text
stringlengths
8
5.77M
ALLEN PARK -- The Lions are in the market for a new athletic trainer, and they already have a hire lined up. Kevin Bastin is stepping away from his role and the NFL as a whole later this month. He had served as the Lions’ head athletic trainer for five seasons, lasting the transition from general manager Martin Mayhew to Bob Quinn and from coach Jim Caldwell to Matt Patricia. The Lions will be replacing him with Dave Granito, who spent the past three seasons as the director of athletic training for Michigan football. “For five seasons, Kevin Bastin has been an invaluable asset to the Detroit Lions organization. His more than 30 years of athletic training experience, combined with his unwavering commitment to the health and safety of our players, made him an integral part of our football operation day in and day out," Quinn said in a statement. "The professionalism with which he led our athletic training staff is a testament to his high character. We fully support Kevin’s decision to pursue opportunities outside of the NFL and thank him for his countless contributions to our team.” Like many hires in the Quinn-Patricia regime, Granito comes with Patriots ties. He has worked for New England as well as the Giants in the NFL before transitioning to the college game. Now, he’s back in the pro ranks. Patricia has spoken of his team’s strength and conditioning as a staple of what he’s looking to build in Detroit. When he showed up last spring, he had players run wind sprints following offseason workouts, which they did not do under Caldwell. The team also practiced in the snow despite playing games indoors, and the Lions were known as one of the few teams to run fast-paced, live practices that attempted to emulate the speed of actual games. It’s an approach Patricia has adopted from his time in New England, and now, he has a former Patriots trainer to help him further implement it in Detroit.
1. Field of the Invention This invention relates to a wavelet inverse transform method and apparatus used in extracting and decoding only transform coefficients of a specified partial area from wavelet transform coefficients obtained on encoding by wavelet transform. This invention also relates to a corresponding wavelet decoding method and apparatus. 2. Description of Related Art Among conventional typical picture compression systems, there is a JPEG (Joint Photographic Experts Group) system, standardized by the ISO (International Organization for Standardization). This system, employing an orthogonal transform, specifically the discrete cosine transform (DCT), is known to furnish a good encoded or decoded picture when a higher number of allocated bits is used. However, if the number of encoding bits is decreased to more than a certain extent, block distortion proper to DCT becomes outstanding so that subjective deterioration is apparent. On the other hand, such a system in which an entire picture is split into plural bands by a filter, termed a filter bank, comprising the combination of a high-pass filter and a low-pass filter, and encoding is performed from one band to another, is now being researched briskly. In particular, the wavelet encoding free from the defect of block distortion, which becomes outstanding in high compression such as is presented in DCT, is thought to be promising as a technique which should take the place of the DCT. Nowadays, an electronic still camera or a video movie exploits the JPEG or MPEG, with the transform system being the DCT. Since a product based on the wavelet transform is predicted to be presented to the market in time to come, investigations in improving the efficiency in the encoding system are proceeding briskly in many research institutes. As a matter of fact, JPEG 2000, now being worked by ISO/IEC/JTC1_SC29/WG1, which is the same organization as the JPEG, as a format the recommendation for the standardization of which is scheduled to be issued in December 2000, is felt to be promising as the next-generation international standardization system for still pictures. With this JPEG 2000, it has almost been established to use the wavelet transform in place of the preexisting DCT of JPEG as a basic transformation system for picture compression. The present invention is directed to the elimination of the problem in expanding only a partial area in wavelet inverse transform. That is, the entire wavelet transform coefficients are not read out and decoded, as is done in the conventional technique. This represents a significant merit in reducing the memory capacity size. In the wavelet encoding, wavelet transform needs to be applied to the entire picture to store and hold the generated wavelet transform coefficients transiently in a memory. In wavelet decoding, the operation which is the reverse of the wavelet encoding operation is performed, thus necessitating an extremely large memory capacity for storing and holding the coefficients for the entire picture. Should the picture size be increased, the memory capacity needs to be correspondingly increased. Thus, the conventional practice is not desirable for a device having a limited memory capacity, such as an electronic still camera, camcorder or PDA. Recently, in e.g., the international standardization activities of JPEG 2000, such a technique is investigated in which the entire picture of an object of encoding is split into plural blocks to perform the encoding on the block basis. If the encoding by the encoder is done on the block bases from the outset, partial decoding can be achieved by reading out an encoded bitstream associated with a pre-set block. However, there lacks up to now a research into partial decoding in the absence of constraint on the encoder.
Related News/Archive Police are investigating the death of an 83-year-old man whose son found him unresponsive at his home Sunday morning. There was a strong smell of gas, and a gas burner for the stove was on, so the son turned it off and called 911, police said. Paramedics pronounced Robert Suiters dead at the scene, at 1431 Pine St. Police said it was not uncommon for Suiters to use his stove to heat his home, a practice firefighters said should never be done. The gas can produce a deadly buildup of carbon monoxide, an odorless, colorless gas that can cause sudden illness and death. COUNTYWIDE Elections leaders offer scholarships If you are majoring in political science, public administration or business administration, journalism or mass communications, you may be eligible for a scholarship. Pinellas County Supervisor of Elections Deborah Clark, along with the 66 other supervisors in the Florida State Association of Supervisors of Elections, will award three scholarships statewide this year valued at $1,200 each. Applicants must be registered voters who have lived in Florida at least two years and must be majoring in political science, public administration, business administration, journalism or mass communication at an accredited senior college or university. Other requirements are listed on the application and in the scholarship guidelines, which are available at www.votepinellas.com. Scholarship applications must be returned by March 20 to the Pinellas County Supervisor of Elections offices at 315 Court St., Room 117, Clearwater; 13001 Starkey Road, Largo; or 501 First Ave. N., St. Petersburg. For a mailed application or information, call the Pinellas County Supervisor of Elections Office at (727) 464-6108. TARPON SPRINGS Benefit features Broadway hits The best performers of the Tarpon Springs stage come back to sing Broadway hits and opera favorites for the Enchanted Evening of Stars Benefit at 7 p.m. Feb. 8 at the Tarpon Springs Performing Arts Center, 324 Pine St. Hear songs from The King and I, Fiddler on the Roof, Joseph, Oklahoma! and more. Proceeds benefit Tarpon Springs Performing Arts Center community theater programming. Tickets range from $15 to $30. For information, call (727) 942-5605 or visit www.tarponarts.org. Correction James Varkas, a 20-year Tarpon Springs resident featured in a Saturday story about the Wings of Freedom Tour, is 87. His age was incorrect in a photo caption.
Q: Upload and display image in Javaweb My Simple Website is using Spring MVC. The user uploads product images and thewebsite will display the image (with product name , price, etc..). The database only store the details of the image, and I store the image in a directory. The problem is, I am not sure where the image store should be. // Creating the directory to store file File dir = new File(imageDirectory); if (!dir.exists()) dir.mkdirs(); // Create the file on server File serverFile = new File(dir.getAbsolutePath() + File.separator + name); For example, when the value of variable imageDirectory is "\temp", my application will store the image in "D:\temp" and i don know how to get the image url to show on my website when the value of variable imageDirectory is "temp", my application store the image in "D:\soft\sts-bundle\sts-3.5.1.RELEASE\temp" and i dont know how to get the image url to show on my website So where i should store upload image in and how do I get the uploaded image url (stored in the database) ? A: In order to show your image to the end user, you must store it relative to your web app. The ideal approach for it will be to have a dedicated folder in your webapp for storing uplaods and then sending the relative url to that folder to the end user. E.g. //request is an instance of HttpServletRequest File uploadDirectory = new File(request.getSession().getServletContext().getRealPath("/uploads")); if (!uploadDirectory.exists()) { uploadDirectory.mkdirs(); } File reportFile = new File(reportDirectory.getAbsolutePath(), fileName); String requestUrl = request.getRequestURL().toString(); requestUrl = requestUrl.substring(0, requestUrl.lastIndexOf("/") + 1) + "uploads/" + fileName; return requestUrl;
Typically, a navigation device (be that an in-vehicle navigation device (i.e. a device built into a vehicle that cannot be removed from that vehicle), a PND such as a TomTom® Go 720, or a mobile telephone, personal digital assistant (PDA) or computer executing navigation software) is configured to display an image consisting of a map view generated from a digital map. The map view may be superposed with route information depicting a navigation route, and whilst the route information may be pre-recorded, but it is typically the result of a route-planning algorithm executed by the navigation device using suitable software. The navigation device may also include a position determining system (such as Global Positioning System (GPS)) for determining the current real-time position of the navigation device, and for dynamically adjusting the map view in accordance with the determined current position. A popular type of map view is a two-dimensional-based map view that includes information in two-dimensions at ground level. For example, roads and buildings are represented by the shape of their footprints on the ground. Such two-dimensional information may be viewed as a plan (i.e. looking generally vertically downwardly on the map, in the same manner as a traditional paper map), or in artificial perspective as if viewing a traditional flat paper map from a perspective angle. However, in either case, the map view is generally “flat” in the sense that the information is only two-dimensional ground level information. References hereafter to a two-dimensional plan view should be construed to include both of these types of map view. A further type of map view is a three-dimensional elevated perspective view, similar to an artificial perspective view but including three-dimensional rendering according to height information of map objects. For example, a building is rendered in three-dimensions according to height information for the building. In the context of in-vehicle use, it is generally desirable to provide a highly intuitive navigation display that (i) provides the driver with current navigation information, and (ii) provides an indication of the future route, so that driver can drive and position the vehicle appropriately. It has also been previously proposed to provide other information to the driver that could potentially be of use. For example, it has previously been proposed to display points of interest (such as banks, petrol stations or public facilities) that are on or close to the route, street names for roads on or close to the route, and icons representing the location of speed limit enforcement cameras that are on the chosen route. Whilst the provision of these additional items of information can often be of use to the driver, it is important that the driver is not overburdened with information so that the route becomes difficult to follow, or the map difficult to read, or the driver distracted by the amount of information displayed. This applies to both two-dimensional and three-dimensional map views, but is especially apparent in a three-dimensional perspective elevation, in which the map view contains additional detail in the form of three-dimensional shapes of map objects such as buildings. Clearly there is a fine balance to be drawn between providing the driver with information that might be of use and not overburdening the display image with information to such an extent that the driver's attention is distracted from safely operating the vehicle in which the PND is provided, and the present invention has been devised with the aim of addressing these contradictory issues.
Of the 1,109 people who completed the institute's online opinion survey, 91.7% of respondents agreed with the statement: "I believe mustaches are appropriate for the workplace." In addition, 75.27% think their workplace "benefits from the contributions of Mustached Americans"; 68.05% think "Mustached Americans are strong managers and business leaders"; and 81.75% of respondents picked "works hard" as a workplace behavior they associate with "people of Mustached American descent." Despite that apparently overwhelming endorsement of whiskers in the workplace, only 29.64% of respondents reported having an immediate supervisor who wears a beard or mustache, leading the institute to conclude, tongue very firmly in hairy cheek, that there is a secret 'stache bias afoot. “It’s encouraging to know that nine out of 10 Americans surveyed believe mustaches are appropriate for the workplace,” the institute noted in announcing its findings. “But it would appear there is a definitive ‘facial hair ceiling,’ if you will, presenting Mustached Americans with fewer opportunities for advancement and leadership than their clean-shaven counterparts.” The big non-mustachioed elephant in the room here of course is that the female of the species, while having made considerable strides in the workplace over the decades, still has little choice when it comes to cultivating a cookie-duster. By default, any woman in a supervisory capacity will appear to stack the deck. We're not going to split hairs though, but instead seize the opportunity, in the waning days of Movember, to make a suggestion. Mustachioed Movember men of middle management, instead of denuding your facial forest when the charity growing period ends Nov. 30, why not simply stoke that 'stache into a follicular flag of full facial-hair acceptance? Think of it as breaking -- make that parting -- the facial hair ceiling once and for all.
/*************************************************************************** * _ _ ____ _ * Project ___| | | | _ \| | * / __| | | | |_) | | * | (__| |_| | _ <| |___ * \___|\___/|_| \_\_____| * * Copyright (C) 2012 - 2016, Marc Hoersken, <info@marc-hoersken.de> * Copyright (C) 2012, Mark Salisbury, <mark.salisbury@hp.com> * Copyright (C) 2012 - 2018, Daniel Stenberg, <daniel@haxx.se>, et al. * * This software is licensed as described in the file COPYING, which * you should have received as part of this distribution. The terms * are also available at https://curl.haxx.se/docs/copyright.html. * * You may opt to use, copy, modify, merge, publish, distribute and/or sell * copies of the Software, and permit persons to whom the Software is * furnished to do so, under the terms of the COPYING file. * * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY * KIND, either express or implied. * ***************************************************************************/ /* * Source file for SChannel-specific certificate verification. This code should * only be invoked by code in schannel.c. */ #include "curl_setup.h" #ifdef USE_SCHANNEL #ifndef USE_WINDOWS_SSPI # error "Can't compile SCHANNEL support without SSPI." #endif #define EXPOSE_SCHANNEL_INTERNAL_STRUCTS #include "schannel.h" #ifdef HAS_MANUAL_VERIFY_API #include "vtls.h" #include "sendf.h" #include "strerror.h" #include "curl_multibyte.h" #include "curl_printf.h" #include "hostcheck.h" #include "system_win32.h" /* The last #include file should be: */ #include "curl_memory.h" #include "memdebug.h" #define BACKEND connssl->backend #define MAX_CAFILE_SIZE 1048576 /* 1 MiB */ #define BEGIN_CERT "-----BEGIN CERTIFICATE-----" #define END_CERT "\n-----END CERTIFICATE-----" typedef struct { DWORD cbSize; HCERTSTORE hRestrictedRoot; HCERTSTORE hRestrictedTrust; HCERTSTORE hRestrictedOther; DWORD cAdditionalStore; HCERTSTORE *rghAdditionalStore; DWORD dwFlags; DWORD dwUrlRetrievalTimeout; DWORD MaximumCachedCertificates; DWORD CycleDetectionModulus; HCERTSTORE hExclusiveRoot; HCERTSTORE hExclusiveTrustedPeople; } CERT_CHAIN_ENGINE_CONFIG_WIN7, *PCERT_CHAIN_ENGINE_CONFIG_WIN7; static int is_cr_or_lf(char c) { return c == '\r' || c == '\n'; } static CURLcode add_certs_to_store(HCERTSTORE trust_store, const char *ca_file, struct connectdata *conn) { CURLcode result; struct Curl_easy *data = conn->data; HANDLE ca_file_handle = INVALID_HANDLE_VALUE; LARGE_INTEGER file_size; char *ca_file_buffer = NULL; char *current_ca_file_ptr = NULL; const TCHAR *ca_file_tstr = NULL; size_t ca_file_bufsize = 0; DWORD total_bytes_read = 0; bool more_certs = 0; int num_certs = 0; size_t END_CERT_LEN; ca_file_tstr = Curl_convert_UTF8_to_tchar(ca_file); if(!ca_file_tstr) { failf(data, "schannel: invalid path name for CA file '%s': %s", ca_file, Curl_strerror(conn, GetLastError())); result = CURLE_SSL_CACERT_BADFILE; goto cleanup; } /* * Read the CA file completely into memory before parsing it. This * optimizes for the common case where the CA file will be relatively * small ( < 1 MiB ). */ ca_file_handle = CreateFile(ca_file_tstr, GENERIC_READ, 0, NULL, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL); if(ca_file_handle == INVALID_HANDLE_VALUE) { failf(data, "schannel: failed to open CA file '%s': %s", ca_file, Curl_strerror(conn, GetLastError())); result = CURLE_SSL_CACERT_BADFILE; goto cleanup; } if(!GetFileSizeEx(ca_file_handle, &file_size)) { failf(data, "schannel: failed to determine size of CA file '%s': %s", ca_file, Curl_strerror(conn, GetLastError())); result = CURLE_SSL_CACERT_BADFILE; goto cleanup; } if(file_size.QuadPart > MAX_CAFILE_SIZE) { failf(data, "schannel: CA file exceeds max size of %u bytes", MAX_CAFILE_SIZE); result = CURLE_OUT_OF_MEMORY; goto cleanup; } ca_file_bufsize = (size_t)file_size.QuadPart; ca_file_buffer = (char *)malloc(ca_file_bufsize + 1); if(!ca_file_buffer) { result = CURLE_OUT_OF_MEMORY; goto cleanup; } result = CURLE_OK; while(total_bytes_read < ca_file_bufsize) { DWORD bytes_to_read = (DWORD)(ca_file_bufsize - total_bytes_read); DWORD bytes_read = 0; if(!ReadFile(ca_file_handle, ca_file_buffer + total_bytes_read, bytes_to_read, &bytes_read, NULL)) { failf(data, "schannel: failed to read from CA file '%s': %s", ca_file, Curl_strerror(conn, GetLastError())); result = CURLE_SSL_CACERT_BADFILE; goto cleanup; } if(bytes_read == 0) { /* Premature EOF -- adjust the bufsize to the new value */ ca_file_bufsize = total_bytes_read; } else { total_bytes_read += bytes_read; } } /* Null terminate the buffer */ ca_file_buffer[ca_file_bufsize] = '\0'; if(result != CURLE_OK) { goto cleanup; } END_CERT_LEN = strlen(END_CERT); more_certs = 1; current_ca_file_ptr = ca_file_buffer; while(more_certs && *current_ca_file_ptr != '\0') { char *begin_cert_ptr = strstr(current_ca_file_ptr, BEGIN_CERT); if(!begin_cert_ptr || !is_cr_or_lf(begin_cert_ptr[strlen(BEGIN_CERT)])) { more_certs = 0; } else { char *end_cert_ptr = strstr(begin_cert_ptr, END_CERT); if(!end_cert_ptr) { failf(data, "schannel: CA file '%s' is not correctly formatted", ca_file); result = CURLE_SSL_CACERT_BADFILE; more_certs = 0; } else { CERT_BLOB cert_blob; CERT_CONTEXT *cert_context = NULL; BOOL add_cert_result = FALSE; DWORD actual_content_type = 0; DWORD cert_size = (DWORD) ((end_cert_ptr + END_CERT_LEN) - begin_cert_ptr); cert_blob.pbData = (BYTE *)begin_cert_ptr; cert_blob.cbData = cert_size; if(!CryptQueryObject(CERT_QUERY_OBJECT_BLOB, &cert_blob, CERT_QUERY_CONTENT_FLAG_CERT, CERT_QUERY_FORMAT_FLAG_ALL, 0, NULL, &actual_content_type, NULL, NULL, NULL, (const void **)&cert_context)) { failf(data, "schannel: failed to extract certificate from CA file " "'%s': %s", ca_file, Curl_strerror(conn, GetLastError())); result = CURLE_SSL_CACERT_BADFILE; more_certs = 0; } else { current_ca_file_ptr = begin_cert_ptr + cert_size; /* Sanity check that the cert_context object is the right type */ if(CERT_QUERY_CONTENT_CERT != actual_content_type) { failf(data, "schannel: unexpected content type '%d' when extracting " "certificate from CA file '%s'", actual_content_type, ca_file); result = CURLE_SSL_CACERT_BADFILE; more_certs = 0; } else { add_cert_result = CertAddCertificateContextToStore(trust_store, cert_context, CERT_STORE_ADD_ALWAYS, NULL); CertFreeCertificateContext(cert_context); if(!add_cert_result) { failf(data, "schannel: failed to add certificate from CA file '%s'" "to certificate store: %s", ca_file, Curl_strerror(conn, GetLastError())); result = CURLE_SSL_CACERT_BADFILE; more_certs = 0; } else { num_certs++; } } } } } } if(result == CURLE_OK) { if(!num_certs) { infof(data, "schannel: did not add any certificates from CA file '%s'\n", ca_file); } else { infof(data, "schannel: added %d certificate(s) from CA file '%s'\n", num_certs, ca_file); } } cleanup: if(ca_file_handle != INVALID_HANDLE_VALUE) { CloseHandle(ca_file_handle); } Curl_safefree(ca_file_buffer); Curl_unicodefree(ca_file_tstr); return result; } static CURLcode verify_host(struct Curl_easy *data, CERT_CONTEXT *pCertContextServer, const char * const conn_hostname) { CURLcode result = CURLE_PEER_FAILED_VERIFICATION; TCHAR *cert_hostname_buff = NULL; size_t cert_hostname_buff_index = 0; DWORD len = 0; DWORD actual_len = 0; /* CertGetNameString will provide the 8-bit character string without * any decoding */ DWORD name_flags = CERT_NAME_DISABLE_IE4_UTF8_FLAG; #ifdef CERT_NAME_SEARCH_ALL_NAMES_FLAG name_flags |= CERT_NAME_SEARCH_ALL_NAMES_FLAG; #endif /* Determine the size of the string needed for the cert hostname */ len = CertGetNameString(pCertContextServer, CERT_NAME_DNS_TYPE, name_flags, NULL, NULL, 0); if(len == 0) { failf(data, "schannel: CertGetNameString() returned no " "certificate name information"); result = CURLE_PEER_FAILED_VERIFICATION; goto cleanup; } /* CertGetNameString guarantees that the returned name will not contain * embedded null bytes. This appears to be undocumented behavior. */ cert_hostname_buff = (LPTSTR)malloc(len * sizeof(TCHAR)); actual_len = CertGetNameString(pCertContextServer, CERT_NAME_DNS_TYPE, name_flags, NULL, (LPTSTR) cert_hostname_buff, len); /* Sanity check */ if(actual_len != len) { failf(data, "schannel: CertGetNameString() returned certificate " "name information of unexpected size"); result = CURLE_PEER_FAILED_VERIFICATION; goto cleanup; } /* If HAVE_CERT_NAME_SEARCH_ALL_NAMES is available, the output * will contain all DNS names, where each name is null-terminated * and the last DNS name is double null-terminated. Due to this * encoding, use the length of the buffer to iterate over all names. */ result = CURLE_PEER_FAILED_VERIFICATION; while(cert_hostname_buff_index < len && cert_hostname_buff[cert_hostname_buff_index] != TEXT('\0') && result == CURLE_PEER_FAILED_VERIFICATION) { char *cert_hostname; /* Comparing the cert name and the connection hostname encoded as UTF-8 * is acceptable since both values are assumed to use ASCII * (or some equivalent) encoding */ cert_hostname = Curl_convert_tchar_to_UTF8( &cert_hostname_buff[cert_hostname_buff_index]); if(!cert_hostname) { result = CURLE_OUT_OF_MEMORY; } else { int match_result; match_result = Curl_cert_hostcheck(cert_hostname, conn_hostname); if(match_result == CURL_HOST_MATCH) { infof(data, "schannel: connection hostname (%s) validated " "against certificate name (%s)\n", conn_hostname, cert_hostname); result = CURLE_OK; } else { size_t cert_hostname_len; infof(data, "schannel: connection hostname (%s) did not match " "against certificate name (%s)\n", conn_hostname, cert_hostname); cert_hostname_len = _tcslen( &cert_hostname_buff[cert_hostname_buff_index]); /* Move on to next cert name */ cert_hostname_buff_index += cert_hostname_len + 1; result = CURLE_PEER_FAILED_VERIFICATION; } Curl_unicodefree(cert_hostname); } } if(result == CURLE_PEER_FAILED_VERIFICATION) { failf(data, "schannel: CertGetNameString() failed to match " "connection hostname (%s) against server certificate names", conn_hostname); } else if(result != CURLE_OK) failf(data, "schannel: server certificate name verification failed"); cleanup: Curl_unicodefree(cert_hostname_buff); return result; } CURLcode verify_certificate(struct connectdata *conn, int sockindex) { SECURITY_STATUS status; struct Curl_easy *data = conn->data; struct ssl_connect_data *connssl = &conn->ssl[sockindex]; CURLcode result = CURLE_OK; CERT_CONTEXT *pCertContextServer = NULL; const CERT_CHAIN_CONTEXT *pChainContext = NULL; HCERTCHAINENGINE cert_chain_engine = NULL; HCERTSTORE trust_store = NULL; const char * const conn_hostname = SSL_IS_PROXY() ? conn->http_proxy.host.name : conn->host.name; status = s_pSecFn->QueryContextAttributes(&BACKEND->ctxt->ctxt_handle, SECPKG_ATTR_REMOTE_CERT_CONTEXT, &pCertContextServer); if((status != SEC_E_OK) || (pCertContextServer == NULL)) { failf(data, "schannel: Failed to read remote certificate context: %s", Curl_sspi_strerror(conn, status)); result = CURLE_PEER_FAILED_VERIFICATION; } if(result == CURLE_OK && SSL_CONN_CONFIG(CAfile) && BACKEND->use_manual_cred_validation) { /* * Create a chain engine that uses the certificates in the CA file as * trusted certificates. This is only supported on Windows 7+. */ if(Curl_verify_windows_version(6, 1, PLATFORM_WINNT, VERSION_LESS_THAN)) { failf(data, "schannel: this version of Windows is too old to support " "certificate verification via CA bundle file."); result = CURLE_SSL_CACERT_BADFILE; } else { /* Open the certificate store */ trust_store = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, (HCRYPTPROV)NULL, CERT_STORE_CREATE_NEW_FLAG, NULL); if(!trust_store) { failf(data, "schannel: failed to create certificate store: %s", Curl_strerror(conn, GetLastError())); result = CURLE_SSL_CACERT_BADFILE; } else { result = add_certs_to_store(trust_store, SSL_CONN_CONFIG(CAfile), conn); } } if(result == CURLE_OK) { CERT_CHAIN_ENGINE_CONFIG_WIN7 engine_config; BOOL create_engine_result; memset(&engine_config, 0, sizeof(engine_config)); engine_config.cbSize = sizeof(engine_config); engine_config.hExclusiveRoot = trust_store; /* CertCreateCertificateChainEngine will check the expected size of the * CERT_CHAIN_ENGINE_CONFIG structure and fail if the specified size * does not match the expected size. When this occurs, it indicates that * CAINFO is not supported on the version of Windows in use. */ create_engine_result = CertCreateCertificateChainEngine( (CERT_CHAIN_ENGINE_CONFIG *)&engine_config, &cert_chain_engine); if(!create_engine_result) { failf(data, "schannel: failed to create certificate chain engine: %s", Curl_strerror(conn, GetLastError())); result = CURLE_SSL_CACERT_BADFILE; } } } if(result == CURLE_OK) { CERT_CHAIN_PARA ChainPara; memset(&ChainPara, 0, sizeof(ChainPara)); ChainPara.cbSize = sizeof(ChainPara); if(!CertGetCertificateChain(cert_chain_engine, pCertContextServer, NULL, pCertContextServer->hCertStore, &ChainPara, (data->set.ssl.no_revoke ? 0 : CERT_CHAIN_REVOCATION_CHECK_CHAIN), NULL, &pChainContext)) { failf(data, "schannel: CertGetCertificateChain failed: %s", Curl_sspi_strerror(conn, GetLastError())); pChainContext = NULL; result = CURLE_PEER_FAILED_VERIFICATION; } if(result == CURLE_OK) { CERT_SIMPLE_CHAIN *pSimpleChain = pChainContext->rgpChain[0]; DWORD dwTrustErrorMask = ~(DWORD)(CERT_TRUST_IS_NOT_TIME_NESTED); dwTrustErrorMask &= pSimpleChain->TrustStatus.dwErrorStatus; if(dwTrustErrorMask) { if(dwTrustErrorMask & CERT_TRUST_IS_REVOKED) failf(data, "schannel: CertGetCertificateChain trust error" " CERT_TRUST_IS_REVOKED"); else if(dwTrustErrorMask & CERT_TRUST_IS_PARTIAL_CHAIN) failf(data, "schannel: CertGetCertificateChain trust error" " CERT_TRUST_IS_PARTIAL_CHAIN"); else if(dwTrustErrorMask & CERT_TRUST_IS_UNTRUSTED_ROOT) failf(data, "schannel: CertGetCertificateChain trust error" " CERT_TRUST_IS_UNTRUSTED_ROOT"); else if(dwTrustErrorMask & CERT_TRUST_IS_NOT_TIME_VALID) failf(data, "schannel: CertGetCertificateChain trust error" " CERT_TRUST_IS_NOT_TIME_VALID"); else if(dwTrustErrorMask & CERT_TRUST_REVOCATION_STATUS_UNKNOWN) failf(data, "schannel: CertGetCertificateChain trust error" " CERT_TRUST_REVOCATION_STATUS_UNKNOWN"); else failf(data, "schannel: CertGetCertificateChain error mask: 0x%08x", dwTrustErrorMask); result = CURLE_PEER_FAILED_VERIFICATION; } } } if(result == CURLE_OK) { if(SSL_CONN_CONFIG(verifyhost)) { result = verify_host(conn->data, pCertContextServer, conn_hostname); } } if(cert_chain_engine) { CertFreeCertificateChainEngine(cert_chain_engine); } if(trust_store) { CertCloseStore(trust_store, 0); } if(pChainContext) CertFreeCertificateChain(pChainContext); if(pCertContextServer) CertFreeCertificateContext(pCertContextServer); return result; } #endif /* HAS_MANUAL_VERIFY_API */ #endif /* USE_SCHANNEL */
Q: Need to change the positioning of a series of elements on a page I have the 2 divs on a page which I need to animate up (a sliding panel effect). I have each element starting with a bottom position of 0. I need to have a link which causes the div to animate upward to bottom: 200px; Here is the HTML. <div class="slidePanelItem"> <a href="#slidePanelWrapper" class="slidePanelLink"><img src="/images/temp/gscookiesFPO.png" alt="gscookiesFPO" /></a> <div class="slidePanel"><img src="/images/temp/gscookiescontentFPO.gif" alt="gscookiescontentFPO"/></div> </div> <div class="slidePanelItem"> <a href="#slidePanelWrapper" class="slidePanelLink"><img src="/images/temp/gscookiesFPO.png" alt="gscookiesFPO" /></a> <div class="slidePanel"><img src="/images/temp/gscookiescontentFPO.gif" alt="gscookiescontentFPO"/></div> </div> Here is the jQuery I'm using: $(document).ready(function(){ $(".slidePanelItem").each(function(){ $(".slidePanelLink").click(function(){ if($('.slidePanelItem').hasClass("open")) $(this).find('.slidePanelItem').animate({bottom: "-150px"}, 1000).toggleClass("open"); else $(this).find('.slidePanelItem').animate({bottom: "0px"}, 1000).toggleClass("open"); }); }); }); I'm trying to target each div with a class of "slidePanelItem". When the link is clicked, I want to check to see if there is a class of "open" on .slidePanelItem. If there is not, the the div animates to show all the content, and the class .open is added. If there is a class of .open, then the div animates closed. I can't figure out how to get this working properly. Any help would be appreciated! A: try this.. $(document).ready(function () { $(".slidePanelItem .slidePanelLink").click(function () { var slidePanelItem = $(this).closest('.slidePanelItem'); if (slidePanelItem.is(".open")) { slidePanelItem.animate({ bottom: "-150px" }, 1000).toggleClass("open"); } else { slidePanelItem.animate({ bottom: "0px" }, 1000).toggleClass("open"); } }); }); or another way... $(document).ready(function () { $(".slidePanelItem .slidePanelLink").click(function () { $(this).closest('.slidePanelItem').animate({ bottom: (slidePanelItem.is(".open"))?"-150px":"0" }, 1000, function(){ $(this).toggleClass("open"); }); }); });
Everybody who has a cat, or knows someone who has a cat, has some version of "Cats Behaving Badly." Cats who pee around the house, cats who vomit anywhere and everywhere or cats who claw and scratch their way out of our hearts and perhaps our houses. But why do cats do that? Some say that's just cats being cats. Jackson Galaxy doesn't believe that. Galaxy has made a career out of being a cat "whisperer" and a cat "behaviorist." He's not really sure what to call his job, but he is sure he has a special connection to cats and can help humans and cats love more and claw less.
Q: Evaluate the integral: $\int_0^{\infty}\frac{\tan^{-1}(tx)}{x\left(1+x^2\right)} \mathrm{d}x$ I've been trying to evaluate the integral for a while now, and I've been unable to find it anywhere... I tried substituting $\tan^{-1}(tx)$ as $u$ but got nowhere... I have done dozens of other substitutions... I've been told to use the properties of gaussian integrals and the gamma function, but can't seem to figure out a way to bring in $\mathrm{e}$... A few hints that point in the right direction to think will really help! It would be really really helpful if you could solve this using only the properties of gaussian and gamma functions! A: Let: $$ I(t)=\int_0^\infty\frac{\arctan tx}{x(1+x^2)}dx. $$ Then $$ I'(t)=\int_0^\infty\frac{1}{(1+t^2x^2)(1+x^2)}dx= \frac1{t^2-1}\int_0^\infty\left[\frac{t^2}{1+t^2x^2}-\frac{1}{1+x^2}\right]dx\\ =\frac1{t^2-1} \left[t\arctan(tx)-\arctan x\right]_0^\infty=\frac\pi2\frac{|t|-1}{t^2-1}=\frac\pi2\frac1{|t|+1}. $$ Finally integrating the last expression over $t$ one obtains: $$ I(t)=I(0)+\frac\pi2\text {sgn}(t)\log(|t|+1)=\text {sgn}(t)\frac\pi2\log(|t|+1). $$ A: We can write $\arctan(tx)=\int_0^t \frac{x}{1+y^2x^2}\,dy$. Proceeding, we find that for $t>0$ $$\begin{align} \int_0^\infty \frac{\arctan(tx)}{x(1+x^2)}\,dx&=\int_0^\infty \frac{1}{1+x^2}\int_0^t \frac1{1+y^2x^2}\,dy\,dx\\\\ &\overbrace{=}^{\text{Fubini}}\int_0^t \int_0^\infty \frac{1}{(1+x^2)(1+y^2x^2)}\,dx\,dy\\\\ &=\int_0^t \frac{\pi/2}{y+1}\,dy\\\\ &=\frac\pi2 \log(1+t) \end{align}$$ Inasmuch as the integral of interest is an odd function of $t$, we have $$\int_0^\infty \frac{\arctan(tx)}{x(1+x^2)}\,dx=\begin{cases}\frac\pi 2\log(1+t)&, t>0\\\\0&,t=0\\\\-\frac\pi2 \log(1-t)&,t<0\end{cases}$$
 using System; using System.Linq; using System.Threading.Tasks; using Microsoft.IdentityModel.Clients.ActiveDirectory; using Android.App; using Xamarin.Forms; using XamarinCRM.Extensions; using XamarinCRMAndroid.Services; using XamarinCRM.Services; [assembly: Dependency(typeof(Authenticator))] namespace XamarinCRMAndroid.Services { public class Authenticator : IAuthenticator { public async Task<AuthenticationResult> Authenticate(string authority, string resource, string clientId, string returnUri) { var authContext = new AuthenticationContext(authority); if (authContext.TokenCache.ReadItems().Any()) authContext = new AuthenticationContext(authContext.TokenCache.ReadItems().First().Authority); var uri = new Uri(returnUri); var platformParams = new PlatformParameters((Activity)Forms.Context); var authResult = await authContext.AcquireTokenAsync(resource, clientId, uri, platformParams); return authResult; } public async Task<bool> DeAuthenticate(string authority) { try { var authContext = new AuthenticationContext(authority); await Task.Factory.StartNew(() => { authContext.TokenCache.Clear(); }); } catch (Exception ex) { ex.WriteFormattedMessageToDebugConsole(this); return false; } return true; } public async Task<string> FetchToken(string authority) { try { return (new AuthenticationContext(authority)) .TokenCache .ReadItems() .FirstOrDefault(x => x.Authority == authority).AccessToken; } catch (Exception ex) { ex.WriteFormattedMessageToDebugConsole(this); } return null; } } }
Between now and November, hundreds of millions of dollars in advertising will be spent telling us all the differences between President Barack Obama and his Republican challenger Mitt Romney. They will disagree on nearly every issue, but one area where they have found common ground is the need for more public charter schools. We feel the same way in the Georgia House of Representatives. While there are many issues that our constituents expect us to draw a hard line in the sand and oppose much of what the opposition party supports, education reform is frankly too important to let our differences in political parties get in the way. As the Republican Speaker Pro Tem and a leading Democratic voice on education, we are together asking voters to support the charter school amendment on the November ballot. The amendment does something very simple but very profound — it will allow the state to create a commission to hear appeals when charter applications are denied by some school boards and superintendents. Some school systems in Georgia have embraced the charter concept, while others have been more obstinate. Many are unfortunately worried more about who has the authority and power in education decision-making rather than what is best for our kids. True local control should begin with giving parents the option to make more decisions and to get more involved in their children’s education. Charter schools are public schools that are free from many of the onerous mandates that schools are under these days. They may separate boys and girls into different classes or schools, or have a more specific curriculum focus on science or math. They may be a virtual school with no building. These types of options are not right for every student, but for some they offer the kind of opportunity that can literally be life-changing. Some school systems are going to tell you that public charter schools take money away from other public schools, but that’s just simply not the case. Any school approved by the state charter commission will operate with no local contribution — only state funds will be available. Those local dollars are kept by the school systems and used as they see fit, actually increasing the amount of money per student enrolled they have to spend. We’ve tried the “one size fits all” approach to education for decades, and we’ve had too many students fall through the cracks. Let’s increase the educational options for parents, students and teachers by voting “Yes” for public charters on Nov. 6. Jan Jones is Speaker Pro Tem of the Georgia House of Representatives, and Alisha Thomas Morgan is a Democratic member of the Georgia House. *We welcome your comments on the stories and issues of the day and seek to provide a forum for the community to voice opinions. All comments are subject to moderator approval before being made visible on the website but are not edited. The use of profanity, obscene and vulgar language, hate speech, and racial slurs is strictly prohibited. Advertisements, promotions, spam, and links to outside websites will also be rejected. Please read our terms of service for full guides
Paraesthesia: .NET Development and Some Pictures of My Cat Loaner I’m about 100 pages from the end of The Bear and The Dragon, and let me tell you Tom Clancy fans out there - this is not the book to recommend to a Clancy newbie. It’s been the hardest read I’ve had in a long time, and not because of anything to do with the language. I mean, I like how Clancy pays attention to the political side of battle in his books because it adds a verisimilitude that other war novels don’t have. That said, this one was almost entirely political and I spent more time wondering when the SEAL team was going to show up than I did enjoying the heavy politics and behind-the-scenes. So, as some of you know, I have a pretty hefty CD and DVD collection at home. What can I say? I’m a media whore. Anyway, I normally don’t loan these things out because I typically have bad luck getting people to return things, much less return them in the pristine condition that I keep them in. See, when I borrow stuff, I return it within a week because I figure if I’m going to borrow anything I should probably get around to looking at it in a timely fashion and return it in a timely fashion as well. I went against my better judgment and brought a couple of movies in for some guys in my department to borrow. I figured I would get them all back in a week or thereabouts, pending on the schedules of the guys in question and when they would be able to check these things out. I was even out of town in training the following week (last week), so that’s a good two weeks to get things back to me. I got all but one of my movies back in my allotted “patience period.” I asked the guy who didn’t return my movie if I could get it back. “Oh, yeah, I’ll bring it tomorrow.” Monday arrived. Where’s my movie? “I was at a friend’s house all weekend.” And how, precisely, does that affect you returning my God damn movie? And now it’s today. I’ve been told the movie was once again forgotten at home but this time he’s going home at lunch to get it. Here’s hoping. Where am I going with this? Well, basically, my point is that I guess some people have a certain inherent level of responsibility and some folks don’t. Now, I’m not at all saying this guy is irresponsible, just that some people don’t “forget it at home.” He’s a younger guy, and what I begin to wonder is if all young people today are the same way, where certain levels of responsibility (or respect?) don’t exist (or don’t matter?), whereas my generation has a more inherent sense of such things. Then I wonder whether it isn’t the same way between my parents’ generation and mine - do they think we lack responsibility and/or discipline? Probably so. And that sort of worries me, because if the trend continues then what I see on the horizon is anarchy rather than salvation. Maybe too much freedom and not enough discipline is not necessarily the best way to bring kids up. Or maybe I’m extrapolating too much from a single isolated case. Finally, I got a message a bit ago from the guy in charge of YouBored.com, a site where I have entered contests before and won free movie passes. Remember my Malibu incident? Well, they’ve since updated the look, feel, and quality of their site and they seem interested in enhancing that quality further by recruiting yours truly to become a volunteer staff writer. I’m waiting to hear back on the details, but it could be a cool thing. I’ll keep you posted.
VERY IMPORTANT MESSAGE TO READ FOR US IMMIGRANTS. —————————— If anyone you know is coming into this country, tell them not to sign this – this form strips you of your residency. People might get bullied into signing this. It seems right now that customs agents are looking at green card holders on a case by case basis – so make sure you or someone you know doesn’t sign this. In general, even if you’re not from the affected countries, don’t sign this if they give it to you. Related to American Citizens who are Muslims they are also questioning Muslims who are returning from outside the US, please listen to this audio clip and know your rights. 3 thoughts on “Islamophobia Trump’s Ban on Muslims entering the US and targeting of all Muslims in the US Citizen and non Citizen (Green Card holders/Visa)” Below is the message that is being circulated by lawyers: From: Suishta Saigal Sent: Monday, January 30, 2017 12:50 PM Subject: DO NOT TRAVEL – ANYWHERE IN 2017 Employers – please disseminate to all your employees immediately. Our Legal advice is that NO ONE should travel – anywhere – neither international nor domestic. The current administration is issuing Executive Order’s on immigration without advance notice and with immediate effect thereby trapping and likely to trap thousands of travelers and/or rending families apart. While the legal system tries to sort this out – you/your families may already be negatively impacted and trying to undo the harm is going to be a much longer and difficult battle than trying to avoid becoming the story. THIS APPLIES TO EVERYONE not just those from the 7 list of countries banned for “now. EVERYONE: CBP is asking to review social media – scrub your phones, empty caches, delete posts from ALL social media – fb, snapchat, instagrams, twitter etc. Any and every account. Disable fingerprint unlock of your phones while traveling. If asked your opinion about Trump or love of country – be creative in your positive responses. U.S. Citizens: Only US Citizen’s have the legal right to DENY access to social media to anyone absent a warrant or Court Order. If US citizen and a non-white – if they ask to take your passport – ask to see a Judge – your citizenship cannot be revoked absent a judicial determination. If they take your passport – ask for the receipt of same and grounds for such “confiscation”. Be polite but firm. Do NOT sign I-407 – no matter what the pressure. I-407 means you are voluntarily renouncing your Green Card and thereby likely will be denied entry. A GC thus renounced CANNOT be re-instated. You will have to go through the whole long process that was undertaken earlier to get GC back and by then who knows what policies come into play – whether they will indeed approve issuance of such GC’s in the future. You may be asked to prove “ties” to the US – to prove you did not abandon residence in U.S. This means work, family, property, etc. Ask to speak to a lawyer – firmly and politely. If they refuse ask for a NTA (Notice to Appear). If the CBP Officers continue to detain you – ask for a hearing before an Immigration Judge. If the GC is confiscated, ask to be provided with alternative evidence of their LPR status, such as an I-94 and/or passport stamp that says “Evidence of Temporary Residence.” – You are ENTITLED to this. Currently CBP’s position is that GC holder is NOT entitled to admission to the US on each entry – it will be a case by case determination. This is probably going to lead to more restrictive admissions. Visa Holders: No matter what visa you hold, H, L, J, F , B etc. you are the MOST vulnerable. You should absolutely NOT travel neither domestically nor internationally for the rest of 2017 till the dust settles and we can better determine what policies will continue to be implemented. Visas are being canceled on arrival and people are being then being banned for 5 years on grounds that they attempted to enter on cancelled visas. This is happening to people NOT on the list of the 7 countries. 1. Just because you have a US citizen child – you will NOT be allowed Entry should CBP decide to Deny entry. US citizen children were being detained over this weekend. 2. People with GC’s NOT on the list of these 7 countries – have had their GC’s taken away. 3. Privacy rules for EVERYBODY – but US Citizens have been removed – thus you cannot Deny access to your social media accounts. An Officer can pretty much deem ANYTHING as grounds to deny entry. In fact CBP Officials have REFUSED to follow the Court Orders issued this past weekend and deported people without allowing them access to lawyers or Senators/Congressman. That means you will have almost little or no recourse if you are detained/deported on attempted Entry. If they ban you for 5 years – those bans will be almost impossible to overcome in the near future. 4. CG holders and citizen’s traveling DOMESTICALLY have also been stopped, questioned and detained. Thus, our recommendation is to STOP ALL AIR TRAVEL. The next 6 months or longer are going to be extremely rocky for everyone who is “brown” irrespective of country of nationality/religion/ethnicity. TODAY’S UPDATE FROM DHS: In the first 30 days, DHS will perform a global country-by-country review of the information each country provides when their citizens apply for a U.S. visa or immigration benefit. Countries will then have 60 days to comply with any requests from the U.S. government to update or improve the quality of the information they provide.” This means there is absolutely no certainty of anyone being allowed back in should they travel. Nor is there any certainty as to what other EO’s may come out – except that they are likely to be RESTRICTIVE. If you have any upcoming travel plans – CANCEL them. This is going to get worse – not better in the coming months. The unanimous ruling from a three-judge panel means that citizens of seven majority-Muslim countries will continue to be able to travel to the US, despite Trump’s executive order last month. “On the one hand, the public has a powerful interest in national security and in the ability of an elected president to enact policies,” the judges wrote. “And on the other, the public also has an interest in free flow of travel, in avoiding separation of families, and in freedom from discrimination. We need not characterize the public interest more definitely than this… The emergency motion for a stay pending appeal is denied.” It is a significant political setback to Trump’s new administration and raises questions about how the courts will view his apparent vision for an expansive use of executive power from the Oval Office on which he is anchoring the early weeks of his presidency. Trump immediately tweeted his reaction to the ruling: “SEE YOU IN COURT, THE SECURITY OF OUR NATION IS AT STAKE!” Follow Donald J. Trump ✔ @realDonaldTrump SEE YOU IN COURT, THE SECURITY OF OUR NATION IS AT STAKE! 6:35 PM – 9 Feb 2017 14,011 14,011 Retweets 35,663 35,663 likes The Justice Department is reviewing the decision, it said in a statement. The order bars citizens of Iraq, Syria, Iran, Libya, Somalia, Sudan and Yemen from entering the US for 90 days, all refugees for 120 days and indefinitely halts refugees from Syria. Trump issued the travel ban January 27, causing chaos, confusion and protests at international airports as the legal status of people in transition was suddenly thrown into question. Lawsuits have been filed across the country, but it was one from federal Judge James Robart in Seattle last Friday that blocked the travel ban nationwide, clearing the way for resumed travel from the seven countries. The legal drama over the immigration executive order was the first episode in what could be a series of legal challenges to Trump’s governing style and agenda and represents the first confrontation between his White House and the checks and balances of the American political system. “The Trump administration has lost dramatically and completely, and they’re going to have to decide what to do next,” said Jeffery Toobin, a CNN political analyst, on “The Situation Room.” “This decision will have a lot more public credibility because it is unanimous, and I think it complicates the Trump administration’s attempt, if they choose to make it, to disparage this decision as a political act.” February 17, 2017 Kevin McAleenan Acting Commissioner U.S. Customs and Border Protection Thomas D. Homan Acting Director Secretwy U.S. Department of Homeland Security Washington, DC 20528 Homeland Security U.S. Immigration and Customs Enforcement Lori Scialabba Acting Director U.S. Citizenship and Immigration Services Joseph B. Maher Acting General Counsel Dimple Shah Acting Assistant Secretary for International Affairs Chip Fulghum Acting Undersecretary for Management John Kelly Secretary ~,r\~ ( Enforcement of th Interest migration Laws to Serve the National This memorandum implements the Executive Order entitled “Enhancing Public Safety in the Interior of the United States,” issued by the President on January 25, 2017. It constitutes guidance for all Department personnel regarding the enforcement of the immigration laws of the United States, and is applicable to the activities of U.S. Immigration and Customs Enforcement (ICE), U.S. Customs and Border Protection (CBP), and U.S. Citizenship and Immigration Services (USCIS). As such, it should inform enforcement and removal activities, detention decisions, administrative litigation, budget requests and execution, and strategic planning.http://www.dhs.gov With the exception of the June 15, 2012, memorandum entitled “Exercising Prosecutorial Discretion with Respect to Individuals Who Came to the United States as Children,” and the November 20, 2014 memorandum entitled “Exercising Prosecutorial Discretion with Respect to Individuals Who Came to the United States as Children and with Respect to Certain Individuals Who Are the Parents of U.S. Citizens or Permanent Residents,” 1 all existing conflicting directives, memoranda, or field guidance regarding the enforcement of our immigration laws and priorities for removal are hereby immediately rescinded; including, but not limited to, the November 20, 2014, memoranda entitled “Policies for the Apprehension, Detention and Removal of Undocumented Immigrants,” and “Secure Communities.” A. The Department’s Enforcement Priorities Congress has defined the Department’s role and responsibilities regarding the enforcement of the immigration laws of the United States. Effective immediately, and consistent with Article II, Section 3 of the United States Constitution and Section 333 I of Title 5, United States Code, Department personnel shall faithfully execute the immigration laws of the United States against all removable aliens. The Department no longer will exempt classes or categories of removable aliens from potential enforcement. In faithfully executing the immigration laws, Department personnel should take enforcement actions in accordance with applicable law. In order to achieve this goal, as noted below, I have directed ICE to hire I 0,000 officers and agents expeditiously, and to take enforcement actions consistent with available resources. However, in order to maximize the benefit to public safety, to stem unlawful migration and to prevent fraud and misrepresentation, Department personnel should prioritize for removal those aliens described by Congress in Sections 212(a)(2), (a)(3), and (a)(6)(C), 235(b) and (c), and 237(a)(2) and (4) of the Immigration and Nationality Act (INA). Additionally, regardless of the basis ofremovability, Department personnel should prioritize removable aliens who: (1) have been convicted of any criminal offense; (2) have been charged with any criminal offense that has not been resolved; (3) have committed acts which constitute a chargeable criminal offense; ( 4) have engaged in fraud or willful misrepresentation in connection with any official matter before a governmental agency; (5) have abused any program related to receipt of public benefits; (6) are subject to a final order ofremoval but have not complied with their legal obligation to depart the United States; or (7) in the judgment of an immigration officer, otherwise pose a risk to public safety or national security. B. Strengthening Programs to Facilitate the Efficient and Faithful Execution of the Immigration Laws of the United States Facilitating the efficient and faithful execution of the immigration laws of the United 1 The November 20, 2014, memorandum will be addressed in future guidance. 2 States- and prioritizing the Department’s resources~requires the use of all available systems and enforcement tools by Department personnel. Through passage of the immigration laws, Congress established a comprehensive statutory regime to remove aliens expeditiously from the United States in accordance with all applicable due process of law. I determine that the faithful execution of our immigration laws is best achieved by using all these statutory authorities to the greatest extent possible. Accordingly, Department personnel shall make full use of these authorities. Criminal aliens have demonstrated their disregard for the rule of law and pose a threat to persons residing in the United States. As such, criminal aliens are a priority for removal. The Priority Enforcement Program failed to achieve its stated objectives, added an unnecessary layer of uncertainty for the Department’s personnel, and hampered the Department’s enforcement of the immigration laws in the interior of the United States. Effective immediately, the Priority Enforcement Program is terminated and Secure Communities shall be restored. To protect our communities and better facilitate the identification, detention, and removal of criminal aliens within constitutional and statutory parameters, the Department shall eliminate the existing Forms I-247D, I-247N, and I-247X, and replace them with a new form to more effectively communicate with recipient law enforcement agencies. However, until such forms are updated they may be used as an interim measure to ensure that detainers may still be issued, as appropriate. ICE’s Criminal Alien Program is an effective tool to facilitate the removal of criminal aliens from the United States, while also protecting our communities and conserving the Department’s detention resources. Accordingly, ICE should devote available resources to expanding the use of the Criminal Alien Program in any willing jurisdiction in the United States. To the maximum extent possible, in coordination with the Executive Office for Immigration Review (EOIR), removal proceedings shall be initiated against aliens incarcerated in federal, state, and local correctional facilities under the Institutional Hearing and Removal Program pursuant to section 238(a) of the INA, and administrative removal processes, such as those under section 238(b) of the INA, shall be used in all eligible cases. The INA § 287(g) Program has been a highly successful force multiplier that allows a qualified state or local law enforcement officer to be designated as an “immigration officer” for purposes of enforcing federal immigration law. Such officers have the authority to perform all law enforcement functions specified in section 287(a) of the INA, including the authority to investigate, identify, apprehend, arrest, detain, and conduct searches authorized under the INA, under the direction and supervision of the Department. There are currently 32 law enforcement agencies in 16 states participating in the 287(g) Program. In previous years, there were significantly more law enforcement agencies participating in the 287(g) Program. To the greatest extent practicable, the Director of ICE and Commissioner of CBP shall expand the 287(g) Program to include all qualified law enforcement agencies that request to participate and meet all program requirements. In furtherance of this direction, the Commissioner of CBP is authorized, in addition to the Director of ICE, to accept State services 3 and take other actions as appropriate to carry out immigration enforcement pursuant to section 287(g) of the INA. C. Exercise of Prosecutorial Discretion Unless otherwise directed, Department personnel should initiate enforcement actions against removable aliens encountered during the performance of their official duties, consistent with the President’s enforcement priorities as identified in his Executive Order. This includes the arrest or apprehension of an alien whom an immigration officer has probable cause to believe is in violation of the immigration laws. It also includes initiation ofremoval proceedings against any alien who is subject to removal under any provision of the INA, and the referral of appropriate cases for criminal prosecution. The Department shall prioritize aliens described in the Department’s Enforcement Priorities (Section A) for arrest and removal. The exercise of prosecutorial discretion with regard to any alien who is subject to arrest, criminal prosecution, or removal in accordance with law shall be made on a case-by-case basis in consultation with the head of the field office component, where appropriate, of CBP, ICE, or USCIS that initiated or will initiate the enforcement action, regardless of which entity actually files any applicable charging documents: CBP Chief Patrol Agent, CBP Director of Field Operations, ICE Field Office Director, ICE Special Agent-in-Charge, or the USCIS Field Office Director, Asylum Office Director or Service Center Director. Prosecutorial discretion shall not be exercised in a manner that exempts or excludes a specified class or category of aliens from enforcement of the immigration laws. The General Counsel shall issue guidance consistent with these principles to all attorneys involved in immigration proceedings. D. Establishing the Victims of Immigration Crime Engagement (VOICE) Office Criminal aliens routinely victimize Americans and other legal residents. Often, these victims are not provided adequate information about the offender, the offender’s immigration status, or any enforcement action taken by ICE against the offender. Efforts by ICE to engage these victims have been hampered by prior Department of Homeland Security (DHS) policy extending certain Privacy Act protections to persons other than U.S. citizens and lawful permanent residents, leaving victims feeling marginalized and without a voice. Accordingly, I am establishing the Victims of Immigration Crime Engagement (VOICE) Office within the Office of the Director of ICE, which will create a programmatic liaison between ICE and the known victims of crimes committed by removable aliens. The liaison will facilitate engagement with the victims and their families to ensure, to the extent permitted by law, that they are provided information about the offender, including the offender’s immigration status and custody status, and that their questions and concerns regarding immigration enforcement efforts are addressed. To that end, I direct the Director oflCE to immediately reallocate any and all resources that are currently used to advocate on behalf of illegal aliens to the new VOICE Office, and to 4 immediately terminate the provision of such outreach or advocacy services to illegal aliens. Nothing herein may be construed to authorize disclosures that are prohibited by law or may relate to information that is Classified, Sensitive but Unclassified (SBU), Law Enforcement Sensitive (LES), For Official Use Only (FOUO), or similarly designated information that may relate to national security, law enforcement, or intelligence programs or operations, or disclosures that are reasonably likely to cause harm to any person. E. Hiring Additional ICE Officers and Agents To enforce the immigration laws effectively in the interior of the United States in accordance with the President’s directives, additional ICE agents and officers are necessary. The Director of ICE shall- while ensuring consistency in training and standards-take all appropriate action to expeditiously hire 10,000 agents and officers, as well as additional operational and mission support and legal staff necessary to hire and support their activities. Human Capital leadership in CBP and ICE, in coordination with the Under Secretary for Management and the Chief Human Capital Officer, shall develop hiring plans that balance growth and interagency attrition by integrating workforce shaping and career paths for incumbents and new hires. F. Establishment of Programs to Collect Authorized Civil Fines and Penalties As soon as practicable, the Director of ICE, the Commissioner of CBP, and the Director of USCIS shall issue guidance and promulgate regulations, where required by law, to ensure the assessment and collection of all fines and penalties which the Department is authorized under the law to assess and collect from aliens and from those who facilitate their unlawful presence in the United States. G. Aligning the Department’s Privacy Policies With the Law The Department will no longer afford Privacy Act rights and protections to persons who are neither U.S. citizens nor lawful permanent residents. The OHS Privacy Office will rescind the DHS Privacy Policy Guidance memorandum, dated January 7, 2009, which implemented the DHS “mixed systems” policy of administratively treating all personal information contained in DHS record systems as being subject to the Privacy Act regardless of the subject’s immigration status. The OHS Privacy Office, with the assistance of the Office of the General Counsel, will develop new guidance specifying the appropriate treatment of personal information OHS maintains in its record systems. H. Collecting and Reporting Data on Alien Apprehensions and Releases The collection of data regarding aliens apprehended by ICE and the disposition of their cases will assist in the development of agency performance metrics and provide transparency in the immigration enforcement mission. Accordingly, to the extent permitted by law, the Director of ICE shall develop a standardized method of reporting statistical data regarding aliens apprehended 5 by ICE and, at the earliest practicable time, provide monthly reports of such data to the public without charge. · The reporting method shall include uniform terminology and shall utilize a format that is easily understandable by the public and a medium that can be readily accessed. At a minimum, in addition to statistical information currently being publicly reported regarding apprehended aliens, the following categories of information must be included: country of citizenship, convicted criminals and the nature of their offenses, gang members, prior immigration violators, custody status of aliens and, if released, the reason for release and location of their release, aliens ordered removed, and aliens physically removed or returned. The ICE Director shall also develop and provide a weekly report to the public, utilizing a medium that can be readily accessed without charge, of non-Federal jurisdictions that release aliens from their custody, notwithstanding that such aliens are subject to a detainer or similar request for custody issued by ICE to that jurisdiction. In addition to other relevant information, to the extent that such information is readily available, the report shall reflect the name of the jurisdiction, the citizenship and immigration status of the alien, the arrest, charge, or conviction for which each alien was in the custody of that jurisdiction, the date on which the ICE detainer or similar request for custody was served on the jurisdiction by ICE, the date of the alien’s release from the custody of that jurisdiction and the reason for the release, an explanation concerning why the detainer or similar request for custody was not honored, and all arrests, charges, or convictions occurring after the alien’s release from the custody of that jurisdiction. I. No Private Right of Action This document provides only internal DHS policy guidance, which may be modified, rescinded, or superseded at any time without notice. This guidance is not intended to, does not, and may not be relied upon to create any right or benefit, substantive or procedural, enforceable at law by any party in any administrative, civil, or criminal matter. Likewise, no limitations are placed by this guidance on the otherwise lawful enforcement or litigation prerogatives of DHS. In implementing these policies, I direct DHS Components to consult with legal counsel to ensure compliance with all applicable laws, including the Administrative Procedure Act.
Q: Position text baseline How do I specify the position of a line of text relative to the baseline, rather than relative to its lowest point? I can see the little white square next to the baseline; however, I am unable to select it or position it. A: In the Snap Controls Bar, set the following options Enable snapping Snap other points (centres, guide origins, gradient handles, etc) Snap text anchors and baselines Then you can snap the text baseline anchor to a guide. If you also engage the following options Snap nodes paths and handles Snap to paths Then you can snap the text baseline anchor to a path
Navigant on energy storage as ‘non-wires’ alternative for utilities and grid operators One of the ‘value of energy storage’ questions that was being asked a lot two or three years ago was around the use of batteries and decentralised system architecture instead of traditional “poles and wires” grid networks. It has been said for some time that spending huge sums of money on transmission and distribution (T&D) architecture buildout and upgrades could, in some cases, be deferred by the use of strategically-located energy storage systems, coupled with distributed energy resources like solar and wind. Andy Colthorpe took the opportunity to ask the report’s lead author Alex Eller, a research analyst interested in areas including energy storage, distributed renewables and microgrids, three of the most burning questions he could think of. The use of energy storage in T&D spending referral has been long talked about – but until now it has been rare to see figures put on it, or accurate cost-benefit comparisons made. Why is that and is this now changing? Much of the challenge when considering T&D deferral projects is that the specific economics of each project can be very different. The costs and time required to build new T&D systems, peak to average demand ratios, projected load growth, and availability of capital are all key considerations for new T&D projects or using storage to defer them. Due to the multitude of different factors involved, it has been very time consuming for storage developers to evaluate individual opportunities to defer T&D investments. Now that storage costs have come down and the industry is maturing, utilities are much more familiar with the technology and are identifying opportunities to defer upgrades using storage themselves. Furthermore, developers have gained sufficient experience to be able to streamline their process for working with utilities to evaluate these opportunities and propose solutions. Could you offer examples of why a regulator, utility, transmission or distribution grid operator might recognise energy storage as a cheaper alternative from a technical standpoint – and explain what the drivers might be for doing so? [Broadly speaking] there are seven main criteria that we identified in the report that will determine the viability of energy storage to defer T&D investments: High T&D upgrade costs High peak-to-average demand ratio; a shorter peak demand period only needs a shorter duration ESS, which may have considerably lower costs Modest projected load growth rate over the coming years – a relatively small storage system could be used to meet peak demand rather than a large capacity increase through traditional T&D. Uncertainty regarding the timing or likelihood of major load additions. [Energy] storage can be added incrementally as needed, unlike large infrastructure upgrades. Delays in T&D construction or construction resource constraints. There can also be local community opposition to new power lines and infrastructure. Limited capital available for T&D projects that must compete with other important investments An energy storage system (ESS) used for T&D deferral will be able to provide additional benefits or avoided costs, such as frequency regulation, renewable energy ramping/smoothing or energy shifting. Will we see examples of behind-the-meter assets being used to provide what are more traditionally considered front-of-meter services, to benefit networks and reduce the required spend on T&D infrastructure? Yes, we expect to see more projects utilising behind-the-meter (BTM) assets as part of “non-wires alternative” projects for utilities and/or grid operators. However, there are challenges in coordinating the operation and ensuring the reliability when using a network of hundreds or even thousands of BTM assets. As aggregation and management software continue to improve, this will become a more reliable form of load reduction and will be utilised more by utilities.
Is percutaneous adductor tenotomy as effective and safe as the open procedure? Percutaneous adductor longus tenotomy (PAT) is a frequently used procedure, yet no study has ever compared its effectiveness and safety with those of open adductor longus tenotomy (OAT). We conducted this prospective study to describe the effects of PAT and to compare them with those of OAT. This consisted of a cross-over randomized controlled trial including 50 consecutive hips from 27 patients with cerebral palsy scheduled for adductor tenotomy in the setting of multilevel tendon lengthening/release procedures or hip surgery (femoral or Dega osteotomy) in a university hospital. A pediatric orthopaedic surgeon conducted a PAT. Another surgeon extended the wound to explore what had been cut during the PAT, and completed the tenotomy if necessary. Hip abduction (HA) was assessed by a third surgeon immediately before PAT, after PAT, and then after OAT, using a goniometer, in a standardized reproducible manner. All 3 surgeons were blinded to the others' findings. Primary end-points included the percentage of tendon/muscle portion sectioned percutaneously, and the HA measure. Comparison between HA after PAT and OAT was done using a paired t-test with a 95% confidence interval. The influence of anatomic variants of adductor longus origin was also assessed. Mean HA (hips flexed) measured 40.36 degrees preoperatively and increased to 50.04 degrees after PAT (P<0.0001). After OAT, HA averaged 53.32 degrees with no statistical gain compared with that observed after PAT (P=0.2). The tendinous portion of adductor longus was cut to an average of 98% by PAT (completely in 46 cases and more than 75% in only 4 cases). The muscular portion of adductor longus origin was cut to an average of 83.7% (completely in only 15 cases, cut to more than 75% in 26 cases, and approximately 50% in 9 cases). The gain in HA positively correlated with the extent of the tendinous portion divided (P=0.03) but not with the extent of muscular portion divided. Results were independent of the anatomic variants of adductor longus origin. Partial section of adductor brevis after PAT was encountered in 6 cases. No major iatrogenic lesion was observed (obturator nerve, major vessels). This is the only prospective study concerning the effects of PAT. The anatomic factor associated with gain in HA seems to be the extent of the section of the tendinous portion of adductor longus origin, which was found to be cut to more than 90% in all cases after PAT. The extent of muscular portion section does not seem to influence the gain in HA. The researchers detail the technique of percutaneous adductor tenotomy and show that when done correctly, PAT is a fast and simple procedure, as reliable and effective as the open release and without any major risks. Level II therapeutic study-prospective comparative study.
1) Field of the Disclosure The disclosure relates generally to aircraft air conditioning systems and methods, and more particularly, to aircraft air conditioning systems and methods for extracting energy from an aircraft engine in a bleed air based aircraft air conditioning system. 2) Description of Related Art Known air conditioning systems used in transport vehicles, such as commercial aircraft, typically use an air based thermodynamic cycle to provide cool, pressurized air to various interior compartments of the aircraft, such as the passenger cabin, cargo compartments, and other interior compartments. Air from the compressor stages of the main aircraft engines, typically referred to as “bleed air”, may be bled by a bleed air system from two or more of such aircraft's gas turbine engines to supply pneumatic power to various aircraft and engine systems. For example, bleed air may be used to supply pneumatic power to the aircraft air conditioning system, to an aircraft anti-ice system, to an aircraft hydraulic system, or to other aircraft systems or components. Bleed air may typically be output at a high temperature and a high pressure from the bleed air system of the aircraft engine. Such bleed air may then be cooled and conditioned through air conditioning packs of the aircraft air conditioning system. Once the bleed air is conditioned in the air conditioning packs, it may then be distributed into the aircraft interior for aircraft interior temperature control, ventilation, and pressurization. The conditioned air within the aircraft interior may then be discharged to the outside ambient environment through various overboard valves, overflow valves and cabin leaks. However, in known bleed based aircraft air conditioning systems, the pneumatic energy or power extracted from the bleed air provided by the bleed air system of the aircraft engine to the aircraft air conditioning system may be decoupled and not aligned with the power or energy needed by the aircraft air conditioning system to meet its flow and cooling demands. The aircraft engine may provide more power than is required by the aircraft air conditioning system power requirements. Such excess power may result in inefficiency and wasted energy. Because the aircraft air conditioning system is typically the largest energy user on the aircraft, other than the propulsion of the aircraft itself, such wasted energy may represent a significant fuel burn impact to the aircraft. Moreover, in known bleed based aircraft air conditioning systems, the air conditioning (AC) pack of such known aircraft air conditioning systems may require increased pack ram air usage in order to adequately cool the bleed air going into the AC pack. Increased pack ram air usage, and in turn, increased ram air flow, may result in increased ram air drag to the aircraft. Accordingly, an improved aircraft system and method for extracting energy from an aircraft engine is needed to align the pneumatic power or energy extracted from bleed air provided by the aircraft engines with the power or energy demands of the aircraft air conditioning system, thereby reducing or minimizing wasted energy by the aircraft air conditioning system, and for providing ram air drag savings.
AP Cowboys center Phil Costa has gained notoriety this season for his creative timing on snaps to Tony Romo. Costa has his hands full Sunday against Vince Wilfork, but doesn’t sound overly concerned. Responding to a fan’s question on Twitter about whether Costa could handle “Mount Wilfork,” the Cowboys center responded: “Of course im ready hes more like a speed bump than a mtn…#cowboys are ready to roll!” Costa needs to be careful. Wilfork is more like one of those speed bumps at rental car companies that leaves you with a flat tire if you approach them the wrong way.
New here? You may want updates via email or RSS feed. Thanks for visiting! At the grocery store yesterday, I passed a man and his daughter in the snack aisle. She was maybe ten or eleven, a little overweight, and begging for cookies. He was tall and muscular, a blue-collar type, clearly exasperated with her. “You have no conception of how hard your mother and I work to earn money, do you?” he said. There was desperation in his voice. This brief encounter has been in my mind ever since. It reminds me of something I read over at the Seeds of Wisdom forum. Jim Anthony shared a story about how he is teaching his six-year-old the value of money. Anthony doesn't like the idea of just giving his son money — he thought it created an “entitlement mentality” — but he doesn't like the idea of tying the allowance to chores, either. The big problem I see with either of these methods is that most parents don't teach any lessons beyond this and their kids learn that money is for spending on stuff, period. There are no lessons about making money earn more money. There are no lessons about the actual value of money. […] A couple of years ago, I took things in a totally different direction. I decided on no allowance but rather to put my son “in charge” of a set amount of money to be spent on specific things, his two favorite things, McDonalds and video games. I essentially gave him control over part of the household budget. This was money that we were already spending, the only thing that changed was the control of it. He was given $20 a week to spend however he wanted on these two items. The first week, we ate at McDonalds three times in two days. The money was gone. Actually, for the first couple of months, we ate at McDonalds quite a bit until he wanted the new Sonic X game and didn't have any money for it. It didn't take him long to figure out that a video game costs about the same a 5 or 6 trips to McDonalds. It took another couple of months before he was finally able to get his game. Today, he totally understands the value of a $20 bill. Anthony then helped his son set up a couple of vending machines which provide a small but regular income. From there, his son moved to investing small amounts in stocks of companies with which he was familiar (e.g. Disney, Apple). His son has also started to save. I'll admit, he's had just a little bit of coaching here and he doesn't understand any of the details behind any of this stuff [remember: the kid is six years old], but he does understand that by thinking and acting differently than everybody else, he can have much more than anybody else. How and when to communicate money values to children is one of the toughest challenges that parents face. You want to support your children, to shield them from the hardships of life. But without facing the hardships, they won't appreciate the value of money. And what if your own money skills are poor in the first place? JLP at All Financial Matters writes often about kids and money. He has kids himself, and deals with these issues every day. I asked him to share some of his favorite articles: Kids & Money Wise Spending Habits for Kids Start Saving for Retirement at 16! An Interview with Steve Rosen of the Kansas City Star — Rosen is one of the only columnists in the US to write specifically about kids and money. — Rosen is one of the only columnists in the US to write specifically about kids and money. An Interview with Steve Rosen of the Kansas City Star – Part 2 I'm currently reading is Kids and Money: Giving Them the Savvy to Succeed Financially by Jayne A. Pearl. This book does a great job of tackling the subject, providing all sorts of tips, tricks, and guidelines. (Also see this recent reader comment on teaching children to save.)
Prescription rechecks at the Pricing Authority Prescription rechecks at the Pricing Authority PSNC strongly recommends that pharmacy contractors review every FP34 Schedule of Payment and check for possible problems – whether they are due to pharmacy staff or Pricing Authority error. Our Using Your Schedule of Payment to Monitor Performance page can help you identify what to look out for. If pricing concerns are identified, contractors should contact the Pricing Authority via the Help Desk on 0300 330 1349 to discuss their payments or consider requesting a recheck. How to request rechecks To request a recheck from the Pricing Authority, contractors are required to: Submit their request within 18 months from the end of the dispensing month being requested (e.g. for prescriptions dispensed in January 2016, a contractor must submit their request for a check by 31 July 2017).* Complete a separate form for each month being requested for a recheck. Contractors with more than one pharmacy need to complete separate request forms for each pharmacy and month they wish to have checked. Indicate the type of recheck they require (e.g. number of items, expensive items, switching) – see tick boxes shown in the picture opposite. Pharmacy contractors should be aware that where they have requested rechecks of one or more complete monthly bundle(s), the Pricing Authority has advised that it will select an equivalent number of additional months to check to ensure that adjustments made fairly reflect both underpayments and overpayments. Where a net underpayment is revealed, the contractor will be paid the value of the underpayment; Where a net overpayment is revealed, the Pricing Authority will recover the value of the overpayment. *Please note: Once the 18-month deadline for requesting a check has passed, no further requests can be made for that particular dispensing month. Guidance on interpreting letters received following rechecks The letters sent from the Pricing Authority following a request for a recheck currently document the number of forms and items counted during the recheck, but only limited details regarding errors and adjustments. The Pricing Authority staff will talk through further details on checks by telephone if they are contacted. The Pricing Authority has reviewed the level of feedback which they give to contractors following their checks and are now providing details on the most common errors found in the batch so that the contractor can adjust their processes to prevent them from occurring. The following may assist in clarifying the details on the breakdown of errors and amounts provided by the Pricing Authority in their letters to contractors. When accounts are checked and as a result, there are adjustments to be made to the account, these can be broadly split into the following categories: Drugs credit/debit: This is the net adjustment taking into account drug costs and payments for containers (‘split pack fees’) for items wrongly priced, missed (i.e. not priced at all initially) or priced in error. Fees credit/debit: This is a net adjustment in relation to single activity fees, expensive item fees and prescription charges. Again, such adjustments may be necessary in the case of accounts where there have been items wrongly priced, missed (i.e. not priced at all initially) or not dispensed (ND) items priced in error as well as for prescriptions that have been ‘switched’ in error or conversely not switched during the initial pricing but should have been. The F-Code or ODS code is the the unique code issued to your pharmacy which identifies you to NHS Prescription Services. You can find this on any pricing authority statement or your prescription submission document (FP34c).
2020 in Malaysia Events in the year 2020 in Malaysia. Federal level Yang di-Pertuan Agong: Al-Sultan Abdullah of Pahang Raja Permaisuri Agong: Tunku Azizah of Pahang Deputy Yang di-Pertuan Agong: Sultan Nazrin Shah of Perak Prime Minister: Tun Dr Mahathir Mohamad (until 24 Feb; interim from 24 Feb to 1 Mar) Tan Sri Muhyiddin Yassin (from 1 Mar) Deputy Prime Minister: Dato' Seri Dr. Wan Azizah Wan Ismail (until 24 February) Chief Justice: Tengku Maimun Tuan Mat State level : Sultan of Johor: Sultan Ibrahim Ismail Menteri Besar of Johor: Sahruddin Jamal (until 27 Feb) Hasni Mohammad (from 28 Feb) : Sultan of Kedah: Sultan Sallehuddin Menteri Besar of Kedah: Mukhriz Mahathir : Sultan of Kelantan: Sultan Muhammad V Menteri Besar of Kelantan: Ahmad Yaakob : Raja of Perlis: Tuanku Syed Sirajuddin Menteri Besar of Perlis: Azlan Man : Sultan of Perak: Sultan Nazrin Shah Menteri Besar of Perak: Ahmad Faizal Azumu : Sultan of Pahang: Sultan Abdullah Al Haj Menteri Besar of Pahang: Wan Rosdy Wan Ismail : Sultan of Selangor: Sultan Sharafuddin Idris Shah Menteri Besar of Selangor: Amirudin Shari : Sultan of Terengganu: Sultan Mizan Zainal Abidin Menteri Besar of Terengganu: Ahmad Samsuri Mokhtar : Yang di-Pertuan Besar of Negeri Sembilan: Tuanku Muhriz Menteri Besar of Negeri Sembilan: Aminuddin Harun : Yang di-Pertua Negeri of Penang: Abdul Rahman Abbas Chief Minister of Penang: Chow Kon Yeow : Yang di-Pertua Negeri of Malacca: Mohd Khalil Yaakob Chief Minister of Malacca: Adly Zahari : Yang di-Pertua Negeri of Sarawak: Abdul Taib Mahmud Chief Minister of Sarawak: Abang Johari Openg : Yang di-Pertua Negeri of Sabah: Juhar Mahiruddin Chief Minister of Sabah: Shafie Apdal Events January 1 January – Smoking ban officially takes place after a year-long grace period last year. 1 January – Visit Malaysia Year 2020 officially begins. 3 January – Maszlee Malik resigns as Minister of Education. 13 January – Japanese national badminton player, Kento Momota was injured in an accident early in the morning on his way to airport after competed at the 2020 Malaysia Masters when the van he was on hit the back of the truck on Maju Expressway in which the driver was killed. 18 January – 2020 Kimanis by-election. It was won by Mohamad Alamin a Barisan Nasional candidate from component party United Malays National Organisation (UMNO), replacing original member of parliament Anifah Aman whose election result was disqualified. 20 January - The Thai Peace Dialogue Panel, lead by General Wanlop Rugsanaoh, met with Barisan Revolusi Nasional representative Anas Abdulrahman in Kuala Lumpur, in what was described as "the first round of official peace dialogue" by BNR official Abdul Aziz Jabal. 25 January - The Malaysian government confirmed the first cases related to the 2019-20 coronavirus outbreak in Malaysia. The cases include three Chinese citizens from Singapore and subsequently quarantined at Sungai Buloh Hospital. February 21 February – Prime Minister, Tun Dr Mahathir Mohamad says the Pakatan Harapan presidential council meeting has given him the full trust on when to step down as Prime Minister which was decided by the presidential council which they met till late Friday night. Pakatan Harapan chairman said that after chairing the presidential council meeting, adding that he will decide when to step down after the Apec Summit in November to give its post to Dato Seri Anwar Ibrahim. PKR president Datuk Seri Anwar Ibrahim has urged his party members as well as Pakatan Harapan coalition members to respect the decision made by the Pakatan presidential council on Friday night.The Port Dickson MP said he personally will not allow any of his party members to attack or condemn the decision that Tun Dr Mahathir Mohamad has been given full discretion when to step down as prime minister, which will be after the Apec Summit in November. 22 February – Six-time Malaysian Super League champions Johor Darul Ta’zim (JDT) has officially moved into their new Sultan Ibrahim Stadium from previously Larkin Stadium. The new stadium was officiated by Johor Ruler Sultan Ibrahim Ibni Almarhum Sultan Iskandar on Saturday night. 23 February – 2020 Malaysian constitutional crisis (Day 1): Several important political meetings are being held at various spots in Petaling Jaya, Selangor and Kuala Lumpur. At 9am, Parti Pribumi Bersatu Malaysia (Bersatu) leaders and MPs were gathered at their headquarters at Yayasan Selangor including Prime Minister and Bersatu chairman, Tun Dr Mahathir Mohamad and Home Minister Tan Sri Muhyiddin Yassin. At Petaling Jaya's Sheraton Hotel, a dozen ministers and MPs, aligned to Datuk Seri Mohamed Azmin Ali's faction in PKR, were holed up in a meeting too. At 3pm, UMNO was also holed supreme council meeting at PWTC, Kuala Lumpur. At 5:35pm, several vehicles carrying 6 party leaders included PPBM president Tan Sri Muhyiddin Yassin, PKR deputy president Datuk Seri Azmin Ali, UMNO president Datuk Seri Ahmad Zahid Hamidi, PAS president Datuk Seri Abdul Hadi Awang, Sabah Chief Minister Datuk Seri Shafie Apdal and Sarawak Chief Minister Datuk Patinggi Abang Johari Tun Openg were entering the Istana Negara to granted audience with Yang Di-Pertuan Agong following talk of a formation of a new government coalition. Meanwhile at PKR president Datuk Seri Anwar Ibrahim’s residence in Bukit Segambut Kuala Lumpur, PKR president Datuk Seri Anwar Ibrahim said that there were attempts to topple Pakatan Harapan by former comrades in Parti Pribumi Bersatu Malaysia and traitors from PKR to form a new coalition government. When he was giving a sermon to his supporters, he will wait for a formal announcement on the matter. PKR supporters are attending prayers and later shouts of Reformasi!, Hidup Anwar!, PM Lapan! and Lawan Tetap Lawan! at Sunday night. Datuk Seri Anwar Ibrahim was also attended meeting with DAP and AMANAH leaders at undisclosed location late Sunday following the betrayal within Pakatan Harapan. 24 February – 2020 Malaysian constitutional crisis (Day 2): At 9 am, PKR president Datuk Seri Anwar Ibrahim, Deputy Prime Minister Datin Seri Wan Azizah Wan Ismail and DAP secretary-general Lim Guan Eng went to Prime Minister's office to meet with Prime Minister, Tun Dr Mahathir Mohamad over the possible realignment of the country’s political landscape. Later, they leave Prime Minister's office after they informed that Prime Minster was not there. Health minister and Amanah strategic director Datuk Seri Dr Dzulkefly Ahmad said that Pakatan Harapan is still the government of the day and its ministers will continue to perform their duties. Meanwhile the party’s vice president Datuk Mahfuz Omar said that Amanah was never approached to join any new coalition. At 12pm, PKR president Datuk Seri Anwar Ibrahim, Deputy Prime Minister Datin Seri Wan Azizah Wan Ismail, DAP secretary-general Lim Guan Eng and AMANAH president Mohamad Sabu arrived at Prime Minister's residence to meet with Prime Minister, Tun Dr. Mahathir Mohamad at Seri Kembangan, Selangor over possible of new government coalition and they later left around 12:30 pm At 1.15pm, Datuk Seri Anwar Ibrahim and his wife, Datin Seri Wan Azizah Wan Ismail arrived at PKR HQ in Petaling Jaya and he stated that he was very satisfied for meeting with Prime Minister. Meanwhile, at 1:20pm, Finance Minister, Lim Guan Eng also arrive at DAP HQ in Kuala Lumpur and stated that his meeting with Prime Minister was very emotional. At 2pm, PKR deputy president, Datuk Seri Azmin Ali and vice-president, Zuraida Kamaruddin were sacked from PKR for their betrayal against party principles and the effects of their actions causing instability in the Pakatan Harapan-led government. However, Azmin, Zuraida and 9 other MPs leave PKR to form an independent bloc in Parliament. At 2:20pm, Parti Pribumi Bersatu Malaysia (PPBM) officially leave Pakatan Harapan in support the leadership of Tun Dr Mahathir Mohamad as the prime minister, according to PPBM president, Tan Sri Muhyiddin Yassin. At 2:25pm, Tun Dr Mahathir Mohamad announced his resignation as Prime Minister and Bersatu chairman, according to statement by Prime Minister Office (PMO) and Bersatu party. PMO also confirms that his resignation letter were already submitted to the King at 1pm. At 2:30pm, PKR president, Datuk Seri Anwar Ibrahim and Deputy Prime Minister, Datin Seri Wan Azizah Wan Ismail arrived at Istana Negara to granted audience with Yang Di Pertuan Agong. At 3:35pm, DAP, PKR, and AMANAH appealed to Tun Dr Mahathir to continue as Prime Minister despite his resignation. At 5pm, Tun Dr Mahathir Mohamad was arrived at Istana Negara to meet with Yang Di-Pertuan Agong which he's called few hours after his resignation. At 7:25pm, Yang Di=Pertuan Agong has appointed Tun Dr Mahathir Mohamad as interim Prime Minister while waiting for a new premier to be appointed after the Agong accepted his resignation. At 9pm, Bersatu supreme council has rejected Tun Dr Mahathir's resignation as Bersatu chairman after party special meeting between top party leaders and ex-PKR MPs for Datuk Seri Azmin Ali 25 February – 2020 Malaysian constitutional crisis (Day 3): 26 February – 2020 Malaysian constitutional crisis (Day 4): 27 February – 2020 Malaysian constitutional crisis (Day 5): March April May June July August September October November December Deaths 1 January – Peter Lo Sui Yin, politician 10 February - Abam Bocey - comedian 19 February - K.S. Maniam - novelist Sports 7–12 January – 2020 Malaysian Badminton Masters 7–14 February – 2020 Tour de Langkawi 11–19 July – 2020 Sukma Games November – 2020 Penang Bridge International Marathon References Category:2020s in Malaysia Malaysia Category:Years of the 21st century in Malaysia Malaysia
Stacked Icons fa-refresh on fa-square-o fa-refresh on fa-circle fa-refreshl on fa-square fa-ban on fa-refresh To stack multiple icons, use the fa-stack class on the parent, the fa-stack-1x for the regularly sized icon, and fa-stack-2x for the larger icon. fa-inverse can be used as an alternative icon color. You can even throw larger icon classes on the parent to get further control of sizing.
WhatsApp has officially rolled out forward message limit for India users. (Image source: Reuters) WhatsApp has officially rolled out forward message limit for India users. (Image source: Reuters) WhatsApp has started rolling the five chat limit for forwards in India. It had announced this move back in July in order to help check the spread of fake news and misinformation on the platform. The Facebook-owned messaging app is facing scrutiny in India, after reports that viral video messages shared on the app resulted in lynchings, mob violence in some parts of the country. Globally WhatsApp will restrict the number of forwards to 20 chats; in India it is testing a lower limit of 5 chats. According to news agency IANS, WhatsApp confirmed that it has begun rolling out its forward message limit in India, which is its biggest market at 200 million users. “The limit has started to appear this week for people in India who are on the current version of WhatsApp,” the company said in a statement on Wednesday. In two iOS versions of WhatsApp, we did not face any restrictions on the number of forwards to chat, so this is likely a phased rolled out. A new WhatsApp update will likely come with the option to restrict forwards. This new restriction will ensure that if a media message (video, photos, audio) is forwarded five times from the same account, then WhatsApp will disable the option for forwarding it further. WhatsApp has earlier revealed that India is the market where people forward more messages, photos and videos than any other country in the world. In its earlier blogpost regarding this new feature on Forwarding message, WhatsApp had written, “Today, we’re launching a test to limit forwarding that will apply to everyone using WhatsApp. In India – where people forward more messages, photos, and videos than any other country in the world – we’ll also test a lower limit of 5 chats at once and we’ll remove the quick forward button next to media messages.” Read more: WhatsApp testing new feature to restrict forwards, in India limit is 5 chats WhatsApp hopes that by limiting the number of forwards, it will keep the platform a private messaging app, and also stop misinformation from spreading quickly. However, there is a work around to forwarded messages, where people can also copy the message or save the media file to their device, and then share it again to multiple chats. It also strips the chat of the forwarded label. WhatsApp has also published a new video to educate its users, saying it is expanding its user education campaign on how to spot fake news and hoaxes. “This week, WhatsApp is publishing a new video that explains the importance of the ‘forward’ label and calls users to ‘double check the facts when you’re not sure who created the original message,'” said the company. “We are deeply committed to your safety and privacy which is why WhatsApp is end-to-end encrypted, and we’ll continue to improve our app with features like this one,” it said in an earlier statement. Earlier this week reports have highlighted that the Department of Telecommunications (DoT) had asked telecom companies for ways to block social media platforms like WhatsApp, Facebook, Telegram and Instagram in case of threat to national security and public order. With IANS inputs 📣 The Indian Express is now on Telegram. Click here to join our channel (@indianexpress) and stay updated with the latest headlines For all the latest Technology News, download Indian Express App. © IE Online Media Services Pvt Ltd
How To Protect Yourself From Unnecessary Car Mechanic Charges How To Protect Yourself From Unnecessary Car Mechanic Charges By Zach Bowman, DriverSide Contributor Unfortunately, most car owners are at the mercy of their mechanics when it comes to understanding the work done on their vehicles. While the nod-and-grin technique may work well during Monday morning meetings with the boss, it can wind up costing you when applied to your shop. You don't have to be a mechanical genius to protect yourself from unnecessary work and unexpected charges however. Before you ever set foot inside of a shop, keep an eye out for specials. Is the shop offering a complete oil change , filter , tire rotation and free stick on trunk monkey for $9.99? If it sounds too good to be true, it probably is. Shops tend to use specials to bring customers in the door. Once there, technicians do their best to find anything and everything that could possibly need replacing on your vehicle, leading to a swollen bill by the time your car leaves the garage bay. Find a reliable garage by clicking on the " Service Your Car" menu on the left. You'll be able to find rated and reviewed auto shops in your area. When you decide on a garage, it's important to lay down some ground rules. First, never issue them carte blanche. Dropping your keys off with vague instructions to "just fix it" is a sure fire way to see a range of unanticipated charges on your receipt. You may not know exactly what's wrong with your car, but try to be as specific as possible and make sure the mechanic gets your firm authorization before starting any work. On that note, ask for the details when the shop calls up for your permission to start work. What are they doing? How long will it take? What parts are they replacing ? Why? Ask a lot of questions and don't be embarrassed if you don't understand something the mechanic says. Ask them to explain, remember, this is their job. If they get frustrated or don't want to take the time for your questions, it may be a sign to take your business elsewhere. Next, before anyone starts wrenching on your vehicle, make it perfectly clear that you want to see any and all of the parts that may be replaced. You'll probably get a cardboard box filled with that looks like leftovers from the set of a Mad Max movie. While you may not know the difference between an alternator and an alpaca, asking to see the old pieces will send a clear message to the mechanic not to replace anything that isn't worn or abused. Don't stop asking those questions. When you do finally get your box of old parts, ask the shop tech to go over them with you to learn what was exactly wrong. You're the customer, so they should be more than willing to spend a few minutes with you. Paying attention during their tutorial will arm you with useful knowledge for when you visit a shop in the future. A little bit of time can be worth you saving a lot of money in the future. Looking for Winter Car Maintenance and Preparation in Aiken? We have compiled a list of businesses and services around Aiken that should help you with your search. We hope this page helps you find Winter Car Maintenance and Preparation in Aiken.
[Inclusion of the immunoenzyme analysis in the complex serological reactions in the diagnosis of pulmonary tuberculosis]. The detection frequency of antituberculous antibodies (AB) was studied by means of the complex of serologic reactions and enzyme immunoassay (EIA) in 254 pulmonary tuberculosis patients. The detection rate of antituberculous AB by EIA was higher than that in a simultaneous application of EIA and the complex of serodiagnosis. In certain cases, however, the antituberculous AB are detected only with the complex of serologic reactions so that simultaneous usage of both the complex of serologic reactions and EIA is required.
Welcome Welcome to the POZ/AIDSmeds Community Forums, a round-the-clock discussion area for people with HIV/AIDS, their friends/family/caregivers, and others concerned about HIV/AIDS. Click on the links below to browse our various forums; scroll down for a glance at the most recent posts; or join in the conversation yourself by registering on the left side of this page. Privacy Warning: Please realize that these forums are open to all, and are fully searchable via Google and other search engines. If you are HIV positive and disclose this in our forums, then it is almost the same thing as telling the whole world (or at least the World Wide Web). If this concerns you, then do not use a username or avatar that are self-identifying in any way. We do not allow the deletion of anything you post in these forums, so think before you post. The information shared in these forums, by moderators and members, is designed to complement, not replace, the relationship between an individual and his/her own physician. All members of these forums are, by default, not considered to be licensed medical providers. If otherwise, users must clearly define themselves as such. Forums members must behave at all times with respect and honesty. Posting guidelines, including time-out and banning policies, have been established by the moderators of these forums. Click here for “Am I Infected?” posting guidelines. Click here for posting guidelines pertaining to all other POZ/AIDSmeds community forums. We ask all forums members to provide references for health/medical/scientific information they provide, when it is not a personal experience being discussed. Please provide hyperlinks with full URLs or full citations of published works not available via the Internet. Additionally, all forums members must post information which are true and correct to their knowledge. Finished Reading This? You can collapse this or any other box on this page by clicking the symbol in each box. Welcome to Am I Infected IMPORTANT UPDATE Posted Tuesday, August 28, 2012 Welcome to the "Am I Infected?" POZ forum. New members -- those who have posted three or fewer messages -- are permitted to post questions and responses, free of charge (make them count!). Ongoing participation in the "Am I Infected?" forum -- posting more than three questions or responses -- requires a paid subscription. A seven-day subscription is $9.99, a 30-day subscription is $14.99 and a 90-day subscription is $24.99. Anyone who needs to post more than three messages in the "Am I Infected?" forum -- including past, present and future POZ Forums members -- will need to subscribe, with secure payments made via PayPal. There will be no charge to continue reading threads in the "Am I Infected?" forum, nor will there be a charge for participating in any of the Main Forums; Meds, Mind, Body & Benefits; and Off Topic Forums. Similarly, all POZ and AIDSmeds pages, including our "How is HIV Transmitted?" and "Am I Infected? (A Guide to Testing for HIV)" lessons, will remain accessible to all. NOTE: HIV testing questions will still need to be posted in the "Am I Infected?" forum; attempts to post HIV symptoms or testing questions in any other forums will be considered violations of our rules of membership and subject to time-outs and permanent bans. To learn how to upgrade your Forums account to participate beyond three posts in the "Am I Infected?" Forum, please click here. Thank you for your understanding and future support of the best online support service for people living with, affected by and at risk for HIV. Unprotected sexual intercourse with a confirmed HIV+ person chance is 5 to 10000 or 1 in 2000. wearing a condom decrease the risk for about 10 fold. So wearing a condom and broke is better odds compared to not wearing at all. So relax! an HIV test in 3 months or 13-14 weeks will reveal your status. "...health will finally be seen not as a blessing to be wished for, but as a human right to be fought for." Kofi Annan Nymphomaniac: a woman as obsessed with sex as an average man. Mignon McLaughlin HIV is certainly character-building. It's made me see all of the shallow things we cling to, like ego and vanity. Of course, I'd rather have a few more T-cells and a little less character. Randy Shilts Can I ask why you are using different usernames while posting to our forums? Thus far, you have also used Stillscared Please realize that this kind of activity is disrespectful of other forum members, as well as our moderators. People spend a considerable amount of time helping others in these forums. Using multiple accounts is at the very least annoying, if not deceiving and disrespectful of others. It is also against our Terms of Membership which you agreed to when you became a member. This information is also contained within the Welcome Thread, which you should have read by now. So really, you have no excuse. You must realize that the answers won't change, no matter how many names you post under. I would appreciate a reply to this message, and I hope you will commit to using just one account - preferably your original one. If not, you will be banned from further access to the forums. "...health will finally be seen not as a blessing to be wished for, but as a human right to be fought for." Kofi Annan Nymphomaniac: a woman as obsessed with sex as an average man. Mignon McLaughlin HIV is certainly character-building. It's made me see all of the shallow things we cling to, like ego and vanity. Of course, I'd rather have a few more T-cells and a little less character. Randy Shilts Write your details down this time and keep them safe. If you create a third account, you will be banned, no questions asked. You should not be using the same condom to go from anal to vaginal intercourse. You will spread bacteria from the rectum to the vagina and give the woman a bacterial infection. It also increases the chances of the condom breaking as you have found out. Always change the condom when switching from anal to vaginal. Hiv is a fragile, difficult to transmit virus and it's highly unlikely that you would have become infected with hiv from this condom break. I've yet to see an insertive partner test positive after a condom break and I don't expect you to either. But you know the drill, you should test to be certain at 12-13 weeks after this happened. Please read through the condom and lube links in my signature line so you know how to use them correctly. A correctly used condom rarely breaks. "...health will finally be seen not as a blessing to be wished for, but as a human right to be fought for." Kofi Annan Nymphomaniac: a woman as obsessed with sex as an average man. Mignon McLaughlin HIV is certainly character-building. It's made me see all of the shallow things we cling to, like ego and vanity. Of course, I'd rather have a few more T-cells and a little less character. Randy Shilts Even if she IS hiv positive, you are unlikely to become infected from this incident. Exposure does not necessarily equal successful transmission, especially when we're talking about the insertive partner. You should still test to make certain. Anyone who is sexually active should be having a full sexual health care check-up, including but not limited to hiv testing, at least once a year and more often if unprotected intercourse occurs. If you aren't already having regular, routine check-ups, now is the time to start. As long as you make sure condoms are being used for intercourse, you can fully expect your routine hiv tests to return with negative results. Don't forget to always get checked for all the other sexually transmitted infections as well, because they are MUCH easier to transmit than hiv. As for the likelyhood of her getting a bacterial infection, well, how long is a peice of string? Tell her to keep an eye out for itchyness in her genital area and/or an unusual vaginal discharge. If either of these things occur, tell her to see her doctor. Bacterial vaginosis is common and easy to treat, but it must be treated as it can move up into the reproductive tract and cause fertility problems. "...health will finally be seen not as a blessing to be wished for, but as a human right to be fought for." Kofi Annan Nymphomaniac: a woman as obsessed with sex as an average man. Mignon McLaughlin HIV is certainly character-building. It's made me see all of the shallow things we cling to, like ego and vanity. Of course, I'd rather have a few more T-cells and a little less character. Randy Shilts I forgot to mention that going from anal to vaginal can also cause yeast (thrush) infection. The organism that causes this infection is found in the digestive tract, where there are friendly bacteria that keep it in check. If it is introduced into the vagina, it can cause infection. The symptoms are also itching and unusual vaginal discharge, but it won't cause fertility problems. It's just damned uncomfortable! Again, if this occurs, it is easily treated and she should see her doctor. "...health will finally be seen not as a blessing to be wished for, but as a human right to be fought for." Kofi Annan Nymphomaniac: a woman as obsessed with sex as an average man. Mignon McLaughlin HIV is certainly character-building. It's made me see all of the shallow things we cling to, like ego and vanity. Of course, I'd rather have a few more T-cells and a little less character. Randy Shilts It has now been 15 days since my incident. I am still scared but keeping myself busy. I saw the girl on the weekend and brought up the subject that I am slightly worried as what I did was out of character on my part and have always been a worry well with this sort of problem. She assured me I had nothing to worry about as she had been tested a month before and hadnt been with anyone else in between. This reassured me a bit. Still though having trouble getting over this incident. Should I wait another 13 days and have the PCR test done? Or wait for the 13 week elisa? Scared of those false positives! PCR tests are not approved for diagnostic purposes because they have a very high rate of false positive. The last thing you and your anxiety needs is a false positive result. Whether or not this woman is hiv positive, you are unlikely to become infected from a condom break. Hiv is a fragile difficult to transmit virus and more so from a woman to a man. I've yet to see the insertive partner test positive after a condom break. However, as you did have a small risk and, as you cannot go by what someone thinks about their hiv status, you do need to test. A negative antibody test at six weeks would be an excellent indication of your true status. That is the earliest you should even consider testing. "...health will finally be seen not as a blessing to be wished for, but as a human right to be fought for." Kofi Annan Nymphomaniac: a woman as obsessed with sex as an average man. Mignon McLaughlin HIV is certainly character-building. It's made me see all of the shallow things we cling to, like ego and vanity. Of course, I'd rather have a few more T-cells and a little less character. Randy Shilts If you test tomorrow, it will be one day short of five weeks. The vast majority of people who have actually been infected will seroconvert and test positive by six weeks, with the average time to seroconversion being only 22 days. You will be at 34 days so yes a test tomorrow would be an excellent indication of your true status, although not conclusive. I'm still expecting you to test negative over this vaginal, brief condom break. "...health will finally be seen not as a blessing to be wished for, but as a human right to be fought for." Kofi Annan Nymphomaniac: a woman as obsessed with sex as an average man. Mignon McLaughlin HIV is certainly character-building. It's made me see all of the shallow things we cling to, like ego and vanity. Of course, I'd rather have a few more T-cells and a little less character. Randy Shilts The symptoms that I mentioned are they HIV related. The vomiting upset sdtomach rash on eye lids and forehead(little red dots) cramps etc. Is this the right itme for these symptoms to be showing for hiv? I know you have said symptoms are nothing to go on but I am starting to get freaked out again. No fever or night sweats though. Also if these are in face HIV symptoms will my test show positive? Or will the test only be positive after the symptoms are gone? Assuming they are acute hiv infection symptoms... "...health will finally be seen not as a blessing to be wished for, but as a human right to be fought for." Kofi Annan Nymphomaniac: a woman as obsessed with sex as an average man. Mignon McLaughlin HIV is certainly character-building. It's made me see all of the shallow things we cling to, like ego and vanity. Of course, I'd rather have a few more T-cells and a little less character. Randy Shilts 5 weeks ago,mostly protected intercourse with a female of unknown status, The condom broke again! (afer putting it on properly...) I have no idea how long it was broken for.... Anything between 5 and 10 minutes. I didnt think much of it having learnt from my previous experience. Last week, four weeks after possile exposure, upset stomach, pain in the groin, fatigue and possible fever(didnt measure temp) and night sweats . Today, symptoms gone. This has got me worried. All points to possible sero-conversion sickness...Would the fever be serious enough to actually make you feel like flu or really sick??? Sorry to have dug up the old thread. These situations make me stress far too much and I do practise safe sex, so I do try stop getting myelf into these situations. thanks for taking the time to read and any response will be appreciated. Look, the likelihood of you having been infected as a result of this encounter is vanishingly small. You were protected up until the condom broke. Given that HIV is a fragile virus and difficult to transmit -especially from female to male- I'd say you'll most like test negative. But you should test at the 12-13 week point. I'd remind you that symptoms are meaningless in terms of HIV transmission, it's risk behaviours that matter. One more question, with regards to symptoms, and I know you all say they are nothing to go by but they are pretty hard to ignore!! Do they all come up at once and then stop at once? As I said last week I had those symptoms, and they stopped. This week definately feeling fluish. No night sweats or noticable fever. But Def sinus and uneasy feling. No swollen glands that I can notice either, no rash etc.... Not feeling all that ill, but hose symptoms are noticable!!! Also with regard to te nght sweats, are they profuse? Ie wet shirt and sheat or minimal??? Same goes for the diareah?? We don't discuss symptoms here because they are not a reliable indicator of HIV infection. The symptoms that some people experience during seroconversion are largely indistinguishable from those experienced during any other viral infection, ie they're not specific to HIV. Many other people experience no symptoms whatsoever. We've found it's much better to focus of specific risk behaviours and the results of HIV antibody tests performed at the right time and that applies to you to. You've had a very low risk. You should test at 12-13 weeks, but I'm fully confident that you'll return a negative result. Tomorrow will be a day short of 8 weeks? Going to test. Need to get this off my chest. Just how reliable is a test at 8 weeks. From my encounter, assuming the test is negative which im praying it is. Should I re-test? Amazingly today, woke up feeling great and didnt think about my burden at all. As soon as the thought came up I tried to think of something else right away. Felt healthier from this. Amazing what the mind can do! Testing tomorrow morning at 8 weeks, and when i get the chance in the future il do so again. Just hoping for that negative! Feeling more and more confident that I will come out of this okay. Obviously HIV is terrible. I know this. But I will not let it make me live my life in fear or wonder about every person I meet. Obviously remaining careful. Thank you guys once again for taking the time to answering my quetions over and over again!
Characteristics of carbapenem-resistant Acinetobacter spp. other than Acinetobacter baumannii in South Korea. Although many studies have been performed on carbapenem-resistant Acinetobacter baumannii, only a few studies have addressed carbapenem resistance in Acinetobacter spp. other than A. baumannii (non-baumannii Acinetobacter). Amongst 287 Acinetobacter spp. isolates from patients with bacteraemia in a South Korean hospital collected between 2003 and 2010, 160 (55.7%) were non-baumannii Acinetobacter spp. Antimicrobial susceptibility testing was performed and the effect of efflux pump inhibitors was examined. Antimicrobial resistance genes were identified and pulsed-field gel electrophoresis (PFGE) analysis was performed. OprD expression was also evaluated by quantitative real-time polymerase chain reaction (qRT-PCR), and CarO disruption was investigated by PCR. Seventeen non-baumannii Acinetobacter isolates (10.6%) were resistant to imipenem or meropenem, comprising eight Acinetobacter pittii (or Acinetobacter genomospecies 3), four Acinetobacter nosocomialis (or Acinetobacter genomospecies 13TU), two Acinetobacter genomospecies 'close to 13TU', two Acinetobacter bereziniae (or Acinetobacter genomospecies 10) and one Acinetobacter genomospecies 16. bla(IMP-1) genes were detected in seven and two carbapenem-resistant A. pittii and A. bereziniae isolates, respectively. PFGE showed that A. pittii isolates carrying bla(IMP-1) belonged to the same clone. In addition, bla(SIM-1) and bla(PER-1) genes were simultaneously identified in two A. nosocomialis isolates. In four isolates (one each of A. pittii, A. nosocomialis, Acinetobacter genomospecies 'close to 13TU' and Acinetobacter genomospecies 16), efflux pumps were implicated in the increase in carbapenem minimum inhibitory concentrations. No decreased expression of OprD was identified in any carbapenem-resistant non-baumannii Acinetobacter isolates, and disruption of carO was also not detected. Clonal spread of carbapenem-resistant A. pittii carrying bla(IMP-1), which contributes to a high resistance rate in this species, was identified. The bla(IMP-1) and bla(SIM-1) genes were first identified in A. bereziniae and A. nosocomialis, respectively. Since no carbapenem resistance mechanisms could be identified, further efforts to find the resistance mechanism should be made.
1. Introduction {#sec1} =============== Female sexual dysfunction (FSD) takes different forms, including lack of sexual desire, impaired arousal, inability to achieve orgasm, or pain with sexual activity. It can be defined as a persistent or recurrent sexual problem that causes marked distress or interpersonal difficulty \[[@B1]\]. It may be a lifelong problem or acquired after a period of normal sexual function. Female sexual problems are highly prevalent worldwide. The prevalence of FSD ranges from 27% to 70% \[[@B2]--[@B4]\]. A population-based study with women aged 18 to 79 years found that 37.9% of the Portuguese women report symptoms regarding sexual health \[[@B5]\]. A similar percentage of women have sexual concerns in the United States \[[@B6]\]. The etiology of FSD is often multifactorial and may include psychological problems such as depression or anxiety, relationship conflict, fatigue, stress, issues relating to prior physical or sexual abuse, medications, and physical problems such as endometriosis or genitourinary syndrome of menopause \[[@B7]\]. Female sexual function is influenced by several biological, psychological, and social factors. The general framework sequence of the female sexual response cycle is described in four phases: desire (libido), arousal (excitement), orgasm, and resolution \[[@B1], [@B7]\]. However, this cycle of responses must be understood within an intrapersonal and interpersonal context. As previously mentioned, factors as depression or the length of relationship have been associated with FSD \[[@B8], [@B9]\]. For many women, the contemporary phases of the sexual response cycle may vary in sequence, overlap, repeat, or even be absent, during all or some sexual encounters \[[@B7], [@B8]\]. In fact, a women\'s subjective satisfaction with the sexual experience may not require achieving all response phases. The solid correlation observed in men, between subjective arousal and genital congestion (erection), is not seen in women. Most studies identify little correlation between a woman\'s complaints of limited genital arousal and objective measures of vulvovaginal blood flow and engorgement. Arousal may relate to physiological phenomena as vasocongestion and genital lubrication, and/or to thoughts and feelings. Self-reports by women often do not distinguish between desire and arousal. In addition, spontaneous desire is unusual in women, except in new relationships, which emphasizes the fact that the absence of this domain does not necessarily mean a disorder \[[@B7], [@B10]\]. Low sexual desire is the most commonly reported female sexual health problem \[[@B5], [@B6]\]. Significant increases in libido and in sexual frequency were seen in postmenopausal women who received weekly intramuscular injections of testosterone \[[@B11]\]. Sexual desire was significantly associated with levels of free testosterone (FT) and androstenedione in premenopausal women, but FSD in general was not associated with androgen levels \[[@B9]\]. A population-based study of over 1400 randomly selected women aged 18 to 75 years showed no single androgen level to be predictive of low sexual function \[[@B12]\]. The female sexual response is complex. The assumption that androgen levels are a key factor in female sexual function is based on the role of androgens in male sexuality. Although exogenous androgens administration exerted a positive balance on some aspects of female sexuality, in such studies, however, the levels of circulating testosterone achieved have been supraphysiological \[[@B11], [@B13], [@B14]\]. The biological activity of circulating sex steroids is dependent upon the relative binding to sex hormone-binding globulin (SHBG). The unbound fraction or FT is biologically active. 98 percent of circulating testosterone is protein bound, mainly to SHBG or albumin. Binding to albumin is weak, so this hormone portion may also be bioavailable \[[@B15], [@B16]\]. Apart from the cyclical variation in ovarian androgens, there is not the same homeostatic regulation of FT levels in women as in men, and there is a greater variety of factors that are likely to affect steroid binding in women compared to men (e.g., exogenous estrogen) \[[@B14], [@B17]\]. Hypoestrogenism results in signs and symptoms with impact on sexual function: reduction of vulvovaginal lubrication, vasocongestion during sexual arousal, vaginal atrophy, and dyspareunia \[[@B18], [@B19]\]. But factors that increase SHBG concentrations, as estrogen therapy, pregnancy, or oral contraceptives (OCs), will decrease FT. However, there is a lack of evidence that any impact of OCs on sexual function is caused by decreased androgen activity. And, above all, there are conflicting data about hormonal contraceptives as a risk factor for FSD. The relationship between female sexual function and hormonal contraception is controversial. This is a narrative review of existing data that explores the effect and the magnitude of the impact that hormonal contraceptives play in female sexual function. 2. Contraception and Sexuality {#sec2} ============================== In 1914, a feminist nurse named Margaret Sanger started believing that women could have reliable contraception. In 1960, "the pill" became reality as a contraceptive approved by Food and Drug Administration (FDA). Soon, couples had the right to engage in nonprocreative sex and the choice of having children and when to have them. Today, hormonal contraception is in general an affordable, reversible, and highly effective form of family planning, available with different components (various progestins and/or estrogens), and with different routes of administration. Again, this panoply of possible options reinforces the right to choose. The woman gained control with these methods of contraception: control over methods (contrary to the male condom) and control of sexual availability (despite the number of days from last menses). The frequency of sexual activity and sexual enjoyment correlate positively with contraceptive satisfaction \[[@B20]\]. Fear about an unwanted pregnancy was associated with a negative impact on women\'s sexual arousal, particularly if one\'s partner did not share the same concern. Although some men often do not consider their responsibility to think about contraception, some women feel that a partner\'s shared concern could serve to buffer potential negative effects on their ability to feel aroused \[[@B21]\]. Hormonal contraceptives were not thought to improve sexual function, in addition to the reduction in concern about the risk of an unplanned pregnancy. However, female contraception has changed sexuality. An unsatisfactory number of studies report the impact of the available contraceptives on female sexuality. This is true even for combined oral contraceptives (COCs) introduced half a century ago. Even so, there are potential consequences for the female sexual response linked to the various contraceptive methods currently in use, especially in the case of hormonal contraception. Women\'s choice for sexual activity without pregnancy should also be balanced with the plausible risks and benefits of contraception for female sexual function. Sociocultural barriers, taboos, and misconceptions make the assessment of female sexuality difficult. Clinical, social, and relationship characteristics of the couple may also tamper a correct evaluation of the etiology of sexual dysfunction. The possible sexual side effects of hormonal contraceptives are unknown to many patients and are dubious to many physicians. Challenges in initiating communication on sexual health continue to be present in clinical practice \[[@B22]\]. However, it is important that the influence of hormonal methods upon female sexual function be discussed with women during contraceptive counseling. Otherwise, omission of the sexual issues would be counter to the original intent of "the pill" and therefore could affect the reproductive and sexual health of users of hormonal contraception. 3. Hormonal Contraceptives and Female Sexual Function {#sec3} ===================================================== The association between hormonal contraception and sexuality is an important issue of debate and study. Although there is currently no recommendation to screen for sexual dysfunction before or during the use of hormonal contraception, various contraceptive methods have been associated with changes in women\'s sexual health. In general, there are mixed effects on several sexual domains caused by hormonal contraceptives. There is no consistent pattern regarding route of administration or estrogen-progestin versu*s* progestin-only contraceptives. 3.1. Progestin Androgenicity and Estrogen Dose {#sec3.1} ---------------------------------------------- The endocrinology of female sexual function is uncertain. COCs supress ovarian testosterone levels via suppression of pituitary luteinizing hormone (LH). The estrogen component of the pill is metabolized in the liver and increases hepatic production of SHBG, with a consequent decrease in FT concentrations. Some progestins decrease SHGB levels, but the overall effect of COCs is an increase in SHBG levels. On a scale vision, all COCs are antiandrogenic, although some are more than others depending on the progestin component \[[@B14], [@B17], [@B23]\]. Other hormonal methods can affect SHBG levels as well. The combined contraceptives, patch and vaginal ring, have both been found to increase serum SHBG levels even more than COCs \[[@B24]--[@B26]\]. Also, while a lower ethinylestradiol (EE) contraceptive pill reduces FT less, higher doses of estrogen do not appear to increase the likelihood of sexual side effects \[[@B27]--[@B29]\]. Indeed, a prospective randomized study observed the highest rates of negative impact on sexual well being reported by COC 15 mcg EE users versus 20 mcg EE users \[[@B29]\]. Another study randomized 97 women to either 30 mcg EE/150 mcg levonorgestrel (LNG) or 20 mcg EE/100 mcg LNG. Both groups showed improvements in sexual function, but this was only with statistical significance for the lower dose group. The highest dose group decreased plasma androgen levels, but with no impact on sexual desire. In addition, sexual desire increased among users of the lower dose formulation \[[@B30]\]. As previously described, it has been proposed that androgens play a role in female sexual function, but correlations between indices of androgenicity and the various measures of sexuality are inconsistent. A double blind randomized control trial, comparing effect of drospirenone (DRSP) \[3 mg + 30 mcg EE\] and gestodene (75 mcg + 20 mcg EE), revealed significant improvements regarding sexual desire, arousal, and overall satisfaction in the DRSP group. An increased frequency of orgasms in the gestodene group was reported. And the diagnosis of FSD and the free androgen index showed no statistically significant differences between the two treatments \[[@B27]\]. Both OCs formulations, one with an antiandrogenic activity, the other a non-anti-androgenic progestin, were not associated with negative sexual effects. The relevance of changes in androgen levels in female sexual function remains unclear. It seems plausible that some women may be more susceptible to androgen level alteration than others. 3.2. Short-Acting Reversible Contraception {#sec3.2} ------------------------------------------ Long-acting reversible contraception (LARC) consists of intrauterine devices (IUDs) and subdermal implants; all other reversible methods provide shorter-term protection and can be categorized as short-acting reversible contraception (SARC). ### 3.2.1. Oral Contraceptives {#sec3.2.1} OCs can be divided into two main groups: COCs with estrogen and progestin components and progestin-only pills (POPs). Contraceptive action is provided by the inhibition of the hypothalamic-pituitary-ovarian (HPO) axis, suppressing follicular growth and inhibiting ovulation. The essential component for any hormonal contraceptive method is the progestogen. The primary role of this component is to prevent ovulation through a negative feedback mechanism that results in a decrease in LH. Progestogen action also reduces the receptivity of cervical mucus and decreases endometrial thickness \[[@B31], [@B32]\]. Estrogens contribute to the contraceptive mechanism by inhibiting both follicle-stimulating hormone (FSH) and LH. Estrogen provides better regulation of the HPO axis. The inhibition of FSH seems to be related to estrogen dose, because more follicular activity is seen with progestogen-only methods than with COCs \[[@B33], [@B34]\]. *(1) Combined Oral Contraceptives*. COCs remain one of the most commonly used forms of family planning. The majority contain EE as the estrogen component. COCs formulated to include estradiol (E2) have recently become available for the indication of pregnancy prevention. A combined estradiol valerate and dienogest pill (E2V/DNG) and a COC containing 17*β*estradiol and nomegestrol acetate (E2/NOMAC) are the newest alternatives to the first synthetic estrogen. One of the earliest studies, using two oral contraceptives containing the same amount of EE (35 mcg), and an unvaried dose of norethindrone in a monophasic pill and a threephase increase in norethindrone in the triphasic pill, found that monophasic users reported less vaginal lubrication than nonusers, whereas triphasic users did not \[[@B35]\]. Vaginal dryness was also a side effect of COC reported in a more recent prospective study, with 280 women randomized in three groups: (i) taking COC 20 mcg EE/100 mcg LNG, (ii) COC 15mcg EE/60 mcg gestodene, and (iii) vaginal ring users (15 mcg EE/120 mcg etonogestrel) \[[@B29]\]. And, overall, a negative influence on sexual desire was reported by the COC groups. A similar result was observed in a randomized trial of a monophasic (35 mcg EE/0.250 mg norgestimate) and a triphasic pill (35 mcg EE/0.180 mg, 0.215 mg, 0.250 mg norgestimate), from the Kinsey Institute, which assessed pre-COC use characteristics at baseline and regularly assessed women with the aim to predict acceptability and continuation of the pill when used for contraceptive purposes. Of the subjects who discontinued COCs or switched pills, 8% did so because of sexual side effects \[[@B36]\]. A statistically significant decrease in frequency of intercourse and psychosexual arousability was reported. These studies revealed that disturbances of sexual intercourse are crucial points for acceptability and compliance \[[@B29], [@B36]\]. There are quite a few trials that have demonstrated a negative impact of COCs on female libido. In a cross-sectional questionnaire study conducted among 349 sexually active community-based women, aged 20-65 years, the authors found that COCs users had significantly lower frequencies of sexual thoughts, interest and days of sexual activity per month, compared to nonusers \[[@B37]\]. A large study assessing female sexual function and contraception in over one thousand German medical students, found that COC users had lower scores on desire and arousal domains, as well as statistically significant lower total Female Sexual Function Index (FSFI) scores \[[@B38], [@B39]\]. (The FSFI is a 19-question tool covering six domains assessing desire, arousal, orgasm, lubrication, pain and satisfaction. Each domain is associated with a maximum score of up to six points out of the total FSFI score (maximum total score on all domains is 36 points) \[[@B40]\]. The lower the FSFI score, the higher the likelihood of sexual dysfunction.) As in other studies referenced earlier, once again, no correlation was found between specific types of COCs (androgenic or antiandrogenic progestin content, or different dosages of EE) and negative libido \[[@B39]\]. This absent association between a lower FSFI score in COC users, and the progestin androgenicity and/or the EE dose, was also observed in a large cohort of 2612 young university women \[[@B41]\]. Furthermore, as already discussed, despite the fact that COCs decrease bioavailable androgens, several reports have shown that this decrease does not imply a negative impact on libido \[[@B17], [@B42], [@B43]\]. COC users have reported higher frequency of sexual thoughts and interest compared to nonusers \[[@B35]\]. It is also important to reinforce that newer progestogens like DRSP have been linked to an improvement in sexual arousal and enjoyment, orgasm frequency, and satisfaction with sexual activity \[[@B44], [@B45]\]. These results are consistent with the already mentioned randomized, double-blind, controlled trial reporting that DRSP did not have an unfavourable effect on libido \[[@B27]\]. In a multicentre study the majority of women experienced no change in libido, comparing two COCs with 30 mcg EE: (i) association with DRSP and (ii) association with LNG, though, in both groups, a small percentage of women reported higher or lower libido compared with their normal experience \[[@B46]\]. Another study randomized 115 women to conventional vs. extended cycle with 20 mcg EE and 3 mg DRSP, where both groups suffer improvement in several sexual parametres \[[@B47]\]. Findings suggest that women who choose a continued-regimen OC should not expect a decrease in sexual functioning as a result \[[@B47], [@B48]\]. COCs have been associated with dyspareunia not only because of possible vaginal dryness, but also because of the risk of vestibulitis. COC use as a risk factor for provoked vestibulodynia is another divisive finding in the literature. Several studies point for an association between COC use and vestibular pain \[[@B49]--[@B53]\]. The likelihood of superficial pain during intercourse seems to be higher when OCs are first used at a young age and increase with duration of use \[[@B50], [@B52]\]. However, based on quantitative genital sensory analysis, no evidence was found that 20 mcg COCs adversely affect clitoral or vestibular sensitivity \[[@B54]\]. Other authors also reported that COC use was not a risk factor for vestibulodynia \[[@B55]\]. Regarding the associations with E2 component in COCs, there are some interesting studies where some positive sexual aspects may arise from the use of these pills. A preliminary study in 57 healthy women showed that E2V/DNG improved sexual enjoyment, arousal, orgasm, and desire over six cycles of use; yet, this study was open label, and without a comparator \[[@B56]\]. Later, a multicenter, randomized, double-blind study compared the effects of six cycles of E2V/DNG with EE/LNG on sexual function, in 276 women with COC-associated sexual dysfunction. Equivalent improvements in all domains of the FSFI were demonstrated in both groups, with no significant diferences \[[@B57]\]. Overall, these studies suggest that E2V/DNG does not have a negative impact on sexual function. A recent prospective observational study focused on the effect of E2/NOMAC to improve the sexual function of women with low sexual desire due to COC usage. At baseline, the total FSFI score and the Female Sexual Distress Scale (FSDS) score was measured, both indicating sexual dysfunction with sexual distress. At the third (first follow-up) and sixth (second follow-up) COC intake cycles of E2/NOMAC pill, FSFI score was consistently higher and FSDS score continued to drop. Interestingly, the previous COCs that women were using, containing 30 mcg EE and DRSP 3 mg, or chlormadinone acetate 2 mg, or dienogest 2 mg, and 20 mcg EE and DRSP 3 mg, were all progestogens with antiandrogenic activity. However, there was no comparative COC group in the study \[[@B58]\]. And the common assumption that COCs containing antiandrogenic progestins have a detrimental effect on sexual function relative to those containing androgenic progestins is not irrefutable, quite the contrary \[[@B27], [@B57]\]. *(2) Progestin-Only Pills*. Progestin-only methods include pills and the most commonly used POP in Europe contains low doses of desogestrel. A placebo-controlled, double-blind comparison of COCs and POPs users was carried out in two contrasting cultures (Manila, Philippines, and Edinburgh, Scotland). All women had been sterilised or partners had been vasectomised. The POP was associated with no adverse impact on female sexuality in both centres \[[@B59]\]. ### 3.2.2. Contraceptive Ring, Transdermal Contraceptive Patch, and Injectable Contraceptive {#sec3.2.2} Other widely used SARC methods are the vaginal ring (delivers 15 mcg EE per day) and the patch (delivers 20 mcg EE per day). The ring contains etonogestrel and the patch contains norelgestromin as their progestin component. The injectable contraceptive depot medroxyprogesterone acetate (DMPA) is a progesterone-only contraceptive method. The effects of these other forms of hormonal contraception on sex drive have not been studied as comprehensively as OCs. As with COCs, there are conflicting results. In a randomized study, the better results related to desire and sexual satisfaction were obtained by vaginal ring users versus OC users (COC 20 mcg EE/100 mcg LNG and COC 15 mcg EE/60 mcg gestodene) \[[@B29]\]. Improvement of sexual desire was also noted in women using the contraceptive ring compared with a desogestrel-containing combined OC and a desogestrel-only OC \[[@B60]\]. A small prospective study found that women using the vaginal ring in an extended manner experienced improvements in sexual function and reduced sexual distress after 60 days \[[@B61]\]. On the contrary, an open-label randomized trial compared the contraceptive ring vs. COC (30 mcg EE + 3 mg DRSP) and observed that a decreased libido was more common with the ring \[[@B62]\]. Sexual function of first-time users of the contraceptive ring and contraceptive patch, who had recently used COCs, was assessed by FSFI scores in a multicentre randomized study. Slight decrements in sexual function scores were noted with contraceptive ring use and in several sexual domains, whereas slight increases were noted with patch use. However, authors concluded that these changes are not likely to be clinically significant \[[@B63]\]. Recently, a prospective cohort study, including data from 1983 women aged 14 to 45 years, found less interest in sex in women using the estrogen-progestin vaginal ring and DMPA, compared to nonhormonal contraception (copper IUD) use. A neutral effect on sexual desire was found in women using estrogen-progestin patch \[[@B64]\]. DMPA association with a lower sexual function was also supported by users who reported not finding sex pleasurable, compared to copper IUD users, and feeling anxious before sex, but this last difference was not statistically significant \[[@B64]\]. Nelson had also reported that 5.8% of women using DMPA have negative complaints on libido \[[@B65]\]. In contrast, no association was found between the use of DMPA injection and sexual interest among adolescent users when comparing various hormonal contraceptives \[[@B66]\]. Another study that evaluated OC vs. injectable progestin in their effect on sexual behavior found that COC users had lower levels of FT compared with DMPA users, but they were not different in sexual function \[[@B67]\]. Similarly, no difference was found in sexual interest of an adolescent population comparing DMPA users to nonusers of any hormonal method of contraception \[[@B68]\]. 3.3. Long-Acting Reversible Contraception {#sec3.3} ----------------------------------------- LARC methods include LNG and copper IUDs, and the etonogestrel subdermal implants. LARC provides at least three years of continuous pregnancy protection and is highly effective (\>99%) because it is not subject to errors in use that often reduce effectiveness of SARC \[[@B69]\]. In most studies, hormonal IUD did not alter sexual functioning, but some women who used an IUD had increased sexual desire or an overall improvement in their sex life. In a study of 200 women using the levonorgestrel-releasing intrauterine system (LNG-IUD), a significant beneficial effect of this method on sexual functioning (sexual desire and arousal) was found, compared to control groups of women using a different type of IUD and with women using no contraception \[[@B70]\]. Other studies have also reported high rates of satisfaction with both IUDs, hormonal and copper, but no difference in sexual function \[[@B64], [@B71]\]. Available evidence on the sexual effects of the hormonal IUD is based on the LNG-IUD with total content of 52 mg (20 mcg / 24 h). Until new data, it seems plausible to extrapolate these results to the newest IUD containing 13.5 mg of LNG. Data on contraceptive implants and sexual health are more inconclusive. A lack of interest in sex was established in women using the progestin implant versus the use of a nonhormonal contraceptive \[[@B64]\]. Gezgine et al. found that 2.5% of women had the implant removed due to decrease of libido \[[@B72]\]. Anorgasmia after etonogestrel implant insertion as a possible rare adverse event was reported, quickly reversible with implant removal \[[@B73]\]. However, as already mentioned, nonoral hormonal contraception increased the positive indicators of female sexual function in a number of studies \[[@B29], [@B60], [@B61]\]. Guida et al. randomly assigned three groups of women to the contraceptive ring, COC (20 mcg EE/150 mcg desogestrel), or a control group. Women in both the ring and the COC group reported a global improvement of sexual function compared to women not using hormonal contraception \[[@B74]\]. These three groups were later compared with a new group of women, treated with a subdermal hormonal contraceptive containing 68 mg etonogestrel. A significant increase in the frequency of sexual intercourse, personal initiative, numbers of orgasm, and satisfaction has been observed in the group using subdermal hormonal contraception, compared to all other groups. As authors recognized, the major limitation of the study is that patients have been enrolled in two different periods. Nevertheless, all hormonal contraceptives tested seemed to have a positive effect on some aspects of sexual function in the users. The authors also concluded that subdermal hormonal contraceptive is better for women\'s sex life but its effect is slower compared to other hormonal contraceptives, because the sexual increments were effective only after six months \[[@B75]\]. In the same way, another study of the etonogestrel implant showed no negative effects on libido and on female sexual function \[[@B76]\]. 4. Important Considerations about Sexual Health of Hormonal Contraception Users {#sec4} =============================================================================== Prior to starting hormonal contraception, it is necessary to evaluate the patient for contraindications and risks associated with this group of contraceptives. Based on this assessment and according to woman\'s preference, a method is recommended. It is also relevant to consider the impact that various hormonal contraceptives may have on sexual function when prescribing these methods to any woman. In fact, an assessment of sexual problems should be a part of every comprehensive woman\'s health visit. Women who discussed their sexual concerns with their clinician found the discussion helpful. In a questionnaire study of over 1000 women seen for a primary care visit, 98% reported at least one sexual complaint and only 18% of clinicians asked about their sexual health \[[@B77]\]. The World Health Organization (WHO) and the United States\' Centers for Disease Control and Prevention (CDC) guidelines on contraceptive use do not mention the potential effects of hormonal contraceptives on women\'s sexuality \[[@B78], [@B79]\]. Yet, screening patients for preexisting FSD and informing them of the possible sexual side effects of hormonal contraception are important \[[@B43]\]. In the largest United States study of FSD, Prevalence of Female Sexual Problems Associated with Distress and Determinants of Treatment Seeking (PRESIDE), among approximately 3000 women identified with a distressing sexual problem, only 6% scheduled a medical visit specifically for a sexual complaint \[[@B6]\]. The mixed results on the interaction between the use of hormonal contraception and female sexual function do not allow absolute recommendations. However, possible sexual side effects require that they be considered and, when present, a therapeutic approach should be initiated. As here reviewed, COCs with association of DRSP/EE, or gestodene/EE and LNG/EE, seem to be good choices for women with sexual issues because FSD symptoms are less likely to occur \[[@B27], [@B30], [@B44], [@B45], [@B47]\]. In daily clinical practice, the choice of a progestogen with a more androgenic action to enhance female sexual function seems to be a commonsense choice rather than an evidence-based one. In this sense, studies also suggest that women with COC-associated FSD can improve several sexual domains after switching to a combined E2V/DNG pill or to a COC containing E2/NOMAC \[[@B56]--[@B58]\]. It is also true that concerns about the different dosages of EE or about the elimination of the hormone-free interval in modern oral contraceptives as modulatory factors of female sexual function seem negligible \[[@B27]--[@B30], [@B47], [@B48]\]. Available evidence on the sexual impact of the hormonal LARC methods seems reassuring, especially LNG-IUD \[[@B64], [@B70], [@B71]\]. Hormonal IUD presents as a possible first-line alternative method of hormonal contraception to women who experience FSD with SARCs and do not desire fertility in a near future. Sexual domains should not only be evaluated before starting hormonal contraception, but they should also be reviewed regularly. Physicians should ask open-ended questions regarding sexual health, rather than wait for women to initiate the conversation \[[@B80]\]. If left untreated, sexual problems can have a negative impact on the quality of life, self-esteem, and interpersonal relationships of these women. A multidisciplinary approach, involving trained specialists and psychologists, is important when FSD is diagnosed. Conversely, hormonal contraception-related sexual impairment, when early detected, will allow these women to maintain reliable contraceptive choices, by having an informed conversation with the physician and discussing other options, as the switch of formulations or the route of administration. Changes in desire and sexual satisfaction during hormonal contraception are important elements that might relate to acceptability, compliance, and continuation of effective contraception \[[@B29], [@B36]\]. 5. Concluding Remarks {#sec5} ===================== Sexual specific effects of hormonal contraceptives are not well studied. The literature shows significant disagreement among studies on this topic, mainly because different methodologies are used. Only a few reports have attempted to address this issue amid immense scientific research into the adverse effects of hormonal contraception. And most of those who addressed sexual dysfunction in women did not assess whether sexual issues are associated with personal distress, a key finding for the diagnosis of FSD. This review suggests that hormonal contraception can cause female sexual response impairment. The how and to whom are open critical questions. Estrogens and androgens play a role in female sexual function, but the magnitude of their effects needs further investigation. Several studies have linked hormonal contraception to negative effects of sexual function, but also to a neutral effect, or an improvement in the sexual domains, compared to women who do not use hormonal methods or who do not use any type of contraception. The multifaceted nature of female sexual function shows the importance of ascertaining of a temporal relationship between the onset of sexual complaints and initiation of a hormonal contraceptive. There are so many factors that affect the sexual response that the positive or negative impact attributable to hormonal contraception can be covered. On the other hand, the diagnosis of FSD requires a holistic assessment where the use of a hormonal contraceptive can sometimes be mistakenly regarded as the perfect suspect. It is also clearly possible that the sexual behavioral impact of exogenous administration of progestogens and/or estrogens varies in women, which would explain that negative or positive effects are restricted to subgroups. It is not yet possible to predict which women are likely to experience adverse effects of hormonal contraception on their sexuality, nor which oral formulations or nonoral routes of administration are most likely to be responsible. It is important to highlight the individuality of each woman\'s sexual health, increasing the complexity of this field. In order to improve compliance with hormonal contraceptives, it seems appropriate to incorporate women\'s sexual health into contraceptive counseling and to maintain the assessment of sexual function as an integral part of follow-up consultations. Hormonal contraception is a milestone in women\'s health and any approach to maximizing its benefits should be a priority. CDC: : Centers for Disease Control and Prevention COC: : Combined oral contraceptive DMPA: : Depot medroxyprogesterone acetate DRSP: : Drospirenone E2: : Estradiol EE: : Ethinylestradiol E2/NOMAC: : 17*β*estradiol and nomegestrol acetate E2V/DNG: : Estradiol valerate and dienogest FDA: : Food and Drug Administration FSD: : Female sexual dysfunction FSH: : Follicle-stimulating hormone FT: : Free testosterone HPO: : Hypothalamic-pituitary-ovarian IUD: : Intrauterine device LARC: : Long-acting reversible contraception LH: : Luteinizing hormone LNG: : Levonorgestrel LNG-IUD: : Levonorgestrel-releasing intrauterine system OC: : Oral contraceptive POP: : Progestin-only pill SARC: : Short-acting reversible contraception SHBG: : Sex hormone-binding globulin WHO: : World Health Organization. Disclosure ========== The authors declare that there was no financial support. Conflicts of Interest ===================== The authors declare that they have no publishable conflicts of interest. Authors\' Contributions ======================= All authors listed on submitted manuscript have read and agreed to its content and meet the authorship requirements as detailed. [^1]: Academic Editor: Robert Gaspar
Manage junk email with the Block Senders and Safe Senders lists To automatically put spam in the Junk Email folder, use the Blocked Senders List. To prevent emails from being marked as junk, add them to the Safe Senders List. Prevent trusted senders from being blocked By adding email addresses and domain names that you trust to the Safe Senders List, you instruct Outlook that messages from those sources are never to be considered as junk. If you belong to mailing lists or distribution lists, you can add these names to your Safe Recipients List. To add a person to the Safe Senders List, click a message from the sender, and then click HOME. In the Delete group, click Junk, and then click Never Block Sender. To add an email address or domain to the Safe Recipients List, click a message from the sender, and then click HOME. In the Delete group, click Junk, and then click Never Block this Group or Mailing List. If you don’t have a message from the person, you can still manually add email addresses or domains to these lists by doing the following: Click HOME. In the Delete group, click Junk, and then click Junk Email Options. Do one of the following: To add safe senders, on the Safe Senders tab, click Add. To add safe recipients, on the Safe Recipients tab, click Add. In the Enter an email address or Internet domain name to be added to the list box, enter the name or address that you want to add. For example, you can add: a specific email address, such as someone@example.com an Internet domain, such as @example.com, or example.com Click OK and repeat for each entry that you want to add. If you want all Contacts to be considered safe senders, select the Also trust email from my Contacts check box on the Safe Senders tab. Some people whom you correspond to might not be listed in your Contacts. If you want all such people to be considered as safe senders, select the Automatically add people I email to the Safe Senders List check box. If you have existing lists of safe names and addresses, you can move that information into Outlook. Click Import from File and browse for the list file that you want. To create a file that uses your current list, click Export to File, and then specify where you want the new file saved. To change a name on either list, click the name that you want to change and then click Edit. To remove a name, click the name that you want and then click Remove. If you are using a Microsoft Exchange Server account, all of the names and email addresses that are in your organization's address book — also known as the Global Address List — are automatically considered safe. Block messages from someone Messages from email addresses or domain names in the Blocked Senders List are always treated as junk. Outlook moves any detected incoming message from senders in the Blocked Senders List to the Junk Email folder, regardless of the content of the message. Note: The Outlook Junk Email Filter doesn’t stop junk email from being delivered, but instead diverts suspected spam to the Junk Email folder. You can change the sensitivity of the Junk Email Filter by changing its level of protection, or use third-party solutions, which can be more aggressive. To add someone to the Blocked Senders List, click a message from the sender, and then click HOME. In the Delete group, click Junk, and then click Block Sender. If you don’t have a message from the person, you can still manually add email addresses to the Blocked Senders List: Click HOME. In the Delete group, click Junk, and then click Junk Email Options. On the Blocked Senders tab, click Add. In the Enter an email address or Internet domain name to be added to the list box, enter the name or address that you want to add. For example, you can add: a specific email address, such as someone@example.com an Internet domain, such as @example.com, or example.com. Click OK and repeat for each entry that you want to add. Notes: If you have existing lists of safe names and addresses, you can move that information into Outlook. Click Import from File and browse for the list file that you want. To create a file that uses your current list, click Export to File and then specify where you want the new file saved. To change a name on the list, click the name that you want to change and then click Edit. To remove a name, click the name that you want and then click Remove. If you are using a Microsoft Exchange account, all of the names and email addresses that are in your organization's address book — also known as the Global Address List — are automatically considered safe and can’t be added to the blocked list. It's from the email address: bounce@fabrikam.com. To automatically move it and future emails from this address to the Junk email folder, you add it to the blocked senders list. We click HOME, Junk, and then Block Sender. Outlook displays a message confirming you added the address to the blocked senders list. Click OK and we see the emails in the Junk E-mail folder. To confirm the addresses in the blocked senders list, we click HOME, Junk, Junk E-mail Options, the Blocked Senders tab, and there it is. If we want to block all emails from fabrikam.com, click Edit, select the @ symbol, and all of the text to the left and press Delete. Click OK, and OK again. The information bar near the top of each email describes how Outlook changes what it considers to be the Junk email. This is a Microsoft Exchange Server email account. So emails in the Junk email folder are deleted thirty days after they are received, unless your email administrator changed it to a period other than thirty days. If you are not sure if you have an Exchange Server account, click FILE, Account Settings, and Account Settings again. On the E-mail tab, the Type column lists the type of account for each entry. A Microsoft Exchange Server account is listed as Microsoft Exchange. It is important to note that an Exchange ActiveSync account is not an exchange server account. From all exchange and non-exchange server accounts, links and other functionalities are disabled in emails that are in the Junk E-mail folder, unless you enabled them in Junk E-mail Options. For information about Junk E-mail Options, see Movie 1: Control spam. If you trust the sender of an email, move it to your Inbox, then click the links. To help improve the effectiveness of the Junk email filter, you can report Junk email directly to Microsoft using the Microsoft Junk Email Reporting add-in for Outlook. For more information and to download it, see the link in the course summary at the end of the course. It's a good idea to check your Junk E-mail folder on a regular basis. To see if legitimate emails were moved there, and to delete the rest. This email was sent from my friend Meghan. It's not junk. To move it to the Inbox and prevent the future emails from her being marked as Junk, I'll add her address to the safe senders list. I click the email, click HOME, Junk and then Not Junk. Outlook displays a message saying it is going to move the email back to the Inbox. And, because Always trust e-mail from Meghanf@treyresearch.com is checked, future emails from her will not be marked as Junk. I click OK and we see that the email has been moved to the Inbox. To see her address in the safe senders list, we click Junk, Junk E-mail Options, the Safe Senders tab, and there it is. If your email address is in Outlook contacts, which is pretty common, we recommend you uncheck Also trust email from my Contacts. Spammers can send an email to you that looks like you sent it. Unchecking this option prevents these emails from being automatically considered safe by Outlook. If you use a Microsoft Exchange Server account, all names and addresses in your organization's shared address book, referred to as the Global Address List or GAL, are automatically considered safe. Now you have a good idea about how to control spam in Outlook. Of course, there's always more to learn. So, check out the course summary at the end, and best of all, Explore Outlook 2013 on your own.
"Exposes the instances directly reachable from a given instance." shared sealed interface References/*<Instance>*/ // could be generic satisfies {<ReachableReference/*<Instance>*/->Anything>*} { "The instance" shared formal Anything/*<Instance>*/ instance; "The references that are reachable from the [[instance]]." shared formal Iterable<ReachableReference/*<Instance>*/> references; }
Lady Gaga set to make guest appearance in The Simpsons The singer says recording her voice-over was "one of the coolest things ever" Lady Gaga is set to appear in The Simpsons, producers of the long-running cartoon US show have confirmed. The singer, whose real name is Stafani Germanotta, recorded her voice-over earlier this month. She's described the experience as "one of the coolest things I've ever done". The episode, titled Lady Goes Gaga, will air in America in spring 2012 and is likely be shown in the UK later in the year. 'Iconic personalities' The 25-year-old told Entertainment Weekly: "I make music, but I don't do voice-overs every day of the week and their characters are so awesomely convincing and sincere and wild and funny, I had to remind myself constantly of the sincerity of the humour. "That's what I was trying to focus on, not putting on a character too much and really being as sincere as I could with the lines." Since the very beginning, I've always wanted to have on the most iconic personalities of our time, and she's itMatt Groening, Simpsons creator In the episode, the singer comes to Springfield to cheer up Lisa, who's been suffering from low self-esteem. Lady Gaga revealed that her character ends up kissing Marge, saying, "the apple doesn't fall far from my artistic tree". Producers of The Simpsons said they were impressed by her voice acting and ad-libbing skills. Matt Groening, who created the show, said: "Since the very beginning, I've always wanted to have on the most iconic personalities of our time, and she's it." Yeardley Smith, who voices Lisa Simpson, told American website Broadway: "This is extraordinary! I'm stunned that she has time in her schedule that she's coming to our studio to record." Gaga briefly appeared in the Simpsons once before as Elton John's Golden Globes date, but she did not voice the character that time.
Q: How to set object to AsyncState and pass it into AsyncCallback method Two questions: How do I pass arguments to the AsyncCallback method? How do I invoke the AsyncCallback method? Here's the background: I am working on an old project in .NET Framework 3.5. I want to create an async method doing some works without blocking current thread. Since the project is an old version Async Await key words are not available, I plan to do all parallel works including some database queries and api calling in AsyncCallback method. I know AsyncState can be used to convey arguments. Because I need multiple arguments, I plan to include these arguments into an object and set the object to AsyncState, so I can cast AsyncState as the object to be used in AsyncCallback method. I didn't find a good way. I've found this link, but I don't use HttpWebRequest. public Class ArgumentObject { public string A{get;set;} public string B{get;set;} ... } public void CallBack(IAsyncResult result, ArgumentObject arObj) { Console.WriteLn(arObj.A); Console.WriteLn(arObj.B); } The following are the code which call the AsyncCallBack method. var argumentsObj=new ArgumentObject{ A="argument1", B="argument2"..}; AsyncCallback callback = (IAsyncResult result) => CallBack(result, argumentsObj); // How do I know it is triggered? I set the break point into CallBack method, but it never goes to there. Any idea or correction is appreciated. A: Update: I finally found a way to pass arguments. I use a delegate and call BeginInvoke method. static int DoSomething(string s, int t) { Console.WriteLine(s+t.ToString()); return 0; }// this is the delegate method, you can define it anyway. public delegate int MyDelegate(string s, int t); MyDelegate x = new MyDelegate(DoSomething); AsyncCallback callback = new AsyncCallback(CallBack); var argumentsObj=new ArgumentObject{ A="argument1", B="argument2"..}; IAsyncResult ar = x.BeginInvoke("hello", 12, callback, argumentsObj); // in my case, the first two parameters are not important, only the last two are important. Now in Callback method I can cast the AsyncState into argument object: var obj = (CallBackObj)result.AsyncState; In CallBack method, don't forget to call EndInvoke method in order to guarantee not to leak memory or handles MyDelegate x = (MyDelegate)((AsyncResult)result).AsyncDelegate; x.EndInvoke(result);
A capacitance video disc system has been described by Clemens in U.S. Pat. No. 3,842,194. The disc described comprises a plastic disc containing an information track having audio, video and color information in the form of a surface relief pattern arranged in a spiral groove on the surface of the disc which can be played back with a stylus. The video disc of Clemens had a conductive metal coating to provide the conductivity required for capacitive pickup and a thin layer of a dielectric material thereover. An electrode on the playback stylus completed the capacitor. This system can also be employed to store information in any form of surface relief pattern, e.g., digital form. Improvements have been made in this system whereby the disc is made from a conductive plastic material, as disclosed by Fox et al in copending application Ser. No. 818,279, filed July 25, 1977 now abandoned. A polyvinylchloride based molding composition is mixed with sufficient amounts of finely divided carbon black particles so that the resulting composition has the conductivity required for capacitive playback. A thin layer of the polyvinylchloride surrounds each of the conductive carbon particles so that a thin dielectric layer is present at the surface. Improvements to the conductive molding composition are described by Martin et al in copending application Ser. No. 003,363, filed Jan. 15, 1979, now U.S. Pat. No. 4,228,050. The use of a conductive plastic eliminates the need for separate metal and dielectric layers on the disc surface and thus has simplified manufacture of the disc. However, we have found the stability of these discs with respect to environmental fluctuations of temperature and relative humidity has been less than satisfactory. Discs which on initial playback have excellent playback characteristics, deteriorate with respect to playback after storage under ambient conditions. This deterioration is particularly marked when the discs are exposed to high temperature, high relative humidity conditions. Huck et al in a copending application entitled "Video Disc Processing", filed Nov. 7, 1979, Ser. No. 091,878, have disclosed that video discs that have been cleaned with an aqueous solution have improved stability of playback characteristics to changing environmental conditions. Water alone or dilute solutions of acids or bases remove metal salts and organic materials on the surface of the disc which contribute to moisture sensitivity of the disc.
Log message: py-policyd-spf: updated to 2.0.2 2.0.2 (2017-12-14) * Fix treatment of No_Mail configuration parameter so that specifying No_Mail = False (the default) does not cause incorrect results * Conditionally import authres is Header_Type is AR and raise an error if it is missing (sorry pep-8) to avoid cases where users change the config and suddenly it doesn't work for an example, see: https://bugzilla.redhat.com/show_bug.cgi?id=1208876 * Update and correct Mail_From_pass_restriction description in policyd-spf.conf(5 () * Update HELO checking default option in policyd-spf.conf(5) * Note that SPF_Not_Pass is not consistent with RFC 7208 in the HELO checking section of policyd-spf.conf(5) - already documented for Mail From Log message: Updated py-policyd-spf to 2.0.1. Mark as not supportin python-2.x per the 2.0.0 release notes (see below). --- 2.0.1 (2016-12-08) * Man page formatting and spelling corrections * Corrected default debug level (LP: #1647089) * Amplified loging level '-1' description * Forward port version 1.3.2 fixes for detection of missing Authserv_Id that were inadvertently not brought back to trunk --- 2.0.0 (2016-12-02) ! No longer python2 compatible, minimum python3 version is 3.3 for ipaddress ! Removed support for use of ipaddr ! Changed default for HELO checking from SPF_Not_Pass to Fail (same as MailFrom) even though I think Not Pass makes more sense in order to still the complaints (Fedora, you can drop your sed call in the spec file now). (LP: #1571144) ! Changed default for Authserv-ID to use local hostname to provide a reasonable default Authserv-ID. (LP: #1575608) ! Increased minimum pyspf (python-spf) version to 2.0.9 so that Void_Limit is always available and used. ! Added new Hide_Receiver option to prevent accidental disclosure of BCC receivers and enabled it by default to maximize privacy. (LP: #1394294) ! Changed the name of the defaultSeedOnly option to TestOnly. The previous name is still accepted, but an error is logged. The old name is a legacy from the greylising functionaliy in tumgreyspf (from which this was forked in 2007). The new name better reflects what the option does. + Added new Reason_Message option to allow for custom reject/defer message (LP: #1422324) - Thanks to Bastian Blank for the significant patch + Added support for RFC 7372 email authentication specific enhanced status codes as well as an option to use standard Postfix codes instead + Added new HELO_Whitelist option to allow for whitelisting from SPF checks based on specific HELO/EHLO names (LP: #1602761) + Added new Whitelist_Lookup_Time to allow for adjustments on the maximum time allowed for whitelist related DNS lookups to complete - This should also help with LP: #1622137 + Refactored and extended per user configuration to work for more configuration options + Added new 'None' option for Header_Type. When set, no header field of any kind is added to the message (LP: #1531724) + Added new Mock option for enhanced interoperability with downstream milters - See policyd-spf.conf.5 for details * Fix additional cases of choking on invalid email addresses (LP: #1342105) * Reviewed and refactored logging to provide logging details at various detail levels more consistent with the documentation. Also added a new log level, '-1' for completely silent running. * Added a new PERFORMANCE CONSIDERATIONS section to policyd-spf.1. * Fix python3 incompatibility in cases where HELO name is somehow missing (LP: #1184102) * Improved per-user settings processing to avoid issues with multiple or incorrect header fields being appended to multi-recipient messages * Refactored processing for the No_Mail option to use the pyspf cache from the previous SPF query rather than a new DNS lookup - should help with LP: #1622137 * Fixed an issue that may have caused issues with multi-recipient use of restriction classes * Fixed a typo in policyd-spf-peruser.5 that made the example configuration file invalid Log message: Import pypolicyd-spf version 1.3.2 as mail/py-policyd-spf. This is python-policyd-spf, an external policy checker for the postfix mail server. It will use pyspf to check SPF records to determine if email should be rejected by your server. Based on https://github.com/joyent/pkgsrc/pull/421 by Coy Hile.
1893 Boston College Eagles football team The 1893 Boston College Eagles football team represented Boston College during the 1893 college football season. Schedule References Boston College Category:Boston College Eagles football seasons Boston College Eagles football
Sulfitobacter sabulilitoris sp. nov., isolated from marine sand. A Gram-stain-negative, aerobic, non-motile and ovoid or rod-shaped bacterial strain, HSMS-29T, was isolated from a marine sand sample collected from the Yellow Sea, Republic of Korea. The neighbour-joining phylogenetic tree of 16S rRNA gene sequences showed that strain HSMS-29T fell within the clade comprising the type strains of Sulfitobacter species. Strain HSMS-29T exhibited 16S rRNA gene sequence similarities of 97.2-98.4 % to the type strains of Sulfitobacter mediterraneus, Sulfitobacter porphyrae, Sulfitobacter marinus, Sulfitobacter pontiacus, Sulfitobacter litoralis, Sulfitobacter brevis, Sulfitobacter noctilucicola and Sulfitobacter dubius and 96.3-96.9 % to the type strains of the other Sulfitobacter species. The genomic ANI values of strain HSMS-29T with the type strains of S. mediterraneus, S. marinus, S. pontiacus, S. litoralis, S. brevis, S. noctilucicola and S. dubius were 72.66-74.99 %. The DNA-DNA relatedness value between strain HSMS-29T and the type strain of S. porphyrae was 17 %. Strain HSMS-29T contained Q-10 as the predominant ubiquinone and C18 : 1 ω7c as the major fatty acid. The major polar lipids of strain HSMS-29T were phosphatidylcholine, phosphatidylethanolamine, phosphatidylglycerol, one unidentified aminolipid and one unidentified lipid. The DNA G+C content of strain HSMS-29T was 65.0 mol% (HPLC) or 64.4 % (genome analysis). Distinguished phenotypic properties, along with the phylogenetic and genetic distinctiveness, revealed that strain HSMS-29T is separated from recognized Sulfitobacter species. On the basis of the data presented here, strain HSMS-29T is considered to represent a novel species of the genus Sulfitobacter, for which the name Sulfitobactersabulilitoris sp. nov. is proposed. The type strain is HSMS-29T (=KACC 19870T=NBRC 113549T).
// Ryzom - MMORPG Framework <http://dev.ryzom.com/projects/ryzom/> // Copyright (C) 2010 Winch Gate Property Limited // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU Affero General Public License as // published by the Free Software Foundation, either version 3 of the // License, or (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see <http://www.gnu.org/licenses/>. #include "stdpch.h" // #include "brick_types.h" // #include "nel/misc/debug.h" #include "nel/misc/string_conversion.h" /* * Binding brick family -> EBrickType is done in brick_families.cpp */ namespace BRICK_TYPE { NL_BEGIN_STRING_CONVERSION_TABLE (EBrickType) NL_STRING_CONVERSION_TABLE_ENTRY(MAGIC) NL_STRING_CONVERSION_TABLE_ENTRY(COMBAT) NL_STRING_CONVERSION_TABLE_ENTRY(FABER) NL_STRING_CONVERSION_TABLE_ENTRY(FORAGE_PROSPECTION) NL_STRING_CONVERSION_TABLE_ENTRY(FORAGE_EXTRACTION) NL_STRING_CONVERSION_TABLE_ENTRY(HARVEST) NL_STRING_CONVERSION_TABLE_ENTRY(TRACKING) NL_STRING_CONVERSION_TABLE_ENTRY(SHOPKEEPER) NL_STRING_CONVERSION_TABLE_ENTRY(TRAINING) NL_STRING_CONVERSION_TABLE_ENTRY(MISCELLANEOUS) NL_STRING_CONVERSION_TABLE_ENTRY(COMMERCE) NL_STRING_CONVERSION_TABLE_ENTRY(SPECIAL_POWER) NL_STRING_CONVERSION_TABLE_ENTRY(PROC_ENCHANTEMENT) NL_STRING_CONVERSION_TABLE_ENTRY(TIMED_ACTION) NL_STRING_CONVERSION_TABLE_ENTRY(BONUS) NL_STRING_CONVERSION_TABLE_ENTRY(UNKNOWN) NL_END_STRING_CONVERSION_TABLE(EBrickType, Conversion, UNKNOWN) EBrickType toBrickType(const std::string &str) { return Conversion.fromString(str); } const std::string &toString(EBrickType type) { return Conversion.toString(type); } }; // BRICK_TYPE
Florida Virtual School (FLVS), a statewide public school district in the state of Florida and international provider of education products and services, has selected D2L, a global learning technology provider, to deploy its Brightspace platform as the district’s new learning management system (LMS). FLVS, the largest fully accredited online state public school in the U.S., had nearly 400,000 completed semester enrollments in the 2015-16 academic year. The Brightspace platform includes a number of advantages that were key elements in its selection by FLVS. Since the platform incorporates personalized learning, teachers can deliver their lessons with much greater flexibility and give each student the personal experience they need to succeed. Brightspace was designed with modern students in mind and offers a clean, responsive user experience as well as integrated social media, chat and advanced video features. The new Brightspace Daylight experience is built from the ground up to work on any device and be fully accessible so students and teachers can use smartphones, tablets or any browser-enabled device. Additionally, Brightspace includes real-time learning analytics to provide teachers with engagement data that can help them improve student outcomes. “FLVS was the first statewide internet-based public high school in the United States when we were founded in 1997, and we have continued to strive to remain on the cutting edge of online learning ever since,” said Ronald Blocker, president and CEO of FLVS. “Today, students have more advanced needs than ever before, and techniques like game-based learning, personalized learning, real-time analytics and social learning have become essential. This is why D2L became the clear choice for us — its understanding of how to meet the challenges faced by the modern student is unmatched. In particular, Brightspace is designed to improve student achievement, a critical metric for FLVS. We are looking forward to rolling Brightspace out to our students so they can experience the next chapter in online learning.” “We’re delighted to be working with the largest state virtual school in the U.S. D2L takes pride in partnering with innovative Kindergarten-12 organizations who care deeply about the best educational experience,” said John Baker, CEO of D2L. “FLVS is an online learning pioneer and their leadership on the student experience is an inspiration to all of us at D2L. We look forward to building on that success with a great partnership and delivering outstanding student outcomes with personalized learning.”
Feature If there’s one thing to say about Western Washington’s Skagit Valley, home to that little Bread Lab that’s smashing everyone’s ideas about wheat into sad little pathetic pieces, it’s that these people are jacked on farming. The drive up to Mount Vernon is a straight shot from Seattle, and once you’ve entered the Valley’s hallowed ground, the signs begin in earnest: tune in to 1630 AM for crop reports and farm history on “InFARMation,” a program put on by Skagitonians to Preserve Farmland and the Skagit Valley College radio station. State Route 536 is not just the scenic route, it’s the agricultural scenic route. When I approach the address I’ve been given for Dr. Stephen Jones’s now-renowned lab, I half-expect to just drive up to the edge of a wheat field and wade through it until I run into someone. What I actually encounter is a stolid little building right off the main drag, a few cars parked in the lot, with greenhouses and fields visible in the distance. This lab looks unassuming, sure, but it has established itself as the anchor of a massive sea change in the food industry. Since being given the star treatment in Dan Barber’s The Third Plate, they’re often brought on as a sort of expert witness in the larger conversation around our food systems; their existence proof that something good is happening, that it’s not all completely fucked. Or that it is, but at least there’s hope. As a result of this sudden exposure, the story of ringmaster Stephen Jones is well-known to most by now. His love affair with wheat that began as a Chico State student in 1977 with five acres to cultivate a crop of his choice (“I had a ‘48 Ford pickup, and I’d go out in the afternoons and have a beer and sit on the roof of that truck, just looking at my wheat. Just staring at it, for months and months,” he says, a little dreamily) his passion for baking handed down from his Polish grandmother, his hatred of the commodity game and eventual rejection of it, his fierce loyalty to farmers. He indulges, and encourages, every facet of a curious mind. “Besides being scientists, we’re poets and musicians. I think that’s really important. We talk about art, not in a stupid way, about how it intersects with how we go about our jobs, as opposed to just sitting at the bench and cranking through stuff, looking through a microscope,” he says. “We try to not be reductionist, which is tough to do...we have to make a conscious effort to not fall into the comfort of just being scientists.” He is a true believer in the political and philosophical ideal through whatever means possible, and his unwavering conviction has brought together a group of people that in any other circumstance might seem destined to fracture—a deeply spiritual baker alongside matter-of-fact geneticists—if not for the fact that they are all completely captivated by the same crop, and by Jones himself. Did they have a book club? run into each other at the salad bar at WF? Fries with kale sandwich a coffee and beer diet Gluten free me please Rode the Peugeot in Haikus written when baking whose wall is it on —Bread Lab chalkboard poems, January 12, 2015 There is a print-out illustration of a brain taped at the exact center of the Bread Lab’s test kitchen. To the left, there are traditional scientific accoutrements; scales, microscopes, beakers. To the right, there’s a huge custom-made stone mill, a multi-story oven, and stacks of wicker baskets lined with cloth for resting loaves. It is a perfect, literal meeting of the minds, and it was designed that way intentionally. Two years ago, when the work began to attract attention from big deal chefs like Barber and Tartine’s Chad Robertson, it became obvious that there was a need for a full-time baker to field questions. But it couldn’t just be anyone. It would have to be someone who had the balls to not only use 100% whole wheat, all the time, no cheating, they’d have to be able to perfect new techniques for doing so. “What I was looking for in a chef was somebody who would not be afraid to fail,” Jones says. Jonathan Bethony, a musician and theologian who had worked under whole grains guru Craig Ponsford, was floated as a possibility. “We flew him up, and he was just such a goofball. He gets super deep into it when he talks, and it’s so real. He talks about the love in his bread, and there’s no bullshit there. He’s an absolute perfect fit.” He and Jones share the same pious mindset towards baking, and they’re both a little eccentric when it comes to this stuff, Bethony says. There is a reason one is constantly quoted as being “haunted” by wheat, and the other can get so deep into the idea of bread-making as restoring a grain’s sense of true self that you forget where you are and what time it is. He's constantly humming with so many metaphors and psychic connections that when you walk out of there, you're blinking like you've just emerged from Plato's Cave. Whole grains are not just whole grains here. They require devotional attention, and under Jones, the science—along with the allegories and poetry—is seen as such. As resident baker, Bethony is charged with fusing the two fields, and translating it in such a way that the quality of the bread represents the work on both sides of the proverbial, and literal, room. He says there’s no real roadmap to the process when chefs come to rewire their brains, and this is where the intersection of the art and science becomes crucial. “It depends on the chemistry. Sometimes I just let bakers ‘play’ in the lab, but more often we are collaborating. In that way, it is like a jam session,” he says. The parallels to music are unavoidable: some like to improvise, and some are classicists. “We feel each other out until we sink into a groove, and that’s when the magic happens.” “Artisan bakers were not the problem. We’re being vindicated.” The magic, to Bethony and to chefs who will admit it, is actual magic: the way the dough surrenders to the will of the baker, he explains, locking each other into a dance. That's something chefs can relate to, that intimacy. The allure of whole grain comes without pretense, challenging as it is, partly because Bethony learned his craft on shitty flour too. “It’s just grains, but it brings up issues,” he says. He leans back against a counter, plastic tubs full of grains with funky names rising up behind him. Druchamp, Bobtail. “The whole gluten-free thing isn’t just about gluten, right. It’s about health and transparency and wondering where our food comes from. If I’m going to find the silver lining there, I think in the end it helps artisan bakers. Artisan bakers were not the problem. We’re being vindicated.” The road to vindication, as anyone who's ever had to fight for it, is never smooth. What we’re experiencing now, this embracing of the Bread Lab’s ideals at the upper levels of cuisine, is the result of years of pure, unforgiving work out of the spotlight done by Jones and his peers. Bread, real bread, that tastes like pure food, is a language we all speak. “I’ve spent 25 years of my career with people disagreeing with me. Whether it’s Monsanto or big ag or whatever, I can take it. I find energy in it,” Jones admits. “But it’s fulfilling to know that we’re on the right track.” This April, as a part of an expansion that will include testing facilities for milling, brewing and distilling, Blaine Wetzel, the chef of The Willows Inn on nearby Lummi Island, is set to head up a culinary lab on site. When they first met, he and Jones realized that they had each been working on the same thing, from different angles, within 100 miles of each other. “My real expectation is to discover ingredients that I wouldn’t have otherwise, and offer them in a way that exemplifies their uniqueness,” he says, hoping to deepen our understanding of grains the way Bethony has with bread. “The point is to dive into the food and get to know it better.” “Nobody is asking why we do things the way they are, really. There are a lot of questions to be answered, and that's what [the Bread Lab] stands for to me. Digging into it,” he adds. “There’s only like six types of wheat available on the West Coast. Why in the hell is that? They’re the ones looking into why we do what we’re doing, and what we could or should be doing, and they’re doing it to fix real-time issues in a farming area. The conversation needs to happen, and we’ve already seen that it moves everyone forward in more interesting ways.” He pauses for a moment before echoing a sentiment nearly everyone in the lab said some version of. “It’s always exciting to learn that you know nothing. It makes you question everything.” Colin Curwen-McAdams is a guy who speaks quickly, like every thought in his head is fighting for their chance to hit the air, but had no idea their mouthpiece would be a tall, soft-spoken, fleece-wearing graduate student. He’s been on Jones’s Perennial Wheat Project for about a year and a half, and also spends his time on developing novel seed colors in wheat. Blues, purples, blacks. If Wetzel spends his time extrapolating the possibilities within six strains of wheat, Curwen-McAdams is looking at thousands. “All these grains for our farmers are grown in rotation with something that makes a lot more money. What we’re trying to figure out is how to make this crop do more for them,” he explains, boots crunching along the gravel edges of the fields. “One way to do that is differentiating it and taking it out of the normal market. So that’s what I’m working on, first just the breeding side of it, and then we’ll move into what people want from it. The lag time in breeding is around ten years, so we have to start before we can get anywhere.” He and Bethany Econopouly (another grad student currently dehulling buckwheat by hand back in the warmth of the lab), don’t seem particularly ruffled by the intense scrutiny their work is suddenly under by the chef community. “A lot of us got into this because we had worked on farms, but we also love to eat and cook. We got into it for the broad public scale of it, and I think it’s great that people like [Barber] have been able to bring attention to it in this way,” he says, crouching to examine a few already visible differences between rows of just-sprouted wheat rows. “But how do we keep this something that everyone is involved in? If you go to a really nice restaurant, they’re very aware of different varieties and properties, but your normal person can still be eating your average plastic-wrapped white sandwich loaf, with no conception of what that means.” “There’s a lot of good to be done in not fighting, but doing the work. It’s tremendous. Being surrounded by these people is amazing.” Jones tells me later that he’s always mentioning how out-of-the-ordinary this attention is to his students. It’s not normal to rub elbows with famous chefs, or field reporters a few times a week. It’s one of the striking things about the people currently moving the global conversation forward: they are used to creating a faceless, nameless thing that goes off and makes someone—who isn’t them or the farmers they work with—a little money. Now that there is such a thing as celebrity wheat, this new generation of breeders is redefining the entire field. It’s stating the obvious to these students, but it’s a revelation for everyone else, and it allows them to see the attention for what it is. “It’s a really good way for us to have this other kind of interaction with the public. It keeps us on our toes, and it keeps us relevant in the community,” Econopouly says, perched at a table, buckwheat scattered before her. The late afternoon sun electrifies a few spiky wheat stalks laying around the room. “People immediately latch on to the breadmaking and the excitement about some of the chefs we work with, but then it allows us to highlight what the farmers and breeders are doing.” A spectrum of colored wheat, courtesy of Colin Curwen-McAdams. What sets The Bread Lab (and its upcoming extension) apart from almost all other chef-driven labs chipping away at what is possible in the realm of food—the Nordic Food Lab, the Momofuku Culinary Lab—is that they exist, first and foremost, for the farmers, not for culinary advancement. It may appear, based on their passion for bread, that it’s all about reclaiming flavor, but it has to work in terms of yield, in terms of cost, and ability to sell. Nutrition, flavor, everything else gets wrapped up into that package. It was the farmers, when they sensed that their Valley was in trouble, who rallied together to fund a place where their problems could be solved and brought this center into existence. For Jones, the benefits of the Bread Lab are threefold: it proves the possibility of whole wheat breads redolent with profound layers of flavor and nutrition; it supports the farmers and land he cares so vehemently for; and it reignites the idea that there are jobs for his students when they are done. “What’s very satisfying for me is ten years ago, I didn’t want any more students. That’s my job, to train people, but it got to the point where it was just like, Are we just training people for Monsanto? What are we doing?” he says. “The lab is driven by these PhD students. There’s a lot of good to be done in not fighting, but doing the work. It’s tremendous. Going into work and being surrounded by these people is amazing.” Back in the greenhouse, Curwen-McAdams is surrounded by waist-high shoots of winter wheat, all propped up on elevated carts which can be wheeled around for easy crosses all year. The air is damp and warm, and buckwheat towers overhead, flowering. A few plastic sleeves are draped over various couplings. Over the whir of the fans, he contemplates the future of the collaborations like the Bread Lab. “There are these local grain economies popping up, which is great to see, but then what you need next are local malting facilities or mills and the ability to process the grain for people who are interested,” he says, mentioning a few places in Arizona, North Carolina, and Vermont, where these kinds of projects are popping up. “So we’re not unique in that regard, but in terms of breeding and pushing all that stuff forward, that’s where we hit our stride.” “At least it’s fun, you know? Bread is something we all have a relationship with,” he adds, grinning. “The genetic stuff is fun on its own, but if you don’t like the crop...you don’t want to be taste-testing a bunch of okra all day in the field. Slimy! Less slimy! Fibrous! Less fibrous!” “When people like Marc Vetri call us from Italy saying they want to stop by and figure out wheat for his pasta that’s not a faceless, nameless thing,” Jones says, “That’s so cool. Knowing what our food is...it’s done with a sense of what’s right, and people all over the place are helping us figure that out.” Vetri, the James Beard Award-winning chef who maintains that Barber Jedi-mindtricked him into attending the conference at Stone Barns all those months ago, credits the Bread Lab with restructuring his entire mindset. He did call from Italy, he says, when he couldn't get Jones's voice out of his head as he watched nonnas fresh milling their pasta flour. He’s since become an outspoken supporter of the grain revolution, penning op-eds on Huffington Post and wants to set up a Bread Lab outpost on the East Coast. “Those guys literally changed my life. We built a whole new kitchen around this theory of milling, and the lab has been the incubator for all of this,” he says from his kitchen at Philadelphia’s Vetri. “He hit on something very unique, something that was thought about, but no one was doing anything about it." "That’s what innovators do," he continues. "They have the foresight and the imagination to move far beyond the general thinking, and make something amazing.” Vetri's right: the Bread Lab is something amazing. And it's not just because they make whole wheat baguettes that would buckle any Parisian's knees, and not because they've already been able to come up with game-changing strains of wheat that check off all of the boxes. It's because they have figured out how to exist at this junction of artful creation and scientific method, and know that if you've got a hunk of fresh, mind-blowing bread in your hand, you're more likely to look into the microscope and figure out why. “We don’t wave our hands and say ‘Local! Sustainable!’ We just do it. It’s matured to a point where we don’t have to wave our hands much,” Jones says. “If we can create something that makes sense, then at least people will have a choice. That’s what keeps us going.”
Cost-effectiveness analysis of the russian treatment scheme for tuberculosis versus short-course chemotherapy: results from Tomsk, Siberia. Tomsk Oblast, Siberia. To assess the cost-effectiveness of individualised Russian treatment and short-course chemotherapy (SCC) regimens for new WHO Category I tuberculosis patients. Analysis of costs incurred by the provider, the household and society as a whole for both treatment approaches, and a sensitivity analysis for SCC with hospitalisation for 2 weeks (patients theoretically at low risk of defaulting) and 2 months (patients theoretically at risk of defaulting). Outcomes were measured as cost per case cured and year of life saved, with cure rates based on a locally conducted trial. The cost per cure using the individualised Russian treatment was US $2,295, vs. US $1,901 when using SCC. The costs per year of life saved were respectively US $123 and US $103. The cost per cure was US $1,457 for SCC with 2 months hospitalisation and US $556 for SCC with 2 weeks hospitalisation, with costs per year of life saved of US $79 and US $30, respectively. Major financial savings for both the provider and the household, with cure rates similar to those obtained with the Russian treatment scheme, can be achieved in Tomsk when embarking on SCC with 2 weeks and 2 months hospitalisation.
Structure-activity relationships and CoMFA of N-3 substituted phenoxypropyl piperidine benzimidazol-2-one analogues as NOP receptor agonists with analgesic properties. The N-3 position of a series of 3-phenoxypropyl piperidine benzimidazol-2-one analogues was optimised using the predictive power of a CoMFA model. The model was used to prioritise compounds for synthesis culminating in the triazole (+)-24. (+)-24 was found to be a high affinity, potent NOP agonist and demonstrated both antinociceptive and antiallodynic effects when administered iv to rodents.
The present invention relates to a device for measuring a discharge of liquid. In the past, it has been found desirable to obtain various data pertaining to a liquid discharge. In particular, it was discovered that many urological problems could be readily diagnosed by analyzing information obtained during the natural voiding of urine by patients. Presently, various types of devices are utilized to obtain data on the urine stream, such as total volume, average flow rate, force, velocity, and configuration of the stream. Most of these devices have suffered from less than total reliability because they have required the presence of one or more observers while the patient is voiding. It is obvious that administration of such devices in this manner creates sufficient psychological difficulties for many of the patients to effect voiding. Consequently, if the patients void at all, the potentially erroneous data obtained may result in a false diagnosis and a loss of confidence in the device by the physician. A further complication arises from the fact that many of these devices are rather bulky, and somewhat difficult to use.
#include <sasl/include/codegen/cg_sisd.h> #include <sasl/include/codegen/cg_intrins.h> #include <sasl/include/codegen/cg_impl.imp.h> #include <sasl/include/codegen/module_vmcode_impl.h> #include <sasl/include/codegen/cg_caster.h> #include <sasl/include/codegen/utility.h> #include <sasl/include/codegen/cgs.h> #include <sasl/include/semantic/semantics.h> #include <sasl/include/semantic/symbol.h> #include <sasl/include/semantic/caster.h> #include <sasl/include/syntax_tree/declaration.h> #include <sasl/include/syntax_tree/expression.h> #include <sasl/include/syntax_tree/program.h> #include <sasl/include/syntax_tree/statement.h> #include <sasl/enums/enums_utility.h> #include <eflib/include/diagnostics/assert.h> #include <eflib/include/utility/unref_declarator.h> #include <eflib/include/utility/scoped_value.h> #include <eflib/include/platform/disable_warnings.h> #include <llvm/IR/BasicBlock.h> #include <llvm/IR/Constants.h> #include <llvm/IR/Function.h> #include <llvm/IR/Module.h> #include <llvm/IR/IRBuilder.h> #include <eflib/include/platform/enable_warnings.h> #include <eflib/include/platform/boost_begin.h> #include <boost/format.hpp> #include <eflib/include/platform/boost_end.h> #include <functional> using namespace llvm; using namespace sasl::syntax_tree; using namespace sasl::utility; using sasl::semantic::symbol; using sasl::semantic::node_semantic; using sasl::semantic::tid_t; using sasl::semantic::caster_t; using eflib::scoped_value; using std::addressof; using std::any_cast; using std::weak_ptr; using std::vector; using std::string; using std::pair; using std::make_pair; #define SASL_VISITOR_TYPE_NAME cg_sisd BEGIN_NS_SASL_CODEGEN(); cg_sisd::~cg_sisd(){ } multi_value cg_sisd::emit_logic_op(operators op, shared_ptr<node> const& left, shared_ptr<node> const& right ) { visit_child(left); visit_child(right); if( op == operators::logic_or ) { return service()->emit_or( node_ctxt(left)->node_value, node_ctxt(right)->node_value ); } else { return service()->emit_and( node_ctxt(left)->node_value, node_ctxt(right)->node_value ); } } multi_value cg_sisd::emit_short_cond(shared_ptr<node> const& cond, shared_ptr<node> const& yes, shared_ptr<node> const& no ) { // NOTE // If 'yes' and 'no' expression are all reference/variable, // and left is as same abi as right, it will return a reference, // otherwise we will return a value. visit_child(cond); multi_value cond_value = node_ctxt(cond)->node_value.to_rvalue(); insert_point_t cond_ip = service()->insert_point(); insert_point_t yes_ip_beg = service()->new_block( "yes_expr", true ); if( cond != yes ){ visit_child(yes); } multi_value yes_value = node_ctxt(yes)->node_value; value_array yes_v = yes_value.load(); value_array yes_ref = yes_value.load_ref(); insert_point_t yes_ip_end = service()->insert_point(); insert_point_t no_ip_beg = service()->new_block( "no_expr", true ); if( cond != no ){ visit_child(no); } multi_value no_value = node_ctxt( no, false )->node_value; value_array no_ref = ( no_value.abi() == yes_value.abi() ) ? no_value.load_ref() : value_array(service()->parallel_factor(), NULL); value_array no_v = no_value.load( yes_value.abi() ); insert_point_t no_ip_end = service()->insert_point(); service()->set_insert_point(cond_ip); service()->jump_cond(cond_value, yes_ip_beg, no_ip_beg); insert_point_t merge_ip = service()->new_block("cond_merge", false); service()->set_insert_point(yes_ip_end); service()->jump_to(merge_ip); service()->set_insert_point(no_ip_end); service()->jump_to(merge_ip); service()->set_insert_point(merge_ip); multi_value result_value; Value* merged = service()->phi_(yes_ip_end.block, yes_v[0], no_ip_end.block, no_v[0]); value_kinds vkind = ( valid_all(yes_ref) && valid_all(no_ref) ) ? value_kinds::reference : value_kinds::value; result_value = service()->create_value( yes_value.ty(), yes_value.hint(), value_array(1, merged), vkind, yes_value.abi() ); return result_value; } SASL_VISIT_DEF( member_expression ){ EFLIB_UNREF_DECLARATOR(data); visit_child(v.expr); node_context* agg_ctxt = node_ctxt( v.expr ); assert( agg_ctxt ); // Aggregated value node_semantic* tisi = sem_->get_semantic(v.expr); node_context* ctxt = node_ctxt(v, true); if( tisi->ty_proto()->is_builtin() ){ // Swizzle or write mask elem_indexes swz_indexes = sem_->get_semantic(&v)->swizzle(); multi_value agg_value = agg_ctxt->node_value; if( is_scalar( tisi->value_builtin_type() ) ) { agg_value = service()->cast_s2v(agg_value); } ctxt->node_value = service()->emit_extract_elem_mask(agg_value, swz_indexes); } else { // Member symbol* struct_sym = sem_->get_symbol( tisi->ty_proto() ); symbol* mem_sym = struct_sym->find_this( v.member->str ); assert( mem_sym ); node_context* mem_ctxt = node_ctxt( mem_sym->associated_node(), true ); ctxt->node_value = mem_ctxt->node_value; ctxt->node_value.parent( agg_ctxt->node_value ); ctxt->node_value.abi( agg_ctxt->node_value.abi() ); } } SASL_VISIT_DEF( cond_expression ){ EFLIB_UNREF_DECLARATOR(data); node_ctxt(v, true)->node_value = emit_short_cond(v.cond_expr, v.yes_expr, v.no_expr); } SASL_VISIT_DEF(unary_expression) { EFLIB_UNREF_DECLARATOR(data); visit_child(v.expr); multi_value inner_value = node_ctxt(v.expr)->node_value; cg_type* one_tyinfo = service()->create_ty( sem_->get_semantic(&v)->ty_proto() ); builtin_types hint = inner_value.hint(); node_context* ctxt = node_ctxt(v, true); if( v.op == operators::negative ){ multi_value zero_value = service()->null_value( one_tyinfo->hint(), inner_value.abi() ); ctxt->node_value = service()->emit_sub(zero_value, inner_value); } else if( v.op == operators::positive ){ ctxt->node_value = inner_value; } else if( v.op == operators::logic_not ) { ctxt->node_value = service()->emit_not(inner_value); } else if( v.op == operators::bit_not ) { multi_value all_one_value = service()->create_constant_int( NULL, hint, inner_value.abi(), 0xFFFFFFFFFFFFFFFF ); ctxt->node_value = service()->emit_bitwise_bin_op(operators::bit_xor, all_one_value, inner_value); } else { multi_value one_value = service()->create_constant_int( one_tyinfo, builtin_types::none, inner_value.abi(), 1 ) ; if( v.op == operators::prefix_incr ){ multi_value inc_v = service()->emit_add( inner_value, one_value ); inner_value.store( inc_v ); ctxt->node_value = inner_value; } else if( v.op == operators::prefix_decr ){ multi_value dec_v = service()->emit_sub( inner_value, one_value ); inner_value.store( dec_v ); ctxt->node_value = inner_value; } else if( v.op == operators::postfix_incr ){ ctxt->node_value = inner_value.to_rvalue(); inner_value.store( service()->emit_add( inner_value, one_value ) ); } else if( v.op == operators::postfix_decr ){ ctxt->node_value = inner_value.to_rvalue(); inner_value.store( service()->emit_sub( inner_value, one_value ) ); } } ctxt->ty = one_tyinfo; } SASL_VISIT_DEF_UNIMPL( statement ); SASL_VISIT_DEF( compound_statement ){ EFLIB_UNREF_DECLARATOR(data); SYMBOL_SCOPE( sem_->get_symbol(&v) ); for ( std::vector< std::shared_ptr<statement> >::iterator it = v.stmts.begin(); it != v.stmts.end(); ++it) { visit_child(*it); } } SASL_VISIT_DEF( if_statement ){ EFLIB_UNREF_DECLARATOR(data); service()->if_cond_beg(); visit_child(v.cond); tid_t cond_tid = sem_->get_semantic(v.cond)->tid(); tid_t bool_tid = sem_->pety()->get( builtin_types::_boolean ); if( cond_tid != bool_tid ){ if( caster->cast(sem_->pety()->get_proto(bool_tid), v.cond.get()) == caster_t::nocast ){ assert(false); } } multi_value cond_value = node_ctxt(v.cond, false)->node_value; service()->if_cond_end( cond_value ); insert_point_t ip_cond = service()->insert_point(); insert_point_t ip_yes_beg =service()->new_block( "if.yes", true ); service()->then_beg(); visit_child( v.yes_stmt ); service()->then_end(); insert_point_t ip_yes_end = service()->insert_point(); insert_point_t ip_no_beg, ip_no_end; if( v.no_stmt ){ ip_no_beg =service()->new_block( "if.no", true ); service()->else_beg(); visit_child( v.no_stmt ); service()->else_end(); ip_no_end = service()->insert_point(); } insert_point_t ip_merge =service()->new_block( "if.end", false ); // Fill back. service()->set_insert_point( ip_cond ); service()->jump_cond( cond_value, ip_yes_beg, ip_no_beg ? ip_no_beg : ip_merge ); service()->set_insert_point( ip_yes_end ); service()->jump_to( ip_merge ); if( ip_no_end ){ service()->set_insert_point( ip_no_end ); service()->jump_to(ip_merge); } service()->set_insert_point( ip_merge ); } SASL_VISIT_DEF( while_statement ){ EFLIB_UNREF_DECLARATOR(data); insert_point_t cond_beg = service()->new_block( "while.cond", true ); visit_child( v.cond ); tid_t cond_tid = sem_->get_semantic(v.cond)->tid(); tid_t bool_tid = sem_->pety()->get( builtin_types::_boolean ); if( cond_tid != bool_tid ){ caster->cast( sem_->pety()->get_proto(bool_tid), v.cond.get() ); } insert_point_t cond_end = service()->insert_point(); insert_point_t break_beg = service()->new_block( "while.break", true ); insert_point_t break_end = service()->insert_point(); insert_point_t body_beg =service()->new_block( "while.body", true ); { CONTINUE_TO_SCOPE(cond_beg); BREAK_TO_SCOPE(break_beg); visit_child( v.body ); } insert_point_t body_end = service()->insert_point(); insert_point_t while_end =service()->new_block( "while.end", true ); // Fill back service()->set_insert_point( cond_end ); service()->jump_cond( node_ctxt( v.cond )->node_value, body_beg, break_beg ); service()->set_insert_point( break_end ); service()->jump_to( while_end ); service()->set_insert_point( body_end ); service()->jump_to( cond_beg ); service()->set_insert_point( while_end ); } SASL_VISIT_DEF( dowhile_statement ){ EFLIB_UNREF_DECLARATOR(data); insert_point_t do_beg = service()->new_block( "do.to_body", true ); insert_point_t do_end = service()->insert_point(); insert_point_t cond_beg =service()->new_block( "while.cond", true ); visit_child( v.cond ); tid_t cond_tid = sem_->get_semantic(v.cond)->tid(); tid_t bool_tid = sem_->pety()->get( builtin_types::_boolean ); if( cond_tid != bool_tid ){ if ( caster->cast( sem_->pety()->get_proto(bool_tid), v.cond.get() ) == caster_t::nocast ){ assert( false ); } } insert_point_t cond_end = service()->insert_point(); insert_point_t break_beg =service()->new_block( "while.break", true ); insert_point_t break_end = service()->insert_point(); insert_point_t body_beg =service()->new_block( "while.body", true ); { CONTINUE_TO_SCOPE(cond_beg); BREAK_TO_SCOPE(break_beg); visit_child( v.body ); } insert_point_t body_end = service()->insert_point(); insert_point_t while_end =service()->new_block( "while.end", true ); // Fill back service()->set_insert_point( do_end ); service()->jump_to( body_beg ); service()->set_insert_point( cond_end ); service()->jump_cond( node_ctxt( v.cond )->node_value, body_beg, break_beg ); service()->set_insert_point( break_end ); service()->jump_to( while_end ); service()->set_insert_point( body_end ); service()->jump_to( cond_beg ); service()->set_insert_point( while_end ); } SASL_VISIT_DEF( case_label ){ EFLIB_UNREF_DECLARATOR(data); if( v.expr ){ visit_child( v.expr ); } } SASL_VISIT_DEF_UNIMPL( ident_label ); SASL_VISIT_DEF( switch_statement ){ EFLIB_UNREF_DECLARATOR(data); visit_child( v.cond ); insert_point_t cond_end = service()->insert_point(); insert_point_t break_end =service()->new_block( "switch.break", true ); insert_point_t body_beg =service()->new_block( "switch.body", true ); { BREAK_TO_SCOPE(break_end); visit_child( v.stmts ); } insert_point_t body_end = service()->insert_point(); insert_point_t switch_end =service()->new_block( "switch.end", true ); // Collect Labeled Statement Position vector< pair<multi_value,insert_point_t> > cases; node_semantic* ssi = sem_->get_semantic(&v); assert( ssi ); insert_point_t default_beg = switch_end; for( weak_ptr<labeled_statement> const& weak_lbl_stmt: ssi->labeled_statements() ){ shared_ptr<labeled_statement> lbl_stmt = weak_lbl_stmt.lock(); assert( lbl_stmt ); insert_point_t stmt_ip = node_ctxt(lbl_stmt)->label_position; for( shared_ptr<label> const& lbl: lbl_stmt->labels ){ assert( lbl->node_class() == node_ids::case_label ); shared_ptr<case_label> case_lbl = lbl->as_handle<case_label>(); if( case_lbl->expr ){ multi_value v = node_ctxt( case_lbl->expr )->node_value; cases.push_back( make_pair(v, stmt_ip ) ); } else { default_beg = stmt_ip; } } } // Fill back jumps service()->set_insert_point(cond_end); multi_value cond_v = node_ctxt( v.cond )->node_value; service()->switch_to( cond_v, cases, default_beg ); service()->set_insert_point( break_end ); service()->jump_to( switch_end ); service()->set_insert_point( body_end ); service()->jump_to( switch_end ); service()->set_insert_point( switch_end ); } SASL_VISIT_DEF( labeled_statement ){ EFLIB_UNREF_DECLARATOR(data); for( shared_ptr<label> const& lbl: v.labels ){ // Constant expression, no instruction was generated. visit_child( lbl ); } insert_point_t stmt_pos =service()->new_block( "switch.case", true ); visit_child( v.stmt ); node_ctxt(v, true)->label_position = stmt_pos; } SASL_VISIT_DEF( for_statement ){ EFLIB_UNREF_DECLARATOR(data); SYMBOL_SCOPE( sem_->get_symbol(&v) ); // COULD BE REMOVED ? node_context* ctxt = node_ctxt(v, true); // For instructions layout: // ... before code ... // for initializer // goto for_cond // for_cond: // condition expression // goto for_body // for_iter: // iteration code // goto for_cond // for_break: // goto the for_end // for_body: // ... // ... // goto for_cond // This design is to avoid fill-back that need to store lots of break and continue points. visit_child( v.init ); insert_point_t init_end = service()->insert_point(); insert_point_t cond_beg =service()->new_block( "for_cond", true ); if( v.cond ){ visit_child( v.cond ); } insert_point_t cond_end = service()->insert_point(); insert_point_t iter_beg =service()->new_block( "for_iter", true ); if( v.iter ){ visit_child( v.iter ); } insert_point_t iter_end = service()->insert_point(); insert_point_t for_break =service()->new_block( "for_break", true ); insert_point_t body_beg =service()->new_block( "for_body", true ); { CONTINUE_TO_SCOPE(iter_beg); BREAK_TO_SCOPE(for_break); visit_child( v.body ); } insert_point_t body_end = service()->insert_point(); insert_point_t for_end =service()->new_block( "for_end", true ); // Fill back jumps service()->set_insert_point( init_end ); service()->jump_to( cond_beg ); service()->set_insert_point( cond_end ); if( !v.cond ){ service()->jump_to( body_beg ); } else { service()->jump_cond( node_ctxt( v.cond, false )->node_value, body_beg, for_end ); } service()->set_insert_point( iter_end ); service()->jump_to( cond_beg ); service()->set_insert_point( body_end ); service()->jump_to( iter_beg ); service()->set_insert_point( for_break ); service()->jump_to( for_end ); // Set correct out block. service()->set_insert_point( for_end ); } SASL_SPECIFIC_VISIT_DEF( visit_continue , jump_statement ) { EFLIB_UNREF_DECLARATOR(data); EFLIB_UNREF_DECLARATOR(v); assert(continue_to_); service()->jump_to(continue_to_); } SASL_SPECIFIC_VISIT_DEF( visit_break , jump_statement ) { EFLIB_UNREF_DECLARATOR(data); EFLIB_UNREF_DECLARATOR(v); assert(break_to_); service()->jump_to(break_to_); } module_vmcode_impl* cg_sisd::mod_ptr(){ return vmcode_.get(); } cgs_sisd* cg_sisd::service() const { return static_cast<cgs_sisd*>(service_); } abis cg_sisd::local_abi( bool is_c_compatible ) const { return is_c_compatible ? abis::c : abis::llvm; } END_NS_SASL_CODEGEN();
94, -11536, -16582? s**3 - 467*s**2 + 14 What is the m'th term of -1076, -1079, -1082, -1085? -3*m - 1073 What is the y'th term of 130, 273, 418, 565, 714? y**2 + 140*y - 11 What is the t'th term of 1079, 1089, 1099, 1109, 1119, 1129? 10*t + 1069 What is the p'th term of 17653, 17652, 17651, 17650? -p + 17654 What is the g'th term of -220, -905, -2052, -3661? -231*g**2 + 8*g + 3 What is the u'th term of 224, 222, 218, 212? -u**2 + u + 224 What is the t'th term of 278, 551, 824, 1097, 1370, 1643? 273*t + 5 What is the r'th term of 3, 5, -5, -33, -85, -167, -285, -445? -r**3 + 9*r - 5 What is the f'th term of 94, 135, 248, 469, 834, 1379, 2140? 6*f**3 - f + 89 What is the i'th term of 241, 278, 315? 37*i + 204 What is the b'th term of -288, -293, -300, -309, -320, -333? -b**2 - 2*b - 285 What is the a'th term of -588, -1177, -1766, -2355, -2944? -589*a + 1 What is the f'th term of -87, -143, -199, -255, -311, -367? -56*f - 31 What is the h'th term of -633, -1271, -1909, -2547? -638*h + 5 What is the l'th term of -20, -37, -54, -71? -17*l - 3 What is the p'th term of -168, -155, -134, -105, -68, -23, 30? 4*p**2 + p - 173 What is the x'th term of -14, -6, 8, 28, 54, 86? 3*x**2 - x - 16 What is the n'th term of 163, 670, 1517, 2704, 4231, 6098? 170*n**2 - 3*n - 4 What is the w'th term of -9, -13, -13, -9, -1, 11? 2*w**2 - 10*w - 1 What is the r'th term of -1034, -1047, -1072, -1115, -1182, -1279? -r**3 - 6*r - 1027 What is the w'th term of 1205, 1198, 1191, 1184, 1177, 1170? -7*w + 1212 What is the g'th term of -7, 1, 15, 35, 61? 3*g**2 - g - 9 What is the g'th term of -72, -156, -240, -324, -408, -492? -84*g + 12 What is the x'th term of 1078, 4298, 9664, 17176? 1073*x**2 + x + 4 What is the w'th term of -42, -162, -364, -648, -1014, -1462? -41*w**2 + 3*w - 4 What is the n'th term of -233, -465, -695, -923? n**2 - 235*n + 1 What is the v'th term of 73, 143, 215, 289, 365? v**2 + 67*v + 5 What is the r'th term of -21, -35, -41, -33, -5? r**3 - 2*r**2 - 15*r - 5 What is the f'th term of -71, -76, -81? -5*f - 66 What is the x'th term of -71, -201, -317, -413, -483, -521? x**3 + x**2 - 140*x + 67 What is the m'th term of 2919, 5833, 8747, 11661? 2914*m + 5 What is the p'th term of -539, -1076, -1613? -537*p - 2 What is the z'th term of 5, -33, -115, -247, -435, -685, -1003? -z**3 - 16*z**2 + 17*z + 5 What is the i'th term of 16, -7, -30, -53? -23*i + 39 What is the k'th term of -117, -513, -1179, -2121, -3345, -4857, -6663, -8769? -k**3 - 129*k**2 - 2*k + 15 What is the h'th term of -200, -381, -544, -683, -792, -865? h**3 + 3*h**2 - 197*h - 7 What is the c'th term of -1042, -1043, -1044, -1045, -1046, -1047? -c - 1041 What is the f'th term of 253, 268, 297, 346, 421, 528, 673? f**3 + f**2 + 5*f + 246 What is the t'th term of 89, 383, 879, 1577, 2477, 3579? 101*t**2 - 9*t - 3 What is the a'th term of -51, -66, -77, -78, -63, -26, 39? a**3 - 4*a**2 - 10*a - 38 What is the x'th term of -2, 1, 18, 55, 118, 213? x**3 + x**2 - 7*x + 3 What is the b'th term of -11, -23, -31, -35, -35, -31, -23? 2*b**2 - 18*b + 5 What is the u'th term of 18, 0, -36, -96, -186, -312? -u**3 - 3*u**2 - 2*u + 24 What is the a'th term of 2, 0, -2, -4, -6? -2*a + 4 What is the k'th term of 282, 283, 284, 285? k + 281 What is the t'th term of 242, 243, 244, 245, 246, 247? t + 241 What is the b'th term of -184, -373, -566, -763, -964, -1169? -2*b**2 - 183*b + 1 What is the i'th term of -20, -83, -190, -341, -536? -22*i**2 + 3*i - 1 What is the j'th term of 2380, 4745, 7110, 9475? 2365*j + 15 What is the z'th term of 26183, 26170, 26143, 26096, 26023? -z**3 - z**2 - 3*z + 26188 What is the w'th term of -11, -47, -111, -203, -323, -471? -14*w**2 + 6*w - 3 What is the r'th term of 39, 74, 109, 144, 179? 35*r + 4 What is the w'th term of 10, 21, 18, 1, -30, -75? -7*w**2 + 32*w - 15 What is the h'th term of -1637, -3279, -4923, -6569, -8217, -9867? -h**2 - 1639*h + 3 What is the w'th term of 15865, 15847, 15817, 15769, 15697, 15595, 15457, 15277? -w**3 - 11*w + 15877 What is the y'th term of 1331, 2659, 3985, 5309, 6631, 7951? -y**2 + 1331*y + 1 What is the c'th term of -191, -187, -183, -179? 4*c - 195 What is the x'th term of -14254, -28508, -42762? -14254*x What is the z'th term of -11041, -11040, -11039, -11038? z - 11042 What is the i'th term of -9, -21, -47, -93, -165, -269, -411? -i**3 - i**2 - 2*i - 5 What is the d'th term of -8, -20, -38, -62? -3*d**2 - 3*d - 2 What is the j'th term of -170, -161, -146, -125? 3*j**2 - 173 What is the p'th term of 22, 96, 222, 400, 630, 912? 26*p**2 - 4*p What is the p'th term of 10, 21, 48, 97, 174, 285, 436? p**3 + 2*p**2 - 2*p + 9 What is the g'th term of -1024, -1025, -1026, -1027, -1028? -g - 1023 What is the p'th term of -23, -48, -81, -116, -147, -168, -173, -156? p**3 - 10*p**2 - 2*p - 12 What is the i'th term of -2365, -4735, -7105, -9475? -2370*i + 5 What is the f'th term of 31, 49, 65, 79, 91, 101, 109? -f**2 + 21*f + 11 What is the r'th term of 26, 134, 424, 986, 1910, 3286? 15*r**3 + r**2 + 10 What is the n'th term of 5, -18, -79, -196, -387, -670? -3*n**3 - n**2 + n + 8 What is the t'th term of -5, -1, 13, 43, 95, 175? t**3 - t**2 - 5 What is the h'th term of 81, 57, 45, 51, 81, 141, 237? h**3 - 31*h + 111 What is the m'th term of 30, 56, 82, 108, 134, 160? 26*m + 4 What is the k'th term of 19, 35, 55, 73, 83, 79? -k**3 + 8*k**2 - k + 13 What is the o'th term of 197, 395, 595, 797, 1001, 1207, 1415? o**2 + 195*o + 1 What is the r'th term of 373, 380, 397, 430, 485, 568, 685? r**3 - r**2 + 3*r + 370 What is the k'th term of -67, -49, -17, 35, 113, 223? k**3 + k**2 + 8*k - 77 What is the f'th term of 3, 24, 65, 138, 255? 2*f**3 - 2*f**2 + 13*f - 10 What is the n'th term of -114, -218, -312, -390, -446, -474, -468, -422? n**3 - n**2 - 108*n - 6 What is the f'th term of -1835, -3686, -5537? -1851*f + 16 What is the d'th term of 28615, 57230, 85845, 114460, 143075, 171690? 28615*d What is the s'th term of -1, 0, 1, 2, 3, 4? s - 2 What is the s'th term of -14, 11, 52, 109, 182? 8*s**2 + s - 23 What is the x'th term of 10, 47, 100, 163, 230, 295, 352, 395? -x**3 + 14*x**2 + 2*x - 5 What is the w'th term of 1, 7, 35, 97, 205, 371? 2*w**3 - w**2 - 5*w + 5 What is the j'th term of -8749, -8750, -8751, -8752? -j - 8748 What is the c'th term of 222, 223, 224? c + 221 What is the f'th term of -59, -220, -495, -890, -1411, -2064? -f**3 - 51*f**2 - f - 6 What is the n'th term of 1043, 1033, 1009, 965, 895, 793? -n**3 - n**2 + 1045 What is the n'th term of 574, 1146, 1718, 2290, 2862? 572*n + 2 What is the z'th term of -62, -173, -298, -443, -614, -817? -z**3 - z**2 - 101*z + 41 What is the g'th term of 21, 41, 63, 87, 113, 141? g**2 + 17*g + 3 What is the g'th term of 14, 44, 72, 98, 122, 144? -g**2 + 33*g - 18 What is the r'th term of -259, -260, -261? -r - 258 What is the q'th term of -2544, -2542, -2540, -2538, -2536? 2*q - 2546 What is the k'th term of -28, -32, -36, -40? -4*k - 24 What is the x'th term of -212, -218, -226, -236, -248, -262? -x**2 - 3*x - 208 What is the m'th term of -4, 2, 14, 32, 56, 86? 3*m**2 - 3*m - 4 What is the j'th term of 3037, 6073, 9109, 12145, 15181? 3036*j + 1 What is the y'th term of -242, -487, -732, -977, -1222? -245*y + 3 What is the v'th term of 57, 54, 59, 78, 117, 182? v**3 - 2*v**2 - 4*v + 62 What is the z'th term of -85, -167, -263, -373? -7*z**2 - 61*z - 17 What is the m'th term of 76, 157, 232, 295, 340? -m**3 + 3*m**2 + 79*m - 5 What is the n'th term of 1893, 1897, 1911, 1941, 1993? n**3 - n**2 + 1893 What is the q'th term of -35, -81, -127? -46*q + 11 What is the b'th term of 217, 247, 297, 367, 457, 567? 10*b**2 + 207 What is the z'th term of -23, -1, 35, 85? 7*z**2 + z - 31 What is the b'th term of -214, -422, -628, -832, -1034, -1234? b**2 - 211*b - 4 What is the c'th term of -659, -2635, -5935, -10565, -16531, -23839, -32495, -42505? -c**3 - 656*c**2 - c - 1 What is the k'th term of -13, -28, -43, -58? -15*k + 2 What is the o'th term of -11, -28, -79, -182, -355, -616, -983, -1474? -3*o**3 + o**2 + o - 10 What is the v'th term of -362, -366, -370, -374, -378, -382? -4*v - 358 What is the h'th term of -17, -5, 3, 7, 7? -2*h**2 + 18*h - 33 What is the c'th term of 9, 2, -33, -114, -259, -486? -
Observant Jews in Los Angeles are bracing for the possibility that they will not be allowed to carry anything or even push a baby stroller on Shabbat due to a freeway project that will knock down the ‘Eruv.” which transforms a public area in to a private space in terms of Jewish law. The eruv can be formed by hills or fences, but in urban areas, it usually is created by a thin wire that runs along light poles. A project to widen the 405 Freeway ′s Wilshire Boulevard interchange will require tearing down the poles – and the wires, breaking the eruv and prohibiting observant Jews from walking with anything in their hands or pockets on Shabbat. “We hope to have a workaround for next week, but the next three weeks will be problematic as the contractor rushes to finish new, and demolish old bridges at Wilshire,” according to Hoard Witkin, who heads the Los Angeles Community Eruv.
The American League East-leading New York Yankees don't appear to be committed to using Chase Headley at the hot corner for much longer. Headley has significantly cooled off following an excellent start to the season, and now the team's front office is shopping for a third baseman, major league sources told Nick Cafardo of the Boston Globe. The Yankees have emerged as serious postseason contenders, but have received minimal production from the third base position. Headley, who is a free agent at the end of next season, is hitting .232/.306/.356 with three home runs and 50 strikeouts in 48 games. It was reported earlier this week that the Yankees were grooming top prospect Gleyber Torres to take over the position this year, but there remains a number of potential trade options should general manger Brian Cashman want someone more established at the major-league level. PLAYER GP 2B HR RBI SO AVG/OBP/SLG Headley 48 11 3 23 50 .232/.306/.356 Moustakas 47 7 14 27 34 .250/.291/.511 Frazier 45 7 7 23 39 .179/.293/.359 Lowrie 52 16 6 16 34 .287/.358/.462 Freese 37 4 5 17 26 .243/.358/.409 Mike Moustakas, Todd Frazier, Jed Lowrie, and David Freese are all players likely to be traded that the Yankees could look at acquiring.
We will continue studies on: 1. The biological function of mammalian DNA methylation, with the aim of proving the involvement of DNA methylation in gene regulation, differentiation, development, and X chromosome inactivation. 2. The molecular mechanism of X chromosome inactivation in mammals. 3. Mammalian X chromosome isolation and characterization. 4. Isolation and cloning of the mouse PGK gene.
/* * vim: ts=4 sw=4 et tw=0 wm=0 * * libavoid - Fast, Incremental, Object-avoiding Line Router * * Copyright (C) 2004-2008 Monash University * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * See the file LICENSE.LGPL distributed with the library. * * Licensees holding a valid commercial license may use this file in * accordance with the commercial license agreement provided with the * library. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. * * Author(s): Michael Wybrow */ #include <cstdlib> #include "libavoid/viscluster.h" #include "libavoid/router.h" #include "libavoid/assertions.h" #include "libavoid/debug.h" namespace Avoid { ClusterRef::ClusterRef(Router *router, Polygon& polygon, const unsigned int id) : m_router(router), m_polygon(polygon, router), m_rectangular_polygon(m_polygon.boundingRectPolygon()), m_active(false) { COLA_ASSERT(m_router != NULL); m_id = m_router->assignId(id); m_router->addCluster(this); } ClusterRef::~ClusterRef() { if (m_router->m_currently_calling_destructors == false) { err_printf("ERROR: ClusterRef::~ClusterRef() shouldn't be called directly.\n"); err_printf(" It is owned by the router. Call Router::deleteCluster() instead.\n"); abort(); } } void ClusterRef::makeActive(void) { COLA_ASSERT(!m_active); // Add to clusterRefs list. m_clusterrefs_pos = m_router->clusterRefs.insert( m_router->clusterRefs.begin(), this); m_active = true; } void ClusterRef::makeInactive(void) { COLA_ASSERT(m_active); // Remove from clusterRefs list. m_router->clusterRefs.erase(m_clusterrefs_pos); m_active = false; } void ClusterRef::setNewPoly(Polygon& poly) { m_polygon = ReferencingPolygon(poly, m_router); m_rectangular_polygon = m_polygon.boundingRectPolygon(); } unsigned int ClusterRef::id(void) const { return m_id; } ReferencingPolygon& ClusterRef::polygon(void) { return m_polygon; } Polygon& ClusterRef::rectangularPolygon(void) { return m_rectangular_polygon; } Router *ClusterRef::router(void) const { return m_router; } }
GB Latest News This post has not been edited by the GamesBeat staff. Opinions by GamesBeat community writers do not necessarily reflect those of the staff. In the remote location known as Katorga-12, scientists have discovered the January 2012 issue of Gamepro magazine, a publication that, as we know it, ceased all operations with the November 2011 issue. Though badly singed, and missing many of its pages, a few interesting tidbits were recoverable and at least three full articles are completely intact. Despite threats from unnamed government agencies, and risk of space-time continuum disruption, this author has decided to release one such article to the public. It is an interview with a man named Jerry Lambert, who, in our reality, portrays Kevin Butler–a fictional executive in a series of Sony advertising campaigns. After a glimpse at this "Alternate-Sony," this author believes real-world Sony might benefit from a few tenets Mr. Lambert preaches. Sony 2012 – Looking Back while Moving Forward a Candid Interview with Jerry Lambert, President and CEO of SCEA By Dan "Sock" Hsak The past informs the future. This axiom comes to me on the short drive from San Francisco to Foster City, as I become lost in contemplation of recent history. The last few years have been momentous not only in my own personal history, but in the history of the industry I have built a career around covering. Since taking the reigns of the Gamepro Media Network from John Davison in late 2010, the staff and I have managed to take a storied game magazine and successfully create a network of sites and coverage outlets that stands tall. Thanks to the tireless writers and editors here, the chorus of editorial voices joining us from Bitmob, and John's focus on the culture and people the games industry touches, we have arrived at creating something unique. Is it this unique nature that has landed me the rare interview to which I am driving, already beginning to feel slightly nervous? After all, it isn't every day here at Gamepro that we get to talk candidly with one of the founding fathers of the Playstation brand. Jerry Lambert is the President and Chief Executive Officer of Sony Computer Entertainment America. Since joining Sony in 1995, Lambert has been involved in the strategy, design, and development of every console and handheld that has borne that name. As you'll see below, he takes an almost personal ownership of the hardships and failures, as well as the successes, Sony has experienced with the brand. Some may insist that games is a technology industry, but Jerry soon points out that, like all industries, it is a people industry. This is surprising for me to hear, because although he is enthusiastic and bombastic, Lambert rarely grants direct interviews, preferring to address his fans and detractors en masse from the stage at E3, something he has done since 2007. At the conclusion of our meeting, driving back to the office filled with people who already feel like my family, I am left with the impression that if I can keep my focus on the people to whom we are providing a service, on giving them the future of game coverage while honoring the spirit of what Gamepro has been in the past, that this twenty-three year old brand name of Gamepro might just see the ripe old age of thirty! Gamepro: You're just a month away from the launch of the Vita in North America. Are you confident in the success of the platform? Lambert: I'm confident in the quality of the platform, [and] the quality of the games and apps we're releasing for it. It's a fantastic piece of hardware, easily the best portable gaming platform that's ever been developed. I know I will be perceived as being biased, but I wouldn't say it if I didn't truly believe it. Gamepro: What are your feelings about the Japanese Vita launch? Lambert: Things are going very well in Japan. Selling half your initial shipment in the first week is always a good sign. Reviews and consumer opinion both have been encouragingly solid. Although sell-through slowed a bit since launch, we are encouraged to have Playstation Vita outselling the original PSP in the weeks since. Having the PSP Too add-on available at launch is a big part of that success. It doesn't hurt to offer Japanese customers the ability to transfer their Monster Hunter saves directly over to the Vita and continue their favorite game right where they left off, on a sexy new piece of hardware. That said, we expect further success as more Vita exclusive titles reach the pipeline post-launch. Wipeout, Uncharted, and Gravity Rush come to mind as launch window titles I expect to really wow the American audience. Gamepro: Releasing the PSP Too is a bit of an unusual approach. The last time a peripheral was released to give a system compatibility with a previous console was the Gameboy Player. This is the first time a peripheral as well as a per-title emulator package purchase is required for backwards compatibility. What do you say to critics who would accuse you of charging for the emulator packages needlessly? Lambert: I would say they don't know what they're talking about. It was obvious that if we were to offer Vita users backward compatibility we would need to create a UMD drive peripheral. At least in America, that's been perfectly clear to us since we decided to go with a proprietary media format for Vita, with DCRCA in effect. But the PSP itself was much more than just a UMD drive. As with the Playstation 2, many developers ended up overcoming limitations of the PSP, loading times for example, with unique software tricks like the streaming of textures and levels, [and] other techniques, that just can't be handled with a one-size-fits-all emulator. But let's be clear, this is not a per-title charge. The Playstation 2 emulator package sales model we have developed for the slim model Playstation 3 is the exact same as what you will see on Vita. The difference is that Vita doesn't come with a UMD drive, and so [you have to] purchase that hardware separately. Gamepro: Vita also doesn't come with a Memory Stick DUO port. Lambert: Yes. Exactly. That's exactly right. And players bought the Playstation 2 memory card adaptor for PS3 if they wanted to bring over their old saves. There's no difference. Gamepro: Why didn't you use Memory Stick DUO as the removable memory format for Vita? Lambert: It's clear we couldn't do that. I'll just say it up front, it's common knowledge. An open format for storage on PSP is what brought us unending piracy issues on the platform. As a platform holder we are committed to our software partners to secure the environment as much as possible and protect their investment in us. Gamepro: The Memory Stick adaptor included with PSP Too won't cause the same problems? Lambert: Our engineers have ensured us there are plenty of roadblocks and safeguards in place to prevent that. They're great, devoted, intelligent people. They've done their best job preventing piracy, and I trust that they've done it to the best of their ability. Obviously, those who are determined to pirate software will find a way to circumvent any safeguards we put into place. But there is a big difference between an open, common storage format integrated into a piece of hardware, and the same storage format that can only be connecting through a proprietary peripheral through a proprietary connection. We can at least prevent piracy from being something any one can do with a small amount of research on the internet. Gamepro: So the adaptor will be bundled with the PSP Too in North America, too? Are you selling it separately? Lambert: It will be bundled. The PSP Too will be available at launch in North America at $99.99 suggested retail. We have no plans to sell the Memory Stick DUO adaptor separately right now. Gamepro: That's a significant amount to pay for a portable peripheral that enables backwards compatibility. Particularly with the Gameboy Cubed doing so well in the market, equipped with backwards compatibility out of the box. To a customer, add in the charges for the memory cards with additional charges for the em-packs, and it looks like a lot to pay in comparison to the competition. Lambert: Granted, certainly. Even though Vita is doing software emulation of the PSP processor, there's the UMD drive, the battery, [and] as you mentioned the Memory Stick adaptor. There's a lot in that package. PSP Too is a considerable bit of hardware. I'm told it's quite an engineering and programming accomplishment, considering what we are asking it to do. Certainly it's a lot more than it takes to emulate old Gameboy software. Even at what we're charging, we're not making any money on sales of PSP Too. Gamepro: And the em-packs? Lambert: Our pricing on the em-packs is very fair. After all, the initial software emulation package, the engine of it, is bundled with the PSP Too. For many titles, this base emulator package is all that's needed to play PSP games flawlessly. Beyond that, we have the same model for PSP-to-Vita em-packs as we do with PS2-to-PS3. If a certain em-pack, purchased for a particular title, includes all of the instructions necessary to emulate another PSP title, the customer does not have to pay anything more. Not only is it compliant with DCRCA, but it's the right thing to do. One charge for one unique, assembled instruction set of emulator software. An emulation pack that covers multiple games can cost up to three dollars, whereas any packages required by the unique needs of a single title will usually run one dollar. This is the same price model customers are paying now on PS3 for em-packs, a price model that was introduced four years ago, that hasn't increased one cent since then. Gamepro: Are there any plans to release a SKU with this hardware and onboard emulation as part of the original unit, a PSVita Plus? Lambert: Not for Vita, no. The PS3 Plus was derived from the original model of the PS3 that we released. When that model was originally designed they included the Emotion Engine processor and the GPU from the PS2 to provide full backwards compatibility through onboard hardware. We needed to release a SKU at a lower cost to remain competitive, we weren't catching up on market share, and so we released the redesigned PS3 at $299 suggested retail and the original design became PS3 Plus, our $499 high-end SKU. With Vita, there was never a plan to include full hardware compatibility, the plan was always software emulation. Once that decision was made, it made no sense to include a separate SKU with a UMD drive and an additional memory port, in terms of the weight and power drain it would add to the unit, in terms of the price it would add to the unit, and in terms of the number of SKUs we are offering. We have a 3G model and a Wi-Fi model already. Two SKUs is enough for any platform. I feel that we offer our customers a strong array of price options, and PSP Too is among those options. A player can pass it on if they aren't interested in playing PSP games on Vita. It's a strategy that worked out pretty well with the Playstation 3 line. The more clear and meaningful choices you offer customers, the easier it is for then to find what they are looking for. I think the possible choice of adding a PSP Too peripheral is a more meaningful choice, to the customer, than a perplexing array of Vita models that may or may not offer what you want. Gamepro: Has this proven true in Japan? Lambert: I think it has so far. Japan as you know is a special case. Despite early success with PSP in America, since 2009 Japan has really been the strongest base of customers for the console. The attach rate for the PSP Too peripheral in Japan has been remarkable, approaching fifty percent. I can't think of any other peripheral, especially a portable peripheral, that even comes close. Gamepro: That is remarkable. Though that same attach rate seems less likely in North America. Lambert: (Laughs) Yes, you're probably right about that. Gamepro: Earlier you mentioned the Digital Consumer Right to Content Act of 2009. Do you think that was part of the cause for the decline of the PSP's fortunes that year? Lambert: Well, 2008 and 2009 were difficult years for all of us in this industry. Honestly I would say that the passage of the DCRCA itself finally settled the litigation and uncertainty and allowed us to move forward. It was really the ESA Class Action in 2007 that put a lot of our plans on hold, and forced us to throw a lot of legal resources for the next two years into defining that parameters of that ruling. Gamepro: The "double-dip" ruling. Lambert: Yes, exactly. And the first, unsuccessful appeal. By all means, I understand the point of the original suit and the ruling. After we had made significant strides in protecting our interests with the DMCA (ed. Digital Millennium Copyright Act), we had become a bit strident, as an industry. By that time, Sony had released nearly a dozen PS1 classics on PSN, games which were already playable on PS3 if someone owned the original disk, but only playable on PSP if they were purchased again, digitally. Nintendo was in deep with their Virtual Console, [which was] a single piece of software which allowed them to charge again for the exact same pieces of code a customer may have already paid for. Microsoft was in the same position with Game Room and XBox Originals. We immediately scrapped a program for digital distribution of Playstation 2 games. All of these revenue possibilities essentially became dangerous liabilities. Gamepro: Interesting. I don't think it's public knowledge that there was a plan for "PS2 Classics." Lambert: I don't think I'm admitting anything shocking with that. Certainly we could have pressed forward with these plans for Europe and Japan, but the feeling was that the ruling in America would stimulate similar litigation in those territories as well, and that it was best to "go back to the drawing board," in a manner of speaking, and develop the current plan for backwards compatibility options on the PS3. Really, it was for the best. We were this close to deciding to remove PS2 compatibility entirely, and sell what we now call em-packs packaged with digital downloads of PS2 titles. That's a much more shocking thing to admit! Fortunately, the players spoke up, and we were forced to listen. Gamepro: Yeah that doesn't sound like a very good idea at all. Lambert: Well I can see the appeal of it, even from a customer's perspective. In fact, I headed the team that proposed it. After all, digitally downloaded software is ever-present, takes up no storage space, and is immediately accessible. We needed a less expensive PS3 model to send into the market, and to do that we had to reduce manufacturing costs. To do that, the extra PS2 compatibility hardware had to go. And there certainly was something to be said for ensuring that if a player had a Playstation 3, that their primary interest in the device was playing Playstation 3 software. I even believe that there are plenty of people out there who would happily pay a reduced cost for the original title for that convenience, even if they did already own the original release. And what about the people who missed the game the first time? So there are still a lot of questions. But in the end, even if the class action suit hadn't interrupted all those plans, I eventually concluded it was wrong-headed. Gamepro: Why is that? Lambert: Because a brand like Playstation, as big as it has become and as long as it has been the focus of my professional life, means nothing outside of the minds of its customers. The brand, by itself and disconnected from its past, becomes an abstract, simply a name for a product. When Coca-Cola changed their formula, they were still producing cola from very much the same ingredients for the same people, from the same people, but they had separated themselves from their history. And it is the history and consistency of a brand that forms lasting, loyal relationships with people. For us, at that time, Playstation 3 was our new flavor, our new product. And yet for us, unlike Coca-Cola, we also had the option to offer our new flavor in a product where someone could continue to enjoy the product they had come to enjoy, the brand they had come to trust. To them, that brand meant the entirety of the Playstation 2 and Playstation 1 library, the most diverse, highest quality library playable on a single console. To leave that behind would make us just another flavor on the shelf, regardless of what it was named. I learned a long time ago never to confuse your name with your brand. The ESA Class Action Suit only made that point even more clear. Gamepro: But that wasn't the full extent of the original ruling… Lambert: No. Not at all, unfortunately. Before we knew it we had our hands full of litigation for software that were in reality entirely different pieces of code, were highly developed and careful ports of titles from PS3 to PSP, designed to allow players to continue their game experience on the go. Suddenly one of the biggest features for the PSP, Game Continuity, had become a liability as well. Even Sony's movie division found itself defending itself against Class Action claims that selling a customer Blu-Ray if they had already bought DVD could be considered double-dipping. Fortunately the early 2009 appeal established definitions to what could be considered "double-dipping," and the ruling only held true for emulated software that was the exact same code. Then of course the DCRCA spelled out these definitions explicitly and established the FTC as the regulatory agency with oversight in this area. The FTC recognized, although we would not charge again for the original game software code, it was perfectly fair practice to charge for the emulator software and instructions that allowed the old software to be run on the new hardware. And so we developed our PSP-to-Vita modew, like our PS2-toPS3 [model], based on that. On the PS3 we were able to move forward developing key titles for remastered HD rereleases, which is an initiative that turned out to be very welcome by our fans, and gave us some of our best-selling titles over the last two years. But for us, for PSP, by that time a lot of momentum had been lost, because of the uncertain status of the ports. Nintendo introduced the Gameboy Cubed which, as you mentioned, offered native backwards compatibility with three previous Nintendo systems. And Apple and Microsoft introduced the iZune which, although short-lived, paved the way for Apple to enter the market with the iPhone, and finally the iPad. Don't get me wrong, there were some positives to the whole period of uncertainty. It focused us and our partners on developing experiences unique to the PSP and the portable environment, and this helped make our lineup distinct from Nintendo's handheld. This market is much more competitive now, but we feel with Playstation Vita we have something really special that will succeed on the merits of its unique features, and yet will continue to offer players the connection with the Playstation brand and library they've come to trust, through the Playstation Continuum feature. Gamepro: Which is, in a way, Game Continuity version 2.0, right? Lambert: I don't think that name does justice to the feature. Certainly, from a purely technical perspective, it looks very much the same. Players can start a game on the Playstation 3, transfer their save to their Playstation Vita, and pick up right where they left off with the portable version of the game, seamlessly. However with the power of the Vita the portable version of the game will provide an equal experience, with no notable step-down in graphics or gameplay quality, and in many cases additional touch screen and interface features that may inspire players to take their game to the Vita just for that experience. With the Vita's quick save and cloud save features available with PSN Platinum, the transition between console and handheld should be nearly seamless–we've moved beyond continuity to a true continuum of gameplay, at home or on the go. Finally, we have heard the concerns of our customers. And that's why we are working with our publishing partners to offer PS3 Vita Combo Packs SKUs on games that are being released with the Game Continuum feature, at an MSRP of $69.99 for both versions of the game in one box. Gamepro: Are you going to offer each version of the game separately as well? Lambert: We are, and yes, that will complicate matters a bit from a retail inventory standpoint. But even if the DCRCA doesn't mandate this, it's worth it to be able to offer the value to our most loyal and committed customers. It's turned out to be a fantastic success with encouraging sampling and adoption of the Blu-Ray movie format. Once again, [it's] a fine example of introducing your new flavor while ensuring your customers don't have to choose it over the taste they know they like. Gamepro: When can we anticipate these Combo Packs to hit retail? Lambert: Well we don't have any titles coming yet that highlight Game Continuum support, at least not in the launch window. We have some exciting news to announce at E3 this year, though, some make sure to watch for that. Gamepro: I'm looking forward to it. Speaking of E3, are there any plans to announce a new home console, or perhaps a motion control solution as an answer to Nintendo's Wii or Microsoft's Kinect? Lambert: I can confirm without a doubt that the answer is no to both questions. Both our rivals have done admirable jobs in implementing interesting new controls technologies into their consoles, and arguably Nintendo has done a lot to expand our industry's reach into households and the hands of people who have not traditionally viewed themselves as our customers. When they introduced this technology, they labeled it as disruptive, and at first, it certainly was. I would even go so far as to say that the initial sales of PS3, at it's initial price point, were disrupted by the launch of the Wii at around the same time. But I think that effect on gamers, on our core audience who do bear our brand in their minds, was short-lived. Their technology would actually prove to be more disruptive in the long term if we would have begin chasing them, trying to play catch-up with what they were offering. We've already taken enough steps down that road with SixAxis. Instead, moving forward, we remain committed to knowing the Playstation brand, and growing the Playstation brand, with the strengths that have made the Playstation brand great in the past. That said, we spend a great deal of time and effort in research, developing new technologies. And if we do decide to fully explore new control methods, you can be sure we will do it with full commitment, integrated with a new platform. Dividing your market with peripherals has never turned out to be a successful strategy. I think, nearly three years after the introduction of Wii Motion Plus, if you could get Reggie Files-Aime to speak freely, he'd tell you the same thing. Gamepro: So no new hardware to announce a E3 this year? Lambert: It's not the year for hardware for us, no. I realize Nintendo will be hoping for a lot of "new toy" fascination with their Wao Wii tablet-controller console, but their first footsteps into the HD console market is the kind of game of catch-up I made clear we won't be playing. They're not coming from a position of strength, they're coming from declining sales. Microsoft, having taken the bait of disruptive technology, has split their player base, split their focus, and placed themselves in a position where announcing new hardware is only going to alienate the millions of players who have placed their faith in Kinect as Microsoft's new sub-platform. What Microsoft's players will expect is what we will deliver, tons of awesome software for the platform they have purchased. For us, we'll be coming into E3 hopefully fresh off the successful worldwide launch of Playstation Vita, with a solid established HD generation platform that is only now having its full potential approached. So what you can expect to see from us at E3 is games, lots and lots of awesome games, for Playstation 3, or for Playstation Vita, or for Playstation 3 and Vita, supporting Playstation Continuum. I can't really say anything about any of the titles, right now. But a diverse and vibrant software library is what players have come to expect from the Playstation brand, for the past 18 years. If we continue to remember that, then we will never fail to deliver on that, and our players can continue to trust in the fact that that is what we will give them. Gamepro: Anything at all you can reveal to us now, just to get all the Playstation fans excited? Lambert: (laughs) I think, all I can tell you… is that certain Vice President will be rumored to be making an appearance. Gamepro: Great! Thank you so much Mr. Lambert. It's truly been a pleasure talking with you today. Thank you for being so candid and real with me, I know our readers will really appreciate it. Lambert: Thank you, I had a great time. Your readers are among our most loyal customers. It's the least I can do.
"Walt Disney's Disneyland." "# When you wish upon a star #" "# Makes no difference who you are #" "Each week, as you enter this timeless land, one of these many worlds will open to you." "Frontierland." "Tall tales and true from the legendary past." "Tomorrowland." "Promise of things to come." "Adventureland." "The wonderworld of nature's own realm." "Fantasyland." "The happiest kingdom of them all." "Presenting this week..." "Here to introduce you to this new series is Walt Disney." "In our modern world, everywhere we look, we see the influence science has upon our daily lives." "Discoveries that were miracles a few short years ago are accepted as commonplace today." "Many the things that seem impossible now will become realities tomorrow." "One of man's oldest dreams has been the desire for space travel." "To travel to other worlds." "Until recently, this seemed to be an impossibility." "But new discoveries have brought us to the threshold of a new frontier." "The frontier of interplanetary space." "In this Tomorrowland series, we are combining the tools of our trade with the knowledge of the scientist to give a factual picture of the latest plans for man's newest adventure." "Here's director Ward Kimball to tell you about it." "In working with engineers and scientists, we have found that there are many different opinions as to how we will eventually cross the space frontier." "However, there's one point all of them seem to agree upon." "And that is whether we use chemical fuels or atomic energy, it will be a rocket-powered ship that will finally take man into space." "So, to set the stage for the part the rocket will play in the coming conquest of space, our artists have searched back through history and traced the rocket and various space-travel ideas from their earliest beginnings." "The first thing we found out was that the rocket is not such a modern invention after all." "In fact, its history began way back in the 13th century." "It was in China, to be exact, at the battle of Kai-fung-fu." "A little over 500 years later," "Sir Isaac Newton explained this phenomenon by saying..." "Sir Isaac's statement can best be illustrated by showing what happens to our pet dog when he sneezes." "For every action, there is an opposite but equal reaction." "This same principle applies when we light an ordinary skyrocket." "However, gunpowder is not the only propellant that demonstrates the action-reaction law." "There was a time when steam was seriously considered as a means of rocket propulsion." "Typifying this idea was Charles Golightly's aerial steam horse." "Early inventors soon realized that steam rockets would be too heavy to fly." "So they returned to designs utilizing gunpowder." "These ideas made many successful flights." "On paper." "In 1865, Jules Verne fired the imagination of the world with his first book on space travel." "It was called "From the Earth to the Moon."" "Mr. Verne used a very interesting device in getting his heroes to the moon." "He shot them through space inside an enormous artillery projectile." "It was Verne's story that inspired Georges Méliès to create the first space-travel motion picture in 1902." "The first man to associate space travel with the use of rocket power was Hermann Gonsfind." "His idea was to have the rocket pull the ship instead of push it." "This conception was quite unique but only an inventor's dream." "However, a few decades later, a real milestone in rocket history was passed when the American professor Robert H. Goddard introduced a liquid-fuel rocket, which used gasoline and liquid oxygen instead of gunpowder." "This small forerunner of our large, present-day rockets actually rose 60 feet into a wintry New England sky." "These experiments led to the founding of the American Rocket Society to advance the science of rocket propulsion." "At the same time, the German professor Hermann Oberth wrote," ""Theoretically, there is no limit to the size of a rocket which uses liquid fuel."" "In 1929, Oberth designed a giant rocket ship for the Fritz Lang movie "Frau im Mond."" ""The Girl in the Moon."" "During the late 1920s and early '30s, we saw an era of feverish activity among the rocket experimenters." "Almost every type of vehicle was adapted to rocket power." "Here is the first successful flight of a rocket-powered airplane." "Rocket-powered autos were fast but presented quite a smoke problem." "There were railroad rockets and nautical rockets." "Some fired and some backfired." "These early attempts met with varying degrees of success." "Meanwhile, in Germany, a group of serious-minded engineers founded a new society for space travel and succeeded in building rockets which finally reached an altitude of 1/2 mile." "Soon after this, the German Army established its own rocket program." "The development of the first rocket missiles followed." "This accelerated rocket program culminated in the creation of the forerunner of spaceships to come, the V-2." "Even though there were a few mishaps, the V-2 emerged at the end of the second World War as the most successful rocket yet devised by man." "75 of these captured V-2s were brought to our rocket proving ground at White Sands, New Mexico, in 1945." "Here, exhaustive studies and test firings were made to aid us in mapping our own newly created rocket program." "It wasn't long before the sands of New Mexico shook to the roaring blast of the Viking, the Corporal, the Aerobee, and other American rockets." "A rocket firing is an awesome demonstration of tremendous power." "I think we should find out how it works." "One of the best authorities on this subject is the rocket historian Willy Ley." "Here Mr. Ley explains the operation of a rocket motor to some of the artists working on the picture." "This is an actual propulsion unit from a V-2." "And this strange-looking device is both the heart and muscle of a rocket, its motor." "Now, all earthbound engines have to burn oxygen from the surrounding atmosphere." "But the high-altitude rocket motor has to work in outer space, where there is no oxygen." "To overcome this, we carry a tank of liquid oxygen here." "When burned with a fuel, in this case, alcohol, it produces an intensely hot, torchlike flame that would quickly melt the motor." "However, we cool the motor by first circulating the alcohol fuel around it until this fuel finally reaches the point where it is sprayed, along with the oxygen, into the combustion chamber." "When this steady flow of alcohol and oxygen is ignited, it produces a continuous explosion which blasts the rocket away in the opposite direction." "Here again we have action and reaction." "If this motor is placed in a streamlined hull with suitable controls, it can reach a high altitude in a very short time." "The V-2 rocket motor only operates 65 seconds to a height of 20 miles." "By then the V-2 has gathered so much speed that it will coast upward to an altitude of 114 miles before gravity begins to pull it back to Earth." "Notice that the rocket does not nose over in the thin upper air." "But it falls tailfirst until it re-enters the denser atmosphere, where the air, acting on the tail fins, turns the rocket nose down." "Early in 1949, space history was made when the payload in the nose of a V-2 was a small rocket called the WAC Corporal." "When the launched V-2 reached its maximum speed, the smaller rocket was ignited." "This additional boost in speed enabled the WAC Corporal to set a new high-altitude record of 250 miles." "This day marked the first time that a man-made object reached outer space." "This was accomplished by using a double rocket, then secretly known as Project Bumper." "However, we refer to it as a two-step, or two-stage, rocket." "Is it possible to build a three-stage rocket?" "Yes, as a matter of fact, that's the next logical step." "Here's a rocket I have designed that has three stages." "It would stand about 70 feet high, or a little taller than the old V-2." "Here you can see the three sections, each one having its own rocket motor." "If somebody would please make a sketch for me, perhaps I can explain how it will work." "Good." "Here we show our rocket in its launching position." "The first great blast starts to lift it." "And after gaining initial speed, the first section is cast off at 20 miles up." "At 45 miles, the second stage is released." "The third stage now fires until it reaches an altitude of 70 miles." "At this point, our rocket has now attained a tremendous speed, and the motor shuts off." "Its forward momentum would carry it straight out into space if it were not for the Earth's gravity." "This downward pull of gravity bends the upward course of the rocket into a curved path." "And if the rocket's speed going away from the Earth creates enough centrifugal force to balance this pull of gravity, our rocket will continue coasting in its curved path around the Earth indefinitely." "Mr. Ley, is there another way we can illustrate this?" "Yes, let's explain it this way." "If the rocket were to move at a slower speed, the pull of gravity would soon overcome the rocket's momentum." "And it would return to Earth here." "If we add a little more speed, the path of the rocket becomes longer." "And it goes farther before it returns to Earth here." "So, if we have our rocket go fast enough, it will eventually follow a curve which matches the curvature of the Earth and will not fall back." "We might say that the rocket falls around the Earth as long as it maintains sufficient speed." "But how does it maintain this speed with the motor shut off?" "Remember, our rocket is traveling above the atmosphere in space, where there is no air friction to slow it down." "How fast does it have to go to stay up there?" "Now, that depends on how high we want the rocket to be as it circles the Earth." "Let's use the altitude of 1,075 miles." "Because at this height, the rocket will have to go nearly 16,000 miles per hour and will make a complete trip around the world every two hours." "A few adjustments in its course will be necessary." "But this can be accomplished from the ground by remote control, after which the rocket will continue to coast freely in space forever." "In other words, the rocket will stay up there just like the moon." "It will circle the globe as a man-made satellite." "What is the purpose of having the satellite up there?" "Having this instrument-carrying rocket moving around the Earth will give us a lot of important information, which we'll need before we dare let a man make his first trip into space." "To run the scientific apparatus contained in the satellite, a mirror will focus the intense rays of the sun onto a silicon battery, converting solar energy into electricity." "There will be a television camera to give pictures of the Earth as it appears from 1,075 miles up." "We will collect very important data on the effects of the mysterious cosmic rays." "Even hits by meteorites the size of a grain of sand will be recorded." "Every two hours, when the rocket moves over the North Pole, its radio will transmit a stream of data to a receiving station below." "This will be the first outpost in man's conquest of space." "One of the big question marks of future space travel will be man himself." "How he will react, mentally and physically, to this unearthly experience is a concern of a new field of science called space medicine." "Helping us illustrate this interesting problem is a scientist most noted for his pioneering work in space medicine," "Dr. Heinz Haber." "When man steps into his rocket ship and leaves the Earth behind, he must be well-equipped to survive in the hostile realm of outer space." "To portray the complex problems of space medicine, we have designed a sort of common man." "A man just like you and me." "We will find out what will happen to him on a trip into space." "In a way, he's going to be our space guinea pig." "That makes him a brand-new biological species." "I think we should call him homo sapiens extraterrestrialis, or spaceman." "Since he was picked at random, we cannot tell whether he will be able to tolerate the tremendous stresses to be placed upon him when the rocket ship is fired into space." "He gets an inkling of these stresses when he rides in an automobile." "When he steps on the accelerator, the car moves forward and he is gently pressed against the back of the seat." "His body resists any change of motion." "When he comes to a stop, his body tends to move forward." "On a test-rocket sled, which is pushed forward at tremendous accelerations, the force of inertia is much stronger." "We are all familiar with centrifugal force." "We duplicate this force in the laboratory by using human centrifuges." "These machines artificially create on man the crushing pressure he will have to endure in a rocket takeoff from Earth." "His body weight increases until he blacks out and finally loses consciousness." "From tests like these, we have learned that man will have to assume a reclining position when his rocket takes off into space." "In this attitude, the stresses will be more evenly distributed along his body." "He will then be able to tolerate pressures of up to nine times his weight or more as it occurs in a rising rocket." "When the rocket engine finally stops, man will face his next big problem, weightlessness." "Without support, he will be floating freely, drifting, tumbling, and twisting helplessly." "In space, a man, a feather, a bubble, or a piece of iron will have the same weight." "Or, rather, no weight at all." "However, man is designed to live with gravity, the down-pulling force which Sir Isaac Newton first explained." "Any two bodies attract with a force which is proportional to the product of their masses and inversely proportional to the square of the distance between them." "Or what goes up must come down." "Loud alarm signals sound throughout the nervous system whenever we are in danger of falling or stumbling." "But weightlessness is not such an unearthly experience." "We become weightless for a short while in a dive." "On a roller coaster." "Or in an elevator." "But if we remove the support by cutting the cable, we produce the exact feeling of weightlessness in space." "It will take iron nerves waiting for the impact that never comes." "We can only hope that man in space will eventually get used to this feeling of falling constantly." "Without weight, our notions of up and down no longer exist." "Man will probably have trouble orienting himself." "Confusion such as this is likely to produce nausea." "Some people may become victims of a serious form of space sickness." "Weightless man in space must learn to guide himself only with his eyes." "Beginners can combat dizziness by fixing their eyes upon one single object." "The spaceman must learn to move with utmost caution." "His muscles are adjusted to normal, earthbound gravity." "In space, any casual action will be violently magnified." "He must coordinate himself under an entirely new set of rules." "He can hardly avoid spinning constantly." "When he crouches into a compact mass, he will spin faster." "If he spreads his arms and legs, the spinning will slow down." "After considerable practice, man will be able to master the art of swimming through the air within the rocket ship." "For the beginner, a web of ropes might be provided." "He must learn that slow, relaxed, careful movements are essential." "After his first few encounters with the problems of weightlessness, he will no doubt try to normalize his life." "Even the air he breathes will be weightless." "Natural circulation of air does not exist." "And there is danger of suffocating in one's own exhalations." "Air must never be allowed to become stagnant in a spaceship." "Circulation must be maintained by constant ventilation." "Since all objects are also without weight in a coasting rocket ship, they must be safely secured by bolts and clamps." "For handling large, bulky objects, man will have to anchor himself in some fashion." "But as it takes force to overcome the object's inertia and set it in motion, it takes equally as much force to stop it once it is moving." "On Earth, we are not exposed to dangers from space, owing to the protective layer of our atmosphere." "But up there, even the hull of the ship would not shield man against the possible hazards of the mysterious cosmic rays." "These tiny bullets from the infinity of space will continually penetrate everything." "They may prove to be harmful to man." "The most energetic of these atomic rays might feel like stings as they shoot through the body." "However, there are other bullets in space that may be of still greater concern." "Meteorites." "These marauders of space travel at speeds up to 150,000 miles per hour." "But if one should puncture the walls of the ship, our air supply would rapidly escape through the opening into the vacuum of outer space." "Without protection, man could last not more than 15 seconds before losing consciousness." "Also, in the intense radiation of the sun, he would soon broil on the one side and freeze on the other." "In the void of space, he will have to wear a space suit." "This specially designed outfit must be a flexible, airtight unit carrying sufficient oxygen." "Featuring built-in, all-purpose equipment, it will afford protection and maneuverability outside the ship." "Propulsion will be by means of a small portable rocket unit." "With proper manipulation of this jet device, even the most subtle movements can be made." "Action." "Reaction." "Dining under conditions of weightlessness will present new and surprising problems." "Liquids will be particularly annoying." "They will not pour." "They must be transferred by titration tubes." "This tube will contain the liquid until it is forced into the desired location." "Unless liquids are kept in leak-proof containers, they will escape and float in ball shapes around the cabin, finally coating all surfaces with a wet film." "Plastic bottles will be used so that liquids can be squeezed out." "Food will be cooked in closed containers by radio frequency shortwave." "Space etiquette will call for the extensive use of sugar tongs." "Man can overindulge in space, but he will never be overweight." "To relieve the inevitable tensions of space travel, we must provide suitable recreation." "A game of three-dimensional pool could be particularly relaxing." "Sleeping will be a new and unique experience." "A space traveler will not need a pillow or mattress." "His bed will consist of a net enclosure to prevent drifting in his sleep." "How will man's subconscious mind react to his first experiences with space travel?" "Will he not suddenly be aware of his precarious situation, trapped in a tiny metal box, floating through the incomprehensible nothingness of space?" "We do not know." "We must plan intelligently if these pioneers of space are to survive and return to Earth safely." "The conquest of space will depend to a great degree on the research and findings of this important new field of science, space medicine." "To the engineer, space flight poses two problems." "The first is, of course, to build a rocket ship." "The second, and no less important, is to prepare and train the men who are to fly the future rocket ships and to provide suitable working conditions that will enable them to survive in space." "To help show you what is being done to solve these problems, we have called upon one of the foremost exponents of space travel," "Dr. Wernher von Braun, who is at present the chief of the guided missile division of the Army's rocket center at Redstone Arsenal." "He was also overall director of the development of the original V-2 rocket." "The training methods for future space flight and the special equipment needed for survival are much like those of present high-altitude flying." "And the experiments we are making today are helping us to solve the more complex problems to come." "Take the present-day pressurized flying suit, for example." "It has been designed for use at extremely high altitudes and is a forerunner of the suits we will wear when we make that trip to the moon." "To give you an idea of how engineers and medical men are working hand in hand, here are a few examples of the research that's being conducted at this time." "This pressure suit is being worn in the test chamber, where the air pressure can be dropped suddenly." "Notice that the water boils at this low pressure, even though it is only at normal body temperature." "Blood would do the same without the protection of the suit." "In other tests without the suit, where the drop in air pressure is less severe, we see that the body still reacts violently to a sudden decrease in pressure." "Lieutenant Colonel John P. Stapp of the United States Air Force has subjected himself to the tremendous forces of a rocket sled that reaches a speed of over 632 miles per hour." "The sled stops so quickly that Colonel Stapp's body becomes 35 times heavier than normal." "From these tests, we have learned that man can take much greater acceleration forces than crew members of a rocket ship will undergo on a takeoff." "Today's aircraft are so fast and so complicated that it has become routine to train the crews on the ground without risking lives or equipment." "This is done with a device called a flight simulator." "Here the crews experience all the sensations of an extended flight." "The crews of future rocket ships will train much the same way." "We will use a simulator on a centrifuge and employ an astrosphere to train the celestial navigators for our coming space flights." "Now, here's a model of my design for a four-stage orbital rocket ship." "Compared to the unmanned instrument rocket, it is quite large." "But the overall size and weight of the rocket is mainly determined by the 11-tons weight of this top section." "This weight dictates the amount of fuel and the numbers of motors needed to produce enough power to equalize the gravitational pull of the Earth." "The payload in the top section will consist of 10 crew members plus equipment." "Notice the wings, small rocket motor, and landing gears." "This is the section that must ultimately return the men to the Earth safely." "To produce the energy needed to haul this stage into the orbit, we need these three additional rocket-powered sections." "Here we have a cutaway drawing of our rocket, showing the location of the fuel and the motors of each section." "The first stage carries 1,060 tons of fuel." "And its 29 motors will lift the entire weight of the ship vertically off the ground." "The second stage has eight motors and carries 155 tons of fuel." "It will be dropped when its speed has reached 14,300 miles per hour." "The next is our third stage, with only one rocket motor and 13 tons of fuel." "The third stage gives the passenger section the final kick to attain the orbit." "It will not be separated from the passenger section until just before the return flight." "The third stage will be left in space." "And a very small motor in the winged fourth stage will return the ship to the atmosphere so it can glide back to the base." "If we were to start today on an organized and well-supported space program," "I believe a practical passenger rocket could be built and tested within 10 years." "Of course, it would be foolish to rush headlong into building a four-stage rocket, man it with a crew, and attempt to fire it into an orbit without first following a step-by-step research-and-development program." "Let's illustrate this with the help of a few pictures." "First, we would design and build the fourth stage and then tow it into the air to test it as a glider." "This would also allow the crews to practice." "Next, low-altitude flights would be made, firing the small rocket motor in the fourth stage." "This would also give the crew more and more training." "Following that, the third and second stages would be constructed and tested very thoroughly on the ground, after which they would be joined to the passenger section so that faster and longer flights could be made up to speeds of about 12,000 miles per hour." "The only thing remaining would be the building and ground testing of the huge first stage." "Then there would be no more test flights." "When all the sections are joined together, the ship and its crew will be ready for man's first flight in space." "Let's look ahead a few years and see how this might be accomplished." "There it is." "A small atoll of coral islands in the Pacific, where man is dedicated to just one cause." "The conquest of space." "Here below us, a small city has been created to house the scientists, engineers, and technicians on whose shoulders rest the tremendous responsibility for this great adventure." "This is the rocket-assembly building with tracks running to the launching site." "Only 48 hours remain until firing time." "Our spaceship moves ponderously toward the firing site." "After the ship is securely anchored over the blast tunnel, the elevator spar is raised into place for the final preflight check and fueling." "This is the blockhouse, the control center for Operation Space Flight." "Here the oscilloscopes, radarscopes, computers, and tracking devices are the brain and nervous system for the rocket." "Dancing patterns of light will record every detail of the blast-off and climb into space." "In the windowless blockhouse, observation is by periscope." "Through a system of worldwide radar stations, electronic eyes will always be focused on the rocket as it orbits around the globe every two hours." "The tracking radars report ready and are standing by." "The optical tracking stations are poised and ready to follow the rocket in its upward flight." "As zero hour approaches, the painstaking work of the checkout crew continues." "The ship and every piece of its equipment is being checked and rechecked." "Blockhouse, can you hear me?" "Will you give me that stage-2 separation signal again?" "Okay, now." "Over." "Now swivel order stage 3 to pitch right." "Okay, now give me the left." "Attention, all personnel." "It is now "X" minus two hours." "Fueling crew, take your stations." "Safety area will be cleared by all personnel." "In the pits, the quantity of fuel is preset." "The pumps will deliver 1,230 tons of hydrazine and red fuming nitric acid into the tanks of the waiting rocket." "It is now "X" minus 20 minutes." "Flight crew, report aboard rocket." "Flight crew, report aboard rocket." "After years of careful preparation, testing men and materials, this is the final payoff." "Now man will bet his life against the unknown dangers of space travel." "Human reactions are not precise enough." "Therefore, once the launching timer is started, the entire takeoff and flight into outer space will be controlled automatically." ""X" minus 5 minutes." "Clear the firing area." "Clear the firing area." ""X" minus 90 seconds." ""X" minus 30 seconds." ""X" minus 20 seconds." ""X" minus 15 seconds." ""X" minus 10, 9, 8, 7, 6, 5, 4," "3, 2, 1." "The total firing time has been five minutes." "The ship will now coast for 51 minutes before the adaptation maneuver begins." "At over 60 miles above the Earth, the crew members experience the sensation of weightlessness for the first time." "Blockhouse to XR-1." "Your cutoff altitude is 63.9 miles." "Distance from launching pad is 705 miles." "Velocity, 18,467 miles per hour." "Angle of elevation, 4 minutes of arc." "Point of your ellipse of ascent incline, 66 degrees, 32 minutes, 2 seconds." "Out." "51 minutes later and halfway around the world, the rocket has coasted to its maximum altitude of 1, 075 miles." "Its speed has diminished to 14, 770 miles per hour." "The navigator must now take a bearing on two fixed stars." "He will line up the ship for the adaptation maneuver, which will drive it into a circular orbit around the Earth." "Electronic controls will fire the rocket motor at the exact second the ship reaches the proper position." "The ship and crew are now coasting freely and silently through space." "Here, man is no longer earthbound." "From his new vantage point of over 1, 000 miles high, he sees the Earth as a vast rolling sphere upon which the oceans and continents are reduced to simple patterns of light and dark." "Great cloud formations will appear as small patches of snow." "Evidence of man's existence is almost invisible." "Large cities can be seen only with the aid of powerful optical equipment." "Meteorologists will make studies for long-range weather forecasting." "The science of astrophysics will welcome the clear views of our moon and planets, unhampered by atmospheric disturbances." "Space medicine will benefit from tests conducted with new-type space suits." "Air Force base calling XR-1." "We have you in radar contact at 107 miles due south of station at 2-9." "Estimation at station Delta at 3-7." "Tests and observations by the crew will lay the groundwork for the future construction of a space station and will add to our knowledge of many sciences." "Instrument rocket approaching from 3:00 high." "At a pre-calculated time, the rocket's path will cross that of the instrument carrier, sent into space a few years before." "22 hours after takeoff, our spaceship has made 11 revolutions around the world." "It is now time to make the return trip." "The engineer releases the third stage." "It'll be left circling in space." "All tests are now concluded." "The navigator checks the ship's position for return firing." "One minute to go." "The automatic firing timer is set." "The ship is lined up so the blast of the motor will be against its forward motion." "This will slow the rocket's speed and cause it to begin its long glide back to Earth." "The ship is now moving 1,000 miles per hour slower." "After coasting halfway around the world, the rocket will leave the vacuum of space and sweep into the upper layers of the atmosphere, where air friction will gradually reduce the rocket's speed." "When the ship drops to an altitude of 50 miles, air pressure will build up on the control surfaces." "For the first time in the entire flight, the captain will be able to fly the rocket as a normal plane." "Air friction begins to send the skin temperature of the rocket climbing until the ship glows cherry red at 1,350 degrees." "The double hull and refrigeration keep the crew from perishing." "The returning rocket continues the long glide down into the lower atmosphere, its temperature gradually dropping to normal as airspeed diminishes." "Mission completed!" "Man has taken his first great stride forward in the conquest of space." "His next goal will be the exploration of the moon." "Then the planets and the infinite universe beyond."
Q: How to keep smooth lines when drawing out animated bezier curves in html5 canvas I finally found out how to animate drawing a bezier curve. I've seen other solutions that use quadratic curves to do it, but I needed 4 points for what I was doing, and b-spline was too difficult finding random plots, plus it's just how I want to do it; with Bezier Cuves. My issue is I can't find a good, fast speed without seeing the dots or lines. I've gotta be missing something. Could someone point out my error or a more efficient way to get this going smoothly at any time/speed? I need it to be steady and go faster than the example below, but if I do anymore the gaps get larger and larger... fiddle with code: https://jsfiddle.net/qzsy8aL7/ //B(t) = (1 - t)^3P0 + 3t(1 - t)^2 P1 + 3t^2(1 - t)P2 + t^3P3 function animatedBSpline(context, points, t) { // Draw curve segment context.beginPath(); context.moveTo( Math.pow(1 - t, 3) * points[0].x + 3 * t * Math.pow(1 - t, 2) * points[1].x + 3 * Math.pow(t, 2) * (1 - t) * points[2].x + Math.pow(t, 3) * points[3].x, Math.pow(1 - t, 3) * points[0].y + 3 * t * Math.pow(1 - t, 2) * points[1].y + 3 * Math.pow(t, 2) * (1 - t) * points[2].y + Math.pow(t, 3) * points[3].y ); // Draw spline segemnts context.lineTo( Math.pow((1 - t) + 0.001, 3) * points[0].x + 3 * (t + 0.001) * Math.pow((1 - t) + 0.001, 2) * points[1].x + 3 * Math.pow(t + 0.001, 2) * (1 - (t + 0.001)) * points[2].x + Math.pow(t + 0.001, 3) * points[3].x, Math.pow((1 - t) + 0.001, 3) * points[0].y + 3 * (t + 0.001) * Math.pow((1 - t) + 0.001, 2) * points[1].y + 3 * Math.pow(t + 0.001, 2) * (1 - (t + 0.001)) * points[2].y + Math.pow(t + 0.001, 3) * points[3].y ); //33d4ff context.strokeStyle="#35bb23"; context.lineJoin="round"; context.lineWidth=2; context.fillStyle = "black"; context.stroke(); context.fill(); // Keep going until t = 1 if (t < 1) requestAnimationFrame(function() { animatedBSpline(context, points, t + 0.01); }); else context.closePath(); } If any more information is needed please let me know. I've been at this all day. To add: If I just outright draw it with these plots, and not animate it being done, it looks fine, obviously, but just wanted to point that out. Its something with the way I'm animating it I just don't know. A: Here's the full updated code with animation of green bezier curve: (function() { var requestAnimationFrame = window.requestAnimationFrame || window.mozRequestAnimationFrame || window.webkitRequestAnimationFrame || window.msRequestAnimationFrame; $(function() { var canvas = $('#drawings')[0]; var context = canvas.getContext('2d'); var lineLength = 0; var lineLengthMax = 7; var timer; // Define points var points = [[{ x: 600, y: 200 }, { x: 550, y: 100 }, { x: 350, y: 100 }, { x: 300, y: 250 }], [{ x: 350, y: 250 }, { x: 75, y: 225 }, { x: 30, y: 400 }, { x: 120, y: 450 }], [{ x: 200, y: 450 }, { x: 5, y: 380 }, { x: 25, y: 750 }, { x: 175, y: 610 }], [{ x: 200, y: 520 }, { x: 150, y: 560 }, { x: 175, y: 750 }, { x: 325, y: 605 }], [{ x: 400, y: 395 }, { x: 275, y: 450 }, { x: 250, y: 750 }, { x: 565, y: 655 }], [{ x: 515, y: 540 }, { x: 500, y: 695 }, { x: 660, y: 675 }, { x: 675, y: 560 }], [{ x: 600, y: 400 }, { x: 790, y: 315 }, { x: 1005, y: 500 }, { x: 675, y: 585 }], [{ x: 500, y: 250 }, { x: 700, y: 100 }, { x: 775, y: 350 }, { x: 700, y: 380 }]]; //33d4ff context.strokeStyle="#35bb23"; context.lineJoin="round"; context.lineWidth=2; doLineDraw(); //animatedBSpline(context, points, 0); function doLineDraw() { if (lineLength <= lineLengthMax) { clearTimeout(timer); // Kick things off at t = 0 context.beginPath(); animatedBSpline(context, points[lineLength], 0); //animatedBSpline(context, eval('points'+(lineLength)), 0); lineLength++; if (lineLength <= lineLengthMax) timer = setTimeout(doLineDraw, 2000); } } //B(t) = (1 - t)^3P0 + 3t(1 - t)^2 P1 + 3t^2(1 - t)P2 + t^3P3 function animatedBSpline(context, points, t) { // Draw curve segment if (t == 0) context.moveTo( Math.pow(1 - t, 3) * points[0].x + 3 * t * Math.pow(1 - t, 2) * points[1].x + 3 * Math.pow(t, 2) * (1 - t) * points[2].x + Math.pow(t, 3) * points[3].x, Math.pow(1 - t, 3) * points[0].y + 3 * t * Math.pow(1 - t, 2) * points[1].y + 3 * Math.pow(t, 2) * (1 - t) * points[2].y + Math.pow(t, 3) * points[3].y ); // Draw spline segemnts context.lineTo( Math.pow((1 - t) + 0.001, 3) * points[0].x + 3 * (t + 0.001) * Math.pow((1 - t) + 0.001, 2) * points[1].x + 3 * Math.pow(t + 0.001, 2) * (1 - (t + 0.001)) * points[2].x + Math.pow(t + 0.001, 3) * points[3].x, Math.pow((1 - t) + 0.001, 3) * points[0].y + 3 * (t + 0.001) * Math.pow((1 - t) + 0.001, 2) * points[1].y + 3 * Math.pow(t + 0.001, 2) * (1 - (t + 0.001)) * points[2].y + Math.pow(t + 0.001, 3) * points[3].y ); //context.fillStyle = "black"; context.stroke(); //context.fill(); // Keep going until t = 1 if (t < 1) requestAnimationFrame(function() { animatedBSpline(context, points, t + 0.01); }); } }); }()); <script src="https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js"></script> <section> <article> <canvas id="drawings" width="1000" height="1000" /> </article> </section> A couple key points, some of which were tangential to the question. Avoid using eval for referencing variable names which have numbers post-fixed. Just use an array instead. The reason you were drawing points instead of lines was because you called context.beginPath() and context.moveTo() before every new vertex, which causes context.stroke() and context.fill() to "forget" the previous instructions. I moved the context.beginPath() outside of animatedBSpline() and specified context.moveTo() to run at t==0 within that function, that way there are no disjointed points. I hope that helps.
WELL STILL HAVN'T FIGURED OUT WHTS UP WITH MY 97 A-8 BUT YESTERDAY MY 1999 A-8 STARTED ACTING UP.......IT WOULD RUN FOR AWHILE THEN SHUT DOWN, IF YOU LET IT SIT FOR ABOUT 20 MINS SHE WOULD FIRE UP AND COULD BE DRIVN FOR AWHILE AGAIN. NOW IT'S HARD TO START AND WILL NOT STAY RUNNING AT ALL....IT DOES FIRE AND WANTS TO RUN BUT JUST AFTER SHE STARTS IT SHUTS BACK DOWN. I WAS SCANNING IT BUT ACCIDENTLY HIT ERASE, I'M THINKING IT SOUNDS LIKE THE CAM SENSOR? ANYONE HAVE ANY INFO? ALSO SHOULD I CHANGE BOTH CAM SENSORS? THANKS GUYS....
Editor's note: Earlier this month, Russell Teibert was featured as part of The Stranger Project 2014 – an initative where creator Colin Easton meets a stranger every day to find out who they are and discover more about their story. Read about Easton's interaction with Teibert below. July 20, 2014 – Today was one of those days that I recognize if I wasn’t so passionate about this project, I might have skipped the day. Maybe it was the rain and clouds, although I enjoy rain. I was happy to have a lazy day off, and bond with my couch. Alas, if I don’t get groceries, I don’t eat. The first two people I approached, both named Dave, were willing to chat, but not comfortable having a picture taken. I got my groceries, went home and had a nap. Always satisfying. Somewhat refreshed, I headed back out to find today’s story. And buy cookies. Cookies punctuate a good nap with a deeper satisfaction. I spotted Russell at a deli, eating and looking at his phone. I walked right past him and then decided to go back. I told him what I was doing and asked if he would chat with me. “I’m sorry, I can’t,” he said. I thanked him and said goodbye. As I turned and walked away, he called me back. “You know what, I’ll talk with you.” I told him I understood that if he wasn’t comfortable, he didn’t have to chat with me. “No, it’s okay, I have a few minutes,” he said. Photo courtesy of Colin Easton, The Stranger Project 2014 I showed him the Facebook page and we had a conversation about the project and why I was doing this. He thought it was a good idea. Russell was born in Niagara Falls, Ontario. When he said “Niagara Falls” it was with an air almost of authority. “I’m extremely proud of where I’m from. Niagara Falls is an amazing place and my family are all still there. I have one sister and we're very close. There’s only one year between us, and we’ve always gotten along well,” he said. Russell went to elementary school there. He also completed half of his high school grades in Niagara before coming to British Columbia. “I came to BC when I was 15. I lived in Burnaby and finished high school here,” he said as he continued eating. I asked why he made the move to BC. “I was playing soccer, and I came here for that.” It was then that I realized who he was. I even remembered the first initial of his last name. Russell plays for Vancouver Whitecaps FC. I had a brief flash of ‘should we continue the chat’ but as fast as the thought crossed my mind, it left. To compensate for my lack of soccer knowledge, I shared a story about the time my uncle and cousins took me to a ‘football’ match in Scotland. I was 10 years old and no one had told me the teams switched sides at half time. I ended up cheering for the ‘wrong’ team. Russell understood the potential gravity of the situation I described. He asked me to tell him about my story. I laughed and said that this was about him, and that if we had time at the end I’d talk about me. He wasn’t having it. I gave him the high level, Cole’s notes version and quickly turned it back to Russell. At the tender age of four, Russell started to play soccer. “I’m Italian and German, so soccer is a big part of my family’s life. I did okay in school. I liked math a lot, but not so much that if I wasn’t playing soccer I would have become a mathematician. It’s hard when you’re traveling for 42 days out of an 80-day semester. I ended up missing a lot of school. But I did what I needed to do to graduate high school. Soccer was important but so was doing well in school,” he said. Russell had been playing soccer in provincial championships when he was spotted by a Whitecaps FC scout. “It’s kind of complicated to explain, but in the provincials there are scouts there from all over. A rep from the Whitecaps approached me and that’s how I came to BC. You get billeted by a host family and I went to school in Burnaby and worked hard at training as well,” he said. I asked Russell about leaving his family to come to BC. “My father played soccer when he was younger, but he never left Niagara to play. He’s in really good shape and I’ve seen him play, and he’s skilled. I think that because of that, my parents have been very supportive in me leaving to pursue my career. For some there can be an added pressure to perform well for the parents. I don’t feel pressure to play well for my father. I play for me and my family are proud of what I do for myself. Of course I want my parents to be proud of what I do and what I accomplish, but there’s no pressure to play for them,” he said with confidence. Before turning 18, Russell went on to play for the Whitecaps FC senior team. I wanted to know how it felt to have reached that level in his career so quickly. “I don’t think I fully appreciated where I was at. It wasn't until it was taken away about a year later because of an injury, that I actually recognized exactly what I’m doing. I’m very fortunate. I get paid to do what I love doing, every single day,” he said. Russell had finished eating, and gathered his belongings, and his lunch plate. “Well, I have to get going,” he said. He took care of his plate and garbage and I walked him to his car, in order to grab a photograph. I asked him if he thought about what his future would be – playing soccer for as long as he could or playing for a certain number of years and then going into something else. “I love this city, I really do. Vancouver is a tremendous place where anything is possible. Whatever you want to do, it can happen here.” Russell is 21. He’s got a lot of soccer matches ahead of him. #notastranger
To link to the entire object, paste this link in email, IM or documentTo embed the entire object, paste this HTML in websiteTo link to this page, paste this link in email, IM or documentTo embed this page, paste this HTML in website To the President Senate and House of Representatives of the United States. The Address of the People called Quakers in their annual Assembly convened. Firmly believing that where Oppression and Violence is publickly advocated by those entrusted with national Authority as Guardians of the common Rights of Humanity however specious and spirited the Professions of Attachment to the Cause of Liberty and the general Well-being of the People over whom the preside the Exercise of their Power must be partial and unavailing to the important End and Aim of their Trust; Unfeigned Righteousness in public as well as private STations is the only sure Ground of hope for the divine Blessing; whence alone Rulers can derive true Honour establish sincere Confidence in the HEarts of the People and feeling their Minds animated with the ennobling Principle of universal good Will to Men, find a conscious Dignity and felicity To the President Senate and House of Representatives of the United States. The Address of the People called Quakers in their annual Assembly convened. Firmly believing that where Oppression and Violence is publickly advocated by those entrusted with national Authority as Guardians of the common Rights of Humanity however specious and spirited the Professions of Attachment to the Cause of Liberty and the general Well-being of the People over whom the preside the Exercise of their Power must be partial and unavailing to the important End and Aim of their Trust; Unfeigned Righteousness in public as well as private STations is the only sure Ground of hope for the divine Blessing; whence alone Rulers can derive true Honour establish sincere Confidence in the HEarts of the People and feeling their Minds animated with the ennobling Principle of universal good Will to Men, find a conscious Dignity and felicity
Q: REALLY simple PIVOT example MS SQL 2014 All the examples I can find for pivot tables involve aggregates and seem too complicated to achieve what I'm trying to do, which seems like it ought to be really simple: take an existing table with a fixed number of rows and present the data in column instead of row format. Here's some mythical data: DECLARE @HSData TABLE ( School NVARCHAR(20) , Sophomores INTEGER , Juniors INTEGER , Seniors INTEGER , Total INTEGER ) INSERT INTO @HSData VALUES ('Armstrong HS',397,337,318,0) , ('Buchanan HS',383,325,308,0) , ('Carlsbad HS',338,321,285,0) UPDATE @HSData SET Total = Sophomores + Juniors + Seniors SELECT * FROM @HSData Results are as follows: What I want is data that looks like this: I can achieve this by manually inserting the data into variables using this code: DECLARE @AName NVARCHAR(20) , @BName NVARCHAR(20) , @CName NVARCHAR(20) , @A10 INTEGER , @A11 INTEGER , @A12 INTEGER , @B10 INTEGER , @B11 INTEGER , @B12 INTEGER , @C10 INTEGER , @C11 INTEGER , @C12 INTEGER SET @AName = (SELECT School FROM (SELECT School, ROW_NUMBER() OVER (ORDER BY School) RN FROM @HSData) SR WHERE RN = 1) SET @BName = (SELECT School FROM (SELECT School, ROW_NUMBER() OVER (ORDER BY School) RN FROM @HSData) SR WHERE RN = 2) SET @CName = (SELECT School FROM (SELECT School, ROW_NUMBER() OVER (ORDER BY School) RN FROM @HSData) SR WHERE RN = 3) SET @A10 = (SELECT Sophomores FROM @HSData WHERE School = @AName) SET @B10 = (SELECT Sophomores FROM @HSData WHERE School = @BName) SET @C10 = (SELECT Sophomores FROM @HSData WHERE School = @CName) SET @A11 = (SELECT Juniors FROM @HSData WHERE School = @AName) SET @B11 = (SELECT Juniors FROM @HSData WHERE School = @BName) SET @C11 = (SELECT Juniors FROM @HSData WHERE School = @CName) SET @A12 = (SELECT Seniors FROM @HSData WHERE School = @AName) SET @B12 = (SELECT Seniors FROM @HSData WHERE School = @BName) SET @C12 = (SELECT Seniors FROM @HSData WHERE School = @CName) DECLARE @HSData2 TABLE ( Class NVARCHAR(20) , "Armstrong HS" INTEGER , "Buchanan HS" INTEGER , "Carlsbad HS" INTEGER ) INSERT INTO @HSData2 VALUES ('Sophomores',@A10,@B10,@C10) , ('Juniors', @A11,@B11,@C11) , ('Seniors', @A12,@B12,@C12) , ('Total', @A10+@A11+@A12,@B10+@B11+@B12,@C10+@C11+@C12) SELECT * FROM @HSData2 But it seems like there ought to be a better way. Ideally, I can get this all into an SSRS report and then not worry about it. But it still struck me as a bit odd that I couldn't find any simpler code for it. A: Unpivot the data first then pivot. SELECT * FROM @HSData UNPIVOT ( Students FOR Class IN (Sophomores, Juniors, Seniors, Total) ) up PIVOT ( SUM(Students) FOR School IN ([Armstrong HS], [Buchanan HS], [Carlsbad HS]) ) p ORDER BY CASE Class WHEN 'Sophomores' THEN 1 WHEN 'Juniors' THEN 2 WHEN 'Seniors' THEN 3 WHEN 'Total' THEN 4 END
Q: Wait for API call return before proceeding I am very weak in javascript but I think I understand what's going wrong. Just not fluent enough to know how to fix it or even how to correctly write it. I have a VueJS app that sends requests to an API with an access_token. When that access_token expiries it sends a refresh_token to the API and gets a new access_token. I want it to then redo the request it was running when it expired. Using the code below I get strange behavior. When it hits the 401 I can see it access the /token endpoint and get a new access_token however the next call to /brewery is using the old access_token. This happens about 5 times before a call to /brewery finally uses the new access_token and the loop stops. My guess is that when I call this.loaded() the call to auth.refreshToken() hasn't finished yet? loaded(access_token){ var headers; if(access_token) { headers = { 'Authorization': 'Bearer ' + access_token } } else { headers = auth.getAuthHeader(); } axios.get(this.getBaseUrl + '/brewery/', { headers }) .then((response) => { this.breweries = response.data.data.slice(0); }) .catch((error) => { if(error.response.status == 401) { console.log("error 401"); var new_access_token = auth.refreshToken(); this.loaded(new_access_token); } }); } Auth class refreshToken(context) { var token = { refresh_token: localStorage.getItem('refresh_token'), grant_type: 'refresh_token' }; token = querystring.stringify(token); axios.post(LOGIN_URL, token) .then((response) => { localStorage.removeItem('access_token'); localStorage.setItem('access_token', response.data.access_token); this.checkLoggedIn(); if(!this.isAdmin()) { context.error = "You are not an admin user"; } return response.data.access_token; }) .catch(function (error) { if(error.response){ if(error.response.status == 400) { console.log(error.response.data); context.error = error.response.data; } } }) } A: This looks like promise chaining/structure issue. To make the call to this.loaded occur after the call to auth.refreshToken has completed you should make the refreshToken method return a promise. Specifically, it should return the axios.post call. That axios.post call, when successful is actually executing this line return response.data.access_token; and resolving the token. Now when you make a call to auth.refreshToken you should append a then block like so: auth.refreshToken().then((token) => { this.loaded(token) }) Without structuring this code in a synchronous manner, you're going to get multiple calls to this.loaded because each one will fail with a stale token... or at the least an undefined token.
business.answers.com/...one-year-mba-programs-in-the-u-sThese are some of the best one-year MBA programs in the United States. A one-year MBA program is expensive, but it is worth the cost in saving you time as it expands your knowledge and career potential. Rate This Article. Thanks For Rating! www.macquil.com/articles/oneyearmba.phpESADE’s One Year Full Time MBA program lasts 12 months starting in April and ending in March. ... can you please provide details about the 1 year MBA programs in united states. Deepa. February 20, 2012 at 5:17 am · Reply. www.mbastudies.com/MBA/1-year-MBA/USA/Online1-year MBA programs offer extensive business management studies. ... Education in the United States is mainly provided by the public sector, with control and funding coming from three levels: state, local, and federal, in that order. 1yearmbaprograms.info/online-mba-programs-united-statesThis article will review some of the best universities that provides online MBA programs in the United States. The Online MBA Programs. There are many MBA online programs available for students wishing to pursue their education but cannot take the time away from their previous responsibilities ... en.wikipedia.org/wiki/Master_of_Business_Administration... is a master's degree in business administration ... Full-Time Executive MBA programs are a new category of full-time 1 year MBA programs aimed at professionals with approx. 5 ... Pakistan first offered an MBA program outside the United States in 1955 in collaboration with the University of ... online.ben.edu/business/mba/accelerated-mba-degree-onlineBenedictine's accelerated MBA program is designed for motivated professionals who want to complete their degree faster by taking two classes during each session. www.hult.edu/en/Programs/MBAOur One-Year MBA program is the world's first MBA designed by business leaders and fully integrates business practice and professional skills development. ... Download a brochure or request a printed copy for in-depth information on our One-Year MBA program. downloadily.com/docs/one-year-executive-mba-programs-in... MBA PROGRAMS - Home : University of Miami School of Business. MBA PROGRAMS. EXECUTIVE MBA. THE MIAMI EXECUTIVE MBA FOR ... of the University of Miami that no citizen of the United States, ... the same MBA degree as the one en.wikipedia.org/...United_States...business_school_rankings...List of United States business school rankings is a tabular listing of some of the business schools and their affiliated universities located in the United States that are included in one or more of the rankings of full-time Master of Business Administration programs. ... a five-year return on ... https://www.askives.com/one-year-mba-in-usa.htmlOne Year Mba In Usa? ... Tweet. one year mba in usa? You are here: Questions / one year mba in usa? Possible Answer One year MBA programs are directed towards those students who have already acquired bachelors or a master’s degree and wish to ... United States. General: Business ... www.businessmba.org/best/affordable-mba-programs... Not only is the W.P. Carey School of Business one of the largest MBA programs in the United States, ... A versatile school, Katz has a satellite MBA program in Prague, an accelerated one-year MBA program, and offers students four ... Most Affordable Online MBA Programs; Most Affordable MBA ... www.thebestcolleges.org/best-online-mbaNorthcentral University offers two online Master of Business Administration programs: the standard track, a two year degree ... The Master of Business Administration program is designed for working professionals who desire to complete a program of ... 10 Best Film Schools In The United States; whichuniversitybest.blogspot.com/2008/06/top-mba-schools...Top MBA Schools in the United States. The top MBA schools in the US according to U.S. News and World Report's MBA Rankings 2012: 1. Stanford 2. Harvard 3. MIT (Sloan) 3. www.allbusinessschools.com/business-careers/mba/...Guide to MBA Programs for International Students. ... There are also many private language institutions in the United States and worldwide, ... Test dates are scheduled several times during the course of a year, ... www.gradschools.com/graduate-schools-in-united-states/...Review Graduate Program details of MBA Program Online from Colorado State University. The MBA is offered in a 2-year, part-time, on-campus, evening format. We also offer a 2-year or 4-year part-time, and online format requiring no... www.searchmba.com/find-mba/usaFind MBA Programs in the United States of America: ... Hult International Business School has designed this accelerated one year MBA program to provide practical management education for ambitious individuals.... Iowa International MBA Hong Kong University ... www.business.pitt.edu/katz/mbaMaster of Business Administration ... the University of Pittsburgh’s Joseph M. Katz Graduate School of Business is ranked No. 23 among U.S. public programs and No. 48 in the United States. ... In the Financial Times’ 2015 Global MBA Ranking, the University of Pittsburgh’s Joseph M ... www.tsgx.net/article/one-year-mba-in-us.htmlOne year mba in us Date; VISIT: One-Year MBA: April 07,2015: One-Year MBA One Global ... Making it easier to afford your MBA Our one-year program ... and other affiliated companies, business education in the United States, ... www.mbastudies.com/MBA/MBA-International/USA/Part-timeThe Bridge Global MBA program is designed to meet the needs of the international students whose baccalaureate degrees were completed in three years rather than four years.
create database bad_rename2; use bad_rename2; alter table bad_rename2.rename_not_exists rename to bad_db_notexists.rename1;
Robert Jervis Robert Jervis (Ph.D., California at Berkeley, 1968) is the Adlai E. Stevenson Professor of International Politics and has been a member of the Columbia political science department since 1980. He has also held professorial appointments at the University of California at Los Angeles (1974-1980) and Harvard University (1968-1974). In 2000-2001, he served as President of the American Political Science Association. Professor Jervis is co-editor of the "Cornell Studies in Security Affairs," a series published by Cornell University Press, and a member of numerous editorial review boards for scholarly journals. His publications include Perception and Misperception in International Politics, The Meaning of the Nuclear Revolution, System Effects: Complexity in Political and Social Life, American Foreign Policy in a New Era, and Why Intelligence Fails: Lessons from the Fall of the Shah and Iraqi WMD, and several edited volumes and numerous articles in scholarly journals.
Dear Answer Angel Ellen: I have a Gucci cross-body bag, which I purchased some years ago. I no longer have the receipt, but I know I purchased it at a reputable department store. I would like to sell the purse but do not know how to authenticate it. I have emailed Gucci but have not gotten a response. Any suggestions you can offer would be greatly appreciated.— W.J.B. Dear W. J. B.: I wouldn’t hold my breath waiting for a response from Gucci. Fortunately, there is more info out there on authenticating designer bags than you could possibly wade through. YouTube (youtube.com) has dozens of videos. There are bag blogs galore — like bagvanity.com and bagaholic101.com — that have extensive guides on the subject. But, if you’re planning to sell or consign it at a high-end shop (like therealreal.com), they know how to tell fakes and will save you the trouble of all that research. They have eagle-eye experts on hand to authenticate Gucci, Hermes and many other often-knocked-off luxury brands. You’d get more for your Gucci bag if you had the sales receipt, the controllato (authenticity card) and the dust bag that came with it. But don’t cry over that spilled milk. Hope that your bag is one that is rare and in demand. If so and if yours is in great shape, you could well get plenty more than you paid for it. Dear Answer Angel Ellen: I am fit but not thin, and all my extra weight is in my rear, hips and thighs. One of my regular workouts is a 4-mile walk around my neighborhood, but I can’t find shorts to wear for the trek. I am not comfortable in tight yoga-pant-style shorts and the 5-inch inseam of nylon running shorts is way too skimpy for me. I don’t want Bermuda shorts. I would pay dearly for a pair of shorts made out of material that would be good for a long walk on a hot summer day, has about an 8-inch inseam and will fit my hips without being too big in the waist. I’ve looked everywhere I can think of. Fitness wear seems to be made for tall, thin, young people. Is there any hope? — Anne H. Dear Anne: Yes, indeed, there’s hope. Think about a skort. It looks like a skirt but has shorts attached. Women golfers swear by them. Often, they even have pockets! Some also feature internal drawstring waists or elastic waists. An online search for “golf skort” turns up many options (for instance, Lands’ End, landsend.com, $25.95 to size 16). One more suggestion, shop in the men’s department where “ample” shorts are the norm. Angelic readers Tom D. had this suggestion for the reader who had high-quality professional clothes to donate: “Cara is always looking for women’s and men’s business attire for its clients who are climbing out of poverty and attaining a job in the workplace. Go to carachicago.org to learn more about this fabulous Chicago organization.” I contacted the president and CEO of Cara and learned that Cara’s only branch is in Chicago right now, but if that’s not convenient, contact the organization through the website to arrange donations by mail. Another option: Cele C. says, “Check out local theater groups or costume shops, which often need 'period’ clothes.” Reader rants Readers wrote in droves to sing agreement and say “Amen” to the letter from Joan B. struggling to understand why female television weathercasters wear tight, short, sexy clothes. A small sample: Marge C.: “I have even switched channels because of this issue. It is not just weathercasters; it is anchors as well.” Mary W.: “It seems to be a dress code on all the stations. They look like they are posing for the camera as if modeling, and I think the sleeveless dresses look foolish in the winter months. It's not supposed to be a fashion show.” Dolores M.: “One cannot even pay attention to the weather report for the distraction. Some of the reporters also should never be seen in some of the things they wear on TV. More recently, some of the male weathercasters also have been wearing too tight/too short jackets and the awful skinny pants, which look terrible on most all men. It may be the going trend, but it remains a poor choice, regardless.” Cathy S.: “I agree with Joan B. that the female weathercasters (and some of the anchors, as well) wear clothes that are too tight and too short. They look more like cheerleaders than educated, competent professionals, and I find it distracting. I often wish that the women wore a ‘uniform,’ as the men do, so that we could focus on their reports, rather than on their fashion choices.” MaryAnn G.: “I was glad to read that someone else has wondered why some female weathercasters dress so inappropriately on TV. If they want to be respected for their profession, they should think about what they are portraying.” Pat K.: “I find it so demeaning and disturbing that the apparel of females cannot be as professional as that of males. If women want to be considered as professional as men, then they should dress as such. We cannot be taken seriously if we do not take ourselves and our positions seriously.” Bud has a different opinion, which make’s Pat’s point, above, though I don’t think he meant to: “Ellen, Ellen, Ellen — I am part of the target demographic of men (and many women) between 14 and 94 who appreciate cute, fit and perky female weathercasters. If we did not want to see attractive weathercasters, we would look at the weather app or turn on the radio.”
Q: Git thrashing CPU on OS/X when running SourceTree While running SourceTree, periodically (ie multiple times per day), I notice that my computer is running slowly and that git is using lots of CPU (> 90%). There is no visible activity in SourceTree, and I'm not actively using it. I'm running the lastest version of SourceTree (2.0.5.2) and git (v2.5.0). Mac OS/X Yosemite on a Macbook Air. I'm curious to know if others see this, or if it is an anomaly of my system / configuration. Thanks! A: Okay, I found the problem. I ran lsof | grep <git pid> and noticed that the pwd was set to my home directory, and that I had a long forgotten git repository in my home root. So every couple of minutes, SourceTree was running git status against everything in my home directory. It's a mystery why SourceTree was running git there though, since I didn't have that git repo open in SourceTree. I'll file a bug against SourceTree. Thanks!
Marine Discovery! is an outreach program at the University of Arizona designed to teach Grade K-8 students about the importance of our oceans. Marine Discovery is sponsored by the Dept of Ecology and Evolutionary Biology.
Malaria parasite interactions with the human host. The interaction between the malaria parasite and the human host involves a number of interactions that result in the parasite evading the human immune system. Since the stages of the malaria lifecycle are complex, this allows the use of various immune evasion strategies by the malaria parasite and has major implications in the development of a vaccine for malaria endemic areas. The present review highlights key host:parasite interactions. Plasmodia puts selection pressure on human gene frequencies, and studies into host genetic factors such as the Duffy blood group and sickle cell anaemia offer insight into the host- parasite relationship. In addition, parasite interactions with the different effector arms of the immune system can result in altered peptide ligand (APL) antagonism which alters the immune response from a pro- to an anti-inflammatory T cell response. Recent insights into the interaction between professional antigen presenting cells, dendritic cells (DCs), and malaria parasites is discussed in detail.
Here's what I don't get. If concealed carry is such a good idea and is going to make us all safer, why exempt government buildings where lawmakers work? Or schools for that matter. Think how much safer the kids will be if someone with a gun happens to be around if trouble breaks out in the lunch line or third-hour study hall. You know, it takes a vigilante to raise a child. If more guns equal more protection, then let's go for it and quit watering down the rules. Maybe we can even start handing out firearms like we do bike helmets and smoke alarms. It's time for Wisconsin to join the rest of America and allow us to walk around with powerful guns in our pants. We may need to change the license plates to America's Carryland. Republican legislators are moving quickly to make it happen, and this time they don't have to worry about Jim Doyle getting all prudent and reasonable and vetoing the thing. Lawmakers pretended to care what the public thinks at two hearings on the issue Thursday. I'd hate to see the legislators in Madison miss out on this vital protection in their own building. I'm assuming they're going to be armed, too, because that's the best way to ensure you'll survive the workday. So if any of these Madison lefties would bring a weapon into the Capitol, they'd be outgunned. You can see how much safer everyone will be. We could stop wasting everyone's time with these security checkpoints at Milwaukee County Courthouse entrances. This building, too, deserves the same premium level of protection that concealed carry will bring. An armed courthouse is a polite courthouse. And people wouldn't have to surrender their tweezers and knitting needles anymore. And what's with exempting police stations? They should think of everyone walking through the door as a newly armed deputy, not a potential 10-32 in progress. Meanwhile, domestic abuse shelters would have no such prohibition. See? They get it. Everybody knows guns save lives. Think of all the businesses that foolishly will opt to ban firearms from their premises as allowed by the proposed law. Don't they know this just dares criminals to come on in and help themselves? It's sad that they would deny their customers the chance to blast away at punks or people who look like they could be punks. One of the concealed carry bills says there's no need for training or a permit. Now we're talking. Training schmaining, and I would add permits schmermits. It's going to take some trial and error to get our aim straight, but we don't need big nanny state government telling us it might be better if we had some minimum level of firearms proficiency. A permit would be required even to keep chickens in Milwaukee under a proposed ordinance, but Wisconsin is considering allowing concealed carry without one. We'll let the bad guys be the chickens when they think they might be up against a statewide army of untrained and unscreened gun toters. Going off half-cocked? You bet your life we are. Seriously, your life. We might as well let felons carry concealed weapons while we're at it. They're easily more experienced with guns than the rest of us, and they're not afraid to use them. Let's give them a second chance to be the guys in the white hats for a change. And who are we to tell the mentally ill they have to go through life without ready access to lethal firepower? Do you see anything about that in the Second Amendment? Don't be left out of the party. Get yourself a gun and some ammo, and let's make Wisconsin truly the home of the packers. Call Jim Stingl at (414) 224-2017 or email at jstingl@journalsentinel.com
Tutors are available to assist students in their coursework. Academic support services staff trains tutors.All sessions must be held in academic support areas within the athletic department facilities. Academic Support Services staff can work with coaches and student-athletes to assign academic mentors, if necessary. To request a mentor contact your sport advisor. Student-athletes are encouraged to form study groups and may use any of the study areas within the academic learning center. There are several survey courses where group tutoring is beneficial. After enrollment the academic support staff will review those courses and see if a group tutoring session would be appropriate. Math walk-in tutors are located in the IAF on Sunday through Thursday evenings from 6-10 pm. These tutors are available on a first come, first served basis for any student-athlete who is experiencing difficulty in math. Chemistry walk-in tutors are located in the IAF on Tuesday and Thursday evenings from 7:30 – 10 p.m. This service is offered on a first come, first served basis for any student-athlete needing assistance with any chemistry courses offered at Purdue University. The English walk-in tutor is located in IAF on several evenings from 7:00-10 p.m. This service is offered on a first come, first served basis for any student-athlete needing assistance with papers and writing projects Study Table is fully monitored six days a week to provide a quiet and controlled environment for study. Hours for monitored study table in the IAF are: Monday – Thursday from 8 a.m. to 10:30pm, Friday from 8 a.m. to 5 p.m. and Sunday from noon to 10:30 p.m. A 74-station computer lab is located in the IAF. This lab is staffed and maintained by the Information Technology at Purdue (ITaP) staff.
Isolation and characterization of a cDNA from a human histone H2B gene which is reciprocally expressed in relation to replication-dependent H2B histone genes during HL60 cell differentiation. A variant human histone H2B cDNA (HHC289) has been cloned and characterized and shown to have a complex pattern of regulation with respect to the HeLa S3 cell cycle and HL60 cell differentiation. The H2B protein coding region of HHC289 is flanked at the 3' end by a 1798-nt nontranslated trailer that contains a region of hyphenated dyad symmetry and a poly(A) addition sequence, followed by a poly(A) tail. Nuclear run-on transcription analysis revealed a 2-fold increase in transcription of the HHC289 gene during S phase, in comparison to replication-dependent human histone genes which exhibit a 2-3-fold increase in transcription during S phase. Northern blot analysis indicated that the levels of the 2300-nt HHC289 mRNA species did not vary significantly during the HeLa S3 cell cycle, in comparison to replication-dependent H2B mRNAs which are elevated 15-fold during S phase. Northern blot analysis also revealed a reciprocal relationship during the onset of HL60 differentiation between the expression of the HHC289 H2B gene and the replication-dependent H2B genes. The levels of the 2300-nt HHC289 H2B species increased approximately 10-fold during HL60 cell differentiation whereas the levels of cell cycle dependent H2B mRNAs decreased to less than 1% of those in proliferating cells. These results suggest that complex transcriptional and posttranscriptional regulatory mechanisms control cellular levels of mRNAs from various human H2B histone genes during progression through the cell cycle and at the onset of differentiation.
06-05-2011, 03:58 PMBulldog Paintball ParkPlayed here last weekend, have only heard of this place once Before and checked out their facebook. The field was clean kept bunkers inflated. It's a small field run by a group of friend that are... Played here last weekend, have only heard of this place once Before and checked out their facebook. The field was clean kept bunkers inflated. It's a small field run by a group of friend that are very friendly. The guys their don't have much as far as a shop. It's a shack but my tank gets a good fill and we played some good paintball. Will be back to play with the bull dogs in the near future This review has been rated: Currently 0/5 stars. 02-02-2012, 05:38 PMBulldog Paintball ParkThis is a great field to play on. The owners are some good people very friendly. Awesome place to have B-Day Parties and Bachelor Parties. This is a great field to play on. The owners are some good people very friendly. Awesome place to have B-Day Parties and Bachelor Parties. This review has been rated: Currently 0/5 stars. 04-07-2012, 11:05 PMBulldog Paintball ParkAll in all it is a fun place to place. The fields is a small 3 man field. A larger 5 man field would be very nice. Keep stock of common needed item such as batteries.
Snapshot Sermons That’s the challenge Huntington Willard, director of Duke University’s Institute for Genome Sciences and Policy, has set his doctoral students. In addition to their dissertation, they are to submit a “snapshot dissertation,” 30-60 second video summing up the hundreds of pages and thousands of hours they’ve poured into it. You can hear the squeals already, can’t you? I have two friends who completed scientific doctorates, and over the years I must have asked them a dozen times each to explain their work to me. Despite many glassy-eyed hours, I’m still none the wiser. “I’ve always been convinced of the need for scholars to be able to speak ‘in plain English’ to people outside of the academy,” said Willard. “I teach [students] to imagine explaining what they’re learning to their parents or grandparents.” It’s all part of Duke’s Scholars and Public initiative to forge greater connections between the academy and the community. For the same reason, no matter how much it makes us squeal, preachers (and teachers) should be “forced” (or should force themselves) to sum up their sermon (or lesson) in one sentence. For example, here’s a “Snapshot Sermon” on Psalm 2: As God offers peace to his enemies before He defeats them, embrace His Son of Peace before He becomes your Judge. The main points of the sermon were: The Lord has multiple enemies (1-3) The Lord will defeat His enemies (4-9) The Lord offers peace to His enemies (10-12) We want to compare the snapshot sermon with the main points and ask: Is it comprehensive? Does the summary cover all the main points of the sermon? Is it unified? Do the different parts make up one whole or just lots of disconnected parts? Is it short? Can I say this in fewer words without sacrificing the meaning? Is it purposeful? Does it explain the point, the end, the aim of the sermon? Is it worth it? Sometimes this exercise reveals that for all the good things in the sermon, there’s actually no real substance in it or no great point to it. Apart from preventing some sermons being preached that should never be preached, this exercise also reveals if we’ve really mastered our subject. It also helps the preacher hone his material, cutting out anything that doesn’t connect with and support the snapshot. In the act of preaching the snapshot helps the preacher to achieve disciplined focus, forward momentum, and fitting climax. This is very similar or the same as what Dr. Haddon Robinson has been calling, “The Homiletical Idea” for decades. It’s the method in which I was taught to preach. http://headhearthand.org/blog/ David Murray Yes, it’s similar. http://www.compete4christ.blogspot.com Kurt Earl I think using Prezi greatly aides in this process as well. http://headhearthand.org/blog/ David Murray Interesting suggestion. Prezi is an amazing tool. http://www.google.com http://www.google.com The combination would sometimes knocck the imbibers out for a couple oof days. Unusual for any fish species, with the females, as they get older, their sex can change to male. Find Indian astrology wit horoscope and live astrological prediction , aries horoscope, daily, monthly, yearly analysis oof birth chart and individual prediction of all planet with gemstone. David Murray Pastor . Professor . Author All opinions expressed are my own and do not necessarily represent Puritan Reformed Seminary or the Free Reformed Church.
HIV and other viral infections are one leading cause of death. HIV is a disease in which a virus is replicated in the body which attacks the body's immune system. The HIV virus is not easily destroyed nor is there a good mechanism for keeping the host cells from replicating the virus. Herpes Simplex is another viral infection which is difficult, if not impossible, to cure. A method of treating these diseases and other viral infections is highly desirable. A material which targets the HIV virus and inhibit viral replication is highly desirable. Several drugs have been approved for treatment of this devastating disease, including azidovudine (AZT), didanosine (dideoxyinosine, ddI), d4T, zalcitabine (dideoxycytosine, ddC), nevirapine, lamivudine (epivir, 3TC), saquinavir (Invirase), ritonavir (Norvir), indinavir (Crixivan), and delavirdine (Rescriptor). See M. I. Johnston & D. F. Hoth, Science, 260(5112), 1286-1293 (1993) and D. D. Richman, Science, 272(5270), 1886-1888 (1996 An AIDS vaccine (Salk's vaccine) has been tested and several proteins which are chemokines from CD8 have been discovered to act as HIV suppressors. In addition to the above synthetic nucleoside analogs, proteins, and antibodies, several plants and substances derived from plants have been found to have in vitro anti-HIV activity. However, HIV virus is not easily destroyed nor is there a good mechanism for keeping the host cells from replicating the virus. Thus, medical professionals continue to search for drugs that can prevent HIV infections, treat HIV carriers to prevent them from progressing to full-blown deadly AIDS, and treat the AIDS patient. Herpes simplex virus (HSV) types 1 and 2 are persistent viruses that commonly infect humans; they cause a variety of troubling human diseases. HSV type 1 causes oral "fever blisters" (recurrent herpes labialis), and HSV type 2 causes genital herpes, which has become a major venereal disease in many parts of the world. No fully satisfactory treatment for genital herpes currently exists. In addition, although it is uncommon, HSV can also cause encephalitis, a life-threatening infection of the brain. (The Merck Manual, Holvey, Ed., 1972; Whitley, Herpes Simplex Viruses, In: Virology, 2nd Ed., Raven Press (1990)). A most serious HSV-caused disorder is dendritic keratitis, an eye infection that produces a branched lesion of the cornea, which can in turn lead to permanent scarring and loss of vision. Ocular infections with HSV are a major cause of blindness. HSV is also a virus which is difficult, if not impossible to cure. Hepatitis is a disease of the human liver. It is manifested with inflammation of the liver and is usually caused by viral infections and sometimes from toxic agents. Hepatitis may progress to liver cirrhosis, liver cancer, and eventually death. Several viruses such as hepatitis A, B, C, D, E and G are known to cause various types of viral hepatitis. Among them, HBV and HCV are the most serious. HBV is a DNA virus with avirion size of 42 nm. HCV is a RNA virus with a virion size of 30-60 nm. See D. S. Chen, J. Formos. Med. Assoc., 95(1), 6-12 (1996). Hepatitis C infects 4 to 5 times the number of people infected with HIV. Hepatitis C is difficult to treat and it is estimated that there are 500 million people infected with it worldwide (about 15 time those infected with HIV). No effective immunization is currently available, and hepatitis C can only be controlled by other preventive measures such as improvement in hygiene and sanitary conditions and interrupting the route of transmission. At present, the only acceptable treatment for chronic hepatitis C is interferon which requires at least six (6) months of treatment and or ribavarin which can inhibit viral replication in infected cells and also improve liver function in some people. Treatment with interferon with or without Ribavarin however has limited long term efficacy with a response rate about 25%. Hepatitis B virus infection lead to a wide spectrum of liver injury. Moreover, chronic hepatitis B infection has been linked to the subsequent development of hepatocellular carcinoma, a major cause of death. Current prevention of HBV infection is a hepatitis B vaccination which is therapeutically effective. However, vaccination is not effective in treating those already infected (i.e., carriers and patients). Many drugs have been used in treating chronic hepatitis B and none have been proven to be effective, except interferon. Treatment of HCV and HBV with interferon has limited success and has frequently been associated with adverse side effects such as fatigue, fever, chills, headache, myalgias, arthralgias, mild alopecia, psychiatric effects and associated disorders, autoimmune phenomena and associated disorders and thyroid dysfunction. Because the interferon therapy has limited efficacy and frequent adverse effects, a ore effective regimen is needed.
Glucocorticoid receptor protein expression in human hippocampus; stability with age. The glucocorticoid receptor (GR) exerts numerous functions in the body and brain. In the brain, it has been implicated, amongst others, in feedback regulation of the hypothalamic-pituitary-adrenal axis, with potential deficits during aging and in depression. GRs are abundantly expressed in the hippocampus of rodent, except for the Ammon's horn (CA) 3 subregion. In rhesus monkey however, GR protein was largely absent from all hippocampal subregions, which prompted us to investigate its distribution in human hippocampus. After validation of antibody specificity, we investigated GRα protein distribution in the postmortem hippocampus of 26 human control subjects (1-98 years of age) and quantified changes with age and sex. In contrast to monkey, abundant GR-immunoreactivity was present in nuclei of almost all neurons of the hippocampal CA subfields and dentate gyrus (DG), although neurons of the CA3 subregion displayed lower levels of immunoreactivity. Colocalization with glial fibrillary acidic protein confirmed that GR was additionally expressed in approximately 50% of the astrocytes in the CA regions, with lower levels of colocalization (approximately 20%) in the DG. With increased age, GR expression remained stable in the CA regions in both sexes, whereas a significant negative correlation was found with age only in the DG of females. Thus, in contrast to the very low levels previously reported in monkey, GR protein is prominently expressed in human hippocampus, indicating that this region can form an important target for corticosteroid effects in human.
Trim Size: 170mm x 244mm Cautin ecp0388.tex V1 05/27/2014 12:55 A.M. Page 1 Confirmation versus Falsificationism Ray Scott Percival Philosopher, Author and Founder of the Karl Popper Web, U.K. Confirmation and falsification are different strategies for testing theories and characterizing the outcomes of those tests. Roughly speaking, confirmation is the act of using evidence or reason to verify or certify that a statement is true, definite, or approximately true, whereas falsification is the act of classifying a statement as false in the light of observation reports. In clinical practice, the issue of confirmation versus falsification was highlighted by Karl Popper (1902–94), in his critique of Freud's and Adler's depth psychologies. Wishing to demarcate science from nonscientific pursuits, Popper contrasted Einstein's falsifiable theory with the "confirmable" but unfalsifiable theories of Freud and Adler. On the one hand, almost any behavior could be interpreted as "confirming" Freud's or Adler's theory, because the behavioral evidence is itself interpreted in the light of the theories. This makes confirmations worthless. Moreover, Freud failed to stipulate conditions under which the theory would be falsified. For example, what observation would show that the id does not exist? In contrast, Einstein boldly stipulated decisive experimental observations that, if satisfied, would refute his theory. For example, if the path of light from a distant star had not been observed (by Eddington in 1919) to bend by a certain degree when passing close to the sun, Einstein would have abandoned his theory. Popper's proposed method is falsificationism. Instead of proposing hypotheses and then seeing if they can be confirmed by evidence, Popper said that science ought to involve making conjectures that can potentially be refuted. The Encyclopedia of Clinical Psychology, First Edition. Edited by Robin L. Cautin and Scott O. Lilienfeld. © 2015 John Wiley & Sons, Inc. Published 2015 by John Wiley & Sons, Inc. Stimulated by a problem, the scientist advances unfounded theories, which are then subjected to relentless attempts to falsify them by observation; confirmation is seen as infeasible and pointless, irrelevant. This barrage of criticism then leads to further, deeper problems, which in turn stimulate further theories, potentially nearer to the truth. Because conjectures are freely made and retained until falsified, no justifications or inductive confirmation rules are needed. This is not a description of science, but a proposal about what scientists ought to do to advance science. The problem of confirmation versus falsification is an intense focus of debate within a wider context of fundamentally competing epistemologies: justificationism and critical rationalism. Justificationism is the idea that one should accept all and only those positions that one can justify by logic or experience. The heyday of justificationism was the Vienna Circle of the 1920s and 1930s, when its members, such as Rudolph Carnap, Otto Neurath, Moritz Schlick, and Friedrich Waismann, held that there are only two types of knowledge: analytic knowledge, which is justified by formal proof, and scientific knowledge, which is justified by empirical verification. Only those statements that are in principle justifiable by one or other of these methods are, they maintained, amenable to rational discussion. Most contemporary philosophers, though spurning the Vienna Circle's views on verification, are still justificationists as they hold on to the traditional conception of knowledge as justified true belief. However, under the impact of skepticism, many have jettisoned the pursuit of truth as unattainable, settling for simply justified positions. Popper's answer to justificationism is critical rationalism. Critical rationalism shuns justification as both impossible and unnecessary, substituting the pursuit of truth as the fallible but sometimes attainable aim. Critical Trim Size: 170mm x 244mm Cautin ecp0388.tex V1 05/27/2014 12:55 A.M. Page 2 2 CONFIRMATION VERSUS FALSIFICATIONISM rationalism regards knowledge, at least scientific knowledge, as unjustified, largely untrue, unbelief. Untrue because merely close to the truth; unbelief because it is largely embodied not in belief but in books and computers. The scientific method of falsificationism is the father of critical rationalism. It is the generalization to all knowledge, whether empirical or not, of falsificationism, the empirical scientific method. Unlike the Vienna Circle, for example, critical rationalism regards all positions as amenable to rational discussion. Critical rationalism flows from a fallibilist but optimistic attitude. Each of us is infinitely ignorant, we are always prone to error, and we only know little bits of knowledge. I may be wrong and you may be right, and through the cooperative competition of debate, we may get nearer to the truth. We may attain the truth, but not "know" it in the traditional sense, just as one may reach the summit of a mountain (the goal of one's journey) but not know it because one is in fog. For the critical rationalist, getting to the summit is still worth the effort, even with uncertainty. The issue of confirmation in science goes back to Aristotle, one of the earliest justificationists. Aristotle wished to provide a method for establishing knowledge of nature, demonstrable knowledge, episteme, as distinguished from mere opinion, doxa. In this Aristotle broke from a long line of philosophers (the pre-Socratics and even Socrates himself) who thought that knowledge was something only the gods could possess. The method was induction, by which Aristotle meant a way of getting to an outlook from which one could see or "intuit" the essence of the thing in question. This essence would then be embodied in a definition that could be used as a premise in arguments purportedly demonstrating a conclusion about some matter. Aristotle was driven to this route because he was aware that his syllogisms, although valid, did not establish or prove the truth of their conclusion, but only asserted that if the premises were true then the conclusion would also be true. For example, all ravens are black; Edgar is a raven; therefore, Edgar is black. However, if the truth of the premises is not demonstrated, then we require another argument to demonstrate those, and this argument in turn would require its premises to be established, and so on ad infinitum. Aristotle's essential definitions were supposed to provide proven starting points that would avoid such a vicious infinite regress. In this case, if one takes being black as part of the essential definition of a raven, then one may stop at that premises and avoid the infinite regress. Aristotle's view held sway for 2000 years. Francis Bacon rejected Aristotle's approach to proof. In contrast, In his Novum Organum Bacon (1620) argued that one must start, not from intuition, but from observation to discover the laws of hidden forms and natures of matter that explain phenomena. Bacon also called his method "induction." On the standard account, Bacon said that provided we are careful to divest the mind of "idols" or prejudices, a proposed law of nature could be confirmed by the collection of many and varied observations. For example, observing many black ravens and only black ravens leads to the inference that all ravens are black. Every new black raven is then said to confirm the general statement. One could then infer from this observational starting point laws of higher and higher generality and depth, ultimately revealing the hidden nature of things. Bacon argued that confirming instances and falsifying instances were both feasible and important, but emphasized falsifying instances to safeguard against premature generalizations. Regularities per se may be misleading. We may put this clearer than Bacon did. For example, it is possible that every time you observe a clock, the pendulum is on the right side. The inference that the pendulum is always on the right side would be incorrect. The example may be extended infinitely with the same result. That is, even if you start with an infinite number of correct statements of the pendulum being on the right side, it still does not license the inference that the pendulum is always on the right. This point of logic is independent of whether Trim Size: 170mm x 244mm Cautin ecp0388.tex V1 05/27/2014 12:55 A.M. Page 3 CONFIRMATION VERSUS FALSIFICATIONISM 3 the pendulum is being observed or not. The regularities of nature may also be misleading, but not in so obvious a way. One can also see in this example why confirming instances may be less valuable than one might at first grant. There is some dispute (see Urbach, 1987) whether it was Bacon who promulgated the induction by numerous, varied observations, but it is nevertheless an important early rudimentary development of the theory of confirmation that deserves comment. David Hume (1711–76) (1976/1739, book 1, part 3, section 6) raised the problem of induction. He raised a fundamental problem for the inductive confirmation of universal theories of science and the prediction of new phenomena from earlier phenomena. Hume does not keep these two aspects sufficiently apart, but they both make it difficult to uphold induction. Hume starts with a puzzle. There is only one source of new knowledge: experience. However, our claims to knowledge seem to go far beyond what we can infer from experience. Hume does not use the word "induction," but discusses what has become known as the principle of induction: "that instances of which we have had no experience must resemble those of which we have had experience, and that the course of nature continues always uniformly the same." Hume argued that this goes far beyond our experience. For example, all ravens of which we have had experience have been black. We therefore expect the next one also to be black. However, Hume insists, this is deductively invalid. Hume pointed out that laws of nature are universal. They speak about the whole of space and time. Thus the statement "All ravens are black" covers everything in the universe that is an raven, all past, present and future ravens, and all non-ravens too if it is understood as the universal conditional: for anything y, if y is a raven, then y is black. A deductively valid argument is one in which if the premises were true then the conclusion must be true. For example, all owls are nocturnal; this bird in my garden is an owl; therefore, this bird in my garden is nocturnal. If we accept the truth of the premises, we are committed, on pain of contradiction, to the truth of the conclusion. However, in the case of an induction, this is not correct, since no matter how many nocturnal owls one has observed, the very next one could be mostly active during the day and sleep at night. Hume's devastating attack on induction did not stop there. A champion of induction might retreat to the claim that at least an inductive argument makes the conclusion probably true, and that the more positive observations we collect, the more probable our result. However, Hume pointed out that this would only delay the impact of his point, since how are we supposed to confirm this rule of induction? If we say that it is confirmed by its having worked in the past, then we cannot do this without falling into circular reasoning. To rely on induction to justify induction is to argue in a vicious circle. Further, simply postulating a general principle of the uniformity of nature to somehow endorse particular inductions is to abandon the empirical point of view that it is experience alone that ought to be the judge of our theories. However, it is unclear how such a vague postulate can add anything specific to our choice between particular causal hypotheses. Some thinkers have suggested that there is such a principle, but it remains an unanswered question how we are to falsify (or confirm) these principles themselves. For if we do not have any such potential falsifications (or confirmations) how are we to choose between alternative candidates for the job? Hume's argument is reinforced by the observation that there have been many regularities we have observed without exception for hundreds or even thousands of years that have been rudely interrupted by an eventual exception. Consider the following examples. Newton's theory held its position with many confirmations for about 250 years. However, Einstein's new theory refuted it. For thousands of years it was thought that all life needs light to survive. However, in the last couple of decades we have discovered Trim Size: 170mm x 244mm Cautin ecp0388.tex V1 05/27/2014 12:55 A.M. Page 4 4 CONFIRMATION VERSUS FALSIFICATIONISM bacteria-so-called extremophiles-living far below the earth's surface, which live on purely chemical energy. Bertrand Russell (1985/1918, p. 101) reinforced Hume's argument by pointing out that induction cannot even work in a finite universe. Because even if one had, by hypothesis, observed every relevant particular case in a universe, it is not only an extra step to say that there are no more cases, it is to assert a universal statement, again going beyond all possible finite collections of facts. Contemporary conceptions of laws of nature make Hume's argument even stronger. Hume conceived of laws of nature as simply unbroken series of contiguous conjunctions of phenomena. For example, consider, under suitable conditions, the scratching of a dry match is always conjoined with the succeeding event of flames. However, recent philosophical conceptions of laws sees them as implying subjunctive conditionals, expressed in the form: if p were to happen, then q would happen. In this case, one such subjunctive conditional would be: "if any dry match were scratched, then there would be a flame." It is clear that this goes beyond all possible observation, because it covers all the actual and possible matches that could have been scratched in the past, but were not, and all possible and actual matches that could, but will not, be scratched now or in the future. The attraction of Bacon's induction was that it held out the possibility that provided one had divested the mind of what Bacon called "idols" (prejudices, preconceptions, hypotheses) one could see the manifest regularities of natural phenomena. However, the nineteenth-century polymath William Whewell (1794–1866) pointed out that nature does not come ready labeled. We have to classify in advance the types of events or aspects that are relevant to our investigation. Without any such prior conceptual division of the world, we are without a properly defined aim. It would be like telling someone to observe without also telling what to observe and with what aim. For example, if we are trying to understand how planetary objects behave under the influence of gravity, do we observe their shape, mass, density, bulk, or weight? It is clear that even these conceptual classifications are highly theoretical. In contrast to justificationism, falsificationism escapes Hume's problem of induction. Because conjectures are freely made and then retained until falsified, no induction-like rules are needed. In addition, falsificationism escapes Whewell's strictures because it fully accepts that we start with theories, not with data. The Paradoxes of Confirmation and Falsification In comparing confirmation and falsificationism it is helpful to see how each strategy copes with some paradoxes. The Raven Paradox Carl Hempel first reminded us of Nicod's seemingly harmless principle of confirmation that the universal (x)(Ax→Cx) is confirmed by objects that are A and C. "(x)(Ax→Cx)" means: for any object x, if it is A, then it is C. Second, Hempel pointed out that the universal theory "All ravens are black" is logically equivalent to "All non-black things are non-ravens." When one is true, the other is true; when one is false the other is false. Hempel then invoked what to the inductivist is the plausible principle that whatever confirms a statement also confirms any logically equivalent statement. However, that would mean that observing a white shoe (a non-black non-raven) would confirm the theory that all ravens are black. This upsets the confirmationist's intuition. Hempel argued that we rule out such paradoxes by invoking our background knowledge, which has already ruled out shoes as a relevant thing to observe. However, this maneuver only shifts the problem of inductive confirmation back to these background conjectures because it leaves unanswered the question how we are supposed to confirm that background knowledge without falling into a vicious regress? In contrast, as Popper (1977/1934) pointed out, falsification does not have a similar vicious Trim Size: 170mm x 244mm Cautin ecp0388.tex V1 05/27/2014 12:55 A.M. Page 5 CONFIRMATION VERSUS FALSIFICATIONISM 5 regress. Even a falsifying statement may be tested in its turn. But whereas falsificationism requires that all scientific statements have to be testable, that does not require that they are all tested. One can and has to stop somewhere. There is no initial paradox afflicting falsificationism because there is nothing odd about saying that when one refutes the theory "All ravens are black" one is also refuting the statement "All non-black things are non-ravens." More importantly, there is no falsificationist counterpart to Nicod's principle. When one refutes a theory, there is no requirement that one also refute every single one of its implications. The Grue Paradox Goodman (1955/1979) raised an interesting paradox concerning confirmation with the concept of grue. Grue means "is first examined before 2020 and is green or is examined after 2020 and is blue." Given that definition, it becomes a puzzle why we are prepared to countenance the inference from the fact that all observed emeralds have been green to "All emeralds are green" but not to "All emeralds are grue," since every observed green emerald up to 2020 confirms both universal gem theories. What vexes inductive philosophers is that inferences about grue seem just as valid as inferences about green by a supposed inductive logic. Goodman argued that the reason we choose green over grue is that the former concept is more projectible, meaning that it is more entrenched in our linguistic habits. One falsificationist answer to this conundrum is to say that scientific method requires the comparison of different hypotheses that we can subject to a decisive experiment. Grue-like hypotheses do not have this characteristic and so should not be admitted to the body of scientific theories under test. Some inductivists (e.g. Worrall, 1989) say that this approach makes the choice of green over grue "arbitrary," even an "historical accident." However, as Quine (1977) explains, the evolution of our conjectures about gems, minerals, and chemistry over thousands of years is far from arbitrary. Another falsificationist response is to say that the grue hypothesis does not solve any problem that our familiar green emerald theory cannot solve just as well (see Bartley, 1968). The Asymmetry of Falsification and Confirmation Popper (1977/1934, section 6, 1983, section 22) argued that there is a fundamental logical asymmetry between falsification and verification which follows from the logical form of scientific theories, which are universal statements. The statement "The raven in my room now is white" is fully decidable in principle because we can either verify it or falsify it. This is typical of our test statements. But our theories are only partially decidable, because even though we can falsify them, we cannot verify them. Given a universal statement and initial conditions, predicted specific observations can be validly inferred. If these observations fail to occur, it follows that the theory is false. This valid inference is called modus tollens. An example of the valid modus tollens is: If someone has a cold, then they'll sneeze; John is not sneezing; therefore, John does not have a cold. However, if the predicted observations do occur, inferring that the theory must therefore be true would involve the fallacy of affirming the consequent, but that is what confirmation seems to require. An example of the invalid affirming the consequent is: If someone has a cold, then they'll sneeze; John is sneezing; therefore, John has a cold. (People sneeze for other reasons too.) The asymmetry is that falsifying observations allow us to draw valid conclusions about the theory under test, but the confirming observations do not. One objection to this holds that the asymmetry is an illusion, because whenever we refute a universal statement we thereby verify its negation. A universal statement "All x are y" is equivalent to "There is no non-y x." Therefore, when we refute "All apples are green" we automatically verify "There is a non-green apple." We can, therefore, equally speak about Trim Size: 170mm x 244mm Cautin ecp0388.tex V1 05/27/2014 12:55 A.M. Page 6 6 CONFIRMATION VERSUS FALSIFICATIONISM verification instead of falsification and so the two are perfectly symmetrical. Popper (1977/1934) had already covered the logical equivalence of nonexistence statements and universal laws, and replied that this misses the point, rather as if someone had said because positive and negative numbers have many symmetrical properties, therefore they are perfectly symmetrical. Duhem/Quine Problem Duhem (1991/1914) and Quine (1961/1951) each raised a problem with how one assigns the fault of a falsification. They argued that in a scientific test of a theory, one must first work out a testable implication of this theory, an observable event that ought to present itself if the theory is true. One uses a valid argument to tease out the expected observation statement from the theory. However, to work this implication out one typically needs a host of other auxiliary assumptions regarding equipment, initial conditions, and background theories. So the question is, when the expected event fails to appear, which of the premises is at fault-the main theory by itself, and/or one (or more) of the other assumptions used in the deduction? The fact that our argument is valid only tells us that at least one of the premises is at fault. For example, if an electric door opener is installed, when you walk up to the door it will open. If the door does not open, that may mean that a door opener is not installed. But we are assuming that the power is on, that the door opener is hooked up properly, that the door is not locked, that we are not dreaming, etc. Duhem and Quine said that, without appeal to other principles such as simplicity, this is undecidable. Duhem and Quine's positions are different in some respects. Whereas Duhem confines the group of problematic auxiliary assumptions to physics, Quine extends the group to the whole of human knowledge and also sees it as applying to both verification and falsification. For Quine, in the face of recalcitrant observations, one may even consider abandoning logical or mathematical assumptions such as the law of the excluded middle (that a statement is either true or false, with no third option). Some interpreters of quantum theory suggest that this law does not apply at the quantum level. The falsificationist's answer is that fallibility prevails even in the interpretation of test results. We may be wrong in assigning the fault of a refutation. However, this does not mean that we cannot successfully classify statements as true, as opposed to certifying them. One ought to choose auxiliary assumptions that are unproblematic, and it is only a rampant undiscriminating skepticism that could rank everything as problematic. Falsificationists assume that scientists-though fallible-can at least sometimes classify trivial observation reports as true, for example, correctly reading an on/off light. If someone conjectures that some subset of the auxiliary assumptions is problematic, then they are free to set up an experiment to test that set using what they regard as unproblematic assumptions. Probability and Inductive Confirmation Having surrendered to Hume's attack, most justificationists have sought solace in the hope that induction might at least provide some theories that are more probable and reliable than others. The most popular contenders for some time for the title of probabilistic induction are the Bayesian interpretations of probability. To evaluate the probability of a hypothesis, the Bayesian specifies some prior probability for a given hypothesis, which is then updated by new information. These are subjective degrees of probability ranging from 0 (no belief) to 1 (certainty). The Bayesian interpretation provides a standard set of procedures and formulas to perform this calculation. One of its strong points is that it conforms to the dominant axiom system for probability, which was developed by Kolmogorov. The formula used to calculate the probability of a hypothesis on the evidence is read: the Trim Size: 170mm x 244mm Cautin ecp0388.tex V1 05/27/2014 12:55 A.M. Page 7 CONFIRMATION VERSUS FALSIFICATIONISM 7 probability of the hypothesis H given the evidence E equals the probability of the evidence given the hypothesis multiplied by the probability of the hypothesis taken alone divided by the probability of the evidence taken alone. P(H∕E) = P(E∕H)P(H) P(E) The first point to note here is that prior probabilities have to be entered into the formula before any evidence is available. However, it is generally accepted that there is no non-arbitrary way to choose these prior probabilities. More fundamental is one of Popper's criticisms. If we search for the most probable theories, then we shall abandon the most informative theories of science because there is an inverse relationship between probability and information content. Glymour (1980) pointed out that it is unclear how to connect Bayesianism with the history of science. Neither Copernicus, Newton, nor Kepler-to name but a few of the greats-gave probabilistic arguments for their theories. Another criticism, based on an evolutionary theory of belief, is that at any given moment, we cannot decide what we believe. We can research an issue more or less thoroughly, but we cannot voluntarily adopt, reject, or change the degree to which we adhere to our beliefs (Percival, 2012). Evidence and argument have their impact on belief, and the soundness of an argument enhances its persuasiveness. However, when a telling argument has its effect, it is as if the mind had been infected by it, rather like a catchy tune. Belief is not something that we do. We cannot therefore obey the prescriptions that issue from the Bayesian evaluations of data. In contrast, falsificationism instructs one to perform the fallible but feasible task of classifying basic observation statements as true or false. This is something we can do. Imagine putting true and false statements into separate boxes. Belief is also a capricious individual state of mind, spontaneously varying from moment to moment and with changing risks and outcomes. On the other hand, since statements, as opposed to beliefs, are permanent records independent of our psychology, falsificationism is not troubled by the vagaries of a scientist's momentary state of mind. Therefore falsificationism is a far more stable and publicly testable method than assigning degrees of probability to subjective belief. It also harmonizes better with Popper's point that the overwhelming amount of scientific knowledge is and must be embodied in libraries and computers, not in scientists' minds. SEE ALSO: Bayesian Analysis; Duhem–Quine Thesis; Evidence-Based Assessment; HypotheticoDeductive Model; Laws of Nature; Natural Kinds; Popper, Karl (1902–94); Positivism and Logical Positivism References Bacon, F. (1620). Novum organum. London: Billium. Bartley, W. W. (1968). Goodman's paradox: A simple minded solution. Philosophical Studies, December, 85–88. Duhem, P. (1991/1914). The aim and structure of physical theory. Princeton, NJ: Princeton University Press. Glymour, C. (1980). Theory and evidence. Princeton, NJ: Princeton University Press. Goodman, N. (1955/1979). Fact, fiction and forecast (3rd ed.). Brighton, U.K.: Harvester Press. Hume, D. (1976/1739). A treatise of human nature. Oxford, U.K.: Oxford University Press. Percival, R. S. (2012). Myth of the closed mind: Explaining why and how people are rational. Chicago, IL: Open Court. Popper, K. (1977/1934). The logic of scientific discovery. London: Hutchinson. Popper, K. (1983). Realism and the aim of science. W. W. Bartley, III (Ed.). London: Hutchinson. Russell, B. (1985/1918). The philosophy of logical atomism. David Pears (Ed.). Chicago, IL: Open Court. Quine, W. Van O. (1961/1951). Two dogmas of empiricism. In From a logical point of view. New York: Harper Torchbooks. Quine, W. Van O. (1977). Natural kinds. In Naming, necessity and natural kinds (chapter 6). Ithaca, NY: Cornell University Press. Urbach, P. (1987). Francis Bacon's philosophy of science. Chicago, IL: Open Court. Trim Size: 170mm x 244mm Cautin ecp0388.tex V1 05/27/2014 12:55 A.M. Page 8 8 CONFIRMATION VERSUS FALSIFICATIONISM Worrall, J. (1989). Why both Popper and Watkins fail to solve the problem of induction. In F. D'Agostino & I. C. Jarvie (Eds.), Freedom and rationality: Essays in honor of John Watkins. Dordrecht, The Netherlands: Kluwer. Further Reading Bartley, W. W. (1984). The retreat to commitment. Chicago, IL: Open Court. Fetzer, J. (2002). Propensities and frequencies: Inference to the best explanation. Syntheses, 132, 27–61. Reprinted in Eells, E., & Fetzer, J. (Eds.). (2010). The place of probability in science (pp. 323–351). New York: Springer. Harman, G. (1965). The inference to the best explanation. The Philosophical Review, 74, 88–95. Howson, C., & Urbach, P. (1989). Scientific reasoning: The Bayesian approach. Chicago, IL: Open Court. Karl Popper Forums and Dublin City University. The Karl Popper web. www.tkpw.net Miller, D. (1994). Critical rationalism: A restatement and defence. Chicago, IL: Open Court. Miller, D. (2006). Out of error (illustrated ed.). London: Ashgate Publishing. Notturno, M. (2003). On Popper (especially chapters 1, 2, and 3). Melbourne, Australia: Thomas Wadsworth. Popper, K., & Miller, D. (1983). A proof of the impossibility of inductive probability. Nature, 302, 687–688. Trim Size: 170mm x 244mm Cautin ecp0388.tex V1 05/27/2014 12:55 A.M. Page 9 Please note that the abstract and keywords will not be included in the printed book, but are required for the online presentation of this book which will be published on Wiley's own online publishing platform. If the abstract and keywords are not present below, please take this opportunity to add them now. The abstract should be a short paragraph upto 200 words in length and keywords between 5 to 10 words. ABSTRACT Confirmation and falsification are different strategies for testing theories and characterizing the outcomes of those tests. Roughly speaking, confirmation is the act of using evidence or reason to verify or certify that a statement is true, definite, or approximately true, whereas falsification is the act of classifying a statement as false in the light of observation reports. This simple picture hides profound problems in the methodology of science and epistemology. In reaction to the skeptic's attack on the possibility of certain or certified truth, many writers have opted for what they regard as the next best feasible substitute: probable, reliable, or consistent theories. Within the philosophy of science there is a long-running debate about the meaning, relative importance, and feasibility of confirmation and falsification and their role in the advancement of science. Although not confined to the issue of induction in science, the debate centers on this issue. KEYWORDS Aristotle; critical rationalism; falsificationism; Francis Bacon; empiricism; evolution; induction; positivism
United States Court of Appeals FOR THE DISTRICT OF COLUMBIA CIRCUIT Argued October 13, 2015 Decided February 5, 2016 No. 12-1011 RAYMOND INTERIOR SYSTEMS, INC, PETITIONER v. NATIONAL LABOR RELATIONS BOARD, RESPONDENT SOUTHERN CALIFORNIA PAINTERS AND ALLIED TRADES DISTRICT COUNCIL NO. 36, INTERNATIONAL UNION OF PAINTERS AND ALLIED TRADES, AFL-CIO, INTERVENOR Consolidated with 12-1012, 12-1013, 12-1047 On Petitions for Review and Cross-Application for Enforcement of an Order of the National Labor Relations Board James A. Bowles argued the cause for petitioner Raymond Interior Systems, Inc. Yuliya S. Mirzoyan argued the cause for petitioner Southwest Regional Council of Carpenters. On the joint briefs was Daniel Shanley. 2 Ellen Greenstone and Maria Keegan Myers were on the brief for petitioner Southern California Painters and Allied Trades District Council No. 36, International Union of Painters and Allied Trades, AFL-CIO. Joseph E. Kolick Jr. entered an appearance. Gregory P. Lauro, Attorney, National Labor Relations Board, argued the cause for respondent. With him on the brief were John H. Ferguson, Associate General Counsel, Linda Dreeben, Deputy Associate General Counsel, and Jill A. Griffin, Supervisory Attorney. Before: HENDERSON and TATEL, Circuit Judges, and EDWARDS, Senior Circuit Judge. Opinion for the Court filed by Senior Circuit Judge EDWARDS. EDWARDS, Senior Circuit Judge: This case involves petitions for review filed by Raymond Interior Systems, Inc. (“Raymond”), and the United Brotherhood of Carpenters and Joiners of America, Local Union No. 1506, an affiliate of the Southwest Regional Council of Carpenters (the “Carpenters Union” or “Carpenters”), and a cross-application to enforce filed by the National Labor Relations Board (“Board” or “NLRB”). The dispute here focuses on orders issued by the Board on September 30, 2010, Raymond Interior Sys., 355 N.L.R.B. 1278 (2010), and December 30, 2011, Raymond Interior Sys., 357 N.L.R.B. No. 166 (Dec. 30, 2011). The Southern California Painters and Allied Trades District Council No. 36, International Union of Painters and Allied Trades, AFL-CIO (the “Painters Union” or “Painters”), the charging party before the Board, also petitions for review because, in its view, the sanctions issued by the Board against Raymond and the Carpenters are insufficient. 3 For many years, Raymond was a party to collective bargaining agreements with the Painters, the most recent of which was entered into pursuant to Section 8(f) of the National Labor Relations Act (the “Act” or “NLRA”), 29 U.S.C. § 158(f). Section 8(f) allows construction-industry employers to recognize a union as the bargaining agent of its employees before a majority of employees have designated the union as their representative. On September 30, 2006, Raymond lawfully terminated its 8(f) agreement with the Painters. On September 12, 2006, Raymond and the Carpenters executed a Confidential Settlement Agreement providing that, upon expiration of the Painters agreement, Raymond would apply the Carpenters 2006 Drywall/Lathing Master Agreement (“2006 Master Agreement”) to Raymond’s drywall-finishing work and employees “to the fullest extent permitted by law.” The Confidential Settlement Agreement incorporating the 2006 Master Agreement took effect on October 1, 2006. On October 2, Raymond allegedly told its drywall-finishing employees that they needed to join the Carpenters Union “that day” if they wanted to continue working. Later that day, after the union had secured authorization cards from the employees, the Carpenters and Raymond signed an agreement recognizing the Carpenters as the majority representative of these employees pursuant to Section 9(a) of the Act, 29 U.S.C. § 159(a). The Painters filed an unfair labor practice charge with the NLRB challenging Raymond’s recognition of the Carpenters Union. A complaint was issued and the matter was heard by an Administrative Law Judge (“ALJ”). Regarding the conduct of Raymond and the Carpenters on October 2, 2006, the Board adopted the findings of the ALJ that Raymond violated Section 8(a)(1), (2), and (3) of the Act, 29 U.S.C. § 158(a)(1), 4 (2), and (3), by conditioning continued employment of the drywall-finishing employees on their immediate membership in the Carpenters Union, and by unlawfully assisting the union in obtaining authorization cards. The Board also agreed that, on October 2, Raymond violated 8(a)(1) and (2) by granting recognition to the Carpenters, and that the union violated Section 8(b)(1)(A) of the Act, 29 U.S.C. § 158(b)(1)(A), by accepting recognition, at a time when the Carpenters did not represent an uncoerced majority of the drywall-finishing employees. The Board additionally agreed that, on October 2, Raymond violated Section 8(a)(3) of the Act, and the Carpenters violated Section 8(b)(2), 29 U.S.C. § 158(b)(2), by applying the Carpenters 2006 Master Agreement to the employees when the union did not represent an uncoerced majority of the employees. Finally, the Board agreed that, on October 2, the Carpenters violated Section 8(b)(1)(A) of the Act by failing to properly inform the drywall-finishing employees of their rights to decline union membership, NLRB v. Gen. Motors Corp., 373 U.S. 734, 742 (1963), and to seek a reduction in union fees for monies spent on activities not germane to the collective bargaining, contract administration, and grievance adjustment, Commc’n Workers of Am. v. Beck, 487 U.S. 735, 745 (1988). The Board found it unnecessary to consider the ALJ’s findings that Raymond violated the Act on October 1 when the Confidential Settlement Agreement took effect. Following a motion for reconsideration, the Board again refused to rule on the legality of the Confidential Settlement Agreement, but clarified that its orders should not be interpreted as requiring a Board certification before Raymond could lawfully recognize the Carpenters pursuant to Section 8(f). Raymond and the Carpenters contend that the Board’s findings with respect to the October 2 unfair labor practices are not supported by substantial evidence. We disagree for the 5 reasons set forth below. Raymond and the Carpenters also contend that the Board erred in failing to address their contention that, on October 1, by virtue of their Confidential Settlement Agreement, the company and union had a lawful Section 8(f) agreement that could not, without more, be vitiated by unfair labor practices that allegedly occurred on October 2. We agree. The Board’s failure to address this matter cannot withstand review. We therefore grant in part the Board’s application for enforcement, grant in part the petitions for review filed by Raymond and the Carpenters, and remand the case for further consideration by the Board. Finally, we decline to consider the Painters’ principal claim that the Board abused its discretion in declining to require Raymond to provide alternate benefits coverage because our decision to remand on the remedy issue may render the claim moot. We find no merit in the other claims raised by the Painters Union. I. BACKGROUND Raymond is a California-based specialty wall and ceiling contractor in the building and construction industry. Raymond’s employees include its drywall-finishing employees, who perform drywall-finishing services in connection with Raymond’s various commercial and residential projects. Since at least the 1960s, Raymond has been an employer- member of the Western Wall and Ceiling Contractors Association, Inc. (“the Association”), a multi-employer association of companies in the building and construction industry. Employer-members choose to join various “conferences” within the Association, and each conference then negotiates and executes collective bargaining agreements 6 with various unions on behalf of the employer-members. At all relevant times, Raymond was an employer-member of the Drywall/Lathing Conference, which negotiates with the Carpenters Union. Prior to October 1, 2006, Raymond was also an employer-member of the California Finishers Conference, which negotiates with the Painters Union. From 1960 to 2006, the California Finishers Conference – on behalf of employers including Raymond – negotiated and executed collective bargaining agreements with the Painters Union to apply to drywall-finishing employees. The most recent relevant agreement (“Painters Agreement”) expired on September 30, 2006, and Raymond resigned from the California Finishers Conference. Importantly, it is undisputed that the Painters Agreement was entered into under Section 8(f) of the Act, which, as explained below, meant that the Painters did not enjoy a presumption of majority support from the drywall-finishing employees after the agreement expired. For this reason, there is no dispute that Raymond lawfully disassociated itself from the Painters Union after September 30, 2006. The Drywall/Lathing Conference negotiated collective bargaining agreements with the Carpenters to apply to various Raymond employees. The 2006 Master Agreement ran from July 1, 2006, to June 30, 2010. This agreement contained a union-security clause, which required employees, as a condition of employment, to apply for union membership by the eighth day of employment. The 2006 Master Agreement also provided that, in the event that an employer ceased to be signatory to a contract with the Painters Union covering drywall-finishing employees, then the 2006 Master Agreement would cover those drywall-finishing employees. 7 A. The Application of the Master Agreement to the Drywall-Finishing Employees on October 1, 2006 On May 24, 2006, Raymond sent the Painters a letter stating that Raymond would not renew the Painters Agreement after it expired. Apparently, this fact became “well known” and, soon afterward, the Carpenters expressed to Raymond that it should apply the 2006 Master Agreement to Raymond’s drywall-finishing employees once the Painters Agreement expired. On September 12, 2006, Raymond and the Carpenters signed a Confidential Settlement Agreement, in which Raymond promised to apply the 2006 Master Agreement to its drywall-finishing employees at the expiration of the Painters Agreement. Raymond also promised to execute a “Memorandum Agreement,” a short-form version of the 2006 Master Agreement, although it never did so. On October 1, 2006, immediately upon expiration of the Painters Agreement, Raymond and the Carpenters began covering Raymond’s drywall-finishing employees under the 2006 Master Agreement pursuant to the terms of the Confidential Settlement Agreement. There is no allegation that Raymond and the Carpenters committed any unfair labor practices prior to this date. B. The Events of October 2 On October 2, 2006, Raymond held a meeting with the drywall-finishing employees at the company’s Orange, California, facility. The purpose of the meeting was to inform the drywall-finishing employees of the transition from the Painters to the Carpenters, the new wage packages and benefits, and the need for employees to sign insurance and pension forms. 8 The meeting took place in Raymond’s training room, which was set up with chairs, a stage, and two projection screens. Spanish-speaking employees were directed to seats on which translation headsets had been placed. These employees received English-to-Spanish translation services throughout the meeting. Once all employees were seated, the company and the Carpenters each gave a PowerPoint presentation, which was followed by a question-and-answer session. Allegedly, at some point during the meeting, Raymond told the employees they needed to join the Carpenters “that day” if they wanted to continue working. Following the meeting, employees went outside the training room, where representatives from the Carpenters Union were waiting. The union agents handed the employees materials that included an “Application for Membership” form, a “Supplemental Dues and CLIC Authorization” form, and an “Authorization for Representation” form. Once the employees filled out and returned the forms, they received a copy of the Carpenters’ magazine. The magazine explained the employees’ rights to decline union membership and to seek a reduction in union fees for monies spent on activities not germane to the union’s duties to serve as the employees’ agent in collective bargaining (“Beck rights”). A majority of the employees filled out and returned the materials that had been distributed. Later that day, union officials presented Raymond with the signed Authorization for Representation forms, which, according to the union, supported its claim that a majority of the drywall-finishing employees had elected the Carpenters to represent them. Raymond and the Carpenters then executed a “Recognition Agreement,” which stated that the company recognized the union as the exclusive collective bargaining representative under Section 9(a) of the Act for all employees 9 covered by the Memorandum Agreement. There is no dispute that this Recognition Agreement covered Raymond’s drywall- finishing employees. C. The Proceedings Before the Board As a result of the above events, the Painters Union filed unfair labor practice charges with the Board. On January 30, 2008, following an investigation, the Board’s Regional Director consolidated the charges and issued a complaint, alleging that Raymond and the Carpenters had committed unfair labor practices within the meaning of the Act. A hearing was then held before an ALJ, at which Raymond, the Carpenters, and the Painters participated. On November 10, 2008, the ALJ issued his findings and recommended order. Regarding the charges related to October 1, 2006, the ALJ found that Raymond and the Carpenters, by applying the 2006 Master Agreement to the drywall-finishing employees, had violated Section 8(a)(1) and (3) and Section 8(b)(2) of the Act, respectively. The ALJ also found that Raymond and the Carpenters violated Section 8(a)(2) and Section 8(b)(1)(A), respectively, when Raymond recognized the Carpenters as the employees’ bargaining representative on that day. Regarding the charges related to October 2, 2006, the ALJ found four separate violations of the Act. First, Raymond – by telling employees to join the Carpenters “that day” – unlawfully conditioned employment on immediate union membership, in violation of Section 8(a)(1) and (3). Second, this statement coerced the employees into signing the Authorization for Representation forms, thus rendering assistance to the Carpenters, in violation of Section 8(a)(1) and (2). Third, Raymond and the Carpenters’ execution of the Recognition Agreement, when the Carpenters did not have the support of an uncoerced majority of the employees, violated 10 Section 8(a)(1) and (2) and Section 8(b)(1)(A), respectively. Finally, the Carpenters failed to inform the employees of their Beck rights prior to obligating them to pay union dues and fees, in violation of Section 8(b)(1)(A). Raymond, the Carpenters, and the Painters filed exceptions to these findings. On September 30, 2009, a two-member panel of the Board largely adopted the ALJ’s findings and recommended order. Raymond Interior Sys., 354 N.L.R.B. 757 (2009). The Board declined, however, to review the ALJ’s findings regarding Raymond and the Carpenters’ application of the 2006 Master Agreement to the drywall-finishing employees, and Raymond’s recognition of the Carpenters as bargaining representative, on October 1. Id. at 757. The Board held: Those findings would be cumulative of the findings of unlawful conduct occurring on October 2, and would not materially affect the remedy in this proceeding. Id. The Board nevertheless accepted the ALJ’s determination that the application of the 2006 Master Agreement was unlawful because “the parties were applying that same agreement . . . on October 2,” which was when the employer and the union committed unfair labor practices. Id. at 758 (citing Duane Reade, Inc., 338 N.L.R.B. 943, 944 (2003), enforced 99 F. App’x 240 (D.C. Cir. 2004)). As a result, the Board ordered Raymond and the Carpenters to, inter alia, “[c]ease and desist from . . . enforcing . . . the [2006 Master Agreement] as to [the] drywall-finishing employees . . . , unless or until [the Carpenters] has been certified by the Board.” Id. at 758, 759. Raymond, the Carpenters, and the Painters sought review in the U.S. Court of Appeals for the Ninth Circuit. After the Supreme Court issued its decision in New Process Steel, L.P. 11 v. NLRB, 560 U.S. 674 (2010), holding that two-member panels do not have authority to decide Board cases, the Ninth Circuit remanded the case to the Board. Raymond Interior Sys. v. NLRB, No. 10-70209 (9th Cir. Aug. 26, 2010). A three-member panel of the Board then adopted the two- member panel’s earlier decision. Raymond Interior Sys., 355 N.L.R.B. 1278 (2010). Raymond, the Carpenters, and the Painters then sought review in this court. However, in light of a pending motion for reconsideration before the Board, we dismissed the case as “incurably premature.” Carpenters v. NLRB, No. 10-1315 (D.C. Cir. May 25, 2012). On December 30, 2011, the Board largely denied the motion for reconsideration. Raymond Interior Sys., 357 N.L.R.B. No. 166 (Dec. 30, 2011). Notably, however, in its decision, the Board clarified that its orders should not be interpreted as requiring a Board certification before Raymond could lawfully recognize the Carpenters pursuant to Section 8(f). Id. at 1 n.5. Raymond, the Carpenters, and the Painters then filed petitions for review in this court, and the Board cross-applied for enforcement. II. ANALYSIS A. The Governing Legal Principles Under the Act, unions and employers may establish collective bargaining relationships pursuant to Board certification, voluntary recognition, or by execution of an 8(f) agreement. As we recently explained: “Under sections 9(a) and 8(a)(5) of the [NLRA], employers are obligated to bargain only with unions that have been ‘designated or selected for the purposes of collective bargaining by the majority of the employees in a unit appropriate for such purposes.’” Nova Plumbing, 12 Inc. v. NLRB, 330 F.3d 531, 533 (D.C. Cir. 2003) (quoting 29 U.S.C. § 159(a)); see also 29 U.S.C. § 158(a)(5) (“It shall be an unfair labor practice for an employer . . . to refuse to bargain collectively with the representatives of his employees, subject to the provisions of section [9(a)].”); see also Int’l Ladies’ Garment Workers’ Union v. NLRB, 366 U.S. 731, 738-39 (1961). “A union can achieve the status of a majority collective bargaining representative through either Board certification or voluntary recognition by the employer. . . .” Raymond F. Kravis Ctr. for Performing Arts, Inc. v. NLRB, 550 F.3d 1183, 1188 (D.C. Cir. 2008). Section 8(f) of the NLRA, 29 U.S.C. § 158(f), carves out a limited exception to section 9(a)’s majority support requirement within the construction industry. Section 8(f) provides, in pertinent part: It shall not be an unfair labor practice . . . for an employer engaged primarily in the building and construction industry to make an agreement covering employees engaged (or who, upon their employment, will be engaged) in the building and construction industry with a labor organization of which building and construction employees are members . . . because [ ] the majority status of such labor organization has not been established under the provisions of section [ ]9 prior to the making of such agreement . . . . 29 U.S.C. § 158(f). “Under this exception, a contractor may sign a ‘pre-hire’ agreement with a union regardless of how many employees authorized the union’s representation.” Nova Plumbing, 330 F.3d at 534; see 13 also Allied Mech. Servs., Inc. v. NLRB, 668 F.3d 758, 761 (D.C. Cir. 2012). The Congress enacted this limited exception because construction employers must know their labor costs up front in order to generate accurate bids and must have available a supply of skilled craftsmen ready for quick referral. In addition, traditional union organization is not conducive to the brief, project- to-project periods workers spend in the employ of any single contractor. A union that is party to a section 8(f) agreement serves as the section 9(a) exclusive bargaining representative of the unit it purports to represent for the duration of the section 8(f) agreement. Viola Indus.- Elevator Div., Inc., 286 N.L.R.B. 306, 306 (1987), enforced 979 F.2d 1384 (10th Cir. 1992); John Deklewa & Sons, Inc., 282 N.L.R.B. 1375, 1385 (1987) (Deklewa), enforced sub nom. Int’l Ass’n of Bridge, Structural & Ornamental Iron Workers, Local 3 v. NLRB, 843 F.2d 770 (3d Cir. 1988). But its section 9(a) status is limited in significant respects. A union party to a section 9(a) agreement is entitled to a conclusive presumption of majority status for up to three years, during which time decertification petitions are barred. But under section 8(f), a union is entitled to no such presumption and parties may therefore file decertification petitions at any time during a section 8(f) relationship. Moreover, when a section 9(a) agreement expires, the presumption of majority support requires the employer to continue bargaining with the union unless the union has in fact lost majority support or the employer has a good-faith reason to believe such support has been lost. But “because the union enjoys no presumption that it ever had majority support” under section 8(f), the employer can refuse to 14 bargain once a section 8(f) agreement expires. Nova Plumbing, 330 F.3d at 534. Even while operative, a section 8(f) agreement is not set in stone. If a union party to an 8(f) agreement successfully seeks majority support, the prehire agreement attains the status of a [section 9(a)] collective- bargaining agreement executed by the employer with a union representing a majority of the employees in the unit. “Generally, a union seeking to convert its section 8(f) relationship to a section 9(a) relationship may either petition for a representation election or demand recognition from the employer by providing proof of majority support.” M & M Backhoe Serv., Inc. v. NLRB, 469 F.3d 1047, 1050 (D.C. Cir. 2006). But “a vote to reject the signatory union will void the 8(f) agreement and will terminate the 8(f) relationship.” Deklewa, 282 N.L.R.B. at 1385. United Bhd. of Carpenters & Joiners of Am. v. Operative Plasterers’ & Cement Masons’ Int’l Ass’n of U.S. & Can., 721 F.3d 678, 691-93 (D.C. Cir. 2013) (alterations and ellipses in original) (citations omitted). Employers and unions in lawful collective bargaining relationships may execute collective bargaining agreements that include union-security clauses requiring union “membership” as a condition of employment. 29 U.S.C. § 158(a)(3), (f). However, the “burdens of membership upon which employment may be conditioned are expressly limited to the payment of initiation fees and monthly dues. It is permissible to condition employment upon membership, but membership, insofar as it has significance to employment rights, may in turn be conditioned only upon payment of fees and dues.” Gen. Motors Corp., 373 U.S. at 742. Furthermore, 15 if employees object, a union may not use their monies collected pursuant to a union-security clause for activities unrelated to collective bargaining, contract administration, or grievance adjustment. Beck, 487 U.S. at 745. The Board has therefore held that a union must provide employees with a “Beck notice” – i.e., notice of the above rights – at or before “the time the union first seeks to obligate . . . employees to pay dues.” Cal. Saw & Knife Works, 320 N.L.R.B. 224, 233 (1995), enforced sub nom. Int’l Ass’n of Machinists & Aerospace Workers v. NLRB, 133 F.3d 1012 (7th Cir. 1998). Failure to do so constitutes a violation of Section 8(b)(1)(A) of the Act. Id. at 235. Any person may file an unfair labor practice charge with the Board. 29 C.F.R. § 102.9. If the allegations appear to have merit, the Regional Director issues a complaint. Id. § 102.15. If the Board finds merit in the complaint, it must order the offending parties to cease and desist from the unlawful activity or take affirmative action that will effectuate the policies of the Act. 29 U.S.C. § 160(c). Any person “aggrieved by a final order of the Board granting or denying . . . the relief sought” may obtain review in the court of appeals. Id. § 160(f). The Board’s findings of fact are conclusive if supported by substantial evidence, Allentown Mack Sales & Serv., Inc. v. NLRB, 522 U.S. 359, 366 (1998), and its choice of remedy is reviewed for an abuse of discretion, Teamsters Local Union No. 639 v. NLRB, 924 F.2d 1078, 1085 (D.C. Cir. 1991). B. The Board’s Findings Regarding the Conduct of Raymond and the Carpenters on October 2, 2006 The ALJ found and the Board agreed that Raymond and the Carpenters committed multiple unfair labor practices on October 2, 2006. Raymond and the Carpenters challenge a 16 number of the Board’s findings and the legal conclusions emanating therefrom. Raymond first challenges the Board’s finding that, on October 2, Raymond told the drywall-finishing employees that they had to join the Carpenters “that day.” Raymond claims that the evidence simply does not support this finding. We disagree. The Board accepted the ALJ’s credibility determinations in assessing the veracity of witnesses who testified at the unfair labor practice hearing. Raymond, 354 N.L.R.B. at 757 n.2. We “will not reverse the Board’s adoption of the ALJ’s credibility determination unless it is ‘hopelessly incredible, self-contradictory, or patently unsupportable.’” SFO Good- Nite Inn, LLC v. NLRB, 700 F.3d 1, 10 (D.C. Cir. 2012) (citation omitted). The existence of potential inconsistencies in credited testimony, without more, is not sufficient for the court to overturn an ALJ’s credibility finding. See id. at 10- 11. Furthermore, the “mere fact that conflicting evidence exists is insufficient to render a credibility determination ‘patently [u]nsupportable.’” Parsippany Hotel Mgmt. Co. v. NLRB, 99 F.3d 413, 426 (D.C. Cir. 1996). Rather, only in the “most extraordinary circumstances” will it be appropriate for the court to overturn such a determination. SFO, 700 F.3d at 10-11. In this case, the ALJ afforded significant weight to the testimony of one drywall-finishing employee, Jose Ramos, whose “demeanor, while testifying, was that of a veracious witness.” Raymond, 354 N.L.R.B. at 778. Not only did Ramos “recount[] [Raymond’s] alleged threat to the listening drywall finishers,” but he also testified that, “without the immediate prospect of another job, [he did] not . . . report for work the next day.” Id. at 778-79. To the ALJ, it was “unmistakably 17 clear” that Ramos believed that the company was “utterly serious” in telling the employees that they had to join the union on October 2. Id. at 778. Raymond offers no plausible basis for this court to reject the ALJ’s credibility determinations accepting the testimony of Ramos and other witnesses who generally confirmed Ramos’s testimony. Raymond also challenges the Board’s finding that the company’s statement to the employees gave unlawful assistance to the Carpenters because the statement was intimidating and thus caused the employees to designate the Carpenters as their bargaining agent lest they lose their jobs. Raymond argues that, while its statement telling the employees to join the union “that day” may well have induced employees to sign the “Application for Membership” form, it would not have coerced them to sign the “Authorization for Representation” form. Raymond argues that the employees could differentiate between the two forms, so there is no actual evidence to support the Board’s finding. We are not persuaded. It is not necessary for the Board to point to “evidence of actual intimidation” in support of its finding. Teamsters Local Union No. 171 v. NLRB, 863 F.2d 946, 954 (D.C. Cir. 1988). Rather, whether employees have been coerced is assessed by reference to the “totality of the circumstances.” Fountainview Care Ctr., 317 N.L.R.B. 1286, 1289 (1995), enforced 88 F.3d 1278 (D.C. Cir. 1996). The court is obliged to “recognize the Board’s competence in the first instance to judge the impact of utterances made in the context of the employer-employee relationship.” Progressive Elec., Inc. v. NLRB, 453 F.3d 538, 544 (D.C. Cir. 2006) (citation omitted). And, as the Board has held, “[w]here, as here, an employer imposes certain requirements on its employees, it must bear the burden of any ambiguity in its message.” Acme Tile & Terrazzo Co., 318 18 N.L.R.B. 425, 427-428 & n.8 (1995) (considering whether employer statements conditioned employment on union membership), enforced 87 F.3d 558 (1st Cir. 1996). Here, the ALJ noted that the Application for Membership form and the Authorization for Representation form were printed together on a single document and were distributed to the employees as soon as the meeting ended. Raymond, 354 N.L.R.B. at 780. In these circumstances, the Board found that the employees, having just been told to join the Carpenters “that day” if they wanted to keep their jobs, “undoubtedly completed and executed every form on the large document without regard to the differences between them.” Id. Such a finding is reasonable, and we will not disturb it here. See Fountainview, 317 N.L.R.B. at 1289 (authorization forms presented alongside job applications in a single document gave “the impression that there was a link between [union authorization] and the hiring process”). Finally, as noted above, a union must provide employees with a Beck notice at or before the time when the employees become obligated to make payments pursuant to a union- security clause. Cal. Saw & Knife, 320 N.L.R.B. at 233. Here, there is no dispute that the drywall-finishing employees first received a Beck notice when they were given copies of the Carpenters’ magazine, which was after they had already completed and returned the Carpenters’ forms. The Board concluded that the forms “obligat[ed] [the employees] to pay monthly dues.” Raymond, 354 N.L.R.B. at 781. The question here, then, is whether the Carpenters effectively committed the employees to pay dues without first explaining the legal limits of the union-security provision. Substantial evidence supports the Board’s finding. The Application for Membership form provides for “Monthly dues 19 in the amount of $____, per month, commencing immediately,” which are “due and payable each month while on application.” And the Supplemental Dues and CLIC Authorization form states, “I hereby authorize the Southwest Carpenters Vacation (‘Trust’) to deduct from my vacation benefits supplemental dues . . . .” From these facts, the Board reasonably concluded that, by filling out and signing the forms, the employees became obligated to pay dues prior to the time that they received a Beck notice. C. The Board’s Failure to Assess the Confidential Settlement Agreement and its Incorporation of the 2006 Master Agreement As previously explained, Raymond and the Carpenters executed a Confidential Settlement Agreement on September 12, 2006, providing that, upon expiration of the Painters Agreement, Raymond would apply the 2006 Master Agreement to Raymond’s drywall-finishing employees “to the fullest extent permitted by law.” The Confidential Settlement Agreement took effect on October 1, 2006. The ALJ found that Raymond and the Carpenters had violated Section 8(a)(1) and (3) and Section 8(b)(2) of the Act, respectively, when they applied the 2006 Master Agreement to the drywall- finishing employees on October 1, and had violated Section 8(a)(2) and Section 8(b)(1)(A) of the Act, respectively, when Raymond recognized the Carpenters as the employees’ bargaining representative on that day. The Board declined to address the legality of the 2006 Master Agreement as of October 1 because that agreement was the same agreement that was unlawfully enforced on October 2. The Board thus ordered Raymond and the Carpenters to, inter alia, cease and desist from applying the 2006 Master Agreement to the drywall-finishing employees unless and until the Carpenters were certified by the Board. 20 In a motion for reconsideration submitted to the Board, Raymond, joined by the Carpenters, argued: The Board’s Order is unwarranted if Raymond had a pre-existing 8(f) agreement at the time of the alleged Section 8(a)(2) violations found by the ALJ and adopted by the Board. Extant Board precedent under Zidell Exploration[s], Inc., 175 NLRB 887 (1969) holds that a pre-existing 8(f) agreement is not invalidated by subsequent acts of unlawful assistance. Motion for Reconsideration, reprinted in Joint Appendix 24. In rejecting this claim, the Board said: Raymond also argues that the Board erred in failing to decide whether the “Confidential Settlement Agreement” (CSA) reached between Raymond and the Carpenters 3 weeks before the unlawful assistance constituted a valid 8(f) agreement that was not invalidated by Raymond’s subsequent acts of unlawful assistance. We deny this aspect of the motion, because a finding that the [Confidential Settlement Agreement] constituted a valid 8(f) agreement would not affect our determination that Raymond, on October 2, 2006, unlawfully recognized the Carpenters as the 9(a) representative of its drywall finishing employees. Raymond, 357 N.L.R.B. No. 166, at 2. The Board’s decision is hard to fathom. As the Board noted, Raymond and the Carpenters contended that the Confidential Settlement Agreement and its incorporation of the 2006 Master Agreement on October 1 resulted in a lawful 8(f) agreement covering the drywall-finishing employees on 21 that date. They further contended that the unfair labor practices that were allegedly committed on October 2 could not have vitiated the lawful 8(f) agreement that was effective on October 1. In other words, Raymond and the Carpenters claim that even if their attempt to execute a 9(a) agreement on October 2 failed, this could not have nullified the preexisting 8(f) agreement. We agree that the Board erred in failing to address this issue. There is a long-standing principle that, as a general matter, when a collective bargaining agreement is not a byproduct of unfair labor practices and does not otherwise hinder the policies of the Act, “the Board [is] without authority to require [the parties] to desist from giving effect to the [agreement].” Consol. Edison Co. v. NLRB, 305 U.S. 197, 236-38 (1938); see also NLRB v. Reliance Steel Prods. Co., 322 F.2d 49, 56 (5th Cir. 1963); NLRB v. Kiekhaefer Corp., 292 F.2d 130, 135-37 (7th Cir. 1961); NLRB v. Scullin Steel Co., 161 F.2d 143, 147-48 (8th Cir. 1947). Indeed, the Board applied this principle in Zidell Explorations, Inc., 175 N.L.R.B. 887 (1969), the decision cited by Raymond in its Motion for Reconsideration. In Zidell, after executing lawful 8(f) agreements with a union, the employers involved in that case engaged in unfair labor practices. The ALJ concluded that the 8(f) agreements were “rendered unlawful nunc pro tunc by reason of the postcontract employer unfair labor practices.” Id. at 887-88. The Board rejected this conclusion and explained: [I]t has long been established by Board and court cases that employer acts of unlawful assistance occurring after the execution of a lawful contract, and during the contract term, do not justify a remedial order suspending 22 recognition of the assisted union during the contract term or directing that the contract be set aside. Id. at 888 (citing Reliance Steel Prods., 322 F.2d 49; Scullin Steel, 161 F.2d 143; Arden Furniture Indus., 164 N.L.R.B. 1163 (1967); M. Eskin & Son, 135 N.L.R.B. 666 (1962), enforced sub nom. Confectionery & Tobacco Drivers & Warehousemen’s Union, Local 805 v. NLRB, 312 F.2d 108 (2d Cir. 1963); and Lykes Bros., Inc., 128 N.L.R.B. 606 (1960)). The Board never addressed this line of authority in its decision in this case. Before this court, Board counsel argued that Zidell is inapposite because it is factually distinguishable. Counsel pointed out that, “[i]n Zidell, unlike here, the ‘employer alone’ was responsible for the unlawful conduct that occurred subsequent to the creation of a Section 8(f) contract.” Br. for Respondent at 49. Thus, according to counsel, Zidell should be limited to situations in which the unlawfully assisted union was not “found to have participated in, had any control over, or even been aware of [the unlawful] conduct.” Id. (alteration in original) (citation omitted). We decline to consider this argument because it is merely a post-hoc rationalization offered by Board counsel, not the Board. The Board never addressed Zidell in denying the Motion for Reconsideration filed by Raymond. Furthermore, even if we were to consider this argument, the authorities cited by Zidell certainly do not endorse the limitation suggested by Board counsel. See Zidell, 175 N.L.R.B. at 888 n.2. In M. Eskin & Son, both the employer and the union committed unfair labor practices after executing a lawful agreement. 135 N.L.R.B. at 666, 670. Nevertheless, the Board there refused to invalidate the preexisting contract, explaining: 23 As all the unfair labor practices . . . occurred during the term of the Respondents’ collective bargaining contract, the execution and maintenance of which are not under attack, we do not believe that an order requiring the parties to suspend their bargaining relationship pending an election is necessary to effectuate the policies of the Act. Accordingly, as there is no basis for a finding that the contract between the parties was a consequence of the unfair labor practices found, or that the contract thwarts any policy of the Act, we reject the [ALJ’s] recommendation for the issuance of a cease-recognition order. Id. at 671 (footnote omitted) (citing Scullin Steel, 161 F.2d at 147); see also Lykes Bros., 128 N.L.R.B. at 609-11 (same). There is nothing in the Zidell decision to indicate that the Board meant to disavow the holdings in M. Eskin & Son or Lykes Brothers, nor is there anything to suggest the Board meant to disregard or limit the principle endorsed in Consolidated Edison Co. and its progeny. If, as they contend, Raymond and the Carpenters executed a lawful 8(f) agreement on October 1, then their subsequent unfair labor practices that were committed when they attempted to execute a 9(a) agreement on October 2 would appear to be irrelevant to the question of whether there was a lawful 8(f) agreement in effect on October 1. Even if, as the Board found, Raymond unlawfully recognized the Carpenters on October 2, 2006, as the 9(a) representative of its drywall-finishing employees, why would this nullify a lawful, pre-existing 8(f) agreement? The Board inexcusably failed to address this issue. We will therefore remand the case for further consideration. 24 D. The Petition for Review Filed by the Painters Union The Painters Union has petitioned for review for the limited purpose of challenging the Board’s sanctions against Raymond and the Carpenters Union. In particular, the Painters Union contends that the Board abused its discretion in declining to require Raymond to provide alternate benefits coverage equivalent to the coverage possessed under the 2006 Master Agreement, choosing instead to allow Raymond to maintain the benefits already in place. See Raymond, 357 N.L.R.B. No. 166, at 1. The Painters Union also contends that the Board erred in not precluding Raymond and the Carpenters from entering an 8(f) agreement in the future. See id. at 1 n.5. In assessing the Painters’ claims, we want to make it clear that nothing in our decision is meant to question the Board’s determination that Raymond and the Carpenters were free to enter into an 8(f) arrangement after October 2. The Board did not err in reaching this conclusion and it need not reconsider this matter on remand. We decline to consider the Painters’ principal claim – i.e., that the Board abused its discretion in declining to require Raymond to provide alternate benefits coverage – because our decision to remand on the remedy issue may render the claim moot. Genesis Healthcare Corp. v. Symczyk, 133 S. Ct. 1523, 1528 (2013) (“If an intervening circumstance deprives the plaintiff of a ‘personal stake in the outcome of the lawsuit,’ at any point during litigation, the action can no longer proceed and must be dismissed as moot.” (quoting Lewis v. Continental Bank Corp., 494 U.S. 472, 477–78 (1990))). If the Board concludes on remand that Raymond and the Carpenters entered into a valid section 8(f) agreement on October 1 that endured despite the subsequent unfair labor 25 practices, the Painters Union can raise no viable challenge to the Board’s decision to allow Raymond to maintain the benefits in place since the entire agreement would remain in place. If the Board finds that Raymond and the Carpenters did not enter into a valid section 8(f) agreement on October 1, then it will be up to the Board in the first instance to determine whether any adjustment in its remedial order is required. III. CONCLUSION Consistent with the opinion above, we grant in part and deny in part the Board’s cross-application for enforcement. We also deny in part and grant in part the petitions for review filed by Raymond and the Carpenters Union. We remand the case to the Board for further consideration consistent with this decision. So ordered.
Quit Making These 8 Weight-Loss Mistakes As I walked past a magazine stand the other day, I couldn’t help but notice the barrage of sensational nutrition-focused headlines that promised weight-loss success. Doesn’t it also seem that everyone – from your news anchor to your hair dresser – has an opinion about how to lose 10 pounds in 10 days, without giving up your favorite foods? Get real. Just because someone swears by the latest fad or TV testimonial doesn’t mean such a plan is scientifically sound – or even safe – for you. Following the lead of someone who may not be a credible expert could leave you with a quick weight loss and even faster weight gain after. Although nutrition research is a confusing and ever-evolving field, some basic common sense guidelines stand the test of time. Start by avoiding these eight common diet blunders : 1. You only rely on exercise for weight loss. So you overindulged at dinner and think your 6 a.m. spin class will help negate it? Sadly, weight loss is not this simple. My clients often overestimate the number of calories a workout burned and then go overboard at their next meal. For exercise to benefit weight loss, consistency is key. Unfortunately, too many people go the “feast or famine” route when it comes to physical activity – swinging from sleeping through their spin classes to signing up for triathlons. Instead, find ways to work activity into your daily routine. For example, go for a walk during a phone call, bike to work or take the stairs up to your office instead of the elevator. Although these small bursts of activity may seem minimal, over time, they join forces to strengthen your body – and your resolve. 2. You follow the fad diets your coworkers are bragging about. If the person at the desk next to you says she loves her new diet, but doesn’t appear to eat anything other than lettuce leaves, the plan may not be the best example to follow. We all have different metabolisms, food preferences and cooking abilities, which can influence weight-loss success and maintenance. Try seeking out the sage advice of a registered dietitian nutritionist, who should inquire about your medical and diet history, and who can create a customized weight-loss plan that fits your diet into your lifestyle. 3. You have six “mini” meals that aren’t so mini. Eating six small, balanced “mini” meals throughout the day may promote weight loss, but if the meals aren’t well-planned or are maxi instead of mini, your scale may not go in the desired direction. If you’re trying the mini-meal method to drop a few pounds, be sure you are eating a balanced meal containing 200 to 400 calories of protein, carbohydrates and fat every three to four hours throughout the day. This powerful trifecta of nutrients keeps you feeling satisfied, full of energy and will even help curb hunger throughout the day so you’ll be less likely to reach for food that zaps energy instead of supplying it. 4. You don’t snack. Eating three square meals a day may be just as effective for weight loss as the mini-meal approach, but if your meals are spaced more than five hours apart, you could benefit by adding a smart snack. Try a late afternoon pick-me-up driven by protein and fiber, such as an apple and almond butter or Greek yogurt with a tablespoon of chopped nuts, to help regulate your blood sugar more effectively and prevent overeating at your next meal. 5. You think all organic foods are healthier. If a food wears a USDA organic seal on its label, it means it’s made with ingredients that are 95 percent to 100 percent organic, or that have been produced without the use of synthetic pesticides, herbicides, fungicides or synthetic fertilizers; haven’t been genetically modified or radiated; and were produced without the use of growth hormones or antibiotics. But just because the organic label proudly adorns the front of many food packages doesn’t guarantee it’s good for your health. That bag of organic lollipops, for instance, is just as void of nutritional value as any other bag of candy. 6. You always choose a salad when dining out. Although veggies and fruit should take up half the precious real estate on your plate, a main dish salad that’s tossed with creamy dressing, crispy noodles, fried chicken and a cup of nuts is likely to derail your dieting efforts, since it may provide more calories than you planned on. If you’re ordering a salad out or preparing one at home, load up your plate with veggies, top it with lean protein, such as grilled fish or chicken, and dilute your dressing with a thick balsamic glaze and a squeeze of fresh lemon or lime. 7. You equate success only with weight loss. When you only measure success by the number on the scale, you may set yourself up for failure because your weight naturally fluctuates on a daily basis due to the foods you eat, your exercise habits and even the time of month or day. If you’re weighing whether to weigh yourself, remember the scale is only onemeasure of success. Decreasing numbers will come if accompanied by a reduction in portion sizes; a balanced, varied diet; and an overall sense of empowerment at the plate. 8. You eliminate entire nutrient groups. If you’re following a trendy carb-free or fat-free diet, you could pay a price. Whenever you eliminate an entire food group for weight-loss purposes, you are also eliminating a slew of nutrients that are essential for good health. Instead, try to consume the best quality nutrients by ditching white, refined carbohydrates, such as white bread and pastries, and including whole grains, such brown rice and quinoa (which are rich in fiber and B vitamins), in your diet. Fats such as avocado and nuts can also help keep you fuller for a longer period of time. About HASHMI HERBAL Hashmi natural slimming is a fastest growing, well recognized Indian Business Group of global repute. We're one of the leading natural slimming Products Manufacturer and are listed amidst the trustworthy Slim XL Capsules Suppliers & Exporter from India exporting pills for weight loss.
On Monday, Delhi Police arrested a 19-year-old woman after another woman accused her of holding her hostage and sexually assaulting her, along with two men. This is the first ever rape charge brought against a woman by a woman in India, and the response has shown that our legal system is truly ill-equipped to deal with cases of same-sex sexual assault. The survivor, a migrant to the city from eastern India, has described the multiple assaults which happened over two months. She was held hostage in an apartment in Dilshad Colony, where she was gang raped in the woman's presence. Recounting her ordeal to a national portal, the victim said that the two men pinned her down on all fours on the bed while the accused woman "raped" her using a sex toy to "make her ready for anal sex". When she first approached the police in October 2018, they refused to file a case stating that a woman could not commit the crime of rape according to IPC provision Section 376 that lists down punishment for rape but restricts its definition to a man-woman act. A legal expert told a leading daily that the case has become complicated, thanks to the reading down of Section 377. Same-sex intercourse is no longer an offence but is still applicable in cases of "no consent penile unnatural sex which also involves minors". The legal conundrum aside, this case forces us to expand our view and definition of sexual assault. Like everything else in our universe, our understanding of the scope of sexual assault too is limited by heteronormativity. Just like we view same-sex relations as ‘not normal', an instance of a woman sexually assaulting another goes against everything we are taught about both women and sex. Till recently, popular opinion maintained that women were weak, passive beings not capable of violence. Women were not supposed to enjoy sex, let alone force it. But the truth is that the all-pervasive misogyny of our world teaches young women the same lessons that it teaches young men. Women too are conditioned to reduce and objectify other women and the lessons of rape culture (women are ‘frigid' if they do not actively perform femininity and ‘asking for it' if they do) are imbibed by them too. The accused woman joined the two men to assault another woman and dehumanised her just like the two men did. Because we still view women through the lens of patriarchy, a woman committing rape shocks us--and that makes it all the more easier to dismiss the claims of the survivor. A woman raping another woman is unthinkable. This is not how women behave, society tells us. Our legal system is not equipped to handle woman-to-woman sexual assault. Thus the survivors of such violence become the most isolated of crime victims. The conversation surrounding sexual assault needs to expand to cover the LGBTQ communities too, because rape happens in queer spaces and relationships too. We need to condemn the crime without letting the gender and the sexuality of the criminal becoming the larger issue.
Service Employees International Union The Service Employees International Union (SEIU) is a socialist, politically powerful labor union with 2 million members in the United States, Canada, and Puerto Rico, and the largest union of property service workers in the United States. The SEIU says they are "dedicated to improving the lives of workers and their families and creating a more just and humane society". It is closely affiliated with the Democratic Party and is tightly controlled by labor boss Andy Stern, the president since 1996. At a time when most unions are shrinking, SEIU has grown rapidly; only the National Education Association is larger. About 40% of the membership comprises public employees, whose employers are federal, state, and local governments. The employers answer to voters not shareholders, and politically powerful unions like SEIU have a strong voice at the polls. Government agencies do not have to fear that strikes will give an advantage to their competition--they have little local competition and no fears of international competitors--so strikes are not common. But the voting power of SEIU means local and state politicians--especially Democrats--often willingly agree to union recognition and enter into long-term collective bargaining contracts with votes as an implicit side payment. A large portion of the SEIU membership comprises women, minorities, and immigrants--groups that historically were hard to organize. The SEIU operates with a well-paid skilled staff and has a presence in virtually every major American city. Contents Components The SEIU represents four service industry divisions: Hospital Systems – SEIU is the largest union of health care workers in the US. The hospital systems division represents caregivers and hospital employees, including nurses and doctors in public, private, and non-profit medical institutions. Long-Term Care – SEIU is the largest union of long-term care workers in the US. These are home care and nursing home workers who provide services in both facility and private home settings for seniors and the disabled. Public Services – SEIU is the second largest union of public service employees composed of local and state government workers, public school employees, bus drivers, and child care providers. Security Services – SEIU is the largest security union, representing Securitas Security Services USA, which employs 1,800 security officers at Kaiser medical facilities in five states.[1][2] The motto for the SEIU security union is, "Stand for Security," accompanied with their very own SEIU security logo.[3] Political Agenda At the outset, Stern told members that he expected "every leader at every level of this union -- from the international President to the rank-and-file member -- to devote five working days this year to political action." In effect, this became the mandate for the union leaders to work in support of the Democratic Party. Stern sits on the Executive Committee of America Coming Together funded by George Soros. SEIU is a major component of the "Shadow Democratic Party," a network of more than five-dozen unions, nonprofit activist groups, and think tanks with the agendas of the left and which campaigns for Democrat candidates and causes. Because they are a "527 organization", SEIU is not registered as a "political organization" with the Federal Election Commission, and collects "soft money" with no limits on how much it may receive. This money, in turn, is given to Democratic candidates, political action committees, and other "527" groups promoting the same agendas.[4] Change to Win In the last two decades a great deal of consolidation happened in the union movement. The garment workers union[5] and HERE (Hotel Employees and Restaurant Employees union), merged in 2004 to create a new union UNITE HERE, with 450,000 members. Then UNITE HERE formed a coalition with the Teamsters, SEIU, the United Food and Commercial Workers (UFCW), the Laborers, and the United Farm Workers (UFW) to form Change to Win in 2005. It sought to displace the well-established AFL-CIO. Stern became the spokesman for Change to Win and he challenged AFL-CIO president John Sweeney for national attention. Recently Stern's SEIU has been raiding members from UNITE HERE, thus creating a deep division in the Change to Win coalition. In 2008 Bruce Raynor of UNITE, the co-president of UNITE HERE declare the UNITE HERE merger a failure, and tried to take UNITE (and its bank) into SEIU. The other co-president John Wilhelm of HERE protested loudly, and the internecine battle was on. Stern He financed and, with Raynor, created a new hotel-restaurant-casino union called 'Workers United" that is part of SEIU and is now openly trying to sign up HERE members. Raynor resigned from UNITE HERE, becoming president of Workers United and executive vice president of SEIU. Meanwhile the turmoil has given conservatives in Congress another good reason to fight EFCA (a card-check device that would replace secret union elections), because it would be used in factional fights. ACORN Connections The Association of Community Organizations for Reform Now's largest union backer is the SEIU. ACORN gave more than $4 million to the SEIU and its shadow party affiliates in 2006-07, according to Dept. of Labor filings. One SEIU union, the Illinois Homecare Workers and Home Childcare Providers, sprouted from ACORN's organizing efforts and pays rent to ACORN.[6] SEIU locals 100 and 880 are run out of the same address, on 1024 Elysian Fields Avenue in New Orleans, as ACORN. Financial disclosures also show that SEIU paid $500,000 in two installments to the “Wal-Mart Organizing Project.” The checks were sent to ACORN’s headquarters in Louisiana. Local 880’s Department of Labor financial filings, in 2005, shows loans and payments to ACORN-run organizations.[7] On February 18, 2010, the Oversight on Government Reform committee released a report on ACORN and SEIU funding; it was revealed that ACORN activities – despite contentions they are intended to help the poor – fulfill a self-serving and political purpose.[8] The groups, ACORN and the SEIU, were found to achieve political ends through a pattern of threatening banks and state officials' offices with litigation.[9] The report includes the following information on the SEIU's connections with ACORN. “Muscle for the Money” – Muscle for the Money involves using non-profit corporations for electioneering activities and an SEIU strategy to threaten corporations and banks into brokering deals for ACORN’s financial benefit. SEIU and Project Vote used litigation to force demands from government officials. ACORN, through Project Vote, threatened State Secretary of State offices with lawsuits, thus forcing political compromises at the expense of taxpayers. SEIU and ACORN are substantially intertwined – SEIU and ACORN jointly manage SEIU Local 100; SEIU Healthcare Illinois Indiana; SEIU Local 21A; SEIU Local 32BJ; SEIU Local 52BJ; SEIU Local 880; and SEIU Local 1199. SEIU aided and encouraged ACORN to put pressure on banks, to use its federally-funded affiliates to target political candidates, and to threaten public officials with litigation. ACORN took the lead in these activities and SEIU was the willing accomplice. ACORN profited from the misery of the financial collapse – ACORN Housing (AHC) financially profited from efforts to intimidate banks into lowering down payment and mortgage lending standards – a trend that contributed to the financial crisis. ACORN used provisions in the Community Reinvestment Act (CRA) of 1977 to challenge bank mergers and acquisitions. These challenges successfully forced banks to make lending agreements with ACORN Housing. ACORN is one of the few entities that actually profited from the misery created by the collapse of the housing bubble. ACORN is not a charity – ACORN filed corporate income tax returns with the Internal Revenue Service and failed to file a Form 990, a requirement for non-profit status in several states where ACORN does business. In some states, ACORN fraudulently informed state Secretary of States that it was tax-exempt in order to avoid state corporate taxes. Accounting irregularities involving ACORN affiliated charities – ACORN received large amounts of money from its nonprofit affiliates while giving significantly less back in return, suggesting wide-spread subversive accounting practices. Based upon ACORN affiliates’ tax-exempt disclosures, there are substantial discrepancies between ACORN’s own audits and what has been officially reported to the IRS. Nearly 40% of the disbursements from three of ACORN’s 501(c)(3) affiliates to ACORN’s national organization come in the form of gifts and grants for which no real reason is given for the transfer of funds. Terrorism In a clear case of economic terrorism, audio recordings revealed on March 22, 2011, captured disturbing evidence of radical leftists plotting to deliberately wage war on Americancapitalism in order to redistribute the nation’s wealth. Leading the group of leftist organizers is SEIU director of financial reform efforts and international executive board member, Steven Lerner.[10] Steven Lerner was recorded laying out a plan to attack JP Morgan Chase and outlining a plan to collapse the American economy.[11] Steven Lerner described in detail how the SEIU was going to help take down a major U.S. bank beginning in May, 2011, and how they were going to collapse the stock market and bring on a second economic collapse.[12] Lerner also said that leftist leaders must convince their followers that the country is not broke, but that the wealth is all in the hands of the rich. Thuggery On August 7th 2009 three SEIU members were seen attacking a black conservative protester outside a Saint Louis Townhall meeting.[13] The forum on aging called by Rep. Russ Carnahan, Democrat, drew an overflow crowd in a school gym in south St. Louis County, Missouri. Dozens of people, some with signs about the health care debate, were kept out. Kenneth Gladney, 38, a conservative activist, was attacked as he handed out yellow flags with "Don’t tread on me" on them. He spoke to the Post-Dispatch from the emergency room at St. John’s Mercy Medical Center, where he said he was awaiting treatment for injuries to his knee, back, elbow, shoulder and face. Gladney, who is black, said one of his attackers, also a black man, used a racial slur against him. Mr. Gladney was attacked by people wearing dark blue SEIU t-shirts as the video that surfaced shows. [14] Crime In a press release issued March 17, 2011, Sodexo USA announced that the company has filed a civil lawsuit against the Service Employees International Union (SEIU) under the Racketeering Influenced and Corrupt Organizations (RICO) Act., accusing the union of engaging in an "illegal campaign of extortion."[15] Other crime related activity includes, according to papers filed with the King County Superior Court in Seattle, Washington, criminal charges filed against a member of Service Employees International Union, Local 775 NW for submitting allegedly forged signatures in support of Initiative 1098, a measure to allow income taxes in the state of Washington.[16] The SEIU is allegedly in connection to a case of voter fraud in Harris County Texas, according to a Fox News report.[17][18] "The integrity of the voting rolls in Harris County, Texas, appears to be under an organized and systematic attack by the group operating under the name Houston Votes," the Harris voter registrar, Leo Vasquez, charged as he passed on the documentation to the district attorney. “ Most of the findings focused on a group called Houston Votes, a voter registration group headed by Steve [Sean] Caddle, who also works for the Service Employees International Union. Among the findings were that only 1,793 of the 25,000 registrations the group submitted appeared to be valid. The other registrations included one of a woman who registered six times in the same day; registrations of non-citizens; so many applications from one Houston Voters collector in one day that it was deemed to be beyond human capability; and 1,597 registrations that named the same person multiple times, often with different signatures.[19] ” At a Progressive Summit, the SEIU's Stephen Lerner told community organizers and students they need to escalate protests, break laws, occupy abandoned houses, and spread crisis across the United States.[20] “ I remember the first time I was arrested, it was terrifying. But I think if we really believe that we have to create a crisis for the other side, then we have to be serious. [...] So what do we need to do? What would change their behavior? We have to create a crisis for them! [...] We will change their behavior; we will force them to negotiate if we create a crisis. ” Barack Obama's Aide Patrick Gaspard, who served as the political director for the Service Employees International Union local 1199 and is Barack Obama's current political director, received $37,071.46 in “carried over leave and vacation” from the union in 2009, but he did not disclose the agreement to receive the payment on his financial disclosure forms filed with the White House.[21] In a section on his financial disclosure where agreements or arrangements for payment by a former employer must be disclosed, Gaspard checked a box indicating that he had nothing to report. Such financial disclosures are governed by federal law. Gaspard spent nine years at 1199 SEIU, a major labor union in New York. Gaspard also worked for Obama’s campaign, and later worked for the transition team, where he earned $11,500, according to the financial disclosure form he filed this year. He was pulling a salary from SEIU until Jan. 16, 2009, shortly before Obama was inaugurated. Civilian Army Barack Obama has pledged to give the SEIU more power and strength, as well as the power to eventually "Paint the nation purple." Obama's hope for giving the SEIU more power as a civilian army, in his words, is because "We cannot continue to rely on our military in order to achieve the national security objectives we've set. We've got to have a civilian national security force that's just as powerful, just as strong, just as well-funded."[22] Obama and the SEIU's most recent move to control more power as a national security force was seen on February 11, 2010, following an incident in Seattle's Transit Tunnel after security personnel watched a 15 year old girl get beaten and mugged. The SEIU quickly jumped on the opportunity to try and take advantage of a poor 'security' policy by taking over security in general.[23] The Seattle Times reported, "The Service Employees International Union Local 6 issued a statement Wednesday framing the attack as a reason SEIU should represent the Olympic guards. It already represents Securitas."[24] SEIU researcher Emily Sokolski made the following statement. “ Security guards this week have mentioned their frustration at standing back. [Metro guards] don't have the tools to intervene, at this point. They don't have self-defense training in how to intervene in a physical altercation. They would not only be in danger, but they would be in danger of losing their jobs.[23] ” SEIU is strongest in California, where its United Healthcare Workers-West is one of California's largest unions at 150,000 members. The head is Sal Rosselli, who is locked in a bitter battle with Stern and the national headquarters. Further reading Fink, Leon, and Brian Greenberg. Upheaval in the Quiet Zone: 1199/SEIU and the Politics of Healthcare Unionism (2nd ed. 2009) Fletcher, Bill, and Fernando Gapasin. Solidarity Divided: The Crisis in Organized Labor and a New Path toward Social Justice (2009)
Subject only to provisions of this section and notwithstanding any other provision of law, a public housing agency for which a plan under subsection (d) of this section is in effect may provide public housing projects (or portions of projects) designated for occupancy by (A) only elderly families, (B) only disabled families, or (C) elderly and disabled families. (2) Priority for occupancy In determining priority for admission to public housing projects (or portions of projects) that are designated for occupancy as provided in paragraph (1), the public housing agency may make units in such projects (or portions) available only to the types of families for whom the project is designated. (3) Eligibility of near-elderly families If a public housing agency determines that there are insufficient numbers of elderly families to fill all the units in a project (or portion of a project) designated under paragraph (1) for occupancy by only elderly families, the agency may provide that near-elderly families may occupy dwelling units in the project (or portion). (b) Standards regarding evictions Except as provided in section 1437n(e)(1)(B)[1] of this title, any tenant who is lawfully residing in a dwelling unit in a public housing project may not be evicted or otherwise required to vacate such unit because of the designation of the project (or portion of a project) pursuant to this section or because of any action taken by the Secretary or any public housing agency pursuant to this section. (c) Relocation assistance A public housing agency that designates any existing project or building, or portion thereof, for occupancy as provided under subsection (a)(1) of this section shall provide, to each person and family who agrees to be relocated in connection with such designation— (1)notice of the designation and an explanation of available relocation benefits, as soon as is practicable for the agency and the person or family; (2)access to comparable housing (including appropriate services and design features), which may include tenant-based rental assistance under section 1437f of this title, at a rental rate paid by the tenant that is comparable to that applicable to the unit from which the person or family has vacated; and (3)payment of actual, reasonable moving expenses. (d) Required plan A plan under this subsection for designating a project (or portion of a project) for occupancy under subsection (a)(1) of this section is a plan, prepared by the public housing agency for the project and submitted to the Secretary, that— (1)establishes that the designation of the project is necessary— (A)to achieve the housing goals for the jurisdiction under the comprehensive housing affordability strategy under section 12705 of this title; and (B)to meet the housing needs of the low-income population of the jurisdiction; and (2)includes a description of— (A)the project (or portion of a project) to be designated; (B)the types of tenants for which the project is to be designated; (C)any supportive services to be provided to tenants of the designated project (or portion); (D)how the design and related facilities (as such term is defined in section 1701q(d)(8)[1] of title 12) of the project accommodate the special environmental needs of the intended occupants; and (E)any plans to secure additional resources or housing assistance to provide assistance to families that may have been housed if occupancy in the project were not restricted pursuant to this section. For purposes of this subsection, the term “supportive services” means services designed to meet the special needs of residents. (e) Review of plans (1) Review and notification The Secretary shall conduct a limited review of each plan under subsection (d) of this section that is submitted to the Secretary to ensure that the plan is complete and complies with the requirements of subsection (d) of this section. The Secretary shall notify each public housing agency submitting a plan whether the plan complies with such requirements not later than 60 days after receiving the plan. If the Secretary does not notify the public housing agency, as required under this paragraph or paragraph (2), the plan shall be considered, for purposes of this section, to comply with the requirements under subsection (d) of this section and the Secretary shall be considered to have notified the agency of such compliance upon the expiration of such 60-day period. (2) Notice of reasons for determination of noncompliance If the Secretary determines that a plan, as submitted, does not comply with the requirements under subsection (d) of this section, the Secretary shall specify in the notice under paragraph (1) the reasons for the noncompliance and any modifications necessary for the plan to meet such requirements. (3) Standards for determination of noncompliance The Secretary may determine that a plan does not comply with the requirements under subsection (d) of this section only if— (A)the plan is incomplete in significant matters required under such subsection; or (B)there is evidence available to the Secretary that challenges, in a substantial manner, any information provided in the plan. (4) Treatment of existing plans Notwithstanding any other provision of this section, a public housing agency shall be considered to have submitted a plan under this subsection if the agency has submitted to the Secretary an application and allocation plan under this section (as in effect before March 28, 1996) that have not been approved or disapproved before March 28, 1996. (f) Effectiveness (1) 5-year effectiveness of original plan A plan under subsection (d) of this section shall be in effect for purposes of this section during the 5-year period that begins upon notification under subsection (e)(1) of this section of the public housing agency that the plan complies with the requirements under subsection (d) of this section. (2) Renewal of plan Upon the expiration of the 5-year period under paragraph (1) or any 2-year period under this paragraph, an agency may extend the effectiveness of the designation and plan for an additional 2-year period (that begins upon such expiration) by submitting to the Secretary any information needed to update the plan. The Secretary may not limit the number of times a public housing agency extends the effectiveness of a designation and plan under this paragraph. (3) Transition provision Any application and allocation plan approved under this section (as in effect before March 28, 1996) before March 28, 1996, shall be considered to be a plan under subsection (d) of this section that is in effect for purposes of this section for the 5-year period beginning upon such approval. No tenant of a public housing project shall be considered to be displaced for purposes of the Uniform Relocation Assistance and Real Property Acquisitions Policy Act of 1970 [42 U.S.C. 4601 et seq.] because of the designation of any existing project or building, or portion thereof, for occupancy as provided under subsection (a) of this section. Section 1701q of title 12, referred to in subsec. (d)(2)(D), was amended generally by Pub. L. 101–625, title VIII, § 801(a),Nov. 28, 1990, 104 Stat. 4297, and, as so amended, does not contain a subsec. (d)(8) or a definition of the term “related facilities”. The Uniform Relocation Assistance and Real Property Acquisitions Policy Act of 1970, referred to in subsec. (g), probably means the Uniform Relocation Assistance and Real Property Acquisition Policy Act of 1970, Pub. L. 91–646, Jan. 2, 1971, 84 Stat. 1894, as amended, which is classified principally to chapter 61 (§ 4601 et seq.) of this title. For complete classification of this Act to the Code, see Short Title note set out under section 4601 of this title and Tables. Prior Provisions A prior section 7 of act Sept. 1, 1937, ch. 896, 50 Stat. 891, as amended, required publication of information and submission of annual report by the Authority and was classified to section 1407 of this title, prior to the general revision of this chapter by Pub. L. 93–383. Amendments 1998—Subsec. (h). Pub. L. 105–276struck out heading and text of subsec. (h). Text read as follows: “The provisions of this section shall not apply with respect to low-income housing developed or operated pursuant to a contract between the Secretary and an Indian housing authority.” 1996—Pub. L. 104–330, § 501(b)(4), which directed amendment of “subsection 7” of the United States Housing Act of 1937, probably meaning this section, by striking subsec. (l), could not be executed because this section does not contain a subsec. (l). Subsec. (a)(2). Pub. L. 104–99, which directed the temporary amendment of par. (2) by substituting “in accordance with the written system of preferences for selection established pursuant to” for “according to the preferences for occupancy under”, could not be executed because of the amendment by Pub. L. 104–120which amended section generally retroactive to Oct. 1, 1995. See Effective and Termination Dates of 1996 Amendments note below. 1992—Pub. L. 102–550amended section generally, substituting present provisions for provisions relating to and defining “congregate housing” and providing for design, development, and acquisition of congregate housing for displaced or elderly families, limitation on amounts for contracts for congregate housing, and costs for central dining facilities. 1978—Pub. L. 95–557substituted “(1) low-rent housing which, as of January 1, 1979, was built or under construction, with which there is connected a central dining facility where wholesome and economical meals can be served to such occupants; or (2) low-rent housing constructed after, but not under construction prior to, January 1, 1979, connected with which there is a central dining facility to provide wholesome and economical meals for such occupants. Such occupants of congregate housing may also be provided with other supportive services appropriate to their needs under title IV of the Housing and Community Development Amendments of 1978” for “low-income housing (A) in which some or all of the dwelling units do not have kitchen facilities, and (B) connected with which there is a central dining facility to provide wholesome and economical meals for elderly and displaced families under terms and conditions prescribed by the public housing agency to permit a generally self-supporting operation”. Effective and Termination Dates of 1996 Amendments Amendment by Pub. L. 104–330effective Oct. 1, 1997, except as otherwise expressly provided, see section 107 ofPub. L. 104–330, set out as an Effective Date note under section 4101 of Title 25, Indians. Amendment by Pub. L. 104–120to be construed to have become effective Oct. 1, 1995, notwithstanding the effective date of any regulations issued by Secretary of Housing and Urban Development to implement amendments by sections 9 and 10 ofPub. L. 104–120or any failure by Secretary to issue any such regulations, see section 13 ofPub. L. 104–120, set out as a note under section 1437d of this title. Amendment by Pub. L. 104–99effective Jan. 26, 1996, only for fiscal years 1996, 1997, and 1998, and to cease to be effective Oct. 21, 1998, see section 402(f) ofPub. L. 104–99, as amended, and section 514(f) ofPub. L. 105–276, set out as notes under section 1437a of this title. Effective Date of 1992 Amendment Amendment by subtitles B through F of title VI [§§ 621–685] of Pub. L. 102–550applicable upon expiration of 6-month period beginning Oct. 28, 1992, except as otherwise provided, see section 13642 of this title. Inapplicability of Certain 1992 Amendments to Indian Public Housing Amendment by Pub. L. 102–550not applicable with respect to lower income housing developed or operated pursuant to contract between Secretary of Housing and Urban Development and Indian housing authority, see section 626 ofPub. L. 102–550, set out as a note under section 1437a of this title.
import React from 'react'; import createSvgIcon from './utils/createSvgIcon'; export default createSvgIcon( <React.Fragment><path fillOpacity=".3" d="M22 8V2L2 22h16V8h4z" /><path d="M14 22V10L2 22h12zm6-12v8h2v-8h-2zm0 12h2v-2h-2v2z" /></React.Fragment> , 'SignalCellularConnectedNoInternet2BarSharp');
An Australian man who travelled to Syria to join Kurds battling Islamic State jihadists has been killed in battle, the first Westerner to die fighting alongside the Kurds, a monitor says. "An Australian man was killed in an assault on Tuesday by the Islamic State against a position of the Kurdish People's Protection Units (YPG) near Tal Hamis in Hasakeh province," said Rami Abdel Rahman, the director of the Syrian Observatory for Human Rights. The Observatory had reported the fighter's death on Tuesday, but was unable to confirm his nationality until Wednesday. Fairfax Media spoke to a Kurdish Syrian translator, Sabry Omar, who saw the Australian on Mount Sinjar in Iraqi Kurdistan last month. "He was on the frontline when he was injured - I saw him in hospital, but he was not seriously hurt," he said. "A suicide bomber in a car exploded near him and his eyes were injured."
*Candida auris* is a global multidrug-resistant pathogen with a propensity to cause nosocomial outbreaks \[[@CIT0001]\]. Next-generation sequencing analyses have shown that strains of *C. auris* cluster into 4 predominant, but possibly 5 geographically distinct clades (South Asian \[clade I\], East Asian \[clade II\], African \[clade III\], and South American \[clade IV\]), with some evidence of phylogeographical mixing of clades \[[@CIT0001], [@CIT0007]\]. Short-read whole-genome sequencing (WGS) data demonstrated that there are \>10 000 single nucleotide polymorphisms (SNPs) from separate clades, but with lower intraclade diversity (\<100 SNP differences) \[[@CIT0001]\]; the low intraclade diversity was most marked in analyses of hospital outbreaks where genomes of outbreak isolates differed by a median of 3 SNPs, and within any 1 patient, by \<2 SNPs \[[@CIT0001], [@CIT0010]\]. Whether similar observations emerge in the nonoutbreak setting is uncertain. Following the first *C. auris* infections in Australia \[[@CIT0011], [@CIT0012]\], in 2018/2019, Sydney reported 3 additional cases. Here we used WGS to investigate the genetic relationships and markers of drug resistance of Australian isolates from sporadic cases, including from the first report \[[@CIT0011]\]. To place results in the genomic context, we also sequenced several isolates from India and South Africa and included publicly available *C. auris* genomes \[[@CIT0001], [@CIT0003], [@CIT0004], [@CIT0008]\]. Phylogenetic SNP analysis was compared with polymerase chain reaction (PCR) fingerprinting \[[@CIT0013]\]. Unexpectedly, mulitple isolates from 1 individual (clade III) had relatively diverse genomes compared with previous observations for this clade \[[@CIT0002], [@CIT0003]\]. Eighteen clinical isolates, reconfirmed as *C. auris* by internal transcribed spacers (ITS) sequencing, were studied ([Table 1](#T1){ref-type="table"}). Of 10 Australian isolates, 9 were from 3 separate cases repatriated to Sydney hospitals from South Africa (Cases 1, 2, 3), with Case 4 repatriated to Perth \[[@CIT0011]\]. Two isolates were from South Africa, and 6 were from India, included as "benchmark" isolates from their respective regions. For Case 1, the incident isolate (strain WM_18.177) was cultured during a prior hospitalization in South Africa but was considered an Australian isolate for this study. ###### *Candida auris* Isolates Studied: Geographic Region, Clade, Body Site of Isolation, and in Vitro Susceptibility to 9 Antifungal Agents Isolate ID Country Clade Body Site Date of Isolation Minimum Inhibitory Concentration, mg/L -------------------------------------- --------------- --------- ---------------------- ------------------- ---------------------------------------- ---------- --------- --------- ------- ---------- ---------- ---------- ---------- Australian isolates Case 1 WM_18.181 Australia III Wound swab PICC site 05.09.2018 1 0.12 256 0.25 2 0.12 0.25 0.12 0.12 WM_18.182 Australia III Sputum 05.09.2018 1 0.12 256 0.25 2 0.12 0.25 0.12 0.25 WM_18.187 Australia III Axilla swab 06.09.2018 1 0.12 256 0.25 2 0.12 0.5 0.12 0.25 WM_18.188 Australia III Sputum 07.09.2018 1 0.25 256 0.5 4 0.25 0.25 0.06 0.12 WM_18.189 Australia III Axilla swab 11.09.2018 1 0.12 256 0.25 2 0.12 0.25 0.12 0.25 **WM_18.177** ^**a**^ **Australia** **III** **Blood culture** **July 2018** **1** **0.12** **256** **0.5** **2** **0.12** **0.25** **0.12** **0.12** WM_18.190 Australia III Groin 11.09.2018 1 0.12 256 0.25 2 0.12 0.25 0.12 0.25 Case 2 WM_18.180 Australia III Nose swab 20.09.2018 1 0.12 \>256 0.25 2 0.12 0.25 0.12 0.25 Case 3 WM_18.197 Australia III Throat 08.11.2018 1 0.12 256 0.5 2 0.12 0.25 0.12 0.25 Case 4^b^ WM_18.176 Australia III Sternal bone 2015 1 0.06 \>256 1 1 0.12 0.5 0.5 0.5 South African comparison isolates^c^ WM_18.178 South Africa III Blood culture 2017 0.5 0.12 \>256 0.5 4 0.25 0.12 0.06 0.06 WM_18.179 South Africa III Blood culture 2017 1 0.12 256 0.25 1 0.12 0.25 0.12 0.12 Indian comparison isolates^d^ WM_18.173 India I Blood culture Unknown 1 \<0.06 64 0.25 1 0.03 0.25 0.12 \>8 WM_18.174 India I Blood culture Unknown 2 \<0.06 64 0.12 0.5 0.03 0.5 0.12 \>8 WM_18.175 India I Blood culture Unknown 2 \<0.06 128 0.12 0.5 0.03 0.25 0.25 0.5 WM_18.194 India I Blood culture Unknown 2 0.12 32 0.32 0.25 0.008 \>8 \>8 2 WM_18.195 India I Blood culture Unknown 2 0.12 \>256 0.25 1 0.12 0.25 0.12 0.12 WM_18.196 India I Blood culture Unknown 2 0.12 256 0.25 1 0.25 0.25 0.12 0.12 Abbreviations: 5-FC, 5-flucytosine; AMB, amphotericin B; ANI, anidulafungin; CAS, caspofungin; FLC, fluconazole; ITR, itraconazole; MIC, minimum inhibitory concentration; MIF, micafungin; POS, posaconazole; VRC, voriconazole. ^a^Original (incident) clinical isolate from Case 1, isolated while hospitalized in South Africa. ^b^Clinical isolate obtained from Heath et al. \[[@CIT0011]\]. ^c^Clinical isolates from South Africa ^d^Clinical isolates from India. Antifungal susceptibility was determined using Sensititre YeastOne YO10 (TREK Diagnostics, Cleveland, OH, USA). MICs were interpreted against the proposed US Centers for Disease Control and Prevention (CDC) breakpoints \[[@CIT0014]\] or proposed *C. auris--*specific Clinical Laboratory Standards Institute epidemiological cutoff values to define wild-type (WT) or non-WT isolates \[[@CIT0015]\]. PCR fingerprinting was also performed \[[@CIT0013]\]. Genomic DNA was extracted using the MasterPure Yeast Kit (Epicentre, Lucigen Corporation, WIS, USA). DNA libraries were prepared (Nextera XT; Illumina, CA, USA) and sequenced on the NextSeq 500 platform (Illumina, CA, USA) \[[@CIT0016]\]. Raw reads were trimmed (Trimmomatic, version 3.6) and taxonomically classified using Kraken, version 1.0. Single nucleotide polymorphisms (SNPs) were called using 3 pipelines where SNPs were defined as substitutions present in at least 90% of reads with minimum coverage above 30. For the Nullarbor and RedDog pipelines (see below), reads were mapped to *C. auris* strain B11221 (African clade; NCBI GenBank Accession [PGLS01000001.1](PGLS01000001.1)) \[[@CIT0017]\] as the reference. Nullarbor (version e2.0) (<https://github.com/tseemann/nullarbor>) employed Freebayes (version 1.2.0-dirty) for SNP calling and filtered them using Snippy, version 4.3.5, based on a minimum coverage of 10, a quality of 100, and a read fraction of 0.9 supporting the variant. The analysis was also undertaken using RedDog (<https://github.com/katholt/RedDog>) employing Bowtie2 \[[@CIT0018]\] to map reads to the reference and BCFtools, version 1.3.1 (<https://www.sanger.ac.uk/science/tools/samtools-bcftools-htslib>), for SNP calling. In parallel, sequences were examined using the Oxford pipeline \[[@CIT0003]\], which mapped short reads to the reference sequence T26425 (clade III) using Stampy, version 1.0.23, without BWA premapping, with an expected substitution rate of 0.01. SNPs were identified with Samtools4, version 0.1.19, mpileup with extended base-alignment quality flag. A consensus of ≥75% was necessary to support a SNP, and calls were required to be homozygous under a diploid model. Only SNPs supported by ≥5 reads, including 1 in each direction, were accepted. Repetitive regions of the genome were excluded as described by Eyre et al. \[[@CIT0003]\]. Consensus alleles at all SNP variant sites were extracted; SNP sites present in all genomes were concatenated to generate a core SNP alignment for phylogenetic analysis. A maximum likelihood tree was estimated using IQTree, version 1.6.7, at 1000 bootstraps using the SNP matrix of Nullarbor, version 2.0. Sequence reads were deposited in the NCBI Archive (SRA: PRJNA559200). The data set was supplemented with 121 published genome sequences of *C. auris* (SRAs: PRJEB21518, PRJNA328792, PRJNA328792, PRJEB20230) \[[@CIT0001], [@CIT0003], [@CIT0008]\]. The number and location of SNPs called by the 3 pipelines were highly concordant (correlation coefficient *r* = .999) ([Supplementary Tables 1--4](#sup3 sup4 sup5 sup6){ref-type="supplementary-material"}). Genes known for their role for antifungal drug resistance in *C. auris* and *Candida* spp. (*ERG11, MDR1, CDR1* \[azole resistance\], *FKS1* \[echinocandin resistance\], and *ERG2*, *ERG3*, *ERG5*, *ERG6* \[amphotericin B resistance\]) \[[@CIT0019], [@CIT0020]\] were examined for SNPs using the criteria above (CLC Genomics Workbench; Bio, version 7.0, Aarhus, Denmark) \[[@CIT0016]\]. [Table 1](#T1){ref-type="table"} summarizes the isolate details including the timeline of Australian isolates. Six of 7 isolates from Case 1 were cultured over a period of 3 weeks during hospitalization. The seventh (incident isolate from South Africa) was forwarded to us for comparative analysis. Isolates cultured from various body sites from Case 1 were available for study. Phylogenetic analysis of the study isolates identified 2 major isolate clusters assigned to clades I and III ([Figure 1A](#F1){ref-type="fig"}). All Australian isolates clustered within clade III ([Table 1](#T1){ref-type="table"}), whereas the Indian isolates grouped within clade I, separated from clade III by \>40 000 SNPs. Genomes of isolates from Case 1 formed 2 distinct "groups," separated by 60--70 SNPs ([Figure 1B](#F1){ref-type="fig"}; [Supplementary Tables 2--4](#sup4 sup5 sup6){ref-type="supplementary-material"}). Three isolates (strains WM_18.181, WM_18.188, and WM_18.182) were in the same subgroup as the incident isolate (highlighted in yellow). Within each subgroup, the SNP difference between isolates was 6--9 SNPs. For example, for isolates from Case 1, strains WM_18.181 and WM_18.182 were separated by 5--8 SNPs. However, others, also from Case 1, differed by \>60 SNPs (eg, WM_18.181 and WM_18.190) ([Supplementary Tables 2 and 3](#sup4 sup5){ref-type="supplementary-material"}). ![A, Circular maximum likelihood phylogeny by r package ggtree of *Candida auris* isolates. Clades are represented by highlighted sections of the tree---clade I (green), clade II (white), clade III (blue), and clade IV (orange)---and generally correspond with geographical regions, namely India/Pakistan, Japan, South Africa, and South America, respectively. "Australian" isolates are depicted by the red tip labels. B, Maximum likelihood phylogeny of *Candida auris* isolates using MEGA, version 6.0, with expanded subtree views with scales and bootstrap values on the righthand side. Isolate identification (tips) and arrows are colored by clade (clade III: blue; clade I: black). The yellow highlighted tip represents the index isolate from case 1 in South Africa before repatriation to Australia (see the text and [Table 1](#T1){ref-type="table"} for further details). For the Australian isolates, the case from which the isolate was cultured is shown on the tree tip.](ofaa158f0001){#F1} Isolates from Cases 2, 3, and 4 and 2 other South African isolates ([Table 1](#T1){ref-type="table"}) were all distinct from each other (\>60 SNPs separating their genomes). Of 2 PCR fingerprinting patterns ([Figure S1](#sup1){ref-type="supplementary-material"}), pattern 1 encompassed the 6 Indian isolates, indistinguishable from each other, and corresponded to genome clade I. Other isolates belonged to pattern 2, also indistinguishable with the exception of 1 strain, and corresponded to clade III. Isolates had low 5-flucytosine MICs (0.06--0.12 µg/mL) ([Table 1](#T1){ref-type="table"}). Clade III isolates showed WT MICs to amphotericin B (≤1 µg/mL) with no SNPs in *ERG2*, *ERG3*, *ERG5*, and *ERG6*; 5/6 Indian isolates had MICs at the proposed breakpoint of 2 µg/mL \[[@CIT0014]\] and harbored an *ERG2* SNP at nucleotide position A117C (E39D mutation) ([Supplementary Table 5](#sup7){ref-type="supplementary-material"}). Isolates universally had high fluconazole MICs (32--\>256 µg/mL) with varying susceptibility to other azoles. Two SNPs in *ERG11* were present, leading to mutations V125A and F126L in the clade III isolates, while mutations Y132F and K143R were in Indian isolates, as were nonsynonymous SNPs in the *MDR1* (T801G and A1225G) and *CDR1* (A2127T) genes. Australian and South African isolates had echinocandin MICs of ≤0.5 µg/mL, but a single pan-echinocandin-resistant isolate (strain WM_18.194) from India contained the *FKS1* mutation, S639F. No *FKS1* mutations was detected in 2 Indian strains with MICs of ≥8 µg/mL to caspofungin only ([Tables 1](#T1){ref-type="table"}; [Supplementary Table 5](#sup7){ref-type="supplementary-material"}). The value of WGS for investigation of nosocomial *C. auris* infections has been documented, yet there are few data on its application to describe the genomic diversity of isolates outside the outbreak setting. Here we present the phylogenetic relatedness based on WGS of 10 Australian isolates from 4 sporadic cases in the wider geographical context. There was no distinct Australian clade as noted for other Australian isolates \[[@CIT0011], [@CIT0012]\] but rather independent importation events with strains reflecting likely geographic origin of acquisition. Interestingly, in the nonoutbreak setting herein, whereas isolates from different cases had genomes separated by \>60 SNPs, as found elsewhere \[[@CIT0001]\] for clade III isolates, those from Case 1 were separated by an unexpectedly higher number of SNPs, with no isolate being identical. This finding contrasts with those from nosocomial *C. auris* outbreaks where intraclade diversity between isolates from any 1 individual was low (\<3 SNPs) \[[@CIT0001], [@CIT0002], [@CIT0021]\] although 1 study showed less spatiotemporal clustering \[[@CIT0004]\]. One likely explanation for our findings, although unproven, is that at least 2 distinct populations were acquired while in the hospital in South Africa (a group of 4 and another group of 3 isolates) ([Figure 1B](#F1){ref-type="fig"}). Regardless, the results indicate the presence of genetically heterogeneous strain populations colonizing the host simultaneously where such heterogeneity may enhance fitness \[[@CIT0004], [@CIT0022]\]. The sampling of \>1 body site and/or on \>1 occasion to detect *C. auris* may assist studies addressing this question. We included 2 de novo South African isolates as a "benchmark" for clade classification. Despite the lower discriminatory power of PCR fingerprinting, it may be useful for rapid clade identification in laboratories without WGS technology, as different clades are associated with different drug resistance patterns, which impact empiric antifungal therapy. Importantly, despite the absence of interpretive MICs, resistance to ≥2 drug classes was not evident among Australian isolates compared with 20%--44% resistance rates elsewhere \[[@CIT0001], [@CIT0006]\]. Multidrug resistance may be location- or clade-specific. As before, isolates exhibited reduced fluconazole susceptibility and varying susceptibility to other azoles \[[@CIT0001], [@CIT0006]\]. Reassuring, given that echinocandins are first-line agents for treating *C. auris* infections \[[@CIT0023]\], strains had low echinocandin MICs and WT MICs to amphotericin B \[[@CIT0002], [@CIT0020]\]. In parallel, no Australian isolate harbored *FKS1* mutations, for example, involving S639 substitutions \[[@CIT0007], [@CIT0024], [@CIT0025]\]. This amino acid is homologous to that at position S645 in *C. albicans*, where amino acid changes confer high-level echinocandin resistance \[[@CIT0026]\]. Conversely, the pan-echinocandin-resistant clade I strain contained the S639F mutation, as have other pan-echinocandin-resistant isolates. The mutations S639P and S639Y, linked to echinocandin resistance, were absent in our isolates \[[@CIT0020], [@CIT0024]\]. WGS analysis also informed *ERG11* mutations, homologous to those linked to azole resistance in *C. albicans* \[[@CIT0001], [@CIT0026]\]. That K143R and Y132F substitutions were present in Indian but not Australian and South African isolates is consistent with the notion these are clade I--specific markers of resistance \[[@CIT0001], [@CIT0017]\]. Conversely, the F126L and V125A mutations (clade III--specific) \[[@CIT0001], [@CIT0020]\] were present in Australian and South African isolates only. The association of novel SNPs in *MDR1* and *CDR1* in the Indian isolates with azole resistance is uncertain, as is the link to amphotericin B resistance with the mutation E39D. The limitations of our study include the small number of Australian isolates due to the sporadic nature of infection, and in the absence of an outbreak, the environment was not sampled. The unusually high within-host genetic diversity was documented only in 1 case, as multiple isolates from the other patients were not available, limiting wider clinical relevance. Detailed study of patient data and investigation of resistance mechanisms to azoles were outside of the study scope. In conclusion, analysis of *C. auris* genomes in a nonoutbreak setting demonstrated that WGS added value by differentiating independent importations from recent transmission events. Within-host diversity of *C. auris* suggests concurrent colonization of the host by heterogeneous populations. These findings improve our understanding of colonization/infection by *C. auris* and assist in interpretation of growing genomic data for this pathogen. Supplementary Data {#s1} ================== Supplementary materials are available at *Open Forum Infectious Diseases* online. Consisting of data provided by the authors to benefit the reader, the posted materials are not copyedited and are the sole responsibility of the authors, so questions or comments should be addressed to the corresponding author. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. We wish to thank Drs. Ranjeeta Menon, Elena Martinez, and Nathan Bachmann, Centre for Infectious Diseases and Microbiology-Public Health, The University of Sydney, for their advice on the bioinformatics analysis. We also thank Ms. Sunita Gupta, Postgraduate Institute of Medical Education and Research, Chandigarh, India, and Ms. Ruth Mpembe, National Institute for Communicable Diseases, Johannesburg, South Africa, for forwarding isolates from their countries. The authors also thank the Sydney Informatics Hub of the University of Sydney for providing the high-performance computing resources for comparative genomics. ***Author contributions. ***Study conception: S.C.A.C., V.S., C.B., B.H., S.V.H., W.M. Data generation: C.B., Q.W., S.V.H., C.H., B.H., S.C.A.C., K.M., A.K.G. Data analysis: C.B., Q.W., S.V.H., S.C.A.C., D.E., C.H., V.S., L.I., W.M. Wrote the manuscript: S.C.A.C., C.B., Q.W., S.V.H., V.S. Editing and approving final manuscript: all authors. ***Potential conflicts of interest.***  All authors: no reported conflicts of interest. All authors have submitted the ICMJE Form for Disclosure of Potential Conflicts of Interest. Conflicts that the editors consider relevant to the content of the manuscript have been disclosed. [^1]: Equal contribution
NEW DELHI: Brent crude oil prices have more than doubled from its low of $27.88 a barrel recorded in January to hover near $55 a barrel and may pose a risk to the broader market, in general, and select sectors, in particular, if the trend continues in 2017.Crude oil prices have shot up 15 per cent in last two weeks and Indian consumers may soon have to cough up more, though the fuel price hike may happen in instalments, media reports said.Analysts said public sector oil marketing companies might need to raise petrol and diesel prices by up to Rs 6 a litre when they review fuel prices on December 15.Crude oil prices rose to an 18-month high on Monday, though they slipped a bit later in the day. US crude futures settled 2.6 per cent higher at $52.83 a barrel, while Brent crude futures rose by $1.36 to $55.69 a barrel.Brent prices have been firming up this month after the Organisation of Petroleum Exporting Countries (Opec) and other exporters led by Russia over the weekend reached their first deal since 2001 to cut output by almost 1.8 million barrels a day to reduce oversupply.Rising crude prices are making market participants worried about the possible impact of rising crude oil prices on the Indian equity market, the broader economy as well as various sectors that use crude oil as a raw material. The year 2017 looks bullish for oil prices as the oil-surplus market is likely to turn into deficit, experts said.Even though crude oil prices are trading at comfortable levels, but a steady rise in prices could well hurt India’s current account deficit. Crude oil accounts for almost 80 per cent of India’s import bill.Analyst estimates suggest every dollar increase in crude oil price will cause India’s import bill to rise by nearly half a billion dollars ($500 million).But it is not all that bad right now for the domestic economy despite a steady rise in crude oil prices, experts said. For the past couple of years, India has managed to take care of crude requirements with Russia. India has also signed long-term crude supply agreements with some of the African nations.“After December 2017, our bilateral trade with Iran opened up as the oil exporter signed a key nuclear deal with the P5+1 group of world powers - the US, UK, France, China and Russia plus Germany,” Gaurang Shah, Head-Investment Strategist, Geojit BNP Paribas, told ETMarkets.com.“India’s energy requirement today is at a comfortable level than earlier years. It remains to be seen if crude oil can sustain at $55-60 a barrel level. The reason being at prices above $55 a barrel, crude oil from America could become viable in terms of exports and supply to global crude market. As of now, there is no reason for worry,” he said.The price of international crude oil price of the Indian basket, as computed and published by the Petroleum Planning and Analysis Cell (PPAC) under the Ministry of Petroleum and Natural Gas , stood at $54.42, or Rs 3,677.60 a barrel on Monday.It has remained above $51 a barrel on most days this fortnight, compared with the November average of $44.46 a barrel.From a market standpoint, there are plenty of reasons to worry as higher crude oil prices will hurt the margins for various companies, leading to higher inflation and capping any meaningful upside in the domestic stock market."Rising crude prices are making market participants worried, especially when the year 2017 looks to be bullish for oil prices. In the current economic scenario, India is witnessing a weak demand scenario which is evident after second quarter GDP growth turned out to be weaker than projected,” D K Aggarwal, Chairman and MD, SMC Investments and Advisors, told ETMarkets.com.“It becomes somewhat worrisome for the markets that firming up of crude prices can jack up input costs and drag profitability of the manufacturing industry, which has limited ability to pass on the higher cost given the weak demand conditions,” he said.Aggarwal said higher crude prices would also push up the consumer price inflation which would be a threat to the desired level of 5 percent by the Q4 2016 -2017 of the Reserve Bank of India and may act as a hindrance to cut the interest rate.Earnings growth was hard to come by even when crude oil prices were trading at record lows in 2016. Now with higher prices, margins could well take a hit, analysts said. Crude oil prices are directly or indirectly correlated with the performance of most sectors.Sectors and stocks that have limited ability to pass on the higher input costs may see erosion in margins and would consequently lead to a fall in valuations, analysts said.“Refiners and the lubricants industry would take the direct hit, while paints, adhesives and plastics sectors will take an indirect hit because some of the byproducts of crude refining are key raw materials for them,” Tushar Pendharkar, Head of Research, Right Horizons Investment Advisory Services, told ETMarkets.com."Refiners will take the maximum hit on expectation of lower refining margins, while paint ( Asian Paints , Berger, Kansai Nerolac and Akzo Nobel), adhesives (Pidilite Industries) and plastics ( Nilkamal , Supreme Industries) sectors could underperform in anticipation of an increase in input cost,” he said.Shah of Geojit BNP Paribas said tyre, paint industry, aviation sectors, oil-marketing companies (OMCs) apart from two-wheeler and four-wheeler firms are the major sectors whose fortunes are closely linked to crude oil prices.
Q: "Before" the Big Bang was the Universe really compressed into a mathematical point? A couple of weeks ago a teacher of mine (I'm taking mathematics) was giving a final inspiring lecture about how fundamental Math is to every possible universe. During the lecture though, he said that what the current physics theories tell us is that the Universe originated from a point. Not a really small point, but an actual mathematical point, one with 0 dimensions. I've heard the concept of a singularity before, but even in theory, can it happen in Nature? EDIT: My question is not the same as Did the Big Bang happen at a point?. I'm not interested in how the Universe expanded, I want to know if the Universe was compressed into an actual point. A: General Relativity predicts that singularities happen, and that the universe began at a singularity which is, in principle, visible to us. In some other physically-reasonable cases where GR predicts singularities they are 'censored' by event horizons. I believe it is an open question whether they are so censored in all other physically-plausible situations although people think (hope) they are. However this is a different question as to whether singularities actually happen. General Relativity is a classical (non-quantum) theory and so it more-or-less can't be correct in some cases, one of which is the situation very close to the singularities it predicts. To know what actually happens in these cases we would need a quantum theory of gravity which we do not have (and are probably not very close to having). I think a reasonably common view would be that the prediction of singularities is an indication of the failure of the theory, not an indication that singularities actually exist. So in summary: our current best theory of gravity says that yes, the universe began at a singularity, but it is probably wrong about this.
Rugby World Cup: 10 highlights from the tournament where All Blacks made history Japan's Michael Leitch (right) scoring a try during a Pool B match of the 2015 Rugby World Cup against South Africa at the Brighton community stadium in Brighton, south-east England, on Sept 19, 2015.PHOTO: AFP Georgia's flanker and captain Mamuka Gorgodze (centre) tacking New Zealand's prop Wyatt Crockett during their Rugby World Cup 2015 match at the Millennium stadium in Cardiff, south Wales, on October 2, 2015.PHOTO: AFP South Africa's wing Bryan Habana (right) runs with the ball during a Pool B match of the 2015 Rugby World Cup against the US at the Olympic Stadium, in east London, on Oct 7, 2015.PHOTO: AFP New Zealand's Ma'a Nonu fends off France's Brice Dulin during their Rugby World Cup quarter-final match at the Millennium Stadium on Oct 17, 2015.PHOTO: REUTERS New Zealand's Dan Carter preparing to take a penalty kick during the Rugby World Cup 2015 final between New Zealand and Australia at Twickenham in London on Oct 31, 2015.PHOTO: EPA (AFP) - The 10 biggest moments of the Rugby World Cup, won by New Zealand and hailed by the global governing body World Rugby as the "best" ever: 1. In the biggest upset in World Cup history, Japan beat South Africa 34-32 in the opening Pool B game on September 19. South Africa went on to reach the semi-finals but Japan failed to get out of the group even though the 2019 hosts won three pool games. 2. England captain Chris Robshaw made a fatal error in the Pool of Death match against Wales on September 26 choosing a lineout to bid for a try instead of a penalty that could have drawn the game. England lost 25-28 in the first sign that the host nation were in trouble. 3. Georgia's giant captain Mamuka Gorgodze was sent to the sin bin in their group game against Argentina. But in their next match on October 2, the European minnows put up a battling performance against New Zealand and "Gorgodzilla" was named man of the match. 4. England lost 13-33 to Australia on October 3 and became the first World Cup hosts to fail to reach the knockout stages. 5. Bryan Habana scored a second-half hat-trick of tries in South Africa's 64-0 hammering of the United States on October 7 to equal Jonah Lomu's record of 15 in World Cup matches. The Springbok hero did not manage another one in the tournament though. 6. New Zealand crushed France 62-13 in their quarter-final in Cardiff on October 17. Julian 'The Bus' Savea scored one of the tries of the year, barging aside three French defenders, Lomu-style, as the All Blacks savagely took revenge for past World Cup upsets. 7. In one of the biggest World Cup controversies, South African referee Craig Joubert wrongly gave Australia a penalty that Bernard Foley kicked home in the last minute to beat Scotland 35-34 on October 18. 8. Dan Carter scored a rare drop goal as the All Blacks resisted a South African onslaught to win their October 24 semi-final 20-18. The match also saw a social media storm with images that appeared to show New Zealand captain Richie McCaw elbowing an opponent. Other angles that came out later showed however that there was no contact at all. 9. Adam Ashley-Cooper scored a brilliant hat-trick of tries as Australia ended Argentina's stunning World Cup run with a 29-15 victory in the October 25 semi-final. The presence of Diego Maradona for the second time at the tournament failed to lift the exhausted Pumas who still made a dramatic impact on the World Cup. 10. Dan Carter stretches his world record points total to 1,598 with another 19 - including another crucial drop goal - in his final match for New Zealand as the All Blacks claimed a third World Cup title with a 34-17 triumph over Australia on Oct 31. Follow ST The Straits Times We have been experiencing some problems with subscriber log-ins and apologise for the inconvenience caused. Until we resolve the issues, subscribers need not log in to access ST Digital articles. But a log-in is still required for our PDFs.
NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION This opinion shall not "constitute precedent or be binding upon any court." Although it is posted on the internet, this opinion is binding only on the parties in the case and its use in other cases is limited. R.1:36-3. SUPERIOR COURT OF NEW JERSEY APPELLATE DIVISION DOCKET NO. A-0563-15T2 NANETTE ROSENBAUM, HARLAN ROSENTHAL and MARTIN ROSENBAUM, Plaintiffs-Appellants, v. HIGHLANDS CONDO ASSOCIATION, Defendant-Respondent. ___________________________________ Submitted February 28, 2017 - Decided March 21, 2017 Before Judges Fisher and Vernoia. On appeal from the Superior Court of New Jersey, Law Division, Bergen County, Docket No. L-5602-13. Michael W. Rosen, attorney for appellants. Marshall Dennehey Warner Coleman & Goggin, P.C., attorneys for respondent (Walter F. Kawalec, III, on the brief). PER CURIAM Plaintiffs Nanette Rosenbaum, Harlan Rosenthal, and Martin Rosenbaum appeal the trial court's June 25, 2015 summary judgment dismissal of their premises liability claim against defendant Highlands Condo Association. Plaintiffs also appeal the court's September 4, 2015 order denying plaintiff's motion for reconsideration. We reverse and remand, finding a genuine issue of material fact as to whether defendant's conduct breached the standard of care. I. Viewed in the light most favorable to plaintiffs, Brill v. Guardian Life Ins. Co. of Am., 142 N.J. 520, 540 (1995), the facts are as follows. On November 22, 2012, plaintiff Martin Rosenbaum exited a relative's condominium unit and fell on a driveway outside the unit. The driveway was maintained by defendant. Martin's daughter plaintiff Nanette Rosenbaum came to her father's aid and also fell. Plaintiffs filed a premises liability action against defendant alleging Martin and Nanette fell due to a "dangerous and defective condition on the premises," caused by defendant's negligent "ownership, operations management, maintenance and control of the premises."1 Plaintiffs alleged Martin and Nanette fell due to a transitional slope between two driveways that created a substantial height differential. After the completion of discovery, defendant moved for summary judgment arguing plaintiffs could not establish defendant 1 Plaintiffs also alleged a loss of consortium claim on behalf of Nanette's spouse Harlan Rosenthal. 2 A-0563-15T2 breached its duty to plaintiffs without expert testimony as to how the slope was dangerous or defective. The court agreed and granted summary judgment in defendant's favor, concluding plaintiffs' complaint alleged a design defect that plaintiff was required to establish with expert testimony. Plaintiffs filed a motion for reconsideration arguing the court read the complaint too narrowly to allege only a design defect claim. Plaintiffs' counsel argued the complaint alleged a dangerous condition, the discovery showed defendant was on notice of the condition, and the court therefore erred in its initial determination that expert testimony was required. The court denied plaintiffs' reconsideration motion, finding that "an expert should be required to talk about whether or not [there was] a dangerous condition." II. We review a trial court's grant of summary judgment de novo. Cypress Point Condo. Ass'n v. Adria Towers, L.L.C., 226 N.J. 403, 414 (2016). "[The] trial court's interpretation of the law and the legal consequences that flow from established facts are not entitled to any special deference." Manalapan Realty, L.P. v. Twp. Comm., 140 N.J. 366, 378 (1995). Summary judgment is appropriate where there is no genuine issue of material fact and the moving party is entitled to judgment as a matter of law. R. 4:46-2(c). 3 A-0563-15T2 We must "consider whether the competent evidential materials presented, when viewed in the light most favorable to the non- moving party in consideration of the applicable evidentiary standard, are sufficient to permit a rational factfinder to resolve the alleged disputed issue in favor of the non-moving party." Brill, supra, 142 N.J. at 523. To establish a prima facie case of negligence, a plaintiff must establish that "a defendant owed a duty of care, the defendant breached that duty, and injury was proximately caused by the breach." Siddons v. Cook, 382 N.J. Super. 1, 13 (App. Div. 2005). A plaintiff bears the burden to prove negligence, which is never presumed. Khan v. Singh, 200 N.J. 82, 91 (2009). "[T]he mere showing of an accident causing the injuries sued upon is not alone sufficient to authorize an inference of negligence." Vander Groef v. Great Atl. & Pac. Tea Co., 32 N.J. Super. 365, 370 (App. Div. 1954) (internal quotation marks omitted). An owner or possessor of property has a duty to "warn a social guest of any dangerous conditions of which the owner had actual knowledge and of which the guest is unaware." Hopkins v. Fox & Lazo Realtors, 132 N.J. 426, 434 (1993). Thus, "[o]rdinarily an injured plaintiff asserting a breach of that duty must prove, as an element of the cause of action, that the defendant had actual or constructive knowledge of the dangerous condition that caused 4 A-0563-15T2 the accident." Nisivoccia v. Glass Gardens, Inc., 175 N.J. 559, 563 (2003). Plaintiffs do not dispute that an expert would be required if they alleged a design defect. See D'Alessandro v. Hartzel, 422 N.J. Super. 575, 581 (App. Div. 2011) ("mere allegations of a design flaw or construction defect, without some form of evidentiary support, will not defeat a meritorious motion for summary judgment"). Rather, plaintiffs argue an expert was not required because their complaint does not allege a design defect, but instead alleges that defendant maintained a dangerous condition about which it had actual knowledge. In the court's oral opinion on defendant's summary judgment motion, the court found, "the fact of the matter is, the plaintiff[s] allege[] a design defect." We disagree. The complaint does not expressly allege a design defect. It asserts Martin and Nanette fell because of a "dangerous and defective condition on the premises" and they were injured as a result of defendant's "ownership, management, maintenance and control of the premises." Plaintiffs' counsel argued they were required only to show a dangerous condition and notice, plaintiffs "[did not] need experts to say what's dangerous," and they were not obligated "to get into design." 5 A-0563-15T2 The court appears to have concluded plaintiffs alleged a defective design claim because the court determined the alleged dangerous condition existed as a result of its design. However, the fact that an alleged dangerous condition may have been constructed in accordance with its original design does not require that a plaintiff claiming a dangerous condition show that it resulted from a defective design, or that it deviated from an applicable standard of construction. See Garafola v. Rosecliff Realty Co., 24 N.J. Super. 28, 39 (App. Div. 1952) (evidence of "[c]onstruction in accordance with a standard practice or deviation therefrom" was not required to establish a foreseeable danger and was "merely one indication of absence or presence of elements tending to establish negligence"). We next consider whether plaintiffs' claim that the slope constituted a dangerous condition required the aid of expert testimony. In determining whether expert testimony is necessary, a court must consider "whether the matter to be dealt with is so esoteric that jurors of common judgment and experience cannot form a valid judgment as to whether the conduct of the [defendant] was reasonable." Davis v. Brickman Landscaping, Ltd., 219 N.J. 395, 407 (2014) (quoting Butler v. Acme Mkts., Inc., 89 N.J. 270, 283 (1982)). In some cases the "jury is not competent to supply the standard by which to measure the defendant's conduct," and thus 6 A-0563-15T2 the plaintiff must establish the defendant's standard of care and breach of that standard by presenting expert testimony. Ibid. (quoting Sanzari v. Rosenfeld, 34 N.J. 128, 134-35 (1961)); see, e.g., id. at 408 (expert required to explain fire code provisions and standards); D'Alessandro, supra, 422 N.J. Super. at 582-83 (expert required to explain dangerous condition of a step down into a sunken living room near the entrance because allegations of a design flaw or construction defect are "so esoteric or specialized that jurors of common judgment and experiences cannot form a valid conclusion"); Vander Groef, supra, 32 N.J. Super. at 370 (plaintiff "failed to introduce any evidence that the construction of a platform 44 inches high without steps or a ladder was in any way a deviation from standard construction, or that it was unsafe"). Conversely, in cases in which "a layperson's common knowledge is sufficient to permit a jury to find that the duty of care has been breached," an expert is not required. Davis, supra, 219 N.J. at 408 (quoting Giantonnio v. Taccard, 291 N.J. Super. 31, 43 (App. Div. 1996)). In other words, "some hazards are relatively commonplace and ordinary and do not require the explanation of experts in order for their danger to be understood by average persons." Hopkins, supra, 132 N.J. at 450 (expert not required to establish dangerous condition of camouflaged step); 7 A-0563-15T2 see also Scully v. Fitzgerald, 179 N.J. 114, 127-28 (2004) (expert not required to explain danger of throwing a lit cigarette onto a pile of papers or other flammable material); Campbell v. Hastings, 348 N.J. Super. 264, 270-71 (App. Div. 2002) (expert not required to establish danger of unlit sunken foyer); Murphy v. Trapani, 255 N.J. Super. 65, 74-75 (App. Div.) (expert not required to establish navigational hazard of a deck hung over water and close to a shared property line), certif. denied, 130 N.J. 17 (1992); Berger v. Shapiro, 30 N.J. 89, 101-02 (1959) (expert not required to explain dangerous condition caused by a missing brick in top step of porch). Considering the evidence presented here viewed in the light most favorable to plaintiffs, a rational factfinder could determine that the slope constituted a dangerous condition without the aid of expert testimony. The photograph showed a substantial and abrupt step-down of approximately twelve inches2 between the levels of black pavement. The slope from the higher level to the lower level is severe. There is no striping showing the end of the higher level and the beginning of the step-down to the lower level. In her deposition, Nanette testified there was a "significant 2 Plaintiff's allegation the step-down is approximately twelve inches is supported by the photograph that was considered by the court. 8 A-0563-15T2 slope" that was "unmarked in any way." The identical color of the pavement at both levels created the type of camouflaged step the Court in Hopkins determined a jury could find constituted a dangerous condition without the aid of expert testimony. See Hopkins, supra, 132 N.J. 450-51 (finding plaintiff's claim that two steps were dangerous because they shared the identical vinyl covering pattern thereby camouflaging the lower step did not require expert testimony). Expert testimony that the slope deviated from standard practice or applicable building codes could support plaintiffs' claim, but such evidence was not required. See Garafola, supra, 24 N.J. Super. at 38-39 (whether the existence of a tree close to an amusement park train ride was dangerous was a factual issue for a jury and evidence of a deviation from standard practice was not required). There is nothing esoteric about understanding the danger of a height differential between two driveways that was unmarked in any way and about which defendant had been provided actual notice. Thus, we find the alleged dangerous condition "[does] not require the explanation of experts in order for [its] danger to be understood by average persons." Hopkins, supra, 132 N.J. at 450. Although a jury might conclude the circumstances are insufficient to establish the dangerous condition alleged in the complaint, "it is their decision to make, and they are fully 9 A-0563-15T2 capable of making that decision without the assistance of experts." Id. at 451. Reversed and remanded for further proceedings consistent with this opinion. We do not retain jurisdiction. 10 A-0563-15T2
Q: how to create dynamic swipe screens in android? I am not asking for code or anything, but I am learning android myself while making an app. And my app requires to use swiping gesture to move across multiple dynamic lists. So I am thinking I can spawn 3 listviews widgets initially, and show the middle one while hiding the other 2, so when the user swipe either left or right, I would have something right at the moment ready to show. Then whenever a transition is made, the 2 hidden listviews would have to update their data to be the new left listview and right listview. So these listviews have to be in circular order too, like 1 -> 2 -> 3 then back to 1 like that. I need some general directions on how to do it, online reading material would be great too. If it should not be done in the way I described, give me the standard way of doing something like that. It would be awesome if there's a library that can help me out with this. A: For swiping gesture you have to use view flipper.But be sure before using this,This requires fragments which is not supported in api level less than 10. Below are the following listed links 1) http://androidtrainningcenter.blogspot.in/2012/10/viewpager-example-in-android.html 2) http://www.edumobile.org/android/android-beginner-tutorials/view-pager-example-in-android-development/ 3)http://manishkpr.webheavens.com/android-viewpager-example/ Let me know if are still facing any issue
The use of dialectical behavior therapy skills training as stand-alone treatment: a systematic review of the treatment outcome literature. Dialectical behavior therapy (DBT) skills training is currently being administered as stand-alone treatment across a variety of clinical settings, serving diverse client populations. However, there is little empirical support for this use. In this systematic review, we identified 17 trials employing a treatment that included DBT skills training in the absence of the other DBT modalities. While the literature reviewed provides preliminary evidence of the utility of DBT skills training to address a range of mental health and behavioral problems, methodological limitations of published studies preclude us from drawing strong conclusions about the efficacy of skills training as a stand-alone treatment. We present an overview of the implementation of DBT skills training across clinical settings and populations. We found preliminary evidence supporting the use of DBT skills training as a method of addressing a range of behaviors. We provide recommendations for future research.
Bulls Fire Tom Thibodeau After Five Seasons Tom Thibodeau Fired After Five Seasons Photo by Jonathan Daniel/Getty Images In a move that has been building for some time, the Chicago Bulls have announced that they have fired their head coach, Tom Thibodeau. The Bulls exited the playoffs in the second round, but it was rumored that rift between him and the front office ran so deep that not even winning a championship would be enough to save his job. While Tom Thibodeau never won a championship in Chicago, it would be hard to categorize his tenure in the Windy City as anything but successful. He was known as a player’s coach who routinely got the most out of his team, especially on defense where his Bulls team have lead the NBA in points per game allowed and opponent’s field goal percentage during his tenure. His ability to get the best out of his players may have also been part of his downfall in the end. His teams were known for putting together great regular seasons, 255-139 in five seasons, but possibly running out of gas and faltering in the playoffs, where he has a 23-28 record, often becoming stagnant on offense. In a sense their series defeat to the Cleveland Cavaliers was a microcosm of Thibodeau’s shortcomings in Chicago. They had a tremendously talented team but had far too many stretches where they were stagnant on offense and struggled to score points, while a Cavs team struggling with injuries routinely was able to score points in bunches. People will wonder what could’ve been if Derrick Rose had been able to stay healthy and Thibodeau could have relied on him night in and night out instead of him only appearing in 181 of 394 games over the past five years. But even with Rose’s injury problems, the Bulls’ front office still felt they should’ve gotten more out of this year’s team and others, which was ultimately why Thibodeau was fired. The Bulls job will be attractive because of the market, team history, and the roster they have is one of the best in the NBA if they can keep restricted free agent Jimmy Butler, so the Bulls will be able to attract top candidates Tom Thibodeau will also be in high demand given the success (albeit limited in the postseason) that he had in Chicago. Hey! WHAT'S YOUR REACTION? % Funny % Love % Sad % Wow % Angry Thank you for voting! Can we use your data to tailor ads for you? Our partners will collect data and use cookies for legitimate business purposes, ad personalization and measurement. We also collect anonymized personal data for legally necessary and legitimate business purposes. Read our PRIVACY POLICY.
Q: How to log in Scala *without* a reference to the logger in *every instance*? I've looked at example of logging in Scala, and it usually looks like this: import org.slf4j.LoggerFactory trait Loggable { private lazy val logger = LoggerFactory.getLogger(getClass) protected def debug(msg: => AnyRef, t: => Throwable = null): Unit = {...} } This seems independent of the concrete logging framework. While this does the job, it also introduces an extraneous lazy val in every instance that wants to do logging, which might well be every instance of the whole application. This seems much too heavy to me, in particular if you have many "small instances" of some specific type. Is there a way of putting the logger in the object of the concrete class instead, just by using inheritance? If I have to explicitly declare the logger in the object of the class, and explicitly refer to it from the class/trait, then I have written almost as much code as if I had done no reuse at all. Expressed in a non-logging specific context, the problem would be: How do I declare in a trait that the implementing class must have a singleton object of type X, and that this singleton object must be accessible through method def x: X ? I can't simply define an abstract method, because there could only be a single implementation in the class. I want that logging in a super-class gets me the super-class singleton, and logging in the sub-class gets me the sub-class singleton. Or put more simply, I want logging in Scala to work like traditional logging in Java, using static loggers specific to the class doing the logging. My current knowledge of Scala tells me that this is simply not possible without doing it exactly the same way you do in Java, without much if any benefits from using the "better" Scala. A: Premature Optimization is the root of all evil Let's be clear first about one thing: if your trait looks something like this: trait Logger { lazy val log = Logger.getLogger } Then what you have not done is as follows: You have NOT created a logger instance per instance of your type You have neither given yourself a memory nor a performance problem (unless you have) What you have done is as follows: You have an extra reference in each instance of your type When you access the logger for the first time, you are probably doing some map lookup Note that, even if you did create a separate logger for each instance of your type (which I frequently do, even if my program contains hundreds of thousands of these, so that I have very fine-grained control over my logging), you almost certainly still will neither have a performance nor a memory problem! One "solution" is (of course), to make the companion object implement the logger interface: object MyType extends Logger class MyType { import MyType._ log.info("Yay") } A: How do I declare in a trait that the implementing class must have a singleton object of type X, and that this singleton object must be accessible through method def x: X ? Declare a trait that must be implemented by your companion objects. trait Meta[Base] { val logger = LoggerFactory.getLogger(getClass) } Create a base trait for your classes, sub-classes have to overwrite the meta method. trait Base { def meta: Meta[Base] def logger = meta.logger } A class Whatever with a companion object: object Whatever extends Meta[Base] class Whatever extends Base { def meta = Whatever def doSomething = { logger.log("oops") } } In this way you only need to have a reference to the meta object. We can use the Whatever class like this. object Sample { def main(args: Array[String]) { val whatever = new Whatever whatever.doSomething } }
LA 447 Roundabouts and Corridor Study Project Details Cost:$5 million to $7.5 million The LA 447 Corridor Study is a large "umbrella" project which includes many smaller projects. The LA 447 Corridor Study will evaluate alternatives to improve the mobility and safety of vehicle, pedestrian, and bicycle traffic along the LA 447 corridor. The proposed northern limit of the study is at the railroad tracks near Keith St. The proposed southern limit is the intersection of LA 447 and LA 16. The overall length of the corridor is approximately 10.2 miles. Roundabouts at I-12 and LA 447 Although this project is independent of the LA 447 Corridor Study, alternatives proposed in this phase take into consideration the overall corridor’s proposed improvements. This project would replace the existing Eastbound and Westbound termini at LA 447 and I-12 in Livingston Parish with multi-lane roundabouts. The construction of the two multilane roundabouts shall meet the future vertical grade of the bridge over I-12. The multilane roundabouts will be 180 feet in diameter and will be placed at grade. The roundabouts will be built within the existing right of way, and construction phased to minimize disruption. The construction cost of this project is estimated to be $5 million to $7.5 million.
Cloning and expression in Escherichia coli of a novel thioesterase from Arabidopsis thaliana specific for long-chain acyl-acyl carrier proteins. An Arabidopsis thaliana partial cDNA was previously identified with a sequence similar to the lauroyl-acyl carrier protein (ACP) thioesterase from Umbellularia california (Grellet et al., 1993, Plant Physiol. Biochem. 31, 599-602). Using this DNA fragment, we isolated a 1.8-kb cDNA coding for a 412-amino-acid preprotein. The deduced amino acid sequence is 51% identical to the lauroyl-ACP thioesterase but only 39% identical to safflower oleoyl-ACP thioesterase. The cDNA was expressed in Escherichia coli and the gene product showed thioesterase activity for long-chain acyl-ACPs (14:0, 16:0, 18:0, 18:1 delta 9cis). When expressed in beta-oxidation mutants of E. coli, lipid analysis revealed that cells transformed with the thioesterase produced high amounts of free fatty acids that mostly consisted of 16:0 and some 14:0, 16:1 delta 9cis, and 18:1 delta 11cis. Antibodies were raised to the recombinant protein and used to determine tissue-specific and developmental expression in A. thaliana and Brassica napus. A 40-kDa protein was detected by immunoblots in A. thaliana siliques, leaves, and roots. A maximal expression of the B. napus protein between 18 and 31 days after flowering was found, which correlates with the rapid accumulation of triacylglycerols in the seeds. Based upon these results, we suggest that this long-chain acyl-ACP thioesterase may be a ubiquitous enzyme in plants which is involved in the synthesis of long-chain fatty acids.
README.md node-dronestream Requirements You'll need a decent and current browser and some cpu horsepower. This code uses web-sockets and the incredibly awesome Broadway.js to render the video frames in your browser using a WebGL canvas. How to use Please see the http.createServer and Express 3.0 examples in the 'examples' dir. You attach the stream to your server like this: // in node://// note that the 'server' object points to a server instance and NOT an express app.require("dronestream").listen(server); // if your drone is on a different IPrequire("dronestream").listen(server, { ip:"192.168.2.155" }); We serve the client in the same manner as Socket.IO. Add a reference to /dronestream/nodecopter-client.js in your template. Then attach the stream to a DOM node: <!-- on the client --> <scriptsrc="/dronestream/nodecopter-client.js"></script> <script>// video canvas will auto-size to the DOM-node, or default to 640*360 if no size is set.newNodecopterStream(document.getElementById("droneStream"));</script> How it works The drone sends a proprietary video feed on 192.168.1.1 port 5555. This is mostly a h264 baseline video, but adds custom framing. These frames are parsed and mostly disposed of. The remaining h264 payload is split into NAL units and sent to the browser via web sockets. In the browser broadway takes care of the rendering of the WebGL canvas. Status Node-dronestream has gained some stability in the last release. It attempts to recover lost connections to the drone, and it handles multiple clients, disconnections, etc. See "How to use" for API. Thanks Triple high fives to Felix 'felixge' Geisendörfer for getting the whole NodeCopter movement started and being extremely helpful in the process of getting this together. André 'zoddy' Kussmann for supplying the drone and allowing me to keep hacking on it, even when he had to cancel the NodeCopter event for himself.
111 A.2d 472 (1955) BETHESDA SALVAGE COMPANY, Inc., a corporation, and David Deckelbaum, Appellants, v. FIREMAN'S FUND INSURANCE COMPANY, a corporation, and Newark Insurance Company, a corporation, and New Hampshire Fire Insurance Company, a corporation, Appellees. No. 1591. Municipal Court of Appeals for the District of Columbia. Argued January 10, 1955. Decided February 1, 1955. *473 Sidney M. Goldstein, Washington, D. C., with whom Joseph D. Bulman, Washington, D. C., was on the brief, for appellants. Ward B. McCarthy, Washington, D. C., with whom W. Cameron Burton, Thomas B. Heffelfinger and John A. Kendrick, Washington, D. C., were on the brief, for appellees. Before CAYTON, Chief Judge, and HOOD and QUINN, Associate Judges. CAYTON, Chief Judge. Three insurance companies sued Bethesda Salvage Company and its president, David Deckelbaum, for return of monies overpaid on a false fire loss claim. At trial the plaintiffs offered evidence that the insured had represented verbally and in sworn proofs of claim that the loss, consisting of bales of paper destroyed by fire, was in excess of the total coverage of $6,000, and that each of the three companies paid the full amount of its liability. Plaintiffs also produced evidence that information thereafter came to light that the building involved could not have contained more than 129 tons of paper (as against the 300 tons defendants claimed had been destroyed). This evidence was presented by two insurance adjusters and corroborated by an engineer, a salvage expert, and a fire marshal. Defendants offered no evidence, and the trial court in a written opinion found that the charge of fraud had been established and ordered judgment against defendants for a total of $2,912, to be apportioned in indicated amounts among the three insurers. *474 In the first error assigned it is said that Mr. Deckelbaum should have been freed of personal liability. Deckelbaum was president of the defendant corporation and owned half of its stock. It was he who had all the dealings with the insurers, made all the representations in connection with the loss, and signed the proofs of claim. His tortious conduct, though committed in behalf of the corporation, also created personal and individual liability on his part. McCandless v. Furlaud, 296 U.S. 140, 56 S.Ct. 41, 80 L.Ed. 121; Cox v. DeSoto Crude Oil Purchasing Corp., D.C.La., 55 F.Supp. 467; Palomino Mills v. Davidson Mills Corporation, 230 N.C. 286, 52 S.E.2d 915; Pennington Trap Rock Co. v. Pennington Quarry Co., 38 A.2d 869, 22 N.J.Misc. 318; 3 Fletcher Cyclopedia, Corporations § 1135. Appellants contend that the charge of fraud was not sustained. In this claim there is no merit whatever. The evidence, abundantly corroborated and entirely uncontradicted, was that Deckelbaum represented that 300 tons of paper had been destroyed or damaged in the fire, whereas actual measurements established that the building could not have contained more than half that amount of paper. (The opinions varied and included one statement that the maximum content would be 56 tons.) Deckelbaum's verbal representations and his sworn proofs of claim could not have been, as counsel urge, mere matters of opinion. They were submitted as true and actual weights. Whether made deliberately or without knowledge of their truth or falsity, they justified a finding of fraud. Spargnapani v. Wright, D.C.Mun.App., 110 A.2d 82, and cases there cited. But, appellants say, there was no showing that the insurance companies relied on Deckelbaum's statement. It is true that before approving the claim the adjuster obtained the opinion of an expert in the waste paper business and was told that the building could have contained 300 tons of paper. But the adjuster testified specifically that he relied on Deckelbaum's statement as well as his own investigation, and "that relying upon the statements of Deckelbaum and his sworn Proof of Loss affidavits, the claims were placed in line for payment." This testimony supported the judge's finding that the excessive payments were made in reliance on Deckelbaum's false and fraudulent claims. Finally we consider an assignment of error dealing with admission of evidence. The fire marshal testified that in the regular course of his duties he investigated the fire and ascertained the amount of fire loss paid to the insured; that Deckelbaum told him there had been 300 tons of paper in the building at the time of the fire; that his own measurements satisfied him that the structure would not hold more than 56 tons of paper; that he then asked Deckelbaum what he had done with the rest of the paper and Deckelbaum told him he had sent about 30 tons to the Montgomery County dump. The fire marshal then testified over objection that the man in charge of the dump had told him that defendant company had not dumped any debris from the fire at the dump. This was clearly hearsay, as appellees concede; but the witness immediately followed it with this statement, "in addition that in the course of his official investigation he determined that Deckelbaum had not delivered Thirty (30) tons of paper to the Montgomery County dump." Under the circumstances, and the trial having been without a jury, we think the admission of the one piece of hearsay evidence could not have prejudiced defendants. We have held, citing a number of Federal decisions, that in nonjury cases the reception of inadmissible evidence does not of itself constitute reversible error where there is other evidence to support the judge's findings. Du Bose v. Drummond, D.C.Mun.App., 95 A.2d 57. That is the situation here. The major question was not whether defendants sent some or any paper to the dump; it was whether the building could have contained 300 tons of paper. A negative answer to that question was provided not only by the fire marshal but also by four other witnesses. Affirmed.
<?php /* * Copyright 2016 Johannes M. Schmitt <schmittjoh@gmail.com> * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ namespace JMS\Serializer\Tests\Serializer; use JMS\Serializer\Context; use JMS\Serializer\Exception\RuntimeException; use JMS\Serializer\EventDispatcher\Event; use JMS\Serializer\EventDispatcher\EventSubscriberInterface; use JMS\Serializer\GraphNavigator; use JMS\Serializer\Tests\Fixtures\ObjectWithEmptyArrayAndHash; use JMS\Serializer\Tests\Fixtures\Tag; use JMS\Serializer\VisitorInterface; use JMS\Serializer\Tests\Fixtures\Author; use JMS\Serializer\Tests\Fixtures\AuthorList; use JMS\Serializer\SerializationContext; class JsonSerializationTest extends BaseSerializationTest { protected function getContent($key) { static $outputs = array(); if (!$outputs) { $outputs['readonly'] = '{"id":123,"full_name":"Ruud Kamphuis"}'; $outputs['string'] = '"foo"'; $outputs['boolean_true'] = 'true'; $outputs['boolean_false'] = 'false'; $outputs['integer'] = '1'; $outputs['float'] = '4.533'; $outputs['float_trailing_zero'] = '1'; $outputs['simple_object'] = '{"foo":"foo","moo":"bar","camel_case":"boo"}'; $outputs['circular_reference'] = '{"collection":[{"name":"child1"},{"name":"child2"}],"another_collection":[{"name":"child1"},{"name":"child2"}]}'; $outputs['array_strings'] = '["foo","bar"]'; $outputs['array_booleans'] = '[true,false]'; $outputs['array_integers'] = '[1,3,4]'; $outputs['array_empty'] = '{"array":[]}'; $outputs['array_floats'] = '[1.34,3,6.42]'; $outputs['array_objects'] = '[{"foo":"foo","moo":"bar","camel_case":"boo"},{"foo":"baz","moo":"boo","camel_case":"boo"}]'; $outputs['array_list_and_map_difference'] = '{"list":[1,2,3],"map":{"0":1,"2":2,"3":3}}'; $outputs['array_mixed'] = '["foo",1,true,{"foo":"foo","moo":"bar","camel_case":"boo"},[1,3,true]]'; $outputs['array_datetimes_object'] = '{"array_with_default_date_time":["2047-01-01T12:47:47+0000","2016-12-05T00:00:00+0000"],"array_with_formatted_date_time":["01.01.2047 12:47:47","05.12.2016 00:00:00"]}'; $outputs['array_named_datetimes_object'] = '{"named_array_with_formatted_date":{"testdate1":"01.01.2047 12:47:47","testdate2":"05.12.2016 00:00:00"}}'; $outputs['array_datetimes_object'] = '{"array_with_default_date_time":["2047-01-01T12:47:47+0000","2016-12-05T00:00:00+0000"],"array_with_formatted_date_time":["01.01.2047 12:47:47","05.12.2016 00:00:00"]}'; $outputs['array_named_datetimes_object'] = '{"named_array_with_formatted_date":{"testdate1":"01.01.2047 12:47:47","testdate2":"05.12.2016 00:00:00"}}'; $outputs['array_named_datetimeimmutables_object'] = '{"named_array_with_formatted_date":{"testdate1":"01.01.2047 12:47:47","testdate2":"05.12.2016 00:00:00"}}'; $outputs['blog_post'] = '{"id":"what_a_nice_id","title":"This is a nice title.","created_at":"2011-07-30T00:00:00+0000","is_published":false,"etag":"1edf9bf60a32d89afbb85b2be849e3ceed5f5b10","comments":[{"author":{"full_name":"Foo Bar"},"text":"foo"}],"comments2":[{"author":{"full_name":"Foo Bar"},"text":"foo"}],"metadata":{"foo":"bar"},"author":{"full_name":"Foo Bar"},"publisher":{"pub_name":"Bar Foo"},"tag":[{"name":"tag1"},{"name":"tag2"}]}'; $outputs['blog_post_unauthored'] = '{"id":"what_a_nice_id","title":"This is a nice title.","created_at":"2011-07-30T00:00:00+0000","is_published":false,"etag":"1edf9bf60a32d89afbb85b2be849e3ceed5f5b10","comments":[],"comments2":[],"metadata":{"foo":"bar"},"author":null,"publisher":null,"tag":null}'; $outputs['price'] = '{"price":3}'; $outputs['currency_aware_price'] = '{"currency":"EUR","amount":2.34}'; $outputs['order'] = '{"cost":{"price":12.34}}'; $outputs['order_with_currency_aware_price'] = '{"cost":{"currency":"EUR","amount":1.23}}'; $outputs['log'] = '{"author_list":[{"full_name":"Johannes Schmitt"},{"full_name":"John Doe"}],"comments":[{"author":{"full_name":"Foo Bar"},"text":"foo"},{"author":{"full_name":"Foo Bar"},"text":"bar"},{"author":{"full_name":"Foo Bar"},"text":"baz"}]}'; $outputs['lifecycle_callbacks'] = '{"name":"Foo Bar"}'; $outputs['form_errors'] = '["This is the form error","Another error"]'; $outputs['nested_form_errors'] = '{"errors":["This is the form error"],"children":{"bar":{"errors":["Error of the child form"]}}}'; $outputs['constraint_violation'] = '{"property_path":"foo","message":"Message of violation"}'; $outputs['constraint_violation_list'] = '[{"property_path":"foo","message":"Message of violation"},{"property_path":"bar","message":"Message of another violation"}]'; $outputs['article'] = '{"custom":"serialized"}'; $outputs['orm_proxy'] = '{"foo":"foo","moo":"bar","camel_case":"proxy-boo"}'; $outputs['custom_accessor'] = '{"comments":{"Foo":{"comments":[{"author":{"full_name":"Foo"},"text":"foo"},{"author":{"full_name":"Foo"},"text":"bar"}],"count":2}}}'; $outputs['mixed_access_types'] = '{"id":1,"name":"Johannes","read_only_property":42}'; $outputs['accessor_order_child'] = '{"c":"c","d":"d","a":"a","b":"b"}'; $outputs['accessor_order_parent'] = '{"a":"a","b":"b"}'; $outputs['accessor_order_methods'] = '{"foo":"c","b":"b","a":"a"}'; $outputs['inline'] = '{"c":"c","a":"a","b":"b","d":"d"}'; $outputs['inline_child_empty'] = '{"c":"c","d":"d"}'; $outputs['empty_child'] = '{"c":"c","d":"d","child":{}}'; $outputs['empty_child_skip'] = '{"c":"c","d":"d"}'; $outputs['groups_all'] = '{"foo":"foo","foobar":"foobar","bar":"bar","none":"none"}'; $outputs['groups_foo'] = '{"foo":"foo","foobar":"foobar"}'; $outputs['groups_foobar'] = '{"foo":"foo","foobar":"foobar","bar":"bar"}'; $outputs['groups_default'] = '{"bar":"bar","none":"none"}'; $outputs['groups_advanced'] = '{"name":"John","manager":{"name":"John Manager","friends":[{"nickname":"nickname"},{"nickname":"nickname"}]},"friends":[{"manager":{"name":"John friend 1 manager"}},{"manager":{"name":"John friend 2 manager"}}]}'; $outputs['virtual_properties'] = '{"exist_field":"value","virtual_value":"value","test":"other-name","typed_virtual_property":1}'; $outputs['virtual_properties_low'] = '{"low":1}'; $outputs['virtual_properties_high'] = '{"high":8}'; $outputs['virtual_properties_all'] = '{"low":1,"high":8}'; $outputs['nullable'] = '{"foo":"bar","baz":null,"0":null}'; $outputs['nullable_skip'] = '{"foo":"bar"}'; $outputs['person_secret_show'] = '{"name":"mike","gender":"f"}'; $outputs['person_secret_hide'] = '{"name":"mike"}'; $outputs['null'] = 'null'; $outputs['simple_object_nullable'] = '{"foo":"foo","moo":"bar","camel_case":"boo","null_property":null}'; $outputs['input'] = '{"attributes":{"type":"text","name":"firstname","value":"Adrien"}}'; $outputs['hash_empty'] = '{"hash":{}}'; $outputs['object_when_null'] = '{"text":"foo"}'; $outputs['object_when_null_and_serialized'] = '{"author":null,"text":"foo"}'; $outputs['date_time'] = '"2011-08-30T00:00:00+0000"'; $outputs['date_time_immutable'] = '"2011-08-30T00:00:00+0000"'; $outputs['timestamp'] = '{"timestamp":1455148800}'; $outputs['timestamp_prev'] = '{"timestamp":"1455148800"}'; $outputs['date_interval'] = '"PT45M"'; $outputs['car'] = '{"km":5,"type":"car"}'; $outputs['car_without_type'] = '{"km":5}'; $outputs['garage'] = '{"vehicles":[{"km":3,"type":"car"},{"km":1,"type":"moped"}]}'; $outputs['tree'] = '{"tree":{"children":[{"children":[{"children":[],"foo":"bar"}],"foo":"bar"}],"foo":"bar"}}'; $outputs['nullable_arrays'] = '{"empty_inline":[],"not_empty_inline":["not_empty_inline"],"empty_not_inline":[],"not_empty_not_inline":["not_empty_not_inline"],"empty_not_inline_skip":[],"not_empty_not_inline_skip":["not_empty_not_inline_skip"]}'; $outputs['object_with_object_property_no_array_to_author'] = '{"foo": "bar", "author": "baz"}'; $outputs['object_with_object_property'] = '{"foo": "bar", "author": {"full_name": "baz"}}'; $outputs['author_expression'] = '{"my_first_name":"Ruud","last_name":"Kamphuis","id":123}'; $outputs['maxdepth_skippabe_object'] = '{"a":{"xxx":"yyy"}}'; } if (!isset($outputs[$key])) { throw new RuntimeException(sprintf('The key "%s" is not supported.', $key)); } return $outputs[$key]; } public function testSkipEmptyArrayAndHash() { $object = new ObjectWithEmptyArrayAndHash(); $this->assertEquals('{}', $this->serialize($object)); } public function testAddLinksToOutput() { $this->dispatcher->addListener('serializer.post_serialize', function (Event $event) { $this->assertFalse($event->getVisitor()->hasData('_links')); }, 'JMS\Serializer\Tests\Fixtures\Author', 'json'); $this->dispatcher->addSubscriber(new LinkAddingSubscriber()); $this->dispatcher->addListener('serializer.post_serialize', function (Event $event) { $this->assertTrue($event->getVisitor()->hasData('_links')); }, 'JMS\Serializer\Tests\Fixtures\Author', 'json'); $this->handlerRegistry->registerHandler(GraphNavigator::DIRECTION_SERIALIZATION, 'JMS\Serializer\Tests\Fixtures\AuthorList', 'json', function(VisitorInterface $visitor, AuthorList $data, array $type, Context $context) { return $visitor->visitArray(iterator_to_array($data), $type, $context); } ); $list = new AuthorList(); $list->add(new Author('foo')); $list->add(new Author('bar')); $this->assertEquals('[{"full_name":"foo","_links":{"details":"http:\/\/foo.bar\/details\/foo","comments":"http:\/\/foo.bar\/details\/foo\/comments"}},{"full_name":"bar","_links":{"details":"http:\/\/foo.bar\/details\/bar","comments":"http:\/\/foo.bar\/details\/bar\/comments"}}]', $this->serialize($list)); } public function testReplaceNameInOutput() { $this->dispatcher->addSubscriber(new ReplaceNameSubscriber()); $this->handlerRegistry->registerHandler(GraphNavigator::DIRECTION_SERIALIZATION, 'JMS\Serializer\Tests\Fixtures\AuthorList', 'json', function(VisitorInterface $visitor, AuthorList $data, array $type, Context $context) { return $visitor->visitArray(iterator_to_array($data), $type, $context); } ); $list = new AuthorList(); $list->add(new Author('foo')); $list->add(new Author('bar')); $this->assertEquals('[{"full_name":"new name"},{"full_name":"new name"}]', $this->serialize($list)); } /** * @expectedException RuntimeException * @expectedExceptionMessage Invalid data "baz"(string), expected "JMS\Serializer\Tests\Fixtures\Author". */ public function testDeserializingObjectWithObjectPropertyWithNoArrayToObject() { $content = $this->getContent('object_with_object_property_no_array_to_author'); $object = $this->deserialize($content, 'JMS\Serializer\Tests\Fixtures\ObjectWithObjectProperty'); $this->assertEquals('bar', $object->getFoo()); $this->assertInstanceOf('JMS\Serializer\Tests\Fixtures\Author', $object->getAuthor()); } public function testDeserializingObjectWithObjectProperty() { $content = $this->getContent('object_with_object_property'); $object = $this->deserialize($content, 'JMS\Serializer\Tests\Fixtures\ObjectWithObjectProperty'); $this->assertEquals('bar', $object->getFoo()); $this->assertInstanceOf('JMS\Serializer\Tests\Fixtures\Author', $object->getAuthor()); $this->assertEquals('baz', $object->getAuthor()->getName()); } public function getPrimitiveTypes() { return array( array( 'type' => 'boolean', 'data' => true, ), array( 'type' => 'boolean', 'data' => 1, ), array( 'type' => 'integer', 'data' => 123, ), array( 'type' => 'integer', 'data' => "123", ), array( 'type' => 'string', 'data' => "hello", ), array( 'type' => 'string', 'data' => 123, ), array( 'type' => 'double', 'data' => 0.1234, ), array( 'type' => 'double', 'data' => "0.1234", ), ); } /** * @dataProvider getPrimitiveTypes */ public function testPrimitiveTypes($primitiveType, $data) { $visitor = $this->serializationVisitors->get('json')->get(); $functionToCall = 'visit' . ucfirst($primitiveType); $result = $visitor->$functionToCall($data, array(), $this->getMock('JMS\Serializer\Context')); if ($primitiveType == 'double') { $primitiveType = 'float'; } $this->assertInternalType($primitiveType, $result); } /** * @group empty-object */ public function testSerializeEmptyObject() { $this->assertEquals('{}', $this->serialize(new Author(null))); } /** * @group encoding * @expectedException RuntimeException * @expectedExceptionMessage Your data could not be encoded because it contains invalid UTF8 characters. */ public function testSerializeWithNonUtf8EncodingWhenDisplayErrorsOff() { ini_set('display_errors', 1); $this->serialize(array('foo' => 'bar', 'bar' => pack("H*" ,'c32e'))); } /** * @group encoding * @expectedException RuntimeException * @expectedExceptionMessage Your data could not be encoded because it contains invalid UTF8 characters. */ public function testSerializeWithNonUtf8EncodingWhenDisplayErrorsOn() { ini_set('display_errors', 0); $this->serialize(array('foo' => 'bar', 'bar' => pack("H*" ,'c32e'))); } public function testSerializeArrayWithEmptyObject() { $this->assertEquals('[{}]', $this->serialize(array(new \stdClass()))); } public function testSerializeRootArrayWithDefinedKeys() { $author1 = new Author("Jim"); $author2 = new Author("Mark"); $data = array( 'jim' => $author1, 'mark' => $author2, ); $this->assertEquals('{"jim":{"full_name":"Jim"},"mark":{"full_name":"Mark"}}', $this->serializer->serialize($data, $this->getFormat(), SerializationContext::create()->setInitialType('array'))); $this->assertEquals('[{"full_name":"Jim"},{"full_name":"Mark"}]', $this->serializer->serialize($data, $this->getFormat(), SerializationContext::create()->setInitialType('array<JMS\Serializer\Tests\Fixtures\Author>'))); $this->assertEquals('{"jim":{"full_name":"Jim"},"mark":{"full_name":"Mark"}}', $this->serializer->serialize($data, $this->getFormat(), SerializationContext::create()->setInitialType('array<string,JMS\Serializer\Tests\Fixtures\Author>'))); $data = array( $author1, $author2, ); $this->assertEquals('[{"full_name":"Jim"},{"full_name":"Mark"}]', $this->serializer->serialize($data, $this->getFormat(), SerializationContext::create()->setInitialType('array'))); $this->assertEquals('{"0":{"full_name":"Jim"},"1":{"full_name":"Mark"}}', $this->serializer->serialize($data, $this->getFormat(), SerializationContext::create()->setInitialType('array<int,JMS\Serializer\Tests\Fixtures\Author>'))); $this->assertEquals('{"0":{"full_name":"Jim"},"1":{"full_name":"Mark"}}', $this->serializer->serialize($data, $this->getFormat(), SerializationContext::create()->setInitialType('array<string,JMS\Serializer\Tests\Fixtures\Author>'))); } public function getTypeHintedArrays() { return [ [[1, 2], '[1,2]', null], [['a', 'b'], '["a","b"]', null], [['a' => 'a', 'b' => 'b'], '{"a":"a","b":"b"}', null], [[], '[]', null], [[], '[]', SerializationContext::create()->setInitialType('array')], [[], '[]', SerializationContext::create()->setInitialType('array<integer>')], [[], '{}', SerializationContext::create()->setInitialType('array<string,integer>')], [[1, 2], '[1,2]', SerializationContext::create()->setInitialType('array')], [[1 => 1, 2 => 2], '{"1":1,"2":2}', SerializationContext::create()->setInitialType('array')], [[1 => 1, 2 => 2], '[1,2]', SerializationContext::create()->setInitialType('array<integer>')], [['a', 'b'], '["a","b"]', SerializationContext::create()->setInitialType('array<string>')], [[1 => 'a', 2 => 'b'], '["a","b"]', SerializationContext::create()->setInitialType('array<string>')], [['a' => 'a', 'b' => 'b'], '["a","b"]', SerializationContext::create()->setInitialType('array<string>')], [[1,2], '{"0":1,"1":2}', SerializationContext::create()->setInitialType('array<integer,integer>')], [[1,2], '{"0":1,"1":2}', SerializationContext::create()->setInitialType('array<string,integer>')], [[1,2], '{"0":"1","1":"2"}', SerializationContext::create()->setInitialType('array<string,string>')], [['a', 'b'], '{"0":"a","1":"b"}', SerializationContext::create()->setInitialType('array<integer,string>')], [['a' => 'a', 'b' => 'b'], '{"a":"a","b":"b"}', SerializationContext::create()->setInitialType('array<string,string>')], ]; } /** * @dataProvider getTypeHintedArrays * @param array $array * @param string $expected * @param SerializationContext|null $context */ public function testTypeHintedArraySerialization(array $array, $expected, $context = null) { $this->assertEquals($expected, $this->serialize($array, $context)); } public function getTypeHintedArraysAndStdClass() { $c1 = new \stdClass(); $c2 = new \stdClass(); $c2->foo = 'bar'; $tag = new Tag("tag"); $c3 = new \stdClass(); $c3->foo = $tag; return [ [[$c1], '[{}]', SerializationContext::create()->setInitialType('array<stdClass>')], [[$c2], '[{"foo":"bar"}]', SerializationContext::create()->setInitialType('array<stdClass>')], [[$tag], '[{"name":"tag"}]', SerializationContext::create()->setInitialType('array<JMS\Serializer\Tests\Fixtures\Tag>')], [[$c1], '{"0":{}}', SerializationContext::create()->setInitialType('array<integer,stdClass>')], [[$c2], '{"0":{"foo":"bar"}}', SerializationContext::create()->setInitialType('array<integer,stdClass>')], [[$c3], '{"0":{"foo":{"name":"tag"}}}', SerializationContext::create()->setInitialType('array<integer,stdClass>')], [[$c3], '[{"foo":{"name":"tag"}}]', SerializationContext::create()->setInitialType('array<stdClass>')], [[$tag], '{"0":{"name":"tag"}}', SerializationContext::create()->setInitialType('array<integer,JMS\Serializer\Tests\Fixtures\Tag>')], ]; } /** * @dataProvider getTypeHintedArraysAndStdClass * @param array $array * @param string $expected * @param SerializationContext|null $context */ public function testTypeHintedArrayAndStdClassSerialization(array $array, $expected, $context = null) { $this->assertEquals($expected, $this->serialize($array, $context)); } protected function getFormat() { return 'json'; } } class LinkAddingSubscriber implements EventSubscriberInterface { public function onPostSerialize(Event $event) { $author = $event->getObject(); $event->getVisitor()->addData('_links', array( 'details' => 'http://foo.bar/details/'.$author->getName(), 'comments' => 'http://foo.bar/details/'.$author->getName().'/comments', )); } public static function getSubscribedEvents() { return array( array('event' => 'serializer.post_serialize', 'method' => 'onPostSerialize', 'format' => 'json', 'class' => 'JMS\Serializer\Tests\Fixtures\Author'), ); } } class ReplaceNameSubscriber implements EventSubscriberInterface { public function onPostSerialize(Event $event) { $event->getVisitor()->setData('full_name', 'new name'); } public static function getSubscribedEvents() { return array( array('event' => 'serializer.post_serialize', 'method' => 'onPostSerialize', 'format' => 'json', 'class' => 'JMS\Serializer\Tests\Fixtures\Author'), ); } }
We were relieved to see the president’s press secretary reassure Americans that “there is no effort” to deploy 100,000 National Guard soldiers in 11 states to round up those living here illegally. The draft memo suggesting such a dangerous policy appears to be from U.S. Homeland Security Secretary John Kelly to top officials within three U.S. immigration enforcement agencies. The Associated Press obtained the memo and first reported it on Thursday. Press Secretary Sean Spicer denied that the memo was a “White House document” and insisted it wasn’t being considered. Asking National Guard soldiers to go into their own communities and raid homes or businesses looking for evidence of undocumented immigrants would be cruel. Crueler still would be the very act of having a military force terrorize communities, including, at times, the homes of those who are here legally or are U.S. citizens. The concept is so antithetical to our peaceful and free society that it’s difficult to believe anyone gave real consideration to the concept. An official with Homeland Security said the document was not seriously considered and didn’t have approval from Kelly. And yet, the document exists and it is the kind of proposal that can stoke fear throughout minority communities across the U.S., hence why we’d like to see President Donald Trump reassure Americans that he’d never consider such a tactic to achieve his goal of increased deportations. As of Friday afternoon Trump hadn’t made a statement on the issue. Already Colorado is seeing the impacts of Trump’s immigration order, which is separate from the draft memo. People with pending deportation orders who had been staying in the U.S. on the good graces of U.S. Immigration Enforcement and Control officials were deported in recent weeks. In Denver last week, rather than face deportation from her American children, Jeanette Vizguerra sought sanctuary in a church. A mass deportation effort, especially raids led by a military force, would be dangerous. History would not judge us well should we go down this road. The approach announces itself as an inhumane crackdown. Imagine the impact on our communities. In Denver alone, there are 55,000 people living here illegally, according to a recent survey by the good folks at the Pew Research Center. Many of these people have put down deep roots in their communities. They go to church and work with Americans and, of course, their kids go to school with American kids. They are all around us and they help our society sustain itself. In a city like Denver, if you removed them swiftly, there would be serious and devastating social and economic disorder. Thankfully the White House is backing away from the memo. But the memo is just a more extreme version of what is already taking place. Congress must act quickly to provide those here who haven’t committed violent crimes or have pleaded guilty to crimes necessitated by their undocumented status, like driving without a license or using a fake Social Security number, a legal status. Congress can secure our borders, reform our visa and immigration system and deport real criminals. Congress can listen to governors and leaders of our nation’s largest cities and respond to those who came here without legal status in a fair and humane way that won’t disrupt law and order. Congress can fix our immigration system without the help of deploying soldiers in our communities. To send a letter to the editor about this article, submit online or check out our guidelines for how to submit by e-mail or mail.
<script type="text/javascript" src="static/functions/textareapreview.class.js?v=<?=filemtime(SERVER_ROOT.'/static/functions/textareapreview.class.js')?>"></script>
News & Announcements This week YOGO has invited our yogini friend and author Dana Damara to help us honor the life of B.K.S. Iyengar by sharing some observations on his teachings. Iyengar was a beloved teacher who developed Iyengar yoga, focusing on precision, detail and alignment. He passed away this week at the age of 95. Over time, the repetitive motions of running can create injuries and pain in joints like ankles, knees, hips, and shoulders. Ouch! As a runner, adding a yoga program to your regular exercise routine is super easy, feels awesome, and can improve your overall performance. A new study suggests that laughter can be just as beneficial for your brain as meditation. Both of them cause 'gamma' brain wave activity, in which all of the higher regions of the brain sync into the same frequency. Pretty cool huh? This is what happens when a person is 'in the flow/in the zone' and is considered to be the highest state of cognitive processing. The YOGO Mat will free up a lot of extra real estate and weight on your back and shoulders, but what will you do without your old mat bag or sling? Experiencing separation anxiety? Wish you had more stuff to carry? Why not buy or DIY-convert your bag to a Beeracuda! Today we are incredibly inspired by Kumar Pallana, a self-made man who often appeared in Wes Anderson movies, and who allowed his soul to be his own Guru. Kumar was a yoga teacher, plate-spinner, vaudevillian, actor, and acrobat. Be inspired by his life philosophy, warmth and humor in this wonderful video. Yoga’s health benefits are well documented and go way beyond esoteric energetic alignment. According to a new study, yoga appears to reduce the risk of diabetes - as much as cardiovascular exercise. Is this a surprise to you? Not if you practice yoga! In a recent study based on data from 100,000 women, yoga was found to reduce the risk of diabetes as much as cardio exercises like running. That's a pretty amazing health benefit. Following YOGO's successful Kickstarter launch, we've produced about 700 unique customized YOGO Mats in a rainbow of colors, shipping them out to our wonderful supporters as they're made. Our backers came up with great color combos, and we even used their color choices as feedback in selecting the first retail colors of YOGO Mats. Feeling strong, empowered, and happy after taking a yoga class is definitely a good thing. Your post-yoga bliss not only helps you, it helps those around you. Every time you practice, you are making the world a better place to live. Read the following reasons why fitting yoga into your lifestyle helps the world.
Prognostic Factors of Malignant Peritoneal Mesothelioma Experienced in Japanese Peritoneal Metastasis Center. The current standard of treatment for malignant peritoneal mesothelioma(MPM)is cytoreductive surgery(CRS)plus perioperative intraperitoneal or systemic chemotherapy(comprehensive treatment), The present study was performed to clarify the prognostic factors of PMP after comprehensive treatment. Among 63 patients with MPM, male and female patients were 34 and 29. CRSwas performed in 47 patients and complete cytoreduction(CC-0) was performed in 14(22%)patients. Mean numbers of resected peritoneal sectors and organs were 5.2(1-13), and 2.9(0- 9), respectively. Hyperthermic intraperitoneal chemoperfusion(HIPEC)was performed in 27 patients. Grade 1/2, Grade 3, and Grade 4 complications were experienced in 5, 6, and 3 patients, respectively. One patient died of sepsis, and the mortality rate was 2.3%. Independent prognostic factors for favorable prognosis were performance of HIPEC, peritoneal cancer index (PCI)score C12, no distant metastasis and histologic epithelial type. Relative risk of no HIPEC, PCI score B13, presence of distant metastasis and non epithelial type were 7.69, 22.1, 3.6 and 3.9, respectively. Risk factors for death after comprehensive treatment were no HIPEC, PCI score B13, and non epithelial type. However, only 11(17%)patients showed PCI score C12. Accordingly, PCI score should be reducedC12 before CRSby neoadjuvant chemotherapy.
1. Field of the Invention The present invention relates to a semiconductor device. 2. Description of the Related Art Conventionally, there has been known a semiconductor device where an active element part and a gate pad part are defined on a semiconductor substrate formed by laminating a drain layer (low resistance semiconductor layer) and a drift layer to each other (see FIG. 23 of JP-A-2005-150348 (patent literature 1), for example). FIG. 32A and FIG. 32B are views for explaining a conventional semiconductor device 800. FIG. 32A is a plan view showing an essential part of the semiconductor device 800, and FIG. 32B is a cross-sectional view taken along a line X-X in FIG. 32A. As shown in FIG. 32A and FIG. 32B, the conventional semiconductor device 800 is a semiconductor device provided with an active element part and a gate pad part defined on a semiconductor substrate which is formed by laminating an n+ drain layer 51 and an n− drift layer 52 to each other. As shown in FIG. 32B, the active element part includes: the n+ drain layer 51; the n− drift layer 52; p base regions 53 formed on a surface of the n− drift layer 52; n+ source regions 54 formed on surfaces of the p base regions 53; gate electrodes 57 formed on the p base regions 53 sandwiched between the n+ source regions 54 and the n− drift layer 52 with gate insulation films 56 interposed therebetween; and source electrodes 61 formed in contact with surfaces of the n+ source regions 54 and surfaces of the p base regions 53 in a state where the source electrodes 61 are insulated from the gate electrodes 57 with interlayer insulation films 58 interposed therebetween. On the other hand, as shown in FIG. 32B, the gate pad part includes: the n+ drain layer 51, the n− drift layer 52; a conductor 73 formed of a poly-silicon film formed above the n− drift layer 52 over the whole area of the gate pad part with an interlayer insulation film 72 interposed therebetween; a gate pad electrode 62 formed on the conductor 73; and a p region 71 formed on the surface of the n− drift layer 52 over the whole area of the gate pad part. In FIG. 32A and FIG. 32B, symbol 55 indicates a p+ well region, symbol 59 indicates a source contact hole, symbol 60 indicates a drain electrode, symbol 70 indicates a poly-silicon film, and symbol 74 indicates a p region contact hole. In the conventional semiconductor device 800, in the gate pad part, the p region 71 is formed on the surface of the n− drift layer 52 over the whole area of the gate pad part. Accordingly, at the time of applying a reverse bias voltage, a depletion layer in the n− drift layer 52 extends toward the n+ drain layer 51 over the whole area of the gate pad part thus providing a semiconductor device having a high breakdown strength.
// <copyright file="PlatformSingleton.cs" company="Microsoft"> // Copyright © Microsoft. All Rights Reserved. // </copyright> namespace Microsoft.ApplicationInsights.Extensibility.Implementation.Platform { using System; using System.Linq; using System.Reflection; /// <summary> /// Provides access to the <see cref="Current"/> platform. /// </summary> internal static class PlatformSingleton { private static IPlatform current; /// <summary> /// Gets or sets the current <see cref="IPlatform"/> implementation. /// </summary> public static IPlatform Current { get { return current ?? (current = new PlatformImplementation()); } set { current = value; } } } }
Anxiety Management in Primary Care: Implementing the National Institute of Clinical Excellence Guidelines. More than 40 million Americans suffer from anxiety disorders, ranking them as one of the most common mental health disorders in America. The purpose of this pilot study was to educate providers on the National Institute Clinical Excellence (NICE) anxiety guidelines and monitor providers' perceived competence in managing anxiety. Results showed perceived competence increased significantly pre-intervention to immediately post-intervention (p=0.001), and data revealed the scores did not change significantly immediately post-to six-weeks post (p=0.170). Providers who implemented the guidelines into practice had significantly higher scores (p=0.026) than those who did not implement the guidelines.