionally set or accidental. Still, Fort Lane's failure to do so is not necessarily fatal to its claim. See Young v. Fire Ins. Exch., 182 P.3d 911, 919 (Utah Ct.App.2008) ("Expert testimony was not required to establish a prima facie case that the fire was accidental."). Fort Lane points to gaps in the expert's report and relies heavily on American States Ins. Co. v. Rancho San Marcos Props., LLC, 123 Wash.App. 205, 97 P.3d 775 (2004), to support its interpretation of the Policy. As discussed below, the Rancho San Marcos court held in favor of the insured after it interpreted language that was essentially identical to the language in Travelers' Policy. Travelers, in its defense, contends that Utah follows the majority of courts that have found the term "vandalism" in similar exclusionary provisions to be unambiguous and that have interpreted its ordinary meaning to encompass a claim arising from an arson fire. Specifically, Travelers cites to Bear River Mutual Insurance Company v. Williams, 153 P.3d 798 (Utah Ct.App.2006), which held that the term "vandalism" in an insurance policy is unambiguous and includes arson. Travelers further maintains that no reasonable inferences can be drawn from the evidence to support the position that the fire damage was accidental rather than the result of vandalism (in common usage, "vandalism" means willful or malicious defacement or destruction of property[5]). *1241 Although Bear River appears to be dispositive of the issue in favor of Travelers, its holding is not as clear as Travelers contends. The opinion does not provide enough information on the policy's provisions, so it is not certain that the Bear River court's finding of no ambiguity would transfer as a matter of law or fact to the case here. The court in Bear River does hold that the term vandalism is not ambiguous and includes arson in its ordinary meaning.[6] But the Bear River court also distinguished the case upon which Fort Lane relies: American States Ins. Co. v. Rancho San Marcos Props., LLC, 123 Wash. App. 205, 97 P.3d 775, 778 (2004) (interpreting policy's use of terms fire, arson, and vandalism to mean that under the language of that policy, "arson is different from vandalism"). The Bear River court said, "We see no tension between the various terms as used in the policy, and cannot identify the type of conflicting language that has led other courts to find coverage in this situation." 153 P.3d at 801 (emphasis added) (citing Rancho San Marcos). The "type of conflicting language" to which the Bear River court refers is the language analyzed in Rancho San Marcos— language which is essentially identical to the language in the Travelers Policy. In Rancho San Marcos, the court held that the term "vandalism" in the exclusionary provision was ambiguous because the "Specified Causes of Loss" provision separately listed "fire" and "vandalism" as specific covered losses. See 97 P.3d at 777-78. The Rancho San Marcos court then construed the policy in favor of coverage. For the same reason, this court finds the term "vandalism" to be ambiguous. Faced with ambiguous language and a plausible interpretation from Fort Lane, the court construes that language in favor of the insured. See S.W. Energy Corp., 974 P.2d at 1242 ("If a policy is ambiguous, it is construed liberally in favor of the insured so as to promote the purposes of insurance."); United Capital Corp. v. Travelers Indemnity Co. of Illinois, 237 F.Supp.2d 270, 274 (E.D.N.Y.2002) (holding that because policy separately listed "fire" and "vandalism" in covered loss section, the term "vandalism" in the "vacancy exclusion" was ambiguous and so must be construed against insurer). Accordingly, the court finds in favor of coverage for Fort Lane. B. Fort Lane's Negligence, Breach of the Implied Covenant, and Unjust Enrichment Claims Fail as a Matter of Law. Although the court holds in favor of Fort Lane on the coverage issue, Travelers is entitled to summary judgment as a matter of law on Fort Lane's three remaining claims. 1. Negligence As Fort Lane concedes, its claim of negligence should be dismissed. (Fort Lane's Mem. Opp'n (Docket No. 39) at 20.) Accordingly, that portion of Travelers summary judgment motion is GRANTED. 2. Breach of the Implied Covenant of Good Faith and Fair Dealing (Bad Faith) Because the undisputed facts show that Travelers' denial of the claim is "fairly *1242 debatable," Travelers is entitled to dismissal of the bad faith claim as a matter of law. If an insurer acts reasonably in denying a claim, then the insurer did not contravene the covenant [of good faith and fair dealing]. The denial of a claim is reasonable if the insured's claim is fairly debatable. Under Utah law, if an insurer denies an "`insured's claim that is fairly debatable, then the insurer is entitled to debate it and cannot beheld to have breached the implied covenant if it chooses to do so.'" Prince v. Bear River Mut. Ins. Co., 56 P.3d 524, 533-34 (Utah 2002) (internal citations and quotation marks omitted). Whether the denial is "fairly debatable" is a question of law for the court. Young v. Fire Ins. Exch., 182 P.3d 911, 917 (Utah Ct.App.2008). Traveler's actions were completely reasonable here. Its interpretation of the Policy, although ultimately rejected by the court, is a reasonable one. Travelers acted responsibly by investigating the fire and hiring an expert to issue a report. There is no evidence that Travelers undermined Fort Lane's ability to recover under the Policy. Instead, Travelers relied on a valid expert report and other undisputed information to deny the claim. Accordingly, Travelers is entitled to summary judgment on Fort Lane's claim for breach of the implied covenant of good faith and fair dealing. 3. Unjust Enrichment Unjust enrichment[7] is an equitable remedy, and to maintain such a claim Fort Lane must demonstrate that its legal remedies are inadequate. Thorpe v. Washington City, 243 P.3d 500, 507 (Utah Ct.App.2010). "A claim for unjust enrichment is an action brought in restitution, and a prerequisite for recovery on an unjust enrichment theory is the absence of an enforceable contract governing the rights and obligations of the parties relating to the conduct at issue." Espinoza v. Gold Cross Servs., Inc., 234 P.3d 156, 158-59 (Utah Ct.App.2010). Because Fort Lane has a valid insurance contract with Travelers, its legal remedies are adequate and it is not entitled to recovery under a theory of unjust enrichment. Accordingly, that claim is dismissed. ORDER For the foregoing reasons, the court ORDERS as follows: 1. The court finds that the loss was a covered loss and the exclusion upon which Travelers relied in denying coverage does not, as a matter of law, bar coverage in this case. Accordingly, Fort Lane's Motion for Partial Summary Judgment (Docket No. 22) is GRANTED. 2. Travelers' Motion for Summary Judgment (Docket No. 19) is GRANTED IN PART AND DENIED IN PART. Specifically, Traveler's interpretation of the coverage language is erroneous as a matter of law, but Fort Lane's claims for negligence, breach of the implied covenant of good faith and fair dealing, and unjust enrichment are dismissed. 3. Plaintiffs' Motion in Limine (Docket No. 17) and Motion to Strike (Docket No. 32) are DENIED WITHOUT PREJUDICE. *1243 4. The court directs the parties to file, within 14 days of the date of this Order, a status report detailing issues, if any, that remain to be litigated. NOTES [1] Plaintiff also filed a Motion In Limine (Docket No. 17) and a Motion to Strike (Docket No. 32) concerning the expert opinion and appraisal issued by Traveler's expert, Richard Cook. Neither party relies on the expert witness evidence to argue its position in the summary judgment motions. The motions are premature and are DENIED WITHOUT PREJUDICE. [2] The facts are undisputed, so the court will not repeat them here unless they are necessary to the analysis. For a comprehensive statement of facts, see pages ii to xi of Travelers' Combined Memorandum (Docket No. 20). [3] The parties agree that Utah law governs the analysis. [4] Although the report does not contain such a conclusion, Mr. Thompson, in Paragraph 10 of his Affidavit, concludes that vandalism was the cause of the fire. [5] See Merriam-Webster On-Line Dictionary; Webster's Third New Int'l Dictionary (1971). [6] The cases finding that arson is included in the definition of vandalism in a "vacant property" exclusion generally are dealing with policies that do not spell out the distinctive covered losses, unlike the Travelers Policy. See Bear River Mut. Ins. Co. v. Williams, 153 P.3d 798 (Utah Ct.App.2006); Battishill v. Farmers Alliance Ins. Co., 139 N.M. 24, 127 P.3d 1111 (N.M.2006); Costabile v. Metropolitan Prop. & Cas. Ins. Co., 193 F.Supp.2d 465, 478 (D.Conn.2002). [7] To succeed on an unjust enrichment claim, a plaintiff must establish that it conferred a benefit on another (the "conferee"), that the conferee was aware of the benefit conferred, and that the conferee accepted or retained that benefit under circumstances that would be inequitable for it to retain the benefit without payment of the value of the benefit. Espinoza v. Gold Cross Servs., Inc., 234 P.3d 156, 159 (Utah Ct.App.2010).
The term of the incumbent President Pranab Mukherjee ends on 24/07/2017. The term of the incumbent Vice-President Hamid Ansari ends a little later, on 10/08/2017. In 2012, the elections were held less than a week before the terms ended. The electoral college for electing the President includes all elected (not nominated) MLAs and MPs of the Lok Sabha and Rajya Sabha. It is somewhat more complicated than that of the US, as MLAs of different states have different weightages determined by a complicated formula. See this for an explanation: For the Vice-Presidential election it is simpler, as the electorate consists of only the (elected) members of the Lok Sabha and the Rajya Sabha. They have a single vote each, without the complication of weightages: As we have discussed earlier, assembly elections to two major states (UP and Punjab) and three smaller states (UK, Goa and Manipur) will be held in the first few months of 2017. There may be significant changes in the party composition of the assemblies of UP and Punjab. It will be interesting to see the composition of the electoral college in July, and whether the NDA government will be able to get its preferred candidate elected. As for the Vice-Presidential election, we know that the Lok Sabha and Rajya Sabha will not change significantly so the composition of the electoral college is virtually the same now. In fact, only the one Rajya Sabha seat from Goa may change hands by the time of the Vice-Presidential election, while elections for the 9 other Rajya Sabha seats are likely to be held later in August. No serious proposals for candidates for these positions have been mentioned in the media so far. Supporters of the present NDA government often say that they are hampered by not having a majority in the Rajya Sabha. At least 10 Rajya Sabha seats are due for election according to the schedule given below. Some more may fall vacant (for instance, Mithun Chakravarthy, a TC member from Bengal, has announced his resignation a few days back). As we will see in a moment, there will be no significant change in the composition of the Rajya Sabha in 2017, regardless of the assembly elections in Uttar Pradesh and elsewhere. This table was compiled from the official website of the Rajya Sabha, from where we can deduce who will retire in 2017. Only Goa’s Assembly will have changed while Gujarat and West Bengal would remain the same at the time of the Rajya Sabha elections in July-August. In Goa, the one seat held by the INC may go to the BJP (or perhaps the AAP if something very peculiar happens). In Bengal, the 6 seats are held by the Trinamul (4), INC (1) and CPM (1). Looking at the present constitution of the assembly these seats are likely to go to the same parties (though the CPM is the only one in some danger of losing its seat). In Gujarat, the 3 seats going for election this year include 2 held by the BJP and 1 by the INC. The elections in August are likely to give the same result. So one would have to look beyond 2017 to see any significant change in the composition of the Rajya Sabha. Also, the elections for the President and Vice President are due in July and August respectively and will probably be held before the Rajya Sabha elections described above (though the results of the latter hardly matter). It may be a source of worry to the NDA that they may not have sufficient strength in the electoral college to be sure of getting their preferred Presidential candidate elected. By then, the assembly elections for UP, Punjab and 3 smaller states will have taken place and present indications are that the NDA will not gain significantly. This is also apparent for the Vice-Presidential election where the electoral college consists of the Lok Sabha and Rajya Sabha members only. So 2017 will be a year of numerous elections but, barring some completely unexpected events, they may not result in significant changes to the relative strengths of the main parties and alliances.
South Koreans took to the streets Saturday, some looking forward to a warm welcome for U.S. President Donald Trump, others to protest his imminent arrival. Trump will be the first American leader in 25 years to make a state visit to the Republic of Korea, as the South is formally known. He lands in the South Korean capital Tuesday. Trump’s visit is the second on his five-nation tour of East Asia. Even though the stop is short and sandwiched between Tokyo and Beijing, the discussions in Seoul could well be the most consequential of the trip. There are two showdowns looming. Most every analyst says the Chinese capital will be the highlight of Trump’s tour, the most important stop by far. China is undoubtedly the most powerful country the 45th president will see on his 13 days in the region, but Beijing leaders will almost certainly take their cue from what happens during the first two stops. The Chinese, like everyone else, knew in advance what would happen in Japan, where the visit was baked in. Yes, Trump’s arrival comments at Yokota Air Base in Tokyo were surprising—by denigrating “dictators” he took shots at both China’s Xi Jinping and North Korea’s Kim Jong Un—but there is little that can go wrong while he is on Japanese soil. Even before Trump left Honolulu for Tokyo, relations between Trump and Prime Minister Shinzo Abe were a “love-fest,” and they became even warmer when on Sunday the Japanese leader presented his American guest white trucker hats adorned, in Trumpian gold thread, with “Donald & Shinzo Make Alliance Even Greater.” The use of the first names evoked the friendship of “Ron and Yasu,” Reagan and Nakasone. Said Trump at dinner on Sunday, without much exaggeration: “I don’t think we’ve ever been closer to Japan than we are right now.” In contrast, America and South Korea are not particularly close at the moment. Like Japan, South Korea is bound to the U.S. by a mutual defense treaty. Unlike Japan, South Korea has a leader who does not particularly like America. In fact, President Moon Jae-in, despite what he is forced by political considerations to say in public, is perhaps the most anti-American, pro-China, and pro-North Korean leader the South has ever had, probably surpassing in this regard his old boss, Roh Moo-hyun, who governed South Korea from 2003 to 2008. In Moon’s conception of the world, South Korea should practice “balanced diplomacy” between Washington and Beijing, even though the U.S. is the only nation committed to defending the South, and China is fast arming Seoul’s arch-enemy, North Korea. So far Trump, engaging in some deft diplomacy, has boxed Moon in, preventing him from doing too much damage to the alliance. The so-called progressive South Korean leader, however, has been looking for ways to weaken ties with America, and on Tuesday he found one. Then, the South Korean and Chinese foreign ministries issued a joint statement putting a long-running feud behind them. For years, Beijing had been pressuring Seoul to prevent the deployment on South Korean soil of the Terminal High Altitude Area Defense system. When the campaign to stop THAAD, as the American-built missile-defense is known, failed, the Chinese targeted South Korean businesses operating in China, especially the Lotte Group. They also blocked imports from South Korea and limited Chinese tourism to the South. Beijing was outraged that Seoul ignored its concerns that the system’s radar would peer into Chinese airspace. Whether the THAAD radar could do that or not, Beijing’s campaign was particularly outrageous because the anti-missile system addresses a threat China had enhanced. China had directly aided, by supplying crucial equipment and probably highly advanced technology, to the North’s ballistic missile program. Beijing had also allowed, over the course of decades, Chinese enterprises to supply components, equipment, and materials to Pyongyang’s nuclear weapon’s efforts. Moon evidently took none of this hostile conduct into account. In order to obtain Tuesday’s agreement with Beijing, he apparently gave what is now known as the “Three Nos.” South Korea agreed to not host any additional THAAD batteries, not participate in an integrated missile defense system, and not join in a South Korea-Japan-U.S. alliance. As David Maxwell, a retired U.S. Army Special Forces colonel who served five tours of duty in South Korea and is now at Georgetown University, told The Daily Beast, the agreement has “alliance implications.” “President Moon,” says Maxwell, “appears to have made a unilateral decision that undermines effective military defense of the Republic of Korea and limits U.S. political-military action without any apparent or known consultation with Washington.” In short, Moon’s accommodation with Beijing was inconsistent with the alliance with America. The conservative Chosun Ilbo, in the headline of a Wednesday editorial, described Moon’s agreement with China this way: “Gov’t Has Capitulated to Chinese Bullying.” And while Moon has been making deals with Beijing behind Washington’s back, the South Korean leader has allowed subordinates to mischaracterize the command structure of alliance forces and thereby undermine the ability of the United States to defend his own country. In short, Moon’s officials have been complaining that a U.S. general would command South Korean troops in the event of a North Korean attack. “President Moon’s advisers know full well the U.S. does not have command of ROK forces,” says Maxwell, using the initials of South Korea’s formal name. “The Moon administration should explain the nature of the command relationship to the Korean people and inform them that the ROK president has equal authority and control over the ROK/U.S. Combined Forces Command. “The Military Committee ensures equal authority and control over the combined command,” says Maxwell, “and it is time for the ROK leadership to both state that in public and take equal responsibility for the combined command and the defense of the ROK.” And if Moon’s geopolitical mischief is not bad enough, trade friction between the United States and South Korea is at or near an all-time high, especially because the Korea Fair Trade Commission has, after denying procedural guarantees contained in the U.S.-South Korea Free Trade Agreement, slapped a $912.3 million fine on San Diego-based Qualcomm and imposed a forced-licensing scheme. President Trump, therefore, has a lot to talk about with Moon. The American president has every right to tell off his counterpart in public, but a rupture in the alliance will surely suggest to Chinese leaders that their troublemaking is paying dividends. And if they feel that way, they will surely become even more recalcitrant when Trump arrives in their capital. If, on the other hand, Trump can accomplish the near-impossible and get Moon to publicly renounce the Three Nos, Beijing will sit up and begin to respect American power. The discussions in Seoul, therefore, set the table for tough bargaining in Beijing. Trump now has a big incentive to accomplish the near-impossible in the showdown to come in Seoul. And the second showdown? The North Koreans are bound to do something provocative while Trump is in the South Korean capital. As Bruce Bechtol, author of North Korea and Regional Security in the Kim Jong-un Era, told The Daily Beast, “Brinkmanship is likely while Trump is on his visit.”
Swanky Shank Boys or Girls "NepTUNES" Tee Back to school, cool-- or just everyday wear, this Neptunes tee will supply what you are looking for! This item will be on a black baseball tee. We normally use American Apparel tees but they have shut their plant temporarily. So we can for sure say that we will use a black baseball tee-- but it maybe a blended black sleeve or a solid black sleeve! These AMAZING, BRILLIANTLY awesome photos were taken by: @coriwando on Instagram Payments We only accept Paypal. And we really appreciate fast payments! Unfortunately, if payment is not received within 48 hours, we will cancel the sale. The item will be relisted and available for future buyers (including you?!). If you purchase with an electronic check we can't send the items or create the items out until the check clears. This form of payment usually clears within a week (usually five business days). Shipping from United States We use economy shipping here at Swanky Shank-- that way we can save YOU money. If you would like your item(s) any sooner, please let us know and we will create a reserved listing just for you! If your items total over $50 I will automatically use priority shipping! Also I will also purchase insurance and delivery confirmation! Refunds 1. If you are not happy with your item AND IT IS NOT PERSONALIZED, please let us know via email and not via feedback. I'm fairly certain we can work out a refund or an exchange! 2. If your item is LOST/UNDELIVERABLE unfortunately we are NOT held responsible. Let us know if you want us to purchase insurance on your behalf ahead of time (usually around $2). 3. If the package is returned because of an incorrect address on your PayPal account, you are responsible for the additional shipping charge. 4. All returned items should be returned within one week of receipt. Items must be in original condition, containing no signs of wear, no traces of lotion/tobacco/etc. AND UNWASHED. Additional RUSH ORDERS: any orders needed ASAP have a 25% price increase. If I don't have any orders ahead of yours, I'll gladly waive this fee. Please convo for more details! :)
This baseball season has kind of stunk so far, quite honestly. That’s because it’s gone about as well as expected after one of the worst offseasons in memory. Freezing out free agents under the guise of emulating the Royals, Cubs, and Astros — but really just to pinch every last penny — has produced unsightly results for a number of tightwad teams (hello Orioles, Marlins, Rays, and Reds!). It also means the big bad bullies are back, as the Yankees and Red Sox are on their way to potentially-historic, nausea-inducing seasons in the American League. So what gives? It’s hard to really “root for the underdogs” here when the underdogs aren’t truly trying to win. It’s hard to root for the Evil Empires ever, because, well, it’s self-explanatory. So who (if anyone) can play the saviors in 2018? The list is slim, and things look ever grimmer when you realize that the darlings of 2017, the Astros, can’t really seem to hit anymore. Oh, and their bullpen is still really bad. I asked myself the other day what percentage chance we had for the AL champion to be someone other than the Yankees or Red Sox. The answer I came up with? 33.3%, since the Astros are the only other possible suitor. But that hope is fading fast when I watch a lineup with Carlos Correa hitting .351 and Jose Altuve hitting .333 struggling to produce in key situations. Why is a team with a world-beating, top-of-the-heap (statistically speaking) starting rotation and a lineup with marquee names only 16-9? The ‘Stros look like they don’t quite have an offensive identity yet, even as they get big contributions from less likely sources such as Josh Reddick and Brian McCann. Simply put, this looks like a World Series hangover and could last all year. The Yankees are now officially “back.” It was genuinely surprising to see them lose one game, let alone nine, with the roster (specifically the lineup) they are trotting out every night. But fattening up on the overachieving Blue Jays and overrated Twins has brought things back to reality. The Yankees are hitting on cylinders at 13-9 and figure to only keep improving from here, especially with Giancarlo Stanton slowly but surely coming around. The bullpen is too dominant to blow games they way they did on a couple occasions early on, and the rotation is solid if not spectacular. Luis Severino is one of the game’s dominant pitchers, and Masahiro Tanaka can be on a given day. The Yanks are better than the Astros, even with a rotation discrepancy. I also wish so many teams would stop tanking and selling it as a “rebuild” process like that of the Royals, Cubs, and Astros that produced the fruits of a World Series title. What the Marlins did this offseason was downright embarrassing and disgraceful, and makes people look down on Derek Jeter as an owner. Revered as a player (and rightfully so), he is not handling being the boss well at all. What should make fans even sicker (especially those who can’t stand the Yankees) is that basically any other potential owner who had bid on the Marlins had no plans to trade away the entire team, which means Giancarlo Stanton wouldn’t be in New York colluding with Aaron Judge (although he still might have ended up there later this year). Stanton, Christian Yelich (Milwaukee), Marcell Ozuna (St. Louis), Dee Gordon (Seattle) all got shipped out, and other than Starlin Castro, who was a Yankees salary dump, no legitimate resources were plugged into those holes. Jeter is running the company line that the team is still trying to win ballgames, which makes him look even worse. Kudos to Don Mattingly for getting them to even show up some days. Then again, the Fish aren’t alone. The Reds are a trainwreck that is still exploding. Talk about a team with no direction and no hope. Joey Votto’s enormous salary may be weighing them down, but he’s also the only reason the few remaining fans do show up to Great American Ballpark. And how about those Orioles? Talk about botching the future. A golden opportunity presented itself last year to offload Zach Britton to Houston, and somehow the deal fell through. Britton, a pending free agent at the end of the year, tore his Achilles this offseason. Manny Machado, another pending free agent, was providing the O’s some big trade offers, all of which they passed on. Each day that goes by with only Machado producing for the freefalling club lessens his value since that’s one less day a club will be getting his rental services. Apparently, spending a boatload on Alex Cobb was just a ruse, another Ubaldo Jimenez in the making so the team could sell its fanbase that it did the bare minimum in a year it wasn’t going to contend anyway. Baltimore’s window is officially shut. The tanking problem was acknowledged and addressed by MLBPA president Tony Clark this offseason. Top-level baseball folks are well aware that the cheaper teams can now use the Royals, Cubs, and Astros as an excuse to not spend money, and it’s eventually going to turn MLB into the top-heavy NBA where it starts to become hard to watch the same teams hogging all the glory. Yes, that trio did “tank” in a sense and was able to dig itself out of development hell, as they say in showbiz, but they are more the exceptions than the norms. Chicago and Houston in particular supplemented their young rosters with high-priced veteran talent once they started to emerge, and maybe it’s unfair to think some of these young clubs won’t do the same soon. Give the Phillies the nod for going back to spending now that their young core is starting to come around. The Braves aren’t far behind, nor are the Brewers. But there are far too many teams throwing in the towel in 2018 (and likely the next several years as well). My early World Series prediction was Red Sox-Mets. I am generally inclined to stick to that, because I believe so heavily in the “got hot and forgot” theory that should serve those two clubs well. But really, you can interchange the Red Sox or Yankees in that prediction. The National League is more open, but it doesn’t look like the Senior Circuit will prevail in the World Series this year. Maybe these predictions won’t be accurate in the end, but we certainly know which teams won’t be there.
Decreased acetylcholine content and choline acetyltransferase mRNA expression in circulating mononuclear leukocytes and lymphoid organs of the spontaneously hypertensive rat. It has been confirmed that the neurotransmitter acetylcholine (ACh) is present in blood; it is synthesized in T-lymphocytes by choline acetyltransferase (ChAT) and released upon T-lymphocyte activation. Both muscarinic and nicotinic ACh receptors have been identified on lymphocytes isolated from thymus, lymph node, spleen and blood, and their stimulation by muscarinic and nicotinic agonists elicits a variety of functional and biochemical effects, providing a strong argument that ACh synthesized and released from T-lymphocytes acts as an autocrine and/or paracrine factor regulating immune function. In the present study, we compared ACh levels in the blood, circulating mononuclear leukocytes (MNLs), thymus and spleen of spontaneously hypertensive rats (SHRs), which exhibit immune deficiencies related to the emergence of natural thymocytotoxic autoantibody, age-related decline of T-cell function and morphological changes in immune organs, with ACh levels in age-matched, normotensive Wistar Kyoto rats. In each case, ACh levels in 5-, 10- and 20-week-old SHRs were significantly lower than in WKYs. ChAT mRNA expression in MNLs was also significantly depressed in the SHRs. These results suggest that diminished synthesis and release of ACh from MNLs into blood and lymphoid organs likely reflects an immune deficiency related to T-cell dysfunction.
Q: Which particular file caused "Delayed write failed" error? I sometimes get this error when resuming from hibernation: Delayed Write Failed: Windows was unable to save all the data for the file G:\$Mft. The data has been lost. This error may be caused by a failure of your computer hardware or network connection. Please try to save this file elsewhere. I know this is caused because the hard drive (G:, an external USB drive) was (a) plugged in when I hibernated and wasn't ready at wake-up, or (b) I simply forgot to plug it when resuming from hibernation. My question is: is there any way to see which particular file/folder/etc failed to be written? The hard drive functions correctly before and after, so there seems to be no permanent damage. Is there a detailed log someplace or a utility? I've searched but found nothing. Thanks for any help! EDIT : If no such utility is found - is there a way to tell windows : "wait - check again - the drive you think was missing is back". A: $MFT (Master File Table) is the name of the file itself. It stores the main copy of the filesystem table on NTFS filesystems. Your problem is probably caused by the fact that the USB hardware is turned of at hibernation time and turned on too late in the resume. One possible solution is to check you motherboard for jumpers that allow you to switch USB power from +5V to +5VSB (this meaning the USB will always remain powered on when you turn off your computer from inside the operating system). The downside of this is that your device may also be left always on. Another solution would be to simply unplug (or turn off) the external hard disk before hibernating (not the best option, I know, but at least you'll not get the error any longer)
Joey Garrison USA Today Network - Tennessee News last week that the Bernie Sanders presidential campaign was bringing its “Feel the Bern” tour to Nashville’s Tennessee State University gave some the impression that Sanders himself would be visiting the college campus. Bernie Sanders 'Feel the Bern' rally at TSU rescheduled But that won’t be the case. The event for the Democratic presidential candidate, scheduled for Friday night at TSU after originally being set for Thursday, is instead headlined by surrogate Shaun King, a civil rights activist and journalist who recently signed on to stump for Sanders on a campaign-sponsored tour of Historically Black Colleges and Universities. Other speakers are to include Ledon Jones and Matt Kuhn and perhaps Atlanta rapper Killer Mike, according to an invitation for the event posted on the Tennessee for Bernie Sanders Facebook page. The panel talk is expected to touch on income equality, tuition-free public college and universities and a "racial justice platform." The invitation makes no mention of Sanders speaking himself. On the same night as the TSU rally, Sanders is scheduled to attend a town hall meeting in Hudson, N.H., according to a campaign news release. Sanders, a U.S. senator from Vermont who has risen in recent polls in both Iowa and New Hampshire, has nonetheless struggled to gain widespread support from minority voters, including African-Americans. That presents a tough challenge against front-runner Hillary Clinton as the campaign moves past the early-voting states and into Super Tuesday on March 1, which features primaries in Tennessee and 10 other states. In an effort to reach out to black voters, the Sanders campaign kicked off the “Feel the Bern” tour at historically black colleges and universities last week at South Carolina State University. Upon announcing the tour, though, it wasn't clear how many “Feel the Bern” events Sanders would attend. The Sanders campaign did not return a request seeking comment. Sanders remains the only Democratic candidate who hasn’t swung through Tennessee during the ongoing presidential campaign. Clinton came to Nashville and Memphis in November for a pair of rallies and a fundraiser. Democratic candidate Martin O’Malley has twice visited Nashville for fundraisers. In addition to TSU, other stops on the “Feel the Bern” tour are Alabama State University in Montgomery; Jackson State University; Florida A&M University in Tallahassee; Virginia State University in Petersburg; Howard University in Washington, D.C.; the Atlanta University Center; and Benedict College in Columbia, S.C. The Iowa Caucus, which kicks off the presidential nomination process for both parties, is on Feb. 1. Reach Joey Garrison at 615-259-8236 and on Twitter @joeygarrison .
#41e2fc hex color #41e2fc Color Information In a RGB color space, hex #41e2fc is composed of 25.5% red, 88.6% green and 98.8% blue. Whereas in a CMYK color space, it is composed of 74.2% cyan, 10.3% magenta, 0% yellow and 1.2% black. It has a hue angle of 188.3 degrees, a saturation of 96.9% and a lightness of 62.2%. #41e2fc color hex could be obtained by blending #82ffff with #00c5f9. Closest websafe color is: #33ccff.
1. Field of the Invention The present invention relates to a novel .alpha.-glycosyl derivative of a catecholamine or its salt (the wording ".alpha.-glycosyl derivative of a catecholamine or its salt" will be designated as ".alpha.-glycosyl catecholamine" hereinafter, if specified otherwise), and to its preparation and uses, more particularly, to an .alpha.-glycosyl catecholamine which does not substantially exhibit a reducing activity and turns green on the anthrone-sulfuric acid method, and to a process for preparing an .alpha.-glycosyl catecholamine, as well as to its uses, said process comprising allowing a saccharide-transferring enzyme to act on a solution containing an .alpha.-glycosyl saccharide and one of catecholamines and their salts (the wording "catecholamines and their salts" will be designated as "catecholamines" hereinafter, if specified otherwise) in order to form an .alpha.-glycosyl catecholamine, and recovering the resultant .alpha.-glycosyl catecholamine. 2. Description of the Prior Art As described in publications such as The New England Journal of Medicine, Vol. 280, No. 7, pp. 337-345 (1969); Proceedings of the National Academy of Sciences of the United States of America, No. 69, No. 8, pp. 2145-2149 (1972); and Seikagaku-Jikken Koza, titled "Metabolism of amino acids, and in vivo amines", Part B, Vol. 11, pp. 725-753 (1977), edited by The Japanese Biochemical Society, published by Tokyo-Kagaku-Dozin Co., Ltd., Tokyo, Japan, catecholamines are one of biologically-active amines, and have been known as a compound which exhibits a variety of pharmacological activities, and because of these they have been used as an anti-Parkinson's disease agent or anti-parkinsonism agent, mydriatic, hypotensor, antitussive, expectorant, adrenal medullary hormone, vasohypertonic and cordial, as well as an agent for autonomic nerve. Although the catecholamines have a reducing activity and a relatively-high stability in an aqueous acid solution, they are readily oxidized under atmospheric conditions to change their colors and to form sediments, and because of these their actual uses are inevitably highly restricted. They also have a drawback, i.e. they have a phenolic hydroxyl group which allows them to be conjugated, methylated and oxidized in a relatively-high level when orally administered and passed through gastrointestinal walls. As described in Insect Biochemistry, Vol. 14, No. 5, pp. 487-489 (1984) and Comparative Biochemistry and Physiology, Part B, Comparative Biochemistry, Vol. 97B, No. 3, pp. 563-567 (1990), glycosylated catecholamines are found in natural compounds in a .beta.-glucosylated form, but have not yet been artificially synthesized via an enzymatic technique, and the industrial-scale preparation has been deemed difficult. It has been a great demand to overcome drawbacks of conventional catecholamines, and to establish a novel catecholamine derivative which exerts a satisfiable physiological activity in vivo without a fear of causing undesirable side-effects.
Q: how to create a filter system? i have a database like this prod_id prod_name catogory_1 catogory_2 catogary_3 now i want place my filter like this <slect id="filter for cat 1"> <option vlaue="all">all</option> <option vlaue="caps">Caps</option> <option vlaue="shoose">shoose</option> <option vlaue="cloths">cloths</option> <option vlaue="bags">bags</option> </slect> <slect id="filter for cat 2"> <option vlaue="all">all</option> <option vlaue="mens">mans</option> <option vlaue="womens">wonens</option> <option vlaue="babys">babys</option> </slect> <slect id="filter for cat 3"> <option vlaue="all">all</option> <option vlaue="large">Larg</option> <option vlaue="midum">midum</option> <option vlaue="small">small</option> </slect> <div id="display_prod_list"> here goes the list </div> my function <?php function display_product() { $query = mysql_query("SELECT `pord_id` AS `id`, `prod_name` AS `name`, `catogory_1` AS `catogory_1`, `catogory_2` AS `catogory_2`, `catogory_3` AS `catogory_3` FROM `porducts`"); $products = array(); while(($rows = mysql_fetch_assoc($query))!== false) { $products[] = $rows; } return $pruducts; } ?> this function returns all products i want to change this function to return only filtered products how can i do that? please help me. can i do this with php or i have to use jquery or something. please tell me the best way to filter my products thanks A: I don't know if this is about what you asking for, but hope it helps. Use a WHERE clause on your MySQL query, for example: SELECT `pord_id` AS `id`, `prod_name` AS `name`, `catogory_1` AS `catogory_1`, `catogory_2` AS `catogory_2`, `catogory_3` AS `catogory_3` FROM `porducts` WHERE catogory_1 = 'caps' AND catagory_2 = 'babys'; You could build your query condition in this way: $conditions = array(); $condition_string = ''; if ($catagory_1 != 'all') { $conditions[] = "catagory_1 = $catagory_1 "; } if ($catagory_2 != 'all') { $conditions[] = "catagory_2 = $catagory_2 "; } if ($catagory_3 != 'all') { $conditions[] = "catagory_3 = $catagory_3 "; } if ($conditions) { $condition_string = ' WHERE '. implode($conditions, ' AND '); } $sql = "SELECT `pord_id` AS `id`, `prod_name` AS `name`, `catogory_1` AS `catogory_1`, `catogory_2` AS `catogory_2`, `catogory_3` AS `catogory_3` FROM `porducts` $condition_string ";
There is a grave misconception that if you are single, you are alone. That poor, lonely woman/man, all alone in the world. Excuse me? I am far from alone or lonely. If I wanted to reactivate my dating profiles on all the dating sites, I’d have no end to the dates. No kidding, I had dated 13 men thanks to those sites, in a very short period of time. The Count being number 13, evidentially he is NOT my lucky number guy. OR maybe he was, he showed me I was still caught in the cycle of being a pleaser and that had to stop. No more bending me to mold to someone elses specifications. I could start that whole saga again, many of those men would still love to be on my dance card. I know this due to the sudden influx of communication when I changed my status in life back to single. I have a multitude of friends, both men and women. At any time I can find a male friend to go have a beer, a sporting event or something a bit more intimate. I have girlfriends I can call to go hit a movie, dinner or a cemetery tour (don’t judge, it was by full moon and very cool). My kids love to do many of these and other things. My Divas, yes we all love this and more. I have plenty of people in my life to fill any need I have on a friendship or social level. If I stay home and do nothing, it is my choice! Single does not mean lonely or alone. Single = FREEDOM! INDEPENDENCE!! Other than my work responsibilities, I can come and go as I please! I see who I want, when I want, do what I want when I want to do it! Lonely? Hardly. Alone? Really? Nope not at all. If I want to sleep next to someone, that can be easily arranged too. Yes, I have friends I can call if I want to spend the night in the arms of someone special. Believe me they need to be special to make that list. My point is: being single doesn’t mean I am lonely. It simply means I am not committed to anyone….but me! In the new year I plan to write 365 reasons that being single ROCKS. I know that is a huge undertaking but I think I can do it! Every day I will find some reason why being INDEPENDENT is awesome! I follow a guy on Twitter and through his blogs, Dad Unmasked, who is a divorced dad raising 2 girls. I love what he writes about in both venues. As someone that has done the dating site game, I totally enjoyed his Fantasy Dating Profile post. It inspired me to write one of my own. The whole idea is that the profile I write is REAL, the real me! The fantasy in this case being that someone out there wants the REAL people, not the Barbie dolls. I cannot tell you the number of profiles I had read of guys who are overweight, unemployed or living like it (hey can only go on your pictures of the trashed trailer you appear to be sitting in with dirty dishes stacked high and trash bags piled around) that are dog ugly and specify that the female needs to be trim, in shape, and gorgeous. Really? So see, the fantasy is that someone would really want the real me! And so far that guy I seek must be a fantasy too, as I’m just looking for a REAL guy. But that is for the post I will title “Mr. Right’s Fantasy Dating Profile” to be posted in the near future. SO, here is my fantasy dating profile: My Self Summary: I’m a 48 year old, divorced mother of two. My children are both adults, they do not live with me but are known to make unscheduled, unannounced visits and this is a good thing. I’m 5’6″ tall, curvy with a few extra pounds. Yes a FEW. NO I am not fat, obese, etc. When I say few I mean it, I am nothing if not brutally honest. I have big boobs, a plus to some men and a minus to others. I have hips and a booty and I’m not upset about it. I’m very happy with myself as I am. I’m not your sugar mama, I don’t make a lot of money. But I’m very happy with what I make and comfortable. I am not a clean freak but I’m not a hoarder. If it hasn’t been used or worn in 6 months I dispose of it to charity or the trash. I don’t like clutter and I won’t live with it either. I’m really good at: Cleaning, taking care of little ones, and sales. I was a very good office manager too, but I’ve made a serious career change into daycare and sales and have no intentions of returning to managing anyone’s office but my own. I can cook but don’t like too so my talents are limited. But I’ve yet to go hungry. I’m good at cheering for my favorite football teams and yes I do like watching it either in the stadium, a sports bar, or my own living room with friends. I can dress up and look like a million but frankly much prefer a tailgate, fire pit, a hoodie and some beer with friends. The first thing people notice about me: My eyes. If I had a dollar for every time someone complimented my eyes I’d be rich. I’m seeking: A man who is honest, I cannot and will not tolerate lies. Someone who is affectionate, who isn’t looking for a Barbie Doll, is loyal/faithful (sorry don’t share), works hard but doesn’t let work come before his family, someone seeking a best friend in their mate and not a trophy. Sadly this isn’t what most are seeking I am thinking. But I’m working on a post all about the real me. I did one for my 100th post long ago, but thinking it is time to really open up. That is a post coming too. Like this: Fellas, don’t suddenly decide to remember her the very moment she finally forgets you. Let her go & let her be. ~ TheSingleWoman™ It has been a week since things fell apart with The Count. I’m sitting here at my computer analyzing it one last time. Last time because I figure a week has gone by now and if in 7 days he didn’t see fit to find time to contact me and iron this out, then perhaps I am the one that needs to rethink the relationship. True love would not let something so ridiculous as a Facebook post that may be seen by a 12yo end a relationship (sorry 99% of those on my Facebook are adults and the post had to do with politics, the Occupy weirdos and as it happened they were topless women). Looking back it may not have been one of my brighter shinning moments when it comes to posting stuff, but gee, really? So I’ve been rethinking everything and going back over the pros and cons of the Count & Me, and analyzing it all. I need more than a few texts and one day a week to build a relationship. We aren’t talking a “friends with benefits” thing here. This was us, planning a future, talking about a future business, where we’d live, like as in LONG TERM and permanent. Him being busy I understand, but not so busy that the person you claim to love doesn’t take more priority in your life. I’m not unreasonable and really not all that demanding. I saw much more of the ex husband when we were dating (several nights a week and weekends) and he lived 2 hours away! In the beginning, with the Count, in the first few weeks, we did see each other a bit more, but then his job got in the way. SO…is a phone call on the way home from work that taxing? Or one night during the week finding time, like in the beginning of the relationship, to have dinner on that night he wasn’t working? Meanwhile of the 12 other men I dated off the dating sites, several would have been happy to continue to date, see me far more often and 3 of them would have carted me off to Vegas and got married after the first date. I wouldn’t have done that, my mother didn’t raise a fool, but it would be very nice to have fallen in love with someone that put me just a little bit higher up the priority list, where I did not feel like an after thought. And if you cannot spend more than a day a week with me, then don’t ask me not to date other people. If you don’t have time for a relationship, why in the world were you on a dating site to begin with? Why start something that you know full well you cannot give the time too that it deserves? Why would you get involved and let someone fall in love with you, fall in love with them (or so you say), knowing that you cannot (frankly in this case more like will not) devote the time to them that is needed to grow things? The statute of limitations for over hauling and putting this relationship back on the rails has run out. *Note To Self: never again, as the saying goes, make someone in my life a priority that only makes me an option.* Blogging is a funny thing…we tell our most intimate thoughts for all to read and yet most of the time I find myself sitting and wondering, “who is this person!?” I know them…but yet I don’t know them! I want to know who the person is behind all those words so I thought of a great way for all of us to “meet” each other! Every Sunday Never Growing Old will post five get to know you questions that you can copy and paste into your own Monday post and we can all learn a little more about each and every one of us!! Java will add a linky so we can follow who participates and get to know them better!! Be sure to link the POST and not just your whole blog!! Questions: 1. Does your family/friends know about your blog? 2. What is your favorite card game? 3. What do you wear to bed? 4. What is your favorite kind of French Fry? 5. What is your usual bed time? ————————————————————— My Answers! 1. Does your family/friends know about your blog? Yes, my family, friends, the ex-husband, the kids, guys I dated off the online dating sites (some of them even subscribe to it!) and yes, Steve knows and to my knowledge doesn’t read it but supports me, probably the only people that really don’t know about my blog is the current neighbors. I have an open door policy for my blog. Though I admit, parts are password protected, and I DO post on a site where I can let it all loose when I just need to vent without hurting feelings. 2. What is your favorite card game? That would be Rook (aka Baptist Bridge). I really am not much of a card player but I really like Rook…I GET IT so it is a good game! 3. What do you wear to bed? Well…jammies until I am IN the bed. Then partial jammies. No bottoms as nothing bugs the crap out of me more than getting tangled in my jammies so I remove those. They are close by lest the house catch fire and I have to hang my big white butt out of the window naked. NOT good fodder for the community press or the 11pm news. 4. What is your favorite kind of French Fry? Regular old fries….used to be McDonald’s but they got all healthy and ruined the flavor. Now, I suppose White Castle is good, Burger King….just fries, ya know? For the most part I haven’t met a french fry I didn’t like. 5. What is your usual bed time? Well I aim for 10pm but lucky to get there at 11pm most nights. Once in a while I am just too tired and go earlier but that is rare. 11pm ish so to speak would be my regular bed time. As my readers have likely picked up on, I LOVE P!nk, love The Greatest Hits So Far album, and thank my baby sister for buying it for me. I ripped it to my PC and the CD is in my car, I love everyone of the 16 songs except number 10, but I’m too conservative for that one. One of my favorite songs on the album is “Glitter In The Air”, a great love song. I know the feeling of being touched so gently I wanted to cry. Looking fear in the face (fear of getting my heart broken yet again) and saying “I don’t care” and letting myself FEEL again. Of not wanting a night to end, wondering if it could ever get better than that moment. And all because of one man. A man I met online through a dating site. A man that emailed me and I didn’t respond for a few days, and damn near didn’t at all. A man who was about to give up on finding the one, but gave it another shot. That man, of course, is the Count. AKA: Steve. But you know me, I love nick names. My very own Mikhail Dubrinsky. Trusting has been the hardest thing for me to do. I trusted for 22 years, and that got me no where but alone and emotionally destroyed. I tried again, 2 more times, and those were just more breaks in my heart. I was done at that point. Dating was a way to just get out and meet men, I really didn’t plan on finding the one, this Cinderella had long given up on finding the fairy tale prince. Yes I was looking, but I did not feel like that was even a remote possibility. I kept meeting guys that were totally smitten with me, but it wasn’t mutual. Many read my blog pages, had the full story, knew that I was the ‘nut case’ the ex feels I am, (they all find me quirky cute in every aspect with one guy that was the exception, and thought the ex had a hole in his marble bag) and wanted me anyway. I knew 23 years ago without a word being said, not even knowing my ex husband’s name so I knew that chemistry would be there or not be there. Sure, things develop over time, but there is this initial draw, like two magnets, and it hadn’t happened. Then came the email from The Count, expressing interest. I read his profile, looked at his photos, and decided to think on it. My plan was to delete all my online accounts and toss in the towel. I had dated 12 men already and not yet found that undeniable pull. I waited a few days to reply, but many times I went back to his profile. Something in his eyes drew me in, again and again. I didn’t feel I matched his criteria so wasn’t sure what his interest in me was, but I finally replied. Then we talked on the phone. I was still terribly hesitant to meet. But deep down something was stirring and that something would not let me out of this. I agreed to meet him for dinner. Little did I know that when I walked into the meeting place, my life was about to shift dramatically. The man looking back at me as I walked in the door had the most amazing eyes. I swear they could pierce a hole in steel, and when he looked in my eyes he looked straight inside my heart and soul. There was instant chemistry and draw. It was very scary to me. I’ve kind of sat on that fear a good deal since. Not fear of HIM, but fear of the intense feelings I have for him, from the beginning! My heart was way ahead of my brain and that was scary. I was just waiting, after each date, to hear that he just wasn’t feeling it. Instead, he is feeling it too. We text like a couple of teenagers! I got flowers last week for no reason other than he was thinking about me and wanted me to know this. He doesn’t hold back at all telling me how he feels about me. When we are together, for no reason out of no where he will just stop, kiss me and tell me he loves me. We talk in terms of here and now, but also the future. a future that is me and him, side by side, building a life together. But we are going SO slow, taking our time, letting this bloom, grow and unfold it’s petals without rushing it. There is no hurry, the feelings are there and grow each day. Will I get my heart broken again? I don’t believe so, but only time will tell. We’ve both suffered severe heart breaks at the hands of those we dearly loved, the ones we’d have gone to the ends of the earth for and back again. We are advancing with baby steps even though our emotions are miles ahead of us, and just enjoying this one day at a time. The Count is part of my supporting cast now, photo and all. Love is awesome. The garden gate opens now all on it’s own, it recognizes The Count and welcomes him inside the walls that protect my heart. He brings with him a warmth when he enters here, a feeling of peace and harmony. Little by little, he is exploring every inch of the landscape, getting to know everything that grows here or has once been within the walls. While we’ve glanced across to the area that is burned and damaged, he doesn’t push for more than I am ready to give up. Already love is sowing healing seeds and new growth is starting on the other side. With every day the painful memories of the past slip further away under the sprouting new flowers there, and in some strange way my past tears are now fertilizing the soil that is bringing forth the new life. I knew when I met the former prince, before I even knew his name, that he was someone I was supposed love and marry. This time, I had only a photo, voice and a lot of communication on texts and the phone with The Count, but inside something was stirring to life. The first time I looked into his eyes I knew that feeling again. Destiny was sitting in front of me, all I had to do was let it take me by the hand and lead me. When he reached out and took my hand, continuing to see into my eyes and my heart and soul, we both knew. There was no denying it. When he searched inside of me, he didn’t push, and I didn’t deny him what he wanted to see. He has gone where only one other person dared to look, but that one was not mine, and I was not his. For a long time I did not grasp why, but now I know…because Mr. Wonderful was not my destiny, The Count is. From that first meeting, in the first few moments, there hasn’t been any singular in our discussions. It has been all about us, we, our….we’re like 2 puzzle pieces that fit so perfectly together. The longer we are together the less of the seam that separates us can be seen even to us. His life dream and mine fit together so very well. Completely different, yet so perfectly suited to compliment each. When we envision those dreams, we see each other in there, have since the first moment. He is a very strong personality, with the softest of hearts. I needed a man who could match or exceed the strength of my personality, there is no questioning he is that one. Yet he is tender, and loving and wants to make me happy. He knows my dark secrets, I know his. We both accept the other completely: the good, the bad, the ugly, and the beautiful. Neither of is looking for perfect, we both want someone perfectly imperfect. I’m reading the book that was mentioned once by Chuck, Love and Respect – by Dr. Emerson Eggerichs, and see where the former prince and I went wrong, some of the situations described could be right out of our 22 years, down to the very words used in scenarios. It won’t happen again, I simply won’t allow it. I know where I went wrong, where he was wrong, and how to not let that happen this time around. “Go slow” is the intent, but it is hard. We both know we need time to figure it all out, but we’re both in and committed. My dating profiles have been removed, I have no desire to see anyone else, I found him. Or maybe better said, he found me. One flirt on a dating site has led to the start of what WILL be an amazing life as we work together to make our dreams come true. I’ve noticed something on the dating sites that I’ve also seen in society in general: We all tend to hang our self esteem on other people’s hangers. This is obvious by the reactions to being rejected. I wrote a blog about this last year, when I decided to remove MY self esteem from the hangers of others opinions of me. I know that I am a good hearted woman, I am attractive, and I’m a great catch for the right man. Key word being RIGHT. Not every man is right for me, in fact most will not be, and that is okay. I will find the one that I don’t want to live without and make him the happiest guy around. He will be blessed and thank God every day that my ex divorced me so that I could be found by him, the one that will treasure me. Goodness knows plenty of men I have dated have told me to thank him for setting me free just so they had a chance at knowing me even though it ended up just a friendship. Yes, I AM that special! Guess what? SO ARE YOU! To many someones in this world you are that precious too, you just have to find the one that wants to keep you and you want to keep them. It took me a while to accept that single best thing my ex did for me, since he didn’t cherish and treasure me, was to let me go so someone else COULD. And then I removed my self esteem from his hanger, put it on MINE and learned what a great person this marvelous woman really is! We all tend to let it bother us when someone finds fault in us, be it that we don’t clean correctly, dress the way they think we should, talk too loud, talk too much, aren’t as pretty or fit or whatever someone else has in their mind for what we should be. Or, what they think their ideal match is, as is the case on dating sites. On a dating site, we fill out our dating profiles and then hope to catch the attention of someone that meets our criteria. Some people, like myself, put serious time and effort into the written portions of their profiles. We take the quizzes, psychology tests of some kind, that determine things about our personalities and preferences to assist in finding the perfect match. We chose photos of ourselves in various situations to help portray who we are to potential mates and then hope for the best. There are those that for whatever reason think putting down one word or one line answers is going to just impress the snot out of others, oh and 1 fuzzy photo of themselves from 50 feet away, astride their Harley (at least it LOOKS like it might be one from that blurred image) and then 5 photos of their dogs or sunsets, which don’t happen to be blurry, go figure. The sites have standard questions about smoking and your preference, drinking of alcohol, height, marital/relationship status for you and your preferred match. It is amazing, I swear some of the sites asked me for what brand of toilet paper I purchase, or it seemed that way. So, anyway, if I am looking over profiles of potentials, I can see right away if they are someone I want to meet. Their photos, what they write, what their physical characteristics are etc, all give me clues to them. As I stated the other day, I can and DO glean a lot from a person’s profile. It is the ‘first impression’ and believe me it DOES make a difference. A haphazard profile is a good indication that someone is careless and doesn’t take care of themselves, so I know they aren’t going to make me a priority. Or it may be a very well written profile, but just not be someone of interest to me because we don’t share common interests. It is always perplexing when someone writes and says “I see we have a lot in common…” and I go look and find they are into sky diving, hang gliding, NASCAR…nothing at ALL in common. My guess then is they saw my pics and thought I was attractive so they’d give it a shot. I know what it is I’m looking for, and when I find it, I will know. I knew immediately when I met the ex Prince, before he opened his mouth or I even knew his name, I said to my mom “I am going to marry that one”. Sure enough I did. Trust me, I can tell enough from what I read and see on a profile, if there is any interest. A few emails between us and my first impression is confirmed if there were any doubts. So where am I headed with this? I am growing tired of men contacting me, and when I tell them “I’m sorry but I am just not interested, but good luck in your search” I am called names and they begin personal attacks. Mr. Confident isn’t the first or last (he just stood out). Last night a guy from Louisville, Kentucky contacted me. He is like 2 hours away. When I said “I’m sorry, but as I state in my profile, I am not interested in a long distance relationship, I cannot relocate and unless you are able too, should we hit it off, it just won’t work out” he in turn wrote back and called me an asshole! Wow, really? I didn’t bother to go into the fact that nothing about his profile or photos was even remotely appealing to me, I was kind and polite. Another potential that contacted me said “I knew I wasn’t in your league and you’d think you were too good for me” (I get that ‘outta my league’ stuff entirely too much). I don’t think I am too good for you, YOU JUST DO NOT INTEREST ME!!!! What I see here is a bunch of men that get their hopes up that some attractive female might want to date them, and then their ego gets bruised if she says no. No one is out of anyone’s league. Period. But no one wants to go out with someone they are not interested in. Just because you have an interest in me doesn’t mean I share that interest. If it isn’t mutual, why waste our time? Sure, I realize that by some slim, snowball’s chance in hell we might hit it off, but I might get struck by lightening or win the lottery too…twice. The man I seek is hot and handsome on the INSIDE and it shows through his profile in not only his photos, but in his smile, what he writes about himself, his attitude that comes through in those writings. None of us are going to be knock outs when we are old and wrinkled up like a fuzzy, mold covered prune, but our inner self will still be beautiful, and that is what I am looking for most, that inner man that will rock my world. Stop hanging your self esteem on my hanger. If going out with me is what you need to feel good about you, buddy you are in a world of hurt! “Go ahead..let people label you. It just shows they wanna put you in a box because they’re so afraid of what you can do” ~ The Single Woman ~*~ Online dating, if nothing else, is highly entertaining at times. Just reading profiles is good for laughs. Despite what some folks think, one can glean a good deal about someone by their own words in their profile. One thing a well written profile does is gives me a good clue if someone will be compatible with me. First starting with their physical stats, like height, weight, location, and for me even their astrological sign. You recall, from earlier posts, fire fighters and those born under the sign of Aquarius, Scorpio or Leo, are just not good matches for me. Fire fighter Aquarians are simply a disaster trying to occur. In the essay sections of a profile, where a person has the opportunity to tell me about themselves, it can either be a deal breaker before we ever get to ‘hello’ or it can spark the desire for an introduction. I forgive a random typo, but I’m picky, too many of them and it becomes obvious that the writer just doesn’t put any time or thought into themselves or they’d be trying harder to put forth something of quality. Also, things a person likes to do in their spare time, or for fun, helps me to know if there is a chance at chemistry. For example, I was contacted by a gentleman (and I use this term very loosely as he certainly didn’t behave like one, but I don’t want to get ahead of myself) who was interested in meeting. I looked over his profile carefully and somethings stood out to me, and yes I am going to rip this sucker apart dissect some sections to show first why he is not a good match for me. Okay let’s do some examination of his profile: ” I enjoy any activity that can be done outdoors camping, biking, hiking, tennis, volleyball, water skiing, festivals, and traveling. I also enjoy art shows, auctions, yard sales, shopping and dining out along with good conversation. “ Okay first off, I love being outside! However camping = Holiday Inn Express. I grew up camping all over this country. I do not like to camp anymore, period. Biking = Harley Davidson/Honda etc…fender fluff. I don’t care for peddling. It has to have a motor and rumble baby. Water skiing – not so much. Not a huge fan of water I cannot see the bottom of so water skiing just is not appealing. Art shows/auctions/shopping – Not much into art, auctions YAWN no thanks, and shopping? This girl HATES FLIPPING SHOPPING! So far, as you can see, this isn’t going to be a good match. We are not on the same pages enough when it comes to activities we enjoy. Then he posts: My photos are current. Please don’t expect the Brad Pitts, bad boy type from me. I don’t have a beer belly, long hair, hairy back, tattoos, earrings, nose rings, belly piercing, or a motorcycle (although I might get one in the future, lol). What I do have is a big heart, self assured, confident, positive attitude, optimistic, a job and white teeth! lol Hmm…getting the idea that he is intimidated by the bad boy/rebel types. And tattoos and a nose ring might not be up his alley, which means ME as my nose is pierced and I have some ink. Not to mention if you are someone that is so confident and self assured, you don’t tear down other ‘types’ when telling me what you are all about. Truly confident individuals don’t do that sort of thing, they don’t compare themselves to anyone or point out what they perceive as flaws in others. Bad form my man. So reading further, this stands out to me: Things that I believe in: – My Dad & Mom taught me well– You will hurt and be hurt by those you love and showing you care afterward can strengthen those relationships– Actions expose the soul and define you and your relationships– Most mistakes can become blessings if you learn along the way– We’re never truly alone– People cross paths for reasons so pay attention– Everything happens for a reason and those who learn from those reasons gain knowledge from life’s experiences. – It’s safe to trust your instincts because you’ll know early if someone “gets” you and you “get” them– It’s better to laugh than to cry– Sunrises, sunsets and rainy days were meant to be shared– A hug can make it all better I want you to remember the part in red there, it will be important in a bit. And then this part stood out to me too (dude was LONG on the writing which is okay if it doesn’t all contradict itself) I borrowed the below info from another profile. I thought it was somewhat close to me. BTW, I have blue eyes and I’m looking for a woman no matter what her eyes color maybe. I already had one shallow woman proclaim she didn’t have blue eyes so she tossed me back into the water! Come on, please have an open mind and expand our horizons when it comes to looking for a partner. There has been only one perfect “MAN” in this world so far! BLUE EYES:People with blue eyes last the longest in relationships. They are kind, pretty or handsome, very good kissers and are really hot. They always fall in love with their closest friends and never understand why. They are very funny, outgoing and don’t care what people think or say. They love to party. They are very satisfying and love to please. Are straight up WARRIORS when they need to be. They are bad to the bone. Okay Mr. Confident is back to dissing people again, because someone was not interested in him she must be shallow? Oh and he just told us earlier he isn’t a bad boy type, yet he is bad to the bone? I had immediately picked up on the fact that this guy is anything but confident. He resorted to name calling and knocking others in his profile, it screams of someone that lacks self confidence and doesn’t handle rejection very well. And not finding anything in his profile that indicated compatibility I told him I wasn’t interested. I figured if he doesn’t handle rejection well (shallow woman???) online, after a date or two when things were confirmed for me that this was NOT the future Mr. Marvi Marti, he might have a full blown melt down. Oh and before I go any further, I need to point out that I have a photo on my profile of me in a Halloween costume I wore once. The reason? I am a curvy girl, big boobs, and some hips that gave birth 3 times. Not fat, but curves are a part of me. So since that shot gives the viewer a good indication of what they are getting, I used it. You’ll understand why I’m showing this photo in a minute, so hang on. This morning, while laying in bed answering my emails on the dating site, there continued a little exchange with Mr. Confident (we had exchanged a few very short emails last week but I told him I was too busy to meet then): sent 7/10/2011 7:42:07 AM FR: Mr. Confident SJ: Fish Nibbling On Your Line!Duh, how did you come to that conclusion? We have never met or spoken? But I guess you are right. I’m not attractive to shallow and narrow-minded people! Guess that explains the reason why you can’t keep a man after 22 yrs of marriage! lmao sent 7/10/2011 7:47:04 AM FR: Marti SJ: Fish Nibbling On Your Line! Interesting you that you resort to childish tactics throwing insults at someone, tells me that you are thin skinned and do not handle rejection well. Instead of having some class, you behave like a 5yo little boy. that was what I suspected, so wasn’t interested. You simply confirmed it. sent 7/10/2011 7:47:07 AM FR: Mr.Confident SJ: Fish Nibbling On Your Line!I guess that’s why you have to put pictures of your breasts hanging out in order to catch a man? you can’t do it as being yourself. Some Church person you are! lmao sent 7/10/2011 7:49:51 AM FR: Mr. Confident SJ: Fish Nibbling On Your Line!Why are you still bothering me? Get on your broom and fly away! You have nothing to offer me! lmao *note: I stopped answering at this point, evident that this guy is getting his boxers knotted up pretty easily. sent 7/10/2011 7:51:524 AM FR: Mr. Confident SJ: Fish Nibbling On Your Line!Go to Church and pray that you can find a man! You are going to say a lot of prayers before you do! lol Obviously old Rob doesn’t handle rejection very well? Funny to me is that Mr. Confident, who lists himself as Catholic, obviously had no issues with those D-size boobs when he contacted me hoping I would have interest. And as I told him, he resorts to sandbox politics when he doesn’t get what he wants. Also, remember up above a bit where he stated things he believes in? Remember this: – Actions expose the soul and define you and your relationships Well, Mr. Confident, your actions exposed YOUR soul and defined you and your relationships. Oh and for the record, you are divorced too, and on an online dating site, LOOKING for a woman YOU don’t have, just as I don’t have a man at the moment. So what is your point? As I said, when I read his profile slowly, I sensed he was going to behave like this if I rejected him for any reason once we started going out, I just didn’t expect him to do it simply because I have no desire to meet him. My sister has this awesome top that I have kinda taken ownership of she lets me borrow that looks great on me. It got a thumbs up from my brother when he saw me in it a few weeks ago. When I wore it to court for the divorce hearing and then into the office, my then boss whistled and made several comments about how great I looked dressed up. Of course that is more likely because I usually wore jeans and a company polo shirt to work every day so me dressed up feminine in any way was going to be a noticeable improvement. It is fitting and symbolic to me that the shirt I wore to end my fairy tale, would be the same one I am wearing to begin a new one. This top has come to be known around the Diva Den as the first date shirt. Mostly because I almost always wear it on a first date. It is very feminine, I look damn good in it if I do say so myself. Yesterday my horoscope read: Your ruling planet Venus may bring sweetness into your life today in a way that is fresh and different. However, the opportunity you have for pleasure comes at a high price now. Keep in mind that your desire for simplicity means that you may have to set aside previous priorities. But don’t bother trying to get approval from a friend, unless you’re seeking to deepen that particular relationship. Remember, communicating your feelings isn’t all fun and games; it takes hard work and an open heart. Shortly after I read it, there was a knock at the front door, and my favorite florist (how did he know this???) was there with a delivery of lavender roses for me. Something ‘fresh’ and ‘different’ as my horoscope said. Fresh as in fresh cut flowers, my very favorite flower! And ‘different’ because receiving flowers just is not a real common occurrence for me. I don’t recall ever receiving my favorite flowers, so it was totally unique. I found it quite special, as someone is definitely paying close attention as they read through my hundreds of blog posts. The sender is someone I’ve talked to via emails and texts, but had yet to meet in person. We have much in common in our relationship needs and our personalities. There was definite chemistry there in writing. I know, people can paint themselves to be a lot of things, but sometimes you just know you are seeing the real heart of a person when they share about themselves. Not a single red flag has flown as we have gotten acquainted on the dating site, so I gave him my blog page to explore. He knew he was seeing the real me as he has spent a great deal of time reading and learning…he knows my heartaches, my frustrations, my likes and dislikes, and even my glaring faults. And he too has a passion for writing and expressing himself through his words (read the Secret Garden posts). He doesn’t mind at all what I write about, even regarding him. He doesn’t want someone he can clip their wings and cage in order to tame, but rather someone he can enjoy their free spirit and watch soar, and even fly beside. We both know what it is to have our fairy tale implode and have our hearts completely shattered by the one we thought was forever, and the next one we fell in love with, and we’re both ready to try love again in spite of the scars we carry. When the sender asked me to meet him in person or talk on the phone last night, I opted for meeting. There was just something about him that made me want it to be in person the first time I heard his voice. And what a voice it is…deep and oh so pleasant to listen too. Strong hands yet with such a gentle touch. No red flags here either, my gut is not telling me to run like hell, I was quite relaxed and content to spend time with him. I made a decision to turn off my profile on the dating sites (on ones where that is an option), and I’m not going on anymore first dates for now. The ‘first date shirt’ is going into retirement, well as far as being worn for first dates anyway. There is chemistry here. In his eyes I saw much I want to explore. His secret garden intrigues me, is calling to me to come see if I have the key to open the gate, as he is hoping his key fits mine, as within the garden is the heart and soul. Time will tell, and we’ll go slowly and see what develops. I may even begin a new thread, since The Dating Diaries really may not be quite right for this. I’m thinking something along the lines of The Secret Garden Journals of Romeo and Juliet. I get asked a lot of the same questions on the dating sites by the men that contact me hoping I will find them interesting enough to want to go out. Some are pretty standard, some are out of the ordinary, and others just flat out off the wall! I don’t give out my Blog info to any Tom, Dick or Harry, so only ones I see having potential get to peek here at who I am, that is a very tiny number. But still, thought I’d answer the questions they ask and maybe I can just copy and paste this later as needed? Q: What do you do for a living? A: Childcare in my home and independent sales representative for Avon. Q: What do you like to do for fun? A: This is not a real simple question to answer. But I will give you some ideas: I like bowling – but frankly I suck at it….bad! But then it is for FUN, and I do enjoy it and can laugh at myself. I was learning to throw darts, and still hope to learn but be advised NO one should stand anywhere but BEHIND me. I suck at this too.🙂 I enjoy hanging out with friends at a small bar or pub, inside or out on the patio, listening to a good live band. Grilling on the back deck with friends, drinking a few beers and just relaxing. Tailgating with friends and great food (it IS all about the food, certainly not the win if you are a Bengal fan) Concerts in the park, be it bands or the Cincinnati Pops, on a blanket with a lot of good munchies and someone special or a bunch of friends. A nice picnic with friends or someone special, outdoors enjoying the sunshine and the breeze and great conversation. Snuggling up with someone special, a bottle of wine, good music or a movie, or in front of a fire wrapped in a blanket. Day trips to fun places like Metamora just to wander through the little shops. Weekends in Gatlinburg browsing the shops, sitting in the hot tub on a cabin deck with wine and a view of the mountains. Q: What are you pet peeves? A: I have a few, the big one is people too lazy to take their cart to the proper place and instead just leave it in the spot next to them. Most of them look like they could use the extra walk. Q: Having any luck meeting people on this site? A: Yes, meeting people is why I am here and so far not had any issues, though lord knows I have heard some good horror stories! Q: What is your favorite vacation spot? A: Golden Clouds, Jamaica. I’d go back in a minute, despite having to fly to get there, if I could afford it. Q: Is that a nose ring in your photo? A: Yes it is, and there are 3 tattoos that are not in the picture so if those bother you now is the time to say so. Q: What kind of music do you like? A: ALL kinds! Country, classical, hard rock, soft rock, classic rock, 80’s, hip hop, top 40, pretty much anything. Depends on my mood or the mood I wish to set. Q: What type of man do you go for? A: Why? Are you a chameleon? I don’t have a type, and beyond what is in my profile I won’t tell you what I’m looking for, because I don’t want a good actor. I want to meet the REAL you and if there is chemistry then you are my type. Q: Do you have pets? A: Yep, a cat. We have 3 actually but only one belongs to me. Q: Are you interested in getting to know each other (from a guy 110 miles away)? A: Unless you are reasonably close to where I live, not really. Not unless you plan to relocate if we hit it off and head for the justice of the peace, because I am not moving from the greater Cincinnati area. Q: Do you have sex on the first date? A: You really went there, huh Stud? That would be a NO. Unlikely for quite a few and even then, it is just not at the top of the list for me. I’m highly selective in who gets a first date, more so for a second or third, and unless the relationship is getting serious, I won’t even consider it. Too many freaky STDs out there, and I’m too special to just sleep with anyone. If you are asking that before you have met me, you won’t be considered for that first date. Q: You are sexy, wanna have dinner? A: No but if you check a few escort sites or Adult Friend Finder you might find what you are seeking. Okay enough silliness. That is a sampling of the questions I get on the sites. And now you, too, know the answers.
Risk Factors Associated with Readmission and Reoperation in Patients Undergoing Spine Surgery. Reoperation and readmission are often avoidable, costly, and difficult to predict. We sought to identify risk factors for readmission and reoperation after spine surgery and to use these factors to develop a scoring system predictive of readmission and reoperation. The National Surgical Quality Improvement Project database for years 2012 to 2014 was reviewed for patients undergoing spinal surgery, and 68 perioperative characteristics were analyzed. A total of 111,892 patients who underwent spinal surgery were identified. The rate of reoperation was 3.1%, the rate of readmission was 5.2%, and the occurrence of either was 6.6%. Multivariate analysis found 20 perioperative factors significantly associated with both readmission and reoperation. Preoperative and operative factors found significant included age >60 years, African-American race, recent weight loss, chronic steroid use, on dialysis, blood transfusion required, American Society of Anesthesiologists classification ≥3, contaminated wound, >10% probability of experiencing morbidity, and operative time >3 hours. Postoperative associations identified included urinary tract infection, stroke, dehiscence, pulmonary embolism, sepsis, septic shock, deep and superficial surgical site infection, reintubation, and failure to wean from ventilator. An unweighted and weighted risk score were generated that yielded receiver operating characteristic curves with areas under the curve of 0.707 (95% confidence interval [CI]: 0.701-0.713) and 0.743 (95% CI: 0.736-0.749) 0.708 (95% CI: 0.702-0.715), respectively. Patients with an unweighted score ≥7 had a more than 20-fold increased risk of reoperation or readmission and a more than 1000-fold increased risk of mortality than did patients with a score of 0.
Editorial ========= This joint issue of the Netherlands Journal of Medical Education (Tijdschrift voor Medisch Onderwijs) and the German Journal of Medical Education (Zeitschrift für Medizinische Ausbildung) is unique. Both journals are directed at readers who are interested in developments in the area of the education of doctors, dentists, veterinarians and other health care professionals. Both journals primarily present papers and other information dealing with medical education and research that take place in the Dutch-speaking country the Netherlands and in Flanders, the Dutch-speaking region of Belgium or in the German speaking countries Germany, Switzerland and Austria. But nowadays medical education is not confined to national borders. Medical education has become a European concern, or even a broader issue with international impact. Consequently, one might consider the question whether the language of the Tijdschrift voor Medisch Onderwijs and the Zeitschrift für Medizinische Ausbildung should not be changed to English. Clearly, as both journals have different distinguishing features and the countries in which they are published also have their own characteristics, the answers to this question may differ. But, the wish of both Editorial Boards to look beyond national borders was the basis for an experiment: a joint issue of the Tijdschrift voor Medisch Onderwijs and the Zeitschrift für Medizinische Ausbildung in English. The most relevant example of the European influence on medical education is the Bologna agreement \[[@R1]\]. In this document, signed in 1999, European ministers of education agreed that higher education programmes should become organized according to the bachelor-master structure and that the content of programmes should be based on clearly described competencies. The main goal of the Bologna agreement is to stimulate international mobility among students. Naturally, the implementation of the Bologna agreement does not happen identically in all European countries \[[@R2]\]. In the countries of the Tijdschrift voor Medisch Onderwijs and the Zeitschrift für Medizinische Ausbildung the bachelor-master structure has been implemented in the Netherlands, Flanders and Switzerland, while this change of curriculum design has not yet been adopted in Germany and Austria. Clearly, national or even local traditions and concepts in relation to medical education determine the process of change and explain the great differences in this process. They represent different characteristics of nations, national cultures and professional identities. And, they also may reflect the delicate balance between steps towards an integrated Europe and the conservation of national identity. When considering publication of a joint issue, the Editorial Boards felt that we should learn from each other. Those who embraced Bologna may realize that it may be attractive to include aspects of the 'old' programmes in the 'new' programmes. And those who keep away from Bologna may realize that this concept also offers great advantages and challenges. In order to compose an attractive content of the joint issue, the Boards identified subjects of interest for both groups of readers. Next we invited authors to write a contribution to this special issue. All manuscripts were read by a Dutch and a German speaking reviewer. Their comments and recommendations were incorporated by the authors in the final versions of their manuscripts. We hope that the content of this joint issue of the Tijdschrift voor Medisch Onderwijs and the Zeitschrift für Medizinische Ausbildung will advance the exchange of experiences between educators, policy makers and other professionals in the field of education for health care professionals. Furthermore, we hope that this issue will help to find an answer to the question about the language of the two journals. But first and foremost, this first issue of the 2010 volume should be considered as a reflection of the great challenges we face in medical education in the Dutch and German speaking countries as well as in Europe.
“The SBA assured our nation that its system would be prepared for loan transmittals to begin this morning, and it was not," said ABA President and CEO Scott Latham. “Despite the agency’s efforts to be ready, it has failed.”
Excitation Synthesis For a further reduction in cost of implementation, particularly with respect to memory usage, it is possible to synthesize the excitation using a noisesignal through a time-varying lowpass filter [443]. The synthesis replaces the recorded soundboard/enclosure sound. It turns out that the sound produced by tapping on a piano soundboard sounds very similar to noise which is lowpass-filtered such that the filter bandwidth contracts over time. This approach is especially effective when applied only to the high-frequency residual excitation after factoring out all long-ringing modes as biquads.
<?php include $this->admin_tpl('meta');?> <title>编辑角色 - YzmCMS内容管理系统</title> </head> <body> <article class="page-container"> <div class="formdoby_normal"> <form method="post" onsubmit="return dosub(this)"> <ul> <li><label><span class="c-red">*</span>角色名称:</label><input type="text" class="input" placeholder="角色名称" name="rolename" value="<?php echo $data['rolename'];?>"></li> <li><label><span class="c-red">*</span>是否启用:</label> <span class="span_input"> <label class="label_radio"><input name="disabled" type="radio" value="0" <?php echo $data['disabled']==0 ? ' checked="checked" ' : '';?>> 启用</label> <label class="label_radio"><input name="disabled" type="radio" value="1" <?php echo $data['disabled']==1 ? ' checked="checked" ' : '';?>> 禁用</label> </span> </li> <li><label>角色描述:</label><span class="span_input"><textarea name="description" cols="" rows="" class="textarea w_420" placeholder="角色描述"><?php echo $data['description'];?></textarea></span></li> <li><input type="hidden" name="dosubmit" value="1"><input type="hidden" name="roleid" value="<?php echo $data['roleid'];?>"> <input class="dosubmit w_120 btn-primary radius" type="submit" value="&nbsp;&nbsp;提交&nbsp;&nbsp;"> <input class="btn w_120 btn-default radius" type="button" value="取消" onclick="yzmcms_close()"> </li> </ul> </form> </div> </article> <?php include $this->admin_tpl('footer');?> <script type="text/javascript"> function dosub(obj){ if(obj.rolename.value==''){ layer.msg('角色名称不能为空!', {icon:2}); return false; } $.ajax({ type: 'POST', url: '<?php echo U('edit');?>', data: $(obj).serialize(), dataType: "json", success: function (msg) { if(msg.status == 1){ layer.msg(msg.message, {icon:1, time:800}, function(){ parent.location.reload(); }); }else{ layer.msg(msg.message, {icon:2}); } } }) return false; } </script> </body> </html>
Private long-term care insurance. Simulations of a potential market. Long-term care is now the most common cause of catastrophic illness costs for the elderly. Although acute care health insurance represents a mature market, private long-term care insurance is in its infancy and poised for development. This study presents a comparative analysis of simulation data, generated from the Brookings-ICF Long-Term Care Financing Model, for five alternative private long-term care insurance models. The simulation results indicate 1) the potential market for private long-term care insurance is substantial, 2) moderately comprehensive long-term care policies are affordable by a significant minority of the elderly, 3) policies are considerably more affordable to those under age 65, and 4) long-term care insurance has somewhat less potential to pay for nursing home costs for high risk groups than for other elderly.
Insecure Modern-day black women are usually portrayed as strong, confident and “flawless.” But Issa and Molly are definitely not “killing it.” These best friends must deal with their own real-life flaws as they attempt to navigate different worlds and cope with an endless series of uncomfortable everyday experiences.
Sunday, February 17, 2008 RESTAURANT: Sussex Thai Thai food has become so common in the Sydney landscape that it’s hard for a restaurant to really stick out and make you want to go back. Sussex Thai manages to do that. They do it by offering good food, at a good price in a nice location with good service. Nothing is outstanding, but the total package is hard to fault. The entrees are really quite delicious here and whenever I come I usually get a mix of those. The chicken in banana leaves has a fantastic flavour to it and is one that I’ll always order. The mains can be a little hit and miss though. Their curries are sublime and the garlic soft shell crab an absolute monster of a dish (they must have an entire bulb of garlic on it), but the scampi wasn’t great and the stir fried pork belly is nice but almost prohibitively spicy. But whatever you do order, it’s never a terrible disappointment, and you know that the next dish will be better.
Q: Gaps in between css background fill repeats So this is pretty hard to fit it all into a js fiddle so please see the website. Basically I have a jquery thing of $("#patterns #pattern11").click (function() { $('#text').removeClass(); $('#text').addClass('background11'); }); which means that when a pattern under "frame background" is clicked it changes the background on the frame. So this works nicely except for that fact that these lines appear through the background. Here is the css class being added .background11 { color: white; /* Fallback: assume this color ON TOP of image */ background: url("Images/pattern11.jpg"); background-size:100px; } I have a few ideas which i've tried. Either the z-index needs changing, there is a padding/margin issue, a background property in need of changing or something else. Thanks A: You are having problems because you are resizing the original images in your patterns and not keeping exactly the same aspect ratios. So you are ending up with a stray pixel or so on the edges of your image patterns. For example, take pattern "patt2": <pattern id="patt2" patternUnits="userSpaceOnUse" width="400" height="500"> <image xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="Images/pattern2.jpg" x="0" y="0" width="700" height="1000"></image> </pattern> The image "pattern2.jpg" is 542x774, but you are scaling it to 700x1000, which is not exactly the same ratio. It is off by a fraction. If you redefine the pattern like so: <pattern id="patt2" patternUnits="userSpaceOnUse" width="400" height="500"> <image xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="Images/pattern2.jpg" x="0" y="0" width="542" height="774"></image> </pattern> The lines disappear. Alternatively you could tell the browser to use a scaling mode which will hide the gaps. You do that with the attribute "preserveAspectRatio". The value "none" will work. It should guarantee that the image fills the dimensions you ask for without leaving stray pixels: <pattern id="patt2" patternUnits="userSpaceOnUse" width="400" height="500"> <image xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="Images/pattern2.jpg" x="0" y="0" width="700" height="1000" preserveAspectRatio="none"></image> </pattern>
The present invention relates to a cable connector having a grounding device, and particularly to a cable connector having a grounding device providing a detection mechanism assuring effective engagement between the cable connector and a mating connector when the cable connector mates with the mating connector. Cable connectors generally have grounding devices for electrostatic discharge, as disclosed in Taiwan patent application Nos. 86102087, 86102088, 86102094 and 86102095. As shown in FIG. 4, a conventional cable connector disclosed in U.S. patent application No. 5768771 comprises a dielectric housing 50, a front shell 51, a cover shell 52 and a grounding blade 7. A terminal module 40 is mounted within the dielectric housing 50, the terminal module 40 includes a pair of terminal blocks 40a and 40b which clamp the grounding blade 7 therebetween. Each cable 6 of the terminal module 40 comprises a plurality of center conductors 60 each enclosed by a metal shield 600. Referring to FIG. 5, clamping arms 70 are formed at one end of the grounding blade 7 for retaining the cable 6, while an engaging portion 72 at another end of the grounding blade 7 makes electrical connection with a mating connector. A recess 71 is defined in a clamping portion for engaging with a tag 500 disposed in the terminal block 40a to securely retain the terminal blocks 40a and 40b to the grounding blade 7. However, the grounding blade 7 is planer and includes no mechanism helping a user to sense positive engagement between the cable connector and a mating connector. Although some measures are taken to overcome this defect, such as providing protuberant traces and hollow traces in the engaging portion, these methods are limited by the single-layer configuration of the grounding blade. Hence, an improved cable connector having a grounding device is required to overcome the disadvantages of the prior art.
15 Ways to Use Rose Petals We at Natures Garden have come up with 15 Ways to use rose petals that are absolutely gorgeous. Plus, these ingredients work perfectly for the skin! Further, each of these ideas use one of our dried rose petal. So, you can experience all the benefits of rose petals for yourself. This herb has many beneficial qualities for the skin! Rose water is been said to have anti-inflammatory properties, which can help reduce issues like acne or eczema. Plus, rose petals have amazing moisturizing qualities, antibacterial properties, and antioxidants that are beneficial for the skin. So, this herb is great for the skin! Plus, this herb has mood enhancing properties by reducing anxieties. Therefore, adding these rose petals to your bath and body products are great for skin care and relaxation. First, you can use our red rose petals and buds to create the beautiful Mood Enhance Bath Melts Recipe! This recipe is a perfect blend of an uplifting fragrance, amazing herbs, and moisturizing ingredients. The romantic rose petals are perfect for creating the perfect atmosphere for a bath. Plus, this bath product uses the lovely Aromatherapy Mood Enhance Fragrance Oil, which is an uplifting, herbal floral aroma composed of fresh citrus top notes, floral middle notes of lavender and rose, with earthy base notes of patchouli and cedarwood. Finally, we have the luscious oils and butters that are perfect for softening and nourishing for the skin. So, this bath melt is perfect for relaxing and moisturizing your skin. Next, you could create another lovely bath recipe with these lovely rose petals. Our Rose Violet Bath Melts Recipe is a perfect bath recipe that is elegant and amazing. This product uses luxurious oils and butters along with pink rose petals and the lovely scent of our of our amazing fragrance oil. As these lovely ingredients nourish your skin, the NG Rose & Violet Type Fragrance Oil leaves you with a beautiful aroma. This fragrance has a soothing medley of wild rose and sweet violet blossoms with touches of coconut, orange, and musk. So, this bath product recipe is everything you need for an amazing bath experience. Plus, you can create the Lavender Sage Bath Bomb Recipe with these lovely rose petals. This bath bomb recipe uses herbs and oils to make the perfect bath recipe for your skin. The oils moisturize the skin as the herbs, like rose petals, will nourish the body. Further, the herbal Lavender Sage Fragrance Oil is a perfect addition to this bath bomb. This scent is a complex and unique scent with top notes of French lavender, lime, sage, and fern leaves; followed by middle notes of dill, pepper, moss, and ginger; and well rounded with base notes of pine, musk, and patchouli. So, this bath bomb recipe is a perfect blend that leads to a great bath creation. The Perfectly Pampered Shaving Soap Recipe is a great recipe that is nourishing for the skin. Plus, this soap recipe is amazing for protecting your skin as you are shaving. This bar cleans as the ingredients nourish your skin. Plus, this soap bar will help as you get rid of all of your unwanted hair. Furthermore, this amazing soap recipe uses the most unique blend of uncommon fragrance notes ever found in a fragrance blend. Introducing, the unique and absolutely fascinating Cannabis Rose Type Fragrance Oil! This fragrance has a scent blend of Bulgarian rose, pomegranate flower, bergamot, cannabis accord, sheer jasmine, dark chocolate, white musk, patchouli, and oolong tea. Thus, this shaving soap will pamper you and leave you feeling gorgeous. Also, you can include both the gorgeous red rose petals and pink rose petals in the lovely Rose Milk Bath Recipe! This nourishing bath recipe uses petals, floral fragrance oil, and powdered milk to create an amazing product. The rose petals and powdered milk work together perfectly to provide your skin with the nourishment it needs to be its best. Plus, this recipe uses the Victorian Rose Fragrance Oil, which is the aroma of fresh cut roses with base notes of white musk and amber. Thus, this rose milk bath recipe is perfect skin softening and great for a relaxing bath! Also, you can create the lovely Rose Lotion Recipe with real red rose buds and petals. Not only does this rose infused lotion recipe use lovely rose petals, but it has fantastic butters and oils! These moisturizing ingredients are perfect for skin care by nourishing and moisturizing. This perfect lotion blend is made even better by using the delightful Fresh Cut Roses Fragrance Oil. This fresh rose aroma pairs perfectly with the aroma of the true herbal infusion to create a perfect rose water lotion recipe. Not only will this fragrance go nicely with the true aroma of real rose petals, but the scent actually is the truest fresh cut rose on the market that we have found. So, this is the perfect match! Plus, you can create the Vanilla Rose Sugar Scrub Recipe with real rose petals. This homemade lotion recipe uses an infusion of whole rose buds and petals. This infusion occurs after you create a sort of tea with these flowers to include into the lotion. Then, you include this rose water into your caring lotion recipe. This elegant recipe will perfectly nourish and care for your skin. Plus, this fragrance oil will leave an amazing aroma behind. The scent of these fresh rose petals blend nicely with the sweet Vanilla Bean Fragrance Oil and the elegant Fresh Cut Roses Fragrance Oil. These scents combine perfectly to create an amazing rose body lotion recipe. Another perfect recipe that you can create with whole rose petals is the Passion Massage Oil Recipe. So, you can use these rose petals to create a very romantic massage oil recipe. I mean, what is more romantic than rose petals? A real rose petal massage! This recipe cares for your skin as you get an amazing massage. Plus, this recipe uses the amazing Aromatherapy Passion Fragrance Oil. This aroma is a romantic combination of fragrance oil notes and essential oils, which blends floral notes such as lilac, gardenia, carnation, lavender, and hyacinth on a strong bouquet of roses. Altogether, this recipe is perfect for a passionate massage. This Envelope Sachet Recipe is a wonderful craft idea for adults. This is a fun recipe that smells fantastic. First, this recipe uses real herbs that smell lovely. Thyme Leaf Whole, Rose Petals, and Chamomile Flowers blend perfectly to create a nice sachet pouch. Plus, this fun craft uses the delightful Butterfly Meadows Fragrance Oil. This fragrance oil has the aroma of a bright and sunny summer day! Delight in the aroma of the fresh outdoors with Natures Garden’s butterfly meadows fragrance which begins with top notes of summer dandelion, refreshing verbena, and soft heliotrope; followed by middle notes of spring meadows, lily of the valley, and weeping willow; all sitting on base notes of sweet pea blossoms and Kentucky blue grass. Thus, this blend of scents is perfect for creating at home scented sachet recipes. Another great recipe that you can create with whole rose petals is the Lavender Luxury Cold Process Soap Recipe. Plus, this soap recipe uses lavender flowers, too. Furthermore, this soap recipe uses luxurious butters and oils that are amazing for the skin. Plus, the soap includes a lovely design or the beautiful Lavender Luxury Fragrance Oil. Not only is the soap a pretty purple and white design, but this cp soap smells amazing. The aroma is a lavender lover’s dream! This scent is the tranquil combination of fresh herbs and cool camphor that is unique and lovely. The aroma of lavender luxury fragrance begins with top notes of Italian bergamot, eucalyptus leaves, citrus zest, and French lavender; followed by middle notes of lily of the valley, and clary sage; sitting on base notes of Nordic pine, cool camphor, and clove buds. Also, this aroma in the finished bars is strong and true. Also, these rose petals would work perfectly for making our Rose Petal Bath Melts Recipe! These lovely bath melts are great for nourishing your skin with the added bonus of smelling amazing. The fantastic oils and butters care for your body as you soak in the tub. Plus, this fantastic recipe uses the delicious Coco Mango Fragrance Oil, which smells simply scrumptious. This complex fragrance oil begins with fruity notes of mango, fresh strawberries, elderberries, and ripe papaya. This sweet scent is completed with rich vanilla and toasted coconut with just a hint of soft musk. These cute heart shaped bath melts are perfect for making bath time your time! The Foaming Rose Petal Bath Bombs Recipe is a gorgeous and elegant. Plus, this fizzy fun product is a dream for bath time. It will care for your skin as you enjoy the lovely aroma. This Moonlight Tuberose Fragrance Oil is a lovely, elegant scent. In fact, Tuberose essential oil is extremely expensive and is used in the most exquisite fine fragrances. So, we have done our very best to create a fragrance oil with the same aroma as this expensive essential oil; while adding complimentary notes to make this fragrance oil balanced. This Natures Garden fragrance begins with top notes of white pear and green apple; followed by middle notes of tuberose, jasmine, lily of the valley, and ginger; sitting on base notes of violet, ylang ylang, peach, vanilla, and fresh woods. So, it is a perfect alternative to the pure essential oil and wonderful for this amazing bath product. Next, we have the lovely Burgundy Rose Bath Milk Soak Recipe! This bath product is great for your skin with its powdered milk and lovely herbs. The milk will care for the skin along with the Oat Straw Powder. Also, the gorgeous rose petals add in a lovely touch to this bath soak. Furthermore, this bath milk soak recipe uses the luxurious aroma of Burgundy Rose Fragrance Oil, which is where romanticism, luxury, and culture combine perfectly. This fragrance has an aroma of sensual burgundy rose with fresh white floral nuances, blend with exquisite burgundy wine, and warmed by precious musk and apple wood. Finally, this scent is topped off with an aroma of gorgeous rose that withstands in all bath and body products. Also, you can use this wonderful cosmetic herb to create the relaxing Roses and Chocolate Body Wrap Recipe. This amazing body wrap product nourishes you from head to toe as you unwind for about a half hour or so. Not only do the whole rose petals have beneficial skin properties, but the rosehips powder has the same wonderful rose benefits! Rose hips are simply are the fruit of wild roses. As you have read in the blog, roses are great for the skin! Plus, cocoa powder is great for skin, too. So, this spa quality product is perfect for skin care! Finally, we have the luscious skin care power of our Shea Lotion with Herbal Infusion Recipe! This recipe uses lovely oils and butters to protect and nourish the skin. Plus, the added skin care benefits of the rose powder herb will create a lotion recipe that will truly care for the skin. Plus, this product uses the lovely aroma of our Peach Magnolia Raspberry Fragrance Oil, which is a succulent blend of Lemon, Grapefruit, Peach Nectar, Raspberry, Pink Tulip, Soft Jasmine, Magnolia, Wild Honeysuckle, and Sheer Musk. 15 Ways to Use Rose Petals Check Out Our Recipes We hope that you enjoy these amazing rose petal recipes! These Natures Garden rose recipes are perfect for those that wish to create bath and body products that are perfect for skin care. These recipes are softening and moisturizing, so your skin will certainly enjoy any of these products. While any of these recipes would be great for your skin, feel free to formulate your own recipes with these lovely flower petals. If you’d like, then you can even share your creations on the Nature’s Garden Facebook page, Twitter, or our Instagram! You can find us on Instagram and Twitter @ngscents. On the other hand, we have tons of unique recipes that you can create from our site. If you liked these wonderful ideas, then you are in for a treat. We have tons of recipes that are unique and pertain to many different crafting interests. So, you can find all of our other amazing products that we have created on our website on the Free Classes and Recipes page.
Q: How to use Windows authentication to connect to Sql express? I have a .env file that contains the below and I am using tedious connection pool. SQL_SERVER=localhost SQL_UNAME=US\JENNY SQL_PSWD=Windows password SQL_DB=DatabaseName But I am getting login failed error as shown below: ConnectionError: Login failed for user 'US\JENNY' Below is my dbconfig file const dotenv = require('dotenv'); dotenv.config(); module.exports = { userName: process.env.SQL_UNAME, password: process.env.SQL_PSWD, server: process.env.SQL_SERVER, options: { instanceName: 'SQLEXPRESS', encrypt: false, database: process.env.SQL_DB, rowCollectionOnDone: true, useColumnNames: true // for easier JSON formatting } }; A: Not sure what version of Tedious you're using. I bring it up because userName and password have been moved into an authentication section, so your current config would get you a deprecation warning. But if you are using a current version, the authentication section also has an authentication.type setting that you can set to ntlm. See http://tediousjs.github.io/tedious/api-connection.html#function_newConnection for details. The following connection config works for a windows based login for me: module.exports = { server: process.env.SQL_SERVER, options: { instanceName: 'SQLEXPRESS', encrypt: false, database: process.env.SQL_DB, rowCollectionOnDone: true, useColumnNames: true }, authentication: { type: 'ntlm', options: { userName: process.env.SQL_UNAME, password: process.env.SQL_PSWD, domain: process.env.SQL_DOMAIN } } }
Although scientists know that depression affects the brain, they don’t know why some people respond to treatment while others do not. Now a team of UCLA researchers has shown for the first time in a large cohort of patients that electroconvulsive therapy (ECT), sometimes referred to as shock treatment, change certain areas of the brain that play a role in how people feel, learn and respond to positive and negative environmental factors. The team imaged the hippocampus and amgydalar in patients before, during and after undergoing ECT and compared those images to healthy control subjects. They also showed that the hippocampus changes, or increases in size, correlated to improved mood in patients with major depression and indicated how well they were responding to treatment. Additionally, using leading-edge methods to look at brain shape, the team showed that parts of these structures change more with treatment, providing vital clues to how the connections in the brain may be used to select for patients who will respond well to treatment. That would also result in sparing those patients who won’t respond from months of taking drugs that ultimately won’t work for them, said study senior author Katherine L. Narr, an associate professor of neurology. “Major depression is common, affects all ages, races and ethnic groups and has a serious consequence on people’s family lives and work,” Narr said. “People with depression also are at higher risk for suicide, which accounts for more deaths than car accidents, natural disasters and war each year on average. Unfortunately, standard types of medication used to treat major depression take a long time to work, and for at least a third of people, the medication will not work well enough to provide any real help.” The study appears in the early online edition of the peer-reviewed journal Biological Psychiatry. ECT, which has been used for more than 50 years, carries with it a certain stigma. However, within the last decade, advances in anesthesia, electrical stimulation equipment and new evidence about electrode lead placement have improved safety and reduced side effects, said study first author Shantanu H. Joshi, an assistant professor of neurology. Further advances in high-resolution MRI also allow the measurement of the induced brain changes with improved accuracy and precision. “ECT has been shown to be very effective for treating patients with major depression who don’t respond well to other treatments,” Joshi said. “During the treatment course, ECT leads to plastic changes in the brain that are linked with improvements in mood. Specifically, we saw the hippocampus and amygdala – important for memory and emotion – are shown to increase in size. People with smaller hippocampal size prior to starting treatment are less likely to respond as well to treatment. While our research investigates structural neuroplasticity in depression in response to ECT, our findings are considered to be of much broader interest to the field.” In addition to ECT, the team expects that the effects shown would extend to more standard, less rapidly acting antidepressant treatments and could be used to predict patient response. In this study, the team imaged 43 patients undergoing ECT at three time points, before beginning treatment, after the second ECT session and within one week of completing treatment, resulting in 129 brain scans. They also imaged 32 healthy controls twice, and compared those images to the ECT patients. Going forward, the UCLA team will examine the relationship between the hippocampal structural neuroplasticity and its neurochemistry in terms of the metabolite response, which has important implications for understanding the brain’s metabolic regulation and the excitation and suppression as a response to ECT. Additionally, the hippocampal and amgydalar shape will be used as features for classification and prediction of depression diagnosis and treatment response using advanced machine-learning techniques. The changes in the hippocampal and the amgydalar structure will be further investigated with regards to novel disease maintenance treatments along with relapse/recurrence rates. Major depression affects 350 million people each year and leads to enormous personal suffering, loss of productivity and is aburden to family, the health care system and the economy. Finding better ways to select patients for treatments that will alleviate their symptoms would go a long way to reducing that suffering, Narr said. “Our findings newly show that hippocampal structure prior to ECT may be an important indicator of treatment outcome,” the study states. “That is, patients with smaller hippocampal volumes at baseline are shown to more likely exhibit increases in volume with ECT and to show concomitant improvements in clinical symptoms. Results further indicate that both clinical response to ECT and ECT-induced changes in volume occur rapidly.”
#unittest { name: "Test variable declaration in if flow statement."; error: SYNTAX; error_row: 9; error_col: 6; }; func main() { if (var a) {}; }
Colorado Rockies Yard Flag Our Colorado Rockies Yard Flag is a great way to show your MLB spirit in your garden, front entranceway, porch, mailbox, or windows. These Yard Flags measure 10.5x15 inches, hang vertically, and provide a top sleeve for insertion of our garden flag pole or stand. This yard flag for Colorado Rockies is made of single-ply nylon and is embroidered with Colorado Rockie logos as shown.
This research utilized data from Reconnecting Youth in Iowa, a positive youth development program for at-risk students, to assess the relationship between two Adlerian psychology constructs: encouragement and social interest. Relevant survey questions utilized in outcome studies for the program were clustered into the theoretical constructs. Pearson product moment correlations revealed broad correlations between indicators of encouragement and social interest. Analysis of variance revealed there were significant difference between high, moderate, and low levels of encouragement on most social interest indicators. Implications for helping professionals and programmatic efforts are discussed.
It's a tale of two retailers: as Walmart has spiked this month, Macy's has slumped. If Walmart is to continue higher, it needs to clear one key technical hurdle, said Matt Maley, equity strategist at Miller Tabak. "Even though they've bounced back, it has not made a higher high yet," Maley said Wednesday on CNBC's "Trading Nation." "The chart is making what's called a symmetrical triangle formation so the stock is going to have to rally further before we can say that's it's going to really break out from here." Maley said Walmart would need to clear $100 to break above the symmetrical triangle formation, a pattern which suggests a consolidation period for a stock. "That would really show that we're going to have another leg higher in the rally that began in 2015," Maley added. "It needs some more upside follow-through before we can confirm that it's got much further to go." Macy's is in more danger of breaking lower, said Maley. "It needs to rally almost immediately because if it continues lower and you get down towards that $20 level, you're going to move below its trend line going all the way back to 2009 and then down at $17.50 that would give it a key lower low," he said. Stacey Gilbert, head of derivative strategy at Susquehanna, said the divergence in these two names is a good example of why active investing in this space is so important. "A theme that we're going to have ... which will remain for much of 2019 into 2020 is you can't just buy a basket," Gilbert said Wednesday on "Trading Nation." "You've got to know your names because the stories are going to be the telling parts particularly over the next 18 months to two years." Walmart is up 5 percent so far this year, while Macy's has broken down 18 percent.
Tigers finding their footing across the pond Nov 15, 2017 By Kirk Jessome The odds of becoming a varsity athlete at the university level in Canada are daunting. 750,000 athletes compete in high school athletics every year, while that number drops drastically to just 11,000 at the collegiate level. If an athlete is trying to make the next step and become a professional in their given sport, the odds are even more miniscule. Just one percent of athletes in the NCAA get drafted by a professional team, and the numbers are much lower for Canadian athletes. Despite the odds, several recently-graduated Tigers student-athletes have moved on to the professional stage, continuing their pursuit of excellence in the sports they love. Volleyball players Jonathan Macdonald (2011-2016) and Kristen O’Brien (2012-2017) both signed on with the Tierp Volley club in Sweden this year. Both have had an immediate impact for their new team, playing in all nine of their matches thus far. In addition to setting, Macdonald has also assumed coaching duties for the club. “I’m extremely excited to start the next chapter in my volleyball career,” says O’Brien, “I’m very thankful for the opportunity to continue playing alongside a former teammate and close friend (Macdonald) for a ninth season.” O’Brien also expressed his gratitude toward the Tigers program, and the Halifax community. “I’d like to thank everyone in the Dal Tigers family who have helped me along the way to reach my goals,” O’Brien continued, “I will miss Halifax greatly but I am looking forward to a new adventure in Sweden.” Max Burt (2006-2011) and Bryan Duquette (2010-2015) are also former Tigers volleyball players that are currently playing professional volleyball in Europe. Burt is enjoying success with ASUL Lyon, while Duquette has joined Chaumont Volley-Ball this year. Both teams compete in the French Pro A league. Both Burt and Duquette also spent time with Canada’s national team in 2017. Also playing professionally in France is former hockey Tiger and Halifax native, Andrew Wigginton (2012-2017). Wigginton currently plays for Neuilly-sur-Marne in the France Division 1 league. Making the leap to professional play on the basketball court are two recent graduates in Tessa Stammberger (2011-2016) and Kashrell Lawrence (2012-2017). Stammberger, who averaged 13 points and seven rebounds in her five-year career, took her offensive abilities to Germany to play for TK Hannover this season. The German-born forward has played in seven of the club’s eight games so far this season, averaging 12 minutes per game. Lawrence averaged 13 points to go along with six rebounds and nearly two steals a game. After performing at camps for multiple teams, Lawrence found a home, playing PeU-Basket, in Finland’s First Division. A starter, he’s averaging 22 points and 12.6 rebounds in 33 minutes per game. Lawrence credits his time at Dalhousie as a big part of preparing him for hi time in Europe. “One thing I can say about the Tigers is that they carry themselves with passion and integrity,” says, Lawrence, “I learned how to be a winner, something that relies on more than just skill. Being a part of that culture has helped me grow as a person and I’ve tried to bring those same qualities with me to Europe.”
"Cortana, All I need to know is did we lose them.""I think we both know the answer to that...""We made a blind jump...How did they...""..Get here first? The Covenant ships have always been faster. As for tracking us all the way from Reach, at light speed my maneuvering options were limited.""We were running dark, yes?""Until we decelerated, no one could have missed the hole we tore in subspace...They were waiting for us on the far side of the planet..."__________________________Hope you enjoy!The planet, stars, and nebulae in the background we're done solely in Photoshop. The ships were initially pencil sketches, which were later scanned and completed in Photoshop.I find it kind of strange that, despite the fact that there were multiple Covenant battle groups converging on the Autumn's position, you never see one Covenant vessel in any of the variations of this cutscene. Thus, I decided to add one such battle group approaching the PoA.Some resources that I used:Nebulae/Space Dust: [link] EDIT: Increased file size to 1920 x 1080 and used the "Sharpen" tool to eliminate some of the blurring.
Somehow I stumbled across a picture of girl in here very own dwarf helm and beard. The helm was crocheted and the beard was yarn. It was AWESOME and sent my brain a-reeling! Though crochet is currently oh of realm of crafting abilities, I settled on making a beard. My BIL's birthday was coming up fast, so it was the perfect time to whip one up for him just for fun. I bet he never expected to get a dwarf yarn beard from me, but that's what he got! In my research phases, I found a totally amazing and wonderful tutorial on how to make a beard like this, and that can be found here: http://www.instructables.com/id/How-To-Grow-Your-Own-Epic-Dwarf-Beard-In-One-Eveni/ This girl has changed my life! I see my future bright and full of beards! Not that I'm not surrounded by them in my everyday life from my husband and other BIL, but these are much more EPIC! Here he is modeling his new beard! It was so super fun and easy to make! And the beard is so so soft!!! My BIL wore his all night long and even drank his soda out of a straw so he could continue wearing it. Here it is all laid out. Sorry for the super crappy picture. I took it with my phone and was to much of a dummy to remember to take a better picture later. Oh well. My other BIL was super jealous and sadly looked at me in his best pouty face said "Jill, I want a yarn beard." How can I resist that? I absolutely love when I get crafty requests! It gets me pumped and excited. So, I went out and got new yarn and sat down and made him one, too. His is a salt 'n pepper one. ^_^ Still super soft. He liked it because he thought it looked wiser. Here it is all layed out. Though its hard to see, there is a blue bead attached to the gray band in the middle of the beard. That was my hubby's idea. ^_^ And here's what the back looks like. If you didn't take at look at the tutorial, you basically start by cutting up all your yarn the length that you want. You then cut the plastic canvas to the size you want and attach your yarn to it, starting at the bottom, with small crochet hook. Trust me, she has amazing instructions on there that are way indept and better than these, so you should go take a look. Now I need to make one for me! I want one that has reds and browns. ^_^ Though I definitely have enough yarn to make another brown beard and another black beard. SOOO cool! I might make a couple for my nephew and/or brother for the Bristol Renaissance Faire this summer. The tut seems a little obscure to me, though. Does it actually take crocheting skills at all? And I'm also having a little trouble figuring out how to insert the yarn. . . . I get the cow hitch ones along the bottom but I can't really get a handle on the middle ones. That is great fun. I work with children and their families and one of my families had mustaches for all of their kids for new year's eve and they wore them all night, I will have to share this with her because chances are next year they will all have a beard! Thanks for sharing! SOOO cool! I might make a couple for my nephew and/or brother for the Bristol Renaissance Faire this summer. The tut seems a little obscure to me, though. Does it actually take crocheting skills at all? And I'm also having a little trouble figuring out how to insert the yarn. . . . I get the cow hitch ones along the bottom but I can't really get a handle on the middle ones. Nope, no crochet skills needed. For the middle, its almost the same as the ends. You will pull the yarn through with the hook, and then on the other side you will pull the yarn through an adjoining hole again and then you will have a loop on the side that you started in which you can pull your yarn through. Hope that helps, leather!
Video: Bill Cosby was heckled at his show on Friday Bill Cosby is still out there doing a stand-up tour despite being accused of rape by 38 women. On Friday night –just a few hours after two more women stepped forward to claim they had been assaulted — he performed at The Lyric in Baltimore. About 15 minutes into his set Michael M. Cook stood up and shouted “38 women called you a rapist!” While most normal people with functioning brains see this as a good thing, obviously the people who still willingly buy tickets for and attend a Bill Cosby show were not so appreciative (they also obviously do not have functioning brains). Cook was booed and told to sit down by many people in the audience. One woman near him offered the brilliant counter-argument “what have women called you?” So just be warned, by the logic of a Cosby supporter, if any theoretical woman has ever theoretically said something bad about you, you have no right to criticize alleged serial rapist Bill Cosby. Cook attempted to placate the angry fans around him by saying “they’ll throw me out in a minute, don’t worry,” and indeed they did, but not before he was able to also scream “Tell the one about how to get away with rape!” Cosby kept to his usual routine when being heckled of telling the fans to calm down and not engage, and then just kind of waited for security to handle it for him. His response was met with thunderous applause. Oh, Cosby also at one point said “We are here to enjoy my gift” so you know he’s really in touch with reality.
Q: git: how to turn a clone into a new branch? I've cloned master from my repository and have been making a bunch of edits and local commits. I've now realised this should be a new branch in my remote repository. Normally I'd just push to the remote system, how do I push as a new branch to the remote repos? A: Assuming you have't pushed anything yet and your history looks something like A -- B -- C -- D -- E ^ ^ | | origin/master master You can just do the following: git branch feature git reset origin/master to get this: A -- B -- C -- D -- E ^ ^ | | | feature origin/master,master
Q: How to get date type value from object? I want to get all the values from an object whose data type is a date. How does that possible. And also after that, I want to convert it into UTC and save it. e.g. { employeeid: "4", id: 276, birthdate: "Thu Mar 26 2020 05:30:00 GMT+0530 (India Standard Time)", status: "pending" } From this object I just want birthdate(I won't be knowing the property name it can be anything). I want to make this code generic because the variable name varies and I want to use this for the whole application. A: You can parse a string as a date. If the string is a valid date then it returns a number representing the milliseconds elapsed since January 1, 1970, 00:00:00 UTC, otherwise, it returns NaN. /** * Check if the string is a valid date string or not. * For that we check if the given string is really a string, not a number. * Because a number is parsed as a date by Date.parse() */ function isDate(str) { let date = Date.parse(str); return (typeof str === 'object' && str instanceof Date) || (typeof str === 'string' && isNaN(+str) && !isNaN(date)); } /** * These are some examples * */ let dateString = "Thu Mar 26 2020 05:30:00 GMT+0530 (India Standard Time)"; let nonDateString = "Hello world"; let object = { employeeid: "4", id: 276, birthdate: "Thu Mar 26 2020 05:30:00 GMT+0530 (India Standard Time)", status: "pending" }; console.log('Date string: ', isDate(dateString)); console.log('Non date string:', isDate(nonDateString)); // Check a date object rather than a date string. It works for it as well. console.log('Date object:', isDate(new Date())); if (isDate(object.birthdate)) { console.log(`${object.birthdate}: is a date string.`); } else { console.log(`${object.birthdate}: is not a date string.`); } .as-console-wrapper{min-height: 100%!important; top: 0;} Update For your changed query I am updating this answer. As you need all the values of the object with date strings so for that I am generating a new object with all the dates and converts the date strings to UTC string. /** * Check if a string is a date or not. */ function isDate(str) { let date = Date.parse(str); return (typeof str === 'object' && str instanceof Date) || (typeof str === 'string' && isNaN(+str) && !isNaN(date)); } const obj = { employeeid: "4", id: 276, birthdate: "Thu Mar 26 2020 05:30:00 GMT+0530 (India Standard Time)", status: "pending", join: Date('2020-01-12') }; /** * This will makes a new object with the date types * and also convert the date into a UTC string. */ const dates = Object.entries(obj).reduce((a, [key, value]) => { return isDate(value) ? {...a, [key]: new Date(value).toUTCString()} : a; }, {}); console.log(dates); .as-console-wrapper {min-height: 100%!important; top: 0;}
Now Playing: Dendi vs. OpenAI at The International 2017 Latest news is coming from the Dota 2 World Championship “The International” that Elon Musk’s OpenAI Bot has beaten World best Player “Danil Ishutin“. This AI bot is developed by OpenAI Startup which is funded by the Elon Musk. This OpenAI Bot uses the Neural Network Fundamental principle to learn Dota 2 game in 2 weeks. The OpenAI Bot learned all skills and techniques by self playing the Dota 2 game from scratch in just 2 week. Greg Brockman the Chief Technical Officer of OpenAI told media that this AI Bot is trained by self-play. This OpenAI Bot started to play Dota 2 game with zero knowledge and keep on playing with a copy of his own. After playing for 2 week this bot is capable to beat any Top ranked Human player who plays this game for years. To test the skill level of this OpenAI Bot Greg Brockman participated into the Dota 2 world Championship i.e. The International. This tournament started on 7th August in Seattle with prize money of $10.7 Million US dollars. But, due to rules and regulations of the tournament this OpenAI Bot is not eligible of any Prize money. Still OpenAI team convinced Dota 2 top ranked player Danil Ishutin AKA “Dendi“. The organizer of The International introduces a special best of three 1V1 Match between the AI bot and Dendi. When the match started Dendi realize that he is dealing with some serious stuff. The OpenAI Bot beat Dendi in straight 2 matches and Dendi give up for the third round. After the defeat Dendi joyfully tweeted: Bot is really fun and challenging to play against 🙂 I am sure it is possible to beat it . But it have no room for even slight mistakes — Danil Ishutin (@DendiBoss) August 12, 2017 After this defeat media is going crazy upon the AI Bot which defeated the professional Dota 2 world class player. But one more AI robot which was developed by Microsoft has done something that no human ever achieved. Microsoft AI Bot in the starting of this year beat all level of Ms. Pac Man game. Microsoft also helped in the development of OpenAI bot which won against the Dendi. Elon Musk also thanked Microsoft on the twitter for helping OpenAI by allowing them to use Microsoft Azure crowd computing platform for its development. Elon Musk tweeted to thank Microsoft: Would like to express our appreciation to Microsoft for use of their Azure cloud computing platform. This required massive processing power. — Elon Musk (@elonmusk) August 12, 2017 Also See: Splatoon 2 : The Splat Brella will be the Next Free DLC Weapon Source: Twitter , openai , CNN
A former missionary provides information about Islam, discussing the religion's origin and expansion, the Quran, cultural and religious obligations, relations with Christianity, and how Christians can evangelize to Muslims. For every $20 you spend on books, you will receive $1 in Boomerang Bucks loyalty dollars. You can use your Boomerang Bucks as a credit towards a future purchase from Boomerang Books. Note that you must be a Member (free to sign up) and that conditions do apply.
1. Field of the Invention The invention lies in the field of semiconductor technology and pertains, in particular, to a semiconductor component with a drift zone that conducts current in the lateral direction. One of the most important market segments for smart power ICs is motor drives. Such control drives use, among other things, so-called half-bridge inverters. Due to the fact that these inverters need to be designed for voltages of a few 100 volts, IGBTs (Insulated Gate Bipolar Transistor) with lateral current conduction are generally used as switching elements. Despite their comparatively compact design, the IGBTs take up significantly more than half of the total chip surface of the respective half-bridge inverter (see, for example, M. Stoisiek et al., xe2x80x9cA Dielectric Isolated High-Voltage IC-Technology For Off-Line Applicationsxe2x80x9d, Proc. 1995 Int. Symposium on Power Semiconductor Devices and IC""s, Yokohama (1995), pp. 325-329; FIG. 8). To be able to produce half-bridge inverters and other high-voltage smart power ICs (reverse voltage Vbr greater than 200-600 volts) more economically, the material costs need to be reduced, and hence, in particular, the surfaces of the drift zones of the power semiconductor components of the IC need to be significantly reduced. By using the so-called resurf principle (reduced surface field principle)xe2x80x94see Appels and Vaes, xe2x80x9cHigh Voltage Thin Layer Devices (Resurf Devices),xe2x80x9d IEDM Tech. Dig., 1979, p. 238xe2x80x94the distribution of the electrical field on the surface of a semiconductor component can be influenced in a targeted fashion. This technique allows the production of compactly designed components with a high blocking capability and with comparatively thin semiconductor layers receiving the field. 2. Brief Summary of the Invention The object of the invention is to provide a semiconductor component that conducts current in the lateral direction which overcomes the above-noted deficiencies and disadvantages of the prior art devices and methods of this kind, and the drift zone of which, irrespective of whether it is designed as an MOS transistor, an IGBT, a thyristor or a diode, should take up a much smaller surface at a predetermined reverse voltage than the drift zone of the corresponding component known from the prior art. With the above and other objects in view there is provided, in accordance with the invention, a semiconductor component, comprising: a substrate formed of a first semiconductor material having a given electrical breakdown field strength and carrying a first insulator layer having a surface; a second layer covering at least a part of the surface of the first insulator layer, the second layer being formed of a second semiconductor material having an electrical breakdown field strength higher than the given electrical breakdown field strength of the first semiconductor material; the second layer having a first region in contact with a first electrode and doped to be electrically conductive, and a second region in contact with a second electrode and doped to be electrically conductive, the second layer extending in a first lateral direction so as to form a drift zone between the first region and the second region; a second insulator layer doped to be electrically conductive and covering the drift zone; and a control element conductively connected to one of the first and second electrodes and arranged in a portion of the substrate not covered by the second layer. In accordance with an added feature of the invention, the control element is a MOS structure. In accordance with an additional feature of the invention, the first region has a multiplicity of subregions of a corresponding conductivity type, the subregions are spaced apart from one another in a second lateral direction orthogonal to the first lateral direction, adjacent subregions are insulated from one another by contact regions of an opposite conductivity type, the control element has a first connection conductively connected to each of the subregions and a second connection conductively connected to each of the contact regions. In accordance with another feature of the invention, the first and second electrodes are each a comb-shaped electrode making contact with the subregions and the contact regions, respectively. In accordance with a concomitant feature of the invention, a product of a doping (in cmxe2x88x923) and of a thickness (in cm) of the second layer in a region of the drift zone is between 1013 cmxe2x88x922 and 5xc2x71013 cmxe2x88x922. The invention permits smart power ICs, for example, to be produced much more economically on account of the significantly smaller surface of the power semiconductor components, or permits a larger number of components with the same blocking ability to be integrated on a smaller chip surface. Other features which are considered as characteristic for the invention are set forth in the appended claims. Although the invention is illustrated and described herein as embodied in a semiconductor component, it is nevertheless not intended to be limited to the details shown, since various modifications and structural changes may be made therein without departing from the spirit of the invention and within the scope and range of equivalents of the claims. The construction and method of operation of the invention, however, together with additional objects and advantages thereof will be best understood from the following description of specific embodiments when read in connection with the accompanying drawings.
On the North Sea coast in the modern day, the Doctor, Jamie and Victoria learn of a series of mishaps and strange occurrences which has been plaguing the oil refineries. They soon find that a form of intelligent seaweed is rising up from the seabed, attempting to take over humanity -- and the invasion has already begun. Production On September 24th, 1964, Doctor Who story editor David Whitaker rejected a proposal entitled “The Slide” from writer Victor Pemberton. However, Pemberton had also submitted a version of the same story idea, excluding Doctor Who elements, to BBC Radio, where it was accepted by script editor Peter Bryant and eventually broadcast during February and March 1966. “The Slide” concerned the efforts of a sentient form of mud to take over a small village. In 1967, both Pemberton and Bryant found themselves working on Doctor Who. When Bryant, who was now the series' regular story editor, received a trial promotion to producer during the summer, Pemberton -- his assistant -- became the new story editor. Pemberton ultimately elected not to continue in the position past those initial three months, but did take the opportunity to suggest to Bryant that he write a new serial resurrecting elements of “The Slide”. Instead of mud, however, Pemberton took inspiration from the recent explosion of interest in natural gas and decided that the invading force should instead be sentient seaweed which thrived on the gas. This prompted a change in setting to a North Sea refinery. The recent explosion of interest in natural gas prompted a change in setting to a North Sea refinery “The Colony Of Devils” was commissioned by Bryant -- who had temporarily returned to his post as story editor -- on October 5th. Pemberton's adventure was targeted for production following The Enemy Of The World, as Serial QQ. However, towards the end of 1967, Bryant finally received a permanent appointment to the position of producer, to be replaced as story editor by Derrick Sherwin. Sherwin was less enamoured of Pemberton's scripts, and felt that several major changes needed to be made. A subplot in episodes four and five was removed; this involved the Weed attacking a conference, as it could now traverse the entirety of Great Britain's network of natural gas pipelines. Victoria was to have killed Oak's partner (at this point named Swan) with her screams in part five, while Jamie was to have finally defeated the Weed at the story's climax by playing his bagpipes. Sherwin had Swan survive -- although he generally toned down the spookiness of the Oak and Swan double-act -- and used Victoria's amplified screams to kill the Weed instead. To provide time for these rewrites, “The Colony Of Devils” was pushed back one spot in the recording schedule to become Serial RR, with The Web Of Fear brought forward to replace it. Pemberton was initially very unhappy about Sherwin's changes, and considered having his name taken off the scripts. Ultimately, however, Pemberton became satisfied with the story editor's decisions regarding what turned out to be his only televised Doctor Who serial (a subsequent idea, “The Eye In Space”, was rejected some months later; Pemberton additionally wrote the LP Doctor Who and The Pescatons for the Fourth Doctor and novelised both this and Serial RR). Another major change had to be made when it became known that Deborah Watling would be leaving Doctor Who with “The Colony Of Devils”. Sherwin duly inserted material into the scripts to build up to Victoria's departure. As well, a few characters had to be renamed due to similarities with figures from other recent adventures. Swan became Quill (there having been a Swann in The Enemy Of The World), while the presence of a Corporal Blake in The Web Of Fear caused the change of Blake in “The Colony Of Devils” to Price. Less significantly, Lutyens was modified slightly to Van Lutyens. Meanwhile, at Pemberton's suggestion, the scene of the TARDIS landing was set at sea rather than on a cliff edge as originally scripted. This was done to avoid duplicating a similar materialisation at the end of The Rescue three years earlier. Derrick Sherwin inserted material to build up to Victoria's departure The director assigned to “The Colony Of Devils” was Hugh David, who had handled The Highlanders the previous season. This was also his final Doctor Who serial. He went on to work on programmes like The Pallisers and The Man In The Iron Mask in addition to forming his own production company, Wildacre Productions. David died in the autumn of 1987. Filming began with three days on location starting on February 4th, 1968. David and his team had hoped to obtain permission to shoot at a real refinery, but the Natural Gas Development Board denied this request. Instead, the Red Sands Sea Fort in the Thames Estuary served as the refinery platform. Filming also took place at Botany Bay in Broadstairs, Kent for scenes on the beach. At the suggestion of production assistant Michael Briant, the regular screwdriver which the script indicated the Doctor should use in one of these sequences was replaced by a “sonic screwdriver” (although the prop used was actually just a pen torch). This device would become a recurring favourite of the Doctor's. Work then moved to the Ealing Television Film Studios, spanning February 7th to 9th. Most of the scenes recorded at this time were those which required use of the BBC's foam generator (Pemberton having envisaged the Weed as dwelling within a covering of foam). A fourth location day occurred on the 12th at the Denham Aerodrome in Denham, Buckinghamshire, when various helicopter close-ups were filmed. At about this time, the serial was retitled Fury From The Deep to avoid provoking controversy by using the word “Devil”. The first five episodes of Fury From The Deep followed the usual Doctor Who production pattern and were taped on successive Saturdays in Lime Grove Studio D. Part one went before the cameras on February 24th. In addition, David's team returned to Ealing on March 5th and 6th to film the climactic battle against the Weed for episode six. Some of the material from part four was remounted alongside the recording of the fifth installment on March 23rd. March 29th marked the end of Deborah Watling's regular involvement in Doctor Who The next week saw taping shift to Studio 1 at the BBC's Television Centre. The antiquated confines of Lime Grove D had never been suitable for Doctor Who's complicated production, and the more modern Television Centre would be the programme's home for most of the rest of the fifth recording block. The change of scenery also meant that the taping of episode six was scheduled for a Friday, March 29th. Although Victoria would reappear in the first part of the next story, The Wheel In Space (in material filmed as part of Fury From The Deep), this marked the end of Deborah Watling's regular involvement in Doctor Who. In addition to a considerable body of theatrical work, Watling thereafter appeared in television programmes such as The Newcomers and films including Take Me High and That'll Be The Day. She would later reprise her role as Victoria in the 1993 anniversary special Dimensions In Time and the video production Downtime. Watling also played Auntie in the Doctor Who audio drama Three's A Crowd from Big Finish Productions.
--- abstract: 'Analysis of the *Kepler* $\delta$Sct star KIC7106205 showed amplitude modulation in a single pressure mode, whilst all other pressure and gravity modes remained stable in amplitude and phase over the 1470d length of the dataset. The *Kepler* dataset was divided into a series with time bins of equal length for which consecutive Fourier transforms were calculated. An optimum fixed frequency, calculated from a least-squares fit of all data, allowed amplitude and phase of each pulsation mode for each time bin to be tracked. The single pressure mode at $\nu$=13.3942d$^{-1}$ changed significantly in amplitude, from 5.16$\pm$0.03 to 0.53$\pm$0.06mmag, but also varied quasi-sinusoidally in phase, with a characteristic period similar to the length of the dataset. All other p and gmodes were stable in both amplitude and phase, which is clear evidence that the visible pulsation mode energy is not conserved within this star. Possible causes of the observed amplitude and phase modulation and the missing mode energy are discussed.' author: - | Dominic M. Bowman[^1] and Donald W. Kurtz\ Jeremiah Horrocks Institute, University of Central Lancashire, Preston PR1 2HE, UK\ bibliography: - 'KIC7106205\_bib.bib' title: 'Pulsational Frequency and Amplitude Modulation in the $\delta$Sct star KIC7106205' --- asteroseismology – stars: oscillations – stars: variables: $\delta$Sct – stars: individual (KIC7106205) Introduction {#section: Introduction} ============ The recent revolution in space photometry, facilitated by the MOST, CoRoT and *Kepler* space missions, has dramatically improved our understanding for a variety of different types of stars. The vast increase in high quality data has driven remarkable advances into understanding both convection and the mechanisms that drive stellar pulsations in A and F-type variable stars [@Guzik2000a; @Dupret2004; @Dupret2005], i.e., the $\delta$Sct and $\gamma$Dor stars. Asteroseismology is a rapidly expanding field of astrophysics, in which stellar pulsations and the internal structures of stars are studied from periodic changes in brightness and radial velocity of their surfaces. With more than 4 yr of high duty cycle data from the *Kepler* space telescope, we are able to probe frequency and amplitude modulation of pulsation modes in $\delta$Sct and $\gamma$Dor stars. The high-precision values of frequency, amplitude and phase for individual pulsation modes in *Kepler* stars yield cleaner and richer amplitude spectra than can be obtained from a ground-based telescope and, most importantly, a better insight into the various pulsation excitation mechanisms. A little more than a decade ago, @Rod2001 commented in their catalogue of $\delta$Sct and related stars, that “*severe selection effects exist*” in ground-based observations, which made any analysis requiring high-precision values, such as mode identification, difficult. However, *Kepler* data are not limited by many of the observational biases encountered when using ground-based surveys, such as poor signal-to-noise and aliasing caused by large gaps in the data. In this paper, we demonstrate the superiority of space photometry, and in particular *Kepler* data, for asteroseismology and the study of pulsational amplitude modulation. The *Kepler* Mission {#subsection: Kepler Mission} -------------------- The *Kepler* space telescope, launched in 2009 March, has recorded photometric observations of more than 190000 stars at the $\umu$mag precision level [@Koch2010]. The *Kepler* telescope is in a 372.5-d Earth-trailing orbit and the field of view covered approximately 115deg$^{2}$ in the constellations of Cygnus and Lyra. The primary goal of the *Kepler* mission was to locate Earth-like planets in the habitable zone of their host star using the transit method [@Borucki2010]. The main mission came to an end in 2013 May when the telescope lost the function of a second reaction wheel that was vital for the still-pointing of the spacecraft. Since the failure, the mission parameters have been changed and the telescope is now observing in the plane of the ecliptic, because in this position solar torques can be balanced so that spacecraft drift can be controlled with minimum loss of propellent [@Haas2014]. The new mission has been named ‘K2’, and provides a variety of targets, such as young stars and star-forming regions, supernovae, white dwarfs, and the Galactic centre [@Haas2014]. The telescope may no longer be collecting data on the original target list, but there is more than 4yr of high quality data available to study on a variety of different stellar objects – a goldmine for scientific discoveries. *Kepler* data are available in two formats, long and short cadence (hereafter called LC and SC respectively). *Kepler’s* primary mission goal required a short integration time in order to maximise the number of data points for each transit of a planet in front of its host star. This was achieved by the SC data, which had an integration time of 58.5-s. However, this limited the number of stars that were observed at this cadence to 512 at any one time [@Gilliland2010]. LC data had an integration time of 29.5-min and consequently, the maximum number of LC targets was 170000 [@Jenkins2010b]. Therefore, a compromise between the number and temporal resolution of *Kepler* targets was chosen for a given observing time. Most target stars were chosen to fulfil *Kepler’s* primary goal of detecting planetary transits, but approximately 1 per cent of all targets were reserved solely for asteroseismology [@Gilliland2010]. LC data are grouped in quarters, denoted by Q\[n\], where n=0–17, which lasted for approximately 93d, although Q0, Q1 and Q17 were approximately 10, 30 and 30d, respectively. SC data are denoted by Q\[n\]M\[m\], where m=1,2 or 3. Every quarter, *Kepler* had to roll 90 degrees in order to keep its solar panels pointing towards the Sun and the radiator for keeping it cool pointing into deep space. Therefore, a star rotated its position on the focal plane 4 times throughout an entire *Kepler* year. For a detailed review concerning the differences in SC and LC asteroseismology using *Kepler* data and also the differences in the data processing pipelines, see @Murphy2012a. [c c c c c c c]{} & & & & & &\ & & & & & &\ KIC [@Brown2011] & 6960 $\pm$ 150 & 4.05 $\pm$ 0.15 & -0.01 $\pm$ 0.15 & 1.78 $\pm$ 0.89 & 11.46 & 0.005\ \ Revised KIC [@Huber2014] & 6900 $\pm$ 140 & 3.70 $\pm$ 0.15 & 0.32 $\pm$ 0.15 & 3.23 $\pm$ 0.61 & - & -\ \[table: stellar parameters\] Delta Scuti Stars {#subsection: Delta Scuti Stars} ----------------- Delta Scuti stars are the most common group of pulsating A-type stars, which lie at the intersection of the main sequence and the classical instability strip on the Hertzsprung-Russell (HR) diagram. Whilst on the main sequence, they range from A2 to F0 in spectral type and lie between 7000 $\leq T_{\rmn{eff}} \leq$ 9300 K [@Uytterhoeven2011]. The $\delta$Sct pulsations are excited by the $\kappa$-mechanism, which operates in the He<span style="font-variant:small-caps;">ii</span> ionisation zone, and consequently pressure (p) modes and gravity (g) modes are observed [@Chevalier1971a]. The changes in opacity, and therefore pressure, of a parcel of gas relative to its surroundings are analogous to a piston in a heat engine cycle. The result is a periodic expansion and reduction in the radius of the parcel of gas giving rise to the nomenclature of pressure modes. Typical periods for pmode pulsations in $\delta$Sct stars range from 15min to 5h [@Uytterhoeven2011]. See @Breger2000a for a thorough review of $\delta$Sct stars. Gamma Doradus Stars {#subsection: Gamma Doradus Stars} ------------------- Gamma Doradus stars have only been recognised as a distinct category of pulsating objects in the last two decades [@Kaye2000]. They have similar effective temperatures and luminosities to $\delta$Sct stars, such that both types of star occupy overlapping regions on the HRdiagram [@Uytterhoeven2011]. Most $\gamma$Dor stars observed by *Kepler* lie on the main sequence and range between F5 to A7 in spectral type and between 6500 $\leq T_{\rmn{eff}} \leq$ 7800 K [@Uytterhoeven2011]. However, using *Hipparcos* photometry, @Handler1999 found that $\gamma$Dor stars lie between 7200 $\leq T_{\rmn{eff}} \leq$ 7700 K, which illustrates that a difference in the definition of the red edge of the instability strip can cause confusion between distinguishing $\gamma$Dor and $\delta$Sct stars. Therefore, knowledge of the star’s pulsation frequencies is essential in order to classify the pulsator type. Even though they have similar spectral parameters to $\delta$Sct stars, pulsations observed in $\gamma$Dor stars are driven by a different mechanism: the flux modulation or flux blocking mechanism [@Guzik2000a; @Dupret2004; @Griga2005]. Pulsation driving requires the local convective timescale at the base of the convection zone to be similar to, or longer than the pulsation period, such that convection cannot adapt quickly enough to damp the pulsations [@Guzik2000a]. These buoyancy driven, gmode pulsations have much longer periods than pmodes observed in $\delta$Sct stars and range between 8h and 3d [@Uytterhoeven2011]. Hybrid Stars {#subsection: Hybrid Stars} ------------ Due to the unprecedented photometric precision, high duty-cycle and length of *Kepler* data, more pulsation modes have been observed in a variety of stellar types than was previously possible. Some stars have been found to exhibit modes in both the $\gamma$Dor regime $(\nu<4\,$d$^{-1})$ and the $\delta$Sct regime $(\nu\geq5\,$d$^{-1})$. Attempts have been made to catalogue the many different types of behaviour that these stars present. For example, it has been suggested that $\delta$Sct$/$$\gamma$Dor hybrids and $\gamma$Dor$/$$\delta$Sct hybrids are two distinct groups [@Griga2010]. Classifying a hybrid star often requires a visual inspection of the light curves for the star, which can be a lengthy process. Nonetheless, it is clear that a significant fraction of A- and F-type stars exhibit at least some form of hybrid behaviour. The once separate groups of $\gamma$Dor and $\delta$Sct stars overlap more than was previously thought as some stars show pulsations excited by the two different mechanisms [@Uytterhoeven2011]. From analysis of the complete *Kepler* dataset catalogue, at least 23 per cent of all A- and F-type stars can be classed as hybrid stars [@Uytterhoeven2011]. These stars are ideal test candidates to study pulsation energy conservation between the p and gmodes, and also between the modes and the driving zones, for both opacity and convective driving. If, for example, the visible pulsation energy is conserved within a star, then any decrease in mode amplitude in one or more modes would result in any number of other modes increasing in amplitude and vice versa. This concept has not been thoroughly investigated before now, and it is important to understand whether a star’s pulsation energy budget is constant, especially on such a short time scale as 4 yr. If a star does not conserve its pulsation energy, then it may be transferred to either the convection or ionisation driving zones, or to another damping region. Amplitude Modulation {#section: Amplitude Modulation} ==================== The vast number of stars available to study within the *Kepler* dataset has allowed the variety of observed stellar pulsations to be probed. Prior to space-based missions that were useful to asteroseismology, ground-based observations of variable stars had been limited to observing pulsations with amplitudes larger than a few mmag. Even so, some $\delta$Sct stars contained some constant and some extremely variable pulsation modes [@Breger2009]. There are few examples of stars that demonstrate this behaviour, and some case studies are given below. From theoretical studies of $\delta$Sct stars, mode-coupling is expected between different combinations of frequencies [@Dziembowski1982]. Parametric resonance instability can occur in which the instability of a linearly driven mode at $\nu_1$ causes the growth of two modes at $\nu_2$ and $\nu_3$ such that $\nu_1 \approx \nu_2 + \nu_3$, satisfying the resonance condition [@Dziembowski1982]. The decay of either a linearly driven p or gmode into 2 gmodes is most likely as linearly driven modes usually have low radial orders [@Dziembowski1982]. Observationally, this is difficult to confirm due to the extremely low gmode amplitudes and the complexities of different mode-coupling mechanisms at work within a star. However, with the high precision of the *Kepler* data, we can now begin to address this question. Case Studies ------------ In a recent paper, @Breger2014 analysed a rapidly rotating A-type star, KIC8054146, and observed mode-coupling of two ‘parent’ modes that produced a single ‘child’ mode, as predicted by the resonance condition given by @Dziembowski1982. The amplitude changes of a combination mode are predicted to follow the product of the amplitude changes in the two parent modes, which was subsequently used to identify which modes were the parent and child modes [@Breger2014]. KIC8054146 contained 349 statistically significant frequencies in the range $0<\nu\leq200$d$^{-1}$, including three separate ‘families’ of frequencies whose amplitude variations of the low frequency members correlated with the high frequency ones [@Breger2014]. Thus, energy seemed to be conserved between the visible pulsation modes in KIC8054146. Analysis of the $\delta$Sct star 4CVn over 40 years showed modes that appeared and disappeared unpredictably, which illustrated mode stability in A-type stars [@Breger2000b; @Breger2009]. A single pmode at $\nu$=7.375d$^{-1}$ decreased in amplitude from 15mmag in 1974, to 4mmag in 1976 and to 1mmag in 1977, after which a phase jump occurred and the mode began increasing in amplitude again [@Breger2000b]. Observations suggested that other frequencies were strongly coupled to the $\nu$=7.375d$^{-1}$ mode and @Breger2000b speculated that power was being transferred between modes by mode-coupling and suggested a few plausible possibilities: 1. *Mode Beating:* a simple beating model is supported by the observed phase change, which suggested that two modes of similar frequency and amplitude were beating against each other. However, the poor quality of the fit from this model led to this hypothesis being rejected [@Breger2000b]. 2. *Re-excitation:* the mode decayed and soon afterwards was re-excited with a completely random phase. However, this does not require the phase change of half a cycle that was observed [@Breger2000b]. 3. *Stellar Cycle:* the apparent periodic behaviour of the mode amplitude could be evidence of a stellar cycle as cyclic periodicity in mode amplitude cannot be explained by stellar evolution [@Breger2000b]. With more data, @Breger2009 found that the mode variability could be fitted with a period of decades - far longer than the current dataset available for the star. Therefore, without seeing even a single cycle for this mode, it was difficult to test the stellar cycle hypothesis. Therefore, the amplitude modulation in 4CVn remains an unsolved problem. A different form of amplitude modulation was seen in the Am star KIC3429637 (HD178875), which showed continual growth in mode amplitude across 2yr of the *Kepler* dataset [@Murphy2012b]. It was shown that two of the three most prominent modes grew in amplitude, whilst the other decreased – changes in all three modes required different functional forms. @Murphy2012b demonstrated that this was not an instrumental effect, as all modes would decrease or increase with the same functional form if the modulation was instrumental. @Murphy2012b concluded that real-time evolution of the star across 2yr of observations was seen. As the star evolved, the changes in the different pulsation cavities modulated the observed pulsation amplitudes [@Murphy2012b]. Even though they may act as useful case studies, it is difficult to draw conclusions concerning amplitude modulation from a few stars, conclusions that may have been speculative and specific to the case study in question. This is strong motivation for studying this phenomenon in detail using the much larger number of stars showing amplitude modulation within *Kepler* data. Clearly, it is important to understand the various interactions between different pulsation modes, even those that are driven by different excitation mechanisms, which reinforces the importance of studying hybrid stars and understanding the stellar pulsations they produce. To that end, the following hypothesis has been tested: *Is the visible pulsation energy conserved within KIC7106205?* From this, an investigation of energy conservation and mode-coupling followed. ![image](light_curve.eps){width="0.49\linewidth"} ![image](white_light_curve.eps){width="0.49\linewidth"} ![image](FT.eps){width="0.99\linewidth"} Data Retrieval: From Star to Screen {#section: Data Retrieval} =================================== In order to maximise the number of case studies of amplitude modulation, and to create a catalogue of modulated $\delta$Sct and $\gamma$Dor stars, a data retrieval and processing method has been automated for all stars between 6500$\leq\,$T$_{\rmn{eff}}\leq$ 20000K in the *Kepler* Input Catalogue (KIC; @Brown2011). Since *Kepler*’s launch, the resultant photometric time-series have been through several versions of the different data processing pipelines, the latest being the multi-scale Maximum A Posteriori (msMAP) implementation of the Pre-search Data Conditioning (PDC) module[^2]. Data are available from MAST[^3] in [FITS]{} file format, which were downloaded for stars between 6500$\leq\,$T$_{\rmn{eff}}\leq$ 20000K in the KIC and stored locally. These [FITS]{} files were then processed to produce time series in reduced Barycentric Julian Date (BJD - 2400000) and normalised magnitudes for each quarter of LC and month of SC data for every star. A pipeline for producing Fourier transforms for each quarter of LC data was also automated and stars that met the criteria of significant amplitude modulation of at least one pulsation mode were flagged for further study. The light curve of KIC7106205 in the top left panel of Fig.\[figure: all quarters\] shows reduction in the amplitude of variability of the star on a timescale less than the length of the dataset, which spans a total of 1470d (4yr). No data points have been deleted and no gaps have been interpolated in the time series for this star. The KIC parameters for KIC7106025 and the revised values from @Huber2014, with their respective errors, are given in Table\[table: stellar parameters\]. The values of T$_{\rm eff} $ (6900K) from both of these catalogues are consistent and characterises KIC7106205 as an early F-type star. KIC7106205 demonstrates a conclusion stated in @Huber2014 that stars with T$_{\rm eff}\leq7000$ listed in the original KIC have robust values for T$_{\rm eff}$. The revised values of $\log g$ and metallicity are sourced from spectroscopy and demonstrate the inconsistencies between spectroscopy and photometry for deriving $\log g$ and metallicity values. In their overview of A- and F-type stars, @Uytterhoeven2011 classify KIC7106205 as a pure $\delta$Sct star (i.e. shows no evidence of hybrid behaviour) and also a possible binary system. However, the analysis done by @Uytterhoeven2011 used only Q0 and Q1 of the *Kepler* dataset and as such, the resultant frequency resolution with only 40d of data was 0.025d$^{-1} (\approx$30$\umu$Hz). With 1470d of LC data available for KIC7106205, consisting of 65308 data points, the frequency resolution was 6.8$\times 10^{-4}$d$^{-1} (\approx$8nHz), and thus frequencies from stars with 1470d of *Kepler* data are well-resolved. As for possible binarity, the target pixel files were also extracted from MAST, and it was clear that there was negligible contamination from background sources. Contrary to @Uytterhoeven2011 we found in this analysis that KIC7106205 is a single star. There is no evidence of the pulsational frequency modulation that would be found in a binary system [@Shibahashi2012]. The Nyquist frequency of LC *Kepler* data is $1/(2\Delta t)$=24.51d$^{-1}$, where $\Delta t=29.5$-min is the cadence of the data. On board *Kepler* the data were regularly sampled, but due to the orbit of the spacecraft, barycentric corrections were made to the time series in order to correct for the difference in light arrival time of the photons to the barycentre of the solar system and to the telescope respectively [@Murphy2013]. This correction modified the time stamps in the time series to be in BJD and resulted in a cadence which was not constant. An advantage of the unequally-spaced data allows one to easily identify Nyquist aliases using super-Nyquist asteroseismology [@Murphy2013]. --------------- --------- ------------------- -------------------- ------------------------------- ------------ g$_1$ 0.6949 0.036 $\pm$ 0.006 0.231 $\pm$ 0.153 g$_1$ = g$_8$ - g$_7$ Q = 0.3247 g$_2$ 0.8153 0.016 $\pm$ 0.006 2.993 $\pm$ 0.357 g$_2$ = g$_8$ - g$_5$ Q = 0.2767 g$_3$ 0.8697 0.089 $\pm$ 0.006 2.986 $\pm$ 0.063 Q = 0.2594 g$_4$ 1.7397 0.027 $\pm$ 0.006 -3.029 $\pm$ 0.209 Q = 0.1297 g$_5$ 2.5464 0.008 $\pm$ 0.006 2.014 $\pm$ 0.659 g$_5$ = g$_8$ - g$_2$ Q = 0.0886 g$_6$ 2.6108 0.016 $\pm$ 0.006 -2.280 $\pm$ 0.349 Q = 0.0864 g$_7$ 2.6669 0.015 $\pm$ 0.006 -1.791 $\pm$ 0.381 g$_7$ = g$_8$ - g$_1$ Q = 0.0846 g$_8$ 3.3618 0.020 $\pm$ 0.006 0.487 $\pm$ 0.284 g$_8$ = g$_7$ + g$_1$ Q = 0.0671 p$_1$ 8.0193 0.291 $\pm$ 0.006 -1.612 $\pm$ 0.019 Q = 0.0281 p$_2$ 9.0588 0.591 $\pm$ 0.006 -2.940 $\pm$ 0.009 Q = 0.0249 p$_3$ 9.9821 0.291 $\pm$ 0.006 -3.160 $\pm$ 0.019 Q = 0.0226 p$_4$ 10.0324 4.525 $\pm$ 0.006 1.602 $\pm$ 0.001 p$_4$ = p$_5$ - g$_1$ Q = 0.0225 p$_5$ 10.7273 2.009 $\pm$ 0.006 -2.257 $\pm$ 0.003 p$_5$ = p$_4$ + g$_1$ Q = 0.0210 p$_6$ 10.8477 1.036 $\pm$ 0.006 0.065 $\pm$ 0.005 p$_6$ = p$_4$ + g$_2$ Q = 0.0208 p$_7$ 11.4421 0.205 $\pm$ 0.006 -1.008 $\pm$ 0.027 Q = 0.0197 p$_8$ 16.4530 0.144 $\pm$ 0.006 0.382 $\pm$ 0.034 Q = 0.0137 p$_{\rm mod}$ 13.3942 1.444 $\pm$ 0.006 -1.007 $\pm$ 0.004 p$_{\rm mod}$ = p$_4$ + g$_8$ Q = 0.0168 p$_{\rm mod}$ = p$_5$ + g$_7$ p$_{\rm mod}$ = p$_6$ + g$_5$ --------------- --------- ------------------- -------------------- ------------------------------- ------------ \[table: frequencies\] ![image](mode_cube_1.eps){width="0.49\linewidth"} ![image](mode_cube_2.eps){width="0.49\linewidth"} A Fourier View {#section: A Fourier View} ============== When analysing asteroseismic data, a normal approach is to use all data in a single Fourier transform, which maximises the signal-to-noise ratio and frequency resolution. In the following subsections, we explain the differences and advantages between using all data simultaneously compared to dividing the data into time bins, when performing a Fourier analysis of *Kepler* data. All the amplitude spectra produced in the analysis of KIC7106205 were discrete Fourier transforms and the method for calculating these numerically is described in detail in @Deeming1975. The midpoint of the entire time series, $t_0 = $2455688.77 (BJD), was chosen as the zero point in time when calculating every amplitude spectrum, in order to estimate phase errors accurately over 1470d when applying nonlinear least-squares fitting in other parts of the analysis. For the time-based approach, a bin length of 50d was chosen, which was a compromise between temporal and frequency resolution. Note that changing the bin length to another value between 30 and 100d did not significantly alter the results, but only the number of data points in Fig.\[figure: plots fixed freq\]. The midpoint of each 50d time bin was used as the time value label on the x-axis in all plots. The step size in frequency in the amplitude spectrum was defined as $1/(20\,T)$, where $T$ is the length of each dataset in days, so that every peak was fully resolved. All of the above steps ensured that the resultant values of frequency, amplitude and phase were reliable and consistent throughout the analysis, but also that they were of sufficient accuracy to have been used as input into a least-squares fit. All Data Simultaneously {#subsection: All Quarters} ----------------------- The amplitude spectrum for all LC data for KIC7106205 is shown in the bottom panel of Fig.\[figure: all quarters\]. As discussed in section \[subsection: Hybrid Stars\], there are two frequency regimes: gmodes have frequencies $\nu<4\,$d$^{-1}$ and pmodes have frequencies $\nu > 5\,$d$^{-1}$. The amplitude spectrum of KIC7106205 contains many pmodes that are clearly visible because of their high amplitudes compared to the noise level. Due to these strong pmode amplitudes, the gmodes were drowned in the noise and associated window patterns of the pmodes. In order to see the gmodes easily, frequencies outside of the gmode regime were pre-whitened down to 3$\umu$mag. The strongest 8 gmodes and 9 pmodes were used throughout the analysis of KIC7106205 and are given in Table\[table: frequencies\]. Since this was not a peak bagging exercise, through out this paper we refer to *all peaks* as the 17 peaks given in Table\[table: frequencies\], as these have strong amplitudes for their respective frequency regime, i.e. A $\geq$ 0.1mmag for pmodes and A $\geq$ 0.01mmag for gmodes. The most prominent pulsation mode has a frequency of 10.0324d$^{-1}$ with an amplitude of 4.525$\pm$0.022mmag. In order to establish whether this mode was stable in frequency and amplitude, the peak was prewhitened with a sinusoidal function, given as equation \[equation: ls fitting\], where $y$ is the resultant prewhitened function, $A_i$ is the amplitude, $\nu_{i}$ is the optimised frequency obtained from the nonlinear least-squares fit, $\phi_i$ is the phase in radians, and $t$ is the time normalised to the centre of the dataset, specifically $t_0 = $2455688.77 (BJD). The index $i$ refers to a particular mode. $$y= A_{i} \cos (2\pi\nu_{i}(t-t_0) + \phi_{i}) \label{equation: ls fitting}$$ The amplitude spectrum of the residuals of this fit was calculated and used to examine what periodicity remained within the data after a frequency had been removed from the associated time series. This process was performed for all peaks and it was found that all modes were stable down to at most 10$\umu$mag, except for $\nu$=13.3942d$^{-1}$. A resultant prewhitened light curve is given in the top right panel of Fig.\[figure: all quarters\], in which the significant amplitude modulation of the remaining mode can be seen. In the prewhitened amplitude spectrum, the pulsation mode at $\nu$=13.3942d$^{-1}$ is not a resolved single peak, which is shown on the right side of Fig.\[figure: modes\]. For comparison, the strongest stable frequency at $\nu$=10.0324d$^{-1}$ is shown on the left side of Fig.\[figure: modes\]. The top and bottom panels are before and after prewhitening each peak respectively. The remaining mode amplitude after prewhitening the peak at $\nu$=13.3942d$^{-1}$ was approximately 1mmag, which was the result of the peak being unresolved over the length of the 1470d dataset. A single frequency value output from a least-squares fit of all the data was unable to remove the various frequencies and corresponding amplitudes produced by this mode over 1470d. Hence, mode amplitude remains after prewhitening – a clear result of amplitude modulation. Since the pmode changed in frequency and amplitude over the length of the dataset, when all data were used in the amplitude spectrum, an unresolved peak was seen. It is important to note that this is the only pulsation mode that showed this behaviour and all others were stable in frequency and amplitude, remarkably stable to parts-per-million. [*This establishes that $\delta$Sct stars can have modes stable to this high precision over 4yr.*]{} Dividing the Data into 50d Segments {#subsection: Quarter by Quarter} ----------------------------------- The data were divided into 30 bins, each 50d (except for the last one which was 20d) in length, which allowed amplitude and phase to be tracked for all modes against time. An amplitude spectrum was calculated for each bin, and the resultant values of amplitude and phase optimised using a least-squares fit with fixed frequency. This showed that the amplitude of the pmode at 13.3942d$^{-1}$ decreased over the 1470d dataset, from 5.161$\pm$0.031 to 0.528$\pm$0.055mmag. This is clearly demonstrated in the right panel of Fig.\[figure: FT year by year\], in which a section of the amplitude spectrum containing the modulated pmode and other stable modes was tracked throughout the entire dataset. The left panel of Fig.\[figure: FT year by year\] shows the gmode regime tracked throughout the 1470d dataset. The gmodes do show small variations in amplitude, but these are negligible. They also show no phase variation and thus are considered to be stable in both amplitude and phase, as any amplitude modulation is within the errors calculated from the least-squares fit. ![image](FT_cube_g_modes.eps){width="0.49\linewidth"} ![image](FT_cube.eps){width="0.49\linewidth"} The fixed frequency for each mode used for tracking amplitude and phase throughout the dataset was obtained from a least-squares fit using the frequency, amplitude and phase of the peak from the high-resolution amplitude spectrum for all data as input parameters. The values of amplitude and phase were then optimised using this fixed frequency for each time bin in turn. The corresponding amplitude and phase values for the mode at 13.3942d$^{-1}$ for each 50d bin of data are given in Table\[table: LS fit\] and shown graphically in the right column of Fig.\[figure: plots fixed freq\]. The same method for tracking amplitude and phase for all other frequencies given in Table \[table: frequencies\] was performed. The results for the mode at 10.0324d$^{-1}$ are included in the left column of Fig.\[figure: plots fixed freq\] for comparison. 1$\sigma$ uncertainties for values of amplitude and phase are given in Tables\[table: frequencies\] and \[table: LS fit\], and shown in Fig.\[figure: plots fixed freq\], which were calculated from the least-squares fitting routine. ---------- ------ ------------------- -------------------- 54978.53 2121 5.161 $\pm$ 0.031 -1.284 $\pm$ 0.006 55028.53 2258 4.634 $\pm$ 0.030 -1.184 $\pm$ 0.006 55078.53 2208 4.113 $\pm$ 0.030 -1.096 $\pm$ 0.007 55128.53 2339 3.607 $\pm$ 0.029 -1.003 $\pm$ 0.008 55178.53 2179 3.126 $\pm$ 0.030 -0.908 $\pm$ 0.010 55228.53 2178 2.716 $\pm$ 0.030 -0.824 $\pm$ 0.011 55278.53 2283 2.295 $\pm$ 0.030 -0.744 $\pm$ 0.013 55328.54 2287 1.907 $\pm$ 0.030 -0.686 $\pm$ 0.016 55378.54 2315 1.576 $\pm$ 0.029 -0.656 $\pm$ 0.019 55428.54 2379 1.300 $\pm$ 0.029 -0.651 $\pm$ 0.022 55478.54 2312 1.037 $\pm$ 0.029 -0.669 $\pm$ 0.028 55528.05 2307 0.850 $\pm$ 0.029 -0.731 $\pm$ 0.035 55586.43 1391 0.705 $\pm$ 0.038 -0.858 $\pm$ 0.054 55628.54 2078 0.633 $\pm$ 0.031 -0.972 $\pm$ 0.049 55678.54 2390 0.599 $\pm$ 0.029 -1.125 $\pm$ 0.048 55728.55 2200 0.598 $\pm$ 0.030 -1.230 $\pm$ 0.050 55777.89 2310 0.603 $\pm$ 0.029 -1.304 $\pm$ 0.049 55828.66 2272 0.618 $\pm$ 0.030 -1.340 $\pm$ 0.048 55878.10 2031 0.632 $\pm$ 0.031 -1.345 $\pm$ 0.050 55929.93 2116 0.645 $\pm$ 0.031 -1.336 $\pm$ 0.048 55978.55 2077 0.653 $\pm$ 0.031 -1.309 $\pm$ 0.048 56028.54 2332 0.661 $\pm$ 0.029 -1.270 $\pm$ 0.044 56078.52 2335 0.647 $\pm$ 0.029 -1.219 $\pm$ 0.045 56128.53 1945 0.640 $\pm$ 0.032 -1.170 $\pm$ 0.050 56178.54 2379 0.626 $\pm$ 0.029 -1.120 $\pm$ 0.046 56228.54 1985 0.603 $\pm$ 0.032 -1.074 $\pm$ 0.053 56278.53 2387 0.575 $\pm$ 0.029 -1.011 $\pm$ 0.050 56328.53 1808 0.558 $\pm$ 0.033 -0.950 $\pm$ 0.059 56378.54 2062 0.545 $\pm$ 0.031 -0.910 $\pm$ 0.057 56413.77 663 0.528 $\pm$ 0.055 -0.869 $\pm$ 0.104 ---------- ------ ------------------- -------------------- : Amplitude and phase values optimised using a least-squares fit analysis for a fixed frequency of 13.3942d$^{-1}$ for each 50d time bin, where N is the number of data points in each time bin. The phases are all with respect to the time zero point $t_0 =$2455688.77 (BJD). \[table: LS fit\] It is clear that the amplitude of the 13.3942d$^{-1}$ mode dropped significantly and the phase changed over the length of the data set, while all other mode frequencies were stable in both amplitude and phase. We now discuss the implications of these observations. ![image](max_plots_1.eps){width="0.49\linewidth"} ![image](max_plots_2.eps){width="0.49\linewidth"} Discussion {#section: Discussion} ========== The hypothesis proposed in section \[section: Amplitude Modulation\] concerning amplitude modulation has been successfully tested: *Is the visible pulsation energy conserved in KIC7106205?* Small changes in amplitude were observed in the gmodes, but these changes were negligible as the errors on amplitudes were relatively much larger on smaller values. Moreover, the changes in gmode amplitudes were not sufficient to explain the significant decrease in amplitude of the mode at $\nu$=13.3942d$^{-1}$. Since the modulated mode was decreasing in amplitude, one would expect the gmode amplitudes to increase, if energy were to be conserved between the visible pulsation modes. Since, the negligible variation in the gmode amplitudes also show a slight decrease in amplitude over the dataset, the energy from the mode at $\nu$=13.3942d$^{-1}$ is not being transferred to the gmodes. Table\[table: frequencies\] lists the frequencies, amplitudes and phases with respective errors of the g and pmodes used in this analysis. It also labels the frequencies most likely to be combination frequencies. The pulsation constants were calculated using equation \[equation: pulsation constant\], $$\log\rm{Q} = \log\rm{P} + \frac{1}{2} \log g + \frac{1}{10} M_{\rm Bol} + \log\,T_{\rm eff} - 6.454 \label{equation: pulsation constant}$$ where P is the pulsation period in days, $M_{\rm Bol}$ is the bolometric magnitude (a value of $M_{\rm Bol} = 1.2$ was calculated using T$_{\rm eff}$ and $\log g$ in comparison with the Pleiades main sequence) and other parameters have their usual meanings with values taken from @Huber2014. The modulated pmode at $\nu$=13.3942d$^{-1}$ is subject to combination effects, but since the gmode amplitudes are so small and their variation is negligible, it is unlikely that these combination effects are the cause of the significant amplitude modulation. The strongest pulsation frequency at $\nu$=10.0324d$^{-1}$ has a pulsation constant of Q = 0.0225d, which suggests that is a first or second radial overtone mode (see @Stellingwerf1979). The modulated mode at $\nu$=13.3942d$^{-1}$ has a pulsation constant of Q = 0.0168d which suggests it is a third or fourth radial overtone mode. Since none of the pmodes have Q-values greater than the 0.033d expected for the radial fundamental mode, there is no evidence of any mixed modes. From the amplitude spectrum of all data, we found that the amplitudes of the 8 highest p and 8 highest gmodes were stable to at most 10$\umu$mag, and a single modulated mode at 13.3942d$^{-1}$ was unstable. Amplitude and phase values, optimised by least squares fitting, for a fixed frequency were also tracked across 1470d and found to be stable for all modes except $\nu$=13.3942d$^{-1}$. The most important point to note is that KIC7106205 is a star that contains pulsation modes, stable in frequency and amplitude to remarkable levels of precision, but also contains a single pulsation mode that is not. This behaviour is astrophysical and is not an instrumental effect. If this were an instrumental effect, one would expect all modes to decrease (or increase) in amplitude by the same amount over the length of the dataset. Since a significant decrease in amplitude of the pulsation mode at $\nu$=13.3942d$^{-1}$ was observed and all other modes were stable in frequency and amplitude, it is concluded that the visible pulsation energy was not conserved. In the following subsections, the possible causes of the amplitude modulation and quasi-sinusoidal phase variation are discussed. Causes of Decreasing Mode Amplitude ----------------------------------- Analysis of KIC7106205 showed a single mode that decreased in amplitude by an order of magnitude, on a timescale less than 1470d, with all other modes remaining stable in amplitude and phase. This star is an example of a hybrid star within the *Kepler* dataset with p and gmodes, but also both stable and unstable pulsation modes, among which visible energy is not conserved. The energy from this modulated mode has gone somewhere other than into the visible pulsation modes, as all other modes were observed to be stable in frequency and amplitude. The following are possible causes of the amplitude modulation observed in KIC7106205. 1. *Energy is lost to the convection or ionisation zone:* The energy may have been lost to the convection zone or He<span style="font-variant:small-caps;">ii</span> ionisation zone, both of which are driving regions in $\delta$Sct and $\gamma$Dor stars. This suggests that driving and damping are unstable processes on the time scale studied for some pulsation modes, but not for others. We conjecture that this is a function of the structure of the mode cavity with respect to the driving zones, particularly the positions of the radial nodes. Modelling studies might shed some light on this conjecture, and further observational studies of the *Kepler* hybrid stars will illuminate the range of mode stability characteristics observationally. Similar behaviour was reported by @Breger2000a from ground-based study of the $\delta$Sct star 4CVn. KIC7106205 demonstrates how much more clearly we can examine mode stability with the nearly continuous, high precision *Kepler* 4yr data. 2. *Mode Beating:* The change in amplitude of the modulated pmode at $\nu$=13.3942d$^{-1}$ is unlikely to be the result of unresolved frequencies beating. The amplitude spectrum of the full 1470d data set shows a broad peak not consistent with only two unresolved modes, hence a hypothesis of beating of unresolved mode frequencies would require more than two. That is further supported by the apparently non-periodic behaviour of the amplitude variability, coupled with the quasi-sinusoidal phase variability. This case is not similar to that of 4CVn, where @Breger2000b did suggest beating of unresolved mode frequencies. Finally, for mode frequencies to be unresolved in the 1470d full [*Kepler*]{} data set, they have to be closer in frequency than 8nHz. It is an unresolved question whether two mode frequencies can be this close in a pulsating star and still maintain their independent characters. Modelling studies are needed to address this question. 3. *Stellar Evolution:* Pulsations are the result of the balance between the driving and damping mechanisms in a star. Could the modulation of the $\nu$=13.3942d$^{-1}$ mode be the result of evolutionary changes in the structure of KIC7106205, which lies close to the red edge of the $\delta$Sct instability strip [@Uytterhoeven2011]? The answer to that question is not known, but for it to be true, the pulsation cavities would need to be finely tuned for all other modes to show the high level of stability observed. 4. *Mode-Coupling:* As mentioned in section\[section: Amplitude Modulation\], theory of $\delta$Sct star pulsations predicts mode-coupling that can affect pulsation frequencies. @Dziembowski1982 derived a parametric resonance condition of $\nu_1 \approx \nu_2 + \nu_3$, in which a low radial order, linearly driven mode, $\nu_1$, is able to decay into two other modes, $\nu_2$ and $\nu_3$. The most likely outcome is two gmodes with low amplitudes. If the gmodes are not observable, then this hypothesis cannot be verified. Small and negligible changes in amplitude were seen in the low-amplitude gmodes present in KIC7106205. However, the only combination frequencies that included the mode at $\nu$=13.3942d$^{-1}$ do not exclusively involve two gmodes that satisfy $\nu_1 \approx \nu_2 + \nu_3$. Moreover, the small amplitudes of the observed gmodes cannot explain the amplitude modulation seen in the mode at $\nu$=13.3942d$^{-1}$ according to the parametric resonance theory of @Dziembowski1982, as the amplitudes of the coupled modes need to be comparable. No growth of gmode amplitudes was observed. @Breger2014 do observe parent-daughter mode-coupling in [*Kepler*]{} data of the unusual $\delta$Sct star KIC8054146, but we see no similar behaviour in KIC7106205. We consider it unlikely that mode-coupling to gmodes that are not visible in the amplitude spectrum is an explanation for the changes in the 13.3942d$^{-1}$ mode. However, we cannot rule our coupling to high degree (high $\ell$) modes that are not visible in broadband photometry. A hypothesis of mode-coupling to unobservable high degree modes is not testable with [*Kepler*]{} data. This does not contradict our conclusion that we have tested the hypothesis of energy conservation in [*observable*]{} modes. Quasi-sinusoidal Phase Variations --------------------------------- A remarkable outcome of this analysis was the sinusoidal variation in phase of the pmode at a fixed frequency of $\nu$=13.3942d$^{-1}$. This cannot be the result of frequency modulation in a binary system [@Shibahashi2012], since that would affect all pulsation frequencies and would not generate amplitude modulation. The changes in the 13.3942d$^{-1}$ mode are internal to the star. A magnetic cycle with changes confined to the thin surface convection zone might conceivably affect only the highest radial overtone mode. However, the existence of lower amplitude modes with even higher frequencies, such as the one at $\nu$=16.4530d$^{-1}$ listed in Table\[table: frequencies\], argues against this. We know that the pulsation frequencies in the Sun are variable over the solar cycle [@Chaplin2000; @Chaplin2007], but whether such an effect is possible in $\delta$Sct stars is unknown. In the case of KIC7106205 the lack of any indication of periodicity in the amplitude modulation of the 13.3942d$^{-1}$ mode does not support a hypothesis of cyclic behaviour, and we note that for the phase variation there is only one cycle that may, or may not continue to vary quasi-sinusoidally. The possibly periodic nature of this variation suggests that the mode may become re-excited in the future and start to increase in amplitude once again, but with only a single cycle observed, this is very speculative. This was not observed in the amplitude and phase variations of 4CVn, as the re-excited pulsation mode in that star was preceded by a phase shift of half a cycle [@Breger2000b; @Breger2009]. Quasi-sinusoidal phase variation was also observed in pulsation modes in KIC8054146, which @Breger2014 interpreted as mode-coupling, since they could observe the coupled modes in that star. We cannot do that for KIC7106205. We therefore reach no conclusion about the quasi-sinusoidal phase variation of the 13.3924d$^{-1}$ mode, but simply note it. Conclusions {#section: Conclusions} =========== KIC7106205 is an ideal case study of a $\delta$Sct star that exhibits amplitude modulation because only a single pulsation mode is modulated over the length of the dataset, whilst all other modes remained highly stable in both frequency and amplitude. We showed that this amplitude modulation is astrophysical, not instrumental. A single pmode at $\nu$=13.3942d$^{-1}$ decreased in amplitude from 5.161$\pm$0.031 to 0.528$\pm$0.055mmag over 1470d. The missing mode power was not seen to increase the amplitude of any existing p or gmode, nor did it excite any new visible modes in either of the low or high frequency regime. Hence, we conclude that the visible pulsation energy is not conserved in KIC7106205. There are two possible explanations for the lost mode energy: mode-coupling or loss of mode energy to the convection zone and/or the pulsational p-mode driving He<span style="font-variant:small-caps;">ii</span> ionisation zone. We suggested that mode-coupling to gmodes is not a likely explanation, as even though gmodes are visible in hybrid stars such as KIC7106205, none of the gmodes observed meet the criteria specified in @Dziembowski1982. We cannot rule out coupling to high degree modes that are not visible in broadband photometry. @Breger2000b speculated that power can be transferred between pulsation modes by a mode-coupling mechanism but was unable to completely explain the amplitude modulation observed in 4CVn. Similarly, @Breger2014 concluded that a mode-coupling mechanism was operating in KIC8054146, in which amplitude and phase variation of many different modes was observed. A similar mode-coupling mechanism could be at work within KIC7106205 and such effects are important if one is to fully understand the mechanisms that excite pulsation modes and the physics that governs hybrid stars within the instability strip. Alternatively, if mode-coupling is not the explanation, then the lost energy must have been transferred somewhere in the star; whether this is caused by a decrease in driving in the He<span style="font-variant:small-caps;">ii</span> ionisation zone, or an increase in damping elsewhere is not known. Stellar evolution theory and convection models predict that real-time evolution of a star can be observed with a dataset as short as a few years. [@Murphy2012b] analysed a $\rho$Puppis star, in which two pulsation modes grew in amplitude over the time span of the dataset. They concluded that the growth in mode amplitude might be the result of the pulsation driving zone being driven deeper within the He<span style="font-variant:small-caps;">ii</span> ionisation zone, which is predicted by stellar evolution models for this star. Therefore, the star was evolving in real time over the 2yr of observations. Since a decline in mode amplitude was observed in KIC7106205, it is unlikely that this is the same effect. It does mean that stellar evolution can operate on short timescales, on the order of years, but does not provide support for the amplitude modulation being caused by the outer layers of KIC7106205 altering the pulsation cavity for the 13.3942d$^{-1}$ mode. The mode at 13.3942d$^{-1}$ is not the highest overtone observed in KIC7106205, it is unlikely that stellar evolution is the solution to the amplitude modulation seen, as a higher frequency mode at $\nu$=16.4530d$^{-1}$ was observed to be stable. Both mode-coupling to high-degree modes and energy being lost to a damping region could explain the amplitude modulation seen in KIC7106205. The analysis of the star does not distinguish which is more likely, only that the energy lost from the modulated mode was not transferred to any of the existing observed pulsation modes. In reality, both solutions could be operating in congruence, as both are feasible solutions to the observed amplitude modulation, which further complicates the issue of testing the hypothesis of energy conservation between pulsation modes. These conclusions are speculative, but this is a step toward understanding the phenomenon of amplitude modulation within $\delta$Sct and $\gamma$Dor stars using the *Kepler* dataset. What is certain is that the hypothesis concerning energy conservation between visible pulsation modes has been successfully tested and proved not to be the case in KIC7106205. This problem of mode stability is widely observed in pulsating stars. For stochastically driven, solar-like and red giant pulsators there is no problem understanding changes in mode amplitude and phase, given the stochastic nature of the driving. For heat engine pulsators, the situation is unclear. acknowledgements {#acknowledgements .unnumbered} ================ DMB wishes to thank the STFC for the financial support of his PhD and the *Kepler* team for providing such excellent data. [^1]: Email: dmbowman@uclan.ac.uk [^2]: Kepler Data Notes: https://archive.stsci.edu/kepler/data$\_$release.html [^3]: MAST website: http://archive.stsci.edu/kepler/
Q: How do I make the square-bracketed numbers in my bibliography equally sized when using the Roboto font? when I am using the Roboto font, the bibliography numbering is not equally sized: using this minimal example \documentclass{article} \usepackage[backend=bibtex,style=ieee, sorting=none]{biblatex} \usepackage[sfdefault]{roboto} \begin{filecontents*}{./example.bib} @article{nice, author={B. C. Dull}, title={All functions are {$C^{\infty}$}}, journal={J. False Results}, year={2033}, } @article{nice2, author={B. C. Dull}, title={All functions are {$C^{\infty}$}}, journal={J. False Results}, year={2033}, } \end{filecontents*} \addbibresource{example.bib} \begin{document} Test~\cite{nice,nice2}. \printbibliography \end{document} The output is something like this: How to I make them equally sized? A: You can use tabular numbers everywhere, which you can do by loading the roboto package with the tabular option: \usepackage[sfdefault,tabular]{roboto} Or you can change the type of numbers just for the labels in the bibliography by adding this after loading biblatex: For pdflatex \DeclareFieldFormat{labelnumber}{% \ifbibliography {\fontfamily{Roboto-TLF}\selectfont} {}#1} For xelatex or lualatex \DeclareFieldFormat{labelnumber}{% \ifbibliography {\addfontfeatures{Numbers=Monospaced}} {}#1}
Symptom dimensions of anxiety following myocardial infarction: associations with depressive symptoms and prognosis. Differential associations of symptom dimensions with prognosis in myocardial infarction (MI) patients have been shown for depression, but no studies have focused on anxiety dimensions. The aim of this study was to assess the association between somatic and psychological symptoms of anxiety following acute MI with adverse prognosis and to assess the overlap between anxiety and depression dimensions. Patients (n = 418) were assessed on demographic and clinical variables. The Hamilton Anxiety and Depression Rating Scales were used to measure anxiety and depression 2 months post-MI. Mean follow-up period was 3.8 years and the endpoint consisted of all-cause mortality and recurrent MI. After adjustment for demographic and clinical variables, somatic anxiety was significantly associated with recurrent MI and mortality (HR: 1.32; 95% CI [1.03, 1.69]; p = .03), and a trend was shown for an association between psychological anxiety and outcome (HR: 1.29; 95% CI [0.99, 1.67]; p = .06). The total anxiety score of the HARS was the strongest predictor of recurrent MI and mortality (HR: 1.38; 95% CI [1.07, 1.78]; p = .02). The HARS and the HDRS were highly correlated (r = .86; p < .01). Dimensions consisting of psychological distress (HR: 1.29; 95% CI [1.02, 1.63]; p = .03) and cardiopulmonary/autonomic symptoms (HR: 1.36; 95% CI [1.06, 1.75]; p = .02) also predicted outcome in adjusted analyses. Anxiety was associated with adverse prognosis in MI patients with significant associations for somatic anxiety and total anxiety. When combining anxiety and depression items, psychological distress and cardiopulmonary/autonomic symptoms predicted recurrent MI and mortality. Future research might better focus on dimensions of anxiety and depression simultaneously in MI patients.
«Very good health and Euros» for 2002 The final phase of the euro awareness campaign gathered more pace yesterday with all the members of the Balearic parliament receiving their euro starter kits, although they did not have to queue up: the kits were handed out by waiter carrying the bags of coins on a silver tray. Across Palma school children were taking part in a number of euro schemes and the Pueblo Espanyol hosted a huge euro party for the retired and elderly to mark the end of the euro pensioner 2001 campaign organised by the Balearic European Centre and Sa Nostra bank. Over 800 pensioners gathered at the Pueblo Espanyol and Balearic leader Francesc Antich said that the elderly are now probably more accustomed to the single currency than any other section of the community because of all the attention they have been given. Antich wished them all “good health and euros” for 2002. Balearic Minister for Finance, Joan Mesquida, said that his ministry has been working “frantically” over the past few months in order to “rid the public of their single currency fears and boost their confidence in the euro.” The Euro pensioner 2002 campaign was launched four months ago with the aim of making sure that the elderly and prepared for the euro. In total 7'500 elderly people from 214 associations have taken part in the various theoretical projects. Over 100'000 school children have also been targeted and so too have the blind, Mesquida said. A special shop was set up in the Pueblo Espanyol yesterday for people to actually practice using the fictitious new coins and notes and get used to the feel of the new currency. Comments The content of comment is the opinion of users and netizens and not of mallorcadailybulletin.com. Comments contrary to laws, which are libellous, illegal or harmful to others are not permitted'); mallorcadailybulletin.com - reserves the right to remove any inappropriate comments. Warning Please remember that you are responsible for everything that you write and that data which are legally required can be made available to the relevant public authorities and courts; these data being name, email, IP of your computer as well as information accessible through the systems. Name (*): ↑ ↑ E-mail (*): ↑ ↑ Comment: ↑ ↑ * Mandatory fields I accept the conditions of the rules of use and privacy polic
Three-time Super Bowl champion defensive lineman Richard Seymour earned millions in his playing career with the New England Patriots and Oakland Raiders. But he got a little bit richer this week. Seymour participated in the 2019 World Series of Poker and made a run in the competition’s main event, finishing 131st out of 8,569 entrants. He came into the main event in 35th place, according to ESPN. TENNESSEE TITANS COACH MIKE VRABEL REVEALS HORRIFYING DEAL HE'D MAKE TO WIN ANOTHER SUPER BOWL Seymour had about 3.6 million in chips though he was forced to fold several times and his stack quickly dwindled down to 725,000 chips, according to ESPN. On his final hand, Seymour went all-in with a king of hearts and a four of diamonds but lost out to another opponent’s three-of-a-kind. The three-time All-Pro earned $59,295 playing in the event. Hendon Mob Poker Database, which tracks poker players’ earnings, says Seymour has earned more than $630,000 playing poker in his retirement. CLICK HERE TO GET THE FOX NEWS APP He retired from professional football after the 2012 season.
"""Generate random Python for testing.""" import collections from itertools import cycle, product import random import re import sys import coverage from coverage.parser import PythonParser class PythonSpinner(object): """Spin Python source from a simple AST.""" def __init__(self): self.lines = [] self.lines.append("async def func():") self.indent = 4 @property def lineno(self): return len(self.lines) + 1 @classmethod def generate_python(cls, ast): spinner = cls() spinner.gen_python_internal(ast) return "\n".join(spinner.lines) def add_line(self, line): g = "g{}".format(self.lineno) self.lines.append(' ' * self.indent + line.format(g=g, lineno=self.lineno)) def add_block(self, node): self.indent += 4 self.gen_python_internal(node) self.indent -= 4 def maybe_block(self, node, nodei, keyword): if len(node) > nodei and node[nodei] is not None: self.add_line(keyword + ":") self.add_block(node[nodei]) def gen_python_internal(self, ast): for node in ast: if isinstance(node, list): op = node[0] if op == "if": self.add_line("if {g}:") self.add_block(node[1]) self.maybe_block(node, 2, "else") elif op == "for": self.add_line("for x in {g}:") self.add_block(node[1]) self.maybe_block(node, 2, "else") elif op == "while": self.add_line("while {g}:") self.add_block(node[1]) self.maybe_block(node, 2, "else") elif op == "try": self.add_line("try:") self.add_block(node[1]) # 'except' clauses are different, because there can be any # number. if len(node) > 2 and node[2] is not None: for except_node in node[2]: self.add_line("except Exception{}:".format(self.lineno)) self.add_block(except_node) self.maybe_block(node, 3, "else") self.maybe_block(node, 4, "finally") elif op == "with": self.add_line("with {g} as x:") self.add_block(node[1]) else: raise Exception("Bad list node: {!r}".format(node)) else: op = node if op == "assign": self.add_line("x = {lineno}") elif op in ["break", "continue"]: self.add_line(op) elif op == "return": self.add_line("return") elif op == "yield": self.add_line("yield {lineno}") else: raise Exception("Bad atom node: {!r}".format(node)) def weighted_choice(rand, choices): """Choose from a list of [(choice, weight), ...] options, randomly.""" total = sum(w for c, w in choices) r = rand.uniform(0, total) upto = 0 for c, w in choices: if upto + w >= r: return c upto += w assert False, "Shouldn't get here" class RandomAstMaker(object): def __init__(self, seed=None): self.r = random.Random() if seed is not None: self.r.seed(seed) self.depth = 0 self.bc_allowed = set() def roll(self, prob=0.5): return self.r.random() <= prob def choose(self, choices): """Roll the dice to choose an option.""" return weighted_choice(self.r, choices) STMT_CHOICES = [ [("if", 10), ("for", 10), ("try", 10), ("while", 3), ("with", 10), ("assign", 20), ("return", 1), ("yield", 0)], [("if", 10), ("for", 10), ("try", 10), ("while", 3), ("with", 10), ("assign", 40), ("return", 1), ("yield", 0), ("break", 10), ("continue", 10)], [("if", 10), ("for", 10), ("try", 10), ("while", 3), ("with", 10), ("assign", 40), ("return", 1), ("yield", 0), ("break", 10), ("continue", 10)], [("if", 10), ("for", 10), ("try", 10), ("while", 3), ("with", 10), ("assign", 40), ("return", 1), ("yield", 0), ("break", 10), ("continue", 10)], [("if", 10), ("for", 10), ("try", 10), ("while", 3), ("with", 10), ("assign", 40), ("return", 1), ("yield", 0), ("break", 10), ("continue", 10)], # Last element has to have no compound statements, to limit depth. [("assign", 10), ("return", 1), ("yield", 0), ("break", 10), ("continue", 10)], ] def make_body(self, parent): body = [] choices = self.STMT_CHOICES[self.depth] self.depth += 1 nstmts = self.choose([(1, 10), (2, 25), (3, 10), (4, 10), (5, 5)]) for _ in range(nstmts): stmt = self.choose(choices) if stmt == "if": body.append(["if", self.make_body("if")]) if self.roll(): body[-1].append(self.make_body("ifelse")) elif stmt == "for": old_allowed = self.bc_allowed self.bc_allowed = self.bc_allowed | set(["break", "continue"]) body.append(["for", self.make_body("for")]) self.bc_allowed = old_allowed if self.roll(): body[-1].append(self.make_body("forelse")) elif stmt == "while": old_allowed = self.bc_allowed self.bc_allowed = self.bc_allowed | set(["break", "continue"]) body.append(["while", self.make_body("while")]) self.bc_allowed = old_allowed if self.roll(): body[-1].append(self.make_body("whileelse")) elif stmt == "try": else_clause = self.make_body("try") if self.roll() else None old_allowed = self.bc_allowed self.bc_allowed = self.bc_allowed - set(["continue"]) finally_clause = self.make_body("finally") if self.roll() else None self.bc_allowed = old_allowed if else_clause: with_exceptions = True elif not else_clause and not finally_clause: with_exceptions = True else: with_exceptions = self.roll() if with_exceptions: num_exceptions = self.choose([(1, 50), (2, 50)]) exceptions = [self.make_body("except") for _ in range(num_exceptions)] else: exceptions = None body.append( ["try", self.make_body("tryelse"), exceptions, else_clause, finally_clause] ) elif stmt == "with": body.append(["with", self.make_body("with")]) elif stmt == "return": body.append(stmt) break elif stmt == "yield": body.append("yield") elif stmt in ["break", "continue"]: if stmt in self.bc_allowed: # A break or continue immediately after a loop is not # interesting. So if we are immediately after a loop, then # insert an assignment. if not body and (parent in ["for", "while"]): body.append("assign") body.append(stmt) break else: stmt = "assign" if stmt == "assign": # Don't put two assignments in a row, there's no point. if not body or body[-1] != "assign": body.append("assign") self.depth -= 1 return body def async_alternatives(source): parts = re.split(r"(for |with )", source) nchoices = len(parts) // 2 #print("{} choices".format(nchoices)) def constant(s): return [s] def maybe_async(s): return [s, "async "+s] choices = [f(x) for f, x in zip(cycle([constant, maybe_async]), parts)] for result in product(*choices): source = "".join(result) yield source def compare_alternatives(source): all_all_arcs = collections.defaultdict(list) for i, alternate_source in enumerate(async_alternatives(source)): parser = PythonParser(alternate_source) arcs = parser.arcs() all_all_arcs[tuple(arcs)].append((i, alternate_source)) return len(all_all_arcs) def show_a_bunch(): longest = "" for i in range(100): maker = RandomAstMaker(i) source = PythonSpinner.generate_python(maker.make_body("def")) try: print("-"*80, "\n", source, sep="") compile(source, "<string>", "exec") except Exception as ex: print("Oops: {}\n{}".format(ex, source)) if len(source) > len(longest): longest = source def show_alternatives(): for i in range(1000): maker = RandomAstMaker(i) source = PythonSpinner.generate_python(maker.make_body("def")) nlines = len(source.splitlines()) if nlines < 15: nalt = compare_alternatives(source) if nalt > 1: print("--- {:3} lines, {:2} alternatives ---------".format(nlines, nalt)) print(source) def show_one(): maker = RandomAstMaker() source = PythonSpinner.generate_python(maker.make_body("def")) print(source) if __name__ == "__main__": show_one() #show_alternatives()
Q: Anusati vs Bhavana If we take meditation objects like caganusati, silanusati, buddhanusati, maranasati etc. we can clearly see that all of them require active and sustained thought, however so does metta bhavana or asubha bhavana. Why then is there a distinction in name? A: "X-Anusati" basically means "go over the memory of X" ("anu" is literally "under" but it has connotation of following something, in this case following a memory). "X-Bhavana" means something like "generate X", "cultivate X", "produce X". As you said, both involve the act of Calling something into mind (what you call "active thought") and then Mulling Over it (what you called "sustained thought"). The Mulling Over part is the same in both cases but the Calling part differs. In case of Anusati the emphasis is on recalling something we know from before, while in case of Bhavana the emphasis is on creating or manufacturing something new. In practice, however, there is not that much difference, since in case of e.g. buddhanusati we have not actually experienced Buddha first-hand and have to manufacture his image from conceptual elements we know of. Conversely, in case of asubha bhavana it's not like we create the disgusting images completely from scratch, we assemble them from memories of disgusting things we have experienced before. Why they are named differently? I guess, that's because in case of X-anusati that "X" refers to the source memory - while in case of "X-bhavana" that "X" refers to the target state. Indeed, it would not make sense to call it "metta-anusati" or "asubha-anusati" - because we are not actually remembering metta or asubha, we're generating them. Similarly, it would not make sense to call it "buddha-bhavana" or "sila-bhavana" - because we are not cultivating Buddha or our sila, we are remembering them.
I’m sure most people have consumed a bowl of “cream of mushroom soup” at some point. In many cases, you may have experienced it straight out of a can – the insipidly pale, gelatinous blob never failing to underwhelm both visually and flavour-wise. But canned soup aside, I believe that mushrooms have unlimited potential in soups. They have a powerful umami character and a complex flavour profile, which adds richness and dimension to soups. In this recipe, it was my aim to create a full-bodied soup, with the deepest mushroom flavour possible. A few tricks helped me amplify the mushroomy taste: I cooked the mushrooms first to draw out their flavour before adding the stock; I used a large proportion of mushrooms to liquid; and I added a few cashews into the soup to provide body and creaminess. The cashew cream is a versatile recipe to add to your repertoire – it adds a lovely sweetness to soup and can also be used as a pasta sauce or dressing for roasted vegetables. The topping is optional, but I love to finish my soups with a special something – in this case, sautéed lemony mushrooms and cashews – to add texture and crunch. A note about mushrooms: I’ve used Swiss browns, but you could also use shiitake, button or a mix. Mushroom cashew cream soup serves 4 gluten free/vegan Cashew cream 1 cup (150g) cashews soaked in 1 cup boiling water 3/4 cup (185ml) vegetable stock 1 small clove garlic, chopped 2 tbsp olive oil sea salt Soup extra virgin olive oil 1 onion, diced 2 cloves garlic, finely chopped 800g Swiss brown mushrooms, sliced ½ cup (75g) cashews 6 cups vegetable stock 2 scallions, finely sliced sea salt and black pepper Topping extra-virgin olive oil 300g mushrooms, sliced 1 small clove garlic, finely chopped 2 tbsp cashews ½ tsp Aleppo pepper or red chilli flakes juice of ½ lemon sea salt For the cashew cream, soak the cashews for at least 30 minutes. When ready, drain the cashews and add them with the vegetable stock, garlic and oil, then blend until smooth and creamy (if it is too thick, you can add a few splashes of water). Season well with sea salt. Place a pot or large pan on high heat. When hot, add 2 tablespoons of olive oil and the onion. Reduce heat to medium and cook for 2 minutes, until the onions are soft and translucent. Add the garlic and cook for 30 seconds until it is fragrant, and then toss in the mushrooms, along with 1 tablespoon of oil. Season with sea salt and black pepper. Cook for 3-4 minutes until the mushrooms release their liquid, and then add the cashews along with the vegetable stock. Cover and bring to the boil. Reduce heat and simmer for 15-20 minutes. Blend until smooth. Meanwhile, prepare the soup topping by adding a drizzle of oil to a medium frypan. Add the mushrooms and garlic and cook for 2-3 minutes, until the mushrooms are caramelised. Add the cashews, Aleppo, and toss for a minute or so until the nuts are browned. Squeeze over the lemon juice and season with sea salt. To serve, ladle the mushroom soup into bowls, drizzle over some of the cashew cream, add a spoonful of the mushroom topping and finish with a scatter of scallions.
What will your marginal income tax rate be? What will your marginal income tax rate be? What will your marginal income tax rate be?2019-01-152019-01-15/wp-content/uploads/2017/02/timpe-logo-white.pngTimpe CPAshttps://timpecpa.com/wp-content/uploads/2019/01/01_15_19_950860986itb_560x292.jpg200px200px While the Tax Cuts and Jobs Act (TCJA) generally reduced individual tax rates for 2018 through 2025, some taxpayers could see their taxes go up due to reductions or eliminations of certain tax breaks — and, in some cases, due to their filing status. But some may see additional tax savings due to their filing status. Unmarried vs. married taxpayers In an effort to further eliminate the marriage “penalty,” the TCJA made changes to some of the middle tax brackets. As a result, some single and head of household filers could be pushed into higher tax brackets more quickly than pre-TCJA. For example, the beginning of the 32% bracket for singles for 2018 is $157,501, whereas it was $191,651 for 2017 (though the rate was 33%). For heads of households, the beginning of this bracket has decreased even more significantly, to $157,501 for 2018 from $212,501 for 2017. Married taxpayers, on the other hand, won’t be pushed into some middle brackets until much higher income levels for 2018 through 2025. For example, the beginning of the 32% bracket for joint filers for 2018 is $315,001, whereas it was $233,351 for 2017 (again, the rate was 33% then). 2018 filing and 2019 brackets Because there are so many variables, it will be hard to tell exactly how specific taxpayers will be affected by TCJA changes, including changes to the brackets, until they file their 2018 tax returns. In the meantime, it’s a good idea to begin to look at 2019. As before the TCJA, the tax brackets are adjusted annually for inflation. Below is a look at the 2019 brackets under the TCJA. Contact us for help assessing what your tax rate likely will be for 2019 — and for help filing your 2018 tax return.
Every single one of you has a human body that is fascinating, wondrous, and surprising in many ways. If you are curious about how your body actually functions and keeps you alive each and every day, you might want to read a few scientific books about the human body. Every part of your body tells its own story — the beating of your heart, the rumble of your stomach, the flexing of your fingers. No matter what you're doing, at any given point in time, your body is doing millions of things: breathing, digesting, pumping blood, creating proteins, releasing hormones, and on and on and on. Scientists and doctors have spent millennia exploring all the different ways our bodies function, and answering that unending question of why it does the things that it does. But you don't have to be a scientist to be intrigued by the way the human body works. After all, it's literally who you are, and there is so much to explore. From the top of your head to the tips of your toes, here are 11 books that will teach you loads about the human body and open your eyes to how miraculous it truly is: 'Gulp: Adventures on the Alimentary Canal' by Mary Roach In Gulp, prolific science writer Mary Roach tackles the mysteries of digestion, exploring what happens in our bodies from the moment we put food in our mouths to when we finally, uh, dispose of it. Click here to buy. 'Gut: The Inside Story of Our Body’s Most Underrated Organ' by Giulia Enders Speaking of the alimentary canal, in this compelling read Giulia Enders zeroes in on an organ that does a massive amount of work: your gut. How does it interact with our brain? Why does acid reflux happen? What makes a person gluten-intolerant? Enders answers all these questions and more. Click here to buy. 'Breasts: A Natural and Unnatural History' by Florence Williams In this enlightening book, journalist and author Florence Williams teaches you everything you never knew about breasts — like how breasts have evolved over time and how breast milk can be used for things other than feeding babies. Click here to buy. 'Teeth' by Mary Otto Oral hygiene in America is affected by classism and prejudice more than you probably realize. In this riveting book, Mary Otto explores everything that impacts what happens in Americans' mouths. Click here to buy. 'The Violinist's Thumb: And Other Lost Tales of Love, War, and Genius, as Written by Our Genetic Code' by Sam Kean This exceptional book by the author of The Disappearing Spoon explains what genes are and what can be discovered from them — like the reason why some people are exceptional violinists. Click here to buy. 'Come as You Are: The Surprising New Science that Will Transform Your Sex Life' by Emily Nagoski This book is a refreshing examination of the science of female sexuality. Hey, the more you know, the better you can be at giving pleasure to yourself and/or your partner. Click here to buy. 'Human Errors: A Panorama of Our Glitches, from Pointless Bones to Broken Genes' by Nathan H. Lents This wildly entertaining book dives into the "mistakes" of the human body — from weak knees to the organs that have proven themselves completely unnecessary. Click here to buy. 'Behave: The Biology of Humans at Our Best and Worst' by Robert M. Sapolsky In this book, Robert M. Sapolsky zooms in and out of each bodily system, and explains how they affect one another. Click here to buy. 'If Our Bodies Could Talk: A Guide to Operating and Maintaining a Human Body' by James Hamblin If only your body came with a manual like your car did. This book began with a video series from the Atlantic, wherein James Hamblin talked with experts about the ins and outs of our body. Now, the book version seeks to answer the health questions that keep coming up, like "How much sleep do I actually need?" and "Can I 'boost' my immune system?" Click here to buy. 'Anatomies: A Cultural History of the Human Body' by Hugh Aldersey-Williams This book examines the human body from a historical perspective. From ancient body art to plastic surgery, Hugh Aldersey-Williams writs about how cultures around the world have understood and interacted with the human body. Click here to buy.
Central Air Defense Force The Central Air Defense Force (CADF) is an inactive United States Air Force organization. Its last assignment was with Air Defense Command being stationed at Richards-Gebaur Air Force Base, Missouri. It was inactivated on July 1, 1960. History CADF was an intermediate-level command and control organization of Air Defense Command. Its origins date to 1 March 1949 when Continental Air Command (ConAC) reorganized Air Defense Command when it became an operating agency. Air defense units within the Continental United States (CONUS) were given to the Eastern and Western Air Defense Liaison Groups, with Western and Eastern Air Defense Forces activated on 1 September 1949. Central Air Defense Force (CADF) was activated as a third subordinate region under the re-established Air Defense Command in February 1951 to better organize ADC units in the Central and Southeast United States, its initial region being defined in the west as the area east of the 102nd degree of longitude, from the Canada–US border in the north to the Rio Grande border between the United States and Mexico in the south. The eastern boundary of the CADF was the area west of the 90th degree of longitude from the Michigan shoreline of Lake Superior south to the point of the Missouri, Kentucky and Tennessee state boundaries, and eastward to the Atlantic Ocean coastline along the Tennessee–Kentucky and Virginia–North Carolina border, with all areas south and west of those boundaries. The delineation was again adjusted in March 1956 to the region generally to the east of the 114th degree of longitude, roughly along the eastern borders of Idaho, Nevada and California from the Canada–US border in the north to the Mexican border in the south. The southeast region east of the Mississippi River to the Gulf of Mexico was reassigned to EADF. Central Air Defense Force was inactivated on 1 July 1960, with its assigned units reassigned either to 29th, 30th or 33rd Air Divisions, or to the new Air Defense Sectors created with the advent of the Semi Automatic Ground Environment (SAGE) system. Lineage Constituted as Central Air Defense Force (CADF) on 5 February 1951 Activated on 1 March 1951 Inactivated on 1 July 1960 Assignments Air Defense Command, 1 February 1951 – 1 July 1960 Stations Kansas City, Missouri, 5 February 1951 Grandview AFB, Missouri, 24 February 1954 Site re-designated: Richards-Gebaur AFB, Missouri, 27 April 1957 – July 1, 1960 Components Air Divisions 20th Air Division Activated at: Grandview AFB, Missouri on 8 October 1955 Assigned to Central Air Defense Force Site re-designated: Richards-Gebaur AFB, Missouri, 27 April 1957 Inactivate on 1 July 1960 29th Air Division Stationed at: Great Falls AFB, Montana Re-assigned to Central Air Defense Force 16 February 1953 from Western Air Defense Force (WADF) Site re-designated: Malmstrom AFB, 15 June 1956 Re-designated 29th Air Division (SAGE) and reassigned to Air Defense Command, 1 January 1960 31st Air Division Stationed at: Fort Snelling, Minnesota on 20 May 1951 Re-assigned to Central Air Defense Force 16 February 1953 from Eastern Air Defense Force (EADF) Inactivated 1 January 1960 33d Air Division Stationed at: Tinker AFB, Oklahoma, 20 May 1951 Re-assigned to Central Air Defense Force 16 February 1953 from Eastern Air Defense Force (EADF) Moved to Oklahoma City AFS, 1 July 1956 Re-designated 33d Air Division (SAGE) and reassigned to Air Defense Command, 1 January 1960 34th Air Division (Defense) Stationed at: Kirtland AFB, New Mexico, 16 February 1953 Re-assigned to Central Air Defense Force 16 February 1953 from Western Air Defense Force (WADF) Inactivated 1 January 1960 35th Air Division Activated at: Kansas City, Missouri on 1 July 1951 Assigned to Central Air Defense Force Moved to Dobbins AFB, Georgia on 1 September 1951 Re-assigned to Eastern Air Defense Force (EADF), 10 April 1955 Wings 122d Fighter-Interceptor Wing Federalized Indiana Air National Guard, 10 February 1951 Stationed at Baer Field, Indiana Re-assigned to Central Air Defense Force 1 December 1951 from Eastern Air Defense Force (EADF) Inactivated and returned to state control, 7 February 1952 128th Fighter-Interceptor Wing Federalized Wisconsin Air National Guard, 10 February 1951 Stationed at Truax Field, Wisconsin Re-assigned to Central Air Defense Force 20 May 1951 from Eastern Air Defense Force (EADF) Inactivated and returned to state control, 6 February 1952 133d Fighter-Interceptor Wing Federalized Minnesota Air National Guard, 10 February 1951 Stationed at Holman Field, Minnesota Re-assigned to Central Air Defense Force 20 May 1951 from Eastern Air Defense Force (EADF) Moved to Minneapolis-Saint Paul International Airport, 28 June 1951 Inactivated and returned to state control, 6 February 1952 Groups 153d Aircraft Control and Warning Group Federalized Pennsylvania Air National Guard, 16 January 1952 Stationed at New Cumberland, Pennsylvania, assigned to Central Air Defense Force Personnel used to fill vacancies in the 35th Air Division; inactivated 6 February 1952 159th Aircraft Control and Warning Group Federalized Oklahoma Air National Guard, 1 June 1951 Stationed at Tinker AFB, Oklahoma Attached to 33d Air Division, 19 June 1951 Inactivated and returned to state control, 6 February 1952 161st Aircraft Control and Warning Group Federalized California Air National Guard, 28 January 1952 Stationed at Berkeley, California, assigned to Central Air Defense Force Personnel used to fill vacancies in numerous CADF units; inactivated 6 February 1952 543d Aircraft Control and Warning Group Assigned to Central Air Defense Force Stationed at Fort Snelling, Minnesota on 1 January 1951 Re-assigned to 31st Air Division (Defense), 10 July 1951 4676th Air Defense Group Assigned to Central Air Defense Force Stationed at Grandview AFB, Missouri Re-assigned to 33d Air Division, 2 March 1954 See also Eastern Air Defense Force Western Air Defense Force References USAF Aerospace Defense Command publication, The Interceptor, January 1979 (Volume 21, Number 1) Maurer, Maurer (1983). Air Force Combat Units Of World War II. Maxwell AFB, Alabama: Office of Air Force History. Ravenstein, Charles A. (1984). Air Force Combat Wings Lineage and Honors Histories 1947–1977. Maxwell AFB, Alabama: Office of Air Force History. A Handbook of Aerospace Defense Organization 1946 - 1980, by Lloyd H. Cornett and Mildred W. Johnson, Office of History, Aerospace Defense Center, Peterson Air Force Base, Colorado Winkler, David F. (1997), Searching the skies: the legacy of the United States Cold War defense radar program. Prepared for United States Air Force Headquarters Air Combat Command. External links Category:Aerospace Defense Command units Category:1951 establishments in Missouri Category:1960 disestablishments in Missouri
Everyone, With lots of great help from Bert and Beverly, a timeline of the Transwestern confirmation process with El Paso has been documented and is attached. Also, at the bottom of this attachment are several issues that have been identified in looking at the EDI process. I will be getting a meeting together either Friday or early next week to discuss. Thanks, Mary
Gregory Infante | Relief Pitcher Latest News Recent News Dodgers reassigned RHP Gregory Infante to minor league camp. Infante is in camp this spring as a non-roster player. The 25-year-old right-hander had a 3.55 ERA and 40/21 K/BB ratio over 48 1/3 innings last season between Double- and Triple-A with the White Sox. He'll likely serve as organizational depth in 2013. Tue, Mar 5, 2013 11:31:00 AM Infante put up a 3.55 ERA over 21 games between Double- and Triple-A with the White Sox in 2012. He's just organizational depth. Wed, Nov 21, 2012 04:42:00 PM White Sox released RHP Gregory Infante. The White Sox needed to clear a spot on the 40-man roster for Jose Lopez, so Infante was given his outright release. The 23-year-old right-hander posted a 3.55 ERA at two different levels of the minors this season and will attempt to continue his career elsewhere. Thu, Aug 30, 2012 11:14:00 AM White Sox optioned RHP Gregory Infante to Triple-A Charlotte. Infante was in the mix for the final bullpen spot, but he's currently sidelined indefinitely after straining his left oblique on Sunday. The 23-year-old right-hander earned a September call-up last year after posting a 2.54 ERA and 54/28 K/BB ratio between Double- and Triple-A and remains a promising bullpen arm. Wed, Mar 14, 2012 12:23:00 PM Depth Charts Blue Jays placed 2B Devon Travis on the 15-day disabled list, retroactive to July 29, with a left shoulder strain. Travis re-injured his left shoulder on Tuesday. He was given a cortisone shot in hopes that he'd be able to power through the ailment, but apparently it hasn't had the desired effect. It's unclear at this point how long he might be sidelined. Maicer Izturis is likely done for the season after right shoulder surgery. Izturis hurt his shoulder last month while working his way back from a groin strain during a minor league rehab assignment. This is more bad luck for a guy who has appeared in just 11 major league games since the start of 2014 due to injury. Blue Jays placed RHP Marcus Stroman on the 60-day disabled list with a torn ACL in his left knee. Stroman will miss the entirety of the 2015 season as he recovers from the injury. In his absence, both Daniel Norris and Aaron Sanchez have golden opportunities to work in the rotation throughout the season.
The bagpipes echoed in the room and filled the Dorothy Harrington City Council Chambers on Jan. 10, not in a dirge of sorrow, but in a harmony of hope as Bayonne held a swearing-in ceremony for 11 new police officers. “On Feb. 15, 1983, almost 30 years ago, I sat in these very same seats these young men and women are sitting in right now to be sworn in as a police officer in the Bayonne police department. Aside from the marriage to my wife and the birth of my children, it was one of the proudest days of my life because it allowed me the opportunity to serve the citizens of the great City of Bayonne,” said Mayor Mark A. Smith recalled as he addressed the new officers. “For 26 years I wore that uniform with pride, as you do now. You began this process a while back. Perhaps you looked at an announcement in the newspaper, got an application and sent in a check, and thousands upon thousands in the State of New Jersey took the entrance exam to get to this position, and then you start to cull the herd down, and you were brought here and had a very intensive background investigation, and were scrutinized and looked at 10 different ways under every microscope we could fathom to find to ensure that the City of Bayonne was in fact hiring the finest to protect us – to protect me and my children.” He thanked the officers for the work they already performed as cadets with the department during Hurricane Sandy and the blackout that followed. “I had the opportunity to work with these beautiful young people during Hurricane Sandy and I was inspired. At times when I felt like dragging and slowing it down, these young people could not do enough for their fellow citizens,” Smith said. “I get choked up just thinking about what I observed with these young people. That’s how I know that we chose the right individuals to protect our families, to protect this city.” He predicted that the newly sworn police would combine aspects of the jobs of philosophers, sociologists, and priests. “I hope 30 years from now you can look back on healthy, full careers full of joy, filled with happiness,” Smith said. Quoting Ralph Waldo Emerson, he added, “If one life exists because of you, then you might consider yourself a success.” Smith also thanked Lt. William Parsley and Sgt. Raymond Skalski for the roles that they played in training the new recruits, and also credited Deputy Chiefs Drew Niekrasz and Charles Ryan. Corporation Counsel Charles D’Amico from the Bayonne Law Department administered the Oath of Office. He said that the new officers have the duty to serve and “to work to the best of their abilities.” __________“I had the opportunity to work with these beautiful young people during Hurricane Sandy and I was inspired.” – Mayor Mark Smith__________ Ready for service to their fellow citizens “For 144 years, the men and women of the Bayonne police department have protected the citizens of Bayonne and did so with pride and distinction,” said Public Safety Director Jason O’Donnell. “We have become one of the premier departments in the United States of America, and now you’re a big part of that proud history, and this comes with a lot of responsibility to uphold those traditions. The thing you’re going to learn about your job is that every day that you work, you’re going to affect the lives of countless people. And that’s a feeling that I hope you never get tired of. Service to man above self is a great and noble cause.” City Council President Terry Ruane said to the new officers, “I can’t imagine how difficult is to go out there every day and do what you have to do.” While he understands that as police officers they will have to deal with people that break the law, he noted that there are also a lot of law-abiding citizens that depend on the officers, too. “They count on you every day to protect them, and that’s an awesome responsibility to take on,” Ruane said, asking them not to lose the spirit and drive they had coming into the swearing-in ceremony. Police Chief Ralph Scianni observed that the 11 police officers were the first new class under his command since he assumed leadership of the department last year. He explained to the new recruits that the public would be observing them in action, both on and off duty. “You have entered the fishbowl,” he advised them. Chief Scianni urged them to employ their community policing skills as they begin their tasks. He complimented the officers for doing “a fantastic job” staffing the shelters in Bayonne following Hurricane Sandy. Father John Fencik, Bayonne’s 9-1-1 Coordinator and PBA Chaplain, offered both the invocation and benediction at the event, and asked God to “direct them along the pathway you wish them to travel in union with your plan of salvation, teach them to lead by example, inspire them with your presence. May they always be an instrument of your peace in this community. Grant them the ability to perform the tasks that lay ahead in their lives. Make them to be shining lights for the glory of your kingdom as they go about their daily responsibilities. Keep them and us all mindful of the needs of others, and bring true peace into our lives.” Police Officer Anthony Pelliccio is a graduate of Bayonne High School. He earned a degree in diplomacy and international relations from Seton Hall University, where he graduated magna cum laude. Pelliccio is a United States Army veteran, serving in the Airborne Division from 2003 to 2011. He completed one combat tour in Iraq and two in former republic of Yugoslavia. Police Officer Anthony Tufano is a graduate of Bayonne High School. He received an associate’s degree in criminal justice from Hudson County Community College. He has been a United States Army Reservist since 2007, and served in Iraq from 2008 to 2009. Police Officer Antonio Spano is a graduate of Bayonne High School. He attended New Jersey City University. Spano is a former Hudson County Sheriff’s Officer. Police Officer John McGimpsey is a graduate of Bayonne High School. Several members of his family have worked in law enforcement in both Bayonne and Florida. Police Officer Juan Villegas is a graduate of Bayonne High School. He continued his education at the Bergen County Emergency Medical Services Training School. He served as an Emergency Medical Technician in Jersey City. Police Officer William Dundas V is a graduate of St. Peter’s Prep. At New Jersey City University, he earned a bachelor’s degree in criminal justice. He was employed previously as an electrician by Wolenski Electric. Police Officer Melissa Morales is a graduate of St. Vincent Academy High School in Newark. She continued her education at Caldwell College and William Paterson University. Officer Morales was employed previously as a senior clerk with the Bayonne Municipal Court. Police Officer Matthew Tarbett is a graduate of Bayonne High School. He is nearing completion of his bachelor’s degree in criminal justice. Officer Tarbett was employed previously as a freight train conductor with Conrail, and most recently as an investigator with the Hudson County Sheriff’s Office. Police Officer Elvis Morel is a graduate of Bayonne High School. He continued his education at Hudson County Community College and New Jersey City University. He was employed previously by the Bayonne Family Community Center. Police Officer Erik Quintana is a graduate of Marist High School. He continued his education at New Jersey City University. He was employed previously as a commercial loan processor with Bayonne Community Bank. He is an active member of Peninsula Lodge No. 99 of the Free and Accepted Masons. Police Officer Richard Killmer is a graduate of Bayonne High School. He earned a bachelor’s degree in sociology with a minor in criminal justice from Fairleigh Dickinson University. Officer Killmer was employed previously by McCabe Ambulance, and was most recently a Special Law Enforcement Officer with the Point Pleasant Beach Police Department.
Background & Summary ==================== Animal cells rely on molecular motor proteins to generate forces and transport cargo along cytoskeletal tracks. Microtubule-based transport is critical for a wide range of cellular and developmental processes, and its dysfunction is recognized as an important contributor to neurological disease^[@b1]^. The mega-dalton motor complex cytoplasmic dynein 1 (dynein) is involved in virtually all processes that require microtubule minus end--directed motility, including intracellular trafficking, organelle positioning, and the organization of microtubule arrays^[@b2]^. During cell division, dynein is implicated in chromosome movement, assembly and positioning of the bipolar spindle, and the control of spindle assembly checkpoint signalling^[@b3]^. Dynein\'s functional diversity is facilitated by co-factors and cargo-specific adaptor proteins that regulate localization and activity of the motor^[@b4],[@b5]^. For many dynein-dependent processes, the inventory of participating adaptors and regulators is likely incomplete. An important ubiquitous dynein co-factor is the conserved nuclear distribution gene E (NudE), which was first discovered in filamentous fungi^[@b6],[@b7]^. NudE and the related protein NudE-like (Nudel) directly bind dynein and the dynein co-factor Lis1. NudE/Nudel and Lis1 contribute to many cellular functions of dynein, and mutant NudE causes the brain developmental disease microcephaly^[@b8],[@b9]^. On the molecular level, NudE/Nudel help tether Lis1 to dynein to regulate force production of the motor and mediate interactions between dynein and cargo^[@b4],[@b5]^ ([Fig. 1a](#f1){ref-type="fig"}). The nematode *Caenorhabditis elegans* possesses a single NudE/Nudel gene, *nud-2*, and animals in which *nud-2* is inhibited by RNAi-mediated knockdown or by the genetic deletion *nud-2(ok949)* display phenotypes consistent with compromised dynein function^[@b10]^. The *nud-2(ok949)* deletion removes 87 % of the open reading frame and is therefore likely a null allele^[@b10]^, yet viability and fertility of mutant animals is only mildly affected. Importantly, reducing LIS-1 levels in *nud-2(ok949)* embryos results in enhanced lethality relative to *nud-2(+)* controls ([Fig. 1b, c](#f1){ref-type="fig"}), suggesting that *nud-2(ok949)* represents a sensitized background that can be exploited for the discovery of dynein pathway genes. We therefore implemented an RNAi-based genetic interactor screen by targeting 87 % of annotated *C. elegans* open reading frames in *nud-2(ok949)* and *nud-2(+)* control animals using the bacterial feeding library from the Ahringer group^[@b13]^, adapted to a 96-well liquid format ([Fig. 1d](#f1){ref-type="fig"}). The primary screen consisted of two technical replicates per bacterial clone for a total of 19762 clones. Synchronized L1 larvae were allowed to grow and have progeny by feeding on the bacteria for 92 h. Animals were marked with green fluorescent protein (GFP) expressed in the pharynx (*myo-2::gfp*), which facilitated automated counting of parents and larval progeny on a fluorescence microscopy platform at the end of RNAi treatment ([Fig. 1e, f](#f1){ref-type="fig"}). The number of progeny per parent, termed reproductive fitness, could then be calculated for each bacterial clone. Genes that when targeted with dsRNA decreased reproductive fitness in *nud-2(ok949)* animals at least two-fold relative to *nud-2(+)* animals were chosen for secondary screening (1077 clones) ([Fig. 2a-e](#f2){ref-type="fig"}). Secondary screening was more stringent, consisting of 3 biological replicates, each carried out in 2 technical replicates ([Fig. 2f](#f2){ref-type="fig"}). We present a final list of 38 genetic interactors ([Fig. 2g](#f2){ref-type="fig"}; [Table 1](#t1){ref-type="table"}). The list includes 13 genes whose functions relate to the microtubule cytoskeleton, and 4 genes that code for known binding partners of dynein. Strikingly, 19 out of the 38 genes are implicated in embryonic cell division, where dynein is known to have multiple essential functions^[@b14]^. Further study of the *nud-2* interacting gene set promises to provide insight into the regulatory mechanisms that underlie dynein\'s functional diversity. Furthermore, re-analysis of the screening data using different cutoffs may extend the list of putative dynein pathway genes. Finally, the data on reproductive fitness in the control strain may serve as a useful reference for other genome-wide RNAi screens. Methods ======= Worm strains ------------ *C. elegans* strains were maintained at 16 °C or 20 °C on nematode growth media (NGM) plates seeded with OP50 bacteria. The following strains were used: *wild-type* (N2 Bristol isolate), GCP66 \[*nud-2*(*ok949*)I 6 x outcrossed with N2\], GCP68 \[*nud-2*(*ok949*)I; *heEx526*(*myo-2p*::GFP)\] from crossing GCP66 with SV1069^[@b15]^, and GCP95 \[*heEx526*(*myo-2p*::GFP)\] derived from the same cross but selected for the absence of *nud-2*(*ok949*). Worm growth and RNA interference -------------------------------- The genome-wide RNAi screen was performed using a modified version of the screening protocol in the 96-well liquid format developed by Lehner *et al.*^[@b16]^, and an automated screening platform was implemented based on the strategy previously reported by Maia *et al.*^[@b15]^ ([Fig. 1d](#f1){ref-type="fig"}). Bacteria from the Ahringer library glycerol stock^[@b17]^ (Source BioScience) harboring expression vectors for gene-specific RNAi were transferred into 100 μL of LB medium (supplemented with 100 μg/mL ampicillin and 12.5 μg/mL tetracycline hydrochloride) in 96-well plates (\#82.1582.001, Sarstedt) using a 96-pin replicator (Boekel) and grown overnight. The first column of pins was removed from the replicator to leave the first column of each plate free for inclusion of positive and negative controls. The negative controls were empty dsRNA vector pL4440 and *hil-5* dsRNA vector, which exhibited 10--20 % embryonic lethality in the *nud-2(ok949)* background. *plk-1* dsRNA vector, which causes 100 % embryonic lethality, was used as a control for RNAi efficiency, and *lis-1* dsRNA vector was used as a positive control for enhanced lethality in the *nud-2*(*ok949*) background ([Fig. 1b, c](#f1){ref-type="fig"}). 5 μL of the saturated bacterial cultures were used to inoculate 400 μL of LB (with ampicillin and tetracycline) in a deep-well 96-well plate (\#260251, Thermo Scientific Nunc), followed by incubation overnight. After induction of dsRNA expression with 4 mM IPTG for 1 h, bacteria were pelleted and re-suspended in 400 μL of complete S Medium using the Liquidator 96 Manual Pipetting System (Mettler Toledo). 10 μL of a synchronized L1 larval stage suspension, containing approximately 7 worms in 10 μL of M9 Buffer ([Fig. 1e](#f1){ref-type="fig"}), were dispensed into each well of a flat-bottom 96-well plate (\#260836, Thermo Scientific) using a Multidrop Combi Reagent Dispenser (Thermo Scientific), and 40 μL of bacterial suspension was added. Plates were incubated at 20 °C with shaking (200 rpm) for 92 h, which was sufficient time for the L1 larvae to grow until adulthood, lay eggs, and for these eggs to develop into larvae. Each 96-well library plate with bacteria was assayed in two technical replicates per strain. Image acquisition and automated counting of parents and progeny --------------------------------------------------------------- Prior to image acquisition, 70 μL of worm paralyzing solution (50 μL complete S Medium, 20 μL of 0.7 % tricaine / 0.07 % tetramisole) was added to all wells. Brightfield and fluorescence images of each well were acquired with the IN Cell Analyzer 2000 (GE Healthcare) using a 2x / 0.1 NA Plan Fluor objective (Nikon). This allowed the entire well to be captured in a single image ([Fig. 1f](#f1){ref-type="fig"}). Automated counting of adult worms (parents, larger pharynxes) and larvae (progeny, smaller pharynxes) was performed using the IN Cell Investigator Developer Toolbox software (GE Healthcare), and visual data inspection was performed with Spotfire DecisionSite (GE Healthcare) ([Fig. 1f](#f1){ref-type="fig"}). Automated counting involved two steps: 1) recognition of the pharynx by detection of objects with an area larger than 0.383 μm^2^, a mass (sum of all pixels within the shape) smaller than 300000 pixels, and a perimeter smaller than 1 mm; 2) distinction between larvae and adults by calculating the total intensity of pixels inside the object and applying a threshold. Only wells with 3-13 parent worms were considered for further analysis, as the number of progeny correlates linearly with the number of adults within this range ([Fig. 1e](#f1){ref-type="fig"}). Data analysis and hit selection ------------------------------- ScreenSifter software was used to visualize and analyze the data^[@b18]^. Reproductive Fitness (RF) was defined as the number of progeny per parent^[@b15]^. The RF ratio for each dsRNA vector was calculated by dividing the RF of the *nud-2*(*ok949*) strain (GCP68) by the RF of the *nud-2(+)* control strain (GCP95) ([Fig. 1b, c](#f1){ref-type="fig"}). After genome-wide screening with two technical replicates per strain (Data Record 1), a threshold for hit selection was defined based on the RF ratios for the positive control (*lis-1* dsRNA vector), which was included in each 96-well plate: $threshold = µ_{p} + 2\sigma_{p}$, where μ~p~ is the mean and σ~p~ is the standard deviation of the positive control RF ratios ([Fig. 2c, d](#f2){ref-type="fig"}). The resulting threshold RF ratio was 0.43. dsRNA vectors that reduced viable progeny by more than 85 % in the *nud-2(+)* control strain were excluded, as the RF ratio could not be reliably calculated. Using these criteria, a total of 1077 dsRNA vectors with an RF ratio ≤ 0.5 were selected for secondary screening (Data record 2). dsRNA vectors with a mean RF ratio ≤ 0.5 from three biological replicates (2 technical replicates each) were included in a final list of genetic interactors ([Fig. 2g](#f2){ref-type="fig"}; [Table 1](#t1){ref-type="table"}). All dsRNA vectors in the final hit list were sequenced with the M13 forward primer (5′ GTAAAACGACGGCCAGT 3′) to confirm the identity of the targeted gene ([Table 1](#t1){ref-type="table"}). Data Records ============ The data associated with this work is available as two downloadable spreadsheets from FigShare ([Table 2](#t2){ref-type="table"}; Data Citation 1). Data record 1 -- primary screen ------------------------------- Raw data from the primary genome-wide RNAi screen is shown in five separate worksheets. The "all_data" worksheet shows the results for every bacterial clone. The worksheet "controls" contains the data for the positive and negative controls. The worksheet "undetermined" identifies the wells whose RF ratio could not be determined for technical reasons. The worksheet "lethal" lists genes that caused more than 85 % embryonic lethality in the *nud-2(+)* control strain and were therefore excluded from further analysis. The worksheet "hits" shows the dsRNA vectors selected for secondary screening and their location in the re-arrayed plates. Column headers: **Plate** - Ahringer library plate number. **Well** - Well coordinates. **WellType** - Content description. 'S', dsRNA vector; 'CN1', negative control - empty vector; 'CN2', negative control - *hil-5(RNAi)*; 'CP', positive control - *lis-1(RNAi)*; 'C', control for RNAi efficiency - *plk-1(RNAi)*; 'E', empty well. **Reagent_ID** - Gene sequence identification as annotated in the Ahringer library database. **Ad / Prg_R1 / R2** - Number of adults and progeny obtained in each technical replicate (R1, R2) for *nud-2(+)* in blue and *nud-2*(*ok949*) in red. **RF_R1 / R2 / Avg** - Reproductive Fitness of each replicate and the mean of both. Occasionally the RF of a replicate could not be determined for technical reasons (marked "OUT"). In these cases, the value in RF_Avg corresponds to the RF value of the single replicate that worked. **RF_ratio** - the RF ratio was obtained by dividing the RF_Avg of *nud-2(ok949)* by the RF_Avg of *nud-2(+)*. **Gene Symbol** - Approved name of the gene targeted by the dsRNA vector in each bacterial clone. Data record 2 -- secondary screen --------------------------------- Data obtained from the secondary RNAi screen is shown in three different worksheets. Analogous to Data Record 1, the worksheet "all_data" shows the results for every bacterial clone that was re-screened. The worksheet "controls" contains the data for the positive and negative controls. The worksheet "RF ratios" summarizes the RF ratios obtained for all clones in each biological replicate, and the average of all replicates. Genes that scored as "enhancers" are highlighted in green. Technical Validation ==================== Replicate correlation --------------------- Correlation analysis of replicates in the primary and secondary screen attests to the reproducibility of the screening procedure. In the primary screen, the Pearson correlation coefficients for the technical replicates were 0.80 for *nud-2(+)* and 0.75 for *nud-2*(*ok949*) ([Fig. 2a, b](#f2){ref-type="fig"}). Pearson correlation coefficients for technical replicates of the three biological replicates in the secondary screen were 0.75, 0.74, and 0.71 for *nud-2(+)*, and 0.80, 0.77, 0.62 for *nud-2*(*ok949*). For pairwise correlations between the three biological replicates in the secondary screen, the Pearson correlation coefficients were 0.46 (R1, R2), 0.30 (R1, R3), and 0.47 (R2, R3) for *nud-2(+)*, and 0.46 (R1, R2), 0.42 (R1, R3) and 0.55 (R2, R3) for *nud-2(ok949)*. For all correlations, *p* \< 0.0001. Controls -------- Controls were included in every 96-well plate, and plotting of their RF ratios demonstrates high consistency throughout the screening procedure with a clear separation between positive and negative controls ([Fig. 2c, d](#f2){ref-type="fig"}). The robust performance of controls justifies the use of the positive control RF ratios as the basis for setting the threshold for hit identification (RF ratio ≤ 0.5; [Fig. 2c, d](#f2){ref-type="fig"}). Genes in the final hit list with functional links to dynein ----------------------------------------------------------- The final hit list is enriched in genes whose functions relate to the microtubule cytoskeleton (13 out of 38) and to cell division (19 out of 38), where dynein is known to play multiple essential roles^[@b14]^. In addition, we found two subunits of the dynein complex (*dli-1* and *dlc-1*) and two known dynein regulators (*lis-1* and *zyg-12*). This demonstrates that the screen was successful in identifying genes that functionally intersect with the dynein pathway. Usage Notes =========== The raw data of the two-stage RNAi screen is made accessible for several reasons (Data Records 1 and 2). First, it provides a list of genetic *nud-2* interactors, whose further study should advance our understanding of dynein regulation and function. Second, users can apply their own normalization strategies and thresholds to compare the *nud-2(+)* and *nud-2(ok949)* strains, which may extend the list of candidate dynein pathway genes. Third, while this study focused on genes whose inhibition reduces reproductive fitness of *nud-2*(*ok949*), some dsRNA vectors resulted in decreased lethality in *nud-2*(*ok949*) (RF ratio \> 1; [Fig. 2e, f](#f2){ref-type="fig"}). These genes are also potential interactors of *nud-2.* Fourth, the data on reproductive fitness in the control strain may serve as a useful reference for other genome-wide RNAi screens using the 96-well liquid format. Additional information ====================== **How to cite this article**: Rocha, H. *et al.* A genome-scale RNAi screen for genetic interactors of the dynein co-factor *nud-2* in *Caenorhabditis elegans*. *Sci. Data* 5:180047 doi: 10.1038/sdata.2018.47 (2018). **Publisher's note**: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Supplementary Material {#S1} ====================== The authors acknowledge the support of the BioSciences Screening i3S Scientific Platform. Funding for this project was provided by the European Research Council under the European Union's Seventh Framework Programme (ERC grant agreement n ° ERC-2013-StG-338410-DYNEINOME to R.G.), by the European Molecular Biology Organization (EMBO Installation Grant 2545 to R.G.), by the Fundação para a Ciência e a Tecnologia (IF/01015/2013/CP1157/CT0006 to R.G. and SFRH/BD/103495/2014 to H.R.), and by \'Norte-01-0145-FEDER-000029-Advancing cancer research: from basic knowledge to application\', supported by the Norte Portugal Regional Operational Programme (NORTE 2020), under the PORTUGAL 2020 Partnership Agreement through the European Regional Development Fund (FEDER). The authors declare that they have no competing interests. ![Screening strategy.\ (**a**) Cartoon summarizing the two main functions of the dynein co-factors NudE and Lis1: regulation of motor activity and recruitment of dynein to cargo. (**b**) Proof of concept experiments. Graph shows the number of larval progeny per adult, termed reproductive fitness (RF), in the *nud-2(+)* control and the null allele *nud-2(ok949)*, after targeting genes with dsRNA using the bacterial feeding method in a 96-well liquid format. Empty dsRNA vector and *hil-5(RNAi)* are negative controls, *plk-1(RNAi)* is a control for the efficiency of RNAi, and *lis-1(RNAi)* is the positive control that results in enhanced lethality in *nud-2(ok949)* relative to *nud-2(+)*. Error bars represent the SEM with a 95 % confidence interval, and *n* denotes the number of adults whose progeny were counted. (**c**) The RF ratio, defined as the RF of *nud-2(ok949)* divided by the RF of *nud-2(+)* for the conditions shown in *(b)*. Error bars represent the SEM with a 95 % confidence interval. (**d**) Flowchart of the screening protocol. The primary screen was performed in two technical replicates per dsRNA vector and strain. The secondary screen was performed in three biological replicates with two technical replicates each. An RF ratio of 0.5 was used as a cutoff for genetic interactors of *nud-2*. (**e**) The number of progeny per well plotted against the number of parents per well for the primary genome-wide screen. For 3 - 13 parents treated with empty dsRNA vector the correlation is linear and thus suitable for evaluation of reproductive fitness. Error bars represent the SEM. (**f**) Example image of a screening well captured with a 2x objective. Blow up on the right shows GFP-labelled pharynxes, which can be automatically assigned to parents (green) or progeny (blue) based on their size. Scale bar, 1 mm; blow-up, 200 μm.](sdata201847-f1){#f1} ![Results of the genome-wide RNAi screen.\ (**a**), (**b**) Correlation plots of the two technical replicates in the *nud-2(+)* strain *(a)* and the *nud-2(ok949)* strain *(b)* from the genome-wide primary screen. The Pearson correlation coefficient (r) and *p* value indicating statistical significance are indicated. (**c**), (**d**) Global comparison of positive and negative controls. For each 96-well plate, the reproductive fitness ratio is plotted for empty dsRNA vector versus *lis-1(RNAi) (c)* and *hil-5(RNAi)* versus *lis-1(RNAi) (d)*. The dashed line represents the cutoff used for hit selection. (**e**), (**f**) RF ratio distribution in the primary *(e)* and secondary *(f)* screen. Percentages indicate the fraction of negative controls (gray and magenta), positive controls (blue), and library dsRNA vectors (green) above and below the cutoff used for hit selection (dashed line). (**g**) Secondary screening results. Genes with an average RF ratio ≤ 0.5 from three biological replicates performed in duplicate were considered hits. RF is plotted for each gene in *nud-2(+)* and *nud-2(ok949)* with error bars representing the SEM. Genes in green font code for proteins known to directly associate with dynein.](sdata201847-f2){#f2} ###### genetic interactors of *nud-2(ok949)*. Ahringer library coordinate Sequence Name Description (human ortholog) ------------------------------------- ------------- ------------------------------------- ----------------------------------------------------------- III-4C20 K06H7.6 *apc-2* Subunit 2 of anaphase promoting complex (APC2) II-6A23 F10B5.6 *apc-6* Subunit 6 of anaphase promoting complex (APC6) III-1K01 F10C5.1 *apc-8* Subunit 8 of anaphase promoting complex (APC8) I-4F17 C45G3.1 *aspm-1* Abnormal Spindles homolog (ASPM) IV-2J13 C09B9.4 C09B9.4 Tau tubulin kinase 2 (TTBK2) II-5D02 B0495.2 *cdk-11.1* Cyclin dependent kinase 11A (CDK11A) IV-2N08 B0547.1 *csn-5* Subunit 5 of COP9 signalosome complex (CSN5) IV-9G19 ZC168.4 *cyb-1* Cyclin B V-10K05 T06E6.2 *cyb-3* Cyclin B III-3M05 ZK328.1 *cyk-3* Ubiquitin C-terminal hydrolase III-3O12 T26A5.9 *dlc-1* Dynein light chain (DYNLL1 & DYNLL2) IV-7A03[a](#t1-fn1){ref-type="fn"} C39E9.14 *dli-1* Dynein light intermediate chain (DYNC1LI1 & DYNC1LI2) II-10L01 F58G1.2 F58G1.2 Predicted nucleic acid binding activity III-5A04 T05G5.9 *gcc-2* [b](#t1-fn2){ref-type="fn"} Golgin A1 (GOLGA1) X-3F18[a](#t1-fn1){ref-type="fn"} K03A1.6 *his-38* H4 histone IV-10D16 Y73B6BL.2 *htp-2* Meiosis-specific HORMA domain-containing protein X-7N15[a](#t1-fn1){ref-type="fn"} F26H11.1 *kbp-3* [b](#t1-fn2){ref-type="fn"} Subunit of NDC80 complex (SPC25) III-6L07 T03F6.5 *lis-1* Lis1 IV-8J08 Y69A2AR.30 *mdf-2* Mitotic arrest deficient 2 (MAD2) IV-7I13 Y62E10A.11 *mdt-9* RAB interacting factor (RABIF) I-4G05 T01G9.5 *mei-1* Catalytic subunit of katanin I-4D17 ZK858.4 *mel-26* Substrate adaptor of CUL-3-containing E3 ubiquitin ligase II-3F06 B0286.4 *ntl-2* CCR4-NOT transcription complex subunit 2 (CNOT2) III-6P24 Y82E9BR.13 *pals-17* Protein containing ALS2cr12 (ALS2CR12) domain II-4E16 C54A12.1 *ptr-6* Sterol sensing domain protein (PTCHD3) III-2A02[a](#t1-fn1){ref-type="fn"} R07E5.14 *rnp-4* Putative member of exon-exon junction complex II-11G09 F54D12.6 *rog-1* Ras activating factor (FRS2/FRS3) I-5I05[a](#t1-fn1){ref-type="fn"} C25A1.9 *rsa-1* PP2A regulatory subunit of the B\'\' class II-11F20 Y57A10A.19 *rsr-2* SRRM2 (serine/arginine repetitive matrix 2 & 3) II-6N13 F42A8.2 *sdhb-1* Succinate dehydrogenase subunit B (SDHB) V-6K13 F41E6.4 *smk-1* Dictyostelium suppressor of MEK null homolog (SMEK) IV-1C20[a](#t1-fn1){ref-type="fn"} Y55F3C.2 *srt-23* Serpentine Receptor, class T V-14G09 T05E12.1 *str-125* Seven transmembrane receptor I-7L01 Y39G10AR.12 *tpxl-1* Targeting Protein for Xenopus Klp2-like (TPX2) III-3K22 C05D11.3 *txdc-9* Thioredoxin domain-containing protein (TXNDC9) II-4K17 Y38A8.3 *ulp-2* SUMO specific peptidase (CD180, SENP6, TLR4) III-7G20 Y55D5A.3 Y55D5A.3 N-acylethanolamine acid amidase (NAAA) II-4I13 ZK546.1 *zyg-12* Hook protein ^a^Clones with multiple predicted RNAi targets (WormBase v. WS257). ^b^Sequenced gene was different from expected RNAi target. ###### Data records. Source Protocol Samples Data -------- -------------- ------------------------------- --------------- GCP95 Feeding RNAi TechnicalRep1 Data Record 1 GCP95 Feeding RNAi TechnicalRep2 Data Record 1 GCP68 Feeding RNAi TechnicalRep1 Data Record 1 GCP68 Feeding RNAi TechnicalRep2 Data Record 1 GCP95 Feeding RNAi BiologicalRep1, TechnicalRep1 Data Record 2 GCP95 Feeding RNAi BiologicalRep1, TechnicalRep2 Data Record 2 GCP95 Feeding RNAi BiologicalRep2, TechnicalRep1 Data Record 2 GCP95 Feeding RNAi BiologicalRep2, TechnicalRep2 Data Record 2 GCP95 Feeding RNAi BiologicalRep3, TechnicalRep1 Data Record 2 GCP95 Feeding RNAi BiologicalRep3, TechnicalRep2 Data Record 2 GCP68 Feeding RNAi BiologicalRep1, TechnicalRep1 Data Record 2 GCP68 Feeding RNAi BiologicalRep1, TechnicalRep2 Data Record 2 GCP68 Feeding RNAi BiologicalRep2, TechnicalRep1 Data Record 2 GCP68 Feeding RNAi BiologicalRep2, TechnicalRep2 Data Record 2 GCP68 Feeding RNAi BiologicalRep3, TechnicalRep1 Data Record 2 GCP68 Feeding RNAi BiologicalRep3, TechnicalRep2 Data Record 2 [^1]: H.R. participated in screen design, performed all experiments, analyzed the data, and prepared the manuscript. A.F.M. designed the screen and assisted with screen execution, data analysis, and manuscript preparation. R.G. conceived the screen, supervised the work, and prepared the manuscript.
Transgender woman Jazz Alford was found shot to death in late September in Birmingham. Her death is the 22nd reported transgender homicide this year. Photo: Via Facebook Transgender woman Jazz Alford was found shot to death in late September in Birmingham. Her death is the 22nd reported transgender homicide this year. Photo: Via Facebook Alabama police are investigating a string of crimes against transgender women, including the 22nd reported transgender homicide of 2016. Jazz Alford, 30, of North Carolina was found shot to death in a Birmingham motel room on September 23, according to AL.com. With her death, the number of known killings of transgender people in the United States so far this year has reached the total number for 2015. Alford, an African-American trans woman, was initially misgendered by police. But her sister Toya Milan, who is also a transgender woman, told AL.com that her death has struck a huge blow to the local LGBT community. “There was another transgender shot multiple times somewhere else recently. People think transgenders are monsters, when really we just want to be accepted,” Milan said. “[Jazz] was such a loving person and we didn’t know anybody that would want to hurt her. It’s been a hard pill to swallow.” Alford’s former airline industry coworkers remembered her fondly on Facebook. “She was a lovely, beautiful person. Always kind and smiling,” Alyssa Huggins recalled. “What a tragedy.” Another former coworker, Sherri Johnson Pilson, shared that Alford was always quick to cover a shift. “Whenever I needed Sundays off for church, Jazz would always cover me and say, ‘pray for me too chile!'” Pilson wrote. “Such a sweet person.” Police said they don’t yet have a suspect or motive for her death. But they have arrested a person of interested in connection with another attack on a transgender woman in Birmingham, who police said was shot during a home invasion on Monday. Daurius Foster, the boyfriend of the second shooting victim, told police he believes that the perpetrator shot her with a gun stolen in the recent robbery of another transgender woman, according to AL.com: He also said he believes the suspect is the same person who robbed another friend of theirs at a Homewood motel. He said a gun was stolen in that incident, and he believed that gun was used to shoot his girlfriend today. Homewood police identified that victim as male, but Foster said the Homewood victim was a female. Birmingham and Homewood police have said they do not yet know if the thefts or shootings are related. “Right now, we’re investigating them separately,” Birmingham homicide Sgt. John Tanks said. The number of transgender people killed in the United States is an estimate precisely because of the frequency with which transgender women in are identified as men in reports of their deaths. It is often only after friends and family speak to the media that the true gender of these individuals comes to light.
using Surging.Core.CPlatform.Routing; using System; using System.Collections.Generic; using System.Text; namespace Surging.Core.CPlatform.Filters.Implementation { public class AuthorizationAttribute : AuthorizationFilterAttribute { public AuthorizationType AuthType { get; set; } } }
UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA UNITED STATES OF AMERICA : : v. : : Criminal Action No.: 13-0274 (RC) SHANTIA HASSANSHAHI, : also known as Shantia Hassan Shahi, : also known as Shahi, : also known as Shantia Haas, : also known as Sean Haas, : : and : : HASSTON, INC., : : Defendants. : MEMORANDUM & ORDER DENYING DEFENDANT’S MOTION FOR RECONSIDERATION I. INTRODUCTION Defendant Shantia Hassanshahi is charged with one count of conspiracy to violate the International Economic Emergency Powers Act, 50 U.S.C. § 1705, and the Iranian Transactions and Sanctions Regulations, 31 C.F.R. §§ 560.203–204, commonly referred to as the United States’ trade embargo against Iran. In December 2014, the Court denied a motion by Mr. Hassanshahi to suppress certain evidence discovered during a forensic examination of his laptop computer, holding, in relevant part, that discovery of the evidence was sufficiently attenuated from a search of a mysterious telephony database that the Court assumed, for purposes of its analysis and at the Government’s suggestion, was unconstitutional. See United States v. Hassanshahi, 75 F. Supp. 3d 101 (D.D.C. 2014). Following the Court’s decision, Mr. Hassanshahi has argued, both orally before the Court and in rounds of supplemental briefing in response to orders of the Court, that suppression of the evidence is warranted in light of both additional information concerning the database that the Government provided after the Court’s ruling and the Second Circuit’s recent decision concerning a different government database in ACLU v. Clapper, 785 F.3d 787 (2d Cir. 2015). The Court construes these arguments as a motion for reconsideration of the Court’s denial of Mr. Hassanshahi’s motion to suppress. For the reasons that follow, and upon consideration of the briefs submitted by both Mr. Hassanshahi and the Government, the Court denies that motion and affirms its ruling on the motion to suppress. II. BACKGROUND The Indictment against Mr. Hassanshahi alleges that, beginning in or around March 2009, Mr. Hassanshahi engaged in a conspiracy to export or cause the exportation of goods and technology from Canada to Iran, as well as related services from the United States to Iran, without first having obtained a license from the Office of Foreign Assets Control, in violation of federal law. See Indictment ¶ 1, ECF No. 7. At trial, the Government seeks to introduce evidence discovered during a forensic examination of Mr. Hassanshahi’s laptop computer, which the Government seized from Mr. Hassanshahi in January 2012 upon his arrival from the United States at the Los Angeles International Airport (“LAX”). The Government’s search and seizure of that evidence was the result of an investigation that began at least as early as August 2011. 1 See Hassanshahi, 75 F. 1 The Court described the investigation that led to the search and seizure of Mr. Hassanshahi’s laptop computer in greater detail than is provided here in its memorandum opinion denying Mr. Hassanshahi’s prior motion to suppress the evidence. The Court incorporates that factual background here by reference. See Hassanshahi, 75 F. Supp. 3d at 105– 07. 2 Supp. 3d at 105–07. In August 2011, Homeland Security Investigations (“HSI”) received an unsolicited e-mail from a source concerning an Iranian individual named “Sheikhi” who was seeking to procure protection relays for an Iranian power project. See id. at 105. Later the same month, HSI requested a search of a law enforcement database using a telephone number it knew to be associated with Sheikhi. That search returned a single telephone record of one call between the searched telephone number and a California telephone number with an 818 area code that HSI later determined, through its subsequent investigation, was registered to Mr. Hassanshahi. See id. at 105–06. Over the course of the next several months, HSI investigated Mr. Hassanshahi, which ultimately led to the search and seizure of his laptop computer at LAX. Mr. Hassanshahi moved to suppress the evidence discovered through the forensic examination of his laptop, asserting, in relevant part, that HSI’s search of the law enforcement database constituted an unconstitutional search and that the evidence should be excluded under the fruit of the poisonous tree doctrine. See Def.’s Mot. Suppress at 18–30, ECF No. 28. The Court denied Mr. Hassanshahi’s motion, holding, in relevant part, that the exclusionary rule did not require suppressing the evidence as “fruit of the poisonous tree,” because discovery of the evidence was sufficiently attenuated from the purportedly unlawful search of the database. 2 See Hassanshahi, 75 F. Supp. 3d at 108–18. The Court reached this holding based on limited information concerning the database at issue, because, in its opposition to the motion to suppress, the Government refused to provide details concerning the database and instead asked the Court to assume arguendo that the database was unconstitutional. See id. at 109. In its analysis, the 2 The Court also rejected Mr. Hassanshahi’s separate argument that the evidence should be suppressed because the Government lacked reasonable suspicion to conduct the forensic examination of the laptop computer, holding that the Government had reasonable suspicion and declining to reach the constitutional issue of whether reasonable suspicion was required. See Hassanshahi, 75 F. Supp. 3d at 118–26. That holding is not at issue here. 3 Court therefore proceeded on the assumption that the database and HSI’s search of the database were unconstitutional and nevertheless concluded that the exclusionary rule did not require suppression. See id. at 108–18. Although the Court was unequivocal in its holding, it also ordered the Government to provide the Court with more information concerning the database. See id. at 115 n.6. The Government complied with the Court’s order by providing a declaration from Robert Patterson, an Assistant Special Agent in Charge at the United States Drug Enforcement Administration (“DEA”), which the Government initially filed ex parte and under seal and later filed publicly in redacted form. See Decl. Robert Patterson (“Patterson Decl.”), ECF No. 49-1 (publicly-filed redacted version). In this declaration, Mr. Patterson explained that the database at issue “consisted of telecommunications metadata obtained from United States telecommunications providers pursuant to administrative subpoenas served upon the service providers under the provisions of 21 U.S.C. § 876.” Id. ¶ 4. The referenced statutory provision authorizes the Attorney General to issue administrative subpoenas in “any investigation” relating to his drug enforcement function. See 21 U.S.C. § 876. Mr. Patterson provided further detail concerning the metadata stored in the database: This metadata related to international telephone calls originating in the United States and calling [REDACTED] designated foreign countries, one of which was Iran, that were determined to have a demonstrated nexus to international drug trafficking and related criminal activities. This metadata consisted exclusively of the initiating telephone number; the receiving telephone number; the date, time, and duration of the call; and the method by which the call was billed. No subscriber information or other personal identifying information was included in this database. No communication content was included in this database. Patterson Decl. ¶ 4. Mr. Patterson further stated that the DEA database “could be used to query a telephone number where federal law enforcement officials had a reasonable articulable suspicion 4 that the telephone number at issue was related to an ongoing federal criminal investigation” and that the standard had been met with respect to the search that returned Mr. Hassanshahi’s telephone number. Id. ¶ 5. Mr. Patterson also stated that use of this particular database was suspended in September 2013 and that “information is no longer being collected in bulk pursuant to 21 U.S.C. § 876.” Id. ¶ 6. At a status conference before the Court on January 29, 2015 following the filing of Mr. Patterson’s redacted declaration, counsel for Mr. Hassanshahi sought permission to renew his motion to suppress based on the new information concerning the DEA database. The Court directed the Government to provide briefing concerning two issues: first, whether information obtained by one law enforcement agency for one purpose may lawfully be shared with another law enforcement agency for another purpose; and second, whether a remedy of suppression existed for a non-constitutional violation of law. The Government submitted a brief on these issues, and Mr. Hassanshahi filed a brief in response, to which the Government filed a reply brief. See Gov’t’s Response to the Court’s Directive from the Jan. 29, 2015 Status Conference (“Gov’t’s Feb. 25 Brief”), ECF No. 51; Def.’s Response to Gov’t’s Filing (“Def.’s Apr. 13 Brief”), ECF No. 53; Gov’t’s Reply to Def.’s Response (“Gov’t’s Apr. 29 Brief”), ECF No. 58. In May 2015, the Second Circuit decided ACLU v. Clapper, holding that a counterterrorism telephony metadata program maintained by the National Security Agency (“NSA”), which this Court discussed in its denial of the motion to suppress, exceeded the program’s statutory authorization. See ACLU v. Clapper, 785 F.3d 787 (2d Cir. 2015). The parties have also submitted briefs concerning the effect, if any, that the Second Circuit’s decision might have on the issues presented in this case. See Def.’s Brief re Effect of ACLU v. Clapper 5 (“Def.’s June 22 Brief”), ECF No. 68; Gov’t’s Response to Def.’s Brief (“Gov’t’s July 10 Brief”), ECF No. 74; Def.’s Reply (“Def.’s July 29 Brief”), ECF No. 77. III. LEGAL STANDARD “Although the Federal Rules do not specifically provide for motions for reconsideration in criminal cases, the Supreme Court has recognized, in dicta, the utility of such motions.” United States v. Ferguson, 574 F. Supp. 2d 111, 113 (D.D.C. 2008); see also United States v. Dieter, 429 U.S. 6, 8 (1976) (per curiam) (noting “the wisdom of giving district courts the opportunity to promptly correct their own alleged errors”). Courts in this District have, therefore, entertained motions for reconsideration in criminal cases by importing the standards of review applicable in motions for reconsideration in civil cases. See, e.g., United States v. Trabelsi, Crim. No. 06-89 (RWR), 2015 WL 5175882 at *2 (D.D.C. Sept. 3, 2015); United States v. Slough, 61 F. Supp. 3d 103, 107 (D.D.C. 2014); United States v. Cabrera, 699 F. Supp. 2d 35, 39 (D.D.C. 2010); United States v. Sunia, 643 F. Supp. 2d 51, 60–61 (D.D.C. 2009); United States v. Libby, 429 F. Supp. 2d 46, 46–47 (D.D.C. 2006). With respect to motions for reconsideration of final judgments, courts have adopted the standard of review for motions filed under Rule 59(e) of the Federal Rules of Civil Procedure. See Slough, 61 F. Supp. 3d at 107 n.1 (citing cases). With respect to interlocutory decisions, courts in this District have also adopted the standard from civil cases that reconsideration of an interlocutory decision is available “as justice requires.” See Trabelsi, 2015 WL 5175882 at *2; Slough, 61 F. Supp. 3d at 107; Sunia, 643 F. Supp. 2d at 60–61. The Court’s denial of Mr. Hassanshahi’s motion to suppress was an interlocutory decision, and, therefore, the Court follows the lead of other courts in this District and applies the “as justice requires” standard. “[A]sking ‘what justice requires’ amounts to determining, within 6 the Court’s discretion, whether reconsideration is necessary under the relevant circumstances.” Cobell v. Norton, 355 F. Supp. 2d 531, 539 (D.D.C. 2005). In making this determination, the Court considers whether it “patently misunderstood a party, has made a decision outside the adversarial issues presented to the Court by the parties, has made an error not of reasoning but of apprehension, or where a controlling or significant change in the law or facts [has occurred] since the submission of the issue to the Court.” Singh v. George Washington Univ., 383 F. Supp. 2d 99, 101 (D.D.C. 2005) (internal quotation and citation omitted). The Court is also guided by several generally applicable principles. “‘Motions for reconsideration are committed to the sound discretion of the trial court.’” Trabelsi, 2015 WL 5175882 at *2 (quoting Judicial Watch, Inc. v. U.S. Dep’t of Energy, 319 F. Supp. 2d 32, 34 (D.D.C. 2004)). Also, “[t]he moving party bears the burden ‘to show that reconsideration is appropriate and that harm or injustice would result if reconsideration were denied.’” Id. (quoting United States v. Hemingway, 930 F. Supp. 2d 11, 13 (D.D.C. 2013)). Moreover, a motion for reconsideration is “not simply an opportunity to reargue facts and theories upon which a court has already ruled.” New York v. United States, 880 F. Supp. 37, 38 (D.D.C. 1995); see also Singh, 383 F. Supp. 2d at 101 (“[W]here litigants have once battled for the court’s decision, they should neither be required, nor without good reason permitted, to battle for it again.”). IV. ANALYSIS Mr. Hassanshahi and the Government advance a variety of arguments in connection with Mr. Hassanshahi’s motion for reconsideration. These arguments can be grouped in two major issues for the Court to consider: first, whether Mr. Hassanshahi may seek suppression of the laptop evidence by challenging the statutory validity of the DEA database, as opposed to its constitutionality; and second, whether the new information disclosed by the Government 7 concerning the database and the Second Circuit’s decision in Clapper require the Court to reverse its prior decision and suppress the evidence on constitutional grounds. The Court addresses these issues below. A. Mr. Hassanshahi’s Statutory Challenge In his original motion to suppress the laptop evidence, Mr. Hassanshahi argued that the evidence should be suppressed on constitutional grounds. See Def.’s Mot. Suppress at 18–30. After the Court rejected that argument and denied the motion, the Government disclosed that the DEA obtained the information contained in the database from U.S. telecommunications service providers pursuant to administrative subpoenas that the Government asserts were authorized by 21 U.S.C. § 876. See Patterson Decl. ¶ 4. In light of this disclosure, Mr. Hassanshahi takes the position that the evidence should be suppressed not only on constitutional grounds, but also on statutory grounds, arguing that the DEA’s collection and dissemination of the data violated 21 U.S.C. § 876. The Government takes the position, through several distinct arguments, that Mr. Hassanshahi is unable, as a matter of law, to challenge the statutory validity of the database and seek suppression of the evidence as a remedy. The Court addresses the Government’s arguments in turn. 1. Mr. Hassanshahi’s Ability To Raise A Statutory Challenge The Government argues that Mr. Hassanshahi cannot challenge the statutory validity of the DEA database for two reasons. First, the Government argues that Mr. Hassanshahi cannot challenge the DEA’s collection of the metadata contained in the database from telecommunications service providers, because he lacks “standing” to challenge administrative 8 subpoenas directed to third parties. 3 Second, the Government argues that Mr. Hassanshahi cannot challenge the DEA’s dissemination of that information to HSI, because it is a longstanding rule that one law enforcement agency may share information it has collected for one purpose with another law enforcement agency for a different purpose. With respect to the DEA’s collection of the metadata, the Court observes that Mr. Hassanshahi is not the first criminal defendant to challenge an administrative subpoena issued to a third party under Section 876. 4 In United States v. Moffett, a case somewhat similar to this one, a criminal defendant challenged the Attorney General’s authority to issue a subpoena to a third party under Section 876 purely on statutory grounds and sought to suppress the evidence gained through its use. See United States v. Moffett, 84 F.3d 1291, 1293 (10th Cir. 1996). The Tenth 3 The Government uses the term “standing” throughout its briefs (occasionally using the term “prudential standing”), referencing the concept of “statutory standing,” which is distinct from Article III standing. The Court eschews the terms “standing,” “statutory standing,” or “prudential standing” here, which the Supreme Court has acknowledged are “misleading.” Lexmark Int’l v. Static Control Components, Inc., 134 S. Ct. 1377, 1387 n.4 (2014). The D.C. Circuit has since clarified that “[s]tatutory standing is not really about standing at all, in the sense that it limits a ‘court’s constitutional power to adjudicate the case.’ Instead, statutory standing is nothing more than an inquiry into whether the statute at issue conferred a ‘cause of action’ encompassing ‘a particular plaintiff’s claim.’” United States v. Emor, 785 F.3d 671, 677 (D.C. Cir. 2015) (quoting Lexmark, 134 S. Ct. at 1387). 4 The Government also cites and relies upon some cases that addressed a criminal defendant’s ability to challenge a subpoena directed at a third party on constitutional grounds. See, e.g., United States v. Miller, 425 U.S. 435, 445 (1976) (“We hold that the District Court correctly denied respondent’s motion to suppress, since he possessed no Fourth Amendment interest that could be indicated by a challenge to the subpoenas.”) (emphasis added)); United States v. Phibbs, 999 F.2d 1053, 1077–78 (6th Cir. 1993) (holding that a defendant “did not have standing to dispute [the administrative subpoenas’] issuance on Fourth Amendment grounds”) (emphasis added)). Whether Mr. Hassanshahi may bring a constitutional challenge to the DEA database is not at issue here, as the Court already assumed he could do so in its denial of the motion to suppress. The Government does not challenge that assumption. See, e.g., Gov’t’s Apr. 29 Brief at 2 (“To the extent that a defendant asserts a violation of his own legal rights he has standing to do so. Hassanshahi did so in his original suppression motion, in which he claimed a violation of his Fourth Amendment rights. While defendant had standing to make this motion, it lacked merit, and it was denied.”). 9 Circuit denied the defendant’s attempted challenge, because it found that the defendant did not come within “the zone of interest the statute is meant to protect.” Id. In its reasoning, the court observed that Section 876 “is written to give the DEA broad powers to investigate violations of federal drug laws” and that it “provides no express right to challenge the Attorney General’s subpoenas issued under it.” Id. The court contrasted another administrative subpoena statute, 26 U.S.C. § 7609, which provides a person whose records are subpoenaed from third parties by the Internal Revenue Service with a right to intervene and challenge the subpoena. See id. at 1293– 94. The court also acknowledged analogous cases in which courts had similarly denied criminal defendants’ challenges to the statutory validity of a search without adjudicating the merits of the claimed violation. See id. at 1294 (citing United States v. Zermeno, 66 F.3d 1058, 1062 (9th Cir. 1995)). At least one other circuit has followed Moffett, holding that a criminal defendant did not possess “statutory standing” to attack an administrative subpoena issued under Section 876 to a third party. See United States v. Plunk, 153 F.3d 1011, 1020 (9th Cir. 1998), amended and reh’g denied 161 F.3d 1195 (1998), cert. denied 526 U.S. 1060 (1999). In his limited response, Mr. Hassanshahi points to Clapper, in which the Second Circuit held, in relevant part, that targets of orders issued pursuant to Section 215 of the PATRIOT Act could bring suit against the Government challenging the orders under the Administrative Procedure Act even though they were not the recipients of the orders. 5 See Clapper, 785 F.3d at 5 Mr. Hassanshahi makes other arguments that are clearly without merit. He claims, for example, that the Government has “conceded” standing by also “conced[ing] that use of the database was a constitutional violation.” Def.’s Apr. 13 Brief at 9–10. To be clear, the Government has never conceded that the DEA database was unconstitutional, nor has this Court held that it was. Rather, the Government asked the Court to assume, solely for purposes of the motion to suppress, that it was unconstitutional, which is what the Court did. See Hassanshahi, 75 F. Supp. 3d at 109. Moreover, Mr. Hassanshahi’s argument conflates his standing to bring a constitutional challenge with his ability to bring a statutory challenge. As discussed, supra note 4, only the latter is at issue here. Mr. Hassanshahi also cites the Second Circuit’s discussion of 10 803–10. Mr. Hassanshahi, however, neither references the Administrative Procedure Act nor explains how the Second Circuit’s reasoning would apply in this case, in which, as a criminal defendant, he seeks to challenge the validity of a different program under an administrative subpoena statute. With respect to the DEA’s dissemination of the metadata to HSI, the Government argues that the DEA “acted consistently with the longstanding legal rule that ‘[e]vidence legally obtained by one police agency may be made available to other such agencies without a warrant, even for a use different from that for which it was originally taken.’” Gov’t’s Feb. 25 Brief at 4 (quoting Jabara v. Webster, 691 F.2d 272, 277 (6th Cir. 1982)). This rule, however, concerns only the constitutionality of HSI’s query of the DEA database and does not squarely address the issue of whether the query violated Section 876. The Government observes that Mr. Hassanshahi “has not identified any statutory or regulatory provision that would proscribe the sharing of information between law enforcement agencies as part of a legitimate law enforcement investigation.” Gov’t’s Feb. 25 Brief at 4–5. Mr. Hassanshahi argues in response that the Government’s actions violated Section 876 because the Government “must have known of the unrestricted use of the database while serving the subpoenae (at some point it became obvious that the database was being used for non-drug investigations, but government continued gathering the telephony records).” Def.’s Apr. 13 Brief at 6. Ultimately, the Court need not determine here who may or may not challenge the statutory validity of the DEA’s collection of the metadata or whether Section 876 imposes any limitations on the DEA’s ability to share data, because, as discussed, infra, the Court finds that, Article III standing in Clapper as support. See Def.’s June 22 Brief at 15–16. As discussed, supra note 3, Article III standing is a separate question not at issue here. 11 even if Mr. Hassanshahi could challenge the statutory validity of the DEA database, suppression of the evidence would not be an available remedy. 2. Suppression As A Remedy For A Statutory Violation The Court next turns to the issue of whether, assuming that Mr. Hassanshahi could successfully challenge the statutory validity of the DEA database, the Court could suppress evidence discovered as a result of the database, even if suppression would not be appropriate on constitutional grounds. The suppression of evidence in a criminal trial is a serious remedy that is ordinarily reserved for certain circumstances involving violations of the Constitution. The Supreme Court has stated that the exclusionary rule “is a prudential doctrine created by this Court to compel respect for the constitutional guaranty.” Davis v. United States, -- U.S. ----, 131 S. Ct. 2419, 2426 (2011) (internal quotations omitted). On occasion, however, Congress has separately provided a remedy for suppression for statutory violations. See, e.g., United States v. Donovan, 429 U.S. 413, 432 (1977) (discussing the statutory suppression remedy provided by 18 U.S.C. § 2515 for violations of 18 U.S.C. § 2518 concerning requirements for wiretaps). Here, Mr. Hassanshahi does not dispute that Congress did not provide a suppression remedy for evidence collected in violation of Section 876. Instead, he argues that the Court should create a suppression remedy on its own. See Def.’s Apr. 13 Brief at 8. In considering this issue, the Court is guided by longstanding principles established by the Supreme Court and followed by the lower courts regarding the exclusionary rule and the suppression of evidence. In Hudson v. Michigan, the Supreme Court stated that “[s]uppression of evidence . . . has always been our last resort, not our first impulse.” Hudson v. Michigan, 547 U.S. 586, 591 (2006). The Court explained that the rule “generates substantial social costs, 12 which sometimes include setting the guilty free and the dangerous at large,” and that the Court has therefore “been cautious about expanding it and [has] repeatedly emphasized that the rule’s costly toll upon truth-seeking and law enforcement objectives presents a high obstacle for those urging its application.” Id. (internal quotations omitted). The D.C. Circuit has observed that though the Supreme Court “has applied the exclusionary rule to certain Fourth Amendment violations,” it “‘has never . . . interpreted’” the rule as “‘proscrib[ing] the introduction of illegally seized evidence in all proceedings or against all persons.’” United States v. Spencer, 530 F.3d 1003, 1006 (D.C. Cir. 2008) (quoting United States v. Leon, 468 U.S. 897, 906 (1984)). This is not to say, however, that the Supreme Court has never suppressed evidence for statutory violations. In Sanchez-Llamas v. Oregon, a case decided in the same month as Hudson, the Court rejected a petitioner’s argument that suppression was required for a violation of the Vienna Convention on Consular Relations, which provides that “when a national of one country is detained by authorities in another, the authorities must notify the consular offices of the detainee’s home country if the detainee so requests.” Sanchez-Llamas v. Oregon, 548 U.S. 331, 338–39 (2006) (citation omitted). In reaching its holding, the Court first observed that it had “applied the exclusionary rule primarily to deter constitutional violations.” Id. at 348. The Court also noted that in “[t]he few cases in which we have suppressed evidence for statutory violations . . . the excluded evidence arose directly out of statutory violations that implicated important Fourth and Fifth Amendment concerns.” Id. In its opinion, the Court discussed three such cases. See id. at 345 (citing McNabb v. United States, 318 U.S. 332 (1943); Mallory v. United States, 354 U.S. 449 (1957); Miller v. United States, 357 U.S. 301 (1958)). The Court agrees with the Government’s observation that each of these cases, decided in the 1940s and 1950s, “concerned a statute that prophylactically protected Fourth Amendment or 13 Due Process rights at a time when the judiciary had not fully fleshed out those constitutional protections.” Gov’t’s Feb. 25, 2015 Brief at 7. The Court stated that McNabb, for example, “involved the suppression of incriminating statements obtained during a prolonged detention of the defendants, in violation of a statute requiring persons arrested without a warrant to be promptly presented to a judicial officer.” 6 Sanchez-Llamas, 548 U.S. at 348. As the Court observed, its decisions in McNabb and Mallory helped later form the foundation for its landmark Fifth Amendment decision in Miranda. See id. at 348 (citing Miranda v. Arizona, 384 U.S. 436, 463 (1966)). Similarly, in Miller, the Court “required suppression of evidence that was the product of a search incident to an unlawful arrest.” Id. at 348–49 (citing Miller, 357 U.S. at 305). The D.C. Circuit has recognized that the statute at issue in Miller has since merged with judicial interpretation of the Fourth Amendment and that Miller is no longer controlling with respect to the availability of a suppression remedy under that statute. See United States v. Southerland, 466 F.3d 1083, 1084–86 (D.C. Cir. 2006). The Court is also guided by decisions of other Circuits holding that suppression is unavailable as a remedy for violations of other statutes. See, e.g., United States v. Forrester, 512 F.3d 500, 511–13 (9th Cir. 2007) (holding that suppression is not an available remedy for evidence collected in violation of a pen register statute, in part because “[a]s both the Supreme Court and this court have emphasized, suppression is a disfavored remedy, imposed only where its deterrence benefits outweigh its substantial social costs or (outside the constitutional context) where it is clearly contemplated by the relevant statute); United States v. Thompson, 936 F.2d 1249, 1251–52 (11th Cir. 1991) (holding that suppression is not an available remedy for 6 The Court stated that Mallory was similar to McNabb, except that it concerned violation of a requirement of a Federal Rule of Criminal Procedure. See Sanchez-Llamas, 548 U.S. at 345. 14 violation of the pen register statute based upon the observation that “several cases indicate that statutory violations by themselves are insufficient to justify the exclusion of any evidence obtained in that manner”), cert. denied 502 U.S. 1075 (1992). To the Court’s knowledge, no court has ever suppressed evidence because it was collected in violation of Section 876 or, for that matter, in violation of any other administrative subpoena statute that did not explicitly provide for such a remedy. Mr. Hassanshahi asserts that, in this case, the statutory violation was “intentional and systematic” and argues that this case therefore “presents a case of first impression not governed by Sanchez-Llamas or any other government cases.” Def.’s Apr. 13 Brief at 8. Following Clapper, he argues that it is now clear that the statutory violation implicates the Fourth Amendment and that those implications, together with the statutory violation, require suppression of the evidence. See Def.’s June 22 Brief at 12–13. As his sole support for this position, he cites the Second Circuit’s discussion of “some of the Fourth Amendment concerns that [the NSA program] implicates” and its statement that “[t]he seriousness of the constitutional concerns . . . has some bearing on” its holding. Clapper, 785 F.3d at 821 n.12, 824. He acknowledges, however, that the Second Circuit explicitly declined to reach the “weighty constitutional issues” that it found to be implicated. Id. at 824. The Court disagrees with Mr. Hassanshahi’s position that this is a case of first impression not governed by any precedent and regards the extensive precedent concerning the application of the exclusionary rule as instructive. Guided by the Supreme Court’s repeated warnings against the expansion of the exclusionary rule even with respect to constitutional violations and the deep aversion of other Circuits to suppress evidence for statutory violations absent a clear indication of congressional intent, the Court declines to create a suppression remedy for evidence collected 15 in violation of Section 876. The Court is not persuaded by Mr. Hassanshahi’s argument that the claimed systematic and intentional statutory violations, together with their Fourth Amendment implications, require suppression. The Court finds that it is unnecessary to expand the exclusionary rule to address these issues and that the Fourth Amendment’s well-established exclusionary rule is more than adequate to do so. Cf. Sanchez-Llamas, 548 U.S. at 350 (“[W]e think it unnecessary to apply the exclusionary rule where other constitutional and statutory protections—many of them already enforced by the exclusionary rule—safeguard the same interests Sanchez-Llamas claims are advanced by Article 36.”). Clapper, a decision in a civil case that concerned a different statute and made no mention of the exclusionary rule, does not alter the Court’s conclusion. The Court also notes that even if it were proper to create a suppression remedy for evidence collected through a “systematic and intentional” statutory violation with Fourth Amendment implications, it would be inappropriate to effect such an unprecedented expansion in this case. First, Mr. Hassanshahi seeks to challenge administrative subpoenas directed at third parties. As discussed, supra, it is far from clear that he even has the ability to do so, let alone the ability to seek suppression of evidence obtained through a subsequent, separate and constitutional search as a result of those subpoenas. Cf. Moffett, 84 F.3d 1294 (rejecting the defendant’s attempt to suppress evidence that he claimed was collected from third parties in violation of Section 876, stating that the court’s “supervisory power does not authorize us to order suppression of ‘otherwise admissible evidence on the ground that it was seized unlawfully from a third party not before the court.’”) (quoting United States v. Payner, 447 U.S. 727, 735 (1980)). Moreover, the Fourth Amendment implications of the DEA database are also unclear. The Second Circuit observed in Clapper that the question of whether individuals have any 16 privacy rights in records held by third parties that contain metadata relating to their telecommunications “touches an issue on which the Supreme Court’s jurisprudence is in some turmoil.” Clapper, 785 F.3d at 821–25. The “turmoil,” however, is somewhat theoretical. As the Foreign Intelligence Surveillance Court explained following Clapper, the Supreme Court’s decision in Smith v. Maryland, 442 U.S. 735 (1979), which held that individuals have no legitimate expectation of privacy in information that they voluntarily convey to a telecommunications provider when placing a telephone call, remains controlling precedent. See In re Application of the F.B.I., Misc. No. 15-01, 2015 WL 5637562 at **9–13 (FISA Ct. June 29, 2015). The Second Circuit declined to reach “these weighty constitutional issues” in Clapper, 785 F.3d at 824, and it would be even less appropriate for the Court to do so here, given that the Court has already assumed the unconstitutionality of the DEA database for purposes of its constitutional analysis and that it is unclear how the suppression analysis for a statutory violation would be any different, as even Mr. Hassanshahi appears to concede at one point. See Def.’s Apr. 13 Brief at 9 (arguing that “the Court need not reach the novel issue” in light of the assumption of unconstitutionality). In conclusion, the Court finds that even if Mr. Hassanshahi had the ability to challenge the statutory validity of the DEA database and could demonstrate that evidence was collected in violation of Section 876—issues the Court does not decide here 7—suppression of the evidence would not be an available remedy. Therefore, Mr. Hassanshahi is left with his constitutional 7 To the Court’s knowledge, no court has ever ruled on the statutory validity of the DEA’s database. The Court also notes that, contrary to Mr. Hassanshahi’s assertion that the Second Circuit was unaware of the DEA database at the time of its opinion in Clapper and that its decision provides precedent to suppress the evidence here, see Def.’s June 22 Brief at 13–17, the Second Circuit in fact explicitly referenced the DEA database in its opinion and declined to “opine as to whether the language of the statute pursuant to which the metadata were collected authorized that program.” Clapper, 785 F.3d at 812–13 n.6. 17 challenge to the database as his only avenue for suppressing the evidence recovered from his laptop computer. B. Mr. Hassanshahi’s Constitutional Challenge The Court next considers whether the newly disclosed details concerning the DEA database and the Second Circuit’s decision in Clapper require the Court to reverse its prior decision denying Mr. Hassanshahi’s motion to suppress the evidence on constitutional grounds. In its prior decision, the Court explained that under the fruit of the poisonous tree doctrine, an illegal search or seizure requires the exclusion at trial of not only the evidence seized in violation of the Fourth Amendment, but also any evidence obtained as a result of that seizure if the “seizure is a but-for cause of the discovery of the evidence (a necessary condition), and if the causal chain has not become ‘too attenuated to justify exclusion,’” United States v. Brodie, 742 F.3d 1058, 1062–63 (D.C. Cir. 2014) (quoting Hudson, 547 U.S. at 592), “or, to put the same point with another metaphor, if circumstances have not ‘purged [the evidence] of the primary taint.’” Id. at 1063 (alteration in original) (quoting Wong Sun v. United States, 371 U.S. 471, 488 (1963)). The Court held that the exclusionary rule did not require suppression, because “the causal chain leading to the discovery of the laptop evidence was too attenuated to justify exclusion.” Hassanshahi, 75 F. Supp. 3d at 118 (internal quotation omitted). In order to determine whether reversal of the Court’s decision is required, the Court reviews each stage of its analysis and assesses whether and to what extent the newly disclosed facts and Clapper might alter that analysis. 1. Existence Of An Unlawful Search Or Seizure The Court’s preliminary inquiry was whether an unlawful search or seizure occurred. See Hassanshahi, 75 F. Supp. 3d at 109. As discussed, the Court assumed that the law enforcement 18 database and HSI’s search of the database were unconstitutional. See id. This assumption was, of course, favorable to Mr. Hassanshahi, and the Court maintains that assumption for purposes of its analysis here. The Court need not determine whether the DEA database, as the Court now understands it, was unconstitutional. 2. But-For Causation The Court also found that the existence of but-for causation was “quite plain.” Hassanshahi, 75 F. Supp. 3d at 109. The Court need not revisit that finding here, as it was also favorable to Mr. Hassanshahi and remains unchallenged. 3. Attenuation and the Exclusionary Rule As the Court explained in its prior opinion, the Supreme Court has identified three factors for courts to consider when determining attenuation: (1) the amount of time between the illegality and the discovery of the evidence (i.e., temporal proximity); (2) the presence of intervening circumstances; and (3) the purpose and flagrancy of the illegal conduct. See Brodie, 742 F.3d at 1063 (citing Brown v. Illinois, 422 U.S. 590, 603–04 (1975)). The Government bears the burden of proving attenuation by a preponderance of the evidence. See United States v. Holmes, 505 F.3d 1288, 1293 (D.C. Cir. 2007); United States v. Wood, 981 F.2d 536, 541 (D.C. Cir. 1992). The Court reviews its analysis of each of the three factors. a. Temporal Proximity The first factor is the temporal proximity between the illegality and the discovery of the evidence. See Hassanshahi, 75 F. Supp. 3d at 110 (citing Brodie, 742 F.3d at 1063). The Court observed that the Government’s affidavit showed that “more than four months passed between the unconstitutional law enforcement database search on August 24, 2011, and the forensic laptop examination on January 17, 2012.” Id. (citing Akronowitz Aff. ¶¶ 3, 21, ECF 19 No. 37-1). The Court found that “this several month gap—during which the Government continued to investigate Hassanshahi through unrelated sources, including the use of preexisting evidence in TECS [a database that the Department of Homeland Security uses in connection with its border inspection processes] and the issuance of lawful subpoenas to Google—weighs in favor of not suppressing the laptop evidence.” Id. Neither the new factual details concerning the database nor the Second Circuit’s decision in Clapper change the Court’s factual or legal analysis in any way, nor does Mr. Hassanshahi offer any argument to the contrary. Accordingly, this factor continues to weigh against suppressing the evidence. b. Intervening Circumstances The second factor in the attenuation analysis is “whether there were intervening circumstances sufficient to break the causal chain and lessen the taint of the initial illegality.” Hassanshahi, 75 F. Supp. 3d at 110 (citing Brodie, 742 F.3d at 1062–63). The Court considered two intervening circumstances in its denial of the motion to suppress. First, the Court found that Mr. Hassanshahi’s voluntary arrival at LAX in January 2012 was a relevant intervening circumstance, but the Court held that it was “uncertain how much weight to give this event,” given the open constitutional question as to whether reasonable suspicion was required for the Government’s forensic examination of the laptop. Id. at 111–12. The Court held that it did not need to resolve the issue, because a second intervening circumstance, HSI’s investigative steps following its discovery of the California telephone number, “unambiguously weighs in favor of not suppressing the laptop evidence.” Id. at 112. In making this determination, the Court looked to the “unlawful lead” principle, stating: Federal courts have consistently held that the exclusionary rule does not apply to subsequently discovered evidence when an initial 20 limited piece of information—typically the name of a potential target for investigation—is obtained through an illegal search or seizure because substantial investigating steps still are required to uncover the necessary incriminating evidence. Id. The Court acknowledged a long line of cases that have “refus[ed] to apply the exclusionary rule to suppress evidence that was discovered during a later investigation following the initial unlawful discovery of evidence that merely pointed law enforcement in the defendant’s direction.” Id. The Court found that “[t]he circumstances here even more strongly compel finding attenuation than in [those] cases because the law enforcement database revealed only the slimmest of leads: the 818 number.” Id. at 113. The Court also observed that, unlike typical “unlawful lead” cases in which the defendant’s identity is discovered through the unlawful search, in this case, HSI had to take additional steps to even identify Mr. Hassanshahi. See id. The Court found that HSI acted lawfully by then subpoenaing Google for information about the owner of the telephone number and that HSI’s subsequent four-month investigation prior to the forensic examination of the laptop “primarily involved the use of information in TECS that existed before the initial database search.” Id. The Court therefore concluded that “the discovery of the laptop evidence occurred only through substantial and essential intervening events following the ‘unlawful lead’ that was the 818 number, and this factor therefore weighs strongly in favor of not excluding the evidence.” Id. This factor was central to the Court’s holding. See id. at 115 n.6 (stating that “the Court . . . concludes that the attenuation exception applies in large part based on the ‘unlawful lead’ line of cases”). The newly disclosed details concerning the database do not alter the Court’s conclusion in any way; they only bolster it. The Patterson Declaration states that “[n]o subscriber information or other personal identifying information was included in the database” and that it 21 consisted exclusively of the initiating telephone number, the receiving telephone number, the date, time and location of the call, and the method by which the call was billed. Patterson Decl. ¶ 4. This confirms that, as the Court found in its prior opinion, the DEA database provided HSI with only “the slimmest of leads” and that HSI had to conduct a further investigation to even identify Mr. Hassanshahi. Mr. Hassanshahi challenges the Court’s conclusion, claiming that the Government has not “come clean even at this stage.” Def.’s Apr. 13 Brief at 6. He relies upon a news report published by Reuters on August 5, 2013 concerning “[a] secretive U.S. Drug Enforcement Administration unit” called the Special Operations Division (“SOD”) that the report states “is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.” Id. (quoting Def.’s Apr. 13 Brief Ex. at 1, ECF No. 53-1). The news report purports to rely on a secret Government document that instructs agents to “omit the SOD’s involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony” and to “use normal investigative techniques to recreate the information provided by SOD.” Id. at 6–7 (quoting Def.’s Apr. 13 Brief Ex. at 2). Mr. Hassanshahi suggests that the Government’s disclosure of its subsequent search of TECS in a supplemental affidavit submitted in opposition to his motion to suppress may have been “an attempt to ‘recreate’ an investigative trail that originated with SOD[.]” On this issue, the Government states that “[w]hile it would not be improper for a law enforcement agency to take steps to protect the confidentiality of a law enforcement sensitive investigative technique, this case raises no such issue.” Gov’t’s Feb. 25 Brief at 3, n.2. 22 Though the Court does not necessarily share the Government’s view regarding the propriety of the “recreation” technique, particularly if doing so involves providing false or misleading information to a criminal defendant or the Court, the Court finds no basis for concluding that the Government employed that technique here. Most significantly, Mr. Hassanshahi’s theory is belied by the fact that the Government disclosed the existence of the database at issue here, albeit with limited detail, from the very beginning of its prosecution. See Aff. In Support Of Criminal Compl. ¶ 15, ECF No. 1-1 (“Using the business telephone number associated with ‘Sheikhi’, I searched HSI-accessible law enforcement databases . . . .”). Had the Government recreated its investigative steps to conceal potentially unlawful actions, it is hard to believe that the Government would have freely made this disclosure. Moreover, the Court already addressed Mr. Hassanshahi’s issue with respect to the timing and nature of the Government’s disclosure regarding the TECS database search in its opinion denying his motion to suppress, as Mr. Hassanshahi first raised it at oral argument on his motion. See Hassanshahi, 75 F. Supp. 3d at 105 n.1 (finding that “the second affidavit merely provides more information about the HSI investigation than the first affidavit, which is not surprising given the different purposes”). The Court is thus satisfied that the newly disclosed information concerning the database does not alter its conclusion that the Government’s investigative steps following the discovery of the California telephone number, a minor lead in the case, constitute an intervening circumstance that weighs heavily and unambiguously against suppressing the laptop evidence. c. Purpose And Flagrancy Of The Illegal Conduct The final factor in the attenuation analysis is the “purpose” and “flagrancy” of the illegal law enforcement conduct. See Hassanshahi, 75 F. Supp. 3d at 101 (citing Brodie, 742 F.3d at 23 1063). “As a rule, courts generally ‘favor suppression’ only ‘if law enforcement officials conducted the illegal search with the purpose of extracting evidence against the defendant, or if they flagrantly broke the law in conducting the search.’” Id. (quoting United States v. Washington, 387 F.3d 1060, 1075 (9th Cir. 2004)). Though the Court acknowledged that it was “left slightly in the dark regarding the flagrancy element” given the lack of detail provided by the Government at the time, the Court nevertheless unequivocally concluded that “HSI did not act purposefully or in bad faith to violate Hassanshahi’s constitutional rights.” Id. at 114–15. In making this determination, the Court took several factors into account. First, the Court “surmise[d] . . . that the law enforcement database operates fairly similarly to the NSA program, at least insofar as the database appears to include a repository of aggregated telephone records for calls made into the U.S. from abroad.” Id. at 114. The Court stated, however, that the “ambiguity” regarding the nature of the database complicated its analysis. Id. The Court explained that if, for example, it treated the database as “functionally equivalent to the NSA telephony program,” then the Court would “likely conclude that HSI acted in good faith,” because courts had generally approved of the program and, at the time of HSI’s search of the database, no court had deemed the program unconstitutional. Id. The Court stated, however, that it did not “know with certainty whether the HSI database actually involves the same public interests, characteristics, and limitations as the NSA program such that both databases should be regarded similarly under the Fourth Amendment.” Id. In particular, the Court noted that the NSA database “was specifically limited to being used for counterterrorism purposes, and it remains unclear if the database that HSI searched imposed a similar counterterrorism requirement.” Id. The Court speculated broadly that “[i]f the HSI database did have such a limitation, that might suggest some level of flagrancy by HSI because it 24 was clear that neither Sheikhi nor Hassanshahi was involved in counterterrorism activities.” Id. The Court nevertheless concluded that “even assuming that the HSI database was misused to develop the lead into Hassanshahi, HSI’s conduct appears no more flagrant than law enforcement conduct in other ‘unlawful lead’ cases, which still held that the attenuation exception applied nonetheless.” Id. at 114–15 (citing United States v. Carter, 573 F.3d 418, 421 (7th Cir. 2009) (admitting evidence after illegal search of defendant’s residence); United States v. Smith, 155 F.3d 1051, 1059 (9th Cir. 1998) (admitting evidence resulting from an “illegally intercepted wire communication”); United States v. Friedland, 441 F.2d 855, 856 (2d Cir. 1971) (admitting evidence after the “FBI unlawfully installed electronic ‘bugs’” in an office)). The Court stated that it was “more certain, though, that HSI did not search the law enforcement database for the purpose of ‘extracting evidence against the defendant.’” Id. at 115 (quoting Washington, 387 F.3d at 1075). The Court based this determination on the fact that, when it searched the database, “HSI had no inclination that Hassanshahi was involved” and that “the agency used the law enforcement database to cast a wide net for potential U.S.-based suspects.” Id. Based largely on this determination, the Court found that the “purpose” and “flagrancy” factor weighed against suppressing the evidence. Mr. Hassanshahi argues that the newly disclosed information concerning the database should materially alter the Court’s analysis of this factor. He argues that the newly disclosed information demonstrates that the Government’s actions were “nothing but purposeful,” because: the Government “essentially subpoenaed 100% of Americans’ telephony data and metadata for decades, without any specific investigation pending, all in deliberate violation of the statute”; the Government made the database “available to any and all comers, in deliberate violation” of the statute; the Government took steps to conceal the true source of the information; and the 25 Government “did all this deliberately, purposefully and systematically, all while knowing for certain of the statutory violations and with strong knowledge of the Fourth Amendment implications if not outright violations.” Def.’s July 29 Brief at 3–4. He principally relies on the Seventh Circuit’s opinion in United States v. Reed, 349 F.3d 457, 464–65 (7th Cir. 2003) regarding the importance of the purpose and flagrancy factor and argues that the flagrancy and purposefulness of the Government’s conduct in this case “far exceeds, in depth and scope, any one-time violation such as was found flagrant in cases like Reed.” Def.’s July 29 Brief at 3–4. The Court is not persuaded. As a preliminary matter, nearly all of Mr. Hassanshahi’s points concern whether the Government purposefully violated Section 876, not the relevant inquiry of whether it purposefully violated the Constitution. Moreover, Mr. Hassanshahi’s factual assertions have little, if any, basis in the record. For example, the record does not indicate that the Government “essentially subpoenaed 100% of Americans’ telephony data and metadata for decades.” On the contrary, the Patterson Declaration states that the metadata concerned only calls originating from the United States and calling foreign countries. See Patterson Decl. ¶ 4. Also, as discussed, supra, there is no indication here that the Government has taken any steps to conceal the true source of the information, and Mr. Hassanshahi offers no support for his assertion that the Government “[knew] for certain” that it was violating a statute, which no court has ever decided. Mr. Hassanshahi’s reliance on Reed is also misplaced. First, contrary to Mr. Hassanshahi’s assertions, the Seventh Circuit did not hold that the misconduct in that case required suppression; it remanded the case to the district court to consider whether the unlawful actions were taken to advance the investigation or “embark on a fishing expedition” as “relevant” to the suppression analysis. Reed, 349 F.3d at 465–66. Second, in Reed, unlike this case, the Seventh Circuit upheld the district court’s determination that there were “no intervening 26 circumstances sufficient to purge the taint of the allegedly illegal arrest.” Id. at 464. As explained, supra, the Court’s finding of intervening circumstances in this case weighs heavily against suppression and is central to its holding. Perhaps the most glaring flaw in Mr. Hassanshahi’s briefing on this issue is his failure to engage with the Court’s prior analysis of the purpose and flagrancy factor and demonstrate what exactly about the new information should alter the Court’s analysis. For the sake of clarity, however, the Court will revisit its analysis in light of the new information and Clapper. Most significantly, the newly disclosed information does not in any way change the Court’s critical conclusion that HSI did not search the law enforcement database in order to target Mr. Hassanshahi. Regardless of any other factual developments since the Court’s prior opinion, it remains clear that when HSI searched the DEA database, it had no indication that Mr. Hassanshahi had any involvement in the matters it was investigating and that HSI was unable to even identify Mr. Hassanshahi until after it lawfully obtained information from Google. Given that the Court concluded on this basis that the purpose and flagrancy factor counseled against suppression, this is sufficient for the Court to determine that reconsideration of this factor is unjustified. Nevertheless, the Court observes that the newly disclosed information resolves some of the ambiguity described in the Court’s prior opinion concerning whether the Court could treat the database at issue here as “functionally equivalent” to the NSA’s database and whether HSI “misused” the database to develop the lead into Mr. Hassanshahi. It is now clearer that the DEA database was similar in many important respects to the NSA’s database. For instance, the Patterson Declaration largely confirms the Court’s hypothesis that the DEA database contained records of international telephone calls, except the Court now understands that the records 27 concerned calls originating in the United States, rather than abroad. See Patterson Decl. ¶ 4. The Court also now understands that the records were limited to specific types of metadata that did not include any personal identifying information. These records appear to have actually been narrower in scope than the records stored in the NSA’s telephony database. See Clapper, 785 F.3d at 793–97 (describing orders under the NSA program calling for “all call-detail records or ‘telephony metadata’” of all domestic and international calls). The DEA database also appears to have differed in some other ways. Most notably, the Court now understands that the DEA originally collected the information contained in the database and that HSI accessed it for a different purpose. 8 See Patterson Decl. ¶ 5. Though the Court speculated in its prior opinion that if the database was limited to a purpose not relevant here, it “might suggest some level of flagrancy,” the Court is satisfied, upon consideration of the supplemental briefing on this issue, that HSI’s subsequent search of the database does not suggest that the Government purposefully and flagrantly violated the Fourth Amendment, given well-established precedent that “[e]vidence legally obtained by one police agency may be made available to other such agencies without a warrant, even for a use different from that for which it was originally taken.” Jabara, 691 F.2d at 277. See also Johnson v. Quander, 440 F.3d 489, 498–500 (D.C. Cir. 2006) (holding that the Government’s access to a database containing a defendant’s “genetic fingerprint” lawfully collected while he was on probation after the defendant’s probation terminated and for a different purpose did not constitute a separate search for Fourth Amendment purposes). Moreover, as the Court explained in its prior opinion, even 8 Mr. Hassanshahi also observes that the NSA’s program involved oversight by the Foreign Intelligence Surveillance Court, whereas the DEA’s database was compiled using administrative subpoenas, yet he does not offer any reason to find that the use of administrative subpoenas—a well-established and legitimate power authorized by Congress—suggests a flagrant constitutional violation. See Def.’s June 22 Brief at 6–7. 28 assuming that HSI “misused” the DEA database, its conduct appears no less flagrant than other “unlawful lead” cases in which courts have applied the attenuation exception. See Hassanshahi, 75 F. Supp. 3d at 114–15. In its prior opinion, the Court stated that if it treated the database at issue as “functionally equivalent” to the NSA’s program, then it would likely conclude that HSI acted in good faith, because courts have generally approved of the NSA’s program and because no court at the time of the search had disapproved of it. Cases decided since the Court’s opinion do not require any alteration to that analysis. The Court noted that the one exception at the time of its decision was Judge Leon’s opinion in Klayman v. Obama, 957 F. Supp. 2d 1 (D.D.C. 2013). The D.C. Circuit has since vacated that decision on standing grounds. See Obama v. Klayman, 800 F.3d 559 (D.C. Cir. 2015). Nor does the Second Circuit’s decision in Clapper affect the Court’s prior analysis, as the Second Circuit declined to reach the constitutional issues in that case. Though there are differences between the two, the Court is now more comfortable viewing the DEA database and the NSA’s program as “functionally equivalent” for purposes of the Court’s analysis here, which only bolsters the Court’s earlier conclusion regarding the purpose and flagrancy factor of the attenuation analysis. * * * * In sum, while the newly disclosed information concerning the DEA database provides helpful clarity, the Court finds that none of the new information, nor Clapper or any other developments in the legal landscape, alter the Court’s prior conclusion that all three attenuation factors weigh against suppression and that the new information only confirms the Court’s prior 29 holding that the exclusionary rule does not require suppressing the laptop evidence in this case as fruit of the poisonous tree. 9 V. CONCLUSION For the foregoing reasons, Defendant Shantia Hassanshahi’s motion for reconsideration is DENIED. SO ORDERED. Dated: November 19, 2015 RUDOLPH CONTRERAS United States District Judge 9 The Court also rejects Mr. Hassanshahi’s request, in the alternative, for an evidentiary hearing to explore “the extent and operation” of the DEA database. Def.’s June 22 Brief at 17. The Court finds that, for the reasons provided in this opinion and in the Court’s prior opinion, Mr. Hassanshahi has not identified any unresolved factual issues that could alter the Court’s conclusion. 30
Nutrition therapy for diabetic nephropathy. Human observational studies report no association between protein intakes less than 20% of energy intake and the development of renal disease. With protein intakes greater than 20% of energy intake there is an association between protein with increased albumin excretion rate. Once albuminuria is present, intervention studies suggest a beneficial effect on renal function with a reduction of protein to 0.8 to 1.0 g/kg/d with microalbuminuria and to 0.8 g/kg/d with macroalbuminuria. Restriction of sodium to 2400 mg/d or possibly for some to 2000 mg/d assists in the control of hypertension. In macroalbuminuria, there may be additional benefits in lowering phosphorus intake to 500 to 1000 mg/d. There is no strong evidence to suggest benefit from vegetable or plant proteins over animal protein, but there is evidence for benefit on renal function, glucose, lipids, and blood pressure from weight-maintaining diets meeting guidelines for a healthy diet.
These proposals included a ban on high capacity magazines, restrictions that would end gun shows and, potentially, stripping millions of gun owners of their rights by placing them on “watch lists” without any due process of law. At this point, it appears that your efforts to counter these disastrous proposals with GOA-backed initiatives have backed the gun grabbers into a corner, and we are optimistic that their plans are stymied for now. Senate rules survive attack by the Far Left In late January, GOA members and activists largely won a battle in the U.S. Senate that will have huge implications over the next two years. At issue was the Senate filibuster, a well-known but little understood procedural maneuver that allows a minority of Senators to block legislation unless debate is “shut off” by a supermajority — usually sixty votes. The filibuster has been particularly important to gun owners, as it has been used to stop the leadership of both parties in their efforts to end gun shows and ban so-called assault weapons. It has also been used for such purposes as slowing down (and forcing changes to) legislation to expand the Brady law. The filibuster was put on the chopping block by anti-gun senators in late January, since they consider it an “arcane rule” that has been a pesky impediment to their socialist agenda. On the first day the Senate returned to Washington in January, Senate Majority Leader Harry Reid sought to place his own judgment over the Founding Fathers, the Constitution, and hundreds of years of precedent. In a blatant abuse of power, Senate Democrats argued that the chamber is not a “continuing body” and, therefore, its standing rules could be changed on the first legislative day of the session by a simple vote of fifty Senators (plus Vice-President Biden). If successful, the plan would have ended the filibuster entirely in order to ram through whatever legislation they and President Obama wished. The only way to accomplish this, however, was to throw the entirety of the Senate rules out the window. But even some Democrats were unwilling to go along with this scheme. To buy time, the anti-gunners even used a magic calendar and stretched the first legislative day from January 5 all the way to January 25. Alone among Second Amendment groups, GOA fought against this rules change. And we won what may prove to be the most important Senate victory of the next two years — something for which GOA members deserve a lot of credit. The importance of this win cannot be overstated. Failure would have opened the door, for example, to a host of gun control legislation that typically follows a highly publicized tragedy such as the shooting in Tucson. Anti-gun ObamaCare on the ropes? There's been a lot of news on ObamaCare during the last month. In a massive blow to the Obama administration's socialist anti-gun agenda, Florida federal district judge Roger Vinson held that ObamaCare was unconstitutional and “non-severable.” This means that, if the decision is upheld, the entire law goes into the trash bin. A few days before this court decision, the House of Representatives voted to repeal the anti-gun law by a tally of 245-189. The repeal bill faces tougher challenges in the Senate, but there are many ways it could still pass. While many people believe the bill will fail in the Senate regardless, the truth is that many bills start without a majority of support in Congress, but ultimately get passed. If Republicans choose to tack an ObamaCare repeal onto the federal appropriations bill (the “continuing resolution”) or the debt limit increase, Obama will have no choice but to sign away his own treasured legacy. His only alternative would be to shut down all of his rule-making agencies for the remainder of his term. The vote in the House was a huge victory for gun rights activists, as ObamaCare will allow the Bureau of Alcohol, Tobacco, Firearms and Explosives (BATFE) to troll a federal database containing your most confidential health care data in order to create millions of new “prohibited persons” for the FBI's Instant Check system. GOA thanks its members and activists for taking action to pressure the U.S. Congress in support of these victories. The thanks are extremely heartfelt, because it is YOUR willingness to act that tips the scales in such fights, and allows GOA to continue to be a force that elected officials dare not ignore. About: Gun Owners of America (GOA) is a non-profit lobbying organization formed in 1975 to preserve and defend the Second Amendment rights of gun owners. GOA sees firearms ownership as a freedom issue. `The only no comprise gun lobby in Washington' – Ron Paul 2 Leave a Reply For some reason only GOA recognizes the threat of gun control in the Obama-care health plan. Statistics show that people suffering from health issue like PTSD are no more likely to commit a crime than any other demographic group, something the NRA refuses to accept. Under the current interpretation of the law if one person is disqualified then the entire household is disqualified. [sick] We need to repeal the laws and stop the confiscation of firearms under the color of law. Vote Up0Vote Down 8 years ago Guest FrankInFL Halt funding to the FAA? Perfect! Let me tell you where that's going. If the FAA gets de-funded by Congress, before any ATC runs out of pocket change, the CEOs of 30 major airlines will all be in the same room creating an independent corporation, FAA Inc., and its tasks will continue without skipping a beat, never to be under the federal thumb again. De-fund the FAA? Yes, please. Schumer, McCarthy, & Co. Inc. will not just lose one battle, they'll lose two. When the dust settles, people will be asking: if we can de-federalize FAA, what else could we… Read more »
Q: remove the forward slash from ls in bash I really tried it a lot, I know how sed works, But I have a file, say ls -t -d */ which gives me 15072301/ 15072300/ 15072223/ 15072222/ 15072221/ Basically I want to get rid of this / in the end of each line. Using sed itself? I know I can handle it otherwise too, like taking a substring but there has to be an sed answer to this? A: The sed way to remove a trailing slash from each line would be sed 's:/$::' file Notice that ls is actually not providing any value here, assuming the directory names correspond to when they were last modified. The shell will expand the glob in sorted order. So you might as well use printf '%s\n' */ | sort -r | sed 's:/$::' You should generally not use ls in scripts. See http://mywiki.wooledge.org/ParsingLs for a discussion.
Q: Error: ENOENT util.rb No such file or directory after upgrading to compass 1.0.1/sass 3.4.2 Here's everything the terminal spits back, with --trace- Errno::ENOENT on line ["670"] of /Library/Ruby/Gems/2.0.0/gems/sass-3.4.2/lib/sass/util.rb: No such file or directory - /Users/aristidesstaffieri/sass /Library/Ruby/Gems/2.0.0/gems/sass-3.4.2/lib/sass/util.rb:670:in `realpath' /Library/Ruby/Gems/2.0.0/gems/sass-3.4.2/lib/sass/util.rb:670:in `realpath' /Library/Ruby/Gems/2.0.0/gems/sass-3.4.2/lib/sass/importers/filesystem.rb:16:in `initialize' /Library/Ruby/Gems/2.0.0/gems/sass-3.4.2/lib/sass/engine.rb:192:in `new' /Library/Ruby/Gems/2.0.0/gems/sass-3.4.2/lib/sass/engine.rb:192:in `block in normalize_options' /Library/Ruby/Gems/2.0.0/gems/sass-3.4.2/lib/sass/engine.rb:190:in `map' /Library/Ruby/Gems/2.0.0/gems/sass-3.4.2/lib/sass/engine.rb:190:in `normalize_options' /Library/Ruby/Gems/2.0.0/gems/sass-3.4.2/lib/sass/plugin/staleness_checker.rb:52:in `initialize' /Library/Ruby/Gems/2.0.0/gems/sass-3.4.2/lib/sass/plugin/compiler.rb:203:in `new' /Library/Ruby/Gems/2.0.0/gems/sass-3.4.2/lib/sass/plugin/compiler.rb:203:in `update_stylesheets' /Library/Ruby/Gems/2.0.0/gems/sass-3.4.2/lib/sass/plugin/compiler.rb:294:in `watch' /Library/Ruby/Gems/2.0.0/gems/compass-1.0.1/lib/compass/sass_compiler.rb:46:in `watch!' /Library/Ruby/Gems/2.0.0/gems/compass-1.0.1/lib/compass/commands/watch_project.rb:41:in `perform' /Library/Ruby/Gems/2.0.0/gems/compass-1.0.1/lib/compass/commands/base.rb:18:in `execute' /Library/Ruby/Gems/2.0.0/gems/compass-1.0.1/lib/compass/commands/project_base.rb:19:in `execute' /Library/Ruby/Gems/2.0.0/gems/compass-1.0.1/lib/compass/exec/sub_command_ui.rb:43:in `perform!' /Library/Ruby/Gems/2.0.0/gems/compass-1.0.1/lib/compass/exec/sub_command_ui.rb:15:in `run!' /Library/Ruby/Gems/2.0.0/gems/compass-1.0.1/bin/compass:30:in `block in <top (required)>' /Library/Ruby/Gems/2.0.0/gems/compass-1.0.1/bin/compass:44:in `call' /Library/Ruby/Gems/2.0.0/gems/compass-1.0.1/bin/compass:44:in `<top (required)>' /usr/bin/compass:23:in `load' /usr/bin/compass:23:in `<main>' This only started happening after I updated, and all of my gems are updated. I've tried uninstalling and re-installing compass/sass. Any suggestions? A: I believe that the problem you were having is the new update of the gem. With this modification you get back to the previous version. I modified Gemfile. I added this line gem 'compass','0.12.6' This is my first lines at Gemfile source 'http://rubygems.org' ruby '1.9.3' gem 'rails', '~> 3.2.15' group :assets do gem 'sass-rails' gem 'compass-rails' gem 'compass','0.12.6' gem "twitter-bootstrap-rails" gem 'uglifier' end I think this is what you wanted, but if not, let me know as many times as you need.
Altered electrical potential profile of human reabsorptive sweat duct cells in cystic fibrosis. The electrophysiological properties of reabsorptive sweat duct (RSD) cells from normal and cystic fibrosis (CF) subjects were studied using intracellular microelectrodes. The apical membrane potential (Va) of CF duct cells was reversed in "polarity" (+28.0 +/- 2.4 mV, n = 46) compared with normal duct cells (-24.9 +/- 0.4 mV, n = 145), and the basolateral membrane potential (Vb) of CF cells was hyperpolarized significantly (-50.1 +/- 1.2 mV, n = 46) in comparison to normal cells (-34.6 +/- 0.4 mV, n = 145). The substitution of the impermeant anion gluconate for Cl- in the lumen of the normal duct depolarized Va from -24.9 +/- 1.1 to 8.9 +/- 3.1 mV (n = 18) and hyperpolarized Vb from -34.3 +/- 1.1 to -55.6 +/- 3.7 mV (n = 18), which mimicked the cell electrical potential profile of CF ducts even in the presence of Cl-. Cl- substitution in the bath depolarized Vb of normal ducts by 22.5 +/- 2.6 mV (n = 24), while hyperpolarizing Va by -3.4 +/- 1.6 mV (n = 24). The response of the electrical profiles of CF cells to Cl- substitution in either the lumen or the bath was significantly reduced compared with normal cells. The effect of the Na+ conductance blocker amiloride (10(-4) M) on Vb was not significantly different in CF (delta Vb = -26.4 +/- 3.8 mV, n = 9) vs. normal (delta Vb = -27.6 +/- 2.5 mV, n = 30) cells.(ABSTRACT TRUNCATED AT 250 WORDS)