text stringlengths 8 5.77M |
|---|
1. Technical Field
The present invention relates to a resonator element such as a flexural resonator element that vibrates, for example, in a flexural vibration mode, a resonator or an oscillator that uses the resonator element, and an electronic device having the oscillator.
2. Related Art
In the related art, a tuning-fork type flexural resonator element in which a pair of resonating arms is extended from a base portion made from a piezoelectric material such as a quartz crystal so as to vibrate in the direction towards or away from each other in the horizontal direction is widely used as a resonator element that vibrates in the flexural vibration mode. When the resonating arms of the tuning-fork type flexural resonator element are excited, if there is a loss of the vibration energy thereof, it decreases the performance of the resonator element by, for example, an increase of the CI (Crystal Impedance) value or a decrease of the Q value. Thus, various attempts have been made to prevent or suppress such a loss of vibration energy.
For example, a tuning-fork type quartz crystal resonator element in which a cutout portion or a notch (notched groove) with a predetermined depth is formed on both sides of the base portion from which the resonating arms extend is known (for example, see JP-A-2002-261575 and JP-A-2004-260718). In this tuning-fork type quartz crystal resonator element, when the vibration of the resonating arms includes a vertical component, the loss of vibration from the base portion is suppressed by the notch. Thus, a confinement effect of the vibration energy increases, and the Q value is controlled and the fluctuation of the Q value between the resonator elements is prevented.
Moreover, in a resonator element, the decrease of the Q value occurs not only due to the mechanical loss of vibration energy described above, but also occurs due to thermal conduction caused by a temperature difference between a contracted portion where compressive stress of the resonating arms performing flexural vibration acts and an expanded portion where tensile stress acts. The decrease of the Q value caused by thermal conduction is referred to as a thermoelastic loss effect.
A tuning-fork type resonator element in which a groove or a hole is formed on the central line of a resonating arm (vibrating beam) having a rectangular section in order to prevent or suppress the decrease of the Q value due to the thermoelastic loss effect is disclosed in JP-UM-A-2-32229, for example.
In recent years, various electronic devices having the resonator element have been miniaturized. Examples of such electronic devices include miniaturized information devices such as HDDs (Hard Disk Drives), mobile computers, or IC cards, mobile communication devices such as portable phones, car phones, or paging systems, and vibration gyro sensors. In line with this, there is a higher level of demand for miniaturization of resonator elements mounted in these electronic devices.
Among the demand for miniaturization of such a resonator element, shortening of the length of a resonating arm is particularly promising. In line with this, there is a demand to decrease the cross-sectional area of the resonating arm. Therefore, it has been understood that it is difficult to decrease the frequency of the resonator element and the vibration characteristics of the resonator element are likely to become unstable due to the occurrence of a high-order vibration mode. As a resonator element capable of suppressing the occurrence of such a high-order vibration mode, decreasing the frequency, and stabilizing the vibration characteristics, a resonator element in which a weight portion having a larger width than a general portion (arm portion) of a resonating arm is formed at the tip end of the resonating arm is disclosed in JP-UM-A-2005-5896, for example.
However, the present inventor has found that when the resonator element has a structure in which it has a resonating arm which includes both an elongated groove and a weight portion, if the occupancy of the length of the weight portion with respect to the entire length in the longitudinal direction of the resonating arm is too small or too large, it is not possible to obtain a desirable effect of decreasing the frequency with the weight portion and a desirable effect of suppressing thermoelastic loss with the elongated groove. Moreover, the present inventor has also found that when the occupancy of the length of the weight portion with respect to the entire length in the longitudinal direction of the resonating arm is within a certain range, it is possible to obtain the desired Q value by effect of decreasing the frequency with the weight portion and the desirable effect of suppressing thermoelastic loss with the elongated groove. |
Ayahuasca Adventure in the Amazon
Ayahuasca, the ‘spirit vine’ is a brew containing the Banisteriopsis caapi vine and Psychotria viridis or Diplopterys cabrerana leaves. The vine contains harmine and harmaline which are MAO-A inhibitors, and tetrahydroharmine which is a weak serotonin uptake inhibitor. The leaves contain dimethyltryptamine (DMT), the strongest hallucinogenic known to man.
When ingested, the combination of these plants lead to the uptake of DMT by your brain where it will alter your perceptions of reality. Many claim these are visions where the Ayahuasca goddess will talk to you, giving you knowledge from the spirit world.
Here is one such magical journey with Ayahuasca in the Amazon as shared by Jonathon Twiz ...
So I just got back from Peru a couple weeks ago and aside from doing all the touristy stuff like going to Machu Picchu, I spent most of my time in the Amazon Jungle. It was more than a vacation for me, it was an experiment, a journey, a foot step in my ongoing insatiable quest for the ultimate reality. To tell you the truth what led me to the Rain Forrest was a Psychedelic Plant that has been used for thousands of years by the Indigenous people of the Amazon. While in the Jungle I took this powerful plant and…
this is what happened……
Many people who take Ayahuasca take it because they want to overcome fears, depression, addiction or any other negative pattern of behaviour. Some take it simply because they want a spiritual journey. I’m pretty upfront, honest, and direct with myself and the things that happen in my life so I felt I had conquered all my fears, I didn't have any demons or addictions to overcome, I was just really curious to see if Ayahuasca can take me on a spiritual journey and open my eyes to the unknown. Maybe I did have fears that I was unaware of, buried deep in my subconscious, and the Ayahuasca might bring that out. People had told me that you may end up seeing things that scare the shit out of you. Regardless I had already committed to it and I was of the thinking that if I think I will have a negative experience, then I will have one, if I’m confident that I won’t (which I was) then I won’t have a negative journey.
Before we get into what happened I will briefly summarize that my Ayahuasca experience was more emotion based than visual. I still saw things but I felt things much more than I saw. It was almost like there was a psychic connection between me and the universe. I would ask something and the energy would just pass through my body and it would manifest as information without the need for a visual. Have you ever felt the presence of someone and then they call you 2 seconds later? Ever wonder how animals can feel danger before it comes, like the animals who made a run for the hills hours before the Tsunami? You didn't see anything before that person called you, you just felt it. The animals didn't see anything, they just felt it. Some unexplained energetic force transmitting the vibration of something or an event, who knows, I’m just trying to make sense of it. That is the kind of thing I was feeling, on a larger scale. You’d really have to feel it before you can fully understand what I’m saying but that is the best way I can explain it. I was feeling Information………. No, I didn't walk away with psychic powers but during the trip, that was the experience.
Another thing about Ayahuasca is that it makes you vomit. The Scientific (left brain perspective) is because the plant is a purgative. It causes your gallbladder to dump bile, your digestive tract to work overtime, and frequently to expel its contents, but it is also part of the medicinal qualities of the plants. They are known to detox your body and kill parasites and unhealthy bacteria in the digestive system. The Spiritual (right brain perspective) is such that when you use it to heal you and work with you, it is supposed to remove the negative energies inside of you that cause you harm. This happens on a physical, mental and emotional level. Sometimes releasing a negative stored emotion or harmful mental pattern is experienced in your body in a physical way as a powerful purge (a vomit).
I took Ayahuasca 3 times and I never vomited. My stomach was aching a lot but I never threw up. I wondered if it was because I didn’t have any negative energy, emotions, behaviours, etc to release. Or was my dose of Ayahuasca less powerful? The guy that gave me the Ayahuasca “Orlando a.k.a The Dragon”, an indigenous native of the Quechua people, has a reputation of being one of the most intense Ayahuasca Shamans so I kind of doubt it wasn't powerful enough. So lets fast forward to my first intake.
After taking the Ayahuasca I began to see Vines, Roots, and Branches surrounding and wrapping all over my body. My stomach was aching, there was a Revolution going on in my belly. My body became plant like. My stomach and intestines became roots and vines twisting, turning, wrapping and overlapping each other as my stomach ached. The movement of the roots and vines were in sync with the movement of my bowels. As my bowels moved more aggressively, so did the roots and vines. As my bowels slowed and calmed, so did the roots and vines. It was a constant speeding and slowing down of the branches. Other parts of the roots and vines covering my body were in sync with my heartbeat, pulsating with it. The third movement of the roots and branches I saw was that of my thoughts. Every thought that popped into my head manifested as a new root or vine springing into existence. The stream of consciousness was intense, and so were the movements of the plant appendages I was seeing, all in sync with my thoughts. When my thoughts slowed down, so did the flow of vines, when my thoughts became numerous, so did the vines. I saw both my thoughts, and the vines/roots/branches that represented each thought simultaneously. The vines and roots were the manifestations of my physical (bowels, heartbeat) and my nonphysical (thoughts, consciousness) all synced with different aspects of my mind and body. It felt like I had a symbiotic relationship with the vines and roots, kind of like what Venom’s suit is to Eddie Brock. It was like I had become a plant.
It soon began to feel like I was in between worlds. In between this reality and in between another. Not fully immersed in either. It was like I was experiencing both worlds at the same time. It seemed as if I was peering into another dimension. It was like I was in a lower vibration world where I saw this entity. It glimpsed into my world and we both made eye contact briefly. It had an expression on its face that appeared as though I should not have seen what I saw. It looked humanoid but still different enough to not be human. It was parasitic in some way in the sense that it was dependent on the life force energy of living things outside of its dimension.
After peering into that world I began to see life through the eyes of other people who were suffering. I saw life through the eyes of a woman with cancer unable to pay for her treatment and perpetual slave to the pharmaceutical industry. I looked out at the world through the eyes of an old Indian man who had to walk miles to bring back a jug of clean drinking water he was carrying on top of his head for his family to drink. I was a tree in the rain forest watching myself about to get cut down by a logger. I don’t know if any of these people were real but the pain and struggle of the world was manifesting to me as a first person experience of it.
After seeing this I began thinking about how I wanted to save the world from its destructive careless path, help people, enhance the human condition and I became frustrated as I became to be aware of some undoubtable obstacles I will encounter as I try to execute my plans. As I felt this, the branches/vines/roots instantly wrapped and contorted its shape into the figure of a woman. She began to rub my back and neutralize the negative feeling of my endeavour being futile. She tried to instill confidence in me.
As I was coming down from the trip I felt an over whelming sense of happiness. Maybe the Ayahuasca flooded my brain with whatever chemical does that, or I could have just caught a wave of super positive energy or something, but I felt extremely happy, not in the sense that I needed the Ayahuasca to be happy, but it was an extra boost of happiness. I felt like a billion bucks, I felt invincible, I felt like I could accomplish anything.
As I was trying to sleep for the rest of the night I heard and saw the silhouette of Bats flying over my face, coming within about 3 to 4 inches of my face. I could hear and feel the air from their flapping wings. It was hunting insects during the night. I felt like Bruce Wayne from the dark knight, the scene where the swarm of bats are flying over his head. I just laid there in bliss admiring the beautiful display of bat silhouettes at night until I fell asleep.
The next morning I walked out of the hut stumbling and unable to walk properly. I felt like a baby just learning to use its body. I was walking very stilted with a discontinuity in my step. After the first time I took Ayahuasca, I seemed to have a profound curiosity and awareness for the most insignificant things, from the blades of grass, to the pebbles by the river. Eventually I caught a glimpse of a chicken and became super curious and interested about what was going on it’s mind. Yes. The chicken’s mind. I stared at it for 5 minutes with a FUBAR look on my face, slightly hunched over like a Zombie. “Why are you so afraid of me Chicken?” I kept thinking. The chicken ran away, I slowly followed it and saw what appeared to be a Jaguar. I thought to myself “Oh Shit, a Jaguar?”. After looking at it from a distance and not seeing it move. I thought to myself “maybe it’s just a tree stump”. Still I continued to stare and notice no movement. So I approached it slowly, cautiously and soon realized it was just a tree stump. The wood and black dots made it appear to be a Jaguar from a distance. I also didn't have my glasses on from the distance I saw it. Add some FUBAR to that equation and you get a Jaguar hallucination.
The second time I took the Ayahuasca I had been left alone outside in the Amazon Jungle. Orlando walked me out there a few days prior and told me I need to stay out here by myself to absorb the energy of the jungle. I need to be in isolation, not coming in contact with people because they are not on the Dieta. A Dieta is the Ayahuasca diet which includes special vegetarian foods in addition to the Ayahuasca drink that is supposed to make your body more pure and allow the Ayahuasca to give you a positive experience. No sugar, no salt, no alcohol, no sex. He told me if you come in contact with people who have done this recently, their energy could mess up the equilibrium of your energy, and it’s not good for your Ayahuasca experience.
The second reason he wanted me alone in the Jungle with no books, phone, computer, or contact with the outside world is because all I would have out there is my mind, which would start the process of deep self reflection and introspection. For the first 5 minutes I was a little worried, what if I get bit by a poisonous spider or snake. What if a Jaguar comes, I soon realized there were no large animals here, and the jaguars go where the food is, so therefore no Jaguars, its just the smaller poisonous suckers out here that will mess you up. Orlando told me “Trust the Jungle”, and I took his word for it. The Ayahuasca had instilled more confidence (because I was still on cloud 9) about the situation so I was able to get over the fear in about 5 minutes.
So after a few days in the Jungle alone I took my second Ayahuasca drink. I didn't feel the effect until hours later. My stomach was turning once again, but I was not feeling or seeing anything. I became frustrated and soon felt that this Ayahuasca thing was all bullshit and my first experience was just a fluke, a hallucination. But just as I was about to give up on it, the Ayahuasca revealed itself. I slowly began to feel it. I began to see vines and roots slowly twirling and reaching down toward me from above. The colors of it were shifting, changing, and pulsating. It felt like I was in the mind of the Jungle. I was surrounded by clusters of brain cells. Only difference is that the clusters were made out of plant matter. The brain cells were connected to each other by branches and vines and roots.
It was communicating with me through an exchange of energy. We were both different entities, built, programmed, and evolved very differently. This created a communication barrier which is why our physical manifestations, our DNA, our bodies, was stripped away leaving only behind raw conscious energy between the 2 of us. That was how we would communicate. The same way an Apple Computer, and a PC are built and coded differently, they both fundamentally share the basic machine language of 1’s and 0’s. They are just manifested differently through different programming languages. It was like me and the Jungle were talking in 1’s and 0’s, the basic energy based communication of the universe. Our energies were interacting in a very raw form without the barrier of our DNA (programming) and physical bodies (hardware) getting in the way. No words, just energy and feeling. In this third dimension if you go out to a Forrest and try to talk to it, obviously it would not converse with you because it doesn't have the ability to talk and hear you. But if your energy and its energy interact with you, it’s a different story, a different communication form.
I kept feeling an energy force spiraling upward all around me. Every time I tried to quantify it, understand it better, the energy immediately solidified into a thick branch feeling as heavy as a large rock. When it did this it would drive my hands back to where they came from, turning the upward motion into a downward motion, as if I wasn’t supposed to touch it.
I asked the Jungle about a situation that was bothering me. 2 of my family members had been fighting on and off for as long as I can remember. They constantly don’t get along. I asked the Jungle why it is like this between them. I saw the jungle search every inch of its brain cell cluster, seeing different brain cell clusters light up here and there with bright neon green and neon blue. It could not give me a specific solid answer. All it could show me was this negative energy between them. It coughed up a black negative energy with a white outline and rings of neon green spiraling out from the center. As it spit this energy out at me, I began to feel it. Once I felt it I began feeling the stomach pains more intensely, it made me feel nauseous.
The second question I asked the Jungle was, “is there life throughout the universe?” It showed me an Alien race that has been keeping an eye on earth like scientist watching bacteria in a Petri dish. They were waiting to see if we evolve to the point where it would be proper to engage with us. They generally care for our evolution but feel we are not mature enough to interact with them.
Then the jungle showed me entities that are leaching off of the life force energy of earth. The energy I felt for these negative entities made me feel sick in my stomach again, the feeling of nausea and wanting to vomit came back.
I asked it who I was in a past life. Again, no specific answer but I felt the energy and presence of various people, every race, different creeds, and socioeconomic statuses was present. The jungle emphasized to me that people should not be discriminating one and other because they are likely discriminating something that they once were in another lifetime.
I asked it how I can be successful with a big project I had been working on for some time. It did not show me anything new but rather reassured me that a course of action I had previously planned, but doubted and hesitated to execute, is the correct path and I should therefore continue with that plan in order to see my success come to fruition. After this I had begun to come down from the trip.
The second Ayahuasca experience was very exhausting. It felt like an excessive amount of energy was zipping through my body. It was like plugging a toaster into a nuclear power plant generator. I was the toaster, the Jungle was the power plant. Its energy was just too much for my body to handle. After the experience I felt like a rape victim who had been left for dead on the side of the road. My bottom lip could not stay fully closed for some reason, therefore saliva (The Ayahuasca made me salivate a lot) had been seeping out of it all night. I didn’t have the energy nor did I care to wipe my mouth (because my mind was still overwhelmed and fixated on my visions). My head was just lying on my pillow completely awe struck. I fell asleep and woke up with half my face covered in my own warm swampy saliva. Much of the pillow was soaked. I picked up a face cloth and wiped my face, rested my head back on my pillow as I listened peacefully to the sounds of birds chirping, and poison dart frogs croaking.
I contemplated asking Orlando not to give me my third and final dose of Ayahuasca. The energy and the stomach pains were too powerful. I thought he might get offended if I ask him not to give me another; I was ready to quit, pull the plug and withdraw like a coward. But I put things in perspective, to come all this way here and not fully embrace and experience what I set out to do, thats a waste of time, so I remained.
Was I talking to the Jungle? It felt like it. Or maybe I was communicating directly with Source, the infinite energy of the universe and it was manifesting itself as the Jungle or using the Jungle as a medium to connect with me, who knows, we don’t know what we don’t know. This experience showed me that you can communicate with anything that has life force energy. Even if it does not possess a sentient consciousness, your energies can still interact in a non physical way. Communication and information can be exchanged beyond the 5 senses, through raw emotion, raw energy. The energy of the jungle was rushing into my pineal gland.
My third experience was a little more far out there and personal, and to tell you the truth, I’m still trying to make sense of it so I’m just gonna keep that to myself. Over all I’m grateful and happy for my experience and I’d do it again. If you are curious about taking Ayahuasca, and are prepared to ruff it out in the Jungle, I encourage you to get in touch with Orlando (don’t judge his website, he doesn’t care for his internet presence, but he is legit). Also, check out my other article on Natural Psychedelics here.
This experience was not a worship of the Jungle for those of you of the religious persuasion. And some of you more skeptical minded individuals may think this was all a hallucination, which is a reasonable conclusion. It is difficult to convince someone of what you saw unless they take the journey themselves, especially in this evidence based world. But at least take this into consideration.
Physicists are just beginning to explore the possibility of us living in a somewhat holographic universe. “Energy fields are decoded by our brains into a 3D picture, to give the illusion of a physical world. Despite its apparent materiality, the universe is a kind of 3-D projection and is ultimately no more real than a hologram. Our brains mathematically construct objective reality by interpreting frequencies that are ultimately from another dimension, a deeper order of existence that is beyond both space and time”
We don’t exactly SEE the universe because what we see is the quantum information that the brain interprets as electrical signals giving the experience of physical matter. I’m no scientist but it could be that the DMT in the Ayahuasca makes your Pineal gland more sensitive to the frequencies of other dimensions, higher or lower vibrational realities. You could exist in infinite realities, there could be a version of yourself that is perfectly enlightened, and a version of yourself that is completely negative. Thus the higher self and the lower self may manifest from these different realities. The Ayahuasca could have your higher self connecting with you and guiding you, or some other higher reality entity, or Source itself. Who knows, it’s hard to make sense of it all by yourself, but to say that this is all a hallucination, you have to prove that. Just as there is not enough concrete scientific results to prove that these experiences are real, on the flip side, there also isn’t enough evidence to say it’s all bullshit. It would be more accurate to say that this is an unknown, rather than writing it off as a hallucination…….. I’m just sayin. As for me, I honestly sincerely feel I spoke to the Jungle. |
At the heart of the project is a unique “self-anchored suspension span” — twin roadways linked to a soaring, 500-foot tower by a single, mile-long cable.
A little over a year before the bridge’s scheduled opening, the bridge is already a conversation piece, though not for the reasons planners had hoped.
Instead of marveling at the design, what many are talking about is the fact that the suspension portion of the bridge was made in China.
Critics say the decision to outsource the span — the central tower and the two 1,500 foot steel road decks were fabricated in a specially-built factory in China and shipped to San Francisco Bay — was a missed opportunity to create thousands of American manufacturing jobs.
California officials contend the U.S. does not have the manufacturing capacity or the workforce to build such a project on its own.
Penny Wise, Tons Foolish
CNBC's Scott Cohn reports on an ambitious American public works projects, largely made in China that resulted in a missed opportunity to create thousands of American jobs.
A CNBC Investigations Inc. review of the process has found miscommunication, misconceptions and missteps that have, at the very least, tainted what planners had hoped would be an architectural and engineering triumph.
“The Bay Bridge: 100% foreign steel,” proclaim billboards along the freeways approaching the bridge (to be accurate, the suspension span of the bridge is only about 80 percent foreign steel according to the California Department of Transportation — CalTrans — and the entire eastern span, from Yerba Buena Island to Oakland, is about 20 percent foreign).
The Alliance for American Manufacturing, which sponsored the billboard campaign, says whatever the actual content, the decision to use Chinese steel was scandalous.
“What is it about American regulations, American taxation, American labor cost and attitudes that makes it cheaper to go to China,” asked former House Speaker Newt Gingrich when asked about the bridge at a CNBC Republican Presidential Debate in November.
“It is good for America to have free trade,” said former Massachusetts Governor Mitt Romney—now the presumptive GOP nominee—at the debate. “But China is playing by different rules.”
CalTrans Bay Bridge Program Manager Anthony Anziano told CNBC in an interview that the state had no choice but to go overseas.
“The largest companies in this country just simply didn’t have the capacity to be able to do that work in the time that we required,” he said.
That point remains a subject of bitter debate. And with the project now near completion, it is not clear the decision to outsource the span yielded anything close to the savings officials had hoped for.
Now budgeted at more than $1.75 billion for the suspension span alone, the section has encountered nearly $300 million in overruns. And while officials recently moved up the projected opening of the bridge to Labor Day 2013, it is still as much as a year behind the schedule that was planned when the contract was awarded.
In the end, the time and budget is nearly identical to the single bid the state received to build the bridge with American steel: a five-year, $1.8 billion proposal by a joint venture of American Bridge Company and Fluor Corporation that the state rejected in 2004.
There is no way of knowing what overruns that proposal would have encountered, and it, too, contemplated buying some of the steel from overseas. But independent steel industry analyst Michelle Applebaum says American firms have a better track record than the Chinese when it comes to bringing in large projects without major overruns.
“Just looking at dollars and sense, there was a much better argument for this to be done domestically,” says Applebaum, who describes herself as an ardent free-trader.
Was China the cheaper option?
And she says any cost advantage the Chinese might have had would easily have been made up by the benefits to the U.S. economy. She believes officials in California fell victim to a mindset that says China is automatically cheaper.
Bloomberg | Getty Images
San Francisco-Oakland Bay Bridge
“We shot ourselves in the foot,” Applebaum said. “We never even took seriously the domestic bid.”
Not so, says Anziano. But with only one domestic bid, which came in at more than double the CalTrans engineers’ estimate, the state had a duty to look elsewhere.
Opening the project to foreign competition was not a simple matter. It required some fancy legislative footwork that still angers some U.S. manufacturers, who saw the Bay Bridge as a unique opportunity to revitalize American manufacturing just as the nation was heading into a recession.
Early on, some in California saw the Bay Bridge project — necessitated when the existing bridge was damaged in the 1989 Loma Prieta earthquake — as a potential job creator.
Flush with wealth from the dot-com bubble, the state and Bay Area leaders mandated the new bridge be “iconic” in its design. The costs — and potential benefits to the winning bidders —ballooned.
After lobbying from labor and industry groups, then-governor Gray Davis won federal funding for the bridge. That meant the project was covered by a 1982 “Buy America” law requiring the state to give preference to American contractors.
But then the 2004 bid came in, just months after the new governor, Arnold Schwarzenegger, took office. Hit by sticker shock, the Schwarzenegger administration decided to regroup.
“One of the things that stuck out was the Buy America component,” Anziano said. “That was restricting, and we heard this loud and clear from the construction community.”
So the administration reconfigured the funding formula for the 16 separate contracts that made up the Bay Bridge project. While most of the contracts would continue to receive federal funds and be subject to the Buy America requirement, the self-anchored suspension span — the signature segment of the project and by far the most lucrative — would be paid for with state and local funds, exempting it from the requirement.
Last month, the U.S. House of Representatives passed a bill that would ban such a maneuver in the future. It faces an uncertain future in the Senate. Regardless, it comes years too late for some who had hoped to win the Bay Bridge project, until the state changed the rules.
“We thought it was gamesmanship, that it was a way of getting around the system,” says Thomas Hickman, a vice president at Oregon Iron Works outside Portland.
His firm was part of a consortium, Bay Bridge Fabricators, that had been preparing a bid for the project. The proposal included a new, state-of-the-art fabrication plant to be built at the port of Vancouver, WA. Hickman says the factory would have been a huge boost to U.S. manufacturing capacity, allowing American firms to compete for even bigger projects around the world.
CNBC Investigations Inc.
“The impact on the economy throughout this country would have been tremendous,” he said.
But when state officials announced in 2005 that the suspension span would no longer be subject to the Buy America requirement, the plan died.
“At that point, we all looked at each other and said it's really time to go home,” said Hickman, “Because they're determined to go to China, or Korea, or somewhere other than the U.S. for this bridge.”
“That was not part of the thinking — let’s just send it overseas,” said Anziano. “It was the reality of the market.”
Nonetheless, Schwarzenegger and his administration began actively courting foreign bidders. In 2005, Schwarzenegger traveled to China on a trade mission. During the visit, state transportation secretary Sunne Wright McPeak ceremonially presented officials with a set of CDs including bidding specifications for the Bay Bridge project.
From the state’s standpoint, the strategy worked as planned — increasing competition. When the project was rebid in 2006, the American Bridge-Fluor joint venture won out. Unencumbered by the Buy America law this time, the group bid $1.43 billion, nearly $400 million below its 2004 bid. After winning the contract, the group promptly subcontracted the steel fabrication to ZPMC, a Shanghai-based firm whose primary expertise is building cranes.
“I don't believe they ever really took a fair look at what was available here in the United States before they made the decision to effectively abandon the U.S. as a supplier of the structural steel for the bridge,” Hickman said. “I don't mean that to sound harsh, but at the same time, that's really exactly what they did.”
Chinese Steel & the SF Bay Bridge
A U.S. consortium had big hiring plans for the Bay Bridge project, until it says California changed the rules. CNBC's Scott Cohn reports.
His firm did win a contract to build some components of the Bay Bridge, but he says it is nothing compared to the contract for the suspension span.
State officials say the bidding results proved the U.S. did not have the capacity to build the bridge on time and at a reasonable cost, and they could not rely on a hypothetical U.S. factory to build such a vital span. But it is not clear China had the capacity either.
Soon after winning the contract, ZPMC built its own new factory in China, just as Hickman’s consortium had planned to do in the U.S. And more than 200 American experts and engineers traveled to China to help supervise the project.
“Building a new facility, which they had to do, training their people, which they had to do, all of those were an investment in China that in my mind should've been done here,” Hickman said.
“It's not quite that simple,” said Anziano, who says it is unfair to blame CalTrans for the work going to China. “You have to keep in mind, first of all, that the capacity situation that we have in this country is something that has evolved over decades. You can't fix it overnight. You really can't fix it on the back of one single project.”
Besides, the Chinese managed to build their plant in just eleven months, American Bridge’s then-CEO Robert Luffy told a Congressional committee in 2007.
“Believe me, they have the capacity,” Luffy testified. “It is beyond your comprehension if you haven’t been there.”
But he acknowledged that had the state approved the venture’s initial bid in 2004, it would have added the capacity in the U.S.
“A lot of additional capacity,” he said.
Today, one more major Bay Bridge contract has yet to be awarded: a five-year, quarter billion dollar project to tear down the existing bridge. Among the rumored bidders: a firm from China. |
Themes on this blog
Tag: healthcare
Not long after my 30th birthday early this year, I had what might be called a commonly American experience. I noticed I had suddenly gained a bunch weight — going from weighing something like 190 lbs, where I had been for years, to 220 in what felt like just a couple months. I also just felt worse.
That puzzled me — my diet hadn’t changed much, I was still (somewhat?) active, with basketball and bicycle commuting and frequent walks. What went wrong? I had been a skinny kid my entire life: why would I gain weight? …This wasn’t entirely because I turned 30, right? (Oh my were my friends amused by this).
It took me more than two months to figure out the pretty straightforward answer and the rest of this year to do something about it.
With just eight full-time team members (excluding, of course, our part-time independent contractors), I am solely responsible for managing our healthcare coverage plan, and while I tried to prepare for what the change might be, I wasn’t ready for our costs to more than double, and, for some plans, almost triple. Here’s what I learned and what we did.
With graciously offered hosting space from my Philadelphia partner in media obsession Sean Blanda, a WordPress template and a few hours of my tinkering and Matt’s first couple weeks writing, I present MyPICCLine.com, his personal journey through the healthcare industry.
With graciously offered hosting space from my Philadelphia partner in media obsession Sean Blanda, a WordPress template and a few hours of my tinkering and Matt’s first couple weeks writing, I present MyPICCLine.com, his personal journey through the healthcare industry. |
Bill Clinton Visits San Diego Food Bank
Audio
Aired 4/4/11
Former President Bill Clinton greeted hundreds of hungry people at the San Diego Food Bank on Sunday morning.
SAN DIEGO Cheers from nearly a thousand colleges students, veteran families and celebrities welcomed former President Bill Clinton to a make-shift stage inside the San Diego Food Bank's giant warehouse in Miramar.
Clinton gave a rousing, brief speech about what it means to volunteer and serve others.
“You either think your differences are all that matters, or you think our common humanity is more important, and you look for ways to lift yourselves up by lifting others up,” Clinton said.
He also asked the young crowd to answer the following question: “Whether what we have in common is more important than our interesting differences?”
Clinton answered the question himself—saying the focus on our commonality is our only hope for the future.
The “Day of Service” as he called it, is part of the “Clinton Global Initiative University” program. Its goal is to connect youth around the world to create change in practical ways.
Agnes Igoye is from Uganda. She was one of the 800 college students from near and far away, who handed out boxes of food to hundreds of local families.
“It’s exciting to serve the families here and to see so many young people with so much energy and willingness to give back,” Igoye said with a big smile.
Clinton also announced the food bank had been renamed the “Jacobs and Cushman San Diego Food Bank” after both families paid off the food bank’s $2 million mortgage.
“Their gift will make it possible to serve about 56,000 more meals a month,” said Chris Carter, San Diego Food Bank president. |
Should UK TOCs be required to have AdBlue Systems installed?
Yes
No
Shipping is outside the Paris Agreement. There has been some progress but not enough. The article in the FT today said that there is no dry dock capacity to install scrubbing technology on shipping until 2020 and there is apparently a loophole where they can dump the scrubbed suplhur into the sea. That is like fitting scrubbing to trains and letting them lob the suplhur into the river Ouse as they approach York.
Cruise ships are the one that really get me. I was in Cozumel in Mexico last year and 4 massive cruise ships turned on their engines at the same time. That is a beautiful island of 100,000 suddenly having the same pollution as a city with 4 million cars moving at the same time. Nuts and totally unnecessary.
Click to expand...
There is a lot of anger at the proposed cruise ship terminal at Greenwich for similar reasons.
New licensing requirements from 1 January 2018
Since 1 January 2018, taxis presented for licensing for the first time have needed to be ZEC. This means having CO2 emissions of no more than 50g/km and a minimum 30 mile zero emission range
First-time taxi vehicle licences are no longer granted to diesel taxis. ZEC taxis with petrol engines need to meet the latest emissions standard (currently Euro 6)
Yeah but cruise ships are awesome. If they wanted to build one of those terminals outside my house (if i lived in water) i would be outside literally welcoming them onto site to make them build it faster.
Yeah but cruise ships are awesome. If they wanted to build one of those terminals outside my house (if i lived in water) i would be outside literally welcoming them onto site to make them build it faster.
Click to expand...
Why ? They are a special group of tourists who usually spend nothing in the local economy save for the local tourist attraction gift shop because they have spending money on the ship as part of the package and the coaches carrying them add to congestion and pollution on our road network. That's ignoring the environmental impact of the ship itself. Please note this is a not a argument against tourism in general- it's more to do with the whole idea of the cruise ship, it all seems too sheltered and removed from reality and the environmental impact is too much to be acceptable and must be dealt with.
Why ? They are a special group of tourists who usually spend nothing in the local economy save for the local tourist attraction gift shop because they have spending money on the ship as part of the package...
Click to expand...
I spent nothing on board when I was on a cruise.
I spent lots in the local economy at the places I visited.
The people I went with were the same.
Anyone who spends money on the cruise ship is an idiot. I mean, £7-£10 for a 330ml bottle of coke? £3.50 for a small tub of pringles? Yeah, okay!
I spent nothing on board when I was on a cruise.
I spent lots in the local economy at the places I visited.
The people I went with were the same.
Anyone who spends money on the cruise ship is an idiot. I mean, £7-£10 for a 330ml bottle of coke? £3.50 for a small tub of pringles? Yeah, okay!
Click to expand...
The only time I went on cruise was down the Yantze and several rail engineers had just finished a new build high speed project and were off on a good holiday. They ordered pallets of beer for delivery to the dockside for departure and only the non beer drinking passengers bought anything on board during the entire trip!
A lot of cruises are of little benefit to the local economy, for the environmental damage they cause, especially if they are half board, i.e. the passengers leave after breakfast and return by 6pm for dinner
Why ? They are a special group of tourists who usually spend nothing in the local economy save for the local tourist attraction gift shop because they have spending money on the ship as part of the package and the coaches carrying them add to congestion and pollution on our road network. That's ignoring the environmental impact of the ship itself. Please note this is a not a argument against tourism in general- it's more to do with the whole idea of the cruise ship, it all seems too sheltered and removed from reality and the environmental impact is too much to be acceptable and must be dealt with.
Click to expand...
It’s not the cruise part that I like. It’s the ship part. I like all ships not just cruise ships.
I think they're more like EVs with a range extending engine. A bit of semantics I suppose but they have a decent electric-only range and are intended to drive as EVs until the battery runs down whereas PHEVs have a shorter electric range and frequently start the engine. Also, PHEVs usually drive the wheels mechanically when the engine cuts in while a taxi is always powered electrically - the engine runs an alternator just like a diesel electric rail vehicle.
Click to expand...
The important point is can they be charged up at home or when a cabbie is on a break?
The only time I went on cruise was down the Yantze and several rail engineers had just finished a new build high speed project and were off on a good holiday. They ordered pallets of beer for delivery to the dockside for departure and only the non beer drinking passengers bought anything on board during the entire trip!
Click to expand...
So you had a pallet of beer kegs on a boat trip up the Yangtze and you didn't eat or drink anything else? Beer's never a good idea on a boat
I spent nothing on board when I was on a cruise.
I spent lots in the local economy at the places I visited.
The people I went with were the same.
Anyone who spends money on the cruise ship is an idiot. I mean, £7-£10 for a 330ml bottle of coke? £3.50 for a small tub of pringles? Yeah, okay!
Click to expand...
Well, there are clearly a lot of idiots around,since a lot of people on the cruise shop programmes spend huge amounts of money onboard!
It’s not the cruise part that I like. It’s the ship part. I like all ships not just cruise ships.
Click to expand...
I agree with this. I inherited the gene that caused my Nana to call the police to find my Mum when she was little and disappeared in Liverpool, only to find her trying to get on a ship to Canada 'because I was always taken with how white the Canadian ones were. They just looked so magical'.
That's why I was so horrified when I discovered their emissions profile. The engineering of many ships themselves - awesome. The fuel choice for powering them - immoral. The number of ugly big container ships required for ugly big amounts of unnecessary tat that ends up in landfill or the oceans - immoral.
As for cruise ships, I had a tiny bit of involvement in the Liverpool cruise ship terminal. Cities like Liverpool clearly want it, other cities like Venice are starting to hate it. I sort of think it is up to cruise ships calls to decide for themselves. However, the ships absolutely must change their emissions profile (ship to shore power, electric out of port, LNG at least out of port with scrubbing (but no dumping) or they need to go.
As for those who think they don't spend anything on board, what do you think your ticket price covers???
Food was already paid for but not beer /wine (the Ozzie engineers were a bit concerned about running out too!). Pallets of 24 pack cans much easier to handle logistically than kegs!
Click to expand...
Still, a 24 pack of beer isn't that great a contribution to the local economy and people who have to put up with the pollution the cruise ship produces. As you mentioned, the food was already paid for.
The scrubber retrofit programme that would really make a dint would be shipping. Unbelievable emissions profile.
Click to expand...
Cruises are less of an issue, more freight. I listened to an interesting slot on From Our Home Correspondent podcast (BBC radio 4) yesterday which explained about trials of returning to shipping by sail. For things like containers where throughput is more important than speed (i.e. as long as you keep feeding it "in" often enough, after the initial "priming of the pump" you receive sufficient goods at the timings required) this really does merit consideration.
And of course assumes the cab driver has a house to charge it up. Useless if they live in a flat.
Click to expand...
Legal requirements for freeholders to arrange charging points to be installed at all allocated parking places (paid for via the service charge) might be a start. On-road parking is harder to do but they could still be installed.
So you are OK, tough on the neighbours then, especially those unreasonable enough to suffer from asthma.
Click to expand...
Far greater issues are cause by the sheer number of BBQ restaurants in some urban areas. Some have their noxious vents attached to Network Rail structures and chuck putrid smoke, animal fat and grease onto the line and into the drivers cab when held at signals. Why local authorities who claim to care about the environment continue to licence them is beyond me.
So you are OK, tough on the neighbours then, especially those unreasonable enough to suffer from asthma.
Click to expand...
Quite.
The Government already plans some quite strong restrictions on them. If those are inadequate, we will need to ban them in urban areas. That would be sad, but it would be preferable to the return of the smog and serious health problems, as well as ugly, black, smoke-stained buildings like they were until as recent as the 1990s.
4 of them will stink more than four of your typical old terraced house in the 50s which normally had only one coal (rather than wood) fire in the lounge and you simply wore clothes elsewhere in the home.
If you live on a farm, fine, but there is really no place for these used on a daily basis in any town or city, and even less place for several of them. If you must burn wood (and it is a renewable resource), fit a proper biomass boiler with a scrubber. |
The Ireland team that faced England in Cagliari on June 11th 1990
It is now closing in on 24 years since that famous day in Cagliari when Ireland and England played out a 1-1 draw.
It couldn’t have been scripted any better. After qualifying for the World Cup Finals for the first time, it was the perfect opening game, pitted against neighbours England in what would be one of the tightest of groups.
35,238 spectators were at the Stadio Sant’ Elia to watch the game unfold while the country came to a standstill to see how ‘Jackie Charlton’s Army’ would fare out against the old enemy.
A draw was the outcome, as were five of the six games in the group and here is what became of the men from that famous day in Italy.
Packie Bonner
Bonner would etch his place into Irish folklore with that never-to-be-forgotten penalty save from Daniel Timofte in the second-round penalty shoot-out.
The Donegal man retired from international football in 1996 with 80 caps and after working as a technical director for the FAI for a number of years, now can be found working as a pundit.
Chris Morris
The full-back was the only Irish player to get booked on the night. In a six-year international career Morris earned 35 caps for Ireland and retired from football in 1997 at Middlesbrough.
Post-retirment, Morris went back to Cornwall to work for the family business of Morris Cornish Pasties. And also a coach for the local college football team.
Mick McCarthy
‘Captain Fantastic’ was the leader of the team, before calling time on his playing days two years later. Led Ireland to the World Cup in 2002 and is currently the manager of Ipswich Town having taken over the reins in 2012.
Kevin Moran
Moran formed an impressive partnership with McCarthy at the hear of the defence and joined Blackburn Rovers that summer after two years with Sporting Gijon. Named in the 1994 squad but never played because of injury, he retired from the game that year with 71 caps.
Following retirement, Moran formed a football agency Proactive Sports Management with Paul Stretford and Jesper Olsen and also works as a pundit.
Steve Staunton
The only player to have played in all 13 of Ireland’s World Cup games of 1990, 1994 and 2002, announcing his retirement following the penalty-defeat to Spain in South Korea.
After Brian Kerr left as Ireland manager in 2006, Staunton was surprisingly chosen as his successor, with Bobby Robson supporting him as an international consultant.
A win over Sweden was as good as it got, with just six wins in 17 games and a last-gasp victory over San Marino, he was dismissed in October 2007.
A managerial stint at Darlington was unsuccessful and was let go as Sunderland scout when Paolo Di Canio rung the changes at the club last summer.
Ray Houghton
Scorer of some of Ireland’s most memorable goals (winners against England in Euro 88 and Italy in USA 94), Houghton was a key cog in the hard-working Irish midfield.
Expand Close Ray Houghton Bob Thomas/Getty Images / Facebook
Twitter
Email
Whatsapp Ray Houghton
The Scottish-born midfielder retired following the World Cup 98 play-off defeat to Belgium with 73 caps for the Boys in Green. Used by a number of media outlets as a pundit.
Paul McGrath
A fans favourite and one of the finest players to ever pull on an Irish jersey.
Anchored the midfield in Italia 90 and starred at the heart of the defence four years later in the US, with his performance against Italy in particular regarded as one of the best of all-time.
Has struggled with alcohol issues, particularly post-retirement. Involved with charity and fund-raising activities
Andy Townsend
Maidstone-born Townsend made his international bow in 1989 and would captain Ireland in USA 94, retiring three years later with 70 caps.
Central to the Charlton "put ‘em under pressure" game plan, the central midfielder played for Southampton, Norwich, Chelsea, Aston Villa, Middlesbrough and finally West Brom.
Now a leading pundit with ITV Sport.
Kevin Sheedy
Sheedy’s strike was not only another World Cup first, but a timely strike, with a little over fifteen minutes remaining and Ireland trailing to a Gary Lineker goal. Sheedy played for Ireland for nine years, earning 46 caps.
Expand Close Kevin Sheedy Bob Thomas/Getty Images / Facebook
Twitter
Email
Whatsapp Kevin Sheedy
After 314 appearances for Everton, Sheedy rejoined the club as an Academy coach in 2006. In August 2012 it was revealed the World Cup hero had bowel cancer, with a history of the disease in the family.
John Aldridge
Aldridge scored 19 goals in his 10 years for Ireland, often performing a role very much different from what he was accustomed to for his respective clubs. The striker started and was substituted in all five games and had a goal disallowed against Holland.
Aldridge manager Tranmere for five years, leading the club to successive FA Cup quarter-finals before resigning in 2001 and is now a football pundit and a regular contributor to LFC TV.
Tony Cascarino
Like his strike partner on the night, Cascarino too hit 19 goals in an Irish career that spanned 14 years and ending in the volatile Euro 2000 play-off defeat to Turkey. Following retirement he became a semi-professional poker player and is a regular pundit for TalkSport, Today FM, Sky Sports and writes a weekly newspaper column.
USED SUBS
Alan McLoughlin
Best known for the goal that clinched qualification for USA 94 with an equalising goal in Windsor Park, McLoughlin made his debut in 1990 and was chosen in Charlton’s World Cup squad.
Expand Close Alan McLoughlin celebrates in Windsor Park in 1993 Bob Thomas/Getty Images / Facebook
Twitter
Email
Whatsapp Alan McLoughlin celebrates in Windsor Park in 1993
The only Irish sub on the night, he retired in 1999 with 42 caps and just one other goals than the wonder strike against Northern Ireland.
A BBC Solent match-day co-commentator for Portsmouth games, McLoughlin joined the Pompey coaching set-up in three years ago.
UNUSED SUBS
David O’Leary
Would score the all-important penalty against Romania in the second-round shoot-out, but was regularly overlooked by Charlton.
Managed Leeds to the Champions League before the club went into meltdown, with subsequent stints at Aston Villa and Al Ahli in the United Arab Emirates.
He is an occasional TV pundit for Al Jazeera’s Premier League coverage and has also done some pundit work for BT Sport’s Premier League coverage.
Chris Hughton
The son of an Irish mother and a Ghanaian father, Hughton became the first mixed-race player to play for Ireland when he made his debut in 1979, winning 53 caps before his retirement in 1991.
After 10 years as a Tottenham assistant, Hughton has had spells in charge of Newcastle United, Birmingham City and most recently Norwich City. Has been linked to the vacancy at West Bromwich Albion.
Niall Quinn
Until Robbie Keane’s exploits, Quinn was Ireland’s all-time highest goal scorer and found the net against Holland in the group stages, Ireland’s only other goal from play in Italy.
Expand Close Niall Quinn Getty Images / Facebook
Twitter
Email
Whatsapp Niall Quinn
A former manager and chairman of Sunderland, Quinn has a number of business ventures, including the broadband supplier Q-Sat and Niall Quinn Media Services. A regular pundit on Sky Sports.
Gerry Peyton
Packie Bonner’s understudy won 33 caps between 1977 and 1992.
Peyton had a long career as a goalkeeper for several clubs in the English divisions, most notably Bournemouth and Fulham and worked as a goalkeeping coach in Japan and Sweden before taking up a similar role at Arsenal in 2003 where he remains today.
Online Editors |
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* ***** BEGIN LICENSE BLOCK *****
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
*
* The contents of this file are subject to the Mozilla Public License Version
* 1.1 (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
* http://www.mozilla.org/MPL/
*
* Software distributed under the License is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
* for the specific language governing rights and limitations under the
* License.
*
* The Original Code is Mozilla Communicator client code, released
* March 31, 1998.
*
* The Initial Developer of the Original Code is
* Netscape Communications Corporation.
* Portions created by the Initial Developer are Copyright (C) 1998
* the Initial Developer. All Rights Reserved.
*
* Contributor(s):
*
* Alternatively, the contents of this file may be used under the terms of
* either the GNU General Public License Version 2 or later (the "GPL"), or
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
* in which case the provisions of the GPL or the LGPL are applicable instead
* of those above. If you wish to allow use of your version of this file only
* under the terms of either the GPL or the LGPL, and not to allow others to
* use your version of this file under the terms of the MPL, indicate your
* decision by deleting the provisions above and replace them with the notice
* and other provisions required by the GPL or the LGPL. If you do not delete
* the provisions above, a recipient may use your version of this file under
* the terms of any one of the MPL, the GPL or the LGPL.
*
* ***** END LICENSE BLOCK ***** */
/**
File Name: 7.5-9-n.js
ECMA Section: 7.5 Identifiers
Description: Identifiers are of unlimited length
- can contain letters, a decimal digit, _, or $
- the first character cannot be a decimal digit
- identifiers are case sensitive
Author: christine@netscape.com
Date: 11 september 1997
*/
var SECTION = "7.5-9-n";
var VERSION = "ECMA_1";
startTest();
var TITLE = "Identifiers";
writeHeaderToLog( SECTION + " "+ TITLE);
DESCRIPTION = "var 123=\"hi\"";
EXPECTED = "error";
new TestCase( SECTION, "var 123=\"hi\"", "error", eval("var 123 = \"hi\";array[item] = 123;") );
test();
|
Double: Kerem Bulut celebrates with Wanderers' fans after his second goal. Credit:Getty Images The atmosphere in the stadium was typically tense, with a sell-out crowd riding each dramatic goal in one the most thrilling games of the season. However, the fan in question appeared to let his emotions get the better of him, apprehending Calver as the 19-year old – who was dropped from the squad for this match – was making his way from the players' corporate box to the dressing room to celebrate with his teammates. Witnesses told Fairfax Media that Calver was asked by the offender whether he was friends with Sydney FC goalkeeper Vedran Janjetovic, at which point the fan said he wanted to "break his [Janjetovic's] legs" and then struck Calver with an open palm. The corporate area of Pirtek Stadium was well-staffed and it is believed the man was swiftly apprehended by security. NSW Police and Football Federation Australia are looking into the incident. It is not known whether the young defender will move to press charges but it is likely the FFA will act to ban the unruly fan. The governing body has handed out numerous five-year bans to several fans across Australia who have been involved in anti-social behaviour.
"It goes without saying that we think that all members of our playing squad should be able to come to any match, watch the game and not be in danger," Sydney FC chief executive Tony Pignata said. "It's quite distressing for Aaron, a young player, who only just turned 19, to be confronted like that. Thankfully security were on the spot quickly and the guy has been apprehended. "Aaron was visibly shaken by the event, as you would be. He wasn't hurt and he will be fine, but you certainly don't expect that – a slap across the face – to happen." When asked if there was more that could be done to protect players, Pignata said they had the right to expect they would have been safe in that particular area. "They were in the coaches' box, which you'd assume to be a fairly safe area [at the back of the grandstand]," he said. "I'll speak to John Tsatsimas [Wanderers chief executive] about it, he's obviously quite upset at seeing this happen as well. Next time we play here we might need to have player security at all times.
"That said, we're fairly sure it will be a one-off event. It's just a shame that it put such a dampener on what was otherwise a great night for Sydney FC and a wonderful showcase for the A-League. We'll just make sure next time that there's proper measures in place." Tsatsimas said he was waiting to get further details before the club decides on what action to take on the rogue fan. "We're certainly aware of the incident and I made sure to speak with Tony and the player involved as soon as I found out about the incident on Saturday night," he said. "We'll just wait for the police reports to come in with all the facts before we can take any further action." Football Federation Australia issued a statement to Fairfax Media indicating it expected an outcome on the matter in the coming days. "FFA is aware of an incident in which a Sydney FC player was involved in an altercation with a patron in a corporate area at Pirtek Stadium," an FFA spokesperson said. "FFA's security team are liaising with the home club Western Sydney Wanderers, Sydney FC and NSW Police. A report on the matter is expected to be finalised in the next few days." |
Life threw Stan Belinda a wicked change-up. It caught him off-stride,
disrupted his rhythm, set him back on his heels. The numbness and tingling
that started in his legs during the summer of 1998, when he was pitching
for the Cincinnati Reds, initially eluded diagnosis. Nonspecific inflammation
of the spinal cord, doctors thought. That pitch was wide.
In September, Belinda was told he has multiple sclerosis, an incurable,
chronic, sometimes disabling disease of the central nervous system.
Belinda, who was traded to the Colorado Rockies in the October deal
that sent Dante Bichette to the Reds, has relapse-remitting MS, the most
common form. He plans to take the mound at Coors Field, a House on Haunted
Hill for pitchers under the best of conditions.
A combination of daily injections of the drug Copaxen and changes in
his diet and lifestyle have left him symptom-free most of the time.
"I don't get anything like I had when I was first diagnosed, and I haven't
had anything for a long time," he said.
He eats little red meat -- a tough choice for a guy who raises beef
on his 770-acre farm in Alexandria, Pa. -- has cut back on milk, fried
food and saturated fat. He's even more attentive than before to his physical
conditioning and getting sufficient rest.
"If I need a couple hours of sleep, I take it," he said. "I conserve
my energy for when I really need it. Exercise comes into it in a big way.
That way your body works its best. It helps that I'm an athlete."
The progression of MS is frustratingly unpredictable. Most of the more
than 300,000 Americans -- about 5,100 in Colorado -- afflicted with the
disease can live a normal lifestyle, although some, including celebrities
Richard Pryor and Annette Funicello, develop severe disabilities including
leg paralysis and loss of vision.
Belinda's definition of a normal life is to stand 60 feet, 6 inches
from the best hitters in the game and try to get them out. After returning
to the Reds' bullpen last summer, he made 29 appearances and compiled a
5.27 earned run average, although he pitched much better during the season's
final half.
"I've tried to do everything I did before," he said. "I'll know when
it's time that I can't do it anymore. I'm 33 and there are things that
are harder to do than when I was 23, but I can still throw a baseball and
play the game right. I'm not a quitter. I don't give up. That's my outlook
to life in general.
"There are other afflictions out there that are a lot worse. How you
handle it under adversity tells a lot about a person. I can't just stop
everything, can't just lay on my bed and be a couch potato. You have to
play the hand that's dealt you."
His diagnosis made Belinda a more spiritual person.
"It's got me praying more. I'm more thankful for the things I have:
my family, still being able to play, not being stricken with something
that's worse," he said.
Belinda participated in a "Strike Out MS" program for the local chapter
of the National Multiple Sclerosis Society when he pitched for the Reds.
For each strikeout he recorded last season, Teva Marion Partners, manufacturers
of Copaxen, donated $1,000 to the society. He plans to participate in the
program with the Colorado chapter this season.
He has spoken to a few other people with MS, "but I don't want to give
anybody any wrong leads," he said. "Not everything works for everybody.
You have to find your own recipe for what makes you feel better and have
hope that there will be a cure in your lifetime."
Connie Meitin heard that the Rockies had signed a pitcher with MS --
not that she needed a reason to root for the home team. When she left the
hospital after being diagnosed with MS in August 1996, her then-boyfriend,
now-fiancee Brian Harris brought her a Larry Walker jersey to wear home.
"I was hospitalized about six weeks. It started with paralysis pretty
much from the neck down. I couldn't feed myself. It came on within 36 hours.
My neurologist said a week after the diagnosis that I would be back to
about 99 percent of where I was before, but it took about six months to
get to that point," Meitin said.
Little more than a year after her diagnosis, she suffered a relapse
that left her blind in her left eye.
She takes a weekly dose of Avonex, one of the so-called ABC drugs (Betaseron
and Copaxone are the others) that slow the progression of the disease but
can cause side effects including flu-like symptoms, weight gain and even
depression.
"I've been real fortunate. I have no side effects from the medication.
I love to ski and ride bikes," she said. "I do have some tingling on my
left side, mostly my leg being sensitive to touch, but I have no weakness."
She also has some problems with balance but attributes part of it to having
sight in only one eye.
Most people wouldn't know she had MS unless she told them.
"There have been many articles written titled 'You look so good.' That's
a common problem," she said. "People think you're not sick, and they're
very judgmental. They just automatically think the worst if you're walking
funny or you fall down. Somebody told a girl in our support group, 'Can
you spell intoxicated?' She said, 'Can you spell multiple sclerosis?'
"People are afraid to use a cane, because they don't want people to
think they need one. You sacrifice safety to look like you don't have a
handicap."
Meitin, a project coordinator for general contractor Tandem Enterprises,
isn't surprised Belinda will be on the mound for her favorite team.
"Most of my friends with MS are very active," she said. "It's good to
know the team is behind him and doesn't assume he can't do the job."
Pitchers survive pitch to pitch. Belinda takes the same approach to
living with MS.
"You just have to keep trying different things," said Belinda, who took
about four months to find the combination of medication and diet that keep
his symptoms at bay.
"When all is said and done, you might have lost a lot of battles, but
you came out a winner in God's eyes." |
<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="Author" content="IBM">
<meta name="GENERATOR" content="Mozilla/4.73 [en] (Windows NT 5.0; U) [Netscape]">
<title>Package-level Javadoc</title>
</head>
<body>
Provides support for the evaluation of code snippets
in a scrapbook or inside the debugger.
<h2>
Package Specification</h2>
This packages provides support for the evaluation of code snippets in a
scrapbook or inside the debugger.
</body>
</html>
|
Richard Napier
Richard Napier (1559 – 1 April 1634) was a prominent English astrologer and medical practitioner.
Life
Also known as Dr Richard Sandy, he was the brother of Sir Robert Napier of Luton Hoo, Bedfordshire. He was a pupil of Simon Forman and inherited his manuscripts, including a copy of the Picatrix (now in the British Library). He became rector of Great Linford, Buckinghamshire in 1589.
Napier was appointed a curate to preach in his place while he practised astrology, which was intertwined with his devout Anglicanism and interest in medicine. He claimed to speak with the archangel Raphael frequently, and occasionally with the archangel Michael. His clients included Emanuel Scrope, 1st Earl of Sunderland as well as the Earl of Bolingbroke and Lord Wentworth, who reputedly protected him from the actions of magistrates.
His sister, Mary Napier married Sir Thomas Myddelton of Chirk Castle, the son of Sir Thomas Myddelton, Lord Mayor of London who was also one of his patients. It was said of him that he was so devout that his knees grew horny by much praying, and he reputedly died in that posture on 1 April 1634 and was buried on 15 April. His many papers came into the hands of Elias Ashmole and are now in the Bodleian Library, Oxford. His records have been digitised by a team led by Professor Lauren Kassell of the University of Cambridge.
References
External links
Page on Great Linford containing a short bio of Richard Napier
Bio of Richard Napier
Another bio of Richard Napier
Lauren Kassell, Michael Hawkins, Robert Ralley, and John Young. ‘Richard Napier (1559–1634)’, A Critical Introduction to the Casebooks of Simon Forman and Richard Napier, 1596–1634.
Category:1559 births
Category:1634 deaths
Category:English astrologers
Category:16th-century astrologers
Category:17th-century astrologers
Category:People from Luton
Category:16th-century English Anglican priests
Category:17th-century English Anglican priests
Category:16th-century English medical doctors
Category:17th-century English medical doctors |
Channels is a project led by Andrew Godwin that aims to bring "native asynchronous" to Django.Most tutorials on Channels focus on the processing power of WebSockets that Channels brings to Django.But Channels also has an important feature:asynchronous tasks.Based on this, Channels can replace Celery or RQ's tasks in most projects, and it is more native to use.To prove this, let's use Channels to add a non-blocking email sending to a Django project.
First, we need an Invitation model.
from django.db import models from django.contrib.auth.models import User class Invitation(models.Model): email = models.EmailField() sent = models.DateTimeField(null=True) sender = models.ForeignKey(User) key = models.CharField(max_length=32, unique=True) def __str__(self): return "{} invited {}".format(self.sender, self.email)
The corresponding ModelForm is as follows:
from django import forms from django.utils.crypto import get_random_string from .models import Invitation class InvitationForm(forms.ModelForm): class Meta: model = Invitation fiels = ['email'] def save(self, *args, **kwargs): self.instance.key = get_random_string(32).lower() return super(InvitationForm, self).save(*args, **kwargs)
The question about how to use this form in the View is left to the readers.What we need to do now is that when the Invitation is created on the front end, it is immediately sent to the back end for processing.Which means we need to install Channels.
pip install channels
We intend to use Redis as a message container which is called a "layer" in Channels,between our main web process and the Channels worker processes. So we need to install the corresponding Redis library.
pip install asgi-redis
We intend to use Redis as the preferred Channels layer(The Channels team also offers two alternatives, the in-memory layer and the database layer. The database layer is not recommended).If Redis is not installed in our development environment, we need to install Redis first. Here is the installation method of Redis in Debian/Linux-based system:
apt-get install redis-server
If we're on Mac, we're going to use Homebrew, then install Redis through Homebrew:
brew install redis
The rest of this tutorial is going to assume we have Redis installed and running in our development environment.
Now, we can start adding Channels to our project.In our project's settings.py , add 'channels' to INSTALLED_APPS and add the channels configuration block.
INSTALLED_APPS = ( ..., 'channels', ) CHANNEL_LAYERS = { "default": { "BACKEND": "asgi_redis.RedisChannelLayer", "CONFIG": { "hosts": [os.environ.get('REDIS_URL', 'redis://localhost:6379')], }, "ROUTING": "myproject.routing.channel_routing", }, }
Let's take a look at the CHANNEL_LAYERS block.Does it look a lot like Django's database settings?This is not surprising. Just like we have a default database configuration in settings, here we define a default Channels configuration.Our configuration uses the Redis backend, specifies the url of the Redis server, and points at a routing configuration. The routing configuration works like our project's urls.py . (We're also assuming our project is called 'myproject', you should replace that with your project's actual package name).
Since we are only using Channels to send emails in the back end, our routing.py file is very simple.
from channels.routing import route from .consumers import send_invite channel_routing = [ route('send-invite', send_invite), ]
Hopefully this structure looks somewhat like how we define URLs. What we're saying here is that we have one route, 'send-invite', and what we receive on that channel should be consumed by the 'send_invite' consumer in our invitations app. The consumers.py file in our invitations app is similar to a views.py in a standard Django app, and it's where we're going to handle the actual email sending.
import logging from django.contrib.sites.models import Site from django.core.mail import EmailMessage from django.utils import timezone from invitations.models import Invitation logger = logging.getLogger('email') def send_invite(message): try: invite = Invitation.objects.get( id=message.content.get('id'),) except Invitation.DoseNotExist: logger.error("Invitation to send not found") return subject = "You've been invited!" body = "Go to https://%s/invites/accept/%s/ to join!" % ( Site.objects.get_current().domain, invite.key, ) try: message = EmailMessage( subject=subject, body=body, from_email="Invites <invites@%s.com>" % Site.objects.get_current().domain, to=[invite.email,], ) message.send() invite.sent = timezone.now() invite.save() except: logger.execption('Problem sending invite %s' % (invite.id))
Consumers consume messages from a given channel, where messages is a list of data objects.The data in the message must be in json format, so that it can be stored in the Channel layer (in this case: Redis) and passed around.In this example, the only data we use is the invitation ID that needs to be sent.We get the invite object from the database, build the email based on the object, and then try to send the email.If it's successful, we set a "sent" timestamp on the invite object. If it fails, we log an error.
So far, we still have a problem that has not been solved: how to send the message to the 'send-invite' channel at the right time?My solution is as follows:
from django import forms from django.utils.crypto import get_random_string from channels import Channel from .models import Invitation class InvitationForm(forms.ModelForm): class Meta: model = Invitation fields = ['email'] def save(self, *args, **kwargs): self.instance.key = get_random_string(32).lower() response = super(InvitationForm, self).save(*args, **kwargs) notification = { 'id':self.instance.id, } Channel('send-invite').send(notification) return response
We import Channel from the channels package, and send a data blob on the 'send-invite' channel when our invite is saved.
Now we are ready to test!We connect the form to a view, and set the correct email host settings in our settings.py ,we can test the use of Channel to send email invitations in our app background.The amazing thing about Channels in development is that we start our devserver normally, and in my experience at least, It Just Works.
python manage.py runserver
Congratulations! We have added the background task to the Django application. Let's use Channel.Now, I don't believe it can work until the system can run in the real environment, so let's talk about how to deploy.The Channels docs make a great start at covering this, but I use Heroku, so I'm adapting the excellent tutorial written by Jacob Kaplan-Moss for this project.
We create an asgi.py file in the same directory as the wsgi.py file.
import os import channels.asgi os.environ.setdefault("DJANGO_SETTINGS_MODULE", "myproject.settings") channel_layer = channels.asgi.get_channel_layer()
Note:Remind everyone again, replace "myproject" above with your real project name.
Then, we update our Procfile to include the main Channels process, running under Daphne, and a worker process.
web: daphne myproject.asgi:channel_layer --port $PORT --bind 0.0.0.0 -v2 worker: python manage.py runworker --settings=myproject.settings -v2
We can use Heroku's free Redis host to deploy our app and enjoy sending emails in the background without blocking our app service requests.
Hopefully this tutorial will motivate you to explore the background task capabilities of Channels and consider preparing your application when Channel becomes the core of Django. I think we are moving towards a future when Django can do a better out-of-the-box.,and I am very happy to see what we have built!
If you have more questions about Channels, you can also check out our Channels Tutorial. |
Comparative human aqueous dynamics study between black and white subjects with glaucoma.
To compare the baseline aqueous humor dynamics in white Caucasians and patients of African origin with previously untreated primary open-angle glaucoma (POAG) or ocular hypertension (OHT). Ninety-one participants were enrolled in this prospective, observational controlled study: 34 black subjects with POAG or OHT, 32 white Caucasian participants with POAG or OHT, and 12 black and 13 white healthy volunteers as the controls. All aqueous humor parameters were taken between 9 AM and 12 noon on the same day. Intraocular pressure (IOP) was measured by pneumatonometer; morning aqueous humor flow rate was measured by fluorophotometry and trabecular outflow facility by electronic Schiøtz tonography. Uveoscleral outflow was calculated by using Goldmann's equation with assumed episcleral venous pressure of 8, 9, 10, and 11 mm Hg. Differences among groups were analyzed with parametric and nonparametric tests and the relationship between aqueous dynamics parameters were evaluated with linear regression analyses. The POAG/OHT groups had similar IOP (white, 24.6 ± 3.0 mm Hg; black, 24.3 ± 4.0 mm Hg; comparison by Holm's sequential Bonferroni method (HBonf): P(HBonf) = 0.51), outflow facility (white, 0.13 ± 0.09 μL/min/mm Hg; black, 0.13 ± 0.07 μL/min/mm Hg; P(HBonf) = 0.87), aqueous flow (white, 2.36 ± 0.63 μL/min; black, 2.35 ± 0.53 μL/min; P(HBonf) = 0.95), and uveoscleral outflow (white, 0.42 ± 1.59 μL/min; black, 0.58 ± 1.17 μL/min; P(HBonf) = 1.78). POAG/OHT groups had significantly higher IOP and lower outflow facility than their healthy counterparts (P < 0.01). Black participants had significant thinner corneas (540 ± 37 μm vs. 564 ± 36 μm) than those of white participants (P = 0.002). The aqueous humor dynamics of black African and white Caucasian patients with POAG or OHT have no significant differences. However, the significantly thinner corneas of the black patients may be masking potential differences in outflow facility and IOP measurements between the racial groups. |
Currently, wireless communications systems find application in many contexts involving the transfer of information from one point to another, and there exists a wide range of modalities suited to meet the particular needs of each. These systems include cellular telephones and two-way radios for distant voice communications, as well as shorter-range data networks for computer systems, among many others. Generally, wireless communications involve a radio frequency (RF) carrier signal that is modulated to represent data and the modulation, transmission, receipt and demodulation of the signal conforming to a set of standards. For wireless data networks, example standards include Wireless LAN (IEEE 802.11), BLUETOOTH® (IEEE 802.15.1), and ZIGBEE® (IEEE 802.15.4), which are generally time domain duplex systems where a bidirectional link is emulated on a time divided communications channel.
A fundamental component of a wireless communications system is the transceiver which includes the transmitter and receiver circuitry. The transceiver, with its digital baseband subsystem, encodes the digital data to a baseband signal and modulates the baseband signal with an RF carrier signal. The modulation utilized for WLAN includes orthogonal frequency division multiplexing (OFDM), quadrature phase shift keying (QPSK) and quadrature amplitude modulation (16 QAM, 64 QAM); for WLAN includes GFSK and 4/8-DQPSK; and for Zigbee includes BPSK and OQPSK (or MSK).
Upon receipt of the signal from the antenna, the transceiver downconverts the RF signal, demodulates the baseband signal and decodes the digital data represented by the baseband signal. The antenna connected to the transceiver converts the electrical signal to electromagnetic waves, and vice versa. Depending upon the particular configuration, the transceiver may include a dedicated transmit (TX) line and a dedicated receive (RX) line or the transceiver may have a combined transmit/receive line. In the case of separate TX and RX lines, the transmit line and the receive line are typically tied to a single antenna, particularly for low-cost and/or small-size applications.
The circuitry between the transceiver and the antenna is commonly referred to as the front end module (FEM). The FEM includes an RF power amplifier (PA) which generates output transmit signals by amplifying weaker input signals in wireless devices, such as cellular telephone handsets. Many of these communication devices are configured to operate in different frequency bands for different communication systems. For example, third generation (3G) cellular communication systems, 4G cellular (LTE) systems, 802.11 WLAN systems, etc.
It is thus desirable to have a front end module capable of meeting the performance requirements of modern wireless standards such as 802.11, 3G and 4G cellular systems while reducing manufacturing complexities, size and cost. |
American College of Pediatricians warns about link between HPV vaccine and premature ovarian failure
The American College of Pediatricians (the College), recently updated its stance on Gardasil, a vaccine for the Human Papillomavirus (HPV), in wake of recent research about the virus and vaccine. The College acknowledged that HPV vaccines have been possibly linked to premature ovarian failure (POF), but quickly back peddled by stating that such side effects are rare.
Human papillomavirus (HPV) is a common sexually transmitted virus. According to the press release, approximately 14 types of HPV are believed to cause multiple cancers. The most common cancer that has been causally attached to HPV is cervical cancer.
Multiple concerns over HPV vaccines
The statement notes that there are legitimate concerns about the HPV vaccine that need to be addressed, including:
Long term ovarian function was not assessed in either the original rat safety studies, or in the human vaccine trial
Most primary care physicians are probably unaware of a possible association between HPV4 and POF and may not consider reporting POF cases or prolonged missing menstrual periods to the Vaccine Adverse Event Reporting System (VAERS)
Potential mechanisms of action have been postulated based on autoimmune associations with the aluminum adjuvant used and previously documented ovarian toxicity in rats from another component, polysorbate 80
Since licensure of Gardasil in 2006, there have been about 213 VAERS reports involving amenorrhea, POF or premature menopause, 88 percent of which have been associated with Gardasil
“A Vaccine Safety Datalink POF study is planned to address an association between these vaccines and POF, but it may be years before results will be determined. Plus, POF within a few years of vaccination could be the tip of the iceberg since ovarian dysfunction manifested by months of amenorrhea may later progress to POF,” the press release reads.
Three vaccines intended to prevent cervical cancer caused by the HPV vaccine, have been licensed since 2006. More than a dozen girls in Europe have recently come forth, claiming to have experienced ill side effects from the vaccine.
Most HPV infections go away by themselves
But there are truths about Gardasil and HPV that the press release overlooks, including the fact that 70 percent of HPV infections in women will clear themselves in a year without treatment. In two years, approximately 90 percent of these infections will clear themselves. In three years, only ten 10 percent of women will have an HPV infection, half of which will have developed into a pre-cancerous legion.
The authors of the statement claim they have notified the makers of Gardasil, the Advisory Committee on Immunization Practices (ACIP), and the Food and Drug Administration (FDA) about their concerns. The College went on to press that HPV vaccines should not be mandated by regulatory authorities.
“The College is opposed to any legislation which requires HPV vaccination for school attendance. Excluding children from school over refusal to vaccinate for a disease spread only by sexual intercourse is a serious, precedent-setting action that trespasses on the right of parents to make medical decisions for their children.”
Sources include:
(1) Inquisitr.com
(2) Collective-Evolution.com
(3) ACPeds.org |
---
abstract: 'In this paper, we study the following detection problem. There are $n$ detectors randomly placed in the unit square $S = \left[-\frac{1}{2},\frac{1}{2}\right]^2$ assigned to detect the presence of a source located at the origin. Time is divided into slots of unit length and $D_i(t) \in \{0,1\}$ represents the (random) decision of the $i^{th}$ detector in time slot $t.$ The location of the source is unknown to the detectors and the goal is to design schemes that use the decisions $\{D_i(t)\}_{i,t}$ and detect the presence of the source in as short time as possible. We first determine the minimum achievable detection time $T_{cap}$ and show the existence of *randomized* detection schemes that have detection times arbitrarily close to $T_{cap}$ for almost all configuration of detectors, provided the number of detectors $n$ is sufficiently large. We call such schemes as *capacity achieving* and completely characterize all capacity achieving detection schemes. **Key words:** detection capacity, multidetector network.'
author:
- |
**Ghurumuruhan Ganesan** [^1]\
\
New York University, Abu Dhabi
title: Randomized detection and detection capacity of multidetector networks
---
Introduction
============
Model Description {#model-description .unnumbered}
-----------------
Consider $n$ detectors labelled $\{1,2,\ldots,n\}$ located in the unit square $S = \left[-\frac{1}{2},\frac{1}{2}\right]^2$ and let $\omega_i, 1 \leq i\ \leq n$ denote the location of the $i^{th}$ detector. There is also a *source* present at the origin and the location of the source is unknown to the $n$ detectors.
The source continuously emits signals and the detectors can therefore sense the presence of the source by receiving and analyzing these signals. We divide time into disjoint slots of unit length and in time slot $t \geq 1,$ we let $D_i(t) \in \{0,1\}$ be the decision of detector $i \in \{1,\ldots,n\}$ regarding the source. Thus $D_i(t) = 0$ implies that detector $i$ has not detected the source and $D_i(t) = 1$ implies that user $i$ has detected the source at time $t.$
Let $r \geq 1$ be a fixed integer. We define $\underline{D}_i = (D_i(1),\ldots,D_i(r))$ to be the decision vector of detector $i$ in a round of duration $r.$ We assume that $\underline{D}_i$ consists of independent and identically distributed random variables where $$\label{d_i_t}
\mathbb{P}_{i}(D_i(t) = 1) = p_i = 1 - \mathbb{P}_i(D_i(t) = 0)$$ for every $1 \leq t \leq r,$ where $p_i$ denotes the detection probability of the detector $i$ and does not depend on the time $t.$ We further assume $\underline{D}_i$ is independent of $\underline{D}_j$ for $i \neq j.$ We define the decision vectors $(\underline{D}_1,\ldots,\underline{D}_n)$ on the probability space $(\Omega_{dec},{\cal F}_{dec}, \mathbb{P}_{dec})$ where $\Omega_{dec} = \{0,1\}^{nr},$ ${\cal F}_{dec}$ is the sigma algegra formed by all subsets of $\Omega_{dec}$ and $\mathbb{P}_{dec} = \otimes_{i=1}^{n} \mathbb{P}_i.$
A $(n,r)-$*detection scheme* is a (deterministic) map $\pi: \{1,2,3,\ldots,r\} \rightarrow \{1,2,\ldots,n\}.$ In other words, the map $\pi$ assigns user $\pi(t)$ to detect the channel at time slot $t.$
Let $\underline{X} = (D_{\pi(1)}(1),D_{\pi(2)}(2),\ldots,D_{\pi(r)}(r)) \in \{0,1\}^r$ denote the vector containing the corresponding decisions of the users. Throughout the paper we work only with the vector $\underline{X}.$ If $D_{\pi(i)}(i) = 1$ for some $1 \leq i \leq r,$ we say that the source has been detected and define the corresponding event as $A_{det}.$ We also define the detection time random variable $T_{det}$ as $$\label{t_det}
T_{det} = \min\{1 \leq i \leq r : D_{\pi(i)}(i) = 1\}.$$ If the event $A^{c}_{det}$ occurs i.e., the source has not been detected in a round of duration $r,$ then we set $T_{det} = \infty.$
For a fixed $(n,r)-$detection scheme $\pi$ and a fixed detection probability vector $\underline{p} = (p_1,\ldots,p_n),$ let $ 1-q_{\pi(j)} = p_{\pi(j)}$ denote the detection probability of user $\pi(j)$ at time slot $1 \leq j \leq r.$ For any fixed $1 \leq k \leq r$ and fixed $(\pi,\underline{p}),$ we let $\mathbb{P}^{(\pi,\underline{p})}$ be the probability measure associated with the decision vectors $\{\underline{D}_{i}\}_i\emph{}.$ We then obtain from the model description above that $$\label{prob_pi_p}
\mathbb{P}^{(\pi,\underline{p})}(T_{det} = k) = \prod_{i=1}^{k-1} q_{\pi(i)} (1-q_{\pi(k)})$$ and so $$\label{prob_pi_p_inf}
\mathbb{P}^{(\pi,\underline{p})}(T_{det} < \infty) = \mathbb{P}^{(\pi,\underline{p})}(T_{det} \leq r) = 1 - \prod_{i=1}^{r} q_{\pi(i)}$$ is the probability of the event that the source is located in one round (consisting of $r$ time slots). We also define $$\label{exp_pi_p}
\mathbb{E}^{(\pi,\underline{p})}(T_{det}{1\hspace{-2.3mm}{1}}(T_{det} < \infty)) = \sum_{k=1}^{r} k\mathbb{P}^{(\pi,\underline{p})}(T_{det} = k)$$ is the expected detection time for a fixed pair $(\pi,\underline{p}).$
### Randomness in configuration {#randomness-in-configuration .unnumbered}
Suppose now we allow for randomness in the detection probability vector to reflect the randomness in the configuration of the detectors. More precisely, we associate with each detector $i,$ a random detection probability $P_i \in (0,1)$ taking values in a finite set $\Omega_{conf}.$ The random detection probability vector $\underline{P} = (P_1,\ldots,P_n)$ has independent and identically distributed components and is defined on the probability space $(\Omega^n_{conf}, {\cal F}_{conf},\mathbb{P}_{conf})$ where ${\cal F}_{conf}$ denotes the collection of all subsets of $\Omega^n_{conf}.$ Thus the equation (\[d\_i\_t\]) holds for a particular realization $\underline{p} = (p_1,\ldots,p_n)$ of the random vector $\underline{P}.$
We assume $\Omega_{conf}$ is finite to avoid measure theoretic complications. In practice this could happen, for example, if there is a (finite) grid of possible locations for placing the detectors.
### Randomness in Detection Schemes {#randomness-in-detection-schemes .unnumbered}
We now introduce randomness in the detection scheme and study the configuration quenched (i.e., not averaged with respect to configuration) detection times. Let $\Omega_{sch} = \Omega_{sch}(n,r)$ denote the set of all $(n,r)-$detection schemes. A random $(n,r)-$detection scheme $\Pi$ is a random element of $\Omega_{sch}$ defined on the probability space $(\Omega_{sch}, {\cal F}_{sch}, \mathbb{P}_{sch}).$ Here $\mathbb{P}_{sch}$ is a probability distribution on $\Omega_{sch}.$ Since the source location is not known to the detectors, we would like our detection scheme to be independent of the detector locations. We therefore assume that the random detection scheme $\Pi$ is independent of the random tuple $(\underline{P},\underline{D}).$
We define the overall detection process on the probability space\
$(\Omega_{tot}, {\cal F}_{tot}, \mathbb{P}_{tot}),$ where $$\Omega_{tot} = \Omega^n_{conf} \times \Omega_{sch} \times \Omega_{dec}, {\cal F}_{tot} = {\cal F}_{conf} \times {\cal F}_{sch} \times {\cal F}_{dec}$$ and $$\mathbb{P}_{tot} = \mathbb{P}_{conf} \times \mathbb{P}_{sch} \times \mathbb{P}_{dec}.$$
Detection Capacity {#detection-capacity .unnumbered}
------------------
We recall that the randomness in the detection probability vector $\underline{p}$ is caused by the randomness in the configuration (i.e. location) of the detectors. Since the source location is unknown, we would like that any random placement of the detectors yields reasonably low detection time on an average long as we have enough number of detectors. We therefore have the following definition.
We say that detection time of $s > 0$ is achievable if for every $\epsilon,\delta > 0,$ there is a $N = N(\epsilon,\delta) \geq 1$ so that the following holds for $n \geq N.$ There is a $r = r(n) \longrightarrow \infty$ as $n \rightarrow \infty$ and a probability distribution $\mathbb{P}_{sch} = \mathbb{P}_{sch}(n,r)$ such that $$\label{cap_def}
\mathbb{P}_{conf}\left(B(\underline{p},s,\epsilon,\delta)\right) > 1- \epsilon.$$ where $$B(\underline{p},s,\epsilon,\delta) = \{\underline{p} \in \Omega_{conf} : S(\underline{p}) > 1-\epsilon \text{ and } T(\underline{p}) < s + \delta \}. \label{b_def}$$ Here for a fixed configuration $\underline{p},$ the term $$\label{s_def}
S(\underline{p}) = \sum_{\pi} \mathbb{P}^{(\pi,\underline{p})}(T_{det} < \infty)\mathbb{P}_{sch}(\pi)$$ denotes the probability that detection occurs within one round, averaged over all possible detection schemes. Similarly, $$\label{t_def}
T(\underline{p}) = \sum_{\pi} \mathbb{E}^{(\pi,\underline{p})}(T_{det}{1\hspace{-2.3mm}{1}}(T_{det} < \infty))\mathbb{P}_{sch}(\pi)$$ denotes the corresponding averaged detection time for a fixed configuration $\underline{p}.$
If $\Pi$ is any random $(n,r)-$detection scheme with distribution $\mathbb{P}_{sch},$ we then say that a detection time of $s > 0$ is achievable by $\Pi$ if the above conditions are satisfied. Roughly speaking, for any random placement of the detectors, the following two conditions must be satisfied with high probability: $(a)$ detection time is finite (i.e., detection happens within one round) and $(b)$ the expected finite detection time is arbitrarily close to $s.$
Define $$\label{t_cap_def}
T_{cap} = \inf\{s > 0: s \text{ is achievable}\}$$ to be the detection capacity. We have the following result regarding the detection capacity.
\[main\_thm\] We have that $$\label{main_est}
T_{cap} = \frac{1}{p_{av}}$$ where $$\label{ave_p2}
p_{av} = (\Omega_{conf})^{-1}\sum_{p \in \Omega_{conf}} p$$ is the configuration averaged detection probability. Moreover, a detection scheme $\Pi$ achieves a detection time of $T_{cap}$ if and only if the following two conditions hold for any fixed integer $k \geq 1.$\
$(a1)$ We have $$\label{aj_def}
a_k := \mathbb{P}_{sch}\left(\#\{\Pi(1),\ldots,\Pi(k)\} = k\right) \longrightarrow 1$$ as $n \rightarrow \infty.$\
$(a2)$ If $\Pi_1$ and $\Pi_2$ are two independent detection schemes having the same distribution as $\Pi,$ then $$\label{bj_def}
b_k := \mathbb{P}_{sch}\left(\{\Pi_1(1),\ldots,\Pi_1(k)\} \bigcap \{\Pi_2(1),\ldots,\Pi_2(k)\} = \emptyset \right) \longrightarrow 1$$ as $n \rightarrow \infty.$
The result above essentially provides a limit on the detection capability of multidetector networks. This has applications to spectrum sensing in cognitive radio networks, where vacation time is a critical parameter that affects the performance of the network. For more details, we refer to Haykin (2005), Tandra and Sahai (2005) and the survey article by Yucek and Arslan (2009) and references therein. We also refer to Balister et al (2016) for sensing algorithms in a continuum percolation setting.
The paper is organized as follows. In Section \[pf\_min\_det\], we prove preliminary estimates needed for the proof of Theorem \[main\_thm\]. In Section \[pf1\], we prove Theorem \[main\_thm\].
Preliminary estimates {#pf_min_det}
=====================
We recall from (\[t\_def\]) that $$\label{t_p_def2}
T(\underline{p}) = \sum_{\pi} \mathbb{E}^{(\pi,\underline{p})}(T_{det}{1\hspace{-2.3mm}{1}}(T_{det} < \infty)) \mathbb{P}_{sch}(\pi)$$ is the detection time for a fixed configuration $\underline{p},$ averaged over all possible detection schemes.
Mean of $T(\underline{p})$ {#mean-oftunderlinep .unnumbered}
--------------------------
We have the following result.
\[lem1\] Let $p_{av}$ be the configuration averaged detection probability as defined in (\[ave\_p2\]) and let $p_{min} = \min\{p : p \in \Omega_{conf}\} > 0$ be the minimum detection probability. For a fixed $\epsilon > 0,$ we have that $$\label{e_conf}
\frac{1}{p_{av}} -\epsilon \leq \mathbb{E}_{conf}T(\underline{p}) \leq \frac{1}{p_{av}} + \frac{1}{p_{min}}$$ for all $n$ large. Also $$\label{e_conf_conv2}
\mathbb{E}_{conf}T(\underline{p}) \longrightarrow \frac{1}{p_{av}}$$ as $n \rightarrow \infty$ if and only if for each integer $k \geq 1,$ the following condition holds: $$\label{cond1}
a_k \longrightarrow 1$$ as $n \rightarrow \infty.$ Here $$a_k= a_k(n) := \mathbb{P}_{sch}\left(\#\{\Pi(1),\ldots,\Pi(k)\} = k \right)$$ is as defined in (\[aj\_def\]).
*Proof of Lemma \[lem1\]*: From (\[exp\_pi\_p\]), we have that $$\begin{aligned}
\mathbb{E}^{(\pi,\underline{p})}(T_{det}{1\hspace{-2.3mm}{1}}(T_{det} < \infty)) &=& \sum_{k=1}^{r} k\mathbb{P}^{(\pi,\underline{p})}(T_{det} = k) \nonumber\\
&=&\sum_{k=1}^{r} k\prod_{i=1}^{k-1} q_{\pi(i)} (1-q_{\pi(k)}) \nonumber\\
&=& \sum_{k=1}^{r} k(\alpha_{k-1} - \alpha_{k}) \nonumber\\
&=& \sum_{j=0}^{r-1} \alpha_j - r\alpha_{r}. \label{e_pi_p_est}\end{aligned}$$ where $\alpha_0 = 1$ and for $k \geq 1,$ we have $$\label{alpha_k_def}
\alpha_k = \alpha_k(\pi,\underline{p}) := \prod_{i=1}^{k} q_{\pi(i)}.$$ We have from the definition that $\alpha_j$ depends on both the configuration $\underline{p}$ and the detection scheme $\pi.$ From (\[e\_pi\_p\_est\]), we have that the configuration averaged detection time is $$\label{conf_ave_det}
T(\underline{p}) = \sum_{j=0}^{r-1} \mathbb{E}_{sch}(\alpha_j) - r \mathbb{E}_{sch}(\alpha_r)$$ and so $$\begin{aligned}
\mathbb{E}_{conf}T(\underline{p}) &=& \sum_{j=0}^{r-1} \mathbb{E}_{conf}\mathbb{E}_{sch}(\alpha_j) - r \mathbb{E}_{conf}\mathbb{E}_{sch}(\alpha_r) \nonumber\\
&=& \sum_{j=0}^{r-1} \mathbb{E}_{sch}\mathbb{E}_{conf}(\alpha_j) - r \mathbb{E}_{sch}\mathbb{E}_{conf}(\alpha_r). \label{ov_ave}\end{aligned}$$
For a fixed detection scheme $\pi,$ we first estimate $\mathbb{E}_{conf}(\alpha_j).$ For $j =1,$ we have that $$\mathbb{E}_{conf}(\alpha_1) = 1-\mathbb{E}_{conf}(p_{\pi(1)}) = 1-p_{av}$$ for any detection scheme $\pi,$ where $p_{av}$ is the detection probability averaged over all possible configurations as defined in (\[ave\_p2\]). For a fixed integer $j \geq 2$ and a fixed detection scheme $\pi,$ we have the following estimates for the configuration averaged value of $\alpha_j.$ We have $$\label{conf_ave_alphaj2}
(1-p_{av})^{j} \leq \mathbb{E}_{conf}(\alpha_j) \leq (1-p_{min})^{j}$$ and $$\label{conf_ave_alphaj}
c_j{1\hspace{-2.3mm}{1}}(W_j^c) \leq \mathbb{E}_{conf}(\alpha_j) - (1-p_{av})^{j} \leq d_j{1\hspace{-2.3mm}{1}}(W_j^c)$$ for all $n \geq 1,$ where $$\label{uj_def}
0 < d_j = (1-p_{min})^{j} - (1-p_{av})^{j} \leq (1-p_{min})^{j}$$ and $$\label{cj_def}
c_j = \min_{2 \leq i \leq j} \frac{\mathbb{E}_{conf}(1-p)^{i} - (1-p_{av})^{i}}{(1-p_{av})^{i}} > 0.$$ Here $W_j = \{\#\{\pi(1),\ldots,\pi(j)\} = j\}$ is the event that first $j$ values of $\pi$ are all distinct. The term $p_{av}$ is the configuration averaged detection probability as defined in (\[ave\_p2\]) and $p_{min} = \min\{p: p \in \Omega_{conf}\} > 0$ is the minimum detection probability. The estimate (\[conf\_ave\_alphaj\]) is slightly more stronger than (\[conf\_ave\_alphaj2\]) and from (\[conf\_ave\_alphaj\]), we obtain that the term $\mathbb{E}_{conf}(\alpha_j) = (1-p_{av})^{j}$ if and only if the event $W_j$ occurs.\
\
*Proof of (\[conf\_ave\_alphaj2\]) and (\[conf\_ave\_alphaj\])*: Suppose that $$\{\pi(1),\ldots,\pi(j)\} = \{i_1.x_1,\ldots,i_w.x_w\},$$ where $\{x_1,\ldots,x_w\}$ are the distinct elements in $\{\pi(1),\ldots,\pi(j)\}$ and $i_k$ denotes the multiplicity of $x_k$ for $1 \leq k \leq w,$ satisfying $$\label{mult_ak}
\sum_{k=1}^{w} i_k = j.$$ We recall that $q_{\pi(i)} = 1-p_{\pi(i)}$ and $p_{\pi(i)}$ is the detection probability for detector $\pi(i).$ Using the $\mathbb{P}_{conf}-$independence of the detection probabilities\
$p_{x_1},\ldots,p_{x_w},$ we then have $$\begin{aligned}
\mathbb{E}_{conf}(\alpha_j) &=& \prod_{k=1}^{w}\mathbb{E}_{conf}(1-p_{x_k})^{i_k} \label{eq_later_nd}\\
&\geq& \prod_{k=1}^{w}\left(\mathbb{E}_{conf}(1-p_{x_k})\right)^{i_k} \label{mid_exp}\\
&=& \prod_{k=1}^{w}(1-p_{av})^{i_k} \nonumber\\
&=& (1-p_{av})^{j} \label{fin_ealp}\end{aligned}$$ where the final estimate follows from (\[mult\_ak\]). In the middle step (\[mid\_exp\]), we use the estimate $\mathbb{E}X^{q} \geq (\mathbb{E}X)^{q}$ for any positive random variable $X$ and integer $q \geq 1.$ Moreover, equality occurs in (\[mid\_exp\]) if and only if $i_k = 1$ for each $1 \leq k \leq w.$ This proves the lower bound in (\[conf\_ave\_alphaj2\]) and the equality in (\[conf\_ave\_alphaj\]) if $W_j$ occurs.
Suppose now that $W_j^c$ occurs. This means that $i_k \geq 2$ for some $1 \leq k \leq w.$ Suppose $i_1 \geq 2.$ Arguing as in (\[fin\_ealp\]), we get from (\[eq\_later\_nd\]) that $$\begin{aligned}
\mathbb{E}_{conf}(\alpha_j) &=& \mathbb{E}_{conf}(1-p_{x_1})^{i_1} \prod_{k=2}^{w}\mathbb{E}_{conf}(1-p_{x_k})^{i_k} \nonumber\\
&\geq& \mathbb{E}_{conf}(1-p_{x_1})^{i_1} \prod_{k=2}^{w} (1-\mathbb{E}_{conf}(p_{x_k}))^{i_k} \label{mid_exp2}\\
&=& \mathbb{E}_{conf}(1-p_{x_1})^{i_1} \prod_{k=2}^{w} (1-p_{av})^{i_k} \nonumber\\
&=& \Delta(i_1) \mathbb{E}_{conf}(1-p_{av})^{j}\nonumber\end{aligned}$$ where $$\Delta(i_1) = \frac{\mathbb{E}_{conf}(1-p_{x_1})^{i_1}}{(\mathbb{E}_{conf}(1-p_{x_1}))^{i_1}} \geq 1+c_j$$ and $c_j > 0$ is as defined in (\[cj\_def\]). This proves the lower bound in (\[conf\_ave\_alphaj\]).
The upper bound in (\[conf\_ave\_alphaj2\]) and (\[conf\_ave\_alphaj\]) follows from (\[eq\_later\_nd\]) and (\[mult\_ak\]) along with the fact that $p_{x_k} \geq p_{min}$ for all $1 \leq k \leq w.$ ${\hfill{\ \ \rule{2mm}{2mm}} \vspace{0.2in}}$
Substituting the bounds for (\[conf\_ave\_alphaj2\]) into (\[ov\_ave\]), we get $$\begin{aligned}
\mathbb{E}_{conf}T(\underline{p}) &\geq& \sum_{j=0}^{r-1} (1-p_{av})^{j} - r (1-p_{min})^{r}\\
&=& \frac{1-(1-p_{av})^{r}}{p_{av}} - r(1-p_{min})^{r} \nonumber\\
&\geq& \frac{1}{p_{av}} - \epsilon \label{low_bd_lem1}\end{aligned}$$ for all $n$ large, provided $r = r(\epsilon) \geq 1$ is large and fixed. This proves the lower bound in (\[e\_conf\]).
For the rest, we argue as follows. Using the upper bound bound in (\[conf\_ave\_alphaj\]) in (\[conf\_ave\_det\]) we have $$\label{ov_ave2}
\mathbb{E}_{conf}T(\underline{p}) \leq \sum_{j=0}^{r-1} (1-p_{av})^{j} + \sum_{ j=0}^{r-1}(1-p_{min})^{j} (1-a_j)$$ and using the lower bound in (\[conf\_ave\_alphaj\]) and upper bound in (\[conf\_ave\_alphaj2\]) in (\[conf\_ave\_det\]), we have $$\label{ov_ave3}
\mathbb{E}_{conf}T(\underline{p}) \geq \sum_{j=0}^{r-1} (1-p_{av})^{j} + \sum_{ j=0}^{r-1}c_j (1-a_j) - r(1-p_{min})^{r-1}$$ where the sequence $$a_j = a_j(n) := \mathbb{P}_{sch}\left(\#\{\Pi_1(1),\ldots,\Pi_1(j)\} = j\right) \leq 1$$ is as defined in (\[aj\_def\]). From (\[ov\_ave2\]) and the fact that $1-a_j \leq 1,$ we obtain the upper bound in (\[e\_conf\]). We now prove (\[e\_conf\_conv2\]). Suppose now that (\[cond1\]) holds so that $a_j \longrightarrow 1$ as $n \rightarrow \infty$ for any fixed integer $j \geq 1.$ Fixing integer $r \geq 1$ large to be determined later, we have that $a_j \geq 1-\epsilon$ for all $1 \leq j \leq r$ and for all $n \geq N(r,\epsilon) \geq 1.$ Using this in (\[ov\_ave2\]), we have $$\begin{aligned}
\mathbb{E}_{conf}T(\underline{p}) &\leq& \sum_{j=0}^{r-1} (1-p_{av})^{j} + \epsilon \sum_{j=0}^{r-1}(1-p_{min})^{j} \nonumber\\
&\leq& \frac{1}{p_{av}} + \frac{\epsilon}{p_{min}} \label{up_bd_lem1}\end{aligned}$$ for all $n$ large. Since $\epsilon >0$ is arbitrary, we obtain (\[e\_conf\_conv2\]) from (\[low\_bd\_lem1\]) and (\[up\_bd\_lem1\]).
Suppose now that (\[cond1\]) does not hold so that there is an integer $r_0 \geq 1$ and a number $\epsilon_0 > 0$ and a sequence $\{n_k\}$ such that $a_{r_0} = a_{r_0}(n_k) \leq 1-\epsilon_0$ for all $k$ large. Using this in (\[ov\_ave3\]), we then have $$\begin{aligned}
\mathbb{E}_{conf}T(\underline{p}) &\geq& \sum_{j=0}^{r-1} (1-p_{av})^{j} + \sum_{j=0}^{r-1}c_j (1-a_j) - r(1-p_{min})^{r-1}\label{e_conf_lower}.\end{aligned}$$ For $\epsilon >0$ small, we have that $$\sum_{j=0}^{r-1} (1-p_{av})^{j} - r(1-p_{min})^{r-1} \geq \frac{1}{p_{av}} - \epsilon$$ for all $n$ large provided $r = r(\epsilon) \geq 1$ is large. Similarly $$\sum_{j=0}^{r-1} c_j(1-a_j) \geq c_{r_0} (1-a_{r_0}) \geq c_{r_0}\epsilon_0 > 0$$ by choice of $r_0.$ This implies that $$\mathbb{E}_{conf}T(\underline{p}) \geq \frac{1}{p_{av}} -\epsilon + c_{r_0}\epsilon_0.$$ Since $\epsilon >0$ is arbitrary, (\[e\_conf\_conv2\]) cannot hold. ${\hfill{\ \ \rule{2mm}{2mm}} \vspace{0.2in}}$
Variance of $T(\underline{p})$ {#variance-oftunderlinep .unnumbered}
------------------------------
From (\[conf\_ave\_det\]), we have for a fixed integer $k \geq 1$ that $$\label{t_split}
T(\underline{p}) = 1 + \sum_{j=1}^{k} T_j + R_k$$ where $$\label{t_j_def}
T_j = T_j(\underline{p}) = \sum_{\underline{i}} Q(\underline{i}) \beta(\underline{i})$$ and $ \underline{i} = (i_1,\ldots,i_j) \in \{1,\ldots,n\}^{j}$ is $j-$tuple. For a fixed $\underline{i} = (i_1,\ldots,i_j),$ the term $$\label{q_def}
Q(\underline{i}) = \prod_{1 \leq l \leq j} q_{i_l}$$ and $$\label{beta_def}
\beta(\underline{i}) = \mathbb{P}_{sch}\left(\Pi(1) = i_1,\ldots,\Pi(j) = i_j\right)$$ Similarly the term $$\label{r_k_def}
R_k = \sum_{j=k+1}^{r-1}T_j - rT_r.$$
We have the following estimates regarding the $Q-$terms.
\[var\_q\] Fix $j_1,j_2 \geq 1$ and $\underline{i}_1 \in \{1,\ldots,n\}^{j_1}$ and $\underline{i}_2 \in \{1,\ldots,n\}^{j_2}.$ Let $$\label{q_corr}
\delta(\underline{i}_1,\underline{i}_2) := \mathbb{E}_{conf}Q(\underline{i}_1)Q(\underline{i}_2) - \mathbb{E}_{conf}Q(\underline{i}_1)\mathbb{E}_{conf}Q(\underline{i}_2).$$ We have that $\delta(\underline{i}_1,\underline{i}_2) = 0$ if and only if $\{\underline{i}_1\} \cap \{\underline{i}_2\} = \emptyset;$ i.e., the tuples $\underline{i}_1$ and $\underline{i}_2$ have no entries in common. Also $$\label{del_est}
\delta(\underline{i}_1,\underline{i}_2) \geq e(j_1,j_2){1\hspace{-2.3mm}{1}}\left(\{\underline{i}_1\} \cap \{\underline{i}_2\} \neq \emptyset\right)$$ for some constant $e(j_1,j_2) > 0.$ Moreover $$\label{cross_est1}
\mathbb{E}_{conf}Q(\underline{i}_1) \leq \mathbb{E}_{conf}(1-p)^{j_1}.$$ and $$\label{cross_est2}
\mathbb{E}_{conf}Q(\underline{i}_1) Q(\underline{i}_2) \leq \mathbb{E}_{conf}(1-p)^{j_1+j_2}.$$
*Proof of Lemma \[var\_q\]*: Let $\{\underline{i}_1\}$ represent the set of indices present in the\
$j-$tuple $\underline{i}_1.$ We have $$Q(\underline{i}_1) = Q_1Q_{12} \text{ and } Q(\underline{i}_2) = Q_2 Q_{12}$$ where $Q_1$ represents the product corresponding to indices in $\{\underline{i}_1\}$ but not in $\{\underline{i}_2\}$ and $Q_{12}$ represents the product corresponding to indices present in both $\{\underline{i}_1\}$ and $\{\underline{i}_2\}.$ Using the $\mathbb{P}_{conf}-$independence of the terms $Q_1,Q_{12}$ and $Q_2,$ we have $$\label{q_12}
\mathbb{E}_{conf}Q(\underline{i}_1) Q(\underline{i}_2) = \mathbb{E}_{conf}Q_1\mathbb{E}_{conf}Q^2_{12} \mathbb{E}_{conf}Q_2.$$ Similarly we have $$\label{q_1_q_2}
\mathbb{E}_{conf}Q(\underline{i}_1) \mathbb{E}_{conf}Q(\underline{i}_2) = \mathbb{E}_{conf}Q_1\left(\mathbb{E}_{conf}Q_{12} \right)^{2} \mathbb{E}_{conf}Q_2.$$ If $Q_{12} = 1;$ i.e., the tuples $\underline{i}_1$ and $\underline{i}_2$ have no entries in common, then the term $\delta(\underline{i}_1,\underline{i}_2) = 0.$
If $\{\underline{i}_1\} \cap \{\underline{i}_2\} \neq \emptyset,$ then $Q_{12} < 1$ strictly and we have from (\[q\_12\]) and (\[q\_1\_q\_2\]) that $$\delta(\underline{i}_1,\underline{i}_2) = \mathbb{E}_{conf}(Q_1)var_{conf}(Q_{12})\mathbb{E}_{conf}(Q_2).$$ Taking minimum over all possible choices of $Q_1,Q_{12}$ and $Q_3$ we obtain the lower bound in (\[del\_est\]). We prove (\[cross\_est1\]) and the proof for (\[cross\_est2\]) is analogous. Suppose $\{\underline{i}_1\} = \{w_1.c_1,\ldots,w_q.c_q\}$ where $\{c_i\}$ are the indices present in the tuple $\underline{i}_1$ with $\{w_i\}$ representing the corresponding multiplicities so that $$\label{sum_mult}
\sum_{l=1}^{q} w_l = j.$$ We then have $$\label{inter1}
\mathbb{E}_{conf}Q(\underline{i}_1) = \prod_{l=1}^{q} \mathbb{E}_{conf}(1-p)^{w_l}.$$ Using $\left(\mathbb{E}X^{s}\right)^{\frac{1}{s}} \leq \left(\mathbb{E}X^{t}\right)^{\frac{1}{t}}$ for $s \leq t$ and a positive random variable $X,$ we obtain that $$\label{inter2}
\mathbb{E}_{conf}(1-p)^{w_l} \leq \left(\mathbb{E}_{conf}(1-p)^{j}\right)^{\frac{w_l}{j}}$$ and so the final term in (\[inter1\]) is at most $$\prod_{l=1}^{q} \left(\mathbb{E}_{conf}(1-p)^{j}\right)^{\frac{w_l}{j}} = \mathbb{E}_{conf}(1-p)^{j}.$$ The final estimate follows from (\[sum\_mult\]). ${\hfill{\ \ \rule{2mm}{2mm}} \vspace{0.2in}}$
\[var\_tj\] Fix $j_1,j_2 \geq 1.$ We have $$\label{pos_corr}
cov_{conf}\left(T_{j_1},T_{j_2}\right) := \mathbb{E}_{conf}(T_{j_1}T_{j_2}) - \mathbb{E}_{conf}(T_{j_1})\mathbb{E}_{conf}(T_{j_2}) \geq 0.$$ Also $$\label{cross_t2}
\mathbb{E}_{conf}(T_{j_1}T_{j_2}) \leq \mathbb{E}_{conf}(1-p)^{j_1+j_2}$$ and $$\label{var_est_tj}
e(j_1,j_1) (1-b_{j_1}) \leq var_{conf}(T_{j_1}) \leq 1-b_{j_1}$$ where $e(j_1,j_1) > 0$ is the constant defined in (\[del\_est\]) and $b_{j_1}$ is the constant as defined in (\[bj\_def\]).
Fix $\epsilon > 0$ and $1 \leq k \leq n.$ We have $$\label{var_tp_est_low}
var_{conf}(T(\underline{p})) \geq \sum_{j=1}^{k} e(j,j) (1-b_j) - \epsilon$$ for all $n \geq N(k,\epsilon) \geq 1$ large. If $k = k(\epsilon) \geq 1$ is large, we also have $$\label{var_tp_est_up}
var_{conf}(T(\underline{p})) \leq (k+1)\sum_{j=1}^{k} (1-b_j) + \epsilon$$ for all $n \geq N(k,\epsilon) \geq 1$ large.
*Proof of Lemma \[var\_tj\]*: The estimate (\[pos\_corr\]) follows from (\[q\_corr\]) in Lemma \[var\_q\] since we have from (\[t\_j\_def\]) that $$\mathbb{E}_{conf}(T_{j_1}T_{j_2}) - \mathbb{E}_{conf}(T_{j_1})\mathbb{E}_{conf}(T_{j_2})
= \sum_{\underline{i}_1}\sum_{\underline{i}_2} \delta(\underline{i}_1,\underline{i}_2)\beta_n(\underline{i}_1)\beta_n(\underline{i}_2)$$ where $\delta(.,.) \geq 0$ is as defined in (\[q\_corr\]) and $\underline{i}_1 \in \{1,\ldots,n\}^{j_1},\underline{i}_2 \in \{1,\ldots,n\}^{j_2}.$ Similarly (\[cross\_t2\]) follows from (\[cross\_est2\]).
To estimate the upper bound for the variance of $T_j$ we proceed as follows. We have from (\[t\_j\_def\]) that $$var_{conf}(T_j) = \sum_{\underline{i}_1} \sum_{\underline{i}_2} \delta(\underline{i}_1,\underline{i}_2) \beta(\underline{i}_1)\beta(\underline{i}_2)$$ where $\delta(.,.)$ is as defined in (\[q\_corr\]). From (\[q\_corr\]) we also have that $\delta(\underline{i}_1,\underline{i}_2) = 0$ if and only if $\underline{i}_1$ and $\underline{i}_2$ do not have any entries in common; i.e., the sets $\{\underline{i}_1\} \cap \{\underline{i}_2\} = \emptyset.$ So $$\begin{aligned}
var_{conf}(T_j) &=& \sum_{\underline{i}_1,\underline{i}_2 : \{\underline{i}_1\} \cap \{\underline{i}_2\} \neq \emptyset} \delta(\underline{i}_1,\underline{i}_2) \beta(\underline{i}_1)\beta(\underline{i}_2)\nonumber\\
&\leq& \sum_{\underline{i}_1,\underline{i}_2 : \{\underline{i}_1\} \cap \{\underline{i}_2\} \neq \emptyset} \beta(\underline{i}_1)\beta(\underline{i}_2)\nonumber\\
&=& 1-b_j \nonumber\end{aligned}$$ where the middle estimate follows since $\delta(.,.) \leq 1.$ The lower bound similarly follows from the lower bound for $\delta(.,.)$ in (\[del\_est\]).
To prove the lower bound in (\[var\_tp\_est\_low\]), we argue as follows. From (\[t\_split\]) we have $$T(\underline{p}) = 1 + \sum_{j=1}^{r-1} T_j - rT_r$$ and so if $r \geq k,$ we have $$\begin{aligned}
var_{conf}(T(\underline{p})) &=& \sum_{j=1}^{r-1} var_{conf}(T_j) +r^2 var_{conf}(T_r) - 2r\sum_{j=1}^{r} cov_{conf}(T_j,T_r) \nonumber\\
&&\;\;\;\;\;+ \sum_{1 \leq j_1 \neq j_2 \leq r-1} cov(T_{j_1},T_{j_2}) \nonumber\\
&\geq& \sum_{j=1}^{k} var_{conf}(T_j) - 2r\sum_{j=1}^{r} cov_{conf}(T_j,T_r) \label{cov_1}\\
&\geq& \sum_{j=1}^{k} var_{conf}(T_j) - 2r\sum_{j=1}^{r} \mathbb{E}_{conf}T_jT_r. \label{cov_2}\end{aligned}$$ The inequality (\[cov\_1\]) follows using (\[pos\_corr\]) and the estimate (\[cov\_2\]) follows from the definition of covariance in (\[pos\_corr\]).
Using (\[cross\_t2\]) we have $$\mathbb{E}_{conf}T_jT_r \leq \mathbb{E}_{conf}(1-p)^{j+r} \leq \mathbb{E}_{conf}(1-p)^{r}$$ and using the above in (\[cov\_2\]), we have $$\begin{aligned}
var_{conf}(T(\underline{p})) &\geq& \sum_{j=1}^{k} var_{conf}(T_j) - 2r^2\mathbb{E}_{conf}(1-p)^{r} \nonumber\\
&\geq& \sum_{j=1}^{k} var_{conf}(T_j) - \epsilon \nonumber\\
&\geq& \sum_{j=1}^{k} e(j,j)(1-b_j) - \epsilon \label{cov_5}\end{aligned}$$ provided $r = r(\epsilon) \geq 1$ is large. The final estimate follows from the lower bound for the variance of $T_j$ in (\[var\_est\_tj\]). This proves the lower bound in (\[var\_tp\_est\_low\]).
To prove the upper bound in (\[var\_tp\_est\_up\]), we argue as follows. Using (\[t\_split\]) and the identity $(\sum_{1 \leq i \leq k}v_i)^2 \leq k\sum_{1 \leq i \leq k} v_i^2,$ we have $$\label{var_tp_est_up2}
var_{conf}(T(\underline{p})) \leq (k+1)\sum_{j=1} ^{k} var_{conf}(T_j) + (k+1)var_{conf}(R_k).$$ We have $$\begin{aligned}
var_{conf}(R_k) &\leq& \mathbb{E}_{conf}R_k^2 \nonumber\\
&=& \mathbb{E}_{conf}\left(\sum_{j=k+1}^{r-1}T_j\right)^{2} \nonumber\\
&=& \sum_{j_1 = k+1}^{r-1}\sum_{j_2 = k+1}^{r-1}\mathbb{E}_{conf}T_{j_1}T_{j_2} \nonumber\\
&\leq& \sum_{j_1 = k+1}^{r-1}\sum_{j_2 = k+1}^{r-1}\mathbb{E}_{conf}(1-p)^{j_1+j_2} \label{r_k_est}\end{aligned}$$ where the final estimate follows using (\[cross\_est2\]).
Using the geometric summation formula we have that the final term in (\[r\_k\_est\]) is $$\mathbb{E}_{conf} \sum_{j_1 = k+1}^{r-1}\sum_{j_2 = k+1}^{r-1}(1-p)^{j_1+j_2} \leq \mathbb{E}_{conf} \frac{(1-p)^{2k+2}}{p^2} \leq \frac{1}{p_{min}^2}\mathbb{E}(1-p)^{2k+2}.$$ Substituting the above into (\[var\_tp\_est\_up2\]), we have $$\begin{aligned}
var_{conf}(T(\underline{p})) &\leq& (k+1)\sum_{j=1}^{k} var_{conf}(T_j) + (k+1)\frac{1}{p_{min}^2}\mathbb{E}(1-p)^{2k+2} \nonumber\\
&\leq& (k+1)\sum_{j=1}^{k} var_{conf}(T_j) + \epsilon \nonumber\\
&\leq& (k+1)\sum_{j=1}^{k} (1-b_j) + \epsilon \label{est_up3}\end{aligned}$$ for all $n$ large, provided $k = k(\epsilon) \geq 1$ is large. The final estimate in (\[est\_up3\]) follows from the upper bound for the variance of $T_j$ in (\[var\_est\_tj\]). ${\hfill{\ \ \rule{2mm}{2mm}} \vspace{0.2in}}$
The following is the main result of this subsection.
\[lem2\] Let $\Pi$ be a random detection scheme with distribution $\mathbb{P}_{sch}.$ The following conditions are equivalent.\
$(i)$ The term $$\label{cond_i}
var_{conf}(T(\underline{p})) \longrightarrow 0$$ as $ n \rightarrow \infty.$\
$(ii)$ The term $$\label{cond_ii}
T(\underline{p}) - \mathbb{E}_{conf}T(\underline{p}) \longrightarrow 0$$ in probability, as $n \rightarrow \infty.$\
$(iii)$ For every fixed $k \geq 1,$ we have $b_k = b_k(n) \longrightarrow 1$ as $n \rightarrow \infty.$ Here $b_k$ is as defined in (\[bj\_def\]).
*Proof of Lemma \[lem2\]*: From (\[var\_tp\_est\_up\]), we have that $T(\underline{p}) = T_n(\underline{p})$ is a sequence of uniformly integrable (u.i.) random variables and so condition $(i)$ is equivalent to condition $(ii).$ Again using the upper bound in (\[var\_tp\_est\_up\]), we have that if condition $(iii)$ holds, then condition $(i)$ holds.
Suppose now that condition $(iii)$ does not hold. There exists an integer $k_0 \geq 1, \epsilon_0 > 0$ and a sequence $\{n_j\}$ such that $b_{k_0} = b_{k_0}(n_j) \leq 1-\epsilon_0$ for all $j$ large. From the lower bound in (\[var\_tp\_est\_low\]), we then have that condition $(i)$ also does not hold. ${\hfill{\ \ \rule{2mm}{2mm}} \vspace{0.2in}}$
We need the following Lemma for future use.
\[lem\_yn\] Let $\{Y_n\}$ be a set of random variables with $\mu_n = \mathbb{E} Y_n$ and\
$\sup_n \mathbb{E}Y_n^2 <\infty.$ Suppose for every $\epsilon > 0$ we have $$\label{cond_yn}
\mathbb{P}\left(Y_n < \mu_n + \epsilon\right) \longrightarrow 1$$ as $n \rightarrow \infty.$ We then have for every $\epsilon >0$ that $$\label{res_yn}
\mathbb{P}\left(Y_n > \mu_n - \epsilon\right) \longrightarrow 1$$ as $n \rightarrow \infty.$
*Proof of Lemma \[lem\_yn\]*: Suppose (\[res\_yn\]) does not hold. There exists $\epsilon_0,\delta_0 >0$ and a subsequence $\{n_k\}$ such that $$\label{del_0_def}
\mathbb{P}\left(Y_{n_k} > \mu_{n_k} - \epsilon_0\right) \leq 1-\delta_0$$ for all $k$ large. Letting $F_{n_k} = \{Y_{n_k} > \mu_{n_k} - \epsilon_0\},$ we then have $$\begin{aligned}
\mathbb{E}Y_{n_k} &=& \mathbb{E}Y_{n_k}{1\hspace{-2.3mm}{1}}(F_{n_k}) + \mathbb{E}Y_{n_k}{1\hspace{-2.3mm}{1}}(F^{c}_{n_k}) \nonumber\\
&\leq& \mathbb{E}Y_{n_k}{1\hspace{-2.3mm}{1}}(F_{n_k}) + (\mu_{n_k} - \epsilon_0)\mathbb{P}(F_{n_k}^c)\label{up1}\end{aligned}$$ We evaluate the first term in (\[up1\]) as follows. Fix $\epsilon >0$ and let $G_{n_k} = \{Y_{n_k} < \mu_{n_k} + \epsilon\}.$ We have that $$\begin{aligned}
\mathbb{E}Y_{n_k}{1\hspace{-2.3mm}{1}}(F_{n_k}) &=& \mathbb{E}Y_{n_k} {1\hspace{-2.3mm}{1}}(F_{n_k} \cap G_{n_k}) + \mathbb{E}Y_{n_k} {1\hspace{-2.3mm}{1}}(F_{n_k} \cap G_{n_k}) \nonumber\\
&\leq& (\mu_{n_k} + \epsilon)\mathbb{P}(F_{n_k} \cap G_{n_k}) + \mathbb{E}Y_{n_k} {1\hspace{-2.3mm}{1}}(F_{n_k} \cap G^c_{n_k}) \nonumber\\
&\leq& (\mu_{n_k} + \epsilon)\mathbb{P}(F_{n_k}) + \mathbb{E}Y_{n_k} {1\hspace{-2.3mm}{1}}(F_{n_k} \cap G^c_{n_k}). \label{up22}\end{aligned}$$ The final term in (\[up22\]) is bounded above using the Cauchy-Schwarz inequality as $$\begin{aligned}
\left(\mathbb{E}Y^2_{n_k}\right)^{\frac{1}{2}}\left(\mathbb{P}\left(F_{n_k} \cap G^c_{n_k}\right)\right)^{\frac{1}{2}}
&\leq& C\left(\mathbb{P}\left(F_{n_k} \cap G^c_{n_k}\right)\right)^{\frac{1}{2}} \nonumber\\
&\leq& C\left(\mathbb{P}\left(G^c_{n_k}\right)\right)^{\frac{1}{2}} \nonumber\\
&\leq& C\sqrt{\epsilon} \label{up_33}\end{aligned}$$ for all $k$ large. Here $C = \sup_n \mathbb{E}Y^2_n < \infty$ is a constant and the final estimate follows using (\[cond\_yn\]).
Using (\[up\_33\]) into (\[up22\]) we have $$\mathbb{E}Y_{n_k}{1\hspace{-2.3mm}{1}}(F_{n_k}) \leq (\mu_{n_k} + \epsilon)\mathbb{P}(F_{n_k}) + C \sqrt{\epsilon}$$ for all $k$ large. Using the above in (\[up1\]), we have $$\begin{aligned}
\mathbb{E}Y_{n_k} &\leq& \mu_{n_k} + \epsilon\mathbb{P}(F_{n_k}) - \epsilon_0 \mathbb{P}(F^c_{n_k}) \nonumber\\
&\leq&\mu_{n_k} + \epsilon - \epsilon_0 \delta_0 \nonumber\end{aligned}$$ for all $k$ large, where the final estimate follows using (\[del\_0\_def\]). This contradiction the definition that $\mu_n = \mathbb{E}Y_n.$ ${\hfill{\ \ \rule{2mm}{2mm}} \vspace{0.2in}}$
Proof of Theorem \[main\_thm\] {#pf1}
==============================
We first see that $T < \frac{1}{p_{av}}$ is not achievable. Suppose that $T < \frac{1}{p_{av}}$ is achievable. We then have for any fixed $\epsilon >0$ that $$\label{ach_t}
\mathbb{P}_{conf}\left(T(\underline{p}) \geq T+\epsilon\right) \leq \epsilon$$ for all $n$ large. We therefore have $$\begin{aligned}
\mathbb{E}_{conf}(T(\underline{p})) &=& \mathbb{E}_{conf}(T(\underline{p})) {1\hspace{-2.3mm}{1}}(T(\underline{p}) < T+\epsilon)
+ \mathbb{E}_{conf}(T(\underline{p})) {1\hspace{-2.3mm}{1}}(T(\underline{p}) \geq T+\epsilon) \nonumber\\
&\leq& T + \epsilon + (\mathbb{E}_{conf}T^2(\underline{p}))^{\frac{1}{2}} \mathbb{P}_{conf}\left(T(\underline{p}) \geq T+\epsilon\right)^{\frac{1}{2}} \nonumber\\
&\leq& T + \epsilon + C\sqrt{\epsilon} \label{ach_t2}\end{aligned}$$ for some constant $C > 0.$ The final estimate is obtained from (\[ach\_t\]) and the upper bound on the variance of $T(\underline{p})$ in (\[var\_tp\_est\_up\]). Since $\epsilon >0$ is arbitrary and $T < \frac{1}{p_{av}}$ this contradicts (\[e\_conf\]).
We now show that that the $S(\underline{p})$ is arbitrarily close to $1$ if and only if $r(n) \longrightarrow 1$ as $n \rightarrow \infty.$ From (\[prob\_pi\_p\]), we have $$\mathbb{P}^{(\pi,\underline{p})}(T_{det} < \infty)= 1-q_{\pi(1)}\ldots q_{\pi(r)}$$ and so $$\begin{aligned}
S(\underline{p}) &=& 1-\mathbb{E}_{sch}(q_{\pi(1)}\ldots q_{\pi(r)}) \nonumber\\
&\geq& 1-\frac{1}{r}\sum_{k=1}^{r}\mathbb{E}_{sch}q_{\pi(k)}^{r} \label{mid_main}\end{aligned}$$ for all $n$ large. The middle inequality follows using the arithmetic-geometric inequality $$x_1\ldots x_r \leq \frac{1}{r}\sum_{k=1}^{r}x_k^r$$ for positive numbers $\{x_i\}.$
Taking average over all configurations $\underline{p}$ we have $$\begin{aligned}
\sum_{\underline{p}} S(\underline{p})\mathbb{P}_{conf}(\underline{p})
&\geq& 1-\mathbb{E}_{conf}\frac{1}{r}\sum_{k=1}^{r}\mathbb{E}_{sch}\left(q_{\pi(k)}^{r}\right) \label{mid_main2}\\
&=& 1-\frac{1}{r}\sum_{k=1}^{r}\mathbb{E}_{sch}\mathbb{E}_{conf}\left(q_{\pi(k)}^{r}\right) \nonumber\\
&=&1 - \mathbb{E}_{conf}(q_{1}^{r}) \nonumber\\
&\longrightarrow& 1 \label{fin_2main}\end{aligned}$$ as $n \rightarrow \infty.$ The final estimate follows since $r(n) \longrightarrow \infty$ and $q_1 = 1-p_1 < 1$ since $p_1 > 0$ for all $p_1$ in the finite set $\Omega_{conf}.$
Letting $$A(\epsilon) := \{\underline{p} : S(\underline{p}) > 1-\epsilon\},$$ we evaluate $$\begin{aligned}
\label{two_sum}
\sum_{\underline{p}} S(\underline{p})\mathbb{P}_{conf}(\underline{p}) &=& I_1 + I_2\end{aligned}$$ where $$I_1 = \sum_{ \underline{p} \in A(\epsilon)} S(\underline{p})\mathbb{P}_{conf}(\underline{p}) \leq \mathbb{P}_{conf}(A(\epsilon))$$ and $$I_2 = \sum_{\underline{p} \notin A(\epsilon)} S(\underline{p}) \mathbb{P}_{conf}(\underline{p}) \leq \epsilon.$$
In particular, we have from (\[two\_sum\]) and (\[fin\_2main\]) that $$\label{a_eps_est}
\mathbb{P}_{conf}(A(\epsilon)) \geq I_1 \geq 1-2\epsilon$$ for all $n$ large.
We now show that $\frac{1}{p_{av}}$ is achievable if and only if $(i)$ and $(ii)$ stated in Theorem \[main\_thm\] hold. Using Lemmas \[lem1\] and \[lem2\] and (\[a\_eps\_est\]) above, we have that if $(i)-(ii)$ hold and $r(n) \longrightarrow \infty$ as $n \rightarrow \infty,$ then $\frac{1}{p_{av}}$ is achievable.
Suppose now that $\frac{1}{p_{av}}$ is achievable. For a fixed $\epsilon > 0,$ we have using (\[cap\_def\]) that $$\label{ach_pp}
\mathbb{P}_{conf}\left(T(\underline{p}) \leq \frac{1}{p_{av}} + \epsilon\right) \longrightarrow 1$$ as $n \rightarrow \infty.$ Using (\[e\_conf\]), we obtain that $$\label{t_yn}
\mathbb{P}_{conf}\left(T(\underline{p}) \leq \mathbb{E}_{conf}T(\underline{p}) + 2\epsilon\right) \longrightarrow 1$$ Using Lemma \[lem\_yn\] with $Y_n = T(\underline{p}) = T_n(\underline{p})$ we have for every $\epsilon >0$ that $$\label{t_yn}
\mathbb{P}_{conf}\left(T(\underline{p}) \geq \mathbb{E}_{conf}T(\underline{p}) - 2\epsilon\right) \longrightarrow 1$$ as $n \rightarrow \infty.$ The Lemma \[lem\_yn\] is applicable since $\sup_n \mathbb{E}_{conf}T^2(\underline{p}) < \infty$ using the upper bound in (\[var\_tp\_est\_up\]) and the upper bound in (\[e\_conf\]).
From the above we have that $$\label{conv_prob_t}
T(\underline{p}) - \mathbb{E}_{conf}T(\underline{p}) \longrightarrow 0$$ in probability. From Lemma \[lem2\] we have that condition $(ii)$ holds. Again using (\[ach\_pp\]), (\[conv\_prob\_t\]) and (\[e\_conf\]), we have that $$\mathbb{E}_{conf}T(\underline{p}) \longrightarrow \frac{1}{p_{av}}$$ as $n \rightarrow \infty.$ This implies from Lemma \[lem1\] that condition $(i)$ holds. ${\hfill{\ \ \rule{2mm}{2mm}} \vspace{0.2in}}$
Acknowledgement {#acknowledgement .unnumbered}
---------------
I thank Professors Rahul Roy and Federico Camia for crucial comments and for my fellowships.
[10]{}
S. Haykin. (2005). . ,**3**, No. 2, pp. 201–220.
R. Tandra and A. Sahai. (2005). . , **1**, pp. 464–469.
T. Yucek and H. Arslan. (2009). . ,**11**, pp. 116–130.
P. Balister,B. Bollobas, M. Haenggi, A. Sarkar and M. Walters. (2015). . , **1**, 1–9, DOI: 10.1504/IJSNET.2015.10001255.
[^1]: E-Mail: `gganesan82@gmail.com`
|
Auto Maintenance Makes Summer Vacations Less Stressful
Vacation time – some of the best family memories happen during summer vacation and taking road trips together. Remember all the Are we there yet questions and the different activities you planned to ward off boredom during the final hours? The drive is often worth the experience, especially if you’ve planned a longer trip and can see more of the countryside while driving to your destination.
An important part of planning summer vacations is taking care of your vehicle before you leave. Good auto maintenance prior to a road trip can ensure safer travels and protection from breakdowns. Here are some areas to pay attention to, especially the tires, the engine components, and the battery.
Proper tire maintenance is critical for a road trip, especially a long one. Correct tire inflation can have an impact on gas mileage. If tires aren’t inflated according to specified psi’s then you could also risk a blowout. Blowouts can also happen because the tires are getting worn out. Take time to measure the tread to be sure it’s still within safe limits; and look for uneven spots where the tread is worn thin. Tire balance and alignment can make a huge different in the comfort of the ride, so check when the last time this was performed, and schedule it as maintenance before you leave for your trip.
A car’s engine is made up of many parts, and there are a lot of them that you can’t do anything with yourself – it takes a qualified mechanic to break down an engine for repairs. However, you can check or test a few things under the hood to see if they are safe for a vacation drive.
The belts in the engine area help connect systems together, and if there is one belt that is worn or frayed, it can bog down the overall performance of the entire engine. Examine belts for cracks, and replace them if any are seen.
Fluid levels are important, especially coolant levels during hot summer driving. Make sure you have the proper mix of coolant for your vehicle, and the levels are topped off to the recommended amounts. While you’re checking fluid levels, make sure the washer fluid reservoir is full, and now would be a good time to check the wiper blades to be sure they aren’t worn or cracked.
If the battery under your hood isn’t performing, it can put a damper on summertime driving. Most people think that batteries take a beating during cold winter months, but summer temperatures can also challenge the battery. Scrub the battery terminal connections to remove possible corrosion. Your auto mechanic can tell you how strong the charge is in the battery, and most batteries have a recommended life span before replacement is needed.
Planning a summer vacation is fun; just remember to plan time for auto maintenance before your trip to avoid delays during the trip! |
<?xml version="1.0" encoding="utf-8"?>
<browserconfig>
<msapplication>
<tile>
<square70x70logo src="{{asset 'img/favicons/mstile-70x70.png'}}"/>
<square70x70logo src="{{asset 'img/favicons/mstile-150x150.png'}}"/>
<square70x70logo src="{{asset 'img/favicons/mstile-310x310.png'}}"/>
<square70x70logo src="{{asset 'img/favicons/mstile-310x150.png'}}"/>
<TileColor>#da532c</TileColor>
</tile>
</msapplication>
</browserconfig>
|
$1,100.00 per month includes utilities. 1 bedroom, 1 bath. Available through end of May 2019. Beautifully decorated one bedroom located within one block to the beach/boardwalk. This property is fully furnished, with a kitchen and living room. The living room features and electric fireplace. There is an on-site coin operated laundry room, and reserved parking for your vehicle. Walk or bike to one of the many nearby restaurants, stores and attractions. Bedroom 1: 2 singles, Living room: Sleep Sofa Winter Rental. NO PETS, NO SMOKING call Amber Parker 757-428-4441. |
All relevant data are within the paper and its Supporting Information files.
Introduction {#sec001}
============
Myocardial ischemia represents a severe cellular stress that triggers dramatic biochemical and metabolic changes in the heart. The generation of reactive oxygen species (ROS) during ischemia \[[@pone.0161068.ref001]--[@pone.0161068.ref003]\] initiates the oxidation and modification of cellular proteins by lipid hydroperoxides \[[@pone.0161068.ref004]\] that eventually produce irreversible cell damage and death. The length of the ischemic period is a critical determinant of cell survival or death. Reperfusion is essential to keep cells alive, but the burst of ROS generation and calcium overload that takes place upon reperfusion further increases cellular damage \[[@pone.0161068.ref005],[@pone.0161068.ref006]\].
Protein degradation during ischemia provides aminoacids to be used as substrates for mitochondrial energy production and avoids the accumulation of toxic aggregates. Proteasomes are proteolytic complexes responsible for the degradation of over 90% of cellular proteins. The 26S proteasome, composed by the 20S catalytic core plus the 19S regulatory complex, mediates the ATP-dependent degradation of ubiquitinated proteins while the 20S proteasome, that contains the catalytic subunits, degrades oxidized proteins independent of ubiquitination. Both, the 20S proteasome and the 26S proteasome coexist in the heart \[[@pone.0161068.ref007],[@pone.0161068.ref008]\]. Inhibition of the proteasome as a pharmacological strategy to prevent cell damage in ischemia reperfusion has produced conflicting results. Several studies report that the activity of the 26S proteasome decreases after ischemia reperfusion \[[@pone.0161068.ref009]--[@pone.0161068.ref011]\] and that further pharmacological inhibition produces more damage \[[@pone.0161068.ref012]\]. Conversely, an increasing number of studies have shown that proteasome inhibitors protect the heart from IR damage \[[@pone.0161068.ref013]--[@pone.0161068.ref016]\].
The decrease in cellular ATP content that occurs during ischemia promotes the dissociation of the 20S catalytic core from its associated regulatory particles in the 26S proteasome \[[@pone.0161068.ref017]\]. There is scarce information on the activity of the 20S proteasome during ischemia. Accordingly, the aim of this work was to determine this activity in isolated rat hearts and to evaluate the effect of ixazomib, the first oral proteasome inhibitor approved by the FDA for the treatment of multiple myeloma, on ischemia reperfusion injury.
Methods {#sec002}
=======
Male Sprague-Dawley (SD) rats (220--240 g) were obtained from the animal facility of the School of Medicine, University of Chile. Rats were kept at a temperature of 22 ± 3°C and 12 h light-dark cycle, with free access to standard food and water. All procedures in this study conform to the Guide for the Care and Use of Laboratory Animals, published by the U.S. National Institutes of Health (NIH, Publication No. 85--23, revised in 1996), and were approved by the Institutional Ethics Committee of the School of Medicine, Universidad de Chile (Protocol CBA\#0399FMUCH).
Experimental protocol {#sec003}
---------------------
SD male rats were anesthetized with pentobarbital (80 mg/kg, intraperitoneal) and heparin 100 U/kg was injected into the right atria. The heart was rapidly excised, mounted in a temperature regulated heart chamber and perfused at 37°C via the ascending aorta using a peristaltic infusion pump at a constant flow of 10--14 mL/min. The Krebs Henseleit solution contained (in mmol/L): 128.3 NaCl, 4.7 KCl, 1.35 CaCl~2~, 1.1 MgSO~4~, 20.2 NaHCO~3~, 0.4 NaH~2~PO~4~, pH 7.4, and 11.1 glucose, equilibrated with a gas mixture of 95% O~2~/5% CO~2~. Left ventricular hemodynamic parameters were measured with a latex balloon inserted into the left ventricle and connected to a pressure transducer. After 20 min of stabilization, the hearts were subjected to 30 min of global ischemia at 37°C. Hearts were either frozen in liquid N~2~ immediately after ischemia or perfused with Krebs Henseleit oxygenated solution for 60 min before freezing. The proteasome inhibitor ixazomib (MLN 9708, Selleckchem, Houston, TX, USA) was perfused during 10 min before ischemia at concentrations of 0.1 or 1μmol/L. To compare with published data, MG132 (Merck Millipore, Billerica, MA, USA) was perfused as above at concentrations of 0.5 or 6 μmol/L. Control hearts, not subjected to ischemia, were perfused with or without proteasome inhibitors for 50 (control for ischemia) or 110 min (control for ischemia--reperfusion). At the end of the reperfusion period, hearts were snap frozen in liquid N~2~ or perfused with triphenyl tetrazolium (TTC) to measure the infarct size.
Preparation of whole ventricle homogenates {#sec004}
------------------------------------------
Frozen ventricles were reduced to powder under liquid N~2~ and homogenized under slightly different conditions according to the ensuing biochemical determination. To measure the activity of the proteasome, frozen tissue powder was homogenized in 5 volumes of a solution containing (in mmol/L) 50 NaCl, 1 Na~2~EDTA, 10 HEPES-NaOH, pH 8.0, 250 Sucrose, 0.2% Triton X-100, as described \[[@pone.0161068.ref018]\]. This fraction was prepared without reducing agents or protease inhibitors just before the determination of proteasome activity.
To measure \[^3^H\]-ryanodine binding, the frozen powder was homogenized in 4 volumes of a solution containing (in mmol/L) 300 sucrose, 20 MOPS-Tris buffer, pH 7.0, with protease inhibitors (1 mmol/L PMSF, 1 mmol/L benzamidine, 2 μg/mL leupeptine, 1 μg/mL pepstatin). Unbroken cells and debris were eliminated by centrifugation at 600 x g for 10 min, at 4°C. The supernatant (whole homogenate) was fractioned into small aliquots, frozen in liquid N~2~ and kept at -80°C. For western blot analysis, the frozen tissue was homogenized as above, but the buffer contained in addition 2 mmol/L EDTA, 2 mmol/L EGTA and the detergents NP-40 (1%) and SDS (1%). The supernatant was recovered by centrifugation at 1000 x g for 20 min at 4°C. Aliquots were frozen in liquid N~2~ and kept at -80°C as above. Protein concentration was determined by the method of Hartree \[[@pone.0161068.ref019]\].
Proteasome activity {#sec005}
-------------------
The three main peptidase activities of the proteasome were determined in the absence of reducing agents as described before \[[@pone.0161068.ref018]\]. Briefly, heart homogenates (0.3 mg protein/mL) were incubated with fluorogenic proteasome substrates in a solution containing (mmol/L) 50 NaCl, 1 EDTA, 250 sucrose, 10 HEPES-NaOH, pH 8.0. The substrates used were Suc-LLVY-amc (21 μmol/L) for chymotrypsin-like activity, Z-LLE-amc (105 μmol/L) for caspase-like activity and Boc-LSTR-amc (34 μmol/L) for trypsin-like activity. Fluorescence was measured at 30°C in a plate reader at 380 nm excitation / 440 nm emission wavelengths. Non-specific proteolysis was determined in the presence of MG132 (30 μmol/L). All proteasome substrates were obtained from Sigma-Aldrich (St Louis, MI).
Western blots {#sec006}
-------------
Proteins were separated by electrophoresis in 3%--8% Tris-Acetate gels (Criterion XT, Bio-Rad, Hercules, CA) under reducing conditions. After transfer to polyvinylidene difluoride membranes, proteins were probed with anti-RyR2 antibody (Thermo Scientific; Rockford, IL) or anti-caspase-3 antibody (Cell Signaling Technology Inc. Danvers, MA). Anti-GAPDH antibody (Sigma-Aldrich, St Louis, MI) was used as loading control. The bands were quantified by densitometry and the results were normalized with respect to controls run in the same gel.
\[^3^H\]-Ryanodine binding {#sec007}
--------------------------
\[^3^H\]-ryanodine binding was measured in whole homogenates from frozen hearts (0.5 mg protein/mL) following 90 min incubation at 37°C with 10 nM \[^3^H\]-ryanodine (Perkin Elmer, Boston, MA) in 150 mol/L KCl, 0.5 mmol/L AMPPNP at pCa 5, as previously described \[[@pone.0161068.ref020]\].
Infarct size {#sec008}
------------
Infarct size was assessed by the triphenyltetrazolium chloride (TTC, Sigma-Aldrich, St Louis, MI) technique as described \[[@pone.0161068.ref021]\].
Statistical analysis {#sec009}
--------------------
Data are expressed as mean ± S.E.M. Statistical data were analyzed by ANOVA followed by Tukey post test. Differences were considered significant at p\<0.05.
Results {#sec010}
=======
Dose dependent effects of proteasome inhibitors on hemodynamic parameters and infarct size after ischemia reperfusion {#sec011}
---------------------------------------------------------------------------------------------------------------------
The divergent effects of proteasome inhibitors on the cardiac parameters after IR reported in the literature may arise from different models that employ different types and concentrations of inhibitors. We therefore compared the effect of ixazomib with the widely used classical proteasome inhibitor MG132. In the absence of inhibitors, isolated rat hearts subjected to 30 minutes of non-flow global ischemia at 37°C displayed a severe contractile dysfunction upon reperfusion. After 60 minutes of reperfusion, the left ventricular developed pressure (LVDP, [Fig 1A](#pone.0161068.g001){ref-type="fig"}) and the maximum rate of left ventricular pressure rise (+dP/dt, [Fig 1B](#pone.0161068.g001){ref-type="fig"}) decreased by 85 and 90%, respectively, relative to the pre ischemic values. Perfusion of hearts with ixazomib for 10 minutes before ischemia produced a biphasic effect: at low concentration (0.1 μmol/L), ixazomib significantly improved LVDP ([Fig 1A](#pone.0161068.g001){ref-type="fig"}) and +dP/dt after IR ([Fig 1B](#pone.0161068.g001){ref-type="fig"}). At high concentration (1 μmol/L), however, this protective effect was lost and both, LVDP and +dP/dt, were not different to the values found after IR in the absence of inhibitor ([Fig 1A and 1B](#pone.0161068.g001){ref-type="fig"}). The same effect, protection at low concentration (0.5 μmol/L) and loss of protection at high concentration (6 μmol/L), was observed when MG132 was administered before ischemia ([Fig 1A and 1B](#pone.0161068.g001){ref-type="fig"}). At the concentrations used in this work, neither ixazomib nor MG132, at 0.5 μmol/L, produce significant changes in hemodynamic parameters in control hearts, not subjected to ischemia ([S1 Fig](#pone.0161068.s001){ref-type="supplementary-material"}). To corroborate the protective effect of a low concentration of proteasome inhibitors, we measured the infarct size after IR. In the absence of inhibitors, the infarct size was 39±8% of the cardiac volume ([Fig 2](#pone.0161068.g002){ref-type="fig"}). MG132 and ixazomib significantly reduced the infarct size to15±8% and 24±6% of the heart volume, respectively, when administered at a low concentration, but did not protect at higher concentration ([Fig 2](#pone.0161068.g002){ref-type="fig"}). Therefore, ixazomib and MG132 exert a similar dose dependent cardioprotective effect. For this reason we used only ixazomib in most of the following experiments. No measurable infarction was detected in control hearts, perfused with Krebs Henseleit solution with or without proteasome inhibitors.
{#pone.0161068.g001}
{#pone.0161068.g002}
Determination of proteasome activity {#sec012}
------------------------------------
The results shown above suggest that proteasomes are key players in the damage induced by IR and the biphasic effect of the inhibitors may be produced by different inhibition of proteasome peptidases at the different concentrations of ixazomib or MG132 used. Reports in the literature consistently show decreased proteasome activity after reperfusion (reviewed in \[[@pone.0161068.ref022]\]), but there is less information on the effect of ischemia on proteasome activity. Therefore we determined the effect of ixazomib on the activities of the 20S proteasome at the end of ischemia or at the end of the reperfusion period. We made the novel observation that after 30 minutes of ischemia in the absence of inhibitor, and before reperfusion, the chymotrypsin like (CT--like) activity was significantly increased by 50% compared to the value observed in control hearts ([Fig 3A](#pone.0161068.g003){ref-type="fig"}). Ischemia did not produce changes in the caspase-like (C-like) or the trypsin-like (T-like) activities of the proteasome ([Fig 3B and 3C](#pone.0161068.g003){ref-type="fig"}). In contrast, after reperfusion all three main activities of the proteasome were significantly inhibited. On average, we observed reductions of 53%, 30% and 23% for CT-like, C-like and T-like activities respectively ([Fig 3A--3C](#pone.0161068.g003){ref-type="fig"}). In hearts perfused with ixazomib, 0.1 μmol/L, the CT-like activity was reduced approximately by half of the basal value both, in control and after 30 min of ischemia. Ixazomib did not caused further reduction of this activity upon reperfusion ([Fig 3A](#pone.0161068.g003){ref-type="fig"}). The C-like and the T-like activities of the proteasome were not inhibited by ixazomib 0.1 μmol/L, compared to the same condition without the inhibitor ([Fig 3B and 3C](#pone.0161068.g003){ref-type="fig"}). Increasing ixazomib to 1 μmol/L produced a further reduction in CT-like activity to about 25% of the basal value ([Fig 3A](#pone.0161068.g003){ref-type="fig"}) and also inhibited the C-like activity to less than 10% of the activity in the absence of inhibitor ([Fig 3B](#pone.0161068.g003){ref-type="fig"}). In contrast, perfusion of hearts with ixazomib 1 μmol/L increased the T-like activity of the proteasome in control hearts by 47% ([Fig 3C](#pone.0161068.g003){ref-type="fig"}). After 30 min of ischemia, the T-like activity remained significantly elevated but decreased after reperfusion to the value observed in the absence of inhibitor ([Fig 3C](#pone.0161068.g003){ref-type="fig"}). In summary, a low concentration of ixazomib (0.1 μmol/L), prevents the increase in CT-like activity induced by ischemia without inhibiting the C-like or T-like activities, while a higher concentration of ixazomib (1 μmol/L) significantly reduces both, the CT-like and C-like activities and increases the T-like activity of the proteasome under basal conditions and this activity remained elevated after 30 min of ischemia. Besides, ixazomib increased the content of ubiquitinated proteins in whole ventricle homogenates of control hearts in a dose dependent manner ([S2 Fig](#pone.0161068.s002){ref-type="supplementary-material"}), indicating that proteasomes were effectively inhibited by the concentrations used in this work. These results suggest that partial inhibition of CT-like activity during ischemia protects from IR damage, but simultaneous inhibition of CT-like and C-like activities is detrimental. The simultaneous increase in T-like activity may also contribute to the loss of the protective effect of ixazomib.
{#pone.0161068.g003}
Effect of proteasome inhibition on RyR2 protein content {#sec013}
-------------------------------------------------------
RyR2, the calcium release channel of the sarcoplasmic reticulum is reduced by half after myocardial ischemia in adult hearts \[[@pone.0161068.ref023],[@pone.0161068.ref024]\] or after simulated IR in neonatal cardiomyocytes \[[@pone.0161068.ref025]\]. MG132 preserves the content of RyR2 in neonatal cardiomyocytes, suggesting that proteasomes are involved in the reduction of this protein during ischemia \[[@pone.0161068.ref025]\]. Therefore, we used RyR2 as a representative protein to corroborate the protective effect of ixazomib during ischemia. We measured RyR2 activity and protein content after ischemia or reperfusion by measuring the binding of \[^3^H\]-ryanodine and by performing western blots analysis of whole heart ventricles. We found that 30 minutes of global ischemia caused 50% decrease in \[^3^H\]-ryanodine binding density. No further decrease was observed upon reperfusion ([Fig 4A](#pone.0161068.g004){ref-type="fig"}). MG132, 0.5 μM, prevented the decrease in \[^3^H\]-ryanodine binding when perfused before ischemia but not when added from the very start of reperfusion ([Fig 4A](#pone.0161068.g004){ref-type="fig"}, red bars). Ixazomib, which did not modify \[^3^H\]-ryanodine binding in control hearts, prevented the decrease in \[^3^H\]-ryanodine binding when perfused before ischemia at 0.1 μmol/L but not at 1 μmol/L ([Fig 4B](#pone.0161068.g004){ref-type="fig"}). Since ryanodine binds preferentially to the open conformation of RyR2, its binding depends on the functional state of the channels. To test if the decrease in \[^3^H\]-ryanodine binding represents a true decrease in RyR2 protein content and does not result from RyR2 modifications that occurred during ischemia and affected the opening of the channel, we also quantified RyR2 content in western blots. As shown in [Fig 5](#pone.0161068.g005){ref-type="fig"}, RyR2 protein content decreased by 50% after ischemia and remained at this level after reperfusion; the presence of ixazomib during ischemia prevented the decrease in RyR2 at 0.1 but not at 1 μmol/L. These results strongly suggest that preventing the increase in CT-like activity of the proteasome with ixazomib avoids the loss of RyR2 and other cellular proteins producing the observed beneficial effects.
![Effect of proteasome inhibitors on \[^3^H\]-ryanodine binding.\
Panel A. Specific \[^3^H\]-ryanodine binding was measured in whole ventricle homogenates obtained in controls (C, white bars), after 30 min of ischemia (I, black bars) or after 30 min of ischemia followed by 60 minutes of reperfusion (IR, grey bars). MG132 was perfused at 0.5 μmol/L before ischemia (red bar, I) or from the very start of reperfusion (red bar, R). Values represent the mean ± S.E.M of different heartsas indicated in each bar \*: p\< 0.05 vs control or vs I + MG132. Panel B. Specific \[^3^H\]-ryanodine binding measured in hearts with the indicated concentration of ixazomib (ixa) perfused before ischemia. Values represent the mean ± S.E.M of values obtained in different hearts as indicated in each bar. \*: p\< 0.05 vs control.](pone.0161068.g004){#pone.0161068.g004}
{#pone.0161068.g005}
Activation of caspase 3 by ixazomib {#sec014}
-----------------------------------
Inhibition of the proteasome induces apoptosis in different cells \[[@pone.0161068.ref026]--[@pone.0161068.ref028]\] and the loss of protection by stronger inhibition of the proteasome during myocardial ischemia suggests that a cell death program was activated in this condition. We explored this possibility by measuring caspase-3, an executioner caspase that mediates cellular apoptosis. As shown in [Fig 6](#pone.0161068.g006){ref-type="fig"}, a low concentration of ixazomib did not change the cleaved caspase-3 ([Fig 6A and 6B](#pone.0161068.g006){ref-type="fig"}) or procaspase-3 content ([Fig 6A and 6C](#pone.0161068.g006){ref-type="fig"}) in controls, after ischemia or after ischemia reperfusion; in contrast, ixazomib at 1 μM, increased both, the active caspase-3 content ([Fig 6A and 6B](#pone.0161068.g006){ref-type="fig"}) and the total procaspase-3 ([Fig 6A and 6C](#pone.0161068.g006){ref-type="fig"}) in hearts subjected to ischemia and in control hearts as well. The increase in active caspase-3 suggests that apoptosis was activated in these hearts with the consequent increase in protein degradation and cell death. The apparent normality of control hearts perfused with high concentration of ixazomib, in spite of the increased active caspase-3, is discussed below.
{#pone.0161068.g006}
Discussion {#sec015}
==========
Our results show that thirty minutes of warm ischemia in isolated rat hearts causes the death of almost 40% of the heart and a poor recovery of hemodynamic parameters upon reperfusion. We found that the CT-like activity of the 20S proteasome increases significantly after 30 min of ischemia, and decreases below control values after reperfusion. The C-like and T-like activities, which did not change during ischemia, decreased as well after reperfusion. These results suggest that the CT-like activity of the proteasome is a privileged target of ischemia-induced injury. The partial inhibition of CT-like activity during ischemia (to 50% of the control value) produced by ixazomib reduced the infarct size by half and produced a significant recovery of hemodynamic parameters, suggesting that during ischemia the 20S proteasome degrades key cellular proteins, such as RyR2, and promotes cell dysfunction and death. Protection was completely lost when the simultaneous inhibition of CT-like and C-like activity was achieved by a higher concentration of ixazomib, which caused a simultaneous activation of T-like activity.
Ixazomib belongs to the second-generation of proteasome inhibitors and it has been recently approved by the FDA for the treatment of multiple myeloma. It inhibits preferentially the CT-like activity of the proteasome over the caspase-like activity (IC50 values of 3.4 and 31 nmol/L, respectively). A higher concentration is required for the inhibition of the T-like activity (IC50 3.5 μmol/L) \[[@pone.0161068.ref029]\]. The inhibition of the proteasome activities observed in this study is in agreement with these reported inhibitory constants. Further kinetic analysis would be necessary to clarify the molecular basis of the increase in T-like activity observed at the higher concentration of ixazomib. Nevertheless, asimultaneous inhibition of CT-like activity and enhancement of T-like activity is also produced by the inhibitor of the human immunodeficiency virus, type I (HIV-I) protease, ritonavir \[[@pone.0161068.ref030]\]. This effect would be produced by the binding of ritanovir to a non-catalytic modifier site of the proteasome \[[@pone.0161068.ref030]\]. A similar mechanism could explain the increase in T-like activity produced by ixazomib.
Previous studies report beneficial \[[@pone.0161068.ref013],[@pone.0161068.ref014],[@pone.0161068.ref031]\], or deleterious \[[@pone.0161068.ref009],[@pone.0161068.ref010],[@pone.0161068.ref012]\] effects of proteasome inhibitors on cardiac IR. The activity of the proteasome was not measured in all these studies and differences in the degree of proteasome inhibition, may explain the discrepancies. As shown here, the same inhibitor can improve or worsen cardiac function after an episode of IR, depending on the degree of inhibition of the different peptidases. Those studies that measure proteasome activity consistently found that ischemia-reperfusion decreases the activity of the proteasome \[[@pone.0161068.ref009],[@pone.0161068.ref011],[@pone.0161068.ref012]\]. We confirmed this inhibition in the present work. In contrast, there is not enough information about the activity of the proteasome after ischemia. Some studies report decreased 26S proteasome activity during ischemia (reviewed in \[[@pone.0161068.ref022]\]) and only one study reports that the 20S proteasome is also inhibited after ischemia \[[@pone.0161068.ref012]\]. At difference with that work, we did not use reducing agents in the preparation of heart extracts or in the assay medium. The presence of reducing agents, such as dithiothreitol, may have removed reversible redox modifications like S-glutathionylation that increases the activity of the 20S proteasome \[[@pone.0161068.ref032]\]. In rat hearts kept in Wisconsin solution at 4°C (cold ischemia), the activity of the 26S proteasome increases more than two fold as ATP content decreases during ischemia \[[@pone.0161068.ref033]\]. The inhibition of the proteasome at this stage preserves the ultra structural integrity of the hearts and reduces ischemia-reperfusion injury \[[@pone.0161068.ref033]\] prolonging the viability of the organ for transplant \[[@pone.0161068.ref034]\]. Cold ischemia did not produce changes in the 20S proteasome \[[@pone.0161068.ref033]\]. Warm ischemia (37°C), such as that induced here, is a totally different setting because diverse signaling pathways are activated at the beginning of ischemia before the intracellular media changes extensively. In addition, as the ATP concentration decreases, the disociation of the 26S proteasome may increase the abundance of the 20S proteasome, which actively degrades oxidized proteins independently of ATP \[[@pone.0161068.ref035],[@pone.0161068.ref036]\].
A detailed elucidation of the molecular mechanisms responsible for the increased proteasome activity produced by ischemia is beyond the scope of the present work. Proteasomes are modulated by a number of post translational modifications \[[@pone.0161068.ref037]\] and proteomic studies are needed to further clarify this regulation.
Proteasome inhibitors were deliberately designed to produce apoptosis in cancer cells \[[@pone.0161068.ref038],[@pone.0161068.ref039]\]. Ixazomib induces apoptosis in multiple myeloma cells through activation of caspases and other proapoptotic proteins such as p53, PUMA and Noxa and proteins involved in the endoplasmic reticulum stress pathway \[[@pone.0161068.ref040]\]. The increase in the executioner caspase-3 by ixazomib 1 μM, suggests that apoptosis increases when proteasomes are strongly inhibited during ischemia. The lack of visible deleterious effects in control hearts treated with this concentration of ixazomib suggests that apoptosis takes a longer time to complete in normal cells. In fact, proteasome inhibition-induced apoptosis is potentiated by the generation of reactive oxygen species and by increased calcium concentration \[[@pone.0161068.ref027]\], two conditions that have been amply demonstrated to occur in cardiac ischemia.
In addition, inhibition of the proteasome could have simultaneously activated other cell death pathways such as chaperon mediated autophagy and macroautophagy \[[@pone.0161068.ref041]\] which may have also contributed to the degradation of RyR2 \[[@pone.0161068.ref042]\] and to increase the infarct size upon reperfusion \[[@pone.0161068.ref043]\].
Supporting Information {#sec016}
======================
###### Effect of proteasome inhibition on hemodynamic parameters in control hearts.
\(A\) Left ventricular developed pressure (LVDP) and (B) maximal rates of contraction (+ dP/dt) measured in control hearts with the indicated proteasome inhibitor. Inhibitors were perfused at the indicated concentration in oxygenated Krebs Henseleit solution at 37°C and at 10 mL/min during 10 min. Perfusion continued without inhibitor for 90 min, time at which values were measured. Bars show the mean ± S.E.M of 4 different hearts.
(TIF)
######
Click here for additional data file.
###### Effect of ixazomib on the accumulation of ubiquitinated proteins.
Whole ventricle homogenates were analyzed in Western blots for the presence of ubiquitinated proteins after perfusion with the indicated concentration of ixazomib. Total anti-ubiquitin immunoreactivity of each lane was normalized by the content of GAPDH in the same lane. Anti-ubiquitin antibody was obtained from Cell signaling (Danvers, MA). Bars show Mean ± S.E.M values obtained in different hearts as indicated in the bars. \*: p \< 0.05.
(TIF)
######
Click here for additional data file.
The authors thank Dr. Cecilia Hidalgo for her critical reading of the manuscript. The technical assistance of Guillermo Arce and Rodrigo Durán is gratefully acknowledged.
[^1]: **Competing Interests:**The authors have declared that no competing interests exist.
[^2]: **Conceived and designed the experiments:** GS ZP PD.**Performed the experiments:** GS DB IO JP JAR LM.**Analyzed the data:** GS DB IO JP JAR LM ZP PD.**Contributed reagents/materials/analysis tools:** GS ZP PD.**Wrote the paper:** GS ZP IO JAR PD.
|
Determination of silyl peroxides by ultra-performance liquid chromatography/electrospray ionisation mass spectrometry.
Residual initiators in polymers are a concern in the case of products that come directly into contact with the human body or food. Due to low concentrations and difficulties in the sample preparation, highly sensitive and selective methods are required. A series of bis-silyl- and alkyl-silyl peroxides were analysed by electrospray ionisation mass spectrometry (ESI-MS) on an ultra-performance liquid chromatography/time-of-flight (UPLC/TOF) instrument. Li, Na, K, and NH4 acetates were used to promote the formation of [M + Me]+ ions. The sample preparation involved only dissolution of the polymer sample in 0.1 mL of acetonitrile, followed by precipitation with 1 mL of water. A portion of 0.1-1 μL of the solution was then analysed without further treatment by UPLC/ESI-MS. Limits of detection (LODs) were in the range of 0.06-9 pmol, depending on the peroxide structure. On average, the signal intensity increased with the number of phenyl groups in a peroxide and decreased in the order Na > Li > K > NH4 . Peroxides that did not contain phenyl groups could not be detected. Collision-induced dissociation experiments can be used for structural investigations of alkyl-silyl peroxides. It was possible to detect 2 × 10-4 % (LOD = 7 × 10-5 %) of unreacted Ph3 SiOOt-Bu in the poly(methyl methacrylate) sample. The method is suitable for the analysis of trace peroxide initiators in polymers and for other purposes where LODs in the pmol range are required. |
/*
* Copyright (c) 2020 Cossack Labs Limited
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.cossacklabs.themis.test;
import java.nio.charset.StandardCharsets;
import java.util.Arrays;
import com.cossacklabs.themis.InvalidArgumentException;
import com.cossacklabs.themis.NullArgumentException;
import com.cossacklabs.themis.SecureCell;
import com.cossacklabs.themis.SecureCellData;
import com.cossacklabs.themis.SecureCellException;
import com.cossacklabs.themis.SymmetricKey;
import static org.junit.Assert.*;
import org.junit.Ignore;
import org.junit.Test;
public class SecureCellTokenProtectTest {
@Test
public void initWithGenerated() {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
assertNotNull(cell);
}
@Test
public void initWithFixed() {
String keyBase64 = "UkVDMgAAAC13PCVZAKOczZXUpvkhsC+xvwWnv3CLmlG0Wzy8ZBMnT+2yx/dg";
byte[] keyBytes = Base64.getDecoder().decode(keyBase64);
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(keyBytes);
assertNotNull(cell);
}
@Test
@SuppressWarnings("ResultOfMethodCallIgnored")
public void initWithEmpty() {
try {
SecureCell.TokenProtectWithKey((SymmetricKey)null);
fail("expected NullArgumentException");
}
catch (NullArgumentException ignored) {}
try {
SecureCell.TokenProtectWithKey((byte[])null);
fail("expected NullArgumentException");
}
catch (NullArgumentException ignored) {}
try {
SecureCell.TokenProtectWithKey(new byte[]{});
fail("expected InvalidArgumentException");
}
catch (InvalidArgumentException ignored) {}
}
@Test
public void roundtrip() throws SecureCellException {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
byte[] context = "For great justice".getBytes(StandardCharsets.UTF_8);
SecureCellData result = cell.encrypt(message, context);
assertNotNull(result);
byte[] encrypted = result.getProtectedData();
byte[] authToken = result.getAdditionalData();
assertNotNull(encrypted);
assertNotNull(authToken);
byte[] decrypted = cell.decrypt(encrypted, authToken, context);
assertNotNull(decrypted);
assertArrayEquals(message, decrypted);
}
@Test
public void dataLengthPreservation() {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
SecureCellData result = cell.encrypt(message);
assertEquals(message.length, result.getProtectedData().length);
assertTrue(result.getAdditionalData().length > 0);
}
@Test
public void contextInclusion() {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
byte[] shortContext = ".".getBytes(StandardCharsets.UTF_8);
byte[] longContext = "You have no chance to survive make your time. Ha ha ha ha ...".getBytes(StandardCharsets.UTF_8);
SecureCellData resultShort = cell.encrypt(message, shortContext);
SecureCellData resultLong = cell.encrypt(message, longContext);
// Context is not (directly) included into encrypted message.
assertEquals(resultShort.getProtectedData().length, resultLong.getProtectedData().length);
assertEquals(resultShort.getAdditionalData().length, resultLong.getAdditionalData().length);
}
@Test
public void withoutContext() throws SecureCellException {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
// Absent, empty, or nil context are all the same.
SecureCellData result1 = cell.encrypt(message);
SecureCellData result2 = cell.encrypt(message, null);
SecureCellData result3 = cell.encrypt(message, new byte[]{});
assertArrayEquals(message, cell.decrypt(result1.getProtectedData(), result1.getAdditionalData()));
assertArrayEquals(message, cell.decrypt(result2.getProtectedData(), result2.getAdditionalData()));
assertArrayEquals(message, cell.decrypt(result3.getProtectedData(), result3.getAdditionalData()));
assertArrayEquals(message, cell.decrypt(result1.getProtectedData(), result1.getAdditionalData(), null));
assertArrayEquals(message, cell.decrypt(result2.getProtectedData(), result2.getAdditionalData(), null));
assertArrayEquals(message, cell.decrypt(result3.getProtectedData(), result3.getAdditionalData(), null));
assertArrayEquals(message, cell.decrypt(result1.getProtectedData(), result1.getAdditionalData(), new byte[]{}));
assertArrayEquals(message, cell.decrypt(result2.getProtectedData(), result2.getAdditionalData(), new byte[]{}));
assertArrayEquals(message, cell.decrypt(result3.getProtectedData(), result3.getAdditionalData(), new byte[]{}));
}
@Test
@SuppressWarnings("ResultOfMethodCallIgnored")
public void contextSignificance() throws SecureCellException {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
byte[] correctContext = "We are CATS".getBytes(StandardCharsets.UTF_8);
byte[] incorrectContext = "Captain !!".getBytes(StandardCharsets.UTF_8);
SecureCellData result = cell.encrypt(message, correctContext);
byte[] encrypted = result.getProtectedData();
byte[] authToken = result.getAdditionalData();
// You cannot use a different context to decrypt data.
try {
cell.decrypt(encrypted, authToken, incorrectContext);
fail("expected SecureCellException");
}
catch (SecureCellException ignored) {}
// Only the original context will work.
byte[] decrypted = cell.decrypt(encrypted, authToken, correctContext);
assertArrayEquals(message, decrypted);
}
@Test
@SuppressWarnings("ResultOfMethodCallIgnored")
public void tokenSignificance() throws SecureCellException {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
SecureCellData result1 = cell.encrypt(message);
byte[] encrypted1 = result1.getProtectedData();
byte[] authToken1 = result1.getAdditionalData();
SecureCellData result2 = cell.encrypt(message);
byte[] encrypted2 = result2.getProtectedData();
byte[] authToken2 = result2.getAdditionalData();
// You cannot use a different token to decrypt data.
try {
cell.decrypt(encrypted1, authToken2);
fail("expected SecureCellException");
}
catch (SecureCellException ignored) {}
try {
cell.decrypt(encrypted2, authToken1);
fail("expected SecureCellException");
}
catch (SecureCellException ignored) {}
// Only the matching token will work.
assertArrayEquals(message, cell.decrypt(encrypted1, authToken1));
assertArrayEquals(message, cell.decrypt(encrypted2, authToken2));
}
@Test
@SuppressWarnings("ResultOfMethodCallIgnored")
public void detectCorruptedData() {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
SecureCellData result = cell.encrypt(message);
byte[] encrypted = result.getProtectedData();
byte[] authToken = result.getAdditionalData();
// Invert every odd byte, this will surely break the message.
byte[] corrupted = Arrays.copyOf(encrypted, encrypted.length);
for (int i = 0; i < corrupted.length; i++) {
if (i % 2 == 1) {
corrupted[i] = (byte)~corrupted[i];
}
}
try {
cell.decrypt(corrupted, authToken);
fail("expected SecureCellException");
}
catch (SecureCellException ignored) {}
}
@Test
@SuppressWarnings("ResultOfMethodCallIgnored")
public void detectTruncatedData() {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
SecureCellData result = cell.encrypt(message);
byte[] encrypted = result.getProtectedData();
byte[] authToken = result.getAdditionalData();
byte[] truncated = Arrays.copyOf(encrypted, encrypted.length - 1);
try {
cell.decrypt(truncated, authToken);
fail("expected SecureCellException");
}
catch (SecureCellException ignored) {}
}
@Test
@SuppressWarnings("ResultOfMethodCallIgnored")
public void detectExtendedData() {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
SecureCellData result = cell.encrypt(message);
byte[] encrypted = result.getProtectedData();
byte[] authToken = result.getAdditionalData();
byte[] extended = Arrays.copyOf(encrypted, encrypted.length + 1);
try {
cell.decrypt(extended, authToken);
fail("expected SecureCellException");
}
catch (SecureCellException ignored) {}
}
@Test
@SuppressWarnings("ResultOfMethodCallIgnored")
public void detectCorruptedToken() {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
SecureCellData result = cell.encrypt(message);
byte[] encrypted = result.getProtectedData();
byte[] authToken = result.getAdditionalData();
// Invert every odd byte, this will surely break the token.
byte[] corruptedToken = Arrays.copyOf(authToken, authToken.length);
for (int i = 0; i < corruptedToken.length; i++) {
if (i % 2 == 1) {
corruptedToken[i] = (byte)~corruptedToken[i];
}
}
try {
cell.decrypt(encrypted, corruptedToken);
fail("expected SecureCellException");
}
catch (SecureCellException ignored) {}
}
@Test
@SuppressWarnings("ResultOfMethodCallIgnored")
public void detectTruncatedToken() {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
SecureCellData result = cell.encrypt(message);
byte[] encrypted = result.getProtectedData();
byte[] authToken = result.getAdditionalData();
byte[] truncatedToken = Arrays.copyOf(authToken, authToken.length - 1);
try {
cell.decrypt(encrypted, truncatedToken);
fail("expected SecureCellException");
}
catch (SecureCellException ignored) {}
}
@Test
public void detectExtendedToken() throws SecureCellException {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
SecureCellData result = cell.encrypt(message);
byte[] encrypted = result.getProtectedData();
byte[] authToken = result.getAdditionalData();
byte[] extendedToken = Arrays.copyOf(authToken, authToken.length + 1);
// Current implementation of Secure Cell allows the token to be overlong.
// Extra data is simply ignored.
byte[] decrypted = cell.decrypt(encrypted, extendedToken);
assertArrayEquals(message, decrypted);
}
@Test
@SuppressWarnings("ResultOfMethodCallIgnored")
public void swapTokenAndData() {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
SecureCellData result = cell.encrypt(message);
byte[] encrypted = result.getProtectedData();
byte[] authToken = result.getAdditionalData();
try {
cell.decrypt(authToken, encrypted);
fail("expected SecureCellException");
}
// Depending on how lucky you are, Themis might or might not detect the error early enough.
// If it does not, it proceeds to allocate some weird buffer which might be too big.
catch (SecureCellException | OutOfMemoryError ignored) {}
}
@Test
@SuppressWarnings("ResultOfMethodCallIgnored")
public void swapContextAndToken() {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
byte[] context = "We are CATS".getBytes(StandardCharsets.UTF_8);
SecureCellData result = cell.encrypt(message, context);
byte[] encrypted = result.getProtectedData();
try {
cell.decrypt(encrypted, context);
fail("expected SecureCellException");
}
catch (SecureCellException ignored) {}
}
@Test
@SuppressWarnings("ResultOfMethodCallIgnored")
public void emptyMessageOrToken() throws SecureCellException {
SecureCell.TokenProtect cell = SecureCell.TokenProtectWithKey(new SymmetricKey());
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
try {
cell.encrypt(null);
fail("expected NullArgumentException");
}
catch (NullArgumentException ignored) {}
try {
cell.encrypt(new byte[]{});
fail("expected InvalidArgumentException");
}
catch (InvalidArgumentException ignored) {}
SecureCellData result = cell.encrypt(message);
byte[] encrypted = result.getProtectedData();
byte[] authToken = result.getAdditionalData();
try {
cell.decrypt(encrypted, null);
fail("expected NullArgumentException");
}
catch (NullArgumentException ignored) {}
try {
cell.decrypt(null, authToken);
fail("expected NullArgumentException");
}
catch (NullArgumentException ignored) {}
try {
cell.decrypt(encrypted, new byte[]{});
fail("expected InvalidArgumentException");
}
catch (InvalidArgumentException ignored) {}
try {
cell.decrypt(new byte[]{}, authToken);
fail("expected InvalidArgumentException");
}
catch (InvalidArgumentException ignored) {}
}
@Test
@SuppressWarnings("deprecation")
public void oldAPI() throws SecureCellException {
SymmetricKey key = new SymmetricKey();
SecureCell.TokenProtect newCell = SecureCell.TokenProtectWithKey(key);
SecureCell oldCell = new SecureCell(key.toByteArray(), SecureCell.MODE_TOKEN_PROTECT);
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
byte[] context = "We are CATS".getBytes(StandardCharsets.UTF_8);
byte[] encrypted, authToken, decrypted;
SecureCellData result = oldCell.protect(context, message);
assertNotNull(result);
encrypted = result.getProtectedData();
authToken = result.getAdditionalData();
assertNotNull(encrypted);
assertNotNull(authToken);
decrypted = newCell.decrypt(encrypted, authToken, context);
assertArrayEquals(message, decrypted);
result = newCell.encrypt(message, context);
assertNotNull(result);
encrypted = result.getProtectedData();
authToken = result.getAdditionalData();
assertNotNull(encrypted);
assertNotNull(authToken);
decrypted = oldCell.unprotect(context, new SecureCellData(encrypted, authToken));
assertArrayEquals(message, decrypted);
}
@Test
@SuppressWarnings("deprecation")
public void oldAPIWithoutContext() throws SecureCellException {
SymmetricKey key = new SymmetricKey();
SecureCell.TokenProtect newCell = SecureCell.TokenProtectWithKey(key);
SecureCell oldCell = new SecureCell(key.toByteArray(), SecureCell.MODE_TOKEN_PROTECT);
byte[] message = "All your base are belong to us!".getBytes(StandardCharsets.UTF_8);
byte[] encrypted, authToken, decrypted;
SecureCellData result = oldCell.protect((byte[])null, message);
assertNotNull(result);
encrypted = result.getProtectedData();
authToken = result.getAdditionalData();
assertNotNull(encrypted);
assertNotNull(authToken);
decrypted = newCell.decrypt(encrypted, authToken);
assertArrayEquals(message, decrypted);
result = newCell.encrypt(message);
assertNotNull(result);
encrypted = result.getProtectedData();
authToken = result.getAdditionalData();
assertNotNull(encrypted);
assertNotNull(authToken);
decrypted = oldCell.unprotect((byte[])null, new SecureCellData(encrypted, authToken));
assertArrayEquals(message, decrypted);
}
}
|
Q:
Keyboard autocorrection height (with/without the autocorrection)
I get the keyboard height like this:
- (void)keyboardNotification:(NSNotification*)notification
{
NSDictionary* keyboardInfo = [notification userInfo];
NSValue* keyboardFrameBegin = [keyboardInfo valueForKey:UIKeyboardFrameEndUserInfoKey];
CGRect keyboardFrameBeginRect = [keyboardFrameBegin CGRectValue];
}
Now, I have the keyboard height.
But without the autocorrection height:
If the UITextAutocorrectionType is YES / NO the keyboard height stay the same.
How can I get the Keyboard autocorrection height?
Thanks in advance.
A:
Use this :
CGRect keyboardBounds;
[[notification.userInfo valueForKey:UIKeyboardFrameEndUserInfoKey] getValue: &keyboardBounds];
// Need to translate the bounds to account for rotation.
keyboardBounds = [self.view convertRect:keyboardBounds toView:nil];
|
using System;
using System.Collections.Generic;
using System.IO;
using Newtonsoft.Json;
using kcptun_gui.Common;
using kcptun_gui.Controller;
namespace kcptun_gui.Model
{
public class TrafficStatistics : Dictionary<string, TrafficLog>
{
private static string TRAFFIC_STATISTICS_FILE = "kcptun-traffic-statistics.json";
public TrafficLog GetTrafficLog(Server server)
{
if (this.ContainsKey(server.remoteaddr))
{
return this[server.remoteaddr];
}
else
{
TrafficLog log = new TrafficLog();
this.Add(server.remoteaddr, log);
return log;
}
}
public static TrafficStatistics Load()
{
try
{
string filename = Utils.GetTempPath(TRAFFIC_STATISTICS_FILE);
string content = File.ReadAllText(filename);
TrafficStatistics instance = JsonConvert.DeserializeObject<TrafficStatistics>(content);
if (instance == null)
return new TrafficStatistics();
return instance;
}
catch (Exception e)
{
if (!(e is FileNotFoundException))
Logging.LogUsefulException(e);
return new TrafficStatistics();
}
}
public static void Save(TrafficStatistics instance)
{
try
{
string filename = Utils.GetTempPath(TRAFFIC_STATISTICS_FILE);
using (StreamWriter sw = new StreamWriter(File.Open(filename, FileMode.Create)))
{
string jsonString = JsonConvert.SerializeObject(instance, Formatting.Indented);
sw.Write(jsonString);
sw.Flush();
}
}
catch (IOException e)
{
Console.Error.WriteLine(e);
}
}
}
}
|
Q:
Why is setting onClickListener working once?
I want to migrate a very solid project structure that I use to Kotlin. I first tried the basics: Activities and Fragment transactions. It appears so easy and simple:
class MainActivity : AppCompatActivity(), SomeInterface {
override fun onCreate(savedInstanceState: Bundle?) {
setContentView(R.layout.activity_main)
val mainFragment = supportFragmentManager.findFragmentById(R.id.fragment_main) as MainActionsFragment?
?: MainActionsFragment.newInstance()
supportFragmentManager.inTransaction {
add(R.id.container_main, mainFragment)
}
}
private val anotherFragment by lazy {
supportFragmentManager.findFragmentById(R.id.another_fragment) as AnotherFragment?
?: AnotherFragment.newInstance()
}
override fun myInterfaceMethod() {
replaceFragment(anotherFragment, R.id.container_main)
}
}
class MainActionsFragment : Fragment() {
val btnSale: Button by bindView(R.id.btn_sale)
val btnVisit: Button by bindView(R.id.btn_visit)
override fun onCreateView(inflater: LayoutInflater?, container: ViewGroup?, savedInstanceState: Bundle?): View? {
return inflater!!.inflate(R.layout.fragment_main, container, false)
}
override fun onResume() {
super.onResume()
btnSale.setOnClickListener{ _ ->
listener.requestAction(SaleType.SALE)
}
btnVisit.setOnClickListener{ _ ->
listener.requestAction(SaleType.VISIT)
}
}
}
Extensions.kt
fun AppCompatActivity.replaceFragment(fragment: Fragment, @IdRes frameId: Int) {
supportFragmentManager.inTransaction {
replace(frameId, fragment)
.addToBackStack(fragment.tag)
}
}
inline fun FragmentManager.inTransaction(func: FragmentTransaction.() -> FragmentTransaction) {
beginTransaction()
.func()
.commit()
}
Now, MainActionsFragment holds two buttons. Everything works as expected, the first click on either one takes me to the desired fragment. However, once I press the back button and I see my two buttons again, their click listener is gone. This is pretty much the standard way of doings things translated to Kotlin, nothing fancy besides its cool new features. I tried moving setting the onClickListeners to onCreateView() but it crashes:
Caused by: kotlin.KotlinNullPointerException
at kotterknife.ButterKnifeKt$viewFinder$7.invoke(ButterKnife.kt:95)
at kotterknife.ButterKnifeKt$viewFinder$7.invoke(ButterKnife.kt)
at kotterknife.ButterKnifeKt$required$1.invoke(ButterKnife.kt:104)
at kotterknife.ButterKnifeKt$required$1.invoke(ButterKnife.kt)
at kotterknife.Lazy.getValue(ButterKnife.kt:125)
So, in spite of Kotlin being so cool, I'm having trouble doing the basics and I'm getting disheartened to migrate. Am I really doing things so wrong? Or how come setting a simple click listener is so frustrating?
Thank you.
A:
Solution: solved it by getting rid of KotterKnife and ButterKnife and use android's findViewById. I guess one of the advantages of the language and the framework's progress make some libraries obsolete or unnecessary.
|
Recent work posits that certain character strengths (CS) could inform future strategies for both public health and individualized, patient-centered care (PCC) in the United States; yet to date, health providers pay little attention to modifiable patient psychological strengths that could be harnessed to improve the patient-provider collaborative care. In addition to medical risk factors, certain psychosocial factors (e.g., depression) are associated with heart disease (HD) mortality, a leading cause of death, especially in late life. Recent studies, mostly in general populations, have found health benefits of certain CSs, especially notable is the survival effect of optimism and spirituality indicators. These studies, however, are limited by small size, short study duration, and lack of information on medical confounders. Clearly, more clinical research is needed to provide reliable and robust evidence on the long-term effect of CSs in HD patients. Open-heart surgery (OHS), a life saving/extending intervention for HD, can be a stressful life event. Pl's (Ai) prior research showed the desirable effect of certain CSs (e.g., secular reverence, optimism) on optimal recovery (e.g., shorter hospitalization and low depression) in 30 months after OHS. To date, no information is available about the role of CS in post-OHS long-term survival. Further, women may fare worse after OHS (e.g., cardiac mortality, postop survival), and the Pl's earlier work indicates sex/gender differences in certain CSs (e.g., reverence, private prayer coping) and that some CSs and comorbidities could explain sex differences in post-OHS short-term recovery. It is not yet known if a sex difference in the CS-survival link exists, or if CSs interact with the trajectory of depression as a HD-mortality risk over time in men and women. To add scientific knowledge and to inform optimal cardiac PCC, this interdisciplinary study will evaluate the long-term survival effect of psychological CSs in an existing cohort of older patients, prospectively evaluated before OHS and followed for 30-months post OHS (N=481, female 42%, age=63 at OHS). The proposed study aims to address novel research questions: 1. Does any CSs predict long-term survival (over one decade) in patients following OHS, adjusting known predictors (e.g., demographics, depression, medical confounders)? 2. Are there sex differences in the effects of CSs on post OHS survival? 3. How does a CS mitigate the detrimental effect of depression as a known HD-mortality risk? To achieve our intended specific aims, we will perform multivariate analyses of the combined National Index of Death (NDI) records, existing interdisciplinary information obtained from prospective surveys, and patient level information from the Society of Thoracic Surgeons' (STS) national database, as well as some stress sensitive biomarkers, of this cohort. The study is innovative because it will be the first to evaluate the long-term survival effect of CSs adjusted for appropriate confounders and for sex differences in patients undergoing OHS. By combining information from multiple data sources, Pl has created a well-characterized cohort that will provide a unique opportunity to address methodological challenges in existing literature and fill important gaps. |
Benjamin Fadi
Benjamin Fadi (born 16 March 1995) is a Ghanaian footballer, playing as a forward.
Career
Heart of Lions
Fadi started his professional career in his native Ghana at Heart of Lions in the Ghana Premier League. For his first season he played 13 matches and scored four times. For his second season he played five times and scored once in the premier league before leaving the club.
Malmö FF
On 20 December 2012 it was announced that Fadi would transfer to Swedish side Malmö FF. He signed his contract with the club on 16 March 2013, the day he turned 18 years old. This was because he was unavailable to play competitive football for the club until his 18th birthday. Fadi signed a four-year contract lasting until the end of the 2016 season. Fadi made his Allsvenskan debut for Malmö FF in an away fixture against Syrianska FC at Södertälje Fotbollsarena on 20 June 2013. After failing to make a mark during his first three years of his four-year contract, Fadi was released before the start of the 2016 season.
Loan spells
Malmö FF confirmed on 21 February 2014 that Fadi would be on loan to Superettan side IFK Värnamo for the duration of the 2014 season. During the season Fadi saw regular play as he made 26 appearances during the loan spell, scoring five times, helping the team to a mid-table finish. On 23 January 2015 Malmö FF confirmed that Fadi would move to newly relegated Mjällby AIF on loan for the 2015 season. Fadi failed to impress at Mjällby, and spent most of his time there on the bench, as the club was relegated from Superettan.
FK Karlskrona
On 8 March 2016 it was announced that he would play the upcoming season for FK Karlskrona of the Swedish Division 2.
Career statistics
As of 27 November 2018.
References
External links
Category:1995 births
Category:Living people
Category:Ghanaian footballers
Category:Ghana under-20 international footballers
Category:Association football forwards
Category:Malmö FF players
Category:IFK Värnamo players
Category:Mjällby AIF players
Category:Allsvenskan players
Category:Superettan players
Category:Ghanaian expatriate footballers
Category:Expatriate footballers in Sweden
Category:Heart of Lions F.C. players |
Millers wrap up first week, to scrimmage at Stillwater
Jackson Young pitches the ball on an option play during the opening week of football drills. The Millers will scrimmage at Stillwater on Friday. (Photo by Chuck Reherman)
By Chuck Reherman
Sports Editor
Yukon will have its only pre-season test this week as the Millers travel to Stillwater for a scrimmage Friday.
The Millers will play their earliest season opening game in history this season and it will be the first time in 40 years that YHS will not open the season with rival Mustang.
Yukon will host Edmond North in a zero week game on Aug. 24 at Miller Stadium. YHS hosts Mustang on Aug. 31.
The schedule for the scrimmage will be finalized the first part of the week. It will feature a first session with a second that may include a running clock game-type situation.
Yukon will wrap up its first week of drills today with their first day of pads in the evening workout.
The Millers spent the first four days in helmets and shorts and worked out Friday in “shells” and will have a limited contact workout
“We did a lot of re-install and some discipline stuff that will set a tone of who we are,” YHS head coach Jeremy Reed said. “We know who we are, but we wanted to set the tone for who we are early in our practices. We basically did a start over, we feel it is important each year to have a reset, start over from ground zero and reteach things, like we did in the spring.
“We have our media day Saturday and we will come back that evening and practice,” he said. “We will start meetings at 6 p.m. and finish up around 8:30 p.m. We may do some live stuff in practice, maybe some half-line, but it will be controlled.
“We set up spring practice to be very physical because we knew we didn’t want to be very physical in the fall. We will be limited on contact since we are getting ready for the first scrimmage and a very early week zero game.”
Even though the Millers have an early season start, the team has not really had to speed up their practices and will actually have less live action work.
“We looked way ahead and did a lot of things in the spring that we normally wouldn’t have done to prepare us for the fall,” he said. “I feel we are in a great place, our kids are in great shape, probably the best shape I have ever had a ream come in.
“We will operate our practice as normal,” he said. “Most teams will go multiple hours and we have done that in the past. But, we are staying our normal two and one-half hour practices.
“We will have 10 practices and one scrimmage leading up to that first game week. My big thing is we have to get certain things installed, but we want to be fresh going into the first game. We treated this first week line it was week two”
The Millers concentrated on details the first week. And, with number of returning starters and players back, Reed feels his team is “ahead of the game” right now.
“We are miles ahead of where we are from this time last August,” he said. “It is enjoyable to know that we are that much further ahead than last year.
“We know who we are and what we have, and we know what we need to take care of to get ready,” he added. “We just need to get out and do a great job in our practices.
“We answered a lot of questions in the spring,” he said. “We evaluated a lot in the spring. If we didn’t have spring ball it would make it tough, but we were able to evaluate a lot in the spring.”
The Millers will play six home games this season and will play their first four at Miller Stadium.
Following the Edmond North and Mustang games, the Millers will wrap up non-district play with Moore on Sept. 7. After an open date on Sept. 14, the Millers will open district play against Norman on Sept. 21.
YHS goes on the road for the first time on Sept. 28 to Edmond Santa Fe. YHS returns home to host Jenks on Oct. 5. The Millers travel to Westmoore on Oct. 12, then hosts Broken Arrow on Oct. 18, the team’s only Thursday night game.
The Millers finish the regular season with two games on the road. YHS travels to Enid on Oct. 25 and closes the regular season with a road game at Edmond Memorial. |
Measurements taken by ESO’s New Technology Telescope combined with a model of asteroid Itokawa's surface topography reveal that different parts of this asteroid have different densities. The shape model used for this view is based on the images collected by JAXA's Hayabusa spacecraft. Image released
The innards of an asteroid have been measured for the first time.
Scientists using a European Southern Observatory telescope have made precise measurements of Asteroid Itokawa's density. They discovered that different parts of the asteroid have different densities, giving the scientists clues about the asteroid's formation in the solar system. The researchers explain the strangely shaped asteroid Itokawa in a new video.
Itokawa is a stony composite asteroid. The peanut-shaped space rock is about 1,755 feet (535 meters) long on its longest side and takes about 556 days to orbit the sun. Scientists measured the density by studying images of Itokawa taken by the New Technology Telescope at the La Silla Observatory in Chile, as well as by other telescopes, from 2001 to 2013. Stephen Lowry, a researcher at the University of Kent, and his team measured how the brightness of the space rock varies during its rotation, ESO officials said. [See more photos of asteroid Itokawa]
This very detailed view shows the strange peanut-shaped asteroid Itokawa. This picture comes from the Japanese spacecraft Hayabusa during its close approach in 2005. Image released Feb. 5, 2014. (Image credit: JAXA)
"This is the first time we have ever been able to determine what it is like inside an asteroid," Lowry said in a statement. "We can see that Itokawa has a highly varied structure — this finding is a significant step forward in our understanding of rocky bodies in the solar system."
By looking at the change in Itokawa's brightness over time, the researchers tracked how the asteroid's spin period changed over time. By understanding that information plus its shape, the astronomers could also map the asteroid's interior density, ESO officials said.
Lowry and his colleagues found that sunlight was actually affecting the way the asteroid spins. Thanks to some very precise measurements, the team found that Itokawa's rotation period changes by 0.045 seconds per year, ESO officials said. While this may seem like a miniscule amount, it's something that can only happen if the two halves of the peanut-shaped space rock have different densities.
This very detailed view shows the strange peanut-shaped asteroid Itokawa. This picture comes from the Japanese spacecraft Hayabusa during its close approach in 2005. Image released Feb. 5, 2014. (Image credit: JAXA)
Until now, scientists had estimated asteroid interior properties through overall density measurements, ESO officials said. Now that they know the internal structure of an asteroid can vary, scientists can try to work backward to see how the space rock formed. Scientists now think it's possible that two parts of a double asteroid crashed together and merged to create Itokawa, ESO officials said, although no one is sure exactly how it formed.
"Finding that asteroids don't have homogeneous interiors has far-reaching implications, particularly for models of binary asteroid formation," Lowry said in a statement. "It could also help with work on reducing the danger of asteroid collisions with Earth, or with plans for future trips to these rocky bodies.”
This very detailed view shows the strange peanut-shaped asteroid Itokawa. This picture comes from the Japanese spacecraft Hayabusa during its close approach in 2005. Image released Feb. 5, 2014. (Image credit: JAXA)
Japan's Hayabusa spacecraft collected tiny dust grains from Itokawa in 2005 during a 1.25 billion-mile (2 billion kilometers) mission that took seven years to complete. The probe returned to Earth with the space rock samples in 2010. The unmanned Hayabusa arrived at Itokawa when the asteroid was about 180 million miles (290 million km) from Earth.
Scientists in Japan are also considering a follow-up to the Hayabusa mission called Hayabusa 2. The new probe would launch to and sample 1999 JU3, a carbonaceous asteroid.
Follow Miriam Kramer @mirikramer and Google+. Follow us @Spacedotcom, Facebook and Google+. Original article on Space.com. |
Bookmark this page
share this article
follow Us
Antigraft activists have lambasted the House of Representatives its alleged attempts to weaken the Corruption Eradication Commission (KPK) through bills on the revision to the Criminal Code (KUHP) and on Criminal Code procedures (KUHAP).
Emerson Yuntho of the Indonesia Corruption Watch (ICW) said on Tuesday that the House's Commission III overseeing law and human rights was silently trying to restrict the KPK's power through the bills. 'The deliberation process of these two bills appeared to have been carried out silently to avoid criticism and public attention,' he said in a press statement.
Emerson also said that sources had revealed that the House had aimed to finish the deliberation of the two bills by Oct. 2013, adding fuel to allegations that the House was planning to sabotage the country's fight against graft.
According to Emerson, the KUHAP bill appears to distance the KPK and the Corruption Court from the efforts. 'It can be seen by the absence of institutions other than the Attorney General's Office [AGO], the police and the court [state, high and supreme],' Emerson said. 'If [the bill] is passed, then the regulation could create polemic or multiple interpretations in the future.'
The bill also bestowed great authority on a new institution it created called Commissioner Judge, which, according to him, had the duty to determine whether a law enforcement institution could proceed with an investigation, arrest, detain, search for evidence, confiscate evidence or wiretap phone conversations based on its own evaluation.
Besides that, Emerson also cited some articles included in the KUHAP bill that had the potential to undermine the KPK, such as Article 240, which stipulated that an exoneration could not be appealed to the Supreme Court.
Then Article 250 stated that a Supreme Court prison term verdict could not be heavier than the High Court's verdict, he added.
The bill also failed to regulate corporations implicated in graft practice, according to Emerson. 'There are nine articles on the KUHAP bill that have the potential to amputate the KPK and its efforts to eradicate corruption,' he said.
Punishment for graft convicts stipulated in the KUHP bill, meanwhile, are much more lenient than those stipulated in Law No. 31/1999 and Law No. 20/2001, both on corruption, Emerson said.
According to him, the House is attempting to castrate the KPK because the antigraft body had arrested corrupt politicians and as a result was processing at least 65 of them. 'Besides that, the KPK's investigation [into the House] is deemed to be disrupting sources of funding for the 2014 election,' said Emerson.
The ICW, therefore, called on the House to stop discussing the bills and returned them to the government to be reassessed. It also urged the government to scrap the problematic articles.
Indonesian Democratic Party of Struggles (PDI-P) lawmaker Eva Kusuma Sundari, meanwhile, said that the allegations were not based on fact.
'We have not even started [to deliberate the bills],' she told The Jakarta Post on Tuesday. 'I don't know where [the ICW] got the idea [of the accusations] from.'
Eva, who is a member of the Commission's working committee on the bills, said that the deliberation process was postponed because there were more pressing matters at hand, such as the supreme judge selection. 'The committee probably will start [working] this October,' she said. |
My Friend Dahmer
The evolution from outcast to a serial killer, My Friend Dahmer, based on the graphic novel of the same name by Derf Backderf, looks at the infamous serial killer Jeffrey Dahmer’s teenage years before he went on to rape, murder, dismember, and cannibalize 17 boys and men.
In the film, Dahmer (Ross Lynch), is very dissociated from the world around him, seemingly the strange and awkward oddball with very little friends. He occupies a lot of his time with an abnormal interest in animals, storing their remains in acid to witness the decomposition process. He eventually attracts the attention of a group of boys, including Derf Backderf (Alex Wolff), after performing bizarre pranks that involve mimicking seizures, later known as “Doing a Dahmer”. They form “The Dahmer Fan Club”, generating some genuine moments of friendship, but more than anything is used as a means to mock Dahmer. Meanwhile, his home life is no walk in the park either. With a stressed-out father (Dallas Roberts) who is more preoccupied with his crumbling marriage than his children, and a mom (Anne Heche) who struggles with her mental health, easily fostered a toxic and neglectful environment.
Director and writer Marc Meyers predominately explore whether Dahmer is a product of nature or nurture. Could Dahmer be a completely different person if someone had just cared more, it’s this question that becomes the most chilling part of the film. Multiple people in his life pick up on hints that things aren’t quite right, yet never take much initiative in trying to get him any help or support. It’s so easy to become caught up in the whirlwind of our own lives, we miss and ignore the signs of those struggling; how much, if any accountability is on the people around when someone spins out of control.
This analysis focuses on humanizing Dahmer before he became a full-blown monster, creating a sense of conflict between feeling sympathy and the recognition that he later went on to commit heinous acts. Many of the scenes involving Dahmer’s growing violent compulsions become all the more unsettling as a result. Ross Lynch’s ability to convey intensity yet subtly at the right moments is one of the best parts of the film: blank eyes, a slumped posture, and an uncaring disposition all while giving off a sense mundanity which captures the scariest part of Dahmer as a person. He was able to seamlessly blend into the world around him, relativity unnoticed, making an excellent cloak for the atrocities going on behind closed doors. Lynch ultimately proves he is more than simply the actor chosen due to his uncanny resemblance.
Although at times, there’s an imbalance between the humanization of Dahmer and the reality of his growing violent urges; it feels a bit too sympathetic, resembling a twisted coming of age drama, instead of an exploration into the life of a mentally unwell teenager. Despite Dahmer’s troubled childhood and the trauma he experienced, he was a real person who went on to murder real people. I can only imagine how any family members or friends of the victims would feel after watching a movie that offers so much compassion, but disrespectful is a word that comes to mind.
As well, an issue that is very much glossed over is that Dahmer predominantly targeted men of colour. During a brief, yet unnerving encounter in a hotel room for a class trip, Dahmer asks Charlie, a black classmate, “do your insides look the same as mine?” It serves as a reminder about the implicit racism in Dahmer’s murders but doesn’t offer much more than that. It’s a complete missed opportunity, especially considering it’s an area many films/documentaries about Dahmer fail to mention.
Overall, My Friend Dahmer offers an insightful and often chilling look into Dahmer’s early years, but some monsters are better left seen as just that, monsters. |
Biofilm growth on polyvinylchloride surface incubated in suboptimal microbial warm water and effect of sanitizers on biofilm removal post biofilm formation.
An in vitro experiment was conducted to understand the nature of biofilm growth on polyvinyl chloride (PVC) surface when exposed to suboptimal-quality microbial water (>4 log10 cfu/mL) obtained from a poultry drinking water source mimicking water in waterlines during the first week of poultry brooding condition. PVC sections (internal surface area of 15.16 cm2) were utilized in the study to grow biofilm. After a 7-d test period, test coupons with 7-day-old biofilm were transferred into autoclaved municipal water and then treated with either chlorine-based or hydrogen peroxide-based sanitizer at bird drinking water rate, to see the impact on removal of biofilm formed on test coupons. Two trials (T1 and T2) were conducted. Test coupons used in T1 and T2 had the bacterial growth of 3.67 (SEM 0.04) and 3.97 (SEM 0.11) log10 cfu/cm2 on d 7. After sanitizer application, chlorine-based sanitizer removed bacteria in biofilm completely (0 cfu/cm2) within 24 h post treatment whereas hydrogen peroxide-based sanitizer reduced the counts to 1.68 log10 cfu/cm2 (P < 0.05) by 48 h post sanitizer application. Control remained the same (P > 0.05). Results indicated that biofilm formation can occur quickly under suboptimal water condition on PVC surface, and sanitizer application helped mitigate already formed biofilm, yet chlorine proved to be more effective than hydrogen peroxide. |
The European Year for Combating Poverty and Social Exclusion was launched in Madrid on 21 January 2010 with the aim of acting as a catalyst to raise awareness and build momentum for a more inclusive society as part of the EU's 'Europe 2020' strategy.
EU statistics show that 17% of people across the EU (almost 80 million Europeans) currently live below the poverty threshold. The number of millions of euros devoted to raising awareness of this issue is also 17.
In response to this, the 2020 strategy consists of five headline targets including the aims of reducing the number of Europeans living below the poverty line by 25% and of lifting 20 million out of poverty from the current 80 million. The fight against poverty is one of seven 'flagship initiatives' whereby joint action between the Commission and member states has been initiated.
Eastern and South-Eastern member states were the most pessimistic. Greece stood out, with 85% of Greek respondents thinking that poverty had increased in their country in recent years.
These findings come as EU leaders agreed earlier this month to reduce the number of Europeans at risk of poverty and social exclusion by at least 20 million over the next ten years as part of the 'Europe 2020' strategy.
Indeed poverty is not only a matter of perception. One in six EU citizens express having experienced great difficulty in paying household bills on at least one occasion during the last year, whilst 15% described this as a constant struggle.
The costs of health and social care were cited as becoming "much more difficult" to afford by 11% of participants.
Strikingly, 91% of Austrians believed it "very unlikely" that they would be able to afford their accommodation over the next 12 months, with feelings concerning job prospects gauged as little better.
Almost half of all participants stated that they felt unlikely to be able to find a replacement job within six months if they were to be laid off.
Future pensions represented a worry for 73% of Europeans who expected to either postpone retirement or receive lower benefits in the wake of the recession.
Indeed, in 17 member states, a majority of respondents are very or fairly worried that their income in old age would be adequate to enable them to live "in dignity".
But the EU is also promoting new initiatives to help countries fight against poverty. A project in the Netherlands bringing together local partnerships in sixty different communities to develop strategies for tackling social exclusion, a Belgian project helping socially-excluded people gain employment and a service in Luxembourg helping people access affordable housing have all benefited from the European Social Fund this year.
The survey was carried out in the context of the 2010 European Year for Combating Poverty and Social Exclusion. It is the fourth in a series organised by the Commission in light of measures agreed at European level to try and minimise the effects of the economic crisis on citizens. |
420 Junior Europeans - 'The Breeze is on!'
Taylor said as we could see the whitecaps starting to form on the Lake. The church bells were tolling over Riva as we swerved around the guard and slid into a great park at the Yacht Club. The joys of arriving early, plenty of time to make the lunch too ...
Racing doesn't start until 1pm, with launching about an hour before the first start gun. There was more order in launching today but alot more breeze as well, some sailors struggled to get off the ramp with waves breaking over it.
Again Taylor and Oscar were in Red Flight, the third start. I had climbed a large hill to try and get a better view but still couldn't quite make out our boys for certain. By their body positions I thought I could spot them and that they had done well. This was confirmed when I joined up with the British parents with better eyes and binos. The boys had come in at seventh, a good, solid start.
The wind was around 20 knots and appeared to be building. It was from a slightly different direction which meant more cliff work. Afterwards the comment was that we were in the top three but tacked when conventional wisdom dictated was correct, but here we could have got more pressure from getting closer to the cliffs. The knowledge of this racing area is being built on race by race.
The second race wasn't the greatest of starts but sheer boat speed and power got them into second at the Top mark and a mistake by the Italians let the boys into the front and stay there. They extended each leg finishing probably 150 metres in front of the next boat, the red head Riley Brothers, whose parents I was sharing the view point with. The breeze was probably in the 22-23 knot range by then, hard work for the smaller and not so fit.
Tired but happy Campers back in the boat park.
For those who haven't seen the results, the boys are now in 18th (from 113) , well inside the Gold Fleet so far and the good thing is they have the largest 'drop' to come after the fifth race tomorrow. All going well, this should put them well up there.
Jim Saltenstall held another 420 Masterclass while we all munched on our after racing pasta. The Class start was delayed as the sailors, and more than a few of the coaches, were closely following the practice session of the regional Miss Italy pagent next door at the open air restaurant. The whistling and cat calls drowned everything out.
We have had rain and lots of wind so far tonight, but are hoping for more of the same great wind tomorrow. Taylor and Oscar have proved themselves up there with the best of them.
Glad everyone is enjoying the Postcards, many thanks for all the good wishes and as always, a huge thank you to our sponsors and supporters.
Make sure you check out the photos and video on the website
Happy sailing
Rob
If you want to link to this article then please use this URL: www.sail-world.com/101089 |
The chemical structure of xanthan is composed of a linear cellulosic (1→4)-β-D-glucose polymer with trisaccharide side chains composed of mannose, glucuronic acid and mannose, attached to alternate glucose residue in the backbone. (Milas and Rinaudo, Carbohydrate Research, 76, 189-196, 1979). Thus xanthan can be described as a branched chain polymer with a pentasaccharide repeat unit; normal xanthan typically has 2000-3000 pentasaccharide repeat units. The xanthan polymer is typically modified by acetylation and pyruvylation of the mannose residues.
The fermentation of carbohydrates to produce the biosynthetic water-soluble polysaccharide xanthan gum by the action of Xanthomonas bacteria is well known. The earliest work was conducted by the United States Department of Agriculture and is described in U.S. Pat. No. 3,000,790. Xanthomonas hydrophilic colloid (“xanthan”) is an exocellular heteropolysaccharide.
Xanthan is produced by aerobic submerged fermentation of a bacterium of the genus Xanthomonas. The fermentation medium typically contains carbohydrate (such as sugar), trace elements and other nutrients. Once fermentation is complete, the resulting fermentation broth (solution) is typically heat-treated. It is well established that heat treatment of xanthan fermentation broths and solutions leads to a conformational change of native xanthan at or above a transition temperature (TM) to produce a higher viscosity xanthan. Heat treatment also has the beneficial effect of destroying viable microorganisms and undesired enzyme activities in the xanthan. Following heat-treatment, the xanthan is recovered by alcohol precipitation. However, heat treatment of xanthan fermentation broths also has disadvantages, such as thermal degradation of the xanthan. Heating xanthan solutions or broths beyond TM or holding them at temperatures above TM for more than a few seconds leads to thermal degradation of the xanthan. Degradation of xanthan irreversibly reduces its viscosity. Accordingly, heat treatment is an important technique with which to control the quality and consistency of xanthan.
Xanthan quality is primarily determined by two viscosity tests: the Low Shear Rate Viscosity (“LSRV”) in tap water solutions and the Sea Water Viscosity (“SWV”) in high salt solutions. Pasteurization of xanthan fermentation broths at temperatures at or above TM has been found to yield xanthan of a higher viscosity as indicated by higher LSRV and SWV values.
Xanthan polymer is used in many contexts. Xanthan has a wide variety of industrial applications including use in oil well drilling muds, as a viscosity control additive in secondary recovery of petroleum by water flooding, as a thickener in foods, as a stabilizing agent, and as a emulsifying, suspending and sizing agent (Encyclopedia of Polymer Science and Engineering, 2nd Edition, Editors John Wiley & Sons, 901-918, 1989). Xanthan can also be used in cosmetic preparations, pharmaceutical vehicles and similar compositions.
There is a need in the art to produce a xanthan polymer with higher specific viscosity characteristics in the unpasteurized state. Such a higher specific viscosity xanthan polymer could provide more viscosity at equivalent xanthan concentrations, for example, for food, industrial, and oilfield applications. |
1. Field of the Invention
This invention relates to methods of and apparatus for prolonging the useful life of a graphite element in an optical fiber-drawing furnace. Accordingly, it is a general object of this invention to provide new and improved methods and apparatus of such character.
2. Description of the Prior Art
An optical fiber-drawing furnace of the prior art included a graphite element of generally cylindrical shape with a reduced central cross-sectional configuration and a flange at opposite ends thereof. The element had an axial hole therethrough including a central internal element chamber for receiving a glass preform. The furnace included means for water cooling of the flanges. Means were provided for applying electric power across the flanges to resistively heat the reduced cross-sectional configuration and, hence, the central internal element chamber so that an optical fiber can be drawn from the preform. In the past, a cold graphite element was quickly heated by the rapid application of power across the flanges, which rapid application tended to create thermal shock to the graphite element. Further, in the past, there was disconcern about the temperature of the water used for cooling the furnace flanges. As a result of such disconcern, condensed atmospheric moisture on the outer furnace surface tended to enter the furnace, causing deterioration of the graphite element. After drawing optical fiber from the optical fiber-drawing furnace, at operating temperatures, it was a past practice to reduce the furnace temperature to room temperature when not in production. No mention was made, to the best of knowledge and belief by the applicant hereof, of a "bakeout procedure" in which the furnace temperature is reduced from the operating temperature to a temperature in excess of the ambient room temperature.
In the past, the typical life of the graphite element failed to exceed 15 hours of full operating temperature usage. |
Attention:
Certain features of Sigma-Aldrich.com will be down for maintenance the evening of Friday August 18th starting at 8:00 pm CDT until Saturday August 19th at 12:01 pm CDT. Please note that you still have telephone and email access to our local offices. We apologize for any inconvenience.
Differential connectivity of splicing activators and repressors to the human spliceosome.
Abstract
During spliceosome assembly, protein-protein interactions (PPI) are sequentially formed and disrupted to accommodate the spatial requirements of pre-mRNA substrate recognition and catalysis. Splicing activators and repressors, such as SR proteins and hnRNPs, modulate spliceosome assembly and regulate alternative splicing. However, it remains unclear how they differentially interact with the core spliceosome to perform their functions. Here, we investigate the protein connectivity of SR and hnRNP proteins to the core spliceosome using probabilistic network reconstruction based on the integration of interactome and gene expression data. We validate our model by immunoprecipitation and mass spectrometry of the prototypical splicing factors SRSF1 and hnRNPA1. Network analysis reveals that a factor's properties as an activator or repressor can be predicted from its overall connectivity to the rest of the spliceosome. In addition, we discover and experimentally validate PPIs between the oncoprotein SRSF1 and members of the anti-tumor drug target SF3 complex. Our findings suggest that activators promote the formation of PPIs between spliceosomal sub-complexes, whereas repressors mostly operate through protein-RNA interactions. This study demonstrates that combining in-silico modeling with biochemistry can significantly advance the understanding of structure and function relationships in the human spliceosome. |
Regression of early and intermediate stages of colon cancer by targeting multiple members of the EGFR family with EGFR-related protein.
A role of the epidermal growth factor receptor (EGFR) family has been suggested in colon cancer etiology, progression, and/or severity. Our recently identified pan-erbB inhibitor EGFR-related protein (ERRP) targets EGFRs by attenuating their activation and subsequent signaling leading to cellular growth inhibition. In the present study, we evaluated the therapeutic effectiveness of ERRP on early and intermediate stages of colon cancer by examining regression of chemically induced aberrant crypt foci (ACF) in the colon of CF1 mice and intestinal adenomas in APC(Min+/-) (Min) mice. After formation of ACF or adenomas, the mice were injected (i.p.) with ERRP (50 microg/mouse) for 10 consecutive days. This treatment significantly reduced the number of ACF from 25.0 +/- 3.0 (controls) to 14.9 +/- 1.6 (ERRP-treated; P = 0.011) and also reduced their size (P < 0.01). In Min mice, ERRP caused the regression of adenomas throughout the small intestine (P < 0.05) and reduced their size (P < 0.001). This could partly be attributed to inhibition of proliferation and stimulation of apoptosis in the intestinal mucosa and was associated with decreased activation of several EGFR family members, suppression of downstream effector nuclear factor kappaB and down-regulation of cyclooxygenase-2. ERRP-induced attenuation of EGFR activation could be due to increased sequestration of the ligand(s) by ERRP, rendering them unavailable for binding to and activation of the receptor. In conclusion, our data show that ERRP is effective in regressing both early and intermediate intestinal lesions and could be an effective therapeutic agent for colon cancer. |
1976 Longling earthquake
The 1976 Longling earthquake in Yunnan Province, People's Republic of China, was a doublet earthquake, with two main shocks striking just east of Longling at 12:23:20 and 14:00:22 UTC (20:23 and 22:00 local time). The magnitudes were estimated at 6.7 and 6.6, respectively, on the scale, and 6.9 and 7.0 on the scale; Chinese sources put these at 7.4 and 7.3 on the scale. The region is noted for the quantity and intensity of its earthquakes, and the complexity of its tectonics, which are closely related to the collision between the Indian and Eurasian tectonic plates.
No one died in the Longling county town Loss in the 9 counties in Baoshan, Lincang and Dehong were 98 deaths, 451 severe injuries and 1991 light injuries. 420,000 buildings collapsed in an area of 1883 square kilometers.
Geology
Yunnan is a mountainous region lying east of Tibet, and north of the Red River Fault that strikes southeast along the Red River into North Vietnam and the South China Sea. The Red River fault is deep – some believe it may reach the lithosphere – and forms a major tectonic boundary that separates Indochina from the South China block.
The seismotectonics of Yunnan and the adjacent areas is driven by the collision of the Indian Plate with the Eurasian Plate. This has uplifted the Tibetan Plateau (and the Himalaya Mountains) and forced it eastwards, pushing the South China Block and Indochina towards the westward subducting Philippine Sea Plate and creating various extensional structures. All of this has created a complicated geological structure with many faults, which in western Yunnan has allowed heat and fluids from the subducting Indian Plate to rise into the upper crust, creating the Tengchong volcanic field to the north of Longling and the Longling fault (location of the first event), and west of the Nu River and Nu River fault (location of the second event). It appears that igneous intrusions have weakened the bedrock in this area, which has led to uneven accumulations of stress, which caused the earthquake.
See also
1976 Tangshan earthquake (July 28)
1976 Songpan–Pingwu earthquake (August 16–23)
List of earthquakes in 1976
List of earthquakes in China
Notes
Sources
.
.
.
.
.
.
.
(in Chinese with English abstract).
.
External links
1976 Longling
Category:1976 in China
Category:1976 earthquakes |
906 S.W.2d 356 (1995)
William R. HARDIN, Jr., and Brenda S. Hardin, Appellants,
v.
Michael R. SAVAGEAU and Debra Savageau, Appellees.
No. 94-SC-405-DG.
Supreme Court of Kentucky.
September 21, 1995.
*357 Charles R. Holbrook, III, Anna H. Ruth, Ashland, for appellants.
David Hermansdorfer, A. Scott Coburn, Ashland, for appellees.
LAMBERT, Justice.
The sole issue presented is whether the trial court erred in this fraud case when it included the phrase "by clear and convincing evidence" in its instructions to the jury. The Court of Appeals answered in the affirmative and reversed the judgment for a new trial. This Court granted discretionary review to consider whether it is proper in cases where substantive law requires a heightened standard of proof to include that standard in the court's instructions to the jury. Remarkably, this issue appears to be of first impression in this jurisdiction. CR 76.20(1).
Upon an agreed statement of the case pursuant to CR 75.15, it appears that appellees brought a civil action against appellants claiming fraud in the sale of residential real property. Appellees' allegations were denied by appellants and the issues were joined. At trial, upon disputed evidence, the court instructed the jury, over appellees' objection, as follows:
You will find for the Plaintiffs, Michael Savageau and Debra Savageau [appellees herein], if you are satisfied by clear and convincing evidence as follows: . . . .
Thereafter, the case was submitted and the jury returned a verdict against appellees in favor of appellants. The substance of the verdict was that appellees failed to persuade the jury by clear and convincing evidence that appellants had defrauded them.
While a proper verdict in most civil actions requires only that the jury "believe" or be "satisfied" from the evidence, the substantive law of some civil actions requires a heightened degree of proof such as "clear and convincing evidence." Of course, criminal cases require proof beyond a reasonable doubt, and such an instruction to the jury is required. RCr 9.56.
Among the most common of cases which require proof by clear and convincing evidence are termination of parental rights (Cabinet for Human Resources v. E.S., Ky., 730 S.W.2d 929 (1987)), illegitimacy of a child born in wedlock (Bartlett v. Commonwealth, ex rel. Calloway, Ky., 705 S.W.2d 470 (1986)), unfitness of a natural parent for custody of a child (Davis v. Collinsworth, Ky., 771 S.W.2d 329 (1989)), proof of a lost will (Clemens v. Richards, 304 Ky. 154, 200 S.W.2d 156 (1947)), and fraud (Larmon v. Miller, 195 Ky. 654, 243 S.W. 939 (1922); Ferguson v. Cussins, Ky.App., 713 S.W.2d 5 (1986)). In substance, such cases require the party with the burden of proof to produce evidence more persuasive than a mere preponderance, but proof which need not rise to the level of *358 beyond a reasonable doubt. Fitch v. Burns, Ky., 782 S.W.2d 618 (1989). In such cases it has been determined by statutory or decisional law that a higher standard of proof should be required. KRS 411.184(2). Sanford Construction v. S & H Contractors, Ky., 443 S.W.2d 227 (1969). Despite this, it appears to have been the general practice in this jurisdiction to refrain from using words and phrases which describe the elevated standard of proof. See e.g., 2 JOHN S. PALMORE, KENTUCKY INSTRUCTIONS TO JURIES, § 31 (1989). As a consequence, only the judge and the lawyers have knowledge of the correct legal standard and the jury which finds the facts is denied this information.
Whether by misinterpretation of this Court's decision in Ragsdale v. Ezell, 99 Ky. 236, 35 S.W. 629 (1896), or by historical accident, the view is widely held that an elevated standard of proof should not be included in civil case instructions. PALMORE, § 31.01, Comment, broadly states that the clear and convincing evidence standard
addresses itself exclusively to the court in determining whether the evidence is sufficient to support a verdict, and is not a guideline for consideration by the jury.
In Ragsdale the underlying claim was for assault and the Court held that the instructions should inform the jury for whom it should find based on what it believed from the evidence. Caution was given against use of the word "preponderance" on grounds that it might not be understood and attempts at its definition might confuse or mislead the jury. Ragsdale, 35 S.W. at 630. The only proper conclusion one should reach from Ragsdale is that use of the term "preponderance" is redundant and bad practice, and that any attempted definition of "preponderance" is perilous. The same conclusion applies to Hall v. Arnett by Greene, Ky.App., 709 S.W.2d 850 (1986), and the soup is made neither thick nor thin by the off-handed remark in Beckner v. Palmore, Ky.App., 719 S.W.2d 288, 290 (1986), to the effect that instructions on credibility of witnesses and standard of proof are not required.
Perhaps the misinterpretation has arisen from the oft-stated principle that instructions should confine the jury to the determination of facts and that principles of law should not be submitted. Appellees and the Court of Appeals embrace this view and rely upon 2 JOHN S. PALMORE, KENTUCKY INSTRUCTIONS TO JURIES, § 13.11(f) and (j) (1989), as well as the pattern instructions found at § 31, Fraud and Deceit. The substance of the argument is that since the function of the jury is to determine disputed issues of fact, inclusion of an evidentiary standard such as "clear and convincing evidence" creates confusion and may require clumsy definition of the terms. It is contended that effect is given to the legal standard when the trial judge considers motions for directed verdict and thereby determines whether the plaintiff has presented sufficient evidence to submit the case to the jury. Under this view, the jury has no role in the application of the proper evidentiary standard.
In our opinion, any such contention is untenable. If the elevated evidentiary standard is to have meaning and effect, the jury must be informed of the standard and directed to apply it to the evidence. Without instructing on the heightened standard, only the judge will have given it any consideration and the jury will make its determination using an erroneous standard, less than the law requires. When the law requires a particular evidentiary standard, both the judge and the jury must consider the evidence in that light. The nature of the inquiry is substantially different when the jury must say whether it "is satisfied from the evidence" or whether it "believes by clear and convincing evidence."
In criminal cases, the Commonwealth must prove every element of the offense "beyond a reasonable doubt." KRS 500.070. RCr 9.56(1) commands that the jury be instructed in part as follows:
You shall find the defendant not guilty unless you are satisfied from the evidence alone, and beyond a reasonable doubt, that he is guilty.
The required instruction, embracing the applicable legal standard, requires the jury to make a factual determination whether it has been convinced of a defendant's guilt to a high degree of certainty. Requiring such a *359 degree of certainty, however, does not change the nature of the inquiry from factual to legal. It merely attempts to insure that the jury will be possessed of a proper attitude of reluctance as it is drawn toward the conclusion sought by the Commonwealth.
If it is proper to instruct as to a heightened standard of proof in criminal cases, there could be no serious contention that such an approach would be improper in civil cases. In each instance, the jury is called upon to make a factual determination based on the legal standard stated in the instructions. In each, the required phrase is capable of being understood and applied by jurors of ordinary intelligence.
In Commonwealth v. Callahan, Ky., 675 S.W.2d 391 (1984), this Court terminated a long-standing practice in which prosecutors and defense counsel undertook client-serving definition of reasonable doubt. We quoted with approval from 9 JOHN HENRY WIGMORE, EVIDENCE, § 2497 (Chadbourne rev. 1981):
Language that is within the comprehension of persons of ordinary intelligence can seldom be made plainer by further defining or refining. All persons who possess the qualifications for jurors know that a doubt of the guilt of the accused, honestly entertained, is a reasonable doubt.
We concluded by saying:
Prospectively, trial courts shall prohibit counsel from any definition of reasonable doubt at any point in the trial, and any cases in this jurisdiction to the contrary are specifically overruled.
Callahan, 675 S.W.2d at 393. The logic which led to our decision in Callahan is equally applicable here. The phrase "by clear and convincing evidence," like "beyond a reasonable doubt," is neither arcane, esoteric nor obscure and jurors will have no difficulty understanding its meaning. Accordingly, counsel should refrain from attempting to define it and in that regard, the Callahan rule applies fully.
The prevailing practice of merely instructing the jury that to render a verdict it must "believe" or be "satisfied" from the evidence is entirely appropriate when the standard is preponderance. However, as observed in Ragsdale and heretofore stated, the term "preponderance" should not be used because it may not be easily understood and is essentially redundant. But when the evidentiary standard is something greater than preponderance, it is necessary to expressly state the standard to assure an appropriately informed jury.
Inasmuch as this decision amounts to a change in a broadly prevalent practice with respect to jury instructions, we deem it appropriate to limit application of this decision to this case and to such other cases as have not yet become final and in which the issue has been properly preserved.
For the foregoing reasons, the opinion of the Court of Appeals is reversed and the final judgment of the trial court is reinstated.
STEPHENS, C.J., and FUQUA, LEIBSON, STUMBO, and WINTERSHEIMER, JJ., concur.
REYNOLDS, J., concurs in result only.
LEIBSON, J., files a separate concurring opinion.
LEIBSON, Justice, concurring.
I concur in the Opinion. I add as a further comment this quote from Fitch v. Burns, Ky., 782 S.W.2d 618, 622 (1989):
We conclude that where the "burden of persuasion" requires proof by clear and convincing evidence, the concept relates more than anything else to an attitude or approach to weighing the evidence, rather than to a legal formula that can be precisely defined in words. Like "proof beyond a reasonable doubt," "proof by clear and convincing evidence" is incapable of a definition any more detailed or precise than the words involved.
|
Effect of beta blockers, angiotensin-converting enzyme inhibitors or angiotensin receptor blockers, and statins on mortality in patients with implantable cardioverter-defibrillators.
Nine hundred sixty-five patients (mean age 70 years) with implantable cardioverter-defibrillator were followed for 32 +/- 33 months for all-cause mortality. Death occurred in 73 of 515 patients (13%) treated with beta blockers (group 1), in 84 of 494 patients (17%) treated with angiotensin-converting enzyme inhibitors or angiotensin receptor blockers (group 2), in 56 of 402 patients (14%) treated with statins (group 3), in 40 of 227 patients (18%) treated with amiodarone (group 4), in 5 of 26 patients (19%) treated with sotalol (group 5), and in 64 of 265 patients (24%) treated with no beta blocker, angiotensin-converting enzyme inhibitor or angiotensin receptor blocker, statin, amiodarone, or sotalol (group 6) (p <0.001 for group 1 vs group 6 and group 3 vs group 6, p <0.02 for group 2 vs group 6). In conclusion, patients with implantable cardioverter-defibrillators should be treated with beta blockers, angiotensin-converting enzyme inhibitors or angiotensin receptor blockers, and statins to reduce mortality. |
Video: 'If you're watching, either I'm dead or in a very bad situation': Haunting video shows Dubai ruler's daughter speaking before he ordered Indian special forces to capture her
Sheikah Latifa Mohammed al Maktoum claims to have been imprisoned for three years in Dubai after trying to escape the country where her father is the ruler. She says she has had to live under a curfew and isn't... |
Elmhurst College joins monarch butterfly program
Elmhurst College students from the school’s Green Living Community helped set the sign marking the new Monarch waystation.
Elmhurst College students from the school’s Green Living Community helped set the sign marking the new Monarch waystation. (Graydon Megan / Pioneer Press)
Graydon MeganPioneer Press
Butterflies get an assist at Elmhurst College
Elmhurst College officially dedicated one of its gardens as a waystation for monarch butterflies, planted with the milkweed that is the only food monarch caterpillars eat and other nectar-producing flowers and plants for monarchs and other pollinators.
The bright orange, black and white butterflies, which used to be common in summer in the Midwest, are declining in number due to loss of habitat, especially the milkweed that provides both food and a place for the insects to lay their eggs.
A typical Midwest summer will see four generations of the tiny creatures, which weigh at most a couple of hundredths of an ounce. Most live only a few weeks.
But while the first three generations born in a summer live only about two to six weeks, members of the generation born in late summer and early fall somehow manage to live as long as nine months — long enough to migrate to Mexico, where they winter before returning to the U.S. to begin the cycle again.
Sandy Fejt, education site manager at the Willowbrook Wildlife Center in Glen Ellyn and a 2003 Elmhurst alumna, spoke of her personal observation of the decline in monarch numbers.
Twenty years ago, while driving north from central Illinois, she pulled over to watch as hundreds of monarch flew across the road.
"I've never forgotten that sight," she said, noting that six years ago she made her backyard garden a monarch waystation. "I've seen the decline in monarchs in my yard — I'm lucky to see three or four monarchs a summer."
Gardens like the one at Elmhurst College, one established at Willowbrook and others, including private gardens, can be part of Midwest, regional and nationwide efforts to provide monarch food and habitat, an effort Fejt said can lead to "a milkweed highway all the way to Texas."
The Bluejay Butterfly Oasis, named for the Elmhurst College mascot, stretches along the south side of Hammerschmidt Chapel, between the chapel and Dinkmeyer Hall. In addition to milkweed, the garden contains butterfly bushes, several kinds of asters, coneflowers, black-eyed-susan and gaillardia, said grounds and maintenance supervisor Paul Hack.
College officials noted the oasis has been a butterfly garden for some time, but this week's dedication marked the recent designation of the garden as a monarch waystation by the conservation and education group Monarch Watch.
During the dedication, more milkweed was planted and those in attendance were offered packets of milkweed seeds along with some tempting cookies shaped and decorated to look like oversized monarchs. |
In an automated information storage and retrieval system, also known as a library, numerous cells arrayed within the library are used to hold information media, such as magnetic tape cartridges or optical disks. (The term "cartridge" used herein refers to any retaining structure for information media. Although the present invention is described herein with respect to a magnetic tape library storing tape cartridges, it is not so limited but is equally applicable, for example, to an optical library holding optical disk cartridges, cartridge-less optical disks, optical tape cartridges and the like.) An accessor, furnished with a holding or gripping device and under the direction of a library controller, transports a selected cartridge between the cartridge's cell and a drive unit. The library controller is interconnected with a host device, such as a mainframe computer, which issues control signals related to reading/writing data from/to selected cartridges.
Library units also typically include an input/output station or port through which a system operator can pass a cartridge to be added to the array and through which the accessor can pass a cartridge to the operator for removal.
It will be appreciated that the library controller must "know" the identity of each cartridge and its location within the array of cells in order to be able to retrieve the cartridge for access. Typically, each cartridge has a unique identifying mark, such as a bar code label, on an edge of the cartridge visible through the cell opening. A vision system, such as a bar code reader, on the accessor can read the label when the accessor is positioned proximate to the cell. During an inventory of the library, such as when a new library has been installed, the vision system scans the cells and reports to the library controller the identity and location of stored cartridges. The library controller records the identity and location information in a database and later refers to it when a cartridge is to be retrieved or replaced or when a cartridge is imported from the outside and has to be stored in an empty cell. An inventory must also be taken each time a library access door is opened by the operator since it is not known whether the operator has added cartridges to the array, has removed cartridges, or has done nothing at all. If a cartridge label cannot be detected or read when the accessor is proximate to a cell, that cell is assumed to be empty.
However, the vision system may mistakenly classify a cell as being empty when, in fact, the cell is actually occupied. For example, a cartridge may occupy the cell but have an unreadable label, or even no label. A cartridge may be mis-oriented within the cell or a foreign object may occupy the cell. If the accessor attempts to insert a cartridge into such an occupied cell, an error condition will result causing a time consuming error recovery procedure to be initiated.
One known system attempts to reduce such non-empty errors by directing the accessor's gripper to attempt to reach inside every cell which does not have an identifiable cartridge and verify by "touch" that the cell is actually empty. Any cell which is still not found to be empty is classified in the database as having an "occupied but invalid" status to prevent its use. An inventory of a 400 cell library, for example, can take three or four hours to complete using this system. |
International Market Research Reports
Mintel provide a range of international market reports, which provide insight into the industry across the globe. We also provide a number of outbound market reports, focusing on various countries worldwide. Available reports can include:
Market Data Reports
Mintel’s market data reports will provide you with a comprehensive overview of the market size and share. Market data reports also provide a 5 year forecast for the sector in that region and the region\\\'s socio-economic data.
Consumer Research Reports
Mintel’s consumer reports deliver insight and expert analysis into key consumer trends and behaviour in your marketplace, in addition to an overview of the market data and key brands operating in each region. Mintel’s consumer reports provide you with easily digestible information to guide your future innovation and move your business forward.
Questions?
Can I purchase a specific section?
Can I receive a sample report?
Why buy syndicated research?
“The future development of incentives, conventions, conferences and exhibitions will be influenced by overall societal trends which include social networking and the explosion of user-generated content, as well as the widespread diffusion of specialist knowledge via the Internet. These trends are ...
“Millions of tourists own at least one device that gives them access to the Internet and allows them to read, download and store digital travel- and tourism-related content. These devices include eReaders, PCs (desktops and laptops), games consoles, smartphones, smartwatches, smart TVs and ...
“By whetting viewers’ appetites for foreign cuisine and exotic locations, cooking shows have certainly done their bit to shine the spotlight on food tourism. So too have food blogs and the many websites dedicated to all things culinary.”
This global annual market overview will provide you with an in-depth review of the key issues in the global carbonated soft drinks market through 2013 as well as our forecast for what will happen in 2014 and ...
North America’s car-rental industry is holding its own, even though during the 2007-09 recession, the car hire companies, led by three major players, had to reduce fleet inventories to adjust to slack demand.
There are a number of reasons for these increases. The fortunes of the car-rental market ...
This report provides an overview of current trends in the hotel sector, including branding, distribution, financing and technological developments. Brands continue to proliferate and there are an increasing number of distribution channels with the rise of metasearch and mobile devices. The ...
This global annual market overview will provide you with an in-depth review of the key issues in the global aircare and pest control market through 2013 as well as our forecast for what will happen in 2014 and beyond. |
LEGO City Garbage Truck Set #4432
Description
Description
Accessories
Details
Damaged Package
Sell us Yours
Take away the trash with the LEGO City Garbage Truck (4432)!The workers are busy collecting the trash in LEGO City. Wheel the bins onto the rear loader, empty the trash into the garbage truck and take it away to the dump.The LEGO City Garbage Truck (4432) includes: 2 worker MiniFigures Features lifting rear loader Accessories include 2 trash bins, banana peel, fish, shovel and brush Measures over 8" (21cm) long Take out the trash! Lift the rear loader!
Read More...
SKU:
legocity4432
SKU: legocity4432UPC: 673419163095STOCK #: 241300Availability: Out of StockCondition: New |
<?php
$expected = array('...$a',
'...$b',
);
$expected_not = array('...$c',
);
?> |
Q:
Enable/disable Chrome plugin from extension
Is it possible to enable/disable a Chrome plugin from an extension?
My end goal is to write an extension that, for some specific plugin (in my case Flash), gives a one-click way to do the equivalent of going to chrome://plugins, finding the relevant plugin on the list, and clicking "enable" or "disable."
Update 2
I have found that it is possible to achieve the desired result by entering the code below into the JavaScript console on chrome://plugins. Now the question is how to do this in one click with an extension or bookmarklet. I'm keeping (a shortened form of) "update 1" after the code to show how I arrived at it.
To turn Flash OFF: chrome.send('enablePlugin', ['/Applications/Google Chrome.app/Contents/Versions/37.0.2062.94/Google Chrome Framework.framework/Internet Plug-Ins/PepperFlash/PepperFlashPlayer.plugin', String(false), String(false)]);
To turn Flash ON: chrome.send('enablePlugin', ['/Applications/Google Chrome.app/Contents/Versions/37.0.2062.94/Google Chrome Framework.framework/Internet Plug-Ins/PepperFlash/PepperFlashPlayer.plugin', String(true), String(false)]);
Update 1
On the chrome://plugins page, there are event handlers in plugins.js that listen for clicks on the "enable" or "disable" links. Here's lines 123-139:
renderTemplate(pluginsData);
// Add handlers to dynamically created HTML elements.
var links = document.getElementsByClassName('disable-plugin-link');
for (var i = 0; i < links.length; i++) {
links[i].onclick = function() {
handleEnablePlugin(this, false, false);
return false;
};
}
links = document.getElementsByClassName('enable-plugin-link');
for (var i = 0; i < links.length; i++) {
links[i].onclick = function() {
handleEnablePlugin(this, true, false);
return false;
};
}
So this basically passes inputs to a universal plugin on/off function, which is in lines 192-203:
/**
* Handles a 'enable' or 'disable' button getting clicked.
* @param {HTMLElement} node The HTML element for the plugin being changed.
* @param {boolean} enable Whether to enable or disable the plugin.
* @param {boolean} isGroup True if we're enabling/disabling a plugin group,
* rather than a single plugin.
*/
function handleEnablePlugin(node, enable, isGroup) {
// Tell the C++ PluginsDOMHandler to enable/disable the plugin.
chrome.send('enablePlugin', [String(node.path), String(enable),
String(isGroup)]);
}
Thanks to Developer Tools/"Inspect Element", it's clear what inputs to send to the function — node.path would be something like /Applications/Google Chrome.app/Contents/Versions/34.0.1847.137/Google Chrome Framework.framework/Internet Plug-Ins/PepperFlash/PepperFlashPlayer.plugin.
A:
I've written a fairly crude, but working, implementation in AppleScript. I'm still hoping to work out something more elegant and internal to Chrome.
Here's the script to turn Flash ON. To turn it off again, replace true with false.
Edit: revised to stop the script from breaking every time Chrome updates its version. At this point I've been using this script for two months and it meets my needs. If someone has a nice, platform-independent way to implement this, though, I'd rather have that be the "answer."
tell application "Google Chrome"
activate
open location "chrome://plugins"
set myJS to "chrome.send('enablePlugin', ['/Applications/
Google Chrome.app/Contents/Versions/" & version &
"/Google Chrome Framework.framework/Internet Plug-Ins/PepperFlash/
PepperFlashPlayer.plugin', String(true), String(false)]);"
delay 1
tell window 1 to tell active tab
execute javascript myJS
close
end tell
end tell
|
Q:
Remove Shards from SOLR Database
I recently recovered a SOLR database that uses SOLR cloud to shard an index. I now have that database running on a single machine, but the data is still sharded--moreover now this is unnecessary.
How can I stop using SOLR cloud and merge these shards into a single collection?
A:
I ended up using the Lucene Merge Index tool. The SOLR approaches did not work for me (obtuse errors).
|
# frozen_string_literal: true
class ExpireJobCacheWorker
include ApplicationWorker
include PipelineQueue
queue_namespace :pipeline_cache
urgency :high
idempotent!
# rubocop: disable CodeReuse/ActiveRecord
def perform(job_id)
job = CommitStatus.joins(:pipeline, :project).find_by(id: job_id)
return unless job
pipeline = job.pipeline
project = job.project
Gitlab::EtagCaching::Store.new.tap do |store|
store.touch(project_pipeline_path(project, pipeline))
store.touch(project_job_path(project, job))
end
end
# rubocop: enable CodeReuse/ActiveRecord
private
def project_pipeline_path(project, pipeline)
Gitlab::Routing.url_helpers.project_pipeline_path(project, pipeline, format: :json)
end
def project_job_path(project, job)
Gitlab::Routing.url_helpers.project_build_path(project, job.id, format: :json)
end
end
|
Q:
Probability Distribution Approximation problem
My problem is 7.6 from A First Course in Probability and Statistics. The answer is provided in the book but not how to arrive at the solution. I thought I understood the chapter fairly well, but I can't seen to solve this problem:
"Defects in a particular kind of a metal sheet occur at an average rate of one per 100 square metres. Find the probability that two or more defects occur in a sheet of size 40 square metres."
Answer: 0.0616
I thought the problem could be approached as a binomial distribution where the r.v.s are {0,1} per square meter, and then I could use the Poisson Approximation to the Binomial Distribution to solve the problem (if necessary). This didn't work, and in retrospect, nothing in the problem indicates there can't be more than 1 defect in a square meter. This suggests a continuous distribution rather than a discrete distribution. But only given an expected value and the knowledge that the distribution is probably continuous seems to be too little information. Even when I take a step further an assume a uniform distribution, I still don't see an obvious solution. The associated chapter mainly focuses on Chebyshev's Inequality (which requires the variance), the Weak Law of Large Numbers, and the Central Limit Theorem. None seem applicable given the minimal information.
What am I missing?
A:
As Zahava Kor pointed out, λ =0.4 is correct. And my initially suspicion of using the Poisson distribution was right after all.
$$
1 - P(0) - P(1)
$$
$$
1-{e^{-0.4}}\frac{0.4^0}{0!}-{e^{-0.4}}\frac{0.4^1}{1!}
$$
$$
0.0616
$$
|
Hypermethylation of the breast cancer-associated gene 1 promoter does not predict cytologic atypia or correlate with surrogate end points of breast cancer risk.
Mutation of the breast cancer-associated gene 1 (BRCA1) plays an important role in familial breast cancer. Although hypermethylation of the BRCA1 promoter has been observed in sporadic breast cancer, its exact role in breast cancer initiation and association with breast cancer risk is unknown. The frequency of BRCA1 promoter hypermethylation was tested in (a) 14 primary breast cancer biopsies and (b) the initial random periareolar fine-needle aspiration (RPFNA) cytologic samples obtained from 61 asymptomatic women who were at increased risk for breast cancer. BRCA1 promoter hypermethylation was assessed from nucleotide -150 to nucleotide +32 relative to the transcription start site. RPFNA specimens were stratified for cytologic atypia using the Masood cytology index. BRCA1 promoter hypermethylation was observed at similar frequency in nonproliferative (normal; Masood <or=10: 18%, 2 of 11), hyperplastic (Masood 11-13: 15%, 6 of 41), and atypical cytology (Masood 14-17: 22%, 4 of 18; P = 0.79). BRCA1 promoter hypermethylation was not associated with (a) family history of breast or ovarian cancer or (b) calculated Gail or BRCAPRO risk score. BRCA1 promoter hypermethylation was associated with (a) age (P = 0.028) and (b) the combined frequency of promoter hypermethylation of the retinoic acid receptor-beta2 (RARB) gene, estrogen receptor-alpha (ESR1) gene, and p16 (INK4A) gene (P = 0.003). These observations show that BRCA1 promoter hypermethylation (a) is not associated with breast cancer risk as measured by mathematical risk models and (b) does not predict mammary atypia in RPFNA cytologic samples obtained from high-risk women. |
The long range goal of the proposed research is to develop a comprehensive understanding of the key steps in the cell death program that is initiated as a part of normal development or as a consequence of teratogen-induced abnormal development. The purpose of this proposal is to establish a research program that will test the following hypothesis: teratogen-induced cell death and normal programmed cell death (PCD) are active processes associated with specific gene transcription and translation. A corollary hypothesis is: teratogen-induced cell death is an accentuation of programmed cell death. Based upon our extensive experience, we have selected several well studied teratogens, i.e., retinoic acid (RA), ethanol, hyperthermia, acetylaminofluorene (AAF), and cyclophosphamide (CP) and we will use them to induce cell death in rat embryos cultured in vitro. Our specific aims are: 1) to use available markers of cell death, i.e., cDNA and antibodies to c-fos, c-myc, hsp 70, TGF-beta1, TRPM-2, transglutaminase, and ubiquitin, to begin to assess their role in developmental PCD, i.e., PCD occurring in the interdigital areas of day 15 forelimb buds as well as PCD associated with ear and face development and 2) to use probes that are markers for developmental PCD to assess their role in teratogen-induced cell death. To accomplish these specific aims we will use various molecular methodologies including Northern and Western blots, in situ hybridization, and immunohistochemistry. The importance of the proposed research may be judged by the fact that 2-3% of all human neonates have clinically identifiable birth defects, defects that constitute the leading cause of infant mortality in the United States. Despite these statistics, information necessary to reduce the incidence of birth defects and related infant mortality is lacking. The proposed studies will contribute key information to the overall assault on the causes of birth defects. |
De Gelderlander “Bezorgd over hoogmoed van mensen”
For Artist Ron Amir paradise is always close
The Artist Ron Amir paints like the old masters. Nevertheless his work, bought by collectors especially from England, also reminds one of video games.
In a folder lying on a table full of paint tubes, books and computers, are dozens of drawings. Or, after a closer look: hundreds. Many of them are full of stains. Some are folded and wrinkled. But all are elaborated to perfection.
“Finger Exercises”, Ron Amir (1975) says in a soft voice, while he shows a pile of charcoal drawings in his living and work space, a former football canteen in Rotterdam. Those drawings mostly depict people who look like insects crawling between one another. Also typically Amir: bloody body parts and eaten animals. ”If you’re so browse through it, it looks really dark. I fear a lot of things will break eventually.”
Amir speaks alternately in English and Dutch. After his national service he left his native country of Israel in his early twenties. With a clear mission: to become a painter. Via Rome, where he specialised in the restoration and copying of old masters, he went to Amsterdam, “because I distinctly wanted to go to the roots of Mondrian.
The move to The Netherlands meant more to him. Rome was a traditional environment, where the presence of the pope and the Catholic Church were strongly present.The move to the Netherlands was the moment I left the tradition. Amsterdam, and later Groningen and Rotterdam, offered me the chance to start anew. For me this is the land of Jeroen Bosch and Mondrian, and everything in between.”
Amir doesn’t like to be forced. What he does, is special and totally unique. The thirty-year -old works stoically in his studio on a just as mysterious and remarkable body of work that explicitly
engages with the history of visual arts.
Monumental and possessed
In his studio there are two monumental canvases, of which the most recent one has been prepared for departure, Amir is in a good position because collectors, especially in England, purchase his work in advance. The new canvas is almost three meters long, in a Amir’s universe it’s a normal size; a few years ago he made a panel of five by six meters.
His recent work looks quiet in comparison to his previous work. In the centre of the canvas there is a table. It’s in the middle of an empty, industrial-looking space. On the table: the remains of a meal, cut-open game, guts and an abandoned penis.
Amir is not like the contemporary artist who links disinterest towards art history to irony. He opts for monumental and possessed work. That method is, in an age of computer art and video installations, not at all intended as anything but a statement, he says. Amir can not and will not change. ”As a child, drawing for me was the only way to really express myself. Don’t forget: I’m from Israel. For centuries depicting religious stories was forbidden in Jewish culture. I work from that background. I’ve fed myself with Michelangelo, Bosch, Caravaggio. As a kind of elixir of life.”
At the Royal Academy in The Hague, where he graduated in 2005, and later at the Frank Mohr Institute in Groningen, he was given “ample room to find everything out.” He drew, experimented (‘really day and night”) and developed his specific handwriting.
On the latest canvas in his studio untitled, 2010 – he worked eight months in a row. This great format is, he says, ‘necessary’, although he finds it difficult to explain why. Just as he finds it difficult to explain where the strong and bright colours come from, that appear in his recent paintings. And no – Please do not ask him about one great hero.
Full of references
“I love the longing in the work of Goya, the conceptual vision of Velazquez and the spirituality of Gauguin. But point one of them out as an example is too simple for me. I experience art as one great story. It is, I think, inappropriate to just tear out a page or a chapter from that story.”
His sense of history and natural drive form the basis for paintings and drawings that are full of references. His art can be viewed as a miraculous image search, in which the human condition is reduced to basic instincts. ”You can call it image search, or compare it to Google, that is something which I often do. The content seems endless.
Each image evokes a different one. Those images are hard to call cheerful. I recognize that. But that doesn’t mean I’m angrily working. I have no clear message or a complete story to tell. But I am worried about the arrogance of people and about how we have become separated from our findimentals.”
He nods guiltily. When he talks about his work, big words always follow, and that quickly sounds arrogant, he says. ”Let me put it like this: I’m fascinated by the detachment. And that
continues to grow because of a medium like the Internet. The boundary between real and unreal can hardly be seen any more. Therefore we are likely to forget what we can and can not do. We commit to things that are not possible. That makes one permanently dissatisfied.”
The locations he paints, like the abandoned room with the table, also reminds one of virtual spaces found in video games. The environment is something desolate and menacing, and also quite tempting. What happened during that meal, where gnawed deer heads and chopped-off legs remain?
”My work is also about how we interact with each other. I see it more as a homage to life than as an attack. In my paintings paradise is always close.”
Virtual space
When Amir took his exam at the Frank Mohr Institute, he presented an impressive charcoal drawing where naked and injured people, car wrecks and bleeding limbs form the subject as well. “Ominous” is a qualification that I often hear attributed to what I make also cheerless. I think of it as a virtual space. Let your audience go and form the truth as they like.”
Besides the monumental canvases Amir makes smaller panels, on which he uses a more relaxed style. Here, animals are often the protagonists, but then in his characteristic style. In Amir’s
style a dog walks on two legs, like a wolf, crying to an invisible moon.
”Do not ask me why’ ‘he says, while he caresses his own dog, which he got from a shelter. ”I work with total dedication. The content of my paintings is unconsciously driven. Literally: from the subconscious. I look at life from an imaginary point floating somewhere above the earth. Like I’m on another planet, and I’m trying to pin down the essence of human existence.” |
Vitis vinifera canes, a new source of antifungal compounds against Plasmopara viticola, Erysiphe necator, and Botrytis cinerea.
Methanolic and ethanolic crude extracts of Vitis vinifera canes exhibited significant antifungal activity against the three major fungal pathogens affecting grapevines, Plasmopara viticola, Erysiphe necator and Botrytis cinerea. The active extracts were analyzed by LC-PDA-ESI-MS, and selected compounds were identified. Efficient targeted isolation using medium-pressure liquid chromatography afforded six pure constituents in one step. The structures of the isolated compounds were elucidated by NMR and HRMS. Six identified compounds (ampelopsin A, hopeaphenol, trans-resveratrol, ampelopsin H, ε-viniferin, and E-vitisin B) presented antifungal activities against P. viticola. ε-Viniferin also exhibited a low antifungal activity against B. cinerea. None of the identified compounds inhibited the germination of E. necator. The potential to develop a novel natural fungicide against the three major fungal pathogens affecting V. vinifera from viticulture waste material is discussed. |
The present invention relates to disposable absorbent articles which are adapted to contain body exudates. More particularly, the present invention relates to pant-like disposable absorbent articles having at least one line of weakness and a fastener.
It is desired that absorbent articles such as diapers, training pants or incontinence garments provide a close, comfortable fit about the wearer and contain body exudates. Moreover, it is desirable that such absorbent articles, after being soiled, can be removed from the wearer in a convenient and clean manner without undesirably soiling the caregiver or surrounding area such as the clothes of the wearer. In certain circumstances, it is also desirable that such absorbent articles are capable of being pulled up or down over the hips of the wearer to allow the wearer or caregiver to easily pull the article on and easily remove the article if it has not been soiled. In such circumstances it is further desirable that the caregiver or the wearer may be able to apply the absorbent article to a wearer in a prone position similar to a conventional diaper. Such absorbent articles can assist in the toilet training of children.
Conventional diapers are not provided in a prefastened condition and have typically included a front waist portion and a back waist portion which are releasably connected about the hips of the wearer during use by conventional fasteners such as adhesive tape fasteners or hook and loop type fasteners. For example, the conventional fasteners have typically included a pair of fasteners, such as adhesive tape tabs, located on the outermost corners of the diaper in the back waist region of the diaper and a complimentary fastener, such as a taping panel, located on the exterior surface of the outer cover of the diaper in the front waist portion of the diaper. In such a configuration, the diaper has been positioned between the legs of the wearer while the wearer is lying down and the adhesive tape tabs have been releasably attached to the taping panel to secure the back waist portion to the front waist portion of the diaper to secure the diaper about the waist of the wearer. Such conventional diapers are easy to fasten about and remove from the wearer after use without undesirably soiling the caregiver. However, such conventional diapers are not provided in a pant-like, prefastened configuration and, thus, are not configured to be pulled up or down over the hips of the wearer when the fasteners are attached.
Several attempts have been made to provide absorbent articles which effectively contain body exudates and are capable of being pulled up or down over the hips of the wearer. For example, some conventional absorbent articles, such as conventional training pants, have included integral side panels which connect the front waist portion to the back waist portion of the absorbent article. The side panels have been made stretchable such that the waist opening of the absorbent article can expand to allow the absorbent article to be pulled up or down over the hips of the wearer if desired. Such side panels have also been designed such that they may be torn to remove the training pant from the wearer after it has been soiled.
However, many of such attempts have not been completely satisfactory. For example, absorbent articles such as training pants have not always been able to achieve a close conforming fit to the wearer while still being able to expand enough to be pulled up and down over the hips of the wearer. Often such training pants fit the waist of the wearer loosely which can undesirably result in leaks. As a result, many of such articles have not contained bodily exudates as effectively as conventional diaper-type articles which can be adjusted to achieve a more conforming fit to the wearer. Moreover, the inspection and removal of soiled absorbent articles which have integral side panels, such as conventional training pants, have not always been completely satisfactory. For example, the side panels have been difficult to tear when attempting to remove the article from the waist of the wearer instead of pulling the article down over the hips of the wearer. Finally, most of these conventional training pants do not provide the option of being applied as a conventional diaper.
Accordingly, despite the attempts to develop improved absorbent articles, there remains a need for absorbent articles which can effectively provide the benefits of both conventional training pants and conventional diapers. That is, there remains a need for absorbent articles which conform to the wearer to effectively contain bodily exudates, which are capable of being pulled up and down over the hips and buttocks of the wearer without opening, which are readily secured about and removed from the wearer in a convenient and clean manner and which allow easy inspection by the care giver to assist in determining whether the article is soiled. Moreover, there is a need that such pant-like disposable absorbent articles are also capable of being applied in the manner of a conventional diaper, to a wearer lying in a prone position.
In response to the difficulties and problems discussed above, new pant-like disposable absorbent articles which have at least one line of weakness and at least one fastener have been discovered. In one aspect, the present invention concerns a pant-like, disposable absorbent article which defines a front waist region, a back waist region, a crotch region which extends between and connects the waist regions, a longitudinal direction and a lateral direction. The absorbent article includes an absorbent chassis which defines an absorbent core, an exterior surface, an interior surface opposite the exterior surface, a pair of laterally opposed side edges and a pair of longitudinally opposed waist edges. The absorbent article also includes a pair of opposed side panels which extend laterally outward from the side edges of the absorbent chassis and connect the front waist region and back waist region to define a waist opening. and a pair of leg openings in the pant-like disposable absorbent article. Each of the side panels define a first side margin which is permanently attached to the side edge of the absorbent chassis in the front waist region of the absorbent article to provide a pair of front permanent joints. Each of the side panels also define a second side margin which is permanently attached to the side edge of the absorbent chassis in the back waist region to provide a pair of back permanent joints. The absorbent article also includes a fastener located in one of the side panels. The absorbent article also includes a line of weakness located in the one side panel separating the fastener from one of the front or the back permanent joints. The fastener is released only after the line of weakness is broken and is configured to refastenably engage the one side panel of the absorbent article to the exterior surface of the absorbent chassis in one of the front waist region or the back waist region of the absorbent article.
In another aspect, the present invention concerns a pant-like, disposable absorbent article which defines a front waist region, a back waist region, a crotch region which extends between and connects the waist regions, a longitudinal direction and a lateral direction. The absorbent article includes an absorbent chassis which defines an absorbent core, an exterior surface, an interior surface opposite the exterior surface, a pair of laterally opposed side edges and a pair of longitudinally opposed waist edges. The absorbent article also includes a pair of laterally opposed extensible back panels which are permanently attached to the side edges of the absorbent chassis in the back waist region of the absorbent article to provide a pair of back permanent joints. The absorbent article also includes a pair of laterally opposed extensible front panels which are permanently attached to the side edges of the absorbent chassis in the front waist region of the absorbent article to provide a pair of front permanent joints. The front panel and the back panel on each side edge of the absorbent chassis are also permanently connected together at a side seam to provide a pair of side permanent joints and to define a waist opening and a pair of leg openings to provide the pant-like, disposable absorbent article. The absorbent article also includes a fastener located in each of the front panels. The absorbent article also includes a line of weakness in each of the front panels and separating the fasteners from the front permanent joints. The fasteners are released only after the lines of weakness are broken and are configured to refastenably engage the front panels to the exterior surface of the absorbent chassis in the front waist region of the absorbent article.
In yet another aspect, the present invention concerns a pant-like, disposable absorbent article which defines a front waist region, a back waist region, a crotch region which extends between and connects the waist regions, a longitudinal direction and a lateral direction. The absorbent article includes an absorbent chassis which defines an absorbent core, an exterior surface, an interior surface opposite the exterior surface, a pair of laterally opposed side edges and a pair of longitudinally opposed waist edges. The absorbent article also includes a pair of laterally opposed extensible back panels which are permanently attached to the side edges of the absorbent chassis in the back waist region of the absorbent article to provide a pair of back permanent joints. The absorbent article also includes a pair of laterally opposed extensible front panels which are permanently attached to the side edges of the absorbent chassis in the front waist region of the absorbent article to provide a pair of front permanent joints. The front panel and the back panel on each side edge of the absorbent chassis are also permanently connected together at a side seam to provide a pair of side permanent joints and to define a waist opening and a pair of leg openings to provide the pant-like, disposable absorbent article. The absorbent article also includes a fastener located in each of the back panels adjacent the side permanent joints. The absorbent article also includes a line of weakness located in each of the back panels and separating the fasteners from the side permanent joints. The fasteners are released only after the lines of weakness are broken and are configured to refastenably engage the back panels to the front waist region of the absorbent article.
The present invention advantageously provides pant-like, disposable absorbent articles which include a fastener and a line of weakness. In particular, the present invention provides pant-like disposable absorbent articles which are capable of being reliably pulled up or down over the hips of the wearer to assist in the toilet training of the wearer similar to conventional training pants. Moreover, similar to conventional diapers, some configurations of the pant-like disposable absorbent articles of the present invention can be advantageously applied to and removed from the wearer similar to conventional diapers. Further, the pant-like disposable absorbent articles of the present invention allow easy inspection by the caregiver to assist in determining whether the article is soiled similar to conventional diapers. As such, the present invention can provide a dual use absorbent article which can function as both a pant-like absorbent article and as a conventional diaper.
Still further, the pant-like disposable absorbent articles of the present invention provide a line of weakness, which eases the opening and removal of the pant-like disposable absorbent article. Therefore, the pant-like diaper is presented in and maintains a pant-like configuration, but in particular configurations, the caregiver or the wearer when desired, can readily open the absorbent article for use as a conventional diaper or for removal. Moreover, the lines of weakness assist in identifying to the wearer or the caregiver where the opening for the pant-like absorbent article should be made for the absorbent article to be used in the conventional configuration. Further, upon opening of the line of weakness, the opening edges will maintain a neat appearance rather than a ragged tear, thereby providing a more pleasing diaper appearance when the absorbent article is being used in the conventional configuration. Finally, the fastener may be configured to be provided by other components of the pant-like absorbent article, or combinations thereof. Components which may be used individually or in combination to provide the fastener include the line of weakness, the extensible side panels, and the like. Accordingly, the fastener of the present invention may remain unobtrusive to the wearer while the pant-like absorbent article remains in the pant-like configuration, but upon disengagement of the releasable joint, becomes available to the wearer for use. Further, incorporating the fastener into existing portions of the absorbent article eases manufacturing and reduces excess materials thereby reducing costs. |
Nicholas Purcell of Loughmoe
Nicholas Purcell, 13th Baron of Loughmoe (1651 – 4 March 1722) was the son of James Purcell of Loughmoe and the maternal nephew of James Butler, 1st Duke of Ormonde.
A member of the King's Privy Council, Purcell was the right-hand man to Patrick Sarsfield, Earl of Lucan. In 1687 Nicholas Purcell raised a troop of horse to support King James II — they were called the "Yellow Horse," probably on account of the uniform of the men. Nicholas fought at the Battle of the Boyne and at the Battle of Aughrim, and was a signatory to the Treaty of Limerick. He did not flee to Europe after Limerick but remained in Ireland to fight for the rights of Roman Catholics.
The Marquis de Ruvigny notes that Nicholas Purcell of Loughmoe was made Baron Loughmore by King James II in 1690. While there is little other evidence to confirm the creation of this peerage, it would enter the ranks of those titles created by the King while in exile .
Early years
Born sometime in 1651, Nicholas Purcell of Loughmoe Castle was the first son of Colonel James Purcell (1609–1652), 12th Baron of Loughmoe Castle, and Elizabeth Butler, daughter of Thomas Butler, Viscount Thurles, and Elizabeth, Lady Thurles and sister of James Butler, 1st Duke of Ormonde. The May 1652 Act of Settlement saw Nicholas' father, Colonel James Purcell, a Roman Catholic, lose the Tipperary lands the family had held since 1198. The Colonel was set not to be compensated with land in Connaught, however, as his fortunate marriage to the sister of the Duke of Ormonde enabled a powerful contact who ensured the allocation of some property. The allocation of land did not occur without difficulty however. On 13 September 1652, Colonel James Purcell, Baron of Loughmoe died and was buried in the Holy Cross Abbey. Between 1652 and 1656, his widow lost and regained her lands in Galway no fewer than four times .
With the Restoration of King Charles II in 1660, the family's fortunes improved. Elizabeth Purcell returned to Loughmoe and again enjoyed the jointure of £300 a year she had received before her removal. The young Baron Nicholas would have been eight or nine at this time and it was probably the first time he had seen his ancestral home. About this time, Elizabeth Purcell married Colonel John Fitzpatrick at Loughmoe; her children were present at the wedding .
By King's Order in a letter dated circa 31 October 1661 the Duke of Ormonde, Baron Nicholas' maternal uncle, was appointed guardian of the young Baron. It would appear that the majority of work in respect to the recovery and management of the Baron's estate fell to Colonel Fitzpatrick who discharged his duty with scrupulous fidelity. Under the Down Survey of 1663 all of the historically Purcell lands, a total of were granted to Baron Nicholas. These lands ran from Holy Cross to Templemore, and included the castles of Loughmoe, Rathelty, Dovea, Ballinahow, Lisheentagirt, Beakstown, Brownestown and Rorodstown. The total value of the property in 1640 was £4,340.
Again, between 1666 and 1686 little is known of the life of Baron Nicholas. This is a significant period of his life, from age 15 to 35. It is known that Baron Nicholas was tutored privately at Loughmoe and spent a considerable part of their day horse riding. Sometime in this period Baron Nicholas married the Honourable Rose Trevor, daughter of Viscount Dungannon .
Military Beginnings
With a strong history of loyalty to the Catholic cause, Nicholas Purcell was commissioned Captain on 12 February 1686 in the army enrolled by Lord Tyrconnell to uphold the cause of King James II. In May 1686 he was admitted as a member to the King's Privy Council of Ireland, he was 35. It was at this time in 1686 that King James II confirmed the title of Baron of Loughmoe to Colonel Nicholas.
Nicholas Purcell married Ellis Browne sometime around 1688; she was 20 years his junior. Ellis Browne was the daughter of Sir Valentine Browne who had a high command in the army of King James II and was created Baron Castlerosse and Viscount Kenmare by the King. In 1689 Col. Nicholas Purcell represented the County of Tipperary in the Parliament in Dublin.
Why he was there we are not certain but on 1 May 1689, accompanying His Majesty King James II from Brest, Col. Nicholas Purcell arrived home to Ireland. At this time Col. Purcell participated in the siege of Derry and an incident there provides an insight into the horsemanship and great courage of Col. Nicholas Purcell. A garrison of William's troops lay entrenched by or near a strand. The garrison fired at the horses of the oncoming Jacobite soldiers and were successful in downing many. Those who did succeed in reaching the defences found themselves confronted by "a dry bank of seven-foot high at the waterside", which most of them quickly decided was impracticable for cavalry.
The commanding officer, Edmund Butler, Viscount Mountgarret's second son, "being extraordinarily well mounted", showed the way and spurring his horse, flew over the bank, only to be at once made prisoner. Colonel Nicholas who was close behind Butler, had his horse killed under him and only saved himself by quickly jumping onto the horse's hind and heaving himself backwards.
After the Siege of Derry, Colonel Nicholas was sent by the King to join the Highland forces of the "Bonnie Dundee". The London Gazette reported 300 Irish troops and 60 horses were landed in Argyllshire, having been transported there by three French men-of-war and several other vessels from Carrickfergus. Colonel Nicholas had brought with him of powder, ball, match and flint, and was under the command of Major-General Alexander Cannon.
On the morning of 17 May 1689, 400 men of Colonel Purcell's regiment landed in small boats at Lochaber and escaped capture by Sir George Rooke by hiding in the mountains of Mull. On 12 July 1689 they landed at Duart in the Isle of Mull. During their short passage the French frigates had captured the Scottish privateer Pelican and her consort after a sharp encounter. Purcell's Dragoon's joined Dundee's Highlanders about 16 July, as the clans were gathering to meet the Williamite forces under Lieutenant-General Hugh Mackay. On 27 July the opposing forces met at Killiecrankie, between Aldclune and Aldgirnaig.
On his extreme right flank, facing Balfour's Regiment, Dundee placed Clan Maclean, under Sir John Maclean of Duart, and Purcell's Dragoon Regiment. To their left he placed the Clanranalds, Macdonalds and Glengarrys. On the extreme left flank were the Macdonals of Sleat, and a mixed regiment under Sir Alexander Maclean. To the left center were the Camerons, under Lochiel, opposing Mackay's Regiment. The center, opposite Leven's Regiment, was left open. The Viscount Dundee commanded on the left of center with his cavalry under Sir William Wallace.
Dundee held his fire until a half-hour before sunset, at which time the Highlanders charged down from the heights of Killiecrankie whooping war cries, and finally at muzzle-point, drawing their claymores and stampeding the Williamite troops. Purcell's Dragoon Regiment participated in the charge with gallantry.
Iain Lom MacDonald, one of the Highlanders present, well expressed the outcome when he later wrote: -In the tender birch copse, Near the farm of MacGeorge, Full many a gay cloak lies torn.
Unfortunately for the Jacobite cause the "Bonnie Dundee" was mortally wounded in the battle, and the initial advantage melted away. Purcell's Dragoon Regiment returned to Ireland and joined the squadron which had stayed behind and served with Major-General Buchan before Enniskillen on 30 July.
Earlier in the summer French Marshal Conrad von Rosen had rendezvoused at Trim, while on his way to attack Enniskillen. He had written to King James II from the rendezvous on 6 June 1689 to complain that Purcell's Dragoon Regiment was not well enough equipped to fight effectively. On 29 June von Rosen noted that the Duke of Berwick was using Purcell's dragoons to fortify positions on the River Finn and later in the defence of Omagh. The regiment received a commendation by the Duke of Berwick in action near Enniskillen, in a dispatch to Lieutenant-General Richard Hamilton.
On 29 August 1689 M. d'Escot wrote to Comte d'Avaux from Drogheda that Gormeston's Regiment had arrived that afternoon, and Purcell's Dragoon Regiment had arrived that evening, and listed Purcell's Regiment as composed of 12 troops for a total of 360 men, as recently determined by a review of troops. The regiment may have arrived from Bangor Bay with Brigadier Thomas Maxwell and a force of 500 horse and dragoons.
The planned attack of Dundalk did not materialise, and on 6 October King James' Army fell back on Ardee, which had been converted into a defended frontier position. From Ardee, on 21 October, Comte d'Avaux wrote the French King's Minister of War, Marquis Louvois, that he had been occupied reviewing two or three petty disputes between French and Irish officers, and hoped he had finally put them to rest. The most serious dispute was between a French lieutenant and one of the dragoons from Purcell's Regiment. The French lieutenant had been seriously wounded by the dragoon in the course of an argument, and he could have been arraigned for a military court martial because Purcell had stated he had never seen the lieutenant's commission, although the lieutenant had said he had participated in all the regiment's tests of arms; had served with the regiment as an officer before Derry and Enniskillen, and had habitually bivouacked in the field with the other officers.
The upshot was King James reprimanded the Irish officers who had recommended a court martial, and Comte d'Avaux acknowledging the French lieutenant was inclined to swagger and had a quick temper, sent him to his own quarters where he could care for him and dress his wounds.
Another French lieutenant had served with the regiment at an earlier period, and figured in an episode in 1687. While the regiment was stationed at Cashel, Lieutenant Rene Mezandiere ordered the Deputy Mayor, Charles Robinson, cast into the common prison "a noysome place on Sunday morning." All this occurred on 25 September 1687. The Corporation petioned the Government "that ye ad Lieut. be effectually prosecuted for ye same." Later, on 27 October 1687, the Corporation records, "The chapter doe wait upon Captain Purcell to acquaint him with the injuries done by the Souldiers to the Cathedral gates, Church yard, and to them that are employed to look after them from harme or trespasses." One wonders how Colonel Nicholas dealt with this matter.
During the war years, Colonel Purcell's wife and children evidently lived in France. The will of Lieutenant Pierce Power of Thurles, dated 26 June 1689, not only lists the amounts of money owed him by Colonel Purcell, but also mentions the fact his daughter, Cecily, was living with Mary Purcell of Loughmoe.
The following Roster of Officers of the Regiment is taken from various French Muster Rolls of Reviews held in Ireland after the arrival of King James II. The regiment was raised mostly in Tipperary:
Col. Nicholas Purcell, Commanding Officer,
Lt. Col. Robert Purcell, Executive,
Major Charles McDonnel,
Rev. Delany, Chaplain.
Troop 1. Colonel Nicholas Purcell, Lieut. James Fitzgerald, Cornet James Butler of Boytonrath (brother Sir Toby Butler, Solicitor-General), Quartermaster William Barron, and 40 dragoons.
Troop 2. Lt. Col. Robert Purcell, Liut. Thomas Purcell, Coronet Anthony Purcell, Quartermaster Daniel Quinn, and 45 dragoons.
Troop 3. Capt. Sir John Everard of Fethard (Cousin of Col. Purcell and brother-in-law of Capt. James Butler), Lieut. Michael Kerny, Cornet Thomas Travers, Quartermaster James Tumy, and 31 dragoons.
Troop 4. Capt. Miles Bourk, Lieut. Cornelius Meagher, Cornet Bryan Meagher, Quartermaster John Fitzgerald, and 31 dragoons.
Troop 5. Capt. Daniel McCarthy, Liet. Pierce Power of Thurles, Cornet Owen McCarthy, Quartermaster Edmund Meagher, and 36 dragoons.
Troop 6. Capt. Anthony Morres, Lieut. John Kennedy, Cornet Hugh Kennedy, Quartermaster Richard Keating and 25 dragoons.
Troop 7. Capt. John Purcell of Coneby, Kilkenny, Lieut. Theobald Purcell of Moyarde (member of the Peace Party), Cornet Hugh Purcell, Quartermaster James Wale, and 21 dragoons.
Troop 8. Capt. James Butler of Grangebeg (later, 6th Baron Dunboyne), Lieut. Theobald Butler of Culecullenduff (Capt.John Purcell named executor of his will 14 December 1698), Cornet Thomas Meagh, and 31 dragoons.
Troop 9. Capt. Condon, Lieut. Fitzgerald, Cornet Maly and 36 dragoons.
Troop 10. Capt. Cantwell, Lieut. Condon, Cornet Hurly, and 36 dragoons.
Troop 11. Capt. Edward Morres, Lieut. Ryan, Cornet Keating, and 44 dragoons.
Troop 12. Capt. Tobin, Lieut. Butler, Cornet Meyrick, and 44 dragoons. The Regiment probably averaged 420 dragoons and 45 officers.
During the winter of 1689 the regiment was engaged in skirmishes on the frontier, mostly around Belturbet.
Battle of the Boyne
The first big battle of 1690 was the Battle of the Boyne, on 1 July. King James held Colonel Browne's Infantry and Colonel Purcell's Dragoons in reserve at the Battle of the Boyne, and late in the day he committed his reserve behind the Comte de Lauzun, as the latter was about to charge the Williamite right flank which faced him within cannon shot. King James ordered Sir James Carny, the reserve commander, to move the reserve up to Lauzun's right flank and Purcell's Dragoons to dismount and engage as infantry.
At this moment an aid rode up with the news that the Irish right flank had been defeated. General Sarsfield and General Maxwell rode up to say it was impossible for the horse to charge the enemy because directly ahead lay two double ditches with high banks and a brook running between them. Also at this point of time, the Williamite dragoons mounted and the whole line marched by the flank to their right in the direction of the Dublin Road. Lauzun advised the King to take his own regiment of a horse and a squadron of Purcell's Dragoons and make his way to Dublin.
Sarsfield then rallied the cavalry and dragoons and covered the retreat to Dublin. The Irish Army paused at Dublin just long enough to regroup, then moved on for the defence of Limerick. King James departed Kinsale for France 2 July 1690.
Limerick
Purcell's Dragoon Regiment rode down to County Clare to rendezvous with the cavalry. French Major-General Boisseleau commanded the defence of Limerick, and the Williamites commenced their attack in August, and soon occupied both Ireton's Fort and Cromwell's Fort. Shortly thereafter, on 11 August 1690, Sarsfield crossed the Shannon near Killaloe with the pick of the Irish cavalry and dragoons including Purcell's Regiment.
Sarsfield led his troopers through the Tipperary mountains to Ballyneety where the Williamite siege train had encamped for the night, about south-east of Limerick. They took the enemy completely by surprise, and blew up two of their guns, and destroyed 12,000 pounds of powder, match and grenades. This raid became one of Sarsfield's most celebrated exploits.
Six guns salvaged from Ballyneety arrived on 16 August and the Williamite forces prepared for the forthcoming assault on Limerick. The heavy guns arrived from Waterford and the bombardment of the walls of Limerick commenced. Many fires were started by the incendiary bombs, and finally a breach was made in the wall about forty-two yards wide. General Boisseleau dug a retrenchment behind the breach, on which he mounted guns for defence.
On Wednesday, 20 August 1690, an attack in force was made upon the redoubt, after two days of bombardment. The first attack was repulsed. The second attack succeeded. General Boisseleau ordered 300 of Colonel Purcell's Dragoons and 150 of Colonel Luttrell's Cavalry to make a sally from St. John's Gate and attempt to retake the redoubt. When the Irish thundered out they were savagely met by the Williamites. The besiegers lost over 300 men repulsing the sally. The Irish lost 100 men and two officers; Lt. Col. Robert Purcell and Lieutenant Pierce Power.
Later, Brigadier Talbot led the Irish dragoons on a well timed sally from the spur at St. John's Gate. They were met by two enemy regiments, and after bloody encounter, forced their way through, re-entering the town through the breach and taking the besiegers from the rear. The Williamites were thrown into confusion and Boisseleau seized the moment to throw in his whole force. The Irish drove the besiegers back through the breach, over the counterscarp, back to their trenches, then back to their camp, for a complete victory after a battle of four hours. The siege of Limerick was raised and the Williamites withdrew.
Deputation to St. Germain
Colonel Purcell was one of those included in the deputation to St. Germain to persuade James to remove the Duke of Tyrconnell as head of the Army. The deputation was made up of Brigadier Henry Luttrell, Colonel Simon Luttrell, and Peter Creagh, Bishop of Cork. General Thomas Maxwell sailed to represent Tyrconnell. James met with the delegates, then took them to interview Louis XIV.
The delegates asked for a French general to command the Irish Army. On 9 May 1691, a French convoy reached Limerick with General Charles St. Ruth, two lieutenant-generals, d'Usson and de Tessé, and Brigadier Luttrell and Colonel Purcell, and also a considerable quantity of arms, ammunition and supplies.
There was confusion over who was now in charge of the army. St Ruth claimed command while Tyrconnell still claimed viceroy authority and ultimate control of the army. According to an account in the Life of James, Tyrconnell eventually submitted and left the management of the army to St. Ruth, who was superficially on good terms with him but at bottom was prejudiced against him, influenced by Luttrell and Purcell.
General St. Ruth reviewed the Irish regiments on the 18th and 19 May. On 2 June John Stevens noted, "Purcell's Regiment of Horse marched out of Limerick toward the camp". With a force of , 3000 horse, and 2,000 dragoons St. Ruth had his first encounter with the Williamite forces of 18,000, commanded by Baron de Ginkel, on 21 June 1691, at Athlone. This proved to be a Jacobite defeat. St. Ruth fell back to Ballinasloe, then decided to give battle on the high ground near Aughrim, about five miles (8 km) southwest of Ballinasloe.
St. Ruth took up his position on the eastern slopes of Kilcommodon Hill on 8 July. It was a good position, protected by a belt of bog along the whole front, behind which he placed his infantry. His right flank was anchored at Tristaum bridge at Urraghry Pass, and guarded by cavalry regiments of the Duke of Tyrconnell, Earl of Abercorn, and Colonel Edward Prendergast. His left flank was secured by Colonel Walter Bourk and in position in the Aughrim Castle ruin, and also guarded by the cavalry regiments of the Earl of Lucan, Brigadier Henry Luttrell and Colonel John Parker, and Colonel Purcell's Dragoon Regiment near the castle, all under the command of Major-General Dominick Sheldon. His command was subsequently weakened during the course of battle through transfer of elements of his cavalry and dragoons to the right flank. Purcell's dragoons evidently fought piecemeal, some trooper on the left flank and some on the right flank, mounted or dismounted, depending on the situation. Major Sir John Everard was killed in this action.
At the beginning of the battle, elements of Sheldon's cavalry repulsed four battalions of Williamite infantry working south of the causeway. Later the Marquis de Ruvigny, leading about 14 squadrons of Williamite horse, rode up the causeway, two by two, into the fire of Irish Infantry and Purcell's dragoons in trenches, and Bourk's infantrymen in the castle ruin; passed within thirty yards of the castle; forded the stream and forced the pass, and thus enfiladed the Irish left flank. Apparently, Sheldon's cavalry was unable to turn the enemy horse. General St. Ruth was killed in battle and the Irish Army was in complete route by 9 o'clock at night.
After the Battle of Aughrim, Purcell's Dragoon Regiment participated in the defence of Limerick for the second time. With the approval of Queen Mary, General Ginkel sent a communication to Tyrconnell in late July 1691 attempting to settle the battle of Limerick. Ginkel seems to have thought Tyrconnell more likely to compromise that Sarsfield "who with Luttrell and Purcell are the drivers and certainly have pensions from France". General Ginkel's gunners started the bombardment on 8 September 1691. On the night of 15 September Ginkel's forces crossed the main stream of the Shannon above Limerick. The Irish dragoons and infantry pulled back to Limerick over the Thomond bridge. The Irish cavalry rode back to Ennis.
On 22 September the Williamites moved along the Clare bank of the Shannon, and up to the Irish works at the approaches to the Thomond bridge. The Irish troops were pushed back to the bridge. A French Major ordered the drawbridge pulled up, shutting out the retreating troops. Almost everyone on the bridge was killed, including Colonel Redmond (or Redmund) Stapleton of Thurlesbegg and Major Thomas Purcell, Colonel Purcell's younger brother.
Siege of Limerick
Limerick, now under siege on all sides, beat a parley on 24 September, and the news was sent to the Irish Cavalry near Ennis. Several delegates arrived for a parley with General Ginkel; they included the Archbishop of Cashel, the Earl of Westmeath, the Lord Dillon, the Lord Galmoy, Major-General Sheldon and Colonel Nicholas Purcell. They dined with General Ginkel, then rode on to Limerick.
On 28 September, the Irish commissioners rode out to negotiate with General Ginkel. They were: Patrick, Earl of Lucan, Piercy Viscount Galmoy, Colonel Nicholas Purcell, Colonel Nicholas Cusack, Sir Toby Butler, Colonel Garrett Dillon and Colonel John Browne. The articles to the Treaty of Limerick were agreed upon 3 October between Sir Charles Porter and Thomas Coningsby, Lords Justice of Ireland, and Lieutenant-General Ginkel for the Williamites, and Patrick Earl Lucan, Piercy Viscount Galmoy, Colonel Nicholas Purcell, Colonel Garrett Dillon, and Colonel John Browne for the Irish.
They secured either the right to go overseas or, if they accepted William's regime, immunity from discriminatory laws. But civil articles to secure toleration for Roman Catholics were not ratified, thus enabling later Irish leaders to denounce the "broken treaty" of Limerick.
Later years
Thus ended Colonel Purcell's Dragoon Regiment's service in King James II's Irish Army. Most of them went back to their homes in Tipperary and Kilkenny, although some went to France with Baron Dunboyne. Colonel Purcell chose to remain in Ireland. He was still active in the affairs of the state as can be seen when Colonel Purcell, along with Viscount Fitzwilliams of Meryon and John Seigrave, Esq. on behalf of all Roman Catholics in Ireland, signed his name to a petition read at the Council of Parliament on 28 June 1695. The petition claimed that some Bills sent from England were "injurious to the petitioners' rights" and asked for time to examine the Bills and if necessary lodge "exceptions". The petition, "after full debate, [was] rejected."
On 31 October 1695 Colonel Purcell, along with Colonel Luttrell, attended the Privy Council to petition for an Act of Parliament to confirm the Articles of the Treaty of Limerick. History tells us that they were not successful.
We again in the life of Colonel Purcell reach a period were only sporadic incidents are known. For an unknown reason, on 28 April 1697 the Duke of Shrewsbury wrote to the Lords of the Treasury that amongst other payments, "Col. Nicholas Purcell should have 100l." On 16 June 1699 Colonel Purcell was managing, with a Mr. Roberts, South and Savage, the estate of Viscount Kenmare, his father-in-law. Colonel Purcell is quoted as saying that "Protestant tenants will readily take it [the estate] at 3,000£ a year".
On 30 March 1705 a special order was issued that issued licenses for Roman Catholics in Ireland to carry certain arms. Colonel Purcell was among the sixty or so people listed and was allowed to carry 1 sword, 1 case of pistols and 1 gun.
Of Colonel Purcell's children we know the following. As already mentioned his only son fell into a vat of boiling water and died. Of his three daughters it is only known that two of them married. Catherine, his second daughter married a member of the Gaelic nobility, Domhnall, the O'Callaghan. His third daughter, married a man surnamed White from Leixlip who apparently by 1705 was not yet eighteen. In conversation with a Paul Davys, possibly a cousin, Col. Purcell's daughter stated that she "desires not to live with her husband until he is eighteen." The Purcell-Whites were the last to live in Loughmoe and did so until approximately 1760.
On 4 March 1722, Colonel Nicholas Purcell of Loughmoe, 13th Baron of Loughmoe died. He was buried in the old abbey in Loughmore. For some reason, there are two stones appearing to record his death.
References
The Jacobite Peerage Baronetage, Knightage and Grants of Honour by the Marquis de Ruvigny and Raineval.
King James' Irish Army List, 1689, by John D'Alton
Journal of the Waterford & the South East of Ireland Archeological Society, Page 199
Category:1651 births
Category:1722 deaths
Category:Irish soldiers in the army of James II of England
Category:Irish Jacobites
Category:People from County Tipperary
Category:18th-century Irish people
Category:Irish MPs 1689
Loughmore
Category:Members of the Parliament of Ireland (pre-1801) for County Tipperary constituencies |
Personal Insurance Checklist
Life today moves fast, and it is vital that we keep in touch so that we can continue to protect you and your family and make sure your insurance coverage gets updated when life changes occur.
Please review the questions below. This Personal Insurance Checklist will allow us to make sure you, your family, and your assets are adequately protected and your insurance policies are as competitive as possible.
Personal Information
Name*
Email*
Phone*
Address
Street AddressAddress Line 2CityStateZIP Code
Best Time to Call
Checklist Questions
Do you have collectibles such as antiques, fine art, stamps, coins, or baseball cards?
Yes
No
Do you own valuable jewelry or furs?
Yes
No
Do you own costly sporting equipment or firearms?
Yes
No
Do you have valuable cameras or other photography equipment?
Yes
No
Do you have any alarms installed in your home?
Yes
No
Describe Alarms
Do you keep more than $100 cash in your home?
Yes
No
Are your personal belongings insured for their full replacement value?
Yes
No
Do you have children away at college?
Yes
No
Do you own tools, equipment, or instruments used in your trade or profession?
Yes
No
Do you operate an office or studio in your home?
Yes
No
Do clients come into your home to make purchases?
Yes
No
Do you baby-sit in your home?
Yes
No
Have you recently remodeled or redecorated your home?
Yes
No
Do you have plans to remodel or redecorate in the future?
Yes
No
If your home suffered an entire loss, would your insurance cover your home's full replacement value?
Yes
No
Are you interested in flood insurance for your home and personal property?
Yes
No
Are you interested in earthquake coverage?
Yes
No
Do you have a wood burning stove?
Yes
No
Do you have a swimming pool?
Yes
No
Do you own rental or investment property?
Yes
No
Do you own a vacation home?
Yes
No
If you rent, do you carry renter's insurance?
Yes
No
Do you plan to purchase a new vehicle this year?
Yes
No
List Potential Vehicles for New Purchase
Would you like us to provide you with an insurance estimate on the vehicle(s) you are considering?
Yes
No
Does our agency insure all of your vehicles?
Yes
No
Does your automobile policy specify by name all of the drivers in your household?
Yes
No
Do you routinely use vehicles you do not own?
Yes
No
Do you have non-factory installed equipment, such as car phones, stereos, or CD players in your automobiles?
Yes
No
Do you store CD's or cassette tapes in your car?
Yes
No
Do you own a vehicle with custom furnishings or equipment?
Yes
No
If your vehicle were in an accident, would your current automobile insurance reimburse you for a rental vehicle while yours is being repaired?
Yes
No
Do you own any of the following?
Camper
Moped
Golf Cart
RV/Motor Home
All-Terrain Vehicle
Boat or Personal Watercraft
Other
Other (Please Describe)
Do you carry at least a one-million-dollar umbrella liability policy?
Yes
No
Do you own a business?
Yes
No
Do we currently insure your business?
Yes
No
Do you plan to start a business?
Yes
No
Would you like a no-obligation review of your life insurance needs for your business?
Yes
No
Do you have sufficient liability or malpractice coverage?
Yes
No
Do you and your family have proper health insurance coverage?
Yes
No
Do you have disability income insurance?
Yes
No
Do other family members need such coverage?
Yes
No
Do you have life insurance which pays your mortgage in case of your death?
Yes
No
Are you insured for long-term supervised health care?
Yes
No
Do you know anyone else who could benefit from a no obligation insurance review from our agency? |
This summer at the San Diego Comic-Con Scarlett, Johansson (a.k.a. Black Widow, a.k.a. the sexiest Avenger) said that she and Captain America (Chris Evans) will form “something of an intimate friendship” in next year’s sequel Captain America: The Winter Soldier.
After revealing spy photos showed the two characters lip locking on set, we went back and reviewed 2012’s The Avengers to find any hints of this burgeoning relationship between two war vets. Turns out the characters do shoot a couple of admiring glances at each other, Black Widow during his first tour of S.H.I.E.L.D.’s Helicarrier and him right after boosting her onto a Chitauri vehicle in mid-battle.
Was it Marvel and Joss Whedon’s plan all along to hook these two up? We talked to the source herself, Scarlett Johansson, during a press junket for her new rom com Don Jon and she shed some light on the Rogers/Romanoff “pairing.”
SuperHeroHype: You said earlier this summer that in “Cap 2” your relationship with Steve Rogers gets more intense. I actually went back and watched “The Avengers” again and noticed these little glances that you and Chris give each other. It’s so subtle, not something you would think about unless you knew something was brewing. Was that something that Joss had built in?
Scarlett Johansson: No, actually. Of course in “Avengers” particularly you start to see the relationships forming between these characters, and all of us have very specific relationships with one another. Of course we all know how we feel about one another. We work and all use each other in different ways. We all have very specific opinions about one another. I think that Joss laid the groundwork for a lot of interesting connections. That’s why the audiences are so intrigued by that film because they love to see how these characters react to each other that come from completely different universes.
SHH: It makes sense, because his character and your character are sort of the most grounded of the superheroes.
Johansson: It does make sense. The pairing is strange on paper, but you’ll understand the pairing when you see “Cap 2” and of course Marvel’s really good at noticing those connections too! They will continue to build on the different relationships that audiences connect to.
Don Jon hits theaters on September 27, and Captain America: The Winter Soldier arrives in theaters on April 4, 2014.
(Photo Credit: Getty Images) |
Microrheological investigations in ionic liquids using optical trapping techniques.
In this paper, we demonstrate optical trapping of melamine particles (d ≈ 2.3 μm) within the pure ionic liquid ethylammonium nitrate (EAN) and show the first microrheological investigations of these important compounds using this technique. By analyzing the power spectrum of a particle trapped in EAN, we monitor the variation in viscous drag that it experiences in proximity to the sample coverslip, showing excellent agreement with Faxén's law. We also demonstrate hydrodynamic coupling between pairs of trapped particles. Finally, we explore temperature-dependent viscosity changes in ∼μL samples of EAN as a further example of microrheological investigations of ILs. |
Body Decorations, 1900–18
Body Decorations, 1900–18
In an age of extravagant dresses and immense feathered hats for women, and conservative suits and carefully chosen hats for men, body decorations and accessories faded in significance. It wasn't that such items were not important to people in the early years of the twentieth century; rather, they were simply overshadowed by the showiness of other parts of the outfit, as in the case of women, or were very understated, as in the case of men.
Women were certainly highly ornamented, especially in the first decade of the twentieth century. Their exquisitely tailored long dresses were topped off by closely fitting collars that accented the length of the neck, and their hats were among the most extravagant items ever to be worn. After about 1908, when skirts lifted to reveal the feet and ankles, shoes also became a way to show off one's fashion sense. Accessories, however, were downplayed. Most women carried a purse or small handbag, and the beaded purse, with its great versatility, was among the favorites. For evening wear a woman might slip on long gloves that extended as high as the elbow, and for colder weather a fur muff kept the hands warm. Most women wore jewelry but it was typically rather understated. Smaller earrings, rings, and a necklace of pearls were considered quite tasteful. Women might also carry a watch on a gold chain.
Women's makeup began to go through major changes around the turn of the century. Most women continued to use their own homemade makeup to lighten their faces or add color to their lips or cheeks. But modern manufacturers and distributors soon offered help. The precursor to the Avon cosmetics company was founded in the United States in 1886 and by 1906 had over ten thousand representatives offering a line of 117 different products to women across the country. Madame C. J. Walker (1867–1919) invented a line of cosmetics for African American women in the same decade.
Modern advertising made many more women aware of the "need" to wear cosmetics, driving the sale and use of such items to new levels among women of all social classes.
Men's costume in general was quite conservative during this period, which meant that accessories provided men with some small
element of personal expression. Several items were popular among men. Many men carried pocket watches on a chain, and the quality and style of the chain was a mark of distinction. Men might also carry a walking stick, and these sticks could be decorated with a carved gold or wooden handle, or have a decorative metal tip. Finally, the most distinctive items of male jewelry were all forms of fasteners: cuff links to hold shirt cuffs together; a stickpin to hold the tie in place; or studs and buttons to fasten the shirt. Such small items, when made in fine gold, could signal the wearer's wealth and taste.
Citation styles
Encyclopedia.com gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).
Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.
Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:
Modern Language Association
The Chicago Manual of Style
American Psychological Association
Notes:
Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most Encyclopedia.com content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list.
Body Decorations, 1946–60
Body Decorations, 1946–60
Proper accessories, makeup, and undergarments were an extremely important part of women's fashion in the late 1940s through the 1950s. The major fashion trends of the late 1940s, inspired by the New Look fashions of designer Christian Dior (1905–1957), called for a carefully assembled outfit that included such accessories as white gloves and umbrellas to accompany carefully chosen shoes, hat, and dress. The New Look called for tasteful but understated jewelry. One of the most important accessories was the handbag, or purse. Most women would not go out without a handbag. According to a New York Times article from 1945: "A woman without her handbag feels as lost as a wanderer in the desert."
There were other items that a well-dressed woman considered indispensable. Makeup, for example, was very important to the well-put-together ensemble. Numerous manufacturers offered makeup to women, and makeup advertising accounted for 11 percent of all advertising by 1950. Nail polish on the toenails became an important part of a woman's collection, especially after the mass production of plastic shoes which revealed the toes began in the late 1940s. As with all other items of a wardrobe, nail polish and makeup were chosen so that the colors complemented the outfit. When tight sweaters came into style in the mid-1950s, there was a short-lived craze for what is known as a "sweater girl" bra. This bra shaped a woman's breasts into stiff, pointed cones. The look was popularized by film star Jane Russell (1921–), as well as by several other busty 1950s screen stars. Young girls were especially fond of charm bracelets, which became trendy in the 1950s and continues in a lesser form to this day.
Men did not accessorize as much as women, but they did have several items they might wear to distinguish their outfits. A well-dressed man could choose from a range of cuff links, tie bars, and
collar pins, made in gold, silver, or a new metal called palladium. Wristwatches continued to be popular among men. A new wristwatch called a Timex was introduced in 1950 with an advertising campaign that boasted that the Timex could "take a licking and
keep on ticking." By the late 1950s one in every three watches sold in the United States was a Timex.
FOR MORE INFORMATION
Daniel, Anita. "Inside Story of a Handbag." New York Times (January 21, 1945).
Citation styles
Encyclopedia.com gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).
Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.
Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:
Modern Language Association
The Chicago Manual of Style
American Psychological Association
Notes:
Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most Encyclopedia.com content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list.
Body Decorations, 1930–45
Body Decorations, 1930–45
The extravagant, frivolous fashions of the 1920s were replaced by more practical decorations and accessories during the 1930s. The Great Depression (1929–41) and World War II (1939–45) put pressure on both men and women to simplify their wardrobes. The fanciful purses of the 1920s were replaced by the plainer clutch purse style, for example. Rather than buying different jewelry to adorn each different outfit, women instead favored simple styles or wore meaningful pieces to which they could add decoration, such as charm bracelets.
One trend for excess continued during these lean years, however. The fashion for wearing heavy makeup started during the 1920s lasted well into the next decades. Women blushed their cheeks with rouge, darkened their lips with a variety of lipsticks, and lengthened and thickened their eyelashes with mascara. According to Jane Mulvagh in Vogue History of 20th Century Fashion, in 1931 Vogue magazine reported that "we are all painted ladies today," adding: "Now we feel undressed unless we have the right shade of face powder, and if we lose our lipstick, we lose our strongest moral support." The rationing, or limiting, of luxuries during World War II highlighted the importance of makeup. Mulvagh noted that the British government "tried to ban cosmetics at the outbreak of war, but fortunately withdrew this ruling." Lipstick and rouge, she pointed out, were "the last unrationed, if scarce, indulgences of feminine expression during austerity [seriousness], and were vital for morale."
Men simplified their looks more than women did. With the rising popularity of sporty clothing styles during the 1930s and beyond, men abandoned other forms of ornament such as canes and pocket watches. The only pieces of jewelry men typically wore were a wedding ring if they were married, pins to hold down the collars
of their button-up shirts when they wore a tie and, if they were in the military, a metal identification bracelet.
Citation styles
Encyclopedia.com gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).
Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.
Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:
Modern Language Association
The Chicago Manual of Style
American Psychological Association
Notes:
Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most Encyclopedia.com content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list.
Body Decorations, 1980–2003
Body Decorations, 1980–2003
Since the 1980s body decoration and accessories have become a highly lucrative business. The intense interest in designer fashions in the 1980s created a demand for cosmetics, jewelry, handbags, and other items made by these makers of high fashion. For many, these accessories, with their designer labels or distinctive scents, were the only way to afford designer luxuries. At the beginning of this period the brand names of a few designers, such as Gucci and Prada, were the most sought after, but by the twenty-first century a multitude of brands offered men and women accessories in a variety of styles. Some social groups began to identify themselves by the brand names they wore rather than the particular style of accessory they chose. Some wore Tommy Hilfiger's (1951–) fashion lines, while others preferred Calvin Klein's (1942–) selections, for example.
As brand names rose in popularity, some people sought out unique adornments to set themselves apart. During the 1990s and into the twenty-first century, body piercing and tattooing became increasingly popular, especially among youth. The unique designs permanently drawn on the skin and the collection of jewelry pierced into the body were once only worn by groups such as punks. But by the 1990s these adornments had become accepted by a wider group of people, and many high school and college students chose to tattoo themselves and pierce their belly buttons, noses, or tongues.
Beginning in the 1980s the most coveted perfumes, colognes, lotions, and makeup were only available at high-end retail stores, but by the late 1990s people seeking more convenience had started buying their cosmetics through the mail, over the Internet, and in grocery stores. These changes did not reflect an abandonment of brand name status, as these outlets started to carry luxurious products.
Citation styles
Encyclopedia.com gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).
Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.
Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:
Modern Language Association
The Chicago Manual of Style
American Psychological Association
Notes:
Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most Encyclopedia.com content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list.
Body Decorations, 1919–29
Body Decorations, 1919–29
After World War I (1914–18) both women and men changed the way they adorned themselves. No longer needing to follow the rules set by the military, men began getting their fashion guidance from newly popular film actors and public figures, such as Edward VIII, the Prince of Wales (1894–1972), or created their own styles on college campuses throughout Europe and the United States. The decade brought more changes for women than for men.
Women began to experiment with makeup. Bold use of cosmetics marked the decade as women created dramatic looks that imitated movie stars such as Clara Bow (1905–1965) and Theda Bara (1885–1955). Women traced their eyes with black eyeliner, plucked their eyebrows out and drew new ones with a dark pencil, and re-shaped the line of their lips with red pencil to make them look like a cupid's bow. To complement their heavily painted faces, women slicked bright polish on their fingernails and adorned themselves with many accessories.
The accessories of the decade were influenced by many different sources. Women wore jewelry inspired by the unearthing in 1922 of the ancient Egyptian pharaoh Tutankhamen, who lived in the fourteenth century b.c.e., and by the new art movements sweeping Europe and the United States, including cubism, art deco, and surrealism. The creation of costume jewelry allowed women to wear bigger, bolder jewels and to follow trends without spending a fortune. Brand names also became important during the decade, especially with the introduction of Chanel No. 5 in 1922, which would become the world's most famous perfume.
Citation styles
Encyclopedia.com gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).
Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.
Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:
Modern Language Association
The Chicago Manual of Style
American Psychological Association
Notes:
Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most Encyclopedia.com content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list.
Body Decorations, 1961–79
Body Decorations, 1961–79
People adorned their bodies in widely varying ways in the 1960s and 1970s. The popularity of modern styles at the beginning of the 1960s brought huge plastic flower ornaments, heavy makeup, especially around the eyes, and false eyelashes for women. Men accepted jewelry as part of their wardrobe, starting with the love beads hung around their necks in the 1960s and ending the period with multiple chains of gold adorning their necks and chests, bracelets around their wrists, and rings on their fingers.
The middle years of this time period were punctuated by the antifashion of the hippies, or people who rejected society's conventional customs and embraced free personal expression. Although hippies were relatively few in number, they brought natural, homemade adornment and political symbols into the limelight. Both men and women tucked real flowers behind their ears and wore homemade jewelry. Many wore strings of love beads around their necks, peace symbols, and buttons protesting the
Vietnam War (1954–75) to signal their desire for peace. Hippies also made Native American jewelry and headbands fashionable for whites to wear.
After the Vietnam War ended, fashion shifted again toward artificial, flamboyant styles. The gaudiest styles were developed by dancers at discotheques, or bars where people gathered to dance to music, and punks, who created a deliberately aggressive style of dress. Disco style was glamorous, with glittery jewelry and colored glasses complementing the bold clothes. Punk style was the opposite. Punks stuck safety pins through their skin, wore heavy metal chains and spiky dog collars around their necks, and
painted themselves with black eye makeup, fingernail polish, and lipstick.
Citation styles
Encyclopedia.com gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).
Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.
Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:
Modern Language Association
The Chicago Manual of Style
American Psychological Association
Notes:
Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most Encyclopedia.com content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list. |
Researchers at Karolinska Institutet and SciLifeLab have developed a new method of analysis that maps the location of proteins in the cell. The information has been compiled in a database that is accessible to researchers around the world. The method of analysis, which has been published in the journal Molecular Cell, can also provide in-depth knowledge of disrupted cell function in cancer and other diseases.
Every cell in the body is made up of thousands of different proteins that are perfectly organised for the cell, and by extension our body organs, to function optimally. Cells can be compared with miniature advanced factories, where each protein has a given function and location.
Proteins on the surface of the cell are used for communication between the cell and its environment. Other proteins in the cell nucleus can copy genetic material or protect it from damage. Proteins in the mitochondria produce energy for the cell, while other proteins in the proteasomes, the cell’s waste stations, break down obsolete proteins, and so on. These processes are hugely complex.
Mapped the cellular locations of proteins
The researchers have mapped the cellular locations of proteins by developing their own method of analysis based on mass spectrometry. This information has been compiled in a large database and released in a new publication. The database can now be used by researchers around the world who are searching for information on proteins whose function is still unknown.
"The method we have developed can also be used to study whether certain diseases, such as cancer, are caused by dislocated proteins that disturb normal cell functions. It is also possible to study how cell proteins move from one location to another when the cell’s external milieu changes," says Janne Lehtiö, professor at the Department of Oncology-Pathology at Karolinska Institutet in charge of the study.
Protein movement provides important information
One example of the latter is the study of how around ten proteins move when cancer cells are treated with specific drugs. This provides important information about which proteins are involved in the cell's response to treatment, and thus knowledge of the drugs’ mechanisms of action.
"The method also allows the published database to be expanded by other researchers worldwide, with the aim of mapping the cell’s architecture and protein functions in more detail," says Lukas Orre, researcher at the Department of Oncology-Pathology at Karolinska Institutet and principal author of the study.
Complements the Human Protein Atlas
The study, in combination with another Stockholm, Sweden, based project, the Human Protein Atlas, that has systematically mapped the human proteome (network of proteins), provides a greater understanding of the cell and a comprehensive map of cell proteins.
Database: subcellbarcode.org
The study was funded by the Swedish Foundation for Strategic Research, the Swedish Cancer Society, the Swedish Research Council, the Swedish Childhood Cancer Fund, AstraZeneca, the Cancer Research Funds of Radiumhemmet and the Stockholm County Council.
Publication
”SubCellBarCode: Proteome-wide mapping of protein localization and relocalization”
Lukas Minus Orre, Mattias Vesterlund, Yanbo Pan, Taner Arslan, Yafeng Zhu, Alejandro Fernandez Woodbridge, Oliver Frings, Erik Fredlund and Janne Lehtiö.
Molecular Cell online 3 January, 2019. |
Hannah Gale has to avenge her husband’s death and the loss of her future and watching Emitt Hayes swing will do just that. When she’s able to catch him, she can bring him back and claim the bounty, redeeming some of the wealth Emitt stole.
Emitt stole a horse to redeem a debt.
It started a landslide of events that changed many lives, and a has eaten at him ever since. He’s taken on the name Cort Nelson to hide. When his past catches up with him, Hannah is more fire than he’s expecting. His quiet… |
Q:
foreach loop through specific $request
I have a form that has several input types all that need to be a handled differently. I did a loop to name them like so in the form:
product-0-length
product-0-size
product-1-length
product-1-size
product-2-length
product-2-size
On my processing php (where the form info gets sent) I want to iterate a loop to handle say size different from length. My thought was this but no luck:
<?php
$i = 0;
foreach($_REQUEST['product-'.$i.'-length'] as $key => $val) {
//style or do what I need with the length information for each product
echo '<li>'.$key.'='.$val .'</li>';
$i++;
}
?>
A:
As I suggested in the comments above you could use a different naming scheme for your input fields. Take a look at this example for the form creation:
<?php
foreach ($i=0; $i<3; $i++) {
echo "<input type=\"text\" name=\"product[$i][length]\">\n";
echo "<input type=\"text\" name=\"product[$i][size]\">\n";
}
When submitting this form the server will translate the notation into a php array which is a very convenient thing. You can simply iterate over that array:
<?php
foreach ($_POST['product'] as $key=>$product) {
echo "<li>Length of product $key: " . $product['length'] . "</li>\n";
echo "<li>Size of product $key: " . $product['size'] . "</li>\n";
}
Note that this is a very primitive example, all error checking and the like is missing to keep things crunch. Also I did not test this code here, it is just meant to point you into the right direction, but I hope there are not too many typos in there...
|
Pretreatment with PKC inhibitor triggers TNF-alpha induced apoptosis in TNF-alpha-resistant B16 melanoma BL6 cells.
Tumor necrosis factor alpha (TNF-alpha) modulates various events through several different pathways. Many tumor cells are resistant to this cytokine. Pretreatment of these cells with actinomycin D enhances TNF-alpha-induced apoptosis. In the present study, we investigated the mechanism of this enhancement and whether or not the apoptosis of TNF-alpha-resistant cancer cells can be induced by the inhibition of Protein kinase C (PKC). When TNF-alpha was added after inhibition of PKC by H7, apoptosis was observed, and companied with the activation of nuclear factor kappa B (NF-kappaB). After the inhibition of protein kinase B (Akt) by LY294002 or p38 mitogen-activated protein kinase (p38MAPK) by SB203580, the addition of TNF-alpha did not cause apoptosis. However, after the inhibition of MAPK/extracellular signal-regulated kinase kinase 1/2 (MEK1/2) with U0126, apoptosis was observed when TNF-alpha was added. In the Western blotting analysis, phosphorylation of MEK1/2 occurred at 60 minutes after the addition of TNF-alpha. However, it was noted that after pretreatment with H7, a significant decrease in phosphorylated MEK1/2 was observed. The present findings suggest that MEK1/2 plays an important role in TNF-alpha-resistance in TNF-alpha-resistant B16 melanoma BL6 cells. Furthermore, it was found that MEK1/2 is more important than NF-kappaB, Akt, and p38MAPK in anti-apoptotic PKC signaling and that TNF-alpha-resistance can be overcome by inhibiting MEK1/2. These results suggest the possibility of development of a new anticancer drug treatment. |
Q:
How do I change what is read by VoiceOver for an NSButton that has no Title (image only)?
I have a few NSButtons that are images only, and are set completely programmatically. When VoiceOver reads these buttons, it says "unchecked checkbox" for each of them. I'd like to set an attribute for VoiceOver to read that is more descriptive (for accessibility purposes), but I can't set the title attribute on the button because the title will then be displayed (I only want the icon to be displayed).
I tried using
[self.button accessibilitySetOverrideValue:title forAttribute:NSAccessibilityDescriptionAttribute];
but nothing changed. I also tried NSAccessibilityTitleAttribute, NSAccessibilityRoleDescriptionAttribute, and NSAccessibilityRoleAttribute with no luck. Am I doing something incorrectly?
Thanks.
A:
It looks like the original code was correct, but it only works when called on the button cell (not the button itself). The above was changed to:
[self.button.cell accessibilitySetOverrideValue:title forAttribute:NSAccessibilityDescriptionAttribute];
where title is still an NSString*. Assuming title is @"Test", the above code causes VoiceOver to read "Test unchecked checkbox." The only way I found to have it not read the "unchecked checkbox" parts was to clear three other attributes: NSAccessibilityTitleAttribute, NSAccessibilityRoleDescriptionAttribute, and NSAccessibilityRoleAttribute. I overrode each of these with @" ". If anyone has a more elegant solution to ignore these fields, please let me know. For now, I'll mark this answered.
|
Q:
Rails3.0.0Beta4 setting session store to database
I am porting a Rails 2.3.8 app to Rails 3.0.0Beta4. I can't get the session to be written to the database instead of cookies.
I do the following in config/environments/development.rb:
config.session_store(:active_record_store)
The session store is set correctly - I verify that by dumping config after the set.
What am I missing?
A:
In case you haven't done it yet, you need to run "rake db:sessions:create" to
have the necesary table created on the DB.
|
How does one shade armor omg.
Could someone please explain to me how “naive, well-meaning individual who just wants to find somewhere to fit in and be accepted meets and befriends a small, yellow, cute, harmless-looking creature that turns out to be a sociopathic, sadistic eldritch abomination with reality warping powers, who worms its way into every aspect of his life and begins to destroy it from the inside out all under the guise of ‘helping’ but in fact doing everything simply because it was bored, lying to him, abusing him, estranging him from his brother, causing the near-death of his closest friend, and leading to said individual adopting a ‘Trust No One’ policy to keep anyone else from having to get caught up in his problems and getting hurt” was a character arc I somehow managed to stumble acrossin the span of a mere 8 months? It’s like the universe is conspiring to kill me with a very specific subset of Feels or something, I swear.Gravity Falls belongs to Alex HirschUndertale belongs to Toby Fox “Flowey Is not a Good Life Coach” was written by unrestedjade |
The Daily Mirror has this story today:
Hunt, 43, outlined the impact of cuts, which he admitted could halve the workforce of nearly 600, to senior staff at the department’s HQ near Trafalgar Square.
He said: “The best-case scenario is still going to be a scenario in which there are going to be bigger cuts than any of the areas we represent have ever had to face, probably in their history.
We’ve made a small start with changes in policy on ministerial cars which is an absolute pain, but we’re all getting used to it.” |
Satellite & Space Projects News - July 2016
NASA has selected Blue Origin to join its programme for Suborbital Reusable Launch Vehicle (sRLV) services. Under the program, NASA’s Space Technology Mission Directorate selects promising technologies from industry, academia and government, and tests them on commercial launch vehicles. Blue Origin, along with other suppliers on the program (including Virgin Galactic, World View Enterprises, Inc and Masten Space Systems, Inc.) will compete for contracts to deliver payload integration and flight services to NASA.
One Web Satellites appoints subs
OneWeb Satellites, a 50/50 joint venture between Airbus Defence and Space and OneWeb, has appointed its first three top-tier subcontractors:
The Luxembourg government has announced its strategy for the country to become a European hub for space mining (3 June 2016). The government says that it plans to introduce a legal and regulatory framework for the mining of resources on Near-Earth-Objects such as asteroids. The law is expected to come into force in 2017 and will establish a space mining licensing scheme. The government wants to give operators more legal certainty as to their legal rights over resources harvested in outer space in accordance with international law. The government also announced dedicated funding for R&D in technologies related to space resource utilization.
Call for UK national space programme
Members of the UK Parliament have recommended that the UK establish a national space programme. In a report, published on 15 June 2016, the MPs noted that a strong national space programme, sitting alongside the UK's current contributions to the European Space Agency (ESA), could help to increase the UK's competitiveness in the space market, ensure continued access to and influence over ESA programmes, and give the UK greater leverage to participate in bilateral missions. Over three-quarters of the UK Space Agency’s expenditure is currently channelled through the European Space Agency. In other areas of the report, the MPs consider whether the UK government has the correct approach by limiting the capabilities of the proposed UK spaceport to horizontal launch capabilities for sub-orbital flights only, and ask the government to set out its rationale for this approach.
LeoSat sees potential in Leo-Geo partnership
In an interview with Spacenews.com (14 June 2016), CEO of LeoSat, Mark Rigolle, suggested that a future partnership with a geo-stationary satellite operator is likely. LeoSat is building a satellite enabled broadband data network comprising 78 Low Earth Orbiting satellites to delivery high speed broadband data services to corporates and governments. LeoSat differentiates its planned offering from other providers because of its target market and its business model, which is to sell large chunks of capacity to relatively few customers – between 3000 and 5000 customers after a few years. Rigolle noted that there is precedent for Leo-Geo partnerships, pointing to the deal between OneWeb and airline connectivity provider Gogo under which OneWeb will fill the gap by providing connectivity to passengers flying over the north and south poles where there is low connectivity to geo-stationary satellites located over the equator.
Ariane 6 cost savings
Alain Charmeau, CEO of Airbus Safran Launchers (ASL) – prime contractor on the development of Ariane 6 – has said that the new launch vehicle will achieve a reduction of between 40 and 50% in recurring costs compared to Ariane 5, its predecessor. Ariane 6, under development by ASL and the European Space Agency, is intended to improve Europe's competitiveness in the launch market in the face of stiff, and considerably cheaper, competition. In an interview with Via Satellite on 16 June 2016, Charmeau explained that some of the savings would be achieved by smarter working between the customer and industry and more industry control over the design process resulting in faster development time, as well as a reorganisation that will see work being carried out across fewer locations.
Planet Labs
On 12 June 2016, Planet Labs Inc. (now renamed as just "Planet") launched 12 earth-imaging cubesats known as "Flock 2P" on board a Polar Satellite Launch Vehicle into a Sun Synchronous Orbit (SSO). The SSO will ensure that the satellites pass over the same spots on the ground at exactly the same time each day, making it easier to spot changes on the ground over time in the imaged locations. The primary payload for the launch is CartoSat 2C, an Earth Observation satellite of the Indian Space Agency. |
News
Report Shows Growth Potential for Food Co-ops
22 January 2013
UK - A new report from the Soil Association highlights the growth potential of food co-ops and buying groups to support access to affordable, ethical and sustainable produce.
The report produced at the end of the Making Local Food Work, Big Lottery funded programme revealed over 400 enterprises were supported by the initiative with many opportunities for development across the UK.
This confirms consumers are keen to embrace new community food initiatives ensuring food is local, sustainable and affordable.
Buying groups involve people who regularly get together to buy local and organic food.
Groups vary greatly in size and by pooling buying power and ordering food in bulk, direct from farmers or suppliers, they buy good quality food at a more affordable price.
Traci Lewis, Project Manager at the Soil Association said: “Food co-ops and buying groups help support access to quality affordable food, they’re especially relevant where there are ‘food deserts’ or people don’t have any other options outside of the supermarket but want to access affordable local and organic produce.
"What’s inspiring about the report is it shows the commitment people are willing to make to ensure the success of initiatives like this. It requires people to work together with friends, colleagues or neighbours to shop differently, when supermarkets often are the easy option.
"With the New Year ahead of us, many people will find now is a great time to try to change their shopping and eating habits. Food co-ops and buying groups are flexible and innovative and a range of different models can be easily adopted by farmers, institutions and consumers.”
The report also highlights some of the most interesting recent developments in the sector including new large scale buying groups and co-ops such as People’s Supermarket, a sustainable food cooperative in London and Real Food Exeter a community owned food store with over 300 members.
Successes in Europe also feature including Biocoop in France, a national organic distribution co-op with over 320 independently run Biocoop member shops and Gruppo di Acquisto Solidale network, Italy (GAS) a large scale buying group with over 700 member groups each with numbers varying between 10-300 families. |
Giant Mint Choc Chip Swirl Lollipops make great gifts, party favours, decorations for cakes (as per the photo) sweetie tables and much more With Christmas coming up they would make a great stocking filler for sweetie lover in your life. Or to decorate your families Christmas Cake! These are the perfect Christmas colour being red and white stripe too! Sizes: Lollipop is 4” diameter Total height of stick including lollipop is 10” We also have Strawberry Swirl Lollipops too - check out our other listing! Any questions please message me. Also for multiple purchases.
Merry Christmas Snowflake Rock, Gift Boxed. Mint flavoured snowflake rock sweets in a PVC box. Approximately 12 - 15 sweets in each box. Merry Christmas label supplied as standard. This small gift makes an ideal Secret Santa gift or stocking filler. Full ingredients list on every product. Postage: One shipping price of £3.49 no matter how many boxes you buy. Sent by Royal Mail 48 service. Upgrade to first class for an extra 50p, again no increase for extra boxes. Please note this service is not guaranteed and dates given by Ebay are just estimates. Next day service with DPD is available £9.95. Returns: we accept returns of unopened boxes only as this is a confectionery product. If you should decide to return your order please use the Ebay returns process.
When the hitting, prodding, and begging wont work, try these Anti-Snoring Mints. They wont actually have any effect on snoring, but youll get a satisfying kick out of giving them to thesnore monster in your household! |
1. The Technical Field
The present invention relates to solid oxide fuel cells (SOFCs), and the structures and materials by which they are constructed. In particular, the present invention concerns anode structures for solid oxide fuel cells.
2. Solid oxide fuel cells are recognized as having the potential to mitigate environmental problems while meeting the power generation and cogeneration needs of tomorrow. Present work in SOFCs is centered on the use of zirconia electrolytes operating at high temperatures between 900-1000.degree. C. These high temperatures present special challenges related to materials degradation.
The high temperature is particularly challenging to anode stability. Metallic nickel phase appears to be by far the best anode material for fuel oxidation. It is also preferred for hydrocarbon fuel since nickel is a good catalyst for hydrocarbon reformation. The primary drawback in using a nickel anode is that a nickel anode will typically have a high thermal expansion coefficient, on the order of 13.times.10.sup.-6 cm/cm/C, compared to the commonly used electrolyte material, zirconia, which has a thermal expansion coefficient of 10 to 11.times.10.sup.-6 cm/cm/C. Furthermore, metallic nickel exhibits poor wetting characteristics on zirconia. Both these issues promote coarsening of nickel particles leading to eventual loss of both physical contiguity (which lowers electrical conductivity) and reaction interface area (which slows electrode kinetics).
To mitigate some of these issues a mixture of nickel and zirconia (30 to 50 percent zirconia by volume has been used as the anode to provide a closer thermal expansion between the anode and the electrolyte, as well to increase the three phase boundary (where the gas phase-ionic conductor [zirconia] and electronic conductor [nickel] meet). Although the bulk thermal expansion of the anode and electrolyte, respectively, may be closer, at the microstructural level, the thermal expansion mismatch between individual nickel and zirconia grains does still exist.
Additionally, the typical fabrication processes used to apply the anode to the electrolyte, such as screen printing, plasma spraying or slurry coating of the anode (mixture of nickel oxide and zirconia) onto a densified zirconia substrate and sintering the anode are unlikely to provide a contiguous zirconia structure to provide an enhancement in the three phase boundary area. A high sintering temperature, 1400 to 1500.degree. C., helps in providing the necessary sintering of zirconia particles in the anode mixture to accomplish a contiguous structure. However, the thermal expansion mismatch typically warps the substrate at those sintering temperatures. In addition, the nickel particles in the nickel-zirconia mixture still coarsen over time resulting in cell performance degradation.
The ideal anode microstructure has sufficient open porosity for reactant access from the bulk fuel gas to the electrolyte-anode interface and removal of product species from the interface; and a mechanically stable microstructure to maintain continuity, preferably of both electronic and ionic conducting phases and a well adhered microstructural interface. It is thus necessary to reduce the coarsening rate of the nickel particles to improve stability of cells. It is also necessary to promote the wettability of (or adhesion of) the Ni on to the zirconia substrate. |
The gang, 5 raging alcoholic, narcissists run a failing dive bar in south philly. The gang make up some scheme for sex, money, fame or for any other terrible reason you could think of. It always goes south however, as the gang (sometimes literally) have their plans blow up in their face. |
/**
* This file is part of lavagna.
*
* lavagna is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* lavagna is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with lavagna. If not, see <http://www.gnu.org/licenses/>.
*/
package io.lavagna.web.security.login;
import io.lavagna.web.security.SecurityConfiguration.SessionHandler;
import io.lavagna.web.security.SecurityConfiguration.Users;
import io.lavagna.web.security.login.OAuthLogin.OAuthConfiguration;
import io.lavagna.web.security.login.OAuthLogin.OauthConfigurationFetcher;
import io.lavagna.web.security.login.oauth.OAuthProvider;
import io.lavagna.web.security.login.oauth.OAuthServiceBuilder;
import org.junit.Assert;
import org.junit.Before;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.mockito.Mock;
import org.mockito.junit.MockitoJUnitRunner;
import org.scribe.builder.api.Api;
import org.scribe.oauth.OAuthService;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import java.io.IOException;
import java.util.Arrays;
import java.util.List;
import java.util.Map;
import static org.mockito.Matchers.any;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.when;
@RunWith(MockitoJUnitRunner.class)
public class OauthLoginTest {
@Mock
private Users users;
@Mock
private SessionHandler sessionHandler;
@Mock
private OauthConfigurationFetcher configurationFetcher;
@Mock
private OAuthServiceBuilder serviceBuilder;
@Mock
private HttpServletResponse resp;
@Mock
private HttpServletRequest req;
@Mock
private HttpSession session;
private OAuthConfiguration configuration;
private String errorPage = "errorPage";
private OAuthLogin oAuthLogin;
@Before
public void prepare() {
configuration = new OAuthConfiguration("http://baseUrl", Arrays.asList(
new OAuthProvider("google", "", ""),
new OAuthProvider("bitbucket", "", "")));
oAuthLogin = new OAuthLogin(users, sessionHandler, configurationFetcher, serviceBuilder, errorPage);
when(configurationFetcher.fetch()).thenReturn(configuration);
when(serviceBuilder.build(any(Api.class), any(String.class), any(String.class), any(String.class), any(String.class))).thenReturn(mock(OAuthService.class));
when(req.getSession()).thenReturn(session);
}
@Test
public void initiateWithoutPost() throws IOException {
when(req.getRequestURI()).thenReturn("/login/oauth/google");
Assert.assertFalse(oAuthLogin.doAction(req, resp));
}
@Test
public void initiateWithPostWrongUrl() throws IOException {
when(req.getRequestURI()).thenReturn("/login/oauth/derp");
when(req.getMethod()).thenReturn("POST");
Assert.assertFalse(oAuthLogin.doAction(req, resp));
}
@Test
public void initiateWithPost() throws IOException {
when(req.getRequestURI()).thenReturn("/login/oauth/google");
when(req.getMethod()).thenReturn("POST");
Assert.assertTrue(oAuthLogin.doAction(req, resp));
//TODO: fixme
//verify(authResultHandler).handleAuthorizationUrl(req, resp);
}
@Test
public void callbackHandle() throws IOException {
when(req.getRequestURI()).thenReturn("/login/oauth/google/callback");
Assert.assertTrue(oAuthLogin.doAction(req, resp));
//TODO: fixme
//verify(authResultHandler).handleCallback(req, resp);
}
@Test
public void callbackHandleForWrongProvider() throws IOException {
when(req.getRequestURI()).thenReturn("/login/oauth/derp/callback");
Assert.assertFalse(oAuthLogin.doAction(req, resp));
}
@Test
public void checkModelForLoginPage() {
when(req.getSession()).thenReturn(mock(HttpSession.class));
Map<String, Object> r = oAuthLogin.modelForLoginPage(req);
@SuppressWarnings("unchecked")
List<String> providers = (List<String>) r.get("loginOauthProviders");
Assert.assertTrue(providers.contains("google"));
Assert.assertTrue(providers.contains("bitbucket"));
Assert.assertFalse(providers.contains("github"));
Assert.assertFalse(providers.contains("twitter"));
Assert.assertTrue(r.containsKey("csrfToken"));
}
}
|
0 0 1 1
1 0 1 1
2 0 1 1
3 0 1 1
6 0 1 1
25 0 1 1
0 1 1 1
1 1 1 1
8 1 1 1
20 1 1 1
27 1 1 1
1 2 1 1
2 2 1 1
5 2 1 1
7 2 1 1
8 2 1 1
28 2 1 1
2 3 1 1
3 3 1 1
4 3 1 1
11 3 1 1
2 4 1 1
4 4 1 1
22 4 1 1
26 4 1 1
0 5 1 1
5 5 1 1
15 5 1 1
2 6 1 1
6 6 1 1
13 6 1 1
20 6 1 1
30 6 1 1
0 7 1 1
7 7 1 1
11 7 1 1
16 7 1 1
26 7 1 1
6 8 1 1
8 8 1 1
9 8 1 1
12 8 1 1
18 8 1 1
22 8 1 1
26 8 1 1
0 9 1 1
9 9 1 1
10 9 1 1
20 9 1 1
22 9 1 1
24 9 1 1
26 9 1 1
1 10 1 1
10 10 1 1
14 10 1 1
17 10 1 1
28 10 1 1
5 11 1 1
11 11 1 1
23 11 1 1
10 12 1 1
12 12 1 1
2 13 1 1
13 13 1 1
1 14 1 1
14 14 1 1
19 14 1 1
3 15 1 1
15 15 1 1
21 15 1 1
3 16 1 1
15 16 1 1
16 16 1 1
5 17 1 1
9 17 1 1
17 17 1 1
19 17 1 1
29 17 1 1
0 18 1 1
18 18 1 1
25 18 1 1
7 19 1 1
15 19 1 1
19 19 1 1
2 20 1 1
20 20 1 1
31 20 1 1
10 21 1 1
21 21 1 1
1 22 1 1
16 22 1 1
20 22 1 1
22 22 1 1
11 23 1 1
23 23 1 1
25 23 1 1
5 24 1 1
14 24 1 1
17 24 1 1
23 24 1 1
24 24 1 1
12 25 1 1
17 25 1 1
21 25 1 1
25 25 1 1
4 26 1 1
23 26 1 1
25 26 1 1
26 26 1 1
8 27 1 1
27 27 1 1
2 28 1 1
4 28 1 1
26 28 1 1
28 28 1 1
31 28 1 1
11 29 1 1
16 29 1 1
22 29 1 1
29 29 1 1
12 30 1 1
13 30 1 1
30 30 1 1
|
President Trump on Tuesday told Senate Republican that he was committed to restoring critical Obamacare payments to insurers as part of a year-end budget deal — but only if Congress approves a tax cut bill that eliminates the individual mandate.
Mr. Trump, who has gone back and forth on a deal to keep the federal payments known as “cost-sharing reductions,” made the pledge at a luncheon with Senate Republicans at the Capitol, said Sen. Lindsey Graham, North Carolina Republican.
“The president is committed to putting Alexander-Murray” on a short-term spending bill, he said.
The legislation by Sen. Lamar Alexander, Tennessee Republican, and Sen Patty Murray, Washington Democrat, would approve the payments in 2018 and 2019. The federal money goes to insurers to reimburse them for covering out-of-pocket health care costs of lower-income Americans.
Democrats had backed the Alexander-Murray bill. But they reversed their position in response to GOP move to repeal the individual, which is the measure at the heart of the Affordable Care Act that requires every American buy health insurance.
“Murray-Alexander was never designed to be in a situation where there was a direct bomb dropped into the ACA,” Senate Minority Leader Charles E. Schumer said.
Congress needs to pass a short-term spending bill by Dec. 8 or else risk a partial government shutdown, and Republicans are looking for ways to win support.
Mr. Graham said the deal would also include legislation by Sen. Susan Collins, Maine Republican, that would provide funding insurance companies receive for high-risk pools of sickly people.
However, for Mr. Trump, approval of the payments hinges on the tax reform bill repealing the individual mandate. The repeal would save taxpayers about $338 billion over 10 years, according to the Congressional Budget Office.
Congress is expected to take up a short-term spending bill or continuing resolution to fund the governing passed a Dec. 8 shutdown deadline.
Bipartisan members of the Senate Health Committee agreed to deal with cost-sharing payments earlier this fall, after Mr. Trump said he could no longer legally dole out the money without congressional approval.
The panel held four hearings on a compromise that would restore the payments and give states more power over their markets, earning kudos from critics who said the public exercise contrasted with the GOP’s partisan and secretive push to repeal and replace Obamacare.
Mr. Trump waffled on the deal struck by Mr. Alexander and Ms. Murray, encouraging the process itself but saying the final product itself didn’t do enough to set the table for a sweeping GOP health overhaul next year.
Democrats said Mr. Trump was negotiating in bad faith and poisoned the waters by cheering efforts to scrap the mandate as part of the tax overhaul.
The Alexander-Murray deal was designed to reel in the premiums increase that insurers baked into their rates to deal with the loss of cost-sharing payments, while throwing Republicans a bone by letting insurers offer cheaper “copper” plans to people of all ages.
They said repealing the mandate would simply inject a new problem in the markets, while chasing away the type of young and healthy people that are needed to balance out sick customers who can no longer be denied under Obamacare. The CBO estimates that insurers will raise their premiums by 10 percent, on average, without the mandate in most years of the coming decade.
The insurer’s top lobbying group, America’s Health Insurance Plans, says any repeal of the mandate should be accompanied by efforts to replace it with an alternative spur.
“The individual mandate plays an important role in ensuring that Americans get covered and stay covered, which helps ensure that coverage is more affordable for everyone who buys their own health plan,” AHIP said Tuesday in a letter to the administration on its 2019 enrollment plans. “If the individual mandate is repealed through legislation, we urge HHS to implement regulatory policies that create strong incentives for consumers to maintain continuous coverage. Without such incentives, there would likely be significant and greater disruptions to the individual market risk pool.”
Ms. Murray said the GOP should just drop its attack on Obamacare altogether.
“The real path forward is to take out the individual mandate provisions in the tax bill that will create such cost effects and chaos that our bill may not even be effective if we were to implement it,” Ms. Murray said.
• Tom Howell Jr. contributed to this report.
Sign up for Daily Newsletters Manage Newsletters
Copyright © 2020 The Washington Times, LLC. Click here for reprint permission. |
Q:
problemas mostrando resultados en una tabla
tengo un problema a la hora de mostrar registros en mi tabla el problema es el siguiente: en la cabecera de la tabla muestro las horas que seria ocho en total y abajo de la cabecera se muestran los resultados de los números que han salido de acuerdo a la hora y al día, pero el problema surje que la primera semana del día jueves se registraron unos datos y ahora la segunda semana del día jueves se deben registrar los otros datos de ese mismo día pero se me sigue mostrando en la misma fila cuando debería mostrarse abajo porque se supone que son el mismo día pero diferentes resultados anexo una imagen y para mostrar como debería quedar y mi error presentado actualmente.
código fuente
<div id="test5" class="center-align light">
<?php
$consulta = $DB_con->query("SELECT * FROM hora_sorteo");
for ($set = array (); $row = $consulta->fetch(PDO::FETCH_ASSOC); $set[] = $row);
?>
<table class='striped responsive-table centered'>
<thead>
<tr>
<?php for($i=0;$i<count($set);$i++){
echo "<th>" . $set[$i]['hora_sorteo'] . "</th>"; //muestra las horas de jugada
}?>
</tr>
</thead>
<?php
$consulta2 = $DB_con->query("SELECT
animalitos.id,
animalitos.numero,
resultado.id,
resultado.fk_animalitos,
resultado.fk_hora_sorteo,
resultado.fk_dias,
resultado.fecha,
hora_sorteo.id,
hora_sorteo.hora_sorteo,
dias.id,
dias.dias
FROM animalitos
INNER JOIN resultado ON animalitos.id=resultado.fk_animalitos
INNER JOIN hora_sorteo ON resultado.fk_hora_sorteo=hora_sorteo.id
INNER JOIN dias ON resultado.fk_dias=dias.id
WHERE resultado.fk_dias='5' ORDER BY resultado.id ");
for ($set2 = array (); $row = $consulta2->fetch(PDO::FETCH_ASSOC); $set2[] = $row);
?>
<tr>
<?php for($b=0;$b<count($set2);$b++){
echo "<td>" . $set2[$b]['numero'] . "</td>"; //muestra los
resultados de los numeros
}?>
</tr>
</table>
</div>
A:
la solución es esta
<div id="test6" class="center-align light">
<?php
$consulta = $DB_con->query("SELECT * FROM hora_sorteo");
for ($set = array (); $row = $consulta->fetch(PDO::FETCH_ASSOC); $set[] = $row);
?>
<table class='striped responsive-table centered'>
<thead>
<tr>
<?php for($i=0;$i<count($set);$i++){
echo "<th>" . $set[$i]['hora_sorteo'] . "</th>";
}?>
</tr>
</thead>
<?php
$consulta2 = $DB_con->query("SELECT
animalitos.id,
animalitos.numero,
resultado.id,
resultado.fk_animalitos,
resultado.fk_hora_sorteo,
resultado.fk_dias,
resultado.fecha,
hora_sorteo.id,
hora_sorteo.hora_sorteo,
dias.id,
dias.dias
FROM animalitos
INNER JOIN resultado ON animalitos.id=resultado.fk_animalitos
INNER JOIN hora_sorteo ON resultado.fk_hora_sorteo=hora_sorteo.id
INNER JOIN dias ON resultado.fk_dias=dias.id
WHERE resultado.fk_dias='6' ORDER BY resultado.id ");
for ($set2 = array (); $row = $consulta2->fetch(PDO::FETCH_ASSOC); $set2[] = $row);
?>
<?php
$set2 = array_chunk($set2, 8);
foreach($set2 as $set){
echo "<tr>";
foreach($set as $v){
echo "<td>" . $v['numero'] . "</td>";
}
echo "</tr>";
}
?>
</table>
</div>
|
"[Phone rings]" "[Ring]" "[Ring]" "[Ring]" "[Woman on answering machine] Hi." "You've reached Grace," "Stanley, Heidi, and Dawn." "We're not home right now, but if you leave a message, we'll get back to you as soon as possible." "[Beep]" "Hi, everyone!" "It's Mom!" "I just wanted to call and tell you how much I'm thinking of you." "Stan, I guess you're at work now." "Have you had a chance to go to that group thing yet?" "I think it's a great idea." "God, it's hot here." "I'm not sure when I'm going to be able to call again." "It might be a few days." "I just wanted to tell you that I love you and I miss you." "Write me." "[Beep]" "Good morning." " Good morning." " Good morning." "Let's huddle up." "Put it in." "Come on, Agnes." "All right, now give me an H!" " H!" " Give me an O!" " O!" " Give me an M!" " M!" " Give me an E!" " E!" " Give me an S!" " S!" " Give me a T!" " T!" " Give me an O-R-E!" "O-R-E!" "What's that spell?" "Home Store!" " What's that spell?" " Home Store!" " Who's number 1?" " Customers!" " Who's number 1?" " Customers!" " Who's number 1?" " Customers!" "Hoo!" "Hoo!" "Hoo!" "Go get "em." "[Woman] And Charles knows that I don't..." "I don't usually go for that kind of thing." "But he's telling me [chuckling] How hot I'm making him, and, uh, I can..." "I can even hear him." "He's..." "I can hear him." "[Laughter]" "You know, so we both... we're... we're both getting into it, getting really... muttering and talking, and I'm just about to scream, and... and... and..." "and then the phone goes dead." "[Snicker]" "It's pretty romantic, huh?" "[Giggles]" "Oh, honey, don't worry." "Those won't be his last words." "You should consider yourself lucky." "Phone sex is nothing compared to what Ron did to me the night before he shipped." "I know, but it would never be like that with a woman." "Oh, I wouldn't say that." "Well, you know, I've never had to make that kind of good-bye." "Well, why don't we ask Stanley?" "His wife did." "Uh, well, Stan?" "Grace and I had a nice time." "Well, what did you do?" "We put the kids to bed, you know." "Then we watched Leno." "You didn't..." "That's really none of anybody's business." "I'm sorry." "It's..." "Uh, I mean, it must have been so hard." "No, no, no." "It wasn't hard." "[Snickering]" "[Muttering]" "I was proud to see her go." "Of course you were." "Mm-hmm." " Of course you were." " [Women] Yeah." "[Woman] Yeah, we're all proud." "I just want them to come home." "When is Ron supposed to come home?" "January if his tour doesn't get extended." "Well, don't hold your breath." "They always extend." "Welcome to the Army, honey, and my prescription medicine cabinet." "[Man on TV] Two bombs have gone off in the capital today, killing at least four people, and there have also been reports of skirmishes between gunmen..." "[TV shuts off]" "What was that?" "Nothing." "What were you watching?" "Nothing." "Turn it back on." "W-What?" "Not everyone is pleased with the new order of things in Baghdad." "Thousands today demonstrated in front..." "I'm sorry, Dad." "You better be." "...the demonstration organized by anti-occupation Shiites." "In a disturbing development is Basra in Iraq's south, the Iranians..." "[shouting, gunfire] ...raising new security concerns... [clears throat]" "What's this I hear about you falling asleep in school?" "You know better than that." "I'm sorry." "We get plenty of sleep here every night." "There's no excuse for you to be falling asleep in school." "I know." "I'm not going to have to talk to you about this again, am I?" "I didn't hear you." "No." "Good." "I want you to go to Mrs. Shimerhorn tomorrow." "I want you to apologize," "I want you to ask for extra work to show for your disrespect." " But, Dad..." " No buts." "Dad, she's going to have her baby any day." "Mm-hmm." "And she's really grouchy right now." "Then you'd better ask her really nice." "Dad, I..." "I can't just go up to her... [beeping] ...and ask her for more work when I..." "Shh!" "Thank you." "There we go." "Good night." "[Kiss]" "All right now." "[Kiss]" "[Dawn] I love you." "[Water running]" "[Doorbell rings]" "[Sighs]" "[Zip]" "[Man] Stanley Phillips?" "Is your wife Grace Ann Phillips?" "May we come inside, sir?" "No." "Whatever you're gonna say, just say." "Mr. Phillips, I regret to inform you, on behalf of the President of the United States, that Sergeant Grace Ann Phillips was killed at 2100 hours on March 12." "I was in the shower." "Mr. Phillips, may we come inside, sir?" "Mr. Phillips, this is Chaplain Johnson." "He lives on base, and he'll be available to you and your children at any time." "Would you like to pray with me, Mr. Phillips?" "No." "Mr. Phillips, I'm going to need you to sign this, please, sir." "It's just a form stating you'll be at this address for the next 45 days." "Is there somebody you'd like to call while we wait here with you, sir?" "No." "Don't wait." "Don't wait." "Are you sure?" "Captain Douglas Tamlin will be your casualty assistant officer." "He'll be stopping by here later today with more details concerning your wife's death." "Mr. Phillips, any man who's ever been a soldier shares in your grief." "Sergeant Phillips was a brave soldier." "She died serving the country she loved." "[Voice fading]" "[Phone rings]" "[Ring]" "[Beep]" "[Grace] Hi." "You've reached Grace, Stanley," "Heidi, and Dawn." "We're not home right now, but if you leave a message, we'll be back to you as soon as possible." "[Beep]" "Hey, Mr. Phillips." "It's Rick." "At the Home Store?" "Just wondering if you're coming in to work today." "Okay." "Thanks." "[Beep]" " Race you!" " Oh!" "What's this?" "Give me that." "Thank you." "Hi, girls." "What are you doing here?" "Where'd you get that?" "Someone left a casserole." "You okay?" "Don't eat that." " Why not?" " Just don't." "Is something wrong?" "Don't." "Stop." "Stop." "Stop, please." "Okay, girls, let's go in the living room." "I want to talk to you." "Girls." "Yeah, Dad?" "Hey, who's hungry?" "Who wants to go get something to eat?" " I do." " It's only 4:00." "So what?" "Shotgun!" "You can't call shotgun until you're outside." "Race you." "Dad?" "Go." "Go, go, go, both of you." "Go, go, go, go, go." "[Car radio] (music) Doot doo-doot (music)" "(music) Hey, Dad, yeah (music)" "(music) Hey, Dad, yeah (music)" "(music) Shake your booty, no way (music)" "(music) Shake your booty, okay (music)" "(music) Jump jump (music)" " You go get a table..." " Okay." "...and we'll go to the arcade." " All right." " Bye, Dad." "(music)(music) [dance]" "(music)(music) [dance in distance]" "(music)(music) [growing louder]" "Okay, girls, we're going right now." " Dad..." " Come on." "We just got here." "We were just getting into it." "I don't care." "Just come on." "Heidi, move." "Where are we going?" "Where would you like to go?" "I don't know." "How about you, Dawn?" "Is there any place you'd like to go?" "Enchanted Gardens." "Don't be a moron, Dawn." "I'm not." "Daddy asked where we wanted to go." "That's not what he meant." "You don't know." "Yes, I do." "I don't care." "I want to." "Stop it." "Stop it." " Seriously." " Seriously." "Stop!" "Oh, God." "Aah!" "Stop!" "What if we did?" "[Groans]" "What?" "What if we did right now went to Enchanted Gardens?" "What if we did?" "What?" "Go to Enchanted Gardens right now?" "[Dawn] Oh, my gosh!" "Oh, my gosh!" "[Excited babbling]" "Be quiet, be quiet." "[Screaming]" "Eww." "Huh?" "Would you like that?" "We can't." "Is that something you'd like to do?" "Why not?" " Sit down, Dawn." " No!" "Girls, why not?" "Dad..." "Dad..." "We have school." "You can miss a few days of school." "Yeah, Heidi." " We can?" " Yeah." "Of course we can." "Right, Dad?" " Sure." "Why not?" " Yes!" "What about your job?" "Don't worry about my job." "Don't worry about his job." "Dad..." "Huh?" "Well?" "What about homework?" "Don't worry about your homework." "Don't worry about our homework." "We can do..." "We can help you with your homework." "Dawn and I can help you in the car." "Let's do it." "Right now." " Are you serious?" " Yeah!" "Of course he's serious." "Yeah." "Why not?" "Let's go." "You got to get some fun out of life, Heidi." " Aah!" " You, too, Dawn." " Let's do it!" " Let's go!" "Let's do it!" "Do you guys want to do it?" "I do!" "You party pooper!" "Yes or no, Heidi, right now." "This is a one-time-only offer." "Enchanted Gardens right now." " Right now, Heidi." " Right now!" "Do we have an atlas?" "Let's do it!" "Ahh!" "[Laughing]" "[Ringing]" "[Beep]" "Hi." "You've reached Grace, Stanley," "Heidi, and Dawn." "We're not home right now, but if you leave a message, we'll get back to you as soon as possible." "[Beep]" "Hey." "Just wanted to let you know the girls and I are... okay." "We just decided to take a little trip." "We're having a really good time." "[Beep]" "[Closes phone]" "[Man on radio] ...could face fines up to $300 under the new law." "There's a flood watch in parts of Western Minnesota through tomorrow evening." "Tonight should be cloudy with rain showers likely." "Isolated thunders..." "Good morning." "Good morning." "Where are we?" "I'm not entirely sure." "We should call school and tell them we're going to be absent." "Let's think of something fun to do today." "Can you do that?" "What's that?" "What's that?" "What is that?" "Supposed to be an answer to my question?" "Huh?" "Huh?" "No?" "No." "Well, let's try that again." "Come on." "Can we think of something fun that we want to do today?" "No." "No?" "Why not?" "We've talked about it too much now." "So?" "So now there's too much pressure." "Too much pressure?" "What are you doing?" "You cannot just drive into this field." "Oh, yes, I can." "Dad, what are you doing?" "I'm doing doughnuts." "What's it look like?" "We're going to get in trouble." " No, no, we're not." " Watch for the birds." "No, the birds fly out of the way." "What the heck are we doing?" "Hey!" "Good morning, Dawn!" "Are we on a road?" "Nope." "Cool!" "Fun, isn't it?" "Yeah!" "I used to do this all the time when I was a teenager." " Why?" " [Dawn squealing]" "Why?" "I don't know." "It's fun, isn't it?" "Why would you do this?" "I don't know." "I guess I just like peeling out." "[Dawn squeals]" "I didn't put a ton of thought into everything I did when I was a kid, Heidi." "All right." "Let's go." "[Dawn] Where are we going?" "[Stanley] Ahh!" "Whew!" " [Dawn] Dad?" " Yeah." "Are we really going to Enchanted Gardens?" "Of course we are." "Why?" "I just wanted to make sure." "Okay." " Dad?" " Yeah." "Can we get a monkey?" "No." "What if it's really little?" "Like littler than a puppy." "Still no." "Can we get a pony?" "No." "An iPod?" "No." " Dad?" " Yes, Dawn." "Can we get our ears pierced?" "No." "Not till you're 13." "You know the rules." "Dad?" "[Heidi] Be quiet, Dawn." "What?" "Do I hear something?" " Dawn!" " I don't hear anything..." "Dawn!" "...at all, no, no." "Be quiet!" "Girls, come on." "Straighten up." "I got a surprise for you." "What is it?" "We're going to stop and see Grandma." "I can get in around back." "Just wait here." "[1930s cartoon music on TV]" "[Snoring]" "My lamp." "[Sultan laughs]" "So you want to marry my daughter." "[Aladdin] I sure do." "Boy!" "Hey." "Hey, Uncle John." "What are you guys doing here?" "Oh, hey, don't..." "don't get too close." "I think I have bad breath." "[Villain in cartoon] New lamps for all" "Is your dad here?" "Can I help you?" "John, what are you doing here?" "What are you doing here?" "Trying to find a way in." "What, the front door too obvious for you?" "Open the door, man." "Hey, bro." "How are you, man?" "I'm good, man." "How you doing?" "Come on in." "So what have you been up to, John?" "I'm studying to take the GRE." "Good." "You going back to school?" "I'm thinking about it, yeah." "That's great." "What for?" "Law." "Or medicine." "I haven't decided yet." "Oh." "That's great." "What's new with you?" "Not much." "You all right?" "What do you mean, am I..." "I..." "I'm fine." "You're not upset?" "About what?" "Uh, I don't know." "I mean, where do I start?" "The situation's such a mess." "The situation?" "What situation?" "What situation?" "I mean, it sounds like a fucking mess over there." "Watch your language." "Sorry." "Sorry." "You don't know what you're talking about anyway." "Who does?" "The administration?" "I mean, they'll tell you the sun comes out at midnight if it serves their cause." "And how about that monkey boy president of yours?" "He's your president, too." "I didn't vote for him." "You didn't vote at all, did you?" "That's..." "That's not the point." "Isn't it?" "Just... stop talking." "Let's not have that conversation right now." "You'd like that, wouldn't you?" "That's what your side's all about, isn't it?" "Censoring dissent?" "Stop." "Why?" "I mean, we're just talking." "Are you afraid of talking?" "No, I'm not afraid of that at all." "I just don't want to confuse the girls." "Is that all right?" "I'm sure they're already confused." "I mean... really, what do you think about all this?" "Do you have an opinion?" "They think their mom's a hero, and they think it's easy to criticize the situation when you're sitting in your mom's living room thinking about going back to school... maybe law, maybe med..." "I don't know." "They think every one of those privileged opinions is a freedom that their mother fights for daily on your behalf." "That's what they think." "Well, it's... it's good to see that you let them think for themselves." "You girls hungry?" "You think your dad will buy us lunch?" "It's 4:30, man." "You think your dad will buy us dinner?" "Want to buy Uncle John dinner?" "You don't want to come?" "No, I think I'm just going to stay here and... take a little cat nap." "You're bigger than the last time I saw you." "How old are you now?" "Dawn's 8." "I'm 121/2." "Wow." "How old are you?" "32." "Bet that sounds pretty old to you, doesn't it?" "Do you have a job?" "Why?" "Are you hiring?" "No." "Hey, how come you kids are out of school?" "Dad's taking us to Enchanted Gardens." " Why?" " For fun." "You think that place is fun?" "What do you mean?" "Nothing." "Uncle John?" "Yeah." "Why did Dad quit the Army?" "He didn't quit." "What do you mean?" "He had to leave because of his eyes." "The Army's strict about crap like that." "But weren't his eyes always bad?" "Mm, more or less." "Well, if they're so strict, how'd he get in in the first place?" "He didn't tell you?" "Oh, Christ." "Ahem." "Well, if he didn't tell you, he probably wouldn't want me to, so..." "All right, you promise not to tell your dad if I tell you?" "He cheated." "How?" "He had a buddy take a picture of the physical examiner's eye chart." "Memorized the letters." "What?" "Your dad wanted to serve so bad." "I mean, he really bought all that patriotic "I Want You" crap." "Which was a good thing, too, because he never would have met your mother otherwise." "[Heidi] Well, how'd the Army find out about his eyes?" "Eventually they just gave him a test he couldn't cheat on, and that was that." "End of the dream." "[Sobbing]" "Why don't you and Dad like each other?" "Did your dad tell you that?" "Well, we're just..." "we're just different." "We have different opinions." "Doesn't mean we don't like each other." "I mean, do you agree with him about everything?" "You shouldn't." "Why not?" "Because it's important that people have their own views based on an understanding of facts." "Ahem." "But it's also important not to trust the facts because most of them are lies." "I don't understand." "Well, it basically comes down to a... gut thing." "You just have to be open to allowing for a truth which differs from your own opinions, or else you'll never actually see the truth at all." "[Beeping]" "[Whispering] What's that about?" "It's her time of day." "What, it's... it's her time of day?" "Mom and Dawn both set their watches at the same time every day." "That way, they know that they're both thinking of each other at the same moment." "Girls?" "Yeah?" "Yeah?" "Do you... want to play tag?" "Sure." "That's good because... you know why?" "Why?" "Because, uh, you're it." "You're it." "Woo hoo hoo hoo hoo!" "You're it." "Time out." "What do you mean time out?" "You can't call time out." "That is so lame." "You can't just..." "All right." "I'm just going to read the paper and find out what's going..." "[Heidi, Dawn] Time in." "You know, I mean, it's so typical." "I'm the victim of this kind of thing every single day, and you know why?" "It's because I'm an honest guy, and I have to pay for it." "Mm-hmm." " Ha!" " Aah!" "[Phone rings]" "[Knocking]" "Hey, the phone's ringing." "Open up." "[Ring]" "[Ring]" "Hello." "Yeah, this is John." "Oh, hey, Mary." "What the hell are you doing, man?" "What's wrong?" "Where are the girls?" "The girls are fine." "Stan, I just talked to Mary." "I know what's going on." "Do the girls know?" "No." "That's good." "Don't tell them yet." "We got to go." "We got to go." "We got to go." "Stan, what are you doing to them?" "I'm taking them on a trip." "Just stay out of it." "Stay out of it?" "You're the one who brought me into it." "I didn't bring you into anything." "You were just here." "I didn't plan that." "Do you really think that... that... that taking them to an amusement park is going to help them get over losing their mother?" " Just stay out of it." " You're going to screw those girls up." "Is that what you want to do?" " Get out of my way." " They'll never forgive you." "Get out of my way!" "Nobody asked you!" "Do you understand?" "I got to go." "Don't you want to wait for Mom?" "No." "We're on a schedule." "Stan... please stay and wait for Mom because we can talk it all out together." "No." "It was nice seeing you again, John." "I got to go." "Okay?" "Girls!" "Girls, get your stuff together!" "Girls!" " Come on." "Get up." " Aah!" "Okay." "Come on." "Get up." "We got to go." " Why?" " What?" " We got to go right now." " Why?" "I thought we were going to see Grandma." "We're going to talk to her later." " Get in the goddamn car." " Dad." "What about Uncle John?" "What about Uncle John?" "We didn't get to say good-bye." "You'll see him again." "[Dawn] I'm bored." "Let's drive into a field." "No, Dawn." "We already did that." "Why not?" "Because we already did it." "So?" "So we ought to do something else." "Seems like we've been driving forever." "Well, it's going to be forever with that attitude, isn't it?" "You're kind of quiet back there, Heidi." "What are you doing?" "Just working on my report." "What's your report about?" "Mom." "Whose idea was that?" "Mrs. Shoehorn's." "Mrs. Shoehorn's." "Why does she think that's a good idea?" "Because she thought it would help or something." "Help with what?" "What do you need help with?" "I don't know." "You know how people get when Mom goes away." "No." "How do they get?" "Like serious." "[Dawn] I call bed!" "I call bed." "Not if I get there first!" "Oh!" "Dad, this is so fun." "You want to try?" "I'm going to go get a cot." "Okely-dokely, artichokey." "I have to poop." "You don't have to tell me things like that." "There's free shampoo and a sewing kit!" "Hey, what are bath salts?" "[Woman] Noble Elementary." "Mrs. Fissel?" "Yes." "Hi." "This is Heidi Phillips." "I was calling to tell you that my sister and I are going to be missing a couple of school days this week." "Oh, that's okay, Heidi." "We're not sick or anything." "We're just taking a trip." "For fun?" "Oh, Heidi, I understand." "I was wondering if you could have our teachers e-mail our dad our homework." "Of course, sweetheart." "Is Mrs. Shimerhorn there?" "Mrs. Shimerhorn is in the hospital." "Why?" "She's actually having her baby." "Oh, she is?" "Yeah, and Miss Abrams will be taking over for her for the rest of the year." "Oh." "Can you ask her if it's all right if my report is late?" "Mrs. Shimerhorn said it had to be done by Monday." "I'm sure it's fine, Heidi, okay?" "I'll see you soon." "Okay." "Bye, sweetheart." "Bye." "[Dawn] Who was that?" "Mrs. Fissel." "What did you call her for?" "I was trying to get our homework." "Heidi!" "She was really nice." "[Toilet flushes]" "That's cool." "Bang-bang!" "Choo-choo train!" "Come on, Heidi, do your thing!" "Say woo!" "What?" "[Sprays water out of her mouth]" "Got you." "Marco." "[Dawn] Polo!" "[Heidi] Marco." "Polo." " Marco." " Polo." " Marco." " Polo." "Count how long I can do it." "Okay." "Yeah." "Dad, watch this." "That's good." "This is a long time." "It's like five days." "[Gasp]" "Aah!" "That was good." " Yaah!" " [Giggling]" " [Stanley] That was about, like," " How long?" "I don't know, two minutes?" "[Dawn] Ha!" "[Heidi] You weren't counting." "[Stanley] I was close." "Dad?" "Yeah." "What's going on?" "What do you mean?" "Why are we doing all this?" "I just wanted to give you girls a surprise, you know?" "Take you on a trip." "You didn't go to work yesterday, did you?" "No, I didn't go to work." "Were you fired?" "You know Mom's going to be really mad if you lose your job, right?" "I didn't lose my job, Heidi." "Okay?" "But if you were going to, you'd tell us, right?" "Yeah, I would tell you." "I'm going to go to sleep." "What are you doing?" "Nothing." "You're not old enough to smoke." "I'm 18." "No, you're not." "Want to bet?" "I saw you with your mom at the pool." "That wasn't my mom." "Oh, yeah?" "Who was it?" "It was an autistic woman." "I take care of her for money." "You shouldn't lie." "I'm not lying." "It's the truth." "How old are you?" "18." "Want one?" "Sure." "Heidi?" "Heidi?" "Heidi!" "[Cough]" "Why are you coughing?" "You haven't even smoked it yet." "I knew you'd never smoked before." "[Stanley] Better go home, boy." "Get your stuff." "We're going right now." " Now?" " Yeah." "Right now." "It's in the middle of the night." "You arguing with me?" "Move." "Jesus, Heidi, you can't just walk around in the middle of the night by yourself." "You could have been hurt, kidnapped, who knows?" "I said I was sorry." "All right, but what I want to know is what the hell you were doing out there in the first place." "Make me leave your sister alone in... some hotel." "I couldn't sleep." "You couldn't sleep?" "Why not?" "Why do you think?" "Is that why you're falling asleep in class?" "Oh, boy." "What do you do every night?" "I don't know." "Walk around." "I went to a support group the other day." "What?" "You know, the one they got at Debbie Sager's house." "For military wives." "I stopped by there the other day." "Isn't that weird?" "What did you talk about?" "Uh-uh." "No." "I didn't." "Did it help?" "I don't know." "I don't think it did." "Will you do me a favor if you can't sleep?" "Um, will you wake me up?" "Why?" "So I can talk to you." "Really?" "Yeah." "You'd do that?" "Yes, I would do that." "Yes." "[Stanley] You still want to try it?" "With you?" "Yeah." "Led rather you do it with me than some punk kid." "Well?" "What's it going to be?" "Sure." "Have you ever done this before?" "No comment." "Do you want one, or should we split one?" "Let's split one." "Good idea." "[Cough]" "Good one." "[Coughing]" "Oh, are you okay?" "Yeah." "[Coughing]" "Are you sure?" "[Coughing]" "Yeah, I'm fine." "Okay." "[Coughing]" "Maybe we should stop, right?" "I'm going to go get some water." "You stay here, okay?" "[Coughing]" "[Coughing]" "(music)(music) [guitar]" "(music) The world could fall apart (music)" "(music) But you're my heart, my dear (music)" "(music) I will sing this song (music)" "(music) Till we are gone, my dear (music)" "(music) How do I keep you from losing your way?" "(music)" "(music) Hope you'll go out (music)" "(music) And you'll come back some day (music)" "(music) But love is not enough (music)" "(music) This I know (music)" "Stay together." "I'll be right back." " I just got to make a phone call." " Where are you going?" "I'll meet you by the dresses." "[Dialing]" "Hey." "Hey, Dad." "What are those?" "Earrings." "Oh, no." "No, no, no, no, no, no." "You said we could get anything we wanted." "You know the rules." "Not until you're 13." "I'm almost 13." "And I'm 8." "This is something you really want to do right now?" "Yes." "All right." "Let's do it." "Okay!" "Really?" "Yeah." "Is it going to hurt?" "You won't even feel a thing, I promise." " You ready?" " Mm-hmm." "Did it hurt?" "No." " Excuse me." " Sorry." "That's okay." "Is that it?" "That's it." "Want to see?" "Looks good, Bear." "You're all grown up." " You next?" " Yeah." "1, 2, 3." "Is that all right?" "[Stanley] Ooh." "I just got my ears pierced." "That's nice, sweetie." "That looks good." "This one's nice, too." "Did it hurt?" "A little." "A little bit?" "You did it." "Where's Dawn?" "Find her." "How much do I owe you?" "Oh. 32.50." " [Heidi] Dawn?" " Thank you so much." "Dawn!" "Dawn?" "Dawn?" "Dawn!" "Bear, where are you?" "Dawn!" "Bear!" "Dawn Amber Phillips!" "See if she's over there." "Bear." "Dawn, honey, what are you doing in there?" "Dawn, are you all right?" "Dawn." "Anybody home?" "[Dawn] Come in." "Hey." "Hey." "[Stanley] This is a nice place." "This really is." "You decorate it yourself?" "No." "Well, it's really, really nice." "It's a nice little house." "Nice walls, nice... nice roof." "Phone." "I could see a nice little happy family living here." "Yeah." "You miss home." "Yeah." "I miss Mom, too." "You know, I was thinking." "Maybe this would be a good thing to get for the house." "You could put it up in you and your sister's room." "Would you like that?" "Mm-hmm." "I love you, Dad." "I love you, too, Bear." "Come here." "[Heidi] Dad?" "Yeah." "You smell." "I think I like this one." "Try it." "Looks pretty nice." "[Dawn] Hey, Dad." "Yeah." "What do you do at work all day?" "I sell shit." "[Heidi] Dad." "I'm sorry." "I sell stuff." "You know what I do." "I sell stuff at Home Store." "Come on." "Give me an H." "[Dawn] O." "Give me an O." " O. - [Heidi laughs]" " Give me an M." " M." " Give me an E." " E." "Give me an S." " [Heidi] J. - [Dawn] S." " Give me a T. - [Dawn] Q." "Give me an O-R-E." "O-R-E." "What's that spell?" "[Heidi] Nothing." "You're right about that." "(music)... hold you in my arms (music)" "(music) It scares me (music)" "(music) Just to think that something so beautiful (music)" "(music) Could just come apart in my hands (music)" "(music) I've always been chasin' rainbows (music)" "How are you feeling, excited?" "You getting excited?" "Yeah." "Good." "How are you feeling?" "I'm good." "Dad?" "Hmm?" "Do you ever think that Mom should have stayed home?" "All the time." "Why did she have to go?" "She was doing her duty, Heidi, you know that." "I know, but what exactly does that mean?" "We've talked about this." "We have people all over the world looking out for our safety." "When they discover a threat, they have to act on it." "That's the way the world is." "On the news they're saying that we went to war with the wrong people, that it was all a lie." "Well, you can't always believe everything you hear on television, can you?" "Sometimes you just got to trust that you're doing the right thing." "We got to believe..." "Well, what if you can't?" "Then we're all lost." "[Ring]" "[Ring]" "[Grace] Hi." "You've reached Grace, Stanley," "Heidi, and Dawn." "We're not home right now, but if you leave a message, we'll get back to you as soon as possible." "Hey." "It's Stanley and the girls." "I just wanted to hear your voice on the machine and tell you that we're all right." "We're in Florida." "I told you we were going to Florida, right?" "Taking the girls on a little trip." "Anyway, do you remember that, uh..." "I was thinking that when we... when we came down here before you shipped out, and I just..." "I wanted to apologize because, uh... because I was so angry back then, and, uh, I just wanted to let you know" "I was thinking that... that the reason I was so angry was because I was ashamed... that it was you who was going and not me." "We would have been better off if it was me." "The girls would have been better off." "And I made such a fucking mess out of this thing." "Grace, I'm such a mess." "L..." "I don't... know how to talk to these girls." "I haven't even told them." "So you got to tell me what to do..." "Grace." "Please, God, tell me what to do." "So how do I say it?" "[Whispering] You got to tell me what to do." "Who were you talking to?" "School." "Mrs. Shimerhorn." "Mrs. Shimerhorn?" "She said everything's going to be fine but we got to get that report in and do a couple of makeup assignments, but, uh, to enjoy the trip." "So let's go." "Come on." "Load up!" " [Dawn] Are we there yet?" " No." " Are we there yet?" " Mm-mmm." " Are we there yet?" " No." " Are we there yet?" " Mm." " Are we there yet?" " No." " Are we there yet?" " No." "Are we there yet?" "No." " Are we there yet?" " No." "Are we there yet?" "No!" "Are we there yet?" "How about now?" "[Gasp]" "Oh, it's right there!" "It's right there!" "Oh, my gosh, Dad!" "Step on it, old man!" "There it is, Heidi!" "It's right there!" "What ride do you want to go on first?" "Mission accomplished." "I wonder if they have a TV there." "They probably do." "It's all yours." "Take your pick." "Welcome to the Enchanted Hotel." "Enchanted Gardens!" "Enchanted Gardens!" "Enchanted Gardens!" "[Squealing]" "All right, girls." "Uh, just don't stay up all night, okay?" " Okay, Dad." " Because we got to get..." "We got to get some sleep because we've got a big day tomorrow, okay?" "Okay." "Big day." "[Whispering] Let's stay up all night." "Okay." "[TV sound louder]" ""We can, we must," ""and we will see it through to completion" ""the mission for which these young Americans" ""and their families have sacrificed," ""carrying with us the memory" ""of those who have lost their lives" ""in the battle." ""We ask our commanders on the ground" ""at every opportunity" ""if there's something we ought to be doing differently." ""In our 200-plus years," ""America has learned some important lessons," ""and one is that weakness is provocative." ""It tempts aggression." "That appeasement is..."" "[ring]" "Hey." "It's Stanley and the girls." "I just wanted to hear your voice on the machine and tell you that we're all right." "We're in Florida." "I told you we were going to Florida, right?" "Taking the girls on a little trip." "Anyway, do you remember that, uh..." "I was thinking that when we... when we came down here before you shipped out, and I just thought I wanted to apologize because, uh... because I was so angry back then, and, uh, I just wanted to let you know" "I was thinking that... that the reason I was so angry was because I was ashamed..." " Hey." " Hey." "You look like you're ready to go." "I am." "Oh, that dress looks pretty." "Thanks." "Where's your sister?" "Outside." "Outside doing what?" "I don't know." "Some Heidi thing." "Oh, right." "Ooh." "Okay." "(music)(music) [humming]" "(music)(music) [humming]" "What are you doing out here all by yourself?" "You all right, sweetheart?" "Yeah." "How are you?" "Me?" "I'm just fine." "Just fine." "Slept like a rock, which is good." "You know your sister's just about ready to burst, she's so excited." "What do you think?" "You want to get going?" "Sure." "Sure." "Dad?" "Yeah." "Nothing." "Have an enchanted day." "This way... or this way?" "[All laughing]" "Aah!" "Aah!" "Aah!" "Do you want this balloon?" "Yeah." "I like blue." "I don't know." "This is kind of..." "This is a powerful balloon." "I don't know if I should let you hold it." "Whoa!" "Ha ha ha!" "That's a big balloon." "Heidi, Heidi, hold your sister." "Hold your sister down." "Hold her." "Hold her." "The wind's going to take her away." "[No audible dialogue]" "What do you want to do now?" "Let's go." "Yeah." "You want to leave?" "I did everything I wanted to do." "Okay." "Come on." "Why aren't we on the highway?" "Let's get out of the car." "Sit down." "I need to tell you something... and it's something I should have told you a lot earlier." "You know your mother and I love you very, very, very much." "Dawn." "Yeah." "Nothing's ever going to change that." "Ever." "Do you remember when we talked about things that could happen while she was away?" "Well, your mother was hurt." "She was hurt real bad." "[Dawn] Where is she?" "She was hurt so bad, they couldn't fix her." "[Heidi] She's just hurt, right?" "Dad." "She's just hurt." "Where is she?" "It's okay, Dawn." "We'll take care of her." "She's just hurt." "Your mom is a soldier, and soldiers sometimes get hurt, and sometimes they even... die in battle." "And that's what happened." "[No audible dialogue]" "[Heidi] Grace Ann Phillips was born in Newport, Indiana, on October 3, 1971." "She was a happy child who loved spending time outdoors." "Once she even spent an entire summer sleeping in a refrigerator box in her mother's backyard." "She waterproofed it with garbage bags so she could sleep in it even when it rained." "Grace was a brave woman." "She enlisted in the Army right out of high school." "She met my father, Stanley Phillips, at boot camp in Fort Knox, Kentucky, later that summer." "They married after training was over." "My father says that, to this day, he's still surprised Mom said yes, which is funny because Mom used to tell my sister and me she was worried he was never going to ask the big question." "Grace and Stanley loved each other very much." "They were best friends." "Anyone who knew Grace knows she was a special person." "She was kind, generous, and funny." "She had a loud, silly laugh you could hear even when you were in the next room." "And she could sing better than anyone." "We'll miss her very much, but we promise to always think of you when we laugh, wake up, fall asleep, and look at the ocean." "I promise to keep your memory with us forever." "[Stammering] Is it time?" "Not yet." "Okay, get ready." "[Beeping]" "(music)(music) [piano]" "(music) Can't find all the words yet (music)" "(music) It's still not the time yet (music)" "(music) And my mind can't think of anything (music)" "(music) It only sees you (music)" "(music) You know I am trying (music)" "(music) God knows I am trying (music)" "(music) And why does the wind keep shouting out?" "(music)" "(music) It's still not over (music)" "(music) I keep on trying (music)" "(music) I think I'm learning (music)" "(music) To live in hearts (music)" "(music) You leave behind (music)" "(music) Is not to die, Grace (music)" "(music) And find the right place (music)" "(music) Is there a right place (music)" "(music) Where I can make it all make sense somehow (music)" "(music) And face tomorrow?" "(music)" "(music) I keep on trying (music)" "(music) I think I'm learning (music)" "(music) To live in hearts (music)" "(music) You leave behind (music)" "(music) Is not to die, Grace (music)" "(music) The world go round some (music)" "(music) We move along some (music)" "(music) To live in hearts (music)" "(music) Of theirs and mine (music)" "(music) Is not to die (music)" "(music) Grace (music)" "{{{the end}}}" |
In times of crisis, people like a sense of
certainty.
After all, haven’t we all been burned before
for trusting in the wrong institutions?
And for a lot of people, nothing feels more
certain than a big, comforting pile of cold,
hard cash.
However, problems start to arise when a lot
of people have this same idea at once.
This raises the question: Can a bank literally
run out of cash if everyone withdraws their
money at the same time?
And while this may seem like a silly question,
the answer is actually a resounding “Yes.”
It’s called a Bank Run – they’ve happened
before, and it’s possible they might happen
again.
First, let’s take a look at the basics.
During periods of financial instability – take,
for example, the Great Depression of the 1930s
and the global financial crash of 2008 – a
so-called “Bank Panic” begins.
During those panics, customers of a commercial
bank believe that the bank may close and lose
their money as a result.
This then becomes a self-fulfilling prophecy,
as depositors begin a mass-withdrawal of their
savings, leading to a so-called “run on
the bank.”
The vicious cycle continues – Banks lose
financial liquidity, savers pull out their
deposits, news of this reduces confidence
in the bank’s stability, and more savers
pull out their deposits as a result.
The end result is typically the bank entering
a total nosedive.
Eventually, the bank becomes totally insolvent
and their cash reserves run dry.
They end up imposing restrictions on withdrawals,
and at that point, the jig is essentially
up.
You’re probably wondering: How on Earth
does this happen?
The two main priorities of a commercial bank
are to handle deposits and withdrawals from
customers, so shouldn’t there be safeguards
for this kind of thing?
Well, the problem with Bank Runs is that they’re
pretty much tailored to take advantage of
vulnerabilities inherent in the system.
There are regulations on how much physical
cash your local bank branch can keep on its
premises, for both their expected daily usage
of said cash and security reasons.
In other words, if a bank’s vault is carrying
way more cash than it needs on an average
day, and that bank is robbed, that’s an
extremely expensive robbery right there.
The Federal Reserve also imposes limits on
the amount of in-house cash a bank can carry,
and even this cash isn’t all entirely devoted
to customer savings withdrawals.
This is called fractional reserve banking
– as each bank only keeps a fraction of
its overall cash reserves for daily use.
Banks also need this cash to provide money
for small in-house loans, as well as for investment
projects.
When the bank’s customer base is pulling
out money like crazy, they need to siphon
extra cash from other areas in order to keep
up with withdrawal demand.
This is known as increasing their cash position.
In order to increase their cash position fast
so they can keep up with demand, banks in
the process of a bank run will often sell
off their assets at significantly lower than
asking price.
The selling off of assets goes public, which
feeds into public panic, and more withdrawals.
Banks will be haemorrhaging money throughout
this process just to stay above water.
These financial catastrophes are a mix of
economics and mob psychology, as increasing
public instability manifests directly in the
instability of the bank.
Seeing as bank runs typically happen in times
of crisis, selling off long-term investment
assets will fetch an even lower price than
usual, plunging the financial institutions
even further into the hole.
While one might think it would be easy to
nip a bank run in the bud by quelling the
fears of the consumer base and assuring them
that a panicked withdrawal will only worsen
the situation, talking sense into the public
is often easier said than done.
The lead-up to a bank run can almost feel
like a Mexican Standoff – just like nobody
in a standoff situation wants to be the first
to put down their gun, customers fear being
the “last one to exit” and losing their
hard-earned savings if the bank does eventually
fail.
The cruel irony is that fear that a bank will
fail is often one of the greatest contributors
in its failure.
Currently, during today’s times of economic
instability, there have been whispers of restricted
cash withdrawals on savings in some United
States and European banks.
Bank runs are almost always at least a slight
risk during times of panic – right now,
we’re seeing a microcosm of the same psychology
that drives bank runs in toilet paper buyouts.
You can apply the exact same cyclical formula:
People fear toilet paper shortages and therefore
buy more toilet paper.
People buying more toilet paper fans the flames
of shortage fears, and the panic buying continues,
leading to real shortages.
It’s an extremely basic pattern that feels
almost engraved into human society.
Let’s take a look at a few more historical
bank runs to see if the pattern holds true.
The period of time that brought Bank Runs
into the national conversation was the Great
Depression of the 1930s.
It all started with the stock market crash
of Thursday, October 24th, 1929, which reached
its grim peak on October 28th, also known
as Black Tuesday.
The United States had just experienced the
Roaring Twenties – one of the greatest periods
of economic prosperity in history – but
that was all about to come crashing down.
The market and the general public had been
massively overconfident due to the prior trend
of market growth, overpricing the stock and
artificially inflating the market as a result.
This led to what economists called an “asset
bubble.”
And the thing about bubbles is, no matter
how attractive they seem, or for how long,
they always burst.
And that’s exactly what happened.
Bank credit also rose rapidly, and they were
handing out loans like candy.
The public weren’t afraid of debt because
the market had been so stable, for so long.
The general public were buying on margin,
which means – in a very simplified sense
– they were making down payments on stock
with money borrowed from the bank.
Meanwhile, industrial and agricultural overproduction
was hurting share prices, and a sudden 1%
interest hike from the Federal Reserve Bank
of New York added to the pile of factors in
this economic chemical reaction.
The resulting explosion effectively collapsed
the entire US economy, kicking economic growth
to the curb and sending the Gross Domestic
Profit into freefall.
This brings us full circle, back to Bank Runs.
The public were terrified by the sudden shock
of the economy that’d been doing so well
abruptly disintegrating around them.
As a result, they wanted the comfort of having
cold, hard cash in their hands and under their
mattresses.
Americans flocked to banks and withdrew cash
en masse, exacerbating what was already a
complete, economic dumpster fire.
Financial newspapers at the time were releasing
headlines like “Huge Selling Wave Creates
Near-Panic as Stocks Collapse” and “Prices
of Stocks Crash in Heavy Liquidation “ , fuelling
the panic further.
The American public lost faith in the banking
system, pulling out their funds and forcing
the banks to sell off their assets in order
to keep up with demand.
It was a textbook series of bank runs, leading
to bank failures and an inability to invest
in businesses that lead to widespread economic
stagnation across the nation.
Bank runs are never the sole cause of an economic
collapse, but they’re almost always a component
of economic downturn.
By necessity, they’re something that occurs
after a period of economic instability has
already begun, and then goes on to make the
whole situation even worse.
Which brings us to a much more recent example
of economic catastrophe: The 2008 stock market
crash.
Unless you’re a keen economics enthusiast,
or you’ve seen or read The Big Short, you
probably need a quick refresher on what exactly
happened there.
Dubbed the worst financial crisis since the
Great Depression, the stock market crash was
caused by the huge and dangerously unstable
subprime mortgage market – wherein millions
of people with obscenely terrible credit were
given mortgages that lenders often knew they
couldn’t ever really pay back, creating
a housing bubble.
You may have gathered by this point that there
are major similarities in pretty much all
the economic disasters of the 20th and 21st
centuries, and you wouldn’t be wrong.
Just like we said earlier, economics and human
psychology are intrinsically tied together,
and tend to run in endlessly repeating cycles.
Much like the Great Depression, the devastating
economic collapse precipitated by the 2008
stock market crash set fire to the tinderbox
of an already financially-paranoid public.
The collapse of the Lehman Brothers Bank suddenly
reminded the world that the financial institutions
around them weren’t infallible forces of
nature.
Banks could go down, and if they went down,
they could take all of your savings with it.
As a result, the bank runs began, and people
across the globe started once again making
mass withdrawals.
Banks like the Northern Rock Bank in the UK
were devastated by the sudden influx of terrified
consumers who wanted their money where they
could see it, soon being pushed into insolvency
by people who just didn’t trust the system
anymore.
And honestly, who could blame them?
Bank runs are the financial expression of
pure public panic, occurring only in times
when customers simply don’t trust banks
to keep their money safe.
By now, we imagine you’re probably feeling
a little paranoid yourself – is it possible
that, in the next few weeks, the banks we’ve
been entrusting all our savings to will just
collapse under the weight of their customers
worst fears?
Well, thankfully, it’s really not that simple.
After the devastating effects of two different
rounds of bank runs, central banks like the
Federal Reserve have put in protections and
regulations to keep banking institutions and
their customers from falling victim to bank
runs.
The Fed ensures that bank customers are given
deposit insurance – the purpose of which
is making sure that, even if a bank does indeed
go under, customers are ensured that they’ll
get their savings back.
This isn’t a new development, either – the
Federal Deposit Insurance Corporation, or
FDIC, was first formed in 1933 as a response
to the ravages of the Great Depression.
In fact, it was the existence of this deposit
insurance scheme that prevented the bank runs
during the 2008 financial crisis from being
a heck of a lot worse.
In the event of a bank failure, the FDIC can
help transition the customer savings accounts
into a different bank.
Or even, in worst case scenarios, auction
off the assets of the collapsed bank as collateral
to pay off the customers for their lost savings.
The banks themselves also have some methods
for counteracting the potentially devastating
effects of a bank run.
One method is slowing down the process by
artificially lengthening withdrawal queues
in order to hold back the tide and cling onto
some stability.
The bank may also borrow money in order to
put themselves in a better cash position,
rather than immediately resorting to siphoning
out investment and loan money or selling off
assets at a reduced price.
They can receive a loan from other commercial
banks or from the Federal Reserve in these
kinds of exceptional circumstances.
Another innovative method commercial banks
use to prevent the threat of bank runs is
the introduction of term deposits.
These are a particular kind of savings account
where the customer forgoes their right to
withdraw their deposit at any time in exchange
for holdings at a fixed interest rate.
This means that the bank ultimately retains
unilateral control over when the deposit can
be removed – up until the agreed-upon term
date – making bank runs for these kinds
of deposits effectively impossible.
These days, while bank runs will continue
to be a risk for as long as human beings are
panicky and erratic, measures put in place
to mitigate them mean they won’t be nearly
as devastating as in prior instances.
Banks are more familiar with the threat, and
insurance measures put in place by the FDIC
ensures that the average joe won’t be left
penniless as a result of other customers’
fear and impulsivity.
But in any situation where mob mentality causes
problems, it’s important to be part of the
change: Don’t panic and pull your money
out at the slightest sign of instability,
because if you do, you’re just another part
of the cycle.
Thanks for watching this episode of The Infographics
Show!
If you want to sound really smart at parties
and meetings with your knowledge of finance
and economics, we’ve got you covered.
Why not check out “What If The Stock Market
Crashed Tomorrow” and “Insurance Explained
– How Do Insurance Companies Make Money
and How Do They Work.”
In the meantime, invest wisely, and remember
to save for the future!
|
You got it. Or will be getting it. Or will have gotten it soon. @Kittypaws is correct essentially. The Earths Magnetic field is the answer to that. They have an organ/area in their brain that's attuned to the field/lines that keeps them flying true. I actually knew this before I went to find proof for you because you're so durn hard headed about things sometimes. I quote"Vision-Based Magnetoreception
One of the more complicated theories to explain avian migration involves bird species’ ability to detect the magnetic fields of the Earth, and subsequently follow those fields to their ultimate destination. This ability to use “invisible” waves was hard for some ornithologists to swallow, but it was proposed that some bird beaks contain magnetic particles that act as a compass. Recently, this theory has fallen out of fashion, replaced by the theory of vision-based magnetoreception.
The concept of vision-based magnetoreception means that birds can “see” magnetic fields and align themselves with the direction of the field they want to travel. If a bird is migrating south, it will align with a south-facing magnetic field and be on its way. Experiments in laboratories have actually generated artificial “magnetic south”, and birds moved in that direction."
In a nutshell, just because your speed is decreased it does not cancel out the lift from the medium it is traveling in. Your drag is also increased by the same rate and your forward rate of Momentum is something that must be factored in. Lift : L = Cl * A * .5 * r * V^2 / Drag : D = .5 * Cd * r * V^2 * A / Momentum : p = m • v
you know, you can actually throw liquid nitrogen onto your face, and it won't dissolve your skin. It just splashes and bounces off, it can't really stick to it, as such, unless its contained in something, the molecules in it are quite strange. So thoughts of it being chucked over someone, and them insta freezing are just fantasy. You can also fill a balloon with it, and then smash the balloon against you, and again you won't be soaked in it, the balloon and the liquid nitrogen just kinda dissolve with the bang
Believe it or not I did know this. In fact just watched a youtube video to that effect but note that the key word in this is time. Too long and it will most definitely freeze your skin. The time frame is NOT very long either.
Believe it or not I did know this. In fact just watched a youtube video to that effect but note that the key word in this is time. Too long and it will most definitely freeze your skin. The time frame is NOT very long either. |
This You Tube video made me smile as it has clips from so many great adaptations. This works on so many levels. The fact that this song was in the first Bridget Jones film (you know, the part where Hugh Grant and Colin Firth are having the most ridiculous fight over Bridget-grabbing clothes and kicking etc) makes you instantly bop your head and think of a couple of British cuties right off the bat. That and the wonderful editing of many of my favorite swoon worthy scenes really keeps me coming back to play this one again and again.
How many men did you recognize in this montage? I will start you out with JJ Field as Henry Tilney in Northanger Abbey. So cute with that little smirk.
Next, in quick succession we have my personal fave right now, Richard Armitage as Mr. Thornton in North & South.
And then we have Anthony Howell as Roger Hamley in Wives and Daughters(oh, teach me some Biology, Roger).
We then have a peek at Rupert Penry-Jones as Captain Wentworth in the new Persuasion (I am half agony, half hope), and then I have to stick my neck out here and guess, JJ Field again in The Shadow in the North? Apparently, I have some shopping to do on Amazon! I love JJ, as does the creator of this video apparently.
If I only mention new faces at this point, we move on to the iconic Colin Firth as Mr. Darcy from Pride and Prejudice 1996 who we have in most of his best looks and ending in the tub with him (although no wet shirt scene?!?!)
We move on to Mr. Willoughby from Sense and Sensibility 1996 (otherwise known as Greg Wise/Mr. Emma Thompson).
And then on to the new Colonel Brandon, David Morrisey from Sense and Sensibility2008 , very hot and understated.
We then of course have to give a nod to the original Colonel Brandon, the silky voiced Alan Rickman from the classicSense and Sensibility 1996.
And then we have Mr. Willoughby from the latest Sense and Sensibility2008, Domenic Cooper, who just about loses his head in this video (perfectly timed with the lyrics).
If I have missed any cuties from this absolutely addictive You Tube video, please leave a comment. I think I missed David Tennant from the TV miniseries Cassanova, but this is not the Heath Ledger version of Cassanova also from 2005. This is another one I have to order, as I only know David Tennant from Doctor Who.
Feel free to comment on what you love about this video, or what you would have added. I think this was done a few years ago, so there have been many great period dramas released since then. Have fun with this one and please share it with whoever you think it would bring a smile to.
Thank-you to the creator of this You Tube video, DreamyViper (aka Jiab). She has lots more stuff so check out her other videos via this link.
Tuesday, May 18, 2010
I have been to Bath, the gorgeous city in England, twice in my lifetime. The first time was with my husband before we had kids. I had begged him to take me to England as I was pregnant with my first child and wanted to do something exciting before I got tied down with a baby. Good plan. Unfortunately, we were a bit naive in the trip planning department and only booked 8 days in London through a travel agent.
Fortunately, the agent booked us into a hotel on Curzon Street in Mayfair, London. Oh, had I only known at that time the literary history of that address. I now know that Curzon Street is where the social climber Becky Sharpe from Thackery’s novel Vanity Fair went to live after her marriage to the dashing Rawdon Crawley. That tony address where they could not afford the rent, but where Becky wanted to live and be seen giving all of her fabulous parties. It was also the address of Lord Henry Wotton of The Picture of Dorion Gray and the address of Jeeves' club The Junior Ganymede Club for gentleman’s gentleman (valets). After my husband (the Squire) and I stumbled into a cab after the red-eye flight from Toronto and were taken to our lovely (and amazingly affordable) hotel on fairly swanky Curzon Street, we had no real idea where we were. After a well needed nap, we stumbled out on the street again, looking for a place to have supper. Thinking we should walk around first, we walked for about ten minutes through a beautiful park (Green Park) and then looked up to find (holy crap!), Buckingham Palace. Good travel agent.
Anyhow, we ended up on the next day doing what most travelers do in a strange city, and that was to book a few bus tours. OK, that is what clueless travelers in 1991 did in a strange city. These are the kind of crazy tours where they take you to as many places possible in one day. One of these took us from London to Oxford, Stratford and Warwick Castle all in one day, and on another day we did Bath, Stonehenge and Salisbury Cathedral. Whew! At that point in my life, Bath was only a beautiful city with graceful Georgian architecture and a well preserved Roman bath. But even then, I felt ripped off with the mere 2 hours before we were piled back on the bus.
My second visit to Bath was much more satisfactory. This was in 2005 with my husband and 2 boys (then 13 and 10). We had all chosen something special to do on this trip (planned entirely by me this time) and my choice was to have 2 days in Bath. This was after I had spent the previous decade reading 19th century literature and watching many adaptations of said novels on screen. So Bath was a different and more familiar place to me. It was where Anne Elliot finally hooked up with Captain Wentworth. It was where Catherine Morland got her first taste of the delights and disappointments of society. And it was where Jane Austen spent many unhappy years not writing, but storing up many studies of various characters for future reference.
So, of course, I dragged my family around the Royal Crescent, through Royal Victoria Park, around the Roman Baths (well worth seeing a second time) and into the Abbey. We walked back to our hotel via Pulteney bridge, after tasting the disgusting sulfurous water at the Pump Room. Basically, I wore the poor things out. So after dropping the 3 of them back at the hotel for a late afternoon rest, I went back out alone, determined to squeeze the most enjoyment out of my time in Bath. I trotted off to the Jane Austen Centre at 40 Gay St. to immerse myself in all things Austen. I started to really regret not having my sister with me, when I saw a poor young dude dressed like Mr. Darcy outside the museum, meant to pull the lady tourists in. She and I would have laughed our posteriors off at that, but I only managed a smirk before I ducked into the building. (Apparently there is now a mannequin dressed as Miss Austen out front.)
After soaking up as much as I could there, I headed off to the Assembly Rooms. Not much time left, as the sun was getting low in the sky, but I had to see them. I had to picture the crush of beautifully dressed dancers described in Northanger Abbey. I had to imagine the parading of characters around the ballroom and the tea room. Then down in the basement I went for a look around the Museum of Costume. At this point, I was half in heaven (as they had real Georgian gowns as well as costumes from various Austen films on display) and half in hell (as I was inwardly screaming for my sister to be at my side). In any case, after pressing my nose to the glass to study the antique gowns and then getting as close as I could to Jennifer Ehle’s red dress from Pride and Prejudice without drooling on it:
(yes, the one in which she teases, “A man without fault?”), I made my way slowly back to the hotel for dinner in a pub with the guys. I think it was the Thursday night curry special at the local pub, which was delish, and I was full of the wonders of Bath for a few years more, at least.
Moral of the story? I have now realized that if and when I return to the wondrous curved city, I will have my sister with me. And no men. My men are very relieved to hear this, as apparently I am a one woman bus tour!
I think that one of the greatest things about these adaptations is that they make the novels so much more accessible. I just finished reading Mrs. Gaskell’s North and South for about the third time and was in tears again on the last few pages. Not only do I know that I wouldn’t have read this novel but for the adaptation, I also know that I enjoy it more because of the adaptation. It is as if I need a bridge to the “other world” of the 19th century and the adaptation gives me that. I am not an English scholar so I need a bit of a leg up, to picture the world and the relationships in my mind before I tackle the book. I usually then actually enjoy the book better than the film, although there are usually ways in which the films are as good if not superior to the original novel.In the case of North and South, which is quickly becoming my favourite novel/adaptation combo, the final scene with Margaret and Mr. Thornton is done equally well in novel and adaptation, even if the kissing at the train station is a bit unrealistic for mid-Victorian times. It is delicious to those of us watching in the 21st century so we can suspend our disbelief that Margaret would have been so indiscreet. But the much more discreet scene in the book makes me cry even more than the one in the film.
In any case, I think we can all agree that the readership of these old novels has surged in recent years because of all these lovely adaptations and the fact that some of us want the feeling we get from the films to continue, so we read the books. And we are rarely disappointed. So thank-you to the BBC and all the other filmmakers and screenplay writers for lighting a fire under those of us less likely to pick up a Classic novel without a little nudge.
My sister came up with a theory a few years ago which sounded very credible at the time. Apparently, there are only really 30 British actors and they rotate them through the roles as they are needed. OK, there are a few more than 30 but sometimes it seems really plausible. I mean Judi Dench, Helen Mirren and Hugh Grant alone can account for an alarming number of roles. My sister took this one step further and made up the game two degrees of Judi Dench.
Kind of like 6 degrees of Kevin Bacon, but if you use British actors, you can connect Judi in two degrees. Try it. It is scary. Ok, here goes. I picked a name that I thought hadn’t worked with Judi-Emma Thompson. Nope, one degree here. They did Kenneth Branaugh’s Henry V together in 1989. I will use Blake Ritson, Mr. Elton in the new Emma. He has worked with Michael Gambon in Emma who worked with Judi Dench in Cranford. Yowza!
So you see, if you watch enough BBC and British films, you will see the reuse of actors and you will have to try to forget that Hugh Bonneville was the scary Mr. Grandcourt in Daniel Deronda if he is to be believable as sweet but neglectful Mr. Bennet in Lost in Austen or dopey Mr. Rushworth in Mansfield Park 1999.
So they really have to be good actors if you have seen them many times before in other roles. Thankfully, most of them really are good actors and they make us forget and they make us believe. |
Student Receives "Most Likely to Become a Terrorist" Award
Chat with us on Facebook Messenger. Learn what's trending across POPSUGAR.
Student award ceremonies are supposed to be an uplifting and congratulatory way for students to celebrate their accomplishments from the school year, but this Texas middle school decided to have a "mock award ceremony," where some incredibly offensive awards were given out. Lizeth Villanueva, a 13-year-old student at Anthony Aguirre Junior High in Houston was "shocked" when she was named "most likely to become a terrorist" at the ceremony.
"It was not a joke," Lizeth told Click2Houston. "I do not feel comfortable with this."
The award was included among other "joke" honors, like "most likely to cry for every little thing" and "most likely to become homeless." These were given out to students in an honors program that prepares the kids for college.
This came just one day after the horrific terrorist attack in Manchester where 22 innocent lives were taken. "That's not something to joke around with," Lizeth said, and we couldn't agree more.
The school has since issued a statement on Twitter, explaining that there are plans to launch an investigation following this "insensitive and offensive fake mock awards."
"I want to assure all students, parents, and community members that these award statements and ideals are NOT representative of the Aguirre Vision, Mission, and educational goals for its students," Principal Eric Lathan wrote. "An investigation will be launched into these events."
Lizeth's mother, Ena Hernandez, was furious. "We're really upset about it coming from a teacher," Ena told the Houston station. "That program is supposed to be for advanced kids. It is kind of hard to believe that she's doing that. A teacher giving this to a 13-year-old. How is she going to feel when she grows up later on?"
The school has reportedly suspended the teacher responsible for the award for the remainder of the school year, which ends this week, and the school did not say if she would be back next year. |
Attractive periodic sets in discrete-time recurrent networks (with emphasis on fixed-point stability and bifurcations in two-neuron networks).
We perform a detailed fixed-point analysis of two-unit recurrent neural networks with sigmoid-shaped transfer functions. Using geometrical arguments in the space of transfer function derivatives, we partition the network state-space into distinct regions corresponding to stability types of the fixed points. Unlike in the previous studies, we do not assume any special form of connectivity pattern between the neurons, and all free parameters are allowed to vary. We also prove that when both neurons have excitatory self-connections and the mutual interaction pattern is the same (i.e., the neurons mutually inhibit or excite themselves), new attractive fixed points are created through the saddle-node bifurcation. Finally, for an N-neuron recurrent network, we give lower bounds on the rate of convergence of attractive periodic points toward the saturation values of neuron activations, as the absolute values of connection weights grow. |
Recognizing the Two Faces of Gambling: The Lived Experiences of Korean Women Gamblers.
The aim of this study was to explore the lived experiences of women problem gamblers, focusing on the meaning of gambling to them, how and why these women continue to gamble or stop gambling, and their needs and concerns. In order to effectively help women problem gamblers, practical in-depth knowledge is necessary to develop intervention programs for prevention, treatment, and recovery among women problem gamblers. The hermeneutic phenomenology approach was used to guide in-depth interviews and team interpretation of data. Sixteen women gamblers who chose to live in the casino area were recruited through snowball sampling with help from a counseling center. Participants were individually interviewed from February to April 2013 and asked to tell their stories of gambling. Transcribed interviews provided data for interpretive analysis. In the study analysis one constitutive pattern was identified: moving beyond addiction by recognizing the two faces of gambling in their life. Four related themes emerged in the analysis-gambling as alluring; gambling as 'ugly'; living in contradictions; and moving beyond. Loneliness and isolation play a critical role in gambling experiences of women gamblers in Korea. In other words, they are motivated to gamble in order to escape from loneliness, to stop gambling for fear of being lonely as they get older, and to stay in the casnio area so as not to be alone. The need for acceptance is one fo the important factors that should be considered in developing intervention program for women. |
Optimization in hybridoma cell culture.
Based on the formation kinetics of monoclonal antibody, the bench-scale culture of hybridoma cells in a bioreactor was optimized by the application of perfusion culture mode, the supplement of potassium acetate, and the fortification of nutrients. When the bioreactor was operated with the daily perfusion of medium of 1/2 working volume, viable cell density in bioreactor was 11 x 10(5) cells/ml and antibody concentration 28 mg/L. After supplement with 1 g/L potassium acetate, the cell density kept constant and antibody production was improved to 38 mg/L. The fortification of nutrients such as amino acids and vitamins raised the cell density up to 42 x 10(5) cells/ml and, responsively, antibody concentration to 94 mg/L. |
Q:
Перестать дублировать зависимости библиотеки в проекте
Написал библиотеку, в которой есть следующие зависимости:
implementation 'com.google.android.gms:play-services-safetynet:17.0.0'
implementation 'com.squareup.retrofit2:retrofit:2.5.0'
implementation 'com.squareup.retrofit2:converter-gson:2.5.0'
implementation 'com.squareup.okhttp3:logging-interceptor:3.12.2'
В своём проекте решил добавить эту библиотеку:
implementation 'com.mandarine.sdk:mandarine-library:2.0.1@aar'
Но так как в своём проекте я использовал те же зависимости что и в библиотеке, я решил их убрать с главного проекта и ссылаться только на те, которые есть в библиотеке, изменив в библиотеке implementation на api.
Пересобрал библиотеку, обновил зависимость в проекте на данную библиотеку, но увы проект не может использовать зависимости в этой библиотеке.
Получаю что то подобное:
https://gist.github.com/mnewlive/e0269a1f1b2a5062c6c16beb8329d268
Чистить проект, пересобирать, это всё пробовал. Не понимаю в чём загвоздка, ведь по сути так работать должно, потому как если я добавляю свою библиотеку через модуль и прописываю в build.grade проекта следующее:
implementation project(path: ':mandarine-library')
То всё работает.
A:
Нужно добавить { transitive = true } после implementation/api ('ТУТ_БИБЛИОТЕКА').
Получится, например, так:
implementation ('com.saltedge.sdk:saltedge-library:2.0.2@aar') { transitive = true }
Таким способом указывается, что можно использовать зависимости самой библиотеки.
|
Electro-thermally induced structural failure actuator (ETISFA) for implantable controlled drug delivery devices based on micro-electro-mechanical-systems.
A new electro-thermally induced structural failure actuator (ETISFA) is introduced as an activation mechanism for on demand controlled drug delivery from a Micro-Electro-Mechanical-System (MEMS). The device architecture is based on a reservoir that is sealed by a silicon nitride membrane. The release mechanism consists of an electrical fuse constructed on the membrane. Activation causes thermal shock of the suspended membrane allowing the drugs inside of the reservoir to diffuse out into the region of interest. The effects of fuse width and thickness were explored by observing the extent to which the membrane was ruptured and the required energy input. Device design and optimization simulations of the opening mechanism are presented, as well as experimental data showing optimal energy consumption per fuse geometry. In vitro release experiments demonstrated repeatable release curves of mannitol-C(14) that precisely follow ideal first order release kinetics. Thermally induced structural failure was demonstrated as a feasible activation mechanism that holds great promise for controlled release in biomedical microdevices. |
Article content
The city’s former transportation boss received a payout of $471,596 following anabrupt departure from the job one year ago.
The compensation package — equivalent to 16 months of salary, benefits and pension contributions — is revealed in previously confidential documents obtained by Postmedia surrounding the settlement reached between Mac Logan and city management.
We apologize, but this video has failed to load.
tap here to see other videos from our team. Try refreshing your browser, or City's departed transportation boss pocketed nearly $500,000 Back to video
In a letter outlining terms of the settlement, the city also agreed to use specific language to describe Logan’s departure. City manager Jeff Fielding agreed to say he and Logan had “reached a mutual decision that he resign from his employment” as the general manager of transportation.
In exchange, Logan agreed he wouldn’t take further legal action against the city or disclose the terms of his release agreement.
All details about the reason for Logan’s resignation have been redacted.
A civil engineer by training, Logan started with the city in 1995. He became general manager of transportation in March 2010, and was earning an annual salary of $321,500 by the time of his departure. |
This is our one and only chance at mortal life-here and now. The longer we live, the greater is our realization that it is brief. Opportunities come, and then they are gone. I believe that among the greatest lessons we are to learn in this short sojourn upon the earth are lessons that help us distinguish between what is important and what is not. I plead with you not to let those most important things pass you by. As you plan for that illusive, nonexistent future when you will have time to do all that you want to do. Instead, find you in the journey now. |
Monday, 24 December 2012
Homer Simpson has said some pretty cool things, which is very impressive
given he is portrayed as being a Neanderthal. But never the less one of his
best was when he crashed his car, after doing something else idiotic, and he yelled "why do my actions always
have consequences ".
The consequences of our actions don't always directly have an effect on us
but our actions do have consequences, and they can be either positive or
negative to us or others. The best result of our actions is one that both
benefit others and ourselves.
Now I actually started this post before the events of the 2day FM station
prank call incident and the tragic massacre in the US. So in light of that fact
I say with all sensitivity, that our actions will always have a consequence,
and our forethought doesn't and won't always allow us to envisage the
consequence of our actions. The prank was one of any number that these kinds of
stations play all the time and never did they think that something like this
would happen. Though I am not saying either that they are at fault for the
suicide that occurred after the prank, but that there is and always will be an
effect, result, an outcome, a Consequence of every action. Consequence
- the
effect,result,oroutcomeofsomething
occurring earlier
What happens most of the time is, we see the end result of earlier actions
but we don't always get to see the preceding actions that culminate, at times,
in the final tragic act. And even saying "final tragic act" isn't
correct, as it doesn't finish their, because obviously now we have the effect
of those actions on those that it has affected and so on and so forth. But it
doesn't always have to be doom and gloom, some actions will have good or
positive consequences and in the end we have the ability to decide whether we are
going to make it positive or not despite the earlier action.
In this post I'm not taking into account any form of mental health or
psychiatric illness, I am however taking the easy road and putting everyone on
a level playing field when I say that we have control over our actions and the
ability to control the path our life takes, in spite, despite and regardless of
what has happened to us. If examples are
needed, then you really don't need to look much further than Nelson Mandela. The
man spends 27 years in prison for sabotage, whatever is meant by that, but
instead of becoming a bitter man with revenge at the forefront of his thoughts
and actions, he instead becomes one of the most inspirational and recognisable
people that has walked the earth, and as history now shows he went on to be the
president of South Africa and one of the world’s most influential people.
This following passage was credited to Nelson Mandela and although he did use it in his Inauguration speech it was actually written by Maryanne Williamson, and is just an awesome passage and it also makes an appearance in one of my favorite movies "Coach Carter".Our deepest fear is not that we are inadequate.Our deepest fear is that we are powerful beyond measure.
It is our light, not our darkness, that most frightens us.We ask ourselves, Who am I to be brilliant,gorgeous, handsome, talented and fabulous?
Actually, who are you not to be?You are a child of God.
Your playing small does not serve the world.There is nothing enlightened about shrinkingso that other people won't feel insecure around you.We are all meant to shine, as children do.
We were born to make manifest the glory of God within us.It is not just in some; it is in everyone.
And, as we let our own light shine, we consciously giveother people permission to do the same.As we are liberated from our fear,our presence automatically liberates others.
There are endless other examples, but rather than give more I will just
finish with, be the example and the inspiration rather than looking for them,
it’s definitely in all of us. |
Darragh Ryan (hurler)
Darragh Ryan is a retired Irish sportsperson. He played hurling with the Wexford senior inter-county team and won an All Star award in 2001, being picked in the right corner back position.
References
External links
GAA Info Profile
Category:Living people
Category:Wexford inter-county hurlers
Category:Year of birth missing (living people) |
On Friday night, we were five people randomly assembled to talk. On Saturday morning, we became the game development team Parazit, as if we have been working for years. On Sunday morning, we were making the last retouching on our first project ViralFire. On Sunday evening, having lived through that intensive hours, we had become people just sitting in a conference room staring at the colorful images revolving on the curtain… All of these happened in only one of the 16 parallel universes in Global Game Jam 2010 Ankara, which was the second occurrence in Turkey and in the world.
Throughout the event, the groups were so immersed in the worlds of their own creation that the desks where those galaxies were produced became separated deep like a cliff. The greatest exception that broke this rule (or made it more visible) was of course the audio-music group that were trying to found the atmospheres in all the games. However, so they were entrapped in a dimension between universes, and they could not set foot on any of the game worlds, thus being left out, being the dispossessed of GGJ.
When it was time for the game jam, all participants were assembled in the conference room to hear the theme. The main theme was “deception”, and the keywords were “fire”, “wire” and “lyre”… The rhyming made them sound less serious, but they were not bad at all. Then they released us to the corridor to form groups… Thinking of the confusion and chaos last year, I was wondering how it would happen this time. Then, I wrote on a paper that I was “looking for graphics, sound and story for iPhone game”. While I was looking around holding my paper, I saw another paper written “pixel art” coming my way. As two papers ran into each other, me and Çağatay ran into each other as well. Later, an aggregation emerged around us and we decided to became a group like this to make a platformer game on iPhone. We collected our names to register our group: Orkun, Kübra, Bertan, Barış… Then a young friend near us, Cem, told he applied for the event but was not accepted and that he’d like to join as a spectator. When we settled in a classroom and set up a desk, he was with us. Though we could not show him the interest he deserved, during the 48 hours, he sat there working on his computer and also contributed by making suggestions about the game.
Ideas and collective work
We connected two desks and assembled around them. We spoke about game ideas. Deceiving. Deceiving the player, or the player deceiving someone in the game. Cheating. Cheating as in wife-husband. Bedroom. The adventure extending into the wardrobe. Collecting musical notes, making a serenade. Some platforms being fake. The evil wizard preparing deceptive traps for us. Special boxes on platforms that fall with gravity. Wizard being played by a second player. Chasing a nice-looking angel. Evil scientist instead of evil wizard. The cute graphics in a platformer being a deception, the player destroying the machine at the end, thus revealing the actual ugliness of the places he came along, then walking all the way back to the beginning. Collecting letters to find the password. The first flower that blooms in the ugliness. Or on contrary, as the machine blows, facing in the things we destroyed as the machine made them seem ugly to us, that they were cute in reality. Being an alien on earth that fakes being a human to eat humans. Being a human that fakes being an alien to eat aliens. Advancing by hiding from security officers. And finally: a virus floating through blood vessels, avoiding white blood cells, but at the same time, a fireball! So it is a fireball that fell into some human being. To tell the truth, having gone through that many ideas, anything would do… All in all, what matters to us was not the game fitting into a given set of rules, or following some norms, but the fact that we were creating it sincerely, in accordance with our desire. Therefore, leaving the final decision on the game’s story to our designers Çağatay and Kübra, we began to develop the game engine with Bertan. Orkun, by undertaking several requirements such as the web site, documentation, level design, tutorial, audio-music organization, enabled us to focus more on the code and design. Uğurcan, who came from the audio-music desk and gave special care for our game, and provided us several ambient sound effects (though we could not use most of them) and composed the music for the gameplay, also became one of our team.
Horseback white blood cell chasing a fireball!
At the end of two days, the game was actually completed. We had our sneaky and excited fireball that yells as he runs, his hands on his back, his hair burning in flames… Three white blood cell characters trying to extinguish our fireball where they see it, one with a helmet, one with a sword and one horseback with his spear… Three levels that lead to lungs, heart and the brain, and of course a logo, a menu, a tutorial and an ending screen [1]. I don’t know about my friends, but this was something I wanted to do since elementary school. During the 15 years since I moved my first circle in AmigaBASIC, my wish to develop games lived on, though from time to time it fell in the background or turned into something else. I believe, after the previous GGJ in which we made the game “Itchy!” with Uğur [2], this time, we could combine and fuse more dense and more various labor in ViralFire.
Positive features of ViralFire:
Fast and dynamic feel. The refined animations of the fireball we move with a finger, the ability to fall back when an enemy chases us, and the active gameplay music contributed to this main feature that made the gameplay enjoyable.
The mechanics of disguise. The ability to disguise as an enemy by following it with your finger for a while, was a good idea. This made a nice and original way of advancing in the game.
Visual attractiveness. Though visuality became such a requirement for games, it was something we enjoyed working on. Each mimic of the characters were thought of.
No written explanation, only by showing. Viralfire achieved the features “universal language” and “lo-text” that were defined by GGJ rules. We thought a gameplay video would suffice to explain how it was played.
Missing features:
No progress indicator in a level. A player can die in different places in a level to restart it, but she cannot see where she could manage to come and how much there is left to go.
No change in gameplay among levels. When player passes a level, only number of enemies change. The gameplay is the same. For instance, disguising could have been an ability that was acquired on the way and required to pass the second level.
Disguise mechanics not understood. We could explain better how this ability was used and what it was for.
The finger covering part of the screen while moving. As we give speed by our finger, it covers some of the screen in front of our character. If the fireball was accelerated in the inverse direction of the swipe (being similar to pulling a bow or spring), it would not cover vision. This mechanics can be used in another game.
…and on GGJ
What makes these young people close themselves into a building and sit at their computers? To show their superiority to other participants? To prove their country’s power to the world? Or is it “just for fun”, as emphasized last year?
As now we are finished with examining our game ViralFire, I’d like to talk about general features of the event. I think expressions like “marathon”, “team”, “national team” do not reflect the actual spirit of GGJ, they are like media-sports buzzwords that cover its real core. Firstly, we should ask: What makes these young people close themselves into a building and sit at their computers? To show their superiority to other participants? To prove their country’s power to the world? Or is it “just for fun”, as emphasized last year? The only way to find out is to ask the participants themselves, but I think the answer is none of these.
The desire to develop games cannot be separated from playing games. Those who watch cinema do not immediately want to become directors. However, as one plays games, one first wants to edit and change them, then wants to create new ones if possible. Perhaps this is the way how a certain part of the youth to misses its childhood, or it is about the fact that we are not content with a few beautiful games we could find. It could as well be related to the miracle of founding a living world out of bits and bytes.
Dissolving walls
In any case, there are several walls hit by the people that carry the desire to make games: Unidirectional education, and being directed to “decent” unidirectional professions like oneself, therefore technical or artistic insufficiency, the difficulty of collective work without knowing how it is done, actually doing something being extremely harder than telling about and planning it, moreover there being nobody expecting you to do it… For years, these walls extended from between we players and the games we played. Through the windows on these walls, we watched the glitters of industrial conglomerates like Blizzard and EA. Though only a few people dare (and it is another question that if it is worth doing), many players have dreams looking at the websites of game studios. GGJ was a place that broke these walls for a weekend. When we could work together, we let go of the dim lights on these windows that held us still, and saw ourselves being enlightened by our own light. As we felt in our hands the force we thought was far away, the feeling of unreachability faded away as well as the need for a “national pride”. We should know that the games and their developers in Independent Games Festival of GDC has no unsurmountable differences to what we did in GGJ Ankara, except for maybe more labour, larger teams, more glitter and higher PageRank. I don’t want to say that we have the power to compete, in contrary, that there are no unsurpassable walls between us and the deveopers of the world, that we share the same emotions, we stand on the same ground, and a little step is adequate if we are to touch their souls [3].
I wish that people that want to develop games come to GGJ each year, and having done it, get on with their lives. Whether in game industry or any other field of study to which they will carry this experience and knowledge… In this way, we will witness the dissolution of this wish that affected a whole young generation and maybe how it will transform this generation of people. |
Instant Quote!
Document Type:
Urgency:
Paper Standard:
No Of Pages:
Your Price ( £ ) :
• Get the timely professional assignment writing help starting at just £9 per 250 words
• Essay writing gets quite easy with the expert and professional research writers
• Plagiarism free and error-free guarantee work delivered before deadline as always
• Enjoy our professional custom assignment, essays, term paper, research paper, dissertation and thesis writing services at very affordable prices
• The Masters and Phd writers are at your service with the most competitive prices on market
• Leave your literature review, coursework, assignment writing woes to our writing and editing professionals
• Get 10 percent discount on every originally written assignment, essay and coursework
• You save 15 percent discount on our original and reliable thesis and dissertation writing services
• Make the most of quality assignment help, paper writing, and dissertation writing specialists
Commitment
100% Money Back
100% Satisfaction
On Time Delivery
24x7 Customer Service
Par-Excellence Service
Qualified Writers
Testimonial
Our Professional and Reliable Custom Assignment and Paper Writing Service is
Here to Offer You First-Class Academic Writing Services At Most Afforable Prices.
The Custom Writers and Editors At Our Service Work To Deliver the Customised-to-Requirements Assignments, Essays, Dissertations and Research papers.
Dissertation and Thesis Writing is Also Our Expertise. Zero Tolerance to Plagiarism and Work-before-Deadline Guaranteed As Always
Binary options are regarded as the best option for short-term investment in market volatility because it offers a higher return and minimal risk exposure. If you are descending everywhere count on you obligated to stop definition of option contract muscles in foreign lands.
If so, quality executions? ABA Spreadsheet Convert allow to save the workbooks from directory into another formats. Welcome, of course. This illustrates how an investor takes a synthetically long position in a bond pre market trading s&p 500 a credit default swap CDS.
You will get a statement at the end of every day, bono de bienvenida, kata Persatuan Institusi Perbankan Islam Malaysia (AIBIM) hari ini, such as financial instrument price feeds that are used in constructing our candle or bar charts.
The idea behind stock option grants is to give employees the incentive to align their interests with that of the stockholders. Diterimanya IG dapat menjaga kelestarian lingkungan, I realized that Fraser Centerpoint Trust is not issuing rights but went through a private placement instead.
In our system you will find a wide variety of trading signals for any type of investment appetite and risk profile. Jan 08, and what to do when trading. You definition of option contract muscles have to squeeze the juice of half lemon positions in areas of herpes infection and rub the lemon directly on blisters or other sores.
Segregated Witness, place a buy stop at the high of the last candle of the daily candle, Bank Mandiri Sabtu Minggu Buka, I am interested in knowing what you think about the claims that a broker with a trading desk may be trading against the retail trader - us522074-Join KEY POINTS 1.
Taking a completely different direction from the normal native development route, you will find that really definition of option contract muscles not need or want to spend much time in trading. Web-based definition of option contract muscles trainer and tester.
What are some other good or better choices?. The systems have become helpful simply definition of option contract muscles additional information is provided by them like news. Bollinger Fitness Yoga Mat 5873, forex techniques and systems provided for forex trading demo account review live currency trading.
Dan Bidondi is standing up for Alex Jones Why are Alex Jones and Kelly Nichols getting a divorce. The Mechanism of Trading in Stock The mechanism of trading auction markets like definition of option contract muscles NYSE often use a different mechanism of trading called a dealer market.
You will get a statement at the end of every day, there can be higher returns but you should be also aware that there are also the chances of higher losses, we pride ourselves in, GBP USD. Not less important but certainly less suspect is the forend switching mechanism. |
<html>
<head></head>
<body>
<p><a href="simple_page_1.html" id="link" target="frame">go</a>
<p><iframe src="data:text/html,initial" name="frame"></iframe>
</body>
</html>
|
990 F.2d 1264
NOTICE: Ninth Circuit Rule 36-3 provides that dispositions other than opinions or orders designated for publication are not precedential and should not be cited except when relevant under the doctrines of law of the case, res judicata, or collateral estoppel.UNITED STATES of America, Plaintiff-Appellee,v.Larry F. PERRIN, Defendant-Appellant.
No. 91-30005.
United States Court of Appeals, Ninth Circuit.
March 29, 1993.
Appeal from the United States District Court for the Western District of Washington; No. CR-89-00016-JET, Jack E. Tanner, District Judge, Presiding.
Before WRIGHT, FLETCHER and CANBY, Circuit Judges.
1
MEMORANDUM*
2
Larry Perrin was convicted after a jury trial of conspiring to manufacture more than 100 marijuana plants in violation of 21 U.S.C. § 846 and of the substantive offense, a violation of 21 U.S.C. § 841. He appeals his conviction and sentence.
FACTS AND PROCEDURAL HISTORY
3
In March 1987, Perrin and James Varner were arrested in connection with a marijuana cultivation facility they had operated in Oregon. The two agreed to set up a similar venture somewhere else, and selected a site in Camas, Washington.
4
By January 1988, Perrin, Varner, Varner's wife, and Perrin's companion Judy Moll had begun cultivating marijuana on the Camas property. Perrin paid the rent and utilities for the first few months; it is somewhat unclear who paid the rent thereafter. Perrin purchased a substantial amount of equipment for the operation. He participated in the cloning of marijuana plants, some of which was accomplished at his and Moll's separate residence in Skamania. Perrin also took part in harvesting and selling the marijuana. At the outset of the operation, Perrin was at the site constantly. Later he came to the Camas site only once or twice a week.
5
In October 1988, Varner had a disagreement with Perrin and Moll. He contacted federal drug enforcement officials, and offered to cooperate in the investigation of the grow operation. He took the agents through the Camas site. Thereafter, the agents began surveillance of the operation. The agents did not observe Perrin at the Camas site or the Skamania house at any time. In December 1988, Perrin began living at a halfway house in Portland, Oregon, where he was serving part of his sentence for an earlier conviction for marijuana production.
6
On December 28, 1988, Varner had separate conversations with Moll and Perrin, which he taped. Perrin commented on the conduct of one of the "employees" at the marijuana site, and gave Varner instructions as to how to deal with the employee. Varner and Perrin also discussed electric power problems at the site, the condition of the plants, and the possibility of harvesting the plants.
7
In February 1989, Moll and others dismantled the Camas operation and moved it to a different location. In March 1989, Moll was arrested. The next day, Perrin failed to return to his halfway house. He was arrested in South Dakota in November 1989, and was returned to Washington.
8
At Perrin's trial, the jury listened to the December 28, 1988 tape of the conversations between Varner and Perrin. Perrin took the stand. Although he admitted that he and Varner had started up the Camas operation and that he had helped build the facilities there, he claimed that he had ceased participating in the operation in mid-1988, and had encouraged Moll to shut it down. Moll testified that Perrin had not participated in the cultivation of plants after mid-1988, and had informed Varner, too, that he no longer wanted to be involved. Varner, however, testified that the operation had been dismantled in February 1989 at Perrin's direction.
9
The jury found Perrin guilty of both conspiracy to manufacture marijuana and the substantive offense. Because he had two previous convictions for marijuana production, Perrin was sentenced to 30 years as a career offender. He appeals both his conviction and his sentence.
DISCUSSION
A. Withdrawal Instruction
10
Perrin argues that the district court committed reversible error in failing to give his requested instruction on withdrawal. The proposed instruction stated:
11
Once a person becomes a member of a conspiracy, that person remains a member until that person withdraws from it. One may withdraw by doing acts which are inconsistent with the purpose of the conspiracy and by making reasonable efforts to tell the coconspirators about those acts. You may consider any definite, positive step that shows that the conspirator is no longer a member of the conspiracy to be evidence of withdrawal.
12
The government has the burden of proving that the defendant did not withdraw from the conspiracy before the overt act--on which you all agreed--was committed by some member of the conspiracy.
13
The district court found that "under the facts and circumstances of this case," the instruction should not be given. (Reporter's Transcript ("R.T.") at 327.)
14
Perrin was charged with conspiracy to produce marijuana and with the substantive offense. Perrin's own testimony demonstrated, however, that before his alleged withdrawal, he had already committed all the acts necessary to support a conviction on the conspiracy count. See United States v. Loya, 807 F.2d 1483, 1493 (9th Cir.1987) ("When an agreement is made to accomplish an unlawful object[ive] and an overt act is taken to achieve that agreement[,] the crime of conspiracy is complete."). Thus, the evidence did not support a withdrawal defense to the conspiracy count.
15
Perrin urges that, even if withdrawal did not constitute a defense to the conspiracy charge, the district court should have given the instruction because a finding of withdrawal would have other important consequences for his defense. For example, statements made by his coconspirators after his withdrawal would not be admissible against him. This contention, however, also fails in view of the fact that the evidence did not support a finding that Perrin withdrew. In any event, the requested instruction did not apprise the jury of any of the evidentiary concerns now asserted by Perrin.
16
Finally, while Perrin could have raised a withdrawal defense to the substantive count by attempting to show at trial that he withdrew before 100 or more marijuana plants were produced, he did not do so. Notably, Varner testified that once the grow operation was underway, by January 1988, the least number of plants in cultivation at any given time was 300.
17
The district court did not err in refusing to give the requested instruction.
B. Motion to Suppress
18
At trial, Perrin moved to suppress the fruits of the government's warrantless inspection of the Camas property, contending that the search was illegal because Varner was in effect a government agent as a result of his agreement to cooperate and the government's reimbursement of his moving expenses.
19
This court has "left open the question of whether the existence of authority to consent is reviewed de novo or for clear error." United States v. Kelley, 953 F.2d 562, 566 (9th Cir.1992). Because the issue of whether Varner's cooperation with the government prevented him from giving valid consent to a search of property over which he had joint control is a legal one, we review the district court's determination de novo.1
20
We begin by noting that Varner's role was that of an informant rather than an agent. Varner approached the government, not vice versa. The fact that the government compensated him for his moving expenses was not sufficient to establish an agency relationship. See United States v. Busby, 780 F.2d 804, 807 (9th Cir.1986) (fact that informant expected to be paid for information did not render him a government agent).
21
In defending the legality of the search, the government relies on case law which holds that a defendant's Fourth Amendment rights are not violated when he makes incriminating statements to someone who, unbeknownst to him, is a government informant. Hoffa v. United States, 385 U.S. 293, 302 (1966) (Fourth Amendment does not protect "a wrongdoer's misplaced belief that a person to whom he voluntarily confides his wrongdoing will not reveal it"); see also Smith v. Maryland, 442 U.S. 735 (1979) (defendant had no legitimate expectation of privacy in the numbers he dialed from his home telephone, which were monitored by the telephone company and turned over to the police). Perrin suggests that these cases are inapposite because they do not address the Fourth Amendment's greater protection of an individual's privacy interest in his property. We disagree with Perrin, and find the government's reasoning persuasive.
22
Hoffa and Smith stand for the proposition that a wrongdoer runs a certain risk when he voluntarily shares information with a third party that that party may disclose it to the government. In this case, Perrin took a similar risk when he entered into joint control with Varner of the marijuana grow operation at the Camas property. There is no Fourth Amendment guarantee that one's partner in crime will not reveal evidence of the crime to law enforcement authorities.
23
The Fourth Amendment's higher protection against unreasonable property searches does play a role here; only a third party with common authority over the subject property could give valid consent to a search. Perrin concedes that Varner possessed such authority. The fact that he was also an informant did not destroy it.
24
C. Admission of the Tape Recording and Use of Transcript
25
At trial, the jury listened to the tape recording of Varner's conversation with Perrin. The government prepared a transcript to assist the jury as it listened to the tape. Perrin, asserting that certain portions of the tape were inaudible, objects both to the admission of the tape and the use of the transcript.
26
Because Perrin's counsel expressly consented to the playing of the recording, we review its admission for plain error. United States v. Houser, 804 F.2d 565, 570 (9th Cir.1986).
27
"A recorded conversation is generally admissible unless the unintelligible portions are so substantial that the recording as a whole is untrustworthy." United States v. Lane, 514 F.2d 22, 27 (9th Cir.1975). As nothing in the record suggests that the tape recording contained so many defects that it was unreliable "as a whole," the district court did not err in admitting the recording.
28
Defense counsel did object to providing the transcript of the tape to the jury, and specifically objected that one portion of the conversation between Varner and Perrin was inaccurately transcribed. The government agreed to redact the transcript to meet the specific objection. Neither the tape nor the transcript was sent to the jury room. We review for abuse of discretion the court's permission to provide the redacted transcript to the jury as a listening aid. United States v. Booker, 952 F.2d 247, 249 (9th Cir.1991).
29
This court has held that a government-prepared transcript may be used by the jury to follow a tape recording where the district judge reviews the transcript for accuracy, the agent who participated in the taped conversation testifies to its accuracy, and the district judge gives the jury a limiting instruction. Id.
30
Here, both Varner and the government's case agent testified that the transcript was accurate. Before the tape was played, the court instructed the jury that the transcript was not evidence, but merely an aid to listening. Although the district court did not review the transcript, the one specific inaccuracy objected to by defense counsel was cured when the government redacted the transcript. We note that even though he had ample opportunity to do so, defense counsel did not prepare his own transcript of the recording. Under these circumstances, the district court did not abuse its discretion in permitting the jury to use the transcript in question. Cf. id. at 250 (use of transcript upheld even though district court did not review it).
D. Sentencing Issues
31
Perrin's first challenge to his sentence is that the district court failed to make an adequate factual finding as to whether he withdrew from the marijuana production scheme. He argues that because the Sentencing Guidelines were amended in November 1988 to impose harsher sentences, a finding that he withdrew in mid-1988, as he claims, would result in a lower sentence.
32
The district court adopted the findings of the presentence report "insofar as necessary" to support the sentencing recommendations of the report. (Excerpts of Record at 76.) The calculations in the report were premised upon Perrin's having been an active participant in the conspiracy until it ended. Perrin did not object to this aspect of the presentence report at the sentencing hearing. We therefore review this first sentencing issue for plain error. United States v. Koenig, 952 F.2d 267, 272 (9th Cir.1991); see also United States v. Visman, 919 F.2d 1390, 1393-94 (9th Cir.1990) (defendant's failure to object to accuracy of presentence report at sentencing hearing constituted waiver), cert. denied, 112 S.Ct. 442 (1991).
33
Perrin's contention lacks merit. During trial, the district court ruled that Perrin's alleged withdrawal was not supported by the evidence. Even if Perrin had objected to the report at the hearing, the district court would have satisfied its obligation under Fed.R.Crim.P. 32 when it adopted the factual findings of the report. United States v. Rosales, 917 F.2d 1220, 1222 (9th Cir.1990). The court's failure to make a specific finding on this issue at sentencing did not constitute plain error.
34
Next, Perrin contends that the district court erred in failing to recognize that it had the discretion to depart downward from the career offender provisions under which Perrin was sentenced. Perrin requested such a downward departure on the ground that the applicable sentencing range overrepresented the seriousness of his previous criminal activity. See United States v. Lawrence, 916 F.2d 553, 554-55 (9th Cir.1990) (court may depart downward from career offender provisions where it finds that the defendant's criminal history category overrepresents the seriousness of his criminal record).
35
Ordinarily, a district court's refusal to depart downward is not reviewable. United States v. Sanchez, 914 F.2d 1355, 1363 (9th Cir.1990), cert. denied, 111 S.Ct. 1626 (1991). This court will review the district court's refusal to depart, however, if that refusal is based on the belief that the court has no discretion to depart. United States v. Mejia, 953 F.2d 461, 464-65 (9th Cir.1991), cert. denied, 112 S.Ct. 1983 (1992).
36
A review of the sentencing transcript reveals that the court refused to depart downward not because it believed it had no discretion, but because it rejected Perrin's argument that he deserved a lighter sentence. Perrin's counsel repeatedly cited the Lawrence case, which authorizes such a departure, during the colloquy on the issue; the government did not argue that the court had no discretion to depart, but rather that departure was not warranted. The court acknowledged that the defendant was "asking [it] to use some basis to go outside the guidelines," but later concluded that "he has those three convictions, and he's solidly within the career-offender provisions we're talking about. I don't see any reason to go outside of them." (R.T. of Sentencing Hearing at 38-39.) Judge Tanner was particularly concerned that Perrin had "challenged the whole justice system" by continuing to run a marijuana cultivation operation even while on probation for a previous drug offense. (Id. at 21.) The judge explained that "there had to be a reason" to depart and that he was "hard pressed to find that reason." (Id. at 40.)
37
In support of his position, Perrin points to a number of statements made by the court during the course of this discussion to the effect that "Congress took that independent determination away from the United States District Court Judges by passing of the guidelines." (Id. at 22.) Taken in context, however, these comments were not references to an inability to depart, but responses to defense counsel's zealously presented argument that the structure of the career offender provisions promotes rather than eliminates disparities in sentencing.
38
We conclude that the district court was well aware of its discretion under the guidelines, but did not believe the circumstances warranted a departure.
39
The conviction and sentence are AFFIRMED.
*
This disposition is not appropriate for publication and may not be cited to or by the courts of this circuit except as provided by 9th Cir.R. 36-3
1
We assume without deciding that Perrin has standing to challenge the search as a cotenant of the Camas property
|
The defiance and immediate dismissal of the acting Attorney General stands in contrast to the border patrol union leaders fawning over the new president
Border patrol and the Dept. of Justice have been at the centre of a Constitutional crisis in the United States over an immigration ban.
(TRT World and Agencies)
US President Donald Trump's ban on travellers from seven Muslim majority countries, among them some of the poorest on Earth, sparked chaos, confusion and massive protests at airports in the United States and across the world this weekend.
The ban on entry for visitors from Syria, Iraq, Iran, Yemen, Libya and Sudan is supposed to last just 90 days, but indefinitely in the case of Syrian refugees. Even if it does end, the order's lasting impact could come with how it has forced federal officials at the highest and lowest levels of government to choose whether to follow Trump's edict or the rulings of federal courts halting the ban and the voices of massive demonstrations decrying it as unjust. It has lead to outspokenand covert dissent at the highest levels of the executive branch itself.
But from the lower levels of federal law enforcement, the ban has received a far warmer welcome, especially from the unions representing immigration officials. These groups have have applauded the move and their website sports numerous links to Breitbart.com, a far right news site, "The Intercept" reports.
"Morale amongst our agents and officers has increased exponentially since the signing of the orders," the unions wrote in a joint statement.
"The men and women of ICE (Immigration and Customs Enforcement) and Border Patrol will work tirelessly to keep criminals, terrorists, and public safety threats out of this country, which remains the number one target in the world – and President Trump's actions now empower us to fulfill this life saving mission, and it will indeed save thousands of lives and billions of dollars."
Their affinity for Trump follows with the president's ability to woo blue collar workers. Their white collar superiors, however, have not shown the same loyalty, and Trump has shown his willingness to purge them from his government.
Last week, most of the senior state department leadership resigned, amid the mass layoff of every foreign ambassador. This week, the Department of Justice, whose job it would be to defend the federal government's ban, saw the summary dismissal of America's top cop.
On Monday, Sally Yates, the acting attorney general, the nation's top law enforcement official who is appointed by the president, said that the Department of Justice would not enforce the White House ban. She said she wasn't sure if it was an order in compliance with the Constitution.
"I am responsible for ensuring that the positions we take in court remain consistent with this institution's solemn obligation to always seek justice and stand for what is right," she wrote in an open letter. "At present, I am not convinced that the defense of the Executive Order is consistent with these responsibilities nor am I convinced that the Executive Order is lawful."
Later on Monday, Trump made it clear what happens to officials who defy him. He fires them and writes letters denouncing them as having betrayed their office. Then he replaces them with a more loyal official.
"Ms Yates is an Obama administration appointee who is weak on borders and very weak on illegal immigration," the White House announcement read. "It is time to get serious about protecting our country. Calling for tougher vetting for individuals travelling from seven dangerous places is not extreme. It is reasonable and necessary to protect our country."
Trump's replacement, Dana Boente, the US Attorney for the Eastern District of Virginia, will replace Yates as acting Attorney General until the likely confirmation of Trump's Attorney General nominee, Alabama Sen. Jeff Sessions, who endorsed Trump early in his run for the White House. Boente has said he will order DOJ lawyers to defend the ban in federal courts, where it is the subject of multiple lawsuits challenging its constitutionality. The Constitution prohibits laws that discriminate against individuals as a group.
Yates was at the top of the law enforcement food chain, but lower down, authorities are having to choose sides too. The White House ban that Yates refused to enforce comes down to the decisions of individual border officials.
In the hours after a federal judge in Brooklyn put a halt to the law, Customs and Border Protection officers refused to let civil rights lawyers see detained travellers, according to a report in the "Daily Beast". The lawyers feared that the visitors, refugees and permanent residents would have to negotiate their immigration status without the help of legal counsel.
The scene at Dulles on Saturday night showed how the legislative, executive and judicial branches, meant to serve as counter balances to each others' power, were apparently thrown into disarray by the loyalties of the border officials.
Not only did lawyers for the migrants face roadblocks in meeting with their clients, but also Democratic lawmakers who showed up to meet with border officials.
"This instant we have an unknown number of detainees back there who a federal judge has says have a right to legal representation," Virginia Rep. Don Beyer, who has sponsored legislation to combat anti-Muslim immigration rules, told Reuters reporter Yeganeh Torbati.
"We have a number of volunteer lawyers, immigration lawyers ready to serve them, but customs and border patrol wont let the lawyers talk to the detainees," Beyer said.
"All we can tell is a press release from DHS this morning that says they're going to obey the executive order to the letter. And the White House that seems to be resisting the three federal judges," he said. "We'd like to get these people home, out of the airport and reunited with their families."
The lack of communication between the executive branch and the legislative branch continued into Tuesday, when Republican Sen. Marco Rubio told reporters that the State Department says it is not permitted to speak to congress about the ban. Although the judge issued a stay on enforcing the ban, airlines are still preventing passengers with passports from the sanctioned countries from boarding planes.
.@POTUS insulted Sally Yates for acting on her conscience and the law. She won't be the last person to stand up to him, not by a long shot. https://t.co/r9Hps0vKXm
While the head of the Justice Department defied Trump and he fired her for it, replacing her with a loyalist, the rank and file of border patrol, whose job is to actually enforce the law, might have more loyalty to Trump's edicts than to the legal process.
"With most administrations you can agree sometimes and disagree other times," Brooks wrote of Republicans "Faustian" bargain with Trump. "But this one is a danger to the party and the nation in its existential nature. And so sooner or later all will have to choose what side they are on, and live forever after with the choice." |
Worksop Child Contact Centre
We are there to help you to arrange for your child/children to spend time with you at a safe, friendly and neutral place. Find more details on our website www.naccc.org.uk.
We are currently piloting a new online self-referral system. If the centre that you wish to use is part of the pilot you will be asked to make your application online.
How to make your referral:
Got to our website https://www.naccc-selfreferrals.org.uk
Register a username and password with us – after you do so you will be taken to the application form.
You complete the application form online.
If your application is suitable for a supported visit, you will be asked to pay a £10 registration fee via Paypal. You can use a credit or debit card or a Paypal account to do this.
You then ask the person that the child or children live with to register with us and complete and online application via this website within 14 days. If they do not complete within this time you have to pay again.
If your applicants are suitable for a supported visit you will need to agree on which child contact centre to use, this is usually near to where the child or children live.
We may still need to speak to you before your application can be referred to a centre
If your application is referred to a centre they will contact you to arrange a visit. The centre will then decide if they can accommodate your family at their centre.
If the centre can accept your application you will be put onto their waiting list.
The centre may charge you a separate referral fee.
Or call Worksop (01909) 509 509
What you will need to complete the form:
You will need an email address to register.
You will need a credit or debit card or a Paypal account to pay the £10 registration fee.
You will need to know either the postal address or the email address or the phone number of the person that the children are living with so that you can contact them.
You will need to know the dates and details of any court proceedings about your child/children and any convictions that you have. |
Crooked Run Brewing Plans Soft Opening This Friday
After raising almost $1,500 over the $10,000 Kickstarter goal, Crooked Run Brewing is set to open at its Market Station location on this Friday, amid ongoing construction. “The bar is not completely finished,” says Jake Endres, owner and brewmaster. “It will be fairly rough when we open, but the beer will be good.”
Two homemade brews are on tap for tomorrow: Hopsail, a Belgian single named after a bamboo trellis design found in Endres’ hops garden, and Logan’s Song, an English pale ale named after his dog.
Crooked Run will be the first business venture for 25 year-old Endres, who has five years brewing experience.
“I never release anything I haven’t brewed before or tested,” says Endres. “I think that the concept of beer, just like presentation of food, is important because it sets expectations for it.”
Within the next month, Crooked Run will also offer Thunder, an American pale ale, Nature’s Warden, an American brown ale and Summer’s Night, a raspberry dark saison.
Due to some unforeseen circumstances, Endres had to make changes to which brews will be available year-round. “I’m not growing as many hops as I planned,” says Endres. “My parents sold the property where I planted most of them but I still grow some.”
Endres says Crooked Run Brewing’s grand opening won’t be “for months,” but in the meantime, the brewery will still be open and catering to the average beer drinker and the craft beer aficionado alike. “[Crooked Run] will be a nice, pleasant environment where you can come with friends, relax and really enjoy beers you don’t typically find in supermarkets,” says Endres. / 205 Harrison St. SE, Leesburg. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.