text
stringlengths
8
5.77M
PUBLIC SERVANTS::An official report showed a large rise in government staffing costs in a number of regions due to administrative changes, hiring and promotions Sun, May 12, 2013 - Page 3 Public-sector staffing costs in Taoyuan County and all special municipalities except Taipei have skyrocketed by NT$9 billion (US$302.7 million), and have become a serious drain on the national coffers, a report from the Ministry of Civil Service said. The ministry’s report, submitted to the Examination Yuan on Friday, said expenditure on personnel in New Taipei City (新北市), Greater Taichung, Greater Tainan, Greater Kaohsiung and Taoyuan County — which is set to be upgraded to a special municipality next year — had all increased in comparison with figures from 2010. The report, titled: Changes to local organizations before and after elevation to special municipality status, said Greater Taichung has seen the greatest rise in staffing costs, with an increase of NT$3.7 billion. Comparing this year with 2010, the ministry said that New Taipei City had added 1,253 staff members, 196 police and firefighters, and 314 part-time workers to the payroll while removing 458 elected local representatives. Greater Taichung employed an additional 551 staff members and 36 part-time workers, but dismissed 229 police and firefighters, and 322 elected local representatives, the ministry said. The report added that Greater Tainan had employed an additional 284 staff members, 56 police and firefighters, and 77 part-time workers, while dismissing 374 elected local representatives. Taoyuan County added 972 staff members, added 56 members to its police and fire departments, and hired 77 part-time workers while dismissing one people’s representative, the ministry’s report said. Despite the addition of 194 police officers and firefighters, Greater Kaohisung, in comparison to 2010, had seen no increases to overall personnel numbers as it had dismissed 318 staff members, 355 people’s representatives and 377 part-time workers. The ministry said that while each special municipality is allowed to add a maximum of 12,000 new staff to their payrolls, the ministry’s restrictions — in place for the first three years after the municipalities were set up — have ensured that the special municipalities only added 3,174 full-time personnel by the end of last month, with another 1,692 in expectation of employment. Dismissing county commissioners, township mayors and township representatives meant a decrease of 1,510 elected local representatives across the board, the ministry said. The ministry said changes to the way that organizations are administered, such as nurseries that were under local government jurisdiction in 2010, but have since been moved under the jurisdiction of local education development foundations, were another cause of increased personnel numbers. Citing the example of nurseries, the ministry said there were only 1,311 nursery staff allotted in 2010, but after the creation of the municipalities more than 4,400 employees had been hired. The ministry added that the rising personnel expenditures were due to an increase in employee numbers and a number of promotions. In response to the report, Greater Taichung Deputy Mayor Huang Kuo-jung (王國榮) said the reason for the sharp increase in employee numbers was that it only started acquiring all the personnel it needed after its elevation to special municipality status. By contrast, Taipei City and Kaohsiung had already been special municipalities prior to 2010, and New Taipei City had been deemed a special municipality in all but name prior to its official elevation in status, Huang added. The nation has five special municipalities: New Taipei City (formerly Taipei county); Greater Taichung (the merged Taichung county and city); Greater Tainan (Tainan county and city); Greater Kaohsiung (Kaohsiung county and city); and Taipei City.
http://ukulele.io/wp-content/uploads/2016/03/Struggling-with-strumming.png6071023Jenny Petershttp://ukulele.io/wp-content/uploads/2015/08/logo.pngJenny Peters2016-03-12 04:25:352017-11-26 13:29:07Struggling with Strumming? How to Develop a Sense of Beat on Ukulele Our new book 21 Songs in 6 Days:Learn Ukulele the Easy Way gives the learner several practical tips in learning new skills. One such skill is changing chords. And one of the most important changes to learn is from G7 to C 0 The video shows Jenny teaching how to move the left hand fingers from the easy shape of the C chord to the more difficult shape of the G7 chord. Practice along with the video, so you can become skilled at this progression. Having a strap really helps! When I started to learn more complicated left and right hand patterns, the strap keeps the ukulele in place, which makes it easier to move around on the instrument. I got a ukulele thong, because I did not have an end button on my soprano ukulele. They can be hard to find, but I called Music Works in El Cerrito, California to order one. http://www.ecmusicworks.com/ . Classical guitarists also use these types of straps, so the Guitar Center can order one for you. I’ve been working on holiday songs to sing and teach at school: “Let It Snow” and “Winter Wonderland.” Both songs have a lot of changes and fairly complicated strumming patterns. I also want to include a ukulele solo section with finger picking in the main part of each song. Well, I’ve learned where some of the higher notes are on the ukulele, some bar chords and some movable chords. I’ve also learned some more complicated strumming patterns with chunking and coordinating all of these techniques with singing. I practice at home with an accompaniment track I created through Band In A Box, and have gradually gotten better at the songs. I would recommend a strap for a ukulele. I also play and teach violin. I would compare the ukulele strap to using a shoulder rest on the violin or viola. Without one, you can still play, but it is difficult to shift or do vibrato, unless you are already quite accomplished. Why not make it easier for yourself, and buy a ukulele strap? http://ukulele.io/wp-content/uploads/2015/08/logo.png00Rebecca Bogarthttp://ukulele.io/wp-content/uploads/2015/08/logo.pngRebecca Bogart2013-11-15 10:00:002016-02-26 04:12:40To Strap or not to Strap In his recent book, The First 20 Hours: How to Learn ANYTHING Fast, Josh Kaufman describes how he mastered and performed a four chord song on the ukulele in a very short time. I forget whether it was one week or two weeks, but his performance definitely fell under the heading ‘rapid skill acquisition’, which is his phrase for learning new things quickly. But although Josh can learn a four chord song really fast, can you? Well my answer is unfortunately rather vague : it depends. It depends on your previous musical background and your practicing skills. But I think the more important question is, why not go ahead and TRY to learn some ukulele in 20 hours? What have you got to lose other than some free time? One thing Josh is definitely right about is that it matters a lot exactly how you spend your 20 hours of practicing. Josh certainly has learned more skills rapidly than I have, but I have spent thousands more hours watching beginners tackle new musical skills than he has. So, I thought I’d do a series of posts about my personal take on how his principles of rapid skill acquisition how apply to learning ukulele. I’ve organized my thoughts by using some of the principles Josh presents in his book. You might enjoy reading the book as you start working on ukulele – but DON’T compare your progress to his. Josh was anything but a musical beginner when he started learning ukulele – he already had experience singing in a choir, and with the ukulele’s two handed strum/chord coordination, because he had previously played some guitar. So here goes: key concepts numbers one and two. Make time to practice The time you spend practicing ukulele must come from somewhere else in your schedule. You will not “find” time in a big pile under a bush somewhere. We all are allotted 24 hours per day. Some you must dedicate to work, and some to caring for yourself or loved ones. The hours that remain are what you have left to learn the ukulele. You must take a hard look at your schedule and see if you can eliminate other activities that are less important to you than learning ukulele. Another important fact about learning something new is the more time you spend working on it each day, the fewer days it will take to learn. And the faster you get good at ukulele, the more you will enjoy it. The enjoyment will make it easier to choose ukulele practice over, say, watching TV or cruising Facebook. Make starting easy If possible, create a space where you can keep your gear set up so that you can get started quickly when practice time rolls around. Failing that, try to store your gear to minimize setup time. Concert pianist Robert Henry likes to stress the importance of what can be accomplished in short bursts of practice (2-3 minutes). But if you have to spend 20 minutes finding your ukulele and folding the laundry on top of it before you start, you might burn up all your available practice time before you start. What do you think? Have you been able to make quick progress on the ukulele or other musical instruments? What seemed to be the key factors for you? Next post: Overcoming emotional blocks to learning, what to do about pain or discomfort. In my last post, Can You REALLY Learn Ukulele in 20 Hours?, I talked about some of the principles of ‘rapid skill acquisition’ presented by Josh Kaufman in his recent book, The First 20 Hours: How to Learn ANYTHING Fast. I looked at how important it is to create time to practice by weeding out other activities that are less important, and the importance of making it easy to get started practicing. In today’s post, let’s look at 3 more key ideas about learning something fast, or at least in the most efficient way possible. Plan Ahead to Block Distractions After you’re done creating a place where you can store your ukulele and associated gear for easy access, put some attention on how to block distractions before they start. It’s best if your space can be free of noise (if that distracts you), and requests for attention from family, pets, and electronic family/pets such as your smart phone, tablet, or computer. Since the ukulele is portable, maybe your practice space can be physically distant from potential distractors. If the distracting items have on/off switches or volume controls, use them! Unfortunately this doesn’t work on cats, but I do have Clare the Cat trained to curl up and sleep on the chair next to me when I am practicing. When necessary, I reinforce training with additional dried bonito flakes. See Clare in action with ukulele playing here. Maybe you can do your practicing when family members are away, concentrating on their own activities, or asleep. You probably can’t train them with dried bonito flakes, but there might be other “treats” that can be negotiated. Plan How to Overcome Emotional Blocks In my almost 40 years of piano teaching experience, adult music learners often have unrealistically high expectations of how fast they ‘should’ progress. (Children are used to beginning new skills and tend to be less judgmental.) Adults also sabotage themselves by comparing themselves to others (sometimes real, more often imaginary), who are of course doing better than they are. Finally, everyone has a different learning style and background, so things that are easy for one person may be difficult for another. As a teacher, I can definitely say I have NEVER had a student for whom everything is easy. Even the most brilliant players had to work hard at something, and the ones that improve the most quickly are those who work the hardest and who are the most patient and positive. Tell the negative voice in your head to be quiet so you can concentrate. It is irrelevant whether you are learning faster or slower than someone else, because learning is not a race: hopefully it never ends, and you’re not in it for the prize money anyway. Sometimes it is helpful to find a supportive other; maybe there is a friend or family member who can cheer you on. There also are a lot of great ukulele groups on Facebook and Google+ where people encourage each other and ask for help and advice. In the final post of this series, we’ll talk about how to approach any discomfort or tension that might show up while you’re practicing. I’d love to hear from you. What is your practice space like? What do you like about it? Have you had to overcome any emotional blocks on your path to ukulele ninja-ism? How did you do it? Any tips for others?
Laminitis Possibly the most feared of equine disorders, laminitis is recognised in two basic forms that we will describe as “impact” and “toxic”. Laminitis is the inflammation of the “laminæ” that bind the hoof capsule to the coffin bone. In mild cases it is just painful; in severe cases the capsule detaches from the coffin bone and rotates around the bone – often incorrectly described as “coffin bone rotation”. Laminitis can affect just the front hooves; it is usually more acute and/or severe forms that affect the rear hooves as well. Laminitis very rarely affects just the rear hooves. Defining laminitis Impact laminitis is as a result of overexposure to high impacts of the hoof and is essentially severe bruising resulting in inflammation. Toxic laminitis, is in most cases a “luxury” illness; in general confined to horses that are considered “well looked after”, this form of laminitis all to frequently results from confinement and an unsuitable diet. In a few cases, it is the result of the horse being unintentionally exposed to an unsuitable diet (for example, the horse that escapes its field and ransacks the neighbour’s supply of chicken feed!). Medicines can also trigger laminitis, the best known being certain anti-inflammatories (NSAIDs), often given in order to prevent laminitis. It should be noted that usually it is not the NSAID alone that is the cause but rather the combination with confinement that is often prescribed concurrently. Another trigger can be pregnancy and birth. A mare in foal has a raised chance of developing laminitis due to the “foreign body” that she is carrying and its inherent toxins. If, after the birth, the placenta is not fully ejected, this too can cause a laminitic reaction. As with most other forms of toxic laminitis, the mare in foal is most at risk when confined and exposed to an unsuitable diet; on the other hand, the incomplete ejection of the placenta is a risk associated with birth. Finally, PPID (Pituitary Pars Intermedia Dysfunction, formerly known as Cushing’s Disease) can also play a role in toxic laminitis; the horse becomes insulin resistant resulting in similar symptoms to the “sugar overload” seen in horses on an unsuitable diet. It is hypothetically probably that PPID falls into the category of “luxury illnesses”. The cause of PPID is quite probably dietary and is little more than an irreversible sugar overload later in life. Defining definitions There is often misunderstanding when describing the onset and severity of laminitis. There are three words that seem to cause a lot of confusion:Acute : this simply describes the rapid onset of an illness (often within hours) and is no indication of severity.Chronic : again, a time reference, chronic describes something long term or repetitive and is also not indicative of severity.Severe : what it says on the packet…but not connected with the rapidity of onset nor length of illness. The opposite of severe is mild. Identification Laminitis can be difficult to indentify initially. If the onset is not acute, the horse may initially appear to be just slightly lame; however, this lameness will affect both hooves – rarely is lameness on just one side an indication of laminitis. This lameness will get progressively worse and the horse will start to adopt a stationary pose that avoids putting any pressure on the front feet. Treatment Laminitis is not easy to treat which is probably the reason why in the past so many horses were put down fairly soon after diagnosis. Even today, many horses are put down on the advice of the vet because the condition does not appear to be improving, or even at times, appears to worsen. Even when caught early, laminitis can be very destructive of the hoof structures; clearly prevention is vastly preferable to cure. But it can be treated; but not in the way most veterinary specialists would propose these days. There is a very strong urge to confine the horse to a box, to restrict its movement, and to apply either egg-bar or inverted/reversed shoes to alleviate the effects of “coffin bone rotation”. Since the horse is likely to be in too much discomfort for it to want to move any distance, confinement is both pointless and counterproductive. By isolating a horse in discomfort, one is adding to its problems psychologically. In addition, by confining the horse to a stable, its hooves are subjected to a degenerative environment of excreta and should perforation of the sole happen, this is most certainly the last place the horse should be. Furthermore, the toxins causing the inflammation that are now present in the hoof need to be flushed which can only happen with good circulation; confining the horse severely restricts circulation. The application of any sort of shoe displays a complete ignorance of the hoof, its mechanism and its function. Even for those practitioners who consider the coffin bone to be suspended inside the hoof capsule, it should be plainly obvious that the laminitic hoof, where the hoof capsule and the coffin bone are becoming separated, cannot in any way support the weight of the horse. And yet these people insist on applying “orthopædic” horseshoes (a nonsense term worthy of Lewis Carroll). Thus, it should be clear that the initial way to proceed is to remove horseshoes, if they are present, and to turn the horse out. However, it must be noted that the horse should not be turned out to rich pasture; if there is a high sugar content in the grass, then this will probably continue to affect to hoof and exacerbate the problem. Short, well cropped grass is a more viable alternative which ensures the horse has food but is encouraged to move to find it. Both movement and the small amount of food will be advantageous to the horse. Do not restrict the horse’s diet and do not feed commercial feed. Only grasses and hay. Ensure that the hooves are trimmed such that the caudal structures (the “heels”) are lowered to a minimum – this is best done over a number of days rather than in one fell swoop – and the hoof wall is not carrying the weight of the horse. The latter is one of the major bones of contention with the traditional veterinary/farriery world; the hoof wall is not a weight bearing structure even in the healthy hoof so loading it when the hoof is unhealthy, and particularly when its connection with the underlying coffin bone is so weakened, is only going to worsen matters. The horse must be kept under semi-permanent supervision to ensure it gets enough movement and the hooves must be trimmed frequently (as often as possible) to keep ahead of the damaging effects of the inflammation. Recovery This can be long and slow. Even with horses that have been caught in the early onset of laminitis, sufficient damage can have been done to complicate the healing process. In simple terms, the hoof wall must regrow to follow the line of the coffin bone (the hoof wall cannot “reattach” to the coffin bone, only new growth is attached). Generally this process takes up to a year (the length of time needed to grow a complete new hoof) but, depending upon the severity of the laminitic attack, it can be complicated by the formation of abscesses and by the rebuilding of the internal structures of the hoof which in turn can lead to deformations particularly of the sole. It is a process that can take more than two years before any real signs of recovery are evident. Prevention Obviously prevention is not so easily applicable to accidents – the horse escaping and devouring next-door’s grain store springs to mind. But in almost all other situations, it is quite possible to avoid – even impact laminitis. A shod hoof cannot absorb impact with the ground in the way that is intended and this can cause concussive impact damage. Asking an unshod horse to gallop over a stony or rocky path will similarly subject the hoof to abnormal stresses. The answer here is obviously never to shoe a horse and never ask the horse to do something it would not normally do. Confinement in a stable reduces the horse’s movement and so also its use of sugars ingested. The majority of stabled horses are also fed a completly unsuitable diet – commercial feed with grain, cereals, molasses and other starches and sugars. This creates a sugar overload. In early spring these horses, that have often been kept confined for the whole of the winter, are turned out to sugar rich pastures – pushing the sugar overload over the top… The answer here is firstly that horses should never be confined to stables – not even for a part of the day; secondly they should not be fed anything other than grasses and, at times of shortage, hay; thirdly, rye grasses and other high-production grasses should be avoided – these are particularly intended for cattle to increase both milk and meat production at the cost of their general health (laminitis is well known among cattle too); fourthly, horses should not be overfed during the winter months. This last point is always highly controvertial among horse owners; the general equine population, like its human counterpart, is overweight and for some reason, we seem to “prefer” our horses to be overweight. Most people, including animal welfare organizations, don’t know at what point a horse becomes overweight – the two body score indices in use, the various five-point scales and the Henneke nine-point scale both put the healthy horse too far up the scale! The reason for not overfeeding in winter is quite simple and very natural. This is how the horse has evolved and by reducing food intake during the winter, the insulin resistance cycle is broken. This cycle involves ingestion of sugars during the growing months whereby the sugar levels in the body increase; with the onset of winter, the amount of sugar ingested is significantly reduced allowing the body to “reset” and start all over again the following spring. The horse that continues to eat at the same rate during the winter does not get this essential reset and so, in the spring, the increased sugars just go piling on top of an already overloaded system. Feeding commercial foods – at any time during the year – just adds yet more to the overload. Correct treatment of suspected laminitis will also go toward prevention; avoiding administration of NSAIDs, application of horseshoes or confinement are three very important factors sadly ignored by the mainstream veterinary profession. The mare in foal should, as with any other horse, never be confined to a stable. She should be allowed to roam in as large a space as possible with her companion horses and not isolated as if she was ill. This in itself will be sufficient to greatly lower the chance of laminitis but to eliminate it more or less completely, the mare should not be fed commercial feed, just grasses and, when grasses are scarce, hay. She does not need feeding up with anything unnatural. The incalculable risk moment for the mare in foal is post partum – when in fact, she is no longer in foal; if the placenta is not fully ejected this can cause a toxic reaction; it is therefore essential to check that the placenta is complete after the foal is born and if at all in doubt, call your vet out.
Quality of life and psychological well-being of colorectal cancer survivors in Jordan. Colorectal ranked first among cancers reported in males and ranked second amongst females in Jordan, accounting for 12.7% and 10.5% of cancers in males and females, respectively. Colorectal cancer patients can suffer several consequences after treatment that include pain and fatigue, constipation, stoma complications, sexual problems, appearance and body-image concerns as well as psychological dysfunction. There is no published quantitative data on the health-related quality of life and psychological wellbeing of Jordanian colorectal cancer survivors. This project was a cross-sectional study of colorectal cancer survivors diagnosed in 2009 and 2010. Assessment was performed using the European Organization for Research and Treatment of Cancer Quality of Life Questionnaire (EORTC QLQ-C30), the colorectal cancer specific module (EORTC QLQ-CR 29) and the Hospital Anxiety and Depression Scale (HADS). Data on potential predictors of scores were also collected. A total of 241 subjects completed the study with mean age of 56.7±13.6. Males represented 52.3% of study participants. A majority of participants reported good to high overall health; the mean Global health score was 79.74± 23.31 with only 6.64% of study participants scoring less than 33.3%. The striking result in this study was that none of the study participants participated in a psychosocial support group; only 4 of them (1.7%) were even offered such support. The mean scores for HADS, depression score, and anxiety score were 8.25±9, 4.35±4.9 and 3.9±4.6, respectively. However, 77.1% of study participants were within the normal category for the depression score and 81.7% were within this category for anxiety score; 5.4% of participants had severe anxiety and 5.4% of them had severe depression. Patients with colorectal cancer in Jordan have a good quality of life and psychological wellbeing scores when compared with patients from western countries. None of the colorectal cancer patients managed at the Ministry of Health received any formal counselling, or participated in psychological or social support programmes. This highlights the urgent need for a psychosocial support programme, psychological screening and consultations for patients diagnosed with colorectal cancer at the Ministry of Health Hospitals.
Q: php cURL post data to remote server not working I'm trying to send data via cURL post but I've never tried it before and I don't know if I'm doing it right. What I want to do is sent a file via post to a file from my remote server and there read the file and insert data into database but unfortunately it's not working and error_log doesn't show me anything. My code looks like this: $ch = curl_init(); curl_setopt($ch, CURLOPT_URL,"https://".$host."/file.php"); curl_setopt($ch, CURLOPT_HEADER, false); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); curl_setopt($ch, CURLOPT_POST, true); curl_setopt($ch, CURLOPT_POSTFIELDS, array( 'file' => '@'.realpath(../path/to/file/'.$_POST['file_name'].'.txt'), 'action' => 'first', 'check' => $_POST['file_name'], )); $result = curl_exec($ch); curl_close($ch); This code is placed after some sql querys and code made to write this sql results into the file that I'm trying to send. A: Here is the Answer by Shakir Khan you Should follow: PHP: upload file from one server to another server - Stack Overflow OR you should read PHP Documentation carefully there is a huge amount of CONSTANT availabe to use: curl_setopt
Health Library Health Resources Health Encyclopedia A Child's Concept of Death For infants and toddlers, death has very little meaning. School-aged children begin to understand death as permanent, universal, and inevitable. A predominant theme in adolescence is a feeling of immortality or being exempt from death. Discussing Death with Children The ultimate goal in discussing death with a dying child is to optimize his or her comfort and alleviate any fears. If the child is not ready to discuss death, the most helpful step parents can take is to wait until he or she is ready. Anticipatory Grief Anticipatory grief is similar to the normal process of mourning, but it occurs before the actual death. The Dying Process Understanding the physical and mental changes the body goes through as death occurs, may help alleviate some fears and misconceptions about death. Grief and Bereavement The process of grieving is often long and painful for parents, siblings, relatives, friends, peers, teachers, neighbors, and anyone that understands the loss of a child. Physical Needs of the Dying Child A terminally ill child has many of the same needs as any seriously ill child, including a routine for sleep and rest, and for pain management. For Parents: Important Decisions to Be Made in the Dying Process Detailed information on important decisions to be made when a child is dying, including the right to refuse treatment, to die at home versus the hospital, advanced directives, do not resuscitate, autopsy, organ donation, palliative hospice care, and funeral arrangements.
Dinagat Sound Dinagat Sound is an arm of the Philippine Sea that separates the islands of Dinagat and Siargao, in the northeastern portion of Mindanao in the Philippines. Category:Sounds of the Philippines Category:Landforms of Dinagat Islands Category:Landforms of Surigao del Norte
Foods to Avoid Extreme Measures The US has the fattest population of all time!! Around two thirds of the population is overweight or obese. At ObesityEpidemic.Org, we are here to educate, legislate, and reverse the fattening up trend. Please feel free to exchange ideas or suggestions by emailing : admin@obesityepidemic.org Poodle Exercises Have you ever wanted to know how poodles exercise. Here is a crazy video showing you how to get some aerobic exercise.
IRS, Internal Revenue Service – the tax authority in the United States has sent out notices to thousands of cryptocurrency owners. It’s a standard letter sent to most of them and termed as Letter 6173, 6174 or 6174-A. It includes clear instructions on what has to be done in various scenarios. Letter 6174 This letter informs about a likelihood that you did not report your virtual currency transactions, asks you to check the return and, if necessary, file an amended return to correct this misreporting. You are not required to respond to the notice and the IRS does not intend to follow up on these notices. Letter 6174-A As in Letter 6174, this letter tells you that there is a potential misreporting of virtual currency transactions. However, this notice states that the IRS may follow-up with future enforcement action. Again, no response is required if the taxpayer believes that they are in compliance. However, receiving this letter means you have been identified as a noncompliant taxpayer for potential future enforcement. Letter 6173 This letter requests a response from the taxpayer about the alleged noncompliance. The letter provides instructions on responding to the IRS. The IRS intends to follow up on these responses to determine if the taxpayer is in compliance. Each of these letters has instructions on how to respond and the sections to be filled on amended returns were clearly mentioned in different situations like trading, investing, receiving, transactions etc., Summary & Action required If you received IRS Letter 6174-A in the mail recently, you’re not alone. The IRS is sending the letter to thousands of US taxpayers across the country. Letter 6174-A is probably being sent to most Coinbase customers, not just suspected tax cheats, according to Forbes article All of this boils down to an important point: you might receive IRS Letter 6174-A even if you accurately reported all of your cryptocurrency-related income. In that case, don’t panic. You likely received the letter just by nature of having a Coinbase account IRS Letter 6174-A specifically says that no response is necessary if you already reported your cryptocurrency income. So, don’t stress about calling the IRS or replying to the letter to tell them your tax return is already correct. This letter could probably be a part of a blanket mailing campaign to any individual the IRS knows has a cryptocurrency trading account. This would include over14,000 Coinbase users identified in the 2017 summons, taxpayers who receive a 1099 from US based crypto exchanges. Extract from 6174 Following is the extract from Letter 6174 (06-2019) Catalog Number 72273Z as received from IRS. Middle page of IRS Letter 6174 explaining various sections to be filled on your tax return You must report virtual currency transactions your return, regardless of whether you received a payee statement for the transaction (such as a Form W-2, Form 1099, etc.). Common schedules for reporting virtual currency transactions include the following: Schedule C If you were an independent contractor and received payment in virtual currency, you must report it in gross income for the amount of the virtual currency’s fair market value, measured in U.S. dollars, as of the date and time you received the virtual currency. Gross income derived by an individual from a trade or business carried on by the individual as other than an employee is reported on Schedule C. This constitutes self-employment income and is subject to the self-employment tax. For more information, you can refer to the instructions for Schedule C. Schedule D If you sold, exchanged, or disposed of virtual currency (e.g. Bitcoin, Ether), or used it to pay for goods or services, you have engaged in a reportable trånsaction and may have a tax liability. These transactions may be reportable on Schedule D. on the tax return, report the virtual currency received at its fair market value, measured in U.S. dollars, as of the date and time of the transaction. You should maintain and review all transaction records, including bank, wallet, and exchange reports and statements to determine your basis, the amount received, and other information needed for reporting on Schedule D. For more information, you can refer to the instructions for Schedule D. Schedule E If you received supplemental income in the fo of virtual currency, including income from rental real estate, royalties, partnerships, S corporations, estates, trusts, and residual interests in REMICs, you may need to report this on Schedule E. On the tax return, report the virtual currency received at its fair market value, measured in U.S. dollars, as of the date and time of the transaction. You may also need to file supplemental forms .g. Form 8582, Passive Activity Loss Limitations). See the instructions for Schedule E for any other circumstances that may apply. For more information, you can refer to the instructions for Schedule E. Additional Resources Publication 17, Your Federal Income T (For Individuals) Instructions for Form 1040, U.S. Indivi ual Income Tax Return Instructions for Form 8949, Sales and O er Dispositions of Capital Assets Instructions for Form 1041, U.S. Incom Tax Return for Estates and Trusts Letter 6174 (06-2019) Catalog Number 72273Z What’s the takeaway? Other two letters also contain similar information on what to be reported and how it has to be reported. Report Gains or Losses It is important for you to report your gains or losses from cryptocurrency trading, mining, staking and all other scenarios. Carry forward your capital losses This will also help sometimes if you had losses as they can be claimed up to $3000 and can be carried forward for the following tax year. Use crypto tax software and avoid mistakes Getting your transactions across exchanges, DeFi platforms, wallets is not an easy task. Having prices for every coin across the years and every minute is hard. Tax software like BearTax can help you in this scenario. Using such software will not only reduce your effort but also provides accuracy and an audit trail. It also provides you auto-generated tax documents like 8949 capital gains document and export to your favorite tax software like TurboTax Online or TaxAct. If you have any questions, please join our Telegram group or tweet us @bear_tax. Read reviews about BearTax on Facebook. Follow us to get updates on cryptocurrency taxation
Use of Smartphones have been increasing at an exponential rate across the modern world. Mobile applications have become an imperative part of mobile devices. A major population of the contemporary world is making use of several mobile apps for their everyday functions; mobile app development is considered a very critical process. Amid myriad mobile apps that are built and deployed, only a selected few succeed in gaining popularity with users and sustaining repetitive visits by them. It is those apps which solve specific problems of users and offer appropriate solution to the unique needs of users that finally succeed. To be able to come up with such winning apps, developers and entrepreneurs need to understand user behavior analytics and the information gathered from it. Significance of User Behavior and Personality Traits Understanding details such as who the target user of a conceived app is and their preferences and requirements is inevitable in building and delivering a successful app. Developing mobile apps is not like creating a piece of software. In order to come up with successful apps, you need to focus first on resolving the problem of a set of users. To be able to provide the solution, you must understand the target population at a granular level. Users’ behavior and personality traits play a vital role in developing a mobile app that attracts and retains users. One way of discerning these factors is by checking the users’ choice of their Smartphone. Choice of platform among the two major players, namely, iOS and Android which are different in several ways, speaks a lot about users’ specific interests and behaviors. This choice indicates important factors such as whether users are concerned about pricing, whether they take interest in downloading, if they are prepared to pay a price for the app, whether they are loyal to some specific brand or not. A Glance at the Contemporary Mobile Operating System Market Studies have clearly shown that iOS and Android put together account for over 99% of the total market share. While iOS users are found to be more willing to pay for apps than Android users, the number of targeted audience in Android is considerably more. Android app development companies and iPhone app development companies need to first decide which section of users they wish to target. If more number of users is the aim of the business organization or the app development company, then Android proves to be the best platform. On the other hand, if the intention is to earn money from the app, iOS platform must be the first choice. A Peek into the User Behavior Factors that Impact Mobile App Development Users’ preferences and behavior are representative of their idea about the mobile device as well as applications. By running user behavior analytics in a professional manner, developers and the mobile app development companies may arrive at the right decision about choosing their app development platform. Market Share of Operating Systems: Android platform is seen to take up nearly 64% (two-thirds) of the mobile users market. While iOS app store includes over 2 million apps, Google Play Store has more than 3.5 million apps. Android platform is seen to take up nearly 64% (two-thirds) of the mobile users market. While iOS app store includes over 2 million apps, Google Play Store has more than 3.5 million apps. User Preference: While building a mobile app, entrepreneurs and mobile app developers need to consider and understand clearly the interests and choice of users. It is to be noted here that iOS and Android have to be used for targeting entirely different group of users. While iOS is for users who can spend money easily to buy apps, Android is meant for people in the lower middle income group. If acquiring customer base is your agenda, you need to go in for Android while for revenue generation, iOS is the best bet. While building a mobile app, entrepreneurs and mobile app developers need to consider and understand clearly the interests and choice of users. It is to be noted here that iOS and Android have to be used for targeting entirely different group of users. While iOS is for users who can spend money easily to buy apps, Android is meant for people in the lower middle income group. If acquiring customer base is your agenda, you need to go in for Android while for revenue generation, iOS is the best bet. The Role Played by Device Capabilities: Smartphone users view their devices in a personal way. The difference in operating systems has a direct bearing on the user experience. This is one factor that influences choice of a particular OS by users. Apple’s iOS has stringent regulations for push notifications, timeframe for system updates and app submissions. In the case of Android, submission of apps may be performed freely and in customizable manner. Smartphone users view their devices in a personal way. The difference in operating systems has a direct bearing on the user experience. This is one factor that influences choice of a particular OS by users. Apple’s iOS has stringent regulations for push notifications, timeframe for system updates and app submissions. In the case of Android, submission of apps may be performed freely and in customizable manner. User Demographics: It is well known that Android has more market share than iOS. Good user experience under affordable pricing is the main reason for this. Users’ preferences and spending habits play a vital role in deciding about which platform to make use of. Income and location are a few crucial factors that need to be considered while creating a mobile app. It is well known that Android has more market share than iOS. Good user experience under affordable pricing is the main reason for this. Users’ preferences and spending habits play a vital role in deciding about which platform to make use of. Income and location are a few crucial factors that need to be considered while creating a mobile app. Personality: Android users tend to be more thoughtful in contrast to iOS clients who are seen to be more of outgoing individuals. While iOS users prefer to be leaders, Android clients display humility and honesty and tend to be comfortable being followers. Personality differences are indicators of the types of apps preferred by users. Android users tend to be more thoughtful in contrast to iOS clients who are seen to be more of outgoing individuals. While iOS users prefer to be leaders, Android clients display humility and honesty and tend to be comfortable being followers. Personality differences are indicators of the types of apps preferred by users. App Engagement and Retention: One of the key factors that impacts the success of the mobile app, is considering the app engagement and retention while planning to build the app. It is common that iOS users are more likely to be engaged with apps and they also usually have higher retention. Android users being not so consistent with app engagement, developers have to face the challenge of building apps that enhance retention rate. One of the key factors that impacts the success of the mobile app, is considering the app engagement and retention while planning to build the app. It is common that iOS users are more likely to be engaged with apps and they also usually have higher retention. Android users being not so consistent with app engagement, developers have to face the challenge of building apps that enhance retention rate. Users’ Spending Tendency: Although the once large gap in consumer spend between Android and iOS users is witnessed to have become smaller, iPhone users are still making more purchases when compared to Android users. While iOS provides opportunities for generating revenue through paid apps, Android apps are seen to draw revenue from mobile advertising. Although the once large gap in consumer spend between Android and iOS users is witnessed to have become smaller, iPhone users are still making more purchases when compared to Android users. While iOS provides opportunities for generating revenue through paid apps, Android apps are seen to draw revenue from mobile advertising. Choosing the Right Platform for Your App: With each platform having its own specific characteristics and benefits, thoughtful consideration must be given to the most important factor that influences the success of the app ultimately, namely, the user. An efficient iPhone app development company must understand the needs of users and their problems at ground level and perform diligent user behavior analytics to be able to provide the perfect solution to users. Depending on the purpose and objectives of the mobile app, developers and mobile app development companies need to choose the appropriate platform that helps monetize the mobile app in an efficient manner. The decision should be fruitful for not only the business organization but also the user.
Assam leads in urban green cover - Forest Survey of India report stresses the need of trees in cities ROOPAK GOSWAMI Guwahati, July9: Assam has 128 square km of urban tree cover, way ahead of other states of the Northeast, the Forest Survey of India (FSI) has revealed in the state of forest report released yesterday. This is the first time that the FSI has done a study on urban tree cover in the country as greening of urban landscape is one of the important measures to mitigate some of the problems of urbanisation. Trees grown in urban areas have contributed significantly in cleaning the environment but also in fulfilling the timber and fuel wood requirement of poor people living in cities. “Urban trees and forests can contribute immensely to the quality of life in towns and cities. Urban forest is one of the resources of an urban area, it is part of its infrastructure and is integral to the quality of life of its residents,” the report stated. Environmental services of urban forests are climate and air quality improvement, energy saving, reduction of global warming and carbon dioxide, noise abatement, soil conservation and others. In this survey, all trees recorded in urban area and outside the forest area have been considered. Trees with more than 10cm diameter have been included in the survey. A senior forest official said the issue needs a detailed study as it would be difficult to tell how Assam has done in planting trees in its urban surroundings as compared to other cities. “Enough importance has been given to planting trees in urban areas of the state to protect the environment,” another official said. Encroachment of reserve forests and hills in Guwahati has forced the department to go for massive planting of trees, using younger children as agents of change. During Environment Day celebrations in the Northeast, many initiatives are taken to encourage people to plant fruit-bearing trees. Welcoming the emphasis on urban tree cover by the FSI, Simanta Kalita, programme co-ordinator of the Centre for Environment Education, Guwahati, said as urban forestry is important there has to be a planned programme on planting trees in urban areas. “We can identify some old trees in Guwahati and conserve them,” he said, adding that certain areas can be earmarked so that these can be made into “green lungs” of the city. Meghalaya principal chief conservator of forests Sunil Kumar said the department has been trying to increase the green cover in urban centres, particularly in the state capital. However, he lamented that in view of the increased built-up area in the state capital, space for planting more trees has become scarce. In contrast, a semblance of greenery is conspicuous in places like Tura and Jowai, although these urban centres are also expanding both in terms of human population and infrastructure. Kumar said the department would soon carry out a survey to identify pockets, which could be converted into “green lungs” in the urban areas. “We will first start with Shillong, and then move on to other places,” he added.
News City patrolman Cody Bradford is shown with newly acquired technology equipment was installed less than 10 days in his patrol unit. The equipment is already proving its worth in both saving time for officers and saving the lives of citizens. A thermal imaging device helped to locate a 90 year-old man who walked away from a recreational vehicle park. See the July 3 edition of the Mount Vernon Optic-Herald for more details about this new equipment.
Q: I need clarification on Apache2, MPM-Worker, FastCGI, PHP5-fpm, suEXEC? My current configuration is: Apache2 + MPM-Worker AND FastCGI + PHP5-fpm (PHP 5.3.2) ON Ubuntu 10.04 LTS I have a single pool of 2-5 processes running as a different user from that of the default www-data. FastCGI/PHP5-fpm is configured as an external server via FastCGIExternalServer I know that I can setup multiple pools running as different users ... But, I want to know if it is possible to use suEXEC in this type of setup? And, could it be setup with just a single pool? If so, how? A: As of now, It is not possible to run a script as anything other than the user defined in the FPM pool. You would need to setup a different pool and define the other user/group. Is there some reason you can't or don't want to create separate pools? EDIT: If you are worried about wasting idle resources, there is some talk about creating an "ondemand" feature for fpm-pools, that would essentially "fire up" the pool when it gets requests: http://groups.google.com/group/highload-php-en/browse_thread/thread/753ddceff2ef0411/8ebaddeec4f676f0?lnk=gst&q=idle+pool#8ebaddeec4f676f0 I highly recommend the highload-en php google group "...for discussing php, FastCGI, php-fpm and all technologies around for use in high loaded environments." http://groups.google.com/group/highload-php-en?lnk=srg
It should appear to us clearly by now that inheritance is useful by allowing us to use an object that was already created but "upgrade" it with new features that were not available when the original object was born. In most cases, when creating a class, you may not thing that other classes would be inherited from it. In fact, this will usually not be your concern: you simply create a class and use it as needed. In some other cases, rather as you build your experience with Visual Basic. You may create a class that, although useful at the time, you may already think of other classes that would be based on it. This means that, at the time you are creating such a class, you would already keep inheritance in mind. Visual Basic provides various features that can assist you with creating and implementing class with different goals in mind. Abstracting a Class Imagine that, when creating a class, you already find that it is too or highly generalized to serve one particular purpose. As an example, imagine you start creating a class you intend to use to process calculations for a rectangle, or a square, or a parallelogram, or even a triangle: Rectangle Square Parallelogram Triangle You start thinking that the same class could be used for different types of geometric shapes. In this case, instead of creating a different class for each shape, you can create a generalized class that these shapes can be based on. Unfortunately, these shapes, although each characterized as geometric, don't have much in common; otherwise they would not be different. One of their common characteristics is that each has a name. While the parallelogram and the triangle have a base, the rectangle and the square don't explicitly have one. Also, neither the perimeter nor the area of these shapes are calculated the same. Still, as long as you find at least one characteristic that these objects have, you can create a class that would share. In other words, you can create a class that features one or more characteristics that these objects have. Then each object would customize its behavior(s) based on its particular characteristics. This is the basis of abstraction. A class is referred to as abstract when it is only used to lay a foundation for other classes. In the Microsoft Visual Basic language, to create an abstract class, you must precede its Class keyword with MustInherit. Here is an example: File: Quadrilateral.vb Public MustInherit Class Quadrilateral End Class After creating a class and marking it as MustInherit, you can add one or more members to it, as done in the previous examples we used so far. Here is an example: File: Quadrilateral.vb Public MustInherit Class Quadrilateral Public Function ShowDescription() As String Return "Geometric Shape" End Function End Class If you create a class and mark it as MustInherit, it is considered incomplete. Because of that, although you can declare a variable of that type, you cannot initialize its instance using the New operator. Consider the following example: File: Exercise.vb This would produce an error because you cannot use New to instantiate a MustInherit class. This means that, before using a MustInherit class, you must derive a class from it. Overriding Members of an Abstract Class The main idea for creating a MustInherit class is to lay a foundation that other classes can exploit. When creating the members of such a class, you can prepare them to be overridden. You have the option of creating overridable and non-overridable members. You will make the decision based on your requirements. Sometimes when creating a particular member, you may intend all derived classes to implement their own version of the member. You must clearly indicate that any class that wants to inherit from the MustInherit class must (also) override a particular member. Such a member must be marked with the MustOverride keyword. To do this, when creating the member, precede its type with the MustOverride keyword. Here is an example: File: Quadrilateral.vb Public MustInherit Class Quadrilateral Public MustOverride Property Area() As Double End Class In the same way, you can add as many members as necessary. You will mark as MustOverride those of your choice and you can create others without MustOverride. Here are examples: File: Quadrilateral.vb Public MustInherit Class Quadrilateral Public Function ShowDescription() As String Return "Geometric Shape" End Function Public MustOverride Property Area() As Double End Class After creating a MustInherit class, you can inherit new classes from it using the Inherits keyword we saw in the previous lessons. Here is an example: Public Class Square Inherits Quadrilateral End Class When deriving a class from a MustInherit, the first rule you must observe is that each member of the abstract that was marked as MustOverride must be overridden. Based on this, in our Square class, you must (at least) implement the Area property. Here is an example: File: Quadrilateral.vb Public MustInherit Class Quadrilateral Public Function ShowDescription() As String Return "Geometric Shape" End Function Public MustOverride ReadOnly Property Area() As Double End Class Public Class Square Inherits Quadrilateral Public Overrides ReadOnly Property Area() As Double Get Return 0 End Get End Property End Class In the derived class, as a new one, you can add new members as you judge them necessary. Here are examples: File: Quadrilateral.vb Public MustInherit Class Quadrilateral Public Function ShowDescription() As String Return "Geometric Shape" End Function Public MustOverride ReadOnly Property Area() As Double End Class Public Class Square Inherits Quadrilateral Public sd As Double Public Sub New() sd = 0 End Sub Public Sub New(ByVal side As Double) sd = side End Sub Public Property Side() As Double Get Return sd End Get Set(ByVal Value As Double) If Value <= 0 Then sd = 0 Else sd = Value End If End Set End Property Public Overrides ReadOnly Property Area() As Double Get Return sd * sd End Get End Property End Class After deriving a new class from a MustInherit class, you can declare a variable of it and instantiate it using the New operator. Here is an example: These declaration and instantiation are legal but the (tri) variable gives you access only to members that are present in the parent class. This means that this declaration gives you access to the ShowDescription() method and the Area property of the Quadrilateral class. This is illustrated in the following: When instantiating a class derived from a MustInherit class, if you want to access its members, you must apply its name to the New operator as we saw in the last example of the previous section. Here is an example: In Lesson 5, we saw that a procedure was an assignment that complemented a program. We also saw that there were two types of procedures: functions and sub routines. These concepts of sub procedures and functions also apply to classes. This means that a procedure that process a class, it can be passed a class as argument, and it can return a class. As described in Lesson 8, to create a sub procedure, type the Sub keyword followed by a name, followed by parentheses and an end of line. To indicate the end of a sub procedure, you must type End Sub. Therefore, the syntax of a sub procedure is: SubProcedureName() End Sub Between the Sub and the End Sub lines, you can declare the necessary variables and they can be of regular types or based on classes. Here is an example: In the same way, you can declare as many class variables as you see fit in a procedure. Returning an Object So far, as we have learned since Lesson, we know that a function can be used to return a value. In the same way, you can create a function that returns an object of a class. When creating such a function, set its type as that of the class it would return. The formula to follow is still: FunctionFunctionName() AsClassNameEnd Function In the body of the class, which is the section between the Function and the End Function lines, you can perform any assignment you judge necessary. For example you can declare local variables. Before exiting the function, you must make sure it returns a value based on its As type. You can do this using the Return keyword followed by the value to return. Here is an example: Like a regular variable, a class can be passed as argument to a procedure. When a procedure receives such an argument, it can process it as necessary. All the rules we reviewed for regular variables apply to a class, as long as you keep in mind that an object has members that you may need to be aware of. When calling the procedure, make sure you pass it a value argument based on the class it passed to it. Here is an example of a class passed as argument: Besides the function, in Lesson 5, we saw that, by passing an argument by reference, a sub procedure could return a value. This characteristic also applies to a class passed as argument. When passing the argument, precede it with the ByRef keyword. In the procedure, process the argument as you see fit, unless you choose not to. When calling the procedure, pass it a valid variable based on the type of the argument. Here is an example: Like a regular variable, a class can be locally declared as static, using the Static keyword. If the value of such a locally declared variable changes, when the procedure ends, the value of the variable is changed and would be kept until the next call. Optional Arguments When passing an argument of a class, you can specify that it is not required. Such an argument is considered optional. To specify that an argument is optional, when creating its procedure, type the Optional keyword to the left of the argument's name and assign it the default value. All the other rules we reviewed for optional arguments are also applied here. Procedure Overloading If you want to create various procedures that takes a class argument, you can create a procedure with the same name but different signatures. This is referred to as overloading the procedure. When doing this, follow the same rules we reviewed for overloading a procedure: the must have the same name, they cannot have the same number of argument when the arguments at each position are of the same types. Sealed Classes Introduction All of the classes we have used so far can serve as parents of other classes. This is the default behavior of a regular class: the ability to derive a new class from it. In some cases, you may not want any class to be derived from a particular class you are creating. Such a class is referred to as sealed. A class is said to be sealed when you cannot inherit from it. If you try, you would receive an error. To create a sealed class in Microsoft Visual Basic, precede the name of the class with the NotInheritable keyword.
President Mamnoon Hussain Swat KPK, Pakistan Faisal Masjid Islamabad, Pakistan Rohtas Fort Jhelum, Punjab, Pakistan Pakistan Monument Islamabad, Pakistan Lake Saiful Muluk Kaghan Valley, Pakistan 15th COMSTECH General Assembly Meeting COMSTECH General Assembly is composed of the ministers of science and technology of the 57 member states which meets every two years and approves COMSTECH programs and its budget. So far, it has held 14 sessions. The fourteenth session of the COMSTECH General Assembly was held in January 2011 in Islamabad, the federal capital city of the Islamic Republic of Pakistan, the host country of COMSTECH
"Shockingly reasonable" cell phone policy announced by D.C. police chief - joshlegs http://arstechnica.com/tech-policy/2012/07/dc-police-chief-announces-shockingly-reasonable-cell-camera-policy/ ====== smashing They should be doing this everywhere in the USA. Every Law Enforcement Officer costs money, and they are wasting it detaining bystanders. Unless there is evidence of crime then the police force is wasting money by allowing the employees, the LEO's, to engage in activities not in accordance with the mission of the organization. Budgets are overstretched enough as it is. ------ spobo Not really something for HN unless someone is thinking about doing a startup for recording-equipment to monitor police interactions :p But very nice change of policy. As it should be! ------ mrlyc Let's just see how it plays out in the field when alpha male cops of both sexes are high on self importance and adrenalin.
A Story of Jane Ch. 06 As I write this final chapter, I am sitting in one of my favorite places in the whole world: Mama's library, at the big table in front of the window overlooking Lake Michigan. As little girls, Jean and I would come in here and try to imagine what marvelous spells were contained in the old volumes that line these walls. Women in centuries past have been burned for possessing such books. Today, with freedom from persecution and the freedom of curiosity born in my generation, Wicca is one of the fastest growing religions in the country, though I guess most people consider it more of a curiosity than a religion. It's time, I guess, to tell you what really happened that night, exactly six months ago, and the incredible events that have taken place in my life since. It's best, they say, to start at the beginning. I, of course, do things the hard way; so I'll start at the end (though I consider it a beginning, of sorts). I told Molly as I sat in that motel room that two separate souls could not occupy a single body after the moon was full. That was true. I also told her that, with her help, I would transfer her consciousness into the body of the kitten. That was also true. My lie was actually one of omission. As I read and reread each of the spells (actually a continuation of the spell my sisters had used to bring me back), my mind kept going back to something that Jo had told me when she gave me the book. She said that Mama "knew I would do the right thing." That struck an unsettling cord in my mind. Mama had never approved of ANYTHING I did. She saw me as wild, impetuous, rebellious, untrustworthy, selfish, and a whore. And she was right, of course. I was all those and more. Did she really think I was going to change now, even having just returned from the dead? As Molly read her little Latin phrase, all that remained for me to do was to utter a single, closing word, and she would be transferred into the body of the cat for the rest of her days. I had KNOWN she would say those words! I knew her type. She was Jean's type! Hopelessly romantic, unbelievably innocent, unselfish to the very end. Just one word, and I would have been rid of her forever. What I had omitted to explain, of course, was that, in the event no spell was cast at all, our souls wouldn't occupy the same body separately; they would merge and occupy it TOGETHER! With Mama's words echoing in my mind, for the first time in my life, I did not act at all. Call it a moment of faith, I guess. And now, at last, it's time to remind you of the strange little statement I made at the beginning of this rambling missive. I said that the most difficult aspect of writing this was its tense. I've done it (up until now) in the first-person singular. But to do so, I have had to completely disregard half of the sum total of my knowledge, my experiences, and my beliefs. It has been, quite frankly, the hardest thing I think I've ever written, in either of my lifetimes. Oh yes. One final point before I tell you the rest of the story of that night. It is, by far, the most amazing aspect in the merging of myselves. I find that I marvel at the concept even months later, but I swear it's true. Submissiveness is a dominant trait! Perhaps the truth is that "submissiveness" is not the trait at all, but only an aspect of many traits, that include an overwhelming discomfort for all those things I told you Mama didn't like in me. At the moment of my merging, they simply lost their importance to me, and all those things that make me Molly became the most important. All I know is that the first thing I did that night (after I stopped laughing at Jean's question) was to throw myself into my husband's arms and kiss him. The second thing (after becoming cognizant of the growing number of people flocking to our room to see what the commotion was about) was to ask him for his jacket so I could cover my nakedness. The hotel security guards arrived in less than a minute, and Herman (always a sharp guy, my Hermy), concocted a spur-of-the-moment story about seeing me choking on a piece of my salad and he broke down the door to administer the Heimlich maneuver. This, plus his credit card to charge the damages, seemed to be sufficient to placate the motel administration, and we were soon established in another room, complete with carefully drawn window curtains and a working door. After assuring them that both of me were inside me, I refused to answer any more questions until learning how they had found me. As it turned out, it wasn't so hard after all. Jean had given the other sisters the slip at a gas station outside of town and had gotten a lift from a trucker back the other way. (That was amazing! To my knowledge, Jean had never done anything so bold in her life!) She had entered the house through the garage door, which I had left open, and finally roused Herman from his little "nap" and told him everything about the spell, and what she suspected that I (Jane) was about to do to me (Molly). Jean was a computer major in college, and she spent some time with my PC and finally located my credit card number through something called a "cookie." (I had used the credit card to buy the silk robe from an on-line lingerie store.) Then Herman called a private investigator in Chicago that he had used once, and gave him the card number. Within an hour, they knew about the purchases I'd made at the mall. In Herman's pickup truck, they used his cell phone to stay in touch with the PI, and tracked the me first to the gas station where I'd filled my car's tank, and finally to the motel. Jean had fallen instantly in love with the kitten (she's named it Equinox; "Nox," for short), and after chatting with me for a few more minutes, just to make sure in her own mind that both the women she loved were still around, she took it in its carrier, along with my car keys, and headed home to Chicago. I told her we'd meet her there in a few days, after my husband and I had gotten "better acquainted." This, as it turned out, was quite literal. I couldn't stand being with Herman again unless I came clean about a few things. Before, in our married life, I had never really been bothered by little things like a conscience. But I was now; and even though this first night should have been one of pure romance, the "Molly" side of me demanded that it first be one of confession. I had cheated on him - twice (well, twice with other men, anyway): once before we were married, with the bartender at my "bachelorette" party (I'd been flirting with him mercilessly all evening, and after everybody else had gone home, things just got out of hand), and once with a piano tuner a couple months after the wedding while Herman was out of town on business for a week (I'd met that guy for a "re-tuning" session the following two days at his single-wide home in a trailer park in North Chicago). Neither of these little flings was serious, and both had been brought to a quick end before Herman could find out. I may have been a wild, cheating whore, but I always knew that nothing must ever come between my husband and me. And then, of course, there was Jean. Not only had I made love to Jean as Molly, but Jean and I had been having an incestuous relationship since we were teenagers. In fact, it was Jean I had been going to see when I had been killed by the truck. As I explained all this to him, I had been sitting next to him on the edge of the bed in the cheap motel, but I had been looking down at my bare feet, afraid of what I might see in his eyes if I looked up at him. After confessing this about Jean, however, he made a strange sound, and glancing up at him, I saw an intense mixture of emotions in him. I had been wondering if I should really tell him just yet the whole story about Jean, but now he was clearly excited. There was a sparkle of curiosity in his eye, and glancing lower, I couldn't help but notice that he was hard. I had often caught Herman giving Jean a sidelong glance, but I certainly hadn't faulted him for that; Jean is an exceptionally pretty girl. But more than just beauty, Jean had an aura of innocence that attracted men like flies. I had never been worried about him and Jean, of course. Jean was a lesbian, she was my lover, and she told me everything; literally everything. You see, it wasn't just an aura ... Jean really WAS innocent. But now, seeing this reaction in him, I decided to press on with my night of confession. I took a deep breath and continued. Jean and I had always been more than just sisters. We were best friends. We played together when we were kids, and when we moved into the big house by the lake, we insisted on sharing a room. Papa had died when I was eight and Jean nine, and from that time on, the house was always in flux. But while we changed bedrooms twice as Jo, and then Jill and Jan left for college, we always share the same bedroom. I think the thing that kept us so close was the fact that we were such opposites. Yin versus yang. Bad versus good. Wild versus subdued. And finally dominant versus submissive. Sometimes, we would argue, just as all sisters do, but she would always give in. What really ticked me off was that in the long run, she would usually be proven right after all! But she never said "I told you so," never acted smug or condescending, as I always did. At the time, I didn't even know the meaning of the word "submissive," but eventually, I got the gist of the concept, and I always capitalized on every advantage. She was always very shy; painfully so. She was forced into the dating scene by just about everybody, including Mama and especially me. As a high school sophomore, I was already dating, and I felt threatened by an 11th grade sister who was not. Mama too often told me: "Why can't you be more like Jean?" and the more promiscuous I could make her appear, the more leeway I could argue for myself. And then, on the third date she had ever had, she was raped. She told me about it, of course. She told me everything. But at this particular time in my life, I had fixated on cheerleading. It's all I could think about; all I could talk about. I didn't notice anything was wrong at first (though, looking back on it, the signs were all there), and Jean kept the terrible secret bottled up inside her for almost a week before I realized she was in pain about something. By then, it was too late to talk her into going to the police, or the principle, or even Mama. She wouldn't even consider it. She had ME to talk to, and that's all she seemed to want, so I held her as she cried until there were no more tears left to shed. She never dated again. (Well, there was that one disastrous evening the following year when I forced her to go on a double date with me, my latest fling and his older cousin. She absolutely refused to go at first, but as usual, I eventually got my way. I've never seen a girl so nervous in my whole life. She got half way through dinner and threw up. "Okay, sis," I said as I drove her home, "you win.") I wanted to cast some spell on the creep that had raped her, but he was a military brat, and before I could find a way to turn him into a mealworm, he had moved away. I still fantasize about getting even with that asshole. Midway through the next school year, I began to notice the way she looked at me sometimes. She had become more introverted than ever, and I had long since lost patience with her. We were still best friends, of course, and we still told each other almost everything, but lately, it was me doing most of the telling. And all my adventures seemed to be sexual. I had lost my virginity at fifteen, and by my junior year, I was already getting a reputation. I'd use a guy until I was tired of him, then dump him for someone that was his exact opposite. In this way, I was an equal-opportunity fucker, switching indiscriminately from basketball player to debate team captain to football lineman to nerd. And I'd tell Jean every gory little detail; every feeling and sound and smell. She would listen, enraptured, chiding me, telling me how naughty I was; but mainly she'd just listen. I slowly realized that my tales were sort of a sexual substitute; that I wasn't just a source of fantasy, but a surrogate in a forbidden realm. I could tell she was sexually excited; but not by my stories. She was excited by me. As I said, we had no secrets, so finally I just came out and asked her: "Are you a lesbian?" And once the question was out in the open, she had to think about it. And the more she thought about it, the more she had to admit that she really didn't know. It didn't matter anyway, she said, since she had no intention of going out with ANYONE in the foreseeable future. Now, if you haven't already figured it out, I like sex. I like it a lot. But looking back, I have to admit that it wasn't really the sex; it was the amazing amount of power I had over others when sex was involved. I could manipulate, cajole, coax, and demand things I had never before thought possible. Every experience was still new; and, good or bad, it was the number of new experiences I was after. As long as I relied on my sexuality, I felt I could do almost anything by controlling almost anyone. I had never been with another girl, but I was a little curious; and, after all, it was just another experience. But now I realized I was about to take an extraordinary step in my life by controlling my best friend: my sister. I looked at her in a whole new light, and in it, I could, for the first time, see the way she was looking at ME. She didn't even realize it herself. If I did this, nothing would ever be the same. That made it all the more exciting. I decided to make it a very long, deliberate process, and I decided that I would have a lot of fun as the task progressed. I began by "dressing down" a little. I had never been a shy one, and being in the bedroom with Jean while wearing only my panties and bra was no big deal. Jean almost always wore a robe when she wasn't fully clothed, but now I stripped to my underwear whenever we were in the room together. If she questioned it, I told her I was more comfortable like that, and I began berating her for being prudish by covering up all the time. And then, more and more often, I'd go topless, wearing only my panties. I started noticing her staring at me then, and that sort of confirmed my hypothesis. Now, I really started getting on her case, telling her that best-friend-sisters shouldn't be afraid to show a little skin while relaxing in their own bedroom. We fought. She avoided the room for awhile when I was home. We fought again. And finally, as always, she gave in and started lounging around the bedroom in her underwear. She was nervous and dreadfully shy. Fortunately, she didn't get so nervous that she threw up, but she never did feel comfortable like that in front of anyone; even me. I started complimenting her on her figure. She shyly reciprocated, telling me she envied MY body. This, of course, made it easy to demand she remove her bra, as well, for a little comparison. The argument didn't last as long this time, and ended in us sitting side by side in her bed, arms touching provocatively, talking about breasts in general, and hers and mine in particular. She blushed beautifully for the hour or so before bedtime, and I realized that we had reached some pinnacle in this little exercise. I could either retreat or push her over to the other side. Full speed ahead! Over the next week or so, I demanded often that she remove her bra when we were alone in our room. I had started removing my panties, as well, and while I was always nonchalant and matter-of-fact about the whole thing, I saw her staring at me more and more often. I began touching her a lot more, as well, both in and out of the bedroom. I'd hold her arm while we were walking around the neighborhood and at school, and sometimes I'd even hold her hand. She never pulled away, but I could tell that the public show of intimacy was embarrassing to her. In our room, I'd often sit very close to her, sometimes perched on the arm of her chair, butt-naked, my arm around her bare shoulder, reading an e-mail on her computer screen along with her. Sometimes, when I caught her staring at me instead of her textbook, I'd smile knowingly, and she'd blush crimson and quickly look away. It was early spring, and the first thunderstorm of the year was the excuse I was looking for. The week before, I had demanded that she start sleeping naked, just as I had. By this time, she had almost stopped arguing with me about everything. She still saw my demands as outrageous, but she simply began relenting to everything I suggested. When the thunder was near that night, I feigned fright and got into bed with her. She didn't try to stop me, but rolled away from me, facing the wall next to her bed. I snuggled up to her, holding her closely, even though her skin was uncomfortably hot from embarrassment. After a long ten minutes or so, I could tell she was crying, probably from nervousness and confusion about her feelings, but I pretended to think she was scared of the storm, too, and made her roll over and put her head on my chest while I held her and told her that everything was going to be alright. After the storm ended, she asked if I was going to get up and go back to my own bed. I asked if that's what she wanted me to do, but she couldn't make herself answer; so I stayed, and eventually we went to sleep like that. The next night, I got into bed with her again. She never questioned me. For the next month, we slept together, naked in her bed. Now, this didn't stop me from dating (and screwing) one or two links in my long chain of high school sexual suitors. When I came back from an especially hot date, often reeking and dripping from the encounters, I'd crawl right into bed with her and make her listen to all the little details. She was obviously repulsed, but aside from our constant closeness, it was still the only thing sexual in her life. She was uncomfortable and nervous, but she had by now begun submitting to my every demand and suggestion. At my insistence, she was always naked in our bedroom. I'd make her go into the kitchen to get us milk and snacks wearing only the minimal dress ... a thin robe or a long-sleeved shirt. When I knew Mama was already in her room for the night, I'd have Jean go to the kitchen wearing nothing at all. She'd beg me not to make her, but she'd stopped arguing completely, and she'd always wind up doing as I commanded, no matter how uncomfortable it made her. The next logical step in the process was to start stroking her with my fingertips when we were in bed at night. For about a week, I just stroked her hair, idly, as if I were doing it absentmindedly. The next week, it was her back. The next, her stomach and breasts. All this time, I became more and more demanding of her. I had her doing my home work, as well as her own. She had been accepted, with a scholarship, to Princeton. But I made her apply to U of I, and tell Mama that she intended going there. Mama threw a fit and Jean cried. In private, I commanded and Jean obeyed. I hadn't even had sex with her, and already she was my greatest personal conquest to date. By the end of the school year, I'd worked the situation up to the point that I was almost making her cum with my gentle touches, but I'd never quite go all the way, and she'd never be so bold as to ask me to take her to the peak. By now, I was as frustrated as she was. I made some pretty strenuous demands on my boyfriends, but even after making them bring me to some heart-stopping orgasms, I would still find myself wanting her. At times, I wondered if I could keep things at this level forever. But, of course, neither of us could stop the inevitable now.
I am making the tree of life pillow by Ladyship Designs. the technique for T2F says, "slip next 2 sets. onto cable needle. purl one from left needle and k2 from cable. for T2B it says slip next st onto cable, k2 from left needle and purl one from cable. looking at this tread, it is always one stitch not 2. i have redone this part of pattern over and over and it doesn't look right. do you think there is a typo and it should read one stitch not 2??please help! Welcome to KnittingHelp! It depends on the pattern. Ingrid's explanation is the correct one for the twist sts but if your pattern has defined the sts differently, then that should be what is required. I don't see any complaints in glancing at the Ravelry page and there aren't errata online.http://www.ravelry.com/patterns/libr...6-pillow-cover The pattern for the larger branches looks like it takes 3 sts while the smaller twigs look like a 2 stitch twist. Which ones are you doing? Row 46 of the branches is where the twist stitches begin. When I do them they do not match the large branches and they look out of place. The pulls and knits don't match up at all. And when I compare to the picture they definitely don't look the same. I wish I had taken a picture but I have redone rows 46-56 at least 3 times. I just can't make it look like branches in picture. So row 46 is where the branches narrow down to thinner twigs? Are they not lining up correctly with the slant of the larger branch? You might experiment with a small swatch to see where you need to start the twist in order to get the alignment. The swatch will also save wear and tear on you working yarn. Or is it the abrupt change from a traveling cable of about 4 sts to the twist st that doesn't look right? Maybe knitting a few more rows will help because you'll see more of the overall pattern. Yes, a photo would be a big help. Thank you so much for your quick reply! I have written the pattern designer but no reply. I will go back to row 46 and try again. And take a picture! At least I had the good sense to use a lifeline this last time!
<configuration name="Android Charts" type="FlutterBazelRunConfigurationType" factoryName="Flutter (Bazel)"> <option name="bazelTarget" value="//third_party/dart/charts_flutter/example/android:Charts" /> <method v="2" /> </configuration>
Don't know how many of you are familiar with British conspiracy theorist David Icke, the guy who believes a secret race of shape-shifting lizard people have populated the planet in the guise of our political and cultural leaders, but I'm beginning to believe Icke's not spouting bunkum and has been right all along. How else to explain someone as pro-actively hateful as Arizona Governor Jan Brewer, and her mean-spirited policy of denying driver's licenses to DREAMers who qualify for President Obama's Deferred Action for Childhood Arrivals? Well, on Tuesday, Brewer removed all doubt with a filing in federal court as part of her defense of her 2012 executive order preventing law-abiding DREAMers, brought to this country while tots, from obtaining licenses to drive. See, before Brewer's order, the Arizona Department of Transportation issued driver's licenses to all persons granted deferred action by the feds. As proof of their deferred status, applicants were required to present a federally-issued employment authorization card, proving they were "authorized under federal law" to remain in the United States. But in a fit of political spite aimed at the Obama administration, Brewer issued her executive order carving out an exception in ADOT policy, so as to deny DREAMers driver's licenses. Brewer made clear her bigoted intent on the day of her executive order, declaring in her semi-illiterate way, that the policy meant, "No driver's license to illegal people [sic]." As a result, the ACLU and other civil rights groups sued on behalf of the Arizona Dream Act Coalition, seeking a preliminary injunction against the governor's order on the grounds that it violated the Supremacy Clause of the U.S. Constitution as well as the 14th Amendment's guarantee of equal protection under the law. In May, U.S. District Court Judge David G. Campbell ruled against ADAC on the Supremacy Clause claim, dismissing it entirely. But he rejected Brewer and ADOT's request for dismissal on the equal protection claim, agreeing with the plaintiffs that, "DACA recipients are similarly situated to other noncitizens holding [EACs] who are eligible to obtain driver's licenses in Arizona." Campbell found that the claim fell short of the high bar for an injunction, while stating that the plaintiffs were likely to prevail in their assertion that Brewer's order was discriminatory. Faced with an inevitable loss, Brewer and ADOT told the court that they would be reviewing state regulations, signaling a possible change. But, of course, Brewer wasn't about to do the right thing and reverse her executive order. Instead, ADOT extended its prejudiced policy to all those who receive deferred action status from the federal government, submitting its new regulations to the court yesterday. Lawyers for ADOT and Brewer offer the following lame excuse for the state not being asses toward everyone who has received a work permit from the feds before now. "When the Deferred Action for Childhood Arrivals program was announced," the governor's pettifoggers write, "ADOT became aware for the first time that certain non-immigrants without authorized presence under federal law were in some cases nevertheless eligible for EACs." What an incredible pant-load. Not that it's impossible to believe that ADOT's muckety-mucks were so dumb they didn't know what they were doing prior to Brewer's 2012 order, but still... The response from the ACLU to the court filing was swift and stinging. In a press release issued late Tuesday, the ACLU noted that over the last eight years, "the state of Arizona has issued licenses and ID cards nearly 40,000 times to noncitizens with work permits" from the federal government. Attorney Karen Tumlin of the National Immigration Law Center, which along with the ACLU and MALDEF is representing the plaintiffs, stated that among those injured by Brewer's double-down on discrimination will be "survivors of domestic violence in the process of adjusting their status," who along with the DREAMers will be barred from getting driver's licenses. "In her zealousness, Governor Brewer has made a policy change that isn't just anti-immigrant, it's also anti-woman," Tumlin says in the statement, adding, "This sort of policy change only demonstrates that Arizona's politicians care more about scoring political points than about ensuring the safety of their residents." But if Brewer gets her jollies from stomping on students and wannabe U.S. soldiers, why not battered women as well? Okay, so maybe Brewer isn't a lizard lady in human form, like one of those aliens in Men in Black, who unzip their outer selves to reveal the slimy monster beneath. Sadly, she is human, all too human, not a Gila monster with bleached hair, as her actions would have us believe. I know, she almost had me fooled as well.
Q: why mysql_num_rows always returns 0 in php I am using php script to make login page. I use mysql_num_rows() method, it returns 1 if it matches first row only, it returns 0 when second or third row matches. Here is My code: $username = $_POST['username']; $password = $_POST['password']; $sql = "SELECT id,username,password FROM user_data WHERE username = '$username' and password = '$password'"; $result = mysqli_query($sql); $count = mysqli_num_rows($result); Here I also tried mysqli method too, but result are same. Please Help A: Seeing your previous question How to insert array of array in phpmyadmin using php You're using the MySQL_ API to connect with (or most likely, seeing the use of mysql_ functions, and you probably thought that you would slip in a few i's to those MySQLi_ functions along with MySQL_. Well, you can't. You need to use the same API from connecting to querying. However, if you are using MySQLi_ to connect with (which is unknown), you didn't pass the db connection to your query and as the first parameter. For this line $result = mysqli_query($sql); Which would look something like: $result = mysqli_query($connection, $sql); Also make sure that your POST arrays do contain values. Consult the manual on connecting with the MySQLi_ API: http://php.net/manual/en/function.mysqli-connect.php Other links to consult to debug: http://php.net/manual/en/mysqli.error.php http://php.net/manual/en/function.error-reporting.php And as stated in comments: Your present code is open to SQL injection. Use mysqli with prepared statements, or PDO with prepared statements.
As an image display device increasingly develops, people have higher requirements for high-quality and high definition image information. In practice, a digital image is usually affected by an imaging device, noise interference in an external environment, and the like, during processes of digitalization and transmission. Therefore, such a digital image with noise interference is usually referred to as an image with noise or a noisy image. Noise may reduce a resolution of a digital image and affects display details of the image, which is extremely disadvantageous to subsequent processing of the image. Therefore, effective noise suppression is essential to an image application. Image noise reduction is of great significance in a video processing system. In a television system, deinterlacing, anti-aliasing, and image scaling require that the system provide an image without noise or with low noise as input image information. In a surveillance system, image noise reduction is also a main method for improving quality of a surveillance image. TNR is an important technical method for image noise reduction. A TNR method that is commonly used in the prior art can be implemented in the following manner:pixeltnr(x,y,t)=pixeltnr(x,y,t+Δt)×alpha+pixel(x,y,t)×(1−alpha)where pixel indicates an original noisy image, pixeltnr is an image obtained after TNR, and in a digital image, the foregoing variables are both replaced with discrete variables, x and y are two-dimensional space coordinates, and t is a one-dimensional time coordinate, where x and y determine a position of an indicated pixel, and t represents a position of a current image in an image sequence, that is, a quantity of frames, Δt is a time offset, and Δt is usually set to 1, alphaε[0,1], and alpha is a blending coefficient and is used to determine a noise reduction intensity, a larger alpha indicates a higher noise reduction intensity, and vice versa. The TNR in the prior art is mainly TNR based on determining of movement/still. A movement level of corresponding image content is determined according to a size of a frame difference, and a corresponding blending coefficient is selected according to the movement level. When the frame difference is lower, it is considered that a corresponding movement level is lower, a movement is tending to be still, and a higher blending coefficient alpha is selected, and vice versa. During a process of implementing the present disclosure, the inventors of the present disclosure found that in the TNR based on determining of movement/still, only a frame difference is used as a basis for determining whether an image moves, and a corresponding blending coefficient is selected according to a result of the determining. However, a detection error may easily occur if only a frame difference is used as a basis for determining a movement of an image. If a moving image is determined to be a still image, smearing of the image may occur, and details of the image may be lost. If a still image is determined to be a moving image, a noise reduction effect may be poor for an image with large noise. Therefore, the TNR based on determining of movement/still cannot adapt to different noise scenarios.
Decreased proline endopeptidase activity in the basal ganglia in Huntington's disease. Soluble proline endopeptidase (EC 3.4.21.26) activity was measured by a fluorometric assay in eight human brain areas (caudate nucleus, lateral globus pallidus, medial globus pallidus, substantia nigra-zona compacta, substantia nigra-zona reticulata, frontal cortex-Brodmann area 10, temporal cortex-Brodmann area 38, and hippocampus), in 10 control and 10 Huntington's disease brains. An abnormally low activity (22% of control activity) was found in the caudate nucleus of Huntington's disease brains; significantly decreased activity was also detected in the lateral globus pallidus and medial globus pallidus (37% and 40% of control, respectively).
How Tall Are Celebrities? Main menu Jose Parra - Height Weight Birthday Zodiac Filmography Biography Jose Parra’s height is 5ft 11in (1.80 m) José Miguel Parra (born November 28, 1972 in Jacagua, Dominican Republic) was a Major League Baseball right-handed pitcher who played from 1995-2004. He also played two seasons in Japan, for the Yomiuri Giants in 1999 and the Orix Buffaloes in 2005, as well as in South Korea and Taiwan.
package cn.mushuwei.singleton.type; /** * @author james mu * @date 2020/4/13 23:36 */ public final class ThreadSafeLazyLoadedMouseDriver { private static ThreadSafeLazyLoadedMouseDriver instance; private ThreadSafeLazyLoadedMouseDriver() { // protect against instantiation via reflection if (instance == null) { instance = this; } else { throw new IllegalStateException("Already initialized."); } } /** * The instance gets created only when it is called for first time. Lazy-loading */ public static synchronized ThreadSafeLazyLoadedMouseDriver getInstance() { if (instance == null) { instance = new ThreadSafeLazyLoadedMouseDriver(); } return instance; } }
<?xml version="1.0" encoding="utf-8"?> <adaptive-icon xmlns:android="http://schemas.android.com/apk/res/android"> <background android:drawable="@drawable/sym_def_app_icon_background" /> <foreground android:drawable="@mipmap/sym_def_app_icon_foreground" /> </adaptive-icon>
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>Kind</key> <string>Xcode.Xcode3.ProjectTemplateUnitKind</string> <key>Identifier</key> <string>com.monkey.monkeydev.logosTweak</string> <key>Concrete</key> <true/> <key>Description</key> <string>This template builds a Logos-based Substrate Tweak.</string> <key>Ancestors</key> <array> <string>com.monkey.monkeydev.base</string> </array> <key>Targets</key> <array> <dict> <key>ProductType</key> <string>com.apple.product-type.library.dynamic</string> <key>SharedSettings</key> <dict> <key>CLANG_ENABLE_OBJC_ARC</key> <string>YES</string> <key>INSTALL_PATH</key> <string>/Library/MobileSubstrate/DynamicLibraries</string> <key>DYLIB_CURRENT_VERSION</key> <string>1</string> <key>DYLIB_COMPATIBILITY_VERSION</key> <string>1</string> <key>GCC_PREFIX_HEADER</key> <string>___PACKAGENAME___/___PACKAGENAME___-Prefix.pch</string> <key>GCC_PRECOMPILE_PREFIX_HEADER</key> <string>YES</string> </dict> <key>BuildPhases</key> <array> <dict> <key>ShellScript</key> <string>/opt/MonkeyDev/bin/md --xcbp-logos</string> <key>ShellPath</key> <string>/bin/sh</string> <key>RunOnlyForDeploymentPostprocessing</key> <false/> <key>Class</key> <string>ShellScript</string> </dict> <dict> <key>Class</key> <string>Sources</string> </dict> <dict> <key>Class</key> <string>Frameworks</string> </dict> <dict> <key>Class</key> <string>Headers</string> </dict> <dict> <key>ShellScript</key> <string>/opt/MonkeyDev/bin/md --xcbp</string> <key>ShellPath</key> <string>/bin/sh</string> <key>RunOnlyForDeploymentPostprocessing</key> <false/> <key>Class</key> <string>ShellScript</string> </dict> </array> <key>Frameworks</key> <array> <string>UIKit</string> <string>Foundation</string> <string>CydiaSubstrate</string> </array> </dict> </array> <key>Nodes</key> <array> <string>___PACKAGENAME___-Prefix.pch:objC:importFoundation</string> <string>___PACKAGENAME___-Prefix.pch:objC:importTheosPrefix</string> <string>___PACKAGENAMEASIDENTIFIER___.xm</string> <string>___PACKAGENAMEASIDENTIFIER___.mm</string> <string>Package/DEBIAN/control:debianControl:section</string> <string>Package/DEBIAN/control:debianControl:depends</string> <string>Package/Library/MobileSubstrate/DynamicLibraries/___PACKAGENAMEASIDENTIFIER___.plist</string> </array> <key>Definitions</key> <dict> <key>___PACKAGENAMEASIDENTIFIER___.xm</key> <dict> <key>Path</key> <string>___PACKAGENAMEASIDENTIFIER___.xm</string> </dict> <key>___PACKAGENAMEASIDENTIFIER___.mm</key> <dict> <key>Path</key> <string>___PACKAGENAMEASIDENTIFIER___.mm</string> </dict> <key>Package/Library/MobileSubstrate/DynamicLibraries/___PACKAGENAMEASIDENTIFIER___.plist</key> <dict> <key>Group</key> <array> <string>Package</string> <string>Library</string> <string>MobileSubstrate</string> <string>DynamicLibraries</string> </array> <key>Beginning</key> <string>&lt;?xml version=&quot;1.0&quot; encoding=&quot;UTF-8&quot;?&gt; &lt;!DOCTYPE plist PUBLIC &quot;-//Apple//DTD PLIST 1.0//EN&quot; &quot;http://www.apple.com/DTDs/PropertyList-1.0.dtd&quot;&gt; &lt;plist version=&quot;1.0&quot;&gt; &lt;dict&gt; &lt;key&gt;Filter&lt;/key&gt; &lt;dict&gt; &lt;key&gt;Bundles&lt;/key&gt; &lt;array&gt; &lt;string&gt;com.apple.springboard&lt;/string&gt; &lt;/array&gt; &lt;/dict&gt; &lt;/dict&gt; &lt;/plist&gt;</string> </dict> <key>*:debianControl:section</key> <string>Section: System</string> <key>*:debianControl:depends</key> <string>Depends: firmware (&gt;= 5.0), mobilesubstrate</string> </dict> </dict> </plist>
<component name="libraryTable"> <library name="Maven: org.apache.spark:spark-core_2.11:2.0.1"> <CLASSES> <root url="jar://$MAVEN_REPOSITORY$/org/apache/spark/spark-core_2.11/2.0.1/spark-core_2.11-2.0.1.jar!/" /> </CLASSES> <JAVADOC> <root url="jar://$MAVEN_REPOSITORY$/org/apache/spark/spark-core_2.11/2.0.1/spark-core_2.11-2.0.1-javadoc.jar!/" /> </JAVADOC> <SOURCES> <root url="jar://$MAVEN_REPOSITORY$/org/apache/spark/spark-core_2.11/2.0.1/spark-core_2.11-2.0.1-sources.jar!/" /> </SOURCES> </library> </component>
Last few years has been amazing for crypto exchange. As it helped new business and markets, People want to know more about the crypto exchange. Today we have come with another review – KuCoin exchange review. We wish to share some important factors of KuCoin exchange after using the platform. Let’s find out why KuCoin is amongst the most used cryptocurrency exchange in the market at present. KuCoin Exchange Review QUICK NAVIGATION : KuCoin Introduction KuCoin came into existence in 2017 and is headquartered in Hong Kong. The Firm was found by 12 members, who are blockchain enthusiasts. Micheal Gam is CEO and owner of KuCoin. Despite being based in Hong long, It is a world-class blockchain asset exchange which is trusted globally. KuCoin own cryptocurrency called KuCoin shares(Kcs) for its exchange users. For some time, it was in the top 10 most active exchanges in the world that was attracting the most crypto trading volume. KuCoin Features Multiple Supported Cryptocurrencies More than 370 cryptocurrencies/pairs traded on KuCoin. Popular cryptocurrencies traded are BTC, BCH, DBC, KSC, ETH, and many more. Furthermore, it is a crypto-to-crypto exchange which does not support fiat currency, but you can find many pairs of USDT currency. KuCoin Trading Fees The trading fee is 0.1% and it doesn’t require any extra deposit fee except transferring a particular currency. As well as, you can get max discount up to 30% for buying kcs of a certain limit. The important feature is that only KCS holders can receive this discount as per the model. 1% discount on trading fees for every user holding at least 1000 KCS and the maximum discount of 30% on users holding 30,000 KCS. For deposits, the transaction fee is ZERO. For Kucoin withdrawals, fees vary for different currencies, for details visit Kucoin. Global Presence KuCoin works in a lot of countries around the world such as US, UK, Canada, Japan, Indian, Australia, Singapore, etc. Moreover, they are not active in China due to Chinese government policy which recently banned all cryptocurrency activities in their country. Support KuCoin customer support is on a top level. Also, their live chat feature is robust and spot handling of minor problems. FAQ section to answer for most likely to ask questions. How To Get Started on KuCoin? It’s very easy to get started on KuCoin exchange. You need to provide a valid email and password to get started on it. However, you have to go through the AML/KYC process to withdraw more than 2 BTC. KYC verified individual account 100btc/24 hr. KYC verified institution account 500btc/24 hr. The KYC verification process is submitting documents, providing details to all questions and authorizing KuCoin to complete the verification process. Besides, the processing time for each KYC Verification is between 2-4 weeks, depends on the total volume of submissions. Buy/Sell at KuCoin KuCoin exchange maintains order books to match buyers and sellers. In the top menu select “markets”, there you will find different pairs, choose one, you will be shown last trades made. You will see the order books on the left side. To buy/sell, specify your price and select the amount in ETH. The BTC will be shown. Trade fee also displayed. Kumex KuMex is a crypto derivatives trading platform of KuCoin. KuCoin launched the beta version on July 8, 2019. KuCoin claims that KuMex will offer up to 20 times leverage. KuMEX wants to create a fair trading environment and lower the threshold for investors. Is KuCoin Safe? Given its last year’s record, we can say it is a safe exchange to trade some exciting cryptocurrencies that you might not find on any other exchange. Moreover, another unique thing that this exchange offers is NEO GAS for holding NEO cryptocurrency on the KuCoin exchange. NEO GAS is created on the exchange and is provided to NEO holders. Only Binance exchange contains this functionality. Overall, there is 50 % bonus for KCS holders on KuCoin exchange, sharing with these users from its trading fee earnings. Another cool thing is KuCoin exchange UI in 12 different languages and prices in more than 30 fiat currencies For KuCoin exchange users, the UI is available in 12 different languages and prices in more than 30 fiat currencies. Pros : Easy to use: the interface of Kucoin is easy and simple to use. For Beginners; it’s a perfect platform. Rewards and promotions: Kucoin provides promotions for users who have KCS token and it works as a source of income. Cons : No fiat currency: Kucoin supports only crypto-crypto trading. Withdrawal fees: Kucoin has different withdrawal fees for different coins. Some are free and some are very costly. Conclusion Overall, By looking at all the points. We say Kucoin is safe and easy to use cryptocurrency exchange. If you are a beginner, then Kucoin is the best platform for you. It has the best customer service 24/7. Referral programs for users which is an extra source of income. Kucoin seems ready to be a leader for cryptocurrency exchange with the competitive trading and withdrawal fees and no fees for a deposit. Also read: Localbitcoins Review | Zipmex Fees | Korbit Review What is your opinion on this KuCoin exchange review? Do share your thoughts on our Twitter and Facebook pages.
Workmanship Warranty I have a true passion for my business and my business relationships. My name and reputation is my business, and I will always work hard to provide the very best in quality customer service. 10 Year Limited Parts & Lifetime Workmanship Warranty Our limited labor warranty in regard to correcting defects in our workmanship is lifetime – there is no time limit. However, if a part fails owing to a manufacturer’s defect or normal use and wear our labor is covered for 90 days. The service call charge is warrantied for 30 days only on the same machine. There is no warranty against additional or more extensive repairs, against other problems that may occur on the same machine (even if involving identical symptoms), or against incidental damages. Parts carry the manufacturer’s warranty, which is usually 30-90 days. After the manufacturer’s warranty expires we will add our 10 year prorated part warranty at no additional charge. Residential customers only, commercial use is manufacturer’s warranty only. Part warranty prorate schedule: Parts carry the manufacturer’s warranty, which is usually 30-90 days. After the manufacturer’s warranty expires we will add our limited lifetime prorated part warranty at no additional charge. Residential customers only, commercial use is manufacturer’s warranty only. Part warranty prorate schedule: Within 90 days 100% (Parts and labor) – Customer is responsible for service call charge after 30 days. 90 days – 2 years 50% (Parts only) – Customer responsible for labor and service call. 2 years – 10 years 20% (Parts only ) – Customer responsible for labor and service call. Both original and warrantied parts and labor must be furnished by Dave Smith Appliance Services LLC only at our regular rates. Warranty parts pricing is determined by current Manufacturer Suggested Retail Price (MSRP). Customer must have original service receipt and proof of warranty. This warranty applies to in home service provided by Dave Smith Appliance Services LLC only and does not cover parts purchased over the counter or sold online. Exclusions: These parts are covered for the manufactures warranty only: filters, lamps, fuses, and all cosmetic and non-functional parts. Limited Coverage: Refrigeration system components, electronic control boards, ice makers, all tubs, tub bearings, disposals, and transmissions have limited coverage to two years prorated only. No Warranty For: Acts of God (lightning, voltage surge, water damage, etc.), customer misuse or abuse, corrosive environment (i.e. sulphur, hard water, sediment, humidity, etc.), failure due to inadequate venting/air flow or insufficient water/gas pressure or voltage/electrical supply or improper installation, or if parts become no longer available. No refunds. No warranty coverage or reimbursements will be given for repairs made by the customer, by any other individual, or by any other service company not authorized by Dave Smith Appliance Services LLC in writing. (Revised & Effective 4/01/13) Schedule Appointment Online If you have a home appliance that is in need of repair, like an oven, refrigerator, dishwasher or laundry machine, then schedule an appointment online with one of Dave Smith Appliance’s expert repair technicians today. Customer Testimonials Dave Appliance were great, washer wouldn’t drain out, replace parts order parts and the tech John F. Was awesome young man, did a awesome job, every friendly, knew his job well and John was very polite entering our home until he exit our home. We’ll use Dave’s when we need service. Ask for Tech Mr John F. he has excellent work manners. Thank u for your excellent job fast and finish yet very nice young man. – Toni Soto (5 Stars) I can’t remember names well but both the operator who called and the service tech were very professional and helpful. Thank you so much you had the right parts. The tech had our dryer fixed/repaired in a timely manner. Excellent Service!!! Thanks Again. – Dilbert Hommerson Consumers Energy just sent them out. They did a good job and I have no complaints. My fridge is operation smoothly again. Thank you. -Shirley Churchill (Lambertville, MI) Nick was very kind and courteous. You will have a repeat customer if the occasion arises. He took the time to show me how to keep the coils clean in my refrigerator. Thank you Again. – Jan Webben (Adrian, MI) Thank you so much for your speedy and efficient service. I will recommend you to all friends and family. – Staci Fadden (Monroe, MI) Mike clearly explained the problem with my ice maker and described my options. He went into my crawlspace to check and fix the water line and now my filtered water runs and the ice maker works well – Pamela Wawrzyniak (Toledo, OH) Your work is done promptly, efficiently and at a fair price. I would recommend you to anyone who needs repair don on their appliances. – Greg Tyson (Perrysburg, OH) We have used Dave Smith’s services for years including Dave’s solo business. We are always pleased with the prompt response including the friendly staff, the professionalism of the technicians and the reasonable prices. Most recently mike worked on our washer and diagnosed the problem to save the cost of buying a new washer. Thanks Dave Smith Appliance! – Pat Boudouris (Perrysburg, OH) Always get great service! Thank you – Debbie Lark (Tecumseh, MI) The technician was very polite and explained everything. I was very satisfied and would definitely have you again to service my appliance. – Judy Emery (Temperance, MI) Mike was good as having Dave do the repair. – Bob Besgrove (Perrysburg, OH) Very friendly and professional technician, he knew his products and he taught me a few tips. – Robert Memering (Britton, MI) I will recommend Dave Smith Appliance Services. I got to meet this guy, Dave. I am impressed with every person I encountered with his business these last two days. I highly value good service and all of you delivered. – MaryJo Downing (Toledo, OH) I was very satisfied with your technician’s knowledge and personality. I will recommend our company to anyone that needs services on any appliances. -William McCally (Toledo OH) I felt that he was excellent in repairing, friendly, and especially on time! -Jessica Embury (Toledo, OH) From the office person who answers the phone to both Dave and Mike, we have been very satisfied with your service. -Bill DeSana (Sylvania, OH) Was very satisfied with everything!! -Donna Stretch (Tecumseh, MI) We could not have had any better service! Thank You So Much! -Carrie Handy (Brittan, MI) Our services man was great! Didn’t catch his name, but tell him to keep up the good work! -Bud Bazzana (Onsted, MI) 5 stars on everything! Would not hesitate to recommend your services. Dave was very friendly and knowledgeable. – Annette & Albert (Toledo, OH) Nick was awesome. Very Friendly and professional. Clean and efficient. The rep who answered the phone was helpful in scheduling a repair prior to a family reunion. -Beck Meldoy (Onstead, MI) Very Friendly. Was here twice in a week as my washer and dryer shut down a week apart. I appreciate time bracketing your do so I did not need to wait at home all day. The technician who installed the part in the dryer hooked up the vent, better that I did, and it wasn’t – Nice Added Touch. Every aspect of our experience with Dave Smith Appliance Services was very satisfying. – Chuck Chaney (Tipton, MI) Your company was prompt about scheduling an appointment and informative as to when we could expect someone to be here. Mike was our service technician, was prompt and on time and provided excellent care in servicing our refrigerator. While here and working he was very cordial, provided helpful information regarding the care and maintenance of other appliances as well as the refrigerator, and the result couldn’t be more satisfactory. We would definitely recommend your company and appreciate the fact that we can rely on a locally owned business that we feel we can trust. Sharon McLauglin (Toledo, OH) The window of time needed to stay home is very lengthy while waiting for service… an actual appt. time would be helpful since people are so busy. Other than that, the service is GREAT, which is why I am a repeat customer. -Christina Marsh (Tecumseh, MI) I want to thank you for acting fast on my call to you and for the technician that came. He has been very helpful on all the questions I had I would recommend him again. Thank You -Jeremy Bennet (Adrian, MI) Jim was friendly informative and answered all question knowledgably and efficiently. He made sure everything was fixed to my satisfaction. -Patricia Baldwin (Lambertville, MI) Thank you. The service out to our house was very efficient. The job was completed in a timely manner and we’re very satisfied with Mike’s work and knowledge of the appliances. – Beth Slattman (Lukey, OH) Appreciate your honesty and efficiency. – Christine Buehur (Palmyra, MI) Very professional. I explained the problem and within minutes he diagnosed the problem with my washer. Sorry to say I need a new washer but Mike is the reason I will call back in the future. We had Jim as our technician, he was professional and fast. Dave Smith Appliance Services were able to diagnose the problem fast and professionally. Our technician, Jim, did a great job of explaining his process and checked to see if we needed any other appliances fixed or repaired. Very satisfied with everything!! Nick did a wonderful job. Nick was very helpful, he was able to solve the problem and get it fixed very quickly. He was also very professional and friendly. I had a great experience with Dave Smith Appliances and would recommend them to others. They were able to answer all my questions, set up an appointment convenient for me, and found a solution to my problem very quickly. I would recommend them to anyone. I will not hesitate to recommend your company. Very Pleased! Five Stars on Everything!! Dave Smith Appliance Services has recently completed the repair of my eighteen year old GE refrigerator. I am impressed with the display of concern for clients by all members of the staff that I dealt with. For me, it has been a very satisfactory experience. They responded immediately to my call and followed up with a detailed, well explained plan to deal with my problem. The technician arrived at the exact time of the appointment and within a short time completed his inspection and presented an estimate of the cost to repair my appliance. The estimate was fair and reasonable and proceeded to complete the repair. The area under the refrigerator had not been cleaned for quite some time because its heavy and I haven’t been able to move it. He patiently waited while I cleaned it before he put it back place. From the beginning to end, every action on the part of this company has been the utmost in cooperation and professionalism. I do not hesitate to recommend them. It has been a pleasure to deal with such trustworthy and capable professionals Thank you for the fast, professional service we received as first time clients on our dryer repair. I’m so appreciative of your efforts of timeliness and efficiency. Customer Review by Ronn Koester from Angie’s List about his appliance repair services reported on May 3, 2012. Overall: A Price: A Quality: A Responsiveness: A Punctuality: A Professionalism: A Category: Appliance Repair – Large: Work Completed Date: May 2, 2012 Approximate Cost: $340 Description of Work: Worked on front-loading washer. Stated that if the repair did not fix the problem would return and fix it for the difference in cost of a more expensive part only. Member comments: No problems. Work completed on time. They came out yesterday and the tech’s name was Mike and he arrived on time and promptly found the problem with my ice maker. I had bought a new water fill valve and that wasn’t the problem, Mike found my line froze up and took everything apart and thawed it out, He even instructed me on how to do it. The cost was very resonable and i wouldn’t hesitate to use them in the future. Thanks TW. Mike has come to our house twice in the last couple of months, once to fix the dishwasher and the second time to fix my dryer. Both times he was efficient, friendly, and helpful. They both work like new! I am always so happy to find dependable businesses for home repair. We also had same day service both times we called. Thanks! Dave came out to fix my refrigerator/freezer. This was after I had had another company out to supposedly fix the problem. Dave was very knowledgeable and thoroughly explained the problem and solution with me. My refrigerator is now operating better than it has in a long time. I have their number on speed dial now. I highly recommend David Smith Appliance Service and will definitely use them again in the future. Thank you. I am new in the area and after searching online for a repair service for my refrigerator, I chose Dave Smith Appliance Services because of it’s great standing from the Better Business Bureau. I was NOT disappointed. From my first phone contact with Ruth and then the prompt and professional service from Mike it has been a very good experience. I would have thought both of these employees were the owners of this business just from the professionalism they showed. It’s obvious they love where they work and what they’re doing. Four stars and two thumbs up to Dave Smith Appliance Services. You’re doing a fantastic job, Dave! Wonderful Company….I didn’t have any idea who to call to fix my refrigerator. Called ” Dave Smith Appliance Services” and one other place.. The lady who answered the phone at Dave Smith’s was very kind, answered all my questions, and was very confident about the company… so I chose them… they were out within a half hour, fixed the appliance, cleaned up after themselves and were out the door… the service tech’s were very professional. I am very particular about who I let in my home. I talked to them in the driveway before letting them in…they put me at ease immediately…”Dave Smith Appliance Services” will be doing all of my repairs and all of my friend repairs…OUTSTANDING!! Dave Smith is very honest and very helpful because he came right out when I needed him; he always does. I have had him out a dozen times. We had the unfortunate experience of our refrigerator completely stop working… I contemplated going out and purchasing a new one when a friend of mine referred me to Dave Smith Appliance. They were very kind and courteous and professional. The one thing I found to be most helpful is they actually showed up when they said they were going to… both visits! I would highly recommend them to anyone looking for a dependable and fair company for appliance repair. Thanks Dave for saving me money with the repair (rather than going out and purchasing a new refrigerator). We will definitely be contacting you the next time we need your services. He found the problem within minutes and had my refrigerator fixed. The parts were on the truck so I didn’t have to wait. He also educated me on a possible recall on my stove and told me how to check it out. Will definitely call them again.
Human dendritic cells conditioned with Staphylococcus aureus enterotoxin B promote TH2 cell polarization. Immune surveillance against microbes at sites of interface with environment involves immediate recognition of pathogen-associated molecular patterns by dendritic cells (DCs). According to their first-line position, DCs are key parameters for the establishment of an appropriate innate and adaptive response against pathogens to avoid disease development. Even though their role in pathogenesis is well known, bacterial toxins have been less examined for their ability to drive DC activation and T-cell polarization. We made the assumption that early conditioning of DCs with Staphylococcus aureus enterotoxins could take part in T-cell polarization. Human monocyte-derived DCs were stimulated with S aureus enterotoxin B (SEB) and characterized with respect to secretion of inflammatory cytokines and their ability to drive polarization of naive allogenic T cells. We demonstrated that SEB induced maturation of DCs and that SEB-activated DCs secreted high levels of IL-2 but no IL-12p70, contrary to LPS-activated ones. Accordingly, we further showed that SEB-activated DCs were able to drive polarization of naive T cells into the T(H)2 subset. By using highly purified SEB and Toll-like receptor (TLR)-2 stably transfected Human Embryonic Kidney (HEK) 293 cells, we demonstrated for the first time the ability of SEB to induce TLR2 signaling. Furthermore, the involvement of SEB-TLR2 interaction in activation of dendritic cells was supported by neutralizing activity of anti-TLR2 antibodies. Altogether, our findings reinforce the notion that bacterial toxins may appear as new pathogen-associated molecular patterns, which could play a major role in inflammation and bacterial pathologies.
Rail transport in Western Australia Railways in Western Australia were developed in the 19th century both by the Government of Western Australia and a number of private companies. Today passenger rail services are controlled by the Public Transport Authority (a department of the Government of Western Australia) through Transperth, which operates public transport in Perth, and Transwa, which operates country passenger services. Great Southern Rail operates the Indian Pacific. The interstate standard gauge line east from Kalgoorlie is owned by the Australian Rail Track Corporation, with most other lines leased by the state to Arc Infrastructure. Freight rail was privatised in 2000. General intrastate freight is mainly operated by Aurizon, while grain traffic is operated by Watco under contract to the CBH Group. Interstate traffic is operated by Pacific National and SCT Logistics. A number of private iron ore haulage railways also operate in the Pilbara region of the state. History The Western Australian lines developed in narrow gauge from Fremantle (the port of Perth), Geraldton, Bunbury, Albany and Esperance, mainly for carrying grain and minerals, with the private Midland Railway Company and Great Southern Railway adding gauge lines in the Wheatbelt with the support of land grants. In 1907 the standard-gauge Trans-Australian Railway from Port Augusta, South Australia to Kalgoorlie was authorised. Construction started in 1912, and it was completed in 1917. It was run by the Commonwealth Railways. In the 1960s standard () gauge lines penetrated to Perth and Esperance and long distance heavy-haul railways were built in the Pilbara region by major iron mining companies, particularly BHP and Hamersley Iron. The Perth suburban lines were electrified and extended. Government railways were controlled by the Department of Works and Railways from 1877. The department became Western Australian Government Railways (WAGR) in 1890. WAGR became Westrail in 1975 and continued to manage both passenger and freight rail services in Western Australia until 2000, when the freight business was sold to the Australian Railroad Group who operated it under the Australian Western Railroad brand. This business was purchased by Queensland Rail in 2006 and rebranded Aurizon in 2013. Westrail’s freight rail lines were leased to WestNet Rail, another subsidiary of the Australian Railroad Group. This business was acquired by Babcock & Brown in 2006 and sold again in 2010 to Brookfield Asset Management and rebranded Brookfield Rail. In July 2017 it was again rebranded as Arc Infrastructure. The WAGR's remaining functions, including owning the rail network and operating regional passenger services were transferred to the Western Australian Government Railways Commission. On 1 January 2003, the commission's functions were absorbed by the Public Transport Authority with passenger services operated under the Transwa brand. Timeline 1871 - Private Ballaarat Tramline opens from Lockville to Yoganup, south of Perth 1879 - WAGR railway gauge line opens between Geraldton and Northampton 1881 - Eastern line opens from Fremantle to Perth and Guildford 1893 - South Western line opens from Perth to Bunbury 1894 - Midland Railway Company opens the Midland line from Midland Junction to Walkaway, connecting with the WAGR line to Geraldton 1896 - Eastern Goldfields line reaches Kalgoorlie 1917 - Standard gauge Trans-Australian Railway connects eastern Australia with Western Australia, with a break-of-gauge at Kalgoorlie 1968 - Kalgoorlie to Perth standard gauge line opens. (Lines east of Merredin converted to standard gauge, including Kalgoorlie-Esperance & Kalgoorlie-Leonora. North and south of Merredin remains narrow gauge only. West of Northam becomes dual gauge.) 1986 - Electrification of Perth suburban lines from with a 25 kV AC overhead power supply commences 1993 - Northern Suburbs Transit System commences operation with a new line opened from Joondalup to Perth 2007 - The Mandurah line opens as part of the New MetroRail project, which also included construction of the Thornlie spur and Greenwood station 2010 - the Metro Area Express was announced. The project would have introduced light rail to Perth along some of the former team routes. The project was abandoned in 2016. 2017 - Metronet formed to manage extensions to the Perth rail system including the Thornlie-Cockburn link. First lines Private railways for carrying timber were built south of Perth from Lockville (just north of Busselton) to Yoganup in 1871, and from Rockingham to Jarrahdale soon after. The first government railway in the State was a gauge line between Geraldton and Northampton and was opened in 1879 to transport lead and copper to port. It closed in 1957. The WAGR opened the Eastern line from Fremantle to Perth and Guildford in 1881. It was extended to Chidlow in 1884, York in 1885 and Beverley in 1886. Branch lines were built to Belmont, Northam and Toodyay by 1888. Southern lines The Beverley line was extended to Albany in 1889 by the Great Southern Railway, which was taken over by WAGR in 1896. A line was built from Perth to Bunbury in 1893, with branches to Collie, Busselton and Bridgetown. Northern lines The Midland Railway Company opened a line from Midland Junction to Walkaway in 1894, where it met the WAGR line from Geraldton opened in 1887. It was acquired by the WAGR in 1964. Goldfields line The Northam line was extended to Southern Cross in 1894 and Coolgardie and Kalgoorlie in 1896. This line connected with the standard gauge Trans-Australian Railway to eastern Australia in 1917 at a break-of-gauge. The replacement standard gauge line opened in 1968. Timber lines Wheatbelt branch lines Isolated branch lines The Western Australian Government Railways had two isolated branches: The isolated Marble Bar Railway was opened in July 1911. The last train to run out of Port Hedland operated on 25 October 1951, with the railway closed on 31 October 1951. The Hopetoun to Ravensthorpe railway was an isolated branch opened on 3 June 1909, and closed on 23 February 1935. The Hopetoun jetty line was handed over to the Harbour and Light Department on 1 January 1936. It was officially closed on 13 January 1946. Operations Perth suburban network From 1990 Perth electrified its existing railway lines, utilising electric multiple units and a 25 kV AC overhead power supply system. In 1993, the Northern Suburbs Transit System commenced operations. 2007 saw the completion of the New MetroRail project. Regional passenger Transwa controls public transport services outside of Perth, including passenger services from Perth to Kalgoorlie, Northam and Bunbury. These trains are named the Prospector, AvonLink, and Australind. Great Southern Rail operates the Indian Pacific from Perth to Adelaide and Sydney. Pilbara iron ore lines Four isolated heavy duty railways for the cartage of iron ore in the Pilbara region have always been private concerns operated as part of the production line between mine and port. These lines have pushed the limit of the wheel to rail interface which has led to much useful research of value to railways worldwide. In April 2008, Fortescue Metals Group opened the Fortescue railway from Cloud Break mine to Port Hedland. In 2016, Hancock Prospecting opened a line from Roy Hill. Another iron ore line has been proposed to the port of Oakajee, this will have open access to any iron ore mine wishing to use it. A dual gauge network based on the new Oakajee Port north of Geraldton has been proposed by the Department of Transport. In 2010, Rio Tinto announced plans to expand capacity on the railway line linking its iron ore mines to Dampier; this would increase capacity to 230 million tonnes per year, to meet increasing demand for iron ore. The railway lines are: Hamersley & Robe River railway (Rio Tinto) Mount Newman railway (BHP) Goldsworthy railway (BHP) Fortescue railway (FMG) See also Rail transport in Australia Railway accidents in Western Australia History of rail transport in Australia List of Western Australian locomotive classes Closed railway stations in Western Australia References Further reading Affleck, Fred N. On track : the making of Westrail, 1950 to 1976 . Perth : Westrail, 1978. May, Andrew and Gray, Bill. A History of WAGR Passenger Carriages. Perth:The Author, 2006. Quinlan, Howard & Newland, John R. Australian Railway Routes 1854-2000 2000. External links Pilbara Railways – rail enthusiast site Map of country railways and passenger services Rail Freight Network Map Arc Infrastructure *
Are we really committed to lifelong education? In this inaugural issue of JCFN, I wish to introduce a column that will appear in each issue. It is the intent of the editor to relate the contents of this column to current issues that have an impact on the nurses who care for children and their families. Your input is crucial if this goal is to be accomplished. I need to hear from you concerning the factors, forces, and foibles that are creating challenges in your practice.
Channelings from Paula Perelman Rise and Shine: Your Life Matters! Seize each and every moment dear ones. Welcome your world with each breath you take. Make each step count as a time to discover, unfold and rejoice at what is presented to you at all times, that which awaits your awareness and acknowledgment of the gift coming forth to greet you. Rise and shine, allow your entire being to radiate in all of its glory and beauty, inside and out. Each and every part of you is perfect in every way. Each and every part of you awaits your full embrace, wholeheartedly. What are you waiting for, is your heart beating and are your lungs taking in air? Then let yourself recognize the miracle that you are, just as you are, right here and now, with the understanding that you can create and be anything that you dream, or that your heart desires. You dear ones, all of you are potential Masters at life, students at times and teachers at other times, all capable to learn and grow your mind-knowing and inner-instincts in a way all unique to you, an individual Light all your own. Do you find yourself to be this amazing being of light and Love or have you forgotten to take a deep long look at who you are right now? Look deep, yes, this is where your gifted and talented resources reside, inside of you, each and every one of you. Not one of you is without their Magnificence within. Claim this now; don’t delay another moment to captivate your attention to what is inherently yours this lifetime. All that you are is a gift to this world and a gift to your world. All that you are is connected to the Divine Plan of being in the right place at the right time. Each step, each breath, each idea and thought, each heartbeat, is part of the natural rhythm of the Divine Plan and Bigger Picture oflife unfolding. You are right where you need to be and as you move forward you will be in that right place at just the right time, with each step, breath and heartbeat. This is your life, your path of purpose, designed by you dear ones, and now lived and experienced by you. Make it a great one, give it all you’ve got; and as each new day you are blessed to live, dream and “be” comes forth to greet you, open fully to the “all” of it, the “everything” being offered, as there is only Love to be found and experienced! A magnificent life indeed!
Lego Lord of the Rings (PS3) Review Lego Lord of the Rings comes along in a massive procession of already impressive titles. Marrying the hugely popular Lego franchise to the just as widely know Lord of the Rings franchise seems like a logical progression for the team at Traveller’s Tales. Hot off the highs of the recent Lego Batman 2 TT Games had it all to play for in trying to bring another beloved franchise to life with the virtual plastic bricks. Rest assured though they have managed to not only bring the series to the Lego franchise, they’ve also made a cracking game. Lego Lord of the Rings offers you up the quest we all know and love. Getting to join Frodo and friends on this epic quest has always been an enticing prospect be it in the original book form, the movies or other games. What Traveller’s Tales manage to do here though is infuse their own brand of comedic genius in to the mix. Lego Lord of the Rings follows the now expected format of its predecessor titles – why fix something that’s not broken. But in what is now the underlying flow for these game, each iteration slowly improves on the one before. Lego Batman 2 for instance brought us our first fully voice Lego series experience – and excellent it was too! Here the game employs the now well used “hub” mechanic. Where as in Lego Batman 2 you had a slightly unwieldy Gotham to navigate, in Lego Lord of the Rings you have the massive Middle-Earth map to travel around. From The Shire, to the Prancing Pony at Bree and then on to the mine of Morria. You can explore it all in the over-world map. The neat twist here this time is that as you traverse these areas you can take on simple fetch and carry type quests. This will lead you to gaining more and more goodies – like the Mithril blocks that litter the levels and hub. These can then be given to the blacksmith in Bree to forge unique items in the game – some are for quests and some customise your characters or unlock new characters. All this is just in the joining world that stitches the levels of the game together! As with the other Lego games completing the main story is a sizeable amount of gaming – you’ll be looking at around 12 – 15 hours. That’ll give you a rating of about 30% – 35% completion. You then have all the quests and other hidden goodies to deal with. The game, as ever, is massive! Initial concern of how well the Peter Jackson vision of The Lord of the Rings would gel with the Lego take TT Games would use were soon washed away. The voice work can seem a little misplaced at times but overall they work it in superbly. Adding subtle flourishes here and there and comedic elements where they can and keep things still tight. Small visual gags, often off in the background, are such nice touches and like a great comedic movie or TV show you’ll be discovering things you missed the more you play them. Visually the game really is stunning at times. Seriously if this engine was being used to power a T/12 plus title, with loads of action and first/third person happenings you’d be hearing people singing its praises for graphical prowess. The water effects are stunningly good and the engine handles so effortlessly. Sound and music design has been equally well catered for thanks to the use of the movies gorgeous score. A splattering of the same old bugs and quirks creep in here as they have pretty much since the series started. Object, sometimes vital quest ones, disappear or take an age to spawn. Level direction is sometimes a little “loose” and unguided. Many could and will argue that it’s the same game at it’s core that they’ve been playing these past 12 iterations – if you’ve burnt out on this series there is little in Lego Lord of the Rings that I can say will reignite your passion for them… unless you’re a massive Lord of the Rings fan that is. Final Thoughts Lego Lord of the Rings is a superb game and a worthy entrant in the top 5 games in this series. The movie production values along with the superbly crafted world that Traveller’s Tales create just make it a joy to play. A handful of small issues and the repetitive gameplay stop it from being the “one Lego game to rule them all” but it’s right up there with the best of them. It looks fantastic, plays just as well as ever and offers the kind of value for money prospect that parents dream of. If you’re a fan of the past games then this is one of the best. If you’re a fan of Lord of the Rings then this is superb fan service. If you just like a good, fun , well crafted game then you need to give Lego Lord of the Rings a shot. You really won’t regret it. About Zeth Zeth is our EU Senior Editor and has been writing about video games since he joined BG back in 2008. He's pretty old and has been a gamer since he played Space Invaders as a young boy in the 80's. His genre tastes lean towards platformers, point-and-click adventure, action-adventure and shooters but he'll turn his hand to anything.
California became the first state in the nation to pass a law prohibiting public schools from using the term “Redskins” as a team name or mascot. Gov. Jerry Brown on Sunday approved the measure barring the use of the term that many Native Americans find offensive but vetoed a separate measure that would have barred public properties from being named after individuals associated with the Confederacy. As of Jan. 1, 2017, all public schools will be barred from using the term “Redskin,” which many Native Americans consider a racial slur. The measure by Assemblyman Luis Alejo (D-Watsonville) will allow schools that use materials that contain the term, such as uniforms, to phase out their use to alleviate cost concerns. The new law will affect four California high schools in Merced, Calaveras, Tulare and Madera counties. SIGN UP for the free Essential Politics newsletter >> Oneida Indian Nation Representative Ray Halbritter and National Congress of American Indians Executive Director Jackie Pata, leaders of the advocacy group Change the Mascot, used the new California law to exert pressure on the Washington Redskins, the professional football team that has faced sharp criticism over its name. “This landmark legislation eliminating the R-word in California schools clearly demonstrates that this issue is not going away, and that opposition to the Washington team on this issue is only intensifying. The NFL should act immediately to press the team to change the name,” Halbritter and Pata said in a statement. Brown was less receptive to a bill by state Sen. Steve Glazer (D-Orinda) that sought to prohibit public buildings and parks from carrying the name of Confederate figures. Glazer introduced the bill after a mass shooting in Charleston, S.C., catalyzed a movement to remove the Confederate flag from public buildings. Brown, in his veto message, said such an action was “long overdue.” But he said the naming of public buildings was different and an issue “quintessentially for local decision makers.” “Local governments are laboratories of democracy, which, under most circumstances, are quite capable of deciding for themselves which of their buildings and parks should be named, and after whom,” Brown wrote. Glazer, a former Brown adviser, rebuked the governor’s veto on Twitter. “Locals have had decades to remove confederate leaders from places of honor in Ca. Veto is hollow defense of unacceptable status quo,” Glazer wrote. Also on Sunday, in a final sweep of bill actions for the year, Brown approved laws that will: * Ban professional baseball players from using chewing tobacco on the playing field of major league stadiums. * Authorize state employees to use ride-hailing services such as Uber and Lyft and short-term rentals such as Airbnb while traveling on state business. * Legalize the use of electronic skateboards. Brown also vetoed a measure that would have expanded unpaid family leave to allow workers to take up to 12 weeks off to care for an ailing sibling, grandparent, grandchild, parent-in-law or domestic partner. The governor, in his veto message, said the bill by Sen. Hannah-Beth Jackson (D-Santa Barbara) created a disparity between state and federal law that could require employers in some cases to grant up to 24 weeks of leave. “I am open to legislation to allow workers to take leave for additional family members that does not create this anomaly,” Brown wrote. Follow @melmason for more on California government and politics. ALSO: California to restrict antibiotics use in farm animals ‘Right-to-try’ bill to help terminally ill access experimental drugs falls flat In wake of school shootings, Gov. Jerry Brown bans concealed guns on California campuses
Metalform in Dannevirke has an assembly line that will be a welcome sight for any health worker. But managing director Campbell Easton says it was a risk to set up. "We just decided to tool up and we bought all the materials at our own risk and decided just to do it," he told 1 NEWS The company usually produces high-end electronic machinery but facing an uncertain future under lockdown, switched to making face shields. "We were looking down the barrel of redundancies or mass redundancies when we get back from this, so hopefully we can secure everyone's future here," Mr Easton says. Your playlist will load after this ad If money had been spent weeks ago, a healthy surplus of personal protective equipment would already be here, critics say. Source: 1 NEWS They're now making 30,000 face shields a week, supplying three DHBs and negotiating contracts in Australia and the Pacific Islands. "A lot of businesses are considering what Level 3 means for them and understanding that we are probably going to be in Level 3 for quite some time, so PPE is a really important part of what that picture looks like, so I can see us making these shields for a reasonably long time." Face shields are just one part of PPE. Whanganui company QSI is making up to 100,000 face masks a day. Manufacturing NZ wants the emphasis on local production, so it's registered 250 Kiwi businesses that can make PPE. But New Zealand is still reliant on overseas suppliers, with 75 million items expected to land in the next eight weeks. Catherine Beard from Manufacturing NZ says businesses are throwing their hands up to help out. Your playlist will load after this ad It comes as their workload has increased with extra homebirths during lockdown. Source: 1 NEWS "Everyone wants to help in this situation if they can and particularly if they're a business that's been unable to work because they weren't classified essential, so they've got a lot of staff sitting around not doing anything," she says. Mr Easton says it could be up to the central Government to help support some factories diversify. "With the right support, repurposing current factories makes a lot of sense." In the event of a breakdown in the supply chain, the Ministry of Health says it will first use the national reserve stocks, but officials are looking at ways to make the products here in New Zealand from locally sourced materials. In the meantime this Kiwi company isn't waiting around, ramping up production to supply the front line.
75 N.W.2d 644 (1956) In the matter of the disbarment of Charies E. GORSUCH, a licensed attorney. No. 9569. Supreme Court of South Dakota. March 19, 1956. *645 Phil Saunders, Atty. Gen., George Wuest, Asst. Atty. Gen., for plaintiff. Roger Campbell, Aberdeen, for defendant. BURNS, Circuit Judge. This is an original proceeding brought in this Court on a complaint by the Attorney General of the State of South Dakota, based on a report of the Grievance Committee of the State Bar of the State of South Dakota, requiring Charles E. Gorsuch, a licensed attorney of this State located at Aberdeen, South Dakota, to show cause why his license as an attorney and counsellor at law should not be cancelled and revoked. The complaint alleges violation of the Rules of Professional Conduct of the State *646 Bar of South Dakota arising out of a campaign conducted by said Charles E. Gorsuch for Circuit Judge of the Fifth Judicial Circuit during the general Election Campaign of 1954. It is alleged that various publications described and set out in the complaint caused to be made by Gorsuch were false, "scurrilous, irresponsible, unethical, unjust, not in accord with fair play, displayed bad faith, and a spirit of vindictiveness unworthy an attorney." The answer filed on behalf of Charles E. Gorsuch, hereinafter referred to as defendant, in substance denies any conduct which would be grounds for disbarment and suspension under SDC 32.1209. He alleges that the publications were privileged in that they were made in good faith and without malice to present what he believed to be pertinent facts with reasonable deductions therefrom to promote his candidacy for the elective office of Circuit Judge and to bring about the defeat of his principal opponent who resided in the same County. He admits that he singled out Mr. Philo Hall as his chief opponent because of SDC 32.0402, which provides that two judges shall be elected in the Fifth Judicial Circuit, but shall not be electors of the same County. The answer contains these admissions: "This defendant admits that the campaign conducted by him was undignified; that the proper judicial temperament of a candidate for Circuit Judge was not manifest in the printings, writings and cartoons used by this defendant; that in retrospect this defendant has come to the realization that the cartoons and caricatures used by him were undignified and did not ascribe proper respect to the office he was seeking, and has honestly concluded that the use of such devices or practices will never again be indulged by this defendant in seeking the suffrage of the voters of the Fifth Judicial Circuit." Also, in a personal appearance before the Court and by a written statement thereafter filed, Mr. Gorsuch stated to the Court: "It is with the deepest humility and utmost respect that I can advise this Court of the realization which is mine that in retrospect the campaign which I conducted in 1954 for Circuit Judge did not measure up to the statute (sic) and dignity of the office to which I aspired. "In this realization and with the firm resolve on my part that never again will occasion be found to conduct a disciplinary action of this kind, predicated upon a lack of respect for the institution of the Court, I respectfully petition that I be permitted to continue in the practice of the profession which has provided a living for me and for my family for more than a quarter of a century." The facts are established by stipulation filed by the attorneys for the parties. Defendant was admitted to practice as an attorney in this state on or about June 11, 1928, and for more than 20 years has been a practicing attorney in Aberdeen, South Dakota, in the Fifth Judicial Circuit. Early in April, 1954, defendant announced his candidacy for the office of Circuit Judge at the primary election of the year 1954. Soon thereafter one of the incumbent Circuit Judges in the Fifth Circuit, who had been in ill health, made a statement to a newspaper of wide circulation in the Fifth Circuit to the effect that his petitions for renomination had been circulated and were ready for filing, but that "if any candidate having the support of a substantial share of the bar is qualified this month by filing an adequate number of petitions I will not be a candidate * * *" Other candidates, including Mr. Philo Hall residing in Brown County, announced for the office of Circuit Judge. The incumbent Judge withdrew. Shortly thereafter a member of one of the larger law firms in Aberdeen called upon defendant to persuade him to withdraw as a candidate for Judge. Later the members of this firm and several other lawyers constituting a majority of the bar of Brown County by public advertisement endorsed the candidacy of defendant's Brown County opponent and an incumbent Judge who was a candidate for re-election, and made substantial financial contributions to an attorneys' committee organized to promote and secure their election. Some of them wrote letters to clients and made telephone calls on behalf of defendant's opponent. As would be expected in any such *647 group of established lawyers, some of them had been retained by or had rendered legal services at times for insurance companies, liquor companies, public utilities, railroad corporations and other corporations. Defendant's opponent in Brown County was a law partner of the general attorney for a railroad corporation until he withdrew from the firm prior to the general election. As a member of the firm this opponent had represented the railroad corporation and had been a paid lobbyist for this railroad at two sessions of the South Dakota State Legislature. In the course of his campaign for election as Circuit Judge, the defendant gave publicity to these facts by billboards, cartoons, so-called comic strip, and newspaper advertisements and statements. But defendant did not stop with a statement of the facts. In one "comic strip" the general attorney for a railroad was represented as engaged in "power politics" and exerting pressure on local attorneys for the company to work for a "former RR atty. and Lobbyist" and to contribute to his campaign fund. Two other cartoons showed railroad attorneys, insurance company attorneys, public utilities attorneys and liquor attorneys engaged in "power politics" and organized and working for the election of the candidate labeled "our man." With each of these cartoons were published the accompanying statements: "One Great Issue. My local Aberdeen opponent (Milwaukee Railroad attorney and Lobbyist) has accepted hundreds of dollars in campaign funds and services from a few Aberdeen Corporation lawyers. If elected ? ? ? Whose Judge would he be ? ? ? No other Circuit Judge candidate has been guilty of this practice. Why are they backing my local Aberdeen opponent?" Like statements were repeatedly made in different forms and with emphasis by large black type and underscoring in several newspaper display advertisements over the printed name of defendant. Thus not only by rhetorical question, by innuendo and by insinuation, but by direct statements and cartoons the defendant represented to the electorate that it was improper for lawyers to contribute to the campaign fund of his opponent in Brown County, that it was improper for such opponent to accept their support and contributions as made, that such lawyers had improper motives to influence the candidate in favor of their clients should he be elected judge, and that the candidate if elected would be improperly influenced and biased in favor of their corporation clients. We find nothing in the facts to sustain the charges of improper conduct and motives made by the defendant against his Brown County opponent and those lawyers who gave him their personal support and made financial contributions to a lawyers' committee organized to promote his candidacy. Of course, a candidate for judicial office who accepts assistance of lawyers, and lawyers who render personal and financial help to promote the candidacy of a lawyer for judicial office, must avoid any appearance of impropriety. The judicial candidate must give no reasonable ground for the suspicion that he will be improperly influenced as a judge, and lawyers supporting another lawyer or a judge for election to a judicial office must give no reasonable ground for the suspicion that they will be the recipients of favors from the candidate if elected. We agree with an opinion of the Committee on Ethics of the American Bar Association that "It is not improper for lawyers to contribute financially to the campaign of a candidate for judicial office, when in their opinion the candidate merits such support and the expense of the campaign, when reasonably conducted, exceeds that which the candidate should reasonably bear himself." We add that the support should be given and accepted under such circumstances that not only the evil of influence and favoritism in the work of the Courts is avoided but the very appearance of evil or suspicion of improper motives is carefully guarded against. The motive should be the selection of the best qualified candidate for judicial office and should not be a personal or selfish one. *648 One of the three members of the Grievance Committee of The State Bar of South Dakota dissented from the concluions and recommendations of the Committee because of his opinion that the advertising campaign conducted by the defendant was privileged under the principles stated in the case of Egan v. Dotson, 36 S.D. 459, 155 N.W. 783, 787. In that action for damages for defamation of character the Court said: "`What may be properly called the liberal view, and one which has the sanction of considerable authority, is that a charge made against a candidate for office is privileged if the person making it believes in the truth of the charge and has probable ground for his belief, for which purpose hearsay suffices, regardless of the fact that the charge is a false statement of fact.' "In other words, if a publication is not malicious, it is privileged under this rule, whether true or false. * * * In the year 1900 this court determined that the so-called liberal view conformed to a proper interpretation of our Constitution * * * and * * * Civil Code. This view has been consistently adhered to ever since, and is the settled law of this state." A lawyer as well as any other citizen is entitled to the benefit of such rule of privilege in a libel action, but a lawyer under his oath, the rules of professional conduct and SDC 32.12 relating to the duties of attorneys at law "should strive at all times to uphold the honor and to maintain the dignity of the profession and to improve not only the law but the administration of justice." Even in the exercise of a privilege a lawyer should so conduct himself that the work of the Courts and the administration of justice will not suffer by reason of his continuing to hold a license to practice law. This does not mean that the Court has the function or right to regulate the morals, habits or private lives of lawyers, who like other citizens are free to act and to be responsible for their acts, but when the morals, habits or conduct of a lawyer demonstrate unfitness to practice law or adversely affect the proper administration of justice, then the Court may have the duty to suspend or revoke the privilege to practice law in order to protect the public. Counsel for defendant in his brief earnestly asks these questions: "Does a citizen, because he is a lawyer, forfeit his right to criticise another lawyer who is a candidate for judge? Has he thus lost his right of Freedom of Speech? Has he thus forfeited his liberty protected by the due process clause of the Constitution of the United States? Must a lawyer refrain from the criticism of another lawyer who is a candidate for any legal or judicial office under the threat and danger of having disbarment proceedings filed against him?" We answer these questions in the negative. Courts will not exercise the power to grant or deprive a person of the privilege to practice law in such manner as to abridge the freedom of speech guaranteed by the Constitutions of the United States and this State. There is a right to criticise a lawyer or an incumbent judge who is a candidate for judicial office. There is a right to criticise a judge for his past actions in office and there is a right to comment on completed judicial proceedings. But for the right to speak freely, there is responsibility for abuse of the right. A person may have to respond in damages for libelous speech. A publication obstructive of a pending judicial proceedings may subject a person to punishment for contempt of Court. And in the case of a lawyer an abuse of the right of free speech may be some index of his character or fitness to be a lawyer. A lawyer may engage in political activity and speak as freely as any other citizen. But in a contest between lawyers for a judicial office, a lawyer under his oath and the duties imposed upon him by law has an added responsibility and should seek to maintain a higher standard of conduct than can be expected of one who *649 is not a member of a privileged and a responsible profession. How a lawyer may use or abuse freedom of speech even in a political campaign may have some relation to his professional qualifications. This proceeding is not a contempt proceeding in which it is claimed that a publication as to a Court or judge directly tends to impede, embarrass or obstruct the Courts in the administration of justice. The purpose of the proceeding is not to subject a party to punishment for contempt. It is a proceeding for the suspension or disbarment of the party defendant in which the burden is upon the complainant to establish that there has been misconduct on the part of the defendant which proves him unfit to be intrusted with the duties and responsibilities belonging to the office of an attorney. As to such proceedings this Court said in State v. Kirby, 36 S.D. 188, 154 N.W. 284, 289: "`They are not instituted or intended for the purpose of punishment. Their object is to preserve the purity of the courts and the proper and honest administration of the law. Attorneys are officers of the court, made so by its order when they are admitted to practice therein. The purpose of the proceedings for suspension and disbarment is to protect the court and the public from attorneys who, disregarding their oath of office, pervert and abuse those privileges which they have obtained by the high office they have secured from the court. The right to practice law is not an absolute right, but a privilege only. It is but a license which the court grants by its judgment of admission to the bar, and which the same court may revoke whenever misconduct renders the attorney holding such license unfit to be entrusted with the powers and duties of his office.'" The question is whether defendant's conduct demonstrates an unfitness to practice law after having exercised that privilege for more than 20 years. We take into account that defendant felt provocation for the publications he made during the course of his campaign for judicial office. He resented the imputation of unfitness for the office by those opposed to his candidacy. He misconstrued the Canons of Ethics to lead to the erroneous conclusion that a large segment of the bar of his home county had improper motives in supporting his opponent. The publications were made in the heat of an election campaign. The electors of the Fifth Judicial Circuit like the American people as a whole are politically mature and have had much experience in weighing statements made in an election campaign. The name calling, the unfair charges, the innuendoes and the destructive criticisms so characteristic of an election contest are not taken too seriously by the voters. It is well understood by the electors that the campaign statement is biased and the political cartoon is caricature. The exaggerations of an election campaign in the calmer reasoning which follows the election often appear ridiculous. This is not to say that we approve the campaign carried on by the defendant; we disapprove it. We do not find that the publications so related to the Courts as to directly tend to impede, embarrass or obstruct the Courts in the administration of justice. At the very least we do agree with defendant's admission that his conduct of the campaign was undignified and did not measure up to his statutory duties and the dignity of the office to which he aspired. We accept at face value defendant's apology and statement "that never again will occasion be found to conduct a disciplinary action of this kind, predicated upon a lack of respect for the institution of the Court." The Court commends the Committee of the State Bar and the other officers of the Court who have brought this proceeding to the attention of the Court and so diligently presented the matter to the Court. In view of the fact that this proceeding is one of first impression in this state and that the defendant in retrospect has recognized that his conduct did not measure up *650 to the standards required of a licensed attorney as herein stated, the Court concludes that no further disciplinary action by way of suspension of defendant's privilege to practice his profession is required in the public interest. The Court reprimands the defendant for the conduct disclosed in this proceeding and it is ordered that he pay costs in this Court. BURNS, Circuit Judge, sitting for SMITH, J., disqualified. All the Judges concur.
# If we generate code under the build directory then the backend needs to add # the build directory to the -sourcepath passed to javac otherwise the compiler # won't be able to handle the -implicit:class behaviour of automatically # compiling dependency classes. project('codegenjava', 'java') subdir('com/mesonbuild') javaprog = jar('myprog', config_file[0], 'com/mesonbuild/Simple.java', 'com/mesonbuild/TextPrinter.java', main_class : 'com.mesonbuild.Simple') test('subdirtest', javaprog)
OVER THE COUNTER: Supplements should reinforce, not replace, a good diet By Gary Kracoff and John Walczyk/Daily News Correspondents Tuesday Oct 30, 2018 at 12:42 PMNov 1, 2018 at 5:00 PM It's easy to dismiss taking vitamins and minerals during the summer, when products from the farmers market can hold much more than any pill. Strawberries, carrots, kale, spinach and tomatoes alone can provide us with generous amounts of important vitamins such as A, B, C and K, and several minerals. With a little more variety, the entire alphabet of vitamins can become a tasty, juicy joy to consume. In addition, fresh foods hold many other benefits: enzymes, fiber, flavonoids, amino acids and a host of nutrients. But the reality is that even if you eat all the right fruits and vegetables, their quality can vary depending on how old they are, how far they traveled to get to your plate, how they were stored, and where they were grown. Winter in New England means most everything you buy in the produce section of the grocery store had to take a long trip to get here. Though some people balk at supplements, they are a good, often cheap, way to ensure your family is getting the nutrients it needs. Most people even take some form of supplement and don’t realize it, such as when they eat fortified cereals, rice, breads and milk. On the other hand, supplementing your diet is much less complicated and costly than marketers and advertisers would have you believe. And what you should take regularly – assuming you eat a nutritious diet and have no particular health conditions – is minimal. We recommend a basic “core four” regimen that includes a multivitamin and multimineral pill; probiotics; omega-3 fatty acids; and antioxidants. Here are some things to keep in mind: Check your gut. Diets and supplements should be tailored to individual needs. Consider getting an evaluation by a functional dietitian/nutritionist, who will likely run blood tests to get the full picture of your metabolic function and create a program to meet your body’s needs. Some individuals have nutritional depletion as a result of medical conditions like leaky gut, and it is important to know how to manage that before embarking on a program of supplementation. If your body is not capable of absorbing or breaking down nutrients, a specialized program is needed. Think of pouring water in a flower pot with a large hole in it; the water and its nutrients never get absorbed by the plant. Small letters are better. Avoid multi-pills with mega-doses that will either be excreted in your urine or get stored in your body to possibly dangerously high levels. Also, buy a quality multivitamin and mineral supplement that will be easy to digest and meet daily requirements. Live and let live. Americans traditionally frown on foods high in probiotics: We tend to think food should be sealed tight, suffocated of air, and dead. But most foods containing probiotics – also known as “good” bacteria – are very much alive, including certain yogurts, kimchi, homemade sauerkraut and other fermented foods. Unless you’re eating these dishes regularly, we suggest a quality probiotic with about a dozen types of bacteria, which can improve gut health, digestion and immune system health. Fat is back. Another important nutrient is Omega 3 fatty acids, which are found in abundance in fish such as salmon and sardines. The fatty acids are believed to lower triglyceride levels, blood pressure, and risk of clotting, stroke and other heart woes. If you don’t eat fish at least twice weekly, we recommend taking a high-quality supplement that’s been verified to contain no mercury. Say yes to antioxidants. Antioxidants include vitamin C and vitamin E, selenium, beta-carotene, lycopene, lutein and zeaxanthin. These help combat the free-radical damage of cells caused by exercise, air pollution and sunlight. During the fall and winter you should consider other supplements, too. Vitamin D, for example, is a critical vitamin that is mostly obtained through exposure to sunlight. During the short days of winter, when you’re all bundled up, you’re more likely to become deficient in the nutrient, especially if you’re older. Low vitamin D levels can lead to fragile and brittle bones and possibly disrupted insulin production and reduced immune function. Because the colder months are also when you’re more likely to get sick, we recommend several supplements to boost the immune system, too. In lozenge form, zinc, for example, can help kill the common cold. Taken just after the start of symptoms, some believe zinc can shorten our battle with the virus. Intranasal zinc should be avoided, however, as the products may have side-effects including loss of smell. Certain herbal supplements, such as black elderberry, can also help at the very first signs of sickness. Ginger, meanwhile, may help with stomach discomfort. While all the supplements we mention here are safe at proper dosages, you should inform your primary care provider of what vitamins, herbal remedies and minerals you’re taking, because they could interact with other medications or exacerbate certain conditions. Zinc, for example, may interfere with some antibiotics, and vitamin K with blood thinners. If you eat commercial cereals, which are often fortified with nutrients, you should check them against your “multis” to make sure you’re not getting too much of a good thing, such as iron, which in high doses can be harmful. Finally, remember, no pill can replace the benefits provided by consuming fresh fruits and vegetables. But taking the right ones can help you maintain good health. Gary Kracoff has a degree in naturopathic medicine and is a registered pharmacist and John Walczyk is a compounding pharmacist at Johnson Compounding & Wellness in Waltham, Mass. For more information, visit www.naturalcompounder.com. Readers with questions about natural or homeopathic medicine, compounded medications, or health in general can e-mail gary@naturalcompounder.com or call 781-893-3870.
Q: How to predict a specific Image (from or outside dataset) after training the KNN classifier I have a simple KNN classification problem, the output of the code below is the accuracy of the classifier resulted after training the classifier and splitting the dataset into "train" and "test". What I want my system to be like is: First, train the classifier using dataset; Upload an image from URL; Classify it according to the dataset. For example, the output should be "class 1". I believe it's simple but I am pretty new to python. from sklearn.neighbors import KNeighborsClassifier neigh = KNeighborsClassifier(n_neighbors=5) dataset = pd.read_csv(fdes) X = dataset.iloc[:,:20].values y = dataset['target'].values from sklearn.model_selection import train_test_split X_train, X_test, y_train, y_test = train_test_split(X, y, test_size = 0.20) from sklearn.preprocessing import StandardScaler sc = StandardScaler() X_train = sc.fit_transform(X_train) X_test = sc.transform(X_test) neigh.fit(X_train, y_train) # Predicting the Test set results y_pred = neigh.predict(X_test) y_compare = np.vstack((y_test,y_pred)).T from sklearn.metrics import confusion_matrix cm = confusion_matrix(y_test, y_pred) #finding accuracy from the confusion matrix. a = cm.shape corrPred = 0 falsePred = 0 #prining results for row in range(a[0]): for c in range(a[1]): if row == c: corrPred +=cm[row,c] else: falsePred += cm[row,c] kernelRbfAccuracy = corrPred/(cm.sum()) print ('Accuracy of knn : ', corrPred/(cm.sum())) A: After all those steps, you can continue with: from io import BytesIO import numpy as np import requests from PIL import Image response = requests.get(url) img = Image.open(BytesIO(response.content)) img = np.array(img).reshape(1, -1) output_class = neigh.predict(img)[0] print(output_class)
Q: Retrieving the application name that has audio focus change I can't seem to find anything related to finding out what application got audio focus. I can correctly determine from my application what type of focus change it was, but not from any other application. Is there any way to determine what application received focus? "What am I wanting to do?" I have managed to record internal sound whether it be music or voice. If I am currently recording audio no matter the source, I want to determine what application took the focus over to determine what my application need's to do next. Currently I am using the AudioManager.OnAudioFocusChangeListener for my application to stop recording internal sounds once the focus changes, but I want the application's name that gained the focus. A: Short Answer: There's no good solution... and Android probably intended it this way. Explanation: Looking at the source code, AudioManager has no API's(even hidden APIs) for checking who has Audio Focus. AudioManager wraps calls to AudioService which holds onto the real audio state. The API that AudioService exposes through it's Stub when AudioManager binds to it also does not have an API for querying current Audio Focus. Thus, even through reflection / system level permissions you won't be able get the information you want. If you're curious how the focus changes are kept track of, you can look at MediaFocusControl whose instance is a member variable of AudioService here. Untested Hacky Heuristic: You might be able to get some useful information by looking at UsageStats timestamps. Then once you have apps that were used within say ~500ms of you losing AudioFocus you can cross-check them against apps with Audio Permissions. You can follow this post to get permissions for any installed app. This is clearly a heuristic and could require some tuning. It also requires the user to grant your app permissions to get access to the usage stats. Mileage may vary. A: Looking at the MediaContorller class (new in lollipop, available in comparability library for older versions). There are these two methods that look interesting: https://developer.android.com/reference/android/media/session/MediaController.html#getPackageName() https://developer.android.com/reference/android/media/session/MediaController.html#getSessionActivity() getPackageName supposedly returns the current sessions package name: http://androidxref.com/5.1.1_r6/xref/frameworks/base/media/java/android/media/session/MediaController.java#397 getSessionActivity gives you a PendingIntent with an activity to start (if one is supplied), where you could get the package as well. Used together with your audio listener and a broadcast receiver for phone state to detect if the phone is currently ringing you might be able to use this in order to get a more fine grained detection than you currently have. As Trevor Carothers pointed out above, there is no way to get the general app with audio focus.
Ask HN: How to security scan your web application? - kornnflake Just wondering what tools you guys use to perform security checks on your applications?<p>I'm using skipfish for the security scan. What are you guys using? ====== rollypolly Not a tool, but a good read on this subject nonetheless: <https://wiki.mozilla.org/WebAppSec/Secure_Coding_Guidelines> ------ s3b You could try brakeman if you're using rails.
Grayscale Fond buys in Grayscale and a handful of Ethereum whales have reportedly bought a lot of Bitcoin and Ethereum, although the market is at an annual low. 1 percent of the circulating bitcoins are owned by Grayscale Crypto currencies continue to be a difficult year in 2018. However, some large financial investors are taking advantage of lower prices by increasing their holdings of virtual currencies. The Grayscale Bitcoin Investment Trust (GBTC) now holds over 200,000 bitcoins on behalf of its institutional investors, according to Diar. This means that Grayscale Bitcoin’s investors now own approximately 17.4 million BTCs, which is about one percent of the current offering. This puts Grayscale at the top of the institutional BTC Investment Arena. Considering the longtime bear market, the company, which was founded in 2013 by the Digital Currency Group (DCG), continues to expand its market position on a monthly basis. The GBTC receives an annual fee of two percent on the participation of investors. For this reason, it makes sense for the company to help investors multiply their interest in Bitcoin. Given the fact that GBTC is a premium, another aspect of the increased BTC stakes could be. According to the company’s website, it calculates a 22 percent premium on Bitcoin compared to the market price of cryptocurrency BTC. As Grayscale’s interest in Bitcoins increases, the value of assets under management (trust under management) is reversed. The company’s total AUMs now total approximately $ 826 million, the lowest level in 2018. Apparently, in addition to the grayscale, other institutional investors are also expanding their stake in Bitcoin. When mid-November saw the first drop in prices, Mati Greenspan reported that eToro customers have slightly increased their holdings. Ethereum whales shop for Hodln The accumulation of the most important cryptocurrencies is by no means limited to Bitcoin. According to Diar, Ethereum whales, which are low-timeframe large money investors, bought more ethers in 2018 than any other year in the history of crypto-currency. Similar to GBTC, these investors own a significant proportion of the total amount of ethers circulating, around 20 million ETH or 20 percent of the total ETH in circulation. Thus, the whale populations of ETH have increased by 300 percent since the beginning of 2017. At present, there is a consensus on the beginning of a period in which big-capitalists from trade with Ethereum exit. Virtual currency is in many countries not legal tender, or is not backed by the government, and accounts and value balances are not subject to consumer protections. The information does not constitute investment advice or an offer to invest. VoiceofBitcoin.com is is not responsible for the content of external sites and feeds. Guest posts, articles or PRs are not always flagged as this!
1. Field This disclosure relates generally to semiconductor devices, and more specifically, to packaged semiconductor devices with lead frames. 2. Related Art Some types of packaged semiconductor devices include an integrated circuit die mounted on a lead frame. Lead frames are commonly manufactured by stamping/punching preformed sheets of metal such as copper, copper alloys, and iron-nickel alloys into desired shapes. Lead frames may also be made by etching the preformed sheets. Lead frames may also be made by plating metal in a desired pattern onto a carrier that is subsequently removed. The lead frame includes conductive leads that extend from close proximity to the die to beyond the outer edges of the package body. Wire bonds are formed between the die and the lead frame to form a die assembly that connects the die to bond pads on the lead frame. The die assembly is then placed in a mold that encases the die and the wire bonds or other electrical attachments. Mold compound is inserted or injected into the mold. Mold encapsulant is formed around the die and the wire bonds to protect the die and wire bonds from corrosion, water, and external forces that may damage the die or break the wire bonds. The ends of the leads that extend outside of the encapsulant are bent so that a foot portion of the lead can be soldered to contacts on a substrate such as a printed circuit board. In some situations, the assembly is subjected to wide variations in temperature, which causes the substrate to expand and contract at rates that are different than the encapsulated die assembly, placing stress on the bonds between the leads and the substrate. It is therefore desirable to provide assemblies that can operate is in wide temperature ranges without breaking contact between one or more of the leads and a corresponding contact on the substrate.
On first and second down against run-heavy formations, the 49ers run a 3-4 defense, right? Well, not always... Most of us have at least heard the terms "3-4", "4-3", and maybe even "Nickel" at one point or another. Many of us have a reasonable understanding of what these terms mean, even in their most basic form. We know that the first number refers to how many defensive linemen there are, and the second is how many linebackers are on the field. Sometimes this gets confusing though when you see guys line up in different positions or have different responsibilities. In this post I'll do my best to give both a basic view as well as some more detail, so you can take as much information from it as you like. For some fans, the X's and O's of football don't really matter much, as long as the offense moves the ball, the defense stops the other team, and our team wins the game. Then there are the rest of us, who love the more intricate details and the inner-workings of the scheme, just as much as we love the highlights of scoring, turnovers and big hits. For several years now we've all understood and agreed that the 49ers run a 3-4 defense in their "base" package. By base, we generally mean on first and second down, versus a probable run-play. In the Greg Manusky days it was Isaac Sopoaga, Aubrayo Franklin and Justin Smith up front, with Manny Lawson, Takeo Spikes, Patrick Willis and Parys Haralson as the linebackers. Franklin lined up over the center, engaging him while holding his ground and being ready to "shed" to make a play on either side of him. Justin Smith and Isaac Sopoaga lined up over the tackles and generally did the same thing: engage, hold, shed and make a play on either side. Below is a diagram showing the alignment of the defensive line in a traditional 3-4, with the DEs playing a 5-technique, and the NT playing the 0-technique, as mentioned. This is in-fact a "true" 3-4 defense, known as a 2-gap scheme. It's called that because of the aforementioned responsibility of the defensive linemen to make plays on either side of them, in other words, in two gaps. More recently however, the 49ers front-seven has looked slightly different than this, specifically since Vic Fangio came aboard. You'll notice that the nose tackle doesn't line up directly over the center most of the time, and the defensive ends (currently Justin Smith and Ray McDonald) aren't on top of the tackles as they were in the past. You might also have noticed that Aldon Smith often lines up on the line of scrimmage, sometimes in a three-point stance with his hand in the dirt. Below is an All-22 endzone shot from the Super Bowl showing the 49ers lined up in an alignment that differs from the above image. You'll notice that Sopoaga is shading the center's right shoulder, McDonald is outside of the right tackle, and Justin Smith is between the guard and tackle. So what sort of defense is this? Brooks and Aldon Smith are both up on the line of scrimmage, looking poised to come forward. It's almost as if there are five men on the defensive line instead of three linemen and four linebackers. What you see here is actually a 4-3 under front. The term "under" means that a defensive lineman is "covering up" the weak-side guard. "Over" would mean the strong-side guard is covered up. The strong-side is generally where the tight end lines up, or the side where the offensive formation has the most players. In any case, the under/over fronts differ from the 3-4 defense because they don't have defensive linemen directly over the tackles and center, as the first illustration showed. Now, why is it suddenly a 4-3, even though the same three defensive linemen are on the field as they would be in a true 3-4? The reason is that the weak-side linebacker isn't really playing like a linebacker; he's more of a defensive end. Rather than being back off the line of scrimmage, roaming around waiting for the play to come into his area, he's going forward, trying to get into the backfield and either trip up the running back or sack the QB if it's a pass play. In this case the weak-side defensive end is Aldon Smith. Now, Ahmad Brooks is also relatively close to the line as well. His job is to read the play and either cover the TE man-to-man if it's a pass, drop into a zone (if it's zone coverage instead of man), or read a run play and contain the edge or make a play. Because of his added responsibilities in coverage, he plays more like a traditional linebacker and thus isn't considered a defensive lineman. The image isn't the best because it's a two TE set, making it a relatively balanced formation, but the 49ers obviously want to believe this is going to the right side. I say this because if the formation is strong to the offense's left, they'll shift the defensive alignment, like below. Here you see that the NT is shaded on the center's left shoulder, Justin Smith is outside of the tackle (instead of in the gap between guard and tackle), and McDonald is in the G/T gap. This mean's Aldon Smith has the outside linebacker responsibility of potentially covering the TE or dropping into zone, whereas Ahmad Brooks is the rush defensive end, charged with getting into the backfield and blowing up the play. Again, they flip the alignment based on the offensive "strength" side. The beauty of the 4-3 under is that you can play it with essentially the same type of athletes as the traditional 3-4, to an extent. What we haven't touched on is the fact that while the true 3-4 uses 2-gap defensive linemen (as mentioned earlier in the post, making plays on either side of their man), the 4-3 under is a 1-gap principle. This means that each player is responsible for penetrating the gap in front of him, not standing and holding the point. The inside linebackers will handle anything that comes through the open gaps. As I said, you can essentially play the under front with 3-4 personnel, but they must be guys who are capable of penetrating. The idea is that if they are a threat to penetrate the gap, the offense double teams them, taking a blocker out of the equation ... a blocker who could have otherwise released and tied up the linebackers. To a degree, a strong player who isn't the quickest penetrator can still play in a 1-gap system as long as he uses his strength to occupy two blockers. If he can't do that the offense will simply send the adjacent lineman off to clean up the linebacker, and now the running back is seven yards down the field, untouched. The basic responsibilities of the 4-3 under players are as follows: The most versatile player is the SAM (strong-side linebacker). He lines up on the outside shoulder of the TE, jams him at the line so he can't get a free release into the pass pattern, must drop underneath in zone coverage or cover man-to-man at times. Oh, and he must also be ready to rush the passer at any time if the call dictates it. Inside of the SAM is the strong-side DE. This is a run-stopping, large man who's strong and hard to overpower. His job is to stop the run to his side at all costs. I'd say many traditional 5-technique DEs in the 3-4 can play this position, as well. The nose tackle must be a large man who can withstand constant double-teams from the center and guard. Many 0-tech NTs in the 3-4 can also handle playing the 1-tech in an under front, but not all of them. The weak-side defensive tackle basically needs to be Justin Smith. An unstoppable force who get's into the backfield no matter what you do to stop him. He needs to be the best interior pass-rusher you have, capable of penetrating easily against 1-on-1 matchups with the guard. Many 3-tech DTs in the 4-3 can play this position, but not many 3-4 5-tech DEs. Justin Smith is not human, however. Finally you have the weak-side DE; in the 49ers' case, Aldon Smith. This needs to be your best edge-rusher, a beast 1-on-1 vs. left tackles and also a guy who can keep contain on the edge against the run. This is your double-digit sack man. Many pass-rushing 3-4 OLBs and 4-3 DEs can play this position, but they must be nearly unstoppable players. It should also be noted that I did see the 49ers in a traditional 3-4 alignment as recently as the Super Bowl. It seems that Fangio likes to mix things up, which is why he favors versatile players on his defense. At this point in the NFL though, if you play DL you better be able to do it all if you want to have a long career. Few teams lack creativity and systems change with new coaching staffs and new teams, etc. The good news is that the lines are somewhat blurred between players who only fit in a 3-4 or 4-3, especially if you have a rotation of players going into the game. An excellent 4-3 defensive end can play for a team like the 49ers now as part of a platoon along the defensive line since he would be great in their under front on the weak-side. All he has to do is line up on the weak-side and do what he's always done: get upfield and hit either the RB or QB while containing the edge. Granted, having two guys who can play either side of the front is even better. The 49ers are doing this to a degree but it's easier for them because they don't ask much of their edge players in coverage. Still, a spot along the defense can be found for guys, no matter their skill set ... but it's the versatile players who stay on the field the most. In summary, you'll see the 49ers run a mix of 3-4 and 4-3 under fronts based on the team, formation and specific offensive players on the field. It's just another way that the coaching staff modifies their approach to be as effective as they can be on a play-by-play basis.
Dick Dobson: He appears to be the winner of the Erie County Sheriff’s primary against Bert Dunn, pending counts of absentees, etc. Dunn learned that money alone doesn’t buy you an election – you have to get out there, and you have to spend it. Dobson out-ran Dunn from day one, and he squeaked out a victory with only 500 votes or so separating them. Now, it’s on to defeat the anti-professional incumbent. (Micropolitically, this is a gold star for Frank Max and a bruise for Jeremy Zellner). Wynnie Fisher, Betty Jean Grant, Byron Brown: all of them defeated their opponents by more than 10 percentage points. Fisher and Grant were up against Steve Pigeon / Kristy Mazurek candidates and earn Jeremy Zellner gold stars. Indeed, Zellner’s clever effort at unifying the party through his unqualified endorsement of Byron Brown also earns him a gold star. Moore may be a headache in November assuming he’s on the Working Families line. Pat Burke: From South Buffalo bartender to winner of a legislative primary. No one gave Burke a serious shot until the day of the election, and it was all centered on turnout – if the South Buffalo portion of the district came out for Burke in a big way, he could eclipse Dearmyer and/or Zydel, the Cheektowagans. That’s exactly what happened, and while Dearmyer had a lead through the first half of the night, Burke came charging out of nowhere to take a pretty convincing lead. Chances are this won’t be over today, as all votes get counted, but credit goes to Burke, who ran without help from either the Pigeon faction or Headquarters, and claims to be independent of all of them. That’s great, so long as he doesn’t sell out to the Republicans. Barbara Miller-Williams: Quite possibly the worst transactional legislative horror show ever to jump out at you is leading incumbent Tim Hogues by just 20 votes. This is the woman who sold out to Chris Collins for a big chunk of money for the Colored Musician’s Club – her husband is on its board. With paid-off silence, she collaborated with the Republican dismantling of health clinics and other critical services for her poor urban constituency. She became the de facto head of a Republican legislature that was little more than a Collins marionnette, and if you watched Collins last night, he is one of those right wing scumbags who has nicer things to say about neofascist autocrat Vladimir Putin than his own country’s President. This race is going to be litigated, so it’s not over yet, but simply by making it competitive at all, Miller-Williams shows that she shouldn’t be counted out yet. Query why she’s still a Democrat, though. That’s what tens of thousands of dollars from Steve Pigeon and Tim Kennedy will buy you, though. Mary Giallanza Carney and Deanne Tripi: won the Family Court race. I generally stay out of judicial races. The residents of Niagara Falls, Governor Cuomo, and Mark Hamister: See below. Jeremy Zellner: Sure, he seems to have lost the Sheriff’s race, and the Hogues race is way too close to call – and Dearmyer didn’t pull it out against Burke. But Zydel, Moore, and Nixon all lost to HQ candidates, showing that he has political clout his opponents kept saying he didn’t have. Losers Sam Fruscione: Niagara Falls voters had to select three, and they had four choices. Fruscione was the “beneficiary” of an inflammatory mailer that called Buffalo developer a “con man” – a criminal – and Fruscione skulked away from blistering questioning from Mary Alice Demler about it. He lost last night – lost big. He blamed it on anti-Italian “racism”. Someone should explain to Mr. Fruscione two things: 1. “Italian” is a nationality – not a “race”; and 2. You don’t get to glorify the mafia and mob violence by selling La Cosa Nostra paraphernalia and Stefano Magaddino t-shirts and then get to complain when people call you out for retaining the services of convicted loanshark extortionists. Chutzpah doesn’t even begin to explain the idiocy here. This guy was trying to play Mark Hamister, and when the Governor out-strong-arms you, your political days are numbered. Bert Dunn: As I mentioned above, he had all the money in the world and the backing of HQ, but you can’t force him to go out and spend it and do the work necessary to combat a hard-working opponent. I’m a prime dem and I got one piece of lit from Dunn, nothing from Dobson, but it came about 2 weeks ago, and the lackluster ads from Dunn showed up on TV just in the last few days. He waited too long and didn’t do nearly enough to secure what he apparently thought was a sure thing. It ain’t over ’til it’s over, but here it never really began. Rick Zydel: This was Pigeon’s and Max’s and Mazurek’s big, marquee race – the one they were going to embarrass HQ with. Zydel came in to unseat longtime incumbent and legislative majority leader Tom Mazur. Mazur decided to bow out. Well, HQ may have a bit of mud on its face this morning, but not from Zydel – from Pat Burke, who came out of nowhere with the apparent win. Zydel was Zy-done from minute one, and Lynn Dearmyer was consistently ahead of him all night until city results started gushing in. Wes Moore: Another hand-picked Pigeon guy, Moore was setting up to challenge the sleepy incumbent, Terry McCracken. McCracken dropped out, Moore had a head start, yet an unknown from Alden named Wynnie Fisher trounced him – a win for Zellner and HQ. Kristy Mazurek, Steve Pigeon, Frank Max: Ask anyone Mazurek has come into contact with in the last year or so, and they’ll tell you that soon after her candidate David Shenk lost dramatically to Stefan Mychajliw in last year’s Comptroller’s special election, that she was going to go to war with HQ and Zellner. She was there earlier this year, unironically sporting a red armband as the Max people tried to strong-arm their way to a chairmanship victory. She told anyone who would listen that she was going to single-handedly run candidates for the legislature that she picked, and that they would all win and embarrass Zellner and HQ. She threatened to blackmail and bully opponents, and that she would release embarrassing information about them. She set herself up as a kingmaker without a kingdom. She latched on to Frank Max first, because they had interests in alignment with each other. Steve Pigeon came into the picture with gobs of cash. Stories have already come out about how questionable the sources of cash are – and more stories are coming. In the last week or so of writing about the “WNY Progressive Caucus PAC“, I have heard several remarkably similar stories from completely unrelated people, explaining how even a hint of disagreement with Mazurek invites a blistering “do you know who I am” and “do you know who my father is” response from her, with demands of “who are you working for”, harassing phone calls, and even firings over social media. You don’t build an army by burning bridges. Pigeon proves yet again that his negativity crosses a line and ends up helping his target, more often than not. It happened in the Falls, and in the Zydel, Moore, and Nixon efforts. Steve Pigeon is exceptionally good at formenting chaos and stirring shit, but he is palpably bad at the whole “winning elections” thing, at least locally – and the people who end up aligned with him turn out to be just horrible, more often than not – not sure if that’s organic or learned. As an aside, I’ll note that the one Democratic candidate for Cheektowaga town board whom Max’s organization did not endorse – Diane Benczkowski – received the most votes last night. Bernie Tolbert: A campaign that was relentlessly negative once it started up way too late to gain any traction. It was clear that the people advising Tolbert weren’t paying attention to the polls that showed widespread contentment with Byron Brown and the job he was doing, because they kept hitting him with negativity and pointing out minor things like Brown’s sudden attention to vacant eyesore buildings or having cops walk a beat in Allentown. Tolbert never got a chance to define who he was, and so Brown didn’t have to pay him any attention. People couldn’t “believe in Bernie” because they didn’t quite understand why Bernie was running, or what he’d specifically do differently from Brown. Brown pretends like he ran a clean race, but he had surrogates go out and hit Tolbert. In the end, Tolbert’s campaign seemed reactionary and petty while Brown was cool, calm, and collected. Tim Kennedy: Through his affiliation with the Mazurek PAC, and his apparent $85,000 in reported donations through two campaign committees – one of which has been closed since 2011 – he lost big-time last night. He has pissed of HQ, Higgins’ people, South Buffalo, the Governor, and some other very powerful people. He is up for re-election next year, and he is about to get called out for apparent election law violations. There will be a coalition of entities united against him next year, and he’s going to need a lot of money and a lot of luck to win re-election as a Democrat in his district in 2014. You: Because really, no matter who wins or loses, everything ends up being transactional nonsense and little of it ever translates into good government.
We have been discussing the rather fascinating role of wealth in American politics rather Hillary Clinton’s repeated flubs in claiming to be “dead broke” after leaving the White House and struggling like other Americans to cover tuition and mortgage costs (here and here and here). Despite the fact that most of our leading candidates are fantastically rich, they still feel the need to show voters that they feel their pain. With the Clintons, the new pitch feel flat with even usually favorable media outlets mocking Hillary over her statements. Now Bill Clinton has tried his hand at reviving the new narrative of a working couple done good. Bill Clinton has insisted that the claim of being broke is “factually true” since they had legal debts. However, everyone in Washington knows that these debts to Democratic law firms is funny money and that these firms would have closed shop rather than pursue the Clintons for payment. The debts, as is always the case, was quickly paid off by Clinton supporters, lobbyists, and others interested in helping the powerful couple. It was debt on paper alone and both Clintons were looking at massive windfalls after leaving the White House. It comes down to the meaning of “debt” to paraphrase a certain president. In the meantime, Joe Biden has tried his hand at the “poorer than thou” pitch. Bill Clinton insisted that Hillary is “not out of touch” when she claimed that they were “dead broke” and later told the Guardian that voters “don’t see me as part of the problem” with income inequality in the United States “because we pay ordinary income tax, unlike a lot of people who are truly well off, not to name names; and we’ve done it through the dint of hard work.” Bill Clinton returned to the claim that it is “factually true” that his family was several million dollars in debt. However, he did not claim that any of these law firms had taken any action to force payment of the debt or address the obvious intention for supporters to pay off the debt. CNN documented that Clinton earned $106 million by making speeches from the end of his presidency through January 2013. Hillary Clinton has pulled in $200,000 a speech and was criticized for receiving $500,000 in one week from Goldman Sachs . Bill Clinton dug the hole deeper with this rather dubious comment: “Everybody now assumes that what happened in the intervening years was automatic. I’m shocked that it’s happened. I’m shocked that people still want me to come give talks. And so I’m grateful.” The “shocked, shocked” claim was even less convincing than when uttered by Claude Rains. Everybody predicted Clinton would pull in massive bucks on the speaking trail and it was widely discussed before he left the White House. Moreover, he had already started to arrange for such work given the almost immediate speaking engagements. It is becoming a snowballing disaster for the Clintons as they struggle to portray the image of “country done good.” I am not sure why wealth is so polarizing in American politics to the extent that these super rich candidates have to engage in such desperate re-invention. I do not believe that most people hold great animosity for the super rich while they harbor anger over any special deals or tax shelters. The Clintons have been famous for their army of speechwriters and political advisers shaping every word and gesture — as did candidates like Mitt Romney. However, the rollout of this new narrative has been a disaster. When Hillary later insisted that taking a quarter of a million dollars a speech was commendable thing as opposed to “getting connected with any one group or company,” it triggered analysis on recipts of half a million dollars from companies like Goldman Sachs and revived the scandal of over how a Tysons Food executive arranged for Hillary to invest $1000 to make $100,000 in roughly ten months. While most of us are cringing at the spin, the Clintons appear to see no alternative but to plow ahead on the narrative. The new claim that Clinton was surprised that people would pay him so much for speeches entirely undermined the credibility of his defense. It played into the view of many voters that our leaders can no longer distinction spin from the truth or at least have little respect for voters to see the difference. What I thought was equally fascinating was how, as Hillary was struggling with the “dead broke” narrative, Joe Biden (who also wants to be the next nominee), just coincidentally revealed that he does not even have a savings account and will have to live off his government pension. That claim was reviewed by the Pulitzer prize winning organization Politifact. Earlier, the nonpartisan Politifact found Hillary’s comments to be largely false and implausible. Biden fairly only slightly better with a finding that it is “half true” which may be a high for American politicians. The group noted that “Biden also holds four checking accounts, two of which he shares with his wife. In addition, he holds six life insurance policies with Mass Mutual. The Bidens reported an adjusted gross income of $407,099 last year, including his vice presidential salary of $230,700.” He will also receive a $5 million “transition budget” for moving expenses, security, and other incidentals upon leaving office. Biden is still more credible on this subject as one of the least wealthiest members of the Senate when he represented Delaware. However, it is a narrative that will sit poorly with many citizens regardless of the party. Ironically, conservative figures like Clarence Thomas has a real and compelling story of growing up in poverty. In the end however there is a difference between powerful Americans claiming to be sympathetic with the poor and going even further to having been one of the working stiffs. Ironically, both Clintons have an admirable commitment to the poor and a demonstrated history of working on their behalf. They have street cred on the issue. That is what is so bizarre because this continued effort to claiming to have been dead broke has only alienated voters in an area where the Clintons should rightfully be given great credit. And the campaign season has not even officially begun . . . Source: USA Today Share this: Twitter Reddit Facebook Email
Q: Parsing complicated XML using Jsoup I'm trying to parse an XML-formatted document with Jsoup, specifically what is located in the paragraph tag in the example code show below. ... <nitf:body.content> <p> Content would be here. </p> </nitf:body.content> ... There are multiple paragraph tags in the document. As a result, I chose to use selector-syntax to get inside the body.content tag and then the paragraph tag underneath it. I am trying and failing to get it right now with: // epochFileDoc is the name of the document with the code shown above. Element tag_element = epochFileDoc.selectFirst("nitf|body.content > p"); I have tried a few different combinations of the selector syntax, including "nitf|content.body > p" and "nitf|body > p". None of the ones I have tried have worked. How would I use selector-syntax in Jsoup to get the paragraph tag shown above? EDIT: I see why content.body does not work in the selector syntax, since that searches for nitf:content="body" in the tags, but I'm still lost on how to get that element. A: The reason why it is not possible to select using a CSS selector, like Jsoup uses, is because a dot has a special meaning in CSS (like @Shlomi Fish said). In my code, I replaced instances of nitf:body.content with nitf:body-content using the line below, where file is the string where the XML is stored: file = file.replace("<nitf:body.", "<nitf:body-"); This allowed me to select the Element using: Element tag_element = epochFileDoc.selectFirst("nitf|body-content > p"); It would be smarter to use a different parser for XML-formatted code in cases like this, but if you have requirements like mine/want to keep Jsoup this workaround works properly.
package com.datafellas.g3nerator import java.io.File import com.datafellas.g3nerator.model.DependencyConfig import com.datafellas.utils.{Deps, CustomResolvers} import notebook.Notebook import sbt.{MavenRepository, Resolver} import scala.util.Try class SbtDependencyResolver(snb: Notebook, sparkVersion: String, projectDependencyConfig: DependencyConfig) { def libraryDependenciesCode(customDeps: List[String]): String = { val (includes, excludes) = Deps.parse(customDeps.mkString("\n"), sparkVersion) val eee = excludes.map { e => if (e.name == "*") { s""" ExclusionRule( "${e.organization}" ) """ } else { s""" ExclusionRule( "${e.organization}", "${e.name}" ) """ } }.mkString(",\n") val deps = includes.map { i => s"""| |libraryDependencies += "${i.organization}" % "${i.name}" % "${i.revision}" excludeAll( |$eee |) | | """.stripMargin }.mkString("\n") deps } def resolveJars(customDeps: List[String], repo: File): Try[List[String]] = { Deps.script(customDeps.mkString("\n"), resolvers, repo, sparkVersion) } lazy val resolvers: List[Resolver] = { val mavenLocal = Resolver.mavenLocal val mavenReleases = sbt.DefaultMavenRepository val typesafeReleases = Resolver.typesafeIvyRepo("releases") val jCenterReleases = Resolver.jcenterRepo val sonatypeReleases = Resolver.sonatypeRepo("releases") val spReleases = new MavenRepository("spark-packages", projectDependencyConfig.resolverBintraySparkPackagesMvn) val defaults = mavenLocal :: mavenReleases :: spReleases :: typesafeReleases :: jCenterReleases :: sonatypeReleases :: Nil snb.metadata.get.customRepos.getOrElse(List.empty[String]).map(CustomResolvers.fromString).map(_._2) ::: defaults } def resolversCode: String = { val resv = resolvers.map { r => val root = r.getClass.getMethods.find(_.getName == "root") root match { case Some(m) => s""" "${r.name}" at "${m.invoke(r)}" """ case None => r match { case r:sbt.URLRepository => val patterns = s"""new sbt.Patterns( ${r.patterns.ivyPatterns.map(s => "\""+s+"\"").mkString("List(", ",", ")")}, ${r.patterns.artifactPatterns.map(s => "\""+s+"\"").mkString("List(", ",", ")")}, ${r.patterns.isMavenCompatible} ) """ s""" new sbt.URLRepository("${r.name}", $patterns) """ case _ => "UNKNOWN repo →→→ " + r } } } resv.mkString("Seq(\n", ",\n", ")") } }
Valentina Marchei Valentina Marchei (born 23 May 1986) is an Italian pair and single figure skater. As a singles skater, she is a five-time Italian national champion (2004, 2008, 2010, 2012, 2014). Her highest ISU Championship placements were 4th at the 2013 European Championships and 8th at the 2012 World Championships. She represented Italy at the 2014 Winter Olympics and placed 11th. Also, Marchei competed as a pair skater with Ondřej Hotárek, representing Italy. The pair finished 6th at the 2018 Winter Olympics. Personal life Valentina Marchei was born 23 May 1986 in Milan, Italy. She is the daughter of Marco Marchei, a competitor in the marathon at the 1980 and 1984 Olympics. Her early interests were speed skating and gymnastics. She studied with a focus on sport at university and has worked as a reporter for Italian television. Career in singles Marchei began skating in 1993. She was coached by Cristina Mauri from the age of nine. Ahead of the 2007–08 season, Marchei spent the first part of July training with Viktor Kudriavtsev in Flims, Switzerland. She trained in Courchevel in the remainder of July and August and then Paris and Milan in the winter, coached by Pierre Trente and Cristina Mauri. Marchei injured her knee in September 2007. In September 2008, Marchei began working with Nikolai Morozov in Hackensack, New Jersey. She missed most of the 2008–09 season after injuring her right ankle on a triple Lutz at 2008 Skate America. Marchei did not receive any Grand Prix invitations in 2009–10. She finished 8th at the 2010 European Championships. In 2010–11, Marchei returned to the Grand Prix series, competing at 2010 Skate Canada International and 2010 Cup of Russia. She was 10th at the 2011 European Championships. In 2011, Marchei changed coaches to Jason Dungjen and Yuka Sato in Detroit. She had ankle and knee injuries in 2011. She finished 8th at the 2012 World Championships in Nice, France. Marchei represented Italy at the 2014 Winter Olympics, where she placed 11th. In September 2014, she withdrew from both of her Grand Prix assignments, the 2014 Skate Canada International and 2014 Rostelecom Cup. Career in pairs On 2 July 2014, La Gazzetta dello Sport wrote that Marchei and Ondřej Hotárek were considering skating as a pair. Bruno Marcotte confirmed on 26 July 2014 that the two were training together. They are coached by Marcotte in Montreal and by Franca Bianconi in Milan. On 6 August 2014, Marchei sprained the medial collateral ligament of her right knee. On 8 September, she said she would resume light on-ice training in a few days. Commenting on her switch to pairs, Marchei stated: "At the beginning practicing pairs was just to do shows or stuff like that, but then it was something that got to me. It's crazy. I still do single programs at shows, but it is strange, I'm looking around, where is he?" Marchei/Hotárek won the Italian national title in December 2014. In January 2015, they placed fourth at the European Championships in Stockholm, Sweden and 11th at the World Championships in March. On 16 September 2018 Marchei announced the end of her partnership with Hotárek via Instagram. Programs With Hotárek Single skating Competitive highlights GP: Grand Prix; CS: Challenger Series; JGP: Junior Grand Prix Pairs with Hotárek Ladies' singles Detailed results With Hotarek References External links Category:Italian female single skaters Category:Italian female pair skaters Category:Figure skaters at the 2007 Winter Universiade Category:1986 births Category:Living people Category:Sportspeople from Milan Category:Medalists at the 2007 Winter Universiade Category:Figure skaters at the 2014 Winter Olympics Category:Figure skaters at the 2018 Winter Olympics Category:Olympic figure skaters of Italy Category:Universiade medalists in figure skating Category:Universiade silver medalists for Italy
Q: Paginação com grande quantidade de dados Pensando em desempenho, qual a melhor maneira de paginar uma grande quantidade de dados? Atualmente estou usando um List<Produtos>, guardando em torno de 500 produtos nela, e utilizando subList(min,max), retorna o que preciso. Porem, creio que essa não sejá a melhor solução e gostaria de saber outras alternativas para esse problema. Edit A ideia é maximizar o desempenho entre consultas desnecessarias no banco, pois o pool maximo do banco é 4. A: Tive esse problema, resolvi com a dica da algaworks: public List<Produto> filtrados(FiltroProduto filtro) { Criteria criteria = criarCriteriaParaFiltro(filtro); criteria.setFirstResult(filtro.getPrimeiroRegistro()); criteria.setMaxResults(filtro.getQuantidadeRegistros()); if (filtro.isAscendente() && filtro.getPropriedadeOrdenacao() != null) { criteria.addOrder(Order.asc(filtro.getPropriedadeOrdenacao())); } else if (filtro.getPropriedadeOrdenacao() != null) { criteria.addOrder(Order.desc(filtro.getPropriedadeOrdenacao())); } return criteria.list(); } É claro que pode-se melhorar o filtro. https://github.com/algaworks/aula-datatable-lazy-loading-primefaces
--- abstract: 'Soon after launch, the Advanced CCD Imaging Spectrometer (ACIS), one of the focal plane instruments on the Chandra X-ray Observatory, suffered radiation damage from exposure to soft protons during passages through the Earth’s radiation belts. The primary effect of the damage was to increase the charge transfer inefficiency (CTI) of the eight front illuminated CCDs by more than two orders of magnitude. The ACIS instrument team is continuing to study the properties of the damage with an emphasis on developing techniques to mitigate CTI and spectral resolution degradation. We will discuss the characteristics of the damage, the detector and the particle background and how they conspire to degrade the instrument performance. We have developed a model for ACIS CTI which can be used to correct each event and regain some of the lost performance. The correction uses a map of the electron trap distribution, a parameterization of the energy dependent charge loss and the fraction of the lost charge re-emitted into the trailing pixel to correct the pixels in the event island. This model has been implemented in the standard Chandra data processing pipeline. Some of the correction algorithm was inspired by the earlier work on ACIS CTI correction by Townsley and collaborators[@Townsley00; @Townsley02]. The details of the CTI model and how each parameter improves performance will be discussed, as well as the limitations and the possibilities for future improvement.' author: - | C. E. Grant, M. W. Bautz, S. M. Kissel, and B. LaMarr Center for Space Research, Massachusetts Institute of Technology,\ Cambridge, Massachusetts 02139 bibliography: - 'paper.bib' title: A charge transfer inefficiency correction model for the Chandra Advanced CCD Imaging Spectrometer --- INTRODUCTION {#sect:intro} ============ The Chandra X-ray Observatory, the third of NASA’s great observatories in space, was launched just past midnight on July 23, 1999, aboard the space shuttle [*Columbia*]{}[@cha2]. After a series of orbital maneuvers Chandra reached its final, highly elliptical, orbit. Chandra’s orbit, with a perigee of 10,000 km, an apogee of 140,000 km and an initial inclination of 28.5$^\circ$, transits a wide range of particle environments, from the radiation belts at closest approach through the magnetosphere and magnetopause and past the bow shock into the solar wind. The Advanced CCD Imaging Spectrometer (ACIS), one of two focal plane science instruments on Chandra, utilizes charge-coupled devices (CCDs) of two types, front- and back-illuminated (FI and BI). Soon after launch it was discovered that the FI CCDs had suffered radiation damage from exposure to soft protons scattered off the Observatory’s grazing-incidence optics during passages through the Earth’s radiation belts[@gyp00]. The BI CCDs were unaffected. Since mid-September 1999, ACIS has been protected during radiation belt passages and there is an ongoing effort to prevent further damage and to develop hardware and software strategies to mitigate the effects of charge transfer inefficiency on data analysis. One such strategy, post-facto correction of event pulseheights, is described here. This correction algorithm has been implemented in the standard Chandra data processing pipeline. This paper begins by defining the calibration data used to test correction algorithms in Section \[sect:data\]. Section \[sect:raddamage\] describes the characteristics of ACIS radiation damage. The CTI correction algorithm is outlined in Section \[sect:cticorr\]. The performance of the correction algorithm is presented in Section \[sect:perf\] and further discussed in Section \[sect:disc\]. DATA {#sect:data} ==== All the results shown here are based on data taken of the ACIS External Calibration Source (ECS) from a single node of the front-illuminated ACIS-I3 CCD. Since the discovery of the initial radiation damage, a continuing series of observations have been undertaken just before and after the instruments are safed for perigee passage to monitor the performance of the ACIS CCDs. ACIS is placed in the stowed position exposing the CCDs to the ECS which produces many spectral features, the strongest of which are Mn-K$\alpha$ (5.9 keV), Ti-K$\alpha$ (4.5 keV), and Al-K (1.5 keV). Figure \[fig:ecsspectrum\] shows a spectrum of the ECS and labels the features used in this study. The data are taken in the standard Timed Exposure mode with a 3.2 second frame time. Typical exposure times for each observation range from 5.5 to 8 ksecs. Approximately 4.5 million events were used in this study, representing about 200 ksec taken during the year 2000. ACIS events are recorded as 3 x 3 pixel event islands. The pulseheight of the event is a sum of all the pixels in the island above the split threshold. CHARACTERISTICS OF ACIS RADIATION DAMAGE {#sect:raddamage} ======================================== A symptom of radiation damage in CCDs is an increase in the number of charge traps. When charge is transfered across the CCD to the readout, some portion can be captured by the traps and gradually re-emitted. If the original charge packet has been transfered away before the traps re-emit, the captured charge is “lost” to the charge packet. This process is quantified as charge transfer inefficiency (CTI), the fractional charge loss per pixel. The front-illuminated ACIS CCDs suffer from radiation damage due to low energy protons. The framestore covers are thick enough to stop this radiation, so damage is limited to the imaging area of these frame-transfer CCDs. The parallel CTI at 5.9 keV of the ACIS FI CCDs varies across the focal plane from $1 - 2 \times 10^{-4}$ at the nominal operating temperature of –120$^\circ$ C. There are a number of ways in which CTI changes the overall instrument performance. The cumulative charge loss causes a strong position dependence in the pulseheight, the line response function and the quantum efficiency. At the bottom of the CCD closest to the readout the performance is the same as the original undamaged CCD. Figure \[fig:phvrow\] is a scatter plot of the pulseheight of each X-ray event versus its row number. Each of the diagonal lines is a spectral feature in the ACIS calibration source. The pulseheight of each spectral line decreases with increasing row number due to the increasing transfer distance. The width of each spectral feature also increases with increasing transfer distance due to a number of factors. The charge trapping and re-emission process is stochastic, and this additional noise in the pulseheight distribution increases with each transfer. The trap distribution is non-uniform, so without calibration on the scale of a few pixels, this adds to the spectral width. Finally, there are variations in trap occupancy which increase the charge loss distribution[@saccharge]. All of these effects are applied to the charge in each pixel, so multi-pixel events will be more degraded than single-pixel events. The charge loss and re-emission process can also change the morphology of the X-ray event. ACIS events are recorded as 3 by 3 pixel islands. Each event island is assigned a grade based on the charge distribution. In this manner X-ray events can be distinguished from the much more common cosmic ray events which have distinctly different event island distributions. Events with grades that are least likely to be from X-rays are ignored in analysis and a subset are discarded on-board to reduce telemetry requirements. After the cumulative charge loss and re-emission during transfer, X-ray events can be smeared into morphologies commonly associated with cosmic rays. The produces a row-dependent loss of quantum efficiency as shown in Figure \[fig:qevrow\]. At the current damage level of the ACIS FI CCDs, the quantum efficiency loss is small and is only important for high energy X-rays which have a higher proportion of multi-pixel events. CTI CORRECTION {#sect:cticorr} ============== If the charge loss process can be modeled, it should be possible to apply a post-facto correction algorithm to reconstruct the original X-ray event and recover some of the detector’s spectral resolution. This type of correction was first shown to be effective for ACIS CCDs by Townsley and collaborators[@Townsley00; @Townsley02]. The algorithm described in this paper, which has been implemented by the Chandra X-ray Center as part of the `acis_process_events` tool,[^1] was inspired by and shares some characteristics with their previous work. The code is iterative for each event. A guess is proposed for the original event island before it suffered any corruption from CTI. The charge loss and charge trailing model is applied to the guess to predict what would be read out from the instrument. This prediction is compared to the actual event and the deviations are fed back into the initial guess for the next iteration. Once the differences between the predicted and actual events falls below a certain threshold, the output is the hypothesized uncorrupted event. Charge Loss ----------- Charge loss in this algorithm is the product of the transfer distance multiplied by the density of charge traps multiplied by the volume of the charge packet. The volume of the charge packet, and thus the energy dependence of the charge loss, is parameterized as a power law function of energy. The total charge loss for an isolated pixel is then $$\delta Q (x,y,Q) = y \, \overline{n}(x,y) \, kQ^\alpha ,$$ where $x$, $y$ and $Q$ are the position and charge of the pixel, $\overline{n}$ is the average trap density of pixels $(x,1)$ through $(x,y)$, $k$ is a normalization constant, and $\alpha$ is the power law index. In this way the position- and energy-dependences are easily separable. We have chosen to parameterize the energy dependence of charge loss, which is related to the volume of the charge packet, as a power law function of the charge with index $\alpha$. Because it is linked to a fundamental CCD parameter (the size of the charge cloud before the charge is transfered), we have assumed that a single value of $\alpha$ can be used to characterize each CCD. Figure \[fig:chargeloss\] shows the charge loss as a function of energy for one node of the ACIS-I3 CCD along with the best fit power-law. To calibrate $\alpha$, the charge loss is expressed as a rate (ADU/pixel) and is the linear slope of the pulseheight in the center pixel of the event island as a function of row number for a particular spectral feature. Also part of the charge loss model is the uniformity of the electron trap distribution across the CCD, $\overline{n}(x,y)$. There is a known gradient in the radiation damage across the ACIS focal plane, such that the worst CCD has about twice the CTI as the best. This large-scale gradient needs to be incorporated into the trap distribution map. In addition, there is non-uniformity on the pixel-scale due to the small number statistics of the traps. All ACIS observations are dithered over a region of 32 x 32 pixels, so even for point sources, science analysis requires summing over a region at least this large. Figure \[fig:chargeloss\] shows that the charge loss in each transfer is much less than one electron for all the relevant X-ray energies. Even with a completely uniform distribution of charge traps, the variation in the charge loss due to Poisson noise from one column to the next will add significantly to the width of the pulseheight distribution integrated over many pixels. Figure \[fig:column\] shows this small scale effect. Not only is the mean pulseheight lower at the top of the CCD, but there is a larger variance in pulseheight from column to column. This is from real variations in the charge trap density due to Poisson noise in the trap distribution. This trap uniformity has been calibrated using the Al-K$\alpha$ line at 1.5 keV by fitting the charge loss in each column separately. In principle, any energy spectral line could be used since the map should be energy independent. Variations in the trap density along each column are included, but are much less important. The product used by the CTI correction software is an image of the CCD with the value of $y \, \overline{n}(x,y) \, k$ for each pixel. (The trap density, $\overline{n}$, and the volume normalization constant, $k$, are degenerate, so they are calibrated together.) At a given energy, $y \, \overline{n}(x,y) \, k$ is just the measured charge loss at $(x,y)$ divided by $Q^\alpha$. Charge Trailing --------------- The charge trapping time is assumed to be very short, so that all available traps are filled essentially instantaneously. As discussed in Section \[sect:raddamage\], the charge that is lost to a particular pixel will be gradually re-emitted. If the time scale of the re-emission is close to the pixel-to-pixel transfer time (40 $\mu$sec for ACIS), significant charge may be deposited into the pixel immediately following the original charge packet. About half of the ACIS trap population has time constants in which charge trailing into the following pixel is important[@gyp00]. If this trailed charge is larger than the split event threshold it will be included in the summed pulseheight and it will change the grade assigned to the event. Figure \[fig:trailcharge\] shows the charge trailing as a function of the charge loss. The charge loss shown here is the same as that in Figure \[fig:chargeloss\]. The charge trailing is expressed as a rate (ADU/pixel) and is the linear slope as a function of row number of the pulseheight in the top pixel of the event island for each spectral feature. The slope of the linear fit shown in Figure \[fig:trailcharge\] is the fraction of the charge loss that is trailed into the following pixel and is used as part of the event reconstruction. Event Island Reconstruction --------------------------- The CTI correction model also accounts for sacrificial charge shielding and charge trailing within the event itself. Thus far we have described the charge loss and trailing from a single isolated event pixel. Depending on the X-ray energy, ACIS events are often split over two to four pixels. This causes a more complicated situation in which the charge loss from one pixel can be mitigated by sacrificial charge from a preceding pixel. Likewise, charge trailing can be reduced by charge in a following pixel. (For more on sacrificial charge, see Ref. ) Event island reconstruction begins by calculating the charge loss for each significant pixel in the event assuming an isolated pixel. Then the pulseheight in each significant pixel is compared to that of the preceding pixel, i.e. with lower row number. If the preceding pixel has the same or larger pulseheight, no charge is lost from the pixel. If the preceding pixel has a smaller pulseheight, the effective charge loss is calculated as the difference between the charge loss in each pixel. In this way, the preceding pixels charge loss has shielded the following pixel from some of the charge traps, thus reducing the charge loss in the following pixel. The effective charge trailing is calculated in much the same way. The charge trailed from each significant pixel into the next is calculated assuming a single isolated pixel. The pulseheight in each significant pixel is compared to that of the following pixel. If the following pixel has the same or larger pulseheight, no charge is trailed from the pixel into the following pixel. If the following pixel has a smaller pulseheight, the effective charge trailing is the difference between the charge trailing in each pixel. The effective charge loss or trailing are then subtracted from or added to the hypothesized uncorrupted event to yield the predicted event which is compared to the actual event received from the instrument. Figure \[fig:corrsample\] shows some example event islands before and after applying our CTI model. All the sample events have the same original pulseheight, 1500 ADU, or about 6 keV. PERFORMANCE COMPARISON {#sect:perf} ====================== CTI correction removes the position dependence of pulseheight, provides substantial improvement in spectral resolution and some small improvement in the detection efficiency. Our primary figure of merit for judging the efficacy of any CTI mitigation approach is the full width at half maximum (FWHM) of spectral features at the top of the CCD (far from the readout) where CTI effects are largest. On the ACIS-I3 CCD this region corresponds to the aimpoint of the ACIS I-array. Only ASCA grade 0 (one pixel), 2, 3, 4 (two pixel), and 6 (three or four pixel) events are included. Figure \[fig:phvrowcorr\] is a scatter plot of the pulseheight of each X-ray event versus row number after applying CTI correction. Comparison with Figure \[fig:phvrow\] demonstrates that the CTI correction removes the row-dependence of pulseheight and also improves spectral resolution. Figure \[fig:spectra\] shows the pulseheight spectra around 6 and 1.5 keV for the top 64 rows of the CCD where CTI effects are strongest. Also shown is the original, undamaged performance of the CCD. The corrected spectra are narrower than the uncorrected, particularly the low energy shoulder. The high energy shoulder is due to sacrificial charge outside the 3 x 3 event island and cannot be properly corrected with the information in the standard data format[@saccharge]. Figure \[fig:fitrow\] shows the FWHM of the spectral lines at 1.5 and 5.9 keV as a function of row number. At low row numbers, the FWHM approaches the undamaged value. Applying the CTI correction improves the FWHM by up to 33% at both energies. For the highest 64-row bin, the FWHM at 5.9 keV improves from 415 $\pm$ 1 eV to 277 $\pm$ 1 eV, while the FWHM at 1.5 keV improves from 204 $\pm$ 1 eV to 136 $\pm$ 1 eV. CTI correction provides a small improvement in detection efficiency by reconstructing event island morphologies so that valid X-ray events are not mistakenly rejected as cosmic ray events. As shown in Figure \[fig:qevrow\], efficiency for 5.9 keV X-rays drops by about 3% at high row numbers due to CTI. A small fraction of the lost events, up to 10%, is recovered by CTI correction. One plausible reason for the small size of the improvement is that a sizable fraction of the lost events were in the grade set that is rejected on-board the spacecraft and never telemetered to the ground. This particular grade set was determined before the radiation damage and at that time consisted of grades that made up 90% of the background events. With the advent of CTI, some valid X-ray events can end up in these discarded grades. Changing the grade reject list to allow these grades would greatly reduce the ACIS background rejection efficiency and cause telemetry saturation, so is not considered a viable option. DISCUSSION {#sect:disc} ========== It is instructive at this point to try and separate out the different elements of the CTI corrector and determine how important they are in improving performance. Two interesting elements are the small spatial resolution of the charge loss mapping and the detailed correction of each pixel in the event island. We define four test cases as follows: i) correcting the total pulseheight of each event using a large-scale charge loss map calibrated for an entire CCD node, ii) correcting the total pulseheight using the standard pixel-scale charge loss map, iii) correcting the event island using the large-scale charge loss map, and iv) the full correction of the event island using the pixel-scale charge loss map. The FWHM as a function of row number for each of these cases is shown in Figure \[fig:fitrow2\]. At high energies the largest decrease in FWHM is due to correcting the entire event island (29% and 33%) rather than just the summed pulseheight (7% and 8%). Using the more detailed charge loss map only improves the correction by a few percent. The reverse is true at low energies. Using the pixel-scale charge loss map and correcting either the summed pulseheight or the event island produces a larger decrease in FWHM (27% and 33%) than using the large-scale charge loss map (11% and 18%). The primary difference between low and high energy events is the importance of events split over multiple pixels; at 1.5 keV 79% of the events are single pixel, 19% are doubly split and 2% are multiply split, while at 5.9 keV 47% are singly split, 33% are doubly split, and 20% are multiply split. This CTI corrector does not, as currently coded, make any correction for CTI in the framestore or serial arrays. This is appropriate for the ACIS FI CCDs, but not for the ACIS BI CCDs which have substantial CTI in the framestore and serial arrays from manufacturing defects. In principle, our methodology should be applicable and the Townsley CTI corrector[@Townsley00; @Townsley02] does correct BI CCDs. The change in FWHM will be smaller than that seen for the FI CCDs because of the lower level of CTI degradation. Since the charge loss process is stochastic, we can never expect to recover all of the resolution lost to radiation damage through a post-facto software correction. Figure \[fig:theo\] compares the FWHM at 5.9 and 1.5 keV as a function of row number with an estimated theoretical limit on performance. This limit was determined by assuming that the fluctuations in charge loss are Poissonian and includes the additional effect of split events. This estimate does not, however, include the effects of sacrificial charge from cosmic ray events. Since each individual event will have a different sacrificial charge history, the FWHM will suffer additional degradation. Ref.  describes a modification to the basic CTI correction algorithm which provides additional improvement, however since most of the sacrificial charge deposited on the CCD is from cosmic rays that are rejected by on-board event processing, the standard ACIS event lists are insufficient. Strategies which telemeter additional information about sacrificial charge history with each event are under investigation by the ACIS instrument team. Some of the additional broadening at 5.9 keV may also be due to the poor calibration of the energy-dependence at low energies. There are no lines in the calibration source below 700 eV, so the power law energy-dependence is only an extrapolation. For split events, which are common at high energies, it is quite possible for the split pixels to have pulseheights well below the calibration. The energy-dependence of charge loss at low energies is currently under investigation. Clearly, the CTI corrector will require periodic recalibration due to the slow accumulation of additional radiation damage over the mission lifetime. In addition, since the corrector was calibrated using flight data which includes sacrificial charge from the cosmic rays, changes in the cosmic ray environment will also require recalibration. At the present time, a full recalibration of the corrector has not been necessary, because the small CTI increase manifests primarily as a change in pulseheight. This pulseheight change has been more simply corrected by periodic updates to the ACIS gain calibration. As of July 2004, this functionality is part of the `acis_process_events` tool. Based on the current rate of change in CTI and cosmic ray background, an update to the CTI corrector calibration will likely be necessary in the next year or two. We are exceedingly grateful to Leisa Townsley, Pat Broos, and their collaborators at Penn State University for designing the initial ACIS CTI corrector and for many fruitful discussions. Thanks also go to Gregory Prigozhin and Peter Ford of the ACIS instrument team who were instrumental in our study of ACIS radiation damage. We also thank Glenn Allen, Dick Edgar, Paul Plucinsky and Chandra X-ray Center for implementing this algorithm in the Chandra pipeline. This work was supported by NASA contracts NAS 8-37716 and NAS 8-38252. [^1]: For further information on Chandra data analysis: http://cxc.harvard.edu
I'm hearing the NCAA penalties are imminent. There is some face saving going on here. They are trying to hit individual former coaches hard and for about 15 players who refused to cooperate in the investigation...they will be banned from campus or any association for 10 years. There will be vacation of wins most likely which is OK because nothing of substance was accomplished during this whole period from 02-09. They will also tack on a full 5 year probation. All of this to placate the enforcement division sothey can save some face. In exchange...to ensure no further litigation or bad PR from the university itself the sscholarship reductions are expected to be fairly light....ie in the vicinity of 10 total and of course no more bowls since 2 were already self imposed.
Q: Why doesn't my sbt project dependency work? (insists on trying to fetch it remotely) I'm wanting to have a bridge for Scala.js and Snap.svg in an sbt project, but also including demo code for the bridge. When doing demos/compile sbt starts to say that it cannot resolve the dependency. It looks like it's trying to reach the bridge as if it was a publicized, external project but it's right here, and it compiles. What am I doing wrong? Removing the publishing-specific files does not seem to bring a change. Directory structure: ├── build.sbt ├── project │   ├── (PublishToBintray.scala) │   ├── build.properties │   ├── build.sbt │   ├── project │   │   └── ... │   └── target │   │   └── ... ├── (publishing.sbt) ├── scalajs_demos │   ├── main │   │   └── scala │   │   └── clock.scala │   └── target │      └── ... ├── src │   └── main │   └── scala │   └── org │   └── scalajs │   └── snapsvg │   ├── SnapSvg.scala │   └── package.scala └── target    └── ... build.sbt: scalaJSSettings name := "Scala.js Snap.svg" normalizedName := "scalajs-snapsvg" version := "0.01" organization := "org.scala-lang.modules.scalajs" scalaVersion := "2.11.1" crossScalaVersions := Seq("2.10.4", "2.11.1") // note: not tested with 2.10.x libraryDependencies += "org.scala-lang.modules.scalajs" %%% "scalajs-dom" % "0.6" // TBD: probably need it, just like jQuery bridge does ScalaJSKeys.jsDependencies += "org.webjars" % "Snap.svg" % "0.3.0" / "snap.svg.js" homepage := Some(url("http://snapsvg.io/")) licenses += ("Apache 2.0", url("https://github.com/adobe-webplatform/Snap.svg/blob/master/LICENSE")) //--- // bridge (main) project // lazy val bridge = project.in( file(".") ) //--- // demos project // lazy val demos = project.in( file("scalajs_demos") ).dependsOn(bridge) What goes wrong in sbt: > demos/compile [info] Updating {file:/Users/asko/Hg/scala-js-snapsvg/}demos... [info] Resolving org.scala-lang.modules.scalajs#scalajs-snapsvg_sjs0.5_2.10;0.01 ... [warn] module not found: org.scala-lang.modules.scalajs#scalajs-snapsvg_sjs0.5_2.10;0.01 [warn] ==== local: tried [warn] /Users/asko/.ivy2/local/org.scala-lang.modules.scalajs/scalajs-snapsvg_sjs0.5_2.10/0.01/ivys/ivy.xml [warn] ==== public: tried [warn] http://repo1.maven.org/maven2/org/scala-lang/modules/scalajs/scalajs-snapsvg_sjs0.5_2.10/0.01/scalajs-snapsvg_sjs0.5_2.10-0.01.pom [info] Resolving org.fusesource.jansi#jansi;1.4 ... [warn] :::::::::::::::::::::::::::::::::::::::::::::: [warn] :: UNRESOLVED DEPENDENCIES :: [warn] :::::::::::::::::::::::::::::::::::::::::::::: [warn] :: org.scala-lang.modules.scalajs#scalajs-snapsvg_sjs0.5_2.10;0.01: not found [warn] :::::::::::::::::::::::::::::::::::::::::::::: [trace] Stack trace suppressed: run last demos/*:update for the full output. [error] (demos/*:update) sbt.ResolveException: unresolved dependency: org.scala-lang.modules.scalajs#scalajs-snapsvg_sjs0.5_2.10;0.01: not found [error] Total time: 0 s, completed 27.7.2014 22:57:22 > One more thing, the project/plugins.sbt: addSbtPlugin("org.scala-lang.modules.scalajs" % "scalajs-sbt-plugin" % "0.5.0") A: The root cause of your issue is that the bridge project uses scalaVersion := "2.11.1" (as specified by your build.sbt, but your demos project uses the default scalaVersion (which is 2.10.2 in sbt 0.13, IIRC). The dependsOn relation gets confused when it tries to relate projects with different scalaVersions. See this issue: https://github.com/sbt/sbt/issues/1448 You probably thought that scalaVersion := "2.11.1" in the root build.sbt would apply to all subprojects. But that's not true, it only applies to the subproject rooted in . (here, bridge). You have to also specify this setting (and others you want shared) either as arguments of the settings() method of demos, or in the scalajs_demos/build.sbt file.
Article content continued Cona would assume Pengrowth’s debt of approximately $740 million. Pengrowth blamed extreme volatility in the price of Western Canadian oil in the fall of 2018, coupled with an uncertain political and regulatory environment for the fire sale. The company produces around 18,000 barrels per day from its Lindbergh thermal property, located in the Cold Lake area of East Central Alberta, and 24.6 million cubic feet per day from its Montney assets in northeast British Columbia. “As a result of the significant decline in oil prices in 2014, which followed on the heels of the largest capital project in Pengrowth’s history at Lindbergh, the Company took immediate steps to shore up the Company’s balance sheet by selling assets to pay down $1.2 billion of debt,” said Pengrowth’s Board of Directors, Chairman Kel Johnston in a statement. “Further efforts were undertaken in 2018 to market an additional overriding royalty on the Lindbergh asset and to secure high yield debt to replace the current outstanding Secured Debt. Both funding initiatives proved unsuccessful.” Johnston also blamed extreme volatility in the price of Western Canadian oil in the fall of 2018, coupled with an uncertain political and regulatory environment, “has led to a severe funding crisis in the Canadian energy capital markets which impeded the company’s ability to achieve a funding solution.” Pete Sametz, President and CEO of Pengrowth said the board had determined it was the best available alternative for the company. “Despite the discount this transaction represents to Pengrowth’s recent trading price, we strongly recommend our stakeholders support the Arrangement Agreement as it represents the most attractive alternative for all stakeholders given the current environment where there is essentially no access to capital for the cCompany or participants in the Canadian oil and gas industry, in general,” Sametz said in a statement. With files from Thomson Reuters
Q: How do you send Serial text to arduino through java Hello I have an Arduino UNO connected to its LCD display. I programmed it to display any text you want by sending serial text to it. I have been Google Searching ways to do this but I haven't seemed to find a way for sending serial in java. I am looking for an API or someway to possibly send serial text to my Arduino via USB. I chose java because I am more familiar with it. A: Try RXTX Java library, it's a java serial communication library and works great with Arduino. Also the official Arduino website provides an example for Java-Arduino communication with help of this library, see here.
Advances in bladder cancer. Intravesical chemotherapy and immunotherapy are administered to patients with bladder cancer in the hope of decreasing the rate of recurrence and, more importantly, reducing the rate of progression. So far, bacille Calmette-Guérin is the only agent to decrease progression rate and thus increase survival. Bacille Calmette-Guérin has been shown to achieve this outcome by selectively sparing certain sequences during fibronectin degradation; these critical fragments were shown to have motility-stimulating activity, which may then enhance tumor invasion. In vivo and in vitro studies have shown that cathepsin B inhibitors prevent degradation of human basement membrane laminin, which is the first step of tumor invasion. Cathepsin B inhibitors either alone or in combination with bacille Calmette-Guérin may be valuable in preventing the progression of superficial bladder tumors in the future. Clinical studies on bacille Calmette-Guérin have repeatedly shown that a second course of bacille Calmette-Guérin to patients with local failure did not jeopardize patient survival. Adjuvant chemotherapy for patients with locally advanced disease and for those with regionally involved lymph nodes improves progression-free survival. Further controlled studies will establish the verdict for adjuvant chemotherapy. With the advancement of molecular genetic studies relevant to modern technology, our understanding of tumor behavior improves dramatically, and classic knowledge becomes more outdated every day.
The Art of Turning Fish into Leather - colinprince https://www.hakaimagazine.com/features/the-art-of-turning-fish-into-leather/ ====== hn_throwaway_99 One thing this article doesn't mention is that there is currently a huge glut of cowhide leather: [https://www.bloomberg.com/news/features/2019-08-09/america-s...](https://www.bloomberg.com/news/features/2019-08-09/america- s-obsession-with-beef-is-killing-the-leather-industry) ------ throwaway512020 The fish skin patterns looks unique, but I would rather not find anymore uses for animal products in clothing. I would prefer that humanity invest time in synthetic leathers, canvas, etc. If synthetic leather is not as "good" as the real thing, we should work on improving the technology. It is 2020 we need to move forward. ~~~ RadioactiveMan The company has this to say about synthetic leather. > Fish leather is more ecologically sound than vegan leather alternatives > because it requires less energy than the creation of vegan leather, it does > not include petroleum products, and it works with the circular economy using > existing waste from food fisheries to create a durable finished good. Fish > leather doesn’t need the extra (chemically induced) step of removing hair > that mammal leather requires, either. [https://www.7leagues.com/leather](https://www.7leagues.com/leather) ------ yial I’ve never seen fish leather before ! It looks like they’re still in the process of launching their shoe brand: [https://www.7leagues.com/#home-section](https://www.7leagues.com/#home- section) Unrelated to shoes, but while I usually don’t buy many products, I would totally buy a wallet made out of the leather as it looks so unique. ~~~ c22 I've had a salmon skin wallet for the past 15 years. It's showing some signs of wear, but it's still remarkably intact for it's age. I used to go through a new cow leather wallet at least once every three years. ------ peter_d_sherman Excerpt: "Tasha Nathanson wears the fish skin leather shoes she made as a proof of concept for the business she’s developing called 7 Leagues Leather. Part of her vision is to create a _social-enterprise tannery_ that provides training and work for people who face barriers to employment." Sounds like a great idea! Wishing her luck in this endeavor! ------ 1-6 I like the idea but I also enjoy the smell of leather. I'm afraid that my car will have a new fish smell. ~~~ kaybe I have a salmon skin bracelet that is a few years old and it smells faintly of what I know as the smell of leather. It should be fine. Maybe the bigger issue is that fish and thus the skin pieces are quite small.
To link to the entire object, paste this link in email, IM or documentTo embed the entire object, paste this HTML in websiteTo link to this page, paste this link in email, IM or documentTo embed this page, paste this HTML in website Staff photo by Richard lavitt WHAT GOES UP... — Jugglers w:t.n the Royal Lichtenstein One-Quarter Ring circus entertained students Wednesday in front of the Von KleinSmid Center. See story page 18. or Volume LXXXIX, Number 57 University of Southern California Thursday, December 11, 1980 11 PERCENT increase Parking staff granted wage hike By Ezell Gray, Jr. Staff Writer University officials recently decided to issue parking attendants an 11 percent wage increase which had been withheld from them for more than five months because of negotiations with Teamsters Local Union 911. Carl Levredge, director of University Security and Parking Operations, said the decision to release the raises, which were given to all university employees in July, was because "we felt this was beginning to create a hardship on the attendants." The university withheld the increase because it was waiting for the ruling of a National Labor Relations Board hearing on charges it brought against the Teamsters. The university charged the union engaged in unlawful conduct during a June election in which the parking attendants voted to unionize. The hearing, which began on Wednesday, is scheduled to conclude this afternoon, but the report may not be available for several weeks, said Lewis Gordon, a board spokesman. While waiting for the hearing to begin, the attendants were in legal limbo because they are not subject to union by-laws and will not receive union benefits until the matter is resolved. The university always intended to give the raises, the question was when to do so. "The money was always in the budget, but we didn't allocate it in July. I conferred with Anthony Lazarro (vice president of Business Affairs) and university attorneys and we decided to give the increase," Levredge said. In the attendants efforts to unionize, the university has charged the Teamsters tampered with the election. Some of the university's charges are directed at Lee Kincaid, parking attendant. Kincaid, who was an observer at the election, had a list of all parking attendants voting and checked off their names as they voted. This may have intimidated the attendants the university has said. Resolution asks for Student Affairs funds By Darren Leon Staff Writer Earlier this year, a shortfall in the general funds forced Jim Appleton, vice president of Student Affairs, to cut the budgets of all the programs under his jurisdiction, including 528,000 from the Health Center. In hopes of preventing similar cuts in Health Center budget in the future, the Student Senate approved a resolution Wednesday calling for the administration to allocate adequate funds to Student Affairs programs. The second part of the resolution asks the Board of Trustees to have President James H. Zumberge instruct the vice president of Student Affairs not to reapportion Health Center funds to other non-health related functions. The 528,000 reallocation was the third such act by Appleton. Eleven thousand dollars was taken in 1978-79 and in 1979-80. A report compiled by the senate's Student Affairs Reasearch-Ac-tion Unit said that the Health Center was established in 1949 by then university president, Fred D. Fagg, to provide "clinic and infirmary services to students." The plan was approved by the Board of Trustees and the purpose of the Health Center's fee has not been changed since. The senate objected to the Appleton's actions because the Health Center's funds, provided by student fees and not the general funds, were removed without student knowledge. Appleton opposed the second half of the resolution as a challenge of his authority as vice president. "It is very clearly established that I have the requirements in the four years 1 have been here," Appleton said. "My practice has been impeccable in getting student word on management. In fact, the board has vested in the president and me as his officer, the authority, following consultation, to make these judgments." "The Student Senate recognizes the problems that you have with your budget restraints and we do support the efforts you've taken to work with the budget," said Mercedes Marquez, a senator. "I am still bothered that the students are told that it's for a specific purpose, and it's not used for that purpose. "I still believe that it is unethical, I don't believe, to tell you the truth, after working on this committee, I don't think that you do have the authority. I think that the Student Senate will have to challenge this. We will do this through the Board of Trustees directly," Marquez said. (Continued on page 19) Low-interest loans to fire victims not a panacea By Ruben Castaneda In any region that has been In the wake of fires that re- declared a disaster area due to cently ravaged Southern Cali- a natural catastrophe, munici- fomia, many survivors face the palities (non-profit organiza- task of rebuilding their lives tions such as public schools, and their homes. churches and government Some victims will turn to owned buildings) are eligible low-interest loans from the fed- for grants, Vinso calls "free- eral government to facilitate bies." their financial recuperation. On the other hand, house- What they don't know is that holds are eligible only for they may be worse off, finan- loans. daily, after "recovering" than "They can borrow it, but they are immediately after the they still have to pay it back; fire. it's a debt," Vinso said. "You "People are adding signifi- use the money to rebuild, then cantly to their liabilities when what have you got? The same they assume new loans to re- house, but more debts than build. The idea that victims of yesterday. You have the old natural disasters quickly re- mortgage, plus the new mort- sume normal lives because of gage to the federal govern- financial help from the govern- ment, and most people are un- ment is a myth," said Joseph der-insured and will have to D. Vinso, professor of finance reacquire personal belongings." and business economics. The federal government of- Vinso has done disaster re- fers Small Business Administra-search for the National Science tion (SBA) loans to cover the Foundation for eight years. (Continued on page 7) High electricity cost prompts conservation study Air conditioning units cited as power wasters By John Lamb Staff Writer The cost of electricity for the university, estimated to reach 56 million for the year, has prompted a newly-developed commission to make several recommendations on cutting energy costs. The Energy Conservation Commission, in a report to President James H. Zumberge and Zohrab Kaprielian, outgoing executive vice president, said that while new facilities have been constructed on campus, "energy effiency was not an important criterion." The commission added that the university is now’ faced with "high cost energy and a campus of energy-obsolete facilities." Jn the report, the commission said the university has two major options: 1) to reduce utility use (with an emphasis on electricity), or 2) to increase the utility budget by approximately 51 million for 1980-81 with further increases forecast for the future. Robert Linnell, chairman of the commission and director of Institutional Studies, cited two types of energy waste prevalent on campus. "Energy waste of the first kind, namely one involving useless consumption, is easily identified but sometimes difficult to stop because someone has forgotten to turn off the lights or the coffee pot or the Xerox machine," Linnell said. A fair amount of energy is wasted in this fashion, he said, and costs the university "in the ballpark of hundreds of thousands of dollars a year." More energy is wasted in buildings, such as Waite Phillips Hall, that have central air conditioning and heating. Such systems are designed to cool or heat the entire building, not individu al rooms. Therefore, energy will be used to heat an entire building even though there may only be a few people present. "We've got buildings that were built in an era of cheap energy," Linnell said, "and now we have to cope with them in an era of high-cost energy. "For example, many of our buildings have sealed windows and cen- tral air conditioning systems, which are either on or off," he said. "You can't work in your office on a hot summer day or even in the cold winter or ever- in normal weather without the system on. The building is sealed. It gets stuffy. You've got to have the system going. "There may be a couple of people working in a couple of offices, and you've got a w'hole building running on one system." Linnell, a former university professor who taught a course on energy, said the cost of running these central air conditioning systems can vary, depending on size, from 5100 to "several hundred dollars" a day. (Continued on page 3) Staff photo by Richard lavitt WHAT GOES UP... — Jugglers w:t.n the Royal Lichtenstein One-Quarter Ring circus entertained students Wednesday in front of the Von KleinSmid Center. See story page 18. or Volume LXXXIX, Number 57 University of Southern California Thursday, December 11, 1980 11 PERCENT increase Parking staff granted wage hike By Ezell Gray, Jr. Staff Writer University officials recently decided to issue parking attendants an 11 percent wage increase which had been withheld from them for more than five months because of negotiations with Teamsters Local Union 911. Carl Levredge, director of University Security and Parking Operations, said the decision to release the raises, which were given to all university employees in July, was because "we felt this was beginning to create a hardship on the attendants." The university withheld the increase because it was waiting for the ruling of a National Labor Relations Board hearing on charges it brought against the Teamsters. The university charged the union engaged in unlawful conduct during a June election in which the parking attendants voted to unionize. The hearing, which began on Wednesday, is scheduled to conclude this afternoon, but the report may not be available for several weeks, said Lewis Gordon, a board spokesman. While waiting for the hearing to begin, the attendants were in legal limbo because they are not subject to union by-laws and will not receive union benefits until the matter is resolved. The university always intended to give the raises, the question was when to do so. "The money was always in the budget, but we didn't allocate it in July. I conferred with Anthony Lazarro (vice president of Business Affairs) and university attorneys and we decided to give the increase," Levredge said. In the attendants efforts to unionize, the university has charged the Teamsters tampered with the election. Some of the university's charges are directed at Lee Kincaid, parking attendant. Kincaid, who was an observer at the election, had a list of all parking attendants voting and checked off their names as they voted. This may have intimidated the attendants the university has said. Resolution asks for Student Affairs funds By Darren Leon Staff Writer Earlier this year, a shortfall in the general funds forced Jim Appleton, vice president of Student Affairs, to cut the budgets of all the programs under his jurisdiction, including 528,000 from the Health Center. In hopes of preventing similar cuts in Health Center budget in the future, the Student Senate approved a resolution Wednesday calling for the administration to allocate adequate funds to Student Affairs programs. The second part of the resolution asks the Board of Trustees to have President James H. Zumberge instruct the vice president of Student Affairs not to reapportion Health Center funds to other non-health related functions. The 528,000 reallocation was the third such act by Appleton. Eleven thousand dollars was taken in 1978-79 and in 1979-80. A report compiled by the senate's Student Affairs Reasearch-Ac-tion Unit said that the Health Center was established in 1949 by then university president, Fred D. Fagg, to provide "clinic and infirmary services to students." The plan was approved by the Board of Trustees and the purpose of the Health Center's fee has not been changed since. The senate objected to the Appleton's actions because the Health Center's funds, provided by student fees and not the general funds, were removed without student knowledge. Appleton opposed the second half of the resolution as a challenge of his authority as vice president. "It is very clearly established that I have the requirements in the four years 1 have been here," Appleton said. "My practice has been impeccable in getting student word on management. In fact, the board has vested in the president and me as his officer, the authority, following consultation, to make these judgments." "The Student Senate recognizes the problems that you have with your budget restraints and we do support the efforts you've taken to work with the budget," said Mercedes Marquez, a senator. "I am still bothered that the students are told that it's for a specific purpose, and it's not used for that purpose. "I still believe that it is unethical, I don't believe, to tell you the truth, after working on this committee, I don't think that you do have the authority. I think that the Student Senate will have to challenge this. We will do this through the Board of Trustees directly," Marquez said. (Continued on page 19) Low-interest loans to fire victims not a panacea By Ruben Castaneda In any region that has been In the wake of fires that re- declared a disaster area due to cently ravaged Southern Cali- a natural catastrophe, munici- fomia, many survivors face the palities (non-profit organiza- task of rebuilding their lives tions such as public schools, and their homes. churches and government Some victims will turn to owned buildings) are eligible low-interest loans from the fed- for grants, Vinso calls "free- eral government to facilitate bies." their financial recuperation. On the other hand, house- What they don't know is that holds are eligible only for they may be worse off, finan- loans. daily, after "recovering" than "They can borrow it, but they are immediately after the they still have to pay it back; fire. it's a debt," Vinso said. "You "People are adding signifi- use the money to rebuild, then cantly to their liabilities when what have you got? The same they assume new loans to re- house, but more debts than build. The idea that victims of yesterday. You have the old natural disasters quickly re- mortgage, plus the new mort- sume normal lives because of gage to the federal govern- financial help from the govern- ment, and most people are un- ment is a myth," said Joseph der-insured and will have to D. Vinso, professor of finance reacquire personal belongings." and business economics. The federal government of- Vinso has done disaster re- fers Small Business Administra-search for the National Science tion (SBA) loans to cover the Foundation for eight years. (Continued on page 7) High electricity cost prompts conservation study Air conditioning units cited as power wasters By John Lamb Staff Writer The cost of electricity for the university, estimated to reach 56 million for the year, has prompted a newly-developed commission to make several recommendations on cutting energy costs. The Energy Conservation Commission, in a report to President James H. Zumberge and Zohrab Kaprielian, outgoing executive vice president, said that while new facilities have been constructed on campus, "energy effiency was not an important criterion." The commission added that the university is now’ faced with "high cost energy and a campus of energy-obsolete facilities." Jn the report, the commission said the university has two major options: 1) to reduce utility use (with an emphasis on electricity), or 2) to increase the utility budget by approximately 51 million for 1980-81 with further increases forecast for the future. Robert Linnell, chairman of the commission and director of Institutional Studies, cited two types of energy waste prevalent on campus. "Energy waste of the first kind, namely one involving useless consumption, is easily identified but sometimes difficult to stop because someone has forgotten to turn off the lights or the coffee pot or the Xerox machine," Linnell said. A fair amount of energy is wasted in this fashion, he said, and costs the university "in the ballpark of hundreds of thousands of dollars a year." More energy is wasted in buildings, such as Waite Phillips Hall, that have central air conditioning and heating. Such systems are designed to cool or heat the entire building, not individu al rooms. Therefore, energy will be used to heat an entire building even though there may only be a few people present. "We've got buildings that were built in an era of cheap energy," Linnell said, "and now we have to cope with them in an era of high-cost energy. "For example, many of our buildings have sealed windows and cen- tral air conditioning systems, which are either on or off," he said. "You can't work in your office on a hot summer day or even in the cold winter or ever- in normal weather without the system on. The building is sealed. It gets stuffy. You've got to have the system going. "There may be a couple of people working in a couple of offices, and you've got a w'hole building running on one system." Linnell, a former university professor who taught a course on energy, said the cost of running these central air conditioning systems can vary, depending on size, from 5100 to "several hundred dollars" a day. (Continued on page 3)
Q: SSIS Data Source: Embedded Queries, Stored Procedures, or Functions We are moving data from OLTP server into Data Warehouse server, utilizing SSIS to conduct this. When writing queries from the OLTP Data Source, it it better to utilize? 1) Inline Embedded queries 2) Functions 3) Or Stored Procedures In researching and testing - Embedded queries are great, however we want code placed in SSDT Database projects to build/compile. So if column name changes/deleted, we would know in Devops portion. If writing in SSIS Datasource 'Test abcd etc', SSIS will still build/compile. If writing in SQL Database project, 'select testabcd from dbo.exampletable', SSDT DB project will fail to build/compile. I hear Functions are great, since it will display the metadata. However, Multi Statement table value functions are Slow, which team will require sometime. Stored procedures I am reading have issues with creating metadata. Is this true ? Is there a workaround, heard its possible to create metadata in stored procedures. Can someone let me know good option between three, or any other options? 4) * Did not want to incorporate views, since team wants to parameterize queries by source Create/Update Dates, if ever intending to reprocess data. A: I would recommend using stored procedures. As far as issues with the metadata, this can occur when temporary tables are used. Using the WITH RESULT SETS option to execute the stored procedure will allow you to define the metadata of the columns instead and SSIS can bypass this step. An example of this follows. Also note that if any column definitions were to change or if new columns are added, this would need to be updated as well. You may also run into problems with using parameters with an OLE DB source as in your screenshot. However this can be overcome by using the "SQL command from variable" option for the Data Access field. A string variable can be created as an expression that executes the stored procedure using a parameter sent to the package (or project). An example of this is below. This example uses the DT_STR function to cast the numeric parameter to a string in order to concatenate it. This is not necessary for string parameters or course, I only included this in case you use numeric parameters. The WITH RESULT SETS option can also be used in an expression concatenating it with the parameter following the same method. WITH RESULT SETS EXEC ('dbo.YourSP') WITH RESULT SETS ( ( ColumnA INT, ColumnB VARCHAR(250), ColumnC DATETIME ) ); Variable Expression using Parameter "EXEC dbo.YourSP " + (DT_STR, 10, 1252)@ @[$Package::YourParameter] Functions Followup Response: If you prefer to use functions and they better suite your needs you can go that route. I tend to prefer stored procedures in general as they offer for flexibility (perform DML/DDL, use temp tables, etc.). If you do use functions, I'd recommend using an inline over a multi-statement table valued version. The inline function is essentially treated like a view and will use the proper statistics to create better execution plans, whereas multi-statement functions won't get these benefits.
The Future of Family History? Family history research is going to be great fun for our descendants. Family history research sites will likely have records like ‘Emails 2006-2008.’ So at some future date it is quite possible your Great Great Great Great Great Grandchildren may be adding what we eat for breakfast to our profile pages. The profile picture is likely to be the worst photo anybody has ever taken of us in our entire life Perhaps by then they will have worked out a way to have a ‘Window back in Time’ and actually watch us eating breakfast. Google Earth has opened up all sorts of interesting possibilities.No doubt they will be able to survey their ancestors house through time. Each and every day we are leaving a digital footprint.I feel they will probably be scouring our medical records one day. Family history websites are usually filled with photographs of deceased ancestors. I often contemplate the fact that when they posed for that photograph a hundred years or more ago, they had no idea it would one day have a worldwide audience. I am also well aware that most of we family historians are indeed amateurs. It is quite possible that a photo will be misidentified and we will actually feature as the profile picture of somebody’s Great Aunt Gladys.(even if Gladys features nowhere in our names). Still photo identification software is gradually getting better. Doesn’t it always seem that ancestors are quirky? No matter what we do in our lives it will no doubt be the quirky stuff which gets highlighted. Isn’t it comforting to know that our most embarrassing moments are now frequently captured for posterity on the web? Family history does tend to teach you that there really are few secrets eventually. It is amazing what shows up in records even hundreds of years ago. I absolutely love researching old newspapers. I have even found articles which list the entire possessions of several ancestors down to their sack of potatoes or their feather beds. Who knows what nasty surprises may be in store in the future for our poor descendants?
Q: NotSupportedException: Data binding directly to a store query (DbSet, DbQuery, DbSqlQuery) I am getting the following Exception NotSupportedException: Data binding directly to a store query (DbSet, DbQuery, DbSqlQuery) Stack Trace: at System.Data.Entity.Infrastructure.DbQuery`1.System.ComponentModel.IListSource.GetList() at MS.Internal.Data.ViewManager.GetViewRecord(Object collection, CollectionViewSource cvs, Type collectionViewType, Boolean createView, Func`2 GetSourceItem) at MS.Internal.Data.DataBindEngine.GetViewRecord(Object collection, CollectionViewSource key, Type collectionViewType, Boolean createView, Func`2 GetSourceItem) at System.Windows.Data.CollectionViewSource.GetDefaultCollectionView(Object source, Boolean createView, Func`2 GetSourceItem) at System.Windows.Data.CollectionViewSource.GetDefaultCollectionView(Object source, DependencyObject d, Func`2 GetSourceItem) at System.Windows.Controls.ItemCollection.SetItemsSource(IEnumerable value, Func`2 GetSourceItem) at System.Windows.Controls.ItemsControl.OnItemsSourceChanged(DependencyObject d, DependencyPropertyChangedEventArgs e) at System.Windows.DependencyObject.OnPropertyChanged(DependencyPropertyChangedEventArgs e) at System.Windows.FrameworkElement.OnPropertyChanged(DependencyPropertyChangedEventArgs e) at System.Windows.DependencyObject.NotifyPropertyChange(DependencyPropertyChangedEventArgs args) at System.Windows.DependencyObject.UpdateEffectiveValue(EntryIndex entryIndex, DependencyProperty dp, PropertyMetadata metadata, EffectiveValueEntry oldEntry, EffectiveValueEntry& newEntry, Boolean coerceWithDeferredReference, Boolean coerceWithCurrentValue, OperationType operationType) at System.Windows.DependencyObject.InvalidateProperty(DependencyProperty dp, Boolean preserveCurrentValue) at System.Windows.Data.BindingExpressionBase.Invalidate(Boolean isASubPropertyChange) at System.Windows.Data.BindingExpression.TransferValue(Object newValue, Boolean isASubPropertyChange) at System.Windows.Data.BindingExpression.Activate(Object item) at System.Windows.Data.BindingExpression.AttachToContext(AttachAttempt attempt) at System.Windows.Data.BindingExpression.MS.Internal.Data.IDataBindEngineClient.AttachToContext(Boolean lastChance) at MS.Internal.Data.DataBindEngine.Task.Run(Boolean lastChance) at MS.Internal.Data.DataBindEngine.Run(Object arg) at MS.Internal.Data.DataBindEngine.OnLayoutUpdated(Object sender, EventArgs e) at System.Windows.ContextLayoutManager.fireLayoutUpdateEvent() at System.Windows.ContextLayoutManager.UpdateLayout() at System.Windows.UIElement.UpdateLayout() MainWindow.xaml <Window x:Class="TryingWPFWithUltimate.MainWindow" xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" xmlns:local="clr-namespace:TryingWPFWithUltimate;assembly=" Title="MainWindow" Height="350" Width="525"> <Window.DataContext> <local:ViewModel/> </Window.DataContext> <Grid> <ComboBox ItemsSource="{Binding Path=DatabaseContext.Schools}"> //Exception here <ComboBox.ItemTemplate> <DataTemplate> <StackPanel> <Label Content="{Binding Path=Name}"/> </StackPanel> </DataTemplate> </ComboBox.ItemTemplate> </ComboBox> </Grid> </Window> ViewModel.cs using System; using System.Collections.Generic; using System.ComponentModel; using System.Linq; using System.Text; using System.Threading.Tasks; namespace TryingWPFWithUltimate { class ViewModel:INotifyPropertyChanged { private DatabaseContext _databaseContext; public DatabaseContext DatabaseContext { get { return _databaseContext; } set { _databaseContext = value; RaisePropertyChanged("DatabaseContext"); } } public ViewModel() { DatabaseContext = new DatabaseContext(); } } } Here is how the entity data model looks (it is very simple) - Can anybody explain me what I am doing wrong and how I can fix this? A: As explained in the other post you cannot databind directly to DbSet which is what you are attempting to do. Instead you need to get a create a local collection and populate it with the results of a query. Here is a very good tutorial. And an example of the view model you can start with: using System.Collections.ObjectModel; namespace TryingWPFWithUltimate { class ViewModel:INotifyPropertyChanged { private DatabaseContext _databaseContext; public ViewModel() { _databaseContext = new DatabaseContext(); Schools = new ObservableCollection<School>(_databaseContext.Schools); } public ObservableCollection<School> Schools { get; set; } } } And the binding: <ComboBox ItemsSource="{Binding Path=Schools}">
Hello, The minutes of the 7 Apr 2003 TAG teleconf are available as HTML [1] and as text below. - Ian [1] http://www.w3.org/2003/04/07-tag-summary.html ==================================================== Minutes of 7 Apr 2003 TAG teleconference Nearby: [4]IRC log | [5]Teleconference details · [6]issues list · [7]www-tag archive [4] http://www.w3.org/2003/04/07-tagmem-irc.html [5] http://www.w3.org/2001/tag/group/#remote [6] http://www.w3.org/2001/tag/ilist [7] http://lists.w3.org/Archives/Public/www-tag/ 1. Administrative 1. Roll call: NW (Chair), TBL, PC, DO, TB, CL, RF, IJ (Scribe): Regrets: SW. Missing: DC. 2. Accepted [8]31 Mar telecon minutes 3. Accepted this [9]agenda 4. Accepted [10]summary of TAG activity with two suggestions: 1. PC reminder about report to AC in May 2. CL suggested wording for progress on issues 3. Action IJ: Send out summary with these changes. 5. Next meeting: 14 April. No regrets signaled. [8] http://www.w3.org/2003/03/31-tag-summary.html [9] http://www.w3.org/2003/04/07-tag.html [10] http://lists.w3.org/Archives/Member/tag/2003Apr/0007.html 1.1 Meeting planning * The TAG will strive to organize a virtual meeting shortly after the WWW Conference. See [11]thoughts from SW on organizing a virtual meeting. Completed action TBL 2003/03/31: Propose June dates (after 4 June). (See [12]questionnaire) The TAG will try to finalize the date next week after remaining TAG participants have completed questionnaire. * Upcoming discussions: + The TAG expects to discuss its presentation to the AC on 14 and 21 April. + Action IJ: Report to mtg organizer TBL constraint on slot for TAG report, then report back to TAG on revised slot. [11] http://lists.w3.org/Archives/Member/tag/2003Mar/0082.html [12] http://www.w3.org/2002/09/wbs/34270/05%252F06.03/ 1.2 W3C Track Presentation * [13]W3C track [30]: "TAG scope" * [14]Notes from Paul Cotton [13] http://www2003.org/t_www.htm [30] http://www.textuality.com/xml/rddl3.html [14] http://lists.w3.org/Archives/Member/tag/2003Apr/0010.html [Chris] 'what is the tag and why should you care" fits in 30 minutes [Chris] when is the www slot, actually? [Ian] PC suggestion: 1. scope and role of the TAG 2. sample findings issued by the TAG and their results 3. overview of the Web Architecture document [Chris] who wil be there - ian, paul, chris, timbl [Ian] NW: Please reply on email to PC's proposal Next week: TAG will finalize who will give which piece of the track presentation on 14 April. 2. Technical 1. [15]Architecture document 2. [16]contentTypeOverride-24 3. [17]namespaceDocument-8 4. [18]IRIEverywhere-27 2.1 Architecture document See also: [19]findings. 1. [20]26 Mar 2003 Working Draft of Arch Doc: 1. Action DC 2003/02/06: Attempt a redrafting of 1st para under [21]2.2.4 of 6 Feb 2003 draft 2. Action DC 2003/01/27: write two pages on correct and incorrect application of REST to an actual web page design 3. Action DO 2003/01/27: Please send writings regarding Web services to tag@w3.org. DO grants DC license to cut and paste and put into DC writing. 4. Completed action CL 2003/0127: Draft language for arch doc that takes language from internet media type registration, propose for arch doc, include sentiment of TB's second sentence from CP10. ([22]Done) CL: Belongs in section 4.2 of Architecture Document. 5. Action DC 2003/03/17: : Write some text for interactions chapter of arch doc related to [23]message passing, a dual of shared state. [19] http://www.w3.org/2001/tag/findings [20] http://www.w3.org/TR/2003/WD-webarch-20030326/ [21] http://www.w3.org/2001/tag/2002/webarch-20030206#uri-use [22] http://lists.w3.org/Archives/Public/www-tag/2003Apr/0034.html [23] http://lists.w3.org/Archives/Public/www-tag/2003Mar/0018.html [Ian] Done. IJ: Who is reading the arch doc? [Ian] NW: I am getting closer to reading it. [Chris] I have been reading it this week, yes [Ian] TBL also reading arch doc. 2.2 contentTypeOverride-24 * [24]contentTypeOverride-24 + See [25]email from DC to Voice Browser WG. + Completed action IJ 2003/03/24: Draft up some language; make connection to error-handling issue. TAG position with rationale why to not override server value of content type. ([26]Done) [24] http://www.w3.org/2001/tag/open-summary.html#contentTypeOverride-24 [25] http://lists.w3.org/Archives/Public/www-tag/2003Feb/0085.html [26] http://www.w3.org/2001/tag/doc/mime-respect-20030405.html [Ian] IJ: I completed the action item, but haven't made the [27]draft public. I intend to publish this in a week; please review. CL: Some of the material was in an earlier finding. Please link back to [28]Internet Media Type registration, consistency of use IJ: Yes, I agree. I'll put publication of this on agenda for next week [27] http://www.w3.org/2001/tag/doc/mime-respect-20030405.html [28] http://www.w3.org/2001/tag/2002/0129-mime 2.3 namespaceDocument-8 * [29]namespaceDocument-8 + Next steps on [30]RDDL Proposal from [31]Tim Bray/Paul Cotton [29] http://www.w3.org/2001/tag/open-summary.html#namespaceDocument-8 [30] http://www.textuality.com/xml/rddl3.html [31] http://lists.w3.org/Archives/Public/www-tag/2003Feb/0213 [Ian] TB: I have an action to fix this up to ensure that it's valid, modularized xhtml. Two substantive issues before the TAG: 1. Do we support this version of RDDL on a technical basis? 2. How do we move it forward? TBL: I think that the TAG is not set up to be a WG at this time; Rec track docs would be quite a drain on resources at this time. If this were a draft, I think at this time it would be better to fork off another WG. [paulc] Please see [32]http://lists.w3.org/Archives/Member/tag/2003Apr/0012.html for my view. [32] http://lists.w3.org/Archives/Member/tag/2003Apr/0012.html [Ian] TBL: Another possibility is to say "we don't think this is contentious, we don't have time to get review, we'll publish as a Note.": Then, if picked up, then can put on Rec track. Or if not used because of problems, move to a WG for more work. PC: On this front, I think the TAG should "ask permission" and not "ask forgiveness". Therefore I would like to propose the following: 1. we publish our proposal for namespacedocument-8 [$1\47] as a Note ASAP 2. we specifically request input for the AC membership at the May AC on how the content of this Note if and should be progressed to Recommendation track. PC: We should negotiate this precedent with the AC. With simple change by TB, we could publish as Note quickly and get ac feedback. TB: I think I agree with TBL and PC; don't want to be sloppy to respond formally to public input. What about publishing this as a finding? I could also see publishing as a Note. [Zakim] Chris, you wanted to talk about life after rec, testsuites, and other resource suckers [Ian] CL: Lots of responsibilities for Rec track work (e.g., test suites, life after Rec, etc.) I support publication as a finding. NW: I agree with PC (publication as a Note) [Chris] we could still ask the AC if the finding should go on the rec track and if so who should do it would work [Ian] NW: I think that findings have more stature; people used to seeing docs from TAG at this point. People are more used to seeing spec-like things as Notes. IJ: Note more spec-like; TR page as location for document likely to get more attention.: I lean slightly towards Note publicatoin. [Zakim] timbl_, you wanted to ask about links from [33]http://www.textuality.com/xml/rddl3.html [33] http://www.textuality.com/xml/rddl3.html [Ian] Action TB: (1) Clean up messy section 4 of RDDL draft and (2) Investigate and publish a canonical mapping to RDF. Summarizing: TAG doesn't think that Rec track best option for now (at least without consulting the AC). TBL: I think finding is inappropriate; people expect a certain genre of thing in a finding. This is Note-like. We could publish a finding explaining why the Note is good.... TB: Can you have a Note that says "This represents the consensus of...." IJ: Yes. [TBray] What Norm said [Chris] finding can be short, but should still exist [Ian] Proposed: Plan is to publish TB's revised RDDL document as a W3C Note. Status section would say that it represents the consensus of the TAG. CL: The finding would say why the solution is desirable. IJ: I think that rationale would be better in the document. [paulc] Where do we say that users of namespaces SHOULD use the suggested format. [Ian] CL: I'd like each issue to close with a finding. [Chris] its a consistency thing [Ian] TB: Current language in Note does not say "namespaces SHOULD use the suggested format." I would be fine to say that, but don't think it needs it. [TBray] Current doc says "A Resource Directory is designed to be suitable for service as the body of an entity returned by dereferencing a URI serving as an XML Namespace name." [Ian] TBL: I hear PC saying put language spec in a Note, put recommendations on usage in a finding. I feel that we can put the RDDL Note forward, but I agree where there will be applications where people will use XML or RDF schema. I don't want to force people to use it. NW: I agree with CL to use finding to answer finding, publish spec in Note. [TBray] OK, I can go with the the 2-doc solution [Ian] IJ: I can go with the 2-doc solution. Proposal: TAG expects to publish RDDL Spec as a Note (status section to indicate consensus of TAG), and to produce a finding to answer question of namespaceDocument-8, namely that groups SHOULD use RDDL. TBL: I think we should say that RDDL is a good example (don't say "SHOULD" in finding; just indicate RDDL as a good example). [DaveO] I think we should say that RDDL should be used. [Ian] Proposal: TAG expects to publish RDDL Spec as a Note (status section to indicate consensus of TAG), and to produce a finding to answer question of namespaceDocument-8. [timbl_] ok by me [Ian] TB: I'm optimistic that in the finding we'll find consensus on verbiage. [timbl_] I don't want to recommend RDDL any more than we recommend XML, RDF or SVG [Ian] Proposal: TAG expects to publish RDDL Spec as a Note (status section to indicate consensus of TAG that this is a suitable representation of a resource), and to produce a finding to answer question of namespaceDocument-8 (with some sort of pointer to the RDDL spec). Proposal: TAG expects to publish RDDL Spec as a Note (status section to indicate consensus of TAG that RDDL is a suitable format for representations of an XML namespace), and to produce a finding to answer question of namespaceDocument-8 (with some sort of pointer to the RDDL spec). Resolved: TAG expects to publish RDDL Spec as a Note (status section to indicate consensus of TAG that RDDL is a suitable format for representations of an XML namespace), and to produce a finding to answer question of namespaceDocument-8 (with some sort of pointer to the RDDL spec). Action TB: Work on RDDL Note. Action PC: Work on TAG finding. 2.4 IRIEverywhere-27 * [34]IRIEverywhere-27 + Action CL 2003/03/31: Revised position statement on use of IRIs. See [35]email from CL on next steps. [34] http://www.w3.org/2001/tag/open-summary.html#IRIEverywhere-27 [35] http://lists.w3.org/Archives/Public/www-tag/2003Apr/0033.html [DaveO] I have to step away for a few minutes. [Ian] CL: I'd like more discussion this week; deadline 21 April? Also need to convey to Martin the desirability of seeing [36]http://www.w3.org/International/iri-edit/ updated to include iDNS and published as draft 4, and to move to RFC soon. I'd like to address question of 'blessed wording' regarding IRI that three XML-related specs can use to get to Proposed Rec. [36] http://www.w3.org/International/iri-edit/ [TBray] Kanji example in [37]http://www.tbray.org/ongoing/When/200x/2003/03/31/IRI [37] http://www.tbray.org/ongoing/When/200x/2003/03/31/IRI [Ian] TBL: I think there is a fundamental question that has not been resolved, and is causing a lot of tension.: Whether, fundamentally, the fundamental string is the URI, or whether we are dispensing with URIs in favor of Unicode strings instead. [Chris] position A says IRI is a way of talking about URI position B says IRI is the real thing and URI is a subset that should go away [Ian] TBL: I was under the impression during development of IRIs, that the model was position A. I think the TAG needs to adress this bifurcation (A v. B) TB: I agree with the TBL and CL characterization of the heart of the issue. [Chris] and please lets get to blessed text after we have discussed this [Ian] TB: "Is any URI an IRI?" I think the answer is No; lots of sloppiness about hexifying. [Chris] strongly disagree with TimBray [Ian] TB: I think IRIs need to be rigid and deterministic about when hexifying is used, and that the mapping (to URI) process be well-characterized. CL: I don't think it's true that all URIs are IRIs. [Some discussion of equivalence measures around hexifying] CL: It does not follow that the URI version of an IRI is the same as that IRI. It does not follow that the URI version of an IRI is the same as that IRI in all cases: same when you dereference; not the same in e.g., namespace comparisons. NW: Why inappropriate to convert to URI before comparison? CL: A number of specs don't do it that way; they do simple string matching in a number of specs. Therefore, not reasonable in practice to require conversion to URI. E.g., you have to have a kanji character and upper case hex and lower case hex to be the same. [TBray] We really need to do this in a room with a whiteboard [Ian] CL: Too much water to push uphill (especially when extra processing doesn't get you much). [Zakim] timbl_, you wanted to argue that theis is relatively little water to push up hill [Ian] TBL: I've been there too.... I was convinced of CL's argument, but upon further reflection believe it's untenable.: Suppose that identifiers are unicode strings and you don't have to canonicalize them to compare them. There is ten years of software using 7-bit fields for this quantity. [paulc] I need to step out for 3-4 min. [Ian] TBL: If suddenly you allow namespaces that can differ in 7-bit systems but not in 8-bit systems. Changing the XML spec is relatively easy. You have a transition strategy: ask them to canonicalize namespace IDs and xpaths. During the interim, the only time things actually fail is when people use things that only differ in case of hex encoding. So this is a corner case. Easier to move to full canonicalization and full equality and to be consistent with 10 years of code and fix latest departures. CL: I strongly disagree. TB: I'm not sure that CL and I disagree that much. In terms of URIs, it's a fact that everyone uses string comp in namespace applications. We have ample evidence that this is prone and shakey to failure, but people do it anyway. [Chris] everyone uses string comparison in namespace comparisons, and in xpath. and in xml query. and .... [Ian] TB: One reason has to do with hex-encoding. We can remove that sloppiness in the IRI spec; but we'd have to abandon the insistence that every URI is an IRI. TBL: I hear TB proposing that IRIs are always canonical. [Zakim] Chris, you wanted to point out that I really, really want to talk about blessed text in the next 20 minutes [paulc] I'm back. [Ian] TBL: Are you saying, CL, that browsers that use hex encoding are wrong? CL: Yes, they are doing it too early. They should do when they send over HTTP transport. TBL: If you are telling me that the encoded and unencoded forms are equivalent.... CL: Yes. RF: When a robot takes advantage of some heuristic, this is not for the purpose of determining equivalence of the identifier; it's equivalence of an operation. TBL: Each algorithm in the deployed software, though, is using a different piece of the URI spec for its heuristics. RF: There is a reason to create an equivalence relationship between IRIs and URIs. That there are other mechanisms that don't respect that equivalence is irrelevant. I agree with TBL. NW: I think that TB is right - the key to make this all fit together is to say "Not all URIs are IRIs, and you define mappings that are reversible" [Chris] deprecated subset of URIs [Ian] [On text about IRIs in specs at this point] CL: Should we be in the business of producing parts of specs that have guarantees associated with them, or not.: Or do we say "Here's our best guess, do the best you can to prepare something for the Director." [Zakim] timbl_, you wanted to say we should respond and we should not suggest the result has papal infallibility. [Ian] TBL: If we are talking about this, we owe people a response, but without any guarantees. [Chris] agree about the papal infallibility [Ian] TB: see language in xml 1.1...hmmm, doesn't say much. CL: There is language in schema spec as well. People could point to that (It's a Rec) TB: I think the anyURI type is underspecified. Last time I looked, there were very few syntactic restrictions on what you can put in an anyURI. I don't think that that's a good solution. TBL: How about if we tell people to refer to the IRI draft. Then we explain to people what that means: When you refer to the IRI spec, you take on that %7e and %7E are the same. [Chris] this is the option A, push water uphill argument [Ian] TBL: That gets the XML specs off the hook. We need to explain that, the syntax and semantics are defined by URI specs. NW: Core WG wants to say that these things are IRIs, not URIs. [Chris] Core WG wants to say these things are IRIs [Ian] TB: I think that it's clear that we probably can't solve their problem for them.: IRI, though the right answer, isn't done. TBL: Propose that specs continue to be well-defined in terms of URIs, and only as well-defined as the IRI spec currently is. URI conformance + xml namespace conformance will give you this flexibility. NW: A lot of existing software will no longer be conformant. CL: XML Namespace software will break. RF: But IRIs won't look in the future like they look today. IRIs will change to support IDNA. NW: If you do what TBL just said, then you have to use URI comparison and not string comparison. RF: Then use the field, define in the other specs as CDATA, and forget about it. [Ian] CL: I have an action to write this up. [Chris] I cannot complete writing this up all proposed solutions have vehement objections [Ian] NW: IJ: please move the question of text that WGs may include in specifications up on the agenda next week. No resolution. 2.5 Other issues that have associated action items * [38]URIEquivalence-15 + SW proposal: Track RFC2396bis where [39]Tim Bray text has been integrated. Comment within the IETF process. Move this issue to pending state? * [40]xmlIDSemantics-32 + See [41]Chris Lilley draft finding * [42]abstractComponentRefs-37 * [43]xlinkScope-23 + Status report? + See [44]draft, and [45]SW message to CG chairs. * [46]siteData-36 + Action TBL 2003/02/24 : Summarize siteData-36 * [47]xmlFunctions-34 + Action TBL 2003/02/06: State the issue with a reference to XML Core work. See [48]email from TimBL capturing some of the issues. * [49]binaryXML-30 + Action TB 2003/02/17: Write to www-tag with his thoughts on adding to survey. + Next steps to finding? See [50]summary from Chris. * [51]contentPresentation-26 + Action CL 2003/02/06: Create a draft finding in this space. Deadline 3 March. * [52]rdfmsQnameUriMapping-6 + Action DC 2003/02/06: Propose TAG response to XML Schema desideratum ([53]RQ-23). * [54]uriMediaType-9 + Action DC 2003/02/06: Start discussion on discuss@apps.ietf.org, but not urgent * [55]HTTPSubstrate-16 + Action RF 2003/02/06: Write a response to IESG asking whether the Web services example in the SOAP 1.2 primer is intended to be excluded from RFC 3205 + See [56]message from Larry Masinter w.r.t. Web services. * [57]errorHandling-20 + Action CL 2003/02/06: Write a draft finding on the topic of (1) early/late detection of errors (2) late/early binding (3) robustness (4) definition of errors (5) recovery once error has been signaled. Deadline first week of March. * [58]metadataInURI-31 + Action SW 2003/02/06: Draft finding for this one. * [59]fragmentInXML-28 : Use of fragment identifiers in XML. 1. Connection to content negotiation? 2. Connection to opacity of URIs? 3. No actions associated / no owner. [38] http://www.w3.org/2001/tag/open-summary.html#URIEquivalence-15 [39] http://www.textuality.com/tag/uri-comp-4 [40] http://www.w3.org/2001/tag/ilist#xmlIDSemantics-32 [41] http://www.w3.org/2001/tag/doc/xmlIDSemantics-32.html [42] http://www.w3.org/2003/04/24-tag-summary.html#abstractComponentRefs-37 [43] http://www.w3.org/2001/tag/ilist.html#xlinkScope-23 [44] http://lists.w3.org/Archives/Member/tag/2003Mar/0094.html [45] http://lists.w3.org/Archives/Member/tag/2003Mar/0104 [46] http://www.w3.org/2001/tag/ilist.html#siteData-36 [47] http://www.w3.org/2001/tag/ilist#xmlFunctions-34 [48] http://lists.w3.org/Archives/Public/www-tag/2003Feb/0309.html [49] http://www.w3.org/2001/tag/open-summary.html#binaryXML-30 [50] http://lists.w3.org/Archives/Public/www-tag/2003Feb/0224.html [51] http://www.w3.org/2001/tag/open-summary.html#contentPresentation-26 [52] http://www.w3.org/2001/tag/open-summary.html#rdfmsQnameUriMapping-6 [53] http://www.w3.org/TR/2003/WD-xmlschema-11-req-20030121/#N400183 [54] http://www.w3.org/2001/tag/open-summary.html#uriMediaType-9 [55] http://www.w3.org/2001/tag/open-summary.html#HTTPSubstrate-16 [56] http://lists.w3.org/Archives/Public/www-tag/2003Feb/0208.html [57] http://www.w3.org/2001/tag/open-summary.html#errorHandling-20 [58] http://www.w3.org/2001/tag/open-summary.html#metadataInURI-31 [59] http://www.w3.org/2001/tag/ilist#fragmentInXML-28 3. Other actions * Action IJ 2003/02/06: Modify issues list to show that actions/pending are orthogonal to decisions. IJ is working with PLH on this. Revisit this end of April. _________________________________________________________________ Ian Jacobs for Norm Walsh and TimBL Last modified: $Date: 2003/04/07 22:36:12 $ -- Ian Jacobs (ij@w3.org) http://www.w3.org/People/Jacobs Tel: +1 718 260-9447
More than half of people who have struggled with their mental health have experienced stigma or discrimination because of it, new research shows. See Me – a Scottish charity working to end mental health discrimination – conducted a poll of 2,005 people to find out more about the impact mental health problems have on the way a person is perceived or treated. The survey showed that more than half (56 per cent) of respondents suffering from poor mental health said they had faced stigma and discrimination, with GP practices being highlighted as the most common place for it to occur. The data also revealed that people are likely to experience such treatment from those closest to them, such as friends, family and work colleagues. Nearly one in four (37 per cent) of those surveyed who had not experienced mental health problems themselves added that they have witnessed stigma and discrimination towards others. Meanwhile, more than a quarter (27 per cent) said they would not want a person who has a mental health problem to take care of their child, and one in 10 (11 per cent) would not be willing to have a relationship with someone with a mental health issues. Despite this, the research does suggests that there are signs of improvement, with almost 80 per cent of respondents saying they think public perceptions of mental health problems have improved over the past decade. Furthermore, 85 per cent said they believe it is possible to have a mental health problem and live a meaningful life, while 55 per cent said they feel confident to challenge mental health stigma and discrimination. TV presenter Gail Porter, who recently released a documentary about her mental health journey, is working with See Me to urge people to be confident in recognising stigma and discrimination. “While I was enjoying a successful career on television, I was experiencing serious mental health illness, but at the time there was still a real stigma around the subject so I had to smile and carry on as normal. Hiding it like this just made things worse,” Porter said. 16 male celebrities who have spoken about mental health Show all 16 1 /16 16 male celebrities who have spoken about mental health 16 male celebrities who have spoken about mental health Stormzy Stormzy told Channel 4 in 2017 that by opening up about his depression he hoped to help others. "I think for them to see I went through it would help," the BRIT-award-winning musician said. "For a long time I used to think that soldiers don’t go through that. You know? Like, strong people in life, the bravest, the most courageous people, they don’t go through that, they just get on with it...and that’s not the case." Rex Features 16 male celebrities who have spoken about mental health Robert Pattinson Twilight star Robert Pattinson told The Telegraph he struggled with depression for a period of time. “'I had a bit of a struggle at first because my life really contracted and I couldn't do a lot of the stuff I used to be able to do." He advised aspiring Hollywood actors to "take care" of your mental health. "If you get as famous as quickly as I did, your personal growth stops suddenly.” Rex Features 16 male celebrities who have spoken about mental health Michael Phelps Former American swimmer Michael Phelps, the most decorated Olympian in history, experienced periods of depression and suicidal feelings. He told Today in 2018: "After years and years and years of just shoving every negative, bad feeling down to the point where I mean, I just didn't even feel it anymore...and for me, that sent me down a spiral staircase real quick and like I said, I found myself in a spot where I didn't want to be alive anymore." Rex Features 16 male celebrities who have spoken about mental health Zayn Malik Zayn Malik told The Sunday Times Style magazine about suffering with an eating disorder and anxiety. "We’re all human. People are often afraid to admit difficulties, but I don’t believe that there should be a struggle with anything that’s the truth," said the former One Direction singer. "If you were a guy, you used to have to be really masculine, but now expressing emotion is accepted and respected.’ Rex Features 16 male celebrities who have spoken about mental health Will Young Singer Will Young has spoken about his experience with suicidal thoughts. "There's a part of my brain that is telling me that you're about to die, [so] you either shut down, freeze or you run. The only thing I can do is go to bed." He said that without the help of his therapist he probably would have been successful in his suicide attempts. “I have so many mental thoughts in my head: ‘You’re never going to sing again’. ‘That was a s*** dance move.’ ‘They’re hating you.’” Rex Features 16 male celebrities who have spoken about mental health Professor Green After his father took his own life in 2008, rapper Professor Green started speaking openly about his mental health problems and the pressure on men to be strong. “We have to figure out a way that men can talk to one another and figure out how to make themselves feel better,” he told theiNews. Although he is pleased to "start conversations" Green warns how becoming a mental health spokesperson can be high pressure. “It’s difficult because sometimes you’re having a great day, then someone comes up and tells you something absolutely horrific; I’m not a psychologist and it’s really hard." Rex Features 16 male celebrities who have spoken about mental health Donald Glover American actor, comedian, writer and musician Donald Glover, who performs under the name Childish Gambino told Vice in 2013 he'd been through periods of depression following the end of his tour. "I was just super depressed. I mean, I tried to kill myself. I was really fucked up after that [tour], because I had this girl that I thought I was going to marry and we broke up. I didn’t feel like I knew what I was doing. I wasn’t living up to my standard, I was living up to other people’s standards, and I just said ‘I don’t see the point'.” Rex Features 16 male celebrities who have spoken about mental health Shawn Mendes Shawn Mendes told People magazine that talking about his mental health problems was the "scariest" thing he's ever done. "I still struggle with it but just remember every day that everyone deals with some level of anxiety or pressure; we're all in it together." He told The Sun in 2018: "All pain is temporary, and the thing is with anxiety, and why it's such a hard thing for people who don't have it to understand." Rex Features 16 male celebrities who have spoken about mental health Jim Carrey Comedian and actor Jim Carrey told iNews that he had struggled with depression throughout his life. “At this point, I don’t have depression. I had that for years, but now, when the rain comes, it rains, but it doesn’t stay. It doesn’t stay long enough to immerse me and drown me anymore.” Rex Features 16 male celebrities who have spoken about mental health Pete Wentz Fall Out Boy frontman Pete Wentz has spoken openly about his bipolar disorder diagnosis and other mental health problems. He said that it took him to reach breaking point before asking for help. "My best piece of advice, more than anything, is that there's other people out there that feel [suicidal], or are feeling that right at that time," he said. "Maybe your favorite actor, or a guy in a band, or whoever, there are people who feel that exact same thing and have made it through that. I would say more than anything, you're not alone in it." Rex Features 16 male celebrities who have spoken about mental health Jon Hamm "I struggled with chronic depression," Mad Men star Jon Hamm told The Guardian in 2010. "I did do therapy and antidepressants for a brief period, which helped me." Hamm said medication helped change his "brain chemistry" enough so he could get out of bed. "I don't want to sleep until four in the afternoon. I want to get up and go do my shit and go to work," he says. Rex Features 16 male celebrities who have spoken about mental health Rob Delaney Catastrophe actor and comedian Rob Delaney, who lost his son Henry to brain cancer in January 2018, said he has long struggled with depression and encouraged others in the same position to seek help. "Asking for help is strong because it leads directly to staying alive," he says. "Not asking for help is as fear-based a decision as a human being can make and can lead you swiftly in a bad direction. It's not exaggerating to say that path can end in death." Rex Features 16 male celebrities who have spoken about mental health Dwayne 'The Rock' Johnson Dwayne Johnson has spoken on numerous occasions about mental health. On ITV's Lorraine Kelly he said: "Depression doesn't discriminate, and I thought that was an important part of the narrative if I was going to share a little bit of my story of the past. Regardless of who you are or what you do for a living or where you come from, it doesn't discriminate, we all kind of go through it. If I could share a little bit of it and if I could help somebody, I'm happy to do it." Rex Features 16 male celebrities who have spoken about mental health Ryan Reynolds "I have anxiety, I've always had anxiety," the Deadpool actor told the New York Times in 2018. "Both in the lighthearted ‘I’m anxious about this’ kind of thing, and I’ve been to the depths of the darker end of the spectrum, which is not fun.” Reynolds said he went through a period of partying to try and make himself "vanish" in some way and would frequently suffer with anxiety-related insomnia. Rex Features 16 male celebrities who have spoken about mental health Bruce Springsteen Bruce 'The Boss' Springsteen told Esquire magazine in 2018 that although he wouldn't describe himself as being mentally unwell, he has "come close enough" and takes medication to cope. "I’m on a variety of medications that keep me on an even keel; otherwise I can swing rather dramatically and the wheels can come off a little bit.” Rex Features 16 male celebrities who have spoken about mental health Prince Harry Prince Harry has been a vocal supporter of mental health campaigns like 'Time To Talk'. He also has spoken openly about his own problems following the death of his mother, Princess Diana. He told The Telegraph: “I have probably been very close to a complete breakdown on numerous occasions when all sorts of grief and sort of lies and misconceptions and everything are coming to you from every angle." Harry said there was "huge merit" in talking about your issues and keeping quiet only makes things worse. Rex Features "In those days, the media often labelled people 'mad' or similar derogatory terms, there was a stigma and discrimination around mental health that could quickly destroy your career. “These days, it's great that mental health is something that is talked about more openly and positively and the stigma has been reduced significantly, but I think there's a long way to go.” Commenting on the findings, Clare Haughey, Scotland's mental health minister, said that the survey reveals there are still some negative feelings surrounding mental ill health. “These findings are sobering and they reaffirm that despite strong progress in improving public perceptions of mental health problems, there is still much to be done to tackle associated stigma and inequality,” Haughey said. Wendy Halliday, See Me interim director, added: “Our research shows that 55 per cent of people feel confident to challenge stigma and discrimination, but we need that number to be much higher, so no one is treated unfairly when they’re struggling.
Urinary excretion of oestrone conjugates and gonadotrophins during pregnancy in the Goeldi's monkey (Callimico goeldii). Oestrone conjugate and LH/CG were measured in the urine of 4 Goeldi's monkeys during 6 pregnancies. The gestational length was a mean of 148.8 days from the post-partum LH/CG peak to parturition. CG was first detected a mean of 18.8 days after the LH/CG peak and values remained elevated for a mean of 44.8 days. Three different gonadotrophin assays were used to detect LH/CG: the mouse in-vitro interstitial cell bioassay, a mixed heterologous LH RIA, and a monkey CG RIA. The mouse in-vitro interstitial cell bioassay was useful for measuring both the LH peak which occurred post partum and the CG concentrations during pregnancy. However, both immunoassays were inconsistent in measuring LH due to poor cross-reactivity or lack of specificity; CG concentrations were measurable. Oestrone conjugates became elevated at the time of the LH/CG peak and concentrations continued to increase throughout pregnancy, reaching peak levels before parturition. The postpartum interval, pregnancy and parturition can therefore be monitored in the Goeldi's monkey by the use of urinary assays: those for bioactive LH and immunoreactive oestrone conjugates to determine the post-partum LH peak and those for immunoreactive LH/CG and immunoreactive oestrone conjugates to follow pregnancy and parturition.
The number of people hired rose to 5.9 million in April, the highest level since the Labor Department began tracking new hires. The increase in the number of hires came almost entirely from the private sector, which increased hiring by 217,000 for the month, according to the Bureau of Labor Statistics. Government hiring was little changed for the month. The total number of job openings rose to a higher-than-expected 7.449 million. That was a slight decrease from March’s revised 7.474 million but still near record highs. Openings continue to outnumber unemployed people. The number of people classified as unemployed fell by 387,000 to 5.82 million. So there are about 1.63 million more jobs than unemployed people in the U.S. The manufacturing sector shows no signs of trade-induced stress. Job openings in manufacturing climbed to 501,000, up from 460,000 the prior month. A year ago, there were 451,000 manufacturing job openings. The April figure matched the all-time highs hit in August and November of last year. Job openings in durable good manufacturing, a sector that was Trump’s critics said would be hit by metals tariffs, were down 1,000 jobs to 304,000 from March. But these are up considerably from a year ago, when there were 288,000 openings. Hires also expanded. There were 204,000 hires recorded in manufacturing in April, up from 190,000 in March. Compared with a year ago, however, hires fell by 13,000, which may be an indication that businesses are having trouble finding workers for open positions. Overall manufacturing hires rose 3,000 to 360,000 for the month, slightly below the 367,000 recorded a year ago. There were about 10.933 million in the total available labor pool, a broader category that includes those wanting a job but not actively looking. The large number of job openings compared to unemployed workers is likely to put pressure on employers to raise wages in the coming months. The Federal Reserve closely watches these figures for indications of tightness in the labor market. The quits level edged up 21,000 to 3.48 million in April. That put the rate of quitting at 2.3 percent, up just one-tenth from a year ago. Quits is typically read as a measure of worker confidence and is also an indicator of potential wage pressures.
Fixes for Internal Memory and External SD card are at bottom of post! Version 0.4 should not wipe internal memory anymore and should back up your external SD card: but I would still back up both just to be sure!!!! Read the Instructions carefully and thoroughly at least once before attempting. This will temporarily brick your phone. Don't be lazy. Don't forget this will format your SD card so save all your contents or use a spare!!! Quote: Originally Posted by Prerequisites Originally Posted by Prerequisites In order to use JuopunutBear you must meet the following pre-requisites: Be unlocked using the HTCdev bootloader unlock Be rooted (have superuser and/or an unsecured boot image installed) Have a spare microSD card, or to have backed up all contents of your SDcard Have fastboot and adb drivers installed and working (windows) Have usb debugging enabled Have a legth of insulated wire of sufficient length to join the contact points for your device. See images and videos for device specific information. Quote: Originally Posted by Instructions Originally Posted by Instructions (Optional) Perform a full backup and replace your sdcard with one that you are willing to wipe. Ensure that your battery is fully charged. Choose the correct download for your device and operating system Extract the zip file to a new directory Verify the MD5 checksum for your download Read and/or watch the video for the device specific information for your device Run controlbear as admin(windows) or root or using sudo on linux Follow the on-screen instructions from ControlBear Do not press any of the buttons on the phone during the process. After doing the “wire-trick” yor phone will reboot. The sequence of the reboot may vary somewhat from that you see in the videos as these were taken during various stages of development. If you see the following message from ControlBear after doing the wire trick: ErrorMsg: Still sober. This means that you have been unsuccessful in implementing the wire-trick. Run ControlBear again. The usual casue for this is that you failed to perform 2 clean contacts or mistimed the wire trick. Your phone will reboot several times during the process, this is normal. ControlBear will tell you when it has finished whether sucessfully or not. Wire Tips: Quote: Originally Posted by Wire Trick Originally Posted by Wire Trick The “wire trick” is an essential part of the JuopunutBear S-OFF procedure. When instructed to do so by the program you must perform the “wire trick” which is done as follows. Obtain an insulated wire of appropriate length and gauge Insert one end of the wire into the hole where pin 1 is indicated in the picture below, ensuring that a firm contact it made with the metal contact at the bottom of the hole Briefly touch to other end of the wire to the contact marked GND in the picture below. Wait approximately 1.75 seconds and then again touch the wire to the marked GND. Allow the program to continue. Note: it may take several attempts of running the program in order to obtain the correct timing for the wire trick. The contact points for the “wire trick” are shown in the picture below. Don't forget this will format your SD card so save all your contents or use a spare!!! Picture of Points: Video of Wire Trick: Quote: Originally Posted by globatron Originally Posted by Fix for external SD is as follows: Install busybox adb shell busybox fdisk /dev/block/mmcblk1 type o type w adb shell busybox fdisk /dev/block/mmcblk1 type n select primary, then 1 chose default sizes type w adb shell busybox mkfs.vfat /dev/block/mmcblk1p1 Quote: Originally Posted by globatron Originally Posted by For those of you having problems with internal storage, my apologies. We accidentally included the GB hboot. Download this: http://dl.dropbox.com/u/14779955/jb_hboot.zip MD5: b05336c08f709bf0a909205bcb95b951 Put the phone in fastboot mode, then run the follwoing commands: Code: fastboot oem rebootRUU fastboot flash zip jb_hboot.zip fastboot reboot Ignore the green bar. Disclaimer: I am not responsible for bricked devices or anything happening to your handset!!!! Just relaying the message If you're still having issues... The search button is your friend. There's a high chance your problem has already been solved. Either search this thread or the discussion of s-off thread. Don't know how to search? WELL NOW YOU CAN IN THIS SIMPLE TUTORIAL!!!!! Some more threads you might want to check out!!!! ENJOY S-OFF!!!!! Donate to JuopunutBear Team!!! May be easier to make a completely new thread instead of people searching through the "s-off discussion" thread.I'm going to make a huge SD Card post right at the top because it seems like people still are overlooking it in the "s-off discussion" thread... Not trying to be a dick, just making sure people don't lose crucial information on their SD cards...Here's the link for Instructions:I used my old 2GB droid incredible sd card for mine...Some notes:Make sure back cover is off before running program.Plug in phone before running program.Boot phone into ROM before running program, it will automatically boot into fastboot by itself.Don't do wire trick until after you run the program and tells you to do so!!!Make sure you have "USB debugging" enabled!If in Windows, right click program and make sure you click "Run as Administrator"This post sums up everything nicely...Here's link for wire trick:22ga wire fits almost perfect in the lower hole.Use a piece about 8 inches long and stripped the end for the lower contact about 3/8 of an inch and the other end just a small amount. Did this to two phones and it worked the first time both times.It was reported that the large coated paper clips work well too.Others are using odd objects or other weird improvised wires and having a lot of trouble. It seems to be one of the big sticking points.I honestly used a paperclip and it worked just fine. Not even insulated... even though they don't recommend it: you could use it as a last resort.... or wrap it with an insulated material. I didn't know the paper clip had to be because I was one of the beta testers.If you're not getting it after wire trick, keep trying! Timing is crucial!!!New ICS hboot should be included in the download now.Pretty much copied everything off the site, but it may be easier to use instead of switch tabs/windows... Good Luck...Oh yeah...These guys put in a hell of a lot of effort into doing this process... Any donation would be greatly appreciated!
--- abstract: 'Contrary to the usual assumption, the electron Bloch states in crystals with spin-orbit coupling do not always transform under symmetry operations in the same way as the pure spin-$1/2$ states. This has profound consequences for the symmetry properties and nodal structure of superconductors, especially for the interband gap functions. Focusing on tetragonal superconductors, we show that the interband pairing in the conventional ($s$-wave) channel can have features which are traditionally associated with unconventional pairing, such as triplet components and odd parity, and can produce line nodes in the excitation energy gap. In the $d$-wave case, the interband pairing, which can also be odd in momentum and have a triplet component, changes the positions and topology of the nodal lines.' author: - 'K. V. Samokhin[^1]' title: Exotic interband pairing in multiband superconductors --- Introduction {#sec: Intro} ============ The symmetry-based phenomenological approach has proved to be very useful in the studies of fermionic superfuilds and superconductors.[@VG85; @SU-review; @TheBook] This approach allows one to determine the stable states and gap structures even if the pairing mechanism is not fully understood. The idea at the heart of the symmetry approach is that the electron Bloch states in the presence of spin-orbit coupling transform under the crystal point group operations and time reversal (TR) in the same way as the pure spin-$1/2$ states,[@And84; @UR85] leading to the relatively simple transformation rules for the superconducting gap functions. The electron bands $\xi_n(\bk)=\xi_n(-\bk)$ in a nonmagnetic centrosymmetric crystal are twofold degenerate at each wave vector $\bk$ due to the conjugation symmetry ${\cal C}=KI$ (Ref. ), which combines TR operation $K$ with space inversion $I$ and leaves $\bk$ invariant. The bands are labelled by $n$, while an additional index $s=1,2$, called the conjugacy index, distinguishes two orthogonal states $|\bk,n,1\rangle$ and $|\bk,n,2\rangle\equiv{\cal C}|\bk,n,1\rangle$ within the same band. There is still some freedom is choosing the relative “orientations” of the Bloch bases at different $\bk$ points. The usual assumption, formalized by the Ueda-Rice prescription,[@UR85] is that the bases at $\bk$ and $g\bk$, where $g$ is an element of the crystal point group $\mathbb{G}$, are related by the same spin rotation matrix $\hat D^{(1/2)}(g)$ as the pure spin states, thus justifying the name “pseudospin” for the conjugacy index $s$. Then, the pseudospin-singlet (pseudospin-triplet) superconducting gaps respond to the point group operations like scalar (pseudovector) functions. Recently, however, there has been mounting evidence that the textbook classification might fail in superconductors with a complicated electronic structure, e.g., in multiorbital systems.[@multiorbital-SC] Also, the “$j=3/2$” pairing proposed for half-Heusler compounds[@j-3-2-pairing] is clearly outside the scope of the pseudospin-based approach. In this paper, we examine the validity of the pseudospin picture and show how a non-pseudospin character of the electron Bloch states changes the pairing symmetry and the gap nodal structure, focusing especially on the unusual features and effects of the interband pairing. The intraband pairing in non-pseudospin bands was studied in Ref. . We use the band representation, motivated by its importance for any Bardeen-Cooper-Schrieffer-like theory of superconductivity, in which fermionic quasiparticles exist and experience an attractive interaction only in the vicinity of the Fermi surfaces. The paper is organized as follows. In Sec. \[sec: Gap symmetry\], we construct the Bloch bases in momentum space in the way which is consistent with the point-group symmetry requirements and also derive the general symmetry constraints on the superconducting gap functions. In Sec. \[sec: Interband\], we study the interband gap symmetry in tetragonal superconductors. The effects of the interband pairing on the Bogoliubov excitation spectrum in $s$-wave and $d$-wave superconductors are discussed in Sec. \[sec: Gap nodes\]. Our findings are summarized in Sec. \[sec: Conclusions\]. Throughout the paper we use the units in which $\hbar=1$, neglecting, in particular, the difference between the quasiparticle wave vector and momentum. Bloch bases and gap symmetry {#sec: Gap symmetry} ============================ We start with the general mean-field pairing Hamiltonian $\hat H=\sum_{\bk ns}\xi_n(\bk)c^\dagger_{\bk ns}c_{\bk ns}+\hat H_{sc}$, where $$\begin{aligned} \label{H-mean-field-general} \hat H_{sc} = \frac{1}{2}\sum_{\bk,nn',ss'}\left[\Delta_{nn',ss'}(\bk)c^\dagger_{\bk ns}\tilde c^\dagger_{\bk n's'}+\mathrm{H.c.}\right],\end{aligned}$$ with $\tilde c^\dagger_{\bk ns}=Kc^\dagger_{\bk ns}K^{-1}$. The presence of the antiunitary TR operation in $\hat H_{sc}$ is crucial for the proper definition of the gap functions $\hat\Delta_{nn'}(\bk)$ (Ref. ). The $2\times 2$ matrices $\hat\Delta_{nn}$ describe the intraband pairing in the $n$th band, while $\hat\Delta_{nn'}$ with $n\neq n'$ describe the interband pairing. The latter may become important in strongly-coupled superconductors or when the pairing in a multiorbital system is translated into the band representation. According to the Landau theory of phase transitions, the gap functions transform according to a single-valued irreducible representation (irrep) $\gamma$ of the point group $\mathbb{G}$. In order to find their momentum dependence, in particular, the type and location of the gap nodes, one has to know how the gaps are affected by the crystal symmetry operations, i.e., how $\hat\Delta_{nn'}(\bk)$ is related to $\hat\Delta_{nn'}(g\bk)$, where $g\in\mathbb{G}$, which in turn depends on the transformation properties of the single-particle Bloch states. The band symmetry at the $\Gamma$ point is described by the magnetic point group ${\cal G}=\mathbb{G}+{\cal C}\mathbb{G}$ and the Bloch states there form the basis of an irreducible double-valued corepresentation (corep) of ${\cal G}$, see, e.g., Ref. . The conjugation operation is antiunitary, hence the group is “magnetic”, and satisfies ${\cal C}^2=-1$ when acting on spinor wave functions. In a centrosymmetric crystal, the coreps of ${\cal G}$ are either inversion-even ($\Gamma^+$) or inversion-odd ($\Gamma^-$). An important observation is that the double-valued coreps of the crystallographic magnetic point groups are almost all two-dimensional (2D). There are just two exceptions: $(\Gamma_6^\pm,\Gamma_7^\pm)$ for $\mathbb{G}=\mathbf{T}_{h}$ and $\Gamma_8^\pm$ (“$j=3/2$”) for $\mathbb{G}=\mathbf{O}_{h}$, which are four-dimensional and will not be considered here. We assume that the Bloch states $|\bm{0},n,1\rangle$ and $|\bm{0},n,2\rangle$ transform according to a 2D double-valued corep of ${\cal G}$ described by $2\times 2$ matrices $\hat{\cal D}_n(g)$. To construct the Bloch bases at $\bk\neq\bm{0}$ satisfying all symmetry and compatibility requirements, we start with some wave vector $\bk$ and apply a point-group element $g$ to transform $\bk$ into $g\bk$. The state $g|\bk,n,s\rangle$ belongs to the wave vector $g\bk$ and can be represented as $g|\bk,n,s\rangle=\sum_{s'}|g\bk,n,s'\rangle U_{n,s's}(\bk;g)$, where the expansion coefficients form a unitary matrix. Since in the case under consideration the Bloch wave functions and the band dispersions are analytic functions of $\bk$, one can choose the $U$ matrix to be $\bk$ independent, at least in the vicinity of the $\Gamma$ point. Therefore, $\hat U_n(g)=\hat{\cal D}_n(g)$ and the Bloch basis at $g\bk$ is defined by the following relation:[@Sam19-PRB] $$\label{Bloch-bases} g|\bk,n,s\rangle=\sum_{s'}|g\bk,n,s'\rangle {\cal D}_{n,s's}(g),\quad g\in\mathbb{G}.$$ In particular, $I|\bk,n,s\rangle=p_n|-\bk,n,s\rangle$, where $p_n=\pm$ is the parity of the band. If the $\Gamma$-point corep is equivalent to the spin-$1/2$ corep, then the band is called “pseudospin band” and $\hat{\cal D}_n(g)=\hat D^{(1/2)}(R)$ ($g$ is either a proper rotation $R$ or an improper rotation $IR$), corresponding to the Ueda-Rice convention.[@UR85] In general, the Bloch states at the $\Gamma$ point transform according to a corep which is not equivalent to the spin-$1/2$ corep, i.e., $\hat{\cal D}_n(g)\neq\hat D^{(1/2)}(R)$ and we have a “non-pseudospin” band. The effects of non-pseudospin character of the bands can be seen already in the normal state, e.g., in the form of the antisymmetric spin-orbit coupling in crystals without an inversion center.[@unusual-ASOC] From Eq. (\[Bloch-bases\]), the point-group transformation rules for the electron creation operators take the form $gc^\dagger_{\bk ns}g^{-1}=\sum_{s'}c^\dagger_{g\bk,ns'}{\cal D}_{n,s's}(g)$. Applying this to the pairing Hamiltonian (\[H-mean-field-general\]), we find that the gap functions transform in the following way: $$\label{Delta-transform-g} g:\ \hat\Delta_{nn'}(\bk)\to\hat{\cal D}_n(g)\hat\Delta_{nn'}(g^{-1}\bk)\hat{\cal D}^\dagger_{n'}(g),\quad g\in\mathbb{G}.$$ Since $\tilde c^\dagger_{\bk n1}=p_nc^\dagger_{-\bk,n2}$ and $\tilde c^\dagger_{\bk n2}=-p_nc^\dagger_{-\bk,n1}$, we obtain the response to TR: $$\label{Delta-transform-K} K:\ \hat\Delta_{nn'}(\bk)\to\hat\Delta^\dagger_{n'n}(\bk),$$ and also a constraint on the gap functions which follows from the anticommutation of the fermionic operators: $$\label{Delta-constraint-anticommutation} \hat\Delta_{nn'}(\bk)=p_np_{n'}\hat\sigma_2\hat\Delta^\top_{n'n}(-\bk)\hat\sigma_2,$$ where $\hat{\bm\sigma}$ are the Pauli matrices in the conjugacy space. Note that the anticommutation constraint does not select the parity of the interband pairing, see more on that below. According to Eq. (\[Delta-transform-g\]), the gap transformation properties are nonuniversal, in the sense that they essentially depend on the symmetries of the bands $n$ and $n'$ involved in the pairing. One can see that even the intraband pairing may be rather unusual.[@Sam19-PRB] Let us drop the band index and represent the gap function as a sum of the singlet and triplet components: $\hat\Delta(\bk)=\psi(\bk)\hat\sigma_0+\bmd(\bk)\hat{\bm{\sigma}}$ ($\hat\sigma_0$ is the $2\times 2$ unit matrix in the conjugacy space). The parity follows from the constraint (\[Delta-constraint-anticommutation\]): $\psi(-\bk)=\psi(\bk)$ and $\bmd(-\bk)=-\bmd(\bk)$, whereas Eq. (\[Delta-transform-g\]) yields $\psi(\bk)\to\psi(g^{-1}\bk)$ and $\bmd(\bk)\to{\cal R}(g)\bmd(g^{-1}\bk)$, where $\hat{\cal R}$ is the $3\times 3$ orthogonal matrix defined by $\hat{\cal D}^\dagger(g)\hat{\sigma}_i\hat{\cal D}(g)=\sum_{j=1}^3{\cal R}_{ij}(g)\hat{\sigma}_j$. Thus, $\psi$ transforms as a complex scalar regardless of the band symmetry at the $\Gamma$ point, and the usual classification of the singlet superconducting states[@VG85; @SU-review; @TheBook] is applicable. In contrast, the transformation properties of the triplet gap depend on the band symmetry. Namely, if the $\Gamma$-point corep is such that $\hat{\cal R}\neq\hat R$, where $\hat R\equiv\hat D^{(1)}(R)$ is the spin-$1$ rotation matrix, then $\bmd$ does not transform as a pseudovector, which strongly affects its momentum dependence. As shown in Ref. , this happens in certain bands in trigonal and hexagonal superconductors. Basis functions {#sec: basis functions} --------------- Different pairing channels correspond to different single-valued irreps of the point group $\mathbb{G}$ of the crystal. In order to determine the momentum dependence of the pairing involving quasiparticles from the bands $n$ and $n'$, we observe that the gap function corresponding to a $d$-dimensional irrep $\gamma$ can be represented in the form $$\label{irrep-expansion} \hat\Delta_{nn'}(\bk)=\sum_{a=1}^d\eta_{nn'}^{a}\hat\phi_{nn'}^{a}(\bk),$$ where $\eta_{nn'}^{a}$ are the superconducting order parameter components, which are found by minimizing the free energy of the superconductor, and $\hat\phi_{nn'}^{a}$ are the $2\times 2$ matrix basis functions of $\gamma$. According to Eq. (\[Delta-transform-g\]), the latter transform under the point group operations as follows: $$\begin{aligned} \label{phi-transform-g} g:\hat\phi_{nn'}^{a}(\bk)\to\hat{\cal D}_n(g)\hat\phi_{nn'}^{a}(g^{-1}\bk)\hat{\cal D}^\dagger_{n'}(g) \nonumber \\ =\sum_{b=1}^d\hat\phi_{nn'}^{b}(\bk)D_{\gamma,ba}(g),\end{aligned}$$ where $\hat{\cal D}_n$ is the $\Gamma$-point corep matrix and $\hat D_\gamma$ is the irrep matrix. In particular, setting $g=I$ in Eq. (\[phi-transform-g\]), we obtain: $$\label{phi-transform-I} p_np_{n'}\hat\phi_{nn'}^{a}(-\bk)=P_\gamma\hat\phi_{nn'}^{a}(\bk),$$ where $P_\gamma$ is the parity of $\gamma$. It follows from the anticommutation constraint (\[Delta-constraint-anticommutation\]) that $\hat\phi_{nn'}^{a}(\bk)=p_np_{n'}\hat\sigma_2\hat\phi^{a,\top}_{n'n}(-\bk)\hat\sigma_2$, therefore, $\eta_{nn'}^{a}=\eta_{n'n}^{a}$ and, using Eq. (\[phi-transform-I\]), we have $$\label{phi-constraint-AC-I} \hat\phi_{nn'}^{a}(\bk)=P_\gamma\hat\sigma_2\hat\phi_{n'n}^{a,\top}(\bk)\hat\sigma_2.$$ Regarding the response to TR, see Eq. (\[Delta-transform-K\]), the basis functions can be chosen to satisfy $$\label{phi-constraint-TR} \hat\phi_{nn'}^{a}(\bk)=\hat\phi_{n'n}^{a,\dagger}(\bk),$$ which means that the action of TR on the order parameter components is equivalent to complex conjugation. In the next section, we apply the general expressions derived above to one-dimensional (1D) pairing channels in a tetragonal superconductor. Interband pairing {#sec: Interband} ================= It is evident from Eq. (\[Delta-transform-g\]) that there exists a multitude of possibilities for the interband pairing symmetry, depending on the $\Gamma$-point coreps in the bands $n$ and $n'$. We use as an example a tetragonal superconductor with $\mathbb{G}=\mathbf{D}_{4h}$, which is relevant for many popular materials, from the high-$T_c$ cuprates and iron pnictides to Sr$_2$RuO$_4$. Among the four double-valued coreps $\Gamma_6^\pm$ and $\Gamma_7^\pm$ of $\mathbf{D}_{4h}$, only $\Gamma_6^+$ is equivalent to the spin-$1/2$ corep,[@BC-book] while the other three are non-pseudospin ones. There are ten possible two-band combinations: $(n,n')=(\Gamma_6^+,\Gamma_6^+)$, $(\Gamma_6^+,\Gamma_6^-)$, $(\Gamma_6^+,\Gamma_7^+)$, etc. Regarding the pairing channel $\gamma$, the group $\mathbf{D}_{4h}$ has ten single-valued irreps of either parity, eight 1D and two 2D. We consider just two pairing channels: the conventional, or “$s$-wave”, pairing corresponding to the identity irrep $A_{1g}$, and the unconventional “$d_{x^2-y^2}$-wave” pairing corresponding to the irrep $B_{1g}$ (Ref. ). Both irreps are 1D, so that Eq. (\[irrep-expansion\]) takes the form $$\label{Delta-1D} \hat\Delta_{nn'}(\bk)=\eta_{nn'}\hat\phi_{nn'}(\bk),$$ where $\eta_{nn'}=\eta_{n'n}$ are the order parameter components. If there are $N$ superconducting bands, then the total number of independent components, intraband and interband, is equal to $N(N+1)/2$. According to Eq. (\[phi-transform-g\]), the basis functions satisfy the following equation: $$\label{phi-transform-g-1D} \hat{\cal D}_n(g)\hat\phi_{nn'}(g^{-1}\bk)\hat{\cal D}^\dagger_{n'}(g)=\chi_\gamma(g)\hat\phi_{nn'}(\bk),$$ where $\chi_\gamma(g)$ is the character of $g$ in the 1D irrep $\gamma$. It is convenient to introduce the “singlet-triplet” decomposition of the basis functions: $$\hat\phi_{nn'}(\bk)=\alpha_{nn'}(\bk)\hat\sigma_0+i\bm{\beta}_{nn'}(\bk)\hat{\bm{\sigma}}.$$ Since both the $s$-wave and $d$-wave irreps are even ($P_\gamma=1$), we obtain from Eqs. (\[phi-transform-I\]), (\[phi-constraint-AC-I\]), and (\[phi-constraint-TR\]) that $\alpha$ and $\bm{\beta}$ are real and satisfy $$\label{ab-parities} \left.\begin{array}{l} \alpha_{nn'}(\bk)=\alpha_{n'n}(\bk)=p_np_{n'}\alpha_{nn'}(-\bk),\\ \\ \bm{\beta}_{nn'}(\bk)=-\bm{\beta}_{n'n}(\bk)=p_np_{n'}\bm{\beta}_{nn'}(-\bk). \end{array}\right.$$ Setting $n=n'$, we see that the intraband triplet components vanish, while the singlet components are even in $\bk$ and satisfy $\alpha_{nn}(g^{-1}\bk)=\chi_\gamma(g)\alpha_{nn}(\bk)$. Therefore, the standard symmetry analysis[@SU-review; @TheBook] is applicable for the intraband gaps. In contrast, the interband pairing structure can be considerably richer. Focusing on just one pair of bands $n,n'=1,2$, we introduce the notation $\eta_{nn}=\eta_n$, $\alpha_{nn}=\alpha_n$, $\eta_{12}=\eta_{21}=\tilde\eta$, $\alpha_{12}=\alpha_{21}=\tilde\alpha$, and $\bm{\beta}_{12}=-\bm{\beta}_{21}=\tilde{\bm{\beta}}$, where $\alpha_1$, $\alpha_2$, $\tilde\alpha$, and $\tilde{\bm{\beta}}$ are all real functions of $\bk$. Then, the gap functions take the following form: $$\begin{aligned} \label{two-band-gaps} & \hat\Delta_{11}(\bk)=\eta_1\alpha_1(\bk)\hat\sigma_0,\quad\hat\Delta_{22}(\bk)=\eta_2\alpha_2(\bk)\hat\sigma_0, \nonumber \\ & \hat\Delta_{12}(\bk)=\tilde\eta[\tilde\alpha(\bk)\hat\sigma_0+i\tilde{\bm{\beta}}(\bk)\hat{\bm{\sigma}}], \\ & \hat\Delta_{21}(\bk)=\tilde\eta[\tilde\alpha(\bk)\hat\sigma_0-i\tilde{\bm{\beta}}(\bk)\hat{\bm{\sigma}}].\nonumber\end{aligned}$$ Stable superconducting states correspond to the minima of the Ginzburg-Landau free energy, which is a functional of the order parameter components $\eta_1$, $\eta_2$, and $\tilde\eta$. Phenomenologically, it has the same form as in the three-band Ginzburg-Landau model, which has both TR invariant and TR symmetry-breaking stable states.[@ST10] We consider the general case, in which all three components are nonzero. In the $s$-wave case, the intraband gaps are invariant under all $g$, e.g., $\alpha_n(\bk)\propto k_x^2+k_y^2+ak_z^2$ (we do not bother to normalize the basis functions), while the interband basis functions for all possible pairs of bands are shown in Table \[table: phis-Gamma\_1\]. Note that the interband pairing in the $s$-wave channel has features that are traditionally associated with unconventional pairing, such as symmetry-imposed zeros and triplet components, and it can be either even or odd in $\bk$, depending on the relative parity of the bands. In the $d$-wave case, we have $\alpha_{n}(\bk)\propto k_x^2-k_y^2$, whereas the interband basis functions are listed in Table \[table: phis-Gamma\_3\]. $(n,n')$ $\tilde\alpha(\bk)$ $\tilde{\bm{\beta}}(\bk)$ -------------------------------------------------------------- -------------------------- ----------------------------------------- $(\Gamma_6^\pm,\Gamma_6^\pm)$, $(\Gamma_7^\pm,\Gamma_7^\pm)$ $k_x^2+k_y^2+ak_z^2$ $[k_yk_z,-k_xk_z,a(k_x^2-k_y^2)k_xk_y]$ $(\Gamma_6^\pm,\Gamma_6^\mp)$, $(\Gamma_7^\pm,\Gamma_7^\mp)$ $(k_x^2-k_y^2)k_xk_yk_z$ $(k_x,k_y,ak_z)$ $(\Gamma_6^\pm,\Gamma_7^\pm)$ $k_x^2-k_y^2$ $(k_yk_z,k_xk_z,ak_xk_y)$ $(\Gamma_6^\pm,\Gamma_7^\mp)$ $k_xk_yk_z$ $[k_x,-k_y,a(k_x^2-k_y^2)k_z]$ \[table: phis-Gamma\_1\] $(n,n')$ $\tilde\alpha(\bk)$ $\tilde{\bm{\beta}}(\bk)$ -------------------------------------------------------------- -------------------------- ----------------------------------------- $(\Gamma_6^\pm,\Gamma_6^\pm)$, $(\Gamma_7^\pm,\Gamma_7^\pm)$ $k_x^2-k_y^2$ $(k_yk_z,k_xk_z,ak_xk_y)$ $(\Gamma_6^\pm,\Gamma_6^\mp)$, $(\Gamma_7^\pm,\Gamma_7^\mp)$ $k_xk_yk_z$ $[k_x,-k_y,a(k_x^2-k_y^2)k_z]$ $(\Gamma_6^\pm,\Gamma_7^\pm)$ $k_x^2+k_y^2+ak_z^2$ $[k_yk_z,-k_xk_z,a(k_x^2-k_y^2)k_xk_y]$ $(\Gamma_6^\pm,\Gamma_7^\mp)$ $(k_x^2-k_y^2)k_xk_yk_z$ $(k_x,k_y,ak_z)$ \[table: phis-Gamma\_3\] As an example of the calculation of the interband gap functions, let us consider the $s$-wave pairing channel for the bands corresponding to the coreps $\Gamma_6$ and $\Gamma_7$ of opposite parity. The group $\mathbf{D}_{4h}$ is generated by the rotations $C_{4z}$ and $C_{2y}$, and by inversion $I$. The corep matrices have the form[@BC-book; @Lax-book; @Sam19-PRB] $$\label{corep-matrices} \left.\begin{array}{l} \hat{\cal D}_{\Gamma_6}(C_{4z})=\hat D^{(1/2)}(C_{4z}),\quad \hat{\cal D}_{\Gamma_6}(C_{2y})=\hat D^{(1/2)}(C_{2y}),\medskip\\ \hat{\cal D}_{\Gamma_7}(C_{4z})=-\hat D^{(1/2)}(C_{4z}),\quad \hat{\cal D}_{\Gamma_7}(C_{2y})=\hat D^{(1/2)}(C_{2y}), \end{array}\right.$$ where $\hat D^{(1/2)}(R)=e^{-i\theta(\bm{n}\hat{\bm{\sigma}})/2}$ is the spin-1/2 representation of a counterclockwise rotation $R$ through an angle $\theta$ about an axis $\bm{n}$. Note that $\hat{\cal D}_{\Gamma_7}$ is not equivalent to $\hat D^{(1/2)}$, reflecting the fact that $\Gamma_7$ is a non-pseudospin corep. We obtain from Eqs. (\[phi-transform-g-1D\]), (\[ab-parities\]), and (\[corep-matrices\]) that the singlet and triplet interband components transform independently from each other, are odd in $\bk$, and satisfy the following equations: $$\label{ab-equations} \left.\begin{array}{l} \tilde\alpha(\bk)=-\tilde\alpha(C_{4z}^{-1}\bk),\quad \tilde\alpha(\bk)=\tilde\alpha(C_{2y}^{-1}\bk),\\ \\ \tilde{\bm{\beta}}(\bk)=-C_{4z}\tilde{\bm{\beta}}(C_{4z}^{-1}\bk),\quad \tilde{\bm{\beta}}(\bk)=C_{2y}\tilde{\bm{\beta}}(C_{2y}^{-1}\bk). \end{array}\right.$$ Here we used the identity $\hat{D}^{(1/2),\dagger}(R)\hat{\sigma}_i\hat{D}^{(1/2)}(R)=\sum_{j=1}^3R_{ij}\hat{\sigma}_j$, where $\hat R$ is the $3\times 3$ orthogonal rotation matrix. The simplest, polynomial in $\bk$, solution of the equations (\[ab-equations\]) can be easily found: $$\tilde\alpha(\bk)\propto k_xk_yk_z,\quad \tilde{\bm{\beta}}(\bk)\propto[k_x,-k_y,a(k_x^2-k_y^2)k_z],$$ where $a$ is a real constant. Similarly, one can obtain all other expressions in Tables I and II. Gap nodes in the two-band case {#sec: Gap nodes} ============================== How does the unusual structure of the interband pairing found in the previous section affect the quasiparticle energy gap? The excitation spectrum is obtained by diagonalizing the Bogoliubov-de Gennes (BdG) Hamiltonian obtained from Eq. (\[H-mean-field-general\]): $$\hat H_{BdG}=\left(\begin{array}{ccc} \hat{\cal H}_{11} & \cdots & \hat{\cal H}_{1N} \\ \vdots & \ddots & \vdots \\ \hat{\cal H}_{N1} & \cdots & \hat{\cal H}_{NN} \end{array}\right),$$ where $N$ is the number of superconducting bands, $$\hat{\cal H}_{nn'}(\bk)=\left(\begin{array}{cc} \hat\xi_n(\bk)\delta_{nn'} & \hat\Delta_{nn'}(\bk) \\ \hat\Delta^\dagger_{n'n}(\bk) & -\hat\xi_n(\bk)\delta_{nn'} \end{array}\right),$$ and $\hat\xi_n(\bk)=\xi_n(\bk)\hat\sigma_0$. There is a gap node at the wave vector $\bk$ if $\det\hat H_{BdG}(\bk)=0$. In the two-band case, the BdG Hamiltonian is an $8\times 8$ matrix in the tensor product of the band, particle-hole, and conjugacy spaces: $$\label{H_BdG} \hat H_{BdG}=\left(\begin{array}{cccc} \hat\xi_1 & \hat\Delta_{11} & 0 & \hat\Delta_{12} \\ \hat\Delta_{11}^\dagger & -\hat\xi_1 & \hat\Delta_{21}^\dagger & 0 \\ 0 & \hat\Delta_{21} & \hat\xi_2 & \hat\Delta_{22} \\ \hat\Delta_{12}^\dagger & 0 & \hat\Delta_{22}^\dagger & -\hat\xi_2 \end{array}\right),$$ with the gap functions given by Eq. (\[two-band-gaps\]). The $2\times 2$ conjugacy blocks in this matrix all commute with each other, which greatly simplifies the calculation. We find $\det\hat H_{BdG}(\bk)=\det\hat{\cal R}(\bk)$, where $$\begin{aligned} \hat{\cal R} &=& \hat\xi_1^2\hat\xi_2^2+\hat\xi_1^2\hat\Delta_{22}^\dagger\hat\Delta_{22}+\hat\xi_2^2\hat\Delta_{11}^\dagger\hat\Delta_{11}\\ && +\hat\xi_1\hat\xi_2(\hat\Delta_{12}^\dagger\hat\Delta_{12}+\hat\Delta_{21}^\dagger\hat\Delta_{21})\\ && +(\hat\Delta_{11}^\dagger\hat\Delta_{22}^\dagger-\hat\Delta_{12}^\dagger\hat\Delta_{21}^\dagger)(\hat\Delta_{11}\hat\Delta_{22}-\hat\Delta_{12}\hat\Delta_{21}).\end{aligned}$$ It is easy to show that all terms in $\hat{\cal R}$ are proportional to the unit matrix: $\hat{\cal R}(\bk)=R(\bk)\hat\sigma_0$, where $$\begin{aligned} R(\bk) &=& \xi_1^2\xi_2^2+\xi_1^2|\psi_2|^2+\xi_2^2|\psi_1|^2+2\xi_1\xi_2|\tilde\Delta|^2 \\ && +|\psi_1\psi_2-\tilde\Delta^2|^2,\end{aligned}$$ $\psi_1(\bk)=\eta_1\alpha_1(\bk)$, $\psi_2(\bk)=\eta_2\alpha_2(\bk)$, and $$\tilde\Delta(\bk)=\tilde\eta\sqrt{\tilde\alpha^2(\bk)+\tilde{\bm{\beta}}^2(\bk)}$$ is the measure of the interband pairing strength. Therefore, $\det\hat H_{BdG}(\bk)=R^2(\bk)$. Choosing the interband order parameter to be real positive and putting $\eta_{n}=|\eta_{n}|e^{i\varphi_{n}}$ and $\alpha_n(\bk)=|\alpha_n(\bk)|e^{i\zeta_n(\bk)}$ (note that $\zeta_n=0$ or $\pi$, since $\alpha_n$ are real), we finally obtain: $$\label{BDG-det-final} \det\hat H_{BdG}=(r_1^2+r_2^2+r_3^2)^2,$$ where $$\begin{aligned} \label{r_123} && r_1=\xi_1\xi_2-|\psi_1\psi_2|+|\tilde\Delta|^2,\nonumber\\ && r_2=\xi_1|\psi_2|+\xi_2|\psi_1|,\\ && r_3=\sqrt{2|\psi_1\psi_2||\tilde\Delta|^2(1-\cos\Phi)}\quad\nonumber\end{aligned}$$ are real functions and $\Phi=\varphi_1+\varphi_2+\zeta_1+\zeta_2$. The BdG Hamiltonian (\[H\_BdG\]) has a zero eigenvalue if $$\label{node-condition} r_1(\bk)=r_2(\bk)=r_3(\bk)=0.$$ In three-dimensional momentum space, this can generically happen only at isolated points, corresponding to point gap nodes. However, in our case the conditions (\[node-condition\]) can be satisfied along certain lines, due to the special structure of $r_{1,2,3}$, see the examples below. In other systems with interband pairing and TR symmetry breaking, the gap can vanish on a whole surface in the momentum space (“Bogoliubov Fermi surface”).[@Bogoliubov-FS] To achieve analytical progress without losing much generality, we focus on the case of the $(\Gamma_6^\pm,\Gamma_6^\pm)$ or $(\Gamma_7^\pm,\Gamma_7^\pm)$ bands with a quasi-2D dispersion: $\xi_n(\bk)=(k_x^2+k_y^2-k_{F,n}^2)/2m$, $k_{F,1}<k_{F,2}$. We also set $a=0$ in the intraband and interband basis functions and, in order to account for the lattice periodicity, replace $k_z$ by $\sin(k_zd)$, where $d$ is the lattice period along the $z$ axis, so that $\tilde{\bm{\beta}}^2\propto\sin^2(k_zd)$ in both the $s$- and $d$-wave cases. The calculation details can be found in the Appendix. For the $s$-wave pairing, we assume that the superconducting state is TR invariant, with $\varphi_1=\varphi_2=0$ or $\pi$ (our argument actually works more generally for $\varphi_1=-\varphi_2$, which is the case for all stable states of the three-band Ginzburg-Landau model in Ref. ), and that $\zeta_1=\zeta_2=0$ (no accidental zeros of $\alpha_1$ and $\alpha_2$), therefore $r_3=0$. The remaining equations $r_1=0$ and $r_2=0$ have solutions if the interband pairing is sufficiently strong: $$|\tilde\Delta|^2>|\psi_1\psi_2|.$$ These solutions correspond to four horizontal circular lines of nodes located between the two cylindrical Fermi surfaces, see Fig. \[fig: s-wave\]. ![(Color online) Lines of nodes in a two-band $s$-wave superconductor, for a strong interband pairing. The circular cylinders are the Fermi surfaces in the two bands.[]{data-label="fig: s-wave"}](s-wave.pdf){width="7.5cm"} For the $d$-wave pairing, the intraband gaps $\psi_1$ and $\psi_2$ vanish at $|k_x|=|k_y|$ for the symmetry reasons, therefore $r_2=r_3=0$ in the diagonal planes. The remaining equation $r_1=0$ takes the form $$\xi_1\xi_2=-|\tilde\Delta|^2.$$ If the interband pairing is weak, then the lines of nodes are deformed away from the Fermi surfaces into the “interband space”, see Fig. \[fig: d-wave-1\]. However, at a sufficiently strong interband pairing a topological transition takes place: the lines of nodes originating from the two bands touch and then reconnect in a different configuration, forming vertical nodal loops, as shown in Fig. \[fig: d-wave-2\]. The lines of nodes result in a linear behaviour of the quasiparticle density of states at low energies, $N(E)\propto E$. That in turn produces characteristic power laws in the temperature dependence of thermodynamic and transport properties. For instance, for the electronic specific heat one has $C(T)\propto T^2$, at $T\to 0$ (Refs. and ). There might be some novel features associated with the nodal line reconnection transition in the $d$-wave case, but those are beyond the scope of the present study. ![(Color online) Lines of nodes in a two-band $d_{x^2-y^2}$-wave superconductor, for a weak interband pairing.[]{data-label="fig: d-wave-1"}](d-wave-1.pdf){width="7.5cm"} ![(Color online) Reconnected lines of nodes in a two-band $d_{x^2-y^2}$-wave superconductor, for a strong interband pairing.[]{data-label="fig: d-wave-2"}](d-wave-2.pdf){width="7.5cm"} Conclusions {#sec: Conclusions} =========== To summarize, we showed how to construct the Bloch bases in crystals with spin-orbit coupling, for twofold degenerate electron bands which do not transform under the point group operations like the pure spin-$1/2$ states. The consequences of the “non-pseudospin” character of the bands for superconductivity include such remarkable features as nonzero interband triplet components for $s$-wave and $d$-wave pairing, odd-parity singlet and even-parity triplet interband gaps, etc. A sufficiently strong interband pairing profoundly affects the nodal structure, changing the line node topology in the $d$-wave case and producing lines of nodes in the $s$-wave case, which can be seen in the temperature dependence of thermodynamic and transport properties in the superconducting state. This work was supported by a Discovery Grant 2015-06656 from the Natural Sciences and Engineering Research Council of Canada. Lines of nodes ============== We consider the $(\Gamma_6^\pm,\Gamma_6^\pm)$ or $(\Gamma_7^\pm,\Gamma_7^\pm)$ bands with $$\xi_n(\bk)=\frac{k_\perp^2-k_{F,n}^2}{2m},\quad k_\perp=\sqrt{k_x^2+k_y^2},$$ $k_{F,2}=\varrho k_{F,1}$, and $\varrho>1$. Using different pairs of bands and/or taking into account the band modulation along $k_z$ will not change the results qualitatively. $s$-wave pairing ---------------- Neglecting the possibility of accidental zeros of the intraband gap functions, one can set $\zeta_1=\zeta_2=0$ at all $\bk$. In order for $r_3$ to vanish, we require that $\cos(\varphi_1+\varphi_2)=1$, which is satisfied, in particular, for the TR invariant superconducting states with $\varphi_1=\varphi_2=0$ or $\pi$. Assuming that $\xi_1(\bk)>\xi_2(\bk)$, the equations $r_1=0$ and $r_2=0$ take the form $$\label{s-equations} \left.\begin{array}{l} \xi_1=|\psi_1|\sqrt{\dfrac{|\tilde\Delta|^2}{|\psi_1\psi_2|}-1}, \\ \xi_2=-|\psi_2|\sqrt{\dfrac{|\tilde\Delta|^2}{|\psi_1\psi_2|}-1}. \end{array}\right.$$ If $|\tilde\Delta|^2>|\psi_1\psi_2|$, then the two surfaces defined by these equations may intersect along a line, or lines, in the momentum space. These lines are located between the two Fermi surfaces, where $\xi_1>0$ and $\xi_2<0$. To obtain an explicit solution of Eq. (\[s-equations\]), we assume that the intraband gap functions are constant, with $\alpha_n(\bk)=1$ and the same gap magnitudes $|\eta_1|=|\eta_2|=\eta$ in both bands, whereas for the interband gap functions one can put, according to Table I, $\tilde\alpha(\bk)=1$ and $\tilde{\bm{\beta}}(\bk)=b[\sin\theta\sin(k_zd),-\cos\theta\sin(k_zd),0]$, where $\theta=\arctan(k_y/k_x)$ and $b$ is a real constant. Therefore, $$\begin{aligned} && \psi_1(\bk)=\eta e^{i\varphi},\quad \psi_2(\bk)=\eta e^{-i\varphi},\\ && \tilde\Delta(\bk)=\tilde\eta\sqrt{1+b^2\sin^2(k_zd)}.\end{aligned}$$ We substituted $\sin(k_zd)$ for $k_z$ in order to account for the lattice periodicity. It is straightforward to show that the equations (\[s-equations\]) have the following four solutions: $$\label{s-lines} \left.\begin{array}{l} k_z=\pm\dfrac{1}{d}\arcsin\sigma,\ \pm\dfrac{1}{d}(\pi-\arcsin\sigma),\\ k_\perp=k_{F,1}\sqrt{\dfrac{\varrho^2+1}{2}}, \end{array}\right.$$ where $$\sigma=\frac{1}{\delta b}\sqrt{\left(\frac{\varrho^2-1}{2\epsilon}\right)^2-\delta^2+1},\quad \epsilon=\frac{2m\eta}{k_{F,1}^2},\quad \delta=\frac{\tilde\eta}{\eta}.$$ These solutions correspond to four circular lines of nodes shown in Fig. 1 and exist if the parameters of the system are such that $\sigma<1$. $d_{x^2-y^2}$-wave pairing -------------------------- For the symmetry reasons, $\psi_1=\psi_2=0$ in the diagonal planes $|k_x|=|k_y|$, therefore $r_2=r_3=0$ in these planes, regardless of the values of the order parameter phases. We are left with just one equation $r_1=0$, which takes the form $$\label{d-equation} \xi_1\xi_2=-|\tilde\Delta|^2.$$ The interband gap functions can be chosen as follows: $\tilde\alpha(\bk)=\cos(2\theta)$ and $\tilde{\bm{\beta}}(\bk)=b[\sin\theta\sin(k_zd),\cos\theta\sin(k_zd),0]$, see Table II, therefore $\tilde\Delta(\bk)=\tilde\eta b|\sin(k_zd)|$ in the diagonal planes. The equation (\[d-equation\]) has the following solutions: $$\label{d-solutions} \left.\begin{array}{l} |k_x|=|k_y|=q_{+}(k_z)k_{F,1},\medskip \\ |k_x|=|k_y|=q_{-}(k_z)k_{F,1}, \end{array}\right.$$ where $$q_\pm(k_z)=\frac{1}{2}\left[\varrho^2+1\pm\sqrt{(\varrho^2-1)^2-4\tilde\epsilon^2b^2\sin^2(k_zd)}\right]^{1/2},$$ and $\tilde\epsilon=2m\tilde\eta/k_{F,1}^2$. In the absence of the interband pairing, i.e., at $\tilde\epsilon=0$, the expressions (\[d-solutions\]) describe four pairs of vertical lines of nodes on the two Fermi surfaces. With increasing $\tilde\epsilon$, these lines get deformed and partially leave the Fermi surfaces, as shown in Fig. 2. At $\tilde\epsilon=\tilde\epsilon_c=(\varrho^2-1)/2b$, the lines of nodes touch, at $k_z=\pm\pi/2d$. Finally, at $\tilde\epsilon>\tilde\epsilon_c$, the lines of nodes reconnect into nodal loops (Fig. 3), which shrink, but never completely disappear, as the interband pairing strength increases. [99]{} G. E. Volovik and L. P. Gor’kov, Zh. Eksp. Teor. Fiz. **88**, 1412 (1985) \[Sov. Phys. JETP **61**, 843 (1985)\]. M. Sigrist and K. Ueda, Rev. Mod. Phys. **63**, 239 (1991). V. P. Mineev and K. V. Samokhin, *Introduction to Unconventional Superconductivity* (Gordon and Breach, London, 1999). P. W. Anderson, Phys. Rev. B **30**, 4000 (1984). K. Ueda and T. M. Rice, Phys. Rev. B **31**, 7114 (1985). C. Kittel, *Quantum Theory of Solids* (Wiley, 1987). Y. Wan and Q.-H. Wang, Europhys. Lett. **85**, 57007 (2009); M. H. Fischer, New J. Phys. **15**, 073006 (2013); A. Ramires and M. Sigrist, Phys. Rev B **94**, 104501 (2016); T. Nomoto, K. Hattori, and H. Ikeda, Phys. Rev. B **94**, 174513 (2016); W. Huang, Y. Zhou, and H. Yao, Phys. Rev. B **100**, 134506 (2019). P. M. R. Brydon, L. Wang, M. Weinert, and D. F. Agterberg, Phys. Rev. Lett. **116**, 177001 (2016); H. Kim *et al.*, Sci. Adv. **4**, eaao4513 (2018). K. V. Samokhin, Phys. Rev. B **100**, 054501 (2019). E. I. Blount, Phys. Rev. B **32**, 2935 (1985); K. V. Samokhin, Ann. Phys. (N.Y.) **385**, 563 (2017). C. J. Bradley and A. P. Cracknell, *The Mathematical Theory of Symmetry in Solids* (Oxford University Press, Oxford, 2010). M. Smidman, M. B. Salamon, H. Q. Yuan, and D. F. Agterberg, Rep. Prog. Phys. **80**, 036501 (2017); K. V. Samokhin, Ann. Phys. (N. Y.) **407**, 179 (2019). We use the “chemical” notation for the single-valued irreps corresponding to the pairing channels, reserving the $\Gamma$ notation for the double-valued coreps describing the symmetry of the Bloch bands. V. Stanev and Z. Tešanović, Phys. Rev. B **81**, 134522 (2010). M. Lax, *Symmetry Principles in Solid State and Molecular Physics* (Dover Publications, New York, 2001). G. E. Volovik, Phys. Lett. A **142**, 282 (1989); P. M. R. Brydon, D. F. Agterberg, H. Menke, and C. Timm, Phys. Rev B **98**, 224509 (2018). [^1]: E-mail: kirill.samokhin@brocku.ca
1. Field of the Invention The present invention relates to an output driver of a semiconductor memory device, and more particularly to an output driver of a semiconductor memory device capable of operating both in a differential mode and in a single mode. 2. Description of the Related Art FIG. 1 is a circuit diagram illustrating a conventional output driver. The output driver of FIG. 1 has a circuit configuration of a differential amplifier and may be used in a system operating at a high frequency of over 800 MHz. According to FIG. 1, when a positive input signal VIP has a logic high state and a negative input signal VIM has a logic low state, a positive output signal VOP has a logic high state and a negative output signal VOM has a logic low state. P-type metal-oxide semiconductor (PMOS) transistors MP1 and MP2 supply a current to an output driver of FIG. 1 in response to a bias voltage VB1. An n-type MOS (NMOS) transistor MN3 is coupled between a node N1 and a low supply voltage and supplies a constant current to the output driver in response to a bias voltage VB2. That is, the NMOS transistor MN3 operates as a current source. Most function tests, such as those other than a test of input/output the number of pins in a semiconductor device used in the test increases, the number of semiconductor devices that can be tested using a tester in a test system at one time can likewise decrease. During a low frequency test, the output driver does not need to operate in a differential mode, but rather can be operated in a single mode, since the high-frequency characteristics of differential mode are not needed for low frequency tests. When the output driver operates in a single mode, the number of pins that is used in the test may be decreased. A conventional output driver does not take advantage of this.
using System; using FluentValidation; using FluentValidation.Results; using Moq; using Weapsy.Domain.Themes; using Weapsy.Domain.Themes.Commands; namespace Weapsy.Tests.Factories { public static class ThemeFactory { public static Theme Theme() { return Theme(Guid.NewGuid(), "My Theme Name", "My Theme Description", "My Theme Folder"); } public static Theme Theme(Guid id, string name, string description, string folder) { var command = new CreateTheme { Id = id, Name = name, Description = description, Folder = folder }; var validatorMock = new Mock<IValidator<CreateTheme>>(); validatorMock.Setup(x => x.Validate(command)).Returns(new ValidationResult()); var sortOrderGeneratorMock = new Mock<IThemeSortOrderGenerator>(); sortOrderGeneratorMock.Setup(x => x.GenerateNextSortOrder()).Returns(2); return Domain.Themes.Theme.CreateNew(command, validatorMock.Object, sortOrderGeneratorMock.Object); } } }
The 2008 Presidential campaign was especially vitriolic. But but there was one area of agreement. America should become energy independent. Now, as we enter the political discussion over climate change (video, original post), it's important that clean energy advocates seize the opportunity to frame the debate. Choosing energy independence (and it's compliment, national security) as the cornerstone of the renewable energy argument will make this common goal a win-win for all sides. Like health care, climate change is an extremely complicated issue, subject to distortion and obfuscation by it's critics. That's why it's important to establish a simple and compelling benefit statement at the outset. During the election T. Boone Pickens spent a lot of his time, effort and money to educate the public about energy issues. He argued quite successfully that the U.S. should invest heavily in wind power (and natural gas), solar energy, geothermal and other renewable energy sources in order to wean ourselves off foreign oil. He advocated for "Energy Independence" as the solution to a number of key problems confronting the country - and built a strong following for his platform from a truly bi-partisan electorate. National security was one of the core benefits he listed to sell his plan - and it made complete sense. Why would we want to send 800 Billion dollars a year to the Middle East when we can produce our own energy right here at home? If that money stays in the US, the oil exporting countries get weaker and we get stronger. It serves our financial interest and our national security. Simple. Logical. Non-partisan. Let's frame the Climate Change debate now, using energy independence and national security as its basis. This is a little off topic, but I have a question about solar. I live in the upper midwest (Fargo ND) and curious how well solar can work in the extreme cold? There is sunshine, but it does get about as cold as it can get. If you think it is possible, how much energy do you think can be generated.... and if you answer this question, please dumb it down to something an average guy can understand. I am interested in solar and wind energy..... also looking for some good resources. Please come to www.guygoesgreen.com and let me know. Save Money, Save Energy DASolar is here to help... We blog about all types of renewable energy. Our goal is to help explain the technology and the benefits of solar, wind, geothermal and other forms of alternative energy - and deliver those benefits to you.
/* The contents of this file are subject to the Netscape Public * License Version 1.1 (the "License"); you may not use this file * except in compliance with the License. You may obtain a copy of * the License at http://www.mozilla.org/NPL/ * * Software distributed under the License is distributed on an "AS * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or * implied. See the License for the specific language governing * rights and limitations under the License. * * The Original Code is Mozilla Communicator client code, released March * 31, 1998. * * The Initial Developer of the Original Code is Netscape Communications * Corporation. Portions created by Netscape are * Copyright (C) 1998 Netscape Communications Corporation. All * Rights Reserved. * * Contributor(s): * */ /** File Name: 15.9.5.36-1.js ECMA Section: 15.9.5.36 Date.prototype.setFullYear(year [, mon [, date ]] ) Description: If mon is not specified, this behaves as if mon were specified with the value getMonth( ). If date is not specified, this behaves as if date were specified with the value getDate( ). 1. Let t be the result of LocalTime(this time value); but if this time value is NaN, let t be +0. 2. Call ToNumber(year). 3. If mon is not specified, compute MonthFromTime(t); otherwise, call ToNumber(mon). 4. If date is not specified, compute DateFromTime(t); otherwise, call ToNumber(date). 5. Compute MakeDay(Result(2), Result(3), Result(4)). 6. Compute UTC(MakeDate(Result(5), TimeWithinDay(t))). 7. Set the [[Value]] property of the this value to TimeClip(Result(6)). 8. Return the value of the [[Value]] property of the this value. Author: christine@netscape.com Date: 12 november 1997 Added test cases for Year 2000 Compatilibity Testing. */ var SECTION = "15.9.5.36-1"; var VERSION = "ECMA_1"; startTest(); writeHeaderToLog( SECTION + " Date.prototype.setFullYear(year [, mon [, date ]] )"); getTestCases(); test(); function test() { for ( tc=0; tc < testcases.length; tc++ ) { testcases[tc].passed = writeTestCaseResult( testcases[tc].expect, testcases[tc].actual, testcases[tc].description +" = "+ testcases[tc].actual ); testcases[tc].reason += ( testcases[tc].passed ) ? "" : "wrong value "; } stopTest(); return ( testcases ); } function getTestCases() { // feb 29, 2000 addNewTestCase( "TDATE = new Date(0);(TDATE).setFullYear(2000);TDATE", UTCDateFromTime(SetFullYear(0,2000)), LocalDateFromTime(SetFullYear(0,2000)) ); addNewTestCase( "TDATE = new Date(0);(TDATE).setFullYear(2000,1);TDATE", UTCDateFromTime(SetFullYear(0,2000,1)), LocalDateFromTime(SetFullYear(0,2000,1)) ); addNewTestCase( "TDATE = new Date(0);(TDATE).setFullYear(2000,1,29);TDATE", UTCDateFromTime(SetFullYear(0,2000,1,29)), LocalDateFromTime(SetFullYear(0,2000,1,29)) ); /* // Jan 1, 2005 addNewTestCase( "TDATE = new Date(0);(TDATE).setFullYear(2005);TDATE", UTCDateFromTime(SetFullYear(0,2005)), LocalDateFromTime(SetFullYear(0,2005)) ); addNewTestCase( "TDATE = new Date(0);(TDATE).setFullYear(2005,0);TDATE", UTCDateFromTime(SetFullYear(0,2005,0)), LocalDateFromTime(SetFullYear(0,2005,0)) ); addNewTestCase( "TDATE = new Date(0);(TDATE).setFullYear(2005,0,1);TDATE", UTCDateFromTime(SetFullYear(0,2005,0,1)), LocalDateFromTime(SetFullYear(0,2005,0,1)) ); */ } function addNewTestCase( DateString, UTCDate, LocalDate) { DateCase = eval( DateString ); var item = testcases.length; // fixed_year = ( ExpectDate.year >=1900 || ExpectDate.year < 2000 ) ? ExpectDate.year - 1900 : ExpectDate.year; testcases[item++] = new TestCase( SECTION, DateString+".getTime()", UTCDate.value, DateCase.getTime() ); testcases[item++] = new TestCase( SECTION, DateString+".valueOf()", UTCDate.value, DateCase.valueOf() ); testcases[item++] = new TestCase( SECTION, DateString+".getUTCFullYear()", UTCDate.year, DateCase.getUTCFullYear() ); testcases[item++] = new TestCase( SECTION, DateString+".getUTCMonth()", UTCDate.month, DateCase.getUTCMonth() ); testcases[item++] = new TestCase( SECTION, DateString+".getUTCDate()", UTCDate.date, DateCase.getUTCDate() ); testcases[item++] = new TestCase( SECTION, DateString+".getUTCDay()", UTCDate.day, DateCase.getUTCDay() ); testcases[item++] = new TestCase( SECTION, DateString+".getUTCHours()", UTCDate.hours, DateCase.getUTCHours() ); testcases[item++] = new TestCase( SECTION, DateString+".getUTCMinutes()", UTCDate.minutes,DateCase.getUTCMinutes() ); testcases[item++] = new TestCase( SECTION, DateString+".getUTCSeconds()", UTCDate.seconds,DateCase.getUTCSeconds() ); testcases[item++] = new TestCase( SECTION, DateString+".getUTCMilliseconds()", UTCDate.ms, DateCase.getUTCMilliseconds() ); testcases[item++] = new TestCase( SECTION, DateString+".getFullYear()", LocalDate.year, DateCase.getFullYear() ); testcases[item++] = new TestCase( SECTION, DateString+".getMonth()", LocalDate.month, DateCase.getMonth() ); testcases[item++] = new TestCase( SECTION, DateString+".getDate()", LocalDate.date, DateCase.getDate() ); testcases[item++] = new TestCase( SECTION, DateString+".getDay()", LocalDate.day, DateCase.getDay() ); testcases[item++] = new TestCase( SECTION, DateString+".getHours()", LocalDate.hours, DateCase.getHours() ); testcases[item++] = new TestCase( SECTION, DateString+".getMinutes()", LocalDate.minutes, DateCase.getMinutes() ); testcases[item++] = new TestCase( SECTION, DateString+".getSeconds()", LocalDate.seconds, DateCase.getSeconds() ); testcases[item++] = new TestCase( SECTION, DateString+".getMilliseconds()", LocalDate.ms, DateCase.getMilliseconds() ); DateCase.toString = Object.prototype.toString; testcases[item++] = new TestCase( SECTION, DateString+".toString=Object.prototype.toString;"+DateString+".toString()", "[object Date]", DateCase.toString() ); } function MyDate() { this.year = 0; this.month = 0; this.date = 0; this.hours = 0; this.minutes = 0; this.seconds = 0; this.ms = 0; } function LocalDateFromTime(t) { t = LocalTime(t); return ( MyDateFromTime(t) ); } function UTCDateFromTime(t) { return ( MyDateFromTime(t) ); } function MyDateFromTime( t ) { var d = new MyDate(); d.year = YearFromTime(t); d.month = MonthFromTime(t); d.date = DateFromTime(t); d.hours = HourFromTime(t); d.minutes = MinFromTime(t); d.seconds = SecFromTime(t); d.ms = msFromTime(t); d.time = MakeTime( d.hours, d.minutes, d.seconds, d.ms ); d.value = TimeClip( MakeDate( MakeDay( d.year, d.month, d.date ), d.time ) ); d.day = WeekDay( d.value ); return (d); } function SetFullYear( t, year, mon, date ) { var T = ( isNaN(t) ) ? 0 : LocalTime(t) ; var YEAR = Number( year ); var MONTH = ( mon == void 0 ) ? MonthFromTime(T) : Number( mon ); var DATE = ( date == void 0 ) ? DateFromTime(T) : Number( date ); var DAY = MakeDay( YEAR, MONTH, DATE ); var UTC_DATE = UTC(MakeDate( DAY, TimeWithinDay(T))); return ( TimeClip(UTC_DATE) ); }
Description: Paul does not say that we should put ourselves in a saved condition, for this is done by God's grace alone; but Scripture sometimes uses the word salvation to speak of the future completion of salvation; believers are actively engaged in the process of sanctification; it is the grave heresy of hyper-Calvinism to think that believers, having received salvation by grace alone, are not engaged in working and willing towards the completion of salvation; that heresy has a devastating and withering effect on the church, turning God's grace into slothfulness; we have responsibility and obligation to work out our own salvation with all our heart, mind, will, conscience and resolution; to pray without doing is slothfulness, and to act without praying is self-sufficiency, and both are opposite to godliness; we are motivated by the knowledge that back of our working is God's working; God's working is the assurance and guarantee that we will be saved. Description: A cautionary word for the Church regarding its fascination with the present “revival” phenomena. Art makes the point that there is nothing more to be coveted and cherished than the sense of God as He in fact is and not as we may have thought Him to be. If we lose this sense of God and the holiness of God, then what do we have and what is our witness? Description: It is possible for a person to live a life of holiness, full of the blessings of God and yet come to some point in your life when you commit a shocking sin even though before this time you possessed a perfect heart. Using King Asa as an example, Wilkerson takes teaches us a lesson of caution. Description: "One of the things the law could not do," teaches Zac Poonen, "was to make a man holy on the inside." Do you have the true freedom that the Holy Spirit gives, or are you more concerned with what people in your church will say, assessing your own spirituality or others by numerous unwritten laws or rules? See what God's Word declares about true holiness which is a gift from God. Description: This is a difficult message for it is a call to Holiness. In this message, a stark contrast is derived between man methods and means the beauty and Holiness of God and the obedience God requires of us to stay on the very narrow truth no matter how limited it might seem to man. In His own emittable way, "we are trying to steady the arc of God....there is nobody wicked anymore. there is just weak"
Un Afghan otage des talibans a réussi à s'enfuir en s'emparant de l'arme d'un de ses ravisseurs pendant qu'ils priaient, tuant sept d'entre eux et en blessant 18 autres, selon des sources concordantes. Awal Khan, 36 ans, et un policier avaient été enlevés mercredi alors qu'ils roulaient sur une route de Paktika, une province très instable de l'est du pays considérée comme un bastion des talibans, a indiqué l'adjoint au responsable provincial de la sécurité, Abdul Rauf Masood. D'après Masood, le policier a été tué et l'otage emmené dans une résidence du district de Gomal, où il a été retenu pendant plusieurs heures. Pendant les prières de l'après-midi, Awal Khan, qui avait alors les poignets menottés, a saisi l'arme d'un de ses ravisseurs et a ouvert le feu, selon le responsable sécuritaire. "Awal Khan les a tous touchés. Il en a tué sept et en a blessé 18", a raconté à l'AFP Mohammad Rahman Ayaz, le porte-parole du gouverneur provincial. Le porte-parole des talibans Zabihullah Mujahid a confirmé qu'un groupe avait kidnappé les deux hommes et que Khan avait réussi à s'enfuir en tirant sur les insurgés, tuant trois d'entre eux. L'ex-otage s'est sauvé à bord d'un 4x4 appartenant aux ravisseurs, a ajouté M. Ayaz. Son frère, un commandant de police, a révélé les détails aux autorités, a expliqué M. Masood à l'AFP. Les talibans sont souvent impliqués dans des enlèvements d'Afghans ou d'étrangers, qu'ils gardent parfois en otage des années durant.
--- title: Azure CLI サンプル - Azure Database for MariaDB description: この記事では、Azure Database for MariaDB を操作する Azure CLI サンプル コードを紹介しています。 author: ajlam ms.author: andrela ms.service: mariadb ms.devlang: azurecli ms.topic: sample ms.custom: mvc, devx-track-azurecli ms.date: 3/18/2020 ms.openlocfilehash: f73fd033f299ffe1656ea1f131bcd78181c026b0 ms.sourcegitcommit: 11e2521679415f05d3d2c4c49858940677c57900 ms.translationtype: HT ms.contentlocale: ja-JP ms.lasthandoff: 07/31/2020 ms.locfileid: "87502207" --- # <a name="azure-cli-samples-for-azure-database-for-mariadb"></a>Azure Database for MariaDB 用の Azure CLI サンプル 次の表には、Azure Database for MariaDB 用の Azure CLI スクリプトのサンプルへのリンクが含まれています。 | サンプル リンク | 説明 | |---|---| |**サーバーの作成**|| | [サーバーとファイアウォール規則の作成](./scripts/sample-create-server-and-firewall-rule.md?toc=%2fcli%2fazure%2ftoc.json) | 単一の Azure Database for MariaDB サーバーを作成して、サーバー レベルのファイアウォール規則を構成する Azure CLI スクリプトです。 | |**サーバーのスケーリング**|| | [サーバーのスケーリング](./scripts/sample-scale-server.md?toc=%2fcli%2fazure%2ftoc.json) | 絶えず変化するパフォーマンス ニーズに対応するために、単一の Azure Database for MariaDB サーバーをスケールアップまたはスケールダウンするための Azure CLI スクリプトです。 | |**サーバーの構成を変更する**|| | [サーバーの構成を変更する](./scripts/sample-change-server-configuration.md?toc=%2fcli%2fazure%2ftoc.json) | 単一の Azure Database for MariaDB サーバーの構成を変更する Azure CLI スクリプトです。 | |**サーバーの復元**|| | [サーバーの復元](./scripts/sample-point-in-time-restore.md?toc=%2fcli%2fazure%2ftoc.json) | 単一の Azure Database for MariaDB サーバーを以前の時点に復元する Azure CLI スクリプトです。 | |**サーバー ログの操作**|| | [サーバー ログを有効にしてダウンロードする](./scripts/sample-server-logs.md?toc=%2fcli%2fazure%2ftoc.json) | 単一の Azure Database for MariaDB サーバーのサーバー ログを有効にしてダウンロードする Azure CLI スクリプトです。 | |||
Synthesis and characterization of immobilized dopamine beta-hydroxylase in membrane-bound and solubilized formats. Dopamine beta-hydroxylase (DBH) catalyzes the beta-hydroxylation of dopamine to norepinephrine. The enzyme in chromaffin granules occurs in a soluble form and a form confined to the surrounding membrane. DBH was noncovalently immobilized in the hydrophobic interface of an immobilized artificial membrane (IAM) liquid chromatographic stationary phase and the resulting DBH-IAM stationary phase was enzymatically active and was shown to mimic the membrane-bound form of the enzyme. DBH was also covalently immobilized onto a silica-based support containing, glutaraldehyde-P (Glut-P). The resulting DBH-Glut-P interphase was also enzymatically active, reproducible and shown to display characteristics of the solubilized enzyme. The results demonstrate that the different immobilization methods utilized for the enzyme can be used to quantitatively and qualitatively determine the enzyme kinetic constants associated with enzyme/substrate and enzyme/inhibitor interactions for the two distinct forms of the enzyme. These new entities can be used in basic biochemical studies as well as in high throughput screening of substances for DBH substrate/inhibitor properties.
defmodule Game.Command.Equipment do @moduledoc """ The "equipment" command """ use Game.Command alias Game.Format.Items, as: FormatItems alias Game.Items commands([{"equipment", ["eq"]}], parse: false) @impl Game.Command def help(:topic), do: "Equipment" def help(:short), do: "View your character's worn equipment" def help(:full) do """ #{help(:short)}. Similar to inventory but will only display items worn and wielded. Example: [ ] > {command}equipment{/command} """ end @impl true def parse(command, _context), do: parse(command) @impl Game.Command @doc """ Parse the command into arguments iex> Game.Command.Equipment.parse("equipment") {} iex> Game.Command.Equipment.parse("eq") {} iex> Game.Command.Equipment.parse("equipment hi") {:error, :bad_parse, "equipment hi"} iex> Game.Command.Equipment.parse("unknown") {:error, :bad_parse, "unknown"} """ def parse(command) def parse("eq"), do: {} def parse("equipment"), do: {} @impl Game.Command @doc """ View your character's worn equipment """ def run(command, state) def run({}, state = %{save: %{wearing: wearing, wielding: wielding}}) do wearing = wearing |> Enum.reduce(%{}, fn {slot, instance}, wearing -> Map.put(wearing, slot, Items.item(instance)) end) wielding = wielding |> Enum.reduce(%{}, fn {hand, instance}, wielding -> Map.put(wielding, hand, Items.item(instance)) end) state |> Socket.echo(FormatItems.equipment(wearing, wielding)) end end
INTRODUCTION {#s1} ============ Neoadjuvant chemoradiotherapy (CRT) followed by total mesorectal excision (TME) is a standard treatment in patients with locally advanced rectal cancer (LARC) \[[@R1]--[@R5]\]. However, radical surgery is associated with significant morbidity, especially in cases of low rectal cancer \[[@R6], [@R7]\]. Local excision may offer the possibility of organ preservation for the management of select patients after neoadjuvant chemoradiation. However, the oncological outcomes of this strategy have been largely associated with the risk of nodal metastases. Therefore, cautious and strict patient selection is crucial in this approach. Ideal candidate tumors for this treatment approach should be restricted to the bowel wall and harbor minimal risk for lymph nodes (LNs) metastases. Given the growing importance of lymph node metastases in the management of local excision, we designed our study to specifically assess the incidence of the positive lymph nodes in patients with locally advanced rectal cancer after chemoradiation by analyzing the Surveillance, Epidemiology, and End Results (SEER)-registered database. Moreover, because SEER data lacks information on pre-CRT clinical stage, neoadjuvant chemoradiotherapy (NCRT) methods, we further clarified these relevant issues in another set of patients with locally advanced rectal cancer from the Fudan University Shanghai Cancer Center (FUSCC). RESULTS {#s2} ======= SEER database patient characteristics {#s2_1} ------------------------------------- A total of 12,682 eligible patients during the 8-year study period were indentified, including 7,982 male and 4,700 female patients. There were 114 patients (0.9%) with ypT0 stage, 1091 patients (8.6%) with ypT1 stage, 1989 patients (15.7%) with ypT2 stage, and 9488 patients (74.8%) with ypT3--4 stage rectal cancer. Patient demographics and pathological features are summarized in Table [1](#T1){ref-type="table"}. The proportion of well differentiation (Grade I) gradually decreased from ypT0 to ypT3/4 (10.5% to 6.1%). ###### Patient characteristics from SEER database ypT0 ypT1 ypT2 ypT3--4 ---------------------------- ------- ------ ------- --------- ------- ------ ------- ------ **Sex**  Male 74 64.9 692 63.4 1297 65.2 5919 62.4  Female 40 35.1 399 36.6 692 34.8 3569 37.6 **Age**  \<50 20 17.5 195 17.9 377 19 1933 20.4  ≥50 94 82.5 896 82.1 1612 81 7555 79.6 **Race**  White 99 86.8 910 83.4 1604 80.6 7764 81.8  Black 8 7 97 8.9 188 9.5 729 7.7  Other 7 6.2 84 7.7 197 9.9 995 10.5 **Pathological grading**  Grade I 12 10.5 89 8.2 127 6.4 581 6.1  Grade II 63 55.3 707 64.8 1459 73.4 6474 68.2  Grade III 11 9.6 95 8.7 190 9.6 1273 13.4  Grade IV 2 1.8 5 0.5 8 0.4 111 1.2  Unknown 26 22.8 195 17.8 205 10.2 1049 11.1 **Histotype**  Adenocarcinoma 109 95.6 1058 97 1911 96.1 8685 91.5  Mucinous/Signet ring cell 5 44 33 3 78 3.9 803 8.5 **LNs examined**  Median 6 8 11 12  Rang 1--21 1--25 1--28 1--35 Abbreviations: LNs, lymph nodes. Incidence of positive lymph nodes {#s2_2} --------------------------------- Overall, 5649(44.5%) patients had lymph node metastasis. Patients with higher ypT categories following chemoradiotherapy were more likely to also have positive ypN status (*P* \< 0.001). By ypT stage, the numbers of ypN+ tumors were 15 (13.2%) for ypT0, 186 (17 %) for ypT1, 618 (31%) for ypT2, and 4830 (50.9%) for ypT3/4. Patients were categorized into two groups based on the identification of lymph nodes metastasis: ypN0 and ypN+ (Table [2](#T2){ref-type="table"}). ###### Association of positive nodes with clinical/pathologic variables from SEER database LN-- LN+ ---------------------------- ------- ------ ------- ------ --------- **Sex**  Male 4452 55.8 3530 44.2 0.706  Female 2581 54.9 2119 45.1 **Age**  \<50 1182 46.8 1343 53.2 \<0.001  ≥50 5851 57.6 4306 42.4 **Race**  White 5804 55.9 4573 44.1 0.305  Black 569 55.7 453 44.3  other 660 51.4 623 48.6 **Pathological grading**  Grade I 449 61.7 310 38.3 0.017  Grade II 4943 56.8 3760 43.2  Grade III 680 43.3 889 56.7  Grade IV 42 33.3 84 66.7  unknown 869 58.9 606 41.1 **Histotype**  Adenocarcinoma 6663 56.6 5100 43.4 \<0.001  Mucinous/Signet ring cell 370 40.3 549 59.7 **ypT**  0 99 86.8 15 13.2 \<0.001  1 905 83 186 17  2 1371 69 618 31  3/4 4658 49.1 4830 50.9 **LNs examined**  Median 10 13 \<0.001  Rang 1--27 1--35 Abbreviations: LNs, lymph nodes. Study of potential associations {#s2_3} ------------------------------- To discard potential bias in the detection of pathologically positive LNs, we studied possible associations between patient and tumor characteristics (Table [2](#T2){ref-type="table"}). Sex did not correlate with ypN+ (*P* = 0.706), because 3530 (44.2%) of 7982 male patients had ypN+ compared with 2119 (45.1%) of 4700 female patients. As seen in Table [2](#T2){ref-type="table"}, the rate of ypN+ did differ significantly between adenocarcinoma (43.4%) and mucinous/signet ring cell (59.7%; *P* \< 0.001). In addition, the race was not found to be significantly associated with the incidence of ypN+ (*P* = 0.305). Evaluating the seer database outcomes using the fuscc set {#s2_4} --------------------------------------------------------- The above results should be treated with caution as they might be biased by confounding factors, such as pre-CRT stage and concurrent chemotherapy. To evaluate the reliability of SEER results, we studied relevant issues in 517 eligible patients from the FUSCC. Patient demographics and pathological features are summarized in Table [3](#T3){ref-type="table"}. ###### Demographic and clinical features of patients with rectal cancer from Fudan University Shanghai Cancer Center ypT0 ypT1 ypT2 ypT3--4 ------------------------------ ------- ------ ------- --------- ------- ------ ------- ------ **Sex**  Male 78 70.3 23 74.2 74 62.2 185 72.3  Female 33 29.7 8 25.8 45 37.8 71 27.7 **Age**  \<50 40 36 8 25.8 37 31.1 77 30.1  ≥50 71 64 23 74.2 82 68.9 179 69.9 **Baseline stage**  II 23 20.7 7 22.6 19 16 43 16.8  III 88 79.3 24 77.4 100 84 213 83.2 **Distance from anal verge**  ≤5cm 73 65.8 20 64.5 76 63.9 142 55.5  \>5cm 38 34.2 11 35.5 43 36.1 114 44.5 **LNs examined**  Median 9 9 10 10  Range 1--24 4--20 2--27 1--28 **CCT**  fluorouracil alone 39 35.1 11 35.5 36 30.3 112 43.8  FBCR 72 64.9 20 64.5 83 69.7 144 56.2 Abbreviations: LNs, lymph nodes; FBCR, fluorouracil-based combination regimens; CCT, concurrent chemotherapy. Incidence of positive LNs {#s2_5} ------------------------- In 193 of 517 patients (37.3%), routine pathologic analysis of the resected specimen revealed positive LN involvement. Patients with higher ypT categories following chemoradiotherapy were more likely to also have positive ypN status (*P* \< 0.001). By ypT stage, the numbers of ypN+ tumors were 14 (12.6%) for ypT0, 6 (19.4 %) for ypT1, 38 (31.9%) for ypT2, and 135 (52.7%) for ypT3/4. In addition, we assessed the rate of positive LN involvement according to the pre-CRT MRI staging. Our findings showed that the proportion of lymph node metastasis in ypT0--1 cases was 17% among pre-CRT MRI staging cN+ patients. In the selected group of patients with pre-CRT MRI staging cN0 rectal cancer, there was only one ypN+ case (3.3%) which was tumor nodules rather than lymph node in ypT0--1 group. Patients were categorized into two groups based on the identification of lymph node metastasis: ypN0 and ypN+ (Table [3](#T3){ref-type="table"}). Study of potential associations {#s2_6} ------------------------------- To discard potential bias in the detection of pathologically positive LNs, we studied possible associations between patient and tumor characteristics, concurrent chemotherapy regimens (Table [4](#T4){ref-type="table"}). Distance from the anal verge did not correlate with ypN+ (*P* = 0.691), because 114 (36.7%) of 311 patients with tumors located 0 to 5 cm from the anal verge had ypN+ compared with 79 (38.3%) of 206 patients with tumors located 6 to 12 cm from the anal verge. As seen in Table [4](#T4){ref-type="table"}, the rate of ypN+ did not differ significantly between different concurrent chemotherapy (fluorouracil alone or fluorouracil-based combination regimens) (*P* = 0.697). ###### Association of positive nodes with clinical/pathologic variables from fudan university shanghai cancer center LN-- LN+ ------------------------------ -------- ------ -------- ------ --------- **Age (yr)**  Median 56 56 0.002  Range 26--77 20--82 **Gender**  Male 236 65.6 124 34.3 0.04  Female 88 56.1 69 43.9 **Distance from anal verge**  Median 5 5 0.691  Range 1--12 0--12  ≤5 cm 197 63.3 114 36.7  \>5 cm 127 61.7 79 38.3 **CCT**  fluorouracil alone 122 61.6 76 38.4 0.697  FBCR 202 63.3 117 36.8 **YPT**  0 97 87.4 14 12.6 \<0.001  1 25 80.6 6 19.4  2 81 68.1 38 31.9  3/4 121 47.3 135 52.7 **ypT, pre-CRT stage (N0)**  0 22 95.7 1 4.3 0.017  1 7 100 0 0  2 17 81 4 19  3/4 30 71.4 12 28.6 **ypT, pre-CRT stage (N+)**  0 75 85.2 13 14.8 \<0.001  1 18 75 6 25  2 64 65.3 34 34.7  3/4 91 42.5 123 57.5 Abbreviations: CRT, chemoradiotherapy; LN, lymph node; FBCR, fluorouracil-based combination regimens; CCT, concurrent chemotherapy. DISCUSSION {#s3} ========== Chemoradiotherapy (CRT) followed by total mesorectal excision was considered the standard of care in the treatment of locally advanced rectal cancer since it was proven to be beneficial in reducing the rate of local recurrence and toxicity \[[@R1]--[@R5]\]. In order to avoid the potential morbidity and impaired long-term functional outcomes associated with radical resection, there has been an increasing interest for organ-preserving strategies with local excision in the management of patients with rectal cancer and good response to neoadjuvant CRT. Local excision of rectal tumors is a technique with significant lower morbidity and mortality rates, compared with standard radical surgery \[[@R8], [@R9]\]. Stipa et al. evaluated the long-term clinical outcome of a selected group of 43 patients who underwent local excision with transanal endoscopic microsurgery after chemoradiation. In the ypT0 group, no local and distal recurrences were observed. In the ypT1--3 group, local recurrence was 10/30 (33%) \[[@R10]\]. In addition, Noh and colleagues reported the outcome of local excision following preoperative chemoradiotherapy for cT2 rectal cancer. The 5-year disease-free survival was higher in patients with ypT0 (90%) than in patients with ypT1--2 (69%, *p* = 0.1643) \[[@R11]\]. Moreover, Belluco et al. conducted a study on 29 patients treated by local excision, comparing patients with ypCR to patients with no ypCR, 5-year local recurrence-free survival was 92.9% vs. 66.7% (*P* = 0.047) \[[@R12]\]. Therefore, these studies suggested that TEM may have a curative role in the case of complete response to CRT. Despite these several studies had reported that local excision in patients who showed a good response to CRT had acceptably low rates of local recurrence and long-term survival outcomes compared with radical surgery. However, the issue of local resection following preoperative CRT has been addressed by few studies, which are limited by the low numbers and short follow-up \[[@R10]--[@R13]\]. Although response at the primary tumor site within the bowel may provide insight into the status of residual disease within the mesorectum, one of the uncertain facts which could not be ignored when conducting local excision is the status of the mesorectal lymph nodes. Some studies have confirmed that there can be differential responses between the primary tumor and the mesorectal lymph nodes \[[@R14], [@R15]\]. When nodal involvement is understaged and patients undergo local excision, the prognosis is poorer. Park and colleagues determined the rate of residual lymph node involvement following neoadjuvant chemoradiotherapy among patients with ypT0--2 residual bowel wall tumor \[[@R16]\]. Among all 406 ypT0--2 patients, 66 (16.3%) had lymph node metastasis: 20.8% among ypT2, 17.1% among ypT1, and 9.1 % among ypT0 patients. Local recurrences occurred more frequently in ypN+ vs ypN0 patients (2.0% vs. 5.5%; *p* = 0.038). Recurrence-free survival was 87.5% among ypT0--2N0 and 83.6% forypT0--2N+ (*P* = 0.28). With the T staging, lymph node metastasis rate also increased. In the present study, the SEER data showed that lymph node metastasis was 31% among ypT2, 17% among ypT1, and 13.2 % among ypT0 patients. Patient data from FUSCC showed that the incidence of lymph node involvement was 12.6% in patients developing mural pCR (ypT0) compared to 19.4% for ypT1 and increased further to 31.9% for ypT2 tumors which was comparable to the SEER data. These data showed that the incidence of lymph node involvement was more than 10% in patients with complete response of primary tumor. Recently, a randomized trial of patients with cT2N0 following preoperative CRT to either TME or local excision (using transanal endoscopic microsurgery, TEM) suggested equivalent local disease control with both techniques \[[@R17]\]. The risk of lymph node metastases after CRT is already minimized when proper staging at baseline shows cN0. Based on this, perhaps baseline lymph node staging may play a significant role in predicting the risk of lymph node metastases after CRT. Guillem et al. showed the incidence of positive LNs in patients with pre-CRT stage cT3N0 after CRT: ypT0, 3%; ypT1, 7%; ypT2, 20%; ypT3--4, 36% (*P* = .001) which was significantly lower than patient with cT3, 4N+ \[[@R18]\]. In the present study, we assessed the rate of positive LN involvement according to the pre-CRT MRI staging. Our findings showed that the proportion of lymph node metastasis in ypT0--1 cases was 17% among pre-CRT MRI staging cN+ patients. In the selected group of patients with pre-CRT MRI staging cN0 rectal cancer, there was only one ypN+ case (3.3%) which was tumor nodule rather than lymph node in ypT0--1 group. MRI has been used to delineate locally stage non-irradiated rectal cancers. Recently, several studies have shown that the use of MRI improves the overall T staging accuracy for rectal cancer with accuracy rates of 86%--95% \[[@R19]--[@R21]\]. Regarding LN assessments with MRI, the sensitivity and specificity are 75%--89% and 71%--98%, respectively \[[@R21]--[@R25]\]. Restaging MRI is performed after CRT to restage rectal cancer to identify the response of chemoradiation. Lee et al. conducted a study to evaluate the efficacy of restaging MRI for predicting the pathologic stage in rectal cancer after CRT. Pathologic T classification matched the post-CRT MRI findings in 97 (64.7%) of 150 patients and pathologic N classification matched the post-CRI MRI findings in 85 (56.6%) of 150 patients \[[@R26]\]. In addition, Park et al. determined whether preoperative MRI could detect lymph node metastases accurately in the node-by-node analysis \[[@R27]\]. Of the 341 nodes harvested, 120 were too small (\<3 mm) to be depicted on magnetic resonance images, and 18 of these contained metastasis (15%). Preoperative MRI revealed anode-by-node sensitivity and positive predictive value of 58.0%, and 61.7%. Therefore, preoperative MRI has low accuracy for the prediction of the pathologic T and N classifications in rectal cancer patients who received preoperative CRT. Our study has several limitations that deserve mention. First, although the present study is a large population-based study, the SEER database does not include information regarding the administration of CRT and the quality of surgical care or pathological technique, and all of these factors may affect positive LNs harvest. Second, it is a retrospective analysis and was therefore limited by the bias inherent in this type of analysis. However, given that the study patients were consecutive, offering a non-selected series of T3,4 and/or N+ rectal cancers, we believe that our results do not reflect a bias toward patients. In conclusion, given use of ypT stage only to stratify patients for local excision is partly unsafe, organ-preserving strategies for these patients will need to consider baseline MRI imaging in addition to CRT response to identify eligible patients. Our study demonstrates that there was a high risk for residual lymph node metastasis among patients even with complete pathologic response of primary tumor after preoperative CRT (12.6--13.2%). But if cT3,4N0 patients whom be classified according to baseline MRI imaging achieved ypT0--1 of bowel wall tumor, the rate of positive LN involvement was clinically acceptable (3.3%, tumor nodule, actually). This group of patients may be suitable for local resection. Considering that this study is a retrospective analysis, we need further prospective studies to verify. MATERIALS AND METHODS {#s4} ===================== Patient selection in the SEER database {#s4_1} -------------------------------------- The SEER, a population-based reporting system, was surveyed for the retrospective collection of data used in the analysis. The SEER program collects and publishes cancer incidence and survival data from 18 population-based cancer registries, covering \>25% of the US population. Because no personal identifying information was used in the analysis, this study was granted an exemption from the Institutional Review Board of the study institution on March 30, 2012. Cases of rectal cancer (C20.9 Rectum, NOS) from 2004 to 2011 were extracted from the SEER database (SEER\*Stat 8.1.5) according to the Site Recode classifications with limitation to radiation prior to surgery and radiation preoperatively and post-surgery. Histological type were limited to adenocarcinoma (ICD-03, 8140/3, 8210/3, 8261/3, 8263/3), mucinous adenocarcinoma (ICD-03, 8480/3), and signet ring cell carcinoma (ICD-03, 8490/3). We selected this range because American Joint Committee on Cancer (AJCC) TMN stage was available since 2004. Other exclusion criteria were as follows: no LNs examined pathologically, synchronous distance metastases, and patients with unknown TNM stage. Patient selection in the FUSCC {#s4_2} ------------------------------ The Fudan University Shanghai Cancer Center Ethics Review Board approved the study. Preoperative chemoradiation was performed as standard treatment of LARC since 2006, so we performed a retrospective consecutive cohort study of locally advanced rectal cancer patients with preoperative chemoradiation at FUSCC between 2006 and 2013. Patients were identified from our institutional patient colorectal cancer database. Patients with no LNs examined pathologically, synchronous distance metastases, and unknown TNM stage were excluded. Treatment details {#s4_3} ----------------- Pretreatment clinical stage was assessed on the basis of MRI. All pretreatment biopsies were reviewed and diagnoses confirmed by Shanghai Cancer Center gastrointestinal pathologists. All patients also underwent full colonoscopic evaluation to exclude synchronous tumors, as well as digital rectal examination and proctoscopy to identify the tumor distance from the anal verge. Patients were treated with chemoradiotherapy with a median radiotherapy dose of 50 Gy and concurrent fluorouracil-based chemotherapy. Surgery generally was performed 6 to 8 weeks following completion of chemoradiotherapy and included low anterior resection, or abdominoperineal resection using total mesorectal excision (TME) principles. Adjuvant chemotherapy consisted of FOLFOX, XELOX, or Capecitabine for a period of 4 to 5 months was recommended for all medically fit patients following resection. Standard pathologic tumor staging of the resected specimen was performed after resection in accordance with the guidelines of the College of American Pathologists, with histopathologic diagnosis performed by dedicated gastrointestinal cancer pathologists. The gross tumor volume was entirely embedded and serially sectioned for hematoxylin and eosin staining and microscopic evaluation. Postoperative follow-up consisted of routine physical examination with carcinoembryonic antigen measurement and cross-sectional imaging every 3--6 months for the first 2 years after completion of treatment and every 6--12 months for 2 additional years thereafter. CT scans of the chest, abdomen and pelvis, full colonoscopic evaluation, and/or positron emission tomography (PET) were immediately performed if any symptom of disease occurred or elevated tumor marker levels were detected. Statistical analysis {#s4_4} -------------------- Associations between LN positivity and clinical/pathologic variables were examined using Fisher\'s exact test for categoric variables, an exact version of the Mantel-Haenszel test for trend for ordinal variables, and the Wilcoxon test for continuous variables. The statistical test was two sided and *P* \< 0.05 was considered statistically significant. PASW Statistics 13 (SPSS Inc., Chicago, USA) was used for the statistical analysis. The authors acknowledge the efforts of the Surveillance, Epidemiology, and End Results (SEER) Program tumor registries in the creation of the SEER database. The interpretation and reporting of these data are the sole responsibility of the authors. The authors have no support or funding to report. **Statement of author contributions** JFW and KTL conceived of and designed the study. JFW and JZ performed the analyses. KTL and GCL prepared all tables. JFW, KTL, and ZZ wrote the main manuscript. All authors reviewed the manuscript. **CONFLICTS OF INTEREST** The authors declare that they have no competing interests.
A cultural guide to Cuba When deciding what to do for your next sun-soaked holiday, a Caribbean cruise is an option that's hard to beat - especially if you pick an itinerary that features Cuba. As well as being an idyllic island awash with beautiful beaches, the country has a rich culture. It's this culture that makes it stand out as a top holiday destination, since it has that little bit more to offer than beaches alone. Below, you can get an idea of what cultural treats you can look forward to on your cruise from Southampton to the inviting shores of the Caribbean. An introduction to Cuba's culture Cuban culture is wonderfully diverse - something that's largely down to the fact that trade brought people from all across the world here. These days, it's possible to discern the influences of Spanish, French, African and English folk here, to name but a few. With a history of such an eclectic mix of people both passing through and settling here for trade, it's no surprise that today the island has a vibrant and varied culture. Its diverse history is particularly evident in its architecture, but we'll come to that in a moment. Coffee Coffee is more than just a drink in Cuba; it's a way of life. It's something that gives locals time to socialise, and a means of welcoming friends and family into your home. It's also an important slice of local history, since the bean was introduced by French planters in the 18th century - the first people to make this a viable crop on Cuba. So, trying some of the strong, punchy coffee here is an absolute must. Of all the variants, cafe cubano (also known as caficito) is probably the best one to sample, as it's a drink characteristic of the island. It's a Cuban espresso that's brewed with sugar, making for a sweet yet strong taste. A colada is the same drink, but it comes in a larger container along with lots of small cups - a beverage designed to be shared, reflecting the nature of coffee culture here as a whole. Architecture Cuba is home to some absolutely incredible architecture, and a significant portion of its charm stems from just how varied this is. For instance, you can still see buildings - particularly forts - from the Spanish colonial period alongside Art Deco designs and modern constructions. The UNESCO World Heritage Site of Old Havana is particularly worth visiting if you're interested in discovering some of Cuba's architectural gems. In terms of UNESCO heritage sites in general, there are nine in Cuba, including the original coffee plantations - which again goes to show just how important coffee is to the country. Cinema While cinema is something that's popular across the world, it's an integral part of Cuba's culture. The island first got involved in film in its early stages of development in the late 19th century, and is known for producing challenging and artistic movies. The Festival Internacional del Nuevo Cine Latinoamericana de La Habana is a testament to the importance of cinema. This annual event showcases new Cuban films, with this year's festival taking place from December 5th to 15th in La Habana. Sport There is also a strong sports culture in Cuba, with baseball being particularly popular. If you are in Havana during the main season - which runs from November to March - it is well worth going to see a game at the Estadio Latinoamericano to immerse yourself in the unique atmosphere. Boxing is another popular sport, meanwhile, and participation in athletics is rising, so there are possibilities for seeing other disciplines if baseball doesn't tickle your fancy. Cuba has everything you could want from a holiday destination - gorgeous beaches, warm weather, fascinating history and a vibrant culture. There is so much to see on this Caribbean isle, you're likely to find one getaway here just isn't enough. Cuba is a country that is shrouded in mystery among those who haven't been there, with so much of its past culture and history still present today. So, if you want to go back in time, heading to Cuba could be the answer. Read on to find out what you can do on this Caribbean island. Cuba is one of the most photogenic countries in the world, full of majestic colonial architecture, old American cars and vestiges from its revolutionary past. Here we take you on a journey through the streets of Old Havana and then down south to the picturesque town of Trinidad. Our ethos at iWantSun.co.uk is all about recommending the best destinations for you to enjoy a couple of weeks in the sun. Nothing could be more relaxing than lounging on a beach with a cocktail in hand so we’ve put together a guide just for you. Families still searching for that extra special holiday can take advantage of £100pp off a 12 trip to Cuba. The Cuba Libra holiday, with Families Worldwide gives guests the chance to really experience what the Caribbean island has to offer. More ... Today is World Elephant Day, and to celebrate these graceful giants we’ve put together a list of the best places in the world to get up close and personal with them. There’s no image that conjures up the word safari more than a herd of elephants plodding across the savannah, trunks swinging and ears flapping in unison.
I think he has still got the ability to play the NHL.president to forgive a federal crime.The Sixers center picked up three fouls and played just 6 minutes, 42 seconds the first half.You would think a starting defensive tackle free agency would draw some interest.Everyone wants to coronate Derek Carr strictly for being a young quarterback on a surprising 10-win team.He eliminated a lot of movement.
/* -*- indent-tabs-mode: nil; js-indent-level: 2 -*- */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ //----------------------------------------------------------------------------- var BUGNUMBER = 465460; var summary = 'TM: valueOf in a loop'; var actual = ''; var expect = ''; //----------------------------------------------------------------------------- test(); //----------------------------------------------------------------------------- function test() { enterFunc ('test'); printBugNumber(BUGNUMBER); printStatus (summary); expect = '11111'; jit(true); (function(d) { for (let j = 0; j < 5; ++j) { actual += ('' + d); } })({valueOf: function()1}); jit(false); reportCompare(expect, actual, summary); exitFunc ('test'); }
1972 Within the context of Coordinated Universal Time (UTC) it was the longest year ever, as two leap seconds were added during this 366-day year, an event which has not since been repeated. (If its start and end are defined using mean solar time [the legal time scale], its duration was 31622401.141 seconds of Terrestrial Time (or Ephemeris Time), which is slightly shorter than 1908). Events January January 1 – Kurt Waldheim becomes Secretary-General of the United Nations. January 2 – Pierre Hotel Robbery: Six men rob the safe deposit boxes of The Pierre hotel in New York City of at least $4 million. January 3 – MGM's 1951 Show Boat is presented on television by NBC for the first time. This marks the first complete network telecast of any version of Show Boat (it had already been filmed as a part-talkie in 1929, and as a full-sound musical in 1936). January 4 The first scientific hand-held calculator (HP-35) is introduced (price $395). Rose Heilbron becomes the first woman judge at the Old Bailey in London. January 5 – U.S. President Richard Nixon orders the development of a Space Shuttle program. January 7 Iberia Airlines Flight 602 crashes into a 462-meter peak on the island of Ibiza; 104 are killed. Howard Hughes speaks to the press by telephone to denounce Clifford Irving's hoax biography of him. January 9 – The RMS Queen Elizabeth is destroyed by fire in Hong Kong harbor. January 10 – Sheikh Mujibur Rahman returns to Bangladesh after spending over nine months in prison in Pakistan. January 11 – East Pakistan renames itself Bangladesh. January 13 – Prime Minister of Ghana Kofi Abrefa Busia is overthrown in a military coup by Colonel Ignatius Kutu Acheampong. January 14 – Queen Margrethe II of Denmark succeeds her father, King Frederick IX, on the throne of Denmark, the first Queen of Denmark since 1412 and the first Danish monarch not named Frederick or Christian since 1513. January 19 – The Libertarian enclave Minerva on a platform in the South Pacific, sponsored by the Phoenix Foundation, declares independence. Soon neighboring Tonga annexes the area and dismantles the platform. January 20 President Zulfikar Ali Bhutto announces that Pakistan will immediately begin a nuclear weapons program. Fears are growing about the economy of the United Kingdom, where unemployment is now exceeding 1 million for the first time since World War II. January 21 A New Delhi bootlegger sells wood alcohol to a wedding party; 100 die. Tripura, part of the former independent Twipra Kingdom, becomes a full state of India. January 24 – Japanese soldier Shoichi Yokoi is discovered in Guam; he had spent 28 years in the jungle. January 25 – Shirley Chisholm, the first African American Congresswoman, announces her candidacy for President. January 26 Yugoslavian air stewardess Vesna Vulović is the only survivor when her plane crashes in Czechoslovakia. She survives after falling 10,160 meters (33,330 feet) in the tail section of the aircraft. The Aboriginal Tent Embassy is set up on the lawn of Parliament House in Canberra. January 27 – Two New York City Police Department officers, Gregory Foster and Rocco Laurie, are assassinated by members of the Black Liberation Army (BLA) while on foot patrol in New York's East Village area. January 30 Bloody Sunday: The British Army kills 14 unarmed nationalist civil rights marchers in Derry, Northern Ireland. Pakistan withdraws from the Commonwealth of Nations. January 31 – King Birendra succeeds his father as King of Nepal. February February 2 A bomb explodes at the British Yacht Club in West Berlin, killing Irwin Beelitz, a German boat builder. The German militant group 2 June Movement announces its support of the Provisional Irish Republican Army. Anti-British riots take place throughout Ireland. The British Embassy in Dublin is burned to the ground, as are several British-owned businesses. The last draft lottery is held, a watershed event in the wind-down of military conscription in the United States during the Vietnam era. These draft candidates are never called to duty. February 3–13 – The 1972 Winter Olympics are held in Sapporo, Japan. February 4 – Mariner 9 sends pictures as it orbits Mars. February 5 Bob Douglas becomes the first African American elected to the Basketball Hall of Fame. February 9 – The British government declares a state of emergency over a miners' strike. February 15 President of Ecuador José María Velasco Ibarra is deposed for the fourth time. Phonorecords are granted U.S. federal copyright protection for the first time. February 17 – Volkswagen Beetle sales exceed those of the Ford Model T when the 15,007,034th Beetle is produced. February 18 – The California Supreme Court voids the state's death penalty, commuting all death sentences to life in prison. February 19 – Asama-Sansō incident: Five United Red Army members break into a lodge below Mount Asama, taking the wife of the lodge keeper hostage. February 21 – The Soviet unmanned spaceship Luna 20 lands on the Moon. February 21 – February 28 – U.S. President Richard M. Nixon makes an unprecedented 8-day visit to the People's Republic of China and meets with Mao Zedong. February 22 Aldershot Bombing: An Official IRA bomb kills seven in Aldershot, England. Lufthansa Flight 649 is hijacked and taken to Aden. Passengers are released the following day after a ransom of 5 million US dollars is agreed. February 23 – Angela Davis is released from jail. A Caruthers, California farmer, Rodger McAfee, helps her make bail. February 24 – North Vietnamese negotiators walk out of the Paris Peace Talks to protest U.S. air raids. February 26 A coal sludge spill kills 125 people in Buffalo Creek, West Virginia. Luna 20 comes back to Earth with 55 grams (1.94 oz) of lunar soil. February 28 – The Asama-Sanso incident ends in a standoff between 5 members of the Japanese United Red Army and the authorities, in which two policemen are killed and 12 injured. March March 1 The Thai province Yasothon is created after being split off from the Ubon Ratchathani Province. The Club of Rome publishes its report The Limits to Growth. Juan María Bordaberry is sworn in as President of Uruguay amid accusations of election fraud. March 2 The Pioneer 10 spacecraft is launched from Cape Kennedy, to be the first man-made satellite to leave the solar system. Jean-Bédel Bokassa becomes President of the Central African Republic. March 3 Sculpted figures of Jefferson Davis, Robert E. Lee, and Stonewall Jackson are completed at Stone Mountain in the U.S. state of Georgia. Mohawk Airlines Flight 405 crashed into a house on Edgewood Avenue in Albany, New York, killing 16 of the 47 persons on board, and one person in an upstairs apartment. The impact happened at 8:48 pm after the commuter plane lost power during a snowstorm. Thick as a Brick by Jethro Tull is released, a concept album supposedly written by an 8-year-old boy, Gerald Bostock. March 4 Libya and the Soviet Union sign a cooperation treaty. The Organisation of the Islamic Conference Charter is signed (effective February 28, 1973). March 5 – Greek composer Mikis Theodorakis leaves the Greek Communist Party. March 13 The United Kingdom and the People's Republic of China elevate diplomatic exchanges to the ambassadorial level after 22 years. Clifford Irving admits to a New York court that he had fabricated Howard Hughes' "autobiography". March 15 – The Godfather has its premiere at the Loew's State Theatre in New York City. March 16 – The first building of the Pruitt–Igoe housing development in St. Louis is destroyed. March 19 – India and Bangladesh sign the Indo-Bangladeshi Treaty of Friendship, Cooperation and Peace. March 22 – The 92nd U.S. Congress votes to send the proposed Equal Rights Amendment to the states for ratification. March 24 – The British government announces the prorogation of the Parliament of Northern Ireland and the introduction of 'Direct Rule' of Northern Ireland, after the Unionist government refuses to cede security powers. March 25 – Après toi sung by Vicky Leandros (music by Klaus Munro & Mario Panas, lyric by Klaus Munro & Yves Dessca) wins the Eurovision Song Contest 1972 for Luxembourg. March 26 An avalanche on Mount Fuji kills 19 climbers. The last trolleybus system in the United Kingdom closes in Bradford, West Riding of Yorkshire after over 60 years of operation. After 14 years, the last of Leonard Bernstein's Young People's Concerts is telecast by CBS. This last concert is devoted to Gustav Holst's The Planets. March 27 – The First Sudanese Civil War ends. March 30 Vietnam War: The Easter Offensive begins after North Vietnamese forces cross into the Demilitarized Zone (DMZ) of South Vietnam The Parliament of Northern Ireland is suspended. April April 7 – Vietnam War veteran Richard McCoy Jr. hijacks a United Airlines jet and extorts $500,000; he is later captured. April 10 The U.S. and the Soviet Union join some 70 nations in signing the Biological Weapons Convention, an agreement to ban biological warfare. Tombs containing bamboo slips, among them Sun Tzu's Art of War and Sun Bin's lost military treatise, are accidentally discovered by construction workers in Shandong. The 6.7 Qir earthquake shook southern Iran with a maximum Mercalli intensity of IX (Violent), killing 5,374 people in the province of Fars. The 44th Annual Academy Awards are held at the Dorothy Chandler Pavilion in Los Angeles. April 12 – The X-rated animated movie Fritz the Cat is released. April 13 – The Universal Postal Union decides to recognize the People's Republic of China as the only legitimate Chinese representative, effectively expelling the Republic of China administering Taiwan. April 16 Apollo 16 (John Young, Ken Mattingly, Charlie Duke) is launched. During the mission, the astronauts, driving the Lunar Roving Vehicle, achieve a lunar rover speed record of 18 km/h. Vietnam War – Nguyen Hue Offensive: Prompted by the North Vietnamese offensive, the United States resumes bombing of Hanoi and Haiphong. April 17 – The first Boston Marathon in which women are officially allowed to compete. April 22 – Sylvia Cook and John Fairfax finish rowing across the Pacific. April 26 – The Lockheed L-1011 TriStar enters service with Eastern Airlines. April 27 The Burundian Genocide against the Hutu begins; more than 500,000 Hutus die. A no-confidence vote against German Chancellor Willy Brandt fails under obscure circumstances. April 29 – The fourth anniversary of the Broadway musical Hair is celebrated with a free concert at a Central Park bandshell, followed by dinner at the Four Seasons. There, 13 Black Panther protesters and the show's co-author, Jim Rado, are arrested for disturbing the peace and for using marijuana. May May 2 – Fire at the Sunshine Mine, a silver mine in Idaho, kills 91. May 5 – An Alitalia DC-8 crashes west of Palermo, Sicily; 115 die. May 7 – General elections are held in Italy. May 8 – U.S. President Richard Nixon orders the mining of Haiphong Harbor in Vietnam. May 10 – Operation Linebacker and Operation Custom Tailor begin with large-scale bombing operations against North Vietnam by tactical fighter aircraft. May 11 – The Boston Bruins defeat the New York Rangers four games to two to win the Stanley Cup. May 13 – A fire in a nightclub atop the Sennichi department store in Osaka, Japan, kills 115. May 15 Okinawa is returned to Japan after 27 years of United States occupation. Governor George C. Wallace of Alabama is shot and paralyzed by Arthur Bremer at a Laurel, Maryland, political rally. May 16 – The first financial derivatives exchange, the International Monetary Market (IMM), opens on the Chicago Mercantile Exchange. May 18 – Four troopers of the British Special Air Service and Special Boat Service are parachuted onto the ocean liner Queen Elizabeth 2 across the Atlantic after a bomb threat and ransom demand which turn out to be bogus. May 19 – Three out of six bombs explode in the Axel Springer AG media company offices in Hamburg, Germany, injuring 17; the Red Army Faction claims responsibility. May 21 – In St. Peter's Basilica (Vatican City), Laszlo Toth attacks Michelangelo's Pietà statue with a geologist's hammer, shouting that he is Jesus Christ. May 22 The Dominion of Ceylon becomes the republic of Sri Lanka under prime minister Sirimavo Bandaranaike, when its new constitution is ratified. Ferit Melen forms the new (interim) government of Turkey (35th government) May 23 – The Tamil United Front (later known as Tamil United Liberation Front), a pro-Tamil organization, is founded in Sri Lanka. May 24 Scottish Association football club Rangers F.C. win the UEFA Cup Winners' Cup, defeating FC Dynamo Moscow 3-2 in the final at Camp Nou in Barcelona (Spain). A pitch invasion by their supporters leads to the team being banned from defending the trophy the following season. A Red Army Faction bomb explodes in the Campbell Barracks of the U.S. Army Supreme European Command in Heidelberg, West Germany; three U.S. soldiers (Clyde Bonner, Ronald Woodard and Charles Peck) are killed. The Magnavox Odyssey video game system is first demoed, marking the dawn of the video game age; it goes on sale to the public in August. May 26 Richard Nixon and Leonid Brezhnev sign the SALT I treaty in Moscow, as well as the Anti-Ballistic Missile Treaty and other agreements. Wernher von Braun retires from NASA, frustrated by the agency's unwillingness to pursue a manned trans-orbital space program. Willandra National Park is established in Australia. May 27 – Mark Donohue wins the Indianapolis 500 in the Penske Racing McLaren–Offenhauser. May 30 The Angry Brigade goes on trial in the United Kingdom. Three Japanese Red Army members kill 24 and injure 100 in Lod Airport, Israel. June June – Iraq nationalizes the Iraq Petroleum Company. June 2 – Andreas Baader, Jan-Carl Raspe, Holger Meins and some other members of the Red Army Faction are arrested in Frankfurt am Main after a shootout. June 3 – Sally Priesand becomes the first female U.S. rabbi. June 4 – Angela Davis is found not guilty of murder. June 5–16 – The United Nations Conference on the Human Environment is held in Stockholm, Sweden June 8 Seven men and three women hijack a plane from Czechoslovakia to West Germany. Vietnam War: Associated Press photographer Nick Ut takes his Pulitzer Prize-winning photograph of a naked nine-year-old Phan Thi Kim Phuc running down a road after being burned by napalm. June 9 – The Black Hills flood kills 238 in South Dakota. June 11 – Henri Pescarolo (France) and co-driver former World Drivers' Champion Graham Hill (Britain) win the 24 Hours of Le Mans in the Equipe Matra MS670. June 14–23 – Hurricane Agnes kills 117 on the U.S. East Coast. June 14 Japan Airlines Flight 471 crashes outside of New Delhi airport, killing 82 of 87 occupants. The first Popeyes fried chicken restaurant opens in the New Orleans suburb of Arabi, Louisiana. June 15 – Ulrike Meinhof and Gerhard Müller of the Red Army Faction are arrested in a teacher's apartment in Langenhagen, West Germany. June 15–18 – The first U.S. Libertarian Party National Convention is held in Denver, Colorado. June 16 – 108 die as two passenger trains hit the debris of a collapsed railway tunnel near Soissons, France. June 17 Watergate scandal: Five White House operatives are arrested for burglarizing the offices of the Democratic National Committee. The United States returns Okinawa, occupied and governed since the World War II Battle of Okinawa, to Japan. Chilean president Salvador Allende forms a new government. June 18 Staines air disaster: 118 die when a Trident 1 jet airliner crashes two minutes after take off from London Heathrow Airport. West Germany beats the Soviet Union 3–0 to win Euro 72. Hong Kong's worst flooding and landslides in recorded history with of rainfall in the previous three days. 67 people die due to building collapses in Mid-levels districts landslide and building collapses, with a further 83 due to flooding-related fatalities. It is the second worst fatality due to building collapses, and the worst flooding in Hong Kong's recorded history. June 23 – Watergate scandal: U.S. President Richard M. Nixon and White House chief of staff H. R. Haldeman are taped talking about using the C.I.A. to obstruct the F.B.I.'s investigation into the Watergate break-ins. June 26 – Nolan Bushnell and Ted Dabney co-found Atari. June 28 – U.S. President Richard Nixon announces that no new draftees will be sent to Vietnam. June 29 – Furman v. Georgia: The Supreme Court of the United States rules that capital punishment is unconstitutional. June 30 – The International Time Bureau adds the first leap second (23:59:60) to Coordinated Universal Time (UTC) at the end of the month. July July – U.S. actress Jane Fonda tours North Vietnam, during which she is photographed sitting on a North Vietnamese anti-aircraft gun. July 1 The Canadian ketch Vega, flying the Greenpeace III banner, collides with the French naval minesweeper La Paimpolaise while in international waters, to protest French nuclear weapon tests in the South Pacific. The Bureau of Alcohol, Tobacco and Firearms becomes independent from the IRS. July 2 – Following Pakistan's surrender to India in the Indo-Pakistani War of 1971, both nations sign the historic Simla Agreement, agreeing to settle their disputes bilaterally. July 4 – The first Rainbow Gathering is held in Colorado. July 8 – The U.S. sells grain to the Soviet Union for $750 million. July 10 – India's news agency reports that at least 24 people have been killed in separate incidents, in the Chandka Forest in India, by elephants crazed by heat and drought. July 10–14 – The Democratic National Convention meets in Miami Beach. Senator George McGovern, who backs the immediate and complete withdrawal of U.S. troops from South Vietnam, is nominated for President. He names fellow Senator Thomas Eagleton as his running mate. July 15 – The Pruitt–Igoe housing development is demolished in St. Louis, Missouri. July 18 – Anwar Sadat expels 20,000 Soviet advisors from Egypt. July 21 Bloody Friday: 22 bombs planted by the Provisional IRA explode in Belfast, Northern Ireland; nine people are killed and 130 seriously injured. Comedian George Carlin is arrested by Milwaukee police for public obscenity, for reciting his "Seven Words You Can Never Say On Television" at Summerfest. A collision between two trains near Seville, Spain kills 76 people. July 23 – The United States launches Landsat 1, the first Earth-resources satellite. July 24 – King Jigme Singye Wangchuck succeeds his father Jigme Dorji Wangchuck as king of Bhutan. July 25 – U.S. health officials admit that African-Americans were used as guinea pigs in the Tuskegee Study of Untreated Syphilis in the Negro Male. July 27 – The McDonnell Douglas F-15 Eagle makes its first flight. July 28 – A national dock strike begins in Britain. July 31 – The Troubles, Northern Ireland: Operation Motorman 4:00 AM: The British Army begins to regain control of the "no-go areas" established by Irish republican paramilitaries in Belfast, Derry ("Free Derry") and Newry. Claudy bombing ("Bloody Monday"), 10:00 AM: Three car bombs in Claudy, County Londonderry, kill nine. It becomes public knowledge only in 2010 that a local Catholic priest was an IRA officer believed to be involved in the bombings but his role was covered up by the authorities. August August 1 – U.S. Senator Thomas Eagleton, the Democratic vice-presidential nominee, withdraws from the race after revealing he was once treated for mental illness. August 4 Arthur Bremer is jailed for 63 years for shooting George Wallace. Dictator Idi Amin declares that Uganda will expel 50,000 Asians with British passports to Britain within 3 months. A huge solar flare (one of the largest ever recorded) knocks out cable lines in U.S. It begins with the appearance of sunspots on August 2; an August 4 flare kicks off high levels of activity until August 10. August 10 – A brilliant, daytime meteor skips off the Earth's atmosphere due to an Apollo asteroid streaking over the western US into Canada. August 12 – Oil tankers Oswego-Guardian and Texanita collide near Stilbaai, South Africa. August 14 – An East German Ilyushin airliner crashes near East Berlin; all 156 on board perish. August 16 – As part of a coup attempt, members of the Royal Moroccan Air Force fire upon, but fail to bring down, Hassan II of Morocco's plane while he is traveling back to Rabat. August 19 – The first daytime episode of the second incarnation of American game show The Price Is Right is taped at CBS Television City, to be aired on September 4. August 21 – The Republican National Convention in Miami Beach, Florida renominates U.S. President Richard Nixon and Vice President Spiro Agnew for a second term. August 22 Rhodesia is expelled by the IOC for its racist policies. John Wojtowicz, 27, and Sal Naturile, 18, hold several Chase Manhattan Bank employees hostage for 17 hours in Gravesend, Brooklyn, N.Y. (an event later dramatized in the film Dog Day Afternoon). In the Almirante Zar Naval Base, Argentina, 16 detainees are executed by firing squad in the Trelew massacre. August 26 – September 10 – The 1972 Summer Olympics are held in Munich, West Germany. September September 1 Bobby Fischer defeats Boris Spassky in a chess match in Reykjavík, Iceland, becoming the first American world chess champion. The Second Cod War begins between the United Kingdom and Iceland. September 4 – The first daytime episode of the second incarnation of American game show The Price Is Right, hosted by Bob Barker, is aired on CBS. Gambit and The Joker's Wild also premiere. September 5–6 – Munich massacre: Eleven Israeli athletes at the 1972 Summer Olympics in Munich are murdered after eight members of the Arab terrorist group Black September invade the Olympic Village; five guerillas and one policeman are also killed in a failed hostage rescue. September 10 – The Brazilian driver Emerson Fittipaldi wins the Italian Grand Prix at Monza and becomes the youngest Formula One World Champion. September 14 – West Germany and Poland renew diplomatic relations. September 17 Uganda announces that there are Tanzanian troops in its territory. The television series M*A*S*H begins its run on CBS. September 18 – São Paulo Metro is inaugurated in Brazil. September 19 – A parcel bomb sent to the Israeli Embassy in London kills one diplomat. September 23 – Philippine president Ferdinand Marcos announces on national television the issuance of Proclamation No. 1081 placing the entire country under martial law. September 24 – An F-86 fighter aircraft leaving an air show at Sacramento Executive Airport fails to become airborne and crashes into a Farrell's Ice Cream Parlour, killing 12 children and 11 adults. September 25 – 1972 Norwegian EC referendum: Norway rejects membership in the European Economic Community. September 28 – The Canadian national men's hockey team defeats the Soviet national ice hockey team in Game 8 of the 1972 Summit Series (French: La Série du Siècle, Russian: Суперсерия СССР — Канада), 6–5, to win the series 4–3–1. September 29 – Sino-Japanese relations: The Joint Communiqué of the Government of Japan and the Government of the People's Republic of China is signed in Beijing, which normalizes diplomatic relations with the People's Republic of China after breaking official ties with the Republic of China (Taiwan). September 30 - Pittsburgh Pirates outfielder Roberto Clemente collects his 3,000 career base hit against the New York Mets. It was to be his final hit of his career due to his tragic death in a plane crash three months later. October October – The government of former President of Somalia Mohamed Siad Barre formally introduces the Somali alphabet as Somalia's official writing script. October 1 The first publication reporting the production of a recombinant DNA molecule marks the birth of modern molecular biology methodology. Alex Comfort's bestselling manual The Joy of Sex is published. October 2 – Denmark joins the European Community; the Faroe Islands stay out. October 5 – The United Reformed Church is founded out of the Congregational and Presbyterian Churches. October 6 – A train crash in Saltillo, Mexico kills 208 people. October 8 A major breakthrough occurs in the Paris peace talks between Henry Kissinger and Lê Đức Thọ. R. Sargent Shriver is chosen to replace Thomas Eagleton as the U.S. vice-presidential nominee of the Democratic Party. October 12 – En route to the Gulf of Tonkin, an anti-war protest, the USS Kitty Hawk riot led by African-Americans and interpreted by some as a race riot involving more than 200 sailors, breaks out aboard the United States Navy aircraft carrier USS Kitty Hawk; nearly 50 sailors are injured. October 13 – Uruguayan Air Force Flight 571: A Fairchild FH-227D passenger aircraft transporting a rugby union team crashes at about in the Andes mountain range, near the Argentina/Chile border. Sixteen of the survivors are found alive December 20 but they have had to resort to cannibalism to survive. October 16 A plane carrying U.S. Congressman Hale Boggs of Louisiana and three other men vanishes in Alaska. The wreckage has never been found, despite a massive search at the time. Rioting Maze Prison inmates cause a fire that destroys most of the camp. October 17 – Elizabeth II visits Yugoslavia. October 24 – Jackie Robinson, the first black player in modern Major League Baseball history, dies at his home in Stamford, Connecticut at the age of 53. October 25 The first female FBI agents are hired. Belgian Eddy Merckx sets a new world hour record in cycling in Mexico City. October 26 – Following a visit to South Vietnam, U.S. National Security Advisor Henry Kissinger suggests that "peace is at hand." October 28 – The Airbus A300 flies for the first time. October 29 – Lufthansa Flight 615 is hijacked and threats are made to be blown up if the three surviving perpetrators of the Munich massacre are not released from prison in West Germany. The demands are accepted, leading to fierce condemnation by Israel. October 30 U.S. President Richard Nixon approves legislation to increase Social Security spending by US$5.3 billion. A commuter train collision in Chicago kills 45, injures hundreds. November November At a scientific meeting in Honolulu, Herbert Boyer and Stanley N. Cohen conceive the concept of recombinant DNA. They publish their results in November 1973 in PNAS. Separately in 1972, Paul Berg also recombines DNA in a test tube. Recombinant DNA technology has dramatically changed the field of biological sciences, especially biotechnology, and opened the door to genetically modified organisms. The Nishitetsu Lions baseball club, part of the NPB's Pacific League, is sold to the Fukuoka Baseball Corporation, a subsidiary of Nishi-Nippon Railroad. The team is renamed the Taiheiyo Club Lions. November 5 – A group of Amerindians occupies the Bureau of Indian Affairs. November 7 – 1972 U.S. presidential election: Republican incumbent Richard Nixon defeats Democratic Senator George McGovern in a landslide (the election had the lowest voter turnout since 1948, with only 55 percent of the electorate voting). November 11 – Vietnam War – Vietnamization: The United States Army turns over the massive Long Binh military base to South Vietnam. November 14 – The Dow Jones Industrial Average closes above 1,000 (1,003.16) for the first time. November 16 – The United Nations Educational, Scientific and Cultural Organization adopts the Convention Concerning the Protection of the World Cultural and Natural Heritage November 19 – Seán Mac Stíofáin, a leader of the Provisional Irish Republican Army, is arrested in Dublin after giving an interview to RTÉ. November 22 – Vietnam War: The United States loses its first B-52 Stratofortress of the war. November 28 – The last executions in Paris, France. Roger Bontems and Claude Buffet – the Clairvaux Mutineers – are guillotined at La Santé Prison by chief executioner André Obrecht. Bontems had been found innocent of murder by the court, but as Buffet's accomplice is condemned to death anyway. President Georges Pompidou, in private an abolitionist, upholds both death sentences in deference to French public opinion. November 29 Atari kicks off the first generation of video games with the release of their seminal arcade version of Pong, the first game to achieve commercial success. The "tea house" Mellow Yellow opens on the Amstel River in Amsterdam, pioneering the legal sale of cannabis in the Netherlands. November 30 Vietnam War: White House Press Secretary Ron Ziegler tells the press that there will be no more public announcements concerning United States troop withdrawals from Vietnam, due to the fact that troop levels are now down to 27,000. Cod War: British Foreign Secretary Sir Alec Douglas-Home says that Royal Navy ships will be stationed to protect British trawlers off Iceland. December December 2 – 1972 Australian federal election: The Labor Party led by Gough Whitlam defeats the Liberal/Country Coalition Government led by Prime Minister William McMahon. Consequently, Whitlam becomes the first Labor Prime Minister of Australia since the defeat of Ben Chifley in 1949. Whitlam would be sworn in on December 5th; his first action using executive power was to withdraw all Australian personnel from the Vietnam War. McMahon resigned from the Liberal leadership almost immediately; he would be replaced by outgoing Treasurer Billy Snedden. December 7 Apollo 17 (Gene Cernan, Ronald Evans, Harrison Schmitt), the last manned Moon mission to date, is launched and The Blue Marble photograph of the Earth is taken. The mission also includes five mice. The Provisional Irish Republican Army kidnaps Jean McConville in Belfast. Imelda Marcos is stabbed and seriously wounded by an assailant; her bodyguards shoot him. December 8 United Airlines Flight 553 crashes short of the runway, killing 47 of 64 passengers and three people on the ground. Over $10,000 cash is found in the purse of Watergate conspirator Howard Hunt's wife. International Human Rights Day is proclaimed by the United Nations. December 11 – Apollo 17 lands on the Moon. December 14 – Apollo program: Eugene Cernan is the last person to walk on the Moon, after he and Harrison Schmitt complete the third and final Extra-vehicular activity (EVA) of Apollo 17. This is currently the last manned mission to the Moon. December 15 The Commonwealth of Australia ordains equal pay for women. The United Nations Environment Programme is established as a specialized agency of the United Nations. December 16 The Constitution of Bangladesh comes into effect. The Portuguese army kills 400 Africans in Tete, Mozambique. December 19 – Apollo program: Apollo 17 returns to Earth, concluding the program of lunar exploration. December 21 East Germany and West Germany recognize each other. ZANLA troopers attack Altera Farm in north-east Rhodesia. December 22 Australia establishes diplomatic relations with China and East Germany. A peace delegation that includes singer-activist Joan Baez and human rights attorney Telford Taylor visit Hanoi to deliver Christmas mail to American prisoners of war (they will be caught in the Christmas bombing of North Vietnam). December 23 The 6.2 Nicaragua earthquake kills 5,000–11,000 people in the capital Managua. President Anastasio Somoza Debayle is later accused of not distributing millions of dollars worth of foreign aid. The Pittsburgh Steelers win their first ever post-season NFL game, defeating the Oakland Raiders 13–7, on a last second play that becomes known as The Immaculate Reception. Swedish Prime minister Olof Palme compares the American bombings of North Vietnam to Nazi massacres. The U.S. breaks diplomatic contact with Sweden. Braathens SAFE Flight 239, also known as the Asker Accident: Aircraft crashed during approach to Oslo Airport, Fornebu, Norway. Forty people on board were killed. December 25 – The Christmas bombing of North Vietnam causes widespread criticism of the U.S. and President Richard Nixon. December 26 – Former United States President Harry S. Truman dies in Kansas City, Missouri. December 28 – The bones of Martin Bormann are identified in Berlin. December 29 – Eastern Air Lines Flight 401 crashes into the Everglades in Florida, killing 101 of 176 on board. It is the first hull-loss of a wide-body aircraft. December 31 Roberto Clemente dies in a plane crash off the coast of Puerto Rico while en route to deliver aid to Nicaraguan earthquake victims. For the first and last time, a 2nd leap second is added (23:59:60) to a year, making 1972 366 days and two seconds long, the longest year ever within the context of UTC. The US ban on the pesticide DDT takes effect. Date unknown The International Year of the Book is designated by UNESCO. The last major epidemic of smallpox in Europe breaks out in Yugoslavia. The United Kingdom begin to train Special Air Service for anti-terrorist duties in response to the Munich massacre The first women are admitted to Dartmouth College in the United States. Colombian looters find Ciudad Perdida but keep it a secret until the government reveals it in 1975. The Yellow River dries up for the first time in known history. Worship of Norse gods is officially approved in Iceland. The Climatic Research Unit is founded by climatologist Hubert Lamb at the University of East Anglia. The Socialist Federal Republic of Yugoslavia bans the cultural organization Matica hrvatska, founded in 1842. The German company SAP AG is founded. Kadir Nurman introduces a sandwich made with döner kebab meat as a fast-food item in Berlin. Burt Reynolds poses nude for the centerfold of the April edition of Cosmopolitan. Film director Stanley Kubrick asks Warner Bros. to withdraw A Clockwork Orange from exhibition in the UK following death threats made against his family. The film does not receive a public viewing in the country for another 27 years. Motown moves all of its operations from Detroit to Los Angeles in June. Births January January 1 Sharon Blynn, American actress and cancer activist Yoon Chan, South Korean actor Jennifer Hale, American voice actress Barron Miles, Canadian defensive back for the BC Lions in the CFL Lilian Thuram, French football player January 2 Eduardo Pereira, Timorese footballer Shiraz Minwalla, Indian theoretical physicist and string theorist January 4 – Brad Zavisha, Canadian ice hockey player January 5 Jang Seo-hee, South Korean actress Sakis Rouvas, Greek recording, film and television artist; model; businessman and former pole vaulter January 9 – Mat Hoffman, American BMX rider January 10 – Thomas Alsgaard, Norwegian cross-country skier January 11 – Amanda Peet, American actress January 12 Espen Knutsen, Norwegian hockey player Toto Wolff, Austrian former race car driver, team principal January 13 Nicole Eggert, American actress Yukiko Iwai, Japanese voice actress Vitaly Scherbo, Belarusian gymnast January 15 Il Mi Chung, South Korean golfer Claudia Winkleman, British television presenter Yang Yong-eun, South Korean golfer January 16 Ruben Bagger, Danish footballer Ang Christou, Australian rules footballer Dameon Clarke, Canadian actor and voice actor Yuri Alekseevich Drozdov, Russian footballer Ezra Hendrickson, Vincentian footballer Salah Hissou, Moroccan long-distance runner Joe Horn, American football player Greg Page, Australian musician and actor Alen Peternac, Croatian footballer January 17 – Ken Hirai, Japanese singer and songwriter January 17 - Kang Hui, Chinese anchor January 18 – Mike Lieberthal, American baseball player January 19 – Angham, Egyptian singer, record producer and actress January 20 – Nikki Haley, Indian-American politician, Governor of South Carolina (2010-2017) and current U.S. Ambassador to the United Nations January 21 Billel Dziri, Algerian footballer Brett Mullins, Australian rugby league player January 22 Gabriel Macht, American actor Romi Park, Japanese voice actress January 23 Ewen Bremner, Scottish actor Marcel Wouda, Dutch swimmer January 25 – Chantal Andere, Mexican actress January 27 Wynne Evans, Welsh operatic tenor Bibi Gaytán, Mexican singer and actress Mark Owen, British pop singer (Take That) Keith Wood, Irish rugby player January 29 – Matt Brandstein, American writer February February 1 – Tego Calderón, Puerto Rican hip hop musician and actor February 2 Dana International, Israeli transsexual singer, Eurovision Song Contest 1998 winner Klára Dobrev, wife of Hungarian Prime Minister Ferenc Gyurcsány Naheed Nenshi, Canadian politician, mayor of Calgary Hendrick Ramaala, South African long-distance runner Hisashi Tonomura, Japanese musician February 3 – Jesper Kyd, Danish video game composer February 4 Paul Anthony McDermott, Irish lawyer and academic (d. 2019) Giovanni Silva de Oliveira, Brazilian footballer February 5 Mary, Crown Princess of Denmark Koriki Chōshū, Japanese comedian Kristopher Carter, American composer Brad Fittler, Australian rugby league player and coach February 6 – Maurice Clemmons, American felon (d. 2009) February 7 Robyn Lively, American actress Jamie Shannon, Canadian actor and director February 8 – Big Show, American professional wrestler February 9 Crispin Freeman, American voice actor Norbert Rózsa, Hungarian swimmer February 11 Craig Jones, American musician Steve McManaman, British footballer Kelly Slater, American professional surfer February 14 Drew Bledsoe, American football player Rob Thomas, American singer-songwriter (Matchbox Twenty) February 15 – Jaromír Jágr, Czech hockey player February 16 – Jerome Bettis, American football player February 17 Billie Joe Armstrong, American rock musician and lead singer/guitarist (Green Day) Philippe Candeloro, French figure skater Yuki Isoya, Japanese singer Ralphie May, American stand-up comedian and actor (d. 2017) Valeria Mazza, Argentinean model and businesswoman February 18 – Olexandra Timoshenko, Ukrainian rhythmic gymnast February 19 – Malky Mackay, Scottish footballer February 20 – Todd Graves, American entrepreneur & founder of Raising Cane's Chicken Fingers February 21 – Seo Taiji, Korean musician February 22 Michael Chang, American tennis player Claudia Pechstein, German speed-skater February 24 Pooja Bhatt, Indian actress Richard Chelimo, Kenyan athlete (d. 2001) James Bachman, English comedian, actor and writer February 25 – Jaak Mae, Estonian cross-country skier February 26 Keith Ferguson, American voice actor Maz Jobrani, Iranian-American actor, comedian, and director February 29 Antonio Sabàto, Jr., Italian actor Sylvie Lubamba, Italian showgirl Dave Williams, American musician and singer of Drowning Pool (d. 2002) Saul Williams, American singer, poet and actor Pedro Sánchez, Prime Minister of Spain March March 3 Darren Anderton, English footballer March 4 Nocturno Culto, Norwegian musician Pae Gil-su, North Korean gymnast Ivy Queen, Puerto Rican-American actress, singer-songwriter and record producer Jos Verstappen, Dutch race car driver March 6 Shaquille O'Neal, African-American basketball player Jaret Reddick, American singer-songwriter and guitarist March 9 Ronald Cheng, Hong Kong singer and actor Spencer Howson, Australian radio announcer Travis Lane Stork, American emergency room physician and television personality Kerr Smith, American actor Jean Louisa Kelly, American actress March 10 Takashi Fujii (Matthew Minami), Japanese television performer Matt Kenseth, American race car driver Michael Lucas, Russian gay pornographic actor and director Timbaland, American record producer, songwriter and rapper March 13 Leigh-Allyn Baker, American actress Common, African-American rapper and actor Trent Dilfer, American football player Reshef Levi, Israeli comedian March 15 Mark Hoppus, American musician and bassist (blink-182) Erik S. Kristensen, American U.S. Navy SEAL (d. 2005) March 17 Mia Hamm, American soccer player Paige Hemmis, American television personality Sean Price, American rapper (Heltah Skeltah) (d. 2015) March 18 – Dane Cook, American comedian March 21 Chris Candido, American professional wrestler (d. 2005) Balázs Kiss, Hungarian Olympic athlete Derartu Tulu, Ethiopian long-distance runner March 22 Shawn Bradley, American basketball player Cory Lidle, American baseball player (d. 2006) Elvis Stojko, Canadian figure skater March 23 Joe Calzaghe, Welsh boxer Judith Godrèche, French actress March 26 – Leslie Mann, American actress and comedian March 27 Kieran Modra, Australian swimmer and cyclist (d. 2019) Ignacio Garrido, Spanish golfer Charlie Haas, American professional wrestler Jimmy Floyd Hasselbaink, Dutch footballer Ben Richards, British actor, better known for his role in The Bill March 28 Nick Frost, English actor, comedian and screenwriter Eby J. Jose, Indian journalist and human rights activist March 29 Hera Björk, Icelandic singer Priti Patel, British Indian politician, Secretary of State for the Home Department Junichi Suwabe, Japanese voice actor March 30 – Karel Poborský, Czech Republic football player April April 3 – Jennie Garth, American actress April 4 Tag Adams, American pornographic film actor Bastian Pastewka, German comedian and actor Lisa Ray, Canadian model and actress April 5 – Junko Takeuchi, Japanese voice actress April 6 – Jason Hervey, American actor April 8 Ariel Hernandez, Cuban boxer Sung Kang, Korean actor April 7 – Tim Peake, British astronaut April 9 – Bernard Ackah, Ivorian mixed martial artist and comedian April 10 – Vincent Zhao, Chinese actor and martial artist April 11 Balls Mahoney, American professional wrestler (d. 2016) Jason Varitek, American baseball player April 12 – Şebnem Ferah, Turkish singer and songwriter April 13 – Mariusz Czerkawski, Polish ice hockey player April 14 – Dean Potter, American free climber (d. 2015) April 15 Lou Romano, American animator and voice actor Arturo Gatti, Canadian boxer (d. 2009) April 16 – Conchita Martínez, Spanish tennis player April 17 Tony Boselli, American football player Jennifer Garner, American actress Muttiah Muralitharan, Sri Lankan cricketer Terran Sandwith, Canadian ice hockey player April 19 – Rivaldo, Brazilian footballer April 20 Lê Huỳnh Đức, Vietnamese footballer Carmen Electra, American actress and singer Željko Joksimović, Serbian singer, composer songwriter, multi-instrumentalist and producer Marko Kon, Serbian composer, producer and singer Stephen Marley, Jamaican-American musician April 23 Amira Medunjanin, singer from Bosnia and Herzegovina Choky Ice, Hungarian porn actor April 24 Chad I Ginsburg, American musician and record producer (CKY) Chipper Jones, American baseball player April 26 – Avi Nimni, Israeli footballer April 27 – David Lascher, American actor April 29 – Fredrik Kempe, Swedish songwriter and opera and pop singer April 30 – Takako Tokiwa, Japanese actress May May 1 – Julie Benz, American actress May 2 Paul Adcock, English footballer Dwayne Johnson, American professional wrestler and actor May 3 Katya Adler, British-born international broadcast journalist Vyacheslav Kozlov, Russian hockey player May 4 – Mike Dirnt, American rock musician and bassist (Green Day) May 5 – James Cracknell, British Olympic winning rower May 6 Janne Blomqvist, Finnish swimmer Martin Brodeur, Canadian hockey goaltender Naoko Takahashi, Japanese long-distance runner May 7 – Asghar Farhadi, Iranian film director May 8 Darren Hayes, Australian musician Ray Whitney, Canadian field hockey player May 9 Lisa Ann, American pornographic actress Daniela Silivaș, Romanian gymnast May 10 Radosław Majdan, Polish goalkeeper Katja Seizinger, German alpine skier May 12 – Rhea Seehorn, American actress May 14 – Amma Asante, Dutch politician May 15 – Richard Blackwood, English comedian, actor and rapper May 16 Derek Mears, American actor/stuntman Khary Payton, American actor May 17 Tyson Cane, American gay pornographic actor Roman Genn, Russian artist May 19 Jenny Berggren, Swedish rock singer (Ace of Base) Claudia Karvan, Australian actress May 20 Andreas Lundstedt, Swedish singer and actor (Alcazar) Busta Rhymes, African-American rapper and actor May 21 The Notorious B.I.G., African-American rapper (d. 1997) Kaoru Fujino, Japanese voice actress May 22 Max Brooks, American horror author and screenwriter Alison Eastwood, American actress May 23 – Rubens Barrichello, Brazilian race car driver May 24 – Maia Sandu, Prime Minister of Moldova May 25 Karan Johar, Indian film director, producer, and screenwriter Jules Jordan, American pornographic movie director, actor and producer Octavia Spencer, African-American actress, author and producer May 26 – Ahmad Dhani, Indonesian rock musician, songwriter, arranger, producer and politician May 27 – Ivete Sangalo, Brazilian singer, songwriter, actress and television show host May 28 – Michael Boogerd, Dutch cyclist May 29 – Stanislas Renoult, French singer May 30 – Manny Ramírez, Dominican baseball player May 31 Frode Estil, Norwegian cross-country skier Dave Roberts, American baseball player June June 1 Daniel Casey, English actor Rick Gomez, American actor and voice actor June 2 Wayne Brady, African-American comedian Wentworth Miller, American actor and screenwriter June 4 Derian Hatcher, American ice hockey player Debra Stephenson, English actress Stoja, Serbian pop-folk singer June 5 Mike Bucci, American professional wrestler Paweł Kotla, Polish conductor Yogi Adityanath, Indian priest and politician June 6 Noriaki Kasai, Japanese ski jumper Cristina Scabbia, Italian singer June 7 – Karl Urban, New Zealand actor June 8 – Chapman To, Hong Kong actor June 10 – Steven Fischer, American film producer and director June 11 – Stephen Kearney, New Zealand rugby league player and coach June 12 – Kyle Lake, American pastor (d. 2005) June 14 – Matthias Ettrich, German computer scientist June 15 Marcus Hahnemann, American retired soccer player Andy Pettitte, American baseball player June 16 – John Cho, Korean-American actor and musician June 17 Rikrok, British-Jamaican singer Iztok Čop, Slovenian rower C. H. Greenblatt, American animator June 18 Michal Yannai, Israeli actress June 19 Jean Dujardin, French actor, comedian, and film director Rayveness, American porn actress June 20 – Shane Hamman, American Olympic weightlifter and powerlifter June 21 – Irene van Dyk, South African and New Zealand netball player June 22 – Miguel del Toro, Mexican baseball player June 23 – Zinedine Zidane, French-Algerian footballer and manager June 24 Robbie McEwen, Australian professional road bicycle racer Denis Žvegelj, Slovenian rower Kim Yeo-jin, South Korean actress and activist June 25 – Carlos Delgado, Puerto Rican baseball player June 27 – Christian Kane, American actor and singer-songwriter June 28 Maria Butyrskaya, Russian figure skater Jon Heidenreich, American professional wrestler June 29 Samantha Smith, American peace activist (d. 1985) Nawal Al Zoghbi, Lebanese singer June 30 Molly Parker, Canadian actress Fabiano Scherner, German-Brazilian mixed martial artist and jiu-jitsu black belt July July 1 Christopher Smiyh, British film director and screenwriter Steve Little, American actor and comedian July 2 Darren Shan, British author Coster Balakasi, Zimbabwean sculptor July 3 Henrik Fritzon, Swedish politician Aleksei Kulashko, New Zealand chess player July 4 Nina Badrić, Croatian pop singer Alexei Shirov, Spanish chess Grandmaster Craig Spearman, New Zealand cricketer Shira Arad, Israeli film editor and musical supervisor July 5 Ted Price, American businessman and video game designer Robert Esmie, American Olympic athlete Gilles Lellouche, French actor July 6 Isabelle Boulay, French Canadian singer Mark Gasser, British concert pianist Levent Üzümcü, Turkish actor July 7 Lisa Leslie, American basketball player Stoney Case, American football player Kirsten Vangsness, American actress and writer July 8 Shōsuke Tanihara, Japanese actor Sourav Ganguly, Indian cricketer Victor Mikhalevski, Israeli chess grandmaster July 10 Rosnah Shirlin, Malaysian politician Sofía Vergara, Colombian actress and model Peter Serafinowicz, English actor, voice actor, comedian, and writer Tilo Wolff, German musician John Viener, American actor, voice actor, writer, and comedian Julián Legaspi, Uruguayan-Peruvian actor Christoph Hochhäusler, German film director and screenwriter July 11 – Michael Rosenbaum, American actor, producer and comedian July 12 Gabriel Garko, Italian actor and fashion model Travis Best, American basketball player Nenad Jezdić, Serbian actor Jake Wood, English actor July 13 – Sean Waltman, American professional wrestler July 14 Deborah Mailman, Australian actress and singer Masami Suzuki, Japanese voice actress July 15 Scott Foley, American actor, director and screenwriter Chitalu Chilufya, Zambian doctor and politician July 18 – Fredrik Åkesson, Swedish guitarist July 19 Naohito Fujiki, Japanese actor and singer Daedalus Howell, American writer and filmmaker July 20 – Jozef Stümpel, Slovak professional ice hockey July 21 Justin Edwards, English actor and writer Catherine Ndereba, Kenyan long-distance runner Josué Guébo, Ivorian academic July 22 Andrew Holness, 9th Prime Minister of Jamaica Keyshawn Johnson, American football player July 23 – Marlon Wayans, American actor, comedian, producer, and screenwriter July 26 – Nathan Buckley, Australian rules footballer July 27 Takako Fuji, Japanese actress Maya Rudolph, American actress, comedian Takashi Shimizu, Japanese director Sheikh Muszaphar Shukor, Malaysian orthopaedic surgeon and the first commercial astronaut July 28 Elizabeth Berkley, American actress Evan Farmer, American television host, actor, and musician Yum Jung-ah, South Korean actress July 29 – Wil Wheaton, American actor July 31 – Tami Stronach, Iranian-born dancer and former actress August August 1 Marc Costanzo, Canadian musician Devon Hughes, American professional wrestler August 2 Chris Bender, American musician (d. 1991) Kelly Richardson, Canadian contemporary artist August 3 Patrik Isaksson, Swedish singer and songwriter Atsunori Inaba, Japanese baseball manager and player August 6 – Geri Halliwell, British pop singer (Spice Girls) August 7 Sarah Cawood, British television presenter Karen Disher, American film director Brad Patton, Swedish pornographic actor August 9 – A-mei, Taiwanese singer August 10 – Angie Harmon, American actress August 11 – Jonathon Prandi, American model and actor August 12 Demir Demirkan, Turkish rock musician and songwriter Jonathan Coachman, American World Wrestling Entertainment announcer August 13 Kevin Plank, American entrepreneur (Under Armour) Michael Sinterniklaas, French-born American voice actor August 14 Takako Honda, Japanese voice actress Yoo Jae-suk, South Korean comedian and television comedy show host Ed O'Bannon, American basketball player August 15 Ben Affleck, American actor and film director Mikey Graham, Irish singer (Boyzone) Jonathan Slinger, British actor August 16 Frankie Boyle, Scottish comedian Emily Robison, American country music performer (Dixie Chicks) August 17 – Ken Ryker, American pornographic actor August 18 – Leo Ku, Hong Kong actor and singer August 19 – Sammi Cheng, Hong Kong singer and actress August 20 – Chaney Kley, American actor (d. 2007) August 23 – Anthony Calvillo, Canadian Football League quarterback August 25 – Marvin Harrison, American football player August 26 – Samar Kokash, Syrian actress and voice actress August 27 Denise Lewis, English track and field athlete, Jimmy Pop, American musician Mike Smith, Canadian actor The Great Khali, Indian promoter, actor, powerlifter and professional wrestler August 29 – Bae Yong-joon, South Korean actor August 30 Cameron Diaz, American actress Pavel Nedvěd, Czech footballer September September 2 – Sergejs Žoltoks, Latvian hockey player (d. 2004) September 4 – Françoise Yip, Chinese-Canadian actress September 6 Idris Elba, English actor Martin Gooch, English filmmaker Anika Noni Rose, American actress September 7 – Sean Daley, American hip-hop musician (Atmosphere) September 8 Giovanni Frezza, Italian actor Lisa Kennedy Montgomery, American disc jockey and political satirist Os du Randt, South African rugby player Tomokazu Seki, Japanese voice actor September 9 – Natasha Kaplinsky, English newsreader September 10 Sara Groves, American Christian musician Bledar Sejko, Albanian guitarist, composer, and singer Ghada Shouaa, Syrian athlete Rio Tahara, Japanese snowboarder September 12 Avijit Roy, Bangladeshi-American online activist, writer and blogger (d. 2015) Gideon Emery, English actor Budi Putra, Indonesian journalist, writer and blogger September 13 – Kelly Chen, Hong Kong actress and singer September 15 Queen Letizia of Spain Jimmy Carr, British comedian September 16 Sprent Dabwido, Nauruan politician (d. 2019) Alessandro "Lord Vampyr" Nunziati, Italian singer, record producer and writer (Theatres des Vampires, Cain, Lord Vampyr's Shadowsreign) Vebjørn Rodal, Norwegian Olympic athlete September 17 – Bobby Lee, Asian-American comedian September 19 Jim Druckenmiller, National Football League quarterback Ashot Nadanian, Armenian chess player, theoretician and coach September 20 Victor Ponta, 3-Time Prime Minister of Romania Sergio Di Zio, Canadian actor September 21 Jon Kitna, American football player Liam Gallagher, British singer (Oasis) Erin Fitzgerald, Canadian-American voice actress September 22 Dana Vespoli, American porn actress and director Matthew Rush, American gay pornographic actor September 23 Ana Marie Cox, American author and blogger Karl Pilkington, English radio producer Pierre Amine Gemayel, Lebanese politician (d. 2006) Galit Gutman, Israeli female model September 24 – Karyn Bosnak, American author September 26 Beto O’Rourke, American politician, representative of Texas 16th congressional district Shawn Stockman, American singer and musician (Boyz II Men) September 27 Sylvia Crawley, American basketball player Gwyneth Paltrow, American actress September 28 Guta Stresser, Brazilian actress Dita Von Teese, American burlesque artist September 29 – Robert Webb, comedian and actor September 30 Ari Behn, Norwegian author (d. 2019) José Lima, Dominican baseball player (d. 2010) Shaan, Indian singer October October 1 – Jean Paulo Fernandes, Brazilian footballer October 2 – Konstantinos Papadakis, Greek pianist October 3 Kim Joo-hyuk, South Korean actor (d. 2017) Guy Oseary, Israeli-American businessman October 4 – Van Darkholme, Vietnamese-American gay pornographic actor, director and photographer October 5 Aaron Guiel, Canadian baseball player Grant Hill, African-American basketball player October 6 Anders Iwers, Swedish musician Ko So-young, South Korean actress J. J. Stokes, American football player October 8 – Kim Myung-min, South Korean actor October 9 – Etan Patz, missing American schoolboy October 10 – Jun Lana, Filipino playwright and screenwriter October 11 Claudia Black, Australian actress Tamara Gee, American vocalist, songwriter, producer, dancer and model October 13 – Danny Lloyd, American actor October 12 – Mechele Linehan, American murderer October 15 – Sandra Kim, Belgian singer, Eurovision Song Contest 1986 winner October 17 Eminem, American rapper and actor Sharon Leal, American actress and director Tarkan, Turkish singer October 19 – Sayaka Aoki, Japanese voice actress October 21 Evgeny Afineevsky, Russian-born American film director and producer Masakazu Morita, Japanese voice actor Evhen Tsybulenko, Ukrainian professor of international law Ilaria Latini, Italian voice actress October 22 – Saffron Burrows, British actress October 24 Van Darkholme, Vietnamese-American dungeon master, performance artist and film director T. J. Cunningham, American football player (d. 2019) Kim Ji-soo, South Korean actress Scott Peterson, American convicted murderer Pat Williams, American football player October 25 – Esther Duflo, French American economist, recipient of the Nobel Memorial Prize in Economic Sciences October 27 Lee Clark, English footballer Elissa, Lebanese singer Marika Krook, Finnish singer (Edea) Maria de Lurdes Mutola, Mozambican athlete Brad Radke, American baseball player October 28 Terrell Davis, American football player Brad Paisley, American country music singer-songwriter October 29 Takafumi Horie, Japanese entrepreneur Tracee Ellis Ross, American actress Gabrielle Union, American actress October 31 – Matt Dawson, English rugby player and TV personality. Pharoahe Monch, American Rapper November November 1 Mario Barth, German comedian Toni Collette, Australian actress, singer, and musician Jenny McCarthy, American actress and model Naoki Yanagi, Japanese voice actor November 2 Vladimir Vorobiev, Russian ice hockey player Samantha Womack, British actress November 4 Luís Figo, Portuguese footballer Julissa Gomez, American gymnast (d. 1991) November 5 – Krassimir Avramov, Bulgarian singer and songwriter November 6 Adonis Georgiades, Greek historian and politician, Greek Minister of Health Thandie Newton, British actress Rebecca Romijn, American actress and model November 7 Danny Grewcock, British rugby player Christopher Daniel Barnes, American actor and voice actor November 8 Gretchen Mol, American actress Maja Marijana, Serbian pop-folk singer November 9 Eric Dane, American actor Doug Russell, American sports media personality Naomi Shindō, Japanese voice actor November 10 Lou Brutus, American radio host, musician and photographer Shawn Green, American baseball player Trevor Devall, Canadian actor and voice actor November 11 – Adam Beach, Canadian actor November 13 – Takuya Kimura, Japanese actor November 14 Matt Bloom, American wrestler Josh Duhamel, American actor and model November 15 – Jonny Lee Miller, English-American actor November 16 Aurelia Dobre, Romanian artistic gymnast Missi Pyle, American actress and singer November 18 – Zubeen Garg, Indian Singer November 21 – Rain Phoenix, American actress November 22 – Gabe Khouth, Canadian actor and voice actor (d. 2019) November 23 Veronica Avluv, American porn actress Alf-Inge Håland, Norwegian footballer November 26 – Arjun Rampal, Indian actor November 28 – Jesper Strömblad, Swedish musician November 29 Brian Baumgartner, American actor and director Andreas Goldberger, Austrian ski jumper November 30 – Christopher Fitzgerald, American actor December December 4 Marc Bator, German journalist and television presenter Yūko Miyamura, Japanese voice actress, actress and singer December 6 – Mónica Santa María, Peruvian model and TV host (d. 1994) December 7 Hermann Maier, Austrian skier Tammy Lynn Sytch, American wrestling manager and personality Jason Winer, American actor, comedian, writer, director and producer December 9 – Tré Cool, American rock musician and drummer (Green Day) December 10 Puff Johnson, American singer (d. 2013) Brian Molko, American musician (Placebo) December 11 Daniel Alfredsson, Swedish-Canadian former ice hockey player LaMont Smith, American Olympic athlete December 12 Wilson Kipketer, Kenyan-Danish athlete Brandon Teena, American murder victim (d. 1993) Quan Yeomans, Australian musician; leader singer of Regurgitator December 13 – Chris Grant, Australian footballer December 14 – Miranda Hart, British Comedian and Actress December 15 Rodney Harrison, American football player Lee Jung-jae, South Korean actor Stuart Townsend, Irish actor December 16 – Angela Bloomfield, New Zealand actress December 17 – John Abraham, Indian actor December 18 Julian Arahanga, New Zealand actor Eimear Quinn, Irish Celtic singer, Eurovision Song Contest 1996 winner December 19 Alyssa Milano, American actress Rosa Blasi, American actress Warren Sapp, American football player December 20 – Gen Urobuchi, Japanese writer December 22 – Vanessa Paradis, French singer and actress December 23 Morgan, Italian singer, composer, multi-instrumentalist and X Factor (Italy) judge Christian Potenza, Canadian actor/voice actor December 24 – Klaus Schnellenkamp, German-Chilean author December 25 Josh Freese, American musician and drummer Qu Yunxia, Chinese middle-distance runner December 26 – Shane Meadows, English director December 27 – Colin Charvis, Welsh rugby player December 28 Patrick Rafter, Australian tennis player Adam Vinatieri, American football player December 29 – Jude Law, British actor December 30 – Kerry Collins, American football player December 31 – Joey McIntyre, American actor and singer (New Kids on the Block) Date unknown Imaani, English singer, Eurovision Song Contest 1998 runner-up Marente de Moor, Dutch writer Artur Żurawski, Polish cinematographer and director Deaths January January 1 Maurice Chevalier, French singer and actor (b. 1888) Patriarch Maximus V of Constantinople, Turkish Orthodox Christian bishop (b. 1897) Jane Morgan, British-born American actor and singer (b. 1880) January 3 – Frans Masereel, Belgian painter and graphic artist (b. 1889) January 7 – Emma P. Carr, American spectroscopist (b. 1880) January 8 Edwin Hugh Lundie, American architect (b. 1886) Kenneth Patchen, American poet and painter (b. 1911) Wesley Ruggles, American film director (b. 1889) January 9 – Ted Shawn, American dancer (b. 1891) January 16 – Ross Bagdasarian Sr., American record producer (Alvin and the Chipmunks) (b. 1919) January 17 Rochelle Hudson, American actress (b. 1916) Betty Smith, American writer (b. 1896) January 18 – Clarence Earl Gideon, American defendant in civil rights court case (Gideon v. Wainwright) (b. 1910) January 19 – Mohammad Al-Abbasi, Minister of Foreign Affairs and 45th Prime Minister of Jordan (b. 1914) January 24 – Jerome Cowan, American actor (b. 1897) January 25 – Erhard Milch, German field marshal and Luftwaffe officer (b. 1892) January 27 – Mahalia Jackson, American gospel singer (b. 1911) January 29 – Hugh McDermott, British actor and golfer (b. 1908) January 30 – Prince Sisowath Watchayavong, 5th Prime Minister of Cambodia (b. 1891) January 31 – King Mahendra of Nepal (b. 1920) February February 2 – Jessie Royce Landis, American actress (b. 1896) February 3 – John Litel, American actor (b. 1892) February 4 – Orlando Ward, American general (b. 1891) February 5 – Marianne Moore, American poet (b. 1887) February 7 Walter Lang, American film director (b. 1896) Bob Woodward, American actor (b. 1909) February 11 Jan Wils, Dutch architect (b. 1891) Colin Munro MacLeod, Canadian-American geneticist (b. 1909) February 17 – Gavriil Popov, Soviet Russian composer (b. 1904) February 19 – John Grierson, Scottish documentary filmmaker (b. 1898) February 20 Maria Goeppert-Mayer, German physicist, Nobel Prize laureate (b. 1906) Walter Winchell, American journalist (b. 1897) February 21 – Zhang Guohua, Chinese general and politician (b. 1914) February 22 Tedd Pierce, American animator (b. 1906) Dan Katchongva, Native American traditional leader (b. 1860) February 25 – Gottfried Fuchs, German (national team)-Canadian Olympic football player (b. 1889) February 27 – Pat Brady, American actor (b. 1914) February 29 – Pietro Ubaldi, Italian author, teacher, philosopher (b. 1886) March March 4 – Sir Harold Barrowclough, New Zealand general, lawyer and chief justice (b. 1894) March 11 Fredric Brown, American science fiction and mystery writer (b. 1906). Zack Wheat, American baseball player (Brooklyn Dodgers) and a member of the MLB Hall of Fame (b. 1888) March 13 Len Ford, American football player (Cleveland Browns) and a member of the Pro Football Hall of Fame (b. 1926) Tony Ray-Jones, British photographer (b. 1941) March 16 – Pie Traynor, American baseball player (Pittsburgh Pirates) and a member of the MLB Hall of Fame (b. 1898) March 20 – Marilyn Maxwell, American actress (b. 1921) March 21 – David McCallum, Sr., British violinist and father of actor David McCallum (b. 1897) March 23 Cristóbal Balenciaga, Spanish couturier (b. 1895) Margaret Dale, American actress (b. 1876) March 27 Sharkey Bonano, American jazz musician (b. 1904) M. C. Escher, Dutch artist (b. 1898) March 29 – J. Arthur Rank, British industrialist and film producer (b. 1888) March 31 Meena Kumari, Indian actress, singer and poet (b. 1933) Ramon Iglesias i Navarri, Co-Prince of Andorra (b. 1889) April April 2 Franz Halder, German general (b. 1884) Gil Hodges, American baseball player (b. 1924) April 3 – Ferde Grofé, American pianist and composer (b. 1892) April 4 Adam Clayton Powell, Jr., American politician (b. 1908) Elsa Ratassepp, Estonian actress (b. 1893) Stefan Wolpe, German-born composer (b. 1902) April 5 – Isabel Jewell, American actress (b. 1907) April 6 Ralph D. Cornell, American architect (b. 1890) Brian Donlevy, American actor (b. 1901) Heinrich Lübke, 2nd President of the Federal Republic of Germany (b. 1894) April 7 Abeid Karume, 1st President of Zanzibar (assassinated) (b. 1905) August Zaleski, 6th President of Poland (b. 1883) Victor Wong, American actor (b. 1906) April 9 – James F. Byrnes, United States Secretary of State and Justice of the Supreme Court (b. 1879) April 13 – Dorothy Dalton, American actress (b. 1893) April 15 – José Luis de Oriol y Urigüen, Spanish businessman, architect and politician (b. 1877) April 20 – Jorge Mistral, Spanish actor (b. 1920) April 21 – Elizabeth Clark, British author (b. 1875) April 25 - George Sanders, Russian-born British actor (b. 1906) April 26 – Fernando Amorsolo, Filipino painter (b. 1892) April 27 – Kwame Nkrumah, 1st President of Ghana (b. 1909) April 29 – King Ntare V of Burundi (b. 1947) April 30 Gia Scala, British actress (b. 1934) Clara Campoamor, Spanish politician and suffragist (b. 1888) May May 2 – J. Edgar Hoover, American civil servant, 1st Director of the Federal Bureau of Investigation (FBI) (b. 1895) May 3 – Bruce Cabot, American actor (b. 1904) May 4 Edward Calvin Kendall, American chemist, recipient of the Nobel Prize in Physiology or Medicine (b. 1886) Josep Samitier, Spanish footballer (b. 1902) May 5 Reverend Gary Davis, American blues and gospel singer (b. 1896) Frank Tashlin, American animation director (b. 1913) May 6 – Deniz Gezmiş, Turkish Marxist revolutionary (executed) (b. 1947) May 10 – Rhys Gemmell, Australian tennis champion (b. 1896) May 11 – Lee Beom-seok, Korean activist, 1st Prime Minister of South Korea (b. 1900) May 12 – Steve Ihnat, American actor (b. 1934) May 13 – Dan Blocker, American actor (b. 1928) May 15 – Nigel Green, South African-English actor (b. 1924) May 17 – Gordon Lowe, Australian tennis champion (b. 1884) May 18 – Sidney Franklin, American film director (b. 1893) May 22 Cecil Day-Lewis, British poet (b. 1904) Dame Margaret Rutherford, English actress (b. 1892) May 23 – Richard Day, Canadian art director (b. 1896) May 25 – José Sebastião e Silva, Portuguese mathematician (b. 1914) May 28 The Duke of Windsor, former King Edward VIII of the United Kingdom (b. 1894) Violette Leduc, French writer (b. 1907) May 29 – Prithviraj Kapoor, Indian actor and director (b. 1906) May 31 – Walter Freeman, American physician (b. 1895) June June 10 – Edward Milford, Australian general (b. 1894) June 12 Saul Alinsky, American political activist (b. 1909) Ludwig von Bertalanffy, Austrian biologist (b. 1901) Edmund Wilson, American writer and critic (b. 1895) June 13 Georg von Békésy, Hungarian biophysicist, recipient of the Nobel Prize in Physiology or Medicine (b. 1899) Stephanie von Hohenlohe, Austrian-born German World War II spy (b. 1891) Clyde McPhatter, American singer (b. 1932) Felix Stump, American admiral (b. 1894) June 17 – Jóhannes Gunnarsson, Icelandic Roman Catholic prelate and venerable (b. 1897) June 18 – Milton Humason, American astronomer (b. 1891) June 22 Elton Britt, American country music singer, songwriter and musician (b. 1913) Vladimir Durković, Serbian footballer (b. 1937) June 25 Nicholas Hannen, British actor (b. 1881) Jan Matulka, American painter (b. 1890) Charles Sullivan, American actor (b. 1899) June 30 – Joe Deakin, British Olympic athlete (b. 1879) July July 2 – Joseph Fielding Smith, 10th president of The Church of Jesus Christ of Latter-day Saints (b. 1876) July 4 – Enrique Telémaco Susini, Argentine entrepreneur (b. 1891) July 5 – Raúl Leoni, 55th President of Venezuela (b. 1905) July 6 – Brandon deWilde, American actor (b. 1942) July 7 Patriarch Athenagoras I of Constantinople (b. 1886) King Talal of Jordan (b. 1909) July 11 – Celina Guimarães Viana, Brazilian professor and suffragist (b. 1890) July 15 – Miklós Dudás, Hungarian Roman Catholic bishop and servant of God (b. 1902) July 21 Ralph Craig, American Olympic athlete (b. 1889) King Jigme Dorji Wangchuck (b. 1929) July 24 − Lance Reventlow, English playboy, entrepreneur and race car driver (b. 1936) July 27 – Count Richard von Coudenhove-Kalergi, Austrian-Japanese politician, geopolitician and philosopher (b. 1894) July 28 – Helen Traubel, American soprano (b. 1903) July 31 Alfons Gorbach, Austrian politician, 15th Chancellor of Austria (b. 1898) Paul-Henri Spaak, Belgian politician and statesman, 31st Prime Minister of Belgium and 2nd Secretary General of NATO (b. 1899) August August 7 Joi Lansing, American actress (b. 1928) Tom Neal, American actor (b. 1914) August 8 – Andrea Feldman, American actress (b. 1948) August 9 – Ernst von Salomon, German writer (b. 1902) August 11 Teresa Franchini, Italian actress (b. 1877) Max Theiler, South African-born American virologist, recipient of the Nobel Prize in Physiology or Medicine (b. 1899) August 14 Oscar Levant, American pianist and actor (b. 1906) Jules Romains, French poet and writer (b. 1885) August 16 Pierre Brasseur, French actor (b. 1905) Mohamed Oufkir, Moroccan general (assassinated) (b. 1920) August 19 Rudolf Belling, German sculptor (b. 1886) James Patterson, American actor (b. 1932) August 20 Juan Manuel Gálvez, 39th President of Honduras (b. 1887) Harold Rainsford Stark, American admiral (b. 1880) August 21 – Heinz Ziegler, German general (b. 1894) August 23 – Salvatore Naturale, American criminal (b. 1953) August 24 – Jinichi Kusaka, Japanese admiral (b. 1888) August 25 – Juan Carlos Paz, Argentine composer and music theorist (b. 1901) August 26 – Francis Chichester, British sailor and aviator (b. 1901) August 27 – Yung Fung-shee, Hong Kong philanthropist (b. 1900) August 28 – Prince William of Gloucester (b. 1941) August 29 – René Leibowitz, French composer (b. 1913) August 30 – Augusto Bertazzoni, Italian Roman Catholic archbishop and servant of God (b. 1876) September September 5 (Munich massacre): Yossef Romano, Israeli weightlifter (b. 1940) Moshe Weinberg, Israeli wrestling coach (b. 1939) September 6 (Munich massacre): David Mark Berger, Israeli weightlifter (b. 1944) Ze'ev Friedman, Israeli weightlifter (b. 1944) Yossef Gutfreund, Israeli wrestling referee (b. 1932) Eliezer Halfin, Israeli wrestler (b. 1948) Amitzur Shapira, Israeli athletics coach (b. 1932) Kehat Shorr, Israeli shooting coach (b. 1919) Mark Slavin, Israeli wrestler (b. 1954) Andre Spitzer, Israeli fencing coach (b. 1945) Yakov Springer, Israeli weightlifting judge (b. 1921) September 8 – Warren Kealoha, American Olympic swimmer (b. 1904) September 11 – Max Fleischer, American animator (b. 1883) September 12 – William Boyd, American actor (b. 1895) September 14 – Lane Chandler, American actor (b. 1899) September 15 Ásgeir Ásgeirsson, 2nd President of Iceland (b. 1894) Geoffrey Fisher, Archbishop of Canterbury (b. 1887) Henry Kent Hewitt, American admiral (b. 1887) September 17 Peter Stephens, British actor (b. 1920) Thomas L. Sprague, American admiral (b. 1894) Akim Tamiroff, Soviet actor (b. 1899) September 19 – Robert Casadesus, French pianist (b. 1899) September 21 – Henry de Montherlant, French writer (b. 1896) September 26 Charles Correll, American radio actor (b. 1890) Robert E. Dolan, American composer (b. 1906) October October 1 – Louis Leakey, British paleontologist (b. 1903) October 4 – Taro Shoji, Japanese singer (b. 1898) October 5 – Ivan Yefremov, Soviet paleontologist and science fiction author (b. 1907) October 6 – Cléo de Verberena, Brazilian actress and film director (born c. 1909) October 8 Prescott Bush, American banker and politician (b. 1895) José María Cuenco, Filipino Roman Catholic archbishop and servant of God (b. 1885) October 9 Dave Bancroft, American baseball player (Cleveland Indians) and a member of the MLB Hall of Fame (b. 1891) Miriam Hopkins, American actress (b. 1902) October 13 – Kenneth Edgeworth, Irish army officer, economist and astronomer (b. 1880) October 13 – Jose Villa Panganiban, Filipino lexicographer (b. 1903) October 16 – Leo G. Carroll, English actor (b. 1886) October 17 – George, Crown Prince of Serbia (b. 1887) October 18 Esma Cannon, British actress (b. 1905) Edward Cook, American Olympic athlete (b. 1888) October 19 – Fred Keenor, Welsh footballer (b. 1894) October 20 – Harlow Shapley, American astronomer (b. 1885) October 21 – Marcelino Olaechea, Spanish Roman Catholic religious professed and servant of God (b. 1889) October 24 Jackie Robinson, African-American baseball player (Brooklyn Dodgers) and a member of the MLB Hall of Fame (b. 1919) Claire Windsor, American actress (b. 1892) October 26 – Igor Sikorsky, Soviet aviation engineer (b. 1889) October 28 – Mitchell Leisen, American film director (b. 1898) October 29 – Victor Milner, American cinematographer (b. 1893) November November 1 – Ezra Pound, American poet (b. 1885) November 3 – Harry Richman, American entertainer (b. 1895) November 5 – Reginald Owen, English actor (b. 1887) November 11 – Berry Oakley, American musician (b. 1948) November 12 – Rudolf Friml, Czech composer (b. 1879) November 13 Arnold Jackson, British Olympic athlete (b. 1891) Margaret Webster, American actress (b. 1905) November 14 – Martin Dies, Jr., American politician (b. 1900) November 17 Léopold Dion, Canadian sex offender and serial killer (b. 1920) Thomas C. Kinkaid, American admiral (b. 1888) Eugène Minkowski, French psychiatrist (b. 1885) November 18 – Danny Whitten, American musician (b. 1943) November 23 – Marie Wilson, American actress (b. 1916) November 25 Henri Coandă, Romanian aerodynamics pioneer (b. 1886) Mary M. Crawford, American surgeon (b. 1884) November 28 – Havergal Brian, English composer (b. 1876) November 29 – Carl Stalling, American composer (b. 1891) November 30 – Hans Erich Apostel, Austrian composer (b. 1901) December December 1 – Antonio Segni, Italian politician, 34th Prime Minister of Italy (1955–1957, 1959–1960), 4th President of the Italian Republic (b. 1891) December 3 – Bill Johnson, American musician (b. 1872) December 6 – Janet Munro, British actress (b. 1934) December 9 William Dieterle, German film director (b. 1893) Louella Parsons, American gossip columnist (b. 1881) December 12 – Thomas H. Robbins, Jr., American admiral (b. 1900) December 13 – René Mayer, French politician, 91st Prime Minister of France (b. 1895) December 15 – Edward Earle, Canadian actor (b. 1882) December 20 Gabby Hartnett, American baseball player (Chicago Cubs) and a member of the MLB Hall of Fame (b. 1900) Günter Eich, German lyricist, dramatist, and author (b. 1907) December 21 – Paul Hausser, German Waffen SS general (b. 1880) December 22 – Jimmy Wallington, American radio personality (b. 1907) December 23 – Andrei Tupolev, Soviet aircraft designer (b. 1888) December 24 Charles Atlas, Italian-born American strongman and sideshow performer (b. 1892) Gisela Richter, English art historian (b. 1882) Daniel McVey, Australian public servant (b. 1892) Ernst Kreuder, German author (b. 1903) December 25 – C. Rajagopalachari, Indian politician and freedom-fighter. Last Governor-General of India (1948–50) (b. 1878) December 26 – Harry S. Truman, 33rd President of the United States (b. 1884) December 27 – Lester B. Pearson, Canadian scholar, statesman, soldier and politician, 8th President of the United Nations General Assembly and 14th Prime Minister of Canada, recipient of the Nobel Peace Prize (b. 1897) December 28 – Link Lyman, American football player (Chicago Bears) and a member of the Pro Football Hall of Fame (b. 1898) December 31 – Roberto Clemente, Puerto Rican baseball player (Pittsburgh Pirates) 4-time NL batting champion, 1966 NL MVP, 1971 World Series MVP and a member of the MLB Hall of Fame (b. 1934) Nobel Prizes Physics – John Bardeen, Leon Neil Cooper, John Robert Schrieffer Chemistry – Christian B. Anfinsen, Stanford Moore, William H. Stein Physiology or Medicine – Gerald M. Edelman, Rodney R. Porter Literature – Heinrich Böll Peace – not awarded Economics – John Hicks, Kenneth Arrow Other academic awards Turing Award – Edsger W. Dijkstra References Category:Leap years in the Gregorian calendar
Itai Dzamara: The man who stood up to Zimbabwe's Robert Mugabe and vanished Published duration 23 May 2018 Related Topics Zimbabwe after Mugabe image copyright Kumbirai Mafunda Itai Dzamara was one of the most outspoken critics of Robert Mugabe before his disappearance. Three years later, his loved ones are still waiting for answers. Kim Chakanetsa reports from Zimbabwe. Sheffra Dzamara has not seen her husband Itai Dzamara in more than three years. Her life changed irrevocably on the morning of 9 March 2015 when Mr Dzamara was abducted. Since then, she has lived a life in limbo, veering between hope and despair, unsure whether he is alive or dead. 'I have to smile' Despite his absence, Mr Dzamara is still very much a presence in the house they shared off a quiet street in Harare's Glen Norah Neighbourhood. In the corner of her living room is a large framed photo taken in a park on a sunny day. In it, Mr Dzamara and his wife stand side-by-side, smiling. A snapshot of a happier, easier time. Life since her husband disappeared has not been easy. "To tell you the truth I feel lonely," Mrs Dzamara says. However, she has had to put on a brave face for her 10-year-old son and daughter of five. "When I am not happy they notice it. So for the sake of my kids I have to be smiling or happy." image copyright Kumbirai Mafunda image caption Itai Dzamara was taken from a barber-shop near his home in March 2015 "It's very hard for them because they [always] ask about their dad. Even today the boy surprised me by putting on his dad's cap for the first time. You can really see that he misses him very much," Mrs Dzamara adds. That black flat cap had become synonymous with Mr Dzamara - he was often pictured in it after he began Occupy Africa Unity Square, a social movement animated by a single goal: to get then-President Robert Mugabe to resign. 'The dreamer we lack' In 2014 - the year Mr Dzamara began his one-man protest movement - that was an incredibly dangerous goal. Political dissenters often paid a price. But day after day, Mr Dzamara returned to sit in Africa Unity Square, a tree-filled park in the centre of Harare, holding his sign: "Failed Mugabe must step down." Soon others began to join him. Dirk Frey, who first read about it online, recalls the cat-and-mouse games they would play with the police during their colourful, whistling lunchtime protests. "It was like we were playing a game of chess against the authorities. We'd occupy the park and then they'd come chase us out and we'd run into the alleys surrounding the park and then come back. image copyright Kumbirai Mafunda image caption Mr Dzamara says he was beaten unconscious by a group of 20 police officers months earlier, in November 2014 "Eventually we reached an uneasy truce where, if we didn't do anything, they'd sit in their corner and we'd sit in ours. And then the moment we'd take out placards or hand out leaflets, they'd come after us." These small acts of defiance came at a price. Mr Dzamara landed up in hospital several times after being beaten by police. Then, on 17 October 2014, he took his protest a step further. He and two other protesters, Tichaona Danho and Philosophy Nyapfumbi, hand-delivered a petition to Mr Mugabe's office asking him to step down. They were interrogated for eight hours and beaten. The move certainly got the attention of the wider public. After the petition was delivered, a newspaper columnist asked: "Is Itai Dzamara the dreamer we lack?" Less than six months later, he disappeared. 'The boys' The memory of Mr Dzamara's abduction is still very clear to the last person to see him - his barber. Three years later, he still struggles to talk about it. But eventually, with a little coaxing, and a promise of anonymity, he recalls what happens, That morning, he was working with another barber in their shop a few minutes from Mr Dzamara's home. Read more: The barber-shop has since been repainted, but at the time it was a simple wooden structure without windows where neighbours and customers could casually walk in to chat or get a haircut. Mr Dzamara was in the barber chair getting his beard trimmed when they noticed a white Nissan twin cab which seemed to be circling the block. It looked out of place - but Mr Dzamara was confident he knew who it was. image copyright AFP image caption Friends and family have held numerous protests demanding to know what happened to Itai Dzamara "Ndeye vakomana," he said - a Shona phrase meaning "it belongs to the boys". "The boys" were Zimbabwe's secret police. Minutes later, two men dressed in plain clothes came in and asked for airtime for their mobile phones. When the barber said they did not have any, the men said they were actually after a cattle thief - Mr Dzamara. The activist was handcuffed and bundled into the back of the car. The white car then sped off. In total, five men were involved in the abduction of Mr Dzamara. He has not been seen since. Clues At his office in Harare, Charles Kwaramba shows me the voluminous file he has built over the years in his capacity as Mr Dzamara's lawyer. It contains appeals, applications, police reports and runs to hundreds of pages. As we page through the file, Mr Kwaramba talks me through the days and months that followed Mr Dzamara's abduction, when, he says, "nothing much was done". It took a High Court order to get the police to act. An appeal for information on state media was launched. image copyright Kumbirai Mafunda image caption Mr Dzamara (centre) inspired others to join him in his peaceful protest Then, a few months after Mr Dzamara disappeared, his younger brother Patson received an anonymous text message, which purported to explain what had happened. It listed the names of the five men involved in the abduction. Mr Dzamara, it went on, had been killed, and his body buried in grave number 71 in the cemetery of Harare's high security prison, Chikurubi. But it was not there any more, the texter said. It had since been moved to a dam north of the city. Mr Kwaramba is not entirely convinced the message was legitimate. The police didn't establish who sent the text, and in the end it raised more questions than answers. The Dzamara family and their lawyer say the police didn't investigate thoroughly enough. The BBC tried to get a response from the Zimbabwean police, with no success. Tears The question of who took Mr Dzamara and why remains unclear. His brother believes "the ruling Zanu-PF and military intelligence" were behind it. The fear was that Mr Dzamara would be able to mobilise people into a revolt similar to the "Arab Spring". The Zimbabwean government says it has no information about his detention or whereabouts. The fall of Mr Mugabe has given the family new hope. A letter has been sent to the administration of new President, Emmerson Mnanagwa, but as yet there has been no response. The Minister of Foreign Affairs, Sibusiso Moyo, did tell the BBC that the days of abductions were over and the new government respects the lives of every Zimbabwean. Back in Africa Unity Square - as always, a hive of activity - Mr Nyapfumbi is also waiting for answers. "It pains me. When I see his picture, I start crying," Mr Dzamara's friend says, his voice breaking.
Introduction {#sec1} ============ Fluorescence imaging has attracted great attention in biological applications due to its high resolution and sensitivity.^[@ref1]−[@ref3]^ Excellent in vivo and in vitro fluorescence imaging of cells requires some key factors such as a low imaging background, high fluorescence efficiency, and good imaging of photostability. However, the excitation source of traditional fluorescence imaging is ultraviolet or visible light, which has interference from autofluorescence and strong absorption.^[@ref4],[@ref5]^ It is well known that the near-infrared (NIR) region from 750 to 1000 nm is one of the "optical transmission windows".^[@ref1],[@ref6]^ Fluorescence imaging in vitro and in vivo excited in the NIR light has some advantages, such as low light scattering, deep light penetration, and a high signal-to-noise ratio.^[@ref7]−[@ref10]^ Conventional NIR chromophores are organic dyes and quantum rods (QDs). However, organic dyes have poor photostability and toxicity, which significantly limit their application in biological fluorescent probes.^[@ref11]−[@ref13]^ Lanthanide-doped (Ln^3+^, such as Yb^3+^, Tm^3+^, Er^3+^, Ho^3+^) upconversion nanoparticles (UCNPs) are a kind of emerging biological materials.^[@ref14]−[@ref21]^ Upconversion luminescence (UCL) is anti-Stokes emission, which can convert to ultraviolet (UV) or visible (vis) emission via absorbing near-infrared (NIR) light. UCNPs based on their unique properties have been considered an important material for bioimaging applications.^[@ref22]−[@ref28]^ Biological fluorescent probes based on lanthanide-doped UCNPs can be excited using 750--1000 nm NIR light.^[@ref29]−[@ref33]^ Therefore, UCNPs show little absorption to biological components such as lipids and hemoglobin, which significantly improves deep tissue penetration and the signal-to-noise ratio.^[@ref34]−[@ref38]^ It is challenging to develop a fluorescent probe with high UCL efficiency and good stability for bioimaging in living cells. In fact, the host has an important influence on UCL properties.^[@ref39]−[@ref42]^ An oxide host has high chemical stability and thermal stability compared to fluorides. Choosing suitable oxides with low phonon energy as the host can increase the UCL intensity and fluorescence stability. For example, zinc oxide (ZnO) has been identified as a good host candidate due to its long-term stability, low toxicity, and wide direct gap.^[@ref43]−[@ref46]^ However, it is still a big challenge to achieve high-resolution fluorescence imaging with UCNPs. The most common interaction between UCNPs and cells has a large influence on the toxicity and cellular localization of UCNPs. It has been reported that nanoparticles usually entered the cell through endocytosis.^[@ref47],[@ref48]^ The four mechanisms of endocytosis are: (i) micropinocytosis (size \>1 μm), (ii) clathrin-mediated endocytosis (60 nm \< size \< 120 nm), (III) caveolae-mediated endocytosis (size \<60 nm), and (iv) caveolae-independent endocytosis. Therefore, UCNPs can enter the cell via the coated surface on UCNPs.^[@ref49]−[@ref51]^ Coating of UCNPs with silica shell as an effective method can improve the biocompatibility of nanoparticles. The SiO~2~ shell prevents the direct interaction of UCNPs with biomolecules. Meanwhile, lanthanide ions on the surface of UCNPs show no luminescence emission, due to which these rare-earth ions are less perturbed by the degenerated crystalline fields of the host interfaces. Upon silica coating, cooperative crystalline fields are formed between the core surfaces and the coated shells, which excites the "dormant" Ln^3+^ ions (nonluminance Ln^3+^ ions) on the surface of nanoparticles.^[@ref52]^ The silica-coated surface not only improves the colloidal stability and prevents nonspecific cell uptake but also enhances the UCL efficiency.^[@ref53]^ Despite recent success in Yb/Tm co-doped UCNPs NIR region (about 800 nm) emission bioimaging, in vivo imaging with red emission had no establish at low pumping power due to low red UC quantum efficiency. In this work, the influence of relative concentrations of the silica coated on Yb/Tm/GZO (UCNPs) was investigated. Compared to the tetraethyl orthosilicate (TEOS)-free sample, the UCL intensity of Yb/Tm/GZO\@SiO~2~ increased about 13 times compared to that of Yb/Tm/ZnO UCNPs. The red UC quantum efficiency of Yb/Tm/GZO\@SiO~2~ was as high as 1.0 ± 0.1% under excitation with a low power density of ∼0.3 W/cm^2^. The red UCL imaging of heart tissue treated with Yb/Tm/GZO\@SiO~2~ was achieved under 980 nm excitation. With the increase of the injection concentrations of Yb/Tm/GZO\@SiO~2~, red fluorescence imaging of heart tissue gradually increased. Moreover, we proved that Yb/Tm/GZO\@SiO~2~ had low toxicity in vitro and in vivo. Results and Discussion {#sec2} ====================== As shown in [Scheme [1](#sch1){ref-type="scheme"}](#sch1){ref-type="scheme"}, Yb/Tm/GZO\@SiO~2~ core/shell nanoparticles entered the cytoplasm via endocytosis. Upon 980 nm excitation, Yb^3+^/Tm^3+^ ions were excited and radiated UCL, realizing red (650 nm) light bioimaging. ![Schematic Representation of the Imaging Mechanism of the Live Cell with Injection of UCNPs](ao9b04381_0006){#sch1} Synthesis and Characterization {#sec2.1} ------------------------------ Yb/Tm/GZO UCNPs were synthesized by the hydrothermal method. Cit^3--^ served as a structure regulating the size and morphology of Yb/Tm/GZO UCNPs. [Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}A shows the scanning electron microscopy (SEM) images of Yb/Tm/GZO UCNPs. These Yb/Tm/GZO UCNPs exhibited structures of peony flowers and had good dispersibility. The silica coating on UCNPs can reduce the surface defects and improve the colloidal stability. Yb/Tm/GZO\@SiO~2~ was synthesized via the Stöber method with increasing tetraethyl orthosilicate (TEOS) concentrations from 0.36 to 0.90 mL ([Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}B). The transmission electron microscopy (TEM) images of Yb/Tm/GZO\@SiO~2~ with different TEOS concentrations are shown in [Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}C. With 0.36 mL of TEOS, core--shell structures were not completely obtained (see [Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}C1). With increasing TEOS concentrations, Yb/Tm/GZO\@SiO~2~ with core--shell structure was obtained, as demonstrated in [Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}C2--C3. The size was 63.27 ± 1.18 nm at 0.60 mL of TEOS, 12 nm larger than the core (see [Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}D). This result was obtained by measuring a total of 80 nanoparticles from four TEM images. With increasing TEOS up to 0.9 mL, obvious two cores were coated by the SiO~2~ shell ([Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}C4). These results indicate that the core--shell structure can be controlled in Yb/Tm/GZO\@SiO~2~ by varying the concentration of TEOS. ![(A) SEM and TEM characterization of Yb/Tm/GZO (Ga: 10 mol %, Yb: 7 mol %, Tm: 0.5 mol % mol %) UCNPs. (B) Synthesis process of the Yb/Tm/GZO\@SiO~2~ core/shell structure. (C) TEM images of Yb/Tm/GZO\@SiO~2~ with different contents of TEOS from 0.36 to 0.90 mL. (D) Size distribution of Yb/Tm/GZO\@SiO~2~ with 0.60 mL of TEOS by gauss fitting.](ao9b04381_0008){#fig1} Optical Properties {#sec2.2} ------------------ The X-ray diffraction (XRD) patterns of Yb/Tm/GZO and Yb/Tm/GZO\@SiO~2~ are shown in [Figure [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"}A. The diffraction peaks matched those of the hexagonal ZnO nanoparticles (JCPDs card no. 36-1541). The wide diffraction peaks due to amorphous SiO~2~ were not found, suggesting that the SiO~2~ coating showed no change in the phase of Yb/Tm/GZO UCNPs. To determine the successful preparation of the Yb/Tm/GZO\@SiO~2~ core--shell structure UCNPs, characteristic functional groups of Yb/Tm/GZO and Yb/Tm/GZO\@SiO~2~ were examined via Fourier transform infrared (FTIR) spectrometry. As shown in [Figure [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"}B, the bands at 496 and 1495 cm^--1^ were ascribed to the Zn--O and O--H bending in the spectra of both Yb/Tm/GZO and Yb/Tm/GZO\@SiO~2~, respectively. In the Yb/Tm/GZO\@SiO~2~ system, bands at 955 and 725 cm^--1^ were associated with the symmetric and asymmetric stretching vibrations of the Si--O--Si group, respectively. The bands at 2490 and 3490 cm^--1^ corresponded to the stretching vibrations of the Si--H and Si--O--H groups, respectively.^[@ref45]^ These results proved that SiO~2~ was successfully coated on UCNPs. Ultraviolet--visible (UV--vis) absorption spectra of Yb/Tm/GZO and Yb/Tm/GZO\@SiO~2~ were also recorded, as shown in [Figure [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"}C. Compared to the UV--vis absorption edge of Yb/Tm/GZO UCNP, the absorption band edge of Yb/Tm/GZO\@SiO~2~ showed a blue shift, indicating that the energy for the 2p orbital transition of O^2--^ ions increased. The SiO~2~ coating reduced the surface defect of Yb/Tm/GZO and thus bind free electrons transfer, which increased the energy absorbed for the electron transition in Yb/Tm/GZO\@SiO~2~. ![(A) X-ray diffraction spectra of Yb/Tm/GZO and Yb/Ym/GZO\@SiO~2~ nanoparticles. (B) FTIR spectra of Yb/Tm/GZO and Yb/Ym/GZO\@SiO~2~ nanoparticles. (C) Ultraviolet--visible (UV--vis) absorption spectra of Yb/Tm/GZO and Yb/Tm/GZO\@SiO~2~ nanoparticles. (D) Upconversion luminescence spectra of Yb/Tm/GZO\@SiO~2~ with different TEOS contents. (E) Decay lifetime for the 650 nm band for Yb/Tm/GZO\@SiO~2~ with different TEOS concentrations from 0 to 0.9 mL. (F) UCL intensities of Yb/Tm/GZO\@SiO~2~ (TEOS: 0.6 mL) with different assembly times from 0 to 25 days at room temperature; the inset shows the digital photographs of Yb/Tm/GZO\@SiO~2~ (TEOS: 0.6 mL) with different assembly times from 0 to 25 days.](ao9b04381_0004){#fig2} To verify the effect of SiO~2~ coating on UCL intensity, the UCL spectra of Yb/Tm/GZO\@SiO~2~ with different TEOS contents were recorded, as shown in [Figure [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"}D. In comparison to the TEOS-free sample, the blue and red UCL intensities had been significantly enhanced with increasing TEOS content. Particularly, when the content of TEOS was 0.60 mL, UCL intensities were about 13 times higher than that of Yb/Tm/GZO. The red upconversion absolute quantum yield (QY) of Yb/Tm/GZO\@SiO~2~ was obtained by the integrating sphere to be 1.0 ± 0.1% with 0.6 mL of TEOS. This high absolute QY for red upconversion emission was achieved at a low excitation density (0.3 W/cm^2^), indicating that Yb/Tm/GZO\@SiO~2~ UCNPs showed a great promising application in bioimaging. Moreover, with increasing TEOS concentration, the decay lifetimes of red UCL (650 nm) increased from 286 to 366 μs ([Figure [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"}E). With increasing TEOS content, surface defects of UCNPs decreased. Meanwhile, the linear relationship between surface vibrations and SA/Vol can be represented as quenchers (\[*Q*\]) ([eq [1](#eq1){ref-type="disp-formula"}](#eq1){ref-type="disp-formula"}).When the surface defects decreased, \[*Q*\] is significantly decreased. The decay lifetime was described using the Stern--Volmer ([eq [2](#eq2){ref-type="disp-formula"}](#eq2){ref-type="disp-formula"}).where τ is the decay lifetime with quenchers, τ~0~ is the observed decay lifetime without quenchers, *k*~q~ is the rate constant of the quencher, and τ~0~ represents an ideal condition and can be regarded as a constant. The positive proportion relationship between 1/τ and \[*Q*\] shows that \[*Q*\] decreased when the decay lifetime increased. A high decay lifetime can be achieved with increasing TEOS. In addition, considering that the SiO~2~ shell had an influence on the UCL intensity of UCNPs, the UCL properties of Yb/Tm/GZO\@SiO~2~ were investigated at different times from 0 to 25 days at room temperature. [Figure [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"}F shows that the UCL intensities of Yb/Tm/GZO\@SiO~2~ had no change with the extension of times, which indicated that the SiO~2~ shell greatly maintained the stability of core--shell nanoparticles. To validate that SiO~2~ coating had an effect on Yb/Tm/GZO UCL properties, the upconversion transfer mechanism of the Yb/Tm/GZO\@SiO~2~ core/shell system was determined. In [Figure [3](#fig3){ref-type="fig"}](#fig3){ref-type="fig"}C, the blue UCL can be ascribed to radiative energy transfer from the ^1^G~4~ to ^3^H~6~ state of the Tm^3+^ ion. The red UCL can be attributed to radiative energy transfer from the ^1^G~4~ to ^3^F~4~ state of the Tm^3+^ ion. To further confirm the photon excitation process of core--shell nanoparticles, the dependence of the UCL intensity of Yb/Tm/GZO\@SiO~2~ nanoparticles on the power density was examined. As shown in [Figure [3](#fig3){ref-type="fig"}](#fig3){ref-type="fig"}B, the slopes of UCL at wavelengths of 475 and 650 nm were 2.61 and 1.88, respectively. This was because the blue and red UCL emissions of Tm^3+^ were attributed to the three-photon process and two-photon process, respectively. Compared to the number of photons in Yb/Tm/GZO ([Figure S1](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b04381/suppl_file/ao9b04381_si_001.pdf)), the number of photons in Yb/Tm/GZO\@SiO~2~ decreased. Without SiO~2~ shell coating, Tm^3+^-ion-doped GZO can be excited to produce UCL emission, owing to the perturbation of the crystal field in the GZO system. Because of this, the boundary was weakly disturbed by the degenerate crystal field on the surface of GZO nanoparticles. The Tm^3+^ ions near and embedded in the surface layer of the GZO host did not produce UCL emission and are called dormant ions. SiO~2~ coating of Yb/Tm/GZO resulted in the interaction of the degenerated crystal field on the surface of GZO and the coordination field produced. These reduced the selection rule of radiative transitions of the dormant rare-earth ions (Yb^3+^/Tm^3+^). The dormant ions can be activated. The excited dormant ions were called the "activated" rare-earth ions. As shown in [Figure [3](#fig3){ref-type="fig"}](#fig3){ref-type="fig"}A, SiO~2~ coating on the surface of Yb/Tm/GZO reduced the selection rule of radiative transitions and the dormant Tm^3+^/Yb^3+^ ions became the new luminescence centers. Owing to the large specific surface of nanoparticles, a large number of new luminescent centers were formed on the surface of GZO nanoparticles. The UCL intensity of Yb/Tm/GZO\@SiO~2~ nanoparticles enhanced compared to that of Yb/Tm/GZO. The SiO~2~ shell coating not only improved the fluorescence stability of Yb/Tm/GZO but also enhanced the UCL intensity of Yb/Tm/GZO upconversion nanoparticles. ![(A) Scheme of the proposed nanostructure. (B) Corresponding log (UC intensity)--log (excitation power) curve of Yb/Tm/GZO\@SiO~2~ nanoparticles. (C) Proposed energy transfer mechanism of Yb/Tm/GZO\@SiO~2~ under 980 nm excitation.](ao9b04381_0001){#fig3} Biological Toxicity Properties {#sec3} ============================== Cytotoxicity Test of Yb/Tm/GZO\@SiO~2~ {#sec3.1} -------------------------------------- Yb/Tm/GZO\@SiO~2~ nanoparticles have potential applications in bioprobes due to their strong UCL and good biocompatibility. However, biotoxicity plays an important role in the development of nanocrystals for biological applications. Herein, the cytotoxicity of the Yb/Tm/GZO\@SiO~2~ core/shell UCNPs was measured. The human hepatic cell line 7702 is one of the most common human normal cell lines. The human hepatic tumor cell line HpG2 is one of the most representative human tumor cell systems. Therefore, a CCK8 assay with 7702 cells and HpG2 cells was used to investigate the cytotoxicity of Yb/Tm/GZO\@SiO~2~ nanoparticles ([Figure [4](#fig4){ref-type="fig"}](#fig4){ref-type="fig"}). The 7702 and HpG2 cell viability can be quantified using [eq [3](#eq3){ref-type="disp-formula"}](#eq3){ref-type="disp-formula"}.where *A*~s~ is the absorbance of test cells with Yb/Tm/GZO\@SiO~2~ nanocomposites, and *A*~b~ and *A*~c~ stand for the absorbance of control cells without (Yb/Tm/GZO\@SiO~2~) nanocomposites and the absorbance of blank samples containing the culture medium (without cells and (Yb/Tm/GZO\@SiO~2~)), respectively. As shown in [Figure [4](#fig4){ref-type="fig"}](#fig4){ref-type="fig"}A, the viability of 7702 cells showed no significant difference at different concentrations of 100--800 μg/mL Yb/Tm/GZO\@SiO~2~ for 24, 48, and 72 h. After incubating as high as 800 μg/mL of Yb/Tm/GZO\@SiO~2~ for 24 h, the cell viabilities were greater than 90.48%. The cell viabilities of 7702 cells kept 86.69%, despite the existence of a high concentration of 800 μg/mL and a long time of 72 h. As shown in [Figure [4](#fig4){ref-type="fig"}](#fig4){ref-type="fig"}B, the viability of HpG2 was 99.17% after treatment of 100 μg/mL of Yb/Tm/GZO\@SiO~2~ for 24 h. The cellular viabilities were estimated to be greater than 99.15% with a high dosage 800 μg/mL and 72 h. These results proved that the Yb/Tm/GZO\@SiO~2~ core/shell had low cytotoxicity, suggesting Yb/Tm/GZO\@SiO~2~ as a good bioimaging probe. ![(A) 7702 cell viability after incubating with different charged Yb/Tm/GZO\@SiO~2~ concentrations ranging from 100 to 800 μg/mL for 24, 48, and 72 h. (B) HpG2 cell viability after incubating with different charged Yb/Tm/GZO\@SiO~2~ concentrations ranging from 100 to 800 μg/mL for 24, 48, and 72 h.](ao9b04381_0005){#fig4} In Vivo Toxicity Test of Yb/Tm/GZO\@SiO~2~ {#sec3.2} ------------------------------------------ To further study the in vivo toxicity of Yb/Tm/GZO\@SiO~2~ nanoparticles, blood biochemical indexes were examined in Kunming mouse with injecting different doses of Yb/Tm/GZO\@SiO~2~ through the tail vein ([Figure [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"}). The levels of albumin (ALB), alkaline phosphatase (ALP), alanine aminotransferase (ALT), aspartate aminotransferase (AST), and cholesterol (CHOL) were related to the degree of liver cell damage, which was used as indicators to assess the function of the liver. Compared to that of control, the serum levels of ALB, ALP, ALT, AST, and CHOL had no significant change with increasing Yb/Tm/GZO\@SiO~2~ from 1 to 10 mg/kg ([Figure [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"}A--E) for 24 h and 7 days post-injection. The result of the serum aminotransferases (ALB, ALP, ALT, and AST) revealed that injection with Yb/Tm/GZO\@SiO~2~ nanoparticles had no obvious liver injury. As shown in [Figure [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"}H--J, the levels of serum creatinine (CRE), uric acid (UA), and urea (UREA) were further studied to identify nephrotoxicity after treating with 1--10 mg/kg Yb/Tm/GZO\@SiO~2~ for 24 h and 7 days. The results showed that Yb/Tm/GZO\@SiO~2~ had no effect on the levels of CRE, UA, or UREA in serum, indicating that injection with Yb/Tm/GZO\@SiO~2~ did not cause obvious damage to the nephro. In addition, the degree of creatine kinase (CK) was used to evaluate damage to the heart. As shown in [Figure [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"}F, even after 7 days of injection with Yb/Tm/GZO\@SiO~2~ at a concentration as high as 10 mg/kg, the levels of serum CK had no obvious change compared to the control group, suggesting that Yb/Tm/GZO\@SiO~2~ injection had no obvious damage to the heart. Meanwhile, the levels of serum total protein (TP) were similar for the mouse injected with Yb/Tm/GZO\@SiO~2~ and for the control mouse ([Figure [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"}G). It was proved that Yb/Tm/GZO\@SiO~2~ UCNPs had low toxicity in vivo, indicating their potential for biological applications. ![Serum levels after tail vein injection with Yb/Tm/GZO\@SiO~2~ with different concentrations (1--10 mg/kg) at 24 h and 7 days. (A) albumin (ALB); (B) alkaline phosphatase (ALP); (C) alanine transaminase (ALT); (D) aspartate aminotransferase (AST); (E) cholesterol (CHOL); (F) creatine kinase (CK); (G) total protein (TP); (H) creatinine (CRE); (I) uric acid (UA); (J) urea (UREA). Standard error of mean (SEM). Note: all data are presented as mean ± SEM (*n* = 8).](ao9b04381_0002){#fig5} To further determine the possible tissue toxicity, histological assessments of representative organs such as the heart, liver, kidney, and spleen were performed, as shown in [Table [1](#tbl1){ref-type="other"}](#tbl1){ref-type="other"}. Daily behavior of the Kuming mice, including drinking, eating, and activity, in the Yb/Tm/GZO\@SiO~2~-injected groups was identical to that in the control group. As shown in [Table [1](#tbl1){ref-type="other"}](#tbl1){ref-type="other"}, there was no significant effect on the coefficients of the liver, kidney, and spleen 24 h after injection of Yb/Tm/GZO\@SiO~2~ nanoparticles. Compared to the control groups (5.01 ± 0.87 mg/g), the coefficient of the heart was slightly increased (7.09 ± 0.21 mg/g) 24 h after the tail vein injection of 10 mg/kg Yb/Tm/GZO\@SiO~2~ nanoparticles but without statistical significance (^a^*p* \> 0.05). The coefficients of the heart, liver, kidney, and spleen had no apparent change after 7 days of injection with Yb/Tm/GZO\@SiO~2~ at all dosages (1--10 mg/kg). These results demonstrate that Yb/Tm/GZO\@SiO~2~ nanoparticles have low tissue toxicity and great potential applications for bioimaging. ###### Coefficients of Organs to Body Weight of Kuming Mice at 24 h and 7 days after Tail Vein Injection of Three Doses of Yb/Tm/GZO\@SiO~2~[a](#t1fn1){ref-type="table-fn"}   24 h after injection 7 days after injection --------- ---------------------- ------------------------ ------------- ------------- ------------- --------------- ------------- ------------- control 5.01 ± 0.87 57.95 ± 4.85 6.70 ± 1.31 5.61 ± 1.16 5.26 ± 0.58 76.88 ± 13.06 8.19 ± 0.36 5.46 ± 0.63 1 4.27 ± 0.21 58.14 ± 3.88 6.61 ± 0.66 4.79 ± 1.01 5.31 ± 0.58 64.26 ± 10.59 6.68 ± 0.85 4.14 ± 0.43 6 5.35 ± 0.09 55.91 ± 4.77 6.19 ± 0.73 4.28 ± 1.16 5.74 ± 1.32 69.28 ± 4.54 7.62 ± 1.31 3.76 ± 1.49 10 7.09 ± 0.21 55.33 ± 3.61 6.53 ± 0.86 3.29 ± 2.09 5.01 ± 1.22 61.68 ± 3.17 8.31 ± 0.55 3.87 ± 0.85 All data are presented as mean ± standard error of the mean (SEM). (*n* = 8); ^a^*p* \> 0.05 versus control according to ANOVA. From the analysis of tissue toxicity, we found that the coefficient of the heart was slightly increased. To assess the in vivo tissue imaging of Yb/Tm/GZO\@SiO~2~ nanoparticles, confocal imaging of heart tissue was studied, as shown in [Figure [6](#fig6){ref-type="fig"}](#fig6){ref-type="fig"}. The heart was dissected out and fresh-frozen in the optimal cutting temperature (OCT) embedding medium (Sakura Finetechnical Co., Tokyo, Japan) Sections of 10 μm were cut from frozen blocks at −20 °C. Confocal imaging was done using an OLYMPUS FV500 laser scanning confocal microscope, and their upconversion luminescence was captured by channels set at 640--660 nm for receiving red upconversion emission. [Figure [6](#fig6){ref-type="fig"}](#fig6){ref-type="fig"} shows the multiphoton confocal imaging of heart tissue treated with 1--10 mg/kg Yb/Tm/GZO\@SiO~2~ following excitation at 980 nm using a femtosecond pulsed laser. The 650 nm emission (red color) of Yb/Tm/GZO\@SiO~2~ under 980 nm excitation was detected. Furthermore, with increasing injection concentrations of Yb/Tm/GZO\@SiO~2~, remarkably enhanced bright red luminescence was achieved, demonstrating that Yb/Tm/GZO\@SiO~2~ can effectively improve heart tissue imaging. These results suggested that Yb/Tm/GZO\@SiO~2~ nanoparticles showed excellent ability in bioimaging applications. ![Confocal imaging (top) and bright-field (bottom) images of myocardial tissue following 24 h incubation with different Yb/Tm/GZO\@SiO~2~ contents. (a, d) 1 mg/kg, (b, e) 6 mg/kg, and (c, f) 10 mg/kg. The excitation at 980 nm was provided from a pulsed laser, and the red emission was captured by channel set at 640--660 nm (120 × 10 oil lens, scale bar = 50 μm).](ao9b04381_0003){#fig6} Conclusions {#sec4} =========== In summary, we demonstrated the effect of different TEOS concentrations on upconversion luminescence properties of Yb/Tm/GZO\@SiO~2~. With 0.6 mL of TEOS, the UCL intensity of Yb/Tm/GZO\@SiO~2~ enhanced about 13 times compared to that of Yb/Tm/GZO. SiO~2~ coating enhanced the UCL stability and biocompatibility of Yb/Tm/GZO, which achieved red light imaging of heart tissue in vivo. In addition, the red fluorescence imaging of heart tissue gradually brightened with increasing injection concentrations of Yb/Tm/GZO\@SiO~2~ from 1 to 10 mg/kg. In vitro toxicity results indicated that Yb/Tm/GZO\@SiO~2~ had no significant influence on the cellular viabilities of 7702 cells and HpG2 cells after 72 h incubation with Yb/Tm/GZO\@SiO~2~ (100--800 μg/mL). In vivo toxicity results indicated that injection with Yb/Tm/GZO\@SiO~2~ nanoparticles had no obvious liver and kidney injury. The histological assessments of representative organs suggested that injection of Yb/Tm/GZO\@SiO~2~ nanoparticles had no significant effect on the coefficients of the heart, liver, kidney, and spleen. These studies provided that Yb/Tm/GZO\@SiO~2~ nanoparticles have low biotoxicity and high-resolution red tissue imaging. Experimental Section {#sec5} ==================== Materials {#sec5.1} --------- All chemical materials, ytterbium nitrate pentahydrate (Yb(NO~3~)~3~·5H~2~O, 99.99%), thulium nitrate pentahydrate (Tm(NO~3~)~3~·5H~2~O, 99.99%), zinc nitrate hexahydrate (Zn(NO~3~)~2~·6H~2~O, 99.9%), gallium nitrate (Ga(NO~3~)~3~·*x*H~2~O, 99.99%), isopropyl alcohol, tetraethyl orthosilicate (TEOS), citric acid sodium, ammonia (NH~3~·H~2~O, 25%), and sodium hydroxide (NaOH) were used directly as received without further purification. Synthesis of Yb/Tm/GZO {#sec5.2} ---------------------- A hydrothermal method was followed: Zn(NO~3~)~2~·6H~2~O (0.5 mmol), deionized (DI, 10 mL) water, and Ga(NO~3~)~3~·*x*H~2~O (10 mol %) were dissolved by magnetic stirring for 30 min, and citric acid sodium was added to form a clarified liquid by magnetic stirring for 20 min. NaOH (2 mol/L, 10 mL) was added into the above clarified liquid to form a suspension solution by magnetic stirring for 30 min. Tm(NO~3~)~3~·5H~2~O (with 0.5 mol %, 5 mL) and Yb(NO~3~)~3~·5H~2~O (7 mol %, 5 mL) were added into the suspension solution by magnetic stirring for 60 min. Subsequently, the solution was transferred into a 50 mL hydrothermal reactor. The solution was heated to 150 °C for 24 h. The resultant solution was cooled down and cleaned by centrifuge at 3500 rpm for 15 min with copious amounts of ethanol and DI water. Yb/Tm/GZO was obtained by oven drying at 60 °C for 24 h. Synthesis of Yb/Tm/GZO\@SiO~2~ {#sec5.3} ------------------------------ Isopropyl alcohol (40 mL) was added to Yb/Tm/GZO (0.1713 g) by ultrasonication for 30 min to form a suspension solution. DI water (10 mL) was added into the mixture by magnetic stirring for 10 min. NH~3~·H~2~O (5 mL, 25%) was dropped into the suspension solution at 32 °C by magnetic stirring for 20 min. TEOS was dropped slowly into the above solution at 32 °C by magnetic stirring for 90 min. The amounts of TEOS were 0.36, 0.45, 0.60, and 0.90 mL, respectively. The resultant solution was cooled down to room temperature. The solution was washed six times with copious amounts of ethanol and DI water by centrifuge at 3500 rpm. The products were collected after oven drying at 80 °C for 24 h. Characterization {#sec5.4} ---------------- Powder X-ray diffraction (XRD) pattern measurements were performed with Cu Kα radiation (λ = 1.54 Å). Size and morphologies of UCNPs were determined at 15 kV using a focus voltage SU8000 scanning electron microscope (SEM) and at 200 kV using a focus voltage JEOL 2010F transmission electron microscope (TEM). The upconversion emission spectra of the nanoparticles were measured at 980 nm excitation. A signal generator was used to convert a continuous 980 nm excitation source to a pulse excitation source. The upconversion spectra of samples used 980 nm as the excitation source. The excitation density was 0.3 W/cm^2^. The excitation source was focused on the sample through a convex lens and became an upconversion luminous source. The source point was the sample output upconversion fluorescence. The upconversion fluorescence was absorbed by a photomultiplier tube through a set of lenses. The photomultiplier tube type was CR131, which could reach the test compensation of 1 nm, expand the light signal, and then pass through. When the receiver receives the signal and transmits the data to the connected computer, the upconversion fluorescence spectrum of a certain band would appear on the computer. The decay lifetime of the sample was obtained on a computer with a 980 nm laser, MD03024 Mixed Domain Oscilloscope. The excitation density was 0.3 W/cm^2^. The integrating sphere was used to obtain the QY of UCNPs. Cytotoxicity Assay {#sec5.5} ------------------ The normal human hepatic cell line (7702) and the human HpG2 were cultured in the RPMI 1640 medium containing 10% fetal bovine serum. The normal human hepatic cell line (7702) and the human HpG2 were cultured in RPMI 1640 (HyClone, Thermo Fisher, Beijing, China) medium containing 10% fetal bovine serum and 1% penicillin--streptomycin. Cells were maintained in a humidified incubator (Thermo Forma) containing 5% CO~2~ at 37°C, and all of the experiments were performed in a clean atmosphere. A CCK8 kit (Beyotime, Shanghai, China) was used for cell viability assay. A total of 5 × 10^3^ cells/well were seeded into 96-well plates and incubated at 37 °C for 24 h. Yb/Tm/GZO\@SiO~2~ in the RPMI 1640/DMEM medium was added at final concentrations of 100, 200, 400, 600, and 800 μg/mL. At the end of the fixed incubation period (24, 48, and 72 h), 10 μL of the CCK8 reagent was added to each well and incubated for 4 h at 37 °C. The absorbance was recorded using a pan-wavelength microplate reader at 450 nm (Synergy Mx; BioTek, Winooski, VT). Each experiment was performed in triplicate. The cell viability can be quantified using the following equation.where *A*~s~ is the absorbance of the test sample (test wells containing cells, culture medium, and samples), *A*~b~ is the absorbance of the control sample (control wells containing cells and culture medium without samples), and *A*~c~ is the absorbance of blank samples (blank wells containing the culture medium without cell and samples). In Vivo Toxicity and Imaging Studies {#sec5.6} ------------------------------------ All animal experiments and procedures were approved by the Animal Ethical and Experimental Committee of the Tianjin Medical University Metabolic Diseases Hospital. Five-week-old male Kunming mice (23--26 g) were purchased from the animal center of Military Medical Sciences Academy of the PLA (Permission no SCXK-(A) 2012-0004). All experimental mice were maintained in a 12 h light/12 h dark cycle at 22 °C and 55 ± 5% relative humidity in a standard laboratory room at Tianjin Medical University (Tianjin, China). The mice were provided rodent chow and water ad libitum. After a week of acclimation, the mice were randomly allocated into four groups (eight animals in each group): three sample groups (treated with final doses 1, 6, and 10 mg/kg of the Yb/Tm/GZO\@SiO~2~ body weight) and a vehicle group (treated with an equivalent volume of phosphate-buffered saline (PBS)). Yb/Tm/GZO\@SiO~2~ nanoparticles and PBS were injected via the tail vein. Eight mice from each group were weighed and sacrificed by CO~2~ asphyxiation after 24 h and 7 days. Serum samples were collected by centrifugation (3000*g*, 10 min). ALB, ALP, ALT, AST, CHOL, CK, TP, CRE, UA, and UREA were detected according to the kit's protocol (Roche, People's Republic of China). Liver, lung, spleen, kidney, and heart samples were collected and weighed. The heart was dissected out and fresh-frozen in the OCT embedding medium (Sakura Finetechnical Co, Tokyo, Japan). Sections of 10 μm were cut from frozen blocks at −20 °C, and confocal microscopy was used to observe the imaging of cardiac myocytes. Confocal imaging was done using an OLYMPUS FV500 laser scanning confocal microscope (120 × 10 oil lens), and their upconversion luminescence was captured by channels set at 640--660 nm for receiving red upconversion emission at 980 nm using a femtosecond pulsed laser under an excitation of 0.3 W/cm^2^. The Supporting Information is available free of charge at [https://pubs.acs.org/doi/10.1021/acsomega.9b04381](https://pubs.acs.org/doi/10.1021/acsomega.9b04381?goto=supporting-info).Log--log plots of the intensity versus input pump power for the blue UC and red UC emissions in Yb/Tm/GZO, and the blue and red UC luminescence mechanism of Yb/Tm/GZO nanocrystals under 980 nm excitations ([PDF](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b04381/suppl_file/ao9b04381_si_001.pdf)) Supplementary Material ====================== ###### ao9b04381_si_001.pdf The authors declare no competing financial interest. This work was financially supported by the Science & Technology Development Fund of Tianjin Education Commission for Higher Education (No. 2018KJ069) and Startup Funding of Scientific Research, Tianjin Medical University Metabolic Diseases Hospital and Tianjin Institute of Endocrinology (No. 2017DX07).
Prazosin and stress effect on tumoral growth of 7,12-dimethylbenz[A]anthracene-induced rat mammary tumors. Repeated isolation stress and prazosin effect were evaluated in 7,12-dimetylbenz[A]anthracene (DMBA) mammary tumors. Tumor volume was significantly lower in stressed than in control animals from 10 to 52 days considering day 1 the moment when tumors became palpable and treatment began. Control Prazosin (0.5 mg/kg) rats showed diminished tumor volume after 40 days. Stress Prazosin curve was similar to stress alone. The proportion of progressing tumors in control was significantly higher than in stressed groups, regardless of Prazosin administration. Body weight gain was similar in every group throughout the experiment. Behavioral studies were performed when stress effect was no longer evident. Grooming and the number of fecal boli were similar in all groups, as well as prolactin serum levels, suggesting that habituation took place. No significant differences were observed between groups for estrogen receptors. However, a greater concentration of progesterone receptors was found in Stressed rats, compared to all other groups. We conclude that the decrease of tumor volume provoked by stress could not be reversed by the alpha 1-adrenergic antagonist prazosin. Then, it appears that the main effect of stress is not mediated by the alpha 1-adrenergic receptors. Higher progesterone receptors in stressed rats could explain the differences observed.
RE: Introduce yourself here: Who are you? What do you do? What is your background? mlb, 35 year old male, father of 3 (all with my ex-wife). Fiscally conservative. Socially I think the gov't should stay out of our personal life. Cincinnati graduate, work as a network manager for a small gov't contractor. RE: Introduce yourself here: Who are you? What do you do? What is your background? Let's see.. "I'm me.. not me.. I'm me!" 44 years (45 next month).. Born in Iceland, raised as a kid primarily in Illinois and Mississippi to two military parents, father in the US Army and Navy. Mother in the British Army. Spent a year at Mississippi State before I realized I'd go broke before getting anything done (and realized just how cliquish certain universities are), so pulled 3 years at Junior College before finishing up with another 3 at USM with a degree in Computer Science with emphasis on Programming in '04. Married with no kids due to family medical issues, and liked the current company I've been working with for 19 years that when we up and relocated... I jumped at going with the company to Missouri with no qualms. Hobbies: I'm not much of a social person, so I don't go out and meet people much. I used to be a regular chess player (not so much anymore), Model Trains of HO Scale and Stamp Collecting. I'm a big fan of Sherlock Holmes, (I've got to make a trip to the St. Louis Science Center for their exhibition.), and I'm a huge fan of trivia games and shows (although I refuse to pay $150 bucks for a table at some of these trivia contests they have in St. Louis) For my "physical" hobbies, I go bowling as much as I can but i can never seem to break that 170 average I've been wanting. The one thing I joke about is about my family tree and the fact that I have one set of ancestors who show up in my family tree about 4 times, including in three entirely different generations (So they'd be great(x3) , Great(x4) and Great(x5)-grandparents all in one.) I'm a Constitutional conservative who believed that the "commerce clause amendment" was the worst decision the Supreme Court ever made, overriding the 10th amendment. And I personally think that comedians of today will NEVER (and I mean NEVER match up) to the comedy groups like Abbott & Costello, Laurel & Hardy, Danny Kaye, Dick Van Dyke, etc. I guess that's enough: Oh yeah, I believe Cats were spawned directly from the loins of Lucifer himself! RE: Introduce yourself here: Who are you? What do you do? What is your background? I'm HoD, a young attorney currently living in Montgomery Alabama. I'm from all over. I was born in Louisiana but grew up mostly in Africa and Europe with stints in Houston. My family is from Alabama so it is my only real home state. I have a degree from UA, Samford, and The University of Vienna. I am considering going back to school for an LLM from Trinity College in Dublin. I am involved primarily in international oil and gas as well as some government relations. I do a lot of work, or have worked, in Kurdistan, Equatorial Guinea, Gabon, Angola, South Sudan, Nigeria, Camaroon, Libya, and Kazakhstan. Politically, I'm what is called a Christian Democrat in Europe. I'm socially conservative but economically moderate to left. Introduce yourself here: Who are you? What do you do? What is your background? Name is dragonlair. Born in Dallas grew up in milton, ga college and football at UAB now live in nashville. Just a young buck a couple years out of college working my first job. Been married for nearly a year and my wife is due with our first kid in a couple days/weeks. I work as a salesman for a manufacturer and my territory is large so I get to travel to a bunch of place in the mid Atlantic states. I go to a lot of industrial places such as steel mills, chemical plant rendering plant. I know a lot of people don't like sales jobs but it is what I wanted to do. Very few jobs allow you to travel and meet a lot of good people and the money ain't half bad either. RE: Introduce yourself here: Who are you? What do you do? What is your background? I'm the youngest of 10 and spent most of my life in the far western burbs of Chicago. Got my Bachelors in Business (Operations Mgmt and Information Systems) from NIU and follow the football team closely, plus a few basketball games. Fiscally centrist I guess, and socially liberal. I'm an environmentalist at heart, but don't belong to any organizations like that. Most interest groups IMO make people lose perspective and make them less likely to see the forest for the trees (pun intended) and less likely to be able to listen to opposing arguments. I'm skeptical about economic theories. I grew up Catholic and see some sense in what I was taught about how to treat others but other than that I lean toward science now. I voted for the older Bush but have gone more Democrat lately. When not making inane posts on this board I work for an insurance company, mostly a job not a career but it pays reasonably well. I also worked for the VA for 5 years right out of college, plus a couple other jobs. For hobbies I love playing pool and can play for hours, also reading, astronomy, playing scrabble, and running. And of course, watching football, both my Huskies and Da Bears. RE: Introduce yourself here: Who are you? What do you do? What is your background? I'm David, 32 married with 1 son and another due in January. I was born in Montgomery, AL then moved to Opelika (right next to Auburn) when I was 12. Moved to Birmingham at 18 thanks to a full ride academic scholarship to UAB. I was either a student or employee at UAB for 12 years and picked up 4 degrees along the way. Currently I'm a nurse practitioner in Opelika. Moved back here 2 years ago to be closer to grandparents and to have a little more small town than Birmingham. I'm fiscally conservative and socially moderate with a large libertarian streak. I believe people should be held accountable for their actions, especially when it comes to health care and their spending priorities. RE: Introduce yourself here: Who are you? What do you do? What is your background? Born and raised in Alabama. Parents loved to travel, so travelled extensively (all stateside) growing up. Went to Rice on an NROTC scholarship. Played football and golf in HS, rugby and golf at Rice. Did 4 years active duty in the Navy, mostly brown water, 2 deployments to West Pac, 1 to the Med, rest divided between Mideast and South America. Played some more rugby with Royal Navy counterparts east of Suez. Back to Rice to get a Master's in Accounting, then on to U of Houston law school (on GI Bill, thank you taxpayers, you bought a lot of education for me). Stayed in naval reserves and retired as Commander (Lt Colonel for you army/air force types). Attorney/CPA, spent my career doing regulatory, environmental, and bankruptcy law; IT, financial, and strategy consulting; and mergers and acquisitions, mostly for clients in energy, government, banking/mortgage/real estate, and health care. Now semi-retired and teaching law at a university and coaching the women's rugby team. Between navy, oilpatch, and rugby, have travelled a lot. Been to every continent, 60+ countries, round the world several times, as far north as flying over the pole and as far south as the coast of Antarctica. Besides travel, other interests are sports and music. Political views are pragmatic libertarian. Friend and supporter of Ron and Rand Paul. Two of Ron's children and Rand's siblings (Ronnie and Joy) are part owners of businesses that were long time clients of mine. RE: Introduce yourself here: Who are you? What do you do? What is your background? I'm Murray007. The name comes from series of computer games that I loved as a young kid - the Monkey Island adventure games. I currently attend Old Dominion University and reside in Norfolk, VA. I come from a stereotypical family of four and I have one younger sibling. My family has moved all over the United States: we have lived in Texas, California, Kansas, Florida, and Virginia. Each place was a unique experience and I believe these experiences has made me a well-rounded person. Virginia has been an excellent place to live over the past 6 years as I graduated high school and then received a full-ride scholarship to attend ODU. I owe a lot to ODU for this great opportunity to graduate without any student debt. I have two majors here: history and mathematics. As far as teams go, I'll always follow the Monarchs and root for them. Also, I'm planning to attend graduate school at either the University of Wisconsin or the University of Minnesota. Some other details about me: I drive an old Corolla and do my own maintenance even on difficult repairs. I love to bike and hike. I'm planning to complete most of the AT in Virginia this next May (I've already completed Georgia and Tennessee/North Carolina) Political leanings: I'm a libertarian by nature with some social conservative leanings. I do love talking about politics but I'm mainly a lurker here. RE: Introduce yourself here: Who are you? What do you do? What is your background? Ole Blue here. Born and raised in the center of Tennessee in Music City. Didn't live anywhere else growing up but now I temporarily reside in Miami, since I go to the U of Miami and will graduate soon. Will probably go into government work after I finish up my schooling (political science), probably not going to go into anything too controversial though (sorry to disappoint ). Baptist since birth and I still practice privately fairly frequently though I don't go to church that much anymore since there are no good baptist churches in Miami that appeal to me. Politically: I am moderate and not too into political debate. Fiscally I am moderate to somewhat conservative. Socially I am more liberal (strongly pro-gay rights) but I am mostly pro-life (anti-abortion in most cases and anti-death penalty). I don't really like to identify with parties but the Republican Party of Tennessee is so far out there I hardly ever like any of their candidates. The Democratic Party is better but still not that good. I think I will try to steer clear of partisan politics in what I do for work.
Friday, September 14, 2012 Help democracy, earn money Wanna pitch in on the democratic process, and earn some cash in the process? If you aren't busy Tuesday, Nov. 6, the El Paso County Clerk and Recorder's office could use your help as an election judge. Today, the office announced that it's a few hundred short. What would you be doing, you ask? According to the press release: On Election Day, all Judges must be at their assigned polling place at 5:45 a.m. Polls are open 7:00 a.m. — 7:00 p.m. Judges remain at the polling place throughout the day, until all assignments are complete, which may be until 8:00 p.m. or later. Some responsibilities of Judges include: verifying the voter’s ID, demonstrating how to vote on the touch screen, and issuing provisional ballots. It's a long day, no doubt, but if you are interested in earning a cold $100, or just wanna ensure that the election goes off without a hitch, get in touch with the clerk's election staff by phone at 575-VOTE (8683) or online. Friday, September 14, 2012 — Colorado Springs, CO — Citizens are encouraged to become involved in the democratic process as our country prepares to elect a President, by working as an Election Judge for the General Election on November 6. The El Paso County Clerk & Recorder’s Office will hire over 1,200 Election Judges to work at the 111 polling places throughout the county. According to Colorado law, the selection of Election Judges began with sign-up sheets at the political party caucuses earlier this year. About 625 of the Judges needed were signed up through the caucus process; however, more are needed. Applications are being accepted now. For these Election jobs, the law dictates there must be a person of each major political party to ensure fairness and balance in the Election process. There is a greater need for people who are registered Democrats to fill vacant Election Judge positions at this time. There also are positions open for registered Republicans. To qualify for an Election Judge position, a citizen must be 18 years or older, registered to vote in El Paso County, have dependable transportation, and work any duty assigned. Election Judges receive $100 for working on Election Day, November 6. They also are required to attend a training session, for which they will be paid $40. On Election Day, all Judges must be at their assigned polling place at 5:45 a.m. Polls are open 7:00 a.m. — 7:00 p.m. Judges remain at the polling place throughout the day, until all assignments are complete, which may be until 8:00 p.m. or later. Some responsibilities of Judges include: verifying the voter’s ID, demonstrating how to vote on the touch screen, and issuing provisional ballots. High School students may apply for Student Judge positions and gain great experience during this exciting Presidential Election year. A Student Judge must be a U.S. citizen, 16 years of age or older and a Junior or Senior in a public or private school, or equivalent if home schooled. The rate of pay is the same as for all other Election Judges and they perform the same duties. Student Judges also must attend a training session prior to the Election, provide their own transportation to the polling place, and be absent from school on Election Day.
package dynamodb_test import ( "strconv" "github.com/goamz/goamz/dynamodb" . "gopkg.in/check.v1" ) type StreamSuite struct { TableDescriptionT dynamodb.TableDescriptionT DynamoDBTest } func (s *StreamSuite) SetUpSuite(c *C) { setUpAuth(c) s.DynamoDBTest.TableDescriptionT = s.TableDescriptionT s.server = &dynamodb.Server{dynamodb_auth, dynamodb_region} pk, err := s.TableDescriptionT.BuildPrimaryKey() if err != nil { c.Skip(err.Error()) } s.table = s.server.NewTable(s.TableDescriptionT.TableName, pk) // Cleanup s.TearDownSuite(c) _, err = s.server.CreateTable(s.TableDescriptionT) if err != nil { c.Fatal(err) } s.WaitUntilStatus(c, "ACTIVE") } var stream_suite_keys_only = &StreamSuite{ TableDescriptionT: dynamodb.TableDescriptionT{ TableName: "StreamTable", AttributeDefinitions: []dynamodb.AttributeDefinitionT{ dynamodb.AttributeDefinitionT{"TestHashKey", "S"}, dynamodb.AttributeDefinitionT{"TestRangeKey", "N"}, }, KeySchema: []dynamodb.KeySchemaT{ dynamodb.KeySchemaT{"TestHashKey", "HASH"}, dynamodb.KeySchemaT{"TestRangeKey", "RANGE"}, }, ProvisionedThroughput: dynamodb.ProvisionedThroughputT{ ReadCapacityUnits: 1, WriteCapacityUnits: 1, }, StreamSpecification: dynamodb.StreamSpecificationT{ StreamEnabled: true, StreamViewType: "KEYS_ONLY", }, }, } var stream_suite_new_image = &StreamSuite{ TableDescriptionT: dynamodb.TableDescriptionT{ TableName: "StreamTable", AttributeDefinitions: []dynamodb.AttributeDefinitionT{ dynamodb.AttributeDefinitionT{"TestHashKey", "S"}, dynamodb.AttributeDefinitionT{"TestRangeKey", "N"}, }, KeySchema: []dynamodb.KeySchemaT{ dynamodb.KeySchemaT{"TestHashKey", "HASH"}, dynamodb.KeySchemaT{"TestRangeKey", "RANGE"}, }, ProvisionedThroughput: dynamodb.ProvisionedThroughputT{ ReadCapacityUnits: 1, WriteCapacityUnits: 1, }, StreamSpecification: dynamodb.StreamSpecificationT{ StreamEnabled: true, StreamViewType: "NEW_IMAGE", }, }, } var _ = Suite(stream_suite_keys_only) var _ = Suite(stream_suite_new_image) func (s *StreamSuite) TestStream(c *C) { checkStream(s.table, c) } func checkStream(table *dynamodb.Table, c *C) { // list the table's streams streams, err := table.ListStreams("") if err != nil { c.Fatal(err) } c.Check(len(streams), Not(Equals), 0) c.Check(streams[0].TableName, Equals, table.Name) // stick a couple of items in the table attrs := []dynamodb.Attribute{ *dynamodb.NewStringAttribute("TestAttr", "0"), } if ok, err := table.PutItem("0", "0", attrs); !ok { c.Fatal(err) } attrs = []dynamodb.Attribute{ *dynamodb.NewStringAttribute("TestAttr", "1"), } if ok, err := table.PutItem("1", "1", attrs); !ok { c.Fatal(err) } // create a stream object stream := table.Server.NewStream(streams[0].StreamArn) // describe the steam desc, err := stream.DescribeStream("") if err != nil { c.Fatal(err) } tableDesc, err := table.DescribeTable() if err != nil { c.Fatal(err) } c.Check(desc.KeySchema[0], Equals, tableDesc.KeySchema[0]) c.Check(desc.StreamArn, Equals, streams[0].StreamArn) c.Check(desc.StreamStatus, Equals, "ENABLED") c.Check(desc.StreamViewType, Equals, tableDesc.StreamSpecification.StreamViewType) c.Check(desc.TableName, Equals, table.Name) c.Check(len(desc.Shards), Equals, 1) // get a shard iterator shardIt, err := stream.GetShardIterator(desc.Shards[0].ShardId, "TRIM_HORIZON", "") if err != nil { c.Fatal(err) } c.Check(len(shardIt), Not(Equals), 0) // poll for records nextIt, records, err := stream.GetRecords(shardIt) if err != nil { c.Fatal(err) } c.Check(len(nextIt), Not(Equals), 0) c.Check(len(records), Equals, 2) for index, record := range records { c.Check(record.EventSource, Equals, "aws:dynamodb") c.Check(record.EventName, Equals, "INSERT") c.Check(len(record.EventID), Not(Equals), 0) // look at the actual record streamRec := record.StreamRecord c.Check(streamRec.StreamViewType, Equals, desc.StreamViewType) c.Check(len(streamRec.SequenceNumber), Not(Equals), 0) if streamRec.SizeBytes <= 0 { c.Errorf("Expected greater-than-zero size, got: %d", streamRec.SizeBytes) } // check the keys if streamRec.StreamViewType == "KEYS_ONLY" { checkKeys(streamRec.Keys, index, c) } // check the image if streamRec.StreamViewType == "NEW_IMAGE" { checkNewImage(streamRec.NewImage, index, c) } } } func checkKeys(keys map[string]*dynamodb.Attribute, expect int, c *C) { c.Check(len(keys), Equals, 2) value, err := strconv.Atoi(keys["TestHashKey"].Value) if err != nil { c.Fatal(err) } c.Check(value, Equals, expect) value, err = strconv.Atoi(keys["TestRangeKey"].Value) if err != nil { c.Fatal(err) } c.Check(value, Equals, expect) } func checkNewImage(image map[string]*dynamodb.Attribute, expect int, c *C) { c.Check(len(image), Equals, 3) value, err := strconv.Atoi(image["TestHashKey"].Value) if err != nil { c.Fatal(err) } c.Check(value, Equals, expect) value, err = strconv.Atoi(image["TestRangeKey"].Value) if err != nil { c.Fatal(err) } c.Check(value, Equals, expect) value, err = strconv.Atoi(image["TestAttr"].Value) if err != nil { c.Fatal(err) } c.Check(value, Equals, expect) }
Spermatic-cord block improves analgesia for day-case testicular surgery. To assess whether the use of a spermatic-cord block contributes any additional analgesia to that of a conventional analgesic regimen in day-case testicular surgery. In a randomized, double-blind controlled study, 48 patients undergoing day-case testicular surgery received general anaesthesia together with fentanyl and diclofenac for analgesia. In addition, 22 of these patients received 10 mL of 0.5% plain bupivacaine into the spermatic cord at the conclusion of surgery. Visual-analogue pain scores were recorded for each group over the following 24 h. The visual-analogue pain scores were significantly lower in the immediate recovery period in patients receiving the spermatic-cord block. The spermatic-cord block reduced discomfort in the immediate post-operative period in patients undergoing testicular surgery and the procedure should be encouraged to improve the quality of post-operative pain management in such procedures.
Warme Warme (also: Warmebach) is a river of Hesse, Germany. It is approximately 33.1 km long. It flows into the Diemel near Liebenau. See also List of rivers of Hesse References Category:Rivers of Hesse Category:Rivers of Germany
var MainMenu = function(node) { // simply create all 'menuComponents' define below for (var i=0, il=sofia.menuComponents.length; i<il; i++) { var component = new window[sofia.menuComponents[i]](node); } var ext = { }; ext = $.extend(true, ext, EventEmitter); return ext; }; var MainMenuButton = function(node) { var body = $(document.body), win = $(window), container = $('.windows-container'), mainMenuLogo = $('<div id="app-logo"></div>') .appendTo(node), mainMenuButton = $('<div id="main-menu-button"></div>') .appendTo(node) .on('click', mainMenuClick), mainMenuDropDown = $('<div id="main-menu-dropdown">' + '<div class="main-menu-heading i18n" data-i18n="[html]menu.labels.addwindow">Add Window</div>' + '<div id="main-menu-windows-list" class="main-menu-list"></div>' + '<div class="main-menu-heading i18n" data-i18n="[html]menu.labels.options"></div>' + '<div id="main-menu-features" class="main-menu-list"></div>' + '</div>') .appendTo( body ) .hide(); function mainMenuClick(e) { if (mainMenuDropDown.is(':visible')) { hide(); } else { show(); } } function show() { mainMenuButton.addClass('active'); mainMenuDropDown.show(); ext.onshow(); } function hide() { mainMenuButton.removeClass('active'); mainMenuDropDown.hide(); ext.onhide(); } mainMenuDropDown.on('click', '.main-menu-item', function() { hide(); }); var ext = {}; ext = $.extend(true, ext, EventEmitter); ext = $.extend(true, ext, ClickOff); ext.clickoffid = 'version picker'; ext.on('offclick', function() { hide(); }); ext.setClickTargets([mainMenuButton, mainMenuDropDown]); return ext; } sofia.menuComponents.push('MainMenuButton');
Would children be adequately protected by existing intervention levels during a radionuclear emergency? The question arises as to whether radiation standards and guidelines set for adults are sufficiently protective of children. To answer this question, published literature values have been used to calculate radiation doses to children and adults from external and internal exposure to a suite of 30 radionuclides commonly found in the environment. It was found that older children and adults face about the same degree of risk from external radiation exposures, although doses may be ∼30 % elevated for infants due to their smaller body size. Inhalation risks in children are to a large degree offset by lower breathing rates and it is only in the case of iodine isotopes that children are more at risk. Ingestion of contaminated food products is more complex. Isotopes of iodine and the bone-seeking elements strontium and radium can give radiation doses up to an order of magnitude higher than for adults.
// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "base/debug/trace_event_win.h" #include "base/logging.h" #include "base/memory/singleton.h" #include <initguid.h> // NOLINT namespace base { namespace debug { using base::win::EtwEventType; using base::win::EtwMofEvent; // {3DADA31D-19EF-4dc1-B345-037927193422} const GUID kChromeTraceProviderName = { 0x3dada31d, 0x19ef, 0x4dc1, 0xb3, 0x45, 0x3, 0x79, 0x27, 0x19, 0x34, 0x22 }; // {B967AE67-BB22-49d7-9406-55D91EE1D560} const GUID kTraceEventClass32 = { 0xb967ae67, 0xbb22, 0x49d7, 0x94, 0x6, 0x55, 0xd9, 0x1e, 0xe1, 0xd5, 0x60 }; // {97BE602D-2930-4ac3-8046-B6763B631DFE} const GUID kTraceEventClass64 = { 0x97be602d, 0x2930, 0x4ac3, 0x80, 0x46, 0xb6, 0x76, 0x3b, 0x63, 0x1d, 0xfe}; TraceEventETWProvider::TraceEventETWProvider() : EtwTraceProvider(kChromeTraceProviderName) { Register(); } TraceEventETWProvider* TraceEventETWProvider::GetInstance() { return Singleton<TraceEventETWProvider, StaticMemorySingletonTraits<TraceEventETWProvider> >::get(); } bool TraceEventETWProvider::StartTracing() { return true; } void TraceEventETWProvider::TraceEvent(const char* name, size_t name_len, char type, const void* id, const char* extra, size_t extra_len) { // Make sure we don't touch NULL. if (name == NULL) name = ""; if (extra == NULL) extra = ""; EtwEventType etw_type = 0; switch (type) { case TRACE_EVENT_PHASE_BEGIN: etw_type = kTraceEventTypeBegin; break; case TRACE_EVENT_PHASE_END: etw_type = kTraceEventTypeEnd; break; case TRACE_EVENT_PHASE_INSTANT: etw_type = kTraceEventTypeInstant; break; default: NOTREACHED() << "Unknown event type"; etw_type = kTraceEventTypeInstant; break; } EtwMofEvent<5> event(kTraceEventClass32, etw_type, TRACE_LEVEL_INFORMATION); event.SetField(0, name_len + 1, name); event.SetField(1, sizeof(id), &id); event.SetField(2, extra_len + 1, extra); // See whether we're to capture a backtrace. void* backtrace[32]; if (enable_flags() & CAPTURE_STACK_TRACE) { DWORD hash = 0; DWORD depth = CaptureStackBackTrace(0, arraysize(backtrace), backtrace, &hash); event.SetField(3, sizeof(depth), &depth); event.SetField(4, sizeof(backtrace[0]) * depth, backtrace); } // Trace the event. Log(event.get()); } void TraceEventETWProvider::Trace(const char* name, size_t name_len, char type, const void* id, const char* extra, size_t extra_len) { TraceEventETWProvider* provider = TraceEventETWProvider::GetInstance(); if (provider && provider->IsTracing()) { // Compute the name & extra lengths if not supplied already. if (name_len == -1) name_len = (name == NULL) ? 0 : strlen(name); if (extra_len == -1) extra_len = (extra == NULL) ? 0 : strlen(extra); provider->TraceEvent(name, name_len, type, id, extra, extra_len); } } void TraceEventETWProvider::Resurrect() { StaticMemorySingletonTraits<TraceEventETWProvider>::Resurrect(); } } // namespace debug } // namespace base
AUGUSTA, Maine (AP) — The number of absentee ballots issued by the secretary of state's office for this election is going to be far fewer than four years ago. Spokeswoman Megan Sanborn says 188,180 ballots had been requested and more than 150,000 had been returned as of Thursday's deadline. No more absentee ballots can be issued barring special circumstances, but voters have until the close of polls on Tuesday to return previously issued ballots. Sanborn notes that the numbers are far less than in 2008, when about 32 percent of votes — or 238,940 of them — were cast via absentee ballots. Although the deadline has passed, an absentee ballot still may be requested if the voter completes a special circumstances application.
Skipping down the aisle at my local NYC Whole Foods market I cannot help but feel overwhelmed by the amount of marketing hyjinx that surround me left to right, toe to tip top of my head. Blue bunny's selling crackers, laughing cow's selling cheese, swimming ducks selling cookies and even a bright red Elmo character selling oatmeal. Is this what our food has evolved to? Have we forgotten the entire point of healthy eating? It's not about the "experience"--its about the food. Every box and bottle seems to be selling something other than the actual food: ENERGYHAPPINESSZENPURITYMENTAL POWER Vitamin Water sells everything from energy to relaxation to mental focus. So it makes me wonder--why even bother with "real food" when I can drink my happiness and eat it too! Kid and adult food packaging has gotten out of control. How will kids ever learn the true meaning of food if all they crave is the box with the seven foot yellow bird on it?? Can Kids Ever be Happy with SIMPLE HEALTHY FOOD? TRY THIS TEST: I dare you to do a marketing test on your own kids:Put in front of them several foods. One of which is in its original form and one of which is branded and marketed with characters, colors or toys. Try this:Gather, an apple-sliced by hand.A glass of milk or chocolate milk (soy, almond, dairy or rice milk).A glass of fresh squeezed orange juice.A hand made peanut butter and sandwich-using organic low in sugar ingredients.And a bowl of handmade trail mix--even with a few dark chocolate chips in it. Then on the other side of the table place a character-branded juice box.A character branded milk box (same flavor as used above.One of those welches kid-branded freezer section pb and j sandwiches (loaded in sugar)And a kid-branded granola bar--maybe even without any chocolate chips! ...Now let them choose! Free will! If your child chooses all the healthy non-branded items---bravo to you, lunch can be served! ...But if your kid is only human, and chooses the marketed, glittered and less-healthy options, you can continue the exercise with a taste test... Try a blind taste test of all the ingredients. Then ask your child which they preferred in taste. If they choose the healthy stuff-yay for pure young taste buds. But if they have a taste for the less healthy items, you've got a bit more work to do. Next, try explaining to your child which items are loaded with sugar and which items are healthy in vitamins and nutrients that will help them grow strong! Check out some of the FUN FOOD FACTS at the lUNCHBOX bUNCH WEBSITE. ONLINE HERE: http://www.lunchboxbunch.com/funfacts.html And next time you go to the store, spend a lot of time in the non-branded fruit and veggies sections--and try to spark some interest and curiosity in you child for healthier options. You can even print out a CIRCLE-IT GROCERY LIST featuring the Lunchbox Bunch characters.
Fructose-1,6-bisphosphate preserves intracellular glutathione and protects cortical neurons against oxidative stress. Fructose-1,6-bisphosphate (FBP), an endogenous intermediate of glycolysis, protects the brain against ischemia-reperfusion injury. The mechanisms of FBP protection after cerebral ischemia are not well understood. The current study was undertaken to determine whether FBP protects primary neurons against hypoxia and oxidative stress by preserving reduced glutathione (GSH). Cultures of pure cortical neurons were subjected to oxygen deprivation, a donor of nitric oxide and superoxide radicals (3-morpholinosydnonimine), an inhibitor of glutathione synthesis (L-buthionine-sulfoximine) or glutathione reductase (1,3-bis(2-chloroethyl)-1-nitrosourea) in the presence or absence of FBP (3.5 mM). Neuronal viability was determined using an 3-(4,5-dimethyl-2-thiazolyl)-2,5-diphenyl-2H-tetrazolium bromide assay. FBP protected neurons against hypoxia-reoxygenation and oxidative stress under conditions of compromised GSH metabolism. The efficacy of FBP depended on duration of hypoxia and was associated with higher intracellular GSH concentration, an effect partly mediated via increased glutathione reductase activity.
The Anatomy of Today’s Mobile App User Urban Airship Published on 4 Jun 2015 What makes the 2015 consumer tick? We’ll give you a hint: they behave very differently than the consumers of just a few years ago. If you thought you knew your mobile customer, think again. In our latest whitepaper, Anatomy of a Mobile App User, we dig deeper into data including demographics, behaviors, preferences, and how people use mobile apps differently in various industries. Here are some of the highlights More than 80% of customers prefer mobile apps to traditional websites People age 25 to 34 log more hours per month on mobile apps than younger users Between 75 to 87% of mobile apps are deleted within the first six months after download The whitepaper includes research from more than fifty current, third-party sources to give you the most well-rounded picture of your audience possible. The key takeaway from this whitepaper is that it’s not just mobile technology that’s making rapid strides forward. Consumers are adopting mobile apps faster than brands can adapt their mobile apps to meet these expectations. As a result, brands that stay on the cutting edge are those that continuously test, refine, and renovate what their mobile app offers to customers. Winning apps are never stagnant, and we see innovative features emerging to drive even greater expectations, with heavy use of beacon and geofence location technology enabling these innovators. So what’s different about customer expectations, actions and attitudes? Today’s users have a bigger phone with more screen area, and they are using it more often. New data shows that smartphone users age 18 and over spend 65% more time each month using apps than they did just two years ago. There are also big differences between male and female mobile users, which must shape the ways your brand addresses these distinct audiences for the best results. For example, although women spend more time using mobile web and apps, two-thirds of iOS travel app downloads in the last year were by men. Finally, customers are funneling more of their purchasing power through their mobile devices, especially when they want something immediately. For example, some travel apps have found that mobile transactions happen eight times faster when performed through the app versus the web or email. Want to know more? Dive into the whitepaper, a detailed 11-page study on the new mobile app user. You’ll find facts relevant to your industry, insights on how these stats should inform your mobile strategy, and infographics that paint a clearer picture of your evolving customer. Click here for the free download.
Q: Login Authentication Mechanism - Proper way for client to send username/password I am curious how to properly send username and password from a website login form to a server. If I just send the username and password without hashing them to an https server how exposed is the password I send in a POST request to somebody sniffing the package and finding out the password? The server is https enabled. What would be the proper methodology to do this? A: If the server is HTTPS enabled then any data going over the wire will be encrypted. It would be extraordinarily difficult for a network-only attacker to sniff even a plaintext password over HTTPS without one of the parties noticing. HTTPS uses SSL/TLS on the transport layer, which is designed to provide both encryption and authentication. The SSL/TLS protocol, as part of its handshake, negotiates a symmetric encryption key that is different for each session and is used with a strong algorithm to protect data on the wire. To mitigate 'man-in-the-middle' attacks, the asymmetric keys used by the client and server to establish a shared encryption key are also cryptographically signed by a certificate authority, both to provide assurance of trust and to prevent modification of the certificate. As long as the certificate authority can be trusted, it is easy to check the signature and and server name on the certificate itself. All modern browsers do this automatically and throw a warning to the user if there is any problem with the certificate. As long as you and your users are aware of the issues surrounding the proper use of SSL (e.g. keep your private key safe, and make sure your users pay attention to browser warning), it's fine to send plaintext passwords over an SSL connection. If the demands of your application are such that you cannot do even that, you might consider X.509 authentication (which uses certificates on the client side as well as the server side) or Kerberos authentication (which sends no passwords over the wire). For a basic web application, though, both of these solutions are overkill.
@startuml sprite $shower [48x48/16] {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} !define FA5_SHOWER(_alias) ENTITY(rectangle,black,shower,_alias,FA5 SHOWER) !define FA5_SHOWER(_alias, _label) ENTITY(rectangle,black,shower,_label, _alias,FA5 SHOWER) !define FA5_SHOWER(_alias, _label, _shape) ENTITY(_shape,black,shower,_label, _alias,FA5 SHOWER) !define FA5_SHOWER(_alias, _label, _shape, _color) ENTITY(_shape,_color,shower,_label, _alias,FA5 SHOWER) skinparam folderBackgroundColor<<FA5 SHOWER>> White @enduml